Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
Prestige 652H series
ZyXEL Communications Prestige 652H series Manuals
Manuals and User Guides for ZyXEL Communications Prestige 652H series. We have
5
ZyXEL Communications Prestige 652H series manuals available for free PDF download: User Manual, Compact Manual, Brochure
ZyXEL Communications Prestige 652H series User Manual (583 pages)
ADSL Security/Wireless LAN Router
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 15.78 MB
Table of Contents
Copyright
2
Federal Communications Commission
3
Safety Warnings
4
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
7
List of Figures
15
Preface
27
Syntax Conventions
28
Introduction to DSL
30
Getting Started
31
Chapter 1 Getting to Know Your Prestige
33
Introducing the Prestige 652H/HW Series
33
Features of the Prestige
33
Ipsec Vpn Capability
33
Wireless Lan Mac Address Filtering
34
Wep Encryption
34
Traffic Redirect
35
Auxiliary Port
35
Dynamic Dns Support
36
Protocol Support
36
Networking Compatibility
37
Network Management
37
Diagnostics Capabilities
38
Packet Filters
38
Ease of Installation
38
Applications for the Prestige
39
Figure 1-1 Prestige Internet Access Application
39
Figure 1-2 Firewall Application
40
Figure 1-3 VPN Application
41
Figure 1-4 Prestige LAN-To-LAN Application
42
Chapter 2 Introducing the Web Configurator
43
Web Configurator Overview
43
Accessing the Prestige Web Configurator
43
Figure 2-1 Password Screen
43
Resetting the Prestige
44
Figure 2-2 Example Xmodem Upload
45
Navigating the Prestige Web Configurator
46
Figure 2-3 Web Configurator SITE MAP Screen
46
Table 2-1 Web Configurator Screens Summary
47
Chapter 3 Wizard Setup
51
Wizard Setup Introduction
51
Encapsulation
51
Multiplexing
52
VPI and VCI
52
Wizard Setup Configuration: First Screen
52
Figure 3-1 Wizard Screen 1
53
Table 3-1 Wizard Screen 1
53
IP Address and Subnet Mask
54
IP Address Assignment
54
Ip Assignment with Pppoa or Pppoe Encapsulation
55
Ip Assignment with Rfc 1483 Encapsulation
55
Ip Assignment with Enet Encap Encapsulation
55
Private Ip Addresses
55
Nailed-Up Connection (PPP)
56
Nat
56
Wizard Setup Configuration: Second Screen
56
Figure 3-2 Internet Connection with Pppoe
56
Table 3-2 Internet Connection with Pppoe
57
Figure 3-3 Internet Connection with RFC 1483
58
Table 3-3 Internet Connection with RFC 1483
58
Figure 3-4 Internet Connection with ENET ENCAP
59
Table 3-4 Internet Connection with ENET ENCAP
59
Figure 3-5 Internet Connection with Pppoa
60
Table 3-5 Internet Connection with Pppoa
60
DHCP Setup
61
Wizard Setup Configuration: Third Screen
62
Figure 3-6 Wizard Screen 3
62
Figure 3-7 Wizard : LAN Configuration
63
Table 3-6 Wizard : LAN Configuration
63
Wizard Setup Configuration: Connection Tests
64
Figure 3-8 Wizard Screen 4
64
Test Your Internet Connection
65
Password, LAN, DMZ, Wireless LAN and WAN
67
Chapter 4 Password Setup
69
Password Overview
69
Configuring Password
69
Figure 4-1 Password
69
Table 4-1 Password
69
Chapter 5 LAN Setup
71
LAN Overview
71
DNS Server Address
71
Figure 5-1 LAN and WAN IP Addresses
71
DNS Server Address Assignment
72
Lan Tcp/Ip
72
Factory Lan Defaults
72
Rip Setup
73
Configuring LAN
74
Figure 5-2 LAN
74
Table 5-1 LAN
74
Chapter 6 DMZ Screens
77
DMZ Overview
77
Configuring DMZ
77
Table 6-1 DMZ
79
Chapter 7 Wireless LAN Setup
81
Wireless LAN Overview
81
Ess ID
81
Figure 7-1 RTS/CTS
82
Levels of Security
83
Figure 7-2 Prestige Wireless Security Levels
83
Fragmentation Threshold
83
Data Encryption with WEP
84
Inserting a PCMCIA Wireless LAN Card
84
Configuring Wireless LAN
84
Table 7-1 Wireless
86
Configuring MAC Filter
87
Figure 7-4 MAC Address Filter
88
Network Authentication
89
Table 7-2 MAC Address Filter
89
Eap Authentication Overview
90
Types of Radius Messages
90
Introduction to WPA
91
Figure 7-5 EAP Authentication
91
WPA-PSK Application Example
92
WPA with RADIUS Application Example
93
Figure 7-6 WPA - PSK Authentication
93
Security Parameters Summary
94
Figure 7-7 WPA with RADIUS Application Example
94
Wireless Client WPA Supplicants
95
Configuring 802.1X and WPA
95
Table 7-3 Wireless Security Relational Matrix
95
Figure 7-8 Wireless LAN: 802.1X/Wpa
96
Table 7-4 Wireless LAN: 802.1X/Wpa
96
Figure 7-9 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
97
Table 7-5 Wireless LAN: 802.1X/Wpa for 802.1X Protocol
97
Figure 7-10 Wireless LAN: 802.1X/Wpa for WPA Protocol
99
Table 7-6 Wireless LAN: 802.1X/Wpa for WPA Protocol
99
Figure 7-11 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
101
Table 7-7 Wireless LAN: 802.1X/Wpa for WPA-PSK Protocol
101
Configuring Local User Authentication
102
Figure 7-12 Local User Database
103
Configuring RADIUS
104
Figure 7-13 RADIUS
104
Table 7-8 Local User Database
104
Configuring Roaming
105
Table 7-9 RADIUS
105
Figure 7-14 Roaming Example
106
Figure 7-15 Roaming
107
Table 7-10 Roaming
108
Chapter 8 WAN Setup
109
WAN Overview
109
Metric
109
Pppoe Encapsulation
109
Traffic Shaping
110
Configuring WAN Setup
111
Figure 8-1 Example of Traffic Shaping
111
Figure 8-2 WAN Setup
112
Table 8-1 WAN Setup
113
WAN Backup
115
Traffic Redirect
115
Configuring WAN Backup
116
Figure 8-3 Traffic Redirect Example
116
Figure 8-4 Traffic Redirect LAN Setup
116
Figure 8-5 WAN Backup
117
Table 8-2 WAN Backup
118
Configuring Advanced WAN Backup
119
Figure 8-6 Advanced WAN Backup
120
Table 8-3 Advanced WAN Backup
121
AT Command Strings
123
DTR Signal
124
Response Strings
124
Configuring Advanced Modem Setup
124
Figure 8-7 Advanced Modem Setup
125
Table 8-4 Advanced Modem Setup
125
NAT, Dynamic DNS and Time and Date
127
Chapter 9 Network Address Translation (NAT) Screens
129
NAT Overview
129
Table 9-1 NAT Definitions
129
Figure 9-1 How NAT Works
130
What Nat Does
130
Figure 9-2 NAT Application with IP Alias
131
SUA (Single User Account) Versus NAT
132
Table 9-2 NAT Mapping Types
132
SUA Server
133
Table 9-3 Services and Port Numbers
133
Figure 9-3 Multiple Servers Behind NAT Example
134
Selecting the NAT Mode
135
Figure 9-4 NAT Mode
135
Table 9-4 NAT Mode
135
Configuring SUA Server
136
Figure 9-5 Edit SUA/NAT Server Set
136
Configuring Address Mapping
137
Table 9-5 Edit SUA/NAT Server Set
137
Figure 9-6 Address Mapping Rules
138
Table 9-6 Address Mapping Rules
138
Editing an Address Mapping Rule
139
Figure 9-7 Address Mapping Rule Edit
139
Table 9-7 Address Mapping Rule Edit
140
Chapter 10 Dynamic DNS Setup
141
Dynamic DNS
141
Configuring Dynamic DNS
141
Figure 10-1 DDNS
142
Table 10-1 DDNS
142
Chapter 11 Time and Date
143
Configuring Time and Date
143
Table 11-1 Time and Date
144
Firewalls and Content Filters
147
Chapter 12 Firewalls
149
Firewall Overview
149
Types of Firewalls
149
Introduction to Zyxel's Firewall
150
Denial of Service
151
Figure 12-1 Prestige Firewall Application
151
Table 12-1 Common IP Ports
151
Types of Dos Attacks
152
Ip Spoofing
152
Figure 12-2 Three-Way Handshake
153
Figure 12-3 SYN Flood
153
Figure 12-4 Smurf Attack
154
Table 12-2 ICMP Commands that Trigger Alerts
154
Stateful Inspection
155
Table 12-3 Legal Netbios Commands
155
Table 12-4 Legal SMTP Commands
155
Figure 12-5 Stateful Inspection
156
Stateful Inspection and the Prestige
157
Tcp Security
158
Upper Layer Protocols
158
Guidelines for Enhancing Security with Your Firewall
159
Security in General
159
Packet Filtering Vs Firewall
160
When to Use the Firewall
161
Chapter 13 Firewall Screens
163
Access Methods
163
Firewall Policies Overview
163
Rule Logic Overview
164
Rule Checklist
164
Security Ramifications
165
Key Fields for Configuring Rules
165
Source Address
165
Connection Direction Examples
166
Figure 13-1 LAN to WAN Traffic
166
Configuring Firewall
167
Figure 13-2 WAN to LAN Traffic
167
Wan to Lan Rules
167
Figure 13-3 Default Policy
168
Table 13-1 Default Policy
168
Rule Summary
169
Figure 13-4 Rule Summary
170
Table 13-2 Rule Summary
170
Configuring Firewall Rules
172
Figure 13-5 Insert/Append a Firewall Rule
173
Table 13-3 Insert/Append a Firewall Rule
174
Example Firewall Rule
176
Figure 13-6 Add/Edit a Custom Port
176
Table 13-4 Add/Edit a Custom Port
176
Figure 13-7 Rule Summary
177
Figure 13-8 Rule Edit Example
178
Figure 13-9 Edit Custom Port Example
179
Figure 13-10 My Service Rule Configuration
180
Predefined Services
181
Figure 13-11 My Service Example Rule Summary
181
Table 13-5 Predefined Services
182
Anti-Probing
184
Figure 13-12 Anti-Probing
185
Table 13-6 Anti-Probing
185
Alerts
186
Configuring Attack Alert
186
Tcp Maximum Incomplete and Blocking Time
187
Figure 13-13 Firewall Threshold
188
Table 13-7 Firewall Threshold
188
Chapter 14 Content Filtering
191
Content Filtering Overview
191
Configuring Keyword Blocking
191
Figure 14-1 Content Filter: Keyword
192
Table 14-1 Content Filter: Keyword
192
Configuring the Schedule
193
Figure 14-2 Content Filter: Schedule
193
Configuring Trusted Computers
194
Figure 14-3 Content Filter: Trusted
194
Table 14-2 Content Filter: Schedule
194
Table 14-3 Content Filter: Trusted
194
Vpn/Ipsec
197
Chapter 15 Introduction to Ipsec
199
VPN Overview
199
Security Association
199
Figure 15-1 Encryption and Decryption
200
Ipsec Architecture
201
Encapsulation
201
Figure 15-2 Ipsec Architecture
201
Ipsec and NAT
202
Figure 15-3 Transport and Tunnel Mode Ipsec Encapsulation
202
Table 15-1 VPN and NAT
203
Chapter 16 VPN Screens
205
Vpn/Ipsec Overview
205
Ipsec Algorithms
205
My IP Address
206
Secure Gateway Address
206
Table 16-1 AH and ESP
206
VPN Summary Screen
207
Figure 16-1 Ipsec Summary Fields
207
Figure 16-2 VPN Summary
208
Table 16-2 VPN Summary
208
Keep Alive
209
NAT Traversal
210
Figure 16-3 NAT Router between Ipsec Routers
210
ID Type and Content
211
Figure 16-4 VPN Host Using Intranet DNS Server Example
211
Table 16-3 Local ID Type and Content Fields
212
Table 16-4 Peer ID Type and Content Fields
212
Pre-Shared Key
213
Editing VPN Policies
213
Table 16-5 Matching ID Type and Content Configuration Example
213
Table 16-6 Mismatching ID Type and Content Configuration Example
213
Figure 16-5 VPN IKE
214
Table 16-7 VPN IKE
215
IKE Phases
220
Figure 16-6 Two Phases to Set up the Ipsec SA
221
Negotiation Mode
221
Configuring Advanced IKE Settings
222
Figure 16-7 VPN IKE: Advanced Setup
223
Table 16-8 VPN IKE: Advanced Setup
223
Manual Key Setup
226
Configuring Manual Key
226
Figure 16-8 Manual Setup
227
Table 16-9 VPN Manual Setup
228
Viewing SA Monitor
230
Figure 16-9 SA Monitor
231
Configuring Global Setting
232
Figure 16-10 Global Setting
232
Table 16-10 SA Monitor
232
Telecommuter Vpn/Ipsec Examples
233
Figure 16-11 Telecommuters Sharing One VPN Rule Example
233
Table 16-11 Global Setting
233
Table 16-12 Telecommuters Sharing One VPN Rule Example
234
Figure 16-12 Telecommuters Using Unique VPN Rules Example
235
Table 16-13 Telecommuters Using Unique VPN Rules Example
235
VPN and Remote Management
236
Remote Management, Upnp and Logs
237
Advertisement
ZyXEL Communications Prestige 652H series User Manual (521 pages)
ADSL Security/Wireless LAN Router
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 12.72 MB
Table of Contents
Copyright
2
Federal Communications Commission
3
Safety Warnings
4
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
6
List of Figures
18
Preface
35
What Is DSL
37
Getting Started
38
Chapter 1 Getting to Know Your Prestige
39
Introducing the Prestige 652 Series
39
Features of the Prestige
39
Dynamic Dns Support
41
Protocol Support
42
Lan Port
44
Packet Filters
44
Applications for the Prestige
44
Figure 1-1 Prestige Internet Access Application
45
Firewall for Secure Broadband Internet Access
45
Figure 1-2 Firewall Application
46
Figure 1-3 VPN Application
47
Lan to Lan Application
47
Figure 1-4 Prestige LAN-To-LAN Application
48
Chapter 2 Introducing the Web Configurator
49
Web Configurator Overview
49
Accessing the Prestige Web Configurator
49
Navigating the Prestige Web Configurator
50
Figure 2-1 Password Screen
50
Resetting the Prestige
51
Figure 2-2 Web Configurator SITE MAP Screen
51
Using the Reset Button
51
Figure 2-3 Example Xmodem Upload
52
Chapter 3 Wizard Setup
53
Encapsulation
53
Enet Encap
53
Ppp over Ethernet
53
Wizard Setup Introduction
53
Multiplexing
54
VPI and VCI
54
Wizard Setup Configuration: First Screen
54
IP Address and Subnet Mask
56
IP Address Assignment
56
Ip Assignment with Enet Encap Encapsulation
57
Ip Assignment with Pppoa or Pppoe Encapsulation
57
Ip Assignment with Rfc 1483 Encapsulation
57
Private Ip Addresses
57
Figure 3-2 Internet Connection with Pppoe
58
Nailed-Up Connection (PPP)
58
Nat
58
Wizard Setup Configuration: Second Screen
58
Table 3-2 Internet Connection with Pppoe
59
Figure 3-3 Internet Connection with RFC 1483
60
Table 3-3 Internet Connection with RFC 1483
60
Figure 3-4 Internet Connection with ENET ENCAP
61
Table 3-4 Internet Connection with ENET ENCAP
61
Figure 3-5 Internet Connection with Pppoa
62
DHCP Setup
63
Table 3-5 Internet Connection with Pppoa
63
Ip Pool Setup
64
Wizard Setup Configuration: Third Screen
64
Figure 3-7 Wizard : LAN Configuration
65
Table 3-6 Wizard : LAN Configuration
65
Wizard Setup Configuration: Connection Tests
66
Test Your Internet Connection
67
Password, LAN, Wireless LAN and WAN
68
Chapter 4 Password Setup
69
Password Overview
69
Configuring Password
69
Chapter 5 LAN Setup
71
LAN Overview
71
DNS Server Address
71
Figure 5-1 LAN and WAN IP Addresses
71
DNS Server Address Assignment
72
Factory Lan Defaults
72
Lan Tcp/Ip
72
Rip Setup
73
Configuring LAN
74
Chapter 6 Wireless LAN Setup
77
Wireless LAN Overview
77
Figure 6-1 RTS/CTS
78
Fragmentation Threshold
79
Levels of Security
79
Figure 6-2 Prestige Wireless Security Levels
79
Data Encryption with WEP
80
Inserting a PCMCIA Wireless LAN Card
80
Configuring Wireless LAN
80
Configuring MAC Filter
82
Figure 6-4 MAC Address Filter
83
Network Authentication
84
Table 6-2 MAC Address Filter
84
Eap Authentication Overview
85
Types of Radius Messages
85
Configuring 802.1X
86
Figure 6-5 EAP Authentication
86
Figure 6-6 802.1X
86
Table 6-3 802.1X
87
Configuring Local User Authentication
88
Figure 6-7 Local User Database
89
Configuring RADIUS
90
Figure 6-8 RADIUS
90
Table 6-4 Local User Database
90
Table 6-5 RADIUS
91
Chapter 7 WAN Setup
93
WAN Overview
93
Metric
93
Pppoe Encapsulation
93
Traffic Shaping
94
Configuring WAN Setup
95
Figure 7-1 Example of Traffic Shaping
95
WAN Backup
99
Traffic Redirect
99
Figure 7-3 Traffic Redirect Setup Example
100
Figure 7-4 Traffic Redirect LAN Setup
100
Configuring WAN Backup
101
Figure 7-5 WAN Backup
101
Table 7-2 WAN Backup
101
Configuring Advanced WAN Backup
103
Figure 7-6 Advanced WAN Backup
104
Table 7-3 Advanced WAN Backup
105
AT Command Strings
107
DTR Signal
108
Response Strings
108
Configuring Advanced Modem Setup
108
Figure 7-7 Advanced Modem Setup
109
Table 7-4 Advanced Modem Setup
109
NAT, Dynamic DNS and Time Zone
111
Chapter 8 Network Address Translation (NAT) Screens
113
Nat Overview
113
Nat Definitions
113
What Nat Does
114
How Nat Works
114
Figure 8-1 How NAT Works
115
Nat Application
115
Figure 8-2 NAT Application with IP Alias
116
Nat Mapping Types
116
SUA (Single User Account) Versus NAT
117
Table 8-2 NAT Mapping Types
117
SUA Server
118
Default Server Ip Address
118
Table 8-3 Services and Port Numbers
119
Selecting the NAT Mode
120
Figure 8-3 Multiple Servers Behind NAT Example
120
Figure 8-4 NAT Mode
120
Configuring SUA Server
121
Table 8-4 NAT Mode
121
Figure 8-5 Edit SUA/NAT Server Set
122
Table 8-5 Edit SUA/NAT Server Set
122
Configuring Address Mapping
123
Figure 8-6 Address Mapping Rules
123
Editing an Address Mapping Rule
124
Table 8-6 Address Mapping Rules
124
Figure 8-7 Address Mapping Rule Edit
125
Table 8-7 Address Mapping Rule Edit
125
Chapter 9 Dynamic DNS Setup
127
Dynamic DNS
127
Dyndns Wildcard
127
Configuring Dynamic DNS
127
Figure 9-1 DDNS
128
Table 9-1 DDNS
128
Chapter 10 Time Zone
129
Configuring Time Zone
129
Figure 10-1 Time/Date
129
Table 10-1 Time/Date
130
Firewall and Content Filters
132
Chapter 11 Firewalls
134
Firewall Overview
134
Types of Firewalls
134
Packet Filtering Firewalls
134
Stateful Inspection Firewalls
135
Introduction to Zyxel's Firewall
135
Denial of Service
136
Figure 11-1 Prestige Firewall Application
136
Types of Dos Attacks
137
Table 11-1 Common IP Ports
137
Figure 11-2 Three-Way Handshake
138
Figure 11-3 SYN Flood
138
Figure 11-4 Smurf Attack
139
Table 11-2 ICMP Commands that Trigger Alerts
139
Stateful Inspection
140
Table 11-3 Legal Netbios Commands
140
Table 11-4 Legal SMTP Commands
140
Stateful Inspection Process
141
Stateful Inspection and the Prestige
142
Tcp Security
143
Upper Layer Protocols
143
Guidelines for Enhancing Security with Your Firewall
144
Security in General
144
Packet Filtering Vs Firewall
145
When to Use Filtering
145
When to Use the Firewall
146
Chapter 12 Firewall Configuration
148
Remote Management and the Firewall
148
Enabling the Firewall
148
Figure 12-1 Enabling the Firewall
148
Threshold Values
149
Attack Alert
149
Tcp Maximum Incomplete and Blocking Time
150
Figure 12-2 Attack Alert
151
Table 12-1 Attack Alert
151
Chapter 13 Creating Custom Rules
153
Rules Overview
153
Rule Checklist
153
Rule Logic Overview
153
Security Ramifications
154
Key Fields for Configuring Rules
154
Source Address
155
Connection Direction
155
Destination Address
155
Figure 13-1 LAN to WAN Traffic
155
Lan to Wan Rules
155
Wan to Lan Rules
155
Logs
156
Rule Summary
156
Figure 13-2 WAN to LAN Traffic
156
Figure 13-3 Firewall Rules Summary: First Screen
157
Table 13-1 Firewall Rules Summary: First Screen
157
Predefined Services
158
Table 13-2 Predefined Services
159
Creating/Editing Firewall Rules
161
Figure 13-4 Creating/Editing a Firewall Rule
162
Table 13-3 Creating/Editing a Firewall Rule
162
Timeout
164
Figure 13-5 Adding/Editing Source and Destination Addresses
164
Table 13-4 Adding/Editing Source and Destination Addresses
164
Figure 13-6 Timeout
165
Table 13-5 Timeout
165
Chapter 14 Customized Services
167
Introduction to Customized Services
167
Figure 14-1 Customized Services
167
Creating/Editing a Customized Service
168
Figure 14-2 Creating/Editing a Customized Service
168
Table 14-1 Customized Services
168
Example Custom Service Firewall Rule
169
Table 14-2 Creating/Editing a Customized Service
169
Figure 14-3 Configure Source IP Example
170
Figure 14-4 Customized Service for Myservice Example
170
Figure 14-5 Syslog Rule Configuration Example
171
Figure 14-6 Rule Summary Example
172
Chapter 15 Content Filtering Screens
173
Content Filtering Overview
173
Configuring Keyword Blocking
173
Figure 15-1 Content Filter: Keyword
174
Table 15-1 Content Filter: Keyword
174
Configuring the Schedule
175
Figure 15-2 Content Filter: Schedule
175
Configuring Trusted Computers
176
Figure 15-3 Content Filter: Trusted
176
Table 15-2 Content Filter: Schedule
176
Table 15-3 Content Filter: Trusted
176
Vpn/Ipsec
178
Chapter 16 Introduction to Ipsec
179
VPN Overview
179
Security Association
179
Other Terminology
179
Figure 16-1 Encryption and Decryption
180
Vpn Applications
180
Ipsec Architecture
181
Figure 16-2 VPN Application
181
Figure 16-3 Ipsec Architecture
182
Key Management
182
Encapsulation
183
Transport Mode
183
Ipsec and NAT
183
Tunnel Mode
183
Figure 16-4 Transport and Tunnel Mode Ipsec Encapsulation
183
Table 16-1 VPN and NAT
184
ZyXEL Communications Prestige 652H series User Manual (523 pages)
Prestige 652 Series ADSL Security/Wireless LAN Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 12.52 MB
Table of Contents
Copyright
2
Federal Communications Commission
3
Safety Warnings
4
Zyxel Limited Warranty
4
Customer Support
5
Table of Contents
6
List of Figures
14
Preface
26
Syntax Conventions
27
What Is DSL
28
Getting Started
29
Chapter 1 Getting to Know Your Prestige
31
Introducing the Prestige 652 Series
31
Features of the Prestige
31
Traffic Redirect
32
Auxiliary Port
32
Dynamic Dns Support
33
Protocol Support
34
Networking Compatibility
35
Applications for the Prestige
36
Figure 1-1 Prestige Internet Access Application
37
Figure 1-2 Firewall Application
38
Figure 1-3 VPN Application
39
Figure 1-4 Prestige LAN-To-LAN Application
40
Chapter 2 Introducing the Web Configurator
41
Web Configurator Overview
41
Accessing the Prestige Web Configurator
41
Navigating the Prestige Web Configurator
42
Figure 2-1 Password Screen
42
Resetting the Prestige
43
Figure 2-2 Web Configurator SITE MAP Screen
43
Figure 2-3 Example Xmodem Upload
44
Chapter 3 Wizard Setup
45
Wizard Setup Introduction
45
Encapsulation
45
Multiplexing
46
VPI and VCI
46
Wizard Setup Configuration: First Screen
46
Figure 3-1 Wizard Screen 1
47
Table 3-1 Wizard Screen 1
47
IP Address and Subnet Mask
48
IP Address Assignment
48
Ip Assignment with Pppoa or Pppoe Encapsulation
49
Ip Assignment with Rfc 1483 Encapsulation
49
Ip Assignment with Enet Encap Encapsulation
49
Private Ip Addresses
49
Nailed-Up Connection (PPP)
50
Nat
50
Wizard Setup Configuration: Second Screen
50
Figure 3-2 Internet Connection with Pppoe
50
Table 3-2 Internet Connection with Pppoe
51
Figure 3-3 Internet Connection with RFC 1483
52
Table 3-3 Internet Connection with RFC 1483
52
Figure 3-4 Internet Connection with ENET ENCAP
53
Table 3-4 Internet Connection with ENET ENCAP
53
Figure 3-5 Internet Connection with Pppoa
54
DHCP Setup
55
Table 3-5 Internet Connection with Pppoa
55
Wizard Setup Configuration: Third Screen
56
Figure 3-6 Wizard Screen 3
56
Figure 3-7 Wizard : LAN Configuration
57
Table 3-6 Wizard : LAN Configuration
57
Wizard Setup Configuration: Connection Tests
58
Figure 3-8 Wizard Screen 4
58
Test Your Internet Connection
59
Password, LAN, Wireless LAN and WAN
61
Chapter 4 Password Setup
63
Password Overview
63
Configuring Password
63
Figure 4-1 Password
63
Table 4-1 Password
63
Chapter 5 LAN Setup
65
LAN Overview
65
DNS Server Address
65
Figure 5-1 LAN and WAN IP Addresses
65
DNS Server Address Assignment
66
Lan Tcp/Ip
66
Rip Setup
67
Configuring LAN
68
Chapter 6 Wireless LAN Setup
71
Wireless LAN Overview
71
Figure 6-1 RTS/CTS
72
Levels of Security
73
Figure 6-2 Prestige Wireless Security Levels
73
Data Encryption with WEP
74
Inserting a PCMCIA Wireless LAN Card
74
Configuring Wireless LAN
74
Configuring MAC Filter
76
Figure 6-4 MAC Address Filter
77
Network Authentication
78
Table 6-2 MAC Address Filter
78
Eap Authentication Overview
79
Types of Radius Messages
79
Configuring 802.1X
80
Figure 6-5 EAP Authentication
80
Figure 6-6 802.1X
80
Table 6-3 802.1X
81
Configuring Local User Authentication
82
Figure 6-7 Local User Database
83
Configuring RADIUS
84
Figure 6-8 RADIUS
84
Table 6-4 Local User Database
84
Table 6-5 RADIUS
85
Chapter 7 WAN Setup
87
WAN Overview
87
Metric
87
Pppoe Encapsulation
87
Traffic Shaping
88
Configuring WAN Setup
89
Figure 7-1 Example of Traffic Shaping
89
Figure 7-2 WAN Setup
90
Table 7-1 WAN Setup
91
WAN Backup
93
Traffic Redirect on the LAN
93
Traffic Redirect on the WAN
94
Figure 7-3 Traffic Redirect Setup Example
94
Figure 7-4 Traffic Redirect WAN Setup
94
Configuring WAN Backup
95
Figure 7-5 Traffic Redirect LAN Setup
95
Figure 7-6 WAN Backup
96
Table 7-2 WAN Backup
96
Configuring Advanced WAN Backup
98
Figure 7-7 Advanced WAN Backup
99
Table 7-3 Advanced WAN Backup
100
AT Command Strings
102
DTR Signal
103
Response Strings
103
Configuring Advanced Modem Setup
103
Figure 7-8 Advanced Modem Setup
104
Table 7-4 Advanced Modem Setup
104
NAT, Dynamic DNS and Time Zone
107
Chapter 8 Network Address Translation (NAT) Screens
109
NAT Overview
109
Table 8-1 NAT Definitions
109
How Nat Works
110
What Nat Does
110
Figure 8-1 How NAT Works
111
Figure 8-2 NAT Application with IP Alias
112
SUA (Single User Account) Versus NAT
113
Table 8-2 NAT Mapping Types
113
SUA Server
114
Table 8-3 Services and Port Numbers
115
Selecting the NAT Mode
116
Figure 8-3 Multiple Servers Behind NAT Example
116
Figure 8-4 NAT Mode
116
Configuring SUA Server
117
Table 8-4 NAT Mode
117
Figure 8-5 Edit SUA/NAT Server Set
118
Table 8-5 Edit SUA/NAT Server Set
118
Configuring Address Mapping
119
Figure 8-6 Address Mapping Rules
119
Editing an Address Mapping Rule
120
Table 8-6 Address Mapping Rules
120
Figure 8-7 Address Mapping Rule Edit
121
Table 8-7 Address Mapping Rule Edit
121
Chapter 9 Dynamic DNS Setup
123
Dynamic DNS
123
Configuring Dynamic DNS
123
Figure 9-1 DDNS
124
Table 9-1 DDNS
124
Chapter 10 Time Zone
125
Configuring Time Zone
125
Figure 10-1 Time/Date
125
Table 10-1 Time/Date
126
Firewall and Content Filters
129
Chapter 11 Firewalls
131
Firewall Overview
131
Types of Firewalls
131
Introduction to Zyxel's Firewall
132
Denial of Service
133
Figure 11-1 Prestige Firewall Application
133
Table 11-1 Common IP Ports
134
Figure 11-2 Three-Way Handshake
135
Figure 11-3 SYN Flood
135
Figure 11-4 Smurf Attack
136
Table 11-2 ICMP Commands that Trigger Alerts
136
Stateful Inspection
137
Table 11-3 Legal Netbios Commands
137
Table 11-4 Legal SMTP Commands
137
Figure 11-5 Stateful Inspection
138
Stateful Inspection and the Prestige
139
Tcp Security
140
Upper Layer Protocols
140
Guidelines for Enhancing Security with Your Firewall
141
Security in General
141
Packet Filtering Vs Firewall
142
When to Use the Firewall
143
Chapter 12 Firewall Configuration
145
Remote Management and the Firewall
145
Enabling the Firewall
145
Figure 12-1 Enabling the Firewall
145
Attack Alert
146
Tcp Maximum Incomplete and Blocking Time
147
Figure 12-2 Attack Alert
148
Table 12-1 Attack Alert
148
Chapter 13 Creating Custom Rules
151
Rules Overview
151
Rule Logic Overview
151
Security Ramifications
152
Key Fields for Configuring Rules
152
Connection Direction
153
Figure 13-1 LAN to WAN Traffic
153
Logs
154
Rule Summary
154
Figure 13-2 WAN to LAN Traffic
154
Figure 13-3 Firewall Rules Summary: First Screen
155
Table 13-1 Firewall Rules Summary: First Screen
155
Predefined Services
156
Table 13-2 Predefined Services
157
Creating/Editing Firewall Rules
159
Figure 13-4 Creating/Editing a Firewall Rule
160
Table 13-3 Creating/Editing a Firewall Rule
160
Source and Destination Addresses
161
Timeout
162
Figure 13-5 Adding/Editing Source and Destination Addresses
162
Table 13-4 Adding/Editing Source and Destination Addresses
162
Figure 13-6 Timeout
163
Table 13-5 Timeout
163
Chapter 14 Customized Services
165
Introduction to Customized Services
165
Figure 14-1 Customized Services
165
Creating/Editing a Customized Service
166
Figure 14-2 Creating/Editing a Customized Service
166
Table 14-1 Customized Services
166
Example Custom Service Firewall Rule
167
Table 14-2 Creating/Editing a Customized Service
167
Figure 14-3 Configure Source IP Example
168
Figure 14-4 Customized Service for Myservice Example
168
Figure 14-5 Syslog Rule Configuration Example
169
Figure 14-6 Rule Summary Example
170
Chapter 15 Content Filtering Screens
171
Content Filtering Overview
171
Configuring Keyword Blocking
171
Figure 15-1 Content Filter: Keyword
172
Table 15-1 Content Filter: Keyword
172
Configuring the Schedule
173
Figure 15-2 Content Filter: Schedule
173
Configuring Trusted Computers
174
Figure 15-3 Content Filter: Trusted
174
Table 15-2 Content Filter: Schedule
174
Table 15-3 Content Filter: Trusted
174
Vpn/Ipsec
177
Chapter 16 Introduction to Ipsec
179
VPN Overview
179
Security Association
179
Figure 16-1 Encryption and Decryption
180
Ipsec Architecture
181
Figure 16-2 VPN Application
181
Figure 16-3 Ipsec Architecture
182
Encapsulation
183
Ipsec and NAT
183
Figure 16-4 Transport and Tunnel Mode Ipsec Encapsulation
183
Table 16-1 VPN and NAT
184
Chapter 17 VPN Screens
185
Vpn/Ipsec Overview
185
Ipsec Algorithms
185
My IP Address
186
Secure Gateway Address
186
Table 17-1 AH and ESP
186
VPN Summary Screen
187
Figure 17-1 Ipsec Summary Fields
187
Figure 17-2 VPN Summary
188
Table 17-2 VPN Summary
188
Keep Alive
189
ID Type and Content
189
Table 17-3 Local ID Type and Content Fields
190
Table 17-4 Peer ID Type and Content Fields
190
Table 17-5 Matching ID Type and Content Configuration Example
190
Pre-Shared Key
191
Editing VPN Policies
191
Table 17-6 Mismatching ID Type and Content Configuration Example
191
Figure 17-3 VPN IKE
192
Table 17-7 VPN IKE
193
IKE Phases
197
Figure 17-4 Two Phases to Set up the Ipsec SA
197
Configuring Advanced IKE Settings
198
Figure 17-5 VPN IKE: Advanced
199
Table 17-8 VPN IKE: Advanced
199
Manual Key Setup
202
Configuring Manual Key
203
Figure 17-6 Manual Setup
203
Table 17-9 VPN Manual Setup
204
Viewing SA Monitor
206
Figure 17-7 SA Monitor
207
Table 17-10 SA Monitor
207
Configuring Global Setting
208
Figure 17-8 Global Setting
208
Table 17-11 Global Setting
208
Telecommuter Vpn/Ipsec Examples
209
Table 17-12 Telecommuter and Headquarters Configuration Example
209
Figure 17-9 Telecommuters Sharing One VPN Rule Example
210
VPN and Remote Management
211
Figure 17-10 Telecommuters Using Unique VPN Rules Example
211
Remote Management, Upnp and Logs
213
Advertisement
ZyXEL Communications Prestige 652H series Compact Manual (36 pages)
ADSL Security/Wireless LAN Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 1.76 MB
Table of Contents
1 Introducing the Prestige
2
Table of Contents
2
2 Hardware
3
Rear Panel Connections
4
Inserting a PCMCIA Wireless LAN Card
5
The Front Panel Leds
5
3 Setting up Your Computer's IP Address
7
Windows 2000/NT/XP
7
Checking/Updating Your Computer's IP Address
8
Testing the Connection to the Prestige
9
4 Configuring Your Prestige
9
Accessing Your Prestige Via Web Configurator
9
Common Screen Command Buttons
11
Wizard Internet Access Configuration
11
Figure 7 Internet Connection with Pppoe
12
Figure 8 Internet Connection with Rfc 1483
12
Test Your Internet Connection
15
5 Advanced Configuration
15
Wireless LAN Setup
15
Wireless LAN Security Setup
17
Network Address Translation Overview
19
Configuring SUA Server
19
Firewall Overview
21
Enabling the Firewall
22
Procedure for Configuring Firewall Rules
23
Configuring Source and Destination Addresses
26
VPN Overview
27
Summary Screen
27
Configuring VPN Policies
29
Viewing SA Monitor
34
Upnp Overview
34
Configuring Upnp
34
6 Troubleshooting
36
ZyXEL Communications Prestige 652H series Brochure (2 pages)
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 0.18 MB
Advertisement
Related Products
ZyXEL Communications Prestige 652H/HW
ZyXEL Communications PRESTIGE 652HI -
ZyXEL Communications Prestige 652HW series
ZyXEL Communications PRESTIGE 652HWI -
ZyXEL Communications Prestige 652H-31
ZyXEL Communications Prestige 652H-33
ZyXEL Communications Prestige 652H-37
ZyXEL Communications Prestige 652HW-31
ZyXEL Communications Prestige 652HW-33
ZyXEL Communications Prestige 652HW-37
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL