Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HW-DX
ZyXEL Communications P-660HW-DX Manuals
Manuals and User Guides for ZyXEL Communications P-660HW-DX. We have
1
ZyXEL Communications P-660HW-DX manual available for free PDF download: User Manual
ZyXEL Communications P-660HW-DX User Manual (364 pages)
802.11g Wireless ADSL 2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 11.29 MB
Table of Contents
Contents Overview
9
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
31
PART I Introduction
31
Chapter 1 Introducing the Zyxel Device
33
Downstream
33
Overview
33
Figure 1 Protected Internet Access Applications
34
Figure 2 LAN-To-LAN Application Example
34
Table 1 ADSL Standards
34
Figure 3 Front Panel
35
Good Habits for Managing the Zyxel Device
35
Leds
35
Ways to Manage the Zyxel Device
35
Hardware Connections
36
Table 2 Front Panel Leds
36
Chapter 2 Introducing the Web Configurator
37
Accessing the Web Configurator
37
Default LAN IP Address
37
Administrator Access
38
Figure 4 Password Screen
38
Figure 5 User Status Screen
38
User Access
38
Figure 6 Change Password at Login
39
Figure 7 Select a Mode
39
Navigating the Web Configurator
40
Navigation Panel
40
Resetting the Zyxel Device
40
Using the Reset Button
40
Figure 8 Web Configurator: Main Screen
41
Table 3 Web Configurator Screens Summary
41
Status Screen
43
Figure 9 Status Screen
44
Table 4 Status Screen
44
Figure 10 Status: any IP Table
46
Figure 11 Status: WLAN Status
46
Status: any IP Table
46
Status: WLAN Status
46
Table 5 Status: any IP Table
46
Figure 12 Status: Bandwidth Status
47
Status: Bandwidth Status
47
Status: Packet Statistics
47
Table 6 Status: WLAN Status
47
Figure 13 Status: Packet Statistics
48
Table 7 Status: Packet Statistics
48
Changing Login Password
49
Figure 14 System General
49
Web Configurator Overview
37
Wizards
51
Part II: Wizards
51
Chapter 3 Wizard Setup for Internet Access
53
Figure 15 Select a Mode
53
Internet Access Wizard Setup
53
Introduction
53
Detection
54
Automatic Detection
55
Figure 18 Auto Detection: Failed
55
Figure 19 Auto-Detection: Pppoe
55
Manual Configuration
55
Figure 20 Internet Access Wizard Setup: ISP Parameters
56
Table 8 Internet Access Wizard Setup: ISP Parameters
56
Figure 21 Internet Connection with Pppoe
57
Figure 22 Internet Connection with RFC 1483
57
Table 10 Internet Connection with RFC 1483
57
Table 9 Internet Connection with Pppoe
57
Figure 23 Internet Connection with ENET ENCAP
58
Table 11 Internet Connection with ENET ENCAP
58
Figure 24 Internet Connection with Pppoa
59
Figure 25 Connection Test Failed-1
59
Table 12 Internet Connection with Pppoa
59
Figure 26 Connection Test Failed-2
60
Figure 27 Connection Test Successful
60
Wireless Connection Wizard Setup
60
Figure 28 Wireless LAN Setup Wizard 1
61
Table 13 Wireless LAN Setup Wizard 1
61
Figure 29 Wireless LAN Setup Wizard 2
62
Table 14 Wireless LAN Setup Wizard 2
62
Figure 30 Manually Assign a WPA Key
63
Manually Assign a WEP Key
63
Manually Assign a WPA-PSK Key
63
Table 15 Manually Assign a WPA Key
63
Figure 16 Wizard: Welcome
54
Figure 17 Auto Detection: no DSL Connection
54
Extended Wireless Security
63
Figure 31 Manually Assign a WEP Key
64
Figure 32 Wireless LAN Setup 3
64
Table 16 Manually Assign a WEP Key
64
Figure 33 Internet Access and WLAN Wizard Setup Complete
65
Chapter 4 Bandwidth Management Wizard
67
Introduction
67
Predefined Media Bandwidth Management Services
67
Table 17 Media Bandwidth Management Setup: Services
67
Bandwidth Management Wizard Setup
68
Figure 34 Select a Mode
68
Figure 35 Wizard: Welcome
69
Figure 36 Bandwidth Management Wizard: General Information
69
Table 18 Bandwidth Management Wizard: General Information
69
Figure 37 Bandwidth Management Wizard: Configuration
70
Table 19 Bandwidth Management Wizard: Configuration
70
Figure 38 Bandwidth Management Wizard: Complete
71
Network
73
Part III: Network
73
WAN Setup
75
Chapter 5 WAN Setup
75
Enet Encap
75
Encapsulation and Multiplexing Scenarios
76
Multiplexing
76
Pppoa
76
Rfc 1483
76
IP Address Assignment
77
Nailed-Up Connection (PPP)
77
VPI and VCI
77
Metric
78
Nat
78
Traffic Shaping
78
ATM Traffic Classes
79
Figure 39 Example of Traffic Shaping
79
Internet Connection
80
Zero Configuration Internet Access
80
Figure 40 Internet Connection (Pppoe)
81
Table 20 Internet Connection
81
Configuring Advanced Internet Connection Setup
82
Figure 41 Advanced Internet Connection Setup
83
Table 21 Advanced Internet Connection Setup
83
Configuring more Connections
84
Figure 42 more Connections
84
More Connections Edit
85
Table 22 more Connections
85
Figure 43 more Connections Edit
86
Table 23 more Connections Edit
86
Configuring more Connections Advanced Setup
88
Figure 44 more Connections Advanced Setup
88
Table 24 more Connections Advanced Setup
88
Configuring WAN Backup
89
Figure 45 Traffic Redirect Example
89
Figure 46 Traffic Redirect LAN Setup
89
Traffic Redirect
89
Figure 47 WAN Backup Setup
90
Table 25 WAN Backup Setup
90
PPP over Ethernet
75
WAN Overview
75
Encapsulation
75
Chapter 6 LAN Setup
93
LAN Overview
93
Figure 48 LAN and WAN IP Addresses
93
Lans, Wans and the Zyxel Device
93
DHCP Setup
94
DNS Server Addresses
94
Lan Tcp/Ip
94
LAN Setup
93
Dns
94
IP Address and Subnet Mask
95
Multicast
96
RIP Setup
96
Any IP
97
Figure 49 any IP Example
97
Configuring LAN IP
98
Figure 50 LAN IP
98
Table 26 LAN IP
98
Configuring Advanced LAN Setup
99
Figure 51 Advanced LAN Setup
99
Table 27 Advanced LAN Setup
99
DHCP Setup
100
Figure 52 DHCP Setup
100
Table 28 DHCP Setup
100
Figure 53 LAN Client List
101
LAN Client List
101
Table 29 LAN Client List
101
Figure 54 Physical Network & Partitioned Logical Networks
102
LAN IP Alias
102
Figure 55 LAN IP Alias
103
Table 30 LAN IP Alias
103
Chapter 7 Wireless LAN
105
Wireless Network Overview
105
Figure 56 Example of a Wireless Network
105
Wireless Security Overview
106
MAC Address Filter
106
Ssid
106
User Authentication
106
Encryption
107
Table 31 Types of Encryption for each Type of Authentication
107
And Local (User) Database
107
One-Touch Intelligent Security Technology (OTIST)
108
General Wireless LAN Screen
108
Figure 57 Wireless LAN: General
108
Key
108
WPA Compatible
108
No Security
109
Table 32 Wireless LAN: General
109
Figure 58 Wireless: no Security
110
Table 33 Wireless no Security
110
WEP Encryption
110
Wireless LAN
105
Encryption
110
Figure 59 Wireless: Static WEP Encryption
111
Table 34 Wireless: Static WEP Encryption
111
Wpa-Psk/Wpa2-Psk
111
Figure 60 Wireless: WPA-PSK/WPA2-PSK
112
Table 35 Wireless: WPA-PSK/WPA2-PSK
112
Wpa/Wpa2
113
Figure 61 Wireless: WPA/WPA2
114
Table 36 Wireless: WPA/WPA2
114
Wireless LAN Advanced Setup
115
Figure 62 Advanced
116
Table 37 Wireless LAN: Advanced
116
Enabling OTIST
117
Otist
117
Figure 63 OTIST
118
Table 38 OTIST
118
Figure 64 Example Wireless Client OTIST Screen
119
Figure 65 Security Key
119
Figure 66 OTIST in Progress (AP)
119
Starting OTIST
119
Figure 67 OTIST in Progress (Client)
120
Figure 68 no AP with OTIST Found
120
Figure 69 Start OTIST
120
Notes on OTIST
120
Figure 70 MAC Address Filter
121
MAC Filter
121
Table 39 MAC Address Filter
121
Table 40 WMM Qos Priorities
122
WMM Qos
122
WMM Qos Example
122
WMM Qos Priorities
122
Services
123
Table 41 Commonly Used Services
124
Qos Screen
125
Tos (Type of Service) and WMM Qos
125
Figure 71 Wireless LAN: Qos
126
Table 42 Wireless Lan: Qos
126
Application Priority Configuration
127
Figure 72 Application Priority Configuration
127
Table 43 Application Priority Configuration
127
E-Mail
127
Chapter 8 Network Address Translation (NAT) Screens
129
NAT Overview
129
NAT Definitions
129
Table 44 NAT Definitions
129
Figure 73 How NAT Works
130
How NAT Works
130
NAT Application
130
Network Address Translation (NAT) Screens
130
What NAT Does
130
Figure 74 NAT Application with IP Alias
131
NAT Mapping Types
131
SUA (Single User Account) Versus NAT
132
Sip Alg
132
Table 45 NAT Mapping Types
132
NAT General Setup
133
Port Forwarding
133
Figure 75 NAT General
133
Table 46 NAT General
133
Default Server IP Address
134
Port Forwarding: Services and Port Numbers
134
Table 47 Services and Port Numbers
134
Echo
134
Finger
134
Configuring Port Forwarding
135
Configuring Servers Behind Port Forwarding (Example)
135
Figure 76 Multiple Servers Behind NAT Example
135
Figure 77 NAT Port Forwarding
136
Port Forwarding Rule Edit
136
Table 48 NAT Port Forwarding
136
Address Mapping
137
Figure 78 Port Forwarding Rule Setup
137
Table 49 Port Forwarding Rule Setup
137
Figure 79 Address Mapping Rules
138
Table 50 Address Mapping Rules
138
Address Mapping Rule Edit
139
Figure 80 Edit Address Mapping Rule
139
Table 51 Edit Address Mapping Rule
140
Security
141
Part IV: Security
141
Firewalls
143
Chapter 9 Firewalls
143
Firewall Overview
143
Types of Firewalls
143
Packet Filtering Firewalls
143
Application-Level Firewalls
144
Stateful Inspection Firewalls
144
Introduction
144
Denial of Service Attacks
145
Introduction to Zyxel's Firewall
144
Denial of Service
145
Basics
145
Figure 81 Firewall Application
145
Table 52 Common IP Ports
145
Figure 82 Three-Way Handshake
146
Types of Dos Attacks
146
Types
146
Figure 83 SYN Flood
147
Figure 84 Smurf Attack
147
Stateful Inspection
148
Table 53 ICMP Commands that Trigger Alerts
148
Table 54 Legal Netbios Commands
148
Table 55 Legal SMTP Commands
148
Figure 85 Stateful Inspection
149
Stateful Inspection Process
149
Stateful Inspection and the Zyxel Device
150
TCP Security
150
UDP/ICMP Security
151
Upper Layer Protocols
151
Guidelines for Enhancing Security with Your Firewall
152
Security in General
152
Firewall Vs Filters
153
Packet Filtering Vs Firewall
153
Firewall
153
Packet Filtering
153
Access Methods
155
Chapter 10 Firewall Configuration
155
Firewall Policies Overview
155
Policies
155
Rule Logic Overview
156
Rule Checklist
156
Security Ramifications
156
Key Fields for Configuring Rules
157
Connection Direction
157
Rule Configuration Key Fields
157
Alerts
158
LAN to WAN Rules
158
Enabling
158
Figure 86 Firewall: General
158
General Firewall Policy
158
Firewall Rules Summary
159
Table 56 Firewall: General
159
Figure 87 Firewall Rules
160
Table 57 Firewall Rules
160
Configuring Firewall Rules
161
Creating/Editing Rules
161
Figure 88 Firewall: Edit Rule
162
Address Type
163
Configuring a Customized Service
164
Customized Services
164
Figure 89 Firewall: Customized Services
164
Table 59 Customized Services
164
Table 58 Firewall: Edit Rule
163
Custom Ports
164
Example Firewall Rule
165
Figure 90 Firewall: Configure Customized Services
165
Table 60 Firewall: Configure Customized Services
165
Figure 91 Firewall Example: Rules
166
Figure 92 Edit Custom Port Example
166
Figure 93 Firewall Example: Edit Rule: Destination Address
167
Figure 94 Firewall Example: Edit Rule: Select Customized Services
168
Figure 95 Firewall Example: Rules: Myservice
169
Predefined Services
169
Table 61 Predefined Services
169
Anti-Probing
171
Figure 96 Firewall: Anti Probing
171
Dos Thresholds
172
Table 62 Firewall: Anti Probing
172
Threshold Values
172
Configuring Firewall Thresholds
173
Half-Open Sessions
173
Figure 97 Firewall: Threshold
174
Table 63 Firewall: Threshold
174
Chapter 11 Content Filtering
177
Content Filtering Overview
177
Configuring Keyword Blocking
177
Figure 98 Content Filter: Keyword
177
Configuring the Schedule
178
Figure 99 Content Filter: Schedule
178
Table 64 Content Filter: Keyword
178
Configuring Trusted Computers
179
Figure 100 Content Filter: Trusted
179
Table 65 Content Filter: Schedule
179
Table 66 Content Filter: Trusted
179
Content Filtering
177
Advanced
181
Part V: Advanced
181
Static Route
183
Chapter 12 Static Route
183
Configuring Static Route
183
Figure 101 Example of Static Routing Topology
183
Figure 102 Static Route
184
Static Route Edit
184
Table 67 Static Route
184
Figure 103 Static Route Edit
185
Table 68 Static Route Edit
185
Bandwidth Management
187
Chapter 13 Bandwidth Management
187
Bandwidth Management Overview
187
Application-Based Bandwidth Management
187
Subnet-Based Bandwidth Management
187
Application and Subnet-Based Bandwidth Management
188
Scheduler
188
Figure 104 Subnet-Based Bandwidth Management Example
188
Priority-Based Scheduler
188
Table 69 Application and Subnet-Based Bandwidth Management Example
188
Fairness-Based Scheduler
189
Maximize Bandwidth Usage
189
Maximize Bandwidth Usage Example
189
Reserving Bandwidth for Non-Bandwidth Class Traffic
189
Table 70 Maximize Bandwidth Usage Example
189
Table 71 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
190
Table 72 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
190
Bandwidth Management Priorities
191
Over Allotment of Bandwidth
191
Configuring Summary
191
Table 73 Bandwidth Management Priorities
191
Table 74 over Allotment of Bandwidth Example
191
Bandwidth Management Rule Setup
192
Figure 105 Bandwidth Management: Summary
192
Table 75 Media Bandwidth Management: Summary
192
Figure 106 Bandwidth Management: Rule Setup
193
Table 76 Bandwidth Management: Rule Setup
193
Diffserv
194
DSCP and Per-Hop Behavior
194
Figure 107 Diffserv: Differentiated Service Field
194
Rule Configuration
194
Table 77 Sub-Classes of AF Services
194
Cos
194
Differentiated Services
194
Diffserv Code Point (DSCP)
194
Diffserv Code Points
194
Diffserv Marking Rule
194
Figure 108 Bandwidth Management Rule Configuration
195
Table 78 Bandwidth Management Rule Configuration
195
Bandwidth Monitor
197
Table 79 Services and Port Numbers
197
Figure 109 Bandwidth Management: Monitor
198
Table 80 Bandwidth Management Monitor
198
Chapter 14 Dynamic DNS Setup
199
Dynamic DNS Overview
199
DYNDNS Wildcard
199
Configuring Dynamic DNS
199
Dhcp
199
Dynamic DNS
199
Dynamic DNS Setup
199
Figure 110 Dynamic DNS
200
Table 81 Dynamic DNS
200
Chapter 15 Remote Management Configuration
203
Remote Management Overview
203
Remote Management and NAT
204
Remote Management Limitations
204
System Timeout
204
Www
204
Figure 111 Remote Management: WWW
204
Telnet
205
Configuring Telnet
205
Figure 112 Telnet Configuration on a TCP/IP Network
205
Table 82 Remote Management: WWW
205
Telnet Login
206
Figure 113 Remote Management: Telnet
206
Table 83 Remote Management: Telnet
206
Configuring FTP
207
Snmp
207
Figure 114 Remote Management: FTP
207
Table 84 Remote Management: FTP
207
Figure 115 SNMP Management Model
208
Configuring SNMP
209
Figure 116 Remote Management: SNMP
209
SNMP Traps
209
Supported Mibs
209
Table 85 SNMP Traps
209
Configuring DNS
210
Table 86 Remote Management: SNMP
210
Configuring ICMP
211
Figure 117 Remote Management: DNS
211
Table 87 Remote Management: DNS
211
Figure 118 Remote Management: ICMP
212
Table 88 Remote Management: ICMP
212
Chapter 16 Universal Plug-And-Play (Upnp)
213
Introducing Universal Plug and Play
213
Cautions with Upnp
213
How Do I Know if I'M Using Upnp
213
NAT Traversal
213
Upnp and Zyxel
214
Configuring Upnp
214
Figure 119 Configuring Upnp
214
Table 89 Configuring Upnp
214
Installing Upnp in Windows Example
215
Figure 120 Add/Remove Programs: Windows Setup: Communication
215
Installing Upnp in Windows Me
215
Figure 121 Add/Remove Programs: Windows Setup: Communication: Components
216
Figure 122 Network Connections
216
Installing Upnp in Windows XP
216
Using Upnp in Windows XP Example
217
Figure 123 Windows Optional Networking Components Wizard
217
Figure 124 Networking Services
217
Auto-Discover Your Upnp-Enabled Network Device
218
Figure 125 Network Connections
218
Figure 126 Internet Connection Properties
219
Figure 127 Internet Connection Properties: Advanced Settings
219
Figure 128 Internet Connection Properties: Advanced Settings: Add
220
Figure 129 System Tray Icon
220
Figure 130 Internet Connection Status
221
Web Configurator Easy Access
221
Figure 131 Network Connections
222
Figure 132 Network Connections: My Network Places
223
Figure 133 Network Connections: My Network Places: Properties: Example
223
Maintenance and Troubleshooting
225
Part VI: Maintenance and Troubleshooting
225
System
227
Chapter 17 System
227
Domain Name
227
General Setup
227
General Setup and System Name
227
Figure 134 System General Setup
228
Table 90 System General Setup
228
Figure 135 System Time Setting
229
Time Setting
229
Date and Time Settings
229
Table 91 System Time Setting
230
Chapter 18 Logs
233
Logs Overview
233
Alerts and Logs
233
Viewing the Logs
233
Configuring Log Settings
234
Figure 136 View Log
234
Table 92 View Log
234
Figure 137 Log Settings
235
Table 93 Log Settings
235
Example E-Mail Log
236
Log Example
236
Log Descriptions
237
Figure 138 E-Mail Log Example
237
Table 94 System Maintenance Logs
237
Table 95 System Error Logs
238
Table 96 Access Control Logs
238
Table 97 TCP Reset Logs
239
Table 98 Packet Filter Logs
239
Table 99 ICMP Logs
240
Table 100 CDR Logs
240
Table 101 PPP Logs
240
Table 102 Upnp Logs
241
Table 103 Content Filtering Logs
241
Table 104 Attack Logs
242
Table 105 Ipsec Logs
242
Table 106 IKE Logs
243
Table 107 PKI Logs
246
Table 108 Certificate Path Verification Failure Reason Codes
247
Table 109 ACL Setting Notes
247
Table 110 ICMP Notes
248
Table 111 Syslog Logs
249
Table 112 RFC-2408 ISAKMP Payload Types
249
Logs
233
Chapter 19 Tools
251
Firmware Upgrade
251
Figure 139 Firmware
251
Table 113 Firmware Upgrade
251
Device Model Number
251
Tools
251
Figure 140 Firmware Upload in Progress
252
Figure 141 Network Temporarily Disconnected
252
Backup Configuration
253
Configuration Screen
253
Figure 142 Error Message
253
Figure 143 Configuration
253
Default Settings
253
Factory Defaults
253
Figure 144 Configuration Restore Successful
254
Figure 145 Temporarily Disconnected
254
Restore Configuration
254
Table 114 Maintenance Restore Configuration
254
Back to Factory Defaults
255
Figure 146 Configuration Restore Error
255
Figure 147 Restart Screen
255
Restart
255
Default
255
Chapter 20 Diagnostic
257
General Diagnostic
257
DSL Line Diagnostic
257
Figure 148 Diagnostic: General
257
Table 115 Diagnostic: General
257
General
257
Figure 149 Diagnostic: DSL Line
258
Table 116 Diagnostic: DSL Line
258
Reinitialize
258
Diagnostic
257
Chapter 21 Troubleshooting
259
Power, Hardware Connections, and Leds
259
Zyxel Device Access and Login
260
Internet Access
261
Troubleshooting
259
Appendices and Index
263
Part VII: Appendices and Index
263
Appendix A Product Specifications and Wall Mounting
265
Table 117 Hardware Specifications
265
Table 118 Firmware Specifications
265
Product Specifications
265
Table 119 Wireless Firmware Specifications
267
Table 120 Standards Supported
267
Figure 150 Wall-Mounting Example
269
Figure 151 Masonry Plug and M4 Tap Screw
270
Appendix B Wireless Lans
271
Figure 152 Peer-To-Peer Communication in an Ad-Hoc Network
271
Figure 153 Basic Service Set
272
Ess
272
Figure 154 Infrastructure WLAN
273
Figure 155 RTS/CTS
274
CTS (Clear to Send)
274
Table 121 IEEE 802.11G
275
Preamble Type
275
Table 122 Wireless Security Levels
276
EAP Authentication
277
Table 123 Comparison of EAP Authentication Types
279
Dynamic WEP Key Exchange
279
Figure 156 WPA(2) with RADIUS Application Example
281
Figure 157 WPA(2)-PSK Authentication
282
Table 124 Wireless Security Relational Matrix
282
Antenna Gain
283
Antenna Overview
283
Appendix C Setting up Your Computer's IP Address
285
Ethernet Adapter Card
285
Figure 158 Windows 95/98/Me: Network: Configuration
286
Installing Components
286
Figure 159 Windows 95/98/Me: TCP/IP Properties: IP Address
287
Figure 160 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
288
Figure 161 Windows XP: Start Menu
289
Figure 162 Windows XP: Control Panel
289
Figure 163 Windows XP: Control Panel: Network Connections: Properties
290
Figure 164 Windows XP: Local Area Connection Properties
290
Figure 165 Windows XP: Internet Protocol (TCP/IP) Properties
291
Figure 166 Windows XP: Advanced TCP/IP Properties
292
Figure 167 Windows XP: Internet Protocol (TCP/IP) Properties
293
Figure 168 Macintosh os 8/9: Apple Menu
294
Figure 169 Macintosh os 8/9: TCP/IP
294
Figure 170 Macintosh os X: Apple Menu
295
Macintosh os X
295
Figure 171 Macintosh os X: Network
296
Figure 172 Red hat 9.0: KDE: Network Configuration: Devices
297
Figure 173 Red hat 9.0: KDE: Ethernet Device: General
297
Figure 174 Red hat 9.0: KDE: Network Configuration: DNS
298
Figure 175 Red hat 9.0: KDE: Network Configuration: Activate
298
Using Configuration Files
298
Figure 176 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
299
Figure 177 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
299
Figure 178 Red hat 9.0: DNS Settings in Resolv.conf
299
Figure 179 Red hat 9.0: Restart Ethernet Card
299
Figure 180 Red hat 9.0: Checking TCP/IP Properties
300
Appendix D IP Addresses and Subnetting
301
Figure 181 Network Number and Host ID
302
Table 125 IP Address Network Number and Host ID Example
302
Subnet Masks
302
Table 126 Subnet Masks
303
Table 127 Maximum Host Numbers
303
Table 128 Alternative Subnet Mask Notation
303
Figure 182 Subnetting Example: before Subnetting
304
Figure 183 Subnetting Example: after Subnetting
305
Table 129 Subnet 1
305
Table 130 Subnet 2
306
Table 131 Subnet 3
306
Table 132 Subnet 4
306
Table 133 Eight Subnets
306
Table 134 24-Bit Network Number Subnet Planning
307
Table 135 16-Bit Network Number Subnet Planning
307
Configuring Ip Addresses
308
Private Ip Addresses
308
Appendix E Firewall Commands
309
Table 136 Firewall Commands
309
Commands
309
Appendix F Internal SPTGEN
315
Figure 184 Configuration Text File Format: Column Descriptions
315
The Configuration Text File Format
315
Figure 185 Invalid Parameter Entered: Command Line Example
316
Figure 186 Valid Parameter Entered: Command Line Example
316
Internal Sptgen Ftp Download Example
316
Figure 187 Internal SPTGEN FTP Download Example
317
Figure 188 Internal SPTGEN FTP Upload Example
317
Table 137 Abbreviations Used in the Example Internal SPTGEN Screens Table
318
Table 138 Menu 1 General Setup
318
Table 139 Menu 3
318
Table 140 Menu 4 Internet Access Setup
320
Table 141 Menu 12
322
Table 142 Menu 15 SUA Server Setup
322
Table 143 Menu 21.1 Filter Set #1
324
Table 144 Menu 21.1 Filer Set #2
325
Table 145 Menu 23 System Menus
327
Table 146 Menu 24.11 Remote Management Control
328
Table 147 Command Examples
329
Appendix G Command Interpreter
331
Command Syntax
331
Command Usage
331
Appendix H Pop-Up Windows, Javascripts and Java Permissions
333
Figure 189 Pop-Up Blocker
333
Figure 190 Internet Options: Privacy
334
Figure 191 Internet Options: Privacy
335
Figure 192 Pop-Up Blocker Settings
335
Figure 193 Internet Options: Security
336
Figure 194 Security Settings - Java Scripting
337
Figure 195 Security Settings - Java
337
Figure 196 Java (Sun)
338
Appendix I Netbios Filter Commands
339
Table 148 Netbios Filter Default Settings
340
Appendix J Splitters and Microfilters
341
Figure 197 Connecting a POTS Splitter
341
Figure 198 Connecting a Microfilter
342
Figure 199 Connecting a Microfilter and Y-Connector
342
Figure 200 Zyxel Device with ISDN
343
Appendix K Triangle Route
345
Figure 201 Ideal Setup
345
Figure 202 "Triangle Route" Problem
346
Figure 203 IP Alias
346
Copyright
347
Disclaimer
347
FCC Interference Statement
347
Legal Information
347
Zyxel Limited Warranty
349
Customer Support
351
Advertisement
Advertisement
Related Products
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HW-DX V2 - V3.40
ZyXEL Communications P-660HW-D1 V2
ZyXEL Communications P-660HW-D3 V2
ZyXEL Communications P-660HW-T - VERSION 3.40
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P660HW3
ZyXEL Communications P-660HWP-Dx
ZyXEL Communications P-660HW-Tx v2 Series
ZyXEL Communications P-660HW-T - V2
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL