Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
Prestige 652 Series
ZyXEL Communications Prestige 652 Series Manuals
Manuals and User Guides for ZyXEL Communications Prestige 652 Series. We have
2
ZyXEL Communications Prestige 652 Series manuals available for free PDF download: User Manual
ZyXEL Communications Prestige 652 Series User Manual (521 pages)
ADSL Security/Wireless LAN Router
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 12.72 MB
Table of Contents
Copyright
2
Federal Communications Commission
3
Safety Warnings
4
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
6
List of Figures
18
Preface
35
What Is DSL
37
Getting Started
38
Chapter 1 Getting to Know Your Prestige
39
Introducing the Prestige 652 Series
39
Features of the Prestige
39
Dynamic Dns Support
41
Protocol Support
42
Lan Port
44
Packet Filters
44
Applications for the Prestige
44
Figure 1-1 Prestige Internet Access Application
45
Firewall for Secure Broadband Internet Access
45
Figure 1-2 Firewall Application
46
Figure 1-3 VPN Application
47
Lan to Lan Application
47
Figure 1-4 Prestige LAN-To-LAN Application
48
Chapter 2 Introducing the Web Configurator
49
Web Configurator Overview
49
Accessing the Prestige Web Configurator
49
Navigating the Prestige Web Configurator
50
Figure 2-1 Password Screen
50
Resetting the Prestige
51
Figure 2-2 Web Configurator SITE MAP Screen
51
Using the Reset Button
51
Figure 2-3 Example Xmodem Upload
52
Chapter 3 Wizard Setup
53
Encapsulation
53
Enet Encap
53
Ppp over Ethernet
53
Wizard Setup Introduction
53
Multiplexing
54
VPI and VCI
54
Wizard Setup Configuration: First Screen
54
IP Address and Subnet Mask
56
IP Address Assignment
56
Ip Assignment with Enet Encap Encapsulation
57
Ip Assignment with Pppoa or Pppoe Encapsulation
57
Ip Assignment with Rfc 1483 Encapsulation
57
Private Ip Addresses
57
Figure 3-2 Internet Connection with Pppoe
58
Nailed-Up Connection (PPP)
58
Nat
58
Wizard Setup Configuration: Second Screen
58
Table 3-2 Internet Connection with Pppoe
59
Figure 3-3 Internet Connection with RFC 1483
60
Table 3-3 Internet Connection with RFC 1483
60
Figure 3-4 Internet Connection with ENET ENCAP
61
Table 3-4 Internet Connection with ENET ENCAP
61
Figure 3-5 Internet Connection with Pppoa
62
DHCP Setup
63
Table 3-5 Internet Connection with Pppoa
63
Ip Pool Setup
64
Wizard Setup Configuration: Third Screen
64
Figure 3-7 Wizard : LAN Configuration
65
Table 3-6 Wizard : LAN Configuration
65
Wizard Setup Configuration: Connection Tests
66
Test Your Internet Connection
67
Password, LAN, Wireless LAN and WAN
68
Chapter 4 Password Setup
69
Password Overview
69
Configuring Password
69
Chapter 5 LAN Setup
71
LAN Overview
71
DNS Server Address
71
Figure 5-1 LAN and WAN IP Addresses
71
DNS Server Address Assignment
72
Factory Lan Defaults
72
Lan Tcp/Ip
72
Rip Setup
73
Configuring LAN
74
Chapter 6 Wireless LAN Setup
77
Wireless LAN Overview
77
Figure 6-1 RTS/CTS
78
Fragmentation Threshold
79
Levels of Security
79
Figure 6-2 Prestige Wireless Security Levels
79
Data Encryption with WEP
80
Inserting a PCMCIA Wireless LAN Card
80
Configuring Wireless LAN
80
Configuring MAC Filter
82
Figure 6-4 MAC Address Filter
83
Network Authentication
84
Table 6-2 MAC Address Filter
84
Eap Authentication Overview
85
Types of Radius Messages
85
Configuring 802.1X
86
Figure 6-5 EAP Authentication
86
Figure 6-6 802.1X
86
Table 6-3 802.1X
87
Configuring Local User Authentication
88
Figure 6-7 Local User Database
89
Configuring RADIUS
90
Figure 6-8 RADIUS
90
Table 6-4 Local User Database
90
Table 6-5 RADIUS
91
Chapter 7 WAN Setup
93
WAN Overview
93
Metric
93
Pppoe Encapsulation
93
Traffic Shaping
94
Configuring WAN Setup
95
Figure 7-1 Example of Traffic Shaping
95
WAN Backup
99
Traffic Redirect
99
Figure 7-3 Traffic Redirect Setup Example
100
Figure 7-4 Traffic Redirect LAN Setup
100
Configuring WAN Backup
101
Figure 7-5 WAN Backup
101
Table 7-2 WAN Backup
101
Configuring Advanced WAN Backup
103
Figure 7-6 Advanced WAN Backup
104
Table 7-3 Advanced WAN Backup
105
AT Command Strings
107
DTR Signal
108
Response Strings
108
Configuring Advanced Modem Setup
108
Figure 7-7 Advanced Modem Setup
109
Table 7-4 Advanced Modem Setup
109
NAT, Dynamic DNS and Time Zone
111
Chapter 8 Network Address Translation (NAT) Screens
113
Nat Overview
113
Nat Definitions
113
What Nat Does
114
How Nat Works
114
Figure 8-1 How NAT Works
115
Nat Application
115
Figure 8-2 NAT Application with IP Alias
116
Nat Mapping Types
116
SUA (Single User Account) Versus NAT
117
Table 8-2 NAT Mapping Types
117
SUA Server
118
Default Server Ip Address
118
Table 8-3 Services and Port Numbers
119
Selecting the NAT Mode
120
Figure 8-3 Multiple Servers Behind NAT Example
120
Figure 8-4 NAT Mode
120
Configuring SUA Server
121
Table 8-4 NAT Mode
121
Figure 8-5 Edit SUA/NAT Server Set
122
Table 8-5 Edit SUA/NAT Server Set
122
Configuring Address Mapping
123
Figure 8-6 Address Mapping Rules
123
Editing an Address Mapping Rule
124
Table 8-6 Address Mapping Rules
124
Figure 8-7 Address Mapping Rule Edit
125
Table 8-7 Address Mapping Rule Edit
125
Chapter 9 Dynamic DNS Setup
127
Dynamic DNS
127
Dyndns Wildcard
127
Configuring Dynamic DNS
127
Figure 9-1 DDNS
128
Table 9-1 DDNS
128
Chapter 10 Time Zone
129
Configuring Time Zone
129
Figure 10-1 Time/Date
129
Table 10-1 Time/Date
130
Firewall and Content Filters
132
Chapter 11 Firewalls
134
Firewall Overview
134
Types of Firewalls
134
Packet Filtering Firewalls
134
Stateful Inspection Firewalls
135
Introduction to Zyxel's Firewall
135
Denial of Service
136
Figure 11-1 Prestige Firewall Application
136
Types of Dos Attacks
137
Table 11-1 Common IP Ports
137
Figure 11-2 Three-Way Handshake
138
Figure 11-3 SYN Flood
138
Figure 11-4 Smurf Attack
139
Table 11-2 ICMP Commands that Trigger Alerts
139
Stateful Inspection
140
Table 11-3 Legal Netbios Commands
140
Table 11-4 Legal SMTP Commands
140
Stateful Inspection Process
141
Stateful Inspection and the Prestige
142
Tcp Security
143
Upper Layer Protocols
143
Guidelines for Enhancing Security with Your Firewall
144
Security in General
144
Packet Filtering Vs Firewall
145
When to Use Filtering
145
When to Use the Firewall
146
Chapter 12 Firewall Configuration
148
Remote Management and the Firewall
148
Enabling the Firewall
148
Figure 12-1 Enabling the Firewall
148
Threshold Values
149
Attack Alert
149
Tcp Maximum Incomplete and Blocking Time
150
Figure 12-2 Attack Alert
151
Table 12-1 Attack Alert
151
Chapter 13 Creating Custom Rules
153
Rules Overview
153
Rule Checklist
153
Rule Logic Overview
153
Security Ramifications
154
Key Fields for Configuring Rules
154
Source Address
155
Connection Direction
155
Destination Address
155
Figure 13-1 LAN to WAN Traffic
155
Lan to Wan Rules
155
Wan to Lan Rules
155
Logs
156
Rule Summary
156
Figure 13-2 WAN to LAN Traffic
156
Figure 13-3 Firewall Rules Summary: First Screen
157
Table 13-1 Firewall Rules Summary: First Screen
157
Predefined Services
158
Table 13-2 Predefined Services
159
Creating/Editing Firewall Rules
161
Figure 13-4 Creating/Editing a Firewall Rule
162
Table 13-3 Creating/Editing a Firewall Rule
162
Timeout
164
Figure 13-5 Adding/Editing Source and Destination Addresses
164
Table 13-4 Adding/Editing Source and Destination Addresses
164
Figure 13-6 Timeout
165
Table 13-5 Timeout
165
Chapter 14 Customized Services
167
Introduction to Customized Services
167
Figure 14-1 Customized Services
167
Creating/Editing a Customized Service
168
Figure 14-2 Creating/Editing a Customized Service
168
Table 14-1 Customized Services
168
Example Custom Service Firewall Rule
169
Table 14-2 Creating/Editing a Customized Service
169
Figure 14-3 Configure Source IP Example
170
Figure 14-4 Customized Service for Myservice Example
170
Figure 14-5 Syslog Rule Configuration Example
171
Figure 14-6 Rule Summary Example
172
Chapter 15 Content Filtering Screens
173
Content Filtering Overview
173
Configuring Keyword Blocking
173
Figure 15-1 Content Filter: Keyword
174
Table 15-1 Content Filter: Keyword
174
Configuring the Schedule
175
Figure 15-2 Content Filter: Schedule
175
Configuring Trusted Computers
176
Figure 15-3 Content Filter: Trusted
176
Table 15-2 Content Filter: Schedule
176
Table 15-3 Content Filter: Trusted
176
Vpn/Ipsec
178
Chapter 16 Introduction to Ipsec
179
VPN Overview
179
Security Association
179
Other Terminology
179
Figure 16-1 Encryption and Decryption
180
Vpn Applications
180
Ipsec Architecture
181
Figure 16-2 VPN Application
181
Figure 16-3 Ipsec Architecture
182
Key Management
182
Encapsulation
183
Transport Mode
183
Ipsec and NAT
183
Tunnel Mode
183
Figure 16-4 Transport and Tunnel Mode Ipsec Encapsulation
183
Table 16-1 VPN and NAT
184
Chapter 17 VPN Screens
185
Vpn/Ipsec Overview
185
Ipsec Algorithms
185
My IP Address
186
Secure Gateway Address
186
Table 17-1 AH and ESP
186
VPN Summary Screen
187
Figure 17-1 Ipsec Summary Fields
187
Figure 17-2 VPN Summary
188
Table 17-2 VPN Summary
188
Keep Alive
189
ID Type and Content
189
Table 17-3 Local ID Type and Content Fields
190
Table 17-4 Peer ID Type and Content Fields
190
Table 17-5 Matching ID Type and Content Configuration Example
190
Pre-Shared Key
191
Editing VPN Policies
191
Table 17-6 Mismatching ID Type and Content Configuration Example
191
Figure 17-3 VPN IKE
192
Table 17-7 VPN IKE
193
IKE Phases
197
Figure 17-4 Two Phases to Set up the Ipsec SA
197
Negotiation Mode
198
Configuring Advanced IKE Settings
198
Figure 17-5 VPN IKE: Advanced
199
Table 17-8 VPN IKE: Advanced
199
Manual Key Setup
202
Configuring Manual Key
203
Figure 17-6 Manual Setup
203
Table 17-9 VPN Manual Setup
204
Viewing SA Monitor
206
Figure 17-7 SA Monitor
207
Table 17-10 SA Monitor
207
Configuring Global Setting
208
Figure 17-8 Global Setting
208
Table 17-11 Global Setting
208
Telecommuters Sharing One Vpn Rule Example
209
Telecommuter Vpn/Ipsec Examples
209
Table 17-12 Telecommuter and Headquarters Configuration Example
209
Figure 17-9 Telecommuters Sharing One VPN Rule Example
210
Telecommuters Using Unique Vpn Rules Example
210
VPN and Remote Management
211
Figure 17-10 Telecommuters Using Unique VPN Rules Example
211
Remote Management, Upnp and Logs
212
Chapter 18 Remote Management Configuration
213
Remote Management Overview
213
Remote Management Limitations
213
Telnet
214
Ftp
214
Figure 18-1 Telnet Configuration on a TCP/IP Network
214
Web
215
Configuring Remote Management
215
Figure 18-2 Remote Management
215
Chapter 19 Universal Plug-And-Play (Upnp)
217
Introducing Universal Plug and Play
217
Nat Traversal
217
Cautions with Upnp
217
Upnp and Zyxel
218
Figure 19-1 Configuring Upnp
218
Table 19-1 Configuring Upnp
218
Installing Upnp in Windows Example
219
Using Upnp in Windows XP Example
221
Chapter 20 Logs Screens
225
Logs Overview
225
Alerts and Logs
225
Configuring Log Settings
225
Figure 20-1 Log Settings
226
Table 20-1 Log Settings
227
Displaying the Logs
228
Figure 20-2 View Logs
228
Table 20-2 View Logs
228
SMTP Error Messages
229
Table 20-3 SMTP Error Messages
229
Figure 20-3 E-Mail Log Example
230
Bandwidth Management
231
Chapter 21 Bandwidth Management
233
Bandwidth Management Overview
233
Bandwidth Classes and Filters
233
Proportional Bandwidth Allocation
234
Bandwidth Management Usage Examples
234
Figure 21-1 Application-Based Bandwidth Management Example
234
Figure 21-2 Subnet-Based Bandwidth Management Example
235
Table 21-1 Application and Subnet-Based Bandwidth Management Example
235
Scheduler
236
Maximize Bandwidth Usage
236
Figure 21-3 Application and Subnet-Based Bandwidth Management Example
236
Maximize Bandwidth Usage Example
237
Figure 21-4 Bandwidth Allotment Example
237
Figure 21-5 Maximize Bandwidth Usage Example
238
Bandwidth Borrowing
239
Figure 21-6 Bandwidth Borrowing Example
240
Maximize Bandwidth Usage with Bandwidth Borrowing
241
Configuring Summary
241
Figure 21-7 Bandwidth Manager: Summary
242
Table 21-2 Bandwidth Manager: Summary
242
Configuring Class Setup
243
Figure 21-8 Bandwidth Manager: Class Setup
244
Table 21-3 Bandwidth Manager: Class Setup
244
Figure 21-9 Bandwidth Manager: Class Configuration
246
Table 21-4 Bandwidth Manager: Class Configuration
246
Table 21-5 Services and Port Numbers
248
Figure 21-10 Bandwidth Management Statistics
249
Table 21-6 Bandwidth Management Statistics
249
Configuring Monitor
250
Figure 21-11 Bandwidth Manager Monitor
250
Table 21-7 Bandwidth Manager Monitor
250
Maintenance
252
Chapter 22 Maintenance
253
Maintenance Overview
253
System Status Screen
253
Figure 22-1 System Status
254
Table 22-1 System Status
255
Figure 22-2 System Status: Show Statistics
256
Table 22-2 System Status: Show Statistics
257
DHCP Table Screen
258
Figure 22-3 DHCP Table
258
Wireless Screens
259
Figure 22-4 Association List
259
Table 22-3 DHCP Table
259
Table 22-4 Association List
260
Diagnostic Screens
261
Figure 22-5 Channel Usage Table
261
Table 22-5 Channel Usage Table
261
Diagnostic General Screen
261
Figure 22-6 Diagnostic General
262
Table 22-6 Diagnostic General
262
Figure 22-7 Diagnostic DSL Line
263
Table 22-7 Diagnostic DSL Line
263
Firmware Screen
264
Figure 22-8 Firmware Upgrade
265
Table 22-8 Firmware Upgrade
265
Figure 22-9 Network Temporarily Disconnected
266
Figure 22-10 Error Message
266
SMT General Configuration
267
Chapter 23 Introducing the SMT
269
SMT Introduction
269
Procedure for Smt Configuration Via Telnet
269
Entering Password
269
Figure 23-1 Login Screen
270
Prestige Smt Menu Overview
270
Navigating the SMT Interface
271
Figure 5-2 LAN
271
Figure 6-3 Wireless
271
Figure 23-2 Prestige 652HW-31 SMT Menu Overview
271
Table 5-1 LAN
271
Table 6-1 Wireless
271
Table 18-1 Remote Management
271
Table 23-1 Main Menu Commands
272
Figure 23-3 SMT Main Menu
273
Table 23-2 Main Menu Summary
273
System Management Terminal Interface Summary
273
Changing the System Password
274
Figure 23-4 Menu 23 System Password
274
Chapter 24 Menu 1 General Setup
275
General Setup
275
Procedure to Configure Menu 1
275
Figure 24-1 Menu 1 General Setup
276
Table 24-1 Menu 1 General Setup
276
Figure 24-2 Menu 1.1 Configure Dynamic DNS
277
Table 24-2 Menu 1.1 Configure Dynamic DNS
277
Chapter 25 Menu 2 WAN Backup Setup
279
Introduction to WAN Backup Setup
279
Dial Backup
279
Configuring Dial Backup in Menu 2
279
Figure 25-1 Menu 2 WAN Backup Setup
280
Table 25-1 Menu 2 WAN Backup Setup
280
Figure 25-2 Menu 2.1Traffic Redirect Setup
281
Configuring Dial Backup Setup
282
Table 25-2 Menu 2.1Traffic Redirect Setup
282
Figure 25-3 Menu 2.2 Dial Backup Setup
283
Table 25-3 Menu 2.2 Dial Backup Setup
283
Advanced Dial Backup Setup
284
Figure 25-4 Menu 2.2.1 Advanced Dial Backup Setup
284
Table 25-4 Menu 2.2.1 Advanced Dial Backup Setup: at Commands Fields
284
Table 25-5 Menu 2.2.1 Advanced Dial Backup Setup: Call Control Parameters
285
Remote Node Profile (Backup ISP)
286
Figure 25-5 Menu 11.1 Remote Node Profile (Backup ISP)
286
Table 25-6 Menu 11.1 Remote Node Profile (Backup ISP)
286
Editing PPP Options
288
Figure 25-6 Menu 11.2 Remote Node PPP Options
288
Editing TCP/IP Options
289
Figure 25-7 Menu 11.2 Remote Node PPP Options
289
Figure 25-8 Menu 11.3 Remote Node Network Layer Options
289
Table 25-7 Menu 11.3 Remote Node Network Layer Options
289
Editing Login Script
291
Remote Node Filter
292
Figure 25-9 Menu 11.4 Remote Node Setup Script
292
Table 25-8 Menu 11.4 Remote Node Setup Script
292
Figure 25-10 Menu 11.1 Remote Node Profile (Backup ISP)
293
Figure 25-11 Menu 11.5 Dial Backup Remote Node Filter
293
Advertisement
ZyXEL Communications Prestige 652 Series User Manual (523 pages)
Prestige 652 Series ADSL Security/Wireless LAN Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 12.52 MB
Table of Contents
Copyright
2
Federal Communications Commission
3
Safety Warnings
4
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
6
List of Figures
14
Preface
26
Syntax Conventions
27
What Is DSL
28
Getting Started
29
Chapter 1 Getting to Know Your Prestige
31
Introducing the Prestige 652 Series
31
Features of the Prestige
31
Traffic Redirect
32
Auxiliary Port
32
Dynamic Dns Support
33
Protocol Support
34
Networking Compatibility
35
Applications for the Prestige
36
Figure 1-1 Prestige Internet Access Application
37
Figure 1-2 Firewall Application
38
Figure 1-3 VPN Application
39
Figure 1-4 Prestige LAN-To-LAN Application
40
Chapter 2 Introducing the Web Configurator
41
Web Configurator Overview
41
Accessing the Prestige Web Configurator
41
Navigating the Prestige Web Configurator
42
Figure 2-1 Password Screen
42
Resetting the Prestige
43
Figure 2-2 Web Configurator SITE MAP Screen
43
Figure 2-3 Example Xmodem Upload
44
Chapter 3 Wizard Setup
45
Wizard Setup Introduction
45
Encapsulation
45
Multiplexing
46
VPI and VCI
46
Wizard Setup Configuration: First Screen
46
Figure 3-1 Wizard Screen 1
47
Table 3-1 Wizard Screen 1
47
IP Address and Subnet Mask
48
IP Address Assignment
48
Ip Assignment with Pppoa or Pppoe Encapsulation
49
Ip Assignment with Rfc 1483 Encapsulation
49
Ip Assignment with Enet Encap Encapsulation
49
Private Ip Addresses
49
Nailed-Up Connection (PPP)
50
Nat
50
Wizard Setup Configuration: Second Screen
50
Figure 3-2 Internet Connection with Pppoe
50
Table 3-2 Internet Connection with Pppoe
51
Figure 3-3 Internet Connection with RFC 1483
52
Table 3-3 Internet Connection with RFC 1483
52
Figure 3-4 Internet Connection with ENET ENCAP
53
Table 3-4 Internet Connection with ENET ENCAP
53
Figure 3-5 Internet Connection with Pppoa
54
DHCP Setup
55
Table 3-5 Internet Connection with Pppoa
55
Wizard Setup Configuration: Third Screen
56
Figure 3-6 Wizard Screen 3
56
Figure 3-7 Wizard : LAN Configuration
57
Table 3-6 Wizard : LAN Configuration
57
Wizard Setup Configuration: Connection Tests
58
Figure 3-8 Wizard Screen 4
58
Test Your Internet Connection
59
Password, LAN, Wireless LAN and WAN
61
Chapter 4 Password Setup
63
Password Overview
63
Configuring Password
63
Figure 4-1 Password
63
Table 4-1 Password
63
Chapter 5 LAN Setup
65
LAN Overview
65
DNS Server Address
65
Figure 5-1 LAN and WAN IP Addresses
65
DNS Server Address Assignment
66
Lan Tcp/Ip
66
Rip Setup
67
Configuring LAN
68
Chapter 6 Wireless LAN Setup
71
Wireless LAN Overview
71
Figure 6-1 RTS/CTS
72
Levels of Security
73
Figure 6-2 Prestige Wireless Security Levels
73
Data Encryption with WEP
74
Inserting a PCMCIA Wireless LAN Card
74
Configuring Wireless LAN
74
Configuring MAC Filter
76
Figure 6-4 MAC Address Filter
77
Network Authentication
78
Table 6-2 MAC Address Filter
78
Eap Authentication Overview
79
Types of Radius Messages
79
Configuring 802.1X
80
Figure 6-5 EAP Authentication
80
Figure 6-6 802.1X
80
Table 6-3 802.1X
81
Configuring Local User Authentication
82
Figure 6-7 Local User Database
83
Configuring RADIUS
84
Figure 6-8 RADIUS
84
Table 6-4 Local User Database
84
Table 6-5 RADIUS
85
Chapter 7 WAN Setup
87
WAN Overview
87
Metric
87
Pppoe Encapsulation
87
Traffic Shaping
88
Configuring WAN Setup
89
Figure 7-1 Example of Traffic Shaping
89
Figure 7-2 WAN Setup
90
Table 7-1 WAN Setup
91
WAN Backup
93
Traffic Redirect on the LAN
93
Traffic Redirect on the WAN
94
Figure 7-3 Traffic Redirect Setup Example
94
Figure 7-4 Traffic Redirect WAN Setup
94
Configuring WAN Backup
95
Figure 7-5 Traffic Redirect LAN Setup
95
Figure 7-6 WAN Backup
96
Table 7-2 WAN Backup
96
Configuring Advanced WAN Backup
98
Figure 7-7 Advanced WAN Backup
99
Table 7-3 Advanced WAN Backup
100
AT Command Strings
102
DTR Signal
103
Response Strings
103
Configuring Advanced Modem Setup
103
Figure 7-8 Advanced Modem Setup
104
Table 7-4 Advanced Modem Setup
104
NAT, Dynamic DNS and Time Zone
107
Chapter 8 Network Address Translation (NAT) Screens
109
NAT Overview
109
Table 8-1 NAT Definitions
109
How Nat Works
110
What Nat Does
110
Figure 8-1 How NAT Works
111
Figure 8-2 NAT Application with IP Alias
112
SUA (Single User Account) Versus NAT
113
Table 8-2 NAT Mapping Types
113
SUA Server
114
Table 8-3 Services and Port Numbers
115
Selecting the NAT Mode
116
Figure 8-3 Multiple Servers Behind NAT Example
116
Figure 8-4 NAT Mode
116
Configuring SUA Server
117
Table 8-4 NAT Mode
117
Figure 8-5 Edit SUA/NAT Server Set
118
Table 8-5 Edit SUA/NAT Server Set
118
Configuring Address Mapping
119
Figure 8-6 Address Mapping Rules
119
Editing an Address Mapping Rule
120
Table 8-6 Address Mapping Rules
120
Figure 8-7 Address Mapping Rule Edit
121
Table 8-7 Address Mapping Rule Edit
121
Chapter 9 Dynamic DNS Setup
123
Dynamic DNS
123
Configuring Dynamic DNS
123
Figure 9-1 DDNS
124
Table 9-1 DDNS
124
Chapter 10 Time Zone
125
Configuring Time Zone
125
Figure 10-1 Time/Date
125
Table 10-1 Time/Date
126
Firewall and Content Filters
129
Chapter 11 Firewalls
131
Firewall Overview
131
Types of Firewalls
131
Introduction to Zyxel's Firewall
132
Denial of Service
133
Figure 11-1 Prestige Firewall Application
133
Table 11-1 Common IP Ports
134
Figure 11-2 Three-Way Handshake
135
Figure 11-3 SYN Flood
135
Figure 11-4 Smurf Attack
136
Table 11-2 ICMP Commands that Trigger Alerts
136
Stateful Inspection
137
Table 11-3 Legal Netbios Commands
137
Table 11-4 Legal SMTP Commands
137
Figure 11-5 Stateful Inspection
138
Stateful Inspection and the Prestige
139
Tcp Security
140
Upper Layer Protocols
140
Guidelines for Enhancing Security with Your Firewall
141
Security in General
141
Packet Filtering Vs Firewall
142
When to Use the Firewall
143
Chapter 12 Firewall Configuration
145
Remote Management and the Firewall
145
Enabling the Firewall
145
Figure 12-1 Enabling the Firewall
145
Attack Alert
146
Tcp Maximum Incomplete and Blocking Time
147
Figure 12-2 Attack Alert
148
Table 12-1 Attack Alert
148
Chapter 13 Creating Custom Rules
151
Rules Overview
151
Rule Logic Overview
151
Security Ramifications
152
Key Fields for Configuring Rules
152
Connection Direction
153
Figure 13-1 LAN to WAN Traffic
153
Logs
154
Rule Summary
154
Figure 13-2 WAN to LAN Traffic
154
Figure 13-3 Firewall Rules Summary: First Screen
155
Table 13-1 Firewall Rules Summary: First Screen
155
Predefined Services
156
Table 13-2 Predefined Services
157
Creating/Editing Firewall Rules
159
Figure 13-4 Creating/Editing a Firewall Rule
160
Table 13-3 Creating/Editing a Firewall Rule
160
Source and Destination Addresses
161
Timeout
162
Figure 13-5 Adding/Editing Source and Destination Addresses
162
Table 13-4 Adding/Editing Source and Destination Addresses
162
Figure 13-6 Timeout
163
Table 13-5 Timeout
163
Chapter 14 Customized Services
165
Introduction to Customized Services
165
Figure 14-1 Customized Services
165
Creating/Editing a Customized Service
166
Figure 14-2 Creating/Editing a Customized Service
166
Table 14-1 Customized Services
166
Example Custom Service Firewall Rule
167
Table 14-2 Creating/Editing a Customized Service
167
Figure 14-3 Configure Source IP Example
168
Figure 14-4 Customized Service for Myservice Example
168
Figure 14-5 Syslog Rule Configuration Example
169
Figure 14-6 Rule Summary Example
170
Chapter 15 Content Filtering Screens
171
Content Filtering Overview
171
Configuring Keyword Blocking
171
Figure 15-1 Content Filter: Keyword
172
Table 15-1 Content Filter: Keyword
172
Configuring the Schedule
173
Figure 15-2 Content Filter: Schedule
173
Configuring Trusted Computers
174
Figure 15-3 Content Filter: Trusted
174
Table 15-2 Content Filter: Schedule
174
Table 15-3 Content Filter: Trusted
174
Vpn/Ipsec
177
Chapter 16 Introduction to Ipsec
179
VPN Overview
179
Security Association
179
Figure 16-1 Encryption and Decryption
180
Ipsec Architecture
181
Figure 16-2 VPN Application
181
Figure 16-3 Ipsec Architecture
182
Encapsulation
183
Ipsec and NAT
183
Figure 16-4 Transport and Tunnel Mode Ipsec Encapsulation
183
Table 16-1 VPN and NAT
184
Chapter 17 VPN Screens
185
Vpn/Ipsec Overview
185
Ipsec Algorithms
185
My IP Address
186
Secure Gateway Address
186
Table 17-1 AH and ESP
186
VPN Summary Screen
187
Figure 17-1 Ipsec Summary Fields
187
Figure 17-2 VPN Summary
188
Table 17-2 VPN Summary
188
Keep Alive
189
ID Type and Content
189
Table 17-3 Local ID Type and Content Fields
190
Table 17-4 Peer ID Type and Content Fields
190
Table 17-5 Matching ID Type and Content Configuration Example
190
Pre-Shared Key
191
Editing VPN Policies
191
Table 17-6 Mismatching ID Type and Content Configuration Example
191
Figure 17-3 VPN IKE
192
Table 17-7 VPN IKE
193
IKE Phases
197
Figure 17-4 Two Phases to Set up the Ipsec SA
197
Configuring Advanced IKE Settings
198
Figure 17-5 VPN IKE: Advanced
199
Table 17-8 VPN IKE: Advanced
199
Manual Key Setup
202
Configuring Manual Key
203
Figure 17-6 Manual Setup
203
Table 17-9 VPN Manual Setup
204
Viewing SA Monitor
206
Figure 17-7 SA Monitor
207
Table 17-10 SA Monitor
207
Configuring Global Setting
208
Figure 17-8 Global Setting
208
Table 17-11 Global Setting
208
Telecommuter Vpn/Ipsec Examples
209
Table 17-12 Telecommuter and Headquarters Configuration Example
209
Figure 17-9 Telecommuters Sharing One VPN Rule Example
210
VPN and Remote Management
211
Figure 17-10 Telecommuters Using Unique VPN Rules Example
211
Remote Management, Upnp and Logs
213
Chapter 18 Remote Management Configuration
215
Remote Management Overview
215
Telnet
216
Ftp
216
Figure 18-1 Telnet Configuration on a TCP/IP Network
216
Web
217
Configuring Remote Management
217
Figure 18-2 Remote Management
217
Chapter 19 Universal Plug-And-Play (Upnp)
219
Introducing Universal Plug and Play
219
Upnp and Zyxel
220
Figure 19-1 Configuring Upnp
220
Table 19-1 Configuring Upnp
220
Installing Upnp in Windows Example
221
Using Upnp in Windows XP Example
223
Chapter 20 Logs Screens
227
Logs Overview
227
Configuring Log Settings
227
Figure 20-1 Log Settings
228
Table 20-1 Log Settings
229
Displaying the Logs
230
Figure 20-2 View Logs
230
Table 20-2 View Logs
230
SMTP Error Messages
231
Table 20-3 SMTP Error Messages
231
Figure 20-3 E-Mail Log Example
232
Maintenance
233
Chapter 21 Maintenance
235
Maintenance Overview
235
System Status Screen
235
Figure 21-1 System Status
236
Table 21-1 System Status
236
Figure 21-2 System Status: Show Statistics
238
Table 21-2 System Status: Show Statistics
238
DHCP Table Screen
240
Wireless Screens
240
Figure 21-3 DHCP Table
240
Table 21-3 DHCP Table
240
Figure 21-4 Association List
241
Table 21-4 Association List
241
Diagnostic Screens
242
Figure 21-5 Channel Usage Table
242
Table 21-5 Channel Usage Table
242
Figure 21-6 Diagnostic General
243
Table 21-6 Diagnostic General
243
Figure 21-7 Diagnostic DSL Line
244
Table 21-7 Diagnostic DSL Line
244
Firmware Screen
245
Figure 21-8 Firmware Upgrade
246
Table 21-8 Firmware Upgrade
246
Figure 21-9 Network Temporarily Disconnected
247
Figure 21-10 Error Message
247
SMT General Configuration
249
Chapter 22 Introducing the SMT
251
SMT Introduction
251
Figure 22-1 Login Screen
252
Navigating the SMT Interface
253
Figure 5-2 LAN
253
Figure 6-3 Wireless
253
Figure 22-2 Prestige 652HW-31 SMT Menu Overview
253
Table 5-1 LAN
253
Table 6-1 Wireless
253
Table 18-1 Remote Management
253
Table 22-1 Main Menu Commands
254
Figure 22-3 SMT Main Menu
255
Table 22-2 Main Menu Summary
255
Changing the System Password
256
Figure 22-4 Menu 23 System Password
256
Chapter 23 Menu 1 General Setup
257
General Setup
257
Procedure to Configure Menu 1
257
Figure 23-1 Menu 1 General Setup
258
Table 23-1 Menu 1 General Setup
258
Figure 23-2 Menu 1.1 Configure Dynamic DNS
259
Table 23-2 Menu 1.1 Configure Dynamic DNS
259
Chapter 24 Menu 2 WAN Backup Setup
261
Introduction to WAN Backup Setup
261
Dial Backup
261
Configuring Dial Backup in Menu 2
261
Figure 24-1 Menu 2 WAN Backup Setup
262
Table 24-1 Menu 2 WAN Backup Setup
262
Figure 24-2 Menu 2.1Traffic Redirect Setup
263
Configuring Dial Backup Setup
264
Table 24-2 Menu 2.1Traffic Redirect Setup
264
Figure 24-3 Menu 2.2 Dial Backup Setup
265
Table 24-3 Menu 2.2 Dial Backup Setup
265
Advanced Dial Backup Setup
266
Figure 24-4 Menu 2.2.1 Advanced Dial Backup Setup
266
Table 24-4 Menu 2.2.1 Advanced Dial Backup Setup: at Commands Fields
266
Table 24-5 Menu 2.2.1 Advanced Dial Backup Setup: Call Control Parameters
267
Remote Node Profile (Backup ISP)
268
Figure 24-5 Menu 11.1 Remote Node Profile (Backup ISP)
268
Table 24-6 Menu 11.1 Remote Node Profile (Backup ISP)
268
Editing PPP Options
270
Figure 24-6 Menu 11.2 Remote Node PPP Options
270
Editing TCP/IP Options
271
Figure 24-7 Menu 11.2 Remote Node PPP Options
271
Figure 24-8 Menu 11.3 Remote Node Network Layer Options
271
Table 24-7 Menu 11.3 Remote Node Network Layer Options
271
Editing Login Script
273
Remote Node Filter
274
Figure 24-9 Menu 11.4 Remote Node Setup Script
274
Table 24-8 Menu 11.4 Remote Node Setup Script
274
Figure 24-10 Menu 11.1 Remote Node Profile (Backup ISP)
275
Figure 24-11 Menu 11.5 Dial Backup Remote Node Filter
275
Chapter 25 Menu 3 LAN Setup
277
LAN Setup
277
Figure 25-1 Menu 3 LAN Setup
277
Figure 25-2 Menu 3.1 LAN Port Filter Setup
277
Protocol Dependent Ethernet Setup
278
TCP/IP Ethernet Setup and DHCP
278
Figure 25-3 Menu 3.2 TCP/IP and DHCP Ethernet Setup
278
Table 25-1 DHCP Ethernet Setup Menu Fields
279
Table 25-2 TCP/IP Ethernet Setup Menu Fields
279
Chapter 26 Wireless LAN Setup
281
Wireless LAN Overview
281
Inserting a PCMCIA Wireless LAN Card
281
Wireless LAN Setup
281
Figure 26-1 Menu 3.5 - Wireless LAN Setup
282
Table 26-1 Menu 3.5 - Wireless LAN Setup
282
Wireless Lan Mac Address Filter
283
Figure 26-2 Menu 3.5.1 WLAN MAC Address Filtering
284
Table 26-2 Menu 3.5.1 WLAN MAC Address Filtering
284
Chapter 27 Internet Access
285
Internet Access Overview
285
IP Policies
285
IP Alias
285
IP Alias Setup
286
Figure 27-1 Physical Network
286
Figure 27-2 Partitioned Logical Networks
286
Figure 27-3 Menu 3.2 TCP/IP and DHCP Setup
287
Figure 27-4 Menu 3.2.1 IP Alias Setup
287
Route IP Setup
288
Figure 27-5 Menu 1 General Setup
288
Table 27-1 Menu 3.2.1 IP Alias Setup
288
Internet Access Configuration
289
Figure 27-6 Menu 4 Internet Access Setup
289
Table 27-2 Menu 4 Internet Access Setup
289
Advertisement
Related Products
ZyXEL Communications Prestige 642M series
ZyXEL Communications PRESTIGE 100 - VERSION 2.20
ZyXEL Communications Prestige 2864I
ZyXEL Communications Prestige 100
ZyXEL Communications Prestige 971M
ZyXEL Communications Prestige 650
ZyXEL Communications Prestige 1100
ZyXEL Communications Prestige 202H Plus
ZyXEL Communications Prestige 650 Series
ZyXEL Communications P-2301R-P1C
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL