Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HWP-Dx
ZyXEL Communications P-660HWP-Dx Manuals
Manuals and User Guides for ZyXEL Communications P-660HWP-Dx. We have
3
ZyXEL Communications P-660HWP-Dx manuals available for free PDF download: User Manual, Support Notes, Quick Start Manual
ZyXEL Communications P-660HWP-Dx User Manual (402 pages)
802.11g HomePlug AV ADSL2+ Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 12 MB
Table of Contents
About this User's Guide
3
Intended Audience
3
Related Documentation
3
Document Conventions
4
Syntax Conventions
4
Warnings and Notes
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
27
PART I Introduction
33
Chapter 1 Introducing the P-660HWP-DX
35
Overview
35
Figure 1 Protected Internet Access Applications
36
Figure 2 LAN-To-LAN Application Example
36
Figure 3 Front Panel
38
Table 2 Front Panel Leds
38
Figure 4 Connecting a POTS Splitter
39
P-660HWP-DX with ISDN
40
Connecting a POTS Splitter
39
Telephone Microfilters
39
Table 1 ADSL Standards
36
Good Habits for Managing the P-660HWP-DX
37
Leds
37
Ways to Manage the P-660HWP-DX
37
Hardware Connections
38
Figure 5 Connecting a Microfilter
40
Figure 6 Connecting a Microfilter and Y-Connector
40
Figure 7 P-660HWP-DX with ISDN
41
Chapter 2 Introducing the Web Configurator
43
Accessing the Web Configurator
43
Web Configurator Overview
43
Administrator Access
44
Figure 8 Password Screen
44
Figure 9 User Status Screen
44
Figure 10 Change Password at Login
45
Figure 12 Web Configurator: Main Screen
46
Table 3 Web Configurator Screens Summary
47
Figure 13 Status Screen
49
Status Screen
49
Table 4 Status Screen
50
Figure 14 Status: any IP Table
51
Status: any IP Table
51
Figure 15 Status: WLAN Status
52
Status: Bandwidth Status
52
Status: WLAN Status
52
Table 5 Status: any IP Table
52
Table 6 Status: WLAN Status
52
Status: Packet Statistics
53
Status: Powerline Statistics
53
Figure 16 Status: Bandwidth Status
53
Figure 17 Status: Powerline
53
Figure 18 Status: Packet Statistics
54
Table 7 Status: Packet Statistics
54
Changing Login Password
55
User Access
44
Figure 11 Select a Mode
45
Navigating the Web Configurator
46
Navigation Panel
46
Resetting the P-660HWP-DX
46
Using the Reset Button
46
Figure 19 System General
55
Wizards
57
Part II: Wizards
57
Chapter 3 Wizard Setup for Internet/Wireless Access
59
Internet/Wireless Access Wizard Setup
59
Introduction
59
Figure 20 Select a Mode
60
Figure 21 Wizard: Welcome
60
Automatic Detection
61
Figure 22 Auto Detection: no DSL Connection
61
Figure 23 Auto Detection: Failed
61
Figure 24 Auto-Detection: Pppoe
62
Figure 25 Internet Access Wizard Setup: ISP Parameters
62
Manual Configuration
62
Figure 26 Internet Connection with Pppoe
63
Table 8 Internet Access Wizard Setup: ISP Parameters
63
Figure 27 Internet Connection with RFC 1483
64
Table 10 Internet Connection with RFC 1483
64
Figure 31 Connection Test Failed-2
67
Figure 32 Connection Test Successful
67
Figure 33 Wireless LAN Setup Wizard 1
68
Table 13 Wireless LAN Setup Wizard 1
68
Figure 34 Wireless LAN Setup Wizard 2
69
Table 14 Wireless LAN Setup Wizard 2
69
Manually Assign a WEP Key
70
Manually Assign a WPA-PSK Key
70
Table 9 Internet Connection with Pppoe
64
Figure 28 Internet Connection with ENET ENCAP
65
Table 11 Internet Connection with ENET ENCAP
65
Figure 29 Internet Connection with Pppoa
66
Figure 30 Connection Test Failed-1
66
Table 12 Internet Connection with Pppoa
66
Wireless Connection Wizard Setup
67
Figure 35 Manually Assign a WPA Key
70
Table 15 Manually Assign a WPA Key
70
Figure 36 Manually Assign a WEP Key
71
Figure 37 Wireless LAN Setup 3
71
Table 16 Manually Assign a WEP Key
71
Figure 38 Internet Access and Wireless Wizard Setup Complete
72
Chapter 4 Bandwidth Management Wizard
73
Introduction
73
Predefined Media Bandwidth Management Services
73
Table 17 Media Bandwidth Management Setup: Services
73
Bandwidth Management Wizard Setup
74
Figure 39 Select a Mode
74
Figure 40 Wizard: Welcome
75
Figure 41 Bandwidth Management Wizard: General Information
75
Table 18 Bandwidth Management Wizard: General Information
75
Figure 42 Bandwidth Management Wizard: Configuration
76
Table 19 Bandwidth Management Wizard: Configuration
76
Figure 43 Bandwidth Management Wizard: Complete
77
Network
79
Part III: Network
79
Chapter 5 WAN Setup
81
Encapsulation
81
WAN Overview
81
WAN Setup
81
Encapsulation and Multiplexing Scenarios
82
LLC-Based Multiplexing
82
IP Address Assignment
83
VPI and VCI
83
Multiplexing
82
VC-Based Multiplexing
82
IP Assignment with ENET ENCAP Encapsulation
83
Nailed-Up Connection (PPP)
83
Metric
84
Nat
84
Traffic Shaping
84
ATM Traffic Classes
85
Constant Bit Rate (CBR)
85
Figure 44 Example of Traffic Shaping
85
Variable Bit Rate (VBR)
85
Internet Connection
86
Zero Configuration Internet Access
86
Figure 45 Internet Connection (Pppoe)
87
Table 20 Internet Connection
87
Configuring Advanced Internet Connection Setup
88
Figure 46 Advanced Internet Connection Setup
89
Table 21 Advanced Internet Connection Setup
89
Configuring more Connections
90
Figure 47 more Connections
90
More Connections Edit
91
Table 22 more Connections
91
Figure 48 more Connections Edit
92
Table 23 more Connections Edit
92
Configuring more Connections Advanced Setup
94
Figure 49 more Connections Advanced Setup
94
Table 24 more Connections Advanced Setup
94
Configuring WAN Backup
95
Figure 50 Traffic Redirect Example
95
Figure 51 Traffic Redirect LAN Setup
95
Traffic Redirect
95
Figure 52 WAN Backup Setup
96
Table 25 WAN Backup Setup
96
LAN Overview
99
Lans, Wans and the P-660HWP-DX
99
LAN Setup
99
Chapter 6 LAN Setup
99
Figure 53 LAN and WAN IP Addresses
99
DHCP Setup
100
DNS Server Address
100
DNS Server Address Assignment
100
IP Pool Setup
100
IP Address and Subnet Mask
101
Lan Tcp/Ip
101
Private IP Addresses
101
Multicast
102
RIP Setup
102
Any IP
103
Figure 54 any IP Example
103
Configuring LAN IP
104
Figure 55 LAN IP
104
Configuring Advanced LAN Setup
105
Figure 56 Advanced LAN Setup
105
Table 26 LAN IP
105
Table 27 Advanced LAN Setup
105
DHCP Setup
106
Figure 57 DHCP Setup
106
LAN Client List
107
Table 28 DHCP Setup
107
Figure 58 LAN Client List
108
LAN IP Alias
108
Table 29 LAN Client List
108
Figure 59 Physical Network & Partitioned Logical Networks
109
Figure 60 LAN IP Alias
109
Table 30 LAN IP Alias
110
Requirements
112
Setup Information
112
Wireless Network Setup
112
MAC Address Filter
113
Ssid
113
Wireless Security Overview
113
Encryption
114
User Authentication
114
Figure 63 Wireless: no Security
117
Table 33 Wireless no Security
117
Wpa-Psk/Wpa2-Psk
118
Table 35 Wireless: WPA-PSK/WPA2-PSK
119
Wpa/Wpa2
120
Table 36 Wireless: WPA/WPA2
121
Wireless LAN Advanced Setup
122
How any IP Works
104
Wireless LAN
111
Chapter 7 Wireless LAN
111
Figure 61 Example of a Wireless Network
111
Wireless Network Overview
111
Table 31 Types of Encryption for each Type of Authentication
114
General Wireless LAN Screen
115
One-Touch Intelligent Security Technology (OTIST)
115
Figure 62 Wireless LAN: General
116
Table 32 Wireless LAN: General
116
No Security
117
WEP Encryption
117
Figure 64 Wireless: Static WEP Encryption
118
Table 34 Wireless: Static WEP Encryption
118
Figure 65 Wireless: WPA-PSK/WPA2-PSK
119
Figure 66 Wireless: WPA/WPA2
120
Figure 67 Advanced
122
Table 37 Wireless LAN: Advanced
122
Enabling OTIST
123
Otist
123
Figure 68 OTIST
124
Table 38 OTIST
124
Figure 69 Example Wireless Client OTIST Screen
125
Figure 72 OTIST in Progress (Client)
126
Figure 73 no AP with OTIST Found
126
Figure 74 Start OTIST
126
Figure 75 MAC Address Filter
127
MAC Filter
127
Table 39 MAC Address Filter
127
Table 40 WMM Qos Priorities
128
WMM Qos
128
WMM Qos Example
128
WMM Qos Priorities
128
Services
129
Qos Screen
130
Wireless Client
124
Figure 70 Security Key
125
Figure 71 OTIST in Progress (AP)
125
Starting OTIST
125
Notes on OTIST
126
Table 41 Commonly Used Services
130
Qos Screen
131
Tos (Type of Service) and WMM Qos
131
Application Priority Configuration
132
Figure 76 Wireless LAN: Qos
132
Table 42 Wireless Lan: Qos
132
Figure 77 Application Priority Configuration
133
Table 43 Application Priority Configuration
133
Overview
135
Privacy and Powerline Adapters
136
Setting up a Private Powerline Network
136
Setting up Multiple Powerline Networks
137
Figure 81 Network > Powerline > Local Setting
138
Table 44 Network > Powerline > Local Setting
138
Configuring Remote Settings
139
Figure 82 Network > Powerline > Remote Setting
139
Table 45 Network > Powerline > Remote Setting
139
Powerline Network Status
140
Powerline
135
Chapter 8 Powerline
135
Figure 78 Expand Your Network
135
Figure 79 Powerline Network Scenario
136
Figure 80 Two Private Powerline Networks on One Circuit
137
Configuring Local Settings
138
Figure 83 Network > Powerline > Status
140
Table 46 Network > Powerline > Status
140
Chapter 9 Network Address Translation (NAT)
143
NAT Definitions
143
NAT Overview
143
Table 47 NAT Definitions
143
Figure 84 How NAT Works
144
How NAT Works
144
NAT Application
144
What NAT Does
144
Figure 85 NAT Application with IP Alias
145
Sip Alg
146
SUA (Single User Account) Versus NAT
146
Table 48 NAT Mapping Types
146
Figure 86 NAT General
147
NAT General Setup
147
Table 49 NAT General
147
Table 50 Services and Port Numbers
148
Configuring Port Forwarding
149
Configuring Servers Behind Port Forwarding (Example)
149
Figure 87 Multiple Servers Behind NAT Example
149
Port Forwarding Rule Edit
150
NAT Mapping Types
145
Figure 88 NAT Port Forwarding
150
Table 51 NAT Port Forwarding
150
Address Mapping
151
Default Server IP Address
148
Port Forwarding
148
Port Forwarding: Services and Port Numbers
148
Figure 89 Port Forwarding Rule Setup
151
Table 52 Port Forwarding Rule Setup
151
Figure 90 Address Mapping Rules
152
Table 53 Address Mapping Rules
152
Address Mapping Rule Edit
153
Figure 91 Edit Address Mapping Rule
153
Table 54 Edit Address Mapping Rule
153
Security
155
Part IV: Security
155
Chapter 10 Firewalls
157
Firewall Overview
157
Firewalls
157
Packet Filtering Firewalls
157
Types of Firewalls
157
Application-Level Firewalls
158
Introduction to Zyxel's Firewall
158
Stateful Inspection Firewalls
158
Basics
159
Denial of Service
159
Denial of Service Attacks
159
Figure 92 Firewall Application
159
Table 55 Common IP Ports
159
Figure 93 Three-Way Handshake
160
Types of Dos Attacks
160
Figure 94 SYN Flood
161
Figure 95 Smurf Attack
161
Table 56 ICMP Commands that Trigger Alerts
162
Firewall
167
When to Use Filtering
167
ICMP Vulnerability
162
Illegal Commands (Netbios and SMTP)
162
Stateful Inspection
162
Table 58 Legal SMTP Commands
162
Figure 96 Stateful Inspection
163
Stateful Inspection and the P-660HWP-DX
164
TCP Security
164
UDP/ICMP Security
165
Upper Layer Protocols
165
Guidelines for Enhancing Security with Your Firewall
166
Security in General
166
Packet Filtering
167
Packet Filtering Vs Firewall
167
Table 57 Legal Netbios Commands
162
Stateful Inspection Process
163
When to Use the Firewall
167
Chapter 11 Firewall Configuration
169
Access Methods
169
Firewall Policies Overview
169
Rule Checklist
170
Rule Logic Overview
170
Security Ramifications
170
Connection Direction
171
Key Fields for Configuring Rules
171
Alerts
172
Figure 97 Firewall: General
172
General Firewall Policy
172
LAN to WAN Rules
172
Firewall Rules Summary
173
Table 59 Firewall: General
173
Figure 98 Firewall Rules
174
Table 60 Firewall Rules
174
Configuring Firewall Rules
175
Figure 99 Firewall: Edit Rule
176
Figure 100 Firewall: Customized Services
178
Table 62 Customized Services
178
Example Firewall Rule
179
Figure 101 Firewall: Configure Customized Services
179
Table 63 Firewall: Configure Customized Services
179
Figure 102 Firewall Example: Rules
180
Figure 103 Edit Custom Port Example
180
Figure 104 Firewall Example: Edit Rule: Destination Address
181
Figure 106 Firewall Example: Rules: Myservice
183
Table 64 Predefined Services
183
Anti-Probing
185
Figure 107 Firewall: Anti Probing
185
Dos Thresholds
186
Table 65 Firewall: Anti Probing
186
Threshold Values
186
Half-Open Sessions
187
Table 61 Firewall: Edit Rule
177
Configuring a Customized Service
178
Customized Services
178
Figure 105 Firewall Example: Edit Rule: Select Customized Services
182
Predefined Services
183
Configuring Firewall Thresholds
187
Figure 108 Firewall: Threshold
188
Table 66 Firewall: Threshold
188
Configuring Keyword Blocking
191
Content Filtering Overview
191
Figure 110 Content Filter: Schedule
192
Table 67 Content Filter: Keyword
192
Configuring Trusted Computers
193
TCP Maximum Incomplete and Blocking Time
187
Content Filtering
191
Figure 111 Content Filter: Trusted
193
Table 68 Content Filter: Schedule
193
Table 69 Content Filter: Trusted
193
Certificates Overview
195
Figure 112 Certificates on Your Computer
196
Configuration Summary
197
Figure 114 Certificate Configuration Overview
197
My Certificates
198
Table 70 Security > Certificates > My Certificates
198
My Certificates > Details
199
Table 72 Security > Certificates > My Certificates > Details
200
My Certificates > Create
202
Figure 120 Security > Certificates > Trusted cas > Import
210
Figure 121 Security > Certificates > Trusted Remote Hosts
210
Table 77 Security > Certificates > Trusted cas Import
210
Table 78 Security > Certificates > Trusted Remote Hosts
211
Trusted Remote Hosts > Import
211
Trusted Remote Host Certificate Details
212
Certificates
195
Figure 122 Security > Certificates > Trusted Remote Hosts > Import
212
Table 79 Security > Certificates > Trusted Remote Hosts > Import
212
Figure 123 Security > Certificates > Trusted Remote Hosts > Details
213
Table 80 Security > Certificates > Trusted Remote Hosts > Details
213
Directory Server Add or Edit
215
Directory Servers
215
Chapter 12 Content Filtering
191
Figure 109 Content Filter: Keyword
191
Configuring the Schedule
192
Figure 124 Security > Certificates > Directory Servers
215
Table 81 Security > Certificates > Directory Servers
215
Figure 125 Security > Certificates > Directory Server > Add
216
Table 82 Security > Certificates > Directory Server > Add
216
Advanced
217
Part V: Advanced
217
Configuring Static Route
219
Static Route
219
Figure 127 Static Route
220
Table 83 Static Route
220
Figure 128 Static Route Edit
221
Table 84 Static Route Edit
221
Application-Based Bandwidth Management
223
Bandwidth Management Overview
223
Table 86 Maximize Bandwidth Usage Example
226
Table 87 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
226
Bandwidth Management Priorities
227
Over Allotment of Bandwidth
227
Table 90 over Allotment of Bandwidth Example
227
Configuring Summary
228
Table 91 Media Bandwidth Management: Summary
228
Bandwidth Management Rule Setup
229
Diffserv
230
DSCP and Per-Hop Behavior
230
Figure 133 Bandwidth Management Rule Configuration
231
Table 93 Sub-Classes of AF Services
231
Table 94 Bandwidth Management Rule Configuration
232
Table 95 Services and Port Numbers
233
Bandwidth Monitor
234
Figure 134 Bandwidth Management: Monitor
234
Table 96 Bandwidth Management Monitor
234
Dynamic DNS Setup
235
Bandwidth Management
223
Chapter 13 Certificates
195
Advantages of Certificates
196
Checking the Fingerprint of a Certificate on Your Computer
196
Self-Signed Certificates
196
Verifying a Certificate
196
Figure 113 Certificate Details
197
Figure 115 Security > Certificates > My Certificates
198
Table 71 Security > Certificates > My Certificates > Edit
200
Figure 116 Security > Certificates > My Certificates > Create
202
Figure 117 Security > Certificates > My Certificates > Import
205
Figure 118 Security > Certificates > Trusted cas
206
Figure 119 Security > Certificates > Trusted cas > Details
207
Table 76 Security > Certificates > Trusted cas > Details
208
Trusted CA > Import
209
Trusted Remote Hosts
210
Table 75 Security > Certificates > Trusted cas
206
Trusted CA Details
207
Table 74 Security > Certificates > My Certificates > Import
205
Trusted cas
206
Table 73 Security > Certificates > My Certificates > Create
203
My Certificates > Import
204
Certificate File Formats
205
Chapter 14 Static Route
219
Figure 126 Example of Static Routing Topology
219
Static Route Edit
220
Figure 135 Dynamic DNS
236
Table 97 Dynamic DNS
236
Chapter 15 Bandwidth Management
223
Subnet-Based Bandwidth Management
223
Application and Subnet-Based Bandwidth Management
224
Figure 129 Subnet-Based Bandwidth Management Example
224
Priority-Based Scheduler
224
Scheduler
224
Table 85 Application and Subnet-Based Bandwidth Management Example
224
Fairness-Based Scheduler
225
Maximize Bandwidth Usage
225
Reserving Bandwidth for Non-Bandwidth Class Traffic
225
Maximize Bandwidth Usage Example
226
Table 88 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
227
Table 89 Bandwidth Management Priorities
227
Figure 130 Bandwidth Management: Summary
228
Figure 131 Bandwidth Management: Rule Setup
229
Table 92 Bandwidth Management: Rule Setup
229
Figure 132 Diffserv: Differentiated Service Field
230
Rule Configuration
231
Chapter 16 Dynamic DNS Setup
235
Configuring Dynamic DNS
235
Dynamic DNS Overview
235
DYNDNS Wildcard
235
Chapter 17 Remote Management Configuration
239
Remote Management Overview
239
Figure 136 Remote Management: WWW
240
Remote Management and NAT
240
Remote Management Limitations
240
System Timeout
240
Www
240
Figure 137 Telnet Configuration on a TCP/IP Network
241
Figure 138 Remote Management: Telnet
242
Figure 139 Remote Management: FTP
243
Table 100 Remote Management: FTP
243
Figure 140 SNMP Management Model
244
Supported Mibs
244
Configuring SNMP
245
Figure 141 Remote Management: SNMP
245
SNMP Traps
245
Table 101 SNMP Traps
245
Configuring DNS
246
Table 102 Remote Management: SNMP
246
Configuring ICMP
247
Figure 142 Remote Management: DNS
247
Table 103 Remote Management: DNS
247
248
248
Table 99 Remote Management: Telnet
242
Snmp
243
Table 98 Remote Management: WWW
241
Telnet
241
Configuring FTP
242
Configuring Telnet
242
Figure 143 Remote Management: ICMP
248
Table 104 Remote Management: ICMP
248
Figure 144 Enabling TR-069
249
Table 105 TR-069 Commands
249
Chapter 18 Universal Plug-And-Play (Upnp)
251
Cautions with Upnp
251
How Do I Know if I'M Using Upnp
251
Introducing Universal Plug and Play
251
NAT Traversal
251
Configuring Upnp
252
Figure 145 Configuring Upnp
252
Table 106 Configuring Upnp
252
Figure 146 Add/Remove Programs: Windows Setup: Communication
253
Figure 147 Add/Remove Programs: Windows Setup: Communication: Components
254
Installing Upnp in Windows XP
254
Figure 149 Windows Optional Networking Components Wizard
255
Figure 150 Networking Services
255
Auto-Discover Your Upnp-Enabled Network Device
256
Figure 148 Network Connections
254
Using Upnp in Windows XP Example
255
Upnp and Zyxel
252
Installing Upnp in Windows Example
253
Installing Upnp in Windows Me
253
Figure 151 Network Connections
256
Figure 152 Internet Connection Properties
257
Figure 153 Internet Connection Properties: Advanced Settings
257
Figure 154 Internet Connection Properties: Advanced Settings: Add
258
Figure 155 System Tray Icon
258
Web Configurator Easy Access
259
Figure 156 Internet Connection Status
259
Figure 157 Network Connections
260
Figure 158 Network Connections: My Network Places
261
Figure 159 Network Connections: My Network Places: Properties: Example
261
Maintenance and Troubleshooting
263
Part VI: Maintenance and Troubleshooting
263
Chapter 19 System
265
General Setup
265
General Setup and System Name
265
System
265
Figure 160 System General Setup
266
Figure 161 System Time Setting
267
Table 108 System Time Setting
268
Alerts and Logs
271
Table 107 System General Setup
266
Time Setting
267
Logs
271
Figure 162 View Log
272
Table 109 View Log
272
Figure 163 Log Settings
273
Table 110 Log Settings
273
Example E-Mail Log
274
Figure 164 E-Mail Log Example
275
Log Descriptions
275
Table 111 System Maintenance Logs
275
Table 112 System Error Logs
276
Table 113 Access Control Logs
276
Table 114 TCP Reset Logs
277
Table 115 Packet Filter Logs
277
Table 116 ICMP Logs
278
Table 117 CDR Logs
278
Table 118 PPP Logs
278
Table 119 Upnp Logs
279
Table 120 Content Filtering Logs
279
Table 121 Attack Logs
280
Table 122 Ipsec Logs
280
Table 123 IKE Logs
281
Table 124 PKI Logs
284
Table 125 Certificate Path Verification Failure Reason Codes
285
Table 126 ACL Setting Notes
285
Table 127 ICMP Notes
286
Table 128 Syslog Logs
287
Table 129 RFC-2408 ISAKMP Payload Types
287
Table 131 Maintenance > Tools > Configuration
291
Restore Configuration
292
Restart
293
Diagnostic
295
General Diagnostic
295
Table 133 Diagnostic: General
295
DSL Line Diagnostic
296
Troubleshooting
297
Firmware Upgrade
289
Figure 166 Firmware Upload in Progress
290
Figure 167 Network Temporarily Disconnected
290
Backup Configuration
291
Configuration Screen
291
Chapter 20 Logs
271
Logs Overview
271
Viewing the Logs
271
Configuring Log Settings
272
Tools
289
Appendices and Index
303
Part VII: Appendices and Index
303
Product Specifications
305
Chapter 21 Tools
289
Figure 165 Firmware Upgrade
289
Table 130 Firmware Upgrade
289
Figure 168 Error Message
291
Figure 169 Maintenance > Tools > Configuration
291
Figure 170 Configuration Restore Successful
292
Table 132 Maintenance Restore Configuration
292
Back to Factory Defaults
293
Figure 171 Temporarily Disconnected
293
Figure 172 Configuration Restore Error
293
Figure 173 Restart Screen
293
Chapter 22 Diagnostic
295
Figure 174 Diagnostic: General
295
Figure 175 Diagnostic: DSL Line
296
Table 134 Diagnostic: DSL Line
296
Chapter 23 Troubleshooting
297
Power, Hardware Connections, and Leds
297
P-660HWP-DX Access and Login
298
Internet Access
299
Powerline Issues
301
Appendix A Product Specifications and Wall Mounting
305
Table 135 Hardware Specifications
305
Table 136 Firmware Specifications
305
Table 137 Wireless Firmware Specifications
307
Table 138 Standards Supported
308
Wall Mounting Instructions
309
Figure 176 Wall-Mounting Example
310
Figure 177 Masonry Plug and M4 Tap Screw
310
Ad-Hoc Wireless LAN Configuration
311
Appendix B Wireless Lans
311
Figure 178 Peer-To-Peer Communication in an Ad-Hoc Network
311
Wireless Lan Topologies
311
Figure 179 Basic Service Set
312
Figure 180 Infrastructure WLAN
313
Figure 181 RTS/CTS
314
Fragmentation Threshold
314
Preamble Type
315
Table 139 IEEE 802.11G
315
Wireless Security Overview
315
Table 140 Wireless Security Levels
316
Types of Eap Authentication
317
Types of Radius Messages
317
Dynamic Wep Key Exchange
319
Table 141 Comparison of EAP Authentication Types
319
Wpa and Wpa2
319
Figure 182 WPA(2) with RADIUS Application Example
321
Wireless Client Wpa Supplicants
321
WPA(2)-PSK Application Example
321
Antenna Overview
322
Figure 183 WPA(2)-PSK Authentication
322
Security Parameters Summary
322
Table 142 Wireless Security Relational Matrix
322
Antenna Characteristics
323
Antenna Gain
323
Positioning Antennas
323
Radiation Pattern
323
Types of Antennas for Wlan
323
Internal SPTGEN Overview
325
Appendix C Internal SPTGEN
325
Figure 184 Configuration Text File Format: Column Descriptions
325
The Configuration Text File Format
325
Figure 185 Invalid Parameter Entered: Command Line Example
326
Figure 187 Internal SPTGEN FTP Download Example
327
Figure 188 Internal SPTGEN FTP Upload Example
327
Example Internal SPTGEN Menus
328
Table 143 Abbreviations Used in the Example Internal SPTGEN Screens Table
328
Table 144 Menu 1 General Setup
328
Table 145 Menu 3
328
Table 146 Menu 4 Internet Access Setup
330
Table 147 Menu 12
332
Table 148 Menu 15 SUA Server Setup
332
Table 149 Menu 21.1 Filter Set #1
334
Table 150 Menu 21.1 Filter Set #2
335
Table 151 Menu 23 System Menus
337
Table 152 Menu 24.11 Remote Management Control
338
Table 153 Command Examples
339
Figure 186 Valid Parameter Entered: Command Line Example
326
Internal SPTGEN File Modification - Important Points to Remember
326
Internal Sptgen Ftp Download Example
326
Appendix D Setting up Your Computer's IP Address
341
Figure 189 Windows 95/98/Me: Network: Configuration
342
Installing Components
342
Figure 190 Windows 95/98/Me: TCP/IP Properties: IP Address
343
Figure 191 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
344
Verifying Settings
344
Figure 192 Windows XP: Start Menu
345
Figure 193 Windows XP: Control Panel
345
Figure 194 Windows XP: Control Panel: Network Connections: Properties
346
Figure 195 Windows XP: Local Area Connection Properties
346
Figure 196 Windows XP: Internet Protocol (TCP/IP) Properties
347
Figure 197 Windows XP: Advanced TCP/IP Properties
348
Figure 198 Windows XP: Internet Protocol (TCP/IP) Properties
349
Figure 199 Macintosh os 8/9: Apple Menu
350
Figure 200 Macintosh os 8/9: TCP/IP
350
Figure 201 Macintosh os X: Apple Menu
351
Macintosh os X
351
Figure 202 Macintosh os X: Network
352
Figure 203 Red hat 9.0: KDE: Network Configuration: Devices
353
Figure 204 Red hat 9.0: KDE: Ethernet Device: General
353
Using the K Desktop Environment (KDE)
353
Figure 205 Red hat 9.0: KDE: Network Configuration: DNS
354
Figure 206 Red hat 9.0: KDE: Network Configuration: Activate
354
Using Configuration Files
354
Figure 207 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
355
Figure 208 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
355
Figure 209 Red hat 9.0: DNS Settings in Resolv.conf
355
Figure 210 Red hat 9.0: Restart Ethernet Card
355
Figure 211 Red hat 9.0: Checking TCP/IP Properties
356
Introduction to Ip Addresses
357
Ip Address Classes and Hosts
357
Advertisement
ZyXEL Communications P-660HWP-Dx Support Notes (134 pages)
802.11g HomePlug AV ADSL2+ Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 2 MB
Table of Contents
Table of Contents
2
Faq
7
Zynos FAQ
7
What Is Zynos
7
How Do I Access the P-660HWP-DX Command Line Interface (CLI)
7
How Do I Update the Firmware and Configuration File
7
How Do I Upgrade/Backup the Zynos Firmware by Using TFTP Client Program Via LAN
7
How Do I Restore P-660HWP-DX Configurations by Using TFTP Client Program Via LAN
8
What Should I Do if I Forget the System Password
8
How to Use the Reset Button
8
What Is SUA? When Should I Use SUA
9
What Is the Difference between SUA and Full Feature NAT
9
Is It Possible to Access a Server Running Behind SUA from the Outside Internet? How Can I Do It
10
When Do I Need Select Full Feature NAT
10
What Ip/Port Mapping Does Multi-NAT Support
10
How Many Network Users Can the SUA/NAT Support
12
What Are Device Filters and Protocol Filters
12
How Can I Protect against IP Spoofing Attacks
12
Product FAQ
14
How Can I Manage P-660HWP-DX
14
What Is the Default Password for Web Configurator
14
What's the Difference between 'Common User Account' and 'Administrator Account
14
How Do I Know the P-660HWP-DX's WAN IP Address Assigned by the ISP
14
What Is the Micro Filter or Splitter Used for
15
The P-660HWP-DX Supports Bridge and Router Mode, What's the Difference between Them
15
How Do I Know I am Using Pppoe
15
Why Does My Provider Use Pppoe
15
What Is DDNS
15
When Do I Need DDNS Service
16
What Is DDNS Wildcard? Does the P-660HWP-DX Support DDNS Wildcard
16
Can the P-660HWP-DX's SUA Handle Ipsec Packets Sent by the Ipsec Gateway
16
How Do I Setup My P-660HWP-DX for Routing Ipsec Packets over SUA
17
What Is Traffic Shaping
17
Why Do We Perform Traffic Shaping in the P-660HWP-DX
17
What Do the Parameters (PCR, SCR, MBS) Mean
18
What Do the ATM Qos Types (CBR, UBR, VBR-Nrt, VBR-RT) Mean
18
What Is Content Filter
19
What Is Homeplug AV
19
What Is TR069
19
Adsl Faq
20
How Does ADSL Compare to Cable Modems
20
What Is the Expected Throughput
20
What Is the Microfilter Used for
20
How Do I Know the ADSL Line Is up
20
How Does the P-660HWP-DX Work on a Noisy ADSL
20
Does the VC-Based Multiplexing Perform Better than the LLC-Based Multiplexing
21
How Do I Know the Details of My ADSL Line Statistics
21
What Are the Signaling Pins of the ADSL Connector
21
What Is Triple Play
21
Hpav Faq
23
Can I Deploy P-660HWP-DX in both 100V Region Like Japan or 230V Region Like UK
23
Will P-660HWP-DX Damage or Influence any Home Appliances and Other Electronics Devices
23
What Is the Maximum Speed of P-660HWP-DX
23
Zyxel P-660HWP-DX Can Use the Existing Electrical Wiring as Media to Transfer Data. so Does It Work Even Power Is out
23
Why Sometimes the Performance of P-660HWP-DX Is Not so Good
23
Is the Zyxel P-660HWP-DX Communication Secured
23
How Can I Achieve the Best Performance of My Powerline Devices
23
As to Zyxel P-660HWP-DX, will the Powerline Signal Pass between Houses
24
What Is the Maximum Area that P-660HWP-DX Can Cover
24
General
25
What Is a Network Firewall
25
What Makes P-660HWP-DX Secure
25
What Are the Basic Types of Firewalls
25
What Kind of Firewall Is the P-660HWP-DX
26
Why Do You Need a Firewall When Your Router Has Packet Filtering and NAT Built-In
26
What Is Denials of Service (Dos) Attack
27
What Is Ping of Death Attack
27
What Is Teardrop Attack
27
What Is SYN Flood Attack
27
What Is LAND Attack
28
What Is Brute-Force Attack
28
What Is IP Spoofing Attack
28
What Are the Default ACL Firewall Rules in P-660HWP-DX
29
Configuration
29
How Do I Configure the Firewall
29
How Do I Prevent Others from Configuring My Firewall
29
Why Can't I Configure My P-660HWP-DX Using Web Configurator/Telnet over WAN
30
Why Can't I Upload the Firmware and Configuration File Using FTP over WAN
31
Log and Alert
32
When Does the P-660HWP-DX Generate the Firewall Log
32
What Does the Log Show to Us
32
How Do I View the Firewall Log
32
When Does the P-660HWP-DX Generate the Firewall Alert
33
What Is the Difference between the Log and Alert
33
Wireless FAQ
34
General FAQ
34
What Is a Wireless LAN
34
What Are the Advantages of Wireless LAN
34
What Is the Disadvantage of Wireless LAN
34
Where Can You Find 802.11 Wireless Networks
35
What Is an Access Point
35
What's the Difference between Ieee802.11A/B/G
35
Is It Possible to Use Wireless Products from a Variety of Vendors
36
What Is Wi-Fi
36
What Types of Devices Use the 2.4Ghz Band
36
Does the 802.11 Interfere with Bluetooth Device
36
Can Radio Signals Pass through Wall
37
What Are Potential Factors that May Causes Interference Among WLAN Products
37
What's the Difference between a WLAN and a WWAN
37
Can I Manually Swap the Wireless Module Without Damage any Hardware
38
What Wireless Security Mode Does P-660HWP-DX Support
38
What Wireless Standard Does P-660HWP-DX Support
38
Does P-660HWP-DX Support MAC Filtering
38
Does P-660HWP-DX Support Auto Rate Adaption
38
Advanced FAQ
39
What Is Ad Hoc Mode
39
What Is Infrastructure Mode
39
How Many Access Points Are Required in a Given Area
39
What Is Direct-Sequence Spread Spectrum Technology - (DSSS)
39
What Is Frequency-Hopping Spread Spectrum Technology - (FHSS)
39
Do I Need the same Kind of Antenna on both Sides of a Link
40
Why the 2.4 GHZ Frequency Range
40
What Is Server Set ID (SSID)
40
What Is an ESSID
40
Security FAQ
42
How Do I Secure the Data Across the P-660HWP-DX Access Point's Radio Link
42
What Is WEP
42
What Is WPA
42
What Is the Difference between 40-Bit and 64-Bit WEP
43
What Is a WEP Key
43
Will 128-Bit WEP Communicate with 64-Bit WEP
43
Can the SSID be Encrypted
43
By Turning off the Broadcast of SSID, Can Someone Still Sniff the SSID
43
What Are Insertion Attacks
43
What Is Wireless Sniffer
43
What Is OTIST? How Do I Use It
44
Application Notes
45
General Application Notes
45
Internet Access Using P-660HWP-DX under Bridge Mode
45
Internet Access Using P-660HWP-DX under Routing Mode
47
Setup the P-660HWP-DX as a DHCP Relay
49
SUA Notes
49
Using Full Feature NAT
58
Using the Dynamic DNS (DDNS)
70
Network Management Using SNMP
72
Using Syslog
75
Using IP Alias
75
Using IP Policy Routing
77
Using Call Scheduling
81
Using IP Multicast
83
Using Bandwidth Management
84
Using Zero-Configuration
87
How Could I Configure Triple Play on P-660HWP-DX
90
How to Configure Packet Filter on P-660HWP-DX
90
How to Use Homeplug on P-660HWP-DX
93
How to Configure TR069 on P-660HWP-DX
96
Wireless Application Notes
100
Configure a Wireless Client to Ad Hoc Mode
100
Configuring Infrastructure Mode
104
MAC Filter
108
Setup WEP (Wired Equivalent Privacy)
110
Site Survey
115
Configure 802.1X and WPA
118
ZyXEL Communications P-660HWP-Dx Quick Start Manual (13 pages)
802.11g HomePlug AV ADSL2+ Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
3
Internet and Wireless Setup Wizard
4
Setting up a Wireless Network
8
Troubleshooting
10
Advertisement
Advertisement
Related Products
ZyXEL Communications P-660HWP-DX - V3.40
ZyXEL Communications P-660HW Series
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HW-TX
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications P-660HW-DX
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P-660HW-Tx v2 Series
ZyXEL Communications P660HW3
ZyXEL Communications P-660HWP-D1
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL