ZyXEL Communications Prestige 320W Support Notes
ZyXEL Communications Prestige 320W Support Notes

ZyXEL Communications Prestige 320W Support Notes

802.11g wireless firewall router
Table of Contents

Advertisement

Quick Links

Prestige 320W
802.11g Wireless Firewall Router
Support Notes
Version v1.0
September 2005

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Prestige 320W and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ZyXEL Communications Prestige 320W

  • Page 1 Prestige 320W 802.11g Wireless Firewall Router Support Notes Version v1.0 September 2005...
  • Page 2: Table Of Contents

    What network interface does the new Prestige series support? ............54 How can I upload data to outside Internet over the one-way cable? ..........54 How fast can the data go? ........................54 All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 3 Is it possible to use products from a variety of vendors?..............65 What is Wi-Fi? ............................ 65 What types of devices use the 2.4GHz Band? ..................65 Does the 802.11 interfere with Bluetooth devices? ................65 All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 4 Why none of the LEDs turn on when connect the Prestige’s power?..........71 Why cannot access the Prestige from my computer? ................. 71 Why cannot access the Internet?......................71 Unable to run applications ........................73 All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 5: Application Notes

    1. IP address = 192.168.1.1, subnet mask = 255.255.255.0 (24 bits) 2. DHCP server enabled with IP pool starting from 192.168.1.33 • Setting up the PC (Windows OS) 1. Ethernet connection All PCs must have an Ethernet adapter card installed. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 6 When the drivers are updated, you will be asked if you want to restart the PC. Make sure your Prestige is powered on before answering Yes to the prompt. Repeat the above steps for each Windows PC on your network. • Setting up the Prestige router All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 7 2. Login first The default password is the ‘1234’. 3. Configure Prestige for Internet access on Network > WAN > Internet Connection The Web screen shown below takes PPPoE as the example. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 8 Select “Get automatically from ISP” if the ISP provides the IP dynamically, otherwise select “Use Fixed IP address” and enter the static IP given by ISP in the box following “MY WAN IP Address” field. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 9: Configure An Internal Server Behind Sua

    Network > NAT > Port Forwarding. The outside users can access the local server using the Prestige's WAN IP address. For example (Configuring internal FTP, Telnet, and emule server for outside access) each on a different PC you would have to make configuration as follow: All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 10 P320W Support Notes • Port numbers for some common services Service Port Number Telnet SMTP DNS (Domain Name Server) www-http (Web) All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 11: Using The Dynamic Dns (Ddns)

    After the registration, you have a hostname for your internal server and a password using to update the IP to the DDNS server. • Go to menu Maintenance > System > Dynamic DNS to configure DDNS All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 12: Network Management Using Snmp

    The Simple Network Management Protocol (SNMP) is an applications-layer protocol used to exchange the management information between network devices (e.g., routers). By using SNMP, network administrators can more easily manage network performance, find and solve network problems. The All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 13 The Internet Management Model is as shown in figure 1. Interactions between the NMS and managed devices can be any of four different types of commands: 6. Reads Read is used to monitor the managed devices, NMSs read variables that are maintained by the devices. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 14 (such as IP routing table) in managed devices. 9. Traps The managed devices to asynchronously report certain events to NMSs use trap. 2. SNMPv1 Operations SNMP itself is a simple request/response protocol. 4 SNMPv1 operations are defined as below. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 15 Specifies the type of PDU. • Request ID Associates requests with responses. • Error status Indicates an error and an error type. • Error index Associates the error with a particular object variable. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 16 When receiving any SNMP get or set requirement with wrong community, this trap is sent to the manager. 1. whyReboot (defined in ZYXEL-MIB) : When the system is going to restart (warmstart), the trap will be sent with the reason of restart before rebooting. (i) For intentional reboot: All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 17 The following screenshot describe a simple setup procedure for configuring all SNMP settings. Key Settings: Option Descriptions Enter the correct Get Community. This Get Community must match the 'Get-' and Get Community 'GetNext' community requested from the NMS. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 18: Using Prestige Traffic Redirect

    • Traffic Redirect Setup Configure parameters that determine when Prestige will forward WAN traffic to the backup gateway using web configuration. The configuration page is in Network > WAN > Traffic Redirect. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 19: Using Universal Plug N Play (Upnp)

    • Services: Services are provided by devices, such as time services provided by alarm clocks. In UPnP, services are described in XML format. Control points can set/get services information from devices. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 20 URL link. So that users can go to the device's presentation web page by the URL to control this device. • 2. Using UPnP in ZyXEL devices All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 21 Service: NAT function provided by Prestige Router Control Point: PC 1. Enable UPnP fun ction in ZyXEL device Go to Management->UPnP, check Enable UPnP service. This check box enables UPnP function in this device. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 22 2. After getting IP address, you can go to open MSN application on PC and sign in MSN server. 3. Start a Video conversation with one online user. 4. On the opposite side, your partner select Accept to accept your conversation request. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 23 P320W Support Notes 5. Finally, your video conversation is achieved. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 24: Wlan Application Notes

    Infrastructure mode, sometimes referred to as Access Point mode, is an operating mode of an 802.11b/Wi-Fi client unit. In infrastructure mode, the client unit can associate with an 802.11b/Wi-Fi Access Point and communicate with other clients in infrastructure mode through that access point. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 25 2. Configuration Wireless Access Point to Infrastructure mode using Web configurator. To configure Infrastructure mode of your P320W please follow the steps below. a. From the web configurator main menu, go to Network > Wireless LAN All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 26 To configure Infrastructure mode on your ZyAIR B-100/B-200/B-300 wireless NIC card please follow the following steps. 1. Double click on the utility icon in your windows task bar the utility will pop up on your windows screen. 2. Select configuration tab. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 27 3. Select Infrastructure from the operation mode pull down menu, fill in an SSID or leave it as any if you wish to connect to any AP than press Apply Change to take effect. 4. Click on Site Survey tab, and press search all the available AP will be listed. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 28 P320W Support Notes 5. Double click on the AP you want to associated with. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 29: Wireless Mac Address Filtering

    APs provide the capability for checking MAC address of the station before allowing it to connect to the network. This provides an additional layer of control layer in that only stations with registered MAC addresses can connect. This approach requires that the list of MAC addresses be configured. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 30 3. Select the Filter Action to allow or deny association from hosts in the list. 4. Enter the MAC Addresses which you may want to apply the filter to allow or block associations from. 5. Click Apply to make your setting work. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 31: Wep Configuration

    (i.e. a base station). The secret key is used to encrypt packets before they are transmitted, and an integrity check is used to ensure that packages are not modified during the transition. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 32 64-bits and 128-bits. Many times you will see them referenced as 40-bits and 104-bits instead. The reason for this misnomer is that the WEP key ( 40/104 bits ) is concatenated with the initialization vector ( 24 bits ) resulting in a 64/128 bit total key size. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 33 64-bit WEP key (secret key) with 10 hexadecimal digits 128-bit WEP key (secret key) with 13 characters 128-bit WEP key (secret key) with 26 hexadecimal digits You can set up the Access Point in Web configurator All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 34 1. Double click on the utility icon in your windows task bar or right click the utility icon then select 'Show Config Utility'. The utility will pop up on your windows screen. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 35 Select encryption type correspond with access point. Set up 4 Keys which correspond with the WEP Keys of access point. And select on WEP key as default key to encrypt wireless data transmission. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 36 P320W Support Notes All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 37: Ieee 802.1X

    VDSL LRE (Long Reach Ethernet), in order to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics, and of preventing access to that port in cases the authentication process fails. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 38 The station must be running 802.1x-compliant client software such as that offered in the Microsoft Windows XP operating system, Meeting House AEGIS 802.1x client and Odyssey 802.1x client. 3. Authentication Server: All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 39 When 802.1x is enabled, the authenticator controls the port authorization state by using the following control parameters. The following three authentication control parameter are applied in Wireless AP. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 40 EAP over LANs, or EAPOL. Ethernet type of EAPOL is 88-8E , two octets in length. EAPOL encapsulations are described for IEEE 802 compliant environment, such as 802.3 Ethernet, 802.11 Wireless LAN and Token Ring/FDDI. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 41 If the authentication fails, the port becomes unauthorized. When the supplicant does not need Wireless access any more, it sends EAPOL-Logoff packet to terminate its 802.1x session, the port state will become unauthorized. The following figure shows the EAPOL exchange ping-pong chart. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 42 The EAPOL packet contains the following fields: protocol version, packet type, packet body length and packet body. Most of the fields are obvious. The packet type can have four different values, and these values are described below: All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 43 AP before it can communicate on your network through ZyXEL AP. By default, the 802.1x function is disabled to allow all wireless client. You can use Web Configuration to configure it. Using WEB Configuration, All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 44 EAP within the native frame format. When the authenticator receives frames from the authentication server, the server’s frame header is removed, leaving the EAP frame, which is then encapsulated for Ethernet and sent to the supplicant. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 45 The specific exchange of EAP frames depends on the authentication method being used. The figure below shows a message exchange initiated by the client using the MD5 Challenge authentication method with a RADIUS server. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 46: Site Survey

    Walls, doors, elevator shafts, and other obstacles offer different degree of attenuation. This will cause the RF coverage pattern be irregular and hard to predict. Site survey can help us overcome these problems and even provide us a map of RF coverage of the facility. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 47 3. User a notebook with wireless client installed and run it's utility. A utility will provide information such as connection speed, current used channel, associated rate, link quality, signal strength and etc information as shown in utility below. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 48 Record down the changes at point where transfer rate drop and the link quality and signal strength information on the diagram as you go alone. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 49 7. You may need more than one access point is the RF coverage area have not cover all the wireless service area you needed. 8. Repeat step 1~6 of survey on site as necessary, upon completion you will have an diagram and information of site survey. As illustrated below. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 50: Faq

    What is the P320W 802.11g Wireless Firewall Router? The P320W 802.11g Wireless Firewall Router integrated with wireless LAN, Access Point, firewall and 4-port switch is designed for residential and home users. The P320W provides a robust Firewall to protect All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 51: Will The P320W Work With My Internet Connection

    There are some service providers running of PPPoE today. Before configuring PPPoE in the Prestige, please make sure your ISP supports PPPoE. Does the Prestige support PPPoE? Yes. The Prestige supports PPPoE. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 52: How Do I Know I Am Using Pppoe

    These are just a few of many benefits you can enjoy when you put the whole office on-line with the Prestige Internet Security Gateway. Does Prestige support dynamic IP addressing? The Prestige supports either a static or dynamic IP address from ISP. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 53: What Is The Difference Between The Internal Ip And The Real Ip From My Isp

    The gateway approach is more efficient than the proxy during the processing of TCP/IP commands. As a result, the Prestige Internet Access Sharing Router achieves 10% to 20% higher performance than that of software solutions such as WinGate. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 54: Is It Possible To Access A Server Running Behind Sua From The Outside Internet? If Possible, How

    Internet. Different models of PCs and Macs are able to handle IP traffic at varying speeds. Very few can handle it at 30 Mbps. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 55: My Prestige Can Not Get An Ip Address From The Isp To Connect To The Internet, What Can I Do

    Some ISPs only provide an IP address to the user with an authorized MAC address. This authorized MAC can be the PC's MAC which is used by the ISP for the authentication. So, if a new network card is used or All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 56 Name' of the PC in the 'Networking' settings. When the Prestige is attached to the cable modem to connect to the ISP, we should configure this host name in the Prestige's system. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 57: What Is Bootp/Dhcp

    DNS name (e.g., www.zyxel.com.tw) for your server (e.g., Web server) from a DDNS server. The outside users can always access the web server using the www.zyxel.com.tw regardless of the WAN IP of the Prestige. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 58: When Do I Need Ddns Service

    P320W's LAN network, incoming traffic will be allowed by Stateful Inspection mechanism. However, if the session is initiated from WAN side and there is no related access rule for the incoming traffic, the All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 59: Firewall Faq

    A proxy server is an application gateway or circuit-level gateway that runs on top of general operating system such All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 60: What Kind Of Firewall Is The P320W

    There are four types of DoS attacks: 1. Those that exploits bugs in a TCP/IP implementation such as Ping of Death and Teardrop. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 61: What Is Ping Of Death Attack

    A Smurf hacker flood a destination IP address of each packet is the broadcast address of the network, the router will broadcast the All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 62: What Is Ip Spoofing Attack

    This mobility supports productivity and service opportunities not possible with wired networks. b. Installation Speed and Simplicity: Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 63: What Are The Disadvantages Of Wireless Lans

    Ethernet connection that broadcasts information using radio signals. AP typically acts as a bridge for the clients. It can pass information to wireless LAN cards that have been installed in computers or laptops allowing those computers to connect to the campus network and the Internet without wires. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 64: What Is Ieee 802.11

    An 802.11b radio card will interface directly with an 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. The range at 54 Mbps is less than for 802.11b operating at 11 Mbps. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 65: Is It Possible To Use Products From A Variety Of Vendors

    Metals reflect radio waves and concrete attenuates radio waves. The amount of attenuation suffered in passing through concrete will be a function of its thickness and amount of metal re-enforcement used. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 66: What Are Potential Factors That May Causes Interference Among Wlan Products

    This depends on the surrounding terrain, the diameter of the client population, and the number of clients. If an area is large with dispersed pockets of populations then extension points can be used for extend coverage. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 67: What Is Direct-Sequence Spread Spectrum Technology - (Dsss)

    SSID can communicate with base stations having the same SSID. SSID from a security point of view acts as a simple single shared password between base stations and clients. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 68: What Is An Essid

    No. 128-bit WEP will not communicate with 64-bit WEP. Although 128 bit WEP also uses a 24 bit Initialization Vector, but it uses a 104 bit as secret key. Users need to use the same encryption level in order to make a connection. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 69: Can The Ssid Be Encrypted

    Share Key: The optional authentication that involves a more rigorous exchange of frames, ensuring that the requesting station is authentic. For a station to use shared key authentication, it must implement WEP. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 70: What Is 802.1X

    It allows user information to be sent to a central database running on a RADIUS Server, where it is verified. RADIUS also provides a mechanism for accounting. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 71: Trouble Shooting

    Check if the 'Host Name' is valid, e.g., @home If you are not able to get the Internet IP from the ISP, check which authentication method your ISP uses and troubleshoot the problem as described below All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 72 Name' of the PC in the 'Networking' settings. When the Prestige is attached to the cable modem to connect to the ISP, we should configure this host name in the Prestige's system. All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 73: Unable To Run Applications

    ZyXEL SUA Supporting Table Application Outgoing Connection Incoming Connection HTTP None 80/client IP None 21/client IP TELNET None 23/client IP (and remove Telnet filter in WAN port) POP3 None 110/clinet IP SMTP None 25/client IP All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 74 Default/client IP QuakeIII1.05 beta None StartCraft. 6112/client IP Quick Time 4.0 None 5631/client IP pcAnywhere 8.0 None 5632/client IP 22/client IP IPsec (ESP tunneling mode, None (one client only) Default/Client NAT-T tunnel/transport) All contents copyright (c) 2005 ZyXEL Communications Corporation.
  • Page 75 5500/client IP Virtual Network None 5800/client IP Computing (VNC) 5900/client IP e-Donkey None 4661 - 4662/client IP POLYCOM Video None Default/client IP Conferencing iVISTA 4.1 None 80/server IP Microsoft Xbox Live None All contents copyright (c) 2005 ZyXEL Communications Corporation.

Table of Contents