background image

Prestige 652H/HW Series User’s Guide 

VPN Screens 

 

16-13 

Table 16-7 VPN IKE 

LABEL DESCRIPTION 

IP Address Start   When the 

Remote Address Type

 field is configured to 

Single

, enter a (static) IP 

address on the network behind the remote IPSec router. When the 

Remote 

Address Type

 field is configured to 

Range

, enter the beginning (static) IP 

address, in a range of computers on the network behind the remote IPSec router. 
When the 

Remote Address Type

 field is configured to 

Subnet

, enter a (static) IP 

address on the network behind the remote IPSec router.  

End / Subnet Mask  When the 

Remote Address Type

 field is configured to 

Single

, this field is N/A. 

When the 

Remote Address Type

 field is configured to 

Range

, enter the end 

(static) IP address, in a range of computers on the network behind the remote 
IPSec router. When the 

Remote Address Type

 field is configured to 

Subnet

enter a subnet mask on the network behind the remote IPSec router.  

Address Information 

Local ID Type  Select 

IP

 to identify this Prestige by its IP address.  

Select 

DNS

 to identify this Prestige by a domain name. 

Select 

E-mail

 to identify this Prestige by an e-mail address. 

Content  When you select 

IP

 in the 

Local ID Type

 field, type the IP address of your 

computer in the local 

Content 

field. The Prestige automatically uses the IP 

address in the 

My IP Address 

field (refer to the 

My IP Address

 field description) if 

you configure the local 

Content

 field to 

0.0.0.0

 or leave it blank.  

It is recommended that you type an IP address other than 

0.0.0.0

 in the local 

Content

 field or use the 

DNS

 or 

E-mail

 ID type in the following situations. 

 

When there is a NAT router between the two IPSec routers.  

 

When you want the remote IPSec router to be able to distinguish between 
VPN connection requests that come in from IPSec routers with dynamic 
WAN IP addresses.  

When you select 

DNS

 or 

E-mail

 in the 

Local ID Type

 field, type a domain name or 

e-mail address by which to identify this Prestige in the local 

Content 

field. Use up 

to 31 ASCII characters including spaces, although trailing spaces are truncated. 
The domain name or e-mail address is for identification purposes only and can be 
any string. 

Содержание Prestige 652H series

Страница 1: ...Prestige 652H HW Series ADSL Security Wireless LAN Router User s Guide Version 3 40 March 2004 ...

Страница 2: ...d by ZyXEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subj...

Страница 3: ... instructions may cause harmful interference to radio communications If this equipment does cause harmful interference to radio television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures 1 Reorient or relocate the receiving antenna 2 Increase the separation between the equipment...

Страница 4: ...f the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser To obtain the services of this warranty contact ZyXEL s Service Center for your Return Material Authoriz...

Страница 5: ...sales zyxel com 1 714 632 0858 ftp us zyxel com ZyXEL Communications Inc 1130 N Miller St Anaheim CA 92806 2001 U S A support zyxel de 49 2405 6909 0 www zyxel de GERMANY sales zyxel de 49 2405 6909 99 ZyXEL Deutschland GmbH Adenauerstr 20 A2 D 52146 Wuerselen Germany 33 0 4 72 52 97 97 FRANCE info zyxel fr 33 0 4 72 52 19 20 www zyxel fr ZyXEL France 1 rue des Vergers Bat 1 C 69760 Limonest Franc...

Страница 6: ...AIL FAX1 FTP SITE REGULAR MAIL support zyxel se 46 31 744 7700 www zyxel se SWEDEN sales zyxel se 46 31 744 7701 ZyXEL Communications A S Sjöporten 4 41764 Göteborg Sweden support zyxel fi 358 9 4780 8411 www zyxel fi FINLAND sales zyxel fi 358 9 4780 8448 ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland ...

Страница 7: ...w 2 1 2 2 Accessing the Prestige Web Configurator 2 1 2 3 Resetting the Prestige 2 2 2 4 Navigating the Prestige Web Configurator 2 4 Chapter 3 Wizard Setup 3 1 3 1 Wizard Setup Introduction 3 1 3 2 Encapsulation 3 1 3 3 Multiplexing 3 2 3 4 VPI and VCI 3 2 3 5 Wizard Setup Configuration First Screen 3 2 3 6 IP Address and Subnet Mask 3 4 3 7 IP Address Assignment 3 4 3 8 Nailed Up Connection PPP ...

Страница 8: ... 8 Introduction to WPA 7 11 7 9 WPA PSK Application Example 7 12 7 10 WPA with RADIUS Application Example 7 13 7 11 Security Parameters Summary 7 14 7 12 Wireless Client WPA Supplicants 7 15 7 13 Configuring 802 1x and WPA 7 15 7 14 Configuring Local User Authentication 7 22 7 15 Configuring RADIUS 7 24 7 16 Configuring Roaming 7 25 Chapter 8 WAN Setup 8 1 8 1 WAN Overview 8 1 8 2 Metric 8 1 8 3 P...

Страница 9: ... 1 12 3 Introduction to ZyXEL s Firewall 12 2 12 4 Denial of Service 12 3 12 5 Stateful Inspection 12 7 12 6 Guidelines For Enhancing Security With Your Firewall 12 11 12 7 Packet Filtering Vs Firewall 12 12 Chapter 13 Firewall Screens 13 1 13 1 Access Methods 13 1 13 2 Firewall Policies Overview 13 1 13 3 Rule Logic Overview 13 2 13 4 Connection Direction Examples 13 4 13 5 Configuring Firewall 1...

Страница 10: ...16 15 Viewing SA Monitor 16 26 16 16 Configuring Global Setting 16 28 16 17 Telecommuter VPN IPSec Examples 16 29 16 18 VPN and Remote Management 16 32 Remote Management UPnP and Logs VI Chapter 17 Remote Management Configuration 17 1 17 1 Remote Management Overview 17 1 17 2 Telnet 17 2 17 3 FTP 17 3 17 4 Web 17 3 17 5 Configuring Remote Management 17 3 Chapter 18 Universal Plug and Play UPnP 18 ...

Страница 11: ...7 21 5 Diagnostic Screens 21 9 21 6 Firmware Screen 21 11 21 7 Configuration Screen 21 13 SMT General Configuration IX Chapter 22 Introducing the SMT 22 1 22 1 SMT Introduction 22 1 22 2 Navigating the SMT Interface 22 4 22 3 Changing the System Password 22 6 Chapter 23 Menu 1 General Setup 23 1 23 1 General Setup 23 1 23 2 Procedure To Configure Menu 1 23 1 Chapter 24 Menu 2 WAN Backup Setup 24 1...

Страница 12: ... 28 DMZ Setup 28 1 28 1 Configuring DMZ Setup 28 1 28 2 DMZ Port Filter Setup 28 1 28 3 TCP IP Setup 28 2 Chapter 29 Remote Node Configuration 29 1 29 1 Remote Node Setup Overview 29 1 29 2 Remote Node Setup 29 1 29 3 Remote Node Network Layer Options 29 6 29 4 Remote Node Filter 29 8 29 5 Editing ATM Layer Options 29 9 Chapter 30 Static Route Setup 30 1 30 1 IP Static Route Overview 30 1 30 2 Con...

Страница 13: ...ser Accounts on the Prestige 36 6 Chapter 37 System Information and Diagnosis 37 1 37 1 System Status 37 1 37 2 System Information 37 3 37 3 Log and Trace 37 5 37 4 Diagnostic 37 8 Chapter 38 Firmware and Configuration File Maintenance 38 1 38 1 Filename Conventions 38 1 38 2 Backup Configuration 38 2 38 3 Restore Configuration 38 7 38 4 Uploading Firmware and Configuration Files 38 10 Chapter 39 ...

Страница 14: ...g SA Monitor 44 1 Chapter 45 Internal SPTGEN 45 1 45 1 Internal SPTGEN Overview 45 1 45 2 The Configuration Text File Format 45 1 45 3 Internal SPTGEN FTP Download Example 45 3 45 4 Internal SPTGEN FTP Upload Example 45 4 Appendices and Index XII Appendix A Troubleshooting A 1 Appendix B IP Subnetting B 1 Appendix C Wireless LAN and IEEE 802 11 C 1 Appendix D PPPoE D 1 Appendix E Virtual Circuit T...

Страница 15: ...izard Screen 4 3 14 Figure 4 1 Password 4 1 Figure 5 1 LAN and WAN IP Addresses 5 1 Figure 5 2 LAN 5 4 Figure 6 1 DMZ 6 8 Figure 7 1 RTS CTS 7 2 Figure 7 2 Prestige Wireless Security Levels 7 3 Figure 7 3 Wireless 7 5 Figure 7 4 MAC Address Filter 7 8 Figure 7 5 EAP Authentication 7 11 Figure 7 6 WPA PSK Authentication 7 13 Figure 7 7 WPA with RADIUS Application Example 7 14 Figure 7 8 Wireless LA...

Страница 16: ...AN Traffic 13 5 Figure 13 3 Default Policy 13 6 Figure 13 4 Rule Summary 13 8 Figure 13 5 Insert Append A Firewall Rule 13 11 Figure 13 6 Add Edit A Custom Port 13 14 Figure 13 7 Rule Summary 13 15 Figure 13 8 Rule Edit Example 13 16 Figure 13 9 Edit Custom Port Example 13 17 Figure 13 10 My Service Rule Configuration 13 18 Figure 13 11 My Service Example Rule Summary 13 19 Figure 13 12 Anti Probi...

Страница 17: ...agnostic General 21 9 Figure 21 7 Diagnostic DSL Line 21 10 Figure 21 8 Firmware Upgrade 21 12 Figure 21 9 Network Temporarily Disconnected 21 12 Figure 21 10 Error Message 21 13 Figure 21 11 Backup Configuration 21 14 Figure 21 12 Restore Configuration 21 14 Figure 21 13 Configuration Upload Successful 21 15 Figure 21 14 Network Temporarily Disconnected 21 15 Figure 21 15 Configuration Upload Err...

Страница 18: ...nu 4 Internet Access Setup 27 5 Figure 28 1 Menu 5 DMZ Setup 28 1 Figure 28 2 Menu 5 1 DMZ Port Filter Setup 28 1 Figure 28 3 Menu 5 DMZ Setup 28 2 Figure 28 4 Menu 5 2 TCP IP Setup 28 2 Figure 29 1 Menu 11 Remote Node Setup 29 2 Figure 29 2 Menu 11 1 Remote Node Profile 29 3 Figure 29 3 Menu 11 3 Remote Node Network Layer Options 29 6 Figure 29 4 Sample IP Addresses for a TCP IP LAN to LAN Connec...

Страница 19: ...32 20 Example 4 Menu 15 1 1 1 Address Mapping Rule 32 18 Figure 32 21 Example 4 Menu 15 1 1 Address Mapping Rules 32 18 Figure 33 1 Menu 21 2 Firewall Setup 33 2 Figure 34 1 Outgoing Packet Filtering Process 34 2 Figure 34 2 Filter Rule Process 34 3 Figure 34 3 Menu 21 Filter Set Configuration 34 4 Figure 34 4 NetBIOS_WAN Filter Rules Summary 34 5 Figure 34 5 NetBIOS_LAN Filter Rules Summary 34 5 ...

Страница 20: ...7 Figure 38 6 Successful Backup Confirmation Screen 38 7 Figure 38 7 Telnet into Menu 24 6 38 8 Figure 38 8 Restore Using FTP Session Example 38 9 Figure 38 9 System Maintenance Restore Configuration 38 9 Figure 38 10 System Maintenance Starting Xmodem Download Screen 38 9 Figure 38 11 Restore Configuration Example 38 10 Figure 38 12 Successful Restoration Confirmation Screen 38 10 Figure 38 13 Te...

Страница 21: ...edule Set Setup 42 2 Figure 42 3 Applying Schedule Set s to a Remote Node PPPoE 42 4 Figure 43 1 VPN SMT Menu Tree 43 1 Figure 43 2 Menu 27 VPN IPSec Setup 43 2 Figure 43 3 Menu 27 1 IPSec Summary 43 2 Figure 43 4 Menu 27 1 1 IPSec Setup 43 6 Figure 43 5 Menu 27 1 1 1 IKE Setup 43 11 Figure 43 6 Menu 27 1 1 2 Manual Setup 43 14 Figure 44 1 Menu 27 2 SA Monitor 44 1 Figure 45 1 Configuration Text F...

Страница 22: ...r 802 1x Protocol 7 17 Table 7 6 Wireless LAN 802 1x WPA for WPA Protocol 7 19 Table 7 7 Wireless LAN 802 1x WPA for WPA PSK Protocol 7 21 Table 7 8 Local User Database 7 24 Table 7 9 RADIUS 7 25 Table 7 10 Roaming 7 28 Table 8 1 WAN Setup 8 5 Table 8 2 WAN Backup 8 10 Table 8 3 Advanced WAN Backup 8 13 Table 8 4 Advanced Modem Setup 8 17 Table 9 1 NAT Definitions 9 1 Table 9 2 NAT Mapping Types 9...

Страница 23: ...0 SA Monitor 16 28 Table 16 11 Global Setting 16 29 Table 16 12 Telecommuters Sharing One VPN Rule Example 16 30 Table 16 13 Telecommuters Using Unique VPN Rules Example 16 31 Table 17 1 Remote Management 17 3 Table 18 1 Configuring UPnP 18 2 Table 19 1 Log Settings 19 3 Table 19 2 View Logs 19 5 Table 19 3 SMTP Error Messages 19 5 Table 20 1 Application based Bandwidth Management Example 20 2 Tab...

Страница 24: ...ble 24 1 Menu 2 WAN Backup Setup 24 2 Table 24 2 Menu 2 1Traffic Redirect Setup 24 4 Table 24 3 Menu 2 2 Dial Backup Setup 24 5 Table 24 4 Menu 2 2 1 Advanced Dial Backup Setup AT Commands Fields 24 6 Table 24 5 Menu 2 2 1 Advanced Dial Backup Setup Call Control Parameters 24 7 Table 24 6 Menu 11 1 Remote Node Profile Backup ISP 24 8 Table 24 7 Menu 11 3 Remote Node Network Layer Options 24 11 Tab...

Страница 25: ... 1 Menu 24 1 System Maintenance Status 37 2 Table 37 2 Menu 24 2 1 System Maintenance Information 37 4 Table 37 3 Menu 24 3 2 System Maintenance Syslog and Accounting 37 7 Table 37 4 Menu 24 4 System Maintenance Menu Diagnostic 37 8 Table 38 1 Filename Conventions 38 2 Table 38 2 General Commands for GUI based FTP Clients 38 4 Table 38 3 General Commands for GUI based TFTP Clients 38 6 Table 39 1 ...

Страница 26: ...sses B 1 Chart B 2 Allowed IP Address Range By Class B 2 Chart B 3 Natural Masks B 2 Chart B 4 Alternative Subnet Mask Notation B 3 Chart B 5 Subnet 1 B 4 Chart B 6 Subnet 2 B 4 Chart B 7 Subnet 1 B 5 Chart B 8 Subnet 2 B 5 Chart B 9 Subnet 3 B 5 Chart B 10 Subnet 4 B 6 Chart B 11 Eight Subnets B 6 Chart B 12 Class C Subnet Planning B 7 Chart B 13 Class B Subnet Planning B 7 Chart K 1 System Maint...

Страница 27: ...s applications The web configurator parts of this guide contain background information on features configurable by web configurator The SMT parts of this guide contain background information solely on features not configurable by web configurator Use the web configurator System Management Terminal SMT or command interpreter interface to configure your Prestige Not all features can be configured th...

Страница 28: ...w Roman font Predefined field choices are in Bold Arial font Command and arrow keys are enclosed in square brackets ENTER means the Enter or carriage return key ESC means the Escape key and SPACE BAR means the Space Bar Mouse action sequences are denoted using a comma For example click the Apple icon Control Panels and then Modem means first click the Apple icon then point your mouse pointer to Co...

Страница 29: ...ey Prestige Computer Notebook computer Server Modem Firewall Telephone Switch Router DSLAM Wireless Access Point Wireless Signal The following section offers some background information on DSL Skip to Chapter 1 if you wish to begin working with your router right away ...

Страница 30: ...pstream capacity Asymmetrical services ADSL are suitable for Internet users because more information is usually downloaded than uploaded For example a simple button click in a web browser can start an extended download that includes graphics and text As data rates increase the carrying distance decreases That means that users who are beyond a certain distance from the telephone company s central o...

Страница 31: ... I Getting Started This part is structured as a step by step guide to help you access your Prestige It covers key features and applications accessing the web configurator and configuring the wizard screens for initial setup ...

Страница 32: ......

Страница 33: ...e coverage area The web browser based Graphical User Interface provides easy management 1 2 Features of the Prestige Your Prestige is packed with a number of features that give it the flexibility to provide a complete networking solution for almost any user High Speed Internet Access Your Prestige ADSL router can support downstream transmission rates of up to 8Mbps and upstream transmission rates ...

Страница 34: ...o the local area network without any wiring efforts and enjoy reliable high speed connectivity 802 11b Data Rate Mbps Modulation 1 DBPSK Differential Binary Phase Shift Keyed 2 DQPSK Differential Quadrature Phase Shift Keying 5 5 11 CCK Complementary Code Keying The Prestige may be prone to RF Radio Frequency interference from other 2 4 GHz devices such as microwave ovens wireless phones Bluetooth...

Страница 35: ...etwork PPPoE Support RFC2516 PPPoE Point to Point Protocol over Ethernet emulates a dial up connection It allows your ISP to use their existing network configuration with newer broadband technologies such as ADSL The PPPoE driver on the Prestige is transparent to the computers on the LAN which see only Ethernet and are not aware of PPPoE thus saving you from having to manage PPPoE clients on indiv...

Страница 36: ... Internet You must register for this service with a Dynamic DNS service provider Multiple PVC Permanent Virtual Circuits Support Your Prestige supports up to 8 PVC s ADSL Transmission Rate Standards Full Rate ANSI T1 413 Issue 2 G dmt G 992 1 with line rate support of up to 8 Mbps downstream and 832 Kbps upstream G lite G 992 2 with line rate support of up to 1 5Mbps downstream and 512Kbps upstrea...

Страница 37: ...raditionally routing is based on the destination address only and the router takes the shortest path to forward a packet IP Policy Routing IPPR provides a mechanism to override the default routing behavior and alter the packet forwarding based on the policy defined by the network administrator PPP Point to Point Protocol link layer protocol Transparent bridging for unsupported network layer protoc...

Страница 38: ... back AIS and RDI OAM cells Other PPPoE Features PPPoE idle time out PPPoE Dial on Demand Diagnostics Capabilities The Prestige can perform self diagnostic tests These tests check the integrity of the following circuitry FLASH memory ADSL circuitry RAM LAN port Packet Filters The Prestige s packet filtering functions allows added network security and management Ease of Installation Your Prestige i...

Страница 39: ...ion for the Prestige 652H HW you can insert an optional wireless PCMICA card into the Prestige and allow wireless clients access to your network resources A typical Internet access application is shown below Figure 1 1 Prestige Internet Access Application Internet Single User Account For a SOHO Small Office Home Office environment your Prestige offers the Single User Account SUA feature that allow...

Страница 40: ...l Application 1 3 3 VPN Application The Prestige s VPN feature makes it an ideal cost effective way to connect branch offices and business partners over the Internet without the need and expense for leased lines between sites VPN ensures the privacy and integrity of your data transmissions ...

Страница 41: ... To Know Your Prestige 1 9 Figure 1 3 VPN Application 1 3 4 LAN to LAN Application You can use the Prestige to connect two geographically dispersed networks over the ADSL line A typical LAN to LAN application for your Prestige is shown as follows ...

Страница 42: ...Prestige 652H HW Series User s Guide 1 10 Getting To Know Your Prestige Figure 1 4 Prestige LAN to LAN Application ...

Страница 43: ...ter or Netscape Navigator 7 0 and later versions with JavaScript enabled It is recommended that you set your screen resolution to 1024 by 768 pixels 2 2 Accessing the Prestige Web Configurator Step 1 Make sure your Prestige hardware is properly connected refer to the Compact Guide Step 2 Prepare your computer computer network to connect to the Prestige refer to the Compact Guide Step 3 Launch your...

Страница 44: ... and flow control set to none The password will be reset to 1234 also 2 3 1 Using The Reset Button Step 1 Make sure the SYS LED is on not blinking Step 2 Press the RESET button for ten seconds and then release it When the SYS LED begins to blink the defaults have been restored and the Prestige restarts 2 3 2 Uploading a Configuration File Via Console Port Download the default configuration file fr...

Страница 45: ...ng the Web Configurator 2 3 Figure 2 2 Example Xmodem Upload Step 5 After successful firmware upload enter atgo to restart the router Type the configuration file s location or click Browse to search for it Choose the Xmodem protocol Then click Send ...

Страница 46: ...ns to configure your Prestige for the first time Click a link under Advanced Setup to configure advanced Prestige features Click a link under Maintenance to see Prestige performance statistics upload firmware and back up restore or upload a configuration file Click Site Map to go to the Site Map screen Click Logout in the navigation panel when you have finished a Prestige management session Figure...

Страница 47: ...estige RADIUS Configure this screen to use an external server to authenticate wireless and or VPN users Roaming Use this screen to enable roaming on your Prestige WAN WAN Setup Use this screen to change the Prestige s WAN remote node settings WAN Backup Use this screen to configure your traffic redirect properties and WAN backup settings NAT SUA Only Use this screen to configure servers behind the...

Страница 48: ... manage the Prestige UPnP Use this screen to enable UPnP on the Prestige Logs Log Settings Use this screen to change your Prestige s log settings View Log Use this screen to view the logs for the categories that you selected BW Manager Summary Use this screen to enable bandwidth management on an interface Class Setup Use this screen to set up the bandwidth classes Monitor Use this screen to view t...

Страница 49: ... FUNCTION DSL Line These screens display information to help you identify problems with the DSL line Firmware Use this screen to upload firmware to your Prestige Configuration Use this screen to backup and restore the configuration or reset the factory defaults to your Prestige LOGOUT Click this label to exit the web configurator ...

Страница 50: ......

Страница 51: ...uted Ethernet frames into bridged ATM cells ENET ENCAP requires that you specify a gateway IP address in the ENET ENCAP Gateway field in the second wizard screen You can get this information from your ISP 3 2 2 PPP over Ethernet PPPoE provides access control and billing functionality in a manner similar to dial up services using PPP The Prestige bridges a PPP session over Ethernet PPP over Etherne...

Страница 52: ...e VC1 carries IP etc VC based multiplexing may be dominant in environments where dynamic creation of large numbers of ATM VCs is fast and economical 3 3 2 LLC based Multiplexing In this case one VC carries multiple protocols with protocol identifying information being contained in each packet header Despite the extra bandwidth and processing overhead this method may be advantageous if it is not pr...

Страница 53: ...ox Choices vary depending on what you select in the Mode field If you select Bridge in the Mode field select either PPPoA or RFC 1483 If you select Routing in the Mode field select PPPoA RFC 1483 ENET ENCAP or PPPoE Multiplex Select the multiplexing method used by your ISP from the Multiplex drop down list box either VC based or LLC based Virtual Circuit ID VPI Virtual Path Identifier and VCI Virt...

Страница 54: ... Assigned Number Authority IANA reserved this block of addresses specifically for private use please do not use any other number unless you are told otherwise Let s say you select 192 168 1 0 as the network number which covers 254 individual addresses from 192 168 1 1 to 192 168 1 254 zero and 255 are reserved In other words the first three numbers specify the network number while the last number ...

Страница 55: ...te IP Addresses Every machine on the Internet must have a unique address If your networks are isolated from the Internet for example only between your two branch offices you can assign any IP addresses to the hosts without problems However the Internet Assigned Numbers Authority IANA has reserved the following three blocks of IP addresses specifically for private networks 10 0 0 0 10 255 255 255 1...

Страница 56: ...us reasons Do not specify a nailed up connection unless your telephone company offers flat rate service or you need a constant connection and the cost is of no concern 3 9 NAT NAT Network Address Translation NAT RFC 1631 is the translation of the IP address of a host in a packet for example the source address of an outgoing packet used within one network to a different IP address known within anot...

Страница 57: ...ect Obtain an IP Address Automatically if you have a dynamic IP address otherwise select Static IP Address and type your ISP assigned IP address in the IP Address text box below Connection Select Connect on Demand when you don t want the connection up all the time and specify an idle time out in seconds in the Max Idle Timeout field The default setting selects Connection on Demand with 0 as the id...

Страница 58: ...RFC 1483 LABEL DESCRIPTION IP Address This field is available if you select Routing in the Mode field Type your ISP assigned IP address in this field Network Address Translation Select None SUA Only or Full Feature from the drop sown list box Refer to the NAT chapter for more details Back Click Back to go back to the first wizard screen Next Click Next to continue to the next wizard screen ...

Страница 59: ...a dynamic or static IP address Select Obtain an IP Address Automatically if you have a dynamic IP address otherwise select Static IP Address and type your ISP assigned IP address in the IP Address text box below Subnet Mask Enter a subnet mask in dotted decimal notation Refer to the IP Subnetting appendix to calculate a subnet mask If you are implementing subnetting ENET ENCAP Gateway You must spe...

Страница 60: ... Back Click Back to go back to the first wizard screen Next Click Next to continue to the next wizard screen Figure 3 5 Internet Connection with PPPoA The following table describes the fields in this screen Table 3 5 Internet Connection with PPPoA LABEL DESCRIPTION User Name Enter the login name that your ISP gives you ...

Страница 61: ...ction on Demand with 0 as the idle time out which means the Internet session will not timeout Select Nailed Up Connection when you want your connection up all the time The Prestige will try to bring up the connection automatically if it is disconnected The schedule rule s in SMT menu 26 has priority over your Connection settings Network Address Translation This option is available if you select Ro...

Страница 62: ...of 192 168 1 1 for other server machines for example server for mail FTP telnet web etc that you may have 3 12 Wizard Setup Configuration Third Screen Step 1 Verify the settings in the screen shown next To change the LAN information on the Prestige click Change LAN Configurations Otherwise click Save Settings to save the configuration and skip to the section 3 13 Figure 3 6 Wizard Screen 3 Step 2 ...

Страница 63: ... 168 1 1 factory default If you changed the Prestige s LAN IP address you must use the new IP address if you want to access the web configurator again LAN Subnet Mask Enter a subnet mask in dotted decimal notation DHCP DHCP Server From the DHCP Server drop down list box select On to allow your Prestige to assign IP addresses an IP default gateway and DNS servers to computer systems that support th...

Страница 64: ...rs The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask Secondary DNS Server As above Back Click Back to go back to the previous screen Finish Click Finish to save the settings and proceed to the next wizard screen 3 13 Wizard Setup Configuration Connection Tests The Prestige automatically tests the connection to the computer s connected to the LAN ports To ...

Страница 65: ...igate to www zyxel com Internet access is just the beginning Refer to the rest of this User s Guide for more detailed information on the complete range of Prestige features If you cannot access the Internet open the web configurator again to confirm that the Internet settings you configured in the Wizard Setup are correct ...

Страница 66: ......

Страница 67: ...Password LAN DMZ Wireless LAN and WAN II Part II Password LAN DMZ Wireless LAN and WAN This part covers the password LAN Local Area Network DMZ wireless LAN and WAN setup ...

Страница 68: ......

Страница 69: ...rd for accessing the Prestige 4 2 Configuring Password To change your Prestige s password recommended click Password The screen appears as shown Figure 4 1 Password The following table describes the fields in this screen Table 4 1 Password LABEL DESCRIPTION Old Password Type the default password or the existing password you use to access the system in this field New Password Type the new password ...

Страница 70: ...e 4 2 Password Setup Table 4 1 Password LABEL DESCRIPTION Retype to Confirm Type the new password again in this field Apply Click Apply to save your changes back to the Prestige Cancel Click Cancel to begin configuring this screen afresh ...

Страница 71: ...d the Prestige The actual physical connection determines whether the Prestige ports are LAN or WAN ports There are two separate IP networks one inside the LAN network and the other outside the WAN network as shown next Figure 5 1 LAN and WAN IP Addresses 5 2 DNS Server Address DNS Domain Name System is for mapping a domain name to its corresponding IP address and vice versa The DNS server is extre...

Страница 72: ...n leave the DNS servers out of the DHCP setup under all circumstances If your ISP gives you explicit DNS servers make sure that you enter their IP addresses in the LAN Setup screen This way the Prestige can pass the DNS servers to the computers and the computers can query the DNS server directly without the Prestige s intervention 5 3 DNS Server Address Assignment Use DNS Domain Name System to map...

Страница 73: ...2B uses subnet broadcasting while RIP 2M uses multicasting 5 4 4 Multicast Traditionally IP packets are transmitted in one of either two ways Unicast 1 sender 1 recipient or Broadcast 1 sender everybody on the network Multicast delivers IP packets to a group of hosts on the network not everybody and not just 1 IGMP Internet Group Multicast Protocol is a network layer protocol used to establish mem...

Страница 74: ... IP addresses an IP default gateway and DNS servers to Windows 95 Windows NT and other systems that support the DHCP client If set to None the DHCP server will be disabled If set to Relay the Prestige acts as a surrogate DHCP server and relays DHCP requests and responses between the remote server and the clients Enter the IP address of the actual remote DHCP server in the Remote DHCP Server field ...

Страница 75: ...hen enter the IP address of the actual remote DHCP server here TCP IP IP Address Enter the IP address of your Prestige in dotted decimal notation for example 192 168 1 1 factory default IP Subnet Mask Type the subnet mask assigned to you by your ISP if given RIP Direction Select the RIP direction from None Both In Only and Out Only RIP Version Select the RIP version from RIP 1 RIP 2B and RIP 2M Mu...

Страница 76: ......

Страница 77: ...et users can have access to host servers on the DMZ but no access to the LAN unless special filter rules allowing access were configured by the administrator or the user is an authorized remote user It is highly recommended that you connect all of your public servers to the DMZ port If you have more than one public server connect a hub to the DMZ port It is also highly recommended that you keep al...

Страница 78: ... your Prestige s DMZ port in dotted decimal notation Make sure the IP address is on a separate subnet from the LAN port IP Subnet Mask The subnet mask specifies the network number portion of an IP address Your Prestige will automatically calculate the subnet mask based on the IP address that you assign Unless you are implementing subnetting use the subnet mask computed by the Prestige 255 255 255 ...

Страница 79: ...eive the RIP packets However if one router uses multicasting then all routers on your network must use multicasting also By default RIP direction is set to Both and the Version set to RIP 1 Multicast Select IGMP V 1 or IGMP V 2 or None IGMP Internet Group Multicast Protocol is a network layer protocol used to establish membership in a Multicast group it is not used to carry user data IGMP version ...

Страница 80: ......

Страница 81: ...al network RADIUS server for remote user authentication and accounting 7 1 2 Channel A channel is the radio frequency ies used by IEEE 802 11b wireless devices Channels available depend on your geographical area You may have a choice of channels for your region so you should use a different channel than an adjacent AP access point to reduce interference Interference occurs when radio signals from ...

Страница 82: ... can send before an RTS Request To Send CTS Clear to Send handshake is invoked When a data frame exceeds the RTS CTS value you set between 0 to 2432 bytes the station that wants to transmit this frame must first send an RTS Request To Send message to the AP for permission to send it The AP then responds with a CTS Clear to Send message to all other stations within its range to notify them to defer...

Страница 83: ... RTS CTS value see previously you set then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size 7 2 Levels of Security Wireless security is vital to your network to protect wireless communication between wireless stations access points and the wired network The figure below shows the possible wireless security levels ...

Страница 84: ...eless LAN and Wireless to the display the Wireless screen 7 4 Inserting a PCMCIA Wireless LAN Card Use a ZyAIR series wireless LAN PCMCIA card to add optional wireless LAN capabilities Step 1 Turn off the Prestige Never insert or remove a wireless LAN card when the Prestige is turned on Step 2 Locate the slot labeled Wireless LAN on the Prestige Step 3 With its pin connector facing the slot and th...

Страница 85: ... enable the wireless LAN you should configure some security by setting MAC filters and or 802 1x security otherwise your wireless LAN will be vulnerable upon enabling it Select the check box to enable the wireless LAN ESSID The ESSID Extended Service Set Identification is a unique name to identify the Prestige in the wireless LAN Wireless stations associating to the Prestige must have the same ESS...

Страница 86: ...entation Threshold The threshold number of bytes for the fragmentation boundary for directed messages It is the maximum data fragment size that can be sent Enter a value between 256 and 2432 WEP Encryption WEP Wired Equivalent Privacy encrypts data frames before transmitting over the wireless network Select Disable to allow all wireless computers to communicate with the access points without any d...

Страница 87: ...Allow Association or exclude up to 32 devices from accessing the Prestige Deny Association Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters for example 00 A0 C5 00 00 02 You need to know the MAC address of the devices to configure this screen To change your Prestige s MAC filter settin...

Страница 88: ...Prestige 652H HW Series User s Guide 7 8 Wireless LAN Setup Figure 7 4 MAC Address Filter The following table describes the fields in this menu ...

Страница 89: ...cel Click Cancel to begin configuring this screen afresh 7 7 Network Authentication You can set the Prestige and your network to authenticate a wireless station before the wireless station can communicate with the Prestige and the wired network to which the Prestige is connected 7 7 1 EAP EAP is an authentication protocol designed originally to run over PPP Point to Point Protocol frame in order t...

Страница 90: ...roper response from the user and then sends another Access Request message The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting Accounting Request Sent by the access point requesting accounting Accounting Response Sent by the RADIUS server to indicate that it has started or stopped accounting In order to ensure network security the...

Страница 91: ...on and improved data encryption 7 8 1 User Authentication WPA applies IEEE 802 1x and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database You can t use the Prestige s Local User Database for WPA authentication purposes since the Local User Database uses EAP MD5 which cannot be used to generate keys See later in this chapter and the appendices f...

Страница 92: ...y data packet and by creating an integrity checking mechanism MIC TKIP makes it much more difficult to decode data on a Wi Fi network than WEP making it difficult for an intruder to break into the network The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials The common p...

Страница 93: ... distribution system Step 1 The AP passes the wireless client s authentication request to the RADIUS server Step 2 The RADIUS server then checks the user s identification against its database and grants or denies network access accordingly Step 3 The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to ...

Страница 94: ...what other security parameters you should configure for each Authentication Method key management protocol type You enter manual keys by first selecting 64 bit WEP or 128 bit WEP from the WEP Encryption field and then typing the keys in ASCII or hexadecimal format in the key text boxes MAC address filters are not dependent on how you configure these security features ...

Страница 95: ...ng system instructing the wireless client how to use WPA At the time of writing the most widely available supplicants are the WPA patch for Windows XP Funk Software s Odyssey client and Meetinghouse Data Communications AEGIS client The Windows XP patch is a free download that adds WPA capability to Windows XP s built in Zero Configuration wireless client However you must run Windows XP to use it 7...

Страница 96: ...uired allows all wireless stations access to the wired network without entering usernames and passwords This is the default setting Authentication Required means that all wireless stations have to enter usernames and passwords before access to the wired network is allowed Select Authentication Required to configure Key Management Protocol and other related fields Back Click Back to go to the main ...

Страница 97: ...ons have to reenter usernames and passwords in order to stay connected This field is activated only when you select Authentication Required in the Wireless Port Control field Enter a time interval between 10 and 9999 seconds The default time interval is 1800 seconds 30 minutes If wireless station authentication is done using a RADIUS server the reauthentication timer on the RADIUS server has prior...

Страница 98: ... station Before you specify the priority make sure you have set up the corresponding database correctly first Select Local User Database Only to have the Prestige just check the built in user database on the Prestige for a wireless station s username and password Select RADIUS Only to have the Prestige just check the user database on the specified RADIUS server for a wireless station s username an...

Страница 99: ...ion Authentication Required WPA Select Authentication Required in the Wireless Port Control field and WPA in the Key Management Protocol field to display the next screen Figure 7 10 Wireless LAN 802 1x WPA for WPA Protocol The following table describes the labels not previously discussed Table 7 6 Wireless LAN 802 1x WPA for WPA Protocol LABEL DESCRIPTION Key Management Protocol Choose WPA in this...

Страница 100: ...ly encrypted by TKIP when WPA or WPA PSK Key Management Protocol is selected WPA Group Key Update Timer The WPA Group Key Update Timer is the rate at which the AP if using WPA PSK key management or RADIUS server if using WPA key management sends a new group key out to all clients The re keying process is the WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN ...

Страница 101: ...sed for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials Type a pre shared key from 8 to 63 case sensitive ASCII characters including spaces and symbols WPA Mixed Mode The Prestige can operate in WPA Mixed Mode which supports both clients running WPA and clients running dynamic WEP key exchange with ...

Страница 102: ...A Mixed Mode All unicast traffic is automatically encrypted by TKIP when WPA or WPA PSK Key Management Protocol is selected Authentication Databases This field is only visible when WPA Mixed Mode is enabled 7 14 Configuring Local User Authentication By storing user profiles locally your Prestige is able to authenticate wireless users without interacting with a network RADIUS server However there i...

Страница 103: ...Prestige 652H HW Series User s Guide Wireless LAN Setup 7 23 Figure 7 12 Local User Database The following table describes the fields in this screen ...

Страница 104: ... 31 characters long for this user profile Back Click Back to go to the main wireless LAN setup screen Apply Click Apply to save these settings back to the Prestige Cancel Click Cancel to begin configuring this screen again 7 15 Configuring RADIUS Once you enable the EAP authentication you need to specify the external sever for remote user authentication and accounting To set up your Prestige s RAD...

Страница 105: ... Active Select Yes from the drop down list box to enable user authentication through an external accounting server Server IP Address Enter the IP address of the external accounting server in dotted decimal notation Port Number The default port of the RADIUS server for accounting is 1813 You need not change this value unless your network administrator instructs you to do so with additional informat...

Страница 106: ...t scans and uses the channel of a new access point which then informs the access points on the LAN about the change The new information is then propagated to the other access points on the LAN An example is shown in Figure 7 14 With roaming a wireless LAN mobile user enjoys a continuous connection to the wired network through an access point while moving around the wireless LAN Enable roaming to e...

Страница 107: ...nts must be met in order for wireless stations to roam between the coverage areas 1 All the access points must be on the same subnet and configured with the same ESSID 2 If IEEE 802 1x user authentication is enabled and to be done locally on the access point the new access point must have the user profile for the wireless station 3 The adjacent access points should use different radio channels whe...

Страница 108: ...et and the wireless stations must have the same ESSID to allow roaming Port Enter the port number to communicate roaming information between access points The port number must be the same on all access points Make sure this port is not used by other services Back Click Back to go to the main wireless LAN setup screen Apply Click Apply to save these settings back to the Prestige Cancel Click Cancel...

Страница 109: ...edirect route see section 8 6 3 WAN backup route also called dial backup see section 8 6 For example if the normal route has a metric of 1 and the traffic redirect route has a metric of 2 and dial backup route has a metric of 3 then the normal route acts as the primary default route If the normal route fails to connect to the Internet the Prestige tries the traffic redirect route next In the same ...

Страница 110: ... Traffic Shaping is an agreement between the carrier and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network This agreement helps eliminate congestion which is important for transmission of real time data such as audio and video connections Peak Cell Rate PCR is the maximum rate at which the sender can send cells This parameter may be lower but not...

Страница 111: ...H HW Series User s Guide WAN Setup 8 3 Figure 8 1 Example of Traffic Shaping 8 5 Configuring WAN Setup To change your Prestige s WAN remote node settings click WAN WAN Setup The screen differs by the encapsulation ...

Страница 112: ...Prestige 652H HW Series User s Guide 8 4 WAN Setup Figure 8 2 WAN Setup The following table describes the fields in this screen ...

Страница 113: ...cuit Refer to the appendix for more information VPI The valid range for the VPI is 0 to 255 Enter the VPI assigned to you VCI The valid range for the VCI is 32 to 65535 0 to 31 is reserved for local management of ATM traffic Enter the VCI assigned to you ATM QoS Type Select CBR Continuous Bit Rate to specify fixed always on bandwidth for voice or data traffic Select UBR Unspecified Bit Rate for ap...

Страница 114: ...h time you connect to the Internet The Single User Account feature can be used with either a dynamic or static IP address Select Obtain an IP Address Automatically if you have a dynamic IP address otherwise select Static IP Address and type your ISP assigned IP address in the IP Address field below Connection PPPoA and PPPoE encapsulation only The schedule rule s in SMT menu 26 have priority over ...

Страница 115: ...d decimal notation Refer to the Subnetting appendix on how to calculate a subnet mask If you are implementing subnetting ENET ENCAP Gateway ENET ENCAP encapsulation only You must specify a gateway IP address supplied by your ISP when you select ENET ENCAP in the Encapsulation field Back Click Back to return to the previous screen Apply Click Apply to save the changes Cancel Click Cancel to begin c...

Страница 116: ...r three logical networks with the Prestige itself as the gateway for each LAN network Put the protected LAN in one subnet Subnet 1 in the following figure and the backup gateway in another subnet Subnet 2 Configure filters that allow packets from the protected LAN Subnet 1 to the backup gateway Subnet 2 Figure 8 4 Traffic Redirect LAN Setup 8 8 Configuring WAN Backup To change your Prestige s WAN ...

Страница 117: ...Prestige 652H HW Series User s Guide WAN Setup 8 9 Figure 8 5 WAN Backup The following table describes the fields in this screen ...

Страница 118: ...gher priority connection Type the number of seconds 30 recommended for the Prestige to wait between checks Allow more time if your destination IP address handles lots of traffic Timeout Type the number of seconds 3 recommended for your Prestige to wait for a ping response from one of the IP addresses in the Check WAN IP Address fields before timing out the request The WAN connection is considered ...

Страница 119: ... external device Available speeds are 9600 19200 38400 57600 115200 or 230400 bps User Name Type the login name assigned by your ISP Password Type the password assigned by your ISP Pri Phone Type the first primary phone number from the ISP for this remote node Some areas require dialing the pound sign before the phone number for local calls Include a symbol at the beginning of the phone numbers as...

Страница 120: ...Prestige 652H HW Series User s Guide 8 12 WAN Setup Figure 8 6 Advanced WAN Backup ...

Страница 121: ...s require dialing the pound sign before the phone number for local calls Include a symbol at the beginning of the phone numbers as required Dial Backup Port Speed Use the drop down list box to select the speed of the connection between the dial backup port and the external device Available speeds are 9600 19200 38400 57600 115200 or 230400 bps AT Command Initial String Type the AT command string t...

Страница 122: ... 2 format the difference being that RIP 2B uses subnet broadcasting while RIP 2M uses multicasting Multicasting can reduce the load on non router machines since they generally do not listen to the RIP multicast address and so will not receive the RIP packets However if one router uses multicasting then all routers on your network must use multicasting also RIP Direction RIP Routing Information Pro...

Страница 123: ...ackup connection can be used during the time configured in the Period field Set an amount that is less than the time period configured in the Period field If you set the Allocated Budget to 0 you will not be able to use the dial backup connection Period Type the time period in hours for how often the budget should be reset For example to allow calls to this remote node for a maximum of 10 minutes ...

Страница 124: ...onse strings tell the Prestige the tags or labels immediately preceding the various call parameters sent from the WAN device The response strings have not been standardized please consult the documentation of your WAN device to find the correct tags 8 13 Configuring Advanced Modem Setup To configure settings for your backup WAN modem click WAN WAN Backup and then the Advanced Setup button The Adva...

Страница 125: ...l Type the AT Command string to make a call Example atdt Drop Type the AT Command string to drop a call represents a one second wait for example ath can be used if your modem has a slow response time Answer Type the AT Command string to answer a call Example ata Drop DTR When Hang Up Select this check box to have the Prestige drop the DTR Data Terminal Ready signal after the AT Command String Drop...

Страница 126: ...mber of times for the Prestige to retry a busy or no answer phone number before blacklisting the number Example 0 Retry Interval Type a number of seconds for the Prestige to wait before trying another call after a call has failed This applies before a phone number is blacklisted Example 10 Drop Timeout Type the number of seconds for the Prestige to wait before dropping the DTR signal if it does no...

Страница 127: ...NAT Dynamic DNS and Time and Date III Part III NAT Dynamic DNS and Time and Date This part covers NAT Network Address Translation dynamic DNS Domain Name Sever and Time and Date setup ...

Страница 128: ......

Страница 129: ... local address refers to the IP address of a host when the packet is in the local network while the global address refers to the IP address of the host when the same packet is traveling in the WAN side Note that inside outside refers to the location of a host while global local refers to the IP address of a host used in a packet Thus an inside local address ILA is the IP address of an inside host ...

Страница 130: ... not define any servers for Many to One and Many to Many Overload mapping see Table 9 2 NAT offers the additional benefit of firewall protection With no servers defined your Prestige filters out all incoming inquiries thus preventing intruders from probing your network For more information on IP address translation refer to RFC 1631 The IP Network Address Translator NAT 9 1 3 How NAT Works Each pa...

Страница 131: ...Figure 9 2 NAT Application With IP Alias 9 1 5 NAT Mapping Types NAT supports five types of IP port mapping They are 1 One to One In One to One mode the Prestige maps one local IP address to one global IP address 2 Many to One In Many to One mode the Prestige maps multiple local IP addresses to one global IP address This is equivalent to SUA for instance PAT port address translation ZyXEL s Single...

Страница 132: ...ead Port numbers do not change for One to One and Many to Many No Overload NAT mapping types The following table summarizes these types Table 9 2 NAT Mapping Types TYPE IP MAPPING SMT ABBREVIATION One to One ILA1ÅÆ IGA1 1 1 Many to One SUA PAT ILA1ÅÆ IGA1 ILA2ÅÆ IGA1 M 1 Many to Many Overload ILA1ÅÆ IGA1 ILA2ÅÆ IGA2 ILA3ÅÆ IGA1 ILA4ÅÆ IGA2 M M Ov Many to Many No Overload ILA1ÅÆ IGA1 ILA2ÅÆ IGA2 IL...

Страница 133: ... better to specify a range of port numbers You can allocate a server IP address that corresponds to a port or a range of ports Many residential broadband ISP accounts do not allow you to run any server processes such as a Web or FTP server from your location Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location If you are unsu...

Страница 134: ...Point to Point Tunneling Protocol 1723 9 3 2 Configuring Servers Behind SUA Example Let s say you want to assign ports 21 25 to one FTP Telnet and SMTP server A in the example port 80 to another B in the example and assign a default server IP address of 192 168 1 35 to a third C in the example You assign the LAN IP addresses and the ISP assigns the WAN IP address The NAT network appears as a singl...

Страница 135: ...e LABEL DESCRIPTION None Select this radio button to disable NAT SUA Only Select this radio button if you have just one public WAN IP address for your Prestige The Prestige uses Address Mapping Set 1 in the NAT Edit SUA NAT Server Set screen Edit Details Click this link to go to the NAT Edit SUA NAT Server Set screen Full Feature Select this radio button if you have multiple public WAN IP addresse...

Страница 136: ...ige discards all packets received for ports that are not specified here or in the remote management setup Click NAT select SUA Only and click Edit Details to open the following screen Refer to Table 9 3 for port numbers commonly used for particular services Figure 9 5 Edit SUA NAT Server Set The following table describes the fields in this screen ...

Страница 137: ... Save to save your changes back to the Prestige Cancel Click Cancel to return to the previous configuration 9 6 Configuring Address Mapping Ordering your rules is important because the Prestige applies the rules in the order that you specify When a rule matches the current packet the Prestige takes the corresponding action and the remaining rules are ignored If there are any empty rules before you...

Страница 138: ...al IP Address ILA If your rule is for all local IP addresses then enter 0 0 0 0 as the Local Start IP address and 255 255 255 255 as the Local End IP address This field is N A for One to one and Server mapping types Global Start IP This is the starting Inside Global IP Address IGA Enter 0 0 0 0 here if you have a dynamic IP address from your ISP You can only do this for Many to One and Server mapp...

Страница 139: ...rted only M M Ov Overload Many to Many Overload mode maps multiple local IP addresses to shared global IP addresses MM No No Overload Many to Many No Overload mode maps each local IP address to unique global IP addresses Server This type allows you to specify inside servers of different services behind the NAT to be accessible to the outside world Back Click Back to return to the NAT Mode screen 9...

Страница 140: ...al Start IP This is the starting local IP address ILA Local IP addresses are N A for Server port mapping Local End IP This is the end local IP address ILA If your rule is for all local IP addresses then enter 0 0 0 0 as the Local Start IP address and 255 255 255 255 as the Local End IP address This field is N A for One to One and Server mapping types Global Start IP This is the starting global IP ...

Страница 141: ...ends or relatives will always be able to call you even if they don t know your IP address First of all you need to have registered a dynamic DNS account with www dyndns org This is for people with a dynamic IP from their ISP or DHCP server that would still like to have a domain name The Dynamic DNS service provider will give you a password or key 10 1 1 DYNDNS Wildcard Enabling the wildcard featur...

Страница 142: ... This is the name of your Dynamic DNS service provider Host Names Type the domain name assigned to your Prestige by your Dynamic DNS provider E mail Address Type your e mail address User Type your user name Password Type the password assigned to you Enable Wildcard Select the check box to enable DYNDNS Wildcard Apply Click Apply to save your changes back to the Prestige Cancel Click Cancel to begi...

Страница 143: ...ble on all models Use this screen to configure the Prestige s time and date settings 11 1 Configuring Time and Date To change your Prestige s time and date click Time And Date The screen appears as shown Use this screen to configure the Prestige s time based on your local time zone Figure 11 1 Time and Date ...

Страница 144: ...the time zone of your location This will set the time difference between your time zone and Greenwich Mean Time GMT Daylight Savings Select this option if you use daylight savings time Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening Start Date Enter the month and day tha...

Страница 145: ...and then click Apply Time Current Time This field displays the time of your Prestige Each time you reload this page the Prestige synchronizes the time with the time server New Time This field displays the last updated time from the time server When you select None in the Use Protocol when Bootup field enter the new time in this field and then click Apply Apply Click Apply to save your changes back...

Страница 146: ......

Страница 147: ...ers IV Part IV Firewalls and Content Filters This part introduces firewalls in general and the Prestige firewall It also explains customized services and logs and gives example firewall rules and an overview of content filtering ...

Страница 148: ......

Страница 149: ...irewall to guard effectively you must design and deploy it appropriately This requires integrating the firewall into a broad information security policy In addition specific policies must be implemented within the firewall itself 12 2 Types of Firewalls There are three main types of firewalls 1 Packet Filtering Firewalls 2 Application level Firewalls 3 Stateful Inspection Firewalls 12 2 1 Packet F...

Страница 150: ...caching that some proxies support See section 12 5 for more information on Stateful Inspection Firewalls of one type or another have become an integral part of standard security solutions for enterprises 12 3 Introduction to ZyXEL s Firewall The Prestige firewall is a stateful inspection firewall and is designed to protect against Denial of Service attacks when activated in SMT menu 21 2 or in the...

Страница 151: ... perform specific functions An extension number called the TCP port or UDP port identifies these protocols such as HTTP Web FTP File Transfer Protocol POP3 E mail etc For example Web traffic by default uses TCP port 80 When computers communicate on the Internet they are using the client server model where the server listens on a specific TCP UDP port for information requests from remote client com...

Страница 152: ...ket is then sent to an unsuspecting system Systems may crash hang or reboot 1 b Teardrop attack exploits weaknesses in the re assembly of IP packet fragments As data is transmitted through a network IP packets are often broken up into smaller chunks Each fragment looks like the original IP packet except that it contains an offset field that says for instance This fragment is carrying bytes 200 thr...

Страница 153: ...YN Attack floods a targeted system with a series of SYN packets Each packet causes the targeted system to issue a SYN ACK response While the targeted system waits for the ACK that follows the SYN ACK it queues up all outstanding SYN ACK responses on what is known as a backlog queue SYN ACKs are moved off the queue only when an ACK comes back or when an internal timer which is set at relatively lon...

Страница 154: ...oadcast the ICMP echo request packet to all hosts on the network If there are numerous hosts this will create a large amount of ICMP echo request and response traffic If a hacker chooses to spoof the source IP address of the ICMP echo request packet the resulting ICMP traffic will not only clog up the intermediary network but will also congest the network of the spoofed source IP address known as ...

Страница 155: ...oming from within the trusted network To engage in IP spoofing a hacker must modify the packet headers so that it appears that the packets originate from a trusted host and should be allowed through the router or firewall The Prestige blocks all IP Spoofing attempts 12 5 Stateful Inspection With stateful inspection fields of the packets are compared to packets that are already known to be trusted ...

Страница 156: ...l rule inspection 1 The packet travels from the firewall s LAN to the WAN 2 The packet is evaluated against the interface s existing outbound access list and the packet is permitted a denied packet would simply be dropped at this point 3 The firewall inspects packets to determine and record information about the state of the packet s connection This information is recorded in a new state table ent...

Страница 157: ...s temporary inbound access list entries are deleted 12 5 2 Stateful Inspection and the Prestige Additional rules may be defined to extend or override the default rules For example a rule may be created which will i Block all traffic of a certain type such as IRC Internet Relay Chat from the LAN to the Internet ii Allow certain types of traffic from the Internet to specific hosts on the LAN iii All...

Страница 158: ... sequence numbers However at the very minimum they contain an IP address pair source and destination UDP also contains port pairs and ICMP has type and code information All of this data can be analyzed in order to build virtual connections in the cache For instance any UDP packet that originates on the LAN will create a cache entry Its IP address and port pairs will be stored For a short period of...

Страница 159: ...y local service such as SNMP or NTP that you don t use Any enabled service could present a potential security risk A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network 5 For local services that are enabled protect against misuse Protect by configuring the services to communicate only with specific peers and protect by configur...

Страница 160: ... such as or 8 Upgrade your software regularly Many older versions of software especially web browsers have well known security deficiencies When you upgrade to the latest versions you get the latest patches and fixes 9 If you use chat rooms or IRC sessions be careful with any information you reveal to strangers 10 If your system starts exhibiting odd behavior contact your ISP Some hackers will set...

Страница 161: ...ket masquerading as a response to a nonexistent outbound request can be blocked The firewall uses session filtering i e smart rules that enhance the filtering process and control the network session rather than control individual packets in a session The firewall provides e mail service to notify you of routine reports and when alerts occur When To Use The Firewall 1 To prevent DoS attacks and pre...

Страница 162: ......

Страница 163: ... Firewall rules are grouped based on the direction of travel of packets to which they apply LAN to LAN Router WAN to LAN DMZ to LAN LAN to WAN WAN to WAN Router DMZ to WAN LAN to DMZ WAN to DMZ DMZ to DMZ Router By default the Prestige s stateful packet inspection allows packets traveling in the following directions LAN to LAN Router This allows computers on the LAN to manage the Prestige and comm...

Страница 164: ...from specific hosts on the Internet to specific hosts on the LAN Allow everyone except your competitors to access a Web server Restrict use of certain protocols such as Telnet to authorized users on the LAN These custom rules work by comparing the Source IP address Destination IP address and IP protocol type of network traffic to rules set by the administrator Your customized rules take precedence...

Страница 165: ...more effective 3 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability For example if FTP ports TCP 20 21 are allowed from the Internet to the LAN Internet users may be able to connect to computers with running FTP servers 4 Does this rule conflict with any existing rules Once these questions have been answered adding rules is simply a matter of plug...

Страница 166: ... associated interface LAN WAN or DMZ respectively LAN to LAN Router means policies for LAN to Prestige the policies for managing the Prestige through the LAN interface and policies for LAN to LAN the policies that control routing between two subnets on the LAN Similarly WAN to WAN Router and DMZ to DMZ Router polices apply in the same way to the WAN and DMZ ports 13 4 1 LAN to WAN Rules The defaul...

Страница 167: ... wish to allow certain WAN users to have access to your LAN you will need to create custom rules to allow it See the following figure Figure 13 2 WAN to LAN Traffic By default NO incoming connections WAN to LAN are allowed unless you create rules allowing certain WAN users services access to your LAN 13 5 Configuring Firewall Click Firewall to open the Default Policy screen Enable or activate the ...

Страница 168: ...CRIPTION Firewall Enabled Select this check box to activate the firewall The Prestige performs access control and protects against Denial of Service DoS attacks when the firewall is activated Allow Asymmetrical Route Select this check box to have the Prestige firewall permit the use of triangle route topology on the network See the appendix for more on triangle route topology ...

Страница 169: ...the drop down list box to select the traffic direction to which you want to apply this firewall rule Default Action Use the radio buttons to select whether to Block silently discard or Forward allow the passage of packets that are traveling in the selected direction Log Select the check box to create a log when the above action is taken for packets that are traveling in the selected direction and ...

Страница 170: ...mory for recording firewall rules it is currently using Packet Direction Use the drop down list box to select a direction of travel of packets LAN to LAN Router LAN to WAN LAN to DMZ WAN to WAN Router WAN to LAN WAN to DMZ DMZ to DMZ Router DMZ to LAN or DMZ to WAN for which you want to configure firewall rules Default Policy This field displays the default action and log policy you selected in th...

Страница 171: ...ist box displays the services to which this firewall rule applies Please note that a blank service type is equivalent to Any See Table 13 5 for more information Action This is the specified action for that rule either Block or Forward Note that Block means the firewall silently discards the packet Schedule This field tells you whether a schedule is specified Yes or not No Log This field shows you ...

Страница 172: ...his screen afresh 13 5 2 Configuring Firewall Rules Follow these directions to create a new rule Step 1 In the Rule Summary screen type the index number for where you want to put the rule For example if you type 6 your new rule becomes number 6 and the previous rule 6 if there is one becomes rule 7 Step 2 Click Insert to display this screen and refer to the following table for information on the l...

Страница 173: ...Prestige 652H HW Series User s Guide Firewall Screens 13 11 Figure 13 5 Insert Append A Firewall Rule ...

Страница 174: ...et Mask Type the subnet mask here if applicable Add Click Add to add a new address to the Source or Destination Address box You can add multiple addresses ranges of addresses and or subnets Edit To edit an existing source or destination address select it from the box and click Edit Delete Highlight an existing source or destination address from the Source or Destination Address box above and click...

Страница 175: ...se logs Alert Send Alert Message to Administrator When Matched Select this check box to have the Prestige generate an alert when the rule is matched Back Click Back to return the Rule Summary screen Apply Click Apply to save your customized settings and exit this screen Cancel Click Cancel to exit this screen without saving Delete Click Delete to remove this rule 13 5 3 Configuring Custom Ports Co...

Страница 176: ... box Port Configuration Type Select Single to specify one port only or Range to specify a span of ports that define your customized service Port Number Enter a single port number or the range of port numbers that define your customized service Back Click Back to return to the Firewall Edit Rule screen Apply Click Apply to save your customized settings and exit this screen Cancel Click Cancel to ex...

Страница 177: ... for where you want to put the rule For example if you type 6 your new rule becomes number 6 and the previous rule 6 if there is one becomes rule 7 Step 3 Click Insert to display the firewall rule configuration screen Step 4 Select Any in the Destination Address box and then click Delete Step 5 Configure the source address screen as follows and click Add Select WAN to LAN from the drop down list b...

Страница 178: ...Prestige 652H HW Series User s Guide 13 16 Firewall Screens Figure 13 8 Rule Edit Example ...

Страница 179: ... follows and click Apply Figure 13 9 Edit Custom Port Example Step 8 The Rule Summary screen displays use the arrows between Available Services and Selected Services to configure it as follows Click Apply when you are done Custom ports show up with an before their names in the Services list box and the Rule Summary list box Click Apply after you ve created your custom port ...

Страница 180: ...e 652H HW Series User s Guide 13 18 Firewall Screens Figure 13 10 My Service Rule Configuration This is the address range of the My Service servers This is your My Service custom port Click Apply when finished ...

Страница 181: ...e Prestige already supports Next to the name of the service two fields appear in brackets The first field indicates the IP protocol type TCP UDP or ICMP The second field indicates the IP port number that defines the service Note that there may be more than one IP protocol type For example look at the default configuration labeled DNS UDP TCP 53 means UDP port 53 and TCP port 53 Custom services may...

Страница 182: ...transfer of files including large files that may not be possible by e mail H 323 TCP 1720 NetMeeting uses this protocol HTTP TCP 80 Hyper Text Transfer Protocol a client server protocol for the world wide web HTTPS TCP 443 HTTPS is a secured http session often used in e commerce ICQ UDP 4000 This is a popular Internet chat program IKE UDP 500 The Internet Key Exchange algorithm is used for key dis...

Страница 183: ...TP_TUNNEL GRE 0 Point to Point Tunneling Protocol enables secure transfer of data over public networks This is the data channel RCMD TCP 512 Remote Command Service REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web REXEC TCP 514 Remote Execution Daemon RLOGIN TCP 513 Remote Login RTELNET TCP 107 Remote Telnet RTSP TCP UDP 554 The Real Time Streaming media contr...

Страница 184: ...ost systems TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP but uses the UDP User Datagram Protocol rather than TCP Transmission Control Protocol VDOLIVE TCP 7000 Another videoconferencing solution 13 8 Anti Probing If an outside user attempts to probe an unsupported port on your Prestige an ICMP response packet is automatically returned This allows ...

Страница 185: ... for unused ports thus leaving the unused ports and the Prestige unseen By default this option is not selected and the Prestige will reply with an ICMP Port Unreachable packet for a port probe on its unused UDP ports and a TCP Reset packet for a port probe on its unused TCP ports Note that the probing packets must first traverse the Prestige s firewall mechanism before reaching this anti probing m...

Страница 186: ... parameters when something is not working and after you have checked the firewall counters These default values should work fine for normal small offices with ADSL bandwidth Factors influencing choices for threshold values are 1 The maximum number of opened sessions 2 The minimum capacity of server backlog in your LAN network 3 The CPU power of servers in your LAN network 4 Network bandwidth 5 Typ...

Страница 187: ...ed in the last one minute sample period TCP Maximum Incomplete and Blocking Time An unusually high number of half open sessions with the same destination host address could indicate that a Denial of Service attack is being launched against the host Whenever the number of half open sessions with the same destination host address rises above a threshold TCP Maximum Incomplete the Prestige starts del...

Страница 188: ...Firewall Threshold LABEL DESCRIPTION DEFAULT VALUES Denial of Service Thresholds One Minute Low This is the rate of new half open sessions that causes the firewall to stop deleting half open sessions The Prestige continues to delete half open sessions as necessary until the rate of new connection attempts drops below this number 80 existing half open sessions ...

Страница 189: ... below this number 80 existing half open sessions Maximum Incomplete High This is the number of existing half open sessions that causes the firewall to start deleting half open sessions When the number of existing half open sessions rises above this number the Prestige deletes half open sessions as required to accommodate new connection requests Do not set Maximum Incomplete High to lower than the...

Страница 190: ...sion when a new connection request comes Deny New Connection Request for Select this radio button and specify for how long the Prestige should block new connection requests when TCP Maximum Incomplete is reached Enter the length of blocking time in minutes between 1 and 256 Back Click Back to return to the Firewall Functions screen Apply Click Apply to save your changes back to the Prestige Cancel...

Страница 191: ... set a schedule for when the Prestige performs content filtering You can also specify trusted IP addresses on the LAN for which the Prestige will not perform content filtering 14 2 Configuring Keyword Blocking Use this screen to block sites containing certain keywords in the URL For example if you enable the keyword bad the Prestige blocks all sites containing this keyword including the URL http w...

Страница 192: ...t this check box to enable this feature Block Websites that contain these keywords in the URL This box contains the list of all the keywords that you have configured the Prestige to block Delete Highlight a keyword in the box and click Delete to remove it Clear All Click Clear All to remove all of the keywords from the list Keyword Type a keyword in this field You may use any character up to 64 ch...

Страница 193: ...will get a message telling you that the content filter is blocking this request Back Click Back to return to the previous screen Apply Click Apply to save your changes back to the Prestige Cancel Click Cancel to return to the previously saved settings 14 3 Configuring the Schedule To set the days and times for the Prestige to perform content filtering click Content Filter and Schedule The screen a...

Страница 194: ...o the previous screen Apply Click Apply to save your changes Cancel Click Cancel to return to the previously saved settings 14 4 Configuring Trusted Computers To exclude a range of users on the LAN from content filtering on your Prestige click CONTENT FILTER and Trusted The screen appears as shown Figure 14 3 Content Filter Trusted The following table describes the fields in this screen Table 14 3...

Страница 195: ...ddress of a specific range of users on your LAN that you want to exclude from content filtering Leave this field blank if you want to exclude an individual computer Back Click Back to return to the previous screen Apply Click Apply to save your changes back to the Prestige Cancel Click Cancel to return to the previously saved settings ...

Страница 196: ......

Страница 197: ...VPN IPSec V Part V VPN IPSec This part provides information about configuring VPN IPSec for secure communications ...

Страница 198: ......

Страница 199: ...tions for secure data communications across a public network like the Internet IPSec is built around a number of standardized cryptographic techniques to provide confidentiality data integrity and authentication at the IP layer 15 1 2 Security Association A Security Association SA is a contract between two parties indicating what security parameters such as keys and algorithms they will use 15 1 3...

Страница 200: ...plications Linking Two or More Private Networks Together Connect branch offices and business partners over the Internet with significant cost savings and improved performance when compared to leased lines between sites Accessing Network Resources When NAT Is Enabled When NAT is enabled remote users are not able to access hosts on the LAN unless the host is designated a public LAN server for that s...

Страница 201: ...ding implementation algorithms The Encryption Algorithm describes the use of encryption techniques such as DES Data Encryption Standard and Triple DES algorithms The Authentication Algorithms HMAC MD5 RFC 2403 and HMAC SHA 1 RFC 2404 provide an authentication mechanism for the AH and ESP protocols Please see section 16 2 for more information 15 2 2 Key Management Key management allows you to deter...

Страница 202: ...ernal systems Tunnel mode is fundamentally an IP tunnel with authentication and encryption This is the most common mode of operation Tunnel mode is required for gateway to gateway and host to gateway communications Tunnel mode communications have two sets of IP headers Outside header The outside IP header contains the destination IP address of the VPN gateway Inside header The inside IP header con...

Страница 203: ... with authentication the packet contents in this case the entire original packet are encrypted The encrypted contents but not the new headers are signed with a hash value appended to the packet Tunnel mode ESP with authentication is compatible with NAT because integrity checks are performed over the combination of the original header plus original payload which is unchanged by a NAT device Transpo...

Страница 204: ......

Страница 205: ...rity authentication sequence integrity replay resistance and non repudiation but not for confidentiality for which the ESP was designed In applications where confidentiality is not required or not sanctioned by government encryption restrictions an AH can be employed to ensure integrity This type of implementation does not protect the information from dissemination but will allow for verification ...

Страница 206: ...or maximum security 16 3 My IP Address My IP Address is the WAN IP address of the Prestige The Prestige has to rebuild the VPN tunnel if the My IP Address changes after setup The following applies if this field is configured as 0 0 0 0 The Prestige uses the current Prestige WAN IP address static or dynamic to set up the VPN tunnel If the WAN connection goes down the Prestige uses the dial backup I...

Страница 207: ...This may be useful for telecommuters initiating a VPN tunnel to the company network See section 16 17 for configuration examples The Secure Gateway IP Address may be configured as 0 0 0 0 only when using IKE key management and not Manual key management 16 5 VPN Summary Screen The following figure helps explain the main fields in the web configurator Figure 16 1 IPSec Summary Fields Local and remot...

Страница 208: ... 16 2 VPN Summary LABEL DESCRIPTION No This is the VPN policy index number Click a number to edit VPN policies Name This field displays the identification name for this VPN policy Active This field displays whether the VPN policy is active or not A Yes signifies that this VPN policy is active No signifies that this VPN policy is not active ...

Страница 209: ...d to Single The beginning and ending static IP addresses in a range of computers are displayed when the Remote Address Type field in the VPN IKE or VPN Manual Key screen is configured to Range A static IP address and a subnet mask are displayed when the Remote Address Type field in the VPN IKE or VPN Manual Key screen is configured to Subnet Encap This field displays Tunnel or Transport mode Tunne...

Страница 210: ...the two IPSec routers because the NAT router changes the header of the IPSec packet In the previous figure IPSec router A sends an IPSec packet in an attempt to initiate a VPN The NAT router changes the IPSec packet s header so it does not match the header for which IPSec router B is checking Therefore IPSec router B does not respond and the VPN connection cannot be built NAT traversal solves the ...

Страница 211: ... office 1 uses the Intranet DNS server in headquarters The DNS server feature for VPN does not work with Windows 2000 or Windows XP Figure 16 4 VPN Host using Intranet DNS Server Example If you do not specify an Intranet DNS server on the remote network then the VPN host must use IP addresses to access the computers on the remote network 16 8 ID Type and Content With aggressive negotiation mode se...

Страница 212: ...k to have the Prestige automatically use its own IP address DNS Type a domain name up to 31 characters by which to identify this Prestige E mail Type an e mail address up to 31 characters by which to identify this Prestige The domain name or e mail address that you use in the Content field is used for identification purposes only and does not need to be a real domain name or e mail address Table 1...

Страница 213: ...s IP but Prestige A s Peer ID type is set to E mail An ID mismatched message displays in the IPSEC LOG Table 16 6 Mismatching ID Type and Content Configuration Example PRESTIGE A PRESTIGE B Local ID type IP Local ID type IP Local ID content 1 1 1 10 Local ID content 1 1 1 10 Peer ID type E mail Peer ID type IP Peer ID content aa yahoo com Peer ID content N A 16 9 Pre Shared Key A pre shared key id...

Страница 214: ...Prestige 652H HW Series User s Guide 16 10 VPN Screens Figure 16 5 VPN IKE ...

Страница 215: ...ement In order for an IPSec router behind a NAT router to receive an initiating IPSec packet set the NAT router to forward UDP port 500 to the IPSec router behind the NAT router Name Type up to 32 characters to identify this VPN policy You may use any character including spaces but the Prestige drops trailing spaces IPSec Key Mode Select IKE or Manual from the drop down list box IKE provides more ...

Страница 216: ...e Local Address Type field is configured to Range enter the beginning static IP address in a range of computers on your LAN behind your Prestige When the Local Address Type field is configured to Subnet this is a static IP address on the LAN behind your Prestige End Subnet Mask When the Local Address Type field is configured to Single this field is N A When the Local Address Type field is configur...

Страница 217: ...identify this Prestige by its IP address Select DNS to identify this Prestige by a domain name Select E mail to identify this Prestige by an e mail address Content When you select IP in the Local ID Type field type the IP address of your computer in the local Content field The Prestige automatically uses the IP address in the My IP Address field refer to the My IP Address field description if you ...

Страница 218: ...te IPSec router by an e mail address Content The configuration of the peer content depends on the peer ID type For IP type the IP address of the computer with which you will make the VPN connection If you configure this field to 0 0 0 0 or leave it blank the Prestige will use the address in the Secure Gateway Address field refer to the Secure Gateway Address field description For DNS or E mail typ...

Страница 219: ... Encapsulation Security Payload The ESP protocol RFC 2406 provides encryption as well as some of the services offered by AH If you select ESP here you must select options from the Encryption Algorithm and Authentication Algorithm fields described below Pre Shared Key Type your pre shared key in this field A pre shared key identifies a communicating party during a phase 1 IKE negotiation It is call...

Страница 220: ... NULL to set up a tunnel without encryption When you select NULL you do not enter an encryption key Authentication Algorithm Select SHA1 or MD5 from the drop down list box MD5 Message Digest 5 and SHA1 Secure Hash Algorithm are hash algorithms used to authenticate packet data The SHA1 algorithm is generally considered stronger than MD5 but is slower Select MD5 for minimal security and SHA 1 for ma...

Страница 221: ...ryption algorithm Choose an authentication algorithm Choose whether to enable Perfect Forward Secrecy PFS using Diffie Hellman public key cryptography see section 16 11 3 Select None the default to disable PFS Choose Tunnel mode or Transport mode Set the IPSec SA lifetime This field allows you to determine how long the IPSec SA should stay up before it times out The Prestige automatically renegoti...

Страница 222: ...Diffie Hellman is used within IKE SA setup to establish session keys 768 bit Group 1 DH1 and 1024 bit Group 2 DH2 Diffie Hellman groups are supported Upon completion of the Diffie Hellman exchange the two peers have a shared secret but the IKE SA is not authenticated For authentication use pre shared keys 16 11 3 Perfect Forward Secrecy PFS Enabling PFS means that the key is transient The key is t...

Страница 223: ...16 19 Figure 16 7 VPN IKE Advanced Setup The following table describes the fields in this screen Table 16 8 VPN IKE Advanced Setup LABEL DESCRIPTION VPN IKE Protocol Enter 1 for ICMP 6 for TCP 17 for UDP etc 0 is the default and signifies any protocol ...

Страница 224: ...25 SMTP 110 POP3 End Enter a port number in this field to define a port range This port number must be greater than that specified in the previous field If Remote Start Port is left at 0 End will also remain at 0 Phase 1 Negotiation Mode Select Main or Aggressive from the drop down list box Multiple SAs connecting through a secure gateway must have the same negotiation mode Pre Shared Key Type you...

Страница 225: ...ange from 60 to 3 000 000 seconds almost 35 days A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys However every time the VPN tunnel renegotiates all users accessing remote resources are temporarily disconnected Key Group You must choose a key group for phase 1 IKE setup DH1 default refers to Diffie Hellman Group 1 a 768 bit ra...

Страница 226: ... from the drop down list box to enable PFS DH1 refers to Diffie Hellman Group 1 a 768 bit random number DH2 refers to Diffie Hellman Group 2 a 1024 bit 1Kb random number more secure yet slower Apply Click Apply to save your changes back to the Prestige and return to the VPN IKE screen Cancel Click Cancel to return to the VPN IKE screen without saving your changes 16 13Manual Key Setup Manual key m...

Страница 227: ...Prestige 652H HW Series User s Guide VPN Screens 16 23 Figure 16 8 Manual Setup ...

Страница 228: ...he remote IPSec router s configured remote IP addresses Two active SAs cannot have the local and remote IP address es both the same Two active SAs can have the same local or remote IP address but not both You can configure multiple SAs between the same local and remote IP addresses as long as only one is active at any time Local Address Type Use the drop down menu to choose Single Range or Subnet ...

Страница 229: ...mote IPSec router When the Remote Address Type field is configured to Subnet enter a static IP address on the network behind the remote IPSec router End Subnet Mask When the Remote Address Type field is configured to Single this field is N A When the Remote Address Type field is configured to Range enter the end static IP address in a range of computers on the network behind the remote IPSec route...

Страница 230: ...ith 3DES type a unique key 24 characters long Any characters may be used including spaces but trailing spaces are truncated Authentication Algorithm Select SHA1 or MD5 from the drop down list box MD5 Message Digest 5 and SHA1 Secure Hash Algorithm are hash algorithms used to authenticate packet data The SHA1 algorithm is generally considered stronger than MD5 but is slower Select MD5 for minimal s...

Страница 231: ...e SA times out automatically after two minutes A tunnel with no outbound or inbound traffic is idle and does not timeout until the SA lifetime period expires See section 16 6 on keep alive to have the Prestige renegotiate an IPSec SA when the SA lifetime expires even if there is no traffic Figure 16 9 SA Monitor ...

Страница 232: ... Both AH and ESP increase Prestige processing requirements and communications latency delay Disconnect Select Disconnect next to a security association and then click Apply to stop that security association Back Click Back to return to the previous screen Apply Click Apply to save your changes back to the Prestige Refresh Click Refresh to display the current active VPN connection s 16 16Configurin...

Страница 233: ...lick Cancel to begin configuring this screen afresh 16 17Telecommuter VPN IPSec Examples The following examples show how multiple telecommuters can make VPN connections to a single Prestige at headquarters The telecommuters use IPSec routers with dynamic WAN IP addresses The Prestige at headquarters has a static public IP address 16 17 1 Telecommuters Sharing One VPN Rule Example See the following...

Страница 234: ...e negotiation mode see section 16 11 1 the Prestige can use the ID types and contents to distinguish between VPN rules Telecommuters can each use a separate VPN rule to simultaneously access a Prestige at headquarters They can use different IPSec parameters The local IP addresses or ranges of addresses of the rules configured on the Prestige at headquarters can overlap The local IP addresses of th...

Страница 235: ...e IP Address 192 168 1 10 Local ID Type E mail Peer ID Type E mail Local ID Content bob bigcompanyhq com Peer ID Content bob bigcompanyhq com Telecommuter A telecommutera dydns org Headquarters Prestige Rule 1 Local ID Type IP Peer ID Type IP Local ID Content 192 168 2 12 Peer ID Content 192 168 2 12 Local IP Address 192 168 2 12 Secure Gateway Address telecommuter1 com Remote Address 192 168 2 12...

Страница 236: ...Telecommuter C telecommuterc dydns org Headquarters Prestige Rule 3 Local ID Type E mail Peer ID Type E mail Local ID Content myVPN myplace com Peer ID Content myVPN myplace com Local IP Address 192 168 4 15 Secure Gateway Address telecommuterc com Remote Address 192 168 4 15 16 18VPN and Remote Management If a VPN tunnel uses Telnet FTP WWW then you should configure remote management Remote Manag...

Страница 237: ... UPnP and Logs VI Part VI Remote Management UPnP and Logs This part contains information on how to configure the Prestige for remote management setting up Universal Plug and Play UPnP and setting up and displaying logs ...

Страница 238: ......

Страница 239: ...location via Internet WAN only ALL LAN and WAN LAN only Neither Disable When you Choose WAN only or ALL LAN WAN you still need to configure a firewall rule to allow access To disable remote management of a service select Disable in the corresponding Server Access field You may only have one remote management session running at a time The Prestige automatically disconnects a remote management sessi...

Страница 240: ...time 5 There is a firewall rule that blocks it 17 1 2 Remote Management and NAT When NAT is enabled Use the Prestige s WAN IP address when configuring from the WAN Use the Prestige s LAN IP address when configuring from the LAN 17 1 3 System Timeout There is a default system management idle timeout of five minutes three hundred seconds The Prestige automatically logs you out if the management sess...

Страница 241: ...nt Click Remote Management to open the following screen Figure 17 2 Remote Management The following table describes the fields in this screen Table 17 1 Remote Management LABEL DESCRIPTION Server Type Each of these labels denotes a service that you may use to remotely manage the Prestige Access Status Select the access interface Choices are All LAN Only WAN Only and Disable Port This field shows t...

Страница 242: ...CRIPTION Secured Client IP The default 0 0 0 0 allows any client to use this service to remotely manage the Prestige Type an IP address to restrict access to a client with a matching IP address Apply Click Apply to save your settings back to the Prestige Cancel Click Cancel to begin configuring this screen afresh ...

Страница 243: ...lecting the icon of a UPnP device will allow you to access the information and properties of that device 18 1 2 NAT Traversal UPnP NAT traversal automates the process of allowing an application to operate through NAT UPnP network devices can automatically configure network addressing announce their presence in the network to other UPnP devices and enable exchange of simple product and service desc...

Страница 244: ...g tested UPnP broadcasts are only allowed on the LAN See later sections for examples of installing UPnP in Windows XP and Windows Me as well as an example of using UPnP in Windows 18 2 1 Configuring UPnP From the Site Map in the main menu click UPnP under Advanced Setup to display the screen shown next Figure 18 1 Configuring UPnP The following table describes the fields in this screen Table 18 1 ...

Страница 245: ... application Allow UPnP to pass through Firewall Select this check box to allow traffic from UPnP enabled applications to bypass the firewall Clear this check box to have the firewall block all UPnP application packets for example MSN packets Apply Click Apply to save the setting to the Prestige Cancel Click Cancel to return to the previously saved settings 18 3 Installing UPnP in Windows Example ...

Страница 246: ...tart the computer when prompted Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP Step 1 Click Start and Control Panel Step 2 Double click Network Connections Step 3 In the Network Connections window click Advanced in the main menu and select Optional Networking Components The Windows Optional Networking Components Wizard window displays Step 4 Select Networkin...

Страница 247: ...ample This section shows you how to use the UPnP feature in Windows XP You must already have UPnP installed in Windows XP and UPnP activated on the Prestige Make sure the computer is connected to a LAN port of the Prestige Turn on your computer and the Prestige Auto discover Your UPnP enabled Network Device Step 1 Click Start and Control Panel Double click Network Connections An icon displays unde...

Страница 248: ... were automatically created Step 4 You may edit or delete the port mappings or click Add to manually add port mappings When the UPnP enabled device is disconnected from your computer all port mappings will be deleted automatically Step 5 Select Show icon in notification area when connected option and click OK An icon displays in the system tray ...

Страница 249: ...you can access the web based configurator on the Prestige without finding out the IP address of the Prestige first This comes helpful if you do not know the IP address of the Prestige Follow the steps below to access the web configurator Step 1 Click Start and then Control Panel Step 2 Double click Network Connections Step 3 Select My Network Places under Other Places ...

Страница 250: ...P enabled device displays under Local Network Step 5 Right click on the icon for your Prestige and select Invoke The web configurator login screen displays Step 6 Right click on the icon for your Prestige and select Properties A properties window displays with basic information about the Prestige ...

Страница 251: ... attacks access control and attempted access to blocked web sites Some categories such as System Errors consist of both logs and alerts You may differentiate them by their color in the View Log screen Alerts display in red and logs display in black 19 2 Configuring Log Settings Use the Log Settings screen to configure to where the Prestige is to send logs the schedule for when the Prestige is to s...

Страница 252: ...Prestige 652H HW Series User s Guide 19 2 Logs Screens Figure 19 1 Log Settings The following table describes the fields in this screen ...

Страница 253: ... to enable UNIX syslog Syslog IP Address Enter the server name or IP address of the syslog server that will log the selected categories of logs Log Facility Select a location from the drop down list box The log facility allows you to log the messages to different files in the syslog server Refer to your UNIX manual for more information Send Log Log Schedule This drop down menu is used to configure...

Страница 254: ...ck Apply to save your customized settings and exit this screen Cancel Click Cancel to return to the previously saved settings 19 3 Displaying the Logs Click Logs and then View Log to open the View Logs screen Use the View Logs screen to see the logs for the categories that you selected in the Log Settings screen see section 19 2 Log entries in red indicate alerts The log wraps around and deletes t...

Страница 255: ... IP address and the port number of the incoming packet Notes This field displays additional information about the log entry Back Click Back to return to the previous screen Email Log Now Click Email Log Now to send the log screen to the e mail address specified in the Log Settings page make sure that you have first filled in the Address Info fields in Log Settings see section 19 2 Refresh Click Re...

Страница 256: ...8 1 131 To 192 168 1 255 default policy forward 09 54 17 UDP src port 00520 dest port 00520 1 00 3 Apr 7 00 From 192 168 1 6 To 10 10 10 10 match forward 09 54 19 UDP src port 03516 dest port 00053 1 01 snip snip 126 Apr 7 00 From 192 168 1 1 To 192 168 1 255 match forward 10 05 00 UDP src port 00520 dest port 00520 1 02 127 Apr 7 00 From 192 168 1 131 To 192 168 1 255 match forward 10 05 17 UDP s...

Страница 257: ...Bandwidth Management VII Part VII Bandwidth Management This part provides information on the functions and configuration of Bandwidth Management ...

Страница 258: ......

Страница 259: ... dropped packets at the next routing device For example you can set the WAN interface speed to 1000kbps if the ADSL connection has an upstream speed of 1000kbps All configuration screens display measurements in kbps kilobits per second but this User s Guide also uses Mbps megabits per second for brevity s sake 20 2 Bandwidth Classes and Filters Use bandwidth classes and child classes to allocate s...

Страница 260: ...al available bandwidth 20 4 Bandwidth Management Usage Examples These examples show bandwidth management allotments on a WAN interface that is configured for 640Kbps 20 4 1 Application based Bandwidth Management Example The bandwidth classes in the following example are based solely on application Each bandwidth class VoIP Web FTP E mail and Video is allotted 128kbps Table 20 1 Application based B...

Страница 261: ...uses bandwidth classes based on LAN subnets and applications specific applications in each subnet are allotted bandwidth Table 20 3 Application and Subnet based Bandwidth Management Example TRAFFIC TYPE FROM SUBNET A FROM SUBNET B VoIP 64 kbps 64 kbps Web 64 kbps 64 kbps FTP 64 kbps 64 kbps E mail 64 kbps 64 kbps Video 64 kbps 64 kbps Table 20 4 Application and Subnet based Bandwidth Management Ex...

Страница 262: ...g among the bandwidth classes that require more bandwidth When you enable maximize bandwidth usage the Prestige first makes sure that each bandwidth class gets up to its bandwidth allotment Next the Prestige divides up an interface s available bandwidth bandwidth that is unbudgeted or unused by the classes depending on how many bandwidth classes require more bandwidth and on their priority levels ...

Страница 263: ...eted 2 Mbps the Prestige also divides the remaining 1 Mbps among the classes that require more bandwidth Therefore the Prestige divides a total of 3 Mbps total of unbudgeted and unused bandwidth among the classes that require more bandwidth In this case suppose that all of the classes except for the administration class need more bandwidth Each class gets up to its budgeted bandwidth The administr...

Страница 264: ...dth A parent class s unused bandwidth is given to the highest priority child class first The child class can also borrow bandwidth from a higher parent class grandparent class if the child class s parent class is also configured to borrow bandwidth from its parent class This can go on for as many levels as are configured to borrow bandwidth from their parent class see section 20 7 1 The total of t...

Страница 265: ...width Borrowing Example The Bill class can borrow unused bandwidth from the Sales USA class because the Bill class has bandwidth borrowing enabled The Bill class can also borrow unused bandwidth from the Sales class because the Sales USA class also has bandwidth borrowing enabled ...

Страница 266: ...ng on individual child classes the Prestige functions as follows 1 The Prestige sends traffic according to each bandwidth class s bandwidth budget 2 The Prestige assigns a parent class s unused bandwidth to its child classes that have more traffic than their budgets and have bandwidth borrowing enabled The Prestige gives priority to bandwidth child classes of higher priority and treats bandwidth c...

Страница 267: ...ace regardless of the traffic s source Traffic redirect or IP alias may cause LAN to LAN traffic to pass through the Prestige and be managed by bandwidth management Active Select an interface s check box to enable bandwidth management on that interface Speed kbps Enter the amount of bandwidth for this interface that you want to allocate using bandwidth management This appears as the bandwidth budg...

Страница 268: ...flow guarantee To fine tune the levels of services on the priority of the traffic flow using QoS places a heavy burden on the network infrastructure DiffServ is a class of service CoS model that marks packets so that they receive specific per hop treatment at DiffServ compliant network devices along the route based on the application types and traffic flow Packets are marked with DiffServ Code Poi...

Страница 269: ...B CLASS 2 AF21 AF22 AF23 SUB CLASS 1 AF11 AF12 AF13 20 10Configuring Class Setup The class setup screen displays the configured bandwidth classes by individual interface Select an interface and click the buttons to perform the actions described next Click to expand the class tree or click to collapse the class tree Each interface has a permanent root class The bandwidth budget of the root class is...

Страница 270: ...t an interface from the drop down list box for which you wish to set up classes Back Click Back to go to the main BW Manager screen Add Child Class Click Add Child class to add a sub class Edit Click Edit to configure the selected class You cannot edit the root class Delete Click Delete to delete the class and all its child classes You cannot delete the root class Statistics Click Statistics to di...

Страница 271: ... in the Class Configuration screen You must use the Bandwidth Manager Summary screen to enable bandwidth management on an interface before you can configure classes for that interface To add a child class click BW Manager then Class Setup Click the Add Child Class button to open the following screen Table 20 14 Bandwidth Manager Class Configuration ...

Страница 272: ...ts bandwidth budget Bandwidth borrowing is governed by the priority of the child classes That is a child class with the highest priority 7 is the first to borrow bandwidth from its parent class Do not select this for the classes directly below the root class if you want to leave bandwidth available for other traffic types see 20 6 1 or you want to set the interface s speed to match what the next d...

Страница 273: ...ndix for more information on IP subnetting Destination Port Enter the port number of the destination A blank destination port means any destination port Source IP Address Enter the source IP address A blank source IP address means any source IP address Source Subnet Mask Enter the source subnet mask This field is N A if you do not specify a Source IP Address Refer to the appendix for more informat...

Страница 274: ...ple Mail Transfer Protocol 25 DNS Domain Name System 53 Finger 79 HTTP Hyper Text Transfer protocol or WWW Web 80 POP3 Post Office Protocol 110 NNTP Network News Transport Protocol 119 SNMP Simple Network Management Protocol 161 SNMP trap 162 PPTP Point to Point Tunneling Protocol 1723 20 10 2 Bandwidth Management Statistics Use the Bandwidth Management Statistics screen to view network performanc...

Страница 275: ...isplays the total number of bytes transmitted Dropped Packets This field displays the total number of packets dropped Dropped Bytes This field displays the total number of bytes dropped Bandwidth Statistics for the Past 8 Seconds t 8 to t 1 This field displays the bandwidth statistics in bps for the past one to eight seconds For example t 1 means one second ago Update Period seconds Enter the time...

Страница 276: ... Bandwidth Manager Monitor The following table describes the labels in this screen Table 20 20 Bandwidth Manager Monitor LABEL DESCRIPTION Interface Select an interface from the drop down list box to view the bandwidth usage of its bandwidth classes Class Name This field displays the name of the class Budget kbps This field displays the amount of bandwidth allocated to the class Current Usage kbps...

Страница 277: ...Maintenance VIII Part VIII Maintenance This part covers the maintenance screens ...

Страница 278: ......

Страница 279: ...port traffic statistics 21 1 Maintenance Overview The maintenance screens can help you view system information upload new firmware manage configuration and restart your Prestige 21 2 System Status Screen Click System Status to open the following screen where you can use to monitor your Prestige Note that these fields are READ ONLY and only for diagnostic purposes ...

Страница 280: ...Prestige 652H HW Series User s Guide 21 2 Maintenance Figure 21 1 System Status The following table describes the fields in this screen ...

Страница 281: ...t IP address IP Subnet Mask This is the WAN port IP subnet mask Default Gateway This is the IP address of the default gateway if applicable VPI VCI This is the Virtual Path Identifier and Virtual Channel Identifier that you entered in the first Wizard screen LAN Information MAC Address This is the MAC Media Access Control or Ethernet address unique to your Prestige IP Address This is the LAN port ...

Страница 282: ...s Click Show Statistics to see the performance statistics such as number of packets sent and number of packets received for each port 21 2 1 System Statistics Click Show Statistics in the System Status screen to open the following screen Read only information here includes port status and packet specific statistics Also provided are system up time and poll interval s The Poll Interval s field is c...

Страница 283: ... this displays the port speed and duplex setting if you re using Ethernet encapsulation and down line is down idle line ppp idle dial starting to trigger a call and drop dropping a call if you re using PPPoE encapsulation For a LAN port this shows the port speed and duplex setting TxPkts This field displays the number of packets transmitted on this port RxPkts This field displays the number of pac...

Страница 284: ...it When configured as a server the Prestige provides the TCP IP configuration for the clients If set to None DHCP service will be disabled and you must have another DHCP server on your LAN or else the computer must be manually configured Click Maintenance and then DHCP Table Read only information here relates to your DHCP status The DHCP table shows current DHCP Client information including IP Add...

Страница 285: ... address es of the wireless stations that are currently logged in to the network Click Wireless LAN under Maintenance and then Association List to open the screen shown next Figure 21 4 Association List The following table describes the fields in this screen Table 21 4 Association List LABEL DESCRIPTION This is the index number of an associated wireless station MAC Address This field displays the ...

Страница 286: ...e table 21 4 2 Channel Usage Table This screen displays the state of the channels within the Prestige s transmission range Click Wireless LAN under Maintenance and then Channel Usage Table to open the screen shown next Figure 21 5 Channel Usage Table The following table describes the fields in this screen Table 21 5 Channel Usage Table LABEL DESCRIPTION Channel This is the index number of the chan...

Страница 287: ...ithin the Prestige s transmission range Back Click Back to return to the previous screen Refresh Click Refresh to renew the information in the table 21 5 Diagnostic Screens These read only screens display information to help you identify problems with the Prestige 21 5 1 Diagnostic General Screen Click Diagnostic and then General to open the screen shown next Figure 21 6 Diagnostic General ...

Страница 288: ...test a connection Ping Click this button to ping the IP address that you entered Reset System Click this button to reboot the Prestige A warning dialog box is then displayed asking you if you re sure you want to reboot the system Click OK to proceed Back Click this button to go back to the main Diagnostic screen 21 5 2 Diagnostic DSL Line Screen Click Diagnostic and then DSL Line to open the scree...

Страница 289: ... is useful for troubleshooting problems with the DSLAM and ATM network Upstream Noise Margin Click this button to display the upstream noise margin Downstream Noise Margin Click this button to display the downstream noise margin Back Click this button to go back to the main Diagnostic screen 21 6 Firmware Screen Find firmware at www zyxel com in a file that usually uses the system model name with ...

Страница 290: ...p files before you can upload them Upload Click Upload to begin the upload process This process may take up to two minutes Do not turn off the Prestige while firmware upload is in progress After you see the Firmware Upload in Process screen wait two minutes before logging into the Prestige again The Prestige automatically restarts in this time causing a temporary network disconnect In some operati...

Страница 291: ...t The following screens are not available on all models 21 7 1 Backup Configuration Backup configuration allows you to back up save the Prestige s current configuration to a file on your computer Once your Prestige is configured and functioning properly it is highly recommended that you back up your configuration file before making configuration changes The backup configuration file will be useful...

Страница 292: ... extension e g prestige rom The system reboots automatically after the file transfer is complete and uses the configured values in the file WARNING Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE YOUR Prestige When the Restore Configuration process is complete the Prestige will automatically restart Click Configuration and then Restore to display the screen shown next Fig...

Страница 293: ...ige while configuration file upload is in progress After you see a configuration upload successful screen you must then wait one minute before logging into the Prestige again Figure 21 13 Configuration Upload Successful The Prestige automatically restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop Figure 21 14 Networ...

Страница 294: ...d Error 21 7 3 Back to Factory Defaults Clicking the Reset button in this section clears all user entered configuration information and returns the Prestige to its factory defaults as shown on the screen This will erase all configurations that you have applied Click Configuration and then Default to display the screen shown next Figure 21 16 Back to Factory Default The following warning screen wil...

Страница 295: ...Maintenance 21 17 Figure 21 17 Reset Warning Message You can also press the RESET button on the side panel to reset the factory defaults of your Prestige Refer to the Resetting the Prestige section for more information on the RESET button ...

Страница 296: ......

Страница 297: ... Management Terminal configuration for general setup WAN backup LAN setup wireless LAN setup Internet access remote node static route NAT and enabling the firewall See the web configurator parts of this guide for background information on features configurable by web configurator and SMT ...

Страница 298: ......

Страница 299: ...parity 8 data bits 1 stop bit data flow set to none 9600 bps port speed Press ENTER to display the SMT password screen The default password is 1234 22 1 2 Procedure for SMT Configuration via Telnet The following procedure details how to telnet into your Prestige Step 1 In Windows click Start usually in the bottom left corner Run and then type telnet 192 168 1 1 the default IP address and click OK ...

Страница 300: ...log in your Prestige will automatically log you out Figure 22 1 Login Screen 22 1 4 Prestige SMT Menu Overview We use the Prestige 652H HW 31 SMT menus in this guide as an example The SMT menus vary slightly for different Prestige models The following figure gives you an overview of the various SMT menu screens of your Prestige Enter Password ...

Страница 301: ... and Console port Speed Menu 24 10 Time and Date Setting Menu 26 Schedule Setup Menu 26 x Schedule Set Setup Menu 24 9 Call Control Menu 24 9 1 Budget Management Menu 24 11 Remote Management Menu 3 5 Wireless LAN Setup Menu 3 5 1 WLAN MAC Address Filter Menu 2 WAN Backup Setup Menu 3 2 1 IP Alias Setup Menu 23 1 Change Password Menu 23 2 RADIUS Server Menu 23 4 IEEE802 1X Menu 1 1 Configure Dynami...

Страница 302: ... to the next field You can also use the UP DOWN arrow keys to move to the previous and the next field respectively Entering information Type in or press SPACE BAR then press ENTER You need to fill in two types of fields The first requires you to type in the appropriate information The second allows you to cycle through the available choices by pressing SPACE BAR Required fields or ChangeMe All fie...

Страница 303: ...tic Routing Setup Use this menu to set up static routes 14 Dial in User Setup Use this menu to set up local user profiles on the Prestige 15 NAT Setup Use this menu to specify inside servers when NAT is enabled 21 Filter and Firewall Setup Use this menu to configure filters activate deactivate the firewall and view the firewall log 22 SNMP Configuration Use this menu to set up SNMP related paramet...

Страница 304: ...sword Change the Prestige default password by following the steps shown next Step 1 Enter 23 in the main menu to display Menu 23 System Security Step 2 Enter 1 to display Menu 23 1 System Security Change Password as shown next Step 3 Type your existing system password in the Old Password field for example 1234 and press ENTER Figure 22 4 Menu 23 1 Change Password Step 4 Type your new system passwo...

Страница 305: ...s 2000 click Start Settings Control Panel and then double click System Click the Network Identification tab and then the Properties button Note the entry for the Computer name field and enter it as the Prestige System Name In Windows XP click start My Computer View system information and then click the Computer Name tab Note the entry in the Full computer name field and enter it as the Prestige Sy...

Страница 306: ...ave this field blank the ISP may assign a domain name via DHCP You can go to menu 24 8 and type sys domainname to see the current domain name used by your gateway If you want to clear this field just press the SPACE BAR The domain name entered by you is given priority over the ISP assigned domain name zyxel com tw Edit Dynamic DNS Press the SPACE BAR to select Yes or No default Select Yes to confi...

Страница 307: ...lt Active Press SPACE BAR to select Yes and then press ENTER to make dynamic DNS active Yes Host Enter the domain name assigned to your Prestige by your Dynamic DNS provider me dyndns org EMAIL Enter your e mail address mail mailserver USER Enter your user name Password Enter the password assigned to you Enable Wildcard Your Prestige supports DYNDNS Wildcard Press SPACE BAR and then ENTER to selec...

Страница 308: ......

Страница 309: ...s 24 2 Dial Backup To set up the auxiliary port for use in the event that the regular WAN connection is dropped first make sure you have set up the port connection and the CON AUX switch to AUX on the Prestige and then configure 1 Menu 2 WAN Backup Setup 2 Menu 2 2 Dial Backup Setup 3 Menu 2 2 1 Advanced Dial Backup Setup 4 Menu 11 1 Remote Node Profile Backup ISP Refer also to the traffic redirec...

Страница 310: ...address of a reliable nearby computer for example your ISP s DNS server address When using a WAN backup connection the Prestige periodically pings the addresses configured here and uses the other WAN backup connection if configured if there is no response KeepAlive Fail Tolerance Type the number of times 2 recommended that your Prestige may ping the IP addresses configured in the Check WAN IP Addr...

Страница 311: ... press ENTER to configure Menu 2 1 Traffic Redirect Setup Select No default if you do not want to configure this feature Dial Backup Press SPACE BAR to select Yes or No Select Yes and press ENTER to configure Menu 2 2 Dial Backup Setup Select No default if you do not want to configure this feature When you have completed this menu press ENTER at the prompt Press ENTER to Confirm to save your confi...

Страница 312: ... Prestige uses The metric represents the cost of transmission A router determines the best route for transmission by choosing a path with the lowest cost RIP routing uses hop count as the measurement of cost with a minimum of 1 for directly connected networks The number must be between 1 and 15 a number greater than 15 means the link is down The smaller the number the lower the cost When you have ...

Страница 313: ...Command String Init Enter the AT command string to initialize the WAN device Consult the manual of your WAN device connected to your Dial Backup port for specific AT commands at fs0 0 Edit Advanced Setup To edit the advanced setup for the Dial Backup port move the cursor to this field press the SPACE BAR to select Yes and then press ENTER to go to Menu 2 2 1 Advanced Dial Backup Setup Yes When you...

Страница 314: ...rings Dial Enter the AT Command string to make a call atdt Drop Enter the AT Command string to drop a call represents a one second wait e g ath can be used if your modem has a slow response time ath Answer Enter the AT Command string to answer a call ata Drop DTR When Hang Up Press the SPACE BAR to choose either Yes or No When Yes is selected the default the DTR Data Terminal Ready signal is dropp...

Страница 315: ...seconds for the Prestige to keep trying to set up an outgoing call before timing out stopping The Prestige times out and stops if it cannot set up an outgoing call within the timeout value 60 seconds Retry Count Enter a number of times for the Prestige to retry a busy or no answer phone number before blacklisting the number 0 to disable the blacklist control Retry Interval sec Enter a number of se...

Страница 316: ...n be up to eight characters LAoffice Active Press SPACE BAR and then ENTER to select Yes to enable the remote node or No to disable the remote node Yes Outgoing My Login Enter the login name assigned by your ISP for this remote node jim My Password Enter the password assigned by your ISP for this remote node Menu 11 1 Remote Node Profile Backup ISP Rem Node Name Edit PPP Options No Active Yes Rem ...

Страница 317: ...mote Node PPP Options see section 24 7 No default Rem IP Addr Leave the field set to 0 0 0 0 if the remote gateway has a dynamic IP address Enter the remote gateway s IP address here if it is static 0 0 0 0 Edit IP This field leads to a hidden menu Press SPACE BAR to select Yes and press ENTER to go to Menu 11 3 Remote Node Network Layer Options See section 24 8 for more information No default Edi...

Страница 318: ...n elapse before the Prestige automatically disconnects the PPP connection This option only applies when the Prestige initiates the call 100 seconds default Once you have configured this menu press ENTER at the message Press ENTER to Confirm to save your configuration or press ESC at any time to cancel 24 7 Editing PPP Options The Prestige s dial back up feature uses PPP To edit the remote node PPP...

Страница 319: ...e Node Network Layer Options The following table describes the fields in this menu Table 24 7 Menu 11 3 Remote Node Network Layer Options FIELD DESCRIPTION EXAMPLE Rem IP Address Leave this field set to 0 0 0 0 to have the ISP or other remote router dynamically automatically send its IP address if you do not know it Enter the remote gateway s IP address here if you know it static 0 0 0 0 DEFAULT R...

Страница 320: ...E BAR and then ENTER to select the RIP direction from Both None In Only Out Only and None Both default Version Press SPACE BAR and then ENTER to select the RIP version from RIP 1 RIP 2B RIP 2M RIP 1 Multicast IGMP Internet Group Multicast Protocol is a network layer protocol used to establish membership in a Multicast group The Prestige supports both IGMP version 1 IGMP v1 and version 2 IGMP v2 Pr...

Страница 321: ... that the ordering of the sets is significant i e starting from set 1 the Prestige will wait until the Expect string is matched before it proceeds to set 2 and so on for the rest of the script When both the Expect and the Send fields of the current set are empty the Prestige will terminate the script processing and start PPP negotiation This implies two things first the sets must be contiguous the...

Страница 322: ...s the string in the Send field Set 1 6 Send Enter a string to send out after the Expect string is matched 0 0 0 0 Once you have configured this menu press ENTER at the message Press ENTER to Confirm to save your configuration or press ESC at any time to cancel 24 10Remote Node Filter Move the cursor to the field Edit Filter Sets in Menu 11 1 Remote Node Profile Backup ISP and then press SPACE BAR ...

Страница 323: ... to the Filters chapter for more information on defining the filters Figure 24 11 Menu 11 5 Dial Backup Remote Node Filter Menu 11 5 Remote Node Filter Input Filter Sets protocol filters device filters Output Filter Sets protocol filters device filters Enter here to CONFIRM or ESC to CANCEL Menu 11 1 Remote Node Profile Backup ISP Rem Node Name Edit PPP Options No Active Yes Rem IP Addr Edit IP No...

Страница 324: ......

Страница 325: ...n menu enter 3 to display menu 3 Figure 25 1 Menu 3 LAN Setup 25 1 1 General Ethernet Setup This menu allows you to specify filter set s that you wish to apply to the Ethernet traffic You seldom need to filter Ethernet traffic however the filter sets may be useful to block certain packets reduce traffic and prevent security breaches Menu 3 LAN Setup 1 LAN Port Filter Setup 2 TCP IP and DHCP Setup ...

Страница 326: ...ned below For TCP IP Ethernet setup refer to the Internet Access Application chapter For bridging Ethernet setup refer to the Bridging Setup chapter 25 3 TCP IP Ethernet Setup and DHCP Use menu 3 2 to configure your Prestige for TCP IP To edit menu 3 2 enter 3 from the main menu to display Menu 3 LAN Setup When menu 3 appears press 2 and press ENTER to display Menu 3 2 TCP IP and DHCP Ethernet Set...

Страница 327: ...ed to be set Server default Client IP Pool Starting Address This field specifies the first of the contiguous addresses in the IP address pool 192 168 1 33 Size of Client IP Pool This field specifies the size or count of the IP address pool 32 Primary DNS Server Secondary DNS Server Enter the IP addresses of the DNS servers The DNS servers are passed to the DHCP clients along with the IP address an...

Страница 328: ...M RIP 1 default Multicast IGMP Internet Group Multicast Protocol is a network layer protocol used to establish membership in a Multicast group The Prestige supports both IGMP version 1 IGMP v1 and version 2 IGMP v2 Press the SPACE BAR to enable IP Multicasting or select None to disable it None default IP Policies Create policies using SMT menu 25 see the IP Policy Routing chapter and apply them on...

Страница 329: ... Setup To setup port based VLAN enter 3 from the main menu to display Menu 3 LAN Setup When menu 3 appears press 6 and press ENTER to display Menu 3 6 Port Based VLAN Setup as shown next Figure 25 4 Menu 3 6 Port Based VLAN Setup Press SPACE BAR to select Yes and press ENTER to allow the port in the top row to communicate with the corresponding port on the left Otherwise press SPACE BAR to select ...

Страница 330: ......

Страница 331: ...Never insert or remove a wireless LAN card when the Prestige is turned on Step 2 Locate the slot labeled Wireless LAN on the Prestige Step 3 With its pin connector facing the slot and the LED side facing upwards slide the ZyAIR wireless LAN card into the slot Never force bend or twist the wireless LAN card into the slot Step 4 Turn on the Prestige The WLAN LED should turn on 26 3 Wireless LAN Setu...

Страница 332: ...anning No Channel ID Press SPACE BAR to select a channel This allows you to set the operating frequency channel depending on your particular region CH01 2412MHz RTS Threshold RTS Request To Send threshold number of bytes enables RTS CTS handshake Data with its frame size larger than this value will perform the RTS CTS handshake Setting this attribute to be larger than the maximum MSDU MAC Service ...

Страница 333: ...receded by 0x for each key 1 4 If you chose 128 bit WEP in the WEP Encryption field then enter 13 characters or 26 hexadecimal characters 0 9 A F preceded by 0x for each key 1 4 There are four data encryption keys to secure your data from eavesdropping by unauthorized wireless users The values for the keys must be set up exactly the same on the access points as they are on the wireless stations Ed...

Страница 334: ...owed or denied access to the Prestige in these address fields When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to the previous screen Menu 3 5 1 WLAN MAC Address Filter Active No Filter Action Allowed Association 1 00 00 00 00 00 00 13 00 00 00 00 00 00 25 00 00 00 00 00 00 2 00 00 00 0...

Страница 335: ...Edit Roaming Configuration field Press SPACE BAR to select Yes and then press ENTER Menu 3 5 2 Roaming Configuration displays as shown next Figure 26 4 Menu 3 5 2 Roaming Configuration The following table describes the fields in this menu Menu 3 5 2 Roaming Configuration Active Yes Port 3517 Press ENTER to Confirm or ESC to Cancel Menu 3 5 Wireless LAN Setup ESSID Wireless Hide ESSID No Channel ID...

Страница 336: ...have two or more Prestiges on the same subnet Port Type the port number to communicate roaming information between access points The port number must be the same on all access points Make sure this port is not used by other services When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to th...

Страница 337: ...the policy defined by the network administrator Policy based routing is applied to incoming packets on a per interface basis prior to the normal routing Create policies using SMT menu 25 see IP Policy Routing and apply them on the Prestige LAN and or WAN interfaces using menus 3 2 LAN and 11 3 WAN 27 3 IP Alias IP Alias allows you to partition a physical network into different logical networks ove...

Страница 338: ...e the second and third network Figure 27 3 Menu 3 2 TCP IP and DHCP Setup Pressing ENTER displays Menu 3 2 1 IP Alias Setup as shown next Menu 3 2 TCP IP and DHCP Setup DHCP Setup DHCP Server Client IP Pool Starting Addres 192 168 1 33 Size of Client IP Pool 32 Primary DNS Server 0 0 0 0 Secondary DNS Server 0 0 0 0 Remote DHCP Server N A TCP IP Setup IP Address 192 168 1 1 IP Subnet Mask 255 255 ...

Страница 339: ...ices are None Both In Only or Out Only None Version Press SPACE BAR to select the RIP version Choices are RIP 1 RIP 2B or RIP 2M RIP 1 Incoming Protocol Filters Enter the filter set s you wish to apply to the incoming traffic between this node and the Prestige Outgoing Protocol Filters Enter the filter set s you wish to apply to the outgoing traffic between this node and the Prestige When you have...

Страница 340: ...you configure your Prestige for Internet access you need to collect your Internet account information Use the Internet Account Information table in the Compact Guide to record your Internet account information Note that if you are using PPPoA or PPPoE encapsulation then the only ISP information you need is a login name and password You only need to know the Ethernet Encapsulation Gateway IP addres...

Страница 341: ...th Identifier VPI assigned to you 8 VCI Enter the Virtual Channel Identifier VCI assigned to you 35 ATM QoS Type Press SPACE BAR and select CBR Continuous Bit Rate to specify fixed always on bandwidth Select UBR Unspecified Bit Rate for applications that are non time sensitive such as e mail Select VBR Variable Bit Rate for bursty traffic and bandwidth sharing with other applications UBR Peak Cell...

Страница 342: ... address supplied by your ISP when you are using ENET ENCAP encapsulation N A Idle Timeout This value specifies the number of idle seconds that elapse before the Prestige automatically disconnects the PPPoE session 0 IP Address Assignment Press SPACE BAR to select Static or Dynamic address assignment Dynamic IP Address Enter the IP address supplied by your ISP if applicable N A Network Address Tra...

Страница 343: ... Menu 5 DMZ Setup 28 2 DMZ Port Filter Setup This menu allows you to specify the filter sets that you wish to apply to your public server s traffic Figure 28 2 Menu 5 1 DMZ Port Filter Setup Menu 5 DMZ Setup 1 DMZ Port Filter Setup 2 TCP IP Setup Enter Menu Selection Number Menu 5 1 DMZ Port Filter Setup Input Filter Sets protocol filters device filters Output Filter Sets protocol filters device f...

Страница 344: ...e 28 4 Menu 5 2 TCP IP Setup The TCP IP setup fields are the same as the ones in Menu 3 2 TCP IP Ethernet Setup Each public server will need a unique IP address Refer to section 25 3 for information on how to configure these fields DMZ and LAN IP addresses must be on separate subnets You must also configure NAT for the DMZ port see the NAT chapter in menus 15 1 and 15 2 Menu 5 DMZ Setup 1 DMZ Port...

Страница 345: ...configuring one of the remote nodes You first choose a remote node in Menu 11 Remote Node Setup You can then edit that node s profile in menu 11 1 as well as configure specific settings in three submenus edit IP and bridge options in menu 11 3 edit ATM options in menu 11 6 and edit filter sets in menu 11 5 29 2 Remote Node Setup This section describes the protocol independent parameters for a remo...

Страница 346: ...N application Here are some examples of more suitable combinations in such an application Scenario 1 One VC Multiple Protocols PPPoA RFC 2364 encapsulation with VC based multiplexing is the best combination because no extra protocol identifying headers are needed The PPP protocol already contains this information Scenario 2 One VC One Protocol IP Selecting RFC 1483 encapsulation with VC based mult...

Страница 347: ...d then the Rem Login Rem Password My Login My Password and Authen fields are not applicable N A ENET ENCAP Multiplexing Press SPACE BAR and then ENTER to select the method of multiplexing that your ISP uses either VC based or LLC based LLC based Service Name When using PPPoE encapsulation type the name of your PPPoE service here N A Incoming Menu 11 1 Remote Node Profile Rem Node Name ChangeMe Rou...

Страница 348: ...en requested by this remote node CHAP accept CHAP Challenge Handshake Authentication Protocol only Authen PAP accept PAP Password Authentication Protocol only Route This field determines the protocol used in routing Options are IP and None IP Bridge When bridging is enabled your Prestige will forward any packet that it does not route to this remote node otherwise the packets are discarded Select Y...

Страница 349: ...ions Edit Filter Sets Use SPACE BAR to choose Yes and press ENTER to open menu 11 5 to edit the filter sets See the Remote Node Filter section for more details No default Idle Timeout sec Type the number of seconds 0 9999 that can elapse when the Prestige is idle there is no traffic going to the remote node before the Prestige automatically disconnects the remote node 0 means that the session will...

Страница 350: ...ons FIELD DESCRIPTION EXAMPLE IP Address Assignment Press SPACE BAR and then ENTER to select Dynamic if the remote node is using a dynamically assigned IP address or Static if it is using a static fixed IP address You will only be able to configure this in the ISP node also the one you configure in menu 4 all other nodes are set to Static Dynamic Rem IP Addr This is the IP address you entered in t...

Страница 351: ...eld the SMT uses NAT server set 1 in menu 15 2 see the NAT chapter for details 2 Metric The metric represents the cost of transmission for routing purposes IP routing uses hop count as the cost measurement with a minimum of 1 for directly connected networks Type a number that approximates the cost for this link The number need not be precise but it must be between 1 and 15 In practice 2 or 3 is us...

Страница 352: ...P addresses to help you understand the field of My WAN Addr in menu 11 3 Refer to the previous LAN and WAN IP Addresses figure in the web configurator chapter on LAN setup for a brief review of what a WAN IP is My WAN Addr indicates the local Prestige WAN IP 172 16 0 1 in the following figure while Rem IP Addr indicates the peer WAN IP 172 16 0 2 in the following figure Figure 29 4 Sample IP Addre...

Страница 353: ... Figure 29 5 Menu 11 5 Remote Node Filter RFC 1483 or ENET Encapsulation Figure 29 6 Menu 11 5 Remote Node Filter PPPoA or PPPoE Encapsulation 29 5 Editing ATM Layer Options Follow the steps shown next to edit Menu 11 6 Remote Node ATM Layer Options In menu 11 1 move the cursor to the Edit ATM Options field and then press SPACE BAR to select Yes Press ENTER to display Menu 11 6 Remote Node ATM Lay...

Страница 354: ...rotocols with protocol identifying information being contained in each packet header Figure 29 8 Menu 11 6 for LLC based Multiplexing or PPP Encapsulation Menu 11 6 Remote Node ATM Layer Options VPI VCI VC Multiplexing VC Options for IP VPI 8 VCI 35 ATM QoS Type UBR Peak Cell Rate PCR 0 Sustain Cell Rate SCR 0 Maximum Burst Size MBS 0 VC Options for Bridge VPI 1 VCI 36 ATM QoS Type N A Peak Cell R...

Страница 355: ...R to display Menu 11 8 Advance Setup Options Figure 29 10 Menu 11 8 Advance Setup Options The following table describes the fields in this menu Menu 11 8 Advance Setup Options PPPoE PPPoE_Client_PC No Press ENTER to Confirm or ESC to Cancel Menu 11 1 Remote Node Profile Rem Node Name MyISP Route IP Active Yes Bridge No Encapsulation PPPoE Edit IP Bridge No Multiplexing LLC based Edit ATM Options N...

Страница 356: ...heir computers to connect to the ISP via the Prestige Each host can have a separate account and a public WAN IP address PPPoE pass through is an alternative to NAT for applications where NAT is not appropriate Press SPACE BAR to select No and press ENTER to disable PPPoE pass through if you do not need to allow hosts on the LAN to use PPPoE client software on their computers to connect to the ISP ...

Страница 357: ...t is directly connected to a remote node Each remote node specifies only the network to which the gateway is directly connected and the Prestige has no knowledge of the networks beyond For instance the Prestige knows about network N2 in the following figure through remote node Router 1 However the Prestige is unable to route a packet to network N3 because it does not know that there is a route thr...

Страница 358: ...e Setup shown next Figure 30 3 Menu 12 1 IP Static Route Setup Step 3 Now type the route number of a static route you want to configure Menu 12 1 IP Static Route Setup 1 ________ 2 ________ 3 ________ 4 ________ 5 ________ 6 ________ 7 ________ 8 ________ 9 ________ 10 ________ 11 ________ 12 ________ 13 ________ 14 ________ 15 ________ 16 ________ Enter selection number Menu 12 Static Route Setup...

Страница 359: ...be identical to the host ID IP Subnet Mask Type the subnet mask for this destination Follow the discussion on IP Subnet Mask in this manual Gateway IP Address Type the IP address of the gateway The gateway is an immediate neighbor of your Prestige that will forward the packet to the destination On the LAN the gateway must be a router on the same segment as your Prestige over WAN the gateway must b...

Страница 360: ...o this remote node in its RIP broadcasts If set to Yes this route is kept private and is not included in RIP broadcasts If No the route to this remote node will be propagated to other hosts through RIP broadcasts When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to the previous screen ...

Страница 361: ...ocol and it also demands more CPU cycles and memory For efficiency reasons do not turn on bridging unless you need to support protocols other than IP on your network For IP enable the routing if you need it do not bridge what the Prestige can route 31 2 Bridge Ethernet Setup Basically all non local packets are bridged to the WAN Your Prestige does not support IPX 31 2 1 Remote Node Bridging Setup ...

Страница 362: ...Mask 0 0 0 0 My WAN Addr 0 0 0 0 NAT Full Feature Address Mapping Set 2 Metric 2 Private No RIP Direction Both Version RIP 2B Multicast IGMP v2 IP Policies Press ENTER to Confirm or ESC to Cancel Menu 11 1 Remote Node Profile Rem Node Name Route IP Active Yes Bridge Yes Encapsulation ENET ENCAP Edit IP Bridge No Multiplexing VC based Edit ATM Options No Service Name N A Edit Advance Options N A In...

Страница 363: ...R to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to the previous screen 31 2 2 Bridge Static Route Setup Similar to network layer static routes a bridging static route tells the Prestige the route to a node before a connection is established You configure bridge static routes in menu 12 3 1 go to menu 12 choose option 3 then choose a static route to edit ...

Страница 364: ...puter that you want to bridge the packets to IP Address If available type the IP address of the destination computer that you want to bridge the packets to Gateway Node Press SPACE BAR and then ENTER to select the number of the remote node one to eight that is the gateway of this static route When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to sav...

Страница 365: ... mapping Many to One and Server See section 32 3 1 for a detailed description of the NAT set for SUA The Prestige also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types 1 Choose SUA Only if you have just one public WAN IP address for your Prestige 2 Choose Full Feature if you have multiple public WAN IP addr...

Страница 366: ...ove the cursor to the Edit IP Bridge field press SPACE BAR to select Yes and then press ENTER to bring up Menu 11 3 Remote Node Network Layer Options Menu 4 Internet Access Setup ISP s Name MyISP Encapsulation RFC 1483 Multiplexing LLC based VPI 8 VCI 35 ATM QoS Type UBR Peak Cell Rate PCR 0 Sustain Cell Rate SCR 0 Maximum Burst Size MBS 0 My Login N A My Password N A ENET ENCAP Gateway N A IP Add...

Страница 367: ...SUA Only 32 3 NAT Setup Use the address mapping sets menus and submenus to create the mapping table used to assign global addresses to computers on the LAN and the DMZ Set 255 is used for SUA When you select Full Feature in menu 4 or 11 3 the SMT will use Set 1 When you select SUA Only the SMT will use the pre configured Set 255 read only The server set is a list of LAN and DMZ servers mapped to e...

Страница 368: ...ets Enter 1 to bring up Menu 15 1 Address Mapping Sets Figure 32 4 Menu 15 1 Address Mapping Sets SUA Address Mapping Set Enter 255 to display the next screen see also section 32 1 1 The fields in this menu cannot be changed Menu 15 1 Address Mapping Sets 1 ACL Default Set 2 3 4 5 6 7 8 255 SUA read only Enter Menu Selection Number Enter Menu Selection Number Menu 15 NAT Setup 1 Address Mapping Se...

Страница 369: ...ding local IP address ILA If the rule is for all local IPs then the Start IP is 0 0 0 0 and the End IP is 255 255 255 255 255 255 255 255 Global Start IP This is the starting global IP address IGA If you have a dynamic IP enter 0 0 0 0 as the Global Start IP 0 0 0 0 Global End IP This is the ending global IP address IGA Type These are the mapping types Server allows us to specify multiple servers ...

Страница 370: ...e in the Set Name field means that this is a required field and you must enter a name for the set Figure 32 6 Menu 15 1 1 First Set If the Set Name field is left blank the entire set will be deleted The Type Local and Global Start End IPs are configured in menu 15 1 1 1 described later and the values are displayed here Ordering Your Rules Ordering your rules is important because the Prestige appli...

Страница 371: ...ing field Insert Before means to insert a rule before the rule selected The rules after the selected rule will then be moved down by one rule Delete means to delete the selected rule and then all the rules after the selected one will be advanced one rule None disables the Select Rule item Edit Select Rule When you choose Edit Insert Before or Delete in the previous field the cursor jumps to this f...

Страница 372: ...al IP fields MUST be set for Server Start This is the starting local IP address ILA 0 0 0 0 End This is the ending local IP address ILA If the rule is for all local IPs then put the Start IP as 0 0 0 0 and the End IP as 255 255 255 255 This field is N A for One to One and Server types N A Global IP Start This is the starting inside global IP address IGA If you have a dynamic IP enter 0 0 0 0 as th...

Страница 373: ...or press ESC to cancel and go back to the previous screen 32 4 Configuring a Server behind NAT Follow these steps to configure a server behind NAT Step 4 Enter 15 in the main menu to go to Menu 15 NAT Setup Step 5 Enter 2 to display Menu 15 2 NAT Server Sets as shown next Figure 32 8 Menu 15 2 NAT Server Setup Step 6 Enter 1 to go to Menu 15 2 1 NAT Server Setup as follows Menu 15 2 NAT Server Set...

Страница 374: ...ld In the following figure you have a computer acting as an FTP Telnet and SMTP server ports 21 23 and 25 at 192 168 1 33 Step 9 Press ENTER at the Press ENTER to confirm prompt to save your configuration after you define all the servers or press ESC at any time to cancel Menu 15 2 1 NAT Server Setup Rule Start Port No End Port No IP Address 1 Default Default 0 0 0 0 2 21 25 192 168 1 33 3 0 0 0 0...

Страница 375: ...l NAT Examples The following are some examples of NAT configuration 32 5 1 Example 1 Internet Access Only In the following Internet access example you only need one rule where your ILAs Inside Local addresses all map to one dynamic IGA Inside Global Address assigned by your ISP Figure 32 11 NAT Example 1 ...

Страница 376: ... an Inside Server Figure 32 13 NAT Example 2 In this case you do exactly as above use the convenient pre configured SUA Only set and also go to menu 15 2 to specify the Inside Server behind the NAT as shown in the next figure Menu 4 Internet Access Setup ISP s Name MyISP Encapsulation RFC 1483 Multiplexing LLC based VPI 8 VCI 35 ATM QoS Type UBR Peak Cell Rate PCR 0 Sustain Cell Rate SCR 0 Maximum...

Страница 377: ...e first inside FTP server for FTP traffic in both directions 1 1 mapping giving both local and global IP addresses Rule 2 Map the second IGA to our second inside FTP server for FTP traffic in both directions 1 1 mapping giving both local and global IP addresses Rule 3 Map the other outgoing LAN traffic to IGA3 Many 1 mapping Rule 4 You also map your third IGA to the web server and mail server on t...

Страница 378: ...er 1 to configure the Address Mapping Sets Step 4 Enter 1 to begin configuring this new set Enter a Set Name choose the Edit Action and then enter 1 for the Select Rule field Press ENTER to confirm Step 5 Select Type as One to One direct mapping for packets going both ways and enter the local Start IP as 192 168 1 10 the IP address of FTP Server 1 the global Start IP as 10 132 50 1 our first IGA S...

Страница 379: ... Start 10 132 50 1 End N A Server Mapping Set N A Press ENTER to Confirm or ESC to Cancel Press Space Bar to Toggle Menu 11 3 Remote Node Network Layer Options IP Options Bridge Options IP Address Assignment Static Ethernet Addr Timeout min 0 Rem IP Addr 0 0 0 0 Rem Subnet Mask 0 0 0 0 My WAN Addr 0 0 0 0 NAT Full Feature Address Mapping Set 2 Metric 2 Private No RIP Direction Both Version RIP 2B ...

Страница 380: ... NAT Setup Step 10 Enter 1 in Menu 15 2 NAT Server Sets to see the following menu Configure it as shown Menu 15 1 1 Address Mapping Rules Set Name Example3 Idx Local Start IP Local End IP Global Start IP Global End IP Type 1 192 168 1 10 10 132 50 1 1 1 2 192 168 1 11 10 132 50 2 1 1 3 0 0 0 0 255 255 255 255 10 132 50 3 M 1 4 10 132 50 3 Server 5 6 7 8 9 10 Action Edit Select Rule Press ENTER to ...

Страница 381: ...ing as port numbers do not change for Many to Many No Overload and One to One NAT mapping types The following figure illustrates this Figure 32 19 NAT Example 4 Menu 15 2 1 NAT Server Setup Rule Start Port No End Port No IP Address 1 Default Default 0 0 0 0 2 80 80 192 168 1 21 3 25 25 192 168 1 20 4 0 0 0 0 0 0 5 0 0 0 0 0 0 6 0 0 0 0 0 0 7 0 0 0 0 0 0 8 0 0 0 0 0 0 9 0 0 0 0 0 0 10 0 0 0 0 0 0 1...

Страница 382: ...u ve configured your rule you should be able to check the settings in menu 15 1 1 as shown next Figure 32 21 Example 4 Menu 15 1 1 Address Mapping Rules Menu 15 1 1 1 Address Mapping Rule Type Many to Many No Overload Local IP Start 192 168 1 10 End 192 168 1 12 Global IP Start 10 132 50 1 End 10 132 50 3 Server Mapping Set N A Press ENTER to Confirm or ESC to Cancel Menu 15 1 1 Address Mapping Ru...

Страница 383: ...r the most comprehensive firewall configuration tool your Prestige has to offer For this reason it is recommended that you configure your firewall using the web configurator see the following chapters for instructions SMT screens allow you to activate the firewall and view firewall logs 33 3 Enabling the Firewall From the main menu enter 21 to go to Menu 21 Filter Set and Firewall Configuration to...

Страница 384: ...attacks when it is active The default Policy sets 1 allow all sessions originating from the LAN to the WAN and 2 deny all sessions originating from the WAN to the LAN You may define additional Policy rules or modify existing ones but please exercise extreme caution in doing so Active Yes LAN to WAN Set Name ACL Default Set WAN to LAN Set Name ACL Default Set Please configure the Firewall function ...

Страница 385: ...NMP system security system information and diagnosis firmware and configuration file maintenance system maintenance remote management IP Policy Routing and call scheduling See the web configurator parts of this guide for background information on features configurable by web configurator and SMT ...

Страница 386: ......

Страница 387: ... are divided into incoming and outgoing filters depending on the direction of the packet relative to a port Data filtering can be applied on either the WAN side or the Ethernet side Call filtering is used to determine if a packet should be allowed to trigger a call Outgoing packets must undergo data filtering before they encounter call filtering Call filters are divided into two groups the built i...

Страница 388: ...figures that follow The following figure illustrates the logic flow when executing a filter rule Data Outgoing Packet Drop packet Built in default Call Filters User defined Call Filters if applicable Initiate call if line not up Active Data Send packet and reset Idle Timer Or Or Drop packet if line not up Drop packet if line not up Send packet but do not reset Idle Timer Send packet but do not res...

Страница 389: ...able Fetch Next Filter Set Next Filter Set Available Accept Packet Drop Packet Yes No Yes No Yes Packet intoFilter Filter Set Forward Drop No Check Next Rule Figure 34 2 Filter Rule Process You can apply up to four filter sets to a particular port to block various types of packets Because each filter set can have up to six rules you can have a maximum of 24 rules active for a single port ...

Страница 390: ... Step 1 Enter 21 in the main menu to display Menu 21 Filter and Firewall Setup Step 2 Enter 1 to display Menu 21 1 Filter Set Configuration as shown next Figure 34 3 Menu 21 Filter Set Configuration Step 3 Type the filter set to configure no 1 to 12 and press ENTER Step 4 Type a descriptive name or comment in the Edit Comments field and press ENTER Step 5 Press ENTER at the message Press ENTER to ...

Страница 391: ...0 0 0 DA 0 0 0 0 DP 139 N D N 4 Y IP Pr 17 SA 0 0 0 0 DA 0 0 0 0 DP 137 N D N 5 Y IP Pr 17 SA 0 0 0 0 DA 0 0 0 0 DP 138 N D N 6 Y IP Pr 17 SA 0 0 0 0 DA 0 0 0 0 DP 139 N D F Enter Filter Rule Number 1 6 to Configure Menu 21 1 3 Filter Rules Summary A Type Filter Rules M m n 1 Y IP Pr 17 SA 0 0 0 0 SP 137 DA 0 0 0 0 DP 53 N D F 2 N 3 N 4 N 5 N 6 N Enter Filter Rule Number 1 6 to Configure Menu 21 1...

Страница 392: ...taken until the rule chain is complete N means there are no more rules to check You can specify an action to be taken for instance forward the packet drop the packet or check the next rule For the latter the next rule is independent of the rule just checked m Action Matched F means to forward the packet immediately and skip checking the remaining rules D means to drop the packet N means to check t...

Страница 393: ...To speed up filtering all rules in a filter set must be of the same class for instance protocol filters or generic filters The class of a filter set is determined by the first rule that you create When applying the filter sets to a port separate menu fields are provided for protocol and device filter sets If you include a protocol filter set in a device filters field or vice versa the Prestige wil...

Страница 394: ... filter rule No default IP Protocol This is the upper layer protocol for example TCP is 6 UDP is 17 and ICMP is 1 The value must be between 0 and 255 A value of O matches ANY protocol 0 to 255 IP Source Route IP Source Route is an optional header that dictates the route an IP packet takes from its source to its destination If Yes the rule applies to any packet with an IP source route The majority ...

Страница 395: ...eld IP mask Port Type the source port of the packets you want to filter The range of this field is 0 to 65535 A 0 field is ignored 0 to 65535 Port Comp Select the comparison to apply to the source port in the packet against the value given in Source Port field Choices are None Less Greater Equal or Not Equal None TCP Estab This applies only when the IP Protocol field is 6 TCP If Yes the rule match...

Страница 396: ...rd or Drop Check Next Rule default Action Not Matched Select the action for a packet not matching the rule Choices are Check Next Rule Forward or Drop Check Next Rule default When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to the previous screen The following figure illustrates the log...

Страница 397: ...ter Active Check IP Protocol Drop Drop Packet Accept Packet Drop Forward Check Next Rule Check Next Rule Check Next Rule Forward Not Matched Yes No Check Src IP Addr Apply SrcAddrMask to Src Addr Matched Check Dest IP Addr Apply DestAddrMask to Dest Addr Not Matched Not Matched Check Src Dest Port Matched Not Matched Figure 34 8 Executing an IP Filter ...

Страница 398: ...Mask and Value fields are specified in hexadecimal numbers Note that it takes two hexadecimal digits to represent a byte so if the length is 4 the value in either field will take 8 digits for example FFFFFFFF To configure a generic rule select an empty filter set in menu 21 for example 5 Select Generic Filter Rule in the Filter Type field and press ENTER to open Menu 21 1 5 1 Generic Filter Rule a...

Страница 399: ...ly to the data portion before comparison Value Type the value in Hexadecimal to compare with the data portion More If Yes a matching packet is passed to the next filter rule before an action is taken or else the packet is disposed of according to the action fields If More is Yes then Action Matched and Action Not Matched will be N A No default Log Select the logging option from the following None ...

Страница 400: ... the exact address and port on the wire Therefore the Prestige applies the protocol filters to the native IP address and port number before NAT for outgoing packets and after NAT for incoming packets On the other hand the generic or device filters are applied to the raw packets that appear on the wire They are applied at the point where the Prestige is receiving and sending the packets for instanc...

Страница 401: ...e Telnet Filter Step 1 Enter 1 in the menu 21 to display Menu 21 1 Filter Set Configuration Step 2 Enter the index number of the filter set you want to configure in this case 6 Step 3 Type a descriptive name or comment in the Edit Comments field for example TELNET_WAN and press ENTER ...

Страница 402: ... Mask 0 0 0 0 Port Port Comp Equal TCP Estab No More No Log None Action Matched Drop Action Not Matched Forward Press ENTER to Confirm or ESC to Cancel Press SPACE BAR to choose this filter rule type The first filter rule type determines all subsequent filter types within a set Select Yes to make the rule active 6 is the TCP protocol The port number for the telnet service TCP protocol is 23 See RF...

Страница 403: ...tion shows you where to apply the filter s after you design it them Sets of factory default filter rules have been configured in menu 21 but have not been applied to filter traffic Menu 21 1 6 Filter Rules Summary A Type Filter Rules M m n 1 Y IP Pr 6 SA 0 0 0 0 DA 0 0 0 0 DP 23 N D F 2 N 3 N 4 N 5 N 6 N Enter Filter Rule Number 1 6 to Configure 1 M N means an action can be taken immediately The a...

Страница 404: ...you want to apply as appropriate You can choose up to four filter sets from twelve by typing their numbers separated by commas for example 3 4 6 11 The factory default filter set NetBIOS_LAN is inserted in the protocol filters field under Input Filter Sets in menu 3 1 in order to prevent local NetBIOS messages from triggering calls to the DNS server Figure 34 14 Filtering Ethernet Traffic 34 7 2 R...

Страница 405: ... PPPoA or PPPoE encapsulation Menu 11 5 Remote Node Filter Input Filter Sets protocol filters 6 device filters Output Filter Sets protocol filters 2 device filters Call Filter Sets Protocol filters Device filters Enter here to CONFIRM or ESC to CANCEL Apply filter 6 to block Tel FTP and Web traffic from the WAN Apply filter 2 to block NETBIOS traffic to the WAN ...

Страница 406: ......

Страница 407: ...ces SNMP is a member of the TCP IP protocol suite Your Prestige supports SNMP agent functionality which allows a manager station to manage and monitor the Prestige through the network The Prestige supports SNMP version one SNMPv1 and version two c SNMPv2c The next figure illustrates an SNMP management operation SNMP is only available if TCP IP is configured Figure 35 1 SNMP Management Model An SNM...

Страница 408: ...response protocol based on the manager agent model The manager issues a request and the agent returns responses using the following protocol operations Get Allows the manager to retrieve an object variable from the agent GetNext Allows the manager to retrieve the next object variable from a table or list within an agent In SNMPv1 when a manager wants to retrieve all elements of a table from an age...

Страница 409: ...ur Prestige will only respond to SNMP messages from this address A blank default field means your Prestige will respond to all SNMP messages it receives regardless of source 0 0 0 0 Trap Community Type the trap community which is the password sent with each trap to the SNMP manager public Destination Type the IP address of the station to send your SNMP traps to 0 0 0 0 When you have completed this...

Страница 410: ...fined in RFC 1215 A trap is sent with the port number 5 authenticationFailure defined in RFC 1215 A trap is sent to the manager when receiving any SNMP gets or sets requirements with wrong community password 6 whyReboot defined in ZYXEL MIB A trap is sent with the reason of restart before rebooting when the system is going to restart warm start 6a For intentional reboot A trap is sent with the mes...

Страница 411: ... you forget your password you have to restore the default configuration file Refer to the section on changing the system password in the Introducing the SMT chapter and the section on resetting the Prestige in the Introducing the Web Configurator chapter Figure 36 1 Menu 23 System Security 36 1 2 Configuring External RADIUS Server From Menu 23 System Security enter 2 to display Menu 23 2 System Se...

Страница 412: ...ministrator instructs you to do so with additional information 1812 Shared Secret Specify a password up to 31 alphanumeric characters as the key to be shared between the external authentication server and the access points The key is not sent over the network This key must be the same on the external authentication server and Prestige Accounting Server Active Press SPACE BAR to select Yes and pres...

Страница 413: ...nting server and Prestige When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to the previous screen 36 1 3 IEEE802 1x The IEEE802 1x standards outline enhanced security methods for both the authentication of wireless stations and encryption key management The WPA function is not available...

Страница 414: ...he wired network The following fields are not available when you select No Authentication Required or No Access Allowed ReAuthentica tion Timer in second Specify how often a client has to re enter username and password to stay connected to the wired network This field is activated only when you select Authentication Required in the Wireless Port Control field Enter a time interval between 10 and 9...

Страница 415: ... Key Exchange This field is not available when you set Key Management Protocol to WPA or WPA PSK PSK Type a pre shared key from 8 to 63 case sensitive ASCII characters including spaces and symbols when you select WPA PSK in the Key Management Protocol field WPA Mixed Mode Select Enable to activate WPA mixed mode Otherwise select Disable and configure Group Data Privacy field Data Privacy for Broad...

Страница 416: ... the user database on the Prestige for a wireless station s username and password If the user name is not found the Prestige then checks the user database on the specified RADIUS server Select RADIUS first then Local to have the Prestige first check the user database on the specified RADIUS server for a wireless station s username and password If the Prestige cannot reach the RADIUS server the Pre...

Страница 417: ...ters long for this user profile When you have completed this menu press ENTER at the prompt Press ENTER to confirm or ESC to cancel to save your configuration or press ESC to cancel and go back to the previous screen Menu 14 Dial in User Setup 1 ________ 9 ________ 17 ________ 25 ________ 2 ________ 10 ________ 18 ________ 26 ________ 3 ________ 11 ________ 19 ________ 27 ________ 4 ________ 12 __...

Страница 418: ......

Страница 419: ...em Status is a tool that can be used to monitor your Prestige Specifically it gives you information on your ADSL telephone line status number of packets sent and received To get to System Status type 24 to go to Menu 24 System Maintenance From this menu type 1 System Status There are two commands in Menu 24 1 System Maintenance Status Entering 1 resets the counters ESC takes you back to the previo...

Страница 420: ...in bytes per second Rx B s This shows the receiving rate in bytes per second Up Time This is the time this channel has been connected to the current remote node My WAN IP from ISP This is the IP address of the ISP remote node Ethernet This shows statistics for the LAN Status This shows the current status of the LAN Menu 24 1 System Maintenance Status 02 07 37 Sat Jan 01 2000 Node Lnk Status TxPkts...

Страница 421: ...his shows the upstream transfer rate in kbps Downstream Speed This shows the downstream transfer rate in kbps CPU Load This specifies the percentage of CPU utilization 37 2 System Information To get to the System Information Step 3 Enter 24 to display Menu 24 System Maintenance Step 4 Enter 2 to display Menu 24 2 System Information Step 5 From this menu you have two choices as shown in the next fi...

Страница 422: ... Vendor Displays the vendor of the ADSL chipset and DSL version Standard This refers to the operational protocol the Prestige and the DSLAM Digital Subscriber Line Access Multiplexer are using LAN Ethernet Address Refers to the Ethernet MAC Media Access Control of your Prestige IP Address This is the IP address of the Prestige in dotted decimal notation IP Mask This shows the subnet mask of the Pr...

Страница 423: ... to the Prestige 37 3 Log and Trace There are two logging facilities in the Prestige The first is the error logs and trace records that are stored locally The second is the UNIX syslog facility for message logging 37 3 1 Viewing Error Log The first place you should look for clues when something goes wrong is the error log Follow the procedures to view the local error trace log Step 1 Type 24 in th...

Страница 424: ...rm or ESC to Cancel Press Space Bar to Toggle 48 Sat Jan 01 00 00 02 2000 PP09 WARN SNMP TRAP 3 link up 49 Sat Jan 01 00 00 02 2000 PP10 WARN Last errorlog repeat 2 Times 50 Sat Jan 01 00 00 02 2000 PP10 INFO LAN promiscuous mode 0 51 Sat Jan 01 00 00 02 2000 PP10 INFO LAN promiscuous mode 1 52 Sat Jan 01 00 00 02 2000 PP10 INFO LAN promiscuous mode 0 53 Sat Jan 01 00 00 02 2000 PP10 INFO Last err...

Страница 425: ...nel Connected L2TP C02 OutCall Connected xxxx connected speed xxxxx Remote Call ID C02 CLID call refused L02 Call Terminated C02 Call Terminated Jul 19 11 19 27 192 168 102 2 ZYXEL board 0 line 0 channel 0 call 1 C01 Outgoing Call dev 2 ch 0 40002 Jul 19 11 19 32 192 168 102 2 ZYXEL board 0 line 0 channel 0 call 1 C02 OutCall Connected 64000 40002 Jul 19 11 20 06 192 168 102 2 ZYXEL board 0 line 0...

Страница 426: ... ppp IPCP Closing Jul 19 11 42 54 192 168 102 2 ZYXEL ppp CCP Closing 37 4 Diagnostic The diagnostic facility allows you to test the different aspects of your Prestige to determine if it is working properly Menu 24 4 allows you to choose among various types of diagnostic tests to evaluate your system as shown in the following figure Follow the procedure next to get to Diagnostic Step 1 From the ma...

Страница 427: ...c FIELD DESCRIPTION Ping Host Ping the host to see if the links and TCP IP protocol on both systems are working Reboot System Reboot the Prestige Command Mode Type the mode to test and diagnose your Prestige using specified commands Host IP Address If you typed 12 to Ping Host now type the address of the computer you want to ping ...

Страница 428: ......

Страница 429: ...Refer to the label on the bottom of your Prestige ftp put firmware bin ras This is a sample FTP session showing the transfer of the computer file firmware bin to the Prestige ftp get rom 0 config cfg This is a sample FTP session saving the current configuration to the computer file config cfg If your T FTP client does not allow you to have a destination filename different than the source you will ...

Страница 430: ...d upload files in menus 24 5 24 6 24 7 1 and 24 7 2 depending on whether you use the console port or Telnet Option 5 from Menu 24 System Maintenance allows you to backup the current Prestige configuration to your computer Backup is highly recommended once your Prestige is functioning properly FTP is the preferred methods for backing up your current configuration to your computer since they are fas...

Страница 431: ...ration file on the Prestige to your computer and renames it config rom See earlier in this chapter for more information on filename conventions Step 7 Enter quit to exit the ftp prompt 38 2 3 Example of FTP Commands from the Command Line Menu 24 5 System Maintenance Backup Configuration To transfer the configuration file to your workstation follow the procedure below 1 Launch the FTP client on you...

Страница 432: ...res a unique User ID and Password to login Transfer Type Transfer files in either ASCII plain text format or in binary mode Configuration and firmware files should be transferred in binary mode Initial Remote Directory Specify the default remote directory path Initial Local Directory Specify the default local directory path 38 2 5 TFTP and FTP over WAN Management Limitations TFTP FTP and Telnet ov...

Страница 433: ...ys stdio 0 to disable the SMT timeout so the TFTP transfer will not be interrupted Enter command sys stdio 5 to restore the five minute SMT timeout default when the file transfer is complete Step 4 Launch the TFTP client on your computer and connect to the Prestige Set the transfer mode to binary before starting data transfer Step 5 Use the TFTP client see the example below to transfer files betwe...

Страница 434: ...estige The filename for the firmware is ras and for the configuration file is rom 0 Binary Transfer the file in binary mode Abort Stop transfer of the file Refer to section 38 2 5 to read about configurations that disallow TFTP and FTP over WAN 38 2 9 Backup Via Console Port Back up configuration via console port by following the HyperTerminal procedure shown next Procedures using other serial com...

Страница 435: ...o restore a previously saved configuration Note that this function erases the current configuration before restoring a previous back up configuration please do not attempt to restore unless you have a backup configuration file stored on disk FTP is the preferred method for restoring your current computer configuration to your Prestige since FTP is faster Please note that you must wait for the syst...

Страница 436: ...n file config rom on your computer to the Prestige See earlier in this chapter for more information on filename conventions Step 8 Enter quit to exit the ftp prompt The Prestige will automatically restart after a successful restore process Menu 24 6 System Maintenance Restore Configuration To transfer the firmware and configuration file to your workstation follow the procedure below 1 Launch the F...

Страница 437: ...isplay menu 24 6 and enter y at the following screen Figure 38 9 System Maintenance Restore Configuration Step 2 The following screen indicates that the Xmodem download has started Figure 38 10 System Maintenance Starting Xmodem Download Screen Step 3 Run the HyperTerminal program by clicking Transfer then Send File as shown in the following screen ftp put config rom rom 0 200 Port command okay 15...

Страница 438: ... the previous Restore Configuration section or by following the instructions in Menu 24 7 2 System Maintenance Upload System Configuration File for console port WARNING DO NOT INTERRUPT THE FILE TRANSFER PROCESS AS THIS MAY PERMANENTLY DAMAGE YOUR PRESTIGE 38 4 1 Firmware File Upload FTP is the preferred method for uploading the firmware and configuration To use this feature your computer must hav...

Страница 439: ...y after the upload system configuration file process is complete For details on FTP commands please consult the documentation of your FTP client program For details on uploading system firmware using TFTP note that you must remain on this menu to upload system firmware using TFTP please see your manual Press ENTER to Exit Menu 24 7 1 System Maintenance Upload System Firmware To upload the system f...

Страница 440: ... the configuration file on the Prestige to your computer and renames it config rom See earlier in this chapter for more information on filename conventions Step 7 Enter quit to exit the ftp prompt The Prestige automatically restarts after a successful file upload 38 4 4 FTP Session Example of Firmware File Upload Figure 38 15 FTP Session Example of Firmware File Upload More commands found in GUI b...

Страница 441: ...e active and the Prestige in CI mode before and during the TFTP transfer For details on TFTP commands see following example please consult the documentation of your TFTP client program For UNIX use get to transfer from the Prestige to the computer put the other way around and binary to set binary transfer mode 38 4 6 TFTP Upload Command Example The following is an example TFTP command tftp i host ...

Страница 442: ...s should be similar 38 4 9 Example Xmodem Firmware Upload Using HyperTerminal Click Transfer then Send File to display the following screen Figure 38 17 Example Xmodem Upload After the configuration upload process has completed restart the Prestige by entering atgo Menu 24 7 1 System Maintenance Upload System Firmware To upload system firmware 1 Enter y at the prompt below to go into debug mode 2 ...

Страница 443: ...ige 38 4 11 Example Xmodem Configuration Upload Using HyperTerminal Click Transfer then Send File to display the following screen Menu 24 7 2 System Maintenance Upload System Configuration File To upload system configuration file 1 Enter y at the prompt below to go into debug mode 2 Enter atlc after Enter Debug Mode message 3 Wait for Starting XMODEM upload message before activating Xmodem upload ...

Страница 444: ...ration File Maintenance Figure 38 19 Example Xmodem Upload After the configuration upload process has completed restart the Prestige by entering atgo Type the configuration file s location or click Browse to search for it Choose the Xmodem protocol Then click Send ...

Страница 445: ...24 8 See the included disk or the zyxel com web site for more detailed information on CI commands Enter 8 from Menu 24 System Maintenance A list of valid commands can be found by typing help or at the command prompt Type exit to return to the SMT main menu when finished Figure 39 1 Command Mode in Menu 24 Menu 24 System Maintenance 1 System Status 2 System Information and Console Port Speed 3 Log ...

Страница 446: ... will be blocked To access the call control menu select option 9 in menu 24 to go to Menu 24 9 System Maintenance Call Control as shown in the next table Figure 39 3 Menu 24 9 System Maintenance Call Control 39 2 1 Budget Management Menu 24 9 1 shows the budget management statistics for outgoing calls Enter 1 from Menu 24 9 System Maintenance Call Control to bring up the following menu Menu 24 9 S...

Страница 447: ...n is selected Table 39 1 Menu 24 9 1 System Maintenance Budget Management FIELD DESCRIPTION EXAMPLE Remote Node Enter the index number of the remote node you want to reset just one in this case 1 Connection Time Total Budget This is the total connection time that has gone by within the allocated budget that you set in menu 11 1 5 10 means that 5 minutes out of a total allocation of 10 minutes have...

Страница 448: ...ance Time and Date Setting to update the time and date settings of your Prestige as shown in the following screen Figure 39 6 Menu 24 10 System Maintenance Time and Date Setting Menu 24 10 System Maintenance Time and Date Setting Use Time Server when Bootup None Time Server Address N A Current Time 00 00 00 New Time hh mm ss 11 23 16 Current Date 2000 01 01 New Date yyyy mm dd 2001 03 01 Time Zone...

Страница 449: ...e unsure of this information Current Time This field displays an updated time only when you reenter this menu New Time Enter the new time in hour minute and second format Current Date This field displays an updated date only when you re enter this menu New Date Enter the new date in year month and day format Time Zone Press SPACE BAR and then ENTER to set the time difference between your time zone...

Страница 450: ......

Страница 451: ...access See the firewall chapters for details on configuring firewall rules 40 2 Remote Management To disable remote management of a service select Disable in the corresponding Server Access field Enter 11 from menu 24 to display Menu 24 11 Remote Management Control 40 2 1 Remote Management Setup You may manage your Prestige from a remote location via the Internet WAN only the LAN only All LAN and ...

Страница 452: ...if any by pressing the SPACE BAR Choices are LAN only WAN only All or Disable The default is LAN only LAN only Secured Client IP The default 0 0 0 0 allows any client to use this service or protocol to access the Prestige Enter an IP address to restrict access to a client with a matching IP address 0 0 0 0 Once you have filled in this menu press ENTER at the message Press ENTER to Confirm or ESC t...

Страница 453: ...agement session with an equal or higher priority running You may only have one remote management session running at one time 5 There is a firewall rule that blocks it 40 3 Remote Management and NAT When NAT is enabled Use the Prestige s WAN IP address when configuring from the WAN Use the Prestige s LAN IP address when configuring from the LAN 40 4 System Timeout There is a default system manageme...

Страница 454: ......

Страница 455: ...hery of the network to enable the backbone to prioritize traffic Cost Savings IPPR allows organizations to distribute interactive traffic on high bandwidth high cost paths while using low cost paths for batch traffic Load Sharing Network administrators can use IPPR to distribute traffic among multiple paths 41 3 Routing Policy Individual routing policies are used as part of the overall IPPR proces...

Страница 456: ...e the index of the policy set you want to configure to open Menu 25 1 IP Routing Policy Setup Menu 25 1 shows the summary of a policy set including the criteria and the action of a single policy and whether a policy is active or not Each policy contains two lines The former part is the criteria of the incoming packet and the latter is the action Between these two parts separator means the action i...

Страница 457: ... 6 T NM PR 0 GW 192 168 1 1 T MT PR 0 2 N __________________________________________________________________________ __________________________________________________________________________ 3 N __________________________________________________________________________ __________________________________________________________________________ 4 N __________________________________________________...

Страница 458: ...ER to select Yes to activate or No to deactivate the policy Inactive policies are displayed with a minus sign in SMT menu 25 Criteria IP Protocol IP layer 4 protocol for example UDP TCP ICMP etc Type of Service Prioritize incoming network traffic by choosing from Don t Care Normal Min Delay Max Thruput Min Cost or Max Reliable Menu 25 1 1 IP Routing Policy Policy Set Name test Active Yes Criteria ...

Страница 459: ...uld be taken on criteria Matched or Not Matched Gateway addr Defines the outgoing gateway address The gateway must be on the same subnet as the Prestige if it is on the LAN otherwise the gateway must be the IP address of a remote node The default gateway is specified as 0 0 0 0 Type of Service Set the new TOS value of the outgoing packet Prioritize incoming network traffic by choosing No Change No...

Страница 460: ...IP Address Assignment Static Ethernet Addr Timeout min 0 Rem IP Addr 0 0 0 0 Rem Subnet Mask 0 0 0 0 My WAN Addr 0 0 0 0 NAT Full Feature Address Mapping Set 2 Metric 2 Private No RIP Direction Both Version RIP 2B Multicast IGMP v2 IP Policies 2 4 7 9 Press ENTER to Confirm or ESC to Cancel Type IP Policy sets here Menu 3 2 TCP IP and DHCP Ethernet Setup DHCP Setup DHCP None Client IP Pool Startin...

Страница 461: ... policy See the next figure Route 1 represents the default IP route and route 2 represents the configured IP route Figure 41 6 Example of IP Policy Routing To force Web packets coming from clients with IP addresses of 192 168 1 33 to 192 168 1 64 to be routed to the Internet via the WAN port of the Prestige follow the steps as shown next Step 1 Create a routing policy set in menu 25 Step 2 Create ...

Страница 462: ...t with protocol TCP and port FTP access through another gateway 192 168 1 100 Menu 25 1 1 IP Routing Policy Policy Set Name set1 Active Yes Criteria IP Protocol 6 Type of Service Don t Care Packet length 10 Precedence Don t Care Len Comp N A Source addr start 192 168 1 33 end 192 168 1 64 port start 0 end N A Destination addr start 0 0 0 0 end N A port start 80 end 80 Action Matched Gateway addr 1...

Страница 463: ...mote DHCP Server N A TCP IP Setup IP Address 192 168 1 1 IP Subnet Mask 255 255 255 0 RIP Direction Both Version RIP 1 Multicast None IP Policies 1 2 Edit IP Alias No Press ENTER to Confirm or ESC to Cancel Press Space Bar to Toggle Menu 25 1 1 IP Routing Policy Policy Set Name set2 Active Yes Criteria IP Protocol 6 Type of Service Don t Care Packet length 10 Precedence Don t Care Len Comp N A Sou...

Страница 464: ......

Страница 465: ...own next Figure 42 1 Menu 26 Schedule Setup Lower numbered sets take precedence over higher numbered sets thereby avoiding scheduling conflicts For example if sets 1 2 3 and 4 in are applied in the remote node then set 1 will take precedence over set 2 3 and 4 as the Prestige by default applies the lowest numbered set first Set 2 will take precedence over set 3 and 4 and so on You can design up to...

Страница 466: ...se Yes and press ENTER to activate the schedule set Yes Start Date Enter the start date when you wish the set to take effect in year month date format Valid dates are from the present to 2036 February 5 2000 01 01 How Often Should this schedule set recur weekly or be used just once only Press the SPACE BAR and then ENTER to select Once or Weekly Both these options are mutually exclusive If Once is...

Страница 467: ...t the connection is maintained whether or not there is a demand call on the line and will persist for the time period specified in the Duration field Forced Down means that the connection is blocked whether or not there is a demand call on the line Enable Dial On Demand means that this schedule permits a demand call on the line Disable Dial On Demand means that this schedule prevents a demand call...

Страница 468: ... Rem Node Name MyISP Route IP Active Yes Bridge No Encapsulation PPPoE Edit IP Bridge No Multiplexing LLC based Edit ATM Options No Service Name Edit Advance Options No Incoming Telco Option Rem Login Allocated Budget min 0 Rem Password Period hr 0 Outgoing Schedule Sets 1 2 3 4 My Login user isp ch Nailed Up Connection No My Password Session Options Authen CHAP PAP Edit Filter Sets No Idle Timeou...

Страница 469: ...PTGEN This part provides information about configuring VPN IPSec for secure communications and Internal SPTGEN for configuration of multiple Prestiges See the web configurator parts of this guide for background information on features configurable by web configurator and SMT ...

Страница 470: ......

Страница 471: ...hese main submenus 1 Define VPN policies in menu 27 1 submenus including security policies endpoint IP addresses peer IPSec router IP address and key management 2 Menu 27 2 SA Monitor allows you to manage refresh or disconnect your SA connections This is an overview of the VPN menu tree Figure 43 1 VPN SMT Menu Tree From the main menu enter 27 to display the first VPN menu shown next ...

Страница 472: ...ary FIELD DESCRIPTION EXAMPLE This is the VPN policy index number 1 Menu 27 VPN IPSec Setup 1 IPSec Summary 2 SA Monitor Enter Menu Selection Number Menu 27 1 IPSec Summary Name A Local Addr Start Addr End Mask Encap IPSec Algorithm Key Mgt Remote Addr Start Addr End Mask Secure GW Addr 001 Taiwan Y 192 168 1 35 192 168 1 38 Tunnel ESP AES MD5 IKE 172 16 2 40 172 16 2 46 193 81 13 2 002 zw50 N 1 1...

Страница 473: ... address in a range of computers on the LAN behind your Prestige When the Addr Type field in Menu 27 1 1 IPSec Setup is configured to SUBNET this is a subnet mask on the LAN behind your Prestige 192 168 1 38 Encap This field displays Tunnel mode or Transport mode See earlier for a discussion of these You need to finish configuring the VPN policy in menu 27 1 1 1 or 27 1 1 2 if is displayed Tunnel ...

Страница 474: ... Secure Gateway Address field in SMT 27 1 1 to 0 0 0 0 172 16 2 40 Addr End Mask When the Addr Type field in Menu 27 1 1 IPSec Setup is configured to Single this is the same static IP address as in the Remote Addr Start field When the Addr Type field in Menu 27 1 1 IPSec Setup is configured to Range this is the end static IP address in a range of computers on the network behind the remote IPSec ro...

Страница 475: ...ge When a VPN rule is deleted subsequent rules do not move up in the page list Use Go To Rule to view the page where your desired rule is listed Select Next Page or Previous Page to view the next or previous page of rules respectively None Select Rule Type the VPN rule index number you wish to edit or delete and then press ENTER 3 When you have completed this menu press ENTER at the prompt Press E...

Страница 476: ...ves the firewall Yes Keep Alive Press SPACE BAR to choose either Yes or No Choose Yes and press ENTER to have the Prestige automatically re initiate the SA after the SA lifetime times out even if there is no traffic The remote IPSec router must also have keep alive enabled in order for this feature to work No Menu 27 1 1 IPSec Setup Index 1 Name Taiwan Active Yes Keep Alive No Nat Traversal No Loc...

Страница 477: ...an e mail address Content When you select IP in the Local ID Type field type the IP address of your computer or leave the field blank to have the Prestige automatically use its own IP address When you select DNS in the Local ID Type field type a domain name up to 31 characters by which to identify this Prestige When you select E mail in the Local ID Type field type an e mail address up to 31 chara...

Страница 478: ...re making the VPN connection Set this field to 0 0 0 0 if the remote IPSec router has a dynamic WAN IP address the Key Management field must be set to IKE see later Zw50test com tw Protocol Enter 1 for ICMP 6 for TCP 17 for UDP etc 0 is the default and signifies any protocol 0 DNS Server If there is a private DNS server that services the VPN type its IP address here The Prestige assigns this addit...

Страница 479: ...not create a VPN tunnel if you try to connect using a port number that does not match this port number or range of port numbers Some of the most common IP ports are 21 FTP 53 DNS 23 Telnet 80 HTTP 25 SMTP 110 POP3 0 End Enter a port number in this field to define a port range This port number must be greater than that specified in the previous field This field is N A when 0 is configured in the Po...

Страница 480: ...gured to SUBNET enter a subnet mask on the network behind the remote IPSec router This field displays N A when you configure the Secure Gateway Address field to 0 0 0 0 255 255 0 0 Port Start 0 is the default and signifies any port Type a port number from 0 to 65535 Someone behind the remote IPSec router cannot create a VPN tunnel when attempting to connect using a port number that does not match ...

Страница 481: ...ou have completed this menu press ENTER at the prompt Press ENTER to Confirm to save your configuration or press ESC at any time to cancel 43 4 IKE Setup To edit this menu the Key Management field in Menu 27 1 1 IPSec Setup must be set to IKE Move the cursor to the Edit Key Management Setup field in Menu 27 1 1 IPSec Setup press SPACE BAR to select Yes and then press ENTER to display Menu 27 1 1 1...

Страница 482: ... on DES that uses a 168 bit key As a result 3DES is more secure than DES It also requires more processing power resulting in slightly increased latency and decreased throughput This implementation of AES uses a 128 bit key AES is faster than 3DES Press SPACE BAR to choose from DES 3DES or AES and then press ENTER AES Authentication Algorithm MD5 Message Digest 5 and SHA1 Secure Hash Algorithm are ...

Страница 483: ...Tunnel Perfect Forward Secrecy PFS Perfect Forward Secrecy PFS is disabled None by default in phase 2 IPSec SA setup This allows faster IPSec setup but is not so secure Press SPACE BAR and choose from DH1 or DH2 to enable PFS DH1 refers to Diffie Hellman Group 1 a 768 bit random number DH2 refers to Diffie Hellman Group 2 a 1024 bit 1Kb random number more secure yet slower None When you have compl...

Страница 484: ...se an AH Active Protocol SPI Decimal The SPI must be unique and from one to four integers 0 to 9 1234 Encryption Algorithm Press SPACE BAR to choose from NULL DES 3DES or AES and then press ENTER Fill in the Key1 field below when you choose DES and fill in fields Key1 to Key3 when you choose 3DES Select NULL to set up a tunnel without encryption When you select NULL you do not enter any encryption...

Страница 485: ...ication and 20 characters for SHA 1 authentication Any character may be used including spaces but trailing spaces are truncated 123456789a bcde AH Setup The AH Setup fields are N A if you chose an ESP Active Protocol SPI Decimal The SPI must be from one to four unique decimal characters 0 to 9 long N A Authentication Algorithm Press SPACE BAR to choose from MD5 or SHA1 and then press ENTER N A Key...

Страница 486: ......

Страница 487: ...ntil the SA lifetime period expires See the Web configurator part on keep alive to have the Prestige renegotiate an IPSec SA when the SA lifetime expires even if there is no traffic 44 2 Using SA Monitor 1 Use the Refresh function to display active VPN connections 2 Use the Disconnect function to cut off active connections Type 2 in Menu 27 VPN IPSec Setup and then press ENTER to go to Menu 27 2 S...

Страница 488: ...de 56 bit DES and 168 bit 3DES NULL denotes a tunnel without encryption An incoming SA may have an AH in addition to ESP The Authentication Header provides strong integrity and authentication by adding authentication information to IP packets This authentication information is calculated using header and payload data in the IP packet This provides an additional level of security AH choices are MD5...

Страница 489: ...ure save and upload multiple menus at the same time using just one configuration text file eliminating the need to navigate and configure individual SMT menus for each Prestige 45 2 The Configuration Text File Format All Internal SPTGEN text files conform to the following format field identification number field name parameter values allowed input where input is your input conforming to parameter ...

Страница 490: ... than 0 or 1 in the Input column of Field Identification Number 1000000 refer to Figure 45 1 Menu 1 General Setup 10000000 Configured 0 No 1 Yes 1 10000001 System Name Str Prestige 10000002 Location Str 10000003 Contact Person s Name Str 10000004 Route IP 0 No 1 Yes 1 10000005 Route IPX 0 No 1 Yes 0 10000006 Bridge 0 No 1 Yes 0 This is the Field Name column This is the name of the field as seen in...

Страница 491: ...sion V2 02 2 22 2001 13 33 11 RAM Size 8192 Kbytes FLASH Intel 8M 2 Please wait for the system to write SPT text file ROM t Bootbase Version V2 02 2 22 2001 13 33 11 RAM Size 8192 Kbytes FLASH Intel 8M 2 c ftp 192 168 1 1 220 PPP FTP version 1 0 ready at Sat Jan 1 03 22 12 2000 User 192 168 1 1 none 331 Enter PASS command Password 230 Logged in ftp bin 200 Type I OK ftp get rom t ftp bye c edit ro...

Страница 492: ...sion 1 0 ready at Sat Jan 1 03 22 12 2000 User 192 168 1 1 none 331 Enter PASS command Password 230 Logged in ftp bin 200 Type I OK ftp put rom t ftp bye 1 Launch your FTP application 2 Enter bin The command bin sets the transfer mode to binary 3 Upload your rom t file from your computer to the Prestige using the put command computer to the Prestige 4 Exit this FTP application ...

Страница 493: ...XII Part XII Appendices and Index This part contains additional background information and an index or key terms ...

Страница 494: ......

Страница 495: ...em In this case you should contact your vendor 1 Make sure the Prestige is connected to your computer s serial port VT100 terminal emulation 9600 bps is the default speed on leaving the factory Try other speeds in case the speed has been changed I cannot access the Prestige via the console port 2 Make sure the communications program is configured correctly The communications software should be con...

Страница 496: ...configurator or the System Information and Diagnosis chapter SMT Problems with the LAN Interface Chart A 4 Troubleshooting the LAN Interface PROBLEM CORRECTIVE ACTION I cannot access the Prestige from the LAN If the 10M 100M LEDs on the front panel are both off refer to Chart A 2 Troubleshooting the LAN LED Make sure that the IP address and the subnet mask of the Prestige and your computer s are o...

Страница 497: ...LEM CORRECTIVE ACTION I cannot access the Internet Make sure the Prestige is turned on and connected to the network If the DSL LED is off refer to Chart A 3 Troubleshooting the DSL LED Verify your WAN settings Refer to the WAN Setup chapter web configurator or the Internet Access chapter SMT Make sure you entered the correct user name and password If you use PPPoE pass through P652H HW make sure t...

Страница 498: ...onfigurator PROBLEM CORRECTIVE ACTION I cannot access the web configurator Refer to Chart A 7 Troubleshooting the Password Make sure that there is not an SMT console session running Check that you have enabled web service access If you have configured a secured client IP address your computer s IP address must match it Refer to the chapter on remote management for details For WAN access you must c...

Страница 499: ...when remote management may not be possible Use the Prestige s WAN IP address when configuring from the WAN Use the Prestige s LAN IP address when configuring from the LAN Refer to Chart A 4 Troubleshooting the LAN Interface for instructions on checking your LAN connection Refer to the Problems with the WAN Interface section for instructions on checking your WAN connection I cannot remotely manage ...

Страница 500: ......

Страница 501: ...0 in the next left most bit In a class B address the first two octets make up the network number and the two remaining octets make up the host ID Class C addresses begin starting from the left with 1 1 0 In a class C address the first three octets make up the network number and the last octet is the host ID Class D addresses begin with 1 1 1 0 Class D addresses are used for multicasting There is a...

Страница 502: ...subnet mask is used to determine which bits are part of the network number and which bits are part of the host ID using a logical AND operation A subnet mask has 32 bits each bit of the mask corresponds to a bit of the IP address If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit ...

Страница 503: ...C address using both notations Chart B 4 Alternative Subnet Mask Notation SUBNET MASK IP ADDRESS SUBNET MASK 1 BITS LAST OCTET BIT VALUE 255 255 255 0 24 0000 0000 255 255 255 128 25 1000 0000 255 255 255 192 26 1100 0000 255 255 255 224 27 1110 0000 255 255 255 240 28 1111 0000 255 255 255 248 29 1111 1000 255 255 255 252 30 1111 1100 The first mask shown is the class C natural mask Normally if n...

Страница 504: ... Mask Binary 11111111 11111111 11111111 10000000 Subnet Address 192 168 1 0 Lowest Host ID 192 168 1 1 Broadcast Address 192 168 1 127 Highest Host ID 192 168 1 126 Chart B 6 Subnet 2 NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask 255 255 255 128 Subnet Mask Binary 11111111 11111111 11111111 10000000 Subnet Address 192...

Страница 505: ... subnet Chart B 7 Subnet 1 NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 0 IP Address Binary 11000000 10101000 00000001 00000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 0 Lowest Host ID 192 168 1 1 Broadcast Address 192 168 1 63 Highest Host ID 192 168 1 62 Chart B 8 Subnet 2 NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 64 IP Address B...

Страница 506: ...cast Address 192 168 1 255 Highest Host ID 192 168 1 254 Example Eight Subnets Similarly use a 27 bit mask to create 8 subnets 001 010 011 100 101 110 The following table shows class C IP address last octet values for each subnet Chart B 11 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 16...

Страница 507: ...etermines which bits are part of the network number and which are part of the host ID A class B address has two host ID octets available for subnetting and a class A address has three host ID octets see Chart B 1 available for subnetting The following table is a summary for class B subnet planning Chart B 13 Class B Subnet Planning NO BORROWED HOST BITS SUBNET MASK NO SUBNETS NO HOSTS PER SUBNET 1...

Страница 508: ...lass B Subnet Planning NO BORROWED HOST BITS SUBNET MASK NO SUBNETS NO HOSTS PER SUBNET 25 10 255 255 255 192 26 1024 62 11 255 255 255 224 27 2048 30 12 255 255 255 240 28 4096 14 13 255 255 255 248 29 8192 6 14 255 255 255 252 30 16384 2 15 255 255 255 254 31 32768 1 ...

Страница 509: ...ove from meeting to meeting accessing up to date information that facilitates the ability to communicate decisions on the fly 5 It provides campus wide networking coverage allowing enterprises the roaming capability to set up easy to use wireless networks that transparently covers an entire campus IEEE 802 11 The 1997 completion of the IEEE 802 11 standard for wireless LANs WLANs was a first impor...

Страница 510: ...ommunication in an Ad hoc Network Infrastructure Wireless LAN Configuration For Infrastructure WLANs multiple access points APs link the WLAN to the wired network and allow users to efficiently share network resources The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood Multiple access points can provide wir...

Страница 511: ...Prestige 652H HW Series User s Guide Wireless LAN and IEEE 802 11 C 3 Diagram C 2 ESS Provides Campus Wide Coverage ...

Страница 512: ......

Страница 513: ...ices using PPP Benefits of PPPoE PPPoE offers the following benefits 1 It provides you with a familiar dial up networking DUN user interface 2 It lessens the burden on the carriers of provisioning virtual circuits all the way to the ISP on multiple switches for thousands of users For GSTN PSTN and ISDN the switching fabric is already in place 3 It allows the ISP to use the existing dial up model t...

Страница 514: ...he PPP frames to the ISP The L2TP tunnel is capable of carrying multiple PPP sessions With PPPoE the VC Virtual Circuit is equivalent to the dial up connection and is between the modem and the AC as opposed to all the way to the ISP However the PPP negotiation is between the PC and the ISP Prestige as a PPPoE Client When using the Prestige as a PPPoE client the PCs on the LAN see only Ethernet and...

Страница 515: ... between circuit end points Diagram E 1 Virtual Circuit Topology Think of a virtual path as a cable that contains a bundle of wires The cable connects two points and wires within the cable provide individual circuits between the two points In an ATM cell header a VPI Virtual Path Identifier identifies a link formed by a virtual path a VCI Virtual Channel Identifier identifies a channel within a vi...

Страница 516: ......

Страница 517: ...ta packets between two Ethernet devices Some companies have more than one alternate route to one or more ISPs If the LAN and ISP s are in the same subnet the triangle route problem may occur The steps below describe the triangle route problem Step 1 A computer on the LAN initiates a connection by sending out a SYN packet to a receiving server on the WAN Step 2 The Prestige reroutes the SYN packet ...

Страница 518: ...to three logical LAN interfaces with the Prestige being the gateway for each logical network By putting your LAN and Gateway B in different subnets all returning network traffic must pass through the Prestige to your LAN The following steps describe such a scenario Step 1 A computer on the LAN initiates a connection by sending a SYN packet to a receiving server on the WAN Step 2 The Prestige rerou...

Страница 519: ...N Side A second solution to the triangle route problem is to put all of your network gateways on the WAN side as the following figure shows This ensures that all incoming network traffic passes through your Prestige to your LAN Therefore your LAN is protected Diagram F 4 Gateways on the WAN Side ...

Страница 520: ......

Страница 521: ... 1 25A Power Consumption 11 W Safety Standards UL CUL CSA UL 1310 CSA C22 2 No 223 NORTH AMERICAN PLUG STANDARDS AC Power Adapter Model AA 121A25 Input Power AC120Volts 60Hz 19W Output Power AC 12Volts 1 25A Power Consumption 11W Safety Standards UL CUL UL 1310 CSA C22 2 No 223 EUROPEAN PLUG STANDARDS AC Power Adapter Model AA 121A3BN Input Power AC230Volts 50Hz 140mA Output Power AC12Volts 1 3A P...

Страница 522: ...G STANDARDS AC Power Adapter Model AA 121A25 Input Power AC120Volts 60Hz 19W Output Power AC 12Volts 1 25A Power Consumption 14W Safety Standards UL CUL UL 1310 CSA C22 2 No 223 EUROPEAN PLUG STANDARDS AC Power Adapter Model AA 121A3BN Input Power AC230Volts 50Hz 140mA Output Power AC12Volts 1 3A Power Consumption 14W Safety Standards ITS GS CE EN 60950 UNITED KINGDOM PLUG STANDARDS AC Power Adapt...

Страница 523: ...ot seen in SMT screens FN Field Name PVA Parameter Values Allowed INPUT An example of what you may enter Applies to the P652H HW The following are Internal SPTGEN screens associated with the SMT screens of your Prestige Example Internal SPTGEN Screens Table MENU 1 GENERAL SETUP SMT MENU 1 FIN FN PVA INPUT 10000000 Configured 0 No 1 Yes 0 10000001 System Name Str Prestige 10000002 Location Str 1000...

Страница 524: ...10 Output protocol filters Set 2 256 30100011 Output protocol filters Set 3 256 30100012 Output protocol filters Set 4 256 30100013 Output device filters Set 1 256 30100014 Output device filters Set 2 256 30100015 Output device filters Set 3 256 30100016 Output device filters Set 4 256 MENU 3 2 TCP IP AND DHCP ETHERNET SETUP SMT MENU 3 2 FIN FN PVA INPUT 30200001 DHCP 0 None 1 Server 2 Relay 0 302...

Страница 525: ...3 1 12 256 30200016 IP Policies Set 4 1 12 256 MENU 3 2 1 IP ALIAS SETUP SMT MENU 3 2 1 FIN FN PVA INPUT 30201001 IP Alias 1 0 No 1 Yes 0 30201002 IP Address 0 0 0 0 30201003 IP Subnet Mask 0 30201004 RIP Direction 0 None 1 Both 2 In Only 3 Out Only 0 30201005 Version 0 Rip 1 1 Rip 2B 2 Rip 2M 0 30201006 IP Alias 1 Incoming protocol filters Set 1 256 30201007 IP Alias 1 Incoming protocol filters S...

Страница 526: ...ection 0 None 1 Both 2 In Only 3 Out Only 0 30201018 Version 0 Rip 1 1 Rip 2B 2 Rip 2M 0 30201019 IP Alias 2 Incoming protocol filters Set 1 256 30201020 IP Alias 2 Incoming protocol filters Set 2 256 30201021 IP Alias 2 Incoming protocol filters Set 3 256 30201022 IP Alias 2 Incoming protocol filters Set 4 256 30201023 IP Alias 2 Outgoing protocol filters Set 1 256 30201024 IP Alias 2 Outgoing pr...

Страница 527: ...10 WEP Key3 30500011 WEP Key4 MENU 3 5 1 WLAN MAC ADDRESS FILTER SMT MENU 3 5 1 30501001 Mac Filter Active 0 No 1 Yes 0 30501002 Filter Action 0 Allow 1 Deny 0 30501003 Address 1 00 00 00 00 00 00 30501004 Address 2 00 00 00 00 00 00 30501005 Address 3 00 00 00 00 00 00 Continued 30501034 Address 32 00 00 00 00 00 00 MENU 4 INTERNET ACCESS SETUP SMT MENU 4 FIN FN PVA INPUT 40000000 Configured 0 No...

Страница 528: ... set 1 6 40000017 ISP incoming protocol filter set 2 256 40000018 ISP incoming protocol filter set 3 256 40000019 ISP incoming protocol filter set 4 256 40000020 ISP outgoing protocol filter set 1 256 40000021 ISP outgoing protocol filter set 2 256 40000022 ISP outgoing protocol filter set 3 256 40000023 ISP outgoing protocol filter set 4 256 40000024 ISP PPPoE idle timeout 0 40000025 Route IP 0 N...

Страница 529: ... Static Route set 1 Gateway 0 0 0 0 120101006 IP Static Route set 1 Metric 0 120101007 IP Static Route set 1 Private 0 No 1 Yes 0 MENU 12 1 2 IP STATIC ROUTE SETUP SMT MENU 12 1 2 FIN FN PVA INPUT 120102001 IP Static Route set 2 Name 120102002 IP Static Route set 2 Active 0 No 1 Yes 0 120102003 IP Static Route set 2 Destination IP address 0 0 0 0 120102004 IP Static Route set 2 Destination IP subn...

Страница 530: ...oute set 4 Active 0 No 1 Yes 0 120104003 IP Static Route set 4 Destination IP address 0 0 0 0 120104004 IP Static Route set 4 Destination IP subnetmask 0 120104005 IP Static Route set 4 Gateway 0 0 0 0 120104006 IP Static Route set 4 Metric 0 120104007 IP Static Route set 4 Private 0 No 1 Yes 0 MENU 12 1 5 IP STATIC ROUTE SETUP SMT MENU 12 1 5 FIN FN PVA INPUT 120105001 IP Static Route set 5 Name ...

Страница 531: ... 12 1 7 IP STATIC ROUTE SETUP SMT MENU 12 1 7 FIN FN PVA INPUT 120107001 IP Static Route set 7 Name Str 120107002 IP Static Route set 7 Active 0 No 1 Yes 0 120107003 IP Static Route set 7 Destination IP address 0 0 0 0 120107004 IP Static Route set 7 Destination IP subnetmask 0 120107005 IP Static Route set 7 Gateway 0 0 0 0 120107006 IP Static Route set 7 Metric 0 120107007 IP Static Route set 7 ...

Страница 532: ...20109006 IP Static Route set 9 Metric 0 120109007 IP Static Route set 9 Private 0 No 1 Yes 0 MENU 12 1 10 IP STATIC ROUTE SETUP SMT MENU 12 1 10 FIN FN PVA INPUT 120110001 IP Static Route set 10 Name 120110002 IP Static Route set 10 Active 0 No 1 Yes 0 120110003 IP Static Route set 10 Destination IP address 0 0 0 0 120110004 IP Static Route set 10 Destination IP subnetmask 0 120110005 IP Static Ro...

Страница 533: ...te set 12 Destination IP address 0 0 0 0 120112004 IP Static Route set 12 Destination IP subnetmask 0 120112005 IP Static Route set 12 Gateway 0 0 0 0 120112006 IP Static Route set 12 Metric 0 120112007 IP Static Route set 12 Private 0 No 1 Yes 0 MENU 12 1 13 IP STATIC ROUTE SETUP SMT MENU 12 1 13 FIN FN PVA INPUT 120113001 IP Static Route set 13 Name Str 120113002 IP Static Route set 13 Active 0 ...

Страница 534: ...N PVA INPUT 120115001 IP Static Route set 15 Name Str 120115002 IP Static Route set 15 Active 0 No 1 Yes 0 120115003 IP Static Route set 15 Destination IP address 0 0 0 0 120115004 IP Static Route set 15 Destination IP subnetmask 0 120115005 IP Static Route set 15 Gateway 0 0 0 0 120115006 IP Static Route set 15 Metric 0 120115007 IP Static Route set 15 Private 0 No 1 Yes 0 MENU 12 1 16 IP STATIC ...

Страница 535: ... 0 150000006 SUA Server 2 Local IP address 0 0 0 0 150000007 SUA Server 3 Active 0 No 1 Yes 0 150000008 SUA Server 3 Protocol 0 All 6 TCP 17 U DP 0 150000009 SUA Server 3 Port Start 0 150000010 SUA Server 3 Port End 0 150000011 SUA Server 3 Local IP address 0 0 0 0 150000012 SUA Server 4 Active 0 No 1 Yes 0 150000013 SUA Server 4 Protocol 0 All 6 TCP 17 U DP 0 150000014 SUA Server 4 Port Start 0 1...

Страница 536: ...50000030 SUA Server 7 Port End 0 150000031 SUA Server 7 Local IP address 0 0 0 0 150000032 SUA Server 8 Active 0 No 1 Yes 0 150000033 SUA Server 8 Protocol 0 All 6 TCP 17 U DP 0 150000034 SUA Server 8 Port Start 0 150000035 SUA Server 8 Port End 0 150000036 SUA Server 8 Local IP address 0 0 0 0 150000037 SUA Server 9 Active 0 No 1 Yes 0 150000038 SUA Server 9 Protocol 0 All 6 TCP 17 U DP 0 1500000...

Страница 537: ...SET 1 SMT MENU 21 FIN FN PVA INPUT 210100001 Filter Set 1 Name Str MENU 21 1 1 1 FILTER SET 1 RULE 1 SMT MENU 21 1 1 1 FIN FN PVA INPUT 210101001 IP Filter Set 1 Rule 1 Type 2 TCP IP 2 210101002 IP Filter Set 1 Rule 1 Active 0 No 1 Yes 1 210101003 IP Filter Set 1 Rule 1 Protocol 6 210101004 IP Filter Set 1 Rule 1 Dest IP address 0 0 0 0 210101005 IP Filter Set 1 Rule 1 Dest Subnet Mask 0 210101006...

Страница 538: ...1 2 FIN FN PVA INPUT 210102001 IP Filter Set 1 Rule 2 Type 2 TCP IP 2 210102002 IP Filter Set 1 Rule 2 Active 0 No 1 Yes 1 210102003 IP Filter Set 1 Rule 2 Protocol 6 210102004 IP Filter Set 1 Rule 2 Dest IP address 0 0 0 0 210102005 IP Filter Set 1 Rule 2 Dest Subnet Mask 0 210102006 IP Filter Set 1 Rule 2 Dest Port 138 210102007 IP Filter Set 1 Rule 2 Dest Port Comp 0 none 1 equal 2 not equal 3 ...

Страница 539: ...le 3 Dest IP address 0 0 0 0 210103005 IP Filter Set 1 Rule 3 Dest Subnet Mask 0 210103006 IP Filter Set 1 Rule 3 Dest Port 139 210103007 IP Filter Set 1 Rule 3 Dest Port Comp 0 none 1 equal 2 not equal 3 less 4 great er 1 210103008 IP Filter Set 1 Rule 3 Src IP address 0 0 0 0 210103009 IP Filter Set 1 Rule 3 Src Subnet Mask 0 210103010 IP Filter Set 1 Rule 3 Src Port 0 210103011 IP Filter Set 1 ...

Страница 540: ...Filter Set 1 Rule 4 Src IP address 0 0 0 0 210104009 IP Filter Set 1 Rule 4 Src Subnet Mask 0 210104010 IP Filter Set 1 Rule 4 Src Port 0 210104011 IP Filter Set 1 Rule 4 Src Port Comp 0 none 1 equal 2 not equal 3 less 4 great er 0 210104013 IP Filter Set 1 Rule 4 Act Match 1 check next 2 forward 3 drop 3 210104014 IP Filter Set 1 Rule 4 Act Not Match 1 check next 2 forward 3 dr op 1 MENU 21 1 1 5...

Страница 541: ...e 5 Act Match 1 check next 2 forward 3 dr op 3 210105014 IP Filter Set 1 Rule 5 Act Not Match 1 Check Next 2 Forward 3 Drop 1 MENU 21 1 1 6 SET 1 RULE 6 SMT MENU 21 1 1 6 FIN FN PVA INPUT 210106001 IP Filter Set 1 Rule 6 Type 2 TCP IP 2 210106002 IP Filter Set 1 Rule 6 Active 0 No 1 Yes 1 210106003 IP Filter Set 1 Rule 6 Protocol 17 210106004 IP Filter Set 1 Rule 6 Dest IP address 0 0 0 0 21010600...

Страница 542: ...2 Nam Str NetBIOS_WAN MENU 21 1 2 1 FILTER SET 2 RULE 1 SMT MENU 21 1 2 1 FIN FN PVA INPUT 210201001 IP Filter Set 2 Rule 1 Type 0 none 2 TCP IP 2 210201002 IP Filter Set 2 Rule 1 Active 0 No 1 Yes 1 210201003 IP Filter Set 2 Rule 1 Protocol 6 210201004 IP Filter Set 2 Rule 1 Dest IP address 0 0 0 0 210201005 IP Filter Set 2 Rule 1 Dest Subnet Mask 0 210201006 IP Filter Set 2 Rule 1 Dest Port 137 ...

Страница 543: ... IP Filter Set 2 Rule 2 Active 0 No 1 Yes 1 210202003 IP Filter Set 2 Rule 2 Protocol 6 210202004 IP Filter Set 2 Rule 2 Dest IP address 0 0 0 0 210202005 IP Filter Set 2 Rule 2 Dest Subnet Mask 0 210202006 IP Filter Set 2 Rule 2 Dest Port 138 210202007 IP Filter Set 2 Rule 2 Dest Port Comp 0 none 1 equal 2 not equal 3 less 4 great er 1 210202008 IP Filter Set 2 Rule 2 Src IP address 0 0 0 0 21020...

Страница 544: ...et Mask 0 210203006 IP Filter Set 2 Rule 3 Dest Port 139 210203007 IP Filter Set 2 Rule 3 Dest Port Comp 0 none 1 equal 2 not equal 3 less 4 great er 1 210203008 IP Filter Set 2 Rule 3 Src IP address 0 0 0 0 210203009 IP Filter Set 2 Rule 3 Src Subnet Mask 0 210203010 IP Filter Set 2 Rule 3 Src Port 0 210203011 IP Filter Set 2 Rule 3 Src Port Comp 0 none 1 equal 2 not equal 3 less 4 great er 0 210...

Страница 545: ...0 210204009 IP Filter Set 2 Rule 4 Src Subnet Mask 0 210204010 IP Filter Set 2 Rule 4 Src Port 0 210204011 IP Filter Set 2 Rule 4 Src Port Comp 0 none 1 equal 2 not equal 3 less 4 great er 0 210204013 IP Filter Set 2 Rule 4 Act Match 1 check next 2 forward 3 dr op 3 210204014 IP Filter Set 2 Rule 4 Act Not Match 1 check next 2 forward 3 dr op 1 MENU 21 1 2 5 FILTER SET 2 RULE 5 SMT MENU 21 1 2 5 F...

Страница 546: ...P Filter Set 2 Rule 5 Act Match 1 check next 2 forward 3 dr op 3 210205014 IP Filter Set 2 Rule 5 Act Not Match 1 check next 2 forward 3 dr op 1 MENU 21 1 2 6 FILTER SET 2 RULE 6 SMT MENU 21 1 2 5 FIN FN PVA INPUT 210206001 IP Filter Set 2 Rule 6 Type 0 none 2 TCP IP 2 210206002 IP Filter Set 2 Rule 6 Active 0 No 1 Yes 1 210206003 IP Filter Set 2 Rule 6 Protocol 17 210206004 IP Filter Set 2 Rule 6...

Страница 547: ...234 MENU 23 2 SYSTEM SECURITY RADIUS SERVER SMT MENU 23 2 FIN FN PVA INPUT 230200001 Authentication Server Configured 0 No 1 Yes 1 230200002 Authentication Server Active 0 No 1 Yes 1 230200003 Authentication Server IP Address 192 168 1 32 230200004 Authentication Server Port 1822 230200005 Authentication Server Shared Secret 111111111111111 1111111111111111 230200006 Accounting Server Configured 0...

Страница 548: ...41100005 FTP Server Access 0 all 1 none 2 Lan 3 Wan 0 241100006 FTP Server Secured IP address 0 0 0 0 241100007 WEB Server Port 80 241100008 WEB Server Access 0 all 1 none 2 Lan 3 Wan 0 241100009 WEB Server Secured IP address 0 0 0 0 Command Examples The following are example Internal SPTGEN screens associated with the Prestige s command interpreter commands CI COMMAND FOR ANNEX A WAN ADSL OPENCMD...

Страница 549: ...1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components are installed configure the TCP IP settings in order to communicate with your network If you manually assign IP information instead of using dynamic assignment make sure that y...

Страница 550: ...click OK If you need TCP IP a In the Network window click Add b Select Protocol and then click Add c Select Microsoft from the list of manufacturers d Select TCP IP from the list of network protocols and then click OK If you need Client for Microsoft Networks a Click Add b Select Client and then click Add c Select Microsoft from the list of manufacturers d Select Client for Microsoft Networks from...

Страница 551: ...tomatically If you have a static IP address select Specify an IP address and type your information into the IP Address and Subnet Mask fields 3 Click the DNS Configuration tab If you do not know your DNS information select Disable DNS If you know your DNS information select Enable DNS and type the information in the fields below you may not need to fill them all in ...

Страница 552: ...ld and click Add 5 Click OK to save and close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Turn on your Prestige and restart your computer when prompted Verifying Settings 1 Click Start and then Run 2 In the Run window type winipcfg and then click OK to open the IP Configuration window 3 Select your network adapter You should see your comp...

Страница 553: ... Windows 2000 NT XP 1 For Windows XP click start Control Panel In Windows 2000 NT click Start Settings Control Panel 2 For Windows XP click Network Connections For Windows 2000 NT click Network and Dial up Connections 3 Right click Local Area Connection and then click Properties ...

Страница 554: ...in Win XP and click Properties 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP If you have a dynamic IP address click Obtain an IP address automatically If you have a static IP address click Use the following IP Address and fill in the IP address Subnet mask and Default gateway fields Click Advanced ...

Страница 555: ... IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways In TCP IP Gateway Address type the IP address of the default gateway in Gateway To manually configure a default metric the number of transmission hops clear the A...

Страница 556: ... and Alternate DNS server fields If you have previously configured DNS servers click Advanced and then the DNS tab to order them 8 Click OK to close the Internet Protocol TCP IP Properties window 9 Click OK to close the Local Area Connection Properties window 10 Turn on your Prestige and restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and then Command Pr...

Страница 557: ...ies User s Guide Setting up Your Computer s IP Address I 9 Macintosh OS 8 9 1 Click the Apple menu Control Panel and double click TCP IP to open the TCP IP Control Panel 2 Select Ethernet built in from the Connect via list ...

Страница 558: ...s in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your Prestige in the Router address box 5 Close the TCP IP Control Panel 6 Click Save if prompted to save changes to your configuration 7 Turn on your Prestige and restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Macintosh OS X 1 Click the ...

Страница 559: ...select Using DHCP from the Configure list 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your Prestige in the Router address box 5 Click Apply Now and close the window 6 Turn on your Prestige and restart your computer if prompted Verifying Setti...

Страница 560: ......

Страница 561: ...e point where the telephone line enters your residence as shown in the following figure Diagram J 1 Connecting a POTS Splitter Step 1 Connect the side labeled Phone to your telephone Step 2 Connect the side labeled Modem to your Prestige Step 3 Connect the side labeled Line to the telephone wall jack Telephone Microfilters Telephone voice transmissions take place in the lower frequency range 0 4KH...

Страница 562: ...double jack end of the Y Connector to the Prestige Step 4 Connect the phone side of the microfilter to your telephone as shown in the following figure Diagram J 2 Connecting a Microfilter Prestige With ISDN This section relates to people who use their Prestige with ADSL over ISDN digital telephone service only The following is an example installation for the Prestige with ISDN Diagram J 3 Prestige...

Страница 563: ... The DHCP server assigned an IP address to a client SMT Login Successfully Someone has logged on to the router s SMT interface SMT Login Fail Someone has failed to log on to the router s SMT interface WEB Login Successfully Someone has logged on to the router s web configurator interface WEB Login Fail Someone has failed to log on to the router s web configurator interface TELNET Login Successfull...

Страница 564: ...forbid ActiveX Destination Contains Java applet Web Block The Prestige blocked access to an IP address or domain name that contains a Java applet because the content filter is set to forbid Java applets Destination Contains cookie Web Block The Prestige blocked access to an IP address or domain name that contains a cookie because the content filter is set to forbid cookies Destination Proxy mode d...

Страница 565: ...l detected a TCP SMTP illegal command attack NetBIOS TCP The firewall detected a TCP NetBIOS attack ip spoofing no routing entry Protocol The firewall detected an IP spoofing attack while the Prestige did not have a default route The log may also display the protocol for example TCP or UDP vulnerability ICMP type d code d The firewall detected an ICMP vulnerability attack see the section on ICMP m...

Страница 566: ...st IP Protocol Direction Access did not match a firewall rule s destination IP address and the Prestige logged it src IP Protocol Direction Access did not match a firewall rule s source IP address and the Prestige logged it protocol Protocol Direction Access did not match a firewall rule s protocol and the Prestige logged it Triangle route packet forwarded Protocol The firewall allowed a triangle ...

Страница 567: ...upport the ICMP packet s protocol 2 The ICMP packet is an echo reply for which there was no corresponding echo request Router reply ICMP packet The router sent an ICMP response packet This packet automatically bypasses the firewall Remote access denied The router blocked a remote access attempt Chart K 6 TCP Reset Logs LOG MESSAGE DESCRIPTION Firewall sent TCP reset packets The firewall sent out T...

Страница 568: ... network on the route to the destination network 5 Redirect 0 Redirect datagrams for the Network 1 Redirect datagrams for the Host 2 Redirect datagrams for the Type of Service and Network 3 Redirect datagrams for the Type of Service and Host 8 Echo 0 Echo message 11 Time Exceeded 0 Time to live exceeded in transit 1 Fragment reassembly time exceeded 12 Parameter Problem 0 Pointer indicates the err...

Страница 569: ...ponder IPSec Log The following figure shows a typical log from the VPN connection peer Index Date Time Log 001 01 Jan 08 02 22 Send Main Mode request to 192 168 100 101 002 01 Jan 08 02 22 Send SA 003 01 Jan 08 02 22 Recv SA 004 01 Jan 08 02 24 Send KE NONCE 005 01 Jan 08 02 24 Recv KE NONCE 006 01 Jan 08 02 26 Send ID HASH 007 01 Jan 08 02 26 Recv ID HASH 008 01 Jan 08 02 26 Phase 1 IKE SA proces...

Страница 570: ...he Prestige has received an IKE negotiation request from the peer Recv Symbol IKE uses the ISAKMP protocol refer to RFC2408 ISAKMP to transmit data Each ISAKMP packet contains payloads of different types that show in the log see Chart J 10 Phase 1 IKE SA process done Phase 1 negotiation is finished Index Date Time Log 001 01 Jan 08 08 07 Recv Main Mode request from 192 168 100 100 002 01 Jan 08 08...

Страница 571: ...ties exchange policy details including local and remote IP address ranges If these ranges differ then the connection fails Local remote IPs of incoming request conflict with rule d If the security gateway is 0 0 0 0 the Prestige will use the peer s Local Addr as its Remote Addr If this IP range conflicts with a previously configured rule then the connection is not allowed Invalid IP IP start IP en...

Страница 572: ...he incoming packet did not match vs My Local IP address The IP address type or IP address of an incoming packet does not match the peer IP address type or IP address configured on the local router The log displays this router s configured local IP address type or IP address that the incoming packet did not match symbol The router sent a payload type of IKE packet The following table shows sample l...

Страница 573: ...tion settings are incorrect Please check them Rule d idle time out disconnect If an SA has no packets transmitted for a period of time configurable via CI command the Prestige drops the connection The following table shows RFC 2408 ISAKMP payload types that the log displays Please refer to the RFC for detailed information on each type Chart K 10 RFC 2408 ISAKMP Payload Types LOG DISPLAY PAYLOAD TY...

Страница 574: ......

Страница 575: ...ndwidth Filter 20 1 20 14 Bandwidth Management 1 3 Bandwidth Management 20 1 Bandwidth Management Statistics 20 16 Bandwidth Manager Class Configuration 20 13 Bandwidth Manager Class Setup 20 11 Bandwidth Manager Monitor 20 18 Bandwidth Manager Summary 20 8 Basic Service Set C 2 Blocking Time 13 25 13 28 Borrow bandwidth from parent class 20 14 Bridging 25 2 31 1 Ether Address 31 4 Ethernet 31 1 E...

Страница 576: ...ation Address 13 4 Device Filter rules 34 14 DH 16 18 DHCP 1 5 3 11 5 2 10 1 21 6 37 4 Diagnostic Tools 37 1 Dial Backup 24 1 dial timeout 24 7 Diffie Hellman Key Groups 16 18 Digital Subscriber Line Access Multiplexer 1 7 Direct Sequence Spread Spectrum C 1 Distribution System C 2 DMZ 6 7 And the Firewall 6 7 Port Filter Setup 28 1 Setup 28 1 28 2 TCP IP Setup See TCP IP DMZ Setup 6 7 28 1 DNS 25...

Страница 577: ...Rule 34 7 Filter Log 37 7 Filter Rule 34 8 Filter Rule Process 34 3 Filter Rule Setup 34 7 Filter Rules Summary Sample 34 17 Filter Set Class 34 7 Filter Set Configuration 34 4 Filtering 34 1 34 7 Filtering Process Outgoing Packets 34 2 Finger 9 6 Firewall 1 1 12 1 Access Methods 13 1 33 1 Address Type 13 12 Alerts 13 24 Connection Direction 13 4 Creating Editing Rules 13 10 Custom Ports See Custo...

Страница 578: ...ternal SPTGEN Screens H 1 Internet access 27 1 Internet Access 1 1 1 7 25 2 27 1 27 4 27 5 Internet Access Setup A 3 32 1 Internet Assigned Numbers Authority See IANA Internet Control Message Protocol 13 22 Internet Control Message Protocol ICMP 12 6 Internet Key Exchange 16 16 Internet Protocol Security 15 1 IP address 24 9 24 11 IP Address3 4 5 3 9 5 9 8 21 6 25 4 30 3 31 4 34 9 37 4 37 9 41 3 R...

Страница 579: ...Burst Size 8 2 Maximum Incomplete High 13 27 Maximum Incomplete Low 13 27 Max incomplete High 13 25 Max incomplete Low 13 25 13 27 MBS See Maximum Burst Size Media Access Control 31 1 Message Logging 37 5 Metric 8 1 24 12 29 7 30 3 Multicast 5 3 24 12 29 7 Multiplexing LLC based 3 2 VC based 3 2 Multiplexing 1 5 3 2 27 5 29 2 Multiprotocol Encapsulation 3 2 My IP Address 16 2 My Login 24 8 My Pass...

Страница 580: ...re Shared Key 16 9 Prestige Firewall Application 12 3 Priority 20 14 Priority based Scheduler 20 4 Private 24 12 29 7 30 4 Proportional Bandwidth Allocation 20 2 Protocol 34 8 Protocol Filter Rules 34 14 Public Servers 6 7 Q Quality of Service 41 1 R RADIUS 7 9 Shared Secret Key 7 10 RADIUS Message Types 7 10 RAS 37 4 41 2 Rate Receiving 37 2 Transmission 37 2 Read Me First xxvii Related Documenta...

Страница 581: ...l 12 11 Security Parameter Index 16 22 Security Parameters 7 14 Security Ramifications 13 3 Server 9 4 32 3 32 4 32 5 32 8 32 9 32 10 32 12 32 13 39 5 Service iv 13 3 Service Type A 3 13 14 Services 9 5 9 6 setup a schedule 42 2 Sever 32 9 Simple Network Management Protocol 35 1 SMT 22 1 SMT Menu Overview 22 2 SMTP 9 6 SMTP Error Messages 19 5 Smurf 12 6 SNMP 9 6 35 1 Community 35 3 Configuration ...

Страница 582: ...0 3 Restrictions 40 3 TFTP and FTP over WAN Will Not Work When 38 4 TFTP and FTP Over WAN 17 1 TFTP File Transfer 38 12 TFTP Restrictions 17 1 38 4 Three Way Handshake 12 5 Threshold Values 13 24 Time and Date 11 1 Time and Date Setting 39 4 39 5 Time Zone 39 5 Timeout 24 3 24 10 TOS Type of Service 41 1 Trace Records 37 5 Traceroute 12 7 Traffic Redirect 1 3 Traffic Redirect 8 7 8 8 Setup 24 3 Tr...

Страница 583: ...6 3 Wide Area Network 8 1 Wireless Client WPA Supplicants 7 15 Wireless LAN C 1 7 1 26 1 Benefits C 1 Wireless LAN MAC Address Filtering 1 2 Wireless LAN Setup 26 1 wireless station 7 25 Wizard Setup 3 1 WLAN See Wireless LAN WPA 7 11 WPA with RADIUS Application 7 13 WPA PSK Application 7 12 X XMODEM protocol 38 2 Z ZyNOS 38 1 38 2 ZyNOS F W Version 38 1 ZyXEL Limited Warranty Note iv ZyXEL s Fire...

Отзывы: