Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Card
Prestige 2602H Series
ZyXEL Communications Prestige 2602H Series Manuals
Manuals and User Guides for ZyXEL Communications Prestige 2602H Series. We have
3
ZyXEL Communications Prestige 2602H Series manuals available for free PDF download: User Manual, Quick Start Manual
ZyXEL Communications Prestige 2602H Series User Manual (550 pages)
ADSL VoIP IAD 802.11g Wireless ADSL VoIP IAD
Brand:
ZyXEL Communications
| Category:
Network Card
| Size: 13.26 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
6
Zyxel Limited Warranty
7
Customer Support
8
Table of Contents
11
List of Figures
29
List of Tables
37
Preface
43
Syntax Conventions
44
Introduction to DSL
45
Chapter 1 Getting to Know Your Prestige
47
Introducing the Prestige
47
Table 1 Models Covered
47
Features of the Prestige
48
Table 2 ADSL Standards
48
Zero Configuration Internet Access
49
Dynamic Dns Support
51
P2602HW Wireless Features
52
Table 3 IEEE 802.11G
52
Traffic Redirect
51
Applications for the Prestige
53
Internet Access
53
Internet Single User Account
54
Making Calls Via Internet Telephony Service Provider
54
Make Peer-To-Peer Calls
54
Figure 1 Prestige Internet Access Application
54
Figure 2 Internet Telephony Service Provider Application
54
Firewall for Secure Broadband Internet Access
55
LAN to LAN Application
55
Figure 3 Peer-To-Peer Calling
55
Figure 4 Firewall Application
55
Front Panel Leds
56
Figure 5 Prestige LAN-To-LAN Application
56
Figure 6 P2602H-C Series Front Panel
56
Figure 7 P2602HW-C Series Front Panel
56
Table 4 P2602H/HW-C Series Front Panel Leds
56
Chapter 2 Introducing the Web Configurator
59
Web Configurator Overview
59
Accessing the Prestige Web Configurator
59
Resetting the Prestige
60
Using the Reset Button
60
Figure 8 Password Screen
60
Figure 9 Change Password at Login
60
Navigating the Prestige Web Configurator
61
Figure 10 Web Configurator SITE MAP Screen
62
Table 5 Web Configurator Screens Summary
62
Chapter 3 Wizard Setup
65
Wizard Setup Introduction
65
Wizard Setup: First Screen
65
Figure 11 Wizard Setup: First Screen
65
Wizard Setup: Second Screen
66
Table 6 Wizard Setup: First Screen
66
Figure 12 Internet Connection with Pppoe
67
Table 7 Internet Connection with Pppoe
67
Figure 13 Internet Connection with RFC 1483
68
Figure 14 Internet Connection with ENET ENCAP
68
Table 8 Internet Connection with RFC 1483
68
Figure 15 Internet Connection with Pppoa
69
Table 9 Internet Connection with ENET ENCAP
69
Wizard Setup: Third Screen
70
Table 10 Internet Connection with Pppoa
70
Figure 16 Wizard Setup: Third Screen
71
Table 11 Wizard Setup: Voice Configuration
71
Internet Access Wizard Setup: Fourth Screen
72
Figure 17 Internet Access Wizard Setup: Fourth Screen
73
Wizard Setup: Connection Test
74
Figure 18 Wizard Setup: LAN Configuration
74
Table 12 Wizard Setup: LAN Configuration
74
Test Your Internet Connection
75
Media Bandwidth Management Wizard
75
Figure 19 Wizard Setup: Connection Tests
75
Media Bandwidth Management Setup: First Screen
76
Predefined Media Bandwidth Management Services
76
Table 13 Media Bandwidth Mgnt. Wizard Setup: Services
76
Figure 20 Media Bandwidth Mgnt. Wizard Setup: First Screen
77
Media Bandwidth Mgnt. Wizard Setup: Second Screen
77
Table 14 Media Bandwidth Mgnt. Wizard Setup: First Screen
77
Figure 21 Media Bandwidth Mgnt. Wizard Setup: Second Screen
78
Media Bandwidth Mgnt. Wizard Setup: Finish
78
Table 15 Media Bandwidth Mgnt. Wizard Setup: Second Screen
78
Password Setup
79
Configuring Password
79
Figure 22 Media Bandwidth Mgnt. Wizard Setup: Finish
79
Figure 23 Password
79
Table 16 Password
79
Chapter 4 LAN Setup
81
LAN Overview
81
Lans, Wans and the Prestige
81
DHCP Setup
81
Figure 24 LAN and WAN IP Addresses
81
IP Pool Setup
82
DNS Server Address
82
DNS Server Address Assignment
82
Lan Tcp/Ip
83
Factory LAN Defaults
83
IP Address and Subnet Mask
83
Private IP Addresses
84
RIP Setup
84
Multicast
85
Any IP
85
How any IP Works
86
Figure 25 any IP Example
86
Configuring LAN
87
Figure 26 LAN Setup
87
Table 17 LAN Setup
88
Configuring Static DHCP
89
Figure 27 LAN: Static DHCP
89
Table 18 LAN: Static DHCP
89
Chapter 5 Wireless LAN (P2602HW Models)
91
Introduction
91
Wireless Security Overview
91
Encryption
91
Authentication
91
Restricted Access
92
Hide Prestige Identity
92
Configuring Wireless LAN on the Prestige
92
Configuring the Wireless Screen
93
WEP Encryption
93
Figure 28 Wireless Security Methods
93
Figure 29 Wireless Screen
94
Table 19 Wireless LAN
94
Configuring MAC Filters
95
Figure 30 MAC Address Filter
96
Table 20 MAC Address Filter
96
Introduction to WPA
97
WPA-PSK Application Example
97
WPA with RADIUS Application Example
98
Figure 31 WPA - PSK Authentication
98
Wireless Client WPA Supplicants
99
Configuring IEEE 802.1X and WPA
99
Figure 32 WPA with RADIUS Application Example2
99
Authentication Required: 802.1X
100
Figure 33 Wireless LAN: 802.1X/Wpa: no Access Allowed
100
Figure 34 Wireless LAN: 802.1X/Wpa: no Authentication
100
Table 21 Wireless LAN: 802.1X/Wpa: no Access/Authentication
100
Figure 35 Wireless LAN: 802.1X/Wpa: 802.1Xl
101
Table 22 Wireless LAN: 802.1X/Wpa: 802.1X
101
Authentication Required: WPA
102
Figure 36 Wireless LAN: 802.1X/Wpa: WPA
103
Table 23 Wireless LAN: 802.1X/Wpa: WPA
103
Authentication Required: WPA-PSK
104
Figure 37 Wireless LAN: 802.1X/Wpa:wpa-PSK
104
Table 24 Wireless LAN: 802.1X/Wpa: WPA-PSK
104
Configuring Local User Authentication
105
Figure 38 Local User Database
105
Table 25 Local User Database
105
Configuring RADIUS
106
Figure 39 RADIUS
106
Table 26 RADIUS
106
Chapter 6 WAN Setup
109
WAN Overview
109
Encapsulation
109
Enet Encap
109
PPP over Ethernet
109
Pppoa
109
Rfc 1483
110
Multiplexing
110
VC-Based Multiplexing
110
LLC-Based Multiplexing
110
VPI and VCI
110
IP Address Assignment
110
IP Assignment with Pppoa or Pppoe Encapsulation
110
IP Assignment with RFC 1483 Encapsulation
111
IP Assignment with ENET ENCAP Encapsulation
111
Nailed-Up Connection (PPP)
111
Metric
111
Pppoe Encapsulation
112
Traffic Shaping
112
Zero Configuration Internet Access
113
Configuring WAN Setup
113
Figure 40 Example of Traffic Shaping
113
Figure 41 WAN Setup (Pppoe)
114
Table 27 WAN Setup
114
Traffic Redirect
116
Configuring WAN Backup
117
Figure 42 Traffic Redirect Example
117
Figure 43 Traffic Redirect LAN Setup
117
Figure 44 WAN Backup
118
Table 28 WAN Backup
118
Chapter 7 Network Address Translation (NAT) Screens
121
NAT Overview
121
NAT Definitions
121
Table 29 NAT Definitions
121
What NAT Does
122
How NAT Works
122
NAT Application
123
NAT Mapping Types
123
Figure 45 How NAT Works
123
Figure 46 NAT Application with IP Alias
123
SUA (Single User Account) Versus NAT
124
Table 30 NAT Mapping Types
124
SUA Server
125
Default Server IP Address
125
Port Forwarding: Services and Port Numbers
125
Table 31 Services and Port Numbers
125
Configuring Servers Behind SUA (Example)
126
Selecting the NAT Mode
126
Figure 47 Multiple Servers Behind NAT Example
126
Configuring SUA Server
127
Figure 48 NAT Mode
127
Table 32 NAT Mode
127
Figure 49 Edit SUA/NAT Server Set
128
Table 33 Edit SUA/NAT Server Set
128
Configuring Address Mapping
129
Figure 50 Address Mapping Rules
129
Table 34 Address Mapping Rules
129
Editing an Address Mapping Rule
130
Figure 51 Address Mapping Rule Edit
130
Table 35 Address Mapping Rule Edit
131
Chapter 8 Introduction to Voip
133
Sip
133
SIP Identities
133
SIP Number
133
SIP Service Domain
134
SIP Call Progression
134
SIP Servers
134
Table 36 SIP Call Progression
134
Figure 52 SIP User Agent
135
SIP Proxy Server
135
SIP User Agent
135
Figure 53 SIP Proxy Server
136
SIP Redirect Server
136
SIP Register Server
137
Rtp
137
Sip Alg
137
Pulse Code Modulation
137
Figure 54 SIP Redirect Server
137
Voice Coding
138
138
138
PSTN Call Setup Signaling
138
MWI (Message Waiting Indication)
138
Chapter 9 Voice Screens
139
Voice Screens Introduction
139
SIP Settings Configuration
139
Figure 55 SIP Settings
139
Advanced Voice Settings Configuration
140
Table 37 SIP Settings
140
Figure 56 Voice Advanced Setup
141
Table 38 Voice Advanced Setup
141
Quality of Service (Qos)
143
Type of Service (Tos)
143
Diffserv
143
DSCP and Per-Hop Behavior
143
Vlan
143
Figure 57 Diffserv: Differentiated Service Field
143
Qos Configuration
144
Figure 58 Qos
144
Table 39 Qos
144
Phone
145
Voice Activity Detection/Silence Suppression
145
Comfort Noise Generation
145
Echo Cancellation
145
Phone Configuration
145
Figure 59 Phone
146
Table 40 Phone
146
Speed Dial
147
Peer-To-Peer Calls
147
Speed Dial Configuration
147
Figure 60 Speed Dial
148
Table 41 Speed Dial
148
Lifeline (Prestige 2602HL/HWL)
149
Lifeline Configuration (Prestige 2602HL/HWL)
149
Supplementary Phone Services Overview
150
Figure 61 Lifeline
150
Table 42 Lifeline
150
Europe Type Supplementary Phone Services
151
European Call Hold
151
Table 43 European Flash Key Commands
151
European Call Waiting
152
European Call Transfer
152
European Three-Way Conference
152
The Flash Key
151
USA Type Supplementary Services
153
USA Call Hold
153
USA Call Waiting
153
USA Call Transfer
153
USA Three-Way Conference
153
Table 44 USA Flash Key Commands
153
Common Phone Port Configuration
154
Figure 62 Phone Port Common
154
Table 45 Voice Common
154
Call Forward Configuration
155
Figure 63 Voice Call Forward
156
Table 46 Voice Call Forward
156
Chapter 10 Phone Usage
159
Dialing a Telephone Number
159
Using Speed Dial to Dial a Telephone Number
159
Internal Calls
159
Checking the Prestige's IP Address
159
Auto Firmware Upgrade
160
Chapter 11 Dynamic DNS Setup
161
Dynamic DNS
161
DYNDNS Wildcard
161
Configuring Dynamic DNS
161
Figure 64 Dynamic DNS
162
Table 47 Dynamic DNS
162
Chapter 12 Time and Date
163
Pre-Defined NTP Time Servers List
163
Configuring Time and Date
163
Table 48 Pre-Defined NTP Time Servers
163
Figure 65 Time and Date
164
Table 49 Time and Date
164
Chapter 13 Firewalls
167
Firewall Overview
167
Types of Firewalls
167
Packet Filtering Firewalls
167
Application-Level Firewalls
167
Stateful Inspection Firewalls
168
Introduction to Zyxel's Firewall
168
Denial of Service Attacks
169
Denial of Service
169
Basics
169
Figure 66 Prestige Firewall Application
169
Types of Dos Attacks
170
Table 50 Common IP Ports
170
Figure 67 Three-Way Handshake
171
Figure 68 SYN Flood
171
Figure 69 Smurf Attack
172
ICMP Vulnerability
172
Illegal Commands (Netbios and SMTP)
172
Table 51 ICMP Commands that Trigger Alerts
172
Table 52 Legal Netbios Commands
172
Traceroute
173
Stateful Inspection
173
Table 53 Legal SMTP Commands
173
Figure 70 Stateful Inspection
174
Stateful Inspection Process
174
Stateful Inspection and the Prestige
175
TCP Security
175
UDP/ICMP Security
176
Upper Layer Protocols
176
Guidelines for Enhancing Security with Your Firewall
176
Security in General
177
Packet Filtering Vs Firewall
178
Packet Filtering
178
When to Use Filtering
178
Firewall
178
When to Use the Firewall
178
Firewall Configuration
181
Chapter 14 Firewall Configuration
181
Access Methods
181
Firewall Policies Overview
181
Rule Logic Overview
182
Rule Checklist
182
Security Ramifications
182
Key Fields for Configuring Rules
183
Action
183
Service
183
Source Address
183
Destination Address
183
Connection Direction Example
183
LAN to WAN Rules
184
WAN to LAN Rules
184
Figure 71 LAN to WAN Traffic
184
Figure 72 WAN to LAN Traffic
184
Alerts
185
Configuring Basic Firewall Settings
185
Figure 73 Firewall: Default Policy
185
Table 54 Firewall: Default Policy
185
Rule Summary
186
Figure 74 Firewall: Rule Summary
187
Table 55 Rule Summary
187
Configuring Firewall Rules
188
Figure 75 Firewall: Edit Rule
189
Table 56 Firewall: Edit Rule
190
Customized Services
191
Creating/Editing a Customized Service
191
Figure 76 Firewall: Customized Services
191
Table 57 Customized Services
191
Example Firewall Rule
192
Figure 77 Firewall: Configure Customized Services
192
Table 58 Firewall: Configure Customized Services
192
Figure 78 Firewall Example: Rule Summary
193
Figure 79 Firewall Example: Edit Rule: Destination Address
194
Figure 80 Edit Custom Port Example
194
Figure 81 Firewall Example: Edit Rule: Select Customized Services
195
Predefined Services
196
Figure 82 Firewall Example: Rule Summary: My Service
196
Table 59 Predefined Services
196
Anti-Probing
198
Dos Thresholds
199
Figure 83 Firewall: Anti Probing
199
Table 60 Firewall: Anti Probing
199
Half-Open Sessions
200
TCP Maximum Incomplete and Blocking Time
200
Figure 84 Firewall: Threshold
201
Table 61 Firewall: Threshold
201
Threshold Values
200
Chapter 15 Content Filtering
203
Content Filtering Overview
203
Configuring Keyword Blocking
203
Configuring the Schedule
204
Figure 85 Content Filter: Keyword
204
Table 62 Content Filter: Keyword
204
Configuring Trusted Computers
205
Figure 86 Content Filter: Schedule
205
Table 63 Content Filter: Schedule
205
Figure 87 Content Filter: Trusted
206
Table 64 Content Filter: Trusted
206
Chapter 16 Introduction to Ipsec
207
VPN Overview
207
Ipsec
207
Security Association
207
Other Terminology
207
Encryption
207
Data Confidentiality
208
Data Integrity
208
Data Origin Authentication
208
VPN Applications
208
Figure 88 Encryption and Decryption
208
Ipsec Architecture
209
Ipsec Algorithms
209
Key Management
209
Encapsulation
209
Figure 89 Ipsec Architecture
209
Transport Mode
210
Tunnel Mode
210
Ipsec and NAT
210
Figure 90 Transport and Tunnel Mode Ipsec Encapsulation
210
Table 65 VPN and NAT
211
Chapter 17 VPN Screens
213
Vpn/Ipsec Overview
213
Ipsec Algorithms
213
AH (Authentication Header) Protocol
213
ESP (Encapsulating Security Payload) Protocol
214
My IP Address
214
Table 66 AH and ESP
214
Secure Gateway Address
215
Dynamic Secure Gateway Address
215
VPN Summary Screen
215
Figure 91 Ipsec Summary Fields
215
Figure 92 VPN Summary
216
Table 67 VPN Summary
216
Keep Alive
217
Remote DNS Server
217
NAT Traversal
218
Figure 93 VPN Host Using Intranet DNS Server Example
218
Figure 94 NAT Router between Ipsec Routers
218
NAT Traversal Configuration
219
ID Type and Content
219
ID Type and Content Examples
220
Table 68 Local ID Type and Content Fields
220
Table 69 Peer ID Type and Content Fields
220
Table 70 Matching ID Type and Content Configuration Example
220
Pre-Shared Key
221
Editing VPN Policies
221
Table 71 Mismatching ID Type and Content Configuration Example
221
Figure 95 VPN IKE
222
Table 72 VPN IKE
223
IKE Phases
226
Figure 96 Two Phases to Set up the Ipsec SA
227
Diffie-Hellman (DH) Key Groups
228
Negotiation Mode
228
Perfect Forward Secrecy (PFS)
228
Configuring Advanced IKE Settings
228
Figure 97 VPN IKE: Advanced Setup
229
Table 73 VPN IKE: Advanced Setup
229
Manual Key Setup
231
Security Parameter Index (SPI)
231
Configuring Manual Key
232
Figure 98 VPN: Manual Key
232
Table 74 VPN: Manual Key
233
Viewing SA Monitor
235
Figure 99 VPN: SA Monitor
236
Table 75 VPN: SA Monitor
236
Configuring Global Setting
237
Telecommuter Vpn/Ipsec Examples
237
Telecommuters Sharing One VPN Rule Example
237
Figure 100 VPN: Global Setting
237
Table 76 VPN: Global Setting
237
Telecommuters Using Unique VPN Rules Example
238
Figure 101 Telecommuters Sharing One VPN Rule Example
238
Table 77 Telecommuters Sharing One VPN Rule Example
238
Figure 102 Telecommuters Using Unique VPN Rules Example
239
Table 78 Telecommuters Using Unique VPN Rules Example
239
VPN and Remote Management
240
Chapter 18 Remote Management Configuration
241
Remote Management Overview
241
Remote Management Limitations
241
Remote Management and NAT
242
System Timeout
242
Telnet
242
Ftp
242
Figure 103 Telnet Configuration on a TCP/IP Network
242
Web
243
Configuring Remote Management
243
Figure 104 Remote Management
243
Table 79 Remote Management
243
Chapter 19 Universal Plug-And-Play (Upnp)
245
Introducing Universal Plug and Play
245
How Do I Know if I'M Using Upnp
245
NAT Traversal
245
Cautions with Upnp
245
Upnp and Zyxel
246
Configuring Upnp
246
Figure 105 Configuring Upnp
246
Installing Upnp in Windows Example
247
Table 80 Configuring Upnp
247
Figure 106 Add/Remove Programs: Windows Setup: Communication
248
Figure 107 Add/Remove Programs: Windows Setup: Communication: Components
248
Figure 108 Network Connections
249
Figure 109 Windows Optional Networking Components Wizard
250
Using Upnp in Windows XP Example
251
Figure 110 Networking Services
251
Figure 111 Network Connections
252
Figure 112 Internet Connection Properties
253
Figure 113 Internet Connection Properties: Advanced Settings
254
Figure 114 Internet Connection Properties: Advanced Settings: Add
254
Figure 115 System Tray Icon
255
Figure 116 Internet Connection Status
255
Figure 117 Network Connections
256
Figure 118 Network Connections: My Network Places
257
Figure 119 Network Connections: My Network Places: Properties: Example
257
Chapter 20 Logs Screens
259
Logs Overview
259
Alerts and Logs
259
Configuring Log Settings
259
Figure 120 Log Settings
260
Table 81 Log Settings
261
Displaying the Logs
262
SMTP Error Messages
262
Figure 121 View Logs
262
Table 82 View Logs
262
Example E-Mail Log
263
Table 83 SMTP Error Messages
263
Figure 122 E-Mail Log Example
264
Chapter 21 Media Bandwidth Management Advanced Setup
265
Bandwidth Management Advanced Setup Overview
265
Bandwidth Classes and Filters
265
Proportional Bandwidth Allocation
266
Bandwidth Management Usage Examples
266
Application-Based Bandwidth Management Example
266
Subnet-Based Bandwidth Management Example
266
Figure 123 Application-Based Bandwidth Management Example
266
Application and Subnet-Based Bandwidth Management Example
267
Figure 124 Subnet-Based Bandwidth Management Example
267
Figure 125 Application and Subnet-Based Bandwidth Management Example
267
Table 84 Application and Subnet-Based Bandwidth Management Example
267
Scheduler
268
Priority-Based Scheduler
268
Fairness-Based Scheduler
268
Maximize Bandwidth Usage
268
Reserving Bandwidth for Non-Bandwidth Class Traffic
268
Maximize Bandwidth Usage Example
269
Figure 126 Bandwidth Allotment Example
269
Bandwidth Borrowing
270
Bandwidth Borrowing Example
270
Figure 127 Maximize Bandwidth Usage Example
270
Maximize Bandwidth Usage with Bandwidth Borrowing
271
Configuring Summary
271
Figure 128 Bandwidth Borrowing Example
271
Figure 129 Media Bandwidth Management: Summary
272
Table 85 Media Bandwidth Management: Summary
272
Configuring Class Setup
273
Figure 130 Media Bandwidth Management: Class Setup
273
Table 86 Media Bandwidth Management: Class Setup
273
Figure 131 Media Bandwidth Management: Class Configuration
274
Media Bandwidth Management Class Configuration
274
Table 87 Media Bandwidth Management: Class Configuration
274
Media Bandwidth Management Statistics
276
Table 88 Services and Port Numbers
276
Bandwidth Monitor
277
Figure 132 Media Bandwidth Management Statistics
277
Table 89 Media Bandwidth Management Statistics
277
Figure 133 Media Bandwidth Management: Monitor
278
Table 90 Media Bandwidth Management: Monitor
278
Chapter 22 Maintenance
279
Maintenance Overview
279
System Status Screen
279
Figure 134 System Status
280
Table 91 System Status
281
Figure 135 System Status: Show Statistics
282
System Statistics
282
Table 92 System Status: Show Statistics
282
DHCP Table Screen
283
Any IP Table Screen
284
Figure 136 DHCP Table
284
Figure 137 any IP Table
284
Table 93 DHCP Table
284
Table 94 any IP Table
284
Wireless Screen
285
Association List
285
Figure 138 Association List
285
Table 95 Association List
285
Diagnostic Screens
286
Diagnostic General Screen
286
Diagnostic DSL Line Screen
286
Figure 139 Diagnostic: General
286
Table 96 Diagnostic: General
286
Figure 140 Diagnostic: DSL Line
287
Table 97 Diagnostic: DSL Line
287
Firmware Screen
288
Figure 141 Firmware Upgrade
288
Table 98 Firmware Upgrade
288
Figure 142 Network Temporarily Disconnected
289
Figure 143 Error Message
289
Chapter 23 Introducing the SMT
291
Introduction to the SMT
291
Procedure for SMT Configuration Via Telnet
291
Entering Password
291
Navigating the SMT Interface
292
Figure 144 Login Screen
292
Table 99 Navigating the SMT Interface
292
System Management Terminal Interface Summary
293
Table 100 SMT Main Menu
293
Table 101 Main Menu Summary
293
SMT Menus Overview
294
Table 102 SMT Menus Overview
294
Changing the System Password
295
Figure 145 Menu 23.1 Change Password
296
Chapter 24 Menu 1 General Setup
297
General Setup
297
Procedure to Configure Menu 1
297
Procedure to Configure Dynamic DNS
298
Figure 146 Menu 1 General Setup
298
Table 103 Menu 1 General Setup
298
Figure 147 Menu 1.1 Configure Dynamic DNS
299
Table 104 Menu 1.1 Configure Dynamic DNS
299
Chapter 25 Menu 2 WAN Backup Setup
301
Introduction to WAN Backup Setup
301
Configuring WAN Backup in Menu 2
301
Figure 148 Menu 2 WAN Backup Setup
301
Table 105 Menu 2 WAN Backup Setup
301
Figure 149 Menu 2.1Traffic Redirect Setup
302
Table 106 Menu 2.1Traffic Redirect Setup
302
Traffic Redirect Setup
302
Chapter 26 Menu 3 LAN Setup
305
LAN Setup
305
General Ethernet Setup
305
Protocol Dependent Ethernet Setup
305
Figure 150 Menu 3 LAN Setup
305
Figure 151 Menu 3.1 LAN Port Filter Setup
305
TCP/IP Ethernet Setup and DHCP
306
Figure 152 Menu 3.2 TCP/IP and DHCP Ethernet Setup
306
Table 107 DHCP Ethernet Setup
306
Table 108 TCP/IP Ethernet Setup
307
Chapter 27 Wireless LAN Setup
309
Wireless LAN Overview
309
Wireless LAN Setup
309
Figure 153 Menu 3.5 - Wireless LAN Setup
309
Table 109 Menu 3.5 - Wireless LAN Setup
309
Wireless LAN MAC Address Filter
310
Figure 154 Menu 3.5.1 WLAN MAC Address Filtering
311
Table 110 Menu 3.5.1 WLAN MAC Address Filtering
311
Chapter 28 Internet Access
313
Internet Access Overview
313
IP Policies
313
IP Alias
313
IP Alias Setup
314
Figure 155 IP Alias Network Example
314
Figure 156 Menu 3.2 TCP/IP and DHCP Setup
314
Route IP Setup
315
Figure 157 Menu 3.2.1 IP Alias Setup
315
Table 111 Menu 3.2.1 IP Alias Setup
315
Internet Access Configuration
316
Figure 158 Menu 1 General Setup
316
Figure 159 Menu 4 Internet Access Setup
316
Table 112 Menu 4 Internet Access Setup
317
Chapter 29 Remote Node Configuration
319
Remote Node Setup Overview
319
Remote Node Setup
319
Remote Node Profile
319
Encapsulation and Multiplexing Scenarios
320
Scenario 1: One VC, Multiple Protocols
320
Scenario 2: One VC, One Protocol (IP)
320
Scenario 3: Multiple Vcs
320
Figure 160 Menu 11 Remote Node Setup
320
Figure 161 Menu 11.1 Remote Node Profile
321
Table 113 Menu 11.1 Remote Node Profile
321
Outgoing Authentication Protocol
322
Remote Node Network Layer Options
323
Figure 162 Menu 11.3 Remote Node Network Layer Options
323
Table 114 Menu 11.3 Remote Node Network Layer Options
323
My WAN Addr Sample IP Addresses
324
Remote Node Filter
325
Figure 163 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
325
Editing ATM Layer Options
326
VC-Based Multiplexing (Non-PPP Encapsulation)
326
Figure 164 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
326
Figure 165 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
326
LLC-Based Multiplexing or PPP Encapsulation
327
Advance Setup Options
327
Figure 166 Menu 11.6 for VC-Based Multiplexing
327
Figure 167 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
327
Figure 168 Menu 11.1 Remote Node Profile
328
Figure 169 Menu 11.8 Advance Setup Options
328
Table 115 Menu 11.8 Advance Setup Options
328
Chapter 30 Static Route Setup
329
IP Static Route Overview
329
Configuration
329
Figure 170 Sample Static Routing Topology
329
Figure 171 Menu 12 Static Route Setup
330
Figure 172 Menu 12.1 IP Static Route Setup
330
Figure 173 Menu12.1.1 Edit IP Static Route
330
Table 116 Menu12.1.1 Edit IP Static Route
331
Chapter 31 Bridging Setup
333
Bridging in General
333
Bridge Ethernet Setup
333
Remote Node Bridging Setup
333
Figure 174 Menu 11.1 Remote Node Profile
334
Figure 175 Menu 11.3 Remote Node Network Layer Options
334
Table 117 Remote Node Network Layer Options: Bridge Fields
334
Bridge Static Route Setup
335
Figure 176 Menu 12.3.1 Edit Bridge Static Route
335
Table 118 Menu 12.3.1 Edit Bridge Static Route
335
Network Address Translation (NAT)
337
Chapter 32 Network Address Translation (NAT)
337
Using NAT
337
SUA (Single User Account) Versus NAT
337
Applying NAT
337
Figure 177 Menu 4 Applying NAT for Internet Access
338
Figure 178 Applying NAT in Menus 4 & 11.3
338
NAT Setup
339
Address Mapping Sets
339
Figure 179 Menu 15 NAT Setup
339
Table 119 Applying NAT in Menus 4 & 11.3
339
Figure 180 Menu 15.1 Address Mapping Sets
340
Figure 181 Menu 15.1.255 SUA Address Mapping Rules
340
SUA Address Mapping Set
340
Table 120 SUA Address Mapping Rules
340
Figure 182 Menu 15.1.1 First Set
341
Ordering Your Rules
341
User-Defined Address Mapping Sets
341
Figure 183 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
342
Table 121 Menu 15.1.1 First Set
342
Table 122 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
342
Configuring a Server Behind NAT
343
Figure 184 Menu 15.2 NAT Server Setup
343
General NAT Examples
344
Figure 185 Menu 15.2 NAT Server Setup
344
Figure 186 Multiple Servers Behind NAT Example
344
Example 1: Internet Access Only
345
Example 2: Internet Access with an Inside Server
345
Figure 187 NAT Example 1
345
Figure 188 Menu 4 Internet Access & NAT Example
345
Example 3: Multiple Public IP Addresses with Inside Servers
346
Figure 189 NAT Example 2
346
Figure 190 Menu 15.2.1 Specifying an Inside Server
346
Figure 191 NAT Example 3
347
Figure 192 Example 3: Menu 11.3
348
Figure 193 Example 3: Menu 15.1.1.1
348
Figure 194 Example 3: Final Menu 15.1.1
349
Example 4: NAT Unfriendly Application Programs
350
Figure 195 Example 3: Menu 15.2
350
Figure 196 NAT Example 4
350
Figure 197 Example 4: Menu 15.1.1.1 Address Mapping Rule
351
Figure 198 Example 4: Menu 15.1.1 Address Mapping Rules
351
Chapter 33 Enabling the Firewall
353
Remote Management and the Firewall
353
Access Methods
353
Enabling the Firewall
353
Figure 199 Menu 21.2 Firewall Setup
354
Chapter 34 Filter Configuration
355
About Filtering
355
Figure 200 Outgoing Packet Filtering Process
355
Figure 201 Filter Rule Process
356
The Filter Structure of the Prestige
356
Configuring a Filter Set for the Prestige
357
Figure 202 Menu 21 Filter Set Configuration
357
Figure 203 Netbios_Wan Filter Rules Summary
357
Filter Rules Summary Menus
358
Figure 204 Netbios_Lan Filter Rules Summary
358
Figure 205 IGMP Filter Rules Summary
358
Table 123 Abbreviations Used in the Filter Rules Summary Menu
358
Configuring a Filter Rule
359
Table 124 Rule Abbreviations Used
359
Figure 206 Menu 21.1.X.X TCP/IP Filter Rule
360
Table 125 Menu 21.1.X.X TCP/IP Filter Rule
360
TCP/IP Filter Rule
360
Figure 207 Executing an IP Filter
362
Generic Filter Rule
362
Figure 208 Menu 21.1.5.1 Generic Filter Rule
363
Table 126 Menu 21.1.5.1 Generic Filter Rule
363
Filter Types and NAT
364
Example Filter
364
Figure 209 Protocol and Device Filter Sets
364
Figure 210 Sample Telnet Filter
365
Figure 211 Menu 21.1.6.1 Sample Filter
365
Applying Filters and Factory Defaults
366
Figure 212 Menu 21.1.6.1 Sample Filter Rules Summary
366
Table 127 Filter Sets Table
366
Ethernet Traffic
367
Figure 213 Filtering Ethernet Traffic
367
Figure 214 Filtering Remote Node Traffic
367
Remote Node Filters
367
Chapter 35 SNMP Configuration
369
About SNMP
369
Figure 215 SNMP Management Model
369
Supported Mibs
370
SNMP Configuration
370
SNMP Traps
371
Figure 216 Menu 22 SNMP Configuration
371
Table 128 Menu 22 SNMP Configuration
371
Table 129 SNMP Traps
371
Table 130 Ports and Permanent Virtual Circuits
372
Chapter 36 System Security
373
System Security
373
System Password
373
Configuring External RADIUS Server
373
Figure 217 Menu 23 - System Security
373
Figure 218 Menu 23 System Security
373
Figure 219 Menu 23.2 System Security: RADIUS Server
374
Table 131 Menu 23.2 System Security: RADIUS Server
374
Ieee802.1X
375
Figure 220 Menu 23 System Security
375
Figure 221 Menu 23.4 System Security: Ieee802.1X
375
Table 132 Menu 23.4 System Security: Ieee802.1X
376
Creating User Accounts on the Prestige
377
Figure 222 Menu 14 Dial-In User Setup
378
Figure 223 Menu 14.1 Edit Dial-In User
378
Table 133 Menu 14.1 Edit Dial-In User
378
Chapter 37 System Information and Diagnosis
379
Overview
379
System Status
379
Figure 224 Menu 24 System Maintenance
379
Figure 225 Menu 24.1 System Maintenance: Status
380
Table 134 Menu 24.1 System Maintenance: Status
380
System Information
381
Figure 226 Menu 24.2 System Information and Console Port Speed
381
Console Port Speed
382
Figure 227 Menu 24.2.1 System Maintenance: Information
382
Table 135 Menu 24.2.1 System Maintenance: Information
382
Log and Trace
383
Viewing Error Log
383
Figure 228 Menu 24.2.2 System Maintenance: Change Console Port Speed
383
Figure 229 Menu 24.3 System Maintenance: Log and Trace
383
Syslog and Accounting
384
Figure 230 Sample Error and Information Messages
384
Figure 231 Menu 24.3.2 System Maintenance: Syslog and Accounting
384
Table 136 Menu 24.3.2 System Maintenance: Syslog and Accounting
384
Figure 232 Syslog Example
385
Diagnostic
386
Figure 233 Menu 24.4 System Maintenance: Diagnostic
386
Table 137 Menu 24.4 System Maintenance Menu: Diagnostic
387
Chapter 38 Firmware and Configuration File Maintenance
389
Filename Conventions
389
Backup Configuration
390
Table 138 Filename Conventions
390
Example of FTP Commands from the Command Line
391
Figure 234 Telnet in Menu 24.5
391
Using the FTP Command from the Command Line
391
Figure 235 FTP Session Example
392
GUI-Based FTP Clients
392
Table 139 General Commands for GUI-Based FTP Clients
392
TFTP and FTP over WAN Management Limitations
392
Backup Configuration Using TFTP
393
GUI-Based TFTP Clients
393
TFTP Command Example
393
Restore Configuration
394
Restore Using FTP
394
Table 140 General Commands for GUI-Based TFTP Clients
394
Restore Using FTP Session Example
395
Figure 236 Telnet into Menu 24.6
395
Figure 237 Restore Using FTP Session Example
395
Uploading Firmware and Configuration Files
396
Firmware File Upload
396
Configuration File Upload
396
Figure 238 Telnet into Menu 24.7.1 Upload System Firmware
396
FTP File Upload Command from the DOS Prompt Example
397
Figure 239 Telnet into Menu 24.7.2 System Maintenance
397
FTP Session Example of Firmware File Upload
398
TFTP File Upload
398
Figure 240 FTP Session Example of Firmware File Upload
398
TFTP Upload Command Example
399
Chapter 39 System Maintenance
401
Command Interpreter Mode
401
Figure 241 Command Mode in Menu 24
401
Figure 242 Valid Commands
401
Call Control Support
402
Budget Management
402
Figure 243 Menu 24.9 System Maintenance: Call Control
402
Figure 244 Menu 24.9.1 System Maintenance: Budget Management
402
Time and Date Setting
403
Figure 245 Menu 24 System Maintenance
403
Table 141 Menu 24.9.1 System Maintenance: Budget Management
403
Figure 246 Menu 24.10 System Maintenance: Time and Date Setting
404
Resetting the Time
404
Table 142 Menu 24.10 System Maintenance: Time and Date Setting
404
Advertisement
ZyXEL Communications Prestige 2602H Series Quick Start Manual (14 pages)
802.11g wireless adsl voip iad 802.11g wireless adsl voip iad with lifeline
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 2.31 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Initial Configuration
4
Zero Configuration
5
Web Configurator Access
5
Wizard Setup
6
Speed Dial Configuration
9
Lifeline Configuration (Prestige 2602HWL)
9
Wireless Configuration
10
Troubleshooting
11
Set up Your Computer's IP Address
12
ZyXEL Communications Prestige 2602H Series Quick Start Manual (13 pages)
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 1.77 MB
Table of Contents
Hardware Connections
2
Initial Configuration
4
Zero Configuration
5
Web Configurator Access
5
Wizard Setup
6
Speed Dial Configuration
9
Troubleshooting
11
Advertisement
Advertisement
Related Products
ZyXEL Communications Prestige 2602HW-C Series
ZyXEL Communications Prestige 2602HW Series
ZyXEL Communications PRESTIGE 2602HWI
ZyXEL Communications PRESTIGE 2602HWL -
ZyXEL Communications Prestige 2602H-6xC
ZyXEL Communications Prestige 2602HWNLI-D7A
ZyXEL Communications Prestige 2602HWL-D3A
ZyXEL Communications Prestige 2602HWL-C Series
ZyXEL Communications Prestige 2602HL Series
ZyXEL Communications Prestige 2602R Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL