Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
Prestige 792H
ZyXEL Communications Prestige 792H Manuals
Manuals and User Guides for ZyXEL Communications Prestige 792H. We have
5
ZyXEL Communications Prestige 792H manuals available for free PDF download: User Manual, Compact Manual, Specifications, Declaration Of Conformity
ZyXEL Communications Prestige 792H User Manual (428 pages)
G.SHDSL Router with four-port switch
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 9.38 MB
Table of Contents
Federal Communications Commission
5
Information for Canadian Users
7
Zyxel Limited Warranty
9
Customer Support
11
Table of Contents
13
List of Figures
23
List of Tables
33
Preface
39
Introduction to DSL
41
Getting Started
42
Chapter 1 Getting to Know Your G.SHDSL Router
44
Features of the Prestige
44
Ipsec Vpn Capability
45
Ip Multicast
45
Ip Policy Routing
46
Protocols Supported
46
Dhcp Support
46
Application Scenarios for the Prestige
48
Internet Access
48
LAN-To-LAN Application
48
Figure 1-1 Internet Access Application
48
Figure 1-2 LAN-To-LAN Application
48
Chapter 2 Introducing the Web Configurator
49
Web Configurator Overview
49
Accessing the Prestige Web Configurator
49
Navigating the Prestige Web Configurator
50
Figure 2-1 Password Screen
50
Configuring Password
51
Figure 2-2 Web Configurator SITE MAP Screen
51
Resetting the Prestige
52
Figure 2-3 Password
52
Table 2-1 Password
52
Using the Reset Button
53
Uploading a Configuration File Via Console Port
53
Figure 2-4 Example Xmodem Upload
53
Chapter 3 Wizard Setup
55
Wizard Setup Introduction
55
WAN Setup
55
Service Type
55
Rate Adaption
55
Transfer Rates
56
Standard Mode
56
Encapsulation
56
Enet Encap
56
PPP over Ethernet
56
Pppoa
57
Rfc 1483
57
Multiplexing
57
VC-Based Multiplexing
57
LLC-Based Multiplexing
57
VPI and VCI
58
Wizard Setup Configuration: First Screen
58
Figure 3-1 Wizard Screen: WAN Setup
58
Table 3-1 Wizard Screen: WAN Setup
58
IP Address and Subnet Mask
60
Figure 3-2 Wizard Screen: Internet Access
60
Table 3-2 Wizard Screen: Internet Access
60
IP Address Assignment
61
IP Assignment with Pppoa or Pppoe Encapsulation
61
IP Assignment with RFC 1483 Encapsulation
62
IP Assignment with ENET ENCAP Encapsulation
62
Private IP Addresses
62
Nailed-Up Connection (PPP)
63
Nat
63
Wizard Setup Configuration: ISP Parameters
63
Pppoa
63
Figure 3-3 Internet Connection with Pppoa
64
Table 3-3 Internet Connection with Pppoa
64
Rfc 1483
66
Enet Encap
66
Figure 3-4 Internet Connection with RFC 1483
66
Table 3-4 Internet Connection with RFC 1483
66
Figure 3-5 Internet Connection with ENET ENCAP
67
Table 3-5 Internet Connection with ENET ENCAP
67
Pppoe
68
Figure 3-6 Internet Connection with Pppoe
68
DHCP Setup
69
Table 3-6 Internet Connection with Pppoe
69
IP Pool Setup
70
Wizard Setup Configuration: LAN Configuration
70
Figure 3-7 Wizard Screen: LAN Configuration
71
Figure 3-8 Wizard: LAN Configuration
71
Table 3-7 Wizard: LAN Configuration
71
Wizard Setup Configuration: Connection Tests
72
Test Your Internet Connection
73
Figure 3-9 Wizard Screen: Connection Tests
73
Chapter 4 LAN Setup
75
LAN Overview
75
Lans, Wans and the Prestige
75
DNS Server Address
75
Figure 4-1 LAN and WAN IP Addresses
75
DNS Server Address Assignment
76
Lan Tcp/Ip
76
Factory LAN Defaults
77
IP Address and Subnet Mask
77
RIP Setup
77
Multicast
77
Configuring LAN
78
Table 4-1 LAN
79
Chapter 5 WAN Setup
81
WAN Overview
81
Metric
81
Pppoe Encapsulation
82
Traffic Shaping
83
Configuring WAN Setup
84
Figure 5-1 Example of Traffic Shaping
84
Figure 5-2 WAN Setup
85
Table 5-1 WAN Setup
86
Traffic Redirect
88
Figure 5-3 Traffic Redirect Example
88
Configuring WAN Backup
89
Figure 5-4 Traffic Redirect LAN Setup
89
Figure 5-5 WAN Backup
90
Table 5-2 WAN Backup
91
Outgoing Authentication Protocol
92
Configuring Advanced WAN Backup
93
Figure 5-6 Advanced WAN Backup
94
Table 5-3 Advanced WAN Backup
96
AT Command Strings
97
DTR Signal
98
Response Strings
98
Configuring Advanced Modem Setup
98
Figure 5-7 Advanced Modem Setup
99
Table 5-4 Advanced Modem Setup
99
Chapter 6 Network Address Translation (NAT)
103
NAT Overview
103
NAT Definitions
103
What NAT Does
103
Table 6-1 NAT Definitions
103
How NAT Works
104
NAT Application
104
Figure 6-1 How NAT Works
104
NAT Mapping Types
105
Figure 6-2 NAT Application with IP Alias
105
SUA (Single User Account) Versus NAT
106
Table 6-2 NAT Mapping Types
106
SUA Server
107
Port Forwarding: Services and Port Numbers
107
Configuring Servers Behind SUA (Example)
108
Table 6-3 Services and Port Numbers
108
Selecting the NAT Mode
109
Figure 6-3 Multiple Servers Behind NAT Example
109
Figure 6-4 NAT Mode
109
Configuring SUA Server
110
Table 6-4 NAT Mode
110
Figure 6-5 Edit SUA/NAT Server Set
111
Table 6-5 Edit SUA/NAT Server Set
111
Configuring Address Mapping
112
Figure 6-6 Address Mapping Rules
113
Table 6-6 Address Mapping Rules
113
Editing an Address Mapping Rule
114
Figure 6-7 Address Mapping Rule Edit
114
Table 6-7 Address Mapping Rule Edit
115
Chapter 7 Dynamic DNS Setup
117
Dynamic DNS
117
DYNDNS Wildcard
117
Configuring Dynamic DNS
117
Figure 7-1 DDNS
118
Table 7-1 DDNS
118
Chapter 8 Firewalls
121
Firewall Overview
121
Types of Firewalls
121
Packet Filtering Firewalls
121
Application-Level Firewalls
121
Stateful Inspection Firewalls
122
Introduction to Zyxel's Firewall
122
Denial of Service
123
Basics
123
Figure 8-1 Prestige Firewall Application
123
Types of Dos Attacks
124
Table 8-1 Common IP Ports
124
Figure 8-2 Three-Way Handshake
125
Figure 8-3 SYN Flood
125
Figure 8-4 Smurf Attack
126
Table 8-2 ICMP Commands that Trigger Alerts
126
Stateful Inspection
127
Table 8-3 Legal Netbios Commands
127
Table 8-4 Legal SMTP Commands
127
Stateful Inspection Process
128
Figure 8-5 Stateful Inspection
128
Stateful Inspection and the Prestige
129
TCP Security
130
UDP/ICMP Security
130
Upper Layer Protocols
131
Guidelines for Enhancing Security with Your Firewall
131
Security in General
131
Packet Filtering Vs Firewall
132
Packet Filtering
132
Firewall
133
Chapter 9 Firewall Configuration
135
Remote Management and the Firewall
135
Enabling the Firewall
135
Figure 9-1 Enabling the Firewall
135
Configuring E-Mail Alerts
136
Figure 9-2 E-Mail
136
Table 9-1 E-Mail
136
Attack Alert
137
Alerts
138
Threshold Values
138
Half-Open Sessions
138
Tcp Maximum Incomplete and Blocking Time
139
Figure 9-3 Alert
140
Table 9-2 Alert
140
Chapter 10 Creating Custom Rules
143
Rules Overview
143
Rule Logic Overview
143
Rule Checklist
143
Security Ramifications
144
Key Fields for Configuring Rules
144
Connection Direction
145
LAN to WAN Rules
145
Figure 10-1 LAN to WAN Traffic
145
WAN to LAN Rules
146
Logs
146
Figure 10-2 WAN to LAN Traffic
146
Figure 10-3 Firewall Logs
147
Table 10-1 Firewall Logs
147
Rule Summary
148
Figure 10-4 Firewall Rules Summary: First Screen
149
Predefined Services
150
Table 10-2 Firewall Rules Summary: First Screen
150
Table 10-3 Predefined Services
151
Creating/Editing Firewall Rules
153
Figure 10-5 Creating/Editing a Firewall Rule
154
Table 10-4 Creating/Editing a Firewall Rule
154
Source and Destination Addresses
155
Timeout
156
Figure 10-6 Adding/Editing Source and Destination Addresses
156
Table 10-5 Adding/Editing Source and Destination Addresses
156
Factors Influencing Choices for Timeout Values
157
Figure 10-7 Timeout
157
Table 10-6 Timeout
157
Chapter 11 Customized Services
159
Introduction to Customized Services
159
Figure 11-1 Customized Services
159
Creating/Editing a Customized Service
160
Figure 11-2 Creating/Editing a Customized Service
160
Table 11-1 Customized Services
160
Example Custom Service Firewall Rule
161
Figure 11-3 Edit Rule Example
161
Table 11-2 Creating/Editing a Customized Service
161
Figure 11-4 Configure Source IP Example
162
Figure 11-5 Customized Service for Myservice Example
162
Figure 11-6 Syslog Rule Configuration Example
163
Figure 11-7 Rule Summary Example
164
Chapter 12 Content Filtering
165
Content Filtering Overview
165
Configuring Keyword Blocking
165
Figure 12-1 Content Filter: Keyword
166
Table 12-1 Content Filter: Keyword
166
Configuring the Schedule
167
Figure 12-2 Content Filter: Schedule
167
Configuring Trusted Computers
168
Figure 12-3 Content Filter: Trusted
168
Table 12-2 Content Filter: Schedule
168
Table 12-3 Content Filter: Trusted
168
Configuring Logs
169
Figure 12-4 Content Filter Logs
169
Table 12-4 Content Filter Logs
170
Chapter 13 Introduction to Ipsec
173
VPN Overview
173
Ipsec
173
Security Association
173
Other Terminology
173
VPN Applications
174
Figure 13-1 Encryption and Decryption
174
Ipsec Architecture
175
Figure 13-2 VPN Application
175
Ipsec Algorithms
176
Key Management
176
Figure 13-3 Ipsec Architecture
176
Encapsulation
177
Transport Mode
177
Tunnel Mode
177
Ipsec and NAT
177
Figure 13-4 Transport and Tunnel Mode Ipsec Encapsulation
177
Table 13-1 VPN and NAT
178
Chapter 14 VPN Screens
179
Vpn/Ipsec Overview
179
Ipsec Algorithms
179
AH (Authentication Header) Protocol
179
ESP (Encapsulating Security Payload) Protocol
179
My IP Address
180
Secure Gateway Address
180
Dynamic Secure Gateway Address
180
Table 14-1 AH and ESP
180
VPN Summary Screen
181
Figure 14-1 Ipsec Summary Fields
181
Figure 14-2 VPN Summary
182
Table 14-2 VPN Summary
182
Keep Alive
183
ID Type and Content
183
ID Type and Content Examples
184
Table 14-3 Local ID Type and Content Fields
184
Table 14-4 Peer ID Type and Content Fields
184
Pre-Shared Key
185
Editing VPN Policies
185
Table 14-5 Matching ID Type and Content Configuration Example
185
Table 14-6 Mismatching ID Type and Content Configuration Example
185
Figure 14-3 VPN IKE
186
Table 14-7 VPN IKE
187
IKE Phases
191
Figure 14-4 Two Phases to Set up the Ipsec SA
191
Negotiation Mode
192
Diffie-Hellman (DH) Key Groups
192
Perfect Forward Secrecy (PFS)
193
Configuring Advanced IKE Settings
193
Figure 14-5 VPN IKE: Advanced
194
Table 14-8 VPN IKE: Advanced
194
Manual Key Setup
197
Security Parameter Index (SPI)
197
Configuring Manual Key
198
Figure 14-6 VPN Manual Key
198
Table 14-9 VPN Manual Key
199
Viewing SA Monitor
202
Figure 14-7 SA Monitor
203
Table 14-10 SA Monitor
203
Configuring Global Setting
204
Figure 14-8 Global Setting
204
Table 14-11 Global Setting
204
Configuring Ipsec Logs
205
Figure 14-9 VPN Logs
205
Table 14-12 VPN Logs
205
Table 14-13 Sample IKE Key Exchange Logs
206
Table 14-14 Sample Ipsec Logs During Packet Transmission
207
Table 14-15 RFC-2408 ISAKMP Payload Types
208
Telecommuter Vpn/Ipsec Examples
209
Telecommuters Sharing One VPN Rule Example
209
Figure 14-10 Telecommuters Sharing One VPN Rule Example
209
Table 14-16 Telecommuters Sharing One VPN Rule Example
209
Telecommuters Using Unique VPN Rules Example
210
Figure 14-11 Telecommuters Using Unique VPN Rules Example
210
Table 14-17 Telecommuters Using Unique VPN Rules Example
210
VPN and Remote Management
211
Chapter 15 Remote Management Configuration
213
Remote Management Overview
213
Remote Management Limitations
213
Remote Management and NAT
213
System Timeout
214
Telnet
214
Ftp
214
Web
214
Figure 15-1 Telnet Configuration on a TCP/IP Network
214
Configuring Remote Management
215
Figure 15-2 Remote Management
215
Table 15-1 Remote Management
215
Chapter 16 Universal Plug-And-Play (Upnp)
216
Universal Plug and Play Overview
216
How Do I Know if I'M Using Upnp
216
NAT Transversal
216
Cautions with Upnp
216
Upnp and Zyxel
217
Accessing the Prestige Web Configurator to Configure Upnp
217
Configuring Upnp
217
Installing Upnp in Windows Example
218
Figure 16-1 Configuring Upnp
218
Table 16-1 Configuring Upnp
218
Using Upnp in Windows XP Example
221
Chapter 17 Maintenance
227
Maintenance Overview
227
System Status Screen
227
Figure 17-1 System Status
229
Table 17-1 System Status
229
System Statistics
230
Figure 17-2 System Status: Show Statistics
230
Table 17-2 System Status: Show Statistics
230
DHCP Table Screen
232
Figure 17-3 DHCP Table
232
Table 17-3 DHCP Table
232
Diagnostic Screens
233
Diagnostic General Screen
233
Figure 17-4 Diagnostic
233
Figure 17-5 Diagnostic General
234
Table 17-4 Diagnostic General
234
Diagnostic DSL Line Screen
235
Figure 17-6 Diagnostic DSL Line
235
Table 17-5 Diagnostic DSL Line
235
Firmware Screen
236
Figure 17-7 Firmware Upgrade
236
Figure 17-8 Network Temporarily Disconnected
237
Figure 17-9 Error Message
237
Table 17-6 Firmware Upgrade
237
Chapter 18 Introducing the SMT
239
SMT Introduction
239
Procedure for SMT Configuration Via Console Port
239
Procedure for SMT Configuration Via Telnet
239
Entering Password
239
Prestige SMT Menu Overview
240
Figure 18-1 Login Screen
240
Figure 18-2 Prestige Menu Overview
241
Table 24-1 Remote Node Profile
241
Table 24-2 Remote Node Network Layer Options
241
Table 27-3 Address Mapping Rules
241
Navigating the SMT Interface
242
Table 18-1 Main Menu Commands
242
System Management Terminal Interface Summary
243
Figure 18-3 SMT Main Menu
243
Table 18-2 Main Menu Summary
243
Changing the System Password
244
Figure 18-4 Menu 23 System Password
244
Chapter 19 General Setup
245
General Setup
245
Configuring Menu 1
245
Figure 19-1 Menu 1 General Setup
246
Table 19-1 Menu 1 General Setup
246
Configuring Dynamic DNS
247
Figure 19-2 Menu 1.1 Configure Dynamic DNS
247
Table 19-2 Menu 1.1 Configure Dynamic DNS
247
Chapter 20 WAN Setup
249
WAN Setup
249
WAN Setup Screen
249
Figure 20-1 WAN Setup
249
Table 20-1 WAN Setup
249
Chapter 21 Dial Backup
251
Dial Backup Overview
251
Configuring Dial Backup in Menu 2
251
Figure 21-1 Menu 2: Dial Backup Setup
251
Advanced WAN Setup
252
Table 21-1 Menu 2: Dial Backup Setup
252
Figure 21-2 Advanced WAN Setup
253
Table 21-2 Advanced WAN Port Setup: at Commands Fields
253
Remote Node Profile (Backup ISP)
254
Table 21-3 Advanced WAN Port Setup: Call Control Parameters
254
Figure 21-3 Remote Node Profile (Backup ISP)
255
Table 21-4 Remote Node Profile (Backup ISP)
255
Editing PPP Options
257
Editing TCP/IP Options
257
Figure 21-4 Menu 11.2 - Remote Node PPP Options
257
Figure 21-5 Remote Node PPP Options Menu Fields
257
Figure 21-6 Remote Node Network Layer Options
258
Table 21-5 Remote Node Network Layer Options
258
Editing Filter Sets
259
Figure 21-7 Menu 11.5: Remote Node Filter (Ethernet)
260
Advertisement
ZyXEL Communications Prestige 792H User Manual (437 pages)
G.SHDSL 4-Port security gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 9.24 MB
Table of Contents
Information for Canadian Users
4
Zyxel Limited Warranty
5
Customer Support
6
Table of Contents
9
List of Figures
19
Preface
29
Introduction to DSL
31
Getting Started
33
Chapter 1 Getting to Know Your G.SHDSL Router
35
Features of the Prestige
35
Traffic Redirect
36
Protocols Supported
37
Application Scenarios for the Prestige
39
Internet Access
39
LAN-To-LAN Application
39
Figure 1-1 Internet Access Application
39
Figure 1-2 LAN-To-LAN Application
39
Chapter 2 Introducing the Web Configurator
41
Web Configurator Overview
41
Accessing the Prestige Web Configurator
41
Navigating the Prestige Web Configurator
42
Figure 2-1 Password Screen
42
Configuring Password
43
Figure 2-2 Web Configurator SITE MAP Screen
43
Resetting the Prestige
44
Figure 2-3 Password
44
Table 2-1 Password
44
Figure 2-4 Example Xmodem Upload
45
Uploading a Configuration File Via Console Port
45
Using the Reset Button
45
Chapter 3 Wizard Setup
47
Wizard Setup Introduction
47
WAN Setup
47
Service Type
47
Rate Adaption
47
Transfer Rates
48
Standard Mode
48
Encapsulation
48
Enet Encap
48
PPP over Ethernet
48
Pppoa
49
Rfc 1483
49
Multiplexing
49
VC-Based Multiplexing
49
LLC-Based Multiplexing
49
VPI and VCI
50
Wizard Setup Configuration: First Screen
50
Figure 3-1 Wizard Screen: WAN Setup
50
Figure 3-2 Wizard Screen: Internet Access
51
Table 3-1 Wizard Screen: WAN Setup
51
IP Address and Subnet Mask
52
Table 3-2 Wizard Screen: Internet Access
52
IP Address Assignment
53
1IP Assignment with Pppoa or Pppoe Encapsulation
53
IP Assignment with RFC 1483 Encapsulation
53
IP Assignment with ENET ENCAP Encapsulation
54
Private IP Addresses
54
Nailed-Up Connection (PPP)
54
Nat
55
Wizard Setup Configuration: ISP Parameters
55
Pppoa
55
Figure 3-3 Internet Connection with Pppoa
56
Table 3-3 Internet Connection with Pppoa
56
Rfc 1483
58
Enet Encap
58
Figure 3-4 Internet Connection with RFC 1483
58
Table 3-4 Internet Connection with RFC 1483
58
Figure 3-5 Internet Connection with ENET ENCAP
59
Table 3-5 Internet Connection with ENET ENCAP
59
Pppoe
60
Figure 3-6 Internet Connection with Pppoe
60
DHCP Setup
61
Table 3-6 Internet Connection with Pppoe
61
IP Pool Setup
62
Wizard Setup Configuration: LAN Configuration
62
Figure 3-7 Wizard Screen: LAN Configuration
62
Figure 3-8 Wizard: LAN Configuration
63
Table 3-7 Wizard: LAN Configuration
63
Wizard Setup Configuration: Connection Tests
64
Test Your Internet Connection
65
Figure 3-9 Wizard Screen: Connection Tests
65
Chapter 4 LAN Setup
67
LAN Overview
67
Lans, Wans and the Prestige
67
DNS Server Address
67
Figure 4-1 LAN and WAN IP Addresses
67
DNS Server Address Assignment
68
Lan Tcp/Ip
68
Factory LAN Defaults
69
IP Address and Subnet Mask
69
RIP Setup
69
Multicast
69
Configuring LAN
70
Table 4-1 LAN
71
Chapter 5 WAN Setup
73
WAN Overview
73
Metric
73
Pppoe Encapsulation
74
Traffic Shaping
75
Configuring WAN Setup
76
Figure 5-1 Example of Traffic Shaping
76
Figure 5-2 WAN Setup
77
Table 5-1 WAN Setup
78
Traffic Redirect
80
Figure 5-3 Traffic Redirect Example
80
Configuring WAN Backup
81
Figure 5-4 Traffic Redirect LAN Setup
81
Figure 5-5 WAN Backup
82
Table 5-2 WAN Backup
83
Outgoing Authentication Protocol
84
Configuring Advanced WAN Backup
85
Figure 5-6 Advanced WAN Backup
86
Table 5-3 Advanced WAN Backup
88
AT Command Strings
89
DTR Signal
90
Response Strings
90
Configuring Advanced Modem Setup
90
Figure 5-7 Advanced Modem Setup
91
Table 5-4 Advanced Modem Setup
91
Chapter 6 Network Address Translation (NAT)
95
NAT Overview
95
NAT Definitions
95
What NAT Does
95
Table 6-1 NAT Definitions
95
How NAT Works
96
NAT Application
96
Figure 6-1 How NAT Works
96
NAT Mapping Types
97
Figure 6-2 NAT Application with IP Alias
97
SUA (Single User Account) Versus NAT
98
Table 6-2 NAT Mapping Types
98
SUA Server
99
Port Forwarding: Services and Port Numbers
99
Configuring Servers Behind SUA (Example)
100
Table 6-3 Services and Port Numbers
100
Selecting the NAT Mode
101
Figure 6-3 Multiple Servers Behind NAT Example
101
Figure 6-4 NAT Mode
101
Configuring SUA Server
102
Table 6-4 NAT Mode
102
Figure 6-5 Edit SUA/NAT Server Set
103
Table 6-5 Edit SUA/NAT Server Set
103
Configuring Address Mapping
104
Figure 6-6 Address Mapping Rules
105
Table 6-6 Address Mapping Rules
105
Editing an Address Mapping Rule
106
Figure 6-7 Address Mapping Rule Edit
106
Table 6-7 Address Mapping Rule Edit
107
Chapter 7 Dynamic DNS Setup
109
Dynamic DNS
109
Dyndns Wildcard
109
Configuring Dynamic DNS
109
Figure 7-1 DDNS
110
Table 7-1 DDNS
110
Chapter 8 Firewall
113
Firewall Overview
113
Types of Firewalls
113
Packet Filtering Firewalls
113
Application-Level Firewalls
113
Stateful Inspection Firewalls
114
Introduction to Zyxel's Firewall
114
Denial of Service
115
Basics
115
Figure 8-1 Prestige Firewall Application
115
Types of Dos Attacks
116
Table 8-1 Common IP Ports
116
Figure 8-2 Three-Way Handshake
117
Figure 8-3 SYN Flood
117
Figure 8-4 Smurf Attack
118
Table 8-2 ICMP Commands that Trigger Alerts
118
Stateful Inspection
119
Table 8-3 Legal Netbios Commands
119
Table 8-4 Legal SMTP Commands
119
Figure 8-5 Stateful Inspection
120
Stateful Inspection Process
120
Stateful Inspection and the Prestige
121
TCP Security
122
UDP/ICMP Security
122
Upper Layer Protocols
123
Guidelines for Enhancing Security with Your Firewall
123
Security in General
123
Packet Filtering Vs Firewall
124
Packet Filtering
125
Firewall
125
Chapter 9 Firewall Configuration
127
Remote Management and the Firewall
127
Enabling the Firewall
127
Figure 9-1 Enabling the Firewall
127
Configuring E-Mail Alerts
128
Figure 9-2 E-Mail
128
Table 9-1 E-Mail
128
Attack Alert
129
Alerts
130
Threshold Values
130
Half-Open Sessions
130
Tcp Maximum Incomplete and Blocking Time
131
Figure 9-3 Alert
132
Table 9-2 Alert
132
Chapter 10 Creating Custom Rules
135
Rules Overview
135
Rule Logic Overview
135
Rule Checklist
135
Security Ramifications
136
Key Fields for Configuring Rules
136
Connection Direction
137
LAN to WAN Rules
137
Figure 10-1 LAN to WAN Traffic
137
Source Address
137
WAN to LAN Rules
138
Logs
138
Figure 10-2 WAN to LAN Traffic
138
Figure 10-3 Firewall Logs
139
Table 10-1 Firewall Logs
139
Rule Summary
140
Figure 10-4 Firewall Rules Summary: First Screen
141
Predefined Services
142
Table 10-2 Firewall Rules Summary: First Screen
142
Table 10-3 Predefined Services
143
Creating/Editing Firewall Rules
145
Figure 10-5 Creating/Editing a Firewall Rule
146
Table 10-4 Creating/Editing a Firewall Rule
146
Source and Destination Addresses
147
Timeout
148
Figure 10-6 Adding/Editing Source and Destination Addresses
148
Table 10-5 Adding/Editing Source and Destination Addresses
148
Factors Influencing Choices for Timeout Values
149
Figure 10-7 Timeout
149
Table 10-6 Timeout
149
Chapter 11 Customized Services
151
Introduction to Customized Services
151
Figure 11-1 Customized Services
151
Creating/Editing a Customized Service
152
Figure 11-2 Creating/Editing a Customized Service
152
Table 11-1 Customized Services
152
Example Custom Service Firewall Rule
153
Figure 11-3 Edit Rule Example
153
Table 11-2 Creating/Editing a Customized Service
153
Figure 11-4 Configure Source IP Example
154
Figure 11-5 Customized Service for Myservice Example
154
Figure 11-6 Syslog Rule Configuration Example
155
Figure 11-7 Rule Summary Example
156
Chapter 12 Content Filtering
157
Content Filtering Overview
157
Configuring Keyword Blocking
157
Figure 12-1 Content Filter: Keyword
158
Table 12-1 Content Filter: Keyword
158
Configuring the Schedule
159
Figure 12-2 Content Filter: Schedule
159
Configuring Trusted Computers
160
Figure 12-3 Content Filter: Trusted
160
Table 12-2 Content Filter: Schedule
160
Table 12-3 Content Filter: Trusted
160
Configuring Logs
161
Figure 12-4 Content Filter Logs
161
Table 12-4 Content Filter Logs
162
Chapter 13 Introduction to Ipsec
165
VPN Overview
165
Ipsec
165
Security Association
165
Other Terminology
165
VPN Applications
166
Figure 13-1 Encryption and Decryption
166
Ipsec Architecture
167
Figure 13-2 VPN Application
167
Figure 13-3 Ipsec Architecture
168
Ipsec Algorithms
168
Key Management
168
Encapsulation
169
Transport Mode
169
Tunnel Mode
169
Ipsec and NAT
169
Figure 13-4 Transport and Tunnel Mode Ipsec Encapsulation
169
Table 13-1 VPN and NAT
170
Chapter 14 VPN Screens
171
Vpn/Ipsec Overview
171
Ipsec Algorithms
171
AH (Authentication Header) Protocol
171
ESP (Encapsulating Security Payload) Protocol
171
My IP Address
172
Secure Gateway Address
172
Dynamic Secure Gateway Address
172
Table 14-1 AH and ESP
172
VPN Summary Screen
173
Figure 14-1 Ipsec Summary Fields
173
Figure 14-2 VPN Summary
174
Table 14-2 VPN Summary
174
Keep Alive
175
ID Type and Content
175
ID Type and Content Examples
176
Table 14-3 Local ID Type and Content Fields
176
Table 14-4 Peer ID Type and Content Fields
176
Pre-Shared Key
177
Editing VPN Policies
177
Table 14-5 Matching ID Type and Content Configuration Example
177
Table 14-6 Mismatching ID Type and Content Configuration Example
177
Figure 14-3 VPN IKE
178
Table 14-7 VPN IKE
179
IKE Phases
183
Figure 14-4 Two Phases to Set up the Ipsec SA
183
Diffie-Hellman (DH) Key Groups
184
Negotiation Mode
184
Perfect Forward Secrecy (PFS)
184
Configuring Advanced IKE Settings
185
Figure 14-5 VPN IKE: Advanced
185
Table 14-8 VPN IKE: Advanced
186
Manual Key Setup
188
Security Parameter Index (SPI)
189
Configuring Manual Key
189
Figure 14-6 VPN Manual Key
190
Table 14-9 VPN Manual Key
191
Viewing SA Monitor
194
Figure 14-7 SA Monitor
195
Table 14-10 SA Monitor
195
Configuring Global Setting
196
Figure 14-8 Global Setting
196
Table 14-11 Global Setting
196
Configuring Ipsec Logs
197
Figure 14-9 VPN Logs
197
Table 14-12 VPN Logs
197
Table 14-13 Sample IKE Key Exchange Logs
198
Table 14-14 Sample Ipsec Logs During Packet Transmission
199
Table 14-15 RFC-2408 ISAKMP Payload Types
200
Telecommuter Vpn/Ipsec Examples
201
Telecommuters Sharing One VPN Rule Example
201
Figure 14-10 Telecommuters Sharing One VPN Rule Example
201
Table 14-16 Telecommuters Sharing One VPN Rule Example
201
Telecommuters Using Unique VPN Rules Example
202
Figure 14-11 Telecommuters Using Unique VPN Rules Example
203
Table 14-17 Telecommuters Using Unique VPN Rules Example
203
VPN and Remote Management
204
Chapter 15 Remote Management Configuration
207
Remote Management Overview
207
Remote Management Limitations
207
Remote Management and NAT
207
System Timeout
208
Telnet
208
Ftp
208
Web
208
Figure 15-1 Telnet Configuration on a TCP/IP Network
208
Configuring Remote Management
209
Figure 15-2 Remote Management
209
Table 15-1 Remote Management
209
Chapter 16 Universal Plug-And-Play (Upnp)
211
Universal Plug and Play Overview
211
How Do I Know if I'M Using Upnp
211
NAT Transversal
211
Cautions with Upnp
211
Upnp and Zyxel
212
Accessing the Prestige Web Configurator to Configure Upnp
212
Configuring Upnp
212
Installing Upnp in Windows Example
213
Figure 16-1 Configuring Upnp
213
Table 16-1 Configuring Upnp
213
Using Upnp in Windows XP Example
216
Chapter 17 Maintenance
223
Maintenance Overview
223
System Status Screen
223
Figure 17-1 System Status
225
Table 17-1 System Status
225
Figure 17-2 System Status: Show Statistics
226
System Statistics
226
Table 17-2 System Status: Show Statistics
226
DHCP Table Screen
228
Diagnostic Screens
228
Figure 17-3 DHCP Table
228
Table 17-3 DHCP Table
228
Diagnostic General Screen
229
Figure 17-4 Diagnostic
229
Figure 17-5 Diagnostic General
229
Diagnostic DSL Line Screen
230
Figure 17-6 Diagnostic DSL Line
230
Table 17-4 Diagnostic General
230
Firmware Screen
231
Table 17-5 Diagnostic DSL Line
231
Figure 17-7 Firmware Upgrade
232
Table 17-6 Firmware Upgrade
232
Figure 17-8 Network Temporarily Disconnected
233
Figure 17-9 Error Message
233
Chapter 18 Introducing the SMT
237
SMT Introduction
237
Procedure for SMT Configuration Via Console Port
237
Procedure for SMT Configuration Via Telnet
237
Entering Password
237
Prestige SMT Menu Overview
238
Figure 18-1 Login Screen
238
Figure 4-2 LAN
239
Figure 18-2 Prestige Menu Overview
239
Table 24-1 Remote Node Profile
239
Table 27-3 Address Mapping Rules
239
Navigating the SMT Interface
240
Table 18-1 Main Menu Commands
240
Figure 18-3 SMT Main Menu
241
System Management Terminal Interface Summary
241
Table 18-2 Main Menu Summary
241
Changing the System Password
242
Figure 18-4 Menu 23 System Password
242
Chapter 19 General Setup
243
General Setup
243
Configuring Menu 1
243
Figure 19-1 Menu 1 General Setup
244
Table 19-1 Menu 1 General Setup
244
Configuring Dynamic DNS
245
Figure 19-2 Menu 1.1 Configure Dynamic DNS
245
Table 19-2 Menu 1.1 Configure Dynamic DNS
245
Chapter 20 WAN Setup
247
WAN Setup
247
WAN Setup Screen
247
Figure 20-1 WAN Setup
247
Table 20-1 WAN Setup
248
Chapter 21 Dial Backup
249
Dial Backup Overview
249
Configuring Dial Backup in Menu 2
249
Figure 21-1 Menu 2: Dial Backup Setup
249
Advanced WAN Setup
250
Table 21-1 Menu 2: Dial Backup Setup
250
Figure 21-2 Advanced WAN Setup
251
Table 21-2 Advanced WAN Port Setup: at Commands Fields
251
Remote Node Profile (Backup ISP)
252
Table 21-3 Advanced WAN Port Setup: Call Control Parameters
252
Figure 21-3 Remote Node Profile (Backup ISP)
253
Table 21-4 Remote Node Profile (Backup ISP)
253
Editing PPP Options
255
Editing TCP/IP Options
255
Figure 21-4 Menu 11.2 - Remote Node PPP Options
255
Figure 21-5 Remote Node PPP Options Menu Fields
255
Figure 21-6 Remote Node Network Layer Options
256
Table 21-5 Remote Node Network Layer Options
256
Editing Filter Sets
257
Figure 21-7 Menu 11.5: Remote Node Filter (Ethernet)
258
ZyXEL Communications Prestige 792H Compact Manual (27 pages)
G.SHDSL 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 1.88 MB
Table of Contents
Table of Contents
2
1 Introducing the Prestige
3
Certifications
3
2 Hardware
4
Rear Panel Connections
4
The Front Panel Leds
5
3 Setting up Your Computer's IP Address
6
Windows 95/98/Me
7
Windows 2000/NT/XP
9
Checking/Updating Your Computer's IP Address
11
Testing the Connection to the Prestige
11
4 Configuring Your Prestige
11
Accessing Your Prestige Via Web Configurator
12
Common Screen Command Buttons
13
Internet Access Using the Wizard
13
Bridge Mode
15
Figure 10 Internet Connection with Enet Encap
16
Test Your Internet Connection
19
5 Advanced Configuration
19
Network Address Translation Overview
19
Configuring SUA Server
19
Firewall Overview
21
Enabling the Firewall
22
Procedure for Configuring Firewall Rules
22
Configuring Source and Destination Addresses
26
6 Troubleshooting
27
Advertisement
ZyXEL Communications Prestige 792H Specifications (2 pages)
G.SHDSL 4-port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.47 MB
ZyXEL Communications Prestige 792H Declaration Of Conformity (1 page)
GSHDSL 4-Port Security Gateway
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.04 MB
Advertisement
Related Products
ZyXEL Communications Prestige 782R
ZyXEL Communications Prestige 791R
ZyXEL Communications PRESTIGE 792H - V3.40
ZyXEL Communications Prestige 2602HW-C Series
ZyXEL Communications Prestige P660RU-T1
ZyXEL Communications Prestige P-662HW-61
ZyXEL Communications Prestige 642M series
ZyXEL Communications Prestige 661HW Series
ZyXEL Communications PRESTIGE 660 HW Series
ZyXEL Communications Prestige 661H Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL