ZyXEL Communications ADSL 2+ Gateway P-660HW-T1 User Manual

Adsl 2+ gateway
Hide thumbs Also See for ADSL 2+ Gateway P-660HW-T1:
Table of Contents

Advertisement

P-660H/HW/W-T Series
ADSL 2+ Gateway
User's Guide
Version 3.40
6/2005

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ADSL 2+ Gateway P-660HW-T1

  • Page 1 P-660H/HW/W-T Series ADSL 2+ Gateway User’s Guide Version 3.40 6/2005...
  • Page 2: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 3: Federal Communications Commission (Fcc) Interference Statement

    P-660H/HW/W-T Series User’ Guide Federal Communications Commission (FCC) Interference This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 4 This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. ZyXEL Communications Corporation declared that Prestige 660HW-T1 is limited in CH1~11 from 2400 to 2483.5 MHz by specified firmware controlled in USA. Certifications Go to www.zyxel.com...
  • Page 5: Safety Warnings

    P-660H/HW/W-T Series User’ Guide For your safety, be sure to read and follow all warning notices and instructions. • To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord. • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks.
  • Page 6: Zyxel Limited Warranty

    P-660H/HW/W-T Series User’ Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever...
  • Page 7: Customer Support

    +47 22 80 61 81 +34 902 195 420 www.zyxel.es +34 913 005 345 +46 31 744 7700 www.zyxel.se +46 31 744 7701 REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská...
  • Page 8 P-660H/HW/W-T Series User’ Guide TELEPHONE WEB SITE FTP SITE +44 (0) 1344 303044 www.zyxel.co.uk 08707 555779 (UK only) +44 (0) 1344 303034 ftp.zyxel.co.uk REGULAR MAIL ZyXEL Communications UK Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
  • Page 9 P-660H/HW/W-T Series User’ Guide Customer Support...
  • Page 10: Table Of Contents

    Copyright ... 2 Federal Communications Commission (FCC) Interference Statement ... 3 Safety Warnings ... 5 ZyXEL Limited Warranty... 6 Customer Support... 7 Table of Contents ... 10 List of Figures ... 24 List of Tables ... 32 Preface ... 38 Introduction to DSL...
  • Page 11 P-660H/HW/W-T Series User’ Guide Chapter 3 Wizard Setup for Internet Access ... 54 3.1 Introduction ...54 3.1.1 Internet Access Wizard Setup ...54 Chapter 4 LAN Setup... 62 4.1 LAN Overview ...62 4.1.1 LANs, WANs and the Prestige ...62 4.1.2 DHCP Setup ...63 4.1.2.1 IP Pool Setup ...63 4.1.3 DNS Server Address ...63 4.1.4 DNS Server Address Assignment ...63...
  • Page 12 5.8 Configuring Local User Authentication ...85 5.9 Configuring RADIUS ...87 Chapter 6 WAN Setup... 90 6.1 WAN Overview ...90 6.1.1 Encapsulation ...90 6.1.1.1 ENET ENCAP ...90 6.1.1.2 PPP over Ethernet ...90 6.1.1.3 PPPoA ...90 6.1.1.4 RFC 1483 ...91 6.1.2 Multiplexing ...91 6.1.2.1 VC-based Multiplexing ...91 6.1.2.2 LLC-based Multiplexing ...91 6.1.3 VPI and VCI ...91...
  • Page 13 P-660H/HW/W-T Series User’ Guide 7.4 Selecting the NAT Mode ...107 7.5 Configuring SUA Server Set ...108 7.6 Configuring Address Mapping Rules ...110 7.7 Editing an Address Mapping Rule ... 111 Chapter 8 Dynamic DNS Setup... 114 8.1 Dynamic DNS Overview ...114 8.1.1 DYNDNS Wildcard ...114 8.2 Configuring Dynamic DNS ...114 Chapter 9...
  • Page 14 Chapter 11 Firewall Configuration ... 132 11.1 Access Methods ...132 11.2 Firewall Policies Overview ...132 11.3 Rule Logic Overview ...133 11.3.1 Rule Checklist ...133 11.3.2 Security Ramifications ...133 11.3.3 Key Fields For Configuring Rules ...134 11.3.3.1 Action ...134 11.3.3.2 Service ...134 11.3.3.3 Source Address ...134 11.3.3.4 Destination Address ...134 11.4 Connection Direction ...134...
  • Page 15 P-660H/HW/W-T Series User’ Guide 13.2 Telnet ...159 13.3 FTP ...160 13.4 Web ...160 13.5 Configuring Remote Management ...160 Chapter 14 Universal Plug-and-Play (UPnP) ... 162 14.1 Introducing Universal Plug and Play ...162 14.1.1 How do I know if I'm using UPnP? ...162 14.1.2 NAT Traversal ...162 14.1.3 Cautions with UPnP ...163 14.2 UPnP and ZyXEL ...163...
  • Page 16 16.9 Configuring Summary ...188 16.10 Configuring Class Setup 16.10.1 Media Bandwidth Management Class Configuration ...190 16.10.2 Media Bandwidth Management Statistics ...193 16.11 Bandwidth Monitor ...194 Chapter 17 Maintenance ... 196 17.1 Maintenance Overview ...196 17.2 System Status Screen ...196 17.2.1 System Statistics ...198 17.3 DHCP Table Screen ...200 17.4 Any IP Table Screen ...201 17.5 Wireless Screen ...201...
  • Page 17 P-660H/HW/W-T Series User’ Guide Chapter 21 Menu 3 LAN Setup ... 222 21.1 LAN Setup ...222 21.1.1 General Ethernet Setup ...222 21.2 Protocol Dependent Ethernet Setup ...223 21.3 TCP/IP Ethernet Setup and DHCP ...223 Chapter 22 Wireless LAN Setup ... 226 22.1 Wireless LAN Overview ...226 22.2 Wireless LAN Setup ...226 22.2.1 Wireless LAN MAC Address Filter ...227...
  • Page 18 25.2 Configuration ...246 Chapter 26 Bridging Setup ... 250 26.1 Bridging in General ...250 26.2 Bridge Ethernet Setup ...250 26.2.1 Remote Node Bridging Setup ...250 26.2.2 Bridge Static Route Setup ...252 Chapter 27 Network Address Translation (NAT) ... 254 27.1 Using NAT ...254 27.1.1 SUA (Single User Account) Versus NAT ...254 27.2 Applying NAT ...254 27.3 NAT Setup ...256...
  • Page 19 P-660H/HW/W-T Series User’ Guide 29.7 Applying Filters and Factory Defaults ...283 29.7.1 Ethernet Traffic ...284 29.7.2 Remote Node Filters ...284 Chapter 30 SNMP Configuration ... 286 30.1 About SNMP ...286 30.2 Supported MIBs ...287 30.3 SNMP Configuration ...287 30.4 SNMP Traps ...288 Chapter 31 System Security ...
  • Page 20 33.3 Restore Configuration ...311 33.3.1 Restore Using FTP ...311 33.3.2 Restore Using FTP Session Example ...312 33.4 Uploading Firmware and Configuration Files ...313 33.4.1 Firmware File Upload ...313 33.4.2 Configuration File Upload ...313 33.4.3 FTP File Upload Command from the DOS Prompt Example ...314 33.4.4 FTP Session Example of Firmware File Upload ...315 33.4.5 TFTP File Upload ...315 33.4.6 TFTP Upload Command Example ...316...
  • Page 21 P-660H/HW/W-T Series User’ Guide Chapter 38 Troubleshooting ... 342 38.1 Problems Starting Up the Prestige ...342 38.2 Problems with the LAN ...342 38.3 Problems with the WAN ...343 38.4 Problems Accessing the Prestige ...344 38.4.1 Pop-up Windows, JavaScripts and Java Permissions ...344 38.4.1.1 Internet Explorer Pop-up Blockers ...344 38.4.1.2 JavaScripts ...347 38.4.1.3 Java Permissions ...349...
  • Page 22 Command Usage ... 386 Appendix G Firewall Commands ... 388 Appendix H NetBIOS Filter Commands ... 394 Introduction ... 394 Display NetBIOS Filter Settings ... 394 NetBIOS Filter Configuration... 395 Appendix I Splitters and Microfilters ... 398 Connecting a POTS Splitter ... 398 Telephone Microfilters ...
  • Page 23 P-660H/HW/W-T Series User’ Guide Appendix M Internal SPTGEN ... 430 Internal SPTGEN Overview ... 430 The Configuration Text File Format... 430 Internal SPTGEN FTP Download Example... 431 Internal SPTGEN FTP Upload Example ... 432 Command Examples... 453 Index... 456 Table of Contents...
  • Page 24: List Of Figures

    P-660H/HW/W-T Series User’ Guide List of Figures Figure 1 Protected Internet Access Applications ... 46 Figure 2 LAN-to-LAN Application Example ... 46 Figure 3 Password Screen ... 49 Figure 4 Change Password at Login ... 49 Figure 5 Web Configurator: Site Map Screen ... 50 Figure 6 Password ...
  • Page 25 P-660H/HW/W-T Series User’ Guide Figure 39 Multiple Servers Behind NAT Example ... 107 Figure 40 NAT Mode ... 108 Figure 41 Edit SUA/NAT Server Set ... 109 Figure 42 Address Mapping Rules ... 110 Figure 43 Edit Address Mapping Rule Figure 44 Dynamic DNS ...
  • Page 26 P-660H/HW/W-T Series User’ Guide Figure 82 Network Connections: My Network Places ... 174 Figure 83 Network Connections: My Network Places: Properties: Example ... 174 Figure 84 Log Settings ... 177 Figure 85 View Logs ... 179 Figure 86 E-mail Log Example ... 180 Figure 87 Application-based Bandwidth Management Example ...
  • Page 27 P-660H/HW/W-T Series User’ Guide Figure 125 Menu 11.1 Remote Node Profile ... 238 Figure 126 Menu 11.3 Remote Node Network Layer Options ... 240 Figure 127 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection ... 242 Figure 128 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) ... 242 Figure 129 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) ...
  • Page 28 P-660H/HW/W-T Series User’ Guide Figure 168 NetBIOS_LAN Filter Rules Summary ... 275 Figure 169 IGMP Filter Rules Summary ... 275 Figure 170 Menu 21.1.x.1 TCP/IP Filter Rule ... 277 Figure 171 Executing an IP Filter ... 279 Figure 172 Menu 21.1.5.1 Generic Filter Rule ... 280 Figure 173 Protocol and Device Filter Sets ...
  • Page 29 P-660H/HW/W-T Series User’ Guide Figure 211 Menu 25 IP Routing Policy Setup ... 329 Figure 212 Menu 25.1 IP Routing Policy Setup ... 330 Figure 213 Menu 25.1.1 IP Routing Policy ... 331 Figure 214 Menu 3.2 TCP/IP and DHCP Ethernet Setup ... 333 Figure 215 Menu 11.3 Remote Node Network Layer Options ...
  • Page 30 P-660H/HW/W-T Series User’ Guide Figure 254 Red Hat 9.0: Restart Ethernet Card ... 375 Figure 255 Red Hat 9.0: Checking TCP/IP Properties ... 375 Figure 256 Option to Enter Debug Mode ... 384 Figure 257 Boot Module Commands ... 385 Figure 258 Connecting a POTS Splitter ...
  • Page 31 P-660H/HW/W-T Series User’ Guide List of Figures...
  • Page 32: List Of Tables

    P-660H/HW/W-T Series User’ Guide List of Tables Table 1 ADSL Standards ... 42 Table 2 Front Panel LEDs ... 47 Table 3 Web Configurator Screens Summary ... 50 Table 4 Password ... 53 Table 5 Internet Access Wizard Setup: ISP Parameters ... 55 Table 6 Internet Connection with PPPoE ...
  • Page 33 P-660H/HW/W-T Series User’ Guide Table 39 Firewall: Edit Rule ... 140 Table 40 Customized Services ... 141 Table 41 Firewall: Configure Customized Services ... 142 Table 42 Predefined Services ... 146 Table 43 Firewall: Anti Probing ... 149 Table 44 Firewall: Threshold ... 152 Table 45 ...
  • Page 34 P-660H/HW/W-T Series User’ Guide Table 82 Menu 3.2.1 IP Alias Setup ... 232 Table 83 Menu 4 Internet Access Setup ... 234 Table 84 Menu 11.1 Remote Node Profile ... 238 Table 85 Menu 11.3 Remote Node Network Layer Options ... 240 Table 86 Menu 11.8 Advance Setup Options ...
  • Page 35 P-660H/HW/W-T Series User’ Guide Table 125 Allowed IP Address Range By Class ... 377 Table 126 “Natural” Masks ... 377 Table 127 Alternative Subnet Mask Notation ... 378 Table 128 Two Subnets Example ... 378 Table 129 Subnet 1 ... 379 Table 130 Subnet 2 ...
  • Page 36 P-660H/HW/W-T Series User’ Guide Table 168 Menu 15 SUA Server Setup (SMT Menu 15) ... 442 Table 169 Menu 21.1 Filter Set #1 (SMT Menu 21.1) ... 444 Table 170 Menu 21.1 Filer Set #2, (SMT Menu 21.1) ... 447 Table 171 Menu 23 System Menus (SMT Menu 23) ...
  • Page 37 P-660H/HW/W-T Series User’ Guide List of Tables...
  • Page 38: Preface

    Congratulations on your purchase of the P-660H/HW/W T series ADSL 2+ gateway. P-660W and P-660HW come with biult-in IEEE 802.11g wireless capability allowing wireless connectivity. P-660H and P-660HW have a 4-port switch that allows you to connect up to 4 computers to the Prestige without purchasing a switch/hub.
  • Page 39: User Guide Feedback

    Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 40: Introduction To Dsl

    P-660H/HW/W-T Series User’ Guide Introduction to DSL DSL (Digital Subscriber Line) technology enhances the data capacity of the existing twisted- pair wire that runs between the local telephone company switching offices and most homes and offices. While the wire itself can handle higher frequencies, the telephone switching equipment is designed to cut off signals above 4,000 Hz to filter noise off the voice line, but now everybody is searching for ways to get more bandwidth to improve access to the Web - hence DSL technologies.
  • Page 41 P-660H/HW/W-T Series User’ Guide Introduction to DSL...
  • Page 42: Getting To Know Your Prestige

    Getting To Know Your Prestige This chapter describes the key features and applications of your Prestige 1.1 Introducing the Prestige The Prestige is an ADSL2+ gateway that allows super-fast, secure Internet access over analog (POTS) or digital (ISDN) telephone lines (depending on your model). In the Prestige product name, “H”...
  • Page 43: High Speed Internet Access

    P-660H/HW/W-T Series User’ Guide Note: See the product specifications in the appendix for detailed features and standards support. High Speed Internet Access Your Prestige ADSL/ADSL2/ADSL2+ router can support downstream transmission rates of up to 24Mbps and upstream transmission rates of 3.5Mbps. Actual speeds attained depend on the ADSL service you subscribed to, distance from your ISP, line quality, etc.
  • Page 44: Dynamic Dns Support

    Universal Plug and Play (UPnP) Using the standard TCP/IP protocol, the Prestige and other UPnP enabled devices can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network. PPPoE (RFC2516) PPPoE (Point-to-Point Protocol over Ethernet) emulates a dial-up connection. It allows your ISP to use their existing network configuration with newer broadband technologies such as ADSL.
  • Page 45: Wireless Features (P-660Hw/P-660W)

    P-660H/HW/W-T Series User’ Guide Packet Filters The Prestige's packet filtering functions allows added network security and management. Housing Your Prestige's compact and ventilated housing minimizes space requirements making it easy to position anywhere in your busy office. 4-Port Switch (P-660H/P-660HW) A combination of switch and router makes your Prestige a cost-effective and viable network solution.
  • Page 46: Applications For The Prestige

    1.3 Applications for the Prestige Here are some example uses for which the Prestige is well suited. Application graphics shown are for the P-660W. 1.3.1 Protected Internet Access The Prestige is the ideal high-speed Internet access solution. It is compatible with all major ADSL DSLAM (Digital Subscriber Line Access Multiplexer) providers and supports the ADSL standards as shown in clients access to your network resources.
  • Page 47: Hardware Connection

    P-660H/HW/W-T Series User’ Guide The following table describes the LEDs. Table 2 Front Panel LEDs COLOR PWR/SYS Green Green Amber WLAN (P- Green 660HW/ P- 660W) DSL/PPP Green Amber 1.5 Hardware Connection Refer to the Quick Start Guide for information on hardware connection. STATUS DESCRIPTION The Prestige is receiving power and functioning properly.
  • Page 48: Introducing The Web Configurator

    This chapter describes how to access and navigate the web configurator. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy Prestige setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
  • Page 49: Resetting The Prestige

    P-660H/HW/W-T Series User’ Guide Figure 3 Password Screen 6 It is highly recommended you change the default password! Enter a new password between 1 and 30 characters, retype it to confirm and click Apply; alternatively click Ignore to proceed to the main menu if you do not want to change the password now. Note: If you do not change the password at least once, the following screen appears every time you log in.
  • Page 50: Navigating The Web Configurator

    2.1.3 Navigating the Web Configurator The following summarizes how to navigate the web configurator from the SITE MAP screen. We use the Prestige 660W-T1 web screens in this guide as an example. Screens vary slightly for different Prestige models. • Click Wizard Setup to begin a series of screens to configure your Prestige for the first time.
  • Page 51 P-660H/HW/W-T Series User’ Guide Table 3 Web Configurator Screens Summary (continued) LINK SUB-LINK Wireless LAN Wireless (P-660W / P- MAC Filter 660HW only) 802.1x/WPA Local User Database RADIUS WAN Setup WAN Backup SUA Only Full Feature Dynamic DNS Time and Date Firewall Default Policy Rule Summary...
  • Page 52: Change Login Password

    Table 3 Web Configurator Screens Summary (continued) LINK SUB-LINK DHCP Table Any IP Table Wireless LAN Association List (P-660W / P- 660HW only) Diagnostic General DSL Line Firmware LOGOUT 2.2 Change Login Password It is highly recommended that you periodically change the password for accessing the Prestige.
  • Page 53: Table 4 Password

    P-660H/HW/W-T Series User’ Guide Table 4 Password LABEL DESCRIPTION Old Password Type the default password or the existing password you use to access the system in this field. New Password Type the new password in this field. Retype to Confirm Type the new password again in this field.
  • Page 54: Wizard Setup For Internet Access

    Wizard Setup for Internet Access This chapter provides information on the Wizard Setup screens for Internet access in the web configurator. 3.1 Introduction Use the Wizard Setup screens to configure your system for Internet access with the information given to you by your ISP. Note: See the advanced menu chapters for background information on these fields.
  • Page 55: Figure 8 Internet Connection With Pppoe

    P-660H/HW/W-T Series User’ Guide Table 5 Internet Access Wizard Setup: ISP Parameters LABEL DESCRIPTION Mode From the Mode drop-down list box, select Routing (default) if your ISP allows multiple computers to share an Internet account. Otherwise select Bridge. Encapsulation Select the encapsulation type your ISP uses from the Encapsulation drop-down list box.
  • Page 56: Figure 9 Internet Connection With Rfc 1483

    Table 6 Internet Connection with PPPoE LABEL DESCRIPTION Service Name Type the name of your PPPoE service here. User Name Enter the user name exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
  • Page 57: Figure 10 Internet Connection With Enet Encap

    P-660H/HW/W-T Series User’ Guide Table 7 Internet Connection with RFC 1483 (continued) LABEL DESCRIPTION Back Click Back to go back to the first wizard screen. Next Click Next to continue to the next wizard screen. Figure 10 Internet Connection with ENET ENCAP The following table describes the fields in this screen.
  • Page 58: Figure 11 Internet Connection With Pppoa

    Figure 11 Internet Connection with PPPoA The following table describes the fields in this screen. Table 9 Internet Connection with PPPoA LABEL DESCRIPTION User Name Enter the login name that your ISP gives you. Password Enter the password associated with the user name above. IP Address This option is available if you select Routing in the Mode field.
  • Page 59: Figure 12 Internet Access Wizard Setup: Third Screen

    P-660H/HW/W-T Series User’ Guide 3 Verify the settings in the screen shown next. To change the LAN information on the Prestige, click Change LAN Configurations. Otherwise click Save Settings to save the configuration and skip to the section 3.13. Figure 12 Internet Access Wizard Setup: Third Screen If you want to change your Prestige LAN settings, click Change LAN Configuration to display the screen as shown next.
  • Page 60: Figure 14 Internet Access Wizard Setup: Connection Tests

    The following table describes the fields in this screen. Table 10 Internet Access Wizard Setup: LAN Configuration LABEL LAN IP Address LAN Subnet Mask DHCP DHCP Server Client IP Pool Starting Address Size of Client IP Pool Primary DNS Server Secondary DNS Server As above.
  • Page 61 P-660H/HW/W-T Series User’ Guide Chapter 3 Wizard Setup for Internet Access...
  • Page 62: Chapter 4 Lan Setup

    This chapter describes how to configure LAN settings. 4.1 LAN Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 63: Dhcp Setup

    P-660H/HW/W-T Series User’ Guide 4.1.2 DHCP Setup DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the Prestige as a DHCP server or disable it. When configured as a server, the Prestige provides the TCP/IP configuration for the clients.
  • Page 64: Lan Tcp/Ip

    There are two ways that an ISP disseminates the DNS server addresses. • The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, enter them in the DNS Server fields in the LAN Setup screen.
  • Page 65: Private Ip Addresses

    P-660H/HW/W-T Series User’ Guide 4.2.1.1 Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: •...
  • Page 66: Multicast

    4.2.3 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
  • Page 67: How Any Ip Works

    P-660H/HW/W-T Series User’ Guide Figure 16 Any IP Example The Any IP feature does not apply to a computer using either a dynamic IP address or a static IP address that is in the same subnet as the Prestige’s IP address. Note: You must enable NAT/SUA to use the Any IP feature on the Prestige.
  • Page 68: Configuring Lan

    4.3 Configuring LAN Click LAN to open the LAN Setup screen. See information. Figure 17 LAN Setup The following table describes the fields in this screen. Table 11 LAN Setup LABEL DESCRIPTION DHCP DHCP If set to Server, your Prestige can assign IP addresses, an IP default gateway and DNS servers to Windows 95, Windows NT and other systems that support the DHCP client.
  • Page 69 P-660H/HW/W-T Series User’ Guide Table 11 LAN Setup (continued) LABEL DESCRIPTION Size of Client IP This field specifies the size or count of the IP address pool. Pool Primary DNS Server Enter the IP addresses of the DNS servers. The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask.
  • Page 70: Chapter 5 Wireless Lan

    This chapter discusses how to configure the Wireless LAN screens for P-660HW or P-660W. 5.1 Wireless LAN Introduction A wireless LAN can be as simple as two computers with wireless LAN adapters communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN adapters communicating through access points which bridge network traffic to the wired LAN.
  • Page 71: Restricted Access

    P-660H/HW/W-T Series User’ Guide • Use RADIUS authentication if you have a RADIUS server. See the appendices for information on protocols used when a client authenticates with a RADIUS server via the Prestige. • Use the Local User Database if you have less than 32 wireless clients in your network. The Prestige uses MD5 encryption when a client authenticates with the Local User Database 5.2.3 Restricted Access...
  • Page 72: Figure 18 Wireless Lan

    Figure 18 Wireless LAN The following table describes the links in this screen. Table 12 Wireless LAN LINK DESCRIPTION Wireless Click this link to go to a screen where you can configure the ESSID and WEP. Note: If you configure WEP, you can’t configure WPA or WPA- MAC Filter Click this link to go to a screen where you can restrict access to your wireless network by MAC address.
  • Page 73: Configuring The Wireless Screen

    P-660H/HW/W-T Series User’ Guide Figure 19 Wireless Security Methods Note: You must enable the same wireless security settings on the Prestige and on all wireless clients that you want to associate with it. If you do not enable any wireless security on your Prestige, your network is accessible to any wireless networking device that is within range.
  • Page 74: Figure 20 Wireless Screen

    Figure 20 Wireless Screen The following table describes the labels in this screen. Table 13 Wireless LAN LABEL DESCRIPTION Enable Wireless You should configure some wireless security (see enable the wireless LAN. Select the check box to enable the wireless LAN. ESSID The ESSID (Extended Service Set IDentification) is a unique name to identify the Prestige in the wireless LAN.
  • Page 75: Configuring Mac Filters

    P-660H/HW/W-T Series User’ Guide Table 13 Wireless LAN (continued) LABEL DESCRIPTION Fragmentation This is the threshold (number of bytes) for the fragmentation boundary for directed Threshold messages. It is the maximum data fragment size that can be sent. Select the check box to change the default value and enter a value between 256 and 2432.
  • Page 76: Figure 21 Mac Filter

    Note: Be careful not to list your computer’s MAC address and set the Action field to Deny Association when managing the Prestige via a wireless connection. This would lock you out. Figure 21 MAC Filter The following table describes the fields in this menu. Table 14 MAC Filter LABEL DESCRIPTION...
  • Page 77: Introduction To Wpa

    P-660H/HW/W-T Series User’ Guide Table 14 MAC Filter (continued) LABEL DESCRIPTION MAC Address Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc of the wireless stations that are allowed or denied access to the Prestige in these address fields. Back Click Back to go to the main wireless LAN setup screen.
  • Page 78: Wpa With Radius Application Example

    Figure 22 WPA - PSK Authentication 5.6.2 WPA with RADIUS Application Example You need the IP address, port number (default is 1812) and shared secret of a RADIUS server. A WPA application example with an external RADIUS server looks as follows. "A" is the RADIUS server.
  • Page 79: Wireless Client Wpa Supplicants

    P-660H/HW/W-T Series User’ Guide Figure 23 WPA with RADIUS Application Example2 5.6.3 Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicants are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data Communications' AEGIS client.
  • Page 80: No Access Allowed Or Authentication

    5.7.1 No Access Allowed or Authentication Select No Access Allowed or No Authentication Required in the Wireless Port Control field. Figure 24 Wireless LAN: 802.1x/WPA: No Access Allowed Figure 25 Wireless LAN: 802.1x/WPA: No Authentication The following table describes the label in these screens. Table 15 Wireless LAN: 802.1x/WPA: No Access/Authentication LABEL DESCRIPTION...
  • Page 81: Figure 26 Wireless Lan: 802.1X/Wpa: 802.1Xl

    P-660H/HW/W-T Series User’ Guide • A computer with an IEEE 802.11 a/b/g wireless LAN adapter and equipped with a web browser (with JavaScript enabled) and/or Telnet. • A wireless station computer must be running IEEE 802.1x-compliant software. Not all Windows operating systems support IEEE 802.1x (see the Microsoft web site for details). For other operating systems, see their documentation.
  • Page 82: Authentication Required: Wpa

    Table 16 Wireless LAN: 802.1x/WPA: 802.1x (continued) LABEL DESCRIPTION Idle Timeout The Prestige automatically disconnects a wireless station from the wired network after a period of inactivity. The wireless station needs to enter the username and (in Seconds) password again before access to the wired network is allowed. This field is activated only when you select Authentication Required in the Wireless Port Control field.
  • Page 83: Figure 27 Wireless Lan: 802.1X/Wpa: Wpa

    P-660H/HW/W-T Series User’ Guide Section 5.6 on page 77 Figure 27 Wireless LAN: 802.1x/WPA: WPA The following table describes the labels not previously discussed. Table 17 Wireless LAN: 802.1x/WPA: WPA LABEL DESCRIPTION Key Management Choose WPA in this field. Protocol WPA Mixed Mode The Prestige can operate in WPA Mixed Mode, which supports both clients running WPA and clients running dynamic WEP key exchange with 802.1x in the...
  • Page 84: Authentication Required: Wpa-Psk

    5.7.4 Authentication Required: WPA-PSK Select Authentication Required in the Wireless Port Control field and WPA-PSK in the Key Management Protocol field to display the next screen. Section 5.6 on page 77 Figure 28 Wireless LAN: 802.1x/WPA:WPA-PSK The following table describes the labels not previously discussed. Table 18 Wireless LAN: 802.1x/WPA: WPA-PSK LABEL DESCRIPTION...
  • Page 85: Configuring Local User Authentication

    P-660H/HW/W-T Series User’ Guide Table 18 Wireless LAN: 802.1x/WPA: WPA-PSK (continued) LABEL DESCRIPTION Group Data Privacy Group Data Privacy allows you to choose TKIP (recommended) or WEP for broadcast and multicast ("group") traffic if the Key Management Protocol is WPA and WPA Mixed Mode is disabled. WEP is used automatically if you have enabled WPA Mixed Mode.
  • Page 86: Figure 29 Local User Database

    Figure 29 Local User Database The following table describes the fields in this screen. Table 19 Local User Database LABEL DESCRIPTION This is the index number of a local user account. Active Select this check box to enable the user profile. User Name Enter a user name of up to 31 alphanumeric characters (case-sensitive), hyphens ('-') and underscores ('_') if you’re using MD5 encryption and maximum 14 if you’re using...
  • Page 87: Configuring Radius

    P-660H/HW/W-T Series User’ Guide 5.9 Configuring RADIUS To set up your Prestige’s RADIUS server settings, click WIRELESS LAN, RADIUS. The screen appears as shown. Figure 30 RADIUS The following table describes the fields in this screen. Table 20 RADIUS LABEL Authentication Server Active Server IP Address...
  • Page 88 Table 20 RADIUS (continued) LABEL Port Number Shared Secret Back Apply Cancel Chapter 5 Wireless LAN P-660H/HW/W-T Series User’ Guide DESCRIPTION The default port of the RADIUS server for accounting is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
  • Page 89 P-660H/HW/W-T Series User’ Guide Chapter 5 Wireless LAN...
  • Page 90: Chapter 6 Wan Setup

    This chapter describes how to configure WAN settings. 6.1 WAN Overview A WAN (Wide Area Network) is an outside connection to another network or the Internet. 6.1.1 Encapsulation Be sure to use the encapsulation method required by your ISP. The Prestige supports the following methods.
  • Page 91: Rfc 1483

    P-660H/HW/W-T Series User’ Guide 6.1.1.4 RFC 1483 RFC 1483 describes two methods for Multiprotocol Encapsulation over ATM Adaptation Layer 5 (AAL5). The first method allows multiplexing of multiple protocols over a single ATM virtual circuit (LLC-based multiplexing) and the second method assumes that each protocol is carried over a separate ATM virtual circuit (VC-based multiplexing).
  • Page 92: Ip Assignment With Rfc 1483 Encapsulation

    6.1.4.2 IP Assignment with RFC 1483 Encapsulation In this case the IP Address Assignment must be static with the same requirements for the IP Address and ENET ENCAP Gateway fields as stated above. 6.1.4.3 IP Assignment with ENET ENCAP Encapsulation In this case you can have either a static or dynamic IP.
  • Page 93: Pppoe Encapsulation

    P-660H/HW/W-T Series User’ Guide For example, if the normal route has a metric of "1" and the traffic-redirect route has a metric of "2" and dial-backup route has a metric of "3", then the normal route acts as the primary default route.
  • Page 94: Zero Configuration Internet Access

    Peak Cell Rate (PCR) is the maximum rate at which the sender can send cells. This parameter may be lower (but not higher) than the maximum line speed. 1 ATM cell is 53 bytes (424 bits), so a maximum speed of 832Kbps gives a maximum PCR of 1962 cells/sec. This rate is not guaranteed because it is dependent on the line speed.
  • Page 95: The Main Wan Screen

    P-660H/HW/W-T Series User’ Guide 6.6 The Main WAN Screen Click WAN in the navigation panel to display the man WAN screen. Section 6.1 on page 90 Figure 32 WAN The following table describes the links in this screen. Table 21 WAN LINK DESCRIPTION WAN Setup...
  • Page 96: Figure 33 Wan Setup (Pppoe)

    Figure 33 WAN Setup (PPPoE) The following table describes the fields in this screen. Table 22 WAN Setup LABEL Name Mode Chapter 6 WAN Setup DESCRIPTION Enter the name of your Internet Service Provider, e.g., MyISP. This information is for identification purposes only. Select Routing (default) from the drop-down list box if your ISP allows multiple computers to share an Internet account.
  • Page 97 P-660H/HW/W-T Series User’ Guide Table 22 WAN Setup (continued) LABEL Encapsulation Multiplex Virtual Circuit ID ATM QoS Type Cell Rate Peak Cell Rate Sustain Cell Rate Maximum Burst Size Maximum Burst Size (MBS) refers to the maximum number of cells that can be Login Information Service Name User Name...
  • Page 98: Traffic Redirect

    Table 22 WAN Setup (continued) LABEL Connect on Demand Select Connect on Demand when you don't want the connection up all the time Max Idle Timeout PPPoE Passthrough (PPPoE encapsulation only) Subnet Mask (ENET ENCAP encapsulation only) ENET ENCAP Gateway (ENET ENCAP encapsulation only) Zero Configuration...
  • Page 99: Configuring Wan Backup

    P-660H/HW/W-T Series User’ Guide Figure 34 Traffic Redirect Example The following network topology allows you to avoid triangle route security issues when the backup gateway is connected to the LAN. Use IP alias to configure the LAN into two or three logical networks with the Prestige itself as the gateway for each LAN network.
  • Page 100: Figure 36 Wan Backup

    Figure 36 WAN Backup The following table describes the fields in this screen. Table 23 WAN Backup LABEL DESCRIPTION Backup Type Select the method that the Prestige uses to check the DSL connection. Select DSL Link to have the Prestige check if the connection to the DSLAM is up. Select ICMP to have the Prestige periodically ping the IP addresses configured in the Check WAN IP Address fields.
  • Page 101 P-660H/HW/W-T Series User’ Guide Table 23 WAN Backup (continued) LABEL DESCRIPTION Timeout Type the number of seconds (3 recommended) for your Prestige to wait for a ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request.
  • Page 102: Network Address Translation (Nat) Screens

    Network Address Translation This chapter discusses how to configure NAT on the Prestige. 7.1 NAT Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
  • Page 103: What Nat Does

    P-660H/HW/W-T Series User’ Guide 7.1.2 What NAT Does In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host.
  • Page 104: Nat Application

    Figure 37 How NAT Works 7.1.4 NAT Application The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the Prestige can communicate with three distinct WAN networks. More examples follow at the end of this chapter. Figure 38 NAT Application With IP Alias Chapter 7 Network Address Translation (NAT) Screens P-660H/HW/W-T Series User’...
  • Page 105: Nat Mapping Types

    P-660H/HW/W-T Series User’ Guide 7.1.5 NAT Mapping Types NAT supports five types of IP/port mapping. They are: • One to One: In One-to-One mode, the Prestige maps one local IP address to one global IP address. • Many to One: In Many-to-One mode, the Prestige maps multiple local IP addresses to one global IP address.
  • Page 106: Sua (Single User Account) Versus Nat

    7.2 SUA (Single User Account) Versus NAT SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server. The Prestige also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types as outlined in •...
  • Page 107: Configuring Servers Behind Sua (Example)

    P-660H/HW/W-T Series User’ Guide Table 26 Services and Port Numbers (continued) SERVICES SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) Finger HTTP (Hyper Text Transfer protocol or WWW, Web) POP3 (Post Office Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol) SNMP trap PPTP (Point-to-Point Tunneling Protocol) 7.3.3 Configuring Servers Behind SUA (Example)
  • Page 108: Configuring Sua Server Set

    Figure 40 NAT Mode The following table describes the labels in this screen. Table 27 NAT Mode LABEL DESCRIPTION None Select this radio button to disable NAT. SUA Only Select this radio button if you have just one public WAN IP address for your Prestige. The Prestige uses Address Mapping Set 1 in the NAT - Edit SUA/NAT Server Set screen.
  • Page 109: Figure 41 Edit Sua/Nat Server Set

    P-660H/HW/W-T Series User’ Guide Figure 41 Edit SUA/NAT Server Set The following table describes the fields in this screen. Table 28 Edit SUA/NAT Server Set LABEL Start Port No. Enter a port number in this field. To forward only one port, enter the port number again in the End Port No. field. To forward a series of ports, enter the start port number here and the end port number in the End Port No.
  • Page 110: Configuring Address Mapping Rules

    7.6 Configuring Address Mapping Rules Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules.
  • Page 111: Editing An Address Mapping Rule

    P-660H/HW/W-T Series User’ Guide Table 29 Address Mapping Rules (continued) LABEL DESCRIPTION Type 1-1: One-to-one mode maps one local IP address to one global IP address. Note that port numbers do not change for the One-to-one NAT mapping type. M-1: Many-to-One mode maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature that previous ZyXEL routers supported only.
  • Page 112: Figure 43 Edit Address Mapping Rule

    Figure 43 Edit Address Mapping Rule The following table describes the fields in this screen. Table 30 Edit Address Mapping Rule LABEL Type Choose the port mapping type from one of the following. • One-to-One: One-to-One mode maps one local IP address to one global IP address.
  • Page 113 P-660H/HW/W-T Series User’ Guide Table 30 Edit Address Mapping Rule (continued) LABEL Cancel Click Cancel to return to the previously saved settings. Delete Click Delete to exit this screen without saving. DESCRIPTION Chapter 7 Network Address Translation (NAT) Screens...
  • Page 114: Chapter 8 Dynamic Dns Setup

    This chapter discusses how to configure your Prestige to use Dynamic DNS. 8.1 Dynamic DNS Overview Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
  • Page 115: Figure 44 Dynamic Dns

    P-660H/HW/W-T Series User’ Guide Figure 44 Dynamic DNS The following table describes the fields in this screen. Table 31 Dynamic DNS LABEL DESCRIPTION Active Select this check box to use dynamic DNS. Service Provider This is the name of your Dynamic DNS service provider. Host Names Type the domain name assigned to your Prestige by your Dynamic DNS provider.
  • Page 116: Chapter 9 Time And Date

    This screen is not available on all models. Use this screen to configure the Prestige’s time and date settings. 9.1 Configuring Time and Date To change your Prestige’s time and date, click Time And Date. The screen appears as shown. Use this screen to configure the Prestige’s time based on your local time zone.
  • Page 117: Table 32 Time And Date

    P-660H/HW/W-T Series User’ Guide Table 32 Time and Date LABEL DESCRIPTION Time Server Use Protocol when Select the time service protocol that your time server sends when you turn on the Bootup Prestige. Not all time servers support all protocols, so you may have to check with your ISP/network administrator or use trial and error to find a protocol that works.
  • Page 118: Chapter 10 Firewalls

    This chapter gives some background information on firewalls and introduces the Prestige firewall. 10.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term “firewall” is a system or group of systems that enforces an access-control policy between two networks.
  • Page 119: Application-Level Firewalls

    P-660H/HW/W-T Series User’ Guide 10.2.2 Application-level Firewalls Application-level firewalls restrict access by serving as proxies for external servers. Since they use programs written for specific Internet services, such as HTTP, FTP and telnet, they can evaluate network packets for valid application-specific data. Application-level gateways have a number of general advantages over the default mode of permitting application traffic directly to internal hosts: Information hiding prevents the names of internal systems from being made known via DNS...
  • Page 120: Denial Of Service Attacks

    • The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world. These computers will have access to Internet services such as e-mail, FTP, and the World Wide Web. However, “inbound access” will not be allowed unless you configure remote management or create a firewall rule to allow a remote host to use a specific service.
  • Page 121: Types Of Dos Attacks

    P-660H/HW/W-T Series User’ Guide Table 33 Common IP Ports Telnet SMTP 10.4.2 Types of DoS Attacks There are four types of DoS attacks: 1 Those that exploit bugs in a TCP/IP implementation. 2 Those that exploit weaknesses in the TCP/IP specification. 3 Brute-force attacks that flood a network with useless data.
  • Page 122: Figure 47 Three-Way Handshake

    Figure 47 Three-Way Handshake Under normal circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment).
  • Page 123: Icmp Vulnerability

    P-660H/HW/W-T Series User’ Guide (ICMP) echo request packets (pings). Since the destination IP address of each packet is the broadcast address of the network, the router will broadcast the ICMP echo request packet to all hosts on the network. If there are numerous hosts, this will create a large amount of ICMP echo request and response traffic.
  • Page 124: Traceroute

    Table 35 Legal NetBIOS Commands RETARGET: KEEPALIVE: All SMTP commands are illegal except for those displayed in the following tables. Table 36 Legal SMTP Commands AUTH DATA EHLO QUIT RCPT RSET 10.4.2.3 Traceroute Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of the network topology inside the firewall.
  • Page 125: Stateful Inspection Process

    P-660H/HW/W-T Series User’ Guide Figure 50 Stateful Inspection The previous figure shows the Prestige’s default firewall rules in action as well as demonstrates how stateful inspection works. User A can initiate a Telnet session from within the LAN and responses to this request are allowed. However other Telnet traffic initiated from the WAN is blocked.
  • Page 126: Stateful Inspection And The Prestige

    temporary entries might be modified, in order to permit only packets that are valid for the current state of the connection. 8 Any additional inbound or outbound packets that belong to the connection are inspected to update the state table entry and to modify the temporary inbound access list entries as required, and are forwarded through the interface.
  • Page 127: Udp/Icmp Security

    P-660H/HW/W-T Series User’ Guide When the Prestige receives any subsequent packet (from the Internet or from the LAN), its connection information is extracted and checked against the cache. A packet is only allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a connection which originated on the LAN).
  • Page 128: Security In General

    • Limit who can telnet into your router. • Don't enable any local service (such as SNMP or NTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network.
  • Page 129: Packet Filtering Vs Firewall

    P-660H/HW/W-T Series User’ Guide • Always shred confidential information, particularly about your computer, before throwing it away. Some hackers dig through the trash of companies or individuals for information that might help them in an attack. 10.7 Packet Filtering Vs Firewall Below are some comparisons between the Prestige’s filtering and firewall functions.
  • Page 130 • A range of source and destination IP addresses as well as port numbers can be specified within one firewall rule making the firewall a better choice when complex rules are required. • To selectively block/allow inbound or outbound traffic between inside host/networks and outside host/networks.
  • Page 131 P-660H/HW/W-T Series User’ Guide Chapter 10 Firewalls...
  • Page 132: Firewall Configuration

    This chapter shows you how to enable and configure the Prestige firewall. 11.1 Access Methods The web configurator is, by far, the most comprehensive firewall configuration tool your Prestige has to offer. For this reason, it is recommended that you configure your firewall using the web configurator.
  • Page 133: Rule Logic Overview

    P-660H/HW/W-T Series User’ Guide Note: If you configure firewall rules without a good understanding of how they work, you might inadvertently introduce security risks to the firewall and to the protected network. Make sure you test your rules after you configure them. For example, you may create rules to: •...
  • Page 134: Key Fields For Configuring Rules

    4 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may be able to connect to computers with running FTP servers. 5 Does this rule conflict with any existing rules? 6 Once these questions have been answered, adding rules is simply a matter of plugging the information into the correct fields in the web configurator screens.
  • Page 135: Alerts

    P-660H/HW/W-T Series User’ Guide The default rule for WAN to LAN traffic blocks all incoming connections (WAN to LAN). If you wish to allow certain WAN users to have access to your LAN, you will need to create custom rules to allow it. 11.4.2 Alerts Alerts are reports on events, such as attacks, that you may want to know about right away.
  • Page 136: Rule Summary

    Table 37 Firewall: Default Policy (continued) LABEL DESCRIPTION Packet Direction This is the direction of travel of packets (LAN to LAN/Router, LAN to WAN, WAN to WAN/Router, WAN to LAN). Firewall rules are grouped based on the direction of travel of packets to which they apply.
  • Page 137: Figure 52 Firewall: Rule Summary

    P-660H/HW/W-T Series User’ Guide Figure 52 Firewall: Rule Summary The following table describes the labels in this screen. Table 38 Rule Summary LABEL DESCRIPTION Firewall Rules This read-only bar shows how much of the Prestige's memory for recording firewall Storage Space rules it is currently using.
  • Page 138: Configuring Firewall Rules

    Table 38 Rule Summary (continued) LABEL DESCRIPTION Action This is the specified action for that rule, either Block or Forward. Note that Block means the firewall silently discards the packet. Schedule This field tells you whether a schedule is specified (Yes) or not (No). This field shows you whether a log is created when packets match this rule (Enabled) or not (Disable).
  • Page 139: Figure 53 Firewall: Edit Rule

    P-660H/HW/W-T Series User’ Guide Figure 53 Firewall: Edit Rule The following table describes the labels in this screen. Chapter 11 Firewall Configuration...
  • Page 140: Table 39 Firewall: Edit Rule

    Table 39 Firewall: Edit Rule LABEL DESCRIPTION Active Select this option to enable this firewall rule. Action for Matched Use the radio button to select whether to discard (Block) or allow the passage of Packet (Forward) packets that match this rule. Source/Destination Address Address Type...
  • Page 141: Customized Services

    P-660H/HW/W-T Series User’ Guide 11.7 Customized Services Configure customized services and port numbers not predefined by the Prestige. For a comprehensive list of port numbers and services, visit the IANA (Internet Assigned Number Authority) website. For further information on these services, please read page 146.
  • Page 142: Example Firewall Rule

    Refer to Section 10.1 on page 118 Figure 55 Firewall: Configure Customized Services The following table describes the labels in this screen. Table 41 Firewall: Configure Customized Services LABEL DESCRIPTION Service Name Type a unique name for your custom port. Service Type Choose the IP port (TCP, UDP or TCP/UDP) that defines your customized port from the drop down list box.
  • Page 143: Figure 56 Firewall Example: Rule Summary

    P-660H/HW/W-T Series User’ Guide Figure 56 Firewall Example: Rule Summary 3 In the Rule Summary screen, type the index number for where you want to put the rule. For example, if you type “6”, your new rule becomes number 6 and the previous rule 6 (if there is one) becomes rule 7.
  • Page 144: Figure 57 Firewall Example: Edit Rule: Destination Address

    Figure 57 Firewall Example: Edit Rule: Destination Address 7 In the Edit Rule screen, click the Customized Services link to open the Customized Service screen. 8 Click an index number to display the Customized Services -Config screen and configure the screen as follows and click Apply. Figure 58 Edit Custom Port Example 9 In the Edit Rule screen, use the Add>>...
  • Page 145: Figure 59 Firewall Example: Edit Rule: Select Customized Services

    P-660H/HW/W-T Series User’ Guide Figure 59 Firewall Example: Edit Rule: Select Customized Services Note: Custom ports show up with an “*” before their names in the Services list box and the Rule Summary list box. Click Apply after you’ve created your custom port.
  • Page 146: Predefined Services

    Rule 2 allows a “My Service” connection from the WAN to IP addresses 10.0.0.10 through 10.0.0.15 on the LAN. Figure 60 Firewall Example: Rule Summary: My Service 11.10 Predefined Services The Available Services list box in the Edit Rule screen (see displays all predefined services that the Prestige already supports.
  • Page 147 P-660H/HW/W-T Series User’ Guide Table 42 Predefined Services (continued) SERVICE CU-SEEME(TCP/UDP:7648, 24032) DNS(UDP/TCP:53) FINGER(TCP:79) FTP(TCP:20.21) H.323(TCP:1720) HTTP(TCP:80) HTTPS ICQ(UDP:4000) IPSEC_TRANSPORT/ TUNNEL(AH:0) IPSEC_TUNNEL(ESP:0) IRC(TCP/UDP:6667) MSN Messenger(TCP:1863) MULTICAST(IGMP:0) NEWS(TCP:144) NFS(UDP:2049) NNTP(TCP:119) PING(ICMP:0) POP3(TCP:110) PPTP(TCP:1723) PPTP_TUNNEL(GRE:0) RCMD(TCP:512) REAL_AUDIO(TCP:7070) REXEC(TCP:514) RLOGIN(TCP:513) RTELNET(TCP:107) RTSP(TCP/UDP:554) SFTP(TCP:115) DESCRIPTION A popular videoconferencing solution from White Pines Software.
  • Page 148: Anti-Probing

    Table 42 Predefined Services (continued) SERVICE SMTP(TCP:25) SNMP(TCP/UDP:161) SNMP-TRAPS (TCP/ UDP:162) SQL-NET(TCP:1521) SSDP(UDP:1900) SSH(TCP/UDP:22) STRMWORKS(UDP:1558) SYSLOG(UDP:514) TACACS(UDP:49) TELNET(TCP:23) TFTP(UDP:69) VDOLIVE(TCP:7000) 11.11 Anti-Probing If an outside user attempts to probe an unsupported port on your Prestige, an ICMP response packet is automatically returned. This allows the outside user to know the Prestige exists. The Prestige supports anti-probing, which prevents the ICMP response packet from being sent.
  • Page 149: Dos Thresholds

    P-660H/HW/W-T Series User’ Guide Figure 61 Firewall: Anti Probing The following table describes the labels in this screen. Table 43 Firewall: Anti Probing LABEL DESCRIPTION Respond to PING The Prestige does not respond to any incoming Ping requests when Disable is selected.
  • Page 150: Threshold Values

    11.12.1 Threshold Values Tune these parameters when something is not working and after you have checked the firewall counters. These default values should work fine for most small offices. Factors influencing choices for threshold values are: • The maximum number of opened sessions. •...
  • Page 151: Configuring Firewall Thresholds

    P-660H/HW/W-T Series User’ Guide Whenever the number of half-open sessions with the same destination host address rises above a threshold (TCP Maximum Incomplete), the Prestige starts deleting half-open sessions according to one of the following methods: • If the Blocking Time timeout is 0 (the default), then the Prestige deletes the oldest existing half-open session for the host for every new connection request to the host.
  • Page 152: Table 44 Firewall: Threshold

    Table 44 Firewall: Threshold LABEL DESCRIPTION Denial of Service Thresholds One Minute Low This is the rate of new half-open sessions that causes the firewall to stop deleting half-open sessions. The Prestige continues to delete half-open sessions as necessary, until the rate of new connection attempts drops below this number.
  • Page 153 P-660H/HW/W-T Series User’ Guide Table 44 Firewall: Threshold (continued) LABEL DESCRIPTION Deny new Select this radio button and specify for how connection long the Prestige should block new request for connection requests when TCP Maximum Incomplete is reached. Enter the length of blocking time in minutes (between 1 and 256).
  • Page 154: Chapter 12 Content Filtering

    This chapter covers how to configure content filtering. 12.1 Content Filtering Overview Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering gives you the ability to block web sites that contain key words (that you specify) in the URL.
  • Page 155: Configuring Keyword Blocking

    P-660H/HW/W-T Series User’ Guide 12.3 Configuring Keyword Blocking Use this screen to block sites containing certain keywords in the URL. For example, if you enable the keyword "bad", the Prestige blocks all sites containing this keyword including the URL http://www.website.com/bad.html, even if it is not included in the Filter List. To have your Prestige block Web sites containing keywords in their URLs, click Content Filter and Keyword.
  • Page 156: Configuring The Schedule

    12.4 Configuring the Schedule To set the days and times for the Prestige to perform content filtering, click Content Filter and Schedule. The screen appears as shown. Figure 65 Content Filter: Schedule The following table describes the labels in this screen. Table 47 Content Filter: Schedule LABEL DESCRIPTION...
  • Page 157: Figure 66 Content Filter: Trusted

    P-660H/HW/W-T Series User’ Guide Figure 66 Content Filter: Trusted The following table describes the labels in this screen. Table 48 Content Filter: Trusted LABEL Trusted User IP Range From Back Apply Cancel DESCRIPTION Type the IP address of a computer (or the beginning IP address of a specific range of computers) on the LAN that you want to exclude from content filtering.
  • Page 158: Remote Management Configuration

    This chapter provides information on configuring remote management. 13.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which Prestige interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
  • Page 159: Remote Management And Nat

    P-660H/HW/W-T Series User’ Guide • A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service. • You have disabled that service in one of the remote management screens. •...
  • Page 160: Ftp

    13.3 FTP You can upload and download Prestige firmware and configuration files using FTP. To use this feature, your computer must have an FTP client. 13.4 Web You can use the Prestige’s embedded web configurator for configuration and file management. See the online help for details. 13.5 Configuring Remote Management Click Remote Management to open the following screen.
  • Page 161 P-660H/HW/W-T Series User’ Guide Chapter 13 Remote Management Configuration...
  • Page 162: Universal Plug-And-Play (Upnp)

    Universal Plug-and-Play (UPnP) This chapter introduces the UPnP feature in the web configurator. 14.1 Introducing Universal Plug and Play Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 163: Cautions With Upnp

    P-660H/HW/W-T Series User’ Guide 14.1.3 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. All UPnP-enabled devices may communicate freely with each other without additional configuration.
  • Page 164: Installing Upnp In Windows Example

    Table 50 Configuring UPnP LABEL Enable the Universal Plug and Play (UPnP) Service Allow users to make configuration changes through UPnP Allow UPnP to pass through Firewall Apply Cancel 14.3 Installing UPnP in Windows Example This section shows how to install UPnP in Windows Me and Windows XP. Installing UPnP in Windows Me Follow the steps below to install the UPnP in Windows Me.
  • Page 165: Figure 70 Add/Remove Programs: Windows Setup: Communication

    P-660H/HW/W-T Series User’ Guide Figure 70 Add/Remove Programs: Windows Setup: Communication 3 In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 71 Add/Remove Programs: Windows Setup: Communication: Components 4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted.
  • Page 166: Figure 72 Network Connections

    Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start and Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ….
  • Page 167: Figure 73 Windows Optional Networking Components Wizard

    P-660H/HW/W-T Series User’ Guide Figure 73 Windows Optional Networking Components Wizard 5 In the Networking Services window, select the Universal Plug and Play check box. Chapter 14 Universal Plug-and-Play (UPnP)
  • Page 168: Using Upnp In Windows Xp Example

    Figure 74 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 14.4 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the Prestige.
  • Page 169: Figure 75 Network Connections

    P-660H/HW/W-T Series User’ Guide Figure 75 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Chapter 14 Universal Plug-and-Play (UPnP)
  • Page 170: Figure 76 Internet Connection Properties

    P-660H/HW/W-T Series User’ Guide Figure 76 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings. Chapter 14 Universal Plug-and-Play (UPnP)
  • Page 171: Figure 77 Internet Connection Properties: Advanced Settings

    P-660H/HW/W-T Series User’ Guide Figure 77 Internet Connection Properties: Advanced Settings Figure 78 Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
  • Page 172: Figure 79 System Tray Icon

    Figure 79 System Tray Icon 7 Double-click on the icon to display your current Internet connection status. Figure 80 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the Prestige without finding out the IP address of the Prestige first.
  • Page 173: Figure 81 Network Connections

    P-660H/HW/W-T Series User’ Guide Figure 81 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your Prestige and select Invoke. The web configurator login screen displays. Chapter 14 Universal Plug-and-Play (UPnP)
  • Page 174: Figure 82 Network Connections: My Network Places

    P-660H/HW/W-T Series User’ Guide Figure 82 Network Connections: My Network Places 6 Right-click on the icon for your Prestige and select Properties. A properties window displays with basic information about the Prestige. Figure 83 Network Connections: My Network Places: Properties: Example Chapter 14 Universal Plug-and-Play (UPnP)
  • Page 175 P-660H/HW/W-T Series User’ Guide Chapter 14 Universal Plug-and-Play (UPnP)
  • Page 176: Chapter 15 Logs Screens

    This chapter contains information about configuring general log settings and viewing the Prestige’s logs. Refer to the appendix for example log message explanations. 15.1 Logs Overview The web configurator allows you to choose which categories of events and/or alerts to have the Prestige log and then display the logs or have the Prestige send them to an administrator (as e-mail) or to a syslog server.
  • Page 177: Figure 84 Log Settings

    P-660H/HW/W-T Series User’ Guide Figure 84 Log Settings The following table describes the fields in this screen. Table 51 Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below.
  • Page 178: Displaying The Logs

    Table 51 Log Settings LABEL DESCRIPTION Send alerts to Alerts are sent to the e-mail address specified in this field. If this field is left blank, alerts will not be sent via e-mail. UNIX Syslog Syslog logging sends a log to an external syslog server used to store logs. Active Click Active to enable syslog logging.
  • Page 179: Smtp Error Messages

    P-660H/HW/W-T Series User’ Guide Figure 85 View Logs The following table describes the fields in this screen. Table 52 View Logs LABEL DESCRIPTION Display The categories that you select in the Log Settings screen display in the drop-down list box. Select a category of logs to view;...
  • Page 180: Example E-Mail Log

    Table 53 SMTP Error Messages -6 means RCPT TO fail -7 means DATA fail -8 means mail data send fail 15.4.1 Example E-mail Log An "End of Log" message displays for each mail in which a complete log has been sent. The following is an example of a log sent by e-mail.
  • Page 181 P-660H/HW/W-T Series User’ Guide Chapter 15 Logs Screens...
  • Page 182: Media Bandwidth Management Advanced Setup

    Media Bandwidth Management This chapter describes bandwidth management with one level of child class. 16.1 Media Bandwidth Management Overview Bandwidth management allows you to allocate an interface’s outgoing capacity to specific types of traffic. It can also help you make sure that the Prestige forwards certain types of traffic (especially real-time applications) with minimum delay.
  • Page 183: Proportional Bandwidth Allocation

    P-660H/HW/W-T Series User’ Guide bandwidth filter. You can configure up to one bandwidth filter per bandwidth class. You can also configure bandwidth classes without bandwidth filters. However, it is recommended that you configure child-classes with filters for any classes that you configure without filters. The Prestige leaves the bandwidth budget allocated and unused for a class that does not have a filter itself or child-classes with filters.
  • Page 184: Application And Subnet-Based Bandwidth Management Example

    Figure 88 Subnet-based Bandwidth Management Example 16.4.3 Application and Subnet-based Bandwidth Management Example The following example uses bandwidth classes based on LAN subnets and applications (specific applications in each subnet are allotted bandwidth). Table 54 Application and Subnet-based Bandwidth Management Example TRAFFIC TYPE VoIP E-mail...
  • Page 185: Scheduler

    P-660H/HW/W-T Series User’ Guide 16.5 Scheduler The scheduler divides up an interface’s bandwidth among the bandwidth classes. The Prestige has two types of scheduler: fairness-based and priority-based. 16.5.1 Priority-based Scheduler With the priority-based scheduler, the Prestige forwards traffic from bandwidth classes according to the priorities that you assign to the bandwidth classes.
  • Page 186: Maximize Bandwidth Usage Example

    16.6.2 Maximize Bandwidth Usage Example Here is an example of a Prestige that has maximized bandwidth usage enabled on an interface. The first figure shows each bandwidth class’s bandwidth budget and priority. The classes are set up based on subnets. The interface is set to 10 Mbps. Each subnet is allocated 2 Mbps. The unbudgeted 2 Mbps allows traffic not defined in one of the bandwidth filters to go out when you do not select the maximize bandwidth option.
  • Page 187: Bandwidth Borrowing

    P-660H/HW/W-T Series User’ Guide Figure 91 Maximize Bandwidth Usage Example 16.7 Bandwidth Borrowing Bandwidth borrowing allows a child-class to borrow unused bandwidth from its parent class, whereas maximize bandwidth usage allows bandwidth classes to borrow any unused or unbudgeted bandwidth on the whole interface. Enable bandwidth borrowing on a child-class to allow the child-class to use its parent class’s unused bandwidth.
  • Page 188: The Main Media Bandwidth Management Screen

    4 The Prestige assigns any remaining unbudgeted bandwidth to traffic that does not match any of the bandwidth classes. 16.8 The Main Media Bandwidth Management Screen Click Media Bandwidth Mgnt. to display the main Media Bandwidth Management screen as shown. Figure 92 Media Bandwidth Mgnt.
  • Page 189: Figure 93 Media Bandwidth Management: Summary

    P-660H/HW/W-T Series User’ Guide Figure 93 Media Bandwidth Management: Summary The following table describes the labels in this screen. Table 56 Media Bandwidth Management: Summary LABEL DESCRIPTION These read-only labels represent the physical interfaces. Select an interface’s check box WLAN to enable bandwidth management on that interface.
  • Page 190: Configuring Class Setup

    16.10 Configuring Class Setup The class setup screen displays the configured bandwidth classes by individual interface. Select an interface and click the buttons to perform the actions described next. Click “+” to expand the class tree or click “-“to collapse the class tree. Each interface has a permanent root class.
  • Page 191: Figure 95 Media Bandwidth Management: Class Configuration

    P-660H/HW/W-T Series User’ Guide To add a child class, click Media Bandwidth Management, then Class Setup. Click the Add Child-Class button to open the following screen. Figure 95 Media Bandwidth Management: Class Configuration The following table describes the labels in this screen. Table 58 Media Bandwidth Management: Class Configuration LABEL Class Name...
  • Page 192 Table 58 Media Bandwidth Management: Class Configuration (continued) LABEL Active Service Destination IP Address Destination Subnet Mask Destination Port Source IP Address Source Subnet Mask Source Port Protocol ID Back Apply Cancel Table 59 Services and Port Numbers SERVICES ECHO FTP (File Transfer Protocol) Chapter 16 Media Bandwidth Management Advanced Setup DESCRIPTION...
  • Page 193: Media Bandwidth Management Statistics

    P-660H/HW/W-T Series User’ Guide Table 59 Services and Port Numbers SERVICES SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) Finger HTTP (Hyper Text Transfer protocol or WWW, Web) POP3 (Post Office Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol) SNMP trap PPTP (Point-to-Point Tunneling Protocol) 16.10.2 Media Bandwidth Management Statistics...
  • Page 194: Bandwidth Monitor

    Table 60 Media Bandwidth Management Statistics LABEL DESCRIPTION This field displays the bandwidth statistics (in bps) for the past one to eight seconds. For example, t-1 means one second ago. Update Period Enter the time interval in seconds to define how often the information should be (seconds) refreshed.
  • Page 195 P-660H/HW/W-T Series User’ Guide Chapter 16 Media Bandwidth Management Advanced Setup...
  • Page 196: Chapter 17 Maintenance

    This chapter displays system information such as ZyNOS firmware, port IP addresses and port traffic statistics. 17.1 Maintenance Overview The maintenance screens can help you view system information, upload new firmware, manage configuration and restart your Prestige. 17.2 System Status Screen Click System Status under Maintenance to open the following screen, where you can use to monitor your Prestige.
  • Page 197: Figure 98 System Status

    P-660H/HW/W-T Series User’ Guide Figure 98 System Status The following table describes the fields in this screen. Table 62 System Status LABEL DESCRIPTION System Status System Name This is the name of your Prestige. It is for identification purposes. Chapter 17 Maintenance...
  • Page 198: System Statistics

    Table 62 System Status (continued) LABEL DESCRIPTION ZyNOS Firmware This is the ZyNOS firmware version and the date created. ZyNOS is ZyXEL's Version proprietary Network Operating System design. DSL FW Version This is the DSL firmware version associated with your Prestige. Standard This is the standard that your Prestige is using.
  • Page 199: Figure 99 System Status: Show Statistics

    P-660H/HW/W-T Series User’ Guide Figure 99 System Status: Show Statistics The following table describes the fields in this screen. Table 63 System Status: Show Statistics LABEL DESCRIPTION System up Time This is the elapsed time the system has been up. CPU Load This field specifies the percentage of CPU utilization.
  • Page 200: Dhcp Table Screen

    Table 63 System Status: Show Statistics (continued) LABEL DESCRIPTION Poll Interval(s) Type the time interval for the browser to refresh system statistics. Set Interval Click this button to apply the new poll interval you entered in the Poll Interval field above. Stop Click this button to halt the refreshing of the system statistics.
  • Page 201: Any Ip Table Screen

    P-660H/HW/W-T Series User’ Guide 17.4 Any IP Table Screen Click Maintenance, Any IP. The Any IP table shows current read-only information (including the IP address and the MAC address) of all network devices that use the Any IP feature to communicate with the Prestige. Figure 101 Any IP Table The following table describes the labels in this screen.
  • Page 202: Diagnostic Screens

    Figure 102 Association List The following table describes the fields in this screen. Table 66 Association List LABEL DESCRIPTION This is the index number of an associated wireless station. MAC Address This field displays the MAC (Media Access Control) address of an associated wireless station.
  • Page 203: Dsl Line Diagnostic

    P-660H/HW/W-T Series User’ Guide Figure 103 Diagnostic: General The following table describes the fields in this screen. Table 67 Diagnostic: General LABEL DESCRIPTION TCP/IP Type the IP address of a computer that you want to ping in order to test a connection. Address Ping Click this button to ping the IP address that you entered.
  • Page 204: Figure 104 Diagnostic: Dsl Line

    Figure 104 Diagnostic: DSL Line The following table describes the fields in this screen. Table 68 Diagnostic: DSL Line LABEL Reset ADSL Click this button to reinitialize the ADSL line. The large text box above then displays Line the progress and results of this operation, for example: "Start to reset ADSL Loading ADSL modem F/W...
  • Page 205: Firmware Upgrade

    P-660H/HW/W-T Series User’ Guide 17.7 Firmware Upgrade Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a.bin extension, for example, "Prestige.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 206: Figure 106 Network Temporarily Disconnected

    P-660H/HW/W-T Series User’ Guide The Prestige automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 106 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen.
  • Page 207 P-660H/HW/W-T Series User’ Guide Chapter 17 Maintenance...
  • Page 208: Chapter 18 Introducing The Smt

    This chapter explains how to access and navigate the System Management Terminal and gives an overview of its menus. 18.1 SMT Introduction The Prestige’s SMT (System Management Terminal) is a menu-driven interface that you can access from a terminal emulator over a telnet connection. This chapter shows you how to access the SMT (System Management Terminal) menus via Telnet, how to navigate the SMT and how to configure SMT menus.
  • Page 209: Prestige Smt Menus Overview

    P-660H/HW/W-T Series User’ Guide Figure 108 Login Screen Enter Password: **** 18.1.3 Prestige SMT Menus Overview The following table gives you an overview of your Prestige’s various SMT menus. Table 70 SMT Menus Overview MENUS SUB MENUS 1 General Setup 1.1 Configure Dynamic DNS 2 WAN Backup Setup 3 LAN Setup...
  • Page 210: Navigating The Smt Interface

    Table 70 SMT Menus Overview (continued) MENUS SUB MENUS 24 System Maintenance 24.1 Status 24.2 System Information and Console Port Speed 24.3 Log and Trace 24.4 Diagnostic 24.5 Backup Configuration 24.6 Restore Configuration 24.7 Upload Firmware 24.8 Command Interpreter Mode 24.9 Call Control 24.10 Time and Date Setting 24.11 Remote Management Control...
  • Page 211: System Management Terminal Interface Summary

    Type 99, then press [ENTER].Type 99 at the main menu prompt and press [ENTER] to exit the SMT interface. Copyright (c) 1994 - 2004 ZyXEL Communications Corp. Prestige 660W-T1 Advanced Management 21.
  • Page 212: Changing The System Password

    Table 73 Main Menu Summary MENU TITLE LAN Setup Internet Access Setup Remote Node Setup Static Routing Setup Dial-in User Setup NAT Setup Filter and Firewall Setup SNMP Configuration System Security System Maintenance IP Routing Policy Setup Schedule Setup Exit 18.3 Changing the System Password Change the Prestige default password by following the steps shown next.
  • Page 213 P-660H/HW/W-T Series User’ Guide Note: Note that as you type a password, the screen displays an “ ” for each character you type. Chapter 18 Introducing the SMT...
  • Page 214: Chapter 19 Menu 1 General Setup

    Menu 1 - General Setup contains administrative and system-related information. 19.1 General Setup Menu 1 — General Setup contains administrative and system-related information (shown next). The System Name field is for identification purposes. However, because some ISPs check this name you should enter your computer's "Computer Name". •...
  • Page 215: Procedure To Configure Dynamic Dns

    P-660H/HW/W-T Series User’ Guide Figure 110 Menu 1 General Setup Press ENTER to Confirm or ESC to Cancel: Fill in the required fields. Refer to the table shown next for more information about these fields. Table 74 Menu 1 General Setup FIELD System Name Location (optional)
  • Page 216: Figure 111 Menu 1.1 Configure Dynamic Dns

    Figure 111 Menu 1.1 Configure Dynamic DNS Follow the instructions in the next table to configure dynamic DNS parameters. Table 75 Menu 1.1 Configure Dynamic DNS FIELD DESCRIPTION Service Provider This is the name of your dynamic DNS service provider. Active Press [SPACE BAR] to select Yes and then press [ENTER] to make dynamic DNS active.
  • Page 217 P-660H/HW/W-T Series User’ Guide Chapter 19 Menu 1 General Setup...
  • Page 218: Chapter 20 Menu 2 Wan Backup Setup

    Menu 2 WAN Backup Setup This chapter describes how to configure traffic redirect and dial-backup using menu 2 and 2.1. 20.1 Introduction to WAN Backup Setup This chapter explains how to configure the Prestige for traffic redirect and dial backup connections.
  • Page 219: Traffic Redirect Setup

    P-660H/HW/W-T Series User’ Guide Table 76 Menu 2 WAN Backup Setup (continued) FIELD KeepAlive Fail Tolerance Recovery Interval(sec) When the Prestige is using a lower priority connection (usually a WAN backup ICMP Timeout Traffic Redirect When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 20.2.1 Traffic Redirect Setup Configure parameters that determine when the Prestige will forward WAN traffic to the...
  • Page 220 Table 77 Menu 2.1Traffic Redirect Setup FIELD DESCRIPTION Metric This field sets this route's priority among the routes the Prestige uses. The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1"...
  • Page 221 P-660H/HW/W-T Series User’ Guide Chapter 20 Menu 2 WAN Backup Setup...
  • Page 222: Chapter 21 Menu 3 Lan Setup

    This chapter covers how to configure your wired Local Area Network (LAN) settings. 21.1 LAN Setup This section describes how to configure the Ethernet using Menu 3 — LAN Setup. From the main menu, enter 3 to display menu 3. Figure 114 Menu 3 LAN Setup Menu 3 - LAN Setup 1.
  • Page 223: Protocol Dependent Ethernet Setup

    P-660H/HW/W-T Series User’ Guide 21.2 Protocol Dependent Ethernet Setup Depending on the protocols for your applications, you need to configure the respective Ethernet Setup, as outlined below. • TCP/IP Ethernet setup • Bridging Ethernet setup 21.3 TCP/IP Ethernet Setup and DHCP Use menu 3.2 to configure your Prestige for TCP/IP.
  • Page 224: Table 78 Dhcp Ethernet Setup

    Follow the instructions in the following table on how to configure the DHCP fields. Table 78 DHCP Ethernet Setup FIELD DHCP Setup DHCP Client IP Pool Starting Address Size of Client IP Pool Primary DNS Server Secondary DNS Server Remote DHCP Serve Follow the instructions in the following table to configure TCP/IP parameters for the Ethernet port.
  • Page 225 P-660H/HW/W-T Series User’ Guide Chapter 21 Menu 3 LAN Setup...
  • Page 226: Chapter 22 Wireless Lan Setup

    This chapter covers how to configure wireless LAN settings in SMT menu 3.5 for P-660HW and P-660W. 22.1 Wireless LAN Overview Refer to the chapter on the wireless LAN screens for wireless LAN background information. 22.2 Wireless LAN Setup Use menu 3.5 to set up your Prestige as the wireless access point. To edit menu 3.5, enter 3 from the main menu to display Menu 3 –...
  • Page 227: Wireless Lan Mac Address Filter

    P-660H/HW/W-T Series User’ Guide Table 80 Menu 3.5 - Wireless LAN Setup (continued) FIELD DESCRIPTION Channel ID Press [SPACE BAR] to select a channel. This allows you to set the operating frequency/ channel depending on your particular region. RTS(Request To Send) threshold (number of bytes) enables RTS/CTS handshake. Data Threshold with its frame size larger than this value will perform the RTS/CTS handshake.
  • Page 228: Figure 118 Menu 3.5.1 Wlan Mac Address Filtering

    Figure 118 Menu 3.5.1 WLAN MAC Address Filtering -------------------------------------------------------------------------- 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 -------------------------------------------------------------------------- The following table describes the fields in this menu. Table 81 Menu 3.5.1 WLAN MAC Address Filtering FIELD DESCRIPTION Active To enable MAC address filtering, press [SPACE BAR] to select Yes and press...
  • Page 229 P-660H/HW/W-T Series User’ Guide Chapter 22 Wireless LAN Setup...
  • Page 230: Chapter 23 Internet Access

    This chapter shows you how to configure the LAN and WAN of your Prestige for Internet access 23.1 Internet Access Overview Refer to the chapters on the web configurator’s wizard, LAN and WAN screens for more background information on fields in the SMT screens covered in this chapter. 23.2 IP Policies Traditionally, routing is based on the destination address only and the router takes the shortest path to forward a packet.
  • Page 231: Ip Alias Setup

    P-660H/HW/W-T Series User’ Guide Figure 119 IP Alias Network Example Use menu 3.2.1 to configure IP Alias on your Prestige. 23.4 IP Alias Setup Use menu 3.2 to configure the first network. Move the cursor to Edit IP Alias field and press [SPACEBAR] to choose Yes and press [ENTER] to configure the second and third network.
  • Page 232: Route Ip Setup

    Figure 121 Menu 3.2.1 IP Alias Setup Menu 3.2.1 - IP Alias Setup IP Alias 1= No IP Alias 2= No Follow the instructions in the following table to configure IP Alias parameters. Table 82 Menu 3.2.1 IP Alias Setup FIELD DESCRIPTION IP Alias...
  • Page 233: Internet Access Configuration

    P-660H/HW/W-T Series User’ Guide Figure 122 Menu 1 General Setup Menu 1 - General Setup Press ENTER to Confirm or ESC to Cancel: 23.6 Internet Access Configuration Menu 4 allows you to enter the Internet Access information in one screen. Menu 4 is actually a simplified setup for one of the remote nodes that you can access in menu 11.
  • Page 234: Table 83 Menu 4 Internet Access Setup

    Menu 4 Internet Access Setup Table 83 FIELD DESCRIPTION ISP’s Name Enter the name of your Internet Service Provider (ISP). This information is for identification purposes only. Encapsulation Press [ Choices are PPPoE, PPPoA, RFC 1483 or ENET ENCAP. Multiplexing Press [ Choices are VC-based or LLC-based.
  • Page 235 P-660H/HW/W-T Series User’ Guide Chapter 23 Internet Access...
  • Page 236: Remote Node Configuration

    Remote Node Configuration This chapter covers remote node configuration. 24.1 Remote Node Setup Overview This section describes the protocol-independent parameters for a remote node. A remote node is required for placing calls to a remote gateway. A remote node represents both the remote gateway and the network behind it across a WAN connection.
  • Page 237: Encapsulation And Multiplexing Scenarios

    P-660H/HW/W-T Series User’ Guide Figure 124 Menu 11 Remote Node Setup 24.2.2 Encapsulation and Multiplexing Scenarios For Internet access you should use the encapsulation and multiplexing methods used by your ISP. Consult your telephone company for information on encapsulation and multiplexing methods for LAN-to-LAN applications, for example between a branch office and corporate headquarters.
  • Page 238: Figure 125 Menu 11.1 Remote Node Profile

    Figure 125 Menu 11.1 Remote Node Profile Rem Node Name= MyISP Active= Yes Encapsulation= RFC 1483 Multiplexing= LLC-based Service Name= N/A Incoming: Rem Login= N/A Rem Password= N/A Outgoing: My Login= N/A My Password= N/A Authen= N/A Press ENTER to Confirm or ESC to Cancel: In Menu 11.1 –...
  • Page 239: Outgoing Authentication Protocol

    P-660H/HW/W-T Series User’ Guide Table 84 Menu 11.1 Remote Node Profile (continued) FIELD DESCRIPTION PAP – accept PAP (Password Authentication Protocol) only. Route This field determines the protocol used in routing. Options are IP and None. Bridge When bridging is enabled, your Prestige will forward any packet that it does not route to this remote node;...
  • Page 240: Remote Node Network Layer Options

    24.3 Remote Node Network Layer Options For the TCP/IP parameters, perform the following steps to edit Menu 11.3 – Remote Node Network Layer Options as shown next. 1 In menu 11.1, make sure IP is among the protocols in the Route field. 2 Move the cursor to the Edit IP/Bridge field, press [SPACE BAR] to select Yes, then press [ENTER] to display Menu 11.3 –...
  • Page 241: My Wan Addr Sample Ip Addresses

    P-660H/HW/W-T Series User’ Guide Table 85 Menu 11.3 Remote Node Network Layer Options (continued) FIELD DESCRIPTION Address When Full Feature is selected in the NAT field, configure address mapping sets in Mapping Set menu 15.1. Select one of the NAT server sets (2-10) in menu 15.2 (see page 254 When SUA Only is selected in the NAT field, the SMT uses NAT server set 1 in menu 15.2 (see...
  • Page 242: Remote Node Filter

    Figure 127 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection 24.4 Remote Node Filter Move the cursor to the Edit Filter Sets field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to display Menu 11.5 – Remote Node Filter. Use Menu 11.5 –...
  • Page 243: Editing Atm Layer Options

    P-660H/HW/W-T Series User’ Guide Figure 129 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) 24.5 Editing ATM Layer Options Follow the steps shown next to edit Menu 11.6 – Remote Node ATM Layer Options. In menu 11.1, move the cursor to the Edit ATM Options field and then press [SPACE BAR] to select Yes.
  • Page 244: Advance Setup Options

    Figure 131 Menu 11.6 for LLC-based Multiplexing or PPP Encapsulation Menu 11.6 - Remote Node ATM Layer Options VPI/VCI (LLC-Multiplexing or PPP-Encapsulation) ENTER here to CONFIRM or ESC to CANCEL: In this case, only one set of VPI and VCI numbers need be specified for all protocols. The valid range for the VPI is 0 to 255 and for the VCI is 32 to 65535 (1 to 31 is reserved for local management of ATM traffic).
  • Page 245: Figure 133 Menu 11.8 Advance Setup Options

    P-660H/HW/W-T Series User’ Guide Figure 133 Menu 11.8 Advance Setup Options The following table describes the fields in this menu. Table 86 Menu 11.8 Advance Setup Options FIELD PPPoE pass-through When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: Menu 11.8 - Advance Setup Options PPPoE pass-through= No...
  • Page 246: Chapter 25 Static Route Setup

    This chapter shows how to setup IP static routes. 25.1 IP Static Route Overview Static routes tell the Prestige routing information that it cannot learn automatically through other means. This can arise in cases where RIP is disabled on the LAN or a remote network is beyond the one that is directly connected to a remote node.
  • Page 247: Figure 135 Menu 12 Static Route Setup

    P-660H/HW/W-T Series User’ Guide Figure 135 Menu 12 Static Route Setup From menu 12, select 1 to open Menu 12.1 — IP Static Route Setup (shown next). Figure 136 Menu 12.1 IP Static Route Setup Now, type the route number of a static route you want to configure. Figure 137 Menu12.1.1 Edit IP Static Route Menu 12.1.1 - Edit IP Static Route Press ENTER to Confirm or ESC to Cancel:...
  • Page 248: Table 87 Menu12.1.1 Edit Ip Static Route

    The following table describes the fields for Menu 12.1.1 – Edit IP Static Route Setup. Table 87 Menu12.1.1 Edit IP Static Route FIELD Route # Route Name Active Destination IP Address IP Subnet Mask Gateway IP Address Metric Private When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: Chapter 25 Static Route Setup DESCRIPTION...
  • Page 249 P-660H/HW/W-T Series User’ Guide Chapter 25 Static Route Setup...
  • Page 250: Chapter 26 Bridging Setup

    This chapter shows you how to configure the bridging parameters of your Prestige. 26.1 Bridging in General Bridging bases the forwarding decision on the MAC (Media Access Control), or hardware address, while routing does it on the network layer (IP) address. Bridging allows the Prestige to transport packets of network layer protocols that it does not route, for example, SNA, from one network to another.
  • Page 251: Figure 138 Menu 11.1 Remote Node Profile

    P-660H/HW/W-T Series User’ Guide Figure 138 Menu 11.1 Remote Node Profile Rem Node Name= ? Active= Yes Encapsulation= ENET ENCAP Multiplexing= VC-based Service Name= N/A Incoming: Rem Login= N/A Rem Password= N/A Outgoing: My Login= N/A My Password= N/A Authen= N/A Press ENTER to Confirm or ESC to Cancel: 3 Move the cursor to the Edit IP/Bridge field, then press [SPACE BAR] to set the value to Yes and press [ENTER] to edit Menu 11.3 –...
  • Page 252: Bridge Static Route Setup

    26.2.2 Bridge Static Route Setup Similar to network layer static routes, a bridging static route tells the Prestige the route to a node before a connection is established. You configure bridge static routes in menu 12.3.1 (go to menu 12, choose option 3, then choose a static route to edit) as shown next. Figure 140 Menu 12.3.1 Edit Bridge Static Route Menu 12.3.1 - Edit Bridge Static Route Route #: 1...
  • Page 253 P-660H/HW/W-T Series User’ Guide Chapter 26 Bridging Setup...
  • Page 254: Network Address Translation (Nat)

    Network Address Translation This chapter discusses how to configure NAT on the Prestige. 27.1 Using NAT You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the Prestige. 27.1.1 SUA (Single User Account) Versus NAT SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server.
  • Page 255: Figure 141 Menu 4 Applying Nat For Internet Access

    P-660H/HW/W-T Series User’ Guide Figure 141 Menu 4 Applying NAT for Internet Access Menu 4 - Internet Access Setup Press ENTER to Confirm or ESC to Cancel: The following figure shows how you apply NAT to the remote node in menu 11.1. 1 Enter 11 from the main menu.
  • Page 256: Nat Setup

    Table 90 Applying NAT in Menus 4 & 11.3 FIELD DESCRIPTION Press [SPACE BAR] and then [ENTER] to select Full Feature if you have multiple public WAN IP addresses for your Prestige. The SMT uses the address mapping set that you configure and enter in the Address Mapping Set field Select None to disable NAT.
  • Page 257: Sua Address Mapping Set

    P-660H/HW/W-T Series User’ Guide Figure 144 Menu 15.1 Address Mapping Sets Menu 15.1 - Address Mapping Sets Enter Menu Selection Number: 27.3.1.1 SUA Address Mapping Set Enter 255 to display the next screen (see also menu cannot be changed. Figure 145 Menu 15.1.255 SUA Address Mapping Rules Menu 15.1.255 - Address Mapping Rules Set Name= Local Start IP...
  • Page 258: User-Defined Address Mapping Sets

    Table 91 SUA Address Mapping Rules (continued) FIELD DESCRIPTION Local End IP Local End IP is the ending local IP address (ILA). If the rule is for all local IPs, then the Start IP is 0.0.0.0 and the End IP is 255.255.255.255. Global Start IP This is the starting global IP address (IGA).
  • Page 259: Ordering Your Rules

    P-660H/HW/W-T Series User’ Guide 27.3.1.3 Ordering Your Rules Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules.
  • Page 260: Configuring A Server Behind Nat

    The following table explains the fields in this menu. Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set Table 93 FIELD DESCRIPTION Type Press [SPACE BAR] and then [ENTER] to select from a total of five types. These are the mapping types discussed in the web configurator NAT chapter. Server allows you to specify multiple servers of different types behind NAT to this computer.
  • Page 261: General Nat Examples

    P-660H/HW/W-T Series User’ Guide Figure 149 Menu 15.2.1 NAT Server Setup Menu 15.2 - NAT Server Setup Rule Start Port No. --------------------------------------------------- Default Press ENTER to Confirm or ESC to Cancel: 4 Enter a port number in an unused Start Port No field. To forward only one port, enter it again in the End Port No field.
  • Page 262: Example 1: Internet Access Only

    27.5.1 Example 1: Internet Access Only In the following Internet access example, you only need one rule where your ILAs (Inside Local addresses) all map to one dynamic IGA (Inside Global Address) assigned by your ISP. Figure 151 NAT Example 1 Figure 152 Menu 4 Internet Access &...
  • Page 263: Example 3: Multiple Public Ip Addresses With Inside Servers

    P-660H/HW/W-T Series User’ Guide Figure 153 NAT Example 2 In this case, you do exactly as above (use the convenient pre-configured SUA Only set) and also go to menu 15.2 to specify the Inside Server behind the NAT as shown in the next figure. Figure 154 Menu 15.2.1 Specifying an Inside Server Menu 15.2.1 - NAT Server Setup (Used for SUA Only) Rule...
  • Page 264: Figure 155 Nat Example 3

    Map the other outgoing LAN traffic to IGA3 (Many : 1 mapping). You also map your third IGA to the web server and mail server on the LAN. Type Server allows you to specify multiple servers, of different types, to other computers behind NAT on the LAN.
  • Page 265: Figure 156 Example 3: Menu 11.3

    P-660H/HW/W-T Series User’ Guide Figure 156 Example 3: Menu 11.3 Menu 11.3 - Remote Node Network Layer Options IP Options: IP Address Assignment= Static Rem IP Addr: 0.0.0.0 Rem Subnet Mask= 0.0.0.0 My WAN Addr= 0.0.0.0 NAT= Full Feature Address Mapping Set= 2 Metric= 2 Private= No RIP Direction= Both...
  • Page 266: Figure 158 Example 3: Final Menu 15.1.1

    Figure 158 Example 3: Final Menu 15.1.1 Menu 15.1.1 - Address Mapping Rules Set Name= Example3 Local Start IP --------------- 1. 192.168.1.10 192.168.1.11 3. 0.0.0.0 Action= Edit Press ENTER to Confirm or ESC to Cancel: Now configure the IGA3 to map to our web server and mail server on the LAN. 1 Enter 15 from the main menu.
  • Page 267: Example 4: Nat Unfriendly Application Programs

    P-660H/HW/W-T Series User’ Guide 27.5.4 Example 4: NAT Unfriendly Application Programs Some applications do not support NAT Mapping using TCP or UDP port address translation. In this case it is better to use Many-to-Many No Overload mapping as port numbers do not change for Many-to-Many No Overload (and One-to-One) NAT mapping types.
  • Page 268: Figure 162 Example 4: Menu 15.1.1 Address Mapping Rules

    Figure 162 Example 4: Menu 15.1.1 Address Mapping Rules Menu 15.1.1 - Address Mapping Rules Set Name= Example4 Local Start IP --------------- 192.168.1.10 NO OV Press ENTER to Confirm or ESC to Cancel: Chapter 27 Network Address Translation (NAT) P-660H/HW/W-T Series User’ Guide Local End IP Global Start IP ------------...
  • Page 269 P-660H/HW/W-T Series User’ Guide Chapter 27 Network Address Translation (NAT)
  • Page 270: Chapter 28 Enabling The Firewall

    This chapter shows you how to get started with the Prestige firewall. 28.1 Remote Management and the Firewall When SMT menu 24.11 is configured to allow management and the firewall is enabled: • The firewall blocks remote management from the WAN unless you configure a firewall rule to allow it.
  • Page 271: Figure 163 Menu 21.2 Firewall Setup

    P-660H/HW/W-T Series User’ Guide Figure 163 Menu 21.2 Firewall Setup Menu 21.2 - Firewall Setup The firewall protects against Denial of Service (DOS) attacks when it is active. The default Policy sets 1. allow all sessions originating from the LAN to the WAN and 2.
  • Page 272: Chapter 29 Filter Configuration

    This chapter shows you how to create and apply filters. 29.1 About Filtering Your Prestige uses filters to decide whether or not to allow passage of a data packet and/or to make a call. There are two types of filter applications: data filtering and call filtering. Filters are subdivided into device and protocol filters, which are discussed later.
  • Page 273: The Filter Structure Of The Prestige

    P-660H/HW/W-T Series User’ Guide Figure 165 Filter Rule Process You can apply up to four filter sets to a particular port to block various types of packets. Because each filter set can have up to six rules, you can have a maximum of 24 rules active for a single port.
  • Page 274: Configuring A Filter Set For The Prestige

    29.2 Configuring a Filter Set for the Prestige To configure a filter set, follow the steps shown next. 1 Enter 21 in the main menu to display Menu 21 – Filter and Firewall Setup. 2 Enter 1 to display Menu 21.1 – Filter Set Configuration as shown next. Figure 166 Menu 21 Filter Set Configuration Menu 21.1 - Filter Set Configuration Filter...
  • Page 275: Filter Rules Summary Menus

    P-660H/HW/W-T Series User’ Guide Figure 168 NetBIOS_LAN Filter Rules Summary Menu 21.1.3 - Filter Rules Summary # A Type - - ---- ------------------------------------------------------------ - - - 1 Y IP Pr=17, SA=0.0.0.0, SP=137, DA=0.0.0.0, DP=53 Enter Filter Rule Number (1-6) to Configure: Figure 169 IGMP Filter Rules Summary Menu 21.1.4 - Filter Rules Summary # A Type...
  • Page 276: Configuring A Filter Rule

    Table 94 Abbreviations Used in the Filter Rules Summary Menu (continued) FIELD DESCRIPTION Action Matched. “F” means to forward the packet immediately and skip checking the remaining rules. “D” means to drop the packet. “N“means to check the next rule. Action Not Matched.
  • Page 277: Tcp/Ip Filter Rule

    P-660H/HW/W-T Series User’ Guide 29.4.1 TCP/IP Filter Rule This section shows you how to configure a TCP/IP filter rule. TCP/IP rules allow you to base the rule on the fields in the IP and the upper layer protocol, for example, UDP and TCP headers.
  • Page 278 Table 96 Menu 21.1.x.1 TCP/IP Filter Rule (continued) FIELD DESCRIPTION Port # Type the destination port of the packets you want to filter. The field range is 0 to 65535. A 0 field is ignored. Port # Comp Select the comparison to apply to the destination port in the packet against the value given in Destination: Port #.
  • Page 279: Generic Filter Rule

    P-660H/HW/W-T Series User’ Guide Figure 171 Executing an IP Filter 29.4.2 Generic Filter Rule This section shows you how to configure a generic filter rule. The purpose of generic rules is to allow you to filter non-IP packets. For IP, it is generally easier to use the IP rules directly. Chapter 29 Filter Configuration...
  • Page 280: Figure 172 Menu 21.1.5.1 Generic Filter Rule

    For generic rules, the Prestige treats a packet as a byte stream as opposed to an IP packet. You specify the portion of the packet to check with the Offset (from 0) and the Length fields, both in bytes. The Prestige applies the Mask (bit-wise ANDing) to the data portion before comparing the result against the Value to determine a match.
  • Page 281: Filter Types And Nat

    P-660H/HW/W-T Series User’ Guide Table 97 Menu 21.1.5.1 Generic Filter Rule (continued) FIELD DESCRIPTION Select the logging option from the following: None – No packets will be logged. Action Matched – Only matching packets and rules will be logged. Action Not Matched – Only packets that do not match the rule parameters will be logged.
  • Page 282: Figure 174 Sample Telnet Filter

    Figure 174 Sample Telnet Filter 1 Enter 1 in the menu 21 to display Menu 21.1 — Filter Set Configuration. 2 Enter the index number of the filter set you want to configure (in this case 6) 3 Type a descriptive name or comment in the Edit Comments field (for example, TELNET_WAN) and press [ENTER].
  • Page 283: Applying Filters And Factory Defaults

    P-660H/HW/W-T Series User’ Guide 2 Go to the Edit Filter Sets field, press [SPACE BAR] to choose Yes and press [ENTER]. This brings you to menu 11.5. Apply the example filter set (for example, filter set 3) in this menu as shown in the next section. This shows you that you have configured and activated (A = Y) a TCP/IP filter rule (Type = IP, Pr = 6) for destination telnet ports (DP = 23).
  • Page 284: Ethernet Traffic

    29.7.1 Ethernet Traffic You seldom need to filter Ethernet traffic; however, the filter sets may be useful to block certain packets, reduce traffic and prevent security breaches. Go to menu 3.1 (shown next) and type the number(s) of the filter set(s) that you want to apply as appropriate. You can choose up to four filter sets (from twelve) by typing their numbers separated by commas, for example, 3, 4, 6, 11.
  • Page 285 P-660H/HW/W-T Series User’ Guide Chapter 29 Filter Configuration...
  • Page 286: Chapter 30 Snmp Configuration

    This chapter explains SNMP Configuration menu 22. 30.1 About SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network.
  • Page 287: Supported Mibs

    P-660H/HW/W-T Series User’ Guide The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include the number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.
  • Page 288: Snmp Traps

    Figure 180 Menu 22 SNMP Configuration Menu 22 - SNMP Configuration SNMP: Get Community= public Set Community= public Trusted Host= 0.0.0.0 Trap: Press ENTER to Confirm or ESC to Cancel: The following table describes the SNMP configuration parameters. Table 99 Menu 22 SNMP Configuration FIELD SNMP: Get Community...
  • Page 289: Table 101 Ports And Permanent Virtual Circuits

    P-660H/HW/W-T Series User’ Guide Table 100 SNMP Traps (continued) TRAP # TRAP NAME authenticationFailure (defined in RFC-1215) whyReboot (defined in ZYXEL-MIB) A trap is sent with the reason of restart before For intentional reboot : The port number is its interface index under the interface group. Table 101 Ports and Permanent Virtual Circuits PORT PVC (PERMANENT VIRTUAL CIRCUIT)
  • Page 290: Chapter 31 System Security

    This chapter describes how to configure the system security on the Prestige. 31.1 System Security You can configure the system password. 31.1.1 System Password Enter 23 in the main menu to display Menu 23 – System Security. You should change the default password. If you forget your password you have to restore the default configuration file.
  • Page 291: Figure 182 Menu 23.2 System Security: Radius Server

    P-660H/HW/W-T Series User’ Guide Figure 182 Menu 23.2 System Security: RADIUS Server Menu 23.2 - System Security - RADIUS Server Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu. Table 102 Menu 23.2 System Security: RADIUS Server FIELD Authentication Server Active...
  • Page 292: Ieee 802.1X

    31.1.3 IEEE 802.1x The IEEE 802.1x standards outline enhanced security methods for both the authentication of wireless stations and encryption key management. Follow the steps below to enable EAP authentication on your Prestige. 1 From the main menu, enter 23 to display Menu23 – System Security. Figure 183 Menu 23 System Security Menu 23 - System Security Enter Menu Selection Number:...
  • Page 293: Table 103 Menu 23.4 System Security: Ieee 802.1X

    P-660H/HW/W-T Series User’ Guide Table 103 Menu 23.4 System Security: IEEE 802.1x FIELD DESCRIPTION Wireless Port Press [SPACE BAR] and select a security mode for the wireless LAN access. Control Select No Authentication Required to allow any wireless stations access to your wired network without entering usernames and passwords.
  • Page 294: Creating User Accounts On The Prestige

    Table 103 Menu 23.4 System Security: IEEE 802.1x (continued) FIELD DESCRIPTION Authentication The authentication database contains wireless station login information. The local Databases user database is the built-in database on the Prestige. The RADIUS is an external server. Use this field to decide which database the Prestige should use (first) to authenticate a wireless station.
  • Page 295: Figure 185 Menu 14 Dial-In User Setup

    P-660H/HW/W-T Series User’ Guide Figure 185 Menu 14 Dial-in User Setup 1. ________ 2. ________ 3. ________ 4. ________ 5. ________ 6. ________ 7. ________ 8. ________ 2 Type a number and press [ENTER] to edit the user profile. Figure 186 Menu 14.1 Edit Dial-in User Menu 14.1 - Edit Dial-in User Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu.
  • Page 296: System Information And Diagnosis

    System Information and This chapter covers the information and diagnostic tools in SMT menus 24.1 to 24.4. 32.1 Overview These tools include updates on system status, port status, log and trace capabilities and upgrades for the system software. This chapter describes how to use these tools in detail. Type 24 in the main menu to open Menu 24 –...
  • Page 297: Figure 188 Menu 24.1 System Maintenance : Status

    P-660H/HW/W-T Series User’ Guide The following table describes the fields present in Menu 24.1 — System Maintenance — Status which are read-only and meant for diagnostic purposes. Figure 188 Menu 24.1 System Maintenance : Status Node-Lnk Status Time 1-ENET My WAN IP (from ISP): 0.0.0.0 Ethernet: Status: 100M/Full Duplex Tx Pkts: 5731 Collisions: 0...
  • Page 298: System Information

    Table 105 Menu 24.1 System Maintenance: Status (continued) FIELD DESCRIPTION Collision This is the number of collisions. This shows statistics for the WAN. Line Status This shows the current status of the xDSL line, which can be Up or Down. Upstream This shows the upstream transfer rate in kbps.
  • Page 299: Console Port Speed

    Menu 1 – General Setup. Refers to the routing protocol used. Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. ZyNOS is a registered trademark of ZyXEL Communications Corporation. Displays the vendor of the ADSL chipset and DSL version.
  • Page 300: Log And Trace

    Figure 191 Menu 24.2.2 System Maintenance : Change Console Port Speed Menu 24.2.2 – System Maintenance – Change Console Port Speed Press ENTER to Confirm or ESC to Cancel: Once you change the Prestige console port speed, you must also set the speed parameter for the communication software you are using to connect to the Prestige.
  • Page 301: Syslog And Accounting

    P-660H/HW/W-T Series User’ Guide Figure 193 Sample Error and Information Messages 53 Sat Jan 01 00:00:03 2000 PP01 -WARN SNMP TRAP 0: cold start 54 Sat Jan 01 00:00:03 2000 PP01 55 Sat Jan 01 00:00:03 2000 PP01 56 Sat Jan 01 00:00:03 2000 PP20 57 Sat Jan 01 00:00:03 2000 PP21 58 Sat Jan 01 00:03:06 2000 PP19 59 Sat Jan 01 00:03:06 2000 PP01...
  • Page 302: Figure 195 Syslog Example

    Figure 195 Syslog Example 1 - CDR SdcmdSyslogSend ( SYSLOG_CDR, SYSLOG_INFO, String); String = board xx line xx channel xx, call xx, str board = the hardware board ID line = the WAN ID in a board Channel = channel ID within the WAN call = the call reference number which starts from 1 and increments by 1 for each new call str = C01 Outgoing Call dev xx ch xx (dev:device No.
  • Page 303: Diagnostic

    P-660H/HW/W-T Series User’ Guide Figure 195 Syslog Example (continued) prot: Protocol (“TCP”, ”UDP”, ”ICMP”) spo: Source port dpo: Destination port Jul 19 14:43:55 192.168.102.2 ZYXEL: IP [Src=202.132.154.123 Dst=255.255.255.255 UDP spo=0208 dpo=0208]} S03>R01mF Jul 19 14:44:00 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP spo=05d4 dpo=0035]} S03>R01mF Jul 19 14:44:04 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP spo=05d4 dpo=0035]} S03>R01mF...
  • Page 304: Table 108 Menu 24.4 System Maintenance Menu: Diagnostic

    The following table describes the diagnostic tests available in menu 24.4 for and the connections. Table 108 Menu 24.4 System Maintenance Menu: Diagnostic FIELD DESCRIPTION Reset xDSL Re-initialize the xDSL link to the telephone company. Ping Host Ping the host to see if the links and TCP/IP protocol on both systems are working. Reboot System Reboot the Prestige.
  • Page 305 P-660H/HW/W-T Series User’ Guide Chapter 32 System Information and Diagnosis...
  • Page 306: Firmware And Configuration File Maintenance

    Firmware and Configuration File This chapter tells you how to backup and restore your configuration file as well as upload new firmware and configuration files. 33.1 Filename Conventions The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password, DHCP Setup, TCP/IP Setup, etc.
  • Page 307: Backup Configuration

    P-660H/HW/W-T Series User’ Guide The following table is a summary. Please note that the internal filename refers to the filename on the Prestige and the external filename refers to the filename not on the Prestige, that is, on your computer, local network or FTP site and so the name (but not the extension) may vary. After uploading new firmware, see the ZyNOS F/W Version field in Menu 24.2.1 –...
  • Page 308: Using The Ftp Command From The Command Line

    Figure 197 Telnet in Menu 24.5 Menu 24.5 - System Maintenance - Backup Configuration To transfer the configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your Prestige. Then type "root" and SMT password as requested.
  • Page 309: Gui-Based Ftp Clients

    P-660H/HW/W-T Series User’ Guide Figure 198 FTP Session Example 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> get rom-0 zyxel.rom 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK ftp: 16384 bytes sent in 1.10Seconds 297.89Kbytes/sec.
  • Page 310: Backup Configuration Using Tftp

    33.2.6 Backup Configuration Using TFTP The Prestige supports the up/downloading of the firmware and the configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended. To use TFTP, your computer must have both telnet and TFTP clients. To backup the configuration file, follow the procedure shown next.
  • Page 311: Restore Configuration

    P-660H/HW/W-T Series User’ Guide Table 111 General Commands for GUI-based TFTP Clients COMMAND DESCRIPTION Host Enter the IP address of the Prestige. 192.168.1.1 is the Prestige’s default IP address when shipped. Send/Fetch Use “Send” to upload the file to the Prestige and “Fetch” to back up the file on your computer.
  • Page 312: Restore Using Ftp Session Example

    Figure 199 Telnet into Menu 24.6 Menu 24.6 -- System Maintenance - Restore Configuration To transfer the firmware and configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your Prestige. Then type "root" and SMT password as requested.
  • Page 313: Uploading Firmware And Configuration Files

    P-660H/HW/W-T Series User’ Guide 33.4 Uploading Firmware and Configuration Files This section shows you how to upload firmware and configuration files. You can upload configuration files by following the procedure in instructions in Menu 24.7.2 – System Maintenance – Upload System Configuration File. Note: Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE YOUR Prestige.
  • Page 314: Ftp File Upload Command From The Dos Prompt Example

    Figure 202 Telnet Into Menu 24.7.2 System Maintenance Menu 24.7.2 - System Maintenance - Upload System Configuration File To upload the system configuration file, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  • Page 315: Ftp Session Example Of Firmware File Upload

    P-660H/HW/W-T Series User’ Guide 33.4.4 FTP Session Example of Firmware File Upload Figure 203 FTP Session Example of Firmware File Upload 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> put firmware.bin ras 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK ftp: 1103936 bytes sent in 1.10Seconds 297.89Kbytes/sec.
  • Page 316: Tftp Upload Command Example

    33.4.6 TFTP Upload Command Example The following is an example TFTP command: tftp [-i] host put firmware.bin ras where “ ” specifies binary image transfer mode (use this mode when transferring binary files), “ ” is the Prestige’s IP address and “ host –...
  • Page 317 P-660H/HW/W-T Series User’ Guide Chapter 33 Firmware and Configuration File Maintenance...
  • Page 318: Chapter 34 System Maintenance

    System Maintenance. A list of valid commands can be found by typing help or ? at the command prompt. Type “ Figure 204 Command Mode in Menu 24 Enter Menu Selection Number: Figure 205 Valid Commands Copyright (c) 1994 - 2004 ZyXEL Communications Corp. ras> ? Valid commands are: exit wlan...
  • Page 319: Call Control Support

    P-660H/HW/W-T Series User’ Guide 34.2 Call Control Support Call Control Support is only applicable when Encapsulation is set to PPPoE in menu 4 or menu 11.1. The budget management function allows you to set a limit on the total outgoing call time of the Prestige within certain times.
  • Page 320: Time And Date Setting

    Figure 207 Menu 24.9.1 System Maintenance: Budget Management Menu 24.9.1 - System Maintenance - Budget Management Remote Node 1.MyIsp 2.-------- 3.-------- 4.-------- 5.-------- 6.-------- 7.-------- 8.-------- Reset Node (0 to update screen): The total budget is the time limit on the accumulated time for outgoing calls to a remote node. When this limit is reached, the call will be dropped and further outgoing calls to that remote node will be blocked.
  • Page 321: Figure 208 Menu 24 System Maintenance

    P-660H/HW/W-T Series User’ Guide Figure 208 Menu 24 System Maintenance Menu 24 - System Maintenance Enter Menu Selection Number: Then enter 10 to go to Menu 24.10 System Maintenance Time and Date Setting to update the time and date settings of your Prestige as shown in the following screen. Figure 209 Menu 24.10 System Maintenance: Time and Date Setting Menu 24.10 - System Maintenance - Time and Date Setting Use Time Server when Bootup= None...
  • Page 322: Resetting The Time

    Table 113 Menu 24.10 System Maintenance: Time and Date Setting (continued) FIELD Current Time New Time Current Date New Date Time Zone Daylight Saving Start Date End Date When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 34.3.1 Resetting the Time •...
  • Page 323 P-660H/HW/W-T Series User’ Guide Chapter 34 System Maintenance...
  • Page 324: Chapter 35 Remote Management

    This chapter covers remote management (SMT menu 24.11). 35.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which Prestige interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
  • Page 325: Remote Management Limitations

    P-660H/HW/W-T Series User’ Guide Figure 210 Menu 24.11 Remote Management Control Menu 24.11 - Remote Management Control TELNET Server: Server Port = 23 Secured Client IP = 0.0.0.0 FTP Server: Server Port = 21 Secured Client IP = 0.0.0.0 Web Server: Server Port = 80 Secured Client IP = 0.0.0.0 Press ENTER to Confirm or ESC to Cancel:...
  • Page 326: Remote Management And Nat

    35.3 Remote Management and NAT When NAT is enabled: • Use the Prestige’s WAN IP address when configuring from the WAN. • Use the Prestige’s LAN IP address when configuring from the LAN. 35.4 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The Prestige automatically logs you out if the management session remains idle for longer than this timeout period.
  • Page 327 P-660H/HW/W-T Series User’ Guide Chapter 35 Remote Management...
  • Page 328: Chapter 36 Ip Policy Routing

    This chapter covers setting and applying policies used for IP routing. 36.1 IP Policy Routing Overview Traditionally, routing is based on the destination address only and the IAD takes the shortest path to forward a packet. IP Routing Policy (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
  • Page 329: Ip Routing Policy Setup

    P-660H/HW/W-T Series User’ Guide • routing the packet to a different gateway (and hence the outgoing interface). • setting the TOS and precedence fields in the IP header. IPPR follows the existing packet filtering facility of RAS in style and in implementation. The policies are divided into sets, where related policies are grouped together.
  • Page 330: Figure 212 Menu 25.1 Ip Routing Policy Setup

    Figure 212 Menu 25.1 IP Routing Policy Setup Menu 25.1 - IP Routing Policy Setup - - ---------------------------------------------------------------------- 1 Y SA=1.1.1.1-1.1.1.1,DA=2.2.2.2-2.2.2.5 SP=20-25,DP=20-25,P=6,T=NM,PR=0 2 N ______________________________________________________________________ ______________________________________________________________________ 3 N ______________________________________________________________________ ______________________________________________________________________ 4 N ______________________________________________________________________ ______________________________________________________________________ 5 N ______________________________________________________________________ ______________________________________________________________________ 6 N ______________________________________________________________________ ______________________________________________________________________ Enter Policy Rule Number (1-6) to Configure: Table 115 Menu 25.1 IP Routing Policy Setup...
  • Page 331: Figure 213 Menu 25.1.1 Ip Routing Policy

    P-660H/HW/W-T Series User’ Guide Figure 213 Menu 25.1.1 IP Routing Policy Menu 25.1.1 - IP Routing Policy Policy Set Name= test Active= No Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 0.0.0.0 port start= N/A Destination: addr start= 0.0.0.0 port start= N/A Action= Matched...
  • Page 332: Applying An Ip Policy

    Table 116 Menu 25.1.1 IP Routing Policy (continued) FIELD Gateway addr Type of Service Precedence When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 36.5 Applying an IP Policy This section shows you where to apply the IP policies after you design them. 36.5.1 Ethernet IP Policies From Menu 3 —...
  • Page 333: Ip Policy Routing Example

    P-660H/HW/W-T Series User’ Guide Figure 214 Menu 3.2 TCP/IP and DHCP Ethernet Setup Menu 3.2 - TCP/IP and DHCP Setup Press ENTER to Confirm or ESC to Cancel: Go to menu 11.3 (shown next) and type the number(s) of the IP Routing Policy set(s) as appropriate.
  • Page 334: Figure 216 Example Of Ip Policy Routing

    Route 1 represents the default IP route and route 2 represents the configured IP route. Figure 216 Example of IP Policy Routing To force packets coming from clients with IP addresses of 192.168.1.33 to 192.168.1.64 to be routed to the Internet via the WAN port of the Prestige, follow the steps as shown next. 1 Create a routing policy set in menu 25.
  • Page 335: Figure 217 Ip Routing Policy Example

    P-660H/HW/W-T Series User’ Guide Figure 217 IP Routing Policy Example Policy Set Name= set1 Active= Yes Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 192.168.1.2 port start= 0 Destination: addr start= 0.0.0.0 port start= 80 Action= Matched Gateway addr Type of Service= No Change Precedence...
  • Page 336: Figure 218 Ip Routing Policy Example

    Figure 218 IP Routing Policy Example Menu 25.1.1 - IP Routing Policy Policy Set Name= set2 Active= Yes Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 0.0.0.0 port start= 0 Destination: addr start= 0.0.0.0 port start= 20 Action= Matched Gateway addr =192.168.1.100 Type of Service= No Change...
  • Page 337 P-660H/HW/W-T Series User’ Guide Chapter 36 IP Policy Routing...
  • Page 338: Chapter 37 Call Scheduling

    Call scheduling (applicable for PPPoA or PPPoE encapsulation only) allows you to dictate when a remote node should be called and for how long. 37.1 Introduction The call scheduling feature allows the Prestige to manage a remote node and dictate when a remote node should be called and for how long.
  • Page 339: Figure 221 Menu 26.1 Schedule Set Setup

    P-660H/HW/W-T Series User’ Guide To setup a schedule set, select the schedule set you want to setup from menu 26 (1-12) and press [ENTER] to see Menu 26.1 — Schedule Set Setup as shown next. Figure 221 Menu 26.1 Schedule Set Setup Menu 26.1 Schedule Set Setup Press ENTER to Confirm or ESC to Cancel: If a connection has been already established, your Prestige will not drop it.
  • Page 340: Figure 222 Applying Schedule Set(S) To A Remote Node (Pppoe)

    Table 117 Menu 26.1 Schedule Set Setup (continued) FIELD DESCRIPTION Action Forced On means that the connection is maintained whether or not there is a demand call on the line and will persist for the time period specified in the Duration field. Forced Down means that the connection is blocked whether or not there is a demand call on the line.
  • Page 341 P-660H/HW/W-T Series User’ Guide Chapter 37 Call Scheduling...
  • Page 342: Chapter 38 Troubleshooting

    This chapter covers potential problems and the corresponding remedies. 38.1 Problems Starting Up the Prestige Table 118 Troubleshooting Starting Up Your Prestige PROBLEM CORRECTIVE ACTION None of the Make sure that the Prestige’s power adaptor is connected to the Prestige and plugged LEDs turn on in to an appropriate power source.
  • Page 343: Problems With The Wan

    P-660H/HW/W-T Series User’ Guide 38.3 Problems with the WAN Table 120 Troubleshooting the WAN PROBLEM CORRECTIVE ACTION The DSL LED is Check the telephone wire and connections between the Prestige DSL port and the off. wall jack. Make sure that the telephone company has checked your phone line and set it up for DSL service.
  • Page 344: Problems Accessing The Prestige

    38.4 Problems Accessing the Prestige Table 121 Troubleshooting Accessing the Prestige PROBLEM CORRECTIVE ACTION I cannot The username is “admin”. The default password is “1234”. The Password and access the Username fields are case-sensitive. Make sure that you enter the correct password Prestige.
  • Page 345: Figure 223 Pop-Up Blocker

    P-660H/HW/W-T Series User’ Guide Figure 223 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled.
  • Page 346: Figure 225 Internet Options

    P-660H/HW/W-T Series User’ Guide Figure 225 Internet Options 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1. 4 Click Add to move the IP address to the list of Allowed sites. Chapter 38 Troubleshooting...
  • Page 347: Javascripts

    P-660H/HW/W-T Series User’ Guide Figure 226 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. 38.4.1.2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 348: Figure 227 Internet Options

    P-660H/HW/W-T Series User’ Guide Figure 227 Internet Options 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window.
  • Page 349: Java Permissions

    P-660H/HW/W-T Series User’ Guide Figure 228 Security Settings - Java Scripting 38.4.1.3 Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
  • Page 350: Figure 229 Security Settings - Java

    Figure 229 Security Settings - Java 38.4.1.3.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Chapter 38 Troubleshooting P-660H/HW/W-T Series User’...
  • Page 351: Activex Controls In Internet Explorer

    P-660H/HW/W-T Series User’ Guide Figure 230 Java (Sun) 38.4.2 ActiveX Controls in Internet Explorer If ActiveX is disabled, you will not be able to download ActiveX controls or to use Trend Micro Security Services. Make sure that ActiveX controls are allowed in Internet Explorer. Screen shots for Internet Explorer 6 are shown.
  • Page 352: Figure 231 Internet Options Security

    P-660H/HW/W-T Series User’ Guide Figure 231 Internet Options Security 3 Scroll down to ActiveX controls and plug-ins. 4 Under Download signed ActiveX controls select the Prompt radio button. 5 Under Run ActiveX controls and plug-ins make sure the Enable radio button is selected.
  • Page 353: Figure 232 Security Setting Activex Controls

    P-660H/HW/W-T Series User’ Guide Figure 232 Security Setting ActiveX Controls Chapter 38 Troubleshooting...
  • Page 354: Product Specifications

    See also the Introduction chapter for a general overview of the key features. Specification Tables Table 122 Device Default IP Address Default Subnet Mask Default Password DHCP Pool Dimensions (W x D x H) Power Specification Built-in Switch (P-660H/ P-660HW) Operation Temperature Storage Temperature Operation Humidity...
  • Page 355: Table 123 Firmware

    P-660H/HW/W-T Series User’ Guide Table 123 Firmware ADSL Standards Other Protocol Support PPP (Point-to-Point Protocol) link layer protocol. Management Wireless (P-660HW/ P- 660W) Multi-Mode standard (ANSI T1.413,Issue 2; G.dmt(G.992.1); G.lite(G992.2)). ADSL2 G.dmt.bis (G.992.3) ADSL2 G.lite.bis (G.992.4) ADSL2+ (G.992.5) Reach-Extended ADSL (RE ADSL) SRA (Seamless Rate Adaptation) Auto-negotiating rate adaptation ADSL physical connection ATM AAL5 (ATM Adaptation Layer type 5)
  • Page 356 Table 123 Firmware (continued) Firewall NAT/SUA Content Filtering Static Routes Other Features Appendix A Stateful Packet Inspection. Prevent Denial of Service attacks such as Ping of Death, SYN Flood, LAND, Smurf etc. Real time E-mail alerts. Reports and logs. Port Forwarding 1024 NAT sessions Multimedia application PPTP under NAT/SUA...
  • Page 357 P-660H/HW/W-T Series User’ Guide Appendix A...
  • Page 358: Wall-Mounting Instructions

    Do the following to hang your Prestige on a wall. Note: See the product specifications appendix for the size of screws to use and how far apart to place them. 1 Locate a high position on wall that is free of obstructions. Use a sturdy wall. 2 Drill two holes for the screws.
  • Page 359 P-660H/HW/W-T Series User’ Guide Appendix B...
  • Page 360: Setting Up Your Computer's Ip Address

    Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
  • Page 361: Figure 233 Windows 95/98/Me: Network: Configuration

    P-660H/HW/W-T Series User’ Guide Figure 233 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 362: Figure 234 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
  • Page 363: Windows 2000/Nt/Xp

    P-660H/HW/W-T Series User’ Guide Figure 235 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add. 5 Click OK to save and close the TCP/IP Properties window.
  • Page 364: Figure 236 Windows Xp: Start Menu

    Figure 236 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 237 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Appendix C P-660H/HW/W-T Series User’ Guide...
  • Page 365: Figure 238 Windows Xp: Control Panel: Network Connections: Properties

    P-660H/HW/W-T Series User’ Guide Figure 238 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 239 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 366: Figure 240 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    • Click Advanced. Figure 240 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 367: Figure 241 Windows Xp: Advanced Tcp/Ip Properties

    P-660H/HW/W-T Series User’ Guide Figure 241 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). •...
  • Page 368: Macintosh Os 8/9

    Figure 242 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
  • Page 369: Figure 243 Macintosh Os 8/9: Apple Menu

    P-660H/HW/W-T Series User’ Guide Figure 243 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 244 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. Appendix C...
  • Page 370: Macintosh Os X

    4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box. 5 Close the TCP/IP Control Panel.
  • Page 371: Linux

    P-660H/HW/W-T Series User’ Guide Figure 246 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 372: Figure 247 Red Hat 9.0: Kde: Network Configuration: Devices

    Note: Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. 1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network.
  • Page 373: Figure 249 Red Hat 9.0: Kde: Network Configuration: Dns

    P-660H/HW/W-T Series User’ Guide • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.
  • Page 374: Figure 251 Red Hat 9.0: Dynamic Ip Address Setting In Ifconfig-Eth0

    1 Assuming that you have only one network card on the computer, locate the configuration file (where eth0 configuration file with any plain text editor. • If you have a dynamic IP address, enter following figure shows an example. Figure 251 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp...
  • Page 375: Figure 254 Red Hat 9.0: Restart Ethernet Card

    P-660H/HW/W-T Series User’ Guide Figure 254 Red Hat 9.0: Restart Ethernet Card [root@localhost init.d]# network restart Shutting down interface eth0: Shutting down loopback interface: Setting network parameters: Bringing up loopback interface: Bringing up interface eth0: Verifying Settings Enter in a terminal screen to check your TCP/IP properties. ifconfig Figure 255 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig...
  • Page 376: Ip Subnetting

    IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
  • Page 377: Subnet Masks

    P-660H/HW/W-T Series User’ Guide Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a value of 0 to 127. Similarly the first octet of a class “B” must begin with “10”, therefore the first octet of a class “B”...
  • Page 378: Example: Two Subnets

    Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/”...
  • Page 379: Table 129 Subnet 1

    P-660H/HW/W-T Series User’ Guide Note: In the following charts, shaded/bolded last octet bit values indicate host ID bits “borrowed” to form network ID bits. The number of “borrowed” host ID bits determines the number of subnets you can have. The remaining number of host ID bits (after “borrowing”) determines the number of hosts you can have on each subnet.
  • Page 380: Example: Four Subnets

    Example: Four Subnets The above example illustrated using a 25-bit subnet mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00, 01, 10 and 11. The subnet mask is 26 bits (11111111.11111111.11111111.11000000) or 255.255.255.192.
  • Page 381: Example Eight Subnets

    P-660H/HW/W-T Series User’ Guide Table 134 Subnet 4 IP/SUBNET MASK IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.192 Broadcast Address: 192.168.1.255 Example Eight Subnets Similarly use a 27-bit mask to create 8 subnets (001, 010, 011, 100, 101, 110). The following table shows class C IP address last octet values for each subnet.
  • Page 382: Subnetting With Class A And Class B Networks

    Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets available for subnetting and a class “A” address has three host ID octets (see The following table is a summary for class “B”...
  • Page 383 P-660H/HW/W-T Series User’ Guide Appendix D...
  • Page 384: Appendix E Boot Commands

    The BootModule AT commands execute from within the router’s bootup software, when debug mode is selected before the main router firmware is started. When you start up your Prestige, you are given a choice to go into debug mode by pressing a key at the prompt shown in the following screen.
  • Page 385: Figure 257 Boot Module Commands

    P-660H/HW/W-T Series User’ Guide Figure 257 Boot Module Commands just answer OK ATHE print help ATBAx change baudrate. 1:38.4k, 2:19.2k, 3:9.6k 4:57.6k 5:115.2k ATENx,(y) set BootExtension Debug Flag (y=password) ATSE show the seed of password generator ATTI(h,m,s) change system time to hour:min:sec or show current time ATDA(y,m,d) change system date to year/month/day or show...
  • Page 386: Appendix F Command Interpreter

    The following describes how to use the command interpreter. Enter 24 in the main menu to bring up the system maintenance menu. Enter 8 to go to Menu 24.8 - Command Interpreter Mode. See the included disk or zyxel.com for more detailed information on these commands. Note: Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable.
  • Page 387 P-660H/HW/W-T Series User’ Guide Appendix F...
  • Page 388: Appendix G Firewall Commands

    The following describes the firewall commands. Table 138 Firewall Commands FUNCTION COMMAND Firewall SetUp config edit firewall active <yes | no> config retrieve firewall config save firewall Display config display firewall config display firewall set <set #> config display firewall set <set #>...
  • Page 389: Table 138 Firewall Commands

    P-660H/HW/W-T Series User’ Guide Table 138 Firewall Commands (continued) FUNCTION COMMAND config edit firewall e-mail return-addr <e-mail address> config edit firewall e-mail email-to <e-mail address> config edit firewall e-mail policy <full | hourly | daily | weekly> config edit firewall e-mail day <sunday | monday | tuesday | wednesday | thursday | friday | saturday>...
  • Page 390 Table 138 Firewall Commands (continued) FUNCTION COMMAND config edit firewall attack minute-low <0-255> config edit firewall attack max-incomplete-high <0-255> config edit firewall attack max-incomplete-low <0-255> config edit firewall attack tcp-max-incomplete <0-255> Sets config edit firewall set <set #> name <desired name> Config edit firewall set <set #>...
  • Page 391 P-660H/HW/W-T Series User’ Guide Table 138 Firewall Commands (continued) FUNCTION COMMAND Config edit firewall set <set #> log <yes | no> Rules Config edit firewall set <set #> rule <rule #> permit <forward | block> Config edit firewall set <set #>...
  • Page 392 Table 138 Firewall Commands (continued) FUNCTION COMMAND config edit firewall set <set #> rule <rule #> destaddr- range <start ip address> <end ip address> config edit firewall set <set #> rule <rule #> TCP destport- single <port #> config edit firewall set <set #>...
  • Page 393 P-660H/HW/W-T Series User’ Guide Appendix G...
  • Page 394: Netbios Filter Commands

    The following describes the NetBIOS packet filter commands. Introduction NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast packets that enable a computer to connect to and communicate with a LAN. For some dial-up services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls. You can configure NetBIOS filters to do the following: •...
  • Page 395: Netbios Filter Configuration

    P-660H/HW/W-T Series User’ Guide The filter types and their default settings are as follows. Table 139 NetBIOS Filter Default Settings NAME DESCRIPTION Between LAN This field displays whether NetBIOS packets are blocked or forwarded and WAN between the LAN and the WAN. Between LAN This field displays whether NetBIOS packets are blocked or forwarded and DMZ...
  • Page 396 sys filter netbios config 3 on sys filter netbios config 4 off Appendix H P-660H/HW/W-T Series User’ Guide This command blocks IPSec NetBIOS packets. This command stops NetBIOS commands from initiating calls.
  • Page 397 P-660H/HW/W-T Series User’ Guide Appendix H...
  • Page 398: Splitters And Microfilters

    This appendix tells you how to install a POTS splitter or a telephone microfilter. Connecting a POTS Splitter When you use the Full Rate (G.dmt) ADSL standard, you can use a POTS (Plain Old Telephone Service) splitter to separate the telephone and ADSL signals. This allows simultaneous Internet access and telephone service on the same line.
  • Page 399: Prestige With Isdn

    P-660H/HW/W-T Series User’ Guide 1 Connect a phone cable from the wall jack to the single jack end of the Y- Connector. 2 Connect a cable from the double jack end of the Y-Connector to the “wall side” of the microfilter.
  • Page 400 P-660H/HW/W-T Series User’ Guide Appendix I...
  • Page 401 P-660H/HW/W-T Series User’ Guide Appendix I...
  • Page 402: Appendix Jpppoe

    PPPoE in Action An ADSL modem bridges a PPP session over Ethernet (PPP over Ethernet, RFC 2516) from your computer to an ATM PVC (Permanent Virtual Circuit) which connects to a DSL Access Concentrator where the PPP session terminates (see support any number of PPP sessions from your LAN.
  • Page 403: How Pppoe Works

    P-660H/HW/W-T Series User’ Guide Figure 261 Single-Computer per Router Hardware Configuration How PPPoE Works The PPPoE driver makes the Ethernet appear as a serial link to the computer and the computer runs PPP over it, while the modem bridges the Ethernet frames to the Access Concentrator (AC).
  • Page 404: Appendix K Log Descriptions

    This appendix provides descriptions of example log messages. Table 140 System Maintenance Logs LOG MESSAGE Time calibration is successful Time calibration failed WAN interface gets IP:%s DHCP client IP expired DHCP server assigns%s Successful SMT login SMT login failed Successful WEB login WEB login failed Successful TELNET login TELNET login failed...
  • Page 405: Table 141 System Error Logs

    P-660H/HW/W-T Series User’ Guide Table 140 System Maintenance Logs (continued) LOG MESSAGE Configuration Change: PC = 0x%x, Task ID = 0x%x Successful SSH login SSH login failed Successful HTTPS login HTTPS login failed Table 141 System Error Logs LOG MESSAGE %s exceeds the max.
  • Page 406: Table 143 Tcp Reset Logs

    Table 143 TCP Reset Logs LOG MESSAGE Under SYN flood attack, sent TCP RST Exceed TCP MAX incomplete, sent TCP RST Peer TCP state out of order, sent TCP RST Firewall session time out, sent TCP RST Exceed MAX incomplete, sent TCP RST Access block, sent TCP Table 144 Packet Filter Logs...
  • Page 407: Table 145 Icmp Logs

    P-660H/HW/W-T Series User’ Guide Table 145 ICMP Logs LOG MESSAGE Firewall default policy: ICMP <Packet Direction>, <type:%d>, <code:%d> Firewall rule [NOT] match: ICMP <Packet Direction>, <rule:%d>, <type:%d>, <code:%d> Triangle route packet forwarded: ICMP Packet without a NAT table entry blocked: ICMP Unsupported/out-of-order ICMP: ICMP Router reply ICMP packet: ICMP...
  • Page 408: Table 148 Upnp Logs

    Table 147 PPP Logs (continued) LOG MESSAGE ppp:LCP Closing ppp:IPCP Closing Table 148 UPnP Logs LOG MESSAGE UPnP pass through Firewall Table 149 Content Filtering Logs LOG MESSAGE %s: Keyword blocking %s: Not in trusted web list %s: Forbidden Web site The web site is in the forbidden web site list. %s: Contains ActiveX %s: Contains Java applet...
  • Page 409: Table 150 Attack Logs

    P-660H/HW/W-T Series User’ Guide Table 149 Content Filtering Logs (continued) LOG MESSAGE Connecting to content filter server fail License key is invalid The external content filtering license key is invalid. Table 150 Attack Logs LOG MESSAGE attack [TCP | UDP | IGMP | ESP | GRE | OSPF] attack ICMP (type:%d, code:%d)
  • Page 410: Table 151 Ipsec Logs

    Table 151 IPSec Logs LOG MESSAGE Discard REPLAY packet Inbound packet authentication failed Receive IPSec packet, but no corresponding tunnel exists Rule <%d> idle time out, disconnect WAN IP changed to <IP> Table 152 IKE Logs LOG MESSAGE Active connection allowed exceeded Start Phase 2: Quick Mode Verifying Remote ID failed:...
  • Page 411 P-660H/HW/W-T Series User’ Guide Table 152 IKE Logs (continued) LOG MESSAGE Cannot resolve Secure Gateway Addr for rule <%d> Peer ID: <peer id> <My remote type> -<My local type> vs. My Remote <My remote> - <My remote> vs. My Local <My local>-<My local>...
  • Page 412 Table 152 IKE Logs (continued) LOG MESSAGE XAUTH fail! Username: <Username> Rule[%d] Phase 1 negotiation mode mismatch Rule [%d] Phase 1 encryption algorithm mismatch Rule [%d] Phase 1 authentication algorithm mismatch Rule [%d] Phase 1 authentication method mismatch Rule [%d] Phase 1 key group mismatch Rule [%d] Phase 2 protocol mismatch...
  • Page 413: Table 153 Pki Logs

    P-660H/HW/W-T Series User’ Guide Table 152 IKE Logs (continued) LOG MESSAGE Rule [%d] phase 2 mismatch Rule [%d] Phase 2 key length mismatch Table 153 PKI Logs LOG MESSAGE Enrollment successful Enrollment failed Failed to resolve <SCEP CA server url> Enrollment successful Enrollment failed Failed to resolve <CMP...
  • Page 414: Table 154 Certificate Path Verification Failure Reason Codes

    Table 153 PKI Logs (continued) LOG MESSAGE Rcvd data <size> too large! Max size allowed: <max size> Cert trusted: <subject name> Due to <reason codes>, cert not trusted: <subject name> Table 154 Certificate Path Verification Failure Reason Codes CODE DESCRIPTION Algorithm mismatch between the certificate and the search constraints.
  • Page 415: Table 155 802.1X Logs

    P-660H/HW/W-T Series User’ Guide Table 154 Certificate Path Verification Failure Reason Codes (continued) CODE DESCRIPTION Database method failed. Path was not verified. Maximum path length reached. Table 155 802.1X Logs LOG MESSAGE Local User Database accepts user. Local User Database reports user credential error.
  • Page 416: Table 156 Acl Setting Notes

    Table 156 ACL Setting Notes PACKET DIRECTION (L to W) (W to L) (D to L) (D to W) (W to D) (L to D) (L to L/ZW) (W to W/ZW) (D to D/ZW) Table 157 ICMP Notes TYPE CODE Appendix K DIRECTION DESCRIPTION...
  • Page 417: Table 158 Syslog Logs

    P-660H/HW/W-T Series User’ Guide Table 157 ICMP Notes (continued) TYPE CODE Table 158 Syslog Logs LOG MESSAGE <Facility*8 + Severity>Mon dd hr:mm:ss hostname src="<srcIP:srcPort>" dst="<dstIP:dstPort>" msg="<msg>" note="<note>" devID="<mac address last three numbers>" cat="<category> The following table shows RFC-2408 ISAKMP payload types that the log displays. Please refer to the RFC for detailed information on each type.
  • Page 418: Log Commands

    1 Use the sys logs load command to load the log setting buffer that allows you to configure which logs the Prestige is to record. 2 Use sys logs category to view a list of the log categories. Figure 263 Displaying Log Categories Example Copyright (c) 1994 - 2004 ZyXEL Communications Corp. ras>? Valid commands are: certificates ras>...
  • Page 419: Log Command Example

    P-660H/HW/W-T Series User’ Guide Use 0 to not record logs for that category, 1 to record only logs for that category, 2 to record only alerts for that category, and 3 to record both logs and alerts for that category. Not every parameter is available with every category.
  • Page 420: Appendix L Wireless Lans

    Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 421: Figure 266 Basic Service Set

    P-660H/HW/W-T Series User’ Guide Figure 266 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
  • Page 422: Channel

    Figure 267 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
  • Page 423: Fragmentation Threshold

    P-660H/HW/W-T Series User’ Guide Figure 268 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 424: Preamble Type

    A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
  • Page 425: Ieee 802.1X

    P-660H/HW/W-T Series User’ Guide IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: •...
  • Page 426: Types Of Authentication

    • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access- Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: •...
  • Page 427: Dynamic Wep Key Exchange

    P-660H/HW/W-T Series User’ Guide EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by both the server and the wireless stations for mutual authentication. The server presents a certificate to the client. After validating the identity of the server, the client sends a different certificate to the server. The exchange of certificates is done in the open before a secured tunnel is created.
  • Page 428: Wpa

    For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical. The following table is a comparison of the features of authentication types. Table 161 Comparison of EAP Authentication Types Mutual Authentication Certificate –...
  • Page 429: Security Parameters Summary

    P-660H/HW/W-T Series User’ Guide The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped.
  • Page 430: Appendix M Internal Sptgen

    Internal SPTGEN Overview Internal SPTGEN (System Parameter Table Generator) is a configuration text file useful for efficient configuration of multiple Prestiges. Internal SPTGEN lets you configure, save and upload multiple menus at the same time using just one configuration text file – eliminating the need to navigate and configure individual SMT menus for each Prestige.
  • Page 431: Internal Sptgen Ftp Download Example

    P-660H/HW/W-T Series User’ Guide Some parameters are dependent on others. For example, if you disable the Configured field in menu 1 (see Figure 269 on page If you enter a parameter that is invalid in the Input column, the Prestige will not save the configuration and the command line will display the Field Identification Number.
  • Page 432: Internal Sptgen Ftp Upload Example

    Figure 272 Internal SPTGEN FTP Download Example c:\ftp 192.168.1.1 220 PPP FTP version 1.0 ready at Sat Jan 1 03:22:12 2000 User (192.168.1.1:(none)): 331 Enter PASS command Password: 230 Logged in ftp>bin 200 Type I OK ftp> get rom-t ftp>bye c:\edit rom-t (edit the rom-t text file by a text editor and save it) Note: You can rename your “...
  • Page 433: Table 164 Menu 1 General Setup (Smt Menu 1)

    P-660H/HW/W-T Series User’ Guide Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table (continued) ABBREVIATION MEANING Parameter Values Allowed INPUT An example of what you may enter Applies to the Prestige. The following are Internal SPTGEN screens associated with the SMT screens of your Prestige. Table 164 Menu 1 General Setup (SMT Menu 1) / Menu 1 General Setup (SMT Menu 1) 10000000 =...
  • Page 434 Table 165 Menu 3 (SMT Menu 3 (continued)) 30200001 = DHCP 30200002 = Client IP Pool Starting Address 30200003 = Size of Client IP Pool 30200004 = Primary DNS Server 30200005 = Secondary DNS Server 30200006 = Remote DHCP Server 30200008 = IP Address 30200009 =...
  • Page 435 P-660H/HW/W-T Series User’ Guide Table 165 Menu 3 (SMT Menu 3 (continued)) 30201008 = IP Alias #1 Incoming protocol filters Set 3 30201009 = IP Alias #1 Incoming protocol filters Set 4 30201010 = IP Alias #1 Outgoing protocol filters Set 1 30201011 = IP Alias #1 Outgoing protocol filters...
  • Page 436 Table 165 Menu 3 (SMT Menu 3 (continued)) 30500004 = RTS Threshold 30500005 = FRAG. Threshold 30500006 = 30500007 = Default Key 30500008 = WEP Key1 30500009 = WEP Key2 30500010 = WEP Key3 30500011 = WEP Key4 30500012 = Wlan Active */ MENU 3.5.1 WLAN MAC ADDRESS FILTER (SMT MENU 3.5.1) 30501001 =...
  • Page 437: Table 166 Menu 4 Internet Access Setup (Smt Menu 4)

    P-660H/HW/W-T Series User’ Guide Table 166 Menu 4 Internet Access Setup (SMT Menu 4) (continued) 40000002 = Active 40000003 = ISP's Name 40000004 = Encapsulation 40000005 = Multiplexing 40000006 = VPI # 40000007 = VCI # 40000008 = Service Name 40000009 = My Login 40000010 =...
  • Page 438: Table 167 Menu 12 (Smt Menu 12)

    Table 166 Menu 4 Internet Access Setup (SMT Menu 4) (continued) 40000032= RIP Version 40000033= Nailed-up Connection Table 167 Menu 12 (SMT Menu 12) / Menu 12.1.1 IP Static Route Setup (SMT Menu 12.1.1) 120101001 = IP Static Route set #1, Name 120101002 = IP Static Route set #1, Active 120101003 =...
  • Page 439 P-660H/HW/W-T Series User’ Guide Table 167 Menu 12 (SMT Menu 12) (continued) / Menu 12.1.4 IP Static Route Setup (SMT Menu 12.1.4) 120104001 = IP Static Route set #4, Name 120104002 = IP Static Route set #4, Active 120104003 = IP Static Route set #4, Destination IP address 120104004 =...
  • Page 440 Table 167 Menu 12 (SMT Menu 12) (continued) 120107006 = IP Static Route set #7, Metric 120107007 = IP Static Route set #7, Private / Menu 12.1.8 IP Static Route Setup (SMT Menu 12.1.8) 120108001 = IP Static Route set #8, Name 120108002 = IP Static Route set #8, Active 120108003 =...
  • Page 441 P-660H/HW/W-T Series User’ Guide Table 167 Menu 12 (SMT Menu 12) (continued) 120111004 = IP Static Route set #11, Destination IP subnetmask 120111005 = IP Static Route set #11, Gateway 120111006 = IP Static Route set #11, Metric 120111007 = IP Static Route set #11, Private */ Menu 12.1.12 IP Static Route Setup (SMT Menu 12.1.12) 120112001 =...
  • Page 442 Table 167 Menu 12 (SMT Menu 12) (continued) 120115002 = IP Static Route set #15, Active 120115003 = IP Static Route set #15, Destination IP address 120115004 = IP Static Route set #15, Destination IP subnetmask 120115005 = IP Static Route set #15, Gateway 120115006 = IP Static Route set #15, Metric 120115007 =...
  • Page 443: Table 168 Menu 15 Sua Server Setup (Smt Menu 15)

    P-660H/HW/W-T Series User’ Guide Table 168 Menu 15 SUA Server Setup (SMT Menu 15) (continued) 150000014 = SUA Server #4 Port Start 150000015 = SUA Server #4 Port End 150000016 = SUA Server #4 Local IP address 150000017 = SUA Server #5 Active 150000018 = SUA Server #5 Protocol 150000019 =...
  • Page 444: Table 169 Menu 21.1 Filter Set #1 (Smt Menu 21.1)

    Table 168 Menu 15 SUA Server Setup (SMT Menu 15) (continued) 150000048 = SUA Server #11 Protocol 150000049 = SUA Server #11 Port Start 150000050 = SUA Server #11 Port End 150000051 = SUA Server #11 Local IP address 150000052 = SUA Server #12 Active 150000053 = SUA Server #12 Protocol...
  • Page 445 P-660H/HW/W-T Series User’ Guide Table 169 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) / Menu 21.1.1.2 set #1, rule #2 (SMT Menu 21.1.1.2) 210102001 = IP Filter Set 1,Rule 2 Type 210102002 = IP Filter Set 1,Rule 2 Active 210102003 = IP Filter Set 1,Rule 2 Protocol 210102004 =...
  • Page 446 Table 169 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210103013 = IP Filter Set 1,Rule 3 Act Match 210103014 = IP Filter Set 1,Rule 3 Act Not Match / Menu 21.1.1.4 set #1, rule #4 (SMT Menu 21.1.1.4) 210104001 = IP Filter Set 1,Rule 4 Type 210104002 =...
  • Page 447: Table 170 Menu 21.1 Filer Set #2, (Smt Menu 21.1)

    P-660H/HW/W-T Series User’ Guide Table 169 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210105009 = IP Filter Set 1,Rule 5 Src Subnet Mask 210105010 = IP Filter Set 1,Rule 5 Src Port 210105011 = IP Filter Set 1,Rule 5 Src Port Comp 210105013 = IP Filter Set 1,Rule 5 Act Match 210105014 =...
  • Page 448 Table 170 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) / Menu 21.1.2.1 Filter set #2, rule #1 (SMT Menu 21.1.2.1) 210201001 = IP Filter Set 2, Rule 1 Type 210201002 = IP Filter Set 2, Rule 1 Active 210201003 = IP Filter Set 2, Rule 1 Protocol 210201004 =...
  • Page 449 P-660H/HW/W-T Series User’ Guide Table 170 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210202009 = IP Filter Set 2, Rule 2 Src Subnet Mask 210202010 = IP Filter Set 2,Rule 2 Src Port 210202011 = IP Filter Set 2, Rule 2 Src Port Comp 210202013 = IP Filter Set 2, Rule 2 Act Match...
  • Page 450 Table 170 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210204002 = IP Filter Set 2, Rule 4 Active 210204003 = IP Filter Set 2, Rule 4 Protocol 210204004 = IP Filter Set 2, Rule 4 Dest IP address 210204005 = IP Filter Set 2, Rule 4 Dest Subnet Mask...
  • Page 451 P-660H/HW/W-T Series User’ Guide Table 170 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210205011 = IP Filter Set 2, Rule 5 Src Port Comp 210205013 = IP Filter Set 2, Rule 5 Act Match 210205014 = IP Filter Set 2, Rule 5 Act Not Match / Menu 21.1.2.6 Filter set #2, rule #6 (SMT Menu 21.1.2.5) 210206001 =...
  • Page 452: Table 171 Menu 23 System Menus (Smt Menu 23)

    Table 171 Menu 23 System Menus (SMT Menu 23) */ Menu 23.1 System Password Setup (SMT Menu 23.1) 230000000 = System Password */ Menu 23.2 System security: radius server (SMT Menu 23.2) 230200001 = Authentication Server Configured 230200002 = Authentication Server Active 230200003 = Authentication Server IP Address 230200004 =...
  • Page 453: Command Examples

    P-660H/HW/W-T Series User’ Guide Table 171 Menu 23 System Menus (SMT Menu 23) (continued) 230400008 = WPA Mixed Mode 230400009 = Data Privacy for Broadcast/ Multicast packets 230400010 = WPA Broadcast/Multicast Key Update Timer Table 172 Menu 24.11 Remote Management Control (SMT Menu 24.11) / Menu 24.11 Remote Management Control (SMT Menu 24.11) 241100001 = TELNET Server Port...
  • Page 454 Table 173 Command Examples (continued) 990000001 = ADSL OPMD Appendix M P-660H/HW/W-T Series User’ Guide INPUT INPUT <0(etsi)|1(normal) |2(gdmt)|3(multimo de)>...
  • Page 455 P-660H/HW/W-T Series User’ Guide Appendix M...
  • Page 456: Index

    Numerics 110V AC 230V AC Abnormal Working Conditions Access methods Accessories Acts of God Address Assignment Address mapping Address Resolution Protocol (ARP) ADSL, what is it? ADSLstandards Airflow Alternative Subnet Mask Notation American Wire Gauge Any IP 43, 66 How it works note Any IP Setup Any IP table...
  • Page 457 P-660H/HW/W-T Series User’ Guide Precedence Precedence Example CBR (Continuous Bit Rate) CDR (Call Detail Record) Certificate Authority Certifications change password at login Channel Interference Channel ID CHAP Charge Circuit Class B Class Name Collision Command Interpreter Mode Communications Community compact compact guide Compliance, FCC Components...
  • Page 458 Dynamic WEP key exchange dynamic WEP key exchange DYNDNS Wildcard EAP Authentication EAP authentication ECHO Electric Shock Electrical Pipes Electrocution E-mail Log Example embedded help Encapsulated Routing Link Protocol (ENET ENCAP) Encapsulation 90, 234, 237 ENET ENCAP PPP over Ethernet PPPoA RFC 1483 Encryption...
  • Page 459 P-660H/HW/W-T Series User’ Guide Gas Pipes Gateway Gateway Node General Setup Generic filter Germany, Contact Information God, act of Half-Open Sessions Harmful Interference Hidden Menus Hidden node High Voltage Points Hop Count 241, 248 Host Host IDs HTTP 107, 119, 120, 121 HTTP (Hypertext Transfer Protocol) IANA IANA (Internet Assigned Number Authority)
  • Page 460 Key management protocol Labor LAN Setup 62, 90 LAN TCP/IP LAN to WAN Rules LAND 121, 122 Legal Rights Liability License Lightning Link type Liquids, Corrosive LLC-based Multiplexing Local Network Rule Summary Local User Database Local user database Log and Trace Log Facility Logging Option 278, 281...
  • Page 461 P-660H/HW/W-T Series User’ Guide One-Minute High Opening Operating Condition Operating frequency Out-dated Warranty Outlet Packet Error Received Transmitted Packet Filtering Packet filtering When to use Packet Filtering Firewalls Packet Triggered Packets Pairwise Master Key (PMK) Parts Password 208, 212, 238, 287 password Patent Peak Cell Rate (PCR)
  • Page 462 RADIUS Configuring Shared Secret Key RADIUS Message Types RADIUS Messages RADIUS server 299, 329 Rate Receiving Transmission real-time application Receiving Antenna Registered Registered Trademark Regular Mail reinitialize the ADSL line Related Documentation Relocate Re-manufactured Remote DHCP Server Remote Management Firewall Remote Management and NAT Remote Management Limitations 158, 325...
  • Page 463 P-660H/HW/W-T Series User’ Guide Shock, Electric SMT Menu Overview SMTP SMTP Error Messages Smurf 122, 123 SNMP Community Configuration GetNext Manager MIBs Trap Trusted Host Source Address 134, 140 Source-Based Routing Spain, Contact Information Splitters Stateful Inspection 43, 118, 119, 124, 125 Prestige Process Static route...
  • Page 464 Traffic shaping Translation Transmission Rates TV Technician Type of Service 328, 330, 331, 332 UBR (Unspecified Bit Rate) UDP/ICMP Security Undesired Operations Universal Plug and Play Application Security issues Universal Plug and Play (UPnP) Universal Plug and Play Forum UNIX Syslog 300, 301 UNIX syslog parameters Upload Firmware...
  • Page 465 P-660H/HW/W-T Series User’ Guide XMODEM protocol Zero Configuration Internet Access Zero configuration Internet access ZyNOS 2, 307 ZyNOS (ZyXEL Network Operating System) ZyNOS F/W Version ZyXEL Communications Corporation ZyXEL Home Page ZyXEL Limited Warranty Note ZyXEL Network Operating System ZyXEL_s Firewall Introduction Index...

Table of Contents