ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual
ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

Adsl voip iad with 802.11g wireless
Table of Contents

Advertisement

Quick Links

Prestige 2602HW Series
ADSL VoIP IAD with 802.11g Wireless
User's Guide
Version 3.40
1/2005

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series

  • Page 1 Prestige 2602HW Series ADSL VoIP IAD with 802.11g Wireless User’s Guide Version 3.40 1/2005...
  • Page 3: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 4: Federal Communications Commission (Fcc) Interference Statement

    Prestige 2602HW Series User’s Guide Federal Communications Commission (FCC) Interference This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5: Safety Warnings

    For your safety, be sure to read and follow all warning notices and instructions. • To reduce the risk of fire, use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord. • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks.
  • Page 6: Zyxel Limited Warranty

    Prestige 2602HW Series User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever...
  • Page 7: Customer Support

    +47 22 80 61 81 +46 31 744 7700 www.zyxel.se +46 31 744 7701 +358-9-4780-8411 www.zyxel.fi +358-9-4780 8448 REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Inc. 1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
  • Page 8 Prestige 2602HW Series User’s Guide Customer Support...
  • Page 9: Table Of Contents

    Copyright ... 3 Federal Communications Commission (FCC) Interference Statement ... 4 Safety Warnings ... 5 ZyXEL Limited Warranty... 6 Customer Support... 7 Table of Contents ... 9 List of Figures ... 27 List of Tables ... 35 Preface ... 41 Introduction to DSL...
  • Page 10 Prestige 2602HW Series User’s Guide Chapter 3 Wizard Setup ... 63 3.1 Wizard Setup Introduction ...63 3.1.1 Encapsulation ...63 3.1.1.1 ENET ENCAP ...63 3.1.1.2 PPP over Ethernet ...63 3.1.1.3 PPPoA ...63 3.1.1.4 RFC 1483 ...64 3.1.2 Multiplexing ...64 3.1.2.1 VC-based Multiplexing ...64 3.1.2.2 LLC-based Multiplexing ...64 3.1.3 VPI and VCI ...64 3.1.4 Internet Access Wizard Setup: First Screen ...64...
  • Page 11 5.4 LAN TCP/IP ...81 5.4.1 Factory LAN Defaults ...81 5.4.2 IP Address and Subnet Mask ...81 5.4.3 RIP Setup ...81 5.4.4 Multicast ...82 5.5 Any IP ...82 5.5.1 How Any IP Works ...83 5.6 Configuring LAN ...84 5.7 Configuring Static DHCP ...85 Chapter 6 Wireless LAN Setup ...
  • Page 12 Prestige 2602HW Series User’s Guide Chapter 7 WAN Setup... 109 7.1 WAN Overview ...109 7.2 Metric ...109 7.3 PPPoE Encapsulation ...110 7.4 Traffic Shaping ...110 7.5 Zero Configuration Internet Access ... 111 7.6 Configuring WAN Setup ... 111 7.7 Traffic Redirect ...114 7.8 Configuring WAN Backup ...115 Chapter 8 Network Address Translation (NAT) Screens ...
  • Page 13 9.3 SIP ALG ...135 9.4 Pulse Code Modulation ...135 9.5 Voice Coding ...136 9.5.1 G.711 ...136 9.5.2 G.729 ...136 9.6 PSTN Call Setup Signaling ...136 Chapter 10 Voice Screens ... 137 10.1 Voice Screens Introduction ...137 10.2 SIP Settings Configuration ...137 10.3 Advanced Voice Settings Configuration ...138 10.4 Quality of Service (QoS) ...140 10.4.1 Type Of Service (ToS) ...140...
  • Page 14 Prestige 2602HW Series User’s Guide Chapter 13 Firewalls... 155 13.1 Firewall Overview ...155 13.2 Types of Firewalls ...155 13.2.1 Packet Filtering Firewalls ...155 13.2.2 Application-level Firewalls ...155 13.2.3 Stateful Inspection Firewalls ...156 13.3 Introduction to ZyXEL’s Firewall ...156 13.3.1 Denial of Service Attacks ...157 13.4 Denial of Service ...157 13.4.1 Basics ...157 13.4.2 Types of DoS Attacks ...158...
  • Page 15 14.4.2 WAN to LAN Rules ...172 14.4.3 Alerts ...173 14.5 Configuring Basic Firewall Settings ...173 14.6 Rule Summary ...174 14.6.1 Configuring Firewall Rules ...176 14.7 Customized Services ...179 14.8 Creating/Editing A Customized Service ...179 14.9 Example Firewall Rule ...180 14.10 Predefined Services ...184 14.11 Anti-Probing ...186 14.12 DOS Thresholds ...187 14.12.1 Threshold Values ...188...
  • Page 16 Prestige 2602HW Series User’s Guide Chapter 17 VPN Screens... 201 17.1 VPN/IPSec Overview ...201 17.2 IPSec Algorithms ...201 17.2.1 AH (Authentication Header) Protocol ...201 17.2.2 ESP (Encapsulating Security Payload) Protocol ...202 17.3 My IP Address ...202 17.4 Secure Gateway Address ...203 17.4.1 Dynamic Secure Gateway Address ...203 17.5 VPN Summary Screen ...203 17.6 Keep Alive ...205...
  • Page 17 Chapter 19 Universal Plug-and-Play (UPnP) ... 233 19.1 Introducing Universal Plug and Play ...233 19.1.1 How do I know if I'm using UPnP? ...233 19.1.2 NAT Traversal ...233 19.1.3 Cautions with UPnP ...233 19.2 UPnP and ZyXEL ...234 19.2.1 Configuring UPnP ...234 19.3 Installing UPnP in Windows Example ...235 19.4 Using UPnP in Windows XP Example ...239 Chapter 20...
  • Page 18 Prestige 2602HW Series User’s Guide 22.3.1 System Management Terminal Interface Summary ...268 22.3.2 SMT Menus Overview ...269 22.4 Changing the System Password ...270 Chapter 23 Menu 1 General Setup ... 273 23.1 General Setup ...273 23.2 Procedure To Configure Menu 1 ...273 23.2.1 Procedure to Configure Dynamic DNS ...274 Chapter 24 Menu 2 WAN Backup Setup ...
  • Page 19 28.2.2 Encapsulation and Multiplexing Scenarios ...296 28.2.2.1 Scenario 1: One VC, Multiple Protocols ...296 28.2.2.2 Scenario 2: One VC, One Protocol (IP) ...296 28.2.2.3 Scenario 3: Multiple VCs ...296 28.2.3 Outgoing Authentication Protocol ...298 28.3 Remote Node Network Layer Options ...299 28.3.1 My WAN Addr Sample IP Addresses ...300 28.4 Remote Node Filter ...301 28.5 Editing ATM Layer Options ...302...
  • Page 20 Prestige 2602HW Series User’s Guide Chapter 32 Enabling the Firewall ... 329 32.1 Remote Management and the Firewall ...329 32.2 Access Methods ...329 32.3 Enabling the Firewall ...329 Chapter 33 Filter Configuration ... 331 33.1 About Filtering ...331 33.1.1 The Filter Structure of the Prestige ...332 33.2 Configuring a Filter Set for the Prestige ...333 33.3 Filter Rules Summary Menus ...334 33.4 Configuring a Filter Rule ...335...
  • Page 21 36.4 Log and Trace ...359 36.4.1 Viewing Error Log ...359 36.4.2 Syslog and Accounting ...360 36.5 Diagnostic ...362 Chapter 37 Firmware and Configuration File Maintenance ... 365 37.1 Filename Conventions ...365 37.2 Backup Configuration ...366 37.2.1 Backup Configuration ...366 37.2.2 Using the FTP Command from the Command Line ...367 37.2.3 Example of FTP Commands from the Command Line ...367 37.2.4 GUI-based FTP Clients ...368 37.2.5 TFTP and FTP over WAN Management Limitations ...368...
  • Page 22 Prestige 2602HW Series User’s Guide Chapter 39 Remote Management ... 387 39.1 Remote Management Overview ...387 39.2 Remote Management ...387 39.2.1 Remote Management Setup ...387 39.2.2 Remote Management Limitations ...388 39.3 Remote Management and NAT ...389 39.4 System Timeout ...389 Chapter 40 IP Policy Routing...
  • Page 23 44.4 Problems with the LAN Interface ...420 44.5 Problems with the WAN Interface ...420 44.6 Problems with Internet Access ...421 44.7 Problems with the Password ...421 44.8 Problems with the Web Configurator ...422 44.9 Problems with Remote Management ...422 44.10 Telephone Problems ...423 Appendix A Hardware Specifications ...
  • Page 24 Prestige 2602HW Series User’s Guide Appendix E Wireless LAN and IEEE 802.11 ... 451 Benefits of a Wireless LAN ... 451 IEEE 802.11 ... 451 Ad-hoc Wireless LAN Configuration... 452 Infrastructure Wireless LAN Configuration... 452 Appendix F Wireless LAN With IEEE 802.1x ... 455 Security Flaws with IEEE 802.11 ...
  • Page 25 Command Syntax... 489 Command Usage ... 489 Appendix K Firewall Commands ... 491 Sys Firewall Commands ... 491 Appendix L Boot Commands ... 493 Appendix M Log Descriptions... 495 Log Commands... 504 Configuring What You Want the Prestige to Log ... 504 Displaying Logs ...
  • Page 26 Prestige 2602HW Series User’s Guide Table of Contents...
  • Page 27: List Of Figures

    Prestige 2602HW Series User’s Guide List of Figures Figure 1 Prestige Internet Access Application ... 54 Figure 2 Internet Telephony Service Provider Application ... 55 Figure 3 Firewall Application ... 55 Figure 4 Prestige LAN-to-LAN Application ... 56 Figure 5 Password Screen ... 57 Figure 6 Change Password at Login ...
  • Page 28 Prestige 2602HW Series User’s Guide Figure 39 WAN Backup ... 116 Figure 40 How NAT Works ... 121 Figure 41 NAT Application With IP Alias ... 121 Figure 42 Multiple Servers Behind NAT Example ... 124 Figure 43 NAT Mode ... 125 Figure 44 Edit SUA/NAT Server Set ...
  • Page 29 Prestige 2602HW Series User’s Guide Figure 82 Encryption and Decryption ... 196 Figure 83 IPSec Architecture ... 197 Figure 84 Transport and Tunnel Mode IPSec Encapsulation ... 198 Figure 85 IPSec Summary Fields ... 203 Figure 86 VPN Summary ... 204 Figure 87 VPN Host using Intranet DNS Server Example ...
  • Page 30 Prestige 2602HW Series User’s Guide Figure 124 Firmware Upgrade ... 262 Figure 125 Network Temporarily Disconnected ... 263 Figure 126 Error Message ... 263 Figure 127 Initial Screen ... 266 Figure 128 Password Screen ... 266 Figure 129 Login Screen ... 267 Figure 130 Menu 23.1 Change Password ...
  • Page 31 Prestige 2602HW Series User’s Guide Figure 167 Menu 15.1.1 First Set ... 317 Figure 168 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ... 319 Figure 169 Menu 15.2 NAT Server Setup ... 320 Figure 170 Menu 15.2 NAT Server Setup ... 320 Figure 171 Multiple Servers Behind NAT Example ...
  • Page 32 Prestige 2602HW Series User’s Guide Figure 210 Menu 24.1 System Maintenance : Status ... 356 Figure 211 Menu 24.2 System Information and Console Port Speed ... 357 Figure 212 Menu 24.2.1 System Maintenance: Information ... 358 Figure 213 Menu 24.2.2 System Maintenance : Change Console Port Speed ... 359 Figure 214 Menu 24.3 System Maintenance: Log and Trace ...
  • Page 33 Prestige 2602HW Series User’s Guide Figure 253 Applying IP Policies Example ... 398 Figure 254 Menu 26 Schedule Setup ... 399 Figure 255 Menu 26.1 Schedule Set Setup ... 400 Figure 256 Applying Schedule Set(s) to a Remote Node (PPPoE) ... 401 Figure 257 VPN SMT Menu Tree ...
  • Page 34 Prestige 2602HW Series User’s Guide Figure 296 Displaying Log Parameters Example ... 505 Figure 297 Log Command Example ... 506 List of Figures...
  • Page 35: List Of Tables

    Prestige 2602HW Series User’s Guide List of Tables Table 1 ADSL Standards ... 45 Table 2 IEEE 802.11g ... 49 Table 3 Web Configurator Screens Summary ... 59 Table 4 Internet Access Wizard Setup: First Screen ... 65 Table 5 Internet Connection with PPPoE ... 68 Table 6 Internet Connection with RFC 1483 ...
  • Page 36 Prestige 2602HW Series User’s Guide Table 39 Phone Port Common ... 148 Table 40 Dynamic DNS ... 150 Table 41 Pre-defined NTP Time Servers ... 151 Table 42 Time and Date ... 152 Table 43 Common IP Ports ... 158 Table 44 ICMP Commands That Trigger Alerts ...
  • Page 37 Prestige 2602HW Series User’s Guide Table 82 Diagnostic: General ... 260 Table 83 Diagnostic: DSL Line ... 261 Table 84 Firmware Upgrade ... 262 Table 85 Navigating the SMT Interface ... 267 Table 86 SMT Main Menu ... 268 Table 87 Main Menu Summary ... 268 Table 88 SMT Menus Overview ...
  • Page 38 Prestige 2602HW Series User’s Guide Table 125 General Commands for GUI-based FTP Clients ... 368 Table 126 General Commands for GUI-based TFTP Clients ... 370 Table 127 Menu 24.9.1 System Maintenance: Budget Management ... 383 Table 128 Menu 24.10 System Maintenance: Time and Date Setting ... 384 Table 129 Menu 24.11 Remote Management Control ...
  • Page 39 Prestige 2602HW Series User’s Guide Table 168 Menu 4 Internet Access Setup (SMT Menu 4) ... 469 Table 169 Menu 12 (SMT Menu 12) ... 471 Table 170 Menu 15 SUA Server Setup (SMT Menu 15) ... 475 Table 171 Menu 21.1 Filter Set #1 (SMT Menu 21.1) ... 477 Table 172 Menu 21.1 Filer Set #2, (SMT Menu 21.1) ...
  • Page 40 Prestige 2602HW Series User’s Guide List of Tables...
  • Page 41: Preface

    Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
  • Page 42: Syntax Conventions

    Prestige 2602HW Series User’s Guide Syntax Conventions • “Enter” means for you to type one or more characters. “Select” or “Choose” means for you to use one predefined choices. • The SMT menu titles and labels are in Bold Times New Roman font. Predefined field choices are in Bold Arial font.
  • Page 43: Introduction To Dsl

    Graphics Icons Key Prestige Server Telephone Firewall DSL (Digital Subscriber Line) technology enhances the data capacity of the existing twisted- pair wire that runs between the local telephone company switching offices and most homes and offices. While the wire itself can handle higher frequencies, the telephone switching equipment is designed to cut off signals above 4,000 Hz to filter noise off the voice line, but now everybody is searching for ways to get more bandwidth to improve access to the Web - hence DSL technologies.
  • Page 44 Prestige 2602HW Series User’s Guide As data rates increase, the carrying distance decreases. That means that users who are beyond a certain distance from the telephone company’s central office may not be able to obtain the higher speeds. A DSL connection is a point-to-point dedicated circuit, meaning that the link is always up and there is no dialing required.
  • Page 45: Getting To Know Your Prestige

    Getting To Know Your Prestige This chapter describes the key features and applications of your Introducing the Prestige The Prestige P2602HW ADSL VoIP IAD (Integrated Access Device) combines high-speed ADSL Internet access, a 4-port Ethernet switch, IEEE 802.11g wireless access, and Voice over IP (VoIP) communication capabilities.
  • Page 46: Prestige 2602Hw-L With Lifeline

    Prestige 2602HW Series User’s Guide Note: Models ending in “1”, for example Prestige 2602HW-61, denote a device that works over the analog telephone system, POTS (Plain Old Telephone Service). Models ending in “3” denote a device that works over ISDN (Integrated Synchronous Digital System).
  • Page 47: Multiple Sip Accounts

    Multiple SIP Accounts The Prestige allows you to simultaneously use multiple voice (SIP) accounts and assign them to one or both telephone ports. Multiple Voice Channels The Prestige can simultaneously handle multiple voice channels (telephone calls). Additionally you can answer an incoming phone call on a VoIP account, even while someone else is using the account for a phone call.
  • Page 48: High Speed Internet Access

    Prestige 2602HW Series User’s Guide High Speed Internet Access Your Prestige ADSL/ADSL2/ADSL2+ router can support downstream transmission rates of up to 24Mbps and upstream transmission rates of 3.5Mbps. Actual speeds attained depend on ISP DSLAM environment. Zero Configuration Internet Access Once you connect and turn on the Prestige, it automatically detects the Internet connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and makes the necessary configuration changes.
  • Page 49: Table 2 Ieee 802.11G

    IEEE 802.11g Wireless LAN IEEE 802.11g is fully compatible with the IEEE 802.11b standard. This means an IEEE 802.11b radio card can interface directly with an IEEE 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. IEEE 802.11g has several intermediate rate steps between the maximum and minimum data rates.
  • Page 50: Traffic Redirect

    Prestige 2602HW Series User’s Guide Traffic Redirect Traffic redirect forwards WAN traffic to a backup gateway when the Prestige cannot connect to the Internet, thus acting as an auxiliary if your regular WAN connection fails. Universal Plug and Play (UPnP) Using the standard TCP/IP protocol, the Prestige and other UPnP enabled devices can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network.
  • Page 51: Adsl Standards

    ADSL Standards • Full-Rate (ANSI T1.413, Issue 2; G.dmt (G.992.1) with line rate support of up to 8 Mbps downstream and 832 Kbps upstream. • G.lite (G.992.2) with line rate support of up to 1.5Mbps downstream and 512Kbps upstream. • Supports Multi-Mode standard (ANSI T1.413, Issue 2; G.dmt (G.992.1); G.lite (G992.2)).
  • Page 52: Networking Compatibility

    Prestige 2602HW Series User’s Guide IP Policy Routing (IPPR) Traditionally, routing is based on the destination address only and the router takes the shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
  • Page 53: Applications For The Prestige

    • ADSL circuitry • RAM • LAN port Packet Filters The Prestige's packet filtering functions allows added network security and management. Ease of Installation Your Prestige is designed for quick, intuitive and easy installation. Housing Your Prestige's compact and ventilated housing minimizes space requirements making it easy to position anywhere in your busy office.
  • Page 54: Making Calls Via Internet Telephony Service Provider

    Prestige 2602HW Series User’s Guide Figure 1 Prestige Internet Access Application Internet Single User Account For a SOHO (Small Office/Home Office) environment, your Prestige offers the Single User Account (SUA) feature that allows multiple users on the LAN (Local Area Network) to access the Internet concurrently for the cost of a single IP address 1.4.2 Making Calls via Internet Telephony Service Provider In a home or small office environment, you can use the Prestige to make and receive VoIP...
  • Page 55: Firewall For Secure Broadband Internet Access

    Figure 2 Internet Telephony Service Provider Application 1.4.3 Firewall for Secure Broadband Internet Access The Prestige provides protection from attacks by Internet hackers. By default, the firewall blocks all incoming traffic from the WAN. The firewall supports TCP/UDP inspection and DoS (Denial of Services) detection and prevention, as well as real time alerts, reports and logs.
  • Page 56: Prestige Hardware Installation And Connection

    Prestige 2602HW Series User’s Guide Figure 4 Prestige LAN-to-LAN Application 1.5 Prestige Hardware Installation and Connection Refer to the Quick Start Guide for information on hardware installation and connections and LED descriptions. Chapter 1 Getting To Know Your Prestige...
  • Page 57: Introducing The Web Configurator

    This chapter describes how to access and navigate the web configurator. 2.1 Web Configurator Overview The embedded web configurator allows you to manage the Prestige from anywhere through a browser such as Microsoft Internet Explorer or Netscape Navigator. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions with JavaScript enabled.
  • Page 58: Resetting The Prestige

    Prestige 2602HW Series User’s Guide Figure 6 Change Password at Login 7 You should now see the SITE MAP screen. Note: The Prestige automatically times out after five minutes of inactivity. Simply log back into the Prestige if this happens to you. 2.1.2 Resetting the Prestige If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the Prestige to reload the factory-default configuration file.
  • Page 59: Figure 7 Web Configurator Site Map Screen

    • Click Logout in the navigation panel when you have finished a Prestige management session. Figure 7 Web Configurator SITE MAP Screen Note: Click the embedded help. Table 3 Web Configurator Screens Summary LINK SUB-LINK Wizard Setup Wizard Setup Advanced Setup Password Wireless LAN Wireless...
  • Page 60 Prestige 2602HW Series User’s Guide Table 3 Web Configurator Screens Summary (continued) LINK SUB-LINK Voice SIP Settings Phone Speed Dial Lifeline Common Dynamic DNS Time and Date Firewall Default Policy Rule Summary Anti Probing Threshold Content Filter Keyword Schedule Trusted Setup Monitor Global Setting...
  • Page 61 Table 3 Web Configurator Screens Summary (continued) LINK SUB-LINK Diagnostic General DSL Line Firmware LOGOUT Chapter 2 Introducing the Web Configurator Prestige 2602HW Series User’s Guide FUNCTION These screens display information to help you identify problems with the Prestige general connection. These screens display information to help you identify problems with the DSL line.
  • Page 62 Prestige 2602HW Series User’s Guide Chapter 2 Introducing the Web Configurator...
  • Page 63: Chapter 3 Wizard Setup

    This chapter provides information on the Wizard Setup screens for Internet access and VoIP in the web configurator. 3.1 Wizard Setup Introduction Use the Wizard Setup screens to configure your system for Internet access and Voice with the information provided by your ISP and voice service provider. Your ISP may have already configured some of the fields in the wizard screens for you.
  • Page 64: Rfc 1483

    Prestige 2602HW Series User’s Guide 3.1.1.4 RFC 1483 RFC 1483 describes two methods for Multiprotocol Encapsulation over ATM Adaptation Layer 5 (AAL5). The first method allows multiplexing of multiple protocols over a single ATM virtual circuit (LLC-based multiplexing) and the second method assumes that each protocol is carried over a separate ATM virtual circuit (VC-based multiplexing).
  • Page 65: Ip Address And Subnet Mask

    Figure 8 Internet Access Wizard Setup: First Screen The following table describes the fields in this screen. Table 4 Internet Access Wizard Setup: First Screen LABEL DESCRIPTION Mode From the Mode drop-down list box, select Routing (default) if your ISP allows multiple computers to share an Internet account.
  • Page 66: Ip Address Assignment

    Prestige 2602HW Series User’s Guide If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established.
  • Page 67: Private Ip Addresses

    3.2.1.4 Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: •...
  • Page 68: Figure 9 Internet Connection With Pppoe

    Prestige 2602HW Series User’s Guide Figure 9 Internet Connection with PPPoE The following table describes the fields in this screen. Table 5 Internet Connection with PPPoE LABEL DESCRIPTION Service Name Type the name of your PPPoE service here. User Name Enter the user name exactly as your ISP assigned.
  • Page 69: Figure 10 Internet Connection With Rfc 1483

    Figure 10 Internet Connection with RFC 1483 The following table describes the fields in this screen. Table 6 Internet Connection with RFC 1483 LABEL DESCRIPTION IP Address This field is available if you select Routing in the Mode field. Type your ISP assigned IP address in this field. Network Address Select None, SUA Only or Full Feature from the drop-sown list box.
  • Page 70: Figure 12 Internet Connection With Pppoa

    Prestige 2602HW Series User’s Guide Table 7 Internet Connection with ENET ENCAP LABEL DESCRIPTION IP Address A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Select Obtain an IP Address Automatically if you have a dynamic IP address;...
  • Page 71: Sip Identities

    Table 8 Internet Connection with PPPoA LABEL DESCRIPTION User Name Enter the login name that your ISP gives you. Password Enter the password associated with the user name above. IP Address This option is available if you select Routing in the Mode field. A static IP address is a fixed IP that your ISP gives you.
  • Page 72: Figure 13 Internet Access Wizard Setup: Third Screen

    Prestige 2602HW Series User’s Guide Figure 13 Internet Access Wizard Setup: Third Screen Table 9 Internet Access Wizard Setup: Voice Configuration LABEL Active SIP Number SIP Local Port SIP Server Address SIP Server Port REGISTER Server Address REGISTER Server Port Enter the SIP register server’s listening port for SIP in this field. SIP Service Domain Authentication User ID DESCRIPTION...
  • Page 73: Dhcp Setup

    Table 9 Internet Access Wizard Setup: Voice Configuration (continued) LABEL Authentication Password Send Caller ID Back Next 3.2.7 DHCP Setup DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration from a server. You can configure the Prestige as a DHCP server or disable it.
  • Page 74: Figure 14 Internet Access Wizard Setup: Fourth Screen

    Prestige 2602HW Series User’s Guide Figure 14 Internet Access Wizard Setup: Fourth Screen If you want to change your Prestige LAN settings, click Change LAN Configuration to display the screen as shown next. Chapter 3 Wizard Setup...
  • Page 75: Internet Access Wizard Setup: Connection Test

    Figure 15 Internet Access Wizard Setup: LAN Configuration The following table describes the fields in this screen. Table 10 Internet Access Wizard Setup: LAN Configuration LABEL LAN IP Address LAN Subnet Mask DHCP DHCP Server Client IP Pool Starting Address Size of Client IP Pool Primary DNS Server Secondary DNS Server As above.
  • Page 76: Test Your Internet Connection

    Prestige 2602HW Series User’s Guide Figure 16 Internet Access Wizard Setup: Connection Tests 3.2.9.1 Test Your Internet Connection Launch your web browser and navigate to www.zyxel.com. Internet access is just the beginning. Refer to the rest of this User’s Guide for more detailed information on the complete range of Prestige features.
  • Page 77: Chapter 4 Password Setup

    This chapter provides information on the Password screen. 4.1 Password Overview It is highly recommended that you change the password for accessing the Prestige. 4.1.1 Configuring Password To change your Prestige’s password (recommended), click Password in the Site Map screen. Figure 17 Password The following table describes the fields in this screen.
  • Page 78 Prestige 2602HW Series User’s Guide Chapter 4 Password Setup...
  • Page 79: Chapter 5 Lan Setup

    This chapter describes how to configure LAN settings. 5.1 LAN Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 80: Dns Server Address

    Prestige 2602HW Series User’s Guide 5.2 DNS Server Address DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a machine before you can access it.
  • Page 81: Lan Tcp/Ip

    5.4 LAN TCP/IP The Prestige has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability. 5.4.1 Factory LAN Defaults The LAN parameters of the Prestige are preset in the factory with the following values: •...
  • Page 82: Multicast

    Prestige 2602HW Series User’s Guide 5.4.4 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
  • Page 83: How Any Ip Works

    Figure 19 Any IP Example The Any IP feature does not apply to a computer using either a dynamic IP address or a static IP address that is in the same subnet as the Prestige’s IP address. Note: You must enable NAT/SUA to use the Any IP feature on the Prestige. 5.5.1 How Any IP Works Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to a physical machine address, also known as a Media Access Control or MAC...
  • Page 84: Configuring Lan

    Prestige 2602HW Series User’s Guide 5.6 Configuring LAN Click LAN and LAN Setup to open the following screen. Figure 20 LAN Setup The following table describes the fields in this screen. Table 12 LAN Setup LABEL DESCRIPTION DHCP DHCP If set to Server, your Prestige can assign IP addresses, an IP default gateway and DNS servers to Windows 95, Windows NT and other systems that support the DHCP client.
  • Page 85: Configuring Static Dhcp

    Table 12 LAN Setup (continued) LABEL DESCRIPTION Size of Client IP This field specifies the size or count of the IP address pool. Pool Primary DNS Server Enter the IP addresses of the DNS servers. The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask.
  • Page 86: Figure 21 Lan: Static Dhcp

    Prestige 2602HW Series User’s Guide Figure 21 LAN: Static DHCP The following table describes the labels in this screen. Table 13 LAN: Static DHCP LABEL DESCRIPTION This is the index number of the Static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN.
  • Page 87: Chapter 6 Wireless Lan Setup

    This chapter discusses how to configure Wireless LAN on the Prestige. 6.1 Wireless LAN Introduction This section introduces the wireless LAN and some basic configurations. Wireless LANs can be as simple as two computers with wireless LAN cards communicating in a peer-to-peer network or as complex as a number of computers with wireless LAN cards communicating through access points which bridge network traffic to the wired LAN.
  • Page 88: Rts/Cts

    Prestige 2602HW Series User’s Guide 6.1.4 RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot "hear"...
  • Page 89: Fragmentation Threshold

    6.1.5 Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the Prestige will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 90: Data Encryption With Wep

    Prestige 2602HW Series User’s Guide 6.3 Data Encryption with WEP WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communications private. It encrypts unicast and multicast communications in a network. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.
  • Page 91: Figure 24 Wireless Lan

    Figure 24 Wireless LAN The following table describes the fields in this screen. Table 14 Wireless LAN LABEL DESCRIPTION Enable Wireless The wireless LAN is turned off by default, before you enable the wireless LAN you should configure some security by setting MAC filters and/or 802.1x security; otherwise your wireless LAN will be vulnerable upon enabling it.
  • Page 92: Configuring Mac Filter

    Prestige 2602HW Series User’s Guide Table 14 Wireless LAN (continued) LABEL DESCRIPTION WEP Encryption WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network. Select Disable to allow all wireless computers to communicate with the access points without any data encryption. Select 64-bit WEP, 128-bit WEP or 256-bit WEP to use data encryption.
  • Page 93: Figure 25 Mac Address Filter

    Figure 25 MAC Address Filter The following table describes the fields in this menu. Table 15 MAC Address Filter LABEL DESCRIPTION Active Select Yes from the drop down list box to enable MAC address filtering. Action Define the filter action for the list of MAC addresses in the MAC Address table. Select Deny Association to block access to the router, MAC addresses not listed will be allowed to access the Prestige.
  • Page 94: Network Authentication

    Prestige 2602HW Series User’s Guide Table 15 MAC Address Filter (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the Prestige. Cancel Click Cancel to begin configuring this screen afresh. 6.6 Network Authentication You can set the Prestige and your network to authenticate a wireless station before the wireless station can communicate with the Prestige and the wired network to which the Prestige is connected.
  • Page 95: Eap Authentication Overview

    • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access- Request message.
  • Page 96: Introduction To Wpa

    Prestige 2602HW Series User’s Guide 3 The wireless station replies with identity information, including username and password. 4 The RADIUS server checks the user information against its user profile database and determines whether or not to authenticate the wireless station. 6.7 Introduction to WPA Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft.
  • Page 97: Wpa-Psk Application Example

    By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism (MIC), TKIP makes it much more difficult to decode data on a Wi-Fi network than WEP, making it difficult for an intruder to break into the network. The encryption mechanisms used for WPA and WPA-PSK are the same.
  • Page 98: Security Parameters Summary

    Prestige 2602HW Series User’s Guide 2 The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly. 3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients...
  • Page 99: Wireless Client Wpa Supplicants

    Table 16 Wireless Security Relational Matrix (continued) AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL WPA-PSK WPA-PSK 6.11 Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicant is the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data Communications' AEGIS client.
  • Page 100: Authentication Required: 802.1X

    Prestige 2602HW Series User’s Guide Table 17 Wireless LAN: 802.1x/WPA LABEL DESCRIPTION Wireless Port To control wireless stations access to the wired network, select a control method from Control the drop-down list box. Choose from No Access Allowed, No Authentication Required and Authentication Required.
  • Page 101: Table 18 Wireless Lan: 802.1X/Wpa For 802.1X Protocol

    Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol LABEL DESCRIPTION Wireless Port To control wireless stations access to the wired network, select a control method Control from the drop-down list box. Choose from No Authentication Required, Authentication Required and No Access Allowed. The following fields are only available when you select Authentication Required.
  • Page 102: Authentication Required: Wpa

    Prestige 2602HW Series User’s Guide Table 18 Wireless LAN: 802.1x/WPA for 802.1x Protocol (continued) LABEL DESCRIPTION Back Click Back to go to the main wireless LAN setup screen. Apply Click Apply to save your changes back to the Prestige. Cancel Click Cancel to begin configuring this screen afresh.
  • Page 103: Authentication Required: Wpa-Psk

    Table 19 Wireless LAN: 802.1x/WPA for WPA Protocol LABEL DESCRIPTION Key Management Choose WPA in this field. Protocol WPA Mixed Mode The Prestige can operate in WPA Mixed Mode, which supports both clients running WPA and clients running dynamic WEP key exchange with 802.1x in the same Wi-Fi network.
  • Page 104: Figure 32 Wireless Lan: 802.1X/Wpa For Wpa-Psk Protocol

    Prestige 2602HW Series User’s Guide Figure 32 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol The following table describes the labels not previously discussed. Table 20 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol LABEL Key Management Protocol Pre-Shared Key WPA Mixed Mode Group Data Privacy Authentication Databases DESCRIPTION...
  • Page 105: Configuring Local User Authentication

    6.13 Configuring Local User Authentication By storing user profiles locally, your Prestige is able to authenticate wireless users without interacting with a network RADIUS server. However, there is a limit on the number of users you may authenticate in this way. To change your Prestige’s local user database, click Wireless LAN, Local User Database.
  • Page 106: Configuring Radius

    Prestige 2602HW Series User’s Guide Table 21 Local User Database LABEL DESCRIPTION This is the index number of a local user account. Active Select this check box to enable the user profile. User Name Enter the user name of the user profile. Password Enter a password up to 31 characters long for this user profile.
  • Page 107: Table 22 Radius

    Table 22 RADIUS LABEL Authentication Server Active Server IP Address Port Number Shared Secret Accounting Server Active Server IP Address Port Number Shared Secret Back Apply Cancel Chapter 6 Wireless LAN Setup Prestige 2602HW Series User’s Guide DESCRIPTION Select Yes from the drop-down list box to enable user authentication through an external authentication server.
  • Page 108 Prestige 2602HW Series User’s Guide Chapter 6 Wireless LAN Setup...
  • Page 109: Chapter 7 Wan Setup

    This chapter describes how to configure WAN settings. 7.1 WAN Overview A WAN (Wide Area Network) connection is a connection to another network or the Internet. Chapter 3 on page 63 7.2 Metric The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost".
  • Page 110: Pppoe Encapsulation

    Prestige 2602HW Series User’s Guide 7.3 PPPoE Encapsulation The Prestige supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF Draft standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPPoE option is for a dial-up connection using PPPoE.
  • Page 111: Zero Configuration Internet Access

    Figure 35 Example of Traffic Shaping 7.5 Zero Configuration Internet Access Once you turn on and connect the Prestige to a telephone jack, it automatically detects the Internet connection settings (such as the VCI/VPI numbers and the encapsulation method) from the ISP and makes the necessary configuration changes. In cases where additional account information (such as an Internet account user name and password) is required or the Prestige cannot connect to the ISP, you will be redirected to web screen(s) for information input or troubleshooting.
  • Page 112: Figure 36 Wan Setup (Pppoe)

    Prestige 2602HW Series User’s Guide Figure 36 WAN Setup (PPPoE) The following table describes the fields in this screen. Table 23 WAN Setup LABEL Name Mode DESCRIPTION Enter the name of your Internet Service Provider, e.g., MyISP. This information is for identification purposes only.
  • Page 113 Table 23 WAN Setup (continued) LABEL Encapsulation Multiplex Virtual Circuit ID ATM QoS Type Cell Rate Peak Cell Rate Sustain Cell Rate Maximum Burst Size Maximum Burst Size (MBS) refers to the maximum number of cells that can be Login Information Service Name User Name Password...
  • Page 114: Traffic Redirect

    Prestige 2602HW Series User’s Guide Table 23 WAN Setup (continued) LABEL Connect on Demand Select Connect on Demand when you don't want the connection up all the time Max Idle Timeout PPPoE Passthrough (PPPoE encapsulation only) Subnet Mask (ENET ENCAP encapsulation only) ENET ENCAP Gateway...
  • Page 115: Configuring Wan Backup

    Figure 37 Traffic Redirect Example The following network topology allows you to avoid triangle route security issues when the backup gateway is connected to the LAN. Use IP alias to configure the LAN into two or three logical networks with the Prestige itself as the gateway for each LAN network. Put the protected LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another subnet (Subnet 2).
  • Page 116: Figure 39 Wan Backup

    Prestige 2602HW Series User’s Guide Figure 39 WAN Backup The following table describes the fields in this screen. Table 24 WAN Backup LABEL DESCRIPTION Backup Type Select the method that the Prestige uses to check the DSL connection. Select DSL Link to have the Prestige check if the connection to the DSLAM is up. Select ICMP to have the Prestige periodically ping the IP addresses configured in the Check WAN IP Address fields.
  • Page 117 Table 24 WAN Backup (continued) LABEL DESCRIPTION Timeout Type the number of seconds (3 recommended) for your Prestige to wait for a ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request. The WAN connection is considered "down" after the Prestige times out the number of times specified in the Fail Tolerance field.
  • Page 118 Prestige 2602HW Series User’s Guide Chapter 7 WAN Setup...
  • Page 119: Network Address Translation (Nat) Screens

    Network Address Translation This chapter discusses how to configure NAT on the Prestige. 8.1 NAT Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
  • Page 120: What Nat Does

    Prestige 2602HW Series User’s Guide 8.1.2 What NAT Does In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host.
  • Page 121: Nat Application

    Figure 40 How NAT Works 8.1.4 NAT Application The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP Alias) behind the Prestige can communicate with three distinct WAN networks. More examples follow at the end of this chapter. Figure 41 NAT Application With IP Alias 8.1.5 NAT Mapping Types NAT supports five types of IP/port mapping.
  • Page 122: Sua (Single User Account) Versus Nat

    Prestige 2602HW Series User’s Guide • One to One: In One-to-One mode, the Prestige maps one local IP address to one global IP address. • Many to One: In Many-to-One mode, the Prestige maps multiple local IP addresses to one global IP address. This is equivalent to SUA (for instance, PAT, port address translation), ZyXEL’s Single User Account feature that previous ZyXEL routers supported (the SUA Only option in today’s routers).
  • Page 123: Sua Server

    • Choose Full Feature if you have multiple public WAN IP addresses for your Prestige. 8.3 SUA Server A SUA server set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though SUA makes your whole inside network appear as a single computer to the outside world.
  • Page 124: Configuring Servers Behind Sua (Example)

    Prestige 2602HW Series User’s Guide Table 27 Services and Port Numbers (continued) SERVICES SNMP trap PPTP (Point-to-Point Tunneling Protocol) 8.3.3 Configuring Servers Behind SUA (Example) Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example).
  • Page 125: Configuring Sua Server

    Figure 43 NAT Mode The following table describes the labels in this screen. Table 28 NAT Mode LABEL DESCRIPTION None Select this radio button to disable NAT. SUA Only Select this radio button if you have just one public WAN IP address for your Prestige. The Prestige uses Address Mapping Set 1 in the NAT - Edit SUA/NAT Server Set screen.
  • Page 126: Figure 44 Edit Sua/Nat Server Set

    Prestige 2602HW Series User’s Guide Figure 44 Edit SUA/NAT Server Set The following table describes the fields in this screen. Table 29 Edit SUA/NAT Server Set LABEL Start Port No. Enter a port number in this field. To forward only one port, enter the port number again in the End Port No. field. To forward a series of ports, enter the start port number here and the end port number in the End Port No.
  • Page 127: Configuring Address Mapping

    8.6 Configuring Address Mapping Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules.
  • Page 128: Editing An Address Mapping Rule

    Prestige 2602HW Series User’s Guide Table 30 Address Mapping Rules (continued) LABEL DESCRIPTION Type 1-1: One-to-one mode maps one local IP address to one global IP address. Note that port numbers do not change for the One-to-one NAT mapping type. M-1: Many-to-One mode maps multiple local IP addresses to one global IP address.
  • Page 129: Table 31 Address Mapping Rule Edit

    Table 31 Address Mapping Rule Edit LABEL Type Choose the port mapping type from one of the following. • One-to-One: One-to-One mode maps one local IP address to one global IP address. Note that port numbers do not change for One-to-one NAT mapping type.
  • Page 130 Prestige 2602HW Series User’s Guide Chapter 8 Network Address Translation (NAT) Screens...
  • Page 131: Introduction To Voip

    This chapter provides background information on VoIP and SIP. 9.1 Introduction to VoIP VoIP is the sending of voice signals over the Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit- switched telephone network.
  • Page 132: Sip Service Domain

    Prestige 2602HW Series User’s Guide 9.2.1.2 SIP Service Domain The SIP service domain of the VoIP service provider is the domain name in a SIP URI. For example, if the SIP address is 1122334455@VoIP-provider.com, then “VoIP-provider.com” is the SIP service domain. 9.2.2 SIP Call Progression The following figure displays the basic steps in the setup and tear down of a SIP call.
  • Page 133: Sip User Agent Server

    9.2.3.1 SIP User Agent Server A SIP user agent server can make and receive VoIP telephone calls. This means that SIP can be used for peer-to-peer communications even though it is a client-server protocol. In the following figure, either A or B can act as a SIP user agent client to initiate a call. A and B can also both act as a SIP user agent server to receive the call.
  • Page 134: Sip Redirect Server

    Prestige 2602HW Series User’s Guide Figure 48 SIP Proxy Server 9.2.3.3 SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request. Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server.
  • Page 135: Sip Register Server

    Figure 49 SIP Redirect Server 9.2.3.4 SIP Register Server A SIP register server maintains a database of SIP identity-to-IP address (or domain name) mapping. The register server checks your user name and password when you register. 9.2.4 RTP When you make a VoIP call using SIP, the RTP (Real time Transport Protocol) is used to handle voice data transfer.
  • Page 136: Voice Coding

    Prestige 2602HW Series User’s Guide 9.5 Voice Coding A codec (coder/decoder) codes analog voice signals into digital signals and decodes the digital signals back into voice signals. The Prestige supports the following codecs. 9.5.1 G.711 G.711 is a Pulse Code Modulation (PCM) waveform codec. G.711 provides very good sound quality but requires 64kbps of bandwidth.
  • Page 137: Chapter 10 Voice Screens

    This chapter describes how to configure advanced VoIP, QoS, phone and phone book settings. 10.1 Voice Screens Introduction This chapter covers the configuration of the VoIP screens. 10.2 SIP Settings Configuration Click Voice in the navigation panel and then SIP Settings to display the following screen. Use this screen to configure the Prestige’s SIP settings.
  • Page 138: Advanced Voice Settings Configuration

    Prestige 2602HW Series User’s Guide Table 33 SIP Settings LABEL DESCRIPTION SIP Account You can configure the Prestige to use multiple SIP accounts. Select one to configure its settings on the Prestige. Active SIP Select this check box to have the Prestige use this SIP account. Clear the check box to have the Prestige not use this SIP account.
  • Page 139: Figure 51 Voice Advanced Setup

    Figure 51 Voice Advanced Setup The following table describes the labels in this screen. Table 34 Voice Advanced Setup LABEL DESCRIPTION Advanced VoIP This read-only field displays the number of the SIP account that you are Settings configuring. The changes that you save in this page affect the Prestige’s settings with the SIP account displayed here.
  • Page 140: Quality Of Service (Qos)

    Prestige 2602HW Series User’s Guide Table 34 Voice Advanced Setup (continued) LABEL DESCRIPTION Min-SE When two SIP devices negotiate a SIP session, they must negotiate a common expiration time for idle SIP sessions. This field sets the shortest expiration time that the Prestige will accept.
  • Page 141: Diffserv

    10.4.2 DiffServ DiffServ is a class of service (CoS) model that marks packets so that they receive specific per- hop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow. Packets are marked with DiffServ Code Points (DSCPs) indicating the level of service desired.
  • Page 142: Phone

    Prestige 2602HW Series User’s Guide Figure 53 QoS The following table describes the labels in this screen. Table 35 QoS LABEL DESCRIPTION SIP TOS Priority Type a priority for voice transmissions. The Prestige applies Type of Service priority tags with this priority to voice traffic that it transmits. Priorities 6 and 7 are reserved for network control traffic.
  • Page 143: Voice Activity Detection/Silence Suppression

    10.6.1 Voice Activity Detection/Silence Suppression Voice Activity Detection (VAD) detects whether or not speech is present. This lets the Prestige reduce the bandwidth that a call uses by not transmitting “silent packets” when you are not speaking. 10.6.2 Comfort Noise Generation When using VAD, the Prestige generates and sends comfort noise when you are not speaking.
  • Page 144: Speed Dial

    Prestige 2602HW Series User’s Guide The following table describes the labels in this screen. Table 36 Phone LABEL Phone Port Settings Speaking Volume Listening Volume Outgoing Call use G.168 Active VAD Support Dialing Interval Back Apply Cancel 10.8 Speed Dial Speed dial provides shortcuts for dialing frequently used (VoIP) phone numbers.
  • Page 145: Speed Dial Configuration

    10.9 Speed Dial Configuration Click Voice in the navigation panel and then Speed Dial to display the following screen. Figure 55 Speed Dial The following table describes the labels in this screen. Table 37 Speed Dial LABEL DESCRIPTION Add New Entry Use this section of the screen to edit and save new or existing speed dial phone book entries.
  • Page 146: Lifeline (Prestige 2602Hw-L)

    Prestige 2602HW Series User’s Guide Table 37 Speed Dial (continued) LABEL DESCRIPTION Speed Dial Phone This section of the screen displays the currently saved speed dial entries. You can Book configure up to 10 entries and use them to make calls. Speed Dial This is the entry’s speed dial key combination.
  • Page 147: Common Phone Port Configuration

    Figure 56 Lifeline The following table describes the labels in this screen. Table 38 Lifeline LABEL DESCRIPTION PSTN Pre-fix Specify the prefix number for dialing regular calls when VoIP service is available. Number Relay to PSTN Use these fields to specify phone numbers to which the Prestige will always send calls through the regular phone service without the need of dialing a prefix number.
  • Page 148: Figure 57 Phone Port Common

    Prestige 2602HW Series User’s Guide Figure 57 Phone Port Common The following table describes the labels in this screen. Table 39 Phone Port Common LABEL Country Settings Immediate Dial Back Apply Cancel DESCRIPTION Use the drop-down list box to select the country where your Prestige is located. Use immediate dial to have the Prestige make calls right away instead of waiting for the dialing interval (the time period it waits to make sure you are done pressing the keys).
  • Page 149: Chapter 11 Dynamic Dns Setup

    This chapter discusses how to configure your Prestige to use Dynamic DNS. 11.1 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
  • Page 150: Figure 58 Dynamic Dns

    Prestige 2602HW Series User’s Guide Figure 58 Dynamic DNS The following table describes the fields in this screen. Table 40 Dynamic DNS LABEL DESCRIPTION Active Select this check box to use dynamic DNS. Service Provider This is the name of your Dynamic DNS service provider. Host Names Type the domain name assigned to your Prestige by your Dynamic DNS provider.
  • Page 151: Chapter 12 Time And Date

    Use this screen to configure the Prestige’s time and date settings. 12.1 Pre-defined NTP Time Servers List The Prestige uses the following pre-defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified. Note: The Prestige can use this pre-defined list of time servers regardless of the Time Protocol you select.
  • Page 152: Figure 59 Time And Date

    Prestige 2602HW Series User’s Guide Figure 59 Time and Date The following table describes the fields in this screen. Table 42 Time and Date LABEL DESCRIPTION Time Server Use Protocol when Select the time service protocol that your time server sends when you turn on the Bootup Prestige.
  • Page 153 Table 42 Time and Date (continued) LABEL DESCRIPTION Start Date Enter the month and day that your daylight-savings time starts on if you selected Daylight Savings. End Date Enter the month and day that your daylight-savings time ends on if you selected Daylight Savings.
  • Page 154 Prestige 2602HW Series User’s Guide Chapter 12 Time and Date...
  • Page 155: Chapter 13 Firewalls

    This chapter gives some background information on firewalls and introduces the Prestige firewall. 13.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term “firewall” is a system or group of systems that enforces an access-control policy between two networks.
  • Page 156: Stateful Inspection Firewalls

    Prestige 2602HW Series User’s Guide Information hiding prevents the names of internal systems from being made known via DNS to outside systems, since the application gateway is the only host whose name must be made known to outside systems. Robust authentication and logging pre-authenticates application traffic before it reaches internal hosts and causes it to be logged more effectively than if it were logged with standard host logging.
  • Page 157: Denial Of Service Attacks

    13.3.1 Denial of Service Attacks Figure 60 Prestige Firewall Application 13.4 Denial of Service Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources.
  • Page 158: Types Of Dos Attacks

    Prestige 2602HW Series User’s Guide Table 43 Common IP Ports 13.4.2 Types of DoS Attacks There are four types of DoS attacks: 1 Those that exploit bugs in a TCP/IP implementation. 2 Those that exploit weaknesses in the TCP/IP specification. 3 Brute-force attacks that flood a network with useless data.
  • Page 159: Figure 61 Three-Way Handshake

    Figure 61 Three-Way Handshake Under normal circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment).
  • Page 160: Icmp Vulnerability

    Prestige 2602HW Series User’s Guide amount of ICMP echo request and response traffic. If a hacker chooses to spoof the source IP address of the ICMP echo request packet, the resulting ICMP traffic will not only clog up the "intermediary" network, but will also congest the network of the spoofed source IP address, known as the "victim"...
  • Page 161: Traceroute

    Table 46 Legal SMTP Commands AUTH DATA EHLO QUIT RCPT RSET 13.4.2.3 Traceroute Traceroute is a utility used to determine the path a packet takes between two endpoints. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of the network topology inside the firewall.
  • Page 162: Stateful Inspection Process

    Prestige 2602HW Series User’s Guide Figure 64 Stateful Inspection The previous figure shows the Prestige’s default firewall rules in action as well as demonstrates how stateful inspection works. User A can initiate a Telnet session from within the LAN and responses to this request are allowed. However other Telnet traffic initiated from the WAN is blocked.
  • Page 163: Stateful Inspection And The Prestige

    temporary entries might be modified, in order to permit only packets that are valid for the current state of the connection. 8 Any additional inbound or outbound packets that belong to the connection are inspected to update the state table entry and to modify the temporary inbound access list entries as required, and are forwarded through the interface.
  • Page 164: Udp/Icmp Security

    Prestige 2602HW Series User’s Guide When the Prestige receives any subsequent packet (from the Internet or from the LAN), its connection information is extracted and checked against the cache. A packet is only allowed to pass through if it corresponds to a valid connection (that is, if it is a response to a connection which originated on the LAN).
  • Page 165: Security In General

    • Limit who can telnet into your router. • Don't enable any local service (such as SNMP or NTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network.
  • Page 166: Packet Filtering Vs Firewall

    Prestige 2602HW Series User’s Guide • Always shred confidential information, particularly about your computer, before throwing it away. Some hackers dig through the trash of companies or individuals for information that might help them in an attack. 13.7 Packet Filtering Vs Firewall Below are some comparisons between the Prestige’s filtering and firewall functions.
  • Page 167 • A range of source and destination IP addresses as well as port numbers can be specified within one firewall rule making the firewall a better choice when complex rules are required. • To selectively block/allow inbound or outbound traffic between inside host/networks and outside host/networks.
  • Page 168 Prestige 2602HW Series User’s Guide Chapter 13 Firewalls...
  • Page 169: Firewall Configuration

    This chapter shows you how to enable and configure the Prestige firewall. 14.1 Access Methods The web configurator is, by far, the most comprehensive firewall configuration tool your Prestige has to offer. For this reason, it is recommended that you configure your firewall using the web configurator.
  • Page 170: Rule Logic Overview

    Prestige 2602HW Series User’s Guide Note: If you configure firewall rules without a good understanding of how they work, you might inadvertently introduce security risks to the firewall and to the protected network. Make sure you test your rules after you configure them. For example, you may create rules to: •...
  • Page 171: Key Fields For Configuring Rules

    4 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may be able to connect to computers with running FTP servers. 5 Does this rule conflict with any existing rules? 6 Once these questions have been answered, adding rules is simply a matter of plugging the information into the correct fields in the web configurator screens.
  • Page 172: Lan To Wan Rules

    Prestige 2602HW Series User’s Guide 14.4.1 LAN to WAN Rules The default rule for LAN to WAN traffic is that all users on the LAN are allowed non- restricted access to the WAN. When you configure a LAN to WAN rule, you in essence want to limit some or all users from accessing certain services on the WAN.
  • Page 173: Alerts

    14.4.3 Alerts Alerts are reports on events, such as attacks, that you may want to know about right away. You can choose to generate an alert when an attack is detected in the Edit Rule screen (select the Send Alert Message to Administrator When Matched check box) or when a rule is matched in the Edit Rule screen (see message can be immediately sent to an e-mail account that you specify in the Log Settings screen (see the chapter on logs).
  • Page 174: Rule Summary

    Prestige 2602HW Series User’s Guide Table 47 Firewall: Default Policy (continued) LABEL DESCRIPTION Default Action Use the radio buttons to select whether to Block (silently discard) or Forward (allow the passage of) packets that are traveling in the selected direction. Select the check box to create a log (when the above action is taken) for packets that are traveling in the selected direction and do not match any of the rules below.
  • Page 175: Figure 68 Firewall: Rule Summary

    Figure 68 Firewall: Rule Summary Table 48 Rule Summary LABEL DESCRIPTION Firewall Rules This read-only bar shows how much of the Prestige's memory for recording firewall Storage Space rules it is currently using. When you are using 80% or less of the storage space, the in Use bar is green.
  • Page 176: Configuring Firewall Rules

    Prestige 2602HW Series User’s Guide Table 48 Rule Summary (continued) LABEL DESCRIPTION Schedule This field tells you whether a schedule is specified (Yes) or not (No). This field shows you whether a log is created when packets match this rule (Enabled) or not (Disable).
  • Page 177: Figure 69 Firewall: Edit Rule

    Prestige 2602HW Series User’s Guide Figure 69 Firewall: Edit Rule The following table describes the labels in this screen. Chapter 14 Firewall Configuration...
  • Page 178: Table 49 Firewall: Edit Rule

    Prestige 2602HW Series User’s Guide Table 49 Firewall: Edit Rule LABEL Active Action for Matched Packet Source/Destination Address Address Type Start IP Address End IP Address Subnet Mask Edit Delete Services Available/ Selected Services Edit Customized Services Schedule Day to Apply Time of Day to Apply (24-Hour Format)
  • Page 179: Customized Services

    14.7 Customized Services Configure customized services and port numbers not predefined by the Prestige. For a comprehensive list of port numbers and services, visit the IANA (Internet Assigned Number Authority) website. For further information on these services, please read page 184.
  • Page 180: Example Firewall Rule

    Prestige 2602HW Series User’s Guide Figure 71 Firewall: Configure Customized Services The following table describes the labels in this screen. Table 51 Firewall: Configure Customized Services LABEL DESCRIPTION Service Name Type a unique name for your custom port. Service Type Choose the IP port (TCP, UDP or TCP/UDP) that defines your customized port from the drop down list box.
  • Page 181: Figure 72 Firewall Example: Rule Summary

    Figure 72 Firewall Example: Rule Summary 3 In the Rule Summary screen, type the index number for where you want to put the rule. For example, if you type “6”, your new rule becomes number 6 and the previous rule 6 (if there is one) becomes rule 7.
  • Page 182: Figure 73 Firewall Example: Edit Rule: Destination Address

    Prestige 2602HW Series User’s Guide Figure 73 Firewall Example: Edit Rule: Destination Address 7 In the Edit Rule screen, click the Edit Customized Services link to open the Customized Services screen. 8 Click the number of a customized service to open the configuration screen. Configure it as follows and click Apply.
  • Page 183: Figure 75 Firewall Example: Edit Rule: Select Customized Services

    Figure 75 Firewall Example: Edit Rule: Select Customized Services Note: Custom ports show up with an “*” before their names in the Services list box and the Rule Summary list box. Click Apply after you’ve created your custom port. On completing the configuration procedure for this Internet firewall rule, the Rule Summary screen should look like the following.
  • Page 184: Predefined Services

    Prestige 2602HW Series User’s Guide Figure 76 Firewall Example: Rule Summary: My Service 14.10 Predefined Services The Available Services list box in the Edit Rule screen (see displays all predefined services that the Prestige already supports. Next to the name of the service, two fields appear in brackets.
  • Page 185 Table 52 Predefined Services (continued) SERVICE HTTP(TCP:80) HTTPS ICQ(UDP:4000) IPSEC_TRANSPORT/ TUNNEL(AH:0) IPSEC_TUNNEL(ESP:0) IRC(TCP/UDP:6667) MSN Messenger(TCP:1863) MULTICAST(IGMP:0) NEWS(TCP:144) NFS(UDP:2049) NNTP(TCP:119) PING(ICMP:0) POP3(TCP:110) PPTP(TCP:1723) PPTP_TUNNEL(GRE:0) RCMD(TCP:512) REAL_AUDIO(TCP:7070) REXEC(TCP:514) RLOGIN(TCP:513) RTELNET(TCP:107) RTSP(TCP/UDP:554) SFTP(TCP:115) SMTP(TCP:25) SNMP(TCP/UDP:161) SNMP-TRAPS (TCP/ UDP:162) SQL-NET(TCP:1521) SSDP(UDP:1900) Chapter 14 Firewall Configuration Prestige 2602HW Series User’s Guide DESCRIPTION Hyper Text Transfer Protocol - a client/server protocol for the world...
  • Page 186: Anti-Probing

    Prestige 2602HW Series User’s Guide Table 52 Predefined Services (continued) SERVICE SSH(TCP/UDP:22) STRMWORKS(UDP:1558) SYSLOG(UDP:514) TACACS(UDP:49) TELNET(TCP:23) TFTP(UDP:69) VDOLIVE(TCP:7000) 14.11 Anti-Probing If an outside user attempts to probe an unsupported port on your Prestige, an ICMP response packet is automatically returned. This allows the outside user to know the Prestige exists. The Prestige supports anti-probing, which prevents the ICMP response packet from being sent.
  • Page 187: Dos Thresholds

    Figure 77 Firewall: Anti Probing The following table describes the labels in this screen. Table 53 Firewall: Anti Probing LABEL DESCRIPTION Respond to PING The Prestige does not respond to any incoming Ping requests when Disable is selected. Select LAN to reply to incoming LAN Ping requests. Select WAN to reply to incoming WAN Ping requests.
  • Page 188: Threshold Values

    Prestige 2602HW Series User’s Guide 14.12.1 Threshold Values Tune these parameters when something is not working and after you have checked the firewall counters. These default values should work fine for most small offices. Factors influencing choices for threshold values are: •...
  • Page 189: Figure 78 Firewall: Threshold

    Whenever the number of half-open sessions with the same destination host address rises above a threshold (TCP Maximum Incomplete), the Prestige starts deleting half-open sessions according to one of the following methods: • If the Blocking Time timeout is 0 (the default), then the Prestige deletes the oldest existing half-open session for the host for every new connection request to the host.
  • Page 190 Prestige 2602HW Series User’s Guide Table 54 Firewall: Threshold (continued) LABEL DESCRIPTION One Minute High This is the rate of new half-open sessions that causes the firewall to start deleting half-open sessions. When the rate of new connection attempts rises above this number, the Prestige deletes half-open sessions as required to accommodate new connection attempts.
  • Page 191: Chapter 15 Content Filtering

    This chapter covers how to configure content filtering. 15.1 Content Filtering Overview Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering gives you the ability to block web sites that contain key words (that you specify) in the URL.
  • Page 192: Configuring The Schedule

    Prestige 2602HW Series User’s Guide Figure 79 Content Filter: Keyword The following table describes the labels in this screen. Table 55 Content Filter: Keyword LABEL Enable Keyword Blocking Block Websites that contain these keywords in the URL: Delete Clear All Keyword Add Keyword Back...
  • Page 193: Configuring Trusted Computers

    Figure 80 Content Filter: Schedule The following table describes the labels in this screen. Table 56 Content Filter: Schedule LABEL DESCRIPTION Days to Block: Select a check box to configure which days of the week (or everyday) you want the content filtering to be active.
  • Page 194: Figure 81 Content Filter: Trusted

    Prestige 2602HW Series User’s Guide Figure 81 Content Filter: Trusted The following table describes the labels in this screen. Table 57 Content Filter: Trusted LABEL Trusted User IP Range From Back Apply Cancel DESCRIPTION Type the IP address of a computer (or the beginning IP address of a specific range of computers) on the LAN that you want to exclude from content filtering.
  • Page 195: Chapter 16 Introduction To Ipsec

    This chapter introduces the basics of IPSec VPNs. 16.1 VPN Overview A VPN (Virtual Private Network) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing technologies/services used to transport traffic over the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
  • Page 196: Data Confidentiality

    Prestige 2602HW Series User’s Guide Figure 82 Encryption and Decryption 16.1.3.2 Data Confidentiality The IPSec sender can encrypt packets before transmitting them across a network. 16.1.3.3 Data Integrity The IPSec receiver can validate packets sent by the IPSec sender to ensure that the data has not been altered during transmission.
  • Page 197: Ipsec Architecture

    16.2 IPSec Architecture The overall IPSec architecture is shown as follows. Figure 83 IPSec Architecture 16.2.1 IPSec Algorithms The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header) protocol (RFC 2402) describe the packet formats and the default standards for packet structure (including implementation algorithms).
  • Page 198: Transport Mode

    Prestige 2602HW Series User’s Guide Figure 84 Transport and Tunnel Mode IPSec Encapsulation 16.3.1 Transport Mode Transport mode is used to protect upper layer protocols and only affects the data in the IP packet. In Transport mode, the IP packet contains the security protocol (AH or ESP) located after the original IP header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP).
  • Page 199: Table 58 Vpn And Nat

    NAT is incompatible with the AH protocol in both Transport and Tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet. When using AH protocol, packet contents (the data payload) are not encrypted.
  • Page 200 Prestige 2602HW Series User’s Guide Chapter 16 Introduction to IPSec...
  • Page 201: Chapter 17 Vpn Screens

    This chapter introduces the VPN screens. See the chapter on logs for information on viewing logs and the appendix on logs for IPSec log descriptions. 17.1 VPN/IPSec Overview Use the screens documented in this chapter to configure rules for VPN connections and manage VPN connections.
  • Page 202: Esp (Encapsulating Security Payload) Protocol

    Prestige 2602HW Series User’s Guide 17.2.2 ESP (Encapsulating Security Payload) Protocol The ESP protocol (RFC 2406) provides encryption as well as the services offered by AH. ESP authenticating properties are limited compared to the AH due to the non-inclusion of the IP header information during the authentication process.
  • Page 203: Secure Gateway Address

    • If the WAN connection goes down, the Prestige uses the dial backup IP address for the VPN tunnel when using dial backup or the LAN IP address when using traffic redirect. See the chapter on WAN for details on dial backup and traffic redirect. 17.4 Secure Gateway Address Secure Gateway Address is the WAN IP address or domain name of the remote IPSec router (secure gateway).
  • Page 204: Figure 86 Vpn Summary

    Prestige 2602HW Series User’s Guide Click VPN and Setup to open the VPN Summary screen. This is a read-only menu of your IPSec rules (tunnels). The IPSec summary menu is read-only. Edit a VPN by selecting an index number and then configuring its associated submenus. Figure 86 VPN Summary The following table describes the fields in this screen.
  • Page 205: Keep Alive

    Table 60 VPN Summary (continued) LABEL DESCRIPTION Remote This is the IP address(es) of computer(s) on the remote network behind the remote Address IPSec router. This field displays N/A when the Secure Gateway Address field displays 0.0.0.0. In this case only the remote IPSec router can initiate the VPN. The same (static) IP address is displayed twice when the Remote Address Type field in the VPN-IKE (or VPN-Manual Key) screen is configured to Single.
  • Page 206: Nat Traversal

    Prestige 2602HW Series User’s Guide The following figure depicts an example where three VPN tunnels are created from Prestige A; one to branch office 2, one to branch office 3 and another to headquarters. In order to access computers that use private domain names on the headquarters (HQ) network, the Prestige at branch office 1 uses the Intranet DNS server in headquarters.
  • Page 207: Nat Traversal Configuration

    17.8.1 NAT Traversal Configuration For NAT traversal to work you must: • Use ESP security protocol (in either transport or tunnel mode). • Use IKE keying mode. • Enable NAT traversal on both IPSec endpoints. In order for IPSec router A (see from IPSec router B, set the NAT router to forward UDP port 500 to IPSec router A.
  • Page 208: Id Type And Content Examples

    Prestige 2602HW Series User’s Guide Table 61 Local ID Type and Content Fields LOCAL ID TYPE= CONTENT= Type the IP address of your computer or leave the field blank to have the Prestige automatically use its own IP address. Type a domain name (up to 31 characters) by which to identify this Prestige. E-mail Type an e-mail address (up to 31 characters) by which to identify this Prestige.
  • Page 209: Pre-Shared Key

    The two Prestiges in this example cannot complete their negotiation because Prestige B’s Local ID type is IP, but Prestige A’s Peer ID type is set to E-mail. An “ID mismatched” message displays in the IPSEC LOG. Table 64 Mismatching ID Type and Content Configuration Example PRESTIGE A Local ID type: IP Local ID content: 1.1.1.10...
  • Page 210: Figure 89 Vpn Ike

    Prestige 2602HW Series User’s Guide Figure 89 VPN IKE The following table describes the fields in this screen. Chapter 17 VPN Screens...
  • Page 211: Table 65 Vpn Ike

    Table 65 VPN IKE LABEL DESCRIPTION IPSec Setup Active Select this check box to activate this VPN policy. This option determines whether a VPN rule is applied before a packet leaves the firewall. Keep Alive Select either Yes or No from the drop-down list box. Select Yes to have the Prestige automatically reinitiate the SA after the SA lifetime times out, even if there is no traffic.
  • Page 212 Prestige 2602HW Series User’s Guide Table 65 VPN IKE (continued) LABEL DESCRIPTION IP Address Start When the Local Address Type field is configured to Single, enter a (static) IP address on the LAN behind your Prestige. When the Local Address Type field is configured to Range, enter the beginning (static) IP address, in a range of computers on your LAN behind your Prestige.
  • Page 213 Table 65 VPN IKE (continued) LABEL DESCRIPTION My IP Address Enter the WAN IP address of your Prestige. The VPN tunnel has to be rebuilt if this IP address changes. The following applies if this field is configured as 0.0.0.0: The Prestige uses the current Prestige WAN IP address (static or dynamic) to set up the VPN tunnel.
  • Page 214: Ike Phases

    Prestige 2602HW Series User’s Guide Table 65 VPN IKE (continued) LABEL DESCRIPTION Pre-Shared Key Type your pre-shared key in this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection.
  • Page 215: Figure 90 Two Phases To Set Up The Ipsec Sa

    Figure 90 Two Phases to Set Up the IPSec SA In phase 1 you must: • Choose a negotiation mode. • Authenticate the connection by entering a pre-shared key. • Choose an encryption algorithm. • Choose an authentication algorithm. • Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2). •...
  • Page 216: Negotiation Mode

    Prestige 2602HW Series User’s Guide 17.12.1 Negotiation Mode The phase 1 Negotiation Mode you select determines how the Security Association (SA) will be established for each connection through IKE negotiations. • Main Mode ensures the highest level of security when the communicating parties are negotiating authentication (phase 1).
  • Page 217: Figure 91 Vpn Ike: Advanced Setup

    Figure 91 VPN IKE: Advanced Setup The following table describes the fields in this screen. Table 66 VPN IKE: Advanced Setup LABEL DESCRIPTION VPN - IKE Protocol Enter 1 for ICMP, 6 for TCP, 17 for UDP, etc. 0 is the default and signifies any protocol.
  • Page 218 Prestige 2602HW Series User’s Guide Table 66 VPN IKE: Advanced Setup (continued) LABEL DESCRIPTION Remote Start Port 0 is the default and signifies any port. Type a port number from 0 to 65535. Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, HTTP; 25, SMTP;...
  • Page 219: Manual Key Setup

    Table 66 VPN IKE: Advanced Setup (continued) LABEL DESCRIPTION Encryption This field is available when you select ESP in the Active Protocol field. Algorithm Select DES, 3DES, AES or NULL from the drop-down list box. When you use one of these encryption algorithms for data communications, both the sending device and the receiving device must use the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code.
  • Page 220: Configuring Manual Key

    Prestige 2602HW Series User’s Guide 17.15 Configuring Manual Key You only configure VPN Manual Key when you select Manual in the IPSec Key Mode field on the VPN IKE screen. This is the VPN Manual Key screen as shown next. Figure 92 VPN: Manual Key The following table describes the fields in this screen.
  • Page 221: Table 67 Vpn: Manual Key

    Table 67 VPN: Manual Key LABEL DESCRIPTION IPSec Setup Active Select this check box to activate this VPN policy. Name Type up to 32 characters to identify this VPN policy. You may use any character, including spaces, but the Prestige drops trailing spaces. IPSec Key Mode Select IKE or Manual from the drop-down list box.
  • Page 222 Prestige 2602HW Series User’s Guide Table 67 VPN: Manual Key (continued) LABEL DESCRIPTION End / Subnet Mask When the Remote Address Type field is configured to Single, this field is N/A. When the Remote Address Type field is configured to Range, enter the end (static) IP address, in a range of computers on the network behind the remote IPSec router.
  • Page 223: Viewing Sa Monitor

    17.16 Viewing SA Monitor Click VPN and Monitor to open the SA Monitor screen as shown. Use this screen to display and manage active VPN connections. A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This screen displays active VPN connections.
  • Page 224: Figure 93 Vpn: Sa Monitor

    Prestige 2602HW Series User’s Guide Figure 93 VPN: SA Monitor The following table describes the fields in this screen. Table 68 VPN: SA Monitor LABEL DESCRIPTION This is the security association index number. Name This field displays the identification name for this VPN policy. Encapsulation This field displays Tunnel or Transport mode.
  • Page 225: Configuring Global Setting

    17.17 Configuring Global Setting To change your Prestige’s global settings, click VPN and then Global Setting. The screen appears as shown. Figure 94 VPN: Global Setting The following table describes the fields in this screen. Table 69 VPN: Global Setting LABEL Windows Networking (NetBIOS over TCP/IP)
  • Page 226: Telecommuters Using Unique Vpn Rules Example

    Prestige 2602HW Series User’s Guide Figure 95 Telecommuters Sharing One VPN Rule Example Table 70 Telecommuters Sharing One VPN Rule Example FIELDS TELECOMMUTERS My IP Address: 0.0.0.0 (dynamic IP address assigned by the ISP) Secure Gateway IP Public static IP address Address: Local IP Address: Telecommuter A: 192.168.2.12...
  • Page 227: Figure 96 Telecommuters Using Unique Vpn Rules Example

    Figure 96 Telecommuters Using Unique VPN Rules Example Table 71 Telecommuters Using Unique VPN Rules Example TELECOMMUTERS All Telecommuter Rules: My IP Address 0.0.0.0 Secure Gateway Address: bigcompanyhq.com Remote IP Address: 192.168.1.10 Peer ID Type: E-mail Peer ID Content: bob@bigcompanyhq.com Telecommuter A (telecommutera.dydns.org) Local ID Type: IP Local ID Content: 192.168.2.12...
  • Page 228: Vpn And Remote Management

    Prestige 2602HW Series User’s Guide 17.19 VPN and Remote Management If a VPN tunnel uses Telnet, FTP, WWW, then you should configure remote management (Remote Management) to allow access for that service. Chapter 17 VPN Screens...
  • Page 229: Remote Management Configuration

    This chapter provides information on configuring remote management. 18.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which Prestige interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
  • Page 230: Remote Management And Nat

    Prestige 2602HW Series User’s Guide • A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service. • You have disabled that service in one of the remote management screens. •...
  • Page 231: Web

    18.4 Web You can use the Prestige’s embedded web configurator for configuration and file management. See the online help for details. 18.5 Configuring Remote Management Click Remote Management to open the following screen. Figure 98 Remote Management The following table describes the fields in this screen. Table 72 Remote Management LABEL DESCRIPTION...
  • Page 232 Prestige 2602HW Series User’s Guide Chapter 18 Remote Management Configuration...
  • Page 233: Universal Plug-And-Play (Upnp)

    Universal Plug-and-Play (UPnP) This chapter introduces the UPnP feature in the web configurator. 19.1 Introducing Universal Plug and Play Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 234: Upnp And Zyxel

    Prestige 2602HW Series User’s Guide All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention. 19.2 UPnP and ZyXEL ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum Creates UPnP™...
  • Page 235: Installing Upnp In Windows Example

    Table 73 Configuring UPnP LABEL Enable the Universal Plug and Play (UPnP) Service Allow users to make configuration changes through UPnP Allow UPnP to pass through Firewall Apply Cancel 19.3 Installing UPnP in Windows Example This section shows how to install UPnP in Windows Me and Windows XP. Installing UPnP in Windows Me Follow the steps below to install the UPnP in Windows Me.
  • Page 236: Figure 100 Add/Remove Programs: Windows Setup: Communication

    Prestige 2602HW Series User’s Guide Figure 100 Add/Remove Programs: Windows Setup: Communication 3 In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 101 Add/Remove Programs: Windows Setup: Communication: Components 4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted.
  • Page 237: Figure 102 Network Connections

    Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start and Control Panel. 2 Double-click Network Connections. 3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ….
  • Page 238: Figure 103 Windows Optional Networking Components Wizard

    Prestige 2602HW Series User’s Guide Figure 103 Windows Optional Networking Components Wizard 5 In the Networking Services window, select the Universal Plug and Play check box. Chapter 19 Universal Plug-and-Play (UPnP)
  • Page 239: Using Upnp In Windows Xp Example

    Figure 104 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 19.4 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the Prestige.
  • Page 240: Figure 105 Network Connections

    Prestige 2602HW Series User’s Guide Figure 105 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Chapter 19 Universal Plug-and-Play (UPnP)
  • Page 241: Figure 106 Internet Connection Properties

    Prestige 2602HW Series User’s Guide Figure 106 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings. Chapter 19 Universal Plug-and-Play (UPnP)
  • Page 242: Figure 107 Internet Connection Properties: Advanced Settings

    Prestige 2602HW Series User’s Guide Figure 107 Internet Connection Properties: Advanced Settings Figure 108 Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
  • Page 243: Figure 109 System Tray Icon

    Figure 109 System Tray Icon 7 Double-click on the icon to display your current Internet connection status. Figure 110 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the Prestige without finding out the IP address of the Prestige first.
  • Page 244: Figure 111 Network Connections

    Prestige 2602HW Series User’s Guide Figure 111 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your Prestige and select Invoke. The web configurator login screen displays. Chapter 19 Universal Plug-and-Play (UPnP)
  • Page 245: Figure 112 Network Connections: My Network Places

    Prestige 2602HW Series User’s Guide Figure 112 Network Connections: My Network Places 6 Right-click on the icon for your Prestige and select Properties. A properties window displays with basic information about the Prestige. Figure 113 Network Connections: My Network Places: Properties: Example Chapter 19 Universal Plug-and-Play (UPnP)
  • Page 246 Prestige 2602HW Series User’s Guide Chapter 19 Universal Plug-and-Play (UPnP)
  • Page 247: Chapter 20 Logs Screens

    This chapter contains information about configuring general log settings and viewing the Prestige’s logs. Refer to the appendix for example log message explanations. 20.1 Logs Overview The web configurator allows you to choose which categories of events and/or alerts to have the Prestige log and then display the logs or have the Prestige send them to an administrator (as e-mail) or to a syslog server.
  • Page 248: Figure 114 Log Settings

    Prestige 2602HW Series User’s Guide Figure 114 Log Settings Chapter 20 Logs Screens...
  • Page 249: Table 74 Log Settings

    The following table describes the fields in this screen. Table 74 Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e-mail.
  • Page 250: Displaying The Logs

    Prestige 2602HW Series User’s Guide 20.3 Displaying the Logs Click Logs and then View Log to open the View Logs screen. Use the View Logs screen to see the logs for the categories that you selected in the Log Settings screen (see page 247).
  • Page 251: Example E-Mail Log

    E-mail error messages appear in SMT menu 24.3.1 as "SMTP action request failed. ret= ??". The “??"are described in the following table. Table 76 SMTP Error Messages -1 means Prestige out of socket -2 means tcp SYN fail -3 means smtp server OK fail -4 means HELO fail -5 means MAIL FROM fail -6 means RCPT TO fail...
  • Page 252: Figure 116 E-Mail Log Example

    Prestige 2602HW Series User’s Guide Figure 116 E-mail Log Example Subject: Firewall Alert From Prestige Date: Fri, 07 Apr 2000 10:05:42 From: user@zyxel.com user@zyxel.com 1|Apr 7 00 |From:192.168.1.1 |forward | 09:54:03 |UDP 2|Apr 7 00 |From:192.168.1.131 |forward | 09:54:17 |UDP 3|Apr 7 00 |From:192.168.1.6 | 09:54:19 |UDP...
  • Page 253: Chapter 21 Maintenance

    This chapter displays system information such as ZyNOS firmware, port IP addresses and port traffic statistics. 21.1 Maintenance Overview The maintenance screens can help you view system information, upload new firmware, manage configuration and restart your Prestige. 21.2 System Status Screen Click System Status to open the following screen, where you can use to monitor your Prestige.
  • Page 254: Figure 117 System Status

    Prestige 2602HW Series User’s Guide Figure 117 System Status Chapter 21 Maintenance...
  • Page 255: Table 77 System Status

    The following table describes the fields in this screen. Table 77 System Status LABEL DESCRIPTION System Status System Name This is the name of your Prestige. It is for identification purposes. ZyNOS Firmware This is the ZyNOS firmware version and the date created. ZyNOS is ZyXEL's Version proprietary Network Operating System design.
  • Page 256: System Statistics

    Prestige 2602HW Series User’s Guide 21.2.1 System Statistics Click Show Statistics in the System Status screen to open the following screen. Read-only information here includes port status and packet specific statistics. Also provided are "system up time" and "poll interval(s)". The Poll Interval(s) field is configurable. Figure 118 System Status: Show Statistics The following table describes the fields in this screen.
  • Page 257: Dhcp Table Screen

    Table 78 System Status: Show Statistics (continued) LABEL DESCRIPTION Status For the WAN port, this displays the port speed and duplex setting if you're using Ethernet encapsulation and down (line is down), idle (line (ppp) idle), dial (starting to trigger a call) and drop (dropping a call) if you're using PPPoE encapsulation.
  • Page 258: Any Ip Table Screen

    Prestige 2602HW Series User’s Guide Figure 119 DHCP Table The following table describes the fields in this screen. Table 79 DHCP Table LABEL DESCRIPTION Host Name This is the name of the host computer. IP Address This field displays the IP address relative to the Host Name field. MAC Address This field displays the MAC (Media Access Control) address of the computer with the displayed host name.
  • Page 259: Wireless Screen

    Table 80 Any IP Table LABEL DESCRIPTION MAC Address This field displays the MAC (Media Access Control) address of the computer with the displayed IP address. Every Ethernet device has a unique MAC address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
  • Page 260: Diagnostic Screens

    Prestige 2602HW Series User’s Guide 21.6 Diagnostic Screens These read-only screens display information to help you identify problems with the Prestige. 21.6.1 Diagnostic General Screen Click Diagnostic and then General to open the screen shown next. Figure 122 Diagnostic: General The following table describes the fields in this screen.
  • Page 261: Figure 123 Diagnostic: Dsl Line

    Figure 123 Diagnostic: DSL Line The following table describes the fields in this screen. Table 83 Diagnostic: DSL Line LABEL Reset ADSL Click this button to reinitialize the ADSL line. The large text box above then displays Line the progress and results of this operation, for example: "Start to reset ADSL Loading ADSL modem F/W...
  • Page 262: Firmware Screen

    Prestige 2602HW Series User’s Guide 21.7 Firmware Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a "*.bin" extension, e.g., "Prestige.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. Chapter 37 on page 365 Only use firmware for your device’s specific model.
  • Page 263: Figure 125 Network Temporarily Disconnected

    Prestige 2602HW Series User’s Guide The Prestige automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 125 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen.
  • Page 264 Prestige 2602HW Series User’s Guide Chapter 21 Maintenance...
  • Page 265: Chapter 22 Introducing The Smt

    This chapter explains how to access and navigate the System Management Terminal and gives an overview of its menus. 22.1 Introduction to the SMT The Prestige’s SMT (System Management Terminal) is a menu-driven interface that you can access from a terminal emulator through the console port or over a telnet connection. This chapter shows you how to access the SMT menus via console port, how to navigate the SMT and how to configure SMT menus.
  • Page 266: Entering The Password

    Prestige 2602HW Series User’s Guide Figure 127 Initial Screen Copyright (c) 1994 - 2004 ZyXEL Communications Corp. initialize ch =0, ethernet address: 00:A0:C5:7A:86:D5 initialize ch =1, ethernet address: 00:A0:C5:7A:86:D6 initialize ch =2, ethernet address: 00:A0:C5:7A:86:D7 initialize ch =3, ethernet address: 00:00:00:00:00:00 AUX port init .
  • Page 267: Entering Password

    22.2.4 Entering Password The login screen appears after you press [ENTER], prompting you to enter the password, as shown next. For your first login, enter the default password " displays an asterisk " Please note that if there is no activity for longer than five minutes after you log in, your Prestige will automatically log you out.
  • Page 268: System Management Terminal Interface Summary

    Exit the SMT After you enter the password, the SMT displays the main menu, as shown next. Table 86 SMT Main Menu Copyright (c) 1994 - 2004 ZyXEL Communications Corp. Prestige 2602HW-61 Main Menu Getting Started 1. General Setup 2.
  • Page 269: Smt Menus Overview

    Table 87 Main Menu Summary MENU TITLE System Maintenance IP Routing Policy Setup Schedule Setup VPN/IPSec Setup Exit 22.3.2 SMT Menus Overview The following table gives you an overview of your Prestige’s various SMT menus. Table 88 SMT Menus Overview MENUS 1 General Setup 2 WAN Backup...
  • Page 270: Changing The System Password

    Prestige 2602HW Series User’s Guide Table 88 SMT Menus Overview (continued) MENUS 21 Filter and Firewall Rule Setup 22 SNMP Configuration 23 System Security 24 System Maintenance 25 IP Routing Policy Setup 26 Schedule Setup 27 VPN/IPSec Setup 27.1 IPSec Summary 22.4 Changing the System Password Change the Prestige default password by following the steps shown next.
  • Page 271: Figure 130 Menu 23.1 Change Password

    1 Enter 23 in the main menu to display Menu 23 - System Security. 2 Enter 1 to display Menu 23.1 - System Security - Change Password as shown next. 3 Type your existing system password in the Old Password field, for example “ press [ENTER].
  • Page 272 Prestige 2602HW Series User’s Guide Chapter 22 Introducing the SMT...
  • Page 273: Chapter 23 Menu 1 General Setup

    Menu 1 - General Setup contains administrative and system-related information. 23.1 General Setup Menu 1 — General Setup contains administrative and system-related information (shown next). The System Name field is for identification purposes. However, because some ISPs check this name you should enter your computer's "Computer Name". •...
  • Page 274: Procedure To Configure Dynamic Dns

    Prestige 2602HW Series User’s Guide Figure 131 Menu 1 General Setup Press ENTER to Confirm or ESC to Cancel: Fill in the required fields. Refer to the table shown next for more information about these fields. Table 89 Menu 1 General Setup FIELD System Name Location (optional)
  • Page 275: Figure 132 Menu 1.1 Configure Dynamic Dns

    Figure 132 Menu 1.1 Configure Dynamic DNS Follow the instructions in the next table to configure dynamic DNS parameters. Table 90 Menu 1.1 Configure Dynamic DNS FIELD DESCRIPTION Service Provider This is the name of your dynamic DNS service provider. Active Press [SPACE BAR] to select Yes and then press [ENTER] to make dynamic DNS active.
  • Page 276 Prestige 2602HW Series User’s Guide Chapter 23 Menu 1 General Setup...
  • Page 277: Chapter 24 Menu 2 Wan Backup Setup

    Menu 2 WAN Backup Setup This chapter describes how to configure traffic redirect and dial-backup using menu 2 and 2.1. 24.1 Introduction to WAN Backup Setup This chapter explains how to configure the Prestige for traffic redirect connections. 24.2 Configuring WAN Backup in Menu 2 From the main menu, enter 2 to open menu 2.
  • Page 278: Traffic Redirect Setup

    Prestige 2602HW Series User’s Guide Table 91 Menu 2 WAN Backup Setup (continued) FIELD KeepAlive Fail Tolerance Recovery Interval(sec) When the Prestige is using a lower priority connection (usually a WAN backup ICMP Timeout Traffic Redirect When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 24.2.1 Traffic Redirect Setup Configure parameters that determine when the Prestige will forward WAN traffic to the...
  • Page 279 Table 92 Menu 2.1Traffic Redirect Setup FIELD DESCRIPTION Metric This field sets this route's priority among the routes the Prestige uses. The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1"...
  • Page 280 Prestige 2602HW Series User’s Guide Chapter 24 Menu 2 WAN Backup Setup...
  • Page 281: Chapter 25 Menu 3 Lan Setup

    This chapter covers how to configure your wired Local Area Network (LAN) settings. 25.1 LAN Setup This section describes how to configure the Ethernet using Menu 3 — LAN Setup. From the main menu, enter 3 to display menu 3. Figure 135 Menu 3 LAN Setup Menu 3 - LAN Setup 1.
  • Page 282: Tcp/Ip Ethernet Setup And Dhcp

    Prestige 2602HW Series User’s Guide • For TCP/IP Ethernet setup refer to • For bridging Ethernet setup refer to 25.3 TCP/IP Ethernet Setup and DHCP Use menu 3.2 to configure your Prestige for TCP/IP. To edit menu 3.2, enter 3 from the main menu to display Menu 3 — LAN Setup. When menu 3 appears, press 2 and press [ENTER] to display Menu 3.2 —...
  • Page 283: Table 94 Tcp/Ip Ethernet Setup

    Table 93 DHCP Ethernet Setup (continued) FIELD Size of Client IP Pool Primary DNS Server Secondary DNS Server Remote DHCP Serve Follow the instructions in the following table to configure TCP/IP parameters for the Ethernet port. Table 94 TCP/IP Ethernet Setup FIELD DESCRIPTION TCP/IP Setup...
  • Page 284 Prestige 2602HW Series User’s Guide Chapter 25 Menu 3 LAN Setup...
  • Page 285: Chapter 26 Wireless Lan Setup

    This chapter covers how to configure wireless LAN settings in SMT menu 3.5. 26.1 Wireless LAN Overview Refer to the chapter on the wireless LAN screens for wireless LAN background information. 26.2 Wireless LAN Setup Use menu 3.5 to set up your Prestige as the wireless access point. To edit menu 3.5, enter 3 from the main menu to display Menu 3 –...
  • Page 286: Wireless Lan Mac Address Filter

    Prestige 2602HW Series User’s Guide Table 95 Menu 3.5 - Wireless LAN Setup (continued) FIELD DESCRIPTION Channel ID Press [SPACE BAR] to select a channel. This allows you to set the operating frequency/ channel depending on your particular region. RTS (Request To Send) threshold (number of bytes) enables RTS/CTS handshake. Threshold Data with its frame size larger than this value will perform the RTS/CTS handshake.
  • Page 287: Figure 139 Menu 3.5.1 Wlan Mac Address Filtering

    Figure 139 Menu 3.5.1 WLAN MAC Address Filtering -------------------------------------------------------------------------- 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 00:00:00:00:00:00 -------------------------------------------------------------------------- The following table describes the fields in this menu. Table 96 Menu 3.5.1 WLAN MAC Address Filtering FIELD DESCRIPTION Active To enable MAC address filtering, press [SPACE BAR] to select Yes and press...
  • Page 288 Prestige 2602HW Series User’s Guide Chapter 26 Wireless LAN Setup...
  • Page 289: Chapter 27 Internet Access

    This chapter shows you how to configure the LAN and WAN of your Prestige for Internet access 27.1 Internet Access Overview Refer to the chapters on the web configurator’s wizard, LAN and WAN screens for more background information on fields in the SMT screens covered in this chapter. 27.2 IP Policies Traditionally, routing is based on the destination address only and the router takes the shortest path to forward a packet.
  • Page 290: Ip Alias Setup

    Prestige 2602HW Series User’s Guide Figure 140 IP Alias Network Example Use menu 3.2.1 to configure IP Alias on your Prestige. 27.4 IP Alias Setup Use menu 3.2 to configure the first network. Move the cursor to Edit IP Alias field and press [SPACEBAR] to choose Yes and press [ENTER] to configure the second and third network.
  • Page 291: Route Ip Setup

    Figure 142 Menu 3.2.1 IP Alias Setup Menu 3.2.1 - IP Alias Setup IP Alias 1= No IP Alias 2= No Follow the instructions in the following table to configure IP Alias parameters. Table 97 Menu 3.2.1 IP Alias Setup FIELD DESCRIPTION IP Alias...
  • Page 292: Internet Access Configuration

    Prestige 2602HW Series User’s Guide Figure 143 Menu 1 General Setup Menu 1 - General Setup Press ENTER to Confirm or ESC to Cancel: 27.6 Internet Access Configuration Menu 4 allows you to enter the Internet Access information in one screen. Menu 4 is actually a simplified setup for one of the remote nodes that you can access in menu 11.
  • Page 293: Table 98 Menu 4 Internet Access Setup

    Table 98 Menu 4 Internet Access Setup FIELD DESCRIPTION ISP’s Name Enter the name of your Internet Service Provider (ISP). This information is for identification purposes only. Encapsulation Press [ Choices are PPPoE, PPPoA, RFC 1483 or ENET ENCAP. Multiplexing Press [ Choices are VC-based or LLC-based.
  • Page 294 Prestige 2602HW Series User’s Guide Chapter 27 Internet Access...
  • Page 295: Chapter 28 Remote Node Configuration

    Remote Node Configuration This chapter covers remote node configuration. 28.1 Remote Node Setup Overview This section describes the protocol-independent parameters for a remote node. A remote node is required for placing calls to a remote gateway. A remote node represents both the remote gateway and the network behind it across a WAN connection.
  • Page 296: Encapsulation And Multiplexing Scenarios

    Prestige 2602HW Series User’s Guide Figure 145 Menu 11 Remote Node Setup 28.2.2 Encapsulation and Multiplexing Scenarios For Internet access you should use the encapsulation and multiplexing methods used by your ISP. Consult your telephone company for information on encapsulation and multiplexing methods for LAN-to-LAN applications, for example between a branch office and corporate headquarters.
  • Page 297: Figure 146 Menu 11.1 Remote Node Profile

    Figure 146 Menu 11.1 Remote Node Profile Menu 11.1 - Remote Node Profile Rem Node Name= MyISP Active= Yes Encapsulation= RFC 1483 Multiplexing= LLC-based Service Name= N/A Incoming: Rem Login= N/A Rem Password= N/A Outgoing: My Login= N/A My Password= N/A Authen= N/A Press ENTER to Confirm or ESC to Cancel: In Menu 11.1 –...
  • Page 298: Outgoing Authentication Protocol

    Prestige 2602HW Series User’s Guide Table 99 Menu 11.1 Remote Node Profile (continued) FIELD DESCRIPTION PAP – accept PAP (Password Authentication Protocol) only. Route This field determines the protocol used in routing. Options are IP and None. Bridge When bridging is enabled, your Prestige will forward any packet that it does not route to this remote node;...
  • Page 299: Remote Node Network Layer Options

    28.3 Remote Node Network Layer Options For the TCP/IP parameters, perform the following steps to edit Menu 11.3 – Remote Node Network Layer Options as shown next. 1 In menu 11.1, make sure IP is among the protocols in the Route field. 2 Move the cursor to the Edit IP/Bridge field, press [SPACE BAR] to select Yes, then press [ENTER] to display Menu 11.3 –...
  • Page 300: My Wan Addr Sample Ip Addresses

    Prestige 2602HW Series User’s Guide Table 100 Menu 11.3 Remote Node Network Layer Options (continued) FIELD DESCRIPTION Address When Full Feature is selected in the NAT field, configure address mapping sets in Mapping Set menu 15.1. Select one of the NAT server sets (2-10) in menu 15.2 (see on page 313 When SUA Only is selected in the NAT field, the SMT uses NAT server set 1 in menu 15.2 (see...
  • Page 301: Remote Node Filter

    Figure 148 Sample IP Addresses for a TCP/IP LAN-to-LAN Connection 28.4 Remote Node Filter Move the cursor to the Edit Filter Sets field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to display Menu 11.5 – Remote Node Filter. Use Menu 11.5 –...
  • Page 302: Editing Atm Layer Options

    Prestige 2602HW Series User’s Guide Figure 149 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation) Menu 11.5 - Remote Node Filter Figure 150 Menu 11.5 Remote Node Filter (PPPoA or PPPoE Encapsulation) 28.5 Editing ATM Layer Options Follow the steps shown next to edit Menu 11.6 – Remote Node ATM Layer Options. In menu 11.1, move the cursor to the Edit ATM Options field and then press [SPACE BAR] to select Yes.
  • Page 303: Llc-Based Multiplexing Or Ppp Encapsulation

    Figure 151 Menu 11.6 for VC-based Multiplexing Menu 11.6 - Remote Node ATM Layer Options VPI/VCI (VC-Multiplexing) VC Options for IP: VPI #= 8 VCI #= 35 ATM QoS Type= UBR Peak Cell Rate (PCR)= 0 Sustain Cell Rate (SCR)= 0 Maximum Burst Size (MBS)= 0 28.5.2 LLC-based Multiplexing or PPP Encapsulation For LLC-based multiplexing or PPP encapsulation, one VC carries multiple protocols with...
  • Page 304: Figure 153 Menu 11.1 Remote Node Profile

    Prestige 2602HW Series User’s Guide Figure 153 Menu 11.1 Remote Node Profile Rem Node Name= MyISP Active= Yes Encapsulation= PPPoE Multiplexing= LLC-based Service Name= Incoming: Rem Login= Rem Password= ******** Outgoing: My Login= ? My Password= ? Authen= CHAP/PAP Move the cursor to the Edit Advance Options field, press [SPACE BAR] to select Yes, then press [ENTER] to display Menu 11.8 –...
  • Page 305: Chapter 29 Static Route Setup

    This chapter shows how to setup IP static routes. 29.1 IP Static Route Overview Static routes tell the Prestige routing information that it cannot learn automatically through other means. This can arise in cases where RIP is disabled on the LAN or a remote network is beyond the one that is directly connected to a remote node.
  • Page 306: Figure 156 Menu 12 Static Route Setup

    Prestige 2602HW Series User’s Guide Figure 156 Menu 12 Static Route Setup From menu 12, select 1 to open Menu 12.1 — IP Static Route Setup (shown next). Figure 157 Menu 12.1 IP Static Route Setup Now, type the route number of a static route you want to configure. Figure 158 Menu12.1.1 Edit IP Static Route Menu 12.1.1 - Edit IP Static Route Press ENTER to Confirm or ESC to Cancel:...
  • Page 307: Table 102 Menu12.1.1 Edit Ip Static Route

    Table 102 Menu12.1.1 Edit IP Static Route FIELD Route # Route Name Active Destination IP Address IP Subnet Mask Gateway IP Address Metric Private When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: Chapter 29 Static Route Setup Prestige 2602HW Series User’s Guide DESCRIPTION...
  • Page 308 Prestige 2602HW Series User’s Guide Chapter 29 Static Route Setup...
  • Page 309: Chapter 30 Bridging Setup

    This chapter shows you how to configure the bridging parameters of your Prestige. 30.1 Bridging in General Bridging bases the forwarding decision on the MAC (Media Access Control), or hardware address, while routing does it on the network layer (IP) address. Bridging allows the Prestige to transport packets of network layer protocols that it does not route, for example, SNA, from one network to another.
  • Page 310: Figure 159 Menu 11.1 Remote Node Profile

    Prestige 2602HW Series User’s Guide Figure 159 Menu 11.1 Remote Node Profile Rem Node Name= ? Active= Yes Encapsulation= ENET ENCAP Multiplexing= VC-based Service Name= N/A Incoming: Rem Login= N/A Rem Password= N/A Outgoing: My Login= N/A My Password= N/A Authen= N/A Press ENTER to Confirm or ESC to Cancel: 3 Move the cursor to the Edit IP/Bridge field, then press [SPACE BAR] to set the value to...
  • Page 311: Bridge Static Route Setup

    30.2.2 Bridge Static Route Setup Similar to network layer static routes, a bridging static route tells the Prestige the route to a node before a connection is established. You configure bridge static routes in menu 12.3.1 (go to menu 12, choose option 3, then choose a static route to edit) as shown next. Figure 161 Menu 12.3.1 Edit Bridge Static Route Menu 12.3.1 - Edit Bridge Static Route Route #: 1...
  • Page 312 Prestige 2602HW Series User’s Guide Chapter 30 Bridging Setup...
  • Page 313: Network Address Translation (Nat)

    Network Address Translation This chapter discusses how to configure NAT on the Prestige. 31.1 Using NAT You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the Prestige. 31.1.1 SUA (Single User Account) Versus NAT SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server.
  • Page 314: Figure 162 Menu 4 Applying Nat For Internet Access

    Prestige 2602HW Series User’s Guide Figure 162 Menu 4 Applying NAT for Internet Access Menu 4 - Internet Access Setup Press ENTER to Confirm or ESC to Cancel: The following figure shows how you apply NAT to the remote node in menu 11.1. 1 Enter 11 from the main menu.
  • Page 315: Nat Setup

    Table 105 Applying NAT in Menus 4 & 11.3 FIELD DESCRIPTION Press [SPACE BAR] and then [ENTER] to select Full Feature if you have multiple public WAN IP addresses for your Prestige. The SMT uses the address mapping set that you configure and enter in the Address Mapping Set field (see Select None to disable NAT.
  • Page 316: Sua Address Mapping Set

    Prestige 2602HW Series User’s Guide Figure 165 Menu 15.1 Address Mapping Sets Menu 15.1 - Address Mapping Sets Enter Menu Selection Number: 31.3.1.1 SUA Address Mapping Set Enter 255 to display the next screen (see also section 27.1.1). The fields in this menu cannot be changed.
  • Page 317: User-Defined Address Mapping Sets

    Table 106 SUA Address Mapping Rules (continued) FIELD DESCRIPTION Global Start IP This is the starting global IP address (IGA). If you have a dynamic IP, enter 0.0.0.0 as the Global Start IP. Global End IP This is the ending global IP address (IGA). Type These are the mapping types.
  • Page 318: Ordering Your Rules

    Prestige 2602HW Series User’s Guide 31.3.1.3 Ordering Your Rules Ordering your rules is important because the Prestige applies the rules in the order that you specify. When a rule matches the current packet, the Prestige takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules.
  • Page 319: Configuring A Server Behind Nat

    Figure 168 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set Menu 15.1.1.1 Address Mapping Rule Press ENTER to Confirm or ESC to Cancel: The following table explains the fields in this menu. Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set Table 108 FIELD DESCRIPTION...
  • Page 320: Figure 169 Menu 15.2 Nat Server Setup

    Prestige 2602HW Series User’s Guide Figure 169 Menu 15.2 NAT Server Setup Menu 15.2 - NAT Server Sets 3 Enter 1 to go to Menu 15.2 NAT Server Setup as follows. Figure 170 Menu 15.2 NAT Server Setup Menu 15.2 - NAT Server Setup Rule Start Port No.
  • Page 321: General Nat Examples

    Figure 171 Multiple Servers Behind NAT Example 31.5 General NAT Examples The following are some examples of NAT configuration. 31.5.1 Example 1: Internet Access Only In the following Internet access example, you only need one rule where your ILAs (Inside Local addresses) all map to one dynamic IGA (Inside Global Address) assigned by your ISP.
  • Page 322: Example 2: Internet Access With An Inside Server

    Prestige 2602HW Series User’s Guide Figure 173 Menu 4 Internet Access & NAT Example From menu 4, choose the SUA Only option from the Network Address Translation field. This is the Many-to-One mapping discussed in read-only option from the Network Address Translation field in menus 4 and 11.3 is specifically pre-configured to handle this case.
  • Page 323: Example 3: Multiple Public Ip Addresses With Inside Servers

    Figure 175 Menu 15.2.1 Specifying an Inside Server Menu 15.2.1 - NAT Server Setup (Used for SUA Only) Rule Start Port No. --------------------------------------------------- 31.5.3 Example 3: Multiple Public IP Addresses With Inside Servers In this example, there are 3 IGAs from our ISP. There are many departments but two have their own FTP server.
  • Page 324: Figure 176 Nat Example 3

    Prestige 2602HW Series User’s Guide Figure 176 NAT Example 3 In this case you need to configure Address Mapping Set 1 from Menu 15.1 - Address Mapping Sets. Therefore you must choose the Full Feature option from the Network Address Translation field (in menu 4 or menu 11.3) in 1 Enter 15 from the main menu.
  • Page 325: Figure 178 Example 3: Menu 15.1.1.1

    Figure 178 Example 3: Menu 15.1.1.1 Menu 15.1.1.1 Address Mapping Rule Press ENTER to Confirm or ESC to Cancel: Figure 179 Example 3: Final Menu 15.1.1 Menu 15.1.1 - Address Mapping Rules Set Name= Example3 Local Start IP Local End IP --------------- --------------- 1.
  • Page 326: Example 4: Nat Unfriendly Application Programs

    Prestige 2602HW Series User’s Guide Figure 180 Example 3: Menu 15.2 Rule Start Port No. --------------------------------------------------- Press ENTER to Confirm or ESC to Cancel: 31.5.4 Example 4: NAT Unfriendly Application Programs Some applications do not support NAT Mapping using TCP or UDP port address translation. In this case it is better to use Many-to-Many No Overload mapping as port numbers do not change for Many-to-Many No Overload (and One-to-One) NAT mapping types.
  • Page 327: Figure 182 Example 4: Menu 15.1.1.1 Address Mapping Rule

    Figure 182 Example 4: Menu 15.1.1.1 Address Mapping Rule Menu 15.1.1.1 Address Mapping Rule Press ENTER to Confirm or ESC to Cancel: After you’ve configured your rule, you should be able to check the settings in menu 15.1.1 as shown next. Figure 183 Example 4: Menu 15.1.1 Address Mapping Rules Menu 15.1.1 - Address Mapping Rules Set Name= Example4...
  • Page 328 Prestige 2602HW Series User’s Guide Chapter 31 Network Address Translation (NAT)
  • Page 329: Chapter 32 Enabling The Firewall

    This chapter shows you how to get started with the Prestige firewall. 32.1 Remote Management and the Firewall When SMT menu 24.11 is configured to allow management (see the Remote Management chapter) and the firewall is enabled: • The firewall blocks remote management from the WAN unless you configure a firewall rule to allow it.
  • Page 330: Figure 184 Menu 21.2 Firewall Setup

    Prestige 2602HW Series User’s Guide Figure 184 Menu 21.2 Firewall Setup Menu 21.2 - Firewall Setup The firewall protects against Denial of Service (DOS) attacks when it is active. The default Policy sets 1. allow all sessions originating from the LAN to the WAN and 2.
  • Page 331: Chapter 33 Filter Configuration

    This chapter shows you how to create and apply filters. 33.1 About Filtering Your Prestige uses filters to decide whether or not to allow passage of a data packet and/or to make a call. There are two types of filter applications: data filtering and call filtering. Filters are subdivided into device and protocol filters, which are discussed later.
  • Page 332: The Filter Structure Of The Prestige

    Prestige 2602HW Series User’s Guide Figure 186 Filter Rule Process Fetch Next Filter Set Next Filter Set Available? Drop Packet You can apply up to four filter sets to a particular port to block various types of packets. Because each filter set can have up to six rules, you can have a maximum of 24 rules active for a single port.
  • Page 333: Configuring A Filter Set For The Prestige

    33.2 Configuring a Filter Set for the Prestige To configure a filter set, follow the steps shown next. 1 Enter 21 in the main menu to display Menu 21 – Filter and Firewall Setup. 2 Enter 1 to display Menu 21.1 – Filter Set Configuration as shown next. Figure 187 Menu 21 Filter Set Configuration Menu 21.1 - Filter Set Configuration Filter...
  • Page 334: Filter Rules Summary Menus

    Prestige 2602HW Series User’s Guide Figure 189 NetBIOS_LAN Filter Rules Summary Menu 21.1.3 - Filter Rules Summary # A Type - - ---- --------------------------------------------------------------- - 1 Y IP Pr=17, SA=0.0.0.0, SP=137, DA=0.0.0.0, DP=53 Enter Filter Rule Number (1-6) to Configure: Figure 190 IGMP Filter Rules Summary Menu 21.1.4 - Filter Rules Summary # A Type...
  • Page 335: Configuring A Filter Rule

    Table 109 Abbreviations Used in the Filter Rules Summary Menu (continued) FIELD DESCRIPTION Action Matched. “F” means to forward the packet immediately and skip checking the remaining rules. “D” means to drop the packet. “N“ means to check the next rule. Action Not Matched.
  • Page 336: Tcp/Ip Filter Rule

    Prestige 2602HW Series User’s Guide 33.4.1 TCP/IP Filter Rule This section shows you how to configure a TCP/IP filter rule. TCP/IP rules allow you to base the rule on the fields in the IP and the upper layer protocol, for example, UDP and TCP headers.
  • Page 337 Table 111 Menu 21.1.x.1 TCP/IP Filter Rule (continued) FIELD DESCRIPTION Port # Type the destination port of the packets you want to filter. The field range is 0 to 65535. A 0 field is ignored. Port # Comp Select the comparison to apply to the destination port in the packet against the value given in Destination: Port #.
  • Page 338: Generic Filter Rule

    Prestige 2602HW Series User’s Guide Figure 192 Executing an IP Filter Packet into IP Filter Filter Active? Apply SrcAddrMask to Src Addr Check Src IP Addr Matched Apply DestAddrMask to Dest Addr Check Dest IP Addr Matched Check IP Protocol Matched Check Src &...
  • Page 339: Figure 193 Menu 21.1.5.1 Generic Filter Rule

    To configure a generic rule select an empty filter set in menu 21, for example 5. Select Generic Filter Rule in the Filter Type field and press [ENTER] to open Menu 21.1.5.1 – Generic Filter Rule, as shown in the following figure. Figure 193 Menu 21.1.5.1 Generic Filter Rule Menu 21.1.5.1 - Generic Filter Rule Filter #: 5,1...
  • Page 340: Filter Types And Nat

    Prestige 2602HW Series User’s Guide Table 112 Menu 21.1.5.1 Generic Filter Rule (continued) FIELD DESCRIPTION Action Not Select the action for a packet not matching the rule. Choices are Check Next Rule, Matched Forward or Drop. When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 33.5 Filter Types and NAT There are two classes of filter rules, Generic Filter Device rules and Protocol Filter (TCP/IP)
  • Page 341: Figure 195 Sample Telnet Filter

    Figure 195 Sample Telnet Filter 1 Enter 1 in the menu 21 to display Menu 21.1 — Filter Set Configuration. 2 Enter the index number of the filter set you want to configure (in this case 6) 3 Type a descriptive name or comment in the Edit Comments field (for example, TELNET_WAN) and press [ENTER].
  • Page 342: Applying Filters And Factory Defaults

    Prestige 2602HW Series User’s Guide 2 Go to the Edit Filter Sets field, press [SPACE BAR] to choose Yes and press [ENTER]. This brings you to menu 11.5. Apply the example filter set (for example, filter set 3) in this menu as shown in the next section.
  • Page 343: Ethernet Traffic

    33.7.1 Ethernet Traffic You seldom need to filter Ethernet traffic; however, the filter sets may be useful to block certain packets, reduce traffic and prevent security breaches. Go to menu 3.1 (shown next) and type the number(s) of the filter set(s) that you want to apply as appropriate. You can choose up to four filter sets (from twelve) by typing their numbers separated by commas, for example, 3, 4, 6, 11.
  • Page 344 Prestige 2602HW Series User’s Guide Chapter 33 Filter Configuration...
  • Page 345: Chapter 34 Snmp Configuration

    This chapter explains SNMP Configuration menu 22. 34.1 About SNMP Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network.
  • Page 346: Supported Mibs

    Prestige 2602HW Series User’s Guide The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include the number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.
  • Page 347: Snmp Traps

    Figure 201 Menu 22 SNMP Configuration Menu 22 - SNMP Configuration SNMP: Get Community= public Set Community= public Trusted Host= 0.0.0.0 Trap: Press ENTER to Confirm or ESC to Cancel: The following table describes the SNMP configuration parameters. Table 114 Menu 22 SNMP Configuration FIELD SNMP: Get Community...
  • Page 348: Table 116 Ports And Permanent Virtual Circuits

    Prestige 2602HW Series User’s Guide Table 115 SNMP Traps (continued) TRAP # TRAP NAME authenticationFailure (defined in RFC-1215) whyReboot (defined in ZYXEL-MIB) A trap is sent with the reason of restart before For intentional reboot : The port number is its interface index under the interface group. Table 116 Ports and Permanent Virtual Circuits PORT PVC (PERMANENT VIRTUAL CIRCUIT)
  • Page 349: Chapter 35 System Security

    This chapter describes how to configure the system security on the Prestige. 35.1 System Security You can configure the system password.. 35.1.1 System Password Enter 23 in the main menu to display Menu 23 – System Security. You should change the default password. If you forget your password you have to restore the default configuration file.
  • Page 350: Figure 204 Menu 23.2 System Security: Radius Server

    Prestige 2602HW Series User’s Guide Figure 204 Menu 23.2 System Security: RADIUS Server Menu 23.2 - System Security - RADIUS Server Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu. Table 117 Menu 23.2 System Security: RADIUS Server FIELD Authentication Server Active...
  • Page 351: Ieee802.1X

    35.1.3 IEEE802.1x The IEEE802.1x standards outline enhanced security methods for both the authentication of wireless stations and encryption key management. Follow the steps below to enable EAP authentication on your Prestige. 1 From the main menu, enter 23 to display Menu23 – System Security. Figure 205 Menu 23 System Security Menu 23 - System Security Enter Menu Selection Number:...
  • Page 352: Table 118 Menu 23.4 System Security: Ieee802.1X

    Prestige 2602HW Series User’s Guide Table 118 Menu 23.4 System Security: IEEE802.1x FIELD DESCRIPTION Wireless Port Press [SPACE BAR] and select a security mode for the wireless LAN access. Control Select No Authentication Required to allow any wireless stations access to your wired network without entering usernames and passwords.
  • Page 353: Creating User Accounts On The Prestige

    Table 118 Menu 23.4 System Security: IEEE802.1x (continued) FIELD DESCRIPTION Authentication The authentication database contains wireless station login information. The local Databases user database is the built-in database on the Prestige. The RADIUS is an external server. Use this field to decide which database the Prestige should use (first) to authenticate a wireless station.
  • Page 354: Figure 207 Menu 14 Dial-In User Setup

    Prestige 2602HW Series User’s Guide Figure 207 Menu 14 Dial-in User Setup 1. ________ 2. ________ 3. ________ 4. ________ 5. ________ 6. ________ 7. ________ 8. ________ 2 Type a number and press [ENTER] to edit the user profile. Figure 208 Menu 14.1 Edit Dial-in User Menu 14.1 - Edit Dial-in User Press ENTER to Confirm or ESC to Cancel:...
  • Page 355: System Information And Diagnosis

    System Information and This chapter covers the information and diagnostic tools in SMT menus 24.1 to 24.4. 36.1 Overview These tools include updates on system status, port status, log and trace capabilities and upgrades for the system software. This chapter describes how to use these tools in detail. Type 24 in the main menu to open Menu 24 –...
  • Page 356: Figure 210 Menu 24.1 System Maintenance : Status

    Prestige 2602HW Series User’s Guide The following table describes the fields present in Menu 24.1 — System Maintenance — Status which are read-only and meant for diagnostic purposes. Figure 210 Menu 24.1 System Maintenance : Status Menu 24.1 - System Maintenance - Status Node-Lnk Status Time 1-PPPoA N/A...
  • Page 357: System Information

    Table 120 Menu 24.1 System Maintenance: Status (continued) FIELD DESCRIPTION Line Status This shows the current status of the xDSL line, which can be Up or Down. Upstream This shows the upstream transfer rate in kbps. Speed Downstream This shows the downstream transfer rate in kbps. Speed CPU Load This specifies the percentage of CPU utilization.
  • Page 358: Console Port Speed

    Menu 1 – General Setup. Refers to the routing protocol used. Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. ZyNOS is a registered trademark of ZyXEL Communications Corporation. Displays the vendor of the ADSL chipset and DSL version.
  • Page 359: Log And Trace

    Figure 213 Menu 24.2.2 System Maintenance : Change Console Port Speed Menu 24.2.2 – System Maintenance – Change Console Port Speed Press ENTER to Confirm or ESC to Cancel: Once you change the Prestige console port speed, you must also set the speed parameter for the communication software you are using to connect to the Prestige.
  • Page 360: Syslog And Accounting

    Prestige 2602HW Series User’s Guide Figure 215 Sample Error and Information Messages 53 Sat Jan 01 00:00:03 2000 PP01 -WARN 54 Sat Jan 01 00:00:03 2000 PP01 55 Sat Jan 01 00:00:03 2000 PP01 56 Sat Jan 01 00:00:03 2000 PP20 57 Sat Jan 01 00:00:03 2000 PP21 58 Sat Jan 01 00:03:06 2000 PP19 59 Sat Jan 01 00:03:06 2000 PP01...
  • Page 361: Figure 217 Syslog Example

    Figure 217 Syslog Example 1 - CDR SdcmdSyslogSend ( SYSLOG_CDR, SYSLOG_INFO, String); String = board xx line xx channel xx, call xx, str board = the hardware board ID line = the WAN ID in a board Channel = channel ID within the WAN call = the call reference number which starts from 1 and increments by 1 for each new call str = C01 Outgoing Call dev xx ch xx (dev:device No.
  • Page 362: Diagnostic

    Prestige 2602HW Series User’s Guide Figure 217 Syslog Example (continued) prot: Protocol (“TCP”, ”UDP”, ”ICMP”) spo: Source port dpo: Destination port Jul 19 14:43:55 192.168.102.2 ZYXEL: IP [Src=202.132.154.123 Dst=255.255.255.255 UDP spo=0208 dpo=0208]} S03>R01mF Jul 19 14:44:00 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP spo=05d4 dpo=0035]} S03>R01mF Jul 19 14:44:04 192.168.102.2 ZYXEL: IP [Src=192.168.102.20 Dst=202.132.154.1 UDP spo=05d4 dpo=0035]} S03>R01mF...
  • Page 363: Table 123 Menu 24.4 System Maintenance Menu: Diagnostic

    The following table describes the diagnostic tests available in menu 24.4 for and the connections. Table 123 Menu 24.4 System Maintenance Menu: Diagnostic FIELD DESCRIPTION Reset xDSL Re-initialize the xDSL link to the telephone company. Ping Host Ping the host to see if the links and TCP/IP protocol on both systems are working. Reboot System Reboot the Prestige.
  • Page 364 Prestige 2602HW Series User’s Guide Chapter 36 System Information and Diagnosis...
  • Page 365: Firmware And Configuration File Maintenance

    Firmware and Configuration File This chapter tells you how to backup and restore your configuration file as well as upload new firmware and configuration files. 37.1 Filename Conventions The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password, DHCP Setup, TCP/IP Setup, etc.
  • Page 366: Backup Configuration

    Prestige 2602HW Series User’s Guide The following table is a summary. Please note that the internal filename refers to the filename on the Prestige and the external filename refers to the filename not on the Prestige, that is, on your computer, local network or FTP site and so the name (but not the extension) may vary. After uploading new firmware, see the ZyNOS F/W Version field in Menu 24.2.1 –...
  • Page 367: Using The Ftp Command From The Command Line

    Figure 219 Telnet in Menu 24.5 Menu 24.5 - System Maintenance - Backup Configuration To transfer the configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your Prestige. Then type "root" and SMT password as requested.
  • Page 368: Gui-Based Ftp Clients

    Prestige 2602HW Series User’s Guide Figure 220 FTP Session Example 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> get rom-0 zyxel.rom 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK ftp: 16384 bytes sent in 1.10Seconds 297.89Kbytes/sec.
  • Page 369: Backup Configuration Using Tftp

    37.2.6 Backup Configuration Using TFTP The Prestige supports the up/downloading of the firmware and the configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended. To use TFTP, your computer must have both telnet and TFTP clients. To backup the configuration file, follow the procedure shown next.
  • Page 370: Backup Via Console Port

    Prestige 2602HW Series User’s Guide Table 126 General Commands for GUI-based TFTP Clients COMMAND DESCRIPTION Host Enter the IP address of the Prestige. 192.168.1.1 is the Prestige’s default IP address when shipped. Send/Fetch Use “Send” to upload the file to the Prestige and “Fetch” to back up the file on your computer.
  • Page 371: Restore Configuration

    Figure 223 Backup Configuration Example Type a location for storing the configuration file or click Browse to look for one. Choose the Xmodem protocol. Then click Receive. 4 After a successful backup you will see the following screen. Press any key to return to the SMT menu.
  • Page 372: Restore Using Ftp Session Example

    Prestige 2602HW Series User’s Guide Figure 225 Telnet into Menu 24.6 Menu 24.6 -- System Maintenance - Restore Configuration To transfer the firmware and configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2.
  • Page 373: Restore Via Console Port

    37.3.3 Restore Via Console Port Restore configuration via console port by following the HyperTerminal procedure shown next. Procedures using other serial communications programs should be similar. 1 Display menu 24.6 and enter “y” at the following screen. Figure 227 System Maintenance: Restore Configuration Ready to restore Configuration via Xmodem.
  • Page 374: Uploading Firmware And Configuration Files

    Prestige 2602HW Series User’s Guide Figure 230 Successful Restoration Confirmation Screen Save to ROM Hit any key to start system reboot. 37.4 Uploading Firmware and Configuration Files This section shows you how to upload firmware and configuration files. You can upload configuration files by following the procedure in instructions in Menu 24.7.2 –...
  • Page 375: Ftp File Upload Command From The Dos Prompt Example

    Figure 232 Telnet Into Menu 24.7.2 System Maintenance Menu 24.7.2 - System Maintenance - Upload System Configuration File To upload the system configuration file, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  • Page 376: Ftp Session Example Of Firmware File Upload

    Prestige 2602HW Series User’s Guide 37.4.4 FTP Session Example of Firmware File Upload Figure 233 FTP Session Example of Firmware File Upload 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> put firmware.bin ras 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK...
  • Page 377: Tftp Upload Command Example

    37.4.6 TFTP Upload Command Example The following is an example TFTP command: tftp [-i] host put firmware.bin ras where “ ” specifies binary image transfer mode (use this mode when transferring binary files), “ ” is the Prestige’s IP address and “ host –...
  • Page 378: Example Xmodem Firmware Upload Using Hyperterminal

    Prestige 2602HW Series User’s Guide 37.4.9 Example Xmodem Firmware Upload Using HyperTerminal Click Transfer, then Send File to display the following screen. Figure 235 Example Xmodem Upload After the firmware upload process has completed, the Prestige will automatically restart. 37.4.10 Uploading Configuration File Via Console Port 1 Select 2 from Menu 24.7 –...
  • Page 379: Example Xmodem Configuration Upload Using Hyperterminal

    3 Enter “atgo” to restart the Prestige. 37.4.11 Example Xmodem Configuration Upload Using HyperTerminal Click Transfer, then Send File to display the following screen. Figure 237 Example Xmodem Upload After the configuration upload process has completed, restart the Prestige by entering “atgo”. Chapter 37 Firmware and Configuration File Maintenance Prestige 2602HW Series User’s Guide...
  • Page 380 Prestige 2602HW Series User’s Guide Chapter 37 Firmware and Configuration File Maintenance...
  • Page 381: Chapter 38 System Maintenance

    System Maintenance. A list of valid commands can be found by typing help or ? at the command prompt. Type “ Figure 238 Command Mode in Menu 24 Enter Menu Selection Number: Figure 239 Valid Commands Copyright (c) 1994 - 2005 ZyXEL Communications Corp. ras> ? Valid commands are: exit ipsec...
  • Page 382: Call Control Support

    Prestige 2602HW Series User’s Guide 38.2 Call Control Support Call Control Support is only applicable when Encapsulation is set to PPPoE in menu 4 or menu 11.1. The budget management function allows you to set a limit on the total outgoing call time of the Prestige within certain times.
  • Page 383: Time And Date Setting

    The total budget is the time limit on the accumulated time for outgoing calls to a remote node. When this limit is reached, the call will be dropped and further outgoing calls to that remote node will be blocked. After each period, the total budget is reset. The default for the total budget is 0 minutes and the period is 0 hours, meaning no budget control.
  • Page 384: Resetting The Time

    Prestige 2602HW Series User’s Guide Figure 243 Menu 24.10 System Maintenance: Time and Date Setting Menu 24.10 - System Maintenance - Time and Date Setting Use Time Server when Bootup= None Time Server Address= N/A Current Time: New Time (hh:mm:ss): Current Date: New Date (yyyy-mm-dd): Time Zone= GMT...
  • Page 385 Prestige 2602HW Series User’s Guide • 24-hour intervals after starting. Chapter 38 System Maintenance...
  • Page 386 Prestige 2602HW Series User’s Guide Chapter 38 System Maintenance...
  • Page 387: Chapter 39 Remote Management

    This chapter covers remote management (SMT menu 24.11). 39.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which Prestige interface (if any) from which computers. When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.
  • Page 388: Remote Management Limitations

    Prestige 2602HW Series User’s Guide Figure 244 Menu 24.11 Remote Management Control Menu 24.11 - Remote Management Control TELNET Server: Server Port = 23 Secured Client IP = 0.0.0.0 FTP Server: Server Port = 21 Secured Client IP = 0.0.0.0 Web Server: Server Port = 80 Secured Client IP = 0.0.0.0...
  • Page 389: Remote Management And Nat

    39.3 Remote Management and NAT When NAT is enabled: • Use the Prestige’s WAN IP address when configuring from the WAN. • Use the Prestige’s LAN IP address when configuring from the LAN. 39.4 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The Prestige automatically logs you out if the management session remains idle for longer than this timeout period.
  • Page 390 Prestige 2602HW Series User’s Guide Chapter 39 Remote Management...
  • Page 391: Chapter 40 Ip Policy Routing

    This chapter covers setting and applying policies used for IP routing. 40.1 IP Policy Routing Overview Traditionally, routing is based on the destination address only and the IAD takes the shortest path to forward a packet. IP Routing Policy (IPPR) provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
  • Page 392: Ip Routing Policy Setup

    Prestige 2602HW Series User’s Guide • routing the packet to a different gateway (and hence the outgoing interface). • setting the TOS and precedence fields in the IP header. IPPR follows the existing packet filtering facility of RAS in style and in implementation. The policies are divided into sets, where related policies are grouped together.
  • Page 393: Figure 246 Menu 25.1 Ip Routing Policy Setup

    Figure 246 Menu 25.1 IP Routing Policy Setup Menu 25.1 - IP Routing Policy Setup - - -------------------------------------------------------------------------- 1 Y SA=1.1.1.1-1.1.1.1,DA=2.2.2.2-2.2.2.5 SP=20-25,DP=20-25,P=6,T=NM,PR=0 2 N __________________________________________________________________________ __________________________________________________________________________ 3 N __________________________________________________________________________ __________________________________________________________________________ 4 N __________________________________________________________________________ __________________________________________________________________________ 5 N __________________________________________________________________________ __________________________________________________________________________ 6 N __________________________________________________________________________ __________________________________________________________________________ Enter Policy Rule Number (1-6) to Configure: Table 130 Menu 25.1 IP Routing Policy Setup...
  • Page 394: Figure 247 Menu 25.1.1 Ip Routing Policy

    Prestige 2602HW Series User’s Guide Figure 247 Menu 25.1.1 IP Routing Policy Menu 25.1.1 - IP Routing Policy Policy Set Name= test Active= No Criteria: IP Protocol Type of Service= Don't Care Precedence Source: addr start= 0.0.0.0 port start= N/A Destination: addr start= 0.0.0.0 port start= N/A...
  • Page 395: Applying An Ip Policy

    Table 131 Menu 25.1.1 IP Routing Policy (continued) FIELD Gateway addr Type of Service Precedence When you have completed this menu, press [ENTER] at the prompt “ or ESC to Cancel: 40.5 Applying an IP Policy This section shows you where to apply the IP policies after you design them. 40.5.1 Ethernet IP Policies From Menu 3 —...
  • Page 396: Ip Policy Routing Example

    Prestige 2602HW Series User’s Guide Figure 248 Menu 3.2 TCP/IP and DHCP Ethernet Setup Menu 3.2 - TCP/IP and DHCP Setup Press ENTER to Confirm or ESC to Cancel: Go to menu 11.3 (shown next) and type the number(s) of the IP Routing Policy set(s) as appropriate.
  • Page 397: Figure 250 Example Of Ip Policy Routing

    Figure 250 Example of IP Policy Routing To force packets coming from clients with IP addresses of 192.168.1.33 to 192.168.1.64 to be routed to the Internet via the WAN port of the Prestige, follow the steps as shown next. 1 Create a routing policy set in menu 25. 2 Create a rule for this set in Menu 25.1.1 —...
  • Page 398: Figure 252 Ip Routing Policy Example

    Prestige 2602HW Series User’s Guide 3 Create a rule in menu 25.1 for this set to route packets from any host ( means any host) with protocol TCP and port FTP access through another gateway (192.168.1.100). Figure 252 IP Routing Policy Example Menu 25.1.1 - IP Routing Policy Policy Set Name= set2 Active= Yes...
  • Page 399: Chapter 41 Call Scheduling

    Call scheduling (applicable for PPPoA or PPPoE encapsulation only) allows you to dictate when a remote node should be called and for how long. 41.1 Introduction The call scheduling feature allows the Prestige to manage a remote node and dictate when a remote node should be called and for how long.
  • Page 400: Figure 255 Menu 26.1 Schedule Set Setup

    Prestige 2602HW Series User’s Guide To setup a schedule set, select the schedule set you want to setup from menu 26 (1-12) and press [ENTER] to see Menu 26.1 — Schedule Set Setup as shown next. Figure 255 Menu 26.1 Schedule Set Setup Menu 26.1 Schedule Set Setup Press ENTER to Confirm or ESC to Cancel: If a connection has been already established, your Prestige will not drop it.
  • Page 401: Figure 256 Applying Schedule Set(S) To A Remote Node (Pppoe)

    Table 132 Menu 26.1 Schedule Set Setup (continued) FIELD DESCRIPTION Action Forced On means that the connection is maintained whether or not there is a demand call on the line and will persist for the time period specified in the Duration field. Forced Down means that the connection is blocked whether or not there is a demand call on the line.
  • Page 402 Prestige 2602HW Series User’s Guide Chapter 41 Call Scheduling...
  • Page 403: Chapter 42 Vpn/Ipsec Setup

    This chapter introduces the VPN SMT menus. 42.1 VPN/IPSec Overview The VPN/IPSec main SMT menu has these main submenus: Define VPN policies in menu 27.1 submenus, including security policies, endpoint IP addresses, peer IPSec router IP address and key management. Menu 27.2 - SA Monitor allows you to manage (refresh or disconnect) your SA connections.
  • Page 404: Ipsec Summary Screen

    Prestige 2602HW Series User’s Guide Figure 258 Menu 27 VPN/IPSec Setup Menu 27 - VPN/IPSec Setup Enter Menu Selection Number: 42.2 IPSec Summary Screen Type 1 in menu 27 and then press [ENTER] to display Menu 27.1 IPSec Summary. This is a summary read-only menu of your IPSec rules (tunnels).
  • Page 405 Table 133 Menu 27.1 IPSec Summary (continued) FIELD DESCRIPTION Y signifies that this VPN rule is active. Local Addr When the Addr Type field in Menu 27.1.1 IPSec Setup is configured to Single, this is a Start static IP address on the LAN behind your Prestige. When the Addr Type field in Menu 27.1.1 IPSec Setup is configured to Range, this is the beginning (static) IP address, in a range of computers on the LAN behind your Prestige.
  • Page 406: Ipsec Setup

    Prestige 2602HW Series User’s Guide Table 133 Menu 27.1 IPSec Summary (continued) FIELD DESCRIPTION Secure GW This is the WAN IP address or the domain name (up to the first 15 characters are Addr displayed) of the IPSec router with which you are making the VPN connection. This field displays 0.0.0.0 when you configure the Secure Gateway Address field in SMT 27.1.1 to 0.0.0.0.
  • Page 407: Figure 260 Menu 27.1.1 Ipsec Setup

    Figure 260 Menu 27.1.1 IPSec Setup Menu 27.1.1 – IPSec Setup Index= 1 Active= Yes Local ID type= IP My IP Addr= 0.0.0.0 Peer ID type= IP Secure Gateway Address= zw50test.zyxel.com.tw Protocol= 0 Local: IP Addr Start= 1.1.1.1 Remote: IP Addr Start= 4.4.4.4 Enable Replay Detection = No Key Management= IKE Edit Key Management Setup= No...
  • Page 408 Prestige 2602HW Series User’s Guide Table 134 Menu 27.1.1 IPSec Setup (continued) FIELD DESCRIPTION Nat Traversal Press [SPACE BAR] to choose either Yes or No. Choose Yes and press [ENTER] to enable NAT traversal. NAT traversal allows you to set up a VPN connection when there are NAT routers between the two IPSec routers.
  • Page 409 Table 134 Menu 27.1.1 IPSec Setup (continued) FIELD DESCRIPTION DNS Server If there is a private DNS server that services the VPN, type its IP address here. The Prestige assigns this additional DNS server to the Prestige's DHCP clients that have IP addresses in this IPSec rule's range of local addresses.
  • Page 410: Ike Setup

    Prestige 2602HW Series User’s Guide Table 134 Menu 27.1.1 IPSec Setup (continued) FIELD DESCRIPTION IP Addr Start When the Addr Type field is configured to Single, enter a static IP address on the network behind the remote IPSec router. When the Addr Type field is configured to Range, enter the beginning (static) IP address, in a range of computers on the network behind the remote IPSec router.
  • Page 411: Figure 261 Menu 27.1.1.1Ke Setup

    Figure 261 Menu 27.1.1.1KE Setup Menu 27.1.1.1 - IKE Setup Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu. Table 135 Menu 27.1.1.1 IKE Setup FIELD DESCRIPTION Phase 1 Negotiation Press [SPACE BAR] to choose from Main or Aggressive and then press [ENTER]. Mode See earlier for a discussion of these modes.
  • Page 412: Manual Setup

    Prestige 2602HW Series User’s Guide Table 135 Menu 27.1.1.1 IKE Setup (continued) FIELD DESCRIPTION Key Group You must choose a key group for phase 1 IKE setup. DH1 (default) refers to Diffie- Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number.
  • Page 413: Figure 262 Menu 27.1.1.2 Manual Setup

    Figure 262 Menu 27.1.1.2 Manual Setup Menu 27.1.1.2 – Manual Setup Active Protocol= ESP Tunnel ESP Setup SPI (Decimal)= 0 Encryption Algorithm= DES Authentication Algorithm= MD5 AH Setup SPI (Decimal)= N/A Authentication Algorithm= N/A Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu.
  • Page 414 Prestige 2602HW Series User’s Guide Table 137 Menu 27.1.1.2 Manual Setup (continued) FIELD DESCRIPTION Authentication Press [SPACE BAR] to choose from MD5 or SHA1 and then press [ENTER]. Algorithm Enter the authentication key to be used by IPSec if applicable. The key must be unique.
  • Page 415: Chapter 43 Sa Monitor

    This chapter teaches you how to manage your SAs by using the SA Monitor in SMT menu 27.2. 43.1 SA Monitor Overview A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This menu (shown next) displays active VPN connections. Note: When there is outbound traffic but no inbound traffic, the SA times out automatically after two minutes.
  • Page 416: Figure 263 Menu 27.2 Sa Monitor

    Prestige 2602HW Series User’s Guide Figure 263 Menu 27.2 SA Monitor Menu 27.2 - SA Monitor Name -------------------------------- Taiwan : 3.3.3.1 – 3.3.3.3.100 Select Command= Refresh Select Connection= N/A Press ENTER to Confirm or ESC to Cancel: The following table describes the fields in this menu. Table 138 Menu 27.2 SA Monitor FIELD DESCRIPTION...
  • Page 417 Table 138 Menu 27.2 SA Monitor (continued) FIELD DESCRIPTION Select Press [SPACE BAR] to choose from Refresh, Disconnect, None, Next Page, or Command Previous Page and then press [ENTER]. You must select a connection in the next field when you choose the Disconnect command. Refresh displays current active VPN connections.
  • Page 418 Prestige 2602HW Series User’s Guide Chapter 43 SA Monitor...
  • Page 419: Chapter 44 Troubleshooting

    This chapter covers potential problems and the corresponding remedies. 44.1 Problems Starting Up the Prestige Table 139 Troubleshooting the Start-Up of Your Prestige PROBLEM CORRECTIVE ACTION None of the Make sure that the Prestige’s power adaptor is connected to the Prestige and plugged LEDs turn on in to an appropriate power source.
  • Page 420: Problems With The Dsl Led

    Prestige 2602HW Series User’s Guide 44.3 Problems with the DSL LED Table 141 Troubleshooting the DSL LED PROBLEM CORRECTIVE ACTION The DSL LED is Check the telephone wire and connections between the Prestige DSL port and the off. wall jack. Make sure that the telephone company has checked your phone line and set it up for DSL service.
  • Page 421: Problems With Internet Access

    44.6 Problems with Internet Access Table 144 Troubleshooting Internet Access PROBLEM CORRECTIVE ACTION I cannot access Make sure the Prestige is turned on and connected to the network. the Internet. If the DSL LED is off, refer to . Verify your WAN settings. Refer to the chapter on WAN setup (web configurator) or the section on Internet Access (SMT).
  • Page 422: Problems With The Web Configurator

    Prestige 2602HW Series User’s Guide 44.8 Problems with the Web Configurator Table 146 Troubleshooting the Web Configurator PROBLEM CORRECTIVE ACTION I cannot access Refer to . the web Make sure that there is not an SMT console session running. configurator. Check that you have enabled web service access.
  • Page 423: Telephone Problems

    44.10 Telephone Problems Table 148 Troubleshooting Telephone PROBLEM CORRECTIVE ACTION The telephone port Check the telephone connections and telephone wire. won’t work or the Make sure you have the Voice SIP Settings screen properly configured. telephone lacks a dial tone. I cannot call from You cannot call the SIP number of the SIP account that you are using to make a one of the...
  • Page 424 Prestige 2602HW Series User’s Guide Chapter 44 Troubleshooting...
  • Page 425: Hardware Specifications

    Prestige 2602HW Series User’s Guide P P E N D I X Hardware Specifications Ethernet Cable Pin Assignments Figure 264 Ethernet Cable Pin Assignments Prestige 2602HW-L DSL Port Pin Assignments The following figure describes the pin assignments for the DSL port on the Prestige 2602HW-...
  • Page 426: Figure 265 Prestige 2602Hw-L Dsl Port Pin Assignments

    Prestige 2602HW Series User’s Guide Figure 265 Prestige 2602HW-L DSL Port Pin Assignments...
  • Page 427: Prestige 2602Hw Series Power Adaptor Specifications

    Prestige 2602HW Series Power Adaptor Specifications Table 149 Prestige 2602HW Series Power Adaptor Specifications NORTH AMERICAN PLUG STANDARDS AC Power Adapter Model Input Power Output Power Power Consumption Safety Standards EUROPEAN PLUG STANDARDS AC Power Adapter Model Input Power Output Power Power Consumption Safety Standards UNITED KINGDOM PLUG STANDARDS...
  • Page 428 Prestige 2602HW Series User’s Guide...
  • Page 429: Setting Up Your Computer's Ip Address

    Prestige 2602HW Series User’s Guide P P E N D I X Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
  • Page 430: Figure 266 Windows 95/98/Me: Network: Configuration

    Prestige 2602HW Series User’s Guide Figure 266 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 431: Configuring

    3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
  • Page 432: Verifying Settings

    Prestige 2602HW Series User’s Guide Figure 268 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • • 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your Prestige and restart your computer when prompted.
  • Page 433: Figure 269 Windows Xp: Start Menu

    Figure 269 Windows XP: Start Menu 2 For Windows XP, click Network Connections. For Windows 2000/NT, click Network and Dial-up Connections. Figure 270 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Prestige 2602HW Series User’s Guide...
  • Page 434: Figure 271 Windows Xp: Control Panel: Network Connections: Properties

    Prestige 2602HW Series User’s Guide Figure 271 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. Figure 272 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 435: Figure 273 Windows Xp: Advanced Tcp/Ip Settings

    • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. Click Advanced. Figure 273 Windows XP: Advanced TCP/IP Settings 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK.
  • Page 436: Verifying Settings

    Prestige 2602HW Series User’s Guide 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • • Figure 274 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window.
  • Page 437: Macintosh Os 8/9

    Prestige 2602HW Series User’s Guide Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Figure 275 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list.
  • Page 438: Verifying Settings

    Prestige 2602HW Series User’s Guide Figure 276 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • • • • 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration.
  • Page 439: Figure 277 Macintosh Os X: Apple Menu

    Figure 277 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list. Figure 278 Macintosh OS X: Network 4 For statically assigned settings, do the following: •...
  • Page 440: Verifying Settings

    Prestige 2602HW Series User’s Guide 5 Click Apply Now and close the window. 6 Turn on your Prestige and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
  • Page 441: Ip Subnetting

    IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
  • Page 442: Subnet Masks

    Prestige 2602HW Series User’s Guide Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a value of 0 to 127. Similarly the first octet of a class “B” must begin with “10”, therefore the first octet of a class “B”...
  • Page 443: Example: Two Subnets

    Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/”...
  • Page 444: Table 155 Subnet 1

    Prestige 2602HW Series User’s Guide Note: In the following charts, shaded/bold last octet bit values indicate host ID bits “borrowed” to form network ID bits. The number of “borrowed” host ID bits determines the number of subnets you can have. The remaining number of host ID bits (after “borrowing”) determines the number of hosts you can have on each subnet.
  • Page 445: Example: Four Subnets

    Example: Four Subnets The above example illustrated using a 25-bit subnet mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00, 01, 10 and 11. The subnet mask is 26 bits (11111111.11111111.11111111.11000000) or 255.255.255.192.
  • Page 446: Example Eight Subnets

    Prestige 2602HW Series User’s Guide Table 160 Subnet 4 IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.192 Broadcast Address: 192.168.1.255 Example Eight Subnets Similarly use a 27-bit mask to create 8 subnets (001, 010, 011, 100, 101, 110). The following table shows class C IP address last octet values for each subnet.
  • Page 447: Subnetting With Class A And Class B Networks

    Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets available for subnetting and a class “A” address has three host ID octets (Table 150 on page The following table is a summary for class “B”...
  • Page 448 Prestige 2602HW Series User’s Guide...
  • Page 449: Pppoe

    PPPoE in Action An ADSL modem bridges a PPP session over Ethernet (PPP over Ethernet, RFC 2516) from your computer to an ATM PVC (Permanent Virtual Circuit) which connects to a DSL Access Concentrator where the PPP session terminates support any number of PPP sessions from your LAN. PPPoE provides access control and billing functionality in a manner similar to dial-up services using PPP.
  • Page 450: How Pppoe Works

    Prestige 2602HW Series User’s Guide Figure 279 Single-Computer per Router Hardware Configuration How PPPoE Works The PPPoE driver makes the Ethernet appear as a serial link to the computer and the computer runs PPP over it, while the modem bridges the Ethernet frames to the Access Concentrator (AC).
  • Page 451: Wireless Lan And Ieee 802.11

    Wireless LAN and IEEE 802.11 A wireless LAN (WLAN) provides a flexible data communications system that you can use to access various services (navigating the Internet, E-mail, printer services, etc.) without the use of a cabled connection. In effect a wireless LAN environment provides you the freedom to stay connected to the network while roaming around in the coverage area.
  • Page 452: Ad-Hoc Wireless Lan Configuration

    Prestige 2602HW Series User’s Guide Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless nodes or stations (STA), which is called a Basic Service Set (BSS). In the most basic form, a wireless LAN connects a set of computers with wireless adapters. Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 453: Figure 282 Ess Provides Campus-Wide Coverage

    Prestige 2602HW Series User’s Guide Figure 282 ESS Provides Campus-Wide Coverage...
  • Page 454 Prestige 2602HW Series User’s Guide...
  • Page 455: Wireless Lan With Ieee 802.1X

    Wireless LAN With IEEE 802.1x As wireless networks become popular for both portable computing and corporate networks, security is now a priority. Security Flaws with IEEE 802.11 Wireless networks based on the original IEEE 802.11 have a poor reputation for safety. The IEEE 802.11b wireless access standard, first published in 1999, was based on the MAC address.
  • Page 456: Radius Server Authentication Sequence

    Prestige 2602HW Series User’s Guide RADIUS Server Authentication Sequence The following figure depicts a typical wireless network with a remote RADIUS server for user authentication using EAPOL (EAP Over LAN). Figure 283 Sequences for EAP MD5–Challenge Authentication...
  • Page 457: Types Of Eap Authentication

    Types of EAP Authentication This appendix discusses three popular EAP authentication types: EAP-MD5, EAP-TLS and EAP-TTLS. The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method.
  • Page 458: Leap

    Prestige 2602HW Series User’s Guide LEAP LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE802.1x. Table 164 Comparison of EAP Authentication Types Mutual Authentication Certificate – Client Certificate – Server Dynamic Key Exchange Credential Integrity Deployment Difficulty Client Identity Protection EAP-MD5 EAP-TLS EAP-TTLS...
  • Page 459: Triangle Route

    The Ideal Setup When the firewall is on, your Prestige acts as a secure gateway between your LAN and the Internet. In an ideal network topology, all incoming and outgoing network traffic passes through the Prestige to protect your LAN against attacks. Figure 284 Ideal Setup The “Triangle Route”...
  • Page 460: The "Triangle Route" Solutions

    Prestige 2602HW Series User’s Guide Figure 285 “Triangle Route” Problem The “Triangle Route” Solutions This section presents you two solutions to the “triangle route” problem. IP Aliasing IP alias allows you to partition your network into logical sections over the same Ethernet interface.
  • Page 461: Gateways On The Wan Side

    Prestige 2602HW Series User’s Guide Gateways on the WAN Side A second solution to the “triangle route” problem is to put all of your network gateways on the WAN side as the following figure shows. This ensures that all incoming network traffic passes through your Prestige to your LAN.
  • Page 462 Prestige 2602HW Series User’s Guide...
  • Page 463: Internal Sptgen

    Internal SPTGEN Overview Internal SPTGEN (System Parameter Table Generator) is a configuration text file useful for efficient configuration of multiple Prestiges. Internal SPTGEN lets you configure, save and upload multiple menus at the same time using just one configuration text file – eliminating the need to navigate and configure individual SMT menus for each Prestige.
  • Page 464: Internal Sptgen Ftp Download Example

    Prestige 2602HW Series User’s Guide Some parameters are dependent on others. For example, if you disable the Configured field in menu 1 (see Figure 288 on page If you enter a parameter that is invalid in the Input column, the Prestige will not save the configuration and the command line will display the Field Identification Number.
  • Page 465: Internal Sptgen Ftp Upload Example

    Figure 291 Internal SPTGEN FTP Download Example c:\ftp 192.168.1.1 220 PPP FTP version 1.0 ready at Sat Jan 1 03:22:12 2000 User (192.168.1.1:(none)): 331 Enter PASS command Password: 230 Logged in ftp>bin 200 Type I OK ftp> get rom-t ftp>bye c:\edit rom-t (edit the rom-t text file by a text editor and save it) Note: You can rename your “...
  • Page 466: Table 166 Menu 1 General Setup (Smt Menu 1)

    Prestige 2602HW Series User’s Guide Table 165 Abbreviations Used in the Example Internal SPTGEN Screens Table ABBREVIATION MEANING Parameter Values Allowed INPUT An example of what you may enter Applies to the Prestige. The following are Internal SPTGEN screens associated with the SMT screens of your Prestige. Table 166 Menu 1 General Setup (SMT Menu 1) / Menu 1 General Setup (SMT Menu 1) 10000000 =...
  • Page 467 Table 167 Menu 3 (SMT Menu 3 (continued)) 30200001 = DHCP 30200002 = Client IP Pool Starting Address 30200003 = Size of Client IP Pool 30200004 = Primary DNS Server 30200005 = Secondary DNS Server 30200006 = Remote DHCP Server 30200008 = IP Address 30200009 =...
  • Page 468 Prestige 2602HW Series User’s Guide Table 167 Menu 3 (SMT Menu 3 (continued)) 30201008 = IP Alias #1 Incoming protocol filters Set 3 30201009 = IP Alias #1 Incoming protocol filters Set 4 30201010 = IP Alias #1 Outgoing protocol filters Set 1 30201011 = IP Alias #1 Outgoing protocol filters...
  • Page 469 Table 167 Menu 3 (SMT Menu 3 (continued)) 30500004 = RTS Threshold 30500005 = FRAG. Threshold 30500006 = 30500007 = Default Key 30500008 = WEP Key1 30500009 = WEP Key2 30500010 = WEP Key3 30500011 = WEP Key4 30500012 = Wlan Active */ MENU 3.5.1 WLAN MAC ADDRESS FILTER (SMT MENU 3.5.1) 30501001 =...
  • Page 470: Table 168 Menu 4 Internet Access Setup (Smt Menu 4)

    Prestige 2602HW Series User’s Guide Table 168 Menu 4 Internet Access Setup (SMT Menu 4) (continued) 40000002 = Active 40000003 = ISP's Name 40000004 = Encapsulation 40000005 = Multiplexing 40000006 = VPI # 40000007 = VCI # 40000008 = Service Name 40000009 = My Login 40000010 =...
  • Page 471: Table 169 Menu 12 (Smt Menu 12)

    Table 168 Menu 4 Internet Access Setup (SMT Menu 4) (continued) 40000032= RIP Version 40000033= Nailed-up Connection Table 169 Menu 12 (SMT Menu 12) / Menu 12.1.1 IP Static Route Setup (SMT Menu 12.1.1) 120101001 = IP Static Route set #1, Name 120101002 = IP Static Route set #1, Active 120101003 =...
  • Page 472 Prestige 2602HW Series User’s Guide Table 169 Menu 12 (SMT Menu 12) (continued) / Menu 12.1.4 IP Static Route Setup (SMT Menu 12.1.4) 120104001 = IP Static Route set #4, Name 120104002 = IP Static Route set #4, Active 120104003 = IP Static Route set #4, Destination IP address 120104004 =...
  • Page 473 Table 169 Menu 12 (SMT Menu 12) (continued) 120107006 = IP Static Route set #7, Metric 120107007 = IP Static Route set #7, Private / Menu 12.1.8 IP Static Route Setup (SMT Menu 12.1.8) 120108001 = IP Static Route set #8, Name 120108002 = IP Static Route set #8, Active 120108003 =...
  • Page 474 Prestige 2602HW Series User’s Guide Table 169 Menu 12 (SMT Menu 12) (continued) 120111004 = IP Static Route set #11, Destination IP subnetmask 120111005 = IP Static Route set #11, Gateway 120111006 = IP Static Route set #11, Metric 120111007 = IP Static Route set #11, Private */ Menu 12.1.12 IP Static Route Setup (SMT Menu 12.1.12) 120112001 =...
  • Page 475 Table 169 Menu 12 (SMT Menu 12) (continued) 120115002 = IP Static Route set #15, Active 120115003 = IP Static Route set #15, Destination IP address 120115004 = IP Static Route set #15, Destination IP subnetmask 120115005 = IP Static Route set #15, Gateway 120115006 = IP Static Route set #15, Metric 120115007 =...
  • Page 476: Table 170 Menu 15 Sua Server Setup (Smt Menu 15)

    Prestige 2602HW Series User’s Guide Table 170 Menu 15 SUA Server Setup (SMT Menu 15) (continued) 150000014 = SUA Server #4 Port Start 150000015 = SUA Server #4 Port End 150000016 = SUA Server #4 Local IP address 150000017 = SUA Server #5 Active 150000018 = SUA Server #5 Protocol...
  • Page 477: Table 171 Menu 21.1 Filter Set #1 (Smt Menu 21.1)

    Table 170 Menu 15 SUA Server Setup (SMT Menu 15) (continued) 150000048 = SUA Server #11 Protocol 150000049 = SUA Server #11 Port Start 150000050 = SUA Server #11 Port End 150000051 = SUA Server #11 Local IP address 150000052 = SUA Server #12 Active 150000053 = SUA Server #12 Protocol...
  • Page 478 Prestige 2602HW Series User’s Guide Table 171 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) / Menu 21.1.1.2 set #1, rule #2 (SMT Menu 21.1.1.2) 210102001 = IP Filter Set 1,Rule 2 Type 210102002 = IP Filter Set 1,Rule 2 Active 210102003 = IP Filter Set 1,Rule 2 Protocol 210102004 =...
  • Page 479 Table 171 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210103013 = IP Filter Set 1,Rule 3 Act Match 210103014 = IP Filter Set 1,Rule 3 Act Not Match / Menu 21.1.1.4 set #1, rule #4 (SMT Menu 21.1.1.4) 210104001 = IP Filter Set 1,Rule 4 Type 210104002 =...
  • Page 480: Table 172 Menu 21.1 Filer Set #2, (Smt Menu 21.1)

    Prestige 2602HW Series User’s Guide Table 171 Menu 21.1 Filter Set #1 (SMT Menu 21.1) (continued) 210105009 = IP Filter Set 1,Rule 5 Src Subnet Mask 210105010 = IP Filter Set 1,Rule 5 Src Port 210105011 = IP Filter Set 1,Rule 5 Src Port Comp 210105013 = IP Filter Set 1,Rule 5 Act Match 210105014 =...
  • Page 481 Table 172 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) / Menu 21.1.2.1 Filter set #2, rule #1 (SMT Menu 21.1.2.1) 210201001 = IP Filter Set 2, Rule 1 Type 210201002 = IP Filter Set 2, Rule 1 Active 210201003 = IP Filter Set 2, Rule 1 Protocol 210201004 =...
  • Page 482 Prestige 2602HW Series User’s Guide Table 172 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210202009 = IP Filter Set 2, Rule 2 Src Subnet Mask 210202010 = IP Filter Set 2,Rule 2 Src Port 210202011 = IP Filter Set 2, Rule 2 Src Port Comp 210202013 = IP Filter Set 2, Rule 2 Act Match...
  • Page 483 Table 172 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210204002 = IP Filter Set 2, Rule 4 Active 210204003 = IP Filter Set 2, Rule 4 Protocol 210204004 = IP Filter Set 2, Rule 4 Dest IP address 210204005 = IP Filter Set 2, Rule 4 Dest Subnet Mask...
  • Page 484 Prestige 2602HW Series User’s Guide Table 172 Menu 21.1 Filer Set #2, (SMT Menu 21.1) (continued) 210205011 = IP Filter Set 2, Rule 5 Src Port Comp 210205013 = IP Filter Set 2, Rule 5 Act Match 210205014 = IP Filter Set 2, Rule 5 Act Not Match / Menu 21.1.2.6 Filter set #2, rule #6 (SMT Menu 21.1.2.5) 210206001 =...
  • Page 485: Table 173 Menu 23 System Menus (Smt Menu 23)

    Table 173 Menu 23 System Menus (SMT Menu 23) */ Menu 23.1 System Password Setup (SMT Menu 23.1) 230000000 = System Password */ Menu 23.2 System security: radius server (SMT Menu 23.2) 230200001 = Authentication Server Configured 230200002 = Authentication Server Active 230200003 = Authentication Server IP Address 230200004 =...
  • Page 486: Command Examples

    Prestige 2602HW Series User’s Guide Table 173 Menu 23 System Menus (SMT Menu 23) (continued) 230400008 = WPA Mixed Mode 230400009 = Data Privacy for Broadcast/ Multicast packets 230400010 = WPA Broadcast/Multicast Key Update Timer Table 174 Menu 24.11 Remote Management Control (SMT Menu 24.11) / Menu 24.11 Remote Management Control (SMT Menu 24.11) 241100001 = TELNET Server Port...
  • Page 487 Table 175 Command Examples (continued) 990000001 = ADSL OPMD Prestige 2602HW Series User’s Guide INPUT INPUT <0(etsi)|1(normal) |2(gdmt)|3(multimo de)>...
  • Page 488 Prestige 2602HW Series User’s Guide...
  • Page 489: Command Interpreter

    The following describes how to use the command interpreter. Enter 24 in the main menu to bring up the system maintenance menu. Enter 8 to go to Menu 24.8 - Command Interpreter Mode. See the included disk or zyxel.com for more detailed information on these commands. Note: Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable.
  • Page 490 Prestige 2602HW Series User’s Guide...
  • Page 491: Firewall Commands

    Sys Firewall Commands The following describes the firewall commands. See the Command Interpreter appendix for information on the command structure. these commands must be preceded by them. For example, type firewall. Table 176 Sys Firewall Command disp active <yes|no> disp clear pktdump dynamicrule...
  • Page 492 Prestige 2602HW Series User’s Guide...
  • Page 493: Boot Commands

    The BootModule AT commands execute from within the router’s bootup software, when debug mode is selected before the main router firmware is started. When you start up your Prestige, you are given a choice to go into debug mode by pressing a key at the prompt shown in the following screen.
  • Page 494: Figure 294 Boot Module Commands

    Prestige 2602HW Series User’s Guide Figure 294 Boot Module Commands just answer OK ATHE print help ATBAx change baudrate. 1:38.4k, 2:19.2k, 3:9.6k 4:57.6k 5:115.2k ATENx,(y) set BootExtension Debug Flag (y=password) ATSE show the seed of password generator ATTI(h,m,s) change system time to hour:min:sec or show current time ATDA(y,m,d) change system date to year/month/day or show...
  • Page 495: Log Descriptions

    This appendix provides descriptions of example log messages. Table 177 System Maintenance Logs LOG MESSAGE Time calibration is successful Time calibration failed WAN interface gets IP: %s DHCP client IP expired DHCP server assigns %s Successful SMT login SMT login failed Successful WEB login WEB login failed Successful TELNET login...
  • Page 496: Table 178 System Error Logs

    Prestige 2602HW Series User’s Guide Table 177 System Maintenance Logs (continued) LOG MESSAGE Configuration Change: PC = 0x%x, Task ID = 0x%x Successful SSH login SSH login failed Successful HTTPS login HTTPS login failed Table 178 System Error Logs LOG MESSAGE %s exceeds the max.
  • Page 497: Table 180 Tcp Reset Logs

    Table 180 TCP Reset Logs LOG MESSAGE Under SYN flood attack, sent TCP RST Exceed TCP MAX incomplete, sent TCP RST Peer TCP state out of order, sent TCP RST Firewall session time out, sent TCP RST Exceed MAX incomplete, sent TCP RST Access block, sent TCP Table 181 Packet Filter Logs...
  • Page 498: Table 183 Cdr Logs

    Prestige 2602HW Series User’s Guide Table 182 ICMP Logs (continued) LOG MESSAGE Triangle route packet forwarded: ICMP Packet without a NAT table entry blocked: ICMP Unsupported/out-of-order ICMP: ICMP Router reply ICMP packet: ICMP Table 183 CDR Logs LOG MESSAGE board %d line %d channel %d, call %d, %s C01 Outgoing Call dev=%x ch=%x %s board %d line %d channel %d,...
  • Page 499: Table 185 Upnp Logs

    Table 185 UPnP Logs LOG MESSAGE UPnP pass through Firewall Table 186 Content Filtering Logs LOG MESSAGE DESCRIPTION The content of a requested web page matched a user defined keyword. %s: block keyword The system forwarded web content. For type and code details, see Table 190 on page Table 187 Attack Logs LOG MESSAGE...
  • Page 500: Table 188 802.1X Logs

    Prestige 2602HW Series User’s Guide Table 187 Attack Logs (continued) LOG MESSAGE ip spoofing - no routing entry ICMP (type:%d, code:%d) vulnerability ICMP (type:%d, code:%d) traceroute ICMP (type:%d, code:%d) Table 188 802.1X Logs LOG MESSAGE Local User Database accepts user. Local User Database reports user credential error.
  • Page 501: Table 189 Acl Setting Notes

    Table 188 802.1X Logs (continued) LOG MESSAGE No Server to authenticate user. Local User Database does not find user`s credential. Table 189 ACL Setting Notes PACKET DIRECTION DIRECTION (L to W) LAN to WAN (W to L) WAN to LAN (L to L/Prestige) LAN to LAN/ Prestige...
  • Page 502: Table 191 Syslog Logs

    Prestige 2602HW Series User’s Guide Table 190 ICMP Notes (continued) TYPE CODE Table 191 Syslog Logs LOG MESSAGE <Facility*8 + Severity>Mon dd hr:mm:ss hostname src="<srcIP:srcPort>" dst="<dstIP:dstPort>" msg="<msg>" note="<note>" devID="<mac address last three numbers>" cat="<category> Table 192 SIP Logs LOG MESSAGE SIP Registration Success by SIP:SIP Phone Number SIP Registration Fail by...
  • Page 503: Table 193 Rtp Logs

    Table 193 RTP Logs LOG MESSAGE Error, RTP init fail Error, Call fail: RTP connect fail Error, RTP connection cannot close Table 194 FSM Logs: Caller Side LOG MESSAGE VoIP Call Start Ph[Phone Port Number] <- Outgoing Call Number VoIP Call Established Ph[Phone Port] ->...
  • Page 504: Log Commands

    1 Use the sys logs load configure which logs the Prestige is to record. 2 Use sys logs category Figure 295 Displaying Log Categories Example Copyright (c) 1994 - 2004 ZyXEL Communications Corp. ras> ? Valid commands are: exit wlan radius 8021x ras>...
  • Page 505: Displaying Logs

    Figure 296 Displaying Log Parameters Example ras> sys logs category access Usage: [0:none/1:log/2:alert/3:both] ras> 4 Use sys logs category record. Use 0 to not record logs for that category, 1 to record only logs for that category, 2 to record only alerts for that category, and 3 to record both logs and alerts for that category. Not every parameter is available with every category.
  • Page 506: Log Command Example

    Prestige 2602HW Series User’s Guide Log Command Example This example shows how to set the Prestige to record the access logs and alerts and then view the results. Figure 297 Log Command Example ras> sys logs load ras> sys logs category access 3 ras>...
  • Page 507: Index

    Numerics 110V AC 230V AC 64kbps 8kbps Abnormal Working Conditions Access methods Accessories ACK Message Acts of God Address mapping Address Resolution Protocol (ARP) Ad-hoc Configuration ADSL Standards 45, 51 ADSL, what is it? AH (Authentication Header) AH Protocol Airflow 47, 135 Allow Asymmetrical Route Alternative Subnet Mask Notation...
  • Page 508 Prestige 2602HW Series User’s Guide Call filtering Call filters Built-in User-defined Call Scheduling Maximum Number of Schedule Sets PPPoE Precedence Precedence Example Caller ID 73, 138 CBR (Continuous Bit Rate) CDR (Call Detail Record) CE regulations Certificate Authority Certifications change password at login Changes or Modifications Channel Interference...
  • Page 509 Destination Address Device Filter rules Device rule DHCP 51, 73, 80, 81, 149, 257, 358 DHCP client DHCP relay DHCP server DHCP Table Diagnostic Screens Diagnostic Tools Dialing Interval Differential Binary Phase Shift Keyed Modulation Differential Quadrature Phase Shift Keying Modulation Differentiated Services Diffie-Hellman Key Groups DiffServ...
  • Page 510 Prestige 2602HW Series User’s Guide Europe Exiting the SMT Expiration Duration Exposure Extended Service Set Extended Service Set (ESS) Extensible Authentication Protocol External Antenna Factory LAN Defaults Failure Compliance Rules, Part 15 FCC Rules Federal Communications Commission FHSS Filename Conventions filename conventions Filter 281, 331...
  • Page 511 Half-Open Sessions Harmful Interference Hidden Menus Hidden node High Voltage Points Hop Count 300, 307 Host Host IDs HTTP 123, 155, 157, 158, 409, 410 HyperTerminal 378, 379 HyperTerminal program 370, 373 IANA 66, 67 IANA (Internet Assigned Number Authority) IBSS ICMP echo ID Type and Content...
  • Page 512 Prestige 2602HW Series User’s Guide IP Static Route IP Static Route Setup IPSec IPSec Algorithm IPSec algorithm IPSec Algorithms 197, 201 IPSec and NAT IPSec Architecture IPSec rule IPSec standard IPSec VPN Capability ISDN (Integrated Synchronous Digital System) ITSP ITU-T Jitter Buffer Keep Alive Key Fields For Configuring Rules...
  • Page 513 Modem Modifications Moving the Cursor MSDU (MAC Service Data Unit) Multicast 82, 300 Multimedia Multiple SIP Accounts Multiple Voice Channels Multiplexing 52, 64, 65, 293, 296 multiplexing 52, 64 LLC-based VC-based Multiprotocol Encapsulation My IP Address My WAN Address N/A Fields Nailed-Up Connection 66, 123, 124, 340 Address mapping rule...
  • Page 514 Prestige 2602HW Series User’s Guide PHONE 1 and 2 Ports Phone Port Screen 143, 148 Phone Port Settings 144, 148 Photocopying Ping 260, 363 Ping of Death Pipes Point to Point Protocol over ATM Adaptation Layer 5 (AAL5) Point-to-Point Point-to-Point Tunneling Protocol policy-based routing Pool POP3...
  • Page 515 REGISTER Server Port 72, 138 Registered Registered Trademark Regular Mail Related Documentation Relay to PSTN Relocate Re-manufactured Remote Authentication Dial-In User Service Remote DHCP Server Remote Management Firewall Remote Management and NAT Remote Management Limitations 229, 388 Remote Management Setup Remote Node 295, 356 Remote Node Profile...
  • Page 516 Prestige 2602HW Series User’s Guide Security Parameter Index (SPI) Security Parameters security protocols Security Ramifications Separation Between Equipment and Receiver Serial Number Server 43, 122, 315, 317, 319, 320, 322, 323, 384 Server behind NAT Service 5, 6, 171 Service Personnel Service Type 180, 420 Services...
  • Page 517 System Information System Status System Information System Information & Diagnosis System Maintenance 250, 355, 357, 366, 369, 376, 377, 381, 382, 384 System Management Terminal 265, 267 System Parameter Table Generator System password System Security System Statistics System Status 253, 255, 356 System Timeout 230, 389 Talk Time...
  • Page 518 Prestige 2602HW Series User’s Guide User Authentication User Name User Profiles user profiles 47, 143 VAD Support Value Variable Bit Rate VBR (Variable Bit Rate) VC-based Multiplexing Vendor Ventilation Slots Viewing Certifications Virtual Channel Identifier Virtual Channel Identifier (VCI) Virtual Circuit ID Virtual Local Area Network Virtual Path Identifier Virtual Path Identifier (VPI)
  • Page 519 XMODEM protocol Zero Configuration Zero Configuration Internet Access Zero configuration Internet access ZyNOS 3, 366 ZyNOS (ZyXEL Network Operating System) ZyNOS F/W Version ZyXEL Communications Corporation ZyXEL Home Page ZyXEL Limited Warranty Note ZyXEL Network Operating System ZyXEL_s Firewall Introduction Index...

This manual is also suitable for:

Prestige 2602hw seriesPrestige 2602hwi

Table of Contents