Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
P-662H-61
ZyXEL Communications P-662H-61 Manuals
Manuals and User Guides for ZyXEL Communications P-662H-61. We have
5
ZyXEL Communications P-662H-61 manuals available for free PDF download: User Manual, Upgrade Information, Quick Start Manual, Specifications, Declaration Of Conformity
ZyXEL Communications P-662H-61 User Manual (492 pages)
P-662H Series 802.11g ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 11.82 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
23
List of Tables
31
Introduction and Wizards
37
Part I: Introduction and Wizards
37
Chapter 1 Getting to Know Your Zyxel Device
39
Applications of the Zyxel Device
39
Introducing the Zyxel Device
39
Figure 1 Zyxel Device Internet Access Application
40
Figure 2 Zyxel Device LAN-To-LAN Application Example
40
Firewall for Secure Broadband Internet Access
40
Front Panel Leds
41
Figure 3 Firewall Application
41
Figure 4 P-662H Front Panel
41
Figure 5 P-662HW Front Panel
41
Table 1 Front Panel Leds
41
Chapter 2 Introducing the Web Configurator
43
Accessing the Web Configurator
43
Web Configurator Overview
43
Figure 6 Password Screen
44
Figure 7 Change Password at Login
45
Figure 8 Replace Factory Default Certificate
45
Figure 9 Select a Mode
46
Figure 10 Web Configurator: Main Screen
47
Navigating the Web Configurator
47
Navigation Panel
47
Table 2 Web Configurator Screens Summary
47
Status Screen
50
Figure 11 Status Screen
51
Table 3 Status Screen
51
Figure 12 Status: any IP Table
53
Status: any IP Table
53
Status: WLAN Status
53
Table 4 Status: any IP Table
53
Status: Bandwidth Status
54
Status: VPN Status
54
Figure 13 Status: WLAN Status
54
Figure 14 Status: Bandwidth Status
54
Table 5 Status: WLAN Status
54
Status: Packet Statistics
55
Resetting the Zyxel Device
46
Using the Reset Button
46
Figure 15 Status: VPN Status
55
Table 6 Status: VPN Status
55
Figure 16 Status: Packet Statistics
56
Table 7 Status: Packet Statistics
56
Changing Login Password
57
Figure 17 System General
57
Table 8 System General: Password
57
Chapter 3 Wizard Setup for Internet Access
59
Figure 18 Select a Mode
59
Internet Access Wizard Setup
59
Introduction
59
Figure 19 Wizard: Welcome
60
Figure 20 Auto Detection: no DSL Connection
60
Automatic Detection
61
Figure 21 Auto Detection: Failed
61
Figure 22 Auto-Detection: Pppoe
61
Figure 23 Internet Access Wizard Setup: ISP Parameters
62
Table 9 Internet Access Wizard Setup: ISP Parameters
62
Figure 24 Internet Connection with Pppoe
63
Figure 25 Internet Connection with RFC 1483
63
Table 10 Internet Connection with Pppoe
63
Table 11 Internet Connection with RFC 1483
63
Figure 29 Connection Test Failed-2
66
Figure 30 Connection Test Successful
66
Figure 31 Wireless LAN Setup Wizard 1
67
Table 14 Wireless LAN Setup Wizard 1
67
Figure 32 Wireless LAN Setup Wizard 2
68
Table 15 Wireless LAN Setup Wizard 2
68
Automatically Assign a WPA Key
69
Manually Assign a WEP Key
69
Manually Assign a WPA-PSK Key
69
Manual Configuration
61
Figure 26 Internet Connection with ENET ENCAP
64
Table 12 Internet Connection with ENET ENCAP
64
Figure 27 Internet Connection with Pppoa
65
Figure 28 Connection Test Failed-1
65
Table 13 Internet Connection with Pppoa
65
Wireless Connection Wizard Setup
66
Figure 33 Manually Assign a WPA Key
69
Table 16 Manually Assign a WPA Key
69
Figure 34 Manually Assign a WEP Key
70
Figure 35 Wireless LAN Setup 3
70
Table 17 Manually Assign a WEP Key
70
Figure 36 Internet Access and WLAN Wizard Setup Complete
71
Chapter 4 Bandwidth Management Wizard
73
Introduction
73
Predefined Media Bandwidth Management Services
73
Table 18 Media Bandwidth Management Setup: Services
73
Bandwidth Management Wizard Setup
74
Figure 37 Select a Mode
74
Figure 38 Wizard: Welcome
75
Figure 39 Bandwidth Management Wizard: General Information
75
Table 19 Bandwidth Management Wizard: General Information
75
Figure 40 Bandwidth Management Wizard: Configuration
76
Table 20 Bandwidth Management Wizard: Configuration
76
Figure 41 Bandwidth Management Wizard: Complete
77
Network
79
Figure 79 DMZ
79
Part II: Network
79
WAN Setup
81
Figure 43 Internet Connection (Pppoe)
86
Table 21 Internet Connection
86
Configuring Advanced Internet Connection
87
Figure 44 Advanced Internet Connection
88
Table 22 Advanced Internet Connection
88
Configuring more Connections
89
Figure 45 more Connections
90
More Connections Edit
90
Table 23 more Connections
90
Figure 46 more Connections Edit
91
Table 24 more Connections Edit
91
Configuring more Connections Advanced Setup
92
Figure 47 more Connections Advanced Setup
93
Table 25 more Connections Advanced Setup
93
Configuring WAN Backup
94
Figure 48 Traffic Redirect Example
94
Figure 49 Traffic Redirect LAN Setup
94
Traffic Redirect
94
Figure 50 WAN Backup Setup
95
Figure 51 WAN Backup Advanced Setup
97
Table 27 WAN Backup Advanced Setup
97
Dial Backup Modem Setup
99
Figure 52 WAN Dial Backup Modem Setup
99
Table 28 WAN Dial Backup Modem Setup
100
LAN Overview
101
LAN Setup
101
Lans, Wans and the Zyxel Device
101
DHCP Setup
102
DNS Server Address
102
DNS Server Address Assignment
102
IP Address and Subnet Mask
103
Lan Tcp/Ip
103
Multicast
104
RIP Setup
104
Any IP
105
Configuring LAN IP
106
Figure 56 Advanced LAN Setup
107
Table 29 LAN IP
107
Table 30 Advanced LAN Setup
107
DHCP Setup
108
Figure 57 DHCP Setup
108
LAN Client List
109
Table 31 DHCP Setup
109
Figure 58 LAN Client List
110
LAN IP Alias
110
Table 32 LAN Client List
110
Figure 59 Physical Network & Partitioned Logical Networks
111
Figure 60 LAN IP Alias
111
Table 33 LAN IP Alias
112
Wireless Network Overview
113
MAC Address Filter
114
Ssid
114
User Authentication
114
Wireless Security Overview
114
Encryption
115
Additional Wireless Terms
116
One-Touch Intelligent Security Technology (OTIST)
116
Quality of Service (Qos)
116
Wireless Performance Overview
116
General Wireless LAN Screen
117
No Security
118
Figure 63 Wireless: no Security
119
Table 37 Wireless no Security
119
Figure 64 Wireless: Static WEP Encryption
120
Table 38 Wireless: Static WEP Encryption
120
Figure 65 Wireless: WPA(2)-PSK
121
Table 40 Wireless: WPA(2)
123
Table 41 Wireless LAN: Advanced
124
Wireless LAN Advanced Setup
124
Enabling OTIST
125
Otist
125
Table 42 OTIST
126
Starting OTIST
127
Figure 71 OTIST in Progress (AP)
128
Figure 72 OTIST in Progress (Client)
128
Figure 73 no AP with OTIST Found
128
Figure 74 Start OTIST
128
Figure 75 MAC Address Filter
129
MAC Filter
129
Table 43 MAC Address Filter
129
Table 44 WMM Qos Priorities
130
WMM Qos
130
WMM Qos Example
130
WMM Qos Priorities
130
Figure 76 Wireless LAN: Qos
131
Qos Screen
131
Services
131
Table 45 Wireless LAN: Qos
131
Tos (Type of Service) and WMM Qos
131
Application Priority Configuration
132
Figure 77 Application Priority Configuration
132
Table 46 Application Priority Configuration
132
Multiple SSID (P-662HW-D Models Only)
133
Figure 78 Multiple SSID Network Example
134
Multiple SSID Commands
134
Table 47 Multiple SSID Commands
134
Multiple SSID Example
135
Table 48 Multiple SSID Example Configuration
135
Dmz
137
Table 26 WAN Backup Setup
95
WAN Backup Advanced Screen
96
Wpa(2)-Psk
120
Table 39 Wireless: WPA(2)-PSK
121
WPA(2) Authentication Screen
122
Wireless LAN
113
Chapter 5 WAN Setup
81
Encapsulation
81
WAN Overview
81
IP Address Assignment
82
Multiplexing
82
VPI and VCI
82
Metric
83
Nailed-Up Connection (PPP)
83
Nat
83
Figure 42 Example of Traffic Shaping
84
Traffic Shaping
84
ATM Traffic Classes
85
Zero Configuration Internet Access
85
Internet Connection
86
Figure 80 DMZ Public Address Example
139
Table 49 DMZ
139
Chapter 6 LAN Setup
101
Figure 53 LAN and WAN IP Addresses
101
Figure 54 any IP Example
105
Figure 55 LAN IP
106
Configuring Advanced LAN Setup
107
Figure 66 Wireless: WPA(2)
122
Figure 67 Advanced
124
Figure 68 OTIST
126
Figure 69 Example Wireless Client OTIST Screen
127
Figure 70 Security Key
127
Notes on OTIST
128
Chapter 7 Wireless LAN
113
Figure 61 Example of a Wireless Network
113
Table 34 Types of Encryption for each Type of Authentication
115
Table 35 Additional Wireless Terms
116
Figure 62 Wireless LAN: General
117
Table 36 Wireless LAN: General
118
WEP Encryption Screen
119
Chapter 8 DMZ
137
Configuring DMZ
137
Introduction
137
DMZ Public IP Address Example
139
Chapter 9 Network Address Translation (NAT) Screens
141
NAT Definitions
141
NAT Overview
141
Table 50 NAT Definitions
141
Figure 81 How NAT Works
142
How NAT Works
142
NAT Application
142
What NAT Does
142
Figure 82 NAT Application with IP Alias
143
NAT General Setup
144
SUA (Single User Account) Versus NAT
144
Table 51 NAT Mapping Types
144
Figure 83 NAT General
145
Port Forwarding
145
Table 52 NAT General
145
Figure 84 Multiple Servers Behind NAT Example
146
Configuring Port Forwarding
147
Figure 85 NAT Port Forwarding
147
Figure 86 Port Forwarding Rule Setup
148
Table 54 Port Forwarding Rule Setup
148
Address Mapping
149
Figure 87 Address Mapping Rules
149
Address Mapping Rule Edit
150
Figure 88 Edit Address Mapping Rule
150
Table 55 Address Mapping Rules
150
Trigger Port
151
NAT Mapping Types
143
Table 53 NAT Port Forwarding
147
Port Forwarding Rule Edit
148
Configuring Servers Behind Port Forwarding (Example)
146
Default Server IP Address
146
Port Forwarding: Services and Port Numbers
146
Table 56 Edit Address Mapping Rule
151
Figure 89 Trigger Port
152
Table 57 Trigger Port
152
Edit Trigger Port
153
Figure 90 Trigger Port Edit
153
Table 58 Trigger Port Edit
153
Security
155
Part III: Security
155
Chapter 10 Firewalls
157
Firewall Overview
157
Firewalls
157
Packet Filtering Firewalls
157
Types of Firewalls
157
Application-Level Firewalls
158
Introduction to Zyxel's Firewall
158
Stateful Inspection Firewalls
158
Basics
159
Denial of Service
159
Denial of Service Attacks
159
Figure 91 Firewall Application
159
Table 59 Common IP Ports
159
Figure 92 Three-Way Handshake
160
Table 60 ICMP Commands that Trigger Alerts
162
Table 61 Legal Netbios Commands
162
Table 62 Legal SMTP Commands
162
Figure 95 Stateful Inspection
163
Stateful Inspection and the Zyxel Device
164
TCP Security
164
UDP/ICMP Security
165
Upper Layer Protocols
165
Guidelines for Enhancing Security with Your Firewall
166
Security in General
166
Firewall
167
Packet Filtering
167
Packet Filtering Vs Firewall
167
Stateful Inspection Process
163
Types of Dos Attacks
160
Figure 93 SYN Flood
161
Figure 94 Smurf Attack
161
Stateful Inspection
162
Chapter 11 Firewall Configuration
169
Access Methods
169
Firewall Policies Overview
169
Rule Logic Overview
170
Security Ramifications
170
Connection Direction
171
Key Fields for Configuring Rules
171
Alerts
172
Figure 96 Firewall: General
172
General Firewall Policy
172
LAN to WAN Rules
172
Firewall Rules Summary
173
Table 63 Firewall: General
173
Figure 97 Firewall Rules
174
Table 64 Firewall Rules
174
Configuring Firewall Rules
175
Figure 98 Firewall: Edit Rule
176
Figure 99 Firewall: Customized Services
178
Table 66 Customized Services
178
Example Firewall Rule
179
Figure 100 Firewall: Configure Customized Services
179
Table 67 Firewall: Configure Customized Services
179
Figure 101 Firewall Example: Rules
180
Figure 102 Edit Custom Port Example
180
Figure 103 Firewall Example: Edit Rule: Destination Address
181
Figure 105 Firewall Example: Rules: Myservice
183
Table 68 Predefined Services
183
Anti-Probing
185
Figure 106 Firewall: Anti Probing
185
Dos Thresholds
186
Table 69 Firewall: Anti Probing
186
Threshold Values
186
Configuring Firewall Thresholds
187
Half-Open Sessions
187
Figure 107 Firewall: Threshold
188
Table 70 Firewall: Threshold
188
Configuring Keyword Blocking
191
Content Filtering
191
Content Filtering Overview
191
Figure 109 Content Filter: Schedule
192
Table 71 Content Filter: Keyword
192
Configuring Trusted Computers
193
Table 65 Firewall: Edit Rule
177
Configuring a Customized Service
178
Customized Services
178
Chapter 12 Content Filtering
191
Figure 104 Firewall Example: Edit Rule: Select Customized Services
182
Predefined Services
183
Figure 108 Content Filter: Keyword
191
Configuring the Schedule
192
Figure 110 Content Filter: Trusted
193
Table 72 Content Filter: Schedule
193
Table 73 Content Filter: Trusted
193
Chapter 13 Content Access Control
195
Configuration Steps
195
Content Access Control Overview
195
Content Access Control WLAN Application
195
Figure 111 Content Access Control with WLAN Application
195
Activating CAC and Creating User Groups
196
Configuring Time Schedule
197
Table 75 Control Access Control: General: Time Scheduling
198
Figure 114 Content Access Control: General: Services
199
Figure 115 Content Access Control: General: Web Site Filter
200
Table 77 Content Access Control: General: Web Site Filter
201
Figure 116 Content Access Control: General: Diagnose
205
Table 78 Content Access Control: General: Diagnostic
205
Testing Web Site Access Privileges
205
Figure 117 Content Access Control: User Profiles
206
Table 79 Content Access Control: User Profiles
206
User Account Setup
206
Figure 118 Content Access Control: Online Status
207
Table 80 Content Access Control: Online Status
207
User Online Status
207
Figure 119 Content Access Control: Trusted Device
208
Table 81 Content Access Control: Trusted Device
208
Trusted Devices
208
Trusted-External Websites
208
Content Access Control Logins
209
Figure 120 Content Access Control: Trusted-External Website
209
Table 82 Content Access Control: Trusted-External Website
209
User Login
209
Administrator Login
210
Figure 121 Content Access Control: User Login Screen
210
Figure 122 Content Access Control: User Logout Screen
210
Register
211
Registration
212
Table 83 Security > Register
212
Service
213
Introduction to Ipsec
215
Encapsulation
217
Ipsec Algorithms
217
Key Management
217
ESP (Encapsulating Security Payload) Protocol
221
Ipsec Algorithms
221
VPN Screens
221
Vpn/Ipsec Overview
221
My IP Address
222
Secure Gateway Address
222
Figure 128 Ipsec Summary Fields
223
Figure 129 VPN Setup
224
Table 87 VPN Setup
224
Figure 130 NAT Router between Ipsec Routers
225
Keep Alive
225
VPN, NAT, and NAT Traversal
225
Remote DNS Server
226
Table 88 VPN and NAT
226
Figure 131 VPN Host Using Intranet DNS Server Example
227
ID Type and Content
227
Table 89 Local ID Type and Content Fields
227
ID Type and Content Examples
228
Table 90 Peer ID Type and Content Fields
228
Table 91 Matching ID Type and Content Configuration Example
228
Table 92 Mismatching ID Type and Content Configuration Example
228
Editing VPN Policies
229
Figure 132 Edit VPN Policies
229
Pre-Shared Key
229
Table 93 Edit VPN Policies
230
Figure 133 Two Phases to Set up the Ipsec SA
233
IKE Phases
233
Negotiation Mode
234
Configuring Advanced IKE Settings
235
Diffie-Hellman (DH) Key Groups
235
Perfect Forward Secrecy (PFS)
235
Figure 134 Advanced VPN Policies
236
Table 94 Advanced VPN Policies
236
Configuring Manual Key
238
Manual Key Setup
238
Security Parameter Index (SPI)
238
Figure 135 VPN: Manual Key
239
Table 95 VPN: Manual Key
239
Viewing SA Monitor
241
Configuring Global Setting
242
Figure 136 VPN: SA Monitor
242
Figure 137 VPN: Global Setting
242
Table 96 VPN: SA Monitor
242
Figure 138 Telecommuters Sharing One VPN Rule Example
243
Table 97 VPN: Global Setting
243
Telecommuter Vpn/Ipsec Examples
243
Telecommuters Sharing One VPN Rule Example
243
Figure 139 Telecommuters Using Unique VPN Rules Example
244
Table 98 Telecommuters Sharing One VPN Rule Example
244
Telecommuters Using Unique VPN Rules Example
244
Table 99 Telecommuters Using Unique VPN Rules Example
245
VPN and Remote Management
245
Certificates
247
Certificates Overview
247
Figure 140 Certificate Configuration Overview
248
Figure 141 My Certificates
249
Table 100 My Certificates
249
My Certificate Import
250
Certificate File Formats
251
Figure 142 My Certificate Import
251
Table 101 My Certificate Import
251
Figure 143 My Certificate Create
252
My Certificate Create
252
Table 102 My Certificate Create
252
My Certificate Details
254
Figure 144 My Certificate Details
255
Table 103 My Certificate Details
256
Trusted cas
257
Figure 145 Trusted cas
258
Figure 146 Trusted CA Import
259
Table 105 Trusted CA Import
259
Figure 147 Trusted CA Details
260
Trusted CA Details
260
Table 106 Trusted CA Details
261
Trusted Remote Hosts
262
Figure 148 Trusted Remote Hosts
263
Table 107 Trusted Remote Hosts
263
Figure 149 Remote Host Certificates
264
Figure 150 Certificate Details
264
Trusted Remote Host Certificate Fingerprints
264
Verifying a Trusted Remote Host's Certificate
264
Trusted Remote Host Certificate Details
265
Trusted Remote Hosts Import
265
Figure 112 Content Access Control: General
196
Table 74 Content Access Control: General
196
Figure 113 Control Access Control: General: Time Scheduling
197
Configuring Services
198
Chapter 14 Register
211
Table 76 Content Access Control: General: Services
199
Configuring Web Site Filters
200
Myzyxel.com Overview
211
Subscription Services Available on the Zyxel Device
211
Figure 123 Security > Register
212
Figure 124 Security > Register > Service
213
Table 84 Security > Register > Service
214
Chapter 15 Introduction to Ipsec
215
Ipsec
215
Other Terminology
215
Security Association
215
VPN Overview
215
Figure 125 Encryption and Decryption
216
Ipsec Architecture
216
VPN Applications
216
Figure 126 Ipsec Architecture
217
Figure 127 Transport and Tunnel Mode Ipsec Encapsulation
218
Ipsec and NAT
218
Transport Mode
218
Tunnel Mode
218
Table 85 VPN and NAT
219
AH (Authentication Header) Protocol
221
Chapter 16 VPN Screens
221
Table 86 AH and ESP
222
Dynamic Secure Gateway Address
223
VPN Setup Screen
223
Table 104 Trusted cas
258
Trusted CA Import
259
Figure 151 Trusted Remote Host Import
265
Table 108 Trusted Remote Host Import
265
Figure 152 Trusted Remote Host Details
266
Table 109 Trusted Remote Host Details
267
Directory Servers
268
Directory Server Add or Edit
269
Figure 153 Directory Servers
269
Table 110 Directory Servers
269
Figure 154 Directory Server Add
270
Table 111 Directory Server Add
270
Chapter 17 Certificates
247
Advantages of Certificates
248
Configuration Summary
248
My Certificates
248
Self-Signed Certificates
248
Part IV: Advanced
271
Static Route
273
Static Route Overview
273
Figure 156 Static Route
274
Table 112 Static Route
274
Figure 157 Static Route Edit
275
Static Route Edit
275
Table 113 Static Route Edit
275
Application-Based Bandwidth Management
277
Bandwidth Management Overview
277
Table 115 Maximize Bandwidth Usage Example
279
Figure 159 Bandwidth Management: Summary
281
Table 118 Bandwidth Management Priorities
281
Figure 160 Bandwidth Management: Rule Setup
282
Figure 161 Bandwidth Management Rule Configuration
284
Table 121 Bandwidth Management Rule Configuration
284
Bandwidth Monitor
286
Figure 162 Bandwidth Management: Monitor
286
Dynamic DNS Setup
287
Bandwidth Management
277
Table 119 Media Bandwidth Management: Summary
281
Bandwidth Management Rule Setup
282
Table 116 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
280
Table 117 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
280
Bandwidth Management Priorities
281
Configuring Summary
281
Advanced
271
Chapter 18 Static Route
273
Figure 155 Example of Static Routing Topology
273
Configuring Static Routes
274
Figure 163 Dynamic DNS
288
Table 122 Dynamic DNS
288
Chapter 19 Bandwidth Management
277
Subnet-Based Bandwidth Management
277
Application and Subnet-Based Bandwidth Management
278
Figure 158 Subnet-Based Bandwidth Management Example
278
Priority-Based Scheduler
278
Scheduler
278
Table 114 Application and Subnet-Based Bandwidth Management Example
278
Fairness-Based Scheduler
279
Maximize Bandwidth Usage
279
Maximize Bandwidth Usage Example
279
Reserving Bandwidth for Non-Bandwidth Class Traffic
279
Table 120 Bandwidth Management: Rule Setup
282
Rule Configuration
283
Chapter 20 Dynamic DNS Setup
287
Configuring Dynamic DNS
287
Dynamic DNS Overview
287
DYNDNS Wildcard
287
Chapter 21 Remote Management Configuration
291
Remote Management Overview
291
Remote Management and NAT
292
Table 123 Remote Management: WWW
293
Configuring Telnet
294
Telnet
294
Figure 167 Remote Management: FTP
295
Table 124 Remote Management: Telnet
295
Table 125 Remote Management: FTP
295
Figure 168 SNMP Management Model
296
Configuring SNMP
297
SNMP Traps
297
Supported Mibs
297
Table 126 SNMP Traps
297
Figure 169 Remote Management: SNMP
298
Table 127 Remote Management: SNMP
298
Configuring DNS
299
Configuring ICMP
299
Figure 170 Remote Management: DNS
299
Table 128 Remote Management: DNS
299
300
300
Remote Management Limitations
292
System Timeout
292
Www
292
Figure 164 Remote Management: WWW
293
Figure 165 Telnet Configuration on a TCP/IP Network
294
Figure 166 Remote Management: Telnet
294
Configuring FTP
295
Snmp
296
Figure 171 Remote Management: ICMP
300
Table 129 Remote Management: ICMP
300
Figure 172 Enabling TR-069
301
Table 130 TR-069 Commands
301
Chapter 22 Universal Plug-And-Play (Upnp)
303
Cautions with Upnp
303
How Do I Know if I'M Using Upnp
303
Introducing Universal Plug and Play
303
NAT Traversal
303
Configuring Upnp
304
Figure 173 Configuring Upnp
304
Table 131 Configuring Upnp
304
Upnp and Zyxel
304
Figure 174 Add/Remove Programs: Windows Setup: Communication
305
Installing Upnp in Windows Example
305
Figure 175 Add/Remove Programs: Windows Setup: Communication: Components
306
Figure 176 Network Connections
306
Figure 177 Windows Optional Networking Components Wizard
307
Figure 178 Networking Services
307
Using Upnp in Windows XP Example
308
Figure 179 Network Connections
308
Figure 180 Internet Connection Properties
309
Figure 181 Internet Connection Properties: Advanced Settings
310
Figure 182 Internet Connection Properties: Advanced Settings: Add
310
Figure 183 System Tray Icon
311
Figure 184 Internet Connection Status
311
Figure 185 Network Connections
312
Figure 186 Network Connections: My Network Places
313
Figure 187 Network Connections: My Network Places: Properties: Example
313
Maintenance, Troubleshooting and Specifications
315
Part V: Maintenance, Troubleshooting and Specifications
315
Chapter 23 System
317
General Setup and System Name
317
System
317
System Configuration
317
Figure 188 System General Setup
318
Table 132 System General Setup
318
Figure 189 System Time Setting
319
Time Setting
319
Table 133 System Time Setting
320
Alerts and Logs
323
Tools
329
Restore Configuration
332
Table 138 Maintenance Restore Configuration
332
Back to Factory Defaults
333
Restart
333
Diagnostic
335
Logs
323
Figure 195 Network Temporarily Disconnected
330
Backup Configuration
331
Configuration Screen
331
Chapter 24 Logs
323
Logs Overview
323
Viewing the Logs
323
Configuring Log Settings
324
Figure 190 View Log
324
Table 134 View Log
324
Figure 191 Log Settings
325
Table 135 Log Settings
325
SMTP Error Messages
326
Table 136 SMTP Error Messages
326
Example E-Mail Log
327
Figure 192 E-Mail Log Example
327
Chapter 25 Tools
329
Figure 193 Firmware Upgrade
329
Firmware Upgrade
329
Table 137 Firmware Upgrade
329
Figure 194 Firmware Upload in Progress
330
Figure 196 Error Message
331
Figure 197 Configuration
331
Figure 198 Configuration Restore Successful
332
Figure 199 Temporarily Disconnected
332
Figure 200 Configuration Restore Error
333
Figure 201 Restart Screen
333
Chapter 26 Diagnostic
335
Figure 202 Diagnostic: General
335
General Diagnostic
335
Table 139 Diagnostic: General
335
DSL Line Diagnostic
336
Figure 203 Diagnostic: DSL Line
336
Table 140 Diagnostic: DSL Line
336
Chapter 27 Troubleshooting
337
Problems Starting up the Zyxel Device
337
Problems with the LAN
337
Table 141 Troubleshooting Starting up Your Zyxel Device
337
Table 143 Troubleshooting the WAN
338
Table 144 Troubleshooting Accessing the Zyxel Device
338
Pop-Up Windows, Javascripts and Java Permissions
339
Table 142 Troubleshooting the LAN
337
Problems Accessing the Zyxel Device
338
Problems with the WAN
338
Figure 204 Pop-Up Blocker
339
Figure 205 Internet Options
340
Figure 206 Internet Options
341
Figure 207 Pop-Up Blocker Settings
341
Figure 208 Internet Options
342
Figure 209 Security Settings - Java Scripting
343
Figure 210 Security Settings - Java
343
Activex Controls in Internet Explorer
344
Figure 211 Java (Sun)
344
Figure 212 Internet Options Security
345
Figure 213 Security Setting Activex Controls
345
Chapter 28 Product Specifications
347
General Zyxel Device Specifications
347
Table 145 Hardware Specifications
347
Table 146 Firmware Specifications
348
Table 147 ADSL Standards
351
Wall-Mounting Instructions
351
Figure 214 Wall-Mounting Example
352
Figure 215 Masonry Plug and M4 Tap Screw
352
Figure 233 Windows Vista: Advanced TCP/IP Properties
367
Figure 234 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
368
Figure 235 Macintosh os 8/9: Apple Menu
369
Figure 236 Macintosh os 8/9: TCP/IP
369
Figure 237 Macintosh os X: Apple Menu
370
Figure 238 Macintosh os X: Network
371
Figure 248 Pop-Up Blocker
377
Figure 249 Internet Options: Privacy
378
Figure 250 Internet Options: Privacy
379
Figure 251 Pop-Up Blocker Settings
379
Figure 252 Internet Options: Security
380
Figure 253 Security Settings - Java Scripting
381
Figure 254 Security Settings - Java
381
Figure 255 Java (Sun)
382
Figure 256 Mozilla Firefox: Tools > Options
383
Figure 257 Mozilla Firefox Content Security
383
Figure 284 Windows XP: Protected EAP Properties
418
Table 168 Windows XP: Protected EAP Properties
418
Figure 285 Windows XP: Smart Card or Other Certificate Properties
419
Table 169 Windows XP: Smart Card or Other Certificate Properties
419
Figure 286 Windows XP SP2: Wireless Networks: Preferred Networks
420
Figure 287 Windows XP SP1: Wireless Networks: Preferred Networks
421
Table 170 Commonly Used Services
423
Figure 288 Virtual Circuit Topology
427
Part VI: Appendices and Index
353
Appendix A Setting up Your Computer's IP Address
355
Figure 216 Windows 95/98/Me: Network: Configuration
356
Figure 217 Windows 95/98/Me: TCP/IP Properties: IP Address
357
Figure 218 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
358
Figure 219 Windows XP: Start Menu
359
Figure 220 Windows XP: Control Panel
359
Figure 221 Windows XP: Control Panel: Network Connections: Properties
360
Figure 222 Windows XP: Local Area Connection Properties
360
Figure 223 Windows XP: Internet Protocol (TCP/IP) Properties
361
Figure 224 Windows XP: Advanced TCP/IP Properties
362
Figure 225 Windows XP: Internet Protocol (TCP/IP) Properties
363
Figure 226 Windows Vista: Start Menu
364
Figure 227 Windows Vista: Control Panel
364
Figure 228 Windows Vista: Network and Internet
364
Figure 229 Windows Vista: Network and Sharing Center
364
Figure 230 Windows Vista: Network and Sharing Center
365
Figure 231 Windows Vista: Local Area Connection Properties
365
Figure 232 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
366
Figure 239 Red hat 9.0: KDE: Network Configuration: Devices
372
Figure 240 Red hat 9.0: KDE: Ethernet Device: General
372
Figure 241 Red hat 9.0: KDE: Network Configuration: DNS
373
Figure 242 Red hat 9.0: KDE: Network Configuration: Activate
373
Figure 243 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
374
Figure 244 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
374
Figure 245 Red hat 9.0: DNS Settings in Resolv.conf
374
Figure 246 Red hat 9.0: Restart Ethernet Card
374
Figure 247 Red hat 9.0: Checking TCP/IP Properties
375
Appendix B Pop-Up Windows, Javascripts and Java Permissions
377
Table 153 Subnet 2
390
Table 154 Subnet 3
390
Table 155 Subnet 4
390
Table 156 Eight Subnets
390
Table 157 24-Bit Network Number Subnet Planning
391
Table 158 16-Bit Network Number Subnet Planning
391
Figure 261 Conflicting Computer IP Addresses Example
393
Figure 262 Conflicting Computer IP Addresses Example
393
Figure 263 Conflicting Computer and Router IP Addresses Example
394
Appendix C IP Addresses and Subnetting
385
Figure 258 Network Number and Host ID
386
Table 148 IP Address Network Number and Host ID Example
386
Table 149 Subnet Masks
387
Table 150 Maximum Host Numbers
387
Table 151 Alternative Subnet Mask Notation
387
Figure 259 Subnetting Example: before Subnetting
388
Figure 260 Subnetting Example: after Subnetting
389
Table 152 Subnet 1
389
Figure 264 Peer-To-Peer Communication in an Ad-Hoc Network
395
Figure 265 Basic Service Set
396
Figure 266 Infrastructure WLAN
397
Figure 267 RTS/CTS
398
Table 159 IEEE 802.11G
399
Table 160 Wireless Security Levels
400
Table 161 Comparison of EAP Authentication Types
403
Figure 268 WPA(2) with RADIUS Application Example
405
Figure 269 WPA(2)-PSK Authentication
406
Table 162 Wireless Security Relational Matrix
406
Appendix D Wireless Lans
395
Figure 270 Windows XP SP1: Wireless Network Connection Status
409
Figure 271 Windows XP SP2: Wireless Network Connection Status
410
Figure 272 Windows XP SP1: Wireless Network Connection Properties
410
Figure 273 Windows XP SP2: Wireless Network Connection Properties
411
Figure 274 Windows XP SP2: WZC Not Available
411
Figure 275 Windows XP SP2: System Tray Icon
412
Figure 276 Windows XP SP2: Wireless Network Connection Status
412
Table 163 Windows XP SP2: System Tray Icon
412
Figure 277 Windows XP SP1: Wireless Network Connection Status
413
Figure 278 Windows XP SP2: Wireless Network Connection
413
Figure 279 Windows XP SP1: Wireless Network Connection Properties
414
Table 164 Windows XP SP2: Wireless Network Connection
414
Figure 280 Windows XP SP2: Wireless Network Connection: WEP or WPA-PSK
415
Figure 281 Windows XP SP2: Wireless Network Connection: no Security
415
Table 165 Windows XP: Wireless Networks
415
Figure 282 Windows XP: Wireless (Network) Properties: Association
416
Table 166 Windows XP: Wireless (Network) Properties: Association
416
Figure 283 Windows XP: Wireless (Network) Properties: Authentication
417
Table 167 Windows XP: Wireless (Network) Properties: Authentication
417
Appendix E Management with Wireless Zero Configuration
409
Appendix F Common Services
423
Appendix G Virtual Circuit Topology
427
Figure 289 Security Certificate
429
Figure 290 Login Screen
430
Figure 291 Certificate General Information before Import
430
Figure 292 Certificate Import Wizard 1
431
Figure 293 Certificate Import Wizard 2
431
Figure 294 Certificate Import Wizard 3
432
Figure 295 Root Certificate Store
432
Figure 296 Certificate General Information after Import
433
Table 171 Netbios Filter Default Settings
436
Appendix H Importing Certificates
429
Appendix I Netbios Filter Commands
435
Figure 301 Configuration Text File Format: Column Descriptions
443
Figure 302 Invalid Parameter Entered: Command Line Example
444
Figure 303 Valid Parameter Entered: Command Line Example
444
Figure 304 Internal SPTGEN FTP Download Example
445
Figure 305 Internal SPTGEN FTP Upload Example
445
Table 172 Abbreviations Used in the Example Internal SPTGEN Screens Table
446
Table 173 Menu 1 General Setup
446
Table 174 Menu 3
446
Table 175 Menu 4 Internet Access Setup
449
Table 176 Menu 12
451
Table 177 Menu 15 SUA Server Setup
451
Table 178 Menu 21.1 Filter Set #1
453
Table 179 Menu 21.1 Filer Set #2
454
Table 180 Menu 23 System Menus
456
Table 181 Menu 24.11 Remote Management Control
457
Table 182 Command Examples
458
Appendix J Command Interpreter
437
Figure 297 Displaying Log Categories Example
438
Figure 298 Displaying Log Parameters Example
438
Figure 299 Routing Command Example
440
Figure 300 Backup Gateway
441
Appendix K Internal SPTGEN
443
Appendix L Log Descriptions
459
Table 183 System Maintenance Logs
459
Table 184 System Error Logs
460
Table 185 Access Control Logs
460
Table 186 TCP Reset Logs
461
Table 187 Packet Filter Logs
461
Table 188 ICMP Logs
461
Table 189 CDR Logs
462
Table 190 PPP Logs
462
Table 191 Upnp Logs
462
Table 192 Content Filtering Logs
463
Table 193 Attack Logs
463
Table 194 Ipsec Logs
464
Table 195 IKE Logs
465
Table 196 PKI Logs
467
Table 197 Certificate Path Verification Failure Reason Codes
468
Table 198 802.1X Logs
469
Table 199 ACL Setting Notes
470
Table 200 ICMP Notes
470
Table 201 Syslog Logs
471
Figure 306 Displaying Log Categories Example
472
Table 202 RFC-2408 ISAKMP Payload Types
472
Figure 307 Displaying Log Parameters Example
473
Advertisement
ZyXEL Communications P-662H-61 Upgrade Information (16 pages)
Zyxel P-662H-61: Supplementary Guide
Brand:
ZyXEL Communications
| Category:
Software
| Size: 0.36 MB
Table of Contents
Vantage Cnm
1
Table of Contents
3
Introduction
4
Upgrade Notes
4
Upgrade Procedure
6
Before Upgrade
6
After Upgrade
12
New Installation
12
ZyXEL Communications P-662H-61 Quick Start Manual (7 pages)
ZyXEL Communications Wireless Security Gateway Quick Start Guide
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 6.1 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Status Page
3
Internet Setup
4
Troubleshooting
6
Advertisement
ZyXEL Communications P-662H-61 Specifications (2 pages)
ADSL 2+ 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.17 MB
ZyXEL Communications P-662H-61 Declaration Of Conformity (1 page)
802.11g Wireless ADSL 2+ 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.13 MB
Advertisement
Related Products
ZyXEL Communications P-662H-63
ZyXEL Communications P-662H-67
ZyXEL Communications P-662H Series
ZyXEL Communications Prestige P-662HW-61
ZyXEL Communications P-662HW-63
ZyXEL Communications P-662HW-67
ZyXEL Communications P-662H-D1
ZyXEL Communications P-662HW-D1
ZyXEL Communications P-662HW-D3
ZyXEL Communications P-662H/HW(-I)
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL