Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HW-D1 V2
ZyXEL Communications P-660HW-D1 V2 Manuals
Manuals and User Guides for ZyXEL Communications P-660HW-D1 V2. We have
4
ZyXEL Communications P-660HW-D1 V2 manuals available for free PDF download: User Manual, Quick Start Manual, Install Manual
ZyXEL Communications P-660HW-D1 V2 User Manual (460 pages)
802.11g Wireless ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 18.21 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
List of Figures
25
List of Tables
33
Preface
39
User Guide Feedback
40
Introduction to DSL
41
Chapter 1 Getting to Know Your Prestige
43
Introducing the Prestige
43
Table 1 ADSL Standards
43
Features of the Prestige
44
Traffic Redirect
45
Adsl Standards
46
Dynamic Dns Support
46
Protocol Support
46
Network Management
47
P-660HW Wireless Features
48
Networking Compatibility
47
Applications for the Prestige
49
Internet Access
49
Figure 1 Prestige Internet Access Application
49
Figure 2 Firewall Application
50
Figure 3 Prestige LAN-To-LAN Application
50
Figure 4 P-660H Front Panel
50
Firewall for Secure Broadband Internet Access
50
LAN to LAN Application
50
Front Panel Leds
50
Figure 5 P-660HW Front Panel
51
Table 2 Front Panel Leds
51
Chapter 2 Introducing the Web Configurator
53
Web Configurator Overview
53
Accessing the Prestige Web Configurator
53
Resetting the Prestige
54
Using the Reset Button
54
Figure 6 Password Screen
54
Figure 7 Change Password at Login
54
Navigating the Prestige Web Configurator
55
Figure 8 Web Configurator: Site Map Screen
55
Table 3 Web Configurator Screens Summary
56
Chapter 3 Wizard Setup for Internet Access
59
Introduction to Internet Access Wizard
59
Internet Access Wizard Setup
59
Figure 9 Internet Access Wizard Setup: First Screen
60
Table 4 Internet Access Wizard Setup: First Screen
60
Figure 10 Internet Connection with Pppoe
61
Table 5 Internet Connection with Pppoe
61
Figure 11 Internet Connection with RFC 1483
62
Figure 12 Internet Connection with ENET ENCAP
62
Table 6 Internet Connection with RFC 1483
62
Figure 13 Internet Connection with Pppoa
63
Table 7 Internet Connection with ENET ENCAP
63
Table 8 Internet Connection with Pppoa
64
Figure 14 Internet Access Wizard Setup: Third Screen
65
Figure 15 Internet Access Wizard Setup: LAN Configuration
65
Figure 16 Internet Access Wizard Setup: Connection Tests
66
Table 9 Internet Access Wizard Setup: LAN Configuration
66
Chapter 4 Wizard Setup for Media Bandwidth Management
67
Introduction to Media Bandwidth Management
67
Predefined Media Bandwidth Management Services
67
Table 10 Media Bandwidth Mgnt. Wizard Setup: Services
67
Media Bandwidth Management Setup
68
Figure 17 Media Bandwidth Mgnt. Wizard Setup: First Screen
68
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen
69
Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish
70
Chapter 5 Password Setup
71
Password Overview
71
Configuring Password
71
Figure 20 Password
71
Table 13 Password
71
Chapter 6 LAN Setup
73
LAN Overview
73
Lans, Wans and the Prestige
73
Figure 21 LAN and WAN IP Addresses
73
Table 14 LAN Setup
73
DNS Server Address
74
DNS Server Address Assignment
74
Lan Tcp/Ip
75
Factory LAN Defaults
75
IP Address and Subnet Mask
75
RIP Setup
76
Multicast
76
Any IP
77
How any IP Works
77
Figure 22 any IP Example
77
Configuring LAN
78
Figure 23 LAN Setup
79
Configuring Static DHCP
80
Figure 24 LAN: Static DHCP
81
Table 15 LAN: Static DHCP
81
Chapter 7 Wireless LAN (Prestige 660HW)
83
Introduction
83
Wireless Security Overview
83
Encryption
83
Authentication
83
Restricted Access
84
Hide Prestige Identity
84
G-Plus
84
Configuring Wireless LAN on the Prestige
84
Configuring the Wireless Screen
85
WEP Encryption
85
Figure 25 Wireless Security Methods
85
Figure 26 Wireless Screen
86
Configuring MAC Filters
88
Figure 27 MAC Address Filter
89
Table 17 MAC Address Filter
89
Introduction to WPA
90
WPA-PSK Application Example
90
WPA with RADIUS Application Example
91
Figure 28 WPA - PSK Authentication
91
Wireless Client WPA Supplicants
92
Configuring IEEE 802.1X and WPA
92
Figure 29 WPA with RADIUS Application Example2
92
Authentication Required: 802.1X
93
Figure 30 Wireless LAN: 802.1X/Wpa: no Authentication
93
Table 18 Wireless LAN: 802.1X/Wpa: no Access/Authentication
93
Figure 31 Wireless LAN: 802.1X/Wpa: 802.1Xl
94
Table 19 Wireless LAN: 802.1X/Wpa: 802.1X
94
Authentication Required: WPA
95
Figure 32 Wireless LAN: 802.1X/Wpa: Wpal
96
Table 20 Wireless LAN: 802.1X/Wpa: Wpal
96
Authentication Required: WPA-PSK
97
Figure 33 Wireless LAN: 802.1X/Wpa:wpa-Pskl
97
Table 21 Wireless LAN: 802.1X/Wpa: Wpal-PSK
97
Configuring Local User Authentication
98
Figure 34 Local User Database
98
Table 22 Local User Database
98
Configuring RADIUS
99
Figure 35 RADIUS
99
Table 23 RADIUS
99
Introduction to OTIST
100
Enabling OTIST
100
Figure 36 OTIST
101
Reset Button
101
Table 24 OTIST
101
Web Configurator
101
Wireless Client
102
Starting OTIST
102
Figure 37 Example Wireless Client OTIST Screen
102
Figure 38 Security Key
102
Figure 39 OTIST in Progress (Prestige)
102
Figure 40 OTIST in Progress (Client)
102
Notes on OTIST
103
Figure 41 no AP with OTIST Found
103
Figure 42 Start OTIST
103
Chapter 8 WAN Setup
105
WAN Overview
105
Metric
105
Pppoe Encapsulation
106
Traffic Shaping
106
Zero Configuration Internet Access
107
Configuring WAN Setup
107
Figure 43 Example of Traffic Shaping
107
Figure 44 WAN Setup (Pppoe)
108
Table 25 WAN Setup
108
Traffic Redirect
110
Configuring WAN Backup
111
Figure 45 Traffic Redirect Example
111
Figure 46 Traffic Redirect LAN Setup
111
Figure 47 WAN Backup
112
Table 26 WAN Backup
112
Chapter 9 Network Address Translation (NAT) Screens
115
NAT Overview
115
NAT Definitions
115
Table 27 NAT Definitions
115
What NAT Does
116
How NAT Works
116
NAT Application
117
Figure 48 How NAT Works
117
Figure 49 NAT Application with IP Alias
117
NAT Mapping Types
118
Table 28 NAT Mapping Types
118
SUA (Single User Account) Versus NAT
119
SUA Server
119
Default Server IP Address
119
Port Forwarding: Services and Port Numbers
119
Table 29 Services and Port Numbers
119
Configuring Servers Behind SUA (Example)
120
Sip Alg
120
Figure 50 Multiple Servers Behind NAT Example
120
Selecting the NAT Mode
121
Configuring SUA Server
121
Figure 51 NAT Mode
121
Table 30 NAT Mode
121
Figure 52 Edit SUA/NAT Server Set
122
Table 31 Edit SUA/NAT Server Set
122
Configuring Address Mapping
123
Figure 53 Address Mapping Rules
123
Table 32 Address Mapping Rules
123
Editing an Address Mapping Rule
124
Figure 54 Address Mapping Rule Edit
124
Table 33 Address Mapping Rule Edit
125
Chapter 10 Dynamic DNS Setup
127
Dynamic DNS
127
DYNDNS Wildcard
127
Configuring Dynamic DNS
127
Figure 55 Dynamic DNS
128
Table 34 Dynamic DNS
128
Chapter 11 Time and Date
129
Configuring Time and Date
129
Figure 56 Time and Date
129
Table 35 Time and Date
130
Chapter 12 Firewalls
131
Firewall Overview
131
Types of Firewalls
131
Packet Filtering Firewalls
131
Application-Level Firewalls
131
Stateful Inspection Firewalls
132
Introduction to Zyxel's Firewall
132
Denial of Service Attacks
133
Denial of Service
133
Basics
133
Figure 57 Prestige Firewall Application
133
Types of Dos Attacks
134
Figure 58 Three-Way Handshake
134
Table 36 Common IP Ports
134
Figure 59 SYN Flood
135
Figure 60 Smurf Attack
136
ICMP Vulnerability
136
Illegal Commands (Netbios and SMTP)
136
Table 37 ICMP Commands that Trigger Alerts
136
Table 38 Legal Netbios Commands
136
Traceroute
137
Stateful Inspection
137
Table 39 Legal SMTP Commands
137
Figure 61 Stateful Inspection
138
Stateful Inspection Process
138
Stateful Inspection and the Prestige
139
TCP Security
139
UDP/ICMP Security
140
Upper Layer Protocols
140
Guidelines for Enhancing Security with Your Firewall
140
Security in General
141
Packet Filtering Vs Firewall
142
Packet Filtering
142
When to Use Filtering
142
Firewall
142
When to Use the Firewall
142
Chapter 13 Firewall Configuration
145
Access Methods
145
Firewall Policies Overview
145
Rule Logic Overview
146
Rule Checklist
146
Security Ramifications
146
Key Fields for Configuring Rules
147
Action
147
Service
147
Source Address
147
Destination Address
147
Connection Direction Example
147
LAN to WAN Rules
148
WAN to LAN Rules
148
Figure 62 LAN to WAN Traffic
148
Figure 63 WAN to LAN Traffic
148
Alerts
149
Configuring Basic Firewall Settings
149
Figure 64 Firewall: Default Policy
149
Table 40 Firewall: Default Policy
149
Rule Summary
150
Figure 65 Firewall: Rule Summary
150
Table 41 Rule Summary
151
Configuring Firewall Rules
152
Figure 66 Firewall: Edit Rule
153
Table 42 Firewall: Edit Rule
154
Customized Services
155
Creating/Editing a Customized Service
155
Figure 67 Firewall: Customized Services
155
Table 43 Customized Services
155
Example Firewall Rule
156
Figure 68 Firewall: Configure Customized Services
156
Table 44 Firewall: Configure Customized Services
156
Figure 69 Firewall Example: Rule Summary
157
Figure 70 Firewall Example: Edit Rule: Destination Address
158
Figure 71 Edit Custom Port Example
158
Figure 72 Firewall Example: Edit Rule: Select Customized Services
159
Predefined Services
160
Figure 73 Firewall Example: Rule Summary: My Service
160
Table 45 Predefined Services
160
Anti-Probing
162
Configuring Attack Alert
163
Figure 74 Firewall: Anti Probing
163
Table 46 Firewall: Anti Probing
163
Half-Open Sessions
164
TCP Maximum Incomplete and Blocking Time
164
Figure 75 Firewall: Threshold
165
Table 47 Firewall: Threshold
165
Threshold Values
164
Chapter 14 Content Filtering
167
Content Filtering Overview
167
Configuring Keyword Blocking
167
Figure 76 Content Filter: Keyword
167
Configuring the Schedule
168
Figure 77 Content Filter: Schedule
168
Table 48 Content Filter: Keyword
168
Configuring Trusted Computers
169
Figure 78 Content Filter: Trusted
169
Table 49 Content Filter: Schedule
169
Table 50 Content Filter: Trusted
169
Chapter 15 Remote Management Configuration
171
Remote Management Overview
171
Remote Management Limitations
171
Remote Management and NAT
172
System Timeout
172
Telnet
172
Ftp
172
Figure 79 Telnet Configuration on a TCP/IP Network
172
Web
173
Configuring Remote Management
173
Figure 80 Remote Management
173
Table 51 Remote Management
173
Chapter 16 Universal Plug-And-Play (Upnp)
175
Introducing Universal Plug and Play
175
How Do I Know if I'M Using Upnp
175
NAT Traversal
175
Cautions with Upnp
175
Upnp and Zyxel
176
Configuring Upnp
176
Figure 81 Configuring Upnp
176
Installing Upnp in Windows Example
177
Table 52 Configuring Upnp
177
Figure 82 Add/Remove Programs: Windows Setup: Communication
178
Figure 83 Add/Remove Programs: Windows Setup: Communication: Components
178
Figure 84 Network Connections
179
Figure 85 Windows Optional Networking Components Wizard
180
Using Upnp in Windows XP Example
181
Figure 86 Networking Services
181
Figure 87 Network Connections
182
Figure 88 Internet Connection Properties
183
Figure 89 Internet Connection Properties: Advanced Settings
184
Figure 90 Internet Connection Properties: Advanced Settings: Add
184
Figure 91 System Tray Icon
185
Figure 92 Internet Connection Status
185
Figure 93 Network Connections
186
Figure 94 Network Connections: My Network Places
187
Figure 95 Network Connections: My Network Places: Properties: Example
187
Chapter 17 Logs Screens
189
Logs Overview
189
Alerts and Logs
189
Configuring Log Settings
189
Figure 96 Log Settings
190
Table 53 Log Settings
190
Displaying the Logs
191
SMTP Error Messages
192
Figure 97 View Logs
192
Table 54 View Logs
192
Table 55 SMTP Error Messages
192
Example E-Mail Log
193
Figure 98 E-Mail Log Example
193
Chapter 18 Media Bandwidth Management Advanced Setup
195
Bandwidth Management Advanced Setup Overview
195
Bandwidth Classes and Filters
195
Proportional Bandwidth Allocation
196
Bandwidth Management Usage Examples
196
Application-Based Bandwidth Management Example
196
Subnet-Based Bandwidth Management Example
196
Figure 99 Application-Based Bandwidth Management Example
196
Application and Subnet-Based Bandwidth Management Example
197
Figure 100 Subnet-Based Bandwidth Management Example
197
Figure 101 Application and Subnet-Based Bandwidth Management Example
197
Table 56 Application and Subnet-Based Bandwidth Management Example
197
Scheduler
198
Priority-Based Scheduler
198
Fairness-Based Scheduler
198
Maximize Bandwidth Usage
198
Reserving Bandwidth for Non-Bandwidth Class Traffic
198
Maximize Bandwidth Usage Example
199
Figure 102 Bandwidth Allotment Example
199
Bandwidth Borrowing
200
Bandwidth Borrowing Example
200
Figure 103 Maximize Bandwidth Usage Example
200
Maximize Bandwidth Usage with Bandwidth Borrowing
201
Configuring Summary
201
Figure 104 Bandwidth Borrowing Example
201
Figure 105 Media Bandwidth Management: Summary
202
Table 57 Media Bandwidth Management: Summary
202
Configuring Class Setup
203
Figure 106 Media Bandwidth Management: Class Setup
203
Table 58 Media Bandwidth Management: Class Setup
203
Diffserv
204
DSCP and Per-Hop Behavior
204
Figure 107 Diffserv: Differentiated Service Field
204
Media Bandwidth Management Class Configuration
204
Figure 108 Media Bandwidth Management: Class Configuration
205
Table 59 Media Bandwidth Management: Class Configuration
205
Media Bandwidth Management Statistics
207
Table 60 Services and Port Numbers
207
Bandwidth Monitor
208
Figure 109 Media Bandwidth Management Statistics
208
Table 61 Media Bandwidth Management Statistics
208
Figure 110 Media Bandwidth Management: Monitor
209
Table 62 Media Bandwidth Management: Monitor
209
Chapter 19 Maintenance
211
Maintenance Overview
211
System Status Screen
211
Figure 111 System Status
212
Table 63 System Status
212
System Statistics
213
Figure 112 System Status: Show Statistics
214
Table 64 System Status: Show Statistics
214
DHCP Table Screen
215
Figure 113 DHCP Table
215
Table 65 DHCP Table
215
Any IP Table Screen
216
Wireless Screen
216
Association List
216
Figure 114 any IP Table
216
Table 66 any IP Table
216
Diagnostic Screens
217
Diagnostic General Screen
217
Figure 115 Association List
217
Table 67 Association List
217
Diagnostic DSL Line Screen
218
Figure 116 Diagnostic: General
218
Table 68 Diagnostic: General
218
Figure 117 Diagnostic: DSL Line
219
Table 69 Diagnostic: DSL Line
219
Firmware Screen
220
Figure 118 Firmware Upgrade
220
Table 70 Firmware Upgrade
220
Figure 119 Network Temporarily Disconnected
221
Figure 120 Error Message
221
Chapter 20 Introducing the SMT
223
SMT Introduction
223
Procedure for SMT Configuration Via Telnet
223
Entering Password
223
Prestige SMT Menu Overview
224
Navigating the SMT Interface
224
Figure 121 Login Screen
224
Figure 122 Prestige SMT Menu Overview
224
Table 71 Navigating the SMT Interface
225
Table 72 SMT Main Menu
225
System Management Terminal Interface Summary
226
Changing the System Password
226
Table 73 Main Menu Summary
226
Figure 123 Menu 23.1 Change Password
227
Chapter 21 Menu 1 General Setup
229
General Setup
229
Procedure to Configure Menu 1
229
Procedure to Configure Dynamic DNS
230
Figure 124 Menu 1 General Setup
230
Table 74 Menu 1 General Setup
230
Figure 125 Menu 1.1 Configure Dynamic DNS
231
Table 75 Menu 1.1 Configure Dynamic DNS
231
Chapter 22 Menu 2 WAN Backup Setup
233
Introduction to WAN Backup Setup
233
Configuring Dial Backup in Menu 2
233
Figure 126 Menu 2 WAN Backup Setup
233
Figure 127 Menu 2.1Traffic Redirect Setup
234
Table 76 Menu 2 WAN Backup Setup
234
Table 77 Menu 2.1Traffic Redirect Setup
234
Traffic Redirect Setup
234
Chapter 23 Menu 3 LAN Setup
237
LAN Setup
237
General Ethernet Setup
237
Figure 128 Menu 3 LAN Setup
237
Figure 129 Menu 3.1 LAN Port Filter Setup
237
Protocol Dependent Ethernet Setup
238
CP/IP Ethernet Setup and DHCP
238
Figure 130 Menu 3.2 TCP/IP and DHCP Ethernet Setup
238
Table 78 DHCP Ethernet Setup
239
Table 79 TCP/IP Ethernet Setup
239
Chapter 24 Wireless LAN Setup
241
Wireless LAN Overview
241
Wireless LAN Setup
241
Figure 131 Menu 3.5 - Wireless LAN Setup
241
Table 80 Menu 3.5 - Wireless LAN Setup
241
Wireless LAN MAC Address Filter
242
Figure 132 Menu 3.5.1 WLAN MAC Address Filtering
243
Table 81 Menu 3.5.1 WLAN MAC Address Filtering
243
Chapter 25 Internet Access
245
Internet Access Overview
245
IP Policies
245
IP Alias
245
IP Alias Setup
246
Figure 133 IP Alias Network Example
246
Figure 134 Menu 3.2 TCP/IP and DHCP Setup
246
Route IP Setup
247
Figure 135 Menu 3.2.1 IP Alias Setup
247
Table 82 Menu 3.2.1 IP Alias Setup
247
Internet Access Configuration
248
Figure 136 Menu 1 General Setup
248
Figure 137 Menu 4 Internet Access Setup
248
Table 83 Menu 4 Internet Access Setup
249
Chapter 26 Remote Node Configuration
251
Remote Node Setup Overview
251
Remote Node Setup
251
Remote Node Profile
251
Encapsulation and Multiplexing Scenarios
252
Scenario 1: One VC, Multiple Protocols
252
Scenario 2: One VC, One Protocol (IP)
252
Scenario 3: Multiple Vcs
252
Figure 138 Menu 11 Remote Node Setup
252
Figure 139 Menu 11.1 Remote Node Profile
253
Table 84 Menu 11.1 Remote Node Profile
253
Outgoing Authentication Protocol
254
Remote Node Network Layer Options
255
Figure 140 Menu 11.3 Remote Node Network Layer Options
255
Table 85 Menu 11.3 Remote Node Network Layer Options
255
My WAN Addr Sample IP Addresses
256
Remote Node Filter
257
Figure 141 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
257
Figure 142 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
257
Editing ATM Layer Options
258
VC-Based Multiplexing (Non-PPP Encapsulation)
258
LLC-Based Multiplexing or PPP Encapsulation
258
Figure 143 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
258
Figure 144 Menu 11.6 for VC-Based Multiplexing
258
Advance Setup Options
259
Figure 145 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
259
Figure 146 Menu 11.1 Remote Node Profile
259
Figure 147 Menu 11.8 Advance Setup Options
260
Table 86 Menu 11.8 Advance Setup Options
260
Advertisement
ZyXEL Communications P-660HW-D1 V2 User Manual (358 pages)
802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 11.37 MB
Table of Contents
Contents Overview
9
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
31
PART I Introduction
31
Chapter 1 Introducing the Zyxel Device
33
Overview
33
Figure 1 Protected Internet Access Applications
34
Figure 2 LAN-To-LAN Application Example
34
Table 1 ADSL Standards
34
Figure 3 Front Panel
35
Good Habits for Managing the Zyxel Device
35
Leds
35
Ways to Manage the Zyxel Device
35
Hardware Connections
36
Splitters and Microfilters
36
Table 2 Front Panel Leds
36
Figure 4 Connecting a POTS Splitter
37
Figure 5 Connecting a Microfilter
37
Figure 6 Connecting a Microfilter and Y-Connector
38
Figure 7 Zyxel Device with ISDN
38
Chapter 2 Introducing the Web Configurator
39
Accessing the Web Configurator
39
User Access
40
Administrator Access
40
Figure 8 Password Screen
40
Figure 9 User Status Screen
40
Figure 10 Change Password at Login
41
Figure 11 Select a Mode
41
Web Configurator Overview
39
Navigating the Web Configurator
42
Navigation Panel
42
Figure 12 Web Configurator: Main Screen
42
Table 3 Web Configurator Screens Summary
43
Status Screen
44
Figure 13 Status Screen
45
Table 4 Status Screen
45
Status: any IP Table
47
Status: WLAN Status
47
Figure 14 Status: any IP Table
47
Figure 15 Status: WLAN Status
47
Table 5 Status: any IP Table
47
Status: Bandwidth Status
48
Status: Packet Statistics
48
Figure 16 Status: Bandwidth Status
48
Table 6 Status: WLAN Status
48
Figure 17 Status: Packet Statistics
49
Table 7 Status: Packet Statistics
49
Changing Login Password
50
Figure 18 System General
50
Resetting the Zyxel Device
42
Using the Reset Button
42
Wizards
51
Part II: Wizards
51
Chapter 3 Wizard Setup for Internet Access
53
Figure 19 Select a Mode
53
Internet Access Wizard Setup
53
Introduction
53
Figure 20 Wizard: Welcome
54
Figure 21 Auto Detection: no DSL Connection
54
Automatic Detection
55
Manual Configuration
55
Figure 22 Auto Detection: Failed
55
Figure 23 Auto-Detection: Pppoe
55
Figure 24 Internet Access Wizard Setup: ISP Parameters
56
Table 8 Internet Access Wizard Setup: ISP Parameters
56
Figure 25 Internet Connection with Pppoe
57
Figure 26 Internet Connection with RFC 1483
57
Table 9 Internet Connection with Pppoe
57
Table 10 Internet Connection with RFC 1483
57
Figure 27 Internet Connection with ENET ENCAP
58
Table 11 Internet Connection with ENET ENCAP
58
Figure 28 Internet Connection with Pppoa
59
Figure 29 Connection Test Failed-1
59
Table 12 Internet Connection with Pppoa
59
Figure 30 Connection Test Failed-2
60
Figure 31 Connection Test Successful
60
Wireless Connection Wizard Setup
60
Figure 32 Wireless LAN Setup Wizard 1
61
Table 13 Wireless LAN Setup Wizard 1
61
Figure 33 Wireless LAN Setup Wizard 2
62
Table 14 Wireless LAN Setup Wizard 2
62
Manually Assign a WPA-PSK Key
63
Manually Assign a WEP Key
63
Figure 34 Manually Assign a WPA Key
63
Table 15 Manually Assign a WPA Key
63
Figure 35 Manually Assign a WEP Key
64
Figure 36 Wireless LAN Setup 3
64
Table 16 Manually Assign a WEP Key
64
Figure 37 Internet Access and WLAN Wizard Setup Complete
65
Chapter 4 Bandwidth Management Wizard
67
Introduction
67
Predefined Media Bandwidth Management Services
67
Table 17 Media Bandwidth Management Setup: Services
67
Bandwidth Management Wizard Setup
68
Figure 38 Select a Mode
68
Figure 39 Wizard: Welcome
69
Figure 40 Bandwidth Management Wizard: General Information
69
Table 18 Bandwidth Management Wizard: General Information
69
Figure 41 Bandwidth Management Wizard: Configuration
70
Table 19 Bandwidth Management Wizard: Configuration
70
Figure 42 Bandwidth Management Wizard: Complete
71
Network
73
Part III: Network
73
WAN Setup
75
Chapter 5 WAN Setup
75
WAN Overview
75
Encapsulation
75
Multiplexing
76
Encapsulation and Multiplexing Scenarios
76
VPI and VCI
77
IP Address Assignment
77
Nailed-Up Connection (PPP)
77
Nat
78
Metric
78
Traffic Shaping
78
ATM Traffic Classes
79
Figure 43 Example of Traffic Shaping
79
Internet Connection
80
Zero Configuration Internet Access
80
Figure 44 Internet Connection (Pppoe)
81
Table 20 Internet Connection
81
Configuring Advanced Internet Connection Setup
82
Figure 45 Advanced Internet Connection Setup
83
Table 21 Advanced Internet Connection Setup
83
Configuring more Connections
84
Figure 46 more Connections
84
More Connections Edit
85
Table 22 more Connections
85
Figure 47 more Connections Edit
86
Table 23 more Connections Edit
86
Configuring more Connections Advanced Setup
88
Figure 48 more Connections Advanced Setup
88
Table 24 more Connections Advanced Setup
88
Configuring WAN Backup
89
Figure 49 Traffic Redirect Example
89
Figure 50 Traffic Redirect LAN Setup
89
Traffic Redirect
89
Figure 51 WAN Backup Setup
90
Table 25 WAN Backup Setup
90
Chapter 6 LAN Setup
93
LAN Overview
93
Lans, Wans and the Zyxel Device
93
Figure 52 LAN and WAN IP Addresses
93
DHCP Setup
94
DNS Server Address
94
DNS Server Address Assignment
94
Lan Tcp/Ip
95
IP Address and Subnet Mask
95
RIP Setup
96
Multicast
96
Any IP
97
Figure 53 any IP Example
97
Configuring LAN IP
98
Figure 54 LAN IP
98
Configuring Advanced LAN Setup
99
Figure 55 Advanced LAN Setup
99
Table 26 LAN IP
99
Table 27 Advanced LAN Setup
99
DHCP Setup
100
Figure 56 DHCP Setup
100
LAN Client List
101
Table 28 DHCP Setup
101
LAN IP Alias
102
Figure 57 LAN Client List
102
Table 29 LAN Client List
102
Figure 58 Physical Network & Partitioned Logical Networks
103
Figure 59 LAN IP Alias
103
Table 30 LAN IP Alias
104
LAN Setup
93
Chapter 7 Wireless LAN
105
Wireless Network Overview
105
Figure 60 Example of a Wireless Network
105
Wireless Security Overview
106
Ssid
106
MAC Address Filter
106
User Authentication
106
Encryption
107
Table 31 Types of Encryption for each Type of Authentication
107
One-Touch Intelligent Security Technology (OTIST)
108
General Wireless LAN Screen
108
Figure 61 Wireless LAN: General
108
No Security
109
Table 32 Wireless LAN: General
109
WEP Encryption
110
Figure 62 Wireless: no Security
110
Table 33 Wireless no Security
110
Wpa-Psk/Wpa2-Psk
111
Figure 63 Wireless: Static WEP Encryption
111
Table 34 Wireless: Static WEP Encryption
111
Figure 64 Wireless: WPA-PSK/WPA2-PSK
112
Table 35 Wireless: WPA-PSK/WPA2-PSK
112
Wpa/Wpa2
113
Figure 65 Wireless: WPA/WPA2
114
Table 36 Wireless: WPA/WPA2
114
Wireless LAN Advanced Setup
115
Figure 66 Advanced
116
Table 37 Wireless LAN: Advanced
116
Otist
117
Enabling OTIST
117
Figure 67 OTIST
118
Table 38 OTIST
118
Wireless Client
118
Starting OTIST
119
Figure 68 Example Wireless Client OTIST Screen
119
Figure 69 Security Key
119
Figure 70 OTIST in Progress (AP)
119
Notes on OTIST
120
Figure 71 OTIST in Progress (Client)
120
Figure 72 no AP with OTIST Found
120
Figure 73 Start OTIST
120
MAC Filter
121
Figure 74 MAC Address Filter
121
Table 39 MAC Address Filter
121
WMM Qos
122
WMM Qos Example
122
WMM Qos Priorities
122
Table 40 WMM Qos Priorities
122
Services
123
Table 41 Commonly Used Services
123
Qos Screen
124
Tos (Type of Service) and WMM Qos
125
Figure 75 Wireless LAN: Qos
125
Table 42 Wireless Lan: Qos
125
Application Priority Configuration
126
Figure 76 Application Priority Configuration
126
Table 43 Application Priority Configuration
126
Chapter 8 Network Address Translation (NAT) Screens
129
Wireless LAN
105
NAT Overview
129
NAT Definitions
129
Table 44 NAT Definitions
129
What NAT Does
130
How NAT Works
130
NAT Application
130
Figure 77 How NAT Works
130
NAT Mapping Types
131
Figure 78 NAT Application with IP Alias
131
Sip Alg
132
SUA (Single User Account) Versus NAT
132
Table 45 NAT Mapping Types
132
Figure 79 NAT General
133
NAT General Setup
133
Port Forwarding
133
Table 46 NAT General
133
Default Server IP Address
134
Port Forwarding: Services and Port Numbers
134
Table 47 Services and Port Numbers
134
Configuring Servers Behind Port Forwarding (Example)
135
Configuring Port Forwarding
135
Figure 80 Multiple Servers Behind NAT Example
135
Port Forwarding Rule Edit
136
Figure 81 NAT Port Forwarding
136
Table 48 NAT Port Forwarding
136
Address Mapping
137
Figure 82 Port Forwarding Rule Setup
137
Table 49 Port Forwarding Rule Setup
137
Figure 83 Address Mapping Rules
138
Table 50 Address Mapping Rules
138
Address Mapping Rule Edit
139
Figure 84 Edit Address Mapping Rule
139
Table 51 Edit Address Mapping Rule
140
Security
141
Part IV: Security
141
Firewalls
143
Chapter 9 Firewalls
143
Firewall Overview
143
Types of Firewalls
143
Packet Filtering Firewalls
143
Application-Level Firewalls
144
Stateful Inspection Firewalls
144
Introduction to Zyxel's Firewall
144
Denial of Service Attacks
145
Denial of Service
145
Basics
145
Figure 85 Firewall Application
145
Table 52 Common IP Ports
145
Types of Dos Attacks
146
Figure 86 Three-Way Handshake
146
Figure 87 SYN Flood
147
Figure 88 Smurf Attack
147
Stateful Inspection
148
Table 53 ICMP Commands that Trigger Alerts
148
Table 54 Legal Netbios Commands
148
Table 55 Legal SMTP Commands
148
Stateful Inspection Process
149
Figure 89 Stateful Inspection
149
Stateful Inspection and the Zyxel Device
150
TCP Security
150
UDP/ICMP Security
151
Upper Layer Protocols
151
Guidelines for Enhancing Security with Your Firewall
152
Security in General
152
Packet Filtering Vs Firewall
153
Packet Filtering
153
Firewall
153
Chapter 10 Firewall Configuration
155
Access Methods
155
Firewall Policies Overview
155
Rule Logic Overview
156
Rule Checklist
156
Security Ramifications
156
Key Fields for Configuring Rules
157
Connection Direction
157
LAN to WAN Rules
158
Alerts
158
Figure 90 Firewall: General
158
General Firewall Policy
158
Firewall Rules Summary
159
Table 56 Firewall: General
159
Figure 91 Firewall Rules
160
Table 57 Firewall Rules
160
Configuring Firewall Rules
161
Figure 92 Firewall: Edit Rule
162
Table 58 Firewall: Edit Rule
163
Customized Services
164
Configuring a Customized Service
164
Figure 93 Firewall: Customized Services
164
Table 59 Customized Services
164
Example Firewall Rule
165
Figure 94 Firewall: Configure Customized Services
165
Table 60 Firewall: Configure Customized Services
165
Figure 95 Firewall Example: Rules
166
Figure 96 Edit Custom Port Example
166
Figure 97 Firewall Example: Edit Rule: Destination Address
167
Figure 98 Firewall Example: Edit Rule: Select Customized Services
168
Figure 99 Firewall Example: Rules: Myservice
169
Predefined Services
169
Table 61 Predefined Services
169
Anti-Probing
171
Figure 100 Firewall: Anti Probing
171
Dos Thresholds
172
Threshold Values
172
Table 62 Firewall: Anti Probing
172
Half-Open Sessions
173
Configuring Firewall Thresholds
173
Figure 101 Firewall: Threshold
174
Table 63 Firewall: Threshold
174
Chapter 11 Content Filtering
177
Content Filtering Overview
177
Configuring Keyword Blocking
177
Figure 102 Content Filter: Keyword
177
Configuring the Schedule
178
Figure 103 Content Filter: Schedule
178
Table 64 Content Filter: Keyword
178
Configuring Trusted Computers
179
Figure 104 Content Filter: Trusted
179
Table 65 Content Filter: Schedule
179
Table 66 Content Filter: Trusted
179
Content Filtering
177
Advanced
181
Part V: Advanced
181
Static Route
183
Chapter 12 Static Route
183
Configuring Static Route
183
Figure 105 Example of Static Routing Topology
183
Static Route Edit
184
Figure 106 Static Route
184
Table 67 Static Route
184
Figure 107 Static Route Edit
185
Table 68 Static Route Edit
185
Bandwidth Management
187
Chapter 13 Bandwidth Management
187
Bandwidth Management Overview
187
Application-Based Bandwidth Management
187
Subnet-Based Bandwidth Management
187
Application and Subnet-Based Bandwidth Management
188
Scheduler
188
Priority-Based Scheduler
188
Figure 108 Subnet-Based Bandwidth Management Example
188
Table 69 Application and Subnet-Based Bandwidth Management Example
188
Fairness-Based Scheduler
189
Maximize Bandwidth Usage
189
Reserving Bandwidth for Non-Bandwidth Class Traffic
189
Maximize Bandwidth Usage Example
189
Table 70 Maximize Bandwidth Usage Example
189
Table 71 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
190
Table 72 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
190
Bandwidth Management Priorities
191
Over Allotment of Bandwidth
191
Configuring Summary
191
Table 73 Bandwidth Management Priorities
191
Table 74 over Allotment of Bandwidth Example
191
Bandwidth Management Rule Setup
192
Figure 109 Bandwidth Management: Summary
192
Table 75 Media Bandwidth Management: Summary
192
Figure 110 Bandwidth Management: Rule Setup
193
Table 76 Bandwidth Management: Rule Setup
193
Diffserv
194
DSCP and Per-Hop Behavior
194
Rule Configuration
194
Figure 111 Diffserv: Differentiated Service Field
194
Table 77 Sub-Classes of AF Services
194
Figure 112 Bandwidth Management Rule Configuration
195
Table 78 Bandwidth Management Rule Configuration
195
Bandwidth Monitor
197
Table 79 Services and Port Numbers
197
Figure 113 Bandwidth Management: Monitor
198
Table 80 Bandwidth Management Monitor
198
Chapter 14 Dynamic DNS Setup
199
Dynamic DNS Overview
199
DYNDNS Wildcard
199
Configuring Dynamic DNS
199
Figure 114 Dynamic DNS
200
Table 81 Dynamic DNS
200
Chapter 15 Remote Management Configuration
203
Remote Management Overview
203
Remote Management Limitations
204
Remote Management and NAT
204
System Timeout
204
Www
204
Figure 115 Remote Management: WWW
204
Telnet
205
Configuring Telnet
205
Figure 116 Telnet Configuration on a TCP/IP Network
205
Table 82 Remote Management: WWW
205
Telnet Login
206
Figure 117 Remote Management: Telnet
206
Table 83 Remote Management: Telnet
206
Configuring FTP
207
Snmp
207
Figure 118 Remote Management: FTP
207
Table 84 Remote Management: FTP
207
Figure 119 SNMP Management Model
208
Supported Mibs
209
SNMP Traps
209
Configuring SNMP
209
Figure 120 Remote Management: SNMP
209
Table 85 SNMP Traps
209
Configuring DNS
210
Table 86 Remote Management: SNMP
210
Configuring ICMP
211
Figure 121 Remote Management: DNS
211
Table 87 Remote Management: DNS
211
Figure 122 Remote Management: ICMP
212
Table 88 Remote Management: ICMP
212
Chapter 16 Universal Plug-And-Play (Upnp)
213
Introducing Universal Plug and Play
213
How Do I Know if I'M Using Upnp
213
NAT Traversal
213
Cautions with Upnp
213
Upnp and Zyxel
214
Configuring Upnp
214
Figure 123 Configuring Upnp
214
Table 89 Configuring Upnp
214
Installing Upnp in Windows Example
215
Installing Upnp in Windows Me
215
Figure 124 Add/Remove Programs: Windows Setup: Communication
215
Installing Upnp in Windows XP
216
Figure 125 Add/Remove Programs: Windows Setup: Communication: Components
216
Figure 126 Network Connections
216
Using Upnp in Windows XP Example
217
Figure 127 Windows Optional Networking Components Wizard
217
Figure 128 Networking Services
217
Auto-Discover Your Upnp-Enabled Network Device
218
Figure 129 Network Connections
218
Figure 130 Internet Connection Properties
219
Figure 131 Internet Connection Properties: Advanced Settings
219
Figure 132 Internet Connection Properties: Advanced Settings: Add
220
Figure 133 System Tray Icon
220
Web Configurator Easy Access
221
Figure 134 Internet Connection Status
221
Figure 135 Network Connections
222
Figure 136 Network Connections: My Network Places
223
Figure 137 Network Connections: My Network Places: Properties: Example
223
Dynamic DNS Setup
199
Maintenance and Troubleshooting
225
Part VI: Maintenance and Troubleshooting
225
System
227
Chapter 17 System
227
General Setup
227
General Setup and System Name
227
Figure 138 System General Setup
228
Table 90 System General Setup
228
Figure 139 System Time Setting
229
Time Setting
229
Table 91 System Time Setting
230
Chapter 18 Logs
233
Logs Overview
233
Alerts and Logs
233
Viewing the Logs
233
Configuring Log Settings
234
Figure 140 View Log
234
Table 92 View Log
234
Figure 141 Log Settings
235
Table 93 Log Settings
235
Example E-Mail Log
236
Log Descriptions
237
Figure 142 E-Mail Log Example
237
Table 94 System Maintenance Logs
237
Table 95 System Error Logs
238
Table 96 Access Control Logs
238
Table 97 TCP Reset Logs
239
Table 98 Packet Filter Logs
239
Table 99 ICMP Logs
240
Table 100 CDR Logs
240
Table 101 PPP Logs
240
Table 102 Upnp Logs
241
Table 103 Content Filtering Logs
241
Table 104 Attack Logs
242
Table 105 Ipsec Logs
242
Table 106 IKE Logs
243
Table 107 PKI Logs
246
Table 108 Certificate Path Verification Failure Reason Codes
247
Table 109 ACL Setting Notes
247
Table 110 ICMP Notes
248
Table 111 Syslog Logs
249
Table 112 RFC-2408 ISAKMP Payload Types
249
Logs
233
Chapter 19 Tools
251
Firmware Upgrade
251
Figure 143 Firmware
251
Figure 144 Firmware Upload in Progress
252
Figure 145 Network Temporarily Disconnected
252
Table 113 Firmware Upgrade
252
Configuration Screen
253
Backup Configuration
253
Figure 146 Error Message
253
Figure 147 Configuration
253
Restore Configuration
254
Figure 148 Configuration Restore Successful
254
Figure 149 Temporarily Disconnected
254
Table 114 Maintenance Restore Configuration
254
Back to Factory Defaults
255
Restart
255
Figure 150 Configuration Restore Error
255
Figure 151 Restart Screen
255
Tools
251
Chapter 20 Diagnostic
257
General Diagnostic
257
DSL Line Diagnostic
257
Figure 152 Diagnostic: General
257
Table 115 Diagnostic: General
257
Figure 153 Diagnostic: DSL Line
258
Table 116 Diagnostic: DSL Line
258
Diagnostic
257
Chapter 21 Troubleshooting
259
Power, Hardware Connections, and Leds
259
Zyxel Device Access and Login
260
Internet Access
261
Troubleshooting
259
Appendices and Index
263
Part VII: Appendices and Index
263
Appendix A Product Specifications and Wall Mounting
265
Table 117 Hardware Specifications
265
Table 118 Firmware Specifications
265
Product Specifications
265
Table 119 Wireless Firmware Specifications
267
Table 120 Standards Supported
267
Figure 154 Wall-Mounting Example
269
Figure 155 Masonry Plug and M4 Tap Screw
270
Appendix B Wireless Lans
271
Figure 156 Peer-To-Peer Communication in an Ad-Hoc Network
271
Wireless Lan Topologies
271
Figure 157 Basic Service Set
272
Figure 158 Infrastructure WLAN
273
Figure 159 RTS/CTS
274
Fragmentation Threshold
274
Table 121 IEEE 802.11G
275
Preamble Type
275
Table 122 Wireless Security Levels
276
Types of Radius Messages
277
Types of Eap Authentication
277
Table 123 Comparison of EAP Authentication Types
279
Dynamic Wep Key Exchange
279
Wpa and Wpa2
279
Wireless Client Wpa Supplicants
281
Figure 160 WPA(2) with RADIUS Application Example
281
Figure 161 WPA(2)-PSK Authentication
282
Table 124 Wireless Security Relational Matrix
282
Security Parameters Summary
282
Antenna Characteristics
283
Radiation Pattern
283
Antenna Gain
283
Types of Antennas for Wlan
283
Positioning Antennas
284
Appendix C Setting up Your Computer's IP Address
285
Figure 162 Windows 95/98/Me: Network: Configuration
286
Installing Components
286
Figure 163 Windows 95/98/Me: TCP/IP Properties: IP Address
287
Figure 164 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
288
Verifying Settings
288
Figure 165 Windows XP: Start Menu
289
Figure 166 Windows XP: Control Panel
289
Figure 167 Windows XP: Control Panel: Network Connections: Properties
290
Figure 168 Windows XP: Local Area Connection Properties
290
Figure 169 Windows XP: Internet Protocol (TCP/IP) Properties
291
Figure 170 Windows XP: Advanced TCP/IP Properties
292
Figure 171 Windows XP: Internet Protocol (TCP/IP) Properties
293
Figure 172 Macintosh os 8/9: Apple Menu
294
Figure 173 Macintosh os 8/9: TCP/IP
294
Figure 174 Macintosh os X: Apple Menu
295
Macintosh os X
295
Figure 175 Macintosh os X: Network
296
Figure 176 Red hat 9.0: KDE: Network Configuration: Devices
297
Figure 177 Red hat 9.0: KDE: Ethernet Device: General
297
Figure 178 Red hat 9.0: KDE: Network Configuration: DNS
298
Figure 179 Red hat 9.0: KDE: Network Configuration: Activate
298
Using Configuration Files
298
Figure 180 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
299
Figure 181 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
299
Figure 182 Red hat 9.0: DNS Settings in Resolv.conf
299
Figure 183 Red hat 9.0: Restart Ethernet Card
299
Figure 184 Red hat 9.0: Checking TCP/IP Properties
300
Appendix D IP Addresses and Subnetting
301
Introduction to Ip Addresses
301
Figure 185 Network Number and Host ID
302
Table 125 IP Address Network Number and Host ID Example
302
Subnet Masks
302
Table 126 Subnet Masks
303
Table 127 Maximum Host Numbers
303
Table 128 Alternative Subnet Mask Notation
303
Figure 186 Subnetting Example: before Subnetting
304
Figure 187 Subnetting Example: after Subnetting
305
Table 129 Subnet 1
305
Table 130 Subnet 2
306
Table 131 Subnet 3
306
Table 132 Subnet 4
306
Table 133 Eight Subnets
306
Table 134 24-Bit Network Number Subnet Planning
307
Table 135 16-Bit Network Number Subnet Planning
307
Configuring Ip Addresses
308
Private Ip Addresses
308
Figure 188 Conflicting Computer IP Addresses Example
309
Figure 189 Conflicting Computer IP Addresses Example
309
Figure 190 Conflicting Computer and Router IP Addresses Example
310
Appendix E Firewall Commands
311
Table 136 Firewall Commands
311
Appendix F Internal SPTGEN
317
Figure 191 Configuration Text File Format: Column Descriptions
317
The Configuration Text File Format
317
Figure 192 Invalid Parameter Entered: Command Line Example
318
Figure 193 Valid Parameter Entered: Command Line Example
318
Internal Sptgen Ftp Download Example
318
Figure 194 Internal SPTGEN FTP Download Example
319
Figure 195 Internal SPTGEN FTP Upload Example
319
Table 137 Abbreviations Used in the Example Internal SPTGEN Screens Table
320
Table 138 Menu 1 General Setup
320
Table 139 Menu 3
320
Table 140 Menu 4 Internet Access Setup
322
Table 141 Menu 12
324
Table 142 Menu 15 SUA Server Setup
324
Table 143 Menu 21.1 Filter Set #1
326
Table 144 Menu 21.1 Filer Set #2
327
Table 145 Menu 23 System Menus
329
Table 146 Menu 24.11 Remote Management Control
330
Table 147 Command Examples
331
Appendix G Pop-Up Windows, Javascripts and Java Permissions
333
Figure 196 Pop-Up Blocker
333
Internet Explorer Pop-Up Blockers
333
Figure 197 Internet Options: Privacy
334
Figure 198 Internet Options: Privacy
335
Figure 199 Pop-Up Blocker Settings
335
Figure 200 Internet Options: Security
336
Figure 201 Security Settings - Java Scripting
337
Figure 202 Security Settings - Java
337
Java Permissions
337
Figure 203 Java (Sun)
338
Appendix H Netbios Filter Commands
339
Display Netbios Filter Settings
339
Table 148 Netbios Filter Default Settings
340
Netbios Filter Configuration
340
Appendix I Triangle Route
341
Figure 204 Ideal Setup
341
The Ideal Setup
341
Figure 205 "Triangle Route" Problem
342
Figure 206 IP Alias
342
Appendix J Legal Information
343
Zyxel Limited Warranty
345
Appendix K Customer Support
347
ZyXEL Communications P-660HW-D1 V2 Quick Start Manual (11 pages)
802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 1.19 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
3
Internet and Wireless Setup Wizard
4
Configuring Your Wireless Settings
6
Troubleshooting
10
Enabling Otist
10
Advertisement
ZyXEL Communications P-660HW-D1 V2 Install Manual (2 pages)
P-660HW Series 802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.24 MB
Advertisement
Related Products
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HW-DX V2 - V3.40
ZyXEL Communications P-660HW-D3 V2
ZyXEL Communications P-660HW-DX
ZyXEL Communications P-660HW-T - VERSION 3.40
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P660HW3
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications P-660HW-T - V2
ZyXEL Communications P-660HW-T3 V2
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL