Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
Prestige 661H Series
ZyXEL Communications Prestige 661H Series Manuals
Manuals and User Guides for ZyXEL Communications Prestige 661H Series. We have
3
ZyXEL Communications Prestige 661H Series manuals available for free PDF download: User Manual, Quick Start Manual
ZyXEL Communications Prestige 661H Series User Manual (547 pages)
ADSL 2+ Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 15 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Safety Warnings
4
Zyxel Limited Warranty
5
Customer Support
6
Table of Contents
8
List of Figures
24
List of Tables
32
Preface
38
Introduction to DSL
40
Chapter 1 Getting to Know Your Prestige
42
Introducing the Prestige
42
Table 1 ADSL Standards
42
Features of the Prestige
43
Traffic Redirect
44
Dynamic Dns Support
45
P-661HW Wireless Features
46
Applications for the Prestige
47
Protected Internet Access
47
LAN to LAN Application
48
Figure 1 Protected Internet Access Applications
48
Figure 2 P-661HW LAN-To-LAN Application Example
49
Figure 3 P-661H Front Panel
49
Figure 4 P-661HW Front Panel
49
Front Panel Leds
49
Table 2 Front Panel Leds
49
Chapter 2 Introducing the Web Configurator
52
Web Configurator Overview
52
Accessing the Prestige Web Configurator
52
Resetting the Prestige
53
Using the Reset Button
53
Figure 5 Password Screen
53
Figure 6 Change Password at Login
53
Navigating the Prestige Web Configurator
54
Figure 7 Web Configurator: P-661HW Site Map Screen
55
Table 3 Web Configurator Screens Summary
55
Figure 8 Password
57
Table 4 Password
57
Chapter 3 Wizard Setup for Internet Access
58
Introduction
58
Internet Access Wizard Setup
58
Figure 9 Internet Access Wizard Setup: ISP Parameters
59
Table 5 Internet Access Wizard Setup: ISP Parameters
59
Figure 10 Internet Connection with Pppoe
60
Table 6 Internet Connection with Pppoe
60
Figure 11 Internet Connection with RFC 1483
61
Table 7 Internet Connection with RFC 1483
61
Figure 12 Internet Connection with ENET ENCAP
62
Table 8 Internet Connection with ENET ENCAP
62
Figure 13 Internet Connection with Pppoa
63
Table 9 Internet Connection with Pppoa
63
Figure 14 Internet Access Wizard Setup: Third Screen
64
Figure 15 Internet Access Wizard Setup: LAN Configuration
65
Table 10 Internet Access Wizard Setup: LAN Configuration
65
Figure 16 Internet Access Wizard Setup: Connection Tests
66
Chapter 4 Wizard Setup for Media Bandwidth Management
68
Introduction
68
Predefined Media Bandwidth Management Services
68
Table 11 Media Bandwidth Mgnt. Wizard Setup: Services
68
Media Bandwidth Management Setup
69
Figure 17 Media Bandwidth Mgnt. Wizard Setup
69
Figure 18 Media Bandwidth Mgnt. Wizard Setup: Second Screen
70
Table 12 Media Bandwidth Mgnt. Wizard Setup: First Screen
70
Table 13 Media Bandwidth Mgnt. Wizard Setup: Second Screen
70
Figure 19 Media Bandwidth Mgnt. Wizard Setup: Finish
71
Chapter 5 LAN Setup
72
LAN Overview
72
Lans, Wans and the Prestige
72
DHCP Setup
72
Figure 20 LAN and WAN IP Addresses
72
IP Pool Setup
73
DNS Server Address
73
DNS Server Address Assignment
73
Lan Tcp/Ip
74
IP Address and Subnet Mask
74
Private IP Addresses
74
RIP Setup
75
Multicast
75
Any IP
76
Figure 21 any IP Example
76
How any IP Works
77
Configuring LAN
77
Figure 22 LAN Setup
78
Table 14 LAN Setup
78
Configuring Static DHCP
79
Figure 23 LAN: Static DHCP
80
Table 15 LAN: Static DHCP
80
Chapter 6 Wireless LAN (Prestige 661HW)
82
Introduction
82
Wireless Security Overview
82
Encryption
82
Authentication
82
Restricted Access
83
Hide Prestige Identity
83
Configuring Wireless LAN on the Prestige
83
Configuring the Wireless Screen
84
WEP Encryption
84
Wireless G
84
Figure 24 Wireless Security Methods
84
Figure 25 Wireless Screen
85
Table 16 Wireless LAN
85
Configuring MAC Filters
87
Figure 26 MAC Address Filter
87
Introduction to WPA
88
WPA-PSK Application Example
88
Table 17 MAC Address Filter
88
WPA with RADIUS Application Example
89
Figure 27 WPA - PSK Authentication
89
Wireless Client WPA Supplicants
90
Configuring IEEE 802.1X and WPA
90
Figure 28 WPA with RADIUS Application Example2
90
Authentication Required: 802.1X
91
Figure 29 Wireless LAN: 802.1X/Wpa: no Access Allowed
91
Figure 30 Wireless LAN: 802.1X/Wpa: no Authentication
91
Table 18 Wireless LAN: 802.1X/Wpa: no Access/Authentication
91
Figure 31 Wireless LAN: 802.1X/Wpa: 802.1Xl
92
Table 19 Wireless LAN: 802.1X/Wpa: 802.1X
92
Authentication Required: WPA
93
Figure 32 Wireless LAN: 802.1X/Wpa: WPA
94
Table 20 Wireless LAN: 802.1X/Wpa: WPA
94
Authentication Required: WPA-PSK
95
Figure 33 Wireless LAN: 802.1X/Wpa:wpa-PSK
95
Table 21 Wireless LAN: 802.1X/Wpa: WPA-PSK
95
Configuring Local User Authentication
96
Figure 34 Local User Database
96
Table 22 Local User Database
96
Configuring RADIUS
97
Figure 35 RADIUS
97
Table 23 RADIUS
97
Introduction to OTIST
98
Enabling OTIST
98
Figure 36 OTIST
99
Table 24 OTIST
99
Wireless Client
100
Starting OTIST
100
Figure 37 Example Wireless Client OTIST Screen
100
Figure 38 Security Key
100
Figure 39 OTIST in Progress (Prestige)
100
Figure 40 OTIST in Progress (Client)
100
Notes on OTIST
101
Figure 41 no AP with OTIST Found
101
Figure 42 Start OTIST
101
Chapter 7 WAN Setup
102
WAN Overview
102
Encapsulation
102
Enet Encap
102
PPP over Ethernet
102
Pppoa
102
Rfc 1483
103
Multiplexing
103
VC-Based Multiplexing
103
LLC-Based Multiplexing
103
VPI and VCI
103
IP Address Assignment
103
IP Assignment with Pppoa or Pppoe Encapsulation
103
IP Assignment with RFC 1483 Encapsulation
104
IP Assignment with ENET ENCAP Encapsulation
104
Nailed-Up Connection (PPP)
104
Nat
104
Metric
104
Pppoe Encapsulation
105
Traffic Shaping
105
Zero Configuration Internet Access
106
Figure 43 Example of Traffic Shaping
106
Configuring WAN Setup
107
Figure 44 WAN Setup (Pppoe)
108
Table 25 WAN Setup
108
Traffic Redirect
110
Configuring WAN Backup
111
Figure 45 Traffic Redirect Example
111
Figure 46 Traffic Redirect LAN Setup
111
Figure 47 WAN Backup
112
Table 26 WAN Backup
112
Chapter 8 Network Address Translation (NAT) Screens
114
NAT Overview
114
NAT Definitions
114
Table 27 NAT Definitions
114
What NAT Does
115
How NAT Works
115
NAT Application
116
Figure 48 How NAT Works
116
Figure 49 NAT Application with IP Alias
116
NAT Mapping Types
117
Table 28 NAT Mapping Types
117
SUA (Single User Account) Versus NAT
118
SUA Server
118
Default Server IP Address
118
Port Forwarding: Services and Port Numbers
118
Table 29 Services and Port Numbers
118
Configuring Servers Behind SUA (Example)
119
Selecting the NAT Mode
119
Figure 50 Multiple Servers Behind NAT Example
119
Configuring SUA Server
120
Figure 51 NAT Mode
120
Table 30 NAT Mode
120
Figure 52 Edit SUA/NAT Server Set
121
Table 31 Edit SUA/NAT Server Set
121
Configuring Address Mapping
122
Figure 53 Address Mapping Rules
122
Table 32 Address Mapping Rules
122
Editing an Address Mapping Rule
123
Figure 54 Address Mapping Rule Edit
123
Table 33 Address Mapping Rule Edit
124
Chapter 9 Dynamic DNS Setup
126
Dynamic DNS
126
DYNDNS Wildcard
126
Configuring Dynamic DNS
126
Figure 55 Dynamic DNS
127
Table 34 Dynamic DNS
127
Chapter 10 Time and Date
128
Configuring Time and Date
128
Figure 56 Time and Date
128
Table 35 Time and Date
129
Chapter 11 Firewalls
130
Firewall Overview
130
Types of Firewalls
130
Packet Filtering Firewalls
130
Application-Level Firewalls
130
Stateful Inspection Firewalls
131
Introduction to Zyxel's Firewall
131
Denial of Service Attacks
132
Denial of Service
132
Basics
132
Figure 57 Prestige Firewall Application
132
Types of Dos Attacks
133
Table 36 Common IP Ports
133
Figure 58 Three-Way Handshake
134
Figure 59 SYN Flood
134
Figure 60 Smurf Attack
135
ICMP Vulnerability
135
Illegal Commands (Netbios and SMTP)
135
Table 37 ICMP Commands that Trigger Alerts
135
Table 38 Legal Netbios Commands
135
Traceroute
136
Stateful Inspection
136
Table 39 Legal SMTP Commands
136
Figure 61 Stateful Inspection
137
Stateful Inspection Process
137
Stateful Inspection and the Prestige
138
TCP Security
138
UDP/ICMP Security
139
Upper Layer Protocols
139
Guidelines for Enhancing Security with Your Firewall
139
Security in General
140
Packet Filtering Vs Firewall
141
Packet Filtering
141
When to Use Filtering
141
Firewall
141
When to Use the Firewall
141
Chapter 12 Firewall Configuration
144
Access Methods
144
Firewall Policies Overview
144
Rule Logic Overview
145
Rule Checklist
145
Security Ramifications
145
Key Fields for Configuring Rules
146
Action
146
Service
146
Source Address
146
Destination Address
146
Connection Direction
146
LAN to WAN Rules
146
Alerts
147
Configuring Basic Firewall Settings
147
Figure 62 Firewall: Default Policy
147
Table 40 Firewall: Default Policy
147
Rule Summary
148
Figure 63 Firewall: Rule Summary
148
Table 41 Rule Summary
149
Configuring Firewall Rules
150
Figure 64 Firewall: Edit Rule
151
Table 42 Firewall: Edit Rule
152
Customized Services
153
Creating/Editing a Customized Service
153
Figure 65 Firewall: Customized Services
153
Table 43 Customized Services
153
Example Firewall Rule
154
Figure 66 Firewall: Configure Customized Services
154
Table 44 Firewall: Configure Customized Services
154
Figure 67 Firewall Example: Rule Summary
155
Figure 68 Firewall Example: Edit Rule: Destination Address
156
Figure 69 Edit Custom Port Example
156
Figure 70 Firewall Example: Edit Rule: Select Customized Services
157
Predefined Services
158
Figure 71 Firewall Example: Rule Summary: My Service
158
Table 45 Predefined Services
158
Anti-Probing
160
Dos Thresholds
161
Figure 72 Firewall: Anti Probing
161
Table 46 Firewall: Anti Probing
161
Half-Open Sessions
162
TCP Maximum Incomplete and Blocking Time
162
Figure 73 Firewall: Threshold
163
Table 47 Firewall: Threshold
163
Threshold Values
162
Chapter 13 Content Filtering
166
Content Filtering Overview
166
Configuring Keyword Blocking
166
Figure 74 Content Filter: Keyword
166
Configuring the Schedule
167
Figure 75 Content Filter: Schedule
167
Table 48 Content Filter: Keyword
167
Configuring Trusted Computers
168
Figure 76 Content Filter: Trusted
168
Table 49 Content Filter: Schedule
168
Table 50 Content Filter: Trusted
168
Chapter 14 Introduction to Ipsec
170
VPN Overview
170
Ipsec
170
Security Association
170
Other Terminology
170
Encryption
170
Data Confidentiality
171
Data Integrity
171
Data Origin Authentication
171
VPN Applications
171
Ipsec Architecture
171
Figure 77 Encryption and Decryption
171
Ipsec Algorithms
172
Key Management
172
Encapsulation
172
Figure 78 Ipsec Architecture
172
Transport Mode
173
Tunnel Mode
173
Ipsec and NAT
173
Figure 79 Transport and Tunnel Mode Ipsec Encapsulation
173
Table 51 VPN and NAT
174
Chapter 15 VPN Screens
176
Vpn/Ipsec Overview
176
Ipsec Algorithms
176
AH (Authentication Header) Protocol
176
ESP (Encapsulating Security Payload) Protocol
177
My IP Address
177
Table 52 AH and ESP
177
Secure Gateway Address
178
Dynamic Secure Gateway Address
178
VPN Summary Screen
178
Figure 80 Ipsec Summary Fields
179
Figure 81 VPN Summary
179
Table 53 VPN Summary
179
Keep Alive
180
Remote DNS Server
180
ID Type and Content
181
Figure 82 VPN Host Using Intranet DNS Server Example
181
ID Type and Content Examples
182
Table 54 Local ID Type and Content Fields
182
Table 55 Peer ID Type and Content Fields
182
Table 56 Matching ID Type and Content Configuration Example
182
Pre-Shared Key
183
Editing VPN Policies
183
Table 57 Mismatching ID Type and Content Configuration Example
183
Figure 83 VPN IKE
184
Table 58 VPN IKE
185
IKE Phases
188
Figure 84 Two Phases to Set up the Ipsec SA
188
Diffie-Hellman (DH) Key Groups
189
Negotiation Mode
189
Perfect Forward Secrecy (PFS)
190
Configuring Advanced IKE Settings
190
Figure 85 VPN IKE: Advanced Setup
191
Table 59 VPN IKE: Advanced Setup
191
Manual Key Setup
193
Security Parameter Index (SPI)
193
Configuring Manual Key
194
Figure 86 VPN: Manual Key
194
Table 60 VPN: Manual Key
195
Viewing SA Monitor
197
Figure 87 VPN: SA Monitor
197
Configuring Global Setting
198
Figure 88 VPN: Global Setting
198
Table 61 VPN: SA Monitor
198
Table 62 VPN: Global Setting
198
Telecommuter Vpn/Ipsec Examples
199
Telecommuters Sharing One VPN Rule Example
199
Figure 89 Telecommuters Sharing One VPN Rule Example
199
Telecommuters Using Unique VPN Rules Example
200
Table 63 Telecommuters Sharing One VPN Rule Example
200
Figure 90 Telecommuters Using Unique VPN Rules Example
201
Table 64 Telecommuters Using Unique VPN Rules Example
201
VPN and Remote Management
202
Chapter 16 Remote Management Configuration
204
Remote Management Overview
204
Remote Management Limitations
204
Remote Management and NAT
205
System Timeout
205
Telnet
205
Ftp
205
Figure 91 Telnet Configuration on a TCP/IP Network
205
Web
206
Configuring Remote Management
206
Figure 92 Remote Management
206
Table 65 Remote Management
206
Chapter 17 Universal Plug-And-Play (Upnp)
208
Introducing Universal Plug and Play
208
How Do I Know if I'M Using Upnp
208
NAT Traversal
208
Cautions with Upnp
208
Upnp and Zyxel
209
Configuring Upnp
209
Figure 93 Configuring Upnp
209
Installing Upnp in Windows Example
210
Table 66 Configuring Upnp
210
Figure 94 Add/Remove Programs: Windows Setup: Communication
211
Figure 95 Add/Remove Programs: Windows Setup: Communication: Components
211
Figure 96 Network Connections
212
Figure 97 Windows Optional Networking Components Wizard
213
Using Upnp in Windows XP Example
214
Figure 98 Networking Services
214
Figure 99 Network Connections
215
Figure 100 Internet Connection Properties
216
Figure 101 Internet Connection Properties: Advanced Settings
217
Figure 102 Internet Connection Properties: Advanced Settings: Add
217
Figure 103 System Tray Icon
218
Figure 104 Internet Connection Status
218
Figure 105 Network Connections
219
Figure 106 Network Connections: My Network Places
220
Figure 107 Network Connections: My Network Places: Properties: Example
220
Chapter 18 Logs Screens
222
Logs Overview
222
Alerts and Logs
222
Configuring Log Settings
222
Figure 108 Log Settings
223
Table 67 Log Settings
223
Displaying the Logs
224
SMTP Error Messages
225
Figure 109 View Logs
225
Table 68 View Logs
225
Table 69 SMTP Error Messages
225
Example E-Mail Log
226
Figure 110 E-Mail Log Example
226
Chapter 19 Media Bandwidth Management Advanced Setup
228
Bandwidth Management Advanced Setup Overview
228
Bandwidth Classes and Filters
228
Proportional Bandwidth Allocation
229
Bandwidth Management Usage Examples
229
Application-Based Bandwidth Management Example
229
Subnet-Based Bandwidth Management Example
229
Figure 111 Application-Based Bandwidth Management Example
229
Application and Subnet-Based Bandwidth Management Example
230
Figure 112 Subnet-Based Bandwidth Management Example
230
Figure 113 Application and Subnet-Based Bandwidth Management Example
230
Table 70 Application and Subnet-Based Bandwidth Management Example
230
Scheduler
231
Priority-Based Scheduler
231
Fairness-Based Scheduler
231
Maximize Bandwidth Usage
231
Reserving Bandwidth for Non-Bandwidth Class Traffic
231
Maximize Bandwidth Usage Example
232
Figure 114 Bandwidth Allotment Example
232
Bandwidth Borrowing
233
Maximize Bandwidth Usage with Bandwidth Borrowing
233
Figure 115 Maximize Bandwidth Usage Example
233
Configuring Summary
234
Figure 116 Media Bandwidth Management: Summary
234
Table 71 Media Bandwidth Management: Summary
234
Configuring Class Setup
235
Figure 117 Media Bandwidth Management: Class Setup
235
Table 72 Media Bandwidth Management: Class Setup
235
Media Bandwidth Management Class Configuration
236
Figure 118 Media Bandwidth Management: Class Configuration
237
Table 73 Media Bandwidth Management: Class Configuration
237
Figure 119 Media Bandwidth Management Statistics
239
Media Bandwidth Management Statistics
239
Table 74 Services and Port Numbers
239
Table 75 Media Bandwidth Management Statistics
239
Bandwidth Monitor
240
Figure 120 Media Bandwidth Management: Monitor
240
Table 76 Media Bandwidth Management: Monitor
240
Chapter 20 Trend Micro Security Services
242
Trend Micro Security Services Overview
242
TMSS Web Page
242
Figure 121 TMSS First Time Access
242
Figure 122 Download Activex to View TMSS Web Page
243
Figure 123 TMSS Web Page (Dashboard)
243
Figure 124 TMSS Service Summary
243
Figure 125 TMSS 3 Steps
244
Figure 126 TMSS Registration Form
244
Configuring TMSS on the Prestige
245
Figure 127 Example TMSS Activated Service Summary Screen
245
Figure 128 Example TMSS Activated Parental Controls Screen
245
Figure 129 TMSS Main Screen
246
Figure 130 TMSS Service Settings
246
TMSS Service Settings
246
Configuring Virus Protection
247
Figure 131 Virus Protection
247
Table 77 Service Settings
247
Table 78 Virus Protection
248
Parental Controls Configuration
249
Figure 132 no Parental Controls License
249
Figure 133 Parental Controls
250
Table 79 Parental Controls
250
Figure 134 Parental Controls Statistics
252
Parental Controls Statistics
252
Table 80 Parental Controls Statistics
252
Chapter 21 Maintenance
254
Maintenance Overview
254
System Status Screen
254
Figure 135 System Status
255
Table 81 System Status
255
System Statistics
256
Figure 136 System Status: Show Statistics
257
Table 82 System Status: Show Statistics
257
DHCP Table Screen
258
Figure 137 DHCP Table
258
Table 83 DHCP Table
258
Any IP Table Screen
259
Wireless Screen
259
Association List
259
Figure 138 any IP Table
259
Table 84 any IP Table
259
Diagnostic Screens
260
Diagnostic General Screen
260
Figure 139 Association List
260
Table 85 Association List
260
Diagnostic DSL Line Screen
261
Figure 140 Diagnostic: General
261
Table 86 Diagnostic: General
261
Figure 141 Diagnostic: DSL Line
262
Table 87 Diagnostic: DSL Line
262
Firmware Screen
263
Figure 142 Firmware Upgrade
263
Table 88 Firmware Upgrade
263
Figure 143 Network Temporarily Disconnected
264
Figure 144 Error Message
264
Chapter 22 Introducing the SMT
266
SMT Introduction
266
Procedure for SMT Configuration Via Telnet
266
Entering Password
266
Prestige SMT Menus Overview
267
Figure 145 Login Screen
267
Table 89 SMT Menus Overview
267
Navigating the SMT Interface
268
Table 90 Navigating the SMT Interface
268
Table 91 SMT Main Menu
269
System Management Terminal Interface Summary
270
Changing the System Password
270
Table 92 Main Menu Summary
270
Figure 146 Menu 23.1 Change Password
271
Chapter 23 Menu 1 General Setup
272
General Setup
272
Procedure to Configure Menu 1
272
Procedure to Configure Dynamic DNS
273
Figure 147 Menu 1 General Setup
273
Table 93 Menu 1 General Setup
273
Figure 148 Menu 1.1 Configure Dynamic DNS
274
Table 94 Menu 1.1 Configure Dynamic DNS
274
Chapter 24 Menu 2 WAN Backup Setup
276
Introduction to WAN Backup Setup
276
Configuring WAN Backup in Menu 2
276
Figure 149 Menu 2 WAN Backup Setup
276
Table 95 Menu 2 WAN Backup Setup
276
Figure 150 Menu 2.1Traffic Redirect Setup
277
Table 96 Menu 2.1Traffic Redirect Setup
277
Traffic Redirect Setup
277
Chapter 25 Menu 3 LAN Setup
280
LAN Setup
280
General Ethernet Setup
280
Figure 151 Menu 3 LAN Setup
280
Figure 152 Menu 3.1 LAN Port Filter Setup
280
Protocol Dependent Ethernet Setup
281
TCP/IP Ethernet Setup and DHCP
281
Figure 153 Menu 3.2 TCP/IP and DHCP Ethernet Setup
281
Table 97 DHCP Ethernet Setup
282
Table 98 TCP/IP Ethernet Setup
282
Chapter 26 Wireless LAN Setup
284
Wireless LAN Overview
284
Wireless LAN Setup
284
Figure 154 Menu 3.5 - Wireless LAN Setup
284
Table 99 Menu 3.5 - Wireless LAN Setup
284
Wireless LAN MAC Address Filter
285
Figure 155 Menu 3.5.1 WLAN MAC Address Filtering
286
Table 100 Menu 3.5.1 WLAN MAC Address Filtering
286
Chapter 27 Internet Access
288
Internet Access Overview
288
IP Policies
288
IP Alias
288
IP Alias Setup
289
Figure 156 IP Alias Network Example
289
Figure 157 Menu 3.2 TCP/IP and DHCP Setup
289
Route IP Setup
290
Figure 158 Menu 3.2.1 IP Alias Setup
290
Table 101 Menu 3.2.1 IP Alias Setup
290
Internet Access Configuration
291
Figure 159 Menu 1 General Setup
291
Figure 160 Menu 4 Internet Access Setup
291
Table 102 Menu 4 Internet Access Setup
292
Chapter 28 Remote Node Configuration
294
Remote Node Setup Overview
294
Remote Node Setup
294
Remote Node Profile
294
Encapsulation and Multiplexing Scenarios
295
Scenario 1: One VC, Multiple Protocols
295
Scenario 2: One VC, One Protocol (IP)
295
Scenario 3: Multiple Vcs
295
Figure 161 Menu 11 Remote Node Setup
295
Figure 162 Menu 11.1 Remote Node Profile
296
Table 103 Menu 11.1 Remote Node Profile
296
Outgoing Authentication Protocol
297
Remote Node Network Layer Options
298
Figure 163 Menu 11.3 Remote Node Network Layer Options
298
Table 104 Menu 11.3 Remote Node Network Layer Options
298
My WAN Addr Sample IP Addresses
299
Remote Node Filter
300
Figure 164 Sample IP Addresses for a TCP/IP LAN-To-LAN Connection
300
Figure 165 Menu 11.5 Remote Node Filter (RFC 1483 or ENET Encapsulation)
300
Editing ATM Layer Options
301
VC-Based Multiplexing (Non-PPP Encapsulation)
301
LLC-Based Multiplexing or PPP Encapsulation
301
Figure 166 Menu 11.5 Remote Node Filter (Pppoa or Pppoe Encapsulation)
301
Figure 167 Menu 11.6 for VC-Based Multiplexing
301
Advance Setup Options
302
Figure 168 Menu 11.6 for LLC-Based Multiplexing or PPP Encapsulation
302
Figure 169 Menu 11.1 Remote Node Profile
302
Figure 170 Menu 11.8 Advance Setup Options
303
Table 105 Menu 11.8 Advance Setup Options
303
Chapter 29 Static Route Setup
304
IP Static Route Overview
304
Configuration
304
Figure 171 Sample Static Routing Topology
304
Figure 172 Menu 12 Static Route Setup
305
Figure 173 Menu 12.1 IP Static Route Setup
305
Figure 174 Menu12.1.1 Edit IP Static Route
305
Table 106 Menu12.1.1 Edit IP Static Route
306
Chapter 30 Bridging Setup
308
Bridging in General
308
Bridge Ethernet Setup
308
Remote Node Bridging Setup
308
Figure 175 Menu 11.1 Remote Node Profile
309
Figure 176 Menu 11.3 Remote Node Network Layer Options
309
Table 107 Remote Node Network Layer Options: Bridge Fields
309
Bridge Static Route Setup
310
Figure 177 Menu 12.3.1 Edit Bridge Static Route
310
Table 108 Menu 12.3.1 Edit Bridge Static Route
310
Network Address Translation (NAT)
312
Chapter 31 Network Address Translation (NAT)
312
Using NAT
312
SUA (Single User Account) Versus NAT
312
Applying NAT
312
Figure 178 Menu 4 Applying NAT for Internet Access
313
Figure 179 Applying NAT in Menus 4 & 11.3
313
NAT Setup
314
Address Mapping Sets
314
Figure 180 Menu 15 NAT Setup
314
Table 109 Applying NAT in Menus 4 & 11.3
314
Figure 181 Menu 15.1 Address Mapping Sets
315
Figure 182 Menu 15.1.255 SUA Address Mapping Rules
315
SUA Address Mapping Set
315
Table 110 SUA Address Mapping Rules
315
Figure 183 Menu 15.1.1 First Set
316
User-Defined Address Mapping Sets
316
Figure 184 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
317
Ordering Your Rules
317
Table 111 Menu 15.1.1 First Set
317
Configuring a Server Behind NAT
318
Figure 185 Menu 15.2 NAT Server Setup
318
Table 112 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set
318
General NAT Examples
319
Figure 186 Menu 15.2.1 NAT Server Setup
319
Figure 187 Multiple Servers Behind NAT Example
319
Example 1: Internet Access Only
320
Example 2: Internet Access with an Inside Server
320
Figure 188 NAT Example 1
320
Figure 189 Menu 4 Internet Access & NAT Example
320
Example 3: Multiple Public IP Addresses with Inside Servers
321
Figure 190 NAT Example 2
321
Figure 191 Menu 15.2.1 Specifying an Inside Server
321
Figure 192 NAT Example 3
322
Figure 193 Example 3: Menu 11.3
323
Figure 194 Example 3: Menu 15.1.1.1
323
Figure 195 Example 3: Final Menu 15.1.1
324
Figure 196 Example 3: Menu 15.2.1
324
Example 4: NAT Unfriendly Application Programs
325
Figure 197 NAT Example 4
325
Figure 198 Example 4: Menu 15.1.1.1 Address Mapping Rule
325
Figure 199 Example 4: Menu 15.1.1 Address Mapping Rules
326
Chapter 32 Enabling the Firewall
328
Remote Management and the Firewall
328
Access Methods
328
Enabling the Firewall
328
Figure 200 Menu 21.2 Firewall Setup
329
Chapter 33 Filter Configuration
330
About Filtering
330
Figure 201 Outgoing Packet Filtering Process
330
Figure 202 Filter Rule Process
331
The Filter Structure of the Prestige
331
Configuring a Filter Set for the Prestige
332
Figure 203 Menu 21 Filter Set Configuration
332
Figure 204 Netbios_Wan Filter Rules Summary
332
Filter Rules Summary Menus
333
Figure 205 Netbios_Lan Filter Rules Summary
333
Figure 206 IGMP Filter Rules Summary
333
Table 113 Abbreviations Used in the Filter Rules Summary Menu
333
Configuring a Filter Rule
334
Table 114 Rule Abbreviations Used
334
Figure 207 Menu 21.1.X.1 TCP/IP Filter Rule
335
Table 115 Menu 21.1.X.1 TCP/IP Filter Rule
335
TCP/IP Filter Rule
335
Figure 208 Executing an IP Filter
337
Generic Filter Rule
337
Figure 209 Menu 21.1.5.1 Generic Filter Rule
338
Table 116 Menu 21.1.5.1 Generic Filter Rule
338
Filter Types and NAT
339
Example Filter
339
Figure 210 Protocol and Device Filter Sets
339
Figure 211 Sample Telnet Filter
340
Figure 212 Menu 21.1.6.1 Sample Filter
340
Applying Filters and Factory Defaults
341
Figure 213 Menu 21.1.6.1 Sample Filter Rules Summary
341
Table 117 Filter Sets Table
341
Ethernet Traffic
342
Figure 214 Filtering Ethernet Traffic
342
Figure 215 Filtering Remote Node Traffic
342
Remote Node Filters
342
Chapter 34 SNMP Configuration
344
About SNMP
344
Figure 216 SNMP Management Model
344
Supported Mibs
345
SNMP Configuration
345
SNMP Traps
346
Figure 217 Menu 22 SNMP Configuration
346
Table 118 Menu 22 SNMP Configuration
346
Table 119 SNMP Traps
346
Table 120 Ports and Permanent Virtual Circuits
347
Chapter 35 System Security
348
System Security
348
System Password
348
Configuring External RADIUS Server
348
Figure 218 Menu 23 - System Security
348
Figure 219 Menu 23.2 System Security: RADIUS Server
349
Table 121 Menu 23.2 System Security: RADIUS Server
349
IEEE 802.1X
350
Figure 220 Menu 23 System Security
350
Figure 221 Menu 23.4 System Security: IEEE 802.1X
350
Table 122 Menu 23.4 System Security: IEEE 802.1X
351
Creating User Accounts on the Prestige
352
Figure 222 Menu 14 Dial-In User Setup
353
Figure 223 Menu 14.1 Edit Dial-In User
353
Table 123 Menu 14.1 Edit Dial-In User
353
Chapter 36 System Information and Diagnosis
354
Overview
354
System Status
354
Figure 224 Menu 24 System Maintenance
354
Figure 225 Menu 24.1 System Maintenance : Status
355
Table 124 Menu 24.1 System Maintenance: Status
355
System Information
356
Figure 226 Menu 24.2 System Information and Console Port Speed
356
Console Port Speed
357
Figure 227 Menu 24.2.1 System Maintenance: Information
357
Table 125 Menu 24.2.1 System Maintenance: Information
357
Log and Trace
358
Viewing Error Log
358
Figure 228 Menu 24.2.2 System Maintenance : Change Console Port Speed
358
Figure 229 Menu 24.3 System Maintenance: Log and Trace
358
Syslog and Accounting
359
Figure 230 Sample Error and Information Messages
359
Figure 231 Menu 24.3.2 System Maintenance: Syslog and Accounting
359
Table 126 Menu 24.3.2 System Maintenance : Syslog and Accounting
359
Figure 232 Syslog Example
360
Diagnostic
361
Figure 233 Menu 24.4 System Maintenance : Diagnostic
361
Table 127 Menu 24.4 System Maintenance Menu: Diagnostic
362
Chapter 37 Firmware and Configuration File Maintenance
364
Filename Conventions
364
Backup Configuration
365
Table 128 Filename Conventions
365
Example of FTP Commands from the Command Line
366
Figure 234 Telnet in Menu 24.5
366
Using the FTP Command from the Command Line
366
Figure 235 FTP Session Example
367
GUI-Based FTP Clients
367
Table 129 General Commands for GUI-Based FTP Clients
367
TFTP and FTP over WAN Management Limitations
367
Backup Configuration Using TFTP
368
GUI-Based TFTP Clients
368
TFTP Command Example
368
Restore Configuration
369
Restore Using FTP
369
Table 130 General Commands for GUI-Based TFTP Clients
369
Restore Using FTP Session Example
370
Figure 236 Telnet into Menu 24.6
370
Figure 237 Restore Using FTP Session Example
370
Uploading Firmware and Configuration Files
371
Firmware File Upload
371
Configuration File Upload
371
Figure 238 Telnet into Menu 24.7.1 Upload System Firmware
371
FTP File Upload Command from the DOS Prompt Example
372
Figure 239 Telnet into Menu 24.7.2 System Maintenance
372
FTP Session Example of Firmware File Upload
373
TFTP File Upload
373
Figure 240 FTP Session Example of Firmware File Upload
373
TFTP Upload Command Example
374
Chapter 38 System Maintenance
376
Command Interpreter Mode
376
Figure 241 Command Mode in Menu 24
376
Figure 242 Valid Commands
376
Call Control Support
377
Budget Management
377
Figure 243 Menu 24.9 System Maintenance: Call Control
377
Time and Date Setting
378
Figure 244 Menu 24.9.1 System Maintenance: Budget Management
378
Table 131 Menu 24.9.1 System Maintenance: Budget Management
378
Figure 245 Menu 24 System Maintenance
379
Figure 246 Menu 24.10 System Maintenance: Time and Date Setting
379
Table 132 Menu 24.10 System Maintenance: Time and Date Setting
379
Resetting the Time
380
Chapter 39 Remote Management
382
Remote Management Overview
382
Remote Management
382
Remote Management Setup
382
Remote Management Limitations
383
Figure 247 Menu 24.11 Remote Management Control
383
Table 133 Menu 24.11 Remote Management Control
383
Remote Management and NAT
384
System Timeout
384
Chapter 40 IP Policy Routing
386
IP Policy Routing Overview
386
Benefits of IP Policy Routing
386
Routing Policy
386
IP Routing Policy Setup
387
Figure 248 Menu 25 IP Routing Policy Setup
387
Figure 249 Menu 25.1 IP Routing Policy Setup
388
Table 134 Menu 25.1 IP Routing Policy Setup
388
Figure 250 Menu 25.1.1 IP Routing Policy
389
Table 135 Menu 25.1.1 IP Routing Policy
389
Applying an IP Policy
390
Ethernet IP Policies
390
IP Policy Routing Example
391
Figure 251 Menu 3.2 TCP/IP and DHCP Ethernet Setup
391
Figure 252 Menu 11.3 Remote Node Network Layer Options
391
Figure 253 Example of IP Policy Routing
392
Figure 254 IP Routing Policy Example
393
Figure 255 IP Routing Policy Example
394
Figure 256 Applying IP Policies Example
394
Chapter 41 Call Scheduling
396
Introduction
396
Figure 257 Menu 26 Schedule Setup
396
Figure 258 Menu 26.1 Schedule Set Setup
397
Table 136 Menu 26.1 Schedule Set Setup
397
Figure 259 Applying Schedule Set(S) to a Remote Node (Pppoe)
398
Chapter 42 Vpn/Ipsec Setup
400
Vpn/Ipsec Overview
400
Ipsec Summary Screen
400
Figure 260 Menu 27 Vpn/Ipsec Setup
400
Figure 261 Menu 27.1 Ipsec Summary
401
Table 137 Menu 27.1 Ipsec Summary
401
Ipsec Setup
403
Figure 262 Menu 27.1.1 Ipsec Setup
403
Table 138 Menu 27.1.1 Ipsec Setup
403
IKE Setup
406
Figure 263 Menu 27.1.1.1KE Setup
407
Table 139 Menu 27.1.1.1 IKE Setup
407
Manual Setup
408
Active Protocol
408
Security Parameter Index (SPI)
408
Table 140 Active Protocol: Encapsulation and Security Protocol
408
Figure 264 Menu 27.1.1.2 Manual Setup
409
Table 141 Menu 27.1.1.2 Manual Setup
409
Chapter 43 SA Monitor
412
SA Monitor Overview
412
Using SA Monitor
412
Figure 265 Menu 27.2 SA Monitor
413
Table 142 Menu 27.2 SA Monitor
413
Chapter 44 Troubleshooting
416
Problems Starting up the Prestige
416
Problems with the LAN
416
Table 143 Troubleshooting Starting up Your Prestige
416
Table 144 Troubleshooting the LAN
416
Problems with the WAN
417
Table 145 Troubleshooting the WAN
417
Problems Accessing the Prestige
418
Pop-Up Windows, Javascripts and Java Permissions
418
Internet Explorer Pop-Up Blockers
418
Table 146 Troubleshooting Accessing the Prestige
418
Figure 266 Pop-Up Blocker
419
Figure 267 Internet Options
419
Figure 268 Internet Options
420
Javascripts
421
Figure 269 Pop-Up Blocker Settings
421
Figure 270 Internet Options
422
Java Permissions
423
Figure 271 Security Settings - Java Scripting
423
Figure 272 Security Settings - Java
424
Activex Controls in Internet Explorer
425
Figure 273 Java (Sun)
425
Figure 274 Internet Options Security
426
Figure 275 Security Setting Activex Controls
427
Product Specifications
428
Advertisement
ZyXEL Communications Prestige 661H Series Quick Start Manual (19 pages)
ADSL/(WLAN) Router
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 1 MB
Table of Contents
Quick Start Guide
1
Automatische Konfiguration
4
Manuelle Konfiguration
6
Fehlersuche
10
Contenu de la Livraison
10
Configuration Automatique
13
Configuration Manuelle du Routeur
15
Dépannage
18
ZyXEL Communications Prestige 661H Series Quick Start Manual (13 pages)
ADSL 2+ Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 1 MB
Table of Contents
Quick Start Guide
1
Hardware Connections
2
Zero Configuration
4
Accessing the Web Configurator
4
Wireless Configuration
7
Troubleshooting
12
Advertisement
Advertisement
Related Products
ZyXEL Communications 660H/HW(-I)
ZyXEL Communications 661H/HW(-I)
ZyXEL Communications Prestige 661HW Series
ZyXEL Communications PRESTIGE 660 HW Series
ZyXEL Communications ZyXEL Prestige 660R
ZyXEL Communications Prestige 660R-6 Series
ZyXEL Communications Prestige 660HW-I
ZyXEL Communications Prestige 661HW-I
ZyXEL Communications Prestige 660H-I
ZyXEL Communications Prestige 660R-I
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL