Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Software
P-662HW
ZyXEL Communications P-662HW Manuals
Manuals and User Guides for ZyXEL Communications P-662HW. We have
5
ZyXEL Communications P-662HW manuals available for free PDF download: User Manual, Quick Start Manual, Upgrade Information, Specifications
ZyXEL Communications P-662HW User Manual (563 pages)
ADSL 2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 24.25 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
8
List of Figures
26
List of Tables
34
Preface
40
User Guide Feedback
41
Introduction to DSL
42
Chapter 1 Getting to Know Your Prestige
44
Introducing the Prestige
44
Table 1 ADSL Standards
44
Features of the Prestige
45
Table 2 Ieee802.11G
46
External Antenna
47
Wep Encryption
47
Wireless Lan Mac Address Filtering
47
Adsl Standards
48
Dynamic Dns Support
48
Networking Compatibility
49
Protocol Support
49
Diagnostics Capabilities
50
Ease of Installation
50
Network Management
50
Packet Filters
50
Applications for the Prestige
51
Internet Access
51
Firewall for Secure Broadband Internet Access
51
Figure 1 Prestige Internet Access Application
51
LAN to LAN Application
52
Figure 2 Firewall Application
52
Figure 3 Prestige LAN-To-LAN Application
52
Prestige Hardware Installation and Connection
52
Chapter 2 Introducing the Web Configurator
54
Web Configurator Overview
54
Accessing the Prestige Web Configurator
54
Resetting the Prestige
55
Using the Reset Button
55
Figure 4 Password Screen
55
Figure 5 Change Password at Login
55
Navigating the Prestige Web Configurator
56
Figure 6 Web Configurator: Site Map Screen
56
Table 3 Web Configurator Screens Summary
57
Chapter 3 Wizard Setup for Internet Access
60
Introduction
60
Encapsulation
60
Enet Encap
60
PPP over Ethernet
60
Pppoa
60
Rfc 1483
61
Multiplexing
61
VC-Based Multiplexing
61
LLC-Based Multiplexing
61
VPI and VCI
61
Internet Access Wizard Setup: First Screen
61
IP Address and Subnet Mask
62
Figure 7 Internet Access Wizard Setup: First Screen
62
Table 4 Internet Access Wizard Setup: First Screen
62
IP Address Assignment
63
IP Assignment with Pppoa or Pppoe Encapsulation
63
IP Assignment with RFC 1483 Encapsulation
63
IP Assignment with ENET ENCAP Encapsulation
63
Private IP Addresses
64
Nailed-Up Connection (PPP)
64
Nat
64
Internet Access Wizard Setup: Second Screen
64
Figure 8 Internet Connection with Pppoe
65
Table 5 Internet Connection with Pppoe
65
Figure 9 Internet Connection with RFC 1483
66
Table 6 Internet Connection with RFC 1483
66
Figure 10 Internet Connection with ENET ENCAP
67
Table 7 Internet Connection with ENET ENCAP
67
Figure 11 Internet Connection with Pppoa
68
Table 8 Internet Connection with Pppoa
68
DHCP Setup
69
IP Pool Setup
69
Figure 12 Internet Access Wizard Setup: Third Screen
69
Internet Access Wizard Setup: Third Screen
69
Internet Access Wizard Setup: Connection Test
70
Figure 13 Internet Access Wizard Setup: LAN Configuration
70
Table 9 Internet Access Wizard Setup: LAN Configuration
70
Figure 14 Internet Access Wizard Setup: Connection Tests
71
Test Your Internet Connection
71
Chapter 4 Wizard Setup for Media Bandwidth Management
72
Introduction
72
Predefined Media Bandwidth Management Services
72
Table 10 Media Bandwidth Mgnt. Wizard Setup: Services
72
Media Bandwidth Management Setup 1
73
Media Bandwidth Mgnt. Wizard Setup: Second Screen
74
Figure 15 Media Bandwidth Mgnt. Wizard Setup: First Screen
74
Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen
74
Media Bandwidth Mgnt. Wizard Setup: Finish
75
Figure 16 Media Bandwidth Mgnt. Wizard Setup: Second Screen
75
Figure 17 Media Bandwidth Mgnt. Wizard Setup: Finish
75
Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen
75
Chapter 5 Password Setup
76
Password Overview
76
Configuring Password
76
Figure 18 Password
76
Table 13 Password
76
Chapter 6 LAN Setup
78
LAN Overview
78
Lans, Wans and the Prestige
78
Figure 19 LAN and WAN IP Addresses
78
DNS Server Address
79
DNS Server Address Assignment
79
Lan Tcp/Ip
80
Factory LAN Defaults
80
IP Address and Subnet Mask
80
RIP Setup
80
Multicast
81
Any IP
81
How any IP Works
82
Figure 20 any IP Example
82
Configuring LAN
83
Figure 21 LAN Setup
83
Configuring Static DHCP
84
Table 14 LAN Setup
84
Figure 22 LAN: Static DHCP
85
Table 15 LAN: Static DHCP
85
Chapter 7 DMZ
86
Introduction
86
Configuring DMZ
86
Figure 23 DMZ
87
Table 16 DMZ
87
Chapter 8 Wireless LAN Setup
90
Introduction
90
Additional Installation Requirements for Using 802.1X
90
Channel
90
Ess ID
91
Rts/Cts
91
Figure 24 RTS/CTS
91
Fragmentation Threshold
92
Levels of Security
92
Data Encryption with WEP
93
Configuring Wireless LAN
93
Figure 25 Prestige Wireless Security Levels
93
Figure 26 Wireless LAN
94
Table 17 Wireless LAN
94
Configuring MAC Filter
95
Figure 27 MAC Address Filter
96
Table 18 MAC Address Filter
96
Network Authentication
97
Eap
97
Radius
97
Types of RADIUS Messages
97
EAP Authentication Overview
98
Figure 28 EAP Authentication
98
Introduction to WPA
99
User Authentication
99
Encryption
99
WPA-PSK Application Example
100
WPA with RADIUS Application Example
100
Figure 29 WPA - PSK Authentication
100
Security Parameters Summary
101
Figure 30 WPA with RADIUS Application Example
101
Table 19 Wireless Security Relational Matrix
101
Wireless Client WPA Supplicants
102
Configuring 802.1X and WPA
102
Figure 31 Wireless LAN: 802.1X/Wpa
102
Authentication Required: 802.1X
103
Figure 32 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
103
Table 20 Wireless LAN: 802.1X/Wpa
103
Table 21 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
104
Authentication Required: WPA
105
Figure 33 Wireless LAN: 802.1X/Wpa for WPA Protocol
105
Authentication Required: WPA-PSK
106
Table 22 Wireless LAN: 802.1X/Wpa for WPA Protocol
106
Figure 34 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
107
Table 23 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
107
Configuring Local User Authentication
108
Figure 35 Local User Database
108
Configuring RADIUS
109
Figure 36 RADIUS
109
Table 24 Local User Database
109
Table 25 RADIUS
110
Chapter 9 WAN Setup
112
WAN Overview
112
Metric
112
Pppoe Encapsulation
113
Traffic Shaping
113
Zero Configuration Internet Access
114
Configuring WAN Setup
114
Figure 37 Example of Traffic Shaping
114
Figure 38 WAN Setup (Pppoe)
115
Table 26 WAN Setup
115
Traffic Redirect
117
Configuring WAN Backup
118
Figure 39 Traffic Redirect Example
118
Figure 40 Traffic Redirect LAN Setup
118
Figure 41 WAN Backup
119
Table 27 WAN Backup
119
Configuring Advanced WAN Backup
121
Figure 42 Advanced WAN Backup
121
Table 28 Advanced WAN Backup
122
AT Command Strings
124
DTR Signal
124
Response Strings
124
Configuring Advanced Modem Setup
124
Figure 43 Advanced Modem Setup
125
Table 29 Advanced Modem Setup
125
Chapter 10 Network Address Translation (NAT) Screens
128
NAT Overview
128
NAT Definitions
128
Table 30 NAT Definitions
128
What NAT Does
129
How NAT Works
129
NAT Application
130
NAT Mapping Types
130
Figure 44 How NAT Works
130
Figure 45 NAT Application with IP Alias
130
SUA (Single User Account) Versus NAT
131
Table 31 NAT Mapping Types
131
SUA Server
132
Default Server IP Address
132
Port Forwarding: Services and Port Numbers
132
Table 32 Services and Port Numbers
132
Configuring Servers Behind SUA (Example)
133
Selecting the NAT Mode
133
Figure 46 Multiple Servers Behind NAT Example
133
Configuring SUA Server
134
Figure 47 NAT Mode
134
Table 33 NAT Mode
134
Figure 48 Edit SUA/NAT Server Set
135
Table 34 Edit SUA/NAT Server Set
135
Configuring Address Mapping
136
Figure 49 Address Mapping Rules
136
Table 35 Address Mapping Rules
136
Editing an Address Mapping Rule
137
Figure 50 Address Mapping Rule Edit
137
Table 36 Address Mapping Rule Edit
138
Chapter 11 Dynamic DNS Setup
140
Dynamic DNS
140
DYNDNS Wildcard
140
Configuring Dynamic DNS
140
Figure 51 Dynamic DNS
141
Table 37 Dynamic DNS
141
Chapter 12 Time and Date
142
Configuring Time and Date
142
Figure 52 Time and Date
142
Table 38 Time and Date
143
Chapter 13 Firewalls
144
Firewall Overview
144
Types of Firewalls
144
Packet Filtering Firewalls
144
Application-Level Firewalls
144
Stateful Inspection Firewalls
145
Introduction to Zyxel's Firewall
145
Denial of Service Attacks
146
Denial of Service
146
Basics
146
Figure 53 Prestige Firewall Application
146
Types of Dos Attacks
147
Table 39 Common IP Ports
147
Figure 54 Three-Way Handshake
148
Figure 55 SYN Flood
148
Figure 56 Smurf Attack
149
ICMP Vulnerability
149
Illegal Commands (Netbios and SMTP)
149
Table 40 ICMP Commands that Trigger Alerts
149
Table 41 Legal Netbios Commands
149
Traceroute
150
Stateful Inspection
150
Table 42 Legal SMTP Commands
150
Figure 57 Stateful Inspection
151
Stateful Inspection Process
151
Stateful Inspection and the Prestige
152
TCP Security
152
UDP/ICMP Security
153
Upper Layer Protocols
153
Guidelines for Enhancing Security with Your Firewall
154
Security in General
154
Packet Filtering Vs Firewall
155
Packet Filtering
155
When to Use Filtering
155
Firewall
155
When to Use the Firewall
156
Firewall Configuration
158
Access Methods
158
Firewall Policies Overview
158
Chapter 14 Firewall Configuration
158
Rule Logic Overview
159
Rule Checklist
159
Security Ramifications
160
Key Fields for Configuring Rules
160
Action
160
Service
160
Source Address
160
Destination Address
161
Connection Direction Example
161
LAN to WAN Rules
161
WAN to LAN Rules
161
Figure 58 LAN to WAN Traffic
161
Alerts
162
Configuring Basic Firewall Settings
162
Figure 59 WAN to LAN Traffic
162
Figure 60 Firewall: Default Policy
163
Table 43 Firewall: Default Policy
163
Rule Summary
164
Figure 61 Firewall: Rule Summary
164
Table 44 Rule Summary
164
Configuring Firewall Rules
165
Figure 62 Firewall: Edit Rule
166
Table 45 Firewall: Edit Rule
167
Customized Services
168
Creating/Editing a Customized Service
168
Figure 63 Firewall: Customized Services
168
Table 46 Customized Services
168
Example Firewall Rule
169
Figure 64 Firewall: Configure Customized Services
169
Table 47 Firewall: Configure Customized Services
169
Figure 65 Firewall Example: Rule Summary
170
Figure 66 Firewall Example: Edit Rule: Destination Address
171
Figure 67 Edit Custom Port Example
171
Figure 68 Firewall Example: Edit Rule: Select Customized Services
172
Predefined Services
173
Figure 69 Firewall Example: Rule Summary: My Service
173
Table 48 Predefined Services
173
Anti-Probing
175
Configuring Attack Alert
176
Figure 70 Firewall: Anti Probing
176
Table 49 Firewall: Anti Probing
176
Half-Open Sessions
177
TCP Maximum Incomplete and Blocking Time
177
Figure 71 Firewall: Threshold
178
Table 50 Firewall: Threshold
178
Threshold Values
177
Chapter 15 Content Filtering
180
Content Filtering Overview
180
Configuring Keyword Blocking
180
Configuring the Schedule
181
Figure 72 Content Filter: Keyword
181
Table 51 Content Filter: Keyword
181
Configuring Trusted Computers
182
Figure 73 Content Filter: Schedule
182
Table 52 Content Filter: Schedule
182
Figure 74 Content Filter: Trusted
183
Table 53 Content Filter: Trusted
183
Chapter 16 Content Access Control
184
Content Access Control Overview
184
Content Access Control WLAN Application
184
Configuration Steps
184
Figure 75 Content Access Control with WLAN Application
184
Activating CAC and Create User Groups
185
Figure 76 Content Access Control: General
185
Table 54 Content Access Control: General
185
Configuring Time Schedule
186
Figure 77 Control Access Control: General: Time Scheduling
187
Table 55 Control Access Control: General: Time Scheduling
187
Configuring Services
188
Figure 78 Content Access Control: General: Services
188
Table 56 Content Access Control: General: Services
188
Available Services
189
Table 57 Available Services
189
Configuring Web Site Filters
191
Figure 79 Content Access Control: General: Web Site Filter
192
Table 58 Content Access Control: General: Web Site Filter
193
Testing Web Site Access Privileges
197
User Account Setup
198
Figure 80 Content Access Control: General: Diagnose
198
Table 59 Content Access Control: General: Diagnose
198
Figure 81 Content Access Control: User Profiles
199
Table 60 Content Access Control: User Profiles
199
User Online Status
200
Figure 82 Content Access Control: Online Status
200
Table 61 Content Access Control: Online Status
200
Content Access Control Logins
201
User Login
201
Figure 83 Content Access Control: User Login Screen
201
Figure 84 Content Access Control: User Logout Screen
201
Administrator Login
202
Chapter 17 Anti-Virus Packet Scan
204
Overview
204
Types of Computer Viruses
204
Signature-Based Virus Scan
204
Table 62 Common Computer Virus Types
204
Computer Virus Infection and Prevention
205
Introduction to the Prestige Anti-Virus Packet Scan
205
Figure 85 Prestige Anti-Virus Application
205
How the Prestige Virus Scan Works
206
Limitations of the Prestige Packet Scan
206
Anti-Virus Packet Scan Configuration
207
Figure 86 Anti Virus: Packet Scan
207
Table 63 Anti Virus: Packet Scan
207
Registration and Online Update
208
Figure 87 Anti Virus: Registration and Virus Information Update
209
Table 64 Anti Virus: Registration and Virus Information Update
209
Figure 88 Virus Scan Update in Progress
210
Figure 89 Virus Scan Update Successful
210
Updating the Anti Virus Packet Scan
210
Chapter 18 Introduction to Ipsec
212
VPN Overview
212
Ipsec
212
Security Association
212
Other Terminology
212
Encryption
212
Data Confidentiality
213
Data Integrity
213
Data Origin Authentication
213
VPN Applications
213
Ipsec Architecture
213
Figure 90 Encryption and Decryption
213
Ipsec Algorithms
214
Key Management
214
Encapsulation
214
Figure 91 Ipsec Architecture
214
Transport Mode
215
Tunnel Mode
215
Ipsec and NAT
215
Figure 92 Transport and Tunnel Mode Ipsec Encapsulation
215
Table 65 VPN and NAT
216
Chapter 19 VPN Screens
218
Vpn/Ipsec Overview
218
Ipsec Algorithms
218
AH (Authentication Header) Protocol
218
ESP (Encapsulating Security Payload) Protocol
218
My IP Address
219
Table 66 AH and ESP
219
Secure Gateway Address
220
Dynamic Secure Gateway Address
220
VPN Summary Screen
220
Figure 93 Ipsec Summary Fields
220
Figure 94 VPN Summary
221
Table 67 VPN Summary
221
Keep Alive
222
NAT Traversal
222
NAT Traversal Configuration
223
Remote DNS Server
223
Figure 95 NAT Router between Ipsec Routers
223
ID Type and Content
224
Figure 96 VPN Host Using Intranet DNS Server Example
224
ID Type and Content Examples
225
Table 68 Local ID Type and Content Fields
225
Table 69 Peer ID Type and Content Fields
225
Table 70 Matching ID Type and Content Configuration Example
225
Pre-Shared Key
226
Editing VPN Policies
226
Table 71 Mismatching ID Type and Content Configuration Example
226
Figure 97 VPN IKE
227
Table 72 VPN IKE
228
IKE Phases
231
Negotiation Mode
232
Figure 98 Two Phases to Set up the Ipsec SA
232
Diffie-Hellman (DH) Key Groups
233
Perfect Forward Secrecy (PFS)
233
Configuring Advanced IKE Settings
233
Figure 99 VPN IKE: Advanced Setup
234
Table 73 VPN IKE: Advanced Setup
234
Manual Key Setup
236
Security Parameter Index (SPI)
236
Configuring Manual Key
237
Figure 100 VPN: Manual Key
237
Table 74 VPN: Manual Key
238
Viewing SA Monitor
240
Figure 101 VPN: SA Monitor
240
Configuring Global Setting
241
Figure 102 VPN: Global Setting
241
Table 75
241
Table 76 VPN: Global Setting
241
Telecommuter Vpn/Ipsec Examples
242
Telecommuters Sharing One VPN Rule Example
242
Figure 103 Telecommuters Sharing One VPN Rule Example
242
Telecommuters Using Unique VPN Rules Example
243
Table 77 Telecommuters Sharing One VPN Rule Example
243
Figure 104 Telecommuters Using Unique VPN Rules Example
244
Table 78 Telecommuters Using Unique VPN Rules Example
244
VPN and Remote Management
245
Chapter 20 Remote Management Configuration
246
Remote Management Overview
246
Remote Management Limitations
246
Remote Management and NAT
247
System Timeout
247
Telnet
247
Ftp
247
Figure 105 Telnet Configuration on a TCP/IP Network
247
Web
248
Configuring Remote Management
248
Figure 106 Remote Management
248
Table 79 Remote Management
248
Chapter 21 Universal Plug-And-Play (Upnp)
250
Introducing Universal Plug and Play
250
How Do I Know if I'M Using Upnp
250
NAT Traversal
250
Cautions with Upnp
250
Upnp and Zyxel
251
Configuring Upnp
251
Figure 107 Configuring Upnp
251
Installing Upnp in Windows Example
252
Table 80 Configuring Upnp
252
Figure 108 Add/Remove Programs: Windows Setup: Communication
253
Figure 109 Add/Remove Programs: Windows Setup: Communication: Components
253
Figure 110 Network Connections
254
Figure 111 Windows Optional Networking Components Wizard
255
Using Upnp in Windows XP Example
256
Figure 112 Networking Services
256
Figure 113 Network Connections
257
Figure 114 Internet Connection Properties
258
Figure 115 Internet Connection Properties: Advanced Settings
259
Figure 116 Internet Connection Properties: Advanced Settings: Add
259
Figure 117 System Tray Icon
260
Figure 118 Internet Connection Status
260
Figure 119 Network Connections
261
Figure 120 Network Connections: My Network Places
262
Figure 121 Network Connections: My Network Places: Properties: Example
262
Chapter 22 Logs Screens
264
Logs Overview
264
Alerts and Logs
264
Configuring Log Settings
264
Figure 122 Log Settings
265
Table 81 Log Settings
265
Displaying the Logs
266
SMTP Error Messages
267
Figure 123 View Logs
267
Table 82 View Logs
267
Table 83 SMTP Error Messages
267
Example E-Mail Log
268
Figure 124 E-Mail Log Example
268
Media Bandwidth Management Advanced Setup
270
Bandwidth Management Advanced Setup Overview
270
Bandwidth Classes and Filters
270
Chapter 23 Media Bandwidth Management Advanced Setup
270
Proportional Bandwidth Allocation
271
Bandwidth Management Usage Examples
271
Application-Based Bandwidth Management Example
271
Subnet-Based Bandwidth Management Example
271
Figure 125 Application-Based Bandwidth Management Example
271
Application and Subnet-Based Bandwidth Management Example
272
Scheduler
272
Figure 126 Subnet-Based Bandwidth Management Example
272
Figure 127 Application and Subnet-Based Bandwidth Management Example
272
Table 84 Application and Subnet-Based Bandwidth Management Example
272
Fairness-Based Scheduler
273
Priority-Based Scheduler
273
Maximize Bandwidth Usage
273
Reserving Bandwidth for Non-Bandwidth Class Traffic
273
Maximize Bandwidth Usage Example
274
Figure 128 Bandwidth Allotment Example
274
Bandwidth Borrowing
275
Bandwidth Borrowing Example
275
Figure 129 Maximize Bandwidth Usage Example
275
Figure 130 Bandwidth Borrowing Example
276
Maximize Bandwidth Usage with Bandwidth Borrowing
277
Configuring Summary
277
Figure 131 Media Bandwidth Management: Summary
277
Configuring Class Setup
278
Table 85 Media Bandwidth Management: Summary
278
Figure 132 Media Bandwidth Management: Class Setup
279
Media Bandwidth Management Class Configuration
279
Table 86 Media Bandwidth Management: Class Setup
279
Figure 133 Media Bandwidth Management: Class Configuration
280
Table 87 Media Bandwidth Management: Class Configuration
280
Figure 134 Media Bandwidth Management Statistics
282
Media Bandwidth Management Statistics
282
Table 88 Services and Port Numbers
282
Table 89 Media Bandwidth Management Statistics
282
Bandwidth Monitor
283
Figure 135 Media Bandwidth Management: Monitor
283
Table 90 Media Bandwidth Management: Monitor
283
Chapter 24 Maintenance
284
Maintenance Overview
284
System Status Screen
284
Figure 136 System Status
285
Table 91 System Status
285
System Statistics
286
Figure 137 System Status: Show Statistics
287
Table 92 System Status: Show Statistics
287
DHCP Table Screen
288
Figure 138 DHCP Table
288
Table 93 DHCP Table
288
Any IP Table Screen
289
Wireless Screen
289
Association List
289
Figure 139 any IP Table
289
Table 94 any IP Table
289
Diagnostic Screens
290
Diagnostic General Screen
290
Figure 140 Association List
290
Table 95 Association List
290
Diagnostic DSL Line Screen
291
Figure 141 Diagnostic: General
291
Table 96 Diagnostic: General
291
Figure 142 Diagnostic: DSL Line
292
Table 97 Diagnostic: DSL Line
292
Firmware Screen
293
Figure 143 Firmware Upgrade
293
Table 98 Firmware Upgrade
293
Figure 144 Network Temporarily Disconnected
294
Figure 145 Error Message
294
Chapter 25 Introducing the SMT
296
SMT Introduction
296
Procedure for SMT Configuration Via Telnet
296
Entering Password
296
Prestige SMT Menu Overview
297
Navigating the SMT Interface
297
Figure 146 Login Screen
297
Figure 147 Prestige SMT Menu Overview
297
Table 100 SMT Main Menu
298
Table 99 Navigating the SMT Interface
298
System Management Terminal Interface Summary
299
Changing the System Password
299
Table 101 Main Menu Summary
299
Figure 148 Menu 23.1 Change Password
300
Chapter 26 Menu 1 General Setup
302
General Setup
302
Procedure to Configure Menu 1
302
Procedure to Configure Dynamic DNS
303
Figure 149 Menu 1 General Setup
303
Table 102 Menu 1 General Setup
303
Figure 150 Menu 1.1 Configure Dynamic DNS
304
Table 103 Menu 1.1 Configure Dynamic DNS
304
Chapter 27 Menu 2 WAN Backup Setup
306
Introduction to WAN Backup Setup
306
Configuring Dial Backup in Menu 2
306
Table 104 Menu 2 WAN Backup Setup
306
Figure 151 Menu 2 WAN Backup Setup
307
Figure 152 Menu 2.1Traffic Redirect Setup
307
Table 105 Menu 2.1Traffic Redirect Setup
307
Traffic Redirect Setup
307
Configuring Dial Backup Setup
308
Figure 153 Menu 2.2 Dial Backup Setup
308
Table 106 Menu 2.2 Dial Backup Setup
308
Advanced Dial Backup Setup
309
Figure 154 Menu 2.2.1 Advanced Dial Backup Setup
310
Table 107 Menu 2.2.1 Advanced Dial Backup Setup: at Commands Fields
310
Table 108 Menu 2.2.1 Advanced Dial Backup Setup: Call Control Parameters
310
Chapter 28 Menu 3 LAN Setup
312
LAN Setup
312
General Ethernet Setup
312
Figure 155 Menu 3 LAN Setup
312
Figure 156 Menu 3.1 LAN Port Filter Setup
312
Protocol Dependent Ethernet Setup
313
CP/IP Ethernet Setup and DHCP
313
Figure 157 Menu 3.2 TCP/IP and DHCP Ethernet Setup
314
Table 109 DHCP Ethernet Setup
314
Table 110 TCP/IP Ethernet Setup
314
Chapter 29 Wireless LAN Setup
316
Wireless LAN Overview
316
Wireless LAN Setup
316
Figure 158 Menu 3.5 - Wireless LAN Setup
316
Table 111 Menu 3.5 - Wireless LAN Setup
316
Wireless LAN MAC Address Filter
317
Figure 159 Menu 3.5.1 WLAN MAC Address Filtering
318
Table 112 Menu 3.5.1 WLAN MAC Address Filtering
318
Chapter 30 Internet Access
320
Internet Access Overview
320
IP Policies
320
IP Alias
320
IP Alias Setup
321
Figure 160 IP Alias Network Example
321
Figure 161 Menu 3.2 TCP/IP and DHCP Setup
321
Route IP Setup
322
Figure 162 Menu 3.2.1 IP Alias Setup
322
Table 113 Menu 3.2.1 IP Alias Setup
322
Internet Access Configuration
323
Figure 163 Menu 1 General Setup
323
Figure 164 Menu 4 Internet Access Setup
323
Table 114 Menu 4 Internet Access Setup
324
Chapter 31 Remote Node Configuration
326
Remote Node Setup Overview
326
Remote Node Setup
326
Remote Node Profile
326
Encapsulation and Multiplexing Scenarios
327
Scenario 1: One VC, Multiple Protocols
327
Scenario 2: One VC, One Protocol (IP)
327
Scenario 3: Multiple Vcs
327
Figure 165 Menu 11 Remote Node Setup
327
Figure 166 Menu 11.1 Remote Node Profile
328
Table 115 Menu 11.1 Remote Node Profile
328
Outgoing Authentication Protocol
329
Remote Node Network Layer Options
330
Figure 167 Menu 11.3 Remote Node Network Layer Options
330
Table 116 Menu 11.3 Remote Node Network Layer Options
330
My WAN Addr Sample IP Addresses
331
Remote Node Filter
332
Figure 168 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
332
Editing ATM Layer Options
333
VC-Based Multiplexing (Non-PPP Encapsulation)
333
Figure 169 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
333
Figure 170 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
333
LLC-Based Multiplexing or PPP Encapsulation
334
Advance Setup Options
334
Figure 171 Menu 11.6 for VC-Based Multiplexing
334
Figure 172 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
334
Figure 173 Menu 11.1 Remote Node Profile
335
Figure 174 Menu 11.8 Advance Setup Options
335
Table 117 Menu 11.8 Advance Setup Options
335
Chapter 32 Static Route Setup
336
IP Static Route Overview
336
Configuration
336
Figure 175 Sample Static Routing Topology
336
Figure 176 Menu 12 Static Route Setup
337
Figure 177 Menu 12.1 IP Static Route Setup
337
Figure 178 Menu12.1.1 Edit IP Static Route
337
Table 118 Menu12.1.1 Edit IP Static Route
338
Chapter 33 Bridging Setup
340
Bridging in General
340
Bridge Ethernet Setup
340
Remote Node Bridging Setup
340
Figure 179 Menu 11.1 Remote Node Profile
341
Figure 180 Menu 11.3 Remote Node Network Layer Options
341
Table 119 Remote Node Network Layer Options: Bridge Fields
341
Bridge Static Route Setup
342
Figure 181 Menu 12.3.1 Edit Bridge Static Route
342
Table 120 Menu 12.3.1 Edit Bridge Static Route
342
Network Address Translation (NAT)
344
Chapter 34 Network Address Translation (NAT)
344
Using NAT
344
SUA (Single User Account) Versus NAT
344
Applying NAT
344
Figure 182 Menu 4 Applying NAT for Internet Access
345
Figure 183 Applying NAT in Menus 4 & 11.3
345
NAT Setup
346
Address Mapping Sets
346
Figure 184 Menu 15 NAT Setup
346
Table 121 Applying NAT in Menus 4 & 11.3
346
Figure 185 Menu 15.1 Address Mapping Sets
347
Figure 186 Menu 15.1.255 SUA Address Mapping Rules
347
SUA Address Mapping Set
347
Table 122 SUA Address Mapping Rules
347
Figure 187 Menu 15.1.1 First Set
348
User-Defined Address Mapping Sets
348
Ordering Your Rules
349
Table 123 Menu 15.1.1 First Set
349
Configuring a Server Behind NAT
350
Figure 188 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
350
Table 124 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
350
Figure 189 Menu 15.2 NAT Server Setup
351
Figure 190 Menu 15.2.1 NAT Server Setup
351
General NAT Examples
352
Example 1: Internet Access Only
352
Figure 191 Multiple Servers Behind NAT Example
352
Example 2: Internet Access with an Inside Server
353
Figure 192 NAT Example 1
353
Figure 193 Menu 4 Internet Access & NAT Example
353
Example 3: Multiple Public IP Addresses with Inside Servers
354
Figure 194 NAT Example 2
354
Figure 195 Menu 15.2.1 Specifying an Inside Server
354
Figure 196 NAT Example 3
355
Figure 197 Example 3: Menu 11.3
356
Figure 198 Example 3: Menu 15.1.1.1
356
Figure 199 Example 3: Final Menu 15.1.1
357
Example 4: NAT Unfriendly Application Programs
358
Figure 200 Example 3: Menu 15.2.1
358
Figure 201 NAT Example 4
358
Figure 202 Example 4: Menu 15.1.1.1 Address Mapping Rule
359
Figure 203 Example 4: Menu 15.1.1 Address Mapping Rules
359
Chapter 35 Enabling the Firewall
360
Remote Management and the Firewall
360
Access Methods
360
Enabling the Firewall
360
Figure 204 Menu 21.2 Firewall Setup
361
Chapter 36 Filter Configuration
362
About Filtering
362
Figure 205 Outgoing Packet Filtering Process
362
Figure 206 Filter Rule Process
363
The Filter Structure of the Prestige
363
Configuring a Filter Set for the Prestige
364
Figure 207 Menu 21 Filter Set Configuration
364
Figure 208 Netbios_Wan Filter Rules Summary
364
Filter Rules Summary Menus
365
Figure 209 Netbios_Lan Filter Rules Summary
365
Figure 210 IGMP Filter Rules Summary
365
Table 125 Abbreviations Used in the Filter Rules Summary Menu
365
Configuring a Filter Rule
366
Table 126 Rule Abbreviations Used
366
Figure 211 Menu 21.1.X.1 TCP/IP Filter Rule
367
Table 127 Menu 21.1.X.1 TCP/IP Filter Rule
367
TCP/IP Filter Rule
367
Figure 212 Executing an IP Filter
369
Generic Filter Rule
369
Figure 213 Menu 21.1.5.1 Generic Filter Rule
370
Table 128 Menu 21.1.5.1 Generic Filter Rule
370
Filter Types and NAT
371
Example Filter
371
Figure 214 Protocol and Device Filter Sets
371
Figure 215 Sample Telnet Filter
372
Figure 216 Menu 21.1.6.1 Sample Filter
372
Applying Filters and Factory Defaults
373
Figure 217 Menu 21.1.6.1 Sample Filter Rules Summary
373
Table 129 Filter Sets Table
373
Ethernet Traffic
374
Figure 218 Filtering Ethernet Traffic
374
Figure 219 Filtering Remote Node Traffic
374
Remote Node Filters
374
Chapter 37 SNMP Configuration
376
About SNMP
376
Figure 220 SNMP Management Model
376
Supported Mibs
377
SNMP Configuration
377
SNMP Traps
378
Figure 221 Menu 22 SNMP Configuration
378
Table 130 Menu 22 SNMP Configuration
378
Table 131 SNMP Traps
378
Table 132 Ports and Permanent Virtual Circuits
379
Chapter 38 System Security
380
System Security
380
System Password
380
Configuring External RADIUS Server
380
Figure 222 Menu 23 - System Security
380
Figure 223 Menu 23 System Security
380
Figure 224 Menu 23.2 System Security: RADIUS Server
381
Table 133 Menu 23.2 System Security: RADIUS Server
381
Ieee802.1X
382
Figure 225 Menu 23 System Security
382
Figure 226 Menu 23.4 System Security: Ieee802.1X
382
Table 134 Menu 23.4 System Security : Ieee802.1X
383
Creating User Accounts on the Prestige
384
Figure 227 Menu 14 Dial-In User Setup
385
Figure 228 Menu 14.1 Edit Dial-In User
385
Table 135 Menu 14.1 Edit Dial-In User
385
Chapter 39 System Information and Diagnosis
386
Overview
386
System Status
386
Figure 229 Menu 24 System Maintenance
386
Figure 230 Menu 24.1 System Maintenance : Status
387
Table 136 Menu 24.1 System Maintenance : Status
387
System Information
388
Figure 231 Menu 24.2 System Information and Console Port Speed
388
Console Port Speed
389
Figure 232 Menu 24.2.1 System Maintenance: Information
389
Table 137 Menu 24.2.1 System Maintenance: Information
389
Log and Trace
390
Viewing Error Log
390
Figure 233 Menu 24.2.2 System Maintenance : Change Console Port Speed
390
Figure 234 Menu 24.3 System Maintenance: Log and Trace
390
Syslog and Accounting
391
Figure 235 Sample Error and Information Messages
391
Figure 236 Menu 24.3.2 System Maintenance: Syslog and Accounting
391
Table 138 Menu 24.3.2 System Maintenance : Syslog and Accounting
391
Figure 237 Syslog Example
392
Diagnostic
393
Figure 238 Menu 24.4 System Maintenance : Diagnostic
393
Table 139 Menu 24.4 System Maintenance Menu: Diagnostic
394
Firmware and Configuration File Maintenance
396
Filename Conventions
396
Advertisement
ZyXEL Communications P-662HW Quick Start Manual (39 pages)
Prestige 662H/HW Series ADSL 2+ 4 Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 2.22 MB
Table of Contents
Quick Start Guide
1
Table of Contents
2
1 Introducing the Prestige
3
2 Hardware
4
Rear Panel Connections
4
The Front Panel Leds
5
3 Internet Access with Zero Configration
7
4 Setting up Your Computer's IP Address
8
Windows 95/98/Me
8
Windows 2000/NT/XP
11
Checking/Updating Your Computer's IP Address
12
Testing the Connection to the Prestige
12
5 Configuring Your Prestige
13
Accessing Your Prestige Via Web Configurator
13
Common Screen Command Buttons
15
Internet Access Using the Wizard
15
Test Your Internet Connection
21
Media Bandwidth Management Using the Wizard
21
6 Advanced Configuration
23
Wireless LAN Setup
23
Wireless LAN Security Setup
26
802.1X and WPA Overview
27
Network Address Translation Overview
27
Configuring SUA Server
28
Firewall Overview
30
Enabling the Firewall with Default Policy
31
Procedure for Configuring Firewall Rules
32
7 Troubleshooting
38
Table 9 Troubleshooting
39
ZyXEL Communications P-662HW Upgrade Information (16 pages)
Zyxel P-662H-61: Supplementary Guide
Brand:
ZyXEL Communications
| Category:
Software
| Size: 0.36 MB
Table of Contents
Vantage Cnm
1
Table of Contents
3
Introduction
4
Upgrade Notes
4
Upgrade Procedure
6
Before Upgrade
6
After Upgrade
12
New Installation
12
Advertisement
ZyXEL Communications P-662HW Quick Start Manual (18 pages)
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 1.63 MB
Table of Contents
Quick Start Guide
1
Konfi Guration des Routers
9
Fehlersuche
10
Contenu du Coffret
10
Dépannage
18
ZyXEL Communications P-662HW Specifications (2 pages)
802.11g Wireless ADSL 2+ 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.18 MB
Advertisement
Related Products
ZyXEL Communications P-650R
ZyXEL Communications P-652HW
ZyXEL Communications Powerline Ethernet Multiplug Center PLA491
ZyXEL Communications PLA-400
ZyXEL Communications PLA-4 series Firmware Detection Tool Release 3.0.5(AL)
ZyXEL Communications P-662HW-D - V3.40
ZyXEL Communications Prestige P-662HW-61
ZyXEL Communications P-662HW-63
ZyXEL Communications P-662HW-67
ZyXEL Communications P-662HW-D1
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL