Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
PRESTIGE 2602HWI
ZyXEL Communications PRESTIGE 2602HWI Manuals
Manuals and User Guides for ZyXEL Communications PRESTIGE 2602HWI. We have
2
ZyXEL Communications PRESTIGE 2602HWI manuals available for free PDF download: User Manual, Quick Start Manual
ZyXEL Communications PRESTIGE 2602HWI User Manual (519 pages)
ADSL VoIP IAD with 802.11g Wireless
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 12.47 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
List of Figures
27
List of Tables
35
Preface
41
Syntax Conventions
42
Introduction to DSL
43
Chapter 1 Getting to Know Your Prestige
45
Introducing the Prestige
45
Table 1 ADSL Standards
45
Prestige 2602HW-L with Lifeline
46
Features of the Prestige
46
Multiple Sip Accounts
47
High Speed Internet Access
48
Ipsec Vpn Capability
48
External Antenna
49
Table 2 IEEE 802.11G
49
Wep Encryption
49
Wireless Lan Mac Address Filtering
49
Dynamic Dns Support
50
Traffic Redirect
50
Adsl Standards
51
Protocol Support
51
Diagnostics Capabilities
52
Network Management
52
Networking Compatibility
52
Applications for the Prestige
53
Internet Access
53
Making Calls Via Internet Telephony Service Provider
54
Figure 1 Prestige Internet Access Application
54
Firewall for Secure Broadband Internet Access
55
LAN to LAN Application
55
Figure 2 Internet Telephony Service Provider Application
55
Figure 3 Firewall Application
55
Prestige Hardware Installation and Connection
56
Figure 4 Prestige LAN-To-LAN Application
56
Chapter 2 Introducing the Web Configurator
57
Web Configurator Overview
57
Accessing the Prestige Web Configurator
57
Figure 5 Password Screen
57
Resetting the Prestige
58
Using the Reset Button
58
Navigating the Prestige Web Configurator
58
Figure 6 Change Password at Login
58
Figure 7 Web Configurator SITE MAP Screen
59
Table 3 Web Configurator Screens Summary
59
Chapter 3 Wizard Setup
63
Wizard Setup Introduction
63
Encapsulation
63
Enet Encap
63
PPP over Ethernet
63
Pppoa
63
Rfc 1483
64
Multiplexing
64
VC-Based Multiplexing
64
LLC-Based Multiplexing
64
VPI and VCI
64
Internet Access Wizard Setup: First Screen
64
IP Address and Subnet Mask
65
Figure 8 Internet Access Wizard Setup: First Screen
65
Table 4 Internet Access Wizard Setup: First Screen
65
IP Address Assignment
66
IP Assignment with Pppoa or Pppoe Encapsulation
66
IP Assignment with RFC 1483 Encapsulation
66
IP Assignment with ENET ENCAP Encapsulation
66
Private IP Addresses
67
Internet Access Wizard Setup: Second Screen
67
Nailed-Up Connection (PPP)
67
Nat
67
Figure 9 Internet Connection with Pppoe
68
Table 5 Internet Connection with Pppoe
68
Figure 10 Internet Connection with RFC 1483
69
Figure 11 Internet Connection with ENET ENCAP
69
Table 6 Internet Connection with RFC 1483
69
Figure 12 Internet Connection with Pppoa
70
Table 7 Internet Connection with ENET ENCAP
70
Internet Access Wizard Setup: Third Screen
71
SIP Identities
71
SIP Number
71
SIP Service Domain
71
Table 8 Internet Connection with Pppoa
71
Figure 13 Internet Access Wizard Setup: Third Screen
72
Table 9 Internet Access Wizard Setup: Voice Configuration
72
DHCP Setup
73
IP Pool Setup
73
Internet Access Wizard Setup: Fourth Screen
73
Figure 14 Internet Access Wizard Setup: Fourth Screen
74
Figure 15 Internet Access Wizard Setup: LAN Configuration
75
Table 10 Internet Access Wizard Setup: LAN Configuration
75
Figure 16 Internet Access Wizard Setup: Connection Tests
76
Test Your Internet Connection
76
Internet Access Wizard Setup: Connection Test
75
Chapter 4 Password Setup
77
Password Overview
77
Configuring Password
77
Figure 17 Password
77
Table 11 Password
77
Chapter 5 LAN Setup
79
LAN Overview
79
Lans, Wans and the Prestige
79
Figure 18 LAN and WAN IP Addresses
79
DNS Server Address
80
DNS Server Address Assignment
80
Lan Tcp/Ip
81
Factory LAN Defaults
81
IP Address and Subnet Mask
81
RIP Setup
81
Multicast
82
Any IP
82
How any IP Works
83
Figure 19 any IP Example
83
Configuring LAN
84
Figure 20 LAN Setup
84
Table 12 LAN Setup
84
Configuring Static DHCP
85
Figure 21 LAN: Static DHCP
86
Table 13 LAN: Static DHCP
86
Chapter 6 Wireless LAN Setup
87
Wireless LAN Introduction
87
Additional Installation Requirements for Using IEEE 802.1X
87
Channel
87
Ess ID
87
Rts/Cts
88
Figure 22 RTS/CTS
88
Fragmentation Threshold
89
Levels of Security
89
Figure 23 Prestige Wireless Security Levels
89
Data Encryption with WEP
90
Configuring Wireless LAN
90
Figure 24 Wireless LAN
91
Table 14 Wireless LAN
91
Configuring MAC Filter
92
Figure 25 MAC Address Filter
93
Table 15 MAC Address Filter
93
Network Authentication
94
Eap
94
Radius
94
Types of RADIUS Messages
94
EAP Authentication Overview
95
Figure 26 EAP Authentication
95
Introduction to WPA
96
User Authentication
96
Encryption
96
WPA-PSK Application Example
97
WPA with RADIUS Application Example
97
Figure 27 WPA - PSK Authentication
97
Security Parameters Summary
98
Figure 28 WPA with RADIUS Application Example
98
Table 16 Wireless Security Relational Matrix
98
Wireless Client WPA Supplicants
99
Configuring 802.1X and WPA
99
Figure 29 Wireless LAN: 802.1X/Wpa
99
Authentication Required: 802.1X
100
Figure 30 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
100
Table 17 Wireless LAN: 802.1X/Wpa
100
Table 18 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
101
Authentication Required: WPA
102
Figure 31 Wireless LAN: 802.1X/Wpa for WPA Protocol
102
Authentication Required: WPA-PSK
103
Table 19 Wireless LAN: 802.1X/Wpa for WPA Protocol
103
Figure 32 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
104
Table 20 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
104
Configuring Local User Authentication
105
Figure 33 Local User Database
105
Configuring RADIUS
106
Figure 34 RADIUS
106
Table 21 Local User Database
106
Table 22 RADIUS
107
Chapter 7 WAN Setup
109
WAN Overview
109
Metric
109
Pppoe Encapsulation
110
Traffic Shaping
110
Zero Configuration Internet Access
111
Configuring WAN Setup
111
Figure 35 Example of Traffic Shaping
111
Figure 36 WAN Setup (Pppoe)
112
Table 23 WAN Setup
112
Traffic Redirect
114
Configuring WAN Backup
115
Figure 37 Traffic Redirect Example
115
Figure 38 Traffic Redirect LAN Setup
115
Figure 39 WAN Backup
116
Table 24 WAN Backup
116
Chapter 8 Network Address Translation (NAT) Screens
119
NAT Overview
119
NAT Definitions
119
Table 25 NAT Definitions
119
What NAT Does
120
How NAT Works
120
NAT Application
121
NAT Mapping Types
121
Figure 40 How NAT Works
121
Figure 41 NAT Application with IP Alias
121
SUA (Single User Account) Versus NAT
122
Table 26 NAT Mapping Types
122
SUA Server
123
Default Server IP Address
123
Port Forwarding: Services and Port Numbers
123
Table 27 Services and Port Numbers
123
Configuring Servers Behind SUA (Example)
124
Selecting the NAT Mode
124
Figure 42 Multiple Servers Behind NAT Example
124
Configuring SUA Server
125
Figure 43 NAT Mode
125
Table 28 NAT Mode
125
Figure 44 Edit SUA/NAT Server Set
126
Table 29 Edit SUA/NAT Server Set
126
Configuring Address Mapping
127
Figure 45 Address Mapping Rules
127
Table 30 Address Mapping Rules
127
Editing an Address Mapping Rule
128
Figure 46 Address Mapping Rule Edit
128
Table 31 Address Mapping Rule Edit
129
Chapter 9 Introduction to Voip
131
Sip
131
SIP Identities
131
SIP Number
131
SIP Service Domain
132
SIP Call Progression
132
SIP Servers
132
Table 32 SIP Call Progression
132
Figure 47 SIP User Agent Server
133
SIP Proxy Server
133
SIP User Agent Server
133
Figure 48 SIP Proxy Server
134
SIP Redirect Server
134
SIP Register Server
135
Rtp
135
Sip Alg
135
Pulse Code Modulation
135
Figure 49 SIP Redirect Server
135
Voice Coding
136
136
136
PSTN Call Setup Signaling
136
Chapter 10 Voice Screens
137
Voice Screens Introduction
137
SIP Settings Configuration
137
Figure 50 SIP Settings
137
Advanced Voice Settings Configuration
138
Table 33 SIP Settings
138
Figure 51 Voice Advanced Setup
139
Table 34 Voice Advanced Setup
139
Quality of Service (Qos)
140
Type of Service (Tos)
140
Diffserv
141
DSCP and Per-Hop Behavior
141
Vlan
141
Qos Configuration
141
Figure 52 Diffserv: Differentiated Service Field
141
Phone
142
Figure 53 Qos
142
Table 35 Qos
142
Comfort Noise Generation
143
Echo Cancellation
143
Voice Activity Detection/Silence Suppression
143
Phone Configuration
143
Figure 54 Phone
143
Speed Dial
144
Peer-To-Peer Calls
144
Table 36 Phone
144
Speed Dial Configuration
145
Figure 55 Speed Dial
145
Table 37 Speed Dial
145
Lifeline (Prestige 2602HW-L)
146
Lifeline Configuration (Prestige 2602HW-L)
146
Common Phone Port Configuration
147
Figure 56 Lifeline
147
Table 38 Lifeline
147
Figure 57 Phone Port Common
148
Table 39 Phone Port Common
148
Chapter 11 Dynamic DNS Setup
149
Dynamic DNS
149
DYNDNS Wildcard
149
Configuring Dynamic DNS
149
Figure 58 Dynamic DNS
150
Table 40 Dynamic DNS
150
Chapter 12 Time and Date
151
Pre-Defined NTP Time Servers List
151
Configuring Time and Date
151
Table 41 Pre-Defined NTP Time Servers
151
Figure 59 Time and Date
152
Table 42 Time and Date
152
Chapter 13 Firewalls
155
Firewall Overview
155
Types of Firewalls
155
Packet Filtering Firewalls
155
Application-Level Firewalls
155
Stateful Inspection Firewalls
156
Introduction to Zyxel's Firewall
156
Denial of Service Attacks
157
Denial of Service
157
Basics
157
Figure 60 Prestige Firewall Application
157
Types of Dos Attacks
158
Table 43 Common IP Ports
158
Figure 61 Three-Way Handshake
159
Figure 62 SYN Flood
159
Figure 63 Smurf Attack
160
ICMP Vulnerability
160
Illegal Commands (Netbios and SMTP)
160
Table 44 ICMP Commands that Trigger Alerts
160
Table 45 Legal Netbios Commands
160
Traceroute
161
Stateful Inspection
161
Table 46 Legal SMTP Commands
161
Figure 64 Stateful Inspection
162
Stateful Inspection Process
162
Stateful Inspection and the Prestige
163
TCP Security
163
UDP/ICMP Security
164
Upper Layer Protocols
164
Guidelines for Enhancing Security with Your Firewall
164
Security in General
165
Packet Filtering Vs Firewall
166
Packet Filtering
166
When to Use Filtering
166
Firewall
166
When to Use the Firewall
166
Firewall Configuration
169
Access Methods
169
Firewall Policies Overview
169
Chapter 14 Firewall Configuration
169
Rule Logic Overview
170
Rule Checklist
170
Security Ramifications
170
Key Fields for Configuring Rules
171
Action
171
Service
171
Source Address
171
Destination Address
171
Connection Direction Example
171
LAN to WAN Rules
172
WAN to LAN Rules
172
Figure 65 LAN to WAN Traffic
172
Figure 66 WAN to LAN Traffic
172
Alerts
173
Configuring Basic Firewall Settings
173
Figure 67 Firewall: Default Policy
173
Table 47 Firewall: Default Policy
173
Rule Summary
174
Figure 68 Firewall: Rule Summary
175
Table 48 Rule Summary
175
Configuring Firewall Rules
176
Figure 69 Firewall: Edit Rule
177
Table 49 Firewall: Edit Rule
178
Customized Services
179
Creating/Editing a Customized Service
179
Figure 70 Firewall: Customized Services
179
Table 50 Customized Services
179
Example Firewall Rule
180
Figure 71 Firewall: Configure Customized Services
180
Table 51 Firewall: Configure Customized Services
180
Figure 72 Firewall Example: Rule Summary
181
Figure 73 Firewall Example: Edit Rule: Destination Address
182
Figure 74 Edit Custom Port Example
182
Figure 75 Firewall Example: Edit Rule: Select Customized Services
183
Predefined Services
184
Figure 76 Firewall Example: Rule Summary: My Service
184
Table 52 Predefined Services
184
Anti-Probing
186
DOS Thresholds
187
Figure 77 Firewall: Anti Probing
187
Table 53 Firewall: Anti Probing
187
Half-Open Sessions
188
TCP Maximum Incomplete and Blocking Time
188
Figure 78 Firewall: Threshold
189
Table 54 Firewall: Threshold
189
Threshold Values
188
Chapter 15 Content Filtering
191
Content Filtering Overview
191
Configuring Keyword Blocking
191
Configuring the Schedule
192
Figure 79 Content Filter: Keyword
192
Table 55 Content Filter: Keyword
192
Configuring Trusted Computers
193
Figure 80 Content Filter: Schedule
193
Table 56 Content Filter: Schedule
193
Figure 81 Content Filter: Trusted
194
Table 57 Content Filter: Trusted
194
Chapter 16 Introduction to Ipsec
195
VPN Overview
195
Ipsec
195
Security Association
195
Other Terminology
195
Encryption
195
Data Confidentiality
196
Data Integrity
196
Data Origin Authentication
196
VPN Applications
196
Figure 82 Encryption and Decryption
196
Ipsec Architecture
197
Ipsec Algorithms
197
Key Management
197
Encapsulation
197
Figure 83 Ipsec Architecture
197
Transport Mode
198
Tunnel Mode
198
Ipsec and NAT
198
Figure 84 Transport and Tunnel Mode Ipsec Encapsulation
198
Table 58 VPN and NAT
199
Chapter 17 VPN Screens
201
Vpn/Ipsec Overview
201
Ipsec Algorithms
201
AH (Authentication Header) Protocol
201
ESP (Encapsulating Security Payload) Protocol
202
My IP Address
202
Table 59 AH and ESP
202
Secure Gateway Address
203
Dynamic Secure Gateway Address
203
VPN Summary Screen
203
Figure 85 Ipsec Summary Fields
203
Figure 86 VPN Summary
204
Table 60 VPN Summary
204
Keep Alive
205
Remote DNS Server
205
NAT Traversal
206
Figure 87 VPN Host Using Intranet DNS Server Example
206
Figure 88 NAT Router between Ipsec Routers
206
NAT Traversal Configuration
207
ID Type and Content
207
ID Type and Content Examples
208
Table 61 Local ID Type and Content Fields
208
Table 62 Peer ID Type and Content Fields
208
Table 63 Matching ID Type and Content Configuration Example
208
Pre-Shared Key
209
Editing VPN Policies
209
Table 64 Mismatching ID Type and Content Configuration Example
209
Figure 89 VPN IKE
210
Table 65 VPN IKE
211
IKE Phases
214
Figure 90 Two Phases to Set up the Ipsec SA
215
Diffie-Hellman (DH) Key Groups
216
Negotiation Mode
216
Perfect Forward Secrecy (PFS)
216
Configuring Advanced IKE Settings
216
Figure 91 VPN IKE: Advanced Setup
217
Table 66 VPN IKE: Advanced Setup
217
Manual Key Setup
219
Security Parameter Index (SPI)
219
Configuring Manual Key
220
Figure 92 VPN: Manual Key
220
Table 67 VPN: Manual Key
221
Viewing SA Monitor
223
Figure 93 VPN: SA Monitor
224
Table 68 VPN: SA Monitor
224
Configuring Global Setting
225
Telecommuter Vpn/Ipsec Examples
225
Telecommuters Sharing One VPN Rule Example
225
Figure 94 VPN: Global Setting
225
Table 69 VPN: Global Setting
225
Telecommuters Using Unique VPN Rules Example
226
Figure 95 Telecommuters Sharing One VPN Rule Example
226
Table 70 Telecommuters Sharing One VPN Rule Example
226
Figure 96 Telecommuters Using Unique VPN Rules Example
227
Table 71 Telecommuters Using Unique VPN Rules Example
227
VPN and Remote Management
228
Chapter 18 Remote Management Configuration
229
Remote Management Overview
229
Remote Management Limitations
229
Remote Management and NAT
230
System Timeout
230
Telnet
230
Ftp
230
Figure 97 Telnet Configuration on a TCP/IP Network
230
Web
231
Configuring Remote Management
231
Figure 98 Remote Management
231
Table 72 Remote Management
231
Chapter 19 Universal Plug-And-Play (Upnp)
233
Introducing Universal Plug and Play
233
How Do I Know if I'M Using Upnp
233
NAT Traversal
233
Cautions with Upnp
233
Upnp and Zyxel
234
Configuring Upnp
234
Figure 99 Configuring Upnp
234
Installing Upnp in Windows Example
235
Table 73 Configuring Upnp
235
Figure 100 Add/Remove Programs: Windows Setup: Communication
236
Figure 101 Add/Remove Programs: Windows Setup: Communication: Components
236
Figure 102 Network Connections
237
Figure 103 Windows Optional Networking Components Wizard
238
Using Upnp in Windows XP Example
239
Figure 104 Networking Services
239
Figure 105 Network Connections
240
Figure 106 Internet Connection Properties
241
Figure 107 Internet Connection Properties: Advanced Settings
242
Figure 108 Internet Connection Properties: Advanced Settings: Add
242
Figure 109 System Tray Icon
243
Figure 110 Internet Connection Status
243
Figure 111 Network Connections
244
Figure 112 Network Connections: My Network Places
245
Figure 113 Network Connections: My Network Places: Properties: Example
245
Chapter 20 Logs Screens
247
Logs Overview
247
Alerts and Logs
247
Configuring Log Settings
247
Figure 114 Log Settings
248
Table 74 Log Settings
249
Displaying the Logs
250
SMTP Error Messages
250
Figure 115 View Logs
250
Table 75 View Logs
250
Example E-Mail Log
251
Table 76 SMTP Error Messages
251
Figure 116 E-Mail Log Example
252
Chapter 21 Maintenance
253
Maintenance Overview
253
System Status Screen
253
Figure 117 System Status
254
Table 77 System Status
255
Figure 118 System Status: Show Statistics
256
System Statistics
256
Table 78 System Status: Show Statistics
256
DHCP Table Screen
257
Any IP Table Screen
258
Figure 119 DHCP Table
258
Figure 120 any IP Table
258
Table 79 DHCP Table
258
Table 80 any IP Table
258
Wireless Screen
259
Association List
259
Figure 121 Association List
259
Table 81 Association List
259
Diagnostic Screens
260
Diagnostic General Screen
260
Diagnostic DSL Line Screen
260
Figure 122 Diagnostic: General
260
Table 82 Diagnostic: General
260
Figure 123 Diagnostic: DSL Line
261
Table 83 Diagnostic: DSL Line
261
Firmware Screen
262
Figure 124 Firmware Upgrade
262
Table 84 Firmware Upgrade
262
Figure 125 Network Temporarily Disconnected
263
Figure 126 Error Message
263
Chapter 22 Introducing the SMT
265
Introduction to the SMT
265
Accessing the SMT Via the Console Port
265
Initial Screen
265
Entering the Password
266
Procedure for SMT Configuration Via Telnet
266
Figure 127 Initial Screen
266
Figure 128 Password Screen
266
Entering Password
267
Navigating the SMT Interface
267
Figure 129 Login Screen
267
Table 85 Navigating the SMT Interface
267
System Management Terminal Interface Summary
268
Table 86 SMT Main Menu
268
Table 87 Main Menu Summary
268
SMT Menus Overview
269
Table 88 SMT Menus Overview
269
Changing the System Password
270
Figure 130 Menu 23.1 Change Password
271
Chapter 23 Menu 1 General Setup
273
General Setup
273
Procedure to Configure Menu 1
273
Procedure to Configure Dynamic DNS
274
Figure 131 Menu 1 General Setup
274
Table 89 Menu 1 General Setup
274
Figure 132 Menu 1.1 Configure Dynamic DNS
275
Table 90 Menu 1.1 Configure Dynamic DNS
275
Chapter 24 Menu 2 WAN Backup Setup
277
Introduction to WAN Backup Setup
277
Configuring WAN Backup in Menu 2
277
Figure 133 Menu 2 WAN Backup Setup
277
Table 91 Menu 2 WAN Backup Setup
277
Figure 134 Menu 2.1Traffic Redirect Setup
278
Table 92 Menu 2.1Traffic Redirect Setup
278
Traffic Redirect Setup
278
Chapter 25 Menu 3 LAN Setup
281
LAN Setup
281
General Ethernet Setup
281
Protocol Dependent Ethernet Setup
281
Figure 135 Menu 3 LAN Setup
281
Figure 136 Menu 3.1 LAN Port Filter Setup
281
TCP/IP Ethernet Setup and DHCP
282
Figure 137 Menu 3.2 TCP/IP and DHCP Ethernet Setup
282
Table 93 DHCP Ethernet Setup
282
Table 94 TCP/IP Ethernet Setup
283
Chapter 26 Wireless LAN Setup
285
Wireless LAN Overview
285
Wireless LAN Setup
285
Figure 138 Menu 3.5 - Wireless LAN Setup
285
Table 95 Menu 3.5 - Wireless LAN Setup
285
Wireless LAN MAC Address Filter
286
Figure 139 Menu 3.5.1 WLAN MAC Address Filtering
287
Table 96 Menu 3.5.1 WLAN MAC Address Filtering
287
Chapter 27 Internet Access
289
Internet Access Overview
289
IP Policies
289
IP Alias
289
IP Alias Setup
290
Figure 140 IP Alias Network Example
290
Figure 141 Menu 3.2 TCP/IP and DHCP Setup
290
Route IP Setup
291
Figure 142 Menu 3.2.1 IP Alias Setup
291
Table 97 Menu 3.2.1 IP Alias Setup
291
Internet Access Configuration
292
Figure 143 Menu 1 General Setup
292
Figure 144 Menu 4 Internet Access Setup
292
Table 98 Menu 4 Internet Access Setup
293
Chapter 28 Remote Node Configuration
295
Remote Node Setup Overview
295
Remote Node Setup
295
Remote Node Profile
295
Encapsulation and Multiplexing Scenarios
296
Scenario 1: One VC, Multiple Protocols
296
Scenario 2: One VC, One Protocol (IP)
296
Scenario 3: Multiple Vcs
296
Figure 145 Menu 11 Remote Node Setup
296
Figure 146 Menu 11.1 Remote Node Profile
297
Table 99 Menu 11.1 Remote Node Profile
297
Outgoing Authentication Protocol
298
Remote Node Network Layer Options
299
Figure 147 Menu 11.3 Remote Node Network Layer Options
299
Table 100 Menu 11.3 Remote Node Network Layer Options
299
My WAN Addr Sample IP Addresses
300
Remote Node Filter
301
Figure 148 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
301
Editing ATM Layer Options
302
VC-Based Multiplexing (Non-PPP Encapsulation)
302
Figure 149 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
302
Figure 150 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
302
LLC-Based Multiplexing or PPP Encapsulation
303
Advance Setup Options
303
Figure 151 Menu 11.6 for VC-Based Multiplexing
303
Figure 152 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
303
Figure 153 Menu 11.1 Remote Node Profile
304
Figure 154 Menu 11.8 Advance Setup Options
304
Table 101 Menu 11.8 Advance Setup Options
304
Chapter 29 Static Route Setup
305
IP Static Route Overview
305
Configuration
305
Figure 155 Sample Static Routing Topology
305
Figure 156 Menu 12 Static Route Setup
306
Figure 157 Menu 12.1 IP Static Route Setup
306
Figure 158 Menu12.1.1 Edit IP Static Route
306
Table 102 Menu12.1.1 Edit IP Static Route
307
Chapter 30 Bridging Setup
309
Bridging in General
309
Bridge Ethernet Setup
309
Remote Node Bridging Setup
309
Figure 159 Menu 11.1 Remote Node Profile
310
Figure 160 Menu 11.3 Remote Node Network Layer Options
310
Table 103 Remote Node Network Layer Options: Bridge Fields
310
Bridge Static Route Setup
311
Figure 161 Menu 12.3.1 Edit Bridge Static Route
311
Table 104 Menu 12.3.1 Edit Bridge Static Route
311
Network Address Translation (NAT)
313
Chapter 31 Network Address Translation (NAT)
313
Using NAT
313
SUA (Single User Account) Versus NAT
313
Applying NAT
313
Figure 162 Menu 4 Applying NAT for Internet Access
314
Figure 163 Applying NAT in Menus 4 & 11.3
314
NAT Setup
315
Address Mapping Sets
315
Figure 164 Menu 15 NAT Setup
315
Table 105 Applying NAT in Menus 4 & 11.3
315
Figure 165 Menu 15.1 Address Mapping Sets
316
Figure 166 Menu 15.1.255 SUA Address Mapping Rules
316
SUA Address Mapping Set
316
Table 106 SUA Address Mapping Rules
316
Figure 167 Menu 15.1.1 First Set
317
User-Defined Address Mapping Sets
317
Ordering Your Rules
318
Table 107 Menu 15.1.1 First Set
318
Configuring a Server Behind NAT
319
Figure 168 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
319
Table 108 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
319
Figure 169 Menu 15.2 NAT Server Setup
320
Figure 170 Menu 15.2 NAT Server Setup
320
General NAT Examples
321
Example 1: Internet Access Only
321
Figure 171 Multiple Servers Behind NAT Example
321
Figure 172 NAT Example 1
321
Example 2: Internet Access with an Inside Server
322
Figure 173 Menu 4 Internet Access & NAT Example
322
Figure 174 NAT Example 2
322
Example 3: Multiple Public IP Addresses with Inside Servers
323
Figure 175 Menu 15.2.1 Specifying an Inside Server
323
Figure 176 NAT Example 3
324
Figure 177 Example 3: Menu 11.3
324
Figure 178 Example 3: Menu 15.1.1.1
325
Figure 179 Example 3: Final Menu 15.1.1
325
Example 4: NAT Unfriendly Application Programs
326
Figure 180 Example 3: Menu 15.2
326
Figure 181 NAT Example 4
326
Figure 182 Example 4: Menu 15.1.1.1 Address Mapping Rule
327
Figure 183 Example 4: Menu 15.1.1 Address Mapping Rules
327
Chapter 32 Enabling the Firewall
329
Remote Management and the Firewall
329
Access Methods
329
Enabling the Firewall
329
Figure 184 Menu 21.2 Firewall Setup
330
Chapter 33 Filter Configuration
331
About Filtering
331
Figure 185 Outgoing Packet Filtering Process
331
Figure 186 Filter Rule Process
332
The Filter Structure of the Prestige
332
Configuring a Filter Set for the Prestige
333
Figure 187 Menu 21 Filter Set Configuration
333
Figure 188 Netbios_Wan Filter Rules Summary
333
Filter Rules Summary Menus
334
Figure 189 Netbios_Lan Filter Rules Summary
334
Figure 190 IGMP Filter Rules Summary
334
Table 109 Abbreviations Used in the Filter Rules Summary Menu
334
Configuring a Filter Rule
335
Table 110 Rule Abbreviations Used
335
Figure 191 Menu 21.1.X.1 TCP/IP Filter Rule
336
Table 111 Menu 21.1.X.1 TCP/IP Filter Rule
336
TCP/IP Filter Rule
336
Figure 192 Executing an IP Filter
338
Generic Filter Rule
338
Figure 193 Menu 21.1.5.1 Generic Filter Rule
339
Table 112 Menu 21.1.5.1 Generic Filter Rule
339
Filter Types and NAT
340
Example Filter
340
Figure 194 Protocol and Device Filter Sets
340
Figure 195 Sample Telnet Filter
341
Figure 196 Menu 21.1.6.1 Sample Filter
341
Applying Filters and Factory Defaults
342
Figure 197 Menu 21.1.6.1 Sample Filter Rules Summary
342
Table 113 Filter Sets Table
342
Ethernet Traffic
343
Figure 198 Filtering Ethernet Traffic
343
Figure 199 Filtering Remote Node Traffic
343
Remote Node Filters
343
Chapter 34 SNMP Configuration
345
About SNMP
345
Figure 200 SNMP Management Model
345
Supported Mibs
346
SNMP Configuration
346
SNMP Traps
347
Figure 201 Menu 22 SNMP Configuration
347
Table 114 Menu 22 SNMP Configuration
347
Table 115 SNMP Traps
347
Table 116 Ports and Permanent Virtual Circuits
348
Chapter 35 System Security
349
System Security
349
System Password
349
Configuring External RADIUS Server
349
Figure 202 Menu 23 - System Security
349
Figure 203 Menu 23 System Security
349
Figure 204 Menu 23.2 System Security: RADIUS Server
350
Table 117 Menu 23.2 System Security: RADIUS Server
350
Ieee802.1X
351
Figure 205 Menu 23 System Security
351
Figure 206 Menu 23.4 System Security: Ieee802.1X
351
Table 118 Menu 23.4 System Security: Ieee802.1X
352
Creating User Accounts on the Prestige
353
Figure 207 Menu 14 Dial-In User Setup
354
Figure 208 Menu 14.1 Edit Dial-In User
354
Table 119 Menu 14.1 Edit Dial-In User
354
Chapter 36 System Information and Diagnosis
355
Overview
355
System Status
355
Figure 209 Menu 24 System Maintenance
355
Figure 210 Menu 24.1 System Maintenance : Status
356
Table 120 Menu 24.1 System Maintenance: Status
356
System Information
357
Figure 211 Menu 24.2 System Information and Console Port Speed
357
Console Port Speed
358
Figure 212 Menu 24.2.1 System Maintenance: Information
358
Table 121 Menu 24.2.1 System Maintenance: Information
358
Log and Trace
359
Viewing Error Log
359
Figure 213 Menu 24.2.2 System Maintenance : Change Console Port Speed
359
Figure 214 Menu 24.3 System Maintenance: Log and Trace
359
Syslog and Accounting
360
Figure 215 Sample Error and Information Messages
360
Figure 216 Menu 24.3.2 System Maintenance: Syslog and Accounting
360
Table 122 Menu 24.3.2 System Maintenance : Syslog and Accounting
360
Figure 217 Syslog Example
361
Diagnostic
362
Figure 218 Menu 24.4 System Maintenance : Diagnostic
362
Table 123 Menu 24.4 System Maintenance Menu: Diagnostic
363
Chapter 37 Firmware and Configuration File Maintenance
365
Filename Conventions
365
Backup Configuration
366
Table 124 Filename Conventions
366
Example of FTP Commands from the Command Line
367
Figure 219 Telnet in Menu 24.5
367
Using the FTP Command from the Command Line
367
Figure 220 FTP Session Example
368
GUI-Based FTP Clients
368
Table 125 General Commands for GUI-Based FTP Clients
368
TFTP and FTP over WAN Management Limitations
368
Backup Configuration Using TFTP
369
GUI-Based TFTP Clients
369
TFTP Command Example
369
Backup Via Console Port
370
Figure 221 System Maintenance: Backup Configuration
370
Figure 222 System Maintenance: Starting Xmodem Download Screen
370
Table 126 General Commands for GUI-Based TFTP Clients
370
Restore Configuration
371
Restore Using FTP
371
Figure 223 Backup Configuration Example
371
Figure 224 Successful Backup Confirmation Screen
371
Restore Using FTP Session Example
372
Figure 225 Telnet into Menu 24.6
372
Figure 226 Restore Using FTP Session Example
372
Restore Via Console Port
373
Figure 227 System Maintenance: Restore Configuration
373
Figure 228 System Maintenance: Starting Xmodem Download Screen
373
Figure 229 Restore Configuration Example
373
Uploading Firmware and Configuration Files
374
Firmware File Upload
374
Configuration File Upload
374
Figure 230 Successful Restoration Confirmation Screen
374
Figure 231 Telnet into Menu 24.7.1 Upload System Firmware
374
FTP File Upload Command from the DOS Prompt Example
375
Figure 232 Telnet into Menu 24.7.2 System Maintenance
375
FTP Session Example of Firmware File Upload
376
TFTP File Upload
376
Figure 233 FTP Session Example of Firmware File Upload
376
TFTP Upload Command Example
377
Uploading Via Console Port
377
Uploading Firmware File Via Console Port
377
Figure 234 Menu 24.7.1 as Seen Using the Console Port
377
Example Xmodem Firmware Upload Using Hyperterminal
378
Uploading Configuration File Via Console Port
378
Figure 235 Example Xmodem Upload
378
Figure 236 Menu 24.7.2 as Seen Using the Console Port
378
Example Xmodem Configuration Upload Using Hyperterminal
379
Figure 237 Example Xmodem Upload
379
Chapter 38 System Maintenance
381
Command Interpreter Mode
381
Figure 238 Command Mode in Menu 24
381
Figure 239 Valid Commands
381
Call Control Support
382
Budget Management
382
Figure 240 Menu 24.9 System Maintenance: Call Control
382
Figure 241 Menu 24.9.1 System Maintenance: Budget Management
382
Time and Date Setting
383
Figure 242 Menu 24 System Maintenance
383
Table 127 Menu 24.9.1 System Maintenance: Budget Management
383
Figure 243 Menu 24.10 System Maintenance: Time and Date Setting
384
Resetting the Time
384
Table 128 Menu 24.10 System Maintenance: Time and Date Setting
384
Chapter 39 Remote Management
387
Remote Management Overview
387
Remote Management
387
Remote Management Setup
387
Remote Management Limitations
388
Figure 244 Menu 24.11 Remote Management Control
388
Table 129 Menu 24.11 Remote Management Control
388
Remote Management and NAT
389
System Timeout
389
Advertisement
ZyXEL Communications PRESTIGE 2602HWI Quick Start Manual (46 pages)
ADSL VoIP IAD with 802.11g Wireless
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 2.18 MB
Table of Contents
Quick Start Guide
1
Table of Contents
2
1 Introducing the Prestige
3
Required Information
3
2 Hardware
4
Safety Warnings
4
Rear Panel Connections
5
Prestige 2602HWL
7
Front Panel Leds
9
3 Internet Access with Zero Configration
11
4 Setting up Your Computer's IP Address
11
Windows 95/98/Me
12
Windows 2000/NT/XP
14
Checking/Updating Your Computer's IP Address
16
Testing the Connection to the Prestige
16
5 Configuring Your Prestige
17
Accessing Your Prestige Via Web Configurator
17
Common Screen Command Buttons
19
Using the Wizard for Initial Configuration
19
Test Your Internet Connection
26
6 Advanced Configuration
26
Wireless LAN Setup
26
Wireless LAN Security Setup
29
802.1X and WPA Overview
31
Network Address Translation Overview
31
Configuring SUA Server
32
Firewall Overview
34
Enabling the Firewall with Default Policy
35
Procedure for Configuring Firewall Rules
36
Speed Dial Configuration
42
Lifeline Configuration (Prestige 2602HWL)
43
7 Making Phone Calls
44
Voip Calls
44
Making Regular Calls (Prestige 2602HWL)
44
8 Troubleshooting
45
Table 9 Troubleshooting
46
Advertisement
Related Products
ZyXEL Communications Prestige 2602HW-C Series
ZyXEL Communications Prestige 2602HW Series
ZyXEL Communications PRESTIGE 2602HWL -
ZyXEL Communications Prestige 2602R Series
ZyXEL Communications Prestige 2602H-6xC
ZyXEL Communications Prestige 2602HWL-D3A
ZyXEL Communications Prestige 2602HWL-C Series
ZyXEL Communications Prestige 2602R-D1A
ZyXEL Communications Prestige 2602HL Series
ZyXEL Communications ISDN 202H Plus
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL