ZyXEL Router Prestige 334 User Manual
Have a look at the manual ZyXEL Router Prestige 334 User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 3 ZyXEL manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Prestige 334 User’s Guide Appendix F Setting up Your Computer’s IP Address 352 • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3For dynamically assigned settings, select Using DHCP from the Configure list. Figure 200 Macintosh OS X: Network 4For statically assigned settings, do the following: •From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box. 5Click Apply Now and close the window. 6Turn on your Prestige and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
Prestige 334 User’s Guide 353 Appendix F Setting up Your Computer’s IP Address
Prestige 334 User’s Guide Appendix G Brute-Force Password Guessing Protection 354 Appendix G Brute-Force Password Guessing Protection The following describes the commands for enabling, disabling and configuring the brute-force password guessing protection mechanism for the password. Example sys pwderrtm 5 This command sets the password protection to block all access attempts for five minutes after the third time an incorrect password is entered. Table 118 Brute-Force Password Guessing Protection Commands COMMANDDESCRIPTION sys pwderrtm This command displays the brute-force guessing password protection settings. sys pwderrtm 0This command turns off the password’s protection from brute-force guessing. The brute-force password guessing protection is turned off by default. sys pwderrtm NThis command sets the password protection to block all access attempts for N (a number from 1 to 60) minutes after the third time an incorrect password is entered.
Prestige 334 User’s Guide 355 Appendix G Brute-Force Password Guessing Protection
Prestige 334 User’s Guide Appendix H TMSS356 Appendix H TMSS This appendix discusses Trend Micro Security Services setup and access. Please see your TMSS user guide for more information. To view the TMSS dashboard, follow the steps below. 1Click TMSS under ADVANCED in the web configurator. 2Select the Service Settings tab. 3Select the Enable Trend Micro Security Services check box. 4Click Apply to save your settings. Figure 201 Enable TMSS 5After you successfully configure your Prestige to connect to the Internet, open your web browser and enter a URL. 6A web page automatically appears allowing you to download ActiveX control from the Trend Micro website. ActiveX control should be downloaded to each computer in your network. The TMSS Web page may not appear when you enable TMSS if you are using instant messaging software other than MSN Messenger, for example, ICQ or you have installed software that blocks pop-up browsers, for example, a Google toolbar or Windows XP Service Pack. You must disable the SP2 pop-up blocker or type the URL http://tmss.trendmicro.com to view the TMSS Web page and manually start the Active X control installation. Once the TMSS Active X control has been installed, access the TMSS Web page by clicking the Internet Explorer TMSS toolbar icon or launch “Trend Micro Security Services” from the Windows Start menu. Note: Make sure that you have not restricted access to ActiveX, Cookies or Web Proxy features in the Advanced Firewall Filter screen. If you restrict Web access to these features you will not be able to use TMSS. Note: The following screens appear only when you first access the Internet with TMSS enabled on your Prestige.
Prestige 334 User’s Guide 357Appendix H TMSS Figure 202 TMSS Welcome Screen 7Click Continue>> to proceed to download ActiveX control. Figure 203 Download ActiveX Control 8Select Yes to install and run ActiveX control. 9Once the installation is complete the Home Network Security Services dashboard appears. From this screen you can take advantage of all TMSS features. Note: The following screen appears when you • Click the Trend Micro icon on your Web browser tool bar • Click the Security Services link in your Windows Start menu • Set a display interval timing in your Prestige TMSS Service Settings configuration screen.
Prestige 334 User’s Guide Appendix H TMSS358 Figure 204 Home Network Security Services Dashboard 10 See the Trend Micro User’s Guide for information on TMSS.
Prestige 334 User’s Guide Appendix I Triangle Route360 Appendix I Triangle Route The Ideal Setup When the firewall is on, your Prestige acts as a secure gateway between your LAN and the Internet. In an ideal network topology, all incoming and outgoing network traffic passes through the Prestige to protect your LAN against attacks. Figure 205 Ideal Setup The “Triangle Route” Problem A traffic route is a path for sending or receiving data packets between two Ethernet devices. Some companies have more than one alternate route to one or more ISPs. If the LAN and ISP(s) are in the same subnet, the “triangle route” problem may occur. The steps below describe the “triangle route” problem. 1A computer on the LAN initiates a connection by sending out a SYN packet to a receiving server on the WAN. 2The Prestige reroutes the SYN packet through Gateway B on the LAN to the WAN. 3The reply from the WAN goes directly to the computer on the LAN without going through the Prestige. As a result, the Prestige resets the connection, as the connection has not been acknowledged.
Prestige 334 User’s Guide 361Appendix I Triangle Route Figure 206 “Triangle Route” Problem The “Triangle Route” Solutions This section presents you two solutions to the “triangle route” problem. IP Aliasing IP alias allows you to partition your network into logical sections over the same Ethernet interface. Your Prestige supports up to three logical LAN interfaces with the Prestige being the gateway for each logical network. By putting your LAN and Gateway B in different subnets, all returning network traffic must pass through the Prestige to your LAN. The following steps describe such a scenario. 1A computer on the LAN initiates a connection by sending a SYN packet to a receiving server on the WAN. 2The Prestige reroutes the packet to Gateway B, which is in the 192.168.2.1 to 192.168.2.24 subnet. 3The reply from WAN goes through the Prestige to the computer on the LAN in the 192.168.1.1 to 192.168.1.24 subnet.