ZyXEL Communications P-660HW-T - V2 User Manual

802.11g wireless adsl 2+ 4-port gateway
Hide thumbs Also See for P-660HW-T - V2:
Table of Contents

Advertisement

Quick Links

P-660HW-T v2
802.11g Wireless ADSL 2+ 4-port Gateway
User's Guide
Version 3.40
Edition 1
12/2006

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications P-660HW-T - V2

  • Page 1 P-660HW-T v2 802.11g Wireless ADSL 2+ 4-port Gateway User’s Guide Version 3.40 Edition 1 12/2006...
  • Page 3: Copyright

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 4: Certifications

    P-660HW-T v2 User’s Guide Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. 3 Select the certification you wish to view from this page.
  • Page 6: Safety Warnings

    P-660HW-T v2 User’s Guide Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
  • Page 7 P-660HW-T v2 User’s Guide This product is recyclable. Dispose of it properly. Safety Warnings...
  • Page 8: Zyxel Limited Warranty

    Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
  • Page 9: Customer Support

    • Brief description of the problem and the steps you took to solve it. METHOD SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION support@zyxel.com.tw +886-3-578-3942 www.zyxel.com ZyXEL Communications Corp. CORPORATE www.europe.zyxel.com 6 Innovation Road II HEADQUARTERS Science Park sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com Hsinchu 300 (WORLDWIDE) Taiwan ftp.europe.zyxel.com...
  • Page 10 METHOD SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION support@zyxel.no +47-22-80-61-80 www.zyxel.no ZyXEL Communications A/S Nils Hansens vei 13 NORWAY sales@zyxel.no +47-22-80-61-81 0667 Oslo Norway info@pl.zyxel.com +48 (22) 333 8250 www.pl.zyxel.com ZyXEL Communications ul. Okrzei 1A...
  • Page 11: Table Of Contents

    List of Figures ......................21 List of Tables ......................27 Preface ........................31 Chapter 1 Getting To Know Your ZyXEL Device ..............33 1.1 Introducing the ZyXEL Device ................33 1.2 Features ......................33 1.2.1 Wireless Features ..................36 1.3 Applications for the ZyXEL Device ..............37 1.3.1 Protected Internet Access .................37...
  • Page 12 P-660HW-T v2 User’s Guide 2.4.6 Status: Packet Statistics ................51 2.4.7 Changing Login Password ...............52 Chapter 3 Wizard Setup for Internet Access ................. 55 3.1 Introduction ......................55 3.2 Internet Access Wizard Setup ................55 3.2.1 Automatic Detection ..................57 3.2.2 Manual Configuration ................57 3.3 Wireless Connection Wizard Setup ..............62 3.3.1 Manually assign a WPA-PSK key .............65 3.3.2 Manually assign a WEP key ..............66...
  • Page 13 6.5.2 Starting OTIST ..................107 6.5.3 Notes on OTIST ..................108 6.6 MAC Filter ....................108 Chapter 7 LAN Setup......................111 7.1 LAN Overview ....................111 7.1.1 LANs, WANs and the ZyXEL Device ............111 7.1.2 DHCP Setup ...................112 7.1.2.1 IP Pool Setup ................112 Table of Contents...
  • Page 14 Firewalls........................ 137 9.1 Firewall Overview ....................137 9.2 Types of Firewalls ....................137 9.2.1 Packet Filtering Firewalls ................137 9.2.2 Application-level Firewalls ..............138 9.2.3 Stateful Inspection Firewalls ..............138 9.3 Introduction to ZyXEL’s Firewall ...............138 9.3.1 Denial of Service Attacks ................139 Table of Contents...
  • Page 15 9.4.2.2 Illegal Commands (NetBIOS and SMTP) ........142 9.4.2.3 Traceroute ..................143 9.5 Stateful Inspection ....................143 9.5.1 Stateful Inspection Process ..............144 9.5.2 Stateful Inspection and the ZyXEL Device ..........144 9.5.3 TCP Security ...................145 9.5.4 UDP/ICMP Security ................145 9.5.5 Upper Layer Protocols ................146 9.6 Guidelines for Enhancing Security with Your Firewall ........146...
  • Page 16 P-660HW-T v2 User’s Guide 10.10 DoS Thresholds ..................166 10.10.1 Threshold Values ................166 10.10.2 Half-Open Sessions ................167 10.10.2.1 TCP Maximum Incomplete and Blocking Time ......167 10.10.3 Configuring Firewall Thresholds ............168 Chapter 11 Content Filtering ....................171 11.1 Content Filtering Overview ................171 11.2 Configuring Keyword Blocking ..............171 11.3 Configuring the Schedule ................172...
  • Page 17 16.1.1 How do I know if I'm using UPnP? ............207 16.1.2 NAT Traversal ..................207 16.1.3 Cautions with UPnP ................208 16.2 UPnP and ZyXEL ...................208 16.2.1 Configuring UPnP ................208 16.3 Installing UPnP in Windows Example ............209 16.3.1 Installing UPnP in Windows Me ............209 16.3.2 Installing UPnP in Windows XP ............211...
  • Page 18 20.1 General Diagnostic ..................251 20.2 DSL Line Diagnostic ..................252 Chapter 21 Troubleshooting ....................253 21.1 Problems Starting Up the ZyXEL Device ............253 21.2 Problems with the LAN ...................253 21.3 Problems with the WAN .................254 21.4 Problems Accessing the ZyXEL Device ............255 Appendix A Product Specifications ..................
  • Page 19 P-660HW-T v2 User’s Guide Internal SPTGEN Overview ................... 263 The Configuration Text File Format................ 263 Internal SPTGEN FTP Download Example............264 Internal SPTGEN FTP Upload Example ..............265 Example Internal SPTGEN Menus................. 266 Command Examples....................278 Appendix D Wall-mounting Instructions................. 279 Appendix E Setting up Your Computer’s IP Address............
  • Page 20 NetBIOS Filter Configuration.................. 316 Appendix J Splitters and Microfilters ..................317 Connecting a POTS Splitter ................... 317 Telephone Microfilters .................... 317 ZyXEL Device With ISDN..................319 Appendix K Wireless LANs ...................... 321 Wireless LAN Topologies ..................321 Channel........................323 RTS/CTS ........................ 323 Fragmentation Threshold ..................
  • Page 21: List Of Figures

    P-660HW-T v2 User’s Guide List of Figures Figure 1 Protected Internet Access Applications ..............38 Figure 2 LAN-to-LAN Application Example ................. 38 Figure 3 Front Panel ......................38 Figure 4 Password Screen ....................42 Figure 5 Change Password at Login ................... 42 Figure 6 Select a Mode .......................
  • Page 22 P-660HW-T v2 User’s Guide Figure 39 Internet Connection (PPPoE) ................81 Figure 40 Advanced Internet Connection Setup ..............83 Figure 41 More Connections ....................85 Figure 42 More Connections Edit ..................86 Figure 43 More Connections Advanced Setup ..............88 Figure 44 Traffic Redirect Example ..................
  • Page 23 P-660HW-T v2 User’s Guide Figure 82 Stateful Inspection ....................143 Figure 83 Firewall: General ....................152 Figure 84 Firewall Rules ....................154 Figure 85 Firewall: Edit Rule ....................156 Figure 86 Firewall: Customized Services ................158 Figure 87 Firewall: Configure Customized Services ............159 Figure 88 Firewall Example: Rules ..................
  • Page 24 P-660HW-T v2 User’s Guide Figure 125 Internet Connection Properties: Advanced Settings: Add ......... 214 Figure 126 System Tray Icon ....................214 Figure 127 Internet Connection Status ................215 Figure 128 Network Connections ..................216 Figure 129 Network Connections: My Network Places ............217 Figure 130 Network Connections: My Network Places: Properties: Example .....
  • Page 25 Figure 179 Connecting a Microfilter ..................318 Figure 180 Connecting a Microfilter and Y-Connector ............318 Figure 181 ZyXEL Device with ISDN .................. 319 Figure 182 Peer-to-Peer Communication in an Ad-hoc Network ........321 Figure 183 Basic Service Set ....................322 Figure 184 Infrastructure WLAN ..................
  • Page 26 P-660HW-T v2 User’s Guide List of Figures...
  • Page 27: List Of Tables

    P-660HW-T v2 User’s Guide List of Tables Table 1 ADSL Standards ....................33 Table 2 Front Panel LEDs ....................39 Table 3 Web Configurator Screens Summary ..............44 Table 4 Status Screen ......................47 Table 5 Status: Any IP Table ....................49 Table 6 Status: WLAN Status .....................
  • Page 28 P-660HW-T v2 User’s Guide Table 39 LAN IP Alias ......................122 Table 40 NAT Definitions ....................125 Table 41 NAT Mapping Types .................... 128 Table 42 NAT General ......................129 Table 43 Services and Port Numbers ................. 130 Table 44 NAT Port Forwarding ................... 132 Table 45 Port Forwarding Rule Setup ................
  • Page 29 Table 110 Maintenance Restore Configuration ..............248 Table 111 Diagnostic: General .................... 251 Table 112 Diagnostic: DSL Line ..................252 Table 113 Troubleshooting Starting Up Your ZyXEL Device ..........253 Table 114 Troubleshooting the LAN ................... 253 Table 115 Troubleshooting the WAN .................. 254 Table 116 Troubleshooting Accessing the ZyXEL Device ..........
  • Page 30 P-660HW-T v2 User’s Guide Table 125 Menu 21.1 Filter Set #1 ..................273 Table 126 Menu 21.1 Filer Set #2, ..................275 Table 127 Menu 23 System Menus ..................276 Table 128 Menu 24.11 Remote Management Control ............277 Table 129 Command Examples ..................278 Table 130 Classes of IP Addresses ...................
  • Page 31: Preface

    North American products. About This User's Guide This manual is designed to guide you through the configuration of your ZyXEL Device for its various applications. The web configurator parts of this guide contain background information on features configurable by web configurator.
  • Page 32: User Guide Feedback

    User Guide Feedback Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 33: Getting To Know Your Zyxel Device

    The ZyXEL Device is an ADSL2+ gateway that allows super-fast, secure Internet access over analog (POTS) or digital (ISDN) telephone lines (depending on your model). In the ZyXEL Device product name, “H” denotes an integrated 4-port switch (hub) and “W” denotes an included wireless LAN card that provides wireless connectivity.
  • Page 34: Zero Configuration Internet Access

    Any IP The Any IP feature allows a computer to access the Internet and the ZyXEL Device without changing the network settings (such as IP address and subnet mask) of the computer, when the IP addresses of the computer and the ZyXEL Device are not in the same subnet.
  • Page 35: Media Bandwidth Management

    Device has built-in DHCP server capability enabled by default. It can assign IP addresses, an IP default gateway and DNS servers to DHCP clients. The ZyXEL Device can now also act as a surrogate DHCP server (DHCP Relay) where it relays IP address assignment from the actual real DHCP server to the clients.
  • Page 36: Wireless Features

    TR-069 Compliance TR-069 is a protocol that defines how your ZyXEL Device can be managed via a management server such as ZyXEL’s Vantage CNM Access. The management server can securely manage and update configuration changes in the ZyXEL Device.
  • Page 37: Applications For The Zyxel Device

    Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP) to offer stronger encryption. Antenna The ZyXEL Device is equipped with one 3dBi fixed antenna to provide clear radio signal between the wireless stations and the access points. WEP Encryption WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network to help keep network communications private.
  • Page 38: Lan To Lan Application

    Figure 1 Protected Internet Access Applications 1.3.2 LAN to LAN Application You can use the ZyXEL Device to connect two geographically dispersed networks over the ADSL line. A typical LAN-to-LAN application example is shown as follows. Figure 2 LAN-to-LAN Application Example 1.4 Front Panel LEDs...
  • Page 39: Hardware Connection

    The ZyXEL Device is sending/receiving data. The ZyXEL Device is not connected to the LAN. WLAN Green The ZyXEL Device is ready, but is not sending/receiving data through the wireless LAN. Blinking The ZyXEL Device is sending/receiving data through the wireless LAN.
  • Page 40 P-660HW-T v2 User’s Guide Chapter 1 Getting To Know Your ZyXEL Device...
  • Page 41: Introducing The Web Configurator

    LAN port for initial configuration. 1 Make sure your ZyXEL Device hardware is properly connected (refer to the Quick Start Guide). 2 Prepare your computer/computer network to connect to the ZyXEL Device (refer to the Quick Start Guide).
  • Page 42: Figure 4 Password Screen

    P-660HW-T v2 User’s Guide status only. Click Login to proceed to a screen asking you to change your password or click Cancel to revert to the default password. Figure 4 Password Screen 6 If you entered the user password, skip the next two steps and refer to Section 2.4.2 on page 46 for more information about the Status screen.
  • Page 43: Resetting The Zyxel Device

    If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the ZyXEL Device to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”.
  • Page 44: Figure 7 Web Configurator: Main Screen

    SETUP Logout Click this icon to exit the web configurator. Status This screen shows the ZyXEL Device’s general device, system and interface status information. Use this screen to access the summary statistics tables. Network Internet This screen allows you to configure ISP parameters, WAN IP...
  • Page 45 Use this screen to block sites containing certain keywords in the URL. Schedule Use this screen to set the days and times for the ZyXEL Device to perform content filtering. Trusted Use this screen to exclude a range of users on the LAN from content filtering on your ZyXEL Device.
  • Page 46: Status Screen

    This screen contains administrative and system-related information and also allows you to change your password. Time Setting Use this screen to change your ZyXEL Device’s time and date. Logs View Log Use this screen to view the logs for the categories that you selected.
  • Page 47: Figure 8 Status Screen

    Model Number This is your ZyXEL Device’s model name. MAC Address This is the MAC (Media Access Control) or Ethernet address unique to your ZyXEL Device. ZyNOS Firmware This is the ZyNOS Firmware version and the date created. ZyNOS is ZyXEL's Version proprietary Network Operating System design.
  • Page 48 Network Operating System) and is thus available for running processes like NAT, VPN and the firewall. The bar displays what percent of the ZyXEL Device's heap memory is in use. The bar turns from green to red when the maximum is being approached.
  • Page 49: Status: Any Ip Table

    Table 4 Status Screen LABEL DESCRIPTION Bandwidth Status Use this screen to view the ZyXEL Device’s bandwidth usage and allotments. Packet Statistics Use this screen to view port status and packet specific statistics. 2.4.3 Status: Any IP Table Click the Any IP Table hyperlink in the Status screen. The Any IP table shows current read- only information (including the IP address and the MAC address) of all network devices that use the Any IP feature to communicate with the ZyXEL Device.
  • Page 50: Status: Bandwidth Status

    MAC Address This field displays the MAC (Media Access Control) address of an associated wireless station. Association This field displays the time a wireless station first associated with the ZyXEL Device. TIme Refresh Click Refresh to reload this screen. 2.4.5 Status: Bandwidth Status Click the Bandwidth Status hyperlink in the Status screen.
  • Page 51: Status: Packet Statistics

    This is the status of your WAN link. Upstream Speed This is the upstream speed of your ZyXEL Device. Downstream Speed This is the downstream speed of your ZyXEL Device. Node-Link This field displays the remote node index number and link type. Link types are PPPoA, ENET, RFC 1483 and PPPoE.
  • Page 52: Changing Login Password

    Click this button to halt the refreshing of the system statistics. 2.4.7 Changing Login Password It is highly recommended that you periodically change the password for accessing the ZyXEL Device. If you didn’t change the default one after you logged in or you want to change to a new password again, then click Maintenance >...
  • Page 53: Figure 13 System General

    P-660HW-T v2 User’s Guide Figure 13 System General Chapter 2 Introducing the Web Configurator...
  • Page 54 P-660HW-T v2 User’s Guide Chapter 2 Introducing the Web Configurator...
  • Page 55: Wizard Setup For Internet Access

    P-660HW-T v2 User’s Guide H A P T E R Wizard Setup for Internet Access This chapter provides information on the Wizard Setup screens for Internet access in the web configurator. 3.1 Introduction Use the wizard setup screens to configure your system for Internet access with the information given to you by your ISP.
  • Page 56: Figure 15 Wizard: Welcome

    Figure 16 on page 56), check your hardware connections and click Restart the Internet/ Wireless Setup Wizard to have the ZyXEL Device detect your connection again. Figure 16 Auto Detection: No DSL Connection If the wizard still cannot detect a connection type and the following screen appears (see...
  • Page 57: Automatic Detection

    Figure 18 Auto-Detection: PPPoE 3.2.2 Manual Configuration 1 If the ZyXEL Device fails to detect your DSL connection type, enter the Internet access information given to you by your ISP exactly in the wizard screen. If not given, leave the fields set to the default.
  • Page 58: Figure 19 Internet Access Wizard Setup: Isp Parameters

    P-660HW-T v2 User’s Guide Figure 19 Internet Access Wizard Setup: ISP Parameters The following table describes the fields in this screen. Table 8 Internet Access Wizard Setup: ISP Parameters LABEL DESCRIPTION Mode From the Mode drop-down list box, select Routing (default) if your ISP allows multiple computers to share an Internet account.
  • Page 59: Figure 20 Internet Connection With Pppoe

    Back Click Back to go back to the previous wizard screen. Apply Click Apply to save your changes to the ZyXEL Device. Exit Click Exit to close the wizard screen without saving your changes. Figure 21 Internet Connection with RFC 1483...
  • Page 60: Figure 22 Internet Connection With Enet Encap

    P-660HW-T v2 User’s Guide The following table describes the fields in this screen. Table 10 Internet Connection with RFC 1483 LABEL DESCRIPTION IP Address This field is available if you select Routing in the Mode field. Type your ISP assigned IP address in this field. Back Click Back to go back to the previous wizard screen.
  • Page 61: Figure 23 Internet Connection With Pppoa

    Back Click Back to go back to the previous wizard screen. Apply Click Apply to save your changes to the ZyXEL Device. Exit Click Exit to close the wizard screen without saving your changes. Figure 23 Internet Connection with PPPoA The following table describes the fields in this screen.
  • Page 62: Wireless Connection Wizard Setup

    P-660HW-T v2 User’s Guide Figure 24 Connection Test Failed-1 • If the following screen displays, check if your account is activated or click Restart the Internet/Wireless Setup Wizard to verify your Internet access settings. Figure 25 Connection Test Failed-2. 3.3 Wireless Connection Wizard Setup After you configure the Internet access information, use the following screens to set up your wireless LAN.
  • Page 63: Figure 26 Connection Test Successful

    P-660HW-T v2 User’s Guide Figure 26 Connection Test Successful 2 Use this screen to activate the wireless LAN and OTIST. Click Next to continue. Figure 27 Wireless LAN Setup Wizard 1 Chapter 3 Wizard Setup for Internet Access...
  • Page 64: Figure 28 Wireless Lan Setup Wizard 2

    Select the check box to turn on the wireless LAN. Enable OTIST Select the check box to enable OTIST if you want to transfer your ZyXEL Device’s SSID and WPA-PSK security settings to wireless clients that support OTIST and are within transmission range.
  • Page 65: Manually Assign A Wpa-Psk Key

    Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless Name(SSID) LAN. If you change this field on the ZyXEL Device, make sure all wireless stations use the same SSID in order to access the network. Channel The range of radio frequencies used by IEEE 802.11b/g wireless devices is called a...
  • Page 66: Manually Assign A Wep Key

    P-660HW-T v2 User’s Guide Figure 29 Manually assign a WPA-PSK key The following table describes the labels in this screen. Table 15 Manually assign a WPA key LABEL DESCRIPTION Pre-Shared Type from 8 to 63 case-sensitive ASCII characters. You can set up the most secure wireless connection by configuring WPA in the wireless LAN screens.
  • Page 67: Figure 31 Wireless Lan Setup 3

    LABEL DESCRIPTION The WEP keys are used to encrypt data. Both the ZyXEL Device and the wireless stations must use the same WEP key for data transmission. Enter any 5, 13 or 29 ASCII characters or 10, 26 or 58 hexadecimal characters ("0-9", "A-F") for a 64-bit, 128-bit or 256-bit WEP key respectively.
  • Page 68: Figure 32 Internet Access And Wlan Wizard Setup Complete

    P-660HW-T v2 User’s Guide Figure 32 Internet Access and WLAN Wizard Setup Complete 7 Launch your web browser and navigate to www.zyxel.com. Internet access is just the beginning. Refer to the rest of this guide for more detailed information on the complete range of ZyXEL Device features.
  • Page 69: Bandwidth Management Wizard

    Bandwidth management allows you to control the amount of bandwidth going out through the ZyXEL Device’s WAN port and prioritize the distribution of the bandwidth according to service bandwidth requirements. This helps keep one service from using all of the available bandwidth and shutting out other users.
  • Page 70: Bandwidth Management Wizard Setup

    P-660HW-T v2 User’s Guide Table 17 Media Bandwidth Management Setup: Services (continued) SERVICE DESCRIPTION VoIP (SIP) Sending voice signals over the Internet is called Voice over IP or VoIP. Session Initiated Protocol (SIP) is an internationally recognized standard for implementing VoIP.
  • Page 71: Figure 34 Wizard: Welcome

    Table 18 Bandwidth Management Wizard: General Information LABEL DESCRIPTION Active Select the Active check box to have the ZyXEL Device apply bandwidth management to traffic going out through the ZyXEL Device’s port(s). Select Services Setup to allocate bandwidth based on the service requirements. Back Click Back to display the previous screen.
  • Page 72: Figure 36 Bandwidth Management Wizard: Configuration

    These fields display the services names. Priority Select High, Mid or Low priority for each service to have your ZyXEL Device use a priority for traffic that matches that service. A service with High priority is given as much bandwidth as it needs.
  • Page 73: Figure 37 Bandwidth Management Wizard: Complete

    P-660HW-T v2 User’s Guide 5 Follow the on-screen instructions and click Finish to complete the wizard setup and save your configuration. Figure 37 Bandwidth Management Wizard: Complete Chapter 4 Bandwidth Management Wizard...
  • Page 74 P-660HW-T v2 User’s Guide Chapter 4 Bandwidth Management Wizard...
  • Page 75: Chapter 5 Wan Setup

    5.1 WAN Overview A WAN (Wide Area Network) is an outside connection to another network or the Internet. 5.1.1 Encapsulation Be sure to use the encapsulation method required by your ISP. The ZyXEL Device supports the following methods. 5.1.1.1 ENET ENCAP The MAC Encapsulated Routing Link Protocol (ENET ENCAP) is only implemented with the IP network protocol.
  • Page 76: Pppoa

    By implementing PPPoE directly on the ZyXEL Device (rather than individual computers), the computers on the LAN do not need PPPoE software installed, since the ZyXEL Device does that part of the task. Furthermore, with NAT, all of the LANs’ computers will have access.
  • Page 77: Scenario 1: One Vc, Multiple Protocols

    P-660HW-T v2 User’s Guide because they cannot be automatically determined. What method(s) you use also depends on how many VCs you have and how many different network protocols you need. The extra overhead that ENET ENCAP encapsulation entails makes it a poor choice in a LAN-to-LAN application.
  • Page 78: Ip Assignment With Enet Encap Encapsulation

    The ZyXEL Device does two things when you specify a nailed-up connection. The first is that idle timeout is disabled. The second is that the ZyXEL Device will try to bring up the connection when turned on and whenever the connection is down. A nailed-up connection can be very expensive for obvious reasons.
  • Page 79: Traffic Shaping

    P-660HW-T v2 User’s Guide If you want the dial-backup route to take first priority over the traffic-redirect route or even the normal route, all you need to do is set the dial-backup route’s metric to "1" and the others to "2"...
  • Page 80: Atm Traffic Classes

    An example application is background file transfer. 5.4 Zero Configuration Internet Access Once you turn on and connect the ZyXEL Device to a telephone jack, it automatically detects the Internet connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and makes the necessary configuration changes.
  • Page 81: Internet Connection

    P-660HW-T v2 User’s Guide • the ZyXEL Device is in bridge mode • you set the ZyXEL Device to use a static (fixed) WAN IP address. 5.5 Internet Connection To change your ZyXEL Device’s WAN Internet access settings, click Network > WAN. The screen differs by the encapsulation.
  • Page 82 Select Nailed-Up Connection when you want your connection up all the time. Connection The ZyXEL Device will try to bring up the connection automatically if it is disconnected. Connect on Demand Select Connect on Demand when you don't want the connection up all the time and specify an idle time-out in the Max Idle Timeout field.
  • Page 83: Configuring Advanced Internet Connection Setup

    WAN setup. 5.5.1 Configuring Advanced Internet Connection Setup To edit your ZyXEL Device's advanced WAN settings, click the Advanced Setup button in the Internet Connection screen. The screen appears as shown. Figure 40 Advanced Internet Connection Setup The following table describes the labels in this screen.
  • Page 84: Configuring More Connections

    LAN to use PPPoE client software on their computers to connect to the ISP via the ZyXEL Device. Each host can have a separate account and a public WAN IP address.
  • Page 85: More Connections Edit

    P-660HW-T v2 User’s Guide Figure 41 More Connections The following table describes the labels in this screen. Table 22 More Connections LABEL DESCRIPTION This is the index number of a connection. Active This display whether this connection is activated. Clear the check box to disable the connection.
  • Page 86: Figure 42 More Connections Edit

    Select Routing from the drop-down list box if your ISP allows multiple computers to share an Internet account. If you select Bridge, the ZyXEL Device will forward any packet that it does not route to this remote node; otherwise, the packets are discarded.
  • Page 87 Select Nailed-Up Connection when you want your connection up all the time. Connection The ZyXEL Device will try to bring up the connection automatically if it is disconnected. Connect on Demand Select Connect on Demand when you don't want the connection up all the time and specify an idle time-out in the Max Idle Timeout field.
  • Page 88: Configuring More Connections Advanced Setup

    WAN setup. 5.6.2 Configuring More Connections Advanced Setup To edit your ZyXEL Device's advanced WAN settings, click the Advanced Setup button in the More Connections Edit screen. The screen appears as shown. Figure 43 More Connections Advanced Setup The following table describes the labels in this screen.
  • Page 89: Traffic Redirect

    LAN. Use IP alias to configure the LAN into two or three logical networks with the ZyXEL Device itself as the gateway for each LAN network. Put the protected LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another subnet (Subnet 2).
  • Page 90: Configuring Wan Backup

    P-660HW-T v2 User’s Guide Figure 45 Traffic Redirect LAN Setup 5.8 Configuring WAN Backup To change your ZyXEL Device’s WAN backup settings, click Network > WAN > WAN Backup Setup. The screen appears as shown. Figure 46 WAN Backup Setup...
  • Page 91: Table 25 Wan Backup Setup

    Select the method that the ZyXEL Device uses to check the DSL connection. Select DSL Link to have the ZyXEL Device check if the connection to the DSLAM is up. Select ICMP to have the ZyXEL Device periodically ping the IP addresses configured in the Check WAN IP Address fields.
  • Page 92 P-660HW-T v2 User’s Guide Chapter 5 WAN Setup...
  • Page 93: Chapter 6 Wireless Lan

    The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients. The wireless clients use the access point (AP) to interact with other devices (such as the printer) or with the Internet. Your ZyXEL Device is the AP. Every wireless network must follow these basic guidelines.
  • Page 94: Wireless Security Overview

    P-660HW-T v2 User’s Guide • Every wireless client in the same wireless network must use security compatible with the Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 6.2 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network.
  • Page 95: User Authentication

    P-660HW-T v2 User’s Guide 6.2.3 User Authentication Authentication is the process of verifying whether a wireless device is allowed to use the wireless network. You can make every user log in to the wireless network before they can use it. This is called user authentication. However, every wireless client in the wireless network has to support IEEE 802.1x to do this.
  • Page 96: One-Touch Intelligent Security Technology (Otist)

    With ZyXEL’s OTIST, you set up the SSID and WPA-PSK on the ZyXEL Device. Then, the ZyXEL Device transfers them to the devices in the wireless networks. As a result, you do not have to set up the SSID and encryption on every device in the wireless network.
  • Page 97: Figure 48 Wireless Lan: General

    SSID. Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. Note: If you are configuring the ZyXEL Device from a computer connected to the wireless LAN and you change the ZyXEL Device’s SSID or WEP settings, you will lose your wireless connection when you press Apply to confirm.
  • Page 98: No Security

    Both the wireless clients and the access points must use the same WEP key. Your ZyXEL Device allows you to configure up to four 64-bit, 128-bit or 256-bit WEP keys but only one key can be enabled at any one time.
  • Page 99: Wpa-Psk/Wpa2-Psk

    Device automatically generates a WEP key. WEP Key The WEP keys are used to encrypt data. Both the ZyXEL Device and the wireless clients must use the same WEP key for data transmission. If you want to manually set the WEP key, enter any 5, 13 or 29 characters (ASCII string) or 10, 26 or 58 hexadecimal characters ("0-9", "A-F") for a 64-bit, 128-bit or...
  • Page 100: Figure 51 Wireless: Wpa-Psk/Wpa2-Psk

    This check box is available only when you select WPA2-PSK or WPA2 in the Security Mode field. Select the check box to have both WPA2 and WPA wireless clients be able to communicate with the ZyXEL Device even when the ZyXEL Device is using WPA2-PSK or WPA2. Pre-Shared Key The encryption mechanisms used for WPA/WPA2 and WPA-PSK/WPA2-PSK are the same.
  • Page 101: Wpa/Wpa2

    LABEL DESCRIPTION Idle Timeout (In The ZyXEL Device automatically disconnects a wireless station from the wireless Seconds) network after a period of inactivity. The wireless station needs to send the username and password again before it can use the wireless network again. Some wireless clients may prompt users for a username and password;...
  • Page 102: Figure 52 Wireless: Wpa/Wpa2

    This check box is available only when you select WPA2-PSK or WPA2 in the Security Mode field. Select the check box to have both WPA2 and WPA wireless clients be able to communicate with the ZyXEL Device even when the ZyXEL Device is using WPA2-PSK or WPA2. ReAuthentication...
  • Page 103: Wireless Lan Advanced Setup

    Enter a password (up to 31 alphanumeric characters) as the key to be shared between the external authentication server and the ZyXEL Device. The key must be the same on the external authentication server and your ZyXEL Device. The key is not sent over the network.
  • Page 104: Figure 53 Advanced

    256 and 2432. Output Power Set the output power of the ZyXEL Device in this field. This control changes the strength of the ZyXEL Device's antenna gain or transmission power. Antenna gain is the increase in coverage. Higher antenna gain improves the range of the signal for better communications.
  • Page 105: Otist

    Enter 0 to disable this feature. Back Click Back to return to the previous screen. Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to reload the previous configuration for this screen. 6.5 OTIST In a wireless network, the wireless clients must have the same SSID and security settings as the access point (AP) or wireless router (we will refer to both as “AP”...
  • Page 106: Wireless Client

    ZyXEL Device. You must also activate and start OTIST on the wireless client(s) all within three minutes. 6.5.1.2 Wireless Client Start the ZyXEL utility and click the Adapter tab. Select the OTIST check box, enter the same Setup Key as your AP’s and click Save. Chapter 6 Wireless LAN...
  • Page 107: Starting Otist

    Figure 58 OTIST in Progress (Client) • In the wireless client, you see this screen if it can't find an OTIST-enabled AP (with the same Setup key). Click OK to go back to the ZyXEL utility main screen. Chapter 6 Wireless LAN...
  • Page 108: Notes On Otist

    OTIST on the AP and ALL wireless clients again. 6.6 MAC Filter The MAC filter screen allows you to configure the ZyXEL Device to give exclusive access to up to 32 devices (Allow) or exclude up to 32 devices from accessing the ZyXEL Device (Deny).
  • Page 109: Figure 61 Mac Address Filter

    Filter Action Define the filter action for the list of MAC addresses in the MAC Address table. Select Deny to block access to the ZyXEL Device, MAC addresses not listed will be allowed to access the ZyXEL Device Select Allow to permit access to the ZyXEL Device, MAC addresses not listed will be denied access to the ZyXEL Device.
  • Page 110 P-660HW-T v2 User’s Guide Table 34 MAC Address Filter LABEL DESCRIPTION Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to reload the previous configuration for this screen. Chapter 6 Wireless LAN...
  • Page 111: Chapter 7 Lan Setup

    7.1.1 LANs, WANs and the ZyXEL Device The actual physical connection determines whether the ZyXEL Device ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next.
  • Page 112: Dhcp Setup

    If the Primary and Secondary DNS Server fields in the DHCP Setup screen are not specified, for instance, left as 0.0.0.0, the ZyXEL Device tells the DHCP clients that it itself is the DNS server. When a computer sends a DNS query to the ZyXEL Device, the ZyXEL Device forwards the query to the real DNS server learned through IPCP and relays the response back to the computer.
  • Page 113: Dns Server Address Assignment

    If your ISP gives you DNS server addresses, enter them in the DNS Server fields in the DHCP Setup screen. • The ZyXEL Device acts as a DNS proxy when the Primary and Secondary DNS Server fields are left as 0.0.0.0 in the DHCP Setup screen.
  • Page 114: Private Ip Addresses

    • Both - the ZyXEL Device will broadcast its routing table periodically and incorporate the RIP information that it receives. • In Only - the ZyXEL Device will not send any RIP packets but will accept all RIP packets received.
  • Page 115: Multicast

    Traditionally, you must set the IP addresses and the subnet masks of a computer and the ZyXEL Device to be in the same subnet to allow the computer to access the Internet (through the ZyXEL Device). In cases where your computer is required to use a static IP address in another network, you may need to manually configure the network settings of the computer every time you want to access the Internet via the ZyXEL Device.
  • Page 116: How Any Ip Works

    ARP table is updated, the computer is able to access the Internet through the ZyXEL Device. 5 When the ZyXEL Device receives packets from the computer, it creates an entry in the IP routing table so it can properly forward packets intended for the computer.
  • Page 117: Configuring Lan Ip

    Click this button to display the Advanced LAN Setup screen and edit more details of your LAN setup. 7.3.1 Configuring Advanced LAN Setup To edit your ZyXEL Device's advanced LAN settings, click the Advanced Setup button in the LAN IP screen. The screen appears as shown. Chapter 7 LAN Setup...
  • Page 118: Figure 65 Advanced Lan Setup

    When you disable the Any IP feature, only computers with dynamic IP addresses or static IP addresses in the same subnet as the ZyXEL Device’s LAN IP address can connect to the ZyXEL Device or access the Internet through the ZyXEL Device.
  • Page 119: Dhcp Setup

    P-660HW-T v2 User’s Guide 7.4 DHCP Setup Use this screen to configure the DNS server information that the ZyXEL Device sends to the DHCP client devices on the LAN. Figure 66 DHCP Setup The following table describes the labels in this screen.
  • Page 120: Lan Client List

    DHCP clients along with the IP address and the subnet mask. If the fields are left as 0.0.0.0, the ZyXEL Device acts as a DNS proxy and forwards the DHCP client’s DNS query to the real DNS server learned through IPCP and relays the response back to the computer.
  • Page 121: Lan Ip Alias

    IP alias allows you to partition a physical network into different logical networks over the same Ethernet interface. The ZyXEL Device supports three logical LAN interfaces via its single physical Ethernet interface with the ZyXEL Device itself as the gateway for each LAN network.
  • Page 122: Figure 68 Physical Network & Partitioned Logical Networks

    P-660HW-T v2 User’s Guide Figure 68 Physical Network & Partitioned Logical Networks To change your ZyXEL Device’s IP alias settings, click Network > LAN > IP Alias. The screen appears as shown. Figure 69 LAN IP Alias The following table describes the labels in this screen.
  • Page 123 RIP packets. Select the RIP direction from Both/In Only/Out Only/None. When set to Both or Out Only, the ZyXEL Device will broadcast its routing table periodically. When set to Both or In Only, it will incorporate the RIP information that it receives;...
  • Page 124 P-660HW-T v2 User’s Guide Chapter 7 LAN Setup...
  • Page 125: Network Address Translation (Nat) Screens

    IP address known within another network. 8.1.1 NAT Definitions Inside/outside denotes where a host is located relative to the ZyXEL Device, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.
  • Page 126: What Nat Does

    Many-to-One and Many-to-Many Overload NAT mapping) in each packet and then forwards it to the Internet. The ZyXEL Device keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored. The following figure illustrates this.
  • Page 127: Nat Application

    8.1.5 NAT Mapping Types NAT supports five types of IP/port mapping. They are: • One to One: In One-to-One mode, the ZyXEL Device maps one local IP address to one global IP address. • Many to One: In Many-to-One mode, the ZyXEL Device maps multiple local IP addresses to one global IP address.
  • Page 128: Sua (Single User Account) Versus Nat

    Table 41 on page 128. • Choose SUA Only if you have just one public WAN IP address for your ZyXEL Device. • Choose Full Feature if you have multiple public WAN IP addresses for your ZyXEL Device.
  • Page 129: Port Forwarding

    Address Translation (NAT) SUA Only Select this radio button if you have just one public WAN IP address for your ZyXEL Device. Full Feature Select this radio button if you have multiple public WAN IP addresses for your ZyXEL Device.
  • Page 130: Default Server Ip Address

    Note: If you do not assign a Default Server IP address, the ZyXEL Device discards all packets received for ports that are not specified here or in the remote management setup.
  • Page 131: Configuring Servers Behind Port Forwarding (Example)

    Note: The Port Forwarding screen is available only when you select SUA Only in the NAT > General screen. If you do not assign a Default Server IP address, the ZyXEL Device discards all packets received for ports that are not specified here or in the remote management setup.
  • Page 132: Port Forwarding Rule Edit

    If you do not assign a Default Server IP address, the ZyXEL Device discards all packets received for ports that are not specified here or in the remote management setup.
  • Page 133: Address Mapping

    Note: The Address Mapping screen is available only when you select Full Feature in the NAT > General screen. Ordering your rules is important because the ZyXEL Device applies the rules in the order that you specify. When a rule matches the current packet, the ZyXEL Device takes the corresponding action and the remaining rules are ignored.
  • Page 134: Figure 76 Address Mapping Rules

    One-to-one NAT mapping type. M-1: Many-to-One mode maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature that previous ZyXEL routers supported only.
  • Page 135: Address Mapping Rule Edit

    • Many-to-One: Many-to-One mode maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature that previous ZyXEL routers supported only. • Many-to-Many Overload: Many-to-Many Overload mode maps multiple local IP addresses to shared global IP addresses.
  • Page 136 Server Mapping Set field. Back Click Back to return to the previous screen. Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh. Chapter 8 Network Address Translation (NAT) Screens...
  • Page 137: Chapter 9 Firewalls

    P-660HW-T v2 User’s Guide H A P T E R Firewalls This chapter gives some background information on firewalls and introduces the ZyXEL Device firewall. 9.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another.
  • Page 138: Application-Level Firewalls

    The ZyXEL Device also has packet filtering capabilities. The ZyXEL Device is installed between the LAN and the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN.
  • Page 139: Denial Of Service Attacks

    Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The ZyXEL Device is pre-configured to automatically detect and thwart all known DoS attacks.
  • Page 140: Types Of Dos Attacks

    P-660HW-T v2 User’s Guide Some of the most common IP ports are: Table 48 Common IP Ports Telnet HTTP SMTP POP3 9.4.2 Types of DoS Attacks There are four types of DoS attacks: 1 Those that exploit bugs in a TCP/IP implementation. 2 Those that exploit weaknesses in the TCP/IP specification.
  • Page 141: Figure 80 Syn Flood

    P-660HW-T v2 User’s Guide Under normal circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment).
  • Page 142: Icmp Vulnerability

    P-660HW-T v2 User’s Guide Figure 81 Smurf Attack 9.4.2.1 ICMP Vulnerability ICMP is an error-reporting protocol that works in concert with IP. The following ICMP types trigger an alert: Table 49 ICMP Commands That Trigger Alerts REDIRECT TIMESTAMP_REQUEST TIMESTAMP_REPLY ADDRESS_MASK_REQUEST ADDRESS_MASK_REPLY 9.4.2.2 Illegal Commands (NetBIOS and SMTP) The only legal NetBIOS commands are the following - all others are illegal.
  • Page 143: Traceroute

    The ZyXEL Device uses stateful packet inspection to protect the private LAN from hackers and vandals on the Internet. By default, the ZyXEL Device’s stateful inspection allows all communications to the Internet that originate from the LAN, and blocks all traffic to the LAN that originates from the Internet.
  • Page 144: Stateful Inspection Process

    P-660HW-T v2 User’s Guide The previous figure shows the ZyXEL Device’s default firewall rules in action as well as demonstrates how stateful inspection works. User A can initiate a Telnet session from within the LAN and responses to this request are allowed. However other Telnet traffic initiated from the WAN is blocked.
  • Page 145: Tcp Security

    Below is a brief technical description of how these connections are tracked. Connections may either be defined by the upper protocols (for instance, TCP), or by the ZyXEL Device itself (as with the "virtual connections" created for UDP and ICMP).
  • Page 146: Upper Layer Protocols

    P-660HW-T v2 User’s Guide A similar situation exists for ICMP, except that the ZyXEL Device is even more restrictive. Specifically, only outgoing echoes will allow incoming echo replies, outgoing address mask requests will allow incoming address mask replies, and outgoing timestamp requests will allow incoming timestamp replies.
  • Page 147: Packet Filtering Vs Firewall

    9.7 Packet Filtering Vs Firewall Below are some comparisons between the ZyXEL Device’s filtering and firewall functions. 9.7.1 Packet Filtering: • The router filters packets as they pass through the router’s interface according to the filter rules you designed.
  • Page 148: When To Use Filtering

    P-660HW-T v2 User’s Guide 9.7.1.1 When To Use Filtering • To block/allow LAN packets by their MAC addresses. • To block/allow special IP packets which are neither TCP nor UDP, nor ICMP packets. • To block/allow both inbound (WAN to LAN) and outbound (LAN to WAN) traffic between the specific inside host/network "A"...
  • Page 149: Firewall Configuration

    10.1 Access Methods The web configurator is, by far, the most comprehensive firewall configuration tool your ZyXEL Device has to offer. For this reason, it is recommended that you configure your firewall using the web configurator.CLI (Command Line Interpreter) commands provide limited configuration options and are only recommended for advanced users.
  • Page 150: Rule Logic Overview

    These custom rules work by comparing the Source IP address, Destination IP address and IP protocol type of network traffic to rules set by the administrator. Your customized rules take precedence and override the ZyXEL Device’s default rules. 10.3 Rule Logic Overview Note: Study these points carefully before configuring rules.
  • Page 151: Key Fields For Configuring Rules

    LAN to LAN/ Router and WAN to WAN/ Router rules apply to packets coming in on the associated interface (LAN or WAN respectively). LAN to LAN/ Router means policies for LAN-to-ZyXEL Device (the policies for managing the ZyXEL Device through the LAN interface) and policies for LAN-to-LAN (the policies that control routing between two subnets on the LAN).
  • Page 152: Lan To Wan Rules

    P-660HW-T v2 User’s Guide 10.4.1 LAN to WAN Rules The default rule for LAN to WAN traffic is that all users on the LAN are allowed non- restricted access to the WAN. When you configure a LAN to WAN rule, you in essence want to limit some or all users from accessing certain services on the WAN.
  • Page 153: Firewall Rules Summary

    Denial of Service (DoS) attacks when the firewall is activated. Bypass Triangle Select this check box to have the ZyXEL Device firewall permit the use of triangle Route route topology on the network. See the appendix for more on triangle route topology.
  • Page 154: Figure 84 Firewall Rules

    Table 53 Firewall Rules LABEL DESCRIPTION Firewall Rules This read-only bar shows how much of the ZyXEL Device's memory for recording Storage Space firewall rules it is currently using. When you are using 80% or less of the storage in Use space, the bar is green.
  • Page 155: Configuring Firewall Rules

    The ordering of your rules is important as they are applied in order of their numbering. Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh. 10.6.1 Configuring Firewall Rules Refer to Section 9.1 on page 137...
  • Page 156: Figure 85 Firewall: Edit Rule

    P-660HW-T v2 User’s Guide Figure 85 Firewall: Edit Rule Chapter 10 Firewall Configuration...
  • Page 157: Table 54 Firewall: Edit Rule

    Log Settings page and select the Access Control logs category to have the ZyXEL Device record these logs. Alert Send Alert Message Select the check box to have the ZyXEL Device generate an alert when the rule to Administrator is matched. When Matched...
  • Page 158: Customized Services

    Click Cancel to exit this screen without saving. 10.6.2 Customized Services Configure customized services and port numbers not predefined by the ZyXEL Device. For a comprehensive list of port numbers and services, visit the IANA (Internet Assigned Number Authority) website. For further information on these services, please read Section 10.8 on page...
  • Page 159: Configuring A Customized Service

    P-660HW-T v2 User’s Guide 10.6.3 Configuring a Customized Service Click a rule number in the Firewall Customized Services screen to create a new custom port or edit an existing one. This action displays the following screen. Refer to Section 9.1 on page 137 for more information.
  • Page 160: Figure 88 Firewall Example: Rules

    P-660HW-T v2 User’s Guide Figure 88 Firewall Example: Rules 3 In the Rules screen, select the index number after that you want to add the rule. For example, if you select “6”, your new rule becomes number 7 and the previous rule 7 (if there is one) becomes rule 8.
  • Page 161: Figure 90 Firewall Example: Edit Rule: Destination Address

    P-660HW-T v2 User’s Guide Figure 90 Firewall Example: Edit Rule: Destination Address 9 Use the Add >> and Remove buttons between Available Services and Selected Services list boxes to configure it as follows. Click Apply when you are done. Note: Custom services show up with an “*” before their names in the Services list box and the Rules list box.
  • Page 162: Figure 91 Firewall Example: Edit Rule: Select Customized Services

    P-660HW-T v2 User’s Guide Figure 91 Firewall Example: Edit Rule: Select Customized Services On completing the configuration procedure for this Internet firewall rule, the Rules screen should look like the following. Rule 1 allows a “MyService” connection from the WAN to IP addresses 10.0.0.10 through 10.0.0.15 on the LAN.
  • Page 163: Predefined Services

    Section 10.6.1 on page 155) displays all predefined services that the ZyXEL Device already supports. Next to the name of the service, two fields appear in brackets. The first field indicates the IP protocol type (TCP, UDP, or ICMP). The second field indicates the IP port number that defines the service. (Note that there may be more than one IP protocol type.
  • Page 164 P-660HW-T v2 User’s Guide Table 57 Predefined Services (continued) SERVICE DESCRIPTION H.323(TCP:1720) Net Meeting uses this protocol. HTTP(TCP:80) Hyper Text Transfer Protocol - a client/server protocol for the world wide web. HTTPS HTTPS is a secured http session often used in e-commerce. ICQ(UDP:4000) This is a popular Internet chat program.
  • Page 165: Anti-Probing

    Another videoconferencing solution. 10.9 Anti-Probing If an outside user attempts to probe an unsupported port on your ZyXEL Device, an ICMP response packet is automatically returned. This allows the outside user to know the ZyXEL Device exists. The ZyXEL Device supports anti-probing, which prevents the ICMP response packet from being sent.
  • Page 166: Dos Thresholds

    Select this option to prevent hackers from finding the ZyXEL Device by probing for Requests for unused ports. If you select this option, the ZyXEL Device will not respond to port Unauthorized request(s) for unused ports, thus leaving the unused ports and the ZyXEL Device Services.
  • Page 167: Half-Open Sessions

    • If the Blocking Time timeout is 0 (the default), then the ZyXEL Device deletes the oldest existing half-open session for the host for every new connection request to the host. This ensures that the number of half-open sessions to a given host will never exceed the threshold.
  • Page 168: Configuring Firewall Thresholds

    P-660HW-T v2 User’s Guide 10.10.3 Configuring Firewall Thresholds The ZyXEL Device also sends alerts whenever TCP Maximum Incomplete is exceeded. The global values specified for the threshold and timeout apply to all TCP connections. Click Firewall, and Threshold to bring up the next screen.
  • Page 169 TCP Maximum Incomplete is reached. Enter the length of blocking time in minutes (between 1 and 256). Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh. Chapter 10 Firewall Configuration...
  • Page 170 P-660HW-T v2 User’s Guide Chapter 10 Firewall Configuration...
  • Page 171: Chapter 11 Content Filtering

    Content filtering gives you the ability to block web sites that contain key words (that you specify) in the URL. You can set a schedule for when the ZyXEL Device performs content filtering. You can also specify trusted IP addresses on the LAN for which the ZyXEL Device will not perform content filtering.
  • Page 172: Configuring The Schedule

    Click Cancel to return to the previously saved settings. 11.3 Configuring the Schedule To set the days and times for the ZyXEL Device to perform content filtering, click Security > Content Filter > Schedule. The screen appears as shown. Figure 96 Content Filter: Schedule...
  • Page 173: Configuring Trusted Computers

    Click Cancel to return to the previously saved settings. 11.4 Configuring Trusted Computers To exclude a range of users on the LAN from content filtering on your ZyXEL Device, click Security > Content Filter > Trusted. The screen appears as shown.
  • Page 174 P-660HW-T v2 User’s Guide Chapter 11 Content Filtering...
  • Page 175: Chapter 12 Static Route

    Device knows about network N2 in the following figure through remote node Router 1. However, the ZyXEL Device is unable to route a packet to network N3 because it doesn't know that there is a route through the same remote node Router 1 (via gateway Router 2). The static routes are for you to tell the ZyXEL Device about the networks beyond the remote nodes.
  • Page 176: Static Route Edit

    Click the Edit icon to go to the screen where you can set up a static route on the ZyXEL Device. Click the Delete icon to remove a static route from the ZyXEL Device. A window displays asking you to confirm that you want to delete the route.
  • Page 177: Figure 100 Static Route Edit

    LAN or WAN port. The gateway helps forward packets to their destinations. Back Click Back to return to the previous screen without saving. Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh. Chapter 12 Static Route...
  • Page 178 P-660HW-T v2 User’s Guide Chapter 12 Static Route...
  • Page 179: Chapter 13 Bandwidth Management

    (bandwidth budgets) to different bandwidth rules. The ZyXEL Device applies bandwidth management to traffic that it forwards out through an interface. The ZyXEL Device does not control the bandwidth of traffic that comes into an interface. Bandwidth management applies to all traffic flowing out of the router, regardless of the traffic's source.
  • Page 180: Application And Subnet-Based Bandwidth Management

    64 Kbps 64 Kbps 13.5 Scheduler The scheduler divides up an interface’s bandwidth among the bandwidth classes. The ZyXEL Device has two types of scheduler: fairness-based and priority-based. 13.5.1 Priority-based Scheduler With the priority-based scheduler, the ZyXEL Device forwards traffic from bandwidth classes according to the priorities that you assign to the bandwidth classes.
  • Page 181: Fairness-Based Scheduler

    When you enable maximize bandwidth usage, the ZyXEL Device first makes sure that each bandwidth class gets up to its bandwidth allotment. Next, the ZyXEL Device divides up an interface’s available bandwidth (bandwidth that is unbudgeted or unused by the classes) depending on how many bandwidth classes require more bandwidth and on their priority levels.
  • Page 182: Maximize Bandwidth Usage Example

    P-660HW-T v2 User’s Guide 13.6.2 Maximize Bandwidth Usage Example Here is an example of a ZyXEL Device that has maximize bandwidth usage enabled on an interface. The following table shows each bandwidth class’s bandwidth budget. The classes are set up based on subnets. The interface is set to 10240 kbps. Each subnet is allocated 2048 kbps.
  • Page 183: Fairness-Based Allotment Of Unused And Unbudgeted Bandwidth

    1024 kbps extra goes to each so the other classes each get a total of 3072 kbps. 13.6.3 Bandwidth Management Priorities The following table describes the priorities that you can apply to traffic that the ZyXEL Device forwards out through an interface. Table 69 Bandwidth Management Priorities PRIORITY LEVELS: TRAFFIC WITH A HIGHER PRIORITY GETS THROUGH FASTER WHILE TRAFFIC WITH A LOWER PRIORITY IS DROPPED IF THE NETWORK IS CONGESTED.
  • Page 184: Over Allotment Of Bandwidth

    P-660HW-T v2 User’s Guide 13.7 Over Allotment of Bandwidth You can set the bandwidth management speed for an interface higher than the interface’s actual transmission speed. Higher priority traffic gets to use up to its allocated bandwidth, even if it takes up all of the interface’s available bandwidth. This could stop lower priority traffic from being sent.
  • Page 185: Bandwidth Management Rule Setup

    You can also set this number lower than the interface’s actual transmission speed. If you do not enable Max Bandwidth Usage, this will cause the ZyXEL Device to not use some of the interface’s available bandwidth. Scheduler Select either Priority-Based or Fairness-Based from the drop-down menu to control the traffic flow.
  • Page 186: Figure 103 Bandwidth Management: Rule Setup

    Click the Edit icon to go to the screen where you can edit the rule. Click the Remove icon to delete an existing rule. Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh.
  • Page 187: Rule Configuration

    LABEL DESCRIPTION Rule Configuration Active Select this check box to have the ZyXEL Device apply this bandwidth management rule. Enable a bandwidth management rule to give traffic that matches the rule priority over traffic that does not match the rule.
  • Page 188 (service type) number. 0 means any protocol number. Back Click Back to go to the previous screen. Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh. Chapter 13 Bandwidth Management...
  • Page 189: Bandwidth Monitor

    1723 13.10 Bandwidth Monitor To view the ZyXEL Device’s bandwidth usage and allotments, click Advanced > Bandwidth MGMT > Monitor. The screen appears as shown. Select an interface from the drop-down list box to view the bandwidth usage of its bandwidth rules. The gray section of the bar represents the percentage of unused bandwidth and the blue color represents the percentage of bandwidth in use.
  • Page 190 P-660HW-T v2 User’s Guide Chapter 13 Bandwidth Management...
  • Page 191: Chapter 14 Dynamic Dns Setup

    H A P T E R Dynamic DNS Setup This chapter discusses how to configure your ZyXEL Device to use Dynamic DNS. 14.1 Dynamic DNS Overview Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.).
  • Page 192: Figure 106 Dynamic Dns

    Select the type of service that you are registered for from your Dynamic DNS Type service provider. Host Name Type the domain name assigned to your ZyXEL Device by your Dynamic DNS provider. You can specify up to two host names in the field separated by a comma (","). User Name Type your user name.
  • Page 193 Table 75 Dynamic DNS (continued) LABEL DESCRIPTION Dynamic DNS Select this option only when there are one or more NAT routers between the ZyXEL server auto Device and the DDNS server. This feature has the DDNS server automatically detect IP detect and use the IP address of the NAT router that has a public IP address.
  • Page 194 P-660HW-T v2 User’s Guide Chapter 14 Dynamic DNS Setup...
  • Page 195: Remote Management Configuration

    To disable remote management of a service, select Disable in the corresponding Access Status field. You may only have one remote management session running at a time. The ZyXEL Device automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts.
  • Page 196: Remote Management And Nat

    There is a default system management idle timeout of five minutes (three hundred seconds). The ZyXEL Device automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling.
  • Page 197: Telnet

    15.3 Telnet You can configure your ZyXEL Device for remote Telnet access as shown next. The administrator uses Telnet from a computer on a remote network to access the ZyXEL Device. Figure 108 Telnet Configuration on a TCP/IP Network 15.4 Configuring Telnet Click Advanced >...
  • Page 198: Configuring Ftp

    Secured Client IP A secured client is a “trusted” computer that is allowed to communicate with the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyXEL Device using this service.
  • Page 199: Snmp

    Secured Client IP A secured client is a “trusted” computer that is allowed to communicate with the ZyXEL Device using this service. Select All to allow any computer to access the ZyXEL Device using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyXEL Device using this service.
  • Page 200: Supported Mibs

    • Trap - Used by the agent to inform the manager of some events. 15.6.1 Supported MIBs The ZyXEL Device supports MIB II that is defined in RFC-1213 and RFC-1215. The focus of the MIBs is to let administrators collect statistical data and monitor status and performance.
  • Page 201: Snmp Traps

    P-660HW-T v2 User’s Guide 15.6.2 SNMP Traps The ZyXEL Device will send traps to the SNMP manager when any one of the following events occurs: Table 79 SNMP Traps TRAP # TRAP NAME DESCRIPTION coldStart (defined in RFC-1215) A trap is sent after booting (power on).
  • Page 202: Configuring Dns

    To change your ZyXEL Device’s DNS settings, click Advanced > Remote MGMT > DNS. The screen appears as shown. Use this screen to set from which IP address the ZyXEL Device will accept DNS queries and on which interface it can send them your ZyXEL Device’s DNS settings.
  • Page 203: Configuring Icmp

    To change your ZyXEL Device’s security settings, click Advanced > Remote MGMT > ICMP. The screen appears as shown. If an outside user attempts to probe an unsupported port on your ZyXEL Device, an ICMP response packet is automatically returned. This allows the outside user to know the ZyXEL Device exists.
  • Page 204: 204

    Click Cancel to begin configuring this screen afresh. 15.9 TR-069 TR-069 is a protocol that defines how your ZyXEL Device can be managed via a management server such as ZyXEL’s Vantage CNM Access. An administrator can use CNM Access to remotely set up the ZyXEL device, modify settings, perform firmware upgrades as well as monitor and diagnose the ZyXEL device.
  • Page 205: Figure 115 Enabling Tr-069

    P-660HW-T v2 User’s Guide Follow the procedure below to configure your ZyXEL Device to be managed by CNM Access. See the Command Interpreter appendix for information on the command structure and how to access the CLI (Command Line Interface) on the ZyXEL Device.
  • Page 206 P-660HW-T v2 User’s Guide Chapter 15 Remote Management Configuration...
  • Page 207: Universal Plug-And-Play (Upnp)

    P-660HW-T v2 User’s Guide H A P T E R Universal Plug-and-Play (UPnP) This chapter introduces the UPnP feature in the web configurator. 16.1 Introducing Universal Plug and Play Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices.
  • Page 208: Cautions With Upnp

    You must have IIS (Internet Information Services) enabled on the Windows web server for UPnP to work. 16.2 UPnP and ZyXEL ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum UPnP™ Implementers Corp. (UIC). ZyXEL's UPnP implementation supports IGD 1.0 (Internet Gateway Device).
  • Page 209: Installing Upnp In Windows Example

    Select this check box to activate UPnP. Be aware that anyone could use Play (UPnP) Feature a UPnP application to open the web configurator's login screen without entering the ZyXEL Device's IP address (although you must still enter the password to access the web configurator). Allow users to make...
  • Page 210: Figure 117 Add/Remove Programs: Windows Setup: Communication

    P-660HW-T v2 User’s Guide Figure 117 Add/Remove Programs: Windows Setup: Communication 3 In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 118 Add/Remove Programs: Windows Setup: Communication: Components 4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted.
  • Page 211: Installing Upnp In Windows Xp

    P-660HW-T v2 User’s Guide 16.3.2 Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click start and Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ….
  • Page 212: Using Upnp In Windows Xp Example

    This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the ZyXEL Device. Make sure the computer is connected to a LAN port of the ZyXEL Device. Turn on your computer and the ZyXEL Device.
  • Page 213: Figure 122 Network Connections

    P-660HW-T v2 User’s Guide Figure 122 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 123 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings. Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 214: Figure 124 Internet Connection Properties: Advanced Settings

    P-660HW-T v2 User’s Guide Figure 124 Internet Connection Properties: Advanced Settings Figure 125 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
  • Page 215: Web Configurator Easy Access

    16.4.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the ZyXEL Device without finding out the IP address of the ZyXEL Device first. This comes helpful if you do not know the IP address of the ZyXEL Device.
  • Page 216: Figure 128 Network Connections

    Figure 128 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your ZyXEL Device and select Invoke. The web configurator login screen displays. Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 217: Figure 129 Network Connections: My Network Places

    P-660HW-T v2 User’s Guide Figure 129 Network Connections: My Network Places 6 Right-click on the icon for your ZyXEL Device and select Properties. A properties window displays with basic information about the ZyXEL Device. Figure 130 Network Connections: My Network Places: Properties: Example...
  • Page 218 P-660HW-T v2 User’s Guide Chapter 16 Universal Plug-and-Play (UPnP)
  • Page 219: Chapter 17 System

    The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System Name), the domain name can be assigned from the ZyXEL Device via DHCP.
  • Page 220: Figure 131 System General Setup

    (not recommended). Password User Password If you log in with the user password, you can only view the ZyXEL Device status. The default user password is user. New Password Type your new system password (up to 30 characters). Note that as you type a password, the screen displays a (*) for each character you type.
  • Page 221: Time Setting

    17.2 Time Setting To change your ZyXEL Device’s time and date, click Maintenance > System > Time Setting. The screen appears as shown. Use this screen to configure the ZyXEL Device’s time based on your local time zone. Figure 132 System Time Setting...
  • Page 222: Table 86 System Time Setting

    When you set Time and Date Setup to Manual, enter the new date in this field and then click Apply. Get from Time Select this radio button to have the ZyXEL Device get the time and date from the Server time server you specified below.
  • Page 223 In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1). Apply Click Apply to save your changes to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh.
  • Page 224 P-660HW-T v2 User’s Guide Chapter 17 System...
  • Page 225: Chapter 18 Logs

    The web configurator allows you to choose which categories of events and/or alerts to have the ZyXEL Device log and then display the logs or have the ZyXEL Device send them to an administrator (as e-mail) or to a syslog server.
  • Page 226: Configuring Log Settings

    Click Clear Log to delete all the logs. 18.3 Configuring Log Settings Use the Log Settings screen to configure to where the ZyXEL Device is to send logs; the schedule for when the ZyXEL Device is to send the logs and which logs and/or immediate alerts the ZyXEL Device is to record.
  • Page 227: Figure 134 Log Settings

    If this field is left blank, logs and alert messages will not be sent via E-mail. Mail Subject Type a title that you want to be in the subject line of the log e-mail message that the ZyXEL Device sends. Not all ZyXEL models have this field. Chapter 18 Logs...
  • Page 228: Example E-Mail Log

    LABEL DESCRIPTION Send Log To The ZyXEL Device sends logs to the e-mail address specified in this field. If this field is left blank, the ZyXEL Device does not send logs via e-mail. Send Alerts To Alerts are real-time notifications that are sent as soon as an event, such as a DoS attack, system error, or forbidden web access attempt occurs.
  • Page 229: Log Descriptions

    " message shows that a complete log has been sent. End of Log Figure 135 E-mail Log Example Subject: Firewall Alert From xxxxx Date: Fri, 07 Apr 2000 10:05:42 From: user@zyxel.com user@zyxel.com 1|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |default policy |forward | 09:54:03 |UDP src port:00520 dest port:00520 |<1,00>...
  • Page 230: Table 90 System Error Logs

    P-660HW-T v2 User’s Guide Table 89 System Maintenance Logs (continued) LOG MESSAGE DESCRIPTION Someone has failed to log on to the router via ftp. FTP login failed The maximum number of NAT session table entries has been NAT Session Table is Full! exceeded and the table is full.
  • Page 231: Table 91 Access Control Logs

    P-660HW-T v2 User’s Guide Table 91 Access Control Logs LOG MESSAGE DESCRIPTION Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access Firewall default policy: [TCP | matched the default policy and was blocked or forwarded UDP | IGMP | ESP | GRE | OSPF] according to the default policy’s setting. <Packet Direction>...
  • Page 232: Table 93 Packet Filter Logs

    P-660HW-T v2 User’s Guide Table 92 TCP Reset Logs (continued) LOG MESSAGE DESCRIPTION The router sent a TCP reset packet when the number of Exceed MAX incomplete, incomplete connections (TCP and UDP) exceeded the user- sent TCP RST configured threshold. (Incomplete count is for all TCP and UDP connections through the firewall.)Note: When the number of incomplete connections (TCP + UDP) >...
  • Page 233: Table 95 Cdr Logs

    P-660HW-T v2 User’s Guide Table 95 CDR Logs LOG MESSAGE DESCRIPTION The router received the setup requirements for a call. “call” is board%d line%d channel%d, the reference (count) number of the call. “dev” is the device call%d,%s C01 Outgoing Call type (3 is for dial-up, 6 is for PPPoE, 10 is for PPTP).
  • Page 234: Table 99 Attack Logs

    The ZyXEL Device cannot get the IP address of the external content DNS resolving failed filtering via DNS query. Creating socket failed The ZyXEL Device cannot issue a query because TCP/IP socket creation failed, port:port number. The connection to the external content filtering server failed.
  • Page 235: Table 100 Ipsec Logs

    P-660HW-T v2 User’s Guide Table 99 Attack Logs (continued) LOG MESSAGE DESCRIPTION The firewall detected an ICMP IP spoofing attack on the WAN port. ip spoofing - WAN ICMP For type and code details, see Table 106 on page 242. (type:%d, code:%d) The firewall detected an ICMP echo attack.
  • Page 236: Table 101 Ike Logs

    P-660HW-T v2 User’s Guide Table 101 IKE Logs LOG MESSAGE DESCRIPTION The IKE process for a new connection failed because the limit Active connection allowed of simultaneous phase 2 SAs has been reached. exceeded Phase 2 Quick Mode has started. Start Phase 2: Quick Mode The connection failed during IKE phase 2 because the router Verifying Remote ID failed:...
  • Page 237 P-660HW-T v2 User’s Guide Table 101 IKE Logs (continued) LOG MESSAGE DESCRIPTION The security gateway is set to “0.0.0.0” and the router used Remote IP <Remote IP> / the peer’s “Local Address” as the router’s “Remote Address”. <Remote IP> conflicts This information conflicted with static rule #d;...
  • Page 238: Table 102 Pki Logs

    P-660HW-T v2 User’s Guide Table 101 IKE Logs (continued) LOG MESSAGE DESCRIPTION The listed rule’s IKE phase 2 authentication algorithm did not Rule [%d] Phase 2 match between the router and the peer. authentication algorithm mismatch The listed rule’s IKE phase 2 encapsulation did not match Rule [%d] Phase 2 between the router and the peer.
  • Page 239: Table 103 Certificate Path Verification Failure Reason Codes

    P-660HW-T v2 User’s Guide Table 102 PKI Logs (continued) LOG MESSAGE DESCRIPTION The CMP online certificate enrollment was successful. The Destination Enrollment successful field records the certification authority server’s IP address and port. The CMP online certificate enrollment failed. The Destination field Enrollment failed records the certification authority server’s IP address and port.
  • Page 240: Table 104 802.1X Logs

    P-660HW-T v2 User’s Guide Table 103 Certificate Path Verification Failure Reason Codes (continued) CODE DESCRIPTION (Not used) Certificate is not valid. Certificate signature was not verified correctly. Certificate was revoked by a CRL. Certificate was not added to the cache. Certificate decoding failed.
  • Page 241: Table 105 Acl Setting Notes

    ACL set for packets traveling from the LAN to the LAN or ZyXEL Device the ZyXEL Device. (W to W) WAN to WAN/ ACL set for packets traveling from the WAN to the WAN ZyXEL Device or the ZyXEL Device. Chapter 18 Logs...
  • Page 242: Table 106 Icmp Notes

    P-660HW-T v2 User’s Guide Table 106 ICMP Notes TYPE CODE DESCRIPTION Echo Reply Echo reply message Destination Unreachable Net unreachable Host unreachable Protocol unreachable Port unreachable A packet that needed fragmentation was dropped because it was set to Don't Fragment (DF) Source route failed Source Quench A gateway may discard internet datagrams if it does not have the buffer space...
  • Page 243: Table 107 Syslog Logs

    P-660HW-T v2 User’s Guide Table 107 Syslog Logs LOG MESSAGE DESCRIPTION "This message is sent by the system ("RAS" displays as the <Facility*8 + Severity>Mon dd system name if you haven’t configured one) when the router hr:mm:ss hostname generates a syslog. The facility is defined in the web MAIN src="<srcIP:srcPort>"...
  • Page 244 P-660HW-T v2 User’s Guide Chapter 18 Logs...
  • Page 245: Chapter 19 Tools

    ZyXEL Device. 19.1 Firmware Upgrade Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a .bin extension, for example, "ZyXEL Device.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 246: Figure 137 Firmware Upload In Progress

    Click Upload to begin the upload process. This process may take up to two minutes. Note: Do NOT turn off the ZyXEL Device while firmware upload is in progress! After you see the Firmware Upload in Progress screen, wait two minutes before logging into the ZyXEL Device again.
  • Page 247: Configuration Screen

    Backup configuration allows you to back up (save) the ZyXEL Device’s current configuration to a file on your computer. Once your ZyXEL Device is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
  • Page 248: Restore Configuration

    If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default ZyXEL Device IP address (192.168.1.1). See the appendix for details on how to set up your computer’s IP address.
  • Page 249: Back To Factory Defaults

    19.3 Restart System restart allows you to reboot the ZyXEL Device without turning the power off. Click Maintenance > Tools > Restart. Click Restart to have the ZyXEL Device reboot. This does not affect the ZyXEL Device's configuration. Figure 144 Restart Screen...
  • Page 250 P-660HW-T v2 User’s Guide Chapter 19 Tools...
  • Page 251: Chapter 20 Diagnostic

    P-660HW-T v2 User’s Guide H A P T E R Diagnostic These read-only screens display information to help you identify problems with the ZyXEL Device. 20.1 General Diagnostic Click Maintenance > Diagnostic to open the screen shown next. Figure 145 Diagnostic: General The following table describes the fields in this screen.
  • Page 252: Dsl Line Diagnostic

    Click this button to start the ATM loopback test. Make sure you have configured at Test least one PVC with proper VPIs/VCIs before you begin this test. The ZyXEL Device sends an OAM F5 packet to the DSLAM/ATM switch and then returns it (loops it back) to the ZyXEL Device.
  • Page 253: Chapter 21 Troubleshooting

    Make sure that the ZyXEL Device’s power adapter is connected to the ZyXEL Device LEDs turn on and plugged in to an appropriate power source. Make sure that the ZyXEL Device and when I turn on the power source are both turned on.
  • Page 254: Problems With The Wan

    Password (be sure to use the correct casing). Refer to the WAN Setup chapter. I cannot access Make sure the ZyXEL Device is turned on and connected to the network. the Internet. Verify your WAN settings. Refer to the chapter on WAN setup.
  • Page 255: Problems Accessing The Zyxel Device

    Your computer’s and the ZyXEL Device’s IP addresses must be on the same subnet for LAN access. If you changed the ZyXEL Device’s LAN IP address, then enter the new one as the URL. Make sure that pop-up windows, JavaScripts and Java permissions are allowed. See the appendix for how to enable them.
  • Page 256 P-660HW-T v2 User’s Guide Chapter 21 Troubleshooting...
  • Page 257: Product Specifications

    P-660HW-T v2 User’s Guide P P E N D I X Product Specifications See also the Introduction chapter for a general overview of the key features. Specification Tables Table 117 Device Specifications Default IP Address 192.168.1.1 Default Subnet Mask 255.255.255.0 (24 bits) Default Password 1234 DHCP Pool...
  • Page 258: Table 118 Firmware

    P-660HW-T v2 User’s Guide Table 118 Firmware ADSL Standards Multi-Mode standard (ANSI T1.413,Issue 2; G.dmt(G.992.1); G.lite(G992.2)). ADSL2 G.dmt.bis (G.992.3) ADSL2 G.lite.bis (G.992.4) ADSL2+ (G.992.5) Reach-Extended ADSL (RE ADSL) SRA (Seamless Rate Adaptation) Auto-negotiating rate adaptation ADSL physical connection ATM AAL5 (ATM Adaptation Layer type 5) Multi-protocol over AAL5 (RFC2684/1483) PPP over ATM AAL5 (RFC 2364) PPP over Ethernet (RFC 2516)
  • Page 259 P-660HW-T v2 User’s Guide Table 118 Firmware (continued) Firewall Stateful Packet Inspection. Prevents Denial of Service attacks such as Ping of Death, SYN Flood, LAND, Smurf etc. Real-time E-mail alerts. Reports and logs. NAT/SUA Port Forwarding 1024 NAT sessions Multimedia application PPTP under NAT/SUA IPSec passthrough SIP ALG passthrough...
  • Page 260 P-660HW-T v2 User’s Guide Appendix A Product Specifications...
  • Page 261: Appendix B About Adsl

    P-660HW-T v2 User’s Guide P P E N D I X About ADSL Introduction to DSL DSL (Digital Subscriber Line) technology enhances the data capacity of the existing twisted- pair wire that runs between the local telephone company switching offices and most homes and offices.
  • Page 262 P-660HW-T v2 User’s Guide 2 Because your line is dedicated (not shared), transmission speeds between you and the device to which you connect at your service provider are not affected by other users. With cable modems, transmission speeds drop significantly as more users go on-line because the line is shared.
  • Page 263: Appendix C Internal Sptgen

    – eliminating the need to navigate and configure individual screens for each ZyXEL Device. You can use FTP to get the Internal SPTGEN file. Then edit the file in a text editor and use FTP to upload it again to the same device or another one.
  • Page 264: Internal Sptgen Ftp Download Example

    Figure 147 on page 263), then you disable every field in this menu. If you enter a parameter that is invalid in the Input column, the ZyXEL Device will not save the configuration and the command line will display the Field Identification Number.
  • Page 265: Internal Sptgen Ftp Upload Example

    2 Enter " ". The command “ ” sets the transfer mode to binary. 3 Upload your “ ” file from your computer to the ZyXEL Device using the “ ” rom-t command. computer to the ZyXEL Device. 4 Exit this FTP application.
  • Page 266: Example Internal Sptgen Menus

    MEANING Field Identification Number Field Name Parameter Values Allowed INPUT An example of what you may enter Applies to the ZyXEL Device. Table 120 Menu 1 General Setup / Menu 1 General Setup INPUT 10000000 = Configured <0(No) | 1(Yes)>...
  • Page 267 P-660HW-T v2 User’s Guide Table 121 Menu 3 30100012 = Output protocol filters Set 4 = 256 30100013 = Output device filters Set 1 = 256 30100014 = Output device filters Set 2 = 256 30100015 = Output device filters Set 3 = 256 30100016 = Output device filters Set 4...
  • Page 268 P-660HW-T v2 User’s Guide Table 121 Menu 3 30201005 = Version <0(Rip-1) | 1(Rip-2B) |2(Rip-2M)> 30201006 = IP Alias #1 Incoming protocol filters = 256 Set 1 30201007 = IP Alias #1 Incoming protocol filters = 256 Set 2 30201008 = IP Alias #1 Incoming protocol filters = 256 Set 3...
  • Page 269 P-660HW-T v2 User’s Guide Table 121 Menu 3 INPUT 30500001 = ESSID Wireless 30500002 = Hide ESSID <0(No) | 1(Yes)> 30500003 = Channel ID <1|2|3|4|5|6|7 |8|9|10|11|12| 13> 30500004 = RTS Threshold <0 ~ 2432> = 2432 30500005 = FRAG. Threshold <256 ~ 2432>...
  • Page 270: Table 122 Menu 4 Internet Access Setup

    P-660HW-T v2 User’s Guide Table 122 Menu 4 Internet Access Setup / Menu 4 Internet Access Setup INPUT 40000000 = Configured <0(No) | 1(Yes)> 40000001 = <0(No) | 1(Yes)> 40000002 = Active <0(No) | 1(Yes)> 40000003 = ISP's Name = ChangeMe 40000004 = Encapsulation <2(PPPOE) |...
  • Page 271: Table 123 Menu 12

    P-660HW-T v2 User’s Guide Table 122 Menu 4 Internet Access Setup (continued) 40000027 = ATM QoS Type <0(CBR) | (1 (UBR)> 40000028 = Peak Cell Rate (PCR) 40000029 = Sustain Cell Rate (SCR) 40000030 = Maximum Burst Size(MBS) 40000031= RIP Direction <0(None) | 1(Both) | 2(In Only) | 3(Out...
  • Page 272: Table 124 Menu 15 Sua Server Setup

    P-660HW-T v2 User’s Guide Table 124 Menu 15 SUA Server Setup / Menu 15 SUA Server Setup INPUT 150000001 = SUA Server IP address for default = 0.0.0.0 port 150000002 = SUA Server #2 Active <0(No) | 1(Yes)> 150000003 = SUA Server #2 Protocol <0(All)|6(TCP)|17(U DP)>...
  • Page 273: Table 125 Menu 21.1 Filter Set #1

    P-660HW-T v2 User’s Guide Table 124 Menu 15 SUA Server Setup (continued) 150000031 = SUA Server #7 Local IP address = 0.0.0.0 150000032 = SUA Server #8 Active <0(No) | 1(Yes)> 150000033 = SUA Server #8 Protocol <0(All)|6(TCP)|17(U DP)> 150000034 = SUA Server #8 Port Start 150000035 = SUA Server #8 Port End...
  • Page 274 P-660HW-T v2 User’s Guide Table 125 Menu 21.1 Filter Set #1 (continued) 210101002 = IP Filter Set 1,Rule 1 Active <0(No)|1(Yes)> 210101003 = IP Filter Set 1,Rule 1 Protocol 210101004 = IP Filter Set 1,Rule 1 Dest IP address = 0.0.0.0 210101005 = IP Filter Set 1,Rule 1 Dest Subnet Mask 210101006 =...
  • Page 275: Table 126 Menu 21.1 Filer Set #2

    P-660HW-T v2 User’s Guide Table 125 Menu 21.1 Filter Set #1 (continued) 210102013 = IP Filter Set 1,Rule 2 Act Match <1(check next)|2(forward)| 3(drop)> 210102014 = IP Filter Set 1,Rule 2 Act Not Match <1(check next)|2(forward)| 3(drop)> Table 126 Menu 21.1 Filer Set #2, / Menu 21.1 filter set #2, INPUT 210200001 =...
  • Page 276: Table 127 Menu 23 System Menus

    P-660HW-T v2 User’s Guide Table 126 Menu 21.1 Filer Set #2, (continued) 210202001 = IP Filter Set 2, Rule 2 Type <0(none)|2(TCP/IP)> = 2 210202002 = IP Filter Set 2, Rule 2 Active <0(No)|1(Yes)> 210202003 = IP Filter Set 2, Rule 2 Protocol 210202004 = IP Filter Set 2, Rule 2 Dest IP = 0.0.0.0...
  • Page 277: Table 128 Menu 24.11 Remote Management Control

    P-660HW-T v2 User’s Guide Table 127 Menu 23 System Menus (continued) 230200005 = Authentication Server Shared Secret 111111111111 111111111111 1111 230200006 = Accounting Server Configured <0(No) | 1(Yes)> 230200007 = Accounting Server Active <0(No) | 1(Yes)> 230200008 = Accounting Server IP Address 192.168.1.44 230200009 = Accounting Server Port...
  • Page 278: Command Examples

    |3(Wan)> 241100009 = WEB Server Secured IP address = 0.0.0.0 Command Examples The following are example Internal SPTGEN screens associated with the ZyXEL Device’s command interpreter commands. Table 129 Command Examples INPUT /ci command (for annex a): wan adsl opencmd...
  • Page 279: Wall-Mounting Instructions

    4 Make sure the screws are snugly fastened to the wall. They need to hold the weight of the ZyXEL Device with the connection cables. 5 Align the holes on the back of the ZyXEL Device with the screws on the wall. Hang the ZyXEL Device on the screws.
  • Page 280 P-660HW-T v2 User’s Guide Appendix D Wall-mounting Instructions...
  • Page 281: Setting Up Your Computer's Ip Address

    After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the ZyXEL Device’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
  • Page 282: Figure 153 Windows 95/98/Me: Network: Configuration

    P-660HW-T v2 User’s Guide Figure 153 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 283: Figure 154 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    P-660HW-T v2 User’s Guide 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
  • Page 284: Windows 2000/Nt/Xp

    5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your ZyXEL Device and restart your computer when prompted. Verifying Settings 1 Click Start and then Run.
  • Page 285: Figure 156 Windows Xp: Start Menu

    P-660HW-T v2 User’s Guide Figure 156 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 157 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Appendix E Setting up Your Computer’s IP Address...
  • Page 286: Figure 158 Windows Xp: Control Panel: Network Connections: Properties

    P-660HW-T v2 User’s Guide Figure 158 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 159 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 287: Figure 160 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    P-660HW-T v2 User’s Guide • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. Figure 160 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK.
  • Page 288: Figure 161 Windows Xp: Advanced Tcp/Ip Properties

    P-660HW-T v2 User’s Guide Figure 161 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). •...
  • Page 289: Macintosh Os 8/9

    10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.
  • Page 290: Figure 163 Macintosh Os 8/9: Apple Menu

    P-660HW-T v2 User’s Guide Figure 163 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 164 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: Appendix E Setting up Your Computer’s IP Address...
  • Page 291: Macintosh Os X

    • Type your subnet mask in the Subnet mask box. • Type the IP address of your ZyXEL Device in the Router address box. 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration.
  • Page 292: Linux

    • Type your subnet mask in the Subnet mask box. • Type the IP address of your ZyXEL Device in the Router address box. 5 Click Apply Now and close the window. 6 Turn on your ZyXEL Device and restart your computer (if prompted).
  • Page 293: Figure 167 Red Hat 9.0: Kde: Network Configuration: Devices

    P-660HW-T v2 User’s Guide Note: Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. 1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network.
  • Page 294: Figure 169 Red Hat 9.0: Kde: Network Configuration: Dns

    P-660HW-T v2 User’s Guide • If you have a static IP address click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields. 3 Click OK to save the changes and close the Ethernet Device General screen. 4 If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen.
  • Page 295: Figure 171 Red Hat 9.0: Dynamic Ip Address Setting In Ifconfig-Eth0

    P-660HW-T v2 User’s Guide • If you have a dynamic IP address, enter in the dhcp BOOTPROTO= field. The following figure shows an example. Figure 171 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp USERCTL=no PEERDNS=yes TYPE=Ethernet •...
  • Page 296: Figure 174 Red Hat 9.0: Restart Ethernet Card

    P-660HW-T v2 User’s Guide Figure 174 Red Hat 9.0: Restart Ethernet Card [root@localhost init.d]# network restart Shutting down interface eth0: [OK] Shutting down loopback interface: [OK] Setting network parameters: [OK] Bringing up loopback interface: [OK] Bringing up interface eth0: [OK] Verifying Settings Enter in a terminal screen to check your TCP/IP properties.
  • Page 297: Appendix Fip Subnetting

    P-660HW-T v2 User’s Guide P P E N D I X IP Subnetting This appendix introduces addresses, IP address classes and subnet masks. Introduction to IP Addresses An IP address is made up of four octets, written in dotted decimal notation (for example, 192.168.1.1).
  • Page 298: Subnet Masks

    P-660HW-T v2 User’s Guide A class A address (3 host octets: 24 host bits) can have 2 – 2 hosts, or approximately 16 million hosts. IP Address Classes and Network ID The value of the first octet of an IP address determines the class of an address. •...
  • Page 299: Subnetting

    P-660HW-T v2 User’s Guide Table 132 “Natural” Masks (continued) CLASS NATURAL MASK 255.255.0.0 255.255.255.0 Subnetting With subnetting, the class arrangement of an IP address is ignored. For example, a class C address no longer has to have 24 bits of network number and 8 bits of host ID. With subnetting, some of the host ID bits are converted into network number bits.
  • Page 300: Example: Two Subnets

    P-660HW-T v2 User’s Guide Example: Two Subnets As an example, you have a class “C” address 192.168.1.0 with subnet mask of 255.255.255.0. Table 134 Two Subnets Example IP/SUBNET MASK NETWORK NUMBER HOST ID IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask 255.255.255.
  • Page 301: Example: Four Subnets

    P-660HW-T v2 User’s Guide Table 136 Subnet 2 (continued) IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE Subnet Address: Lowest Host ID: 192.168.1.129 192.168.1.128 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Host IDs of all zeros represent the subnet itself and host IDs of all ones are the broadcast address for that subnet, so the actual number of hosts available on each subnet in the example above is 2 –...
  • Page 302: Example Eight Subnets

    P-660HW-T v2 User’s Guide Table 138 Subnet 2 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: 192.168.1.64 Lowest Host ID: 192.168.1.65 Broadcast Address: 192.168.1.127 Highest Host ID: 192.168.1.126 Table 139 Subnet 3 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE IP Address...
  • Page 303: Subnetting With Class A And Class B Networks

    P-660HW-T v2 User’s Guide Table 141 Eight Subnets (continued) BROADCAST SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS ADDRESS The following table is a summary for class “C” subnet planning. Table 142 Class C Subnet Planning NO. “BORROWED” HOST NO. HOSTS PER SUBNET MASK NO.
  • Page 304 P-660HW-T v2 User’s Guide Table 143 Class B Subnet Planning (continued) NO. “BORROWED” HOST NO. HOSTS PER SUBNET MASK NO. SUBNETS BITS SUBNET 255.255.255.0 (/24) 255.255.255.128 (/25) 255.255.255.192 (/26) 1024 255.255.255.224 (/27) 2048 255.255.255.240 (/28) 4096 255.255.255.248 (/29) 8192 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768...
  • Page 305: Appendix G Command Interpreter

    1 Connect your computer to the ETHERNET port on the ZyXEL Device. 2 Make sure your computer IP address and the ZyXEL Device IP address are on the same subnet. In Windows, click Start (usually in the bottom left corner), Run and then type (the default ZyXEL Device IP address) and click OK.
  • Page 306: Log Commands

    3 to record both logs and alerts for that category. Not every parameter is available with every category. 5 Use the sys logs save command to store the settings in the ZyXEL Device (you must do this in order to record logs).
  • Page 307: Log Command Example

    • Use the sys logs clear command to erase all of the ZyXEL Device’s logs. Log Command Example This example shows how to set the ZyXEL Device to record the access logs and alerts and then view the results. ras> sys logs load ras>...
  • Page 308 P-660HW-T v2 User’s Guide Appendix G Command Interpreter...
  • Page 309: Appendix H Firewall Commands

    P-660HW-T v2 User’s Guide P P E N D I X Firewall Commands The following describes the firewall commands. Table 144 Firewall Commands FUNCTION COMMAND DESCRIPTION Firewall SetUp This command turns the firewall on or off. config edit firewall active <yes | no>...
  • Page 310 This command sets the day on which the config edit firewall e-mail current firewall log is sent through e-mail if the day <sunday | monday | tuesday ZyXEL Device is set to send it on a weekly | wednesday | thursday | friday basis. | saturday>...
  • Page 311 This command sets the threshold of half-open config edit firewall attack TCP sessions with the same destination tcp-max-incomplete <0-255> where the ZyXEL Device starts dropping half- open sessions to that destination. Sets This command sets a name to identify a config edit firewall set <set...
  • Page 312 ZyXEL Device check for traffic with this #> rule <rule #> srcaddr- individual source address. single <ip address> This command sets a rule to have the ZyXEL config edit firewall set <set Device check for traffic from a particular #> rule <rule #> srcaddr- subnet (defined by IP address and subnet subnet <ip address>...
  • Page 313 ZyXEL Device check for traffic with this #> rule <rule #> destaddr- individual destination address. single <ip address> This command sets a rule to have the ZyXEL config edit firewall set <set Device check for traffic with a particular #> rule <rule #> destaddr- subnet destination (defined by IP address and subnet <ip address>...
  • Page 314 P-660HW-T v2 User’s Guide Table 144 Firewall Commands (continued) FUNCTION COMMAND DESCRIPTION This command removes the specified rule in a config delete firewall set firewall configuration set. <set #> rule<rule #> Appendix H Firewall Commands...
  • Page 315: Netbios Filter Commands

    • Allow or disallow NetBIOS packets to initiate calls. Display NetBIOS Filter Settings Syntax: sys filter netbios disp This command gives a read-only list of the current NetBIOS filter modes for The ZyXEL Device. NetBIOS Display Filter Settings Command Example =========== NetBIOS Filter Status ===========...
  • Page 316: Netbios Filter Configuration

    P-660HW-T v2 User’s Guide The filter types and their default settings are as follows. Table 145 NetBIOS Filter Default Settings NAME DESCRIPTION EXAMPLE Between LAN This field displays whether NetBIOS packets are blocked or forwarded Block and WAN between the LAN and the WAN. IPSec Packets This field displays whether NetBIOS packets sent through a VPN Forward connection are blocked or forwarded.
  • Page 317: Splitters And Microfilters

    Figure 178 Connecting a POTS Splitter 1 Connect the side labeled “Phone” to your telephone. 2 Connect the side labeled “Modem” or “DSL” to your ZyXEL Device. 3 Connect the side labeled “Line” to the telephone wall jack. Telephone Microfilters Telephone voice transmissions take place in the lower frequency range, 0 - 4KHz, while ADSL transmissions take place in the higher bandwidth range, above 4KHz.
  • Page 318: Figure 179 Connecting A Microfilter

    2 Connect a cable from the double jack end of the Y-Connector to the “wall side” of the microfilter. 3 Connect another cable from the double jack end of the Y-Connector to the ZyXEL Device. 4 Connect the “phone side” of the microfilter to your telephone as shown in the following figure.
  • Page 319: Zyxel Device With Isdn

    P-660HW-T v2 User’s Guide ZyXEL Device With ISDN This section relates to people who use their ZyXEL Device with ADSL over ISDN (digital telephone service) only. The following is an example installation for the ZyXEL Device with ISDN. Figure 181 ZyXEL Device with ISDN...
  • Page 320 P-660HW-T v2 User’s Guide Appendix J Splitters and Microfilters...
  • Page 321: Appendix K Wireless Lans

    P-660HW-T v2 User’s Guide P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C).
  • Page 322: Figure 183 Basic Service Set

    P-660HW-T v2 User’s Guide Figure 183 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
  • Page 323: Channel

    P-660HW-T v2 User’s Guide Figure 184 Infrastructure WLAN Channel IEEE802.11a/b/g wireless devices operate in the 2.4GHz radio band. This range of frequencies is divided up into channels.The channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel from an adjacent AP (access point) to reduce interference.
  • Page 324: Fragmentation Threshold

    P-660HW-T v2 User’s Guide Figure 185 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 325: Preamble Type

    P-660HW-T v2 User’s Guide A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
  • Page 326: Wireless Security Overview

    Wi-Fi Protected Access (WPA) Most Secure WPA2 Note: You must enable the same wireless security settings on the ZyXEL Device and on all wireless clients that you want to associate with it. RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting.
  • Page 327: Types Of Authentication

    P-660HW-T v2 User’s Guide Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. •...
  • Page 328 P-660HW-T v2 User’s Guide EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text.
  • Page 329: Dynamic Wep Key Exchange

    P-660HW-T v2 User’s Guide Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen.
  • Page 330 P-660HW-T v2 User’s Guide Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. Encryption Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x.
  • Page 331: Wireless Client Wpa Supplicants

    P-660HW-T v2 User’s Guide User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
  • Page 332: Figure 186 Wpa(2) With Radius Application Example

    P-660HW-T v2 User’s Guide Figure 186 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters (including spaces and symbols).
  • Page 333: Security Parameters Summary

    P-660HW-T v2 User’s Guide Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 149 Wireless Security Relational Matrix AUTHENTICATION ENCRYPTION...
  • Page 334 P-660HW-T v2 User’s Guide Appendix K Wireless LANs...
  • Page 335: Pop-Up Windows, Javascripts And Java Permissions

    P-660HW-T v2 User’s Guide P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). •...
  • Page 336: Figure 189 Internet Options

    P-660HW-T v2 User’s Guide Figure 189 Internet Options 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen.
  • Page 337: Figure 190 Internet Options (2)

    P-660HW-T v2 User’s Guide Figure 190 Internet Options (2) 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1. 4 Click Add to move the IP address to the list of Allowed sites. Appendix L Pop-up Windows, JavaScripts and Java Permissions...
  • Page 338: Javascripts

    P-660HW-T v2 User’s Guide Figure 191 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 339: Figure 192 Internet Options (3)

    P-660HW-T v2 User’s Guide Figure 192 Internet Options (3) 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window.
  • Page 340: Figure 193 Security Settings - Java Scripting

    P-660HW-T v2 User’s Guide Figure 193 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
  • Page 341: Figure 194 Security Settings - Java

    P-660HW-T v2 User’s Guide Figure 194 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Appendix L Pop-up Windows, JavaScripts and Java Permissions...
  • Page 342: Figure 195 Java (Sun)

    P-660HW-T v2 User’s Guide Figure 195 Java (Sun) Appendix L Pop-up Windows, JavaScripts and Java Permissions...
  • Page 343: Appendix M Triangle Route

    Triangle Route The Ideal Setup When the firewall is on, your ZyXEL Device acts as a secure gateway between your LAN and the Internet. In an ideal network topology, all incoming and outgoing network traffic passes through the ZyXEL Device to protect your LAN against attacks.
  • Page 344: The "Triangle Route" Solutions

    WAN. 2 The ZyXEL Device reroutes the packet to Gateway A, which is in Subnet 2. 3 The reply from WAN goes through the ZyXEL Device to the computer on the LAN in Subnet 1. Figure 198 IP Alias...
  • Page 345: Index

    P-660HW-T v2 User’s Guide Index Numerics auto-negotiating auxiliary gateway 4-port switch 31, 36 backup backup gateway AAL5 backup settings access point backup type see AP bandwidth 35, 69, 259 address assignment budget Address Resolution Protocol bandwidth management 69, 179 see ARP bandwidth manager ad-hoc class configuration...
  • Page 346 P-660HW-T v2 User’s Guide computer name 219, 220 disclaimer configuration 31, 112, 245, 247, 294 112, 202 backup domain name 113, 130, 219, 220 restore 247, 248 Domain Name System upload see DNS configuration text file 34, 138, 139, 167 connection failure basics connection settings...
  • Page 347 P-660HW-T v2 User’s Guide factory defaults 247, 249 half-open sessions fairness-based scheduler help FCC interference statement hidden node feedback hide SSID File Transfer Protocol host 220, 221 see FTP host name filename extension HTTP 130, 138, 139, 140, 245 filtering 33, 36 finger humidity...
  • Page 348 P-660HW-T v2 User’s Guide IP alias Message Integrity Check see MIC IP pool setup metric IP protocol type IP spoofing 140, 143 ISDN microfilter multicast multi-mode multiplexing LLC-based VC-based multiprotocol encapsulation LAN setup LAN TCP/IP LAN to WAN rules LAND 140, 141 nailed-up connection local (user) database...
  • Page 349 Point to Point Protocol over ATM Adaptation Layer 5 Request To Send (AAL5) see RTS Point-to Point Protocol reset see PPP reset button point-to-point resetting the ZyXEL device point-to-point protocol over ATM restart 245, 249 Point-to-Point Protocol over Ethernet restore configuration see PPPoE restore settings Point-to-Point Tunneling Protocol...
  • Page 350 SSID traffic redirect 34, 89, 90, 91 hide traffic shaping stateful inspection 34, 137, 138, 143 transmission rates and the ZyXEL device triangle route process solutions static route 175, 259 triple play troubleshooting SUA vs NAT access...
  • Page 351 VPI WPA2-PSK Voice over IP WPA-PSK see VoIP VoIP 69, 70 34, 77 zero configuration Internet access 34, 80 ZyXEL’s firewall introduction wall-mounting 257, 279 backup WAN setup WAN to LAN rules warranty note web configurator 31, 41, 43, 44, 146, 151...

Table of Contents