Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HHW - VERSION 3.40
ZyXEL Communications P-660HHW - VERSION 3.40 Manuals
Manuals and User Guides for ZyXEL Communications P-660HHW - VERSION 3.40. We have
1
ZyXEL Communications P-660HHW - VERSION 3.40 manual available for free PDF download: User Manual
ZyXEL Communications P-660HHW - VERSION 3.40 User Manual (465 pages)
ADSL 2+ gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 12.35 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
10
List of Figures
24
List of Tables
32
Preface
38
User Guide Feedback
39
Introduction to DSL
40
Chapter 1 Getting to Know Your Prestige
42
Introducing the Prestige
42
Features
42
Table 1 ADSL Standards
42
High Speed Internet Access
43
Dynamic Dns Support
44
Wireless Features (P-660HW/P-660W)
45
Applications for the Prestige
46
Protected Internet Access
46
LAN to LAN Application
46
Front Panel Leds
46
Figure 1 Protected Internet Access Applications
46
Figure 2 LAN-To-LAN Application Example
46
Hardware Connection
47
Table 2 Front Panel Leds
47
Chapter 2 Introducing the Web Configurator
48
Web Configurator Overview
48
Accessing the Web Configurator
48
Resetting the Prestige
49
Using the Reset Button
49
Figure 3 Password Screen
49
Figure 4 Change Password at Login
49
Navigating the Web Configurator
50
Figure 5 Web Configurator: Site Map Screen
50
Table 3 Web Configurator Screens Summary
50
Change Login Password
52
Figure 6 Password
52
Table 4 Password
53
Chapter 3 Wizard Setup for Internet Access
54
Introduction
54
Internet Access Wizard Setup
54
Figure 7 Internet Access Wizard Setup: ISP Parameters
54
Figure 8 Internet Connection with Pppoe
55
Table 5 Internet Access Wizard Setup: ISP Parameters
55
Figure 9 Internet Connection with RFC 1483
56
Table 6 Internet Connection with Pppoe
56
Table 7 Internet Connection with RFC 1483
56
Figure 10 Internet Connection with ENET ENCAP
57
Table 8 Internet Connection with ENET ENCAP
57
Figure 11 Internet Connection with Pppoa
58
Table 9 Internet Connection with Pppoa
58
Figure 12 Internet Access Wizard Setup: Third Screen
59
Figure 13 Internet Access Wizard Setup: LAN Configuration
59
Figure 14 Internet Access Wizard Setup: Connection Tests
60
Table 10 Internet Access Wizard Setup: LAN Configuration
60
Chapter 4 LAN Setup
62
LAN Overview
62
Lans, Wans and the Prestige
62
Figure 15 LAN and WAN IP Addresses
62
DHCP Setup
63
IP Pool Setup
63
DNS Server Address
63
DNS Server Address Assignment
63
Lan Tcp/Ip
64
IP Address and Subnet Mask
64
Private IP Addresses
65
RIP Setup
65
Multicast
66
Any IP
66
How any IP Works
67
Figure 16 any IP Example
67
Configuring LAN
68
Figure 17 LAN Setup
68
Table 11 LAN Setup
68
Chapter 5 Wireless LAN
70
Wireless LAN Introduction
70
Wireless Security Overview
70
Encryption
70
Authentication
70
Restricted Access
71
Hide Prestige Identity
71
The Main Wireless LAN Screen
71
Figure 18 Wireless LAN
72
Table 12 Wireless LAN
72
Table 13 Wireless LAN
72
Configuring the Wireless Screen
73
WEP Encryption
73
Figure 19 Wireless Security Methods
73
Figure 20 Wireless Screen
74
Configuring MAC Filters
75
Figure 21 MAC Filter
76
Table 14 MAC Filter
76
Introduction to WPA
77
WPA-PSK Application Example
77
WPA with RADIUS Application Example
78
Figure 22 WPA - PSK Authentication
78
Wireless Client WPA Supplicants
79
Configuring IEEE 802.1X and WPA
79
Figure 23 WPA with RADIUS Application Example2
79
Authentication Required: 802.1X
80
Figure 24 Wireless LAN: 802.1X/Wpa: no Access Allowed
80
Figure 25 Wireless LAN: 802.1X/Wpa: no Authentication
80
No Access Allowed or Authentication
80
Table 15 Wireless LAN: 802.1X/Wpa: no Access/Authentication
80
Figure 26 Wireless LAN: 802.1X/Wpa: 802.1Xl
81
Table 16 Wireless LAN: 802.1X/Wpa: 802.1X
81
Authentication Required: WPA
82
Figure 27 Wireless LAN: 802.1X/Wpa: WPA
83
Table 17 Wireless LAN: 802.1X/Wpa: WPA
83
Authentication Required: WPA-PSK
84
Figure 28 Wireless LAN: 802.1X/Wpa:wpa-PSK
84
Table 18 Wireless LAN: 802.1X/Wpa: WPA-PSK
84
Configuring Local User Authentication
85
Figure 29 Local User Database
86
Table 19 Local User Database
86
Configuring RADIUS
87
Figure 30 RADIUS
87
Table 20 RADIUS
87
Chapter 6 WAN Setup
90
WAN Overview
90
Encapsulation
90
Enet Encap
90
PPP over Ethernet
90
Pppoa
90
Rfc 1483
91
Multiplexing
91
VC-Based Multiplexing
91
LLC-Based Multiplexing
91
VPI and VCI
91
IP Address Assignment
91
IP Assignment with Pppoa or Pppoe Encapsulation
91
IP Assignment with RFC 1483 Encapsulation
92
IP Assignment with ENET ENCAP Encapsulation
92
Nailed-Up Connection (PPP)
92
Nat
92
Metric
92
Pppoe Encapsulation
93
Traffic Shaping
93
Zero Configuration Internet Access
94
Figure 31 Example of Traffic Shaping
94
The Main WAN Screen
95
Configuring WAN Setup
95
Figure 32 WAN
95
Table 21 WAN
95
Figure 33 WAN Setup (Pppoe)
96
Table 22 WAN Setup
96
Traffic Redirect
98
Configuring WAN Backup
99
Figure 34 Traffic Redirect Example
99
Figure 35 Traffic Redirect LAN Setup
99
Figure 36 WAN Backup
100
Table 23 WAN Backup
100
Chapter 7 Network Address Translation (NAT) Screens
102
NAT Overview
102
NAT Definitions
102
Table 24 NAT Definitions
102
What NAT Does
103
How NAT Works
103
NAT Application
104
Figure 37 How NAT Works
104
Figure 38 NAT Application with IP Alias
104
NAT Mapping Types
105
Table 25 NAT Mapping Types
105
SUA (Single User Account) Versus NAT
106
SUA Server
106
Default Server IP Address
106
Port Forwarding: Services and Port Numbers
106
Table 26 Services and Port Numbers
106
Configuring Servers Behind SUA (Example)
107
Selecting the NAT Mode
107
Figure 39 Multiple Servers Behind NAT Example
107
Configuring SUA Server Set
108
Figure 40 NAT Mode
108
Table 27 NAT Mode
108
Figure 41 Edit SUA/NAT Server Set
109
Table 28 Edit SUA/NAT Server Set
109
Configuring Address Mapping Rules
110
Figure 42 Address Mapping Rules
110
Table 29 Address Mapping Rules
110
Editing an Address Mapping Rule
111
Figure 43 Edit Address Mapping Rule
112
Table 30 Edit Address Mapping Rule
112
Chapter 8 Dynamic DNS Setup
114
Dynamic DNS Overview
114
DYNDNS Wildcard
114
Configuring Dynamic DNS
114
Figure 44 Dynamic DNS
115
Table 31 Dynamic DNS
115
Chapter 9 Time and Date
116
Configuring Time and Date
116
Figure 45 Time and Date
116
Table 32 Time and Date
117
Chapter 10 Firewalls
118
Firewall Overview
118
Types of Firewalls
118
Packet Filtering Firewalls
118
Application-Level Firewalls
119
Stateful Inspection Firewalls
119
Introduction to Zyxel's Firewall
119
Denial of Service Attacks
120
Denial of Service
120
Basics
120
Figure 46 Prestige Firewall Application
120
Types of Dos Attacks
121
Table 33 Common IP Ports
121
Figure 47 Three-Way Handshake
122
Figure 48 SYN Flood
122
Figure 49 Smurf Attack
123
ICMP Vulnerability
123
Illegal Commands (Netbios and SMTP)
123
Table 34 ICMP Commands that Trigger Alerts
123
Table 35 Legal Netbios Commands
123
Traceroute
124
Stateful Inspection
124
Table 36 Legal SMTP Commands
124
Figure 50 Stateful Inspection
125
Stateful Inspection Process
125
Stateful Inspection and the Prestige
126
TCP Security
126
UDP/ICMP Security
127
Upper Layer Protocols
127
Guidelines for Enhancing Security with Your Firewall
127
Security in General
128
Packet Filtering Vs Firewall
129
Packet Filtering
129
When to Use Filtering
129
Firewall
129
When to Use the Firewall
129
Chapter 11 Firewall Configuration
132
Access Methods
132
Firewall Policies Overview
132
Rule Logic Overview
133
Rule Checklist
133
Security Ramifications
133
Key Fields for Configuring Rules
134
Action
134
Service
134
Source Address
134
Destination Address
134
Connection Direction
134
LAN to WAN Rules
134
Alerts
135
Configuring Default Firewall Policy
135
Figure 51 Firewall: Default Policy
135
Table 37 Firewall: Default Policy
135
Rule Summary
136
Figure 52 Firewall: Rule Summary
137
Table 38 Rule Summary
137
Configuring Firewall Rules
138
Figure 53 Firewall: Edit Rule
139
Table 39 Firewall: Edit Rule
140
Customized Services
141
Configuring a Customized Service
141
Figure 54 Firewall: Customized Services
141
Table 40 Customized Services
141
Example Firewall Rule
142
Figure 55 Firewall: Configure Customized Services
142
Table 41 Firewall: Configure Customized Services
142
Figure 56 Firewall Example: Rule Summary
143
Figure 57 Firewall Example: Edit Rule: Destination Address
144
Figure 58 Edit Custom Port Example
144
Figure 59 Firewall Example: Edit Rule: Select Customized Services
145
Predefined Services
146
Figure 60 Firewall Example: Rule Summary: My Service
146
Table 42 Predefined Services
146
Anti-Probing
148
Dos Thresholds
149
Figure 61 Firewall: Anti Probing
149
Table 43 Firewall: Anti Probing
149
Half-Open Sessions
150
TCP Maximum Incomplete and Blocking Time
150
Threshold Values
150
Configuring Firewall Thresholds
151
Figure 62 Firewall: Threshold
151
Table 44 Firewall: Threshold
152
Chapter 12 Content Filtering
154
Content Filtering Overview
154
The Main Content Filter Screen
154
Figure 63 Content Filtering
154
Table 45
154
Configuring Keyword Blocking
155
Figure 64 Content Filter: Keyword
155
Table 46 Content Filter: Keyword
155
Configuring the Schedule
156
Configuring Trusted Computers
156
Figure 65 Content Filter: Schedule
156
Table 47 Content Filter: Schedule
156
Figure 66 Content Filter: Trusted
157
Table 48 Content Filter: Trusted
157
Chapter 13 Remote Management Configuration
158
Remote Management Overview
158
Remote Management Limitations
158
Remote Management and NAT
159
System Timeout
159
Telnet
159
Figure 67 Telnet Configuration on a TCP/IP Network
159
Ftp
160
Web
160
Configuring Remote Management
160
Figure 68 Remote Management
160
Table 49 Remote Management
160
Chapter 14 Universal Plug-And-Play (Upnp)
162
Introducing Universal Plug and Play
162
How Do I Know if I'M Using Upnp
162
NAT Traversal
162
Cautions with Upnp
163
Upnp and Zyxel
163
Configuring Upnp
163
Figure 69 Configuring Upnp
163
Installing Upnp in Windows Example
164
Table 50 Configuring Upnp
164
Figure 70 Add/Remove Programs: Windows Setup: Communication
165
Figure 71 Add/Remove Programs: Windows Setup: Communication: Components
165
Figure 72 Network Connections
166
Figure 73 Windows Optional Networking Components Wizard
167
Using Upnp in Windows XP Example
168
Figure 74 Networking Services
168
Figure 75 Network Connections
169
Figure 76 Internet Connection Properties
170
Figure 77 Internet Connection Properties: Advanced Settings
171
Figure 78 Internet Connection Properties: Advanced Settings: Add
171
Figure 79 System Tray Icon
172
Figure 80 Internet Connection Status
172
Figure 81 Network Connections
173
Figure 82 Network Connections: My Network Places
174
Figure 83 Network Connections: My Network Places: Properties: Example
174
Chapter 15 Logs Screens
176
Logs Overview
176
Alerts and Logs
176
Configuring Log Settings
176
Figure 84 Log Settings
177
Table 51 Log Settings
177
Displaying the Logs
178
SMTP Error Messages
179
Figure 85 View Logs
179
Table 52 View Logs
179
Table 53 SMTP Error Messages
179
Example E-Mail Log
180
Figure 86 E-Mail Log Example
180
Chapter 16 Media Bandwidth Management Advanced Setup
182
Media Bandwidth Management Overview
182
Bandwidth Classes and Filters
182
Proportional Bandwidth Allocation
183
Bandwidth Management Usage Examples
183
Application-Based Bandwidth Management Example
183
Subnet-Based Bandwidth Management Example
183
Figure 87 Application-Based Bandwidth Management Example
183
Application and Subnet-Based Bandwidth Management Example
184
Figure 88 Subnet-Based Bandwidth Management Example
184
Figure 89 Application and Subnet-Based Bandwidth Management Example
184
Table 54 Application and Subnet-Based Bandwidth Management Example
184
Scheduler
185
Priority-Based Scheduler
185
Fairness-Based Scheduler
185
Maximize Bandwidth Usage
185
Reserving Bandwidth for Non-Bandwidth Class Traffic
185
Maximize Bandwidth Usage Example
186
Figure 90 Bandwidth Allotment Example
186
Bandwidth Borrowing
187
Maximize Bandwidth Usage with Bandwidth Borrowing
187
Figure 91 Maximize Bandwidth Usage Example
187
The Main Media Bandwidth Management Screen
188
Configuring Summary
188
Figure 92 Media Bandwidth Mgnt
188
Table 55 Media Bandwidth Mgnt
188
Figure 93 Media Bandwidth Management: Summary
189
Table 56 Media Bandwidth Management: Summary
189
Configuring Class Setup
190
Media Bandwidth Management Class Configuration
190
Figure 94 Media Bandwidth Management: Class Setup
190
Table 57 Media Bandwidth Management: Class Setup
190
Figure 95 Media Bandwidth Management: Class Configuration
191
Table 58 Media Bandwidth Management: Class Configuration
191
Media Bandwidth Management Statistics
193
Figure 96 Media Bandwidth Management Statistics
193
Table 59 Services and Port Numbers
193
Table 60 Media Bandwidth Management Statistics
193
Bandwidth Monitor
194
Figure 97 Media Bandwidth Management: Monitor
194
Table 61 Media Bandwidth Management: Monitor
194
Chapter 17 Maintenance
196
Maintenance Overview
196
System Status Screen
196
Figure 98 System Status
197
Table 62 System Status
197
System Statistics
198
Figure 99 System Status: Show Statistics
199
Table 63 System Status: Show Statistics
199
DHCP Table Screen
200
Figure 100 DHCP Table
200
Table 64 DHCP Table
200
Any IP Table Screen
201
Wireless Screen
201
Association List
201
Figure 101 any IP Table
201
Table 65 any IP Table
201
Diagnostic Screens
202
General Diagnostic
202
Figure 102 Association List
202
Table 66 Association List
202
DSL Line Diagnostic
203
Figure 103 Diagnostic: General
203
Table 67 Diagnostic: General
203
Figure 104 Diagnostic: DSL Line
204
Table 68 Diagnostic: DSL Line
204
Firmware Upgrade
205
Figure 105 Firmware Upgrade
205
Table 69 Firmware Upgrade
205
Figure 106 Network Temporarily Disconnected
206
Figure 107 Error Message
206
Chapter 18 Introducing the SMT
208
SMT Introduction
208
Procedure for SMT Configuration Via Telnet
208
Entering Password
208
Prestige SMT Menus Overview
209
Figure 108 Login Screen
209
Table 70 SMT Menus Overview
209
Navigating the SMT Interface
210
Table 71 Navigating the SMT Interface
210
System Management Terminal Interface Summary
211
Table 72 SMT Main Menu
211
Table 73 Main Menu Summary
211
Changing the System Password
212
Figure 109 Menu 23.1 Change Password
212
Chapter 19 Menu 1 General Setup
214
General Setup
214
Procedure to Configure Menu 1
214
Procedure to Configure Dynamic DNS
215
Figure 110 Menu 1 General Setup
215
Table 74 Menu 1 General Setup
215
Figure 111 Menu 1.1 Configure Dynamic DNS
216
Table 75 Menu 1.1 Configure Dynamic DNS
216
Chapter 20 Menu 2 WAN Backup Setup
218
Introduction to WAN Backup Setup
218
Configuring Dial Backup in Menu 2
218
Traffic Redirect Setup
219
Figure 112 Menu 2 WAN Backup Setup
219
Figure 113 Menu 2.1Traffic Redirect Setup
219
Table 76 Menu 2 WAN Backup Setup
219
Table 77 Menu 2.1Traffic Redirect Setup
219
Chapter 21 Menu 3 LAN Setup
222
LAN Setup
222
General Ethernet Setup
222
Figure 114 Menu 3 LAN Setup
222
Figure 115 Menu 3.1 LAN Port Filter Setup
222
Protocol Dependent Ethernet Setup
223
TCP/IP Ethernet Setup and DHCP
223
Figure 116 Menu 3.2 TCP/IP and DHCP Ethernet Setup
223
Table 78 DHCP Ethernet Setup
224
Table 79 TCP/IP Ethernet Setup
224
Chapter 22 Wireless LAN Setup
226
Wireless LAN Overview
226
Wireless LAN Setup
226
Figure 117 Menu 3.5 - Wireless LAN Setup
226
Table 80 Menu 3.5 - Wireless LAN Setup
226
Wireless LAN MAC Address Filter
227
Figure 118 Menu 3.5.1 WLAN MAC Address Filtering
228
Table 81 Menu 3.5.1 WLAN MAC Address Filtering
228
Chapter 23 Internet Access
230
Internet Access Overview
230
IP Policies
230
IP Alias
230
IP Alias Setup
231
Figure 119 IP Alias Network Example
231
Figure 120 Menu 3.2 TCP/IP and DHCP Setup
231
Route IP Setup
232
Figure 121 Menu 3.2.1 IP Alias Setup
232
Table 82 Menu 3.2.1 IP Alias Setup
232
Internet Access Configuration
233
Figure 122 Menu 1 General Setup
233
Figure 123 Menu 4 Internet Access Setup
233
Table 83 Menu 4 Internet Access Setup
234
Chapter 24 Remote Node Configuration
236
Remote Node Setup Overview
236
Remote Node Setup
236
Remote Node Profile
236
Encapsulation and Multiplexing Scenarios
237
Scenario 1: One VC, Multiple Protocols
237
Scenario 2: One VC, One Protocol (IP)
237
Scenario 3: Multiple Vcs
237
Figure 124 Menu 11 Remote Node Setup
237
Figure 125 Menu 11.1 Remote Node Profile
238
Table 84 Menu 11.1 Remote Node Profile
238
Outgoing Authentication Protocol
239
Remote Node Network Layer Options
240
Figure 126 Menu 11.3 Remote Node Network Layer Options
240
Table 85 Menu 11.3 Remote Node Network Layer Options
240
My WAN Addr Sample IP Addresses
241
Remote Node Filter
242
Figure 127 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
242
Figure 128 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
242
Editing ATM Layer Options
243
VC-Based Multiplexing (Non-PPP Encapsulation)
243
LLC-Based Multiplexing or PPP Encapsulation
243
Figure 129 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
243
Figure 130 Menu 11.6 for VC-Based Multiplexing
243
Advance Setup Options
244
Figure 131 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
244
Figure 132 Menu 11.1 Remote Node Profile
244
Figure 133 Menu 11.8 Advance Setup Options
245
Table 86 Menu 11.8 Advance Setup Options
245
Chapter 25 Static Route Setup
246
IP Static Route Overview
246
Configuration
246
Figure 134 Sample Static Routing Topology
246
Figure 135 Menu 12 Static Route Setup
247
Figure 136 Menu 12.1 IP Static Route Setup
247
Figure 137 Menu12.1.1 Edit IP Static Route
247
Table 87 Menu12.1.1 Edit IP Static Route
248
Chapter 26 Bridging Setup
250
Bridging in General
250
Bridge Ethernet Setup
250
Remote Node Bridging Setup
250
Figure 138 Menu 11.1 Remote Node Profile
251
Figure 139 Menu 11.3 Remote Node Network Layer Options
251
Table 88 Remote Node Network Layer Options: Bridge Fields
251
Bridge Static Route Setup
252
Figure 140 Menu 12.3.1 Edit Bridge Static Route
252
Table 89 Menu 12.3.1 Edit Bridge Static Route
252
Network Address Translation (NAT)
254
Chapter 27 Network Address Translation (NAT)
254
Using NAT
254
SUA (Single User Account) Versus NAT
254
Applying NAT
254
Figure 141 Menu 4 Applying NAT for Internet Access
255
Figure 142 Applying NAT in Menus 4 & 11.3
255
NAT Setup
256
Address Mapping Sets
256
Figure 143 Menu 15 NAT Setup
256
Table 90 Applying NAT in Menus 4 & 11.3
256
Figure 144 Menu 15.1 Address Mapping Sets
257
Figure 145 Menu 15.1.255 SUA Address Mapping Rules
257
SUA Address Mapping Set
257
Table 91 SUA Address Mapping Rules
257
Figure 146 Menu 15.1.1 First Set
258
User-Defined Address Mapping Sets
258
Figure 147 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
259
Ordering Your Rules
259
Table 92 Menu 15.1.1 First Set
259
Configuring a Server Behind NAT
260
Figure 148 Menu 15.2 NAT Server Setup
260
Table 93 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
260
General NAT Examples
261
Figure 149 Menu 15.2.1 NAT Server Setup
261
Figure 150 Multiple Servers Behind NAT Example
261
Example 1: Internet Access Only
262
Example 2: Internet Access with an Inside Server
262
Figure 151 NAT Example 1
262
Figure 152 Menu 4 Internet Access & NAT Example
262
Example 3: Multiple Public IP Addresses with Inside Servers
263
Figure 153 NAT Example 2
263
Figure 154 Menu 15.2.1 Specifying an Inside Server
263
Figure 155 NAT Example 3
264
Figure 156 Example 3: Menu 11.3
265
Figure 157 Example 3: Menu 15.1.1.1
265
Figure 158 Example 3: Final Menu 15.1.1
266
Figure 159 Example 3: Menu 15.2.1
266
Example 4: NAT Unfriendly Application Programs
267
Figure 160 NAT Example 4
267
Figure 161 Example 4: Menu 15.1.1.1 Address Mapping Rule
267
Figure 162 Example 4: Menu 15.1.1 Address Mapping Rules
268
Chapter 28 Enabling the Firewall
270
Remote Management and the Firewall
270
Access Methods
270
Enabling the Firewall
270
Figure 163 Menu 21.2 Firewall Setup
271
Chapter 29 Filter Configuration
272
About Filtering
272
Figure 164 Outgoing Packet Filtering Process
272
Figure 165 Filter Rule Process
273
The Filter Structure of the Prestige
273
Configuring a Filter Set for the Prestige
274
Figure 166 Menu 21 Filter Set Configuration
274
Figure 167 Netbios_Wan Filter Rules Summary
274
Filter Rules Summary Menus
275
Figure 168 Netbios_Lan Filter Rules Summary
275
Figure 169 IGMP Filter Rules Summary
275
Table 94 Abbreviations Used in the Filter Rules Summary Menu
275
Configuring a Filter Rule
276
Table 95 Rule Abbreviations Used
276
Figure 170 Menu 21.1.X.1 TCP/IP Filter Rule
277
Table 96 Menu 21.1.X.1 TCP/IP Filter Rule
277
TCP/IP Filter Rule
277
Figure 171 Executing an IP Filter
279
Generic Filter Rule
279
Figure 172 Menu 21.1.5.1 Generic Filter Rule
280
Table 97 Menu 21.1.5.1 Generic Filter Rule
280
Filter Types and NAT
281
Example Filter
281
Figure 173 Protocol and Device Filter Sets
281
Figure 174 Sample Telnet Filter
282
Figure 175 Menu 21.1.6.1 Sample Filter
282
Applying Filters and Factory Defaults
283
Figure 176 Menu 21.1.6.1 Sample Filter Rules Summary
283
Table 98 Filter Sets Table
283
Ethernet Traffic
284
Figure 177 Filtering Ethernet Traffic
284
Figure 178 Filtering Remote Node Traffic
284
Remote Node Filters
284
Chapter 30 SNMP Configuration
286
About SNMP
286
Figure 179 SNMP Management Model
286
Supported Mibs
287
SNMP Configuration
287
SNMP Traps
288
Figure 180 Menu 22 SNMP Configuration
288
Table 99 Menu 22 SNMP Configuration
288
Table 100 SNMP Traps
288
Table 101 Ports and Permanent Virtual Circuits
289
Chapter 31 System Security
290
System Security
290
System Password
290
Configuring External RADIUS Server
290
Figure 181 Menu 23 - System Security
290
Figure 182 Menu 23.2 System Security: RADIUS Server
291
Table 102 Menu 23.2 System Security: RADIUS Server
291
IEEE 802.1X
292
Figure 183 Menu 23 System Security
292
Figure 184 Menu 23.4 System Security: IEEE 802.1X
292
Table 103 Menu 23.4 System Security: IEEE 802.1X
293
Creating User Accounts on the Prestige
294
Figure 185 Menu 14 Dial-In User Setup
295
Figure 186 Menu 14.1 Edit Dial-In User
295
Table 104 Menu 14.1 Edit Dial-In User
295
Chapter 32 System Information and Diagnosis
296
Overview
296
System Status
296
Figure 187 Menu 24 System Maintenance
296
Figure 188 Menu 24.1 System Maintenance : Status
297
Table 105 Menu 24.1 System Maintenance: Status
297
System Information
298
Figure 189 Menu 24.2 System Information and Console Port Speed
298
Console Port Speed
299
Figure 190 Menu 24.2.1 System Maintenance: Information
299
Table 106 Menu 24.2.1 System Maintenance: Information
299
Log and Trace
300
Viewing Error Log
300
Figure 191 Menu 24.2.2 System Maintenance : Change Console Port Speed
300
Figure 192 Menu 24.3 System Maintenance: Log and Trace
300
Syslog and Accounting
301
Figure 193 Sample Error and Information Messages
301
Figure 194 Menu 24.3.2 System Maintenance: Syslog and Accounting
301
Table 107 Menu 24.3.2 System Maintenance : Syslog and Accounting
301
Figure 195 Syslog Example
302
Diagnostic
303
Figure 196 Menu 24.4 System Maintenance : Diagnostic
303
Table 108 Menu 24.4 System Maintenance Menu: Diagnostic
304
Chapter 33 Firmware and Configuration File Maintenance
306
Filename Conventions
306
Backup Configuration
307
Table 109 Filename Conventions
307
Example of FTP Commands from the Command Line
308
Figure 197 Telnet in Menu 24.5
308
Using the FTP Command from the Command Line
308
Figure 198 FTP Session Example
309
GUI-Based FTP Clients
309
Table 110 General Commands for GUI-Based FTP Clients
309
TFTP and FTP over WAN Management Limitations
309
Backup Configuration Using TFTP
310
GUI-Based TFTP Clients
310
TFTP Command Example
310
Restore Configuration
311
Restore Using FTP
311
Table 111 General Commands for GUI-Based TFTP Clients
311
Restore Using FTP Session Example
312
Figure 199 Telnet into Menu 24.6
312
Figure 200 Restore Using FTP Session Example
312
Uploading Firmware and Configuration Files
313
Firmware File Upload
313
Configuration File Upload
313
Figure 201 Telnet into Menu 24.7.1 Upload System Firmware
313
FTP File Upload Command from the DOS Prompt Example
314
Figure 202 Telnet into Menu 24.7.2 System Maintenance
314
FTP Session Example of Firmware File Upload
315
TFTP File Upload
315
Figure 203 FTP Session Example of Firmware File Upload
315
TFTP Upload Command Example
316
Chapter 34 System Maintenance
318
Command Interpreter Mode
318
Figure 204 Command Mode in Menu 24
318
Figure 205 Valid Commands
318
Call Control Support
319
Budget Management
319
Figure 206 Menu 24.9 System Maintenance: Call Control
319
Time and Date Setting
320
Figure 207 Menu 24.9.1 System Maintenance: Budget Management
320
Table 112 Menu 24.9.1 System Maintenance: Budget Management
320
Figure 208 Menu 24 System Maintenance
321
Figure 209 Menu 24.10 System Maintenance: Time and Date Setting
321
Table 113 Menu 24.10 System Maintenance: Time and Date Setting
321
Resetting the Time
322
Chapter 35 Remote Management
324
Remote Management Overview
324
Remote Management
324
Remote Management Setup
324
Remote Management Limitations
325
Figure 210 Menu 24.11 Remote Management Control
325
Table 114 Menu 24.11 Remote Management Control
325
Remote Management and NAT
326
System Timeout
326
Chapter 36 IP Policy Routing
328
IP Policy Routing Overview
328
Benefits of IP Policy Routing
328
Routing Policy
328
IP Routing Policy Setup
329
Figure 211 Menu 25 IP Routing Policy Setup
329
Figure 212 Menu 25.1 IP Routing Policy Setup
330
Table 115 Menu 25.1 IP Routing Policy Setup
330
Figure 213 Menu 25.1.1 IP Routing Policy
331
Table 116 Menu 25.1.1 IP Routing Policy
331
Applying an IP Policy
332
Ethernet IP Policies
332
IP Policy Routing Example
333
Figure 214 Menu 3.2 TCP/IP and DHCP Ethernet Setup
333
Figure 215 Menu 11.3 Remote Node Network Layer Options
333
Figure 216 Example of IP Policy Routing
334
Figure 217 IP Routing Policy Example
335
Figure 218 IP Routing Policy Example
336
Figure 219 Applying IP Policies Example
336
Chapter 37 Call Scheduling
338
Introduction
338
Figure 220 Menu 26 Schedule Setup
338
Figure 221 Menu 26.1 Schedule Set Setup
339
Table 117 Menu 26.1 Schedule Set Setup
339
Figure 222 Applying Schedule Set(S) to a Remote Node (Pppoe)
340
Chapter 38 Troubleshooting
342
Problems Starting up the Prestige
342
Problems with the LAN
342
Table 118 Troubleshooting Starting up Your Prestige
342
Table 119 Troubleshooting the LAN
342
Problems with the WAN
343
Table 120 Troubleshooting the WAN
343
Problems Accessing the Prestige
344
Pop-Up Windows, Javascripts and Java Permissions
344
Internet Explorer Pop-Up Blockers
344
Table 121 Troubleshooting Accessing the Prestige
344
Figure 223 Pop-Up Blocker
345
Figure 224 Internet Options
345
Figure 225 Internet Options
346
Javascripts
347
Figure 226 Pop-Up Blocker Settings
347
Figure 227 Internet Options
348
Java Permissions
349
Figure 228 Security Settings - Java Scripting
349
Figure 229 Security Settings - Java
350
Activex Controls in Internet Explorer
351
Figure 230 Java (Sun)
351
Figure 231 Internet Options Security
352
Figure 232 Security Setting Activex Controls
353
Product Specifications
354
Table 122 Device
354
Appendix A Product Specifications
354
Table 123 Firmware
355
Appendix B
358
Wall-Mounting Instructions
358
Appendix C Setting up Your Computer's IP Address
360
Windows 95/98/Me
360
Figure 233 Windows 95/98/Me: Network: Configuration
361
Figure 234 Windows 95/98/Me: TCP/IP Properties: IP Address
362
Windows 2000/NT/XP
363
Figure 235 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
363
Figure 236 Windows XP: Start Menu
364
Figure 237 Windows XP: Control Panel
364
Figure 238 Windows XP: Control Panel: Network Connections: Properties
365
Figure 239 Windows XP: Local Area Connection Properties
365
Figure 240 Windows XP: Internet Protocol (TCP/IP) Properties
366
Figure 241 Windows XP: Advanced TCP/IP Properties
367
Macintosh os 8/9
368
Figure 242 Windows XP: Internet Protocol (TCP/IP) Properties
368
Figure 243 Macintosh os 8/9: Apple Menu
369
Figure 244 Macintosh os 8/9: TCP/IP
369
Macintosh os X
370
Figure 245 Macintosh os X: Apple Menu
370
Linux
371
Figure 246 Macintosh os X: Network
371
Figure 247 Red hat 9.0: KDE: Network Configuration: Devices
372
Figure 248 Red hat 9.0: KDE: Ethernet Device: General
372
Figure 249 Red hat 9.0: KDE: Network Configuration: DNS
373
Figure 250 Red hat 9.0: KDE: Network Configuration: Activate
373
Figure 251 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
374
Figure 252 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
374
Figure 253 Red hat 9.0: DNS Settings in Resolv.conf
374
Figure 254 Red hat 9.0: Restart Ethernet Card
375
Figure 255 Red hat 9.0: Checking TCP/IP Properties
375
IP Subnetting
376
Appendix D IP Subnetting
376
IP Addressing
376
IP Classes
376
Table 124 Classes of IP Addresses
376
Subnet Masks
377
Subnetting
377
Table 125 Allowed IP Address Range by Class
377
Table 126 "Natural" Masks
377
Example: Two Subnets
378
Table 127 Alternative Subnet Mask Notation
378
Table 128 Two Subnets Example
378
Table 129 Subnet 1
379
Table 130 Subnet 2
379
Example: Four Subnets
380
Table 131 Subnet 1
380
Table 132 Subnet 2
380
Table 133 Subnet 3
380
Example Eight Subnets
381
Table 134 Subnet 4
381
Table 135 Eight Subnets
381
Table 136 Class C Subnet Planning
381
Subnetting with Class a and Class B Networks
382
Table 137 Class B Subnet Planning
382
Appendix E Boot Commands
384
Figure 256 Option to Enter Debug Mode
384
Figure 257 Boot Module Commands
385
Appendix F Command Interpreter
386
Command Syntax
386
Command Usage
386
Appendix G Firewall Commands
388
Table 138 Firewall Commands
389
Appendix H Netbios Filter Commands
394
Introduction
394
Display Netbios Filter Settings
394
Netbios Filter Configuration
395
Table 139 Netbios Filter Default Settings
395
Appendix I Splitters and Microfilters
398
Connecting a POTS Splitter
398
Telephone Microfilters
398
Figure 258 Connecting a POTS Splitter
398
Prestige with ISDN
399
Figure 259 Connecting a Microfilter
399
Figure 260 Prestige with ISDN
399
Appendix Jpppoe
402
Pppoe in Action
402
Benefits of Pppoe
402
Traditional Dial-Up Scenario
402
How Pppoe Works
403
Prestige as a Pppoe Client
403
Figure 261 Single-Computer Per Router Hardware Configuration
403
Figure 262 Prestige as a Pppoe Client
403
Appendix K Log Descriptions
404
Table 140 System Maintenance Logs
404
Table 141 System Error Logs
405
Table 142 Access Control Logs
405
Table 143 TCP Reset Logs
406
Table 144 Packet Filter Logs
406
Table 145 ICMP Logs
407
Table 146 CDR Logs
407
Table 147 PPP Logs
407
Table 148 Upnp Logs
408
Table 149 Content Filtering Logs
408
Table 150 Attack Logs
409
Table 151 Ipsec Logs
410
Table 152 IKE Logs
410
Table 153 PKI Logs
413
Table 154 Certificate Path Verification Failure Reason Codes
414
Table 155 802.1X Logs
415
Table 156 ACL Setting Notes
416
Table 157 ICMP Notes
416
Table 158 Syslog Logs
417
Table 159 RFC-2408 ISAKMP Payload Types
417
Figure 263 Displaying Log Categories Example
418
Figure 264 Displaying Log Parameters Example
418
Log Commands
418
Log Command Example
419
Appendix L Wireless Lans
420
Wireless LAN Topologies
420
Figure 265 Peer-To-Peer Communication in an Ad-Hoc Network
420
Figure 266 Basic Service Set
421
Channel
422
Rts/Cts
422
Figure 267 Infrastructure WLAN
422
Fragmentation Threshold
423
Figure 268 RTS/CTS
423
Preamble Type
424
Table 160 IEEE 802.11G
424
IEEE 802.1X
425
Radius
425
Types of Authentication
426
Dynamic Wep Key Exchange
427
Wpa
428
Table 161 Comparison of EAP Authentication Types
428
User Authentication
428
Security Parameters Summary
429
Table 162 Wireless Security Relational Matrix
429
Appendix M Internal SPTGEN
430
Internal SPTGEN Overview
430
The Configuration Text File Format
430
Figure 269 Configuration Text File Format: Column Descriptions
430
Internal SPTGEN FTP Download Example
431
Figure 270 Invalid Parameter Entered: Command Line Example
431
Figure 271 Valid Parameter Entered: Command Line Example
431
Internal SPTGEN FTP Upload Example
432
Figure 272 Internal SPTGEN FTP Download Example
432
Figure 273 Internal SPTGEN FTP Upload Example
432
Table 163 Abbreviations Used in the Example Internal SPTGEN Screens Table
432
Table 164 Menu 1 General Setup (SMT Menu 1)
433
Table 165 Menu 3 (SMT Menu 3 )
433
Table 166 Menu 4 Internet Access Setup (SMT Menu 4)
437
Table 167 Menu 12 (SMT Menu 12)
438
Table 168 Menu 15 SUA Server Setup (SMT Menu 15)
443
Table 169 Menu 21.1 Filter Set #1 (SMT Menu 21.1)
444
Table 170 Menu 21.1 Filer Set #2, (SMT Menu 21.1)
447
Table 171 Menu 23 System Menus (SMT Menu 23)
452
Command Examples
453
Table 172 Menu 24.11 Remote Management Control (SMT Menu 24.11)
453
Table 173 Command Examples
453
Index
456
Advertisement
Advertisement
Related Products
ZyXEL Communications P-660H-TX
ZyXEL Communications P-660HW-D1 V2
ZyXEL Communications P-660HW-D3 V2
ZyXEL Communications P-660HW-DX
ZyXEL Communications P660HW3
ZyXEL Communications P-660HNU-T1
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P-660H-T1 v3s
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications P-660H - VERSION 3.40
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL