ZyXEL Communications Vantage CNM 2.0 User Manual
ZyXEL Communications Vantage CNM 2.0 User Manual

ZyXEL Communications Vantage CNM 2.0 User Manual

Centralized network management
Hide thumbs Also See for Vantage CNM 2.0:
Table of Contents

Advertisement

Quick Links

Vantage CNM 2.0
Centralized Network Management
User's Guide
Version 2.0.00.61.00
April 2004

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications Vantage CNM 2.0

  • Page 1 Vantage CNM 2.0 Centralized Network Management User’s Guide Version 2.0.00.61.00 April 2004...
  • Page 3 ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Refer to the appendices for open sourced software announcements. Copyright...
  • Page 4: Zyxel Limited Warranty

    Vantage CNM 2.0 ZyXEL Limited Warranty ZyXEL warrants that (a) the Vantage CNM 2.0 software (henceforth called the SOFTWARE) will perform substantially in accordance with the accompanying written materials for a period of ninety (90) days from the date of receipt, and (b) any Support Services provided by ZyXEL shall be substantially as described in applicable written materials provided to you by ZyXEL, and ZyXEL support engineers will make commercially reasonable efforts to solve any problem issues.
  • Page 5: Customer Support

    Vantage CNM 2.0 Customer Support Please have the following information ready when you contact customer support. • Warranty Information. • Date that you received your software. • Brief description of the problem and the steps you took to solve it.
  • Page 6: Table Of Contents

    Table of Contents Copyright ..............................i ZyXEL Limited Warranty .......................... ii Customer Support ........................... iii List of Figures............................viii List of Tables............................xi Preface ..............................xiv INTRODUCING VANTAGE ......................1-1 Key Features ..........................1-1 Vantage Requirements and Installation ..................1-2 GUI INTRODUCTION ........................2-1 Main Menu Components ......................2-1 Object Pane..........................2-1 Content Pane ..........................2-5 Icon Key .............................2-7...
  • Page 7 Vantage CNM 2.0 CONFIGURATION > WLAN ......................6-1 Wireless LAN Overview ......................6-1 Wireless LAN Basics........................6-1 Configuring Wireless LAN......................6-3 Configuring MAC Filter.......................6-4 802.1x Overview ........................6-5 Local User Database........................6-8 Configuring RADIUS ........................6-11 CONFIGURATION > DMZ ......................7-1 DMZ Overview ...........................7-1 DMZ Addresses .........................7-1 Configuring DMZ ........................7-1 CONFIGURATION >...
  • Page 8 13.1 Device Logs ......................... 13-1 13.2 Device Logging Options ...................... 13-1 13.3 Purge Logs .......................... 13-3 CONFIGURATION > ADSL MONITOR.................. 14-1 14.1 Introduction .......................... 14-1 14.2 Configuring ADSL Monitor....................14-1 CONFIGURATION > DEVICE ALARMS................15-1 15.1 Device Alarms........................15-1 BUILDING BLOCK ......................... 16-1 16.1 BB Categories........................
  • Page 9 Vantage CNM 2.0 Appendix C Java Console Debug Messages ..................M Appendix D IP Subnetting........................O Appendix E Open Software Announcements ..................U Table of Contents...
  • Page 10: List Of Figures

    Vantage CNM 2.0 List of Figures 2-1 M _________________________________________________________________ 2-1 IGURE CREEN 2-2 O ________________________________________________________ 2-2 IGURE BJECT YPES 2-3 D _______________________________________________________________ 2-2 IGURE ETAILS CREEN 2-4 F ____________________________________________________ 2-3 IGURE OLDER IGHT LICK PTIONS 2-5 A __________________________________________________________________ 2-3 IGURE...
  • Page 11 Vantage CNM 2.0 8-6 T WAN S __________________________________________________ 8-10 IGURE RAFFIC EDIRECT ETUP 8-7 T LAN S ___________________________________________________ 8-10 IGURE RAFFIC EDIRECT ETUP 8-8 C > WAN > D – Z WALL_________________________________ 8-11 IGURE ONFIGURATION ACKUP 8-9 C > WAN > D >...
  • Page 12 17-7 S > A __________________________________________ 17-6 IGURE YSTEM DMINISTRATOR ERMISSIONS 18-1 S > V ____________________________________________________ 18-1 IGURE YSTEM ANTAGE TATUS 18-2 S > L > L ______________________________________ 18-2 IGURE YSTEM ICENSE ICENSE ANAGEMENT 18-3 S > L > L > U ____________________________ 18-3 IGURE YSTEM...
  • Page 13: List Of Tables

    Vantage CNM 2.0 List of Tables 2-1M ..........................2-6 ABLE ENUS VERVIEW ..........................2-7 ABLE BJECT CONS 2-3 P ......................... 2-8 ABLE ENUS CONS 2-4 C ........................2-8 ABLE ONTENT CONS 2-5 VPN E ..........................2-9 ABLE DITOR CONS 3-1 D >...
  • Page 14 11-1 AH ESP ...........................11-2 ABLE 11-2 VPN NAT ..........................11-3 ABLE 11-3 L ID T ...................11-4 ABLE OCAL YPE AND ONTENT IELDS 11-4 P ID T ....................11-5 ABLE YPE AND ONTENT IELDS 11-5 C > VPN........................11-7 ABLE ONFIGURATION 11-6 C > VPN > T .................11-8 ABLE ONFIGURATION...
  • Page 15 Vantage CNM 2.0 18-13 S > A ......................18-13 ABLE YSTEM DDRESS 18-14 S > A ..................18-13 ABLE YSTEM DDRESS 18-15 S > C > I ............18-15 ABLE YSTEM ERTIFICATE ANAGEMENT NFORMATION 18-16 S > C > C CSR ............
  • Page 16: Preface

    Vantage CNM 2.0 Preface Introducing Vantage Centralized Network Management (CNM) 2.0 Vantage Centralized Network Management 2.0 is a cost-effective, browser-based global management solution that allows an administrator from any location to easily configure, manage, monitor and troubleshoot ZyXEL devices located worldwide.
  • Page 17: Introducing Vantage

    Vantage CNM 2.0 1 Introducing Vantage This chapter introduces Vantage key features and Vantage requirements. Key Features 1.1.1 Object Tree View The object tree has three defined views letting you view the devices directly as you configure them. The views are Account (arranged by customer name), Type (arranged by device type) and Main View up to seven layers deep.
  • Page 18: Vantage Requirements And Installation

    1.1.15 License Management Simply login into www.myZyXEL.com to acquire a new activation key when you purchase an expansion license letting you manage yet even more devices with Vantage CNM 2.0. Vantage Requirements and Installation For Vantage setup requirements, access and installation, see the Quick Start Guide.
  • Page 19: Gui Introduction

    Vantage CNM 2.0 2 GUI Introduction Object path Main Menus Menu Path Search for devices Content Screen Object Tree Device Views Object Pane Content Pane Figure 2-1 Main Screen Main Menu Components The main screen consists of two non-resizable panes; the object pane and the content pane.
  • Page 20 Vantage CNM 2.0 Figure 2-2 Object Tree View Types • In the MainView, you may create group folders and account folders up to seven layers deep and add devices to each layer correspondingly. You can only configure devices in the main view.
  • Page 21: Figure 2-4 Folder Right -Click

    Vantage CNM 2.0 Figure 2-4 Folder Right-Click Options Add device. Displays an Add devices screen from which you can select devices not yet mapped to another folder. Figure 2-5 Add Devices Delete. • This option displays a screen asking you if you want to delete the root folder and un-map the devices within the folder to the Add devices screen or •...
  • Page 22: Figure 2-6 Associatea

    Vantage CNM 2.0 Figure 2-6 Associate Administrators An administrator icon appears on the folder when you associate an administrator with a folder. To disassociate the administrator from this folder, right-click to select the icon and UnAssociate. Figure 2-7 Associated Administrator Right-Click Options Add folder.
  • Page 23: Content Pane

    Vantage CNM 2.0 Figure 2-9 Account Folder Alarm Right-Click Options 2.2.4 Devices Right-click a device options are: Figure 2-10 Device Right-Click Options 1. Unmap. The device disappears from the tree and goes to the available pool screen from which you can map.
  • Page 24: Adsl Monitor

    Vantage CNM 2.0 • If the selected device does not have a certain configuration, DMZ or wireless for example, then DMZ or WLAN will appear grayed out in the Configuration menu list. If this happens and you cannot access the last click menu, then you will be redirected to Device >...
  • Page 25: Icon Key

    If you do not want to see “Java Applet Window” in context-sensitive menus, then do the following: Step 1. On the Vantage CNM server, go to Vantage CNM 2.0 installation directory\utilities (the default installation path is C:\Program Files\ZyXEL\Vantage CNM 2.0\utilities) and copy the “java.policy” file.
  • Page 26: Table 2-3 Pop-Up Menus Icons

    Vantage CNM 2.0 This is a ZyWALL device turned off with an alarm and will have a firmware upload. This is a ZyWALL device turned on. This is a ZyWALL device with an alarm. This is a ZyWALL device turned on with an alarm and has firmware uploading.
  • Page 27 Vantage CNM 2.0 Click Yes to confirm your configuration edit. Click No to cancel the configuration edit. Click Finish to complete the whole configuration. Click to Cancel the configuration and return to the previous page. Click Retrieve to get the logs from a device.
  • Page 28 Vantage CNM 2.0 Force deletes the selected tunnel even if the selected tunnel is active. Refresh the VPN monitor. Delete erases the selected tunnel if it is not active. The ZyXEL device is turned on. The ZyXEL device is turned off.
  • Page 29: The Device Menus

    Vantage CNM 2.0 3 The Device Menus Device Menus Overview The Device menus allow you to register your device, synchronize devices, and manage firmware and configuration files. Device Main Screen Device Status is the default first screen you see; the default folder in the Object pane is “root”.
  • Page 30: Device Status

    Vantage CNM 2.0 This field displays the LAN MAC address of the ZyXEL device. This field displays the IP address of the ZyXEL device. Status This field displays the operating status of the ZyXEL device. Off indicates the ZyXEL device is not currently connected to the network. On indicates the ZyXEL device is connected to the network.
  • Page 31: Figure 3-3 Device > Registration

    Import from an XML batch registration file: choose this option if you want to input a batch of devices in one go. Go to the XML folder within the Vantage CNM Installation directory (C:\Program Files\ZyXEL\Vantage CNM 2.0\xml by default). Choose the 4-devices or 100-ZyWALL10W templates and modify accordingly.
  • Page 32: Figure 3-5 Device > Registration

    Vantage CNM 2.0 Figure 3-5 Device > Registration > Wizard Choices 3.4.1 Manual Option Use the following screen to enter device information, get device configurations and set encryption options. You do not need to add NAT or firewall rules when you encrypt this traffic.
  • Page 33: Figure 3-7 Registrationw

    Vantage CNM 2.0 Table 3-3 Device > Registration > Manual Registration LABEL DESCRIPTION MAC (Hex) Enter the LAN MAC address of the ZyXEL device (without colons) in this field. Vantage uses the MAC address to identify the ZyXEL device, so make sure it is entered correctly.
  • Page 34: Device - Vantage Data Inconsistency: Synchronize

    Vantage CNM 2.0 Figure 3-8 Registration Devices imported from the selected XML files are displayed in this screen. Select the devices that you wish to import and then click the Finish button. Select All devices to import all devices that are displayed in this screen.
  • Page 35: Firmware Management

    Vantage CNM 2.0 Device Override Vantage CNM Select the radio button and click apply to have Vantage first get the WAN configuration from the device. Vantage then pulls all other current configurations from the device. The device configuration "overwrites" Vantage configurations.
  • Page 36: Figure 3-12 Device > Firmware

    Vantage CNM 2.0 FW Alias This is the firmware file name. Device Type This field displays the model. You must upload firmware to the correct model. For example firmware for P650R-11 is not compatible with the P650R-13 model. Vantage should automatically detect firmware for the device selected. Uploading incorrect firmware may damage the device.
  • Page 37: Device Firmware Upgrade

    Vantage CNM 2.0 Device Firmware Upgrade Use the Device Firmware Upgrade screen to download firmware to devices from Vantage. You may upgrade firmware to several homogeneous devices at the same time. Vantage can upload firmware from 20 to 50 devices at a time depending on your network bandwidth. You can upload firmware in the Main View or in Type View.
  • Page 38: Configuration File

    Vantage CNM 2.0 Figure 3-15 Device > Firmware Upgrade See Table 3-4 for field descriptions. Click Upgrade to begin the device upgrade process. 3.7.3 Advisory Notes on Firmware Upgrade • It is advisable to upgrade firmware during periods of low network activity, since each device must restart after firmware upload.
  • Page 39: Figure 3-17 Device > C

    Vantage CNM 2.0 The following table describes the fields in this screen Table 3-5 Device > Configuration File > Management TYPE DESCRIPTION Index This displays a number assigned to the file File Name This displays the name given to the configuration file.
  • Page 40: Figure 3-18 Device > C

    Vantage CNM 2.0 3.8.3 Configuration File Restore Use the Restore screen to overwrite a devices current configuration with a previously saved backup file or the default configuration file from either Vantage or your computer (from which you’re accessing Vantage). Be sure to upload the correct Configuration file for the device.
  • Page 41: Configuration > Select Device Bb & General

    Vantage CNM 2.0 4 Configuration > Select Device BB & General This section shows you how to use the select device building block screen and how to configure the General menus. These screens will vary depending on which model you’re configuring.
  • Page 42: Configuration General Screens

    Vantage CNM 2.0 Figure 4-1 Select Device BB Configuration General Screens Click Configuration > General to configure System, DDNS, Time Setting and Owner Info. The System tab is shown next. Configuration > Select Device BB & General...
  • Page 43: Figure 4-2 Configuration > G

    Vantage CNM 2.0 4.2.1 System Figure 4-2 Configuration > General > System – ZyWALL The following table describes the fields in this screen Table 4-1 Configuration > General > System – ZyWALL FIELD DESCRIPTION Password Enter the password used to access the device.
  • Page 44 Vantage CNM 2.0 Table 4-1 Configuration > General > System – ZyWALL FIELD DESCRIPTION Encryption Mode You may choose to encrypt traffic between the ZyXEL device and the Vantage server here. Choose from None (no encryption), DES or 3DES. The ZyXEL device must be set to the same encryption mode (and have the same encryption key) as the Vantage server.
  • Page 45: Figure 4-3 Configuration > G

    Vantage CNM 2.0 4.2.2 DDNS Use this screen to configure your DNS parameters Figure 4-3 Configuration > General > DDNS The following table describes the fields in this screen Table 4-2 Configuration > General > DDNS LABEL DESCRIPTION Active Select this check box to use dynamic DNS.
  • Page 46: Figure 4-4 Configuration > G

    Vantage CNM 2.0 Table 4-2 Configuration > General > DDNS LABEL DESCRIPTION Off Line This option is available when CustomDNS is selected in the DDNS Type field. Check with your Dynamic DNS service provider to have traffic redirected to a URL (that you can specify) while you are off line.
  • Page 47: Owner Info

    Vantage CNM 2.0 Table 4-3 Configuration > General > Time Setting LABEL DESCRIPTION Time Protocol Select the time service protocol that your timeserver sends when you turn on the device. Not all timeservers support all protocols, so you may have to check with your (or Use Time Server ISP/network administrator or use trial and error to find a protocol that works.
  • Page 48: Figure 4-5 Configuration > G

    Vantage CNM 2.0 Figure 4-5 Configuration > General > Owner Info The following table describes the fields in this screen Table 4-4 Configuration > General > Owner Info TYPE DESCRIPTION Name Type the full name of the owner of this device.
  • Page 49: Configuration > Lan

    Vantage CNM 2.0 5 Configuration > LAN LAN Overview The Configuration: LAN screen varies depending on the device type shown. Local Area Network (LAN) is a shared communication system to which many computers are attached. Use the LAN screens to configure a LAN DHCP server, manage IP addresses, and partition a physical network into logical networks.
  • Page 50: Configuring Lan Ip - Zywall

    Vantage CNM 2.0 Only, the ZyXEL device will broadcast its routing table periodically. When set to Both or In Only, it will incorporate the RIP information that it receives; when set to None, it will not send any RIP packets and will ignore any RIP packets received.
  • Page 51: Table 5-1 Configuration > Lan > Ip - Zywall

    Vantage CNM 2.0 Figure 5-1 Configuration > LAN > IP – ZyWALL The following table describes the fields in this screen Table 5-1 Configuration > LAN > IP – ZyWALL LABEL DESCRIPTION DHCP Mode DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients (computers) to obtain TCP/IP configuration at startup from a server..
  • Page 52 Vantage CNM 2.0 Table 5-1 Configuration > LAN > IP – ZyWALL LABEL DESCRIPTION DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The ZyXEL device passes a DNS (Domain Name System) server IP address (in the order you specify here) to the DHCP clients.
  • Page 53: Configuring Lan Ip - Prestige

    Vantage CNM 2.0 Table 5-1 Configuration > LAN > IP – ZyWALL LABEL DESCRIPTION Multicast Select IGMP V-1 or IGMP V-2 or None. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
  • Page 54: Table 5-2 Configuration > Lan > Ip - Prestige

    Vantage CNM 2.0 Figure 5-2 Configuration > LAN > IP – Prestige Table 5-2 Configuration > LAN > IP – Prestige LABEL DESCRIPTION DHCP Mode DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients (computers) to obtain TCP/IP configuration at startup from a server.
  • Page 55: Configuring Lan Static Dhcp - Zywall

    Vantage CNM 2.0 Table 5-2 Configuration > LAN > IP – Prestige LABEL DESCRIPTION Multicast Select IGMP V-1 or IGMP V-2 or None. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
  • Page 56: Configuring Lan Ip Alias - Zywall

    Vantage CNM 2.0 Table 5-3 Configuration > LAN > Static DHCP – ZyWALL LABEL DESCRIPTION Index This is the index number of the Static IP table entry (row). MAC Address This is the MAC address of a computer on the device’s LAN.
  • Page 57: Table 5-4 Configuration > Lan > Ip Alias

    Vantage CNM 2.0 The following table describes the fields in this screen Table 5-4 Configuration > LAN > IP Alias LABEL DESCRIPTION IP Alias 1,2 Select the check box to configure another LAN network for the ZyXEL device. IP Address Enter the IP address of the ZyXEL device in dotted decimal notation.
  • Page 59: Configuration > Wlan

    Vantage CNM 2.0 6 Configuration > WLAN This chapter shows the wireless LAN screens. Wireless LAN Overview This section introduces the wireless LAN (WLAN) and some basic scenarios. 6.1.1 Additional Installation Requirements for using 802.1x A computer with an IEEE 802.11b wireless LAN card.
  • Page 60: Rts Threshold

    Vantage CNM 2.0 Figure 6-1 RTS Threshold Wireless stations (WS) A and B do not hear each other. They can hear the AP. When station A sends data to the ZyXEL device, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 61: Configuring Wireless Lan

    Vantage CNM 2.0 6.2.5 WEP WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless stations must use the same WEP key to encrypt and decrypt data. The ZyXEL device allows you to configure up to four 64-bit or 128-bit WEP keys, but only one key can be enabled at any one time.
  • Page 62: Configuring Mac Filter

    Vantage CNM 2.0 Table 6-1 Configuration > WLAN > Wireless LABEL DESCRIPTION Enable The wireless LAN is turned off by default; before you enable the wireless LAN you should Wireless LAN configure some security by setting MAC filters and/or 802.1x security; otherwise your wireless LAN will be vulnerable upon enabling it.
  • Page 63: Overview

    Vantage CNM 2.0 Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure this screen. Select a device and then click Configuration > WLAN > MAC Filter. The screen appears as shown next.
  • Page 64: Table 6-3 Configuration > Wlan

    Vantage CNM 2.0 6.5.1 Configuring 802.1x – ZyWALL Select a ZyWALL device and then click Configuration > WLAN > 802.1x. The screen appears as shown next. Figure 6-4 Configuration > WLAN > 802.1x – ZyWALL The following table describes the fields in this screen Table 6-3 Configuration >...
  • Page 65: Table 6-4 Configuration > Wlan

    Vantage CNM 2.0 Figure 6-5 Configuration > WLAN > 802.1x – Prestige The following table describes the fields in this screen Table 6-4 Configuration > WLAN > 802.1x – Prestige LABEL DESCRIPTION Authentication Select Authentication Required to authenticate all wireless clients before they can Control access the wired network.
  • Page 66: Local User Database

    Vantage CNM 2.0 Table 6-4 Configuration > WLAN > 802.1x – Prestige LABEL DESCRIPTION Authentication The authentication database contains wireless station login information. The local user Databases database is the built-in database on the Prestige. The RADIUS is an external server.
  • Page 67: Table 6-5 Configuration > Wlan > Local User

    Vantage CNM 2.0 Figure 6-6 Configuration > WLAN > Local User The following table describes the labels in this screen. Table 6-5 Configuration > WLAN > Local User LABEL DESCRIPTION Active Select this check box to enable the user profile.
  • Page 68: Types Of Radius Messages

    Vantage CNM 2.0 RADIUS user is a simple package exchange in which the ZyXEL device acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: •...
  • Page 69: Configuring Radius

    Vantage CNM 2.0 • The RADIUS server checks the user information against its user profile database and determines whether or not to authenticate the wireless station. Configuring RADIUS Use the RADIUS screen if you want to use an external server to perform authentication.
  • Page 70 Vantage CNM 2.0 Table 6-6 Configuration > WLAN > RADIUS LABEL DESCRIPTION Server IP Enter the IP address of the external accounting server in dotted decimal notation. Port The default port of the RADIUS server for accounting is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
  • Page 71: Configuration > Dmz

    Vantage CNM 2.0 7 Configuration > DMZ DMZ Overview The DeMilitarized Zone (DMZ) auto-negotiating 10/100 Mbps Ethernet port provides a way for public servers (Web, e-mail, FTP, etc.) to be visible to the outside world (while still being protected from DoS (Denial of Service) attacks such as SYN flooding and Ping of Death).
  • Page 72: Figure 7-1 Configuration

    Vantage CNM 2.0 Figure 7-1 Configuration > DMZ The following table describes the labels in this screen. Configuration > DMZ Table 7-1 LABEL DESCRIPTION DMZ TCP/IP IP Address Type the IP address of your ZyWALL in dotted decimal notation 192.168.1.1 (factory default).
  • Page 73: Table 7-1 Configuration > Dmz

    Vantage CNM 2.0 Configuration > DMZ Table 7-1 LABEL DESCRIPTION Multicast Select IGMP V-1 or IGMP V-2 or None. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
  • Page 75: Configuration > Wan

    Vantage CNM 2.0 8 Configuration > WAN You will see different WAN screens depending on whether you’re configuring a ZyWALL or Prestige device. Be extremely vigilant when configuring a device’s WAN as an incorrect configuration could result in the device being inaccessible from Vantage (or by the web configurator from the WAN) and may necessitate a site visit to correct.
  • Page 76: Figure 8-1 Configuration

    Vantage CNM 2.0 Figure 8-1 Configuration > WAN > General – ZyWALL The following table describes the fields in this screen Configuration > WAN > General – ZyWALL Table 8-1 LABEL DESCRIPTION WAN: Route The default WAN connection is "1' as your broadband connection via the WAN port should always be your preferred method of accessing the WAN.
  • Page 77: Figure 8-2 Configuration

    Vantage CNM 2.0 Configuration > WAN > General – ZyWALL Table 8-1 LABEL DESCRIPTION Check WAN IP Configuration of this field is optional. If you do not enter an IP address here, the ZyXEL Address device will use the default gateway IP address. Configure this field to test the ZyXEL device's WAN accessibility.
  • Page 78: Pppoe Encapsulation

    Vantage CNM 2.0 Table 8-2 Configuration > WAN > ISP (Ethernet) – ZyWALL LABEL DESCRIPTION Service Type Choose from Standard, Telstra (RoadRunner Telstra authentication method), RR- Manager (Roadrunner Manager authentication method), RR-Toshiba (Roadrunner Toshiba authentication method) or Telia Login. The following fields do not appear with the Standard service type.
  • Page 79: Figure 8-3 Configuration

    Vantage CNM 2.0 Figure 8-3 Configuration > WAN > ISP ( ) – ZyWALL PPPoE The following table describes the labels in the PPPoE screen. Configuration > WAN > ISP ( ) – ZyWALL Table 8-3 PPPoE LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation The PPPoE choice is for a dial-up connection using PPPoE.
  • Page 80: Figure 8-4 Configuration

    Vantage CNM 2.0 Configuration > WAN > ISP ( ) – ZyWALL Table 8-3 PPPoE LABEL DESCRIPTION Reset Click Reset to begin configuring this screen afresh. PPTP Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks.
  • Page 81 Vantage CNM 2.0 Table 8-4 Configuration > WAN > ISP (PPTP) – ZyWALL LABEL DESCRIPTION Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks.
  • Page 82: Figure 8-5 Configuration

    Vantage CNM 2.0 8.1.2 WAN IP – ZyWALL Figure 8-5 Configuration > WAN > IP – ZyWALL The following table describes the fields in this screen Table 8-5 Configuration > WAN > IP – ZyWALL LABEL DESCRIPTION WAN IP Address Assignment Get automatically Select this option If your ISP did not assign you a fixed IP address.
  • Page 83 Vantage CNM 2.0 Table 8-5 Configuration > WAN > IP – ZyWALL LABEL DESCRIPTION Private This parameter determines if the ZyWALL will include the route to this remote node in its RIP broadcasts. If set to Yes, this route is kept private and not included in RIP broadcast.
  • Page 84: Figure 8-6 Traffic Redirect

    Vantage CNM 2.0 8.1.3 Dial Backup – ZyWALL Vantage can communicate with the device using Dial Backup if the main WAN connection goes down. Traffic Redirect Traffic redirect forwards WAN traffic to a backup gateway when the ZyWALL cannot connect to the Internet through its normal gateway.
  • Page 85: Table 8-6 Configuration > Wan > Dial Backup - Zywall

    Vantage CNM 2.0 Figure 8-8 Configuration > WAN > Dial Backup – ZyWALL The following table describes the labels in this screen. Table 8-6 Configuration > WAN > Dial Backup – ZyWALL LABEL DESCRIPTION Enable Dial Backup Select this check box to turn on dial backup.
  • Page 86 Vantage CNM 2.0 Table 8-6 Configuration > WAN > Dial Backup – ZyWALL LABEL DESCRIPTION Retype to confirm Type your password again to make sure that you have entered it correctly. Password Authentication Type Use the drop-down list box to select an authentication protocol for outgoing calls.
  • Page 87: At Command Strings

