Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660H-T3
ZyXEL Communications P-660H-T3 Manuals
Manuals and User Guides for ZyXEL Communications P-660H-T3. We have
4
ZyXEL Communications P-660H-T3 manuals available for free PDF download: User Manual, Support Notes, Specifications
ZyXEL Communications P-660H-T3 User Manual (460 pages)
802.11g Wireless ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 18.21 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
List of Figures
25
List of Tables
33
Preface
39
User Guide Feedback
40
Introduction to DSL
41
Chapter 1 Getting to Know Your Prestige
43
Introducing the Prestige
43
Table 1 ADSL Standards
43
Features of the Prestige
44
Traffic Redirect
45
Adsl Standards
46
Dynamic Dns Support
46
Protocol Support
46
Network Management
47
P-660HW Wireless Features
48
Networking Compatibility
47
Applications for the Prestige
49
Internet Access
49
Figure 1 Prestige Internet Access Application
49
Figure 2 Firewall Application
50
Figure 3 Prestige LAN-To-LAN Application
50
Figure 4 P-660H Front Panel
50
Firewall for Secure Broadband Internet Access
50
LAN to LAN Application
50
Front Panel Leds
50
Figure 5 P-660HW Front Panel
51
Table 2 Front Panel Leds
51
Chapter 2 Introducing the Web Configurator
53
Web Configurator Overview
53
Accessing the Prestige Web Configurator
53
Resetting the Prestige
54
Using the Reset Button
54
Figure 6 Password Screen
54
Figure 7 Change Password at Login
54
Navigating the Prestige Web Configurator
55
Figure 8 Web Configurator: Site Map Screen
55
Table 3 Web Configurator Screens Summary
56
Chapter 3 Wizard Setup for Internet Access
59
Introduction to Internet Access Wizard
59
Internet Access Wizard Setup
59
Figure 9 Internet Access Wizard Setup: First Screen
60
Table 4 Internet Access Wizard Setup: First Screen
60
Figure 10 Internet Connection with Pppoe
61
Table 5 Internet Connection with Pppoe
61
Figure 11 Internet Connection with RFC 1483
62
Figure 12 Internet Connection with ENET ENCAP
62
Table 6 Internet Connection with RFC 1483
62
Figure 13 Internet Connection with Pppoa
63
Table 7 Internet Connection with ENET ENCAP
63
Table 8 Internet Connection with Pppoa
64
Figure 14 Internet Access Wizard Setup: Third Screen
65
Figure 15 Internet Access Wizard Setup: LAN Configuration
65
Figure 16 Internet Access Wizard Setup: Connection Tests
66
Table 9 Internet Access Wizard Setup: LAN Configuration
66
Chapter 4 Wizard Setup for Media Bandwidth Management
67
Introduction to Media Bandwidth Management
67
Predefined Media Bandwidth Management Services
67
Table 10 Media Bandwidth Mgnt. Wizard Setup: Services
67
Media Bandwidth Management Setup
68
Figure 17 Media Bandwidth Mgnt. Wizard Setup: First Screen
68
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen
69
Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish
70
Chapter 5 Password Setup
71
Password Overview
71
Configuring Password
71
Figure 20 Password
71
Table 13 Password
71
Chapter 6 LAN Setup
73
LAN Overview
73
Lans, Wans and the Prestige
73
Figure 21 LAN and WAN IP Addresses
73
Table 14 LAN Setup
73
DNS Server Address
74
DNS Server Address Assignment
74
Lan Tcp/Ip
75
Factory LAN Defaults
75
IP Address and Subnet Mask
75
RIP Setup
76
Multicast
76
Any IP
77
How any IP Works
77
Figure 22 any IP Example
77
Configuring LAN
78
Figure 23 LAN Setup
79
Configuring Static DHCP
80
Figure 24 LAN: Static DHCP
81
Table 15 LAN: Static DHCP
81
Chapter 7 Wireless LAN (Prestige 660HW)
83
Introduction
83
Wireless Security Overview
83
Encryption
83
Authentication
83
Restricted Access
84
Hide Prestige Identity
84
G-Plus
84
Configuring Wireless LAN on the Prestige
84
Configuring the Wireless Screen
85
WEP Encryption
85
Figure 25 Wireless Security Methods
85
Figure 26 Wireless Screen
86
Configuring MAC Filters
88
Figure 27 MAC Address Filter
89
Table 17 MAC Address Filter
89
Introduction to WPA
90
WPA-PSK Application Example
90
WPA with RADIUS Application Example
91
Figure 28 WPA - PSK Authentication
91
Wireless Client WPA Supplicants
92
Configuring IEEE 802.1X and WPA
92
Figure 29 WPA with RADIUS Application Example2
92
Authentication Required: 802.1X
93
Figure 30 Wireless LAN: 802.1X/Wpa: no Authentication
93
Table 18 Wireless LAN: 802.1X/Wpa: no Access/Authentication
93
Figure 31 Wireless LAN: 802.1X/Wpa: 802.1Xl
94
Table 19 Wireless LAN: 802.1X/Wpa: 802.1X
94
Authentication Required: WPA
95
Figure 32 Wireless LAN: 802.1X/Wpa: Wpal
96
Table 20 Wireless LAN: 802.1X/Wpa: Wpal
96
Authentication Required: WPA-PSK
97
Figure 33 Wireless LAN: 802.1X/Wpa:wpa-Pskl
97
Table 21 Wireless LAN: 802.1X/Wpa: Wpal-PSK
97
Configuring Local User Authentication
98
Figure 34 Local User Database
98
Table 22 Local User Database
98
Configuring RADIUS
99
Figure 35 RADIUS
99
Table 23 RADIUS
99
Introduction to OTIST
100
Enabling OTIST
100
Figure 36 OTIST
101
Reset Button
101
Table 24 OTIST
101
Web Configurator
101
Wireless Client
102
Starting OTIST
102
Figure 37 Example Wireless Client OTIST Screen
102
Figure 38 Security Key
102
Figure 39 OTIST in Progress (Prestige)
102
Figure 40 OTIST in Progress (Client)
102
Notes on OTIST
103
Figure 41 no AP with OTIST Found
103
Figure 42 Start OTIST
103
Chapter 8 WAN Setup
105
WAN Overview
105
Metric
105
Pppoe Encapsulation
106
Traffic Shaping
106
Zero Configuration Internet Access
107
Configuring WAN Setup
107
Figure 43 Example of Traffic Shaping
107
Figure 44 WAN Setup (Pppoe)
108
Table 25 WAN Setup
108
Traffic Redirect
110
Configuring WAN Backup
111
Figure 45 Traffic Redirect Example
111
Figure 46 Traffic Redirect LAN Setup
111
Figure 47 WAN Backup
112
Table 26 WAN Backup
112
Chapter 9 Network Address Translation (NAT) Screens
115
NAT Overview
115
NAT Definitions
115
Table 27 NAT Definitions
115
What NAT Does
116
How NAT Works
116
NAT Application
117
Figure 48 How NAT Works
117
Figure 49 NAT Application with IP Alias
117
NAT Mapping Types
118
Table 28 NAT Mapping Types
118
SUA (Single User Account) Versus NAT
119
SUA Server
119
Default Server IP Address
119
Port Forwarding: Services and Port Numbers
119
Table 29 Services and Port Numbers
119
Configuring Servers Behind SUA (Example)
120
Sip Alg
120
Figure 50 Multiple Servers Behind NAT Example
120
Selecting the NAT Mode
121
Configuring SUA Server
121
Figure 51 NAT Mode
121
Table 30 NAT Mode
121
Figure 52 Edit SUA/NAT Server Set
122
Table 31 Edit SUA/NAT Server Set
122
Configuring Address Mapping
123
Figure 53 Address Mapping Rules
123
Table 32 Address Mapping Rules
123
Editing an Address Mapping Rule
124
Figure 54 Address Mapping Rule Edit
124
Table 33 Address Mapping Rule Edit
125
Chapter 10 Dynamic DNS Setup
127
Dynamic DNS
127
DYNDNS Wildcard
127
Configuring Dynamic DNS
127
Figure 55 Dynamic DNS
128
Table 34 Dynamic DNS
128
Chapter 11 Time and Date
129
Configuring Time and Date
129
Figure 56 Time and Date
129
Table 35 Time and Date
130
Chapter 12 Firewalls
131
Firewall Overview
131
Types of Firewalls
131
Packet Filtering Firewalls
131
Application-Level Firewalls
131
Stateful Inspection Firewalls
132
Introduction to Zyxel's Firewall
132
Denial of Service Attacks
133
Denial of Service
133
Basics
133
Figure 57 Prestige Firewall Application
133
Types of Dos Attacks
134
Figure 58 Three-Way Handshake
134
Table 36 Common IP Ports
134
Figure 59 SYN Flood
135
Figure 60 Smurf Attack
136
ICMP Vulnerability
136
Illegal Commands (Netbios and SMTP)
136
Table 37 ICMP Commands that Trigger Alerts
136
Table 38 Legal Netbios Commands
136
Traceroute
137
Stateful Inspection
137
Table 39 Legal SMTP Commands
137
Figure 61 Stateful Inspection
138
Stateful Inspection Process
138
Stateful Inspection and the Prestige
139
TCP Security
139
UDP/ICMP Security
140
Upper Layer Protocols
140
Guidelines for Enhancing Security with Your Firewall
140
Security in General
141
Packet Filtering Vs Firewall
142
Packet Filtering
142
When to Use Filtering
142
Firewall
142
When to Use the Firewall
142
Chapter 13 Firewall Configuration
145
Access Methods
145
Firewall Policies Overview
145
Rule Logic Overview
146
Rule Checklist
146
Security Ramifications
146
Key Fields for Configuring Rules
147
Action
147
Service
147
Source Address
147
Destination Address
147
Connection Direction Example
147
LAN to WAN Rules
148
WAN to LAN Rules
148
Figure 62 LAN to WAN Traffic
148
Figure 63 WAN to LAN Traffic
148
Alerts
149
Configuring Basic Firewall Settings
149
Figure 64 Firewall: Default Policy
149
Table 40 Firewall: Default Policy
149
Rule Summary
150
Figure 65 Firewall: Rule Summary
150
Table 41 Rule Summary
151
Configuring Firewall Rules
152
Figure 66 Firewall: Edit Rule
153
Table 42 Firewall: Edit Rule
154
Customized Services
155
Creating/Editing a Customized Service
155
Figure 67 Firewall: Customized Services
155
Table 43 Customized Services
155
Example Firewall Rule
156
Figure 68 Firewall: Configure Customized Services
156
Table 44 Firewall: Configure Customized Services
156
Figure 69 Firewall Example: Rule Summary
157
Figure 70 Firewall Example: Edit Rule: Destination Address
158
Figure 71 Edit Custom Port Example
158
Figure 72 Firewall Example: Edit Rule: Select Customized Services
159
Predefined Services
160
Figure 73 Firewall Example: Rule Summary: My Service
160
Table 45 Predefined Services
160
Anti-Probing
162
Configuring Attack Alert
163
Figure 74 Firewall: Anti Probing
163
Table 46 Firewall: Anti Probing
163
Half-Open Sessions
164
TCP Maximum Incomplete and Blocking Time
164
Figure 75 Firewall: Threshold
165
Table 47 Firewall: Threshold
165
Threshold Values
164
Chapter 14 Content Filtering
167
Content Filtering Overview
167
Configuring Keyword Blocking
167
Figure 76 Content Filter: Keyword
167
Configuring the Schedule
168
Figure 77 Content Filter: Schedule
168
Table 48 Content Filter: Keyword
168
Configuring Trusted Computers
169
Figure 78 Content Filter: Trusted
169
Table 49 Content Filter: Schedule
169
Table 50 Content Filter: Trusted
169
Chapter 15 Remote Management Configuration
171
Remote Management Overview
171
Remote Management Limitations
171
Remote Management and NAT
172
System Timeout
172
Telnet
172
Ftp
172
Figure 79 Telnet Configuration on a TCP/IP Network
172
Web
173
Configuring Remote Management
173
Figure 80 Remote Management
173
Table 51 Remote Management
173
Chapter 16 Universal Plug-And-Play (Upnp)
175
Introducing Universal Plug and Play
175
How Do I Know if I'M Using Upnp
175
NAT Traversal
175
Cautions with Upnp
175
Upnp and Zyxel
176
Configuring Upnp
176
Figure 81 Configuring Upnp
176
Installing Upnp in Windows Example
177
Table 52 Configuring Upnp
177
Figure 82 Add/Remove Programs: Windows Setup: Communication
178
Figure 83 Add/Remove Programs: Windows Setup: Communication: Components
178
Figure 84 Network Connections
179
Figure 85 Windows Optional Networking Components Wizard
180
Using Upnp in Windows XP Example
181
Figure 86 Networking Services
181
Figure 87 Network Connections
182
Figure 88 Internet Connection Properties
183
Figure 89 Internet Connection Properties: Advanced Settings
184
Figure 90 Internet Connection Properties: Advanced Settings: Add
184
Figure 91 System Tray Icon
185
Figure 92 Internet Connection Status
185
Figure 93 Network Connections
186
Figure 94 Network Connections: My Network Places
187
Figure 95 Network Connections: My Network Places: Properties: Example
187
Chapter 17 Logs Screens
189
Logs Overview
189
Alerts and Logs
189
Configuring Log Settings
189
Figure 96 Log Settings
190
Table 53 Log Settings
190
Displaying the Logs
191
SMTP Error Messages
192
Figure 97 View Logs
192
Table 54 View Logs
192
Table 55 SMTP Error Messages
192
Example E-Mail Log
193
Figure 98 E-Mail Log Example
193
Chapter 18 Media Bandwidth Management Advanced Setup
195
Bandwidth Management Advanced Setup Overview
195
Bandwidth Classes and Filters
195
Proportional Bandwidth Allocation
196
Bandwidth Management Usage Examples
196
Application-Based Bandwidth Management Example
196
Subnet-Based Bandwidth Management Example
196
Figure 99 Application-Based Bandwidth Management Example
196
Application and Subnet-Based Bandwidth Management Example
197
Figure 100 Subnet-Based Bandwidth Management Example
197
Figure 101 Application and Subnet-Based Bandwidth Management Example
197
Table 56 Application and Subnet-Based Bandwidth Management Example
197
Scheduler
198
Priority-Based Scheduler
198
Fairness-Based Scheduler
198
Maximize Bandwidth Usage
198
Reserving Bandwidth for Non-Bandwidth Class Traffic
198
Maximize Bandwidth Usage Example
199
Figure 102 Bandwidth Allotment Example
199
Bandwidth Borrowing
200
Bandwidth Borrowing Example
200
Figure 103 Maximize Bandwidth Usage Example
200
Maximize Bandwidth Usage with Bandwidth Borrowing
201
Configuring Summary
201
Figure 104 Bandwidth Borrowing Example
201
Figure 105 Media Bandwidth Management: Summary
202
Table 57 Media Bandwidth Management: Summary
202
Configuring Class Setup
203
Figure 106 Media Bandwidth Management: Class Setup
203
Table 58 Media Bandwidth Management: Class Setup
203
Diffserv
204
DSCP and Per-Hop Behavior
204
Figure 107 Diffserv: Differentiated Service Field
204
Media Bandwidth Management Class Configuration
204
Figure 108 Media Bandwidth Management: Class Configuration
205
Table 59 Media Bandwidth Management: Class Configuration
205
Media Bandwidth Management Statistics
207
Table 60 Services and Port Numbers
207
Bandwidth Monitor
208
Figure 109 Media Bandwidth Management Statistics
208
Table 61 Media Bandwidth Management Statistics
208
Figure 110 Media Bandwidth Management: Monitor
209
Table 62 Media Bandwidth Management: Monitor
209
Chapter 19 Maintenance
211
Maintenance Overview
211
System Status Screen
211
Figure 111 System Status
212
Table 63 System Status
212
System Statistics
213
Figure 112 System Status: Show Statistics
214
Table 64 System Status: Show Statistics
214
DHCP Table Screen
215
Figure 113 DHCP Table
215
Table 65 DHCP Table
215
Any IP Table Screen
216
Wireless Screen
216
Association List
216
Figure 114 any IP Table
216
Table 66 any IP Table
216
Diagnostic Screens
217
Diagnostic General Screen
217
Figure 115 Association List
217
Table 67 Association List
217
Diagnostic DSL Line Screen
218
Figure 116 Diagnostic: General
218
Table 68 Diagnostic: General
218
Figure 117 Diagnostic: DSL Line
219
Table 69 Diagnostic: DSL Line
219
Firmware Screen
220
Figure 118 Firmware Upgrade
220
Table 70 Firmware Upgrade
220
Figure 119 Network Temporarily Disconnected
221
Figure 120 Error Message
221
Chapter 20 Introducing the SMT
223
SMT Introduction
223
Procedure for SMT Configuration Via Telnet
223
Entering Password
223
Prestige SMT Menu Overview
224
Navigating the SMT Interface
224
Figure 121 Login Screen
224
Figure 122 Prestige SMT Menu Overview
224
Table 71 Navigating the SMT Interface
225
Table 72 SMT Main Menu
225
System Management Terminal Interface Summary
226
Changing the System Password
226
Table 73 Main Menu Summary
226
Figure 123 Menu 23.1 Change Password
227
Chapter 21 Menu 1 General Setup
229
General Setup
229
Procedure to Configure Menu 1
229
Procedure to Configure Dynamic DNS
230
Figure 124 Menu 1 General Setup
230
Table 74 Menu 1 General Setup
230
Figure 125 Menu 1.1 Configure Dynamic DNS
231
Table 75 Menu 1.1 Configure Dynamic DNS
231
Chapter 22 Menu 2 WAN Backup Setup
233
Introduction to WAN Backup Setup
233
Configuring Dial Backup in Menu 2
233
Figure 126 Menu 2 WAN Backup Setup
233
Figure 127 Menu 2.1Traffic Redirect Setup
234
Table 76 Menu 2 WAN Backup Setup
234
Table 77 Menu 2.1Traffic Redirect Setup
234
Traffic Redirect Setup
234
Chapter 23 Menu 3 LAN Setup
237
LAN Setup
237
General Ethernet Setup
237
Figure 128 Menu 3 LAN Setup
237
Figure 129 Menu 3.1 LAN Port Filter Setup
237
Protocol Dependent Ethernet Setup
238
CP/IP Ethernet Setup and DHCP
238
Figure 130 Menu 3.2 TCP/IP and DHCP Ethernet Setup
238
Table 78 DHCP Ethernet Setup
239
Table 79 TCP/IP Ethernet Setup
239
Chapter 24 Wireless LAN Setup
241
Wireless LAN Overview
241
Wireless LAN Setup
241
Figure 131 Menu 3.5 - Wireless LAN Setup
241
Table 80 Menu 3.5 - Wireless LAN Setup
241
Wireless LAN MAC Address Filter
242
Figure 132 Menu 3.5.1 WLAN MAC Address Filtering
243
Table 81 Menu 3.5.1 WLAN MAC Address Filtering
243
Chapter 25 Internet Access
245
Internet Access Overview
245
IP Policies
245
IP Alias
245
IP Alias Setup
246
Figure 133 IP Alias Network Example
246
Figure 134 Menu 3.2 TCP/IP and DHCP Setup
246
Route IP Setup
247
Figure 135 Menu 3.2.1 IP Alias Setup
247
Table 82 Menu 3.2.1 IP Alias Setup
247
Internet Access Configuration
248
Figure 136 Menu 1 General Setup
248
Figure 137 Menu 4 Internet Access Setup
248
Table 83 Menu 4 Internet Access Setup
249
Chapter 26 Remote Node Configuration
251
Remote Node Setup Overview
251
Remote Node Setup
251
Remote Node Profile
251
Encapsulation and Multiplexing Scenarios
252
Scenario 1: One VC, Multiple Protocols
252
Scenario 2: One VC, One Protocol (IP)
252
Scenario 3: Multiple Vcs
252
Figure 138 Menu 11 Remote Node Setup
252
Figure 139 Menu 11.1 Remote Node Profile
253
Table 84 Menu 11.1 Remote Node Profile
253
Outgoing Authentication Protocol
254
Remote Node Network Layer Options
255
Figure 140 Menu 11.3 Remote Node Network Layer Options
255
Table 85 Menu 11.3 Remote Node Network Layer Options
255
My WAN Addr Sample IP Addresses
256
Remote Node Filter
257
Figure 141 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
257
Figure 142 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
257
Editing ATM Layer Options
258
VC-Based Multiplexing (Non-PPP Encapsulation)
258
LLC-Based Multiplexing or PPP Encapsulation
258
Figure 143 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
258
Figure 144 Menu 11.6 for VC-Based Multiplexing
258
Advance Setup Options
259
Figure 145 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
259
Figure 146 Menu 11.1 Remote Node Profile
259
Figure 147 Menu 11.8 Advance Setup Options
260
Table 86 Menu 11.8 Advance Setup Options
260
Chapter 27 Static Route Setup
261
IP Static Route Overview
261
Configuration
261
Figure 148 Sample Static Routing Topology
261
Figure 149 Menu 12 Static Route Setup
262
Figure 150 Menu 12.1 IP Static Route Setup
262
Figure 151 Menu12.1.1 Edit IP Static Route
262
Table 87 Menu12.1.1 Edit IP Static Route
263
Chapter 28 Bridging Setup
265
Bridging in General
265
Bridge Ethernet Setup
265
Remote Node Bridging Setup
265
Figure 152 Menu 11.1 Remote Node Profile
266
Figure 153 Menu 11.3 Remote Node Network Layer Options
266
Table 88 Remote Node Network Layer Options: Bridge Fields
266
Bridge Static Route Setup
267
Figure 154 Menu 12.3.1 Edit Bridge Static Route
267
Table 89 Menu 12.3.1 Edit Bridge Static Route
267
Network Address Translation (NAT)
269
Chapter 29 Network Address Translation (NAT)
269
Using NAT
269
SUA (Single User Account) Versus NAT
269
Applying NAT
269
Figure 155 Menu 4 Applying NAT for Internet Access
270
Figure 156 Applying NAT in Menus 4 & 11.3
270
NAT Setup
271
Address Mapping Sets
271
Figure 157 Menu 15 NAT Setup
271
Table 90 Applying NAT in Menus 4 & 11.3
271
Figure 158 Menu 15.1 Address Mapping Sets
272
Figure 159 Menu 15.1.255 SUA Address Mapping Rules
272
SUA Address Mapping Set
272
Table 91 SUA Address Mapping Rules
272
Figure 160 Menu 15.1.1 First Set
273
User-Defined Address Mapping Sets
273
Figure 161 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
274
Ordering Your Rules
274
Table 92 Menu 15.1.1 First Set
274
Configuring a Server Behind NAT
275
Figure 162 Menu 15.2 NAT Server Setup
275
Table 93 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
275
General NAT Examples
276
Figure 163 Menu 15.2.1 NAT Server Setup
276
Figure 164 Multiple Servers Behind NAT Example
276
Example 1: Internet Access Only
277
Example 2: Internet Access with an Inside Server
277
Figure 165 NAT Example 1
277
Figure 166 Menu 4 Internet Access & NAT Example
277
Example 3: Multiple Public IP Addresses with Inside Servers
278
Figure 167 NAT Example 2
278
Figure 168 Menu 15.2.1 Specifying an Inside Server
278
Figure 169 NAT Example 3
279
Figure 170 Example 3: Menu 11.3
280
Figure 171 Example 3: Menu 15.1.1.1
280
Figure 172 Example 3: Final Menu 15.1.1
281
Figure 173 Example 3: Menu 15.2.1
281
Example 4: NAT Unfriendly Application Programs
282
Figure 174 NAT Example 4
282
Figure 175 Example 4: Menu 15.1.1.1 Address Mapping Rule
282
Figure 176 Example 4: Menu 15.1.1 Address Mapping Rules
283
Chapter 30 Enabling the Firewall
285
Remote Management and the Firewall
285
Access Methods
285
Enabling the Firewall
285
Figure 177 Menu 21.2 Firewall Setup
286
Chapter 31 Filter Configuration
287
About Filtering
287
Figure 178 Outgoing Packet Filtering Process
287
Figure 179 Filter Rule Process
288
The Filter Structure of the Prestige
288
Configuring a Filter Set for the Prestige
289
Figure 180 Menu 21 Filter Set Configuration
289
Figure 181 Netbios_Wan Filter Rules Summary
289
Filter Rules Summary Menus
290
Figure 182 Netbios_Lan Filter Rules Summary
290
Figure 183 IGMP Filter Rules Summary
290
Table 94 Abbreviations Used in the Filter Rules Summary Menu
290
Configuring a Filter Rule
291
Table 95 Rule Abbreviations Used
291
Figure 184 Menu 21.1.X.1 TCP/IP Filter Rule
292
Table 96 Menu 21.1.X.1 TCP/IP Filter Rule
292
TCP/IP Filter Rule
292
Figure 185 Executing an IP Filter
294
Generic Filter Rule
294
Figure 186 Menu 21.1.5.1 Generic Filter Rule
295
Table 97 Menu 21.1.5.1 Generic Filter Rule
295
Filter Types and NAT
296
Example Filter
296
Figure 187 Protocol and Device Filter Sets
296
Figure 188 Sample Telnet Filter
297
Figure 189 Menu 21.1.6.1 Sample Filter
297
Applying Filters and Factory Defaults
298
Figure 190 Menu 21.1.6.1 Sample Filter Rules Summary
298
Table 98 Filter Sets Table
298
Ethernet Traffic
299
Figure 191 Filtering Ethernet Traffic
299
Figure 192 Filtering Remote Node Traffic
299
Remote Node Filters
299
Chapter 32 SNMP Configuration
301
About SNMP
301
Figure 193 SNMP Management Model
301
Supported Mibs
302
SNMP Configuration
302
SNMP Traps
303
Figure 194 Menu 22 SNMP Configuration
303
Table 99 Menu 22 SNMP Configuration
303
Table 100 SNMP Traps
303
Table 101 Ports and Permanent Virtual Circuits
304
Chapter 33 System Security
305
System Security
305
System Password
305
Configuring External RADIUS Server
305
Figure 195 Menu 23 - System Security
305
Figure 196 Menu 23.2 System Security: RADIUS Server
306
Table 102 Menu 23.2 System Security: RADIUS Server
306
Ieee802.1X
307
Figure 197 Menu 23 System Security
307
Figure 198 Menu 23.4 System Security: Ieee802.1X
307
Table 103 Menu 23.4 System Security : Ieee802.1X
308
Creating User Accounts on the Prestige
309
Figure 199 Menu 14 Dial-In User Setup
310
Figure 200 Menu 14.1 Edit Dial-In User
310
Table 104 Menu 14.1 Edit Dial-In User
310
Chapter 34 System Information and Diagnosis
311
Overview
311
System Status
311
Figure 201 Menu 24 System Maintenance
311
Figure 202 Menu 24.1 System Maintenance : Status
312
Table 105 Menu 24.1 System Maintenance : Status
312
System Information
313
Figure 203 Menu 24.2 System Information and Console Port Speed
313
Console Port Speed
314
Figure 204 Menu 24.2.1 System Maintenance: Information
314
Table 106 Menu 24.2.1 System Maintenance: Information
314
Log and Trace
315
Viewing Error Log
315
Figure 205 Menu 24.2.2 System Maintenance : Change Console Port Speed
315
Figure 206 Menu 24.3 System Maintenance: Log and Trace
315
Syslog and Accounting
316
Figure 207 Sample Error and Information Messages
316
Figure 208 Menu 24.3.2 System Maintenance: Syslog and Accounting
316
Table 107 Menu 24.3.2 System Maintenance : Syslog and Accounting
316
Figure 209 Syslog Example
317
Diagnostic
318
Figure 210 Menu 24.4 System Maintenance : Diagnostic
318
Table 108 Menu 24.4 System Maintenance Menu: Diagnostic
319
Chapter 35 Firmware and Configuration File Maintenance
321
Filename Conventions
321
Backup Configuration
322
Table 109 Filename Conventions
322
Example of FTP Commands from the Command Line
323
Figure 211 Telnet in Menu 24.5
323
Using the FTP Command from the Command Line
323
Figure 212 FTP Session Example
324
GUI-Based FTP Clients
324
Table 110 General Commands for GUI-Based FTP Clients
324
TFTP and FTP over WAN Management Limitations
324
Backup Configuration Using TFTP
325
GUI-Based TFTP Clients
325
TFTP Command Example
325
Restore Configuration
326
Restore Using FTP
326
Table 111 General Commands for GUI-Based TFTP Clients
326
Restore Using FTP Session Example
327
Figure 213 Telnet into Menu 24.6
327
Figure 214 Restore Using FTP Session Example
327
Uploading Firmware and Configuration Files
328
Firmware File Upload
328
Configuration File Upload
328
Figure 215 Telnet into Menu 24.7.1 Upload System Firmware
328
FTP File Upload Command from the DOS Prompt Example
329
Figure 216 Telnet into Menu 24.7.2 System Maintenance
329
FTP Session Example of Firmware File Upload
330
TFTP File Upload
330
Figure 217 FTP Session Example of Firmware File Upload
330
TFTP Upload Command Example
331
Chapter 36 System Maintenance
333
Command Interpreter Mode
333
Figure 218 Command Mode in Menu 24
333
Figure 219 Valid Commands
333
Call Control Support
334
Budget Management
334
Figure 220 Menu 24.9 System Maintenance: Call Control
334
Figure 221 Menu 24.9.1 System Maintenance: Budget Management
334
Time and Date Setting
335
Figure 222 Menu 24 System Maintenance
335
Table 112 Menu 24.9.1 System Maintenance : Budget Management
335
Figure 223 Menu 24.10 System Maintenance: Time and Date Setting
336
Resetting the Time
336
Table 113 Menu 24.10 System Maintenance: Time and Date Setting
336
Chapter 37 Remote Management
339
Remote Management Overview
339
Remote Management
339
Remote Management Setup
339
Remote Management Limitations
340
Figure 224 Menu 24.11 Remote Management Control
340
Table 114 Menu 24.11 Remote Management Control
340
Remote Management and NAT
341
System Timeout
341
Chapter 38 IP Policy Routing
343
IP Policy Routing Overview
343
Benefits of IP Policy Routing
343
Routing Policy
343
IP Routing Policy Setup
344
Figure 225 Menu 25 IP Routing Policy Setup
344
Figure 226 Menu 25.1 IP Routing Policy Setup
345
Table 115 Menu 25.1 IP Routing Policy Setup
345
Figure 227 Menu 25.1.1 IP Routing Policy
346
Table 116 Menu 25.1.1 IP Routing Policy
346
Applying an IP Policy
347
Ethernet IP Policies
347
IP Policy Routing Example
348
Figure 228 Menu 3.2 TCP/IP and DHCP Ethernet Setup
348
Figure 229 Menu 11.3 Remote Node Network Layer Options
348
Figure 230 Example of IP Policy Routing
349
Figure 231 IP Routing Policy Example
350
Figure 232 IP Routing Policy Example
351
Figure 233 Applying IP Policies Example
351
Chapter 39 Call Scheduling
353
Introduction
353
Figure 234 Menu 26 Schedule Setup
353
Figure 235 Menu 26.1 Schedule Set Setup
354
Table 117 Menu 26.1 Schedule Set Setup
354
Figure 236 Applying Schedule Set(S) to a Remote Node (Pppoe)
355
Chapter 40 Internal SPTGEN
357
Internal SPTGEN Overview
357
The Configuration Text File Format
357
Figure 237 Configuration Text File Format: Column Descriptions
357
Internal SPTGEN File Modification - Important Points to Remember
358
Internal SPTGEN FTP Download Example
358
Figure 238 Invalid Parameter Entered: Command Line Example
358
Figure 239 Valid Parameter Entered: Command Line Example
358
Internal SPTGEN FTP Upload Example
359
Figure 240 Internal SPTGEN FTP Download Example
359
Figure 241 Internal SPTGEN FTP Upload Example
359
Advertisement
ZyXEL Communications P-660H-T3 Support Notes (203 pages)
Brand:
ZyXEL Communications
| Category:
Modem
| Size: 3.42 MB
Table of Contents
Table of Contents
2
Index
6
Zynos FAQ
6
What Is Zynos
6
How Do I Access the Prestige SMT Menu
6
What Is the Default Console Port Baud Rate? Moreover, How Do I Change It
6
How Do I Update the Firmware and Configuration File
6
How Do I Upload the Zynos Firmware Code Via Console
6
How Do I Upgrade/Backup the Zynos Firmware by Using TFTP Client Program Via LAN
7
How Do I Upload ROMFILE Via Console Port
7
How Do I Restore SMT Configurations by Using TFTP Client Program Via LAN
7
What Should I Do if I Forget the System Password
7
How to Use the Reset Button
8
What Is SUA? When Should I Use SUA
8
What Is the Difference between SUA and Multi-NAT
8
Is It Possible to Access a Server Running Behind SUA from the Outside Internet? if Possible, How
9
When Do I Need Multi-NAT
9
What Ip/Port Mapping Does Multi-NAT Support
9
How Many Network Users Can the SUA/NAT Support
10
What Are Device Filters and Protocol Filters
11
Why Can't I Configure Device Filters or Protocol Filters
11
How Can I Protect against IP Spoofing Attacks
11
General FAQ
13
How Can I Manage P-660
13
What Is the Default User Name and Password to Loging Web Configurator
13
How Do I Know the P-660'S WAN IP Address Assigned by the ISP
13
What Is the Micro Filter or Splitter Used for
13
The P-660 Supports Bridge and Router Mode, What's the Difference between Them
13
How Do I Know I am Using Pppoe
14
Why Does My Provider Use Pppoe
14
What Is DDNS
14
When Do I Need DDNS Service
14
What Is DDNS Wildcard? Does the P-660 Support DDNS Wildcard
15
Can the P-660'S SUA Handle Ipsec Packets Sent by the Ipsec Gateway
15
How Do I Setup My P-660 for Routing Ipsec Packets over SUA
15
What Is Traffic Shaping
15
What Do the Parameters (PCR, SCR, MBS) Mean
16
Why Do We Perform Traffic Shaping in the P-660
16
Adsl Faq
17
How Does ADSL Compare to Cable Modems
17
What Is the Expected Throughput
17
What Is the Micro Filter Used for
17
How Do I Know the ADSL Line Is up
17
How Does the P-660 Work on a Noisy ADSL
17
Does the VC-Based Multiplexing Perform Better than the LLC-Based Multiplexing
18
How Do I Know the Details of My ADSL Line Statistics
18
What Are the Possible Reasons When the ADSL Link Is down
18
What Are the Signaling Pins of the ADSL Connector
18
Firewall FAQ (for P-660 H/HW Only)
19
General
19
What Is a Network Firewall
19
What Makes P-660 Secure
19
What Are the Basic Types of Firewalls
19
What Kind of Firewall Is the P-660
20
Why Do You Need a Firewall When Your Router Has Packet Filtering and NAT Built-In
20
What Is Denials of Service (Dos) Attack
20
What Is Ping of Death Attack
21
What Is Teardrop Attack
21
What Is SYN Flood Attack
21
What Is LAND Attack
21
What Is Brute-Force Attack
21
What Is IP Spoofing Attack
22
What Are the Default ACL Firewall Rules in P-660
22
Configuration
22
How Do I Configure the Firewall
22
How Do I Prevent Others from Configuring My Firewall
22
Can I Use a Browser to Configure My P-660
22
Why Can't I Configure My Router Using Telnet over WAN
22
Why Can't I Upload the Firmware and Configuration File Using FTP over WAN
23
Log and Alert
23
When Does the P-660 Generate the Firewall Log
23
What Does the Log Show to Us
24
How Do I View the Firewall Log
24
When Does the P-660 Generate the Firewall Alert
25
What Does the Alert Show to Us
25
What Is the Difference between the Log and Alert
25
General Application Notes
26
Internet Access Using P-660 under Bridge Mode
26
Setup Your Workstation
26
Setup Your P-660 under Bridge Mode
27
Internet Access Using P-660 under Router Mode
29
Set up Your Workstation
29
Set up Your P-660
30
Setup the P-660 as a DHCP Relay
32
SUA Notes
33
Tested SUA/NAT Applications
33
Configure an Internal Server Behind SUA
37
Configure a PPTP Server Behind SUA
38
Using Multi-NAT
42
What Is Multi-NAT
42
NAT Mapping Types
43
SUA Versus NAT
44
SMT Menus
45
NAT Server Sets
51
About Filter & Filter Examples
61
How Does Zyxel Filter Work
61
Filter Examples
66
Using the Dynamic DNS (DDNS)
81
Network Management Using SNMP
83
Snmp Overview
83
Using Syslog
89
Setup
89
UNIX Setup
90
Zyxel Syslog Message Format
90
Using IP Alias
93
Using IP Policy Routing
95
Using Call Scheduling
100
Using IP Multicast
103
Using Bandwidth Management
105
Using Zero-Configuration
108
Wireless Application Notes (for P-660HW Only)
113
Configure a Wireless Client to Ad Hoc Mode
113
Ad Hoc Introduction
113
Configuration for Wireless Station a
113
Configuration for Wireless Station B
116
Configuring Infrastructure Mode
118
Infrastructure Introduction
118
Configure Wireless Access Point to Infrastructure Mode Using SMT
118
Configure Wireless Access Point to Infrastructure Mode Using Web Configurator
119
Configuration Wireless Station to Infrastructure Mode
120
MAC Filter
122
MAC Filter Overview
122
Zyxel MAC Filter Implementation
122
Configure the WLAN MAC Filter
122
Setup WEP (Wired Equivalent Privacy)
124
Introduction
125
Setting up the Access Point
127
Setting up the Station
130
Site Survey
133
Introduction
133
Preparation
133
Survey on Site
134
Using VPN over Wireless LAN
136
Setup Sentinel
137
Setup Prestige VPN
145
Configure 802.1X and WPA
147
What Is WPA Functionality
147
Configuration for Access Point
148
Configuration for Your PC
149
ZyXEL Communications P-660H-T3 Specifications (2 pages)
P-660H Series ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.2 MB
Advertisement
ZyXEL Communications P-660H-T3 Specifications (2 pages)
ADSL2+ 4-port Gateway p-660h series
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.17 MB
Advertisement
Related Products
ZyXEL Communications P-660H-TX
ZyXEL Communications P-660H-T Series
ZyXEL Communications P-660H-T1 v2
ZyXEL Communications P-660H-T3 v2
ZyXEL Communications P-660H-Tx v2 Series
ZyXEL Communications P-660H-TX V2 - VERSION 3-40
ZyXEL Communications P-660H-T1 v3s
ZyXEL Communications P660HTW3 EE
ZyXEL Communications P-660HW-D1 V2
ZyXEL Communications P-660HW-D3 V2
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL