Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
P-202H Plus v2
ZyXEL Communications P-202H Plus v2 Manuals
Manuals and User Guides for ZyXEL Communications P-202H Plus v2. We have
4
ZyXEL Communications P-202H Plus v2 manuals available for free PDF download: Support Notes, User Manual, Quick Start Manual, Brochure
ZyXEL Communications P-202H Plus v2 User Manual (375 pages)
ISDN Internet Access Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 10.29 MB
Table of Contents
Table of Contents
9
Copyright
3
Certifications
4
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
Preface
31
User Guide Feedback
32
Chapter 1 Getting to Know Your Zyxel Device
33
Features
33
Introducing the Zyxel Device
33
Port Switch
34
Ppp Multilink
35
Call Control
36
Data Compression
36
Full Network Management
36
Logging and Tracing
36
Applications for the Zyxel Device
37
Figure 1 Internet Access Application
37
Internet Access
37
LAN-To-LAN Connection
37
Figure 2 LAN-To-LAN Application Example
38
Figure 3 Remote Access
38
Remote Access Server
38
Secure Broadband Internet Access and VPN
38
Figure 4 Secure Internet Access and VPN Application
39
Figure 5 Front Panel
39
Front Panel Leds
39
Hardware Connection
40
Table 1 Front Panel Leds
40
Accessing the Web Configurator
41
Chapter 2 Introducing the Web Configurator
41
Web Configurator Overview
41
Resetting the Zyxel Device
42
Figure 6 Password Screen
42
Figure 7 Change Password at Login
42
Using the Reset Button
42
Figure 8 Web Configurator: Main Screen
43
Navigating the Web Configurator
43
Table 2 Web Configurator Screens Summary
43
Changing Login Password
44
Figure 9 Password
45
Table 3 Password
45
Chapter 19 Internet Access Setup ......................................................................................... 184
47
Introduction
47
MSN (Multiple Subscriber Number) and Subaddress
47
PABX Outside Line Prefix
47
Figure 10 Wizard 1: ISDN Line Set up
48
Table 4 Wizard 1: ISDN Line Set up
48
Figure 11 Wizard 2: ISP Parameters for Internet Access
50
Table 5 Wizard 2: ISP Parameters for Internet Access
50
Figure 12 Wizard 3: Summary
52
Figure 13 Wizard: LAN Configuration
52
Figure 14 Wizard 4
53
Table 6 Wizard: LAN Configuration
53
Test Your Internet Connection
54
Chapter 3 Wizard Setup
47
Chapter 4 LAN Setup
55
LAN Overview
55
DHCP Setup
55
Figure 15 LAN and WAN IP Addresses
55
Lans, Wans and the Zyxel Device
55
DNS Server Address Assignment
56
IP Pool Setup
56
Lan Tcp/Ip
56
IP Address and Subnet Mask
56
Private IP Addresses
57
Configuring LAN Setup
57
Figure 16 LAN Setup
58
Table 7 LAN Setup
58
Bandwidth on Demand
61
IP Address Assignment
61
Chapter 5 WAN Setup
61
Internet Access Setup
61
PPP Multilink
61
WAN Overview
61
Figure 17 WAN Setup
62
Table 8 WAN Setup
62
Chapter 6 Network Address Translation (NAT) Screens
65
NAT Overview
65
Table 9 NAT Definitions
65
Figure 18 How NAT Works
66
What NAT Does
66
Figure 19 NAT Application with IP Alias
67
NAT Application
67
NAT Mapping Types
67
SUA (Single User Account) Versus NAT
68
Selecting the NAT Mode
68
Table 10 NAT Mapping Types
68
Figure 20 NAT Mode
69
SUA Server
69
Table 11 NAT Mode
69
Configuring Servers Behind NAT (Example)
70
Default Server IP Address
70
Port Forwarding: Services and Port Numbers
70
Table 12 Services and Port Numbers
70
Configuring SUA Server
71
Figure 21 Multiple Servers Behind NAT Example
71
Figure 22 Edit SUA/NAT Server Set
71
Configuring Address Mapping
72
Figure 23 Address Mapping Rules
72
Table 13 Edit SUA/NAT Server Set
72
Figure 24 Edit Address Mapping Rule
73
Table 14 Address Mapping Rules
73
Table 15 Edit Address Mapping Rule
74
Chapter 7 Dynamic DNS
75
Configuring Dynamic DNS
75
Dynamic DNS Overview
75
DYNDNS Wildcard
75
Figure 25 Dynamic DNS
76
Table 16 Dynamic DNS
76
Chapter 8 Firewalls
77
Firewall Overview
77
Types of Firewalls
77
Application-Level Firewalls
77
Packet Filtering Firewalls
77
Stateful Inspection Firewalls
78
Introduction to Zyxel's Firewall
78
Basics
79
Denial of Service Attacks
79
Figure 26 Firewall Application
79
Table 17 Common IP Ports
79
Figure 27 Three-Way Handshake
80
Types of Dos Attacks
80
Figure 28 SYN Flood
81
Figure 29 Smurf Attack
82
ICMP Vulnerability
82
Illegal Commands (Netbios and SMTP)
82
Table 18 ICMP Commands that Trigger Alerts
82
Table 19 Legal Netbios Commands
82
Table 20 Legal SMTP Commands
82
Figure 30 Stateful Inspection
83
Traceroute
83
Stateful Inspection and the Zyxel Device
84
Stateful Inspection Process
84
TCP Security
85
UDP/ICMP Security
85
Upper Layer Protocols
86
Guidelines for Enhancing Security with Your Firewall
86
Security in General
86
Packet Filtering Vs Firewall
87
When to Use Filtering
88
Firewall
88
When to Use the Firewall
88
Chapter 9 Firewall Configuration
89
E-Mail
89
Figure 32 Firewall > E-Mail
90
Table 21 Firewall > E-Mail
90
Attack Alert
91
Alerts
91
Threshold Values
91
Configuring Firewall Alert
92
Half-Open Sessions
92
TCP Maximum Incomplete and Blocking Time
92
Figure 33 Firewall > Alert
93
Table 22 Firewall > Alert
93
Rule Logic Overview
94
Action
95
Key Fields for Configuring Rules
95
Security Ramifications
95
Service
95
Destination Address
96
Source Address
96
Rules Overview
94
Connection Direction
96
LAN to WAN Rules
96
WAN to LAN Rules
96
Firewall Rules Summary
96
Figure 34 Firewall > Rule Summary
97
Table 23 Firewall > Rule Summary
97
Configuring Firewall Rules
98
Figure 35 Firewall > Edit a Rule
99
Table 24 Firewall > Edit a Rule
99
Figure 36 Firewall > Source and Destination Addresses
100
Table 25 Firewall > Source and Destination Addresses
100
Figure 37 Firewall > Customized Services
101
Table 26 Firewall > Customized Services
101
Configuring a Customized Service
102
Figure 38 Firewall > Configure Customized Services
102
Table 27 Firewall > Configure Customized Services
102
Timeout
102
Figure 39 Firewall > Timeout
103
Table 28 Firewall > Timeout
103
Factors Influencing Choices for Timeout Values
103
Figure 40 Firewall > Logs
104
Table 29 Firewall > Logs
104
Logs Screen
104
Example Firewall Rule
105
Figure 41 Firewall Example: Edit Rule
106
Figure 42 Firewall Example: Configure Source IP
106
Figure 43 Firewall Example: Customized Service
106
Figure 44 Firewall Example: Edit Rule: Select Customized Services
107
Figure 45 Firewall Example: Rule Summary
108
Table 30 Predefined Services
108
Chapter 10 Introduction to Ipsec
111
VPN Overview
111
Encryption
111
Other Terminology
111
Security
111
Data Confidentiality
112
Data Integrity
112
Data Origin Authentication
112
Figure 46 Encryption and Decryption
112
Ipsec Architecture
112
VPN Applications
112
Ipsec Algorithms
113
Key Management
113
Encapsulation
113
Figure 47 Ipsec Architecture
113
Figure 48 Transport and Tunnel Mode Ipsec Encapsulation
114
Ipsec and NAT
114
Transport Mode
114
Tunnel Mode
114
Table 31 VPN and NAT
115
Chapter 11 VPN Screens
117
Ipsec Algorithms
117
ESP (Encapsulating Security Payload) Protocol
117
Table 32 AH and ESP
118
Vpn/Ipsec Overview
117
My IP Address
118
Secure Gateway IP Address
118
Dynamic Secure Gateway Address
119
Figure 49 Ipsec Summary Fields
119
VPN Summary Screen
119
Figure 50 VPN Summary
120
Table 33 VPN Summary
120
ID Type and Content
121
Keep Alive
121
Table 34 Local ID Type and Content Fields
121
Figure 51 Mismatching ID Type and Content Configuration Example
122
ID Type and Content Examples
122
Table 35 Peer ID Type and Content Fields
122
Table 36 Matching ID Type and Content Configuration Example
122
Pre-Shared Key
123
VPN Rules
123
Figure 52 VPN Rule Setup
124
Table 37 VPN Rule Setup
124
IKE Phases
127
Figure 53 Two Phases to Set up the Ipsec SA
128
Negotiation Mode
128
Diffie-Hellman (DH) Key Groups
129
Perfect Forward Secrecy (PFS)
129
Advanced IKE Settings
129
Figure 54 Advanced Rule Setup
130
Table 38 Advanced Rule Setup
130
Manual Key
132
Security Parameter Index (SPI)
132
Figure 55 Rule Setup with Manual Key
133
Manual Key Screen
133
Table 39 Rule Setup with Manual Key
133
SA Monitor Screen
135
Figure 56 SA Monitor
136
Figure 57 Global Setting
136
Global Setting Screen
136
Table 40 SA Monitor
136
Telecommuter Vpn/Ipsec Examples
137
Table 41 Global Setting
137
Table 42 Telecommuter and Headquarters Configuration Example
137
Telecommuters Sharing One VPN Rule Example
137
Figure 58 Telecommuters Sharing One VPN Rule Example
138
Telecommuters Using Unique VPN Rules Example
138
Figure 59 Telecommuters Using Unique VPN Rules Example
139
Logs
139
Figure 60 VPN Logs
140
Table 43 VPN Logs
140
Chapter 12 Netcapi
141
Netcapi Overview
141
Capi
141
Isdn-Dcp
141
Configuring Netcapi
142
Figure 61 Netcapi
142
Table 44 Netcapi
142
Configuring the Zyxel Device as a Netcapi Server
143
Figure 62 Configuration Example
143
Rvs-Com
143
Example of Installing a CAPI Driver and Communication Software
144
Chapter 13 Supplementary Phone Services
145
Overview
145
Table 45 Supplemental Services in Europe
145
Call Waiting
146
Dropping the Current Call to Switch to an Incoming/Holding Call
146
How to Use Call Waiting
146
Placing the Current Call on Hold
146
Setting up Supplemental Phone Service
146
The Flash Key
146
Call Transfer
147
How to Use Call Transfer
147
To Do a Blind Transfer