    Vantage CNM 2.0 8.1.4 Advanced Modem Setup – ZyWALL AT Command Strings For regular telephone lines, the default “Dial” string tells the modem that the line uses tone dialing. “ATDT” is the command for a switch that requires tone dialing. If your switch requires pulse dialing, change the string to “ATDP”.
  • Page 88: Table 8-7 Configuration > Wan > Dial Backup > Advanced - Zywall

    Vantage CNM 2.0 Table 8-7 Configuration > WAN > Dial Backup > Advanced – ZyWALL LABEL DESCRIPTION EXAMPLE AT Command Strings Dial Type the AT Command string to make a call. atdt Drop Type the AT Command string to drop a call. "~" represents a one second ~~+++~~ath wait, for example, "~~~+++~~ath"...
  • Page 89: Table 8-8 Configuration > Wan > Dial Backup > Edit - Zywall

    Vantage CNM 2.0 Figure 8-10 Configuration > WAN > Dial Backup > Edit – ZyWALL The following table describes the fields in this screen Table 8-8 Configuration > WAN > Dial Backup > Edit – ZyWALL LABEL DESCRIPTION Get IP Address Type the login name assigned by your ISP for this remote node.
  • Page 90: General Wan - Prestige

    Vantage CNM 2.0 Table 8-8 Configuration > WAN > Dial Backup > Edit – ZyWALL LABEL DESCRIPTION Enable SUA Network Address Translation (NAT) allows the translation of an Internet protocol address used within one network to a different IP address known within another network.
  • Page 91: Figure 8-11 Example Oft

    Vantage CNM 2.0 Peak Cell Rate (PCR) is the maximum rate at which the sender can send cells. This parameter may be lower (but not higher) than the maximum line speed. 1 ATM cell is 53 bytes (424 bits), so a maximum speed of 832Kbps gives a maximum PCR of 1962 cells/sec.
  • Page 92: Figure 8-12 Configuration

    Vantage CNM 2.0 Figure 8-12 Configuration > WAN > Setup – Prestige – Bridge Mode The following table describes the fields in this screen Table 8-9 Configuration > WAN > Setup – Prestige – Bridge Mode LABEL DESCRIPTION Name Enter the name of your Internet Service Provider, e.g., MyISP. This information is for identification purposes only.
  • Page 93 Vantage CNM 2.0 Table 8-9 Configuration > WAN > Setup – Prestige – Bridge Mode LABEL DESCRIPTION Encapsulation Select the method of encapsulation used by your ISP from the drop-down list box. Choices vary depending on the mode you select in the Mode field.
  • Page 94 Vantage CNM 2.0 Table 8-9 Configuration > WAN > Setup – Prestige – Bridge Mode LABEL DESCRIPTION Max Idle Timeout Specify an idle time-out in the Max Idle Timeout field when you select Connect on Demand. The default setting is 0, which means the Internet session will not timeout.
  • Page 95: Table 8-10 Configuration > Wan > Setup - Prestige - Routing Mode

    Vantage CNM 2.0 The following table describes the fields in this screen. Table 8-10 Configuration > WAN > Setup – Prestige – Routing Mode LABEL DESCRIPTION Name Enter the name of your Internet Service Provider, e.g., MyISP. This information is for identification purposes only.
  • Page 96 Vantage CNM 2.0 Table 8-10 Configuration > WAN > Setup – Prestige – Routing Mode LABEL DESCRIPTION PPPoE + This field is only available when PPPoE encapsulation is selected. PPPoE_Client_PC(PPPoE Select the checkbox to enable PPPoE passthrough. In addition to the Prestige's...
  • Page 97: Figure 8-14 Traffic Redirect

    Vantage CNM 2.0 Traffic Redirect Traffic redirect forwards traffic to a backup gateway when the Prestige cannot connect to the Internet. An example is shown in the figure below. Figure 8-14 Traffic Redirect Example The following network topology allows you to avoid triangle route security issues when the backup gateway is connected to the LAN or DMZ.
  • Page 98 Vantage CNM 2.0 Figure 8-16 Configuration > WAN > Backup – Prestige The following table describes the fields in this screen. 8-24 Configuration > WAN...
  • Page 99 Vantage CNM 2.0 Table 8-11 WAN Backup – Prestige LABEL DESCRIPTION Backup Type Select the method that the Prestige uses to check the DSL connection. Select DSL Link to have the Prestige check if the connection to the DSLAM is up.
  • Page 100 Vantage CNM 2.0 Table 8-11 WAN Backup – Prestige LABEL DESCRIPTION Metric This field sets this route's priority among the three routes the Prestige uses (normal, traffic redirect and dial backup). Type a number (1 to 15) to set the priority of the dial backup route for data transmission.
  • Page 101: Figure 8-17 Advanced Wan B

    Vantage CNM 2.0 Figure 8-17 Advanced WAN Backup – Prestige The following table describes the fields in this screen. Configuration > WAN 8-27...
  • Page 102: Table 8-12 Advanced Wan Backup - Prestige

    Vantage CNM 2.0 Table 8-12 Advanced WAN Backup – Prestige LABEL DESCRIPTION Basic Authentication Type Use the drop-down list box to select an authentication protocol for outgoing calls. Options are: CHAP/PAP - Your Prestige accepts either CHAP or PAP when requested by this remote node.
  • Page 103 Vantage CNM 2.0 Table 8-12 Advanced WAN Backup – Prestige LABEL DESCRIPTION Enable Multicast Select this check box to turn on IGMP (Internet Group Multicast Protocol). IGMP is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data.
  • Page 105: Configuration > Nat

    Vantage CNM 2.0 9 Configuration > NAT NAT Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network.
  • Page 106: Figure 5-1 Configuration

    Vantage CNM 2.0 9.1.3 How NAT Works Each packet has two addresses – a source address and a destination address. For outgoing packets, the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address) is the source address on the WAN.
  • Page 107: Configuring Nat

    Vantage CNM 2.0 Table 9-2 NAT Mapping Types TYPE IP MAPPING SMT ABBREVIATION Many-One-to-One ILA1 IGA1 M-1-1 ILA2 IGA2 ILA3 IGA3 … Server Server 1 IP IGA1 Server Server 2 IP IGA1 Server 3 IP IGA1 9.1.5 SUA (Single User Account) Versus NAT SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server.
  • Page 108: Sua Servers

    Vantage CNM 2.0 Table 9-3 Configuration > NAT LABEL DESCRIPTION SUA Only Select SUA Only to apply many-to-one mapping only (sufficient if the device has only one public IP address). Full Feature Select Full Feature to avail of multiple mapping types.
  • Page 109: Figure 6-2 Configuration

    Vantage CNM 2.0 Table 9-4 Services and Port Numbers SERVICES PORT NUMBER DNS (Domain Name System) Finger HTTP (Hyper Text Transfer protocol or WWW, Web) POP3 (Post Office Protocol) NNTP (Network News Transport Protocol) SNMP (Simple Network Management Protocol) SNMP trap...
  • Page 110: Table 9-5 Configuration > Nat > Sua Server

    Vantage CNM 2.0 Table 9-5 Configuration > NAT > SUA Server LABEL DESCRIPTION Index This is the number of an individual SUA server entry. You may select a rule to edit or delete it. Active Select this check box to enable the SUA server entry. Clear this checkbox to disallow forwarding of these ports to an inside server without having to delete the entry.
  • Page 111: Figure 9-3 Configuration

    Vantage CNM 2.0 Figure 9-3 Configuration > NAT > SUA Server – Prestige The following table describes the labels in this screen. Table 9-6 Configuration > NAT > SUA Server – Prestige LABEL DESCRIPTION Index This is the number of an individual SUA server entry.
  • Page 112: Figure 9-4 Configuration

    Vantage CNM 2.0 9.3.4 Full Feature Address Mapping Select Full Feature in Figure 9-1 and then click Edit to bring up the next screen. Figure 9-4 Configuration > NAT > Full Feature > Address Mapping The following table describes the labels in this screen.
  • Page 113: Figure 9-5 Configuration

    Vantage CNM 2.0 Table 9-7 Configuration > NAT > Full Feature > Address Mapping LABEL DESCRIPTION Type 1. One-to-One mode maps one local IP address to one global IP address. Note that port numbers do not change for the One-to-one NAT mapping type.
  • Page 114: Trigger Port Forwarding - Zywall

    Vantage CNM 2.0 Table 9-8 Configuration > NAT > Full Feature > Edit Address Mapping LABEL DESCRIPTION Type When you select Type you can choose a server mapping set. Choose the port mapping type from one of the following. 1. One-to-One: One-to-one mode maps one local IP address to one global IP address.
  • Page 115: Figure 9-6 Configuration

    Vantage CNM 2.0 Trigger events only happen on outgoing data (from the ZyXEL device). Only one LAN computer can use a trigger port (range) at a time. Therefore, if an application needs a continuous data stream, that port (range) will be tied up so that another computer on the LAN can’t trigger it until that stream finishes.
  • Page 116: Figure 9-7 Configuration

    Vantage CNM 2.0 Table 9-9 Configuration > NAT > Full Feature > Trigger Port LABEL DESCRIPTION Trigger The trigger port is a port (or a range of ports) that causes (or triggers) the ZyXEL device to record the IP address of the LAN computer that sent the traffic to a server on the WAN.
  • Page 117: Configuration > Static Route

    Vantage CNM 2.0 10 Configuration > Static Route This chapter shows you how to configure static route. 10.1 Static Route Overview Each remote node specifies only the network to which the gateway is directly connected, and the ZyXEL device has no knowledge of the networks beyond 10.1.1 Static Route Summary...
  • Page 118: Figure 10-2 Configuration > S

    Vantage CNM 2.0 Table 10-1 Configuration > Static Route LABEL DESCRIPTION Gateway This is the IP address of the gateway. The gateway is an immediate neighbor of the ZyXEL device that will forward the packet to the destination. On the LAN, the gateway must be a router on the same segment as the ZyXEL device;...
  • Page 119 Vantage CNM 2.0 Table 10-2 Configuration > Static Route > Edit LABEL DESCRIPTION Metric Metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks.
  • Page 121: Configuration > Vpn

    Vantage CNM 2.0 11 Configuration > VPN This chapter shows you how to configure VPNs using Vantage. 11.1 VPN Overview A VPN (Virtual Private Network) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing technologies/services used to transport traffic over the Internet or any insecure network that uses the TCP/IP protocol suite for communication.
  • Page 122: Table 11-1 Ah And Esp

    Vantage CNM 2.0 In applications where confidentiality is not required or not sanctioned by government encryption restrictions, an AH can be employed to ensure integrity. This type of implementation does not protect the information from dissemination but will allow for verification of the integrity of the information and authentication of the originator.
  • Page 123: Tunnel Mode

    Vantage CNM 2.0 Tunnel Mode Tunnel mode encapsulates the entire IP packet to transmit it securely. A Tunnel mode is required for gateway services to provide access to internal systems. Tunnel mode is fundamentally an IP tunnel with authentication and encryption. This is the most common mode of operation. Tunnel mode is required for gateway to gateway and host to gateway communications.
  • Page 124: Table 11-3 Local Id Type And Content Fields

    Vantage CNM 2.0 When there is outbound traffic with no inbound traffic, the ZyXEL device automatically drops the tunnel after two minutes. 11.1.12 NAT Traversal NAT traversal allows you to set up a VPN connection when there are NAT routers between end IPSec VPN tunnel devices.
  • Page 125: Table 11-4 Peer Id Type And Content Fields

    Vantage CNM 2.0 Table 11-3 Local ID Type and Content Fields LOCAL ID TYPE CONTENT E-mail Type an e-mail address (up to 31 characters) by which to identify this ZyXEL device. The domain name or e-mail address that you use in the Content field is used for identification purposes only and does not need to be a real domain name or e-mail address.
  • Page 126: Vpn Tunnel Summary

    Vantage CNM 2.0 when the IPSec SA lifetime period expires. The ZyXEL device also automatically renegotiates the IPSec SA if both IPSec routers have keep alive enabled, even if there is no traffic. If an IPSec SA times out, then the IPSec router must renegotiate the SA the next time someone attempts to send traffic.
  • Page 127: Table 11-5 Configuration > Vpn

    Vantage CNM 2.0 Figure 11-1 Configuration > VPN The following table describes the labels in this screen. Table 11-5 Configuration > VPN LABEL DESCRIPTION Index This is the VPN policy index number Name This field displays the identification name for this VPN policy.
  • Page 128: Table 11-6 Configuration > Vpn > Tunnel Ipsec Detail

    Vantage CNM 2.0 Figure 11-2 Configuration > VPN > Tunnel IPSec Detail The following table describes the labels in this screen. Table 11-6 Configuration > VPN > Tunnel IPSec Detail FIELD DESCRIPTION Name This is a VPN name for identification purposes.
  • Page 129 Vantage CNM 2.0 Table 11-6 Configuration > VPN > Tunnel IPSec Detail FIELD DESCRIPTION Active Protocol The ESP and AH protocols are necessary to create a Security Association (SA), the foundation of an IPSec VPN. AH protocol (RFC 2402) was designed for integrity, authentication, sequence integrity (replay resistance), and non-repudiation but not for confidentiality, for which the ESP was designed.
  • Page 130 Vantage CNM 2.0 Table 11-6 Configuration > VPN > Tunnel IPSec Detail FIELD DESCRIPTION ID Content When you select IP in the Local ID Type field, type the IP address of your computer. The ZyXEL device uses the IP address in the My IP Address field if you configure the local Content field to 0.0.0.0 or leave it blank.
  • Page 131 Vantage CNM 2.0 Table 11-6 Configuration > VPN > Tunnel IPSec Detail FIELD DESCRIPTION Pre-Shared key A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called “pre-shared” because you have to share it with another party before you can communicate with them over a secure connection.
  • Page 132 Vantage CNM 2.0 Table 11-6 Configuration > VPN > Tunnel IPSec Detail FIELD DESCRIPTION Encapsulation In Transport mode, the IP packet contains the security protocol (AH or ESP) located after the original IP header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP).
  • Page 133: Table 11-7 Configuration > Vpn > Tunnel Ipsec Detail - Edit

    Vantage CNM 2.0 11.2.2 Edit a VPN Tunnel Select a checkbox next to a VPN summary in Figure 11-1 to proceed to the next screen. Figure 11-3 Configuration > VPN > Tunnel IPSec Detail – Edit The following table describes the labels in this screen.
  • Page 134 Vantage CNM 2.0 Table 11-7 Configuration > VPN > Tunnel IPSec Detail – Edit LABEL DESCRIPTION A-End / Z-End Select the name of the ZyXEL device from the pull-down list. Device My IP This is the IP address of the local and remote computer(s) of the VPN tunnel.
  • Page 135: Vpn And Netbios

    Vantage CNM 2.0 11.3 VPN and NetBIOS NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast packets that enable a computer to find other computers. It may sometimes be necessary to allow NetBIOS packets to pass through VPN tunnels in order to allow local computers to find computers on the remote network and vice versa.
  • Page 137: Configuration > Firewall

    Vantage CNM 2.0 12 Configuration > Firewall This chapter shows you how to configure firewall for your devices. 12.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term “firewall” is a system or group of systems that enforces an access-control policy between two networks.
  • Page 138: Introduction To Zyxel's Firewall

    Vantage CNM 2.0 Firewalls, of one type or another, have become an integral part of standard security solutions for enterprises. 12.3 Introduction to ZyXEL’s Firewall The ZyXEL device firewall is a stateful inspection firewall and is designed to protect against Denial of Service attacks when activated (in SMT menu 21.2 or in the web configurator).
  • Page 139 Vantage CNM 2.0 4. IP Spoofing. 1. "Ping of Death" and "Teardrop" attacks exploit bugs in the TCP/IP implementations of various computer and host systems. Ping of Death uses a "ping" utility to create an IP packet that exceeds the maximum 65,536 bytes of data allowed by the IP specification.
  • Page 140: Stateful Inspection

    Vantage CNM 2.0 Table 12-2 ICMP Commands That Trigger Alerts ADDRESS_MASK_REPLY Illegal Commands (NetBIOS and SMTP) The only legal NetBIOS commands are the following - all others are illegal. Table 12-3 Legal NetBIOS Commands MESSAGE: REQUEST: POSITIVE: NEGATIVE: RETARGET: KEEPALIVE: All SMTP commands are illegal except for those displayed in the following tables.
  • Page 141: Stateful Inspection Process

    Vantage CNM 2.0 12.5.1 Stateful Inspection Process In this example, the following sequence of events occurs when a TCP packet leaves the LAN network through the firewall's WAN interface. The TCP packet is the first in a session, and the packet's application layer protocol is configured for a firewall rule inspection: 1.
  • Page 142: Tcp Security

    Vantage CNM 2.0 Below is a brief technical description of how these connections are tracked. Connections may either be defined by the upper protocols (for instance, TCP), or by the ZyXEL device itself (as with the "virtual connections" created for UDP and ICMP).
  • Page 143: Firewall Policies Overview

    Vantage CNM 2.0 Any protocol that operates in this way must be supported on a case-by-case basis. You can use the web configurator’s Custom Ports feature to do this. 12.6 Firewall Policies Overview Firewall rules are grouped based on the direction of travel of packets to which they apply: The following example is for a ZyWALL 100 device.
  • Page 144: Rule Logic Overview

    Vantage CNM 2.0 These custom rules work by comparing the Source IP address, Destination IP address and IP protocol type of network traffic to rules set by the administrator. Your customized rules take precedence and override the ZyXEL device’s default rules.
  • Page 145: Firewall Configuration

    Vantage CNM 2.0 Source Address What is the connection’s source address; is it on the LAN, DMZ or WAN? Is it a single IP, a range of IPs or a subnet? Destination Address What is the connection’s destination address; is it on the LAN, DMZ or WAN? Is it a single IP, a range of IPs or a subnet? 12.7.4 Alerts...
  • Page 146: Figure 12-1 Configuration >F

    Vantage CNM 2.0 Figure 12-1 Configuration >Firewall The following table describes the labels in this screen. Table 12-6 Configuration >Firewall LABEL DESCRIPTION Enable Firewall Select this check box to activate the firewall. The ZyXEL device performs access control and protects against Denial of Service (DoS) attacks when the firewall is activated.
  • Page 147: Table 12-7 Configuration > Firewall > Dos Settings

    Vantage CNM 2.0 Table 12-6 Configuration >Firewall LABEL DESCRIPTION Services This field displays the available services that may be added in from the Selected Services in the Firewall Rule screen. Action This field displays whether the rule allows (Forward) or discards (Block) packets that match this rule.
  • Page 148 Vantage CNM 2.0 Table 12-7 Configuration > Firewall > DoS Settings LABEL DESCRIPTION EXAMPLE VALUES One Minute High This is the rate of new half-open sessions that 100 half-open sessions per minute. causes the firewall to start deleting half-open The above numbers cause the sessions.
  • Page 149: Figure 12-3 Configuration >F

    Vantage CNM 2.0 In Figure 12-1, select an existing rule to edit it or click Add to create a new firewall rule. Figure 12-3 Configuration >Firewall > Edit The following table describes the labels in this screen. Table 12-8 Configuration >Firewall > Edit...
  • Page 150: Figure 12-4 Configuration >F

    Vantage CNM 2.0 Table 12-8 Configuration >Firewall > Edit LABEL DESCRIPTION Destination Click Add to add a new address, Edit to edit an existing one or Delete to delete one. Please Address see the following section on adding and editing destination addresses.
  • Page 151: Figure 12-5 Firewall Custom

    Vantage CNM 2.0 Table 12-9 Configuration >Firewall > IP Address LABEL DESCRIPTION Subnet Mask Enter the subnet mask here, if applicable. Apply Click Apply to save your customized settings and exit this screen. Cancel Click Cancel to exit this screen without saving.
  • Page 153: Configuration > Device Log

    Vantage CNM 2.0 13 Configuration > Device Log Use these screens to configure device logs. Not all devices have the centralized feature 13.1 Device Logs Select a device and then click Configuration > Device Log. Figure 13-1 Configuration > Device Log > Device The following table describes the labels in this screen.
  • Page 154: Table 13-2 Configuration > Device Logs > Log Settings

    Vantage CNM 2.0 Alerts are e-mailed as soon as they happen. Logs may be e-mailed as soon as the log is full (see Log Schedule). Selecting many alert and/or log categories (especially Access Control) may result in many e-mails being sent.
  • Page 155: Purge Logs

    Vantage CNM 2.0 Table 13-2 Configuration > Device Logs > Log Settings LABEL DESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e- mail.
  • Page 156: Figure 13-3 Purge Devicel

    Vantage CNM 2.0 Figure 13-3 Purge Device Logs The following table describes the labels in this screen. Table 13-3 Purge Device Logs LABEL DESCRIPTION Send e-mail Select the checkbox and enter valid e-mail address(es) of those who should receive a report to report on logs that have been purged.
  • Page 157: Configuration > Adsl Monitor

    Vantage CNM 2.0 14 Configuration > ADSL Monitor Use this screen to monitor your ADSL link 14.1 Introduction The Prestige is an ADSL device compatible with the ADSL/ADSL2/ADSL2+ standards. Maximum data rates attainable by the Prestige for each standard are shown in the next table.
  • Page 158: Table 14-2 Configuration > Adsl Monitor

    Vantage CNM 2.0 Table 14-2 Configuration > ADSL Monitor LABEL DESCRIPTION ADSL Link This is the status of your ADSL link. Status ADSL Standard This refers to the operational protocol the Prestige and the DSLAM (Digital Subscriber Mode Line Access Multiplexer) are using.
  • Page 159: Configuration > Device Alarms

    Vantage CNM 2.0 15 Configuration > Device Alarms Use these screens to view and manage device alarms. 15.1 Device Alarms Select a domain in the object tree to view alarms for that domain. Alarms are time-critical information that the ZyXEL device automatically sends out at the time of occurrence.
  • Page 160: Figure 15-1 Configuration > D

    Vantage CNM 2.0 Figure 15-1 Configuration > Device Alarms >Current The following table describes the labels in this screen. Table 15-3 Configuration > Device Alarms >Current LABEL DESCRIPTION Select Time Select the time period (24, 48 or 72 hours) for which you wish to view logs.
  • Page 161: Figure 15-2 Configuration > D

    Vantage CNM 2.0 15.1.4 Historical Alarms Screen This screen displays a history of device alarm logs. Figure 15-2 Configuration > Device Alarms > Historical The following table describes the labels in this screen. Table 15-4 Configuration > Device Alarms > Historical...
  • Page 163: Building Block

    Vantage CNM 2.0 16 Building Block 16.1 BB Categories A BB is a building block used to build a device configuration using Vantage CNM. • A device BB is a combination of configuration BBs, which vary by model. A device can have only one Device BB.
  • Page 164: Figure 16-2 Building Block

    Vantage CNM 2.0 Table 16-1 Building Block > Device BB TYPE DESCRIPTION Name A building block should have a unique name. Click this hyperlink to go to a BB info screen that allows you to edit the name and add some extra description of the BB.
  • Page 165: Configuration Bbs

    Vantage CNM 2.0 Figure 16-3 Building Block > Device BB > Edit > Configuration 16.3.3 Adding a New BB Click Add from Figure 16-1.The next screen asks you what model type BB you want to add. This should be the same as the model types supported by Vantage.
  • Page 166: Figure 16-5 Building Block

    Vantage CNM 2.0 Figure 16-5 Building Block > Configuration The following table describes the fields in this screen Table 16-4 Building Block > Configuration TYPE DESCRIPTION Index This is the building block list number. Name A building block should have a unique name. Click this hyperlink to go to a BB info screen that allows you to edit the name and add some extra description of the BB.
  • Page 167: Component Bbs

    Vantage CNM 2.0 Note Type some extra description of the BB. Click to Apply your changes to the BB configuration. Apply Cancel Click Cancel to return to the previous screen. 16.4.2 Adding a Configuration BB Click Add from Figure 16-5. Type a Name to identify your existing or new Configuration BB. When you add a new Configuration BB, you must choose what device type and BB configuration type you wish to add, from the Device and Type list boxes respectively.
  • Page 168: Table 16-7 Building Block > Component Bb

    Vantage CNM 2.0 Figure 16-8 Building Block > Component BB The following table describes the fields in this screen Table 16-7 Building Block > Component BB TYPE DESCRIPTION Index This is the building block list number. Name A building block should have a unique name. Click this hyperlink to go to a BB info screen that allows you to edit the name, type and add some extra description of the BB.
  • Page 169: Table 16-8 Building Block > Component Bb > Edit

    Vantage CNM 2.0 Table 16-8 Building Block > Component BB > Edit TYPE DESCRIPTION Name Type a unique name for the building block. Type Select the configuration hyperlink. Note Type some extra description of the BB. Apply Click to Apply your changes to the BB component.
  • Page 170: Table 16-11 Building Block > Component Bb > Add > E-Mail Address

    Vantage CNM 2.0 Figure 16-11 Building Block > Component BB > Add > IP Address The following table describes the fields in this screen Table 16-10 IP Building Block > Component BB > Add > IP Address TYPE DESCRIPTION IP Type Select from Single, Range or Subnet.
  • Page 171: System > Administrators

    Vantage CNM 2.0 17 System > Administrators Use these screens to manage Vantage administrators. 17.1 Introduction to Administrators An Administrator can only be associated to one management domain. To change an Administrator’s management domain, you must first disassociate her from an existing domain before associating to the new domain.
  • Page 172: Configuring Administrators

    Vantage CNM 2.0 • Log option and purge log • Maintenance “Super” permissions are pre-defined in Vantage and are not editable by Vantage Administrators. A “super” Administrator cannot edit any Vantage system settings, but can view (read only) Vantage system status and Vantage logs (but cannot purge or change log options).
  • Page 173: Vantage Upgrade

    Vantage CNM 2.0 Table 17-1 System > View Administrator List LABEL DESCRIPTION Click Add to create a new Administrator if you have this permission. Delete Select an Administrator(s) and then click Delete to erase that Administrator account from Vantage. 17.3 Vantage Upgrade Upgraded Vantage software may be for bug fixes, increased ZyXEL device support or new Vantage modules.
  • Page 174: Figure 17-3 System > Upgrade

    Vantage CNM software version format is as follows: A.B.CD.EF.GH The following table details the format of this version code. The version code of the Vantage CNM 2.0 for Windows XP SP1 without a patch is 2.0.00.61.00. 17-4 Configuration > Administrators...
  • Page 175: Creating An Administrator Account

    Vantage CNM 2.0 Table 17-2 Version A.B.CD.EF.GH CODE DESCRIPTION This represents a major upgrade such as major new features or upgrade modules. This represents a non-major upgrade such as new features and increased ZyXEL device support.. This is the project code number.
  • Page 176: Figure 17-7 System > A

    Vantage CNM 2.0 The following table describes the fields in this screen. Table 17-3 System > Administrator Details LABEL DESCRIPTION Name Type the administrator name used for identification purposes. Login ID Type the administrator login name associated with the password that you log into Vantage with.
  • Page 177: Table 17-4 System > Administrator Permissions

    Vantage CNM 2.0 Table 17-4 System > Administrator Permissions LABEL DESCRIPTION State Select Disable to prohibit Administrator access to Vantage without deleting her profile. User Group A “user group” is a pre-defined Administrator permission set. Select from Custom, Super and Normal. Super and Normal “user groups” permission sets are not editable, Custom “user group”...
  • Page 179: Other System Screens

    Vantage CNM 2.0 18 Other System Screens Only the root administrator can view the System > Upgrade to System > Data Maintenance screens as only the root administrator can perform these duties. 18.1 Status Click System > Status to view the current Vantage system status. This is a read-only screen.
  • Page 180: License Management

    Vantage CNM 2.0 Table 18-1 System > Vantage Status LABEL DESCRIPTION Vantage server disk This field displays the Vantage server hard drive free space. Heavy usage may space available necessitate buying another hard drive or purging old logs and alerts.
  • Page 181: System >Preferences

    Vantage CNM 2.0 Table 18-2 System > License > License Management LABEL DESCRIPTION Upgrade Click Upgrade to proceed to the next screen. Reset Click Reset to begin configuring the screen afresh. 18.2.1 License Upgrade Click Upgrade in Table 18-2 to display this screen.
  • Page 182: Figure 18-4 Vantage Icon - S

    Vantage CNM 2.0 Step 4. Restart Vantage CNM; you don’t have to restart the computer on which Vantage CNM is installed. Right-click the Vantage icon in the system tray and select STOP. Figure 18-4 Vantage Icon - Stop Right-click the icon again and select START.
  • Page 183: Figure 18-6 System > Preferences

    Vantage CNM 2.0 Figure 18-6 System > Preferences > Server The following table describes the fields in this screen. Table 18-4 System > Preferences > Server LABEL DESCRIPTION Vantage CNM server Select the check box to make the IP address editable.
  • Page 184: Figure 18-7 System > Preferences

    Vantage CNM 2.0 Table 18-4 System > Preferences > Server LABEL DESCRIPTION System Log Path This displays the file path of your syslog server. Mail Server The mail (SMTP) server is used to send Vantage notifications. Select the checkbox to activate the fields below.
  • Page 185: Figure 18-8 System > Preferences

    Vantage CNM 2.0 Table 18-5 System > Preferences > User Access LABEL DESCRIPTION Brute Force Password Configure the next two fields to apply this. Protection Allowed Attempts Before Type the number of times an incorrect password may be entered before a login Failure failure is returned.
  • Page 186: Figure 18-9 System > Preferences

    Vantage CNM 2.0 Figure 18-9 System > Preferences > Notifications The following table describes the fields in this screen. Table 18-7 System > Preferences > Notifications LABEL DESCRIPTION Firmware Upgrade Set who should be notified when you upload firmware to a device.
  • Page 187: Figure 18-10 System > P

    Vantage CNM 2.0 Figure 18-10 System > Preferences > Permissions The following table describes the fields in this screen. Table 18-8 System > Preferences > Permissions LABEL DESCRIPTION Index This is the template index number. 1 and 2 are default templates.
  • Page 188: System Maintenance

    Vantage CNM 2.0 Table 18-9 System > Preferences > Permissions > Add LABEL DESCRIPTION Add User Group User Group ID Enter the new template name (User Group) in this field. Device registration, deletion, This field allows the Administrator to register and delete devices as well as mapping, unmapping associate and disassociate devices to a folder.
  • Page 189: Figure 18-13 System > M

    Vantage CNM 2.0 Table 18-10 System > Maintenance > Management LABEL DESCRIPTION Index This field displays the system backup file index number. Name This field displays the system backup file name. Description This field displays some extra description of the system backup file.
  • Page 190: Address Book

    Vantage CNM 2.0 18.4.3 Restore System Maintenance Use this screen to restore a previously saved system backup (from your computer or Vantage) to Vantage. Figure 18-14 System > Maintenance > Restore The following table describes the fields in this screen.
  • Page 191: Figure 18-16 System > Address

    Vantage CNM 2.0 Table 18-13 System > Address Book LABEL DESCRIPTION This is a number defining an address book entry. Index This field displays the address book entry index number. Name This field displays the person’s name. Email This field displays the person’s e-mail address.
  • Page 192: Certificate Mgmt

    Vantage CNM 2.0 Table 18-14 System > Address Book Add/Edit LABEL DESCRIPTION Cancel Click Cancel to return to the previous screen. 18.6 Certificate Mgmt 18.6.1 Certificates Overview – ZyXEL device The ZyXEL device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs.
  • Page 193: Figure 18-17 System > C

    Vantage CNM 2.0 18.6.3 Current Certification Information You can view your current certificate information in the following screen, including certificate name, type, origin and duration of validity. Figure 18-17 System > Certificate Management > Information The following table describes the labels in this screen.
  • Page 194: Figure 18-18 System > C

    Vantage CNM 2.0 Table 18-15 System > Certificate Management > Information LABEL DESCRIPTION Valid To This field displays the date that the certificate expires. The text displays in red and includes an "Expiring!" or "Expired!" message if the certificate is about to expire or has already expired.
  • Page 195: Vantage Logs

    Vantage CNM 2.0 18.6.5 Importing Certificates In the following screen, you can Browse for a certificate that has already been downloaded to your computer. Select Apply to complete the certificate import. Figure 18-19 System > Certificate Management > Import Certificate The following table describes the labels in this screen.
  • Page 196: Figure 18-20 System > Logs

    Vantage CNM 2.0 Figure 18-20 System > Logs > CNM Server The following table describes the labels in this screen. Table 18-18 System > Logs > CNM Server LABEL DESCRIPTION Select Time Period Select the time period for which you wish to view Vantage logs Source This field displays the source of the Vantage log.
  • Page 197: About Vantage

    Vantage CNM 2.0 Figure 18-21 System > Logging Options 18.8 About Vantage The About screen provides some basic information about Vantage as shown in the following screen. Figure 18-22 System > About Vantage Other System Screens 18-19...
  • Page 199: Monitor > Alarms

    Vantage CNM 2.0 19 Monitor > Alarms This chapter describes the monitor alarms. 19.1 Alarms Select a domain in the object tree to view alarms for that domain. Alarms are time-critical information that the ZyXEL device automatically sends out at the time of occurrence.
  • Page 200: Current Alarms Screen

    Vantage CNM 2.0 Table 19-3 Alarm States STATE DESCRIPTION Cleared After the administrator has solved the cause of the alarm, he/she can clear the alarm. When an alarm is cleared, it is removed from the current alarm screen and becomes an historical alarm.
  • Page 201: Figure 19-1 Monitor > Current

    Vantage CNM 2.0 Figure 19-1 Monitor > Current Alarms Monitor > Alarms 19-3...
  • Page 202: Table 19-4 Monitor > Current Alarms

    Vantage CNM 2.0 Table 19-4 Monitor > Current Alarms STATE DESCRIPTION Select Time Select the time period for which you wish to view alarms. Period Select Type of Select the type of alarm you wish to view, see Table 19-1.
  • Page 203: Figure 19-2 Monitor > H

    Vantage CNM 2.0 Figure 19-2 Monitor > Historical Alarms See Table 19-4 for more information on fields in this table. Monitor > Alarms 19-5...
  • Page 205: Other Monitor Screens

    Vantage CNM 2.0 20 Other Monitor Screens “Firmware Upgrade” means that Vantage signals the device to request a firmware FTP upload from Vantage. 20.1 Firmware Upgrade Report Details of firmware uploaded to Vantage are shown as in the next screen.
  • Page 206: Vpn Editor

    Vantage CNM 2.0 20.3 VPN Editor This is a graphical VPN editor screen where you can click and drag VPN tunnels (single-click VPN) and also view individual tunnel details. See Table 2-5 for a description of the icons used in the VPN Editor.
  • Page 207: Figure 20-3 Monitor > Vpn E

    Vantage CNM 2.0 Figure 20-3 Monitor > VPN Editor > Tunnel IPSec Detail Step 4. See Table 11-6 for more information on the fields in this screen. Click Apply to go to a Tunnel Summary screen. The Tunnel Summary shows the Name of your tunnel, A-End and Z-End devices and the current tunnel Status.
  • Page 208: Figure 20-5 Monitor > Vpn M

    Vantage CNM 2.0 If you are not redirected, click the Try here hyperlink to go to the next screen. The Tunnel Summary details are added to the top of the IPSec Summary, see Figure 20-5 in the order they are configured (last tunnel appears last in the list).
  • Page 209: Figure 20-6 Monitor > Vpn > A

    Vantage CNM 2.0 Figure 20-6 Monitor > VPN > Add MAP Other Monitor Screens 20-5...
  • Page 211: Appendix A Ftp Server (Wftpd ) Setup Example

    Vantage CNM 2.0 Appendix A FTP Server (WFTPD ) Setup Example Step 1. Download the WFTPD software from www.wftpd.com to where you want to install it. Step 2. Double-click setup.exe to begin the wizard. Setup Step 3. Click Next to begin and then follow the wizard prompts.
  • Page 212 Vantage CNM 2.0 Information Step 5. Select the installation type and click Next. Installation Type Step 6. Select where to install WFTPD Pro and click Next. FTP Server (WFTPD ) Setup Example...
  • Page 213 Vantage CNM 2.0 Installation Directory Step 7. You are prompted to create the directory if it doesn’t already exist. Click Yes to create a new directory. Create Directory Step 8. Click Next to begin the installation. Begin Installation FTP Server (WFTPD ) Setup Example...
  • Page 214 Vantage CNM 2.0 Step 9. WFTPD has been installed. Click Run to start it. Make sure the check box is selected. Run WFTPD Step 10. Click Start Service form the WFTPD main screen. WFTPD Main Screen FTP Server (WFTPD ) Setup Example...
  • Page 215 Vantage CNM 2.0 Step 11. Open Administrative Tools in the Windows Control Panel and then select Services to see the WFTPD Pro service. Windows Services Step 12. Right-click WFTPD Pro service and then click Properties. WFTPD Properties Step 13. Click the Log On tab to configure a user name and password for this server. This must be the same username and password that you use in Vantage.
  • Page 216 Vantage CNM 2.0 WFTPD Pro Log On FTP Server (WFTPD ) Setup Example...
  • Page 217: Appendix B Configuring The Kiwi Syslog Daemon

    Appendix B Configuring the Kiwi Syslog Daemon This section shows you how to install and configure the KiWi Syslog Daemon for use with Vantage CNM 2.0. Installing the Kiwi Syslog Daemon Follow the steps below to install the KiWi. Syslog Daemon Step 1.
  • Page 218 Vantage CNM 2.0 Kiwi Installation: Installation Directory Wait before the installation process completes. Importing the Syslog Configuration File After installing the Kiwi Syslog Daemon, follow the steps below to import the configuration file. Step 1. Copy and save the “Syslog Daemon Settings.ini” file to your computer.
  • Page 219 Vantage CNM 2.0 Kiwi Syslog Daemon Setup Step 7. Locate the .ini syslog configuration file you and click Open. Kiwi Syslog Daemon Setup: Import Configuration File Step 8. Click Yes to confirm the configuration file import. Configuring the Kiwi Syslog Daemon...
  • Page 220 Vantage CNM 2.0 Kiwi Syslog Daemon Setup: Import Configuration File: Confirm Step 9. In the Kiwi Syslog Daemon Setup screen, click Apply and then OK to close the screen. You must start the Telnet service on the computer you install Kiwi.
  • Page 221 After you have installed and configure the Kii Syslog Daemon and started the Telnet service on the computer, configure the syslog settings in Vantage CNM 2.0. Set the syslog server username and password to be the same as the Windows username and password in the Vantage system Server screen.
  • Page 222 Vantage CNM 2.0 Vantage System Servers Step 8. Select Syslog Server, then enter the IP address of the computer on which you installed the Syslog server and the user name and password that you configured Step 9. Click Apply. Configuring the Kiwi Syslog Daemon...
  • Page 223 Vantage CNM 2.0 Appendix C Java Console Debug Messages If you have problems with Vantage, customer support may ask you to find Java console debug messages. This appendix shows you how to do this. Step 1. Click Start, Control Panel and double-click on Java Plug-in.
  • Page 224 Vantage CNM 2.0 Step 3. Open Internet Explorer and log into Vantage CNM 2.0. After successful login a Java plug-in icon should appear in your Windows system tray. If there is no icon present, return to step 2. Java Plug-in Icon Step 4.
  • Page 225 Vantage CNM 2.0 Appendix D IP Subnetting IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
  • Page 226 Vantage CNM 2.0 Class C 11000000 to 11011111 192 to 223 Class D 11100000 to 11101111 224 to 239 Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
  • Page 227: Example

    Vantage CNM 2.0 NETWORK NUMBER HOST ID IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask 255.255.255. Subnet Mask (Binary) 11111111.11111111.11111111. 00000000 The first three octets of the address make up the network number (class “C”). You want to have two separate networks.
  • Page 228 Vantage CNM 2.0 possible combinations of 00, 01, 10 and 11. The subnet mask is 26 bits (11111111.11111111.11111111.11000000) or 255.255.255.192. Each subnet contains 6 host ID bits, giving 2 2 or 62 hosts for each subnet (all 0’s is the subnet itself, all 1’s is the broadcast address on the subnet).
  • Page 229 Vantage CNM 2.0 The following table is a summary for class “C” subnet planning. Class C Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 255.255.255.128 (/25) 255.255.255.192 (/26) 255.255.255.224 (/27) 255.255.255.240 (/28) 255.255.255.248 (/29) 255.255.255.252 (/30)
  • Page 230 Vantage CNM 2.0 Class B Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 255.255.255.128 (/25) 255.255.255.192 1024 (/26) 255.255.255.224 2048 (/27) 255.255.255.240 4096 (/28) 255.255.255.248 8192 (/29) 255.255.255.252 16384 (/30) 255.255.255.254 32768 (/31) IP Subnetting...
  • Page 231 Vantage CNM 2.0 Appendix E Open Software Announcements Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation.
  • Page 232 Vantage CNM 2.0 THE ACCOMPANYING PROGRAM IS PROVIDED UNDER THE TERMS OF THIS COMMON PUBLIC LICENSE ("AGREEMENT"). ANY USE, REPRODUCTION OR DISTRIBUTION OF THE PROGRAM CONSTITUTES RECIPIENT'S ACCEPTANCE OF THIS AGREEMENT. 1. DEFINITIONS "Contribution" means: a) in the case of the initial Contributor, the initial code and documentation distributed under this Agreement, and b) in the case of each subsequent Contributor: i) changes to the Program, and ii) additions to the Program;...
  • Page 233 Vantage CNM 2.0 behalf of all Contributors all liability for damages, including direct, indirect, special, incidental and consequential damages, such as lost profits; iii) states that any provisions which differ from this Agreement are offered by that Contributor alone and not by any other party; and iv) states that source code for the Program is available from such Contributor, and informs licensees how to obtain it in a reasonable manner on or through a medium customarily used for software exchange.
  • Page 234 Vantage CNM 2.0 OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 7. GENERAL If any provision of this Agreement is invalid or unenforceable under applicable law, it shall not affect the...
  • Page 235 Vantage CNM 2.0 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. THIS SOFTWARE IS PROVIDED BY THE CRYPTIX FOUNDATION LIMITED AND...
  • Page 236 Vantage CNM 2.0 DAMAGES, HOWEVER CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF THE USE OF OR INABILITY TO USE SOFTWARE, EVEN IF SUN MICROSYSTEMS, INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. You acknowledge that Software is not designed, licensed or intended for use in the design, construction, operation or maintenance of any nuclear facility.
  • Page 237 Vantage CNM 2.0 developers for the purpose of developing additional software which invokes such additional API, you must promptly publish broadly an accurate specification for such API for free use by all developers. You may not create, or authorize your licensees to create, additional classes, interfaces, or subpackages that are in any way identified as "java", "javax", "sun"...
  • Page 238 Vantage CNM 2.0 Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document.
  • Page 239 Vantage CNM 2.0 necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.
  • Page 240 Vantage CNM 2.0 may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.
  • Page 241 Vantage CNM 2.0 NOTE: Some components of the Vantage CNM software incorporate source code covered under the Apache License. To obtain the source code covered under the Apache License, please contact ZyXEL customer support. Copyright (c) 2002, 2003 Gargoyle Software Inc. All rights reserved.
  • Page 242 Vantage CNM 2.0 Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
  • Page 243 Vantage CNM 2.0 same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software.
  • Page 244 Vantage CNM 2.0 meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements...
  • Page 245 Vantage CNM 2.0 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
  • Page 246 Vantage CNM 2.0 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
  • Page 247 Vantage CNM 2.0 LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR...
  • Page 248 Vantage CNM 2.0 proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0.
  • Page 249 Vantage CNM 2.0 a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no...
  • Page 250 End-User License Agreement for Vantage CNM WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
  • Page 251 Vantage CNM 2.0 Grant of License for Personal Use ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non-sublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice.
  • Page 252 Vantage CNM 2.0 UNINTERUPTED FASHION, OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED, OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM. SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU. IF THIS EXCLUSION IS HELD...
  • Page 253 Vantage CNM 2.0 sitting in ROC, Taiwan. This License Agreement shall constitute the entire Agreement between the parties hereto. This License Agreement, the rights granted hereunder, the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto.

Table of Contents