EasyManua.ls Logo

ZyXEL Communications UAG Series User Manual

ZyXEL Communications UAG Series
323 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
www.zyxel.com
Quick Start Guide
UAG Series
Unified Access Gateway
Versions: 2.50, 4.00
Edition 2, 04/2014
Copyright © 2011
ZyXEL Communications Corporation
CLI Reference Guide
Default Login Details
LAN Port https://192.168.1.1
User Name admin
Password 1234
Copyright © 2014 ZyXEL Communications Corporation

Table of Contents

Other manuals for ZyXEL Communications UAG Series

Question and Answer IconNeed help?

Do you have a question about the ZyXEL Communications UAG Series and is the answer not in the manual?

ZyXEL Communications UAG Series Specifications

General IconGeneral
BrandZyXEL Communications
ModelUAG Series
CategoryGateway
LanguageEnglish

Summary

Chapter 1 Command Line Interface

1.2 Accessing the CLI

Details the methods for accessing the CLI, including console port, web configurator, Telnet, and SSH.

1.5 CLI Modes

Describes the different modes (User, Privilege, Configuration, Sub-command) for executing CLI commands.

1.9 Saving Configuration Changes

Explains the 'write' command for saving configuration changes and the importance of saving before logging out.

Chapter 2 User and Privilege Modes

2.1 User And Privilege Modes

Explains the initial CLI mode (User mode) and how to enter Privilege mode using 'enable'.

Chapter 4 Status

Table 7 Status Show Commands

Lists commands used to display various status information about the UAG's operational state.

Chapter 6 AP Management

6.2 AP Management Commands

Lists commands for adding, deleting, and editing managed APs using the CAPWAP protocol.

Chapter 7 Wireless LAN Profiles

7.2 AP Profile Commands

Details commands for setting up configurations for radios onboard APs.

7.3 SSID Profile Commands

Lists commands for managing SSID profiles, including creating, renaming, and assigning security profiles.

7.4 Security Profile Commands

Explains commands for managing security profiles, including WEP, WPA, and WPA2 settings.

7.5 MAC Filter Profile Commands

Details commands for configuring MAC address filtering profiles to control network access.

Chapter 8 Interfaces

8.2 Interface General Commands Summary

Provides a summary of general commands applicable to various interface types.

8.2.1 Basic Interface Properties and IP Address Commands

Covers commands for configuring basic interface properties, IP addressing, and gateway settings.

8.2.2 DHCP Setting Commands

Explains commands related to DHCP pools for assigning IP addresses and network configurations to clients.

8.3 Ethernet Interface Specific Commands

Covers commands specific to configuring Ethernet interfaces.

8.4 Virtual Interface Specific Commands

Describes how to configure virtual interfaces, leveraging general interface commands.

8.5 PPPoE/PPTP Specific Commands

Covers commands specific to configuring PPPoE/PPTP interfaces for ISP connections.

8.7 VLAN Interface Specific Commands

Explains commands specific to configuring VLAN interfaces.

Chapter 9 Trunks

9.4 Trunk Commands Summary

Lists the interface-group commands used for configuring trunk load balancing and settings.

Chapter 10 IP Drop-In

10.2 Drop-In Commands

Provides commands for configuring IP drop-in mode, including activating the feature and setting interfaces.

Chapter 11 Route

11.1 Policy Route

Introduces IP Policy Routing (IPPR) as a mechanism to override default routing based on administrator-defined policies.

11.2 Policy Route Commands

Lists commands for configuring policy routes, including destination, next-hop, bandwidth, and DSCP settings.

11.3 IP Static Route

Explains the need for static routes to inform the UAG about networks beyond directly connected ones.

11.4 Static Route Commands

Details commands for configuring static routes, including setting destination, next-hop, and priority.

Chapter 12 Routing Protocol

12.2 Routing Protocol Commands Summary

Lists commands for configuring RIP and OSPF routing protocols.

Chapter 13 Zones

13.2 Zone Commands Summary

Lists commands for managing zones, including creation, deletion, and interface/tunnel assignment.

Chapter 14 DDNS

14.2 DDNS Commands Summary

Lists commands for configuring DDNS services, including service type, credentials, and WAN interface.

Chapter 15 Virtual Servers

15.1 Virtual Server Overview

Introduces virtual servers (port forwarding/translation) for making private network servers accessible externally.

15.1.1 1:1 NAT and Many 1:1 NAT

Explains 1:1 NAT and Many 1:1 NAT for translating source IP addresses for servers accessing outside clients.

15.2 Virtual Server Commands Summary

Lists commands for creating, managing, and removing virtual servers and NAT rules.

15.2.2 Tutorial - How to Allow Public Access to a Server

A step-by-step guide on allowing public access to an HTTP server via NAT and firewall rules.

Chapter 16 VPN 1-1 Mapping

16.2 VPN 1-1 Mapping Commands

Lists commands for configuring VPN 1-1 mapping, including pools, rules, and activation.

Chapter 17 HTTP Redirect

17.2 HTTP Redirect Commands

Lists commands for configuring HTTP redirection rules, including activation and disabling.

Chapter 18 SMTP Redirect

18.2 SMTP Redirect Commands

Lists commands for configuring SMTP redirection, including interface, server, source, and user settings.

Chapter 19 ALG

19.2 ALG Commands

Lists commands for configuring ALG for SIP, H.323, and FTP, including timeouts and transformations.

Chapter 20 UPnP

20.2 UPnP and NAT-PMP Commands

Lists commands for configuring UPnP and NAT-PMP, including firewall bypass and listening interfaces.

Chapter 21 IP/MAC Binding

21.2 IP/MAC Binding Commands

Lists commands for configuring IP/MAC binding, including activation, logging, and exemptions.

Chapter 22 Layer 2 Isolation

22.2 Layer 2 Isolation Commands

Lists commands for enabling Layer-2 isolation on interfaces and managing the white list.

Chapter 24 Web Authentication

24.2 Web Authentication Commands

Lists commands for forcing user authentication, including default rules and exceptional services.

Chapter 25 Walled Garden

25.2 Walled Garden Commands

Lists commands for enabling the walled garden feature and managing URL entries.

Chapter 27 Firewall

27.1 Firewall Overview

Introduces the UAG's stateful inspection firewall, which screens data packets against access rules.

27.2 Firewall Commands

Lists commands for configuring the firewall, including rule creation, activation, and session limits.

27.2.1 Firewall Sub-Commands

Details sub-commands for firewall rules, covering action, source, destination, and logging.

27.3 Session Limit Commands

Explains commands for setting limits on concurrent NAT/firewall sessions per host.

Table 90 Command Summary: Session Limit

Lists commands for configuring session limits, including activation, limits, and user assignments.

Chapter 29 Payment Service

29.2 Payment-service Commands

Lists commands for configuring payment services, including account delivery and provider settings.

Chapter 33 Bandwidth Management

33.1 Bandwidth Management Overview

Explains bandwidth management for controlling network service usage and prioritizing traffic.

33.2 Bandwidth Management Commands

Lists commands for configuring bandwidth management policies, including activation and priority.

33.2.1 Bandwidth Sub-Commands

Details sub-commands for bandwidth management policies, covering DSCP marking, inbound/outbound guarantees.

Chapter 34 IPSec VPN

34.1 IPSec VPN Overview

Explains Virtual Private Network (VPN) and Internet Protocol Security (IPSec) for secure data communications.

34.2 IPSec VPN Commands Summary

Lists commands for configuring IPSec VPNs, including IKE SA, IPSec SA, and VPN concentrator settings.

34.2.1 IKE SA Commands

Details commands for configuring IKE SAs (Internet Key Exchange Security Associations).

34.2.2 IPSec SA Commands (except Manual Keys)

Covers commands for IPSec SAs, excluding manual key configurations.

34.2.3 IPSec SA Commands (for Manual Keys)

Explains additional commands for IPSec SAs using manual keys for VPN connections.

34.2.4 VPN Concentrator Commands

Lists commands for configuring the VPN concentrator settings.

Chapter 35 SSL VPN

35.1 SSL Access Policy

Explains SSL access policies for limiting user access to specific applications, files, or networks.

35.2 SSL VPN Commands

Lists commands for configuring SSL VPN access policies, including application objects and endpoint security.

35.2.1 SSL VPN Commands

Provides commands for configuring SSL VPN access policies, activation, and application objects.

35.2.2 Setting an SSL VPN Rule Tutorial

A tutorial on configuring an SSL VPN rule, including user accounts, IP pools, DNS servers, and endpoint security.

Chapter 36 Content Filtering

36.1 Content Filtering Overview

Explains content filtering for blocking web features, specific sites, or categories of web content.

36.2 Content Filtering Policies

Describes how content filtering policies use schedule, address, and user/group objects to apply filtering.

36.6 General Content Filter Commands

Provides general commands for content filter configuration, such as activation and policy management.

36.7 Content Filter Filtering Profile Commands

Details commands for configuring content filtering profiles, including trusted/forbidden lists and feature blocking.

Chapter 37 User/Group

37.1 User Account Overview

Defines user accounts and their privileges, used in firewall rules and service access control.

37.2 User/Group Commands Summary

Provides a summary of commands for managing usernames and group names.

37.2.1 User Commands

Lists commands for creating, deleting, and configuring user accounts, including passwords and types.

37.2.2 User Group Commands

Lists commands for managing user groups, including creation, deletion, and adding users/groups.

37.2.3 User Setting Commands

Details commands for configuring user settings like lease times, reauthentication, and simultaneous logins.

Chapter 38 Addresses

38.1 Address Overview

Explains address objects for representing IP addresses, ranges, or subnets, and address groups.

38.2 Address Commands Summary

Lists commands for creating and managing address objects and address groups.

38.2.1 Address Object Commands

Details commands for creating and managing IPv4 address objects.

38.2.2 Address Group Commands

Lists commands for creating and managing address groups.

Chapter 39 Services

39.2 Services Commands Summary

Lists commands for managing service objects and service groups.

39.2.1 Service Object Commands

Details commands for creating and managing service objects for TCP, UDP, and ICMP.

39.2.2 Service Group Commands

Lists commands for creating and managing service groups.

Chapter 40 Schedules

40.2 Schedule Commands Summary

Lists commands for setting up one-time and recurring schedules.

Chapter 41 AAA Server

41.1 AAA Server Overview

Introduces AAA (Authentication, Authorization, Accounting) servers for network access control.

41.2 Authentication Server Command Summary

Describes commands for setting up external authentication servers like AD, LDAP, and RADIUS.

41.2.1 ad-server Commands

Details commands for configuring the default Active Directory (AD) server settings.

41.2.2 ldap-server Commands

Explains commands for configuring the default LDAP server settings.

41.2.3 radius-server Commands

Lists commands for setting the default RADIUS server address and service port.

Chapter 42 Authentication Objects

42.1 Authentication Objects Overview

Explains specifying authentication objects containing AAA server information for user authentication.

42.2 aaa authentication Commands

Lists commands for configuring authentication profiles, including default methods and profile naming.

Chapter 43 Certificates

43.2 Certificate Commands

Describes commands for configuring certificates, including input values and management operations.

43.4 Certificates Commands Summary

Provides a summary of commands for managing certificates and certification requests.

Chapter 44 ISP Accounts

44.1.1 PPPoE and PPTP Account Commands

Lists commands for configuring PPPoE and PPTP ISP accounts, including username, password, and encryption.

Chapter 45 SSL Application

45.1.1 SSL Application Object Commands

Lists commands for creating SSL application objects, including RDP, VNC, and weblink types.

Chapter 46 Endpoint Security

46.1 Endpoint Security Overview

Explains Endpoint Security (EPS) for ensuring user computers comply with corporate policies before network access.

46.1.1 Endpoint Security Commands Summary

Summarizes commands for creating endpoint security objects, including failure messages and profile settings.

46.1.2 Endpoint Security Object Commands

Lists commands for creating endpoint security objects, specifying OS, anti-virus, firewall, and file info.

Chapter 47 Dynamic Guest Accounts

47.2 Dynamic-guest Commands

Lists commands for managing dynamic guest accounts, including free user creation and generation.

Chapter 48 System

48.6 DNS Overview

Introduces the Domain Name System (DNS) and its importance for network access.

48.6.2 DNS Commands

Lists commands for configuring DNS settings, including A records, MX records, and service control rules.

Chapter 49 System Remote Management

49.1 Remote Management Overview

Explains how to manage the UAG remotely via Internet, LAN, or DMZ.

49.3 HTTP/HTTPS Commands

Details commands for configuring HTTP and HTTPS access to the UAG web configurator.

49.4 SSH

Explains Secure Shell (SSH) as a secure protocol for remote management.

49.4.3 SSH Commands

Details commands for configuring SSH access, including server settings, certificates, and service rules.

49.6 Telnet Commands

Lists commands for configuring Telnet access, including port numbers and service control rules.

49.8.3 SNMP Commands

Details commands for configuring SNMP, including community strings, contact info, and host settings.

Chapter 50 File Manager

50.4 File Manager Commands Summary

Lists commands for file management, including applying, copying, deleting, and renaming files.

Chapter 51 Logs

Chapter 52 Reports and Reboot

52.3 Reboot

Explains how to restart the device using the 'reboot' command and the importance of saving changes.

Chapter 53 Session Timeout

Chapter 54 Diagnostics

Chapter 56 Maintenance Tools

Related product manuals