Home
ZyXEL Communications
Gateway
P-660HW-T v2
Page 314
ZyXEL Communications P-660HW-T v2 - Page 314
351 pages
Manual
To Next Page
To Next Page
To Previous Page
To Previous Page
Loading...
P-660HW-T v2 User’s Guide
314
Appendix
H
Firewall Commands
config delete firewall set
<set #> rule<rule #>
This command removes the specified rul
e in a
firewall configuration set.
Table 144
Firewall Commands (
continued)
FUNCTION
COMMAND
DESCRIPTION
313
315
Table of Contents
Main Page
Default Chapter
3
Copyright
3
Certifications
4
Safety Warnings
6
Zyxel Limited Warranty
8
Customer Support
9
Table of Contents
11
List of Figures
21
List of Tables
27
Preface
31
Chapter 1 Getting to Know Your Zyxel Device
33
Features
33
Getting to Know Your Zyxel Device
33
Introducing the Zyxel Device
33
Table 1 ADSL Standards
33
Zero Configuration Internet Access
34
Dynamic Dns Support
35
Wireless Features
36
Applications for the Zyxel Device
37
Protected Internet Access
37
LAN to LAN Application
38
Figure 1 Protected Internet Access Applications
38
Figure 2 LAN-To-LAN Application Example
38
Figure 3 Front Panel
38
Front Panel Leds
38
Hardware Connection
39
Table 2 Front Panel Leds
39
Chapter 2 Introducing the Web Configurator
41
Web Configurator Overview
41
Accessing the Web Configurator
41
Figure 4 Password Screen
42
Figure 5 Change Password at Login
42
Resetting the Zyxel Device
43
Using the Reset Button
43
Navigating the Web Configurator
43
Navigation Panel
43
Figure 6 Select a Mode
43
Figure 7 Web Configurator: Main Screen
44
Table 3 Web Configurator Screens Summary
44
Status Screen
46
Figure 8 Status Screen
47
Table 4 Status Screen
47
Status: any IP Table
49
Status: WLAN Status
49
Figure 9 Status: any IP Table
49
Table 5 Status: any IP Table
49
Status: Bandwidth Status
50
Figure 10 Status: WLAN Status
50
Figure 11 Status: Bandwidth Status
50
Table 6 Status: WLAN Status
50
Status: Packet Statistics
51
Figure 12 Status: Packet Statistics
51
Table 7 Status: Packet Statistics
51
Changing Login Password
52
Figure 13 System General
53
Chapter 3 Wizard Setup for Internet Access
55
Introduction
55
Internet Access Wizard Setup
55
Figure 14 Select a Mode
55
Figure 15 Wizard: Welcome
56
Figure 16 Auto Detection: no DSL Connection
56
Automatic Detection
57
Figure 17 Auto Detection: Failed
57
Figure 18 Auto-Detection: Pppoe
57
Manual Configuration
57
Figure 19 Internet Access Wizard Setup: ISP Parameters
58
Table 8 Internet Access Wizard Setup: ISP Parameters
58
Figure 20 Internet Connection with Pppoe
59
Figure 21 Internet Connection with RFC 1483
59
Table 9 Internet Connection with Pppoe
59
Figure 22 Internet Connection with ENET ENCAP
60
Table 10 Internet Connection with RFC 1483
60
Table 11 Internet Connection with ENET ENCAP
60
Figure 23 Internet Connection with Pppoa
61
Table 12 Internet Connection with Pppoa
61
Wireless Connection Wizard Setup
62
Figure 24 Connection Test Failed-1
62
Figure 25 Connection Test Failed-2
62
Figure 26 Connection Test Successful
63
Figure 27 Wireless LAN Setup Wizard 1
63
Figure 28 Wireless LAN Setup Wizard 2
64
Table 13 Wireless LAN Setup Wizard 1
64
Manually Assign a WPA-PSK Key
65
Table 14 Wireless LAN Setup Wizard 2
65
Figure 29 Manually Assign a WPA-PSK Key
66
Figure 30 Manually Assign a WEP Key
66
Manually Assign a WEP Key
66
Table 15 Manually Assign a WPA Key
66
Figure 31 Wireless LAN Setup 3
67
Table 16 Manually Assign a WEP Key
67
Figure 32 Internet Access and WLAN Wizard Setup Complete
68
Chapter 4 Bandwidth Management Wizard
69
Introduction
69
Predefined Media Bandwidth Management Services
69
Table 17 Media Bandwidth Management Setup: Services
69
Bandwidth Management Wizard Setup
70
Figure 33 Select a Mode
70
Figure 34 Wizard: Welcome
71
Figure 35 Bandwidth Management Wizard: General Information
71
Table 18 Bandwidth Management Wizard: General Information
71
Figure 36 Bandwidth Management Wizard: Configuration
72
Table 19 Bandwidth Management Wizard: Configuration
72
Figure 37 Bandwidth Management Wizard: Complete
73
Chapter 5 WAN Setup
75
WAN Overview
75
Encapsulation
75
Enet Encap
75
PPP over Ethernet
75
Pppoa
76
Rfc 1483
76
Multiplexing
76
VC-Based Multiplexing
76
LLC-Based Multiplexing
76
Encapsulation and Multiplexing Scenarios
76
Scenario 1: One VC, Multiple Protocols
77
Scenario 2: One VC, One Protocol (IP)
77
Scenario 3: Multiple Vcs
77
VPI and VCI
77
IP Address Assignment
77
IP Assignment with Pppoa or Pppoe Encapsulation
77
IP Assignment with RFC 1483 Encapsulation
77
IP Assignment with ENET ENCAP Encapsulation
78
Nailed-Up Connection (PPP)
78
Nat
78
Metric
78
Traffic Shaping
79
Figure 38 Example of Traffic Shaping
79
ATM Traffic Classes
80
Constant Bit Rate (CBR)
80
Variable Bit Rate (VBR)
80
Unspecified Bit Rate (UBR)
80
Zero Configuration Internet Access
80
Internet Connection
81
Figure 39 Internet Connection (Pppoe)
81
Table 20 Internet Connection
81
Configuring Advanced Internet Connection Setup
83
Figure 40 Advanced Internet Connection Setup
83
Table 21 Advanced Internet Connection Setup
83
Configuring more Connections
84
More Connections Edit
85
Figure 41 more Connections
85
Table 22 more Connections
85
Figure 42 more Connections Edit
86
Table 23 more Connections Edit
86
Configuring more Connections Advanced Setup
88
Figure 43 more Connections Advanced Setup
88
Table 24 more Connections Advanced Setup
88
Traffic Redirect
89
Figure 44 Traffic Redirect Example
89
Configuring WAN Backup
90
Figure 45 Traffic Redirect LAN Setup
90
Figure 46 WAN Backup Setup
90
Table 25 WAN Backup Setup
91
Chapter 6 Wireless LAN
93
Wireless Network Overview
93
Figure 47 Example of a Wireless Network
93
Wireless Security Overview
94
Ssid
94
MAC Address Filter
94
User Authentication
95
Encryption
95
Table 26 Types of Encryption for each Type of Authentication
95
One-Touch Intelligent Security Technology (OTIST)
96
Wireless Performance Overview
96
General Wireless LAN Screen
96
Figure 48 Wireless LAN: General
97
Table 27 Wireless LAN: General
97
Figure 49 Wireless: no Security
98
No Security
98
Table 28 Wireless no Security
98
WEP Encryption
98
Figure 50 Wireless: Static WEP Encryption
99
Table 29 Wireless: Static WEP Encryption
99
Wpa-Psk/Wpa2-Psk
99
Figure 51 Wireless: WPA-PSK/WPA2-PSK
100
Table 30 Wireless: WPA-PSK/WPA2-PSK
100
Wpa/Wpa2
101
Figure 52 Wireless: WPA/WPA2
102
Table 31 Wireless: WPA/WPA2
102
Wireless LAN Advanced Setup
103
Figure 53 Advanced
104
Table 32 Wireless LAN: Advanced
104
Otist
105
Enabling OTIST
105
Wireless Client
106
Figure 54 OTIST
106
Table 33 OTIST
106
Starting OTIST
107
Figure 55 Example Wireless Client OTIST Screen
107
Figure 56 Security Key
107
Figure 57 OTIST in Progress (AP)
107
Figure 58 OTIST in Progress (Client)
107
Notes on OTIST
108
MAC Filter
108
Figure 59 no AP with OTIST Found
108
Figure 60 Start OTIST
108
Figure 61 MAC Address Filter
109
Table 34 MAC Address Filter
109
Chapter 7 LAN Setup
111
LAN Overview
111
Lans, Wans and the Zyxel Device
111
Figure 62 LAN and WAN IP Addresses
111
DHCP Setup
112
IP Pool Setup
112
DNS Server Address
112
DNS Server Address Assignment
113
Lan Tcp/Ip
113
IP Address and Subnet Mask
113
Private IP Addresses
114
RIP Setup
114
Multicast
115
Any IP
115
How any IP Works
116
Figure 63 any IP Example
116
Configuring LAN IP
117
Configuring Advanced LAN Setup
117
Figure 64 LAN IP
117
Table 35 LAN IP
117
Figure 65 Advanced LAN Setup
118
Table 36 Advanced LAN Setup
118
DHCP Setup
119
Figure 66 DHCP Setup
119
Table 37 DHCP Setup
119
LAN Client List
120
Figure 67 LAN Client List
120
LAN IP Alias
121
Table 38 LAN Client List
121
Figure 68 Physical Network & Partitioned Logical Networks
122
Figure 69 LAN IP Alias
122
Table 39 LAN IP Alias
122
Chapter 8 Network Address Translation (NAT) Screens
125
NAT Overview
125
NAT Definitions
125
Table 40 NAT Definitions
125
What NAT Does
126
How NAT Works
126
Figure 70 How NAT Works
126
NAT Application
127
NAT Mapping Types
127
Figure 71 NAT Application with IP Alias
127
SUA (Single User Account) Versus NAT
128
NAT General Setup
128
Table 41 NAT Mapping Types
128
Port Forwarding
129
Figure 72 NAT General
129
Table 42 NAT General
129
Default Server IP Address
130
Port Forwarding: Services and Port Numbers
130
Table 43 Services and Port Numbers
130
Configuring Servers Behind Port Forwarding (Example)
131
Configuring Port Forwarding
131
Figure 73 Multiple Servers Behind NAT Example
131
Figure 74 NAT Port Forwarding
131
Figure 75 Port Forwarding Rule Setup
132
Port Forwarding Rule Edit
132
Table 44 NAT Port Forwarding
132
Address Mapping
133
Table 45 Port Forwarding Rule Setup
133
Figure 76 Address Mapping Rules
134
Table 46 Address Mapping Rules
134
Address Mapping Rule Edit
135
Figure 77 Edit Address Mapping Rule
135
Table 47 Edit Address Mapping Rule
135
Chapter 9 Firewalls
137
Firewall Overview
137
Types of Firewalls
137
Packet Filtering Firewalls
137
Application-Level Firewalls
138
Stateful Inspection Firewalls
138
Introduction to Zyxel's Firewall
138
Denial of Service Attacks
139
Denial of Service
139
Basics
139
Figure 78 Firewall Application
139
Types of Dos Attacks
140
Figure 79 Three-Way Handshake
140
Table 48 Common IP Ports
140
Figure 80 SYN Flood
141
Figure 81 Smurf Attack
142
ICMP Vulnerability
142
Illegal Commands (Netbios and SMTP)
142
Table 49 ICMP Commands that Trigger Alerts
142
Table 50 Legal Netbios Commands
142
Table 51 Legal SMTP Commands
142
Traceroute
143
Stateful Inspection
143
Figure 82 Stateful Inspection
143
Stateful Inspection and the Zyxel Device
144
Stateful Inspection Process
144
TCP Security
145
UDP/ICMP Security
145
Upper Layer Protocols
146
Guidelines for Enhancing Security with Your Firewall
146
Security in General
146
Packet Filtering Vs Firewall
147
Packet Filtering
147
When to Use Filtering
148
Firewall
148
When to Use the Firewall
148
Chapter 10 Firewall Configuration
149
Access Methods
149
Firewall Policies Overview
149
Rule Logic Overview
150
Rule Checklist
150
Security Ramifications
150
Key Fields for Configuring Rules
151
Action
151
Service
151
Source Address
151
Destination Address
151
Connection Direction
151
LAN to WAN Rules
152
Alerts
152
General Firewall Policy
152
Figure 83 Firewall: General
152
Firewall Rules Summary
153
Table 52 Firewall: General
153
Figure 84 Firewall Rules
154
Table 53 Firewall Rules
154
Configuring Firewall Rules
155
Figure 85 Firewall: Edit Rule
156
Table 54 Firewall: Edit Rule
157
Customized Services
158
Figure 86 Firewall: Customized Services
158
Table 55 Customized Services
158
Configuring a Customized Service
159
Example Firewall Rule
159
Figure 87 Firewall: Configure Customized Services
159
Table 56 Firewall: Configure Customized Services
159
Figure 88 Firewall Example: Rules
160
Figure 89 Edit Custom Port Example
160
Figure 90 Firewall Example: Edit Rule: Destination Address
161
Figure 91 Firewall Example: Edit Rule: Select Customized Services
162
Predefined Services
163
Figure 92 Firewall Example: Rules: Myservice
163
Table 57 Predefined Services
163
Anti-Probing
165
Figure 93 Firewall: Anti Probing
165
Dos Thresholds
166
Threshold Values
166
Table 58 Firewall: Anti Probing
166
Half-Open Sessions
167
TCP Maximum Incomplete and Blocking Time
167
Configuring Firewall Thresholds
168
Figure 94 Firewall: Threshold
168
Table 59 Firewall: Threshold
168
Firewall Configuration
149
Chapter 11 Content Filtering
171
Content Filtering Overview
171
Configuring Keyword Blocking
171
Figure 95 Content Filter: Keyword
171
Configuring the Schedule
172
Figure 96 Content Filter: Schedule
172
Table 60 Content Filter: Keyword
172
Configuring Trusted Computers
173
Figure 97 Content Filter: Trusted
173
Table 61 Content Filter: Schedule
173
Table 62 Content Filter: Trusted
173
Chapter 12 Static Route
175
Static Route
175
Configuring Static Route
175
Figure 98 Example of Static Routing Topology
175
Figure 99 Static Route
176
Static Route Edit
176
Table 63 Static Route
176
Figure 100 Static Route Edit
177
Table 64 Static Route Edit
177
Chapter 13 Bandwidth Management
179
Bandwidth Management Overview
179
Application-Based Bandwidth Management
179
Subnet-Based Bandwidth Management
179
Application and Subnet-Based Bandwidth Management
180
Scheduler
180
Priority-Based Scheduler
180
Figure 101 Subnet-Based Bandwidth Management Example
180
Table 65 Application and Subnet-Based Bandwidth Management Example
180
Fairness-Based Scheduler
181
Maximize Bandwidth Usage
181
Reserving Bandwidth for Non-Bandwidth Class Traffic
181
Maximize Bandwidth Usage Example
182
Priority-Based Allotment of Unused and Unbudgeted Bandwidth
182
Table 66 Maximize Bandwidth Usage Example
182
Table 67 Priority-Based Allotment of Unused and Unbudgeted Bandwidth Example
182
Fairness-Based Allotment of Unused and Unbudgeted Bandwidth
183
Bandwidth Management Priorities
183
Table 68 Fairness-Based Allotment of Unused and Unbudgeted Bandwidth Example
183
Table 69 Bandwidth Management Priorities
183
Over Allotment of Bandwidth
184
Configuring Summary
184
Figure 102 Bandwidth Management: Summary
184
Table 70 over Allotment of Bandwidth Example
184
Bandwidth Management Rule Setup
185
Table 71 Media Bandwidth Management: Summary
185
Figure 103 Bandwidth Management: Rule Setup
186
Table 72 Bandwidth Management: Rule Setup
186
Figure 104 Bandwidth Management Rule Configuration
187
Rule Configuration
187
Table 73 Bandwidth Management Rule Configuration
187
Bandwidth Monitor
189
Figure 105 Bandwidth Management: Monitor
189
Table 74 Services and Port Numbers
189
Chapter 14 Dynamic DNS Setup
191
Dynamic DNS Overview
191
DYNDNS Wildcard
191
Configuring Dynamic DNS
191
Figure 106 Dynamic DNS
192
Table 75 Dynamic DNS
192
Chapter 15 Remote Management Configuration
195
Remote Management Overview
195
Remote Management Limitations
195
Remote Management and NAT
196
System Timeout
196
Www
196
Figure 107 Remote Management: WWW
196
Telnet
197
Configuring Telnet
197
Figure 108 Telnet Configuration on a TCP/IP Network
197
Table 76 Remote Management: WWW
197
Configuring FTP
198
Figure 109 Remote Management: Telnet
198
Table 77 Remote Management: Telnet
198
Snmp
199
Figure 110 Remote Management: FTP
199
Table 78 Remote Management: FTP
199
Figure 111 SNMP Management Model
200
Supported Mibs
200
Configuring SNMP
201
Figure 112 Remote Management: SNMP
201
SNMP Traps
201
Table 79 SNMP Traps
201
Configuring DNS
202
Table 80 Remote Management: SNMP
202
Configuring ICMP
203
Figure 113 Remote Management: DNS
203
Table 81 Remote Management: DNS
203
204
204
Figure 114 Remote Management: ICMP
204
Table 82 Remote Management: ICMP
204
Figure 115 Enabling TR-069
205
Table 83 TR-069 Commands
205
Chapter 16 Universal Plug-And-Play (Upnp)
207
Introducing Universal Plug and Play
207
How Do I Know if I'M Using Upnp
207
NAT Traversal
207
Cautions with Upnp
208
Upnp and Zyxel
208
Configuring Upnp
208
Figure 116 Configuring Upnp
208
Installing Upnp in Windows Example
209
Installing Upnp in Windows Me
209
Table 84 Configuring Upnp
209
Figure 117 Add/Remove Programs: Windows Setup: Communication
210
Figure 118 Add/Remove Programs: Windows Setup: Communication: Components
210
Installing Upnp in Windows XP
211
Figure 119 Network Connections
211
Figure 120 Windows Optional Networking Components Wizard
211
Using Upnp in Windows XP Example
212
Auto-Discover Your Upnp-Enabled Network Device
212
Figure 121 Networking Services
212
Figure 122 Network Connections
213
Figure 123 Internet Connection Properties
213
Figure 124 Internet Connection Properties: Advanced Settings
214
Figure 125 Internet Connection Properties: Advanced Settings: Add
214
Figure 126 System Tray Icon
214
Web Configurator Easy Access
215
Figure 127 Internet Connection Status
215
Figure 128 Network Connections
216
Figure 129 Network Connections: My Network Places
217
Figure 130 Network Connections: My Network Places: Properties: Example
217
Chapter 17 System
219
General Setup
219
General Setup and System Name
219
Figure 131 System General Setup
220
Table 85 System General Setup
220
Time Setting
221
Figure 132 System Time Setting
221
Table 86 System Time Setting
222
Chapter 18 Logs
225
Logs Overview
225
Alerts and Logs
225
Viewing the Logs
225
Configuring Log Settings
226
Figure 133 View Log
226
Table 87 View Log
226
Figure 134 Log Settings
227
Table 88 Log Settings
227
Example E-Mail Log
228
Log Descriptions
229
Figure 135 E-Mail Log Example
229
Table 89 System Maintenance Logs
229
Table 90 System Error Logs
230
Table 91 Access Control Logs
231
Table 92 TCP Reset Logs
231
Table 93 Packet Filter Logs
232
Table 94 ICMP Logs
232
Table 95 CDR Logs
233
Table 96 PPP Logs
233
Table 97 Upnp Logs
233
Table 98 Content Filtering Logs
233
Table 99 Attack Logs
234
Table 100 Ipsec Logs
235
Table 101 IKE Logs
236
Table 102 PKI Logs
238
Table 103 Certificate Path Verification Failure Reason Codes
239
Table 104 802.1X Logs
240
Table 105 ACL Setting Notes
241
Table 106 ICMP Notes
242
Table 107 Syslog Logs
243
Table 108 RFC-2408 ISAKMP Payload Types
243
Chapter 19 Tools
245
Firmware Upgrade
245
Figure 136 Firmware Upgrade
245
Table 109 Firmware Upgrade
245
Figure 137 Firmware Upload in Progress
246
Figure 138 Network Temporarily Disconnected
246
Configuration Screen
247
Backup Configuration
247
Figure 139 Error Message
247
Figure 140 Configuration
247
Restore Configuration
248
Figure 141 Configuration Restore Successful
248
Figure 142 Temporarily Disconnected
248
Table 110 Maintenance Restore Configuration
248
Back to Factory Defaults
249
Restart
249
Figure 143 Configuration Restore Error
249
Figure 144 Restart Screen
249
Chapter 20 Diagnostic
251
General Diagnostic
251
Figure 145 Diagnostic: General
251
Table 111 Diagnostic: General
251
DSL Line Diagnostic
252
Figure 146 Diagnostic: DSL Line
252
Table 112 Diagnostic: DSL Line
252
Chapter 21 Troubleshooting
253
Problems Starting up the Zyxel Device
253
Problems with the LAN
253
Table 113 Troubleshooting Starting up Your Zyxel Device
253
Table 114 Troubleshooting the LAN
253
Problems with the WAN
254
Table 115 Troubleshooting the WAN
254
Problems Accessing the Zyxel Device
255
Table 116 Troubleshooting Accessing the Zyxel Device
255
Appendix A Product Specifications
257
Product Specifications
257
Table 117 Device Specifications
257
Table 118 Firmware
258
Appendix B about ADSL
261
Introduction to DSL
261
ADSL Overview
261
Advantages of ADSL
261
Appendix C Internal SPTGEN
263
Internal SPTGEN Overview
263
The Configuration Text File Format
263
Figure 147 Configuration Text File Format: Column Descriptions
263
Internal SPTGEN FTP Download Example
264
Figure 148 Invalid Parameter Entered: Command Line Example
264
Figure 149 Valid Parameter Entered: Command Line Example
264
Internal SPTGEN FTP Upload Example
265
Figure 150 Internal SPTGEN FTP Download Example
265
Figure 151 Internal SPTGEN FTP Upload Example
265
Example Internal SPTGEN Menus
266
Table 119 Abbreviations Used in the Example Internal SPTGEN Screens Table
266
Table 120 Menu 1 General Setup
266
Table 121 Menu 3
266
Table 122 Menu 4 Internet Access Setup
270
Table 123 Menu 12
271
Table 124 Menu 15 SUA Server Setup
272
Table 125 Menu 21.1 Filter Set #1
273
Table 126 Menu 21.1 Filer Set #2
275
Table 127 Menu 23 System Menus
276
Table 128 Menu 24.11 Remote Management Control
277
Command Examples
278
Table 129 Command Examples
278
Appendix D
279
Figure 152 Wall-Mounting Example
279
Wall-Mounting Instructions
279
Appendix E Setting up Your Computer's IP Address
281
Windows 95/98/Me
281
Figure 153 Windows 95/98/Me: Network: Configuration
282
Figure 154 Windows 95/98/Me: TCP/IP Properties: IP Address
283
Windows 2000/NT/XP
284
Figure 155 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
284
Figure 156 Windows XP: Start Menu
285
Figure 157 Windows XP: Control Panel
285
Figure 158 Windows XP: Control Panel: Network Connections: Properties
286
Figure 159 Windows XP: Local Area Connection Properties
286
Figure 160 Windows XP: Internet Protocol (TCP/IP) Properties
287
Figure 161 Windows XP: Advanced TCP/IP Properties
288
Macintosh os 8/9
289
Figure 162 Windows XP: Internet Protocol (TCP/IP) Properties
289
Figure 163 Macintosh os 8/9: Apple Menu
290
Figure 164 Macintosh os 8/9: TCP/IP
290
Macintosh os X
291
Figure 165 Macintosh os X: Apple Menu
291
Linux
292
Figure 166 Macintosh os X: Network
292
Figure 167 Red hat 9.0: KDE: Network Configuration: Devices
293
Figure 168 Red hat 9.0: KDE: Ethernet Device: General
293
Figure 169 Red hat 9.0: KDE: Network Configuration: DNS
294
Figure 170 Red hat 9.0: KDE: Network Configuration: Activate
294
Figure 171 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
295
Figure 172 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
295
Figure 173 Red hat 9.0: DNS Settings in Resolv.conf
295
Figure 174 Red hat 9.0: Restart Ethernet Card
296
Figure 175 Red hat 9.0: Checking TCP/IP Properties
296
Appendix Fip Subnetting
297
Introduction to IP Addresses
297
Table 130 Classes of IP Addresses
297
Subnet Masks
298
Table 131 Allowed IP Address Range by Class
298
Table 132 "Natural" Masks
298
Subnetting
299
Table 133 Alternative Subnet Mask Notation
299
Example: Two Subnets
300
Table 134 Two Subnets Example
300
Table 135 Subnet 1
300
Table 136 Subnet 2
300
Example: Four Subnets
301
Table 137 Subnet 1
301
Table 138 Subnet 2
301
Example Eight Subnets
302
Table 139 Subnet 3
302
Table 140 Subnet 4
302
Table 141 Eight Subnets
302
Subnetting with Class a and Class B Networks
303
Table 142 Class C Subnet Planning
303
Table 143 Class B Subnet Planning
303
Appendix G Command Interpreter
305
Accessing the CLI
305
Command Syntax
305
Command Usage
305
Log Commands
306
Figure 176 Displaying Log Categories Example
306
Figure 177 Displaying Log Parameters Example
306
Log Command Example
307
Appendix H Firewall Commands
309
Table 144 Firewall Commands
309
Appendix I Netbios Filter Commands
315
Introduction
315
Display Netbios Filter Settings
315
Netbios Filter Configuration
316
Table 145 Netbios Filter Default Settings
316
Appendix J Splitters and Microfilters
317
Connecting a POTS Splitter
317
Telephone Microfilters
317
Figure 178 Connecting a POTS Splitter
317
Figure 179 Connecting a Microfilter
318
Figure 180 Connecting a Microfilter and Y-Connector
318
Zyxel Device with ISDN
319
Figure 181 Zyxel Device with ISDN
319
Appendix K Wireless Lans
321
Wireless LAN Topologies
321
Figure 182 Peer-To-Peer Communication in an Ad-Hoc Network
321
Figure 183 Basic Service Set
322
Channel
323
Rts/Cts
323
Figure 184 Infrastructure WLAN
323
Fragmentation Threshold
324
Figure 185 RTS/CTS
324
Preamble Type
325
IEEE 802.11G Wireless LAN
325
Table 146 IEEE 802.11G
325
Wireless Security Overview
326
Radius
326
Table 147 Wireless Security Levels
326
Types of Authentication
327
Dynamic WEP Key Exchange
329
WPA and WPA2
329
Table 148 Comparison of EAP Authentication Types
329
Wireless Client Wpa Supplicants
331
Wpa with Radius Application Example
331
Figure 186 WPA(2) with RADIUS Application Example
332
Figure 187 WPA(2)-PSK Authentication
332
Security Parameters Summary
333
Table 149 Wireless Security Relational Matrix
333
Appendix L Pop-Up Windows, Javascripts and Java Permissions
335
Internet Explorer Pop-Up Blockers
335
Figure 188 Pop-Up Blocker
335
Figure 189 Internet Options
336
Figure 190 Internet Options (2)
337
Javascripts
338
Figure 191 Pop-Up Blocker Settings
338
Figure 192 Internet Options (3)
339
Figure 193 Security Settings - Java Scripting
340
Figure 194 Security Settings - Java
341
Figure 195 Java (Sun)
342
Appendix M Triangle Route
343
The Ideal Setup
343
The "Triangle Route" Problem
343
Figure 196 Ideal Setup
343
The "Triangle Route" Solutions
344
IP Aliasing
344
Figure 197 "Triangle Route" Problem
344
Figure 198 IP Alias
344
Index
345
Other manuals for ZyXEL Communications P-660HW-T v2
Quick Start Guide
6 pages
Related product manuals
P-660HW-T V2 - VERSION 3.40
351 pages
P-870HW-51A V2
150 pages
USG-100@USG-200 - V2.20 ED 2
1157 pages
ZyXEL Communications P-660HN-51
310 pages
ZyXEL Communications P-660HN-T1A
118 pages
P-660H Series
359 pages
P-660HN-51 - QUICK GUIDE V1.10
12 pages
ZyXEL Communications P-661HNU
404 pages
P-661HW-D Series
6 pages
ZyXEL Communications P-792H v3
297 pages
ZyXEL Communications P-793H v3
297 pages
ZyXEL Communications P-870HN-5xb
400 pages