Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
P-660HW-T1
ZyXEL Communications P-660HW-T1 Manuals
Manuals and User Guides for ZyXEL Communications P-660HW-T1. We have
6
ZyXEL Communications P-660HW-T1 manuals available for free PDF download: User Manual, Support Notes, Install Manual, Specification
ZyXEL Communications P-660HW-T1 User Manual (460 pages)
802.11g Wireless ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 18.21 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
List of Figures
25
List of Tables
33
Preface
39
User Guide Feedback
40
Introduction to DSL
41
Chapter 1 Getting to Know Your Prestige
43
Introducing the Prestige
43
Table 1 ADSL Standards
43
Features of the Prestige
44
Traffic Redirect
45
Adsl Standards
46
Dynamic Dns Support
46
Protocol Support
46
Network Management
47
P-660HW Wireless Features
48
Networking Compatibility
47
Applications for the Prestige
49
Internet Access
49
Figure 1 Prestige Internet Access Application
49
Figure 2 Firewall Application
50
Figure 3 Prestige LAN-To-LAN Application
50
Figure 4 P-660H Front Panel
50
Firewall for Secure Broadband Internet Access
50
LAN to LAN Application
50
Front Panel Leds
50
Figure 5 P-660HW Front Panel
51
Table 2 Front Panel Leds
51
Chapter 2 Introducing the Web Configurator
53
Web Configurator Overview
53
Accessing the Prestige Web Configurator
53
Resetting the Prestige
54
Using the Reset Button
54
Figure 6 Password Screen
54
Figure 7 Change Password at Login
54
Navigating the Prestige Web Configurator
55
Figure 8 Web Configurator: Site Map Screen
55
Table 3 Web Configurator Screens Summary
56
Chapter 3 Wizard Setup for Internet Access
59
Introduction to Internet Access Wizard
59
Internet Access Wizard Setup
59
Figure 9 Internet Access Wizard Setup: First Screen
60
Table 4 Internet Access Wizard Setup: First Screen
60
Figure 10 Internet Connection with Pppoe
61
Table 5 Internet Connection with Pppoe
61
Figure 11 Internet Connection with RFC 1483
62
Figure 12 Internet Connection with ENET ENCAP
62
Table 6 Internet Connection with RFC 1483
62
Figure 13 Internet Connection with Pppoa
63
Table 7 Internet Connection with ENET ENCAP
63
Table 8 Internet Connection with Pppoa
64
Figure 14 Internet Access Wizard Setup: Third Screen
65
Figure 15 Internet Access Wizard Setup: LAN Configuration
65
Figure 16 Internet Access Wizard Setup: Connection Tests
66
Table 9 Internet Access Wizard Setup: LAN Configuration
66
Chapter 4 Wizard Setup for Media Bandwidth Management
67
Introduction to Media Bandwidth Management
67
Predefined Media Bandwidth Management Services
67
Table 10 Media Bandwidth Mgnt. Wizard Setup: Services
67
Media Bandwidth Management Setup
68
Figure 17 Media Bandwidth Mgnt. Wizard Setup: First Screen
68
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen
69
Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen
69
Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish
70
Chapter 5 Password Setup
71
Password Overview
71
Configuring Password
71
Figure 20 Password
71
Table 13 Password
71
Chapter 6 LAN Setup
73
LAN Overview
73
Lans, Wans and the Prestige
73
Figure 21 LAN and WAN IP Addresses
73
Table 14 LAN Setup
73
DNS Server Address
74
DNS Server Address Assignment
74
Lan Tcp/Ip
75
Factory LAN Defaults
75
IP Address and Subnet Mask
75
RIP Setup
76
Multicast
76
Any IP
77
How any IP Works
77
Figure 22 any IP Example
77
Configuring LAN
78
Figure 23 LAN Setup
79
Configuring Static DHCP
80
Figure 24 LAN: Static DHCP
81
Table 15 LAN: Static DHCP
81
Chapter 7 Wireless LAN (Prestige 660HW)
83
Introduction
83
Wireless Security Overview
83
Encryption
83
Authentication
83
Restricted Access
84
Hide Prestige Identity
84
G-Plus
84
Configuring Wireless LAN on the Prestige
84
Configuring the Wireless Screen
85
WEP Encryption
85
Figure 25 Wireless Security Methods
85
Figure 26 Wireless Screen
86
Configuring MAC Filters
88
Figure 27 MAC Address Filter
89
Table 17 MAC Address Filter
89
Introduction to WPA
90
WPA-PSK Application Example
90
WPA with RADIUS Application Example
91
Figure 28 WPA - PSK Authentication
91
Wireless Client WPA Supplicants
92
Configuring IEEE 802.1X and WPA
92
Figure 29 WPA with RADIUS Application Example2
92
Authentication Required: 802.1X
93
Figure 30 Wireless LAN: 802.1X/Wpa: no Authentication
93
Table 18 Wireless LAN: 802.1X/Wpa: no Access/Authentication
93
Figure 31 Wireless LAN: 802.1X/Wpa: 802.1Xl
94
Table 19 Wireless LAN: 802.1X/Wpa: 802.1X
94
Authentication Required: WPA
95
Figure 32 Wireless LAN: 802.1X/Wpa: Wpal
96
Table 20 Wireless LAN: 802.1X/Wpa: Wpal
96
Authentication Required: WPA-PSK
97
Figure 33 Wireless LAN: 802.1X/Wpa:wpa-Pskl
97
Table 21 Wireless LAN: 802.1X/Wpa: Wpal-PSK
97
Configuring Local User Authentication
98
Figure 34 Local User Database
98
Table 22 Local User Database
98
Configuring RADIUS
99
Figure 35 RADIUS
99
Table 23 RADIUS
99
Introduction to OTIST
100
Enabling OTIST
100
Figure 36 OTIST
101
Reset Button
101
Table 24 OTIST
101
Web Configurator
101
Wireless Client
102
Starting OTIST
102
Figure 37 Example Wireless Client OTIST Screen
102
Figure 38 Security Key
102
Figure 39 OTIST in Progress (Prestige)
102
Figure 40 OTIST in Progress (Client)
102
Notes on OTIST
103
Figure 41 no AP with OTIST Found
103
Figure 42 Start OTIST
103
Chapter 8 WAN Setup
105
WAN Overview
105
Metric
105
Pppoe Encapsulation
106
Traffic Shaping
106
Zero Configuration Internet Access
107
Configuring WAN Setup
107
Figure 43 Example of Traffic Shaping
107
Figure 44 WAN Setup (Pppoe)
108
Table 25 WAN Setup
108
Traffic Redirect
110
Configuring WAN Backup
111
Figure 45 Traffic Redirect Example
111
Figure 46 Traffic Redirect LAN Setup
111
Figure 47 WAN Backup
112
Table 26 WAN Backup
112
Chapter 9 Network Address Translation (NAT) Screens
115
NAT Overview
115
NAT Definitions
115
Table 27 NAT Definitions
115
What NAT Does
116
How NAT Works
116
NAT Application
117
Figure 48 How NAT Works
117
Figure 49 NAT Application with IP Alias
117
NAT Mapping Types
118
Table 28 NAT Mapping Types
118
SUA (Single User Account) Versus NAT
119
SUA Server
119
Default Server IP Address
119
Port Forwarding: Services and Port Numbers
119
Table 29 Services and Port Numbers
119
Configuring Servers Behind SUA (Example)
120
Sip Alg
120
Figure 50 Multiple Servers Behind NAT Example
120
Selecting the NAT Mode
121
Configuring SUA Server
121
Figure 51 NAT Mode
121
Table 30 NAT Mode
121
Figure 52 Edit SUA/NAT Server Set
122
Table 31 Edit SUA/NAT Server Set
122
Configuring Address Mapping
123
Figure 53 Address Mapping Rules
123
Table 32 Address Mapping Rules
123
Editing an Address Mapping Rule
124
Figure 54 Address Mapping Rule Edit
124
Table 33 Address Mapping Rule Edit
125
Chapter 10 Dynamic DNS Setup
127
Dynamic DNS
127
DYNDNS Wildcard
127
Configuring Dynamic DNS
127
Figure 55 Dynamic DNS
128
Table 34 Dynamic DNS
128
Chapter 11 Time and Date
129
Configuring Time and Date
129
Figure 56 Time and Date
129
Table 35 Time and Date
130
Chapter 12 Firewalls
131
Firewall Overview
131
Types of Firewalls
131
Packet Filtering Firewalls
131
Application-Level Firewalls
131
Stateful Inspection Firewalls
132
Introduction to Zyxel's Firewall
132
Denial of Service Attacks
133
Denial of Service
133
Basics
133
Figure 57 Prestige Firewall Application
133
Types of Dos Attacks
134
Figure 58 Three-Way Handshake
134
Table 36 Common IP Ports
134
Figure 59 SYN Flood
135
Figure 60 Smurf Attack
136
ICMP Vulnerability
136
Illegal Commands (Netbios and SMTP)
136
Table 37 ICMP Commands that Trigger Alerts
136
Table 38 Legal Netbios Commands
136
Traceroute
137
Stateful Inspection
137
Table 39 Legal SMTP Commands
137
Figure 61 Stateful Inspection
138
Stateful Inspection Process
138
Stateful Inspection and the Prestige
139
TCP Security
139
UDP/ICMP Security
140
Upper Layer Protocols
140
Guidelines for Enhancing Security with Your Firewall
140
Security in General
141
Packet Filtering Vs Firewall
142
Packet Filtering
142
When to Use Filtering
142
Firewall
142
When to Use the Firewall
142
Chapter 13 Firewall Configuration
145
Access Methods
145
Firewall Policies Overview
145
Rule Logic Overview
146
Rule Checklist
146
Security Ramifications
146
Key Fields for Configuring Rules
147
Action
147
Service
147
Source Address
147
Destination Address
147
Connection Direction Example
147
LAN to WAN Rules
148
WAN to LAN Rules
148
Figure 62 LAN to WAN Traffic
148
Figure 63 WAN to LAN Traffic
148
Alerts
149
Configuring Basic Firewall Settings
149
Figure 64 Firewall: Default Policy
149
Table 40 Firewall: Default Policy
149
Rule Summary
150
Figure 65 Firewall: Rule Summary
150
Table 41 Rule Summary
151
Configuring Firewall Rules
152
Figure 66 Firewall: Edit Rule
153
Table 42 Firewall: Edit Rule
154
Customized Services
155
Creating/Editing a Customized Service
155
Figure 67 Firewall: Customized Services
155
Table 43 Customized Services
155
Example Firewall Rule
156
Figure 68 Firewall: Configure Customized Services
156
Table 44 Firewall: Configure Customized Services
156
Figure 69 Firewall Example: Rule Summary
157
Figure 70 Firewall Example: Edit Rule: Destination Address
158
Figure 71 Edit Custom Port Example
158
Figure 72 Firewall Example: Edit Rule: Select Customized Services
159
Predefined Services
160
Figure 73 Firewall Example: Rule Summary: My Service
160
Table 45 Predefined Services
160
Anti-Probing
162
Configuring Attack Alert
163
Figure 74 Firewall: Anti Probing
163
Table 46 Firewall: Anti Probing
163
Half-Open Sessions
164
TCP Maximum Incomplete and Blocking Time
164
Figure 75 Firewall: Threshold
165
Table 47 Firewall: Threshold
165
Threshold Values
164
Chapter 14 Content Filtering
167
Content Filtering Overview
167
Configuring Keyword Blocking
167
Figure 76 Content Filter: Keyword
167
Configuring the Schedule
168
Figure 77 Content Filter: Schedule
168
Table 48 Content Filter: Keyword
168
Configuring Trusted Computers
169
Figure 78 Content Filter: Trusted
169
Table 49 Content Filter: Schedule
169
Table 50 Content Filter: Trusted
169
Chapter 15 Remote Management Configuration
171
Remote Management Overview
171
Remote Management Limitations
171
Remote Management and NAT
172
System Timeout
172
Telnet
172
Ftp
172
Figure 79 Telnet Configuration on a TCP/IP Network
172
Web
173
Configuring Remote Management
173
Figure 80 Remote Management
173
Table 51 Remote Management
173
Chapter 16 Universal Plug-And-Play (Upnp)
175
Introducing Universal Plug and Play
175
How Do I Know if I'M Using Upnp
175
NAT Traversal
175
Cautions with Upnp
175
Upnp and Zyxel
176
Configuring Upnp
176
Figure 81 Configuring Upnp
176
Installing Upnp in Windows Example
177
Table 52 Configuring Upnp
177
Figure 82 Add/Remove Programs: Windows Setup: Communication
178
Figure 83 Add/Remove Programs: Windows Setup: Communication: Components
178
Figure 84 Network Connections
179
Figure 85 Windows Optional Networking Components Wizard
180
Using Upnp in Windows XP Example
181
Figure 86 Networking Services
181
Figure 87 Network Connections
182
Figure 88 Internet Connection Properties
183
Figure 89 Internet Connection Properties: Advanced Settings
184
Figure 90 Internet Connection Properties: Advanced Settings: Add
184
Figure 91 System Tray Icon
185
Figure 92 Internet Connection Status
185
Figure 93 Network Connections
186
Figure 94 Network Connections: My Network Places
187
Figure 95 Network Connections: My Network Places: Properties: Example
187
Chapter 17 Logs Screens
189
Logs Overview
189
Alerts and Logs
189
Configuring Log Settings
189
Figure 96 Log Settings
190
Table 53 Log Settings
190
Displaying the Logs
191
SMTP Error Messages
192
Figure 97 View Logs
192
Table 54 View Logs
192
Table 55 SMTP Error Messages
192
Example E-Mail Log
193
Figure 98 E-Mail Log Example
193
Advertisement
ZyXEL Communications P-660HW-T1 User Manual (465 pages)
ADSL 2+ gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 12.35 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
10
List of Figures
24
List of Tables
32
Preface
38
User Guide Feedback
39
Introduction to DSL
40
Chapter 1 Getting to Know Your Prestige
42
Introducing the Prestige
42
Features
42
Table 1 ADSL Standards
42
High Speed Internet Access
43
Dynamic Dns Support
44
Wireless Features (P-660HW/P-660W)
45
Applications for the Prestige
46
Protected Internet Access
46
LAN to LAN Application
46
Front Panel Leds
46
Figure 1 Protected Internet Access Applications
46
Figure 2 LAN-To-LAN Application Example
46
Hardware Connection
47
Table 2 Front Panel Leds
47
Chapter 2 Introducing the Web Configurator
48
Web Configurator Overview
48
Accessing the Web Configurator
48
Resetting the Prestige
49
Using the Reset Button
49
Figure 3 Password Screen
49
Figure 4 Change Password at Login
49
Navigating the Web Configurator
50
Figure 5 Web Configurator: Site Map Screen
50
Table 3 Web Configurator Screens Summary
50
Change Login Password
52
Figure 6 Password
52
Table 4 Password
53
Chapter 3 Wizard Setup for Internet Access
54
Introduction
54
Internet Access Wizard Setup
54
Figure 7 Internet Access Wizard Setup: ISP Parameters
54
Figure 8 Internet Connection with Pppoe
55
Table 5 Internet Access Wizard Setup: ISP Parameters
55
Figure 9 Internet Connection with RFC 1483
56
Table 6 Internet Connection with Pppoe
56
Table 7 Internet Connection with RFC 1483
56
Figure 10 Internet Connection with ENET ENCAP
57
Table 8 Internet Connection with ENET ENCAP
57
Figure 11 Internet Connection with Pppoa
58
Table 9 Internet Connection with Pppoa
58
Figure 12 Internet Access Wizard Setup: Third Screen
59
Figure 13 Internet Access Wizard Setup: LAN Configuration
59
Figure 14 Internet Access Wizard Setup: Connection Tests
60
Table 10 Internet Access Wizard Setup: LAN Configuration
60
Chapter 4 LAN Setup
62
LAN Overview
62
Lans, Wans and the Prestige
62
Figure 15 LAN and WAN IP Addresses
62
DHCP Setup
63
IP Pool Setup
63
DNS Server Address
63
DNS Server Address Assignment
63
Lan Tcp/Ip
64
IP Address and Subnet Mask
64
Private IP Addresses
65
RIP Setup
65
Multicast
66
Any IP
66
How any IP Works
67
Figure 16 any IP Example
67
Configuring LAN
68
Figure 17 LAN Setup
68
Table 11 LAN Setup
68
Chapter 5 Wireless LAN
70
Wireless LAN Introduction
70
Wireless Security Overview
70
Encryption
70
Authentication
70
Restricted Access
71
Hide Prestige Identity
71
The Main Wireless LAN Screen
71
Figure 18 Wireless LAN
72
Table 12 Wireless LAN
72
Table 13 Wireless LAN
72
Configuring the Wireless Screen
73
WEP Encryption
73
Figure 19 Wireless Security Methods
73
Figure 20 Wireless Screen
74
Configuring MAC Filters
75
Figure 21 MAC Filter
76
Table 14 MAC Filter
76
Introduction to WPA
77
WPA-PSK Application Example
77
WPA with RADIUS Application Example
78
Figure 22 WPA - PSK Authentication
78
Wireless Client WPA Supplicants
79
Configuring IEEE 802.1X and WPA
79
Figure 23 WPA with RADIUS Application Example2
79
Authentication Required: 802.1X
80
Figure 24 Wireless LAN: 802.1X/Wpa: no Access Allowed
80
Figure 25 Wireless LAN: 802.1X/Wpa: no Authentication
80
No Access Allowed or Authentication
80
Table 15 Wireless LAN: 802.1X/Wpa: no Access/Authentication
80
Figure 26 Wireless LAN: 802.1X/Wpa: 802.1Xl
81
Table 16 Wireless LAN: 802.1X/Wpa: 802.1X
81
Authentication Required: WPA
82
Figure 27 Wireless LAN: 802.1X/Wpa: WPA
83
Table 17 Wireless LAN: 802.1X/Wpa: WPA
83
Authentication Required: WPA-PSK
84
Figure 28 Wireless LAN: 802.1X/Wpa:wpa-PSK
84
Table 18 Wireless LAN: 802.1X/Wpa: WPA-PSK
84
Configuring Local User Authentication
85
Figure 29 Local User Database
86
Table 19 Local User Database
86
Configuring RADIUS
87
Figure 30 RADIUS
87
Table 20 RADIUS
87
Chapter 6 WAN Setup
90
WAN Overview
90
Encapsulation
90
Enet Encap
90
PPP over Ethernet
90
Pppoa
90
Rfc 1483
91
Multiplexing
91
VC-Based Multiplexing
91
LLC-Based Multiplexing
91
VPI and VCI
91
IP Address Assignment
91
IP Assignment with Pppoa or Pppoe Encapsulation
91
IP Assignment with RFC 1483 Encapsulation
92
IP Assignment with ENET ENCAP Encapsulation
92
Nailed-Up Connection (PPP)
92
Nat
92
Metric
92
Pppoe Encapsulation
93
Traffic Shaping
93
Zero Configuration Internet Access
94
Figure 31 Example of Traffic Shaping
94
The Main WAN Screen
95
Configuring WAN Setup
95
Figure 32 WAN
95
Table 21 WAN
95
Figure 33 WAN Setup (Pppoe)
96
Table 22 WAN Setup
96
Traffic Redirect
98
Configuring WAN Backup
99
Figure 34 Traffic Redirect Example
99
Figure 35 Traffic Redirect LAN Setup
99
Figure 36 WAN Backup
100
Table 23 WAN Backup
100
Chapter 7 Network Address Translation (NAT) Screens
102
NAT Overview
102
NAT Definitions
102
Table 24 NAT Definitions
102
What NAT Does
103
How NAT Works
103
NAT Application
104
Figure 37 How NAT Works
104
Figure 38 NAT Application with IP Alias
104
NAT Mapping Types
105
Table 25 NAT Mapping Types
105
SUA (Single User Account) Versus NAT
106
SUA Server
106
Default Server IP Address
106
Port Forwarding: Services and Port Numbers
106
Table 26 Services and Port Numbers
106
Configuring Servers Behind SUA (Example)
107
Selecting the NAT Mode
107
Figure 39 Multiple Servers Behind NAT Example
107
Configuring SUA Server Set
108
Figure 40 NAT Mode
108
Table 27 NAT Mode
108
Figure 41 Edit SUA/NAT Server Set
109
Table 28 Edit SUA/NAT Server Set
109
Configuring Address Mapping Rules
110
Figure 42 Address Mapping Rules
110
Table 29 Address Mapping Rules
110
Editing an Address Mapping Rule
111
Figure 43 Edit Address Mapping Rule
112
Table 30 Edit Address Mapping Rule
112
Chapter 8 Dynamic DNS Setup
114
Dynamic DNS Overview
114
DYNDNS Wildcard
114
Configuring Dynamic DNS
114
Figure 44 Dynamic DNS
115
Table 31 Dynamic DNS
115
Chapter 9 Time and Date
116
Configuring Time and Date
116
Figure 45 Time and Date
116
Table 32 Time and Date
117
Chapter 10 Firewalls
118
Firewall Overview
118
Types of Firewalls
118
Packet Filtering Firewalls
118
Application-Level Firewalls
119
Stateful Inspection Firewalls
119
Introduction to Zyxel's Firewall
119
Denial of Service Attacks
120
Denial of Service
120
Basics
120
Figure 46 Prestige Firewall Application
120
Types of Dos Attacks
121
Table 33 Common IP Ports
121
Figure 47 Three-Way Handshake
122
Figure 48 SYN Flood
122
Figure 49 Smurf Attack
123
ICMP Vulnerability
123
Illegal Commands (Netbios and SMTP)
123
Table 34 ICMP Commands that Trigger Alerts
123
Table 35 Legal Netbios Commands
123
Traceroute
124
Stateful Inspection
124
Table 36 Legal SMTP Commands
124
Figure 50 Stateful Inspection
125
Stateful Inspection Process
125
Stateful Inspection and the Prestige
126
TCP Security
126
UDP/ICMP Security
127
Upper Layer Protocols
127
Guidelines for Enhancing Security with Your Firewall
127
Security in General
128
Packet Filtering Vs Firewall
129
Packet Filtering
129
When to Use Filtering
129
Firewall
129
When to Use the Firewall
129
Chapter 11 Firewall Configuration
132
Access Methods
132
Firewall Policies Overview
132
Rule Logic Overview
133
Rule Checklist
133
Security Ramifications
133
Key Fields for Configuring Rules
134
Action
134
Service
134
Source Address
134
Destination Address
134
Connection Direction
134
LAN to WAN Rules
134
Alerts
135
Configuring Default Firewall Policy
135
Figure 51 Firewall: Default Policy
135
Table 37 Firewall: Default Policy
135
Rule Summary
136
Figure 52 Firewall: Rule Summary
137
Table 38 Rule Summary
137
Configuring Firewall Rules
138
Figure 53 Firewall: Edit Rule
139
Table 39 Firewall: Edit Rule
140
Customized Services
141
Configuring a Customized Service
141
Figure 54 Firewall: Customized Services
141
Table 40 Customized Services
141
Example Firewall Rule
142
Figure 55 Firewall: Configure Customized Services
142
Table 41 Firewall: Configure Customized Services
142
Figure 56 Firewall Example: Rule Summary
143
Figure 57 Firewall Example: Edit Rule: Destination Address
144
Figure 58 Edit Custom Port Example
144
Figure 59 Firewall Example: Edit Rule: Select Customized Services
145
Predefined Services
146
Figure 60 Firewall Example: Rule Summary: My Service
146
Table 42 Predefined Services
146
Anti-Probing
148
Dos Thresholds
149
Figure 61 Firewall: Anti Probing
149
Table 43 Firewall: Anti Probing
149
Half-Open Sessions
150
TCP Maximum Incomplete and Blocking Time
150
Threshold Values
150
Configuring Firewall Thresholds
151
Figure 62 Firewall: Threshold
151
Table 44 Firewall: Threshold
152
Chapter 12 Content Filtering
154
Content Filtering Overview
154
The Main Content Filter Screen
154
Figure 63 Content Filtering
154
Table 45
154
Configuring Keyword Blocking
155
Figure 64 Content Filter: Keyword
155
Table 46 Content Filter: Keyword
155
Configuring the Schedule
156
Configuring Trusted Computers
156
Figure 65 Content Filter: Schedule
156
Table 47 Content Filter: Schedule
156
Figure 66 Content Filter: Trusted
157
Table 48 Content Filter: Trusted
157
Chapter 13 Remote Management Configuration
158
Remote Management Overview
158
Remote Management Limitations
158
Remote Management and NAT
159
System Timeout
159
Telnet
159
Figure 67 Telnet Configuration on a TCP/IP Network
159
Ftp
160
Web
160
Configuring Remote Management
160
Figure 68 Remote Management
160
Table 49 Remote Management
160
Chapter 14 Universal Plug-And-Play (Upnp)
162
Introducing Universal Plug and Play
162
How Do I Know if I'M Using Upnp
162
NAT Traversal
162
Cautions with Upnp
163
Upnp and Zyxel
163
Configuring Upnp
163
Figure 69 Configuring Upnp
163
Installing Upnp in Windows Example
164
Table 50 Configuring Upnp
164
Figure 70 Add/Remove Programs: Windows Setup: Communication
165
Figure 71 Add/Remove Programs: Windows Setup: Communication: Components
165
Figure 72 Network Connections
166
Figure 73 Windows Optional Networking Components Wizard
167
Using Upnp in Windows XP Example
168
Figure 74 Networking Services
168
Figure 75 Network Connections
169
Figure 76 Internet Connection Properties
170
Figure 77 Internet Connection Properties: Advanced Settings
171
Figure 78 Internet Connection Properties: Advanced Settings: Add
171
Figure 79 System Tray Icon
172
Figure 80 Internet Connection Status
172
Figure 81 Network Connections
173
Figure 82 Network Connections: My Network Places
174
Figure 83 Network Connections: My Network Places: Properties: Example
174
Chapter 15 Logs Screens
176
Logs Overview
176
Alerts and Logs
176
Configuring Log Settings
176
Figure 84 Log Settings
177
Table 51 Log Settings
177
Displaying the Logs
178
SMTP Error Messages
179
Figure 85 View Logs
179
Table 52 View Logs
179
Table 53 SMTP Error Messages
179
Example E-Mail Log
180
Figure 86 E-Mail Log Example
180
ZyXEL Communications P-660HW-T1 User Manual (372 pages)
P-660HN-T Series, P-660N-T Series, P-660HNU-T Series, P-660HU-T Series ADSL Router Series
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 11.86 MB
Table of Contents
About this User's Guide
3
Document Conventions
5
Safety Warnings
7
Table of Contents
9
Contents Overview
9
Table of Contents
11
User's Guide
21
Part I: User's Guide
21
Chapter 1 Introduction
23
Introduction
23
Overview
23
Ways to Manage the Zyxel Device
23
Applications for the Zyxel Device
24
Good Habits for Managing the Zyxel Device
24
Internet Access
24
Using the WPS/WLAN Button
25
Wireless Access
25
The RESET Button
26
Using the Reset Button
27
Chapter 2 The Web Configurator
29
Accessing the Web Configurator
29
Overview
29
The Main Screen
31
Title Bar
31
Navigation Panel
32
Main Window
34
Status Bar
34
Chapter 3 Status Screens
35
Overview
35
Status Screens
35
The Status Screen
36
Chapter 4 Tutorials
41
Overview
41
Setting up Your DSL Connection
41
Tutorials
41
Ipv6 Address Configuration
43
6To4 Tunneling
44
Configuring the Wireless Network Settings
45
Setting up a Secure Wireless Network
45
Using WPS
46
Connecting Wirelessly to Your Zyxel Device
50
Configuring the MAC Address Filter for Restricting Wireless Internet Access
52
Multiple Public and Private IP Address Mappings
54
Full Feature NAT + Many-To-Many no Overload Mapping
55
Full Feature NAT + One-To-One Mapping
57
Port Forwarding
58
Setting up NAT Forwarding for a Game Server
58
Configuring Firewall Rules to Allow a Specified Service
60
Configuring Static Route for Routing to Another Network
63
Configuring ATM Qos for Multiple WAN Connections
65
Port BindingConfiguration
65
Configuring Port Binding
67
Configuring Qos to Prioritize Traffic
68
Access the Zyxel Device from the Internet Using DDNS
71
Configuring DDNS on Your Zyxel Device
71
Registering a DDNS Account on Www.dyndns.org
71
How to Use File Sharing on the Zyxel Device
72
Set up File Sharing
72
Testing the DDNS Setting
72
Access Your Shared Files from a Computer
73
How to Share a USB Printer Via Your Zyxel Device
74
Technical Reference
77
Part II: Technical Reference
77
Chapter 5 Internet and Wireless Setup Wizard
79
Internet Access Wizard Setup
79
Overview
79
Manual Configuration
82
Wireless Connection Wizard Setup
87
Manually Assign a WEP Key
90
Manually Assign a WPA-PSK Key
90
Chapter 6 WAN Setup
93
Overview
93
WAN Setup
93
What You Can Do in the WAN Screens
93
What You Need to Know about WAN
93
Before You Begin
94
The Internet Access Setup Screen
95
Advanced Internet Access Setup
98
The more Connections Screen
100
More Connections Edit
101
Configuring more Connections Advanced Setup
103
Encapsulation
104
WAN Technical Reference
104
Multiplexing
105
IP Address Assignment
106
Nailed-Up Connection (PPP)
106
VPI and VCI
106
Nat
107
Traffic Shaping
107
ATM Traffic Classes
108
Chapter 7 LAN Setup
109
Overview
109
What You Can Do in the LAN Screens
109
What You Need to Know about LAN
109
Before You Begin
110
The LAN IP Screen
110
The Advanced LAN IP Setup Screen
111
The DHCP Setup Screen
112
The Client List Screen
113
The IP Alias Screen
114
Configuring the LAN IP Alias Screen
115
The Ipv6 Screen
116
DHCP Setup
119
DNS Server Addresses
119
LAN Technical Reference
119
Lans, Wans and the Zyxel Device
119
Lan Tcp/Ip
120
Multicast
121
RIP Setup
121
Advertisement
ZyXEL Communications P-660HW-T1 Support Notes (203 pages)
Brand:
ZyXEL Communications
| Category:
Modem
| Size: 3.42 MB
Table of Contents
Table of Contents
2
Index
6
Zynos FAQ
6
What Is Zynos
6
How Do I Access the Prestige SMT Menu
6
What Is the Default Console Port Baud Rate? Moreover, How Do I Change It
6
How Do I Update the Firmware and Configuration File
6
How Do I Upload the Zynos Firmware Code Via Console
6
How Do I Upgrade/Backup the Zynos Firmware by Using TFTP Client Program Via LAN
7
How Do I Upload ROMFILE Via Console Port
7
How Do I Restore SMT Configurations by Using TFTP Client Program Via LAN
7
What Should I Do if I Forget the System Password
7
How to Use the Reset Button
8
What Is SUA? When Should I Use SUA
8
What Is the Difference between SUA and Multi-NAT
8
Is It Possible to Access a Server Running Behind SUA from the Outside Internet? if Possible, How
9
When Do I Need Multi-NAT
9
What Ip/Port Mapping Does Multi-NAT Support
9
How Many Network Users Can the SUA/NAT Support
10
What Are Device Filters and Protocol Filters
11
Why Can't I Configure Device Filters or Protocol Filters
11
How Can I Protect against IP Spoofing Attacks
11
General FAQ
13
How Can I Manage P-660
13
What Is the Default User Name and Password to Loging Web Configurator
13
How Do I Know the P-660'S WAN IP Address Assigned by the ISP
13
What Is the Micro Filter or Splitter Used for
13
The P-660 Supports Bridge and Router Mode, What's the Difference between Them
13
How Do I Know I am Using Pppoe
14
Why Does My Provider Use Pppoe
14
What Is DDNS
14
When Do I Need DDNS Service
14
What Is DDNS Wildcard? Does the P-660 Support DDNS Wildcard
15
Can the P-660'S SUA Handle Ipsec Packets Sent by the Ipsec Gateway
15
How Do I Setup My P-660 for Routing Ipsec Packets over SUA
15
What Is Traffic Shaping
15
What Do the Parameters (PCR, SCR, MBS) Mean
16
Why Do We Perform Traffic Shaping in the P-660
16
Adsl Faq
17
How Does ADSL Compare to Cable Modems
17
What Is the Expected Throughput
17
What Is the Micro Filter Used for
17
How Do I Know the ADSL Line Is up
17
How Does the P-660 Work on a Noisy ADSL
17
Does the VC-Based Multiplexing Perform Better than the LLC-Based Multiplexing
18
How Do I Know the Details of My ADSL Line Statistics
18
What Are the Possible Reasons When the ADSL Link Is down
18
What Are the Signaling Pins of the ADSL Connector
18
Firewall FAQ (for P-660 H/HW Only)
19
General
19
What Is a Network Firewall
19
What Makes P-660 Secure
19
What Are the Basic Types of Firewalls
19
What Kind of Firewall Is the P-660
20
Why Do You Need a Firewall When Your Router Has Packet Filtering and NAT Built-In
20
What Is Denials of Service (Dos) Attack
20
What Is Ping of Death Attack
21
What Is Teardrop Attack
21
What Is SYN Flood Attack
21
What Is LAND Attack
21
What Is Brute-Force Attack
21
What Is IP Spoofing Attack
22
What Are the Default ACL Firewall Rules in P-660
22
Configuration
22
How Do I Configure the Firewall
22
How Do I Prevent Others from Configuring My Firewall
22
Can I Use a Browser to Configure My P-660
22
Why Can't I Configure My Router Using Telnet over WAN
22
Why Can't I Upload the Firmware and Configuration File Using FTP over WAN
23
Log and Alert
23
When Does the P-660 Generate the Firewall Log
23
What Does the Log Show to Us
24
How Do I View the Firewall Log
24
When Does the P-660 Generate the Firewall Alert
25
What Does the Alert Show to Us
25
What Is the Difference between the Log and Alert
25
ZyXEL Communications P-660HW-T1 Specification (2 pages)
p-660hw series Cost-effective Ultra High-Speed Wireless ADSL2+ Gateway for SOHO Networks
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.27 MB
Table of Contents
Specifications
2
Advanced Features
2
Hardware Specification
2
Network Management
2
Operating Environment
2
Product Description
2
ZyXEL Communications P-660HW-T1 Install Manual (2 pages)
P-660HW Series 802.11g Wireless ADSL2+ 4-port Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.24 MB
Advertisement
Related Products
ZyXEL Communications P-660HW-D1
ZyXEL Communications P-660HW-D3
ZyXEL Communications P-660HW-T3
ZyXEL Communications P-660HWP-D1
ZyXEL Communications P-660HWP-D3
ZyXEL Communications P-660HW-63
ZyXEL Communications P-660HW-67
ZyXEL Communications P-660H-T1
ZyXEL Communications P-660HN-T3A
ZyXEL Communications P-660HU-T1
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL