Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HW-D3 V2
ZyXEL Communications P-660HW-D3 V2 Manuals
Manuals and User Guides for ZyXEL Communications P-660HW-D3 V2. We have
2
ZyXEL Communications P-660HW-D3 V2 manuals available for free PDF download: User Manual, Install Manual
ZyXEL Communications P-660HW-D3 V2 User Manual (460 pages)
802.11g Wireless ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 18 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
List of Figures
25
List of Tables
33
Preface
39
Related Documentation
39
Syntax Conventions
39
Graphics Icons Key
40
User Guide Feedback
40
Introduction to DSL
41
Chapter 1 Getting to Know Your Prestige
43
Introducing the Prestige
43
Table 1 ADSL Standards
43
Features of the Prestige
44
High Speed Internet Access
44
10/100M Auto-Negotiating Ethernet/Fast Ethernet Interface(S)
45
Traffic Redirect
45
Adsl Standards
46
Dynamic Dns Support
46
Protocol Support
46
Network Management
47
Networking Compatibility
47
Diagnostics Capabilities
48
P-660HW Wireless Features
48
Packet Filters
48
Wi-Fi Protected Access
49
Wireless LAN MAC Address Filtering
49
Applications for the Prestige
49
Figure 1 Prestige Internet Access Application
49
Internet Access
49
Figure 2 Firewall Application
50
Figure 3 Prestige LAN-To-LAN Application
50
Figure 4 P-660H Front Panel
50
Firewall for Secure Broadband Internet Access
50
LAN to LAN Application
50
Front Panel Leds
50
Figure 5 P-660HW Front Panel
51
Table 2 Front Panel Leds
51
Chapter 2 Introducing the Web Configurator
53
Web Configurator Overview
53
Accessing the Prestige Web Configurator
53
Resetting the Prestige
54
Figure 6 Password Screen
54
Figure 7 Change Password at Login
54
Using the Reset Button
54
Navigating the Prestige Web Configurator
55
Figure 8 Web Configurator: Site Map Screen
55
Table 3 Web Configurator Screens Summary
56
Chapter 3 Wizard Setup for Internet Access
59
Introduction to Internet Access Wizard
59
Internet Access Wizard Setup
59
Figure 9 Internet Access Wizard Setup: First Screen
60
Table 4 Internet Access Wizard Setup: First Screen
60
Figure 10 Internet Connection with Pppoe
61
Table 5 Internet Connection with Pppoe
61
Figure 11 Internet Connection with RFC 1483
62
Figure 12 Internet Connection with ENET ENCAP
62
Table 6 Internet Connection with RFC 1483
62
Figure 13 Internet Connection with Pppoa
63
Table 7 Internet Connection with ENET ENCAP
63
Table 8 Internet Connection with Pppoa
64
Figure 14 Internet Access Wizard Setup: Third Screen
65
Figure 15 Internet Access Wizard Setup: LAN Configuration
65
Figure 16 Internet Access Wizard Setup: Connection Tests
66
Table 9 Internet Access Wizard Setup: LAN Configuration
66
Chapter 4 Wizard Setup for Media Bandwidth Management
67
Introduction to Media Bandwidth Management
67
Predefined Media Bandwidth Management Services
67
Table 10 Media Bandwidth Mgnt. Wizard Setup: Services
67
Media Bandwidth Management Setup
68
Figure 17 Media Bandwidth Mgnt. Wizard Setup: First Screen
68
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen
69
Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish
70
Chapter 5 Password Setup
71
Password Overview
71
Configuring Password
71
Figure 20 Password
71
Table 13 Password
71
Chapter 6 LAN Setup
73
LAN Overview
73
Lans, Wans and the Prestige
73
Figure 21 LAN and WAN IP Addresses
73
Table 14 LAN Setup
73
DNS Server Address
74
DNS Server Address Assignment
74
Lan Tcp/Ip
75
Factory LAN Defaults
75
IP Address and Subnet Mask
75
RIP Setup
76
Multicast
76
Any IP
77
How any IP Works
77
Figure 22 any IP Example
77
Configuring LAN
78
Figure 23 LAN Setup
79
Configuring Static DHCP
80
Figure 24 LAN: Static DHCP
81
Table 15 LAN: Static DHCP
81
Chapter 7 Wireless LAN (Prestige 660HW)
83
Introduction
83
Wireless Security Overview
83
Encryption
83
Authentication
83
Restricted Access
84
Hide Prestige Identity
84
G-Plus
84
Configuring Wireless LAN on the Prestige
84
Configuring the Wireless Screen
85
WEP Encryption
85
Figure 25 Wireless Security Methods
85
Figure 26 Wireless Screen
86
Configuring MAC Filters
88
Figure 27 MAC Address Filter
89
Table 17 MAC Address Filter
89
Introduction to WPA
90
WPA-PSK Application Example
90
WPA with RADIUS Application Example
91
Figure 28 WPA - PSK Authentication
91
Wireless Client WPA Supplicants
92
Configuring IEEE 802.1X and WPA
92
Figure 29 WPA with RADIUS Application Example2
92
Authentication Required: 802.1X
93
Figure 30 Wireless LAN: 802.1X/Wpa: no Authentication
93
Table 18 Wireless LAN: 802.1X/Wpa: no Access/Authentication
93
Figure 31 Wireless LAN: 802.1X/Wpa: 802.1Xl
94
Table 19 Wireless LAN: 802.1X/Wpa: 802.1X
94
Authentication Required: WPA
95
Figure 32 Wireless LAN: 802.1X/Wpa: Wpal
96
Table 20 Wireless LAN: 802.1X/Wpa: Wpal
96
Authentication Required: WPA-PSK
97
Figure 33 Wireless LAN: 802.1X/Wpa:wpa-Pskl
97
Table 21 Wireless LAN: 802.1X/Wpa: Wpal-PSK
97
Configuring Local User Authentication
98
Figure 34 Local User Database
98
Table 22 Local User Database
98
Configuring RADIUS
99
Figure 35 RADIUS
99
Table 23 RADIUS
99
Introduction to OTIST
100
Enabling OTIST
100
Figure 36 OTIST
101
Reset Button
101
Table 24 OTIST
101
Web Configurator
101
Wireless Client
102
Starting OTIST
102
Figure 37 Example Wireless Client OTIST Screen
102
Figure 38 Security Key
102
Figure 39 OTIST in Progress (Prestige)
102
Figure 40 OTIST in Progress (Client)
102
Notes on OTIST
103
Figure 41 no AP with OTIST Found
103
Figure 42 Start OTIST
103
Chapter 8 WAN Setup
105
WAN Overview
105
Metric
105
Pppoe Encapsulation
106
Traffic Shaping
106
Zero Configuration Internet Access
107
Configuring WAN Setup
107
Figure 43 Example of Traffic Shaping
107
Figure 44 WAN Setup (Pppoe)
108
Table 25 WAN Setup
108
Traffic Redirect
110
Configuring WAN Backup
111
Figure 45 Traffic Redirect Example
111
Figure 46 Traffic Redirect LAN Setup
111
Figure 47 WAN Backup
112
Table 26 WAN Backup
112
Chapter 9 Network Address Translation (NAT) Screens
115
NAT Overview
115
NAT Definitions
115
Table 27 NAT Definitions
115
What NAT Does
116
How NAT Works
116
NAT Application
117
Figure 48 How NAT Works
117
Figure 49 NAT Application with IP Alias
117
NAT Mapping Types
118
Table 28 NAT Mapping Types
118
SUA (Single User Account) Versus NAT
119
SUA Server
119
Default Server IP Address
119
Port Forwarding: Services and Port Numbers
119
Table 29 Services and Port Numbers
119
Configuring Servers Behind SUA (Example)
120
Sip Alg
120
Figure 50 Multiple Servers Behind NAT Example
120
Selecting the NAT Mode
121
Configuring SUA Server
121
Figure 51 NAT Mode
121
Table 30 NAT Mode
121
Figure 52 Edit SUA/NAT Server Set
122
Table 31 Edit SUA/NAT Server Set
122
Configuring Address Mapping
123
Figure 53 Address Mapping Rules
123
Table 32 Address Mapping Rules
123
Editing an Address Mapping Rule
124
Figure 54 Address Mapping Rule Edit
124
Table 33 Address Mapping Rule Edit
125
Chapter 10 Dynamic DNS Setup
127
Dynamic DNS
127
DYNDNS Wildcard
127
Configuring Dynamic DNS
127
Figure 55 Dynamic DNS
128
Table 34 Dynamic DNS
128
Chapter 11 Time and Date
129
Configuring Time and Date
129
Figure 56 Time and Date
129
Table 35 Time and Date
130
Chapter 12 Firewalls
131
Firewall Overview
131
Types of Firewalls
131
Packet Filtering Firewalls
131
Application-Level Firewalls
131
Stateful Inspection Firewalls
132
Introduction to Zyxel's Firewall
132
Denial of Service Attacks
133
Denial of Service
133
Basics
133
Figure 57 Prestige Firewall Application
133
Types of Dos Attacks
134
Figure 58 Three-Way Handshake
134
Table 36 Common IP Ports
134
Figure 59 SYN Flood
135
Figure 60 Smurf Attack
136
ICMP Vulnerability
136
Illegal Commands (Netbios and SMTP)
136
Table 37 ICMP Commands that Trigger Alerts
136
Table 38 Legal Netbios Commands
136
Traceroute
137
Stateful Inspection
137
Table 39 Legal SMTP Commands
137
Figure 61 Stateful Inspection
138
Stateful Inspection Process
138
Stateful Inspection and the Prestige
139
TCP Security
139
UDP/ICMP Security
140
Upper Layer Protocols
140
Guidelines for Enhancing Security with Your Firewall
140
Security in General
141
Packet Filtering Vs Firewall
142
Packet Filtering
142
When to Use Filtering
142
Firewall
142
When to Use the Firewall
142
Chapter 13 Firewall Configuration
145
Access Methods
145
Firewall Policies Overview
145
Rule Logic Overview
146
Rule Checklist
146
Security Ramifications
146
Key Fields for Configuring Rules
147
Action
147
Destination Address
147
Service
147
Source Address
147
Connection Direction Example
147
LAN to WAN Rules
148
WAN to LAN Rules
148
Figure 62 LAN to WAN Traffic
148
Figure 63 WAN to LAN Traffic
148
Alerts
149
Configuring Basic Firewall Settings
149
Figure 64 Firewall: Default Policy
149
Table 40 Firewall: Default Policy
149
Rule Summary
150
Figure 65 Firewall: Rule Summary
150
Table 41 Rule Summary
151
Configuring Firewall Rules
152
Figure 66 Firewall: Edit Rule
153
Table 42 Firewall: Edit Rule
154
Customized Services
155
Creating/Editing a Customized Service
155
Figure 67 Firewall: Customized Services
155
Table 43 Customized Services
155
Example Firewall Rule
156
Figure 68 Firewall: Configure Customized Services
156
Table 44 Firewall: Configure Customized Services
156
Figure 69 Firewall Example: Rule Summary
157
Figure 70 Firewall Example: Edit Rule: Destination Address
158
Figure 71 Edit Custom Port Example
158
Figure 72 Firewall Example: Edit Rule: Select Customized Services
159
Predefined Services
160
Figure 73 Firewall Example: Rule Summary: My Service
160
Table 45 Predefined Services
160
Anti-Probing
162
Configuring Attack Alert
163
Figure 74 Firewall: Anti Probing
163
Table 46 Firewall: Anti Probing
163
Half-Open Sessions
164
TCP Maximum Incomplete and Blocking Time
164
Figure 75 Firewall: Threshold
165
Table 47 Firewall: Threshold
165
Threshold Values
164
Chapter 14 Content Filtering
167
Content Filtering Overview
167
Configuring Keyword Blocking
167
Figure 76 Content Filter: Keyword
167
Configuring the Schedule
168
Figure 77 Content Filter: Schedule
168
Table 48 Content Filter: Keyword
168
Configuring Trusted Computers
169
Figure 78 Content Filter: Trusted
169
Table 49 Content Filter: Schedule
169
Table 50 Content Filter: Trusted
169
Chapter 15 Remote Management Configuration
171
Remote Management Overview
171
Remote Management Limitations
171
Remote Management and NAT
172
System Timeout
172
Telnet
172
Ftp
172
Figure 79 Telnet Configuration on a TCP/IP Network
172
Web
173
Configuring Remote Management
173
Figure 80 Remote Management
173
Table 51 Remote Management
173
Chapter 16 Universal Plug-And-Play (Upnp)
175
Introducing Universal Plug and Play
175
How Do I Know if I'M Using Upnp
175
NAT Traversal
175
Cautions with Upnp
175
Upnp and Zyxel
176
Configuring Upnp
176
Figure 81 Configuring Upnp
176
Table 52 Configuring Upnp
177
Installing Upnp in Windows Example
177
Installing Upnp in Windows Me
177
Figure 82 Add/Remove Programs: Windows Setup: Communication
178
Figure 83 Add/Remove Programs: Windows Setup: Communication: Components
178
Figure 84 Network Connections
179
Figure 85 Windows Optional Networking Components Wizard
180
Figure 86 Networking Services
181
Using Upnp in Windows XP Example
181
Auto-Discover Your Upnp-Enabled Network Device
181
Figure 87 Network Connections
182
Figure 88 Internet Connection Properties
183
Figure 89 Internet Connection Properties: Advanced Settings
184
Figure 90 Internet Connection Properties: Advanced Settings: Add
184
Figure 91 System Tray Icon
185
Figure 92 Internet Connection Status
185
Web Configurator Easy Access
185
Figure 93 Network Connections
186
Figure 94 Network Connections: My Network Places
187
Figure 95 Network Connections: My Network Places: Properties: Example
187
Chapter 17 Logs Screens
189
Logs Overview
189
Alerts and Logs
189
Configuring Log Settings
189
Figure 96 Log Settings
190
Table 53 Log Settings
190
Displaying the Logs
191
SMTP Error Messages
192
Figure 97 View Logs
192
Table 54 View Logs
192
Table 55 SMTP Error Messages
192
Example E-Mail Log
193
Figure 98 E-Mail Log Example
193
Chapter 18 Media Bandwidth Management Advanced Setup
195
Bandwidth Management Advanced Setup Overview
195
Bandwidth Classes and Filters
195
Proportional Bandwidth Allocation
196
Bandwidth Management Usage Examples
196
Application-Based Bandwidth Management Example
196
Subnet-Based Bandwidth Management Example
196
Figure 99 Application-Based Bandwidth Management Example
196
Application and Subnet-Based Bandwidth Management Example
197
Figure 100 Subnet-Based Bandwidth Management Example
197
Figure 101 Application and Subnet-Based Bandwidth Management Example
197
Table 56 Application and Subnet-Based Bandwidth Management Example
197
Scheduler
198
Priority-Based Scheduler
198
Fairness-Based Scheduler
198
Maximize Bandwidth Usage
198
Reserving Bandwidth for Non-Bandwidth Class Traffic
198
Maximize Bandwidth Usage Example
199
Figure 102 Bandwidth Allotment Example
199
Bandwidth Borrowing
200
Bandwidth Borrowing Example
200
Figure 103 Maximize Bandwidth Usage Example
200
Maximize Bandwidth Usage with Bandwidth Borrowing
201
Configuring Summary
201
Figure 104 Bandwidth Borrowing Example
201
Figure 105 Media Bandwidth Management: Summary
202
Table 57 Media Bandwidth Management: Summary
202
Configuring Class Setup
203
Figure 106 Media Bandwidth Management: Class Setup
203
Table 58 Media Bandwidth Management: Class Setup
203
Diffserv
204
DSCP and Per-Hop Behavior
204
Figure 107 Diffserv: Differentiated Service Field
204
Media Bandwidth Management Class Configuration
204
Figure 108 Media Bandwidth Management: Class Configuration
205
Table 59 Media Bandwidth Management: Class Configuration
205
Media Bandwidth Management Statistics
207
Table 60 Services and Port Numbers
207
Bandwidth Monitor
208
Figure 109 Media Bandwidth Management Statistics
208
Table 61 Media Bandwidth Management Statistics
208
Figure 110 Media Bandwidth Management: Monitor
209
Table 62 Media Bandwidth Management: Monitor
209
Chapter 19 Maintenance
211
Maintenance Overview
211
System Status Screen
211
Figure 111 System Status
212
Table 63 System Status
212
System Statistics
213
Figure 112 System Status: Show Statistics
214
Table 64 System Status: Show Statistics
214
DHCP Table Screen
215
Figure 113 DHCP Table
215
Table 65 DHCP Table
215
Any IP Table Screen
216
Wireless Screen
216
Association List
216
Figure 114 any IP Table
216
Table 66 any IP Table
216
Diagnostic Screens
217
Diagnostic General Screen
217
Figure 115 Association List
217
Table 67 Association List
217
Diagnostic DSL Line Screen
218
Figure 116 Diagnostic: General
218
Table 68 Diagnostic: General
218
Figure 117 Diagnostic: DSL Line
219
Table 69 Diagnostic: DSL Line
219
Firmware Screen
220
Figure 118 Firmware Upgrade
220
Table 70 Firmware Upgrade
220
Figure 119 Network Temporarily Disconnected
221
Figure 120 Error Message
221
Chapter 20 Introducing the SMT
223
SMT Introduction
223
Procedure for SMT Configuration Via Telnet
223
Entering Password
223
Prestige SMT Menu Overview
224
Navigating the SMT Interface
224
Figure 121 Login Screen
224
Figure 122 Prestige SMT Menu Overview
224
Table 71 Navigating the SMT Interface
225
Table 72 SMT Main Menu
225
System Management Terminal Interface Summary
226
Changing the System Password
226
Table 73 Main Menu Summary
226
Figure 123 Menu 23.1 Change Password
227
Chapter 21 Menu 1 General Setup
229
General Setup
229
Procedure to Configure Menu 1
229
Procedure to Configure Dynamic DNS
230
Figure 124 Menu 1 General Setup
230
Table 74 Menu 1 General Setup
230
Figure 125 Menu 1.1 Configure Dynamic DNS
231
Table 75 Menu 1.1 Configure Dynamic DNS
231
Chapter 22 Menu 2 WAN Backup Setup
233
Introduction to WAN Backup Setup
233
Configuring Dial Backup in Menu 2
233
Figure 126 Menu 2 WAN Backup Setup
233
Figure 127 Menu 2.1Traffic Redirect Setup
234
Table 76 Menu 2 WAN Backup Setup
234
Table 77 Menu 2.1Traffic Redirect Setup
234
Traffic Redirect Setup
234
Chapter 23 Menu 3 LAN Setup
237
LAN Setup
237
General Ethernet Setup
237
Figure 128 Menu 3 LAN Setup
237
Figure 129 Menu 3.1 LAN Port Filter Setup
237
Protocol Dependent Ethernet Setup
238
CP/IP Ethernet Setup and DHCP
238
Figure 130 Menu 3.2 TCP/IP and DHCP Ethernet Setup
238
Table 78 DHCP Ethernet Setup
239
Table 79 TCP/IP Ethernet Setup
239
Chapter 24 Wireless LAN Setup
241
Wireless LAN Overview
241
Wireless LAN Setup
241
Figure 131 Menu 3.5 - Wireless LAN Setup
241
Table 80 Menu 3.5 - Wireless LAN Setup
241
Wireless LAN MAC Address Filter
242
Figure 132 Menu 3.5.1 WLAN MAC Address Filtering
243
Table 81 Menu 3.5.1 WLAN MAC Address Filtering
243
Chapter 25 Internet Access
245
Internet Access Overview
245
IP Policies
245
IP Alias
245
IP Alias Setup
246
Figure 133 IP Alias Network Example
246
Figure 134 Menu 3.2 TCP/IP and DHCP Setup
246
Route IP Setup
247
Figure 135 Menu 3.2.1 IP Alias Setup
247
Table 82 Menu 3.2.1 IP Alias Setup
247
Internet Access Configuration
248
Figure 136 Menu 1 General Setup
248
Figure 137 Menu 4 Internet Access Setup
248
Table 83 Menu 4 Internet Access Setup
249
Chapter 26 Remote Node Configuration
251
Remote Node Setup Overview
251
Remote Node Setup
251
Remote Node Profile
251
Encapsulation and Multiplexing Scenarios
252
Figure 138 Menu 11 Remote Node Setup
252
Scenario 1: One VC, Multiple Protocols
252
Scenario 2: One VC, One Protocol (IP)
252
Scenario 3: Multiple Vcs
252
Figure 139 Menu 11.1 Remote Node Profile
253
Table 84 Menu 11.1 Remote Node Profile
253
Outgoing Authentication Protocol
254
Remote Node Network Layer Options
255
Figure 140 Menu 11.3 Remote Node Network Layer Options
255
Table 85 Menu 11.3 Remote Node Network Layer Options
255
My WAN Addr Sample IP Addresses
256
Remote Node Filter
257
Figure 141 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
257
Figure 142 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
257
Editing ATM Layer Options
258
VC-Based Multiplexing (Non-PPP Encapsulation)
258
LLC-Based Multiplexing or PPP Encapsulation
258
Figure 143 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
258
Figure 144 Menu 11.6 for VC-Based Multiplexing
258
Advance Setup Options
259
Figure 145 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
259
Figure 146 Menu 11.1 Remote Node Profile
259
Figure 147 Menu 11.8 Advance Setup Options
260
Table 86 Menu 11.8 Advance Setup Options
260
Chapter 27 Static Route Setup
261
IP Static Route Overview
261
Configuration
261
Figure 148 Sample Static Routing Topology
261
Figure 149 Menu 12 Static Route Setup
262
Figure 150 Menu 12.1 IP Static Route Setup
262
Figure 151 Menu12.1.1 Edit IP Static Route
262
Table 87 Menu12.1.1 Edit IP Static Route
263
Chapter 28 Bridging Setup
265
Bridging in General
265
Bridge Ethernet Setup
265
Remote Node Bridging Setup
265
Figure 152 Menu 11.1 Remote Node Profile
266
Figure 153 Menu 11.3 Remote Node Network Layer Options
266
Table 88 Remote Node Network Layer Options: Bridge Fields
266
Bridge Static Route Setup
267
Figure 154 Menu 12.3.1 Edit Bridge Static Route
267
Table 89 Menu 12.3.1 Edit Bridge Static Route
267
Chapter 29 Network Address Translation (NAT)
269
Network Address Translation (NAT)
269
Using NAT
269
SUA (Single User Account) Versus NAT
269
Applying NAT
269
Figure 155 Menu 4 Applying NAT for Internet Access
270
Figure 156 Applying NAT in Menus 4 & 11.3
270
NAT Setup
271
Address Mapping Sets
271
Figure 157 Menu 15 NAT Setup
271
Table 90 Applying NAT in Menus 4 & 11.3
271
Figure 158 Menu 15.1 Address Mapping Sets
272
Figure 159 Menu 15.1.255 SUA Address Mapping Rules
272
SUA Address Mapping Set
272
Table 91 SUA Address Mapping Rules
272
Figure 160 Menu 15.1.1 First Set
273
User-Defined Address Mapping Sets
273
Figure 161 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
274
Ordering Your Rules
274
Table 92 Menu 15.1.1 First Set
274
Configuring a Server Behind NAT
275
Figure 162 Menu 15.2 NAT Server Setup
275
Table 93 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
275
General NAT Examples
276
Figure 163 Menu 15.2.1 NAT Server Setup
276
Figure 164 Multiple Servers Behind NAT Example
276
Example 1: Internet Access Only
277
Example 2: Internet Access with an Inside Server
277
Figure 165 NAT Example 1
277
Figure 166 Menu 4 Internet Access & NAT Example
277
Example 3: Multiple Public IP Addresses with Inside Servers
278
Figure 167 NAT Example 2
278
Figure 168 Menu 15.2.1 Specifying an Inside Server
278
Figure 169 NAT Example 3
279
Figure 170 Example 3: Menu 11.3
280
Figure 171 Example 3: Menu 15.1.1.1
280
Figure 172 Example 3: Final Menu 15.1.1
281
Figure 173 Example 3: Menu 15.2.1
281
Example 4: NAT Unfriendly Application Programs
282
Figure 174 NAT Example 4
282
Figure 175 Example 4: Menu 15.1.1.1 Address Mapping Rule
282
Figure 176 Example 4: Menu 15.1.1 Address Mapping Rules
283
Chapter 30 Enabling the Firewall
285
Remote Management and the Firewall
285
Access Methods
285
Enabling the Firewall
285
Figure 177 Menu 21.2 Firewall Setup
286
Chapter 31 Filter Configuration
287
About Filtering
287
Figure 178 Outgoing Packet Filtering Process
287
Figure 179 Filter Rule Process
288
The Filter Structure of the Prestige
288
Configuring a Filter Set for the Prestige
289
Figure 180 Menu 21 Filter Set Configuration
289
Figure 181 Netbios_Wan Filter Rules Summary
289
Filter Rules Summary Menus
290
Figure 182 Netbios_Lan Filter Rules Summary
290
Figure 183 IGMP Filter Rules Summary
290
Table 94 Abbreviations Used in the Filter Rules Summary Menu
290
Configuring a Filter Rule
291
Table 95 Rule Abbreviations Used
291
Figure 184 Menu 21.1.X.1 TCP/IP Filter Rule
292
Table 96 Menu 21.1.X.1 TCP/IP Filter Rule
292
TCP/IP Filter Rule
292
Figure 185 Executing an IP Filter
294
Generic Filter Rule
294
Figure 186 Menu 21.1.5.1 Generic Filter Rule
295
Table 97 Menu 21.1.5.1 Generic Filter Rule
295
Filter Types and NAT
296
Example Filter
296
Figure 187 Protocol and Device Filter Sets
296
Figure 188 Sample Telnet Filter
297
Figure 189 Menu 21.1.6.1 Sample Filter
297
Applying Filters and Factory Defaults
298
Figure 190 Menu 21.1.6.1 Sample Filter Rules Summary
298
Table 98 Filter Sets Table
298
Ethernet Traffic
299
Figure 191 Filtering Ethernet Traffic
299
Figure 192 Filtering Remote Node Traffic
299
Remote Node Filters
299
Chapter 32 SNMP Configuration
301
About SNMP
301
Figure 193 SNMP Management Model
301
Supported Mibs
302
SNMP Configuration
302
SNMP Traps
303
Figure 194 Menu 22 SNMP Configuration
303
Table 99 Menu 22 SNMP Configuration
303
Table 100 SNMP Traps
303
Table 101 Ports and Permanent Virtual Circuits
304
Chapter 33 System Security
305
System Security
305
System Password
305
Configuring External RADIUS Server
305
Figure 195 Menu 23 - System Security
305
Figure 196 Menu 23.2 System Security: RADIUS Server
306
Table 102 Menu 23.2 System Security: RADIUS Server
306
Ieee802.1X
307
Figure 197 Menu 23 System Security
307
Figure 198 Menu 23.4 System Security: Ieee802.1X
307
Table 103 Menu 23.4 System Security : Ieee802.1X
308
Creating User Accounts on the Prestige
309
Figure 199 Menu 14 Dial-In User Setup
310
Figure 200 Menu 14.1 Edit Dial-In User
310
Table 104 Menu 14.1 Edit Dial-In User
310
Chapter 34 System Information and Diagnosis
311
Overview
311
System Status
311
Figure 201 Menu 24 System Maintenance
311
Figure 202 Menu 24.1 System Maintenance : Status
312
Table 105 Menu 24.1 System Maintenance : Status
312
System Information
313
Figure 203 Menu 24.2 System Information and Console Port Speed
313
Console Port Speed
314
Figure 204 Menu 24.2.1 System Maintenance: Information
314
Table 106 Menu 24.2.1 System Maintenance: Information
314
Log and Trace
315
Viewing Error Log
315
Figure 205 Menu 24.2.2 System Maintenance : Change Console Port Speed
315
Figure 206 Menu 24.3 System Maintenance: Log and Trace
315
Syslog and Accounting
316
Figure 207 Sample Error and Information Messages
316
Figure 208 Menu 24.3.2 System Maintenance: Syslog and Accounting
316
Table 107 Menu 24.3.2 System Maintenance : Syslog and Accounting
316
Figure 209 Syslog Example
317
Diagnostic
318
Figure 210 Menu 24.4 System Maintenance : Diagnostic
318
Table 108 Menu 24.4 System Maintenance Menu: Diagnostic
319
Chapter 35 Firmware and Configuration File Maintenance
321
Filename Conventions
321
Backup Configuration
322
Table 109 Filename Conventions
322
Example of FTP Commands from the Command Line
323
Figure 211 Telnet in Menu 24.5
323
Using the FTP Command from the Command Line
323
Figure 212 FTP Session Example
324
GUI-Based FTP Clients
324
Table 110 General Commands for GUI-Based FTP Clients
324
TFTP and FTP over WAN Management Limitations
324
Backup Configuration Using TFTP
325
GUI-Based TFTP Clients
325
Maintenance
325
TFTP Command Example
325
Restore Configuration
326
Restore Using FTP
326
Table 111 General Commands for GUI-Based TFTP Clients
326
Restore Using FTP Session Example
327
Figure 213 Telnet into Menu 24.6
327
Figure 214 Restore Using FTP Session Example
327
Uploading Firmware and Configuration Files
328
Firmware File Upload
328
Configuration File Upload
328
Figure 215 Telnet into Menu 24.7.1 Upload System Firmware
328
FTP File Upload Command from the DOS Prompt Example
329
Figure 216 Telnet into Menu 24.7.2 System Maintenance
329
FTP Session Example of Firmware File Upload
330
TFTP File Upload
330
Figure 217 FTP Session Example of Firmware File Upload
330
TFTP Upload Command Example
331
Chapter 36 System Maintenance
333
Command Interpreter Mode
333
Figure 218 Command Mode in Menu 24
333
Figure 219 Valid Commands
333
Call Control Support
334
Budget Management
334
Figure 220 Menu 24.9 System Maintenance: Call Control
334
Figure 221 Menu 24.9.1 System Maintenance: Budget Management
334
Time and Date Setting
335
Figure 222 Menu 24 System Maintenance
335
Table 112 Menu 24.9.1 System Maintenance : Budget Management
335
Figure 223 Menu 24.10 System Maintenance: Time and Date Setting
336
Resetting the Time
336
Table 113 Menu 24.10 System Maintenance: Time and Date Setting
336
Chapter 37 Remote Management
339
Remote Management Overview
339
Remote Management
339
Remote Management Setup
339
Remote Management Limitations
340
Figure 224 Menu 24.11 Remote Management Control
340
Table 114 Menu 24.11 Remote Management Control
340
Remote Management and NAT
341
System Timeout
341
Chapter 38 IP Policy Routing
343
IP Policy Routing Overview
343
Benefits of IP Policy Routing
343
Routing Policy
343
IP Routing Policy Setup
344
Figure 225 Menu 25 IP Routing Policy Setup
344
Figure 226 Menu 25.1 IP Routing Policy Setup
345
Table 115 Menu 25.1 IP Routing Policy Setup
345
Figure 227 Menu 25.1.1 IP Routing Policy
346
Table 116 Menu 25.1.1 IP Routing Policy
346
Applying an IP Policy
347
Ethernet IP Policies
347
IP Policy Routing Example
348
Figure 228 Menu 3.2 TCP/IP and DHCP Ethernet Setup
348
Figure 229 Menu 11.3 Remote Node Network Layer Options
348
Figure 230 Example of IP Policy Routing
349
Figure 231 IP Routing Policy Example
350
Figure 232 IP Routing Policy Example
351
Figure 233 Applying IP Policies Example
351
Chapter 39 Call Scheduling
353
Introduction
353
Figure 234 Menu 26 Schedule Setup
353
Figure 235 Menu 26.1 Schedule Set Setup
354
Table 117 Menu 26.1 Schedule Set Setup
354
Figure 236 Applying Schedule Set(S) to a Remote Node (Pppoe)
355
Chapter 40 Internal SPTGEN
357
Internal SPTGEN Overview
357
The Configuration Text File Format
357
Figure 237 Configuration Text File Format: Column Descriptions
357
Internal SPTGEN File Modification - Important Points to Remember
358
Internal SPTGEN FTP Download Example
358
Figure 238 Invalid Parameter Entered: Command Line Example
358
Figure 239 Valid Parameter Entered: Command Line Example
358
Internal SPTGEN FTP Upload Example
359
Figure 240 Internal SPTGEN FTP Download Example
359
Figure 241 Internal SPTGEN FTP Upload Example
359
Chapter 41 Troubleshooting
361
Problems Starting up the Prestige
361
Problems with the LAN LED
361
Table 118 Troubleshooting the Start-Up of Your Prestige
361
Table 119 Troubleshooting the LAN LED
361
Problems with the DSL LED
362
Problems with the LAN Interface
362
Problems with the WAN Interface
362
Table 120 Troubleshooting the DSL LED
362
Table 121 Troubleshooting the LAN Interface
362
Table 122 Troubleshooting the WAN Interface
362
Problems with Internet Access
363
Problems with the Password
363
Table 123 Troubleshooting Internet Access
363
Table 124 Troubleshooting the Password
363
Problems with the Web Configurator
364
Problems with Remote Management
364
Table 125 Troubleshooting the Web Configurator
364
Table 126 Troubleshooting Remote Management
364
Appendix A Splitters and Microfilters
365
Connecting a POTS Splitter
365
Figure 242 Connecting a POTS Splitter
365
Telephone Microfilters
366
Prestige with ISDN
366
Figure 243 Connecting a Microfilter
366
Figure 244 Prestige with ISDN
367
Appendix B Setting up Your Computer's IP Address
369
Windows 95/98/Me
369
Installing Components
370
Figure 245 Windows 95/98/Me: Network: Configuration
370
Configuring
371
Figure 246 Windows 95/98/Me: TCP/IP Properties: IP Address
371
Verifying Settings
372
Windows 2000/NT/XP
372
Figure 247 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
372
Figure 248 Windows XP: Start Menu
373
Figure 249 Windows XP: Control Panel
373
Figure 250 Windows XP: Control Panel: Network Connections: Properties
374
Figure 251 Windows XP: Local Area Connection Properties
374
Figure 252 Windows XP: Advanced TCP/IP Settings
375
Verifying Settings
376
Macintosh os 8/9
376
Figure 253 Windows XP: Internet Protocol (TCP/IP) Properties
376
Figure 254 Macintosh os 8/9: Apple Menu
377
Figure 255 Macintosh os 8/9: TCP/IP
377
Verifying Settings
378
Macintosh os X
378
Figure 256 Macintosh os X: Apple Menu
378
Figure 257 Macintosh os X: Network
379
Verifying Settings
379
Appendix Cip Subnetting
381
IP Addressing
381
IP Classes
381
Table 127 Classes of IP Addresses
381
Subnet Masks
382
Subnetting
382
Table 128 Allowed IP Address Range by Class
382
Table 129 "Natural" Masks
382
Example: Two Subnets
383
Table 130 Alternative Subnet Mask Notation
383
Table 131 Two Subnets Example
383
Table 132 Subnet 1
384
Table 133 Subnet 2
384
Example: Four Subnets
385
Table 134 Subnet 1
385
Table 135 Subnet 2
385
Table 136 Subnet 3
385
Example Eight Subnets
386
Table 137 Subnet 4
386
Table 138 Eight Subnets
386
Table 139 Class C Subnet Planning
386
Subnetting with Class a and Class B Networks
387
Table 140 Class B Subnet Planning
387
Appendix D Pppoe
389
Pppoe in Action
389
Benefits of Pppoe
389
Traditional Dial-Up Scenario
389
How Pppoe Works
390
Prestige as a Pppoe Client
390
Figure 258 Single-Computer Per Router Hardware Configuration
390
Figure 259 Prestige as a Pppoe Client
390
Appendix E
391
Virtual Circuit Topology
391
Figure 260 Virtual Circuit Topology
391
Appendix F Wireless Lans
393
Wireless LAN Topologies
393
Ad-Hoc Wireless LAN Configuration
393
Bss
393
Figure 261 Peer-To-Peer Communication in an Ad-Hoc Network
393
Ess
394
Figure 262 Basic Service Set
394
Channel
395
Rts/Cts
395
Figure 263 Infrastructure WLAN
395
Fragmentation Threshold
396
Figure 264 RTS/CTS
396
Preamble Type
397
IEEE 802.11G Wireless LAN
397
Table 141 Ieee802.11G
397
IEEE 802.1X
398
Radius
398
Types of RADIUS Messages
398
EAP Authentication
399
Figure 265 EAP Authentication
399
Types of Authentication
400
EAP-MD5 (Message-Digest Algorithm 5)
400
EAP-TLS (Transport Layer Security)
400
EAP-TTLS (Tunneled Transport Layer Service)
400
PEAP (Protected EAP)
401
Leap
401
WEP Authentication Steps
401
Figure 266 WEP Authentication Steps
401
Dynamic WEP Key Exchange
402
Table 142 Comparison of EAP Authentication Types
402
Wpa
403
User Authentication
403
Encryption
403
Security Parameters Summary
404
Roaming
404
Table 143 Wireless Security Relational Matrix
404
Figure 267 Roaming Example
405
Requirements for Roaming
405
Appendix G Antenna Selection and Positioning Recommendation
407
Antenna Characteristics
407
Frequency
407
Radiation Pattern
407
Antenna Gain
407
Connector Type
408
Types of Antennas for WLAN
408
Positioning Antennas
408
Advertisement
ZyXEL Communications P-660HW-D3 V2 Install Manual (2 pages)
P-660HW Series 802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0 MB
Advertisement
Related Products
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HW-DX V2 - V3.40
ZyXEL Communications P-660HW-D1 V2
ZyXEL Communications P-660HW-DX
ZyXEL Communications P-660HW-T - VERSION 3.40
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P660HW3
ZyXEL Communications P-660HWP-Dx
ZyXEL Communications P-660HW-Tx v2 Series
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL