Summary of Contents for ZyXEL Communications Broadband Security Gateway P-312
Page 1
Prestige 312 Broadband Security Gateway User’s Guide Version 3.20 November 2000...
Page 2
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
P312 Broadband Security Gateway Federal Communications Commission (FCC) Interference Statement This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operations.
P312 Broadband Security Gateway Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company.
EN 61000-4-8 Voltage dips, short interruptions and voltage variations immunity EN 61000-4-11 tests Warranty We, the Manufacturer/Importer, ZyXEL Communications Corp. No. 6, Innovation Rd. II, Science-Based Industrial Park, Hsinchu, Taiwan, 300 R.O.C declare that the product Prestige 312 is in conformity with...
Page 7
P312 Broadband Security Gateway ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to...
Table of Contents ... ix List of Figures ...xvi List Of Tables ... xxiii Customer Support...viii Preface... xxvii Getting Started ... I Chapter 1 Getting to Know Your Prestige...1-1 The Prestige 312 Broadband Security Gateway ... 1-1 Features of The Prestige 312 ... 1-1 Applications for Prestige 312 ...
Page 10
P312 Broadband Security Gateway 2.10.1 LAN Port Filter Setup ...2-12 Chapter 3 Internet Access ...3-1 TCP/IP and DHCP for LAN ...3-1 3.1.1 Factory LAN Defaults...3-1 3.1.2 IP Address and Subnet Mask ...3-1 3.1.3 Private IP Addresses ...3-2 3.1.4 RIP Setup ...3-2 3.1.5 DHCP Configuration...3-3 3.1.6...
Page 11
6.1.4 NAT Mapping Types... 6-2 6.1.5 SUA (Single User Account) Versus NAT ... 6-3 6.1.6 NAT Application ... 6-4 SMT Menus... 6-4 6.2.1 Applying NAT in the SMT Menus... 6-4 6.2.2 Configuring NAT ... 6-6 Address Mapping Sets and NAT Server Sets:... 6-6 NAT Server Sets...
Page 12
P312 Broadband Security Gateway System Status ...9-2 System Information and Console Port Speed...9-4 9.2.1 System Information ...9-4 9.2.2 Console Port Speed ...9-5 Log and Trace ...9-5 9.3.1 Viewing Error Log ...9-6 9.3.2 UNIX Syslog...9-6 9.3.3 Call-Triggering Packet ...9-10 Diagnostic ...9-10 9.4.1 WAN DHCP ...9-11 Chapter 10 Transferring Files ...10-1...
Page 13
12.2 Telnet Under NAT... 12-1 12.3 Telnet Capabilities... 12-1 12.3.1 Single Administrator ... 12-1 12.3.2 System Timeout... 12-2 12.4 Telnet Under the Firewall... 12-2 Firewall and Content Filters...IV Chapter 13 What is a Firewall...13-1 13.1 Types of Firewalls ... 13-1 13.1.1 Packet Filtering Firewalls...
Page 14
P312 Broadband Security Gateway 15.3 E-Mail ...15-3 15.3.1 What are Alerts?...15-3 15.3.2 What are Logs? ...15-4 15.3.3 SMTP Error Messages ...15-6 15.3.4 Example E-Mail Log...15-6 15.4 Attack Alert...15-7 15.4.1 Threshold Values: ...15-8 15.4.2 Half-Open Sessions ...15-8 Chapter 16 Creating Custom Rules...16-1 16.1 Rules Overview...16-1 16.2...
Page 15
20.1 Restrict Web Features... 20-1 20.1.1 ActiveX ... 20-1 20.1.2 Java... 20-1 20.1.3 Cookies... 20-2 20.1.4 Web Proxy... 20-2 20.2 Blocking URLs... 20-2 20.3 Content Filtering Using the PWC... 20-2 Troubleshooting, Appendices, Glossary and Index...V Chapter 21 Troubleshooting ...21-1 21.1 Problems Starting Up the Prestige...
Table 2-1 LED functions ... 2-1 Table 2-2 Main Menu Commands ... 2-5 Table 2-3 Main Menu Summary... 2-6 Table 2-4 General Setup Menu Field... 2-9 Table 2-5 Configure Dynamic DNS Menu Fields ... 2-10 Table 2-6 WAN Setup Menu Fields... 2-11 Table 3-1 LAN DHCP Setup Menu Fields ...
Page 24
P312 Broadband Security Gateway Table 7-2 Abbreviations Used If Filter Type Is IP ...7-7 Table 7-3 Abbreviations Used If Filter Type Is GEN...7-7 Table 7-4 TCP/IP Filter Rule Menu Fields...7-8 Table 7-5 Generic Filter Rule Menu Fields ...7-13 Table 8-1 SNMP Configuration Menu Fields ...8-2 Table 9-1 System Maintenance - Status Menu Fields ...9-3...
About Your Router Congratulations on your purchase of the Prestige 312 Broadband Security Gateway. Don’t forget to register your Prestige (fast, easy online registration at www.zyxel.com) for free future product updates and information. The Prestige 312 is a dual Ethernet Broadband Security Gateway integrated with robust firewall solutions and network management features that allows access to the Internet via Cable/ADSL modem or broadband router.
Page 28
P312 Broadband Security Gateway Regardless of your particular application, it is important that you follow the steps outlined in Chapters 1-2 to connect your Prestige to your LAN. You can then refer to the appropriate chapters of the manual, depending on your applications.
Getting Started Part I: Getting Started Chapters 1-3 are structured as a step-by-step guide to help you connect, install and setup your Prestige to operate on your network and access the Internet.
This chapter introduces the main features and applications of the Prestige. The Prestige 312 Broadband Security Gateway The Prestige 312 is a dual Ethernet Broadband Security Gateway integrated with a robust firewall and network management features designed for home offices and small businesses to access the Internet via Cable/ADSL modem or broadband router.
P312 Broadband Security Gateway Dynamic DNS Support With Dynamic DNS support, you can have a static hostname alias for a dynamic IP address, allowing the host to be more easily accessible from various locations on the Internet. You must register for this service with a Dynamic DNS client to use this service.
not choose a time service protocol that your timeserver will send when the Prestige powers up you can enter the time manually but each time the system is booted, the time & date will be reset to 1/1/1970 0:0:0. Logging and Tracing The Prestige has the following features: Built-in message logging and packet tracing.
P312 Broadband Security Gateway Figure 1-2 Secure Internet Access via DSL You can also use your xDSL modem in the bridge mode for always-on Internet access and high speed data transfer. Getting to Know Your Prestige...
Hardware Installation & Initial Setup This chapter shows you how to connect the hardware and perform the initial setup. Front Panel LEDs and Back Panel Ports 2.1.1 Front Panel LEDs The LEDs on the front panel indicate the operational status of the Prestige. The following table describes the LED functions: LEDs Function Indicator...
P312 Broadband Security Gateway LEDs Function Indicator Status Green Prestige 312 Rear Panel and Connections The following figure shows the rear panel of your Prestige 312 and the connection diagram. Figure 2-2 This section outlines how to connect your Prestige 312 to the LAN and the WAN. In the case of connecting a Cable Modem you must connect the coaxial cable from your cable service to the threaded coaxial cable Active Flashing...
connector on the back of the cable modem. Connect an xDSL Modem to the xDSL Wall Jack. Please also see Appendix C for important safety instructions on making connections to the Prestige. Step 1. Connecting the Console Port For the initial configuration of your Prestige, you need to use terminal emulator software on a workstation and connect it to the Prestige through the console port.
When you power on your Prestige, it performs several internal tests as well as line initialization. After the tests, the Prestige asks you to press [ Copyright (c) 1994 - 2000 ZyXEL Communications Corp. initialize ch =0, ethernet address: 00:a0:c5:41:51:61 initialize ch =1, ethernet address: 00:a0:c5:41:51:62 Press ENTER to continue...
Navigating the SMT Interface The SMT (System Management Terminal) is the interface that you use to configure your Prestige. Several operations that you should be familiar with before you attempt to modify the configuration are listed in the table below. Operation Keystrokes Move down to...
Exit Changing the System Password The first thing your should do before anything else is to change the default system password by following the steps below. Step 1. Enter 23 in the Main Menu to open Menu 23 - System Password as shown below. Old Password= ? New Password= ? Retype to confirm= ?
P312 Broadband Security Gateway General Setup Menu 1 - General Setup contains administrative and system-related information. The fields for General Setup are as shown next. System Name is for identification purposes. However, because some ISPs check this name you should enter your PC’s “Computer Name” (Start -> Settings -> Control Panel -> Network. Click the Identification tab, note the entry for the Computer name”...
Table 2-4 Field System Name Choose a descriptive name for identification purposes. It is recommended you enter your computer’s “Computer name” in this field. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes “-” and underscores "_" are accepted.
P312 Broadband Security Gateway Table 2-5 Field Service Enter the name of your Dynamic DNS client. Provider Press [SPACE BAR] to toggle between Yes or No. Active Host Enter the domain name assigned to your Prestige by your Dynamic DNS provider. EMAIL Enter your e-mail address.
MAC Address: Assigned By=IP address attached on LAN IP Address= 192.168.1.12 Press ENTER to Confirm or ESC to Cancel: Press Space Bar to Toggle The MAC address field allows users to configure the WAN port's MAC Address by either using the factory default or cloning the MAC address from a workstation on your LAN.
P312 Broadband Security Gateway 2.10.1 LAN Port Filter Setup This menu allows you to specify the filter sets that you wish to apply to the LAN traffic. You seldom need to filter the LAN traffic, however, the filter sets may be useful to block certain packets, reduce traffic and prevent security breaches.
This chapter shows you how to configure the LAN as well as the WAN of your Prestige for Internet TCP/IP and DHCP for LAN The Prestige has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability.
P312 Broadband Security Gateway The subnet mask specifies the network number portion of an IP address. Your Prestige will compute the subnet mask automatically based on the IP address that you entered. You don’t need to change the subnet mask computed by the Prestige unless you are instructed to do otherwise. 3.1.3 Private IP Addresses Every machine on the Internet must have a unique address.
3.1.5 DHCP Configuration DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows the individual clients (workstations) to obtain the TCP/IP configuration at start-up from a server. You can configure the Prestige as a DHCP server or disable it. When configured as a server, the Prestige provides the TCP/IP configuration for the clients.
P312 Broadband Security Gateway The address 224.0.0.1 is used for query messages and is assigned to the permanent group of all IP hosts (including gateways). All hosts must join the 224.0.0.1 group in order to participate in IGMP. The address 224.0.0.2 is assigned to the multicast routers group.
LAN Port Filter Setup TCP/IP and DHCP Setup Enter Menu Selection Number: Figure 3-3 To edit the TCP/IP and DHCP configuration, enter 2 to open Menu 3.2 - TCP/IP and DHCP Ethernet Setup as shown next. Menu 3.2 - TCP/IP and DHCP Ethernet Setup DHCP Setup: DHCP= Server Client IP Pool Starting Address= 192.168.1.33...
Page 52
P312 Broadband Security Gateway Follow the instructions in the following table on how to configure the DHCP fields. Table 3-1 Field DHCP= This field enables/disables the DHCP server. If it is set to Server, your Prestige will act as a DHCP server. If set to None, DHCP service will be disabled and you must have another DHCP sever on your LAN, or else the workstation must be manually configured.
Field Edit IP Alias The Prestige supports three logical LAN interfaces via its single physical Ethernet interface with the Prestige itself as the gateway for each LAN network. Press the space bar to toggle No to Yes, then press [ENTER] to bring you to menu 3.2.1 When you have completed this menu, press [Enter] at the prompt [Press ENTER to Confirm…] to save your configuration, or press [Esc] at any time to cancel.
P312 Broadband Security Gateway RIP Direction Press the space bar to select the RIP direction from None, Both/In Only/Out Only. Press the space bar to select the RIP version from RIP-1/RIP- Version 2B/RIP-2M. Incoming Enter the filter set(s) you wish to apply to the incoming traffic Protocol Filters between this node and the Prestige.
The following table describes this screen. Table 3-4 Field ISP’s Name Enter the name of your Internet Service Provider, e.g., myISP. This information is for identification purposes only. Encapsulation Press the [SPACE BAR] and the press [ENTER] to choose Ethernet. The encapsulation method influences your choices for IP Address.
P312 Broadband Security Gateway 3.3.3 Configuring the PPTP Client To configure a PPTP client, you must configure the My Login and Password fields for a PPP connection and the PPTP parameters for a PPTP connection. After configuring the User Name and Password for PPP connection, press [SPACE BAR] in the Encapsulation field in Menu 4 -Internet Access Setup to choose PPTP as your encapsulation option.
For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (e.g., Radius). For the user, PPPoE provides a login & authentication method that the existing Microsoft Dial-Up Networking software can activate, and therefore requires no new learning or procedures for Windows users.
P312 Broadband Security Gateway Table 3-6 Field Encapsulation Press the [SPACE BAR] and then press [ENTER] to choose PPPoE. The encapsulation method influences your choices for IP Address. Service Name Enter the PPPoE service name provided to you. PPPoE uses a service name to identify and reach the PPPoE server.
Advanced Applications Part II: Advanced Applications Advanced Applications (Chapters 4-6) describe the advanced applications of your Prestige, such as Remote Node Setup IP Static routes and NAT.
A remote node is required for placing calls to a remote gateway. A remote node represents both the remote gateway and the network behind it across a WAN connection. Note that when you use Menu 4 to set up Internet access, you are actually configuring a remote node. We will show you how to configure Menu 11.1 Remote Node Profile, Menu 11.3 - Remote Node Network Layer Options and Menu 11.5 - Remote Node Filter.
Page 61
P312 Broadband Security Gateway Field Rem Node Name Enter a descriptive name for the remote node. This field can be up to eight characters. Active Press the [SPACE BAR] to toggle between Yes and No and activate (deactivate) the remote node. Encapsulation Ethernet is the default encapsulation.
4.1.2 PPPoE Encapsulation The Prestige supports PPPoE (Point-to-Point Protocol over Ethernet). You can only use PPPoE encapsulation when you’re using the Prestige with an xDSL modem as the WAN device. If you change the Encapsulation to PPPoE, then you will see the next screen. Please see the Appendices for more information on PPPoE.
P312 Broadband Security Gateway Table 4-2 Field Authen This field sets the authentication protocol used for outgoing calls. Options for this field are: CHAP/PAP - Your Prestige will accept either CHAP or PAP when requested by this remote node. CHAP - accept CHAP only. PAP - accept PAP only.
Rem Node Name= ChangeMe Active= Yes Encapsulation= PPTP Service Type= Standard Service Name=N/A Outgoing= My Login= My Password= ******** Authen= CHAP/PAP PPTP : IP Addr= Server IP Addr= Connection ID/Name= Press Space Bar to Toggle. Figure 4-3 The next table shows how to configure fields in Menu 11.1 not previously discussed above. Table 4-3 Field Encapsulation...
P312 Broadband Security Gateway Editing TCP/IP Options (with Ethernet Encapsulation) Move the cursor to the Edit IP field in Menu 11.1, then press the [SPACE BAR] to toggle and set the value to Yes. Press [Enter] to open Menu 11.3 - Network Layer Options. Press Space Bar to Toggle Figure 4-4 The next table gives you instructions about configuring remote node network layer options.
Field between 1 and 15. In practice, 2 or 3 is usually a good number. Private This field is valid only for PPTP/ PPPoE encapsulation. parameter determines if the Prestige will include the route to this remote node in its RIP broadcasts. If set to Yes, this route is kept private and not included in RIP broadcast.
P312 Broadband Security Gateway Menu 11.3 - Remote Node Network Layer Options Press Space Bar to Toggle. Figure 4-5 The next table gives you instructions about configuring remote node network layer options. Table 4-5 Field IP Address If your ISP did not assign you an explicit IP address, select Dynamic; Assignment otherwise select Static and enter the IP address &...
between 1 and 15. In practice, 2 or 3 is usually a good number. Private This parameter determines if the Prestige will include the route to this remote node in its RIP broadcasts. If set to Yes, this route is kept private and not included in RIP broadcast.
P312 Broadband Security Gateway Chapter 5 IP Static Route Setup This chapter shows you how to configure static routes with your Prestige. Static routes tell the Prestige routing information that it cannot learn automatically through other means. This can arise in cases where RIP is disabled on the LAN. Each remote node specifies only the network to which the gateway is directly connected, and the Prestige has no knowledge of the networks beyond.
P312 Broadband Security Gateway IP Static Route Setup You configure IP static routes in Menu 12. 1, by selecting one of the IP static routes as shown below. Enter 12 from the Main Menu. 1. ________ 2. ________ 3. ________ 4.
Page 72
Table 5-1 Field Route # This is the index number of the static route that you chose in Menu 12. Route Name Enter a descriptive name for this route. This is for identification purposes only. Active This field allows you to activate/deactivate this static route. Destination IP This parameter specifies the IP network address of the final destination.
Network Address Translation (NAT) Introduction NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, e.g., the source address of an outgoing packet, used within one network to a different IP address known within another network.
P312 Broadband Security Gateway them accessible to the outside world. If you do not define any servers (for Many-to-One and Many-to-Many Overload mapping – see below), NAT offers the additional benefit of firewall protection. If no server is defined in these cases, all incoming inquiries will be filtered out by your Prestige, thus preventing intruders from probing your network.
Many to One: In Many-to-One mode, the Prestige maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL’s Single User Account feature that previous ZyXEL routers supported (the SUA Only option in today’s routers). Many to Many Overload: In Many-to-Many Overload mode, the Prestige maps the multiple local IP addresses to shared global IP addresses.
P312 Broadband Security Gateway remote node basis. They are reusable, but only one set is allowed for each remote node. The Prestige supports 2 sets since there is only one remote node. The second set (SUA Only option in Menu 15.1) is a convenient, pre-configured, read only Many-to-1 port mapping set, sufficient for most purposes (see section 6.4 for some examples) and helpful to people already familiar with SUA in previous ZyNOS versions.
Figure 6-3 This figure shows how you apply NAT to the remote node in Menu 11.1. Step 1. Enter 11 from the Main Menu. Step 2. Move the cursor to the Edit IP field, press the [SPACEBAR] to toggle the default No to Yes, then press [ENTER] to bring up Menu 11.3 - Remote Node Network Layer Options.
P312 Broadband Security Gateway Table 6-3 Field Network Full Feature Address Translation SUA Only 6.2.2 Configuring NAT To configure NAT, enter 15 from the Main Menu to bring up the following screen. 6.2.3 Address Mapping Sets and NAT Server Sets: Use the Address Mapping Sets menus and submenus to create the mapping table used to assign global addresses to machines on the LAN.
Figure 6-6 Let’s look first at Option 255. Option 255 is equivalent to SUA in previous ZyXEL routers (see section 6.1.4). The fields in this menu cannot be changed. Entering 255 brings up this screen. Set Name= SUA Local Start IP --------------- 0.0.0.0 Figure 6-7...
Page 81
P312 Broadband Security Gateway Table 6-4 Field Set Name This is the name of the set you selected in Menu 15.1 or enter the name of a new set you want to create. This is the index or rule number. Local Start IP Local Start IP is the starting local IP address (ILA) (see...
Set Name= NAT_SET Local Start IP --------------- Action= Edit Press ENTER to Confirm or ESC to Cancel: The Type, Local and Global Start/End IPs are configured in Menu 15.1.1.1 (described Ordering Your Rules Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored.
P312 Broadband Security Gateway moved down by one rule. Delete means to delete the selected rule and then all the rules after the selected one will be advanced one rule. Save Set means to save the whole set (note when you choose this action, the Select Rule item will be disabled).
Field Local IP Start Global IP Start Note: For all Local and Global IPs, the End IP address must begin after the IP Start address, i.e., you cannot have an End IP address beginning before the Start IP NAT Server Sets A NAT server set is a list of inside servers (behind NAT on the LAN) that you can make visible to the outside world.
P312 Broadband Security Gateway Figure 6-10 6.3.2 Configuring a Server behind NAT Follow the steps below to configure a server behind NAT: Step 1. Enter 15 in the main menu to go to Menu 15 – NAT Setup. Step 2. Enter 2 to go to Menu 15.2 - NAT Server Setup.
Figure 6-11 FTP (File Transfer Protocol) Telnet SMTP (Simple Mail Transfer Protocol) DNS(Domain Name System) HTTP (Hyper Text Transfer protocol or WWW, Web) 80 PPTP (Point-to-Point Tunneling Protocol) Examples 6.4.1 Internet Access Only In our Internet access example, we only need one rule where all our ILAs (Inside Local addresses) map to one dynamic IGA (Inside Global Address) assigned by our ISP.
P312 Broadband Security Gateway Figure 6-13 From Menu 4 shown above, simply choose the SUA Only option from the Network Address Translation field. This is the Many-to-One mapping discussed in section 6.1.4. The SUA Only read only option from the Network Address Translation field in Menus 4 and 11.3 is specifically pre-configured to handle this case.
6.4.2 Example 2 – Internet Access with an Inside Server In this case, we do exactly as above (use the convenient pre-configured SUA Only set) and also go to Menu 15.2 to specify the Inside Server behind the NAT as shown in the next figure. Figure 6-15 6.4.3 Example 3 –...
P312 Broadband Security Gateway server and the other IGA is used by all. We want to map the FTP servers to the first two of our IGAs and the other LAN traffic to the remaining IGA. We also want to map out third IGA to an inside web server and mail server.
Page 90
Step 5. Select Type= as One-to-One (direct mapping for packets going both ways), and enter the local Start IP as 192.168.1.10 (the IP address of FTP Server 1), the global Start IP as 10.132.50.1 (our first IGA). (See Figure 6-18) Step 6.
P312 Broadband Security Gateway When we have configured all four rules, Menu 15.1.1 should look as follows. Set Name= Example3 Local Start IP --------------- 1. 192.168.1.10 192.168.1.11 3. 0.0.0.0 Figure 6-19 Now we configure our IGA3 to map to our web server and mail server on the LAN. Step 8.
P312 Broadband Security Gateway 6.4.4 Example 4 –NAT Unfriendly Application Programs Some applications do not support NAT Mapping using TCP or UDP port address translation. In this case it is better to use Many-to-Many No Overload mapping as port numbers do not change for Many-to-Many No Overload (and One-to-One) NAT mapping types.
Page 93
P312 Broadband Security Gateway Type= Many-to-Many No Overload Local IP: Start= 192.168.1.10 = 192.168.1.12 Global IP: Start= 10.132.50.1 = 10.132.50.3 Figure 6-22 After you’ve configured this menu, you should see the following screen. Set Name= Example4 Local Start IP --------------- 192.168.1.10 Figure 6-23 6-20...
Advanced Management Part III: Advanced Management Chapters 7 - 12 provide information on Prestige filtering, System Information and Diagnosis, Transferring Files and Telnet.
About Filtering Your Prestige uses filters to decide whether to allow passage of a data packet and/or to make a call. There are two types of filter applications: data filtering and call filtering. Filters are subdivided into device and protocol filters, which are discussed later. Data filtering screens the data to determine if the packet should be allowed to pass.
P312 Broadband Security Gateway 7.1.1 The Filter Structure of the Prestige A filter set consists of one or more filter rules. Usually, you would group related rules, e.g., all the rules for NetBIOS, into a single set and give it a descriptive name. The Prestige allows you to configure up to twelve filter sets with six rules in each set, for a total of 72 filter rules in the system.
Fetch Next Filter Set Next Filter Set Available? Drop Packet You can apply up to four filter sets to a particular port to block multiple types of packets. With each filter set having up to six rules, you can have a maximum of 24 rules active for a single port. Filters Filter Set Fetch Next...
P312 Broadband Security Gateway Configuring a Filter Set To configure a filter set, follow the procedure below. For more information on Menus 21.2 and 21.3, please see Part 4. Step 1. Select option 21. Filter Set Configuration from the Main Menu to open Menu 21. Figure 7-4 Step 2.
# A Type - - ---- -------------------------------------------- --------- - - - 1 Y IP Pr=6, 2 Y IP Pr=6, 3 Y IP Pr=6, 4 Y IP Pr=17, SA=0.0.0.0, DA=0.0.0.0, DP=137 5 Y IP Pr=17, SA=0.0.0.0, DA=0.0.0.0, DP=138 6 Y IP Pr=17, SA=0.0.0.0, DA=0.0.0.0, DP=139 Figure 7-6 # A Type...
P312 Broadband Security Gateway 7.2.1 Filter Rules Summary Menu This screen shows the summary of the existing rules in the filter set. The following tables contain a brief description of the abbreviations used in the previous menus. Table 7-1 Abbreviations Refers to the filter rule number (1-6).
The protocol dependent filter rules abbreviation are listed as follows: If the filter type is IP, the following abbreviations listed in the following table will be used. Table 7-2 Abbreviation If the filter type is GEN (generic), the following abbreviations listed in the following table will be used.
P312 Broadband Security Gateway Press Space Bar to Toggle. Figure 7-9 The following table describes how to configure your TCP/IP filter rule. Table 7-4 Field Active This field activates/deactivates the filter rule. IP Protocol Protocol refers to the upper layer protocol, e.g., TCP is 6, UDP is 17 and ICMP is 1.
Page 104
Field don’t-care if it is 0. Destination: Port # Select the comparison to apply to the destination port in Comp the packet against the value given in Destination: Port #. Source: IP Address Enter the source IP Address of the packet you wish to filter.
Page 105
P312 Broadband Security Gateway Field Once you have completed filling in Menu 21.1.1.1 - TCP/IP Filter Rule, press [Enter] at the message [Press Enter to Confirm] to save your configuration, or press [Esc] to cancel. This data will now be displayed on Menu 21.1.1 - Filter Rules Summary.
Page 106
Packet into IP Filter Filter Active? Apply SrcAddrMask to Src Addr Check Src IP Addr Matched Apply DestAddrMask to Dest Addr Check Dest IP Addr Matched Check IP Protocol Matched Check Src & Dest Port Matched More? Action Matched Drop Drop Packet Filters Not Matched...
P312 Broadband Security Gateway 7.2.4 Generic Filter Rule This section shows you how to configure a generic filter rule. The purpose of generic rules is to allow you to filter non-IP packets. For IP, it is generally easier to use the IP rules directly. For generic rules, the Prestige treats a packet as a byte stream as opposed to an IP or IPX packet.
The following table describes the fields in the Generic Filter Rule Menu. Table 7-5 Field Filter # This is the filter set, filter rule co-ordinates, i.e., 2,3 refers to the second filter set and the third rule of that set. Filter Type Use the [SPACE BAR] to toggle between both types of rules.
P312 Broadband Security Gateway Once you have completed filling in Menu 21.4.1.1 - Generic Filter Rule, press [Enter] at the message [Press Enter to Confirm] to save your configuration, or press [Esc] to cancel. This data will now be displayed on Menu 21.1.1 - Filter Rules Summary. Example Filter Let’s look at the third default ZyXEL filter, TELNET_WAN (see Figure 7-8) as an example.
Menu 21.1.1 - TCP/IP Filter Rule Filter #: 3,1 Filter Type= TCP/IP Filter Rule Active= Yes IP Protocol= 6 Destination: IP Addr= 0.0.0.0 Source: IP Addr= 0.0.0.0 TCP Estab= No More= No Action Matched= Drop Action Not Matched= Forward Press ENTER to Confirm or ESC to Cancel: Press Space Bar to Toggle.
P312 Broadband Security Gateway Menu 21.1.3 - Filter Rules Summary # A Type - - ---- --------------------------------------------------------------- - - - 1 Y IP Pr=6, SA=0.0.0.0, DA=0.0.0.0, DP=23 Enter Filter Rule Number (1-6) to Configure: 1 This shows you that you have configured and activated (A = Y) a TCP/IP filter rule (Type = IP, Pr = 6) for destination...
packets and after NAT for incoming packets. On the other hand, the generic, or device filters are applied to the raw packets that appear on the wire. They are applied at the point when the Prestige is receiving and sending the packets; i.e. the interface. The interface can be an Ethernet port or any other hardware port. The following diagram illustrates this.
P312 Broadband Security Gateway 7.6.2 Remote Node Filters Go to Menu 11.5 (shown below – note that call filter sets are only present for PPPoE encapsulation) and enter the number(s) of the filter set(s) as appropriate. You can cascade up to four filter sets by entering their numbers separated by commas.
This chapter discusses SNMP (Simple Network Management Protocol) for network management About SNMP Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network. Keep in mind that SNMP is only available if TCP/IP is configured on your Prestige.
Page 115
P312 Broadband Security Gateway The following table describes the SNMP configuration parameters. Table 8-1 Field Description Enter the get community, which is the password for the incoming Community Get- and GetNext- requests from the management station. Enter the set community, which is the password for incoming Set- Community requests from the management station.
This chapter covers the diagnostic tools that help you to maintain your Prestige. These tools include updates on system status, port status, log and trace capabilities and upgrades for the system software. This chapter describes how to use these tools in detail. Select menu 24 in the main menu to open Menu 24 - System Maintenance, as shown below.
P312 Broadband Security Gateway System Status The first selection, System Status, gives you information on the version of your system firmware and the status and statistics of the ports, as shown in the figure below. System Status is a tool that can be used to monitor your Prestige.
The following table describes the fields present in Menu 24.1 - System Maintenance - Status. Table 9-1 Field Port Status TxPkts RxPkts Cols Tx B/s Rx B/s Up Time Ethernet Address IP Address IP Mask DHCP Ethernet Address IP Address IP Mask DHCP System up Time...
P312 Broadband Security Gateway System Information and Console Port Speed This section describes your system and allows you to choose different console port speeds. To get to the System Information and Console Port Speed: Step 1. Enter 24 to go to Menu 24 – System Maintenance. Step 2.
Table 9-2 Field Name Routing ZyNOS F/W Version Ethernet Address IP Address IP Mask DHCP 9.2.2 Console Port Speed You can change the speed of the console port through Menu 24.2.2 – Console Port Speed. Your Prestige supports 9600 (default), 19200, 38400, 57600, and 115200 bps for the console port. Use the [SPACE BAR] to select the desired speed in Menu 24.2.2, as shown below.
P312 Broadband Security Gateway 9.3.1 Viewing Error Log The first place you should look for clues when something goes wrong is the error/trace log. Follow the procedure below to view the local error/trace log: Step 1. Select option 24 from the Main Menu to open Menu 24 - System Maintenance. Step 2.
Menu 24.3.2 -- System Maintenance - UNIX Syslog and Accounting Figure 9-8 You need to configure the UNIX syslog parameters described in the following table to activate syslog then choose what you want to log. Table 9-3 Parameter UNIX Syslog: Active Press the [SPACE BAR] to turn on or off syslog.
P312 Broadband Security Gateway 1. CDR CDR Message Format SdcmdSyslogSend( SYSLOG_CDR, SYSLOG_INFO, String ); String = board xx line xx channel xx, call xx, str board = the hardware board ID line = the WAN ID in a board Channel = channel ID within the WAN call = the call reference number which starts from 1 and increments by 1 for each new call str = C01 Outgoing Call dev xx ch xx (dev:device No.
P312 Broadband Security Gateway 9.3.3 Call-Triggering Packet Call-Triggering Packet displays information about the packet that triggered a dial-out call in an easy readable format. Equivalent information is available in Menu 24.1 in hex format. An example is shown next. IP Frame: ENET0-RECV Size: Frame Type: IP Header: IP Version...
Figure 9-10 Follow the procedure below to get to Menu 24.4 - System Maintenance – Diagnostic. Step 1. From the Main Menu, select option 24 to open Menu 24 - System Maintenance. Step 2. From this menu, select option 4. Diagnostic. This will open Menu 24.4 - System Maintenance - Diagnostic.
P312 Broadband Security Gateway The following table describes the diagnostic tests available in Menu 24.4 for your Prestige and the connections. Table 9-4 Number Field Ping Host WAN DHCP Release WAN DHCP Renewal Internet Setup Test Reboot System Host IP Address= 9-12 Figure 9-11 WAN &...
P312 Broadband Security Gateway Chapter 10 Transferring Files This chapter tells you how to back up and restore your configuration file as well as upload new firmware and a new configuration file. 10.1 Filename conventions The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password, DHCP Setup, TCP/IP Setup etc.
P312 Broadband Security Gateway File Type Internal Name Configuration Rom-0 File Firmware 10.1.1 Firmware Development It is important to upgrade your firmware regularly, especially if there are problems. If you discover an unexpected behavior, or bug, see if your problem is mentioned in the release notes. Load it according to instructions (e.g., see if the default configuration file is needed also).
10.3 Restore Configuration Menu 24.6 -- System Maintenance - Restore Configuration allows you to restore the configuration via the console port. FTP and TFTP are the preferred methods for restoring your current workstation configuration to your Prestige since FTP and TFTP are faster. Please note that the system reboots automatically after the file transfer is complete.
P312 Broadband Security Gateway Step 4. After successful firmware upload, enter atgo to restart the Prestige. Menu 24.7.1 - System Maintenance - Upload Router Firmware FTP and TFTP are the preferred methods for uploading router firmware to your Prestige since FTP and TFTP are faster. To upload router firmware: 1.
Menu 24.7.2 - System Maintenance - Upload Router Configuration File FTP and TFTP are the preferred methods for uploading router firmware to your Prestige since FTP and TFTP are faster. To upload router configuration file: 1. Enter "y" at the prompt below to go into debug mode. 2.
P312 Broadband Security Gateway Note: If you upload the firmware to the Prestige, it will reboot automatically when the file transfer is completed (the SYS LED will flash). Note that the telnet connection must be active and the SMT in CI mode before and during the TFTP transfer.
10.6 FTP File Transfer In addition to uploading the firmware and configuration via the console port and TFTP client, you can also upload the Prestige firmware and configuration files using FTP. To use this feature, your workstation must have an FTP client. When you telnet into the Prestige, you will see the following screens for uploading firmware and the configuration file using FTP.
P312 Broadband Security Gateway Menu 24.7.2 - System Maintenance - Upload Router Configuration File To upload the router configuration file, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your router. Then type "root" and SMT password as requested.
Connected to 312.x.x.x 220 P312 FTP version 1.0 ready at Thu Jan 20 18:00:02 2000 User (312.x.x.x:(none)): <Enter> 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> put p312e.bin ras 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK ftp: 327680 bytes sent in 1.10Seconds 297.89Kbytes/sec.
System Maintenance. A list of valid commands can be found by typing [help] or [?] at the command prompt. Type “exit” to return to the SMT main menu when finished. Figure 11-1 Copyright (c) 1994 - 2000 ZyXEL Communications Corp. ras> ? Valid commands are:...
P312 Broadband Security Gateway 11.2 Call Control Support The Prestige provides two call control functions: budget management and call history. Please note that this menu is only applicable when Encapsulation is set to PPPoE or PPTP in Menu 4 or Menu 11.1. The budget management function allows you to set a limit on the total outgoing call time of the Prestige within certain times.
The total budget is the time limit on the accumulated time for outgoing calls to a remote node. When this limit is reached, the call will be dropped and further outgoing calls to that remote node will be blocked. After each period, the total budget is reset. The default for the total budget is 0 minutes and the period is 0 hours, meaning no budget control.
P312 Broadband Security Gateway Field Phone Number The PPPoE service names are shown here. This shows whether the call was incoming or outgoing. Rate This is the transfer rate of the call. #call This is the number of calls made to or received from that telephone number.
Press Space Bar to Toggle. Figure 11-6 Table 11-3 Field Use Time Server when Bootup= Time Server IP Address= Current Time: New Time Current Date: New Date Time Zone= GMT+0800 System Maintenance & Information Menu 24.10 - System Maintenance - Time and Date Setting Use Time Server when Bootup= None Time Server IP Address= N/A Current Time:...
P312 Broadband Security Gateway Once you have filled in the new time and date, press [Enter] to save the setting and press [Esc] to return to Menu 24. 11.4 Remote Management Setup Telnet and FTP do not support encryption, so for very strong security both services should be shut down. This is done in Menu 24.11 - Remote Management Control.
Table 11-4 Field FTP service active Press the [SPACE BAR] to toggle Yes to No and press [Enter] to disable all FTP activity (both LAN and WAN). Telnet service active Press the [SPACE BAR] to toggle Yes to No and press [Enter] to disable all Telnet activity (both LAN and WAN).
P312 Broadband Security Gateway just answer OK ATHE print help ATBAx change baudrate. 1:38.4k, 2:19.2k, 3:9.6k 4:57.6k 5:115.2k ATENx,(y) set BootExtension Debug Flag (y=password) ATSE show the seed of password generator ATTI(h,m,s) change system time to hour:min:sec or show current time ATDA(y,m,d) change system date to year/month/day or show current date ATDS...
P312 Broadband Security Gateway Chapter 12 Telnet Configuration and Capabilities This chapter covers the Telnet Configuration and Capabilities of the Prestige. 12.1 About Telnet Configuration Before the Prestige is properly setup for TCP/IP, the only option for configuring it is through the console port.
P312 Broadband Security Gateway 12.3.2 System Timeout There is a system timeout of 5 minutes (300 seconds) for either the console port or telnet. Your Prestige will automatically log you out if you do nothing in this timeout period, except when it is continuously updating the status in Menu 24.1 or when "sys stdio"...
Firewall and Content Filters Part IV: Firewall and Content Filters Chapters 13 – 20 describe types of firewalls, how to configure your Prestige firewall using the Prestige Web Configurator, as well as types of Denial of Services (DoS) attacks and Content Filtering.
Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The network term firewall is typically defined as a system or group of systems that enforces an access-control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from an untrusted network.
P312 Broadband Security Gateway needed to filter application traffic and direct it to a number of specific systems. The router need only allow application traffic destined for the application gateway and reject the rest. 13.1.3 Stateful Inspection firewalls Stateful Inspection firewalls restrict access by screening data packets against defined access rules. They make access control decisions based on IP address and protocol.
P312 Broadband Security Gateway Figure 13-1 Prestige Firewall Application 13.3 Denial of Service Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources.
P312 Broadband Security Gateway 13.3.2 Types of DoS attacks There are four types of DoS attacks: Those that exploit bugs in a TCP/IP implementation. Those that exploit weaknesses in the TCP/IP specification. Brute-force attacks that flood a network with useless data. IP Spoofing.
Under normal circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment). After this handshake, connection is established. 2-a SYN Attack floods a targeted system with a series of SYN packets.
P312 Broadband Security Gateway Often, many DoS attacks also employ a technique known as "IP Spoofing" as part of their attack. IP Spoofing may be used to break into systems, to hide the hacker's identity, or to magnify the effect of the DoS attack.
Figure 13-5 shows the Prestige’s default firewall rules in action as well as demonstrates how stateful inspection works. User A can initiate a Telnet session from within the LAN and responses to this request are allowed. However other Telnet traffic initiated from the WAN is not allowed. 13.4.1 Stateful Inspection Process In this example, the following sequence of events occurs when a TCP packet leaves the LAN network through the firewall's WAN interface.
P312 Broadband Security Gateway The packet is inspected by a firewall rule, and the connection's state table entry is updated as necessary. Based on the updated state information, the inbound extended access list temporary entries might be modified, in order to permit only packets that are valid for the current state of the connection.
When any subsequent packet hits the box (from the Internet or from the LAN), its connection information is extracted and checked against the cache. A packet is only allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a connection which originated on the LAN). 13.4.4 UDP/ICMP Security UDP and ICMP do not themselves contain any connection information (such as sequence numbers).
P312 Broadband Security Gateway Limit who can Telnet into your router. Don't enable any local service (such as SNMP or NTP) that you don't use. Any enabled service could present a potential security risk. A determined, hostile party might be able to find creative ways to misuse the enabled services to access the firewall or the network.
Page 159
12. Always shred confidential information, particularly about your computer, before throwing it away. Some hackers dig through the trash of companies or individuals for information that might help them in a social intrusion. What Is a Firewall? P312 Broadband Security Gateway 13-11...
This chapter shows you how to get started with the Prestige Firewall. Please see Chapter 13 for 14.1 SMT Menus From the Main Menu (see below) enter 21 to go to Menu 21 - Filter Set and Firewall Configuration. Copyright (c) 1994 - 2000 ZyXEL Communications Corp. Getting Started 1. General Setup 2.
P312 Broadband Security Gateway The firewall protects against Denial of Service (DOS) attacks when it is active. The default Policy sets 1. allow all sessions originating from the LAN to the WAN and 2. deny all sessions originating from the WAN to the LAN You may define additional Policy rules or modify existing ones but please exercise extreme caution in doing so Active: No...
ICMP Echo A brute-force attack, such as a "Smurf" attack, targets a feature in the IP specification known as directed or subnet broadcasting, to quickly flood the target network with useless data. A Smurf hacker floods a router with Internet Control Message Protocol (ICMP) echo request packets (pings). Since the destination IP address of each packet is the broadcast address of the network, the router will broadcast the ICMP echo request packet to all hosts on the network.
P312 Broadband Security Gateway Traceroute Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of the network topology inside the firewall. Teardrop Teardrop attacks exploit weaknesses in the reassembly of IP packet fragments.
Field This is the index number of the firewall log. 128 entries are available numbered from 0 to 127. Once they are all used, the log will wrap around and the old logs will be lost. Time This is the time the log was recorded in this format. You must configure Menu 24.10 for real time;...
P312 Broadband Security Gateway Figure 14-5 14.3 Packet Filtering Vs Firewall Below are some comparisons between the Prestige’s filtering and firewall functions. 14.3.1 Packet Filtering: The router filters packets as they pass through the router’s interface according to the filter rules you designed.
When To Use Filtering To block/allow LAN packets by their MAC address. To block/allow special IP packets which are neither TCP, UDP, nor ICMP packets. To block/allow both inbound (WAN to LAN) and outbound (LAN to WAN) traffic between the specific inside host/network "A"...
Introducing the Prestige Web Configurator This chapter shows you how to configure your firewall with the Web Configurator. 15.1 Web Configurator Login and Welcome Screens Launch your web browser and enter 192.168.1.1 as the URL. This is the factory default IP of the Prestige when shipped.
P312 Broadband Security Gateway Figure 15-2 Prestige Web Configurator Welcome Screen 15.2 Enabling the Firewall Click Firewall, then Configuration, then the Rule Config tab to enable the firewall as seen in the following screen. 15-2 Introducing the Prestige Web Configurator...
P312 Broadband Security Gateway Figure 15-3 Enabling the Firewall 15.3 E-Mail This screen allows you to specify your mail server, where e-mail alerts should be sent as well as when and how often they should be sent. 15.3.1 What are Alerts? Alerts are reports on events such as attacks, which you may want to know about right away.
P312 Broadband Security Gateway To field and schedule times for sending alerts in the Alert Timer fields in the E-Mail screen (following screen). 15.3.2 What are Logs? A log is a detailed record that you create for packets that either match a rule, don’t match a rule or both when you are creating/editing a firewall rule (see Figure 16-4).
Page 173
Field Address Information Mail Server Enter the IP address of your mail server in dot decimal format. Your Internet Service Provider (ISP) should be able to provide this information. If this field is left blank, log and alert messages will not be sent via E-mail. Mail Subject Enter a subject that you want to appear in the subject field of your e-mail here (see...
P312 Broadband Security Gateway 15.3.3 SMTP Error Messages If there are difficulties in sending e-mail the following error messages appear. Please see the Support Notes on the accompanying CD for information on other types of error messages. E-mail error messages appear as "SMTP action request failed. ret= ??" where ?? is described in the following table.
P312 Broadband Security Gateway You can use the default threshold values, or you can change them to values more suitable to your security requirements. 15.4.1 Threshold Values: You really just need to tune these parameters when something is not working and after you have checked the firewall counters.
P312 Broadband Security Gateway The Prestige deletes the oldest existing half-open session for the host for every new connection request to the host. This ensures that the number of half-open sessions to a given host will never exceed the threshold. If the Blocking Time timeout is greater than 0: The Prestige blocks all new connection requests to the host giving the server time to handle the present connections.
Page 178
P312 Broadband Security Gateway Field Generate alert when A detected attack automatically generates attack detected a log entry. Check this box to generate an alert (as well as a log) whenever an attack is detected. See section 15.3 for more information on logs and alerts.
Page 179
Field rises above this number, the Prestige deletes half-open sessions as required to accommodate new connection requests. Do not set Maximum Incomplete High to lower than the current Max-Incomplete Low number. TCP Maximum This is the number of existing half-open Incomplete TCP sessions with the same destination host IP address that causes the firewall to...
16.1 Rules Overview Firewall rules are subdivided into “Local Network” and “Internet”. By default, the Prestige’s stateful packet inspection allows all communications to the Internet that originate from the local network, and blocks all traffic to the LAN that originates from the Internet. You may define additional rules and sets or modify existing ones but please exercise extreme caution in doing so.
P312 Broadband Security Gateway What computers on the LAN are to be affected (if any)? What computers on the Internet will be affected? The more specific, the better. For example, if traffic is being allowed from the Internet to the LAN, it is better to allow only certain machines on the Internet to access the LAN.
P312 Broadband Security Gateway 16.3 Connection Direction This section talks about configuring firewall rules for connections going from LAN to WAN and WAN to LAN in your firewall. 16.3.1 LAN to WAN Rules The default rule for LAN to WAN traffic is that all users on the LAN are allowed non-restricted access to the WAN.
P312 Broadband Security Gateway Figure 16-2 WAN to LAN Traffic 16.4 Services Supported The list box in the Rule Config(uration) screen (see Figure 16-4) displays all services that the Prestige supports. Custom services may also be configured using the Custom Ports function discussed later. Next to the name of the protocol, two fields appear in brackets.
P312 Broadband Security Gateway 16.5 Rule Summary The fields in the Rule Summary screens are the same for Local Network and Internet, so the discussion below refers to both. Click on Firewall, then Local Network to bring up the following screen. This screen is a summary of the existing rules.
Table 16-2 Field General Name Default Permit Log The default action for packets not matching following rules. Firewall Rule Summary Source IP Destination IP Service Action Alert Apply Edit Creating Custom Rules Firewall Rules Summary – First Screen Description This is the name of the firewall rule set. Check this box to log all matched rules in the ACL default set.
P312 Broadband Security Gateway Field Delete Move Rule To Rule Number Move 16.5.1 Creating/Editing Firewall Rules To create a new rule, click a number (No.) then click Edit button from the screen above to display the following screen. 16-8 Description section 16.5.1 for more details.
Figure 16-4 Table 16-3 Field Source Address Destination Address Services Creating Custom Rules Creating/Editing A Firewall Rule Creating/Editing A Firewall Rule Description Press SrcAdd to add a new address, SrcEdit to edit an existing one or SrcDelete to delete one. Please see the next section for more information on adding and editing source addresses.
P312 Broadband Security Gateway Field Action for Matched Packets Alert When you have finished, click Apply to save your customized settings and exit this screen, Cancel to exit this screen without saving, or Help for online HTML help on fields in this screen. 16.5.2 Source &...
Page 191
Figure 16-5 Table 16-4 Field Address Type Do you want your rule to apply to packets with a particular (single) IP, a range of IP addresses (e.g., 192.168.1.10 to 192.169.1.50), a subnet or any IP address? Select an option from the drop down list box Start IP Address Enter the single IP address or the starting IP address in a range here.
P312 Broadband Security Gateway When you have finished, click Apply to save your customized settings and exit this screen, Cancel to exit this screen without saving, or Help for online HTML help on fields in this screen. 16.6 Timeout The fields in the Timeout screens are the same for Local and Internet networks, so the 16.6.1 Factors Influencing Choices for Timeout Values: The factors influencing choices for timeout values are the same as the factors influencing choices for threshold values –...
Page 194
P312 Broadband Security Gateway Field TCP Timeout Values Connection Timeout FIN-Wait Timeout Idle Timeout UDP Idle Timeout ICMP Timeout Help When you have finished, click on Apply to apply your changes. 16-14 Table 16-5 Timeout Menu Description This is the length of time the Prestige waits for a TCP session to reach the established state before dropping the session.
P312 Broadband Security Gateway Chapter 17 Custom Ports 17.1 Introduction You will need to configure customized ports for services not included in the services provided in the scrolling list box in the screen shown in Figure 16-4. For further information on these services, please read section 16.4.
P312 Broadband Security Gateway Field Customized Services Protocol Add a New Entry Edit Delete Help When you have finished viewing this screen, click another link to exit. 17.2 Creating/Editing A Custom Port Click Edit to create a new custom port or edit an existing one. This displays the following screen. 17-2 Table 17-1 Custom Ports...
P312 Broadband Security Gateway Figure 17-2 Creating/Editing A Custom Port The next table describes the fields in this screen. Custom Ports 17-3...
Page 198
P312 Broadband Security Gateway Table 17-2 Field Service Name Service Type Port Configuration Type Port Number When you have finished, click Apply to save your customized settings and exit this screen, Cancel to exit this screen without saving, or Help for online HTML help on fields in this screen.
P312 Broadband Security Gateway Chapter 18 Logs 18.1 Log Screen When you configure a new rule you also have the option to log events that match, don’t match (or both) this rule (see Figure 16-4). Click on the Logs to bring up the next screen. Firewall logs may also be viewed in SMT Menu 21.3 (see section 14.1.1) or via syslog (SMT Menu 24.3.2 - System Maintenance - UNIX Syslog).
P312 Broadband Security Gateway Field This is the index number of the firewall log. 128 entries are available numbered from 0 to 127. Once they are all used, the log will wrap around and the old logs will be lost. Time This is the time the log was recorded in this format.
Page 201
P312 Broadband Security Gateway Field Description When you have finished viewing this screen, click another link to exit. Logs 18-3...
19.1 Examples Please note that whenever you open a hole in the firewall to forward a service from the Internet to the local network, and NAT is also enabled, you may have to also configure a server behind NAT using SMT menu 15.2.
P312 Broadband Security Gateway Step 2. Now we configure our E-mail screen as follows. Click the E-Mail tab to bring up the next screen. 19-2 Check here to activate the firewall. You may also activate the firewall in SMT menu 21.2. Figure 19-1 Activate The Firewall Examples Firewall Rules...
Figure 19-2 Step 3. Now we configure our firewall rule as shown in the following screen. The default firewall blocks all Internet traffic entering our local network, but we want to create a hole for web service from the Internet. Go to the Rule Summary screen under the (click Internet). Configure this screen as shown in Figure 19-3.
P312 Broadband Security Gateway This is an Internet to Local Network rule. We want to forward the packet when it matches this rule (remember the default is to block all packets from the Internet), log packets that match this rule and to send alerts when this happens.
P312 Broadband Security Gateway 10.100.1.2 is the IP of our server on the LAN (supporting FTP, HTTP, Telnet and mail services) to which we wish to forward traffic originating from the Internet. Figure 19-4 Example 1: Destination Address for Traffic Originating From The Internet Example Firewall Rules 19-5...
P312 Broadband Security Gateway The first rule is a default rule to allow DHCP negotiation between the ISP and the P312. The second rule is what we configured in the last 2 screens. See Table 16-2 for a detailed explanation of each field. Figure 19-5 19.1.2 Example 2 –...
Step 1. First we want to send alerts when there is an attack. Go to the Attack Alert screen (click Configuration, then the Attack Alert tab) shown next. Figure 19-6 Step 2. Configure the E-Mail screen as shown in example 1 – our mail server’s IP is 192.168.10.2. Step 3.
P312 Broadband Security Gateway Figure 19-7 Step 4. Now, we will create rules to block all outgoing traffic (from the local network to the Internet) except for traffic originating from the HTTP proxy server and our mail server. Click Internet to see the Rule Summary screen.
Page 211
We want to forward packets that match these rules. Figure 19-8 Step 6. Similarly configure another local network to Internet rule allowing traffic from our web (HTTP) proxy server. Step 7. The Rule Summary screen should look like Figure 19-9. Don’t forget to click Apply when you have finished configuring your rule(s) to save your settings back to the Prestige.
P312 Broadband Security Gateway Rules 1 forwards SMTP and POP traffic from our mail server and Rule 2 forwards HTTP traffic from the proxy web server. We don’t want a log. Figure 19-9 Step 8. Now we want an FTP server (IP of 192.168.10.3) to be accessible from the Internet. Remember the default Internet to Local Network ACL set blocks all traffic from the Internet, so we want to create a hole for this server.
This is the IP of our FTP server to which we want to forward traffic from the Internet. Figure 19-10 19.1.3 Example 3: DHCP Negotiation and Syslog Connection from the Internet The following are some Internet firewall rules examples to: Allow DHCP negotiation between the ISP and the P312.
P312 Broadband Security Gateway Step 2. Follow the procedures outlined in the previous examples to configure all your rules. When finished, your rule summary screen should look like the following. 19-12 Figure 19-11 Custom Port for Syslog Custom ports show up with an “*”...
Figure 19-12 Example Firewall Rules P312 Broadband Security Gateway This is the address range of the syslog servers. Click Apply when finished. Syslog Rule Configuration This is our Syslog custom port. 19-13...
P312 Broadband Security Gateway Rule 1: Allow DHCP negotiation between the ISP and the P312. Rule 2: Allow a syslog connection from the WAN. 19-14 Click Apply to save your settings back to the Prestige. Figure 19-13 Example 3 Rule Summary Examples Firewall Rules...
P312 Broadband Security Gateway Chapter 20 Content Filtering The Prestige can block web features such as ActiveX controls, Java applets, cookies as well as disable web proxies. The Prestige can also block specific URLs by using the keyword feature. Please note that content filtering means the ability to block certain web features or specific URLs and should not be confused with packet filtering via SMT menu 21.1.
P312 Broadband Security Gateway 20.1.3 Cookies Cookies are used by Web servers to track usage. Cookies provide service based on ID. Unfortunately, cookies can be programmed not only to identify the visitor to the site, but also to track that visitor's activities. Because they represent a potential loss of privacy, some people may choose to block cookies.
Field Restrict Web Features Check the box(es) to restrict that feature. When you download a page containing a restricted feature, that part of the web page will appear blank or grayed out. Block Web URLs Enter a domain name as discussed above, then press Add Domain Name. The page reloads and the new domain name appears in the Block Web URLs box.
Troubleshooting, Appendices, Glossary and Index Part V: Troubleshooting, Appendices, Glossary and Index Chapter 21 provides information about solving common problems, followed by some Appendices, a Glossary of Terms and an Index.
This chapter covers the potential problems you may run into and the possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the 21.1 Problems Starting Up the Prestige Table 21-1 Problem None of the LEDs are on when you power on the Prestige Cannot access the Prestige via...
P312 Broadband Security Gateway 21.2 Problems with the LAN Interface Table 21-2 Problem Can’t ping any workstation on the 21.3 Problems with the WAN interface Table 21-3 Problem Cannot get WAN IP from the ISP Can’t connect to a remote node or 21-2 Troubleshooting the LAN Interface Corrective Action...
21.4 Problems with Internet Access Table 21-4 Problem Cannot access the Connect your Cable/xDSL modem with the Prestige using Internet. appropriate cable. Check with the manufacturer of your Cable/xDSL modem about the cable requirement because for some modems you may require crossover cable and for others regular patch cable.
PPPoE in Action An ADSL modem bridges a PPP session over Ethernet (PPP over Ethernet, RFC 2516) from your PC to an ATM PVC (Permanent Virtual Circuit) which connects to a xDSL Access Concentrator where the PPP session terminates (see the next figure). One PVC can support any number of PPP sessions from your LAN. PPPoE provides access control and billing functionality in a manner similar to dial-up services using PPP.
Page 227
P312 Broadband Security Gateway How PPPoE Works The PPPoE driver makes the Ethernet appear as a serial link to the PC and the PC runs PPP over it, while the modem bridges the Ethernet frames to the Access Concentrator (AC). Between the AC and an ISP, the AC is acting as a L2TP (Layer 2 Tunneling Protocol) LAC (L2TP Access Concentrator) and tunnels the PPP frames to the ISP.
P312 Broadband Security Gateway Appendix B PPTP What is PPTP? PPTP (Point-to-Point Tunneling Protocol) is a Microsoft proprietary protocol (RFC 2637 for PPTP is informational only) to tunnel PPP frames. How can we transport PPP frames from a PC to a broadband modem over Ethernet? A solution is to build PPTP into the ANT (ADSL Network Termination) where PPTP is used only over the short haul between the PC and the modem over Ethernet.
Page 229
P312 Broadband Security Gateway PNS and the PAC must have IP connectivity; however, the PAC must in addition have dial-up capability. The phone call is between the user and the PAC and the PAC tunnels the PPP frames to the PNS. The PPTP user is unaware of the tunnel between the PAC and the PNS.
P312 Broadband Security Gateway The following safety instructions apply to the Prestige: Be sure to read and follow all warning notices and instructions. The maximum recommended ambient temperature for the Prestige is 40º(104º). Care must be taken to allow sufficient air circulation or space between units when the Prestige is installed inside a closed rack assembly.
The following table describes the syntax used to configure your firewall using Command Line Interface (CLI) commands. Select option 24.8 Command Interpreter Mode from the Main Menu to go into CLI mode. For details on other CLI commands to configure your Prestige, please consult the supporting CD. Function CLI Syntax config edit firewall active <yes...
Page 234
Function CLI Syntax config edit firewall set <set #> default-permit <forward | block> config edit firewall set <set #> icmp-timeout <seconds> config edit firewall set <set #> udp-idle-timeout <seconds> config edit firewall set <set #> connection-timeout <seconds> config edit firewall set <set #> fin-wait-timeout <seconds>...
Page 235
P312 Broadband Security Gateway Function CLI Syntax config edit firewall set <set #> rule <rule #> srcaddr-subnet <ip address> <subnet mask> config edit firewall set <set #> rule <rule #> srcaddr-range <start ip address> <end ip address> config edit firewall set <set #> rule <rule #>...
Page 236
Function CLI Syntax config delete firewall e-mail config delete firewall attack config delete firewall set <set #> config delete firewall set <set #> rule <rule #> CLI Commands P312 Broadband Security Gateway Description Removes all the settings for e-mail alert Resets all the settings for attack to default setting Removes the specified set from the firewall configuration Removes the specified rule in a set from the firewall...
P312 Broadband Security Gateway North America AC Power Adapter model MW48-1201200 Input power: AC120Volts/60Hz Output power: DC12Volts/1.2A Power consumption: 9 W Plug: North American standards Safety standards: UL, CUL (UL 1310, CSA C22.2 No.233-M91) AC Power Adapter model AD48-1201200DUY Input power: AC120Volts/60Hz Output power: DC12Volts/1.2A Power consumption: 9 W Plug: North American standards...
Page 238
P312 Broadband Security Gateway Japan AC Power Adapter model JOD-48-1124 Input power: AC100Volts/ 50/60Hz/ 27VA Output power: DC12Volts/1.2A Power consumption: 9 W Plug: Japan standards Safety standards: T-Mark Australia and New Zealand AC Power Adapter model AD-1201200DS Input power: AC240Volts/50Hz/0.2A Output power: DC12Volts/1.2A Power consumption: 9 W Plug: Australia and New Zealand standards...
P312 Broadband Security Gateway 10BaseT The 10-Mbps baseband Ethernet specification that uses two pairs of twisted-pair cabling (Category 3 or 5): one pair for transmitting data and the other for receiving data. Address Resolution Protocol is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address that is recognized in the local network.
Page 240
Cookie A string of characters saved by a web browser on the user's hard disk. Many web pages send cookies to track specific user information. Cookies can be used to retain information as the user browses a web site. For example, cookies are used to 'remember' the items a shopper may have in a shopping cart.
Page 241
P312 Broadband Security Gateway Digital Signature Digital code that authenticates whomever signed the document or software. Software, messages, Email, and other electronic documents can be signed electronically so that they cannot be altered by anyone else. If someone alters a signed document, the signature is no longer valid.
Page 242
Events These are network activities. Some activities are direct attacks on your system, while others might be depending on the circumstances. Therefore, any activity, regardless of severity is called an event. An event may or may not be a direct attack on your system. (Frequently Asked Questions) -- FAQs are documents that list and answer the most common questions on a particular subject.
Page 243
P312 Broadband Security Gateway Integrity Proof that the data is the same as originally intended. Unauthorized software or people have not altered the original information. internet (Lower case i) Any time you connect 2 or more networks together, you have an internet.
Page 244
as a stream of bits. Name Resolution The allocation of an IP address to a host name. See DNS Network Address Translation is the translation of an Internet Protocol address used within one network to a different IP address known within another network - see also SUA.
Page 245
P312 Broadband Security Gateway Plain Text The opposite of Cipher Text, Plain Text is readable by anyone. Prestige Web This is a web-based Prestige router (not all) configurator that includes an Internet Configurator Access Wizard, Advanced and Firewall (not all Prestige models) configurations. Post Office Protocol.
Page 246
system, meaning that an end-to-end private circuit is established between caller and callee. Public Key System of encrypting electronic files using a key pair. The key pair contains a public Encryption key used during encryption, and a corresponding private key used during decryption. Permanent Virtual Circuit.
Page 247
P312 Broadband Security Gateway SPAM Unwanted e-mail, usually in the form of advertisements. Spoofing To forge something, such as an IP address. IP Spoofing is a common way for hackers to hide their location and identity SSL (Secured Technology that allows you to send information that only the server can read. SSL Socket Layer) allows servers and browsers to encrypt data as they communicate with each other.
Page 248
on a host system. Objects include directories and an assortment of file types, including text files, graphics, video, and audio. A URL is the address of an object that is normally typed in the Address field of a Web browser. The URL is basically a pointer to the location of an object.
Need help?
Do you have a question about the Broadband Security Gateway P-312 and is the answer not in the manual?
Questions and answers