Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HW-DX V2 - V3.40
ZyXEL Communications P-660HW-DX V2 - V3.40 Manuals
Manuals and User Guides for ZyXEL Communications P-660HW-DX V2 - V3.40. We have
3
ZyXEL Communications P-660HW-DX V2 - V3.40 manuals available for free PDF download: User Manual, Support Notes, Quick Start Manual
ZyXEL Communications P-660HW-DX V2 - V3.40 User Manual (358 pages)
802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 11.37 MB
Table of Contents
Contents Overview
9
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Table of Contents
11
List of Figures
21
List of Tables
27
Introduction
31
PART I Introduction
31
Chapter 1 Introducing the Zyxel Device
33
Overview
33
Figure 1 Protected Internet Access Applications
34
Figure 2 LAN-To-LAN Application Example
34
Table 1 ADSL Standards
34
Figure 3 Front Panel
35
Good Habits for Managing the Zyxel Device
35
Leds
35
Ways to Manage the Zyxel Device
35
Hardware Connections
36
Splitters and Microfilters
36
Table 2 Front Panel Leds
36
Figure 4 Connecting a POTS Splitter
37
Figure 5 Connecting a Microfilter
37
Figure 6 Connecting a Microfilter and Y-Connector
38
Figure 7 Zyxel Device with ISDN
38
Chapter 2 Introducing the Web Configurator
39
Accessing the Web Configurator
39
User Access
40
Administrator Access
40
Figure 8 Password Screen
40
Figure 9 User Status Screen
40
Figure 10 Change Password at Login
41
Figure 11 Select a Mode
41
Web Configurator Overview
39
Navigating the Web Configurator
42
Navigation Panel
42
Figure 12 Web Configurator: Main Screen
42
Table 3 Web Configurator Screens Summary
43
Status Screen
44
Figure 13 Status Screen
45
Table 4 Status Screen
45
Status: any IP Table
47
Status: WLAN Status
47
Figure 14 Status: any IP Table
47
Figure 15 Status: WLAN Status
47
Table 5 Status: any IP Table
47
Status: Bandwidth Status
48
Status: Packet Statistics
48
Figure 16 Status: Bandwidth Status
48
Table 6 Status: WLAN Status
48
Figure 17 Status: Packet Statistics
49
Table 7 Status: Packet Statistics
49
Changing Login Password
50
Figure 18 System General
50
Resetting the Zyxel Device
42
Using the Reset Button
42
Wizards
51
Part II: Wizards
51
Chapter 3 Wizard Setup for Internet Access
53
Figure 19 Select a Mode
53
Internet Access Wizard Setup
53
Introduction
53
Figure 20 Wizard: Welcome
54
Figure 21 Auto Detection: no DSL Connection
54
Automatic Detection
55
Manual Configuration
55
Figure 22 Auto Detection: Failed
55
Figure 23 Auto-Detection: Pppoe
55
Figure 24 Internet Access Wizard Setup: ISP Parameters
56
Table 8 Internet Access Wizard Setup: ISP Parameters
56
Figure 25 Internet Connection with Pppoe
57
Figure 26 Internet Connection with RFC 1483
57
Table 9 Internet Connection with Pppoe
57
Table 10 Internet Connection with RFC 1483
57
Figure 27 Internet Connection with ENET ENCAP
58
Table 11 Internet Connection with ENET ENCAP
58
Figure 28 Internet Connection with Pppoa
59
Figure 29 Connection Test Failed-1
59
Table 12 Internet Connection with Pppoa
59
Figure 30 Connection Test Failed-2
60
Figure 31 Connection Test Successful
60
Wireless Connection Wizard Setup
60
Figure 32 Wireless LAN Setup Wizard 1
61
Table 13 Wireless LAN Setup Wizard 1
61
Figure 33 Wireless LAN Setup Wizard 2
62
Table 14 Wireless LAN Setup Wizard 2
62
Manually Assign a WPA-PSK Key
63
Manually Assign a WEP Key
63
Figure 34 Manually Assign a WPA Key
63
Table 15 Manually Assign a WPA Key
63
Figure 35 Manually Assign a WEP Key
64
Figure 36 Wireless LAN Setup 3
64
Table 16 Manually Assign a WEP Key
64
Figure 37 Internet Access and WLAN Wizard Setup Complete
65
Chapter 4 Bandwidth Management Wizard
67
Introduction
67
Predefined Media Bandwidth Management Services
67
Table 17 Media Bandwidth Management Setup: Services
67
Bandwidth Management Wizard Setup
68
Figure 38 Select a Mode
68
Figure 39 Wizard: Welcome
69
Figure 40 Bandwidth Management Wizard: General Information
69
Table 18 Bandwidth Management Wizard: General Information
69
Figure 41 Bandwidth Management Wizard: Configuration
70
Table 19 Bandwidth Management Wizard: Configuration
70
Figure 42 Bandwidth Management Wizard: Complete
71
Network
73
Part III: Network
73
WAN Setup
75
Chapter 5 WAN Setup
75
WAN Overview
75
Encapsulation
75
Multiplexing
76
Encapsulation and Multiplexing Scenarios
76
VPI and VCI
77
IP Address Assignment
77
Nailed-Up Connection (PPP)
77
Nat
78
Metric
78
Traffic Shaping
78
ATM Traffic Classes
79
Figure 43 Example of Traffic Shaping
79
Internet Connection
80
Zero Configuration Internet Access
80
Figure 44 Internet Connection (Pppoe)
81
Table 20 Internet Connection
81
Configuring Advanced Internet Connection Setup
82
Figure 45 Advanced Internet Connection Setup
83
Table 21 Advanced Internet Connection Setup
83
Configuring more Connections
84
Figure 46 more Connections
84
More Connections Edit
85
Table 22 more Connections
85
Figure 47 more Connections Edit
86
Table 23 more Connections Edit
86
Configuring more Connections Advanced Setup
88
Figure 48 more Connections Advanced Setup
88
Table 24 more Connections Advanced Setup
88
Configuring WAN Backup
89
Figure 49 Traffic Redirect Example
89
Figure 50 Traffic Redirect LAN Setup
89
Traffic Redirect
89
Figure 51 WAN Backup Setup
90
Table 25 WAN Backup Setup
90
Chapter 6 LAN Setup
93
LAN Overview
93
Lans, Wans and the Zyxel Device
93
Figure 52 LAN and WAN IP Addresses
93
DHCP Setup
94
DNS Server Address
94
DNS Server Address Assignment
94
Lan Tcp/Ip
95
IP Address and Subnet Mask
95
RIP Setup
96
Multicast
96
Any IP
97
Figure 53 any IP Example
97
Configuring LAN IP
98
Figure 54 LAN IP
98
Configuring Advanced LAN Setup
99
Figure 55 Advanced LAN Setup
99
Table 26 LAN IP
99
Table 27 Advanced LAN Setup
99
DHCP Setup
100
Figure 56 DHCP Setup
100
LAN Client List
101
Table 28 DHCP Setup
101
LAN IP Alias
102
Figure 57 LAN Client List
102
Table 29 LAN Client List
102
Figure 58 Physical Network & Partitioned Logical Networks
103
Figure 59 LAN IP Alias
103
Table 30 LAN IP Alias
104
LAN Setup
93
Chapter 7 Wireless LAN
105
Wireless Network Overview
105
Figure 60 Example of a Wireless Network
105
Wireless Security Overview
106
Ssid
106
MAC Address Filter
106
User Authentication
106
Encryption
107
Table 31 Types of Encryption for each Type of Authentication
107
One-Touch Intelligent Security Technology (OTIST)
108
General Wireless LAN Screen
108
Figure 61 Wireless LAN: General
108
No Security
109
Table 32 Wireless LAN: General
109
WEP Encryption
110
Figure 62 Wireless: no Security
110
Table 33 Wireless no Security
110
Wpa-Psk/Wpa2-Psk
111
Figure 63 Wireless: Static WEP Encryption
111
Table 34 Wireless: Static WEP Encryption
111
Figure 64 Wireless: WPA-PSK/WPA2-PSK
112
Table 35 Wireless: WPA-PSK/WPA2-PSK
112
Wpa/Wpa2
113
Figure 65 Wireless: WPA/WPA2
114
Table 36 Wireless: WPA/WPA2
114
Wireless LAN Advanced Setup
115
Figure 66 Advanced
116
Table 37 Wireless LAN: Advanced
116
Otist
117
Enabling OTIST
117
Figure 67 OTIST
118
Table 38 OTIST
118
Wireless Client
118
Starting OTIST
119
Figure 68 Example Wireless Client OTIST Screen
119
Figure 69 Security Key
119
Figure 70 OTIST in Progress (AP)
119
Notes on OTIST
120
Figure 71 OTIST in Progress (Client)
120
Figure 72 no AP with OTIST Found
120
Figure 73 Start OTIST
120
MAC Filter
121
Figure 74 MAC Address Filter
121
Table 39 MAC Address Filter
121
WMM Qos
122
WMM Qos Example
122
WMM Qos Priorities
122
Table 40 WMM Qos Priorities
122
Services
123
Table 41 Commonly Used Services
123
Qos Screen
124
Tos (Type of Service) and WMM Qos
125
Figure 75 Wireless LAN: Qos
125
Table 42 Wireless Lan: Qos
125
Application Priority Configuration
126
Figure 76 Application Priority Configuration
126
Table 43 Application Priority Configuration
126
Chapter 8 Network Address Translation (NAT) Screens
129
Wireless LAN
105
NAT Overview
129
NAT Definitions
129
Table 44 NAT Definitions
129
What NAT Does
130
How NAT Works
130
NAT Application
130
Figure 77 How NAT Works
130
NAT Mapping Types
131
Figure 78 NAT Application with IP Alias
131
Sip Alg
132
SUA (Single User Account) Versus NAT
132
Table 45 NAT Mapping Types
132
Figure 79 NAT General
133
NAT General Setup
133
Port Forwarding
133
Table 46 NAT General
133
Default Server IP Address
134
Port Forwarding: Services and Port Numbers
134
Table 47 Services and Port Numbers
134
Configuring Servers Behind Port Forwarding (Example)
135
Configuring Port Forwarding
135
Figure 80 Multiple Servers Behind NAT Example
135
Port Forwarding Rule Edit
136
Figure 81 NAT Port Forwarding
136
Table 48 NAT Port Forwarding
136
Address Mapping
137
Figure 82 Port Forwarding Rule Setup
137
Table 49 Port Forwarding Rule Setup
137
Figure 83 Address Mapping Rules
138
Table 50 Address Mapping Rules
138
Address Mapping Rule Edit
139
Figure 84 Edit Address Mapping Rule
139
Table 51 Edit Address Mapping Rule
140
Security
141
Part IV: Security
141
Firewalls
143
Chapter 9 Firewalls
143
Firewall Overview
143
Types of Firewalls
143
Packet Filtering Firewalls
143
Application-Level Firewalls
144
Stateful Inspection Firewalls
144
Introduction to Zyxel's Firewall
144
Denial of Service Attacks
145
Denial of Service
145
Basics
145
Figure 85 Firewall Application
145
Table 52 Common IP Ports
145
Types of Dos Attacks
146
Figure 86 Three-Way Handshake
146
Figure 87 SYN Flood
147
Figure 88 Smurf Attack
147
Stateful Inspection
148
Table 53 ICMP Commands that Trigger Alerts
148
Table 54 Legal Netbios Commands
148
Table 55 Legal SMTP Commands
148
Stateful Inspection Process
149
Figure 89 Stateful Inspection
149
Stateful Inspection and the Zyxel Device
150
TCP Security
150
UDP/ICMP Security
151
Upper Layer Protocols
151
Guidelines for Enhancing Security with Your Firewall
152
Security in General
152
Packet Filtering Vs Firewall
153
Packet Filtering
153
Firewall
153
Chapter 10 Firewall Configuration
155
Access Methods
155
Firewall Policies Overview
155
Rule Logic Overview
156
Rule Checklist
156
Security Ramifications
156
Key Fields for Configuring Rules
157
Connection Direction
157
LAN to WAN Rules
158
Alerts
158
Figure 90 Firewall: General
158
General Firewall Policy
158
Firewall Rules Summary
159
Table 56 Firewall: General
159
Figure 91 Firewall Rules
160
Table 57 Firewall Rules
160
Configuring Firewall Rules
161
Figure 92 Firewall: Edit Rule
162
Table 58 Firewall: Edit Rule
163
Customized Services
164
Configuring a Customized Service
164
Figure 93 Firewall: Customized Services
164
Table 59 Customized Services
164
Example Firewall Rule
165
Figure 94 Firewall: Configure Customized Services
165
Table 60 Firewall: Configure Customized Services
165
Figure 95 Firewall Example: Rules
166
Figure 96 Edit Custom Port Example
166
Figure 97 Firewall Example: Edit Rule: Destination Address
167
Figure 98 Firewall Example: Edit Rule: Select Customized Services
168
Figure 99 Firewall Example: Rules: Myservice
169
Predefined Services
169
Table 61 Predefined Services
169
Anti-Probing
171
Figure 100 Firewall: Anti Probing
171
Dos Thresholds
172
Threshold Values
172
Table 62 Firewall: Anti Probing
172
Half-Open Sessions
173
Configuring Firewall Thresholds
173
Figure 101 Firewall: Threshold
174
Table 63 Firewall: Threshold
174
Chapter 11 Content Filtering
177
Content Filtering Overview
177
Configuring Keyword Blocking
177
Figure 102 Content Filter: Keyword
177
Configuring the Schedule
178
Figure 103 Content Filter: Schedule
178
Table 64 Content Filter: Keyword
178
Configuring Trusted Computers
179
Figure 104 Content Filter: Trusted
179
Table 65 Content Filter: Schedule
179
Table 66 Content Filter: Trusted
179
Content Filtering
177
Advanced
181
Part V: Advanced
181
Static Route
183
Chapter 12 Static Route
183
Configuring Static Route
183
Figure 105 Example of Static Routing Topology
183
Static Route Edit
184
Figure 106 Static Route
184
Table 67 Static Route
184
Figure 107 Static Route Edit
185
Table 68 Static Route Edit
185
Bandwidth Management
187
Chapter 13 Bandwidth Management
187
Bandwidth Management Overview
187
Application-Based Bandwidth Management
187
Subnet-Based Bandwidth Management
187
Application and Subnet-Based Bandwidth Management
188
Scheduler
188
Priority-Based Scheduler
188
Figure 108 Subnet-Based Bandwidth Management Example
188
Table 69 Application and Subnet-Based Bandwidth Management Example
188
Fairness-Based Scheduler
189
Maximize Bandwidth Usage
189
Reserving Bandwidth for Non-Bandwidth Class Traffic
189
Maximize Bandwidth Usage Example
189
Table 70 Maximize Bandwidth Usage Example
189
Table 71 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
190
Table 72 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
190
Bandwidth Management Priorities
191
Over Allotment of Bandwidth
191
Configuring Summary
191
Table 73 Bandwidth Management Priorities
191
Table 74 over Allotment of Bandwidth Example
191
Bandwidth Management Rule Setup
192
Figure 109 Bandwidth Management: Summary
192
Table 75 Media Bandwidth Management: Summary
192
Figure 110 Bandwidth Management: Rule Setup
193
Table 76 Bandwidth Management: Rule Setup
193
Diffserv
194
DSCP and Per-Hop Behavior
194
Rule Configuration
194
Figure 111 Diffserv: Differentiated Service Field
194
Table 77 Sub-Classes of AF Services
194
Figure 112 Bandwidth Management Rule Configuration
195
Table 78 Bandwidth Management Rule Configuration
195
Bandwidth Monitor
197
Table 79 Services and Port Numbers
197
Figure 113 Bandwidth Management: Monitor
198
Table 80 Bandwidth Management Monitor
198
Chapter 14 Dynamic DNS Setup
199
Dynamic DNS Overview
199
DYNDNS Wildcard
199
Configuring Dynamic DNS
199
Figure 114 Dynamic DNS
200
Table 81 Dynamic DNS
200
Chapter 15 Remote Management Configuration
203
Remote Management Overview
203
Remote Management Limitations
204
Remote Management and NAT
204
System Timeout
204
Www
204
Figure 115 Remote Management: WWW
204
Telnet
205
Configuring Telnet
205
Figure 116 Telnet Configuration on a TCP/IP Network
205
Table 82 Remote Management: WWW
205
Telnet Login
206
Figure 117 Remote Management: Telnet
206
Table 83 Remote Management: Telnet
206
Configuring FTP
207
Snmp
207
Figure 118 Remote Management: FTP
207
Table 84 Remote Management: FTP
207
Figure 119 SNMP Management Model
208
Supported Mibs
209
SNMP Traps
209
Configuring SNMP
209
Figure 120 Remote Management: SNMP
209
Table 85 SNMP Traps
209
Configuring DNS
210
Table 86 Remote Management: SNMP
210
Configuring ICMP
211
Figure 121 Remote Management: DNS
211
Table 87 Remote Management: DNS
211
Figure 122 Remote Management: ICMP
212
Table 88 Remote Management: ICMP
212
Chapter 16 Universal Plug-And-Play (Upnp)
213
Introducing Universal Plug and Play
213
How Do I Know if I'M Using Upnp
213
NAT Traversal
213
Cautions with Upnp
213
Upnp and Zyxel
214
Configuring Upnp
214
Figure 123 Configuring Upnp
214
Table 89 Configuring Upnp
214
Installing Upnp in Windows Example
215
Installing Upnp in Windows Me
215
Figure 124 Add/Remove Programs: Windows Setup: Communication
215
Installing Upnp in Windows XP
216
Figure 125 Add/Remove Programs: Windows Setup: Communication: Components
216
Figure 126 Network Connections
216
Using Upnp in Windows XP Example
217
Figure 127 Windows Optional Networking Components Wizard
217
Figure 128 Networking Services
217
Auto-Discover Your Upnp-Enabled Network Device
218
Figure 129 Network Connections
218
Figure 130 Internet Connection Properties
219
Figure 131 Internet Connection Properties: Advanced Settings
219
Figure 132 Internet Connection Properties: Advanced Settings: Add
220
Figure 133 System Tray Icon
220
Web Configurator Easy Access
221
Figure 134 Internet Connection Status
221
Figure 135 Network Connections
222
Figure 136 Network Connections: My Network Places
223
Figure 137 Network Connections: My Network Places: Properties: Example
223
Dynamic DNS Setup
199
Maintenance and Troubleshooting
225
Part VI: Maintenance and Troubleshooting
225
System
227
Chapter 17 System
227
General Setup
227
General Setup and System Name
227
Figure 138 System General Setup
228
Table 90 System General Setup
228
Figure 139 System Time Setting
229
Time Setting
229
Table 91 System Time Setting
230
Chapter 18 Logs
233
Logs Overview
233
Alerts and Logs
233
Viewing the Logs
233
Configuring Log Settings
234
Figure 140 View Log
234
Table 92 View Log
234
Figure 141 Log Settings
235
Table 93 Log Settings
235
Example E-Mail Log
236
Log Descriptions
237
Figure 142 E-Mail Log Example
237
Table 94 System Maintenance Logs
237
Table 95 System Error Logs
238
Table 96 Access Control Logs
238
Table 97 TCP Reset Logs
239
Table 98 Packet Filter Logs
239
Table 99 ICMP Logs
240
Table 100 CDR Logs
240
Table 101 PPP Logs
240
Table 102 Upnp Logs
241
Table 103 Content Filtering Logs
241
Table 104 Attack Logs
242
Table 105 Ipsec Logs
242
Table 106 IKE Logs
243
Table 107 PKI Logs
246
Table 108 Certificate Path Verification Failure Reason Codes
247
Table 109 ACL Setting Notes
247
Table 110 ICMP Notes
248
Table 111 Syslog Logs
249
Table 112 RFC-2408 ISAKMP Payload Types
249
Logs
233
Chapter 19 Tools
251
Firmware Upgrade
251
Figure 143 Firmware
251
Figure 144 Firmware Upload in Progress
252
Figure 145 Network Temporarily Disconnected
252
Table 113 Firmware Upgrade
252
Configuration Screen
253
Backup Configuration
253
Figure 146 Error Message
253
Figure 147 Configuration
253
Restore Configuration
254
Figure 148 Configuration Restore Successful
254
Figure 149 Temporarily Disconnected
254
Table 114 Maintenance Restore Configuration
254
Back to Factory Defaults
255
Restart
255
Figure 150 Configuration Restore Error
255
Figure 151 Restart Screen
255
Tools
251
Chapter 20 Diagnostic
257
General Diagnostic
257
DSL Line Diagnostic
257
Figure 152 Diagnostic: General
257
Table 115 Diagnostic: General
257
Figure 153 Diagnostic: DSL Line
258
Table 116 Diagnostic: DSL Line
258
Diagnostic
257
Chapter 21 Troubleshooting
259
Power, Hardware Connections, and Leds
259
Zyxel Device Access and Login
260
Internet Access
261
Troubleshooting
259
Appendices and Index
263
Part VII: Appendices and Index
263
Appendix A Product Specifications and Wall Mounting
265
Table 117 Hardware Specifications
265
Table 118 Firmware Specifications
265
Product Specifications
265
Table 119 Wireless Firmware Specifications
267
Table 120 Standards Supported
267
Figure 154 Wall-Mounting Example
269
Figure 155 Masonry Plug and M4 Tap Screw
270
Appendix B Wireless Lans
271
Figure 156 Peer-To-Peer Communication in an Ad-Hoc Network
271
Wireless Lan Topologies
271
Figure 157 Basic Service Set
272
Figure 158 Infrastructure WLAN
273
Figure 159 RTS/CTS
274
Fragmentation Threshold
274
Table 121 IEEE 802.11G
275
Preamble Type
275
Table 122 Wireless Security Levels
276
Types of Radius Messages
277
Types of Eap Authentication
277
Table 123 Comparison of EAP Authentication Types
279
Dynamic Wep Key Exchange
279
Wpa and Wpa2
279
Wireless Client Wpa Supplicants
281
Figure 160 WPA(2) with RADIUS Application Example
281
Figure 161 WPA(2)-PSK Authentication
282
Table 124 Wireless Security Relational Matrix
282
Security Parameters Summary
282
Antenna Characteristics
283
Radiation Pattern
283
Antenna Gain
283
Types of Antennas for Wlan
283
Positioning Antennas
284
Appendix C Setting up Your Computer's IP Address
285
Figure 162 Windows 95/98/Me: Network: Configuration
286
Installing Components
286
Figure 163 Windows 95/98/Me: TCP/IP Properties: IP Address
287
Figure 164 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
288
Verifying Settings
288
Figure 165 Windows XP: Start Menu
289
Figure 166 Windows XP: Control Panel
289
Figure 167 Windows XP: Control Panel: Network Connections: Properties
290
Figure 168 Windows XP: Local Area Connection Properties
290
Figure 169 Windows XP: Internet Protocol (TCP/IP) Properties
291
Figure 170 Windows XP: Advanced TCP/IP Properties
292
Figure 171 Windows XP: Internet Protocol (TCP/IP) Properties
293
Figure 172 Macintosh os 8/9: Apple Menu
294
Figure 173 Macintosh os 8/9: TCP/IP
294
Figure 174 Macintosh os X: Apple Menu
295
Macintosh os X
295
Figure 175 Macintosh os X: Network
296
Figure 176 Red hat 9.0: KDE: Network Configuration: Devices
297
Figure 177 Red hat 9.0: KDE: Ethernet Device: General
297
Figure 178 Red hat 9.0: KDE: Network Configuration: DNS
298
Figure 179 Red hat 9.0: KDE: Network Configuration: Activate
298
Using Configuration Files
298
Figure 180 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
299
Figure 181 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
299
Figure 182 Red hat 9.0: DNS Settings in Resolv.conf
299
Figure 183 Red hat 9.0: Restart Ethernet Card
299
Figure 184 Red hat 9.0: Checking TCP/IP Properties
300
Appendix D IP Addresses and Subnetting
301
Introduction to Ip Addresses
301
Figure 185 Network Number and Host ID
302
Table 125 IP Address Network Number and Host ID Example
302
Subnet Masks
302
Table 126 Subnet Masks
303
Table 127 Maximum Host Numbers
303
Table 128 Alternative Subnet Mask Notation
303
Figure 186 Subnetting Example: before Subnetting
304
Figure 187 Subnetting Example: after Subnetting
305
Table 129 Subnet 1
305
Table 130 Subnet 2
306
Table 131 Subnet 3
306
Table 132 Subnet 4
306
Table 133 Eight Subnets
306
Table 134 24-Bit Network Number Subnet Planning
307
Table 135 16-Bit Network Number Subnet Planning
307
Configuring Ip Addresses
308
Private Ip Addresses
308
Figure 188 Conflicting Computer IP Addresses Example
309
Figure 189 Conflicting Computer IP Addresses Example
309
Figure 190 Conflicting Computer and Router IP Addresses Example
310
Appendix E Firewall Commands
311
Table 136 Firewall Commands
311
Appendix F Internal SPTGEN
317
Figure 191 Configuration Text File Format: Column Descriptions
317
The Configuration Text File Format
317
Figure 192 Invalid Parameter Entered: Command Line Example
318
Figure 193 Valid Parameter Entered: Command Line Example
318
Internal Sptgen Ftp Download Example
318
Figure 194 Internal SPTGEN FTP Download Example
319
Figure 195 Internal SPTGEN FTP Upload Example
319
Table 137 Abbreviations Used in the Example Internal SPTGEN Screens Table
320
Table 138 Menu 1 General Setup
320
Table 139 Menu 3
320
Table 140 Menu 4 Internet Access Setup
322
Table 141 Menu 12
324
Table 142 Menu 15 SUA Server Setup
324
Table 143 Menu 21.1 Filter Set #1
326
Table 144 Menu 21.1 Filer Set #2
327
Table 145 Menu 23 System Menus
329
Table 146 Menu 24.11 Remote Management Control
330
Table 147 Command Examples
331
Appendix G Pop-Up Windows, Javascripts and Java Permissions
333
Figure 196 Pop-Up Blocker
333
Internet Explorer Pop-Up Blockers
333
Figure 197 Internet Options: Privacy
334
Figure 198 Internet Options: Privacy
335
Figure 199 Pop-Up Blocker Settings
335
Figure 200 Internet Options: Security
336
Figure 201 Security Settings - Java Scripting
337
Figure 202 Security Settings - Java
337
Java Permissions
337
Figure 203 Java (Sun)
338
Appendix H Netbios Filter Commands
339
Display Netbios Filter Settings
339
Table 148 Netbios Filter Default Settings
340
Netbios Filter Configuration
340
Appendix I Triangle Route
341
Figure 204 Ideal Setup
341
The Ideal Setup
341
Figure 205 "Triangle Route" Problem
342
Figure 206 IP Alias
342
Appendix J Legal Information
343
Zyxel Limited Warranty
345
Appendix K Customer Support
347
Advertisement
ZyXEL Communications P-660HW-DX V2 - V3.40 Support Notes (122 pages)
802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 2.15 MB
Table of Contents
Table of Contents
2
Faq
7
Zynos FAQ
7
What Is Zynos
7
What's Multilingual Embedded Web Configurator
7
How Do I Access the P-660HW-Tx V2 Command Line Interface (CLI)
7
How Do I Update the Firmware and Configuration File
7
How Do I Upgrade/Backup the Zynos Firmware by Using TFTP Client
7
Program Via LAN
7
How Do I Restore P-660HW-Tx V2 Configurations by Using TFTP Client Program Via LAN
8
What Should I Do if I Forget the System Password
8
How to Use the Reset Button
8
What Is SUA? When Should I Use SUA
9
What Is the Difference between SUA and Full Feature NAT
9
Is It Possible to Access a Server Running Behind SUA from the Outside Internet? if Possible, How
10
When Do I Need Select Full Feature NAT
10
What Ip/Port Mapping Does Multi-NAT Support
10
How Many Network Users Can the SUA/NAT Support
11
What Are Device Filters and Protocol Filters
11
How Can I Protect against IP Spoofing Attacks
12
Product FAQ
13
How Can I Manage P-660HW-Tx V2
13
What Is the Default Password for Web Configurator
13
What's the Difference between 'Common User Account' and 'Administrator Account
13
How Do I Know the P-660HW-Tx V2'S WAN IP Address Assigned by the ISP
13
What Is the Micro Filter or Splitter Used for
14
The P-660HW-Tx V2 Supports Bridge and Router Mode, What's the Difference between Them
14
How Do I Know I am Using Pppoe
14
Why Does My Provider Use Pppoe
14
What Is DDNS
14
When Do I Need DDNS Service
15
What Is DDNS Wildcard? Does the P-660HW-Tx V2 Support DDNS Wildcard
15
Can the P-660HW-Tx V2'S SUA Handle Ipsec Packets Sent by the Ipsec Gateway
15
How Do I Setup My P-660HW-Tx V2 for Routing Ipsec Packets over SUA
16
What Is Traffic Shaping
16
Why Do We Perform Traffic Shaping in the P-660HW-Tx V2
16
What Do the Parameters (PCR, SCR, MBS) Mean
17
What Do the ATM Qos Types (CBR, UBR, VBR-Nrt, VBR-RT) Mean
17
What Is Content Filter
18
Adsl Faq
19
How Does ADSL Compare to Cable Modems
19
What Is the Expected Throughput
19
What Is the Microfilter Used for
19
How Do I Know the ADSL Line Is up
19
How Does the P-660HW-Tx V2 Work on a Noisy ADSL
19
Does the VC-Based Multiplexing Perform Better than the LLC-Based Multiplexing
20
How Do I Know the Details of My ADSL Line Statistics
20
What Are the Signaling Pins of the ADSL Connector
20
What Is Triple Play
20
Firewall FAQ
22
General
22
What Is a Network Firewall
22
What Makes P-660HW-Tx V2 Secure
22
What Are the Basic Types of Firewalls
22
What Kind of Firewall Is the P-660HW-Tx V2
23
Why Do You Need a Firewall When Your Router Has Packet Filtering and NAT Built-In
23
What Is Denials of Service (Dos) Attack
23
What Is Ping of Death Attack
24
What Is Teardrop Attack
24
What Is SYN Flood Attack
24
What Is LAND Attack
24
What Is Brute-Force Attack
25
What Is IP Spoofing Attack
25
What Are the Default ACL Firewall Rules in P-660HW-Tx V2
25
Configuration
25
How Do I Configure the Firewall
25
How Do I Prevent Others from Configuring My Firewall
25
Why Can't I Configure My P-660HW-Tx V2 Using Web Configurator/Telnet over WAN
26
Why Can't I Upload the Firmware and Configuration File Using FTP over WAN
27
Log and Alert
28
When Does the P-660HW-Tx V2 Generate the Firewall Log
28
What Does the Log Show to Us
28
How Do I View the Firewall Log
28
When Does the P-660HW-Tx V2 Generate the Firewall Alert
29
What Is the Difference between the Log and Alert
29
Wireless FAQ
30
General FAQ
30
What Is a Wireless LAN
30
What Are the Advantages of Wireless LAN
30
What Is the Disadvantage of Wireless LAN
30
Where Can You Find 802.11 Wireless Networks
31
What Is an Access Point
31
What Is IEEE 802.11
31
What Is 802.11B
31
How Fast Is 802.11B
31
What Is 802.11A
31
What Is 802.11G
32
Is It Possible to Use Products from a Variety of Vendors
32
What Is Wi-Fi
32
What Types of Devices Use the 2.4Ghz Band
32
Does the 802.11 Interfere with Bluetooth Device
32
Can Radio Signals Pass through Wall
32
What Are Potential Factors that May Causes Interference Among WLAN Products
33
What's the Difference between a WLAN and a WWAN
33
Can I Manually Swap the Wireless Module Without Damage any Hardware
33
Does P-660HW-Tx V2 Support WEP
33
What Wireless Standard Does P-660HW-Tx V2 Support
33
Does P-660HW-Tx V2 Support MAC Filtering
33
Does P-660HW-Tx V2 Support Auto Rate Adaption
34
Advanced FAQ
34
What Is Ad Hoc Mode
34
What Is Infrastructure Mode
34
How Many Access Points Are Required in a Given Area
34
What Is Direct-Sequence Spread Spectrum Technology - (DSSS)
34
What Is Frequency-Hopping Spread Spectrum Technology - (FHSS)
34
Do I Need the same Kind of Antenna on both Sides of a Link
34
Why the 2.4 Ghz Frequency Range
35
What Is Server Set ID (SSID)
35
What Is an ESSID
35
What I an ESSID?
35
Security FAQ
35
How Do I Secure the Data Across the P-660HW-Tx V2 Access Point's Radio Link
35
What Is WEP
35
What Is WPA
36
What Is the Difference between 40-Bit and 64-Bit WEP
36
What Is a WEP Key
36
Will 128-Bit WEP Communicate with 64-Bit WEP
36
Can the SSID be Encrypted
37
By Turning off the Broadcast of SSID, Can Someone Still Sniff the SSID
37
What Are Insertion Attacks
37
What Is Wireless Sniffer
37
What Is OTIST? How Do I Use It
37
Application Notes
38
General Application Notes
38
Internet Access Using P-660HW-Tx V2 under Bridge Mode
38
Internet Access Using P-660HW-Tx V2 under Routing Mode
40
Setup the P-660HW-Tx V2 as a DHCP Relay
42
SUA Notes
43
Using Full Feature NAT
52
Using the Dynamic DNS (DDNS)
64
Network Management Using SNMP
66
Using Syslog
69
Using IP Alias
69
Using IP Policy Routing
71
Using Call Scheduling
75
Using IP Multicast
77
Using Bandwidth Management
78
Using Zero-Configuration
81
How Could I Configure Triple Play on P-660HW-Tx V2
84
How to Configure Packet Filter on P-660HW-Tx V2
84
Wireless Application Notes
88
Configure a Wireless Client to Ad Hoc Mode
88
Configuration for Wireless Station B
90
Configuring Infrastructure Mode
92
MAC Filter
96
Setup WEP (Wired Equivalent Privacy)
98
Site Survey
103
Configure 802.1X and WPA
106
Support Tool
111
LAN/WAN Packet Trace
111
Online Trace
111
Offline Trace
113
Capture the Detailed Logs by Hyper Terminal
114
Firmware/Configurations Uploading and Downloading Using TFTP
116
Using TFTP Client Software
116
Using TFTP Command on Windows NT
118
Using TFTP Command on UNIX
118
CI Command Reference
122
ZyXEL Communications P-660HW-DX V2 - V3.40 Quick Start Manual (11 pages)
802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 1.19 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
3
Internet and Wireless Setup Wizard
4
Configuring Your Wireless Settings
6
Troubleshooting
10
Enabling Otist
10
Advertisement
Advertisement
Related Products
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HW-D1 V2
ZyXEL Communications P-660HW-D3 V2
ZyXEL Communications P-660HW-DX
ZyXEL Communications P-660HW-T - VERSION 3.40
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P660HW3
ZyXEL Communications P-660HWP-Dx
ZyXEL Communications P-660HW-Tx v2 Series
ZyXEL Communications P-660HW-T - V2
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL