Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-662HW-D - V3.40
ZyXEL Communications P-662HW-D - V3.40 Manuals
Manuals and User Guides for ZyXEL Communications P-662HW-D - V3.40. We have
5
ZyXEL Communications P-662HW-D - V3.40 manuals available for free PDF download: User Manual, Support Notes, Quick Start Manual, Brochure
ZyXEL Communications P-662HW-D - V3.40 User Manual (496 pages)
802.11g ADSL 2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 14.35 MB
Table of Contents
Copyright
3
Certifications
4
Safety Warnings
6
Zyxel Limited Warranty
7
Customer Support
8
Table of Contents
11
List of Figures
25
List of Tables
33
Preface
39
User Guide Feedback
40
Chapter 1 Getting to Know Your Zyxel Device
41
Introducing the Zyxel Device
41
Features of the Zyxel Device
41
Table 1 ADSL Standards
42
High Speed Internet Access
42
Ipsec Vpn Capability
43
Media Bandwidth Management
43
Dynamic Dns Support
44
Packet Filters
44
P-662HW Wireless Features
45
Applications for the Zyxel Device
45
Internet Access
46
LAN to LAN Application
46
Firewall for Secure Broadband Internet Access
46
Figure 1 Zyxel Device Internet Access Application
46
Figure 2 Zyxel Device LAN-To-LAN Application Example
46
Front Panel Leds
47
Figure 3 Firewall Application
47
Figure 4 P-662H Front Panel
47
Figure 5 P-662HW Front Panel
47
Table 2 Front Panel Leds
47
Chapter 2 Introducing the Web Configurator
49
Web Configurator Overview
49
Accessing the Web Configurator
49
Figure 6 Password Screen
50
Figure 7 Change Password at Login
50
Resetting the Zyxel Device
51
Figure 8 Replace Factory Default Certificate
51
Figure 9 Select a Mode
51
Using the Reset Button
52
Navigating the Web Configurator
52
Navigation Panel
52
Figure 10 Web Configurator: Main Screen
52
Table 3 Web Configurator Screens Summary
53
Status Screen
55
Figure 11 Status Screen
56
Table 4 Status Screen
56
Status: any IP Table
58
Status: WLAN Status
58
Figure 12 Status: any IP Table
58
Table 5 Status: any IP Table
58
Status: Bandwidth Status
59
Status: VPN Status
59
Figure 13 Status: WLAN Status
59
Figure 14 Status: Bandwidth Status
59
Table 6 Status: WLAN Status
59
Status: Packet Statistics
60
Figure 15 Status: VPN Status
60
Table 7 Status: VPN Status
60
Figure 16 Status: Packet Statistics
61
Table 8 Status: Packet Statistics
61
Changing Login Password
62
Figure 17 System General
62
Table 9 System General: Password
63
Chapter 3 Wizard Setup for Internet Access
65
Introduction
65
Internet Access Wizard Setup
65
Figure 18 Select a Mode
65
Figure 19 Wizard: Welcome
66
Figure 20 Auto Detection: no DSL Connection
66
Automatic Detection
67
Figure 21 Auto Detection: Failed
67
Figure 22 Auto-Detection: Pppoe
67
Manual Configuration
67
Figure 23 Internet Access Wizard Setup: ISP Parameters
68
Table 10 Internet Access Wizard Setup: ISP Parameters
68
Figure 24 Internet Connection with Pppoe
69
Figure 25 Internet Connection with RFC 1483
69
Table 11 Internet Connection with Pppoe
69
Figure 26 Internet Connection with ENET ENCAP
70
Table 12 Internet Connection with RFC 1483
70
Table 13 Internet Connection with ENET ENCAP
70
Figure 27 Internet Connection with Pppoa
71
Table 14 Internet Connection with Pppoa
71
Wireless Connection Wizard Setup
72
Figure 28 Connection Test Failed-1
72
Figure 29 Connection Test Failed-2
72
Figure 30 Connection Test Successful
73
Figure 31 Wireless LAN Setup Wizard 1
73
Figure 32 Wireless LAN Setup Wizard 2
74
Table 15 Wireless LAN Setup Wizard 1
74
Automatically Assign a WPA Key
75
Manually Assign a WPA-PSK Key
75
Table 16 Wireless LAN Setup Wizard 2
75
Figure 33 Manually Assign a WPA Key
76
Figure 34 Manually Assign a WEP Key
76
Manually Assign a WEP Key
76
Table 17 Manually Assign a WPA Key
76
Figure 35 Wireless LAN Setup 3
77
Table 18 Manually Assign a WEP Key
77
Figure 36 Internet Access and WLAN Wizard Setup Complete
78
Chapter 4 Bandwidth Management Wizard
79
Introduction
79
Predefined Media Bandwidth Management Services
79
Table 19 Media Bandwidth Management Setup: Services
79
Bandwidth Management Wizard Setup
80
Figure 37 Select a Mode
80
Figure 38 Wizard: Welcome
81
Figure 39 Bandwidth Management Wizard: General Information
81
Table 20 Bandwidth Management Wizard: General Information
81
Figure 40 Bandwidth Management Wizard: Configuration
82
Table 21 Bandwidth Management Wizard: Configuration
82
Figure 41 Bandwidth Management Wizard: Complete
83
Chapter 5 WAN Setup
85
WAN Overview
85
Encapsulation
85
Enet Encap
85
PPP over Ethernet
85
Pppoa
86
Rfc 1483
86
Multiplexing
86
VC-Based Multiplexing
86
LLC-Based Multiplexing
86
VPI and VCI
86
IP Address Assignment
87
IP Assignment with Pppoa or Pppoe Encapsulation
87
IP Assignment with RFC 1483 Encapsulation
87
IP Assignment with ENET ENCAP Encapsulation
87
Nailed-Up Connection (PPP)
87
Nat
87
Metric
88
Traffic Shaping
88
ATM Traffic Classes
89
Constant Bit Rate (CBR)
89
Variable Bit Rate (VBR)
89
Figure 42 Example of Traffic Shaping
89
Unspecified Bit Rate (UBR)
90
Zero Configuration Internet Access
90
Internet Connection
90
Figure 43 Internet Connection (Pppoe)
91
Table 22 Internet Connection
91
Configuring Advanced Internet Connection
92
Figure 44 Advanced Internet Connection
93
Table 23 Advanced Internet Connection
93
Configuring more Connections
94
More Connections Edit
95
Figure 45 more Connections
95
Table 24 more Connections
95
Figure 46 more Connections Edit
96
Table 25 more Connections Edit
96
Configuring more Connections Advanced Setup
98
Figure 47 more Connections Advanced Setup
98
Table 26 more Connections Advanced Setup
98
Traffic Redirect
99
Figure 48 Traffic Redirect Example
99
Configuring WAN Backup
100
Figure 49 Traffic Redirect LAN Setup
100
Figure 50 WAN Backup Setup
101
Table 27 WAN Backup Setup
101
WAN Backup Advanced Screen
102
Figure 51 WAN Backup Advanced Setup
103
Table 28 WAN Backup Advanced Setup
103
Dial Backup Modem Setup
105
Figure 52 WAN Dial Backup Modem Setup
106
Table 29 WAN Dial Backup Modem Setup
106
Chapter 6 LAN Setup
109
LAN Overview
109
Lans, Wans and the Zyxel Device
109
Figure 53 LAN and WAN IP Addresses
109
DHCP Setup
110
IP Pool Setup
110
DNS Server Address
110
DNS Server Address Assignment
111
Lan Tcp/Ip
111
IP Address and Subnet Mask
111
Private IP Addresses
112
RIP Setup
112
Multicast
113
Any IP
113
How any IP Works
114
Figure 54 any IP Example
114
Configuring LAN IP
115
Configuring Advanced LAN Setup
115
Figure 55 LAN IP
115
Table 30 LAN IP
115
Figure 56 Advanced LAN Setup
116
Table 31 Advanced LAN Setup
116
DHCP Setup
117
Figure 57 DHCP Setup
117
Table 32 DHCP Setup
117
LAN Client List
118
Figure 58 LAN Client List
118
LAN IP Alias
119
Table 33 LAN Client List
119
Figure 59 Physical Network & Partitioned Logical Networks
120
Figure 60 LAN IP Alias
120
Table 34 LAN IP Alias
120
Chapter 7 Wireless LAN
123
Wireless Network Overview
123
Figure 61 Example of a Wireless Network
123
Wireless Security Overview
124
Ssid
124
MAC Address Filter
124
User Authentication
124
Encryption
125
Table 35 Types of Encryption for each Type of Authentication
125
One-Touch Intelligent Security Technology (OTIST)
126
Wireless Performance Overview
126
Quality of Service (Qos)
126
Additional Wireless Terms
127
General Wireless LAN Screen
127
Table 36 Additional Wireless Terms
127
Figure 62 Wireless LAN: General
128
Table 37 Wireless LAN: General
128
Figure 63 Wireless: no Security
129
No Security
129
Table 38 Wireless no Security
129
WEP Encryption Screen
129
Figure 64 Wireless: Static WEP Encryption
130
Table 39 Wireless: Static WEP Encryption
130
Wpa(2)-Psk
130
Figure 65 Wireless: WPA(2)-PSK
131
Table 40 Wireless: WPA(2)-PSK
131
Figure 66 Wireless: WPA(2)
132
WPA(2) Authentication Screen
132
Table 41 Wireless: WPA(2)
133
Figure 67 Advanced
134
Table 42 Wireless LAN: Advanced
134
Wireless LAN Advanced Setup
134
Otist
135
Enabling OTIST
135
Figure 68 OTIST
136
Table 43 OTIST
136
Figure 69 Example Wireless Client OTIST Screen
137
Wireless Client
137
Starting OTIST
138
Notes on OTIST
138
Figure 70 Security Key
138
Figure 71 OTIST in Progress (AP)
138
Figure 72 OTIST in Progress (Client)
138
Figure 73 no AP with OTIST Found
138
MAC Filter
139
Figure 74 Start OTIST
139
Figure 75 MAC Address Filter
140
Table 44 MAC Address Filter
140
WMM Qos
141
WMM Qos Example
141
WMM Qos Priorities
141
Table 45 WMM Qos Priorities
141
Services
142
Table 46 Commonly Used Services
143
Qos Screen
144
Tos (Type of Service) and WMM Qos
144
Figure 76 Wireless LAN: Qos
145
Table 47 Wireless LAN: Qos
145
Application Priority Configuration
146
Figure 77 Application Priority Configuration
146
Table 48 Application Priority Configuration
146
Multiple SSID (P-662HW-D Models Only)
147
Multiple SSID Commands
148
Figure 78 Multiple SSID Network Example
148
Table 49 Multiple SSID Commands
149
Multiple SSID Example
150
Table 50 Multiple SSID Example Configuration
150
Chapter 8 DMZ
151
Introduction
151
Configuring DMZ
151
Figure 79 DMZ
152
Table 51 DMZ
152
DMZ Public IP Address Example
153
DMZ Private and Public IP Address Example
154
Figure 80 DMZ Public Address Example
154
Figure 81 DMZ Private and Public Address Example
155
Chapter 9 Network Address Translation (NAT) Screens
157
NAT Overview
157
NAT Definitions
157
Table 52 NAT Definitions
157
What NAT Does
158
How NAT Works
158
Figure 82 How NAT Works
158
NAT Application
159
NAT Mapping Types
159
Figure 83 NAT Application with IP Alias
159
SUA (Single User Account) Versus NAT
160
NAT General Setup
160
Table 53 NAT Mapping Types
160
Port Forwarding
161
Figure 84 NAT General
161
Table 54 NAT General
161
Default Server IP Address
162
Port Forwarding: Services and Port Numbers
162
Table 55 Services and Port Numbers
162
Configuring Servers Behind Port Forwarding (Example)
163
Configuring Port Forwarding
163
Figure 85 Multiple Servers Behind NAT Example
163
Figure 86 NAT Port Forwarding
163
Figure 87 Port Forwarding Rule Setup
164
Port Forwarding Rule Edit
164
Table 56 NAT Port Forwarding
164
Address Mapping
165
Table 57 Port Forwarding Rule Setup
165
Figure 88 Address Mapping Rules
166
Table 58 Address Mapping Rules
166
Address Mapping Rule Edit
167
Figure 89 Edit Address Mapping Rule
167
Table 59 Edit Address Mapping Rule
167
Chapter 10 Firewalls
169
Firewall Overview
169
Types of Firewalls
169
Packet Filtering Firewalls
169
Application-Level Firewalls
170
Stateful Inspection Firewalls
170
Introduction to Zyxel's Firewall
170
Denial of Service Attacks
171
Denial of Service
171
Basics
171
Figure 90 Firewall Application
171
Types of Dos Attacks
172
Figure 91 Three-Way Handshake
172
Table 60 Common IP Ports
172
Figure 92 SYN Flood
173
Figure 93 Smurf Attack
174
ICMP Vulnerability
174
Illegal Commands (Netbios and SMTP)
174
Table 61 ICMP Commands that Trigger Alerts
174
Table 62 Legal Netbios Commands
174
Table 63 Legal SMTP Commands
174
Traceroute
175
Stateful Inspection
175
Figure 94 Stateful Inspection
175
Stateful Inspection and the Zyxel Device
176
Stateful Inspection Process
176
TCP Security
177
UDP/ICMP Security
177
Upper Layer Protocols
178
Guidelines for Enhancing Security with Your Firewall
178
Security in General
179
Packet Filtering Vs Firewall
179
Packet Filtering
180
When to Use Filtering
180
Firewall
180
When to Use the Firewall
180
Firewall Configuration
181
Access Methods
181
Firewall Policies Overview
181
Chapter 11 Firewall Configuration
181
Rule Logic Overview
182
Rule Checklist
182
Security Ramifications
182
Key Fields for Configuring Rules
183
Action
183
Service
183
Source Address
183
Destination Address
183
Connection Direction
183
LAN to WAN Rules
184
Alerts
184
General Firewall Policy
184
Figure 95 Firewall: General
184
Firewall Rules Summary
185
Table 64 Firewall: General
185
Figure 96 Firewall Rules
186
Table 65 Firewall Rules
186
Configuring Firewall Rules
187
Figure 97 Firewall: Edit Rule
188
Table 66 Firewall: Edit Rule
189
Customized Services
190
Figure 98 Firewall: Customized Services
190
Table 67 Customized Services
190
Configuring a Customized Service
191
Example Firewall Rule
191
Figure 99 Firewall: Configure Customized Services
191
Table 68 Firewall: Configure Customized Services
191
Figure 100 Firewall Example: Rules
192
Figure 101 Edit Custom Port Example
192
Figure 102 Firewall Example: Edit Rule: Destination Address
193
Figure 103 Firewall Example: Edit Rule: Select Customized Services
194
Predefined Services
195
Figure 104 Firewall Example: Rules: Myservice
195
Table 69 Predefined Services
195
Anti-Probing
197
Figure 105 Firewall: Anti Probing
197
Dos Thresholds
198
Threshold Values
198
Table 70 Firewall: Anti Probing
198
Half-Open Sessions
199
TCP Maximum Incomplete and Blocking Time
199
Configuring Firewall Thresholds
200
Figure 106 Firewall: Threshold
200
Table 71 Firewall: Threshold
200
Chapter 12 Anti-Virus Packet Scan
203
Overview
203
Types of Computer Viruses
203
Signature-Based Virus Scan
203
Table 72 Common Computer Virus Types
203
Computer Virus Infection and Prevention
204
Introduction to the Zyxel Device Anti-Virus Packet Scan
204
Figure 107 Zyxel Device Anti-Virus Application
204
How the Zyxel Device Virus Scan Works
205
Limitations of the Zyxel Device Packet Scan
205
Anti-Virus Packet Scan Configuration
205
Figure 108 Anti-Virus: Packet Scan
206
Table 73 Anti-Virus: Packet Scan
206
Registration and Online Update
207
Figure 109 Anti-Virus: Registration and Virus Information Update
208
Table 74 Anti-Virus: Registration and Virus Information Update
208
Figure 110 Virus Scan Update in Progress
209
Figure 111 Virus Scan Update Successful
209
Updating the Anti-Virus Packet Scan
209
Chapter 13 Content Filtering
211
Content Filtering Overview
211
Configuring Keyword Blocking
211
Figure 112 Content Filter: Keyword
211
Configuring the Schedule
212
Figure 113 Content Filter: Schedule
212
Table 75 Content Filter: Keyword
212
Configuring Trusted Computers
213
Figure 114 Content Filter: Trusted
213
Table 76 Content Filter: Schedule
213
Table 77 Content Filter: Trusted
213
Chapter 14 Content Access Control
215
Content Access Control Overview
215
Content Access Control WLAN Application
215
Configuration Steps
215
Figure 115 Content Access Control with WLAN Application
215
Activating CAC and Creating User Groups
216
Figure 116 Content Access Control: General
216
Table 78 Content Access Control: General
216
Configuring Time Schedule
217
Figure 117 Control Access Control: General: Time Scheduling
218
Table 79 Control Access Control: General: Time Scheduling
218
Configuring Services
219
Figure 118 Content Access Control: General: Services
219
Table 80 Content Access Control: General: Services
219
Available Services
220
Table 81 Available Services
220
Configuring Web Site Filters
222
Figure 119 Content Access Control: General: Web Site Filter
222
Table 82 Content Access Control: General: Web Site Filter
222
Figure 120 Content Access Control: General: Diagnose
227
Table 83 Content Access Control: General: Diagnose
227
Testing Web Site Access Privileges
227
User Account Setup
228
Figure 121 Content Access Control: User Profiles
228
Table 84 Content Access Control: User Profiles
228
User Online Status
229
Figure 122 Content Access Control: Online Status
229
Table 85 Content Access Control: Online Status
229
Content Access Control Logins
230
User Login
230
Figure 123 Content Access Control: User Login Screen
230
Figure 124 Content Access Control: User Logout Screen
230
Administrator Login
231
Chapter 15 Introduction to Ipsec
233
VPN Overview
233
Ipsec
233
Security Association
233
Other Terminology
233
Encryption
233
Data Confidentiality
234
Data Integrity
234
Data Origin Authentication
234
VPN Applications
234
Figure 125 Encryption and Decryption
234
Ipsec Architecture
235
Ipsec Algorithms
235
Key Management
235
Encapsulation
235
Figure 126 Ipsec Architecture
235
Transport Mode
236
Tunnel Mode
236
Ipsec and NAT
236
Figure 127 Transport and Tunnel Mode Ipsec Encapsulation
236
Table 86 VPN and NAT
237
Chapter 16 VPN Screens
239
Vpn/Ipsec Overview
239
Ipsec Algorithms
239
AH (Authentication Header) Protocol
239
ESP (Encapsulating Security Payload) Protocol
239
My IP Address
240
Table 87 AH and ESP
240
Secure Gateway Address
241
Dynamic Secure Gateway Address
241
VPN Setup Screen
241
Figure 128 Ipsec Summary Fields
241
Figure 129 VPN Setup
242
Table 88 VPN Setup
242
Keep Alive
243
VPN, NAT, and NAT Traversal
244
Figure 130 NAT Router between Ipsec Routers
244
Table 89 VPN and NAT
244
Remote DNS Server
245
ID Type and Content
245
Figure 131 VPN Host Using Intranet DNS Server Example
245
ID Type and Content Examples
246
Table 90 Local ID Type and Content Fields
246
Table 91 Peer ID Type and Content Fields
246
Pre-Shared Key
247
Editing VPN Policies
247
Table 92 Matching ID Type and Content Configuration Example
247
Table 93 Mismatching ID Type and Content Configuration Example
247
Figure 132 Edit VPN Policies
248
Table 94 Edit VPN Policies
248
IKE Phases
252
Figure 133 Two Phases to Set up the Ipsec SA
252
Negotiation Mode
253
Diffie-Hellman (DH) Key Groups
254
Perfect Forward Secrecy (PFS)
254
Configuring Advanced IKE Settings
254
Figure 134 Advanced VPN Policies
255
Table 95 Advanced VPN Policies
255
Manual Key Setup
257
Security Parameter Index (SPI)
257
Configuring Manual Key
257
Figure 135 VPN: Manual Key
258
Table 96 VPN: Manual Key
258
Viewing SA Monitor
260
Configuring Global Setting
261
Figure 136 VPN: SA Monitor
261
Figure 137 VPN: Global Setting
261
Table 97 VPN: SA Monitor
261
Telecommuter Vpn/Ipsec Examples
262
Telecommuters Sharing One VPN Rule Example
262
Figure 138 Telecommuters Sharing One VPN Rule Example
262
Table 98 VPN: Global Setting
262
Telecommuters Using Unique VPN Rules Example
263
Figure 139 Telecommuters Using Unique VPN Rules Example
263
Table 99 Telecommuters Sharing One VPN Rule Example
263
VPN and Remote Management
264
Table 100 Telecommuters Using Unique VPN Rules Example
264
Chapter 17 Certificates
265
Certificates Overview
265
Advantages of Certificates
266
Self-Signed Certificates
266
Configuration Summary
266
Figure 140 Certificate Configuration Overview
266
My Certificates
267
Figure 141 My Certificates
267
Table 101 My Certificates
267
My Certificate Import
269
Certificate File Formats
269
Figure 142 My Certificate Import
269
My Certificate Create
270
Figure 143 My Certificate Create
270
Table 102 My Certificate Import
270
Table 103 My Certificate Create
271
My Certificate Details
272
Figure 144 My Certificate Details
273
Table 104 My Certificate Details
274
Trusted Cas
275
Figure 145 Trusted Cas
276
Table 105 Trusted Cas
276
Trusted CA Import
277
Figure 146 Trusted CA Import
277
Table 106 Trusted CA Import
277
Trusted CA Details
278
Figure 147 Trusted CA Details
278
Table 107 Trusted CA Details
279
Trusted Remote Hosts
280
Figure 148 Trusted Remote Hosts
281
Table 108 Trusted Remote Hosts
281
Verifying a Trusted Remote Host's Certificate
282
Trusted Remote Host Certificate Fingerprints
282
Figure 149 Remote Host Certificates
282
Figure 150 Certificate Details
282
Trusted Remote Hosts Import
283
Trusted Remote Host Certificate Details
283
Figure 151 Trusted Remote Host Import
283
Table 109 Trusted Remote Host Import
283
Figure 152 Trusted Remote Host Details
284
Table 110 Trusted Remote Host Details
285
Directory Servers
286
Directory Server Add or Edit
287
Figure 153 Directory Servers
287
Table 111 Directory Servers
287
Figure 154 Directory Server Add
288
Table 112 Directory Server Add
288
Chapter 18 Static Route
289
Static Route
289
Configuring Static Route
289
Figure 155 Example of Static Routing Topology
289
Figure 156 Static Route
290
Static Route Edit
290
Table 113 Static Route
290
Figure 157 Static Route Edit
291
Table 114 Static Route Edit
291
Chapter 19 Bandwidth Management
293
Bandwidth Management Overview
293
Application-Based Bandwidth Management
293
Subnet-Based Bandwidth Management
293
Application and Subnet-Based Bandwidth Management
294
Scheduler
294
Priority-Based Scheduler
294
Figure 158 Subnet-Based Bandwidth Management Example
294
Table 115 Application and Subnet-Based Bandwidth Management Example
294
Fairness-Based Scheduler
295
Maximize Bandwidth Usage
295
Reserving Bandwidth for Non-Bandwidth Class Traffic
295
Maximize Bandwidth Usage Example
296
Priority-Based Allotment of Unused and Unbudgeted Bandwidth
296
Table 116 Maximize Bandwidth Usage Example
296
Table 117 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
296
Fairness-Based Allotment of Unused and Unbudgeted Bandwidth
297
Bandwidth Management Priorities
297
Configuring Summary
297
Table 118 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
297
Table 119 Bandwidth Management Priorities
297
Figure 159 Bandwidth Management: Summary
298
Table 120 Media Bandwidth Management: Summary
298
Bandwidth Management Rule Setup
299
Figure 160 Bandwidth Management: Rule Setup
299
Table 121 Bandwidth Management: Rule Setup
299
Figure 161 Bandwidth Management Rule Configuration
300
Rule Configuration
300
Table 122 Bandwidth Management Rule Configuration
301
Bandwidth Monitor
302
Table 123 Services and Port Numbers
302
Figure 162 Bandwidth Management: Monitor
303
Chapter 20 Dynamic DNS Setup
305
Dynamic DNS Overview
305
DYNDNS Wildcard
305
Configuring Dynamic DNS
305
Figure 163 Dynamic DNS
306
Table 124 Dynamic DNS
306
Chapter 21 Remote Management Configuration
309
Remote Management Overview
309
Remote Management Limitations
309
Remote Management and NAT
310
System Timeout
310
Www
310
Figure 164 Remote Management: WWW
310
Telnet
311
Configuring Telnet
311
Figure 165 Telnet Configuration on a TCP/IP Network
311
Table 125 Remote Management: WWW
311
Configuring FTP
312
Figure 166 Remote Management: Telnet
312
Table 126 Remote Management: Telnet
312
Snmp
313
Figure 167 Remote Management: FTP
313
Table 127 Remote Management: FTP
313
Figure 168 SNMP Management Model
314
Supported Mibs
314
Configuring SNMP
315
SNMP Traps
315
Table 128 SNMP Traps
315
Figure 169 Remote Management: SNMP
316
Table 129 Remote Management: SNMP
316
Configuring DNS
317
Configuring ICMP
317
Figure 170 Remote Management: DNS
317
Table 130 Remote Management: DNS
317
Figure 171 Remote Management: ICMP
318
Table 131 Remote Management: ICMP
318
319
319
Figure 172 Enabling TR-069
319
Table 132 TR-069 Commands
319
Chapter 22 Universal Plug-And-Play (Upnp)
321
Introducing Universal Plug and Play
321
How Do I Know if I'M Using Upnp
321
NAT Traversal
321
Cautions with Upnp
322
Upnp and Zyxel
322
Configuring Upnp
322
Figure 173 Configuring Upnp
322
Installing Upnp in Windows Example
323
Table 133 Configuring Upnp
323
Figure 174 Add/Remove Programs: Windows Setup: Communication
324
Figure 175 Add/Remove Programs: Windows Setup: Communication: Components
324
Figure 176 Network Connections
325
Figure 177 Windows Optional Networking Components Wizard
325
Using Upnp in Windows XP Example
326
Figure 178 Networking Services
326
Figure 179 Network Connections
327
Figure 180 Internet Connection Properties
327
Figure 181 Internet Connection Properties: Advanced Settings
328
Figure 182 Internet Connection Properties: Advanced Settings: Add
328
Figure 183 System Tray Icon
329
Figure 184 Internet Connection Status
329
Figure 185 Network Connections
330
Figure 186 Network Connections: My Network Places
331
Figure 187 Network Connections: My Network Places: Properties: Example
331
Chapter 23 System
333
General Setup
333
General Setup and System Name
333
Figure 188 System General Setup
334
Table 134 System General Setup
334
Time Setting
335
Figure 189 System Time Setting
335
Table 135 System Time Setting
336
Chapter 24 Logs
339
Logs Overview
339
Alerts and Logs
339
Viewing the Logs
339
Configuring Log Settings
340
Figure 190 View Log
340
Table 136 View Log
340
Figure 191 Log Settings
341
Table 137 Log Settings
341
SMTP Error Messages
343
Example E-Mail Log
343
Figure 192 E-Mail Log Example
343
Table 138 SMTP Error Messages
343
Chapter 25 Tools
345
Firmware Upgrade
345
Figure 193 Firmware Upgrade
345
Table 139 Firmware Upgrade
345
Figure 194 Firmware Upload in Progress
346
Figure 195 Network Temporarily Disconnected
346
Configuration Screen
347
Backup Configuration
347
Figure 196 Error Message
347
Figure 197 Configuration
347
Restore Configuration
348
Figure 198 Configuration Restore Successful
348
Figure 199 Temporarily Disconnected
348
Table 140 Maintenance Restore Configuration
348
Back to Factory Defaults
349
Restart
349
Figure 200 Configuration Restore Error
349
Figure 201 Restart Screen
349
Chapter 26 Diagnostic
351
General Diagnostic
351
Figure 202 Diagnostic: General
351
Table 141 Diagnostic: General
351
DSL Line Diagnostic
352
Figure 203 Diagnostic: DSL Line
352
Table 142 Diagnostic: DSL Line
352
Advertisement
ZyXEL Communications P-662HW-D - V3.40 Support Notes (143 pages)
802.11g Wireless ADSL2+ 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 8.66 MB
Table of Contents
Table of Contents
2
Faq
8
Zynos FAQ
8
What Is Zynos
8
What's Multilingual Embedded Web Configurator
8
How Do I Access the P-662HW-D Command Line Interface (CLI)
8
How Do I Update the Firmware and Configuration File
8
How Do I Upgrade/Backup the Zynos Firmware by Using TFTP Client
8
Program Via LAN
8
How Do I Restore P-662HW-D Configurations by Using TFTP Client Program Via LAN
9
What Should I Do if I Forget the System Password
9
How to Use the Reset Button
9
What Is SUA? When Should I Use SUA
9
What Is the Difference between SUA and Full Feature NAT
10
Is It Possible to Access a Server Running Behind SUA from the Outside Internet? How Can I Do It
10
When Do I Need Select Full Feature NAT
11
What Ip/Port Mapping Does Multi-NAT Support
11
How Many Network Users Can the SUA/NAT Support
12
What Are Device Filters and Protocol Filters
12
How Can I Protect against IP Spoofing Attacks
12
Product FAQ
14
How Can I Manage P-662HW-D
14
What Is the Default Password for Web Configurator
14
What's the Difference between 'Common User Account' and 'Administrator Account
14
How Do I Know the P-662HW-D's WAN IP Address Assigned by the ISP
14
What Is the Micro Filter or Splitter Used for
14
The P-662HW-D Supports Bridge and Router Mode, What's the Difference between Them
15
How Do I Know I am Using Pppoe
15
Why Does My Provider Use Pppoe
15
What Is DDNS
15
When Do I Need DDNS Service
16
What Is DDNS Wildcard? Does the P-662HW-D Support DDNS Wildcard
16
Can the P-662HW-D's SUA Handle Ipsec Packets Sent by the Ipsec Gateway
16
How Do I Setup My P-662HW-D for Routing Ipsec Packets over SUA
16
What Is Traffic Shaping
17
Why Do We Perform Traffic Shaping in the P-662HW-D
17
What Do the Parameters (PCR, SCR, MBS) Mean
18
What Do the ATM Qos Types (CBR, UBR, VBR-Nrt, VBR-RT) Mean
18
What Is Content Filter
18
Adsl Faq
20
How Does ADSL Compare to Cable Modems
20
What Is the Expected Throughput
20
What Is the Microfilter Used for
20
How Do I Know the ADSL Line Is up
20
How Does the P-662HW-D Work on a Noisy ADSL
20
Does the VC-Based Multiplexing Perform Better than the LLC-Based Multiplexing
21
How Do I Know the Details of My ADSL Line Statistics
21
What Are the Signaling Pins of the ADSL Connector
21
What Is Triple Play
21
Firewall FAQ
23
General
23
What Is a Network Firewall
23
What Makes P-662HW-D Secure
23
What Are the Basic Types of Firewalls
23
What Kind of Firewall Is the P-662HW-D
24
Why Do You Need a Firewall When Your Router Has Packet Filtering and NAT Built-In
24
What Is Denials of Service (Dos) Attack
24
What Is Ping of Death Attack
25
What Is Teardrop Attack
25
What Is SYN Flood Attack
25
What Is LAND Attack
25
What Is Brute-Force Attack
26
What Is IP Spoofing Attack
26
What Are the Default ACL Firewall Rules in P-662HW-D
26
Configuration
26
How Do I Configure the Firewall
26
How Do I Prevent Others from Configuring My Firewall
26
Why Can't I Configure My P-662HW-D Using Web Configurator/Telnet over WAN
27
Why Can't I Upload the Firmware and Configuration File Using FTP over WAN
28
Log and Alert
29
When Does the P-662HW-D Generate the Firewall Log
29
What Does the Log Show to Us
29
How Do I View the Firewall Log
29
When Does the P-662HW-D Generate the Firewall Alert
30
What Is the Difference between the Log and Alert
30
Vpn Faq
31
General FAQ
31
What Is VPN
31
Why Do I Need VPN
31
What Are most Common VPN Protocols
31
What Is PPTP
31
What Is L2TP
32
What Is Ipsec
32
What Secure Protocols Does Ipsec Support
32
What Are the Differences between 'Transport Mode' and 'Tunnel Mode
32
What I L2TP?
32
What Is SA
33
What Is IKE
33
What Is Pre-Shared Key
33
What Are the Differences between IKE and Manual Key VPN
33
What Is Phase 1 ID for
33
What Is FQDN
34
When Should I Use FQDN
34
Advanced FAQ
34
How Do I Configure VPN
34
What Kind of VPN Protocols Are Supported on P-662HW-D
35
What Types of Encryption Does P-662HW-D VPN Support
35
What Types of Authentication Does P-662HW-D VPN Support
35
I am Planning My P-662HW-D VPN Configuration. What Do I Need to Know
35
Does P-662HW-D Support Dynamic Secure Gateway IP
36
What VPN Gateway Has Been Tested with P-662HW-D Successfully
36
What VPN Software Has Been Tested with P-662HW-D Successfully
37
How Do I Configure P-662HW-D with NAT for Internal Servers
38
I am Planning My P-662HW-D Behind a NAT Router. What Do I Need to Know
38
How Can I Keep a Tunnel Alive
38
Single, Range, Subnet, Which Types of IP Address Do P-662HW-D Support in Vpn/Ipsec
39
Can P-662HW-D Support VPN Passthrough
39
Can P-662HW-D Behave as a NAT Router Supporting Ipsec Passthrough and an Ipsec Gateway Simultaneously
39
Wireless FAQ
40
General FAQ
40
What Is a Wireless LAN
40
What Are the Advantages of Wireless LAN
40
What Is the Disadvantage of Wireless LAN
40
Where Can You Find 802.11 Wireless Networks
41
What Is an Access Point
41
What's the Difference between Ieee802.11A/B/G
41
Is It Possible to Use Wireless Products from a Variety of Vendors
41
What Is Wi-Fi
41
What Types of Devices Use the 2.4Ghz Band
41
Does the 802.11 Interfere with Bluetooth Device
42
Can Radio Signals Pass through Wall
42
What Are Potential Factors that May Causes Interference Among WLAN Products
42
What's the Difference between a WLAN and a WWAN
42
Can I Manually Swap the Wireless Module Without Damage any Hardware
43
What Wireless Security Mode Does P-662HW-D Support
43
What Wireless Standard Does P-662HW-D Support
43
Does P-662HW-D Support MAC Filtering
43
Does P-662HW-D Support Auto Rate Adaption
43
Advanced FAQ
43
What Is Ad Hoc Mode
43
What Is Infrastructure Mode
43
How Many Access Points Are Required in a Given Area
43
What Is Direct-Sequence Spread Spectrum Technology - (DSSS)
44
What Is Frequency-Hopping Spread Spectrum Technology - (FHSS)
44
Do I Need the same Kind of Antenna on both Sides of a Link
44
Why the 2.4 GHZ Frequency Range
44
What Is Server Set ID (SSID)
44
What Is an ESSID
44
Security FAQ
45
How Do I Secure the Data Across the P-662HW-D Access Point's Radio Link
45
What Is WEP
45
What Is WPA
45
What Is the Difference between 40-Bit and 64-Bit WEP
46
What Is a WEP Key
46
Will 128-Bit WEP Communicate with 64-Bit WEP
46
Can the SSID be Encrypted
46
By Turning off the Broadcast of SSID, Can Someone Still Sniff the SSID
46
What Are Insertion Attacks
46
What Is Wireless Sniffer
46
What Is OTIST? How Do I Use It
46
ZyXEL Communications P-662HW-D - V3.40 Quick Start Manual (7 pages)
ADSL2+ 4-Port Wireless Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.8 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Status Page
3
Internet Setup
4
Troubleshooting
6
Advertisement
ZyXEL Communications P-662HW-D - V3.40 Quick Start Manual (7 pages)
ZyXEL Communications Wireless Security Gateway Quick Start Guide
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 6.1 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Status Page
3
Internet Setup
4
Troubleshooting
6
ZyXEL Communications P-662HW-D - V3.40 Brochure (2 pages)
ADSL2+ 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.3 MB
Advertisement
Related Products
ZyXEL Communications P-662H-D Series
ZyXEL Communications P-662H-D - V3.40
ZyXEL Communications P-660H-T3
ZyXEL Communications P-660HN-TxA
ZyXEL Communications P-660H-TX
ZyXEL Communications P-660HNT1
ZyXEL Communications P-661HNU Series
ZyXEL Communications P-660HW-D1 V2
ZyXEL Communications P-660HHW - VERSION 3.40
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL