Home > ZyXEL > Router > ZyXEL Router Prestige 334 User Manual

ZyXEL Router Prestige 334 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ZyXEL Router Prestige 334 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 ZyXEL manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Prestige 334 User’s Guide
    Table of Contents10
    4.5 Configuring Password  ........................................................................................60
    4.6 Configuring Time Setting  ....................................................................................60
    Chapter 5
    LAN Screens ........................................................................................................... 64
    5.1 LAN Overview  ....................................................................................................64
    5.2 DHCP Setup .......................................................................................................64
    5.2.1 IP Pool Setup  ............................................................................................64
    5.2.2 System DNS Servers  ................................................................................64
    5.3 LAN TCP/IP ........................................................................................................64
    5.3.1 Factory LAN Defaults ................................................................................64
    5.3.2 IP Address and Subnet Mask  ...................................................................65
    5.3.3 RIP Setup  .................................................................................................65
    5.3.4 Multicast ....................................................................................................65
    5.4 Configuring IP  ....................................................................................................66
    5.5 Configuring Static DHCP  ....................................................................................69
    5.6 Configuring IP Alias ............................................................................................70
    Chapter 6
    WAN Screens .......................................................................................................... 72
    6.1 WAN Overview  ...................................................................................................72
    6.2 TCP/IP Priority (Metric)  ......................................................................................72
    6.3 Configuring Route  ..............................................................................................72
    6.4 Configuring WAN ISP  .........................................................................................73
    6.4.1 Ethernet Encapsulation .............................................................................73
    6.4.2 PPPoE Encapsulation ...............................................................................74
    6.4.3 PPTP Encapsulation  .................................................................................77
    6.5 Configuring WAN IP  ...........................................................................................78
    6.6 Configuring WAN MAC .......................................................................................81
    6.7 Traffic Redirect  ...................................................................................................82
    6.8 Configuring Traffic Redirect ................................................................................83
    Chapter 7
    Network Address Translation (NAT) Screens ...................................................... 86
    7.1 NAT Overview  ....................................................................................................86
    7.1.1 NAT Definitions  .........................................................................................86
    7.1.2 What NAT Does  ........................................................................................87
    7.1.3 How NAT Works  .......................................................................................87
    7.1.4 NAT Application  ........................................................................................88
    7.1.5 NAT Mapping Types  .................................................................................89
    7.2 Using NAT  ..........................................................................................................90
    7.2.1 SUA (Single User Account) Versus NAT  ..................................................90
    7.3 SUA Server  ........................................................................................................90 
    						
    							Prestige 334 User’s Guide
    11Table of Contents
    7.3.1 Default Server IP Address  ........................................................................91
    7.3.2 Port Forwarding: Services and Port Numbers  ..........................................91
    7.3.3 Configuring Servers Behind SUA (Example) ............................................92
    7.4 Configuring SUA Server   ....................................................................................93
    7.5 Configuring Address Mapping  ............................................................................95
    7.5.1 Configuring Address Mapping  ..................................................................96
    7.6 Trigger Port Forwarding  .....................................................................................98
    7.6.1 Trigger Port Forwarding Example  .............................................................98
    7.6.2 Two Points To Remember About Trigger Ports .........................................99
    7.7 Configuring Trigger Port Forwarding  ..................................................................99
    Chapter 8
    Static Route Screens ........................................................................................... 102
    8.1 Static Route Overview  ......................................................................................102
    8.2 Configuring IP Static Route  ..............................................................................102
    8.2.1 Configuring Route Entry  .........................................................................103
    Chapter 9
    UPnP...................................................................................................................... 106
    9.1  Universal Plug and Play Overview  ..................................................................106
    9.1.1 How Do I Know If Im Using UPnP? ........................................................106
    9.1.2 NAT Traversal  .........................................................................................106
    9.1.3 Cautions with UPnP  ................................................................................106
    9.2 UPnP and ZyXEL  .............................................................................................107
    9.3 Configuring UPnP  ............................................................................................107
    9.4 Installing UPnP in Windows Example  ..............................................................108
    9.4.1 Installing UPnP in Windows Me  ..............................................................109
    9.4.2 Installing UPnP in Windows XP  .............................................................. 110
    9.5 Using UPnP in Windows XP Example  ............................................................. 111
    9.5.1 Auto-discover Your UPnP-enabled Network Device  ............................... 112
    9.5.2 Web Configurator Easy Access  .............................................................. 113
    9.5.3 Web Configurator Easy Access  .............................................................. 114
    Chapter 10
    Trend Micro Security Services ............................................................................ 116
    10.1 Trend Micro Security Service Overview ......................................................... 116
    10.2 Configuring Service Settings  .......................................................................... 116
    10.3 Virus Protection .............................................................................................. 118
    10.4 Configuring Virus Protection .......................................................................... 118
    10.5 Parental Controls  ...........................................................................................120
    10.6 Parental Controls Configuration .....................................................................120
    10.6.1 Parental Controls Statistics  ...................................................................124 
    						
    							Prestige 334 User’s Guide
    Table of Contents12
    Chapter 11
    Firewall .................................................................................................................. 126
    11.1 Introduction .....................................................................................................126
    11.1.1 What is a Firewall? ................................................................................126
    11.1.2 Stateful Inspection Firewall.  ..................................................................126
    11.1.3 About the Prestige Firewall  ...................................................................126
    11.1.4 Guidelines For Enhancing Security With Your Firewall  .........................127
    11.2 Firewall Settings Screen .................................................................................127
    11.3 The Firewall, NAT and Remote Management  ................................................129
    11.3.1 LAN-to-WAN rules .................................................................................129
    11.3.2 WAN-to-LAN rules .................................................................................129
    11.4  Services .........................................................................................................130
    Chapter 12
    Content Filtering  ................................................................................................. 134
    12.1 Introduction to Content Filtering  .....................................................................134
    12.2 Restrict Web Features  ...................................................................................134
    12.3 Days and Times  .............................................................................................134
    12.4 Configure Content Filtering  ............................................................................134
    Chapter 13
    Remote Management Screens ............................................................................ 138
    13.1 Remote Management Overview .....................................................................138
    13.1.1 Remote Management Limitations  .........................................................138
    13.1.2 Remote Management and NAT  ............................................................139
    13.1.3  System Timeout  ...................................................................................139
    13.2 Configuring WWW ..........................................................................................139
    13.3 Configuring Telnet  ..........................................................................................140
    13.4 Configuring TELNET  ......................................................................................141
    13.5 Configuring FTP  .............................................................................................142
    13.6 SNMP  .............................................................................................................143
    13.6.1 Supported MIBs  ....................................................................................144
    13.6.2 SNMP Traps  .........................................................................................144
    13.6.3 Configuring SNMP  ................................................................................144
    13.7 Configuring DNS  ............................................................................................146
    13.8 Configuring Security  .......................................................................................147
    Chapter 14
    Introduction to IPSec ........................................................................................... 150
    14.1 VPN Overview  ................................................................................................150
    14.1.1 IPSec  ....................................................................................................150
    14.1.2 Security Association .............................................................................150
    14.1.3 Other Terminology  ................................................................................150 
    						
    							Prestige 334 User’s Guide
    13Table of Contents
    14.1.3.1 Encryption  ...................................................................................150
    14.1.3.2 Data Confidentiality  .....................................................................151
    14.1.3.3 Data Integrity  ...............................................................................151
    14.1.3.4 Data Origin Authentication  ..........................................................151
    14.1.4 VPN Applications  ..................................................................................151
    14.2 IPSec Architecture .........................................................................................151
    14.2.1 IPSec Algorithms  ..................................................................................152
    14.2.2 Key Management ..................................................................................152
    14.3 Encapsulation .................................................................................................152
    14.3.1 Transport Mode  ....................................................................................153
    14.3.2 Tunnel Mode  .........................................................................................153
    14.4 IPSec and NAT ...............................................................................................153
    Chapter 15
      VPN Screens ....................................................................................................... 156
    15.1 VPN/IPSec Overview  .....................................................................................156
    15.2 IPSec Algorithms ............................................................................................156
    15.2.1 AH (Authentication Header) Protocol ....................................................156
    15.2.2 ESP (Encapsulating Security Payload) Protocol  ..................................156
    15.3 My IP Address  ................................................................................................157
    15.4 Secure Gateway Address ..............................................................................157
    15.4.1 Dynamic Secure Gateway Address  ......................................................158
    15.5 Summary Screen  ...........................................................................................158
    15.6 Keep Alive  ......................................................................................................160
    15.7 NAT Traversal  ................................................................................................160
    15.7.1 NAT Traversal Configuration .................................................................160
    15.7.2 Remote DNS Server  .............................................................................161
    15.8 ID Type and Content  ......................................................................................162
    15.8.1 ID Type and Content Examples  ............................................................163
    15.9 Pre-Shared Key ..............................................................................................163
    15.10 Editing VPN Rules ........................................................................................164
    15.11  IKE Phases ..................................................................................................167
    15.11.1 Negotiation Mode  ................................................................................168
    15.11.2 Diffie-Hellman (DH) Key Groups .........................................................168
    15.11.3 Perfect Forward Secrecy (PFS)  ..........................................................168
    15.12 Configuring Advanced IKE Settings  .............................................................169
    15.13 Manual Key Setup  ........................................................................................174
    15.13.1 Security Parameter Index (SPI)  ..........................................................175
    15.14 Configuring Manual Key  ...............................................................................175
    15.15 Viewing SA Monitor  ......................................................................................178
    15.16 Configuring Global Setting  ...........................................................................179
    15.17 Telecommuter VPN/IPSec Examples  ...........................................................180
    15.17.1 Telecommuters Sharing One VPN Rule Example  ..............................180 
    						
    							Prestige 334 User’s Guide
    Table of Contents14
    15.17.2 Telecommuters Using Unique VPN Rules Example  ...........................181
    15.18 VPN and Remote Management  ...................................................................182
    Chapter 16
    Centralized Logs .................................................................................................. 184
    16.1 View Log  ........................................................................................................184
    16.2 Log Settings  ...................................................................................................186
    Chapter 17
    Maintenance ......................................................................................................... 190
    17.1 Maintenance Overview ...................................................................................190
    17.2 Status Screen  .................................................................................................190
    17.2.1 System Statistics ...................................................................................192
    17.3 DHCP Table Screen  .......................................................................................192
    17.4 F/W Upload Screen  ........................................................................................193
    17.4.1 Preparing your Prestige for Firmware Upload  ......................................194
    17.5 Configuration Screen  .....................................................................................196
    17.5.1 Backup Configuration ...........................................................................196
    17.5.2 Restore Configuration   ..........................................................................197
    17.5.3 Back to Factory Defaults .......................................................................198
    17.6 Restart Screen  ...............................................................................................198
    Chapter 18
    Introducing the SMT ............................................................................................ 200
    18.1 SMT Introduction  ............................................................................................200
    18.1.1 Procedure for SMT Configuration via Telnet  .........................................200
    18.1.2 Entering Password ................................................................................200
    18.1.3 Prestige SMT Menu Overview  ..............................................................201
    18.2 Navigating the SMT Interface .........................................................................201
    18.2.1 System Management Terminal Interface Summary  ..............................203
    18.3 Changing the System Password ....................................................................204
    Chapter 19
    Menu 1 General Setup ......................................................................................... 206
    19.1 General Setup  ................................................................................................206
    19.2 Procedure To Configure Menu 1  ....................................................................206
    19.2.1 Procedure to Configure Dynamic DNS  .................................................208
    Chapter 20
    Menu 2 WAN Setup .............................................................................................. 210
    20.1 Introduction to WAN  .......................................................................................210
    20.2 WAN Setup .....................................................................................................210 
    						
    							Prestige 334 User’s Guide
    15Table of Contents
    Chapter 21
    Menu 3 LAN Setup ............................................................................................... 212
    21.1 LAN Setup  ......................................................................................................212
    21.1.1 General Ethernet Setup ........................................................................212
    21.2 Protocol Dependent Ethernet Setup  ..............................................................213
    21.3 TCP/IP Ethernet Setup and DHCP  ................................................................213
    21.3.1 IP Alias Setup  .......................................................................................215
    Chapter 22
    Internet Access .................................................................................................... 218
    22.1 Introduction to Internet Access Setup  ............................................................218
    22.2 Ethernet Encapsulation ..................................................................................218
    22.3 Configuring the PPTP Client  ..........................................................................220
    22.4 Configuring the PPPoE Client  ........................................................................221
    22.5 Basic Setup Complete ....................................................................................222
    Chapter 23
    Remote Node Configuration ............................................................................... 224
    23.1 Introduction to Remote Node Setup  ...............................................................224
    23.2 Remote Node Profile Setup  ...........................................................................224
    23.2.1 Ethernet Encapsulation .........................................................................224
    23.2.2 PPPoE Encapsulation ...........................................................................226
    23.2.2.1 Outgoing Authentication Protocol ................................................226
    23.2.2.2 Nailed-Up Connection .................................................................227
    23.2.3 PPTP Encapsulation  .............................................................................227
    23.3 Edit IP .............................................................................................................228
    23.4 Remote Node Filter  ........................................................................................230
    23.4.1 Traffic Redirect Setup  ...........................................................................231
    Chapter 24
    Static Route Setup ............................................................................................... 234
    24.1 IP Static Route Setup  .....................................................................................234
    Chapter 25
    Network Address Translation (NAT) ................................................................... 236
    25.1 Using NAT  ......................................................................................................236
    25.1.1 SUA (Single User Account) Versus NAT  ..............................................236
    25.2 Applying NAT  .................................................................................................236
    25.3 NAT Setup  ......................................................................................................238
    25.3.1 Address Mapping Sets ..........................................................................239
    25.3.1.1 User-Defined Address Mapping Sets  ..........................................240
    25.3.1.2 Ordering Your Rules  ....................................................................241
    25.4 Configuring a Server behind NAT  ..................................................................243 
    						
    							Prestige 334 User’s Guide
    Table of Contents16
    25.5 General NAT Examples ..................................................................................244
    25.5.1 Example 1: Internet Access Only ..........................................................245
    25.5.2 Example 2: Internet Access with an Inside Server ...............................245
    25.5.3 Example 3: Multiple Public IP Addresses With Inside Servers  .............246
    25.5.4 Example 4: NAT Unfriendly Application Programs  ...............................250
    25.6 Configuring Trigger Port Forwarding  .............................................................252
    Chapter 26
    Enabling the Firewall ........................................................................................... 254
    26.1 Remote Management and the Firewall  ..........................................................254
    26.2 Access Methods  .............................................................................................254
    26.3 Enabling the Firewall  ......................................................................................254
    Chapter 27
    Filter Configuration .............................................................................................. 256
    27.1 Introduction to Filters ......................................................................................256
    27.1.1 The Filter Structure of the Prestige .......................................................257
    27.2 Configuring a Filter Set  ..................................................................................258
    27.2.1 Configuring a Filter Rule  .......................................................................260
    27.2.2 Configuring a TCP/IP Filter Rule  ..........................................................260
    27.2.3 Configuring a Generic Filter Rule  .........................................................263
    27.3 Example Filter  ................................................................................................265
    27.4 Filter Types and NAT ......................................................................................267
    27.5 Firewall Versus Filters  ....................................................................................268
    27.6 Applying a Filter   ............................................................................................268
    27.6.1 Applying LAN Filters .............................................................................268
    27.6.2 Applying Remote Node Filters  ..............................................................269
    Chapter 28
    SNMP Configuration ............................................................................................ 270
    28.1 About SNMP  ..................................................................................................270
    28.2  Supported MIBs  ............................................................................................271
    28.3 SNMP Configuration  ......................................................................................271
    28.4 SNMP Traps  ...................................................................................................272
    Chapter 29
    System Information and Diagnosis .................................................................... 274
    29.1 System Status  ................................................................................................274
    29.2 System Information ........................................................................................276
    29.2.1 System Information ...............................................................................276
    29.2.2 Console Port Speed ..............................................................................277
    29.3 Log and Trace  ................................................................................................278
    29.3.1 Syslog Logging .....................................................................................278 
    						
    							Prestige 334 User’s Guide
    17Table of Contents
    29.3.1.1 CDR  ............................................................................................279
    29.3.1.2 Packet triggered  ..........................................................................279
    29.3.1.3 Filter log   .....................................................................................280
    29.3.1.4 PPP log   ......................................................................................280
    29.3.1.5 Firewall log  ..................................................................................281
    29.3.2 Call-Triggering Packet ..........................................................................281
    29.4 Diagnostic  ......................................................................................................282
    29.4.1 WAN DHCP  ..........................................................................................283
    Chapter 30
    Firmware and Configuration File Maintenance ................................................. 286
    30.1 Filename Conventions ...................................................................................286
    30.2 Backup Configuration  .....................................................................................287
    30.2.1 Backup Configuration ...........................................................................287
    30.2.2 Using the FTP Command from the Command Line ..............................288
    30.2.3 Example of FTP Commands from the Command Line  .........................289
    30.2.4 GUI-based FTP Clients .........................................................................289
    30.2.5 TFTP and FTP over WAN Management Limitations .............................289
    30.2.6 Backup Configuration Using TFTP .......................................................290
    30.2.7 TFTP Command Example ....................................................................290
    30.2.8 GUI-based TFTP Clients  ......................................................................291
    30.3 Restore Configuration  ....................................................................................291
    30.3.1 Restore Using FTP  ...............................................................................291
    30.3.2 Restore Using FTP Session Example ..................................................293
    30.4 Uploading Firmware and Configuration Files .................................................293
    30.4.1 Firmware File Upload ............................................................................293
    30.4.2 Configuration File Upload .....................................................................294
    30.4.3 FTP File Upload Command from the DOS Prompt Example ................294
    30.4.4 FTP Session Example of Firmware File Upload  ...................................295
    30.4.5 TFTP File Upload ..................................................................................295
    30.4.6 TFTP Upload Command Example  ........................................................296
    Chapter 31
    System Maintenance............................................................................................ 298
    31.1 Command Interpreter Mode ...........................................................................298
    31.1.1 Command Syntax  .................................................................................298
    31.1.2 Command Usage  ..................................................................................299
    31.2 Call Control Support  .......................................................................................299
    31.2.1 Budget Management  ............................................................................299
    31.2.2 Call History  ...........................................................................................300
    31.3 Time and Date Setting ....................................................................................301
    31.3.1 Resetting the Time ................................................................................304 
    						
    							Prestige 334 User’s Guide
    Table of Contents18
    Chapter 32
    Remote Management ........................................................................................... 306
    32.1 Remote Management .....................................................................................306
    32.1.1 Remote Management Limitations  .........................................................307
    Chapter 33
    Call Scheduling .................................................................................................... 310
    33.1 Introduction to Call Scheduling  ......................................................................310
    Chapter 34
    VPN/IPSec Setup .................................................................................................. 314
    34.1 VPN/IPSec Overview  .....................................................................................314
    34.2 IPSec Summary Screen  .................................................................................315
    34.3 IKE Setup  .......................................................................................................321
    34.4 Manual Setup  .................................................................................................323
    34.4.0.1 Active Protocol ............................................................................324
    34.4.0.2 Security Parameter Index (SPI) ..................................................324
    Chapter 35
    SA Monitor ............................................................................................................ 326
    35.1 SA Monitor Overview  .....................................................................................326
    35.2 Using SA Monitor  ...........................................................................................326
    Appendix A
    Troubleshooting ................................................................................................... 330
    35.3 Problems with the Password ..........................................................................331
    35.4 Problems with Remote Management  .............................................................331
    Appendix B
    PPPoE ................................................................................................................... 332
    Appendix C
    PPTP ...................................................................................................................... 334
    Appendix D
    NetBIOS Filter Commands .................................................................................. 338
    Appendix E
    Log Descriptions .................................................................................................. 340
    Appendix F
    Setting up Your Computer’s IP Address............................................................ 342
    Appendix G
    Brute-Force Password Guessing Protection ..................................................... 354 
    						
    							Prestige 334 User’s Guide
    19Table of Contents
    Appendix H
    TMSS ..................................................................................................................... 356
    Appendix I
    Triangle Route ...................................................................................................... 360 
    						
    All ZyXEL manuals Comments (0)

    Related Manuals for ZyXEL Router Prestige 334 User Manual