ZyXEL Communications PRESTIGE 660H Series User Manual

802.11g wireless adsl2+ 4-port security gateway
Hide thumbs Also See for PRESTIGE 660H Series:
Table of Contents

Advertisement

Prestige 660H/HW Series
802.11g Wireless ADSL2+ 4-Port Security Gateway
User's Guide
Version 3.40
5/2005

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications PRESTIGE 660H Series

  • Page 1 Prestige 660H/HW Series 802.11g Wireless ADSL2+ 4-Port Security Gateway User’s Guide Version 3.40 5/2005...
  • Page 3: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 4: Federal Communications Commission (Fcc) Interference Statement

    Prestige 660H/HW Series User’s Guide Federal Communications Commission (FCC) Interference This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5: Safety Warnings

    For your safety, be sure to read and follow all warning notices and instructions. • To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord. • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks.
  • Page 6: Zyxel Limited Warranty

    Prestige 660H/HW Series User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever...
  • Page 7: Customer Support

    +47 22 80 61 81 +34 902 195 420 www.zyxel.es +34 913 005 345 +46 31 744 7700 www.zyxel.se +46 31 744 7701 REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská...
  • Page 8 “+” is the (prefix) number you enter to make an international telephone call. TELEPHONE WEB SITE FTP SITE +44 (0) 8702 909090 www.zyxel.co.uk +44 (0) 8702 909091 ftp.zyxel.co.uk REGULAR MAIL ZyXEL Communications UK Ltd.,11, The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK) Customer Support...
  • Page 9: Table Of Contents

    Copyright ... 2 Federal Communications Commission (FCC) Interference Statement ... 3 Safety Warnings ... 4 ZyXEL Limited Warranty... 5 Customer Support... 6 Table of Contents ... 8 List of Figures ... 24 List of Tables ... 32 Preface ... 38 Introduction to DSL...
  • Page 10 Prestige 660H/HW Series User’s Guide Chapter 3 Wizard Setup for Internet Access ... 58 3.1 Introduction to Internet Access Wizard ...58 3.1.1 Internet Access Wizard Setup ...58 Chapter 4 Wizard Setup for Media Bandwidth Management ... 66 4.1 Introduction to Media Bandwidth Management ...66 4.1.1 Predefined Media Bandwidth Management Services ...66 4.2 Media Bandwidth Management Setup ...67 Chapter 5...
  • Page 11 7.3.1 WEP Encryption ...84 7.4 Configuring MAC Filters ...87 7.5 Introduction to WPA ...89 7.5.1 WPA-PSK Application Example ...89 7.5.2 WPA with RADIUS Application Example ...90 7.5.3 Wireless Client WPA Supplicants ...91 7.6 Configuring IEEE 802.1x and WPA ...91 7.6.1 Authentication Required: 802.1x ...92 7.6.2 Authentication Required: WPA ...94 7.6.3 Authentication Required: WPA-PSK ...96 7.7 Configuring Local User Authentication ...97...
  • Page 12 Prestige 660H/HW Series User’s Guide 9.4 SIP ALG ...119 9.5 Selecting the NAT Mode ...120 9.6 Configuring SUA Server ...120 9.7 Configuring Address Mapping ...122 9.8 Editing an Address Mapping Rule ...123 Chapter 10 Dynamic DNS Setup... 126 10.1 Dynamic DNS ...126 10.1.1 DYNDNS Wildcard ...126 10.2 Configuring Dynamic DNS ...126 Chapter 11...
  • Page 13 12.7.2.1 When To Use The Firewall ...141 Chapter 13 Firewall Configuration ... 144 13.1 Access Methods ...144 13.2 Firewall Policies Overview ...144 13.3 Rule Logic Overview ...145 13.3.1 Rule Checklist ...145 13.3.2 Security Ramifications ...145 13.3.3 Key Fields For Configuring Rules ...146 13.3.3.1 Action ...146 13.3.3.2 Service ...146 13.3.3.3 Source Address ...146...
  • Page 14 Prestige 660H/HW Series User’s Guide 15.1.3 System Timeout ...171 15.2 Telnet ...171 15.3 FTP ...171 15.4 Web ...172 15.5 Configuring Remote Management ...172 Chapter 16 Universal Plug-and-Play (UPnP) ... 174 16.1 Introducing Universal Plug and Play ...174 16.1.1 How do I know if I'm using UPnP? ...174 16.1.2 NAT Traversal ...174 16.1.3 Cautions with UPnP ...174 16.2 UPnP and ZyXEL ...175...
  • Page 15 18.7.2 Maximize Bandwidth Usage With Bandwidth Borrowing ...200 18.8 Configuring Summary ...200 18.9 Configuring Class Setup ...202 18.9.1 DiffServ ...203 18.9.1.1 DSCP and Per-Hop Behavior ...203 18.9.2 Media Bandwidth Management Class Configuration ...203 18.9.3 Media Bandwidth Management Statistics ...206 18.10 Bandwidth Monitor ...207 Chapter 19 Maintenance ...
  • Page 16 Prestige 660H/HW Series User’s Guide 22.2.1 Traffic Redirect Setup ...233 Chapter 23 Menu 3 LAN Setup ... 236 23.1 LAN Setup ...236 23.1.1 General Ethernet Setup ...236 23.2 Protocol Dependent Ethernet Setup ...237 23.3 CP/IP Ethernet Setup and DHCP ...237 Chapter 24 Wireless LAN Setup ...
  • Page 17 Chapter 27 Static Route Setup ... 260 27.1 IP Static Route Overview ...260 27.2 Configuration ...260 Chapter 28 Bridging Setup ... 264 28.1 Bridging in General ...264 28.2 Bridge Ethernet Setup ...264 28.2.1 Remote Node Bridging Setup ...264 28.2.2 Bridge Static Route Setup ...266 Chapter 29 Network Address Translation (NAT) ...
  • Page 18 Prestige 660H/HW Series User’s Guide 31.4.2 Generic Filter Rule ...293 31.5 Filter Types and NAT ...295 31.6 Example Filter ...295 31.7 Applying Filters and Factory Defaults ...297 31.7.1 Ethernet Traffic ...298 31.7.2 Remote Node Filters ...298 Chapter 32 SNMP Configuration ... 300 32.1 About SNMP ...300 32.2 Supported MIBs ...301 32.3 SNMP Configuration ...301...
  • Page 19 35.2.6 Backup Configuration Using TFTP ...324 35.2.7 TFTP Command Example ...324 35.2.8 GUI-based TFTP Clients ...324 35.3 Restore Configuration ...325 35.3.1 Restore Using FTP ...325 35.3.2 Restore Using FTP Session Example ...326 35.4 Uploading Firmware and Configuration Files ...327 35.4.1 Firmware File Upload ...327 35.4.2 Configuration File Upload ...327 35.4.3 FTP File Upload Command from the DOS Prompt Example ...328 35.4.4 FTP Session Example of Firmware File Upload ...329...
  • Page 20 Prestige 660H/HW Series User’s Guide Chapter 39 Call Scheduling ... 352 39.1 Introduction ...352 Chapter 40 Internal SPTGEN ... 356 40.1 Internal SPTGEN Overview ...356 40.2 The Configuration Text File Format ...356 40.2.1 Internal SPTGEN File Modification - Important Points to Remember ...357 40.3 Internal SPTGEN FTP Download Example ...357 40.4 Internal SPTGEN FTP Upload Example ...358 Chapter 41...
  • Page 21 Appendix C IP Subnetting ... 380 IP Addressing... 380 IP Classes ... 380 Subnet Masks ... 381 Subnetting ... 381 Example: Two Subnets ... 382 Example: Four Subnets... 384 Example Eight Subnets ... 385 Subnetting With Class A and Class B Networks..386 Appendix D PPPoE ...
  • Page 22 Prestige 660H/HW Series User’s Guide WEP Authentication Steps ... 400 Dynamic WEP Key Exchange ... 401 WPA ... 402 User Authentication ... 402 Encryption ... 402 Security Parameters Summary ... 403 Roaming... 403 Requirements for Roaming... 404 Appendix G Antenna Selection and Positioning Recommendation... 406 Antenna Characteristics ...
  • Page 23 Prestige 660H/HW Series User’s Guide Configuring What You Want the Prestige to Log ... 447 Displaying Logs ... 447 Log Command Example... 448 Index... 450...
  • Page 24 Prestige 660H/HW Series User’s Guide...
  • Page 25: List Of Figures

    Prestige 660H/HW Series User’s Guide List of Figures Figure 1 Prestige Internet Access Application ... 48 Figure 2 Firewall Application ... 49 Figure 3 Prestige LAN-to-LAN Application ... 49 Figure 4 P-660H Front Panel ... 49 Figure 5 P-660HW Front Panel ... 50 Figure 6 Password Screen ...
  • Page 26 Prestige 660H/HW Series User’s Guide Figure 37 Example Wireless Client OTIST Screen ... 101 Figure 38 Security Key ... 101 Figure 39 OTIST in Progress (Prestige) ... 101 Figure 40 OTIST in Progress (Client) ... 101 Figure 41 No AP with OTIST Found ... 102 Figure 42 Start OTIST? ...
  • Page 27 Prestige 660H/HW Series User’s Guide Figure 80 Remote Management ... 172 Figure 81 Configuring UPnP ... 175 Figure 82 Add/Remove Programs: Windows Setup: Communication ... 177 Figure 83 Add/Remove Programs: Windows Setup: Communication: Components ... 177 Figure 84 Network Connections ... 178 Figure 85 Windows Optional Networking Components Wizard ...
  • Page 28 Prestige 660H/HW Series User’s Guide Figure 123 Menu 23.1 Change Password ... 226 Figure 124 Menu 1 General Setup ... 229 Figure 125 Menu 1.1 Configure Dynamic DNS ... 230 Figure 126 Menu 2 WAN Backup Setup ... 232 Figure 127 Menu 2.1Traffic Redirect Setup ... 233 Figure 128 Menu 3 LAN Setup ...
  • Page 29 Prestige 660H/HW Series User’s Guide Figure 166 Menu 4 Internet Access & NAT Example ... 276 Figure 167 NAT Example 2 ... 277 Figure 168 Menu 15.2.1 Specifying an Inside Server ... 277 Figure 169 NAT Example 3 ... 278 Figure 170 Example 3: Menu 11.3 ...
  • Page 30 Prestige 660H/HW Series User’s Guide Figure 209 Syslog Example ... 316 Figure 210 Menu 24.4 System Maintenance : Diagnostic ... 317 Figure 211 Telnet in Menu 24.5 ... 322 Figure 212 FTP Session Example ... 323 Figure 213 Telnet into Menu 24.6 ... 326 Figure 214 Restore Using FTP Session Example ...
  • Page 31 Prestige 660H/HW Series User’s Guide Figure 252 Windows XP: Advanced TCP/IP Settings ... 374 Figure 253 Windows XP: Internet Protocol (TCP/IP) Properties ... 375 Figure 254 Macintosh OS 8/9: Apple Menu ... 376 Figure 255 Macintosh OS 8/9: TCP/IP ... 376 Figure 256 Macintosh OS X: Apple Menu ...
  • Page 32 Prestige 660H/HW Series User’s Guide...
  • Page 33: List Of Tables

    Prestige 660H/HW Series User’s Guide List of Tables Table 1 ADSL Standards ... 42 Table 2 Front Panel LEDs ... 50 Table 3 Web Configurator Screens Summary ... 55 Table 4 Internet Access Wizard Setup: First Screen ... 59 Table 5 Internet Connection with PPPoE ... 60 Table 6 Internet Connection with RFC 1483 ...
  • Page 34 Prestige 660H/HW Series User’s Guide Table 37 ICMP Commands That Trigger Alerts ... 135 Table 38 Legal NetBIOS Commands ... 135 Table 39 Legal SMTP Commands ... 136 Table 40 Firewall: Default Policy ... 148 Table 41 Rule Summary ... 150 Table 42 Firewall: Edit Rule ...
  • Page 35 Prestige 660H/HW Series User’s Guide Table 80 Menu 3.5 - Wireless LAN Setup ... 240 Table 81 Menu 3.5.1 WLAN MAC Address Filtering ... 242 Table 82 Menu 3.2.1 IP Alias Setup ... 246 Table 83 Menu 4 Internet Access Setup ... 248 Table 84 Menu 11.1 Remote Node Profile ...
  • Page 36 Prestige 660H/HW Series User’s Guide Table 123 Troubleshooting Internet Access ... 362 Table 124 Troubleshooting the Password ... 362 Table 125 Troubleshooting the Web Configurator ... 363 Table 126 Troubleshooting Remote Management ... 363 Table 127 Classes of IP Addresses ... 380 Table 128 Allowed IP Address Range By Class ...
  • Page 37 Prestige 660H/HW Series User’s Guide Table 166 802.1X Logs ... 444 Table 167 ACL Setting Notes ... 444 Table 168 ICMP Notes ... 445 Table 169 Syslog Logs ... 446 Table 170 RFC-2408 ISAKMP Payload Types ... 446...
  • Page 38 Prestige 660H/HW Series User’s Guide...
  • Page 39: Preface

    Congratulations on your purchase of the Prestige 660HW Wireless ADSL Security Gateway or the Prestige 660H ADSL Security Gateway. Note: Register your product online to receive e-mail notices of firmware upgrades and information at North American products. The Prestige 660HW has the built-in IEEE 802.11g wireless feature that provides wireless LAN connection without the expense of additional network cabling infrastructure.
  • Page 40: User Guide Feedback

    Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 41: Introduction To Dsl

    Prestige 660H/HW Series User’s Guide Introduction to DSL DSL (Digital Subscriber Line) technology enhances the data capacity of the existing twisted- pair wire that runs between the local telephone company switching offices and most homes and offices. While the wire itself can handle higher frequencies, the telephone switching equipment is designed to cut off signals above 4,000 Hz to filter noise off the voice line, but now everybody is searching for ways to get more bandwidth to improve access to the Web - hence DSL technologies.
  • Page 42 Prestige 660H/HW Series User’s Guide Introduction to DSL...
  • Page 43: Getting To Know Your Prestige

    Getting To Know Your Prestige This chapter describes the key features and applications of your 1.1 Introducing the Prestige Your Prestige integrates high-speed 10/100Mbps auto-negotiating LAN interface(s) and a high-speed ADSL port into a single package. The Prestige is ideal for high-speed Internet browsing and making LAN-to-LAN connections to remote networks.
  • Page 44: Features Of The Prestige

    Prestige 660H/HW Series User’s Guide The web browser-based Graphical User Interface (GUI) provides easy management. 1.1.1 Features of the Prestige The following sections describe the features of the Prestige. Note: See the product specifications in the appendix for detailed features and standards support.
  • Page 45: Traffic Redirect

    Content Filtering Content filtering allows you to block access to forbidden Internet web sites, schedule when the Prestige should perform the filtering and give trusted LAN IP addresses unfiltered Internet access. Traffic Redirect Traffic redirect forwards WAN traffic to a backup gateway when the Prestige cannot connect to the Internet, thus acting as an auxiliary if your regular WAN connection fails.
  • Page 46: Dynamic Dns Support

    Prestige 660H/HW Series User’s Guide Dynamic DNS Support With Dynamic DNS support, you can have a static hostname alias for a dynamic IP address, allowing the host to be more easily accessible from various locations on the Internet. You must register for this service with a Dynamic DNS service provider.
  • Page 47: Networking Compatibility

    Traditionally, routing is based on the destination address only and the router takes the shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
  • Page 48: P-660Hw Wireless Features

    Prestige 660H/HW Series User’s Guide Diagnostics Capabilities The Prestige can perform self-diagnostic tests. These tests check the integrity of the following circuitry: • FLASH memory • ADSL circuitry • RAM • LAN port Packet Filters The Prestige's packet filtering functions allows added network security and management. Ease of Installation Your Prestige is designed for quick, intuitive and easy installation.
  • Page 49: Applications For The Prestige

    Wireless LAN MAC Address Filtering Your Prestige can check the MAC addresses of wireless stations against a list of allowed or denied MAC addresses. WEP Encryption WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network to help keep network communications private. Wi-Fi Protected Access Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft.
  • Page 50: Firewall For Secure Broadband Internet Access

    Prestige 660H/HW Series User’s Guide 1.1.3 Firewall for Secure Broadband Internet Access The Prestige provides protection from attacks by Internet hackers. By default, the firewall blocks all incoming traffic from the WAN. The firewall supports TCP/UDP inspection and DoS (Denial of Services) detection and prevention, as well as real time alerts, reports and logs. Figure 2 Firewall Application 1.1.3.1 LAN to LAN Application You can use the Prestige to connect two geogr...
  • Page 51: Figure 5 P-660Hw Front Panel

    Figure 5 P-660HW Front Panel The following table describes the LEDs. Table 2 Front Panel LEDs COLOR PWR/SYS Green None LAN 1-4 Green Amber None WLAN (P- Green 660HW only) None DSL/PPP Green Amber Refer to the Quick Start Guide for information on hardware connections. Chapter 1 Getting To Know Your Prestige Prestige 660H/HW Series User’s Guide STATUS...
  • Page 52 Prestige 660H/HW Series User’s Guide Chapter 1 Getting To Know Your Prestige...
  • Page 53: Introducing The Web Configurator

    This chapter describes how to access and navigate the web configurator. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy Prestige setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions with JavaScript enabled.
  • Page 54: Resetting The Prestige

    Prestige 660H/HW Series User’s Guide Figure 6 Password Screen 6 It is highly recommended you change the default password! Enter a new password, retype it to confirm and click Apply; alternatively click Ignore to proceed to the main menu if you do not want to change the password now.
  • Page 55: Navigating The Prestige Web Configurator

    2 Press the RESET button for ten seconds or until the PWR/SYS LED begins to blink and then release it. When the PWR/SYS LED begins to blink, the defaults have been restored and the Prestige restarts. 2.1.3 Navigating the Prestige Web Configurator The following summarizes how to navigate the web configurator from the SITE MAP screen.
  • Page 56: Table 3 Web Configurator Screens Summary

    Prestige 660H/HW Series User’s Guide Note: Click the embedded help. Table 3 Web Configurator Screens Summary LINK SUB-LINK Wizard Setup Connection Setup Media Bandwidth Mgnt Advanced Setup Password Wireless LAN Wireless MAC Filter 802.1x/WPA Local User Database RADIUS OTIST WAN Setup WAN Backup SUA Only Full Feature...
  • Page 57 Table 3 Web Configurator Screens Summary (continued) LINK SUB-LINK UPnP Logs Log Settings View Log Media Bandwidth Summary Management Class Setup Monitor Maintenance System Status DHCP Table Any IP Table Wireless LAN Association List Diagnostic General DSL Line Firmware LOGOUT Chapter 2 Introducing the Web Configurator Prestige 660H/HW Series User’s Guide FUNCTION...
  • Page 58 Prestige 660H/HW Series User’s Guide Chapter 2 Introducing the Web Configurator...
  • Page 59: Wizard Setup For Internet Access

    Wizard Setup for Internet Access This chapter provides information on the Wizard Setup screens for Internet access in the web configurator. 3.1 Introduction to Internet Access Wizard Use the Wizard Setup screens to configure your system for Internet access with the information (provided by your ISP) that you fill in the Internet Account Information table in the Quick Start Guide.
  • Page 60: Figure 9 Internet Access Wizard Setup: First Screen

    Prestige 660H/HW Series User’s Guide Figure 9 Internet Access Wizard Setup: First Screen The following table describes the fields in this screen. Table 4 Internet Access Wizard Setup: First Screen LABEL DESCRIPTION Mode From the Mode drop-down list box, select Routing (default) if your ISP allows multiple computers to share an Internet account.
  • Page 61: Figure 10 Internet Connection With Pppoe

    Figure 10 Internet Connection with PPPoE The following table describes the fields in this screen. Table 5 Internet Connection with PPPoE LABEL DESCRIPTION Service Name Type the name of your PPPoE service here. User Name Enter the user name exactly as your ISP assigned. If assigned a name in the form user@domain exactly as given.
  • Page 62: Figure 11 Internet Connection With Rfc 1483

    Prestige 660H/HW Series User’s Guide Figure 11 Internet Connection with RFC 1483 The following table describes the fields in this screen. Table 6 Internet Connection with RFC 1483 LABEL DESCRIPTION IP Address This field is available if you select Routing in the Mode field. Type your ISP assigned IP address in this field.
  • Page 63: Figure 13 Internet Connection With Pppoa

    The following table describes the fields in this screen. Table 7 Internet Connection with ENET ENCAP LABEL DESCRIPTION IP Address A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. . Select Obtain an IP Address Automatically if you have a dynamic IP address;...
  • Page 64: Table 8 Internet Connection With Pppoa

    Prestige 660H/HW Series User’s Guide The following table describes the fields in this screen. Table 8 Internet Connection with PPPoA LABEL DESCRIPTION User Name Enter the login name that your ISP gives you. Password Enter the password associated with the user name above. IP Address This option is available if you select Routing in the Mode field.
  • Page 65: Figure 14 Internet Access Wizard Setup: Third Screen

    Prestige 660H/HW Series User’s Guide Figure 14 Internet Access Wizard Setup: Third Screen If you want to change your Prestige LAN settings, click Change LAN Configuration to display the screen as shown next. Figure 15 Internet Access Wizard Setup: LAN Configuration Chapter 3 Wizard Setup for Internet Access...
  • Page 66: Figure 16 Internet Access Wizard Setup: Connection Tests

    Prestige 660H/HW Series User’s Guide The following table describes the fields in this screen. Table 9 Internet Access Wizard Setup: LAN Configuration LABEL LAN IP Address LAN Subnet Mask DHCP DHCP Server Client IP Pool Starting Address Size of Client IP Pool Primary DNS Server Secondary DNS Server As above.
  • Page 67: Wizard Setup For Media Bandwidth Management

    Wizard Setup for Media Bandwidth Management This chapter shows you how to configure basic bandwidth management using the wizard screens. 4.1 Introduction to Media Bandwidth Management The web configurator’s Media Bandwidth Magnt. screens under Wizard Setup allows you to specify bandwidth classes based on an application (or service). You can allocate specific amounts of bandwidth capacity (bandwidth budgets) to different bandwidth classes.
  • Page 68: Media Bandwidth Management Setup

    Prestige 660H/HW Series User’s Guide Table 10 Media Bandwidth Mgnt. Wizard Setup: Services (continued) SERVICE DESCRIPTION File Transfer Program enables fast transfer of files, including large files that may not be possible by e-mail. FTP uses port number 21. E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals.
  • Page 69: Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen

    The following table describes the labels in this screen. Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen LABEL Active Select the service to apply bandwidth management. Next 2 The Prestige automatically creates the bandwidth class for each service you select. You may set the priority for each bandwidth class in the second wizard screen.
  • Page 70: Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish

    Prestige 660H/HW Series User’s Guide Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen LABEL DESCRIPTION Back Click Back to return to the previous screen. Finish Click Finish to complete and save the bandwidth management setup. 3 Well done! You have finished configuration of Media Bandwidth Management. You may now continue configuring your device.
  • Page 71: Chapter 5 Password Setup

    This chapter provides information on the Password screen. 5.1 Password Overview It is highly recommended that you change the password for accessing the Prestige. 5.1.1 Configuring Password To change your Prestige’s password (recommended), click Password in the Site Map screen. Figure 20 Password The following table describes the fields in this screen.
  • Page 72 Prestige 660H/HW Series User’s Guide Chapter 5 Password Setup...
  • Page 73: Chapter 6 Lan Setup

    This chapter describes how to configure LAN settings. 6.1 LAN Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 74: Dns Server Address

    Prestige 660H/HW Series User’s Guide 6.2 DNS Server Address DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it.
  • Page 75: Lan Tcp/Ip

    6.4 LAN TCP/IP The Prestige has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability. 6.4.1 Factory LAN Defaults The LAN parameters of the Prestige are preset in the factory with the following values: •...
  • Page 76: Rip Setup

    Prestige 660H/HW Series User’s Guide 6.4.3 RIP Setup RIP (Routing Information Protocol) allows a router to exchange routing information with other routers. The RIP Direction field controls the sending and receiving of RIP packets. When set to: • Both - the Prestige will broadcast its routing table periodically and incorporate the RIP information that it receives.
  • Page 77: Any Ip

    6.5 Any IP Traditionally, you must set the IP addresses and the subnet masks of a computer and the Prestige to be in the same subnet to allow the computer to access the Internet (through the Prestige). In cases where your computer is required to use a static IP address in another network, you may need to manually configure the network settings of the computer every time you want to access the Internet via the Prestige.
  • Page 78: Configuring Lan

    Prestige 660H/HW Series User’s Guide The following lists out the steps taken, when a computer tries to access the Internet for the first time through the Prestige. 1 When a computer (which is in a different subnet) first attempts to access the Internet, it sends packets to its default gateway (which is not the Prestige) by looking at the MAC address in its ARP table.
  • Page 79: Figure 23 Lan Setup

    Figure 23 LAN Setup The following table describes the fields in this screen. Table 14 LAN Setup LABEL DESCRIPTION DHCP DHCP If set to Server, your Prestige can assign IP addresses, an IP default gateway and DNS servers to Windows 95, Windows NT and other systems that support the DHCP client.
  • Page 80: Configuring Static Dhcp

    Prestige 660H/HW Series User’s Guide Table 14 LAN Setup (continued) LABEL DESCRIPTION Remote DHCP If Relay is selected in the DHCP field above then enter the IP address of the Server actual remote DHCP server here. TCP/IP IP Address Enter the IP address of your Prestige in dotted decimal notation, for example, 192.168.1.1 (factory default).
  • Page 81: Figure 24 Lan: Static Dhcp

    Figure 24 LAN: Static DHCP The following table describes the labels in this screen. Table 15 LAN: Static DHCP LABEL DESCRIPTION This is the index number of the Static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN. IP Address This field specifies the size, or count of the IP address pool.
  • Page 82 Prestige 660H/HW Series User’s Guide Chapter 6 LAN Setup...
  • Page 83: Wireless Lan (Prestige 660Hw)

    Wireless LAN (Prestige 660HW) This chapter discusses how to configure Wireless LAN. 7.1 Introduction A wireless LAN can be as simple as two computers with wireless LAN adapters communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN adapters communicating through access points which bridge network traffic to the wired LAN.
  • Page 84: Restricted Access

    Prestige 660H/HW Series User’s Guide • Use the Local User Database if you have less than 32 wireless clients in your network. The Prestige uses MD5 encryption when a client authenticates with the Local User Database 7.2.3 Restricted Access The MAC Filter screen allows you to configure the AP to give exclusive access to devices (Allow Association) or exclude them from accessing the AP (Deny Association).
  • Page 85: Configuring The Wireless Screen

    6 If you have OTIST-enabled clients, configure OTIST in the OTIST screen. OTIST transfers device SSID and WEP or WPA-PSK key settings (if enabled) to wireless clients. The following figure shows the relative effectiveness of these wireless security methods available on your Prestige. Figure 25 Wireless Security Methods Note: You must enable the same wireless security settings on the Prestige and on all wireless clients that you want to associate with it.
  • Page 86: Figure 26 Wireless Screen

    Prestige 660H/HW Series User’s Guide Figure 26 Wireless Screen The following table describes the labels in this screen. Table 16 Wireless LAN LABEL DESCRIPTION Enable Wireless You should configure some wireless security (see enable the wireless LAN. Select the check box to enable the wireless LAN. Enable Wireless Select this checkbox to allow any ZyXEL WLAN devices that support this feature to associate with the Prestige at higher transmission speeds.
  • Page 87 Table 16 Wireless LAN (continued) LABEL DESCRIPTION Hide ESSID Select Yes to hide the ESSID in so a station cannot obtain the ESSID through AP scanning. Select No to make the ESSID visible so a station can obtain the ESSID through AP scanning.
  • Page 88: Configuring Mac Filters

    Prestige 660H/HW Series User’s Guide Note: If you are configuring the Prestige from a computer connected to the wireless LAN and you change the Prestige’s ESSID or security settings (see on page 84), you will lose your wireless connection when you press Apply to confirm.
  • Page 89: Figure 27 Mac Address Filter

    Figure 27 MAC Address Filter The following table describes the fields in this menu. Table 17 MAC Address Filter LABEL DESCRIPTION Active Select Yes from the drop down list box to enable MAC address filtering. Action Define the filter action for the list of MAC addresses in the MAC Address table. Select Deny Association to block access to the router, MAC addresses not listed will be allowed to access the Prestige.
  • Page 90: Introduction To Wpa

    Prestige 660H/HW Series User’s Guide Table 17 MAC Address Filter (continued) LABEL DESCRIPTION Back Click Back to go to the main wireless LAN setup screen. Apply Click Apply to save your changes back to the Prestige. Cancel Click Cancel to begin configuring this screen afresh. 7.5 Introduction to WPA Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard.
  • Page 91: Wpa With Radius Application Example

    Figure 28 WPA - PSK Authentication 7.5.2 WPA with RADIUS Application Example You need the IP address, port number (default is 1812) and shared secret of a RADIUS server. A WPA application example with an external RADIUS server looks as follows. "A" is the RADIUS server.
  • Page 92: Wireless Client Wpa Supplicants

    Prestige 660H/HW Series User’s Guide Figure 29 WPA with RADIUS Application Example2 7.5.3 Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicants are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data Communications' AEGIS client.
  • Page 93: Authentication Required: 802.1X

    Figure 30 Wireless LAN: 802.1x/WPA: No Authentication The following table describes the label in these screens. Table 18 Wireless LAN: 802.1x/WPA: No Access/Authentication LABEL DESCRIPTION Wireless Port To control wireless station access to the wired network, select a control method from Control the drop-down list box.
  • Page 94: Figure 31 Wireless Lan: 802.1X/Wpa: 802.1Xl

    Prestige 660H/HW Series User’s Guide Figure 31 Wireless LAN: 802.1x/WPA: 802.1xl The following table describes the labels in this screen. Table 19 Wireless LAN: 802.1x/WPA: 802.1x LABEL DESCRIPTION Wireless Port To control wireless station access to the wired network, select a control method Control from the drop-down list box.
  • Page 95: Authentication Required: Wpa

    Table 19 Wireless LAN: 802.1x/WPA: 802.1x (continued) LABEL DESCRIPTION Dynamic WEP Key This field is activated only when you select Authentication Required in the Exchange Wireless Port Control field. Also set the Authentication Databases field to RADIUS Only. Local user database may not be used. Select Disable to allow wireless stations to communicate with the access points without using dynamic WEP key exchange.
  • Page 96: Figure 32 Wireless Lan: 802.1X/Wpa: Wpal

    Prestige 660H/HW Series User’s Guide Figure 32 Wireless LAN: 802.1x/WPA: WPAl The following table describes the labels not previously discussed Table 20 Wireless LAN: 802.1x/WPA: WPAl LABEL DESCRIPTION Key Management Choose WPA in this field. Protocol WPA Mixed Mode The Prestige can operate in WPA Mixed Mode, which supports both clients running WPA and clients running dynamic WEP key exchange with 802.1x in the same Wi-Fi network.
  • Page 97: Authentication Required: Wpa-Psk

    7.6.3 Authentication Required: WPA-PSK Select Authentication Required in the Wireless Port Control field and WPA-PSK in the Key Management Protocol field to display the next screen. Figure 33 Wireless LAN: 802.1x/WPA:WPA-PSKl The following table describes the labels not previously discussed. Table 21 Wireless LAN: 802.1x/WPA: WPAl-PSK LABEL DESCRIPTION...
  • Page 98: Configuring Local User Authentication

    Prestige 660H/HW Series User’s Guide 7.7 Configuring Local User Authentication By storing user profiles locally, your Prestige is able to authenticate wireless users without interacting with a network RADIUS server. However, there is a limit on the number of users you may authenticate in this way.
  • Page 99: Configuring Radius

    Table 22 Local User Database (continued) LABEL DESCRIPTION Password Enter a password of up to 31 printable characters (including spaces; alphabetic characters are case-sensitive) if you’re using MD5 encryption and maximum 14 if you’re using PEAP. Back Click Back to go to the main wireless LAN setup screen. Apply Click Apply to save these settings back to the Prestige.
  • Page 100: Introduction To Otist

    Prestige 660H/HW Series User’s Guide Table 23 RADIUS (continued) LABEL Shared Secret Accounting Server Active Server IP Address Port Number Shared Secret Back Apply Cancel 7.9 Introduction to OTIST In a wireless network, the wireless clients must have the same SSID and security settings as the access point (AP) or wireless router (we will refer to both as “AP”...
  • Page 101: Figure 36 Otist

    7.9.1.1.1 Reset button If you use the Reset button, the default (01234567) or previous saved (through the web configurator) Setup key is used to encrypt the settings that you want to transfer. Hold in the Reset button for one or two seconds. Note: If you hold in the Reset button too long, the device will reset to the factory defaults! 7.9.1.1.2 Web Configurator...
  • Page 102: Wireless Client

    Prestige 660H/HW Series User’s Guide 7.9.1.2 Wireless Client Start the ZyXEL utility and click the Adapter tab. Select the OTIST check box, enter the same Setup Key as your AP’s and click Save. Figure 37 Example Wireless Client OTIST Screen 7.9.2 Starting OTIST Note: You must click Start in the AP OTIST web configurator screen and in the wireless client(s) Adapter screen all within three minutes (at the time or...
  • Page 103: Notes On Otist

    • In the wireless client, you see this screen if it can't find an OTIST-enabled AP (with the same Setup key). Click OK to go back to the ZyXEL utility main screen. • If there is more than one OTIST-enabled AP within range, you see a screen asking you to select one AP to get settings from.
  • Page 104 Prestige 660H/HW Series User’s Guide Chapter 7 Wireless LAN (Prestige 660HW)
  • Page 105: Chapter 8 Wan Setup

    This chapter describes how to configure WAN settings. 8.1 WAN Overview A WAN (Wide Area Network) is an outside connection to another network or the Internet. Chapter 3 on page 58 8.2 Metric The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost".
  • Page 106: Pppoe Encapsulation

    Prestige 660H/HW Series User’s Guide 8.3 PPPoE Encapsulation The Prestige supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF Draft standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPPoE option is for a dial-up connection using PPPoE.
  • Page 107: Zero Configuration Internet Access

    Figure 43 Example of Traffic Shaping 8.5 Zero Configuration Internet Access Once you turn on and connect the Prestige to a telephone jack, it automatically detects the Internet connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and makes the necessary configuration changes. In cases where additional account information (such as an Internet account user name and password) is required or the Prestige cannot connect to the ISP, you will be redirected to web screen(s) for information input or troubleshooting.
  • Page 108: Figure 44 Wan Setup (Pppoe)

    Prestige 660H/HW Series User’s Guide Figure 44 WAN Setup (PPPoE) The following table describes the fields in this screen. Table 25 WAN Setup LABEL Name Mode DESCRIPTION Enter the name of your Internet Service Provider, e.g., MyISP. This information is for identification purposes only.
  • Page 109 Table 25 WAN Setup (continued) LABEL Encapsulation Multiplex Virtual Circuit ID ATM QoS Type Cell Rate Peak Cell Rate Sustain Cell Rate Maximum Burst Size Maximum Burst Size (MBS) refers to the maximum number of cells that can be Login Information Service Name User Name Password...
  • Page 110: Traffic Redirect

    Prestige 660H/HW Series User’s Guide Table 25 WAN Setup (continued) LABEL Connect on Demand Select Connect on Demand when you don't want the connection up all the time Max Idle Timeout PPPoE Passthrough (PPPoE encapsulation only) Subnet Mask (ENET ENCAP encapsulation only) ENET ENCAP Gateway...
  • Page 111: Configuring Wan Backup

    Figure 45 Traffic Redirect Example The following network topology allows you to avoid triangle route security issues when the backup gateway is connected to the LAN. Use IP alias to configure the LAN into two or three logical networks with the Prestige itself as the gateway for each LAN network. Put the protected LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another subnet (Subnet 2).
  • Page 112: Figure 47 Wan Backup

    Prestige 660H/HW Series User’s Guide Figure 47 WAN Backup The following table describes the fields in this screen. Table 26 WAN Backup LABEL DESCRIPTION Backup Type Select the method that the Prestige uses to check the DSL connection. Select DSL Link to have the Prestige check if the connection to the DSLAM is up. Select ICMP to have the Prestige periodically ping the IP addresses configured in the Check WAN IP Address fields.
  • Page 113 Table 26 WAN Backup (continued) LABEL DESCRIPTION Timeout Type the number of seconds (3 recommended) for your Prestige to wait for a ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request. The WAN connection is considered "down" after the Prestige times out the number of times specified in the Fail Tolerance field.
  • Page 114 Prestige 660H/HW Series User’s Guide Chapter 8 WAN Setup...
  • Page 115: Network Address Translation (Nat) Screens

    Network Address Translation This chapter discusses how to configure NAT on the Prestige. 9.1 NAT Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
  • Page 116: What Nat Does

    Prestige 660H/HW Series User’s Guide 9.1.2 What NAT Does In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host.
  • Page 117: Nat Application

    Figure 48 How NAT Works 9.1.4 NAT Application The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the Prestige can communicate with three distinct WAN networks. More examples follow at the end of this chapter. Figure 49 NAT Application With IP Alias Chapter 9 Network Address Translation (NAT) Screens Prestige 660H/HW Series User’s Guide...
  • Page 118: Nat Mapping Types

    Prestige 660H/HW Series User’s Guide 9.1.5 NAT Mapping Types NAT supports five types of IP/port mapping. They are: • One to One: In One-to-One mode, the Prestige maps one local IP address to one global IP address. • Many to One: In Many-to-One mode, the Prestige maps multiple local IP addresses to one global IP address.
  • Page 119: Sua (Single User Account) Versus Nat

    9.2 SUA (Single User Account) Versus NAT SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server. The Prestige also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types as outlined in •...
  • Page 120: Configuring Servers Behind Sua (Example)

    Prestige 660H/HW Series User’s Guide Table 29 Services and Port Numbers (continued) SERVICES SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) Finger HTTP (Hyper Text Transfer protocol or WWW, Web) POP3 (Post Office Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol) SNMP trap PPTP (Point-to-Point Tunneling Protocol)
  • Page 121: Selecting The Nat Mode

    9.5 Selecting the NAT Mode You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the Prestige. Click NAT to open the following screen. Figure 51 NAT Mode The following table describes the labels in this screen.
  • Page 122: Figure 52 Edit Sua/Nat Server Set

    Prestige 660H/HW Series User’s Guide Figure 52 Edit SUA/NAT Server Set The following table describes the fields in this screen. Table 31 Edit SUA/NAT Server Set LABEL Start Port No. Enter a port number in this field. To forward only one port, enter the port number again in the End Port No. field. To forward a series of ports, enter the start port number here and the end port number in the End Port No.
  • Page 123: Configuring Address Mapping

    9.7 Configuring Address Mapping Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules.
  • Page 124: Editing An Address Mapping Rule

    Prestige 660H/HW Series User’s Guide Table 32 Address Mapping Rules (continued) LABEL DESCRIPTION Type 1-1: One-to-one mode maps one local IP address to one global IP address. Note that port numbers do not change for the One-to-one NAT mapping type. M-1: Many-to-One mode maps multiple local IP addresses to one global IP address.
  • Page 125: Table 33 Address Mapping Rule Edit

    Table 33 Address Mapping Rule Edit LABEL Type Choose the port mapping type from one of the following. • One-to-One: One-to-One mode maps one local IP address to one global IP address. Note that port numbers do not change for One-to-one NAT mapping type.
  • Page 126 Prestige 660H/HW Series User’s Guide Chapter 9 Network Address Translation (NAT) Screens...
  • Page 127: Chapter 10 Dynamic Dns Setup

    This chapter discusses how to configure your Prestige to use Dynamic DNS. 10.1 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
  • Page 128: Figure 55 Dynamic Dns

    Prestige 660H/HW Series User’s Guide Figure 55 Dynamic DNS The following table describes the fields in this screen. Table 34 Dynamic DNS LABEL DESCRIPTION Active Select this check box to use dynamic DNS. Service Provider This is the name of your Dynamic DNS service provider. Host Names Type the domain name assigned to your Prestige by your Dynamic DNS provider.
  • Page 129: Chapter 11 Time And Date

    This screen is not available on all models. Use this screen to configure the Prestige’s time and date settings. 11.1 Configuring Time and Date To change your Prestige’s time and date, click Time And Date. The screen appears as shown. Use this screen to configure the Prestige’s time based on your local time zone.
  • Page 130: Table 35 Time And Date

    Prestige 660H/HW Series User’s Guide Table 35 Time and Date LABEL DESCRIPTION Time Server Use Protocol when Select the time service protocol that your time server sends when you turn on the Bootup Prestige. Not all time servers support all protocols, so you may have to check with your ISP/network administrator or use trial and error to find a protocol that works.
  • Page 131: Chapter 12 Firewalls

    This chapter gives some background information on firewalls and introduces the Prestige firewall. 12.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term “firewall” is a system or group of systems that enforces an access-control policy between two networks.
  • Page 132: Stateful Inspection Firewalls

    Prestige 660H/HW Series User’s Guide Information hiding prevents the names of internal systems from being made known via DNS to outside systems, since the application gateway is the only host whose name must be made known to outside systems. Robust authentication and logging pre-authenticates application traffic before it reaches internal hosts and causes it to be logged more effectively than if it were logged with standard host logging.
  • Page 133: Denial Of Service Attacks

    12.3.1 Denial of Service Attacks Figure 57 Prestige Firewall Application 12.4 Denial of Service Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources.
  • Page 134: Types Of Dos Attacks

    Prestige 660H/HW Series User’s Guide Table 36 Common IP Ports 12.4.2 Types of DoS Attacks There are four types of DoS attacks: 1 Those that exploit bugs in a TCP/IP implementation. 2 Those that exploit weaknesses in the TCP/IP specification. 3 Brute-force attacks that flood a network with useless data.
  • Page 135: Figure 59 Syn Flood

    Under normal circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment). After this handshake, a connection is established. •...
  • Page 136: Icmp Vulnerability

    Prestige 660H/HW Series User’s Guide Figure 60 Smurf Attack 12.4.2.1 ICMP Vulnerability ICMP is an error-reporting protocol that works in concert with IP. The following ICMP types trigger an alert: Table 37 ICMP Commands That Trigger Alerts REDIRECT TIMESTAMP_REQUEST TIMESTAMP_REPLY ADDRESS_MASK_REQUEST ADDRESS_MASK_REPLY 12.4.2.2 Illegal Commands (NetBIOS and SMTP)
  • Page 137: Traceroute

    Table 39 Legal SMTP Commands AUTH DATA EHLO QUIT RCPT RSET 12.4.2.3 Traceroute Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of the network topology inside the firewall.
  • Page 138: Stateful Inspection Process

    Prestige 660H/HW Series User’s Guide Figure 61 Stateful Inspection The previous figure shows the Prestige’s default firewall rules in action as well as demonstrates how stateful inspection works. User A can initiate a Telnet session from within the LAN and responses to this request are allowed. However other Telnet traffic initiated from the WAN is blocked.
  • Page 139: Stateful Inspection And The Prestige

    temporary entries might be modified, in order to permit only packets that are valid for the current state of the connection. 8 Any additional inbound or outbound packets that belong to the connection are inspected to update the state table entry and to modify the temporary inbound access list entries as required, and are forwarded through the interface.
  • Page 140: Udp/Icmp Security

    Prestige 660H/HW Series User’s Guide When the Prestige receives any subsequent packet (from the Internet or from the LAN), its connection information is extracted and checked against the cache. A packet is only allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a connection which originated on the LAN).
  • Page 141: Security In General

    • Limit who can telnet into your router. • Don't enable any local service (such as SNMP or NTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network.
  • Page 142: Packet Filtering Vs Firewall

    Prestige 660H/HW Series User’s Guide • Always shred confidential information, particularly about your computer, before throwing it away. Some hackers dig through the trash of companies or individuals for information that might help them in an attack. 12.7 Packet Filtering Vs Firewall Below are some comparisons between the Prestige’s filtering and firewall functions.
  • Page 143 • A range of source and destination IP addresses as well as port numbers can be specified within one firewall rule making the firewall a better choice when complex rules are required. • To selectively block/allow inbound or outbound traffic between inside host/networks and outside host/networks.
  • Page 144 Prestige 660H/HW Series User’s Guide Chapter 12 Firewalls...
  • Page 145: Firewall Configuration

    This chapter shows you how to enable and configure the Prestige firewall. 13.1 Access Methods The web configurator is, by far, the most comprehensive firewall configuration tool your Prestige has to offer. For this reason, it is recommended that you configure your firewall using the web configurator.
  • Page 146: Rule Logic Overview

    Prestige 660H/HW Series User’s Guide Note: If you configure firewall rules without a good understanding of how they work, you might inadvertently introduce security risks to the firewall and to the protected network. Make sure you test your rules after you configure them. For example, you may create rules to: •...
  • Page 147: Key Fields For Configuring Rules

    4 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may be able to connect to computers with running FTP servers. 5 Does this rule conflict with any existing rules? 6 Once these questions have been answered, adding rules is simply a matter of plugging the information into the correct fields in the web configurator screens.
  • Page 148: Lan To Wan Rules

    Prestige 660H/HW Series User’s Guide 13.4.1 LAN to WAN Rules The default rule for LAN to WAN traffic is that all users on the LAN are allowed non- restricted access to the WAN. When you configure a LAN to WAN rule, you in essence want to limit some or all users from accessing certain services on the WAN.
  • Page 149: Alerts

    13.4.3 Alerts Alerts are reports on events, such as attacks, that you may want to know about right away. You can choose to generate an alert when an attack is detected in the Edit Rule screen (select the Send Alert Message to Administrator When Matched checkbox) or when a rule is matched in the Edit Rule screen (see message can be immediately sent to an e-mail account that you specify in the Log Settings screen (see the chapter on logs).
  • Page 150: Rule Summary

    Prestige 660H/HW Series User’s Guide Table 40 Firewall: Default Policy (continued) LABEL DESCRIPTION Default Action Use the radio buttons to select whether to Block (silently discard) or Forward (allow the passage of) packets that are traveling in the selected direction. Select the check box to create a log (when the above action is taken) for packets that are traveling in the selected direction and do not match any of the rules below.
  • Page 151: Table 41 Rule Summary

    The following table describes the labels in this screen. Table 41 Rule Summary LABEL DESCRIPTION Firewall Rules This read-only bar shows how much of the Prestige's memory for recording firewall Storage Space rules it is currently using. When you are using 80% or less of the storage space, the in Use bar is green.
  • Page 152: Configuring Firewall Rules

    Prestige 660H/HW Series User’s Guide 13.6.1 Configuring Firewall Rules Follow these directions to create a new rule. 1 In the Rule Summary screen, type the index number for where you want to put the rule. For example, if you type “6”, your new rule becomes number 6 and the previous rule 6 (if there is one) becomes rule 7.
  • Page 153: Figure 66 Firewall: Edit Rule

    Prestige 660H/HW Series User’s Guide Figure 66 Firewall: Edit Rule Chapter 13 Firewall Configuration...
  • Page 154: Table 42 Firewall: Edit Rule

    Prestige 660H/HW Series User’s Guide The following table describes the labels in this screen. Table 42 Firewall: Edit Rule LABEL Active Action for Matched Packet Source/Destination Address Address Type Start IP Address End IP Address Subnet Mask Edit Delete Services Available/ Selected Services Edit Customized...
  • Page 155: Customized Services

    13.7 Customized Services Configure customized services and port numbers not predefined by the Prestige. For a comprehensive list of port numbers and services, visit the IANA (Internet Assigned Number Authority) website. For further information on these services, please read page 159.
  • Page 156: Example Firewall Rule

    Prestige 660H/HW Series User’s Guide Figure 68 Firewall: Configure Customized Services The following table describes the labels in this screen. Table 44 Firewall: Configure Customized Services LABEL DESCRIPTION Service Name Type a unique name for your custom port. Service Type Choose the IP port (TCP, UDP or TCP/UDP) that defines your customized port from the drop down list box.
  • Page 157: Figure 69 Firewall Example: Rule Summary

    Figure 69 Firewall Example: Rule Summary 3 In the Rule Summary screen, type the index number for where you want to put the rule. For example, if you type “6”, your new rule becomes number 6 and the previous rule 6 (if there is one) becomes rule 7.
  • Page 158: Figure 70 Firewall Example: Edit Rule: Destination Address

    Prestige 660H/HW Series User’s Guide Figure 70 Firewall Example: Edit Rule: Destination Address 7 In the Edit Rule screen, click the Customized Services link to open the Customized Service screen. 8 Click an index number to display the Customized Services -Config screen and configure the screen as follows and click Apply.
  • Page 159: Figure 72 Firewall Example: Edit Rule: Select Customized Services

    Figure 72 Firewall Example: Edit Rule: Select Customized Services Note: Custom ports show up with an “*” before their names in the Services list box and the Rule Summary list box. Click Apply after you’ve created your custom port. On completing the configuration procedure for this Internet firewall rule, the Rule Summary screen should look like the following.
  • Page 160: Predefined Services

    Prestige 660H/HW Series User’s Guide Rule 2 allows a “My Service” connection from the WAN to IP addresses 10.0.0.10 through 10.0.0.15 on the LAN. Figure 73 Firewall Example: Rule Summary: My Service 13.10 Predefined Services The Available Services list box in the Edit Rule screen (see displays all predefined services that the Prestige already supports.
  • Page 161 Table 45 Predefined Services (continued) SERVICE CU-SEEME(TCP/UDP:7648, 24032) DNS(UDP/TCP:53) FINGER(TCP:79) FTP(TCP:20.21) H.323(TCP:1720) HTTP(TCP:80) HTTPS ICQ(UDP:4000) IPSEC_TRANSPORT/ TUNNEL(AH:0) IPSEC_TUNNEL(ESP:0) IRC(TCP/UDP:6667) MSN Messenger(TCP:1863) MULTICAST(IGMP:0) NEWS(TCP:144) NFS(UDP:2049) NNTP(TCP:119) PING(ICMP:0) POP3(TCP:110) PPTP(TCP:1723) PPTP_TUNNEL(GRE:0) RCMD(TCP:512) REAL_AUDIO(TCP:7070) REXEC(TCP:514) RLOGIN(TCP:513) RTELNET(TCP:107) RTSP(TCP/UDP:554) SFTP(TCP:115) Chapter 13 Firewall Configuration Prestige 660H/HW Series User’s Guide DESCRIPTION A popular videoconferencing solution from White Pines Software.
  • Page 162: Anti-Probing

    Prestige 660H/HW Series User’s Guide Table 45 Predefined Services (continued) SERVICE SMTP(TCP:25) SNMP(TCP/UDP:161) SNMP-TRAPS (TCP/ UDP:162) SQL-NET(TCP:1521) SSDP(UDP:1900) SSH(TCP/UDP:22) STRMWORKS(UDP:1558) SYSLOG(UDP:514) TACACS(UDP:49) TELNET(TCP:23) TFTP(UDP:69) VDOLIVE(TCP:7000) 13.11 Anti-Probing If an outside user attempts to probe an unsupported port on your Prestige, an ICMP response packet is automatically returned.
  • Page 163: Configuring Attack Alert

    Figure 74 Firewall: Anti Probing The following table describes the labels in this screen. Table 46 Firewall: Anti Probing LABEL DESCRIPTION Respond to PING The Prestige does not respond to any incoming Ping requests when Disable is selected. Select LAN to reply to incoming LAN Ping requests. Select WAN to reply to incoming WAN Ping requests.
  • Page 164: Threshold Values

    Prestige 660H/HW Series User’s Guide 13.12.1 Threshold Values Tune these parameters when something is not working and after you have checked the firewall counters. These default values should work fine for most small offices. Factors influencing choices for threshold values are: •...
  • Page 165: Figure 75 Firewall: Threshold

    Whenever the number of half-open sessions with the same destination host address rises above a threshold (TCP Maximum Incomplete), the Prestige starts deleting half-open sessions according to one of the following methods: • If the Blocking Time timeout is 0 (the default), then the Prestige deletes the oldest existing half-open session for the host for every new connection request to the host.
  • Page 166 Prestige 660H/HW Series User’s Guide Table 47 Firewall: Threshold (continued) LABEL DESCRIPTION One Minute High This is the rate of new half-open sessions that causes the firewall to start deleting half-open sessions. When the rate of new connection attempts rises above this number, the Prestige deletes half-open sessions as required to accommodate new connection attempts.
  • Page 167: Chapter 14 Content Filtering

    This chapter covers how to configure content filtering. 14.1 Content Filtering Overview Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering gives you the ability to block web sites that contain key words (that you specify) in the URL.
  • Page 168: Configuring The Schedule

    Prestige 660H/HW Series User’s Guide The following table describes the labels in this screen. Table 48 Content Filter: Keyword LABEL Enable Keyword Blocking Block Websites that contain these keywords in the URL: Delete Clear All Keyword Add Keyword Back Apply Cancel 14.3 Configuring the Schedule To set the days and times for the Prestige to perform content filtering, click Content Filter...
  • Page 169: Configuring Trusted Computers

    The following table describes the labels in this screen. Table 49 Content Filter: Schedule LABEL DESCRIPTION Days to Block: Select a check box to configure which days of the week (or everyday) you want the content filtering to be active. Time of Day to Use the 24 hour format to configure which time of the day (or select the All day check Block:...
  • Page 170 Prestige 660H/HW Series User’s Guide Chapter 14 Content Filtering...
  • Page 171: Remote Management Configuration

    This chapter provides information on configuring remote management. 15.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which Prestige interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
  • Page 172: Remote Management And Nat

    Prestige 660H/HW Series User’s Guide • A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service. • You have disabled that service in one of the remote management screens. •...
  • Page 173: Web

    15.4 Web You can use the Prestige’s embedded web configurator for configuration and file management. See the online help for details. 15.5 Configuring Remote Management Click Remote Management to open the following screen. Figure 80 Remote Management The following table describes the fields in this screen. Table 51 Remote Management LABEL DESCRIPTION...
  • Page 174 Prestige 660H/HW Series User’s Guide Chapter 15 Remote Management Configuration...
  • Page 175: Universal Plug-And-Play (Upnp)

    Universal Plug-and-Play (UPnP) This chapter introduces the UPnP feature in the web configurator. 16.1 Introducing Universal Plug and Play Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 176: Upnp And Zyxel

    Prestige 660H/HW Series User’s Guide All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention. 16.2 UPnP and ZyXEL ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum Creates UPnP™...
  • Page 177: Installing Upnp In Windows Example

    Table 52 Configuring UPnP LABEL Enable the Universal Plug and Play (UPnP) Service Allow users to make configuration changes through UPnP Allow UPnP to pass through Firewall Apply Cancel 16.3 Installing UPnP in Windows Example This section shows how to install UPnP in Windows Me and Windows XP. Installing UPnP in Windows Me Follow the steps below to install the UPnP in Windows Me.
  • Page 178: Figure 82 Add/Remove Programs: Windows Setup: Communication

    Prestige 660H/HW Series User’s Guide Figure 82 Add/Remove Programs: Windows Setup: Communication 3 In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 83 Add/Remove Programs: Windows Setup: Communication: Components 4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted.
  • Page 179: Figure 84 Network Connections

    Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start and Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ….
  • Page 180: Figure 85 Windows Optional Networking Components Wizard

    Prestige 660H/HW Series User’s Guide Figure 85 Windows Optional Networking Components Wizard 5 In the Networking Services window, select the Universal Plug and Play check box. Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 181: Using Upnp In Windows Xp Example

    Figure 86 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 16.4 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the Prestige.
  • Page 182: Figure 87 Network Connections

    Prestige 660H/HW Series User’s Guide Figure 87 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 183: Figure 88 Internet Connection Properties

    Prestige 660H/HW Series User’s Guide Figure 88 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings. Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 184: Figure 89 Internet Connection Properties: Advanced Settings

    Prestige 660H/HW Series User’s Guide Figure 89 Internet Connection Properties: Advanced Settings Figure 90 Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
  • Page 185: Figure 91 System Tray Icon

    Figure 91 System Tray Icon 7 Double-click on the icon to display your current Internet connection status. Figure 92 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the Prestige without finding out the IP address of the Prestige first.
  • Page 186: Figure 93 Network Connections

    Prestige 660H/HW Series User’s Guide Figure 93 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your Prestige and select Invoke. The web configurator login screen displays. Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 187: Figure 94 Network Connections: My Network Places

    Prestige 660H/HW Series User’s Guide Figure 94 Network Connections: My Network Places 6 Right-click on the icon for your Prestige and select Properties. A properties window displays with basic information about the Prestige. Figure 95 Network Connections: My Network Places: Properties: Example Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 188 Prestige 660H/HW Series User’s Guide Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 189: Chapter 17 Logs Screens

    This chapter contains information about configuring general log settings and viewing the Prestige’s logs. Refer to the appendix for example log message explanations. 17.1 Logs Overview The web configurator allows you to choose which categories of events and/or alerts to have the Prestige log and then display the logs or have the Prestige send them to an administrator (as e-mail) or to a syslog server.
  • Page 190: Figure 96 Log Settings

    Prestige 660H/HW Series User’s Guide Figure 96 Log Settings The following table describes the fields in this screen. Table 53 Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below.
  • Page 191: Displaying The Logs

    Table 53 Log Settings LABEL DESCRIPTION UNIX Syslog Syslog logging sends a log to an external syslog server used to store logs. Active Click Active to enable syslog logging. Syslog IP Enter the server name or IP address of the syslog server that will log the selected Address categories of logs.
  • Page 192: Smtp Error Messages

    Prestige 660H/HW Series User’s Guide Figure 97 View Logs The following table describes the fields in this screen. Table 54 View Logs LABEL DESCRIPTION Display The categories that you select in the Log Settings screen (see page Select a category of logs to view; select All Logs to view logs from all of the log categories that you selected in the Log Settings page.
  • Page 193: Example E-Mail Log

    Table 55 SMTP Error Messages -5 means MAIL FROM fail -6 means RCPT TO fail -7 means DATA fail -8 means mail data send fail 17.4.1 Example E-mail Log An "End of Log" message displays for each mail in which a complete log has been sent. The following is an example of a log sent by e-mail.
  • Page 194 Prestige 660H/HW Series User’s Guide Chapter 17 Logs Screens...
  • Page 195: Media Bandwidth Management Advanced Setup

    Media Bandwidth Management This chapter describes the functions and advanced configuration of bandwidth management. 18.1 Bandwidth Management Advanced Setup Overview Bandwidth management allows you to allocate an interface’s outgoing capacity to specific types of traffic. It can also help you make sure that the Prestige forwards certain types of traffic (especially real-time applications) with minimum delay.
  • Page 196: Proportional Bandwidth Allocation

    Prestige 660H/HW Series User’s Guide you configure child-classes with filters for any classes that you configure without filters. The Prestige leaves the bandwidth budget allocated and unused for a class that does not have a filter itself or child-classes with filters. View your configured bandwidth classes and child- classes in the Class Setup screen (see The total of the configured bandwidth budgets for child-classes cannot exceed the configured bandwidth budget speed of the parent class.
  • Page 197: Application And Subnet-Based Bandwidth Management Example

    Figure 100 Subnet-based Bandwidth Management Example 18.4.3 Application and Subnet-based Bandwidth Management Example The following example uses bandwidth classes based on LAN subnets and applications (specific applications in each subnet are allotted bandwidth). Table 56 Application and Subnet-based Bandwidth Management Example TRAFFIC TYPE VoIP E-mail...
  • Page 198: Scheduler

    Prestige 660H/HW Series User’s Guide 18.5 Scheduler The scheduler divides up an interface’s bandwidth among the bandwidth classes. The Prestige has two types of scheduler: fairness-based and priority-based. 18.5.1 Priority-based Scheduler With the priority-based scheduler, the Prestige forwards traffic from bandwidth classes according to the priorities that you assign to the bandwidth classes.
  • Page 199: Maximize Bandwidth Usage Example

    18.6.2 Maximize Bandwidth Usage Example Here is an example of a Prestige that has maximized bandwidth usage enabled on an interface. The first figure shows each bandwidth class’s bandwidth budget and priority. The classes are set up based on subnets. The interface is set to 10 Mbps. Each subnet is allocated 2 Mbps. The unbudgeted 2 Mbps allows traffic not defined in one of the bandwidth filters to go out when you do not select the maximize bandwidth option.
  • Page 200: Bandwidth Borrowing

    Prestige 660H/HW Series User’s Guide Figure 103 Maximize Bandwidth Usage Example 18.7 Bandwidth Borrowing Bandwidth borrowing allows a child-class to borrow unused bandwidth from its parent class, whereas maximize bandwidth usage allows bandwidth classes to borrow any unused or unbudgeted bandwidth on the whole interface. Enable bandwidth borrowing on a child-class to allow the child-class to use its parent class’s unused bandwidth.
  • Page 201: Maximize Bandwidth Usage With Bandwidth Borrowing

    Figure 104 Bandwidth Borrowing Example • The Administration and Sales classes cannot borrow unused bandwidth from the Root class because the Administration and Sales classes has bandwidth borrowing disabled. • The Marketing and R&D classes can both borrow unused bandwidth from the Root class because the Marketing and R&D classes both have bandwidth borrowing enabled.
  • Page 202: Figure 105 Media Bandwidth Management: Summary

    Prestige 660H/HW Series User’s Guide Figure 105 Media Bandwidth Management: Summary The following table describes the labels in this screen. Table 57 Media Bandwidth Management: Summary LABEL DESCRIPTION These read-only labels represent the physical interfaces. Select an interface’s check box WLAN to enable bandwidth management on that interface.
  • Page 203: Configuring Class Setup

    18.9 Configuring Class Setup The class setup screen displays the configured bandwidth classes by individual interface. Select an interface and click the buttons to perform the actions described next. Click “+” to expand the class tree or click “-“ to collapse the class tree. Each interface has a permanent root class.
  • Page 204: Diffserv

    Prestige 660H/HW Series User’s Guide 18.9.1 DiffServ DiffServ is a class of service (CoS) model that marks packets so that they receive specific per- hop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow. Packets are marked with DiffServ Code Points (DSCPs) indicating the level of service desired.
  • Page 205: Figure 108 Media Bandwidth Management: Class Configuration

    Figure 108 Media Bandwidth Management: Class Configuration The following table describes the labels in this screen Table 59 Media Bandwidth Management: Class Configuration LABEL Class Name BW Budget (kbps) Priority Borrow bandwidth from parent class Chapter 18 Media Bandwidth Management Advanced Setup DESCRIPTION Use the auto-generated name or enter a descriptive name of up to 20 alphanumeric characters, including spaces.
  • Page 206 Prestige 660H/HW Series User’s Guide Table 59 Media Bandwidth Management: Class Configuration (continued) LABEL Enable DiffServ Marking DiffServ Mark Bandwidth Filter The Prestige uses a bandwidth filter to identify the traffic that belongs to a bandwidth class. Active Service Destination IP Address Destination Subnet Mask...
  • Page 207: Media Bandwidth Management Statistics

    Table 59 Media Bandwidth Management: Class Configuration (continued) LABEL Apply Cancel Table 60 Services and Port Numbers SERVICES ECHO FTP (File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) Finger HTTP (Hyper Text Transfer protocol or WWW, Web) POP3 (Post Office Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol)
  • Page 208: Bandwidth Monitor

    Prestige 660H/HW Series User’s Guide Figure 109 Media Bandwidth Management Statistics The following table describes the labels in this screen. Table 61 Media Bandwidth Management Statistics LABEL DESCRIPTION Class Name This field displays the name of the class the statistics page is showing. Budget (kbps) This field displays the amount of bandwidth allocated to the class.
  • Page 209: Figure 110 Media Bandwidth Management: Monitor

    Figure 110 Media Bandwidth Management: Monitor The following table describes the labels in this screen. Table 62 Media Bandwidth Management: Monitor LABEL Interface Class Name Budget (kbps) Current Usage (kbps) Back Refresh Chapter 18 Media Bandwidth Management Advanced Setup Prestige 660H/HW Series User’s Guide DESCRIPTION Select an interface from the drop-down list box to view the bandwidth usage of its bandwidth classes.
  • Page 210 Prestige 660H/HW Series User’s Guide Chapter 18 Media Bandwidth Management Advanced Setup...
  • Page 211: Chapter 19 Maintenance

    This chapter displays system information such as ZyNOS firmware, port IP addresses and port traffic statistics. 19.1 Maintenance Overview The maintenance screens can help you view system information, upload new firmware, manage configuration and restart your Prestige. 19.2 System Status Screen Click System Status to open the following screen, where you can use to monitor your Prestige.
  • Page 212: Figure 111 System Status

    Prestige 660H/HW Series User’s Guide Figure 111 System Status The following table describes the fields in this screen. Table 63 System Status LABEL DESCRIPTION System Status System Name This is the name of your Prestige. It is for identification purposes. Chapter 19 Maintenance...
  • Page 213: System Statistics

    Table 63 System Status (continued) LABEL DESCRIPTION ZyNOS Firmware This is the ZyNOS firmware version and the date created. ZyNOS is ZyXEL's Version proprietary Network Operating System design. DSL FW Version This is the DSL firmware version associated with your Prestige. Standard This is the standard that your Prestige is using.
  • Page 214: Figure 112 System Status: Show Statistics

    Prestige 660H/HW Series User’s Guide Figure 112 System Status: Show Statistics The following table describes the fields in this screen. Table 64 System Status: Show Statistics LABEL DESCRIPTION System up Time This is the elapsed time the system has been up. CPU Load This field specifies the percentage of CPU utilization.
  • Page 215: Dhcp Table Screen

    Table 64 System Status: Show Statistics (continued) LABEL DESCRIPTION Poll Interval(s) Type the time interval for the browser to refresh system statistics. Set Interval Click this button to apply the new poll interval you entered in the Poll Interval field above. Stop Click this button to halt the refreshing of the system statistics.
  • Page 216: Any Ip Table Screen

    Prestige 660H/HW Series User’s Guide 19.4 Any IP Table Screen Click Maintenance, Any IP. The Any IP table shows current read-only information (including the IP address and the MAC address) of all network devices that use the Any IP feature to communicate with the Prestige. Refer to information.
  • Page 217: Diagnostic Screens

    Figure 115 Association List The following table describes the fields in this screen. Table 67 Association List LABEL DESCRIPTION This is the index number of an associated wireless station. MAC Address This field displays the MAC (Media Access Control) address of an associated wireless station.
  • Page 218: Diagnostic Dsl Line Screen

    Prestige 660H/HW Series User’s Guide Figure 116 Diagnostic: General The following table describes the fields in this screen. Table 68 Diagnostic: General LABEL DESCRIPTION TCP/IP Type the IP address of a computer that you want to ping in order to test a connection. Address Ping Click this button to ping the IP address that you entered.
  • Page 219: Figure 117 Diagnostic: Dsl Line

    Figure 117 Diagnostic: DSL Line The following table describes the fields in this screen. Table 69 Diagnostic: DSL Line LABEL Reset ADSL Click this button to reinitialize the ADSL line. The large text box above then displays Line the progress and results of this operation, for example: "Start to reset ADSL Loading ADSL modem F/W...
  • Page 220: Firmware Screen

    Prestige 660H/HW Series User’s Guide 19.7 Firmware Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a .bin extension, for example, "Prestige.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 221: Figure 119 Network Temporarily Disconnected

    Prestige 660H/HW Series User’s Guide The Prestige automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 119 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen.
  • Page 222 Prestige 660H/HW Series User’s Guide Chapter 19 Maintenance...
  • Page 223: Chapter 20 Introducing The Smt

    This chapter explains how to access and navigate the System Management Terminal and gives an overview of its menus. 20.1 SMT Introduction The Prestige’s SMT (System Management Terminal) is a menu-driven interface that you can access from a terminal emulator over a telnet connection. This chapter shows you how to access the SMT (System Management Terminal) menus via Telnet, how to navigate the SMT and how to configure SMT menus.
  • Page 224: Prestige Smt Menu Overview

    Prestige 660H/HW Series User’s Guide Figure 121 Login Screen Enter Password : **** 20.1.3 Prestige SMT Menu Overview We use the Prestige 660HW-61 SMT menus in this guide as an example. The SMT menus vary slightly for different Prestige models. The following figure gives you an overview of the various SMT menu screens of your Pres- tige.
  • Page 225: Table 71 Navigating The Smt Interface

    Type 99, then press [ENTER].Type 99 at the main menu prompt and press [ENTER] to exit the SMT interface. Copyright (c) 1994 - 2004 ZyXEL Communications Corp. Prestige 660HW-61 Main Menu Advanced Management Enter Menu Selection Number: Prestige 660H/HW Series User’s Guide...
  • Page 226: System Management Terminal Interface Summary

    Prestige 660H/HW Series User’s Guide 20.2.1 System Management Terminal Interface Summary Table 73 Main Menu Summary MENU TITLE General Setup WAN Backup Setup LAN Setup Internet Access Setup Remote Node Setup Static Routing Setup Dial-in User Setup NAT Setup Filter and Firewall Setup SNMP Configuration System Security System Maintenance...
  • Page 227: Figure 123 Menu 23.1 Change Password

    Figure 123 Menu 23.1 Change Password Menu 23.1 - System Security - Change Password Enter here to CONFIRM or ESC to CANCEL: 4 Type your new system password in the New Password field (up to 30 characters), and press [ENTER]. 5 Re-type your new system password in the Retype to confirm field for confirmation and press [ENTER].
  • Page 228 Prestige 660H/HW Series User’s Guide Chapter 20 Introducing the SMT...
  • Page 229: Chapter 21 Menu 1 General Setup

    Menu 1 - General Setup contains administrative and system-related information. 21.1 General Setup Menu 1 — General Setup contains administrative and system-related information (shown next). The System Name field is for identification purposes. However, because some ISPs check this name you should enter your computer's "Computer Name". •...
  • Page 230: Procedure To Configure Dynamic Dns

    Prestige 660H/HW Series User’s Guide Figure 124 Menu 1 General Setup Press ENTER to Confirm or ESC to Cancel: Fill in the required fields. Refer to the table shown next for more information about these fields. Table 74 Menu 1 General Setup FIELD System Name Location (optional)
  • Page 231: Figure 125 Menu 1.1 Configure Dynamic Dns

    Figure 125 Menu 1.1 Configure Dynamic DNS Follow the instructions in the next table to configure dynamic DNS parameters. Table 75 Menu 1.1 Configure Dynamic DNS FIELD DESCRIPTION Service Provider This is the name of your dynamic DNS service provider. Active Press [SPACE BAR] to select Yes and then press [ENTER] to make dynamic DNS active.
  • Page 232 Prestige 660H/HW Series User’s Guide Chapter 21 Menu 1 General Setup...
  • Page 233: Menu 2 Wan Backup Setup

    Menu 2 WAN Backup Setup This chapter describes how to configure traffic redirect and dial-backup using menu 2 and 2.1. 22.1 Introduction to WAN Backup Setup This chapter explains how to configure the Prestige for traffic redirect and dial backup connections.
  • Page 234: Traffic Redirect Setup

    Prestige 660H/HW Series User’s Guide Table 76 Menu 2 WAN Backup Setup (continued) FIELD KeepAlive Fail Tolerance Recovery Interval(sec) When the Prestige is using a lower priority connection (usually a WAN backup ICMP Timeout Traffic Redirect When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 22.2.1 Traffic Redirect Setup Configure parameters that determine when the Prestige will forward WAN traffic to the...
  • Page 235 Table 77 Menu 2.1Traffic Redirect Setup FIELD DESCRIPTION Metric This field sets this route's priority among the routes the Prestige uses. The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1"...
  • Page 236 Prestige 660H/HW Series User’s Guide Chapter 22 Menu 2 WAN Backup Setup...
  • Page 237: Chapter 23 Menu 3 Lan Setup

    This chapter covers how to configure your wired Local Area Network (LAN) settings. 23.1 LAN Setup This section describes how to configure the Ethernet using Menu 3 — LAN Setup. From the main menu, enter 3 to display menu 3. Figure 128 Menu 3 LAN Setup Menu 3 - LAN Setup...
  • Page 238: Protocol Dependent Ethernet Setup

    Prestige 660H/HW Series User’s Guide 23.2 Protocol Dependent Ethernet Setup Depending on the protocols for your applications, you need to configure the respective Ethernet Setup, as outlined below. • For TCP/IP Ethernet setup refer to • For bridging Ethernet setup refer to 23.3 CP/IP Ethernet Setup and DHCP Use menu 3.2 to configure your Prestige for TCP/IP.
  • Page 239: Table 78 Dhcp Ethernet Setup

    Follow the instructions in the following table on how to configure the DHCP fields. Table 78 DHCP Ethernet Setup FIELD DHCP Setup DHCP Client IP Pool Starting Address Size of Client IP Pool Primary DNS Server Secondary DNS Server Remote DHCP Serve Follow the instructions in the following table to configure TCP/IP parameters for the Ethernet port.
  • Page 240 Prestige 660H/HW Series User’s Guide Chapter 23 Menu 3 LAN Setup...
  • Page 241: Chapter 24 Wireless Lan Setup

    This chapter covers how to configure wireless LAN settings in SMT menu 3.5. 24.1 Wireless LAN Overview Refer to the chapter on the wireless LAN screens for wireless LAN background information. 24.2 Wireless LAN Setup Use menu 3.5 to set up your Prestige as the wireless access point. To edit menu 3.5, enter 3 from the main menu to display Menu 3 –...
  • Page 242: Wireless Lan Mac Address Filter

    Prestige 660H/HW Series User’s Guide Table 80 Menu 3.5 - Wireless LAN Setup (continued) FIELD DESCRIPTION Channel ID Press [SPACE BAR] to select a channel. This allows you to set the operating frequency/ channel depending on your particular region. RTS(Request To Send) threshold (number of bytes) enables RTS/CTS handshake. Data Threshold with its frame size larger than this value will perform the RTS/CTS handshake.
  • Page 243: Figure 132 Menu 3.5.1 Wlan Mac Address Filtering

    Figure 132 Menu 3.5.1 WLAN MAC Address Filtering -------------------------------------------------------------------------- 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 -------------------------------------------------------------------------- The following table describes the fields in this menu. Table 81 Menu 3.5.1 WLAN MAC Address Filtering FIELD DESCRIPTION Active To enable MAC address filtering, press [SPACE BAR] to select Yes and press...
  • Page 244 Prestige 660H/HW Series User’s Guide Chapter 24 Wireless LAN Setup...
  • Page 245: Chapter 25 Internet Access

    This chapter shows you how to configure the LAN and WAN of your Prestige for Internet access 25.1 Internet Access Overview Refer to the chapters on the web configurator’s wizard, LAN and WAN screens for more background information on fields in the SMT screens covered in this chapter. 25.2 IP Policies Traditionally, routing is based on the destination address only and the router takes the shortest path to forward a packet.
  • Page 246: Ip Alias Setup

    Prestige 660H/HW Series User’s Guide Figure 133 IP Alias Network Example Use menu 3.2.1 to configure IP Alias on your Prestige. 25.4 IP Alias Setup Use menu 3.2 to configure the first network. Move the cursor to Edit IP Alias field and press [SPACEBAR] to choose Yes and press [ENTER] to configure the second and third network.
  • Page 247: Route Ip Setup

    Figure 135 Menu 3.2.1 IP Alias Setup Menu 3.2.1 - IP Alias Setup IP Alias 1= No IP Alias 2= No Follow the instructions in the following table to configure IP Alias parameters. Table 82 Menu 3.2.1 IP Alias Setup FIELD DESCRIPTION IP Alias...
  • Page 248: Internet Access Configuration

    Prestige 660H/HW Series User’s Guide Figure 136 Menu 1 General Setup Menu 1 - General Setup Press ENTER to Confirm or ESC to Cancel: 25.6 Internet Access Configuration Menu 4 allows you to enter the Internet Access information in one screen. Menu 4 is actually a simplified setup for one of the remote nodes that you can access in menu 11.
  • Page 249: Table 83 Menu 4 Internet Access Setup

    Menu 4 Internet Access Setup Table 83 FIELD DESCRIPTION ISP’s Name Enter the name of your Internet Service Provider (ISP). This information is for identification purposes only. Encapsulation Press [ Choices are PPPoE, PPPoA, RFC 1483 or ENET ENCAP. Multiplexing Press [ Choices are VC-based or LLC-based.
  • Page 250 Prestige 660H/HW Series User’s Guide Chapter 25 Internet Access...
  • Page 251: Remote Node Configuration

    Remote Node Configuration This chapter covers remote node configuration. 26.1 Remote Node Setup Overview This section describes the protocol-independent parameters for a remote node. A remote node is required for placing calls to a remote gateway. A remote node represents both the remote gateway and the network behind it across a WAN connection.
  • Page 252: Encapsulation And Multiplexing Scenarios

    Prestige 660H/HW Series User’s Guide Figure 138 Menu 11 Remote Node Setup 26.2.2 Encapsulation and Multiplexing Scenarios For Internet access you should use the encapsulation and multiplexing methods used by your ISP. Consult your telephone company for information on encapsulation and multiplexing methods for LAN-to-LAN applications, for example between a branch office and corporate headquarters.
  • Page 253: Figure 139 Menu 11.1 Remote Node Profile

    Figure 139 Menu 11.1 Remote Node Profile Rem Node Name= MyISP Active= Yes Encapsulation= RFC 1483 Multiplexing= LLC-based Service Name= N/A Incoming: Rem Login= N/A Rem Password= N/A Outgoing: My Login= N/A My Password= N/A Authen= N/A Press ENTER to Confirm or ESC to Cancel: In Menu 11.1 –...
  • Page 254: Outgoing Authentication Protocol

    Prestige 660H/HW Series User’s Guide Table 84 Menu 11.1 Remote Node Profile (continued) FIELD DESCRIPTION PAP – accept PAP (Password Authentication Protocol) only. Route This field determines the protocol used in routing. Options are IP and None. Bridge When bridging is enabled, your Prestige will forward any packet that it does not route to this remote node;...
  • Page 255: Remote Node Network Layer Options

    26.3 Remote Node Network Layer Options For the TCP/IP parameters, perform the following steps to edit Menu 11.3 – Remote Node Network Layer Options as shown next. 1 In menu 11.1, make sure IP is among the protocols in the Route field. 2 Move the cursor to the Edit IP/Bridge field, press [SPACE BAR] to select Yes, then press [ENTER] to display Menu 11.3 –...
  • Page 256: My Wan Addr Sample Ip Addresses

    Prestige 660H/HW Series User’s Guide Table 85 Menu 11.3 Remote Node Network Layer Options (continued) FIELD DESCRIPTION Address When Full Feature is selected in the NAT field, configure address mapping sets in Mapping Set menu 15.1. Select one of the NAT server sets (2-10) in menu 15.2 (see on page 268 When SUA Only is selected in the NAT field, the SMT uses NAT server set 1 in menu 15.2 (see...
  • Page 257: Remote Node Filter

    Figure 141 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection 26.4 Remote Node Filter Move the cursor to the Edit Filter Sets field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to display Menu 11.5 – Remote Node Filter. Use Menu 11.5 –...
  • Page 258: Editing Atm Layer Options

    Prestige 660H/HW Series User’s Guide Figure 143 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) 26.5 Editing ATM Layer Options Follow the steps shown next to edit Menu 11.6 – Remote Node ATM Layer Options. In menu 11.1, move the cursor to the Edit ATM Options field and then press [SPACE BAR] to select Yes.
  • Page 259: Advance Setup Options

    Figure 145 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation Menu 11.6 - Remote Node ATM Layer Options VPI/VCI (LLC-Multiplexing or PPP-Encapsulation) ENTER here to CONFIRM or ESC to CANCEL: In this case, only one set of VPI and VCI numbers need be specified for all protocols. The valid range for the VPI is 0 to 255 and for the VCI is 32 to 65535 (1 to 31 is reserved for local management of ATM traffic).
  • Page 260: Figure 147 Menu 11.8 Advance Setup Options

    Prestige 660H/HW Series User’s Guide Figure 147 Menu 11.8 Advance Setup Options The following table describes the fields in this menu. Table 86 Menu 11.8 Advance Setup Options FIELD PPPoE pass-through When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: Menu 11.8 - Advance Setup Options PPPoE pass-through= No...
  • Page 261: Chapter 27 Static Route Setup

    This chapter shows how to setup IP static routes. 27.1 IP Static Route Overview Static routes tell the Prestige routing information that it cannot learn automatically through other means. This can arise in cases where RIP is disabled on the LAN or a remote network is beyond the one that is directly connected to a remote node.
  • Page 262: Figure 149 Menu 12 Static Route Setup

    Prestige 660H/HW Series User’s Guide Figure 149 Menu 12 Static Route Setup From menu 12, select 1 to open Menu 12.1 — IP Static Route Setup (shown next). Figure 150 Menu 12.1 IP Static Route Setup Now, type the route number of a static route you want to configure. Figure 151 Menu12.1.1 Edit IP Static Route Menu 12.1.1 - Edit IP Static Route Press ENTER to Confirm or ESC to Cancel:...
  • Page 263: Table 87 Menu12.1.1 Edit Ip Static Route

    The following table describes the fields for Menu 12.1.1 – Edit IP Static Route Setup. Table 87 Menu12.1.1 Edit IP Static Route FIELD Route # Route Name Active Destination IP Address IP Subnet Mask Gateway IP Address Metric Private When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: Chapter 27 Static Route Setup Prestige 660H/HW Series User’s Guide...
  • Page 264 Prestige 660H/HW Series User’s Guide Chapter 27 Static Route Setup...
  • Page 265: Chapter 28 Bridging Setup

    This chapter shows you how to configure the bridging parameters of your Prestige. 28.1 Bridging in General Bridging bases the forwarding decision on the MAC (Media Access Control), or hardware address, while routing does it on the network layer (IP) address. Bridging allows the Prestige to transport packets of network layer protocols that it does not route, for example, SNA, from one network to another.
  • Page 266: Figure 152 Menu 11.1 Remote Node Profile

    Prestige 660H/HW Series User’s Guide Figure 152 Menu 11.1 Remote Node Profile Rem Node Name= ? Active= Yes Encapsulation= ENET ENCAP Multiplexing= VC-based Service Name= N/A Incoming: Rem Login= N/A Rem Password= N/A Outgoing: My Login= N/A My Password= N/A Authen= N/A Press ENTER to Confirm or ESC to Cancel: 3 Move the cursor to the Edit IP/Bridge field, then press [SPACE BAR] to set the value to...
  • Page 267: Bridge Static Route Setup

    28.2.2 Bridge Static Route Setup Similar to network layer static routes, a bridging static route tells the Prestige the route to a node before a connection is established. You configure bridge static routes in menu 12.3.1 (go to menu 12, choose option 3, then choose a static route to edit) as shown next. Figure 154 Menu 12.3.1 Edit Bridge Static Route Menu 12.3.1 - Edit Bridge Static Route Route #: 1...
  • Page 268 Prestige 660H/HW Series User’s Guide Chapter 28 Bridging Setup...
  • Page 269: Network Address Translation (Nat)

    Network Address Translation This chapter discusses how to configure NAT on the Prestige. 29.1 Using NAT You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the Prestige. 29.1.1 SUA (Single User Account) Versus NAT SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server.
  • Page 270: Figure 155 Menu 4 Applying Nat For Internet Access

    Prestige 660H/HW Series User’s Guide Figure 155 Menu 4 Applying NAT for Internet Access Menu 4 - Internet Access Setup Press ENTER to Confirm or ESC to Cancel: The following figure shows how you apply NAT to the remote node in menu 11.1. 1 Enter 11 from the main menu.
  • Page 271: Nat Setup

    Table 90 Applying NAT in Menus 4 & 11.3 FIELD DESCRIPTION Press [SPACE BAR] and then [ENTER] to select Full Feature if you have multiple public WAN IP addresses for your Prestige. The SMT uses the address mapping set that you configure and enter in the Address Mapping Set field Select None to disable NAT.
  • Page 272: Sua Address Mapping Set

    Prestige 660H/HW Series User’s Guide Figure 158 Menu 15.1 Address Mapping Sets Menu 15.1 - Address Mapping Sets Enter Menu Selection Number: 29.3.1.1 SUA Address Mapping Set Enter 255 to display the next screen (see also menu cannot be changed. Figure 159 Menu 15.1.255 SUA Address Mapping Rules Menu 15.1.255 - Address Mapping Rules Set Name=...
  • Page 273: User-Defined Address Mapping Sets

    Table 91 SUA Address Mapping Rules (continued) FIELD DESCRIPTION Local End IP Local End IP is the ending local IP address (ILA). If the rule is for all local IPs, then the Start IP is 0.0.0.0 and the End IP is 255.255.255.255. Global Start IP This is the starting global IP address (IGA).
  • Page 274: Ordering Your Rules

    Prestige 660H/HW Series User’s Guide 29.3.1.3 Ordering Your Rules Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules.
  • Page 275: Configuring A Server Behind Nat

    The following table explains the fields in this menu. Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set Table 93 FIELD DESCRIPTION Type Press [SPACE BAR] and then [ENTER] to select from a total of five types. These are the mapping types discussed in multiple servers of different types behind NAT to this computer.
  • Page 276: General Nat Examples

    Prestige 660H/HW Series User’s Guide Figure 163 Menu 15.2.1 NAT Server Setup Menu 15.2 - NAT Server Setup Rule Start Port No. --------------------------------------------------- Default Press ENTER to Confirm or ESC to Cancel: 4 Enter a port number in an unused Start Port No field. To forward only one port, enter it again in the End Port No field.
  • Page 277: Example 1: Internet Access Only

    29.5.1 Example 1: Internet Access Only In the following Internet access example, you only need one rule where your ILAs (Inside Local addresses) all map to one dynamic IGA (Inside Global Address) assigned by your ISP. Figure 165 NAT Example 1 Figure 166 Menu 4 Internet Access &...
  • Page 278: Example 3: Multiple Public Ip Addresses With Inside Servers

    Prestige 660H/HW Series User’s Guide Figure 167 NAT Example 2 In this case, you do exactly as above (use the convenient pre-configured SUA Only set) and also go to menu 15.2 to specify the Inside Server behind the NAT as shown in the next figure. Figure 168 Menu 15.2.1 Specifying an Inside Server Menu 15.2.1 - NAT Server Setup (Used for SUA Only) Rule...
  • Page 279: Figure 169 Nat Example 3

    Map the other outgoing LAN traffic to IGA3 (Many : 1 mapping). You also map your third IGA to the web server and mail server on the LAN. Type Server allows you to specify multiple servers, of different types, to other computers behind NAT on the LAN.
  • Page 280: Figure 170 Example 3: Menu 11.3

    Prestige 660H/HW Series User’s Guide Figure 170 Example 3: Menu 11.3 Menu 11.3 - Remote Node Network Layer Options IP Options: IP Address Assignment= Static Rem IP Addr: 0.0.0.0 Rem Subnet Mask= 0.0.0.0 My WAN Addr= 0.0.0.0 NAT= Full Feature Address Mapping Set= 2 Metric= 2 Private= No...
  • Page 281: Figure 172 Example 3: Final Menu 15.1.1

    Figure 172 Example 3: Final Menu 15.1.1 Menu 15.1.1 - Address Mapping Rules Set Name= Example3 Local Start IP --------------- 1. 192.168.1.10 192.168.1.11 3. 0.0.0.0 Action= Edit Press ENTER to Confirm or ESC to Cancel: Now configure the IGA3 to map to our web server and mail server on the LAN. 1 Enter 15 from the main menu.
  • Page 282: Example 4: Nat Unfriendly Application Programs

    Prestige 660H/HW Series User’s Guide 29.5.4 Example 4: NAT Unfriendly Application Programs Some applications do not support NAT Mapping using TCP or UDP port address translation. In this case it is better to use Many-to-Many No Overload mapping as port numbers do not change for Many-to-Many No Overload (and One-to-One) NAT mapping types.
  • Page 283: Figure 176 Example 4: Menu 15.1.1 Address Mapping Rules

    Figure 176 Example 4: Menu 15.1.1 Address Mapping Rules Menu 15.1.1 - Address Mapping Rules Set Name= Example4 Local Start IP --------------- 192.168.1.10 NO OV Press ENTER to Confirm or ESC to Cancel: Chapter 29 Network Address Translation (NAT) Prestige 660H/HW Series User’s Guide Local End IP Global Start IP ------------...
  • Page 284 Prestige 660H/HW Series User’s Guide Chapter 29 Network Address Translation (NAT)
  • Page 285: Chapter 30 Enabling The Firewall

    This chapter shows you how to get started with the Prestige firewall. 30.1 Remote Management and the Firewall When SMT menu 24.11 is configured to allow management (see the firewall is enabled: • The firewall blocks remote management from the WAN unless you configure a firewall rule to allow it.
  • Page 286: Figure 177 Menu 21.2 Firewall Setup

    Prestige 660H/HW Series User’s Guide Figure 177 Menu 21.2 Firewall Setup Menu 21.2 - Firewall Setup The firewall protects against Denial of Service (DOS) attacks when it is active. The default Policy sets 1. allow all sessions originating from the LAN to the WAN and 2.
  • Page 287: Chapter 31 Filter Configuration

    This chapter shows you how to create and apply filters. 31.1 About Filtering Your Prestige uses filters to decide whether or not to allow passage of a data packet and/or to make a call. There are two types of filter applications: data filtering and call filtering. Filters are subdivided into device and protocol filters, which are discussed later.
  • Page 288: The Filter Structure Of The Prestige

    Prestige 660H/HW Series User’s Guide Figure 179 Filter Rule Process You can apply up to four filter sets to a particular port to block various types of packets. Because each filter set can have up to six rules, you can have a maximum of 24 rules active for a single port.
  • Page 289: Configuring A Filter Set For The Prestige

    31.2 Configuring a Filter Set for the Prestige To configure a filter set, follow the steps shown next. 1 Enter 21 in the main menu to display Menu 21 – Filter and Firewall Setup. 2 Enter 1 to display Menu 21.1 – Filter Set Configuration as shown next. Figure 180 Menu 21 Filter Set Configuration Menu 21.1 - Filter Set Configuration Filter...
  • Page 290: Filter Rules Summary Menus

    Prestige 660H/HW Series User’s Guide Figure 182 NetBIOS_LAN Filter Rules Summary Menu 21.1.3 - Filter Rules Summary # A Type - - ---- ------------------------------------------------------------ - - - 1 Y IP Pr=17, SA=0.0.0.0, SP=137, DA=0.0.0.0, DP=53 Enter Filter Rule Number (1-6) to Configure: Figure 183 IGMP Filter Rules Summary Menu 21.1.4 - Filter Rules Summary # A Type...
  • Page 291: Configuring A Filter Rule

    Table 94 Abbreviations Used in the Filter Rules Summary Menu (continued) FIELD DESCRIPTION Action Matched. “F” means to forward the packet immediately and skip checking the remaining rules. “D” means to drop the packet. “N“ means to check the next rule. Action Not Matched.
  • Page 292: Tcp/Ip Filter Rule

    Prestige 660H/HW Series User’s Guide 31.4.1 TCP/IP Filter Rule This section shows you how to configure a TCP/IP filter rule. TCP/IP rules allow you to base the rule on the fields in the IP and the upper layer protocol, for example, UDP and TCP headers.
  • Page 293 Table 96 Menu 21.1.x.1 TCP/IP Filter Rule (continued) FIELD DESCRIPTION Port # Type the destination port of the packets you want to filter. The field range is 0 to 65535. A 0 field is ignored. Port # Comp Select the comparison to apply to the destination port in the packet against the value given in Destination: Port #.
  • Page 294: Generic Filter Rule

    Prestige 660H/HW Series User’s Guide Figure 185 Executing an IP Filter 31.4.2 Generic Filter Rule This section shows you how to configure a generic filter rule. The purpose of generic rules is to allow you to filter non-IP packets. For IP, it is generally easier to use the IP rules directly. For generic rules, the Prestige treats a packet as a byte stream as opposed to an IP packet.
  • Page 295: Figure 186 Menu 21.1.5.1 Generic Filter Rule

    To configure a generic rule select an empty filter set in menu 21, for example 5. Select Generic Filter Rule in the Filter Type field and press [ENTER] to open Menu 21.1.5.1 – Generic Filter Rule, as shown in the following figure. Figure 186 Menu 21.1.5.1 Generic Filter Rule Menu 21.1.5.1 - Generic Filter Rule Filter #: 5,1...
  • Page 296: Filter Types And Nat

    Prestige 660H/HW Series User’s Guide Table 97 Menu 21.1.5.1 Generic Filter Rule (continued) FIELD DESCRIPTION Action Not Select the action for a packet not matching the rule. Choices are Check Next Rule, Matched Forward or Drop. When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 31.5 Filter Types and NAT There are two classes of filter rules, Generic Filter Device rules and Protocol Filter (TCP/IP)
  • Page 297: Figure 188 Sample Telnet Filter

    Figure 188 Sample Telnet Filter 1 Enter 1 in the menu 21 to display Menu 21.1 — Filter Set Configuration. 2 Enter the index number of the filter set you want to configure (in this case 6) 3 Type a descriptive name or comment in the Edit Comments field (for example, TELNET_WAN) and press [ENTER].
  • Page 298: Applying Filters And Factory Defaults

    Prestige 660H/HW Series User’s Guide 2 Go to the Edit Filter Sets field, press [SPACE BAR] to choose Yes and press [ENTER]. This brings you to menu 11.5. Apply the example filter set (for example, filter set 3) in this menu as shown in the next section.
  • Page 299: Ethernet Traffic

    31.7.1 Ethernet Traffic You seldom need to filter Ethernet traffic; however, the filter sets may be useful to block certain packets, reduce traffic and prevent security breaches. Go to menu 3.1 (shown next) and type the number(s) of the filter set(s) that you want to apply as appropriate. You can choose up to four filter sets (from twelve) by typing their numbers separated by commas, for example, 3, 4, 6, 11.
  • Page 300 Prestige 660H/HW Series User’s Guide Chapter 31 Filter Configuration...
  • Page 301: Chapter 32 Snmp Configuration

    This chapter explains SNMP Configuration menu 22. 32.1 About SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network.
  • Page 302: Supported Mibs

    Prestige 660H/HW Series User’s Guide The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include the number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.
  • Page 303: Snmp Traps

    Figure 194 Menu 22 SNMP Configuration Menu 22 - SNMP Configuration SNMP: Get Community= public Set Community= public Trusted Host= 0.0.0.0 Trap: Press ENTER to Confirm or ESC to Cancel: The following table describes the SNMP configuration parameters. Table 99 Menu 22 SNMP Configuration FIELD SNMP: Get Community...
  • Page 304: Table 101 Ports And Permanent Virtual Circuits

    Prestige 660H/HW Series User’s Guide Table 100 SNMP Traps (continued) TRAP # TRAP NAME authenticationFailure (defined in RFC-1215) whyReboot (defined in ZYXEL-MIB) A trap is sent with the reason of restart before For intentional reboot : The port number is its interface index under the interface group. Table 101 Ports and Permanent Virtual Circuits PORT PVC (PERMANENT VIRTUAL CIRCUIT)
  • Page 305: Chapter 33 System Security

    This chapter describes how to configure the system security on the Prestige. 33.1 System Security You can configure the system password.. 33.1.1 System Password Enter 23 in the main menu to display Menu 23 – System Security. You should change the default password. If you forget your password you have to restore the default configuration file.
  • Page 306: Figure 196 Menu 23.2 System Security: Radius Server

    Prestige 660H/HW Series User’s Guide Figure 196 Menu 23.2 System Security: RADIUS Server Menu 23.2 - System Security - RADIUS Server Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu. Table 102 Menu 23.2 System Security: RADIUS Server FIELD Authentication Server Active...
  • Page 307: Ieee802.1X

    33.1.3 IEEE802.1x The IEEE802.1x standards outline enhanced security methods for both the authentication of wireless stations and encryption key management. Follow the steps below to enable EAP authentication on your Prestige. 1 From the main menu, enter 23 to display Menu23 – System Security. Figure 197 Menu 23 System Security Menu 23 - System Security Enter Menu Selection Number:...
  • Page 308: Table 103 Menu 23.4 System Security : Ieee802.1X

    Prestige 660H/HW Series User’s Guide Table 103 Menu 23.4 System Security : IEEE802.1x FIELD DESCRIPTION Wireless Port Press [SPACE BAR] and select a security mode for the wireless LAN access. Control Select No Authentication Required to allow any wireless stations access to your wired network without entering usernames and passwords.
  • Page 309: Creating User Accounts On The Prestige

    Table 103 Menu 23.4 System Security : IEEE802.1x (continued) FIELD DESCRIPTION Authentication The authentication database contains wireless station login information. The local Databases user database is the built-in database on the Prestige. The RADIUS is an external server. Use this field to decide which database the Prestige should use (first) to authenticate a wireless station.
  • Page 310: Figure 199 Menu 14 Dial-In User Setup

    Prestige 660H/HW Series User’s Guide Figure 199 Menu 14 Dial-in User Setup 1. ________ 2. ________ 3. ________ 4. ________ 5. ________ 6. ________ 7. ________ 8. ________ 2 Type a number and press [ENTER] to edit the user profile. Figure 200 Menu 14.1 Edit Dial-in User Menu 14.1 - Edit Dial-in User Press ENTER to Confirm or ESC to Cancel:...
  • Page 311: System Information And Diagnosis

    System Information and This chapter covers the information and diagnostic tools in SMT menus 24.1 to 24.4. 34.1 Overview These tools include updates on system status, port status, log and trace capabilities and upgrades for the system software. This chapter describes how to use these tools in detail. Type 24 in the main menu to open Menu 24 –...
  • Page 312: Figure 202 Menu 24.1 System Maintenance : Status

    Prestige 660H/HW Series User’s Guide The following table describes the fields present in Menu 24.1 — System Maintenance — Status which are read-only and meant for diagnostic purposes. Figure 202 Menu 24.1 System Maintenance : Status Node-Lnk Status 1-ENET My WAN IP (from ISP): 0.0.0.0 Ethernet: Status: Collisions: 0...
  • Page 313: System Information

    Table 105 Menu 24.1 System Maintenance : Status (continued) FIELD DESCRIPTION This shows statistics for the WAN. Line Status This shows the current status of the xDSL line, which can be Up or Down. Upstream This shows the upstream transfer rate in kbps. Speed Downstream This shows the downstream transfer rate in kbps.
  • Page 314: Console Port Speed

    Menu 1 – General Setup. Refers to the routing protocol used. Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. ZyNOS is a registered trademark of ZyXEL Communications Corporation. Displays the vendor of the ADSL chipset and DSL version.
  • Page 315: Log And Trace

    Figure 205 Menu 24.2.2 System Maintenance : Change Console Port Speed Menu 24.2.2 – System Maintenance – Change Console Port Speed Press ENTER to Confirm or ESC to Cancel: Once you change the Prestige console port speed, you must also set the speed parameter for the communication software you are using to connect to the Prestige.
  • Page 316: Syslog And Accounting

    Prestige 660H/HW Series User’s Guide Figure 207 Sample Error and Information Messages 53 Sat Jan 01 00:00:03 2000 PP01 -WARN 54 Sat Jan 01 00:00:03 2000 PP01 55 Sat Jan 01 00:00:03 2000 PP01 56 Sat Jan 01 00:00:03 2000 PP20 57 Sat Jan 01 00:00:03 2000 PP21 58 Sat Jan 01 00:03:06 2000 PP19 59 Sat Jan 01 00:03:06 2000 PP01...
  • Page 317: Figure 209 Syslog Example

    Figure 209 Syslog Example 1 - CDR SdcmdSyslogSend ( SYSLOG_CDR, SYSLOG_INFO, String); String = board xx line xx channel xx, call xx, str board = the hardware board ID line = the WAN ID in a board Channel = channel ID within the WAN call = the call reference number which starts from 1 and increments by 1 for each new call str = C01 Outgoing Call dev xx ch xx (dev:device No.
  • Page 318: Diagnostic

    Prestige 660H/HW Series User’s Guide Figure 209 Syslog Example (continued) prot: Protocol (“TCP”, ”UDP”, ”ICMP”) spo: Source port dpo: Destination port Jul 19 14:43:55 192.168.102.2 ZYXEL: IP [Src=202.132.154.123 Dst=255.255.255.255 UDP spo=0208 dpo=0208]} S03>R01mF Jul 19 14:44:00 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP spo=05d4 dpo=0035]} S03>R01mF Jul 19 14:44:04 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP spo=05d4 dpo=0035]} S03>R01mF...
  • Page 319: Table 108 Menu 24.4 System Maintenance Menu: Diagnostic

    The following table describes the diagnostic tests available in menu 24.4 for and the connections. Table 108 Menu 24.4 System Maintenance Menu: Diagnostic FIELD DESCRIPTION Reset xDSL Re-initialize the xDSL link to the telephone company. Ping Host Ping the host to see if the links and TCP/IP protocol on both systems are working. Reboot System Reboot the Prestige.
  • Page 320 Prestige 660H/HW Series User’s Guide Chapter 34 System Information and Diagnosis...
  • Page 321: Firmware And Configuration File Maintenance

    Firmware and Configuration File This chapter tells you how to backup and restore your configuration file as well as upload new firmware and configuration files. 35.1 Filename Conventions The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password, DHCP Setup, TCP/IP Setup, etc.
  • Page 322: Backup Configuration

    Prestige 660H/HW Series User’s Guide The following table is a summary. Please note that the internal filename refers to the filename on the Prestige and the external filename refers to the filename not on the Prestige, that is, on your computer, local network or FTP site and so the name (but not the extension) may vary. After uploading new firmware, see the ZyNOS F/W Version field in Menu 24.2.1 –...
  • Page 323: Using The Ftp Command From The Command Line

    Figure 211 Telnet in Menu 24.5 Menu 24.5 - System Maintenance - Backup Configuration To transfer the configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your Prestige. Then type "root" and SMT password as requested.
  • Page 324: Gui-Based Ftp Clients

    Prestige 660H/HW Series User’s Guide Figure 212 FTP Session Example 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> get rom-0 zyxel.rom 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK ftp: 16384 bytes sent in 1.10Seconds 297.89Kbytes/sec.
  • Page 325: Backup Configuration Using Tftp

    35.2.6 Backup Configuration Using TFTP The Prestige supports the up/downloading of the firmware and the configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended. To use TFTP, your computer must have both telnet and TFTP clients. To backup the configuration file, follow the procedure shown next.
  • Page 326: Restore Configuration

    Prestige 660H/HW Series User’s Guide Table 111 General Commands for GUI-based TFTP Clients COMMAND DESCRIPTION Host Enter the IP address of the Prestige. 192.168.1.1 is the Prestige’s default IP address when shipped. Send/Fetch Use “Send” to upload the file to the Prestige and “Fetch” to back up the file on your computer.
  • Page 327: Restore Using Ftp Session Example

    Figure 213 Telnet into Menu 24.6 Menu 24.6 -- System Maintenance - Restore Configuration To transfer the firmware and configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your Prestige. Then type "root" and SMT password as requested.
  • Page 328: Uploading Firmware And Configuration Files

    Prestige 660H/HW Series User’s Guide 35.4 Uploading Firmware and Configuration Files This section shows you how to upload firmware and configuration files. You can upload configuration files by following the procedure in instructions in Menu 24.7.2 – System Maintenance – Upload System Configuration File. Note: Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE YOUR Prestige.
  • Page 329: Ftp File Upload Command From The Dos Prompt Example

    Figure 216 Telnet Into Menu 24.7.2 System Maintenance Menu 24.7.2 - System Maintenance - Upload System Configuration File To upload the system configuration file, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  • Page 330: Ftp Session Example Of Firmware File Upload

    Prestige 660H/HW Series User’s Guide 35.4.4 FTP Session Example of Firmware File Upload Figure 217 FTP Session Example of Firmware File Upload 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> put firmware.bin ras 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK...
  • Page 331: Tftp Upload Command Example

    35.4.6 TFTP Upload Command Example The following is an example TFTP command: tftp [-i] host put firmware.bin ras where “ ” specifies binary image transfer mode (use this mode when transferring binary files), “ ” is the Prestige’s IP address and “ host –...
  • Page 332 Prestige 660H/HW Series User’s Guide Chapter 35 Firmware and Configuration File Maintenance...
  • Page 333: Chapter 36 System Maintenance

    System Maintenance. A list of valid commands can be found by typing help or ? at the command prompt. Type “ Figure 218 Command Mode in Menu 24 Enter Menu Selection Number: Figure 219 Valid Commands Copyright (c) 1994 - 2004 ZyXEL Communications Corp. ras> ? Valid commands are: exit wlan radius ras>...
  • Page 334: Call Control Support

    Prestige 660H/HW Series User’s Guide 36.2 Call Control Support Call Control Support is only applicable when Encapsulation is set to PPPoE in menu 4 or menu 11.1. The budget management function allows you to set a limit on the total outgoing call time of the Prestige within certain times.
  • Page 335: Time And Date Setting

    The total budget is the time limit on the accumulated time for outgoing calls to a remote node. When this limit is reached, the call will be dropped and further outgoing calls to that remote node will be blocked. After each period, the total budget is reset. The default for the total budget is 0 minutes and the period is 0 hours, meaning no budget control.
  • Page 336: Resetting The Time

    Prestige 660H/HW Series User’s Guide Figure 223 Menu 24.10 System Maintenance: Time and Date Setting Menu 24.10 - System Maintenance - Time and Date Setting Use Time Server when Bootup= None Time Server Address= N/A Current Time: New Time (hh:mm:ss): Current Date: New Date (yyyy-mm-dd): Time Zone= GMT...
  • Page 337 Prestige 660H/HW Series User’s Guide • 24-hour intervals after starting. Chapter 36 System Maintenance...
  • Page 338 Prestige 660H/HW Series User’s Guide Chapter 36 System Maintenance...
  • Page 339: Chapter 37 Remote Management

    This chapter covers remote management (SMT menu 24.11). 37.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which Prestige interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
  • Page 340: Remote Management Limitations

    Prestige 660H/HW Series User’s Guide Figure 224 Menu 24.11 Remote Management Control Menu 24.11 - Remote Management Control TELNET Server: Server Port = 23 Secured Client IP = 0.0.0.0 FTP Server: Server Port = 21 Secured Client IP = 0.0.0.0 Web Server: Server Port = 80 Secured Client IP = 0.0.0.0...
  • Page 341: Remote Management And Nat

    37.3 Remote Management and NAT When NAT is enabled: • Use the Prestige’s WAN IP address when configuring from the WAN. • Use the Prestige’s LAN IP address when configuring from the LAN. 37.4 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The Prestige automatically logs you out if the management session remains idle for longer than this timeout period.
  • Page 342 Prestige 660H/HW Series User’s Guide Chapter 37 Remote Management...
  • Page 343: Chapter 38 Ip Policy Routing

    This chapter covers setting and applying policies used for IP routing. 38.1 IP Policy Routing Overview Traditionally, routing is based on the destination address only and the IAD takes the shortest path to forward a packet. IP Routing Policy (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
  • Page 344: Ip Routing Policy Setup

    Prestige 660H/HW Series User’s Guide • routing the packet to a different gateway (and hence the outgoing interface). • setting the TOS and precedence fields in the IP header. IPPR follows the existing packet filtering facility of RAS in style and in implementation. The policies are divided into sets, where related policies are grouped together.
  • Page 345: Figure 226 Menu 25.1 Ip Routing Policy Setup

    Figure 226 Menu 25.1 IP Routing Policy Setup Menu 25.1 - IP Routing Policy Setup - - ---------------------------------------------------------------------- 1 Y SA=1.1.1.1-1.1.1.1,DA=2.2.2.2-2.2.2.5 SP=20-25,DP=20-25,P=6,T=NM,PR=0 2 N ______________________________________________________________________ ______________________________________________________________________ 3 N ______________________________________________________________________ ______________________________________________________________________ 4 N ______________________________________________________________________ ______________________________________________________________________ 5 N ______________________________________________________________________ ______________________________________________________________________ 6 N ______________________________________________________________________ ______________________________________________________________________ Enter Policy Rule Number (1-6) to Configure: Table 115 Menu 25.1 IP Routing Policy Setup...
  • Page 346: Figure 227 Menu 25.1.1 Ip Routing Policy

    Prestige 660H/HW Series User’s Guide Figure 227 Menu 25.1.1 IP Routing Policy Menu 25.1.1 - IP Routing Policy Policy Set Name= test Active= No Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 0.0.0.0 port start= N/A Destination: addr start= 0.0.0.0 port start= N/A...
  • Page 347: Applying An Ip Policy

    Table 116 Menu 25.1.1 IP Routing Policy (continued) FIELD Gateway addr Type of Service Precedence When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 38.5 Applying an IP Policy This section shows you where to apply the IP policies after you design them. 38.5.1 Ethernet IP Policies From Menu 3 —...
  • Page 348: Ip Policy Routing Example

    Prestige 660H/HW Series User’s Guide Figure 228 Menu 3.2 TCP/IP and DHCP Ethernet Setup Menu 3.2 - TCP/IP and DHCP Setup Press ENTER to Confirm or ESC to Cancel: Go to menu 11.3 (shown next) and type the number(s) of the IP Routing Policy set(s) as appropriate.
  • Page 349: Figure 230 Example Of Ip Policy Routing

    Route 1 represents the default IP route and route 2 represents the configured IP route. Figure 230 Example of IP Policy Routing To force packets coming from clients with IP addresses of 192.168.1.33 to 192.168.1.64 to be routed to the Internet via the WAN port of the Prestige, follow the steps as shown next. 1 Create a routing policy set in menu 25.
  • Page 350: Figure 231 Ip Routing Policy Example

    Prestige 660H/HW Series User’s Guide Figure 231 IP Routing Policy Example Policy Set Name= set1 Active= Yes Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 192.168.1.2 port start= 0 Destination: addr start= 0.0.0.0 port start= 80 Action= Matched Gateway addr Type of Service= No Change...
  • Page 351: Figure 232 Ip Routing Policy Example

    Figure 232 IP Routing Policy Example Menu 25.1.1 - IP Routing Policy Policy Set Name= set2 Active= Yes Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 0.0.0.0 port start= 0 Destination: addr start= 0.0.0.0 port start= 20 Action= Matched Gateway addr =192.168.1.100 Type of Service= No Change...
  • Page 352 Prestige 660H/HW Series User’s Guide Chapter 38 IP Policy Routing...
  • Page 353: Chapter 39 Call Scheduling

    Call scheduling (applicable for PPPoA or PPPoE encapsulation only) allows you to dictate when a remote node should be called and for how long. 39.1 Introduction The call scheduling feature allows the Prestige to manage a remote node and dictate when a remote node should be called and for how long.
  • Page 354: Figure 235 Menu 26.1 Schedule Set Setup

    Prestige 660H/HW Series User’s Guide To setup a schedule set, select the schedule set you want to setup from menu 26 (1-12) and press [ENTER] to see Menu 26.1 — Schedule Set Setup as shown next. Figure 235 Menu 26.1 Schedule Set Setup Menu 26.1 Schedule Set Setup Press ENTER to Confirm or ESC to Cancel: If a connection has been already established, your Prestige will not drop it.
  • Page 355: Figure 236 Applying Schedule Set(S) To A Remote Node (Pppoe)

    Table 117 Menu 26.1 Schedule Set Setup (continued) FIELD DESCRIPTION Action Forced On means that the connection is maintained whether or not there is a demand call on the line and will persist for the time period specified in the Duration field. Forced Down means that the connection is blocked whether or not there is a demand call on the line.
  • Page 356 Prestige 660H/HW Series User’s Guide Chapter 39 Call Scheduling...
  • Page 357: Chapter 40 Internal Sptgen

    40.1 Internal SPTGEN Overview Internal SPTGEN (System Parameter Table Generator) is a configuration text file useful for efficient configuration of multiple Prestiges. Internal SPTGEN lets you configure, save and upload multiple menus at the same time using just one configuration text file – eliminating the need to navigate and configure individual SMT menus for each Prestige.
  • Page 358: Internal Sptgen File Modification - Important Points To Remember

    Prestige 660H/HW Series User’s Guide 40.2.1 Internal SPTGEN File Modification - Important Points to Remember Each parameter you enter must be preceded by one “=”sign and one space. Some parameters are dependent on others. For example, if you disable the Configured field in menu 1 (seeFigure 237 on page If you enter a parameter that is invalid in the Input column, the Prestige will not save the...
  • Page 359: Internal Sptgen Ftp Upload Example

    Figure 240 Internal SPTGEN FTP Download Example c:\ftp 192.168.1.1 220 PPP FTP version 1.0 ready at Sat Jan 1 03:22:12 2000 User (192.168.1.1:(none)): 331 Enter PASS command Password: 230 Logged in ftp>bin 200 Type I OK ftp> get rom-t ftp>bye c:\edit rom-t (edit the rom-t text file by a text editor and save it) Note: You can rename your “...
  • Page 360 Prestige 660H/HW Series User’s Guide Chapter 40 Internal SPTGEN...
  • Page 361: Chapter 41 Troubleshooting

    This chapter covers potential problems and the corresponding remedies. 41.1 Problems Starting Up the Prestige Table 118 Troubleshooting the Start-Up of Your Prestige PROBLEM CORRECTIVE ACTION None of the Make sure that the Prestige’s power adaptor is connected to the Prestige and plugged LEDs turn on in to an appropriate power source.
  • Page 362: Problems With The Dsl Led

    Prestige 660H/HW Series User’s Guide 41.3 Problems with the DSL LED Table 120 Troubleshooting the DSL LED PROBLEM CORRECTIVE ACTION The DSL LED is Check the telephone wire and connections between the Prestige DSL port and the off. wall jack. Make sure that the telephone company has checked your phone line and set it up for DSL service.
  • Page 363: Problems With Internet Access

    41.6 Problems with Internet Access Table 123 Troubleshooting Internet Access PROBLEM CORRECTIVE ACTION I cannot access Make sure the Prestige is turned on and connected to the network. the Internet. If the DSL LED is off, refer to Verify your WAN settings. Refer to the chapter on WAN setup (web configurator) or the section on Internet Access (SMT).
  • Page 364: Problems With The Web Configurator

    Prestige 660H/HW Series User’s Guide 41.8 Problems with the Web Configurator Table 125 Troubleshooting the Web Configurator PROBLEM CORRECTIVE ACTION I cannot access Refer to the Quick Start Guide for hardware connections. the web Make sure that there is not an SMT console session running. configurator.
  • Page 365: Splitters And Microfilters

    Splitters and Microfilters This appendix tells you how to install a POTS splitter or a telephone microfilter. Connecting a POTS Splitter When you use the Full Rate (G.dmt) ADSL standard, you can use a POTS (Plain Old Telephone Service) splitter to separate the telephone and ADSL signals. This allows simultaneous Internet access and telephone service on the same line.
  • Page 366: Telephone Microfilters

    Prestige 660H/HW Series User’s Guide Telephone Microfilters Telephone voice transmissions take place in the lower frequency range, 0 - 4KHz, while ADSL transmissions take place in the higher bandwidth range, above 4KHz. A microfilter acts as a low-pass filter, for your telephone, to ensure that ADSL transmissions do not interfere with your telephone voice transmissions.
  • Page 367: Figure 244 Prestige With Isdn

    Prestige 660H/HW Series User’s Guide Figure 244 Prestige with ISDN Splitters and Microfilters...
  • Page 368 Prestige 660H/HW Series User’s Guide Splitters and Microfilters...
  • Page 369: Setting Up Your Computer's Ip Address

    Prestige 660H/HW Series User’s Guide P P E N D I X Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
  • Page 370: Installing Components

    Prestige 660H/HW Series User’s Guide Figure 245 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 371: Configuring

    3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
  • Page 372: Verifying Settings

    Prestige 660H/HW Series User’s Guide Figure 247 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • • 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your Prestige and restart your computer when prompted.
  • Page 373: Figure 248 Windows Xp: Start Menu

    Figure 248 Windows XP: Start Menu 2 For Windows XP, click Network Connections. For Windows 2000/NT, click Network and Dial-up Connections. Figure 249 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Splitters and Microfilters Prestige 660H/HW Series User’s Guide...
  • Page 374: Figure 250 Windows Xp: Control Panel: Network Connections: Properties

    Prestige 660H/HW Series User’s Guide Figure 250 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. Figure 251 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 375: Figure 252 Windows Xp: Advanced Tcp/Ip Settings

    • Figure 252 Windows XP: Advanced TCP/IP Settings 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 376: Verifying Settings

    Prestige 660H/HW Series User’s Guide • • Figure 253 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window. 10Turn on your Prestige and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
  • Page 377: Figure 254 Macintosh Os 8/9: Apple Menu

    Figure 254 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 255 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. Splitters and Microfilters Prestige 660H/HW Series User’s Guide...
  • Page 378: Verifying Settings

    Prestige 660H/HW Series User’s Guide 4 For statically assigned settings, do the following: • • • • 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration. 7 Turn on your Prestige and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the TCP/IP Control Panel window.
  • Page 379: Verifying Settings

    Figure 257 Macintosh OS X: Network 4 For statically assigned settings, do the following: • • • • 5 Click Apply Now and close the window. 6 Turn on your Prestige and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window. Splitters and Microfilters Prestige 660H/HW Series User’s Guide From the Configure box, select Manually.
  • Page 380 Prestige 660H/HW Series User’s Guide Splitters and Microfilters...
  • Page 381: Appendix Cip Subnetting

    IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
  • Page 382: Subnet Masks

    Prestige 660H/HW Series User’s Guide Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a value of 0 to 127. Similarly the first octet of a class “B” must begin with “10”, therefore the first octet of a class “B”...
  • Page 383: Example: Two Subnets

    Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/”...
  • Page 384: Table 132 Subnet 1

    Prestige 660H/HW Series User’s Guide Note: In the following charts, shaded/bolded last octet bit values indicate host ID bits “borrowed” to form network ID bits. The number of “borrowed” host ID bits determines the number of subnets you can have. The remaining number of host ID bits (after “borrowing”) determines the number of hosts you can have on each subnet.
  • Page 385: Example: Four Subnets

    Example: Four Subnets The above example illustrated using a 25-bit subnet mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00, 01, 10 and 11. The subnet mask is 26 bits (11111111.11111111.11111111.11000000) or 255.255.255.192.
  • Page 386: Example Eight Subnets

    Prestige 660H/HW Series User’s Guide Table 137 Subnet 4 IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.192 Broadcast Address: 192.168.1.255 Example Eight Subnets Similarly use a 27-bit mask to create 8 subnets (001, 010, 011, 100, 101, 110). The following table shows class C IP address last octet values for each subnet.
  • Page 387: Subnetting With Class A And Class B Networks

    Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets available for subnetting and a class “A” address has three host ID octets (Table 127 on page The following table is a summary for class “B”...
  • Page 388 Prestige 660H/HW Series User’s Guide Splitters and Microfilters...
  • Page 389: Pppoe

    PPPoE in Action An ADSL modem bridges a PPP session over Ethernet (PPP over Ethernet, RFC 2516) from your computer to an ATM PVC (Permanent Virtual Circuit) which connects to a DSL Access Concentrator where the PPP session terminates support any number of PPP sessions from your LAN. PPPoE provides access control and billing functionality in a manner similar to dial-up services using PPP.
  • Page 390: How Pppoe Works

    Prestige 660H/HW Series User’s Guide Figure 258 Single-Computer per Router Hardware Configuration How PPPoE Works The PPPoE driver makes the Ethernet appear as a serial link to the computer and the computer runs PPP over it, while the modem bridges the Ethernet frames to the Access Concentrator (AC).
  • Page 391: Virtual Circuit Topology

    ATM is a connection-oriented technology, meaning that it sets up virtual circuits over which end systems communicate. The terminology for virtual circuits is as follows: • Virtual Channel Logical connections between ATM switches • Virtual Path A bundle of virtual channels •...
  • Page 392 Prestige 660H/HW Series User’s Guide Splitters and Microfilters...
  • Page 393: Appendix F Wireless Lans

    Prestige 660H/HW Series User’s Guide P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C).
  • Page 394: Ess

    Prestige 660H/HW Series User’s Guide Figure 262 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
  • Page 395: Channel

    Figure 263 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
  • Page 396: Fragmentation Threshold

    Prestige 660H/HW Series User’s Guide Figure 264 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 397: Preamble Type

    A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
  • Page 398: Ieee 802.1X

    Prestige 660H/HW Series User’s Guide IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: •...
  • Page 399: Eap Authentication

    • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access- Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: •...
  • Page 400: Types Of Authentication

    Prestige 660H/HW Series User’s Guide 3 The wireless station replies with identity information, including username and password. The RADIUS server checks the user information against its user profile database and determines whether or not to authenticate the wireless station. Types of Authentication This appendix discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP- TTLS, PEAP and LEAP.
  • Page 401: Peap (Protected Eap)

    Prestige 660H/HW Series User’s Guide PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secured connection to authenticate the clients, thus hiding client identity. However, PEAP only supports EAP methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card), for client authentication.
  • Page 402: Dynamic Wep Key Exchange

    Prestige 660H/HW Series User’s Guide Shared key authentication involves a four-message procedure. A wireless station sends a shared key authentication request to the AP, which will then reply with a challenge text message. The wireless station must then use the AP’s default WEP key to encrypt the challenge text and return it to the AP, which attempts to decrypt the message using the AP’s default WEP key.
  • Page 403: Wpa

    Prestige 660H/HW Series User’s Guide User Authentication WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless stations using an external RADIUS database. Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP) or Advanced Encryption Standard (AES), Message Integrity Check (MIC) and IEEE 802.1x. TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server.
  • Page 404: Security Parameters Summary

    Prestige 660H/HW Series User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 143 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY...
  • Page 405: Requirements For Roaming

    Figure 267 Roaming Example The steps below describe the roaming process. 1 As wireless station Y moves from the coverage area of access point P1 to that of access point 2 P2, it scans and uses the signal of access point P2. 3 Access point P2 acknowledges the presence of wireless station Y and relays this information to access point P1 through the wired LAN.
  • Page 406 Prestige 660H/HW Series User’s Guide Splitters and Microfilters...
  • Page 407: Antenna Selection And Positioning Recommendation

    Antenna Selection and Positioning An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Choosing the right antennas and positioning them properly increases the range and coverage area of a wireless LAN.
  • Page 408: Types Of Antennas For Wlan

    Prestige 660H/HW Series User’s Guide Types of Antennas For WLAN There are two types of antennas used for wireless LAN applications. • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment.
  • Page 409: Example Internal Sptgen Screens

    Example Internal SPTGEN Screens This appendix covers Prestige Internal SPTGEN screens. Table 144 Abbreviations Used in the Example Internal SPTGEN Screens Table ABBREVIATION MEANING Field Identification Number (not seen in SMT screens) Field Name Parameter Values Allowed INPUT An example of what you may enter Applies to the Prestige.
  • Page 410 Prestige 660H/HW Series User’s Guide Table 146 Menu 3 (SMT Menu 1) 30100007 = Input device filters Set 3 30100008 = Input device filters Set 4 30100009 = Output protocol filters Set 1 30100010 = Output protocol filters Set 2 30100011 = Output protocol filters Set 3 30100012 =...
  • Page 411 Table 146 Menu 3 (SMT Menu 1) 30201003 = IP Subnet Mask 30201004 = RIP Direction 30201005 = Version 30201006 = IP Alias #1 Incoming protocol filters Set 1 30201007 = IP Alias #1 Incoming protocol filters Set 2 30201008 = IP Alias #1 Incoming protocol filters Set 3 30201009 =...
  • Page 412 Prestige 660H/HW Series User’s Guide Table 146 Menu 3 (SMT Menu 1) 30201025 = IP Alias #2 Outgoing protocol filters Set 3 30201026 = IP Alias #2 Outgoing protocol filters Set 4 */ Menu 3.5 Wireless LAN Setup (SMT Menu 3.5) 30500001 = ESSID 30500002 =...
  • Page 413 Table 147 Menu 4 Internet Access Setup (SMT Menu 4) / Menu 4 Internet Access Setup (SMT Menu 4) 40000000 = Configured 40000001 = 40000002 = Active 40000003 = ISP's Name 40000004 = Encapsulation 40000005 = Multiplexing 40000006 = VPI # 40000007 = VCI # 40000008 =...
  • Page 414: Table 147 Menu 4 Internet Access Setup (Smt Menu 4)

    Prestige 660H/HW Series User’s Guide Table 147 Menu 4 Internet Access Setup (SMT Menu 4) 40000027 = ATM QoS Type 40000028 = Peak Cell Rate (PCR) 40000029 = Sustain Cell Rate (SCR) 40000030 = Maximum Burst Size(MBS) 40000031= RIP Direction 40000032= RIP Version 40000033=...
  • Page 415 Table 148 Menu 12(SMT Menu 12) (continued) 120103002 = IP Static Route set #3, Active 120103003 = IP Static Route set #3, Destination IP address 120103004 = IP Static Route set #3, Destination IP subnetmask 120103005 = IP Static Route set #3, Gateway 120103006 = IP Static Route set #3, Metric 120103007 =...
  • Page 416 Prestige 660H/HW Series User’s Guide Table 148 Menu 12(SMT Menu 12) (continued) 120107001 = IP Static Route set #7, Name 120107002 = IP Static Route set #7, Active 120107003 = IP Static Route set #7, Destination IP address 120107004 = IP Static Route set #7, Destination IP subnetmask 120107005 =...
  • Page 417 Table 148 Menu 12(SMT Menu 12) (continued) 120110007 = IP Static Route set #10, Private */ Menu 12.1.11 IP Static Route Setup (SMT Menu 12.1.11) 120111001 = IP Static Route set #11, Name 120111002 = IP Static Route set #11, Active 120111003 = IP Static Route set #11, Destination IP address...
  • Page 418 Prestige 660H/HW Series User’s Guide Table 148 Menu 12(SMT Menu 12) (continued) 120114004 = IP Static Route set #14, Destination IP subnetmask 120114005 = IP Static Route set #14, Gateway 120114006 = IP Static Route set #14, Metric 120114007 = IP Static Route set #14, Private */ Menu 12.1.15 IP Static Route Setup (SMT Menu 12.1.
  • Page 419: Table 149 Menu 15 Sua Server Setup (Smt Menu 15)

    Table 149 Menu 15 SUA Server Setup (SMT Menu 15) (continued) 150000007 = SUA Server #3 Active 150000008 = SUA Server #3 Protocol 150000009 = SUA Server #3 Port Start 150000010 = SUA Server #3 Port End 150000011 = SUA Server #3 Local IP address 150000012 = SUA Server #4 Active 150000013 =...
  • Page 420: Table 150 Menu 21.1 Filter Set #1 (Smt Menu 21.1)

    Prestige 660H/HW Series User’s Guide Table 149 Menu 15 SUA Server Setup (SMT Menu 15) (continued) 150000041 = SUA Server #9 Local IP address 150000042 = SUA Server #10 Active 150000043 = SUA Server #10 Protocol 150000044 = SUA Server #10 Port Start 150000045 = SUA Server #10 Port End 150000046 =...
  • Page 421 Table 150 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210101011 = IP Filter Set 1,Rule 1 Src Port Comp 210101013 = IP Filter Set 1,Rule 1 Act Match 210101014 = IP Filter Set 1,Rule 1 Act Not Match / Menu 21.1.1.2 set #1, rule #2 (SMT Menu 21.1.1.2) 210102001 = IP Filter Set 1,Rule 2 Type...
  • Page 422 Prestige 660H/HW Series User’s Guide Table 150 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210103007 = IP Filter Set 1,Rule 3 Dest Port Comp 210103008 = IP Filter Set 1,Rule 3 Src IP address 210103009 = IP Filter Set 1,Rule 3 Src Subnet Mask 210103010 = IP Filter Set 1,Rule 3 Src Port 210103011 =...
  • Page 423 Table 150 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210105002 = IP Filter Set 1,Rule 5 Active 210105003 = IP Filter Set 1,Rule 5 Protocol 210105004 = IP Filter Set 1,Rule 5 Dest IP address 210105005 = IP Filter Set 1,Rule 5 Dest Subnet Mask 210105006 = IP Filter Set 1,Rule 5 Dest Port 210105007 =...
  • Page 424: Table 151 Menu 21.1 Filer Set #2, (Smt Menu 21.1)

    Prestige 660H/HW Series User’s Guide Table 150 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210106013 = IP Filter Set 1,Rule 6 Act Match 210106014 = IP Filter Set 1,Rule 6 Act Not Match Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) / Menu 21.1 filter set #2, 210200001 = Filter Set 2, Nam...
  • Page 425 Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210202001 = IP Filter Set 2, Rule 2 Type 210202002 = IP Filter Set 2, Rule 2 Active 210202003 = IP Filter Set 2, Rule 2 Protocol 210202004 = IP Filter Set 2, Rule 2 Dest IP address 210202005 =...
  • Page 426 Prestige 660H/HW Series User’s Guide Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210203011 = IP Filter Set 2, Rule 3 Src Port Comp 210203013 = IP Filter Set 2, Rule 3 Act Match 210203014 = IP Filter Set 2,Rule 3 Act Not Match / Menu 21.1.2.4 Filter set #2, rule #4 (SMT Menu 21.1.2.4) 210204001 =...
  • Page 427 Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210205004 = IP Filter Set 2, Rule 5 Dest IP address 210205005 = IP Filter Set 2, Rule 5 Dest Subnet Mask 210205006 = IP Filter Set 2, Rule 5 Dest Port 210205007 = IP Filter Set 2, Rule 5 Dest Port Comp...
  • Page 428 Prestige 660H/HW Series User’s Guide Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210206013 = IP Filter Set 2,Rule 6 Act Match 210206014 = IP Filter Set 2,Rule 6 Act Not Match */ Menu 23.1 System Password Setup (SMT Menu 23.1) 230000000 = System Password */ Menu 23.2 System security: radius server (SMT Menu 23.2)
  • Page 429: Command Examples

    Table 151 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 241100005 = FTP Server Access 241100006 = FTP Server Secured IP address 241100007 = WEB Server Port 241100008 = WEB Server Access 241100009 = WEB Server Secured IP address Command Examples The following are example Internal SPTGEN screens associated with the Prestige’s command interpreter commands.
  • Page 430 Prestige 660H/HW Series User’s Guide...
  • Page 431: Appendix I Command Interpreter

    The following describes how to use the command interpreter. Enter 24 in the main menu to bring up the system maintenance menu. Enter 8 to go to Menu 24.8 - Command Interpreter Mode. See the included disk or zyxel.com for more detailed information on these commands. Note: Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable.
  • Page 432 Prestige 660H/HW Series User’s Guide...
  • Page 433: Appendix J Firewall Commands

    Sys Firewall Commands The following describes the firewall commands. See on the command structure. Each of these commands must be preceded by when you use them. For example, type Table 153 Sys Firewall Command disp active <yes|no> disp clear pktdump dynamicrule display tcprst...
  • Page 434 Prestige 660H/HW Series User’s Guide...
  • Page 435: Brute-Force Password Guessing Protection

    Brute-Force Password Guessing The following describes the commands for enabling, disabling and configuring the brute-force password guessing protection mechanism for the password. See information on the command structure. Table 154 Brute-Force Password Guessing Protection Commands COMMAND DESCRIPTION sys pwderrtm This command displays the brute-force guessing password protection settings. sys pwderrtm 0 This command turns off the password’s protection from brute-force guessing.
  • Page 436 Prestige 660H/HW Series User’s Guide...
  • Page 437: Appendix L Boot Commands

    The BootModule AT commands execute from within the router’s bootup software, when debug mode is selected before the main router firmware is started. When you start up your Prestige, you are given a choice to go into debug mode by pressing a key at the prompt shown in the following screen.
  • Page 438: Figure 269 Boot Module Commands

    Prestige 660H/HW Series User’s Guide Figure 269 Boot Module Commands just answer OK ATHE print help ATBAx change baudrate. 1:38.4k, 2:19.2k, 3:9.6k 4:57.6k 5:115.2k ATENx,(y) set BootExtension Debug Flag (y=password) ATSE show the seed of password generator ATTI(h,m,s) change system time to hour:min:sec or show current time ATDA(y,m,d) change system date to year/month/day or show...
  • Page 439: Appendix M Log Descriptions

    This appendix provides descriptions of example log messages. Table 155 System Maintenance Logs LOG MESSAGE Time calibration is successful Time calibration failed WAN interface gets IP: %s DHCP client IP expired DHCP server assigns %s Successful SMT login SMT login failed Successful WEB login WEB login failed Successful TELNET login...
  • Page 440: Table 156 System Error Logs

    Prestige 660H/HW Series User’s Guide Table 155 System Maintenance Logs (continued) LOG MESSAGE Configuration Change: PC = 0x%x, Task ID = 0x%x Successful SSH login SSH login failed Successful HTTPS login HTTPS login failed Table 156 System Error Logs LOG MESSAGE %s exceeds the max.
  • Page 441: Table 158 Tcp Reset Logs

    Table 158 TCP Reset Logs LOG MESSAGE Under SYN flood attack, sent TCP RST Exceed TCP MAX incomplete, sent TCP RST Peer TCP state out of order, sent TCP RST Firewall session time out, sent TCP RST Exceed MAX incomplete, sent TCP RST Access block, sent TCP Table 159 Packet Filter Logs...
  • Page 442: Table 161 Cdr Logs

    Prestige 660H/HW Series User’s Guide Table 160 ICMP Logs (continued) LOG MESSAGE Triangle route packet forwarded: ICMP Packet without a NAT table entry blocked: ICMP Unsupported/out-of-order ICMP: ICMP Router reply ICMP packet: ICMP Table 161 CDR Logs LOG MESSAGE board %d line %d channel %d, call %d, %s C01 Outgoing Call dev=%x ch=%x %s board %d line %d channel %d,...
  • Page 443: Table 163 Upnp Logs

    Table 163 UPnP Logs LOG MESSAGE UPnP pass through Firewall Table 164 Content Filtering Logs LOG MESSAGE DESCRIPTION The content of a requested web page matched a user defined keyword. %s: Keyword blocking The web site is not in a trusted domain, and the router blocks all traffic %s: Not in trusted web except trusted domain sites.
  • Page 444: Table 165 Attack Logs

    Prestige 660H/HW Series User’s Guide Table 165 Attack Logs LOG MESSAGE attack [ TCP | UDP | IGMP | ESP | GRE | OSPF ] attack ICMP (type:%d, code:%d) land [ TCP | UDP | IGMP | ESP | GRE | OSPF ] land ICMP (type:%d, code:%d) ip spoofing - WAN [ TCP |...
  • Page 445: Table 166 802.1X Logs

    Table 166 802.1X Logs LOG MESSAGE Local User Database accepts user. Local User Database reports user credential error. Local User Database does not find user`s credential. RADIUS accepts user. RADIUS rejects user. Pls check RADIUS Server. Local User Database does not support authentication method.
  • Page 446: Table 168 Icmp Notes

    Prestige 660H/HW Series User’s Guide Table 167 ACL Setting Notes (continued) PACKET DIRECTION (L to L/Prestige) (W to W/Prestige) Table 168 ICMP Notes TYPE CODE DIRECTION DESCRIPTION LAN to LAN/ ACL set for packets traveling from the LAN to the LAN or Prestige the Prestige.
  • Page 447: Table 169 Syslog Logs

    Table 168 ICMP Notes (continued) TYPE CODE DESCRIPTION Information request message Information Reply Information reply message Table 169 Syslog Logs LOG MESSAGE <Facility*8 + Severity>Mon dd hr:mm:ss hostname src="<srcIP:srcPort>" dst="<dstIP:dstPort>" msg="<msg>" note="<note>" devID="<mac address last three numbers>" cat="<category> The following table shows RFC-2408 ISAKMP payload types that the log displays. Please refer to the RFC for detailed information on each type.
  • Page 448: Log Commands

    1 Use the sys logs load command to load the log setting buffer that allows you to configure which logs the Prestige is to record. 2 Use sys logs category to view a list of the log categories. Figure 270 Displaying Log Categories Example Copyright (c) 1994 - 2004 ZyXEL Communications Corp. ras> ? exit P660>...
  • Page 449: Log Command Example

    Log Command Example This example shows how to set the Prestige to record the access logs and alerts and then view the results. Figure 272 Log Command Example ras> sys logs load ras> sys logs category access 3 ras> sys logs save ras>...
  • Page 450 Prestige 660H/HW Series User’s Guide...
  • Page 451: Index

    Numerics 110V AC 230V AC Abnormal Working Conditions Access methods Accessories Acts of God Address Assignment Address mapping Address Resolution Protocol (ARP) ADSL, what is it? ADSLstandards Airflow Alternative Subnet Mask Notation American Wire Gauge Antenna Directional Omni-directional Antenna gain Any IP 43, 76 How it works...
  • Page 452 Prestige 660H/HW Series User’s Guide Cables, Connecting Call filtering Call filters Built-in User-defined Call Scheduling Maximum Number of Schedule Sets PPPoE Precedence Precedence Example CBR (Continuous Bit Rate) CDR (Call Detail Record) Certificate Authority Certifications change password at login Changes or Modifications Channel Interference Channel ID...
  • Page 453 DiffServ marking rule Disclaimer Discretion Distribution System (DS) Domain Name 73, 119 domain name Domain Name System Basics Types DoS (Denial of Service) DoS attacks, types of DS Field DS field DSCPs DSL (Digital Subscriber Line) DSL line, reinitialize DSL, What Is It? DSLAM (Digital Subscriber Line Access Multiplexer) Dust Dynamic DNS...
  • Page 454 Prestige 660H/HW Series User’s Guide Guidelines For Enhancing Security Introduction LAN to WAN Rules Policies Remote Management Rule Checklist Rule Logic Rule Security Ramifications Services SMT menus Types When To Use firmware 219, 320 upgrade upload upload error Fitness Fragment Threshold Fragmentation Threshold Fragmentation threshold Frame Relay...
  • Page 455 IP Packet IP Policies IP policy IP policy routing IP Policy Routing (IPPR) 46, 244 Applying an IP Policy Ethernet IP Policies Gateway IP Protocol IP protocol IP protocol type IP Routing Policy (IPPR) Benefits Cost Savings Criteria Load Sharing Setup IP Spoofing 133, 136...
  • Page 456 Prestige 660H/HW Series User’s Guide Application Applying NAT in the SMT Menus Configuring Definitions Examples How it works Mapping Types Non NAT Friendly Application Programs Ordering Rules What it does What NAT does NAT (Network Address Translation) NAT mode NAT Traversal navigating the web configurator NetBIOS commands Network Address Translation...
  • Page 457 Protocol filter Protocol Filter Rules Purchase, Proof of Purchaser Qualified Service Personnel Quality of Service Quick Start Guide Radio Communications Radio frequency Radio Frequency Energy Radio Interference Radio Reception Radio Technician RADIUS Configuring Shared Secret Key RADIUS Message Types RADIUS Messages RADIUS server 313, 343 Rate...
  • Page 458 Prestige 660H/HW Series User’s Guide Summary Safety Warnings Sample IP Addresses Saving the State Schedule Sets Duration Scheduler SCRSee Sustain Cell Rate Security In General Security Parameters Security Ramifications Separation Between Equipment and Receiver Serial Number Server 117, 270, 272, 274, 275, 276, 277, 278, 335 Server behind NAT Service 4, 5, 146...
  • Page 459 Tampering TCP Maximum Incomplete 163, 164 TCP Security TCP/IP 132, 133, 171, 295, 318 Teardrop Telecommunication Line Cord. Telephone Television Interference Television Reception Telnet 171, 222 Telnet Configuration Temporal Key Integrity Protocol (TKIP) Text File Format TFTP Restrictions TFTP File Transfer TFTP Restrictions 170, 323 Three-Way Handshake...
  • Page 460: Table 16 Wireless Lan

    Written Permission XMODEM protocol Zero Configuration Internet Access Zero configuration Internet access ZyNOS 2, 321 ZyNOS (ZyXEL Network Operating System) ZyNOS F/W Version ZyXEL Communications Corporation ZyXEL Home Page ZyXEL Limited Warranty Note ZyXEL Network Operating System ZyXEL_s Firewall Introduction...

Table of Contents