Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660D - V3.40
ZyXEL Communications P-660D - V3.40 Manuals
Manuals and User Guides for ZyXEL Communications P-660D - V3.40. We have
1
ZyXEL Communications P-660D - V3.40 manual available for free PDF download: User Manual
ZyXEL Communications P-660D - V3.40 User Manual (421 pages)
ADSL 2+ Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 12.09 MB
Table of Contents
Table of Contents
11
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
6
Zyxel Limited Warranty
7
Customer Support
8
List of Figures
25
List of Tables
33
Preface
37
User Guide Feedback
38
Chapter 1 Getting to Know Your Prestige
39
Features
39
Introducing the Prestige
39
Table 1 ADSL Standards
39
High Speed Internet Access
40
Table 2 Model Specific Features
40
Dynamic Dns Support
41
Applications for the Prestige
42
LAN to LAN Application
43
Protected Internet Access
43
Figure 1 Protected Internet Access Applications
43
Figure 2 LAN-To-LAN Application Example
43
Front Panel Leds
43
Figure 3 Front Panel
44
Hardware Connection
44
Table 3 Front Panel Leds
44
Chapter 2 Introducing the Web Configurator
45
Web Configurator Overview
45
Accessing the Web Configurator
45
Figure 4 Password Screen
45
Figure 5 Change Password at Login
46
Navigating the Web Configurator
46
Resetting the Prestige
46
Using the Reset Button
46
Figure 6 Web Configurator: Site Map Screen
47
Table 4 Web Configurator Screens Summary
47
Change Login Password
49
Figure 7 Password
49
Table 5 Password
49
Chapter 3 Wizard Setup for Internet Access
51
Introduction
51
Figure 8 Internet Access Wizard Setup: ISP Parameters
51
Internet Access Wizard Setup
51
Figure 9 Internet Connection with Pppoe
52
Table 6 Internet Access Wizard Setup: ISP Parameters
52
Figure 10 Internet Connection with RFC 1483
53
Table 7 Internet Connection with Pppoe
53
Table 8 Internet Connection with RFC 1483
53
Figure 11 Internet Connection with ENET ENCAP
54
Table 9 Internet Connection with ENET ENCAP
54
Figure 12 Internet Connection with Pppoa
55
Table 10 Internet Connection with Pppoa
55
Figure 13 Internet Access Wizard Setup: Third Screen
56
Figure 14 Internet Access Wizard Setup: LAN Configuration
56
Figure 15 Internet Access Wizard Setup: Connection Tests
57
Table 11 Internet Access Wizard Setup: LAN Configuration
57
Chapter 4 Wizard Setup for Media Bandwidth Management
59
Introduction
59
Predefined Media Bandwidth Management Services
59
Table 12 Media Bandwidth Mgnt. Wizard Setup: Services
59
Figure 16 Media Bandwidth Mgnt. Wizard Setup
60
Media Bandwidth Management Setup
60
Figure 17 Media Bandwidth Mgnt. Wizard Setup: Second Screen
61
Table 13 Media Bandwidth Mgnt. Wizard Setup: First Screen
61
Table 14 Media Bandwidth Mgnt. Wizard Setup: Second Screen
61
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Finish
62
Chapter 5 LAN Setup
63
LAN Overview
63
Figure 19 LAN and WAN IP Addresses
63
Lans, Wans and the Prestige
63
DHCP Setup
64
DNS Server Address
64
DNS Server Address Assignment
64
IP Pool Setup
64
Lan Tcp/Ip
65
IP Address and Subnet Mask
65
Private IP Addresses
66
RIP Setup
66
Any IP
67
Multicast
67
Figure 20 any IP Example
68
How any IP Works
68
Configuring LAN
69
Figure 21 LAN Setup
69
Table 15 LAN Setup
69
Chapter 6 WAN Setup
71
WAN Overview
71
Encapsulation
71
Enet Encap
71
PPP over Ethernet
71
Pppoa
71
IP Address Assignment
72
IP Assignment with Pppoa or Pppoe Encapsulation
72
LLC-Based Multiplexing
72
Multiplexing
72
Rfc 1483
72
VC-Based Multiplexing
72
VPI and VCI
72
IP Assignment with ENET ENCAP Encapsulation
73
IP Assignment with RFC 1483 Encapsulation
73
Nailed-Up Connection (PPP)
73
Nat
73
Metric
73
Pppoe Encapsulation
74
Traffic Shaping
74
Zero Configuration Internet Access
75
The Main WAN Screen
75
Figure 22 Example of Traffic Shaping
75
Configuring WAN Setup
76
Figure 23 WAN
76
Table 16 WAN
76
Figure 24 WAN Setup (Pppoe)
77
Table 17 WAN Setup
77
Traffic Redirect
79
Configuring WAN Backup
80
Figure 25 Traffic Redirect Example
80
Figure 26 Traffic Redirect LAN Setup
80
Figure 27 WAN Backup
81
Table 18 WAN Backup
81
Chapter 7 Network Address Translation (NAT) Screens
83
NAT Overview
83
NAT Definitions
83
Table 19 NAT Definitions
83
Figure 28 How NAT Works
84
How NAT Works
84
What NAT Does
84
Figure 29 NAT Application with IP Alias
85
NAT Application
85
NAT Mapping Types
85
SUA (Single User Account) Versus NAT
86
SUA Server
86
Table 20 NAT Mapping Types
86
Default Server IP Address
87
Port Forwarding: Services and Port Numbers
87
Table 21 Services and Port Numbers
87
Configuring Servers Behind SUA (Example)
88
Selecting the NAT Mode
88
Figure 30 Multiple Servers Behind NAT Example
88
Figure 31 NAT Mode
88
Configuring SUA Server Set
89
Table 22 NAT Mode
89
Figure 32 Edit SUA/NAT Server Set
90
Table 23 Edit SUA/NAT Server Set
90
Configuring Address Mapping Rules
91
Figure 33 Address Mapping Rules
91
Table 24 Address Mapping Rules
91
Editing an Address Mapping Rule
92
Figure 34 Edit Address Mapping Rule
92
Table 25 Edit Address Mapping Rule
93
Chapter 8 Dynamic DNS Setup
95
Dynamic DNS Overview
95
DYNDNS Wildcard
95
Configuring Dynamic DNS
95
Figure 35 Dynamic DNS
96
Table 26 Dynamic DNS
96
Chapter 9 Time and Date
97
Configuring Time and Date
97
Figure 36 Time and Date
97
Table 27 Time and Date
98
Chapter 10 Firewalls
99
Firewall Overview
99
Types of Firewalls
99
Packet Filtering Firewalls
99
Application-Level Firewalls
100
Stateful Inspection Firewalls
100
Introduction to Zyxel's Firewall
100
Denial of Service Attacks
101
Denial of Service
101
Basics
101
Figure 37 Prestige Firewall Application
101
Table 28 Common IP Ports
102
Types of Dos Attacks
102
Figure 38 Three-Way Handshake
103
Figure 39 SYN Flood
103
Figure 40 Smurf Attack
104
ICMP Vulnerability
104
Illegal Commands (Netbios and SMTP)
104
Table 29 ICMP Commands that Trigger Alerts
104
Table 30 Legal Netbios Commands
104
Traceroute
105
Stateful Inspection
105
Table 31 Legal SMTP Commands
105
Figure 41 Stateful Inspection
106
Stateful Inspection Process
106
Stateful Inspection and the Prestige
107
TCP Security
107
UDP/ICMP Security
108
Upper Layer Protocols
108
Guidelines for Enhancing Security with Your Firewall
108
Security in General
109
Packet Filtering Vs Firewall
110
Firewall
110
Packet Filtering
110
When to Use Filtering
110
When to Use the Firewall
110
Firewall Configuration
113
Access Methods
113
Firewall Policies Overview
113
Chapter 11 Firewall Configuration
113
Rule Logic Overview
114
Rule Checklist
114
Security Ramifications
114
Action
115
Destination Address
115
Key Fields for Configuring Rules
115
Service
115
Source Address
115
Connection Direction
115
LAN to WAN Rules
115
Alerts
116
Configuring Default Firewall Policy
116
Figure 42 Firewall: Default Policy
117
Rule Summary
117
Table 32 Firewall: Default Policy
117
Figure 43 Firewall: Rule Summary
118
Table 33 Rule Summary
118
Configuring Firewall Rules
119
Figure 44 Firewall: Edit Rule
120
Table 34 Firewall: Edit Rule
121
Configuring a Customized Service
122
Customized Services
122
Figure 45 Firewall: Customized Services
122
Table 35 Customized Services
122
Example Firewall Rule
123
Figure 46 Firewall: Configure Customized Services
123
Table 36 Firewall: Configure Customized Services
123
Figure 47 Firewall Example: Rule Summary
124
Figure 48 Firewall Example: Edit Rule: Destination Address
125
Figure 49 Edit Custom Port Example
125
Figure 50 Firewall Example: Edit Rule: Select Customized Services
126
Figure 51 Firewall Example: Rule Summary: My Service
127
Predefined Services
127
Table 37 Predefined Services
127
Anti-Probing
129
Dos Thresholds
130
Figure 52 Firewall: Anti Probing
130
Table 38 Firewall: Anti Probing
130
Half-Open Sessions
131
TCP Maximum Incomplete and Blocking Time
131
Threshold Values
131
Configuring Firewall Thresholds
132
Figure 53 Firewall: Threshold
132
Table 39 Firewall: Threshold
133
Chapter 12 Content Filtering
135
Content Filtering Overview
135
The Main Content Filter Screen
135
Figure 54 Content Filtering
135
Table 40
135
Configuring Keyword Blocking
136
Figure 55 Content Filter: Keyword
136
Table 41 Content Filter: Keyword
136
Configuring the Schedule
137
Configuring Trusted Computers
137
Figure 56 Content Filter: Schedule
137
Table 42 Content Filter: Schedule
137
Figure 57 Content Filter: Trusted
138
Table 43 Content Filter: Trusted
138
Chapter 13 Remote Management Configuration
139
Remote Management Overview
139
Remote Management Limitations
139
Remote Management and NAT
140
System Timeout
140
Telnet
140
Figure 58 Telnet Configuration on a TCP/IP Network
140
Ftp
141
Web
141
Configuring Remote Management
141
Figure 59 Remote Management
141
Table 44 Remote Management
141
Chapter 14 Universal Plug-And-Play (Upnp)
143
Introducing Universal Plug and Play
143
How Do I Know if I'M Using Upnp
143
NAT Traversal
143
Cautions with Upnp
144
Upnp and Zyxel
144
Configuring Upnp
144
Figure 60 Configuring Upnp
144
Installing Upnp in Windows Example
145
Table 45 Configuring Upnp
145
Figure 61 Add/Remove Programs: Windows Setup: Communication
146
Figure 62 Add/Remove Programs: Windows Setup: Communication: Components
146
Figure 63 Network Connections
147
Figure 64 Windows Optional Networking Components Wizard
147
Using Upnp in Windows XP Example
148
Figure 65 Networking Services
148
Figure 66 Network Connections
149
Figure 67 Internet Connection Properties
150
Figure 68 Internet Connection Properties: Advanced Settings
151
Figure 69 Internet Connection Properties: Advanced Settings: Add
151
Figure 70 System Tray Icon
152
Figure 71 Internet Connection Status
152
Figure 72 Network Connections
153
Figure 73 Network Connections: My Network Places
154
Figure 74 Network Connections: My Network Places: Properties: Example
154
Chapter 15 Logs Screens
155
Logs Overview
155
Alerts and Logs
155
Configuring Log Settings
155
Figure 75 Log Settings
156
Table 46 Log Settings
156
Displaying the Logs
157
SMTP Error Messages
158
Figure 76 View Logs
158
Table 47 View Logs
158
Table 48 SMTP Error Messages
158
Example E-Mail Log
159
Figure 77 E-Mail Log Example
159
Chapter 16 Media Bandwidth Management Advanced Setup
161
Media Bandwidth Management Overview
161
Application-Based Bandwidth Management
162
Bandwidth Classes and Filters
162
Proportional Bandwidth Allocation
162
Subnet-Based Bandwidth Management
162
Application and Subnet-Based Bandwidth Management
163
Scheduler
163
Figure 78 Subnet-Based Bandwidth Management Example
163
Priority-Based Scheduler
163
Table 49 Application and Subnet-Based Bandwidth Management Example
163
Fairness-Based Scheduler
164
Maximize Bandwidth Usage
164
Reserving Bandwidth for Non-Bandwidth Class Traffic
164
Maximize Bandwidth Usage Example
165
Priority-Based Allotment of Unused and Unbudgeted Bandwidth
165
Table 50 Maximize Bandwidth Usage Example
165
Table 51 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
165
Fairness-Based Allotment of Unused and Unbudgeted Bandwidth
166
Bandwidth Borrowing
166
Table 52 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
166
Bandwidth Borrowing Example
167
Maximize Bandwidth Usage with Bandwidth Borrowing
167
Table 53 Bandwidth Borrowing Example
167
The Main Media Bandwidth Management Screen
167
Configuring Summary
168
Figure 79 Media Bandwidth Mgnt
168
Figure 80 Media Bandwidth Management: Summary
168
Table 54 Media Bandwidth Mgnt
168
Configuring Class Setup
169
Table 55 Media Bandwidth Management: Summary
169
Diffserv
170
DSCP and Per-Hop Behavior
170
Figure 81 Media Bandwidth Management: Class Setup
170
Table 56 Media Bandwidth Management: Class Setup
170
Figure 82 Diffserv: Differentiated Service Field
171
Media Bandwidth Management Class Configuration
171
Figure 83 Media Bandwidth Management: Class Configuration
172
Table 57 Media Bandwidth Management: Class Configuration
172
Figure 84 Media Bandwidth Management Statistics
174
Media Bandwidth Management Statistics
174
Table 58 Services and Port Numbers
174
Bandwidth Monitor
175
Figure 85 Media Bandwidth Management: Monitor
175
Table 59 Media Bandwidth Management Statistics
175
Table 60 Media Bandwidth Management: Monitor
176
Chapter 17 Maintenance
177
Maintenance Overview
177
System Status Screen
177
Figure 86 System Status
178
Table 61 System Status
178
Figure 87 System Status: Show Statistics
179
System Statistics
179
DHCP Table Screen
180
Table 62 System Status: Show Statistics
180
Any IP Table Screen
181
Figure 88 DHCP Table
181
Figure 89 any IP Table
181
Table 63 DHCP Table
181
Table 64 any IP Table
181
Diagnostic Screens
182
Figure 90 Diagnostic: General
182
General Diagnostic
182
DSL Line Diagnostic
183
Figure 91 Diagnostic: DSL Line
183
Table 65 Diagnostic: General
183
Firmware Upgrade
184
Table 66 Diagnostic: DSL Line
184
Figure 92 Firmware Upgrade
185
Figure 93 Network Temporarily Disconnected
185
Table 67 Firmware Upgrade
185
Figure 94 Error Message
186
Chapter 18 Introducing the SMT
187
SMT Introduction
187
Entering Password
187
Figure 95 Login Screen
187
Procedure for SMT Configuration Via Telnet
187
Prestige SMT Menus Overview
188
Table 68 SMT Menus Overview
188
Navigating the SMT Interface
189
Table 69 Navigating the SMT Interface
189
Figure 96 SMT Main Menu
190
System Management Terminal Interface Summary
190
Table 70 Main Menu Summary
190
Changing the System Password
191
Figure 97 Menu 23 System Password
191
Chapter 19 Menu 1 General Setup
193
General Setup
193
Procedure to Configure Menu 1
193
Figure 98 Menu 1 General Setup
193
Procedure to Configure Dynamic DNS
194
Table 71 Menu 1 General Setup
194
Figure 99 Menu 1.1 Configure Dynamic DNS
195
Table 72 Menu 1.1 Configure Dynamic DNS
195
Chapter 20 Menu 2 WAN Backup Setup
197
Configuring Dial Backup in Menu 2
197
Figure 100 Menu 2 WAN Backup Setup
197
Figure 101 Menu 2.1Traffic Redirect Setup
198
Table 73 Menu 2 WAN Backup Setup
198
Table 74 Menu 2.1Traffic Redirect Setup
198
Traffic Redirect Setup
198
Introduction to WAN Backup Setup
197
Chapter 21 Menu 3 LAN Setup
201
LAN Setup
201
Figure 102 Menu 3 LAN Setup
201
Figure 103 Menu 3.1 LAN Port Filter Setup
201
General Ethernet Setup
201
Protocol Dependent Ethernet Setup
202
TCP/IP Ethernet Setup and DHCP
202
Figure 104 Menu 3.2 TCP/IP and DHCP Ethernet Setup
202
Table 75 DHCP Ethernet Setup
203
Table 76 TCP/IP Ethernet Setup
203
Chapter 22 Internet Access
205
Internet Access Overview
205
IP Policies
205
IP Alias
205
IP Alias Setup
206
Figure 105 IP Alias Network Example
206
Figure 106 Menu 3.2 TCP/IP and DHCP Setup
206
Route IP Setup
207
Figure 107 Menu 3.2.1 IP Alias Setup
207
Table 77 Menu 3.2.1 IP Alias Setup
207
Internet Access Configuration
208
Figure 108 Menu 1 General Setup
208
Figure 109 Menu 4 Internet Access Setup
208
Table 78 Menu 4 Internet Access Setup
209
Chapter 23 Remote Node Configuration
211
Remote Node Setup Overview
211
Remote Node Setup
211
Remote Node Profile
211
Encapsulation and Multiplexing Scenarios
212
Figure 110 Menu 11 Remote Node Setup
212
Scenario 1: One VC, Multiple Protocols
212
Scenario 2: One VC, One Protocol (IP)
212
Scenario 3: Multiple Vcs
212
Figure 111 Menu 11.1 Remote Node Profile
213
Table 79 Menu 11.1 Remote Node Profile
213
Outgoing Authentication Protocol
214
Remote Node Network Layer Options
214
Figure 112 Menu 11.3 Remote Node Network Layer Options
215
Table 80 Menu 11.3 Remote Node Network Layer Options
215
My WAN Addr Sample IP Addresses
216
Remote Node Filter
217
Figure 113 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
217
Figure 114 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
217
Figure 115 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
218
Figure 116 Internet Security
218
Web Configurator Filter Sets
218
Web Configurator Internet Security Filter Rules
218
Figure 117 Menu 21 Filer Set Configuration
219
Figure 118 Menu 21.11 Webset 11
219
Figure 119 Menu 21.12 Webset 12
219
Editing ATM Layer Options
220
Figure 120 Menu 11.6 for VC-Based Multiplexing
220
LLC-Based Multiplexing or PPP Encapsulation
220
VC-Based Multiplexing (Non-PPP Encapsulation)
220
Advance Setup Options
221
Figure 121 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
221
Figure 122 Menu 11.1 Remote Node Profile
221
Figure 123 Menu 11.8 Advance Setup Options
222
Table 81 Menu 11.8 Advance Setup Options
222
Chapter 24 Static Route Setup
223
IP Static Route Overview
223
Configuration
223
Figure 124 Sample Static Routing Topology
223
Figure 125 Menu 12 Static Route Setup
224
Figure 126 Menu 12.1 IP Static Route Setup
224
Figure 127 Menu12.1.1 Edit IP Static Route
224
Table 82 Menu12.1.1 Edit IP Static Route
225
Chapter 25 Bridging Setup
227
Bridging in General
227
Bridge Ethernet Setup
227
Remote Node Bridging Setup
227
Figure 128 Menu 11.1 Remote Node Profile
228
Figure 129 Menu 11.3 Remote Node Network Layer Options
228
Table 83 Remote Node Network Layer Options: Bridge Fields
228
Bridge Static Route Setup
229
Figure 130 Menu 12.3.1 Edit Bridge Static Route
229
Table 84 Menu 12.3.1 Edit Bridge Static Route
229
Network Address Translation (NAT)
231
Applying NAT
231
SUA (Single User Account) Versus NAT
231
Using NAT
231
Chapter 26 Network Address Translation (NAT)
231
Figure 131 Menu 4 Applying NAT for Internet Access
232
Figure 132 Applying NAT in Menus 4 & 11.3
232
NAT Setup
233
Address Mapping Sets
233
Figure 133 Menu 15 NAT Setup
233
Table 85 Applying NAT in Menus 4 & 11.3
233
Figure 134 Menu 15.1 Address Mapping Sets
234
Figure 135 Menu 15.1.255 SUA Address Mapping Rules
234
SUA Address Mapping Set
234
Table 86 SUA Address Mapping Rules
234
Figure 136 Menu 15.1.1 First Set
235
User-Defined Address Mapping Sets
235
Figure 137 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
236
Ordering Your Rules
236
Table 87 Menu 15.1.1 First Set
236
Configuring a Server Behind NAT
237
Figure 138 Menu 15.2 NAT Server Setup
237
Table 88 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
237
Figure 139 Menu 15.2.1 NAT Server Setup
238
Figure 140 Multiple Servers Behind NAT Example
238
Example 1: Internet Access Only
239
Example 2: Internet Access with an Inside Server
239
Figure 141 NAT Example 1
239
Figure 142 Menu 4 Internet Access & NAT Example
239
Example 3: Multiple Public IP Addresses with Inside Servers
240
Figure 143 NAT Example 2
240
Figure 144 Menu 15.2.1 Specifying an Inside Server
240
Figure 145 NAT Example 3
241
Figure 146 Example 3: Menu 11.3
242
Figure 147 Example 3: Menu 15.1.1.1
242
Figure 148 Example 3: Final Menu 15.1.1
243
Figure 149 Example 3: Menu 15.2.1
243
Example 4: NAT Unfriendly Application Programs
244
Figure 150 NAT Example 4
244
Figure 151 Example 4: Menu 15.1.1.1 Address Mapping Rule
244
Figure 152 Example 4: Menu 15.1.1 Address Mapping Rules
245
General NAT Examples
238
Chapter 27 Enabling the Firewall
247
Remote Management and the Firewall
247
Access Methods
247
Enabling the Firewall
247
Figure 153 Menu 21.2 Firewall Setup
248
Chapter 28 Filter Configuration
249
About Filtering
249
Figure 154 Outgoing Packet Filtering Process
249
Figure 155 Filter Rule Process
250
The Filter Structure of the Prestige
250
Configuring a Filter Set for the Prestige
251
Figure 156 Menu 21 Filter Set Configuration
251
Figure 157 Netbios_Wan Filter Rules Summary
251
Filter Rules Summary Menus
252
Figure 158 Netbios_Lan Filter Rules Summary
252
Figure 159 IGMP Filter Rules Summary
252
Table 89 Abbreviations Used in the Filter Rules Summary Menu
252
Configuring a Filter Rule
253
Table 90 Rule Abbreviations Used
253
Figure 160 Menu 21.1.X.1 TCP/IP Filter Rule
254
Table 91 Menu 21.1.X.1 TCP/IP Filter Rule
254
TCP/IP Filter Rule
254
Figure 161 Executing an IP Filter
256
Generic Filter Rule
256
Figure 162 Menu 21.1.5.1 Generic Filter Rule
257
Table 92 Menu 21.1.5.1 Generic Filter Rule
257
Filter Types and NAT
258
Example Filter
258
Figure 163 Protocol and Device Filter Sets
258
Figure 164 Sample Telnet Filter
259
Figure 165 Menu 21.1.6.1 Sample Filter
259
Applying Filters and Factory Defaults
260
Figure 166 Menu 21.1.6.1 Sample Filter Rules Summary
260
Table 93 Filter Sets Table
260
Ethernet Traffic
261
Figure 167 Filtering Ethernet Traffic
261
Figure 168 Filtering Remote Node Traffic
261
Remote Node Filters
261
Chapter 29 SNMP Configuration
263
About SNMP
263
Figure 169 SNMP Management Model
263
Supported Mibs
264
SNMP Configuration
264
SNMP Traps
265
Figure 170 Menu 22 SNMP Configuration
265
Table 94 Menu 22 SNMP Configuration
265
Table 95 SNMP Traps
265
Table 96 Ports and Permanent Virtual Circuits
266
Chapter 30 System Information and Diagnosis
267
Overview
267
System Status
267
Figure 171 Menu 24 System Maintenance
267
Figure 172 Menu 24.1 System Maintenance : Status
268
Table 97 Menu 24.1 System Maintenance: Status
268
System Information
269
Figure 173 Menu 24.2 System Information and Console Port Speed
269
Console Port Speed
270
Figure 174 Menu 24.2.1 System Maintenance: Information
270
Table 98 Menu 24.2.1 System Maintenance: Information
270
Log and Trace
271
Figure 175 Menu 24.2.2 System Maintenance : Change Console Port Speed
271
Figure 176 Menu 24.3 System Maintenance: Log and Trace
271
Viewing Error Log
271
Figure 177 Sample Error and Information Messages
272
Figure 178 Menu 24.3.2 System Maintenance: Syslog and Accounting
272
Syslog and Accounting
272
Table 99 Menu 24.3.2 System Maintenance : Syslog and Accounting
272
Figure 179 Syslog Example
273
Diagnostic
274
Figure 180 Menu 24.4 System Maintenance : Diagnostic
274
Table 100 Menu 24.4 System Maintenance Menu: Diagnostic
275
Chapter 31 Firmware and Configuration File Maintenance
277
Filename Conventions
277
Backup Configuration
278
Table 101 Filename Conventions
278
Example of FTP Commands from the Command Line
279
Figure 181 Telnet in Menu 24.5
279
Using the FTP Command from the Command Line
279
Figure 182 FTP Session Example
280
GUI-Based FTP Clients
280
Table 102 General Commands for GUI-Based FTP Clients
280
TFTP and FTP over WAN Management Limitations
280
Backup Configuration Using TFTP
281
GUI-Based TFTP Clients
281
TFTP Command Example
281
Restore Configuration
282
Restore Using FTP
282
Table 103 General Commands for GUI-Based TFTP Clients
282
Figure 183 Telnet into Menu 24.6
283
Figure 184 Restore Using FTP Session Example
283
Restore Using FTP Session Example
283
Uploading Firmware and Configuration Files
284
Configuration File Upload
284
Figure 185 Telnet into Menu 24.7.1 Upload System Firmware
284
Firmware File Upload
284
Figure 186 Telnet into Menu 24.7.2 System Maintenance
285
FTP File Upload Command from the DOS Prompt Example
285
Figure 187 FTP Session Example of Firmware File Upload
286
FTP Session Example of Firmware File Upload
286
TFTP File Upload
286
TFTP Upload Command Example
287
Chapter 32 System Maintenance
289
Command Interpreter Mode
289
Figure 188 Command Mode in Menu 24
289
Figure 189 Valid Commands
289
Call Control Support
290
Budget Management
290
Figure 190 Menu 24.9 System Maintenance: Call Control
290
Figure 191 Menu 24.9.1 System Maintenance: Budget Management
290
Time and Date Setting
291
Figure 192 Menu 24 System Maintenance
291
Table 104 Menu 24.9.1 System Maintenance: Budget Management
291
Figure 193 Menu 24.10 System Maintenance: Time and Date Setting
292
Resetting the Time
292
Table 105 Menu 24.10 System Maintenance: Time and Date Setting
292
Chapter 33 Remote Management
295
Remote Management Overview
295
Remote Management
295
Remote Management Setup
295
Figure 194 Menu 24.11 Remote Management Control
296
Remote Management Limitations
296
Table 106 Menu 24.11 Remote Management Control
296
Remote Management and NAT
297
System Timeout
297
Chapter 34 IP Policy Routing
299
IP Policy Routing Overview
299
Benefits of IP Policy Routing
299
Routing Policy
299
IP Routing Policy Setup
300
Figure 195 Menu 25 IP Routing Policy Setup
300
Figure 196 Menu 25.1 IP Routing Policy Setup
301
Table 107 Menu 25.1 IP Routing Policy Setup
301
Figure 197 Menu 25.1.1 IP Routing Policy
302
Table 108 Menu 25.1.1 IP Routing Policy
302
Applying an IP Policy
303
Ethernet IP Policies
303
IP Policy Routing Example
304
Figure 198 Menu 3.2 TCP/IP and DHCP Ethernet Setup
304
Figure 199 Menu 11.3 Remote Node Network Layer Options
304
Figure 200 Example of IP Policy Routing
305
Figure 201 IP Routing Policy Example
305
Figure 202 IP Routing Policy Example
306
Figure 203 Applying IP Policies Example
307
Chapter 35 Call Scheduling
309
Introduction
309
Figure 204 Menu 26 Schedule Setup
309
Figure 205 Menu 26.1 Schedule Set Setup
310
Table 109 Menu 26.1 Schedule Set Setup
310
Figure 206 Applying Schedule Set(S) to a Remote Node (Pppoe)
311
Chapter 36 Troubleshooting
313
Problems Starting up the Prestige
313
Problems with the LAN
313
Table 110 Troubleshooting Starting up Your Prestige
313
Table 111 Troubleshooting the LAN
313
Problems with the WAN
314
Table 112 Troubleshooting the WAN
314
Problems Accessing the Prestige
315
Internet Explorer Pop-Up Blockers
315
Pop-Up Windows, Javascripts and Java Permissions
315
Table 113 Troubleshooting Accessing the Prestige
315
Figure 207 Pop-Up Blocker
316
Figure 208 Internet Options
316
Figure 209 Internet Options
317
Figure 210 Pop-Up Blocker Settings
318
Javascripts
318
Figure 211 Internet Options
319
Figure 212 Security Settings - Java Scripting
320
Java Permissions
320
Figure 213 Security Settings - Java
321
Activex Controls in Internet Explorer
322
Figure 214 Java (Sun)
322
Figure 215 Internet Options Security
323
Figure 216 Security Setting Activex Controls
324
Product Specifications
325
Table 114 Device
325
Appendix A Product Specifications
325
Table 115 Firmware
326
Appendix B about ADSL
329
Introduction to DSL
329
ADSL Overview
329
Advantages of ADSL
329
Appendix C
331
Figure 217 Virtual Circuit Topology
331
Appendix D
333
Virtual Circuit Topology
331
Figure 218 Wall-Mounting Example
333
Appendix E Setting up Your Computer's IP Address
335
Wall-Mounting Instructions
333
Windows 95/98/Me
335
Figure 219 Windows 95/98/Me: Network: Configuration
336
Installing Components
336
Figure 220 Windows 95/98/Me: TCP/IP Properties: IP Address
337
Figure 221 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
338
Windows 2000/NT/XP
338
Figure 222 Windows XP: Start Menu
339
Figure 223 Windows XP: Control Panel
339
Figure 224 Windows XP: Control Panel: Network Connections: Properties
340
Figure 225 Windows XP: Local Area Connection Properties
340
Figure 226 Windows XP: Internet Protocol (TCP/IP) Properties
341
Figure 227 Windows XP: Advanced TCP/IP Properties
342
Figure 228 Windows XP: Internet Protocol (TCP/IP) Properties
343
Macintosh os 8/9
343
Figure 229 Macintosh os 8/9: Apple Menu
344
Figure 230 Macintosh os 8/9: TCP/IP
344
Figure 231 Macintosh os X: Apple Menu
345
Macintosh os X
345
Figure 232 Macintosh os X: Network
346
Linux
346
Figure 233 Red hat 9.0: KDE: Network Configuration: Devices
347
Figure 234 Red hat 9.0: KDE: Ethernet Device: General
347
Figure 235 Red hat 9.0: KDE: Network Configuration: DNS
348
Figure 236 Red hat 9.0: KDE: Network Configuration: Activate
348
Using Configuration Files
348
Figure 237 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
349
Figure 238 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
349
Figure 239 Red hat 9.0: DNS Settings in Resolv.conf
349
Figure 240 Red hat 9.0: Restart Ethernet Card
350
Figure 241 Red hat 9.0: Checking TCP/IP Properties
350
Verifying Settings
350
Appendix F IP Subnetting
351
IP Addressing
351
IP Classes
351
Table 116 Classes of IP Addresses
351
Subnet Masks
352
Subnetting
352
Table 117 Allowed IP Address Range by Class
352
Table 118 "Natural" Masks
352
Example: Two Subnets
353
Table 119 Alternative Subnet Mask Notation
353
Table 120 Two Subnets Example
353
Table 121 Subnet 1
354
Table 122 Subnet 2
354
Example: Four Subnets
355
Table 123 Subnet 1
355
Table 124 Subnet 2
355
Table 125 Subnet 3
355
Example Eight Subnets
356
Table 126 Subnet 4
356
Table 127 Eight Subnets
356
Table 128 Class C Subnet Planning
356
Subnetting with Class a and Class B Networks
357
Table 129 Class B Subnet Planning
357
Appendix G Boot Commands
359
Figure 242 Option to Enter Debug Mode
359
Figure 243 Boot Module Commands
360
Appendix H Command Interpreter
361
Command Syntax
361
Command Usage
361
Appendix I Firewall Commands
363
Table 130 Firewall Commands
364
Appendix J Splitters and Microfilters
369
Connecting a POTS Splitter
369
Figure 244 Connecting a POTS Splitter
369
Telephone Microfilters
369
Figure 245 Connecting a Microfilter
370
Figure 246 Prestige with ISDN
370
Prestige with ISDN
370
Appendix Kpppoe
371
Pppoe in Action
371
Benefits of Pppoe
371
Traditional Dial-Up Scenario
371
How Pppoe Works
372
Prestige as a Pppoe Client
372
Figure 247 Single-Computer Per Router Hardware Configuration
372
Figure 248 Prestige as a Pppoe Client
372
Appendix L Internal SPTGEN
373
Internal SPTGEN Overview
373
The Configuration Text File Format
373
Figure 249 Configuration Text File Format: Column Descriptions
373
Internal SPTGEN FTP Download Example
374
Figure 250 Invalid Parameter Entered: Command Line Example
374
Figure 251 Valid Parameter Entered: Command Line Example
374
Internal SPTGEN FTP Upload Example
375
Figure 252 Internal SPTGEN FTP Download Example
375
Figure 253 Internal SPTGEN FTP Upload Example
375
Table 131 Abbreviations Used in the Example Internal SPTGEN Screens Table
376
Table 132 Menu 1 General Setup (SMT Menu 1)
376
Table 133 Menu 3 (SMT Menu 3 )
376
Table 134 Menu 4 Internet Access Setup (SMT Menu 4)
380
Table 135 Menu 12 (SMT Menu 12)
380
Table 136 Menu 15 SUA Server Setup (SMT Menu 15)
385
Table 137 Menu 21.1 Filter Set #1 (SMT Menu 21.1)
386
Table 138 Menu 21.1 Filer Set #2, (SMT Menu 21.1)
390
Table 139 Menu 23 System Menus (SMT Menu 23)
394
Table 140 Menu 24.11 Remote Management Control (SMT Menu 24.11)
395
Command Examples
396
Table 141 Command Examples
396
Appendix M Log Descriptions
397
Table 142 System Maintenance Logs
397
Table 143 System Error Logs
398
Table 144 Access Control Logs
398
Table 145 TCP Reset Logs
399
Table 146 Packet Filter Logs
399
Table 147 ICMP Logs
400
Table 148 CDR Logs
400
Table 149 PPP Logs
400
Table 150 Upnp Logs
401
Table 151 Content Filtering Logs
401
Table 152 Attack Logs
402
Table 153 Ipsec Logs
403
Table 154 IKE Logs
403
Table 155 PKI Logs
406
Table 156 Certificate Path Verification Failure Reason Codes
407
Table 157 802.1X Logs
408
Table 158 ACL Setting Notes
409
Table 159 ICMP Notes
409
Table 160 Syslog Logs
410
Table 161 RFC-2408 ISAKMP Payload Types
410
Log Commands
411
Log Command Example
412
Index
413
Advertisement
Advertisement
Related Products
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HNT1
ZyXEL Communications P660HW-T1V3
ZyXEL Communications P-660H-T1 v2
ZyXEL Communications P-660HWP-DX - V3.40
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications P-660R - V3.40
ZyXEL Communications P-660H-Tx v2 Series
ZyXEL Communications P-660HU-Tx
ZyXEL Communications P-660HNU-T1
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL