Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
P-2608HWL-D1
ZyXEL Communications P-2608HWL-D1 Manuals
Manuals and User Guides for ZyXEL Communications P-2608HWL-D1. We have
4
ZyXEL Communications P-2608HWL-D1 manuals available for free PDF download: User Manual, Support Notes, Quick Start Manual, Specifications
ZyXEL Communications P-2608HWL-D1 User Manual (451 pages)
802.11g Wireless ADSL2+ VoIP IAD
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 13.93 MB
Table of Contents
Table of Contents
11
Copyright
3
Certifications
4
Safety Warnings
6
Zyxel Limited Warranty
8
Customer Support
9
List of Figures
25
List of Tables
33
Preface
39
Chapter 1 Getting to Know the Zyxel Device
41
Overview
41
Figure 1 Zyxel Device's Voip Features
41
Table 1 Models Covered
41
Voip Features
41
DSL Router
42
Figure 2 Internet Access
42
Figure 3 Leds
42
Leds (Lights)
42
Table 2 Leds
43
Chapter 2 Introducing the Web Configurator
45
Web Configurator Overview
45
Accessing the Web Configurator
45
Figure 4 Password Screen
46
Figure 5 Change Password Screen
46
Figure 6 Factory Default Certificate
47
Figure 7 Wizard or Advanced Screen
47
The RESET Button
48
Using the Reset Button
48
Figure 8 Main Screen
48
Navigation Panel
49
Table 3 Web Configurator Icons in the Title Bar
49
Table 4 Navigation Panel Summary
49
Title Bar
49
Status Bar
52
Web Configurator Main Screen
48
Internet and Wireless Setup Wizard
53
Chapter 3 Internet and Wireless Setup Wizard
53
Figure 9 Select a Mode
53
Internet Access Wizard Setup
53
Introduction
53
Figure 10 Wizard Welcome
54
Figure 11 Auto Detection: no DSL Connection
54
Figure 12 Auto-Detection: Pppoe
55
Figure 13 Auto Detection: Failed
55
Manual Configuration
55
Figure 14 Internet Access Wizard Setup: ISP Parameters
56
Table 5 Internet Access Wizard Setup: ISP Parameters
56
Figure 15 Internet Connection with Pppoe
57
Figure 16 Internet Connection with RFC 1483
57
Table 6 Internet Connection with Pppoe
57
Figure 17 Internet Connection with ENET ENCAP
58
Table 7 Internet Connection with RFC 1483
58
Table 8 Internet Connection with ENET ENCAP
58
Figure 18 Internet Connection with Pppoa
59
Table 9 Internet Connection with Pppoa
59
Figure 19 Connection Test Failed-1
60
Figure 20 Connection Test Failed-2
60
Wireless Connection Wizard Setup
60
Figure 21 Connection Test Successful
61
Figure 22 Wireless LAN Setup Wizard 1
61
Table 10 Wireless LAN Setup Wizard 1
61
Figure 23 Wireless LAN
62
Table 11 Wireless LAN Setup Wizard 2
62
Automatically Assign a WPA Key
63
Figure 24 Manually Assign a WPA Key
63
Manually Assign a WEP Key
63
Manually Assign a WPA Key
63
Table 12 Manually Assign a WPA Key
63
Figure 25 Manually Assign a WEP Key
64
Table 13 Manually Assign a WEP Key
64
Figure 26 Wireless LAN Setup 3
65
Figure 27 Internet Access and WLAN Wizard Setup Complete
65
Chapter 4 Voip Wizard and Example
67
Figure 28 Voip Phone Calls
67
Introduction
67
Voip Wizard Setup
67
Figure 29 Select a Mode
68
Figure 30 Wizard: Welcome
68
Figure 31 Voip Wizard Configuration
69
Table 14 Sample SIP Account Information
69
Table 15 Voip Wizard Configuration
69
Figure 32 SIP Registration Test
70
Figure 33 Voip Wizard Fail
71
Figure 34 Voip Wizard Finish
71
Chapter 5 Bandwidth Management Wizard
73
Introduction
73
Predefined Media Bandwidth Management Services
73
Table 16 Media Bandwidth Management Setup: Services
73
Bandwidth Management Wizard Setup
74
Figure 35 Select a Mode
74
Figure 36 Wizard: Welcome
75
Figure 37 Bandwidth Management Wizard: General Information
75
Table 17 Bandwidth Management Wizard: General Information
75
Figure 38 Bandwidth Management Wizard: Service Configuration
76
Table 18 Bandwidth Management Wizard: Service Configuration
76
Figure 39 Bandwidth Management Wizard: Complete
77
Chapter 6 Status Screens
79
Status Screen
79
Figure 40 Status Screen
79
Table 19 Status Screen
80
Any IP Table
82
Figure 41 any IP Table
82
WLAN Status
83
Packet Statistics
83
Figure 42 WLAN Status
83
Table 20 any IP Table
83
Table 21 WLAN Status
83
Figure 43 Packet Statistics
84
Table 22 Packet Statistics
84
Voip Statistics
85
Figure 44 Voip Statistics
85
Table 23 Voip Statistics
86
Chapter 7 WAN Setup
89
WAN Overview
89
Encapsulation
89
Enet Encap
89
PPP over Ethernet
89
LLC-Based Multiplexing
90
Multiplexing
90
Pppoa
90
Rfc 1483
90
VC-Based Multiplexing
90
VPI and VCI
90
IP Address Assignment
91
IP Assignment with ENET ENCAP Encapsulation
91
IP Assignment with Pppoa or Pppoe Encapsulation
91
IP Assignment with RFC 1483 Encapsulation
91
Nailed-Up Connection (PPP)
91
Nat
91
Metric
92
Traffic Shaping
92
ATM Traffic Classes
93
Constant Bit Rate (CBR)
93
Figure 45 Example of Traffic Shaping
93
Variable Bit Rate (VBR)
93
Unspecified Bit Rate (UBR)
94
Zero Configuration Internet Access
94
Internet Access Setup
94
Figure 46 Internet Access Setup (Pppoe)
95
Table 24 Internet Access Setup
95
Advanced Internet Access Setup
97
Figure 47 Advanced Internet Access Setup
97
Table 25 Advanced Internet Access Setup
97
WAN more Connections
98
Figure 48 WAN more Connections
99
Table 26 WAN more Connections
99
WAN more Connections Modify Screen
99
Figure 49 WAN more Connections > Modify
100
Table 27 WAN more Connections > Modify
100
Traffic Redirect
102
Figure 50 Traffic Redirect Example
102
WAN Backup Setup
103
Figure 51 Traffic Redirect LAN Setup
103
Table 28 WAN Backup Setup
104
Chapter 8 LAN Setup
105
LAN Overview
105
Figure 52 LAN and WAN IP Addresses
105
Lans, Wans and the Zyxel Device
105
DHCP Setup
106
DNS Server Address
106
IP Pool Setup
106
DNS Server Address Assignment
107
Lan Tcp/Ip
107
IP Address and Subnet Mask
107
Private IP Addresses
108
RIP Setup
108
Any IP
109
Multicast
109
Figure 53 any IP Example
110
How any IP Works
110
Configuring LAN IP
111
Configuring Advanced LAN Setup
111
Figure 54 LAN IP
111
Table 29 LAN IP
111
Figure 55 Advanced LAN Setup
112
Table 30 Advanced LAN Setup
112
DHCP Setup
113
Figure 56 DHCP Setup
113
Table 31 DHCP Setup
113
LAN Client List
114
Figure 57 LAN Client List
114
LAN IP Alias
115
Table 32 LAN Client List
115
Figure 58 Physical Network & Partitioned Logical Networks
116
Figure 59 LAN IP Alias
116
Table 33 LAN IP Alias
116
Chapter 9 Wireless LAN
119
Wireless Network Overview
119
Figure 60 Example of a Wireless Network
119
Wireless Security Overview
120
MAC Address Filter
120
Ssid
120
User Authentication
120
Encryption
121
Table 34 Types of Encryption for each Type of Authentication
121
One-Touch Intelligent Security Technology (OTIST)
122
Wireless Performance Overview
122
Quality of Service (Qos)
122
Additional Wireless Terms
122
General Wireless LAN Screen
123
Figure 61 Wireless LAN: General
123
No Security
124
Table 35 Wireless LAN: General
124
Figure 62 Wireless: no Security
125
Table 36 Wireless no Security
125
WEP Encryption Screen
125
Figure 63 Wireless: Static WEP Encryption
126
Table 37 Wireless: Static WEP Encryption
126
Wpa(2)-Psk
126
Figure 64 Wireless: WPA(2)-PSK
127
Table 38 Wireless: WPA(2)-PSK
127
Figure 65 Wireless: WPA(2)
128
Table 39 Wireless: WPA(2)
128
WPA(2) Authentication Screen
128
Wireless LAN Advanced Setup
129
OTIST Screen
130
Figure 66 Advanced
130
Table 40 Wireless LAN: Advanced
130
Figure 67 Network > Wireless LAN > OTIST
131
Table 41 Network > Wireless LAN > OTIST
131
Figure 68 Example: Wireless Client OTIST Screen
132
Figure 69 OTIST: Settings
132
Figure 70 OTIST in Progress Screen on the Zyxel Device
132
Figure 71 OTIST: in Progress on the Wireless Device
133
Figure 72 Start OTIST
133
Notes on OTIST
133
MAC Filter
134
Figure 73 MAC Address Filter
134
Table 42 MAC Address Filter
134
Qos Screen
135
Table 43 Wireless LAN: Qos
135
Application Priority Configuration
136
Figure 74 Application Priority Configuration
136
Table 44 Application Priority Configuration
136
Chapter 10 Network Address Translation (NAT) Screens
139
NAT Overview
139
NAT Definitions
139
Table 45 NAT Definitions
139
Figure 75 How NAT Works
140
How NAT Works
140
What NAT Does
140
Figure 76 NAT Application with IP Alias
141
NAT Application
141
NAT Mapping Types
141
NAT General Setup
142
SUA (Single User Account) Versus NAT
142
Table 46 NAT Mapping Types
142
Figure 77 NAT General
143
Port Forwarding
143
Table 47 NAT General
143
Configuring Servers Behind Port Forwarding (Example)
144
Default Server IP Address
144
Figure 78 Multiple Servers Behind NAT Example
144
Port Forwarding: Services and Port Numbers
144
Configuring Port Forwarding
145
Figure 79 Port Forwarding
145
Table 48 Port Forwarding
145
Figure 80 Port Forwarding Rule Setup
146
Port Forwarding Rule Edit
146
Table 49 Port Forwarding Rule Setup
146
Address Mapping
147
Figure 81 Address Mapping Rules
147
Table 50 Address Mapping Rules
147
Address Mapping Rule Edit
148
Figure 82 Edit Address Mapping Rule
148
Sip Alg
149
Table 51 Edit Address Mapping Rule
149
Figure 83 Network > NAT > ALG
150
Table 52 Network > NAT > ALG
150
Chapter 11 SIP
151
SIP Overview
151
Introduction to SIP
151
Introduction to Voip
151
SIP Identities
151
SIP Number
151
SIP Call Progression
152
SIP Client Server
152
SIP Service Domain
152
Table 53 SIP Call Progression
152
Figure 84 SIP User Agent
153
Figure 85 SIP Proxy Server
153
SIP Proxy Server
153
SIP User Agent
153
Figure 86 SIP Redirect Server
154
Rtp
154
SIP Redirect Server
154
SIP Register Server
154
NAT and SIP
155
Sip Alg
155
Stun
155
Use NAT
155
Figure 87 STUN
156
Outbound Proxy
156
PSTN Call Setup Signaling
156
Voice Coding
156
Custom Tones (IVR)
157
Deleting Custom Tones
157
Listening to Custom Tones
157
MWI (Message Waiting Indication)
157
Recording Custom Tones
157
Table 54 Custom Tones Details
157
Diffserv
158
DSCP and Per-Hop Behavior
158
Figure 88 Diffserv: Differentiated Service Field
158
Quality of Service (Qos)
158
Type of Service (Tos)
158
Vlan
159
SIP Screens
159
SIP Settings Screen
159
Figure 89 Voip > SIP > SIP Settings
160
Table 55 Voip > SIP > SIP Settings
160
Advanced SIP Setup Screen
161
Figure 90 Voip > SIP > SIP Settings > Advanced
162
Table 56 Voip > SIP Settings > Advanced
162
Figure 91 Voip > SIP > Qos
165
SIP Qos Screen
165
Table 57 Voip > SIP > Qos
165
Chapter 12 Phone
167
Phone Overview
167
Echo Cancellation
167
Supplementary Phone Services Overview
167
Voice Activity Detection/Silence Suppression/Comfort Noise
167
Europe Type Supplementary Phone Services
168
Table 58 European Type Flash Key Commands
168
The Flash Key
168
Table 59 USA Type Flash Key Commands
170
USA Type Supplementary Services
170
Phone Screens
171
Analog Phone Screen
171
Advanced Analog Phone Setup Screen
172
Figure 92 Voip > Phone > Analog Phone
172
Table 60 Voip > Phone > Analog Phone
172
Figure 93 Voip > Phone > Analog Phone > Advanced
173
Table 61 Voip > Phone > Analog Phone > Advanced
173
Common Phone Settings Screen
174
Figure 94 Voip > Phone > Common
174
Phone Region Screen
174
Table 62 Voip > Phone > Common
174
Figure 95 Voip > Phone > Region
175
Table 63 Voip > Phone > Region
175
Chapter 13 Phone Book
177
Phone Book Overview
177
Speed Dial Screen
177
Figure 96 Phone Book > Speed Dial
178
Table 64 Phone Book > Speed Dial
178
Incoming Call Policy Screen
179
Figure 97 Phone Book > Incoming Call Policy
180
Table 65 Phone Book > Incoming Call Policy
180
Group Ring Screen
181
Figure 98 Phone Book > Group Ring
182
Table 66 Phone Book > Group Ring
182
Chapter 14 PSTN Line
185
PSTN Line Overview
185
PSTN Line Screen
185
Figure 99 Voip > PSTN Line > General
186
Table 67 Voip > PSTN Line > General
186
Chapter 15 Firewalls
187
Firewall Overview
187
Types of Firewalls
187
Packet Filtering Firewalls
187
Application-Level Firewalls
188
Stateful Inspection Firewalls
188
Introduction to Zyxel's Firewall
188
Denial of Service Attacks
189
Denial of Service
189
Basics
189
Figure 100 Firewall Application
189
Figure 101 Three-Way Handshake
190
Table 68 Common IP Ports
190
Types of Dos Attacks
190
Figure 102 SYN Flood
191
Figure 103 Smurf Attack
192
ICMP Vulnerability
192
Illegal Commands (Netbios and SMTP)
192
Table 69 ICMP Commands that Trigger Alerts
192
Table 70 Legal Netbios Commands
192
Table 71 Legal SMTP Commands
192
Traceroute
193
Stateful Inspection
193
Figure 104 Stateful Inspection
193
Stateful Inspection on Your Zyxel Device
194
Stateful Inspection Process
194
TCP Security
195
UDP/ICMP Security
195
Upper Layer Protocols
196
Guidelines for Enhancing Security with Your Firewall
196
Security in General
196
Packet Filtering Vs Firewall
197
Packet Filtering
197
Firewall
198
When to Use Filtering
198
When to Use the Firewall
198
Chapter 16 Firewall Configuration
199
Access Methods
199
Firewall Policies Overview
199
Rule Logic Overview
200
Rule Checklist
200
Security Ramifications
200
Action
201
Destination Address
201
Key Fields for Configuring Rules
201
Service
201
Source Address
201
Connection Direction
201
Alerts
202
LAN to WAN Rules
202
Figure 105 Firewall: General
202
General Firewall Policy
202
Firewall Rules Summary
203
Table 72 Firewall: General
203
Figure 106 Firewall Rules
204
Table 73 Firewall Rules
204
Configuring Firewall Rules
205
Figure 107 Firewall: Edit Rule
206
Table 74 Firewall: Edit Rule
207
Customized Services
208
Figure 108 Firewall: Customized Services
208
Table 75 Customized Services
208
Configuring a Customized Service
209
Example Firewall Rule
209
Figure 109 Firewall: Configure Customized Services
209
Table 76 Firewall: Configure Customized Services
209
Figure 110 Firewall Example: Rules
210
Figure 111 Edit Custom Port Example
210
Figure 112 Firewall Example: Edit Rule: Destination Address
211
Figure 113 Firewall Example: Edit Rule: Select Customized Services
212
Dos Thresholds
213
Figure 114 Firewall Example: Rules: Myservice
213
Threshold Values
213
Half-Open Sessions
214
TCP Maximum Incomplete and Blocking Time
214
Configuring Firewall Thresholds
215
Figure 115 Firewall: Threshold
215
Table 77 Firewall: Threshold
215
Chapter 17 Content Filtering
217
Content Filtering Overview
217
Configuring Keyword Blocking
217
Figure 116 Content Filter: Keyword
217
Configuring the Schedule
218
Figure 117 Content Filter: Schedule
218
Table 78 Content Filter: Keyword
218
Configuring Trusted Computers
219
Figure 118 Content Filter: Trusted
219
Table 79 Content Filter: Schedule
219
Table 80 Content Filter: Trusted
219
Chapter 18 Ipsec VPN
221
Ipsec VPN Overview
221
Figure 119 VPN: Example
221
Figure 120 VPN: IKE SA and Ipsec SA
222
IKE SA Overview
222
IP Addresses of the Zyxel Device and Remote Ipsec Router
222
Diffie-Hellman (DH) Key Exchange
223
Figure 121 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
223
Figure 122 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange
223
IKE SA Proposal
223
Authentication
224
Figure 123 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication
224
Table 81 VPN Example: Matching ID Type and Content
224
Extended Authentication
225
Table 82 VPN Example: Mismatching ID Type and Content
225
Additional Topics for IKE SA
226
Negotiation Mode
226
VPN, NAT and NAT Traversal
226
Figure 124 VPN/NAT Example
227
Ipsec SA Overview
227
Active Protocol
228
Encapsulation
228
Figure 125 VPN: Transport and Tunnel Mode Encapsulation
228
Local Network and Remote Network
228
Additional Topics for Ipsec SA
229
Ipsec SA Proposal and Perfect Forward Secrecy
229
Ipsec SA Using Manual Keys
229
VPN Setup Screen
230
Figure 126 VPN Setup
231
Table 83 VPN Setup
231
Editing VPN Policies
232
Figure 127 Edit VPN Policies
233
Table 84 Edit VPN Policies
233
Configuring Advanced IKE Settings
237
Figure 128 Advanced VPN Policies
238
Table 85 Advanced VPN Policies
238
Configuring Manual Key
240
Figure 129 VPN: Manual Key
241
Table 86 VPN: Manual Key
241
Viewing SA Monitor
243
Figure 130 VPN: SA Monitor
244
Table 87 VPN: SA Monitor
244
Configuring Global Setting
245
Telecommuter Vpn/Ipsec Examples
245
Figure 131 VPN: Global Setting
245
Table 88 VPN: Global Setting
245
Telecommuters Sharing One VPN Rule Example
245
Figure 132 Telecommuters Sharing One VPN Rule Example
246
Table 89 Telecommuters Sharing One VPN Rule Example
246
Telecommuters Using Unique VPN Rules Example
246
Figure 133 Telecommuters Using Unique VPN Rules Example
247
Table 90 Telecommuters Using Unique VPN Rules Example
247
VPN and Remote Management
248
Chapter 19 Certificates
249
Certificates Overview
249
Advantages of Certificates
250
Self-Signed Certificates
250
Configuration Summary
250
Figure 134 Certificate Configuration Overview
250
My Certificates
251
Figure 135 My Certificates
251
Table 91 My Certificates
251
My Certificate Import
253
Certificate File Formats
253
Figure 136 My Certificate Import
253
My Certificate Create
254
Figure 137 My Certificate Create
254
Table 92 My Certificate Import
254
Table 93 My Certificate Create
255
My Certificate Details
256
Figure 138 My Certificate Details
257
Table 94 My Certificate Details
258
Trusted cas
259
Figure 139 Trusted cas
260
Table 95 Trusted cas
260
Trusted CA Import
261
Figure 140 Trusted CA Import
261
Table 96 Trusted CA Import
261
Trusted CA Details
262
Figure 141 Trusted CA Details
262
Table 97 Trusted CA Details
263
Trusted Remote Hosts
264
Figure 142 Trusted Remote Hosts
265
Table 98 Trusted Remote Hosts
265
Verifying a Trusted Remote Host's Certificate
266
Figure 143 Remote Host Certificates
266
Figure 144 Certificate Details
266
Trusted Remote Host Certificate Fingerprints
266
Trusted Remote Hosts Import
267
Trusted Remote Host Certificate Details
267
Figure 145 Trusted Remote Host Import
267
Table 99 Trusted Remote Host Import
267
Figure 146 Trusted Remote Host Details
268
Table 100 Trusted Remote Host Details
269
Directory Servers
270
Directory Server Add or Edit
271
Figure 147 Directory Servers
271
Table 101 Directory Servers
271
Figure 148 Directory Server Add
272
Table 102 Directory Server Add
272
Chapter 20 Static Route
273
Static Route
273
Configuring Static Route
273
Figure 149 Example of Static Routing Topology
273
Figure 150 Static Route
274
Static Route Edit
274
Table 103 Static Route
274
Figure 151 Static Route Edit
275
Table 104 Static Route Edit
275
Chapter 21 Bandwidth Management
277
Bandwidth Management Overview
277
Application-Based Bandwidth Management
277
Subnet-Based Bandwidth Management
277
Application and Subnet-Based Bandwidth Management
278
Scheduler
278
Figure 152 Subnet-Based Bandwidth Management Example
278
Priority-Based Scheduler
278
Table 105 Application and Subnet-Based Bandwidth Management Example
278
Fairness-Based Scheduler
279
Maximize Bandwidth Usage
279
Reserving Bandwidth for Non-Bandwidth Class Traffic
279
Maximize Bandwidth Usage Example
280
Priority-Based Allotment of Unused & Unbudgeted Bandwidth
280
Table 106 Maximize Bandwidth Usage Example
280
Table 107 Priority-Based Allotment of Unused & Unbudgeted Bandwidth Example
280
Bandwidth Management Priorities
281
Fairness-Based Allotment of Unused & Unbudgeted Bandwidth
281
Table 108 Fairness-Based Allotment of Unused & Unbudgeted Bandwidth Example
281
Table 109 Bandwidth Management Priorities
281
Over Allotment of Bandwidth
282
Configuring Summary
282
Figure 153 Bandwidth Management: Summary
282
Table 110 over Allotment of Bandwidth Example
282
Bandwidth Management Rule Setup
283
Table 111 Media Bandwidth Management: Summary
283
Figure 154 Bandwidth Management: Rule Setup
284
Table 112 Bandwidth Management: Rule Setup
284
Figure 155 Bandwidth Management Rule Configuration
285
Rule Configuration
285
Table 113 Bandwidth Management Rule Configuration
285
Bandwidth Monitor
287
Figure 156 Bandwidth Management: Monitor
287
Chapter 22 Dynamic DNS Setup
289
Dynamic DNS Overview
289
DYNDNS Wildcard
289
Configuring Dynamic DNS
289
Figure 157 Dynamic DNS
290
Table 114 Dynamic DNS
290
Chapter 23 Remote Management Configuration
293
Remote Management Overview
293
Remote Management Limitations
293
Remote Management and NAT
294
System Timeout
294
Introduction to HTTPS
294
Www
295
Figure 158 HTTPS Implementation
295
Figure 159 Remote Management: WWW
295
Telnet
296
Table 115 Remote Management: WWW
296
Configuring Telnet
297
Figure 160 Telnet Configuration on a TCP/IP Network
297
Figure 161 Remote Management: Telnet
297
Table 116 Remote Management: Telnet
297
Configuring FTP
298
Figure 162 Remote Management: FTP
298
Table 117 Remote Management: FTP
298
Snmp
299
Figure 163 SNMP Management Model
299
Configuring SNMP
300
SNMP Traps
300
Supported Mibs
300
Table 118 SNMP Traps
300
Figure 164 Remote Management: SNMP
301
Table 119 Remote Management: SNMP
301
Configuring DNS
302
Configuring ICMP
302
Figure 165 Remote Management: DNS
302
Table 120 Remote Management: DNS
302
Figure 166 Remote Management: ICMP
303
Table 121 Remote Management: ICMP
303
304
304
Figure 167 Enabling TR-069
304
Table 122 TR-069 Commands
304
Chapter 24 Universal Plug-And-Play (Upnp)
307
Introducing Universal Plug and Play
307
How Do I Know if I'M Using Upnp
307
NAT Traversal
307
Cautions with Upnp
308
Upnp and Zyxel
308
Configuring Upnp
308
Figure 168 Configuring Upnp
308
Installing Upnp in Windows Example
309
Table 123 Configuring Upnp
309
Figure 169 Add/Remove Programs: Windows Setup: Communication
310
Figure 170 Add/Remove Programs: Windows Setup: Communication: Components
310
Figure 171 Network Connections
311
Figure 172 Windows Optional Networking Components Wizard
311
Using Upnp in Windows XP Example
312
Figure 173 Networking Services
312
Figure 174 Network Connections
313
Figure 175 Internet Connection Properties
313
Figure 176 Internet Connection Properties: Advanced Settings
314
Figure 177 Internet Connection Properties: Advanced Settings: Add
314
Figure 178 System Tray Icon
315
Figure 179 Internet Connection Status
315
Figure 180 Network Connections
316
Figure 181 Network Connections: My Network Places
317
Figure 182 Network Connections: My Network Places: Properties: Example
317
Chapter 25 System
319
General Setup and System Name
319
General Setup
319
Figure 183 System General Setup
320
Table 124 System General Setup
320
Time Setting
321
Figure 184 System Time Setting
321
Table 125 System Time Setting
321
Chapter 26 Logs
325
Logs Overview
325
Alerts and Logs
325
Viewing the Logs
325
Configuring Log Settings
326
Figure 185 View Log
326
Table 126 View Log
326
Figure 186 Log Settings
327
Table 127 Log Settings
327
SMTP Error Messages
329
Example E-Mail Log
329
Table 128 SMTP Error Messages
329
Figure 187 E-Mail Log Example
330
Chapter 27 Tools
331
Introduction
331
Filename Conventions
331
File Maintenance over WAN
332
Firmware Upgrade Screen
332
Table 129 Filename Conventions
332
Figure 188 Firmware Upgrade
333
Figure 189 Firmware Upload in Progress
333
Table 130 Firmware Upgrade
333
Backup and Restore
334
Figure 190 Network Temporarily Disconnected
334
Figure 191 Error Message
334
Backup Configuration
335
Figure 192 Configuration
335
Restore Configuration
335
Table 131 Restore Configuration
335
Figure 193 Configuration Upload Successful
336
Figure 194 Network Temporarily Disconnected
336
Figure 195 Reset Warning Message
336
Reset to Factory Defaults
336
Restart
337
Using FTP or TFTP to Back up Configuration
337
Figure 196 Reset in Process Message
337
Figure 197 Restart Screen
337
Using the FTP Commands to Back up Configuration
337
Configuration Backup Using GUI-Based FTP Clients
338
Figure 198 FTP Session Example
338
FTP Command Configuration Backup Example
338
Table 132 General Commands for GUI-Based FTP Clients
338
Backup Configuration Using TFTP
339
TFTP Command Configuration Backup Example
339
Configuration Backup Using GUI-Based TFTP Clients
340
Using FTP or TFTP to Restore Configuration
340
Table 133 General Commands for GUI-Based TFTP Clients
340
Restore Using FTP Session Example
341
FTP and TFTP Firmware and Configuration File Uploads
341
Figure 199 Restore Using FTP Session Example
341
FTP File Upload Command from the DOS Prompt Example
341
Figure 200 FTP Session Example of Firmware File Upload
342
FTP Session Example of Firmware File Upload
342
TFTP File Upload
342
TFTP Upload Command Example
343
Chapter 28 Diagnostic
345
General Diagnostic
345
DSL Line Diagnostic
345
Figure 201 Diagnostic: General
345
Table 134 Diagnostic: General
345
Figure 202 Diagnostic: DSL Line
346
Table 135 Diagnostic: DSL Line
346
Chapter 29 Troubleshooting
349
Problems Starting up the Zyxel Device
349
Problems with the LAN
349
Table 136 Troubleshooting Starting up Your Device
349
Table 137 Troubleshooting the LAN
349
Problems with the WAN
350
Table 138 Troubleshooting the WAN
350
Problems Accessing the Zyxel Device
351
Pop-Up Windows, Javascripts and Java Permissions
351
Table 139 Troubleshooting Accessing Your Device
351
Figure 203 Pop-Up Blocker
352
Internet Explorer Pop-Up Blockers
352
Figure 204 Internet Options
353
Figure 205 Internet Options
354
Figure 206 Pop-Up Blocker Settings
355
Javascripts
355
Figure 207 Internet Options
356
Figure 208 Security Settings - Java Scripting
357
Java Permissions
357
Figure 209 Security Settings - Java
358
Telephone Problems
359
Figure 210 Java (Sun)
359
Table 140 Troubleshooting Telephone
359
Product Specifications
361
Appendix A Product Specifications
361
Firmware Specifications
361
Specification Tables
361
Table 141 Device Specifications
361
Table 142 Firmware Features
361
Table 143 Firmware Specifications
364
P-2608HW/HWL-DX Series Power Adaptor Specifications
366
Table 144 P-2608HW/HWL-DX Series Power Adaptor Specifications
366
Appendix B
367
Setting up Your Computer's IP Address
367
Windows 95/98/Me
367
Figure 211 Windows 95/98/Me: Network: Configuration
368
Installing Components
368
Configuring
369
Figure 212 Windows 95/98/Me: TCP/IP Properties: IP Address
369
Figure 213 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
370
Verifying Settings
370
Windows 2000/NT/XP
370
Figure 214 Windows XP: Start Menu
371
Figure 215 Windows XP: Control Panel
371
Figure 216 Windows XP: Control Panel: Network Connections: Properties
372
Figure 217 Windows XP: Local Area Connection Properties
372
Figure 218 Windows XP: Advanced TCP/IP Settings
373
Figure 219 Windows XP: Internet Protocol (TCP/IP) Properties
374
Macintosh os 8/9
374
Verifying Settings
374
Figure 220 Macintosh os 8/9: Apple Menu
375
Figure 221 Macintosh os 8/9: TCP/IP
375
Figure 222 Macintosh os X: Apple Menu
376
Macintosh os X
376
Verifying Settings
376
Figure 223 Macintosh os X: Network
377
Verifying Settings
377
Introduction to IP Addresses
379
IP Address Classes and Hosts
379
Table 145 Classes of IP Addresses
380
Table 146 Allowed IP Address Range by Class
380
Subnet Masks
381
Subnetting
381
Table 147 "Natural" Masks
381
Table 148 Alternative Subnet Mask Notation
381
Example: Two Subnets
382
Table 149 Two Subnets Example
382
Example: Four Subnets
383
Table 150 Subnet 1
383
Table 151 Subnet 2
383
Table 152 Subnet 1
383
Example Eight Subnets
384
Table 153 Subnet 2
384
Table 154 Subnet 3
384
Table 155 Subnet 4
384
Subnetting with Class a and Class B Networks
385
Table 156 Eight Subnets
385
Table 157 Class C Subnet Planning
385
Table 158 Class B Subnet Planning
386
Appendix C IP Addresses and Subnetting
379
Appendix D Common Services
387
Table 159 Commonly Used Services
387
Importing Certificates
389
Appendix E Importing Certificates
389
Figure 224 Security Certificate
389
Import Prestige Certificates into Netscape Navigator
389
Importing the Prestige's Certificate into Internet Explorer
389
Figure 225 Login Screen
390
Figure 226 Certificate General Information before Import
390
Figure 227 Certificate Import Wizard 1
391
Figure 228 Certificate Import Wizard 2
391
Figure 229 Certificate Import Wizard 3
392
Figure 230 Root Certificate Store
392
Enrolling and Importing SSL Client Certificates
393
Figure 231 Certificate General Information after Import
393
Figure 232 Prestige Trusted CA Screen
394
Figure 233 CA Certificate Example
394
Installing the Ca's Certificate
394
Figure 234 Personal Certificate Import Wizard 1
395
Figure 235 Personal Certificate Import Wizard 2
395
Installing Your Personal Certificate(S)
395
Figure 236 Personal Certificate Import Wizard 3
396
Figure 237 Personal Certificate Import Wizard 4
396
Figure 238 Personal Certificate Import Wizard 5
397
Figure 239 Personal Certificate Import Wizard 6
397
Figure 240 Access the Prestige Via HTTPS
397
Using a Certificate When Accessing the Prestige Example
397
Figure 241 SSL Client Authentication
398
Figure 242 Prestige Secure Login Screen
398
Appendix F Triangle Route
399
The Ideal Setup
399
The "Triangle Route" Problem
399
Figure 243 Ideal Setup
399
The "Triangle Route" Solutions
400
IP Aliasing
400
Figure 244 "Triangle Route" Problem
400
Gateways on the WAN Side
401
Figure 245 IP Alias
401
Figure 246 Gateways on the WAN Side
401
Appendix G Log Descriptions
403
Table 160 System Maintenance Logs
403
Table 161 System Error Logs
404
Table 162 Access Control Logs
404
Table 163 TCP Reset Logs
405
Table 164 Packet Filter Logs
405
Table 165 ICMP Logs
405
Table 166 CDR Logs
406
Table 167 PPP Logs
406
Table 168 Upnp Logs
407
Table 169 Content Filtering Logs
407
Table 170 Attack Logs
407
Table 171 802.1X Logs
408
Table 172 ACL Setting Notes
409
Table 173 ICMP Notes
409
Table 174 Syslog Logs
410
Table 175 SIP Logs
410
Table 176 RTP Logs
411
Table 177 FSM Logs: Caller Side
411
Table 178 FSM Logs: Callee Side
411
Table 179 Lifeline Logs
411
Configuring What You Want the Zyxel Device to Log
412
Figure 247 Displaying Log Categories Example
412
Log Commands
412
Table 180 RFC-2408 ISAKMP Payload Types
412
Displaying Logs
413
Figure 248 Displaying Log Parameters Example
413
Figure 249 Log Command Example
414
Log Command Example
414
Appendix H Internal SPTGEN
415
Internal SPTGEN Overview
415
The Configuration Text File Format
415
Figure 250 Configuration Text File Format: Column Descriptions
415
Internal SPTGEN File Modification - Important Points to Remember
415
Internal SPTGEN FTP Download Example
416
Figure 251 Invalid Parameter Entered: Command Line Example
416
Figure 252 Valid Parameter Entered: Command Line Example
416
Internal SPTGEN FTP Upload Example
417
Table 181 Abbreviations Used in the Example Internal SPTGEN Screens Table
417
Table 182 Menu 1 General Setup
418
Table 183 Menu 3
418
Table 184 Menu 4 Internet Access Setup
421
Table 185 Menu 12
423
Table 186 Menu 15 SUA Server Setup
427
Table 187 Menu 21.1 Filter Set #1
429
Table 188 Menu 21.1 Filer Set #2
432
Table 189 Menu 23 System Menus
437
Command Examples
438
Table 190 Menu 24.11 Remote Management Control
438
Table 191 Command Examples
438
Index
441
Advertisement
ZyXEL Communications P-2608HWL-D1 Support Notes (213 pages)
P-2608HWL Series
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 3.25 MB
Table of Contents
Table of Contents
2
Index
9
Application Notes
9
General Application Notes
9
Internet Connection
9
All Contents Copyright (C) 2005 Zyxel Communications Corporation
9
Set up the Prestige as a DHCP Relay
13
All Contents Copyright (C) 2005 Zyxel Communications Corporation
15
Configure an Internal Server Behind the Prestige
15
All Contents Copyright (C) 2005 Zyxel Communications Corporation
17
Configure a PPTP Server Behind SUA
17
Using NAT / Multi-NAT
21
All Contents Copyright (C) 2005 Zyxel Communications Corporation
42
Introduction to Filter & Filter Examples
42
All Contents Copyright (C) 2005 Zyxel Communications Corporation
65
Using the Dynamic DNS (DDNS)
65
All Contents Copyright (C) 2005 Zyxel Communications Corporation
68
Network Management Using SNMP
68
Using Syslog
74
Using IP Alias
78
All Contents Copyright (C) 2005 Zyxel Communications Corporation
80
Using Call Scheduling
80
All Contents Copyright (C) 2005 Zyxel Communications Corporation
85
Using IP Multicast
85
All Contents Copyright (C) 2005 Zyxel Communications Corporation
87
Using Traffic Redirect
87
All Contents Copyright (C) 2005 Zyxel Communications Corporation
89
Using Universal Plug N Play (Upnp)
89
Wireless Application Notes
95
Infrastructure Mode
95
All Contents Copyright (C) 2005 Zyxel Communications Corporation
95
Wireless MAC Address Filtering
100
All Contents Copyright (C) 2005 Zyxel Communications Corporation
100
WEP (Wired Equivalent Privacy)
103
All Contents Copyright (C) 2005 Zyxel Communications Corporation
103
Site Survey
111
PSTN Lifeline Application Notes
115
Usage of PSTN Lifeline
115
All Contents Copyright (C) 2005 Zyxel Communications Corporation
115
Lifeline Configuration
116
Relay to PSTN
116
How to Connect Lifeline and DSL Connection
117
All Contents Copyright (C) 2005 Zyxel Communications Corporation
117
Voip Application Notes
118
SIP Account Setup
118
All Contents Copyright (C) 2005 Zyxel Communications Corporation
118
Peer to Peer Call
121
Phone Port Settings
126
All Contents Copyright (C) 2005 Zyxel Communications Corporation
126
Configuring Advanced Voice Settings
130
All Contents Copyright (C) 2005 Zyxel Communications Corporation
130
Speed Dial Phone Book
132
Voice - Qos Setup
135
Call Forwarding Setup
136
All Contents Copyright (C) 2005 Zyxel Communications Corporation
136
Voice - Common Settings
139
All Contents Copyright (C) 2005 Zyxel Communications Corporation
139
Group Ring
140
Faq
145
Zynos FAQ
145
What Is Zynos
145
How Do I Access the Embedded Web Configurator
145
How Do I Upload the Firmware Via the Web Configurator
145
How Do I Upgrade/Back up the Firmware Using an FTP Client Program through the LAN
146
Web Configurator
146
How Do I Back Up/Restore Configurations Using an FTP Client Program through the LAN
147
Why Can't I Telnet into the Prestige from the WAN
147
What Should I Do if I Forget the System Password
147
What Is SUA? When Should I Use SUA
147
What Is the Difference between NAT and SUA
148
How Many Network Users Does SUA/NAT Support
148
What Are Device and Protocol Filters
148
Why Can't I Configure Device Filters or Protocol Filters
149
Product FAQ
149
What Is the Prestige Integrated Access Device
149
Will the Prestige Work with My Internet Connection
149
What Do I Need to Use the Prestige
149
What Is Pppoe
149
Does the Prestige Support Pppoe
150
Why Does My Provider Use Pppoe
150
Which Internet Applications Can I Use with the Prestige
150
How Can I Configure the Prestige
150
What Network Interface Types Does the Prestige Have
150
What Can We Do with Prestige
151
Does Prestige Support Dynamic IP Addressing
151
How Does E-Mail Work through the Prestige
151
The Internet? if Possible, How
151
What DHCP Capability Does the Prestige Support
152
How to Use the Reset Button? and Which Parameter will be Reset by the Reset Button
152
What Network Interface Does the New Prestige Series Have
152
How Does the Prestige Support TFTP
152
Does the Prestige Support TFTP over the WAN
152
How Fast Is the DSL Connection
152
What Is Multi-NAT
153
When Do I Need Multi-NAT
154
What Ip/Port Mapping Does Multi-NAT Support
154
What Is the Difference between SUA and Multi-NAT
155
What Is BOOTP/DHCP
156
What Is DDNS
156
When Do I Need the DDNS Service
156
What DDNS Servers Does the Prestige Support
156
What Is DDNS Wildcard
157
Does the Prestige Support DDNS Wildcard
157
Can VPN Tunnels Still Work on a Prestige Using SUA
157
How Do I Set up My Prestige to Route Ipsec Packets over SUA
157
PSTN Lifeline FAQ
157
What Is the Lifeline Feature
158
Do I Need Lifeline
158
Can I Connect more than One Phone to the Phone Port
158
Can I Receive Incoming PSTN Call through P2608HWL
158
Can I Make a PSTN Call through P2608HWL
158
Voip FAQ
158
What Is Voice over IP
158
How Does Voice over IP Work
159
Why Use Voip
159
What Is the Relationship between Codec and Voip
159
What Advantage Does Voice over IP Provide
159
What Is the Difference between H.323 and SIP
159
Can H.323 and SIP Interoperate with One Another
160
What Is Voice Quality
160
How Are Voice Quality Normally Rated
160
What Is Codec
160
What Is the Relation between Codec and Voip
160
What Codec Types Does the Prestige Support
160
Which Codec Should I Choose
161
I am Unable to Register to a SIP Server
161
I Can Register to the SIP Server but Cannot Establish a Call
162
I Have Tried All the Troubleshooting Steps, but Still Cannot Register to the SIP Server. What Should I Do Next
162
What Should I Do if There May be a Hardware Problem with My Prestige
162
Firewall FAQ
163
What Is a Network Firewall
163
Why Is the Prestige Firewall Secure
163
What Are the Basic Firewall Types
163
What Advantages Does the Prestige Firewall Provide
164
Why Do You Need a Firewall When Your Router Has Built-In Packet Filtering and NAT Features
164
What Is a Denial of Service (Dos) Attack
164
What Is a Ping of Death Attack
165
What Is a Teardrop Attack
165
What Is a SYN Flood Attack
165
What Is a LAND Attack
165
What Is a Brute-Force Attack
165
What Is an IP Spoofing Attack
166
What Are the Default ACL Firewall Rules on the Prestige
166
How Can I Protect against IP Spoofing Attacks
166
Content Filter FAQ
167
Ipsec FAQ
168
What Are the most Commonly Used VPN Protocols
169
What Is PPTP
169
What Is L2TP
169
What Is Ipsec
169
What Secure Protocols Does Ipsec Support
170
What Is a Pre-Shared Key
170
What Are the Differences between IKE and Manual Key VPN
170
What Are Local ID and Peer ID
171
When Should I Use FQDN
172
Is My Prestige Ready for Ipsec VPN
172
How Do I Configure VPN on the Prestige
172
How Many VPN Connections Does the Prestige Support
172
What VPN Protocols Are Supported on the Prestige
172
What VPN Encryption Types Are Supported on the Prestige
172
What VPN Authentication Types Does the Prestige Support
173
I am Planning My Prestige-To-Prestige VPN Configuration. What Do I Need to Know
173
Does the Prestige Support Dynamic Secure Gateway IP
174
Which VPN Gateways Have Been Tested to Work with the Prestige
174
Which VPN Client Software Has Been Tested to Work with the Prestige
174
Will Zyxel Support Secure Remote Management
175
Does the Prestige VPN Support Netbios Broadcast
175
Are Hosts Behind NAT Allowed to Use Ipsec
175
Where Can I Configure Phase 1 ID on the Prestige
175
If I Have a NAT Router between Two VPN Gateways, and I Would Like to Use IP Type as Phase 1 ID, What Information Do I Need
176
How Can I Keep a Tunnel Alive
177
Which IP Address Types (Single, Range or Subnet ) Does the Prestige Vpn/Ipsec Support
177
Does the Prestige Support Ipsec Passthrough
177
Wireless FAQ
178
What Is a Wireless LAN
178
What Are the Advantages of Wireless Lans
178
What Are the Disadvantages of Wireless Lans
179
Where Can I Find Wireless 802.11 Networks
179
What Is an Access Point
179
What Is IEEE 802.11
179
What Is IEEE 802.11B
179
How Fast Is IEEE 802.11B
180
What Is IEEE 802.11A
180
What Is IEEE 802.11G
180
Is It Possible to Use Products from a Variety of Vendors
180
What Is Wi-Fi
181
What Types of Devices Use the 2.4Ghz Band
181
Does the IEEE 802.11 Interfere with Bluetooth Devices
181
Can Radio Signals Pass through Walls
181
What Factors May Cause Interference Among WLAN Products
181
What's the Difference between a WLAN and a WWAN
182
What Is Infrastructure Mode
182
How Many Access Points Are Required in a Given Area
182
What Is the Direct-Sequence Spread Spectrum (DSSS) Technology
182
What Is the Frequency-Hopping Spread Spectrum (FHSS) Technology
183
Do I Need the same Kind of Antenna on both Sides of a Link
183
Why Use the 2.4 Ghz Frequency Range
183
What Is a Server Set ID (SSID)
183
What Is an ESSID
183
How Do I Secure Data Transmitted To/From an Access Point over the Wireless Connection
184
What Is the Difference between 40-Bit and 64-Bit WEP Keys
184
A WEP Key Is a User-Defined String of Characters Used to Encrypt and Decrypt Data
184
Can the SSID be Encrypted
185
By Turning off SSID Broadcasting, Can Someone Still Sniff the SSID
185
What Are Insertion Attacks
185
What Is a Wireless Snifter
185
Authentication Types
185
Allowed and Authentication Required
186
What Is RADIUS
186
What Is WPA-PSK
186
ZyXEL Communications P-2608HWL-D1 Quick Start Manual (8 pages)
802.11g wireless adsl2+ voip iad
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 1.03 MB
Table of Contents
Quick Start Guide
1
Rear Panel
2
Side Panel
3
Leds (Lights)
3
Voip Setup
6
Make Phone Calls
8
Advertisement
ZyXEL Communications P-2608HWL-D1 Specifications (2 pages)
p-2608hwl series 802.11g Wireless ADSL2+ VoIP IAD
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 0.41 MB
Advertisement
Related Products
ZyXEL Communications P-2608HWL-Dx Series
ZyXEL Communications P-2608HWL-D3
ZyXEL Communications P-2602HW-61C
ZyXEL Communications P-2602H-D7A
ZyXEL Communications P-2602HL-D1A
ZyXEL Communications P-2602HL
ZyXEL Communications P2602HW-C -
ZyXEL Communications P-2602R - V3.40
ZyXEL Communications P-2602R-DXA -
ZyXEL Communications P-2602RL-DxA Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL