Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Gateway
ZyWALL 35 Series
ZyXEL Communications ZyWALL 35 Series Manuals
Manuals and User Guides for ZyXEL Communications ZyWALL 35 Series. We have
6
ZyXEL Communications ZyWALL 35 Series manuals available for free PDF download: User Manual
ZyXEL Communications ZyWALL 35 Series User Manual (872 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Firewall
| Size: 24.46 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Contents Overview
9
Table of Contents
9
Table of Contents
11
List of Figures
31
List of Tables
45
Introduction
53
PART I Introduction
53
Chapter 1 Getting to Know Your Zywall
55
Zywall Internet Security Appliance Overview
55
Zywall Features
55
Ways to Manage the Zywall
56
Good Habits for Managing the Zywall
56
Table 1 Zywall Model Specific Features
56
Applications for the Zywall
57
Secure Broadband Internet Access Via Cable or DSL Modem
57
VPN Application
57
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
57
Figure 2 VPN Application
57
WAN Application (Zywall 5 Only)
58
Front Panel Lights
58
Figure 3 3G WAN Application
58
Figure 4 Zywall 70 Front Panel
58
Figure 5 Zywall 35 Front Panel
58
Figure 6 Zywall 5 Front Panel
58
Table 2 Front Panel Lights
59
Chapter 2 Introducing the Web Configurator
61
Web Configurator Overview
61
Accessing the Zywall Web Configurator
61
Figure 7 Change Password Screen
62
Figure 8 Replace Certificate Screen
62
Resetting the Zywall
63
Procedure to Use the Reset Button
63
Uploading a Configuration File Via Console Port
63
Figure 9 Example Xmodem Upload
63
Navigating the Zywall Web Configurator
64
Title Bar
64
Figure 10 HOME Screen
64
Table 3 Title Bar: Web Configurator Icons
64
Main Window
65
HOME Screen: Router Mode
65
Figure 11 Web Configurator HOME Screen in Router Mode (Zywall 5)
65
Table 4 Web Configurator HOME Screen in Router Mode
65
HOME Screen: Bridge Mode
71
Figure 12 Web Configurator HOME Screen in Bridge Mode
71
Table 5 Web Configurator HOME Screen in Bridge Mode
71
Navigation Panel
74
Table 6 Bridge and Router Mode Features Comparison
74
Table 7 Screens Summary
75
Port Statistics
80
Figure 13 HOME > Port Statistics
80
Table 8 HOME > Port Statistics
80
Show Statistics: Line Chart
81
Figure 14 HOME > Show Statistics > Line Chart
81
DHCP Table Screen
82
Figure 15 HOME > Show DHCP Table
82
Table 9 HOME > Show Statistics > Line Chart
82
Table 10 HOME > Show DHCP Table
82
VPN Status
83
Figure 16 HOME > VPN Status
83
Table 11 HOME > VPN Status
83
Bandwidth Monitor
84
Figure 17 Home > Bandwidth Monitor
84
Wizard Setup
87
Chapter 3 Wizard Setup
87
Wizard Setup Overview
87
Figure 18 Wizard Setup Welcome
87
Internet Access
88
ISP Parameters
88
Figure 19 ISP Parameters: Ethernet Encapsulation
88
Table 12 ISP Parameters: Ethernet Encapsulation
88
Figure 20 ISP Parameters: Pppoe Encapsulation
89
Table 13 ISP Parameters: Pppoe Encapsulation
90
Figure 21 ISP Parameters: PPTP Encapsulation
91
Table 14 ISP Parameters: PPTP Encapsulation
91
Internet Access Wizard: Second Screen
92
Figure 22 Internet Access Wizard: Second Screen
92
Internet Access Wizard: Registration
93
Figure 23 Internet Access Setup Complete
93
Figure 24 Internet Access Wizard: Registration
93
Internet Access Wizard: Status
94
Figure 25 Internet Access Wizard: Registration in Progress
94
Table 15 Internet Access Wizard: Registration
94
Internet Access Wizard: Service Activation
95
Figure 26 Internet Access Wizard: Status
95
Figure 27 Internet Access Wizard: Registration Failed
95
Figure 28 Internet Access Wizard: Registered Device
95
VPN Wizard Gateway Setting
96
Figure 29 Internet Access Wizard: Activated Services
96
Figure 30 VPN Wizard: Gateway Setting
96
Table 16 VPN Wizard: Gateway Setting
96
VPN Wizard Network Setting
97
Figure 31 VPN Wizard: Network Setting
98
Table 17 VPN Wizard: Network Setting
98
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
99
Figure 32 VPN Wizard: IKE Tunnel Setting
99
VPN Wizard Ipsec Setting (IKE Phase 2)
100
Table 18 VPN Wizard: IKE Tunnel Setting
100
Figure 33 VPN Wizard: Ipsec Setting
101
Table 19 VPN Wizard: Ipsec Setting
101
VPN Wizard Status Summary
102
Figure 34 VPN Wizard: VPN Status
102
Table 20 VPN Wizard: VPN Status
103
VPN Wizard Setup Complete
104
Anti-Spam Wizard: Email Server Location Setting
104
Figure 35 VPN Wizard Setup Complete
104
Anti-Spam Wizard: Direction Recommendations
105
Figure 36 Anti-Spam Wizard: Email Server Location Setting
105
Table 21 Anti-Spam Wizard: Email Server Location Setting
105
Anti-Spam Wizard: Direction Configuration
106
Figure 37 Anti-Spam Wizard: Direction Recommendations
106
Figure 38 Anti-Spam Wizard: Direction Configuration
107
Table 22 Anti-Spam Wizard: Direction Configuration
107
Anti-Spam Wizard: Setup Complete
108
Figure 39 Anti-Spam Wizard: Setup Complete
108
Chapter 4 Tutorials
109
Dynamic VPN Rule Configuration
109
Figure 40 Dynamic VPN Rule Example
109
Table 23 Dynamic VPN Rule Tutorial Settings
109
Configure Bob's User Account
110
VPN Gateway and Network Policy Configuration
110
Figure 41 VPN Gateway Policy Edit Screens
112
Figure 42 SECURITY > VPN > Add Network Policy (Zywall A)
113
Figure 43 VPN Network Policy Edit Screens
114
Figure 44 Activate VPN Rule (Zywall B)
115
Configure Zero Configuration Mode on Zywall B
116
Figure 45 Tutorial: VPN Summary Screens Comparison Example
116
Figure 46 Check the Telecommuter's Computer IP Address
117
Testing Your VPN Configuration
117
Figure 47 Telecommuter Pinging a Network X IP Address Example
118
Using the Dynamic VPN Rule for more VPN Tunnels
119
Security Settings for VPN Traffic
119
Figure 48 Additional Dynamic VPN Rules Example
119
Figure 49 IDP for from VPN Traffic
120
IDP for from VPN Traffic Example
120
Figure 50 IDP Configuration for Traffic from VPN
121
Figure 51 IDP for to VPN Traffic
121
IDP for to VPN Traffic Example
121
Firewall Rule for VPN Example
122
Figure 52 IDP Configuration for to VPN Traffic
122
Configuring the VPN Rule
123
Figure 53 Firewall Rule for VPN
123
Figure 54 SECURITY > VPN > VPN Rules (IKE)
123
Figure 55 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
124
Figure 56 SECURITY > VPN > VPN Rules (IKE): with Gateway Policy Example
125
Figure 57 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
126
Configuring the Firewall Rules
127
Figure 58 SECURITY > FIREWALL > Rule Summary
127
Figure 59 SECURITY > FIREWALL > Rule Summary > Edit: Allow
128
Figure 60 SECURITY > FIREWALL > Rule Summary: Allow
129
How to Set up a 3G WAN Connection
130
Inserting a 3G Card
130
Figure 61 SECURITY > FIREWALL > Default Rule: Block from VPN to LAN
130
Configuring 3G WAN Settings
131
Figure 62 Tutorial: NETWORK > WAN > 3G (WAN2)
131
Checking WAN Connections
132
Configuring Load Balancing
132
Figure 63 Tutorial: Home
132
Configuring Content Filtering
133
Enable Content Filtering
133
Figure 64 Tutorial: NETWORK > WAN > General
133
Block Categories of Web Content
134
Figure 65 SECURITY > CONTENT FILTER > General
134
Figure 66 SECURITY > CONTENT FILTER > Policy
135
Figure 67 SECURITY > CONTENT FILTER > Policy > External Database (Default)
135
Assign Bob's Computer a Specific IP Address
136
Create a Content Filter Policy for Bob
136
Figure 68 HOME > Show DHCP Table
136
Figure 69 SECURITY > CONTENT FILTER > Policy
136
Set the Content Filter Schedule
137
Figure 70 SECURITY > CONTENT FILTER > Policy > Insert
137
Figure 71 SECURITY > CONTENT FILTER > Policy
137
Block Categories of Web Content for Bob
138
Figure 72 SECURITY > CONTENT FILTER > Policy > Schedule (Bob)
138
Figure 73 SECURITY > CONTENT FILTER > Policy
138
Figure 74 SECURITY > CONTENT FILTER > Policy > External Database (Bob)
139
Registration
141
Chapter 5 Registration
141
Myzyxel.com Overview
141
Subscription Services Available on the Zywall
141
Registration
142
Figure 75 REGISTRATION
143
Table 24 REGISTRATION
143
Service
144
Figure 76 REGISTRATION: Registered Device
144
Figure 77 REGISTRATION > Service
145
Table 25 REGISTRATION > Service
145
Network
147
Part II: Network
147
Advertisement
ZyXEL Communications ZyWALL 35 Series User Manual (835 pages)
Internet security appliance
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 24.91 MB
Table of Contents
Copyright
3
Certifications
4
Safety Warnings
5
Zyxel Limited Warranty
7
Customer Support
8
Table of Contents
11
List of Figures
31
List of Tables
45
Preface
53
Syntax Conventions
54
Chapter 1 Getting to Know Your Zywall
55
Zywall Internet Security Appliance Overview
55
Zywall Features
55
Table 1 Zywall Model Specific Features
55
Physical Features
56
Non-Physical Features
57
Applications for the Zywall
63
Secure Broadband Internet Access Via Cable or DSL Modem
63
VPN Application
63
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
63
Front Panel Lights
64
Figure 2 VPN Application
64
Figure 3 Zywall 70 Front Panel
64
Figure 4 Zywall 35 Front Panel
64
Figure 5 Zywall 5 Front Panel
64
Table 2 Front Panel Lights
64
Chapter 2 Introducing the Web Configurator
67
Web Configurator Overview
67
Accessing the Zywall Web Configurator
67
Resetting the Zywall
68
Procedure to Use the Reset Button
68
Figure 6 Change Password Screen
68
Figure 7 Replace Certificate Screen
68
Uploading a Configuration File Via Console Port
69
Navigating the Zywall Web Configurator
69
Figure 8 Example Xmodem Upload
69
Figure 9 HOME Screen
70
Table 3 Title Bar: Web Configurator Icons
70
Title Bar
70
Figure 10 Web Configurator HOME Screen in Router Mode
71
HOME Screen: Router Mode
71
Main Window
71
Table 4 Web Configurator HOME Screen in Router Mode
71
HOME Screen: Bridge Mode
74
Figure 11 You Can Use the Firewall and VPN in Bridge Mode.web Configurator HOME Screen in Bridge Mode
75
Table 5 Web Configurator HOME Screen in Bridge Mode
75
Navigation Panel
78
Table 6 Bridge and Router Mode Features Comparison
78
Table 7 Screens Summary
79
Figure 12 HOME > Show Statistics
83
Port Statistics
83
Show Statistics: Line Chart
84
Table 8 HOME > Show Statistics
84
DHCP Table Screen
85
Figure 13 HOME > Show Statistics > Line Chart
85
Table 9 HOME > Show Statistics > Line Chart
85
Figure 14 HOME > DHCP Table
86
Table 10 HOME > DHCP Table
86
VPN Status
86
Bandwidth Monitor
87
Figure 15 HOME > VPN Status
87
Table 11 HOME > VPN Status
87
Figure 16 Home > Bandwidth Monitor
88
Chapter 3 Wizard Setup
89
Wizard Setup Overview
89
Internet Access
90
ISP Parameters
90
Ethernet
90
Figure 17 Wizard Setup Welcome
90
Figure 18 ISP Parameters: Ethernet Encapsulation
91
Table 12 ISP Parameters: Ethernet Encapsulation
91
Pppoe Encapsulation
92
Figure 19 ISP Parameters: Pppoe Encapsulation
92
Table 13 ISP Parameters: Pppoe Encapsulation
92
PPTP Encapsulation
93
Figure 20 ISP Parameters: PPTP Encapsulation
94
Table 14 ISP Parameters: PPTP Encapsulation
94
Internet Access Wizard: Second Screen
95
Internet Access Wizard: Registration
96
Figure 21 Internet Access Wizard: Second Screen
96
Figure 22 Internet Access Setup Complete
96
Figure 23 Internet Access Wizard: Registration
97
Table 15 Internet Access Wizard: Registration
97
Figure 24 Internet Access Wizard: Registration in Progress
98
Figure 25 Internet Access Wizard: Status
98
VPN Wizard Gateway Setting
99
Figure 26 Internet Access Wizard: Registration Failed
99
Figure 27 Internet Access Wizard: Registered Device
99
Figure 28 Internet Access Wizard: Activated Services
99
Figure 29 VPN Wizard: Gateway Setting
100
Table 16 VPN Wizard: Gateway Setting
100
VPN Wizard Network Setting
101
Figure 30 VPN Wizard: Network Setting
102
Table 17 VPN Wizard: Network Setting
102
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
103
Figure 31 VPN Wizard: IKE Tunnel Setting
103
VPN Wizard Ipsec Setting (IKE Phase 2)
104
Table 18 VPN Wizard: IKE Tunnel Setting
104
Figure 32 VPN Wizard: Ipsec Setting
105
Table 19 VPN Wizard: Ipsec Setting
105
VPN Wizard Status Summary
106
Figure 33 VPN Wizard: VPN Status
107
Table 20 VPN Wizard: VPN Status
107
VPN Wizard Setup Complete
109
Figure 34 VPN Wizard Setup Complete
109
Chapter 4 Tutorial
111
Security Settings for VPN Traffic
111
IDP for from VPN Traffic Example
111
Figure 35 IDP for from VPN Traffic
112
Figure 36 IDP Configuration for Traffic from VPN
112
IDP for to VPN Traffic Example
113
Figure 37 IDP for to VPN Traffic
113
Firewall Rule for VPN Example
114
Figure 38 IDP Configuration for to VPN Traffic
114
Configuring the VPN Rule
115
Figure 39 Firewall Rule for VPN
115
Figure 40 SECURITY > VPN > VPN Rules (IKE)
115
Figure 41 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
116
Figure 42 SECURITY > VPN > VPN Rules (IKE): with Gateway Policy Example
117
Configuring the Firewall Rules
118
Figure 43 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
118
Figure 44 SECURITY > FIREWALL > Rule Summary
119
Firewall Rule to Allow Access Example
119
Figure 45 SECURITY > FIREWALL > Rule Summary > Edit: Allow
120
Default Firewall Rule to Block Other Access Example
121
Figure 46 SECURITY > FIREWALL > Rule Summary: Allow
121
Figure 47 SECURITY > FIREWALL > Default Rule: Block from VPN to LAN
121
Chapter 5 Registration
123
Myzyxel.com Overview
123
Subscription Services Available on the Zywall
123
Registration
124
Figure 48 REGISTRATION
124
Table 21 REGISTRATION
125
Service
126
Figure 49 REGISTRATION: Registered Device
126
Figure 50 REGISTRATION > Service
126
Table 22 REGISTRATION > Service
127
Chapter 6 LAN Screens
129
LAN, WAN and the Zywall
129
IP Address and Subnet Mask
129
Figure 51 LAN and WAN
129
Private IP Addresses
130
Dhcp
131
IP Pool Setup
131
RIP Setup
131
Multicast
131
Wins
132
Lan
132
Figure 52 NETWORK > LAN
133
Table 23 NETWORK > LAN
133
LAN Static DHCP
135
LAN IP Alias
136
Figure 53 NETWORK > LAN > Static DHCP
136
Table 24 NETWORK > LAN > Static DHCP
136
Figure 54 Physical Network & Partitioned Logical Networks
137
Figure 55 NETWORK > LAN > IP Alias
138
Table 25 NETWORK > LAN > IP Alias
138
LAN Port Roles
139
Figure 56 NETWORK > LAN > Port Roles
140
Figure 57 Port Roles Change Complete
140
Table 26 NETWORK > LAN > Port Roles
140
ZyXEL Communications ZyWALL 35 Series User Manual (832 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Firewall
| Size: 26.2 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
31
List of Tables
45
Introduction
53
PART I Introduction
53
Chapter 1 Getting to Know Your Zywall
55
Zywall Internet Security Appliance Overview
55
Zywall Features
55
Ways to Manage the Zywall
56
Good Habits for Managing the Zywall
56
Table 1 Zywall Model Specific Features
56
Applications for the Zywall
57
Secure Broadband Internet Access Via Cable or DSL Modem
57
VPN Application
57
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
57
Figure 2 VPN Application
57
WAN Application (Zywall 5 Only)
58
Front Panel Lights
58
Figure 3 3G WAN Application
58
Figure 4 Zywall 70 Front Panel
58
Figure 5 Zywall 35 Front Panel
58
Figure 6 Zywall 5 Front Panel
58
Table 2 Front Panel Lights
59
Chapter 2 Introducing the Web Configurator
61
Web Configurator Overview
61
Accessing the Zywall Web Configurator
61
Figure 7 Change Password Screen
62
Figure 8 Replace Certificate Screen
62
Resetting the Zywall
63
Procedure to Use the Reset Button
63
Uploading a Configuration File Via Console Port
63
Figure 9 Example Xmodem Upload
63
Navigating the Zywall Web Configurator
64
Title Bar
64
Figure 10 HOME Screen
64
Main Window
65
HOME Screen: Router Mode
65
Figure 11 Web Configurator HOME Screen in Router Mode (Zywall 5)
65
Table 3 Title Bar: Web Configurator Icons
65
Table 4 Web Configurator HOME Screen in Router Mode
66
HOME Screen: Bridge Mode
69
Figure 12 Web Configurator HOME Screen in Bridge Mode
70
Table 5 Web Configurator HOME Screen in Bridge Mode
70
Navigation Panel
73
Table 6 Bridge and Router Mode Features Comparison
73
Table 7 Screens Summary
74
Port Statistics
78
Figure 13 HOME > Show Statistics
78
Table 8 HOME > Show Statistics
78
Show Statistics: Line Chart
79
Figure 14 HOME > Show Statistics > Line Chart
79
DHCP Table Screen
80
Figure 15 HOME > DHCP Table
80
Table 9 HOME > Show Statistics > Line Chart
80
Table 10 HOME > DHCP Table
80
VPN Status
81
Figure 16 HOME > VPN Status
81
Table 11 HOME > VPN Status
81
Bandwidth Monitor
82
Figure 17 Home > Bandwidth Monitor
82
Table 12 ADVANCED > BW MGMT > Monitor
82
Wizard Setup
85
Chapter 3 Wizard Setup
85
Wizard Setup Overview
85
Internet Access
85
Figure 18 Wizard Setup Welcome
85
Figure 19 ISP Parameters: Ethernet Encapsulation
86
ISP Parameters
86
Table 13 ISP Parameters: Ethernet Encapsulation
86
Figure 20 ISP Parameters: Pppoe Encapsulation
87
Pptp Encapsulation
88
Table 14 ISP Parameters: Pppoe Encapsulation
88
Figure 21 ISP Parameters: PPTP Encapsulation
89
Table 15 ISP Parameters: PPTP Encapsulation
89
Figure 22 Internet Access Wizard: Second Screen
90
Internet Access Wizard: Second Screen
90
Figure 23 Internet Access Setup Complete
91
Internet Access Wizard: Registration
91
Figure 24 Internet Access Wizard: Registration
92
Table 16 Internet Access Wizard: Registration
92
Figure 25 Internet Access Wizard: Registration in Progress
93
Figure 26 Internet Access Wizard: Status
93
Internet Access Wizard: Status
93
Figure 27 Internet Access Wizard: Registration Failed
94
Figure 28 Internet Access Wizard: Registered Device
94
Figure 29 Internet Access Wizard: Activated Services
94
Internet Access Wizard: Service Activation
94
VPN Wizard Gateway Setting
95
Figure 30 VPN Wizard: Gateway Setting
95
Table 17 VPN Wizard: Gateway Setting
95
VPN Wizard Network Setting
96
Figure 31 VPN Wizard: Network Setting
96
Table 18 VPN Wizard: Network Setting
96
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
97
Figure 32 VPN Wizard: IKE Tunnel Setting
98
Table 19 VPN Wizard: IKE Tunnel Setting
98
VPN Wizard Ipsec Setting (IKE Phase 2)
99
Figure 33 VPN Wizard: Ipsec Setting
99
VPN Wizard Status Summary
100
Table 20 VPN Wizard: Ipsec Setting
100
Figure 34 VPN Wizard: VPN Status
101
Table 21 VPN Wizard: VPN Status
101
VPN Wizard Setup Complete
103
Figure 35 VPN Wizard Setup Complete
103
Tutorial
105
Chapter 4 Tutorial
105
Security Settings for VPN Traffic
105
IDP for from VPN Traffic Example
105
Figure 36 IDP for from VPN Traffic
106
Figure 37 IDP Configuration for Traffic from VPN
106
IDP for to VPN Traffic Example
107
Figure 38 IDP for to VPN Traffic
107
Firewall Rule for VPN Example
108
Figure 39 IDP Configuration for to VPN Traffic
108
Configuring the VPN Rule
109
Figure 40 Firewall Rule for VPN
109
Figure 41 SECURITY > VPN > VPN Rules (IKE)
109
Figure 42 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
110
Figure 43 SECURITY > VPN > VPN Rules (IKE): with Gateway Policy Example
111
Configuring the Firewall Rules
112
Figure 44 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
112
Figure 45 SECURITY > FIREWALL > Rule Summary
113
Figure 46 SECURITY > FIREWALL > Rule Summary > Edit: Allow
114
Figure 47 SECURITY > FIREWALL > Rule Summary: Allow
115
Figure 48 SECURITY > FIREWALL > Default Rule: Block from VPN to LAN
115
How to Set up a 3G WAN Connection
116
Configuring 3G WAN Settings
116
Figure 49 Tutorial: NETWORK > WAN > WAN 2 (3G WAN)
116
Configuring Load Balancing
117
Inserting a 3G Card
117
Checking WAN Connections
117
Figure 50 Tutorial: NETWORK > WAN > General
117
Figure 51 Tutorial: Home
118
Registration
119
Chapter 5 Registration
119
Myzyxel.com Overview
119
Subscription Services Available on the Zywall
119
Registration
120
Figure 52 REGISTRATION
121
Table 22 REGISTRATION
121
Service
122
Figure 53 REGISTRATION: Registered Device
122
Figure 54 REGISTRATION > Service
123
Table 23 REGISTRATION > Service
123
Network
125
Part II: Network
125
LAN Screens
127
Advertisement
ZyXEL Communications ZyWALL 35 Series User Manual (807 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 30.57 MB
Table of Contents
Table of Contents
10
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
List of Figures
32
List of Tables
44
Preface
52
Syntax Conventions
53
Chapter 1 Getting to Know Your Zywall
54
Table 1 Model Specific Features
54
Physical Features
55
Non-Physical Features
56
Ipsec Vpn Capability
57
Wireless Lan Mac Address Filtering
59
Central Network Management
60
Dynamic Dns Support
60
Full Network Management
61
Logging and Tracing
61
Port Forwarding
61
Roadrunner Support
61
Traffic Redirect
61
Upgrade Zywall Firmware Via Lan
61
Zywall Features
54
Zywall Internet Security Appliance Overview
54
Applications for the Zywall
62
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
62
Secure Broadband Internet Access Via Cable or DSL Modem
62
VPN Application
62
Figure 2 VPN Application
63
Figure 3 Zywall 70 Front Panel
63
Figure 4 Zywall 35 Front Panel
63
Figure 5 Zywall 5 Front Panel
63
Front Panel Leds
63
Table 2 Front Panel Leds
64
Chapter 2 Introducing the Web Configurator
66
Accessing the Zywall Web Configurator
66
Web Configurator Overview
66
Figure 6 Change Password Screen
67
Figure 7 Replace Certificate Screen
67
Procedure to Use the Reset Button
68
Uploading a Configuration File Via Console Port
68
Resetting the Zywall
67
Figure 8 Example Xmodem Upload
68
Figure 9 Web Configurator HOME Screen in Router Mode
69
Router Mode
69
Table 3 Web Configurator HOME Screen in Router Mode
70
Bridge Mode
71
Figure 10 Web Configurator HOME Screen in Bridge Mode
72
Table 4 Web Configurator HOME Screen in Bridge Mode
72
Navigation Panel
74
Table 5 Bridge and Router Mode Features Comparison
74
Table 6 Screens Summary
75
Figure 11 Home : Show Statistics
79
System Statistics
79
Table 7 Home: Show Statistics
79
Figure 12 Home : Show Statistics: Line Chart
80
Show Statistics: Line Chart
80
DHCP Table Screen
81
Figure 13 Home : DHCP Table
81
Table 8 Home: Show Statistics: Line Chart
81
Table 9 Home: DHCP Table
82
VPN Status
82
Figure 14 Home : VPN Status
83
Table 10 Home : VPN Status
83
Navigating the Zywall Web Configurator
68
Chapter 3 Wizard Setup
84
Wizard Setup Overview
84
Internet Access
84
Ethernet
84
ISP Parameters
84
Figure 15 ISP Parameters : Ethernet Encapsulation
85
Table 11 ISP Parameters : Ethernet Encapsulation
85
Figure 16 ISP Parameters : Pppoe Encapsulation
86
Pppoe Encapsulation
86
Table 12 ISP Parameters: Pppoe Encapsulation
86
PPTP Encapsulation
87
Figure 17 ISP Parameters: PPTP Encapsulation
88
Table 13 ISP Parameters : PPTP Encapsulation
88
Figure 18 Internet Access Wizard: Second Screen
89
Internet Access Wizard: Second Screen
89
Figure 19 Internet Access Setup Complete
90
Figure 20 Internet Access Wizard: Registration
90
Internet Access Wizard: Registration
90
Figure 21 Internet Access Wizard: Registration in Progress
91
Table 14 Internet Access Wizard: Registration
91
Figure 22 Internet Access Wizard: Status
92
Figure 23 Internet Access Wizard: Registration Failed
92
Figure 24 Internet Access Wizard: Registered Device
92
VPN Wizard Gateway Setting
93
Figure 25 Internet Access Wizard: Activated Services
93
Figure 26 VPN Wizard: Gateway Setting
93
VPN Wizard Network Setting
94
Table 15 VPN Wizard: Gateway Setting
94
Figure 27 VPN Wizard: Network Setting
95
Table 16 VPN Wizard : Network Setting
95
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
96
Figure 28 VPN Wizard: IKE Tunnel Setting
96
Table 17 VPN Wizard: IKE Tunnel Setting
97
VPN Wizard Ipsec Setting (IKE Phase 2)
98
Figure 29 VPN Wizard: Ipsec Setting
98
Table 18 VPN Wizard: Ipsec Setting
98
VPN Wizard Status Summary
99
Figure 30 VPN Wizard: VPN Status
100
Table 19 VPN Wizard: VPN Status
100
VPN Wizard Setup Complete
102
Figure 31 VPN Wizard Setup Complete
102
Chapter 4 Registration
104
Myzyxel.com Overview
104
Subscription Services Available on the Zywall
104
Registration
105
Figure 32 Registration
105
Table 20 Registration
106
Service
107
Figure 33 Registration: Registered Device
107
Figure 34 Registration: Service
107
Table 21 Service
108
Chapter 5 LAN Screens
110
LAN Overview
110
DHCP Setup
110
IP Pool Setup
110
Lan Tcp/Ip
110
Factory LAN Defaults
110
IP Address and Subnet Mask
111
RIP Setup
111
Multicast
112
DNS Servers
112
Lan
112
Figure 35 LAN
113
Table 22 LAN
113
LAN Static DHCP
115
Figure 36 LAN Static DHCP
115
Table 23 LAN Static DHCP
115
LAN IP Alias
116
Figure 37 Physical Network & Partitioned Logical Networks
116
Figure 38 LAN IP Alias
117
Table 24 LAN IP Alias
117
LAN Port Roles
118
Figure 39 WLAN Port Role Example
118
Figure 40 LAN Port Roles
119
Table 25 LAN Port Roles
119
Figure 41 Port Roles Change Complete
120
Chapter 6 Bridge Screens
122
Bridge Loop
122
Spanning Tree Protocol (STP)
122
Figure 42 Bridge Loop: Bridge Connected to Wired LAN
122
How STP Works
123
Rapid STP
123
STP Terminology
123
Table 26 STP Path Costs
123
STP Port States
124
Bridge
124
Table 27 STP Port States
124
Figure 43 Bridge
125
Table 28 Bridge
125
Bridge Port Roles
126
Figure 44 WLAN Port Role Example
127
Figure 45 Bridge Port Roles
127
Table 29 Bridge Port Roles
127
Figure 46 Port Roles Change Complete
128
Chapter 7 WAN Screens
130
WAN Overview
130
Multiple WAN
130
Load Balancing Introduction
131
Load Balancing Algorithms
131
Least Load First
131
Example 1
132
Example 2
132
Figure 47 Least Load First Example
132
Table 30 Least Load First: Example 1
132
Table 31 Least Load First: Example 2
132
Figure 48 Weighted Round Robin Algorithm Example
133
Spillover
133
Weighted Round Robin
133
TCP/IP Priority (Metric)
134
WAN General
134
Figure 49 Spillover Algorithm Example
134
Figure 50 WAN General
135
Table 32 WAN General
136
Configuring Load Balancing
137
Figure 51 Load Balancing: Least Load First
138
Least Load First
138
Table 33 Load Balancing: Least Load First
138
Figure 52 Load Balancing: Weighted Round Robin
139
Spillover
139
Table 34 Load Balancing: Weighted Round Robin
139
Weighted Round Robin
139
WAN Route
140
Figure 53 Load Balancing: Spillover
140
Table 35 Load Balancing: Spillover
140
Figure 54 WAN Route
141
Table 36 WAN Route
141
WAN IP Address Assignment
142
DNS Server Address Assignment
142
Table 37 Private IP Address Ranges
142
WAN MAC Address
143
Wan
143
Table 38 Example of Network Properties for LAN Servers with Fixed IP Addresses
143
WAN Ethernet Encapsulation
143
Figure 55 WAN: Ethernet Encapsulation
144
Table 39 WAN: Ethernet Encapsulation
144
Pppoe Encapsulation
146
Figure 56 WAN: Pppoe Encapsulation
147
Table 40 WAN: Pppoe Encapsulation
148
Figure 57 WAN: PPTP Encapsulation
150
PPTP Encapsulation
150
Table 41 WAN: PPTP Encapsulation
151
Traffic Redirect
153
Figure 58 Traffic Redirect WAN Setup
153
Configuring Traffic Redirect
154
Figure 59 Traffic Redirect LAN Setup
154
Figure 60 Traffic Redirect
154
Table 42 Traffic Redirect
154
Configuring Dial Backup
155
Figure 61 Dial Backup
156
Table 43 Dial Backup
157
Advanced Modem Setup
159
AT Command Strings
159
DTR Signal
159
Response Strings
159
Configuring Advanced Modem Setup
159
Figure 62 Advanced Setup
160
Table 44 Advanced Setup
160
Chapter 8 DMZ Screens
162
Dmz
162
Configuring DMZ
162
Figure 63 DMZ
163
Table 45 DMZ
163
DMZ Static DHCP
165
Figure 64 DMZ Static DHCP
166
Table 46 DMZ Static DHCP
166
DMZ IP Alias
167
Figure 65 DMZ: IP Alias
167
Table 47 DMZ: IP Alias
167
DMZ Public IP Address Example
168
DMZ Private and Public IP Address Example
169
Figure 66 DMZ Public Address Example
169
DMZ Port Roles
170
Figure 67 DMZ Private and Public Address Example
170
Figure 68 WLAN Port Role Example
171
Figure 69 DMZ: Port Roles
172
Table 48 DMZ: Port Roles
172
Chapter 9 Wireless LAN
174
Wireless LAN Introduction
174
Additional Installation Requirements for Using 802.1X
174
Configuring WLAN
174
Figure 70 WLAN
175
Table 49 WLAN
175
WLAN Static DHCP
177
WLAN IP Alias
178
Figure 71 WLAN Static DHCP
178
Table 50 WLAN Static DHCP
178
Figure 72 WLAN IP Alias
179
Table 51 WLAN IP Alias
179
WLAN Port Roles
180
Figure 73 WLAN Port Role Example
180
Figure 74 WLAN Port Roles
181
Table 52 WLAN Port Roles
181
Wireless Security
182
Figure 75 WLAN Port Roles Change Complete
182
Authentication
183
Encryption
183
Figure 76 Zywall Wireless Security Levels
183
Hide Zywall Identity
184
Restricted Access
184
Security Parameters Summary
184
WEP Encryption
184
Table 53 Wireless Security Relational Matrix
184
Overview
185
Introduction to RADIUS
185
Types of RADIUS Messages
185
EAP Authentication Overview
186
Dynamic WEP Key Exchange
186
Figure 77 EAP Authentication
186
Introduction to WPA
187
Encryption
187
User Authentication
187
WPA-PSK Application Example
188
Introduction to RADIUS
189
WPA with RADIUS Application Example
189
Figure 78 WPA-PSK Authentication
189
Wireless Client WPA Supplicants
190
Wireless Card
190
Figure 79 WPA with RADIUS Application Example
190
Figure 80 Wireless Card: no Security
191
Table 54 Wireless Card: no Security
191
Static WEP
192
Figure 81 Wireless Card: Static WEP
193
Table 55 Wireless Card: Static WEP
193
Wpa-Psk
193
Figure 82 Wireless Card: WPA-PSK
194
Table 56 Wireless Card: WPA-PSK
194
Figure 83 Wireless Card: WPA
195
Table 57 Wireless Card: WPA
195
Wpa
195
Figure 84 Wireless Card: 802.1X + Dynamic WEP
196
IEEE 802.1X + Dynamic WEP
196
Table 58 Wireless Card: 802.1X + Dynamic WEP
196
Figure 85 Wireless Card: 802.1X + Static WEP
197
IEEE 802.1X + Static WEP
197
Table 59 Wireless Card: 802.1X + Static WEP
197
Figure 86 Wireless Card: 802.1X + no WEP
198
IEEE 802.1X + no WEP
198
Figure 87 Wireless Card: no Access 802.1X + Static WEP
199
No Access 802.1X + Static WEP
199
Table 60 Wireless Card: 802.1X + no WEP
199
No Access 802.1X + no WEP
200
MAC Filter
200
Table 61 Wireless Card: no Access 802.1X + Static WEP
200
Figure 88 Wireless Card: MAC Address Filter
201
Table 62 Wireless Card: MAC Address Filter
201
Chapter 10 Firewalls
202
Firewall Overview
202
Types of Firewalls
202
Application-Level Firewalls
202
Packet Filtering Firewalls
202
Stateful Inspection Firewalls
203
Introduction to Zyxel's Firewall
203
Denial of Service
204
Basics
204
Figure 89 Zywall Firewall Application
204
Table 63 Common IP Ports
204
Figure 90 Three-Way Handshake
205
Types of Dos Attacks
205
Figure 91 SYN Flood
206
Figure 92 Smurf Attack
207
ICMP Vulnerability
207
Illegal Commands (Netbios and SMTP)
207
Table 64 ICMP Commands that Trigger Alerts
207
Table 65 Legal Netbios Commands
207
Traceroute
208
Stateful Inspection
208
Table 66 Legal SMTP Commands
208
Figure 93 Stateful Inspection
209
Stateful Inspection Process
209
Stateful Inspection and the Zywall
210
TCP Security
210
UDP/ICMP Security
211
Upper Layer Protocols
211
Guidelines for Enhancing Security with Your Firewall
212
Packet Filtering Vs Firewall
212
Packet Filtering
212
When to Use Filtering
212
Firewall
213
When to Use the Firewall
213
Chapter 11 Firewall Screens
214
Access Methods
214
Firewall Policies Overview
214
Rule Logic Overview
216
Action
216
Key Fields for Configuring Rules
216
Rule Checklist
216
Security Ramifications
216
Destination Address
217
Service
217
Source Address
217
Connection Direction Examples
217
LAN to WAN Rules
217
WAN to LAN Rules
218
Alerts
218
Figure 94 LAN to WAN Traffic
218
Figure 95 WAN to LAN Traffic
218
Firewall Default Rule (Router Mode)
219
Figure 96 Default Rule (Router Mode)
219
Table 67 Default Rule (Router Mode)
219
Firewall Default Rule (Bridge Mode)
220
Figure 97 Default Rule (Bridge Mode)
221
Table 68 Default Rule (Bridge Mode)
221
Firewall Rule Summary
222
Figure 98 Rule Summary
222
Table 69 Rule Summary
222
Firewall Edit Rule
223
Figure 99 Firewall Edit Rule
224
Table 70 Firewall Edit Rule
225
Anti-Probing
226
Figure 100 Anti-Probing
226
Table 71 Anti-Probing
226
Firewall Threshold
227
Half-Open Sessions
227
Threshold Values
227
TCP Maximum Incomplete and Blocking Time
228
Figure 101 Firewall Threshold
229
Table 72 Firewall Threshold
229
Service
230
Figure 102 Firewall Service
231
Table 73 Firewall Service
231
Figure 103 Firewall Edit Custom Service
232
Firewall Edit Custom Service
232
Table 74 Firewall Edit Custom Service
232
Predefined Services
233
Table 75 Predefined Services
233
Example Firewall Rule
235
Figure 104 Service
236
Figure 105 Edit Custom Service Example
236
Figure 106 Rule Summary
237
Figure 107 Rule Edit Example
237
Figure 108 My Service Rule Configuration
238
Figure 109 My Service Example Rule Summary
239
Chapter 12 Intrusion Detection and Prevention (IDP)
240
Introduction to IDP
240
Figure 110 Network Intrusions
240
Firewalls and Intrusions
240
Host IDP
241
IDS and IDP
241
Network IDP
241
Blaster W32.Worm
242
Example Intrusions
242
Nimda
242
SQL Slammer Worm
242
Mydoom
243
Zywall IDP
243
Chapter 13 Configuring IDP
244
Overview
244
Interfaces
244
General Setup
245
Figure 111 Applying IDP to Interfaces
245
IDP Signatures
246
Attack Types
246
Figure 112 IDP: General
246
Table 76 IDP: General Setup
246
Figure 113 Attack Types
247
Table 77 Attack Types
247
Intrusion Severity
248
Signature Actions
248
Table 78 Intrusion Severity
248
Configuring IDP Signatures
249
Figure 114 Signature Actions
249
Table 79 Signature Actions
249
Figure 115 IDP: Signatures
250
Table 80 IDP Signatures: Group View
250
Query Example 1
251
Query View
251
Figure 116 Signature Query by Partial Name
252
Figure 117 Signature Query by Complete ID
253
Query Example 2
253
Update
254
Figure 118 Signature Query by Attribute
254
Mysecurity Zone
254
Configuring IDP Update
255
Figure 119 Signatures Update
255
Table 81 Signatures Update
256
Backup and Restore
257
Figure 120 IDP: Backup & Restore
257
Chapter 14 Anti-Virus
258
Anti-Virus Overview
258
Computer Virus Infection and Prevention
258
Table 82 Common Computer Virus Types
258
Types of Computer Viruses
258
Types of Anti-Virus Scanner
259
Introduction to the Zywall Anti-Virus Scanner
259
Figure 121 Zywall Anti-Virus Example
260
How the Zywall Anti-Virus Scanner Works
260
Notes about the Zywall Anti-Virus
260
General Anti-Virus Setup
261
Figure 122 Anti-Virus: General
261
Signature Update
262
Table 83 Anti-Virus: General
262
Configuring Anti-Virus Update
263
Mysecurity Zone
263
Figure 123 Anti-Virus: Update
264
Table 84 Anti-Virus: Update
264
Chapter 15 Anti-Spam
266
Anti-Spam Overview
266
Anti-Spam External Database
266
Spambulk Engine
267
Spamcontent Engine
267
Spamrepute Engine
267
Figure 124 Anti-Spam External Database Example
268
Phishing
268
Spam Threshold
268
Spamtricks Engine
268
Blacklist
269
SMTP and POP3
269
Whitelist
269
MIME Headers
270
Anti-Spam General Screen
270
Figure 125 Anti-Spam: General
270
Anti-Spam External DB Screen
271
Table 85 Anti-Spam: General
271
Figure 126 Anti-Spam: External DB
272
Table 86 Anti-Spam: External DB
272
Anti-Spam Lists Screen
273
Figure 127 Anti-Spam: Lists
274
Table 87 Anti-Spam: Lists
274
Anti-Spam Rule Edit Screen
275
Figure 128 Anti-Spam Rule Edit
275
Table 88 Anti-Spam Rule Edit
276
Chapter 16 Content Filtering Screens
278
Content Filtering Overview
278
Create a Filter List
278
Customize Web Site Access
278
Restrict Web Features
278
Content Filter General
278
Figure 129 Content Filter : General
279
Table 89 Content Filter : General
279
Content Filtering with an External Database
280
Content Filter Categories
281
Figure 130 Content Filtering Lookup Procedure
281
Figure 131 Content Filter : Categories
282
Table 90 Content Filter: Categories
282
Content Filter Customization
288
Figure 132 Content Filter: Customization
288
Table 91 Content Filter: Customization
289
Customizing Keyword Blocking URL Checking
290
Domain Name or IP Address URL Checking
290
File Name URL Checking
290
Full Path URL Checking
290
Content Filtering Cache
291
Figure 133 Content Filter: Cache
291
Table 92 Content Filter: Cache
292
Chapter 17 Content Filtering Reports
294
Checking Content Filtering Activation
294
Viewing Content Filtering Reports
294
Figure 134 Myzyxel.com: Login
295
Figure 135 Myzyxel.com: Welcome
295
Figure 136 Myzyxel.com: Service Management
296
Figure 137 Blue Coat: Login
296
Figure 138 Content Filtering Reports Main Screen
297
Figure 139 Blue Coat: Report Home
297
Figure 140 Global Report Screen Example
298
Web Site Submission
299
Figure 141 Requested Urls Example
299
Figure 142 Web Page Review Process Screen
300
Chapter 18 Introduction to Ipsec
302
VPN Overview
302
Encryption
302
Ipsec
302
Other Terminology
302
Security Association
302
Accessing Network Resources When NAT Is Enabled
303
Data Confidentiality
303
Data Integrity
303
Data Origin Authentication
303
Figure 143 Encryption and Decryption
303
Linking Two or more Private Networks Together
303
Unsupported IP Applications
303
VPN Applications
303
Ipsec Architecture
304
Ipsec Algorithms
304
Key Management
304
Encapsulation
304
Figure 144 Ipsec Architecture
304
Transport Mode
305
Tunnel Mode
305
Ipsec and NAT
305
Figure 145 Transport and Tunnel Mode Ipsec Encapsulation
305
Table 93 VPN and NAT
306
Chapter 19 VPN Screens
308
Vpn/Ipsec Overview
308
Ipsec Algorithms
308
AH (Authentication Header) Protocol
308
ESP (Encapsulating Security Payload) Protocol
308
My Zywall
309
Remote Gateway Address
309
Table 94 ESP and AH
309
Dynamic Remote Gateway Address
310
Nailed up
310
NAT Traversal
310
NAT Traversal Configuration
311
ID Type and Content
311
Figure 146 NAT Router between Ipsec Routers
311
ID Type and Content Examples
312
Table 95 Local ID Type and Content Fields
312
Table 96 Peer ID Type and Content Fields
312
Table 97 Matching ID Type and Content Configuration Example
312
IKE Phases
313
Figure 147 Two Phases to Set up the Ipsec SA
313
Table 98 Mismatching ID Type and Content Configuration Example
313
Negotiation Mode
314
Pre-Shared Key
314
Diffie-Hellman (DH) Key Groups
315
Perfect Forward Secrecy (PFS)
315
X-Auth (Extended Authentication)
315
Authentication Server
315
VPN Rules (IKE)
316
Figure 148 VPN Rules (IKE)
316
Table 99 Ipsec Fields Summary
316
Figure 149 Gateway and Network Policies
317
Figure 150 Ipsec Fields Summary
317
Table 100 VPN Screen Icons Key
317
VPN Rules (IKE) Gateway Policy Edit
318
Figure 151 VPN Rules (IKE): Gateway Policy: Edit
319
Table 101 VPN Rules (IKE): Gateway Policy: Edit
320
VPN Rules (IKE): Network Policy Edit
324
Figure 152 VPN Rules (IKE): Network Policy Edit
325
Table 102 VPN Rules (IKE): Network Policy Edit
326
VPN Rules (IKE): Network Policy Move
328
VPN Rules (Manual)
329
Figure 153 VPN Rules (IKE): Network Policy Move
329
Table 103 VPN Rules (IKE): Network Policy Move
329
Figure 154 VPN Rules (Manual)
330
Table 104 VPN Rules (Manual)
330
VPN Rules (Manual): Edit
331
Security Parameter Index (SPI)
331
Figure 155 VPN Rules (Manual): Edit
332
Table 105 VPN Rules (Manual) Edit
332
VPN SA Monitor
335
Figure 156 VPN: SA Monitor
335
Table 106 VPN: SA Monitor
335
VPN Global Setting
336
Figure 157 VPN: Global Setting
336
Table 107 VPN: Global Setting
336
Telecommuter Vpn/Ipsec Examples
337
Telecommuters Sharing One VPN Rule Example
337
Figure 158 Telecommuters Sharing One VPN Rule Example
338
Table 108 Telecommuters Sharing One VPN Rule Example
338
Telecommuters Using Unique VPN Rules Example
338
Figure 159 Telecommuters Using Unique VPN Rules Example
339
Table 109 Telecommuters Using Unique VPN Rules Example
339
VPN and Remote Management
340
Chapter 20 Certificates
342
Certificates Overview
342
Advantages of Certificates
343
Self-Signed Certificates
343
Configuration Summary
343
Figure 160 Certificate Configuration Overview
343
My Certificates
344
Figure 161 My Certificates
344
Table 110 My Certificates
344
My Certificate Import
346
Certificate File Formats
346
My Certificate Create
347
Figure 162 My Certificate Import
347
Table 111 My Certificate Import
347
Figure 163 My Certificate Create
348
Table 112 My Certificate Create
348
My Certificate Details
350
Figure 164 My Certificate Details
351
Table 113 My Certificate Details
352
Trusted cas
353
Figure 165 Trusted cas
354
Table 114 Trusted cas
354
Trusted CA Import
355
Figure 166 Trusted CA Import
355
Trusted CA Details
356
Table 115 Trusted CA Import
356
Figure 167 Trusted CA Details
357
Table 116 Trusted CA Details
357
Trusted Remote Hosts
359
Figure 168 Trusted Remote Hosts
360
Table 117 Trusted Remote Hosts
360
Verifying a Trusted Remote Host's Certificate
361
Figure 169 Remote Host Certificates
361
Trusted Remote Host Certificate Fingerprints
361
Trusted Remote Hosts Import
362
Figure 170 Certificate Details
362
Trusted Remote Host Certificate Details
363
Figure 171 Trusted Remote Host Import
363
Table 118 Trusted Remote Host Import
363
Figure 172 Trusted Remote Host Details
364
Table 119 Trusted Remote Host Details
364
Directory Servers
366
Figure 173 Directory Servers
366
Directory Server Add or Edit
367
Figure 174 Directory Server Add
367
Table 120 Directory Servers
367
Table 121 Directory Server Add
368
Authentication Server
370
Authentication Server Overview
370
Local User Database
370
Radius
370
Figure 176 RADIUS
372
Radius
372
Table 122 Local User Database
372
Table 123 RADIUS
373
Chapter 21 Authentication Server
370
Figure 175 Local User Database
371
Chapter 22 Network Address Translation (NAT)
374
NAT Overview
374
NAT Definitions
374
Table 124 NAT Definitions
374
How NAT Works
375
What NAT Does
375
Figure 177 How NAT Works
376
Figure 178 NAT Application with IP Alias
376
NAT Application
376
Figure 179 Port Restricted Cone NAT Example
377
NAT Mapping Types
377
Port Restricted Cone NAT
377
Using NAT
378
SUA (Single User Account) Versus NAT
378
Table 125 NAT Mapping Types
378
NAT Overview
379
Figure 180 NAT Overview
379
Table 126 NAT Overview
379
NAT Address Mapping
380
Figure 181 NAT Address Mapping
381
Table 127 NAT Address Mapping
381
Figure 182 NAT Address Mapping Edit
382
NAT Address Mapping Edit
382
Port Forwarding
383
Table 128 NAT Address Mapping Edit
383
Configuring Servers Behind Port Forwarding (Example)
384
Default Server IP Address
384
Figure 227 SNMP
384
Port Forwarding: Services and Port Numbers
384
Table 129 Services and Port Numbers
384
Table 158 SNMP
384
Figure 183 Multiple Servers Behind NAT Example
385
NAT and Multiple WAN
385
Port Translation
385
Port Forwarding
386
Figure 184 Port Translation Example
386
Figure 185 Port Forwarding
387
Table 130 Port Forwarding
387
Port Triggering
388
Figure 186 Trigger Port Forwarding Process: Example
388
Figure 187 Port Triggering
389
Table 131 Port Triggering
389
Chapter 23 Static Route
392
IP Static Route
392
Figure 188 Example of Static Routing Topology
392
Figure 189 IP Static Route
393
Table 132 IP Static Route
393
Figure 190 IP Static Route Edit
394
IP Static Route Edit
394
Table 133 IP Static Route Edit
394
Chapter 24 Policy Route
396
Policy Route
396
Benefits
396
Routing Policy
396
IP Routing Policy Setup
397
Figure 191 Policy Route Summary
397
Policy Route Edit
398
Table 134 Policy Route Summary
398
Figure 192 Edit IP Policy Route
399
Table 135 Edit IP Policy Route
399
Chapter 25 Bandwidth Management
402
Bandwidth Management Overview
402
Bandwidth Classes and Filters
402
Proportional Bandwidth Allocation
403
Application-Based Bandwidth Management
403
Subnet-Based Bandwidth Management
403
Figure 193 Subnet-Based Bandwidth Management Example
403
Application and Subnet-Based Bandwidth Management
404
Scheduler
404
Fairness-Based Scheduler
404
Maximize Bandwidth Usage
404
Priority-Based Scheduler
404
Table 136 Application and Subnet-Based Bandwidth Management Example
404
Maximize Bandwidth Usage Example
405
Reserving Bandwidth for Non-Bandwidth Class Traffic
405
Table 137 Maximize Bandwidth Usage Example
405
Fairness-Based Allotment of Unused and Unbudgeted Bandwidth
406
Priority-Based Allotment of Unused and Unbudgeted Bandwidth
406
Table 138 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
406
Table 139 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
406
Bandwidth Borrowing
407
Bandwidth Borrowing Example
407
Table 140 Bandwidth Borrowing Example
407
Maximize Bandwidth Usage with Bandwidth Borrowing
408
Configuring Summary
408
Figure 194 Bandwidth Management: Summary
409
Table 141 Bandwidth Management: Summary
409
Configuring Class Setup
410
Figure 195 Bandwidth Management: Class Setup
410
Table 142 Bandwidth Management: Class Setup
410
Bandwidth Manager Class Configuration
411
Figure 196 Bandwidth Management: Edit Class
412
Table 143 Bandwidth Management: Edit Class
412
Bandwidth Management Statistics
414
Table 144 Services and Port Numbers
414
Configuring Monitor
415
Figure 197 Bandwidth Management: Statistics
415
Table 145 Bandwidth Management: Statistics
415
Figure 198 Bandwidth Management: Monitor
416
Table 146 Bandwidth Management: Monitor
416
Chapter 26 DNS
418
DNS Overview
418
DNS Server Address Assignment
418
DNS Servers
418
Address Record
419
DNS Wildcard
419
Name Server Record
419
Private DNS Server
419
System Screen
420
Figure 199 Private DNS Server Example
420
Figure 200 System DNS
421
Table 147 System DNS
421
Adding an Address Record
422
Figure 201 System DNS: Add Address Record
422
Figure 202 System DNS: Insert Name Server Record
423
Inserting a Name Server Record
423
Table 148 System DNS: Add Address Record
423
DNS Cache
424
Table 149 System DNS: Insert Name Server Record
424
Configure DNS Cache
425
Figure 203 DNS Cache
425
Table 150 DNS Cache
425
Configuring DNS DHCP
426
Figure 204 DNS DHCP
427
Table 151 DNS DHCP
427
Dynamic DNS
428
DYNDNS Wildcard
428
High Availability
428
Configuring Dynamic DNS
428
Figure 205 DDNS
429
Table 152 DDNS
429
Chapter 27 Remote Management
432
Remote Management Overview
432
Remote Management Limitations
432
System Timeout
433
Introduction to HTTPS
433
Www
434
Figure 206 HTTPS Implementation
434
Figure 207 WWW
435
Table 153 WWW
435
HTTPS Example
436
Figure 208 Security Alert Dialog Box (Internet Explorer)
436
Internet Explorer Warning Messages
436
Figure 209 Security Certificate 1 (Netscape)
437
Figure 210 Security Certificate 2 (Netscape)
437
Netscape Navigator Warning Messages
437
Avoiding the Browser Warning Messages
438
Login Screen
438
Figure 211 Login Screen (Internet Explorer)
439
Figure 212 Login Screen (Netscape)
439
Figure 213 Replace Certificate
440
Figure 214 Device-Specific Certificate
440
Ssh
441
How SSH Works
441
Figure 215 Common Zywall Certificate
441
Figure 216 SSH Communication Example
441
SSH Implementation on the Zywall
442
Figure 217 How SSH Works
442
Requirements for Using SSH
443
Configuring SSH
443
Figure 218 SSH
443
Table 154 SSH
443
Secure Telnet Using SSH Examples
444
Example 1: Microsoft Windows
444
Example 2: Linux
444
Figure 219 SSH Example 1: Store Host Key
444
Secure FTP Using SSH Example
445
Figure 220 SSH Example 2: Test
445
Figure 221 SSH Example 2: Log in
445
Telnet
446
Configuring TELNET
446
Figure 222 Secure FTP: Firmware Upload Example
446
Figure 223 Telnet Configuration on a TCP/IP Network
446
Ftp
447
Figure 224 Telnet
447
Table 155 Telnet
447
Snmp
448
Figure 225 FTP
448
Table 156 FTP
448
Figure 226 SNMP Management Model
449
Remote Management: Snmp
450
SNMP Traps
450
Supported Mibs
450
Table 157 SNMP Traps
450
Dns
452
Introducing Vantage CNM
452
Figure 228 DNS
452
Table 159 DNS
452
Configuring CNM
453
Figure 229 CNM
453
Table 160 CNM
453
Chapter 28 Upnp
456
Universal Plug and Play Overview
456
Cautions with Upnp
456
How Do I Know if I'M Using Upnp
456
NAT Traversal
456
Upnp and Zyxel
457
Configuring Upnp
457
Figure 230 Upnp
457
Table 161 Upnp
457
Displaying Upnp Port Mapping
458
Figure 231 Upnp Ports
458
Installing Upnp in Windows Example
459
Table 162 Upnp Ports
459
Installing Upnp in Windows Me
460
Installing Upnp in Windows XP
461
Using Upnp in Windows XP Example
461
Auto-Discover Your Upnp-Enabled Network Device
462
Web Configurator Easy Access
463
Chapter 29 ALG Screen
466
ALG Introduction
466
ALG and Multiple WAN
466
ALG and NAT
466
ALG and the Firewall
466
Ftp
467
467
467
Rtp
467
ALG Details
467
Figure 232 H.323 ALG Example
468
Figure 233 H.323 with Multiple WAN IP Addresses
468
Sip
469
Figure 234 H.323 Calls from the WAN with Multiple Outgoing Calls
469
SIP ALG Details
469
Stun
469
SIP Audio Session Timeout
470
SIP Signaling Session Timeout
470
ALG Screen
470
Figure 235 SIP ALG Example
470
Figure 236 ALG
471
Table 163 ALG
471
Chapter 30 Logs Screens
472
Configuring View Log
472
Figure 237 View Log
472
Log Description Example
473
Table 164 View Log
473
Table 165 Example Log Description
473
Certificate Not Trusted Log Note
474
Figure 238 Myzyxel.com: Download Center
474
Configuring Log Settings
475
Figure 239 Myzyxel.com: Certificate Download
475
Figure 240 Log Settings
476
Table 166 Log Settings
477
Configuring Reports
478
Figure 241 Reports
479
Table 167 Reports
479
Figure 242 Web Site Hits Report Example
480
Table 168 Web Site Hits Report
480
Viewing Protocol/Port
480
Viewing Web Site Hits
480
Figure 243 Protocol/Port Report Example
481
Table 169 Protocol/ Port Report
481
Figure 244 Host IP Address Report Example
482
Table 170 Host IP Address Report
482
Viewing Host IP Address
482
Reports Specifications
483
Table 171 Report Specifications
483
Chapter 31 Maintenance
484
Maintenance Overview
484
General Setup
484
General Setup and System Name
484
Configuring Password
485
Figure 245 General Setup
485
Table 172 General Setup
485
Time and Date
486
Figure 246 Password Setup
486
Table 173 Password Setup
486
Figure 247 Time and Date
487
Table 174 Time and Date
487
Pre-Defined NTP Time Servers List
489
Resetting the Time
489
Table 175 Default Time Servers
489
Time Server Synchronization
489
Figure 248 Synchronization in Process
490
Figure 249 Synchronization Is Successful
490
Figure 250 Synchronization Fail
490
Introduction to Transparent Bridging
491
Transparent Firewalls
491
Table 176 MAC-Address-To-Port Mapping Table
491
Configuring Device Mode (Router)
492
Figure 251 Device Mode (Router Mode)
492
Table 177 Device Mode (Router Mode)
492
Configuring Device Mode (Bridge)
493
Figure 252 Device Mode (Bridge Mode)
493
Table 178 Device Mode (Bridge Mode)
493
F/W Upload Screen
494
Figure 253 Firmware Upload
495
Figure 254 Firmware Upload in Process
495
Table 179 Firmware Upload
495
Backup and Restore
496
Figure 255 Network Temporarily Disconnected
496
Figure 256 Firmware Upload Error
496
Backup Configuration
497
Figure 257 Backup and Restore
497
Restore Configuration
497
Table 180 Restore Configuration
497
Figure 258 Configuration Upload Successful
498
Figure 259 Network Temporarily Disconnected
498
Figure 260 Configuration Upload Error
498
Back to Factory Defaults
499
Restart Screen
499
Figure 261 Reset Warning Message
499
Figure 262 Restart Screen
499
Chapter 32 Introducing the SMT
500
Introduction to the SMT
500
Accessing the SMT Via the Console Port
500
Initial Screen
500
Entering the Password
501
Navigating the SMT Interface
501
Figure 263 Initial Screen
501
Figure 264 Password Screen
501
Table 181 Main Menu Commands
501
Main Menu
502
Figure 265 Main Menu (Router Mode)
503
Figure 266 Main Menu (Bridge Mode)
503
Table 182 Main Menu Summary
503
SMT Menus Overview
504
Table 183 SMT Menus Overview
504
Changing the System Password
506
Resetting the Zywall
507
Figure 267 Menu 23: System Password
507
Chapter 33 SMT Menu 1 - General Setup
508
Introduction to General Setup
508
Configuring General Setup
508
Figure 268 Menu 1: General Setup (Router Mode)
508
Table 184 Menu 1: General Setup (Router Mode)
508
Figure 269 Menu 1: General Setup (Bridge Mode)
509
Table 185 Menu 1: General Setup (Bridge Mode)
509
Configuring Dynamic DNS
510
Editing DDNS Host
510
Figure 270 Menu 1.1: Configure Dynamic DNS
510
Table 186 Menu 1.1: Configure Dynamic DNS
510
Figure 271 Menu 1.1.1: DDNS Host Summary
511
Table 187 Menu 1.1.1: DDNS Host Summary
511
Figure 272 Menu 1.1.1: DDNS Edit Host
512
Table 188 Menu 1.1.1: DDNS Edit Host
512
Chapter 34 WAN and Dial Backup Setup
514
Figure 273 MAC Address Cloning in WAN Setup
514
Introduction to WAN and Dial Backup Setup
514
WAN Setup
514
Configuring Dial Backup in Menu 2
515
Dial Backup
515
Table 189 MAC Address Cloning in WAN Setup
515
Advanced WAN Setup
516
Figure 274 Menu 2: Dial Backup Setup
516
Table 190 Menu 2: Dial Backup Setup
516
Figure 275 Menu 2.1: Advanced WAN Setup
517
Table 191 Advanced WAN Port Setup: at Commands Fields
517
Remote Node Profile (Backup ISP)
518
Table 192 Advanced WAN Port Setup: Call Control Parameters
518
Figure 276 Menu 11.3: Remote Node Profile (Backup ISP)
519
Table 193 Menu 11.3: Remote Node Profile (Backup ISP)
519
Editing PPP Options
520
Editing TCP/IP Options
521
Figure 277 Menu 11.3.1: Remote Node PPP Options
521
Table 194 Menu 11.3.1: Remote Node PPP Options
521
Figure 278 Menu 11.3.2: Remote Node Network Layer Options
522
Table 195 Menu 11.3.2: Remote Node Network Layer Options
522
Editing Login Script
523
Figure 279 Menu 11.3.3: Remote Node Script
524
Figure 280 Menu 11.3.4: Remote Node Filter
525
Remote Node Filter
525
Table 196 Menu 11.3.3: Remote Node Script
525
Chapter 35 LAN Setup
526
Introduction to LAN Setup
526
Accessing the LAN Menus
526
LAN Port Filter Setup
526
Figure 281 Menu 3: LAN Setup
526
TCP/IP and DHCP Ethernet Setup Menu
527
Figure 282 Menu 3.1: LAN Port Filter Setup
527
Figure 283 Menu 3: TCP/IP and DHCP Setup
527
Figure 284 Menu 3.2: TCP/IP and DHCP Ethernet Setup
528
Table 197 Menu 3.2: DHCP Ethernet Setup Fields
528
Table 198 Menu 3.2: LAN TCP/IP Setup Fields
529
Figure 285 Menu 3.2.1: IP Alias Setup
530
IP Alias Setup
530
Table 199 Menu 3.2.1: IP Alias Setup
530
Chapter 36 Internet Access
532
Introduction to Internet Access Setup
532
Ethernet Encapsulation
532
Figure 286 Menu 4: Internet Access Setup (Ethernet)
532
Table 200 Menu 4: Internet Access Setup (Ethernet)
533
Configuring the PPTP Client
534
Configuring the Pppoe Client
534
Figure 287 Internet Access Setup (PPTP)
534
Table 201 New Fields in Menu 4 (PPTP) Screen
534
Basic Setup Complete
535
Figure 288 Internet Access Setup (Pppoe)
535
Table 202 New Fields in Menu 4 (Pppoe) Screen
535
Chapter 37 DMZ Setup
536
Configuring DMZ Setup
536
DMZ Port Filter Setup
536
TCP/IP Setup
536
Figure 289 Menu 5: DMZ Setup
536
Figure 290 Menu 5.1: DMZ Port Filter Setup
536
Figure 291 Menu 5: DMZ Setup
537
Figure 292 Menu 5.2: TCP/IP and DHCP Ethernet Setup
537
IP Address
537
Figure 293 Menu 5.2.1: IP Alias Setup
538
IP Alias Setup
538
Chapter 38 Route Setup
540
Configuring Route Setup
540
Route Assessment
540
Figure 294 Menu 6: Route Setup
540
Figure 295 Menu 6.1: Route Assessment
540
Traffic Redirect
541
Figure 296 Menu 6.2: Traffic Redirect
541
Table 203 Menu 6.1: Route Assessment
541
Table 204 Menu 6.2: Traffic Redirect
541
Route Failover
542
Figure 297 Menu 6.3: Route Failover
542
Table 205 Menu 6.3: Route Failover
542
Chapter 39 Wireless Setup
544
Wireless LAN Setup
544
Figure 298 Menu 7.1: Wireless Setup
544
Table 206 Menu 7.1: Wireless Setup
545
Figure 299 Menu 7.1.1: WLAN MAC Address Filter
546
MAC Address Filter Setup
546
Table 207 Menu 7.1.1: WLAN MAC Address Filter
546
TCP/IP Setup
547
Figure 300 Menu 7: WLAN Setup
547
IP Address
547
Figure 301 Menu 7.2: TCP/IP and DHCP Ethernet Setup
548
IP Alias Setup
548
Figure 302 Menu 7.2.1: IP Alias Setup
549
Chapter 40 Remote Node Setup
550
Introduction to Remote Node Setup
550
Remote Node Setup
550
Remote Node Profile Setup
551
Ethernet Encapsulation
551
Figure 303 Menu 11: Remote Node Setup
551
Figure 304 Menu 11.1: Remote Node Profile for Ethernet Encapsulation
551
Table 208 Menu 11.1: Remote Node Profile for Ethernet Encapsulation
552
Figure 305 Menu 11.1: Remote Node Profile for Pppoe Encapsulation
553
Nailed-Up Connection
553
Outgoing Authentication Protocol
553
Pppoe Encapsulation
553
Metric
554
PPTP Encapsulation
554
Table 209 Fields in Menu 11.1 (Pppoe Encapsulation Specific)
554
Edit IP
555
Figure 306 Menu 11.1: Remote Node Profile for PPTP Encapsulation
555
Table 210 Menu 11.1: Remote Node Profile for PPTP Encapsulation
555
Figure 307 Menu 11.1.2: Remote Node Network Layer Options for Ethernet Encapsulation
556
Table 211 Remote Node Network Layer Options Menu Fields
556
Remote Node Filter
557
Traffic Redirect
558
Figure 308 Menu 11.1.4: Remote Node Filter (Ethernet Encapsulation)
558
Figure 309 Menu 11.1.4: Remote Node Filter (Pppoe or PPTP Encapsulation)
558
Figure 310 Menu 11.1.5: Traffic Redirect Setup
559
Table 212 Menu 11.1.5: Traffic Redirect Setup
559
Chapter 41 IP Static Route Setup
560
IP Static Route Setup
560
Figure 311 Menu 12: IP Static Route Setup
560
Figure 312 Menu 12. 1: Edit IP Static Route
561
Table 213 Menu 12. 1: Edit IP Static Route
561
Chapter 42 Network Address Translation (NAT)
562
Using NAT
562
Applying NAT
562
SUA (Single User Account) Versus NAT
562
Figure 313 Menu 4: Applying NAT for Internet Access
563
Figure 314 Menu 11.1.2: Applying NAT to the Remote Node
563
NAT Setup
564
Figure 315 Menu 15: NAT Setup
564
Table 214 Applying NAT in Menus 4 & 11.1.2
564
Address Mapping Sets
565
Figure 316 Menu 15.1: Address Mapping Sets
565
Figure 317 Menu 15.1.255: SUA Address Mapping Rules
565
SUA Address Mapping Set
565
Table 215 SUA Address Mapping Rules
566
User-Defined Address Mapping Sets
566
Figure 318 Menu 15.1.1: First Set
567
Ordering Your Rules
567
Table 216 Fields in Menu 15.1.1
567
Figure 319 Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set
568
Table 217 Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set
568
Configuring a Server Behind NAT
569
Figure 320 Menu 15.2: NAT Server Sets
569
Figure 321 Menu 15.2.1: NAT Server Sets
570
Figure 322 15.2.1.2: NAT Server Configuration
571
Table 218 15.2.1.2: NAT Server Configuration
571
General NAT Examples
572
Figure 323 Menu 15.2.1: NAT Server Setup
572
Figure 324 Server Behind NAT Example
572
Internet Access Only
572
Figure 325 NAT Example 1
573
Figure 326 Menu 4: Internet Access & NAT Example
573
Example 2: Internet Access with an Default Server
574
Example 3: Multiple Public IP Addresses with Inside Servers
574
Figure 327 NAT Example 2
574
Figure 328 Menu 15.2.1: Specifying an Inside Server
574
Figure 329 NAT Example 3
575
Figure 330 Example 3: Menu 11.1.2
576
Figure 331 Example 3: Menu 15.1.1.1
576
Figure 332 Example 3: Final Menu 15.1.1
577
Figure 333 Example 3: Menu 15.2.1
577
Example 4: NAT Unfriendly Application Programs
578
Figure 334 NAT Example 4
578
Figure 335 Example 4: Menu 15.1.1.1: Address Mapping Rule
578
Trigger Port Forwarding
579
Figure 336 Example 4: Menu 15.1.1: Address Mapping Rules
579
Two Points to Remember about Trigger Ports
579
Figure 337 Menu 15.3.1: Trigger Port Setup
580
Table 219 Menu 15.3.1: Trigger Port Setup
580
Chapter 43 Introducing the Zywall Firewall
582
Using Zywall SMT Menus
582
Activating the Firewall
582
Figure 338 Menu 21: Filter and Firewall Setup
582
Figure 339 Menu 21.2: Firewall Setup
583
Chapter 44 Filter Configuration
584
Introduction to Filters
584
Figure 340 Outgoing Packet Filtering Process
584
The Filter Structure of the Zywall
585
Figure 341 Filter Rule Process
586
Configuring a Filter Set
587
Figure 342 Menu 21: Filter and Firewall Setup
587
Figure 343 Menu 21.1: Filter Set Configuration
587
Configuring a Filter Rule
588
Table 220 Abbreviations Used in the Filter Rules Summary Menu
588
Table 221 Rule Abbreviations Used
588
Configuring a TCP/IP Filter Rule
589
Figure 344 Menu 21.1.1.1: TCP/IP Filter Rule
589
Table 222 Menu 21.1.1.1: TCP/IP Filter Rule
589
Configuring a Generic Filter Rule
591
Figure 345 Executing an IP Filter
591
Figure 346 Menu 21.1.1.1: Generic Filter Rule
592
Table 223 Generic Filter Rule Menu Fields
592
Example Filter
593
Figure 347 Telnet Filter Example
593
Figure 348 Example Filter: Menu 21.1.3.1
594
Figure 349 Example Filter Rules Summary: Menu 21.1.3
594
Filter Types and NAT
595
Firewall Versus Filters
595
Figure 350 Protocol and Device Filter Sets
595
Applying a Filter
596
Applying DMZ Filters
596
Applying LAN Filters
596
Figure 351 Filtering LAN Traffic
596
Applying Remote Node Filters
597
Figure 352 Filtering DMZ Traffic
597
Figure 353 Filtering Remote Node Traffic
597
Chapter 45 SNMP Configuration
598
SNMP Configuration
598
Figure 354 Menu 22: SNMP Configuration
598
Table 224 SNMP Configuration Menu Fields
598
SNMP Traps
599
Table 225 SNMP Traps
599
Chapter 46 System Information & Diagnosis
600
Introduction to System Status
600
System Status
600
Figure 355 Menu 24: System Maintenance
600
Figure 356 Menu 24.1: System Maintenance: Status
601
Table 226 System Maintenance: Status Menu Fields
601
System Information and Console Port Speed
602
Figure 357 Menu 24.2: System Information and Console Port Speed
602
System Information
602
Console Port Speed
603
Figure 358 Menu 24.2.1: System Maintenance: Information
603
Table 227 Fields in System Maintenance: Information
603
Log and Trace
604
Figure 359 Menu 24.2.2: System Maintenance: Change Console Port Speed
604
Figure 360 Menu 24.3: System Maintenance: Log and Trace
604
Viewing Error Log
604
Figure 361 Examples of Error and Information Messages
605
Figure 362 Menu 24.3.2: System Maintenance: Syslog Logging
605
Syslog Logging
605
Table 228 System Maintenance Menu Syslog Parameters
605
Call-Triggering Packet
608
Diagnostic
608
Figure 363 Call-Triggering Packet Example
608
Figure 364 Menu 24.4: System Maintenance: Diagnostic
609
Figure 365 WAN & LAN DHCP
609
Wan Dhcp
609
Table 229 System Maintenance Menu Diagnostic
610
Firmware and Configuration File Maintenance
612
Filename Conventions
612
Introduction
612
Chapter 47 Firmware and Configuration File Maintenance
612
Backup Configuration
613
Table 230 Filename Conventions
613
Figure 366 Telnet into Menu 24.5
614
Using the FTP Command from the Command Line
614
Example of FTP Commands from the Command Line
615
Figure 367 FTP Session Example
615
File Maintenance over WAN
615
GUI-Based FTP Clients
615
Table 231 General Commands for GUI-Based FTP Clients
615
Backup Configuration Using TFTP
616
TFTP Command Example
616
Backup Via Console Port
617
Figure 368 System Maintenance: Backup Configuration
617
Figure 369 System Maintenance: Starting Xmodem Download Screen
617
GUI-Based TFTP Clients
617
Table 232 General Commands for GUI-Based TFTP Clients
617
Restore Configuration
618
Figure 370 Backup Configuration Example
618
Figure 371 Successful Backup Confirmation Screen
618
Restore Using FTP
618
Figure 372 Telnet into Menu 24.6
619
Figure 373 Restore Using FTP Session Example
620
Figure 374 System Maintenance: Restore Configuration
620
Figure 375 System Maintenance: Starting Xmodem Download Screen
620
Figure 376 Restore Configuration Example
620
Restore Using FTP Session Example
620
Restore Via Console Port
620
Uploading Firmware and Configuration Files
621
Figure 377 Successful Restoration Confirmation Screen
621
Firmware File Upload
621
Configuration File Upload
622
Figure 378 Telnet into Menu 24.7.1: Upload System Firmware
622
Figure 379 Telnet into Menu 24.7.2: System Maintenance
622
Figure 380 FTP Session Example of Firmware File Upload
623
FTP File Upload Command from the DOS Prompt Example
623
FTP Session Example of Firmware File Upload
623
TFTP File Upload
623
TFTP Upload Command Example
624
Uploading Firmware File Via Console Port
624
Uploading Via Console Port
624
Example Xmodem Firmware Upload Using Hyperterminal
625
Figure 381 Menu 24.7.1 as Seen Using the Console Port
625
Figure 382 Example Xmodem Upload
625
Uploading Configuration File Via Console Port
625
Example Xmodem Configuration Upload Using Hyperterminal
626
Figure 383 Menu 24.7.2 as Seen Using the Console Port
626
Figure 384 Example Xmodem Upload
626
Chapter 48 System Maintenance Menus 8 to 10
628
Command Interpreter Mode
628
Command Syntax
628
Figure 385 Command Mode in Menu 24
628
Command Usage
629
Figure 386 Valid Commands
629
Table 233 Valid Commands
629
Call Control Support
630
Budget Management
630
Figure 387 Call Control
630
Call History
631
Figure 388 Budget Management
631
Table 234 Budget Management
631
Figure 389 Call History
632
Table 235 Call History
632
Time and Date Setting
632
Figure 390 Menu 24: System Maintenance
633
Figure 391 Menu 24.10 System Maintenance: Time and Date Setting
633
Table 236 Menu 24.10 System Maintenance: Time and Date Setting
634
Chapter 49 Remote Management
636
Remote Management
636
Figure 392 Menu 24.11 - Remote Management Control
637
Table 237 Menu 24.11 - Remote Management Control
637
Remote Management Limitations
638
Chapter 50 IP Policy Routing
640
IP Routing Policy Summary
640
Figure 393 Menu 25: Sample IP Routing Policy Summary
640
Table 238 Menu 25: Sample IP Routing Policy Summary
640
IP Routing Policy Setup
641
Table 239 IP Routing Policy Setup
641
Figure 394 Menu 25.1: IP Routing Policy Setup
642
Table 240 Menu 25.1: IP Routing Policy Setup
642
Applying Policy to Packets
643
IP Policy Routing Example
644
Figure 395 Menu 25.1.1: IP Routing Policy Setup
644
Table 241 Menu 25.1.1: IP Routing Policy Setup
644
Figure 396 Example of IP Policy Routing
645
Figure 397 IP Routing Policy Example 1
645
Figure 398 IP Routing Policy Example 2
646
Chapter 51 Call Scheduling
648
Introduction to Call Scheduling
648
Figure 399 Schedule Setup
648
Figure 400 Schedule Set Setup
649
Table 242 Schedule Set Setup
649
Figure 401 Applying Schedule Set(S) to a Remote Node (Pppoe)
650
Figure 402 Applying Schedule Set(S) to a Remote Node (PPTP)
651
Chapter 52 Troubleshooting
652
Problems Starting up the Zywall
652
Problems with the LAN Interface
652
Table 243 Troubleshooting the Start-Up of Your Zywall
652
Table 244 Troubleshooting the LAN Interface
652
Problems with the DMZ Interface
653
Problems with the WAN Interface
653
Table 245 Troubleshooting the DMZ Interface
653
Table 246 Troubleshooting the WAN Interface
653
Problems Accessing the Zywall
654
Pop-Up Windows, Javascripts and Java Permissions
654
Table 247 Troubleshooting Accessing the Zywall
654
Figure 403 Pop-Up Blocker
655
Internet Explorer Pop-Up Blockers
655
Figure 404 Internet Options: Privacy
656
Figure 405 Internet Options: Privacy
657
Figure 406 Pop-Up Blocker Settings
658
Javascripts
658
Figure 407 Internet Options: Security
659
Figure 408 Security Settings - Java Scripting
660
Java Permissions
660
Figure 409 Security Settings - Java
661
Packet Flow
662
Figure 410 Java (Sun)
662
Product Specifications
664
Table 248 Device Specifications
664
Appendix A Product Specifications
664
Table 249 Performance
665
Table 250 Firmware Features
665
Table 251 Feature Specifications
667
Table 252 Compatible Zyxel WLAN Cards and Security Features
668
Figure 411 WLAN Card Installation
669
Figure 412 Console/Dial Backup Port Pin Layout
669
Cable Pin Assignments
669
Figure 413 Ethernet Cable Pin Assignments
670
Table 253 Console/Dial Backup Port Pin Assignments
670
Hardware Installation
672
Figure 414 Attaching Rubber Feet
673
Figure 415 Attaching Mounting Brackets and Screws
674
Figure 416 Rack Mounting
674
Appendix C
676
Removing and Installing a Fuse
676
Appendix D
678
Setting up Your Computer's IP Address
678
Figure 417 Windows 95/98/Me: Network: Configuration
679
Installing Components
679
Figure 418 Windows 95/98/Me: TCP/IP Properties: IP Address
680
Figure 419 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
681
Verifying Settings
681
Figure 420 Windows XP: Start Menu
682
Figure 421 Windows XP: Control Panel
682
Figure 422 Windows XP: Control Panel: Network Connections: Properties
683
Figure 423 Windows XP: Local Area Connection Properties
683
Figure 424 Windows XP: Internet Protocol (TCP/IP) Properties
684
Figure 425 Windows XP: Advanced TCP/IP Properties
685
Figure 426 Windows XP: Internet Protocol (TCP/IP) Properties
686
Figure 427 Macintosh os 8/9: Apple Menu
687
Figure 428 Macintosh os 8/9: TCP/IP
687
Figure 429 Macintosh os X: Apple Menu
688
Macintosh os X
688
Figure 430 Macintosh os X: Network
689
Figure 431 Red hat 9.0: KDE: Network Configuration: Devices
690
Figure 432 Red hat 9.0: KDE: Ethernet Device: General
690
Figure 433 Red hat 9.0: KDE: Network Configuration: DNS
691
Figure 434 Red hat 9.0: KDE: Network Configuration: Activate
691
Using Configuration Files
691
Figure 435 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
692
Figure 436 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
692
Figure 437 Red hat 9.0: DNS Settings in Resolv.conf
692
Figure 438 Red hat 9.0: Restart Ethernet Card
693
Figure 439 Red hat 9.0: Checking TCP/IP Properties
693
Appendix Eip Subnetting
694
Table 254 Classes of IP Addresses
694
Table 255 Allowed IP Address Range by Class
695
Table 256 "Natural" Masks
695
Subnet Masks
695
Table 257 Alternative Subnet Mask Notation
696
Table 258 Two Subnets Example
696
Table 259 Subnet 1
697
Table 260 Subnet 2
697
Table 261 Subnet 1
698
Table 262 Subnet 2
698
Table 263 Subnet 3
698
Table 264 Subnet 4
699
Table 265 Eight Subnets
699
Table 266 Class C Subnet Planning
699
Example Eight Subnets
699
Table 267 Class B Subnet Planning
700
Subnetting with Class a and Class B Networks
700
Appendix Fpppoe
702
Figure 440 Single-Computer Per Router Hardware Configuration
703
Figure 441 Zywall as a Pppoe Client
703
How Pppoe Works
703
Appendix Gpptp
704
Figure 442 Transport PPP Frames over Ethernet
704
Figure 443 PPTP Protocol Overview
705
Call Connection
705
Figure 444 Example Message Exchange between Computer and an ANT
706
Ppp Data Connection
706
Appendix H Wireless Lans
708
Figure 445 Peer-To-Peer Communication in an Ad-Hoc Network
708
Figure 446 Basic Service Set
709
Figure 447 Infrastructure WLAN
710
Figure 448 RTS/CTS
711
Fragmentation Threshold
711
Table 268 Ieee802.11G
712
Preamble Type
712
Figure 449 EAP Authentication
714
Types of Authentication
715
Wep Authentication Steps
716
Figure 450 WEP Authentication Steps
717
Table 269 Comparison of EAP Authentication Types
718
Table 270 Wireless Security Relational Matrix
719
Figure 451 Roaming Example
720
Requirements for Roaming
721
Appendix I Triangle Route
722
Figure 452 Ideal Setup
722
Figure 453 "Triangle Route" Problem
723
Figure 454 IP Alias
724
Figure 455 Gateways on the WAN Side
724
Appendix J
726
Figure 456 Windows 98 SE: Winpopup
726
Windows 98 Se/Me Requirements for Anti-Virus Message Display
726
Figure 457 Windows 98 SE: Program Task Bar
727
Figure 458 Windows 98 SE: Task Bar Properties
727
Figure 459 Windows 98 SE: Startup
728
Figure 460 Windows 98 SE: Startup: Create Shortcut
728
Figure 461 Windows 98 SE: Startup: Select a Title for the Program
729
Figure 462 Windows 98 SE: Startup: Shortcut
729
Appendix Kvpn Setup
730
Figure 463 VPN Rules
731
Vpn Configuration
731
Figure 464 Headquarters Gateway Policy Edit
732
Figure 465 Branch Office Gateway Policy Edit
733
Figure 466 Headquarters VPN Rule
734
Figure 467 Branch Office VPN Rule
734
Figure 468 Headquarters Network Policy Edit
735
Figure 469 Branch Office Network Policy Edit
736
Dialing the Vpn Tunnel Via Web Configurator
736
Figure 470 VPN Rule Configured
737
Figure 471 VPN Dial
737
Figure 472 VPN Tunnel Established
737
Vpn Troubleshooting
738
Figure 473 VPN Log Example
739
Figure 474 Ike/Ipsec Debug Example
740
Use a Vpn Tunnel
741
Figure 475 Security Certificate
742
Appendix L Importing Certificates
742
Importing Certificates
742
Figure 476 Login Screen
743
Figure 477 Certificate General Information before Import
743
Figure 478 Certificate Import Wizard 1
744
Figure 479 Certificate Import Wizard 2
744
Figure 480 Certificate Import Wizard 3
745
Figure 481 Root Certificate Store
745
Figure 482 Certificate General Information after Import
746
Enrolling and Importing Ssl Client Certificates
746
Figure 483 Zywall Trusted CA Screen
747
Figure 484 CA Certificate Example
748
Figure 485 Personal Certificate Import Wizard 1
749
Figure 486 Personal Certificate Import Wizard 2
749
Figure 487 Personal Certificate Import Wizard 3
750
Figure 488 Personal Certificate Import Wizard 4
750
Figure 489 Personal Certificate Import Wizard 5
751
Figure 490 Personal Certificate Import Wizard 6
751
Figure 491 Access the Zywall Via HTTPS
751
Using a Certificate When Accessing the Zywall Example
751
Figure 492 SSL Client Authentication
752
Figure 493 Zywall Secure Login Screen
752
Appendix M Command Interpreter
754
Appendix N Firewall Commands
756
Table 271 Firewall Commands
756
Appendix O
762
Netbios Filter Commands
762
Table 272 Netbios Filter Default Settings
763
Netbios Filter Configuration
763
Certificates Commands
766
Table 273 Certificates Commands
766
Appendix P Certificates Commands
766
Appendix Q
770
Brute-Force Password Guessing Protection
770
Table 274 Brute-Force Password Guessing Protection Commands
770
Appendix R Boot Commands
772
Figure 494 Option to Enter Debug Mode
772
Figure 495 Boot Module Commands
773
Table 275 System Maintenance Logs
774
Log Descriptions
774
Table 276 System Error Logs
775
Table 277 Access Control Logs
776
Table 278 TCP Reset Logs
777
Table 279 Packet Filter Logs
777
Table 280 ICMP Logs
778
Table 281 CDR Logs
778
Table 282 PPP Logs
778
Table 283 Upnp Logs
779
Table 284 Content Filtering Logs
779
Table 285 Attack Logs
780
Table 286 Remote Management Logs
781
Table 287 Wireless Logs
782
Table 288 Ipsec Logs
782
Table 289 IKE Logs
783
Table 290 PKI Logs
786
Table 291 Certificate Path Verification Failure Reason Codes
787
Table 292 802.1X Logs
787
Table 293 ACL Setting Notes
788
Table 294 ICMP Notes
789
Table 295 IDP Logs
790
Table 296 AV Logs
791
Syslog Logs
794
Figure 496 Displaying Log Categories Example
796
Figure 497 Displaying Log Parameters Example
796
Displaying Logs
796
Log Commands
796
Log Command Example
797
Index
798
ZyXEL Communications ZyWALL 35 Series User Manual (824 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 16.15 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Contents Overview
9
Table of Contents
9
Table of Contents
11
List of Figures
29
List of Tables
41
Introduction
49
PART I Introduction
49
Chapter 1 Getting to Know Your Zywall
51
Zywall Internet Security Appliance Overview
51
Zywall Features
51
Applications for the Zywall
52
Secure Broadband Internet Access Via Cable or DSL Modem
52
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
52
Table 1 Zywall Model Specific Features
52
VPN Application
53
WAN Application (Zywall 5 Only)
53
Figure 2 VPN Application
53
Figure 3 3G WAN Application
53
Ways to Manage the Zywall
54
Good Habits for Managing the Zywall
54
Chapter 2 Hardware Installation
55
General Installation Instructions
55
Desktop Installation
55
Rack-Mounted Installation Requirements
56
Figure 4 Attaching Rubber Feet
56
Rack-Mounted Installation
57
Figure 5 Attaching Mounting Brackets and Screws
57
Figure 6 Rack Mounting
57
Card, WLAN Card and Zywall Turbo Card Installation
58
Figure 7 WLAN Card Installation
58
Front Panel Lights
59
Figure 8 Zywall 70 Front Panel
59
Figure 9 Zywall 35 Front Panel
59
Figure 10 Zywall 5 Front Panel
59
Table 2 Front Panel Lights
59
Chapter 3 Introducing the Web Configurator
61
Web Configurator Overview
61
Accessing the Zywall Web Configurator
61
Figure 11 Change Password Screen
62
Figure 12 Replace Certificate Screen
62
Resetting the Zywall
63
Procedure to Use the Reset Button
63
Uploading a Configuration File Via Console Port
63
Figure 13 Example Xmodem Upload
63
Navigating the Zywall Web Configurator
64
Title Bar
64
Figure 14 HOME Screen
64
Table 3 Title Bar: Web Configurator Icons
64
Main Window
65
HOME Screen: Router Mode
65
Figure 15 Web Configurator HOME Screen in Router Mode (Zywall 5)
65
Table 4 Web Configurator HOME Screen in Router Mode
65
HOME Screen: Bridge Mode
71
Figure 16 Web Configurator HOME Screen in Bridge Mode
71
Table 5 Web Configurator HOME Screen in Bridge Mode
71
Navigation Panel
74
Table 6 Bridge and Router Mode Features Comparison
74
Table 7 Screens Summary
75
Port Statistics
80
Figure 17 HOME > Port Statistics
80
Table 8 HOME > Port Statistics
80
Show Statistics: Line Chart
81
Figure 18 HOME > Show Statistics > Line Chart
81
DHCP Table
82
Figure 19 HOME > Show DHCP Table
82
Table 9 HOME > Show Statistics > Line Chart
82
Table 10 HOME > Show DHCP Table
82
VPN Status
83
Figure 20 HOME > VPN Status
83
Table 11 HOME > VPN Status
83
Bandwidth Monitor
84
Figure 21 Home > Bandwidth Monitor
84
Table 12 ADVANCED > BW MGMT > Monitor
84
Wizard Setup
87
Chapter 4 Wizard Setup
87
Wizard Setup Overview
87
Figure 22 Wizard Setup Welcome
87
Internet Access
88
ISP Parameters
88
Figure 23 ISP Parameters: Ethernet Encapsulation
88
Table 13 ISP Parameters: Ethernet Encapsulation
88
Figure 24 ISP Parameters: Pppoe Encapsulation
89
Table 14 ISP Parameters: Pppoe Encapsulation
90
Figure 25 ISP Parameters: PPTP Encapsulation
91
Table 15 ISP Parameters: PPTP Encapsulation
91
Internet Access Wizard: Second Screen
92
Figure 26 Internet Access Wizard: Second Screen
92
Internet Access Wizard: Registration
93
Figure 27 Internet Access Setup Complete
93
Figure 28 Internet Access Wizard: Registration
93
Internet Access Wizard: Status
94
Figure 29 Internet Access Wizard: Registration in Progress
94
Table 16 Internet Access Wizard: Registration
94
Internet Access Wizard: Service Activation
95
Figure 30 Internet Access Wizard: Status
95
Figure 31 Internet Access Wizard: Registration Failed
95
Figure 32 Internet Access Wizard: Registered Device
95
VPN Wizard Gateway Setting
96
Figure 33 Internet Access Wizard: Activated Services
96
Figure 34 VPN Wizard: Gateway Setting
96
Table 17 VPN Wizard: Gateway Setting
96
VPN Wizard Network Setting
97
Figure 35 VPN Wizard: Network Setting
98
Table 18 VPN Wizard: Network Setting
98
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
99
Figure 36 VPN Wizard: IKE Tunnel Setting
99
VPN Wizard Ipsec Setting (IKE Phase 2)
100
Table 19 VPN Wizard: IKE Tunnel Setting
100
Figure 37 VPN Wizard: Ipsec Setting
101
Table 20 VPN Wizard: Ipsec Setting
101
VPN Wizard Status Summary
102
Figure 38 VPN Wizard: VPN Status
102
Table 21 VPN Wizard: VPN Status
103
VPN Wizard Setup Complete
104
Anti-Spam Wizard: Email Server Location Setting
104
Figure 39 VPN Wizard Setup Complete
104
Anti-Spam Wizard: Direction Recommendations
105
Figure 40 Anti-Spam Wizard: Email Server Location Setting
105
Table 22 Anti-Spam Wizard: Email Server Location Setting
105
Anti-Spam Wizard: Direction Configuration
106
Figure 41 Anti-Spam Wizard: Direction Recommendations
106
Figure 42 Anti-Spam Wizard: Direction Configuration
107
Table 23 Anti-Spam Wizard: Direction Configuration
107
Anti-Spam Wizard: Setup Complete
108
Figure 43 Anti-Spam Wizard: Setup Complete
108
ZyXEL Communications ZyWALL 35 Series User Manual (803 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 30.79 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Safety Warnings
5
Zyxel Limited Warranty
6
Customer Support
7
Table of Contents
10
List of Figures
28
List of Tables
40
Preface
48
Syntax Conventions
49
Chapter 1 Getting to Know Your Zywall
50
Zywall Internet Security Appliance Overview
50
Zywall Features
50
Table 1 Model Specific Features
50
Physical Features
51
Non-Physical Features
52
Ipsec Vpn Capability
53
Wireless Lan Mac Address Filtering
55
Dynamic Dns Support
56
Central Network Management
56
Traffic Redirect
57
Full Network Management
57
Roadrunner Support
57
Logging and Tracing
57
Upgrade Zywall Firmware Via Lan
57
Applications for the Zywall
58
Secure Broadband Internet Access Via Cable or DSL Modem
58
VPN Application
58
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
58
Front Panel Leds
59
Figure 2 VPN Application
59
Figure 3 Zywall 70 Front Panel
59
Figure 4 Zywall 35 Front Panel
59
Figure 5 Zywall 5 Front Panel
59
Table 2 Front Panel Leds
60
Chapter 2 Introducing the Web Configurator
62
Web Configurator Overview
62
Accessing the Zywall Web Configurator
62
Resetting the Zywall
63
Figure 6 Change Password Screen
63
Figure 7 Replace Certificate Screen
63
Procedure to Use the Reset Button
64
Uploading a Configuration File Via Console Port
64
Navigating the Zywall Web Configurator
64
Figure 8 Example Xmodem Upload
64
Figure 9 Web Configurator HOME Screen in Router Mode
65
Table 3 Web Configurator HOME Screen in Router Mode
66
Bridge Mode
67
Figure 10 Web Configurator HOME Screen in Bridge Mode
68
Table 4 Web Configurator HOME Screen in Bridge Mode
68
Navigation Panel
70
Table 5 Bridge and Router Mode Features Comparison
70
Table 6 Screens Summary
71
Figure 11 Home : Show Statistics
75
Table 7 Home: Show Statistics
75
Figure 12 Home : Show Statistics: Line Chart
76
Figure 13 Home : DHCP Table
77
Table 8 Home: Show Statistics: Line Chart
77
Table 9 Home: DHCP Table
78
Figure 14 Home : VPN Status
79
Table 10 Home : VPN Status
79
Chapter 3 Wizard Setup
80
Wizard Setup Overview
80
ISP Parameters
80
Ethernet
80
Figure 15 ISP Parameters : Ethernet Encapsulation
81
Table 11 ISP Parameters : Ethernet Encapsulation
81
Pppoe Encapsulation
82
Figure 16 ISP Parameters : Pppoe Encapsulation
82
Table 12 ISP Parameters: Pppoe Encapsulation
82
PPTP Encapsulation
83
Figure 17 ISP Parameters: PPTP Encapsulation
84
Table 13 ISP Parameters : PPTP Encapsulation
84
Figure 18 Internet Access Wizard: Second Screen
85
Figure 19 Internet Access Setup Complete
86
Figure 20 Internet Access Wizard: Registration
86
Figure 21 Internet Access Wizard: Registration in Progress
87
Table 14 Internet Access Wizard: Registration
87
Figure 22 Internet Access Wizard: Status
88
Figure 23 Internet Access Wizard: Registration Failed
88
Figure 24 Internet Access Wizard: Registered Device
88
Figure 25 Internet Access Wizard: Activated Services
89
Figure 26 VPN Wizard: Gateway Setting
89
Table 15 VPN Wizard: Gateway Setting
90
Figure 27 VPN Wizard: Network Setting
91
Table 16 VPN Wizard : Network Setting
91
Figure 28 VPN Wizard: IKE Tunnel Setting
92
Table 17 VPN Wizard: IKE Tunnel Setting
93
Figure 29 VPN Wizard: Ipsec Setting
94
Table 18 VPN Wizard: Ipsec Setting
94
Vpn Wizard Status Summary
95
Figure 30 VPN Wizard: VPN Status
96
Table 19 VPN Wizard: VPN Status
96
Figure 31 VPN Wizard Setup Complete
98
Chapter 4 Registration
100
Myzyxel.com Overview
100
Subscription Services Available on the Zywall
100
Figure 32 Registration
101
Table 20 Registration
102
Figure 33 Registration: Registered Device
103
Figure 34 Registration: Service
103
Table 21 Service
104
Chapter 5 LAN Screens
106
LAN Overview
106
DHCP Setup
106
IP Pool Setup
106
Lan Tcp/Ip
106
Factory LAN Defaults
106
IP Address and Subnet Mask
107
RIP Setup
107
Multicast
108
DNS Servers
108
Figure 35 LAN
109
Table 22 LAN
109
Figure 36 LAN Static DHCP
111
Table 23 LAN Static DHCP
111
Figure 37 Physical Network & Partitioned Logical Networks
112
Figure 38 LAN IP Alias
113
Table 24 LAN IP Alias
113
Figure 39 WLAN Port Role Example
114
Figure 40 LAN Port Roles
115
Table 25 LAN Port Roles
115
Figure 41 Port Roles Change Complete
116
Advertisement
Related Products
ZyXEL Communications ZyXEL ZYWALL10
ZyXEL Communications Internet Security Appliance ZyWALL5UTM 4.0
ZyXEL Communications ZYWALL - CLI
ZyXEL Communications ZyWALL USG 50
ZyXEL Communications ZYWALL USG 20
ZyXEL Communications ZYWALL USG CLI
ZyXEL Communications ZyWall1
ZyXEL Communications ZYWALL 200
ZyXEL Communications ZyWALL 5 Series
ZyXEL Communications ZyWALL 70 Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL