Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Firewall
ZYWALL 5 - V4.03
ZyXEL Communications ZYWALL 5 - V4.03 Manuals
Manuals and User Guides for ZyXEL Communications ZYWALL 5 - V4.03. We have
1
ZyXEL Communications ZYWALL 5 - V4.03 manual available for free PDF download: User Manual
ZyXEL Communications ZYWALL 5 - V4.03 User Manual (872 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Firewall
| Size: 24.46 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Contents Overview
9
Table of Contents
9
Table of Contents
11
List of Figures
31
List of Tables
45
Introduction
53
PART I Introduction
53
Chapter 1 Getting to Know Your Zywall
55
Zywall Internet Security Appliance Overview
55
Zywall Features
55
Ways to Manage the Zywall
56
Good Habits for Managing the Zywall
56
Table 1 Zywall Model Specific Features
56
Applications for the Zywall
57
Secure Broadband Internet Access Via Cable or DSL Modem
57
VPN Application
57
Figure 1 Secure Internet Access Via Cable, DSL or Wireless Modem
57
Figure 2 VPN Application
57
WAN Application (Zywall 5 Only)
58
Front Panel Lights
58
Figure 3 3G WAN Application
58
Figure 4 Zywall 70 Front Panel
58
Figure 5 Zywall 35 Front Panel
58
Figure 6 Zywall 5 Front Panel
58
Table 2 Front Panel Lights
59
Chapter 2 Introducing the Web Configurator
61
Web Configurator Overview
61
Accessing the Zywall Web Configurator
61
Figure 7 Change Password Screen
62
Figure 8 Replace Certificate Screen
62
Resetting the Zywall
63
Procedure to Use the Reset Button
63
Uploading a Configuration File Via Console Port
63
Figure 9 Example Xmodem Upload
63
Navigating the Zywall Web Configurator
64
Title Bar
64
Figure 10 HOME Screen
64
Table 3 Title Bar: Web Configurator Icons
64
Main Window
65
HOME Screen: Router Mode
65
Figure 11 Web Configurator HOME Screen in Router Mode (Zywall 5)
65
Table 4 Web Configurator HOME Screen in Router Mode
65
HOME Screen: Bridge Mode
71
Figure 12 Web Configurator HOME Screen in Bridge Mode
71
Table 5 Web Configurator HOME Screen in Bridge Mode
71
Navigation Panel
74
Table 6 Bridge and Router Mode Features Comparison
74
Table 7 Screens Summary
75
Port Statistics
80
Figure 13 HOME > Port Statistics
80
Table 8 HOME > Port Statistics
80
Show Statistics: Line Chart
81
Figure 14 HOME > Show Statistics > Line Chart
81
DHCP Table Screen
82
Figure 15 HOME > Show DHCP Table
82
Table 9 HOME > Show Statistics > Line Chart
82
Table 10 HOME > Show DHCP Table
82
VPN Status
83
Figure 16 HOME > VPN Status
83
Table 11 HOME > VPN Status
83
Bandwidth Monitor
84
Figure 17 Home > Bandwidth Monitor
84
Wizard Setup
87
Chapter 3 Wizard Setup
87
Wizard Setup Overview
87
Figure 18 Wizard Setup Welcome
87
Internet Access
88
ISP Parameters
88
Figure 19 ISP Parameters: Ethernet Encapsulation
88
Table 12 ISP Parameters: Ethernet Encapsulation
88
Figure 20 ISP Parameters: Pppoe Encapsulation
89
Table 13 ISP Parameters: Pppoe Encapsulation
90
Figure 21 ISP Parameters: PPTP Encapsulation
91
Table 14 ISP Parameters: PPTP Encapsulation
91
Internet Access Wizard: Second Screen
92
Figure 22 Internet Access Wizard: Second Screen
92
Internet Access Wizard: Registration
93
Figure 23 Internet Access Setup Complete
93
Figure 24 Internet Access Wizard: Registration
93
Internet Access Wizard: Status
94
Figure 25 Internet Access Wizard: Registration in Progress
94
Table 15 Internet Access Wizard: Registration
94
Internet Access Wizard: Service Activation
95
Figure 26 Internet Access Wizard: Status
95
Figure 27 Internet Access Wizard: Registration Failed
95
Figure 28 Internet Access Wizard: Registered Device
95
VPN Wizard Gateway Setting
96
Figure 29 Internet Access Wizard: Activated Services
96
Figure 30 VPN Wizard: Gateway Setting
96
Table 16 VPN Wizard: Gateway Setting
96
VPN Wizard Network Setting
97
Figure 31 VPN Wizard: Network Setting
98
Table 17 VPN Wizard: Network Setting
98
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
99
Figure 32 VPN Wizard: IKE Tunnel Setting
99
VPN Wizard Ipsec Setting (IKE Phase 2)
100
Table 18 VPN Wizard: IKE Tunnel Setting
100
Figure 33 VPN Wizard: Ipsec Setting
101
Table 19 VPN Wizard: Ipsec Setting
101
VPN Wizard Status Summary
102
Figure 34 VPN Wizard: VPN Status
102
Table 20 VPN Wizard: VPN Status
103
VPN Wizard Setup Complete
104
Anti-Spam Wizard: Email Server Location Setting
104
Figure 35 VPN Wizard Setup Complete
104
Anti-Spam Wizard: Direction Recommendations
105
Figure 36 Anti-Spam Wizard: Email Server Location Setting
105
Table 21 Anti-Spam Wizard: Email Server Location Setting
105
Anti-Spam Wizard: Direction Configuration
106
Figure 37 Anti-Spam Wizard: Direction Recommendations
106
Figure 38 Anti-Spam Wizard: Direction Configuration
107
Table 22 Anti-Spam Wizard: Direction Configuration
107
Anti-Spam Wizard: Setup Complete
108
Figure 39 Anti-Spam Wizard: Setup Complete
108
Chapter 4 Tutorials
109
Dynamic VPN Rule Configuration
109
Figure 40 Dynamic VPN Rule Example
109
Table 23 Dynamic VPN Rule Tutorial Settings
109
Configure Bob's User Account
110
VPN Gateway and Network Policy Configuration
110
Figure 41 VPN Gateway Policy Edit Screens
112
Figure 42 SECURITY > VPN > Add Network Policy (Zywall A)
113
Figure 43 VPN Network Policy Edit Screens
114
Figure 44 Activate VPN Rule (Zywall B)
115
Configure Zero Configuration Mode on Zywall B
116
Figure 45 Tutorial: VPN Summary Screens Comparison Example
116
Figure 46 Check the Telecommuter's Computer IP Address
117
Testing Your VPN Configuration
117
Figure 47 Telecommuter Pinging a Network X IP Address Example
118
Using the Dynamic VPN Rule for more VPN Tunnels
119
Security Settings for VPN Traffic
119
Figure 48 Additional Dynamic VPN Rules Example
119
Figure 49 IDP for from VPN Traffic
120
IDP for from VPN Traffic Example
120
Figure 50 IDP Configuration for Traffic from VPN
121
Figure 51 IDP for to VPN Traffic
121
IDP for to VPN Traffic Example
121
Firewall Rule for VPN Example
122
Figure 52 IDP Configuration for to VPN Traffic
122
Configuring the VPN Rule
123
Figure 53 Firewall Rule for VPN
123
Figure 54 SECURITY > VPN > VPN Rules (IKE)
123
Figure 55 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
124
Figure 56 SECURITY > VPN > VPN Rules (IKE): with Gateway Policy Example
125
Figure 57 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
126
Configuring the Firewall Rules
127
Figure 58 SECURITY > FIREWALL > Rule Summary
127
Figure 59 SECURITY > FIREWALL > Rule Summary > Edit: Allow
128
Figure 60 SECURITY > FIREWALL > Rule Summary: Allow
129
How to Set up a 3G WAN Connection
130
Inserting a 3G Card
130
Figure 61 SECURITY > FIREWALL > Default Rule: Block from VPN to LAN
130
Configuring 3G WAN Settings
131
Figure 62 Tutorial: NETWORK > WAN > 3G (WAN2)
131
Checking WAN Connections
132
Configuring Load Balancing
132
Figure 63 Tutorial: Home
132
Configuring Content Filtering
133
Enable Content Filtering
133
Figure 64 Tutorial: NETWORK > WAN > General
133
Block Categories of Web Content
134
Figure 65 SECURITY > CONTENT FILTER > General
134
Figure 66 SECURITY > CONTENT FILTER > Policy
135
Figure 67 SECURITY > CONTENT FILTER > Policy > External Database (Default)
135
Assign Bob's Computer a Specific IP Address
136
Create a Content Filter Policy for Bob
136
Figure 68 HOME > Show DHCP Table
136
Figure 69 SECURITY > CONTENT FILTER > Policy
136
Set the Content Filter Schedule
137
Figure 70 SECURITY > CONTENT FILTER > Policy > Insert
137
Figure 71 SECURITY > CONTENT FILTER > Policy
137
Block Categories of Web Content for Bob
138
Figure 72 SECURITY > CONTENT FILTER > Policy > Schedule (Bob)
138
Figure 73 SECURITY > CONTENT FILTER > Policy
138
Figure 74 SECURITY > CONTENT FILTER > Policy > External Database (Bob)
139
Registration
141
Chapter 5 Registration
141
Myzyxel.com Overview
141
Subscription Services Available on the Zywall
141
Registration
142
Figure 75 REGISTRATION
143
Table 24 REGISTRATION
143
Service
144
Figure 76 REGISTRATION: Registered Device
144
Figure 77 REGISTRATION > Service
145
Table 25 REGISTRATION > Service
145
Network
147
Part II: Network
147
Chapter 6 LAN Screens
149
LAN, WAN and the Zywall
149
IP Address and Subnet Mask
149
Figure 78 LAN and WAN
149
Private IP Addresses
150
Dhcp
151
IP Pool Setup
151
RIP Setup
151
Multicast
151
Wins
152
Lan
152
Figure 79 NETWORK > LAN
153
Table 26 NETWORK > LAN
153
LAN Static DHCP
155
LAN IP Alias
156
Figure 80 NETWORK > LAN > Static DHCP
156
Table 27 NETWORK > LAN > Static DHCP
156
Figure 81 Physical Network & Partitioned Logical Networks
157
Figure 82 NETWORK > LAN > IP Alias
157
LAN Port Roles
158
Table 28 NETWORK > LAN > IP Alias
158
Figure 83 NETWORK > LAN > Port Roles
159
Figure 84 Port Roles Change Complete
159
Table 29 NETWORK > LAN > Port Roles
159
Bridge Screens
161
Chapter 7 Bridge Screens
161
Bridge Loop
161
Figure 85 Bridge Loop: Bridge Connected to Wired LAN
161
Spanning Tree Protocol (STP)
162
Rapid STP
162
STP Terminology
162
How STP Works
162
Table 30 STP Path Costs
162
STP Port States
163
Bridge
163
Table 31 STP Port States
163
Figure 86 NETWORK > Bridge
164
Table 32 NETWORK > Bridge
164
Bridge Port Roles
165
Figure 87 NETWORK > Bridge > Port Roles
166
Figure 88 Port Roles Change Complete
166
Table 33 NETWORK > Bridge > Port Roles
166
WAN Screens
167
Chapter 8 WAN Screens
167
WAN Overview
167
Multiple WAN
167
Load Balancing Introduction
168
Load Balancing Algorithms
168
Least Load First
168
Weighted Round Robin
169
Figure 89 Least Load First Example
169
Table 34 Least Load First: Example 1
169
Table 35 Least Load First: Example 2
169
Spillover
170
Figure 90 Weighted Round Robin Algorithm Example
170
Figure 91 Spillover Algorithm Example
170
WAN Interface to Local Host Mapping Timeout
171
Figure 92 Incorrect WAN IP
171
TCP/IP Priority (Metric)
172
WAN General
172
Figure 93 NETWORK > WAN (General)
173
Table 36 NETWORK > WAN (General)
174
Configuring Load Balancing
176
Least Load First
176
Figure 94 Load Balancing: Least Load First
176
Table 37 Load Balancing: Least Load First
176
Weighted Round Robin
177
Figure 95 Load Balancing: Weighted Round Robin
177
Table 38 Load Balancing: Weighted Round Robin
177
Spillover
178
Figure 96 Load Balancing: Spillover
178
Table 39 Load Balancing: Spillover
178
WAN IP Address Assignment
179
DNS Server Address Assignment
179
Table 40 Private IP Address Ranges
179
WAN MAC Address
180
Wan
180
WAN Ethernet Encapsulation
180
Figure 97 NETWORK > WAN > WAN (Ethernet Encapsulation)
181
Table 41 NETWORK > WAN > WAN (Ethernet Encapsulation)
181
Pppoe Encapsulation
183
Figure 98 NETWORK > WAN > WAN (Pppoe Encapsulation)
184
Table 42 NETWORK > WAN > WAN (Pppoe Encapsulation)
184
PPTP Encapsulation
186
Figure 99 NETWORK > WAN > WAN (PPTP Encapsulation)
187
Table 43 NETWORK > WAN > WAN (PPTP Encapsulation)
187
Wan2)
189
Table 44 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies
190
Figure 100 NETWORK > WAN > 3G (WAN 2)
191
Table 45 NETWORK > WAN > 3G (WAN 2)
192
Traffic Redirect
194
Configuring Traffic Redirect
195
Figure 101 Traffic Redirect WAN Setup
195
Figure 102 Traffic Redirect LAN Setup
195
Configuring Dial Backup
196
Figure 103 NETWORK > WAN > Traffic Redirect
196
Table 46 NETWORK > WAN > Traffic Redirect
196
Figure 104 NETWORK > WAN > Dial Backup
197
Table 47 NETWORK > WAN > Dial Backup
197
Advanced Modem Setup
199
AT Command Strings
199
DTR Signal
200
Response Strings
200
Configuring Advanced Modem Setup
200
Figure 105 NETWORK > WAN > Dial Backup > Edit
200
Table 48 NETWORK > WAN > Dial Backup > Edit
201
DMZ Screens
203
Chapter 9 DMZ Screens
203
Dmz
203
Configuring DMZ
203
Figure 106 NETWORK > DMZ
204
Table 49 NETWORK > DMZ
204
DMZ Static DHCP
206
Figure 107 NETWORK > DMZ > Static DHCP
206
DMZ IP Alias
207
Table 50 NETWORK > DMZ > Static DHCP
207
Figure 108 NETWORK > DMZ > IP Alias
208
Table 51 NETWORK > DMZ > IP Alias
208
DMZ Public IP Address Example
209
DMZ Private and Public IP Address Example
209
Figure 109 DMZ Public Address Example
209
DMZ Port Roles
210
Figure 110 DMZ Private and Public Address Example
210
Figure 111 NETWORK > DMZ > Port Roles
211
Table 52 NETWORK > DMZ > Port Roles
211
Wlan
213
Chapter 10 WLAN
213
Wireless LAN Introduction
213
Additional Installation Requirements for Using 802.1X
213
Configuring WLAN
213
Figure 112 NETWORK > WLAN
214
Table 53 NETWORK > WLAN
215
WLAN Static DHCP
216
WLAN IP Alias
217
Figure 113 NETWORK > WLAN > Static DHCP
217
Table 54 NETWORK > WLAN > Static DHCP
217
Figure 114 NETWORK > WLAN > IP Alias
218
Table 55 NETWORK > WLAN > IP Alias
218
WLAN Port Roles
219
Figure 115 WLAN Port Role Example
219
Figure 116 NETWORK > WLAN > Port Roles
220
Table 56 NETWORK > WLAN > Port Roles
220
Wireless Security
221
Encryption
221
Figure 117 NETWORK > WLAN > Port Roles: Change Complete
221
Figure 118 Zywall Wireless Security Levels
221
Authentication
222
Restricted Access
222
Hide Zywall Identity
222
Security Parameters Summary
222
Table 57 Wireless Security Relational Matrix
222
WEP Encryption
223
Overview
223
Introduction to RADIUS
223
EAP Authentication Overview
224
Figure 119 EAP Authentication
224
Dynamic WEP Key Exchange
225
Introduction to WPA
225
User Authentication
225
Encryption
225
WPA-PSK Application Example
226
Introduction to RADIUS
227
WPA with RADIUS Application Example
227
Figure 120 WPA-PSK Authentication
227
Wireless Client WPA Supplicants
228
Wireless Card
228
Figure 121 WPA with RADIUS Application Example
228
Figure 122 WIRELESS > Wi-Fi > Wireless Card: no Security
229
Table 58 WIRELESS > Wi-Fi > Wireless Card: no Security
229
Static WEP
230
Figure 123 WIRELESS > Wi-Fi > Wireless Card: Static WEP
231
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP
231
Wpa-Psk
231
Figure 124 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK
232
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK
232
Figure 125 WIRELESS > Wi-Fi > Wireless Card: WPA
233
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA
233
Wpa
233
Figure 126 WIRELESS > Wi-Fi > Wireless Card: 802.1X + Dynamic WEP
234
IEEE 802.1X + Dynamic WEP
234
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1X + Dynamic WEP
234
Figure 127 WIRELESS > Wi-Fi > Wireless Card: 802.1X + Static WEP
235
IEEE 802.1X + Static WEP
235
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1X + Static WEP
235
IEEE 802.1X + no WEP
236
Figure 128 WIRELESS > Wi-Fi > Wireless Card: 802.1X + no WEP
237
No Access 802.1X + Static WEP
237
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1X + no WEP
237
Figure 129 WIRELESS > Wi-Fi > Wireless Card: no Access 802.1X + Static WEP
238
No Access 802.1X + no WEP
238
Table 65 WIRELESS > Wi-Fi > Wireless Card: no Access 802.1X + Static WEP
238
MAC Filter
239
Figure 130 WIRELESS > Wi-Fi > MAC Filter
239
Table 66 WIRELESS > Wi-Fi > MAC Filter
239
Part III: Security
241
Firewall
243
Security
241
Chapter 11 Firewall
243
Firewall Overview
243
Figure 131 Default Firewall Action
243
Packet Direction Matrix
244
Figure 132 SECURITY > FIREWALL > Default Rule (Router Mode)
244
Figure 133 Default Block Traffic from WAN1 to DMZ Example
245
Packet Direction Examples
246
To VPN Packet Direction
247
Figure 134 from LAN to VPN Example
247
From VPN Packet Direction
248
Figure 135 Block DMZ to VPN Traffic by Default Example
248
Figure 136 from VPN to LAN Example
249
From VPN to VPN Packet Direction
250
Figure 137 Block VPN to LAN Traffic by Default Example
250
Figure 138 from VPN to VPN Example
251
Security Considerations
252
Figure 139 Block VPN to VPN Traffic by Default Example
252
Firewall Rules Example
253
Figure 140 Blocking All LAN to WAN IRC Traffic Example
253
Table 67 Blocking All LAN to WAN IRC Traffic Example
253
Asymmetrical Routes
254
Figure 141 Limited LAN to WAN IRC Traffic Example
254
Table 68 Limited LAN to WAN IRC Traffic Example
254
Asymmetrical Routes and IP Alias
255
Firewall Default Rule (Router Mode)
255
Figure 142 Using IP Alias to Solve the Triangle Route Problem
255
Figure 143 SECURITY > FIREWALL > Default Rule (Router Mode)
256
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode)
256
Firewall Default Rule (Bridge Mode)
258
Figure 144 SECURITY > FIREWALL > Default Rule (Bridge Mode)
258
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode)
258
Firewall Rule Summary
259
Figure 145 SECURITY > FIREWALL > Rule Summary
260
Table 71 SECURITY > FIREWALL > Rule Summary
260
Firewall Edit Rule
261
Figure 146 SECURITY > FIREWALL > Rule Summary > Edit
262
Table 72 SECURITY > FIREWALL > Rule Summary > Edit
263
Anti-Probing
264
Figure 147 SECURITY > FIREWALL > Anti-Probing
264
Firewall Thresholds
265
Figure 148 Three-Way Handshake
265
Table 73 SECURITY > FIREWALL > Anti-Probing
265
Threshold Values
266
Threshold Screen
266
Figure 149 SECURITY > FIREWALL > Threshold
266
Table 74 SECURITY > FIREWALL > Threshold
267
Service
268
Figure 150 SECURITY > FIREWALL > Service
268
Table 75 SECURITY > FIREWALL > Service
268
Figure 151 SECURITY > FIREWALL > Service > Add
269
Firewall Edit Custom Service
269
Table 76 SECURITY > FIREWALL > Service > Add
269
My Service Firewall Rule Example
270
Figure 152 My Service Firewall Rule Example: Service
270
Figure 153 My Service Firewall Rule Example: Edit Custom Service
270
Figure 154 My Service Firewall Rule Example: Rule Summary
271
Figure 155 My Service Firewall Rule Example: Rule Edit
271
Figure 156 My Service Firewall Rule Example: Rule Configuration
272
Figure 157 My Service Firewall Rule Example: Rule Summary
273
Chapter 12 Intrusion Detection and Prevention (IDP)
275
Introduction to IDP
275
Firewalls and Intrusions
275
Figure 158 Network Intrusions
275
IDS and IDP
276
Host IDP
276
Network IDP
276
Example Intrusions
276
Zywall IDP
278
Chapter 13 Configuring IDP
279
Overview
279
Interfaces
279
General Setup
280
Figure 159 Applying IDP to Interfaces
280
Figure 160 SECURITY > IDP > General
280
Table 77 SECURITY > IDP > General Setup
281
IDP Signatures
282
Attack Types
282
Figure 161 SECURITY > IDP > Signatures: Attack Types
282
Table 78 SECURITY > IDP > Signature: Attack Types
282
Intrusion Severity
283
Signature Actions
283
Table 79 SECURITY > IDP > Signature: Intrusion Severity
283
Configuring IDP Signatures
284
Figure 162 SECURITY > IDP > Signature: Actions
284
Figure 163 SECURITY > IDP > Signature: Group View
284
Table 80 SECURITY > IDP > Signature: Actions
284
Table 81 SECURITY > IDP > Signature: Group View
285
Query View
286
Figure 164 SECURITY > IDP > Signature: Query View
286
Table 82 SECURITY > IDP > Signature: Query View
286
Figure 165 SECURITY > IDP > Signature: Query by Partial Name
289
Figure 166 SECURITY > IDP > Signature: Query by Complete ID
289
Update
290
Mysecurityzone
290
Figure 167 Signature Query by Attribute
290
Configuring IDP Update
291
Figure 168 SECURITY > IDP > Update
291
Table 83 SECURITY > IDP > Update
292
Backup and Restore
293
Figure 169 SECURITY > IDP > Backup & Restore
293
Chapter 14 Anti-Virus
295
Anti-Virus Overview
295
Types of Computer Viruses
295
Computer Virus Infection and Prevention
295
Table 84 Common Computer Virus Types
295
Types of Anti-Virus Scanner
296
Introduction to the Zywall Anti-Virus Scanner
296
How the Zywall Anti-Virus Scanner Works
296
Notes about the Zywall Anti-Virus
297
Figure 170 Zywall Anti-Virus Example
297
General Anti-Virus Setup
298
Figure 171 SECURITY > ANTI-VIRUS > General
299
Table 85 SECURITY > ANTI-VIRUS > General
299
Signature Searching
300
Figure 172 SECURITY > ANTI-VIRUS > Signature: Query View
301
Table 86 SECURITY > ANTI-VIRUS > Signature: Query View
301
Figure 173 Query Example Search Criteria
302
Signature Search Example
302
Signature Update
303
Figure 174 Query Example Search Results
303
Configuring Anti-Virus Update
304
Figure 175 SECURITY > ANTI-VIRUS > Update
304
Mysecurityzone
304
Backup and Restore
306
Figure 176 SECURITY > ANTI-VIRUS > Backup and Restore
306
Chapter 15 Anti-Spam
307
Anti-Spam Overview
307
Anti-Spam External Database
307
Spam Threshold
309
Phishing
309
Figure 177 Anti-Spam External Database Example
309
Whitelist
310
Blacklist
310
SMTP and POP3
310
MIME Headers
310
Anti-Spam General Screen
311
Figure 178 SECURITY > ANTI-SPAM > General
311
Table 87 SECURITY > ANTI-SPAM > General
311
Anti-Spam External DB Screen
313
Figure 179 SECURITY > ANTI-SPAM > External DB
314
Table 88 SECURITY > ANTI-SPAM > External DB
314
Anti-Spam Lists Screen
315
Figure 180 SECURITY > ANTI-SPAM > Lists
316
Table 89 SECURITY > ANTI-SPAM > Lists
316
Anti-Spam Lists Edit Screen
317
Figure 181 SECURITY > ANTI-SPAM > Lists > Edit
317
Table 90 SECURITY > ANTI-SPAM > Lists > Edit
318
Chapter 16
321
Content Filtering Screens
321
Content Filtering Overview
321
Restrict Web Features
321
Create a Filter List
321
Customize Web Site Access
321
Content Filtering with an External Database
321
Content Filter General Screen
322
Figure 182 Content Filtering Lookup Procedure
322
Figure 183 SECURITY > CONTENT FILTER > General
323
Table 91 SECURITY > CONTENT FILTER > General
323
Content Filter Policy
325
Figure 184 SECURITY > CONTENT FILTER > Policy
326
Table 92 SECURITY > CONTENT FILTER > Policy
326
Content Filter Policy: General
327
Figure 185 SECURITY > CONTENT FILTER > Policy > General
327
Table 93 SECURITY > CONTENT FILTER > Policy > General
327
Content Filter Policy: External Database
329
Figure 186 SECURITY > CONTENT FILTER > Policy > External Database
329
Table 94 SECURITY > CONTENT FILTER > Policy > External Database
329
Content Filter Policy: Customization
336
Figure 187 SECURITY > CONTENT FILTER > Policy > Customization
336
Table 95 SECURITY > CONTENT FILTER > Policy > Customization
336
Content Filter Policy: Schedule
337
Content Filter Object
338
Figure 188 SECURITY > CONTENT FILTER > Policy > Schedule
338
Table 96 SECURITY > CONTENT FILTER > Policy > Schedule
338
Figure 189 SECURITY > CONTENT FILTER > Object
339
Table 97 SECURITY > CONTENT FILTER > Object
339
Content Filtering Cache
340
Figure 190 SECURITY > CONTENT FILTER > Cache
341
Table 98 SECURITY > CONTENT FILTER > Cache
341
Chapter 17 Content Filtering Reports
343
Checking Content Filtering Activation
343
Viewing Content Filtering Reports
343
Figure 191 Myzyxel.com: Login
344
Figure 192 Myzyxel.com: Welcome
344
Figure 193 Myzyxel.com: Service Management
345
Figure 194 Blue Coat: Login
345
Figure 195 Content Filtering Reports Main Screen
346
Figure 196 Blue Coat: Report Home
346
Figure 197 Global Report Screen Example
347
Web Site Submission
348
Figure 198 Requested Urls Example
348
Figure 199 Web Page Review Process Screen
349
Chapter 18 Ipsec VPN
351
Ipsec VPN Overview
351
Figure 200 VPN: Example
351
Figure 201 VPN: IKE SA and Ipsec SA
352
IKE SA Overview
352
VPN Rules (IKE)
353
Figure 202 Gateway and Network Policies
353
Figure 203 Ipsec Fields Summary
353
Figure 204 SECURITY > VPN > VPN Rules (IKE)
354
Table 99 SECURITY > VPN > VPN Rules (IKE)
354
IKE SA Setup
355
IKE SA Proposal
355
Figure 205 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
355
Figure 206 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange
356
Figure 207 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication
357
Table 100 VPN Example: Matching ID Type and Content
357
Table 101 VPN Example: Mismatching ID Type and Content
358
Figure 208 VPN/NAT Example
359
Additional Ipsec VPN Topics
360
SA Life Time
360
Ipsec High Availability
361
Encryption and Authentication Algorithms
361
Figure 209 Ipsec High Availability
361
VPN Rules (IKE) Gateway Policy Edit
362
Figure 210 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy
363
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy
364
Ipsec SA Overview
368
Local and Remote Networks
368
Virtual Address Mapping
369
Active Protocol
370
Encapsulation
370
Figure 211 Virtual Mapping of Local and Remote Network IP Addresses
370
Ipsec SA Proposal and Perfect Forward Secrecy
371
Figure 212 VPN: Transport and Tunnel Mode Encapsulation
371
Network Policy Edit
372
Figure 213 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy
373
Table 103 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy
374
Network Policy Edit: Port Forwarding
377
Figure 214 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding
378
Table 104 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding
378
Network Policy Move
379
Figure 215 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy
379
Table 105 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy
379
Ipsec SA Using Manual Keys
380
Ipsec SA Proposal Using Manual Keys
380
Authentication and the Security Parameter Index (SPI)
380
VPN Rules (Manual)
380
Figure 216 SECURITY > VPN > VPN Rules (Manual)
381
Table 106 SECURITY > VPN > VPN Rules (Manual)
381
VPN Rules (Manual): Edit
382
Figure 217 SECURITY > VPN > VPN Rules (Manual) > Edit
382
Table 107 SECURITY > VPN > VPN Rules (Manual) > Edit
382
VPN SA Monitor
385
VPN Global Setting
385
Local and Remote IP Address Conflict Resolution
385
Figure 218 SECURITY > VPN > SA Monitor
385
Table 108 SECURITY > VPN > SA Monitor
385
Figure 219 Overlap in a Dynamic VPN Rule
386
Figure 220 Overlap in IP Alias and VPN Remote Networks
387
Figure 221 SECURITY > VPN > Global Setting
387
Table 109 SECURITY > VPN > Global Setting
387
Telecommuter Vpn/Ipsec Examples
388
Telecommuters Sharing One VPN Rule Example
389
Telecommuters Using Unique VPN Rules Example
389
Figure 222 Telecommuters Sharing One VPN Rule Example
389
Table 110 Telecommuters Sharing One VPN Rule Example
389
Figure 223 Telecommuters Using Unique VPN Rules Example
390
Table 111 Telecommuters Using Unique VPN Rules Example
390
VPN and Remote Management
391
Hub-And-Spoke VPN
391
Figure 224 VPN for Remote Management Example
391
Figure 225 VPN Topologies
392
Hub-And-Spoke VPN Example
392
Figure 226 Hub-And-Spoke VPN Example
393
Hub-And-Spoke Example VPN Rule Addresses
393
Hub-And-Spoke VPN Requirements and Suggestions
393
Chapter 19 Certificates
395
Certificates Overview
395
Advantages of Certificates
396
Self-Signed Certificates
396
Verifying a Certificate
396
Checking the Fingerprint of a Certificate on Your Computer
396
Figure 227 Certificates on Your Computer
396
Configuration Summary
397
Figure 228 Certificate Details
397
Figure 229 Certificate Configuration Overview
397
My Certificates
398
Figure 230 SECURITY > CERTIFICATES > My Certificates
398
Table 112 SECURITY > CERTIFICATES > My Certificates
398
My Certificate Details
400
Figure 231 SECURITY > CERTIFICATES > My Certificates > Details
400
Table 113 SECURITY > CERTIFICATES > My Certificates > Details
401
My Certificate Export
402
Certificate File Export Formats
402
Figure 232 SECURITY > CERTIFICATES > My Certificates > Export
402
My Certificate Import
403
Certificate File Formats
403
Table 114 SECURITY > CERTIFICATES > My Certificates > Export
403
Figure 233 SECURITY > CERTIFICATES > My Certificates > Import
404
Table 115 SECURITY > CERTIFICATES > My Certificates > Import
404
My Certificate Create
405
Figure 234 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
405
Table 116 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
405
Figure 235 SECURITY > CERTIFICATES > My Certificates > Create (Basic)
406
Figure 236 SECURITY > CERTIFICATES > My Certificates > Create (Advanced)
407
Table 117 SECURITY > CERTIFICATES > My Certificates > Create
407
Trusted Cas
410
Figure 237 SECURITY > CERTIFICATES > Trusted Cas
411
Table 118 SECURITY > CERTIFICATES > Trusted Cas
411
Trusted CA Details
412
Figure 238 SECURITY > CERTIFICATES > Trusted Cas > Details
413
Table 119 SECURITY > CERTIFICATES > Trusted Cas > Details
413
Trusted CA Import
415
Trusted Remote Hosts
416
Figure 239 SECURITY > CERTIFICATES > Trusted Cas > Import
416
Table 120 SECURITY > CERTIFICATES > Trusted Cas Import
416
Figure 240 SECURITY > CERTIFICATES > Trusted Remote Hosts
417
Table 121 SECURITY > CERTIFICATES > Trusted Remote Hosts
417
Trusted Remote Hosts Import
418
Figure 241 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
418
Table 122 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
418
Trusted Remote Host Certificate Details
419
Figure 242 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
419
Table 123 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
420
Directory Servers
421
Figure 243 SECURITY > CERTIFICATES > Directory Servers
421
Directory Server Add or Edit
422
Figure 244 SECURITY > CERTIFICATES > Directory Server > Add
422
Table 124 SECURITY > CERTIFICATES > Directory Servers
422
Table 125 SECURITY > CERTIFICATES > Directory Server > Add
423
Chapter 20 Authentication Server
425
Authentication Server Overview
425
Local User Database
425
Radius
425
Figure 245 SECURITY > AUTH SERVER > Local User Database
426
Radius
427
Figure 246 SECURITY > AUTH SERVER > RADIUS
427
Table 126 SECURITY > AUTH SERVER > Local User Database
427
Table 127 SECURITY > AUTH SERVER > RADIUS
427
Part IV: Advanced
429
Advanced
429
Chapter 21 Network Address Translation (NAT)
431
NAT Overview
431
NAT Definitions
431
Table 128 NAT Definitions
431
What NAT Does
432
How NAT Works
432
NAT Application
433
Figure 247 How NAT Works
433
Figure 248 NAT Application with IP Alias
433
Port Restricted Cone NAT
434
NAT Mapping Types
434
Figure 249 Port Restricted Cone NAT Example
434
Using NAT
435
SUA (Single User Account) Versus NAT
435
Table 129 NAT Mapping Types
435
NAT Overview Screen
436
Figure 250 ADVANCED > NAT > NAT Overview
436
Table 130 ADVANCED > NAT > NAT Overview
436
NAT Address Mapping
437
Figure 251 ADVANCED > NAT > Address Mapping
438
Table 131 ADVANCED > NAT > Address Mapping
438
NAT Address Mapping Edit
439
Port Forwarding
440
Figure 252 ADVANCED > NAT > Address Mapping > Edit
440
Table 132 ADVANCED > NAT > Address Mapping > Edit
440
Configuring Servers Behind Port Forwarding (Example)
441
Default Server IP Address
441
Port Forwarding: Services and Port Numbers
441
Figure 253 Multiple Servers Behind NAT Example
442
NAT and Multiple WAN
442
Port Translation
442
Port Forwarding Screen
443
Figure 254 Port Translation Example
443
Figure 255 ADVANCED > NAT > Port Forwarding
444
Table 133 ADVANCED > NAT > Port Forwarding
444
Port Triggering
445
Figure 256 Trigger Port Forwarding Process: Example
445
Figure 257 ADVANCED > NAT > Port Triggering
446
Table 134 ADVANCED > NAT > Port Triggering
446
Chapter 22 Static Route
449
IP Static Route
449
Figure 258 Example of Static Routing Topology
449
IP Static Route
450
Figure 259 ADVANCED > STATIC ROUTE > IP Static Route
450
Figure 260 ADVANCED > STATIC ROUTE > IP Static Route > Edit
451
IP Static Route Edit
451
Table 135 ADVANCED > STATIC ROUTE > IP Static Route
451
Table 136 ADVANCED > STATIC ROUTE > IP Static Route > Edit
451
Chapter 23 Policy Route
453
Benefits
453
Routing Policy
453
IP Routing Policy Setup
454
Figure 261 ADVANCED > POLICY ROUTE > Policy Route Summary
454
Policy Route Edit
455
Table 137 ADVANCED > POLICY ROUTE > Policy Route Summary
455
Figure 262 ADVANCED > POLICY ROUTE > Edit
456
Table 138 ADVANCED > POLICY ROUTE > Edit
456
Chapter 24 Bandwidth Management
459
Bandwidth Management Overview
459
Bandwidth Classes and Filters
459
Proportional Bandwidth Allocation
460
Application-Based Bandwidth Management
460
Subnet-Based Bandwidth Management
460
Application and Subnet-Based Bandwidth Management
460
Figure 263 Subnet-Based Bandwidth Management Example
460
Table 139 Application and Subnet-Based Bandwidth Management Example
460
Scheduler
461
Priority-Based Scheduler
461
Fairness-Based Scheduler
461
Maximize Bandwidth Usage
461
Reserving Bandwidth for Non-Bandwidth Class Traffic
461
Maximize Bandwidth Usage Example
462
Table 140 Maximize Bandwidth Usage Example
462
Table 141 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
462
Bandwidth Borrowing
463
Bandwidth Borrowing Example
463
Table 142 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
463
Maximize Bandwidth Usage with Bandwidth Borrowing
464
Table 143 Bandwidth Borrowing Example
464
Over Allotment of Bandwidth
465
Configuring Summary
465
Table 144 over Allotment of Bandwidth Example
465
Figure 264 ADVANCED > BW MGMT > Summary
466
Table 145 ADVANCED > BW MGMT > Summary
466
Configuring Class Setup
467
Figure 265 ADVANCED > BW MGMT > Class Setup
467
Bandwidth Manager Class Configuration
468
Table 146 ADVANCED > BW MGMT > Class Setup
468
Figure 266 ADVANCED > BW MGMT > Class Setup > Add Sub-Class
469
Table 147 ADVANCED > BW MGMT > Class Setup > Add Sub-Class
469
Bandwidth Management Statistics
471
Table 148 Services and Port Numbers
471
Bandwidth Manager Monitor
472
Figure 267 ADVANCED > BW MGMT > Class Setup > Statistics
472
Figure 268 ADVANCED > BW MGMT > Monitor
473
Chapter 25 DNS
475
DNS Overview
475
DNS Server Address Assignment
475
DNS Servers
475
Address Record
476
DNS Wildcard
476
Name Server Record
476
Private DNS Server
476
System Screen
477
Figure 269 Private DNS Server Example
477
Figure 270 ADVANCED > DNS > System DNS
477
Adding an Address Record
478
Figure 271 ADVANCED > DNS > Add (Address Record)
479
Inserting a Name Server Record
479
Table 149 ADVANCED > DNS > Add (Address Record)
479
Figure 272 ADVANCED > DNS > Insert (Name Server Record)
480
DNS Cache
481
Configure DNS Cache
481
Figure 273 ADVANCED > DNS > Cache
481
Configuring DNS DHCP
482
Figure 274 ADVANCED > DNS > DHCP
482
Dynamic DNS
483
DYNDNS Wildcard
484
High Availability
484
Configuring Dynamic DNS
484
Figure 275 ADVANCED > DNS > DDNS
484
Chapter 26 Remote Management
487
Remote Management Overview
487
Figure 276 Secure and Insecure Remote Management from the WAN
487
Remote Management Limitations
488
System Timeout
488
WWW (HTTP and HTTPS)
488
Www
489
Figure 277 HTTPS Implementation
489
Figure 278 ADVANCED > REMOTE MGMT > WWW
490
Table 150 ADVANCED > REMOTE MGMT > WWW
490
HTTPS Example
491
Internet Explorer Warning Messages
491
Netscape Navigator Warning Messages
491
Figure 279 Security Alert Dialog Box (Internet Explorer)
491
Avoiding the Browser Warning Messages
492
Figure 280 Security Certificate 1 (Netscape)
492
Figure 281 Security Certificate 2 (Netscape)
492
Login Screen
493
Figure 282 Example: Lock Denoting a Secure Connection
493
Figure 283 Replace Certificate
494
Figure 284 Device-Specific Certificate
494
Enrolling and Importing SSL Client Certificates
495
Figure 285 Common Zywall Certificate
495
Figure 286 Zywall Trusted CA Screen
496
Figure 287 CA Certificate Example
497
Figure 288 Personal Certificate Import Wizard 1
497
Figure 289 Personal Certificate Import Wizard 2
498
Figure 290 Personal Certificate Import Wizard 3
498
Figure 291 Personal Certificate Import Wizard 4
499
Figure 292 Personal Certificate Import Wizard 5
499
Figure 293 Personal Certificate Import Wizard 6
499
Using a Certificate When Accessing the Zywall Example
500
Figure 294 Access the Zywall Via HTTPS
500
Figure 295 SSL Client Authentication
500
Figure 296 Secure Web Configurator Login Screen
500
Ssh
501
How SSH Works
501
Figure 297 SSH Communication over the WAN Example
501
Figure 298 How SSH Works
501
SSH Implementation on the Zywall
502
Requirements for Using SSH
502
Configuring SSH
502
Secure Telnet Using SSH Examples
503
Example 1: Microsoft Windows
503
Figure 299 ADVANCED > REMOTE MGMT > SSH
503
Table 151 ADVANCED > REMOTE MGMT > SSH
503
Example 2: Linux
504
Figure 300 SSH Example 1: Store Host Key
504
Figure 301 SSH Example 2: Test
504
Secure FTP Using SSH Example
505
Figure 302 SSH Example 2: Log in
505
Figure 303 Secure FTP: Firmware Upload Example
505
Telnet
506
Configuring TELNET
506
Figure 304 ADVANCED > REMOTE MGMT > Telnet
506
Table 152 ADVANCED > REMOTE MGMT > Telnet
506
Ftp
507
Figure 305 ADVANCED > REMOTE MGMT > FTP
507
Table 153 ADVANCED > REMOTE MGMT > FTP
507
Snmp
508
Figure 306 SNMP Management Model
508
Remote Management: Snmp
509
SNMP Traps
509
Supported Mibs
509
Table 154 SNMP Traps
509
Figure 307 ADVANCED > REMOTE MGMT > SNMP
510
Table 155 ADVANCED > REMOTE MGMT > SNMP
510
Dns
511
Introducing Vantage CNM
511
Figure 308 ADVANCED > REMOTE MGMT > DNS
511
Table 156 ADVANCED > REMOTE MGMT > DNS
511
Configuring CNM
512
Figure 309 ADVANCED > REMOTE MGMT > CNM
512
Table 157 ADVANCED > REMOTE MGMT > CNM
512
Additional Configuration for Vantage CNM
513
Chapter 27 Upnp
515
Universal Plug and Play Overview
515
How Do I Know if I'M Using Upnp
515
NAT Traversal
515
Cautions with Upnp
515
Upnp and Zyxel
516
Configuring Upnp
516
Figure 310 ADVANCED > Upnp
516
Table 158 ADVANCED > Upnp
516
Displaying Upnp Port Mapping
517
Figure 311 ADVANCED > Upnp > Ports
517
Table 159 ADVANCED > Upnp > Ports
517
Installing Upnp in Windows Example
518
Installing Upnp in Windows Me
519
Installing Upnp in Windows XP
520
Using Upnp in Windows XP Example
520
Auto-Discover Your Upnp-Enabled Network Device
521
Web Configurator Easy Access
522
Chapter 28 Custom Application
525
Custom Application Configuration
525
Figure 312 ADVANCED > Custom APP
526
Table 160 ADVANCED > Custom APP
526
Chapter 29 ALG Screen
527
ALG Introduction
527
ALG and NAT
527
ALG and the Firewall
527
ALG and Multiple WAN
528
528
528
Ftp
528
Rtp
528
ALG Details
528
Figure 313 H.323 ALG Example
529
Figure 314 H.323 with Multiple WAN IP Addresses
529
Figure 315 H.323 Calls from the WAN with Multiple Outgoing Calls
530
Sip
530
Stun
530
SIP ALG Details
530
ALG Screen
531
Figure 316 SIP ALG Example
531
SIP Audio Session Timeout
531
SIP Signaling Session Timeout
531
Figure 317 ADVANCED > ALG
532
Table 161 ADVANCED > ALG
532
Reports, Logs and Maintenance
533
Part V: Reports, Logs and Maintenance
533
Chapter 30 Reports
535
Configuring Reports
535
System Reports Screen
535
Figure 318 REPORTS > SYSTEM REPORTS
536
Table 162 REPORTS > SYSTEM REPORTS
536
Figure 319 REPORTS > SYSTEM REPORTS: Web Site Hits Example
537
Table 163 REPORTS > SYSTEM REPORTS: Web Site Hits Report
537
Viewing Web Site Hits
537
Figure 320 REPORTS > SYSTEM REPORTS: Host IP Address Example
538
Table 164 REPORTS > SYSTEM REPORTS: Host IP Address
538
Viewing Host IP Address
538
Figure 321 REPORTS > SYSTEM REPORTS: Protocol/Port Example
539
Table 165 REPORTS > SYSTEM REPORTS: Protocol/ Port
539
Viewing Protocol/Port
539
System Reports Specifications
540
IDP Threat Reports Screen
540
Figure 322 REPORTS > THREAT REPORTS > IDP
540
Table 166 Report Specifications
540
Table 167 REPORTS > THREAT REPORTS > IDP
541
Anti-Virus Threat Reports Screen
542
Figure 323 REPORTS > THREAT REPORTS > IDP > Source
542
Figure 324 REPORTS > THREAT REPORTS > IDP > Destination
542
Figure 325 REPORTS > THREAT REPORTS > Anti-Virus
542
Figure 326 REPORTS > THREAT REPORTS > Anti-Virus > Source
543
Table 168 REPORTS > THREAT REPORTS > Anti-Virus
543
Anti-Spam Threat Reports Screen
544
Figure 327 REPORTS > THREAT REPORTS > Anti-Virus > Destination
544
Figure 328 REPORTS > THREAT REPORTS > Anti-Spam
544
Table 169 REPORTS > THREAT REPORTS > Anti-Spam
544
Figure 329 REPORTS > THREAT REPORTS > Anti-Spam > Source
546
Figure 330 REPORTS > THREAT REPORTS > Anti-Spam > Score Distribution
546
Chapter 31 Logs Screens
547
Configuring View Log
547
Figure 331 LOGS > View Log
547
Log Description Example
548
Table 170 LOGS > View Log
548
Table 171 Log Description Example
548
About the Certificate Not Trusted Log
549
Figure 332 Myzyxel.com: Download Center
549
Configuring Log Settings
550
Figure 333 Myzyxel.com: Certificate Download
550
Figure 334 LOGS > Log Settings
551
Table 172 LOGS > Log Settings
552
Log Descriptions
553
Table 173 System Maintenance Logs
553
Table 174 System Error Logs
555
Table 175 Access Control Logs
555
Table 176 TCP Reset Logs
556
Table 177 Packet Filter Logs
556
Table 178 ICMP Logs
556
Table 179 CDR Logs
557
Table 180 PPP Logs
557
Table 181 3G Logs
557
Table 182 Upnp Logs
559
Table 183 Content Filtering Logs
559
Table 184 Attack Logs
560
Table 185 Remote Management Logs
561
Table 186 Wireless Logs
561
Table 187 Ipsec Logs
562
Table 188 IKE Logs
562
Table 189 PKI Logs
565
Table 190 802.1X Logs
567
Table 191 ACL Setting Notes
568
Table 192 ICMP Notes
568
Table 193 IDP Logs
569
Table 194 AV Logs
570
Table 195 as Logs
571
Syslog Logs
573
Table 196 Syslog Logs
573
Table 197 RFC-2408 ISAKMP Payload Types
574
Chapter 32 Maintenance
575
Maintenance Overview
575
General Setup and System Name
575
General Setup
575
Configuring Password
576
Figure 335 MAINTENANCE > General Setup
576
Figure 336 MAINTENANCE > Password
576
Table 198 MAINTENANCE > General Setup
576
Time and Date
577
Figure 337 MAINTENANCE > Time and Date
577
Table 199 MAINTENANCE > Password
577
Table 200 MAINTENANCE > Time and Date
578
Pre-Defined NTP Time Server Pools
579
Resetting the Time
580
Time Server Synchronization
580
Figure 338 Synchronization in Process
580
Figure 339 Synchronization Is Successful
580
Introduction to Transparent Bridging
581
Figure 340 Synchronization Fail
581
Table 201 MAC-Address-To-Port Mapping Table
581
Transparent Firewalls
582
Configuring Device Mode (Router)
582
Configuring Device Mode (Bridge)
583
Figure 341 MAINTENANCE > Device Mode (Router Mode)
583
Table 202 MAINTENANCE > Device Mode (Router Mode)
583
Figure 342 MAINTENANCE > Device Mode (Bridge Mode)
584
Table 203 MAINTENANCE > Device Mode (Bridge Mode)
584
F/W Upload Screen
585
Figure 343 MAINTENANCE > Firmware Upload
585
Table 204 MAINTENANCE > Firmware Upload
585
Figure 344 Firmware Upload in Process
586
Figure 345 Network Temporarily Disconnected
586
Figure 346 Firmware Upload Error
586
Backup and Restore
587
Backup Configuration
587
Restore Configuration
587
Figure 347 MAINTENANCE > Backup and Restore
587
Table 205 Restore Configuration
587
Back to Factory Defaults
588
Figure 348 Configuration Upload Successful
588
Figure 349 Network Temporarily Disconnected
588
Figure 350 Configuration Upload Error
588
Restart Screen
589
Diagnostics
589
Figure 351 Reset Warning Message
589
Figure 352 MAINTENANCE > Restart
589
Figure 353 MAINTENANCE > Diagnostics
590
Table 206 MAINTENANCE > Diagnostics
590
SMT and Troubleshooting
593
Part VI: SMT and Troubleshooting
593
Chapter 33
595
Introducing the SMT
595
Introduction to the SMT
595
Accessing the SMT Via the Console Port
595
Initial Screen
595
Entering the Password
596
Navigating the SMT Interface
596
Figure 354 Initial Screen
596
Figure 355 Password Screen
596
Table 207 Main Menu Commands
596
Figure 356 Main Menu (Router Mode)
597
Main Menu
597
Figure 357 Main Menu (Bridge Mode)
598
Table 208 Main Menu Summary
598
SMT Menus Overview
599
Table 209 SMT Menus Overview
599
Changing the System Password
600
Resetting the Zywall
601
Figure 358 Menu 23: System Password
601
Chapter 34 SMT Menu 1 - General Setup
603
Introduction to General Setup
603
Configuring General Setup
603
Figure 359 Menu 1: General Setup (Router Mode)
603
Table 210 Menu 1: General Setup (Router Mode)
603
Figure 360 Menu 1: General Setup (Bridge Mode)
604
Table 211 Menu 1: General Setup (Bridge Mode)
604
Configuring Dynamic DNS
605
Figure 361 Menu 1.1: Configure Dynamic DNS
605
Table 212 Menu 1.1: Configure Dynamic DNS
605
Figure 362 Menu 1.1.1: DDNS Host Summary
606
Table 213 Menu 1.1.1: DDNS Host Summary
606
Figure 363 Menu 1.1.1: DDNS Edit Host
607
Table 214 Menu 1.1.1: DDNS Edit Host
607
Chapter 35 WAN and Dial Backup Setup
609
Introduction to WAN and Dial Backup Setup
609
WAN Setup
609
Figure 364 MAC Address Cloning in WAN Setup
609
Dial Backup
610
Configuring Dial Backup in Menu 2
610
Table 215 MAC Address Cloning in WAN Setup
610
Advanced WAN Setup
611
Figure 365 Menu 2: Dial Backup Setup
611
Table 216 Menu 2: Dial Backup Setup
611
Figure 366 Menu 2.1: Advanced WAN Setup
612
Table 217 Advanced WAN Port Setup: at Commands Fields
612
Remote Node Profile (Backup ISP)
613
Figure 367 Menu 11.3: Remote Node Profile (Backup ISP)
613
Table 218 Advanced WAN Port Setup: Call Control Parameters
613
Table 219 Menu 11.3: Remote Node Profile (Backup ISP)
614
Editing TCP/IP Options
615
Figure 368 Menu 11.3.2: Remote Node Network Layer Options
615
Table 220 Menu 11.3.2: Remote Node Network Layer Options
615
Editing Login Script
616
Figure 369 Menu 11.3.3: Remote Node Script
617
Remote Node Filter
618
Figure 370 Menu 11.3.4: Remote Node Filter
618
Table 221 Menu 11.3.3: Remote Node Script
618
Modem Setup
619
Figure 371 3G Modem Setup in WAN Setup (Zywall 5)
619
Table 222 3G Modem Setup in WAN Setup (Zywall 5)
619
Remote Node Profile (3G WAN)
620
Figure 372 Menu 11.2: Remote Node Profile (3G WAN)
620
Table 223 Menu 11.2: Remote Node Profile (3G WAN)
620
Chapter 36 LAN Setup
623
Introduction to LAN Setup
623
Accessing the LAN Menus
623
LAN Port Filter Setup
623
Figure 373 Menu 3: LAN Setup
623
TCP/IP and DHCP Ethernet Setup Menu
624
Figure 374 Menu 3.1: LAN Port Filter Setup
624
Figure 375 Menu 3: TCP/IP and DHCP Setup
624
Figure 376 Menu 3.2: TCP/IP and DHCP Ethernet Setup
625
Table 224 Menu 3.2: DHCP Ethernet Setup Fields
625
Table 225 Menu 3.2: LAN TCP/IP Setup Fields
625
Figure 377 Menu 3.2.1: IP Alias Setup
626
IP Alias Setup
626
Table 226 Menu 3.2.1: IP Alias Setup
627
Chapter 37 Internet Access
629
Introduction to Internet Access Setup
629
Ethernet Encapsulation
629
Figure 378 Menu 4: Internet Access Setup (Ethernet)
630
Table 227 Menu 4: Internet Access Setup (Ethernet)
630
Configuring the PPTP Client
631
Configuring the Pppoe Client
632
Figure 379 Internet Access Setup (PPTP)
632
Table 228 New Fields in Menu 4 (PPTP) Screen
632
Basic Setup Complete
633
Figure 380 Internet Access Setup (Pppoe)
633
Table 229 New Fields in Menu 4 (Pppoe) Screen
633
Chapter 38 DMZ Setup
635
Configuring DMZ Setup
635
DMZ Port Filter Setup
635
Figure 381 Menu 5: DMZ Setup
635
Figure 382 Menu 5.1: DMZ Port Filter Setup
635
TCP/IP Setup
636
IP Address
636
Figure 383 Menu 5: DMZ Setup
636
Figure 384 Menu 5.2: TCP/IP and DHCP Ethernet Setup
636
IP Alias Setup
637
Figure 385 Menu 5.2.1: IP Alias Setup
637
Chapter 39 Route Setup
639
Configuring Route Setup
639
Route Assessment
639
Figure 386 Menu 6: Route Setup
639
Figure 387 Menu 6.1: Route Assessment
639
Traffic Redirect
640
Figure 388 Menu 6.2: Traffic Redirect
640
Table 230 Menu 6.1: Route Assessment
640
Table 231 Menu 6.2: Traffic Redirect
640
Route Failover
641
Figure 389 Menu 6.3: Route Failover
641
Table 232 Menu 6.3: Route Failover
641
Chapter 40 Wireless Setup
643
Wireless LAN Setup
643
Figure 390 Menu 7.1: Wireless Setup
643
Table 233 Menu 7.1: Wireless Setup
644
Figure 391 Menu 7.1.1: WLAN MAC Address Filter
645
MAC Address Filter Setup
645
TCP/IP Setup
646
IP Address
646
Figure 392 Menu 7: WLAN Setup
646
Table 234 Menu 7.1.1: WLAN MAC Address Filter
646
IP Alias Setup
647
Figure 393 Menu 7.2: TCP/IP and DHCP Ethernet Setup
647
Figure 394 Menu 7.2.1: IP Alias Setup
648
Chapter 41 Remote Node Setup
649
Introduction to Remote Node Setup
649
Figure 395 Menu 11: Remote Node Setup
649
Remote Node Profile Setup
650
Ethernet Encapsulation
650
Figure 396 Menu 11.1: Remote Node Profile for Ethernet Encapsulation
650
Table 235 Menu 11.1: Remote Node Profile for Ethernet Encapsulation
650
Pppoe Encapsulation
651
Figure 397 Menu 11.1: Remote Node Profile for Pppoe Encapsulation
652
PPTP Encapsulation
653
Table 236 Fields in Menu 11.1 (Pppoe Encapsulation Specific)
653
Edit IP
654
Figure 398 Menu 11.1: Remote Node Profile for PPTP Encapsulation
654
Table 237 Menu 11.1: Remote Node Profile for PPTP Encapsulation
654
Figure 399 Menu 11.1.2: Remote Node Network Layer Options for Ethernet Encapsulation
655
Table 238 Remote Node Network Layer Options Menu Fields
655
Remote Node Filter
656
Figure 400 Menu 11.1.4: Remote Node Filter (Ethernet Encapsulation)
657
Figure 401 Menu 11.1.4: Remote Node Filter (Pppoe or PPTP Encapsulation)
657
IP Static Route Setup
659
Chapter 42 IP Static Route Setup
659
Figure 402 Menu 12: IP Static Route Setup
660
Figure 403 Menu 12. 1: Edit IP Static Route
660
Table 239 Menu 12. 1: Edit IP Static Route
660
Chapter 43
663
Network Address Translation (NAT)
663
Using NAT
663
SUA (Single User Account) Versus NAT
663
Applying NAT
663
Figure 404 Menu 4: Applying NAT for Internet Access
664
Figure 405 Menu 11.1.2: Applying NAT to the Remote Node
664
NAT Setup
665
Figure 406 Menu 15: NAT Setup
665
Table 240 Applying NAT in Menus 4 & 11.1.2
665
Address Mapping Sets
666
Figure 407 Menu 15.1: Address Mapping Sets
666
Figure 408 Menu 15.1.255: SUA Address Mapping Rules
666
Table 241 SUA Address Mapping Rules
667
Figure 409 Menu 15.1.1: First Set
668
Table 242 Fields in Menu 15.1.1
669
Figure 410 Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set
670
Table 243 Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set
670
Configuring a Server Behind NAT
671
Figure 411 Menu 15.2: NAT Server Sets
671
Figure 412 Menu 15.2.X: NAT Server Sets
671
Figure 413 15.2.X.X: NAT Server Configuration
672
Table 244 15.2.X.X: NAT Server Configuration
672
General NAT Examples
673
Internet Access Only
673
Figure 414 Menu 15.2.1: NAT Server Setup
673
Figure 415 Server Behind NAT Example
673
Figure 416 NAT Example 1
674
Figure 417 Menu 4: Internet Access & NAT Example
674
Example 2: Internet Access with a Default Server
675
Example 3: Multiple Public IP Addresses with Inside Servers
675
Figure 418 NAT Example 2
675
Figure 419 Menu 15.2.1: Specifying an Inside Server
675
Figure 420 NAT Example 3
676
Figure 421 Example 3: Menu 11.1.2
677
Figure 422 Example 3: Menu 15.1.1.1
677
Figure 423 Example 3: Final Menu 15.1.1
678
Figure 424 Example 3: Menu 15.2.1
678
Example 4: NAT Unfriendly Application Programs
679
Figure 425 NAT Example 4
679
Figure 426 Example 4: Menu 15.1.1.1: Address Mapping Rule
679
Trigger Port Forwarding
680
Two Points to Remember about Trigger Ports
680
Figure 427 Example 4: Menu 15.1.1: Address Mapping Rules
680
Figure 428 Menu 15.3.1: Trigger Port Setup
681
Table 245 Menu 15.3.1: Trigger Port Setup
681
Chapter 44 Introducing the Zywall Firewall
683
Using Zywall SMT Menus
683
Activating the Firewall
683
Figure 429 Menu 21: Filter and Firewall Setup
683
Figure 430 Menu 21.2: Firewall Setup
684
Chapter 45 Filter Configuration
685
Introduction to Filters
685
Figure 431 Outgoing Packet Filtering Process
685
The Filter Structure of the Zywall
686
Figure 432 Filter Rule Process
687
Configuring a Filter Set
688
Figure 433 Menu 21: Filter and Firewall Setup
688
Figure 434 Menu 21.1: Filter Set Configuration
688
Configuring a Filter Rule
689
Table 246 Abbreviations Used in the Filter Rules Summary Menu
689
Table 247 Rule Abbreviations Used
689
Configuring a TCP/IP Filter Rule
690
Figure 435 Menu 21.1.1.1: TCP/IP Filter Rule
690
Table 248 Menu 21.1.1.1: TCP/IP Filter Rule
690
Configuring a Generic Filter Rule
692
Figure 436 Executing an IP Filter
692
Figure 437 Menu 21.1.1.1: Generic Filter Rule
693
Table 249 Generic Filter Rule Menu Fields
693
Example Filter
694
Figure 438 Telnet Filter Example
694
Figure 439 Example Filter: Menu 21.1.3.1
695
Figure 440 Example Filter Rules Summary: Menu 21.1.3
695
Filter Types and NAT
696
Firewall Versus Filters
696
Packet Filtering
696
Figure 441 Protocol and Device Filter Sets
696
Firewall
697
Applying a Filter
697
Applying LAN Filters
698
Applying DMZ Filters
698
Figure 442 Filtering LAN Traffic
698
Figure 443 Filtering DMZ Traffic
698
Applying Remote Node Filters
699
Figure 444 Filtering Remote Node Traffic
699
Chapter 46 SNMP Configuration
701
Figure 445 Menu 22: SNMP Configuration
701
Table 250 SNMP Configuration Menu Fields
701
SNMP Traps
702
Table 251 SNMP Traps
702
Chapter 47
703
System Information & Diagnosis
703
Introduction to System Status
703
System Status
703
Figure 446 Menu 24: System Maintenance
703
Figure 447 Menu 24.1: System Maintenance: Status
704
Table 252 System Maintenance: Status Menu Fields
704
System Information and Console Port Speed
705
System Information
705
Figure 448 Menu 24.2: System Information and Console Port Speed
705
Console Port Speed
706
Figure 449 Menu 24.2.1: System Maintenance: Information
706
Table 253 Fields in System Maintenance: Information
706
Log and Trace
707
Viewing Error Log
707
Figure 450 Menu 24.2.2: System Maintenance: Change Console Port Speed
707
Figure 451 Menu 24.3: System Maintenance: Log and Trace
707
Syslog Logging
708
Figure 452 Examples of Error and Information Messages
708
Figure 453 Menu 24.3.2: System Maintenance: Syslog Logging
708
Table 254 System Maintenance Menu Syslog Parameters
708
Call-Triggering Packet
711
Diagnostic
712
Figure 454 Call-Triggering Packet Example
712
Figure 455 Menu 24.4: System Maintenance: Diagnostic (Zywall 5)
713
Figure 456 WAN & LAN DHCP
713
Wan Dhcp
713
Table 255 System Maintenance Menu Diagnostic
714
Chapter 48 Firmware and Configuration File Maintenance
715
Introduction
715
Filename Conventions
715
Backup Configuration
716
Table 256 Filename Conventions
716
Example of FTP Commands from the Command Line
717
Figure 457 Telnet into Menu 24.5
717
Figure 458 FTP Session Example
717
Using the FTP Command from the Command Line
717
Backup Configuration Using TFTP
718
File Maintenance over WAN
718
GUI-Based FTP Clients
718
Table 257 General Commands for GUI-Based FTP Clients
718
Backup Via Console Port
719
GUI-Based TFTP Clients
719
Table 258 General Commands for GUI-Based TFTP Clients
719
TFTP Command Example
719
Restore Configuration
720
Figure 459 System Maintenance: Backup Configuration
720
Figure 460 System Maintenance: Starting Xmodem Download Screen
720
Figure 461 Backup Configuration Example
720
Figure 462 Successful Backup Confirmation Screen
720
Figure 463 Telnet into Menu 24.6
721
Restore Using FTP
721
Figure 464 Restore Using FTP Session Example
722
Figure 465 System Maintenance: Restore Configuration
722
Figure 466 System Maintenance: Starting Xmodem Download Screen
722
Figure 467 Restore Configuration Example
722
Restore Using FTP Session Example
722
Restore Via Console Port
722
Uploading Firmware and Configuration Files
723
Firmware File Upload
723
Figure 468 Successful Restoration Confirmation Screen
723
Configuration File Upload
724
Figure 469 Telnet into Menu 24.7.1: Upload System Firmware
724
Figure 470 Telnet into Menu 24.7.2: System Maintenance
724
FTP File Upload Command from the DOS Prompt Example
725
FTP Session Example of Firmware File Upload
725
TFTP File Upload
725
Figure 471 FTP Session Example of Firmware File Upload
725
TFTP Upload Command Example
726
Uploading Via Console Port
726
Uploading Firmware File Via Console Port
726
Example Xmodem Firmware Upload Using Hyperterminal
727
Uploading Configuration File Via Console Port
727
Figure 472 Menu 24.7.1 as Seen Using the Console Port
727
Figure 473 Example Xmodem Upload
727
Example Xmodem Configuration Upload Using Hyperterminal
728
Figure 474 Menu 24.7.2 as Seen Using the Console Port
728
Figure 475 Example Xmodem Upload
728
Chapter 49 System Maintenance Menus 8 to 10
729
Command Interpreter Mode
729
Figure 476 Command Mode in Menu 24
729
Call Control Support
730
Budget Management
730
Figure 477 Call Control
730
Figure 478 Budget Management
730
Call History
731
Figure 479 Call History
731
Table 259 Budget Management
731
Table 260 Call History
731
Time and Date Setting
732
Figure 480 Menu 24: System Maintenance
732
Figure 481 Menu 24.10 System Maintenance: Time and Date Setting
733
Table 261 Menu 24.10 System Maintenance: Time and Date Setting
733
Chapter 50 Remote Management
735
Figure 482 Menu 24.11 - Remote Management Control
736
Table 262 Menu 24.11 - Remote Management Control
736
Remote Management Limitations
737
IP Policy Routing
739
Chapter 51 IP Policy Routing
739
IP Routing Policy Summary
739
Figure 483 Menu 25: Sample IP Routing Policy Summary
739
Table 263 Menu 25: Sample IP Routing Policy Summary
739
IP Routing Policy Setup
740
Table 264 IP Routing Policy Setup
740
Figure 484 Menu 25.1: IP Routing Policy Setup
741
Table 265 Menu 25.1: IP Routing Policy Setup
741
Applying Policy to Packets
742
IP Policy Routing Example
743
Figure 485 Menu 25.1.1: IP Routing Policy Setup
743
Table 266 Menu 25.1.1: IP Routing Policy Setup
743
Figure 486 Example of IP Policy Routing
744
Figure 487 IP Routing Policy Example 1
744
Figure 488 IP Routing Policy Example 2
745
Chapter 52 Call Scheduling
747
Introduction to Call Scheduling
747
Figure 489 Schedule Setup
747
Figure 490 Schedule Set Setup
748
Table 267 Schedule Set Setup
748
Figure 491 Applying Schedule Set(S) to a Remote Node (Pppoe)
749
Figure 492 Applying Schedule Set(S) to a Remote Node (PPTP)
750
Chapter 53 Troubleshooting
751
Power, Hardware Connections, and Leds
751
Zywall Access and Login
752
Internet Access
754
Wireless Router/Ap Troubleshooting
755
Upnp
756
Chapter 54 Product Specifications
757
Table 268 Hardware Specifications
757
Table 269 Firmware Specifications
758
Table 270 Feature and Performance Specifications
759
Table 271 Compatible Zyxel WLAN Cards and Security Features
760
Card, WLAN Card and Zywall Turbo Card Installation
761
Compatible 3G Cards
761
Table 272 3G Features Supported by Compatible 3G Cards
761
Figure 493 WLAN Card Installation
762
Power Adaptor Specifications
762
Table 273 North American Plug Standards
762
Table 274 European Plug Standards
763
Table 275 United Kingdom Plug Standards
763
Table 276 Australia and New Zealand Plug Standards
763
Table 277 Japan Plug Standards
763
Table 278 China Plug Standards
763
Figure 494 Console/Dial Backup Port Pin Layout
764
Table 279 Console/Dial Backup Port Pin Assignments
764
Table 280 Ethernet Cable Pin Assignments
764
Part VII: Appendices and Index
765
Appendices and Index
765
Appendix A Hardware Installation
767
Desktop Installation
767
Figure 495 Attaching Rubber Feet
768
Figure 496 Attaching Mounting Brackets and Screws
769
Figure 497 Rack Mounting
769
Appendix B Pop-Up Windows, Javascripts and Java Permissions
771
Figure 498 Pop-Up Blocker
771
Figure 499 Internet Options: Privacy
772
Figure 500 Internet Options: Privacy
773
Figure 501 Pop-Up Blocker Settings
773
Figure 502 Internet Options: Security
774
Figure 503 Security Settings - Java Scripting
775
Figure 504 Security Settings - Java
775
Figure 505 Java (Sun)
776
Figure 506 Mozilla Firefox: Tools > Options
777
Figure 507 Mozilla Firefox Content Security
777
Appendix C Removing and Installing a Fuse
779
Appendix D Setting up Your Computer's IP Address
781
Figure 508 Windows 95/98/Me: Network: Configuration
782
Figure 509 Windows 95/98/Me: TCP/IP Properties: IP Address
783
Figure 510 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
784
Figure 511 Windows XP: Start Menu
785
Figure 512 Windows XP: Control Panel
785
Figure 513 Windows XP: Control Panel: Network Connections: Properties
786
Figure 514 Windows XP: Local Area Connection Properties
786
Figure 515 Windows XP: Internet Protocol (TCP/IP) Properties
787
Figure 516 Windows XP: Advanced TCP/IP Properties
788
Figure 517 Windows XP: Internet Protocol (TCP/IP) Properties
789
Figure 518 Windows Vista: Start Menu
790
Figure 519 Windows Vista: Control Panel
790
Figure 520 Windows Vista: Network and Internet
790
Figure 521 Windows Vista: Network and Sharing Center
790
Figure 522 Windows Vista: Network and Sharing Center
791
Figure 523 Windows Vista: Local Area Connection Properties
791
Figure 524 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
792
Figure 525 Windows Vista: Advanced TCP/IP Properties
793
Figure 526 Windows Vista: Internet Protocol Version 4 (Tcp/Ipv4) Properties
794
Figure 527 Macintosh os 8/9: Apple Menu
795
Figure 528 Macintosh os 8/9: TCP/IP
795
Figure 529 Macintosh os X: Apple Menu
796
Figure 530 Macintosh os X: Network
797
Figure 531 Red hat 9.0: KDE: Network Configuration: Devices
798
Figure 532 Red hat 9.0: KDE: Ethernet Device: General
798
Figure 533 Red hat 9.0: KDE: Network Configuration: DNS
799
Figure 534 Red hat 9.0: KDE: Network Configuration: Activate
799
Figure 535 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
800
Figure 536 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
800
Figure 537 Red hat 9.0: DNS Settings in Resolv.conf
800
Figure 538 Red hat 9.0: Restart Ethernet Card
800
Figure 539 Red hat 9.0: Checking TCP/IP Properties
801
Appendix E IP Addresses and Subnetting
803
Figure 540 Network Number and Host ID
804
Table 281 IP Address Network Number and Host ID Example
804
Table 282 Subnet Masks
805
Table 283 Maximum Host Numbers
805
Table 284 Alternative Subnet Mask Notation
805
Figure 541 Subnetting Example: before Subnetting
806
Figure 542 Subnetting Example: after Subnetting
807
Table 285 Subnet 1
807
Table 286 Subnet 2
808
Table 287 Subnet 3
808
Table 288 Subnet 4
808
Table 289 Eight Subnets
808
Table 290 24-Bit Network Number Subnet Planning
809
Table 291 16-Bit Network Number Subnet Planning
809
Configuring Ip Addresses
810
Figure 543 Conflicting Computer IP Addresses Example
811
Figure 544 Conflicting Computer IP Addresses Example
811
Figure 545 Conflicting Computer and Router IP Addresses Example
812
Appendix F Common Services
813
Table 292 Commonly Used Services
813
Appendix G Wireless Lans
817
Figure 546 Peer-To-Peer Communication in an Ad-Hoc Network
817
Figure 547 Basic Service Set
818
Figure 548 Infrastructure WLAN
819
Figure 549 RTS/CTS
820
Table 293 IEEE 802.11G
821
Table 294 Wireless Security Levels
822
Table 295 Comparison of EAP Authentication Types
825
Figure 550 WPA(2) with RADIUS Application Example
827
Figure 551 WPA(2)-PSK Authentication
828
Table 296 Wireless Security Relational Matrix
828
Appendix H Windows 98 Se/Me Requirements for Anti-Virus Message Display
831
Figure 552 Windows 98 SE: Winpopup
831
Figure 553 Windows 98 SE: Program Task Bar
832
Figure 554 Windows 98 SE: Task Bar Properties
832
Figure 555 Windows 98 SE: Startup
833
Figure 556 Windows 98 SE: Startup: Create Shortcut
833
Figure 557 Windows 98 SE: Startup: Select a Title for the Program
834
Figure 558 Windows 98 SE: Startup: Shortcut
834
Appendix I VPN Setup
835
General Notes
835
Figure 559 VPN Rules
836
Figure 560 Headquarters Gateway Policy Edit
837
Figure 561 Branch Office Gateway Policy Edit
838
Figure 562 Headquarters VPN Rule
839
Figure 563 Branch Office VPN Rule
839
Figure 564 Headquarters Network Policy Edit
840
Figure 565 Branch Office Network Policy Edit
841
Figure 566 VPN Rule Configured
842
Figure 567 VPN Dial
842
Figure 568 VPN Tunnel Established
842
Figure 569 VPN Log Example
844
Figure 570 Ike/Ipsec Debug Example
845
Appendix J Importing Certificates
847
Figure 571 Security Certificate
847
Figure 572 Login Screen
848
Figure 573 Certificate General Information before Import
848
Figure 574 Certificate Import Wizard 1
849
Figure 575 Certificate Import Wizard 2
849
Figure 576 Certificate Import Wizard 3
850
Figure 577 Root Certificate Store
850
Figure 578 Certificate General Information after Import
851
Appendix K Legal Information
853
Appendix L Customer Support
857
Index
863
Advertisement
Advertisement
Related Products
ZyXEL Communications ZYWALL 5 - V4.04
ZyXEL Communications Omni 56K II
ZyXEL Communications Omni 56K II, 56K Plus II
ZyXEL Communications ZyXEL ZyWALL 5
ZyXEL Communications OMNI 56K COM PLUS
ZyXEL Communications OMNI 56K USB MODEM
ZyXEL Communications ZyXEL ZyWALL 50
ZyXEL Communications 5 Series
ZyXEL Communications OMNI 56K USB Plus
ZyXEL Communications ZyWALL USG FLEX 50W
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL