Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
PRESTIGE 335
ZyXEL Communications PRESTIGE 335 Manuals
Manuals and User Guides for ZyXEL Communications PRESTIGE 335. We have
1
ZyXEL Communications PRESTIGE 335 manual available for free PDF download: User Manual
ZyXEL Communications PRESTIGE 335 User Manual (493 pages)
Firewall Router with Print Server, 802.11g Wireless Firewall Router with Print Server
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 19 MB
Table of Contents
Copyright
3
Federal Communications Commission (FCC) Interference Statement
4
Safety Warnings
6
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
9
Preface
37
Related Documentation
37
Chapter 1 Getting to Know Your Prestige
41
Prestige Internet Security Gateway Overview
41
Prestige Features
41
Physical Features
41
USB Port
41
OTIST Button (P-335WT Only)
41
10/100M Auto-Negotiating Ethernet/Fast Ethernet Interface(S)
41
Auto-Crossover 10/100 Mbps Ethernet Interface(S)
42
4-Port Switch
42
Time and Date
42
Reset Button
42
Non-Physical Features
42
Print Server
42
OTIST (P-335WT Only)
42
Media Bandwidth Management
42
Trend Micro Security Services
42
Ipsec VPN Capability
43
Firewall
43
IEEE 802.1X Network Security (P-335WT Only)
43
Content Filtering
43
Brute-Force Password Guessing Protection
43
Wireless LAN Standard (P-335WT Only)
43
Wireless LAN Standard (P-335WT Only)
44
Packet Filtering
44
Universal Plug and Play (Upnp)
44
Call Scheduling
44
Pppoe
44
Table 1 IEEE 802.11B
44
Table 2 IEEE 802.11G
44
PPTP Encapsulation
45
Dynamic DNS Support
45
IP Multicast
45
IP Alias
45
Snmp
45
Network Address Translation (NAT)
45
Traffic Redirect
45
Port Forwarding
46
DHCP (Dynamic Host Configuration Protocol)
46
Any IP
46
Full Network Management
46
Roadrunner Support
46
Logging and Tracing
46
Upgrade Prestige Firmware Via LAN
46
Embedded FTP and TFTP Servers
46
Wireless Association List (P-335WT Only)
47
Wireless LAN Channel Usage (P-335WT Only)
47
Applications for the Prestige
47
Print Server Application
47
Secure Broadband Internet Access Via Cable or DSL Modem
47
Figure 1 Prestige Print Server Application
47
VPN Application
48
Wireless LAN Application (P-335WT Only)
48
Figure 2 Secure Internet Access Via Cable, DSL or Wireless Modem
48
Figure 3 VPN Application
48
Figure 4 Internet Access Application Example
49
Chapter 2 Introducing the Web Configurator
51
Web Configurator Overview
51
Accessing the Prestige Web Configurator
51
Resetting the Prestige
52
Procedure to Use the Reset Button
52
Navigating the Prestige Web Configurator
52
Figure 5 Change Password Screen
52
Navigation Panel
53
Figure 6 the MAIN MENU Screen of the Web Configurator
53
Table 3 Screens Summary
54
Chapter 3 Wizard Setup
57
Wizard Setup Overview
57
Wizard Setup: General Setup and System Name
57
Domain Name
57
Wizard Setup: Wireless LAN (P-335WT Only)
58
Figure 7 Wizard Setup : General
58
Figure 8 Wizard Setup : Wireless LAN
58
Table 4 Wizard Setup : Wireless LAN
58
Wizard Setup : Wireless LAN : Basic Security
59
Figure 9 Wizard Setup : Wireless LAN : Basic Security
60
Table 5 Wizard Setup : Wireless LAN Setup : Basic Security
60
Wizard Setup : Wireless LAN : Extended Security
61
Wizard Setup : Wireless LAN : OTIST (P-335WT Only)
61
Figure 10 Wizard Setup : Wireless LAN : Extended Security
61
Table 6 Wizard Setup : Wireless LAN : Extended Security
61
Figure 11 Wizard Setup : Wireless LAN : OTIST
62
Table 7 Wizard Setup : Wireless LAN : OTIST
62
Wizard Setup : Internet Access
63
Ethernet
63
Figure 12 Wizard Setup : Internet Access : Ethernet Encapsulation
63
Table 8 Wizard Setup : Internet Access : Ethernet Encapsulation
63
Pppoe Encapsulation
64
PPTP Encapsulation
65
Figure 13 Wizard Setup : Internet Access : Pppoe Encapsulation
65
Table 9 Wizard Setup : Internet Access : Pppoe Encapsulation
65
Figure 14 Wizard Setup : Internet Access : PPTP Encapsulation
66
Table 10 Wizard Setup : Internet Access : PPTP Encapsulation
66
Wizard Setup : WAN
67
WAN IP Address Assignment
67
IP Address and Subnet Mask
67
Table 11 Private IP Address Ranges
67
DNS Server Address Assignment
68
WAN MAC Address
68
Figure 15 Wizard Setup : WAN
69
Table 12 Example of Network Properties for LAN Servers with Fixed IP Addresses
69
Table 13 Wizard Setup : WAN
69
Figure 16 Wizard Setup : WAN IP and DNS Server Address Assignment
70
Table 14 Wizard Setup : WAN IP and DNS Server Address Assignment
70
Wizard Setup : Complete
71
Figure 17 Wizard Setup : WAN MAC Address
71
Table 15 Wizard Setup : WAN MAC Address
71
Figure 18 Wizard Setup : Complete
72
Chapter 4 Media Bandwidth Management Setup
73
Media Bandwidth Management Setup Overview
73
Media Bandwidth Management Setup : Services
74
Figure 19 Media Bandwidth Management Setup
74
Table 16 Media Bandwidth Management Setup
74
Media Bandwidth Management Setup : Service Priority
75
Figure 20 Media Bandwidth Management Setup : Services
75
Table 17 Media Bandwidth Management Setup : Services
75
Media Bandwidth Management Setup Complete
76
Figure 21 Media Bandwidth Management Setup : Service Priority
76
Figure 22 Media Bandwidth Management Setup : Complete
76
Table 18 Media Bandwidth Management Setup : Service Priority
76
Chapter 5 System Screens
77
System Overview
77
Configuring General Setup
77
Figure 23 System General Setup
78
Table 19 System General Setup
78
Dynamic DNS
79
Dyndns Wildcard
79
Configuring Dynamic DNS
79
Figure 24 DDNS
80
Table 20 DDNS
80
Configuring Password
81
Configuring Time Setting
81
Figure 25 Password
81
Table 21 Password
81
Figure 26 Time Setting
82
Table 22 Time Setting
82
Chapter 6 LAN Screens
85
LAN Overview
85
DHCP Setup
85
IP Pool Setup
85
System DNS Servers
85
Lan Tcp/Ip
85
Factory LAN Defaults
85
IP Address and Subnet Mask
86
RIP Setup
86
Multicast
86
Any IP
87
Figure 27 any IP Example Application
87
How any IP Works
88
Configuring IP
88
Figure 28 LAN IP
89
Table 23 LAN IP
89
Configuring Static DHCP
91
Configuring IP Alias
92
Figure 29 Static DHCP
92
Table 24 Static DHCP
92
Figure 30 IP Alias
93
Table 25 IP Alias
93
Chapter 7 Wireless Configuration and Roaming
95
Wireless LAN Overview
95
Ibss
95
Bss
95
Figure 31 IBSS (Ad-Hoc) Wireless LAN
95
Ess
96
Figure 32 Basic Service Set
96
Wireless LAN Basics
97
Rts/Cts
97
Figure 33 Extended Service Set
97
Fragmentation Threshold
98
Figure 34 RTS/CTS
98
Configuring Wireless
99
Figure 35 Wireless
100
Table 26 Wireless
100
Configuring Roaming
101
Requirements for Roaming
102
Figure 36 Roaming Example
102
Figure 37 Roaming
103
Table 27 Roaming
103
Wireless Security
105
Chapter 8
105
Wireless Security Overview
105
Figure 38 Prestige Wireless Security Levels
105
Figure 39 Wireless: no Security
106
Table 28 Wireless no Security
106
Security Parameters Summary
107
Table 29 Wireless Security Relational Matrix
107
WEP Overview
108
Data Encryption
108
Authentication
108
Figure 40 WEP Authentication Steps
108
Preamble Type
109
Configuring WEP Encryption
109
Figure 41 Wireless: Static WEP Encryption
110
Table 30 Wireless: Static WEP Encryption
110
Introduction to WPA
111
User Authentication
111
Encryption
112
WPA-PSK Application Example
112
Configuring WPA-PSK Authentication
113
Figure 42 WPA - PSK Authentication
113
Figure 43 Wireless: WPA-PSK
114
Table 31 Wireless: WPA-PSK
114
Wireless Client WPA Supplicants
115
Introduction to RADIUS
115
Types of RADIUS Messages
116
Access-Challenge
116
Accounting-Request
116
Accounting-Response
116
EAP Authentication Overview
116
WPA with RADIUS Application Example
117
Figure 44 EAP Authentication
117
Configuring WPA Authentication
118
Figure 45 WPA with RADIUS Application Example
118
Figure 46 Wireless: WPA
119
Table 32 Wireless: WPA
120
Overview
121
Dynamic WEP Key Exchange
121
Configuring 802.1X and Dynamic WEP Key Exchange
122
Figure 47 Wireless: 802.1X and Dynamic WEP
123
Table 33 Wireless: 802.1X and Dynamic WEP
124
Configuring 802.1X and Static WEP Key Exchange
125
Figure 48 Wireless: 802.1X and Static WEP
126
Table 34 Wireless: 802.1X and Static WEP
127
Configuring 802.1X
128
Figure 49 Wireless: 802.1X
129
Table 35 Wireless: 802.1X and no WEP
130
MAC Filter
131
Figure 50 MAC Address Filter
132
Table 36 MAC Address Filter
132
One-Touch Intelligent Security Technology
133
Prestige OTIST Configuration
133
OTIST Button
133
Web Configurator
133
Figure 51 OTIST
134
Figure 52 OTIST Start
134
Table 37 OTIST
134
Wireless Client OTIST Configuration
135
Manual
135
Figure 53 OTIST Process
135
Automatic
136
Chapter 9 WAN Screens
137
WAN Overview
137
TCP/IP Priority (Metric)
137
Configuring Route
137
Configuring WAN ISP
138
Ethernet Encapsulation
138
Figure 54 WAN: Route
138
Table 38 WAN: Route
138
Pppoe Encapsulation
139
Figure 55 Ethernet Encapsulation
139
Table 39 Ethernet Encapsulation
139
Figure 56 Pppoe Encapsulation
141
Table 40 Pppoe Encapsulation
141
PPTP Encapsulation
142
Figure 57 PPTP Encapsulation
143
Table 41 PPTP Encapsulation
143
Configuring WAN IP
144
Figure 58 WAN: IP
145
Table 42 WAN: IP
145
Configuring WAN MAC
147
Figure 59 MAC Setup
147
Traffic Redirect
148
Figure 60 Traffic Redirect WAN Setup
148
Configuring Traffic Redirect
149
Figure 61 Traffic Redirect LAN Setup
149
Figure 62 WAN: Traffic Redirect
150
Table 43 Traffic Redirect
150
Chapter 10 Network Address Translation (NAT) Screens
153
NAT Overview
153
NAT Definitions
153
Table 44 NAT Definitions
153
What NAT Does
154
How NAT Works
154
NAT Application
155
NAT Mapping Types
155
Figure 63 How NAT Works
155
Figure 64 NAT Application with IP Alias
155
Table 45 NAT Mapping Types
156
Using NAT
157
SUA (Single User Account) Versus NAT
157
SUA Server
157
Default Server IP Address
157
Port Forwarding: Services and Port Numbers
158
Table 46 Services and Port Numbers
158
Configuring Servers Behind SUA (Example)
159
Configuring SUA Server
159
Figure 65 Multiple Servers Behind NAT Example
159
Figure 66 SUA/NAT Setup
160
Table 47 SUA/NAT Setup
160
Configuring Address Mapping
161
Figure 67 Address Mapping
161
Table 48 Address Mapping
161
Configuring Address Mapping
162
Figure 68 Address Mapping Rule
163
Table 49 Address Mapping Rule
163
Trigger Port Forwarding
164
Trigger Port Forwarding Example
164
Figure 69 Trigger Port Forwarding Process: Example
164
Two Points to Remember about Trigger Ports
165
Configuring Trigger Port Forwarding
165
Figure 70 Trigger Port
166
Table 50 Trigger Port
166
Chapter 11 Static Route Screens
167
Static Route Overview
167
Configuring IP Static Route
167
Figure 71 Example of Static Routing Topology
167
Configuring Route Entry
168
Figure 72 Static Route
168
Table 51 Static Route
168
Figure 73 Static Route: Edit
169
Table 52 Static Route: Edit
169
Chapter 12 Upnp
171
Universal Plug and Play Overview
171
How Do I Know if I'M Using Upnp
171
NAT Traversal
171
Cautions with Upnp
171
Upnp and Zyxel
172
Configuring Upnp
172
Installing Upnp in Windows Example
173
Figure 74 Configuring Upnp
173
Table 53 Configuring Upnp
173
Installing Upnp in Windows Me
174
Installing Upnp in Windows XP
175
Using Upnp in Windows XP Example
176
Auto-Discover Your Upnp-Enabled Network Device
177
Web Configurator Easy Access
178
Web Configurator Easy Access
179
Chapter 13 Trend Micro Security Services
181
Trend Micro Security Service Overview
181
Configuring Service Settings
181
Figure 75 Service Settings
182
Table 54 Service Settings
182
Virus Protection
183
Configuring Virus Protection
183
Figure 76 Virus Protection
184
Table 55 Virus Protection
184
Parental Controls
185
Parental Controls Configuration
185
Figure 77 Parental Controls License Status
186
Figure 78 Parental Controls
187
Table 56 Parental Controls
187
Parental Controls Statistics
189
Figure 79 Parental Controls Statistics
190
Table 57 Parental Controls Statistics
190
Chapter 14 Firewall
191
Introduction
191
What Is a Firewall
191
Stateful Inspection Firewall
191
About the Prestige Firewall
191
Guidelines for Enhancing Security with Your Firewall
192
Firewall Settings Screen
192
Figure 80 Firewall: Settings
193
Table 58 Firewall: Settings
193
The Firewall, NAT and Remote Management
194
LAN-To-WAN Rules
194
Figure 81 Firewall Rule Directions
194
WAN-To-LAN Rules
195
Services
195
Figure 82 Firewall: Service
196
Table 59 Firewall: Service
196
Chapter 15 Content Filtering
199
Introduction to Content Filtering
199
Restrict Web Features
199
Days and Times
199
Configure Content Filtering
199
Figure 83 Content Filter
200
Table 60 Content Filter
201
Customizing Keyword Blocking URL Checking
202
Domain Name or IP Address URL Checking
202
Full Path URL Checking
202
File Name URL Checking
202
Chapter 16 Remote Management Screens
205
Remote Management Overview
205
Remote Management Limitations
205
Remote Management and NAT
206
System Timeout
206
Configuring WWW
206
Configuring Telnet
207
Figure 84 Remote Management: WWW
207
Table 61 Remote Management: WWW
207
Configuring TELNET
208
Figure 85 Telnet Configuration on a TCP/IP Network
208
Figure 86 Remote Management: Telnet
208
Table 62 Remote Management: Telnet
208
Configuring FTP
209
Figure 87 Remote Management: FTP
209
Table 63 Remote Management: FTP
209
Snmp
210
Figure 88 SNMP Management Model
210
Configuring SNMP
211
SNMP Traps
211
Supported Mibs
211
Table 64 SNMP Traps
211
Figure 89 Remote Management: SNMP
212
Table 65 Remote Management: SNMP
212
Configuring DNS
213
Figure 90 Remote Management: DNS
213
Table 66 Remote Management: DNS
213
Configuring Security
214
Figure 91 Security
214
Table 67 Security
214
Chapter 17 Introduction to Ipsec
217
VPN Overview
217
Ipsec
217
Security Association
217
Other Terminology
217
Encryption
217
Data Confidentiality
218
Data Integrity
218
Data Origin Authentication
218
VPN Applications
218
Ipsec Architecture
218
Figure 92 Encryption and Decryption
218
Ipsec Algorithms
219
Key Management
219
Encapsulation
219
Figure 93 Ipsec Architecture
219
Transport Mode
220
Tunnel Mode
220
Ipsec and NAT
220
Figure 94 Transport and Tunnel Mode Ipsec Encapsulation
220
Table 68 VPN and NAT
221
Chapter 18 VPN Screens
223
Vpn/Ipsec Overview
223
Ipsec Algorithms
223
AH (Authentication Header) Protocol
223
ESP (Encapsulating Security Payload) Protocol
223
My IP Address
224
Secure Gateway Address
224
Table 69 AH and ESP
224
Dynamic Secure Gateway Address
225
Summary Screen
225
Figure 95 Ipsec Summary Fields
225
Figure 96 VPN: Summary
226
Table 70 VPN: Summary
226
Keep Alive
227
NAT Traversal
227
NAT Traversal Configuration
227
Figure 97 NAT Router between Ipsec Routers
227
Remote DNS Server
228
Figure 98 VPN Host Using Intranet DNS Server Example
228
ID Type and Content
229
Table 71 Local ID Type and Content Fields
229
Table 72 Peer ID Type and Content Fields
229
ID Type and Content Examples
230
Pre-Shared Key
230
Figure 99 Mismatching ID Type and Content Configuration Example
230
Table 73 Matching ID Type and Content Configuration Example
230
Editing VPN Rules
231
Figure 100 VPN: Rule Setup (Basic)
231
Table 74 VPN: Rule Setup (Basic)
231
IKE Phases
234
Negotiation Mode
235
Figure 101 Two Phases to Set up the Ipsec SA
235
Diffie-Hellman (DH) Key Groups
236
Perfect Forward Secrecy (PFS)
236
Configuring Advanced IKE Settings
236
Figure 102 VPN IKE: Advanced
237
Table 75 VPN IKE: Advanced
238
Manual Key Setup
241
Security Parameter Index (SPI)
242
Configuring Manual Key
242
Figure 103 Setup: Manual
243
Table 76 Rule Setup: Manual
243
Viewing SA Monitor
245
Configuring Global Setting
246
Figure 104 SA Monitor
246
Table 77 SA Monitor
246
Telecommuter Vpn/Ipsec Examples
247
Telecommuters Sharing One VPN Rule Example
247
Figure 105 VPN: Global Setting
247
Table 78 VPN: Global Setting
247
Telecommuters Using Unique VPN Rules Example
248
Figure 106 Telecommuters Sharing One VPN Rule Example
248
Table 79 Telecommuter and Headquarters Configuration Example
248
VPN and Remote Management
249
Figure 107 Telecommuters Using Unique VPN Rules Example
249
Chapter 19 Centralized Logs
251
View Log
251
Log Settings
252
Figure 108 View Logs
252
Table 80 View Logs
252
Figure 109 Log Settings
254
Table 81 Log Settings
255
Chapter 20 Print Server
257
Print Server Overview
257
Prestige Print Server
257
Installation Requirements
257
Prestige Print Server Configuration
258
Figure 110 Configuring Print Server Screen
258
Table 82 Configuring Print Server
258
Chapter 21 Media Bandwidth Management
259
Bandwidth Management Overview
259
Application-Based Bandwidth Management Example
259
Subnet-Based Bandwidth Management Example
260
Application and Subnet-Based Bandwidth Management Example
260
Figure 111 Application-Based Bandwidth Management Example
260
Figure 112 Subnet-Based Bandwidth Management Example
260
Bandwidth Usage Example
261
Figure 113 Application and Subnet-Based Bandwidth Management Example
261
Table 83 Application and Subnet-Based Bandwidth Management Example
261
Figure 114 Bandwidth Usage Example
262
Bandwidth Management Priorities
263
Bandwidth Management Services
263
Xbox Live
263
Figure 115 Maximize Bandwidth Usage Example
263
Table 84 Media Mandwidth Management Priorities
263
Voip (SIP)
264
Ftp
264
E-Mail
264
Emule/Edonkey
264
Www
264
Services
265
Table 85 Commonly Used Services
265
Configuration Screen
266
Figure 116 Bandwidth Management Configuration
267
Editing Bandwidth Management Rules
268
Bandwidth Borrowing
268
Table 86 Bandwidth Management Configuration
268
Configuring Bandwidth Management Rules and Services
269
Figure 117 Bandwidth Management Edit
269
Table 87 Bandwidth Management Edit
269
Monitor Screen
270
Figure 118 Bandwidth Management Monitor
271
Chapter 22 Maintenance
273
Maintenance Overview
273
Status Screen
273
Figure 119 Maintenance Status
274
Table 88 Maintenance Status
274
System Statistics
275
DHCP Table Screen
275
Figure 120 Maintenance System Statistics
275
Table 89 Maintenance System Statistics
275
Any IP Table
276
Figure 121 Maintenance DHCP Table
276
Table 90 Maintenance DHCP Table
276
Association List
277
Figure 122 Maintenance any IP
277
Table 91 Maintenance any IP
277
F/W Upload Screen
278
Figure 123 Maintenance Association List
278
Table 92 Maintenance Association List
278
Figure 124 Maintenance Firmware Upload
279
Table 93 Maintenance Firmware Upload
279
Figure 125 Upload Warning
280
Figure 126 Network Temporarily Disconnected
280
Configuration Screen
281
Figure 127 Upload Error Message
281
Backup Configuration
282
Figure 128 Maintenance Configuration
282
Figure 129 Configuration Restore Successful
283
Restore Configuration
283
Table 94 Maintenance Restore Configuration
283
Back to Factory Defaults
284
Restart Screen
284
Figure 130 Temporarily Disconnected
284
Figure 131 Configuration Restore Error
284
Figure 132 System Restart
285
Chapter 23 Introducing the SMT
287
SMT Introduction
287
Procedure for SMT Configuration Via Telnet
287
Entering Password
287
Prestige SMT Menu Overview
288
Figure 133 Login Screen
288
Figure 134 SMT Menu Overview
288
Navigating the SMT Interface
289
Table 95 Main Menu Commands
289
Figure 135 SMT Main Menu
290
System Management Terminal Interface Summary
290
Table 96 Main Menu Summary
290
Changing the System Password
291
Figure 136 Menu 23: System Security
291
Figure 137 Menu 23 System Password
291
Chapter 24 Menu 1 General Setup
293
General Setup
293
Procedure to Configure Menu 1
293
Figure 138 Menu 1 General Setup
294
Table 97 Menu 1 General Setup
294
Figure 139 Menu 1.1 Configure Dynamic DNS
295
Procedure to Configure Dynamic DNS
295
Table 98 Menu 1.1 Configure Dynamic DNS
295
Chapter 25 Menu 2 WAN Setup
297
Introduction to WAN
297
WAN Setup
297
Figure 140 Menu 2 WAN Setup
297
Table 99 Menu 2 WAN Setup
297
Chapter 26 Menu 3 LAN Setup
299
LAN Setup
299
General Ethernet Setup
299
Figure 141 Menu 3 LAN Setup
299
Figure 142 Menu 3.1 LAN Port Filter Setup
299
Protocol Dependent Ethernet Setup
300
TCP/IP Ethernet Setup and DHCP
300
Figure 143 Menu 3.2 TCP/IP and DHCP Ethernet Setup
300
Table 100 DHCP Ethernet Setup Fields
300
Table 101 Menu 3.2: LAN TCP/IP Setup Fields
301
Figure 144 Physical Network & Partitioned Logical Networks
302
Figure 145 Menu 3.2.1: IP Alias Setup
302
IP Alias Setup
302
Table 102 Menu 3.2.1: IP Alias Setup
302
Wireless LAN Setup (P-335WT Only)
303
Figure 146 Menu 3.5 Wireless LAN Setup
304
Table 103 Menu 3.5 Wireless LAN Setup
304
Configuring MAC Address Filter
305
Figure 147 Menu 3.5 Wireless LAN Setup
306
Configuring Roaming on the Prestige
307
Figure 148 Menu 3.5.1 WLAN MAC Address Filter
307
Table 104 Menu 3.5.1 WLAN MAC Address Filter
307
Figure 149 Menu 3.5 Wireless LAN Setup
308
Figure 150 Menu 3.5.2 Roaming Configuration
308
Table 105 Roaming Configuration
308
Chapter 27 Internet Access
309
Introduction to Internet Access Setup
309
Ethernet Encapsulation
309
Figure 151 Menu 4 Internet Access Setup
309
Table 106 Internet Access Setup
309
Configuring the PPTP Client
311
Configuring the Pppoe Client
311
Figure 152 Internet Access Setup (PPTP)
311
Table 107 New Fields in Menu 4 (PPTP) Screen
311
Basic Setup Complete
312
Figure 153 Internet Access Setup (Pppoe)
312
Table 108 New Fields in Menu 4 (Pppoe) Screen
312
Chapter 28 Remote Node Configuration
313
Introduction to Remote Node Setup
313
Remote Node Profile Setup
313
Ethernet Encapsulation
313
Figure 154 Menu 11.1 Remote Node Profile for Ethernet Encapsulation
314
Table 109 Menu 11.1 Remote Node Profile for Ethernet Encapsulation
314
Pppoe Encapsulation
315
Outgoing Authentication Protocol
315
Figure 155 Menu 11.1 Remote Node Profile for Pppoe Encapsulation
315
Nailed-Up Connection
316
PPTP Encapsulation
316
Table 110 Fields in Menu 11.1 (Pppoe Encapsulation Specific)
316
Edit IP
317
Figure 156 Menu 11.1 Remote Node Profile for PPTP Encapsulation
317
Table 111 Menu 11.1 Remote Node Profile for PPTP Encapsulation
317
Figure 157 Menu 11.3 Remote Node Network Layer Options for Ethernet Encapsulation
318
Table 112 Remote Node Network Layer Options
318
Remote Node Filter
319
Traffic Redirect Setup
320
Figure 158 Menu 11.5: Remote Node Filter (Ethernet Encapsulation)
320
Figure 159 Menu 11.5: Remote Node Filter (Pppoe or PPTP Encapsulation)
320
Figure 160 Menu 11.6: Traffic Redirect Setup
321
Table 113 Menu 11.6: Traffic Redirect Setup
321
Chapter 29 Static Route Setup
323
IP Static Route Setup
323
Figure 161 Menu 12 IP Static Route Setup
323
Figure 162 Menu12.1 Edit IP Static Route
323
Table 114 Menu12.1 Edit IP Static Route
323
Chapter 30 Network Address Translation (NAT)
325
Using NAT
325
SUA (Single User Account) Versus NAT
325
Applying NAT
325
Figure 163 Menu 4 Applying NAT for Internet Access
326
NAT Setup
327
Figure 164 Menu 11.3 Applying NAT to the Remote Node
327
Table 115 Applying NAT in Menus 4 & 11.3
327
Address Mapping Sets
328
Figure 165 Menu 15 NAT Setup
328
Figure 166 Menu 15.1 Address Mapping Sets
328
Figure 167 Menu 15.1.255 SUA Address Mapping Rules
328
Table 116 SUA Address Mapping Rules
328
User-Defined Address Mapping Sets
329
Figure 168 Menu 15.1.1 First Set
330
Ordering Your Rules
330
Table 117 Menu 15.1.1 First Set
330
Figure 169 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
331
Table 118 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
331
Configuring a Server Behind NAT
332
Figure 170 Menu 15.2.1 NAT Server Setup
332
General NAT Examples
333
Example 1: Internet Access Only
333
Figure 171 Multiple Servers Behind NAT Example
333
Figure 172 NAT Example 1
333
Example 2: Internet Access with an Inside Server
334
Figure 173 Menu 4 Internet Access & NAT Example
334
Figure 174 NAT Example 2
334
Example 3: Multiple Public IP Addresses with Inside Servers
335
Figure 175 Menu 15.2.1 Specifying an Inside Server
335
Figure 176 NAT Example 3
336
Figure 177 NAT Example 3: Menu 11.3
336
Figure 178 Example 3: Menu 15.1.1.1
337
Figure 179 Example 3: Final Menu 15.1.1
337
Example 4: NAT Unfriendly Application Programs
338
Figure 180 Example 3: Menu 15.2
338
Figure 181 NAT Example 4
338
Configuring Trigger Port Forwarding
339
Figure 182 Example 4: Menu 15.1.1.1 Address Mapping Rule
339
Figure 183 Example 4: Menu 15.1.1 Address Mapping Rules
339
Figure 184 Menu 15.3 Trigger Port Setup
340
Table 119 Menu 15.3 Trigger Port Setup
340
Chapter 31 Enabling the Firewall
341
Remote Management and the Firewall
341
Access Methods
341
Enabling the Firewall
341
Figure 185 Menu 21.2 Firewall Setup
342
Chapter 32 Filter Configuration
343
Introduction to Filters
343
Figure 186 Outgoing Packet Filtering Process
343
Figure 187 Filter Rule Process
344
The Filter Structure of the Prestige
344
Configuring a Filter Set
345
Figure 188 Menu 21: Filter and Firewall Setup
345
Figure 189 Menu 21.1: Filter Set Configuration
345
Table 120 Abbreviations Used in the Filter Rules Summary Menu
345
Configuring a Filter Rule
346
Table 121 Rule Abbreviations Used
346
Configuring a TCP/IP Filter Rule
347
Figure 190 Menu 21.1.1.1 TCP/IP Filter Rule
347
Table 122 TCP/IP Filter Rule
347
Configuring a Generic Filter Rule
349
Figure 191 Executing an IP Filter
349
Figure 192 Menu 21.1.4.1 Generic Filter Rule
350
Table 123 Generic Filter Rule Menu Fields
350
Example Filter
351
Figure 193 Telnet Filter Example
351
Figure 194 Example Filter: Menu 21.1.3.1
352
Filter Types and NAT
353
Figure 195 Example Filter Rules Summary: Menu 21.1.3
353
Firewall Versus Filters
354
Applying a Filter
354
Applying LAN Filters
354
Figure 196 Protocol and Device Filter Sets
354
Applying Remote Node Filters
355
Figure 197 Filtering LAN Traffic
355
Figure 198 Filtering Remote Node Traffic
355
Chapter 33 SNMP Configuration
357
About SNMP
357
Figure 199 SNMP Management Model
357
Supported Mibs
358
SNMP Configuration
358
SNMP Traps
359
Figure 200 Menu 22 SNMP Configuration
359
Table 124 Menu 22 SNMP Configuration
359
Table 125 SNMP Traps
359
Table 126 Ports and Permanent Virtual Circuits
360
Chapter 34 System Security
361
System Security
361
System Password
361
Configuring External RADIUS Server
361
Figure 201 Menu 23 System Security
361
Figure 202 Menu 23 System Security
361
Figure 203 Menu 23.2 System Security : RADIUS Server
362
Table 127 Menu 23.2 System Security : RADIUS Server
362
363
363
Figure 204 Menu 23 System Security
363
Figure 205 Menu 23.4 System Security : Ieee802.1X
364
Table 128 Menu 23.4 System Security : Ieee802.1X
364
Chapter 35 System Information and Diagnosis
367
System Status
367
Figure 206 Menu 24 System Maintenance
367
Figure 207 Menu 24.1 System Maintenance : Status
368
Table 129 System Maintenance: Status Menu Fields
368
System Information
369
Figure 208 Menu 24.2 System Information and Console Port Speed
369
Figure 209 Menu 24.2.1 System Maintenance : Information
369
Table 130 Menu 24.2.1 System Maintenance : Information
369
Console Port Speed
370
Log and Trace
370
Syslog Logging
370
Figure 210 Menu 24.2.2 System Maintenance : Change Console Port Speed
370
Figure 211 Menu 24.3.2 System Maintenance : Syslog Logging
370
Table 131 Menu 24.3.2 System Maintenance : Syslog and Accounting
370
Cdr
372
Figure 212 Syslog Example
372
Filter Log
374
Packet Triggered
374
PPP Log
374
Firewall Log
375
Call-Triggering Packet
375
Diagnostic
376
Figure 213 Call-Triggering Packet Example
376
Figure 214 Menu 24.4 System Maintenance : Diagnostic
377
Figure 215 LAN & WAN DHCP
377
Table 132 System Maintenance Menu Diagnostic
377
Wan Dhcp
377
Chapter 36 Firmware and Configuration File Maintenance
379
Filename Conventions
379
Backup Configuration
380
Table 133 Filename Conventions
380
Figure 216 Telnet in Menu 24.5
381
Using the FTP Command from the Command Line
381
Example of FTP Commands from the Command Line
382
Figure 217 FTP Session Example
382
GUI-Based FTP Clients
382
Table 134 General Commands for GUI-Based FTP Clients
382
TFTP and FTP over WAN Management Limitations
382
Backup Configuration Using TFTP
383
TFTP Command Example
383
GUI-Based TFTP Clients
384
Restore Configuration
384
Restore Using FTP
384
Table 135 General Commands for GUI-Based TFTP Clients
384
Figure 218 Telnet into Menu 24.6
385
Restore Using FTP Session Example
386
Uploading Firmware and Configuration Files
386
Firmware File Upload
386
Figure 219 Restore Using FTP Session Example
386
Configuration File Upload
387
FTP File Upload Command from the DOS Prompt Example
387
Figure 220 Telnet into Menu 24.7.1 Upload System Firmware
387
Figure 221 Telnet into Menu 24.7.2 System Maintenance
387
FTP Session Example of Firmware File Upload
388
TFTP File Upload
388
Figure 222 FTP Session Example of Firmware File Upload
388
TFTP Upload Command Example
389
Chapter 37 System Maintenance
391
Command Interpreter Mode
391
Command Syntax
391
Figure 223 Command Mode in Menu 24
391
Command Usage
392
Call Control Support
392
Budget Management
392
Figure 224 Valid Commands
392
Figure 225 Menu 24.9 System Maintenance : Call Control
392
Call History
393
Figure 226 Budget Management
393
Figure 227 Menu 24.9.2 - Call History
393
Table 136 Menu 24.9.1 - Budget Management
393
Time and Date Setting
394
Figure 228 Menu 24: System Maintenance
394
Table 137 Call History Fields
394
Figure 229 Menu 24.10 System Maintenance: Time and Date Setting
395
Table 138 Time and Date Setting Fields
395
Resetting the Time
396
Chapter 38 Remote Management
397
Remote Management
397
Remote Management Limitations
398
Figure 230 Menu 24.11 - Remote Management Control
398
Table 139 Menu 24.11 - Remote Management Control
398
Chapter 39 Call Scheduling
401
Introduction to Call Scheduling
401
Figure 231 Menu 26 Schedule Setup
401
Figure 232 Menu 26.1 Schedule Set Setup
402
Table 140 Menu 26.1 Schedule Set Setup
402
Figure 233 Applying Schedule Set(S) to a Remote Node (Pppoe)
403
Chapter 40 Vpn/Ipsec Setup
405
Vpn/Ipsec Overview
405
Figure 234 VPN SMT Menu Tree
405
Ipsec Summary Screen
406
Figure 235 Menu 27 Vpn/Ipsec Setup
406
Figure 236 Menu 27
406
Table 141 Menu 27.1 Ipsec Summary
406
Figure 237 Menu 27.1.1 Ipsec Setup
409
Table 142 Menu 27.1.1 Ipsec Setup
409
IKE Setup
412
Figure 238 Menu 27.1.1.1 IKE Setup
413
Table 143 Menu 27.1.1.1 IKE Setup
413
Manual Setup
414
Active Protocol
415
Security Parameter Index (SPI)
415
Figure 239 Menu 27.1.1.2 Manual Setup
415
Table 144 Active Protocol: Encapsulation and Security Protocol
415
Table 145 Menu 27.1.1.2 Manual Setup
415
Chapter 41 SA Monitor
417
SA Monitor Overview
417
Using SA Monitor
417
Figure 240 Menu 27.2 SA Monitor
418
Table 146 Menu 27.2 SA Monitor
418
Appendix A Troubleshooting
421
Table 147 Troubleshooting
421
Table 148 Troubleshooting the Password
422
Table 149 Troubleshooting Telnet
422
Appendix Bpppoe
423
Figure 241 Single-Computer Per Router Hardware Configuration
424
Figure 242 Prestige as a Pppoe Client
424
Appendix Cpptp
425
Figure 243 Transport PPP Frames over Ethernet
425
Figure 244 PPTP Protocol Overview
426
Figure 245 Example Message Exchange between Computer and an ANT
427
Appendix D Print Server
429
Figure 246 Network Print Server Setup Wizard
430
Figure 247 Network Print Server Setup Wizard : Welcome
431
Figure 248 Network Print Server Setup Wizard : Select a Print Server
432
Figure 249 Network Print Server Setup Wizard : Change Settings
433
Figure 250 Network Print Server Setup Wizard : Select a Printer
434
Figure 251 Add Printer Help
434
Figure 252 Network Print Server Setup Wizard : Summary
435
Figure 253 Network Print Server Setup Wizard : Installation Complete
435
Figure 254
436
Figure 255 Network Print Monitor Setup : Welcome
437
Figure 256 Network Print Monitor Setup : Location
437
Figure 257 Network Print Monitor Setup : Complete
438
Figure 258 Printers Screen
438
Figure 259 Add Printer Wizard Welcome Screen
439
Figure 260 Local Printer Screen
439
Figure 261 Select Printer Port Screen
440
Figure 262 Add Standard TCP/IP Printer Port Screen
440
Figure 263 Add Port Screen
441
Figure 264 Additional Port Information Screen
441
Figure 265 Port Settings Screen
442
Figure 266 Add Standard TCP/IP Printer Port Complete
442
Figure 267 Add Printer Screen
443
Figure 268 Use Existing Driver Screen
443
Figure 269 Name Your Printer Screen
444
Figure 270 Printer Sharing Screen
444
Figure 271 Location and Comment Screen
445
Figure 272 Print Test Page Screen
445
Figure 273 Add Printer Wizard Complete
446
Figure 274 Macintosh HD
446
Figure 275 Macintosh HD Folder
446
Figure 276 Applications Folder
447
Figure 277 Utilities Folder
447
Figure 278 Printer List Folder
447
Figure 279 Printer Configuration
448
Figure 280 Printer Model
448
Figure 281 Print Server
449
Appendix E
451
Print Server Specifications
451
Table 150 Print Server Interface
451
Table 151 Print Server Requirements and Specifications
451
Table 152 Compatible USB Printers
452
Appendix F
453
Netbios Filter Commands
453
Table 153 Netbios Filter Default Settings
454
Appendix G Log Descriptions
455
Table 154 System Error Logs
455
Table 155 System Maintenance Logs
455
Table 156 Upnp Logs
456
Table 157 ICMP Type and Code Explanations
456
Appendix H
457
Setting up Your Computer's IP Address
457
Figure 282 Windows 95/98/Me: Network: Configuration
458
Figure 283 Windows 95/98/Me: TCP/IP Properties: IP Address
459
Figure 284 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
460
Figure 285 Windows XP: Start Menu
461
Figure 286 Windows XP: Control Panel
461
Figure 287 Windows XP: Control Panel: Network Connections: Properties
462
Figure 288 Windows XP: Local Area Connection Properties
462
Figure 289 Windows XP: Advanced TCP/IP Settings
463
Figure 290 Windows XP: Internet Protocol (TCP/IP) Properties
464
Figure 291 Macintosh os 8/9: Apple Menu
465
Figure 292 Macintosh os 8/9: TCP/IP
466
Figure 293 Macintosh os X: Apple Menu
466
Figure 294 Macintosh os X: Network
467
Wireless LAN and IEEE 802.11
469
Appendix I
469
Figure 295 Peer-To-Peer Communication in an Ad-Hoc Network
470
Figure 296 ESS Provides Campus-Wide Coverage
471
Appendix J
473
Wireless LAN with IEEE 802.1X
473
Figure 297 Sequences for EAP MD5-Challenge Authentication
474
Appendix K
475
Types of EAP Authentication
475
Table 158 Comparison of EAP Authentication Types
476
Antenna Selection and Positioning Recommendation
477
Appendix L
477
Brute-Force Password Guessing Protection
479
Table 159 Brute-Force Password Guessing Protection Commands
479
Appendix M
479
Appendix Ntmss
481
Figure 298 Enable TMSS
481
Figure 299 TMSS Welcome Screen
482
Figure 300 Download Activex Control
482
Figure 301 Home Network Security Services Dashboard
483
Appendix O Triangle Route
485
Figure 302 Ideal Setup
485
Figure 303 "Triangle Route" Problem
486
Figure 304 IP Alias
487
Figure 305 Gateways on the WAN Side
487
Advertisement
Advertisement
Related Products
ZyXEL Communications PRESTIGE 334
ZyXEL Communications PRESTIGE 334W
ZyXEL Communications Prestige 320W
ZyXEL Communications Prestige 2602HW-C Series
ZyXEL Communications Prestige P660RU-T1
ZyXEL Communications Prestige P-662HW-61
ZyXEL Communications Prestige 792H
ZyXEL Communications Prestige 642M series
ZyXEL Communications Prestige 661HW Series
ZyXEL Communications PRESTIGE 660 HW Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL