Home > ZyXEL > Router > ZyXEL Router Prestige 334 User Manual

ZyXEL Router Prestige 334 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ZyXEL Router Prestige 334 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 ZyXEL manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Prestige 334 User’s Guide
    Chapter 34 VPN/IPSec Setup320
    Port Start0 is the default and signifies any port. Type a port number from 0 to 65535. You cannot 
    create a VPN tunnel if you try to connect using a port number that does not match this 
    port number or range of port numbers.
    Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, HTTP; 25, 
    SMTP; 110, POP3
    EndEnter a port number in this field to define a port range. This port number must be 
    greater than that specified in the previous field. This field is N/A when 0 is configured in 
    the Port Start field.
    RemoteRemote IP addresses must be static and correspond to the remote IPSec router’s con-
    figured local IP addresses. The remote fields are N/A when the Secure Gateway 
    Address field is configured to 0.0.0.0. 
    Two active SAs cannot have the local and remote IP address(es) both the same. Two 
    active SAs can have the same local or remote IP address, but not both. You can 
    configure multiple SAs between the same local and remote IP addresses, as long as 
    only one is active at any time.
    Addr TypePress [SPACE BAR] to choose SINGLE, RANGE, or SUBNET and press [ENTER]. 
    Select SINGLE with a single IP address. Use RANGE for a specific range of IP 
    addresses. Use SUBNET to specify IP addresses on a network by their subnet mask.
    IP Addr StartWhen the Addr Type field is configured to Single, enter a static IP address on the net-
    work behind the remote IPSec router.
    When the Addr Type field is configured to Range, enter the beginning (static) IP 
    address, in a range of computers on the network behind the remote IPSec router.
    When the Addr Type field is configured to SUBNET, enter a static IP address on the 
    network behind the remote IPSec router.
    This field displays N/A when you configure the Secure Gateway Address field to 
    0.0.0.0.
    End/Subnet
    MaskWhen the Addr Type field is configured to Single, this field is N/A.
    When the Addr Type field is configured to Range, enter the end (static) IP address, in 
    a range of computers on the network behind the remote IPSec router. 
    When the Addr Type field is configured to SUBNET, enter a subnet mask on the net-
    work behind the remote IPSec router.
    This field displays N/A when you configure the Secure Gateway Address field to 
    0.0.0.0.
    Port Start0 is the default and signifies any port. Type a port number from 0 to 65535. Someone 
    behind the remote IPSec router cannot create a VPN tunnel when attempting to con-
    nect using a port number that does not match this port number or range of port num-
    bers.
    Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, HTTP; 25, 
    SMTP; 110, POP3.
    EndEnter a port number in this field to define a port range. This port number must be 
    greater than that specified in the previous field. This field is N/A when 0 is configured in 
    the Port Start field.
    Table 105   Menu 27.1.1 IPSec Setup
    FIELDDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    321Chapter 34 VPN/IPSec Setup
    34.3  IKE Setup
    To edit this menu, the Key Management field in Menu 27.1.1 – IPSec Setup must be set to 
    IKE. Move the cursor to the Edit Key Management Setup field in Menu 27.1.1 – IPSec 
    Setup; press [SPACE BAR] to select Ye s and then press [ENTER] to display Menu 27.1.1.1 
    – IKE Setup.
    Enable Replay 
    DetectionAs a VPN setup is processing intensive, the system is vulnerable to Denial of Service 
    (DoS) attacks The IPSec receiver can detect and reject old or duplicate packets to pro-
    tect against replay attacks. Enable replay detection by setting this field to Ye s.
    Press [SPACE BAR] to select Ye s or No. Choose Ye s and press [ENTER] to enable 
    replay detection.
    Key 
    ManagementPress [SPACE BAR] to choose either IKE or Manual and then press [ENTER]. Manual 
    is useful for troubleshooting if you have problems using IKE key management.
    Edit Key 
    Management 
    SetupPress [SPACE BAR] to change the default No to Ye s and then press [ENTER] to go to 
    a key management menu for configuring your key management setup (described 
    later). If you set the Key Management field to IKE, this will take you to Menu 27.1.1.1 
    – IKE Setup. If you set the Key Management field to Manual, this will take you to 
    Menu 27.1.1.2 – Manual Setup.
    When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to 
    save your configuration, or press [ESC] at any time to cancel.
    Table 105   Menu 27.1.1 IPSec Setup
    FIELDDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    Chapter 34 VPN/IPSec Setup322
    Figure 180   Menu 27.1.1.1 IKE Setup
    The following table describes the fields in this menu.
        Menu 27.1.1.1 - IKE Setup
          Phase 1
            Negotiation Mode= Main
            Pre-Shared Key= ?
            Encryption Algorithm= DES
            Authentication Algorithm= MD5
            SA Life Time (Seconds)= 28800
            Key Group= DH1
          Phase 2
            Active Protocol= ESP
            Encryption Algorithm= DES
            Authentication Algorithm= SHA1
            SA Life Time (Seconds)= 28800
            Encapsulation= Tunnel
            Perfect Forward Secrecy (PFS)= None
                        Press ENTER to Confirm or ESC to Cancel:
    Press Space Bar to Toggle.
    Table 106   Menu 27.1.1.1 IKE Setup
    FIELDDESCRIPTION
    Phase 1
    Negotiation
    ModePress [SPACE BAR] to choose from Main or Aggressive and then press [ENTER]. 
    See earlier for a discussion of these modes. Multiple SAs connecting through a 
    secure gateway must have the same negotiation mode. 
    PSKPrestige gateways authenticate an IKE VPN session by matching pre-shared keys. 
    Pre-shared keys are best for small networks with fewer than ten nodes. Enter your 
    pre-shared key here. Enter up to 31 characters. Any character may be used, includ-
    ing spaces, but trailing spaces are truncated. 
    Both ends of the VPN tunnel must use the same pre-shared key. You will receive a 
    “PYLD_MALFORMED” (payload malformed) packet if the same pre-shared key is 
    not used on both ends.
    Encryption 
    AlgorithmWhen DES is used for data communications, both sender and receiver must know 
    the same secret key, which can be used to encrypt and decrypt the message or to 
    generate and verify a message authentication code. Prestige DES encryption algo-
    rithm uses a 56-bit key.
    Triple DES (3DES), is a variation on DES that uses a 168-bit key. As a result, 3DES 
    is more secure than DES. It also requires more processing power, resulting in 
    slightly increased latency and decreased throughput.
    Press [SPACE BAR] to choose from 3DES or DES and then press [ENTER]. 
    						
    							Prestige 334 User’s Guide
    323Chapter 34 VPN/IPSec Setup
    34.4  Manual Setup
    You only configure Menu 27.1.1.2 – Manual Setup when you select Manual in the Key 
    Management field in Menu 27.1.1 – IPSec Setup. Manual key management is useful if you 
    have problems with IKE key management.
    Authentication
    AlgorithmMD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms 
    used to authenticate packet data. The SHA1 algorithm is generally considered stron-
    ger than MD5, but is slightly slower.
    Press [SPACE BAR] to choose from SHA1 or MD5 and then press [ENTER].
    SA Life Time
    (Seconds)Define the length of time before an IKE Security Association automatically renegoti-
    ates in this field. It may range from 60 to 3,000,000 seconds (almost 35 days).
    A short SA Life Time increases security by forcing the two VPN gateways to update 
    the encryption and authentication keys. However, every time the VPN tunnel 
    renegotiates, all users accessing remote resources are temporarily disconnected. 
    Key GroupYou must choose a key group for phase 1 IKE setup. DH1 (default) refers to Diffie-
    Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 
    1024 bit (1Kb) random number. 
    Phase 2
    Active ProtocolPress [SPACE BAR] to choose from ESP or AH and then press [ENTER]. See 
    earlier for a discussion of these protocols.
    Encryption
    AlgorithmPress [SPACE BAR] to choose from NULL, 3DES or DES and then press [ENTER]. 
    Select NULL to set up a tunnel without encryption.
    Authentication
    AlgorithmPress [SPACE BAR] to choose from SHA1 or MD5 and then press [ENTER].
    SA Life Time
    (Seconds)Define the length of time before an IPSec Security Association automatically 
    renegotiates in this field. It may range from 60 to 3,000,000 seconds (almost 35 
    days).
    EncapsulationPress [SPACE BAR] to choose from Tu n n e l  mode or Transport mode and then 
    press [ENTER]. See earlier for a discussion of these.
    Perfect Forward
    Secrecy (PFS)Perfect Forward Secrecy (PFS) is disabled (None) by default in phase 2 IPSec SA 
    setup. This allows faster IPSec setup, but is not so secure. Press [SPACE BAR] and 
    choose from DH1 or DH2 to enable PFS. DH1 refers to Diffie-Hellman Group 1 a 768 
    bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random 
    number (more secure, yet slower). 
    When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to 
    save your configuration, or press [ESC] at any time to cancel.
    Table 106   Menu 27.1.1.1 IKE Setup
    FIELDDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    Chapter 34 VPN/IPSec Setup324
    34.4.0.1  Active Protocol
    This field is a combination of mode and security protocols used for the VPN. See the Web 
    Configurator part on VPN for more information on these parameters. 
    34.4.0.2  Security Parameter Index (SPI)
    To edit this menu, move the cursor to the Edit Manual Setup field in Menu 27.1.1 – IPSec 
    Setup press [SPACE BAR] to select Ye s and then press [ENTER] to go to Menu 27.1.1.2 – 
    Manual Setup.
    Figure 181   Menu 27.1.1.2 Manual Setup
    The following table describes the fields in this menu.
    Table 107   Active Protocol: Encapsulation and Security Protocol
    MODESECURITY PROTOCOL
    TunnelESP
    TransportAH
                   
          Menu 27.1.1.2 – Manual Setup
    Active Protocol= ESP Tunnel
    ESP Setup
      SPI (Decimal)= 
      Encryption Algorithm= DES
        Key1=
        Key2= N/A
        Key3= N/A
      Authentication Algorithm= MD5 
        Key= N/A
        
    AH Setup
      SPI (Decimal)= N/A
      Authentication Algorithm= N/A
        Key=
          Press ENTER to Confirm or ESC to Cancel:
    Table 108   Menu 27.1.1.2 Manual Setup
    FIELDDESCRIPTION
    Active ProtocolPress [SPACE BAR] to choose from ESP Tunnel, ESP Transport, AH Tunnel or AH 
    Transport and then press [ENTER]. Choosing an ESP combination causes the AH 
    Setup fields to be non-applicable (N/A)
    ESP SetupThe ESP Setup fields are N/A if you chose an AH Active Protocol.
    SPI (Decimal)The SPI must be unique and from one to four integers (0 to 9).  
    						
    							Prestige 334 User’s Guide
    325Chapter 34 VPN/IPSec Setup
    Encryption
    AlgorithmPress [SPACE BAR] to choose from NULL, 3DES or DES and then press [ENTER]. 
    Fill in the Key1 field below when you choose DES and fill in fields Key1 to Key3 when 
    you choose 3DES. Select NULL to set up a tunnel without encryption. When you 
    select NULL, you do not enter any encryption keys.
    Key1Enter a unique eight-character key. Any character may be used, including spaces, but 
    trailing spaces are truncated.
    Fill in the Key1 field when you choose DES and fill in fields Key1 to Key3 when you 
    choose 3DES.
    Key2Enter a unique eight-character key. It can be comprised of any character including 
    spaces (but trailing spaces are truncated).
    Key3Enter a unique eight-character key. It can be comprised of any character including 
    spaces (but trailing spaces are truncated).
    Authentication
    AlgorithmPress [SPACE BAR] to choose from MD5 or SHA1 and then press [ENTER]. 
    KeyEnter the authentication key to be used by IPSec if applicable. The key must be 
    unique. Enter 16 characters for MD5 authentication and 20 characters for SHA-1 
    authentication. Any character may be used, including spaces, but trailing spaces are 
    truncated.
    AH SetupThe AH Setup fields are N/A if you chose an ESP Active Protocol.
    SPI (Decimal)The SPI must be from one to four unique decimal characters (0 to 9) long.
    Authentication
    AlgorithmPress [SPACE BAR] to choose from MD5 or SHA1 and then press [ENTER].
    KeyEnter the authentication key to be used by IPSec if applicable. The key must be 
    unique. Enter 16 characters for MD5 authentication and 20 characters for SHA-1 
    authentication. Any character may be used, including spaces, but trailing spaces are 
    truncated.
    When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to 
    save your configuration, or press [ESC] at any time to cancel.
    Table 108   Menu 27.1.1.2 Manual Setup
    FIELDDESCRIPTION 
    						
    							Prestige 334 User’s Guide
    Chapter 35 SA Monitor326
    CHAPTER35
    SA Monitor
    This chapter teaches you how to manage your SAs by using the SA Monitor in SMT menu 
    27.2.
    35.1  SA Monitor Overview
    A Security Association (SA) is the group of security settings related to a specific VPN tunnel. 
    This menu (shown next) displays active VPN connections. 
    35.2  Using SA Monitor
    1. Use the Refresh function to display active VPN connections.
    2. Use the Disconnect function to cut off active connections.
    3. Type 2 in Menu 27 - VPN/IPSec Setup, and then press [ENTER] to go to Menu 
    27.2 - SA Monitor.
    Note: When there is outbound traffic but no inbound traffic, the SA 
    times out automatically after two minutes. A tunnel with no outbound 
    or inbound traffic is idle and does not timeout until the SA lifetime 
    period expires. See the Web configurator part on keep alive to have 
    the Prestige renegotiate an IPSec SA when the SA lifetime expires, 
    even if there is no traffic. 
    						
    							Prestige 334 User’s Guide
    327Chapter 35 SA Monitor
    Figure 182   Menu 27.2 SA Monitor
    The following table describes the fields in this menu.
                              Menu 27.2 - SA Monitor
    #
    ---
    001
    002
    003
    004
    005
    006
    007
    008
    009
    010
    Name
    --------------------------------
    Taiwan : 3.3.3.1 – 3.3.3.3.100
      Encap.
    ---------
    Tunnel
    IPSec ALgorithm
    ----------------
    ESP DES MD5
                              Select Command= Refresh
                              Select Connection= N/A
    Press ENTER to Confirm or ESC to Cancel:
    Table 109   Menu 27.2 SA Monitor
    FIELDDESCRIPTION
    #This is the security association index number.
    NameThis field displays the identi fication name for this VPN policy. This name is unique for 
    each connection where the secure gateway IP address is a public static IP address. 
    When the secure gateway IP address is 0.0. 0.0 (as discussed in the last chapter), there 
    may be different connections using this same VPN rule. In this case, the name is followed 
    by the remote IP address as configured in  Menu 27.1.1. – IPSec Setup. Individual 
    connections using the same VPN rule may be terminated without affecting other 
    connections using the same rule.
    Encap.This field displays  Tu n n e l  mode or  Tr a n s p o r t   mode. See previous for discussion.
    IPSec
    ALgorithmThis field displays the security protocols used for an SA.  ESP provides confidentiality and 
    integrity of data by encrypting the data and  encapsulating it into IP packets. Encryption 
    methods include 56-bit  DES and 168-bit  3DES. NULL  denotes a tunnel without encryp-
    tion.
    An incoming SA may have an  AH in addition to  ESP. The Authentication Header provides 
    strong integrity and authentic ation by adding authentication information to IP packets. 
    This authentication information is calculated using header and payload data in the IP 
    packet. This provides an additional level of security.  AH choices are  MD5 (default  - 128 
    bits) and  SHA -1(160 bits).
    Both AH and  ESP increase Prestige processing requirements and communications 
    latency (delay). 
    						
    							Prestige 334 User’s Guide
    Appendix A Troubleshooting330
    Appendix A
    Troubleshooting
    This chapter covers potential problems and possible remedies. After each problem description, 
    some instructions are provided to help you to diagnose and to solve the problem. Please see 
    our included disk for further information.
    Table 110   Troubleshooting
    PROBLEMCORRECTIVE ACTION
    None of the LEDs turn on 
    when you turn on the 
    Prestige.Make sure that you have the correct power adapter connected to the 
    Prestige and plugged in to an appropriate power source. Check all cable 
    connections.If the LEDs still do not turn on, you may have a hardware 
    problem. In this case, you should contact your local vendor.
    Cannot access the Prestige 
    from the LAN.Check the cable connection between the Prestige and your computer or 
    hub. Refer to the Rear Panel section for details. Ping the Prestige from a 
    LAN computer. Make sure your computer Ethernet card is installed and 
    functioning properly.
    Cannot ping any computer 
    on the LAN.If the 10/100M LAN LEDs are off, check the cable connections between 
    the Prestige and your LAN computers.Verify that the IP address and 
    subnet mask of the Prestige and the LAN computers are in the same IP 
    address range.
    Cannot get a WAN IP 
    address from the ISP.The WAN IP is provided after the ISP verifies the MAC address, host 
    name or user ID.Find out the verification method used by your ISP and 
    configure the corresponding fields.
    If the ISP checks the WAN MAC address, you should clone the MAC 
    address from a LAN computer. Click WAN and then the MAC tab, select 
    Spoof this Computers MAC address - IP Address and enter the IP 
    address of the computer on the LAN whose MAC address you are 
    cloning. 
    If the ISP checks the host name, enter your computer’s name (refer to the 
    Wizard Setup section in the User’s Guide) in the System Name field in the 
    first screen of the WIZARD.
    If the ISP checks the user ID, click WAN and then the ISP tab. Check your 
    service type, user name, and password.
    Cannot access the Internet.Check the Prestige’s connection to the cable/DSL device.
    Check whether your cable/DSL device requires a crossover or straight-
    through cable.
    Click WAN to verify your settings.
    Access to a restricted web 
    page is not blocked.Make sure that the Enable Parental Control check box is selected in the 
    Parental Control screen.
    Make sure that you select a category in the Parental Control screen to 
    restrict access to web pages relevant to that category. For example, 
    select the Gambling check box to prevent access to 
    www.onlinegambling.com.
    Make sure that the Blocking Schedule configured in the Parental Control 
    screen restricts access at the scheduled time. 
    						
    							Prestige 334 User’s Guide
    331Appendix A Troubleshooting
    35.3  Problems with the Password
    35.4  Problems with Remote Management
    Access to a web page with 
    a URL containing a 
    forbidden keyword is not 
    blocked.Make sure that you select the Keyword Blocking check box in the Content 
    Filtering screen. Make sure that the keywords that you type are listed in 
    the Keyword List. 
    If a keyword that is listed in the Keyword List is not blocked when it is 
    found in a URL, customize the keyword blocking using commands. See 
    the Customizing Keyword Blocking URL Checking section in the Content 
    Filter chapter.
    Parental Control is 
    configured correctly, but I 
    can still access restricted 
    web pages.Restart the device to clear the cache.
    The content filter server may be unavailable. The View Logs screen can 
    display content filtering log messages. See the Log Descriptions 
    appendix for a list of possible log messages. In the View Logs screen 
    copy and paste the log messages and e-mail them to customer support 
    with an explanation of the problem.
    If you still have problems, contact your vendor or customer support for 
    further advice.
    Table 110   Troubleshooting
    PROBLEMCORRECTIVE ACTION
    Table 111   Troubleshooting the Password
    PROBLEMCORRECTIVE ACTION
    Cannot access the 
    Prestige. The password field is case sensitive. Make sure that you enter the correct 
    password using the proper casing.
    Use the Reset button to restore the factory default configuration file. This will 
    restore all of the factory defaults including the password, see Chapter 2 
    Introducing the Web Configurator for details.
    Table 112   Troubleshooting Telnet
    PROBLEMCORRECTIVE ACTION
    Cannot access the 
    Prestige from the 
    LAN or WAN.Refer to “Remote Management Limitations in Chapter 16 Remote Management 
    Screens for scenarios when remote management may not be possible. 
    When NAT is enabled:
    • Use the Prestiges WAN IP address when configuring from the WAN. 
    • Use the Prestiges LAN IP address when configuring from the LAN. 
    						
    All ZyXEL manuals Comments (0)

    Related Manuals for ZyXEL Router Prestige 334 User Manual