148
Three Way Calling
147
How to Use Three-Way Calling
147
To Drop the Last Call Added to the Three-Way Call
147
To Drop Yourself from the Conference Call
147
Call Forwarding
148
Reminder Ring
148
Table 46 Phone Flash Commands
148
Multiple Subscriber Number (MSN)
149
Terminal Portability (Suspend/Resume)
149
How to Suspend/Resume a Phone Call
149
To Resume Your Phone Call
149
To Suspend an Active Phone Call
149
Chapter 14 Maintenance
151
Using MSN
149
Maintenance Overview
151
System Status
151
Figure 63 System Status
152
Table 47 System Status
152
Figure 64 System Status > Show Statistics
153
Table 48 System Status > Show Statistics
153
DHCP Table Screen
154
Figure 65 DHCP Table
155
Firmware Screen
155
Table 49 DHCP Table
155
Figure 66 Firmware Upgrade
156
Table 50 Firmware Upgrade
156
Figure 67 Firmware Upload in Progress
157
Figure 68 Network Temporarily Disconnected
157
Figure 69 Error Message
157
Figure 70 Budget Control
158
Table 51 Budget Control
158
Accessing the Zyxel Device Via Console Port
159
Entering Password
159
Figure 71 Initial Screen
159
Chapter 15 Introducing the SMT
159
SMT Introduction
159
Figure 72 Login Screen
160
Procedure for SMT Configuration Via Telnet
160
SMT Menu Overview
160
Table 52 SMT Menus Overview
160
Table of Contents
161
Navigating the SMT Interface
162
Table 53 Main Menu Commands
162
Figure 73 SMT Main Menu
163
System Management Terminal Interface Summary
163
Table 54 Main Menu Summary
163
Changing the System Password
164
Figure 74 Menu 23 System Password
164
Chapter 16 Menu 1 General Setup ......................................................................................... 166
167
Figure 75 Menu 1 General Setup
167
Procedure to Configure Menu 1
167
Figure 76 Menu 1.1 Configure Dynamic DNS
168
Procedure to Configure Dynamic DNS
168
Table 55 Menu 1 General Setup
168
Table 56 Menu 1.1 Configure Dynamic DNS
169
Chapter 17 Menu 2 ISDN Setup
171
ISDN Setup Overview
171
ISDN Call Waiting
171
PABX Outside Line Prefix
171
Supplementary Voice Services
171
Figure 77 Zyxel Device Behind a PABX
172
Figure 78 Menu 2 ISDN Setup
172
Outgoing Calling Party Number
172
Figure 78 Menu 2 ISDN Setup
173
Figure 79 Menu 2.1 ISDN Advanced Setup
174
Table 57 Menu 2 ISDN Setup
174
Configuring Advanced Setup
175
Table 58 Menu 2.1 ISDN Advanced Setup
175
Netcapi
176
Configuring Netcapi
176
Figure 80 Loopback Test
176
Figure 81 Menu 2.2 Netcapi Setup
176
Table 59 Menu 2.2 Netcapi Setup
177
Chapter 18 Menu 3 Ethernet Setup ........................................................................................ 178
179
Figure 82 Menu 3 Ethernet Setup
179
Figure 83 Menu 3.1 LAN Port Filter Setup
179
General Ethernet Setup
179
Configuring TCP/IP Ethernet Setup and DHCP
180
Ethernet TCP/IP and DHCP Server
180
Figure 84 Menu 3.2 TCP/IP and DHCP Ethernet Setup
180
Table 60 DHCP Ethernet Setup Fields
180
IP Alias Setup
181
Table 61 Menu 3.2: LAN TCP/IP Setup Fields
181
Figure 85 Physical Network & Partitioned Logical Networks
182
Figure 86 Menu 3.2.1 IP Alias Setup
182
Table 62 Menu 3.2.1 IP Alias Setup
182
Figure 87 Menu 4 Internet Access Setup
185
Table 63 Internet Access Setup
186
Chapter 20 Remote Node Configuration
187
Introduction to Remote Node Setup
187
Minimum Toll Period
187
Remote Node Profile Setup
187
Figure 88 Menu 11 Remote Node Setup
188
Figure 89 Menu 11.1 Remote Node Profile
188
Table 64 Menu 11.1 Remote Node Profile
188
Outgoing Authentication Protocol
190
Bandwidth on Demand
191
PPP Multilink
191
Table 65 BTR Vs MTR for BOD
191
Editing PPP Options
192
Figure 90 Menu 11.2 Remote Node PPP Options
192
Table 66 Menu 11.2 Remote Node PPP Options
192
Figure 91 TCP/IP LAN-To-LAN Application
193
Active= Yes Call Direction= Both/Rem Password
194
Active= Yes
194
Active= Yes Call Direction= both
194
Call Back= no
194
Press ENTER to Confirm or ESC to Cancel
194
Rem CLID
194
Rem Password
194
Sec Phone
194
Call Direction= both
194
Configuring Network Layer Options
194
Figure 92 Menu 11.3 Remote Node Network Layer Options
195
Rem IP Addr
195
Table 67 TCP/IP-Related Fields in Remote Node Profile
195
Table 68 Menu 11.3 Remote Node Network Layer Options
195
Remote Node Filter
196
Figure 93 Menu 11.5 Remote Node Filter
197
Chapter 21 Static Route Setup
199
Static Route
199
Figure 94 Example of Static Routing Topology
199
IP Static Route Setup
199
Figure 95 Menu 12 IP Static Route Setup
200
Figure 96 Menu12.1 Edit IP Static Route
200
Table 69 Menu12.1 Edit IP Static Route
200
Chapter 22 Dial-In Setup
203
Default Dial-In User Setup
203
CLID Callback Support for Dial-In Users
203
Table 70 Remote Dial-In Users/Remote Nodes Comparison Chart
203
Dial-In Users Overview
203
Allocated Budget(Min)
204
Period(Hr)
204
Edit Filter Sets= no
204
Figure 97 Menu 13 Default Dial-In Setup
204
Setting up Default Dial-In
204
Table 71 Menu 13 Default Dial-In Setup
204
Callback Overview
206
Figure 98 Menu 13.1 Default Dial-In Filter
206
Figure 100 Menu 14.1 Edit Dial-In User
207
Figure 99 Menu 14 Dial-In User Setup
207
Idle Timeout(Sec)
207
Table 72 Menu 14.1 Edit Dial-In User
208
Telecommuting Application with Windows Example
208
Allocated Budget(Min)
209
Period(Hr)
209
Edit Filter Sets= no
209
Figure 101 Example of Telecommuting
209
Figure 102 Configuring Menu 13 for Remote Access
209
Idle Timeout(Sec)
210
Configuring Callback in LAN-To-LAN Application
210
Figure 103 Edit Dial-In-User Example
210
Figure 104 Example of a LAN-To-LAN Server Application
210
LAN-To-LAN Server Application Example
210
Figure 105 LAN 1 LAN-To-LAN Application
211
Figure 106 LAN 2 LAN-To-LAN Application
211
Configuring with CLID in LAN-To-LAN Application
212
Figure 107 Testing Callback with Your Connection
212
Figure 108 Callback with CLID Configuration
212
Figure 109 Configuring CLID with Callback
213
Figure 110 Callback and CLID Connection Test
213
Chapter 23 Network Address Translation (NAT)
215
Applying NAT
215
Using NAT
215
SUA (Single User Account) Versus NAT
215
Figure 111 Menu 4: Applying NAT for Internet Access
216
Figure 112 Menu 11.3 Applying NAT to the Remote Node
216
Address Mapping Sets
217
Figure 113 Menu 15 NAT Setup
217
Table 73 Applying NAT in Menus 4 & 11.3
217
Figure 114 Menu 15.1 Address Mapping Sets
218
Figure 115 Menu 15.1.255 SUA Address Mapping Rules
218
Table 74 Menu 15.1.255 SUA Address Mapping Rules
218
Figure 116 Menu 15.1.1 First Set
219
User-Defined Address Mapping Sets
219
Figure 117 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
220
Ordering Your Rules
220
Table 75 Menu 15.1.1 First Set
220
Configuring a Server Behind NAT
221
Figure 118 Menu 15.2 NAT Server Sets
221
Table 76 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
221
Figure 119 Menu 15.2.1 NAT Server Setup
222
Figure 120 Multiple Servers Behind NAT Example
222
Figure 121 NAT Example 1
223
Figure 122 Menu 4 Internet Access & NAT Example
223
Example 2: Internet Access with an Inside Server
224
Example 3: Multiple Public IP Addresses with Inside Servers
224
Figure 123 NAT Example 2
224
Figure 124 Menu 15.2.1 Specifying an Inside Server
224
Figure 125 NAT Example 3
225
Figure 126 NAT Example 3: Menu 11.3
226
Figure 127 Example 3: Menu 15.1.1.1
226
Figure 128 Example 3: Final Menu 15.1.1
227
Figure 129 Example 3: Menu 15.2
227
Example 4: NAT Unfriendly Application Programs
228
Figure 130 NAT Example 4
228
Figure 131 Example 4: Menu 15.1.1.1 Address Mapping Rule
228
Figure 132 Example 4: Menu 15.1.1 Address Mapping Rules
229
Chapter 24 Enabling the Firewall
231
General NAT Examples
223
Access Methods
231
Figure 133 Menu 21.2 Firewall Setup
232
Figure 134 Example Firewall Log
232
Viewing the Firewall Log
232
Table 77 View Firewall Log
233
Example E-Mail Log
234
Chapter 25 Filter Configuration
235
Remote Management and the Firewall
231
Figure 135 Outgoing Packet Filtering Process
235
The Filter Structure of the Zyxel Device
236
Introduction to Filters
235
Configuring a Filter Set
237
Figure 136 Filter Rule Process
237
Figure 137 Menu 21: Filter and Firewall Setup
238
Figure 138 Menu 21.1: Filter Set Configuration
238
Figure 139 Netbios_Wan Filter Rules Summary
239
Figure 140 Netbios _LAN Filter Rules Summary
239
Figure 141 Telnet WAN Filter Rules Summary
239
Figure 142 FTP_WAN Filter Rules Summary
240
Filter Rules Summary Menus
240
Table 78 Abbreviations Used in the Filter Rules Summary Menu
240
Configuring a Filter Rule
241
Configuring a TCP/IP Filter Rule
241
Table 79 Rule Abbreviations Used
241
Figure 143 Menu 21.1.1.1 TCP/IP Filter Rule
242
Table 80 Menu 21.1.X.X TCP/IP Filter Rule
242
Configuring a Generic Filter Rule
244
Figure 144 Executing an IP Filter
244
Figure 145 Menu 21.1.4.1 Generic Filter Rule
245
Table 81 Menu 21.1.X.X Generic Filter Rule Menu Fields
245
Example Filter
246
Figure 146 Telnet Filter Example
246
Figure 147 Example Filter: Menu 21.1.3.1
247
Figure 148 Example Filter Rules Summary: Menu 21.1.3
248
Filter Types and NAT
248
Applying a Filter
249
Applying LAN Filters
249
Figure 149 Protocol and Device Filter Sets
249
Applying Remote Node Filters
250
Figure 150 Filtering LAN Traffic
250
Figure 151 Filtering Remote Node Traffic
250
Chapter 26 SNMP Configuration
251
Firewall Versus Filters
249
About SNMP
251
Figure 152 SNMP Management Model
251
Figure 153 Menu 22 SNMP Configuration
252
Supported Mibs
252
Table 82 Menu 22 SNMP Configuration
253
Table 83 SNMP Traps
253
Table 84 Ports and Permanent Virtual Circuits
253
Chapter 27 System Security
255
Figure 154 Menu 23 System Security
255
Radius
255
System Password
255
Configuring External Server
256
Figure 155 RADIUS Server
256
Figure 156 Menu 23.2 System Security : External Server
256
Table 85 Menu 23.2 System Security : External Server
256
Chapter 28 System Information and Diagnosis
259
Figure 157 Menu 24 System Maintenance
259
System Information and
259
System Status
259
Figure 158 Menu 24.1 System Maintenance : Status
260
Table 86 System Maintenance: Status Menu Fields
260
Figure 159 Menu 24.2 System Information and Console Port Speed
261
Console Port Speed
262
Figure 160 Menu 24.2.1 System Maintenance : Information
262
Table 87 Menu 24.2.1 System Maintenance : Information
262
Figure 161 Menu 24.2.2 System Maintenance : Change Console Port Speed
263
Figure 162 Menu 24.3 System Maintenance Log and Trace
263
Viewing Error Log
263
Figure 163 Sample Error and Information Messages
264
Figure 164 Menu 24.3.2 - System Maintenance - UNIX Syslog
264
Table 88 Menu 24.3.2 System Maintenance : Syslog and Accounting
264
Filter Log
266
Packet Triggered
266
Figure 165 Menu 24.3.3 System Maintenance : Accounting Server
267
POTS Log
267
PPP Log
267
Table 89 Menu 24.3.3 System Maintenance : Accounting Server
267
Call-Triggering Packet
268
Figure 166 Call-Triggering Packet Example
268
Figure 167 Menu 24.4 System Maintenance : Diagnostic
269
Table 90 System Maintenance Menu Diagnostic
269
Figure 168 Display for a Successful Manual Call
270
Chapter 29 Firmware and Configuration File Maintenance
271
Filename Conventions
271
Backup Configuration
272
Table 91 Filename Conventions
272
Example of FTP Commands from the Command Line
273
Figure 169 Telnet in Menu 24.5
273
Figure 170 FTP Session Example
273
Using the FTP Command from the Command Line
273
Chapter 31 Remote Management ........................................................................................... 292
274
Backup Configuration Using TFTP
274
Remote Management Limitations
274
Table 92 General Commands for GUI-Based FTP Clients
274
Table 93 General Commands for GUI-Based TFTP Clients
275
TFTP Command Example
275
Backup Via Console Port
276
Figure 171 System Maintenance: Backup Configuration
276
Figure 172 System Maintenance: Starting Xmodem Download Screen
276
Figure 173 Backup Configuration Example
276
Restore Configuration
277
Figure 174 Successful Backup Confirmation Screen
277
Figure 175 Telnet into Menu 24.6
277
Restore Using FTP
277
Figure 176 Restore Using FTP Session Example
278
Figure 177 System Maintenance: Restore Configuration
278
Figure 178 System Maintenance: Starting Xmodem Download Screen
278
Restore Via Console Port
278
Uploading Firmware and Configuration Files
279
Figure 179 Restore Configuration Example
279
Figure 180 Successful Restoration Confirmation Screen
279
Figure 181 System Maintenance Upload Firmware
279
Firmware File Upload
279
Configuration File Upload
280
Figure 182 Menu 24.7.1 Upload System Firmware
280
Figure 183 Menu 24.7.2 System Maintenance: Upload System Configuration File
280
Figure 184 FTP Session Example of Firmware File Upload
281
FTP File Upload Command from the DOS Prompt Example
281
TFTP File Upload
281
TFTP Upload Command Example
282
Uploading Firmware File Via Console Port
282
Uploading Via Console Port
282
Example Xmodem Firmware Upload Using Hyperterminal
283
Figure 185 Menu 24.7.1 as Seen Using the Console Port
283
Figure 186 Example Xmodem Upload
283
Uploading Configuration File Via Console Port
283
Example Xmodem Configuration Upload Using Hyperterminal
284
Figure 187 Menu 24.7.2 as Seen Using the Console Port
284
Figure 188 Example Xmodem Upload
284
Chapter 30 System Maintenance
285
Command Interpreter Mode
285
Command Syntax
285
Figure 189 Command Mode in Menu 24
285
Command Usage
286
Call Control Support
286
Figure 190 Valid Commands
286
Figure 191 Menu 24.9 System Maintenance : Call Control
286
Black List
287
Figure 192 Menu 24.9.1 Call Control Parameters
287
Table 94 Menu 24.9.1 Call Control Parameters
287
Figure 193 Menu 24.9.2 Blacklist
288
Figure 194 Menu 24.9.3 - Budget Management
288
Figure 195 Menu 24.9.4 - Call History
289
Table 95 Menu 24.9.1 - Budget Management
289
Figure 196 Menu 24: System Maintenance
290
Table 96 Call History Fields
290
Figure 197 Menu 24.10 System Maintenance: Time and Date Setting
291
Resetting the Time
291
Table 97 Time and Date Setting Fields
291
Figure 198 Menu 24.11 - Remote Management Control
293
Remote Management Limitations
294
Table 98 Menu 24.11 - Remote Management Control
294
Time and Date Setting
290
Remote Management and NAT
294
System Timeout
295
Chapter 32 Call Scheduling
297
Figure 199 Menu 26 Schedule Setup
297
Introduction to Call Scheduling
297
Figure 200 Menu 26.1 Schedule Set Setup
298
Table 99 Menu 26.1 Schedule Set Setup
298
Figure 201 Applying Schedule Set(S) to a Remote Node
299
Chapter 33 Vpn/Ipsec Setup
301
Figure 202 VPN SMT Menu Tree
301
Vpn/Ipsec Overview
301
Figure 203 Menu 27 Vpn/Ipsec Setup
302
Figure 204 Menu 27
302
Ipsec Summary Screen
302
Table 100 Menu 27.1 Ipsec Summary
302
Figure 205 Menu 27.1.1 Ipsec Setup
304
Table 101 Menu 27.1.1 Ipsec Setup
305
IKE Setup
307
Figure 206 Menu 27.1.1.1 IKE Setup
308
Table 102 Menu 27.1.1.1 IKE Setup
308
Active Protocol
309
Manual Setup
309
Table 103 Active Protocol: Encapsulation and Security Protocol
309
Figure 207 Menu 27.1.1.2 Manual Setup
310
Table 104 Menu 27.1.1.2 Manual Setup
310
Chapter 34 SA Monitor
313
Figure 208 Menu 27.2 SA Monitor
313
SA Monitor Overview
313
Using SA Monitor
313
Table 105 Menu 27.2 SA Monitor
314
Chapter 35 Ipsec Log
315
Figure 209 Example VPN Initiator Ipsec Log
315
Ipsec Logs
315
Figure 210 Example VPN Responder Ipsec Log
316
Table 106 Sample IKE Key Exchange Logs
316
Table 107 Sample Ipsec Logs During Packet Transmission
317
Table 108 RFC-2408 ISAKMP Payload Types
318
Chapter 36 Troubleshooting
319
Problems Starting up the Zyxel Device
319
Problems with the LAN
319
Table 109 Troubleshooting Starting up Your Zyxel Device
319
Table 110 Troubleshooting the LAN
319
Problems with Remote User Dial-In
320
Problems with the ISDN Line
320
Table 111 Troubleshooting the ISDN Line
320
Table 112 Troubleshooting Remote User Dial-In
320
Problems Accessing the Zyxel Device
321
Table 113 Troubleshooting Accessing the Zyxel Device
321
Appendix A Product Specifications
323
Table 114 Device
323
Table 115 Firmware
323
Appendix B Wall-Mounting Instructions
325
Figure 211 Wall-Mounting Example
325
Appendix C Log Descriptions
327
Table 116 System Maintenance Logs
327
Table 117 System Error Logs
327
Table 118 Access Control Logs
328
Table 119 TCP Reset Logs
328
Table 120 Packet Filter Logs
329
Table 121 ICMP Logs
329
Table 122 CDR Logs
330
Table 123 Attack Logs
330
Table 124 Ipsec Logs
331
Table 125 IKE Logs
331
Table 126 PKI Logs
334
Table 127 Certificate Path Verification Failure Reason Codes
335
Table 128 ACL Setting Notes
336
Table 129 ICMP Notes
337
Table 130 RFC-2408 ISAKMP Payload Types
338
Appendix D Setting up Your Computer's IP Address
339
Windows 95/98/Me
339
Figure 212 Windows 95/98/Me: Network: Configuration
340
Figure 213 Windows 95/98/Me: TCP/IP Properties: IP Address
341
Figure 214 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
342
Windows 2000/NT/XP
342
Figure 215 Windows XP: Start Menu
343
Figure 216 Windows XP: Control Panel
343
Figure 217 Windows XP: Control Panel: Network Connections: Properties
344
Figure 218 Windows XP: Local Area Connection Properties
344
Figure 219 Windows XP: Internet Protocol (TCP/IP) Properties
345
Figure 220 Windows XP: Advanced TCP/IP Properties
346
Figure 221 Windows XP: Internet Protocol (TCP/IP) Properties
347
Macintosh os 8/9
347
Figure 222 Macintosh os 8/9: Apple Menu
348
Figure 223 Macintosh os 8/9: TCP/IP
348
Figure 224 Macintosh os X: Apple Menu
349
Macintosh os X
349
Figure 225 Macintosh os X: Network
350
Linux
350
Figure 226 Red hat 9.0: KDE: Network Configuration: Devices
351
Figure 227 Red hat 9.0: KDE: Ethernet Device: General
351
Figure 228 Red hat 9.0: KDE: Network Configuration: DNS
352
Figure 229 Red hat 9.0: KDE: Network Configuration: Activate
352
Figure 230 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
353
Figure 231 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
353
Figure 232 Red hat 9.0: DNS Settings in Resolv.conf
353
Figure 233 Red hat 9.0: Restart Ethernet Card
354
Figure 234 Red hat 9.0: Checking TCP/IP Properties
354
Verifying Settings
354
Appendix E IP Addresses and Subnetting
355
Introduction to IP Addresses
355
Table 131 Classes of IP Addresses
356
Table 132 Allowed IP Address Range by Class
356
Subnet Masks
357
Subnetting
357
Table 133 "Natural" Masks
357
Table 134 Alternative Subnet Mask Notation
357
Example: Two Subnets
358
Table 135 Two Subnets Example
358
Example: Four Subnets
359
Table 136 Subnet 1
359
Table 137 Subnet 2
359
Table 138 Subnet 1
359
Example Eight Subnets
360
Table 139 Subnet 2
360
Table 140 Subnet 3
360
Table 141 Subnet 4
360
Subnetting with Class a and Class B Networks
361
Table 142 Eight Subnets
361
Table 143 Class C Subnet Planning
361
Table 144 Class B Subnet Planning
362
Appendix F Pop-Up Windows, Javascripts and Java Permissions
363
Figure 235 Pop-Up Blocker
363
Internet Explorer Pop-Up Blockers
363
Figure 236 Internet Options
364
Figure 237 Internet Options
365
Figure 238 Pop-Up Blocker Settings
366
Javascripts
366
Figure 239 Internet Options
367
Figure 240 Security Settings - Java Scripting
368
Figure 241 Security Settings - Java
369
Figure 242 Java (Sun)
370
Index
371
Advertisement
ZyXEL Communications P-202H Plus v2 Support Notes (434 pages)
ISDN Internet Access Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 9.99 MB
Table of Contents
Table of Contents
2
Faq
6
Zynos FAQ
6
What Is Zynos
6
How Do I Access the P-202H Plus V2 SMT Menu
6
What Data Compression Protocol Does the P-202H Plus V2 Support
6
What Is the Default Console Port Baud Rate? Moreover, How Do I Change It
6
How Do I Upload the Zynos Firmware Code Via Console
6
How Do I Upgrade/Backup the Zynos Firmware by Using TFTP Client Program Via LAN
7
How Do I Upload ROMFILE Via Console Port
7
How Do I Backup/Restore SMT Configurations by Using TFTP Client Program Via LAN
7
What Should I Do if I Forget the System Password
8
What Is SUA? When Should I Use SUA
8
What Is the Difference between NAT and SUA
8
How Many Network Users Can the SUA Support
9
How Do I Capture the PPP Log in My P-202H Plus V2
9
Why Do We Need the Input Filter in Menu 3.1 and Call Filter in Menu
9
How Can I Protect against IP Spoofing Attacks
9
What Is DNS Proxy
10
What Is a Nailed-Up Connection and When Do I Need to Use It
11
What Are Device Filters and Protocol Filters
11
Why Can't I Configure Device Filters or Protocol Filters
11
The P-202H Plus V2 Supports to Upload the Firmware and Configuration Files Using FTP, but How Do I Prevent the Outside User from 'FTP' My P-202H Plus V2
11
Product FAQ
12
How Do I Collect EPA Trace? Moreover, How Do I Read It
12
Can I Prevent the Dial-In User from Occupying Two Channels
12
How Does 'Dial Prefix to Access Outside Line' in Menu 2 (European Firmware) Work
12
What Supplemental Phone Service Does P-202H Plus V2 Support
12
How Do I Do Call Waiting/Call Hold/Call Retrieve
13
Why Doesn't Call Waiting Work as Expected
13
How Do I Do Three Way Calling
13
How Do I Remove a Party from the Three-Way Calling
13
How Do I Do Call Transfer
14
How Do I Blind Call Transfer
14
What Is Call Forwarding and How Do I Do It
14
How Do I Suspend/Resume a Phone Call (Terminal Portability)
15
What Is Reminder Ring
15
Why Doesn't My Answering Machine on POTS Port Stop Recording
15
What Are CLIP and CLIR in Advanced Setup of Menu 2 (European Firmware)
15
Does P-202H Plus V2 Support MP Callback to Dial-In Users
16
Does Zynos Support IRC, Real Player, CU-Seeme and Netmeeting
16
What Are the Differences between P-202H, P-202H Plus and P-202H Plus V2
16
Firewall FAQ
17
General
17
What Is a Network Firewall
17
What Makes P-202H Plus V2 Secure
17
What Are the Basic Types of Firewalls
17
What Kind of Firewall Is the P-202H Plus V2
18
Why Do You Need a Firewall When Your Router Has Packet Filtering and NAT Built-In
18
What Is Denials of Service (Dos)Attack
18
What Is Ping of Death Attack
19
What Is Teardrop Attack
19
What Is SYN Flood Attack
19
What Is LAND Attack
19
What Is Brute-Force Attack
19
What Is IP Spoofing Attack
20
What Are the Default ACL Firewall Rules in P-202H Plus V2
20
Why Static/Policy Route be Blocked by P-202H Plus V2
20
Configuration
22
How Do I Configure the Firewall
22
How Do I Prevent Others from Configuring My Firewall
23
Can I Use a Browser to Configure My P-202H Plus V2
23
Why Can't I Configure My Router Using Telnet over WAN
23
Why Can't I Upload the Firmware and Configuration File Using FTP over WAN
23
Why Can't I Configure My Router Using Telnet over LAN
24
Why Can't I Upload the Firmware and Configuration File Using FTP over LAN
24
Log and Alert
24
When Does the P-202H Plus V2 Generate the Firewall Log
24
What Does the Log Show to Us
24
How Do I View the Firewall Log
25
When Does the P-202H Plus V2 Generate the Firewall Alert
25
What Does the Alert Show to Us
25
What Is the Difference between the Log and Alert
26
Ipsec Related FAQ
27
Ipsec FAQ
27
VPN Overview
27
What Is VPN
27
Why Do I Need VPN
27
What Are most Common VPN Protocols
28
What Is PPTP
28
What Is L2TP
28
What I PPTP?
28
What I L2TP?
28
What Is Ipsec
28
What Are the Differences between 'Transport Mode' and 'Tunnel Mode
28
What Is SA
29
What Is IKE
29
What Is Pre-Shared Key
29
What Are the Differences between IKE and Manual Key VPN
29
How Do I Configure P-202H Plus V2 VPN
30
How Many VPN Connections Does P-202H Plus V2 Support
30
What VPN Protocols Are Supported by P-202H Plus V2 VPN
30
What Types of Encryption Does P-202H Plus V2 VPN Support
30
What Types of Authentication Does P-202H Plus V2 VPN Support
30
I am Planning My P-202H Plus V2-To-P-202H Plus V2 VPN Configuration. What Do I Need to Know
30
Does P-202H Plus V2 Support Dynamic Secure Gateway IP
31
What VPN Gateway that Has Been Tested with P-202H Plus V2 Successfully
31
What VPN Software that Has Been Tested with P-202H Plus V2
32
Successfully
32
Will Zyxel Support Secure Remote Management
32
Does P-202H Plus V2 VPN Support Netbios Broadcast
32
What Are the Difference between the 'My IP Address' and 'Secure
32
Gateway IP Address' in Menu 27.1.1
32
Is the Host Behind NAT Allowed to Use Ipsec
32
Why Does VPN Throughput Decrease When Staying in SMT Menu 24.1
33
How Do I Configure P-202H Plus V2 with NAT for Internal Servers
33
SSH Sentinel FAQ
33
What Is SSH Sentinel VPN Client
34
Why Do I Need to Use Sentinel
34
Does SSH Sentinel Work with the PPP over Ethernet (Pppoe) Protocol, Which Is Used by the ADSL Network Adapter Cards
34
How to Configure Pre-Ipsec Filter
34
What Is "Acquire Virtual IP Address" For? Should I Check this Box
34
What Is "Extended Authentication"? Should I Check this Box
34
Does Sentinel Support IP Range
35
Does Sentinel Support 2 VPN Connections at the same Time
35
What Is this Option, "Attach the Selected Values to Proposal Only" for
35
How to Initiate a VPN Tunnel from Sentinel
35
Can P-202H Plus V2 be the Initiator of VPN Tunnel to Sentinel
35
How Can I Verify if the VPN Connection Is up in Sentinel
35
I am Using Enternet 300, a Pppoe Dial up Software. any Concern
35
Application Notes
35
General Application Notes
36
Internet Access
36
SUA Applications
38
Dial-In User Setup
53
Filter
57
UNIX Syslog Setup
88
ISDN Leased Line Setup
92
Supplemental Service
95
Using Netcapi
98
Using RADIUS
103
Using CLID Callback
105
Using Multi-NAT
116
Ipsec VPN
139
Using Ipsec VPN
139
P-202H Plus V2 Vs 3Rd Party VPN Gateway
159
P-202H Plus V2 Vs 3Rd Party VPN Software
208
Configure NAT for Internal Servers
346
VPN Routing between Branch Offices
347
Support Tool
362
Using Zyxel ISDN D Channel Analyzer, EPA
362
Using Zyxel PPP Analyzer
366
LAN/WAN Packet Trace
370
Using TFTP to Upload/Download Zynos Via LAN
381
Using FTP to Upload Firmware and Configuration Files
385
CI Command List
388
Troubleshooting
389
Internet Connection
389
Remote Node/Dial-In User Connection
394
IP Routing
401
Reset to Default Configuration File
404
Reference
406
ISDN Disconnection Cause
406
PPP Numbers
408
Port Numbers
421
Protocol Numbers
424
System Error Code
427
ZyXEL Communications P-202H Plus v2 Quick Start Manual (8 pages)
ISDN Internet Access Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 0.8 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Initial Configuration
3
Troubleshooting
7
Advertisement
ZyXEL Communications P-202H Plus v2 Brochure (2 pages)
ISDN Internet Access Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 0.14 MB
Table of Contents
Specifications
2
Advanced Calling Features
2
Internet Access
2
Network Protocols
2
Hardware Specifications
2
Network Management
2
Physical Specifications
2
Remote Access
2
Environmental Specifications
2
Application Diagram
2
Advertisement
Related Products
ZyXEL Communications P-202
ZyXEL Communications P-202U
ZyXEL Communications P-201
ZyXEL Communications P-2301R-P1C
ZyXEL Communications P-2608HWL-D1
ZyXEL Communications P-2612HNU-F3F
ZyXEL Communications P-2612HW-F3
ZyXEL Communications P-2812HL-F1
ZyXEL Communications P-2812HUL-F3
ZyXEL Communications P-2812HL-F3
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL