Refer to the included CD for support documents. Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com.
Page 4
About This User's Guide • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
Page 6
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is not an exact representation of your device. ZyXEL Device Computer Notebook computer Server DSLAM Firewall Telephone Switch Router P-870H/HW Series User’s Guide...
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
Page 8
Safety Warnings P-870H/HW Series User’s Guide...
Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................5 Safety Warnings........................7 Contents Overview ........................9 Table of Contents........................11 Part I: User’s Guide................19 Chapter 1 Introducing the ZyXEL Device ....................21 1.1 Overview ..........................21 1.2 Ways to Manage the ZyXEL Device ..................
Page 12
Table of Contents 3.2.1 Navigation Panel ......................39 3.2.2 Main Window ......................41 3.2.3 Status Bar ........................41 Chapter 4 Status Screens ........................43 4.1 Status Screen ........................43 4.1.1 WAN Service Statistics ....................47 4.1.2 Route Info ........................48 4.1.3 WLAN Station List ......................
Page 13
Table of Contents 7.4 The General Screen ......................89 7.4.1 No Security ......................... 90 7.4.2 WEP Encryption ......................91 7.4.3 WPA(2)-PSK ......................93 7.4.4 WPA(2) Authentication ....................94 7.4.5 MAC Filter ......................95 7.4.6 Adding a New MAC Filtering Rule .................
Page 14
Table of Contents 10.1 Overview ......................... 135 10.1.1 What You Can Do in this Chapter ................135 10.2 What You Need to Know ....................135 10.3 The Firewall Screen ......................136 10.3.1 Creating Incoming Firewall Rules ................ 138 Chapter 11 Certificate ..........................
Page 15
Table of Contents 15.1.1 What You Can Do in this Chapter ................163 15.2 What You Need to Know ....................164 15.3 The Quality of Service General Screen ................164 15.4 The Queue Setup Screen ....................166 15.4.1 Adding a QoS Queue .................... 167 15.5 The Class Setup Screen ....................
Page 16
Table of Contents 19.3.1 Adding URL Filter ....................202 Chapter 20 Interface Group ........................203 20.1 Overview .......................... 203 20.1.1 What You Can Do in this Chapter ................203 20.2 The Interface Group Screen .................... 203 20.2.1 Interface Group Configuration ................204 20.2.2 Interface Grouping Criteria ..................
Page 17
Table of Contents 25.2 ZyXEL Device Access and Login ..................230 25.3 Internet Access ........................ 231 Chapter 26 Product Specifications ......................235 26.1 Hardware Specifications ....................235 26.2 Firmware Specifications ....................235 26.3 Wireless Features (for P-870HW Series only) ..............238 Appendix A Setting Up Your Computer’s IP Address ............
Page 18
Table of Contents P-870H/HW Series User’s Guide...
• Models ending in “1”, for example P-870HW-51a v2, denote a device that works over the analog telephone system, POTS (Plain Old Telephone Service). Models ending in “3”, for example P-870H-53a v2, denote a device that works over ISDN (Integrated Services Digital Network) or T-ISDN (UR-2).
Chapter 1 Introducing the ZyXEL Device • SNMP. The device can be monitored by an SNMP manager. See the SNMP chapter in this User’s Guide. • TR-069. This is an auto-configuration server used to remotely configure your device. 1.3 Good Habits for Managing the ZyXEL Device Do the following things regularly to make the ZyXEL Device more secure and to manage the ZyXEL Device more effectively.
Page 23
Chapter 1 Introducing the ZyXEL Device You can also configure IP filtering on the ZyXEL Device for secure Internet access. When the IP filter is on, all incoming traffic from the Internet to your network is blocked by default unless it is initiated from your network. This means that probes from the outside to your network are not allowed, but you can safely browse the Internet and download files.
Chapter 1 Introducing the ZyXEL Device 1.5 LEDs (Lights) The following graphic displays the labels of the LEDs. Not all LEDs are available on all models. Figure 2 LEDs on the Top of the Device: P-870HW Series Figure 3 LEDs on the Top of the Device: P-870H Series P-870H/HW Series User’s Guide...
Chapter 1 Introducing the ZyXEL Device None of the LEDs are on if the ZyXEL Device is not receiving power. Table 1 LED Descriptions COLO STATUS DESCRIPTION POWER Green The ZyXEL Device is receiving power and ready for use. Blinking The ZyXEL Device is self-testing.
Chapter 1 Introducing the ZyXEL Device 1.6.1 Using the Reset Button Make sure the POWER LED is on (not blinking). To set the device back to the factory default settings, press the RESET button for ten seconds or until the POWER LED begins to blink and then release it. When the POWER LED begins to blink, the defaults have been restored and the device restarts.
H A P T E R Tutorials This chapter describes how to set up a wireless network. 2.1 How to Set up a Wireless Network This tutorial gives you examples of how to set up an access point and wireless client for wireless communication using the following parameters.
Page 28
Chapter 2 Tutorials Open the Network > Wireless LAN screen in the AP’s Web Configurator. Figure 4 AP: Wireless LAN Make sure the Active Wireless LAN check box is selected. Enter “SSID_Example3” as the SSID and select a channel which is not used by another AP.
Page 29
Chapter 2 Tutorials Click the Advanced Setup tab and select 802.11b/g Mixed in the 802.11 Mode field. Click Apply. Figure 5 AP: Wireless LAN > Advanced Setup Open the Status screen.Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status.
Chapter 2 Tutorials Click the WLAN Station List hyperlink in the AP’s Status screen. You can see if any wireless client has connected to the AP. Figure 7 AP: Status: WLAN Station List 2.1.3 Configuring the Wireless Client This section describes how to connect the wireless client to a network. 2.1.3.1 Connecting to a Wireless LAN The following sections show you how to join a wireless network using the ZyXEL utility, as in the following diagram.
Page 31
Chapter 2 Tutorials This example illustrates how to manually connect your wireless client to an access point (AP) which is configured for WPA-PSK security and connected to the Internet. Before you connect to the access point, you must know its Service Set IDentity (SSID) and WPA-PSK pre-shared key.
Page 32
Chapter 2 Tutorials When you try to connect to an AP with security configured, a window will pop up prompting you to specify the security settings. Enter the pre-shared key and leave the encryption type at the default setting. Use the Next button to move on to the next screen. You can use the Back button at any time to return to the previous screen, or the Exit button to return to the Site Survey screen.
Page 33
Chapter 2 Tutorials The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your settings. When the wireless link is established, the ZyXEL utility icon in the system tray turns green and the Link Info screen displays details of the active connection.
Page 34
Chapter 2 Tutorials Open the ZyXEL utility and click the Profile tab to open the screen shown next. Click Add to configure a new profile. Figure 12 ZyXEL Utility: Profile The Add New Profile screen appears. The wireless client automatically searches for available wireless networks, which are displayed in the Scan Info box.
Page 35
Chapter 2 Tutorials Choose the same encryption method as the AP to which you want to connect (In this example, WPA-PSK). Figure 14 ZyXEL Utility: Profile Security This screen varies depending on the encryption method you selected in the previous screen. Enter the pre-shared key and leave the encryption type at the default setting.
Page 36
Chapter 2 Tutorials Verify the profile settings in the read-only screen. Click Save to save and go to the next screen. Figure 17 Profile: Confirm Save Click Activate Now to use the new profile immediately. Otherwise, click the Activate Later button. If you clicked Activate Later, you can select the profile from the list in the Profile screen and click Connect to activate it.
H A P T E R Introducing the Web Configurator This chapter describes how to access and navigate the Web Configurator. 3.1 Web Configurator Overview The Web Configurator is an HTML-based management interface that allows easy device setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
Chapter 3 Introducing the Web Configurator A password screen displays. Enter the default user name admin and default password 1234.The password displays in non-readable characters. If you have changed the password, enter your password and click Login. Click Cancel to revert to the default password in the password field.
Chapter 3 Introducing the Web Configurator As illustrated above, the main screen is divided into these parts: • A - title bar • B - navigation panel • C - main window • D - status bar 3.2.1 Navigation Panel Use the menu items on the navigation panel to open screens to configure ZyXEL Device features.
Page 40
Chapter 3 Introducing the Web Configurator Table 2 Navigation Panel Summary LINK FUNCTION Security MAC Filter Use this screen to configure filtering rule(s) that blocks or allows traffic according to its destination and/or source MAC address in bridge mode. Firewall Incoming This screen shows a summary of the IP filtering rules, and allows you to add or remove an incoming IP filtering rule that allows...
Chapter 3 Introducing the Web Configurator Table 2 Navigation Panel Summary LINK FUNCTION Tools Firmware Use this screen to upload firmware to your device. Configuration Use this screen to backup and restore your device’s configuration (settings) or reset the factory default settings. Restart This screen allows you to reboot the ZyXEL Device without turning the power off.
Page 42
Chapter 3 Introducing the Web Configurator P-870H/HW Series User’s Guide...
H A P T E R Status Screens Use the Status screens to look at the current status of the device, system resources and interfaces (LAN and WAN). The Status screen also provides detailed information from DHCP and statistics from traffic. 4.1 Status Screen Click Status to open this screen.
Page 44
Chapter 4 Status Screens Each field is described in the following table. Table 3 Status Screen LABEL DESCRIPTION Refresh Interval Enter how often you want the ZyXEL Device to update this screen. Apply Click this to update this screen immediately. Device Information User Name...
Page 45
Chapter 4 Status Screens Table 3 Status Screen LABEL DESCRIPTION WPS Status This field displays the status of WPS (Wi-Fi Protected Setup). Click this to go to the screen where you can change it. WDS Status This field displays • AP when WDS is disabled.
Page 46
Chapter 4 Status Screens Table 3 Status Screen LABEL DESCRIPTION Status This field indicates whether or not the ZyXEL Device is using the interface. For the DSL interface, this field displays LinkDown (line is down) or Up (line is up or connected). For the LAN interface, this field displays Up when the ZyXEL Device is using the interface and NoLink when the line is disconnected.
Chapter 4 Status Screens 4.1.1 WAN Service Statistics Click Status > WLAN Service Statistics to access this screen. Use this screen to view the WAN statistics. Figure 22 Status > WAN Service Statistics The following table describes the labels in this screen. Table 4 Status >...
Chapter 4 Status Screens Table 4 Status > WAN Service Statistics (continued) LABEL DESCRIPTION Refresh Enter the time interval for refreshing statistics in this field. Interval Set Interval Click this button to apply the new poll interval you entered in the Refresh Interval field.
Chapter 4 Status Screens Table 5 Status > Route Info (continued) LABEL DESCRIPTION Metric The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". The smaller the number, the lower the "cost". Service This indicates the name of the service used to forward the route.
Chapter 4 Status Screens Table 6 Status > WLAN Station List (continued) LABEL DESCRIPTION Set Interval Click this button to apply the new poll interval you entered in the Refresh Interval field. Stop Click Stop to stop refreshing statistics. 4.1.4 LAN Statistics Click Status >...
Chapter 4 Status Screens Table 7 Status > LAN Statistics (continued) LABEL DESCRIPTION Drops This indicates the number of outgoing packets dropped on this interface. Refresh Enter the time interval for refreshing statistics in this field. Interval Set Interval Click this button to apply the new poll interval you entered in the Refresh Interval field.
Page 52
Chapter 4 Status Screens P-870H/HW Series User’s Guide...
H A P T E R WAN Setup 5.1 Overview This chapter discusses the ZyXEL Device’s WAN screens. Use these screens to configure your ZyXEL Device for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet.
Chapter 5 WAN Setup 5.2 What You Need to Know Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Page 57
Chapter 5 WAN Setup Note: At the time of writing, you can have only one DSL PTM interface on the ZyXEL Device. Figure 28 Layer 2 Interface The following table describes the fields in this screen. Table 9 Layer 2 Interface LABEL DESCRIPTION Interface...
Chapter 5 WAN Setup 5.4.1 Layer 2 Interface Configuration Click the Add button in the Layer 2 Interface screen to open the following screen. Use this screen to create a new DSL PTM interface. At the time of writing, you can configure only one DSL interface on the ZyXEL Device. Figure 29 DSL PTM Interface Configuration The following table describes the fields in this screen.
Chapter 5 WAN Setup 5.5 The Internet Connection Screen Use this screen to change your ZyXEL Device’s WAN settings. Click Network > WAN > Internet Connection. The summary table shows you the configured WAN connection(s) on the ZyXEL Device. To use NAT, firewall or IGMP proxy in the ZyXEL Device, you need to configure a WAN connection with PPPoE or IPoE.
Chapter 5 WAN Setup Table 11 Internet Connection LABEL DESCRIPTION Vlan8021p This indicates the 802.1P priority level assigned to traffic sent through this connection. This displays N/A when there is no priority level assigned. VlanMuxId This indicates the VLAN ID number assigned to traffic sent through this connection.
Page 61
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 12 WAN Configuration: WAN Interface LABEL DESCRIPTION Select a layer 2 Select ptm0 to use the DSL port as the WAN port for this connection. interface for this service Back Click this button to return to the previous screen.
Page 62
Chapter 5 WAN Setup Table 13 WAN Configuration: Service Type LABEL DESCRIPTION Enter 802.1P IEEE 802.1p defines up to 8 separate traffic types by inserting a tag into Priority a MAC-layer frame that contains bits to define class of service. Type the IEEE 802.1p priority level (from 0 to 7) to add to traffic through this connection.
Page 63
Chapter 5 WAN Setup PPPoE This screen displays when you select PPP over Ethernet (PPPoE) in the WAN Service Configuration screen. Figure 33 WAN Configuration: PPPoE The following table describes the labels in this screen. Table 14 WAN Configuration: PPPoE LABEL DESCRIPTION PPP User Name...
Page 64
Chapter 5 WAN Setup Table 14 WAN Configuration: PPPoE LABEL DESCRIPTION Authentication The ZyXEL Device supports PAP (Password Authentication Protocol) Method and CHAP (Challenge Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is readily available on more platforms.
Page 65
Chapter 5 WAN Setup IPoE This screen displays when you select IP over Ethernet in the WAN Service Configuration screen. Figure 34 WAN Configuration: IPoE The following table describes the labels in this screen. Table 15 WAN Configuration: IPoE LABEL DESCRIPTION Obtain an IP A static IP address is a fixed IP that your ISP gives you.
Page 66
Chapter 5 WAN Setup Table 15 WAN Configuration: IPoE LABEL DESCRIPTION DUID Type Select Other to enter any string that identifies the ZyXEL Device in the DUID field. Select DUID-LL (DUID Based on Link-layer Address) to enter the ZyXEL Device’s hardware address, that is the MAC address in the DUID field.
Page 67
Chapter 5 WAN Setup 5.5.1.4 NAT, IGMP Multicast and Firewall Activation The screen is available only when you select IP over Ethernet in the WAN Service Configuration screen. Figure 35 WAN Configuration: NAT, IGMP Multicast and Firewall Activation: IPoE The following table describes the labels in this screen. Table 16 WAN Configuration: NAT, IGMP Multicast and Firewall Activation: IPoE LABEL DESCRIPTION...
Page 68
Chapter 5 WAN Setup Table 16 WAN Configuration: NAT, IGMP Multicast and Firewall Activation: IPoE LABEL DESCRIPTION Back Click this button to return to the previous screen. Next Click this button to continue. 5.5.1.5 Default Gateway The screen is available when you select PPP over Ethernet or IP over Ethernet in the WAN Service Configuration screen.
Page 69
Chapter 5 WAN Setup 5.5.1.6 DNS Server The screen is available when you select PPP over Ethernet or IP over Ethernet in the WAN Service Configuration screen. Figure 37 WAN Configuration: DNS Server: PPPoE or IPoE The following table describes the labels in this screen. Table 18 WAN Configuration: DNS Server: PPPoE or IPoE LABEL DESCRIPTION...
Page 70
Chapter 5 WAN Setup 5.5.1.7 Configuration Summary This read-only screen shows the current WAN connection settings. Figure 38 WAN Configuration: Configuration Summary The following table describes the labels in this screen. Table 19 WAN Configuration: Configuration Summary LABEL DESCRIPTION Connection Type This is the encapsulation method used by this connection.
Chapter 5 WAN Setup 5.6 Technical Reference The following section contains additional technical information about the ZyXEL Device features described in this chapter. Encapsulation Be sure to use the encapsulation method required by your ISP. The ZyXEL Device can work in bridge mode or routing mode. When the ZyXEL Device is in routing mode, it supports the following methods.
Page 72
Chapter 5 WAN Setup encapsulation method assigned influences your choices for IP address and default gateway. Full Cone NAT In full cone NAT, the NAT router maps all outgoing packets from an internal IP address and port to a single IP address and port on the external network. The NAT router also maps packets coming to that external IP address and port to the internal IP address and port.
Page 73
Chapter 5 WAN Setup the example, only 3, C is allowed to send packets to 2, B and only 4, D is allowed to send packets to 2, M. Figure 40 Symmetric NAT 3, C 2, B 4, D 1, A 2, M 4, E 5, B...
Page 74
Chapter 5 WAN Setup contains two bytes of TPID (Tag Protocol Identifier), residing within the type/ length field of the Ethernet frame) and two bytes of TCI (Tag Control Information), starts after the source address field of the Ethernet frame). The CFI (Canonical Format Indicator) is a single-bit flag, always set to zero for Ethernet switches.
Page 75
Chapter 5 WAN Setup 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The ZyXEL Device can get the DNS server addresses in the following ways. The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up.
Page 76
Chapter 5 WAN Setup P-870H/HW Series User’s Guide...
H A P T E R LAN Setup 6.1 Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is usually located in one immediate area such as a building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses.
Chapter 6 LAN Setup 6.2 What You Need To Know IP Address Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number. This is known as an Internet Protocol address.
Chapter 6 LAN Setup DNS (Domain Name System) maps a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The DNS server addresses you enter when you set up DHCP are passed to the client machines along with the assigned IP address and subnet mask.
Page 80
Chapter 6 LAN Setup The following table describes the fields in this screen. Table 20 LAN > IP LABEL DESCRIPTION LAN TCP/IP Group Name Select the interface group for which you want to configure the LAN TCP/IP settings. See Chapter 20 on page 203 for how to create a new interface group.
Chapter 6 LAN Setup Table 20 LAN > IP LABEL DESCRIPTION Active IP Alias Select the check box to configure another LAN network for the ZyXEL Device. IP Address Enter the IP address of your ZyXEL Device in dotted decimal notation. IP Subnet Type the subnet mask of your network in dotted decimal notation, for Mask...
Page 82
Chapter 6 LAN Setup IP Pool Setup The ZyXEL Device is pre-configured with a pool of IP addresses for the DHCP clients (DHCP Pool). See the product specifications in the appendices. Do not assign static IP addresses from the DHCP pool to your LAN computers. LAN TCP/IP The ZyXEL Device has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability.
Page 83
Chapter 6 LAN Setup Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: • 10.0.0.0 — 10.255.255.255 • 172.16.0.0 — 172.31.255.255 • 192.168.0.0 — 192.168.255.255 You can obtain your IP address from the IANA, from an ISP or it can be assigned from a private network.
Page 84
Chapter 6 LAN Setup IP Alias IP alias allows you to partition a physical network into different logical networks over the same Ethernet interface. The ZyXEL Device supports three logical LAN interfaces via its single physical Ethernet interface with the ZyXEL Device itself as the gateway for each LAN network.
H A P T E R Wireless LAN 7.1 Overview This chapter describes how to perform tasks related to setting up and optimizing your wireless network, including the following. • Turning the wireless connection on or off. • Configuring a name, wireless channel and security for the network. •...
Chapter 7 Wireless LAN • The WDS screen lets you set up a Wireless Distribution System, in which the ZyXEL Device acts as a bridge with other ZyXEL access points (Section 7.8 on page 101). • The Advanced Setup screen lets you change the wireless mode, and make other advanced wireless configuration changes (Section 7.9 on page 103).
Page 87
Chapter 7 Wireless LAN network’s name. This helps you identify your wireless network when wireless networks’ coverage areas overlap and you have a variety of networks to choose from. Radio Channels In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use.
Chapter 7 Wireless LAN A good way to come up with effective security keys, passwords and so on is to use obscure information that you personally will easily remember, and to enter it in a way that appears random and does not include real words. For example, if your mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point (which you know was made in 1971) you could use “70dodchal71vanpoi”...
Chapter 7 Wireless LAN 7.4 The General Screen Note: If you are configuring the ZyXEL Device from a computer connected to the wireless LAN and you change the ZyXEL Device’s SSID or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the ZyXEL Device’s new settings.
Chapter 7 Wireless LAN Table 21 Network > Wireless LAN > General LABEL DESCRIPTION Hide Network Select this check box to hide the SSID in the outgoing beacon frame so a Name (SSID) station cannot obtain the SSID through scanning using a site survey tool. Disable WMM WMM (Wi-Fi MultiMedia) QoS (Quality of Service) allows you to prioritize Advertise...
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 22 Wireless LAN > General: No Security LABEL DESCRIPTION Security Choose No Security from the drop-down list box. Mode 7.4.2 WEP Encryption In order to configure and enable WEP encryption; click Network > Wireless LAN to display the General screen.
Page 92
Chapter 7 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 23 Network > Wireless LAN > General: Static WEP Encryption LABEL DESCRIPTION Auto Select this option to have the ZyXEL Device automatically generate an Generate Key SSID and WEP key.
Chapter 7 Wireless LAN 7.4.3 WPA(2)-PSK In order to configure and enable WPA(2)-PSK authentication; click Network > Wireless LAN to display the General screen. Select WPA-PSK or WPA2-PSK from the Security Mode list. Figure 47 Wireless LAN > General: WPA(2)-PSK The following table describes the wireless LAN security labels in this screen.
Chapter 7 Wireless LAN Table 24 Wireless LAN > General: WPA(2)-PSK LABEL DESCRIPTION Pre-Shared Key The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only difference between the two is that WPA(2)-PSK uses a simple common password, instead of user-specific credentials. Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols).
Chapter 7 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 25 Wireless LAN > General: WPA(2) LABEL DESCRIPTION Security Mode Choose WPA or WPA2 from the drop-down list box. Active This field is only available for WPA2. Select this if you want the ZyXEL Compatible Device to support WPA and WPA2 simultaneously.
Page 96
Chapter 7 Wireless LAN Device (Deny). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC addresses of the devices to configure this screen.
Chapter 7 Wireless LAN 7.4.6 Adding a New MAC Filtering Rule Click the Add button in the MAC Filter screen. The following screen displays. Figure 50 Wireless LAN > MAC Filter > Add The following table describes the labels in this screen. Table 27 Wireless LAN >...
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 28 Network > Wireless LAN > More AP LABEL DESCRIPTION This is the index number of each SSID profile. Active Select the check box to activate an SSID profile. SSID An SSID profile is the set of parameters relating to one of the ZyXEL Device’s BSSs.
Page 99
Chapter 7 Wireless LAN WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Set up each WPS connection between two devices. Both devices must support WPS. Click Network > Wireless LAN >WPS. The following screen displays. Figure 53 Network >...
Chapter 7 Wireless LAN Table 29 Network > Wireless LAN > WPS LABEL DESCRIPTION Release_Co This button is available when the WPS status is Configured but not nfiguration configurable if you disable WPS. Click this button to remove all configured wireless and wireless security settings for WPS connections on the ZyXEL Device.
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 30 Network > Wireless LAN > WPS Station LABEL DESCRIPTION Push Button Click this button to add another WPS-enabled wireless device (within wireless range of the ZyXEL Device) to your wireless network. This button may either be a physical button on the outside of device, or a menu button similar to the Push Button on this screen.
Page 102
Chapter 7 Wireless LAN Click Network > Wireless LAN > WDS. The following screen displays. WDS is turned on and this screen is configurable when the ZyXEL Device's wireless security mode is No Security or WEP. Figure 55 Network > Wireless LAN > WDS The following table describes the labels in this screen.
Chapter 7 Wireless LAN Table 31 Network > Wireless LAN > WDS LABEL DESCRIPTION This is available only when you select Enabled(Scan) in the Bridge Restrict field. Select the check box and click Apply to have the ZyXEL Device establish a wireless link with the selected wireless device. SSID This is available only when you select Enabled(Scan) in the Bridge Restrict field.
Page 104
Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 32 Wireless LAN > Advanced Setup LABEL DESCRIPTION RTS/CTS Enter a value between 0 and 2432. Threshold Fragmentation This is the maximum data fragment size that can be sent. Enter a value Threshold between 256 and 2432.
Chapter 7 Wireless LAN 7.10 Technical Reference This section discusses wireless LANs in depth. For more information, see the appendix. 7.10.1 Wireless Network Overview The following figure provides an example of a wireless network. Figure 57 Example of a Wireless Network The wireless network is the part in the blue circle.
Chapter 7 Wireless LAN • Every device in the same wireless network must use security compatible with the AP. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 7.10.2 Additional Wireless Terms The following table describes some wireless network terms and acronyms used in the ZyXEL Device’s Web Configurator.
Page 107
Chapter 7 Wireless LAN This type of security is fairly weak, however, because there are ways for unauthorized wireless devices to get the SSID. In addition, unauthorized wireless devices can still see the information that is sent in the wireless network. 7.10.3.2 MAC Address Filter Every device that can use a wireless network has a unique identification number, called a MAC address.
Page 108
Chapter 7 Wireless LAN 7.10.3.4 Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. The types of encryption you can choose depend on the type of authentication.
Chapter 7 Wireless LAN 7.10.4 WiFi Protected Setup Your ZyXEL Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
Page 110
Chapter 7 Wireless LAN 7.10.4.2 PIN Configuration Each WPS-enabled device has its own PIN (Personal Identification Number). This may either be static (it cannot be changed) or dynamic (in some devices you can generate a new PIN by clicking on a button in the configuration interface). Use the PIN method instead of the push-button configuration (PBC) method if you want to ensure that the connection is established between the devices you specify, not just the first two devices to activate WPS in range of each other.
Page 111
Chapter 7 Wireless LAN The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 58 Example WPS Process: PIN Method ENROLLEE REGISTRAR This device’s WPS PIN: 123456 Enter WPS PIN from other device: START...
Page 112
Chapter 7 Wireless LAN The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point. Figure 59 How WPS works ACTIVATE ACTIVATE WITHIN 2 MINUTES WPS HANDSHAKE ENROLLEE REGISTRAR SECURE TUNNEL SECURITY INFO COMMUNICATION The roles of registrar and enrollee last only as long as the WPS setup process is active (two minutes).
Page 113
Chapter 7 Wireless LAN 7.10.4.4 Example WPS Network Setup This section shows how security settings are distributed in an example WPS setup. The following figure shows an example network. In step 1, both AP1 and Client 1 are unconfigured. When WPS is activated on both, they perform the handshake. In this example, AP1 is the registrar, and Client 1 is the enrollee.
Page 114
Chapter 7 Wireless LAN point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead. Figure 62 WPS: Example Network Step 3 EXISTING CONNECTION CLIENT 1 REGISTRAR CLIENT 2 ENROLLEE 7.10.4.5 Limitations of WPS WPS has some limitations of which you should be aware.
Page 115
Chapter 7 Wireless LAN • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network. This is because the registrar has no way of identifying the “correct”...
Page 116
Chapter 7 Wireless LAN P-870H/HW Series User’s Guide...
H A P T E R Network Address Translation (NAT) 8.1 Overview This chapter discusses how to configure NAT on the ZyXEL Device. Network Address Translation (NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
Chapter 8 Network Address Translation (NAT) NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host. Port Forwarding A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though NAT makes your whole inside network appear as a single computer to the outside world.
Page 119
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 35 NAT Port Forwarding LABEL DESCRIPTION Service Name Select a pre-defined service from the drop-down list box. The pre- defined service port number(s) and protocol will display in the External port, Internal port and Protocol fields.
Chapter 8 Network Address Translation (NAT) Table 35 NAT Port Forwarding (continued) LABEL DESCRIPTION External Start This is the first external port number that identifies a service. Port External End This is the last external port number that identifies a service. Port Internal Start This is the first internal port number that identifies a service.
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 36 Port Forwarding Edit LABEL DESCRIPTION Active Clear the check box to disable the rule. Select the check box to enable it. Service Name Enter a name to identify this rule.
Page 122
Chapter 8 Network Address Translation (NAT) To change your ZyXEL Device’s address mapping settings, click Network > NAT > Address Mapping to open the following screen. Figure 65 Network > NAT > Address Mapping The following table describes the fields in this screen. Table 37 Network >...
Chapter 8 Network Address Translation (NAT) 8.4.1 The Address Mapping Rule Edit Screen To edit an address mapping rule, click the rule’s edit icon in the Address Mapping screen to display the screen shown next. Figure 66 Network > NAT > Address Mapping: Edit The following table describes the fields in this screen.
Chapter 8 Network Address Translation (NAT) 8.5 The Trigger Port Screen Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN).
Page 125
Chapter 8 Network Address Translation (NAT) Only Jane can connect to the Real Audio server until the connection is closed or times out. The ZyXEL Device times out in three minutes with UDP (User Datagram Protocol) or two hours with TCP/IP (Transfer Control Protocol/Internet Protocol). Click NAT >...
Chapter 8 Network Address Translation (NAT) Table 39 NAT Trigger Port (continued) LABEL DESCRIPTION Server Name This field displays the name of the service used by the packets for this virtual server. WAN Interface This field displays the WAN interface through which the service is forwarded.
Page 127
Chapter 8 Network Address Translation (NAT) The following table describes the labels in this screen. Table 40 NAT > Port Triggering > Add LABEL DESCRIPTION Active Clear the check box to disable the rule. Select the check box to enable it. Service Enter a name to identify this rule.
Chapter 8 Network Address Translation (NAT) 8.6 The DMZ Host Screen In addition to the servers for specified services, NAT supports a default server IP address. A default server receives packets from ports that are not specified in the NAT Port Forwarding Setup screen. Figure 70 NAT >...
Chapter 8 Network Address Translation (NAT) Use this screen to enable or disable the SIP (VoIP) ALG in the ZyXEL Device. To access this screen, click NAT > ALG. Figure 71 NAT > ALG Each field is described in the following table. Table 42 NAT >...
Page 130
Chapter 8 Network Address Translation (NAT) Table 43 Services and Port Numbers SERVICES PORT NUMBER SNMP trap PPTP (Point-to-Point Tunneling Protocol) 1723 Port Forwarding Example Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example).
H A P T E R MAC Filter This chapter discusses MAC address filtering. 9.1 Overview MAC filtering means sifting traffic going through the ZyXEL Device based on the source and/or destination MAC addresses. 9.1.1 What You Can Do in this Chapter The MAC Filter screen lets you view and configure the MAC filtering rules (Section 9.2 on page...
Page 132
Chapter 9 MAC Filter MAC filtering rules. The MAC filtering rules apply only to frames going through a bridge connection. Figure 73 MAC Filter The following table describes the labels in this screen. Table 44 MAC Filter LABEL DESCRIPTION MAC Filtering Policy For Each Interface Interface...
Chapter 9 MAC Filter Table 44 MAC Filter (continued) LABEL DESCRIPTION Click Add to create a new rule. Remove Click Remove to delete the selected rule(s). 9.2.1 Creating MAC Filtering Rules In the MAC Filter screen, click Add to display this screen and refer to the following table for information on the labels.
Page 134
Chapter 9 MAC Filter P-870H/HW Series User’s Guide...
H A P T E R Firewall 10.1 Overview This chapter shows you how to enable and configure the ZyXEL Device firewall settings. The ZyXEL Device firewall is a packet filtering firewall and restricts access based on the source/destination computer network address of a packet and the type of application.
Chapter 10 Firewall Some of the most common IP ports are: Table 46 Common IP Ports Telnet HTTP SMTP POP3 Default Filtering Policies Filtering rules are grouped based on the direction of travel of packets to which they apply. The default rule for incoming traffic blocks all incoming connections from the WAN to the LAN.
Page 137
Chapter 10 Firewall The following table describes the labels in this screen. Table 47 Firewall > Incoming LABEL DESCRIPTION Active Firewall Select this check box to enable the firewall on the ZyXEL Device. When the firewall is enabled, the ZyXEL Device blocks all incoming traffic from the WAN to the LAN.
Chapter 10 Firewall 10.3.1 Creating Incoming Firewall Rules In the Incoming screen, click Add to display this screen and refer to the following table for information on the labels. Figure 76 Firewall > Incoming: Add The following table describes the labels in this screen. Table 48 Firewall >...
Page 139
Chapter 10 Firewall Table 48 Firewall > Incoming: Add (continued) LABEL DESCRIPTION Interface Select Select All to apply the rule to all interfaces on the ZyXEL Device or select the specific WAN interface(s) to which this rule applies. Back Click Back to return to the previous screen. Apply Click Apply to save your customized settings and exit this screen.
Page 140
Chapter 10 Firewall P-870H/HW Series User’s Guide...
H A P T E R Certificate 11.1 Overview The ZyXEL Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 11 Certificate 11.3 The Local Certificates Screen Click Security > Certificates to open the Local Certificates screen. This is the ZyXEL Device’s summary list of certificates and certification requests. Figure 77 Local Certificates The following table describes the labels in this screen. Table 49 Local Certificates LABEL DESCRIPTION...
Chapter 11 Certificate Table 49 Local Certificates (continued) LABEL DESCRIPTION Create Click this button to go to the screen where you can have the ZyXEL Certificate Device generate a certification request. Request Import Click this button to open a screen where you can save the certificate Certificate that you have enrolled from a certification authority from your computer to the ZyXEL Device.
Chapter 11 Certificate Table 50 Create Certificate Request (continued) LABEL DESCRIPTION Back Click Back to return to the previous screen. Apply Click Apply to begin certificate or certification request generation. After you click Apply, the Certificate Request Details screen displays. Click Load Signed Certificate to import a certificate signed by the CA to replace the request (see Section 11.3.4 on page...
Page 145
Chapter 11 Certificate Note: You must remove any spaces from the certificate’s filename before you can import it. Figure 80 Import Local Certificate The following table describes the labels in this screen. Table 51 Import Local Certificate LABEL DESCRIPTION Certificate Type up to 31 ASCII characters (not including spaces) to identify this Name certificate.
Chapter 11 Certificate Table 51 Import Local Certificate LABEL DESCRIPTION Private Copy and paste the private key into the text box to store it on the ZyXEL Device. Back Click Back to return to the previous screen. Apply Click Apply to save the certificate on the ZyXEL Device. 11.3.3 Certificate Details Click Security >...
Chapter 11 Certificate The following table describes the labels in this screen. Table 52 Certificate Details LABEL DESCRIPTION Name This field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this certificate.
Chapter 11 Certificate Figure 82 Load Certificate The following table describes the labels in this screen. Table 53 Load Certificate LABEL DESCRIPTION Certificate This field is read-only and displays the identifying name of this certificate. Name Certificate Copy and paste the certificate into the text box to store it on the ZyXEL Device.
Page 150
Chapter 11 Certificate as being trustworthy; thus you do not need to import any certificate that is signed by one of these certification authorities. Figure 83 Trusted CA The following table describes the fields in this screen. Table 54 Trusted CA LABEL DESCRIPTION Name...
Chapter 11 Certificate 11.4.1 View Trusted CA Certificate Click the View button in the Trusted CA screen to open the following screen. Use this screen to view in-depth information about the certification authority’s certificate. Figure 84 Trusted CA: View The following table describes the fields in this screen. Table 55 Trusted CA: View LABEL DESCRIPTION...
Chapter 11 Certificate 11.4.2 Import Trusted CA Certificate Click the Import Certificate button in the Trusted CA screen to open the following screen. The ZyXEL Device trusts any valid certificate signed by any of the imported trusted CA certificates. Figure 85 Trusted CA: Import Certificate The following table describes the fields in this screen.
H A P T E R Static Route 12.1 Overview The ZyXEL Device usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the ZyXEL Device send data to devices not reachable through the default gateway, use static routes. For example, the next figure shows a computer (A) connected to the ZyXEL Device’s LAN interface.
Chapter 12 Static Route 12.2 The Static Route Screen Click Advanced > Static Route to open the Static Route screen. Figure 87 Advanced > Static Route The following table describes the labels in this screen. Table 57 Advanced > Static Route LABEL DESCRIPTION This is the number of an individual static route.
Chapter 12 Static Route 12.2.1 Static Route Edit Click the Add button in the Static Route screen. Use this screen to configure the required information for a static route. Figure 88 Static Route: Add The following table describes the labels in this screen. Table 58 Static Route: Add LABEL DESCRIPTION...
Page 156
Chapter 12 Static Route P-870H/HW Series User’s Guide...
H A P T E R Policy Forwarding 13.1 Overview Traditionally, routing is based on the destination address only and the ZyXEL Device takes the shortest path to forward a packet. Policy forwarding allows the ZyXEL Device to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator.
Chapter 13 Policy Forwarding The following table describes the labels in this screen. Table 59 Advanced > Policy Forwarding LABEL DESCRIPTION Policy Name This is the name of the rule. SourceIP This is the source IP address. Protocol This is the IP protocol. SourcePort This is the source port number.
Page 159
Chapter 13 Policy Forwarding Table 60 Policy Forwarding: Add LABEL DESCRIPTION Apply Click Apply to save your changes back to the ZyXEL Device. Cancel Click Cancel to begin configuring this screen afresh. P-870H/HW Series User’s Guide...
Page 160
Chapter 13 Policy Forwarding P-870H/HW Series User’s Guide...
H A P T E R 14.1 Overview Routing Information Protocol (RIP, RFC 1058 and RFC 1389) allows a device to exchange routing information with other routers. 14.1.1 What You Can Do in this Chapter The RIP screen lets you set up RIP settings on the ZyXEL Device (Section 14.2 on page 161).
Page 162
Chapter 14 RIP The following table describes the labels in this screen. Table 61 Advanced > RIP LABEL DESCRIPTION Interface This is the name of the interface in which the RIP setting is used. Version The RIP version controls the format and the broadcasting method of the RIP packets that the ZyXEL Device sends (it recognizes both formats when receiving).
H A P T E R Quality of Service (QoS) 15.1 Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested.
Chapter 15 Quality of Service (QoS) • The Monitor screen lets you view the ZyXEL Device's QoS-related packet statistics (Section 15.6 on page 174). 15.2 What You Need to Know The following terms and concepts may help as you read through this chapter. QoS versus Cos QoS is used to prioritize source-to-destination traffic flows.
Page 165
Chapter 15 Quality of Service (QoS) Use this screen to enable or disable QoS and set the default DSCP value for incoming traffic does not match a class. See Section 15.1 on page 163 for more information. Figure 92 QoS General The following table describes the labels in this screen.
Chapter 15 Quality of Service (QoS) 15.4 The Queue Setup Screen Click QoS > Queue Setup to open the screen as shown next. Use this screen to configure QoS queue assignment. Figure 93 QoS Queue Setup The following table describes the labels in this screen. Table 63 QoS Queue Setup LABEL DESCRIPTION...
Chapter 15 Quality of Service (QoS) 15.4.1 Adding a QoS Queue Click the Add button or the edit icon in the Queue Setup screen to configure a queue. Figure 94 QoS Queue Setup: Add The following table describes the labels in this screen. Table 64 QoS Queue Setup: Add LABEL DESCRIPTION...
Chapter 15 Quality of Service (QoS) 15.5 The Class Setup Screen Use this screen to add, edit or delete QoS classifiers. A classifier groups traffic into data flows according to specific criteria such as the source address, destination address, source port number, destination port number or incoming interface. For example, you can configure a classifier to select traffic from the same protocol port (such as Telnet) to form a flow.
Page 169
Chapter 15 Quality of Service (QoS) Table 65 QoS Class Setup (continued) LABEL DESCRIPTION VLAN ID Tag This is the VLAN ID number assigned to traffic of this classifier. To Queue This is the name of the queue in which traffic of this classifier is put. Modify Click the Edit icon to go to the screen where you can edit the classifier.
Chapter 15 Quality of Service (QoS) 15.5.1 QoS Class Edit Click the Add button or the Edit icon in the Class Setup screen to configure a classifier. Figure 96 QoS Class Setup: Add P-870H/HW Series User’s Guide...
Page 171
Chapter 15 Quality of Service (QoS) The following table describes the labels in this screen. Table 66 QoS Class Configuration LABEL DESCRIPTION Class Configuration Active Select to enable or disable this classifier. Class Name Enter a descriptive name of up to 20 printable English keyboard characters, including spaces.
Page 172
Chapter 15 Quality of Service (QoS) Table 66 QoS Class Configuration (continued) LABEL DESCRIPTION Ether Type Select a predefined application to configure a class for the matched traffic. If you select IP, you also need to configure source or destination MAC address, IP address, DHCP options, DSCP value or the protocol type.
Page 173
Chapter 15 Quality of Service (QoS) Table 66 QoS Class Configuration (continued) LABEL DESCRIPTION 802.1P This field is available only when you select 802.1Q in the Ether Type field. Select this option and select a priority level (between 0 and 7) from the drop down list box.
Chapter 15 Quality of Service (QoS) 15.6 The QoS Monitor Screen To view the ZyXEL Device’s QoS packet statistics, click Advanced > QoS > Monitor. The screen appears as shown. Figure 97 QoS > Monitor The following table describes the labels in this screen. Table 67 QoS >...
Chapter 15 Quality of Service (QoS) 15.7 Technical Reference The following section contains additional technical information about the ZyXEL Device features described in this chapter. IEEE 802.1Q Tag The IEEE 802.1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges.
Page 176
Chapter 15 Quality of Service (QoS) service desired. This allows the intermediary DiffServ-compliant network devices to handle the packets differently depending on the code points without the need to negotiate paths or remember state information for every flow. In addition, applications do not have to request a particular service or give advanced notice of where the traffic is going.
H A P T E R Dynamic DNS Setup 16.1 Overview Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU- SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
Chapter 16 Dynamic DNS Setup 16.3 The Dynamic DNS Screen To change your ZyXEL Device’s DDNS, click Advanced > Dynamic DNS. The screen appears as shown. Figure 98 Advanced > Dynamic DNS The following table describes the fields in this screen. Table 69 Advanced >...
H A P T E R Remote Management 17.1 Overview This chapter explains how to configure the TR-069 settings and access control settings on the ZyXEL Device. 17.1.1 What You Can Do in this Chapter • The TR-069 screen lets you configure the ZyXEL Device’s TR-069 auto- configuration settings (Section 17.3 on page 181).
Page 180
Chapter 17 Remote Management Click Advanced > Remote MGMT to open the following screen. Use this screen to configure your P-870HA to be managed by an ACS. Figure 99 TR-069 The following table describes the fields in this screen. Table 70 TR-069 LABEL DESCRIPTION Inform...
Chapter 17 Remote Management Table 70 TR-069 (continued) LABEL DESCRIPTION Connection Enter the connection request password. Request When the ACS makes a connection request to the ZyXEL Device, this Password password is used to authenticate the ACS. Connection This shows the connection request URL. Request URL The ACS can use this URL to make a connection request to the ZyXEL Device.
Chapter 17 Remote Management 17.4 The Service Control Screen Click Advanced > Remote MGMT > Service Control to open the following screen. Use this screen to decide what services you may use to access which ZyXEL Device interface. Figure 101 Service Control The following table describes the fields in this screen.
Chapter 17 Remote Management 17.5 The IP Address Screen Click Advanced > Remote MGMT > IP Address to open the following screen. Use this screen to specify the “trusted” computers from which an administrator may use a service to manage the ZyXEL Device. Figure 102 IP Address The following table describes the fields in this screen.
Chapter 17 Remote Management 17.5.1 Adding an IP Address Click the Add button in the IP Address screen to open the following screen. Figure 103 IP Address: Add The following table describes the fields in this screen. Table 74 IP Address: Add LABEL DESCRIPTION IP Address...
H A P T E R Universal Plug-and-Play (UPnP) 18.1 Overview Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
Chapter 18 Universal Plug-and-Play (UPnP) Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues.
Chapter 18 Universal Plug-and-Play (UPnP) The following table describes the fields in this screen. Table 75 Advanced > UPnP LABEL DESCRIPTION Activate Universal Plug Select this check box to enable UPnP. Be aware that anyone and Play (UPnP) Feature could use a UPnP application to open the Web Configurator's login screen without entering the ZyXEL Device's IP address (although you must still enter the password to access the Web Configurator).
Page 188
Chapter 18 Universal Plug-and-Play (UPnP) Click on the Windows Setup tab and select Communication in the Components selection box. Click Details. Figure 105 Add/Remove Programs: Windows Setup: Communication In the Communications window, select the Universal Plug and Play check box in the Components selection box.
Page 189
Chapter 18 Universal Plug-and-Play (UPnP) Click OK to go back to the Add/Remove Programs Properties window and click Next. Restart the computer when prompted. Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. Click Start and Control Panel.
Page 190
Chapter 18 Universal Plug-and-Play (UPnP) The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. Figure 108 Windows Optional Networking Components Wizard P-870H/HW Series User’s Guide...
Chapter 18 Universal Plug-and-Play (UPnP) In the Networking Services window, select the Universal Plug and Play check box. Figure 109 Networking Services Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 18.5 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP.
Page 192
Chapter 18 Universal Plug-and-Play (UPnP) Right-click the icon and select Properties. Figure 110 Network Connections P-870H/HW Series User’s Guide...
Page 193
Chapter 18 Universal Plug-and-Play (UPnP) In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 111 Internet Connection Properties P-870H/HW Series User’s Guide...
Page 194
Chapter 18 Universal Plug-and-Play (UPnP) You may edit or delete the port mappings or click Add to manually add port mappings. Figure 112 Internet Connection Properties: Advanced Settings Figure 113 Internet Connection Properties: Advanced Settings: Add When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
Page 195
Chapter 18 Universal Plug-and-Play (UPnP) Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 114 System Tray Icon Double-click on the icon to display your current Internet connection status. Figure 115 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the ZyXEL Device...
Page 196
Chapter 18 Universal Plug-and-Play (UPnP) Select My Network Places under Other Places. Figure 116 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. P-870H/HW Series User’s Guide...
Page 197
Chapter 18 Universal Plug-and-Play (UPnP) Right-click on the icon for your ZyXEL Device and select Invoke. The Web Configurator login screen displays. Figure 117 Network Connections: My Network Places Right-click on the icon for your ZyXEL Device and select Properties. A properties window displays with basic information about the ZyXEL Device.
H A P T E R Parental Control 19.1 Overview Parental control allows you to block web sites with the specific URL. You can also define time periods and days during which the ZyXEL Device performs parental control on a specific user. 19.1.1 What You Can Do in this Chapter •...
Chapter 19 Parental Control The following table describes the fields in this screen. Table 76 Parental Control > Time Restriction LABEL DESCRIPTION This shows the index number of the schedule. Active Select the check box to enable the schedule. username This shows the name of the user.
Chapter 19 Parental Control The following table describes the fields in this screen. Table 77 Time Restriction Configuration LABEL DESCRIPTION User Name Enter the name of the user. MAC Address Enter the MAC address of the LAN user’s computer to which this schedule applies.
Chapter 19 Parental Control The following table describes the fields in this screen. Table 78 Parental Control > URL Filter LABEL DESCRIPTION Active URL Filter Select the check box to enable URL filtering on the ZyXEL Device. URL List Type If you select Block, the ZyXEL Device prohibits the users from viewing the Web sites with the URLs listed below.
H A P T E R Interface Group 20.1 Overview By default, all LAN and WAN interfaces on the ZyXEL Device are in the same group and can communicate with each other. You can create multiple groups to have the ZyXEL Device assign the IP addresses in different domains to different groups.
Chapter 20 Interface Group In the following example, the client that sends packets with the source MAC address 00:19:cb:01:23:45 is assigned the IP address 192.168.2.2 and uses the WAN interface ptm0_2. Figure 123 Interface Grouping Application Default: ETH 2~4 192.168.1.x/24 ptm0_1 Internet ptm0_2...
Page 205
Chapter 20 Interface Group Note: An interface can belong to a group only. Figure 125 Interface Group Configuration The following table describes the fields in this screen. Table 81 Interface Group Configuration LABEL DESCRIPTION Group Name Enter a name to identify this group. WAN Interface Select a WAN interface to be used in this group.
Chapter 20 Interface Group Table 81 Interface Group Configuration (continued) LABEL DESCRIPTION Back Click this button to return to the previous screen without saving any changes. Apply Click this button to save your settings back to the ZyXEL Device. 20.2.2 Interface Grouping Criteria Click the Add button in the Interface Grouping Configuration screen to open the following screen.
Page 207
Chapter 20 Interface Group Table 82 Interface Grouping Criteria (continued) LABEL DESCRIPTION DUID Type Select DUID-LLT (DUID Based on Link-layer Address Plus Time) to enter the hardware type, a time value and the MAC address of the device. Select DUID-EN (DUID Assigned by Vendor Based upon Enterprise Number) to enter the vendor’s registered enterprise number.
Page 208
Chapter 20 Interface Group P-870H/HW Series User’s Guide...
H A P T E R System Settings 21.1 Overview This chapter shows you how to configure system related settings, such as system time, password, name, the domain name and the inactivity timeout interval. 21.1.1 What You Can Do in this Chapter •...
Chapter 21 System Settings The following table describes the labels in this screen. Table 83 Maintenance > System > Genera LABEL DESCRIPTION UserName Type the user name you use to access the system. Old Password Type the default password or the existing password you use to access the system in this field.
Page 211
Chapter 21 System Settings The following table describes the fields in this screen. Table 84 Maintenance > System > Time Setting LABEL DESCRIPTION Current Time Current Time This field displays the time of your ZyXEL Device. Each time you reload this page, the ZyXEL Device synchronizes the time with the time server.
Page 212
Chapter 21 System Settings P-870H/HW Series User’s Guide...
H A P T E R Logs 22.1 Overview This chapter contains information about configuring general log settings and viewing the ZyXEL Device’s logs. The Web Configurator allows you to choose which categories of events and/or alerts to have the ZyXEL Device log and then display the logs or have the ZyXEL Device send them to a syslog server.
Chapter 22 Logs The log wraps around and deletes the old entries after it fills. Figure 129 Maintenance > Logs > View Log The following table describes the fields in this screen. Table 85 Maintenance > Logs > View Log LABEL DESCRIPTION Display...
Page 215
Chapter 22 Logs To change your ZyXEL Device’s log settings, click Maintenance > Logs > Log Settings. The screen appears as shown. Figure 130 Maintenance > Logs > Log Settings The following table describes the fields in this screen. Table 86 Maintenance > Logs > Log Settings LABEL DESCRIPTION Active...
Page 216
Chapter 22 Logs P-870H/HW Series User’s Guide...
H A P T E R Tools Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE your ZyXEL Device. 23.1 Overview This chapter explains how to upload new firmware, manage configuration files and restart your ZyXEL Device. Use the instructions in this chapter to change the device’s configuration file or upgrade its firmware.
Chapter 23 Tools 23.2 The Firmware Screen Click Maintenance > Tools to open the Firmware screen. Follow the instructions in this screen to upload firmware to your ZyXEL Device. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
Page 219
Chapter 23 Tools After you see the Firmware Upload in Progress screen, wait two minutes before logging into the ZyXEL Device again. Figure 132 Firmware Upload In Progress The ZyXEL Device automatically restarts in this time causing a temporary network disconnect.
Chapter 23 Tools 23.3 The Configuration Screen Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears in this screen, as shown next. Figure 135 Maintenance > Tools > Configuration Backup Configuration Backup Configuration allows you to back up (save) the ZyXEL Device’s current configuration to a file on your computer.
Page 221
Chapter 23 Tools Restore Configuration Restore Configuration allows you to upload a new or previously saved configuration file from your computer to your ZyXEL Device. Table 88 Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ...
Chapter 23 Tools If the upload was not successful, the following screen will appear. Click Tools > Configuration to go back to the Configuration screen. Figure 138 Configuration Upload Error Reset to Factory Defaults Click the Reset button to clear all user-entered configuration information and return the ZyXEL Device to its factory defaults.
Page 223
Chapter 23 Tools Click Maintenance > Tools > Restart. Click Restart to have the ZyXEL Device reboot. This does not affect the ZyXEL Device's configuration. Figure 140 Maintenance > Tools >Restart P-870H/HW Series User’s Guide...
Page 224
Chapter 23 Tools P-870H/HW Series User’s Guide...
H A P T E R Diagnostic 24.1 Overview The Diagnostic screens display information to help you identify problems with the ZyXEL Device. The route between a CO VDSL switch and one of its CPE may go through switches owned by independent organizations. A connectivity fault point generally takes time to discover and impacts subscriber’s network access.
Chapter 24 Diagnostic • Loopback test - checks if the MEP port receives its Loop Back Response (LBR) from its target after it sends the Loop Back Message (LBM). If no response is received, there might be a connectivity fault between them. •...
Chapter 24 Diagnostic 24.4 The 802.1ag Screen Click Diagnostic to open the following screen. Use this screen to perform CFM actions. Figure 142 802.1ag The following table describes the fields in this screen. Table 90 Maintenance > Diagnostic > 802.1ag LABEL DESCRIPTION 802.1ag...
Page 228
Chapter 24 Diagnostic Table 90 Maintenance > Diagnostic > 802.1ag (continued) LABEL DESCRIPTION Maintenance Select the format which the ZyXEL Device uses to send this MA Association (MA) information in the domain (MD). Options are VID, String and Format Integer. If you select VID or Integer, the ZyXEL Device adds the VLAN ID you specified for an MA in the CCM.
H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • ZyXEL Device Access and Login • Internet Access 25.1 Power, Hardware Connections, and LEDs The ZyXEL Device does not turn on.
Chapter 25 Troubleshooting Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Turn the ZyXEL Device off and on. If the problem continues, contact the vendor. 25.2 ZyXEL Device Access and Login I forgot the IP address for the ZyXEL Device.
Chapter 25 Troubleshooting • If you changed the IP address (Section on page 82), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the ZyXEL Device. Check the hardware connections, and make sure the LEDs are behaving as expected.
Page 232
Chapter 25 Troubleshooting Make sure you entered your ISP account information correctly in the WAN screens. These fields are case-sensitive, so make sure [Caps Lock] is not on. If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP.
Page 233
Chapter 25 Troubleshooting • Check the settings for QoS. If it is disabled, you might consider activating it. If it is enabled, you might consider raising or lowering the priority for some applications. P-870H/HW Series User’s Guide...
Page 234
Chapter 25 Troubleshooting P-870H/HW Series User’s Guide...
H A P T E R Product Specifications The following tables summarize the ZyXEL Device’s hardware and firmware features. 26.1 Hardware Specifications Table 91 Hardware Specifications Dimensions 189 (W) x 132 (D) x 40 (H) mm Weight 357 g Power Specification 12 V DC 1A Built-in Switch Four auto-negotiating, auto MDI/MDI-X 10/100 Mbps RJ-45...
Page 236
Chapter 26 Product Specifications Table 92 Firmware Specifications (continued) Default User Name admin Default Password 1234 DHCP Server IP Pool 192.168.1.33 to 192.168.1.254 Static Routes Device Management Use the Web Configurator to easily configure the rich range of features on the ZyXEL Device. Wireless Allow the IEEE 802.11b and/or IEEE 802.11g wireless clients to Functionality...
Page 237
Chapter 26 Product Specifications Table 92 Firmware Specifications (continued) PPPoE Support PPPoE (Point-to-Point Protocol over Ethernet) emulates a dial-up (RFC2516) connection. It allows your ISP to use their existing network configuration with newer broadband technologies such as ADSL. The PPPoE driver on your device is transparent to the computers on the LAN, which see only Ethernet and are not aware of PPPoE thus saving you from having to manage PPPoE clients on individual computers.
Chapter 26 Product Specifications Table 92 Firmware Specifications (continued) Other Protocol PPP (Point-to-Point Protocol) link layer protocol Support Transparent bridging for unsupported network layer protocols RIP I/RIP II ICMP IP Multicasting IGMP v1 and v2 IGMP Proxy Management Embedded Web Configurator Remote Firmware Upgrade Syslog TR-069...
Page 239
Chapter 26 Product Specifications Table 93 Wireless Features WPA2 WPA 2 is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Other Wireless Features IEEE 802.11g Compliance Frequency Range: 2.4 GHz ISM Band Advanced Orthogonal Frequency Division Multiplexing (OFDM) Data Rates: 54Mbps, 11Mbps, 5.5Mbps, 2Mbps, and 1 Mbps Auto Fallback...
Page 240
Chapter 26 Product Specifications Table 94 Standards Supported (continued) STANDARD DESCRIPTION IEEE 802.11d Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges IEEE 802.11x Port Based Network Access Control. IEEE 802.11e QoS IEEE 802.11 e Wireless LAN for Quality of Service ITU-T G.993.2 ITU standard that defines VDSL2.
P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Page 242
Appendix A Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. Figure 143 Windows XP: Start Menu In the Control Panel, click the Network Connections icon.
Page 243
Appendix A Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. Figure 145 Windows XP: Control Panel > Network Connections > Properties On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 146 Windows XP: Local Area Connection Properties P-870H/HW Series User’s Guide...
Page 244
Appendix A Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Figure 147 Windows XP: Internet Protocol (TCP/IP) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Page 245
Appendix A Setting Up Your Computer’s IP Address In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information.
Page 246
Appendix A Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. Figure 148 Windows Vista: Start Menu In the Control Panel, click the Network and Internet icon. Figure 149 Windows Vista: Control Panel Click the Network and Sharing Center icon.
Page 247
Appendix A Setting Up Your Computer’s IP Address Click Manage network connections. Figure 151 Windows Vista: Network and Sharing Center Right-click Local Area Connection and then select Properties. Figure 152 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Page 248
Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 153 Windows Vista: Local Area Connection Properties P-870H/HW Series User’s Guide...
Page 249
Appendix A Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 154 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Page 250
Appendix A Setting Up Your Computer’s IP Address In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information.
Page 251
Appendix A Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. Figure 155 Mac OS X 10.4: Apple Menu In the System Preferences window, click the Network icon.
Page 252
Appendix A Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 157 Mac OS X 10.4: Network Preferences For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab.
Page 253
Appendix A Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. •...
Page 254
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 160 Mac OS X 10.4: Network Utility P-870H/HW Series User’s Guide...
Page 255
Appendix A Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. Click Apple > System Preferences. Figure 161 Mac OS X 10.5: Apple Menu In System Preferences, click the Network icon. Figure 162 Mac OS X 10.5: Systems Preferences P-870H/HW Series User’s Guide...
Page 256
Appendix A Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 163 Mac OS X 10.5: Network Preferences > Ethernet From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: •...
Page 257
Appendix A Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your ZyXEL Device. Figure 164 Mac OS X 10.5: Network Preferences > Ethernet Click Apply and close the window. P-870H/HW Series User’s Guide...
Page 258
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 165 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Page 259
Appendix A Setting Up Your Computer’s IP Address Click System > Administration > Network. Figure 166 Ubuntu 8: System > Administration Menu When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Page 260
Appendix A Setting Up Your Computer’s IP Address In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 168 Ubuntu 8: Administrator Account Authentication In the Network Settings window, select the connection that you want to configure, then click Properties.
Page 261
Appendix A Setting Up Your Computer’s IP Address The Properties dialog box opens. Figure 170 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
Page 262
Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 171 Ubuntu 8: Network Settings > DNS Click the Close button to apply the changes.
Page 263
Appendix A Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly. Figure 172 Ubuntu 8: Network Tools P-870H/HW Series User’s Guide...
Page 264
Appendix A Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
Page 265
Appendix A Setting Up Your Computer’s IP Address When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 174 openSUSE 10.3: K Menu > Computer Menu When the YaST Control Center window opens, select Network Devices and then click the Network Card icon.
Page 266
Appendix A Setting Up Your Computer’s IP Address When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 176 openSUSE 10.3: Network Settings P-870H/HW Series User’s Guide...
Page 267
Appendix A Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 177 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
Page 268
Appendix A Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 178 openSUSE 10.3: Network Settings Click Finish to save your settings and close the window.
Page 269
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 179 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Page 270
Appendix A Setting Up Your Computer’s IP Address P-870H/HW Series User’s Guide...
P P E N D I X Pop-up Windows, JavaScript and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
Page 272
Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 182 Internet Options: Privacy Click Apply to save this setting.
Page 273
Appendix B Pop-up Windows, JavaScript and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 183 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. P-870H/HW Series User’s Guide...
Page 274
Appendix B Pop-up Windows, JavaScript and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 184 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Page 275
Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 185 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
Page 276
Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 186 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
Page 277
Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 187 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. P-870H/HW Series User’s Guide...
Page 278
Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 188 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Page 279
Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 190 Mozilla Firefox Content Security P-870H/HW Series User’s Guide...
Page 280
Appendix B Pop-up Windows, JavaScript and Java Permissions P-870H/HW Series User’s Guide...
P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
Page 282
Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 191 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Page 283
Appendix C IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1”...
Page 284
Appendix C IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet.
Page 285
Appendix C IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 192 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
Page 286
Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 193 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
Page 287
Appendix C IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 2 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 99 Subnet 1 LAST OCTET BIT IP/SUBNET MASK...
Page 288
Appendix C IP Addresses and Subnetting Table 102 Subnet 4 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.193 192.168.1.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).
Page 289
Appendix C IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 105 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.128.0 (/17) 32766...
Page 290
Appendix C IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the ZyXEL Device unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
Page 291
Appendix C IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 194 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers.
Page 292
Appendix C IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 196 Conflicting Computer and Router IP Addresses Example P-870H/HW Series User’s Guide...
P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Page 294
Appendix D Wireless LANs with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 198 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
Page 295
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 199 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data.
Page 296
Appendix D Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 200 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Page 297
Appendix D Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Page 298
Appendix D Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 106 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/...
Page 299
Appendix D Wireless LANs IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices.
Page 300
Appendix D Wireless LANs • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: •...
Page 301
Appendix D Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication.
Page 302
Appendix D Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
Page 303
Appendix D Wireless LANs If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2.
Page 304
Appendix D Wireless LANs keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
Page 305
Appendix D Wireless LANs The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.
Page 306
Appendix D Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 202 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Page 307
Appendix D Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN.
Page 308
Appendix D Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points.
P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.
Page 310
Appendix E Common Services Table 110 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
Page 311
Appendix E Common Services Table 110 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL User-Defined PPTP (Point-to-Point Tunneling (GRE) Protocol) enables secure transfer of data over public networks.
Page 312
Appendix E Common Services Table 110 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution.
Open Software Announcements End-User License Agreement for “P-870H/HW Series” WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Page 314
Appendix F Open Software Announcements backup copy of the Software and Documentation solely for archival, back-up or disaster recovery purposes. You shall not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed.
Page 315
Appendix F Open Software Announcements contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products. 5.Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information.
Page 316
Appendix F Open Software Announcements LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8.Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME.
Page 317
Appendix F Open Software Announcements effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.
Page 318
Appendix F Open Software Announcements Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
Page 319
Appendix F Open Software Announcements TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Page 320
Appendix F Open Software Announcements These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
Page 321
Appendix F Open Software Announcements 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
Page 322
Appendix F Open Software Announcements places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9.
Page 323
Appendix F Open Software Announcements END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein, if any, are the property of their respective owners. This Product includes ppp software under below license This directory contains source code and precompiled binaries for ppp-2.4, a package which implements the Point-to-Point Protocol (PPP) to provide Internet connections over serial lines.
Page 324
Appendix F Open Software Announcements FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
Page 326
Appendix G Legal Information Ce produit est conçu pour les bandes de fréquences 2,4 GHz conformément à la législation Européenne. En France métropolitaine, suivant les décisions n°03-908 et 03-909 de l'ARCEP, la puissance d'émission ne devra pas dépasser 10 mW (10 dB) dans le cadre d'une installation WiFi en extérieur pour les fréquences comprises entre 2454 MHz et 2483,5 MHz.
Page 327
Appendix G Legal Information FCC Radiation Exposure Statement • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. • IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware- limited to channels 1 through 11. •...
Page 328
Appendix G Legal Information ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it...
Index Index authentication creating importing 144, 148 Advanced Encryption Standard public key See AES. replacing storage space Certification Authority alternative subnet mask notation Certification Authority. see CA antenna certifications directional notices gain viewing omni-directional AP (access point) Application Layer Gateway CCMs applications link trace test...
Page 330
Index DHCP client external antenna DHCP client list external RADIUS DHCP relay DHCP server diagnostic Differentiated Services, see DiffServ DiffServ FCC interference statement marking rule Finger digital IDs Firewall disclaimer Creating/Editing Rules firmware upload DNS server address assignment upload error Domain Name firmware version domain name system...
Page 331
Index Independent Basic Service Set See IBSS initialization vector (IV) install UPnP Windows Me MAC address Windows XP MAC address filter action internal routing table MAC filter 95, 97 Internet access Maintenance Association, see MA Internet Assigned Numbers Authority Maintenance Domain, see MD See IANA Maintenance End Point, see MEP IP Address...
Page 332
Index TR-069 Remote Procedure Calls, see RPCs resetting your device Packet Transfer Mode restore Pairwise Master Key (PMK) 303, 305 RFC 1058. See RIP. Per-Hop Behavior, see PHB RFC 1389. See RIP. RFC 1631 Point-to-Point Tunneling Protocol RFC 2131. See DHCP. POP3 129, 135, 136 RFC 2132.
Page 333
Index syntax conventions VLAN tag system name WAN (Wide Area Network) Tag Control Information See TCI WAN interface Tag Protocol Identifier See TPID WAN statistics warranty note TCP/IP Web Configurator temperature WEP (Wired Equivalent Privacy) Temporal Key Integrity Protocol (TKIP) WEP encryption Wi-Fi Protected Access TPID...
Need help?
Do you have a question about the P-870H-53A v2 and is the answer not in the manual?
Questions and answers