Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Hardware
P-2802HWL-I3
ZyXEL Communications P-2802HWL-I3 Manuals
Manuals and User Guides for ZyXEL Communications P-2802HWL-I3. We have
5
ZyXEL Communications P-2802HWL-I3 manuals available for free PDF download: User Manual, Support Notes, Quick Start Manual, Specifications, Declaration Of Conformity
ZyXEL Communications P-2802HWL-I3 User Manual (418 pages)
VDSL VoIP IAD
Brand:
ZyXEL Communications
| Category:
Network Hardware
| Size: 12.7 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
33
PART I Introduction
33
Chapter 1 Introducing the Zyxel Device
35
Overview
35
Table 1 VDSL Standards
35
Table 2 Models Covered
35
Figure 1 Secure Internet Access Application
37
Figure 2 WLAN Application Example
38
Making Calls Via Internet Telephony Service Provider
38
Wireless LAN Application
38
Figure 3 Internet Telephony Service Provider Application
39
Making Peer-To-Peer Calls
39
Figure 5 Leds
40
Table 3 Leds
40
The RESET Button
41
Using the Reset Button
41
Figure 4 Peer-To-Peer Calling
39
Leds
40
Ways to Manage the Zyxel Device
36
Applications for the Zyxel Device
37
Good Habits for Managing the Zyxel Device
37
Secure Internet Access
37
Chapter 2 Introducing the Web Configurator
43
Accessing the Web Configurator
43
Web Configurator Overview
43
Figure 6 Password Screen
44
Figure 7 Change Password Screen
44
Figure 8 Replace Certificate Screen
45
Figure 10 Main Screen
46
Table 4 Web Configurator Icons in the Title Bar
46
Table 5 Navigation Panel Summary
47
Main Window
49
Status Bar
49
Navigation Panel
47
Figure 9 Wizard or Advanced Screen
45
Title Bar
46
Web Configurator Main Screen
46
Wizard
51
Part II: Wizard
51
Chapter 3 Internet and Wireless Setup Wizard
53
Internet Access Wizard Setup
53
Introduction
53
Figure 11 Select a Mode
54
Figure 12 Wizard Welcome
54
Figure 16 Connection Test
58
Figure 17 Connection Test Failed
58
Figure 18 Connection Test Successful
59
Figure 19 Wireless LAN Setup Wizard 1
59
Table 9 Wireless LAN Setup Wizard 1
59
Figure 20 Wireless LAN
60
Table 10 Wireless LAN Setup Wizard 2
60
Manually Assign a WEP Key
61
Manually Assign a WPA-PSK Key
61
Figure 13 Internet Access Wizard Setup: ISP Parameters
55
Table 6 Internet Access Wizard Setup: ISP Parameters
55
Figure 14 Internet Connection with Pppoe
56
Table 7 Internet Connection with Pppoe
56
Figure 15 Internet Connection with Ethernet
57
Table 8 Internet Connection with Ethernet
57
Wireless Connection Wizard Setup
58
Figure 21 Manually Assign a WPA-PSK Key
61
Table 11 Manually Assign a WPA-PSK Key
61
Figure 22 Manually Assign a WEP Key
62
Figure 23 Wireless LAN Setup 3
62
Table 12 Manually Assign a WEP Key
62
Figure 24 Internet Access and WLAN Wizard Setup Complete
63
Chapter 4 Voip Wizard and Example
65
Introduction
65
Voip Wizard Setup
65
Figure 25 Voip Phone Calls
65
Figure 26 Select a Mode
66
Figure 27 Wizard: Welcome
66
Table 13 Sample SIP Account Information
66
Figure 28 Voip Wizard Configuration
67
Table 14 Voip Wizard Configuration
67
Figure 29 SIP Registration Test
68
Figure 30 Voip Wizard Fail
68
Figure 31 Voip Wizard Finish
69
Advanced
71
Part III: Advanced
71
Chapter 5 Status Screens
73
Figure 32 Status Screen
73
Status Screen
73
Status Screens
73
Table 15 Status Screen
74
Any IP Table
76
Figure 33 any IP Table
76
Table 16 any IP Table
76
WLAN Status ("W" Models Only)
77
Figure 34 WLAN Status
77
Packet Statistics
77
Table 17 WLAN Status
77
Figure 35 Packet Statistics
78
Figure 36 Voip Statistics
79
Table 19 Voip Statistics
79
WAN Setup
83
Internet Access Setup
84
Nailed-Up Connection (PPP)
84
Table 20 Internet Access Setup
85
Advanced Internet Access Setup
86
Table 21 Advanced Internet Access Setup
86
WAN Interface Setup
87
LAN Setup
89
Table 23 LAN IP
94
Configuring Advanced LAN Setup
95
Table 25 DHCP Setup
97
Figure 45 LAN Client List
98
Table 26 LAN Client List
98
Figure 46 Physical Network & Partitioned Logical Networks
99
LAN IP Alias
99
Figure 47 LAN IP Alias
100
Table 27 LAN IP Alias
100
Wireless LAN
101
Wireless Network Overview
101
MAC Address Filter
102
Ssid
102
User Authentication
102
Wireless Security Overview
102
Encryption
103
Additional Wireless Terms
104
General WLAN Screen
104
One-Touch Intelligent Security Technology (OTIST)
104
Figure 49 Wireless LAN > General
105
Table 30 Wireless LAN > General
105
Figure 50 Wireless: no Security
106
Table 31 Wireless no Security
106
WEP Encryption Screen
106
Figure 51 Wireless: Static WEP Encryption
107
Table 32 Wireless: Static WEP Encryption
107
Wpa(2)-Psk
107
Figure 52 Wireless: WPA(2)-PSK
108
Table 33 Wireless: WPA(2)-PSK
108
Figure 53 Wireless: WPA(2)
109
Table 34 Wireless: WPA(2)
109
WPA(2) Authentication Screen
109
Figure 54 Wireless LAN: Advanced
110
Wireless LAN Advanced Setup
110
Figure 55 Network > Wireless LAN > OTIST
111
OTIST Screen
111
Table 35 Wireless LAN: Advanced
111
Figure 56 Example: Wireless Client OTIST Screen
112
Table 36 Network > Wireless LAN > OTIST
112
Figure 57 OTIST: Settings
113
Figure 58 OTIST: in Progress on the Zyxel Device
113
Figure 59 OTIST: in Progress on the Wireless Device
113
Figure 60 Start OTIST
113
Notes on OTIST
113
MAC Filter
114
Table 18 Packet Statistics
78
Voip Statistics
79
Chapter 6 WAN Setup
83
IP Address Assignment
83
PPP over Ethernet
83
WAN Overview
83
Figure 37 Internet Access Setup (Pppoe)
84
Figure 38 Advanced Internet Access Setup
86
Figure 39 WAN Interface Setup
87
Table 22 WAN Interface Setup
87
Chapter 7 LAN Setup
89
Figure 40 LAN and WAN IP Addresses
89
LAN Overview
89
Lans, Wans and the Zyxel Device
89
DHCP Setup
90
DNS Server Addresses
90
Lan Tcp/Ip
90
IP Address and Subnet Mask
91
Multicast
92
RIP Setup
92
Any IP
93
Figure 41 any IP Example
93
Configuring LAN IP
94
Figure 42 LAN IP
94
Figure 43 Advanced LAN Setup
95
Table 24 Advanced LAN Setup
95
DHCP Setup
96
Figure 44 DHCP Setup
96
LAN Client List
97
Figure 61 MAC Address Filter
114
Table 37 MAC Address Filter
115
Chapter 8 Wireless LAN
101
Figure 48 Example of a Wireless Network
101
Table 28 Types of Encryption for each Type of Authentication
103
Table 29 Additional Wireless Terms
104
No Security
105
Chapter 9 Network Address Translation (NAT) Screens
117
NAT General Overview
117
NAT Definitions
117
Table 38 NAT Definitions
117
Figure 62 How NAT Works
118
How NAT Works
118
NAT Application
118
What NAT Does
118
Figure 63 NAT Application with IP Alias
119
NAT Mapping Types
119
NAT General Setup
120
SUA (Single User Account) Versus NAT
120
Table 39 NAT Mapping Types
120
Figure 64 NAT General
121
Port Forwarding
121
Table 40 NAT General
121
Configuring Servers Behind Port Forwarding (Example)
122
Default Server IP Address
122
Port Forwarding: Services and Port Numbers
122
Configuring Port Forwarding
123
Figure 65 Multiple Servers Behind NAT Example
123
Figure 66 Port Forwarding
123
Figure 67 Port Forwarding Rule Setup
124
Port Forwarding Rule Edit
124
Table 41 Port Forwarding
124
Address Mapping
125
Table 42 Port Forwarding Rule Setup
125
Address Mapping Rule Edit
126
Figure 68 Address Mapping Rules
126
Table 43 Address Mapping Rules
126
Figure 69 Edit Address Mapping Rule
127
Figure 70 Network > NAT > ALG
128
Table 45 Network > NAT > ALG
128
Voice
129
Table 46 SIP Call Progression
130
Figure 71 SIP User Agent
131
Figure 72 SIP Proxy Server
131
Figure 73 SIP Redirect Server
132
Pulse Code Modulation
132
Rtp
132
Voice Coding
132
Custom Tones (IVR)
133
MWI (Message Waiting Indication)
133
PSTN Call Setup Signaling
133
Table 47 Custom Tones Details
133
Diffserv
134
Quality of Service (Qos)
134
Type of Service (Tos)
134
Figure 74 Diffserv: Differentiated Service Field
135
SIP Settings Screen
135
VLAN Tagging
135
Figure 75 SIP > SIP Settings
136
Table 48 SIP > SIP Settings
136
Advanced SIP Setup Screen
137
Figure 76 Voip > SIP Settings > Advanced
138
Table 49 Voip > SIP Settings > Advanced
138
Figure 77 SIP > Qos
141
Phone
141
SIP Qos Screen
141
Table 50 SIP > Qos
141
Voice Activity Detection/Silence Suppression
141
Analog Phone Screen
142
Comfort Noise Generation
142
Echo Cancellation
142
Figure 78 Phone > Analog Phone
142
Table 51 Phone > Analog Phone
142
Advanced Analog Phone Setup Screen
143
Figure 79 Phone > Analog Phone > Advanced
143
Table 52 Phone > Analog Phone > Advanced
143
Common Phone Settings Screen
144
Figure 80 Phone > Common
144
Table 53 Phone > Common
144
Europe Type Supplementary Phone Services
145
Phone Services Overview
145
The Flash Key
145
Network Address Translation (NAT) Screens
118
Table 44 Edit Address Mapping Rule
127
Sip Alg
128
Chapter 10 Voice
129
Introduction to Voip
129
Sip
129
SIP Identities
129
SIP Call Progression
130
SIP Servers
130
Table 54 European Flash Key Commands
145
European Call Transfer
146
Table 55 USA Flash Key Commands
147
USA Type Supplementary Services
147
Figure 81 Voip > Phone > Region
148
Phone Region Screen
148
Speed Dial
148
Table 56 Voip > Phone > Region
148
Figure 82 Phone Book > Speed Dial
149
Table 57 Phone Book > Speed Dial
149
Incoming Call Policy Screen
150
European Call Waiting
146
Figure 83 Phone Book > Incoming Call Policy
150
Table 58 Phone Book > Incoming Call Policy
151
PSTN Line ("L" Models Only)
152
PSTN Line Screen ("L" Models Only)
152
Figure 84 PSTN Line > General
152
Table 59 PSTN Line > General
153
About the Zyxel Device Firewall
155
Firewalls
155
Chapter 11 Firewalls
155
Firewall Overview
155
Stateful Inspection Firewall
155
General Firewall Policy Overview
156
Guidelines for Enhancing Security with Your Firewall
156
Figure 85 Ideal Firewall Setup
158
Security Considerations
158
The "Triangle Route" Problem
158
Triangle Route
158
Figure 86 "Triangle Route" Problem
159
Figure 87 IP Alias
160
Figure 88 Firewall: General
160
General Firewall Policy
160
Firewall Rules Summary
161
Table 60 Firewall: General
161
Figure 89 Firewall Rules
162
Table 61 Firewall Rules
162
Configuring Firewall Rules
163
Figure 90 Firewall: Edit Rule
164
Table 62 Firewall: Edit Rule
164
Configuring a Customized Service
166
Customized Services
166
Figure 91 Firewall: Customized Services
166
Table 63 Customized Services
166
Example Firewall Rule
167
Figure 92 Firewall: Configure Customized Services
167
Table 64 Firewall: Configure Customized Services
167
Figure 93 Firewall Example: Rules
168
Figure 94 Edit Custom Port Example
168
Figure 95 Firewall Example: Edit Rule: Destination Address
169
Figure 97 Firewall Example: Rules: Myservice
171
Figure 98 Three-Way Handshake
171
Configuring Firewall Thresholds
172
Figure 99 Firewall: Threshold
172
Threshold Values
172
Table 65 Firewall: Threshold
173
Configuring Keyword Blocking
175
Content Filtering
175
Content Filtering Overview
175
Figure 101 Content Filter: Schedule
176
Table 66 Content Filter: Keyword
176
Configuring Trusted Computers
177
Figure 102 Content Filter: Trusted
177
Table 67 Content Filter: Schedule
177
Table 68 Content Filter: Trusted
177
Introduction to Ipsec
179
Ipsec
179
Other Terminology
179
Security Association
179
VPN Overview
179
Ipsec Architecture
180
VPN Applications
180
Encapsulation
181
Ipsec Algorithms
181
Key Management
181
Figure 105 Transport and Tunnel Mode Ipsec Encapsulation
182
Table 69 VPN and NAT
183
AH (Authentication Header) Protocol
185
ESP (Encapsulating Security Payload) Protocol
185
Ipsec Algorithms
185
VPN Screens
185
Vpn/Ipsec Overview
185
My IP Address
186
Secure Gateway Address
186
Figure 106 Ipsec Summary Fields
187
Figure 107 VPN Setup
188
Table 71 VPN Setup
188
Keep Alive
189
VPN, NAT, and NAT Traversal
189
Figure 108 NAT Router between Ipsec Routers
190
Remote DNS Server
190
Table 72 VPN and NAT
190
Figure 109 VPN Host Using Intranet DNS Server Example
191
ID Type and Content
191
ID Type and Content Examples
192
Table 73 Local ID Type and Content Fields
192
Table 74 Peer ID Type and Content Fields
192
Table 75 Matching ID Type and Content Configuration Example
192
Editing VPN Policies
193
Pre-Shared Key
193
Table 76 Mismatching ID Type and Content Configuration Example
193
Figure 110 VPN Setup: Edit
194
Table 77 VPN Setup; Edit
194
Figure 111 Two Phases to Set up the Ipsec SA
198
IKE Phases
198
Diffie-Hellman (DH) Key Groups
199
Negotiation Mode
199
Configuring Advanced IKE Settings
200
Figure 112 Advanced VPN IKE
200
Perfect Forward Secrecy (PFS)
200
Table 78 Advanced VPN IKE
200
Manual Key Setup
202
Security Parameter Index (SPI)
202
Configuring Manual Key
203
Figure 113 VPN Setup: Manual Key
203
Table 79 VPN Setup: Manual Key
203
Viewing SA Monitor
205
Figure 114 VPN: SA Monitor
206
Table 80 VPN: SA Monitor
206
Configuring Global Setting
207
Figure 115 VPN: Global Setting
207
Table 81 VPN: Global Setting
207
Telecommuter Vpn/Ipsec Examples
207
Telecommuters Sharing One VPN Rule Example
207
Figure 116 Telecommuters Sharing One VPN Rule Example
208
Table 82 Telecommuters Sharing One VPN Rule Example
208
Telecommuters Using Unique VPN Rules Example
208
Figure 117 Telecommuters Using Unique VPN Rules Example
209
Table 83 Telecommuters Using Unique VPN Rules Example
209
VPN and Remote Management
210
Certificates
211
Certificates Overview
211
Table 85 My Certificate Import
215
My Certificate Create
216
Table 86 My Certificate Create
216
My Certificate Details
218
Table 87 My Certificate Details
220
Trusted cas
221
Table 88 Trusted cas
222
Trusted CA Import
223
Table 93 Trusted Remote Host Details
230
Directory Servers
232
Static Route
235
Quality of Service (Qos)
239
Figure 96 Firewall Example: Edit Rule: Select Customized Services
170
Firewall Thresholds
171
Chapter 12 Content Filtering
175
Figure 100 Content Filter: Keyword
175
Configuring the Schedule
176
Chapter 13 Introduction to Ipsec
179
Figure 103 Encryption and Decryption
180
Figure 104 Ipsec Architecture
181
Ipsec and NAT
182
Transport Mode
182
Tunnel Mode
182
Chapter 14 VPN Screens
185
Solving the "Triangle Route" Problem
159
Table 70 AH and ESP
186
Dynamic Secure Gateway Address
187
VPN Setup Screen
187
Figure 145 Dynamic DNS
252
Table 104 Dynamic DNS
252
Chapter 15 Certificates
211
Advantages of Certificates
212
Configuration Summary
212
Figure 118 Certificate Configuration Overview
212
My Certificates
212
Self-Signed Certificates
212
Figure 119 My Certificates
213
Table 84 My Certificates
213
My Certificate Import
214
Certificate File Formats
215
Figure 120 My Certificate Import
215
Figure 121 My Certificate Create
216
Figure 122 My Certificate Details
219
Figure 123 Trusted cas
222
Figure 124 Trusted CA Import
223
Figure 125 Trusted CA Details
224
Figure 126 Trusted Remote Hosts
227
Figure 127 Remote Host Certificates
228
Figure 128 Certificate Details
228
Figure 129 Trusted Remote Host Import
229
Table 92 Trusted Remote Host Import
229
Trusted Remote Host Certificate Details
229
Trusted Remote Hosts Import
229
Figure 130 Trusted Remote Host Details
230
Figure 131 Directory Servers
232
Table 94 Directory Servers
232
Directory Server Add and Edit
233
Figure 132 Directory Server Add and Edit
233
Table 95 Directory Server Add and Edit
233
Configuring Static Route
235
Figure 134 Static Route
236
Table 96 Static Route
236
Figure 135 Static Route Edit
237
Table 97 Static Route Edit
237
IEEE 802.1Q Tag
239
Qos Overview
239
Diffserv
240
IP Precedence
240
Automatical Priority Queue Assignment
241
Configuring Qos General Screen
241
Figure 136 Qos: General
242
Table 100 Qos: General
242
Class Configuration
243
Figure 137 Qos: Class Setup
243
Figure 139 Qos Example
246
Figure 140 Qos Class Example: Voip -1
246
Figure 141 Qos Class Example: Voip -2
247
Figure 142 Qos Class Example: Boss -1
247
Figure 143 Qos Class Example: Boss -2
248
Figure 144 Qos Monitor
248
Qos Monitor
248
Table 103 Qos Monitor
249
Dynamic DNS Setup
251
Table 91 Trusted Remote Hosts
227
Trusted Remote Host Certificate Fingerprints
228
Verifying a Trusted Remote Host's Certificate
228
Chapter 16 Static Route
235
Figure 133 Example of Static Routing Topology
235
Static Route Edit
236
Chapter 17 Quality of Service (Qos)
239
Table 98 IEEE 802.1P Priority Level and Traffic Type
239
Table 99 Internal Layer2 and Layer3 Qos Mapping
241
Class Setup
242
Chapter 18 Dynamic DNS Setup
251
Table 89 Trusted CA Import
223
Trusted CA Details
224
Table 90 Trusted CA Details
225
Trusted Remote Hosts
226
Table 101 Bandwidth Management: Rule Setup
243
Figure 138 Qos Class Configuration
244
Table 102 Qos Class Configuration
244
Qos Example
246
Configuring Dynamic DNS
251
Dynamic DNS Overview
251
DYNDNS Wildcard
251
Chapter 19 Remote Management Configuration
255
Figure 146 Secure and Insecure Remote Management from the WAN
255
Remote Management Overview
255
Remote Management and NAT
256
Remote Management Limitations
256
System Timeout
256
WWW (HTTP and HTTPS)
257
Figure 148 Remote Management: WWW
258
Table 105 Remote Management: WWW
258
Figure 149 Security Alert Dialog Box (Internet Explorer)
259
Avoiding the Browser Warning Messages
260
Figure 150 Security Certificate 1 (Netscape)
260
Netscape Navigator Warning Messages
260
Figure 152 Example: Lock Denoting a Secure Connection
262
Figure 153 Replace Certificate
262
Configuring Telnet
263
Figure 154 Device-Specific Certificate
263
Figure 155 Common Zyxel Device Certificate
263
Telnet
263
Configuring FTP
264
Figure 156 Remote Management: Telnet
264
Table 106 Remote Management: Telnet
264
Figure 157 Remote Management: FTP
265
Snmp
265
Table 107 Remote Management: FTP
265
Figure 158 SNMP Management Model
266
Supported Mibs
266
Configuring SNMP
267
Figure 159 Remote Management: SNMP
267
SNMP Traps
267
Table 108 SNMP Traps
267
Configuring DNS
268
Table 109 Remote Management: SNMP
268
Configuring ICMP
269
Figure 147 HTTPS Implementation
257
Www
258
Figure 151 Security Certificate 2 (Netscape)
260
Login Screen
261
HTTPS Example
259
Internet Explorer Warning Messages
259
Figure 160 Remote Management: DNS
269
Table 110 Remote Management: DNS
269
Figure 161 Remote Management: ICMP
270
Table 111 Remote Management: ICMP
270
Chapter 20 Universal Plug-And-Play (Upnp)
271
Cautions with Upnp
271
How Do I Know if I'M Using Upnp
271
Introducing Universal Plug and Play
271
NAT Traversal
271
Configuring Upnp
272
Figure 162 Configuring Upnp
272
Table 112 Configuring Upnp
272
Upnp and Zyxel
272
Figure 163 Add/Remove Programs: Windows Setup: Communication
273
Installing Upnp in Windows Example
273
Figure 164 Add/Remove Programs: Windows Setup: Communication: Components
274
Figure 165 Network Connections
274
Figure 166 Windows Optional Networking Components Wizard
275
Figure 167 Networking Services
275
Using Upnp in Windows XP Example
276
Figure 168 Network Connections
276
Figure 169 Internet Connection Properties
277
Figure 170 Internet Connection Properties: Advanced Settings
278
Figure 171 Internet Connection Properties: Advanced Settings: Add
278
Figure 172 System Tray Icon
279
Figure 173 Internet Connection Status
279
Figure 174 Network Connections
280
Figure 175 Network Connections: My Network Places
281
Figure 176 Network Connections: My Network Places: Properties: Example
281
Maintenance, Troubleshooting and Specifications
283
Part IV: Maintenance, Troubleshooting and Specifications
283
Chapter 21 System
285
General Setup
285
General Setup and System Name
285
System
285
Figure 177 System General Setup
286
Figure 178 System Time Setting
287
Table 114 System Time Setting
287
Alerts and Logs
289
Table 113 System General Setup
286
Time Setting
287
Logs
289
Figure 179 View Log
290
Table 115 View Log
290
Figure 180 Log Settings
291
Table 116 Log Settings
291
SMTP Error Messages
292
Example E-Mail Log
293
Table 118 System Maintenance Logs
294
Table 119 System Error Logs
295
Table 120 Access Control Logs
295
Table 121 TCP Reset Logs
295
Table 122 Packet Filter Logs
296
Table 123 ICMP Logs
296
Table 124 CDR Logs
296
Table 125 PPP Logs
297
Table 126 Upnp Logs
297
Table 127 Content Filtering Logs
297
Table 128 Attack Logs
297
Table 129 802.1X Logs
298
Table 130 ACL Setting Notes
299
Table 131 ICMP Notes
299
Table 132 Syslog Logs
300
Table 133 SIP Logs
300
Table 134 RTP Logs
301
Table 135 FSM Logs: Caller Side
301
Table 136 FSM Logs: Callee Side
301
Table 137 PSTN Logs
301
Table 138 RFC-2408 ISAKMP Payload Types
302
Filename Conventions
303
Introduction
303
File Maintenance over WAN
304
Figure 182 Firmware Upgrade
305
Table 140 Firmware Upgrade
305
Backup and Restore
306
Figure 183 Firmware Upload in Progress
306
Figure 184 Network Temporarily Disconnected
306
Figure 185 Error Message
306
Backup Configuration
307
Figure 186 Configuration
307
Restore Configuration
307
Table 141 Restore Configuration
307
Figure 187 Configuration Upload Successful
308
Figure 188 Network Temporarily Disconnected
308
Figure 189 Configuration Upload Error
308
Reset to Factory Defaults
308
Figure 191 Reset in Process Message
309
Figure 192 Restart Screen
309
Backup Configuration Using TFTP
310
Configuration Backup Using GUI-Based FTP Clients
310
Figure 193 FTP Session Example
310
FTP Command Configuration Backup Example
310
Table 142 General Commands for GUI-Based FTP Clients
310
Configuration Backup Using GUI-Based TFTP Clients
311
Table 143 General Commands for GUI-Based TFTP Clients
311
TFTP Command Configuration Backup Example
311
Figure 194 Restore Using FTP Session Example
312
FTP and TFTP Firmware and Configuration File Uploads
312
Restore Using FTP Session Example
312
Using FTP or TFTP to Restore Configuration
312
Figure 195 FTP Session Example of Firmware File Upload
313
FTP File Upload Command from the DOS Prompt Example
313
FTP Session Example of Firmware File Upload
313
TFTP File Upload
313
TFTP Upload Command Example
314
Diagnostic
315
Figure 196 Diagnostic: General
315
Table 144 Diagnostic: General
315
Figure 197 Diagnostic: DSL Line
316
Table 145 Diagnostic: DSL Line
316
Troubleshooting
317
Figure 181 E-Mail Log Example
293
Table 117 SMTP Error Messages
293
Log Descriptions
294
Figure 190 Reset Warning Message
308
Restart
309
Using FTP or TFTP to Back up Configuration
309
Using the FTP Commands to Back up Configuration
309
Chapter 22 Logs
289
Logs Overview
289
Viewing the Logs
289
Configuring Log Settings
290
Tools
303
Figure 200 Incoming Calls: Default
323
Figure 201 Incoming Calls: Individual Configuration
323
Chapter 23 Tools
303
Table 139 Filename Conventions
304
Firmware Upgrade Screen
305
Chapter 24 Diagnostic
315
DSL Line Diagnostic
315
General Diagnostic
315
Chapter 25 Troubleshooting
317
Power, Hardware Connections, and Leds
317
Zyxel Device Access and Login
318
Internet Access
320
Phone Calls and Voip
321
Figure 198 Outgoing Calls: Default
322
Figure 199 Outgoing Calls: Individual Configuration
322
Outgoing Calls
322
Problems with Multiple SIP Accounts
322
Incoming Calls
323
Chapter 26
325
Product Specifications
325
Table 146 Hardware Specifications
325
Table 147 Firmware Specifications
325
Table 148 Voice Features
329
Voice Specifications
329
Table 149 Wireless Features
331
Table 150 IEEE 802.11G
331
Table 151 Standards Supported
332
Table 152 P-2802HWL-I Series Power Adaptor Specifications
333
Appendices and Index
335
Part V: Appendices and Index
335
Advertisement
ZyXEL Communications P-2802HWL-I3 Support Notes (187 pages)
Zyxel P-2802HWL-I1: User Guide
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 3.35 MB
Table of Contents
Table of Contents
2
Index
9
Application Notes
9
General Application Notes
9
Internet Connection
9
Setup the Prestige as a DHCP Relay
13
Configure an Internal Server Behind SUA
15
Configure a PPTP Server Behind SUA
16
Using NAT / Multi-NAT
20
Using the Dynamic DNS (DDNS)
39
Network Management Using SNMP
41
Using Syslog
48
Using IP Alias
51
Using IP Multicast
53
Using Prestige Traffic Redirect
55
Using Universal Plug N Play (Upnp)
58
Wireless Application Notes
64
Infrastructure Mode
64
Wireless MAC Address Filtering
68
WEP Configuration (Wired Equivalent Privacy)
70
Configuring 802.1X
77
Site Survey
88
PSTN Lifeline Application Notes
92
Usage of PSTN Lifeline
92
Lifeline Configuration
93
Relay to PSTN
94
How to Connect Lifeline and DSL Connection
94
Voip Application Notes
96
Setup SIP Account
96
Peer to Peer Call
99
Phone Port Settings
103
Advanced Voice Settings Configuration
105
Phone Book Speed Dial
108
Voice - Qos Setup
111
Call Forwarding Setup
115
Voice - Common Settings
118
Faq
119
Zynos FAQ
119
What Is Zynos
119
How Do I Access the Embedded Web Configurator
120
Change It
120
How Do I Upload the Zynos Firmware Code Via Embeded Web Configurator
120
How Do I Upgrade/Backup the Zynos Firmware by Using FTP Client Program Via LAN
120
How Do I Upload or Backup ROMFILE Via Web Configurator
121
Why Can't I Make Telnet to Prestige from WAN
121
What Should I Do if I Forget the System Password
122
What Is SUA? When Should I Use SUA
122
What Is the Difference between NAT and SUA
122
How Many Network Users Can the SUA/NAT Support
123
What Are Device Filters and Protocol Filters
123
Why Can't I Configure Device Filters or Protocol Filters
123
Product FAQ
123
What Is the Prestige Integrated Access Device
123
Will the Prestige Work with My Internet Connection
124
What Do I Need to Use the Prestige
124
What Is Pppoe
124
Does the Prestige Support Pppoe
124
Why Does My Provider Use Pppoe
125
Which Internet Applications Can I Use with the Prestige
125
How Can I Configure the Prestige
125
What Network Interface Does the Prestige Support
125
What Can We Do with Prestige
125
Does Prestige Support Dynamic IP Addressing
125
How Does E-Mail Work through the Prestige
126
Is It Possible to Access a Server Running Behind SUA from the Outside Internet? if Possible, How
126
What DHCP Capability Does the Prestige Support
126
How Do I Used the Reset Button, more over What Field of Parameter will be Reset by Reset Button
126
What Network Interface Does the New Prestige Series Support
127
How Does the Prestige Support TFTP
127
Can the Prestige Support TFTP over WAN
127
How Fast Can the Data Go
127
What Is Multi-NAT
128
When Do I Need Multi-NAT
128
What Ip/Port Mapping Does Multi-NAT Support
129
What Is the Difference between SUA and Multi-NAT
130
What Is BOOTP/DHCP
130
What Is DDNS
130
When Do I Need DDNS Service
131
What DDNS Servers Does the Prestige Support
131
What Is DDNS Wildcard
131
Does the Prestige Support DDNS Wildcard
131
Can the Prestige SUA Handle Ipsec Packets Sent by the VPN Gateway Behind Prestige
131
How Do I Setup My Prestige for Routing Ipsec Packets over SUA
132
PSTN Lifeline FAQ
132
Can I Connect more than One Phone on the Phone Port
132
Can I Receive Incoming PSTN Call through P2802HWL
132
Do I Need Lifeline
132
What Does Lifeline Mean
132
What Is P2802 and What Is the Difference between P2802HW and P2802HWL
132
Can I Make an Outgoing PSTN Call through P2802HWL
133
Voip FAQ
133
What Is Voice over IP
133
How Does Voice over IP Work
133
Why Use Voip
133
What Is the Relationship between Codec and Voip
133
What Advantage Does Voice over IP Can Provide
134
What Is the Difference between H.323 and SIP
134
Can H.323 and SIP Interoperate with One Another
134
What Is Voice Quality
134
How Are Voice Quality Normally Rated
134
What Is Codec
134
What Is the Relation of Codec and Voip
135
What Codec Does Prestige Support
135
Which Codec Should I Choose
135
Unable to Register with the SIP Server
136
I Can Register but Can Not Establish a Call
136
I Can Make a Call but the Voice Only Goes One Way Not Bothway
136
I Can Receive a Call but the Voice Only Goes One Way Not Bothway
136
If All the about Have Been Tried, but Register Still Fail What Should I Do
136
What Is a Network Firewall
137
What Makes Prestige Firewall Secure
137
What Are the Basic Types of Firewalls
137
What Kind of Firewall Is the Prestige
138
NAT Built-In
138
What Is Denials of Service (Dos)Attack
139
What Is Ping of Death Attack
139
What Is Teardrop Attack
139
What Is SYN Flood Attack
139
What Is LAND Attack
140
What Is Brute-Force Attack
140
What Is IP Spoofing Attack
140
What Are the Default ACL Firewall Rules in Prestige
140
How Can I Protect against IP Spoofing Attacks
141
Content Filter FAQ
142
Ipsec FAQ
142
What Are most Common VPN Protocols
143
What Is PPTP
143
What Is L2TP
143
What Is Ipsec
143
What Secure Protocols Does Ipsec Support
144
What Are the Differences between 'Transport Mode' and 'Tunnel Mode
144
What Is Pre-Shared Key
145
What Are the Differences between IKE and Manual Key VPN
145
What Are Local ID and Peer ID
145
When Should I Use FQDN
146
Is My Prestige Ready for Ipsec VPN
146
How Do I Configure Prestige VPN
146
How Many VPN Connections Does Prestige Support
146
What VPN Protocols Are Supported by Prestige
147
What Types of Encryption Does Prestige VPN Support
147
What Types of Authentication Does Prestige VPN Support
147
I am Planning My Prestige-To-Prestige VPN Configuration. What Do I Need to Know
147
Does Prestige Support Dynamic Secure Gateway IP
148
What VPN Gateway that Has Been Tested with Prestige Successfully
148
What VPN Software that Has Been Tested with Prestige Successfully
148
Will Zyxel Support Secure Remote Management
149
Does Prestige VPN Support Netbios Broadcast
149
Is the Host Behind NAT Allowed to Use Ipsec
149
Where Can I Configure Phase 1 ID in Prestige
149
If I Have NAT Router between Two VPN Gateways, and I Would Like to Use IP Type as Phase 1 ID, What Should I Know
150
How Can I Keep a Tunnel Alive
151
Single, Range, Subnet, Which Types of IP Address Do Prestige 10/10II/10W/50/100 Support in Vpn/Ipsec
151
Can Prestige Support Ipsec Passthrough
151
Can Prestige Behave as a NAT Router Supporting Ipsec Passthrough and an Ipsec Gateway Simultaneously
152
Wireless FAQ
152
What Is a Wireless LAN
152
What Are the Advantages of Wireless Lans
152
What Are the Disadvantages of Wireless Lans
153
Where Can You Find Wireless 802.11 Networks
153
What Is an Access Point
153
What Is IEEE 802.11
153
What Is 802.11B
154
How Fast Is 802.11B
154
What Is 802.11A
154
What Is 802.11G
154
Is It Possible to Use Products from a Variety of Vendors
154
What Is Wi-Fi
155
What Types of Devices Use the 2.4Ghz Band
155
Does the 802.11 Interfere with Bluetooth Devices
155
Can Radio Signals Pass through Walls
155
What Are Potential Factors that May Causes Interference Among WLAN Products
155
What's the Difference between a WLAN and a WWAN
156
What Is Infrastructure Mode
156
How Many Access Points Are Required in a Given Area
156
What Is Direct-Sequence Spread Spectrum Technology – (DSSS)
156
What Is Frequency-Hopping Spread Spectrum Technology – (FHSS)
157
Do I Need the same Kind of Antenna on both Sides of a Link
157
Why the 2.4 Ghz Frequency Range
157
What Is Server Set ID (SSID)
157
What Is an ESSID
157
How Do I Secure the Data Across an Access Point's Radio Link
158
What Is the Difference between 40-Bit and 64-Bit WEP
158
A WEP Key Is a User Defined String of Characters Used to Encrypt and Decrypt Data
158
Can the SSID be Encrypted
158
By Turning off the Broadcast of SSID, Can Someone Still Sniff the SSID
159
What Are Insertion Attacks
159
What Is Wireless Sniffer
159
What Is the Difference between Open System and Shared Key of Authentication Type
159
What Is 802.1X
159
What Is RADIUS
160
What Is the Difference between no Authentication Required, no Access Allowed and Authentication Required
160
What Is WPA-PSK
161
ZyXEL Communications P-2802HWL-I3 Quick Start Manual (16 pages)
802.11g Wireless VDSL VoIP IAD
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 2.3 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
4
Initial Configuration
6
Connection Wizard
7
STEP 1: Internet Configuration
8
STEP 2: Wireless LAN
10
Setting up a Wireless Network
11
Making Phone Calls
13
Troubleshooting
14
Advertisement
ZyXEL Communications P-2802HWL-I3 Specifications (2 pages)
p-2802hw-i series 802.11g Wireless VDSL2 VoIP IAD
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 0.42 MB
ZyXEL Communications P-2802HWL-I3 Declaration Of Conformity (2 pages)
802.11g Wireless VDSL2+ VoIP IAD
Brand:
ZyXEL Communications
| Category:
VoIP
| Size: 0.04 MB
Advertisement
Related Products
ZyXEL Communications P-2802HW-I1
ZyXEL Communications P-2802HW-I3
ZyXEL Communications Prestige P-2802HWL-I1
ZyXEL Communications P-2802H-I1
ZyXEL Communications P-2802H-I3
ZyXEL Communications P-2802HL-I1
ZyXEL Communications P-2802HL-I3
ZyXEL Communications P-2802HW-I
ZyXEL Communications P-2802H-I Series
ZyXEL Communications P-2802L-I Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL