Home > ZyXEL > Router > ZyXEL Router Prestige 334 User Manual

ZyXEL Router Prestige 334 User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ZyXEL Router Prestige 334 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 ZyXEL manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							Prestige 334 User’s Guide
    Appendix F Setting up Your Computer’s IP Address 352
    • Select Built-in Ethernet from the Show list. 
    • Click the TCP/IP tab.
    3For dynamically assigned settings, select Using DHCP from the Configure list.
    Figure 200   Macintosh OS X: Network
    4For statically assigned settings, do the following:
    •From the Configure box, select Manually.
    • Type your IP address in the IP Address box.
    • Type your subnet mask in the Subnet mask box.
    • Type the IP address of your Prestige in the Router address box.
    5Click Apply Now and close the window.
    6Turn on your Prestige and restart your computer (if prompted).
    Verifying Settings
    Check your TCP/IP properties in the Network window. 
    						
    							Prestige 334 User’s Guide
    353 Appendix F Setting up Your Computer’s IP Address 
    						
    							Prestige 334 User’s Guide
    Appendix G Brute-Force Password Guessing Protection 354
    Appendix G
    Brute-Force Password Guessing
    Protection
    The following describes the commands for enabling, disabling and configuring the brute-force 
    password guessing protection mechanism for the password. 
    Example
    sys pwderrtm 5
    This command sets the password protection to block all access attempts for five minutes after 
    the third time an incorrect password is entered.
    Table 118   Brute-Force Password Guessing Protection Commands
    COMMANDDESCRIPTION
    sys pwderrtm This command displays the brute-force guessing password protection settings. 
    sys pwderrtm 0This command turns off the password’s protection from brute-force guessing. The 
    brute-force password guessing protection is turned off by default.
    sys pwderrtm NThis command sets the password protection to block all access attempts for N (a 
    number from 1 to 60) minutes after the third time an incorrect password is entered. 
    						
    							Prestige 334 User’s Guide
    355 Appendix G Brute-Force Password Guessing Protection 
    						
    							Prestige 334 User’s Guide
    Appendix H TMSS356
    Appendix H
    TMSS
    This appendix discusses Trend Micro Security Services setup and access. Please see your 
    TMSS user guide for more information.
    To view the TMSS dashboard, follow the steps below.
    1Click TMSS under ADVANCED in the web configurator.
    2Select the Service Settings tab.
    3Select the Enable Trend Micro Security Services check box.
    4Click Apply to save your settings.
    Figure 201   Enable TMSS 
    5After you successfully configure your Prestige to connect to the Internet, open your web 
    browser and enter a URL.
    6A web page automatically appears allowing you to download ActiveX control from the 
    Trend Micro website. ActiveX control should be downloaded to each computer in your 
    network.
    The TMSS Web page may not appear when you enable TMSS if you are using instant 
    messaging software other than MSN Messenger, for example, ICQ or you have installed 
    software that blocks pop-up browsers, for example, a Google toolbar or Windows XP Service 
    Pack.
    You must disable the SP2 pop-up blocker or type the URL http://tmss.trendmicro.com to view 
    the TMSS Web page and manually start the Active X control installation. Once the TMSS 
    Active X control has been installed, access the TMSS Web page by clicking the Internet 
    Explorer TMSS toolbar icon or launch “Trend Micro Security Services” from the Windows 
    Start menu. 
    Note: Make sure that you have not restricted access to ActiveX, 
    Cookies or Web Proxy features in the Advanced Firewall Filter 
    screen. If you restrict Web access to these features you will not 
    be able to use TMSS.
    Note: The following screens appear only when you first access the 
    Internet with TMSS enabled on your Prestige.  
    						
    							Prestige 334 User’s Guide
    357Appendix H TMSS
    Figure 202   TMSS Welcome Screen
    7Click Continue>> to proceed to download ActiveX control.
    Figure 203   Download ActiveX Control
    8Select Yes to install and run ActiveX control.
    9Once the installation is complete the Home Network Security Services dashboard 
    appears. From this screen you can take advantage of all TMSS features.
    Note: The following screen appears when you
    • Click the Trend Micro icon on your Web browser tool bar
    • Click the Security Services link in your Windows Start menu  
    • Set a display interval timing in your Prestige TMSS Service 
    Settings configuration screen. 
    						
    							Prestige 334 User’s Guide
    Appendix H TMSS358
    Figure 204   Home Network Security Services Dashboard
    10  See the Trend Micro User’s Guide for information on TMSS. 
    						
    							Prestige 334 User’s Guide
    359Appendix H TMSS 
    						
    							Prestige 334 User’s Guide
    Appendix I Triangle Route360
    Appendix I
    Triangle Route
    The Ideal Setup 
    When the firewall is on, your Prestige acts as a secure gateway between your LAN and the 
    Internet. In an ideal network topology, all incoming and outgoing network traffic passes 
    through the Prestige to protect your LAN against attacks.
    Figure 205   Ideal Setup
    The “Triangle Route” Problem
    A traffic route is a path for sending or receiving data packets between two Ethernet devices. 
    Some companies have more than one alternate route to one or more ISPs. If the LAN and 
    ISP(s) are in the same subnet, the “triangle route” problem may occur. The steps below 
    describe the “triangle route” problem. 
    1A computer on the LAN initiates a connection by sending out a SYN packet to a 
    receiving server on the WAN.
    2The Prestige reroutes the SYN packet through Gateway B on the LAN to the WAN. 
    3The reply from the WAN goes directly to the computer on the LAN without going 
    through the Prestige. 
    As a result, the Prestige resets the connection, as the connection has not been acknowledged. 
    						
    							Prestige 334 User’s Guide
    361Appendix I Triangle Route
    Figure 206   “Triangle Route” Problem
    The “Triangle Route” Solutions
    This section presents you two solutions to the “triangle route” problem. 
    IP Aliasing 
    IP alias allows you to partition your network into logical sections over the same Ethernet 
    interface. Your Prestige supports up to three logical LAN interfaces with the Prestige being the 
    gateway for each logical network. By putting your LAN and Gateway B in different subnets, 
    all returning network traffic must pass through the Prestige to your LAN. The following steps 
    describe such a scenario.
    1A computer on the LAN initiates a connection by sending a SYN packet to a receiving 
    server on the WAN. 
    2The Prestige reroutes the packet to Gateway B, which is in the 192.168.2.1 to 
    192.168.2.24 subnet. 
    3The reply from WAN goes through the Prestige to the computer on the LAN in the 
    192.168.1.1 to 192.168.1.24 subnet.  
    						
    All ZyXEL manuals Comments (0)

    Related Manuals for ZyXEL Router Prestige 334 User Manual