Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
P-660HWP-DX - V3.40
ZyXEL Communications P-660HWP-DX - V3.40 Manuals
Manuals and User Guides for ZyXEL Communications P-660HWP-DX - V3.40. We have
1
ZyXEL Communications P-660HWP-DX - V3.40 manual available for free PDF download: User Manual
ZyXEL Communications P-660HWP-DX - V3.40 User Manual (402 pages)
802.11g HomePlug AV ADSL2+ Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 12 MB
Table of Contents
About this User's Guide
3
Intended Audience
3
Related Documentation
3
Document Conventions
4
Syntax Conventions
4
Warnings and Notes
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
27
PART I Introduction
33
Chapter 1 Introducing the P-660HWP-DX
35
Overview
35
Figure 1 Protected Internet Access Applications
36
Figure 2 LAN-To-LAN Application Example
36
Figure 3 Front Panel
38
Table 2 Front Panel Leds
38
Figure 4 Connecting a POTS Splitter
39
P-660HWP-DX with ISDN
40
Connecting a POTS Splitter
39
Telephone Microfilters
39
Table 1 ADSL Standards
36
Good Habits for Managing the P-660HWP-DX
37
Leds
37
Ways to Manage the P-660HWP-DX
37
Hardware Connections
38
Figure 5 Connecting a Microfilter
40
Figure 6 Connecting a Microfilter and Y-Connector
40
Figure 7 P-660HWP-DX with ISDN
41
Chapter 2 Introducing the Web Configurator
43
Accessing the Web Configurator
43
Web Configurator Overview
43
Administrator Access
44
Figure 8 Password Screen
44
Figure 9 User Status Screen
44
Figure 10 Change Password at Login
45
Figure 12 Web Configurator: Main Screen
46
Table 3 Web Configurator Screens Summary
47
Figure 13 Status Screen
49
Status Screen
49
Table 4 Status Screen
50
Figure 14 Status: any IP Table
51
Status: any IP Table
51
Figure 15 Status: WLAN Status
52
Status: Bandwidth Status
52
Status: WLAN Status
52
Table 5 Status: any IP Table
52
Table 6 Status: WLAN Status
52
Status: Packet Statistics
53
Status: Powerline Statistics
53
Figure 16 Status: Bandwidth Status
53
Figure 17 Status: Powerline
53
Figure 18 Status: Packet Statistics
54
Table 7 Status: Packet Statistics
54
Changing Login Password
55
User Access
44
Figure 11 Select a Mode
45
Navigating the Web Configurator
46
Navigation Panel
46
Resetting the P-660HWP-DX
46
Using the Reset Button
46
Figure 19 System General
55
Wizards
57
Part II: Wizards
57
Chapter 3 Wizard Setup for Internet/Wireless Access
59
Internet/Wireless Access Wizard Setup
59
Introduction
59
Figure 20 Select a Mode
60
Figure 21 Wizard: Welcome
60
Automatic Detection
61
Figure 22 Auto Detection: no DSL Connection
61
Figure 23 Auto Detection: Failed
61
Figure 24 Auto-Detection: Pppoe
62
Figure 25 Internet Access Wizard Setup: ISP Parameters
62
Manual Configuration
62
Figure 26 Internet Connection with Pppoe
63
Table 8 Internet Access Wizard Setup: ISP Parameters
63
Figure 27 Internet Connection with RFC 1483
64
Table 10 Internet Connection with RFC 1483
64
Figure 31 Connection Test Failed-2
67
Figure 32 Connection Test Successful
67
Figure 33 Wireless LAN Setup Wizard 1
68
Table 13 Wireless LAN Setup Wizard 1
68
Figure 34 Wireless LAN Setup Wizard 2
69
Table 14 Wireless LAN Setup Wizard 2
69
Manually Assign a WEP Key
70
Manually Assign a WPA-PSK Key
70
Table 9 Internet Connection with Pppoe
64
Figure 28 Internet Connection with ENET ENCAP
65
Table 11 Internet Connection with ENET ENCAP
65
Figure 29 Internet Connection with Pppoa
66
Figure 30 Connection Test Failed-1
66
Table 12 Internet Connection with Pppoa
66
Wireless Connection Wizard Setup
67
Figure 35 Manually Assign a WPA Key
70
Table 15 Manually Assign a WPA Key
70
Figure 36 Manually Assign a WEP Key
71
Figure 37 Wireless LAN Setup 3
71
Table 16 Manually Assign a WEP Key
71
Figure 38 Internet Access and Wireless Wizard Setup Complete
72
Chapter 4 Bandwidth Management Wizard
73
Introduction
73
Predefined Media Bandwidth Management Services
73
Table 17 Media Bandwidth Management Setup: Services
73
Bandwidth Management Wizard Setup
74
Figure 39 Select a Mode
74
Figure 40 Wizard: Welcome
75
Figure 41 Bandwidth Management Wizard: General Information
75
Table 18 Bandwidth Management Wizard: General Information
75
Figure 42 Bandwidth Management Wizard: Configuration
76
Table 19 Bandwidth Management Wizard: Configuration
76
Figure 43 Bandwidth Management Wizard: Complete
77
Network
79
Part III: Network
79
Chapter 5 WAN Setup
81
Encapsulation
81
WAN Overview
81
WAN Setup
81
Encapsulation and Multiplexing Scenarios
82
LLC-Based Multiplexing
82
IP Address Assignment
83
VPI and VCI
83
Multiplexing
82
VC-Based Multiplexing
82
IP Assignment with ENET ENCAP Encapsulation
83
Nailed-Up Connection (PPP)
83
Metric
84
Nat
84
Traffic Shaping
84
ATM Traffic Classes
85
Constant Bit Rate (CBR)
85
Figure 44 Example of Traffic Shaping
85
Variable Bit Rate (VBR)
85
Internet Connection
86
Zero Configuration Internet Access
86
Figure 45 Internet Connection (Pppoe)
87
Table 20 Internet Connection
87
Configuring Advanced Internet Connection Setup
88
Figure 46 Advanced Internet Connection Setup
89
Table 21 Advanced Internet Connection Setup
89
Configuring more Connections
90
Figure 47 more Connections
90
More Connections Edit
91
Table 22 more Connections
91
Figure 48 more Connections Edit
92
Table 23 more Connections Edit
92
Configuring more Connections Advanced Setup
94
Figure 49 more Connections Advanced Setup
94
Table 24 more Connections Advanced Setup
94
Configuring WAN Backup
95
Figure 50 Traffic Redirect Example
95
Figure 51 Traffic Redirect LAN Setup
95
Traffic Redirect
95
Figure 52 WAN Backup Setup
96
Table 25 WAN Backup Setup
96
LAN Overview
99
Lans, Wans and the P-660HWP-DX
99
LAN Setup
99
Chapter 6 LAN Setup
99
Figure 53 LAN and WAN IP Addresses
99
DHCP Setup
100
DNS Server Address
100
DNS Server Address Assignment
100
IP Pool Setup
100
IP Address and Subnet Mask
101
Lan Tcp/Ip
101
Private IP Addresses
101
Multicast
102
RIP Setup
102
Any IP
103
Figure 54 any IP Example
103
Configuring LAN IP
104
Figure 55 LAN IP
104
Configuring Advanced LAN Setup
105
Figure 56 Advanced LAN Setup
105
Table 26 LAN IP
105
Table 27 Advanced LAN Setup
105
DHCP Setup
106
Figure 57 DHCP Setup
106
LAN Client List
107
Table 28 DHCP Setup
107
Figure 58 LAN Client List
108
LAN IP Alias
108
Table 29 LAN Client List
108
Figure 59 Physical Network & Partitioned Logical Networks
109
Figure 60 LAN IP Alias
109
Table 30 LAN IP Alias
110
Requirements
112
Setup Information
112
Wireless Network Setup
112
MAC Address Filter
113
Ssid
113
Wireless Security Overview
113
Encryption
114
User Authentication
114
Figure 63 Wireless: no Security
117
Table 33 Wireless no Security
117
Wpa-Psk/Wpa2-Psk
118
Table 35 Wireless: WPA-PSK/WPA2-PSK
119
Wpa/Wpa2
120
Table 36 Wireless: WPA/WPA2
121
Wireless LAN Advanced Setup
122
How any IP Works
104
Wireless LAN
111
Chapter 7 Wireless LAN
111
Figure 61 Example of a Wireless Network
111
Wireless Network Overview
111
Table 31 Types of Encryption for each Type of Authentication
114
General Wireless LAN Screen
115
One-Touch Intelligent Security Technology (OTIST)
115
Figure 62 Wireless LAN: General
116
Table 32 Wireless LAN: General
116
No Security
117
WEP Encryption
117
Figure 64 Wireless: Static WEP Encryption
118
Table 34 Wireless: Static WEP Encryption
118
Figure 65 Wireless: WPA-PSK/WPA2-PSK
119
Figure 66 Wireless: WPA/WPA2
120
Figure 67 Advanced
122
Table 37 Wireless LAN: Advanced
122
Enabling OTIST
123
Otist
123
Figure 68 OTIST
124
Table 38 OTIST
124
Figure 69 Example Wireless Client OTIST Screen
125
Figure 72 OTIST in Progress (Client)
126
Figure 73 no AP with OTIST Found
126
Figure 74 Start OTIST
126
Figure 75 MAC Address Filter
127
MAC Filter
127
Table 39 MAC Address Filter
127
Table 40 WMM Qos Priorities
128
WMM Qos
128
WMM Qos Example
128
WMM Qos Priorities
128
Services
129
Qos Screen
130
Wireless Client
124
Figure 70 Security Key
125
Figure 71 OTIST in Progress (AP)
125
Starting OTIST
125
Notes on OTIST
126
Table 41 Commonly Used Services
130
Qos Screen
131
Tos (Type of Service) and WMM Qos
131
Application Priority Configuration
132
Figure 76 Wireless LAN: Qos
132
Table 42 Wireless Lan: Qos
132
Figure 77 Application Priority Configuration
133
Table 43 Application Priority Configuration
133
Overview
135
Privacy and Powerline Adapters
136
Setting up a Private Powerline Network
136
Setting up Multiple Powerline Networks
137
Figure 81 Network > Powerline > Local Setting
138
Table 44 Network > Powerline > Local Setting
138
Configuring Remote Settings
139
Figure 82 Network > Powerline > Remote Setting
139
Table 45 Network > Powerline > Remote Setting
139
Powerline Network Status
140
Powerline
135
Chapter 8 Powerline
135
Figure 78 Expand Your Network
135
Figure 79 Powerline Network Scenario
136
Figure 80 Two Private Powerline Networks on One Circuit
137
Configuring Local Settings
138
Figure 83 Network > Powerline > Status
140
Table 46 Network > Powerline > Status
140
Chapter 9 Network Address Translation (NAT)
143
NAT Definitions
143
NAT Overview
143
Table 47 NAT Definitions
143
Figure 84 How NAT Works
144
How NAT Works
144
NAT Application
144
What NAT Does
144
Figure 85 NAT Application with IP Alias
145
Sip Alg
146
SUA (Single User Account) Versus NAT
146
Table 48 NAT Mapping Types
146
Figure 86 NAT General
147
NAT General Setup
147
Table 49 NAT General
147
Table 50 Services and Port Numbers
148
Configuring Port Forwarding
149
Configuring Servers Behind Port Forwarding (Example)
149
Figure 87 Multiple Servers Behind NAT Example
149
Port Forwarding Rule Edit
150
NAT Mapping Types
145
Figure 88 NAT Port Forwarding
150
Table 51 NAT Port Forwarding
150
Address Mapping
151
Default Server IP Address
148
Port Forwarding
148
Port Forwarding: Services and Port Numbers
148
Figure 89 Port Forwarding Rule Setup
151
Table 52 Port Forwarding Rule Setup
151
Figure 90 Address Mapping Rules
152
Table 53 Address Mapping Rules
152
Address Mapping Rule Edit
153
Figure 91 Edit Address Mapping Rule
153
Table 54 Edit Address Mapping Rule
153
Security
155
Part IV: Security
155
Chapter 10 Firewalls
157
Firewall Overview
157
Firewalls
157
Packet Filtering Firewalls
157
Types of Firewalls
157
Application-Level Firewalls
158
Introduction to Zyxel's Firewall
158
Stateful Inspection Firewalls
158
Basics
159
Denial of Service
159
Denial of Service Attacks
159
Figure 92 Firewall Application
159
Table 55 Common IP Ports
159
Figure 93 Three-Way Handshake
160
Types of Dos Attacks
160
Figure 94 SYN Flood
161
Figure 95 Smurf Attack
161
Table 56 ICMP Commands that Trigger Alerts
162
Firewall
167
When to Use Filtering
167
ICMP Vulnerability
162
Illegal Commands (Netbios and SMTP)
162
Stateful Inspection
162
Table 58 Legal SMTP Commands
162
Figure 96 Stateful Inspection
163
Stateful Inspection and the P-660HWP-DX
164
TCP Security
164
UDP/ICMP Security
165
Upper Layer Protocols
165
Guidelines for Enhancing Security with Your Firewall
166
Security in General
166
Packet Filtering
167
Packet Filtering Vs Firewall
167
Table 57 Legal Netbios Commands
162
Stateful Inspection Process
163
When to Use the Firewall
167
Chapter 11 Firewall Configuration
169
Access Methods
169
Firewall Policies Overview
169
Rule Checklist
170
Rule Logic Overview
170
Security Ramifications
170
Connection Direction
171
Key Fields for Configuring Rules
171
Alerts
172
Figure 97 Firewall: General
172
General Firewall Policy
172
LAN to WAN Rules
172
Firewall Rules Summary
173
Table 59 Firewall: General
173
Figure 98 Firewall Rules
174
Table 60 Firewall Rules
174
Configuring Firewall Rules
175
Figure 99 Firewall: Edit Rule
176
Figure 100 Firewall: Customized Services
178
Table 62 Customized Services
178
Example Firewall Rule
179
Figure 101 Firewall: Configure Customized Services
179
Table 63 Firewall: Configure Customized Services
179
Figure 102 Firewall Example: Rules
180
Figure 103 Edit Custom Port Example
180
Figure 104 Firewall Example: Edit Rule: Destination Address
181
Figure 106 Firewall Example: Rules: Myservice
183
Table 64 Predefined Services
183
Anti-Probing
185
Figure 107 Firewall: Anti Probing
185
Dos Thresholds
186
Table 65 Firewall: Anti Probing
186
Threshold Values
186
Half-Open Sessions
187
Table 61 Firewall: Edit Rule
177
Configuring a Customized Service
178
Customized Services
178
Figure 105 Firewall Example: Edit Rule: Select Customized Services
182
Predefined Services
183
Configuring Firewall Thresholds
187
Figure 108 Firewall: Threshold
188
Table 66 Firewall: Threshold
188
Configuring Keyword Blocking
191
Content Filtering Overview
191
Figure 110 Content Filter: Schedule
192
Table 67 Content Filter: Keyword
192
Configuring Trusted Computers
193
TCP Maximum Incomplete and Blocking Time
187
Content Filtering
191
Figure 111 Content Filter: Trusted
193
Table 68 Content Filter: Schedule
193
Table 69 Content Filter: Trusted
193
Certificates Overview
195
Figure 112 Certificates on Your Computer
196
Configuration Summary
197
Figure 114 Certificate Configuration Overview
197
My Certificates
198
Table 70 Security > Certificates > My Certificates
198
My Certificates > Details
199
Table 72 Security > Certificates > My Certificates > Details
200
My Certificates > Create
202
Figure 120 Security > Certificates > Trusted cas > Import
210
Figure 121 Security > Certificates > Trusted Remote Hosts
210
Table 77 Security > Certificates > Trusted cas Import
210
Table 78 Security > Certificates > Trusted Remote Hosts
211
Trusted Remote Hosts > Import
211
Trusted Remote Host Certificate Details
212
Certificates
195
Figure 122 Security > Certificates > Trusted Remote Hosts > Import
212
Table 79 Security > Certificates > Trusted Remote Hosts > Import
212
Figure 123 Security > Certificates > Trusted Remote Hosts > Details
213
Table 80 Security > Certificates > Trusted Remote Hosts > Details
213
Directory Server Add or Edit
215
Directory Servers
215
Chapter 12 Content Filtering
191
Figure 109 Content Filter: Keyword
191
Configuring the Schedule
192
Figure 124 Security > Certificates > Directory Servers
215
Table 81 Security > Certificates > Directory Servers
215
Figure 125 Security > Certificates > Directory Server > Add
216
Table 82 Security > Certificates > Directory Server > Add
216
Advanced
217
Part V: Advanced
217
Configuring Static Route
219
Static Route
219
Figure 127 Static Route
220
Table 83 Static Route
220
Figure 128 Static Route Edit
221
Table 84 Static Route Edit
221
Application-Based Bandwidth Management
223
Bandwidth Management Overview
223
Table 86 Maximize Bandwidth Usage Example
226
Table 87 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
226
Bandwidth Management Priorities
227
Over Allotment of Bandwidth
227
Table 90 over Allotment of Bandwidth Example
227
Configuring Summary
228
Table 91 Media Bandwidth Management: Summary
228
Bandwidth Management Rule Setup
229
Diffserv
230
DSCP and Per-Hop Behavior
230
Figure 133 Bandwidth Management Rule Configuration
231
Table 93 Sub-Classes of AF Services
231
Table 94 Bandwidth Management Rule Configuration
232
Table 95 Services and Port Numbers
233
Bandwidth Monitor
234
Figure 134 Bandwidth Management: Monitor
234
Table 96 Bandwidth Management Monitor
234
Dynamic DNS Setup
235
Bandwidth Management
223
Chapter 13 Certificates
195
Advantages of Certificates
196
Checking the Fingerprint of a Certificate on Your Computer
196
Self-Signed Certificates
196
Verifying a Certificate
196
Figure 113 Certificate Details
197
Figure 115 Security > Certificates > My Certificates
198
Table 71 Security > Certificates > My Certificates > Edit
200
Figure 116 Security > Certificates > My Certificates > Create
202
Figure 117 Security > Certificates > My Certificates > Import
205
Figure 118 Security > Certificates > Trusted cas
206
Figure 119 Security > Certificates > Trusted cas > Details
207
Table 76 Security > Certificates > Trusted cas > Details
208
Trusted CA > Import
209
Trusted Remote Hosts
210
Table 75 Security > Certificates > Trusted cas
206
Trusted CA Details
207
Table 74 Security > Certificates > My Certificates > Import
205
Trusted cas
206
Table 73 Security > Certificates > My Certificates > Create
203
My Certificates > Import
204
Certificate File Formats
205
Chapter 14 Static Route
219
Figure 126 Example of Static Routing Topology
219
Static Route Edit
220
Figure 135 Dynamic DNS
236
Table 97 Dynamic DNS
236
Chapter 15 Bandwidth Management
223
Subnet-Based Bandwidth Management
223
Application and Subnet-Based Bandwidth Management
224
Figure 129 Subnet-Based Bandwidth Management Example
224
Priority-Based Scheduler
224
Scheduler
224
Table 85 Application and Subnet-Based Bandwidth Management Example
224
Fairness-Based Scheduler
225
Maximize Bandwidth Usage
225
Reserving Bandwidth for Non-Bandwidth Class Traffic
225
Maximize Bandwidth Usage Example
226
Table 88 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
227
Table 89 Bandwidth Management Priorities
227
Figure 130 Bandwidth Management: Summary
228
Figure 131 Bandwidth Management: Rule Setup
229
Table 92 Bandwidth Management: Rule Setup
229
Figure 132 Diffserv: Differentiated Service Field
230
Rule Configuration
231
Chapter 16 Dynamic DNS Setup
235
Configuring Dynamic DNS
235
Dynamic DNS Overview
235
DYNDNS Wildcard
235
Chapter 17 Remote Management Configuration
239
Remote Management Overview
239
Figure 136 Remote Management: WWW
240
Remote Management and NAT
240
Remote Management Limitations
240
System Timeout
240
Www
240
Figure 137 Telnet Configuration on a TCP/IP Network
241
Figure 138 Remote Management: Telnet
242
Figure 139 Remote Management: FTP
243
Table 100 Remote Management: FTP
243
Figure 140 SNMP Management Model
244
Supported Mibs
244
Configuring SNMP
245
Figure 141 Remote Management: SNMP
245
SNMP Traps
245
Table 101 SNMP Traps
245
Configuring DNS
246
Table 102 Remote Management: SNMP
246
Configuring ICMP
247
Figure 142 Remote Management: DNS
247
Table 103 Remote Management: DNS
247
248
248
Table 99 Remote Management: Telnet
242
Snmp
243
Table 98 Remote Management: WWW
241
Telnet
241
Configuring FTP
242
Configuring Telnet
242
Figure 143 Remote Management: ICMP
248
Table 104 Remote Management: ICMP
248
Figure 144 Enabling TR-069
249
Table 105 TR-069 Commands
249
Chapter 18 Universal Plug-And-Play (Upnp)
251
Cautions with Upnp
251
How Do I Know if I'M Using Upnp
251
Introducing Universal Plug and Play
251
NAT Traversal
251
Configuring Upnp
252
Figure 145 Configuring Upnp
252
Table 106 Configuring Upnp
252
Figure 146 Add/Remove Programs: Windows Setup: Communication
253
Figure 147 Add/Remove Programs: Windows Setup: Communication: Components
254
Installing Upnp in Windows XP
254
Figure 149 Windows Optional Networking Components Wizard
255
Figure 150 Networking Services
255
Auto-Discover Your Upnp-Enabled Network Device
256
Figure 148 Network Connections
254
Using Upnp in Windows XP Example
255
Upnp and Zyxel
252
Installing Upnp in Windows Example
253
Installing Upnp in Windows Me
253
Figure 151 Network Connections
256
Figure 152 Internet Connection Properties
257
Figure 153 Internet Connection Properties: Advanced Settings
257
Figure 154 Internet Connection Properties: Advanced Settings: Add
258
Figure 155 System Tray Icon
258
Web Configurator Easy Access
259
Figure 156 Internet Connection Status
259
Figure 157 Network Connections
260
Figure 158 Network Connections: My Network Places
261
Figure 159 Network Connections: My Network Places: Properties: Example
261
Maintenance and Troubleshooting
263
Part VI: Maintenance and Troubleshooting
263
Chapter 19 System
265
General Setup
265
General Setup and System Name
265
System
265
Figure 160 System General Setup
266
Figure 161 System Time Setting
267
Table 108 System Time Setting
268
Alerts and Logs
271
Table 107 System General Setup
266
Time Setting
267
Logs
271
Figure 162 View Log
272
Table 109 View Log
272
Figure 163 Log Settings
273
Table 110 Log Settings
273
Example E-Mail Log
274
Figure 164 E-Mail Log Example
275
Log Descriptions
275
Table 111 System Maintenance Logs
275
Table 112 System Error Logs
276
Table 113 Access Control Logs
276
Table 114 TCP Reset Logs
277
Table 115 Packet Filter Logs
277
Table 116 ICMP Logs
278
Table 117 CDR Logs
278
Table 118 PPP Logs
278
Table 119 Upnp Logs
279
Table 120 Content Filtering Logs
279
Table 121 Attack Logs
280
Table 122 Ipsec Logs
280
Table 123 IKE Logs
281
Table 124 PKI Logs
284
Table 125 Certificate Path Verification Failure Reason Codes
285
Table 126 ACL Setting Notes
285
Table 127 ICMP Notes
286
Table 128 Syslog Logs
287
Table 129 RFC-2408 ISAKMP Payload Types
287
Table 131 Maintenance > Tools > Configuration
291
Restore Configuration
292
Restart
293
Diagnostic
295
General Diagnostic
295
Table 133 Diagnostic: General
295
DSL Line Diagnostic
296
Troubleshooting
297
Firmware Upgrade
289
Figure 166 Firmware Upload in Progress
290
Figure 167 Network Temporarily Disconnected
290
Backup Configuration
291
Configuration Screen
291
Chapter 20 Logs
271
Logs Overview
271
Viewing the Logs
271
Configuring Log Settings
272
Tools
289
Appendices and Index
303
Part VII: Appendices and Index
303
Product Specifications
305
Chapter 21 Tools
289
Figure 165 Firmware Upgrade
289
Table 130 Firmware Upgrade
289
Figure 168 Error Message
291
Figure 169 Maintenance > Tools > Configuration
291
Figure 170 Configuration Restore Successful
292
Table 132 Maintenance Restore Configuration
292
Back to Factory Defaults
293
Figure 171 Temporarily Disconnected
293
Figure 172 Configuration Restore Error
293
Figure 173 Restart Screen
293
Chapter 22 Diagnostic
295
Figure 174 Diagnostic: General
295
Figure 175 Diagnostic: DSL Line
296
Table 134 Diagnostic: DSL Line
296
Chapter 23 Troubleshooting
297
Power, Hardware Connections, and Leds
297
P-660HWP-DX Access and Login
298
Internet Access
299
Powerline Issues
301
Appendix A Product Specifications and Wall Mounting
305
Table 135 Hardware Specifications
305
Table 136 Firmware Specifications
305
Table 137 Wireless Firmware Specifications
307
Table 138 Standards Supported
308
Wall Mounting Instructions
309
Figure 176 Wall-Mounting Example
310
Figure 177 Masonry Plug and M4 Tap Screw
310
Ad-Hoc Wireless LAN Configuration
311
Appendix B Wireless Lans
311
Figure 178 Peer-To-Peer Communication in an Ad-Hoc Network
311
Wireless Lan Topologies
311
Figure 179 Basic Service Set
312
Figure 180 Infrastructure WLAN
313
Figure 181 RTS/CTS
314
Fragmentation Threshold
314
Preamble Type
315
Table 139 IEEE 802.11G
315
Wireless Security Overview
315
Table 140 Wireless Security Levels
316
Types of Eap Authentication
317
Types of Radius Messages
317
Dynamic Wep Key Exchange
319
Table 141 Comparison of EAP Authentication Types
319
Wpa and Wpa2
319
Figure 182 WPA(2) with RADIUS Application Example
321
Wireless Client Wpa Supplicants
321
WPA(2)-PSK Application Example
321
Antenna Overview
322
Figure 183 WPA(2)-PSK Authentication
322
Security Parameters Summary
322
Table 142 Wireless Security Relational Matrix
322
Antenna Characteristics
323
Antenna Gain
323
Positioning Antennas
323
Radiation Pattern
323
Types of Antennas for Wlan
323
Internal SPTGEN Overview
325
Appendix C Internal SPTGEN
325
Figure 184 Configuration Text File Format: Column Descriptions
325
The Configuration Text File Format
325
Figure 185 Invalid Parameter Entered: Command Line Example
326
Figure 187 Internal SPTGEN FTP Download Example
327
Figure 188 Internal SPTGEN FTP Upload Example
327
Example Internal SPTGEN Menus
328
Table 143 Abbreviations Used in the Example Internal SPTGEN Screens Table
328
Table 144 Menu 1 General Setup
328
Table 145 Menu 3
328
Table 146 Menu 4 Internet Access Setup
330
Table 147 Menu 12
332
Table 148 Menu 15 SUA Server Setup
332
Table 149 Menu 21.1 Filter Set #1
334
Table 150 Menu 21.1 Filter Set #2
335
Table 151 Menu 23 System Menus
337
Table 152 Menu 24.11 Remote Management Control
338
Table 153 Command Examples
339
Figure 186 Valid Parameter Entered: Command Line Example
326
Internal SPTGEN File Modification - Important Points to Remember
326
Internal Sptgen Ftp Download Example
326
Appendix D Setting up Your Computer's IP Address
341
Figure 189 Windows 95/98/Me: Network: Configuration
342
Installing Components
342
Figure 190 Windows 95/98/Me: TCP/IP Properties: IP Address
343
Figure 191 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
344
Verifying Settings
344
Figure 192 Windows XP: Start Menu
345
Figure 193 Windows XP: Control Panel
345
Figure 194 Windows XP: Control Panel: Network Connections: Properties
346
Figure 195 Windows XP: Local Area Connection Properties
346
Figure 196 Windows XP: Internet Protocol (TCP/IP) Properties
347
Figure 197 Windows XP: Advanced TCP/IP Properties
348
Figure 198 Windows XP: Internet Protocol (TCP/IP) Properties
349
Figure 199 Macintosh os 8/9: Apple Menu
350
Figure 200 Macintosh os 8/9: TCP/IP
350
Figure 201 Macintosh os X: Apple Menu
351
Macintosh os X
351
Figure 202 Macintosh os X: Network
352
Figure 203 Red hat 9.0: KDE: Network Configuration: Devices
353
Figure 204 Red hat 9.0: KDE: Ethernet Device: General
353
Using the K Desktop Environment (KDE)
353
Figure 205 Red hat 9.0: KDE: Network Configuration: DNS
354
Figure 206 Red hat 9.0: KDE: Network Configuration: Activate
354
Using Configuration Files
354
Figure 207 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
355
Figure 208 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
355
Figure 209 Red hat 9.0: DNS Settings in Resolv.conf
355
Figure 210 Red hat 9.0: Restart Ethernet Card
355
Figure 211 Red hat 9.0: Checking TCP/IP Properties
356
Introduction to Ip Addresses
357
Ip Address Classes and Hosts
357
Appendix E IP Subnetting
357
Table 154 Classes of IP Addresses
357
Subnet Masks
358
Table 155 Allowed IP Address Range by Class
358
Table 156 "Natural" Masks
358
Example: Two Subnets
359
Table 157 Alternative Subnet Mask Notation
359
Table 158 Two Subnets Example
359
Table 159 Subnet 1
360
Table 160 Subnet 2
360
Example: Four Subnets
361
Table 161 Subnet 1
361
Table 162 Subnet 2
361
Table 165 Eight Subnets
362
Table 166 Class C Subnet Planning
362
Table 167 Class B Subnet Planning
362
Accessing the Cli
365
Command Syntax
365
Command Usage
365
Table 163 Subnet 3
361
Table 164 Subnet 4
361
Example Eight Subnets
362
Subnetting with Class a and Class B Networks
362
Appendix F Command Interpreter
365
Displaying Logs
366
Figure 212 Displaying Log Categories Example
366
Figure 213 Displaying Log Parameters Example
366
Log Commands
366
Log Command Example
367
Appendix G Firewall Commands
369
Figure 214 Pop-Up Blocker
375
Internet Explorer Pop-Up Blockers
375
Appendix H Pop-Up Windows, Javascripts and Java Permissions
375
Enable Pop-Up Blockers with Exceptions
376
Figure 215 Internet Options: Privacy
376
Figure 216 Internet Options: Privacy
377
Figure 217 Pop-Up Blocker Settings
377
Figure 218 Internet Options: Security
378
Figure 219 Security Settings - Java Scripting
379
Figure 220 Security Settings - Java
379
Java Permissions
379
Figure 221 Java (Sun)
380
Display Netbios Filter Settings
381
Appendix I Netbios Filter Commands
381
Netbios Filter Configuration
382
Figure 222 Ideal Setup
383
The "Triangle Route" Problem
383
Appendix J Triangle Route
383
The Ideal Setup
383
Figure 223 "Triangle Route" Problem
384
Figure 224 IP Alias
384
The "Triangle Route" Solutions
384
Appendix K Legal Information
385
FCC Radiation Exposure Statement
386
Zyxel Limited Warranty
387
Appendix L Customer Support
389
Index
395
Advertisement
Advertisement
Related Products
ZyXEL Communications P-660HWP-Dx
ZyXEL Communications P-660HW Series
ZyXEL Communications P-660HW-D Series
ZyXEL Communications P-660HW-TX
ZyXEL Communications P-660HW-Tx v3 Series
ZyXEL Communications P-660HW-DX
ZyXEL Communications P-660HW-T3 v3
ZyXEL Communications P-660HW-Tx v2 Series
ZyXEL Communications P660HW3
ZyXEL Communications P-660HWP-D1
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL