ZyXEL Communications P-334WT Technické informace

Procházejte online nebo si stáhněte Technické informace pro Sítě ZyXEL Communications P-334WT. ZyXEL Communications P-334WT System information Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 295
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - P-334WT Support Notes

P-334WT Support NotesV360(JN0)Last Update: October 8, 2004FAQ- ZyNOS FAQ- Product FAQ- Firewall FAQ- Content Filtering FAQ- VPN FAQ- Wireless FAQAppli

Strany 2 - ZyNOS FAQ

10. What network interface does the Prestige support?The Prestige supports 10/100M Ethernet to connect to the computer and 10M Ethernet to connect to

Strany 3

4. On the opposite side, your partner select Accept to accept your conversation request.

Strany 4

5. Finally, your video conversation is achieved.

Strany 5

3. View dynamic ports opened by UPnPWhen using UPnP, if the ZyXEL device is configured as "Allow users to make configuration changes through UPnP

Strany 6

ras> ip nat server dispServer Set: 1Rule name Svr P Range Server IP LeasedTime Active protocol Int Svr P Range

Strany 8

Filter ● How does ZyXEL filter work?● Filter Examples❍ A filter for blocking the web service❍ A Filter for blocking the FTP connection

Strany 9

Filter How does ZyXEL filter work? ● Filter Structure The P-334WT allows you to configure up to twelve filter sets with six rules in each set, for

Strany 10

● Filter Types and SUAConceptually, there are two categories of filter rules: device and protocol. The Generic filter rules belong to the device c

Strany 11

Generic and TCP/IP (and IPX) filter rules are in different filter sets. The SMT will detect and prevent the mixing of different category rules within

Strany 12

Menu 21.1.2 - TCP/IP Filter Rule Filter #: 1,2 Filter Type= TCP/IP Filter Rule

Strany 13

1. WinGate is a software only solution that needs to be installed in a dedicated Windows 95 PC based server. The total cost and complexity are many t

Strany 14

Menu 11.1 - Remote Node ProfileRem Node Name= LAN Route= IPActive= Yes Bridge= NoE

Strany 15

In order to avoid operational problems later, the P-334WT will disable its routing/bridging functions if there is an inconsistency among its filter ru

Strany 16

Filter Example A filter for blocking the web service ● ConfigurationBefore configuring a filter, you need to know the following information: 1. Th

Strany 17

Menu 21 - Filter Set Configuration Filter Filter Set # Comments S

Strany 18

Action Matched= Drop Action Not Matched= Check Next Rule Press ENTER to Confirm or ESC to

Strany 19

Menu 21.1.2 - TCP/IP Filter Rule Filter #: 1,2 Filter Type= TCP/IP Filter Rule

Strany 20

Menu 11.5 - Remote Node Filter Input Filter Sets: protocol filters=

Strany 21 - Firewall FAQ

Filter Example A filter for blocking the FTP connections from WAN● IntroductionThe P-334WT supports the firmware and configuration files upload us

Strany 22

Menu 21 - Filter Set Configuration Filter Filter Set # Comments S

Strany 23

IP Mask= 0.0.0.0 Port #= Port # Comp= None

Strany 24

19. What to do when when Prestige response nothing via console ? When Prestige responses nothing on your terminal (e.g. embedded HyperTerminal), pleas

Strany 25

Menu 21.4 - Filter Rules Summary # A Type Filter Rules M m n - - ---- --------------------------

Strany 26

Filter Example A filter for blocking a specific client Configuration1. Create a filter set in Menu 21, e.g., set 1 Menu 21 - Fi

Strany 27

Menu 21.1.1 - TCP/IP Filter Rule Filter #: 1,1 Filter Type= TCP/IP Filter Rule

Strany 28

Menu 11.5 - Remote Node Filter Input Filter Sets: protocol filters=

Strany 29

Filter Example A filter for blocking a specific MAC address This configuration example shows you how to use a Generic Filter to block a specific MAC a

Strany 30

The detailed format of the Ethernet Version II: + Ethernet Version II - Address: 00-80-C8-4C-EA-63 (Source MAC) ----> 00-A0-C5-23-45 (Des

Strany 31

TIME: 37c060 enet0-RECV len:74 call=0 0000: [00 a0 c5 01 23 45] [00 80 c8 4c ea 63] 08 00 45 00 0010: 00 3c eb 0c 00 00 20 01 e3 ea ca 84 9b 5d

Strany 32

case, we intent to set to 'ffffffffffff' to mask the incoming source MAC address, [00 80 c8 4c ea 63]. ● Value (in hexadecimal)Specify t

Strany 33

Menu 3.1 - General Ethernet Setup Input Filter Sets: protocol filters=

Strany 34 - Content Filter FAQ

Filter Example A filter for blocking the NetBIOS packets ● IntroductionThe NETBIOS protocol is used to share a Microsoft comupter of a workgroup.

Strany 35 - IPSec FAQ

starting with how fast your PC can handle IP traffic, then how fast your PC to cable modem interface is, then how fast the cable modem system runs and

Strany 36

Menu 21 - Filter Set Configuration Filter Filter Set # Comments S

Strany 37

Press ENTER to Confirm or ESC to Cancel: ● Rule 2-Destination port number 137 with protocol number 17 (UDP)

Strany 38

Menu 21.1.3 - TCP/IP Filter Rule Filter #: 1,3 Filter Type= TCP/IP Filter Rule

Strany 39

Port # Comp= None TCP Estab= N/A More= No Log= None

Strany 40

Menu 21.1.6 - TCP/IP Filter Rule Filter #: 1,6 Filter Type= TCP/IP Filter Rule

Strany 41

● Apply the first filter set 'NetBIOS_WAN' to the 'Output Protocol Filter' in menu 11.5 for activating it.

Strany 42 - Wireless FAQ

TCP Estab= No More= No Log= None Action Matched= Drop Action

Strany 43

Menu 21.2 - Filter Rules Summary # A Type Filter Rules M m n - - ---- -------------------------------

Strany 44

Setting Up the Syslog ● Prestige Setup● UNIX SetupThe Prestige is able to send four types of system log to a Syslog deamon such as Unix Syslog

Strany 45

2. Edit the file /etc/syslog.conf by adding the following line at the end of the /etc/syslog.conf file. local1.* /var/log/zyxel.logWhere

Strany 46 - What is Ad Hoc mode ?

If you are not able to get the Internet IP from the ISP, check which authentication method your ISP uses and troubleshoot the problem as described bel

Strany 47

Network Management Using SNMP 1. SNMP Overview The Simple Network Management Protocol (SNMP) is an applications-layer protocol used to exchange the ma

Strany 48

The Internet Management Model is as shown in figure 1. Interactions between the NMS and managed devices can be any of four different types of commands

Strany 49

2. ZyXEL SNMP Implementation ZyXEL currently includes SNMP support in some Prestige routers. It is implemented based on the SNMPv1, so it will be abl

Strany 50

If the machine coldstarts, the trap will be sent after booting. 2. warmStart (defined in RFC-1215) :If the machine warmstarts, the trap will be sent

Strany 51

3. Configure the Prestige for SNMP The SNMP related settings in Prestige are configured in menu 22, SNMP Configuration. The following steps describe

Strany 52 - Internet Connection

Menu 22 - SNMP Configuration SNMP: Get Community= public Set Communi

Strany 53

Using the Dynamic DNS (DDNS) ● What is DDNS?The DDNS service, an IP Registry provides a public central database where information such as email ad

Strany 54

Menu 1 - General Setup System Name= P-334WT Domain Name= First System DNS Server= From

Strany 55

Service ProviderEnter the DDNS server in this field. Currently, we support WWW.DYNDNS.ORG.Active Toggle to 'Yes'.HostEnter the hostname you

Strany 56

Using IP Alias ● What is IP Alias ?In a typical environment, a LAN router is required to connect two local networks. The Prestige supports to conn

Strany 57

Menu 1 - General SetupSystem Name= zyxelKey Setting:● System Name=, The system name must be the same as the PC's computer name.3. Your IS

Strany 58

Copyright (c) 1994 - 1999 ZyXEL Communications Corp. ras> ip ro st Dest FF Len Interface Gateway Metric stat Timer Use 192.168

Strany 59 - ● What is PPTP Client?

TCP/IP SetupEnter the first LAN IP address for the Prestige. This will create the first route in the enif0 interface.Edit IP Alias Toggle to 'Yes

Strany 60

Using FTP to Upload the Firmware and Configuration FilesIn addition to upload the firmware and configuration file via the console port and TFTP client

Strany 61

ftp: 924512 bytes sent in 4.83Seconds 191.41Kbytes/sec.ftp>Here, the 'p312.bin' is the local file and 'ras' is the remote file

Strany 62 - Using Multi-NAT

2. Press 'OK' to ignore the 'Username' prompt.3. To upload the firmware file, we transfer the local 'ras' file to overwr

Strany 63 - ● NAT Mapping Types

4.The Prestige reboots automatically after the uploading is finished. All contents copyright (c) 2004 ZyXEL Communications Corporation.

Strany 64

Firmware/Configurations Uploading and Downloading using TFTP ● Using TFTP client software● Using TFTP command on Windows NT● Using TFTP co

Strany 65 - ● SMT Menus

The 192.168.1.1 is the IP address of the Prestige. The local file is the source file of the ZyNOS firmware that is available in your hard disk. The re

Strany 66

1. TELNET to your Prestige first before using TFTP command2. Type the CI command 'sys stdio 0' to disable console idle timeout in Menu 24.

Strany 67

[cppwu@faelinux cppwu]$ telnet 192.168.1.1 Trying 192.168.1.1... Connected to 192.168.1.1. Escape character is '^]'. Password: ****

Strany 68

● Service Type...Currently, there are two authentication types that Road Runner supports, RR-TAS and RR-Manager. Choose the correct one for yo

Strany 69

5. Backup Configuration6. Restore Configuration7. Firmware Upload8. Command Interpreter Mode9. Call Control10. Time and Date Setting11. Remote Managem

Strany 70

Using Traffic Redirect ● What is Traffic Redirect ?● How to deploy backup gateway?● Are you using Prestige family?● What is Traffic Re

Strany 71

Traffic Redirect on LAN port● Traffic Redirect SetupConfigure parameters that determine when Prestige will forward WAN traffic to the backup gatew

Strany 72 - ● NAT Server Sets

Fail ToleranceSpecify the number of times your Prestige may attempt and fail to connect to Internet before triggering traffic redirect connection.Peri

Strany 73

VPN Application Notes● Using P-334WT IPSec VPN P-334WT to ZyWALL Tunneling Suecure Gateway with Dynamic WAN IP Address Configure N

Strany 74 - ● Examples

P-334WT to ZyWALL Tunneling 1. Setup P-334WT2. Setup ZyWALL3. Troubleshooting4. View LogThis page guides us to setup a VPN connection between P-33

Strany 75

2. In this example, we presume that P-334WT's model name is P-334WT. And since it's P-334WT, so only 1 PC can use the tunnel. 3. In this exa

Strany 76

2. Setup ZyWALLSimilar to the settings for P-334WT, ZyWALL is configured in the same way. 1. Using a web browser, login ZyWALL by giving the LAN IP a

Strany 77

3. Troubleshooting Q: How do we know the above tunnel works?A: If the connection between PC 1 and PC 2 is ok, we know the tunnel works.Please try to p

Strany 78

● Using CI command 'ipsec debug 1'Please enter 'ipsec debug 1' in Menu 24.8. There should be lots of detailed messages printed

Strany 79

Some servers providing Internet applications such as some mIRC servers do not allow users to login using the same IP address. Thus, users on the same

Strany 80

Secure Gateway with Dynamic WAN IP Address● P-334WT static WAN IP v.s. peer side dynamic IP ● P-334WT dynamic WAN IP v.s. peer side static IPM

Strany 81

2. In remote side, generally speaking, most VPN clients will bind PPP/Ethernet adapter's dynamic IP address to IPSec automatically . The only th

Strany 82

1. In VPN settings of P-334WT, please specify the IP address of My IP as 0.0.0.0. P-334WT will automatically bind it's current WAN IP address to

Strany 83

2. IPSec tunnel in this case, can ONLY be initiated from P-334WT.

Strany 84

Configure NAT for Internal ServersSome tips for this application:Generally, without IPSec, to configure an internal server for outside access, we need

Strany 85 - ● Configuration

Configure P-334WT Behind a NAT RouterSome tips for this application: 1. The NAT router must support to pass through IPSec protocol. Only ESP tunnel m

Strany 86

Relaying NetBIOS Broadcast over IPSec tunnel.¡@By NetBIOS broadcast supported in VPN tunnel, users of Microsoft Windows can search computers in remote

Strany 87

Phase 2 - Active Protocol= ESPEncryption Algorithm= DES Authentication Algorithm= MD5SA Life Time (Seconds)= 28800Encapsulation= TunnelPerfect Forward

Strany 88

Wireless Application Notes● Infrastructure Mode● Wireless MAC Address Filtering● WEP Configurations● IEEE 802.1x● Site Survey All

Strany 89 - ● Configuration

Configuring Infrastructure mode ● Infrastructure Introduction ● Configure wireless access point to Infrastructure mode with SMT ● Config

Strany 90

Many-to-One (SUA/PAT)ILA1<--->IGA1 ILA2<--->IGA1 ...Many-to-Many OverloadILA1<--->IGA1 ILA2<--->IGA2 ILA3<--->IGA1

Strany 91 - ● SUA Supporting Table

2. Enter 5 to display Menu 3.5 ¡V Wireless LAN Setup. Menu 3.5 - Wireless LAN SetupESSID= ZyXELHide ESSID= NoC

Strany 92

3. Configure the desired configuation on P-334WT.4. Finished.● Configuration Wireless Station to Infrastructure modeTo configure Infrastructure m

Strany 93 - ■ Configurations

3. Select Infrastructure from the operation mode pull down menu, fill in an SSID or leave it as any if you wish to connect to any AP than press Apply

Strany 94

5. Double click on the AP you want to associated with.

Strany 95

6. After the client have associated with the selected AP. The linked AP's channel, current linkup rate, SSID, link quality, and signal strength

Strany 96 - (169.254.0.0/16)

MAC Filter ● MAC Filter Overview ● ZyXEL MAC Filter Implementation ● Configure the WLAN MAC Filter 1. MAC Filter Overview Users can use

Strany 97

Menu 3.5.1 - WLAN MAC Address FilterActive= NoFilter Action= Allowed Association----------------

Strany 98

All contents copyright (c) 2004 ZyXEL Communications Corporation.

Strany 99

Setup WEP (Wired Equivalent Privacy)● Introduction ● Setting up the Access Point● Setting up the Station Introduction The 802.11 standard

Strany 100

Setting up the Access Point Most access points and clients have the ability to hold up to 4 WEP keys simultaneously. You need to specify one of the 4

Strany 101

Without DDNS, we always tell the users to use the WAN IP of the Prestige to reach our internal server. It is inconvenient for the users if this IP is

Strany 102

● Setting up the Access Point from SMT Menu 3.5B1000 hold up to 4 WEP Keys. You have to specify one of the 4 keys as default Key which be used to

Strany 103

So, the Key 3 of station has to equal to the Key 3 of access point.Though access point use Key 3 as default key, but the station can use the other Key

Strany 104

The utility will pop up on your windows screen. Note: If the utility icon doesn't exist in your task bar, click Start -> Programs -> IEE

Strany 105

Key settings The WEP Encryption type of station has to equal to the access point. Check 'ASCII' field for characters WEP key or unchec

Strany 106 - How does ZyXEL filter work?

Hexadecimal digits don't need to preceded by '0x'.For example, 64-bits with characters WEP key : Key1= 2e3f4 Key2= 5y7jsKey3= 24fg7Key

Strany 107 - ● Filter Types and SUA

Setup IEEE 802.1x Access Control (Authentication and Accounting)● What is IEEE 802.1x ? IEEE 802.1x Introduction Authentication Port St

Strany 108

The device (i.e. Wireless AP) facilitates authentication for the supplicant (Wireless client) attached on the Wireless network. Authenticator controls

Strany 109

1. Force Authorized : Disables 802.1x and causes the port to transition to the authorized state without any authentication exchange required. The port

Strany 110

However, if during bootup, the supplicant does not receive an EAP-request/identity frame from the Wireless AP, the client can initiate authentication

Strany 111

● EAP-Packet : Both the supplicant and the authenticator send this packet when authentication is taking place. This is the packet that contains ei

Strany 112 - Filter Example

ZyNOS FAQ 1. What is ZyNOS?2. How do I access the Prestige SMT menu?3. What is the default console port baud rate? Moreover, how do I change it?4.

Strany 113

packets which are used for key managements. Because the remote gateway checks this source port during connections, the port thus is not allowed to be

Strany 114

Authentication Control Press [SPACE BAR] to select from Force Authorized, Force UnAuthorized or Auto. The default is Force Authorized.Auto : Enables 8

Strany 115

● Using External RADIUS Authentication ServerIn addition to the internal authentication server inside ZyXEL AP, you can use external RADIUS authen

Strany 116

1. From the SMT main menu, enter Menu 23.2 to setup System Security - RADIUS Server to setup the RADIUS authentication server. Me

Strany 117

ActivePress [SPACE BAR] to select Yes and press [Enter] to enable 802.1x user authentication through an external RADIUS authentication server. Select

Strany 118 - Configuration

All contents copyright © 2004 ZyXEL Communications Corporation.

Strany 119

Setup 802.1x client in the station● Setup Windows XP 802.1x client ● Setup MeetingHouse AEGIS 802.1x client ● Setup 802.1x client in the

Strany 120

4. In Authentication tab, check Enable network access control using IEEE 8021.x and choose the MD5-Challenge in the EAP type: list, as shown below.

Strany 121

5. Connect to ZyXEL AP, in Wireless Network Connection, choose View Available Wireless Networks

Strany 122

6. In the Connect to Wireless Network window, select the AP you would like to connect in the Available networks field then click Connect button for co

Strany 123

7. Windows XP will show you the message "Click here to enter your user name and password for the network <AP_name>" where the <AP_n

Strany 124

Firewall FAQ 1. Geneal2. Log and AlertBack to Main Menu of the P-334WT Support NoteGeneral 1. What is a network firewall? 2. What makes P-334WT s

Strany 125

9. Windows XP completes the negotiation and changes the status for you automatically as shown on following figure.● Setup MeetingHouse AEGIS 802.1

Strany 126 - ● Length (in bytes)

1. Please connect your wireless client to AP before configuring AEGIS 802.1x client.2. Open AEGIS Client- Running window, choose Client --> Config

Strany 128

3. Right click the specified wireless client adapter in the AEGIS Client --> Select Start to start the 802.1x authentication on the specified wirel

Strany 129

5. If AEGIS 802.1x client does not start to negotiate with wireless AP, please perform Step 1 again. All contents copyright © 2004 ZyXEL Communication

Strany 130

Site Survey ● Site survey introduction ● Preparation ● Survey on site ● IntroductionWhat is Site Survey?An RF site survey is a MAP t

Strany 131

2. Install an access point at the preliminary location. 3. User a notebook with wireless client installed and run it's utility. An utility will

Strany 132

5. When you reach the farthest point of connection mark the spot. Now you move the access point to this new spot as have already determine the farthe

Strany 133

Note: If there are more than one access point is needed be sure to make the adjacent access point service area over lap one another. So the wireless

Strany 134

TMSS Application Notes● Registration Steps(Demo)● FAQ All contents copyright (c) 2004 ZyXEL Communications Corporation.

Strany 135

Stateful Inspection Firewalls restrict access by screening data packets against defined access rules. They make access control decisions based on IP a

Strany 136

TMSS ● TMSS Introduction ● TMSS Registration Demo● TMSS IntroductionWhat is TMSS?Help to identify vulnerabilities and to protect PCs and

Strany 137

3. When you apply "Continue" button, the web page will redirect to TMSS dashboard as below.

Strany 138 - Setting Up the Syslog

4. Click "Service Summary", in this page you can activate the TMSS service. (You can press the "?" mark in the page for more detai

Strany 139 - 3. Restart syslogd

5. Click "Activate My Services", you will receive the pages below. (Please follow instruction in the page to finish the steps of registratio

Strany 142

6. After you receive the registration mail from TMSS, please follow the instruction in the mail to validate your account. After you validate your acco

Strany 143

7. You can back to TMSS dashboard, you can see the status already change. (If you want extend you TMSS service after Trial expired, please check the O

Strany 144

8. You can use "Security Scan" for security scan on your PC or the entire PCs in your network (under LAN of the device.) After security scan

Strany 146 - Using the Dynamic DNS (DDNS)

series of IP fragments with overlapping offset fields. When these fragments are reassembled at the destination, some systems will crash, hang, or rebo

Strany 147

9. Before you validate your account, the status of Parental Control will like below.

Strany 148

10. Below is the page which you validate your account.

Strany 149 - Using IP Alias

11. After you finish your TMSS registration and install the TIS software, in Web GUI will display as below. (the information of Client Antivirus Prote

Strany 152

TMSS FAQ 1. Entire network result will never be "Risk Free".2. If user sets incorrect DNS setting for router, parental controls will not w

Strany 153

4. The scanning result will be sent to default gateway.If our network topology is using multiple routers, e.g. ADSL-----TMSS router------ router2

Strany 154

TMSS will not send DQM to query client status before DQM time(30 mins) out reach.13. If port 40116(UDP) is used by another program, discovery would b

Strany 155

CI Command List Command Class List Table System Related Command Exit Command Device Related Command Ethernet Related Command POE Related Command

Strany 156

System Related Command Ho

Strany 157

The above figure indicates the "triangle route" topology. It works fine if you turn off firewall function on P-334WT box. By default, your c

Strany 158 - ■ Download ZyNOS via LAN

hostname [hostname] display system hostname logs category access [0:none/1:log/2:alert/3:both] record the access cont

Strany 159

disp clear log error online turn on/off error log online display load load the log setting buffer mail aler

Strany 160

server [domainName/IP] syslog server to send the logs log clear clear log error disp display log error online [

Strany 161 - Using Traffic Redirect

nat <none|sua|full_feature> config remote node nat nailup <no|yes> config remote node nailup mtu <value> set re

Strany 162 - ● Traffic Redirect Setup

romreset restore default romfile server access <telnet|ftp|web|icmp|snmp|dns> <value> set server access type l

Strany 163

disp <ch-name> show the connection trace of this channel clear <ch-name> clear the connection trace of this channel

Strany 164 - VPN Application Notes

netbios upnp active [0:no/1:yes] Activate or deactivate the saved upnp settings config [0:deny/1:permit] Allow users

Strany 165 - P-334WT to ZyWALL Tunneling

dial <node#> dial to remote node Ethernet Related Command

Strany 166

disp <ch_name> display ethernet debug infomation level <ch_name> <level> set the ethernet debug level level 0: disable

Strany 167

dial <rn-name> dial a remote node drop <rn-name> drop a remote node call tunnel <tunnel id> display pptp tunnel infor

Strany 168 - ● Menu 27.2, SA Monitor

(B) Deploying your second gateway on WAN side.(C) To resolve this conflict, we add an option for users to allow/disallow such Triangle Route topology

Strany 169

e-mail mail-server <mail server IP> Edit the mail server IP to send the alert return-addr <e-mail address> Edit the mail

Strany 170

minute-high <0~255> The threshold to start to delete the old half-opened sessions to minute-low minute-low <0~255> The

Strany 171

pnc <yes|no> PNC is allowed when 'yes' is set even there is a rule to block PNC log <yes|no> Switch on/off s

Strany 172

destaddr-range <start ip address> <end ip address> Select and edit a destination address range of a packet which complies to th

Strany 173

set <set#> rule <rule#> Insert a specified rule in a set to the firewall configuration cli Display the choices of comman

Strany 174

server <primary> [secondary] [third] set dns server stats clear clear dns statistics disp display dns statis

Strany 175

stroute display [rule # | buf] display rule index or detail message in rule. load <rule #> load static route rule in buf

Strany 176

reginfo display display urlfilter registration information name set urlfilter registration name eMail <size>

Strany 177

time [pending] set time clearAll clear all listupdate information exemptZone display display exemptzone informati

Strany 178 - Wireless Application Notes

tredir failcount <count> set tredir failcount partner <ipaddr> set tredir partner target <ipaddr> set

Strany 179 - ● Introduction

General 1. What is a network firewall? 2. What makes P-334WT secure?3. What are the basic types of firewalls? 4. What kind of firewall is the P-33

Strany 180

edit remotehost <start ip> [end ip] set nat server remote host ip edit leasetime [time] set nat server lease time edit

Strany 181

<iface> query send query on iface <iface> rsptime [time] set igmp response time <iface> start turn on of

Strany 182

wan <on|off> After a packet is IPSec processed and will be sent to WAN side, this switch is to control if this packet can be applied IPSe

Strany 183

- 0 means never timeout update_peer <0~255> - Adjust auto-timer to update IPSec rules which use domain name as the secure gate

Strany 184

keep_alive <rule #> <on|off> Set ipsec keep_alive flag load <rule #> Load ipsec rule save Save ipsec rules config

Strany 185 - MAC Filter

lcPortEnd <port> Set local end port rmAddrType <0:single | 1:range | 2:subnet> Set remote address type rmAddrStart <

Strany 186

p2SaLifeTime <seconds> Set sa life time in phase 2 in IKE encap <0:Tunnel | 1:Transport> set encapsulation in phase 2 in

Strany 187

Command Description sys Firewall acl disp Display specific ACL set # rule #, or all ACLs. active <yes|no> Ac

Strany 188 - (Wired Equivalent Privacy)

smtp Set SMTP DoS defender on/off display Display SMTP DoS defender setting. ignore Set if firewall ignore DoS in lan/wan/d

Strany 189

Bridge cnt related to bridge routing statistic table Disp display bridge route counter Clear clear bridge route counte

Strany 190

3. Stateful Inspection Firewall Packet Filtering Firewalls generally make their decisions based on the header information in individual packets. Thes

Strany 191

Trace show all supplications in the supplication table User [username] show the specified user status in the supplicant table All conte

Strany 192

Prestige 334WT Troubleshooting ● Unable to get the WAN IP from the ISP● Unable to run applications● Embedded packet trace● Debug PPPoE

Strany 193 - Key settings

My P-334WT can not get an IP address from the ISP to connect to the Internet, what can I do?Currently, there are various ways that ISPs control their

Strany 194

Menu 2 - WAN SetupLink Mode= Half DuplexMAC Address:Assigned By= IP address attached on LANIP Address= 192.168.1.33¡@Key settings:● Assigned By=,

Strany 195

¡@3. Your ISP checks 'User ID' This authentication type is used by RoadRunner ISP, currently they use RR-TAS(Toshiba Authentication Service)

Strany 196

otherwise, select Static. ● IP Address & Subnet Mask & Gateway IP Address...Enter the IP address, subnet mask & gateway IP when Static

Strany 197 - ● Re-Authentication

If any application does not work behind P-334WT's SUA 1. Currently, the applications supported in SUA mode are listed in the ZyXEL SUA Support T

Strany 198

Embedded Packet Trace The P-334WT packet trace records and analyzes packets running on LAN and WAN interfaces. It is designed for users with technical

Strany 199 - ● Enable 802.1x in AP

P324> sys trcp channel enet1 none P324> sys trcp channel enet0 bothway P324> sys trcp sw on P324> sys trcl sw on P324> sys trcd brief

Strany 200

Destination Port = 0x0050 (80) Sequence Number = 0x00BD15A7 (12391847) Ack Number = 0x00000000 (0) Head

Strany 201

Denial of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to di

Strany 202

TCP Header: Source Port = 0x0050 (80) Destination Port = 0x045C (1116) Sequence Number = 0x4AD1B57F (12552

Strany 203

Source IP = 0xC0A80102 (192.168.1.2) Destination IP = 0xC01F0782 (192.31.7.130) TCP Header: Source Port

Strany 204

P324> sys trcp channel enet0 none P324> sys trcp channel enet1 bothway P324> sys trcp sw on P324> sys trcl sw on P324> sys trcd brief 0

Strany 205

Sequence Number = 0xD3E95985 (3555285381) Ack Number = 0x00C18F63 (12685155) Header Length = 20 Flag

Strany 206

Idetification = 0x7A0C (31244) Flags = 0x02 Fragment Offset = 0x00 Time to Live = 0

Strany 207 - Networks

Idetification = 0x7B0C (31500) Flags = 0x02 Fragment Offset = 0x00 Time to Live = 0

Strany 208

1.5 Disable the trace log by entering: sys trcp sw off & sys trcl sw off 1.6 Display the trace briefly by entering: sys trcp brief 1.7 Display spe

Strany 209

Source IP = 0xC01F0782 (192.31.7.130) Destination IP = 0xC0A80102 (192.168.1.2) TCP Header: Source Port

Strany 210

P324> sys trcp channel enet0 none P324> sys trcp channel enet1 bothway P324> sys trcl sw on P324> sys trcp sw on P324> sys trcl sw off

Strany 211 - Client window

TCP Header: Source Port = 0x0050 (80) Destination Port = 0x2826 (10278) Sequence Number = 0x4D713D8A (1299

Strany 212

A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP specification known as directed or subnet broadcasting, to quickly

Strany 213

IP Version = 4 Header Length = 20 Type of Service = 0x00 (0) Total Length = 0x018D (397)

Strany 214

bestoftimes.gi P324> ¡@All contents copyright ?1999 ZyXEL Communications Corporation.

Strany 215 - Site Survey

Debug PPPoE ConnectionThe P-334WT supports traces when there is problem to connect your ISP using PPPoE protocol. Please follow the procedure below to

Strany 216

bdcastSendInit: l1.pktTx() failed, pch poe0 ch enet0poePut1SrvcName: '' len 0host-uniq 31303030 len 4putPoeHdr: ver 1 type 1 code x09 sess-i

Strany 217

0x00000000 r12=0x56FF54FF sp= 0x0001EDBC lr= 0x00004F64 pc= 0x0001395400 01 02 03 04 05 06 07 08 09 0A 0B 0C 0D 0E 0Fe5bdbfe0: e2 8f 00 06

Strany 218

Enter Debug ModeatgoBootbase Version: V1.12 | 1/27/2000 11:00:09RAM: Size = 4096 KbytesFLASH: Intel 8MRAS Version: V3.20(M.01)b2 | 8/18/2000 14:05:08P

Strany 219 - TMSS Application Notes

The default console port baud rate is 9600bps, you can change it to 115200bps in Menu 24.2.2 to speed up the SMT access. 3. What is the default conso

Strany 220 - ● TMSS Registration Demo

on P-334WT box. By default, your connection will be blocked by firewall because of the following reason. Step 1. Being the default gateway of PC,

Strany 221

(C) To resolve this conflict, we add an option for users to allow/disallow such Triangle Route topology in both CI command and Web configurator . You

Strany 222

Log and Alert 1. When does the P-334WT generate the firewall log?2. What is contained in P-334WT firewall log ?3. How do I view the firewall log? 4

Strany 223

All logs generated in P-334WT, including firewall logs and system logs are migrated to centralized logs. So you can view firewall logs in Centralized

Strany 224

Content Filter FAQ 1. What types of content filter does P-334WT provide?2. How many URL keyword does P-334WT support?3. What kinds of URL checking

Strany 225

IPSec FAQ VPN Overview 1. What is VPN?2. Why do I need VPN?3. What are most common VPN protocols?4. What is PPTP?5. What is L2TP?6. What is IPSe

Strany 226

There are some reasons to use a VPN. The most common reasons are because of security and cost.Security1). AuthenticationWith authentication, VPN recei

Strany 227

Transport mode is mainly for an IP host to protect the data generated locally, while tunnel mode is for security gateway to provide IPSec service for

Strany 228

E-mail [email protected] note that, in P-334WT, if "DNS" or "E-mail" type is chosen, you can still use a random string as

Strany 229

1. If there is a NAT router running in the front of P-334WT, please make sure the NAT router supports to pass through IPSec. 2. In NAT case (either

Strany 230

7. How do I backup/restore SMT configurations by using TFTP client program via LAN? a. Use the TELNET client program in your PC to login to your Pre

Strany 231

Phase 1 ID can be configured in VPN setup menu as following. Note that you can make such configuration in either web configurator or SMT menu. 13. How

Strany 232

private IP address as the content of it's phase 1 ID. So you have to configure P-334WT's secure gateway's phase 1 ID as the private IP

Strany 233

Wireless FAQ General FAQ 1. What is a Wireless LAN ? 2. What are the main advantages of Wireless LANs ? 3. What are the disadvantages of Wireless L

Strany 234

Security FAQ1. How do I secure the data across an Access Point's radio link? 2. What is WEP ? 3. What is the difference between 40-bit and 64

Strany 235

c. Installation Flexibility:Wireless technology allows the network to go where wire cannot go. d. Reduced Cost-of-Ownership:While the initial investme

Strany 236

8. How fast is 802.11b ?The IEEE 802.11b standard has a nominal speed of 11 megabits per second (Mbps). However, depending on signal quality and how m

Strany 237

Both the 802.11b and Bluetooth devices occupy the same2.4-to-2.483-GHz unlicensed frequency range-the same band. But a Bluetooth device would not inte

Strany 238 - 2. exit Returns to SMT

2. What is Infrastructure mode ?Infrastructure mode implies connectivity to a wired communications infrastructure. If such connectivity is required t

Strany 239

mobile device must match the ESSID of the AP to communicate with the AP. The ESSID is a 32-character maximum string and is case-sensitive. Security FA

Strany 240

broadcast beacon packets. Turning off the broadcast of SSID in the beacon message (a common practice) does not prevent getting the SSID; since the SSI

Strany 241

source address and TCP/UDP source port numbers are written into the destination fields of the packet (since it is now moving in the opposite direction

Strany 242

13. What is AAA ?AAA is the acronym for Authentication, Authorization, and Accounting and refers to the idea of managing subscribers by controlling th

Strany 243

Prestige 334WT Application Notes Internet ConnectionSetup Prestige for PPPoE ConnectionsSetup Prestige as a PPTP Client Using Multi-NATNAT Notes - Co

Strany 244

Internet Connection A typical Internet access application of the Prestige is shown below. For a small office, there are some components needs to be ch

Strany 245

You must first install TCP/IP software on each PC before you can use it for Internet access. If you have already installed TCP/IP, go to the next sect

Strany 246

Key Settings:Option DescriptionEncapsulation Select the encapsulation type your ISP supportsService Name Enter the 'Service Name' for the IS

Strany 247

5. Check if the connection is up by clicking the ADVANCED/MAINTENANCE menu. All contents copyright (c) 2004 ZyXEL Communications Corporation.

Strany 248

Setup the Prestige for PPPoE Connections ● IntroductionPPP over Ethernet is an IETF draft standard specifying how a host personal computer (PC) in

Strany 249

Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= PPPoE

Strany 250

Menu 11.1 - Remote Node ProfileRem Node Name= MyISP Rou

Strany 251

Setup the Prestige 334WT as a PPTP Client ● What is PPTP Client?Microsoft's Point-to-Point Tunneling Protocol (PPTP) is a network protocol th

Strany 252

If the firewall is not turned on we can configure a filter set to block the IP spoofing attacks. The basic scheme is as follows: For the input data fi

Strany 253

The PPTP client feature means the PPTP connection is initialized by the Prestige 334WT router, so this connection is transparent to the PPTP clients o

Strany 254

IP Address AssignmentChoose 'Dynamic' if the PPTP server provides the IP dynamically, otherwise choose 'Static'.IP AddressEnter th

Strany 255

Using Multi-NAT ● What is Multi-NAT?● How NAT works● NAT Mapping Types● SUA Versus NAT● SMT Menus1. Applying NAT in the SMT Menus

Strany 256

address translation, please refer to RFC 1631, The IP Network Address Translator (NAT). ● How NAT worksIf we define the local IP addresses as th

Strany 257

2. Many to OneIn Many-to-One mode, the P-334WT maps multiple ILA to one IGA. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL&a

Strany 258

● SUA Versus NATSUA (Single User Account) in previous ZyNOS versions is a NAT set with 2 rules, Many-to-One and Server. The P-334WT now has Full F

Strany 259

Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= Ethernet

Strany 260

Step 1. Enter 11 from the Main Menu. Step 2. Move the cursor to the Edit IP field, press the [SPACEBAR] to toggle the default No to Yes, then press [E

Strany 261

3. Address Mapping Sets and NAT Server Sets Use the Address Mapping Sets menus and submenus to create the mapping table used to assign global addresse

Strany 262

0.0.0.0 Server 3. 4. 5. 6. 7. 8. 9. 10. Press ESC or RETURN to Exit: The followi

Strany 263

Product FAQ General FAQ 1. What is the P-334WT Internet Access Sharing Router?2. Will the P-334WT work with my Internet connection? 3. What do I ne

Strany 264

Menu 15.1.1 - Address Mapping Rules Set Name= NAT_SET Idx Local Start IP Local End IP Global Start IP Global End IP Typ

Strany 265

Select RuleWhen you choose Edit, Insert Before or Save Set in the previous field the cursor jumps to this field to allow you to select the rule to app

Strany 266

IPEndThis is the ending local IP address (ILA). If the rule is for all local IPs, then put the Start IP as 0.0.0.0 and the End IP as 255.255.255.255.

Strany 267

The following procedures show how to configure a server behind NAT. Step 1. Enter 15 in the Main Menu to go to Menu 15-NAT Setup. Step 2. Enter 2 to g

Strany 268 -

www-http (Web) 80PPTP (Point-to-Point Tunneling Protocol)1723 ● Examples1. Internet Access Only2. Internet Access with an Internal Server3. Usi

Strany 269

Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= Ethernet

Strany 270

In this case, we do exactly as above (use the convenient pre-configured SUA Only set) and also go to Menu 15.2.1-NAT Server Setup (Used for SUA Only)

Strany 271 - Debug PPPoE connection

3. Using Multiple Global IP addresses for clients and servers (One-to-One, Many-to-One, Server Set mapping types are used) In this case we have 3 IGA

Strany 272

Menu 4 - Internet Access Setup ISP's Name= ChangeMe Encapsulation= Ethernet

Strany 273

Rule 2 Setup: Selecting One-to-One type to map the FTP Server 2 with ILA2 (192.168.1.11) to IGA2. Menu 15.1.1.2 - - Rule 2

Strany 274

10. What is the difference between SUA and Multi-NAT?11. What is BOOTP/DHCP? 12. What is DDNS?13. When do I need DDNS?14. What DDNS servers does

Strany 275

Rule 4 Setup: Select Server type to map our web server and mail server with ILA3 (192.168.1.20) to IGA3. Menu 15.1.1.4 - - R

Strany 276

1 4. [IGA3] Server 5. 6. 7. 8. 9. 10. Press ESC

Strany 277

4. Support Non NAT Friendly Applications Some servers providing Internet applications such as some mIRC servers do not allow users to login using the

Strany 278

The three rules configured for using One-to-One mapping type is shown below. Menu 15.1.1.1 - - Rule 1 Type:

Strany 279

Menu 15.1.1.3 - - Rule 3 Type: One-to-One Local IP: Start= 192.168.

Strany 280

Configure a PPTP server behind SUA ● IntroductionPPTP is a tunneling protocol defined by the PPTP forum that allows PPP packets to be encapsulated

Strany 281

This application note explains how to establish a PPTP connection with a remote private network in the Prestige 324 SUA case. In ZyNOS, all PPTP packe

Strany 282

Menu 15 - SUA Server Setup Port # IP Address ------ ------------

Strany 283

All contents copyright © 2004 ZyXEL Communications Corporation.

Strany 284

Configure an Internal Server Behind SUA ● IntroductionIf you wish, you can make internal servers (e.g., Web, ftp or mail server) accessible for o

Strany 285

two Ethernet ports: LAN port and WAN port. You should connect the computer to the LAN port and connect the external modem to the WAN port. If the ISP

Strany 286

Menu 15 - SUA Server Setup Port # IP Address ------ ------------

Strany 287

Tested SUA/NAT Applications (e.g., Cu-SeeMe, ICQ, NetMeeting) ● IntroductionGenerally, SUA makes your LAN appear as a single machine to the outsi

Strany 288

mIRCNone for Chat.For DCC, please set Default/Client IP.Windows PPTP None 1723/client IPICQ 99a None for Chat. For DCC, please set: ICQ -> prefere

Strany 289

Microsoft Xbox Live7None N/A1 Since SUA enables your LAN to appear as a single computer to the Internet, it is not possible to configure similar serve

Strany 290

7. 0 0.0.0.0 8. 0 0.0.0.0 All contents copyright (c) 2004 ZyXEL Communicatio

Strany 291 - P324>

Using UPnP1. What is UPnP2. Use UPnP in ZyXEL devices3. View dynamic ports opened by UPnP1. What is UPnPUPnP (Universal Plug and Play) makes connec

Strany 292

UPnP Operations● Addressing: UPnPv1 devices MAY support IPv4, IPv6, or both. For IPv4, each devices should have DHCP client, when the device gets

Strany 293

Device: PPPoE Dial-up RouterService: NAT function provided by PPPoE Dial-up RouterControl Point: PC11. Enable UPnP function in ZyXEL deviceGo to Advan

Strany 294

2. After getting IP address, you can go to open MSN application on PC and sign in MSN server.

Strany 295

3. Start a Video conversation with one online user.

Komentáře k této Příručce

Žádné komentáře