Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
P-2602HWLNI-D3A
ZyXEL Communications P-2602HWLNI-D3A Manuals
Manuals and User Guides for ZyXEL Communications P-2602HWLNI-D3A. We have
1
ZyXEL Communications P-2602HWLNI-D3A manual available for free PDF download: User Manual
ZyXEL Communications P-2602HWLNI-D3A User Manual (496 pages)
P-2602HWLNI Series 802.11g Wireless ADSL2+ 4-Port VoIP IAD
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 15.51 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
25
List of Tables
33
Introduction
39
PART I Introduction
39
Chapter 1 Introducing the Zyxel Device
41
Overview
41
Table 1 Models Covered
41
Ways to Manage the Zyxel Device
42
Good Habits for Managing the Zyxel Device
42
Applications for the Zyxel Device
43
Internet Access
43
Making Calls Via Internet Telephony Service Provider
43
Figure 1 Internet Access Application
43
Make Peer-To-Peer Calls
44
Firewall for Secure Broadband Internet Access
44
Figure 2 Internet Telephony Service Provider Application
44
Figure 3 Peer-To-Peer Calling
44
LAN to LAN Application
45
Figure 4 Firewall Application
45
Figure 5 LAN-To-LAN Application
45
Leds
46
Figure 6 Leds
46
Table 2 Leds
46
The RESET Button
47
Using the Reset Button
47
Chapter 2 Introducing the Web Configurator
49
Web Configurator Overview
49
Accessing the Web Configurator
49
Login Types
50
User Access
50
Administrator Access
50
Figure 7 Password Screen
50
Figure 8 Change Password Screen
51
Figure 9 Replace Certificate Screen
51
Web Configurator Main Screen
52
Figure 10 Wizard or Advanced Screen
52
Figure 11 Main Screen
52
Navigation Panel
53
Table 3 Web Configurator Icons in the Title Bar
53
Table 4 Navigation Panel Summary
53
Title Bar
53
Table 5 Available Features
57
Main Window
59
Status Bar
59
Wizards and Status
61
Part II: Wizards and Status
61
Chapter 3 Internet and Wireless Setup Wizard
63
Introduction
63
Internet Access Wizard Setup
63
Figure 12 Select a Mode
64
Figure 13 Wizard Welcome
64
Figure 14 Auto Detection: no DSL Connection
65
Figure 15 Auto-Detection: Pppoe
65
Figure 16 Auto Detection: Failed
66
Manual Configuration
66
Figure 17 Internet Access Wizard Setup: ISP Parameters
67
Table 6 Internet Access Wizard Setup: ISP Parameters
67
Figure 18 Internet Connection with Pppoe
68
Figure 19 Internet Connection with RFC 1483
68
Table 7 Internet Connection with Pppoe
68
Figure 20 Internet Connection with ENET ENCAP
69
Table 8 Internet Connection with RFC 1483
69
Table 9 Internet Connection with ENET ENCAP
69
Figure 21 Internet Connection with Pppoa
70
Table 10 Internet Connection with Pppoa
70
Wireless Connection Wizard Setup
71
Figure 22 Connection Test Failed-1
71
Figure 23 Connection Test Failed-2
71
Figure 24 Connection Test Successful
72
Figure 25 Wireless LAN Setup Wizard 1
72
Table 11 Wireless LAN Setup Wizard 1
72
Figure 26 Wireless LAN
73
Table 12 Wireless LAN Setup Wizard 2
73
Figure 27 Manually Assign a WPA-PSK Key
74
Figure 28 Manually Assign a WEP Key
74
Manually Assign a WEP Key
74
Manually Assign a WPA-PSK Key
74
Table 13 Manually Assign a WPA Key
74
Figure 29 Wireless LAN Setup 3
75
Table 14 Manually Assign a WEP Key
75
Figure 30 Internet Access and WLAN Wizard Setup Complete
76
Voip Wizard
77
Chapter 4 Voip Wizard
77
Introduction
77
Voip Wizard Setup
77
Figure 31 Voip Phone Calls
77
Figure 32 Select a Mode
78
Figure 33 Wizard: Welcome
79
Figure 34 SIP Server Profile Selection
79
Figure 35 Voip Wizard Configuration
80
Table 15 Voip Wizard Configuration
80
Figure 36 SIP Registration Test
81
Figure 37 Voip Wizard Fail
81
Figure 38 Voip Wizard Finish
81
Chapter 5 Bandwidth Management Wizard
83
Introduction
83
Bandwidth Management Wizard Setup
83
Figure 39 Select a Mode
83
Figure 40 Wizard: Welcome
84
Figure 41 Bandwidth Management Wizard: General Information
84
Table 16 Bandwidth Management Wizard: General Information
84
Figure 42 Bandwidth Management Wizard: Complete
85
Status Screens
87
Chapter 6 Status Screens
87
Status Screen
87
Figure 43 Status Screen
88
Table 17 Status Screen
88
Any IP Table
91
Figure 44 any IP Table
91
Table 18 any IP Table
91
WLAN Status
92
Packet Statistics
92
Figure 45 WLAN Status
92
Table 19 WLAN Status
92
Figure 46 Packet Statistics
93
Table 20 Packet Statistics
93
Voip Statistics
94
Figure 47 Voip Statistics
94
Table 21 Voip Statistics
94
LED Status
96
Figure 48 LED Status
96
Table 22 LED Status
96
Network
99
Part III: Network
99
WAN Setup
101
Chapter 7 WAN Setup
101
WAN Overview
101
Encapsulation
101
Multiplexing
102
VPI and VCI
102
IP Address Assignment
102
Nailed-Up Connection (PPP)
103
Nat
103
Metric
103
Traffic Shaping
104
Figure 49 Example of Traffic Shaping
104
ATM Traffic Classes
105
Zero Configuration Internet Access
105
Internet Access Setup
106
Figure 50 Internet Access Setup (Pppoe)
106
Table 23 Internet Access Setup
106
Advanced Internet Access Setup
108
Figure 51 Advanced Internet Access Setup
108
Table 24 Advanced Internet Access Setup
108
WAN more Connections
109
More Connections Edit
110
Figure 52 WAN more Connections
110
Table 25 Advanced Internet Access Setup
110
Figure 53 more Connections Edit
111
Table 26 more Connections Edit
111
More Connections Edit Advanced
113
Figure 54 more Connections Edit Advanced
113
Table 27 more Connections Edit Advanced
113
Traffic Redirect
114
WAN Backup Setup
114
Figure 55 Traffic Redirect Example
114
Figure 56 Traffic Redirect LAN Setup
114
Figure 57 WAN Backup Setup
115
Table 28 WAN Backup Setup
115
LAN Setup
117
Chapter 8 LAN Setup
117
LAN Overview
117
Lans, Wans and the Zyxel Device
117
Figure 58 LAN and WAN IP Addresses
117
DHCP Setup
118
DNS Server Addresses
118
Lan Tcp/Ip
118
IP Address and Subnet Mask
118
RIP Setup
120
Multicast
120
Any IP
121
Figure 59 any IP Example
121
Configuring LAN IP
122
Figure 60 LAN IP
122
Table 29 LAN IP
122
Configuring Advanced LAN Setup
123
Figure 61 Advanced LAN Setup
123
Table 30 Advanced LAN Setup
123
DHCP Setup
124
Figure 62 DHCP Setup
124
Table 31 DHCP Setup
124
LAN Client List
125
LAN IP Alias
126
Figure 63 LAN Client List
126
Table 32 LAN Client List
126
Figure 64 Physical Network & Partitioned Logical Networks
127
Figure 65 LAN IP Alias
127
Table 33 LAN IP Alias
128
Wireless LAN
129
Chapter 9 Wireless LAN
129
Wireless Network Overview
129
Figure 66 Example of a Wireless Network
129
Wireless Security Overview
130
Ssid
130
MAC Address Filter
130
User Authentication
130
Encryption
131
Table 34 Types of Encryption for each Type of Authentication
131
One-Touch Intelligent Security Technology (OTIST)
132
Wireless Performance Overview
132
Quality of Service (Qos)
132
Wireless Distribution System (WDS)
132
Figure 67 Example of a WDS Link
132
Additional Wireless Terms
133
General WLAN Screen
133
Table 35 Additional Wireless Terms
133
Figure 68 Wireless LAN: General
134
No Security
134
Table 36 Wireless LAN: General
134
Figure 69 Wireless: no Security
135
Table 37 Wireless no Security
135
WEP Encryption Screen
135
Figure 70 Wireless: Static WEP Encryption
136
Table 38 Wireless: Static WEP Encryption
136
Wpa(2)-Psk
136
Figure 71 Wireless: WPA(2)-PSK
137
Table 39 Wireless: WPA(2)-PSK
137
Figure 72 Wireless: WPA(2)
138
Table 40 Wireless: WPA(2)
138
WPA(2) Authentication Screen
138
Figure 73 Wireless LAN: Advanced
139
Wireless LAN Advanced Setup
139
OTIST Screen
140
Table 41 Wireless LAN: Advanced
140
Figure 74 Network > Wireless LAN > OTIST
141
Table 42 Network > Wireless LAN > OTIST
141
Figure 75 Example: Wireless Client OTIST Screen
142
Figure 76 OTIST: Settings
142
Figure 77 OTIST: in Progress on the Zyxel Device
142
Notes on OTIST
143
MAC Filter
143
Figure 78 OTIST: in Progress on the Wireless Device
143
Figure 79 Start OTIST
143
Figure 80 MAC Address Filter
144
Table 43 MAC Address Filter
144
Association List
145
Qos Screen
145
Figure 81 Wireless LAN: Association List
145
Table 44 Wireless LAN: Association List
145
Figure 82 Wireless LAN: Qos
146
Table 45 Wireless LAN: Qos
146
Application Priority Configuration
147
Figure 83 Application Priority Configuration
147
Table 46 Application Priority Configuration
147
WDS Screen
148
Static WEP
149
Figure 84 Wireless LAN > WDS
149
Table 47 Wireless LAN > WDS
149
Wpa-Psk
150
Figure 85 Wireless LAN > WDS > Static WEP
150
Table 48 Wireless LAN > WDS > Static WEP
150
Figure 86 Example: WDS Link Using WPA-PSK with TKIP
151
Figure 87 Wireless LAN > WDS > WPA-PSK
151
Wpa2-Psk
152
Figure 88 Wireless LAN > WDS > WPA2-PSK
152
Table 49 Wireless LAN > WDS > WPA-PSK
152
Table 50 Wireless LAN > WDS > WPA2-PSK
153
Chapter 10 Network Address Translation (NAT) Screens
155
NAT General Overview
155
NAT Definitions
155
Table 51 NAT Definitions
155
What NAT Does
156
How NAT Works
156
NAT Application
156
Figure 89 How NAT Works
156
NAT Mapping Types
157
Figure 90 NAT Application with IP Alias
157
SUA (Single User Account) Versus NAT
158
NAT General Setup
158
Table 52 NAT Mapping Types
158
Port Forwarding
159
Figure 91 NAT General
159
Table 53 NAT General
159
Configuring Servers Behind Port Forwarding (Example)
160
Default Server IP Address
160
Figure 92 Multiple Servers Behind NAT Example
160
Port Forwarding: Services and Port Numbers
160
Configuring Port Forwarding
161
Figure 93 Port Forwarding
161
Table 54 Port Forwarding
161
Figure 94 Port Forwarding Rule Setup
162
Port Forwarding Rule Edit
162
Table 55 Port Forwarding Rule Setup
162
Address Mapping
163
Figure 95 Address Mapping Rules
163
Table 56 Address Mapping Rules
163
Address Mapping Rule Edit
164
Figure 96 Edit Address Mapping Rule
165
Table 57 Edit Address Mapping Rule
165
Voip
167
Part IV: Voip
167
Voice
169
Chapter 11 Voice
169
Introduction to Voip
169
Sip
169
SIP Identities
169
SIP Servers
170
Figure 97 SIP User Agent
170
Figure 98 SIP Proxy Server
171
Figure 99 SIP Redirect Server
172
Rtp
173
Pulse Code Modulation
173
SIP Call Progression
173
SIP Call Progression through Proxies
173
Table 58 SIP Call Progression
173
Figure 100 SIP Call through Proxy Servers
174
Table 59 SIP Call Progression
174
Voice Coding
175
PSTN Call Setup Signaling
175
MWI (Message Waiting Indication)
175
Custom Tones (IVR)
176
Quality of Service (Qos)
176
Table 60 Custom Tones Details
176
Diffserv
177
Figure 101 Diffserv: Differentiated Service Field
177
Type of Service (Tos)
177
Vlan
177
SIP Settings Screen
178
Figure 102 SIP > SIP Settings
178
Table 61 SIP > SIP Settings
178
Advanced SIP Setup Screen
179
Figure 103 Voip > SIP Settings > Advanced
180
Table 62 Voip > SIP Settings > Advanced
180
SIP Qos Screen
182
Phone
183
PSTN Line
183
Figure 104 SIP > Qos
183
Table 63 SIP > Qos
183
ISDN Line
184
Voice Activity Detection/Silence Suppression
184
Comfort Noise Generation
184
Echo Cancellation
184
Analog Phone
184
PHONE Port Call Types
184
Configuring the Analog Phone Screen
185
Figure 105 Phone > Analog Phone
186
Table 64 Phone > Analog Phone
186
Advanced Analog Phone Setup Screen
187
Figure 106 Phone > Analog Phone > Advanced
188
Table 65 Phone > Analog Phone > Advanced
188
ISDN Phone
189
ISDN Phone Port Call Types
189
Configuring the ISDN Phone Screen
190
Figure 107 Phone > ISDN Phone
190
Table 66 Phone > ISDN Phone
190
Common Phone Settings Screen
191
Ext. Table
191
Figure 108 Phone > Common
191
Table 67 Phone > Common
191
Figure 109 Voip > Phone > Ext. Table
192
Advanced Ext. Table Setup Screen
193
Table 68 Voip > Phone > Ext. Table
193
Phone Services Overview
194
Figure 110 Voip > Phone > Ext. Table > Advanced
194
Table 69 Voip > Phone > Ext. Table > Advanced
194
Europe Type Supplementary Phone Services
195
Table 70 European Flash Key Commands
195
The Flash Key
195
USA Type Supplementary Services
196
Table 71 USA Flash Key Commands
197
Phone Region Screen
198
Speed Dial
198
Figure 111 Voip > Phone > Region
198
Table 72 Voip > Phone > Region
198
Figure 112 Phone Book > Speed Dial
199
Table 73 Phone Book > Speed Dial
199
Incoming Call Policy Screen
200
Figure 113 Phone Book > Incoming Call Policy
200
Table 74 Phone Book > Incoming Call Policy
201
Distinctive Ring Screen
202
Figure 114 Phone Book > Distinctive Ring
203
Table 75 Phone Book > Distinctive Ring
203
SIP Prefix Screen
204
Figure 115 Phone Book > SIP Prefix
205
Table 76 Phone Book > SIP Prefix
205
PSTN Line
206
PSTN Line Screen
206
Figure 116 PSTN Line > General
206
ISDN Line Screen
207
Figure 117 ISDN Line > General
207
Table 77 PSTN Line > General
207
Table 78 ISDN Line > General
207
Fixed Line Numbers
208
Multiple Subscriber Numbers
208
Receiving Analog Calls with Digital Phones
209
Configuring the Fixed Line Numbers Screen
209
Figure 118 Voip > Fixed Line Numbers Screen
210
Table 79 Voip > Fixed Line Numbers Screen
210
Voip Trunking
211
Chapter 12 Voip Trunking
211
Voip Trunking Overview
211
Voip Trunking and Security
211
Auto Attendant and Authentication
211
Peer Call Authentication
212
Figure 119 Peer Devices Connecting
212
Table 80 Matching Incoming and Outgoing Authentication
212
Call Rules
213
Voip Trunking Scenarios
213
Voip Phone to PSTN Phone
213
PSTN Phone to Voip Phone
213
Figure 120 Voip Phone to PSTN Phone
213
Table 81 Call Rules
213
PSTN Phone to PSTN Phone Via Voip
214
Trunking General Screen
214
Figure 121 PSTN Phone to Voip Phone
214
Figure 122 PSTN Phone to PSTN Phone Via Voip
214
Figure 123 Voip > Trunking > General
214
Trunking Peer Call Screen
215
Table 82 Voip > Trunking > General
215
Figure 124 Voip > Trunking > Peer Call
216
Table 83 Voip > Trunking > Peer Call
216
Trunking Call Rule Screen
217
Figure 125 Voip > Trunking > Call Rule
218
Table 84 Voip > Trunking > Call Rule
218
Voip Trunking Example: Voip to PSTN
219
Background Information
219
Configuration Details: Outgoing
219
Figure 126 Voip to PSTN Example
219
Configuration Details: Incoming
220
Figure 127 Voip to PSTN Example - Speed Dial Screen
220
Figure 128 Voip to PSTN Example - Outgoing Authentication
220
Call Progression
221
Voip Trunking Example: PSTN to PSTN Via Voip
221
Figure 129 Voip to PSTN Example - Incoming Authentication
221
Table 85 Voip Trunking Call Progression
221
Background Information
222
Configuration Details: Outgoing
222
Figure 130 PSTN to PSTN Example
222
Figure 131 PSTN to PSTN Example: General Configuration
223
Figure 132 PSTN to PSTN Example - Outgoing Authentication
223
Call Progression
224
Configuration Details: Incoming
224
Figure 133 PSTN to PSTN Example - Call Rule
224
Figure 134 PSTN to PSTN Example - Incoming Authentication
224
Table 86 PSTN to PSTN: Voip Trunking Call Progression
225
Phone Usage
227
Chapter 13 Phone Usage
227
Dialing a Telephone Number
227
Using Speed Dial to Dial a Telephone Number
227
Internal Calls
227
Phone Book
228
Call Transfer
228
Call Forwarding
228
Follow Me
228
Call Pickup
229
Checking the Device's IP Address
229
Auto Firmware Upgrade
229
Security
231
Part V: Security
231
Firewalls
233
Chapter 14 Firewalls
233
Firewall Overview
233
Types of Firewalls
233
Packet Filtering Firewalls
233
Application-Level Firewalls
234
Stateful Inspection Firewalls
234
Introduction to Zyxel's Firewall
234
Denial of Service Attacks
235
Denial of Service
235
Basics
235
Figure 135 Firewall Application
235
Table 87 Common IP Ports
235
Types of Dos Attacks
236
Figure 136 Three-Way Handshake
236
Figure 137 SYN Flood
237
Figure 138 Smurf Attack
237
Stateful Inspection
238
Table 88 ICMP Commands that Trigger Alerts
238
Table 89 Legal Netbios Commands
238
Table 90 Legal SMTP Commands
238
Figure 139 Stateful Inspection
239
Stateful Inspection Process
239
Stateful Inspection on Your Zyxel Device
240
TCP Security
240
UDP/ICMP Security
241
Upper Layer Protocols
241
Guidelines for Enhancing Security with Your Firewall
242
Security in General
242
Packet Filtering Vs Firewall
243
Packet Filtering
243
Firewall
243
Chapter 15 Firewall Configuration
245
Access Methods
245
General Firewall Policy Overview
245
Rule Logic Overview
246
Rule Checklist
246
Security Ramifications
246
Key Fields for Configuring Rules
247
Connection Direction
247
LAN to WAN Rules
248
Alerts
248
General Firewall Policy
248
Figure 140 Firewall: General
248
Firewall Rules Summary
249
Table 91 Firewall: General
249
Figure 141 Firewall Rules
250
Table 92 Firewall Rules
250
Configuring Firewall Rules
251
Figure 142 Firewall: Edit Rule
252
Table 93 Firewall: Edit Rule
252
Configuring a Customized Service
254
Customized Services
254
Figure 143 Firewall: Customized Services
254
Table 94 Customized Services
254
Example Firewall Rule
255
Figure 144 Firewall: Configure Customized Services
255
Table 95 Firewall: Configure Customized Services
255
Figure 145 Firewall Example: Rules
256
Figure 146 Edit Custom Port Example
256
Figure 147 Firewall Example: Edit Rule: Destination Address
257
Figure 148 Firewall Example: Edit Rule: Select Customized Services
258
Dos Thresholds
259
Threshold Values
259
Figure 149 Firewall Example: Rules: Myservice
259
Half-Open Sessions
260
Configuring Firewall Thresholds
260
Figure 150 Firewall: Threshold
261
Table 96 Firewall: Threshold
261
Firewall Commands
262
Table 97 Sys Firewall Commands
262
Content Filtering
265
Chapter 16 Content Filtering
265
Content Filtering Overview
265
Configuring Keyword Blocking
265
Figure 151 Content Filter: Keyword
265
Configuring the Schedule
266
Figure 152 Content Filter: Schedule
266
Table 98 Content Filter: Keyword
266
Configuring Trusted Computers
267
Figure 153 Content Filter: Trusted
267
Table 99 Content Filter: Schedule
267
Table 100 Content Filter: Trusted
267
Introduction to Ipsec
269
Chapter 17 Introduction to Ipsec
269
VPN Overview
269
Ipsec
269
Security Association
269
Other Terminology
269
VPN Applications
270
Ipsec Architecture
270
Figure 154 Encryption and Decryption
270
Ipsec Algorithms
271
Key Management
271
Encapsulation
271
Figure 155 Ipsec Architecture
271
Transport Mode
272
Tunnel Mode
272
Ipsec and NAT
272
Figure 156 Transport and Tunnel Mode Ipsec Encapsulation
272
Table 101 VPN and NAT
273
VPN Screens
275
Chapter 18 VPN Screens
275
Vpn/Ipsec Overview
275
Ipsec Algorithms
275
AH (Authentication Header) Protocol
275
ESP (Encapsulating Security Payload) Protocol
275
My IP Address
276
Secure Gateway Address
276
Table 102 AH and ESP
276
Dynamic Secure Gateway Address
277
VPN Setup Screen
277
Figure 157 Ipsec Summary Fields
277
Figure 158 VPN Setup
278
Table 103 VPN Setup
278
Keep Alive
279
VPN, NAT, and NAT Traversal
279
Remote DNS Server
280
Figure 159 NAT Router between Ipsec Routers
280
Table 104 VPN and NAT
280
ID Type and Content
281
Figure 160 VPN Host Using Intranet DNS Server Example
281
ID Type and Content Examples
282
Table 105 Local ID Type and Content Fields
282
Table 106 Peer ID Type and Content Fields
282
Table 107 Matching ID Type and Content Configuration Example
282
Pre-Shared Key
283
Editing VPN Policies
283
Table 108 Mismatching ID Type and Content Configuration Example
283
Figure 161 Edit VPN Policies
284
Table 109 Edit VPN Policies
284
IKE Phases
288
Figure 162 Two Phases to Set up the Ipsec SA
288
Diffie-Hellman (DH) Key Groups
289
Negotiation Mode
289
Perfect Forward Secrecy (PFS)
289
Configuring Advanced IKE Settings
289
Figure 163 Advanced VPN Policies
290
Table 110 Advanced VPN Policies
290
Manual Key Setup
292
Security Parameter Index (SPI)
292
Configuring Manual Key
292
Figure 164 VPN: Manual Key
293
Table 111 VPN: Manual Key
293
Viewing SA Monitor
295
Figure 165 VPN: SA Monitor
296
Table 112 VPN: SA Monitor
296
Configuring Global Setting
297
Telecommuter Vpn/Ipsec Examples
297
Telecommuters Sharing One VPN Rule Example
297
Figure 166 VPN: Global Setting
297
Table 113 VPN: Global Setting
297
Telecommuters Using Unique VPN Rules Example
298
Figure 167 Telecommuters Sharing One VPN Rule Example
298
Table 114 Telecommuters Sharing One VPN Rule Example
298
Figure 168 Telecommuters Using Unique VPN Rules Example
299
Table 115 Telecommuters Using Unique VPN Rules Example
299
VPN and Remote Management
300
Certificates
301
Chapter 19 Certificates
301
Certificates Overview
301
Advantages of Certificates
302
Self-Signed Certificates
302
Configuration Summary
302
Figure 169 Certificate Configuration Overview
302
My Certificates
303
Figure 170 My Certificates
303
Table 116 My Certificates
303
My Certificate Import
304
Certificate File Formats
305
Figure 171 My Certificate Import
305
Table 117 My Certificate Import
305
My Certificate Create
306
Figure 172 My Certificate Create
306
Table 118 My Certificate Create
306
My Certificate Details
308
Figure 173 My Certificate Details
309
Table 119 My Certificate Details
310
Trusted Cas
311
Figure 174 Trusted Cas
312
Table 120 Trusted Cas
312
Trusted CA Import
313
Figure 175 Trusted CA Import
313
Table 121 Trusted CA Import
313
Trusted CA Details
314
Figure 176 Trusted CA Details
314
Table 122 Trusted CA Details
315
Trusted Remote Hosts
316
Figure 177 Trusted Remote Hosts
317
Table 123 Trusted Remote Hosts
317
Verifying a Trusted Remote Host's Certificate
318
Trusted Remote Host Certificate Fingerprints
318
Figure 178 Remote Host Certificates
318
Figure 179 Certificate Details
318
Trusted Remote Hosts Import
319
Trusted Remote Host Certificate Details
319
Figure 180 Trusted Remote Host Import
319
Table 124 Trusted Remote Host Import
319
Figure 181 Trusted Remote Host Details
320
Table 125 Trusted Remote Host Details
321
Directory Servers
322
Directory Server Add and Edit
323
Figure 182 Directory Servers
323
Table 126 Directory Servers
323
Figure 183 Directory Server Add and Edit
324
Table 127 Directory Server Add and Edit
324
Advanced
325
Part VI: Advanced
325
Static Route
327
Chapter 20 Static Route
327
Configuring Static Route
327
Figure 184 Example of Static Routing Topology
327
Figure 185 Static Route
328
Static Route Edit
328
Table 128 Static Route
328
Figure 186 Static Route Edit
329
Table 129 Static Route Edit
329
Bandwidth Management
331
Chapter 21 Bandwidth Management
331
Bandwidth Management Overview
331
Application-Based Bandwidth Management
331
Auto Classifier
331
Subnet-Based Bandwidth Management
332
Figure 187 Subnet-Based Bandwidth Management Example
332
Table 130 Typical Packet Sizes
332
Table 131 Automatic Traffic Classifier Priorities
332
Application and Subnet-Based Bandwidth Management
333
Bandwidth Management Priorities
333
Configuring Bandwidth Management (General)
333
Figure 188 Bandwidth Management: General
333
Table 132 Application and Subnet-Based Bandwidth Management Example
333
Table 133 Bandwidth Management Priorities
333
Bandwidth Management Rule Setup
334
Figure 189 Bandwidth Management: Rule Setup
334
Table 134 Bandwidth Management: General
334
Table 135 Bandwidth Management: Rule Setup
334
Figure 190 Bandwidth Management Rule Configuration
335
Rule Configuration
335
Table 136 Bandwidth Management Rule Configuration
336
Bandwidth Monitor
337
Figure 191 Bandwidth Management: Monitor
337
Dynamic DNS Setup
339
Chapter 22 Dynamic DNS Setup
339
Dynamic DNS Overview
339
DYNDNS Wildcard
339
Configuring Dynamic DNS
339
Figure 192 Dynamic DNS
340
Table 137 Dynamic DNS
340
Chapter 23 Remote Management Configuration
343
Remote Management Overview
343
Figure 193 Secure and Insecure Remote Management from the WAN
343
Remote Management and NAT
344
Remote Management Limitations
344
System Timeout
344
Introduction to HTTPS
345
Figure 194 HTTPS Implementation
345
Http
346
Figure 195 Remote Management: HTTP
346
Table 138 Remote Management: HTTP
346
Telnet
347
Configuring Telnet
347
Figure 196 Telnet Configuration on a TCP/IP Network
347
Configuring FTP
348
Figure 197 Remote Management: Telnet
348
Table 139 Remote Management: Telnet
348
Snmp
349
Figure 198 Remote Management: FTP
349
Table 140 Remote Management: FTP
349
Figure 199 SNMP Management Model
350
Supported Mibs
350
Configuring SNMP
351
Figure 200 Remote Management: SNMP
351
SNMP Traps
351
Table 141 SNMP Traps
351
Configuring DNS
352
Table 142 Remote Management: SNMP
352
Configuring ICMP
353
Figure 201 Remote Management: DNS
353
Table 143 Remote Management: DNS
353
Ssh
354
Figure 202 Remote Management: ICMP
354
Table 144 Remote Management: ICMP
354
How SSH Works
355
Figure 203 SSH Communication over the WAN Example
355
Figure 204 How SSH Works
355
SSH Implementation on the Zyxel Device
356
Requirements for Using SSH
356
Configuring SSH
356
Figure 205 ADVANCED > REMOTE MGMT > SSH
356
Table 145 ADVANCED > REMOTE MGMT > SSH
356
Secure Telnet Using SSH Examples
357
Example 1: Microsoft Windows
357
Example 2: Linux
357
Figure 206 SSH Example 1: Store Host Key
357
Secure FTP Using SSH Example
358
Figure 207 SSH Example 2: Test
358
Figure 208 SSH Example 2: Log in
358
Figure 209 Secure FTP: Firmware Upload Example
359
Chapter 24 Universal Plug-And-Play (Upnp)
361
Introducing Universal Plug and Play
361
How Do I Know if I'M Using Upnp
361
NAT Traversal
361
Cautions with Upnp
361
Upnp and Zyxel
362
Configuring Upnp
362
Figure 210 Configuring Upnp
362
Table 146 Configuring Upnp
362
Installing Upnp in Windows Example
363
Figure 211 Add/Remove Programs: Windows Setup: Communication
363
Figure 212 Add/Remove Programs: Windows Setup: Communication: Components
364
Figure 213 Network Connections
364
Figure 214 Windows Optional Networking Components Wizard
365
Figure 215 Networking Services
365
Using Upnp in Windows XP Example
366
Figure 216 Network Connections
366
Figure 217 Internet Connection Properties
367
Figure 218 Internet Connection Properties: Advanced Settings
368
Figure 219 Internet Connection Properties: Advanced Settings: Add
368
Figure 220 System Tray Icon
369
Figure 221 Internet Connection Status
369
Figure 222 Network Connections
370
Figure 223 Network Connections: My Network Places
371
Figure 224 Network Connections: My Network Places: Properties: Example
371
Maintenance and Troubleshooting
373
Part VII: Maintenance and Troubleshooting
373
System
375
Chapter 25 System
375
General Setup and System Name
375
General Setup
375
Figure 225 System General Setup
376
Table 147 System General Setup
376
Time Setting
377
Figure 226 System Time Setting
377
Table 148 System Time Setting
377
Call History
381
Chapter 26 Call History
381
Call History Overview
381
Viewing the Call History Summary
381
Viewing Call History
382
Figure 227 Call History > Summary
382
Table 149 Call History > Summary
382
Figure 228 Call History > Call History
383
Table 150 Call History > Call History
383
Configuring Call History Settings
384
Figure 229 Call History > Call History Settings
384
Table 151 Call History > Call History Settings
385
Logs
387
Chapter 27 Logs
387
Logs Overview
387
Alerts and Logs
387
Viewing the Logs
387
Configuring Log Settings
388
Figure 230 View Log
388
Table 152 View Log
388
Figure 231 Log Settings
389
Table 153 Log Settings
389
SMTP Error Messages
390
Example E-Mail Log
391
Figure 232 E-Mail Log Example
391
Table 154 SMTP Error Messages
391
Log Descriptions
392
Table 155 System Maintenance Logs
392
Table 156 System Error Logs
393
Table 157 Access Control Logs
393
Table 158 TCP Reset Logs
393
Table 159 Packet Filter Logs
394
Table 160 ICMP Logs
394
Table 161 CDR Logs
394
Table 162 PPP Logs
395
Table 163 Upnp Logs
395
Table 164 Content Filtering Logs
395
Table 165 Attack Logs
395
Table 166 802.1X Logs
396
Table 167 ACL Setting Notes
397
Table 168 ICMP Notes
397
Table 169 Syslog Logs
398
Table 170 SIP Logs
398
Table 171 RTP Logs
399
Table 172 FSM Logs: Caller Side
399
Table 173 FSM Logs: Callee Side
399
Table 174 PSTN Logs
399
Table 175 RFC-2408 ISAKMP Payload Types
400
Troubleshooting
401
Chapter 28 Troubleshooting
401
Power, Hardware Connections, and Leds
401
Zyxel Device Access and Login
402
Internet Access
404
Phone Calls and Voip
405
Tools
407
Chapter 29 Tools
407
Introduction
407
Filename Conventions
407
File Maintenance over WAN
408
Table 176 Filename Conventions
408
Firmware Upgrade Screen
409
Figure 233 Firmware Upgrade
409
Table 177 Firmware Upgrade
409
Backup and Restore
410
Figure 234 Firmware Upload in Progress
410
Figure 235 Network Temporarily Disconnected
410
Figure 236 Error Message
410
Backup Configuration
411
Figure 237 Configuration
411
Restore Configuration
411
Table 178 Restore Configuration
411
Figure 238 Configuration Upload Successful
412
Figure 239 Network Temporarily Disconnected
412
Figure 240 Configuration Upload Error
412
Figure 241 Reset Warning Message
412
Reset to Factory Defaults
412
Restart
413
Using FTP or TFTP to Back up Configuration
413
Using the FTP Commands to Back up Configuration
413
Figure 242 Reset in Process Message
413
Figure 243 Restart Screen
413
FTP Command Configuration Backup Example
414
Configuration Backup Using GUI-Based FTP Clients
414
Backup Configuration Using TFTP
414
Figure 244 FTP Session Example
414
Table 179 General Commands for GUI-Based FTP Clients
414
TFTP Command Configuration Backup Example
415
Configuration Backup Using GUI-Based TFTP Clients
415
Table 180 General Commands for GUI-Based TFTP Clients
415
Using FTP or TFTP to Restore Configuration
416
Restore Using FTP Session Example
416
FTP and TFTP Firmware and Configuration File Uploads
416
Figure 245 Restore Using FTP Session Example
416
Figure 246 FTP Session Example of Firmware File Upload
417
FTP File Upload Command from the DOS Prompt Example
417
FTP Session Example of Firmware File Upload
417
TFTP File Upload
417
TFTP Upload Command Example
418
Diagnostic
419
Chapter 30 Diagnostic
419
General Diagnostic
419
DSL Line Diagnostic
419
Figure 247 Diagnostic: General
419
Table 181 Diagnostic: General
419
Figure 248 Diagnostic: DSL Line
420
Table 182 Diagnostic: DSL Line
420
Chapter 31 Product Specifications
423
Hardware Specifications
423
Firmware Specifications
423
Table 183 Hardware Specifications
423
Table 184 Firmware Specifications
423
Voice Specifications
427
Table 185 Voice Features
427
Wireless Features (Wireless Devices Only)
429
Table 186 Wireless Features
429
IEEE 802.11G Wireless LAN
430
Table 187 IEEE 802.11G
430
Power Adaptor Specifications
431
Table 188 P-2602HWL Series Power Adaptor Specifications
431
Appendices and Index
433
Part VIII: Appendices and Index
433
Appendix A Setting up Your Computer's IP Address
435
Figure 249 Windows 95/98/Me: Network: Configuration
436
Figure 250 Windows 95/98/Me: TCP/IP Properties: IP Address
437
Figure 251 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
438
Verifying Settings
438
Figure 252 Windows XP: Start Menu
439
Figure 253 Windows XP: Control Panel
439
Figure 254 Windows XP: Control Panel: Network Connections: Properties
440
Figure 255 Windows XP: Local Area Connection Properties
440
Figure 256 Windows XP: Advanced TCP/IP Settings
441
Figure 257 Windows XP: Internet Protocol (TCP/IP) Properties
442
Figure 258 Macintosh os 8/9: Apple Menu
443
Figure 259 Macintosh os 8/9: TCP/IP
443
Figure 260 Macintosh os X: Apple Menu
444
Macintosh os X
444
Figure 261 Macintosh os X: Network
445
Appendix B Pop-Up Windows, Javascripts and Java Permissions
447
Figure 262 Pop-Up Blocker
447
Internet Explorer Pop-Up Blockers
447
Figure 263 Internet Options: Privacy
448
Figure 264 Internet Options: Privacy
449
Figure 265 Pop-Up Blocker Settings
449
Figure 266 Internet Options: Security
450
Figure 267 Security Settings - Java Scripting
451
Figure 268 Security Settings - Java
451
Java Permissions
451
Figure 269 Java (Sun)
452
Appendix C IP Addresses and Subnetting
453
Figure 270 Network Number and Host ID
454
Table 189 Subnet Masks
454
Table 190 Subnet Masks
455
Table 191 Maximum Host Numbers
455
Table 192 Alternative Subnet Mask Notation
455
Figure 271 Subnetting Example: before Subnetting
456
Figure 272 Subnetting Example: after Subnetting
457
Table 193 Subnet 1
457
Table 194 Subnet 2
458
Table 195 Subnet 3
458
Table 196 Subnet 4
458
Table 197 Eight Subnets
458
Table 198 24-Bit Network Number Subnet Planning
459
Table 199 16-Bit Network Number Subnet Planning
459
Configuring Ip Addresses
460
Private Ip Addresses
460
Appendix D Wireless Lans
461
Figure 273 Peer-To-Peer Communication in an Ad-Hoc Network
461
Wireless Lan Topologies
461
Figure 274 Basic Service Set
462
Figure 275 Infrastructure WLAN
463
Figure 276 RTS/CTS
464
Fragmentation Threshold
464
Table 200 IEEE 802.11G
465
Preamble Type
465
Table 201 Wireless Security Levels
466
Types of Radius Messages
467
Dynamic Wep Key Exchange
469
Table 202 Comparison of EAP Authentication Types
469
Figure 277 WPA(2) with RADIUS Application Example
471
Wireless Client Wpa Supplicants
471
Figure 278 WPA(2)-PSK Authentication
472
Security Parameters Summary
472
Table 203 Wireless Security Relational Matrix
472
Antenna Characteristics
473
Antenna Gain
473
Table 204 Examples of Services
475
Appendix E Services
476
Appendix F Legal Information
479
Zyxel Limited Warranty
481
Appendix G Customer Support
483
Index
489
Advertisement
Advertisement
Related Products
ZyXEL Communications P-2602HWLNI
ZyXEL Communications P-2602HW-61C
ZyXEL Communications P-2602HWNLI
ZyXEL Communications P-2602HWL-C -
ZyXEL Communications P2602HW-C -
ZyXEL Communications P-2602HWLNI-D7A
ZyXEL Communications P-2602H-D1A
ZyXEL Communications P-2602H-D3A
ZyXEL Communications P-2602HL-D3A
ZyXEL Communications P-2602HL-D7A
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL