Справочник ПользователяСодержаниеUser’s Guide1Copyright3Federal Communications Commission (FCC) Interference Statement4Safety Warnings6ZyXEL Limited Warranty7Customer Support8Table of Contents11List of Figures25List of Tables33Preface39Introduction to DSL41Getting To Know Your Prestige431.1 Introducing the Prestige431.2 Features431.2.1 Wireless Features (P-660HW)461.3 Applications for the Prestige471.3.1 Protected Internet Access471.3.2 LAN to LAN Application471.4 Front Panel LEDs471.5 Hardware Connection48Introducing the Web Configurator492.1 Web Configurator Overview492.1.1 Accessing the Web Configurator492.1.2 Resetting the Prestige502.1.2.1 Using the Reset Button502.1.3 Navigating the Web Configurator51Wizard Setup for Internet Access553.1 Introduction553.1.1 Internet Access Wizard Setup55LAN Setup634.1.1 LANs, WANs and the Prestige634.1.2 DHCP Setup644.1.2.1 IP Pool Setup644.1.3 DNS Server Address644.1.4 DNS Server Address Assignment644.2 LAN TCP/IP654.2.1 IP Address and Subnet Mask654.2.1.1 Private IP Addresses664.2.2 RIP Setup664.2.3 Multicast674.2.4 Any IP674.2.4.1 How Any IP Works68Wireless LAN715.2 Wireless Security Overview715.2.1 Encryption715.2.2 Authentication715.2.3 Restricted Access725.2.4 Hide Prestige Identity725.4.1 WEP Encryption745.6.1 WPA-PSK Application Example785.6.2 WPA with RADIUS Application Example795.6.3 Wireless Client WPA Supplicants805.7.1 No Access Allowed or Authentication815.7.2 Authentication Required: 802.1x815.7.3 Authentication Required: WPA835.7.4 Authentication Required: WPA-PSK85WAN Setup916.1.1 Encapsulation916.1.1.1 ENET ENCAP916.1.1.2 PPP over Ethernet916.1.1.3 PPPoA916.1.1.4 RFC 1483926.1.2 Multiplexing926.1.2.1 VC-based Multiplexing926.1.2.2 LLC-based Multiplexing926.1.3 VPI and VCI926.1.4 IP Address Assignment926.1.4.1 IP Assignment with PPPoA or PPPoE Encapsulation926.1.4.2 IP Assignment with RFC 1483 Encapsulation936.1.4.3 IP Assignment with ENET ENCAP Encapsulation936.1.5 Nailed-Up Connection (PPP)936.1.6 NAT936.2 Metric936.3 PPPoE Encapsulation946.4 Traffic Shaping946.5 Zero Configuration Internet Access95Network Address Translation (NAT) Screens1037.1.1 NAT Definitions1037.1.2 What NAT Does1047.1.3 How NAT Works1047.1.4 NAT Application1057.1.5 NAT Mapping Types1067.2 SUA (Single User Account) Versus NAT1077.3 SUA Server1077.3.1 Default Server IP Address1077.3.2 Port Forwarding: Services and Port Numbers1077.3.3 Configuring Servers Behind SUA (Example)108Dynamic DNS Setup1158.1.1 DYNDNS Wildcard115Time and Date117Firewalls11910.2 Types of Firewalls11910.2.1 Packet Filtering Firewalls11910.2.2 Application-level Firewalls12010.2.3 Stateful Inspection Firewalls12010.3 Introduction to ZyXEL’s Firewall12010.3.1 Denial of Service Attacks12110.4 Denial of Service12110.4.1 Basics12110.4.2 Types of DoS Attacks12210.4.2.1 ICMP Vulnerability12410.4.2.2 Illegal Commands (NetBIOS and SMTP)12410.4.2.3 Traceroute12510.5 Stateful Inspection12510.5.1 Stateful Inspection Process12610.5.2 Stateful Inspection and the Prestige12710.5.3 TCP Security12710.5.4 UDP/ICMP Security12810.5.5 Upper Layer Protocols12810.6 Guidelines for Enhancing Security with Your Firewall12810.6.1 Security In General12910.7 Packet Filtering Vs Firewall13010.7.1 Packet Filtering:13010.7.1.1 When To Use Filtering13010.7.2 Firewall13010.7.2.1 When To Use The Firewall130Firewall Configuration13311.1 Access Methods13311.2 Firewall Policies Overview13311.3 Rule Logic Overview13411.3.1 Rule Checklist13411.3.2 Security Ramifications13411.3.3 Key Fields For Configuring Rules13511.3.3.1 Action13511.3.3.2 Service13511.3.3.3 Source Address13511.3.3.4 Destination Address13511.4 Connection Direction13511.4.1 LAN to WAN Rules13511.4.2 Alerts13611.9 Example Firewall Rule14311.10 Predefined Services14711.12.1 Threshold Values15111.12.2 Half-Open Sessions15111.12.2.1 TCP Maximum Incomplete and Blocking Time15111.12.3 Configuring Firewall Thresholds152Content Filtering15512.2 The Main Content Filter Screen155Remote Management Configuration15913.1.1 Remote Management Limitations15913.1.2 Remote Management and NAT16013.1.3 System Timeout16013.2 Telnet16013.3 FTP16113.4 Web16113.5 Configuring Remote Management161Universal Plug-and-Play (UPnP)16314.1.1 How do I know if I'm using UPnP?16314.1.2 NAT Traversal16314.1.3 Cautions with UPnP16414.2 UPnP and ZyXEL16414.3 Installing UPnP in Windows Example16514.4 Using UPnP in Windows XP Example169Logs Screens17715.1.1 Alerts and Logs17715.2 Configuring Log Settings17715.4 SMTP Error Messages18015.4.1 Example E-mail Log181Media Bandwidth Management Advanced Setup18316.2 Bandwidth Classes and Filters18316.3 Proportional Bandwidth Allocation18416.4 Bandwidth Management Usage Examples18416.4.1 Application-based Bandwidth Management Example18416.4.2 Subnet-based Bandwidth Management Example18416.4.3 Application and Subnet-based Bandwidth Management Example18516.5 Scheduler18616.5.1 Priority-based Scheduler18616.5.2 Fairness-based Scheduler18616.6 Maximize Bandwidth Usage18616.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic18616.6.2 Maximize Bandwidth Usage Example18716.7 Bandwidth Borrowing18816.7.1 Maximize Bandwidth Usage With Bandwidth Borrowing188Maintenance19717.1 Maintenance Overview19717.2.1 System Statistics199Introducing the SMT20918.1 SMT Introduction20918.1.1 Procedure for SMT Configuration via Telnet20918.1.2 Entering Password20918.1.3 Prestige SMT Menus Overview21018.2 Navigating the SMT Interface21118.2.1 System Management Terminal Interface Summary21218.3 Changing the System Password213Menu 1 General Setup21519.1 General Setup21519.2 Procedure To Configure Menu 121519.2.1 Procedure to Configure Dynamic DNS216Menu 2 WAN Backup Setup21920.1 Introduction to WAN Backup Setup21920.2 Configuring Dial Backup in Menu 221920.2.1 Traffic Redirect Setup220Menu 3 LAN Setup22321.1 LAN Setup22321.1.1 General Ethernet Setup22321.2 Protocol Dependent Ethernet Setup22421.3 TCP/IP Ethernet Setup and DHCP224Wireless LAN Setup22722.1 Wireless LAN Overview22722.2 Wireless LAN Setup22722.2.1 Wireless LAN MAC Address Filter228Internet Access23123.1 Internet Access Overview23123.2 IP Policies23123.3 IP Alias23123.4 IP Alias Setup23223.5 Route IP Setup23323.6 Internet Access Configuration234Remote Node Configuration23724.1 Remote Node Setup Overview23724.2 Remote Node Setup23724.2.1 Remote Node Profile23724.2.2 Encapsulation and Multiplexing Scenarios23824.2.2.1 Scenario 1: One VC, Multiple Protocols23824.2.2.2 Scenario 2: One VC, One Protocol (IP)23824.2.2.3 Scenario 3: Multiple VCs23824.2.3 Outgoing Authentication Protocol24024.3 Remote Node Network Layer Options24124.3.1 My WAN Addr Sample IP Addresses24224.4 Remote Node Filter24324.5 Editing ATM Layer Options24424.5.1 VC-based Multiplexing (non-PPP Encapsulation)24424.5.2 LLC-based Multiplexing or PPP Encapsulation24424.5.3 Advance Setup Options245Static Route Setup24725.1 IP Static Route Overview24725.2 Configuration247Bridging Setup25126.1 Bridging in General25126.2 Bridge Ethernet Setup25126.2.1 Remote Node Bridging Setup25126.2.2 Bridge Static Route Setup253Network Address Translation (NAT)25527.1 Using NAT25527.1.1 SUA (Single User Account) Versus NAT25527.2 Applying NAT25527.3 NAT Setup25727.3.1 Address Mapping Sets25727.3.1.1 SUA Address Mapping Set25827.3.1.2 User-Defined Address Mapping Sets25927.3.1.3 Ordering Your Rules26027.4 Configuring a Server behind NAT26127.5 General NAT Examples26227.5.1 Example 1: Internet Access Only26327.5.2 Example 2: Internet Access with an Inside Server26327.5.3 Example 3: Multiple Public IP Addresses With Inside Servers26427.5.4 Example 4: NAT Unfriendly Application Programs268Enabling the Firewall27128.1 Remote Management and the Firewall27128.2 Access Methods27128.3 Enabling the Firewall271Filter Configuration27329.1 About Filtering27329.1.1 The Filter Structure of the Prestige27429.2 Configuring a Filter Set for the Prestige27529.3 Filter Rules Summary Menus27629.4 Configuring a Filter Rule27729.4.1 TCP/IP Filter Rule27829.4.2 Generic Filter Rule28029.5 Filter Types and NAT28229.6 Example Filter28229.7 Applying Filters and Factory Defaults28429.7.1 Ethernet Traffic28529.7.2 Remote Node Filters285SNMP Configuration28730.1 About SNMP28730.2 Supported MIBs28830.3 SNMP Configuration28830.4 SNMP Traps289System Security29131.1 System Security29131.1.1 System Password29131.1.2 Configuring External RADIUS Server29131.1.3 IEEE 802.1x29331.2 Creating User Accounts on the Prestige295System Information and Diagnosis29732.1 Overview29732.2 System Status29732.3 System Information29932.3.1 System Information29932.3.2 Console Port Speed30032.4 Log and Trace30132.4.1 Viewing Error Log30132.4.2 Syslog and Accounting30232.5 Diagnostic304Firmware and Configuration File Maintenance30733.1 Filename Conventions30733.2 Backup Configuration30833.2.1 Backup Configuration30833.2.2 Using the FTP Command from the Command Line30933.2.3 Example of FTP Commands from the Command Line30933.2.4 GUI-based FTP Clients31033.2.5 TFTP and FTP over WAN Management Limitations31033.2.6 Backup Configuration Using TFTP31133.2.7 TFTP Command Example31133.2.8 GUI-based TFTP Clients31133.3 Restore Configuration31233.3.1 Restore Using FTP31233.3.2 Restore Using FTP Session Example31333.4 Uploading Firmware and Configuration Files31433.4.1 Firmware File Upload31433.4.2 Configuration File Upload31433.4.3 FTP File Upload Command from the DOS Prompt Example31533.4.4 FTP Session Example of Firmware File Upload31633.4.5 TFTP File Upload31633.4.6 TFTP Upload Command Example317System Maintenance31934.1 Command Interpreter Mode31934.2 Call Control Support32034.2.1 Budget Management32034.3 Time and Date Setting32134.3.1 Resetting the Time323Remote Management32535.1 Remote Management Overview32535.2 Remote Management32535.2.1 Remote Management Setup32535.2.2 Remote Management Limitations32635.3 Remote Management and NAT32735.4 System Timeout327IP Policy Routing32936.1 IP Policy Routing Overview32936.2 Benefits of IP Policy Routing32936.3 Routing Policy32936.4 IP Routing Policy Setup33036.5 Applying an IP Policy33336.5.1 Ethernet IP Policies33336.6 IP Policy Routing Example334Call Scheduling33937.1 Introduction339Troubleshooting34338.1 Problems Starting Up the Prestige34338.2 Problems with the LAN34338.3 Problems with the WAN34438.4 Problems Accessing the Prestige34538.4.1 Pop-up Windows, JavaScripts and Java Permissions34538.4.1.1 Internet Explorer Pop-up Blockers34538.4.1.2 JavaScripts34838.4.1.3 Java Permissions35038.4.2 ActiveX Controls in Internet Explorer352Product Specifications355Wall-mounting Instructions359Setting up Your Computer’s IP Address361Verifying Settings376IP Subnetting377Boot Commands385Command Interpreter387Firewall Commands389NetBIOS Filter Commands395Splitters and Microfilters399PPPoE403Wireless LANs405Log Descriptions415Internal SPTGEN431Index457Numerics457A457B457C457D458E459F459G460H460I460K460L461M461N461O462P462Q462R462S463T464U465V465W465X466Z466Размер: 11,8 МБСтраницы: 466Язык: EnglishПросмотреть