Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
P-662HW-67
ZyXEL Communications P-662HW-67 Manuals
Manuals and User Guides for ZyXEL Communications P-662HW-67. We have
4
ZyXEL Communications P-662HW-67 manuals available for free PDF download: User Manual, Quick Start Manual, Declaration Of Conformity
ZyXEL Communications P-662HW-67 User Manual (561 pages)
802.11g Wireless ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 23.87 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
8
List of Figures
26
List of Tables
34
Preface
40
Introduction to DSL
42
Chapter 1 Getting to Know Your Prestige
44
Introducing the Prestige
44
Table 1 ADSL Standards
44
Features of the Prestige
45
Table 2 Ieee802.11G
46
Applications for the Prestige
50
Internet Access
51
Firewall for Secure Broadband Internet Access
51
LAN to LAN Application
51
Figure 1 Prestige Internet Access Application
51
Figure 2 Firewall Application
51
Figure 3 Prestige LAN-To-LAN Application
52
Prestige Hardware Installation and Connection
52
Chapter 2 Introducing the Web Configurator
54
Web Configurator Overview
54
Accessing the Prestige Web Configurator
54
Resetting the Prestige
55
Using the Reset Button
55
Figure 4 Password Screen
55
Figure 5 Change Password at Login
55
Navigating the Prestige Web Configurator
56
Figure 6 Web Configurator SITE MAP Screen
56
Table 3 Web Configurator Screens Summary
56
Chapter 3 Wizard Setup for Internet Access
60
Introduction
60
Encapsulation
60
Enet Encap
60
PPP over Ethernet
60
Pppoa
60
Rfc 1483
61
Multiplexing
61
VC-Based Multiplexing
61
LLC-Based Multiplexing
61
VPI and VCI
61
Internet Access Wizard Setup: First Screen
61
IP Address and Subnet Mask
62
Figure 7 Internet Access Wizard Setup: First Screen
62
Table 4 Internet Access Wizard Setup: First Screen
62
IP Address Assignment
63
IP Assignment with Pppoa or Pppoe Encapsulation
63
IP Assignment with RFC 1483 Encapsulation
63
IP Assignment with ENET ENCAP Encapsulation
63
Private IP Addresses
64
Internet Access Wizard Setup: Second Screen
64
Nailed-Up Connection (PPP)
64
Nat
64
Figure 8 Internet Connection with Pppoe
65
Table 5 Internet Connection with Pppoe
65
Figure 9 Internet Connection with RFC 1483
66
Table 6 Internet Connection with RFC 1483
66
Figure 10 Internet Connection with ENET ENCAP
67
Table 7 Internet Connection with ENET ENCAP
67
Figure 11 Internet Connection with Pppoa
68
Table 8 Internet Connection with Pppoa
68
DHCP Setup
69
IP Pool Setup
69
Figure 12 Internet Access Wizard Setup: Third Screen
69
Internet Access Wizard Setup: Third Screen
69
Figure 13 Internet Access Wizard Setup: LAN Configuration
70
Table 9 Internet Access Wizard Setup: LAN Configuration
70
Figure 14 Internet Access Wizard Setup: Connection Tests
71
Test Your Internet Connection
71
Internet Access Wizard Setup: Connection Test
70
Chapter 4 Wizard Setup for Media Bandwidth Management
72
Introduction
72
Predefined Media Bandwidth Management Services
72
Table 10 Media Bandwidth Mgnt. Wizard Setup: Services
72
Media Bandwidth Management Setup 1
73
Media Bandwidth Mgnt. Wizard Setup: Second Screen
74
Figure 15 Media Bandwidth Mgnt. Wizard Setup: First Screen
74
Table 11 Media Bandwidth Mgnt. Wizard Setup: First Screen
74
Media Bandwidth Mgnt. Wizard Setup: Finish
75
Figure 16 Media Bandwidth Mgnt. Wizard Setup: Second Screen
75
Figure 17 Media Bandwidth Mgnt. Wizard Setup: Finish
75
Table 12 Media Bandwidth Mgnt. Wizard Setup: Second Screen
75
Chapter 5 Password Setup
76
Password Overview
76
Configuring Password
76
Figure 18 Password
76
Table 13 Password
76
Chapter 6 LAN Setup
78
LAN Overview
78
Lans, Wans and the Prestige
78
Figure 19 LAN and WAN IP Addresses
78
DNS Server Address
79
DNS Server Address Assignment
79
Lan Tcp/Ip
80
Factory LAN Defaults
80
IP Address and Subnet Mask
80
RIP Setup
80
Multicast
81
Any IP
81
How any IP Works
82
Figure 20 any IP Example
82
Configuring LAN
83
Figure 21 LAN Setup
83
Configuring Static DHCP
84
Table 14 LAN Setup
84
Figure 22 LAN: Static DHCP
85
Table 15 LAN: Static DHCP
85
Chapter 7 DMZ
86
Introduction
86
Configuring DMZ
86
Figure 23 DMZ
87
Table 16 DMZ
87
Chapter 8 Wireless LAN Setup
90
Introduction
90
Additional Installation Requirements for Using 802.1X
90
Channel
90
Ess ID
91
Rts/Cts
91
Figure 24 RTS/CTS
91
Fragmentation Threshold
92
Levels of Security
92
Data Encryption with WEP
93
Configuring Wireless LAN
93
Figure 25 Prestige Wireless Security Levels
93
Figure 26 Wireless LAN
94
Table 17 Wireless LAN
94
Configuring MAC Filter
95
Figure 27 MAC Address Filter
96
Table 18 MAC Address Filter
96
Network Authentication
97
Eap
97
Radius
97
Types of RADIUS Messages
97
EAP Authentication Overview
98
Figure 28 EAP Authentication
98
Introduction to WPA
99
User Authentication
99
Encryption
99
WPA-PSK Application Example
100
WPA with RADIUS Application Example
100
Figure 29 WPA - PSK Authentication
100
Security Parameters Summary
101
Figure 30 WPA with RADIUS Application Example
101
Table 19 Wireless Security Relational Matrix
101
Wireless Client WPA Supplicants
102
Configuring 802.1X and WPA
102
Figure 31 Wireless LAN: 802.1X/Wpa
102
Authentication Required: 802.1X
103
Figure 32 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
103
Table 20 Wireless LAN: 802.1X/Wpa
103
Table 21 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
104
Authentication Required: WPA
105
Figure 33 Wireless LAN: 802.1X/Wpa for WPA Protocol
105
Authentication Required: WPA-PSK
106
Table 22 Wireless LAN: 802.1X/Wpa for WPA Protocol
106
Figure 34 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
107
Table 23 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
107
Configuring Local User Authentication
108
Figure 35 Local User Database
108
Configuring RADIUS
109
Figure 36 RADIUS
109
Table 24 Local User Database
109
Table 25 RADIUS
110
Chapter 9 WAN Setup
112
WAN Overview
112
Metric
112
Pppoe Encapsulation
113
Traffic Shaping
113
Zero Configuration Internet Access
114
Configuring WAN Setup
114
Figure 37 Example of Traffic Shaping
114
Figure 38 WAN Setup (Pppoe)
115
Table 26 WAN Setup
115
Traffic Redirect
117
Configuring WAN Backup
118
Figure 39 Traffic Redirect Example
118
Figure 40 Traffic Redirect LAN Setup
118
Figure 41 WAN Backup
119
Table 27 WAN Backup
119
Configuring Advanced WAN Backup
121
Figure 42 Advanced WAN Backup
121
Table 28 Advanced WAN Backup
122
AT Command Strings
124
DTR Signal
124
Response Strings
124
Configuring Advanced Modem Setup
124
Figure 43 Advanced Modem Setup
125
Table 29 Advanced Modem Setup
125
Chapter 10 Network Address Translation (NAT) Screens
128
NAT Overview
128
NAT Definitions
128
Table 30 NAT Definitions
128
What NAT Does
129
How NAT Works
129
NAT Application
130
NAT Mapping Types
130
Figure 44 How NAT Works
130
Figure 45 NAT Application with IP Alias
130
SUA (Single User Account) Versus NAT
131
Table 31 NAT Mapping Types
131
SUA Server
132
Default Server IP Address
132
Port Forwarding: Services and Port Numbers
132
Table 32 Services and Port Numbers
132
Configuring Servers Behind SUA (Example)
133
Selecting the NAT Mode
133
Figure 46 Multiple Servers Behind NAT Example
133
Configuring SUA Server
134
Figure 47 NAT Mode
134
Table 33 NAT Mode
134
Figure 48 Edit SUA/NAT Server Set
135
Table 34 Edit SUA/NAT Server Set
135
Configuring Address Mapping
136
Figure 49 Address Mapping Rules
136
Table 35 Address Mapping Rules
136
Editing an Address Mapping Rule
137
Figure 50 Address Mapping Rule Edit
137
Table 36 Address Mapping Rule Edit
138
Chapter 11 Dynamic DNS Setup
140
Dynamic DNS
140
DYNDNS Wildcard
140
Configuring Dynamic DNS
140
Figure 51 Dynamic DNS
141
Table 37 Dynamic DNS
141
Chapter 12 Time and Date
142
Configuring Time and Date
142
Figure 52 Time and Date
142
Table 38 Time and Date
143
Chapter 13 Firewalls
144
Firewall Overview
144
Types of Firewalls
144
Packet Filtering Firewalls
144
Application-Level Firewalls
144
Stateful Inspection Firewalls
145
Introduction to Zyxel's Firewall
145
Denial of Service Attacks
146
Denial of Service
146
Basics
146
Figure 53 Prestige Firewall Application
146
Types of Dos Attacks
147
Table 39 Common IP Ports
147
Figure 54 Three-Way Handshake
148
Figure 55 SYN Flood
148
Figure 56 Smurf Attack
149
ICMP Vulnerability
149
Illegal Commands (Netbios and SMTP)
149
Table 40 ICMP Commands that Trigger Alerts
149
Table 41 Legal Netbios Commands
149
Traceroute
150
Stateful Inspection
150
Table 42 Legal SMTP Commands
150
Figure 57 Stateful Inspection
151
Stateful Inspection Process
151
Stateful Inspection and the Prestige
152
TCP Security
152
UDP/ICMP Security
153
Upper Layer Protocols
153
Guidelines for Enhancing Security with Your Firewall
154
Security in General
154
Packet Filtering Vs Firewall
155
Packet Filtering
155
When to Use Filtering
155
Firewall
155
When to Use the Firewall
156
Firewall Configuration
158
Access Methods
158
Firewall Policies Overview
158
Chapter 14 Firewall Configuration
158
Rule Logic Overview
159
Rule Checklist
159
Security Ramifications
160
Key Fields for Configuring Rules
160
Action
160
Service
160
Source Address
160
Destination Address
161
Connection Direction Example
161
LAN to WAN Rules
161
WAN to LAN Rules
161
Figure 58 LAN to WAN Traffic
161
Alerts
162
Configuring Basic Firewall Settings
162
Figure 59 WAN to LAN Traffic
162
Figure 60 Firewall: Default Policy
163
Table 43 Firewall: Default Policy
163
Rule Summary
164
Figure 61 Firewall: Rule Summary
164
Table 44 Rule Summary
164
Configuring Firewall Rules
165
Figure 62 Firewall: Edit Rule
166
Table 45 Firewall: Edit Rule
167
Customized Services
168
Creating/Editing a Customized Service
168
Figure 63 Firewall: Customized Services
168
Table 46 Customized Services
168
Example Firewall Rule
169
Figure 64 Firewall: Configure Customized Services
169
Table 47 Firewall: Configure Customized Services
169
Figure 65 Firewall Example: Rule Summary
170
Figure 66 Firewall Example: Edit Rule: Destination Address
171
Figure 67 Edit Custom Port Example
171
Figure 68 Firewall Example: Edit Rule: Select Customized Services
172
Predefined Services
173
Figure 69 Firewall Example: Rule Summary: My Service
173
Table 48 Predefined Services
173
Anti-Probing
175
Configuring Attack Alert
176
Figure 70 Firewall: Anti Probing
176
Table 49 Firewall: Anti Probing
176
Half-Open Sessions
177
TCP Maximum Incomplete and Blocking Time
177
Figure 71 Firewall: Threshold
178
Table 50 Firewall: Threshold
178
Threshold Values
177
Chapter 15 Content Filtering
180
Content Filtering Overview
180
Configuring Keyword Blocking
180
Configuring the Schedule
181
Figure 72 Content Filter: Keyword
181
Table 51 Content Filter: Keyword
181
Configuring Trusted Computers
182
Figure 73 Content Filter: Schedule
182
Table 52 Content Filter: Schedule
182
Figure 74 Content Filter: Trusted
183
Table 53 Content Filter: Trusted
183
Chapter 16 Content Access Control
184
Content Access Control Overview
184
Content Access Control WLAN Application
184
Configuration Steps
184
Figure 75 Content Access Control with WLAN Application
184
Activating CAC and Create User Groups
185
Figure 76 Content Access Control: General
185
Table 54 Content Access Control: General
185
Configuring Time Schedule
186
Figure 77 Control Access Control: General: Time Scheduling
187
Table 55 Control Access Control: General: Time Scheduling
187
Configuring Services
188
Figure 78 Content Access Control: General: Services
188
Table 56 Content Access Control: General: Services
188
Available Services
189
Table 57 Available Services
189
Configuring Web Site Filters
191
Figure 79 Content Access Control: General: Web Site Filter
192
Table 58 Content Access Control: General: Web Site Filter
193
Testing Web Site Access Privileges
197
User Account Setup
198
Figure 80 Content Access Control: General: Diagnose
198
Table 59 Content Access Control: General: Diagnose
198
Figure 81 Content Access Control: User Profiles
199
Table 60 Content Access Control: User Profiles
199
User Online Status
200
Figure 82 Content Access Control: Online Status
200
Table 61 Content Access Control: Online Status
200
Content Access Control Logins
201
User Login
201
Figure 83 Content Access Control: User Login Screen
201
Figure 84 Content Access Control: User Logout Screen
201
Administrator Login
202
Chapter 17 Anti-Virus Packet Scan
204
Overview
204
Types of Computer Viruses
204
Signature-Based Virus Scan
204
Table 62 Common Computer Virus Types
204
Computer Virus Infection and Prevention
205
Introduction to the Prestige Anti-Virus Packet Scan
205
Figure 85 Prestige Anti-Virus Application
205
How the Prestige Virus Scan Works
206
Limitations of the Prestige Packet Scan
206
Anti-Virus Packet Scan Configuration
207
Figure 86 Anti Virus: Packet Scan
207
Table 63 Anti Virus: Packet Scan
207
Registration and Online Update
208
Figure 87 Anti Virus: Registration and Virus Information Update
209
Table 64 Anti Virus: Registration and Virus Information Update
209
Figure 88 Virus Scan Update in Progress
210
Figure 89 Virus Scan Update Successful
210
Updating the Anti Virus Packet Scan
210
Chapter 18 Introduction to Ipsec
212
VPN Overview
212
Ipsec
212
Security Association
212
Other Terminology
212
Encryption
212
Data Confidentiality
213
Data Integrity
213
Data Origin Authentication
213
VPN Applications
213
Ipsec Architecture
213
Figure 90 Encryption and Decryption
213
Ipsec Algorithms
214
Key Management
214
Encapsulation
214
Figure 91 Ipsec Architecture
214
Transport Mode
215
Tunnel Mode
215
Ipsec and NAT
215
Figure 92 Transport and Tunnel Mode Ipsec Encapsulation
215
Table 65 VPN and NAT
216
Chapter 19 VPN Screens
218
Vpn/Ipsec Overview
218
Ipsec Algorithms
218
AH (Authentication Header) Protocol
218
ESP (Encapsulating Security Payload) Protocol
218
My IP Address
219
Secure Gateway Address
219
Table 66 AH and ESP
219
Dynamic Secure Gateway Address
220
VPN Summary Screen
220
Figure 93 Ipsec Summary Fields
220
Figure 94 VPN Summary
221
Table 67 VPN Summary
221
Keep Alive
222
NAT Traversal
222
NAT Traversal Configuration
223
Remote DNS Server
223
Figure 95 NAT Router between Ipsec Routers
223
ID Type and Content
224
Figure 96 VPN Host Using Intranet DNS Server Example
224
ID Type and Content Examples
225
Table 68 Local ID Type and Content Fields
225
Table 69 Peer ID Type and Content Fields
225
Table 70 Matching ID Type and Content Configuration Example
225
Pre-Shared Key
226
Editing VPN Policies
226
Table 71 Mismatching ID Type and Content Configuration Example
226
Figure 97 VPN IKE
227
Table 72 VPN IKE
228
IKE Phases
231
Negotiation Mode
232
Figure 98 Two Phases to Set up the Ipsec SA
232
Diffie-Hellman (DH) Key Groups
233
Perfect Forward Secrecy (PFS)
233
Configuring Advanced IKE Settings
233
Figure 99 VPN IKE: Advanced Setup
234
Table 73 VPN IKE: Advanced Setup
234
Manual Key Setup
236
Security Parameter Index (SPI)
236
Configuring Manual Key
237
Figure 100 VPN: Manual Key
237
Table 74 VPN: Manual Key
238
Viewing SA Monitor
240
Figure 101 VPN: SA Monitor
240
Configuring Global Setting
241
Figure 102 VPN: Global Setting
241
Table 75
241
Table 76 VPN: Global Setting
241
Telecommuter Vpn/Ipsec Examples
242
Telecommuters Sharing One VPN Rule Example
242
Figure 103 Telecommuters Sharing One VPN Rule Example
242
Telecommuters Using Unique VPN Rules Example
243
Table 77 Telecommuters Sharing One VPN Rule Example
243
Figure 104 Telecommuters Using Unique VPN Rules Example
244
Table 78 Telecommuters Using Unique VPN Rules Example
244
VPN and Remote Management
245
Remote Management Configuration
246
Remote Management Overview
246
Remote Management Limitations
246
Chapter 20 Remote Management Configuration
246
Remote Management and NAT
247
System Timeout
247
Telnet
247
Ftp
247
Figure 105 Telnet Configuration on a TCP/IP Network
247
Web
248
Configuring Remote Management
248
Figure 106 Remote Management
248
Table 79 Remote Management
248
Chapter 21 Universal Plug-And-Play (Upnp)
250
Introducing Universal Plug and Play
250
How Do I Know if I'M Using Upnp
250
NAT Traversal
250
Cautions with Upnp
250
Upnp and Zyxel
251
Configuring Upnp
251
Figure 107 Configuring Upnp
251
Installing Upnp in Windows Example
252
Table 80 Configuring Upnp
252
Figure 108 Add/Remove Programs: Windows Setup: Communication
253
Figure 109 Add/Remove Programs: Windows Setup: Communication: Components
253
Figure 110 Network Connections
254
Figure 111 Windows Optional Networking Components Wizard
255
Using Upnp in Windows XP Example
256
Figure 112 Networking Services
256
Figure 113 Network Connections
257
Figure 114 Internet Connection Properties
258
Figure 115 Internet Connection Properties: Advanced Settings
259
Figure 116 Internet Connection Properties: Advanced Settings: Add
259
Figure 117 System Tray Icon
260
Figure 118 Internet Connection Status
260
Figure 119 Network Connections
261
Figure 120 Network Connections: My Network Places
262
Figure 121 Network Connections: My Network Places: Properties: Example
262
Advertisement
ZyXEL Communications P-662HW-67 User Manual (492 pages)
P-662H Series 802.11g ADSL2+ 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 11.82 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
23
List of Tables
31
Introduction and Wizards
37
Part I: Introduction and Wizards
37
Chapter 1 Getting to Know Your Zyxel Device
39
Applications of the Zyxel Device
39
Introducing the Zyxel Device
39
Figure 1 Zyxel Device Internet Access Application
40
Figure 2 Zyxel Device LAN-To-LAN Application Example
40
Firewall for Secure Broadband Internet Access
40
Front Panel Leds
41
Figure 3 Firewall Application
41
Figure 4 P-662H Front Panel
41
Figure 5 P-662HW Front Panel
41
Table 1 Front Panel Leds
41
Chapter 2 Introducing the Web Configurator
43
Accessing the Web Configurator
43
Web Configurator Overview
43
Figure 6 Password Screen
44
Figure 7 Change Password at Login
45
Figure 8 Replace Factory Default Certificate
45
Figure 9 Select a Mode
46
Figure 10 Web Configurator: Main Screen
47
Navigating the Web Configurator
47
Navigation Panel
47
Table 2 Web Configurator Screens Summary
47
Status Screen
50
Figure 11 Status Screen
51
Table 3 Status Screen
51
Figure 12 Status: any IP Table
53
Status: any IP Table
53
Status: WLAN Status
53
Table 4 Status: any IP Table
53
Status: Bandwidth Status
54
Status: VPN Status
54
Figure 13 Status: WLAN Status
54
Figure 14 Status: Bandwidth Status
54
Table 5 Status: WLAN Status
54
Status: Packet Statistics
55
Resetting the Zyxel Device
46
Using the Reset Button
46
Figure 15 Status: VPN Status
55
Table 6 Status: VPN Status
55
Figure 16 Status: Packet Statistics
56
Table 7 Status: Packet Statistics
56
Changing Login Password
57
Figure 17 System General
57
Table 8 System General: Password
57
Chapter 3 Wizard Setup for Internet Access
59
Figure 18 Select a Mode
59
Internet Access Wizard Setup
59
Introduction
59
Figure 19 Wizard: Welcome
60
Figure 20 Auto Detection: no DSL Connection
60
Automatic Detection
61
Figure 21 Auto Detection: Failed
61
Figure 22 Auto-Detection: Pppoe
61
Figure 23 Internet Access Wizard Setup: ISP Parameters
62
Table 9 Internet Access Wizard Setup: ISP Parameters
62
Figure 24 Internet Connection with Pppoe
63
Figure 25 Internet Connection with RFC 1483
63
Table 10 Internet Connection with Pppoe
63
Table 11 Internet Connection with RFC 1483
63
Figure 29 Connection Test Failed-2
66
Figure 30 Connection Test Successful
66
Figure 31 Wireless LAN Setup Wizard 1
67
Table 14 Wireless LAN Setup Wizard 1
67
Figure 32 Wireless LAN Setup Wizard 2
68
Table 15 Wireless LAN Setup Wizard 2
68
Automatically Assign a WPA Key
69
Manually Assign a WEP Key
69
Manually Assign a WPA-PSK Key
69
Manual Configuration
61
Figure 26 Internet Connection with ENET ENCAP
64
Table 12 Internet Connection with ENET ENCAP
64
Figure 27 Internet Connection with Pppoa
65
Figure 28 Connection Test Failed-1
65
Table 13 Internet Connection with Pppoa
65
Wireless Connection Wizard Setup
66
Figure 33 Manually Assign a WPA Key
69
Table 16 Manually Assign a WPA Key
69
Figure 34 Manually Assign a WEP Key
70
Figure 35 Wireless LAN Setup 3
70
Table 17 Manually Assign a WEP Key
70
Figure 36 Internet Access and WLAN Wizard Setup Complete
71
Chapter 4 Bandwidth Management Wizard
73
Introduction
73
Predefined Media Bandwidth Management Services
73
Table 18 Media Bandwidth Management Setup: Services
73
Bandwidth Management Wizard Setup
74
Figure 37 Select a Mode
74
Figure 38 Wizard: Welcome
75
Figure 39 Bandwidth Management Wizard: General Information
75
Table 19 Bandwidth Management Wizard: General Information
75
Figure 40 Bandwidth Management Wizard: Configuration
76
Table 20 Bandwidth Management Wizard: Configuration
76
Figure 41 Bandwidth Management Wizard: Complete
77
Network
79
Figure 79 DMZ
79
Part II: Network
79
WAN Setup
81
Figure 43 Internet Connection (Pppoe)
86
Table 21 Internet Connection
86
Configuring Advanced Internet Connection
87
Figure 44 Advanced Internet Connection
88
Table 22 Advanced Internet Connection
88
Configuring more Connections
89
Figure 45 more Connections
90
More Connections Edit
90
Table 23 more Connections
90
Figure 46 more Connections Edit
91
Table 24 more Connections Edit
91
Configuring more Connections Advanced Setup
92
Figure 47 more Connections Advanced Setup
93
Table 25 more Connections Advanced Setup
93
Configuring WAN Backup
94
Figure 48 Traffic Redirect Example
94
Figure 49 Traffic Redirect LAN Setup
94
Traffic Redirect
94
Figure 50 WAN Backup Setup
95
Figure 51 WAN Backup Advanced Setup
97
Table 27 WAN Backup Advanced Setup
97
Dial Backup Modem Setup
99
Figure 52 WAN Dial Backup Modem Setup
99
Table 28 WAN Dial Backup Modem Setup
100
LAN Overview
101
LAN Setup
101
Lans, Wans and the Zyxel Device
101
DHCP Setup
102
DNS Server Address
102
DNS Server Address Assignment
102
IP Address and Subnet Mask
103
Lan Tcp/Ip
103
Multicast
104
RIP Setup
104
Any IP
105
Configuring LAN IP
106
Figure 56 Advanced LAN Setup
107
Table 29 LAN IP
107
Table 30 Advanced LAN Setup
107
DHCP Setup
108
Figure 57 DHCP Setup
108
LAN Client List
109
Table 31 DHCP Setup
109
Figure 58 LAN Client List
110
LAN IP Alias
110
Table 32 LAN Client List
110
Figure 59 Physical Network & Partitioned Logical Networks
111
Figure 60 LAN IP Alias
111
Table 33 LAN IP Alias
112
Wireless Network Overview
113
MAC Address Filter
114
Ssid
114
User Authentication
114
Wireless Security Overview
114
Encryption
115
Additional Wireless Terms
116
One-Touch Intelligent Security Technology (OTIST)
116
Quality of Service (Qos)
116
Wireless Performance Overview
116
General Wireless LAN Screen
117
No Security
118
Figure 63 Wireless: no Security
119
Table 37 Wireless no Security
119
Figure 64 Wireless: Static WEP Encryption
120
Table 38 Wireless: Static WEP Encryption
120
Figure 65 Wireless: WPA(2)-PSK
121
Table 40 Wireless: WPA(2)
123
Table 41 Wireless LAN: Advanced
124
Wireless LAN Advanced Setup
124
Enabling OTIST
125
Otist
125
Table 42 OTIST
126
Starting OTIST
127
Figure 71 OTIST in Progress (AP)
128
Figure 72 OTIST in Progress (Client)
128
Figure 73 no AP with OTIST Found
128
Figure 74 Start OTIST
128
Figure 75 MAC Address Filter
129
MAC Filter
129
Table 43 MAC Address Filter
129
Table 44 WMM Qos Priorities
130
WMM Qos
130
WMM Qos Example
130
WMM Qos Priorities
130
Figure 76 Wireless LAN: Qos
131
Qos Screen
131
Services
131
Table 45 Wireless LAN: Qos
131
Tos (Type of Service) and WMM Qos
131
Application Priority Configuration
132
Figure 77 Application Priority Configuration
132
Table 46 Application Priority Configuration
132
Multiple SSID (P-662HW-D Models Only)
133
Figure 78 Multiple SSID Network Example
134
Multiple SSID Commands
134
Table 47 Multiple SSID Commands
134
Multiple SSID Example
135
Table 48 Multiple SSID Example Configuration
135
Dmz
137
Table 26 WAN Backup Setup
95
WAN Backup Advanced Screen
96
Wpa(2)-Psk
120
Table 39 Wireless: WPA(2)-PSK
121
WPA(2) Authentication Screen
122
Wireless LAN
113
Chapter 5 WAN Setup
81
Encapsulation
81
WAN Overview
81
IP Address Assignment
82
Multiplexing
82
VPI and VCI
82
Metric
83
Nailed-Up Connection (PPP)
83
Nat
83
Figure 42 Example of Traffic Shaping
84
Traffic Shaping
84
ATM Traffic Classes
85
Zero Configuration Internet Access
85
Internet Connection
86
Figure 80 DMZ Public Address Example
139
Table 49 DMZ
139
Chapter 6 LAN Setup
101
Figure 53 LAN and WAN IP Addresses
101
Figure 54 any IP Example
105
Figure 55 LAN IP
106
Configuring Advanced LAN Setup
107
Figure 66 Wireless: WPA(2)
122
Figure 67 Advanced
124
Figure 68 OTIST
126
Figure 69 Example Wireless Client OTIST Screen
127
Figure 70 Security Key
127
Notes on OTIST
128
Chapter 7 Wireless LAN
113
Figure 61 Example of a Wireless Network
113
Table 34 Types of Encryption for each Type of Authentication
115
Table 35 Additional Wireless Terms
116
Figure 62 Wireless LAN: General
117
Table 36 Wireless LAN: General
118
WEP Encryption Screen
119
Chapter 8 DMZ
137
Configuring DMZ
137
Introduction
137
DMZ Public IP Address Example
139
Chapter 9 Network Address Translation (NAT) Screens
141
NAT Definitions
141
NAT Overview
141
Table 50 NAT Definitions
141
Figure 81 How NAT Works
142
How NAT Works
142
NAT Application
142
What NAT Does
142
Figure 82 NAT Application with IP Alias
143
NAT General Setup
144
SUA (Single User Account) Versus NAT
144
Table 51 NAT Mapping Types
144
Figure 83 NAT General
145
Port Forwarding
145
Table 52 NAT General
145
Figure 84 Multiple Servers Behind NAT Example
146
Configuring Port Forwarding
147
Figure 85 NAT Port Forwarding
147
Figure 86 Port Forwarding Rule Setup
148
Table 54 Port Forwarding Rule Setup
148
Address Mapping
149
Figure 87 Address Mapping Rules
149
Address Mapping Rule Edit
150
Figure 88 Edit Address Mapping Rule
150
Table 55 Address Mapping Rules
150
Trigger Port
151
NAT Mapping Types
143
Table 53 NAT Port Forwarding
147
Port Forwarding Rule Edit
148
Configuring Servers Behind Port Forwarding (Example)
146
Default Server IP Address
146
Port Forwarding: Services and Port Numbers
146
Table 56 Edit Address Mapping Rule
151
Figure 89 Trigger Port
152
Table 57 Trigger Port
152
Edit Trigger Port
153
Figure 90 Trigger Port Edit
153
Table 58 Trigger Port Edit
153
Security
155
Part III: Security
155
Chapter 10 Firewalls
157
Firewall Overview
157
Firewalls
157
Packet Filtering Firewalls
157
Types of Firewalls
157
Application-Level Firewalls
158
Introduction to Zyxel's Firewall
158
Stateful Inspection Firewalls
158
Basics
159
Denial of Service
159
Denial of Service Attacks
159
Figure 91 Firewall Application
159
Table 59 Common IP Ports
159
Figure 92 Three-Way Handshake
160
Table 60 ICMP Commands that Trigger Alerts
162
Table 61 Legal Netbios Commands
162
Table 62 Legal SMTP Commands
162
Figure 95 Stateful Inspection
163
Stateful Inspection and the Zyxel Device
164
TCP Security
164
UDP/ICMP Security
165
Upper Layer Protocols
165
Guidelines for Enhancing Security with Your Firewall
166
Security in General
166
Firewall
167
Packet Filtering
167
Packet Filtering Vs Firewall
167
Stateful Inspection Process
163
Types of Dos Attacks
160
Figure 93 SYN Flood
161
Figure 94 Smurf Attack
161
Stateful Inspection
162
Chapter 11 Firewall Configuration
169
Access Methods
169
Firewall Policies Overview
169
Rule Logic Overview
170
Security Ramifications
170
Connection Direction
171
Key Fields for Configuring Rules
171
Alerts
172
Figure 96 Firewall: General
172
General Firewall Policy
172
LAN to WAN Rules
172
Firewall Rules Summary
173
Table 63 Firewall: General
173
Figure 97 Firewall Rules
174
Table 64 Firewall Rules
174
Configuring Firewall Rules
175
Figure 98 Firewall: Edit Rule
176
Figure 99 Firewall: Customized Services
178
Table 66 Customized Services
178
Example Firewall Rule
179
Figure 100 Firewall: Configure Customized Services
179
Table 67 Firewall: Configure Customized Services
179
Figure 101 Firewall Example: Rules
180
Figure 102 Edit Custom Port Example
180
Figure 103 Firewall Example: Edit Rule: Destination Address
181
Figure 105 Firewall Example: Rules: Myservice
183
Table 68 Predefined Services
183
Anti-Probing
185
Figure 106 Firewall: Anti Probing
185
Dos Thresholds
186
Table 69 Firewall: Anti Probing
186
Threshold Values
186
Configuring Firewall Thresholds
187
Half-Open Sessions
187
Figure 107 Firewall: Threshold
188
Table 70 Firewall: Threshold
188
Configuring Keyword Blocking
191
Content Filtering
191
Content Filtering Overview
191
Figure 109 Content Filter: Schedule
192
Table 71 Content Filter: Keyword
192
Configuring Trusted Computers
193
Table 65 Firewall: Edit Rule
177
Configuring a Customized Service
178
Customized Services
178
Chapter 12 Content Filtering
191
Figure 104 Firewall Example: Edit Rule: Select Customized Services
182
Predefined Services
183
Figure 108 Content Filter: Keyword
191
Configuring the Schedule
192
Figure 110 Content Filter: Trusted
193
Table 72 Content Filter: Schedule
193
Table 73 Content Filter: Trusted
193
ZyXEL Communications P-662HW-67 Quick Start Manual (7 pages)
ZyXEL Communications Wireless Security Gateway Quick Start Guide
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 6.1 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Status Page
3
Internet Setup
4
Troubleshooting
6
Advertisement
ZyXEL Communications P-662HW-67 Declaration Of Conformity (1 page)
802.11g Wireless ADSL 2+ 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.13 MB
Advertisement
Related Products
ZyXEL Communications Prestige P-662HW-61
ZyXEL Communications P-662HW-63
ZyXEL Communications P-662HW-D1
ZyXEL Communications P-662HW-D3
ZyXEL Communications P-662HW-I
ZyXEL Communications P-662H Series
ZyXEL Communications P-662H-61
ZyXEL Communications P-662H-63
ZyXEL Communications P-662H-67
ZyXEL Communications P-662H-D1
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL