EasyManua.ls Logo

ZyXEL Communications UAG2100 User Manual

ZyXEL Communications UAG2100
470 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Quick Start Guide
www.zyxel.com
UAG2100
Unified Access Gateway
Version 4.00
Edition 1, 08/2014
Copyright © 2014 ZyXEL Communications Corporation
User’s Guide
Default Login Details
LAN IP Address http://172.16.0.1 (LAN1)
http://172.17.0.1 (LAN2)
User Name admin
Password 1234

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ZyXEL Communications UAG2100 and is the answer not in the manual?

ZyXEL Communications UAG2100 Specifications

General IconGeneral
Device TypeUnified Access Gateway
LAN Ports4
VPN SupportYes
FirewallYes
Power Supply12V DC
Storage Temperature-20°C to 70°C
Humidity10% to 90% (non-condensing)
WAN Ports2
Wireless Standards802.11 b/g/n
Interfaces2 WAN, 1 USB
Operating Temperature0°C to 40°C

Summary

Introduction

1.1 Overview

A general overview of the UAG and its capabilities, highlighting its integrated functionality.

1.2 Default Zones, Interfaces, and Ports

Describes the default network configurations for zones, interfaces, and ports.

1.3 Management Overview

Explains the different ways to manage the UAG, including the Web Configurator and CLI.

1.4 Web Configurator

Details on how to access and use the Web Configurator for UAG setup and configuration.

1.4.1 Web Configurator Access

Step-by-step guide on accessing the UAG's Web Configurator via a browser.

1.4.2 Web Configurator Screens Overview

Describes the main sections of the Web Configurator interface: title bar, navigation panel, and main window.

1.4.2.1 Title Bar

Explains the icons and functions available in the title bar of the Web Configurator.

Object Reference

How to find configuration settings that reference specific objects within the UAG.

1.4.3 Navigation Panel

Explains how to use the navigation panel to access various configuration and status screens.

Monitor Menu

Describes the screens available in the Monitor menu for checking status and statistics.

Configuration Menu

Describes the screens available in the Configuration menu for setting up features.

1.4.4 Tables and Lists

Explains how to interact with tables and lists in the Web Configurator for data management.

1.5 Stopping the UAG

Instructions on how to properly shut down the UAG device to prevent firmware corruption.

Hardware Installation and Connection

2.1 Wall Mounting

Provides instructions and details for mounting the UAG on a wall.

2.2 Front Panel

Introduces the components and indicators on the UAG's front panel.

1000Base-T Ports

Describes the functionality of the 1000Base-T Ethernet ports.

USB 2.0 Ports

Explains the purpose and usage of the USB 2.0 ports for system logs and kernel saving.

2.2.1 Front Panel LEDs

Describes the status and meaning of the front panel LEDs.

2.3 Rear Panel

Shows the layout and components of the UAG's rear panel, including console port and power switch.

Console Port

Details on connecting and using the console port for command-line interface access.

Printer Deployment

3.1 Overview

Outlines the process of setting up and deploying an external statement printer with the UAG.

3.2 Attach the Printer to the UAG

Instructions for physically connecting the printer to the UAG.

3.3 Set up an Internet Connection on the UAG

Steps to configure the UAG's internet connection via a broadband modem or router.

3.4 Allow the UAG to Monitor and Manage the Printer

How to configure the UAG to monitor and manage the connected printer's status.

3.5 Turn on Web Authentication on the UAG

Guides on enabling web authentication for network access control.

3.6 Generate a Free Guest Account

Instructions for creating guest accounts for free internet access during specified periods.

Installation Setup Wizard

4.1 Installation Setup Wizard Screens

Overview of the wizard that guides initial UAG setup for internet connection and service activation.

4.1.1 Internet Access Setup - WAN Interface

Configuration steps for the WAN interface, including encapsulation and IP address assignment.

4.1.2 Internet Access: Ethernet

Details on configuring Ethernet-based Internet access settings.

4.1.3 Internet Access: PPPoE

Steps for configuring PPPoE connections for Internet access, including ISP parameters.

4.1.4 Internet Access: PPTP

Steps for configuring PPTP connections for Internet access, including ISP parameters.

4.1.5 Internet Access - Finish

The final step of the Internet access setup wizard, reviewing configured settings.

4.2 Device Registration

Instructions for registering the UAG device online to activate service subscriptions.

Quick Setup Wizards

5.1 Quick Setup Overview

An overview of quick setup wizards for configuring internet connection settings.

5.2.1 Choose an Ethernet Interface

Selecting the Ethernet interface for WAN configuration.

5.2.2 Select WAN Type

Choosing the encapsulation type (Ethernet, PPPoE, PPTP) for the WAN connection.

5.2.3 Configure WAN IP Settings

Setting up IP address assignment (fixed or dynamic) for the WAN interface.

5.2.4 ISP and WAN Connection Settings

Configuring ISP account details and WAN connection parameters.

Dashboard

6.1 Overview

Introduction to the Dashboard screen for checking UAG status and system information.

6.1.1 What You Can Do in this Chapter

Outlines the functionalities accessible via the Dashboard, including system status and resource usage.

6.2 The Dashboard Screen

Describes the main Dashboard screen, its widgets, and customization options.

6.1.1 What You Can Do in this Chapter

Outlines the functionalities accessible via the Dashboard, including system status and resource usage.

6.2 The Dashboard Screen

Describes the main Dashboard screen, its widgets, and customization options.

6.2.1 The CPU Usage Screen

Displays a chart of the UAG's recent CPU usage over time.

6.2.2 The Memory Usage Screen

Displays a chart of the UAG's recent memory (RAM) usage over time.

6.2.3 The Active Sessions Screen

Displays a chart of the UAG's recent traffic session usage.

6.2.4 The DHCP Table Screen

Shows IP addresses assigned to DHCP clients and reserved for specific MAC addresses.

6.2.5 The Number of Login Users Screen

Lists users currently logged into the UAG.

Monitor

7.1 Overview

Introduction to the Monitor screens for checking status and statistics information.

7.1.1 What You Can Do in this Chapter

Lists the types of status and statistics information available in the Monitor section.

7.2 The Port Statistics Screen

Displays packet statistics for each Gigabit Ethernet port.

7.2.1 The Port Statistics Graph Screen

Shows a line graph of packet statistics for each physical port.

7.3 The Interface Status Screen

Lists all UAG interfaces and their packet statistics.

7.4 The Traffic Statistics Screen

Provides basic information about traffic statistics, including visited websites and protocols.

7.5 The Session Monitor Screen

Displays information about all established sessions for debugging or statistical analysis.

7.6 The DDNS Status Screen

Shows the status of the UAG’s Dynamic DNS (DDNS) domain names.

7.7 The IP/MAC Binding Monitor Screen

Lists devices with IP/MAC binding enabled and active sessions.

7.8 The Login Users Screen

Lists users currently logged into the UAG.

7.9 The UPnP Port Status Screen

Shows NAT port mapping rules created by UPnP.

7.10 The USB Storage Screen

Displays information about a connected USB storage device.

7.11 The Dynamic Guest Screen

Lists dynamic guest user accounts stored in the UAG's local database.

7.12 The AP List Screen

Shows which Access Points (APs) are currently connected to the UAG.

7.12.1 Station Count of AP

Displays station statistics for a connected AP.

7.13 The Radio List Screen

Shows statistics about wireless radio transmitters in connected APs.

7.13.1 AP Mode Radio Information

Displays detailed information about a selected radio's SSIDs, traffic, and clients.

7.14 The Station List Screen

Shows statistics for associated stations (wireless clients).

7.15 The Printer Status Screen

Displays information about connected statement printers.

7.16 The VPN 1-1 Mapping Status Screen

Shows the status of active users using VPN 1-1 mapping rules.

7.16.1 VPN 1-1 Mapping Statistics

Displays statistics for each of the VPN 1-1 mapping rules.

7.17 The Log Screen

Accesses and displays system log messages and debugging information.

7.17.1 View AP Log

Views current wireless Access Point (AP) log messages.

7.17.2 Dynamic Users Log

Views dynamic guest account log messages.

Registration

8.1 Overview

Introduction to registering the UAG and managing its service subscriptions.

8.1.1 What You Can Do in this Chapter

Lists tasks related to UAG registration with myZyXEL.com and service management.

8.1.2 What you Need to Know

Provides background information on myZyXEL.com and available subscription services.

8.2 Registration Screen

The screen used for registering the UAG with myZyXEL.com.

Wireless

9.1 Overview

Introduction to configuring how the UAG manages Access Points (APs) connected to its wireless network.

9.1.1 What You Can Do in this Chapter

Outlines tasks related to AP management and controller settings.

9.2 Controller Screen

Configures how the UAG allows new APs to connect to the network.

9.3 AP Management Screen

Manages all Access Points (APs) connected to the UAG.

Interfaces

10.1 Interface Overview

Introduction to configuring UAG interfaces and creating interfaces on top of others.

10.1.1 What You Can Do in this Chapter

Lists tasks related to configuring various interface types: Port Role, Ethernet, PPP, VLAN, Bridge, Virtual.

10.1.2 What You Need to Know

Explains general interface characteristics applicable to different interface types.

Types of Interfaces

Describes different types of interfaces (port groups, Ethernet, VLAN, Bridge, PPP, Virtual, Trunk) in the UAG.

10.2 Port Role Screen

Sets UAG's flexible ports as part of LAN1 or LAN2 interfaces, creating hardware connections.

10.3 Ethernet Summary Screen

Lists all Ethernet and virtual interfaces created on top of Ethernet interfaces.

10.3.1 Ethernet Edit

Configures IP address assignment, parameters, DHCP settings, and MAC settings for Ethernet interfaces.

10.3.2 Object References

Explains how to find configuration settings that reference specific objects.

10.3.3 Add/Edit DHCP Extended Options

Adds DHCP extended options when configuring a DHCPv4 server.

10.4 PPP Interfaces

Explains how to use PPPoE/PPTP interfaces to connect to an ISP.

10.4.1 PPP Interface Summary

Lists every PPPoE/PPTP interface configured on the UAG.

10.4.2 PPP Interface Add or Edit

Configures PPPoE or PPTP interfaces, requiring ISP account setup first.

10.5 VLAN Interfaces

Divides a physical network into multiple logical networks using VLANs.

VLAN Interfaces Overview

Explains how VLAN interfaces function and interact within the UAG.

10.5.1 VLAN Interface Summary Screen

Lists VLAN and virtual interfaces created on top of VLAN interfaces.

10.6 Bridge Interfaces

Introduces bridge interfaces and explains the screens for configuring them.

Bridge Interface Overview

Explains how bridge interfaces create software bridges between network segments.

10.6.1 Bridge Interface Summary

Lists every bridge interface and virtual interface created on top of bridge interfaces.

10.6.2 Bridge Interface Add/Edit

Configures IP address, bandwidth, DHCP, and connectivity for bridge interfaces.

10.7 Virtual Interfaces

Explains how virtual interfaces are used to route packets within the UAG.

10.7.1 Virtual Interfaces Add/Edit

Configures IP address assignment and interface parameters for virtual interfaces.

10.8 Interface Technical Reference

Provides detailed information about UAG interfaces, including IP addressing and routing.

Trunks

11.1 Overview

Explains how to use trunks for WAN load balancing to increase throughput and reliability.

11.1.1 What You Can Do in this Chapter

Outlines tasks related to trunk configuration, link sticking, and load balancing algorithms.

11.1.2 What You Need to Know

Provides information on adding WAN interfaces to trunks and policy routing for traffic distribution.

Load Balancing Algorithms

Describes algorithms (Least Load First, Weighted Round Robin, Spillover) for interface traffic distribution.

Least Load First

Explains the Least Load First load balancing algorithm based on bandwidth utilization.

Weighted Round Robin

Describes the Weighted Round Robin load balancing algorithm considering interface weights.

Spillover

Explains the spillover load balancing algorithm, sending traffic to the next interface when load limits are reached.

11.2 The Trunk Summary Screen

Lists configured trunks and the load balancing algorithm each is set to use.

11.2.1 Configuring a User-Defined Trunk

Steps to create or edit a user-defined WAN trunk, including member interfaces and algorithms.

11.2.2 Configuring the System Default Trunk

Configures load balancing algorithms and bandwidth allocations for the system default trunk.

Policy and Static Routes

12.1 Policy and Static Routes Overview

Introduction to policy and static routes for overriding default routing behavior.

12.1.1 What You Can Do in this Chapter

Lists tasks related to configuring policy routes and static routes.

12.1.2 What You Need to Know

Explains policy routing, static routes, and DiffServ concepts.

Policy Routing

Explains policy routing as a mechanism to override default routing behavior.

Static Routes

Describes using static routes to send data to devices not reachable via the default gateway.

Policy Routes Versus Static Routes

Compares policy routes to static routes, highlighting flexibility and priority.

DiffServ

Explains Quality of Service (QoS) using DiffServ for prioritizing traffic flows.

DSCP Marking and Per-Hop Behavior

Explains DSCP marking and its effect on traffic forwarding using DiffServ.

12.2 Policy Route Screen

Screen for viewing and configuring policy routes based on matching criteria and actions.

12.2.1 Policy Route Edit Screen

Configures or edits a policy route, defining criteria and actions for traffic routing.

12.3 IP Static Route Screen

Displays and configures static routes to propagate routing information to other routers.

12.3.1 Static Route Add/Edit Screen

Configures or edits static routes, specifying destination, subnet mask, gateway, and interface.

NAT and SNAT

Explains Network Address Translation (NAT) and Source NAT (SNAT) for IP address translation.

Assured Forwarding (AF) PHB for DiffServ

Describes Assured Forwarding (AF) behavior groups for DiffServ, including drop precedence.

Zones

13.1 Zones Overview

Explains how to set up zones for network security and policy configuration.

13.1.1 What You Can Do in this Chapter

Lists tasks related to managing UAG zones, including adding, editing, and removing.

13.1.2 What You Need to Know

Discusses how zones affect different types of traffic: intra-zone, inter-zone, and extra-zone.

Effects of Zones on Different Types of Traffic

Explains how zones divide traffic into intra-zone, inter-zone, and extra-zone traffic.

13.2 The Zone Screen

Provides a summary of all zones and allows adding, editing, and removing zones.

13.2.1 Zone Edit

Allows adding or editing a zone, including assigning member interfaces.

DDNS

14.1 DDNS Overview

Introduction to Dynamic DNS (DDNS) services for using domain names with dynamic IP addresses.

14.1.1 What You Can Do in this Chapter

Lists tasks for viewing and adding DDNS domain names and their configurations.

14.1.2 What You Need to Know

Provides information on DNS mapping and required dynamic DNS accounts.

14.2 The DDNS Screen

Summarizes all DDNS domain names and their configurations, allowing add, edit, delete.

14.2.1 The Dynamic DNS Add/Edit Screen

Adds or edits DDNS domain name configurations.

NAT

15.1 NAT Overview

Introduction to Network Address Translation (NAT) for making private network computers available externally.

15.1.1 What You Can Do in this Chapter

Lists tasks for viewing and managing NAT rules and their configurations.

15.1.2 What You Need to Know

Defines NAT and its alternative names: virtual server, port forwarding, or port translation.

Finding Out More

Refers to technical background information related to NAT screens.

15.2 The NAT Screen

Provides a summary of all NAT rules and their configurations.

15.2.1 The NAT Add/Edit Screen

Creates new NAT rules or edits existing ones.

15.3 NAT Technical Reference

Provides detailed information about NAT functionality on the UAG.

NAT Loopback

Explains how NAT loopback allows WAN users to access internal services via original IP.

VPN 1-1 Mapping

16.1 VPN 1-1 Mapping Overview

Allows authenticated users to access the Internet or servers using a unique public IP address.

16.1.1 What You Can Do in this Chapter

Outlines tasks for enabling and configuring VPN 1-1 mapping rules.

16.1.2 What You Need to Know

Discusses VPN 1-1 Mapping, Firewall, and Policy Route interactions.

VPN 1-1 Mapping, Firewall and Policy Route

Explains how VPN 1-1 mapping, firewall, and policy routes interact for packet flow.

16.2 The VPN 1-1 Mapping General Screen

Summarizes all VPN 1-1 mapping rules and their configurations.

16.2.1 The VPN 1-1 Mapping Edit Screen

Configures or edits VPN 1-1 mapping rules.

16.3 The VPN 1-1 Mapping Profile Screen

Configures pool profiles defining public IP addresses assigned to matched users.

HTTP Redirect

17.1 Overview

Forwards the client's HTTP request to a web proxy server.

17.1.1 What You Can Do in this Chapter

Lists tasks for displaying and editing HTTP redirect rules.

17.1.2 What You Need to Know

Explains the functionality of a Web Proxy Server.

Web Proxy Server

Describes how a proxy server assists clients in accessing resources and provides security.

HTTP Redirect, Firewall and Policy Route

Explains the packet flow for HTTP redirect traffic, including firewall and policy route interactions.

17.2 The HTTP Redirect Screen

Configures redirection of HTTP requests to a proxy server.

17.2.1 The HTTP Redirect Edit Screen

Configures or edits an HTTP redirect rule.

SMTP Redirect

18.1 Overview

Forwards authenticated client SMTP messages to an SMTP server for delivery.

18.1.1 What You Can Do in this Chapter

Lists tasks for displaying and editing SMTP redirect rules.

18.1.2 What You Need to Know

Explains the Simple Mail Transfer Protocol (SMTP) and its usage.

SMTP

Describes the Simple Mail Transfer Protocol (SMTP) as the Internet's message transport standard.

SMTP Redirect, Firewall and Policy Route

Explains packet flow for SMTP redirect traffic, including firewall and policy route interactions.

18.2 The SMTP Redirect Screen

Configures redirection of SMTP messages to an SMTP server.

18.2.1 The SMTP Redirect Edit Screen

Configures or edits an SMTP redirect rule.

ALG

19.1 ALG Overview

Explains how Application Layer Gateway (ALG) allows applications to operate through UAG NAT.

19.1.1 What You Can Do in this Chapter

Lists tasks for setting up FTP ALG settings.

19.1.2 What You Need to Know

Explains Application Layer Gateway (ALG), NAT, and Firewall functionality.

Application Layer Gateway (ALG), NAT and Firewall

Describes how ALG functions with NAT and Firewall to support un-friendly applications.

FTP ALG

Explains the FTP ALG functionality for allowing TCP packets with specified port destinations.

ALG and Trunks

Discusses ALG traffic management through interface trunks and failover scenarios.

19.2 The ALG Screen

Enables and configures ALG settings, including FTP ALG settings.

UPnP

20.1 Overview

Introduction to UPnP and NAT-PMP for device discovery and seamless network connection.

20.2 What You Need to Know

Identifies UPnP hardware and explains its functionality.

20.2.1 NAT Traversal

Automates UPnP NAT traversal for application operation through NAT.

20.2.2 Cautions with UPnP

Highlights security considerations and potential issues with UPnP.

20.3 UPnP Screen

Enables UPnP and NAT-PMP on the UAG.

20.4 Technical Reference

Provides examples and technical details for using UPnP.

20.4.1 Using UPnP in Windows XP Example

Demonstrates using the UPnP feature in Windows XP.

20.4.1.1 Auto-discover Your UPnP-enabled Network Device

Guides on automatically discovering UPnP devices on the network.

IP/MAC Binding

21.1 IP/MAC Binding Overview

Ensures intended devices use privileged IP addresses by binding IP to MAC addresses.

21.1.1 What You Can Do in this Chapter

Outlines tasks for binding IP addresses to MAC addresses and configuring exempt lists.

21.1.2 What You Need to Know

Explains that IP/MAC bindings are based on the UAG’s dynamic and static DHCP entries.

DHCP

Explains the role of DHCP in managing IP/MAC address bindings.

21.2 IP/MAC Binding Summary

Lists IP to MAC address bindings for devices connected to each supported interface.

21.2.1 IP/MAC Binding Edit

Configures an interface's IP to MAC address binding settings.

21.2.2 Static DHCP Edit

Configures static IP to MAC address bindings for devices.

21.3 IP/MAC Binding Exempt List

Configures ranges of IP addresses to which the UAG does not apply IP/MAC binding.

Layer 2 Isolation

22.1 Overview

Prevents connected devices from communicating within the UAG's local network, except for devices on the white list.

22.1.1 What You Can Do in this Chapter

Outlines tasks for enabling layer-2 isolation and configuring the white list.

22.2 Layer-2 Isolation General Screen

Enables layer-2 isolation on the UAG and specific internal interfaces.

22.3 White List

Blocks IP addresses not in the white list from communicating with other devices.

22.3.1 Add/Edit White List Rule

Creates or edits rules in the white list to allow specific IP addresses access.

IPnP

23.1 Overview

Allows computers to access the Internet without changing network settings, even across subnets.

23.1.1 What You Can Do in this Chapter

Outlines tasks for enabling IPnP on the UAG and its internal interfaces.

23.2 IPnP Screen

Enables IPnP on the UAG and specific internal interfaces.

Web Authentication

24.1 Overview

Intercepts network traffic until user authentication via a designated login web page.

24.1.1 What You Can Do in this Chapter

Outlines tasks for creating and managing web authentication policies.

24.1.2 What You Need to Know

Discusses forced user authentication for HTTP traffic.

Forced User Authentication

Automatically displays the login screen for unauthenticated users accessing HTTP traffic.

Finding Out More

Refers to an example of user-aware access control configuration.

24.2 Web Authentication Screen

Displays web portal settings and web authentication policies configured on the UAG.

24.2.1 Creating/Editing an Authentication Policy

Configures an authentication policy, specifying user, source, destination, schedule, and authentication.

24.2.2 User-aware Access Control Example

Demonstrates configuring security settings for specific users or groups authenticated via RADIUS.

24.2.2.1 Set Up User Accounts

Guides on setting up user accounts in the RADIUS server or locally.

24.2.2.2 Set Up User Groups

Guides on setting up user groups and assigning users to them.

24.2.2.3 Set Up User Authentication Using the RADIUS Server

Sets up user authentication using a RADIUS server and authentication methods.

24.3 Walled Garden Screen

Defines web site addresses that users can access without logging in.

24.3.1 Adding/Editing a Walled Garden URL

Adds or edits walled garden URL entries for the login screen.

24.4 Advertisement Screen

Sets the UAG to display an advertisement web page as the first page upon user connection.

Firewall

25.1 Overview

Enables or disables the firewall, manages asymmetrical routes, and configures firewall rules.

25.1.1 What You Can Do in this Chapter

Outlines tasks for firewall configuration and session control.

25.1.2 What You Need to Know

Explains Stateful Inspection, Zones, Default Firewall Behavior, To-Device Rules, and Global Firewall Rules.

Stateful Inspection

Restricts access by screening data packets against defined access rules and inspecting sessions.

Zones

Groups interfaces to configure network security and policies.

Default Firewall Behavior

Describes the default behavior for traffic based on packet direction (From Zone to To Zone).

To-Device Rules

Rules applying to traffic directed to the UAG itself, controlling access and management.

Global Firewall Rules

Rules applying to interfaces not included in a zone, affecting traffic flow.

Firewall Rule Criteria

Explains how the UAG checks traffic against firewall rules based on various criteria.

User Specific Firewall Rules

Allows specifying users or user groups in firewall rules for granular access control.

Session Limits

Limits the number of concurrent NAT/firewall sessions a client can use.

Finding Out More

Refers to section 25.4 for examples of creating firewall rules for user-aware access control.

25.2 The Firewall Screen

The main screen for enabling/disabling the firewall, asymmetrical routes, and managing rules.

Asymmetrical Routes

Discusses handling asymmetrical route topology and potential connection resets.

25.2.1 Configuring the Firewall Screen

Guides on enabling firewall, routes, session limits, and displaying configured rules.

25.2.2 The Firewall Add/Edit Screen

Configures or edits firewall rules, specifying criteria like zone, user, source, and action.

25.3 The Session Control Screen

Limits the number of concurrent NAT/firewall sessions a client can use.

25.3.1 The Session Limit Add/Edit Screen

Configures session limit rules for specific users, addresses, or both.

25.4 Firewall Rule Configuration Example

Provides an example of creating a firewall rule to block specific traffic.

Billing

26.1 Overview

Introduction to setting up billing profiles, accounting methods, discounts, and payment services.

26.1.1 What You Can Do in this Chapter

Lists tasks for configuring general billing settings, billing profiles, discounts, and payment services.

26.1.2 What You Need to Know

Explains Accumulation Accounting and Time-to-finish Accounting methods.

Accumulation Accounting Method

Allows multiple re-logins until allocated time is used or account expires.

Time-to-finish Accounting Method

Suitable for one-time logins; tracks usage time allocated.

26.2 The General Screen

Configures general billing settings like accounting method, currency, and SSID profiles.

26.3 The Billing Profile Screen

Configures billing profiles defining maximum Internet access time and charges per unit.

26.3.1 The Account Generator Screen

Allows automatic creation of dynamic guest accounts and printing account information.

26.3.3 The Billing Profile Add/Edit Screen

Creates new billing profiles or edits existing ones.

26.4 The Discount Screen

Configures custom discount pricing plans for longer usage periods.

26.4.1 The Discount Add/Edit Screen

Creates or edits discount levels for pricing.

26.5 The Payment Service General Screen

Configures credit card transaction services for authorizing and processing payments.

26.5.1 The Payment Service Custom Service Screen

Customizes the online payment service pages displayed after user payment.

Printer Manager

27.1 Overview

Describes creating dynamic guest accounts and printing account information via printers.

27.1.1 What You Can Do in this Chapter

Outlines tasks for configuring printer lists and customizing account printouts.

27.2 The General Screen

Configures the printer list and enables printer management and status monitoring.

27.3 The Printout Configuration Screen

Customizes the format of the account printout.

27.3.1 Reports Overview

Explains the types of reports that can be printed using the SP300E, like account summaries.

27.3.2 Key Combinations

Lists key combinations required to print specific reports on the SP350E.

27.3.3 Daily Account Summary

Details the format and content of the daily account report.

27.3.4 Monthly Account Summary

Details the format and content of the monthly account report.

27.3.5 Account Report Notes

Provides notes on account report limitations, such as entry limits and calculation methods.

27.3.6 System Status

Shows current system information such as the host name and WAN IP address.

Free Time

28.1 Overview

Allows users to browse the Internet free of charge for a specified period of time.

28.1.1 What You Can Do in this Chapter

Outlines turning on the free time feature to allow guest accounts for internet surfing.

28.2 The Free Time Screen

Enables and configures the free time settings for guest access.

SMS

29.1 Overview

Supports sending short text messages to mobile devices using a SMS gateway.

29.1.1 What You Can Do in this Chapter

Outlines turning on the SMS service for sending guest account information.

29.2 The SMS Screen

Enables SMS service for sending dynamic guest account information in text messages.

Bandwidth Management

30.1 Overview

Manages service usage, protocols, and applies traffic prioritization for performance.

30.1.1 What You Can Do in this Chapter

Outlines controlling bandwidth for services passing through the UAG.

30.1.2 What You Need to Know

Explains TCP/UDP traffic control and policy routes for other traffic types.

DiffServ and DSCP Marking

Discusses Quality of Service (QoS) using DiffServ for prioritizing traffic flows.

Connection and Packet Directions

Explains connection direction and packet flow for bandwidth management.

Outbound and Inbound Bandwidth Limits

Limits application outbound or inbound bandwidth to ensure fair usage.

Bandwidth Management Priority

Explains how UAG prioritizes traffic and allocates bandwidth.

Maximize Bandwidth Usage

Allows applications to borrow any unused bandwidth on the outgoing interface.

Bandwidth Management Behavior

Shows how bandwidth management behaves with various settings.

Configured Rate Effect

Explains how configured rates affect available bandwidth.

Priority Effect

Demonstrates how priority affects bandwidth allocation when rates exceed available bandwidth.

Maximize Bandwidth Usage Effect

Explains the impact of maximize bandwidth usage on bandwidth distribution.

Priority and Over Allotment of Bandwidth Effect

Discusses effects of over-allocating bandwidth with different priorities.

Finding Out More

Refers to DSCP Marking and Per-Hop Behavior for more details.

30.2 The Bandwidth Management Screen

Controls bandwidth allocation for TCP and UDP traffic using various criteria.

30.2.1 The Bandwidth Management Add/Edit Screen

Creates or edits bandwidth management policies.

User/Group

31.1 Overview

Describes setting up user accounts, groups, and settings for UAG traffic routing control.

31.1.1 What You Can Do in this Chapter

Lists tasks for managing user accounts, groups, and user settings.

31.1.2 What You Need To Know

Explains User Account types (admin, access, ext-user, guest-manager) and their attributes.

User Account

Defines user privileges for logged-in users, used in firewall rules and access control.

User Types

Lists the different types of user accounts supported by the UAG.

Ext-User Accounts

Describes accounts authenticated by an external server (e.g., RADIUS).

Ext-Group-User Accounts

Describes accounts that group users by RADIUS server group membership attributes.

Dynamic-Guest Accounts

Describes dynamically created guest accounts with time limits and potential expiration.

Pre-Subscriber Accounts

Accounts for testing internet connection without time limits or charges.

User Groups

Allows creating rules for multiple user accounts simultaneously.

User Awareness

Requires users to log in to restrict network services based on user identity.

Finding Out More

Provides information on users who use an external authentication server for login.

31.2 User Summary Screen

Provides a summary of all user accounts.

31.2.1 User Add/Edit Screen

Creates or edits user accounts, specifying user type and settings.

31.2.1.1 Rules for User Names

Specifies rules and limitations for creating user names.

31.3 User Group Summary Screen

Provides a summary of all user groups.

31.3.1 Group Add/Edit Screen

Creates or edits user groups, allowing members to be added or removed.

31.4 The User/Group Setting Screen

Controls default settings, login, lockout, and other user-specific settings.

User Default Setting

Controls default authentication timeout settings for new user accounts.

Default Authentication Timeout Settings

Sets default authentication timeouts for user accounts.

31.4.1 Default User Settings Edit Screens

Sets default authentication timeout settings for user account types.

31.4.2 User Aware Login Example

Demonstrates user-aware login configuration for restricting network services.

AP Profile

32.1 Overview

Shows how to configure preset profiles for Access Points (APs) connected to the UAG.

32.1.1 What You Can Do in this Chapter

Lists tasks for creating radio configurations and SSID profiles.

32.1.2 What You Need to Know

Defines terms and concepts relevant to wireless profiles: Radio, SSID, Security, MAC Filtering.

Wireless Profiles

Describes different types of wireless profiles: Radio, SSID, Security, MAC Filtering.

SSID

Defines SSID as the name identifying a wireless network for client connections.

32.2 Radio Screen

Creates radio configurations for APs, allowing settings for transmitters.

32.2.1 Add/Edit Radio Profile

Creates or edits radio profiles for APs, configuring band, mode, channel, and advanced settings.

32.3 SSID Screen

Configures SSID profiles, security lists, and MAC filter lists for wireless networks.

32.3.1 SSID List

Creates and manages SSID configurations for APs, defining network names visible to clients.

32.3.2 Add/Edit SSID Profile

Creates or edits SSID profiles, associating security and MAC filtering settings.

32.3.3 Security List

Manages wireless security configurations, including encryption methods for SSIDs.

32.3.4 Add/Edit Security Profile

Creates or edits security profiles, configuring security modes like WEP, WPA, WPA2.

32.3.5 MAC Filter List

Creates and manages MAC security configurations to control wireless client access.

32.3.6 Add/Edit MAC Filter Profile

Creates or edits MAC filtering profiles to allow or deny client connections based on MAC addresses.

Addresses

33.1 Overview

Explains how address objects and groups represent IP addresses for routing and firewall rules.

33.1.1 What You Can Do in this Chapter

Lists tasks for managing addresses and address groups.

33.1.2 What You Need to Know

Explains the usage of address objects and groups in various UAG features.

Address groups are composed of address objects and address groups.

Describes address group composition and that member order is not important.

33.2 Address Summary Screen

Provides a summary of all addresses, detailing types like HOST, RANGE, SUBNET.

33.2.1 Address Add/Edit Screen

Creates or edits address objects, defining name, type, and IP details.

33.3 Address Group Summary Screen

Summarizes all address groups, allowing viewing and management.

33.3.1 Address Group Add/Edit Screen

Creates or edits address groups, allowing members to be added or removed.

Services

34.1 Overview

Explains using service objects to define TCP, UDP, and ICMP applications.

34.1.1 What You Can Do in this Chapter

Lists tasks for viewing and configuring services and service groups.

34.1.2 What You Need to Know

Explains IP protocols: TCP, UDP, and ICMP.

IP Protocols

Details the TCP, UDP, and ICMP protocols used for data exchange.

Service Objects and Service Groups

Defines service objects and groups used in policy routes and firewall rules.

34.2 The Service Summary Screen

Provides a summary of all services and their definitions.

34.2.1 The Service Add/Edit Screen

Creates or edits service objects, specifying protocol, port, and type.

34.3 The Service Group Summary Screen

Summarizes all service groups, allowing adding, editing, and removing.

34.3.1 The Service Group Add/Edit Screen

Creates or edits service groups, allowing members (services/groups) to be added or removed.

Schedules

35.1 Overview

Explains using schedules for policy routes and firewall rules.

35.1.1 What You Can Do in this Chapter

Lists tasks for managing schedules, including creating one-time and recurring schedules.

35.1.2 What You Need to Know

Describes one-time schedules (effective once) and recurring schedules (repeat daily).

One-time Schedules

Schedules effective only once, based on specific start/stop dates and times.

Recurring Schedules

Schedules that repeat daily on selected days of the week.

Finding Out More

Refers to section 40.4 for information about the UAG's current date and time.

35.2 The Schedule Summary Screen

Lists all schedules configured in the UAG.

35.2.1 The One-Time Schedule Add/Edit Screen

Creates or edits one-time schedules, specifying name, start/stop date and time.

35.2.2 The Recurring Schedule Add/Edit Screen

Creates or edits recurring schedules, specifying start/stop time and effective weekdays.

AAA Server

36.1 Overview

Explains using AAA (Authentication, Authorization, Accounting) servers for network access control.

36.1.1 RADIUS Server

Describes RADIUS authentication for user authentication using an external server.

36.1.2 What You Can Do in this Chapter

Outlines configuring the default external RADIUS server for user authentication.

36.1.3 What You Need To Know

Lists the types of authentication servers supported by the UAG.

AAA Servers Supported by the UAG

Lists supported authentication server types: Local user database and RADIUS.

RADIUS

Explains the RADIUS protocol for authenticating users via a central server.

36.2 RADIUS Server Summary

Manages the list of RADIUS servers the UAG can use for user authentication.

36.2.1 Adding a RADIUS Server

Creates or edits RADIUS server entries, configuring address, port, and key.

Authentication Method

37.1 Overview

Sets how the UAG authenticates clients using local database or external servers.

37.1.1 What You Can Do in this Chapter

Lists tasks for creating and managing authentication method objects.

37.1.2 Before You Begin

Recommends configuring AAA server objects before authentication method objects.

37.2 Authentication Method Objects

Creates and manages authentication method objects, linking them to AAA servers.

37.2.1 Creating an Authentication Method Object

Creates an authentication method object, specifying name and server list.

Certificates

38.1 Overview

Explains using certificates for user authentication based on public-private key pairs.

38.1.1 What You Can Do in this Chapter

Outlines tasks for managing My Certificates and Trusted Certificates.

38.1.2 What You Need to Know

Explains public-key cryptography, key pairs, certificates, and digital signatures.

Advantages of Certificates

Lists the benefits of using certificates, such as secure key distribution.

Self-signed Certificates

Describes generating self-signed certificates where the UAG acts as the Certification Authority.

Factory Default Certificate

Mentions the unique self-signed certificate generated upon first use.

Certificate File Formats

Lists supported certificate file formats like X.509 (Binary/PEM) and PKCS#7 (Binary/PEM).

38.1.3 Verifying a Certificate

Describes how to verify a certificate's fingerprint using MD5 or SHA1 algorithms.

38.2 The My Certificates Screen

Provides a summary list of certificates and certification requests stored on the UAG.

38.2.1 The My Certificates Add Screen

Creates self-signed certificates, enrolls with CAs, or generates certification requests.

38.2.2 The My Certificates Edit Screen

Views detailed certificate information and changes the certificate's name.

38.2.3 The My Certificates Import Screen

Saves existing certificates (CA-signed or PKCS#12) to the UAG.

38.3 The Trusted Certificates Screen

Displays a summary list of certificates that the UAG is set to accept as trusted.

38.3.1 The Trusted Certificates Edit Screen

Views detailed certificate info, changes name, and sets trust verification for certificates.

ISP Accounts

39.1 Overview

Manages Internet Service Provider (ISP) account information for PPPoE/PPTP interfaces.

Finding Out More

Refers to Section 10.4 for information about PPPoE/PPTP interfaces.

39.1.1 What You Can Do in this Chapter

Outlines tasks for creating and managing ISP accounts in the UAG.

39.2 ISP Account Summary

Provides a summary of ISP accounts in the UAG.

39.2.1 ISP Account Edit

Adds or edits ISP account information, including protocol, authentication, and user name.

System

40.1 Overview

Introduction to configuring general UAG system settings.

40.1.1 What You Can Do in this Chapter

Lists tasks for configuring host name, USB storage, date/time, console speed, DNS, WWW, SSH, Telnet, FTP, SNMP, Language.

40.2 Host Name

Configures a unique name for the UAG on the network.

40.3 USB Storage

Configures settings for connected USB devices for storing system logs and diagnostic information.

40.4 Date and Time

Configures the UAG’s date, time, and time zone for accurate scheduling and logging.

40.4.1 Pre-defined NTP Time Servers List

Lists pre-defined NTP time servers for time synchronization.

40.4.2 Time Server Synchronization

Synchronizes UAG date and time with a specified time server.

40.5 Console Port Speed

Sets the console port speed for terminal emulation programs.

40.6 DNS Overview

Explains Domain Name System (DNS) for mapping domain names to IP addresses.

40.6.1 DNS Server Address Assignment

Explains how UAG obtains DNS server addresses: from ISP, public DNS, or manual entry.

40.6.2 Configuring the DNS Screen

Configures UAG DNS settings for resolving domain names for features like DDNS.

40.6.3 Address Record

Maps Fully-Qualified Domain Names (FQDN) to IP addresses.

40.6.4 PTR Record

Maps IP addresses to domain names (reverse lookup).

40.6.5 Adding an Address/PTR Record

Adds address or PTR records for UAG or other devices.

40.6.6 Domain Zone Forwarder

Specifies DNS server IP addresses to resolve domain zones.

40.6.7 Adding a Domain Zone Forwarder

Adds a domain zone forwarder record to the DNS settings.

40.6.8 MX Record

Specifies the host responsible for mail delivery for a particular domain.

40.6.9 Adding a MX Record

Adds an MX record to the table.

40.6.10 Adding a DNS Service Control Rule

Adds a service control rule to manage DNS queries.

40.7 WWW Overview

Discusses secure (HTTPS) and insecure (HTTP) management of the UAG.

40.7.1 Service Access Limitations

Explains conditions under which services cannot access the UAG.

40.7.2 System Timeout

Configures idle timeouts for administrator sessions and reauthentication times.

40.7.3 HTTPS

Sets up secure HTTP or HTTPS access to the UAG, specifying zones and IP addresses.

40.7.4 Configuring WWW Service Control

Specifies zones and IP addresses allowed for HTTP or HTTPS access to the UAG.

40.7.5 Service Control Rules

Adds or edits service control rules for WWW, SSH, Telnet, FTP, or SNMP access.

40.7.6 Customizing the WWW Login Page

Customizes the Web Configurator login and access pages, including logo and colors.

40.7.7 HTTPS Example

Provides examples of accessing the UAG via HTTPS, including browser warnings.

40.7.7.3 Avoiding Browser Warning Messages

Explains how to avoid browser warnings related to certificates by importing them.

40.7.7.4 Login Screen

Describes the Web Configurator login screen appearance after certificate acceptance.

40.7.7.5 Enrolling and Importing SSL Client Certificates

Guides on enrolling and importing SSL client certificates required for HTTPS access.

40.7.7.5.1 Installing the CA’s Certificate

Instructions for installing a Certificate Authority's (CA) trusted certificate.

40.7.7.5.2 Installing Your Personal Certificate(s)

Instructions for installing personal certificates obtained from a CA.

40.8 SSH

Explains how to securely access the UAG's command line interface using SSH.

40.8.1 How SSH Works

Describes the process of establishing a secure SSH connection between hosts.

40.8.2 SSH Implementation on the UAG

Details SSH versions, authentication methods, and encryption supported by the UAG.

40.8.3 Requirements for Using SSH

Lists prerequisites for using SSH, including installing an SSH client program.

40.8.4 Configuring SSH

Specifies zones and IP addresses allowed for SSH management access.

40.8.5 Secure Telnet Using SSH Examples

Provides examples of remote access to the UAG using SSH client programs.

40.8.5.1 Example 1: Microsoft Windows

Guides accessing the UAG via Secure Shell Client in Windows.

40.8.5.2 Example 2: Linux

Guides accessing the UAG via OpenSSH client in Linux.

40.9 Telnet

Explains using Telnet for remote command-line interface access.

40.9.1 Configuring Telnet

Specifies zones and IP addresses allowed for Telnet management access.

40.10 FTP

Explains uploading/downloading firmware and configuration files using FTP.

40.10.1 Configuring FTP

Specifies zones and IP addresses allowed for FTP access.

40.11 SNMP

Describes SNMP agent functionality for network device management.

40.11.1 Supported MIBs

Lists supported MIBs (Management Information Bases) for collecting statistical data.

40.11.2 SNMP Traps

Explains SNMP traps sent to the manager upon specific network events.

40.11.3 Configuring SNMP

Configures SNMP settings, including zones and IP addresses for access.

40.12 Language

Selects the display language for the UAG’s Web Configurator screens.

Log and Report

41.1 Overview

Introduction to configuring daily reporting and system log settings.

41.1.1 What You Can Do In this Chapter

Lists tasks for configuring email daily reports and log settings.

41.2 Email Daily Report

Configures sending system statistics via email daily.

41.3 Log Settings Screens

Controls log messages and alerts, including email, storage, and remote server settings.

41.3.1 Log Settings Summary

Provides a summary of configured log settings.

41.3.2 Edit System Log Settings

Controls detailed settings for the system log, including categories and email options.

41.3.3 Edit Log on USB Storage Setting

Configures detailed settings for saving logs to a connected USB storage device.

41.3.4 Edit Remote Server Log Settings

Controls detailed settings for logs stored on remote servers (syslog).

41.3.5 Log Category Settings Screen

Edits information included in system logs, USB storage, and email profiles by category.

File Manager

42.1 Overview

Defines configuration files and shell scripts for managing UAG settings.

42.1.1 What You Can Do in this Chapter

Lists tasks for managing configuration files, firmware, and shell scripts.

42.1.2 What you Need to Know

Explains configuration files and shell scripts, including their syntax and application.

Configuration Files and Shell Scripts

Describes how configuration files and shell scripts are applied and their differences.

Comments in Configuration Files or Shell Scripts

Explains how to add comments to configuration files or shell scripts using '#' or '!'.

42.2 The Configuration File Screen

Stores, runs, names, downloads, and uploads configuration files.

Configuration File Flow at Restart

Describes how the UAG handles configuration files during restarts.

42.3 The Firmware Package Screen

Checks current firmware version and uploads new firmware to the UAG.

42.4 The Shell Script Screen

Stores, names, downloads, uploads, and runs shell script files.

42.4.1 Shell Script

Describes labels for managing shell script files: Rename, Remove, Download, Copy, Apply.

Diagnostics

43.1 Overview

Introduction to using diagnostic screens for troubleshooting network issues.

43.1.1 What You Can Do in this Chapter

Lists tasks for generating diagnostic files, capturing packets, and managing logs.

43.2 The Diagnostics Screen

Generates a file containing UAG configuration and diagnostic information for customer support.

43.2.1 The Diagnostics Files Screen

Lists diagnostic files collected and stored on a USB storage device.

43.3 The Packet Capture Screen

Captures network traffic going through the UAG’s interfaces for analysis.

43.3.1 The Packet Capture Files Screen

Lists stored packet capture files, allowing download and deletion.

43.4 Core Dump Screen

Saves process core dumps to a USB device if a process terminates abnormally (crashes).

43.4.1 Core Dump Files Screen

Lists stored core dump files, allowing download and deletion.

43.5 The System Log Screen

Lists system log files stored on a connected USB storage device.

Packet Flow Explore

44.1 Overview

Provides a picture of how the UAG determines packet forwarding and IP address changes.

44.1.1 What You Can Do in this Chapter

Lists tasks for viewing routing flow and SNAT function settings.

44.2 The Routing Status Screen

Views the current routing flow and links to specific routing settings.

44.3 The SNAT Status Screen

Views the overall source NAT (SNAT) flow and each SNAT function's settings.

Reboot

45.1 Overview

Restarts the device, for example, if it behaves erratically.

45.1.1 What You Need To Know

Explains that shutdown writes cached data and stops system processes.

45.2 The Reboot Screen

Allows remote users to restart the device via the Web Configurator.

Shutdown

46.1 Overview

Shuts down the device safely before disconnecting power.

46.1.1 What You Need To Know

Explains that shutdown writes cached data to local storage and stops system processes.

46.2 The Shutdown Screen

Provides a button to shut down the UAG safely.

Troubleshooting

47.1 Resetting the UAG

Resets the UAG to factory-default settings if access is lost or password forgotten.

47.2 Getting More Troubleshooting Help

Suggests searching www.zyxel.com for support information and troubleshooting suggestions.

Appendix A Customer Support

Required Information

Lists information needed when contacting customer support: model, serial, warranty, date, problem description.

Appendix B Legal Information

Copyright

Copyright notice for the publication, stating rights reserved by ZyXEL Communications Corporation.

Disclaimer

ZyXEL's liability disclaimer for application or use of described products or software.

Certifications

Lists regulatory certifications like FCC Interference Statement and Industry Canada Statement.

Federal Communications Commission (FCC) Interference Statement

FCC statement regarding device compliance with Part 15 rules and potential interference.

FCC Radiation Exposure Statement

FCC statement regarding radiation exposure limits for the equipment.

Industry Canada Statement

Industry Canada compliance statement for the device.

Notices

General notices regarding changes or modifications to the equipment.

ErP (Energy-related Products) Declaration of Conformity

Declaration for energy-related products conforming to EU Directive 2009/125/EC.

Viewing Certifications

Provides a link to view the product's documentation and certifications online.

National Restrictions

Lists national restrictions for EU countries and others regarding wireless LAN usage.

List of national codes

Provides a table of national codes used in regulatory information.

Safety Warnings

Lists important safety precautions for using the device, including electrical safety.

Related product manuals