ZyXEL Router Prestige 334 User Manual
Have a look at the manual ZyXEL Router Prestige 334 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 ZyXEL manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Prestige 334 User’s Guide Table of Contents10 4.5 Configuring Password ........................................................................................60 4.6 Configuring Time Setting ....................................................................................60 Chapter 5 LAN Screens ........................................................................................................... 64 5.1 LAN Overview ....................................................................................................64 5.2 DHCP Setup .......................................................................................................64 5.2.1 IP Pool Setup ............................................................................................64 5.2.2 System DNS Servers ................................................................................64 5.3 LAN TCP/IP ........................................................................................................64 5.3.1 Factory LAN Defaults ................................................................................64 5.3.2 IP Address and Subnet Mask ...................................................................65 5.3.3 RIP Setup .................................................................................................65 5.3.4 Multicast ....................................................................................................65 5.4 Configuring IP ....................................................................................................66 5.5 Configuring Static DHCP ....................................................................................69 5.6 Configuring IP Alias ............................................................................................70 Chapter 6 WAN Screens .......................................................................................................... 72 6.1 WAN Overview ...................................................................................................72 6.2 TCP/IP Priority (Metric) ......................................................................................72 6.3 Configuring Route ..............................................................................................72 6.4 Configuring WAN ISP .........................................................................................73 6.4.1 Ethernet Encapsulation .............................................................................73 6.4.2 PPPoE Encapsulation ...............................................................................74 6.4.3 PPTP Encapsulation .................................................................................77 6.5 Configuring WAN IP ...........................................................................................78 6.6 Configuring WAN MAC .......................................................................................81 6.7 Traffic Redirect ...................................................................................................82 6.8 Configuring Traffic Redirect ................................................................................83 Chapter 7 Network Address Translation (NAT) Screens ...................................................... 86 7.1 NAT Overview ....................................................................................................86 7.1.1 NAT Definitions .........................................................................................86 7.1.2 What NAT Does ........................................................................................87 7.1.3 How NAT Works .......................................................................................87 7.1.4 NAT Application ........................................................................................88 7.1.5 NAT Mapping Types .................................................................................89 7.2 Using NAT ..........................................................................................................90 7.2.1 SUA (Single User Account) Versus NAT ..................................................90 7.3 SUA Server ........................................................................................................90
Prestige 334 User’s Guide 11Table of Contents 7.3.1 Default Server IP Address ........................................................................91 7.3.2 Port Forwarding: Services and Port Numbers ..........................................91 7.3.3 Configuring Servers Behind SUA (Example) ............................................92 7.4 Configuring SUA Server ....................................................................................93 7.5 Configuring Address Mapping ............................................................................95 7.5.1 Configuring Address Mapping ..................................................................96 7.6 Trigger Port Forwarding .....................................................................................98 7.6.1 Trigger Port Forwarding Example .............................................................98 7.6.2 Two Points To Remember About Trigger Ports .........................................99 7.7 Configuring Trigger Port Forwarding ..................................................................99 Chapter 8 Static Route Screens ........................................................................................... 102 8.1 Static Route Overview ......................................................................................102 8.2 Configuring IP Static Route ..............................................................................102 8.2.1 Configuring Route Entry .........................................................................103 Chapter 9 UPnP...................................................................................................................... 106 9.1 Universal Plug and Play Overview ..................................................................106 9.1.1 How Do I Know If Im Using UPnP? ........................................................106 9.1.2 NAT Traversal .........................................................................................106 9.1.3 Cautions with UPnP ................................................................................106 9.2 UPnP and ZyXEL .............................................................................................107 9.3 Configuring UPnP ............................................................................................107 9.4 Installing UPnP in Windows Example ..............................................................108 9.4.1 Installing UPnP in Windows Me ..............................................................109 9.4.2 Installing UPnP in Windows XP .............................................................. 110 9.5 Using UPnP in Windows XP Example ............................................................. 111 9.5.1 Auto-discover Your UPnP-enabled Network Device ............................... 112 9.5.2 Web Configurator Easy Access .............................................................. 113 9.5.3 Web Configurator Easy Access .............................................................. 114 Chapter 10 Trend Micro Security Services ............................................................................ 116 10.1 Trend Micro Security Service Overview ......................................................... 116 10.2 Configuring Service Settings .......................................................................... 116 10.3 Virus Protection .............................................................................................. 118 10.4 Configuring Virus Protection .......................................................................... 118 10.5 Parental Controls ...........................................................................................120 10.6 Parental Controls Configuration .....................................................................120 10.6.1 Parental Controls Statistics ...................................................................124
Prestige 334 User’s Guide Table of Contents12 Chapter 11 Firewall .................................................................................................................. 126 11.1 Introduction .....................................................................................................126 11.1.1 What is a Firewall? ................................................................................126 11.1.2 Stateful Inspection Firewall. ..................................................................126 11.1.3 About the Prestige Firewall ...................................................................126 11.1.4 Guidelines For Enhancing Security With Your Firewall .........................127 11.2 Firewall Settings Screen .................................................................................127 11.3 The Firewall, NAT and Remote Management ................................................129 11.3.1 LAN-to-WAN rules .................................................................................129 11.3.2 WAN-to-LAN rules .................................................................................129 11.4 Services .........................................................................................................130 Chapter 12 Content Filtering ................................................................................................. 134 12.1 Introduction to Content Filtering .....................................................................134 12.2 Restrict Web Features ...................................................................................134 12.3 Days and Times .............................................................................................134 12.4 Configure Content Filtering ............................................................................134 Chapter 13 Remote Management Screens ............................................................................ 138 13.1 Remote Management Overview .....................................................................138 13.1.1 Remote Management Limitations .........................................................138 13.1.2 Remote Management and NAT ............................................................139 13.1.3 System Timeout ...................................................................................139 13.2 Configuring WWW ..........................................................................................139 13.3 Configuring Telnet ..........................................................................................140 13.4 Configuring TELNET ......................................................................................141 13.5 Configuring FTP .............................................................................................142 13.6 SNMP .............................................................................................................143 13.6.1 Supported MIBs ....................................................................................144 13.6.2 SNMP Traps .........................................................................................144 13.6.3 Configuring SNMP ................................................................................144 13.7 Configuring DNS ............................................................................................146 13.8 Configuring Security .......................................................................................147 Chapter 14 Introduction to IPSec ........................................................................................... 150 14.1 VPN Overview ................................................................................................150 14.1.1 IPSec ....................................................................................................150 14.1.2 Security Association .............................................................................150 14.1.3 Other Terminology ................................................................................150
Prestige 334 User’s Guide 13Table of Contents 14.1.3.1 Encryption ...................................................................................150 14.1.3.2 Data Confidentiality .....................................................................151 14.1.3.3 Data Integrity ...............................................................................151 14.1.3.4 Data Origin Authentication ..........................................................151 14.1.4 VPN Applications ..................................................................................151 14.2 IPSec Architecture .........................................................................................151 14.2.1 IPSec Algorithms ..................................................................................152 14.2.2 Key Management ..................................................................................152 14.3 Encapsulation .................................................................................................152 14.3.1 Transport Mode ....................................................................................153 14.3.2 Tunnel Mode .........................................................................................153 14.4 IPSec and NAT ...............................................................................................153 Chapter 15 VPN Screens ....................................................................................................... 156 15.1 VPN/IPSec Overview .....................................................................................156 15.2 IPSec Algorithms ............................................................................................156 15.2.1 AH (Authentication Header) Protocol ....................................................156 15.2.2 ESP (Encapsulating Security Payload) Protocol ..................................156 15.3 My IP Address ................................................................................................157 15.4 Secure Gateway Address ..............................................................................157 15.4.1 Dynamic Secure Gateway Address ......................................................158 15.5 Summary Screen ...........................................................................................158 15.6 Keep Alive ......................................................................................................160 15.7 NAT Traversal ................................................................................................160 15.7.1 NAT Traversal Configuration .................................................................160 15.7.2 Remote DNS Server .............................................................................161 15.8 ID Type and Content ......................................................................................162 15.8.1 ID Type and Content Examples ............................................................163 15.9 Pre-Shared Key ..............................................................................................163 15.10 Editing VPN Rules ........................................................................................164 15.11 IKE Phases ..................................................................................................167 15.11.1 Negotiation Mode ................................................................................168 15.11.2 Diffie-Hellman (DH) Key Groups .........................................................168 15.11.3 Perfect Forward Secrecy (PFS) ..........................................................168 15.12 Configuring Advanced IKE Settings .............................................................169 15.13 Manual Key Setup ........................................................................................174 15.13.1 Security Parameter Index (SPI) ..........................................................175 15.14 Configuring Manual Key ...............................................................................175 15.15 Viewing SA Monitor ......................................................................................178 15.16 Configuring Global Setting ...........................................................................179 15.17 Telecommuter VPN/IPSec Examples ...........................................................180 15.17.1 Telecommuters Sharing One VPN Rule Example ..............................180
Prestige 334 User’s Guide Table of Contents14 15.17.2 Telecommuters Using Unique VPN Rules Example ...........................181 15.18 VPN and Remote Management ...................................................................182 Chapter 16 Centralized Logs .................................................................................................. 184 16.1 View Log ........................................................................................................184 16.2 Log Settings ...................................................................................................186 Chapter 17 Maintenance ......................................................................................................... 190 17.1 Maintenance Overview ...................................................................................190 17.2 Status Screen .................................................................................................190 17.2.1 System Statistics ...................................................................................192 17.3 DHCP Table Screen .......................................................................................192 17.4 F/W Upload Screen ........................................................................................193 17.4.1 Preparing your Prestige for Firmware Upload ......................................194 17.5 Configuration Screen .....................................................................................196 17.5.1 Backup Configuration ...........................................................................196 17.5.2 Restore Configuration ..........................................................................197 17.5.3 Back to Factory Defaults .......................................................................198 17.6 Restart Screen ...............................................................................................198 Chapter 18 Introducing the SMT ............................................................................................ 200 18.1 SMT Introduction ............................................................................................200 18.1.1 Procedure for SMT Configuration via Telnet .........................................200 18.1.2 Entering Password ................................................................................200 18.1.3 Prestige SMT Menu Overview ..............................................................201 18.2 Navigating the SMT Interface .........................................................................201 18.2.1 System Management Terminal Interface Summary ..............................203 18.3 Changing the System Password ....................................................................204 Chapter 19 Menu 1 General Setup ......................................................................................... 206 19.1 General Setup ................................................................................................206 19.2 Procedure To Configure Menu 1 ....................................................................206 19.2.1 Procedure to Configure Dynamic DNS .................................................208 Chapter 20 Menu 2 WAN Setup .............................................................................................. 210 20.1 Introduction to WAN .......................................................................................210 20.2 WAN Setup .....................................................................................................210
Prestige 334 User’s Guide 15Table of Contents Chapter 21 Menu 3 LAN Setup ............................................................................................... 212 21.1 LAN Setup ......................................................................................................212 21.1.1 General Ethernet Setup ........................................................................212 21.2 Protocol Dependent Ethernet Setup ..............................................................213 21.3 TCP/IP Ethernet Setup and DHCP ................................................................213 21.3.1 IP Alias Setup .......................................................................................215 Chapter 22 Internet Access .................................................................................................... 218 22.1 Introduction to Internet Access Setup ............................................................218 22.2 Ethernet Encapsulation ..................................................................................218 22.3 Configuring the PPTP Client ..........................................................................220 22.4 Configuring the PPPoE Client ........................................................................221 22.5 Basic Setup Complete ....................................................................................222 Chapter 23 Remote Node Configuration ............................................................................... 224 23.1 Introduction to Remote Node Setup ...............................................................224 23.2 Remote Node Profile Setup ...........................................................................224 23.2.1 Ethernet Encapsulation .........................................................................224 23.2.2 PPPoE Encapsulation ...........................................................................226 23.2.2.1 Outgoing Authentication Protocol ................................................226 23.2.2.2 Nailed-Up Connection .................................................................227 23.2.3 PPTP Encapsulation .............................................................................227 23.3 Edit IP .............................................................................................................228 23.4 Remote Node Filter ........................................................................................230 23.4.1 Traffic Redirect Setup ...........................................................................231 Chapter 24 Static Route Setup ............................................................................................... 234 24.1 IP Static Route Setup .....................................................................................234 Chapter 25 Network Address Translation (NAT) ................................................................... 236 25.1 Using NAT ......................................................................................................236 25.1.1 SUA (Single User Account) Versus NAT ..............................................236 25.2 Applying NAT .................................................................................................236 25.3 NAT Setup ......................................................................................................238 25.3.1 Address Mapping Sets ..........................................................................239 25.3.1.1 User-Defined Address Mapping Sets ..........................................240 25.3.1.2 Ordering Your Rules ....................................................................241 25.4 Configuring a Server behind NAT ..................................................................243
Prestige 334 User’s Guide Table of Contents16 25.5 General NAT Examples ..................................................................................244 25.5.1 Example 1: Internet Access Only ..........................................................245 25.5.2 Example 2: Internet Access with an Inside Server ...............................245 25.5.3 Example 3: Multiple Public IP Addresses With Inside Servers .............246 25.5.4 Example 4: NAT Unfriendly Application Programs ...............................250 25.6 Configuring Trigger Port Forwarding .............................................................252 Chapter 26 Enabling the Firewall ........................................................................................... 254 26.1 Remote Management and the Firewall ..........................................................254 26.2 Access Methods .............................................................................................254 26.3 Enabling the Firewall ......................................................................................254 Chapter 27 Filter Configuration .............................................................................................. 256 27.1 Introduction to Filters ......................................................................................256 27.1.1 The Filter Structure of the Prestige .......................................................257 27.2 Configuring a Filter Set ..................................................................................258 27.2.1 Configuring a Filter Rule .......................................................................260 27.2.2 Configuring a TCP/IP Filter Rule ..........................................................260 27.2.3 Configuring a Generic Filter Rule .........................................................263 27.3 Example Filter ................................................................................................265 27.4 Filter Types and NAT ......................................................................................267 27.5 Firewall Versus Filters ....................................................................................268 27.6 Applying a Filter ............................................................................................268 27.6.1 Applying LAN Filters .............................................................................268 27.6.2 Applying Remote Node Filters ..............................................................269 Chapter 28 SNMP Configuration ............................................................................................ 270 28.1 About SNMP ..................................................................................................270 28.2 Supported MIBs ............................................................................................271 28.3 SNMP Configuration ......................................................................................271 28.4 SNMP Traps ...................................................................................................272 Chapter 29 System Information and Diagnosis .................................................................... 274 29.1 System Status ................................................................................................274 29.2 System Information ........................................................................................276 29.2.1 System Information ...............................................................................276 29.2.2 Console Port Speed ..............................................................................277 29.3 Log and Trace ................................................................................................278 29.3.1 Syslog Logging .....................................................................................278
Prestige 334 User’s Guide 17Table of Contents 29.3.1.1 CDR ............................................................................................279 29.3.1.2 Packet triggered ..........................................................................279 29.3.1.3 Filter log .....................................................................................280 29.3.1.4 PPP log ......................................................................................280 29.3.1.5 Firewall log ..................................................................................281 29.3.2 Call-Triggering Packet ..........................................................................281 29.4 Diagnostic ......................................................................................................282 29.4.1 WAN DHCP ..........................................................................................283 Chapter 30 Firmware and Configuration File Maintenance ................................................. 286 30.1 Filename Conventions ...................................................................................286 30.2 Backup Configuration .....................................................................................287 30.2.1 Backup Configuration ...........................................................................287 30.2.2 Using the FTP Command from the Command Line ..............................288 30.2.3 Example of FTP Commands from the Command Line .........................289 30.2.4 GUI-based FTP Clients .........................................................................289 30.2.5 TFTP and FTP over WAN Management Limitations .............................289 30.2.6 Backup Configuration Using TFTP .......................................................290 30.2.7 TFTP Command Example ....................................................................290 30.2.8 GUI-based TFTP Clients ......................................................................291 30.3 Restore Configuration ....................................................................................291 30.3.1 Restore Using FTP ...............................................................................291 30.3.2 Restore Using FTP Session Example ..................................................293 30.4 Uploading Firmware and Configuration Files .................................................293 30.4.1 Firmware File Upload ............................................................................293 30.4.2 Configuration File Upload .....................................................................294 30.4.3 FTP File Upload Command from the DOS Prompt Example ................294 30.4.4 FTP Session Example of Firmware File Upload ...................................295 30.4.5 TFTP File Upload ..................................................................................295 30.4.6 TFTP Upload Command Example ........................................................296 Chapter 31 System Maintenance............................................................................................ 298 31.1 Command Interpreter Mode ...........................................................................298 31.1.1 Command Syntax .................................................................................298 31.1.2 Command Usage ..................................................................................299 31.2 Call Control Support .......................................................................................299 31.2.1 Budget Management ............................................................................299 31.2.2 Call History ...........................................................................................300 31.3 Time and Date Setting ....................................................................................301 31.3.1 Resetting the Time ................................................................................304
Prestige 334 User’s Guide Table of Contents18 Chapter 32 Remote Management ........................................................................................... 306 32.1 Remote Management .....................................................................................306 32.1.1 Remote Management Limitations .........................................................307 Chapter 33 Call Scheduling .................................................................................................... 310 33.1 Introduction to Call Scheduling ......................................................................310 Chapter 34 VPN/IPSec Setup .................................................................................................. 314 34.1 VPN/IPSec Overview .....................................................................................314 34.2 IPSec Summary Screen .................................................................................315 34.3 IKE Setup .......................................................................................................321 34.4 Manual Setup .................................................................................................323 34.4.0.1 Active Protocol ............................................................................324 34.4.0.2 Security Parameter Index (SPI) ..................................................324 Chapter 35 SA Monitor ............................................................................................................ 326 35.1 SA Monitor Overview .....................................................................................326 35.2 Using SA Monitor ...........................................................................................326 Appendix A Troubleshooting ................................................................................................... 330 35.3 Problems with the Password ..........................................................................331 35.4 Problems with Remote Management .............................................................331 Appendix B PPPoE ................................................................................................................... 332 Appendix C PPTP ...................................................................................................................... 334 Appendix D NetBIOS Filter Commands .................................................................................. 338 Appendix E Log Descriptions .................................................................................................. 340 Appendix F Setting up Your Computer’s IP Address............................................................ 342 Appendix G Brute-Force Password Guessing Protection ..................................................... 354
Prestige 334 User’s Guide 19Table of Contents Appendix H TMSS ..................................................................................................................... 356 Appendix I Triangle Route ...................................................................................................... 360