EasyManua.ls Logo

ZyXEL Communications UAG5100 User Manual

ZyXEL Communications UAG5100
617 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Quick Start Guide
www.zyxel.com
UAG Series
UAG2100 / UAG4100 / UAG5100
Unified Access Gateway
Version 4.10
Edition 1, 03/2015
Copyright © 2015 ZyXEL Communications Corporation
User’s Guide
Default Login Details
LAN IP Address http://172.16.0.1 (LAN1)
http://172.17.0.1 (LAN2)
User Name admin
Password 1234

Table of Contents

Other manuals for ZyXEL Communications UAG5100

Question and Answer IconNeed help?

Do you have a question about the ZyXEL Communications UAG5100 and is the answer not in the manual?

ZyXEL Communications UAG5100 Specifications

General IconGeneral
USB 2.0 ports quantity2
Ethernet LAN (RJ-45) ports5
Power requirements100-240, 50/60
Power over Ethernet (PoE)Yes
Power consumption (typical)25 W
Storage temperature (T-T)-40 - 70 °C
Operating temperature (T-T)0 - 45 °C
Operating relative humidity (H-H)10 - 90 %
Networking standardsIEEE 802.3at
Package weight3700 g
SafetyLVD (EN60950-1), BSMI
CertificationFCC, CE EMC, C-Tick
Weight and Dimensions IconWeight and Dimensions
Weight2360 g
Dimensions (WxDxH)382 x 205 x 44 mm

Summary

CHAPTER 1 Introduction

1.1 Overview

Provides an overview of the UAG series models and its capabilities as a comprehensive service gateway.

1.2 Default Zones, Interfaces, and Ports

Details the default configurations for zones, interfaces, and ports on UAG2100/UAG4100 and UAG5100 models.

1.3 Management Overview

Explains the different ways to manage the UAG, including Web Configurator and Command-Line Interface (CLI).

1.4 Web Configurator

Describes the prerequisites for using the Web Configurator, including browser requirements and settings.

1.4.1 Web Configurator Access

Provides step-by-step instructions on how to access and log into the UAG's Web Configurator.

1.4.2 Web Configurator Screens Overview

Introduces the main components of the Web Configurator screen, such as title bar, navigation panel, and main window.

1.4.3 Navigation Panel

Explains how to use the navigation panel menus to open status and configuration screens.

1.4.4 Tables and Lists

Describes the flexibility of Web Configurator tables and lists for displaying and sorting entries.

1.5 Stopping the UAG

Provides instructions on the proper procedure for shutting down the UAG to prevent firmware corruption.

CHAPTER 2 Hardware Installation and Connection

2.1 Rack-mounting (UAG5100)

Details the steps for mounting the UAG5100 on a standard 19-inch rack or in a wiring closet.

2.2 Wall Mounting (UAG2100 and UAG4100)

Provides instructions for mounting the UAG2100 and UAG4100 on a wall, including drilling and screw placement.

2.3 Front Panel

Introduces the front panel of the UAG, detailing its components and indicators.

2.3.1 Front Panel LEDs

Describes the status and meaning of the Power (PWR) and System (SYS) LEDs on the front panel.

2.4 Rear Panel

Illustrates the rear panel of the UAG2100 or UAG4100, highlighting ports and features.

CHAPTER 3 Printer Deployment

3.1 Overview

Explains how to set up an external statement printer (SP350E) and deploy it with the UAG.

3.2 Attach the Printer to the UAG

Provides steps to connect the printer's Ethernet port to the UAG's LAN port and power it on.

3.3 Set up an Internet Connection on the UAG

Guides on connecting the UAG's WAN port to a broadband modem and accessing the web configurator.

3.4 Allow the UAG to Monitor and Manage the Printer

Details how to find the printer's IP address from the DHCP table and add it to the UAG's printer list.

3.5 Turn on Web Authentication on the UAG

Explains how to enable web authentication to require users to log in before accessing the network.

3.6 Generate a Free Guest Account

Describes how to create dynamic guest accounts using the account generator based on billing settings.

CHAPTER 4 Installation Setup Wizard

4.1 Welcome Screen

Introduces the Installation Setup Wizard, which guides users through initial Internet, wireless, and web authentication configuration.

4.2 Internet Settings

Explains how to set the WAN interface's encapsulation type and IP address assignment method.

4.2.1 Internet Settings: Ethernet

Details the configuration of Ethernet encapsulation, IP address, subnet mask, and gateway settings.

4.2.2 Internet Settings: PPPoE

Covers PPPoE specific settings including service name, authentication type, user name, and password.

4.2.3 Internet Settings: PPTP

Outlines PPTP specific configuration parameters like authentication type, user name, and password.

4.2.4 Internet Settings - Second WAN Interface

Describes how to configure a second WAN interface if the UAG has multiple WAN interfaces.

4.3 Wireless Settings

Explains how to enable the controller feature and manage connected APs.

4.3.1 Wireless and Radio Settings

Details wireless and security settings, including SSID, security mode, and radio band configuration.

4.4 Web Authentication Settings

Guides on enabling web authentication to block LAN2 traffic until client authentication.

4.5 Printer Settings

Explains how to configure printer settings, including enabling dynamic guest accounts via statement printer.

4.6 Billing Settings

Covers the configuration of general billing settings, such as accounting method and currency.

4.6.1 Billing Profile

Describes how to configure billing profiles that define maximum Internet access time and charges.

4.6.2 Account Generator Settings

Explains how to select pre-defined billing profiles for automatically creating dynamic guest accounts.

4.7 Free Time Settings

Details the configuration of free time settings for guest accounts.

4.8 Device Registration

Provides instructions on registering the UAG with myZyXEL.com using its serial number and LAN MAC address.

CHAPTER 5 Quick Setup Wizards

5.1 Quick Setup Overview

Introduces the quick setup wizards for configuring Internet and VPN connection settings.

5.2 WAN Interface Quick Setup

Guides users through configuring an interface to connect to the Internet.

5.2.1 Choose an Ethernet Interface

Explains how to select the Ethernet interface for configuring a WAN connection.

5.2.2 Select WAN Type

Details how to select the WAN type, choosing between Ethernet, PPPoE, or PPTP.

5.2.3 Configure WAN IP Settings

Explains how to select whether the interface uses a fixed or dynamic IP address.

5.2.4 ISP and WAN Connection Settings

Guides users to enter Internet access information for PPTP or PPPoE connections.

5.2.5 Quick Setup Interface Wizard: Summary

Displays a summary of the WAN interface settings after configuration.

5.3 VPN Setup Wizard

Introduces the VPN setup wizard for creating Virtual Private Network (VPN) rules.

5.3.1 Welcome

Explains the VPN wizard's purpose and the resulting Phase 1 and Phase 2 rule settings.

5.3.2 VPN Setup Wizard: Wizard Type

Allows selection between Express or Advanced wizards for VPN rule creation.

5.3.3 VPN Express Wizard - Scenario

Guides the user to select the VPN scenario, such as Site-to-site.

5.3.4 VPN Express Wizard - Configuration

Details the configuration steps for the VPN Express Wizard, including secure gateway and pre-shared key.

5.3.5 VPN Express Wizard - Summary

Provides a read-only summary of the VPN tunnel's configuration and commands.

5.3.6 VPN Express Wizard - Finish

Confirms the completion of the VPN Express wizard and directs users to the Phase 1 and Phase 2 rule settings.

5.3.7 VPN Advanced Wizard - Scenario

Allows selection of the VPN scenario for the Advanced Wizard configuration.

5.3.8 VPN Advanced Wizard - Phase 1 Settings

Details Phase 1 negotiation settings for IKE SA, including secure gateway and encryption algorithms.

5.3.9 VPN Advanced Wizard - Phase 2

Covers Phase 2 settings for IPSec SA, including active protocol, encapsulation, and encryption algorithms.

5.3.10 VPN Advanced Wizard - Summary

Provides a read-only summary of the VPN tunnel settings for the Advanced Wizard.

5.3.11 VPN Advanced Wizard - Finish

Confirms the completion of the VPN Advanced Wizard and directs users to Phase 1 and Phase 2 rule settings.

CHAPTER 6 Dashboard

6.1 Overview

Explains how to use the Dashboard screens to check status information about the UAG.

6.1.1 What You Can Do in this Chapter

Lists the functionalities available in the Dashboard screens for monitoring device information and status.

6.2 The Dashboard Screen

Describes the Dashboard screen, which displays general device information and status in rearrangeable widgets.

CHAPTER 7 Monitor

7.1 Overview

Explains how to use the Monitor screens to check status and statistics information on the UAG.

7.1.1 What You Can Do in this Chapter

Lists the various Monitor screens available for checking packet statistics, interface status, and traffic information.

7.2 The Port Statistics Screen

Displays packet statistics for each Gigabit Ethernet port, allowing detailed analysis.

7.2.1 The Port Statistics Graph Screen

Shows a line graph of packet statistics for each physical port, providing visual data representation.

7.3 The Interface Status Screen

Lists all UAG interfaces and provides packet statistics for each.

7.4 The Traffic Statistics Screen

Provides basic traffic information, including visited web sites, protocols used, and LAN traffic.

7.5 The Session Monitor Screen

Displays information about all established sessions for debugging or statistical analysis.

7.6 The DDNS Status Screen

Shows the status of the UAG’s Dynamic DNS (DDNS) domain names.

7.7 The IP/MAC Binding Monitor Screen

Lists devices that have received IP addresses from UAG interfaces with IP/MAC binding enabled.

7.8 The Login Users Screen

Displays a list of users currently logged into the UAG.

7.9 The Dynamic Guest Screen

Provides information on dynamic guest accounts, which are automatically generated for guest users.

7.10 The UPnP Port Status Screen

Lists NAT port mapping rules that UPnP creates on the UAG.

7.11 The USB Storage Screen

Displays information about a connected USB storage device.

7.12 The Ethernet Neighbor Screen

Allows viewing the UAG’s neighboring devices discovered via Link Layer Discovery Protocol (LLDP).

7.13 The AP List Screen

Shows which APs are currently connected to the UAG.

7.13.1 Station Count of AP

Provides station statistics for connected APs, showing station count over time.

7.14 The Radio List Screen

Displays statistics about wireless radio transmitters in each connected AP.

7.14.1 AP Mode Radio Information

Allows viewing detailed information about a selected radio's SSID, wireless traffic, and clients.

7.15 The Station List Screen

Provides statistics pertaining to associated stations (wireless clients).

7.16 Detected Device

Displays information about wireless devices detected by the AP.

7.17 The Printer Status Screen

Displays information about the connected statement printer, including its status.

7.18 The VPN 1-1 Mapping Status Screen

Shows the status of active users to whom the UAG applied a VPN 1-1 mapping rule.

7.18.1 VPN 1-1 Mapping Statistics

Displays statistics for each of the VPN 1-1 mapping rules.

7.19 The IPSec Monitor Screen

Allows display and management of active IPSec SAs.

7.19.1 Regular Expressions in Searching IPSec SAs

Explains how to use regular expressions for searching IPSec SAs.

7.20 The App Patrol Screen

Provides statistics on Application Patrol based on profiles bound to Security Policy profiles.

7.21 The Content Filter Screen

Displays content filter statistics, including web request and category hit summaries.

7.22 The Log Screen

Allows viewing and managing log messages, including filtering and e-mailing options.

7.22.1 View AP Log

Enables viewing the UAG's current wireless AP log messages.

7.22.2 Dynamic Users Log

Allows viewing the UAG's dynamic guest account log messages.

CHAPTER 8 Licensing

8.1 Overview

Explains how to register the UAG and manage its service subscriptions via myZyXEL.com.

8.1.1 What You Can Do in this Chapter

Details using Registration, Service, and Signature Update screens for license management.

8.1.2 What You Need to Know

Provides background information on myZyXEL.com and available subscription services.

8.2 Registration Screen

Guides users to register their UAG with myZyXEL.com.

8.3 Service Screen

Displays the status of service registrations and allows activation or extension of licenses.

8.4 App Patrol Signature Update Screen

Explains how to update application patrol signatures periodically.

CHAPTER 9 Wireless

9.1 Overview

Explains how to configure the UAG to manage connected Access Points (APs).

9.1.1 What You Can Do in this Chapter

Lists functionalities for managing APs: Controller, AP Management, MON Mode, Load Balancing, DCS, and Auto Healing.

9.1.2 What You Need to Know

Defines key terms and concepts related to wireless networking, including Station, DCS, and Load Balancing.

9.2 Controller Screen

Sets how the UAG allows new APs to connect to the network.

9.3 AP Management Screen

Allows management of all APs connected to the UAG, including editing properties and rebooting.

9.3.1 Edit AP List

Enables editing of AP properties, including radio settings, VLAN, and port settings.

9.3.2 Port Setting Edit

Allows enabling or disabling ports on managed APs and configuring port PVID.

9.3.3 VLAN Add/Edit

Facilitates creating new VLANs or configuring existing VLANs on the UAG.

9.3.4 AP Policy

Configures the AP controller's IP address and the action managed APs take if the controller fails.

9.4 MON Mode

Allows assigning APs to either the rogue AP list or the friendly AP list.

9.4.1 Add/Edit Rogue/Friendly List

Enables adding or editing APs in the rogue or friendly lists.

9.5 Load Balancing

Configures wireless network traffic load balancing between APs.

9.5.1 Disassociating and Delaying Connections

Explains AP responses to overload: delaying connections or kicking off clients.

9.6 DCS

Configures Dynamic Channel Selection (DCS) for managed APs to find less-used channels.

9.7 Auto Healing

Enables the auto healing feature to extend wireless coverage when an AP fails.

9.8 Technical Reference

Provides additional technical information on wireless features.

9.8.1 Dynamic Channel Selection

Explains dynamic channel selection to avoid radio interference and improve wireless performance.

9.8.2 Load Balancing

Discusses wireless load balancing types: by station number and by traffic level.

CHAPTER 10 Interfaces

10.1 Interface Overview

Introduces UAG interfaces, ports, and zones used for security policy configuration.

10.1.1 What You Can Do in this Chapter

Lists functionalities for configuring port roles, Ethernet, PPP, VLAN, Bridge, Virtual, and Trunk interfaces.

10.1.2 What You Need to Know

Explains general interface characteristics, including logical entities, binding to ports, and zone assignment.

10.2 Port Role Screen

Allows setting UAG's flexible ports as part of LAN1, LAN2, or DMZ interfaces.

10.3 Ethernet Summary Screen

Lists every Ethernet interface and virtual interface created on top of Ethernet interfaces.

10.3.1 Ethernet Edit

Enables configuration of IP address assignment, interface parameters, DHCP, connectivity check, and MAC address settings.

10.3.2 Object References

Explains how to use the Object Reference screen to view configuration settings that reference a selected object.

10.3.3 Add/Edit DHCP Extended Options

Allows adding DHCP extended options to provide more information in DHCP packets.

10.4 PPP Interfaces

Explains the use of PPPoE/PPTP interfaces for ISP connections without installing separate software.

10.4.1 PPP Interface Summary

Lists every PPPoE/PPTP interface for configuration.

10.4.2 PPP Interface Add or Edit

Allows configuration of PPPoE or PPTP interfaces, requiring a prior ISP account setup.

10.5 VLAN Interfaces

Describes how VLANs divide a physical network into multiple logical networks based on IEEE 802.1q.

10.5.1 VLAN Interface Summary Screen

Lists every VLAN interface and virtual interface created on top of VLAN interfaces.

10.5.2 VLAN Interface Add/Edit

Enables configuration of IP address assignment, bandwidth parameters, DHCP, and connectivity check for VLAN interfaces.

10.6 Bridge Interfaces

Introduces bridge interfaces and explains screens for their configuration.

10.6.1 Bridge Interface Summary

Provides a summary of all bridge interfaces and virtual interfaces created on top of them.

10.6.2 Bridge Interface Add/Edit

Allows configuration of IP address assignment, bandwidth parameters, DHCP, and connectivity check for bridge interfaces.

10.7 Virtual Interfaces

Explains how virtual interfaces are used to tell the UAG where to route packets.

10.7.1 Virtual Interfaces Add/Edit

Enables configuration of IP address assignment and interface parameters for virtual interfaces.

10.8 Interface Technical Reference

Provides detailed technical information about interfaces on the UAG.

CHAPTER 11 Trunks

11.1 Overview

Explains the use of trunks for WAN traffic load balancing to increase network throughput and reliability.

11.1.1 What You Can Do in this Chapter

Covers configuring trunk summary, adding trunks, and configuring the system default trunk.

11.1.2 What You Need to Know

Provides key concepts about adding WAN interfaces to trunks and using policy routing with trunks.

11.2 The Trunk Summary Screen

Lists configured trunks and the load balancing algorithm each trunk uses.

11.2.1 Configuring a User-Defined Trunk

Guides on creating or editing a WAN trunk entry, including load balancing algorithms and member interfaces.

11.2.2 Configuring the System Default Trunk

Details how to change the load balancing algorithm and view bandwidth allocations for the system default trunk.

CHAPTER 12 Policy and Static Routes

12.1 Policy and Static Routes Overview

Explains how to use policy routes and static routes to override default routing behavior.

12.1.1 What You Can Do in this Chapter

Covers using Policy Route and Static Route screens for configuration.

12.1.2 What You Need to Know

Defines Policy Routing and contrasts it with Static Routes.

12.2 Policy Route Screen

Allows viewing and configuring policy routes based on matching criteria and actions.

12.2.1 Policy Route Add/Edit Screen

Guides on configuring or editing a policy route, including criteria and actions.

12.3 IP Static Route Screen

Displays configured static routes for propagating routing information to other routers.

12.3.1 Static Route Add/Edit Screen

Allows configuration or editing of static routes.

12.4 Policy Routing Technical Reference

Provides detailed information about features configurable in policy routing, like NAT and DiffServ.

CHAPTER 13 DDNS

13.1 DDNS Overview

Explains Dynamic DNS (DDNS) services for using domain names with dynamic IP addresses.

13.1.1 What You Can Do in this Chapter

Covers using DDNS screens to view, add, or edit configured DDNS domain names.

13.1.2 What You Need to Know

Explains how DNS maps domain names to IP addresses and the requirements for Dynamic DNS.

13.2 The DDNS Screen

Provides a summary of all DDNS domain names and their configurations, allowing addition, editing, and deletion.

13.2.1 The Dynamic DNS Add/Edit Screen

Allows adding a domain name to the UAG or editing existing configurations.

CHAPTER 14 NAT

14.1 NAT Overview

Explains Network Address Translation (NAT) for making private network computers available outside the network.

14.1.1 What You Can Do in this Chapter

Covers using NAT screens to view, manage, create, edit, and delete NAT rules.

14.1.2 What You Need to Know

Defines NAT as virtual server, port forwarding, or port translation.

14.2 The NAT Screen

Provides a summary of all NAT rules and their configurations, allowing creation, editing, and deletion.

14.2.1 The NAT Add/Edit Screen

Lets users create new NAT rules or edit existing ones.

14.3 NAT Technical Reference

Provides detailed information about NAT on the UAG, including NAT Loopback.

CHAPTER 15 VPN 1-1 Mapping

15.1 VPN 1-1 Mapping Overview

Explains VPN 1-1 mapping for accessing the Internet or external servers with unique public IP addresses.

15.1.1 What You Can Do in this Chapter

Covers enabling and configuring VPN 1-1 mapping and pool profiles.

15.1.2 What You Need to Know

Discusses VPN 1-1 Mapping, Security Policy, and Policy Route relationships.

15.2 The VPN 1-1 Mapping General Screen

Provides a summary of VPN 1-1 mapping rules, allowing creation, editing, and deletion.

15.2.1 The VPN 1-1 Mapping Edit Screen

Allows configuration of VPN 1-1 mapping rules.

15.3 The VPN 1-1 Mapping Profile Screen

Summarizes all pool profiles for VPN 1-1 mapping and their configurations.

CHAPTER 16 HTTP Redirect

16.1 Overview

Explains how HTTP redirect forwards client HTTP requests to a web proxy server.

16.1.1 What You Can Do in this Chapter

Covers using HTTP Redirect screens to display and edit redirect rules.

16.1.2 What You Need to Know

Defines Web Proxy Server functionality and its role in network security.

16.2 The HTTP Redirect Screen

Displays a summary of HTTP redirect rules and allows configuration.

16.2.1 The HTTP Redirect Edit Screen

Allows configuration of HTTP redirect rules.

CHAPTER 17 SMTP Redirect

17.1 Overview

Explains how SMTP redirect forwards authenticated client SMTP messages to a SMTP server.

17.1.1 What You Can Do in this Chapter

Covers using SMTP Redirect screens to display and edit redirect rules.

17.1.2 What You Need to Know

Defines Simple Mail Transfer Protocol (SMTP) and its role in email transport.

17.2 The SMTP Redirect Screen

Displays a summary of SMTP redirect rules and allows configuration.

17.2.1 The SMTP Redirect Edit Screen

Allows configuration of SMTP redirect rules.

CHAPTER 18 ALG

18.1 ALG Overview

Explains Application Layer Gateway (ALG) functionality for applications operating through UAG NAT.

18.1.1 What You Can Do in this Chapter

Covers using the ALG screen to set up FTP ALG settings.

18.1.2 What You Need to Know

Discusses ALG, NAT, and Security Policy interactions.

18.1.3 Before You Begin

Highlights prerequisites: configuring security policies and enabling NAT for WAN-initiated sessions.

18.2 The ALG Screen

Allows turning the ALG off or on, and configuring port numbers.

CHAPTER 19 UPnP

19.1 Overview

Explains UPnP and NAT-PMP support for network device discovery and connection.

19.2 What You Need to Know

Describes how UPnP hardware is identified and accessed in Windows XP Network Connections.

19.2.1 NAT Traversal

Explains UPnP NAT traversal, which automates network addressing and presence announcement.

19.3 UPnP Screen

Allows enabling UPnP and NAT-PMP on the UAG.

19.4 Technical Reference

Provides examples of using UPnP, including in Windows XP and accessing the Web Configurator.

19.4.1 Using UPnP in Windows XP Example

Demonstrates using the UPnP feature in Windows XP, requiring UPnP installation and activation.

19.4.1.1 Auto-discover Your UPnP-enabled Network Device

Guides on auto-discovering UPnP-enabled network devices via Network Connections.

19.4.2 Web Configurator Easy Access

Explains accessing the Web Configurator via UPnP without needing to find the UAG's IP address first.

CHAPTER 20 IP/MAC Binding

20.1 IP/MAC Binding Overview

Explains IP to MAC address binding to ensure intended devices use privileged IP addresses.

20.1.1 What You Can Do in this Chapter

Covers binding IP to MAC addresses using Summary and Edit screens, and configuring exempt lists.

20.1.2 What You Need to Know

States that IP/MAC address bindings are based on UAG's dynamic and static DHCP entries.

20.2 IP/MAC Binding Summary

Lists the total number of IP to MAC address bindings for devices connected to each supported interface.

20.2.1 IP/MAC Binding Edit

Allows configuring an interface's IP to MAC address binding settings.

20.2.2 Static DHCP Edit

Enables adding or configuring a static DHCP entry.

20.3 IP/MAC Binding Exempt List

Configures ranges of IP addresses to which the UAG does not apply IP/MAC binding.

CHAPTER 21 Layer 2 Isolation

21.1 Overview

Explains Layer-2 isolation for preventing device communication, except for whitelisted devices.

21.1.1 What You Can Do in this Chapter

Covers enabling layer-2 isolation and configuring the white list.

21.2 Layer-2 Isolation General Screen

Allows enabling Layer-2 isolation on the UAG and specific internal interfaces.

21.3 White List Screen

Blocks IP addresses not in the white list from communicating on layer-2 isolation-enabled interfaces.

21.3.1 Add/Edit White List Rule

Enables creating or editing white list rules for Layer 2 isolation.

CHAPTER 22 IPnP

22.1 Overview

Explains IP Plug and Play (IPnP) feature allowing Internet access without changing network settings.

22.1.1 What You Can Do in this Chapter

Covers enabling IPnP on the UAG and internal interfaces using the IP screen.

22.2 IPnP Screen

Allows enabling IPnP on the UAG and specific internal interfaces.

CHAPTER 23 Web Authentication

23.1 Overview

Explains web authentication for intercepting network traffic until user authentication.

23.1.1 What You Can Do in this Chapter

Covers enabling web authentication, setting logout IP, managing policies, and customizing portal/agreement files.

23.1.2 What You Need to Know

Discusses Forced User Authentication and finding out more about user-aware access control.

23.2 Web Authentication

Guides users to display the Web Authentication General screen for settings and policies.

23.2.1 General Screen

Displays general web portal settings and authentication policies, enabling web authentication.

23.2.2 User-aware Access Control Example

Illustrates configuring policies and security settings for user-aware access control with RADIUS.

23.2.3 Authentication Type Screen

Allows viewing, creating, and managing authentication type profiles for web authentication.

23.2.4 Custom Web Portal / User Agreement File Screen

Enables uploading custom web portal or user agreement files to the UAG.

23.3 Walled Garden

Allows defining web site addresses that users can access without logging in.

23.3.1 General Screen

Turns on the walled garden feature, which works with web portal authentication type.

23.3.2 URL Base Screen

Configures walled garden web addresses (URLs) for sites accessible without logging in.

23.3.3 Domain/IP Base Screen

Configures walled garden web site links using wildcard domain names or IP addresses.

23.3.4 Walled Garden Login Example

Shows the user login screen with two walled garden links for demonstration.

23.4 Advertisement Screen

Sets the UAG to display an advertisement web page as the first page when a user connects to the Internet.

23.4.1 Adding/Editing an Advertisement URL

Configures an advertisement address entry, allowing up to 20 URL entries.

CHAPTER 24 RTLS

24.1 Overview

Explains how Ekahau RTLS tracks Wi-Fi tags attached to APs managed by the UAG.

24.1.1 What You Can Do in this Chapter

Covers using the RTLS screen to track the location of Ekahau Wi-Fi tags.

24.2 Before You Begin

Lists the prerequisites for configuring RTLS, including number of APs and IP addresses.

24.3 Configuring RTLS

Guides on turning RTLS on/off and specifying the IP address and server port of the Ekahau RTLS Controller.

CHAPTER 25 Security Policy

25.1 Overview

Defines security policy as a template for applying security settings to specific traffic at specific times.

25.1.1 What You Can Do in this Chapter

Covers enabling/disabling policy control, asymmetrical routes, and session limits.

25.1.2 What You Need to Know

Explains Stateful Inspection, Zones, Default Security Policy Behavior, and To-Device Rules.

25.2 Security Policy Control Screen

Allows enabling/disabling policy control and asymmetrical routes, and setting session limits.

25.2.1 Configuring the Security Policy Control Screen

Guides on configuring the security policy control screen, including enabling policy control and allowing asymmetrical routes.

25.2.2 Add/Edit Policy Control Rule

Allows creating or editing a policy control rule, defining criteria and actions.

25.3 Session Control Screen

Limits the number of concurrent NAT/security policy sessions a client can use.

25.3.1 Add/Edit a Session Limit Rule

Configures rules to define session limits for specific users or addresses.

25.4 Security Policy Configuration Example

Provides an example of configuring an Internet security policy to allow Doom players access.

25.5 Security Policy Example Applications

Demonstrates blocking LAN users from IRC traffic and allowing CEO access.

CHAPTER 26 Billing

26.1 Overview

Explains how to set up billing profiles, charge users, and configure accounting methods.

26.1.1 What You Can Do in this Chapter

Covers configuring general billing, billing profiles, discounts, and payment services.

26.1.2 What You Need to Know

Defines Accumulation and Time-to-finish accounting methods.

26.2 The General Screen

Configures general billing settings, including accounting method, currency, and SSID profiles.

26.3 The Billing Profile Screen

Configures billing profiles defining maximum Internet access time and charge per time unit.

26.3.1 The Account Generator Screen

Allows automatic creation of dynamic guest accounts using billing profiles.

26.3.2 The Account Redeem Screen

Enables sending SMS messages for certain accounts and querying account information.

26.3.3 The Billing Profile Add/Edit Screen

Allows creation or editing of billing profiles.

26.4 The Discount Screen

Enables configuration of custom discount pricing plans for reduced rates.

26.4.1 The Discount Add/Edit Screen

Allows creation or editing of discount levels.

26.5 The Payment Service General Screen

Configures credit card service for authorizing and processing online payments.

26.5.1 The Payment Service Desktop View / Mobile View Screen

Customizes online payment service pages for desktop and mobile versions.

CHAPTER 27 Printer

27.1 Overview

Explains creating dynamic guest accounts and printing information using an external statement printer.

27.1.1 What You Can Do in this Chapter

Covers configuring printer list, printout customization, and printer management.

27.2 The General Setting Screen

Configures printer list and allows UAG to monitor printer status.

27.2.1 Add/Edit Printer Rule

Allows adding or modifying printer settings, including IP address and description.

27.3 The Printout Configuration Screen

Customizes the account printout format, allowing upload of custom formats.

27.4 The Printer Manager Screen

Manages and views information about connected statement printers.

27.4.1 Edit Printer Manager

Modifies printer nickname and IP address settings.

27.4.2 Reports Overview

Explains how to print status reports for guest accounts and system information.

27.4.3 Key Combinations

Lists the key combinations required to print specific reports on the SP350E.

27.4.4 Daily Account Summary

Details the daily account report, including total accounts and charges for the current day.

27.4.5 Monthly Account Summary

Describes the monthly account report, listing accounts printed in the current month.

27.4.6 Account Report Notes

Provides notes on account report limitations, such as the maximum number of entries.

27.4.7 System Status

Displays current system information like host name and WAN IP address.

CHAPTER 28 Free Time

28.1 Overview

Explains how Free Time allows creating dynamic guest accounts for temporary Internet access.

28.1.1 What You Can Do in this Chapter

Covers turning on the Free Time feature to allow users free Internet surfing for a specified period.

28.2 The Free Time Screen

Allows enabling and configuring free time settings, including period, reset time, and delivery method.

CHAPTER 29 SMS

29.1 Overview

Explains SMS support for sending text messages to mobile devices using ViaNett as the gateway.

29.1.1 What You Can Do in this Chapter

Covers turning on the SMS service on the UAG using the SMS screen.

29.2 The SMS Screen

Enables SMS for sending dynamic guest account information via text messages.

CHAPTER 30 IPSec VPN

30.1 Virtual Private Networks (VPN) Overview

Explains VPN for secure communications using tunneling, encryption, and authentication.

30.1.1 What You Can Do in this Chapter

Covers VPN connection screens for specifying gateways and devices, and managing VPN gateways.

30.1.2 What You Need to Know

Explains IPSec VPN tunnel establishment phases, IKE SA, IPSec SA, and related topics.

30.1.3 Before You Begin

Provides suggestions for setting up VPN tunnels, including address objects, interfaces, and AAA servers.

30.2 The VPN Connection Screen

Lists VPN connection policies, associated gateways, and various settings, allowing activation/deactivation.

30.2.1 The VPN Connection Add/Edit Screen

Allows creating or editing a new VPN connection policy.

30.3 The VPN Gateway Screen

Displays IPSec VPN gateway policies, UAG address, remote IPSec router address, and associated VPN connections.

30.3.1 The VPN Gateway Add/Edit Screen

Allows creating or editing a new VPN gateway policy.

30.4 IPSec VPN Background Information

Provides detailed background information on IPSec VPN, including IKE SA, proposals, and negotiation modes.

IKE SA Overview

Introduces the key components of an IPSec SA.

IP Addresses of the UAG and Remote IPSec Router

Explains how to specify IP addresses for the UAG and remote IPSec router for IKE SA setup.

IKE SA Proposal

Describes the IKE SA proposal for identifying encryption algorithm, authentication algorithm, and DH key group.

VPN, NAT, and NAT Traversal

Explains how VPN, NAT, and NAT Traversal interact.

Extended Authentication

Discusses extended authentication used when multiple IPSec routers use the same VPN tunnel.

CHAPTER 31 Bandwidth Management

31.1 Overview

Explains bandwidth management for controlling service usage and prioritizing delay-sensitive applications.

31.1.1 What You Can Do in this Chapter

Covers using BWM screens to control bandwidth and identify refining conditions.

31.1.2 What You Need to Know

Discusses restricting bandwidth usage, policy routes, and security policy interactions.

BWM Type

Describes supported bandwidth management types: Shared, Per user, and Per-Source-IP.

31.2 The Bandwidth Management Screen

Controls bandwidth allocation for TCP and UDP traffic using various criteria.

31.2.1 The Bandwidth Management Add/Edit Screen

Allows creation or editing of bandwidth management rules.

CHAPTER 32 Application Patrol

32.1 Overview

Explains application patrol for managing application usage and traffic prioritization.

32.1.1 What You Can Do in this Chapter

Covers using Profile screens to view and configure application patrol profiles and rules.

32.1.2 What You Need to Know

Discusses security policy and application patrol interactions and how applications are identified.

Application Profiles & Policies

Defines application patrol profiles and policies for customizing actions and log settings.

Classification of Applications

Explains the two methods UAG uses to identify applications: auto (OSI level-7) and service ports (OSI level-4).

32.2 Application Patrol Profile

Allows customization of action and log settings for application patrol signatures.

32.2.1 Add/Edit Application Patrol Profile

Enables configuration of profile settings for creating new rules or editing existing ones.

32.2.2 Add/Edit Application Patrol Profile Rule Application

Allows choosing signatures to include in an application object or rule.

CHAPTER 33 Content Filtering

33.1 Overview

Explains the content filtering feature for controlling access to specific web sites or web content.

33.1.1 What You Can Do in this Chapter

Covers setting up content filtering profiles, trusted, and forbidden web sites lists.

33.1.2 What You Need to Know

Defines Content Filtering, Policies, and Profiles, including category-based blocking.

Content Filtering

Allows blocking web features, specific websites, or categories of web content.

Content Filtering Policies

Explains how to define when to apply a profile using schedule, address, and user/group objects.

Content Filtering Profiles

Stores custom settings for features like category-based blocking.

33.2 Content Filter Profile Screen

Enables content filtering, views policies, creates denial messages, and checks external service registration.

33.2.1 Add/Edit Content Filter Profile

Allows creating or editing content filter profiles, configuring Category Service and Custom Service tabs.

33.2.1.1 Category Service

Configures category service settings, including license status and actions for unsafe web pages.

33.2.1.2 Custom Service

Allows creating lists of allowed (trusted) and blocked (forbidden) web sites or keywords.

33.3 Content Filter Trusted Web Sites Screen

Allows creating a common list of good (allowed) web site addresses.

33.4 Content Filter Forbidden Web Sites Screen

Allows creating a common list of bad (blocked) web site addresses.

33.5 Content Filter Technical Reference

Provides content filtering background information and external content filter server lookup procedures.

CHAPTER 34 Zones

34.1 Zones Overview

Explains setting up zones to configure network security and policies by grouping interfaces.

34.1.1 What You Can Do in this Chapter

Covers using Zone screens to manage the UAG's zones.

34.1.2 What You Need to Know

Explains the effects of zones on different types of traffic: intra-zone, inter-zone, and extra-zone.

Effects of Zones on Different Types of Traffic

Details how zones divide traffic into intra-zone, inter-zone, and extra-zone types.

34.2 The Zone Screen

Provides a summary of all zones, allowing addition, editing, and removal.

34.2.1 Add/Edit Zone

Allows creating or editing a zone.

CHAPTER 35 User/Group

35.1 Overview

Describes how to set up user accounts, user groups, and user settings for the UAG.

35.1.1 What You Can Do in this Chapter

Covers User, Group, Setting, and MAC Address screens for user management.

35.1.2 What You Need to Know

Defines user accounts, privileges, and user types supported by the UAG.

User Account

Defines user account privileges and their use in security and application patrol policies.

User Types

Lists the different types of user accounts supported by the UAG: admin, ext-user, guest-manager, etc.

35.2 User Summary Screen

Provides a summary of all user accounts, allowing access to edit or delete them.

35.2.1 User Add/Edit Screen

Allows creating new user accounts or editing existing ones.

35.2.1.1 Rules for User Names

Specifies rules for creating user names, including character limits and reserved names.

35.3 User Group Summary Screen

Provides a summary of all user groups, allowing addition, editing, and removal.

35.3.1 Group Add/Edit Screen

Allows creating new user groups or editing existing ones.

35.4 User/Group Setting Screen

Controls default settings, login settings, lockout settings, and specifies when users must log in.

35.4.1 Default User Settings Edit Screens

Sets default authentication timeout settings for user account types.

35.4.2 User Aware Login Example

Demonstrates user-aware login, where users must log in before UAG routes traffic.

35.5 MAC Address Screen

Shows MAC addresses of wireless clients for authentication using the local user database.

35.5.1 Add/Edit MAC Address

Configures wireless client MAC addresses and saves them to the UAG's local database.

35.6 User /Group Technical Reference

Provides information on users who use an external authentication server for login.

CHAPTER 36 AP Profile

36.1 Overview

Explains how to configure preset profiles for Access Points (APs) connected to the UAG.

36.1.1 What You Can Do in this Chapter

Covers Radio, SSID, and Security screens for configuring wireless profiles.

36.1.2 What You Need to Know

Defines wireless profiles: Radio, SSID, Security, and MAC Filtering.

Wireless Profiles

Represents saved settings for wireless configurations, including Radio, SSID, Security, and MAC Filtering.

36.2 Radio Screen

Allows creation of radio profiles for APs, defining transmitter properties.

36.2.1 Add/Edit Radio Profile

Enables creation or editing of radio profiles, including band, mode, channel, and advanced settings.

36.3 SSID Screen

Allows configuration of SSID profiles for wireless network names.

36.3.1 SSID List

Creates and manages SSID configurations used by APs.

36.3.2 Add/Edit SSID Profile

Enables creation or editing of SSID profiles, including security and MAC filtering.

36.3.3 Security List

Manages wireless security configurations for SSIDs, implementing encryption and authentication.

36.3.4 Add/Edit Security Profile

Allows creation or editing of security profiles, including WEP, WPA2, and 802.1x settings.

36.3.5 MAC Filter List

Manages security configurations for SSIDs based on wireless client MAC addresses.

36.3.6 Add/Edit MAC Filter Profile

Enables creation or editing of MAC filtering profiles to allow or deny connections based on MAC addresses.

CHAPTER 37 MON Profile

37.1 Overview

Explains setting up monitor mode configurations for APs to scan for wireless devices.

37.1.1 What You Can Do in this Chapter

Covers creating preset monitor mode configurations using the MON Profile screen.

37.1.2 What You Need to Know

Defines Active Scan and Passive Scan for wireless monitoring.

Active Scan

Describes an active scan performed by explicitly triggering a wireless monitoring device.

Passive Scan

Describes a passive scan performed by periodically listening for wireless devices.

37.2 MON Profile

Allows creation of monitor mode configurations for APs.

37.2.1 Add/Edit MON Profile

Enables creation or editing of monitor mode profiles.

37.3 Technical Reference

Provides technical information on Rogue APs, including examples and security compromises.

Rogue APs

Defines Rogue APs as unauthorized wireless access points that can compromise network security.

Friendly APs

Recommends configuring a list of "friendly" APs to identify trusted wireless access points.

CHAPTER 38 Application

38.1 Overview

Explains application identification by port or signature, and creating application objects.

38.1.1 What You Can Do in this Chapter

Covers creating application objects and grouping them using Application and Application Group screens.

38.1.2 What You Need to Know

States that Security Policy and Application Patrol must allow service packets to pass through the UAG.

Application Profiles & Policies

Defines application patrol profiles as groups of signatures with custom actions and log settings.

Classification of Applications

Explains the two methods UAG uses to identify applications: auto (OSI level-7) and service ports (OSI level-4).

38.2 Application Screen

Allows creation of application objects and viewing license and signature information.

38.2.1 Add Application Rule

Guides on creating a new application rule and choosing signatures for the object.

38.2.1.1 Add Application Object by Category or Service

Allows choosing signatures to include in an application object by category or service.

38.3 Application Group Screen

Allows grouping individual application objects to be treated as a single object.

38.3.1 Add Application Group Rule

Enables combining created application rules into a single new rule.

CHAPTER 39 Addresses

39.1 Overview

Explains address objects representing IP addresses or ranges, and address groups.

39.1.1 What You Can Do in this Chapter

Covers using Address and Address Group screens for creating and maintaining address objects.

39.1.2 What You Need to Know

Discusses the use of address objects and groups in security policies and VPN 1-1 mapping profiles.

Address objects and address groups

Defines address objects (HOST, RANGE, SUBNET) and address groups.

39.2 Address Summary Screen

Provides a summary of all addresses, allowing creation, maintenance, and removal.

39.2.1 Address Add/Edit Screen

Allows creating new address objects or editing existing ones.

39.3 Address Group Summary Screen

Provides a summary of all address groups, allowing addition, editing, and removal.

39.3.1 Address Group Add/Edit Screen

Allows creating new address groups or editing existing ones.

CHAPTER 40 Services

40.1 Overview

Explains using service objects to define TCP, UDP, and ICMP protocols, and creating service groups.

40.1.1 What You Can Do in this Chapter

Covers using Service and Service Group screens for viewing and configuring services.

40.1.2 What You Need to Know

Defines IP Protocols (TCP, UDP, ICMP) and port numbers.

IP Protocols

Describes IP protocols like TCP, UDP, and ICMP, including their characteristics and uses.

Service Objects and Service Groups

Explains using service objects to define IP protocols and service groups for rules.

40.2 The Service Summary Screen

Provides a summary of all services and their definitions, allowing add, edit, and remove operations.

40.2.1 The Service Add/Edit Screen

Allows creating new services or editing existing ones.

40.3 The Service Group Summary Screen

Provides a summary of all service groups, allowing add, edit, and remove operations.

40.3.1 The Service Group Add/Edit Screen

Allows creating new service groups or editing existing ones.

CHAPTER 41 Schedules

41.1 Overview

Explains using schedules for policy routes and security policies, supporting one-time and recurring types.

41.1.1 What You Can Do in this Chapter

Covers using Schedule, One-Time Schedule, Recurring Schedule, and Schedule Group screens.

41.1.2 What You Need to Know

Defines One-time Schedules and Recurring Schedules based on date and time.

One-time Schedules

Schedules that begin and end on specific dates and times, useful for holidays.

Recurring Schedules

Schedules that repeat daily or weekly, useful for defining work hours.

41.2 The Schedule Summary Screen

Provides a summary of all schedules, allowing addition, editing, and removal.

41.2.1 The One-Time Schedule Add/Edit Screen

Allows defining or editing a one-time schedule.

41.2.2 The Recurring Schedule Add/Edit Screen

Allows defining or editing a recurring schedule.

41.3 The Schedule Group Summary Screen

Provides a summary of all schedule groups, allowing addition, editing, and removal.

41.3.1 The Schedule Group Add/Edit Screen

Allows defining or editing a schedule group.

CHAPTER 42 AAA Server

42.1 Overview

Explains using AAA servers for access control, including RADIUS servers.

42.1.1 RADIUS Server

Defines RADIUS authentication as a protocol for authenticating users via an external server.

42.1.2 What You Can Do in this Chapter

Covers using Configuration > Object > AAA Server > RADIUS screen for default external RADIUS server configuration.

42.1.3 What You Need to Know

Lists AAA servers supported by the UAG: Local user database and RADIUS.

AAA Servers Supported by the UAG

Details the types of authentication servers supported by the UAG.

42.2 RADIUS Server Summary

Provides a summary of RADIUS servers, allowing management of the list.

42.2.1 Adding/Editing a RADIUS Server

Allows creating or editing a RADIUS server entry.

CHAPTER 43 Authentication Method

43.1 Overview

Explains how authentication method objects set UAG authentication for wireless, HTTP/HTTPS, and IPSec clients.

43.1.1 What You Can Do in this Chapter

Covers creating and managing authentication method objects using the Auth. Method screens.

43.1.2 Before You Begin

Recommends configuring AAA server objects before authentication method objects.

43.2 Authentication Method Objects

Allows creating up to four authentication method objects.

43.2.1 Creating an Authentication Method Object

Provides steps to create an authentication method object, specifying server objects and order.

CHAPTER 44 Certificates

44.1 Overview

Explains how the UAG uses certificates for user authentication based on public-private key pairs.

44.1.1 What You Can Do in this Chapter

Covers using My Certificates screens for generating/importing certificates and Trusted Certificates screens for saving CA certificates.

44.1.2 What You Need to Know

Explains public-private key pairs, certificates, certification authorities, and PKI.

44.1.3 Verifying a Certificate

Describes how to check a certificate's fingerprint to verify its authenticity.

44.2 The My Certificates Screen

Provides a summary list of the UAG's certificates and certification requests.

44.2.1 The My Certificates Add Screen

Allows creating self-signed certificates, enrolling with CA, or generating certification requests.

44.2.2 The My Certificates Edit Screen

Enables viewing in-depth certificate information and changing the certificate's name.

44.2.3 The My Certificates Import Screen

Provides instructions for saving an existing certificate to the UAG.

44.3 The Trusted Certificates Screen

Displays a summary list of certificates that the UAG accepts as trusted.

44.3.1 The Trusted Certificates Edit Screen

Allows viewing certificate information and setting UAG trust for certification authorities.

CHAPTER 45 ISP Accounts

45.1 Overview

Explains managing ISP account information for PPPoE/PPTP interfaces.

45.1.1 What You Can Do in this Chapter

Covers using Object > ISP Account screens to create and manage ISP accounts.

45.2 ISP Account Summary

Provides a summary of ISP accounts, allowing creation, editing, and deletion.

45.2.1 ISP Account Edit

Lets users add information about new accounts or edit existing ones.

CHAPTER 46 System

46.1 Overview

Explains how to configure general UAG settings.

46.1.1 What You Can Do in this Chapter

Covers Host Name, USB Storage, Date/Time, Console Speed, DNS, WWW, SSH, FTP, SNMP, Auth. Server, Language, and ZON settings.

46.2 Host Name

Configures a unique name for the UAG on the network.

46.3 USB Storage

Configures settings for connected USB devices to store system logs and diagnostic information.

46.4 Date and Time

Configures the UAG’s time, date, and time zone, manually or from an external server.

46.4.1 Pre-defined NTP Time Servers List

Lists pre-defined Network Time Protocol (NTP) time servers for synchronization.

46.4.2 Time Server Synchronization

Guides on synchronizing UAG time and date with a time server.

46.5 Console Port Speed

Sets the console port speed for terminal emulation programs.

46.6 DNS Overview

Explains Domain Name System (DNS) for mapping domain names to IP addresses and vice versa.

46.6.1 DNS Server Address Assignment

Describes how UAG obtains DNS server addresses from ISP or manually entered IPs.

46.6.2 Configuring the DNS Screen

Allows changing UAG's DNS settings for resolving domain names and configuring DNS queries.

46.6.3 Address record

Specifies the mapping of a Fully-Qualified Domain Name (FQDN) to an IP address.

46.6.4 PTR Record

Defines a PTR (pointer) record, which maps an IP address to a domain name.

46.6.5 Adding an Address/PTR Record

Allows adding an address or PTR record to the CNAME Record table.

46.6.6 CNAME Record

Specifies an alias for a FQDN, allowing subdomains to map to the same IP address.

46.6.7 Adding a CNAME Record

Adds a record to the CNAME Record table, using '*.' for wildcard domain names.

46.6.8 Domain Zone Forwarder

Contains a DNS server's IP address to resolve domain zones for DDNS and time server.

46.6.9 Adding a Domain Zone Forwarder

Adds a domain zone forwarder record to the Domain Zone Forwarder table.

46.6.10 MX Record

Indicates the host responsible for mail for a particular domain.

46.6.11 Adding a MX Record

Adds a MX record to the MX Record table.

46.6.12 Adding a DNS Service Control Rule

Adds a service control rule to the Service Control table.

46.7 WWW Overview

Explains secure (HTTPS, SSH) and insecure (HTTP, Telnet) management of the UAG.

46.7.1 Service Access Limitations

Details conditions under which a service cannot be used to access the UAG.

46.7.2 System Timeout

Explains lease timeouts for administrators and reauthentication for users.

46.7.3 HTTPS

Describes using HTTPS for secure Web Configurator sessions and its reliance on certificates.

46.7.4 Configuring WWW Service Control

Specifies zones and IP addresses allowed for HTTP or HTTPS access to the UAG.

46.7.5 Service Control Rules

Allows adding or editing service control rules for WWW, SSH, Telnet, FTP, or SNMP.

46.7.6 Customizing the WWW Login Page

Customizes the Web Configurator login screen and the page displayed after user login.

46.7.7 HTTPS Example

Demonstrates accessing the UAG via HTTPS, including handling browser security warnings.

46.7.7.1 Internet Explorer Warning Messages

Explains security alert dialogs in Internet Explorer when accessing HTTPS servers.

46.7.7.2 Mozilla Firefox Warning Messages

Describes the 'Connection is Untrusted' screen in Firefox and technical details.

46.7.7.3 Avoiding Browser Warning Messages

Provides reasons for browser warnings and how to avoid them by importing certificates.

46.7.7.4 Login Screen

Shows the Web Configurator login screen after certificate acceptance.

46.7.7.5 Enrolling and Importing SSL Client Certificates

Explains the need for client certificates for HTTPS access and the process of enrollment and import.

46.8 SSH

Explains using SSH (Secure Shell) to securely access the UAG's command line interface.

46.8.1 How SSH Works

Describes the process of establishing a secure connection between remote hosts using SSH.

46.8.2 SSH Implementation on the UAG

Details UAG's support for SSH versions 1 and 2, authentication methods, and encryption.

46.8.3 Requirements for Using SSH

States the requirement to install an SSH client program on the computer connecting to the UAG.

46.8.4 Configuring SSH

Guides on changing UAG's Secure Shell settings, specifying zones and IP addresses for access.

46.8.5 Secure Telnet Using SSH Examples

Provides examples of accessing the UAG remotely using SSH client programs.

46.9 Telnet

Explains accessing the UAG's command line interface via Telnet and specifying zones/IP addresses.

46.9.1 Configuring Telnet

Guides on configuring remote Telnet access, specifying zones and IP addresses.

46.10 FTP

Explains uploading/downloading UAG firmware and configuration files using FTP.

46.10.1 Configuring FTP

Guides on changing UAG's FTP settings, specifying zones and IP addresses for access.

46.11 SNMP

Explains SNMP for managing and monitoring network devices, supporting SNMPv1 and SNMPv2c.

46.11.1 Supported MIBs

Lists MIBs supported by the UAG for collecting statistical data and monitoring performance.

46.11.2 SNMP Traps

Describes events that trigger SNMP traps sent to the SNMP manager.

46.11.3 Configuring SNMP

Guides on configuring SNMP settings, specifying zones and IP addresses for access.

46.12 Authentication Server

Enables the UAG to act as a RADIUS server for AP user authentication and authorization.

46.12.1 Add/Edit Trusted RADIUS Client

Allows creating or editing trusted RADIUS client entries.

46.13 Language

Selects the display language for the UAG's Web Configurator screens.

46.14 ZyXEL One Network (ZON) Utility

Uses ZDP for discovering and configuring ZDP-aware ZyXEL devices.

46.14.1 ZyXEL One Network (ZON) System Screen

Enables ZDP and Smart Connect for discovering and configuring network devices.

CHAPTER 47 Log and Report

47.1 Overview

Explains configuring daily reporting and log settings.

47.1.1 What You Can Do In this Chapter

Covers Email Daily Report and Log Settings screens for reporting and logging configuration.

47.2 Email Daily Report

Configures sending system statistics via email daily.

47.3 Log Settings Screens

Controls log messages and alerts, including e-mailing, storage, and remote syslog.

47.3.1 Log Settings Summary

Provides a summary of log settings, allowing editing of categories, e-mail addresses, and server names.

47.3.2 Edit System Log Settings

Controls detailed settings for system logs, including categories and e-mail options.

47.3.3 Edit Log on USB Storage Setting

Controls detailed settings for saving logs to a connected USB storage device.

47.3.4 Edit Remote Server Log Settings

Controls detailed settings for saving logs to a remote server (syslog).

47.3.5 Log Category Settings Screen

Allows viewing and editing information included in system log, USB storage, and remote servers.

CHAPTER 48 File Manager

48.1 Overview

Explains configuration files and shell scripts for UAG settings and commands.

48.1.1 What You Can Do in this Chapter

Covers using Configuration File, Firmware Package, and Shell Script screens.

48.1.2 What you Need to Know

Discusses configuration files and shell scripts, including their syntax and application.

Configuration Files and Shell Scripts

Explains the syntax and application differences between configuration files and shell scripts.

Errors in Configuration Files or Shell Scripts

Describes how the UAG processes files line-by-line and handles errors.

48.2 The Configuration File Screen

Allows storing, running, naming, downloading, and uploading configuration files.

48.3 The Firmware Package Screen

Checks current firmware version and uploads new firmware to the UAG.

48.4 The Shell Script Screen

Allows storing, naming, downloading, uploading, and running shell script files.

CHAPTER 49 Diagnostics

49.1 Overview

Explains the use of diagnostic screens for troubleshooting.

49.1.1 What You Can Do in this Chapter

Covers using Diagnostics, Packet Capture, Core Dump, System Log, Network Tool, and Wireless Frame Capture screens.

49.2 The Diagnostics Screen

Generates a file with UAG configuration and diagnostic information for customer support.

49.2.1 The Diagnostics Files Screen

Lists diagnostic files stored on the UAG or USB device for study with a packet analyzer.

49.3 The Packet Capture Screen

Captures network traffic going through UAG interfaces to identify network problems.

49.3.1 The Packet Capture Files Screen

Lists packet capture files stored on the UAG or USB device for download and analysis.

49.4 The Core Dump Screen

Saves a process's core dump to USB storage if it terminates abnormally (crashes).

49.4.1 The Core Dump Files Screen

Lists core dump files stored on the UAG or USB device for troubleshooting.

49.5 The System Log Screen

Lists system log files stored on a USB storage device in CSV format for download and analysis.

49.6 The Network Tool Screen

Allows pinging or tracerouting an IP address to test connections.

49.7 The Wireless Frame Capture Screen

Captures wireless network traffic through AP interfaces to identify network problems.

CHAPTER 50 Packet Flow Explore

50.1 Overview

Provides a clear picture of packet forwarding and source IP address changes based on current settings.

50.1.1 What You Can Do in this Chapter

Covers viewing overall routing flow and SNAT settings using Routing Status and SNAT Status screens.

50.2 The Routing Status Screen

Allows viewing current routing flow and linking to specific routing settings.

50.3 The SNAT Status Screen

Allows viewing and linking to specific source NAT (SNAT) settings.

CHAPTER 51 Reboot

51.1 Overview

Explains how to restart the device, for example, if it behaves erratically.

51.1.1 What You Need To Know

Discusses saving configuration changes before rebooting and the difference between reboot and reset.

51.2 The Reboot Screen

Allows remote users to restart the device via Maintenance > Reboot.

CHAPTER 52 Shutdown

52.1 Overview

Explains how to shut down the device in preparation for disconnecting power.

52.1.1 What You Need To Know

States that shutdown writes cached data and stops system processes.

52.2 The Shutdown Screen

Allows shutting down the device via Maintenance > Shutdown.

CHAPTER 53 Troubleshooting

53.1 Resetting the UAG

Provides a procedure to reset the UAG to factory-default settings if access is lost.

53.2 Getting More Troubleshooting Help

Suggests searching www.zyxel.com for support information and troubleshooting suggestions.

APPENDIX A Customer Support

APPENDIX B Legal Information

Copyright

States the copyright information for the publication.

Disclaimers

Outlines liabilities and conditions related to product usage and descriptions.

Trademarks

Mentions trademarks used for identification purposes.

Regulatory Notice and Statement

Provides regulatory information applicable within the USA area.

FCC EMC Statement

Details FCC compliance, including interference and radiation exposure statements.

FCC Radiation Exposure Statement

States compliance with FCC RF radiation exposure limits for uncontrolled environments.

CANADA

Provides Industry Canada ICES statement applicable within Canada.

Industry Canada ICES statement

States compliance with Industry Canada license-exempt RSS standards.

Industry Canada RSS-GEN & RSS-210 statement

Details Industry Canada regulations for radio transmitter operation and antenna usage.

Industry Canada radiation exposure statement

States compliance with IC radiation exposure limits for uncontrolled environments.

Déclaration d’exposition aux radiations:

French declaration regarding IC radiation exposure limits for uncontrolled environments.

EUROPEAN UNION

Provides EU Directive 1999/5/EC (R&TTE Directive) compliance information.

Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive)

Formal declaration of compliance with EU Directive 1999/5/EC for wireless products.

National Restrictions

Lists countries with specific restrictions or requirements for wireless LAN usage.

Environment statement

Provides environmental information regarding energy-related products (ErP) and WEEE Directive.

ErP (Energy-related Products)

Specifies energy-related product requirements for power consumption.

WEEE Directive

Indicates that used electrical and electronic products should be treated separately.

Taiwan

Provides contact information for ZyXEL Communications Corporation in Taiwan.

Asia

Lists ZyXEL contact information for China.

India

Provides contact information for ZyXEL Technology India Pvt Ltd.

Kazakhstan

Provides contact information for ZyXEL Kazakhstan.

Egypt

Provides contact information for ZyXEL Communication Corporation in Egypt.

Middle East

Provides contact information for ZyXEL Communication Corporation in the Middle East.

North America

Provides contact information for ZyXEL Communications, Inc. in North America.

USA

Provides contact information for ZyXEL Communications, Inc. - North America Headquarters.

Related product manuals