Summary of Contents for ZyXEL Communications ZYWALL2 ET 2WE
Page 1
ZyWALL 2 Series Internet Security Gateway User’s Guide Version 3.62 February 2004...
Page 2
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
Page 3
Certifications 1. Go to www.zyxel.com 2. Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. 3. Select the certification you wish to view from this page...
ZyWALL 2 Series User’s Guide Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company.
Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid.
Brief description of the problem and the steps you took to solve it. METHOD SUPPORT E-MAIL TELEPHONE WEB SITE REGULAR MAIL SALES E-MAIL FTP SITE LOCATION WORLDWIDE support@zyxel.com.tw +886-3-578-3942 www.zyxel.com ZyXEL Communications Corp. 6 Innovation Road II www.europe.zyxel.com Science Park Hsinchu 300 sales@zyxel.com.tw +886-3-578-2439 ftp.zyxel.com Taiwan ftp.europe.zyxel.com NORTH AMERICA support@zyxel.com +1-800-255-4101 www.us.zyxel.com...
ZyWALL 2 Series User’s Guide Table of Contents Copyright..............................ii Federal Communications Commission (FCC) Interference Statement..........iii Information for Canadian Users .......................iv ZyXEL Limited Warranty ..........................v Customer Support ............................vi List of Figures ............................xv List of Tables ............................xxii Preface ..............................xxvi Getting Started ..............................I Chapter 1 Getting to Know Your ZyWALL ..................
Page 8
ZyWALL 2 Series User’s Guide Configuring IP ..........................5-3 Configuring Static DHCP ......................5-6 Configuring IP Alias ........................5-7 WAN and Wireless LAN..........................III Chapter 6 WAN Screens...........................6-1 WAN Overview ..........................6-1 TCP/IP Priority (Metric) ......................6-1 WAN IP Address Assignment ....................6-1 Configuring Route ........................6-2 Configuring WAN ISP........................6-3 Configuring WAN IP........................6-9 Configuring WAN MAC ......................6-13...
Page 9
ZyWALL 2 Series User’s Guide 10.3 Introduction to Nortel Networks Firewall ................10-2 10.4 Denial of Service........................10-3 10.5 Stateful Inspection........................ 10-7 10.6 Guidelines For Enhancing Security With Your Firewall ........... 10-11 10.7 Packet Filtering Vs Firewall....................10-11 Chapter 11 Firewall Screens ........................11-1 11.1 Access Methods ........................
Page 10
ZyWALL 2 Series User’s Guide 14.13 Configuring Advanced IKE Setup ..................14-24 14.14 Manual Key Setup.......................14-28 14.15 Configuring Edit Manual Setup ..................14-28 14.16 SA Monitor .........................14-33 14.17 Global Settings........................14-34 14.18 Telecommuter VPN/IPSec Examples .................14-35 14.19 VPN and Remote Management...................14-38 Certificates ..............................VII Chapter 15 Certificates ..........................15-1 15.1 Certificates Overview ......................15-1...
Page 11
ZyWALL 2 Series User’s Guide 17.9 Secure Telnet Using SSH Examples .................. 17-16 17.10 Secure FTP Using SSH Example ..................17-18 17.11 Telnet ..........................17-19 17.12 Configuring TELNET ......................17-20 17.13 Configuring FTP ........................ 17-21 17.14 Configuring SNMP ......................17-22 17.15 Configuring DNS .......................
Page 12
ZyWALL 2 Series User’s Guide 23.3 Configuring Dial Backup in Menu 2..................23-2 23.4 Advanced WAN Setup......................23-3 23.5 Remote Node Profile (Backup ISP) ..................23-5 23.6 Editing PPP Options ......................23-8 23.7 Editing TCP/IP Options ......................23-9 23.8 Editing Login Script......................23-11 23.9 Remote Node Filter......................23-12 Chapter 24 LAN Setup...........................24-1 24.1 Introduction to LAN Setup ....................24-1...
Page 13
ZyWALL 2 Series User’s Guide 30.5 Firewall Versus Filters ....................... 30-16 30.6 Applying a Filter ........................ 30-17 Chapter 31 SNMP Configuration ......................31-1 31.1 SNMP Configuration......................31-1 31.2 SNMP Traps......................... 31-2 SMT System Maintenance......................... XIII Chapter 32 System Information & Diagnosis..................32-1 32.1 Introduction to System Status ....................
Page 14
ZyWALL 2 Series User’s Guide Appendix F Types of EAP Authentication ..................... F-1 Appendix G PPPoE ..........................G-1 Appendix H PPTP ...........................H-1 Appendix I IP Subnetting ........................I-1 Appendix J Safety Warnings and Instructions ..................J-1 Command, Log Appendices and Index .....................XVI Appendix K Command Interpreter .......................K-1 Appendix L Firewall Commands ......................
ZyWALL 2 Series User’s Guide List of Figures Figure 1-1 Secure Internet Access via Cable, DSL or Wireless Modem............1-6 Figure 1-2 Secure Internet Access and VPN Application................1-7 Figure 2-1 Change Password Screen......................2-1 Figure 2-2 Replace Certificate Screen ......................2-2 Figure 2-3 Example Xmodem Upload ......................
Page 16
ZyWALL 2 Series User’s Guide Figure 8-3 Multiple Servers Behind NAT Example..................8-6 Figure 8-4 SUA Server ...........................8-7 Figure 8-5 Address Mapping ..........................8-9 Figure 8-6 Address Mapping Rule........................8-10 Figure 8-7 Trigger Port Forwarding Example....................8-12 Figure 8-8 Trigger Port ..........................8-13 Figure 9-1 Example of Static Routing Topology ....................9-1 Figure 9-2 Static Route Screen ........................9-2 Figure 9-3 Edit IP Static Route ........................9-3 Figure 10-1 ZyWALL Firewall Application ....................10-3...
Page 17
ZyWALL 2 Series User’s Guide Figure 14-9 Advanced ....................14-25 IKE VPN Rule Setup Figure 14-10 Manual VPN Rule Setup ...................... 14-29 Figure 14-11 VPN SA Monitor ........................14-33 Figure 14-12 VPN Global Setting......................14-34 Figure 14-13 Telecommuters Sharing One VPN Rule Example ..............14-36 Figure 14-14 Telecommuters Using Unique VPN Rules Example ............
Page 18
ZyWALL 2 Series User’s Guide Figure 17-21 SNMP Management Model....................17-23 Figure 17-22 SNMP............................17-25 Figure 17-23 DNS............................17-27 Figure 17-24 Security ..........................17-28 Figure 18-1 Configuring UPnP........................18-3 Figure 18-2 UPnP Ports ..........................18-4 Figure 19-1 View Log...........................19-2 Figure 19-2 Log Settings ..........................19-4 Figure 19-3 Reports ............................19-7 Figure 19-4 Web Site Hits Report Example....................19-8 Figure 19-5 Protocol/Port Report Example ....................19-9 Figure 19-6 LAN IP Address Report Example ...................19-10...
Page 19
ZyWALL 2 Series User’s Guide Figure 23-9 Menu 11.5: Dial Backup Remote Node Filter ................ 23-13 Figure 24-1 Menu 3: LAN Setup ......................... 24-1 Figure 24-2 Menu 3.1: LAN Port Filter Setup ..................... 24-2 Figure 24-3 Menu 3: TCP/IP and DHCP Setup.................... 24-2 Figure 24-4 Menu 3.2: TCP/IP and DHCP Ethernet Setup ................
Page 20
ZyWALL 2 Series User’s Guide Figure 28-20 Example 4: Menu 15.1.1.1: Address Mapping Rule .............28-16 Figure 28-21 Example 4: Menu 15.1.1: Address Mapping Rules...............28-16 Figure 28-22 Trigger Port Forwarding Process: Example ................28-17 Figure 28-23 Menu 15.3: Trigger Port Setup....................28-18 Figure 29-1 Menu 21: Filter and Firewall Setup...................29-1 Figure 29-2 Menu 21.2: Firewall Setup ......................29-2 Figure 30-1 Outgoing Packet Filtering Process ....................30-2 Figure 30-2 Filter Rule Process ........................30-3...
Page 21
ZyWALL 2 Series User’s Guide Figure 33-12 Successful Restoration Confirmation Screen ............... 33-10 Figure 33-13 Telnet Into Menu 24.7.1: Upload System Firmware..............33-11 Figure 33-14 Telnet Into Menu 24.7.2: System Maintenance ..............33-12 Figure 33-15 FTP Session Example of Firmware File Upload ..............33-13 Figure 33-16 Menu 24.7.1 As Seen Using the Console Port..............
Page 22
ZyWALL 2 Series User’s Guide List of Tables Table 1-1 Model Specific Features .........................1-1 Table 2-1 Web Configurator Screens Summary....................2-4 Table 3-1 Ethernet Encapsulation ........................3-3 Table 3-2 PPPoE Encapsulation........................3-5 Table 3-3 PPTP Encapsulation........................3-7 Table 3-4 Private IP Address Ranges ......................3-8 Table 3-5 Example of Network Properties for LAN Servers with Fixed IP Addresses.........3-10 Table 3-6 Wizard 3............................3-11 Table 4-1 System General Setup........................4-2...
Page 23
ZyWALL 2 Series User’s Guide Table 10-2 ICMP Commands That Trigger Alerts ..................10-6 Table 10-3 Legal NetBIOS Commands ....................... 10-7 Table 10-4 Legal SMTP Commands ......................10-7 Table 11-1 Firewall Rules Summary: First Screen..................11-7 Table 11-2 Creating/Editing A Firewall Rule ....................11-10 Table 11-3 Adding/Editing Source and Destination Addresses..............11-12 Table 11-4 Creating/Editing A Custom Port....................11-13 Table 11-5 Predefined Services........................11-18...
Certifications Refer to the product page at www.zyxel.com for information on product certifications. ZyXEL Glossary and Web Site Please refer to www.zyxel.com for an online glossary of networking terms and additional support documentation. User’s Guide Feedback Help us help you. E-mail all User’s Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications...
Page 27
ZyWALL 2 Series User’s Guide • The version number on the title page is the latest firmware version that is documented in this User’s Guide. Earlier versions may also be included. • “Enter” means for you to type one or more characters and press the carriage return. “Select” or “Choose”...
Getting Started Part I: Getting Started This part helps you get to know your ZyWALL, introduces the web configurator and covers how to configure the Wizard Setup screens.
ZyWALL 2 Series User’s Guide Chapter 1 Getting to Know Your ZyWALL This chapter introduces the main features and applications of the ZyWALL. Introducing the ZyWALL The ZyWALL is an ideal secure gateway for all data passing between the Internet and the LAN. By integrating NAT, firewall and VPN capability, the ZyWALL is a complete security solution that protects your Intranet and efficiently manages data traffic on your network.
ZyWALL 2 Series User’s Guide 1.2.1 Physical Features 4-Port Switch A combination of switch and router makes your ZyWALL a cost-effective and viable network solution. You can connect up to four computers to the ZyWALL without the cost of a hub. Use a hub to add more than four computers to your LAN.
ZyWALL 2 Series User’s Guide The ZyWALL supports two simultaneous VPN connections. X-Auth (Extended Authentication) X-Auth provides added security for VPN by requiring each VPN client to use a username and password. Certificates The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs.
ZyWALL 2 Series User’s Guide Universal Plug and Play (UPnP) Using the standard TCP/IP protocol, the ZyWALL and other UPnP enabled devices can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network. Call Scheduling Configure call time periods to restrict and allow access for users on remote nodes.
ZyWALL 2 Series User’s Guide Central Network Management Central Network Management (CNM) allows an enterprise or service provider network administrator to manage your ZyWALL. The enterprise or service provider network administrator can configure your ZyWALL, perform firmware upgrades and do troubleshooting for you. SNMP SNMP (Simple Network Management Protocol) is a protocol used for exchanging management information between network devices.
ZyWALL 2 Series User’s Guide Management Terminal) interface. The SMT is a menu-driven interface that you can access from a terminal emulator through the console port or over a telnet connection. RoadRunner Support In addition to standard cable modem services, the ZyWALL supports Time Warner’s RoadRunner Service. Logging and Tracing ♦...
ZyWALL 2 Series User’s Guide 1.3.2 Secure Broadband Internet Access and VPN You can connect a cable, DSL or wireless modem to the ZyWALL via Ethernet for broadband Internet access. The ZyWALL also provides IP address sharing and a firewall-protected local network with traffic management.
ZyWALL 2 Series User’s Guide Chapter 2 Introducing the Web Configurator This chapter describes how to access the ZyWALL web configurator and provides an overview of its screens. Web Configurator Overview The embedded web configurator (ewc) allows you to manage the ZyWALL from anywhere through a browser such as Microsoft Internet Explorer or Netscape Navigator.
ZyWALL 2 Series User’s Guide Step 6. Click Apply in the Replace Certificate screen to create a certificate using your ZyWALL’s MAC address that will be specific to this device. This feature is not available on the ZyWALL 2WE. Figure 2-2 Replace Certificate Screen Step 7.
ZyWALL 2 Series User’s Guide 2.3.2 Uploading a Configuration File Via Console Port Step 3. Download the default configuration file from the Nortel Networks FTP site, unzip it and save it in a folder. Step 4. Turn off the ZyWALL, begin a terminal emulation software session and turn on the ZyWALL again.
ZyWALL 2 Series User’s Guide Follow the instructions you see in the MAIN MENU screen or click the icon (located in the top right corner of most screens) to view online help. icon does not appear in the MAIN MENU screen. Click WIZARD for initial configuration including general setup, ISP Parameters for Internet Access and WAN IP/DNS/MAC Address Assignment.
Page 43
ZyWALL 2 Series User’s Guide Table 2-1 Web Configurator Screens Summary LINK FUNCTION SYSTEM General Use this screen to configure general system settings. DDNS Use this screen to configure Dynamic Domain Name System settings. Password Use this screen to change your password. Time Setting Use this screen to change your ZyWALL’s time and date.
Page 44
ZyWALL 2 Series User’s Guide Table 2-1 Web Configurator Screens Summary LINK FUNCTION CONTENT General This screen allows you to enable content filtering and block certain FILTER web features. Categories Use this screen to select which categories of web pages to filter out, as well as to register for external database content filtering and view reports.
Page 45
ZyWALL 2 Series User’s Guide Table 2-1 Web Configurator Screens Summary LINK FUNCTION SNMP Use this screen to configure your ZyWALL’s settings for Simple Network Management Protocol management. Use this screen to configure through which interface(s) and from which IP address(es) users can send DNS queries to the ZyWALL. Security Use this screen to set whether or not the ZyWALL responds to ICMP pings and/or requests for unauthorized services.
ZyWALL 2 Series User’s Guide Chapter 3 Wizard Setup This chapter provides information on the Wizard Setup screens in the web configurator. Wizard Setup Overview The web configurator’s setup wizard helps you configure your device to access the Internet. The second screen has three variations depending on what encapsulation type you use.
ZyWALL 2 Series User’s Guide Figure 3-1 Wizard 1 Internet Access The ZyWALL offers three choices of encapsulation. They are Ethernet, PPTP or PPPoE. 3.3.1 Ethernet Choose Ethernet when the WAN port is used as a regular Ethernet. Wizard Setup...
ZyWALL 2 Series User’s Guide Figure 3-2 Wizard 2: Ethernet Encapsulation The following table describes the labels in this screen. Table 3-1 Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access You must choose the Ethernet option when the WAN port is used as a regular Encapsulation Ethernet.
ZyWALL 2 Series User’s Guide Table 3-1 Ethernet Encapsulation LABEL DESCRIPTION Login Server IP Type the authentication server IP address here if your ISP gave you one. Address Login Server Type the domain name of the Telia login server, for example “login1.telia.com”. (Telia Login only) Alternatively, click the right mouse button to copy and/or paste the IP address.
ZyWALL 2 Series User’s Guide Figure 3-3 Wizard2: PPPoE Encapsulation The following table describes the labels in this screen. Table 3-2 PPPoE Encapsulation LABEL DESCRIPTION ISP Parameter for Internet Access Encapsulation Choose an encapsulation method from the pull-down list box. PPPoE forms a dial-up connection.
Page 52
ZyWALL 2 Series User’s Guide Table 3-2 PPPoE Encapsulation LABEL DESCRIPTION Idle Timeout Type the time in seconds that elapses before the router automatically disconnects from the PPPoE server. The default time is 100 seconds. Click Next to continue. Next Back Click Back to return to the previous screen.
ZyWALL 2 Series User’s Guide Figure 3-4 Wizard 2: PPTP Encapsulation The following table describes the labels in this screen. Table 3-3 PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Select PPTP from the drop-down list box. User Name Type the user name given to you by your ISP.
ZyWALL 2 Series User’s Guide Table 3-3 PPTP Encapsulation LABEL DESCRIPTION My IP Address Type the (static) IP address assigned to you by your ISP. My IP Subnet Type the subnet mask assigned to you by your ISP (if given). Mask Server IP Address Type the IP address of the PPTP server.
Use DNS (Domain Name System) to map a domain name to its corresponding IP address and vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
"rom" file (ZyNOS configuration file). It will not change unless you change the setting or upload a different "rom" file. ZyXEL recommends you clone the MAC address from a computer on your LAN even if your ISP does not require MAC address authentication.
ZyWALL 2 Series User’s Guide Figure 3-5 Wizard 3 The following table describes the labels in this screen. Table 3-6 Wizard 3 LABEL DESCRIPTION WAN IP Address Assignment Get automatically from Select this option If your ISP did not assign you a fixed IP address. This is the default selection.
ZyWALL 2 Series User’s Guide Table 3-6 Wizard 3 LABEL DESCRIPTION Remote IP Subnet Enter the gateway IP subnet mask (if your ISP gave you one) in this field if you Mask selected Use Fixed IP Address. This field is only available when you select PPTP encapsulation in the previous wizard screen.
ZyWALL 2 Series User’s Guide Chapter 4 System Screens This chapter provides information on the System screens. System Overview See the Wizard Setup chapter for more information on the next few screens. Configuring General Setup Click SYSTEM to open the General screen. Figure 4-1 System General Setup The following table describes the fields in this screen.
ZyWALL 2 Series User’s Guide Table 4-1 System General Setup LABEL DESCRIPTION System Name Choose a descriptive name for identification purposes. It is recommended you enter your computer’s “Computer name” in this field (see the Wizard Setup chapter for how to find your computer’s name).
ZyWALL 2 Series User’s Guide Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
ZyWALL 2 Series User’s Guide Figure 4-2 DDNS The following table describes the fields in this screen. Table 4-2 DDNS LABEL DESCRIPTION Active Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. DDNS Type Select the type of service that you are registered for from your Dynamic DNS service provider.
ZyWALL 2 Series User’s Guide Table 4-2 DDNS LABEL DESCRIPTION Host Names 1~3 Enter the host names in the three fields provided. You can specify up to two host names in each field separated by a comma (","). User Enter your user name. Password Enter the password assigned to you.
ZyWALL 2 Series User’s Guide Figure 4-3 Password The following table describes the fields in this screen. Table 4-3 Password LABEL DESCRIPTION Old Password Type the default password or the existing password you use to access the system in this field. New Password Type the new password in this field.
ZyWALL 2 Series User’s Guide Table 4-4 Default Time Servers ntp1.cs.wisc.edu ntp1.gbg.netnod.se ntp2.cs.wisc.edu tock.usno.navy.mil ntp3.cs.wisc.edu ntp.cs.strath.ac.uk ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw Configuring Time Setting To change your ZyWALL’s time and date, click SYSTEM, then the Time Setting tab. The screen appears as shown.
ZyWALL 2 Series User’s Guide Figure 4-4 Time Setting The following table describes the fields in this screen. Table 4-5 Time Setting LABEL DESCRIPTION Time Protocol Select the time service protocol that your time server sends when you turn on the ZyWALL.
Page 71
ZyWALL 2 Series User’s Guide Table 4-5 Time Setting LABEL DESCRIPTION Time Server Enter the address of your time server. Check with your ISP/network administrator if Address you are unsure of this information (the default is tick.stdtime.gov.tw). Synchronize Now Click this button to get the time and date from the time server you specified above. Current Time This field displays the time of your ZyWALL.
ZyWALL 2 Series User’s Guide Chapter 5 LAN Screens This chapter describes how to configure LAN settings. LAN Overview Local Area Network (LAN) is a shared communication system to which many computers are attached. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks.
ZyWALL 2 Series User’s Guide three numbers specify the network number while the last number identifies an individual computer on that network. Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your ZyWALL, but make sure that no other device on your network is using that IP address.
ZyWALL 2 Series User’s Guide RIP Version controls the format and the broadcasting method of the RIP packets that the ZyWALL sends (it recognizes both formats when receiving). RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology. Both RIP-2B and RIP-2M send routing data in RIP-2 format;...
ZyWALL 2 Series User’s Guide Figure 5-1 IP The following table describes the fields in this screen. Table 5-1 IP LABEL DESCRIPTION DHCP Setup...
Page 77
ZyWALL 2 Series User’s Guide Table 5-1 IP LABEL DESCRIPTION DHCP Server DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients (workstations) to obtain TCP/IP configuration at startup from a server. Unless you are instructed by your ISP, leave the DHCP Server check box selected.
ZyWALL 2 Series User’s Guide Table 5-1 IP LABEL DESCRIPTION RIP Version The RIP Version field controls the format and the broadcasting method of the RIP packets that the ZyWALL sends (it recognizes both formats when receiving). RIP-1 is universally supported but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology.
ZyWALL 2 Series User’s Guide Figure 5-2 Static DHCP The following table describes the fields in this screen. Table 5-2 Static DHCP LABEL DESCRIPTION This is the index number of the Static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN. IP Address Type the IP address to be assigned to the device with the MAC address entered above.
ZyWALL 2 Series User’s Guide When you use IP alias, you can also configure firewall rules to control access between the LAN's logical networks (subnets). The following figure shows a LAN divided into subnets A, B, and C. Figure 5-3 Physical Network Figure 5-4 Partitioned Logical Networks.
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Table 5-3 IP Alias LABEL DESCRIPTION IP Alias 1,2 Select the check box to configure another LAN for the ZyWALL. IP Address Enter the IP address of your ZyWALL in dotted decimal notation. IP Subnet Mask Your ZyWALL will automatically calculate the subnet mask based on the IP address that you assign.
ZyWALL 2 Series User’s Guide Chapter 6 WAN Screens This chapter describes how to configure WAN settings. WAN Overview See the LAN chapter for information about Primary and Secondary DNS Server, DNS Server Address Assignment and IP Address and Subnet Mask. TCP/IP Priority (Metric) The metric represents the "cost of transmission".
ZyWALL 2 Series User’s Guide Table 6-1 Private IP Address Ranges 10.0.0.0 10.255.255.255 172.16.0.0 172.31.255.255 192.168.0.0 192.168.255.255 You can obtain your IP address from the IANA, from an ISP or have it assigned by a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks.
ZyWALL 2 Series User’s Guide Figure 6-1 WAN Setup: Route The following table describes the fields in this screen. Table 6-3 WAN Setup: Route LABEL DESCRIPTION The default WAN connection is "1” as your broadband connection via the WAN port should always be your preferred method of accessing the WAN.
ZyWALL 2 Series User’s Guide Figure 6-2 Ethernet Encapsulation The following table describes the fields in this screen. Table 6-4 Ethernet Encapsulation LABEL DESCRIPTION Encapsulation You must choose the Ethernet option when the WAN port is used as a regular Ethernet.
Page 89
ZyWALL 2 Series User’s Guide Table 6-4 Ethernet Encapsulation LABEL DESCRIPTION Reset Click Reset to begin configuring this screen afresh. 6.5.2 PPPoE Encapsulation The ZyWALL supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF Draft standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection.
ZyWALL 2 Series User’s Guide Figure 6-3 PPPoE Encapsulation The following table describes the fields in this screen. Table 6-5 PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation The PPPoE choice is for a dial-up connection using PPPoE. The router supports PPPoE (Point-to-Point Protocol over Ethernet).
Page 91
ZyWALL 2 Series User’s Guide Table 6-5 PPPoE Encapsulation LABEL DESCRIPTION Password Type the password associated with the User Name above. Retype to Type your password again to make sure that you have entered is correctly. Confirm Nailed-Up Select Nailed-Up Connection if you do not want the connection to time out. Connection Idle Timeout This value specifies the time in seconds that elapses before the router automatically...
ZyWALL 2 Series User’s Guide Figure 6-4 PPTP Encapsulation The following table describes the fields in this screen. Table 6-6 PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks.
ZyWALL 2 Series User’s Guide Table 6-6 PPTP Encapsulation LABEL DESCRIPTION User Name Type the user name given to you by your ISP. Password Type the password associated with the User Name above. Retype to Confirm Type your password again to make sure that you have entered is correctly. Nailed-up Select Nailed-Up Connection if you do not want the connection to time out.
ZyWALL 2 Series User’s Guide Figure 6-5 IP Setup The following table describes the fields in this screen. Table 6-7 IP Setup LABEL DESCRIPTION WAN IP Address Assignment Get automatically from Select this option If your ISP did not assign you a fixed IP address. This is the default selection.
Page 95
ZyWALL 2 Series User’s Guide Table 6-7 IP Setup LABEL DESCRIPTION My WAN IP Address (or Enter your WAN IP address in this field if you selected Use Fixed IP Address. IP Address) My WAN IP Subnet Type your network's IP subnet mask. Mask (Ethernet encapsulation only) Remote IP Address (or...
Page 96
ZyWALL 2 Series User’s Guide Table 6-7 IP Setup LABEL DESCRIPTION Private (PPPoE and This parameter determines if the ZyWALL will include the route to this remote PPTP only) node in its RIP broadcasts. If set to Yes, this route is kept private and not included in RIP broadcast.
ZyWALL 2 Series User’s Guide Table 6-7 IP Setup LABEL DESCRIPTION Windows Networking (NetBIOS over TCP/IP): Windows Networking (NetBIOS over TCP/IP): NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast packets that enable a computer to connect to and communicate with a LAN. For some dial-up services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls.
ZyWALL 2 Series User’s Guide The MAC address screen allows users to configure the WAN port's MAC Address by either using the factory default or cloning the MAC address from a computer on your LAN. Choose Factory Default to select the factory assigned default MAC Address.
ZyWALL 2 Series User’s Guide Figure 6-8 Traffic Redirect LAN Setup Configuring Traffic Redirect To change your ZyWALL’s Traffic Redirect settings, click WAN, then the Traffic Redirect tab. The screen appears as shown. WAN Screens 6-15...
ZyWALL 2 Series User’s Guide Figure 6-9 Traffic Redirect The following table describes the fields in this screen. Table 6-8 Traffic Redirect LABEL DESCRIPTION Active Select this check box to have the ZyWALL use traffic redirect if the normal WAN connection goes down.
ZyWALL 2 Series User’s Guide Table 6-8 Traffic Redirect LABEL DESCRIPTION Check WAN Configuration of this field is optional. If you do not enter an IP address here, the ZyWALL IP Address will use the default gateway IP address. Configure this field to test your ZyWALL's WAN accessibility.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 6-9 Dial Backup Setup LABEL DESCRIPTION Enable Dial Backup Select this check box to turn on dial backup. Basic Settings Login Name Type the login name assigned by your ISP. Password Type the password assigned by your ISP.
Page 104
ZyWALL 2 Series User’s Guide Table 6-9 Dial Backup Setup LABEL DESCRIPTION Get IP Address Type the login name assigned by your ISP for this remote node. Automatically from Remote Server Used Fixed IP Select this check box if your ISP assigned you a fixed IP address, then enter the Address IP address in the following field.
Page 105
ZyWALL 2 Series User’s Guide Table 6-9 Dial Backup Setup LABEL DESCRIPTION RIP Version The RIP Version field controls the format and the broadcasting method of the RIP packets that the ZyWALL sends (it recognizes both formats when receiving). Choose RIP-1, RIP-2B or RIP-2M. RIP-1 is universally supported;...
ZyWALL 2 Series User’s Guide Table 6-9 Dial Backup Setup LABEL DESCRIPTION Configure Budget Select this check box to have the dial backup connection on during the time that you select. Allocated Budget Type the amount of time (in minutes) that the dial backup connection can be used during the time configured in the Period field.
ZyWALL 2 Series User’s Guide 6.11.3 Response Strings The response strings tell the ZyWALL the tags, or labels, immediately preceding the various call parameters sent from the WAN device. The response strings have not been standardized; please consult the documentation of your WAN device to find the correct tags. 6.12 Configuring Advanced Modem Setup Click the Edit button in the Dial Backup screen to display the Advanced Setup screen shown next.
ZyWALL 2 Series User’s Guide Figure 6-11 Advanced Setup The following table describes the labels in this screen. Table 6-10 Advanced Setup LABEL DESCRIPTION EXAMPLE AT Command Strings Dial Type the AT Command string to make a call. atdt 6-24 WAN Screens...
Page 109
ZyWALL 2 Series User’s Guide Table 6-10 Advanced Setup LABEL DESCRIPTION EXAMPLE Drop Type the AT Command string to drop a call. "~" represents a one ~~+++~~ath second wait, for example, "~~~+++~~ath" can be used if your modem has a slow response time. Answer Type the AT Command string to answer a call.
ZyWALL 2 Series User’s Guide Chapter 7 Wireless LAN Screens This chapter discusses how to configure Wireless LAN on the ZyWALL 2WE. Wireless LAN Overview This section introduces the wireless LAN (WLAN) and some basic scenarios. 7.1.1 Additional Installation Requirements for Using 802.1x A computer with an IEEE 802.11b wireless LAN card.
ZyWALL 2 Series User’s Guide is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. A and B do not hear each other. They can hear the AP. Figure 7-1 RTS Threshold When station A sends data to the ZyWALL, it might not know that the station B is already using the channel.
ZyWALL 2 Series User’s Guide A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS Threshold size.
ZyWALL 2 Series User’s Guide Configuring Wireless LAN If you are configuring the ZyWALL from a computer connected to the wireless LAN and you change the ZyWALL’s ESSID or WEP settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the ZyWALL’s new settings.
ZyWALL 2 Series User’s Guide Table 7-1 Wireless LABEL DESCRIPTION Enable Wireless The wireless LAN is turned off by default, before you enable the wireless LAN you should configure some security by setting MAC filters and/or 802.1x security; otherwise your wireless LAN will be vulnerable upon enabling it. Select the check box to enable the wireless LAN.
ZyWALL 2 Series User’s Guide Configuring MAC Filter The MAC filter screen allows you to configure the ZyWALL to give exclusive access to specific devices (Allow Association) or exclude specific devices from accessing the ZyWALL (Deny Association). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
ZyWALL 2 Series User’s Guide Table 7-2 MAC Address Filter LABEL DESCRIPTION Active Select or clear the check box to enable or disable MAC address filtering. Enable MAC address filtering to have the router allow or deny access to wireless stations based on MAC addresses.
ZyWALL 2 Series User’s Guide • Access-Request Sent by the ZyWALL requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message.
ZyWALL 2 Series User’s Guide Figure 7-5 EAP Authentication The details below provide a general description of how IEEE 802.1x EAP authentication works. For an example list of EAP-MD5 authentication steps, see the IEEE 802.1x chapter in the Appendices. • The wireless station sends a “start”...
ZyWALL 2 Series User’s Guide Figure 7-6 802.1X Authentication The following table describes the fields in this screen. Table 7-3 802.1X Authentication LABEL DESCRIPTION Authentication Select Authentication Required, No Access or No Authentication Required from Type the drop-down list box. Select Authentication Required to authenticate all wireless stations before they can access the wired network.
ZyWALL 2 Series User’s Guide Chapter 8 Network Address Translation (NAT) This chapter discusses how to configure NAT on the ZyWALL. NAT Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet.
ZyWALL 2 Series User’s Guide local address before forwarding it to the original inside host. Note that the IP address (either local or global) of an outside host is never changed. The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP. In addition, you can designate servers (for example a web server and a telnet server) on your local network and make them accessible to the outside world.
ZyWALL 2 Series User’s Guide 8.1.4 NAT Application The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the ZyWALL can communicate with three distinct WAN networks. More examples follow at the end of this chapter. Figure 8-2 NAT Application With IP Alias 8.1.5 NAT Mapping Types NAT supports five types of IP/port mapping.
ZyWALL 2 Series User’s Guide Many to One: In Many-to-One mode, the ZyWALL maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), the Single User Account feature (the SUA Only option). Many to Many Overload: In Many-to-Many Overload mode, the ZyWALL maps the multiple local IP addresses to shared global IP addresses.
ZyWALL 2 Series User’s Guide 8.2.1 SUA (Single User Account) Versus NAT SUA (Single User Account) is an implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server. The ZyWALL also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types.
ZyWALL 2 Series User’s Guide Table 8-3 Services and Port Numbers SERVICES PORT NUMBER DNS (Domain Name System) Finger HTTP (Hyper Text Transfer protocol or WWW, Web) POP3 (Post Office Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol) SNMP trap PPTP (Point-to-Point Tunneling Protocol) 1723...
ZyWALL 2 Series User’s Guide Configuring SUA Server If you do not assign a Default Server IP address, the ZyWALL discards all packets received for ports that are not specified here or in the remote management setup. Click SUA/NAT to open the SUA Server screen. Refer to the firewall chapters for port numbers commonly used for particular services.
ZyWALL 2 Series User’s Guide Table 8-4 SUA Server LABEL DESCRIPTION Default Server In addition to the servers for specified services, NAT supports a default server. A default server receives packets from ports that are not specified in this screen. If you do not assign a default server IP address, then all packets received for ports not specified in this screen will be discarded.
ZyWALL 2 Series User’s Guide Figure 8-5 Address Mapping The following table describes the fields in this screen. Table 8-5 Address Mapping LABEL DESCRIPTION Local Start IP This refers to the Inside Local Address (ILA), that is the starting local IP address. Local IP addresses are N/A for Server port mapping.
ZyWALL 2 Series User’s Guide Table 8-5 Address Mapping LABEL DESCRIPTION Type 1. One-to-One mode maps one local IP address to one global IP address. Note that port numbers do not change for the One-to-one NAT mapping type. 2. Many-to-One mode maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), the Single User Account feature.
ZyWALL 2 Series User’s Guide Table 8-6 Address Mapping Rule LABEL DESCRIPTION Type Choose the port mapping type from one of the following. 1. One-to-One: One-to-one mode maps one local IP address to one global IP address. Note that port numbers do not change for One-to-one NAT mapping type. 2.
ZyWALL 2 Series User’s Guide receives a response with a specific port number and protocol ("incoming" port), the ZyWALL forwards the traffic to the LAN IP address of the computer that sent the request. After that computer’s connection for that service closes, another computer on the LAN can use the service in the same manner.
ZyWALL 2 Series User’s Guide Figure 8-8 Trigger Port The following table describes the fields in this screen. Table 8-7 Trigger Port LABEL DESCRIPTION This is the rule index number (read-only). Name Type a unique name (up to 15 characters) for identification purposes. All characters are permitted - including spaces.
Page 136
ZyWALL 2 Series User’s Guide Table 8-7 Trigger Port LABEL DESCRIPTION Incoming Incoming is a port (or a range of ports) that a server on the WAN uses when it sends out a particular service. The ZyWALL forwards the traffic with this port (or range of ports) to the client computer on the LAN that requested the service.
ZyWALL 2 Series User’s Guide Chapter 9 Static Route Screens This chapter shows you how to configure static routes for your ZyWALL. Static Route Overview Each remote node specifies only the network to which the gateway is directly connected, and the ZyWALL has no knowledge of the networks beyond.
ZyWALL 2 Series User’s Guide Figure 9-2 Static Route Screen The following table describes the fields in this screen. Table 9-1 IP Static Route Summary LABEL DESCRIPTION Number of an individual static route. Name Name that describes or identifies this route. This field shows whether this static route is active (Yes) or not (No).
ZyWALL 2 Series User’s Guide Table 9-1 IP Static Route Summary LABEL DESCRIPTION Gateway This is the IP address of the gateway. The gateway is an immediate neighbor of your ZyWALL that will forward the packet to the destination. On the LAN, the gateway must be a router on the same segment as your ZyWALL;...
Page 140
ZyWALL 2 Series User’s Guide Table 9-2 Edit IP Static Route LABEL DESCRIPTION Active This field allows you to activate/deactivate this static route. Destination IP This parameter specifies the IP network address of the final destination. Routing is Address always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID.
Firewall and Content Filters Part V: Firewall and Content Filters This part introduces firewalls in general and the ZyWALL firewall. It also explains how to configure the ZyWALL firewall and content filtering.
ZyWALL 2 Series User’s Guide Chapter 10 Firewalls This chapter gives some background information on firewalls and introduces the ZyWALL firewall. 10.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another.
ZyWALL 2 Series User’s Guide Information hiding prevents the names of internal systems from being made known via DNS to outside systems, since the application gateway is the only host whose name must be made known to outside systems. Robust authentication and logging pre-authenticates application traffic before it reaches internal hosts and causes it to be logged more effectively than if it were logged with standard host logging.
ZyWALL 2 Series User’s Guide Figure 10-1 ZyWALL Firewall Application 10.4 Denial of Service Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources.
ZyWALL 2 Series User’s Guide Table 10-1 Common IP Ports Telnet HTTP SMTP POP3 10.4.2 Types of DoS Attacks There are four types of DoS attacks: 1. Those that exploit bugs in a TCP/IP implementation. 2. Those that exploit weaknesses in the TCP/IP specification. 3.
ZyWALL 2 Series User’s Guide Figure 10-2 Three-Way Handshake Under normal circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment). After this handshake, a connection is established.
ZyWALL 2 Series User’s Guide 2-b In a LAND Attack, hackers flood SYN packets into the network with a spoofed source IP address of the targeted system. This makes it appear as if the host computer sent the packets to itself, making the system unavailable while the target system tries to respond to itself.
ZyWALL 2 Series User’s Guide Illegal Commands (NetBIOS and SMTP) The only legal NetBIOS commands are the following - all others are illegal. Table 10-3 Legal NetBIOS Commands MESSAGE: REQUEST: POSITIVE: NEGATIVE: RETARGET: KEEPALIVE: All SMTP commands are illegal except for those displayed in the following tables. Table 10-4 Legal SMTP Commands AUTH DATA...
ZyWALL 2 Series User’s Guide all communications to the Internet that originate from the LAN, and blocks all traffic to the LAN that originates from the Internet. In summary, stateful inspection: Allows all sessions originating from the LAN (local network) to the WAN (Internet). Denies all sessions originating from the WAN to the LAN.
ZyWALL 2 Series User’s Guide 4. Based on the obtained state information, a firewall rule creates a temporary access list entry that is inserted at the beginning of the WAN interface's inbound extended access list. This temporary access list entry is designed to permit inbound packets of the same connection as the outbound packet just inspected.
ZyWALL 2 Series User’s Guide Below is a brief technical description of how these connections are tracked. Connections may either be defined by the upper protocols (for instance, TCP), or by the ZyWALL itself (as with the "virtual connections" created for UDP and ICMP). 10.5.3 TCP Security The ZyWALL uses state information embedded in TCP packets.
ZyWALL 2 Series User’s Guide 10.5.5 Upper Layer Protocols Some higher layer protocols (such as FTP and RealAudio) utilize multiple network connections simultaneously. In general terms, they usually have a "control connection" which is used for sending commands between endpoints, and then "data connections" which are used for transmitting bulk information. Consider the FTP protocol.
ZyWALL 2 Series User’s Guide 10.7.1 Packet Filtering: The router filters packets as they pass through the router’s interface according to the filter rules you designed. Packet filtering is a powerful tool, yet can be complex to configure and maintain, especially if you need a chain of rules to filter a service.
Page 155
ZyWALL 2 Series User’s Guide 3. To selectively block/allow inbound or outbound traffic between inside host/networks and outside host/networks. Remember that filters cannot distinguish traffic originating from an inside host or an outside host by IP address. 4. The firewall performs better than filtering if you need to check many rules. 5.
ZyWALL 2 Series User’s Guide Chapter 11 Firewall Screens This chapter shows you how to configure your ZyWALL firewall. 11.1 Access Methods The web configurator is, by far, the most comprehensive firewall configuration tool your ZyWALL has to offer. For this reason, it is recommended that you configure your firewall using the web configurator. SMT screens allow you to activate the firewall.
ZyWALL 2 Series User’s Guide If you configure firewall rules without a good understanding of how they work, you might inadvertently introduce security risks to the firewall and to the protected network. Make sure you test your rules after you configure them. For example, you may create rules to: ♦...
ZyWALL 2 Series User’s Guide 1. Does this rule stop LAN users from accessing critical resources on the Internet? For example, if IRC is blocked, are there users that require this service? 2. Is it possible to modify the rule to be more specific? For example, if IRC is blocked for all users, will a rule that blocks just certain users be more effective? 3.
ZyWALL 2 Series User’s Guide policies for managing the ZyWALL through the LAN interface) and policies for LAN-to-LAN (the policies that control routing between two subnets on the LAN). Similarly, WAN to WAN/ZyWALL polices apply in the same way to the WAN ports. 11.4.1 LAN to WAN Rules The default rule for LAN to WAN traffic is that all users on the LAN are allowed non-restricted access to the WAN.
ZyWALL 2 Series User’s Guide Figure 11-2 WAN to LAN Traffic 11.5 Alerts Alerts are reports on events, such as attacks, that you may want to know about right away. You can choose to generate an alert when an attack is detected in the Attack Alert screen (Figure 11-12 - check the Generate alert when attack detected checkbox) or when a rule is matched in the Edit Rule screen (see Figure 11-4) Configure the Log Settings screen to have the ZyWALL send an immediate e-mail message to you when an event generates an alert.
ZyWALL 2 Series User’s Guide Select this check box to enable the firewall. Figure 11-3 Enabling the Firewall The following table describes the fields in this screen. 11-6 Firewall Screens...
ZyWALL 2 Series User’s Guide Table 11-1 Firewall Rules Summary: First Screen LABEL DESCRIPTION Enable Firewall Select this check box to activate the firewall. The ZyWALL performs access control and protects against Denial of Service (DoS) attacks when the firewall is activated. Bypass Triangle Select this check box to have the ZyWALL firewall ignore the use of triangle route Route...
ZyWALL 2 Series User’s Guide Table 11-1 Firewall Rules Summary: First Screen LABEL DESCRIPTION This field shows you if a log is created for packets that match the rule (Match), don't match the rule (Not Match), both (Both) or no log is created (None). Alert This field tells you whether this rule generates an alert (Yes) or not (No) when the rule is matched.
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Table 11-2 Creating/Editing A Firewall Rule LABEL DESCRIPTION Active Check the Active check box to have the ZyWALL use this rule. Leave it unchecked if you do not want the ZyWALL to use the rule after you apply it Packet Use the drop-down list box to select the direction of packet travel to which you want Direction...
ZyWALL 2 Series User’s Guide Table 11-2 Creating/Editing A Firewall Rule LABEL DESCRIPTION This field determines if a log is created for packets that match the rule (Match), don't match the rule (Not Match), both (Both) or no log is created (None). Go to the Log Settings page and select the Access Control logs category to have the ZyWALL record these logs.
ZyWALL 2 Series User’s Guide Table 11-3 Adding/Editing Source and Destination Addresses LABEL DESCRIPTION Address Type Do you want your rule to apply to packets with a particular (single) IP, a range of IP addresses (e.g., 192.168.1.10 to 192.169.1.50), a subnet or any IP address? Select an option from the drop-down list box that includes: Single Address, Range Address, Subnet Address and Any Address.
ZyWALL 2 Series User’s Guide Table 11-4 Creating/Editing A Custom Port LABEL DESCRIPTION Service Name Enter a unique name for your custom port. Service Type Choose the IP port (TCP, UDP or Both) that defines your customized port from the drop down list box.
ZyWALL 2 Series User’s Guide Select WAN to LAN from the drop-down list box Figure 11-7 Firewall IP Config Screen Step 4. Select Any in the Destination Address box and then click DestDelete. 11-14 Firewall Screens...
ZyWALL 2 Series User’s Guide Step 5. Click DestAdd under the Source Address box. Step 6. Configure the Firewall Rule Edit IP screen as follows and click Apply. Figure 11-8 Firewall Rule Edit IP Example Step 7. In the firewall rule configuration screen, click Add under Custom Port to open the Edit Custom Port screen.
ZyWALL 2 Series User’s Guide Custom ports show up with an “*” before their names in the Services list box and the Rule Summary list box. Click Apply after you’ve created your custom port. This is the address range of servers.
ZyWALL 2 Series User’s Guide On completing the configuration procedure for this Internet firewall rule, the Rule Summary screen should look like the following. Remember to click Apply when you have finished configuring your rule(s) to save your settings back to the ZyWALL. Rule 1: Allows a “My Service”...
ZyWALL 2 Series User’s Guide 11.8 Predefined Services The Available Services list box in the Rule Config(uration) screen (see Figure 11-4) displays all predefined services that the ZyWALL already supports. Next to the name of the service, two fields appear in brackets. The first field indicates the IP protocol type (TCP, UDP, or ICMP).
Page 175
ZyWALL 2 Series User’s Guide Table 11-5 Predefined Services SERVICE DESCRIPTION IPSEC_TUNNEL(ESP:0) The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. IRC(TCP/UDP:6667) This is another popular Internet chat program. Microsoft Networks’ messenger service uses this protocol. Messenger(TCP:1863) MULTICAST(IGMP:0) Internet Group Multicast Protocol is used when sending packets to a specific group of hosts.
ZyWALL 2 Series User’s Guide Table 11-5 Predefined Services SERVICE DESCRIPTION SMTP(TCP:25) Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP(TCP/UDP:161) Simple Network Management Program. SNMP- Traps for use with the SNMP (RFC:1215).
ZyWALL 2 Series User’s Guide 11.9.1 Threshold Values Tune these parameters when something is not working and after you have checked the firewall counters. These default values should work fine for normal small offices with ADSL bandwidth. Factors influencing choices for threshold values are: 1.
ZyWALL 2 Series User’s Guide Whenever the number of half-open sessions with the same destination host address rises above a threshold (TCP Maximum Incomplete), the ZyWALL starts deleting half-open sessions according to one of the following methods: 1. If the Blocking Period timeout is 0 (the default), then the ZyWALL deletes the oldest existing half-open session for the host for every new connection request to the host.
ZyWALL 2 Series User’s Guide Table 11-6 Attack Alert LABEL DESCRIPTION DEFAULT VALUES Generate alert when A detected attack automatically generates a attack detected log entry. Check this box to generate an alert (as well as a log) whenever an attack is detected.
Page 180
ZyWALL 2 Series User’s Guide Table 11-6 Attack Alert LABEL DESCRIPTION DEFAULT VALUES Maximum Incomplete This is the number of existing half-open 100 existing half-open sessions. High sessions that causes the firewall to start The above values causes the deleting half-open sessions. When the ZyWALL to start deleting half- number of existing half-open sessions rises open sessions when the number...
ZyWALL 2 Series User’s Guide Chapter 12 Content Filtering Screens This chapter provides a brief overview of content filtering using the web embedded configurator 12.1 Introduction to Content Filtering Internet content filtering allows you to create and enforce Internet access policies tailored to their needs. Content filtering is the ability to block certain web features or specific URL keywords and should not be confused with packet filtering via SMT menu 21.1.
ZyWALL 2 Series User’s Guide Figure 12-1 Content Filter : General The following table describes the labels in this screen. 12-2 Content Filtering Screens...
ZyWALL 2 Series User’s Guide Table 12-1 Content Filter : General LABEL DESCRIPTION Enable Content Filter Select this check box to enable the content filter. Restrict Web Features : Select the check box(es) to restrict a feature. When you download a page containing a restricted feature, that part of the web page will appear blank or grayed out.
ZyWALL 2 Series User’s Guide Table 12-1 Content Filter : General LABEL DESCRIPTION Exclude specified Select this checkbox to exempt a specific range of users on your LAN from address ranges from content filter policies. the content filter enforcement Add Address Ranges From Type the beginning IP address (in dotted decimal notation) of the specific range of users on your LAN.
ZyWALL 2 Series User’s Guide Step 1. A computer sends an HTTP request to a web server. Step 2. The ZyWALL looks up the web site in its local database. If an attempt to access the web site was made in the past, a record of that web site’s rating will be in the ZyWALL’s cache. The ZyWALL will either block or forward the request based on the rating policy you configure.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 12-2 Content Filter : Categories LABEL DESCRIPTION Enable Web Site Auto Enable external database content filtering to have the ZyWALL check an Categorization external database to find to which category a requested web page belongs. The ZyWALL then blocks or forwards access to the web page depending on the configuration of the rest of this page.
Page 188
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Select Categories Select All Categories Select this check box to restrict access to all site categories listed below. Clear All Categories Select this check box to clear the selected categories below. Adult/Mature Content Selecting this category excludes pages that contain material of adult nature that does not necessarily contain excessive violence, sexual content, or...
Page 189
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Gambling Selecting this category excludes pages where a user can place a bet or participate in a betting pool (including lotteries) online. It also includes pages that provide information, assistance, recommendations, or training on placing bets or participating in games of chance.
Page 190
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Education Selecting this category excludes pages that offer educational information, distance learning and trade school information or programs. It also includes pages that are sponsored by schools, educational facilities, faculty, or alumni groups.
Page 191
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Computers/Internet Selecting this category excludes pages that sponsor or provide information on computers, technology, the Internet and technology-related organizations and companies. Hacking/Proxy Avoidance Pages providing information on illegal or questionable access to or the use of communications equipment/software, or provide information on how to bypass proxy server features or gain access to URLs in any way that bypasses the proxy server.
Page 192
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Shopping Selecting this category excludes pages that provide or advertise the means to obtain goods or services. It does not include pages that can be classified in other categories (such as vehicles or weapons).
Page 193
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Software Downloads Selecting this category excludes pages that are dedicated to the electronic download of software packages, whether for payment or at no charge. Pay to Surf Selecting this category excludes pages that pay users in the form of cash or prizes, for clicking on or reading specific links, email, or web pages.
ZyWALL 2 Series User’s Guide Table 12-2 Content Filter : Categories LABEL DESCRIPTION Register Click Register to go to a web site where you can register for category-based content filtering (using an external database). You can use a trial application or register your iCard’s PIN.
Enter host names such as “www.good-site.com” into this text field. Do not enter the complete URL of the site – that is, do not include “http://”. All subdomains are allowed. For example, entering “zyxel.com” also allows “www.zyxel.com”, “partner.zyxel.com”, “press.zyxel.com”, etc.
Page 197
ZyWALL 2 Series User’s Guide Table 12-3 Content Filter : Customization LABEL DESCRIPTION Delete Select a web site name from the Forbidden Web Site List, and then click this button to delete it from that list. Keyword Blocking Keyword Blocking allows you to block websites that contain certain keywords.
ZyWALL 2 Series User’s Guide Chapter 13 Introduction to IPSec This chapter introduces the basics of IPSec VPNs. 13.1 VPN Overview A VPN (Virtual Private Network) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing technologies/services used to transport traffic over the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
ZyWALL 2 Series User’s Guide Figure 13-1 Encryption and Decryption Data Confidentiality The IPSec sender can encrypt packets before transmitting them across a network. Data Integrity The IPSec receiver can validate packets sent by the IPSec sender to ensure that the data has not been altered during transmission.
ZyWALL 2 Series User’s Guide 13.3 Encapsulation The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode. Figure 13-3 Transport and Tunnel Mode IPSec Encapsulation 13.3.1 Transport Mode Transport mode is used to protect upper layer protocols and only affects the data in the IP packet. In Transport mode, the IP packet contains the security protocol (AH or ESP) located after the original IP header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP).
ZyWALL 2 Series User’s Guide 13.4 IPSec and NAT Read this section if you are running IPSec on a host computer behind the ZyWALL. NAT is incompatible with the AH protocol in both Transport and Tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet.
ZyWALL 2 Series User’s Guide Chapter 14 VPN Screens This chapter introduces the VPN Web configurator. See the Logs chapter for information on viewing logs and the appendix for IPSec log descriptions. 14.1 VPN/IPSec Overview Use the screens documented in this chapter to configuring and managing a VPN connection. 14.2 IPSec Algorithms The ESP and AH protocols are necessary to create a Security Association (SA), the foundation of an IPSec VPN.
ZyWALL 2 Series User’s Guide Table 14-1 AH and ESP DES (default) MD5 (default) Data Encryption Standard (DES) is a widely used method MD5 (Message Digest 5) produces a 128-bit of data encryption using a private (secret) key. DES digest to authenticate packet data. applies a 56-bit key to each 64-bit block of data.
ZyWALL 2 Series User’s Guide You can also enter a remote secure gateway’s domain name in the Secure Gateway Address field if the remote secure gateway has a dynamic WAN IP address and is using DDNS. The ZyWALL has to rebuild the VPN tunnel each time the remote secure gateway’s WAN IP address changes (there may be a delay until the DDNS servers are updated with the remote gateway’s new WAN IP address).
ZyWALL 2 Series User’s Guide Figure 14-2 VPN Rules The following table describes the fields in this screen. Table 14-2 VPN Rules LABEL DESCRIPTION This field displays the VPN rule number. Name This field displays the identification name for this VPN policy. Active Y signifies that this VPN rule is active.
ZyWALL 2 Series User’s Guide Table 14-2 VPN Rules LABEL DESCRIPTION Remote IP This is the IP address(es) of computer(s) on the remote network behind the remote IPSec Address router. This field displays N/A when the Secure Gateway Address field displays 0.0.0.0. In this case only the remote IPSec router can initiate the VPN.
ZyWALL 2 Series User’s Guide When there is outbound traffic with no inbound traffic, the ZyWALL automatically drops the tunnel after two minutes. 14.7 NAT Traversal NAT traversal allows you to set up a VPN connection when there are NAT routers between IPSec routers A and B.
ZyWALL 2 Series User’s Guide 14.7.2 X-Auth (Extended Authentication) Extended authentication provides added security by allowing you to use usernames and passwords for VPN connections. This is especially helpful when multiple ZyWALLs use one VPN rule to connect to a single ZyWALL.
ZyWALL 2 Series User’s Guide If you do not specify an Intranet DNS server on the remote network, then the VPN host must use IP addresses to access the computers on the remote network. 14.8 ID Type and Content With aggressive negotiation mode (see section 14.12.1), the ZyWALL identifies incoming SAs by ID type and content since this identifying information is not encrypted.
ZyWALL 2 Series User’s Guide Table 14-4 Peer ID Type and Content Fields PEER ID TYPE= CONTENT= Type the IP address of the computer with which you will make the VPN connection or leave the field blank to have the ZyWALL automatically use the address in the Secure Gateway field.
ZyWALL 2 Series User’s Guide Table 14-6 Mismatching ID Type and Content Configuration Example ZYWALL A ZYWALL B Peer ID type: E-mail Peer ID type: IP Peer ID content: aa@yahoo.com Peer ID content: N/A 14.9 Pre-Shared Key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see section 14.10 for more on IKE phases).
ZyWALL 2 Series User’s Guide Figure 14-6 Site-to-Site VPN Example 14.11 Configuring Basic IKE VPN Rule Setup Select one of the VPN rules in the VPN Rules screen and click Edit or click the Rule Setup tab on the ZyWALL 2WE to configure the rule’s settings. The basic IKE rule setup screen is shown next. VPN Screens 14-11...
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Select this check box to activate this VPN tunnel. This option determines whether a VPN Active rule is applied before a packet leaves the firewall. Select this check box to turn on the keep alive feature for this SA.
Page 220
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Select Server Mode to have this ZyWALL authenticate extended authentication clients Server Mode that request this VPN connection. You must also configure the extended authentication clients’ usernames and passwords in the auth server’s local user database or a RADIUS server (see the Authentication Server section).
Page 221
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Local IP Address Enter a static local IP address. The local IP address must correspond to the remote IPSec router's configured remote IP addresses. Site to Site Select this radio button to establish a VPN between two sites (groups of IP addresses).
Page 222
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION When the Address Type field is configured to Single Address, this field is N/A. When the Ending IP Address/ Subnet Address Type field is configured to Range Address, enter the end (static) IP address, in Mask a range of computers on the network behind the remote IPSec router.
Page 223
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Local ID Type Select IP to identify this ZyWALL by its IP address. Select DNS to identify this ZyWALL by a domain name. Select E-mail to identify this ZyWALL by an e-mail address. You do not configure the local ID type and content when you set Authentication Method to Certificate.
Page 224
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Select from the following when you set Authentication Method to Pre-shared Key. Peer ID Type Select IP to identify the remote IPSec router by its IP address. Select DNS to identify the remote IPSec router by a domain name.
Page 225
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Content The configuration of the peer content depends on the peer ID type. Do the following when you set Authentication Method to Pre-shared Key. For IP, type the IP address of the computer with which you will make the VPN connection.
Page 226
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION My IP Address Enter the WAN IP address of your ZyWALL. The VPN tunnel has to be rebuilt if this IP address changes. The following applies if this field is configured as 0.0.0.0: The ZyWALL uses the current ZyWALL WAN IP address (static or dynamic) to set up the VPN tunnel.
ZyWALL 2 Series User’s Guide Table 14-7 Basic IKE VPN Rule Edit LABEL DESCRIPTION Encryption Select DES, 3DES, AES or NULL from the drop-down list box. Algorithm When you use one of these encryption algorithms for data communications, both the sending device and the receiving device must use the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code.
ZyWALL 2 Series User’s Guide Figure 14-8 Two Phases to Set Up the IPSec SA In phase 1 you must: Choose a negotiation mode. Authenticate the connection by entering a pre-shared key. Choose an encryption algorithm. Choose an authentication algorithm. Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2).
ZyWALL 2 Series User’s Guide IPSec SA lifetime period expires. The ZyWALL also automatically renegotiates the IPSec SA if both IPSec routers have keep alive enabled, even if there is no traffic. If an IPSec SA times out, then the IPSec router must renegotiate the SA the next time someone attempts to send traffic.
ZyWALL 2 Series User’s Guide 14.12.5 Perfect Forward Secrecy (PFS) Enabling PFS means that the key is transient. The key is thrown away and replaced by a brand new key using a new Diffie-Hellman exchange for each new IPSec SA setup. With PFS enabled, if one key is compromised, previous and subsequent keys are not compromised, because subsequent keys are not derived from previous keys.
ZyWALL 2 Series User’s Guide Figure 14-9 Advanced IKE VPN Rule Setup The following table describes the fields in this screen. Table 14-8 Advanced IKE VPN Rule Setup LABEL DESCRIPTION Protocol Enter 1 for ICMP, 6 for TCP, 17 for UDP, etc. 0 is the default and signifies any protocol. VPN Screens 14-25...
ZyWALL 2 Series User’s Guide Table 14-8 Advanced IKE VPN Rule Setup LABEL DESCRIPTION Enable Replay As a VPN setup is processing intensive, the system is vulnerable to Denial of Service Detection (DoS) attacks The IPSec receiver can detect and reject old or duplicate packets to protect against replay attacks.
Page 233
ZyWALL 2 Series User’s Guide Table 14-8 Advanced IKE VPN Rule Setup LABEL DESCRIPTION Authentication Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 Algorithm algorithm is generally considered stronger than MD5, but is slower.
ZyWALL 2 Series User’s Guide Table 14-8 Advanced IKE VPN Rule Setup LABEL DESCRIPTION SA Life Time Define the length of time before an IKE SA automatically renegotiates in this field. It may (seconds) range from 180 to 3,000,000 seconds (almost 35 days). A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 14-9 VPN Manual Setup LABEL DESCRIPTION Active Select this check box to activate this VPN policy. Name Type up to 32 characters to identify this VPN policy. You may use any character, including spaces, but the ZyWALL drops trailing spaces.
Page 237
ZyWALL 2 Series User’s Guide Table 14-9 VPN Manual Setup LABEL DESCRIPTION Remote: Remote IP addresses must be static and correspond to the remote IPSec router's configured local IP addresses. Two active SAs cannot have the local and remote IP address(es) both the same. Two active SAs can have the same local or remote IP address, but not both.
Page 238
ZyWALL 2 Series User’s Guide Table 14-9 VPN Manual Setup LABEL DESCRIPTION Secure Gateway Type the WAN IP address or the URL (up to 31 characters) of the IPSec router with Addr which you're making the VPN connection. Type a unique SPI (Security Parameter Index) from one to four characters long. Valid Characters are "0, 1, 2, 3, 4, 5, 6, 7, 8, and 9".
ZyWALL 2 Series User’s Guide Table 14-9 VPN Manual Setup LABEL DESCRIPTION Authentication Type a unique authentication key to be used by IPSec if applicable. Enter 16 characters for MD5 authentication or 20 characters for SHA-1 authentication. Any characters may be used, including spaces, but trailing spaces are truncated. Click Apply to save your changes back to the ZyWALL.
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Table 14-10 VPN SA Monitor LABEL DESCRIPTION This is the security association index number. Name This field displays the identification name for this VPN policy. Encapsulation This field displays Tunnel or Transport mode.
ZyWALL 2 Series User’s Guide Table 14-11 VPN Global Setting LABEL DESCRIPTION Windows Networking (NetBIOS over TCP/IP) NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast packets that enable a computer to connect to and communicate with a LAN. It may sometimes be necessary to allow NetBIOS packets to pass through VPN tunnels in order to allow local computers to find computers on the remote network and vice versa.
ZyWALL 2 Series User’s Guide Figure 14-13 Telecommuters Sharing One VPN Rule Example Table 14-12 Telecommuters Sharing One VPN Rule Example FIELDS TELECOMMUTERS HEADQUARTERS My IP Address: 0.0.0.0 (dynamic IP address Public static IP address assigned by the ISP) Secure Gateway Public static IP address 0.0.0.0 With this IP address only the...
ZyWALL 2 Series User’s Guide See the following table and figure for an example where three telecommuters each use a different VPN rule for a VPN connection with a ZyWALL located at headquarters. The ZyWALL at headquarters (HQ in the figure) identifies each incoming SA by its ID type and content and uses the appropriate VPN rule to establish the VPN connection.
ZyWALL 2 Series User’s Guide Table 14-13 Telecommuters Using Unique VPN Rules Example TELECOMMUTERS HEADQUARTERS Local IP Address: 192.168.2.12 Secure Gateway Address: telecommuter1.com Remote Address 192.168.2.12 Telecommuter B (telecommuterb.dydns.org) Headquarters ZyWALL Rule 2: Local ID Type: DNS Peer ID Type: DNS Local ID Content: telecommuterb.com Peer ID Content: telecommuterb.com Local IP Address: 192.168.3.2...
ZyWALL 2 Series User’s Guide Chapter 15 Certificates This chapter gives background information about public-key certificates and explains how to use them. This chapter is only applicable to the ZyWALL 2. 15.1 Certificates Overview The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs.
ZyWALL 2 Series User’s Guide Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The ZyWALL can check a peer’s certificate against a directory server’s list of revoked certificates.
ZyWALL 2 Series User’s Guide 15.4 My Certificates Click CERTIFICATES, My Certificates to open the ZyWALL’s summary list of certificates and certification requests. Certificates display in black and certification requests display in gray. See the following figure. Figure 15-2 My Certificates The following table describes the labels in this screen.
Replace This button displays when the ZyWALL has the factory default certificate. The factory default certificate is common to all ZyWALLs that use certificates. ZyXEL recommends that you use this button to replace the factory default certificate with one that uses your ZyWALL's MAC address.
ZyWALL 2 Series User’s Guide Table 15-1 My Certificates LABEL DESCRIPTION Details Select the radio button next to a certificate’s index number and then click Details to open a screen with an in-depth list of information about that certificate. Refresh Click this button to display the current validity status of the certificates.
ZyWALL 2 Series User’s Guide 15.6 Importing a Certificate Click CERTIFICATES, My Certificates and then Import to open the My Certificate Import screen. Follow the instructions in this screen to save an existing certificate to the ZyWALL, see the following figure. 1.
ZyWALL 2 Series User’s Guide Table 15-2 My Certificate Import LABEL DESCRIPTION Apply Click Apply to save the certificate on the ZyWALL. Cancel Click Cancel to quit and return to the My Certificates screen. 15.7 Creating a Certificate Click CERTIFICATES, My Certificates and then Create to open the My Certificate Create screen. Use this screen to have the ZyWALL create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request, see the following figure.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 15-3 My Certificate Create LABEL DESCRIPTION Certificate Name Type up to 31 ASCII characters (not including spaces) to identify this certificate. Subject Information Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although the Common Name is mandatory.
Page 255
ZyWALL 2 Series User’s Guide Table 15-3 My Certificate Create LABEL DESCRIPTION Create a certification Select Create a certification request and enroll for a certificate immediately request and enroll for online to have the ZyWALL generate a request for a certificate and apply to a a certificate certification authority for a certificate.
ZyWALL 2 Series User’s Guide After you click Apply in the My Certificate Create screen, you see a screen that tells you the ZyWALL is generating the self-signed certificate or certification request. After the ZyWALL successfully enrolls a certificate or generates a certification request or a self-signed certificate, you see a screen with a Return button that takes you back to the My Certificates screen.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 15-4 My Certificate Details LABEL DESCRIPTION Name This field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this certificate. You may use any character (not including spaces).
Page 259
ZyWALL 2 Series User’s Guide Table 15-4 My Certificate Details LABEL DESCRIPTION Signature Algorithm This field displays the type of algorithm that was used to sign the certificate. The ZyWALL uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Some certification authorities may use ras-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
ZyWALL 2 Series User’s Guide Table 15-4 My Certificate Details LABEL DESCRIPTION Certificate in PEM This read-only text box displays the certificate or certification request in Privacy (Base-64) Encoded Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the binary Format certificate into a printable form.
ZyWALL 2 Series User’s Guide Figure 15-6 Trusted CAs The following table describes the labels in this screen. Table 15-5 Trusted CAs LABEL DESCRIPTION PKI Storage This bar displays the percentage of the ZyWALL’s PKI storage space that is currently Space in Use in use.
ZyWALL 2 Series User’s Guide Table 15-5 Trusted CAs LABEL DESCRIPTION Issuer This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
ZyWALL 2 Series User’s Guide You must remove any spaces from the certificate’s filename before you can import the certificate. Figure 15-7 Trusted CA Import The following table describes the labels in this screen. Table 15-6 Trusted CA Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 15-7 Trusted CA Details LABEL DESCRIPTION Name This field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this key certificate. You may use any character (not including spaces).
Page 266
ZyWALL 2 Series User’s Guide Table 15-7 Trusted CA Details LABEL DESCRIPTION Signature Algorithm This field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use ras-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
ZyWALL 2 Series User’s Guide Table 15-7 Trusted CA Details LABEL DESCRIPTION Certificate in PEM This read-only text box displays the certificate or certification request in Privacy (Base-64) Encoded Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the binary Format certificate into a printable form.
ZyWALL 2 Series User’s Guide Figure 15-9 Trusted Remote Hosts The following table describes the labels in this screen. Table 15-8 Trusted Remote Hosts LABEL DESCRIPTION PKI Storage This bar displays the percentage of the ZyWALL’s PKI storage space that is currently Space in Use in use.
ZyWALL 2 Series User’s Guide Table 15-8 Trusted Remote Hosts LABEL DESCRIPTION Subject This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
ZyWALL 2 Series User’s Guide Table 15-9 Remote Host Certificates Step 3. Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Verify (over the phone for example) that the remote host has the same information in the Thumbprint Algorithm and Thumbprint fields.
ZyWALL 2 Series User’s Guide The trusted remote host certificate must be a self-signed certificate; and you must remove any spaces from its filename before you can import it. Figure 15-10 Trusted Remote Host Import The following table describes the labels in this screen. Table 15-11 Trusted Remote Host Import LABEL DESCRIPTION...
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 15-12 Trusted Remote Host Details LABEL DESCRIPTION Name This field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this key certificate. You may use any character (not including spaces).
Page 274
ZyWALL 2 Series User’s Guide Table 15-12 Trusted Remote Host Details LABEL DESCRIPTION Key Algorithm This field displays the type of algorithm that was used to generate the certificate’s key pair (the ZyWALL uses RSA encryption) and the length of the key set in bits (1024 bits for example).
ZyWALL 2 Series User’s Guide 15.16 Directory Servers Click CERTIFICATES, Directory Servers to open the Directory Servers screen. This screen displays a summary list of directory servers (that contain lists of valid and revoked certificates) that have been saved into the ZyWALL. If you decide to have the ZyWALL check incoming certificates against the issuing certification authority’s list of revoked certificates, the ZyWALL first checks the server(s) listed in the CRL Distribution Points field of the incoming certificate.
ZyWALL 2 Series User’s Guide Table 15-13 Directory Servers LABEL DESCRIPTION Port This field displays the port number that the directory server uses. Protocol This field displays the protocol that the directory server uses. Click Add to open a screen where you can configure information about a directory server so that the ZyWALL can access it.
ZyWALL 2 Series User’s Guide Table 15-14 Directory Server Add LABEL DESCRIPTION Directory Service Setting Name Type up to 31 ASCII characters (spaces are not permitted) to identify this directory server. Access Protocol Use the drop-down list box to select the access protocol used by the directory server. LDAP (Lightweight Directory Access Protocol) is a protocol over TCP that specifies how clients access directories certificates and lists of revoked certificates.
Remote Management and UPnP Part VIII: Authentication Server, Remote Management and UPnP This part provides information and configuration instructions for configuration of the authentication server screens, remote management and Universal Plug and Play. VIII...
ZyWALL 2 Series User’s Guide Chapter 16 Authentication Server This chapter discusses how to configure the authentication server on the ZyWALL. 16.1 Authentication Server Overview A ZyWALL set to be a VPN extended authentication server can use either the local user database internal to the ZyWALL or an external RADIUS server for an unlimited number of users.
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Table 16-1 Local User Database LABEL DESCRIPTION Active Select this check box to enable the user profile. User Name Enter the user name of the user profile. Password Enter a password up to 31 characters long for this user profile.
ZyWALL 2 Series User’s Guide Figure 16-2 RADIUS The following table describes the fields in this screen. Table 16-2 RADIUS LABEL DESCRIPTION Authentication Server Active Enable this feature to have the ZyWALL use an external authentication server in performing user authentication. Disable this feature if you will not use an external authentication server.
Page 285
ZyWALL 2 Series User’s Guide Table 16-2 RADIUS LABEL DESCRIPTION Port Number The default port of the RADIUS server for authentication is 1812. You need not change this value unless your network administrator instructs you to do so with additional information. Enter a password (up to 31 alphanumeric characters) as the key to be shared between the external authentication server and the access points.
ZyWALL 2 Series User’s Guide Chapter 17 Remote Management Screens This chapter provides information on the Remote Management screens. 17.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which ZyWALL interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
ZyWALL 2 Series User’s Guide 17.1.1 Remote Management Limitations Remote management over LAN or WAN will not work when: 1. A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service.
ZyWALL 2 Series User’s Guide data), authentication (one party can identify the other party) and data integrity (you know if data has been changed). It relies upon certificates, public keys, and private keys (see the Certificates chapter for more information). HTTPS on the ZyWALL is used so that you may securely access the ZyWALL using the web configurator.
ZyWALL 2 Series User’s Guide If you disable HTTP Server Access (Disable) in the REMOTE MGMT WWW screen, then the ZyWALL blocks all HTTP connection attempts. 17.3 Configuring WWW To change your ZyWALL’s web settings, click REMOTE MGNT, then the WWW tab. The screen appears as shown.
ZyWALL 2 Series User’s Guide Table 17-1 WWW LABEL DESCRIPTION HTTPS: This feature is not available on the ZyWALL 2WE. Server Select the Server Certificate that the ZyWALL will use to identify itself. The ZyWALL Certificate is the SSL server and must always authenticate itself to the SSL client (the computer which requests the HTTPS connection with the ZyWALL).
ZyWALL 2 Series User’s Guide Table 17-1 WWW LABEL DESCRIPTION Reset Click Reset to begin configuring this screen afresh. 17.4 HTTPS Example If you haven’t changed the default HTTPS port on the ZyWALL, then in your browser enter “https://ZyWALL IP Address/” as the web site address where “ZyWALL IP Address” is the IP address or domain name of the ZyWALL you wish to access.
ZyWALL 2 Series User’s Guide 17.4.2 Netscape Navigator Warning Messages When you attempt to access the ZyWALL HTTPS server, a Website Certified by an Unknown Authority screen pops up asking if you trust the server certificate. Click Examine Certificate if you want to verify that the certificate is from the ZyWALL.
ZyWALL 2 Series User’s Guide Figure 17-5 Security Certificate 2 (Netscape) 17.4.3 Avoiding the Browser Warning Messages The following describes the main reasons that your browser displays warnings about the ZyWALL’s HTTPS server certificate and what you can do to avoid seeing the warnings. The issuing certificate authority of the ZyWALL’s HTTPS server certificate is not one of the browser’s trusted certificate authorities.
ZyWALL 2 Series User’s Guide Step 2. Click CERTIFICATES. Find the certificate and check its Subject column. CN stands for certificate’s common name (see Figure 17-9 for an example). Use this procedure to have the ZyWALL use a certificate with a common name that matches the ZyWALL’s actual IP address.
ZyWALL 2 Series User’s Guide Figure 17-7 Login Screen (Netscape) Click Login and you then see the next screen. The factory default certificate is a common default certificate for all ZyWALL models. Remote Management Screens 17-11...
ZyWALL 2 Series User’s Guide Figure 17-8 Replace Certificate Click Apply in the Replace Certificate screen to create a certificate using your ZyWALL’s MAC address that will be specific to this device. Click CERTIFICATES to open the My Certificates screen. You will see information similar to that shown in the following figure.
ZyWALL 2 Series User’s Guide Click Ignore in the Replace Certificate screen to use the common ZyWALL certificate. You will then see this information in the My Certificates screen. Figure 17-10 Common ZyWALL Certificate 17.5 SSH Overview Unlike Telnet or FTP, which transmit data in clear text, SSH (Secure Shell) is a secure communication protocol that combines authentication and data encryption to provide secure encrypted communication between two hosts over an unsecured network.
ZyWALL 2 Series User’s Guide Figure 17-11 SSH Communication Example 17.6 How SSH works The following table summarizes how a secure connection is established between two remote hosts. 1. Host Identification The SSH client sends a connection request to the SSH server.
ZyWALL 2 Series User’s Guide 17.7 SSH Implementation on the ZyWALL Your ZyWALL supports SSH version 1.5 using RSA authentication and three encryption methods (DES, 3DES and Blowfish). The SSH server is implemented on the ZyWALL for remote SMT management and file transfer on port 22.
ZyWALL 2 Series User’s Guide Table 17-2 SSH LABEL DESCRIPTION Server Host Key Select the certificate whose corresponding private key is to be used to identify the ZyWALL for SSH connections. You must have certificates already configured in the My Certificates screen (Click My Certificates and see the Certificates part for details).
ZyWALL 2 Series User’s Guide Step 3. A window displays prompting you to store the host key in you computer. Click Yes to continue. Figure 17-14 SSH Example 1: Store Host Key Enter the password to log in to the ZyWALL. The SMT main menu displays next. 17.9.2 Example 2: Linux This section describes how to access the ZyWALL using the OpenSSH client program that comes with most Linux distributions.
ZyWALL 2 Series User’s Guide Step 2. Enter “ssh –1 192.168.1.1”. This command forces your computer to connect to the ZyWALL using SSH version 1. If this is the first time you are connecting to the ZyWALL using SSH, a message displays prompting you to save the host information of the ZyWALL.
ZyWALL 2 Series User’s Guide Step 3. Use the “put” command to upload a new firmware to the ZyWALL. $ sftp -1 192.168.1.1 Connecting to 192.168.1.1... The authenticity of host '192.168.1.1 (192.168.1.1)' can't be established. RSA1 key fingerprint is 21:6c:07:25:7e:f4:75:80:ec:af:bd:d4:3d:80:53:d1. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '192.168.1.1' (RSA1) to the list of known hosts.
ZyWALL 2 Series User’s Guide 17.12 Configuring TELNET Click REMOTE MGNT to open the TELNET screen. Figure 17-19 Telnet The following table describes the labels in this screen. Table 17-3 Telnet LABEL DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
ZyWALL 2 Series User’s Guide 17.13 Configuring FTP You can upload and download the ZyWALL’s firmware and configuration files using FTP, please see the chapter on firmware and configuration file maintenance for details. To use this feature, your computer must have an FTP client.
ZyWALL 2 Series User’s Guide Table 17-4 FTP LABEL DESCRIPTION Secure Client IP A secure client is a “trusted” computer that is allowed to communicate with the Address ZyWALL using this service. Select All to allow any computer to access the ZyWALL using this service. Choose Selected to just allow the computer with the IP address that you specify to access the ZyWALL using this service.
ZyWALL 2 Series User’s Guide Figure 17-21 SNMP Management Model An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the ZyWALL). An agent translates the local management information from the managed device into a form compatible with SNMP.
ZyWALL 2 Series User’s Guide • Get - Allows the manager to retrieve an object variable from the agent. • GetNext - Allows the manager to retrieve the next object variable from a table or list within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations.
Page 311
ZyWALL 2 Series User’s Guide 17.14.3 REMOTE MANAGEMENT: SNMP To change your ZyWALL’s SNMP settings, click REMOTE MGNT, then the SNMP tab. The screen appears as shown. Figure 17-22 SNMP The following table describes the fields in this screen. Remote Management Screens 17-25...
ZyWALL 2 Series User’s Guide Table 17-6 SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests. Set Community Enter the Set community, which is the password for incoming Set requests from the management station.
ZyWALL 2 Series User’s Guide To change your ZyWALL’s DNS settings, click REMOTE MGNT, then the DNS tab. The screen appears as shown. Figure 17-23 DNS The following table describes the fields in this screen. Table 17-7 DNS LABEL DESCRIPTION Service Port The DNS service port number is 53 and cannot be changed here.
ZyWALL 2 Series User’s Guide 17.16 Configuring Security To change your ZyWALL’s Security settings, click REMOTE MGNT, then the Security tab. The screen appears as shown. If an outside user attempts to probe an unsupported port on your ZyWALL, an ICMP response packet is automatically returned.
Page 315
ZyWALL 2 Series User’s Guide Table 17-8 Security LABEL DESCRIPTION Respond to Ping The ZyWALL will not respond to any incoming Ping requests when Disable is selected. Select LAN to reply to incoming LAN Ping requests. Select WAN to reply to incoming WAN Ping requests.
ZyWALL 2 Series User’s Guide Chapter 18 UPnP This chapter introduces the Universal Plug and Play feature. 18.1 Universal Plug and Play Overview Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
ZyWALL 2 Series User’s Guide 18.1.3 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. All UPnP-enabled devices may communicate freely with each other without additional configuration.
ZyWALL 2 Series User’s Guide Figure 18-1 Configuring UPnP The following table describes the fields in this screen. Table 18-1 Configuring UPnP FIELD DESCRIPTION Device Name This identifies the device in UPnP applications. Enable the Universal Plug Select this checkbox to activate UPnP. Be aware that anyone could use a and Play (UPnP) feature UPnP application to open the web configurator's login screen without entering the ZyWALL's IP address (although you must still enter the...
ZyWALL 2 Series User’s Guide Table 18-1 Configuring UPnP FIELD DESCRIPTION Reset Click Reset to begin configuring this screen afresh 18.4 Displaying UPnP Port Mapping Click UPnP and then Ports to display the screen as shown next. Use this screen to view the NAT port mapping rules that UPnP creates on the ZyWALL.
ZyWALL 2 Series User’s Guide Table 18-2 UPnP Ports LABEL DESCRIPTION This is the index number of the UPnP-created NAT mapping rule entry. Remote Host This field displays the source IP address (on the WAN) of inbound IP packets. Since this is often a wildcard, the field may be blank.
ZyWALL 2 Series User’s Guide 18.5.1 Installing UPnP in Windows Me Follow the steps below to install UPnP in Windows Me. Click Start and Control Panel. Double-click Add/Remove Programs. Click on the Windows Setup tab and select Communication in the Components selection box.
Page 323
ZyWALL 2 Series User’s Guide Step 1. Click Start and Control Panel. Step 2. Double-click Network Connections. Step 3. In the Network Connections window, click Advanced in the main menu and select Optional Networking Components …. The Windows Optional Networking Components Wizard window displays.
ZyWALL 2 Series User’s Guide 18.6 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the device. Make sure the computer is connected to a LAN port of the device.
Page 325
ZyWALL 2 Series User’s Guide Step 4. You may edit or delete the port mappings or click Add to manually add port mappings. When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. Step 5. Select the Show icon in notification area when connected check box and click OK.
ZyWALL 2 Series User’s Guide 18.6.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator without first finding out its IP address. This is helpful if you do not know the IP address of your ZyWALL. Follow the steps below to access the web configurator. Step 1.
ZyWALL 2 Series User’s Guide Chapter 19 Logs Screens This chapter contains information about configuring general log settings and viewing the ZyWALL’s logs. Refer to appendices for example log message explanations. 19.1 Configuring View Log The web configurator allows you to look at all of the ZyWALL’s logs in one location. Click LOGS to open the View Log screen.
ZyWALL 2 Series User’s Guide Figure 19-1 View Log The following table describes the labels in this screen. Table 19-1 View Log LABEL DESCRIPTION Display The categories that you select in the Log Settings page (see section 19.2) display in the drop-down list box.
ZyWALL 2 Series User’s Guide Table 19-1 View Log LABEL DESCRIPTION Note This field displays additional information about the log entry. Email Log Now Click Email Log Now to send the log screen to the e-mail address specified in the Log Settings page (make sure that you have first filled in the Address Info fields in Log Settings, see section 19.2).
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 19-2 Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e-mail.
ZyWALL 2 Series User’s Guide Table 19-2 Log Settings LABEL DESCRIPTION Time for Sending Enter the time of the day in 24-hour format (for example 23:00 equals 11:00 pm) to send the logs. Select the categories of logs that you want to record. Logs include alerts. Send Immediate Select the categories of alerts for which you want the ZyWALL to instantly e-mail Alert...
ZyWALL 2 Series User’s Guide The ZyWALL records web site hits by counting the HTTP GET packets. Many web sites include HTTP GET references to other web sites and the ZyWALL may count these as hits, thus the web hit count is not (yet) 100% accurate.
ZyWALL 2 Series User’s Guide Table 19-3 Reports LABEL DESCRIPTION Refresh Click Refresh to update the report display. The report also refreshes automatically when you close and reopen the screen. All of the recorded reports data is erased when you turn off the ZyWALL. 19.3.1 Viewing Web Site Hits In the Reports screen, select Web Site Hits from the Report Type drop-down list box to have the ZyWALL record and display which web sites have been visited the most often and how many times they have been...
ZyWALL 2 Series User’s Guide Table 19-4 Web Site Hits Report LABEL DESCRIPTION Web Site This column lists the domain names of the web sites visited most often from computers on the LAN. The names are ranked by the number of visits to each web site and listed in descending order with the most visited web site listed first.
ZyWALL 2 Series User’s Guide Table 19-5 Protocol/ Port Report LABEL DESCRIPTION Protocol/Port This column lists the protocols or service ports for which the most traffic has gone through the ZyWALL. The protocols or service ports are listed in descending order with the most used protocol or service port listed first.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 19-6 LAN IP Address Report LABEL DESCRIPTION IP Address This column lists the LAN IP addresses to and/or from which the most traffic has been sent.
ZyWALL 2 Series User’s Guide Chapter 20 Maintenance This chapter displays system information such as firmware, port IP addresses and port traffic statistics. 20.1 Maintenance Overview The maintenance screens can help you view system information, upload new firmware, manage configuration and restart your ZyWALL.
ZyWALL 2 Series User’s Guide The following table describes the labels in this screen. Table 20-1 System Status LABEL DESCRIPTION System Name This is the System Name you chose in the first Internet Access Wizard screen. It is for identification purposes Model Name The model name identifies your device type.
ZyWALL 2 Series User’s Guide Figure 20-2 System Status: Show Statistics The following table describes the labels in this screen. Table 20-2 System Status: Show Statistics LABEL DESCRIPTION Port This is the WAN or LAN port. Status This displays the port speed and duplex setting if you're using Ethernet encapsulation and down (line is down), idle (line (ppp) idle), dial (starting to trigger a call) and drop (dropping a call) if you're using PPPoE encapsulation.
Click Refresh to renew the screen. 20.4 F/W Upload Screen Find firmware at www.ZyXEL.com in a file that (usually) uses the system model name with a "*.bin" extension, e.g., "ZyWALL.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes.
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Figure 20-5 Firmware Upload LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. Browse...
ZyWALL 2 Series User’s Guide Figure 20-7 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen. If the upload was not successful, the following screen will appear. Click Return to go back to the F/W Upload screen.
ZyWALL 2 Series User’s Guide Figure 20-9 Configuration 20.5.1 Backup Configuration Backup Configuration allows you to backup (save) the current system (ZyWALL) configuration to your computer. Backup is highly recommended once your ZyWALL is functioning properly. Click Backup to save your current ZyWALL configuration to your computer. 20-8 Maintenance...
ZyWALL 2 Series User’s Guide 20.5.2 Restore Configuration Restore Configuration allows you to restore a previously saved configuration file from your computer to your ZyWALL. Table 20-4 Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. Click Browse to find the file you want to upload.
ZyWALL 2 Series User’s Guide If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default device IP address (192.168.1.1). See your Quick Start Guide for details on how to set up your computer’s IP address.
ZyWALL 2 Series User’s Guide You can also press the RESET button on the rear panel to reset the factory defaults of your ZyWALL. Refer to the section on resetting the ZyWALL for more information on the RESET button. 20.6 Restart Screen System restart allows you to reboot the ZyWALL without turning the power off.
SMT General Configuration Part XI: SMT General Configuration This part introduces the System Management Terminal and covers the General setup menu, WAN, LAN and wireless LAN setup, and Internet access. See the web configurator parts of this guide for background information on features configurable by web configurator and SMT.
When you turn on your ZyWALL, it performs several internal tests as well as line initialization. After the tests, the ZyWALL asks you to press [ENTER] to continue, as shown next. Copyright (c) 1994 - 2003 ZyXEL Communications Corp. initialize ch =0, ethernet address: 00:A0:C5:00:00:01 initialize ch =1, ethernet address: 00:A0:C5:00:00:02 Press ENTER to continue...
ZyWALL 2 Series User’s Guide 21.2.2 Entering the Password The login screen appears after you press [ENTER], prompting you to enter the password, as shown below. For your first login, enter the default password “1234”. As you type the password, the screen displays an “X” for each character you type.
[ENTER]. SMT interface. 21.3.1 Main Menu After you enter the password, the SMT displays the ZyWALL Main Menu, as shown next. Copyright (c) 1994 - 2003 ZyXEL Communications Corp. ZyWALL 2 Main Menu Getting Started Advanced Management 1. General Setup 21.
ZyWALL 2 Series User’s Guide Table 21-2 Main Menu Summary Menu Title FUNCTION General Setup Use this menu to set up dynamic DNS and administrative information. WAN Setup Use this menu to clone a MAC address from a computer on your LAN and configure the backup WAN dial-up connection.
ZyWALL 2 Series User’s Guide ZyWALL Main Menu Menu 2 Menu 3 Menu 4 Menu 11 Menu 12 Menu 15 Menu 1 WAN Setup LAN Setup Internet Access Remote Node Setup Static Routing Setup NAT Setup General Setup Setup Menu 12.1 Menu 1.1 Menu 2.1 Menu 3.1...
ZyWALL 2 Series User’s Guide 21.4 Changing the System Password Change the system password by following the steps shown next. Step 1. Enter 23 in the main menu to open Menu 23 - System Password as shown next. Menu 23 - System Password Old Password= ? New Password= ? Retype to confirm= ?
ZyWALL 2 Series User’s Guide Chapter 22 SMT Menu 1 - General Setup Menu 1 - General Setup contains administrative and system-related information. 22.1 Introduction to General Setup Menu 1 - General Setup contains administrative and system-related information. 22.2 Configuring General Setup Step 1.
Page 364
ZyWALL 2 Series User’s Guide Table 22-1 Menu 1: General Setup FIELD DESCRIPTION EXAMPLE Domain Name Enter the domain name (if you know it) here. If you leave this field blank, the ISP may assign a domain name via DHCP. You can go to menu 24.8 and type "sys domain name"...
ZyWALL 2 Series User’s Guide Menu 1.1 - Configure Dynamic DNS Service Provider= WWW.DynDNS.ORG Active= No DDNSType= DynamicDNS Host1= Host2= Host3= USER= Password= ******** Enable Wildcard= No Offline= N/A Edit Update IP Address: Use Server Detected IP= No User Specified IP Address= No IP Address= N/A Press ENTER to Confirm or ESC to Cancel: Figure 22-2 Configure Dynamic DNS...
Page 366
ZyWALL 2 Series User’s Guide Table 22-2 Configure Dynamic DNS FIELD DESCRIPTION EXAMPLE Offline This field is only available when CustomDNS is selected in the DDNS Type field. Press [SPACE BAR] and then [ENTER] to http://www.dyndns.org/ select Yes. When Yes is selected, traffic is redirected to a URL that you have previously specified (see www.dyndns.org...
ZyWALL 2 Series User’s Guide Chapter 23 WAN and Dial Backup Setup This chapter describes how to configure the WAN using menu 2 and dial-backup using menus 2.1 and 11.1. 23.1 Introduction to WAN This chapter explains how to configure settings for your WAN port. From the main menu, enter 2 to open menu 2.
ZyWALL 2 Series User’s Guide Table 23-1 MAC Address Cloning in WAN Setup FIELD DESCRIPTION EXAMPLE IP Address This field is applicable only if you choose the IP address attached on 192.168.1.35 LAN method in the Assigned By field. Enter the IP address of the computer on the LAN whose MAC you are cloning.
ZyWALL 2 Series User’s Guide The following table describes the fields in this menu. Table 23-2 Menu 2: Dial Backup Setup FIELD DESCRIPTION EXAMPLE Dial-Backup: Active Use this field to turn the dial-backup feature on (Yes) or off (No). Phone Enter the telephone number assigned to your line by your telephone 1234567 Number...
ZyWALL 2 Series User’s Guide Menu 2.1 - Advanced WAN Setup AT Command Strings: Call Control: Dial= Dial Timeout(sec)= 0 Drop= Retry Count= 0 Answer= Retry Interval(sec)= N/A Drop Timeout(sec)= 0 Drop DTR When Hang Up= No Call Back Delay(sec)= 0 AT Response Strings: CLID= Called Id=...
ZyWALL 2 Series User’s Guide Table 23-4 Advanced WAN Port Setup: Call Control Parameters FIELD DESCRIPTION DEFAULT Call Control Dial Timeout Enter a number of seconds for the ZyWALL to keep trying to set 60 seconds (sec) up an outgoing call before timing out (stopping). The ZyWALL times out and stops if it cannot set up an outgoing call within the timeout value.
ZyWALL 2 Series User’s Guide Menu 11.1 - Remote Node Profile (Backup ISP) Rem Node Name= ? Edit PPP Options= No Active= Yes Rem IP Addr= ? Edit IP= No Outgoing: Edit Script Options= No My Login= My Password= ******** Telco Option: Retype to Confirm= ******** Allocated Budget(min)= 0...
Page 373
ZyWALL 2 Series User’s Guide Table 23-5 Menu 11.1 Remote Node Profile (Backup ISP) FIELD DESCRIPTION EXAMPLE Pri Phone # Enter the first (primary) phone number from the ISP for this remote node. If the Primary Phone number is busy or does not answer, your Sec Phone # ZyWALL dials the Secondary Phone number if available.
ZyWALL 2 Series User’s Guide Table 23-5 Menu 11.1 Remote Node Profile (Backup ISP) FIELD DESCRIPTION EXAMPLE Idle Timeout Enter the number of seconds of idle time (when there is no traffic from 100 seconds the ZyWALL to the remote node) that can elapse before the ZyWALL (default) automatically disconnects the PPP connection.
ZyWALL 2 Series User’s Guide 23.7 Editing TCP/IP Options Move the cursor to the Edit IP field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to open Menu 11.3 - Remote Node Network Layer Options. Menu 11.3 - Remote Node Network Layer Options Rem IP Addr= 0.0.0.0 Rem Subnet Mask= 0.0.0.0 My WAN Addr= 0.0.0.0...
Page 376
ZyWALL 2 Series User’s Guide Table 23-6 Menu 11.3: Remote Node Network Layer Options FIELD DESCRIPTION EXAMPLE Network Network Address Translation (NAT) allows the translation of an Internet None Address protocol address used within one network (for example a private IP (default) Translation address used in a local network) to a different IP address known within...
ZyWALL 2 Series User’s Guide 23.8 Editing Login Script For some remote gateways, text login is required before PPP negotiation is started. The ZyWALL provides a script facility for this purpose. The script has six programmable sets; each set is composed of an ‘Expect’ string and a ‘Send’...
ZyWALL 2 Series User’s Guide Menu 11.4 - Remote Node Script Active= No Set 1: Set 5: Expect= Expect= Send= Send= Set 2: Set 6: Expect= Expect= Send= Send= Set 3: Expect= Send= Set 4: Expect= Send= Enter here to CONFIRM or ESC to CANCEL: Figure 23-8 Menu 11.4: Remote Node Script The following table describes the fields in this menu.
ZyWALL 2 Series User’s Guide Chapter 24 LAN Setup This chapter describes how to configure the LAN using Menu 3: LAN Setup. 24.1 Introduction to LAN Setup This chapter describes how to configure the ZyWALL for LAN connections. 24.2 Accessing the LAN Menus From the main menu, enter 3 to open Menu 3 –...
ZyWALL 2 Series User’s Guide Menu 3.1 - LAN Port Filter Setup Input Filter Sets: protocol filters= device filters= Output Filter Sets: protocol filters= device filters= Press ENTER to Confirm or ESC to Cancel: Figure 24-2 Menu 3.1: LAN Port Filter Setup 24.4 TCP/IP and DHCP Ethernet Setup Menu From the main menu, enter 3 to open Menu 3 - LAN Setup to configure TCP/IP (RFC 1155) and DHCP Ethernet setup.
ZyWALL 2 Series User’s Guide Size of the IP Menu 3.2 - TCP/IP and DHCP Ethernet Setup First address in Pool the IP Pool DHCP= Server TCP/IP Setup: Client IP Pool: Starting Address= 192.168.1.33 IP Address= 192.168.1.1 Size of Client IP Pool= 32 IP Subnet Mask= 255.255.255.0 First DNS Server= From ISP RIP Direction= Both...
ZyWALL 2 Series User’s Guide Table 24-2 LAN TCP/IP Setup Menu Fields FIELD DESCRIPTION EXAMPLE TCP/IP Setup: IP Address Enter the IP address of your ZyWALL in dotted decimal notation 192.168.1.1 (default) IP Subnet Mask Your ZyWALL will automatically calculate the subnet mask based 255.255.255.0 on the IP address that you assign.
ZyWALL 2 Series User’s Guide Figure 24-5 Physical Network Figure 24-6 Partitioned Logical Network You must use menu 3.2 to configure the first network. Move the cursor to the Edit IP Alias field, press [SPACE BAR] to choose Yes and press [ENTER] to configure the second and third network. Press [ENTER] to open Menu 3.2.1 - IP Alias Setup, as shown next.
ZyWALL 2 Series User’s Guide Table 24-3 Menu 3.2.1: IP Alias Setup FIELD DESCRIPTION DEFAULT IP Address Enter the IP address of your ZyWALL in dotted decimal notation. 192.168.2.1 IP Subnet Mask Your ZyWALL will automatically calculate the subnet mask based 255.255.255.0 on the IP address that you assign.
ZyWALL 2 Series User’s Guide Menu 3.5 - Wireless LAN Setup Enable Wireless LAN= No ESSID= Wireless Hide ESSID= No Channel ID= CH01 2412MHz RTS Threshold= 2432 Frag. Threshold= 2432 WEP= Disable Default Key= N/A Key1= N/A Key2= N/A Key3= N/A Key4= N/A Edit MAC Address Filter= No Press ENTER to Confirm or ESC to Cancel:...
Page 388
ZyWALL 2 Series User’s Guide Table 24-4 Menu 3.5: Wireless LAN Setup FIELD DESCRIPTION EXAMPLE Frag. The threshold (number of bytes) for the fragmentation boundary for 2432 Threshold directed messages. It is the maximum data fragment size that can be (default) sent.
ZyWALL 2 Series User’s Guide Step 3. In the Edit MAC Address Filter field, press [SPACE BAR] to select Yes and press [ENTER]. Menu 3.5.1 – WLAN MAC Address Filter displays as shown next. Menu 3.5.1 - WLAN MAC Address Filter Active= No Filter Action= Allowed Association MAC Address Filter...
ZyWALL 2 Series User’s Guide Chapter 25 Internet Access This chapter shows you how to configure your ZyWALL for Internet access. 25.1 Introduction to Internet Access Setup Use information from your ISP along with the instructions in this chapter to set up your ZyWALL to access the Internet.
Page 392
ZyWALL 2 Series User’s Guide Table 25-1 Menu 4: Internet Access Setup (Ethernet) FIELD DESCRIPTION Encapsulation Press [SPACE BAR] and then press [ENTER] to choose Ethernet. The encapsulation method influences your choices for the IP Address field. Service Type Press [SPACE BAR] and then [ENTER] to select Standard, RR-Toshiba (RoadRunner Toshiba authentication method), RR-Manager (RoadRunner Manager authentication method), RR-Telstra or Telia Login.
ZyWALL 2 Series User’s Guide 25.3 PPTP Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet.
ZyWALL 2 Series User’s Guide Table 25-2 New Fields in Menu 4 (PPTP) Screen FIELD DESCRIPTION EXAMPLE Encapsulation Press [SPACE BAR] and then press [ENTER] to choose PPTP. The PPTP encapsulation method influences your choices for the IP Address field. Idle Timeout This value specifies the time, in seconds, that elapses before the ZyWALL automatically disconnects from the PPTP server.
ZyWALL 2 Series User’s Guide Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= PPPoE Service Type= N/A My Login= My Password= ******** Retype to Confirm= ******** Idle Timeout= 100 IP Address Assignment= Dynamic IP Address= N/A IP Subnet Mask= N/A Gateway IP Address= N/A Network Address Translation= SUA Only Press ENTER to Confirm or ESC to Cancel:...
SMT Advanced Applications Part XII: SMT Advanced Applications This part covers setting up remote nodes, IP static routes and Network Address Translation. It also covers the SMT firewall menu, filters, SNMP, schedules and VPN setup. See the web configurator parts of this guide for background information on features configurable by web configurator and SMT.
ZyWALL 2 Series User’s Guide Chapter 26 Remote Node Setup This chapter shows you how to configure a remote node. 26.1 Introduction to Remote Node Setup A remote node is required for placing calls to a remote gateway. A remote node represents both the remote gateway and the network behind it across a WAN connection.
ZyWALL 2 Series User’s Guide Menu 11.1 - Remote Node Profile Rem Node Name= ChangeMe Route= IP Active= Yes Encapsulation= Ethernet Edit IP= No Service Type= Standard Session Options: Service Name= N/A Edit Filter Sets= No Outgoing: My Login= N/A My Password= N/A Edit Traffic Redirect= No Retype to Confirm= N/A...
Page 401
ZyWALL 2 Series User’s Guide Table 26-1 Menu 11.1: Remote Node Profile for Ethernet Encapsulation FIELD DESCRIPTION EXAMPLE My Password Enter the password assigned by your ISP when the ZyWALL calls ***** this remote node. Valid for PPPoE encapsulation only. Retype to Type your password again to make sure that you have entered it *****...
ZyWALL 2 Series User’s Guide Encapsulation to PPPoE, then you will see the next screen. Please see the appendix for more information on PPPoE. Menu 11.1 - Remote Node Profile Rem Node Name= ChangeMe Route= IP Active= Yes Encapsulation= PPPoE Edit IP= No Service Type= Standard Telco Option:...
ZyWALL 2 Series User’s Guide Do not specify a nailed-up connection unless your telephone company offers flat-rate service or you need a constant connection and the cost is of no concern. The following table describes the fields not already described in Table 26-1. Metric See the Metric section in the WAN and Dial Backup Setup chapter for details on the Metric field.
ZyWALL 2 Series User’s Guide 26.2.3 PPTP Encapsulation If you change the Encapsulation to PPTP in menu 11.1, then you will see the next screen. Please see the appendix for information on PPTP. Menu 11.1 - Remote Node Profile Rem Node Name= ChangeMe Route= IP Active= Yes Encapsulation= PPTP...
ZyWALL 2 Series User’s Guide 26.3 Edit IP Move the cursor to the Edit IP field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to open Menu 11.3 - Network Layer Options. Menu 11.3 - Remote Node Network Layer Options IP Address Assignment= Dynamic IP Address= N/A IP Subnet Mask= N/A...
Page 406
ZyWALL 2 Series User’s Guide Table 26-4 Remote Node Network Layer Options Menu Fields FIELD DESCRIPTION EXAMPLE My WAN Addr This field is applicable to PPPoE and PPTP encapsulations only. Some implementations, especially the UNIX derivatives, require the WAN link to have a separate IP network number from the LAN and each end must have a unique address within the WAN network number.
ZyWALL 2 Series User’s Guide Table 26-4 Remote Node Network Layer Options Menu Fields FIELD DESCRIPTION EXAMPLE Multicast IGMP (Internet Group Multicast Protocol) is a session-layer protocol used None to establish membership in a Multicast group. The ZyWALL supports both (default) IGMP version 1 (IGMP-v1) and version 2 (IGMP-v2).
ZyWALL 2 Series User’s Guide Menu 11.5 - Remote Node Filter Input Filter Sets: protocol filters= device filters= Output Filter Sets: protocol filters= device filters= Call Filter Sets: protocol filters= device filters= Enter here to CONFIRM or ESC to CANCEL: Figure 26-6 Menu 11.5: Remote Node Filter (PPPoE or PPTP Encapsulation) 26.5 Traffic Redirect To configure the parameters for traffic redirect, enter 11 from the main menu to display Menu 11.1—...
ZyWALL 2 Series User’s Guide Table 26-5 Menu 11.1: Remote Node Profile (Traffic Redirect Field) FIELD DESCRIPTION EXAMPLE Edit Traffic Press [SPACE BAR] to select Yes or No. Redirect Select No (default) if you do not want to configure this feature. Select Yes and press [ENTER] to configure Menu 11.6 —...
ZyWALL 2 Series User’s Guide Table 26-6 Menu 11.6: Traffic Redirect Setup FIELD DESCRIPTION EXAMPLE Active Press [SPACE BAR] and select Yes (to enable) or No (to disable) traffic redirect setup. The default is No. When the Active field is Yes, you must configure every field in this screen unless you are using PPPoE or PPTP encapsulation (except Check WAN IP Address and Timeout).
Page 411
ZyWALL 2 Series User’s Guide Table 26-6 Menu 11.6: Traffic Redirect Setup FIELD DESCRIPTION EXAMPLE When you have completed this menu, press [ENTER] at the prompt “Press [ENTER] to confirm or [ESC] to cancel” to save your configuration or press [ESC] to cancel and go back to the previous screen. Remote Node Setup 26-13...
ZyWALL 2 Series User’s Guide Chapter 27 IP Static Route Setup This chapter shows you how to configure static routes with your ZyWALL. 27.1 IP Static Route Setup Enter 12 from the main menu. Select one of the IP static routes as shown next to configure IP static routes in menu 12.
ZyWALL 2 Series User’s Guide Menu 12.1 - Edit IP Static Route Route #: 1 Route Name= ? Active= No Destination IP Address= ? IP Subnet Mask= ? Gateway IP Address= ? Metric= 2 Private= No Press ENTER to Confirm or ESC to Cancel: Figure 27-2 Menu 12.
ZyWALL 2 Series User’s Guide Chapter 28 Network Address Translation (NAT) This chapter discusses how to configure NAT on the ZyWALL. 28.1 Using NAT You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the ZyWALL. 28.1.1 SUA (Single User Account) Versus NAT SUA (Single User Account) is an implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server.
ZyWALL 2 Series User’s Guide Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= Ethernet Service Type= Standard My Login= N/A My Password= N/A Retype to Confirm= N/A Login Server= N/A Relogin Every (min)= N/A IP Address Assignment= Dynamic IP Address= N/A IP Subnet Mask= N/A Gateway IP Address= N/A...
ZyWALL 2 Series User’s Guide Table 28-1 Applying NAT in Menus 4 & 11.3 FIELD DESCRIPTION OPTIONS Network When you select this option the SMT will use Address Mapping Set 1 Full Feature Address (menu 15.1 - see section 28.2.1 for further discussion). You can Translation configure any of the mapping types described in the Web Configurator User’s Guide.
ZyWALL 2 Series User’s Guide Configure LAN IP addresses in NAT menus 15.1 and 15.2. 28.2.1 Address Mapping Sets Enter 1 to bring up Menu 15.1 — Address Mapping Sets. Menu 15.1 - Address Mapping Sets 255. SUA (read only) Enter Menu Selection Number: Figure 28-4 Menu 15.1: Address Mapping Sets SUA Address Mapping Set...
ZyWALL 2 Series User’s Guide Table 28-2 SUA Address Mapping Rules FIELD DESCRIPTION EXAMPLE Set Name This is the name of the set you selected in menu 15.1 or enter the name of a new set you want to create. This is the index or rule number.
ZyWALL 2 Series User’s Guide Menu 15.1.1 - Address Mapping Rules Set Name= ? Local Start IP Local End IP Global Start IP Global End IP Type --------------- --------------- --------------- --------------- ------ Action= None Select Rule= N/A Press ENTER to Confirm or ESC to Cancel: Figure 28-6 Menu 15.1.1: First Set The Type, Local and Global Start/End IPs are configured in menu 15.1.1.1 (described later) and the values are displayed here.
ZyWALL 2 Series User’s Guide Table 28-3 Fields in Menu 15.1.1 FIELD DESCRIPTION EXAMPLE Set Name Enter a name for this set of rules. This is a required field. If this field is left NAT_SET blank, the entire set will be deleted. Action The default is Edit.
ZyWALL 2 Series User’s Guide The following table describes the fields in this screen. Table 28-4 Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set FIELD DESCRIPTION EXAMPLE Type Press [SPACE BAR] and then [ENTER] to select from a total of five types. One-to-One These are the mapping types discussed in the Web Configurator User’s Guide.
ZyWALL 2 Series User’s Guide Step 5. Press [ENTER] at the “Press ENTER to confirm …” prompt to save your configuration after you define all the servers or press [ESC] at any time to cancel. Menu 15.2 - NAT Server Setup Rule Start Port No.
ZyWALL 2 Series User’s Guide 28.4.1 Internet Access Only In the following Internet access example, you only need one rule where all your ILAs (Inside Local addresses) map to one dynamic IGA (Inside Global Address) assigned by your ISP. Figure 28-10 NAT Example 1 Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= Ethernet...
ZyWALL 2 Series User’s Guide 28.4.2 Example 2: Internet Access with an Inside Server Figure 28-12 NAT Example 2 In this case, you do exactly as above (use the convenient pre-configured SUA Only set) and also go to menu 15.2 to specify the Inside Server behind the NAT as shown in the next figure. Menu 15.2 - NAT Server Setup Rule Start Port No.
ZyWALL 2 Series User’s Guide other LAN traffic to the remaining IGA. Map the third IGA to an inside web server and mail server. Four rules need to be configured, two bi-directional and two uni-directional as follows. Rule 1. Map the first IGA to the first inside FTP server for FTP traffic in both directions (1 : 1 mapping, giving both local and global IP addresses).
ZyWALL 2 Series User’s Guide Step 5. Select Type as One-to-One (direct mapping for packets going both ways), and enter the local Start IP as 192.168.1.10 (the IP address of FTP Server 1), the global Start IP as 10.132.50.1 (our first IGA).
ZyWALL 2 Series User’s Guide Menu 15.1.1 - Address Mapping Rules Example3 Set Name= Local Start IP Local End IP Global Start IP Global End IP Type --------------- --------------- --------------- --------------- ------ 1. 192.168.1.10 10.132.50.1 2. 192.168.1.11 10.132.50.2 3. 0.0.0.0 255.255.255.255 10.132.50.3 10.132.50.3...
ZyWALL 2 Series User’s Guide 28.4.4 Example 4: NAT Unfriendly Application Programs Some applications do not support NAT Mapping using TCP or UDP port address translation. In this case it is better to use Many-One-to-One mapping as port numbers do not change for Many-One-to-One (and One-to-One) NAT mapping types.
ZyWALL 2 Series User’s Guide Menu 15.1.1.4 Address Mapping Rule Type= Many-One-to-One Local IP: 192.168.1.10 Start= 192.168.1.12 Global IP: 10.132.50.1 Start= 10.132.20.3 Press ENTER to Confirm or ESC to Cancel: Figure 28-20 Example 4: Menu 15.1.1.1: Address Mapping Rule After you’ve configured your rule, you should be able to check the settings in menu 15.1.1 as shown next. Menu 15.1.1 - Address Mapping Rules Set Name= Example4 Local Start IP...
ZyWALL 2 Series User’s Guide LAN computer, you have to manually replace the LAN computer's IP address in the forwarding port with another LAN computer's IP address, Trigger port forwarding solves this problem by allowing computers on the LAN to dynamically take turns using the service.
ZyWALL 2 Series User’s Guide 5. Only A can connect to the Real Audio server until the connection is closed or times out. The ZyWALL times out in three minutes with UDP (User Datagram Protocol) or two hours with TCP/IP (Transfer Control Protocol/Internet Protocol).
ZyWALL 2 Series User’s Guide Table 28-5 Menu 15.3: Trigger Port Setup FIELD DESCRIPTION EXAMPLE Rule This is the rule index number. Name Enter a unique name for identification purposes. You may enter up to 15 Real Audio characters in this field. All characters are permitted - including spaces. Incoming Incoming is a port (or a range of ports) that a server on the WAN uses when it sends out a particular service.
ZyWALL 2 Series User’s Guide Chapter 29 Introducing the Firewall This chapter shows you how to get started with the firewall. 29.1 Using SMT Menus From the main menu enter 21 to go to Menu 21 - Filter Set and Firewall Configuration to display the screen shown next.
ZyWALL 2 Series User’s Guide Menu 21.2 - Firewall Setup The firewall protects against Denial of Service (DoS) attacks when it is active. Your network is vulnerable to attacks when the firewall is turned off. Refer to the User's Guide for details about the firewall default policies.
ZyWALL 2 Series User’s Guide Chapter 30 Filter Configuration This chapter shows you how to create and apply filters. 30.1 Introduction to Filters Your ZyWALL uses filters to decide whether to allow passage of a data packet and/or to make a call. There are two types of filter applications: data filtering and call filtering.
ZyWALL 2 Series User’s Guide Call Filtering Active Data Built-in User-defined match match match Outgoing Initiate call default Call Filters Data Packet if line not up Call Filters (if applicable) Send packet and reset Idle Timer Match Match Match Drop Drop packet Drop packet packet...
ZyWALL 2 Series User’s Guide Start Packet into filter Fetch First Filter Set Filter Set Fetch Next Fetch First Filter Set Filter Rule Fetch Next Filter Rule Next filter Next Filter Set Rule Active? Available? Available? Execute Filter Rule Check Next Rule Forward...
ZyWALL 2 Series User’s Guide You can apply up to four filter sets to a particular port to block multiple types of packets. With each filter set having up to six rules, you can have a maximum of 24 rules active for a single port. 30.2 Configuring a Filter Set The ZyWALL includes filtering for NetBIOS over TCP/IP packets by default.
ZyWALL 2 Series User’s Guide Step 4. Enter a descriptive name or comment in the Edit Comments field and press [ENTER]. Step 5. Press [ENTER] at the message [Press ENTER to confirm] to open Menu 21.1.1 - Filter Rules Summary. This screen shows the summary of the existing rules in the filter set.
ZyWALL 2 Series User’s Guide Table 30-2 Rule Abbreviations Used ABBREVIATION DESCRIPTION Protocol Source Address Source Port number Destination Address Destination Port number Offset Length Refer to the next section for information on configuring the filter rules. 30.2.1 Configuring a Filter Rule To configure a filter rule, type its number in Menu 21.1.1 - Filter Rules Summary and press [ENTER] to open menu 21.1.1.1 for the rule.
ZyWALL 2 Series User’s Guide To configure TCP/IP rules, select TCP/IP Filter Rule from the Filter Type field and press [ENTER] to open Menu 21.1.1.1 - TCP/IP Filter Rule, as shown next. Menu 21.1.1.1 - TCP/IP Filter Rule Filter #: 1,1 Filter Type= TCP/IP Filter Rule Active= Yes IP Protocol= 0...
Page 444
ZyWALL 2 Series User’s Guide Table 30-3 TCP/IP Filter Rule Menu Fields FIELD DESCRIPTION OPTIONS Port # Enter the destination port of the packets that you wish to filter. 0-65535 The range of this field is 0 to 65535. This field is ignored if it is Port # Comp Press [SPACE BAR] and then [ENTER] to select the None...
Page 445
ZyWALL 2 Series User’s Guide Table 30-3 TCP/IP Filter Rule Menu Fields FIELD DESCRIPTION OPTIONS Press [SPACE BAR] and then [ENTER] to select a logging None option from the following: Action Matched None – No packets will be logged. Action Matched - Only packets that match the rule Action Not parameters will be logged.
ZyWALL 2 Series User’s Guide Packet into IP Filter Filter Active? Apply SrcAddrMask to Src Addr Check Src Not Matched IP Addr Matched Apply DestAddrMask to Dest Addr Check Dest Not Matched IP Addr Matched Check Not Matched IP Protocol Matched Check Src &...
ZyWALL 2 Series User’s Guide 30.2.3 Configuring a Generic Filter Rule This section shows you how to configure a generic filter rule. The purpose of generic rules is to allow you to filter non-IP packets. For IP, it is generally easier to use the IP rules directly. For generic rules, the ZyWALL treats a packet as a byte stream as opposed to an IP or IPX packet.
Page 448
ZyWALL 2 Series User’s Guide Table 30-4 Menu 21.1.1.1: Generic Filter Rule FIELD DESCRIPTION OPTIONS Filter Use [SPACE BAR] and then [ENTER] to select a rule type. Parameters Generic Filter Type displayed below each type will be different. TCP/IP filter rules are used to Rule filter IP packets while generic filter rules allow filtering of non-IP packets.
ZyWALL 2 Series User’s Guide 30.3 Example Filter Let’s look at an example to block outside users from accessing the ZyWALL via telnet. Please see our included disk for more example filters. Figure 30-8 Telnet Filter Example Step 1. Enter 21 from the main menu to open Menu 21 - Filter and Firewall Setup. Step 2.
ZyWALL 2 Series User’s Guide Press [SPACE BAR] and then Menu 21.1.3.1 - TCP/IP Filter Rule [ENTER] to choose this filter rule Filter #: 3,1 type. The first filter rule type Filter Type= TCP/IP Filter Rule Active= Yes determines all subsequent filter IP Protocol= 6 IP Source Route= No types within a set.
ZyWALL 2 Series User’s Guide Menu 21.1.3 - Filter Rules Summary # A Type Filter Rules M m n - - ---- --------------------------------------------------------------- - - - 1 Y IP Pr=6, SA=0.0.0.0, DA=0.0.0.0, DP=23 N D F This shows you that you have M = N means an action can be taken immediately.
ZyWALL 2 Series User’s Guide 30.4 Filter Types and NAT There are two classes of filter rules, Generic Filter (Device) rules and protocol filter (TCP/IP) rules. Generic filter rules act on the raw data from/to LAN and WAN. Protocol filter rules act on the IP packets. Generic and TCP/IP filter rules are discussed in more detail in the next section.
ZyWALL 2 Series User’s Guide 30.6 Applying a Filter This section shows you where to apply the filter(s) after you design it (them). The ZyWALL already has filters to prevent NetBIOS traffic from triggering calls, and block incoming telnet, FTP and HTTP connections.
ZyWALL 2 Series User’s Guide Chapter 31 SNMP Configuration This chapter explains SNMP configuration menu 22. 31.1 SNMP Configuration To configure SNMP, enter 22 from the main menu to display Menu 22 - SNMP Configuration as shown next. The “community” for Get, Set and Trap fields is SNMP terminology for password. Menu 22 - SNMP Configuration SNMP: Get Community= public...
ZyWALL 2 Series User’s Guide Table 31-1 Menu 22: SNMP Configuration FIELD DESCRIPTION EXAMPLE Trap Type the Trap community, which is the password sent with each Public trap to the SNMP manager. Community Destination Type the IP address of the station to send your SNMP traps to. 0.0.0.0 When you have completed this menu, press [ENTER] at the prompt “Press [ENTER] to confirm or [ESC] to cancel”...
SMT System Maintenance Part XIII: SMT System Maintenance This part covers system information and diagnosis, firmware and configuration file maintenance, as well as providing information on the system maintenance and information functions and how to configure remote management and VPN. See the web configurator parts of this guide for background information on features configurable by web configurator and SMT.
ZyWALL 2 Series User’s Guide Chapter 32 System Information & Diagnosis This chapter covers SMT menus 24.1 to 24.4. 32.1 Introduction to System Status This chapter covers the diagnostic tools that help you to maintain your ZyWALL. These tools include updates on system status, port status and log and trace capabilities.
ZyWALL 2 Series User’s Guide Status is a tool that can be used to monitor your ZyWALL. Specifically, it gives you information on your system firmware version, number of packets sent and number of packets received. To get to the System Status: Step 1.
Routing Refers to the routing protocol used. ZyNOS F/W Version Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. ZyNOS is a registered trademark of ZyXEL Communications Corporation. You may enter 1 to drop the WAN connection, 9 to reset the counters or [ESC] to return to menu 24.
ZyWALL 2 Series User’s Guide Step 2. Enter 2 to open Menu 24.2 - System Information and Console Port Speed. Step 3. From this menu you have two choices as shown in the next figure: Menu 24.2 - System Information and Console Port Speed 1.
Table 32-2 Fields in System Maintenance: Information FIELD DESCRIPTION ZyNOS F/W Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. Version ZyNOS is a registered trademark of ZyXEL Communications Corporation. Ethernet Address Refers to the Ethernet MAC (Media Access Control) address of your ZyWALL.
ZyWALL 2 Series User’s Guide Menu 24.3 - System Maintenance - Log and Trace 2. UNIX Syslog 4. Call-Triggering Packet Press ENTER to Confirm or ESC to Cancel Figure 32-6 Menu 24.3: System Maintenance: Log and Trace 32.4.1 UNIX Syslog The ZyWALL uses the UNIX syslog facility to log the CDR (Call Detail Record) and system messages to a syslog server.
ZyWALL 2 Series User’s Guide Table 32-3 System Maintenance Menu Syslog Parameters PARAMETER DESCRIPTION Log Facility Press [SPACE BAR] and then [ENTER] to select a location. The log facility allows you to log the messages to different files in the syslog server. Refer to the documentation of your syslog program for more details When finished configuring this screen, press [ENTER] to confirm or [ESC] to cancel.
ZyWALL 2 Series User’s Guide Filter log Message Format SdcmdSyslogSend(SYSLOG_FILLOG, SYSLOG_NOTICE, String ); String = IP[Src=xx.xx.xx.xx Dst=xx.xx.xx.xx prot spo=xxxx dpo=xxxx] S04>R01mD IP[…] is the packet header and S04>R01mD means filter set 4 (S) and rule 1 (R), match (m) drop (D).
ZyWALL 2 Series User’s Guide 32.4.2 Call-Triggering Packet Call-Triggering Packet displays information about the packet that triggered a dial-out call in an easy readable format. Equivalent information is available in menu 24.1 in hex format. An example is shown next. IP Frame: ENET0-RECV Size: Time: 17:02:44.262 Frame Type:...
ZyWALL 2 Series User’s Guide Follow the procedure below to get to Menu 24.4 - System Maintenance – Diagnostic. Step 1. From the main menu, select option 24 to open Menu 24 - System Maintenance. Step 2. From this menu, select option 4. Diagnostic. This will open Menu 24.4 - System Maintenance - Diagnostic.
ZyWALL 2 Series User’s Guide Figure 32-10 WAN & LAN DHCP The following table describes the diagnostic tests available in menu 24.4 for your ZyWALL and associated connections. Table 32-4 System Maintenance Menu Diagnostic FIELD DESCRIPTION Ping Host Enter 1 to ping any machine (with an IP address) on your LAN or WAN. Enter its IP address in the Host IP Address field below.
ZyWALL 2 User’s Guide Chapter 33 Firmware and Configuration File Maintenance This chapter tells you how to back up and restore your configuration file as well as upload new firmware and a new configuration file. 33.1 Introduction Use the instructions in this chapter to change the ZyWALL’s configuration file or upgrade its firmware. After you configure your ZyWALL, you can backup the configuration file to a computer.
ZyWALL 2 User’s Guide ftp> get rom-0 config.cfg This is a sample FTP session saving the current configuration to the computer file “config.cfg”. If your (T)FTP client does not allow you to have a destination filename different than the source, you will need to rename them as the ZyWALL only recognizes “rom-0”...
ZyWALL 2 User’s Guide preferred method for backing up your current configuration to your computer since it is faster. You can also perform backup and restore using menu 24 through the console port. Any serial communications program should work fine; however, you must use Xmodem protocol to perform the download/upload and you don’t have to rename the files.
ZyWALL 2 User’s Guide Step 6. Use “get” to transfer files from the ZyWALL to the computer, for example, “get rom-0 config.rom” transfers the configuration file on the ZyWALL to your computer and renames it “config.rom”. See earlier in this chapter for more information on filename conventions. Step 7.
ZyWALL 2 User’s Guide 33.3.5 File Maintenance Over WAN TFTP, FTP and Telnet over the WAN will not work when: 1. The firewall is active (turn the firewall off in menu 21.2 or create a firewall rule to allow access from the WAN).
ZyWALL 2 User’s Guide TFTP client program. For UNIX, use “get” to transfer from the ZyWALL to the computer and “binary” to set binary transfer mode. 33.3.7 TFTP Command Example The following is an example TFTP command: tftp [-i] host get rom-0 config.rom Where “i”...
ZyWALL 2 User’s Guide Step 1. Display menu 24.5 and enter “y” at the following screen. Ready to backup Configuration via Xmodem. Do you want to continue (y/n): Figure 33-3 System Maintenance: Backup Configuration Step 2. The following screen indicates that the Xmodem download has started. You can enter ctrl-x to terminate operation any time.
ZyWALL 2 User’s Guide 33.4 Restore Configuration This section shows you how to restore a previously saved configuration. Note that this function erases the current configuration before restoring a previous back up configuration; please do not attempt to restore unless you have a backup configuration file stored on disk. FTP is the preferred method for restoring your current computer configuration to your ZyWALL since FTP is faster.
ZyWALL 2 User’s Guide Step 1. Launch the FTP client on your computer. Step 2. Enter “open”, followed by a space and the IP address of your ZyWALL. Step 3. Press [ENTER] when prompted for a username. Step 4. Enter your password as requested (the default is “1234”). Step 5.
ZyWALL 2 User’s Guide Step 1. Display menu 24.6 and enter “y” at the following screen. Ready to restore Configuration via Xmodem. Do you want to continue (y/n): Figure 33-9 System Maintenance: Restore Configuration Step 2. The following screen indicates that the Xmodem download has started. Starting XMODEM download (CRC mode) ...
ZyWALL 2 User’s Guide 33.5 Uploading Firmware and Configuration Files This section shows you how to upload firmware and configuration files. You can upload configuration files by following the procedure in the previous Restore Configuration section or by following the instructions in Menu 24.7.2 - System Maintenance - Upload System Configuration File (for console port).
ZyWALL 2 User’s Guide 33.5.2 Configuration File Upload You see the following screen when you telnet into menu 24.7.2. Menu 24.7.2 - System Maintenance - Upload System Configuration File To upload the system configuration file, follow the procedure below: 1. Launch the FTP client on your workstation. 2.
ZyWALL 2 User’s Guide transfers the configuration file on the ZyWALL to your computer and renames it “config.rom.” See earlier in this chapter for more information on filename conventions. Step 7. Enter “quit” to exit the ftp prompt. 33.5.4 FTP Session Example of Firmware File Upload 331 Enter PASS command Password: 230 Logged in...
ZyWALL 2 User’s Guide Step 3. Enter the command “sys stdio 0” to disable the console timeout, so the TFTP transfer will not be interrupted. Enter “command sys stdio 5” to restore the five-minute console timeout (default) when the file transfer is complete. Step 4.
ZyWALL 2 User’s Guide 33.5.8 Uploading Firmware File Via Console Port Step 1. Select 1 from Menu 24.7 – System Maintenance – Upload Firmware to display Menu 24.7.1 - System Maintenance - Upload System Firmware, and then follow the instructions as shown in the following screen.
ZyWALL 2 User’s Guide Type the firmware file’s location, or click Browse to look for it. Choose the Xmodem protocol. Then click Send. Figure 33-17 Example Xmodem Upload After the firmware upload process has completed, the ZyWALL will automatically restart. 33.5.10 Uploading Configuration File Via Console Port Step 1.
ZyWALL 2 User’s Guide Menu 24.7.2 - System Maintenance - Upload System Configuration File To upload system configuration file: 1. Enter "y" at the prompt below to go into debug mode. 2. Enter "atlc" after "Enter Debug Mode" message. 3. Wait for "Starting XMODEM upload" message before activating Xmodem upload on your terminal.
ZyWALL 2 User’s Guide Type the configuration file’s location, or click Browse to search for it. Choose the Xmodem protocol. Then click Send. Figure 33-19 Example Xmodem Upload After the configuration upload process has completed, restart the ZyWALL by entering “atgo”. 33-18 Firmware and Configuration File Maintenance...
ZyWALL 2 User’s Guide Chapter 34 System Maintenance Menus 8 to 10 This chapter leads you through SMT menus 24.8 to 24.10. 34.1 Command Interpreter Mode The Command Interpreter (CI) is a part of the main router firmware. The CI provides much of the same functionality as the SMT, while adding some low-level setup and diagnostic functions.
A list of commands can be found by typing help or ? at the command prompt. Always type the full command. Type exit to return to the SMT main menu when finished. Copyright (c) 1994 - 2003 ZyXEL Communications Corp. ras> ?
ZyWALL 2 User’s Guide Table 34-1 Valid Commands ether These commands display Ethernet information and configure Ethernet settings. These commands display dial backup information and control dial backup connections. These commands display IP information and configure IP settings. ipsec These commands display IPSec information and configure IPSec settings. 34.2 Call Control Support The ZyWALL provides two call control functions: budget management and call history.
ZyWALL 2 User’s Guide Menu 24.9.3 - Budget Management Remote Node Connection Time/Total Budget Elapsed Time/Total Period 1.ChangeMe No Budget No Budget 2.-------- Reset Node (0 to update screen): Figure 34-4 Budget Management The total budget is the time limit on the accumulated time for outgoing calls to a remote node. When this limit is reached, the call will be dropped and further outgoing calls to that remote node will be blocked.
ZyWALL 2 User’s Guide Menu 24.9.4 - Call History Phone Number Rate #call Total Enter Entry to Delete(0 to exit): Figure 34-5 Call History The following table describes the fields in this screen. Table 34-3 Call History Fields FIELD DESCRIPTION Phone Number The PPPoE service names are shown here.
ZyWALL 2 User’s Guide Select menu 24 in the main menu to open Menu 24 - System Maintenance, as shown next. Menu 24 - System Maintenance System Status System Information and Console Port Speed Log and Trace Diagnostic Backup Configuration Restore Configuration Upload Firmware Command Interpreter Mode...
ZyWALL 2 User’s Guide Table 34-4 Menu 24.10 System Maintenance: Time and Date Setting FIELD DESCRIPTION Time Protocol Enter the time service protocol that your timeserver sends when you turn on the ZyWALL. Not all timeservers support all protocols, so you may have to check with your ISP/network administrator or use trial and error to find a protocol that works.
Page 496
ZyWALL 2 User’s Guide When the ZyWALL starts up, if there is a timeserver configured in menu 24.10. iii. 24-hour intervals after starting. 34-8 System Maintenance & Information...
ZyWALL 2 User’s Guide Chapter 35 Remote Management This chapter covers remote management found in SMT menu 24.11. 35.1 Remote Management Remote management allows you to determine which services/protocols can access which ZyWALL interface (if any) from which computers. You may manage your ZyWALL from a remote location via: Internet (WAN only) ALL (LAN and WAN) LAN only,...
ZyWALL 2 User’s Guide Menu 24.11 - Remote Management Control TELNET Server: Port = 23 Access = ALL Secure Client IP = 0.0.0.0 FTP Server: Port = 21 Access = ALL Secure Client IP = 0.0.0.0 SSH Server: Certificate = auto_generated_self_signed_cert Port = 0 Access = ALL Secure Client IP = 0.0.0.0...
ZyWALL 2 User’s Guide Table 35-1 Menu 24.11 – Remote Management Control FIELD DESCRIPTION EXAMPLE Once you have filled in this menu, press [ENTER] at the message "Press ENTER to Confirm or ESC to Cancel" to save your configuration, or press [ESC] to cancel. 35.1.1 Remote Management Limitations Remote management over LAN or WAN will not work when: 1.
SMT Advanced Management Part XIV: SMT Advanced Management This part provides information on how to configure call scheduling, and VPN/IPSec. See the web configurator parts of this guide for background information on features configurable by web configurator and SMT.
ZyWALL 2 Series User’s Guide Chapter 36 Call Scheduling Call scheduling allows you to dictate when a remote node should be called and for how long. 36.1 Introduction to Call Scheduling The call scheduling feature allows the ZyWALL to manage a remote node and dictate when a remote node should be called and for how long.
ZyWALL 2 Series User’s Guide To set up a schedule set, select the schedule set you want to setup from menu 26 (1-12) and press [ENTER] to see Menu 26.1 - Schedule Set Setup as shown next. Menu 26.1 - Schedule Set Setup Active= Yes Start Date(yyyy/mm/dd) = 2000 –...
Page 505
ZyWALL 2 Series User’s Guide Table 36-1 Schedule Set Setup FIELD DESCRIPTION OPTIONS If you selected Weekly in the How Often field above, then select the day(s) when the set should activate (and recur) by going to that day(s) and pressing [SPACE BAR] to select Yes, then press [ENTER].
ZyWALL 2 Series User’s Guide Menu 11.1 - Remote Node Profile Rem Node Name= ChangeMe Route= IP Active= Yes Encapsulation= PPPoE Edit IP= No Service Type= Standard Telco Option: Service Name= Allocated Budget(min)= 0 Outgoing= Period(hr)= 0 My Login= Schedules= 1,2,3,4 My Password= ******** Nailed-Up Connection= No Authen= CHAP/PAP...
ZyWALL 2 Series User’s Guide Chapter 37 VPN/IPSec Setup This chapter introduces the VPN SMT menus. 37.1 Introduction The VPN/IPSec main SMT menu has these main submenus: 1. Define VPN policies in menu 27.1 submenus, including security policies, endpoint IP addresses, peer IPSec router IP address and key management.
002 zw2 1.1.1.1 1.1.1.1 Tunnel AH SHA1 4.4.4.4 255.255.0.0 zw2test.zyxel Select Command= None Select Rule= Press ENTER to Confirm or ESC to Cancel: Figure 37-3 Menu 27.1: IPSec Summary The following table describes the fields in this screen. Table 37-1 Menu 27.1: IPSec Summary...
Page 509
ZyWALL 2 Series User’s Guide Table 37-1 Menu 27.1: IPSec Summary FIELD DESCRIPTION EXAMPLE Name This field displays the unique identification name for this VPN rule. The Taiwan name may be up to 32 characters long but only 10 characters will be displayed here.
Page 510
ZyWALL 2 Series User’s Guide Table 37-1 Menu 27.1: IPSec Summary FIELD DESCRIPTION EXAMPLE Key Mgt This field displays the SA’s type of key management, (IKE or Manual). Remote When the Addr Type field in Menu 27.1.1 IPSec Setup is configured to 172.16.2.40 Addr Start Single, this is a static IP address on the network behind the remote IPSec...
ZyWALL 2 Series User’s Guide Table 37-1 Menu 27.1: IPSec Summary FIELD DESCRIPTION EXAMPLE Select Press [SPACE BAR] to choose from None, Edit, Delete, Go To Rule, None Command Next Page or Previous Page and then press [ENTER]. You must select a rule in the next field when you choose the Edit, Delete or Go To commands.
Keep Alive= No Nat Traversal= No Local ID type= IP Content= My IP Addr= 0.0.0.0 Peer ID type= IP Content= Secure Gateway Address= zw2test.zyxel Protocol= 0 DNS Server= 0.0.0.0 Local: Addr Type= SINGLE IP Addr Start= 1.1.1.1 End/Subnet Mask= N/A...
Page 513
ZyWALL 2 Series User’s Guide Table 37-2 Menu 27.1.1: IPSec Setup FIELD DESCRIPTION EXAMPLE NAT Traversal Select this check box to enable NAT traversal. NAT traversal allows you to set up a VPN connection when there are NAT routers between the two IPSec routers.
Page 514
ZyWALL 2 Series User’s Guide Table 37-2 Menu 27.1.1: IPSec Setup FIELD DESCRIPTION EXAMPLE Peer ID type Press [SPACE BAR] to choose IP, DNS, or E-mail and press [ENTER]. Select IP to identify the remote IPSec router by its IP address. Select DNS to identify the remote IPSec router by a domain name.
Page 515
ZyWALL 2 Series User’s Guide Table 37-2 Menu 27.1.1: IPSec Setup FIELD DESCRIPTION EXAMPLE Local Local IP addresses must be static and correspond to the remote IPSec router's configured remote IP addresses. Two active SAs can have the same configured local or remote IP address, but not both.
Page 516
ZyWALL 2 Series User’s Guide Table 37-2 Menu 27.1.1: IPSec Setup FIELD DESCRIPTION EXAMPLE End Enter a port number in this field to define a port range. This port number must be greater than that specified in the previous field. This field is N/A when 0 is configured in the Port Start field.
ZyWALL 2 Series User’s Guide Table 37-2 Menu 27.1.1: IPSec Setup FIELD DESCRIPTION EXAMPLE Port Start 0 is the default and signifies any port. Type a port number from 0 to 65535. Someone behind the remote IPSec router cannot create a VPN tunnel when attempting to connect using a port number that does not match this port number or range of port numbers.
ZyWALL 2 Series User’s Guide Menu 27.1.1.1 - IKE Setup Phase 1 Negotiation Mode= Main Authentication Method= PreShare Key PSK= qwer1234 Certificate= N/A Encryption Algorithm= DES Authentication Algorithm= MD5 SA Life Time (Seconds)= 300 Key Group= DH1 Phase 2 Active Protocol= ESP Encryption Algorithm= DES Authentication Algorithm= MD5 SA Life Time (Seconds)= 2880...
Page 519
ZyWALL 2 Series User’s Guide Table 37-3 Menu 27.1.1.1: IKE Setup FIELD DESCRIPTION EXAMPLE Encryption When DES is used for data communications, both sender and receiver must Algorithm know the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code.
ZyWALL 2 Series User’s Guide Table 37-3 Menu 27.1.1.1: IKE Setup FIELD DESCRIPTION EXAMPLE Encapsulation Press [SPACE BAR] to choose from Tunnel mode or Transport mode and Tunnel then press [ENTER]. See earlier for a discussion of these. Perfect Perfect Forward Secrecy (PFS) is disabled (None) by default in phase 2 None Forward IPSec SA setup.
ZyWALL 2 Series User’s Guide To edit this menu, move the cursor to the Edit Manual Setup field in Menu 27.1.1 – IPSec Setup press [SPACE BAR] to select Yes and then press [ENTER] to go to Menu 27.1.1.2 – Manual Setup. Menu 27.1.1.2 –...
Page 522
ZyWALL 2 Series User’s Guide Table 37-5 Menu 27.1.1.2: Manual Setup FIELD DESCRIPTION EXAMPLE Key3 Enter a unique eight-character key. It can be comprised of any character including spaces (but trailing spaces are truncated). Authentication Press [SPACE BAR] to choose from MD5 or SHA1 and then press [ENTER]. Algorithm Key Enter the authentication key to be used by IPSec if applicable.
ZyWALL 2 Series User’s Guide Chapter 38 SA Monitor This chapter teaches you how to manage your SAs by using the SA Monitor in SMT menu 27.2. 38.1 Introduction A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This menu (shown next) displays active VPN connections.
ZyWALL 2 Series User’s Guide Table 38-1 Menu 27.2: SA Monitor FIELD DESCRIPTION EXAMPLE This is the security association index number. Name This field displays the identification name for this VPN policy. This name is Taiwan unique for each connection where the secure gateway IP address is a public static IP address.
General Appendices Part XV: General Appendices This part provides background information about troubleshooting, setting up your computer’s IP address, triangle route, how functions are related, PPPoE, PPTP, wireless LAN, 802.1x, EAP authentication, IP subnetting and safety warnings.
ZyWALL 2 Series User’s Guide Appendix A Troubleshooting This chapter covers potential problems and possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. Please see our included disk for further information. Problems Starting Up the ZyWALL Chart 1 Troubleshooting the Start-Up of Your ZyWALL PROBLEM...
Page 528
ZyWALL 2 Series User’s Guide Problems with the LAN Interface Chart 3 Troubleshooting the LAN Interface PROBLEM CORRECTIVE ACTION Cannot access Check your Ethernet cable type and connections. Refer to the Quick Start Guide for LAN the ZyWALL connection instructions. from the LAN.
Page 529
ZyWALL 2 Series User’s Guide Problems with Internet Access Chart 5 Troubleshooting Internet Access PROBLEM CORRECTIVE ACTION Cannot Connect your cable/DSL modem with the ZyWALL using the appropriate cable. access the Check with the manufacturer of your cable/DSL device about your cable requirement Internet.
ZyWALL 2 Series User’s Guide Appendix B Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer.
Page 532
ZyWALL 2 Series User’s Guide The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: In the Network window, click Add. Select Adapter and then click Add.
Page 533
ZyWALL 2 Series User’s Guide Click the IP Address tab. -If your IP address is dynamic, select Obtain an IP address automatically. -If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields. Click the DNS Configuration tab.
Page 534
ZyWALL 2 Series User’s Guide Click the Gateway tab. -If you do not know your gateway’s IP address, remove previously installed gateways. -If you have a gateway IP address, type it in the New gateway field and click Add. Click OK to save and close the TCP/IP Properties window. Click OK to close the Network window.
Page 535
ZyWALL 2 Series User’s Guide For Windows XP, click Start, Control Panel. In Windows 2000/NT, click Start, Settings, Control Panel. For Windows XP, click Network Right-click Local Area Connection and Connections. For Windows 2000/NT, click then click Properties. Network and Dial-up Connections. Setting Up Your Computer’s IP Address...
Page 536
ZyWALL 2 Series User’s Guide Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). -If you have a dynamic IP address click Obtain an IP address automatically.
Page 537
ZyWALL 2 Series User’s Guide -If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: -In the IP Settings tab, in IP addresses, click Add.
Page 538
ZyWALL 2 Series User’s Guide In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): -Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). -If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
Page 539
ZyWALL 2 Series User’s Guide Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Select Ethernet built-in from the Connect via list. For dynamically assigned settings, select Using DHCP Server from the Configure: list. Setting Up Your Computer’s IP Address...
Page 540
ZyWALL 2 Series User’s Guide For statically assigned settings, do the following: -From the Configure box, select Manually. -Type your IP address in the IP Address box. -Type your subnet mask in the Subnet mask box. -Type the IP address of your ZyWALL in the Router address box. Close the TCP/IP Control Panel.
Page 541
ZyWALL 2 Series User’s Guide Click Network in the icon bar. - Select Automatic from the Location list. - Select Built-in Ethernet from the Show list. - Click the TCP/IP tab. For dynamically assigned settings, select Using DHCP from the Configure list. For statically assigned settings, do the following: -From the Configure box, select Manually.
ZyWALL 2 Series User’s Guide Appendix C Triangle Route The Ideal Setup When the firewall is on, your ZyWALL acts as a secure gateway between your LAN and the Internet. In an ideal network topology, all incoming and outgoing network traffic passes through the ZyWALL to protect your LAN against attacks.
Page 544
ZyWALL 2 Series User’s Guide Diagram 2 “Triangle Route” Problem The “Triangle Route” Solutions This section presents you two solutions to the “triangle route” problem. IP Aliasing IP alias allows you to partition your network into logical sections over the same Ethernet interface. Your ZyWALL supports up to three logical LAN interfaces with the ZyWALL being the gateway for each logical network.
Page 545
ZyWALL 2 Series User’s Guide Diagram 3 IP Alias Gateways on the WAN Side A second solution to the “triangle route” problem is to put all of your network gateways on the WAN side as the following figure shows. This ensures that all incoming network traffic passes through your ZyWALL to your LAN.
Page 546
ZyWALL 2 Series User’s Guide Step 3. Use the following commands to allow/disallow triangle route. sys firewall ignore triangle all off This command allows triangle route. sys firewall ignore triangle all on This command disallows triangle route. Triangle Route...
Page 547
ZyWALL 2 Series User’s Guide Appendix D Wireless LAN and IEEE 802.11 A wireless LAN (WLAN) provides a flexible data communications system that you can use to access various services (navigating the Internet, email, printer services, etc.) without the use of a cabled connection. In effect a wireless LAN environment provides you the freedom to stay connected to the network while roaming around in the coverage area.
ZyWALL 2 Series User’s Guide Spread Spectrum (DSSS) and Frequency-Hopping Spread Spectrum (FHSS), in the 2.4 to 2.4825 GHz unlicensed ISM (Industrial, Scientific and Medical) band. The third method is infrared technology, using very high frequencies, just below visible light in the electromagnetic spectrum to carry data. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless nodes or stations (STA), which is called a Basic Service Set (BSS).
Page 549
ZyWALL 2 Series User’s Guide could be any type of network, it is almost invariably an Ethernet LAN. Mobile nodes can roam between Access Points and seamless campus-wide coverage is possible. Diagram D-2 ESS Provides Campus-Wide Coverage Wireless LAN and IEEE 802.11...
ZyWALL 2 Series User’s Guide Appendix E Wireless LAN With IEEE 802.1x As wireless networks become popular for both portable computing and corporate networks, security is now a priority. Security Flaws with IEEE 802.11 Wireless networks based on the original IEEE 802.11 have a poor reputation for safety. The IEEE 802.11b wireless access standard, first published in 1999, was based on the MAC address.
ZyWALL 2 Series User’s Guide RADIUS Server Authentication Sequence The following figure depicts a typical wireless network with a remote RADIUS server for user authentication using EAPOL (EAP Over LAN). Client computer access authorized. Client computer access not authorized. Diagram E-1 Sequences for EAP MD5–Challenge Authentication Wireless LAN with IEEE 802.1x...
ZyWALL 2 Series User’s Guide Appendix F Types of EAP Authentication This appendix discusses three popular EAP authentication types: EAP-MD5, EAP-TLS and EAP-TTLS. The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information.
Page 554
ZyWALL 2 Series User’s Guide TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS- CHAP v2. EAP-MD5 EAP-TLS EAP-TTLS Mutual Authentication Certificate – Client Optional Certificate – Server Dynamic Key Exchange Credential Security None Strong Strong Deployment...
ZyWALL 2 Series User’s Guide Appendix G PPPoE PPPoE in Action An ADSL modem bridges a PPP session over Ethernet (PPP over Ethernet, RFC 2516) from your PC to an ATM PVC (Permanent Virtual Circuit), which connects to a DSL Access Concentrator where the PPP session terminates (see the next figure).
Page 556
ZyWALL 2 Series User’s Guide The PPPoE driver makes the Ethernet appear as a serial link to the PC and the PC runs PPP over it, while the modem bridges the Ethernet frames to the Access Concentrator (AC). Between the AC and an ISP, the AC is acting as a L2TP (Layer 2 Tunneling Protocol) LAC (L2TP Access Concentrator) and tunnels the PPP frames to the ISP.
ZyWALL 2 Series User’s Guide Appendix H PPTP What is PPTP? PPTP (Point-to-Point Tunneling Protocol) is a Microsoft proprietary protocol (RFC 2637 for PPTP is informational only) to tunnel PPP frames. How can we transport PPP frames from a PC to a broadband modem over Ethernet? A solution is to build PPTP into the ANT (ADSL Network Termination) where PPTP is used only over the short haul between the PC and the modem over Ethernet.
Page 558
ZyWALL 2 Series User’s Guide PPTP is very similar to L2TP, since L2TP is based on both PPTP and L2F (Cisco’s Layer 2 Forwarding). Conceptually, there are three parties in PPTP, namely the PNS (PPTP Network Server), the PAC (PPTP Access Concentrator) and the PPTP user.
Page 559
ZyWALL 2 Series User’s Guide Diagram H-3 Example Message Exchange between PC and an ANT PPP Data Connection The PPP frames are tunneled between the PNS and PAC over GRE (General Routing Encapsulation, RFC 1701, 1702). The individual calls within a tunnel are distinguished using the Call ID field in the GRE header. PPTP...
Page 561
ZyWALL 2 Series User’s Guide Appendix I IP Subnetting IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
ZyWALL 2 Series User’s Guide A class “A” address (24 host bits) can have 2 –2 hosts (approximately 16 million hosts). Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a value of 0 to 127.
Page 563
ZyWALL 2 Series User’s Guide of ones beginning from the left most bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet.
Page 564
ZyWALL 2 Series User’s Guide Divide the network 192.168.1.0 into two separate subnets by converting one of the host ID bits of the IP address to a network number bit. The “borrowed” host ID bit can be either “0” or “1” thus giving two subnets;...
Page 565
ZyWALL 2 Series User’s Guide actual host for the first subnet is 192.168.1.1 and the highest is 192.168.1.126. Similarly the host ID range for the second subnet is 192.168.1.129 to 192.168.1.254. Example: Four Subnets The above example illustrated using a 25-bit subnet mask to divide a class “C” address space into two subnets.
Page 566
ZyWALL 2 Series User’s Guide Chart I-10 Subnet 4 NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 11000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example Eight Subnets Similarly use a 27-bit mask to create 8 subnets (001, 010, 011, 100, 101, 110).
Page 567
ZyWALL 2 Series User’s Guide 255.255.255.240 (/28) 255.255.255.248 (/29) 255.255.255.252 (/30) 255.255.255.254 (/31) Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID.
Page 568
ZyWALL 2 Series User’s Guide Chart I-13 Class B Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET (/29) 255.255.255.252 16384 (/30) 255.255.255.254 32768 (/31) IP Subnetting...
ZyWALL 2 Series User’s Guide Appendix J Safety Warnings and Instructions 1. Be sure to read and follow all warning notices and instructions. 2. The maximum recommended ambient temperature for the ZyWALL is 40º Celsius (104º Fahrenheit). Care must be taken to allow sufficient air circulation or space between units when the ZyWALL is installed inside a closed rack assembly.
Command, Log Appendices and Index Part XVI: Command, Log Appendices and Index This part provides information on the command line interface, firewall and NetBIOS commands, logs and password protection. There is also an index of key terms.
The following describes how to use the command interpreter. Enter 24 in the main menu to bring up the system maintenance menu. Enter 8 to go to Menu 24.8 - Command Interpreter Mode. See the included disk or zyxel.com for more detailed information on these commands. Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable.
ZyWALL 2 Series User’s Guide Appendix L Firewall Commands The following describes the firewall commands. See the Command Interpreter appendix for information on the command structure. Chart L-1 Firewall Commands FUNCTION COMMAND DESCRIPTION config edit firewall active <yes | This command turns the firewall on or off. no>...
Page 576
ZyWALL 2 User’s Guide Chart L-1 Firewall Commands FUNCTION COMMAND DESCRIPTION This command shows all of the e-mail settings. config display firewall e-mail config display firewall ? This command shows all of the available firewall sub commands. This command sets the IP address to which the e- config edit firewall e-mail mail- server <ip address of mail server>...
ZyWALL 2 Series User’s Guide Chart L-1 Firewall Commands FUNCTION COMMAND DESCRIPTION config edit firewall attack block Set this command to yes to block new traffic after <yes | no> the tcp-max-incomplete threshold is exceeded. Set it to no to delete the oldest half-open session when traffic exceeds the tcp-max-incomplete threshold.
Page 578
ZyWALL 2 User’s Guide Chart L-1 Firewall Commands FUNCTION COMMAND DESCRIPTION Config edit firewall set <set #> This command sets whether a packet is dropped or default-permit <forward | block> allowed through, when it does not meet a rule within the set.
Page 579
ZyWALL 2 Series User’s Guide Chart L-1 Firewall Commands FUNCTION COMMAND DESCRIPTION Config edit firewall set <set #> This command sets the protocol specification rule <rule #> protocol <integer number made in this rule for ICMP. protocol value > Config edit firewall set <set #> This command sets the ZyWALL to log traffic that rule <rule #>...
Page 580
ZyWALL 2 User’s Guide Chart L-1 Firewall Commands FUNCTION COMMAND DESCRIPTION config edit firewall set <set #> This command sets a rule to have the ZyWALL rule <rule #> TCP destport-single check for TCP traffic with this destination address. <port #> You may repeat this command to enter various, non-consecutive port numbers.
ZyWALL 2 Series User’s Guide Appendix M NetBIOS Filter Commands The following describes the NetBIOS packet filter commands. See the Command Interpreter appendix for information on the command structure. Introduction NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast packets that enable a computer to connect to and communicate with a LAN.
Page 582
ZyWALL 2 User’s Guide Chart M-1 NetBIOS Filter Default Settings NAME DESCRIPTION EXAMPLE Between LAN This field displays whether NetBIOS packets are blocked or forwarded Forward and WAN between the LAN and the WAN. IPSec Packets This field displays whether NetBIOS packets sent through a VPN Forward connection are blocked or forwarded.
Page 583
ZyWALL 2 Series User’s Guide sys filter netbios config 4 off Command: This command stops NetBIOS commands from initiating calls. NetBIOS Filter Commands...
ZyWALL 2 Series User’s Guide Appendix N Boot Commands The BootModule AT commands execute from within the router’s bootup software, when debug mode is selected before the main router firmware (ZyNOS) is started. When you start up your ZyWALL, you are given a choice to go into debug mode by pressing a key at the prompt shown in the following screen.
Page 586
ZyWALL 2 User’s Guide just answer OK ATHE print help ATBAx change baudrate. 1:38.4k, 2:19.2k, 3:9.6k 4:57.6k 5:115.2k ATENx,(y) set BootExtension Debug Flag (y=password) ATSE show the seed of password generator ATTI(h,m,s) change system time to hour:min:sec or show current time ATDA(y,m,d) change system date to year/month/day or show current date ATDS...
ZyWALL 2 Series User’s Guide Appendix O Log Descriptions Chart O-1 System Error Logs LOG MESSAGE DESCRIPTION %s exceeds the max. This attempt to create a SUA/NAT session exceeds the maximum number of SUA/NAT session table entries allowed to be created per number of session per host.
Page 588
ZyWALL 2 User’s Guide Chart O-2 System Maintenance Logs TELNET Login Fail Someone has failed to log on to the router via telnet. FTP Login Someone has logged on to the router via ftp. Successfully FTP Login Fail Someone has failed to log on to the router via ftp. NAT Session Table is The maximum number of SUA/NAT session table entries has been exceeded and the table is full.
Page 589
ZyWALL 2 Series User’s Guide Chart O-5 Attack Logs LOG MESSAGE DESCRIPTION attack IGMP The firewall detected an IGMP attack. attack ESP The firewall detected an ESP attack. attack GRE The firewall detected a GRE attack. attack OSPF The firewall detected an OSPF attack. attack ICMP (type:%d, The firewall detected an ICMP attack;...
Page 590
ZyWALL 2 User’s Guide Chart O-5 Attack Logs LOG MESSAGE DESCRIPTION syn flood TCP The firewall detected a TCP syn flood attack. ports scan TCP The firewall detected a TCP port scan attack. teardrop TCP The firewall detected a TCP teardrop attack. teardrop UDP The firewall detected an UDP teardrop attack.
Page 591
ZyWALL 2 Series User’s Guide Chart O-6 Access Logs LOG MESSAGE DESCRIPTION Firewall default TCP access matched the default policy of the listed ACL set and the ZyWALL blocked or forwarded it according to the ACL set’s policy: TCP (set:%d) configuration.
Page 592
ZyWALL 2 User’s Guide Chart O-6 Access Logs LOG MESSAGE DESCRIPTION Firewall rule match: ESP access matched the listed firewall rule and the ZyWALL blocked or forwarded it according to the rule’s configuration. ESP (set:%d, rule:%d) Firewall rule match: GRE access matched the listed firewall rule and the ZyWALL blocked or forwarded it according to the rule’s configuration.
Page 593
ZyWALL 2 Series User’s Guide Chart O-6 Access Logs LOG MESSAGE DESCRIPTION Firewall rule NOT Access did not match the listed firewall rule and the ZyWALL logged match: (set:%d, rule:%d) Filter default policy TCP access matched a default filter policy and the ZyWALL dropped the packet to block access.
Page 594
ZyWALL 2 User’s Guide Chart O-6 Access Logs LOG MESSAGE DESCRIPTION Filter match DROP <set Access matched the listed filter rule and the ZyWALL dropped the packet to block access. %d/rule %d> Filter match DROP <set Access matched the listed filter rule (denied LAN IP) and the ZyWALL dropped the packet to block access.
Page 595
ZyWALL 2 Series User’s Guide Chart O-6 Access Logs LOG MESSAGE DESCRIPTION Packet without a NAT The router blocked a packet that did not have a corresponding SUA/NAT table entry. table entry blocked Out of order TCP The router blocked a TCP handshake packet that came out of the proper order handshake packet blocked...
Page 596
ZyWALL 2 User’s Guide Chart O-8 ICMP Notes TYPE CODE DESCRIPTION Destination Unreachable Net unreachable Host unreachable Protocol unreachable Port unreachable A packet that needed fragmentation was dropped because it was set to Don't Fragment (DF) Source route failed Source Quench A gateway may discard internet datagrams if it does not have the buffer space needed to queue the datagrams for output to the next network on the route to the destination network.
Page 597
ZyWALL 2 Series User’s Guide Chart O-8 ICMP Notes TYPE CODE DESCRIPTION Timestamp Reply Timestamp reply message Information Request Information request message Information Reply Information reply message Chart O-9 Sys log LOG MESSAGE DESCRIPTION Mon dd hr:mm:ss hostname This message is sent by the "RAS" when this syslog is generated.
ZyWALL 2 User’s Guide Index: Date/Time: Log: ------------------------------------------------------------ 01 Jan 08:02:22 Send Main Mode request to <192.168.200.101> 01 Jan 08:02:22 Send:<SA> 01 Jan 08:02:22 Recv:<SA> 01 Jan 08:02:24 Send:<KE><NONCE> 01 Jan 08:02:24 Recv:<KE><NONCE> 01 Jan 08:02:26 Send:<ID><HASH> 01 Jan 08:02:26 Recv:<ID><HASH>...
Page 599
ZyWALL 2 Series User’s Guide A PYLD_MALFORMED packet usually means that the two ends of the VPN tunnel are not using the same pre-shared key. Chart O-10 Sample IKE Key Exchange Logs LOG MESSAGE DESCRIPTION Send <Symbol> Mode request to <IP> The ZyWALL has started negotiation with the peer.
Page 600
ZyWALL 2 User’s Guide Chart O-10 Sample IKE Key Exchange Logs LOG MESSAGE DESCRIPTION !! Invalid IP <IP start>/<IP end> The peer’s “Local IP Addr” range is invalid. !! Remote IP <IP start> / <IP end> If the security gateway is “0.0.0.0”, the ZyWALL will conflicts use the peer’s “Local Addr”...
Page 601
ZyWALL 2 Series User’s Guide Chart O-10 Sample IKE Key Exchange Logs LOG MESSAGE DESCRIPTION vs. My Local <IP address> The IP address type or IP address of an incoming packet does not match the peer IP address type or IP address configured on the local router.
Page 602
ZyWALL 2 User’s Guide The following table shows RFC-2408 ISAKMP payload types that the log displays. Please refer to the RFC for detailed information on each type. Chart O-12 RFC-2408 ISAKMP Payload Types LOG DISPLAY PAYLOAD TYPE Security Association PROP Proposal TRANS Transform...
ZyWALL 2 Series User’s Guide Appendix P Brute-Force Password Guessing Protection The following describes the commands for enabling, disabling and configuring the brute-force password guessing protection mechanism for the password. See the Command Interpreter appendix for information on the command structure. Chart P-1 Brute-Force Password Guessing Protection Commands COMMAND DESCRIPTION...
Page 610
ZyWALL 2 Series User’s Guide Inside Local Address ........8-1 LAN TCP/IP.............5-2 Internet Access..........25-1 LAN to WAN Rules ........11-4 ISP's Name ............25-1 LAND........... 10-4, 10-6 Internet Access Setup ....25-1, 28-2, A-2 Local..............8-1 Internet Control Message Protocol (ICMP) ... 10-6 Log ..............32-5 Internet Security Gateway ......xxvii Log Descriptions ..........O-1...
Page 611
ZyWALL 2 Series User’s Guide Period(hr)..........23-7, 26-5 Ping.............. 32-11 Nailed-up Connection ........26-4 Ping of Death ..........10-4 Nailed-Up Connection ......23-7, 26-5 Point-to-Point Tunneling Protocol..3-6, 8-6. See NAT ..3-4, 3-9, 5-1, 8-5, 8-6, 23-10, 26-8, 30-16 PPTP. See PPTP Application............
Page 612
ZyWALL 2 Series User’s Guide Replacement ............v Service Name ..........26-2 Reports............19-6 Service Set............7-5 Required fields..........21-3 Service Type...... 11-13, 25-2, 26-2, A-2 Reset Button ............ 1-2 Services ............8-5 Resetting the Time ......... 34-7 Set Up a Schedule...........36-2 Restore ............20-9 SMT..
Page 613
ZyWALL 2 Series User’s Guide System Management Terminal ...... 21-2 Trigger Port Forwarding ......28-16 Process..............28-17 System Name ..........4-2, 22-1 Trivial File Transfer Protocol ....See TFTP System Status ..........32-1 Troubleshooting..........A-1 System Timeout ..........17-2 Internet Access.............A-3 LAN Interface............A-2 WAN Interface.............A-2 TTLS..............