ZyXEL Router Prestige 334 User Manual
Here you can view all the pages of manual ZyXEL Router Prestige 334 User Manual. The ZyXEL manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 181
Prestige 334 User’s Guide Chapter 15 VPN Screens180 Figure 69 VPN: Global Setting The following table describes the labels in this screen. 15.17 Telecommuter VPN/IPSec Examples The following examples show how multiple telecommuters can make VPN connections to a single Prestige at headquarters from remote IPSec routers that use dynamic WAN IP addresses. 15.17.1 Telecommuters Sharing One VPN Rule Example Multiple telecommuters can use one VPN rule to simultaneously access a Prestige at...
Page 182
Prestige 334 User’s Guide 181Chapter 15 VPN Screens Having everyone use the same pre-shared key may create a vulnerability. If the pre-shared key is compromised, all of the VPN connections using that VPN rule are at risk. A recommended alternative is to use a different VPN rule for each telecommuter and identify them by unique IDs (see the Telecommuters Using Unique VPN Rules Example section ).. Figure 70 Telecommuters Sharing One VPN Rule Example 15.17.2 Telecommuters Using Unique VPN Rules...
Page 183
Prestige 334 User’s Guide Chapter 15 VPN Screens182 See the following graphic for an example where three telecommuters each use a different VPN rule to initiate a VPN connection to a Prestige located at headquarters. The Prestige at headquarters identifies each by its secure gateway address (a dynamic domain name) and uses the appropriate VPN rule to establish the VPN connection. Figure 71 Telecommuters Using Unique VPN Rules Example 15.18 VPN and Remote Management If a VPN tunnel uses a remote...
Page 185
Prestige 334 User’s Guide Chapter 16 Centralized Logs184 CHAPTER16 Centralized Logs This chapter contains information about configuring general log settings and viewing the Prestige’s logs. Refer to the appendices for example log message explanations. 16.1 View Log The web configurator allows you to look at all of the Prestige’s logs in one location. Click the LOGS in the navigation panel to open the View Log screen. Use the View Log screen to see the logs for the categories that you selected in the...
Page 186
Prestige 334 User’s Guide 185Chapter 16 Centralized Logs Figure 72 View Logs The following table describes the labels in this screen. Table 57 View Logs LABELDESCRIPTION Display The categories that you select in the Log Settings page (see section ) display in the drop-down list box. Select a category of logs to view; select All Logs to view logs from all of the log categories that you selected in the Log Settings page. Time This field displays the time the log was recorded. See the chapter on...
Page 187
Prestige 334 User’s Guide Chapter 16 Centralized Logs186 16.2 Log Settings You can configure the Prestige’s general log settings in one location. Click the LOGS in the navigation panel and then the Log Settings tab to open the Log Settings screen. Use the Log Settings screen to configure to where the Prestige is to send logs; the schedule for when the Prestige is to send the logs and which logs and/or immediate alerts the Prestige to send. An alert is a type of log that warrants more serious...
Page 188
Prestige 334 User’s Guide 187Chapter 16 Centralized Logs Figure 73 Log Settings The following table describes the labels in this screen. Table 58 Log Settings LABELDESCRIPTION Address Info Mail Server Enter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via e-mail.
Page 189
Prestige 334 User’s Guide Chapter 16 Centralized Logs188 Mail SubjectType a title that you want to be in the subject line of the log e-mail message that the Prestige sends. Not all Prestige models have this field. Send Log To The Prestige sends logs to the e-mail address specified in this field. If this field is left blank, the Prestige does not send logs via e-mail. Send Alerts To Alerts are real-time notifications that are sent as soon as an event, such as a DoS attack, system error, or forbidden...