ZYXEL ARMOR Z1 NWD6605 - Wi-Fi Router

ARMOR Z1 NWD6605 - Wi-Fi Router ZYXEL - Free user manual and instructions

Find the device manual for free ARMOR Z1 NWD6605 ZYXEL in PDF.

📄 490 pages English EN Download 💬 AI Question
Notice ZYXEL ARMOR Z1 NWD6605 - page 3
View the manual : Français FR English EN
Pick your language and provide your email: we'll send you a specifically translated version.

User questions about ARMOR Z1 NWD6605 ZYXEL

0 question about this device. Answer the ones you know or ask your own.

Ask a new question about this device

The email remains private: it is only used to notify you if someone responds to your question.

No questions yet. Be the first to ask one.

Download the instructions for your Wi-Fi Router in PDF format for free! Find your manual ARMOR Z1 NWD6605 - ZYXEL and take your electronic device back in hand. On this page are published all the documents necessary for the use of your device. ARMOR Z1 NWD6605 by ZYXEL.

USER MANUAL ARMOR Z1 NWD6605 ZYXEL

G.SHDSL.bis Bonded Broadband Gateway

User's Guide

ZYXEL ARMOR Z1 NWD6605 - User's Guide - 1

Default Login Details

IP Address http://192.168.1.1

Admin 1234

Password

User user

Password

Firmware Version 3.70

Edition 1, 03/2010

www.zyxel.com

ZyXEL

About This User's Guide

Intended Audience

This manual is intended for people who want to configure the P-793H v2 using the web configurator.

Tips for Reading User's Guides On-Screen

When reading a ZyXEL User's Guide On-Screen, keep the following in mind:

  • If you don't already have the latest version of Adobe Reader, you can download it from http://www.adobe.com.

  • Use the PDF's bookmarks to quickly navigate to the areas that interest you. Adobe Reader's bookmarks pane opens by default in all ZyXEL User's Guide PDFs.

  • If you know the page number or know vaguely which page-range you want to view, you can enter a number in the toolbar in Reader, then press [ENTER] to jump directly to that page.

  • Type [CTRL] + [F] to open the Adobe Reader search utility and enter a word or phrase. This can help you quickly pinpoint the information you require. You can also enter text directly into the toolbar in Reader.

  • To quickly move around within a page, press the [SPACE] bar. This turns your cursor into a "hand" with which you can grab the page and move it around freely on your screen.

  • Embedded hyperlinks are actually cross-references to related text. Click them to jump to the corresponding section of the User's Guide PDF.

  • Quick Start Guide

The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access.

  • Support Disc

Refer to the included CD for support documents.

Documentation Feedback

Send your comments, questions or suggestions to: techwriters@zyxel.com.tw

Thank you!

The Technical Writing Team, ZyXEL Communications Corp.,

6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan.

Need More Help?

More help is available at www.zyxel.com.

ZYXEL ARMOR Z1 NWD6605 - Need More Help? - 1

  • Download Library

Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product.

Knowledge Base

If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products.

  • Forum

This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.

Customer Support

Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device.

See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.

  • Product model and serial number.
    Warranty Information.
  • Date that you received your device.
  • Brief description of the problem and the steps you took to solve it.

Disclaimer

Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate.

Document Conventions

Warnings and Notes

These are how warnings and notes are shown in this User's Guide.

Warnings tell you about things that could harm you or your device.

Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.

Syntax Conventions

  • The P-793H v2 may be referred to as the "device", the "system" or the "product" in this User's Guide.
  • Product labels, screen names, field labels and field choices are all in bold font.
  • A key stroke is denoted by square brackets and uppercase text, for example, [ENTER] means the "enter" or "return" key on your keyboard.
  • "Enter" means for you to type one or more characters and then press the [ENTER] key. "Select" or "choose" means for you to use one of the predefined choices.
  • A right angle bracket (>) within a screen name denotes a mouse click. For example, Maintenance > Log > Log Setting means you first click Maintenance in the navigation panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
  • Units of measurement may denote the "metric" value or the "scientific" value. For example, "k" for kilo may denote "1000" or "1024", "M" for mega may denote "1000000" or "1048576" and so on.
  • "e.g.," is a shorthand for "for instance", and "i.e.," means "that is" or "in other words".

Icons Used in Figures

Figures in this User's Guide may use the following generic icons. The P-793H v2 icon is not an exact representation of your device.

P-793H v2ComputerNotebook computer
DSL
ServerFirewallTelephone
SwitchRouter

SafetyWarnings

  • Do NOT use this product near water, for example, in a wet basement or near a swimming pool.
  • Do NOT expose your device to dampness, dust or corrosive liquids.
  • Do NOT store things on the device.
  • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning.
  • Connect ONLY suitable accessories to the device.
  • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information.
  • Make sure to connect the cables to the correct ports.
  • Place connecting cables carefully so that no one will step on them or stumble over them.
  • Always disconnect all cables from this device before servicing or disassembling.
  • Use ONLY an appropriate power adaptor or cord for your device.
  • Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe).
  • Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord.
  • Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
  • If the power adaptor or cord is damaged, remove it from the device and the power source.
  • Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one.
  • Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning.
  • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.
  • Use only No. 26 AWG (American Wire Gauge) or larger telecommunication line cord.

Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately.

ZYXEL ARMOR Z1 NWD6605 - SafetyWarnings - 1

Contents Overview

User's Guide 35

Getting To Know Your P-793H v2 37

Introducing the Web Configurator 43

Status Screens 51

Internet Setup Wizard 57

Tutorials 67

Technical Reference 73

WAN Setup 75

LAN Setup 101

Network Address Translation (NAT) 117

Firewalls 133

Content Filtering 155

VPN 161

Certificates 193

Static Route 203

802.1Q/1P 207

Quality of Service (QoS) 217

Dynamic DNS Setup 235

Remote Management 239

Universal Plug-and-Play (UPnP) 251

System Settings 263

Logs 269

Tools 283

Diagnostic 297

Introducing the SMT 301

General Setup 307

WAN Setup 311

LAN Setup 317

Internet Access Setup 321

Remote Node Setup 325

Static Route Setup 335

NAT Setup 339

353

Firewall Setup 355

Filter Configuration 357

System Password 373

System Information & Diagnosis 375

Firmware and Configuration File Maintenance 387

403

Schedule Setup 411

Troubleshooting 415

Table of Contents

About This User's Guide 3

Document Conventions 6

SafetyWarnings 8

Contents Overview 9

Table of Contents 11

List of Figures 23

List of Tables 31

Part I: User's Guide 35

Chapter 1 Getting To Know Your P-793H v2 37

1.1 Overview 37
1.1.1 High-speed Internet Access with G.SHDSL 37
1.1.2 High-speed Point-to-point Connections 38
1.1.3 High-speed Point-to-2points Connections 38

1.2 Ways to Manage the P-793H v2 39
1.3 Good Habits for Managing the P-793H v2 40
1.4 LEDs 40
1.5 The RESET Button 41
1.5.1 Using the RESET Button 41

Chapter 2 Introducing the Web Configurator 43

2.1 Web Configurator Overview 43
2.2 Accessing the Web Configurator 43
2.3 Web Configurator Main Screen 45

2.3.1 Title Bar 46
2.3.2 Navigation Panel 46
2.3.3 Main Window 49
2.3.4 Status Bar 49

Chapter 3 Status Screens 51

3.1 Overview 51
3.2 The Status Screen 51
3.3 Client List 54
3.4 Status: VPN Status 54
3.5 Any IP Table 54
3.6 Packet Statistics 55

Chapter 4

Internet Setup Wizard 57

4.1 Overview 57
4.2 Internet Access Wizard Setup 57

4.2.1 Manual Configuration 60

Chapter 5

Tutorials 67

5.1 Overview 67
5.2 Configuring Point-to-point Connection 67

5.2.1 Set Up the Server 68
5.2.2 Set Up the Client 69
5.2.3 Connect the P-793H v2s 69

5.3 Configuring a Point-to-2points Connection 70

5.3.1 Set up the Server 70
5.3.2 Set up the Clients 71
5.3.3 Connect the P-793H v2s 72

Part II: Technical Reference 73

Chapter 6

WAN Setup. 75

6.1 Overview 75

6.1.1 What You Can Do in the WAN Screens 75
6.1.2 What You Need to Know About WAN 76
6.1.3 Before You Begin 77

6.2 The Internet Access Setup Screen 78

6.2.1 2Wire-2Line Service Mode 82
6.2.2 Advanced Internet Access Setup 83

6.3 The More Connections Screen 86

6.3.1 More Connections Edit 87
6.3.2 Configuring More Connections Advanced Setup 90

6.4 The WAN Backup Setup Screen 92
6.5 WAN Technical Reference 93

6.5.1 Encapsulation 93
6.5.2 Multiplexing 95
6.5.3 VPI and VCI 95
6.5.4 IP Address Assignment 95
6.5.5 Nailed-Up Connection (PPP) 96
6.5.6 NAT 96

6.6 Metric 96
6.7 Traffic Redirect 97
6.8 Traffic Shaping 98
6.8.1 ATM Traffic Classes 99

Chapter 7 LAN Setup. 101

7.1 Overview 101

7.1.1 What You Can Do in the LAN Screens 101
7.1.2 What You Need To Know About LAN 102
7.1.3 Before You Begin 103

7.2 The IP Screen 103
7.2.1 The Advanced LAN IP Setup Screen 104

7.3 The DHCP Setup Screen 106
7.4 The Client List Screen 108
7.5 The IP Alias Screen 109

7.5.1 Configuring the LAN IP Alias Screen 110

7.6 LAN Technical Reference 111

7.6.1 LANs, WANs and the ZyXEL Device 111
7.6.2 DHCP Setup 112
7.6.3 DNS Server Addresses 112
7.6.4 LAN TCP/IP 113
7.6.5 RIP Setup 114
7.6.6 Multicast 114

Chapter 8 Network Address Translation (NAT) 117

8.1 Overview 117

8.1.1 What You Can Do in the NAT Screens 117
8.1.2 What You Need To Know About NAT 117

8.2 The NAT General Setup Screen 119

8.3 The Port Forwarding Screen 120

8.3.1 Configuring the Port Forwarding Screen 121
8.3.2 The Port Forwarding Rule Edit Screen 122

8.4 The Address Mapping Screen 123

8.4.1 The Address Mapping Rule Edit Screen 125

8.5 The ALG Screen 127

8.6 NAT Technical Reference 127

8.6.1 NAT Definitions 127
8.6.2 What NAT Does 128
8.6.3 How NAT Works 129
8.6.4 NAT Application 130
8.6.5 NAT Mapping Types 130

Chapter 9

Firewalls 133

9.1 Overview 133

9.1.1 What You Can Do in the Firewall Screens 133
9.1.2 What You Need to Know About Firewall 134
9.1.3 Firewall Rule Setup Example 135

9.2 The Firewall General Screen 138
9.3 The Firewall Rule Screen 140

9.3.1 Configuring Firewall Rules 142
9.3.2 Customized Services 144
9.3.3 Configuring a Customized Service 145

9.4 The Firewall Threshold Screen 145

9.4.1 Threshold Values 146
9.4.2 Configuring Firewall Thresholds 147

9.5 Firewall Technical Reference 149

9.5.1 Firewall Rules Overview 149
9.5.2 Guidelines For Enhancing Security With Your Firewall 150
9.5.3 Security Considerations 151
9.5.4 Triangle Route 151

Chapter 10

Content Filtering 155

10.1 Overview 155

10.1.1 What You Can Do in the Content Filter Screens 155
10.1.2 What You Need to Know About Content Filtering 155
10.1.3 Before You Begin 155
10.1.4 Content Filtering Example 156

10.2 The Keyword Screen 158
10.3 The Schedule Screen 159
10.4 The Trusted Screen 160

Chapter 11

VPN 161

11.1 Overview 161

11.1.1 What You Can Do in the VPN Screens 161
11.1.2 What You Need to Know About IPSec VPN 162

11.1.3 Before You Begin 163
11.2 VPN Setup Screen 163
11.3 The VPN Edit Screen 166
11.4 Configuring Advanced IKE Settings 171
11.5 Manual Key Setup 173
11.5.1 Security Parameter Index (SPI) 174
11.6 Configuring Manual Key 174
11.7 Viewing SA Monitor 177
11.8 Configuring VPN Global Setting 179
11.9 IPSec VPN Technical Reference 179
11.9.1 IPSec Architecture 180
11.9.2 IPSec and NAT 180
11.9.3 VPN, NAT, and NAT Traversal 181
11.9.4 Encapsulation 183
11.9.5 IKE Phases 184
11.9.6 Negotiation Mode 185
11.9.7 Keep Alive 185
11.9.8 Remote DNS Server 185
11.9.9 ID Type and Content 186
11.9.10 Pre-Shared Key 188
11.9.11 Diffie-Hellman (DH) Key Groups 188
11.9.12 Telecommuter VPN/IPSec Examples 188

Chapter 12

Certificates 193

12.1 Overview 193

12.1.1 What You Need to Know About Certificates 193
12.1.2 Verifying a Certificate 194

12.2 The Trusted CAs Screen 195

12.2.1 Trusted CA Import 197
12.2.2 Trusted CA Details 198

12.3 Certificates Technical Reference 200

12.3.1 Certificates Overview 200
12.3.2 Private-Public Certificates 200

Chapter 13

Static Route 203

13.1 Overview 203
13.2 The Static Route Screen 204

13.2.1 Static Route Edit 205

Chapter 14

802.1Q/1P 207

14.1 Overview 207

14.1.1 What You Can Do in the 802.1Q/1P Screens 207
14.1.2 What You Need to Know About 802.1Q/1P 207
14.1.3 802.1Q/1P Example 209

14.2 The 802.1Q/1P Group Setting Screen 213
14.2.1 Editing 802.1Q/1P Group Setting 214
14.3 The 802.1Q/1P Port Setting Screen 215

Chapter 15

Quality of Service (QoS) 217

15.1 Overview 217
15.2 QoS Overview 217

15.2.1 What You Can Do in the QoS Screens 218
15.2.2 What You Need to Know About QoS 218
15.2.3 QoS Class Setup Example 219

15.3 The QoS General Screen 223
15.4 The Class Setup Screen 224

15.4.1 The Class Configuration Screen 226

15.5 The QoS Monitor Screen 230
15.6 QoS Technical Reference 231

15.6.1 IEEE 802.1Q Tag 231
15.6.2 IP Precedence 231
15.6.3 DiffServ 232
15.6.4 Automatic Priority Queue Assignment 232

Chapter 16

Dynamic DNS Setup 235

16.1 Overview 235
16.1.1 What You Need To Know About DDNS 235
16.2 The Dynamic DNS Screen 236

Chapter 17

Remote Management 239

17.1 Overview 239

17.1.1 What You Can Do in the Remote Management Screens 240
17.1.2 What You Need to Know About Remote Management 240

17.2 The WWW Screen 241
17.2.1 Configuring the WWW Screen 241

17.3 The Telnet Screen 242
17.4 The FTP Screen 243
17.5 The SNMP Screen 244

17.5.1 Supported MIBs 246
17.5.2 SNMP Traps 246

17.5.3 Configuring SNMP 247
17.6 The DNS Screen 248
17.7 The ICMP Screen 249

Chapter 18

Universal Plug-and-Play (UPnP) 251

18.1 Overview 251

18.1.1 What You Can Do in the UPnP Screen 251
18.1.2 What You Need to Know About UPnP 251

18.2 The UPnP Screen 253
18.3 Installing UPnP in Windows Example 253
18.4 Using UPnP in Windows XP Example 257

Chapter 19

System Settings 263

19.1 Overview 263

19.1.1 What You Can Do in the System Settings Screens 263
19.1.2 What You Need to Know About System Settings 263

19.2 The General Screen 264
19.3 The Time Setting Screen 266

Chapter 20

Logs 269

20.1 Overview 269

20.1.1 What You Can Do in the Log Screens 269
20.1.2 What You Need To Know About Logs 269

20.2 The View Log Screen 270
20.3 The Log Settings Screen 271

20.4 SMTP Error Messages 273
20.4.1 Example E-mail Log 273
20.5 Log Descriptions 274

Chapter 21

Tools 283

21.1 Overview 283

21.1.1 What You Can Do in the Tool Screens 283
21.1.2 What You Need To Know About Tools 284
21.1.3 Before You Begin 285
21.1.4 Tool Examples 285

21.2 The Firmware Screen 291
21.3 The Configuration Screen 293
21.4 The Restart Screen 295

Chapter 22

Diagnostic 297

22.1 Overview 297
22.1.1 What You Can Do in the Diagnostic Screens 297
22.2 The General Diagnostic Screen 297
22.3 The DSL Line Diagnostic Screen 298

Chapter 23

Introducing the SMT 301

23.1 Accessing the SMT 301
23.2 SMT Menu Items 302
23.3 Navigating the SMT Interface 305

Chapter 24

General Setup 307

24.1 Configuring General Setup 307
24.1.1 Configuring Dynamic DNS 308

Chapter 25

WAN Setup 311

25.1 WAN Setup 311
25.1.1 2wire-2line Service Mode 313

25.2 Configuring Traffic Redirect 315

Chapter 26

LAN Setup 317

26.1 Accessing the LAN Menus 317
26.2 LAN Port Filter Setup 317
26.3 TCP/IP and DHCP Setup Menu 318
26.4 LAN IP Alias 320

Chapter 27

Internet Access Setup 321

27.1 Internet Access Setup 321

Chapter 28

Remote Node Setup 325

28.1 Introduction to Remote Node Setup 325
28.2 Remote Node Setup 325
28.3 Remote Node Profile 326
28.4 Remote Node Network Layer Options 328
28.5 Remote Node Filter 330
28.6 Remote Node ATM Layer Options 332

28.7 Advance Setup Options 333

Chapter 29

Static Route Setup 335

29.1 IP Static Route Setup 335
29.2 Bridge Static Route Setup 337

Chapter 30

NAT Setup 339

30.1 Using NAT 339

30.1.1 SUA (Single User Account) Versus NAT 339
30.1.2 Applying NAT 340

30.2 NAT Setup 341
30.2.1 Address Mapping Sets 342

30.3 Configuring a Server behind NAT 345

30.4 General NAT Examples 346

30.4.1 Internet Access Only 347
30.4.2 Example 2: Internet Access with a Default Server 348
30.4.3 Example 3: Multiple Public IP Addresses With Inside Servers 348
30.4.4 Example 4: NAT Unfriendly Application Programs 352

Chapter 31

Firewall Setup 355

31.1 Using P-793H v2 SMT Menus 355
31.1.1 Activating the Firewall 355

Chapter 32

Filter Configuration 357

32.1 Introduction to Filters 357
32.1.1 The Filter Structure of the P-793H v2 358

32.2 Configuring a Filter Set 360

32.2.1 Configuring a Filter Rule 362
32.2.2 Configuring a TCP/IP Filter Rule 362
32.2.3 Configuring a Generic Filter Rule 366

32.3 Example Filter 367
32.4 Filter Types and NAT 369
32.5 Firewall Versus Filters 370

32.6 Applying a Filter 370

32.6.1 Applying LAN Filters 370
32.6.2 Applying Remote Node Filters 371

Chapter 33

System Password 373

Chapter 34

System Information & Diagnosis 375

34.1 Introduction to System Status 375
34.2 System Status 375
34.3 System Information and Console Port Speed 377

34.3.1 System Information 378
34.3.2 Console Port Speed 379

34.4 Log and Trace 379

34.4.1 Viewing Error Log 379
34.4.2 Syslog Logging 381

34.5 Diagnostic 384

Chapter 35

Firmware and Configuration File Maintenance 387

35.1 Introduction 387
35.2 Filename Conventions 387
35.3 Backup Configuration 388

35.3.1 Backup Configuration 389
35.3.2 Using the FTP Command from the Command Line 389
35.3.3 Example of FTP Commands from the Command Line 390
35.3.4 GUI-based FTP Clients 390
35.3.5 File Maintenance Over WAN 390
35.3.6 Backup Configuration Using TFTP 391
35.3.7 TFTP Command Example 391
35.3.8 GUI-basedTFTPClients 392
35.3.9 Backup Via Console Port 392

35.4 Restore Configuration 393

35.4.1 Restore Using FTP 394
35.4.2 Restore Using FTP Session Example 395
35.4.3 Restore Via Console Port 395

35.5 Uploading Firmware and Configuration Files 396

35.5.1 Firmware File Upload 396
35.5.2 Configuration File Upload 397
35.5.3 FTP File Upload Command from the DOS Prompt Example 398
35.5.4 FTP Session Example of Firmware File Upload 398
35.5.5 TFTP File Upload 399
35.5.6 TFTP Upload Command Example 399
35.5.7 Uploading Via Console Port 400
35.5.8 Uploading Firmware File Via Console Port 400
35.5.9 Example Xmodem Firmware Upload Using HyperTerminal 401
35.5.10 Uploading Configuration File Via Console Port 401
35.5.11 Example Xmodem Configuration Upload Using HyperTerminal 402

Chapter 36

403

36.1 Command Interpreter Mode 403

36.1.1 Command Syntax 403
36.1.2 Command Usage 404

36.2 Call Control Support 404
36.2.1 Budget Management 405

36.3 Time and Date Setting 406
36.4 Remote Management 409
36.4.1 Remote Management Limitations 409

Chapter 37

Schedule Setup 411

37.1 Schedule Set Overview 411
37.2 Schedule Setup 411
37.3 Schedule Set Setup 412

Chapter 38

Troubleshooting 415

38.1 Power, Hardware Connections, and LEDs 415
38.2 P-793H v2 Access and Login 416
38.3 Internet Access 418
38.4 Network Connections 419

Appendix A Product Specifications 421
Appendix B Wall-mounting Instructions 427
Appendix C Setting up Your Computer's IP Address 429
Appendix D Pop-up Windows, JavaScripts and Java Permissions 453
Appendix E IP Addresses and Subnetting 463
Appendix F Services 473
Appendix G Legal Information 477

Index 481

List of Figures

Figure 1 High-speed Internet Access with Your P-793H v2 38
Figure 2 Point-to-point Connections with Your P-793H v2 38
Figure 3 Point-to-2points Connections with Your P-793H v2 39
Figure 4 LEDs 40
Figure 5 Login Screen 44
Figure 6 Change Password at Login 44
Figure 7 Select a Mode 45
Figure 8 Main Screen 45
Figure 9 Status Screen 51
Figure 10 Any IP Table 54
Figure 11 Packet Statistics 55
Figure 12 Select a Mode 57
Figure 13 Wizard Welcome 58
Figure 14 Auto Detection: No DSL Connection 58
Figure 15 Auto-Detection: PPPoE 59
Figure 16 Auto Detection: Failed 59
Figure 17 Internet Access Wizard Setup: ISP Parameters 60
Figure 18 Internet Connection with PPPoE 61
Figure 19 Internet Connection with RFC 1483 62
Figure 20 Internet Connection with ENET ENCAP 63
Figure 21 Internet Connection with PPPoA 64
Figure 22 Internet Access Setup Complete 65
Figure 23 WAN > Internet Access Setup 68
Figure 24 WAN > Internet Access Setup 71
Figure 25 WAN > Internet Connection > Service Type of B 72
Figure 26 WAN > Internet Connection > Service Type of C 72
Figure 27 LAN and WAN 75
Figure 28 Network > WAN >Internet Access Setup 78
Figure 29 2wire-2line Service Mode 82
Figure 30 Network > WAN > Internet Access Setup: Advanced Setup 83
Figure 31 Network > WAN > More Connections 86
Figure 32 Network > WAN > More Connections: Edit 87
Figure 33 Network > WAN > More Connections: Edit: Advanced Setup 90
Figure 34 Network > Internet (WAN) > WAN Backup 92
Figure 35 Traffic Redirect Example 97
Figure 36 Traffic Redirect LAN Setup 98
Figure 37 Example of Traffic Shaping 99
Figure 38 Network > LAN > IP 103

Figure 39 Network > LAN > IP: Advanced Setup 104
Figure 40 Network > LAN > DHCP Setup 106
Figure 41 Network > LAN > Client List 108
Figure 42 Physical Network & Partitioned Logical Networks 109
Figure 43 Network > LAN > IP Alias 110
Figure 44 LAN and WAN IP Addresses 111
Figure 45 Network > NAT > General 119
Figure 46 Multiple Servers Behind NAT Example 121
Figure 47 Network > NAT > Port Forwarding 121
Figure 48 Network > NAT > Port Forwarding: Edit 122
Figure 49 Network > NAT > Address Mapping 124
Figure 50 Network > NAT > Address Mapping: Edit 125
Figure 51 Network > NAT > ALG 127
Figure 52 How NAT Works 129
Figure 53 NAT Application With IP Alias 130
Figure 54 Default Firewall Action 133
Figure 55 Security > Firewall > General 138
Figure 56 Security > Firewall > Rules 140
Figure 57 Security > Firewall > Rules: Edit 142
Figure 58 Security > Firewall > Rules: Edit: Edit Customized Services 144
Figure 59 Security > Firewall > Rules: Edit: Edit Customized Services: Config 145
Figure 60 Three-Way Handshake 146
Figure 61 Security > Firewall > Threshold 147
Figure 62 Ideal Firewall Setup 151
Figure 63 "Triangle Route" Problem 152
Figure 64 IP Alias 153
Figure 65 Security > Content Filtering > Keyword 158
Figure 66 Security > Content Filter > Schedule 159
Figure 67 Security > Content Filter: Trusted 160
Figure 68 VPN: Example 161
Figure 69 VPN: IKE SA and IPSec SA 162
Figure 70 IPSec Summary Fields 163
Figure 71 Security >VPN > Setup 164
Figure 72 Security > VPN > Setup > Edit 166
Figure 73 Security > VPN > Setup > Edit > Advanced Setup 171
Figure 74 Security > VPN > Setup > Manual Key 174
Figure 75 Security > VPN > Monitor 178
Figure 76 Security > VPN > Global Setting 179
Figure 77 IPSec Architecture 180
Figure 78 NAT Router Between IPSec Routers 182
Figure 79 Transport and Tunnel Mode IPSec Encapsulation 183
Figure 80 Two Phases to Set Up the IPSec SA 184
Figure 81 VPN Host using Intranet DNS Server Example 186

Figure 82 Telecommuters Sharing One VPN Rule Example 189
Figure 83 Telecommuters Using Unique VPN Rules Example 190
Figure 84 Certificates Example 193
Figure 85 Remote Host Certificates 194
Figure 86 Certificate Details 195
Figure 87 Trusted CAs 196
Figure 88 Trusted CA Import 197
Figure 89 Trusted CA Details 198
Figure 90 Example of Static Routing Topology 203
Figure 91 Advanced > Static Route 204
Figure 92 Advanced > Static Route: Edit 205
Figure 93 802.1Q/1P 207
Figure 94 Advanced > 802.1Q/1P > Group Setting 213
Figure 95 Advanced > 802.1Q/1P > Group Setting > Edit 214
Figure 96 Advanced > 802.1Q/1P > Port Setting 215
Figure 97 QoS Example 220
Figure 98 QoS Class Example: VoIP -1 220
Figure 99 QoS Class Example: VoIP -2 221
Figure 100 QoS Class Example: Boss -1 221
Figure 101 QoS Class Example: Boss -2 222
Figure 102 Advanced > QoS > General 223
Figure 103 Advanced > QoS > Class Setup 224
Figure 104 Advanced > QoS > Class Setup: Edit 226
Figure 105 Advanced > QoS > Monitor 230
Figure 106 Advanced > Dynamic DNS 236
Figure 107 Remote Management From the WAN 239
Figure 108 Advanced > Remote Management > WWW 241
Figure 109 Advanced > Remote Management > Telnet 242
Figure 110 Advanced > Remote Management > FTP 243
Figure 111 SNMP Management Model 245
Figure 112 Advanced > Remote Management > SNMP 247
Figure 113 Advanced > Remote Management > DNS 248
Figure 114 Advanced > Remote Management > ICMP 249
Figure 115 Advanced > UPnP > General 253
Figure 116 Maintenance > System > General 264
Figure 117 Maintenance > System > Time Setting 266
Figure 118 Maintenance > Logs > View Log 270
Figure 119 Maintenance > Logs > Log Settings 271
Figure 120 E-mail Log Example 274
Figure 121 Restore Using FTP Session Example 286
Figure 122 FTP Session Example of Firmware File Upload 287
Figure 123 FTP Session Example 289
Figure 124 Maintenance > Tools > Firmware 291

Figure 125 Firmware Upload In Progress 292
Figure 126 Network Temporarily Disconnected 292
Figure 127 Error Message 292
Figure 128 Maintenance > Tools > Configuration 293
Figure 129 Configuration Upload Successful 294
Figure 130 Network Temporarily Disconnected 294
Figure 131 Configuration Upload Error 294
Figure 132 Reset Warning Message 295
Figure 133 Reset In Process Message 295
Figure 134 Maintenance > Tools > Restart 295
Figure 135 Maintenance > Diagnostic > General 297
Figure 136 Maintenance > Diagnostic > DSL Line 298
Figure 137 Login Screen 301
Figure 138 SMT Main Menu 302
Figure 139 Menu 1: General Setup 307
Figure 140 Menu 1.1: Configure Dynamic DNS 309
Figure 141 Menu 2: WAN Setup 311
Figure 142 Menu 2: 2wire-2line Service Mode 313
Figure 143 Menu 2.1: Traffic Redirect Setup 315
Figure 144 Menu 3: LAN Setup 317
Figure 145 Menu 3.1: LAN Port Filter Setup 317
Figure 146 Menu 3.2: TCP/IP and DHCP Ethernet Setup 318
Figure 147 Menu 3.2.1: IP Alias Setup 320
Figure 148 Menu 4: Internet Access Setup 321
Figure 149 Menu 11: Remote Node Setup 325
Figure 150 Menu 11.1: Remote Node Profile (nodes 1-7) 326
Figure 151 Menu 11.3: Remote Node Network Layer Options 328
Figure 152 Menu 11.5: Remote Node Filter 331
Figure 153 . Menu 11.6: Remote Node ATM Layer Options 332
Figure 154 Menu 11.8: Advance Setup Options 333
Figure 155 Menu 12.1: IP Static Route Setup 335
Figure 156 Menu 12.1.1: Edit IP Static Route 336
Figure 157 Menu 12.3: Bridge Static Route Setup 337
Figure 158 Menu 12.3.1: Edit Bridge Static Route 337
Figure 159 Menu 4: Applying NAT for Internet Access 340
Figure 160 Menu 11.3: Applying NAT to the Remote Node 341
Figure 161 Menu 15: NAT Setup 342
Figure 162 Menu 15.1: Address Mapping Sets 342
Figure 163 Menu 15.1.1: Address Mapping Rules 343
Figure 164 Menu 15.1.1.1: Address Mapping Rule 344
Figure 165 Menu 15.2: NAT Server Sets 345
Figure 166 Menu 15.2: NAT Server Setup 346
Figure 167 NAT Example 1 347

Figure 168 Menu 4: Internet Access & NAT Example 347
Figure 169 NAT Example 2 348
Figure 170 Menu 15.2: Specifying an Inside Server 348
Figure 171 NAT Example 3 349
Figure 172 Example 3: Menu 11.3 350
Figure 173 Example 3: Menu 15.1.1.1 351
Figure 174 Example 3: Final Menu 15.1.1 351
Figure 175 Example 3: Menu 15.2 352
Figure 176 NAT Example 4 352
Figure 177 Example 4: Menu 15.1.1.1: Address Mapping Rule 353
Figure 178 Menu 21: Filter and Firewall Setup 355
Figure 179 Menu 21.2: Firewall Setup 356
Figure 180 Outgoing Packet Filtering Process 357
Figure 181 Filter Rule Process 359
Figure 182 Menu 21: Filter and Firewall Setup 360
Figure 183 Menu 21.1: Filter Set Configuration 360
Figure 184 Menu 21.1.1: Filter Rules Summary 361
Figure 185 Menu 21.1.1.1: TCP/IP Filter Rule 363
Figure 186 Executing an IP Filter 365
Figure 187 Menu 21.1.1.1: Generic Filter Rule 366
Figure 188 Telnet Filter Example 367
Figure 189 Example Filter: Menu 21.1.3.1 368
Figure 190 Example Filter Rules Summary: Menu 21.1.3 369
Figure 191 Protocol and Device Filter Sets 370
Figure 192 Filtering LAN Traffic 371
Figure 193 Filtering Remote Node Traffic 371
Figure 194 Menu 23: System Password 373
Figure 195 Menu 24: System Maintenance 375
Figure 196 Menu 24.1: System Maintenance - Status 376
Figure 197 Menu 24.2: System Information and Console Port Speed 378
Figure 198 Menu 24.2.1: System Maintenance - Information 378
Figure 199 Menu 24.2.2: System Maintenance: Change Console Port Speed 379
Figure 200 Menu 24.3: System Maintenance - Log and Trace 380
Figure 201 Examples of Error and Information Messages 380
Figure 202 Menu 24.3.2: System Maintenance - UNIX Syslog 381
Figure 203 Menu 24.4: System Maintenance - Diagnostic 385
Figure 204 Menu 24.5: Backup Configuration 389
Figure 205 FTP Session Example 390
Figure 206 System Maintenance: Backup Configuration 392
Figure 207 System Maintenance: Starting Xmodem Download Screen 393
Figure 208 Backup Configuration Example 393
Figure 209 Successful Backup Confirmation Screen 393
Figure 210 Menu 24.6:Restore Configuration 394

Figure 211 Restore Using FTP Session Example 395
Figure 212 System Maintenance:Restore Configuration 395
Figure 213 System Maintenance: Starting Xmodem Download Screen 395
Figure 214 Restore Configuration Example 396
Figure 215 Successful Restoration Confirmation Screen 396
Figure 216 Menu 24.7.1: System Maintenance - Upload System Firmware 397
Figure 217 Menu 24.7.2: System Maintenance - Upload System Configuration File 397
Figure 218 FTP Session Example of Firmware File Upload 398
Figure 219 Menu 24.7.1 As Seen Using the Console Port 400
Figure 220 Example Xmodem Upload 401
Figure 221 Menu 24.7.2 As Seen Using the Console Port 401
Figure 222 Example Xmodem Upload 402
Figure 223 Command Mode in Menu 24 403
Figure 224 Valid Commands 404
Figure 225 Menu 24.9: System Maintenance - Call Control 405
Figure 226 Menu 24.9.1 - Budget Management 405
Figure 227 Menu 24: System Maintenance 406
Figure 228 Menu 24.10: System Maintenance - Time and Date Setting 407
Figure 229 Menu 24.11 - Remote Management Control 409
Figure 230 Menu 26: Schedule Setup 411
Figure 231 Menu 26.1: Schedule Set Setup 412
Figure 232 Y-Cable Configuration 426
Figure 233 Wall-mounting Example 427
Figure 234 Windows 95/98/Me: Network: Configuration 430
Figure 235 Windows 95/98/Me: TCP/IP Properties: IP Address 431
Figure 236 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 432
Figure 237 Windows XP: Start Menu 433
Figure 238 Windows XP: Control Panel 433
Figure 239 Windows XP: Control Panel: Network Connections: Properties 434
Figure 240 Windows XP: Local Area Connection Properties 434
Figure 241 Windows XP: Internet Protocol (TCP/IP) Properties 435
Figure 242 Windows XP: Advanced TCP/IP Properties 436
Figure 243 Windows XP: Internet Protocol (TCP/IP) Properties 437
Figure 244 Windows Vista: Start Menu 438
Figure 245 Windows Vista: Control Panel 438
Figure 246 Windows Vista: Network And Internet 438
Figure 247 Windows Vista: Network and Sharing Center 439
Figure 248 Windows Vista: Network and Sharing Center 439
Figure 249 Windows Vista: Local Area Connection Properties 440
Figure 250 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 441
Figure 251 Windows Vista: Advanced TCP/IP Properties 442
Figure 252 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 443
Figure 253 Macintosh OS 8/9: Apple Menu 444

Figure 254 Macintosh OS 8/9: TCP/IP 445
Figure 255 Macintosh OS X: Apple Menu 446
Figure 256 Macintosh OS X: Network 446
Figure 257 Red Hat 9.0: KDE: Network Configuration: Devices 447
Figure 258 Red Hat 9.0: KDE: Ethernet Device: General 448
Figure 259 Red Hat 9.0: KDE: Network Configuration: DNS 448
Figure 260 Red Hat 9.0: KDE: Network Configuration: Activate 449
Figure 261 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 449
Figure 262 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 450
Figure 263 Red Hat 9.0: DNS Settings in resolv.conf 450
Figure 264 Red Hat 9.0: Restart Ethernet Card 450
Figure 265 Red Hat 9.0: Checking TCP/IP Properties 451
Figure 266 Pop-up Blocker 453
Figure 267 Internet Options: Privacy 454
Figure 268 Internet Options: Privacy 455
Figure 269 Pop-up Blocker Settings 456
Figure 270 Internet Options: Security 457
Figure 271 Security Settings - Java Scripting 458
Figure 272 Security Settings - Java 459
Figure 273 Java (Sun) 460
Figure 274 Mozilla Firefox: Tools > Options 460
Figure 275 Mozilla Firefox Content Security 461
Figure 276 Network Number and Host ID 464
Figure 277 Subnetting Example: Before Subnetting 467
Figure 278 Subnetting Example: After Subnetting 467

List of Tables

Table 1 LEDs 40
Table 2 Web Configurator Icons in the Title Bar 46
Table 3 Navigation Panel Summary 46
Table 4 Status Screen 52
Table 5 Any IP Table 54
Table 6 Packet Statistics 55
Table 7 Internet Access Wizard Setup: ISP Parameters 60
Table 8 Internet Connection with PPPoE 62
Table 9 Internet Connection with RFC 1483 63
Table 10 Internet Connection with ENET ENCAP 64
Table 11 Internet Connection with PPPoA 65
Table 12 Network > WAN > Internet Access Setup 79
Table 13 2wire-2line Service Mode 82
Table 14 Network > WAN > Internet Access Setup: Advanced Setup 83
Table 15 Network > WAN > More Connections 86
Table 16 Network > WAN > More Connections: Edit 87
Table 17 Network > WAN > More Connections: Edit: Advanced Setup 90
Table 18 Network > Internet (WAN) > WAN Backup 92
Table 19 Network > LAN > IP 104
Table 20 Network > LAN > IP: Advanced Setup 105
Table 21 Network > LAN > DHCP Setup 107
Table 22 Network > LAN > Client List 108
Table 23 Network > LAN > IP Alias 110
Table 24 Network > NAT > General 119
Table 25 Network > NAT > Port Forwarding 122
Table 26 Network > NAT > Port Forwarding: Edit 123
Table 27 Network > NAT > Address Mapping 124
Table 28 Network > NAT > Address Mapping: Edit 126
Table 29 Network > NAT > ALG 127
Table 30 NAT Definitions 128
Table 31 NAT Mapping Types 131
Table 32 Security > Firewall > General 139
Table 33 Security > Firewall > Rules 140
Table 34 Security > Firewall > Rules: Edit 142
Table 35 Security > Firewall > Rules: Edit: Edit Customized Services 144
Table 36 Security > Firewall > Rules: Edit: Edit Customized Services: Config 145
Table 37 Security > Firewall > Threshold 147
Table 38 Security > Content Filtering > Keyword 158

Table 39 Security > Content Filter: Schedule 159
Table 40 Security > Content Filter: Trusted 160
Table 41 Security > VPN > Setup 164
Table 42 Security > VPN > Setup > Edit 166
Table 43 Security > VPN > Setup > Edit > Advanced Setup 171
Table 44 Security > VPN > Setup > Manual Key 175
Table 45 Security > VPN > Monitor 178
Table 46 Security > VPN > Global Setting 179
Table 47 VPN and NAT 181
Table 48 VPN and NAT 182
Table 49 Local ID Type and Content Fields 187
Table 50 Peer ID Type and Content Fields 187
Table 51 Matching ID Type and Content Configuration Example 188
Table 52 Mismatching ID Type and Content Configuration Example 188
Table 53 Telecommuters Sharing One VPN Rule Example 189
Table 54 Telecommuters Using Unique VPN Rules Example 190
Table 55 Trusted CAs 196
Table 56 Trusted CA Import 197
Table 57 Trusted CA Details 198
Table 58 Advanced > Static Route 204
Table 59 Advanced > Static Route: Edit 205
Table 60 Advanced > 802.1Q/1P > Group Setting 213
Table 61 Advanced > 802.1Q/1P > Group Setting > Edit 214
Table 62 Advanced > 802.1Q/1P > Port Setting 216
Table 63 Advanced > QoS > General 223
Table 64 Advanced > QoS > Class Setup 224
Table 65 Advanced > QoS > Class Setup: Edit 227
Table 66 Advanced > QoS > Monitor 230
Table 67 IEEE 802.1p Priority Level and Traffic Type 231
Table 68 Internal Layer2 and Layer3 QoS Mapping 233
Table 69 Advanced > Dynamic DNS 236
Table 70 Advanced > Remote Management > WWW 242
Table 71 Advanced > Remote Management > Telnet 243
Table 72 Advanced > Remote Management > FTP 244
Table 73 SNMP Traps 246
Table 74 Advanced > Remote Management > SNMP 247
Table 75 Advanced > Remote Management > DNS 248
Table 76 Advanced > Remote Management > ICMP 249
Table 77 Advanced > UPnP > General 253
Table 78 Maintenance > System > General 265
Table 79 Maintenance > System > Time Setting 266
Table 80 Maintenance > Logs > View Log 270
Table 81 Maintenance > Logs > Log Settings 272

Table 82 SMTP Error Messages 273
Table 83 System Maintenance Logs 274
Table 84 System Error Logs 275
Table 85 Access Control Logs 276
Table 86 TCP Reset Logs 276
Table 87 Packet Filter Logs 277
Table 88 ICMP Logs 277
Table 89 CDR Logs 278
Table 90 PPP Logs 278
Table 91 UPnP Logs 278
Table 92 Content Filtering Logs 278
Table 93 Attack Logs 279
Table 94 802.1X Logs 279
Table 95 ACL Setting Notes 280
Table 96 ICMP Notes 280
Table 97 Syslog Logs 281
Table 98 RFC-2408 ISAKMP Payload Types 282
Table 99 Filename Conventions 284
Table 100 General Commands for GUI-based FTP Clients 289
Table 101 General Commands for GUI-based TFTP Clients 290
Table 102 Maintenance > Tools > Firmware 291
Table 103 Restore Configuration 293
Table 104 Maintenance > Diagnostic > General 298
Table 105 Maintenance > Diagnostic > DSL Line 299
Table 106 Main Menu Summary 302
Table 107 SMT Menus Overview 303
Table 108 Main Menu Commands 305
Table 109 Menu 1: General Setup 307
Table 110 Menu 1.1: Configure Dynamic DNS 309
Table 111 Menu 2: WAN Setup 312
Table 112 Menu 2: 2wire-2line Service Mode 314
Table 113 Menu 2.1: Traffic Redirect Setup 315
Table 114 Menu 3.2: TCP/IP and DHCP Ethernet Setup 318
Table 115 Menu 3.2.1: IP Alias Setup 320
Table 116 Menu 4: Internet Access Setup 321
Table 117 Menu 11.1: Remote Node Profile (nodes 1-7) 326
Table 118 Menu 11.3: Remote Node Network Layer Options 328
Table 119 Menu 11.5: Remote Node Filter 331
Table 120 Menu 11.6: Remote Node ATM Layer Options 332
Table 121 Menu 11.8: Advance Setup Options 333
Table 122 Menu 12.1.1: Edit IP Static Route 336
Table 123 Menu 12.3.1: Edit Bridge Static Route 337
Table 124 Applying NAT in Menus 4 & 11.3 341

Table 125 Menu 15.1.1: Address Mapping Rules 343

Table 126 Menu 15.1.1.1: Address Mapping Rule 344

Table 127 Menu 15.2: NAT Server Setup 346

Table 128 Abbreviations Used in the Filter Rules Summary Menu 361

Table 129 Rule Abbreviations Used 362

Table 130 Menu 21.1.1.1: TCP/IP Filter Rule 363

Table 131 Menu 21.1.1.1: Generic Filter Rule 366

Table 132 Menu 23: System Password 373

Table 133 Menu 24.1: System Maintenance - Status 376

Table 134 Menu 24.2.1: System Maintenance - Information 378

Table 135 Menu 24.3.2: System Maintenance - UNIX Syslog 381

Table 136 Menu 24.4: System Maintenance - Diagnostic 385

Table 137 Filename Conventions 388

Table 138 General Commands for GUI-based FTP Clients 390

Table 139 General Commands for GUI-based TFTP Clients 392

Table 140 Menu 24.9.1 - Budget Management 405

Table 141 Menu 24.10: System Maintenance - Time and Date Setting 407

Table 142 Menu 24.11 - Remote Management Control 409

Table 143 Menu 26: Schedule Setup 412

Table 144 Menu 26.1: Schedule Set Setup 413

Table 145 Device 421

Table 146 Firmware 422

Table 147 Firmware Features 425

Table 148 Subnet Masks 464

Table 149 Subnet Masks 465

Table 150 Maximum Host Numbers 465

Table 151 Alternative Subnet Mask Notation 466

Table 152 Subnet 1 468

Table 153 Subnet 2 468

Table 154 Subnet 3 469

Table 155 Subnet 4 469

Table 156 Eight Subnets 469

Table 157 24-bit Network Number Subnet Planning 470

Table 158 16-bit Network Number Subnet Planning 470

Table 159 Examples of Services 474

PART I

User's Guide

Getting To Know Your P-793H v2

This chapter introduces the main features and applications of your P-793H v2.

1.1 Overview

The P-793H v2 is a secure G.SHDSL.bis bonded broadway gateway that provides high-speed LAN-to-LAN connection and Internet access over the your telephone. It supports symmetrical multi-rate data transmission speed that adjusts the data rate automatically according to the quality of the wire connection.

You can set up your P-793H v2 for high-speed Internet access or for high-speed point-to-point or point-to-2 points connections with other SHDSL models. The P-793H v2 can be used for either IP routing or bridging depending on your network configuration. As a router, the P-793H v2 provides features such as firewall, content filtering and bandwidth management. As a bridge, the P-793H v2 minimizes the configuration changes you have to make in your existing network.

See Appendix A on page 417 for a complete list of features you can configure on your P-793H v2.

1.1.1 High-speed Internet Access with G.SHDSL

The P-793H v2 provides high-speed G.SHDSL Internet access. The G.SHDSL (Single-pair High-speed Digital Subscriber Line) is a symmetrical, bi-directional DSL service that uses your telephone line to provide data rates up to 2.3 Mbits/sec. (The "G." in "G.SHDSL" is defined by the G.991.2 ITU (International

Telecommunication Union) state-of-the-art industry standard). Unlike ADSL or VDSL, G.SHDSL.bis supports the same high speed for transmission and receiving.

ZYXEL ARMOR Z1 NWD6605 - High-speed Internet Access with G.SHDSL - 1
Figure 1 High-speed Internet Access with Your P-793H v2

For Internet access, connect the DSL port to the phone port. Then, connect your computers or servers to the LAN ports for shared Internet access. (See the Quick Start Guide for detailed instructions about hardware connections.) Next, set up the P-793H v2 as a router or as a bridge, depending on the desired configuration.

1.1.2 High-speed Point-to-point Connections

You can use another P-793H v2 or any SHDSL device with the P-793H v2 to create a cost-effective, high-speed connection for high-bandwidth applications such as videoconferencing and distance learning.

ZYXEL ARMOR Z1 NWD6605 - High-speed Point-to-point Connections - 1
Figure 2 Point-to-point Connections with Your P-793H v2

The P-793H v2s provide a simple, fast point-to-point connection between two geographically-dispersed networks.

1.1.3 High-speed Point-to-2points Connections

Use three P-793H v2s or 2 SHDSL devices with the P-793H v2 to connect two remote networks to a central location. For example, connect the headquarters to

two branch offices. In this scenario the central P-793H v2 acts in a similar way as an Internet service provider.

Figure 3 Point-to-2points Connections with Your P-793H v2
ZYXEL ARMOR Z1 NWD6605 - High-speed Point-to-2points Connections - 1
Note: See Chapter 5 on page 67 for more information on setting up point-to-point and point-to-2points connections.

1.2 Ways to Manage the P-793H v2

Use any of the following methods to manage the P-793H v2.

  • Web Configurator. This is recommended for everyday management of the P-793H v2 using a (supported) web browser. See Chapter 2 on page 43.
  • Command Line Interface. Line commands are mostly used for troubleshooting by service engineers. See Appendix H on page 471.
  • SMT. System Management Terminal is a text-based configuration menu that you can use to configure your device. See Chapter 23 on page 301.
  • FTP. Use File Transfer Protocol for firmware upgrades and configuration backup/ restore. See Chapter 17 on page 243.
  • SNMP. The device can be monitored and/or managed by an SNMP manager. See Chapter 17 on page 243.
  • TR-069. This is a standard that defines how your P-793H v2 can be managed by a management server. See Chapter 17 on page 243.

1.3 Good Habits for Managing the P-793H v2

Do the following things regularly to make the P-793H v2 more secure and to manage the P-793H v2 more effectively.

  • Change the password. Use a password that's not easy to guess and that consists of different types of characters, such as numbers and letters.
  • Write down the password and put it in a safe place.
  • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the P-793H v2 to its factory default settings. If you backed up an earlier configuration file, you would not have to totally reconfigure the P-793H v2. You could simply restore your last configuration.

1.4 LEDs

The following figure shows the LEDs.

ZYXEL ARMOR Z1 NWD6605 - LEDs - 1
Figure 4 LEDs

The following table describes the LEDs.

Table 1 LEDs

LEDCOLORSTATUSDESCRIPTION
POWERGreenOnThe P-793H v2 is receiving power and functioning properly.
BlinkingThe P-793H v2 is rebooting or performing diagnostics.
RedOnPower to the P-793H v2 is too low.
OffThe system is not ready or has malfunctioned.
LAN 1~4GreenOnThis port has a successful Ethernet connection.
BlinkingThis port is sending/receiving data.
OffThis port is not connected.
DSL1/DSL2GreenOnThe DSL line is up.
BlinkingThe P-793H v2 is initializing the DSL line.
OffThe DSL line is down.
Note: For Internet access setup or point-to-point connections, the DSL1 and DSL2 LEDs indicate the status of a single connection (act as one LED). For point-to-2point connections, the DSL1 and DSL2 LEDs indicate the status of connection 1 and connection 2 respectively.
INTERNETGreenOnThe Internet connection is up, and the P-793H v2 has an IP address. (If the P-793H v2 uses RFC 1483 in bridge mode, this light does not turn on, but it does blink when the P-793H v2 is sending/receiving data.)
BlinkingThe P-793H v2 is sending/receiving data.
RedOnThe P-793H v2 tried to get an IP address, but an error occurred.
OffThe Internet connection is down.

1.5 The RESET Button

If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the device to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to "1234".

1.5.1 Using the RESET Button

1 Make sure the POWER LED is on (not blinking).
2 To set the device back to the factory default settings, press the RESET button for ten seconds or until the POWER LED begins to blink and then release it. When the POWER LED begins to blink, the defaults have been restored and the device restarts.

Introducing the Web Configurator

2.1 Web Configurator Overview

The web configurator is an HTML-based management interface that allows easy P-793H v2 setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.

In order to use the web configurator you need to allow:

  • Web browser pop-up windows from your device. Web pop-up blocking is enabled by default in Windows XP SP (Service Pack) 2.
  • JavaScripts (enabled by default).
  • Java permissions (enabled by default).

See the chapter on troubleshooting if you need to make sure these functions are allowed in Internet Explorer.

2.2 Accessing the Web Configurator

1 Make sure your P-793H v2 hardware is properly connected (refer to the Quick Start Guide).
2 Launch your web browser.
3 Type "192.168.1.1" as the URL.

4 A password screen displays. The P-793H v2 has a dual login system. The default non-readable characters represents the user password (user by default). Clicking Login without entering any password brings you to the system's status screen. To access the administrative web configurator and manage the P-793H v2, type the admin password (1234 by default) in the password screen and click Login. Click Cancel to revert to the default user password in the password field. If you have changed the password, enter your password and click Login.

ZYXEL ARMOR Z1 NWD6605 - Accessing the Web Configurator - 1
Figure 5 Login Screen

5 The following screen displays if you have not yet changed your password. It is strongly recommended you change the default password. Enter a new password, retype it to confirm and click Apply; alternatively click Ignore to proceed to the main menu if you do not want to change the password now.

ZYXEL ARMOR Z1 NWD6605 - Accessing the Web Configurator - 2
Figure 6 Change Password at Login

6 Select Go to Wizard setup and click Apply to display the wizard main screen. Otherwise, select Go to Advanced setup and click Apply to display the Status screen.

ZYXEL ARMOR Z1 NWD6605 - Accessing the Web Configurator - 3
Figure 7 Select a Mode

Note: For security reasons, the P-793H v2 automatically logs you out if you do not use the web configurator for five minutes (default). If this happens, log in again.

2.3 Web Configurator Main Screen

ZYXEL ARMOR Z1 NWD6605 - Web Configurator Main Screen - 1
Figure 8 Main Screen

As illustrated above, the main screen is divided into these parts:

A - title bar
B - navigation panel
C - main window
D - status bar

2.3.1 Title Bar

The title bar provides some icons in the upper right corner.

ZYXEL ARMOR Z1 NWD6605 - Title Bar - 1

The icons provide the following functions.

Table 2 Web Configurator Icons in the Title Bar

ICONDESCRIPTION
Wizards: Click this icon to go to the configuration wizards. See Chapter 5 on page 89 for more information.
Logout: Click this icon to log out of the web configurator.

2.3.2 Navigation Panel

Use the menu items on the navigation panel to open screens to configure P-793H v2 features. The following tables describe each menu item.

Table 3 Navigation Panel Summary

LINKTABFUNCTION
StatusThis screen shows the P-793H v2's general device and network status information. Use this screen to access the statistics and client list.
Network
WANInternet Access SetupUse this screen to configure ISP parameters, WAN IP address assignment, DNS servers and point-to-point or point-to-2point connections.
More ConnectionsUse this screen to configure additional WAN connections.
WAN Backup SetupUse this screen to configure your traffic redirect properties and WAN backup settings.

Table 3 Navigation Panel Summary

LINKTABFUNCTION
LANIPUse this screen to configure LAN TCP/IP settings and other advanced properties.
DHCP SetupUse this screen to configure LAN DHCP settings.
Client ListUse this screen to view current DHCP client information and to always assign specific IP addresses to individual MAC addresses (and host names).
IP AliasUse this screen to partition your LAN interface into subnets.
NATGeneralUse this screen to enable NAT.
Port ForwardingUse this screen to make your local servers visible to the outside world. This screen appears when you choose SUA Only from the NAT > General screen.
Address MappingUse this screen to configure network address translation mapping rules. This screen appears when you choose Full Feature from the NAT > General screen.
ALGUse this screen to enable or disable SIP ALG.
Security
FirewallGeneralUse this screen to activate/deactivate the firewall and the default action to take on network traffic going in specific directions.
RulesThis screen shows a summary of the firewall rules, and allows you to edit/add a firewall rule.
ThresholdUse this screen to configure the thresholds for determining when to drop sessions that do not become fully established.
Content FilterKeywordUse this screen to block access to web sites containing certain keywords in the URL.
ScheduleUse this screen to set the days and times for the P-793H v2 to perform content filtering.
TrustedUse this screen to exclude a range of users on the LAN from content filtering on your P-793H v2.
Packet FilterPacket FilterUse this screen to configure the rules for protocol and generic filter sets.
VPNSetupUse this screen to configure each VPN tunnel.
MonitorUse this screen to look at the current status of each VPN tunnel.
VPN Global SettingUse this screen to allow NetBIOS traffic through VPN tunnels.
CertificatesTrusted CAsUse this screen to import CA certificates to the P-793H v2.
Advanced

Table 3 Navigation Panel Summary

LINKTABFUNCTION
Static RouteStatic RouteUse this screen to configure IP static routes to tell your P-793H v2 about networks beyond the directly connected remote nodes.
802.1Q/1PGroup SettingUse this screen to activate 802.1Q/1P, specify the management VLAN group, display the VLAN groups and configure the settings for each VLAN group.
Port SettingUse this screen to configure the PVID and assign traffic priority for each port.
QoSGeneralUse this screen to enable QoS and traffic prioritizing, and configure bandwidth management on the WAN.
Class SetupUse this screen to define a classifier.
MonitorUse this screen to view each queue's statistics.
Dynamic DNSDynamic DNSThis screen allows you to use a static hostname alias for a dynamic IP address.
Remote MGMTWWWUse this screen to configure through which interface(s) and from which IP address(es) users can use HTTPS or HTTP to manage the P-793H v2.
TelnetUse this screen to configure through which interface(s) and from which IP address(es) users can use Telnet to manage the P-793H v2.
FTPUse this screen to configure through which interface(s) and from which IP address(es) users can use FTP to access the P-793H v2.
SNMPUse this screen to configure your P-793H v2's settings for Simple Network Management Protocol management.
DNSUse this screen to configure through which interface(s) and from which IP address(es) users can send DNS queries to the P-793H v2.
ICMPUse this screen to set whether or not your P-793H v2 will respond to pings and probes for services that you have not made available.
UPnPGeneralUse this screen to turn UPnP on or off.
Maintenance
SystemGeneralUse this screen to configure your P-793H v2's name, domain name, management inactivity timeout and password.
Time SettingUse this screen to change your P-793H v2's time and date.
LogsView LogUse this screen to display your P-793H v2's logs.
Log SettingsUse this screen to select which logs and/or immediate alerts your P-793H v2 is to record. You can also set it to e-mail the logs to you.

Table 3 Navigation Panel Summary

LINKTABFUNCTION
ToolsFirmwareUse this screen to upload firmware to your P-793H v2.
ConfigurationUse this screen to backup and restore your P-793H v2's configuration (settings) or reset the factory default settings.
RestartThis screen allows you to reboot the P-793H v2 without turning the power off.
DiagnosticGeneralUse this screen to test the connections to other devices.
DSL LineThese screen displays information to help you identify problems with the DSL connection.

2.3.3 Main Window

The main window displays information and configuration fields. It is discussed in the rest of this document.

Right after you log in, the Status screen is displayed. See Chapter 3 on page 37 for more information about the Status screen.

2.3.4 Status Bar

Check the status bar when you click Apply or OK to verify that the configuration has been updated.

Status Screens

3.1 Overview

Use the Status screens to look at the current status of the device, system resources, and interfaces (LAN and WAN). The Status screen also provides detailed information of client list, Any IP, VPN and packet statistics.

3.2 The Status Screen

Use this screen to view the status of the P-793H v2. Click Status to open this screen.

ZYXEL ARMOR Z1 NWD6605 - The Status Screen - 1
Figure 9 Status Screen

Each field is described in the following table.

Table 4 Status Screen

LABELDESCRIPTION
Refresh IntervalSelect how often you want the P-793H v2 to update this screen.
ApplyClick this to update this screen immediately.
Device Information
Host NameThis field displays the P-793H v2 system name. It is used for identification. You can change this in the Maintenance > System > General screen's System Name field.
Model NumberThis is the model name of your device.
MAC AddressThis is the MAC (Media Access Control) or Ethernet address unique to your P-793H v2.
ZyNOS Firmware VersionThis is the current version of the firmware inside the device. It also shows the date the firmware version was created. Click this to go to the screen where you can change it.
DSL Firmware VersionThis is the current version of the device's DSL modem code.
WAN Information
DSL ModeThis is the DSL standard that your P-793H v2 is using.
IP AddressThis is the current IP address of the P-793H v2 in the WAN. Click this to go to the screen where you can change it.
IP Subnet MaskThis is the current subnet mask in the WAN.
Default GatewayThis is the IP address of the default gateway, if applicable.
VPI/VCIThis is the Virtual Path Identifier and Virtual Channel Identifier that you entered in the wizard or WAN screen.
LAN Information
IP AddressThis is the current IP address of the P-793H v2 in the LAN. Click this to go to the screen where you can change it.
IP Subnet MaskThis is the current subnet mask in the LAN.
DHCPThis field displays what DHCP services the P-793H v2 is providing to the LAN. Choices are: Server - The P-793H v2 is a DHCP server in the LAN. It assigns IP addresses to other computers in the LAN. Relay - The P-793H v2 acts as a surrogate DHCP server and relays DHCP requests and responses between the remote server and the clients. None - The P-793H v2 is not providing any DHCP services to the LAN. Click this to go to the screen where you can change it.
Security
FirewallThis displays whether or not the P-793H v2's firewall is activated. Click this to go to the screen where you can change it.

Table 4 Status Screen

LABELDESCRIPTION
Content FilterThis displays whether or not the P-793H v2's content filtering is activated. Click this to go to the screen where you can change it.
System Status
System UptimeThis field displays how long the P-793H v2 has been running since it last started up. The P-793H v2 starts up when you plug it in, when you restart it (Maintenance > Tools > Restart), or when you reset it.
Current Date/TimeThis field displays the current date and time in the P-793H v2. You can change this in Maintenance > System > Time Setting.
System ModeThis displays whether the P-793H v2 is functioning as a router or a bridge.
CPU UsageThis field displays what percentage of the P-793H v2's processing ability is currently used. When this percentage is close to 100%, the P-793H v2 is running at full load, and the throughput is not going to improve anymore. If you want some applications to have more throughput, you should turn off other applications (for example, using QoS; see Chapter 15 on page 217).
Memory UsageThis field displays what percentage of the P-793H v2's memory is currently used. Usually, this percentage should not increase much. If memory usage does get close to 100%, the P-793H v2 is probably becoming unstable, and you should restart the device. See Section 21.4 on page 295, or turn off the device (unplug the power) for a few seconds.
Interface Status
InterfaceThis column displays each interface the P-793H v2 has.
StatusThis field indicates whether or not the P-793H v2 is using the interface. For the DSL interface, this field displays Down (line is down), Up (line is up or connected) if you're using Ethernet encapsulation and Down (line is down), Up (line is up or connected), Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE encapsulation. For the LAN interface, this field displays Up when the P-793H v2 is using the interface and Down when the P-793H v2 is not using the interface.
RateFor the LAN interface, this displays the port speed and duplex setting. For the DSL interface, it displays the downstream and upstream transmission rate.
Summary
Client ListClick this link to view current DHCP client information. See Section 7.4 on page 108.
VPN StatusClick this link to view the status of any VPN tunnels the P-793H v2 has negotiated. See Section 3.4 on page 54.
AnyIP TableClick this link to view a list of IP addresses and MAC addresses of computers, which are not in the same subnet as the P-793H v2. See Section 3.5 on page 54.
Packet StatisticsClick this link to view port status and packet specific statistics. See Section 3.6 on page 55.

3.3 Client List

See Section 7.4 on page 108 for information on this screen.

3.4 Status: VPN Status

See Section Figure 75 on page 178 for information on this screen.

3.5 Any IP Table

Click Status > AnyIP Table to access this screen. Use this screen to view the IP address and MAC address of each computer that is using the P-793H v2 but is in a different subnet than the P-793H v2.

ZYXEL ARMOR Z1 NWD6605 - Any IP Table - 1
Figure 10 Any IP Table

Each field is described in the following table.

Table 5 Any IP Table

LABELDESCRIPTION
#This field is a sequential value. It is not associated with a specific entry.
IP AddressThis field displays the IP address of each computer that is using the P-793H v2 but is in a different subnet than the P-793H v2.
MAC AddressThis field displays the MAC address of the computer that is using the P-793H v2 but is in a different subnet than the P-793H v2.
RefreshClick this to update this screen.

3.6 Packet Statistics

Read-only information here includes port status and packet specific statistics. Also provided are "system up time" and "poll interval(s)". The Poll Interval(s) field is configurable. Click Status > Packet Statistics to access this screen.

ZYXEL ARMOR Z1 NWD6605 - Packet Statistics - 1
Figure 11 Packet Statistics

The following table describes the fields in this screen.

Table 6 Packet Statistics

LABELDESCRIPTION
System Monitor
System up TimeThis is the elapsed time the system has been up.
Current Date/TimeThis field displays your P-793H v2's present date and time.
CPU UsageThis field specifies the percentage of CPU utilization.
Memory UsageThis field specifies the percentage of memory utilization.
WAN Port Statistics
Link StatusThis is the status of your WAN link.
WAN IP AddressThis is the IP address of the P-793H v2's WAN port.
Upstream SpeedThis is the upstream speed of your P-793H v2.
Downstream SpeedThis is the downstream speed of your P-793H v2.
Node-LinkThis field displays the remote node index number and link type. Link types are PPPoA, ENET, RFC 1483 and PPPoE.
StatusThis field displays Down (line is down), Up (line is up or connected) if you're using Ethernet encapsulation and Down (line is down), Up (line is up or connected), Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE encapsulation.
TxPktsThis field displays the number of packets transmitted on this port.
RxPktsThis field displays the number of packets received on this port.
ErrorsThis field displays the number of error packets on this port.
Tx B/sThis field displays the number of bytes transmitted in the last second.
Rx B/sThis field displays the number of bytes received in the last second.
Up TimeThis field displays the elapsed time this port has been up.
LAN Port Statistics
InterfaceThis field displays Ethernet (LAN ports).
StatusFor the LAN ports, this field displays Down (line is down) or Up (line is up or connected).
TxPktsThis field displays the number of packets transmitted on this interface.
RxPktsThis field displays the number of packets received on this interface.
CollisionsThis is the number of collisions on this interfaces.
Poll Interval(s)Type the time interval for the browser to refresh system statistics.
Set IntervalClick this to apply the new poll interval you entered in the Poll Interval field above.
StopClick this to halt the refreshing of the system statistics.

Internet Setup Wizard

4.1 Overview

Use the wizard setup screens to configure your system for Internet access with the information given to you by your ISP.

Note: See the advanced menu chapters for background information on these fields.

4.2 Internet Access Wizard Setup

1 After you enter the password to access the web configurator, select Go to Wizard setup and click Apply. Otherwise, click the wizard icon ( ) in the top right corner of the web configurator to go to the wizards.

ZYXEL ARMOR Z1 NWD6605 - Internet Access Wizard Setup - 1
Figure 12 Select a Mode

2 Click INTERNET SETUP to configure the system for Internet access.

ZYXEL ARMOR Z1 NWD6605 - Internet Access Wizard Setup - 2
Figure 13 Wizard Welcome

3 Your P-793H v2 attempts to detect your DSL connection and your connection type.

3a The following screen appears if a connection is not detected. Check your hardware connections and click Restart the INTERNET SETUP Wizard to return to the wizard welcome screen. If you still cannot connect, click Manually configure your Internet connection. Follow the directions in the wizard and enter your Internet setup information as provided to you by your ISP. See Section 4.2.1 on page 60 for more details.

ZYXEL ARMOR Z1 NWD6605 - Internet Access Wizard Setup - 3
Figure 14 Auto Detection: No DSL Connection

3b The following screen displays if a PPPoE or PPPoA connection is detected. Enter your Internet account information (username, password and/or service name) exactly as provided by your ISP. Then click Next.

ZYXEL ARMOR Z1 NWD6605 - Internet Access Wizard Setup - 4
Figure 15 Auto-Detection: PPPoE

3c The following screen appears if the ZyXEL device detects a connection but not the connection type. Click Next and refer to Section 4.2.1 on page 60 on how to manually configure the P-793H v2 for Internet access.

ZYXEL ARMOR Z1 NWD6605 - Internet Access Wizard Setup - 5
Figure 16 Auto Detection: Failed

4.2.1 Manual Configuration

1 If the P-793H v2 fails to detect your DSL connection type but the physical line is connected, enter your Internet access information in the wizard screen exactly as your service provider gave it to you. Leave the defaults in any fields for which you were not given information.

ZYXEL ARMOR Z1 NWD6605 - Manual Configuration - 1
Figure 17 Internet Access Wizard Setup: ISP Parameters

The following table describes the fields in this screen.

Table 7 Internet Access Wizard Setup: ISP Parameters

LABELDESCRIPTION
ModeSelect Routing (default) from the drop-down list box if your ISP give you one IP address only and you want multiple computers to share an Internet account. Select Bridge when your ISP provides you more than one IP address and you want the connected computers to get individual IP address from ISP's DHCP server directly. If you select Bridge, you cannot use Firewall, DHCP server and NAT on the P-793H v2.
EncapsulationSelect the encapsulation type your ISP uses from the Encapsulation drop-down list box. Choices vary depending on what you select in the Mode field. If you select Bridge in the Mode field, select either PPPoA or RFC 1483. If you select Routing in the Mode field, select PPPoA, RFC 1483, ENET ENCAP or PPPoE.

Table 7 Internet Access Wizard Setup: ISP Parameters

LABELDESCRIPTION
MultiplexingSelect the multiplexing method used by your ISP from the Multiplex drop-down list box either VC-based or LLC-based.
Virtual Circuit IDVPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual circuit. Refer to the appendix for more information.
VPIEnter the VPI assigned to you. This field may already be configured.
VCIEnter the VCI assigned to you. This field may already be configured.
BackClick this to return to the previous screen without saving.
NextClick this to continue to the next wizard screen. The next wizard screen you see depends on what protocol you chose above.
ExitClick this to close the wizard screen without saving.

2 The next wizard screen varies depending on what mode and encapsulation type you use. All screens shown are with routing mode. Configure the fields and click Next to continue.

ZYXEL ARMOR Z1 NWD6605 - Manual Configuration - 2
Figure 18 Internet Connection with PPPoE

The following table describes the fields in this screen.

Table 8 Internet Connection with PPPoE

LABELDESCRIPTION
User NameEnter the user name exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
PasswordEnter the password associated with the user name above.
Service NameType the name of your PPPoE service here.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
ExitClick this to close the wizard screen without saving.

ZYXEL ARMOR Z1 NWD6605 - Manual Configuration - 3
Figure 19 Internet Connection with RFC 1483

The following table describes the fields in this screen.

Table 9 Internet Connection with RFC 1483

LABELDESCRIPTION
IP AddressThis field is available if you select Routing in the Mode field. Type your ISP assigned IP address in this field.
BackClick this to return to the previous screen without saving.
NextClick this to continue to the next wizard screen.
ExitClick this to close the wizard screen without saving.

ZYXEL ARMOR Z1 NWD6605 - Manual Configuration - 4
Figure 20 Internet Connection with ENET ENCAP

The following table describes the fields in this screen.

Table 10 Internet Connection with ENET ENCAP

LABELDESCRIPTION
Obtain an IP Address AutomaticallyA static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Select Obtain an IP Address Automatically if you have a dynamic IP address.
Static IP AddressSelect Static IP Address if your ISP gave you an IP address to use.
IP AddressEnter your ISP assigned IP address.
Subnet MaskEnter a subnet mask in dotted decimal notation. Refer to the appendix to calculate a subnet mask If you are implementing subnetting.
Gateway IP addressYou must specify a gateway IP address (supplied by your ISP) when you use ENET Encapsulation field in the previous screen.
First DNS ServerEnter the IP addresses of the DNS servers. The DNS servers are passed to the DHCP clients along with the IP address and the subnet mask.
Second DNS ServerAs above.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
ExitClick this to close the wizard screen without saving.

ZYXEL ARMOR Z1 NWD6605 - Manual Configuration - 5
Figure 21 Internet Connection with PPPoA

The following table describes the fields in this screen.

Table 11 Internet Connection with PPPoA

LABELDESCRIPTION
User NameEnter the login name that your ISP gives you.
PasswordEnter the password associated with the user name above.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
ExitClick this to close the wizard screen without saving.

3 Use the read-only summary table to check whether what you have configured is correct. Click Finish to complete and save the wizard setup.

ZYXEL ARMOR Z1 NWD6605 - Manual Configuration - 6
Figure 22 Internet Access Setup Complete

4 Launch your web browser and navigate to www.zyxel.com. Internet access is just the beginning. Refer to the rest of this guide for more detailed information on the complete range of P-793H v2 features. If you cannot access the Internet, open the web configurator again to confirm that the Internet settings you configured in the wizard setup are correct.

5.1 Overview

This chapter describes:

  • Configuring Point-to-point Connection, see page 67
  • Configuring a Point-to-2points Connection, see page 70

Note: The tutorials featured in this chapter require a basic understanding of connecting to and using the Web Configurator on your P-793H v2. For details, see the included Quick Start Guide. For field descriptions of individual screens, see the related technical reference in this User's Guide.

5.2 Configuring Point-to-point Connection

In this scenario, Company A wants to set up a point-to-point connection with its branch office B by using two P-793H v2s. The two P-793H v2s are directly connected together through their DSL ports. The P-793H v2 on A's side is the server and the P-793H v2 on B's side is the client. The maximum transfer rate for the DSL connection between A and B is 5696 Kbps and the minimum transfer rate is 3200 Kbps.

ZYXEL ARMOR Z1 NWD6605 - Configuring Point-to-point Connection - 1

To set up the point-to-point connection between A and B , you need to:

1 Set Up the Server.

2 Set Up the Client.
3 Connect the P-793H v2s.

5.2.1 Set Up the Server

1 Log in to the server P-793H v2 of Company A.
2 Click Network > WAN > Internet Access Setup.
3 Configure the Internet Access Setup screen as the following. Select ATM as the Transfer Mode. Select Bridge as the Mode. Configure the Multiplexing,

Encapsulation, VPI, and VCI fields for the point-to-point connection. Select 1 in the Line field as the DSL line you want the P-793H v2 to use as a default for outgoing traffic.

4 Then configure the Service Type section. Select 2 wire in the Service Mode field. In the Service Type field, select Server. Select 5696 as the Transfer Max Rate and 3200 as the Transfer Min Rate. Leave the rest of the fields set to their default settings. Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Set Up the Server - 1
Figure 23 WAN > Internet Access Setup

5.2.2 Set Up the Client

1 Log in to the client P-793H v2 of branch office B.
2 Click Network > WAN > Internet Access Setup.
3 Select ATM as the Transfer Mode. Select Bridge as the Mode. Set the Multiplexing, Encapsulation, VPI, and VCI to the same values you set in the server. Select 1 in the Line field as the DSL line you want the P-793H v2 to use as a default for outgoing traffic.
4 Scroll down to the Service Type section. In the Service Mode field, select 2 wire, the same type of connection you selected for the server. In the Service Type field, select Client. The rest of the fields will be negotiated with the server. Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Set Up the Client - 1

5.2.3 Connect the P-793H v2s

Connect the DSL ports on the P-793H v2s together, and wait while the P-793H v2s automatically establish the connection. When the connection is established, the DSL1, DSL2, and INTERNET lights are on. It takes up to half a minute to establish the connection. If the P-793H v2s do not establish the connection, verify that the settings (except the Service Type) match.

5.3 Configuring a Point-to-2points Connection

Now Company A has another branch office, C and wants to set up a point-to-2points connection between a server P-793H v2 on A's side and client P-793H v2s at B and C. The maximum transfer rate for the DSL connection between A and B is 5696 Kbps and the minimum transfer rate is 3200 Kbps. The maximum transfer rate for the DSL connection between A and C is 2560 Kbps and minimum transfer rate is 1280 Kbps.

ZYXEL ARMOR Z1 NWD6605 - Configuring a Point-to-2points Connection - 1

To set up the point-to-2 point connection between A , B and C you need to:

1 Set up the Server.
2 Set up the Clients.
3 Connect the P-793H v2s.

5.3.1 Set up the Server

1 Log in to the server P-793H v2 of Company A.
2 Click Network > WAN > Internet Access Setup.

3 Configure the Internet Access Setup screen as the following. Select ATM as the Transfer Mode. Select Bridge as the Mode. Configure the Multiplexing, Encapsulation, VPI, and VCI fields for the point-to-point connection. Select 1 in the Line field as the DSL line you want the P-793H v2 to use as a default for outgoing traffic.
4 Then configure the Service Type section. Select 2 wire-2 line in the Service Mode field. In the Service Type field, select Server. For Line1 configuration, select 5696 as the Transfer Max Rate and 3200 as the Transfer Min Rate. For Line2 configuration, select 2560 as the Transfer Max Rate and 1280 as the Transfer Min Rate. Leave the rest of the fields to their default settings. Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Set up the Server - 1
Figure 24 WAN > Internet Access Setup

5.3.2 Set up the Clients

1 Log in to the client P-793H v2 of branch office B.
2 Click Network > WAN > Internet Access Setup.

3 Select ATM as the Transfer Mode. Set the VPI, VCI, Multiplexing, and Encapsulation to the same values you set in the server.
4 Scroll down to the Service Type section. In the Service Mode field, select 2 wire. In the Service Type field, select Client. The rest of the fields will be negotiated with the server. Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Set up the Clients - 1
Figure 25 WAN > Internet Connection > Service Type of B

5 Repeat the above steps 1 to 4 for the second client P-793H v2 on C's side. The Service Type should look like the following.

ZYXEL ARMOR Z1 NWD6605 - Set up the Clients - 2
Figure 26 WAN > Internet Connection > Service Type of C

5.3.3 Connect the P-793H v2s

Connect the DSL ports on the P-793H v2s together, and wait while the P-793H v2s automatically establish the connection. Make sure that the Y-cable is connected to the proper DSL outlets. The Y-cable connector marked DSL1 must be connected to the outgoing DSL 1 telephone jack and the Y-cable connector marked DSL2 must be connected to the outgoing DSL 2 telephone jack.

When the connection is established, the DSL1, DSL2, and INTERNET lights turn on. It takes up to half a minute to establish the connection. If the P-793H v2s do not establish the connection, verify that the settings are correct.

PART II

Technical Reference

6.1 Overview

This chapter describes how to configure WAN settings from the WAN screens. Use these screens to configure your P-793H v2 for Internet access.

A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks (such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 27 LAN and WAN

6.1.1 What You Can Do in the WAN Screens

  • Use the Internet Access Setup screen (Section 6.2 on page 78) to configure the WAN settings on the P-793H v2 for Internet access.
  • Use the More Connections screen (Section 6.3 on page 86) to set up additional Internet access connections.
  • Use the WAN Backup Setup screen (Section 6.4 on page 92) to set up a backup gateway that helps forward traffic to its destination when the default WAN connection is down.

6.1.2 What You Need to Know About WAN

Encapsulation Method

Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider). If your ISP offers a dial-up Internet connection using PPPoE (PPP over Ethernet) or PPPoA, they should also provide a username and password (and service name) for user authentication.

WAN IP Address

The WAN IP address is an IP address for the P-793H v2, which makes it accessible from an outside network. It is used by the P-793H v2 to communicate with other devices in other networks. It can be static (fixed) or dynamically assigned by the ISP each time the P-793H v2 tries to access the Internet.

If your ISP assigns you a static WAN IP address, they should also assign you the subnet mask and DNS server IP address(es) (and a gateway IP address if you use the Ethernet or ENET Encapsulation method).

ATM

Asynchronous Transfer Mode (ATM) is a LAN and WAN networking technology that provides high-speed data transfer. ATM uses fixed-size packets of information called cells. With ATM, a high QoS (Quality of Service) can be guaranteed. ATM uses a connection-oriented model and establishes a virtual circuit (VC) between two endpoints before the actual data exchange begins.

PTM

Packet Transfer Mode (PTM) is packet-oriented and supported by the VDSL2 standard. In PTM, packets are encapsulated directly in the High-level Data Link Control (HDLC) frames. It is designed to provide a low-overhead, transparent way of transporting packets over DSL links, as an alternative to ATM.

Multicast

Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just one.

IGMP

IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data. There are three versions of IGMP. IGMP version 2 and 3 are improvements over version 1, but IGMP version 1 and 2 are still in wide use.

Finding Out More

See Section 6.5 on page 93 for technical background information on WAN.

6.1.3 Before You Begin

You need to know your Internet access settings such as encapsulation and WAN IP address. Get this information from your ISP.

6.2 The Internet Access Setup Screen

Use this screen to change your P-793H v2's WAN settings. Click Network > WAN > Internet Access Setup. The screen differs by the WAN type and encapsulation you select.

ZYXEL ARMOR Z1 NWD6605 - The Internet Access Setup Screen - 1
Figure 28 Network > WAN > Internet Access Setup

The following table describes the labels in this screen.

Table 12 Network > WAN > Internet Access Setup

LABELDESCRIPTION
General
Transfer ModeSelect the transfer mode you want to use.PTM(Packet Transfer Mode):The P-793H v2 uses the SHDSL technology for data transmission over the DSL port.ATM(Asynchronous Transfer Mode):The P-793H v2 uses the ADSL technology for data transmission over the DSL port.
ModeSelect Routing (default) from the drop-down list box if your ISP gives you one IP address only and you want multiple computers to share an Internet account. Select Bridge when your ISP provides you more than one IP address and you want the connected computers to get individual IP address from ISP's DHCP server directly. If you select Bridge, you cannot use Firewall, DHCP server and NAT on the P-793H v2.
EncapsulationSelect the method of encapsulation used by your ISP from the drop-down list box. Choices vary depending on the mode you select in the Mode field.If you select Bridge in the Mode field, select either PPPoA or RFC 1483.If you select Routing in the Mode field, select PPPoA, RFC 1483,ENET ENCAP or PPPoE.If you set up a point-to-point or a point-to-2points connection, select either ENET ENCAP or RFC 1483.
User Name(PPPoA and PPPoE encapsulation only) Enter the user name exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
Password(PPPoA and PPPoE encapsulation only) Enter the password associated with the user name above.
Service Name(PPPoE only) Type the name of your PPPoE service here.
MultiplexingSelect the method of multiplexing used by your ISP from the drop-down list. Choices are VC or LLC.This is available only when you select ATM in the Transfer Mode field.
Virtual Circuit IDVPI(Virtual Path Identifier) and VCI(Virtual Channel Identifier) define a virtual circuit. Refer to the appendix for more information.This is available only when you select ATM in the Transfer Mode field.
VPIThe valid range for the VPI is 0 to 255. Enter the VPI assigned to you.
VCIThe valid range for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Enter the VCI assigned to you.
Tag VLAN ID for egree packetsSelect this option to add the VLAN tag (specified below) to the outgoing traffic through this connection. This is available only when you select PTM in the Transfer Mode field.
Enter 802.1P PriorityIEEE 802.1p defines up to 8 separate traffic types by inserting a tag into a MAC-layer frame that contains bits to define class of service. Type the IEEE 802.1p priority level (from 0 to 7) to add to traffic through this connection. The greater the number, the higher the priority level.
Enter 802.1Q VLAN IDType the VLAN ID number (from 1 to 4094) for traffic through this connection.
LineSelect the DSL line you want the P-793H v2 to use as a default for outgoing traffic (remote node 1).
IP AddressThis option is available if you select Routing in the Mode field. A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet. Select Obtain an IP Address Automatically if you have a dynamic IP address; otherwise select Static IP Address and type your ISP assigned IP address in the IP Address field below.
Subnet MaskThis option is available if you select ENET ENCAP in the Encapsulation field. Enter a subnet mask in dotted decimal notation.
Gateway IP addressThis option is available if you select ENET ENCAP in the Encapsulation field. Specify a gateway IP address (supplied by your ISP).
DNS Server
First DNS Server Second DNS Server Third DNS ServerSelect Obtained From ISP if your ISP dynamically assigns DNS server information (and the P-793H v2's WAN IP address) and you select Obtain an IP Address Automatically. Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. If you chose User-Defined, but leave the IP address set to 0.0.0.0, User-Defined changes to None after you click Apply. If you set a second choice to User-Defined, and enter the same IP address, the second User-Defined changes to None after you click Apply. Select None if you do not want to configure DNS servers. You must have another DNS server on your LAN, or else the computers must have their DNS server addresses manually configured. If you do not configure a DNS server, you must know the IP address of a computer in order to access it.
Connection (PPPoA and PPPoE encapsulation only)
Nailed-Up ConnectionSelect Nailed-Up Connection when you want your connection up all the time. The P-793H v2 will try to bring up the connection automatically if it is disconnected.
Connect on DemandSelect Connect on Demand when you don't want the connection up all the time and specify an idle time-out in the Max Idle Timeout field.
Max Idle TimeoutSpecify an idle time-out in the Max Idle Timeout field when you select Connect on Demand. The default setting is 0, which means the Internet session will not timeout.
Service Type
Service ModeSelect 2-wire, 4-wire or 2wire-2line mode for the DSL connection. This is depends on the network configuration you want to set up and the phone lines you use. Service mode affects the maximum speed of the connection. In 2-wire mode, the maximum data rate is up to 5.69 Mbps, while in 4-wire mode, the maximum data rate is up to 11.38 Mbps. In 2wire-2line mode the maximum data rate is 5.69 Mbps for each line. See Section 6.2.1 on page 82 for more information on configuring 2wire-2line mode.
Service TypeIndicate whether the P-793H v2 is the server or the client in the DSL connection. Select Server if this P-793H v2 is the server in a point-to-point application. Otherwise, select Client. This field is not configurable if you select 2wire-2line mode because the ZyXEL Device is automatically set to Server.
Enable Rate AdaptionThis field is enabled if Service Type is Server. Indicate whether or not the P-793H v2 can adjust the speed of its connection to that of the other device.
Transfer Max Rate (Kbps)This field is enabled if Service Type is Server. Set the maximum rate at which the P-793H v2 sends and receives information. The actual transfer rate will be between this value and the minimum transfer rate you configure.When you select 4-wire in the Service Mode field, then the transfer rate you set here is doubled. For example, select 5696 Kbps to configure a maximum transfer rate of 11392 Kbps.
Transfer Min Rate (Kbps)This field is enabled if Service Type is Server. Set the minimum rate at which the P-793H v2 sends and receives information. The actual transfer rate will be between this value and the maximum transfer rate you configure.When you select 4-wire in the Service Mode field, then the transfer rate you set here is doubled. For example, select 192 Kbps to configure a minimum transfer rate of 384 Kbps.
Standard ModeThis field is enabled if Service Type is Server. Select the operational mode the P-793H v2 uses in the DSL connection. ANSI (ANNEX_A) refers to connections over POTS and ETSI (ANNEX_B) refers to connections over ISDN lines.
ModulationSelect the modulation supported by your ISP.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
Advanced SetupClick this to display the Advanced WAN Setup screen and edit more details of your WAN setup.

6.2.1 2Wire-2Line Service Mode

The Service Mode section of the Internet Connection screen allows you to set up two DSL connections when you select 2wire-2line mode. This allows you to create a point-to-2points configuration.

ZYXEL ARMOR Z1 NWD6605 - 2Wire-2Line Service Mode - 1
Figure 29 2wire-2line Service Mode

The following table describes the labels in this screen.

Table 13 2wire-2line Service Mode

LABELDESCRIPTION
Service Type
Service ModeSelect 2wire-2line mode for the DSL connection. This means that the P-793H v2 is going to be a server connected to two client P-793H v2s.
Service TypeWhen you select 2wire-2line mode this field automatically changes to Server.
Line1 / Line 2You can configure different connection rate settings for Line 1 and Line 2 DSL connections.
Enable Rate AdaptionIndicate whether or not the P-793H v2 can adjust the speed of its connection to that of the other device.
Transfer Max Rate (Kbps)This field is enabled if Service Type is Server. Set the maximum rate at which the P-793H v2 sends and receives information. The actual transfer rate will be between this value and the minimum transfer rate you configure.
Transfer Min Rate (Kbps)This field is enabled if Service Type is Server. Set the minimum rate at which the P-793H v2 sends and receives information. The actual transfer rate will be between this value and the maximum transfer rate you configure.
Standard ModeSelect the operational mode the P-793H v2 uses in the DSL connection. Annex A refers to connections over POTS and Annex B refers to connections over ISDN lines.
ApplyClick Apply to save the changes.
CancelClick Cancel to begin configuring this screen afresh.
Advanced SetupClick this button to display the Advanced WAN Setup screen and edit more details of your WAN setup.

6.2.2 Advanced Internet Access Setup

Use this screen to edit your P-793H v2's advanced WAN settings. Click the Advanced Setup button in the Internet Access Setup screen. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - Advanced Internet Access Setup - 1
Figure 30 Network > WAN > Internet Access Setup: Advanced Setup

The following table describes the labels in this screen.

Table 14 Network > WAN > Internet Access Setup: Advanced Setup

LABELDESCRIPTION
RIP & Multicast SetupThis section is not available when you configure the P-793H v2 to be in bridge mode.
RIP DirectionRIP (Routing Information Protocol) allows a router to exchange routing information with other routers. Use this field to control how much routing information the P-793H v2 sends and receives on the subnet. Select the RIP direction from None, Both, In Only and Out Only.
RIP VersionThis field is not configurable if you select None in the RIP Direction field. Select the RIP version from RIP-1, RIP-2B and RIP-2M.
MulticastMulticast packets are sent to a group of computers on the LAN and are an alternative to unicast packets (packets sent to one computer) and broadcast packets (packets sent to every computer). Internet Group Multicast Protocol (IGMP) is a network-layer protocol used to establish membership in a multicast group. The P-793H v2 supports IGMP-v1, IGMP-v2 and IGMP-v3. Select None to disable it.
ATM QoS
ATM QoS TypeSelect CBR (Continuous Bit Rate) to specify fixed (always-on) bandwidth for voice or data traffic. Select UBR (Unspecified Bit Rate) for applications that are non-time sensitive, such as e-mail. Select VBR-RT (real-time Variable Bit Rate) type for applications with bursty connections that require closely controlled delay and delay variation. Select VBR-nRT (non real-time Variable Bit Rate) type for connections that do not require closely controlled delay and delay variation.
Peak Cell RateDivide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell Rate (PCR). This is the maximum rate at which the sender can send cells. Type the PCR here.
Sustain Cell RateThe Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be transmitted. Type the SCR, which must be less than the PCR. Note that system default is 0 cells/sec.
Maximum Burst SizeMaximum Burst Size (MBS) refers to the maximum number of cells that can be sent at the peak rate. Type the MBS, which is less than 65535.
PPPoE Passthrough (PPPoE encapsulation only)This field is available when you select PPPoE encapsulation. In addition to the P-793H v2's built-in PPPoE client, you can enable PPPoE pass through to allow up to ten hosts on the LAN to use PPPoE client software on their computers to connect to the ISP via the P-793H v2. Each host can have a separate account and a public WAN IP address. PPPoE pass through is an alternative to NAT for application where NAT is not appropriate. Disable PPPoE pass through if you do not need to allow hosts on the LAN to use PPPoE client software on their computers to connect to the ISP.
MTU
MTUThe Maximum Transmission Unit (MTU) defines the size of the largest packet allowed on an interface or connection. Enter the MTU in this field.For ENET ENCAP, the MTU value is 1500.For PPPoE, the MTU value is 1492.For PPPoA and RFC 1483, the MTU is 65535.
Packet Filter
Incoming Filter Sets
Protocol FilterSelect the protocol filter(s) to control incoming traffic. You may choose up to 4 sets of filters.You can configure packet filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Generic FilterSelect the generic filter(s) to control incoming traffic. You may choose up to 4 sets of filters.You can configure generic filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Outgoing Filter Sets
Protocol FilterSelect the protocol filter(s) to control outgoing traffic. You may choose up to 4 sets of filters.You can configure protocol filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Generic FilterSelect the generic filter(s) to control outgoing traffic. You may choose up to 4 sets of filters.You can configure generic filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

6.3 The More Connections Screen

The P-793H v2 allows you to configure more than one Internet access connection. To configure additional Internet access connections click Network > WAN > More Connections. The screen differs by the encapsulation you select. When you use the WAN > Internet Access Setup screen to set up Internet access, you are configuring the first WAN connection.

ZYXEL ARMOR Z1 NWD6605 - The More Connections Screen - 1
Figure 31 Network > WAN > More Connections

The following table describes the labels in this screen.

Table 15 Network > WAN > More Connections

LABELDESCRIPTION
#This is an index number indicating the number of the corresponding connection.
ActiveThis field indicates whether the connection is active or not.
NameThis is the name you gave to the Internet connection.
VPI/VCIThis field displays the Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) numbers configured for this WAN connection.
EncapsulationThis field indicates the encapsulation method of the Internet connection.
ModifyThe first (ISP) connection is read-only in this screen. Use the WAN > Internet Access Setup screen to edit it. Click the Edit icon to edit the Internet connection settings. Click this icon on an empty configuration to add a new Internet access setup. Click the Remove icon to delete the Internet access setup from your connection list.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

6.3.1 More Connections Edit

Use this screen to configure a connection. Click the edit icon in the More Connections screen to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - More Connections Edit - 1
Figure 32 Network > WAN > More Connections: Edit

The following table describes the labels in this screen.

Table 16 Network > WAN > More Connections: Edit

LABELDESCRIPTION
General
ActiveSelect the check box to activate or clear the check box to deactivate this connection.
NameEnter a unique, descriptive name of up to 13 ASCII characters for this connection.
ModeSelect Routing from the drop-down list box if your ISP allows multiple computers to share an Internet account. If you select Bridge, the P-793H v2 will forward any packet that it does not route to this remote node; otherwise, the packets are discarded.
EncapsulationSelect the method of encapsulation used by your ISP from the drop-down list box. Choices vary depending on the mode you select in the Mode field.If you select Bridge in the Mode field, select either PPPoA or RFC 1483.If you select Routing in the Mode field, select PPPoA, RFC 1483, ENET ENCAP or PPPoE.If you set up a point-to-point connection, select either ENET ENCAP or RFC 1483.
User Name(PPPoA and PPPoE encapsulation only) Enter the user name exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
Password(PPPoA and PPPoE encapsulation only) Enter the password associated with the user name above.
Service Name(PPPoE only) Type the name of your PPPoE service here.
MultiplexingSelect the method of multiplexing used by your ISP from the drop-down list. Choices are VC or LLC.By prior agreement, a protocol is assigned a specific virtual circuit, for example, VC1 will carry IP. If you select VC, specify separate VPI and VCI numbers for each protocol.For LLC-based multiplexing or PPP encapsulation, one VC carries multiple protocols with protocol identifying information being contained in each packet header. In this case, only one set of VPI and VCI numbers need be specified for all protocols.
VPIThe valid range for the VPI is 0 to 255. Enter the VPI assigned to you.
VCIThe valid range for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Enter the VCI assigned to you.
LineSelect the DSL line you want the P-793H v2 to use as a default for outgoing traffic (remote node 1).
IP AddressThis option is available if you select Routing in the Mode field.A static IP address is a fixed IP that your ISP gives you. A dynamic IP address is not fixed; the ISP assigns you a different one each time you connect to the Internet.If you use the encapsulation type except RFC 1483, select Obtain an IP Address Automatically when you have a dynamic IP address; otherwise select Static IP Address and type your ISP assigned IP address in the IP Address field below.If you use RFC 1483, enter the IP address given by your ISP in the IP Address field.
Subnet MaskEnter a subnet mask in dotted decimal notation.
Gateway IP addressSpecify a gateway IP address (supplied by your ISP).
Connection
Nailed-Up ConnectionSelect Nailed-Up Connection when you want your connection up all the time. The P-793H v2 will try to bring up the connection automatically if it is disconnected.
Connect on DemandSelect Connect on Demand when you don't want the connection up all the time and specify an idle time-out in the Max Idle Timeout field.
Max Idle TimeoutSpecify an idle time-out in the Max Idle Timeout field when you select Connect on Demand. The default setting is 0, which means the Internet session will not timeout.
NATSUA only is available only when you select Routing in the Mode field. Select SUA Only if you have one public IP address and want to use NAT. Click Edit Detail to go to the Port Forwarding screen to edit a server mapping set. Otherwise, select None to disable NAT.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
Advanced SetupClick this to display the More Connections Advanced Setup screen and edit more details of your WAN setup.

6.3.2 Configuring More Connections Advanced Setup

Use this screen to edit your P-793H v2's advanced WAN settings. Click the Advanced Setup button in the More Connections Edit screen. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - Configuring More Connections Advanced Setup - 1
Figure 33 Network > WAN > More Connections: Edit: Advanced Setup

The following table describes the labels in this screen.

Table 17 Network > WAN > More Connections: Edit: Advanced Setup

LABELDESCRIPTION
RIP & Multicast SetupThis section is not available when you configure the P-793H v2 to be in bridge mode.
RIP DirectionSelect the RIP direction from None, Both, In Only and Out Only.
RIP VersionSelect the RIP version from RIP-1, RIP-2B and RIP-2M.
MulticastIGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group. The P-793H v2 supports IGMP-v1, IGMP-v2 and IGMP-v3. Select None to disable it.
ATM QoS
ATM QoS TypeSelect CBR (Continuous Bit Rate) to specify fixed (always-on) bandwidth for voice or data traffic. Select UBR (Unspecified Bit Rate) for applications that are non-time sensitive, such as e-mail. Select VBR-nRT (Variable Bit Rate-non Real Time) or VBR-RT (Variable Bit Rate-Real Time) for bursty traffic and bandwidth sharing with other applications.
Peak Cell RateDivide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell Rate (PCR). This is the maximum rate at which the sender can send cells. Type the PCR here.
Sustain Cell RateThe Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be transmitted. Type the SCR, which must be less than the PCR. Note that system default is 0 cells/sec.
Maximum Burst SizeMaximum Burst Size (MBS) refers to the maximum number of cells that can be sent at the peak rate. Type the MBS, which is less than 65535.
MTU
MTUThe Maximum Transmission Unit (MTU) defines the size of the largest packet allowed on an interface or connection. Enter the MTU in this field. For ENET ENCAP, the MTU value is 1500. For PPPoE, the MTU value is 1492. For PPPoA and RFC, the MTU is 65535.
Packet Filter
Incoming Filter Sets
Protocol FilterSelect the protocol filter(s) to control incoming traffic. You may choose up to 4 sets of filters. You can configure packet filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Generic FilterSelect the generic filter(s) to control incoming traffic. You may choose up to 4 sets of filters. You can configure generic filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Outgoing Filter Sets
Protocol FilterSelect the protocol filter(s) to control outgoing traffic. You may choose up to 4 sets of filters. You can configure protocol filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Generic FilterSelect the generic filter(s) to control outgoing traffic. You may choose up to 4 sets of filters. You can configure generic filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

6.4 The WAN Backup Setup Screen

Use this screen to configure your P-793H v2's WAN backup. Click Network > WAN > WAN Backup Setup. This screen is not available if you set the WAN type to Ethernet in the Internet Access Setup screen.

ZYXEL ARMOR Z1 NWD6605 - The WAN Backup Setup Screen - 1
Figure 34 Network > Internet (WAN) > WAN Backup

The following table describes the labels in this screen.

Table 18 Network > Internet (WAN) > WAN Backup

LABELDESCRIPTION
Backup TypeSelect the method that the P-793H v2 uses to check the DSL connection.
Select DSL Link to have the P-793H v2 check if the connection to the DSLAM is up. Select ICMP to have the P-793H v2 periodically ping the IP addresses configured in the Check WAN IP Address fields.
Check WAN IP Address1-3Configure this field to test your P-793H v2's WAN accessibility. Type the IP address of a reliable nearby computer (for example, your ISP's DNS server address).
If you activate either traffic redirect or dial backup, you must configure at least one IP address here.
When using a WAN backup connection, the P-793H v2 periodically pings the addresses configured here and uses the other WAN backup connection (if configured) if there is no response.
Fail ToleranceType the number of times (2 recommended) that your P-793H v2 may ping the IP addresses configured in the Check WAN IP Address field without getting a response before switching to a WAN backup connection (or a different WAN backup connection).

Table 18 Network > Internet (WAN) > WAN Backup

LABELDESCRIPTION
Recovery IntervalWhen the P-793H v2 is using a lower priority connection (usually a WAN backup connection), it periodically checks whether or not it can use a higher priority connection.Type the number of seconds (30 recommended) for the P-793H v2 to wait between checks. Allow more time if your destination IP address handles lots of traffic.
TimeoutType the number of seconds (3 recommended) for your P-793H v2 to wait for a ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request. The WAN connection is considered "down" after the P-793H v2 times out the number of times specified in the Fail Tolerance field. Use a higher value in this field if your network is busy or congested.
Traffic RedirectTraffic redirect forwards traffic to a backup gateway when the P-793H v2 cannot connect to the Internet.
Active Traffic RedirectSelect this check box to have the P-793H v2 use traffic redirect if the normal WAN connection goes down.Note: If you activate traffic redirect, you must configure at least one Check WAN IP Address.
MetricThis field sets this route's priority among the routes the P-793H v2 uses.The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number greater than "15" means the link is down. The smaller the number, the lower the "cost".
Backup GatewayType the IP address of your backup gateway in dotted decimal notation. The P-793H v2 automatically forwards traffic to this IP address if the P-793H v2's Internet connection terminates.
ApplyClick Apply to save the changes.
CancelClick Cancel to begin configuring this screen afresh.

6.5 WAN Technical Reference

This section provides some technical background information about the topics covered in this chapter.

6.5.1 Encapsulation

Be sure to use the encapsulation method required by your ISP. The P-793H v2 supports the following methods.

6.5.1.1 ENETENCAP

The MAC Encapsulated Routing Link Protocol (ENET ENCAP) is only implemented with the IP network protocol. IP packets are routed between the Ethernet interface and the WAN interface and then formatted so that they can be understood in a bridged environment. For instance, it encapsulates routed Ethernet frames into bridged ATM cells. ENET ENCAP requires that you specify a gateway IP address in the Gateway IP Address field in the wizard or WAN screen. You can get this information from your ISP.

6.5.1.2 PPP over Ethernet

The P-793H v2 supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF Draft standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPPoE option is for a dial-up connection using PPPoE.

For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for example RADIUS).

One of the benefits of PPPoE is the ability to let you access one of multiple network services, a function known as dynamic service selection. This enables the service provider to easily create and offer new IP services for individuals.

Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires no specific configuration of the broadband modem at the customer site.

By implementing PPPoE directly on the P-793H v2 (rather than individual computers), the computers on the LAN do not need PPPoE software installed, since the P-793H v2 does that part of the task. Furthermore, with NAT, all of the LANs' computers will have access.

6.5.1.3 PPPoA

PPPoA stands for Point to Point Protocol over ATM Adaptation Layer 5 (AAL5). A PPPoA connection functions like a dial-up Internet connection. The P-793H v2 encapsulates the PPP session based on RFC1483 and sends it through an ATM PVC (Permanent Virtual Circuit) to the Internet Service Provider's (ISP) DSLAM (Digital Subscriber Line (DSL) Access Multiplexer). Please refer to RFC 2364 for more information on PPPoA. Refer to RFC 1661 for more information on PPP.

6.5.1.4 RFC 1483

RFC 1483 describes two methods for Multiprotocol Encapsulation over ATM Adaptation Layer 5 (AAL5). The first method allows multiplexing of multiple protocols over a single ATM virtual circuit (LLC-based multiplexing) and the second

method assumes that each protocol is carried over a separate ATM virtual circuit (VC-based multiplexing). Please refer to RFC 1483 for more detailed information.

6.5.2 Multiplexing

There are two conventions to identify what protocols the virtual circuit (VC) is carrying. Be sure to use the multiplexing method required by your ISP.

VC-based Multiplexing

In this case, by prior mutual agreement, each protocol is assigned to a specific virtual circuit; for example, VC1 carries IP, etc. VC-based multiplexing may be dominant in environments where dynamic creation of large numbers of ATM VCs is fast and economical.

LLC-based Multiplexing

In this case one VC carries multiple protocols with protocol identifying information being contained in each packet header. Despite the extra bandwidth and processing overhead, this method may be advantageous if it is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on the number of simultaneous VCs.

6.5.3 VPI and VCI

Be sure to use the correct Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) numbers assigned to you. The valid range for the VPI is 0 to 255 and for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Please see the appendix for more information.

6.5.4 IP Address Assignment

A static IP is a fixed IP that your ISP gives you. A dynamic IP is not fixed; the ISP assigns you a different one each time. The Single User Account feature can be enabled or disabled if you have either a dynamic or static IP. However the encapsulation method assigned influences your choices for IP address and ENET EncAP gateway.

IP Assignment with PPPoA or PPPoE Encapsulation

If you have a dynamic IP, then the IP Address and Gateway IP Address fields are not applicable (N/A). If you have a static IP, then you only need to fill in the IP Address field and not the Gateway IP Address field.

IP Assignment with RFC 1483 Encapsulation

In this case the IP address assignment must be static.

IP Assignment with ENET EncAP Encapsulation

In this case you can have either a static or dynamic IP. For a static IP you must fill in all the IP Address and Gateway IP Address fields as supplied by your ISP. However for a dynamic IP, the P-793H v2 acts as a DHCP client on the WAN port and so the IP Address and Gateway IP Address fields are not applicable (N/A) as the DHCP server assigns them to the P-793H v2.

6.5.5 Nailed-Up Connection (PPP)

A nailed-up connection is a dial-up line where the connection is always up regardless of traffic demand. The P-793H v2 does two things when you specify a nailed-up connection. The first is that idle timeout is disabled. The second is that the P-793H v2 will try to bring up the connection when turned on and whenever the connection is down. A nailed-up connection can be very expensive for obvious reasons.

Do not specify a nailed-up connection unless your telephone company offers flat-rate service or you need a constant connection and the cost is of no concern.

6.5.6 NAT

NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.

6.6 Metric

The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number greater than "15" means the link is down. The smaller the number, the lower the "cost".

The metric sets the priority for the P-793H v2's routes to the Internet. If any two of the default routes have the same metric, the P-793H v2 uses the following predefined priorities:

  • Normal route: designated by the ISP (see Section 6.2 on page 78)
    Traffic-redirect route (see Section 6.7 on page 97)

For example, if the normal route has a of "1" and the traffic-direct route has a metric of "2", then the normal route acts as the primary default route. If the normal route fails to connect to the Internet, the P-793H v2 tries the traffic-direct route next.

If you want the traffic-redirect route route to take priority over the normal route, all you need to do is set the traffic-redirect route's metric to "1" and the normal route to "2".

IP Policy Routing overrides the default routing behavior and takes priority over all of the routes mentioned above.

6.7 Traffic Redirect

Traffic redirect forwards traffic to a backup gateway when the P-793H v2 cannot connect to the Internet. An example is shown in the figure below.

ZYXEL ARMOR Z1 NWD6605 - Traffic Redirect - 1
Figure 35 Traffic Redirect Example

The following network topology allows you to avoid triangle route security issues when the backup gateway is connected to the LAN. Use IP alias to configure the LAN into two or three logical networks with the P-793H v2 itself as the gateway for each LAN network. Put the protected LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another subnet (Subnet 2). Configure filters

that allow packets from the protected LAN (Subnet 1) to the backup gateway (Subnet 2).

ZYXEL ARMOR Z1 NWD6605 - Traffic Redirect - 2
Figure 36 Traffic Redirect LAN Setup

6.8 Traffic Shaping

Traffic Shaping is an agreement between the carrier and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network. This agreement helps eliminate congestion, which is important for transmission of real time data such as audio and video connections.

Peak Cell Rate (PCR) is the maximum rate at which the sender can send cells. This parameter may be lower (but not higher) than the maximum line speed. 1 ATM cell is 53 bytes (424 bits), so a maximum speed of 832Kbps gives a maximum PCR of 1962 cells/sec. This rate is not guaranteed because it is dependent on the line speed.

Sustained Cell Rate (SCR) is the mean cell rate of each bursty traffic source. It specifies the maximum average rate at which cells can be sent over the virtual connection. SCR may not be greater than the PCR.

Maximum Burst Size (MBS) is the maximum number of cells that can be sent at the PCR. After MBS is reached, cell rates fall below SCR until cell rate averages to the SCR again. At this time, more cells (up to the MBS) can be sent at the PCR again.

If the PCR, SCR or MBS is set to the default of "0", the system will assign a maximum value that correlates to your upstream line rate.

The following figure illustrates the relationship between PCR, SCR and MBS.

ZYXEL ARMOR Z1 NWD6605 - Traffic Shaping - 1
Figure 37 Example of Traffic Shaping

6.8.1 ATM Traffic Classes

These are the basic ATM traffic classes defined by the ATM Forum Traffic Management 4.0 Specification.

Constant Bit Rate (CBR)

Constant Bit Rate (CBR) provides fixed bandwidth that is always available even if no data is being sent. CBR traffic is generally time-sensitive (doesn't tolerate delay). CBR is used for connections that continuously require a specific amount of bandwidth. A PCR is specified and if traffic exceeds this rate, cells may be dropped. Examples of connections that need CBR would be high-resolution video and voice.

Variable Bit Rate (VBR)

The Variable Bit Rate (VBR) ATM traffic class is used with bursty connections. Connections that use the Variable Bit Rate (VBR) traffic class can be grouped into real time (VBR-RT) or non-real time (VBR-nRT) connections.

The VBR-RT (real-time Variable Bit Rate) type is used with bursty connections that require closely controlled delay and delay variation. It also provides a fixed amount of bandwidth (a PCR is specified) but is only available when data is being sent. An example of an VBR-RT connection would be video conferencing. Video conferencing requires real-time data transfers and the bandwidth requirement varies in proportion to the video image's changing dynamics.

The VBR-nRT (non real-time Variable Bit Rate) type is used with bursty connections that do not require closely controlled delay and delay variation. It is commonly used for "bursty" traffic typical on LANs. PCR and MBS define the burst

levels, SCR defines the minimum level. An example of an VBR-nRT connection would be non-time sensitive data file transfers.

Unspecified Bit Rate (UBR)

The Unspecified Bit Rate (UBR) ATM traffic class is for bursty data transfers. However, UBR doesn't guarantee any bandwidth and only delivers traffic when the network has spare bandwidth. An example application is background file transfer.

LAN Setup

7.1 Overview

A Local Area Network (LAN) is a shared communication system to which many networking devices are connected. It is usually located in one immediate area such as a building or floor of a building.

Use the LAN screens to help you configure a LAN DHCP server and manage IP addresses.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1

7.1.1 What You Can Do in the LAN Screens

  • Use the IP screen (Section 7.2 on page 103) to set the LAN IP address and subnet mask of your ZyXEL device. You can also edit your P-793H v2's RIP, multicast, any IP and Windows Networking settings from this screen.
  • Use the DHCP Setup screen (Section 7.3 on page 106) to configure the ZyXEL Device's DHCP settings.
  • Use the Client List screen (Section 7.4 on page 108) to assign IP addresses on the LAN to specific individual computers based on their MAC Addresses.
  • Use the IP Alias screen (Section 7.5 on page 109) to change your P-793H v2's IP alias settings.

7.1.2 What You Need To Know About LAN

IP Address

IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts.

Subnet Mask

Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.

DHCP

A DHCP (Dynamic Host Configuration Protocol) server can assign your P-793H v2 an IP address, subnet mask, DNS and other routing information when it's turned on.

RIP

RIP (Routing Information Protocol) allows a router to exchange routing information with other routers.

Multicast

Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1.

IGMP

IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data. There are three versions of IGMP. IGMP version 2 and 3 are improvements over version 1, but IGMP version 1 is still in wide use.

DNS

DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a networking device before you can access it.

Finding Out More

See Section 7.6 on page 111 for technical background information on LANs.

7.1.3 Before You Begin

Find out the MAC addresses of your network devices if you intend to add them to the DHCP Client List screen.

7.2 The IP Screen

Use this screen to set the Local Area Network IP address and subnet mask of your P-793H v2. Click Network > LAN to open the IP screen.

Follow these steps to configure your LAN settings.

1 Enter an IP address into the IP Address field. The IP address must be in dotted decimal notation. This will become the IP address of your P-793H v2.
2 Enter the IP subnet mask into the IP Subnet Mask field. Unless instructed otherwise it is best to leave this alone, the configurator will automatically compute a subnet mask based upon the IP address you entered.
3 Click Apply to save your settings.

ZYXEL ARMOR Z1 NWD6605 - The IP Screen - 1
Figure 38 Network > LAN > IP

The following table describes the fields in this screen.

Table 19 Network > LAN > IP

LABELDESCRIPTION
IP AddressEnter the LAN IP address you want to assign to your P-793H v2 in dotted decimal notation, for example, 192.168.1.1 (factory default).
IP Subnet MaskType the subnet mask of your network in dotted decimal notation, for example 255.255.255.0 (factory default). Your P-793H v2 automatically computes the subnet mask based on the IP Address you enter, so do not change this field unless you are instructed to do so.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
Advanced SetupClick this to display the Advanced LAN Setup screen and edit more details of your LAN setup.

7.2.1 The Advanced LAN IP Setup Screen

Use this screen to edit your P-793H v2's RIP, multicast, Any IP and Windows Networking settings. Click the Advanced Setup button in the LAN IP screen. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The Advanced LAN IP Setup Screen - 1
Figure 39 Network > LAN > IP: Advanced Setup

The following table describes the labels in this screen.

Table 20 Network > LAN > IP: Advanced Setup

LABELDESCRIPTION
RIP & Multicast Setup
RIP DirectionSelect the RIP direction from None, Both, In Only and Out Only.
RIP VersionSelect the RIP version from RIP-1, RIP-2B and RIP-2M.
MulticastIGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group. The P-793H v2 supports IGMP-v1, IGMP-v2 and IGMP-v3. Select None to disable it.
Any IP Setup
ActiveSelect the Active check box to enable the Any IP feature. This allows a computer to access the Internet via the P-793H v2 without changing the network settings (such as IP address and subnet mask) of the computer, even when the IP addresses of the computer and the P-793H v2 are not in the same subnet.When you disable the Any IP feature, only computers with dynamic IP addresses or static IP addresses in the same subnet as the P-793H v2's LAN IP address can connect to the P-793H v2 or access the Internet through the P-793H v2.Note: You must enable NAT/SUA in the NAT screen to use the Any IP feature on the P-793H v2
Windows Networking (NetBIOS over TCP/IP)NetBIOS (Network Basic Input/Output System) are TCP or UDP packets that enable a computer to connect to and communicate with a LAN. For some dial-up services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls. However it may sometimes be necessary to allow NetBIOS packets to pass through to the WAN in order to find a computer on the WAN.
Allow between LAN and WANSelect this check box to forward NetBIOS packets from the LAN to the WAN and from the WAN to the LAN. If your firewall is enabled with the default policy set to block WAN to LAN traffic, you also need to enable the default WAN to LAN firewall rule that forwards NetBIOS traffic.Clear this check box to block all NetBIOS packets going from the LAN to the WAN and from the WAN to the LAN.
Packet Filter
Incoming Filter Sets
Protocol FilterSelect the protocol filter(s) to control incoming traffic. You may choose up to 4 sets of filters.You can configure packet filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Generic FilterSelect the generic filter(s) to control incoming traffic. You may choose up to 4 sets of filters.You can configure generic filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.

Table 20 Network > LAN > IP: Advanced Setup

LABELDESCRIPTION
Outgoing Filter Sets
Protocol FilterSelect the protocol filter(s) to control outgoing traffic. You may choose up to 4 sets of filters.You can configure protocol filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
Generic FilterSelect the generic filter(s) to control outgoing traffic. You may choose up to 4 sets of filters.You can configure generic filters in the Packet Filter screen. See Chapter 12 on page 217 for more details.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

7.3 The DHCP Setup Screen

Use this screen to configure the DNS server information that the P-793H v2 sends to the DHCP client devices on the LAN. Click Network > DHCP Setup to open this screen.

ZYXEL ARMOR Z1 NWD6605 - The DHCP Setup Screen - 1
Figure 40 Network > LAN > DHCP Setup

The following table describes the labels in this screen.

Table 21 Network > LAN > DHCP Setup

LABELDESCRIPTION
DHCP Setup
DHCPIf set to Server, your P-793H v2 can assign IP addresses, an IP default gateway and DNS servers to Windows 95, Windows NT and other systems that support the DHCP client. If set to None, the DHCP server will be disabled. If set to Relay, the P-793H v2 acts as a surrogate DHCP server and relays DHCP requests and responses between the remote server and the clients. Enter the IP address of the actual, remote DHCP server in the Remote DHCP Server field in this case. When DHCP is used, the following items need to be set:
IP Pool Starting AddressThis field specifies the first of the contiguous addresses in the IP address pool.
Pool SizeThis field specifies the size, or count of the IP address pool.
Remote DHCP ServerIf Relay is selected in the DHCP field above then enter the IP address of the actual remote DHCP server here.
DNS Server
DNS Servers Assigned by DHCP ServerThe P-793H v2 passes a DNS (Domain Name System) server IP address to the DHCP clients.
First DNS Server Second DNS Server Third DNS ServerSelect Obtained From ISP if your ISP dynamically assigns DNS server information (and the P-793H v2's WAN IP address). Select UserDefined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. If you chose UserDefined, but leave the IP address set to 0.0.0.0, UserDefined changes to None after you click Apply. If you set a second choice to UserDefined, and enter the same IP address, the second UserDefined changes to None after you click Apply. Select DNS Relay to have the P-793H v2 act as a DNS proxy only when the ISP uses IPCP DNS server extensions. The P-793H v2's LAN IP address displays in the field to the right (read-only). The P-793H v2 tells the DHCP clients on the LAN that the P-793H v2 itself is the DNS server. When a computer on the LAN sends a DNS query to the P-793H v2, the P-793H v2 forwards the query to the real DNS server learned through IPCP and relays the response back to the computer. You can only select DNS Relay for one of the three servers; if you select DNS Relay for a second or third DNS server, that choice changes to None after you click Apply. Select None if you do not want to configure DNS servers. You must have another DHCP sever on your LAN, or else the computers must have their DNS server addresses manually configured. If you do not configure a DNS server, you must know the IP address of a computer in order to access it.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

7.4 The Client List Screen

This table allows you to assign IP addresses on the LAN to specific individual computers based on their MAC Addresses.

Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.

Use this screen to change your P-793H v2's static DHCP settings. Click Network > LAN > Client List to open the following screen.

ZYXEL ARMOR Z1 NWD6605 - The Client List Screen - 1
Figure 41 Network > LAN > Client List

The following table describes the labels in this screen.

Table 22 Network > LAN > Client List

LABELDESCRIPTION
IP AddressEnter the IP address that you want to assign to the computer on your LAN with the MAC address that you will also specify.
MAC AddressEnter the MAC address of a computer on your LAN.
AddClick this to add a static DHCP entry.
#This is the index number of the static IP table entry (row).
StatusThis field displays whether the client is connected to the P-793H v2.
Host NameThis field displays the computer host name.
IP AddressThis field displays the IP address relative to the # field listed above.
MAC AddressThe MAC (Media Access Control) or Ethernet address on a LAN (Local Area Network) is unique to your computer (six pairs of hexadecimal notation).A network interface card such as an Ethernet adapter has a hardwired address that is assigned at the factory. This address follows an industry standard that ensures no other adapter has a similar address.
ReserveSelect the check box in the heading row to automatically select all check boxes or select the check box(es) in each entry to have the P-793H v2 always assign the selected entry(ies)'s IP address(es) to the corresponding MAC address(es) (and host name(s)). You can select up to 10 entries in this table.

Table 22 Network > LAN > Client List

LABELDESCRIPTION
ModifyClick the modify icon to have the IP address field editable and change it.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
RefreshClick this to reload the DHCP table.

7.5 The IP Alias Screen

IP alias allows you to partition a physical network into different logical networks over the same Ethernet interface. The P-793H v2 supports three logical LAN interfaces via its single physical Ethernet interface with the P-793H v2 itself as the gateway for each LAN network.

When you use IP alias, you can also configure firewall rules to control access between the LAN's logical networks (subnets).

Note: Make sure that the subnets of the logical networks do not overlap.

The following figure shows a LAN divided into subnets A, B, and C.

ZYXEL ARMOR Z1 NWD6605 - The IP Alias Screen - 1
Figure 42 Physical Network & Partitioned Logical Networks

7.5.1 Configuring the LAN IP Alias Screen

Use this screen to change your P-793H v2's IP alias settings. Click Network > LAN > IP Alias to open the following screen.

ZYXEL ARMOR Z1 NWD6605 - Configuring the LAN IP Alias Screen - 1
Figure 43 Network > LAN > IP Alias

The following table describes the labels in this screen.

Table 23 Network > LAN > IP Alias

LABELDESCRIPTION
IP Alias 1, 2Select the check box to configure another LAN network for the P-793H v2.
IP AddressEnter the IP address of your P-793H v2 in dotted decimal notation. Alternatively, click the right mouse button to copy and/or paste the IP address.
IP Subnet MaskYour P-793H v2 will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the P-793H v2.
RIP DirectionRIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to exchange routing information with other routers. The RIP Direction field controls the sending and receiving of RIP packets. Select the RIP direction from Both/In Only/Out Only/None. When set to Both or Out Only, the P-793H v2 will broadcast its routing table periodically. When set to Both or In Only, it will incorporate the RIP information that it receives; when set to None, it will not send any RIP packets and will ignore any RIP packets received.

Table 23 Network > LAN > IP Alias

LABELDESCRIPTION
RIP VersionThe RIP Version field controls the format and the broadcasting method of the RIP packets that the P-793H v2 sends (it recognizes both formats when receiving). RIP-1 is universally supported but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology. Both RIP-2B and RIP-2M sends the routing data in RIP-2 format; the difference being that RIP-2B uses subnet broadcasting while RIP-2M uses multicast. Multicasting can reduce the load on non-router machines since they generally do not listen to the RIP multicast address and so will not receive the RIP packets. However, if one router uses multicast, then all routers on your network must use multicast, also. By default, RIP direction is set to Both and the Version set to RIP-1.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

7.6 LAN Technical Reference

This section provides some technical background information about the topics covered in this chapter.

7.6.1 LANs, WANs and the ZyXEL Device

The actual physical connection determines whether the P-793H v2 ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next.

ZYXEL ARMOR Z1 NWD6605 - LANs, WANs and the ZyXEL Device - 1
Figure 44 LAN and WAN IP Addresses

7.6.2 DHCP Setup

DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the P-793H v2 as a DHCP server or disable it. When configured as a server, the P-793H v2 provides the TCP/IP configuration for the clients. If you turn DHCP service off, you must have another DHCP server on your LAN, or else the computer must be manually configured.

IP Pool Setup

The P-793H v2 is pre-configured with a pool of IP addresses for the DHCP clients (DHCP Pool). See the product specifications in the appendices. Do not assign static IP addresses from the DHCP pool to your LAN computers.

7.6.3 DNS Server Addresses

DNS (Domain Name System) maps a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The DNS server addresses you enter when you set up DHCP are passed to the client machines along with the assigned IP address and subnet mask.

There are two ways that an ISP disseminates the DNS server addresses.

  • The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, enter them in the DNS Server fields in the DHCP Setup screen.
  • Some ISPs choose to disseminate the DNS server addresses using the DNS server extensions of IPCP (IP Control Protocol) after the connection is up. If your ISP did not give you explicit DNS servers, chances are the DNS servers are conveyed through IPCP negotiation. The P-793H v2 supports the IPCP DNS server extensions through the DNS proxy feature.

If the DNS Server fields in the DHCP Setup screen are set to DNS Relay, the P-793H v2 tells the DHCP clients that it itself is the DNS server. When a computer sends a DNS query to the P-793H v2, the P-793H v2 acts as a DNS proxy and forwards the query to the real DNS server learned through IPCP and relays the response back to the computer.

Please note that DNS proxy works only when the ISP uses the IPCP DNS server extensions. It does not mean you can leave the DNS servers out of the DHCP setup under all circumstances. If your ISP gives you explicit DNS servers, make sure that you enter their IP addresses in the DHCP Setup screen.

7.6.4 LAN TCP/IP

The P-793H v2 has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability.

IP Address and Subnet Mask

Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number.

Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.

If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0 and you must enable the Network Address Translation (NAT) feature of the P-793H v2. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. Let's say you select 192.168.1.0 as the network number; which covers 254 individual addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network.

Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your P-793H v2, but make sure that no other device on your network is using that IP address.

The subnet mask specifies the network number portion of an IP address. Your P-793H v2 will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the P-793H v2 unless you are instructed to do otherwise.

Private IP Addresses

Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks:

10.0.0.0 -10.255.255.255
172.16.0.0 - 172.31.255.255

  • 192.168.0.0 — 192.168.255.255

You can obtain your IP address from the IANA, from an ISP or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.

Note: Regardless of your particular situation, do not create an arbitrary IP address; always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, "Address Allocation for Private Internets" and RFC 1466, "Guidelines for Management of IP Address Space".

7.6.5 RIP Setup

RIP (Routing Information Protocol) allows a router to exchange routing information with other routers. The RIP Direction field controls the sending and receiving of RIP packets. When set to:

  • Both - the P-793H v2 will broadcast its routing table periodically and incorporate the RIP information that it receives.
  • In Only - the P-793H v2 will not send any RIP packets but will accept all RIP packets received.
  • Out Only - the P-793H v2 will send out RIP packets but will not accept any RIP packets received.
  • None - the P-793H v2 will not send any RIP packets and will ignore any RIP packets received.

The Version field controls the format and the broadcasting method of the RIP packets that the P-793H v2 sends (it recognizes both formats when receiving). RIP-1 is universally supported; but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you have an unusual network topology.

Both RIP-2B and RIP-2M sends the routing data in RIP-2 format; the difference being that RIP-2B uses subnet broadcasting while RIP-2M uses multicasting.

7.6.6 Multicast

Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1.

IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data. IGMP version 2 (RFC 2236) is an improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use. IGMP version 3 supports source filtering, reporting or ignoring traffic from specific source address to a particular host on the network. If you would like to read more detailed information about interoperability between IGMP version 2 and version 1, please see sections 4 and 5 of RFC 2236. The class D IP address is used to identify host groups and can be in the range 224.0.0.0 to 239.255.255.255. The address 224.0.0.0 is not assigned to any group and is used by IP multicast computers. The address 224.0.0.1 is used for query messages and is assigned to the permanent group of all IP hosts (including gateways). All hosts must join the 224.0.0.1 group in order to participate in IGMP. The address 224.0.0.2 is assigned to the multicast routers group.

The P-793H v2 supports IGMP version 1 (IGMP-v1), IGMP version 2 (IGMP-v2) and IGMP version 3 (IGMP-v3). At start up, the P-793H v2 queries all directly connected networks to gather group membership. After that, the P-793H v2 periodically updates this information. IP multicasting can be enabled/disabled on the P-793H v2 LAN and/or WAN interfaces in the web configurator (LAN; WAN). Select None to disable IP multicasting on these interfaces.

Network Address Translation (NAT)

8.1 Overview

This chapter discusses how to configure NAT on the P-793H v2. NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.

8.1.1 What You Can Do in the NAT Screens

  • Use the General screen (Section 8.2 on page 119) to configure the NAT setup settings.
  • Use the Port Forwarding screen (Section 8.3 on page 120) to configure forward incoming service requests to the server(s) on your local network.
  • Use the Address Mapping screen (Section 8.4 on page 123) to change your P-793H v2's address mapping settings.
  • Use the ALG screen (Section 8.5 on page 127) to enable and disable the SIP (VoIP) ALG in the P-793H v2.

8.1.2 What You Need To Know About NAT

Inside/Outside

Inside/outside denotes where a host is located relative to the P-793H v2, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.

Global/Local

Global/local denotes the IP address of a host in a packet as the packet traverses a router, for example, the local address refers to the IP address of a host when the packet is in the local network, while the global address refers to the IP address of the host when the same packet is traveling in the WAN side.

NAT

In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host.

Port Forwarding

A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make visible to the outside world even though NAT makes your whole inside network appear as a single computer to the outside world.

SUA (Single User Account) Versus NAT

SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server. The P-793H v2 also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types as outlined in Table 31 on page 131.

  • Choose SUA Only if you have just one public WAN IP address for your P-793H v2.
  • Choose Full Feature if you have multiple public WAN IP addresses for your P-793H v2.

Finding Out More

See Section 8.6 on page 127 for advanced technical information on NAT.

8.2 The NAT General Setup Screen

Use this screen to activate NAT. Click Network > NAT to open the following screen.

Note: You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the P-793H v2.

ZYXEL ARMOR Z1 NWD6605 - The NAT General Setup Screen - 1
Figure 45 Network > NAT > General

The following table describes the labels in this screen.

Table 24 Network > NAT > General

LABELDESCRIPTION
Active Network Address Translation (NAT)Select this check box to enable NAT.
SUA OnlySelect this radio button if you have just one public WAN IP address for your P-793H v2.
Full FeatureSelect this radio button if you have multiple public WAN IP addresses for your P-793H v2.
Max NAT/ Firewall Session Per UserWhen computers use peer to peer applications, such as file sharing applications, they need to establish NAT sessions. If you do not limit the number of NAT sessions a single client can establish, this can result in all of the available NAT sessions being used. In this case, no additional NAT sessions can be established, and users may not be able to access the Internet. Each NAT session establishes a corresponding firewall session. Use this field to limit the number of NAT/ Firewall sessions client computers can establish through the P-793H v2. If your network has a small number of clients using peer to peer applications, you can raise this number to ensure that their performance is not degraded by the number of NAT sessions they can establish. If your network has a large number of users using peer to peer applications, you can lower this number to ensure no single client is exhausting all of the available NAT sessions.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

8.3 The Port Forwarding Screen

Note: This screen is available only when you select SUA only in the NAT > General screen.

Use this screen to forward incoming service requests to the server(s) on your local network.

You may enter a single port number or a range of port numbers to be forwarded, and the local IP address of the desired server. The port number identifies a service; for example, web service is on port 80 and FTP on port 21. In some cases, such as for unknown services or where one server can support more than one service (for example both FTP and web service), it might be better to specify a range of port numbers. You can allocate a server IP address that corresponds to a port or a range of ports.

The most often used port numbers and services are shown in Appendix F on page 473. Please refer to RFC 1700 for further information about port numbers.

Note: Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP.

Default Server IP Address

In addition to the servers for specified services, NAT supports a default server IP address. A default server receives packets from ports that are not specified in this screen.

Note: If you do not assign a Default Server IP address, the P-793H v2 discards all packets received for ports that are not specified here or in the remote management setup.

Configuring Servers Behind Port Forwarding (Example)

Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet.

ZYXEL ARMOR Z1 NWD6605 - Configuring Servers Behind Port Forwarding (Example) - 1
Figure 46 Multiple Servers Behind NAT Example

8.3.1 Configuring the Port Forwarding Screen

Click Network > NAT > Port Forwarding to open the following screen.

See Appendix F on page 473 for port numbers commonly used for particular services.

ZYXEL ARMOR Z1 NWD6605 - Configuring the Port Forwarding Screen - 1
Figure 47 Network > NAT > Port Forwarding

The following table describes the fields in this screen.

Table 25 Network > NAT > Port Forwarding

LABELDESCRIPTION
Default Server Setup
Default ServerIn addition to the servers for specified services, NAT supports a default server. A default server receives packets from ports that are not specified in this screen. If you do not assign a Default Server IP address, the P-793H v2 discards all packets received for ports that are not specified here or in the remote management setup.
Port Forwarding
Service NameSelect a service from the drop-down list box.
Server IP AddressEnter the IP address of the server for the specified service.
AddClick this button to add a rule to the table below.
#This is the rule index number (read-only).
ActiveThis field indicates whether the rule is active or not.Clear the check box to disable the rule. Select the check box to enable it.
Service NameThis is a service's name.
Start PortThis is the first port number that identifies a service.
End PortThis is the last port number that identifies a service.
Server IP AddressThis is the server's IP address.
ModifyClick the edit icon to go to the screen where you can edit the port forwarding rule.Click the delete icon to delete an existing port forwarding rule. Note that subsequent address mapping rules move up by one when you take this action.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

8.3.2 The Port Forwarding Rule Edit Screen

Use this screen to edit a port forwarding rule. Click the rule's edit icon in the Port Forwarding screen to display the screen shown next.

ZYXEL ARMOR Z1 NWD6605 - The Port Forwarding Rule Edit Screen - 1
Figure 48 Network > NAT > Port Forwarding: Edit

The following table describes the fields in this screen.

Table 26 Network > NAT > Port Forwarding: Edit

LABELDESCRIPTION
ActiveClick this check box to enable the rule.
Service NameEnter a name to identify this port-forwarding rule.
Start PortEnter a port number in this field. To forward only one port, enter the port number again in the End Port field. To forward a series of ports, enter the start port number here and the end port number in the End Port field.
End PortEnter a port number in this field. To forward only one port, enter the port number again in the Start Port field above and then enter it again in this field. To forward a series of ports, enter the last port number in a series that begins with the port number in the Start Port field above.
Server IP AddressEnter the inside IP address of the server here.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

8.4 The Address Mapping Screen

Note: The Address Mapping screen is available only when you select Full Feature in the NAT > General screen.

Ordering your rules is important because the P-793H v2 applies the rules in the order that you specify. When a rule matches the current packet, the P-793H v2 takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules. For example, if you have already configured rules 1 to 6 in your current set and now you configure rule number 9. In the set summary screen, the new rule will be rule 7, not 9. Now if you delete rule 4, rules 5 to 7 will be pushed up by 1 rule, so old rules 5, 6 and 7 become new rules 4, 5 and 6.

To change your P-793H v2's address mapping settings, click Network > NAT > Address Mapping to open the following screen.

ZYXEL ARMOR Z1 NWD6605 - The Address Mapping Screen - 1
Figure 49 Network > NAT > Address Mapping

The following table describes the fields in this screen.

Table 27 Network > NAT > Address Mapping

LABELDESCRIPTION
#This is the rule index number.
Local Start IPThis is the starting Inside Local IP Address (ILA). Local IP addresses are N/A for Server port mapping.
Local End IPThis is the end Inside Local IP Address (ILA). If the rule is for all local IP addresses, then this field displays 0.0.0.0 as the Local Start IP address and 255.255.255.255 as the Local End IP address. This field is N/A for One-to-one and Server mapping types.
Global Start IPThis is the starting Inside Global IP Address (IGA). Enter 0.0.0.0 here if you have a dynamic IP address from your ISP. You can only do this for Many-to-One and Server mapping types.
Global End IPThis is the ending Inside Global IP Address (IGA). This field is N/A for One-to-one, Many-to-One and Server mapping types.
Type1-1: One-to-one mode maps one local IP address to one global IP address. Note that port numbers do not change for the One-to-one NAT mapping type.M-1: Many-to-One mode maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature that previous ZyXEL routers supported only.M-M Ov (Overload): Many-to-Many Overload mode maps multiple local IP addresses to shared global IP addresses.MM No (No Overload): Many-to-Many No Overload mode maps each local IP address to unique global IP addresses Server: This type allows you to specify inside servers of different services behind the NAT to be accessible to the outside world.
ModifyClick the edit icon to go to the screen where you can edit the address mapping rule.Click the delete icon to delete an existing address mapping rule. Note that subsequent address mapping rules move up by one when you take this action.

8.4.1 The Address Mapping Rule Edit Screen

Use this screen to edit an address mapping rule. Click the rule's edit icon in the Address Mapping screen to display the screen shown next.

ZYXEL ARMOR Z1 NWD6605 - The Address Mapping Rule Edit Screen - 1
Figure 50 Network > NAT > Address Mapping: Edit

The following table describes the fields in this screen.

Table 28 Network > NAT > Address Mapping: Edit

LABELDESCRIPTION
TypeChoose the port mapping type from one of the following.
One-to-One: One-to-One mode maps one local IP address to one global IP address. Note that port numbers do not change for One-to-one NAT mapping type.
Many-to-One: Many-to-One mode maps multiple local IP addresses to one global IP address. This is equivalent to SUA (i.e., PAT, port address translation), ZyXEL's Single User Account feature that previous ZyXEL routers supported only.
Many-to-Many Overload: Many-to-Many Overload mode maps multiple local IP addresses to shared global IP addresses.
Many-to-Many No Overload: Many-to-Many No Overload mode maps each local IP address to unique global IP addresses.
Server: This type allows you to specify inside servers of different services behind the NAT to be accessible to the outside world.
Local Start IPThis is the starting local IP address (ILA). Local IP addresses are N/A for Server port mapping.
Local End IPThis is the end local IP address (ILA). If your rule is for all local IP addresses, then enter 0.0.0.0 as the Local Start IP address and 255.255.255.255 as the Local End IP address.
This field is N/A for One-to-One and Server mapping types.
Global Start IPThis is the starting global IP address (IGA). Enter 0.0.0.0 here if you have a dynamic IP address from your ISP.
Global End IPThis is the ending global IP address (IGA). This field is N/A for One-to-One, Many-to-One and Server mapping types.
Server Mapping SetOnly available when Type is set to Server.
Select a number from the drop-down menu to choose a port forwarding set.
Edit DetailsClick this link to go to the Port Forwarding screen to edit a port forwarding set that you have selected in the Server Mapping Set field.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

8.5 The ALG Screen

Some NAT routers may include a SIP Application Layer Gateway (ALG). A SIP ALG allows SIP calls to pass through NAT by examining and translating IP addresses embedded in the data stream. When the P-793H v2 registers with the SIP register server, the SIP ALG translates the P-793H v2's private IP address inside the SIP data stream to a public IP address. You do not need to use STUN or an outbound proxy if your P-793H v2 is behind a SIP ALG.

Use this screen to enable and disable the SIP (VoIP) ALG in the P-793H v2. To access this screen, click Network > NAT > ALG.

ZYXEL ARMOR Z1 NWD6605 - The ALG Screen - 1
Figure 51 Network > NAT > ALG

The following table describes the fields in this screen.

Table 29 Network > NAT > ALG

LABELDESCRIPTION
Enable SIP ALGSelect this to change the private ports or IP in SIP messages so that the VoIP client behind the P-793H v2 can be found in RTP traffic.
ApplyClick this to save your changes.
ResetClick this to restore your previously saved settings.

8.6 NAT Technical Reference

This chapter contains more information regarding NAT.

8.6.1 NAT Definitions

Inside/outside denotes where a host is located relative to the P-793H v2, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.

Global/local denotes the IP address of a host in a packet as the packet traverses a router, for example, the local address refers to the IP address of a host when the

packet is in the local network, while the global address refers to the IP address of the host when the same packet is traveling in the WAN side.

Note that inside/outside refers to the location of a host, while global/local refers to the IP address of a host used in a packet. Thus, an inside local address (ILA) is the IP address of an inside host in a packet when the packet is still in the local network, while an inside global address (IGA) is the IP address of the same inside host when the packet is on the WAN side. The following table summarizes this information.

Table 30 NAT Definitions

ITEMDESCRIPTION
InsideThis refers to the host on the LAN.
OutsideThis refers to the host on the WAN.
LocalThis refers to the packet address (source or destination) as the packet travels on the LAN.
GlobalThis refers to the packet address (source or destination) as the packet travels on the WAN.

NAT never changes the IP address (either local or global) of an outside host.

8.6.2 What NAT Does

In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host. Note that the IP address (either local or global) of an outside host is never changed.

The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP. In addition, you can designate servers, for example, a web server and a telnet server, on your local network and make them accessible to the outside world. If you do not define any servers (for Many-to-One and Many-to-Many Overload mapping – see Table 31 on page 131), NAT offers the additional benefit of firewall protection. With no servers defined, your P-793H v2 filters out all incoming inquiries, thus preventing intruders from probing your network. For more information on IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT).

8.6.3 How NAT Works

Each packet has two addresses – a source address and a destination address. For outgoing packets, the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address) is the source address on the WAN. For incoming packets, the ILA is the destination address on the LAN, and the IGA is the destination address on the WAN. NAT maps private (local) IP addresses to globally unique ones required for communication with hosts on other networks. It replaces the original IP source address (and TCP or UDP source port numbers for Many-to-One and Many-to-Many Overload NAT mapping) in each packet and then forwards it to the Internet. The P-793H v2 keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored. The following figure illustrates this.

ZYXEL ARMOR Z1 NWD6605 - How NAT Works - 1
Figure 52 How NAT Works

8.6.4 NAT Application

The following figure illustrates a possible NAT application, where three inside LANs (logical LANs using IP alias) behind the P-793H v2 can communicate with three distinct WAN networks.

ZYXEL ARMOR Z1 NWD6605 - NAT Application - 1
Figure 53 NAT Application With IP Alias

NAT supports five types of IP/port mapping. They are:

  • One to One: In One-to-One mode, the P-793H v2 maps one local IP address to one global IP address.
  • Many to One: In Many-to-One mode, the P-793H v2 maps multiple local IP addresses to one global IP address. This is equivalent to SUA (for instance, PAT, port address translation), ZyXEL's Single User Account feature that previous ZyXEL routers supported (the SUA Only option in today's routers).
  • Many to Many Overload: In Many-to-Many Overload mode, the P-793H v2 maps the multiple local IP addresses to shared global IP addresses.
  • Many-to-Many No Overload: In Many-to-Many No Overload mode, the P-793H v2 maps each local IP address to a unique global IP address.
  • Server: This type allows you to specify inside servers of different services behind the NAT to be accessible to the outside world.

Port numbers do NOT change for One-to-One and Many-to-Many No Overload NAT mapping types.

The following table summarizes these types.

Table 31 NAT Mapping Types

TYPEIP MAPPING
One-to-OneILA1←→ IGA1
Many-to-One (SUA/PAT)ILA1←→ IGA1
ILA2←→ IGA1
...
Many-to-Many OverloadILA1←→ IGA1
ILA2←→ IGA2
ILA3←→ IGA1
ILA4←→ IGA2
...
Many-to-Many No OverloadILA1←→ IGA1
ILA2←→ IGA2
ILA3←→ IGA3
...
ServerServer 1 IP←→ IGA1
Server 2 IP←→ IGA1
Server 3 IP←→ IGA1

Firewalls

9.1 Overview

This chapter shows you how to enable and configure the P-793H v2 firewall. Use these screens to enable and configure the firewall that protects your P-793H v2 and network from attacks by hackers on the Internet and control access to it. By default the firewall:

  • allows traffic that originates from your LAN computers to go to all other networks.
  • blocks traffic that originates on other networks from going to the LAN.

The following figure illustrates the default firewall action. User A can initiate an IM (Instant Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2). However other traffic initiated from the WAN is blocked (3 and 4).

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 54 Default Firewall Action

9.1.1 What You Can Do in the Firewall Screens

  • Use the General screen (Section 9.2 on page 138) to enable firewall and/or triangle route on the P-793H v2, and set the default action that the firewall takes on packets that do not match any of the firewall rules.
  • Use the Rules screen (Section 9.3 on page 140) to view the configured firewall rules and add,edit or remove a firewall rule.

  • Use the Threshold screen (Section 9.4 on page 145) to set the thresholds that the P-793H v2 uses to determine when to start dropping sessions that do not become fully established (half-open sessions).

9.1.2 What You Need to Know About Firewall

DoS

Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. The ZyXEL Device is pre-configured to automatically detect and thwart all known DoS attacks.

Anti-Probing

If an outside user attempts to probe an unsupported port on your P-793H v2, an ICMP response packet is automatically returned. This allows the outside user to know the P-793H v2 exists. The P-793H v2 supports anti-probing, which prevents the ICMP response packet from being sent. This keeps outsiders from discovering your P-793H v2 when unsupported ports are probed.

ICMP

Internet Control Message Protocol (ICMP) is a message control and error-reporting protocol between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP software and directly apparent to the application user.

DoS Thresholds

For DoS attacks, the P-793H v2 uses thresholds to determine when to drop sessions that do not become fully established. These thresholds apply globally to all sessions. You can use the default threshold values, or you can change them to values more suitable to your security requirements.

Finding Out More

  • See Section 9.1.3 on page 135 for an example of setting up a firewall.
  • See Section 9.5 on page 149 for advanced technical information on firewall.

9.1.3 Firewall Rule Setup Example

The following Internet firewall rule example allows a hypothetical "MyService" connection from the Internet.

1 Click Security > Firewall > Rules.
2 Select WAN to LAN in the Packet Direction field.

ZYXEL ARMOR Z1 NWD6605 - Firewall Rule Setup Example - 1

3 In the Rules screen, select the index number after that you want to add the rule. For example, if you select "6", your new rule becomes number 7 and the previous rule 7 (if there is one) becomes rule 8.
4 Click Add to display the firewall rule configuration screen.
5 In the Edit Rule screen, click the Edit Customized Services link to open the Customized Service screen.
6 Click an index number to display the Customized Services Config screen and configure the screen as follows and click Apply.

ZYXEL ARMOR Z1 NWD6605 - Firewall Rule Setup Example - 2

7 Select Any in the Destination Address List box and then click Delete.

8 Configure the destination address screen as follows and click Add.

ZYXEL ARMOR Z1 NWD6605 - Firewall Rule Setup Example - 3

9 Use the Add >> and Remove buttons between Available Services and Selected Services list boxes to configure it as follows. Click Apply when you are done.

Note: Custom services show up with an “*” before their names in the Services list box and the Rules list box.

ZYXEL ARMOR Z1 NWD6605 - Firewall Rule Setup Example - 4

On completing the configuration procedure for this Internet firewall rule, the Rules screen should look like the following.

Rule 1 allows a "MyService" connection from the WAN to IP addresses 10.0.0.10 through 10.0.0.15 on the LAN.

ZYXEL ARMOR Z1 NWD6605 - Firewall Rule Setup Example - 5

9.2 The Firewall General Screen

Use this screen to configure the firewall settings. Click Security > Firewall to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - The Firewall General Screen - 1
Figure 55 Security > Firewall > General

The following table describes the labels in this screen.

Table 32 Security > Firewall > General

LABELDESCRIPTION
Active FirewallSelect this check box to activate the firewall. The P-793H v2 performs access control and protects against Denial of Service (DoS) attacks when the firewall is activated.
Bypass Triangle RouteIf an alternate gateway on the LAN has an IP address in the same subnet as the P-793H v2's LAN IP address, return traffic may not go through the P-793H v2. This is called an asymmetrical or "triangle" route. This causes the P-793H v2 to reset the connection, as the connection has not been acknowledged. Select this check box to have the P-793H v2 permit the use of asymmetrical route topology on the network (not reset the connection). Note: Allowing asymmetrical routes may let traffic from the WAN go directly to the LAN without passing through the P-793H v2. A better solution is to use IP alias to put the P-793H v2 and the backup gateway on separate subnets. See Section 9.5.4.1 on page 152 for an example.
Packet DirectionThis is the direction of travel of packets (LAN to LAN / Router, LAN to WAN, WAN to WAN /Router, WAN to LAN). Firewall rules are grouped based on the direction of travel of packets to which they apply. For example, LAN to LAN /Router means packets traveling from a computer/subnet on the LAN to either another computer/subnet on the LAN interface of the P-793H v2 or the P-793H v2 itself.
Default ActionUse the drop-down list boxes to select the default action that the firewall is to take on packets that are traveling in the selected direction and do not match any of the firewall rules. Select Drop to silently discard the packets without sending a TCP reset packet or an ICMP destination-unreachable message to the sender. Select Reject to deny the packets and send a TCP reset packet (for a TCP packet) or an ICMP destination-unreachable message (for a UDP packet) to the sender. Select Permit to allow the passage of the packets.
LogSelect the check box to create a log (when the above action is taken) for packets that are traveling in the selected direction and do not match any of your customized rules.
Expand...Click this to display more information.
Basic...Click this to display less information.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

9.3 The Firewall Rule Screen

Note: The ordering of your rules is very important as rules are applied in turn.

Refer to Section 9.5 on page 149 for more information.

Click Security > Firewall > Rules to bring up the following screen. This screen displays a list of the configured firewall rules. Note the order in which the rules are listed.

ZYXEL ARMOR Z1 NWD6605 - The Firewall Rule Screen - 1
Figure 56 Security > Firewall > Rules

The following table describes the labels in this screen.

Table 33 Security > Firewall > Rules

LABELDESCRIPTION
Firewall Rules Storage Space in UseThis read-only bar shows how much of the P-793H v2's memory for recording firewall rules it is currently using. When you are using 80% or less of the storage space, the bar is green. When the amount of space used is over 80%, the bar is red.
Packet DirectionUse the drop-down list box to select a direction of travel of packets for which you want to configure firewall rules.
Create a new rule after rule numberSelect an index number and click Add to add a new firewall rule after the selected index number. For example, if you select "6", your new rule becomes number 7 and the previous rule 7 (if there is one) becomes rule 8.
The following read-only fields summarize the rules you have created that apply to traffic traveling in the selected packet direction. The firewall rules that you configure (summarized below) take priority over the general firewall action settings in the General screen.
#This is your firewall rule number. The ordering of your rules is important as rules are applied in turn.
ActiveThis field displays whether a firewall is turned on or not. Select the check box to enable the rule. Clear the check box to disable the rule.
Source IPThis drop-down list box displays the source addresses or ranges of addresses to which this firewall rule applies. Please note that a blank source or destination address is equivalent to Any.
Destination IPThis drop-down list box displays the destination addresses or ranges of addresses to which this firewall rule applies. Please note that a blank source ordestination address is equivalent to Any.
ServiceThis drop-down list box displays the services to which this firewall rule applies. See Appendix F on page 473 for more information.
ActionThis field displays whether the firewall silently discards packets (Drop), discards packets and sends a TCP reset packet or an ICMP destination-unreachable message to the sender (Reject) or allows the passage of packets (Permit).
ScheduleThis field tells you whether a schedule is specified (Yes) or not (No).
LogThis field shows you whether a log is created when packets match this rule (Yes) or not (No).
ModifyClick the Edit icon to go to the screen where you can edit the rule. Click the Remove icon to delete an existing firewall rule. A window displays asking you to confirm that you want to delete the firewall rule. Note that subsequent firewall rules move up by one when you take this action.
OrderClick the Move icon to display theMove the rule to field. Type a number in theMove the rule to field and click theMove button to move the rule to the number that you typed. The ordering of your rules is important as they are applied in order of their numbering.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

9.3.1 Configuring Firewall Rules

Refer to Section 9.1.2 on page 134 for more information.

Use this screen to configure firewall rules. In the Rules screen, select an index number and click Add or click a rule's Edit icon to display this screen and refer to the following table for information on the labels.

ZYXEL ARMOR Z1 NWD6605 - Configuring Firewall Rules - 1
Figure 57 Security > Firewall > Rules: Edit

The following table describes the labels in this screen.

Table 34 Security > Firewall > Rules: Edit

LABELDESCRIPTION
Edit Rule
ActiveSelect this option to enable this firewall rule.
Action for Matched PacketUse the drop-down list box to select whether to discard (Drop), deny and send an ICMP destination-unreachable message to the sender of (Reject) or allow the passage of (Permit) packets that match this rule.
Destination Address
Address TypeDo you want your rule to apply to packets with a particular (single) IP, a range of IP addresses (for instance, 192.168.1.10 to 192.169.1.50), a subnet or any IP address? Select an option from the drop-down list box that includes: Single Address, Range Address, Subnet Address and Any Address.
Start IP AddressEnter the single IP address or the starting IP address in a range here.
End IP AddressEnter the ending IP address in a range here.
Subnet MaskEnter the subnet mask here, if applicable.
Add >>Click Add >> to add a new address to the Source or Destination Address box. You can add multiple addresses, ranges of addresses, and/or subnets.
Edit <<To edit an existing source or destination address, select it from the box and click Edit << .
DeleteHighlight an existing source or destination address from the Source or Destination Address box above and click Delete to remove it.
Services
Available/ Selected ServicesPlease see Appendix F on page 473 for more information on services available. Highlight a service from the Available Services box on the left, then click Add >> to add it to the Selected Services box on the right. To remove a service, highlight it in the Selected Services box on the right, then click Remove.
Edit Customized ServiceClick the Edit Customized Services link to bring up the screen that you use to configure a new custom service that is not in the predefined list of services.
Schedule
Day to ApplySelect everyday or the day(s) of the week to apply the rule.
Time of Day to Apply (24-Hour Format)Select All Day or enter the start and end times in the hour-minute format to apply the rule.
Log
Log Packet Detail InformationThis field determines if a log for packets that match the rule is created or not. Go to the Log Settings page and select the Access Control logs category to have the P-793H v2 record these logs.
Alert
Send Alert Message to Administrator When MatchedSelect the check box to have the P-793H v2 generate an alert when the rule is matched.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

9.3.2 Customized Services

Configure customized services and port numbers not predefined by the P-793H v2. For a comprehensive list of port numbers and services, visit the IANA (Internet Assigned Number Authority) website. See Appendix F on page 473 for some examples. Click the Edit Customized Services link while editing a firewall rule to configure a custom service port. This displays the following screen.

ZYXEL ARMOR Z1 NWD6605 - Customized Services - 1
Figure 58 Security > Firewall > Rules: Edit: Edit Customized Services

The following table describes the labels in this screen.

Table 35 Security > Firewall > Rules: Edit: Edit Customized Services

LABELDESCRIPTION
No.This is the number of your customized port. Click a rule's number of a service to go to the Firewall Customized Services Config screen to configure or edit a customized service.
NameThis is the name of your customized service.
ProtocolThis shows the IP protocol (TCP, UDP or TCP/UDP) that defines your customized service.
PortThis is the port number or range that defines your customized service.
BackClick this to return to the Firewall Edit Rule screen.

9.3.3 Configuring a Customized Service

Use this screen to add a customized rule or edit an existing rule. Click a rule number in the Firewall Customized Services screen to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - Configuring a Customized Service - 1
Figure 59 Security > Firewall > Rules: Edit: Edit Customized Services: Config

The following table describes the labels in this screen.

Table 36 Security > Firewall > Rules: Edit: Edit Customized Services: Config

LABELDESCRIPTION
Config
Service NameType a unique name for your custom port.
Service TypeChoose the IP port (TCP, UDP or TCP/UDP) that defines your customized port from the drop down list box.
Port Configuration
TypeClick Single to specify one port only or Range to specify a span of ports that define your customized service.
Port NumberType a single port number or the range of port numbers that define your customized service.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.
DeleteClick this to delete the current rule.

9.4 The Firewall Threshold Screen

For DoS attacks, the P-793H v2 uses thresholds to determine when to start dropping sessions that do not become fully established (half-open sessions). These thresholds apply globally to all sessions.

For TCP, half-open means that the session has not reached the established state—the TCP three-way handshake has not yet been completed. Under normal

circumstances, the application that initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator responds with an ACK (acknowledgment). After this handshake, a connection is established.

ZYXEL ARMOR Z1 NWD6605 - The Firewall Threshold Screen - 1
Figure 60 Three-Way Handshake

For UDP, half-open means that the firewall has detected no return traffic. An unusually high number (or arrival rate) of half-open sessions could indicate a DOS attack.

9.4.1 Threshold Values

If everything is working properly, you probably do not need to change the threshold settings as the default threshold values should work for most small offices. Tune these parameters when you believe the P-793H v2 has been receiving DoS attacks that are not recorded in the logs or the logs show that the P-793H v2 is classifying normal traffic as DoS attacks. Factors influencing choices for threshold values are:

1 The maximum number of opened sessions.
2 The minimum capacity of server backlog in your LAN network.
3 The CPU power of servers in your LAN network.
4 Network bandwidth.
5 Type of traffic for certain servers.

Reduce the threshold values if your network is slower than average for any of these factors (especially if you have servers that are slow or handle many tasks and are often busy).

  • If you often use P2P applications such as file sharing with eMule or eDonkey, it's recommended that you increase the threshold values since lots of sessions will be established during a small period of time and the P-793H v2 may classify them as DoS attacks.

9.4.2 Configuring Firewall Thresholds

The P-793H v2 also sends alerts whenever TCP Maximum Incomplete is exceeded. The global values specified for the threshold and timeout apply to all TCP connections.

Click Firewall > Threshold to bring up the next screen.

ZYXEL ARMOR Z1 NWD6605 - Configuring Firewall Thresholds - 1
Figure 61 Security > Firewall > Threshold

The following table describes the labels in this screen.

Table 37 Security > Firewall > Threshold

LABELDESCRIPTION
Denial of Service ThresholdsThe P-793H v2 measures both the total number of existing half-open sessions and the rate of session establishment attempts. Both TCP and UDP half-open sessions are counted in the total number and rate measurements. Measurements are made once a minute.
One Minute LowThis is the rate of new half-open sessions per minute that causes the firewall to stop deleting half-open sessions. The P-793H v2 continues to delete half-open sessions as necessary, until the rate of new connection attempts drops below this number.
One Minute HighThis is the rate of new half-open sessions per minute that causes the firewall to start deleting half-open sessions. When the rate of newconnection attempts rises above this number, the P-793H v2 deleteshalf-open sessions as required to accommodate new connectionattempts.For example, if you set the one minute high to 100, the P-793H v2starts deleting half-open sessions when more than 100 sessionestablishment attempts have been detected in the last minute. It stopsdeleting half-open sessions when the number of session establishmentattempts detected in a minute goes below the number set as the oneminute low.
MaximumIncomplete LowThis is the number of existing half-open sessions that causes thefirewall to stop deleting half-open sessions. The P-793H v2 continuesto delete half-open requests as necessary, until the number of existinghalf-open sessions drops below this number.
MaximumIncomplete HighThis is the number of existing half-open sessions that causes thefirewall to start deleting half-open sessions. When the number ofexisting half-open sessions rises above this number, the P-793H v2deletes half-open sessions as required to accommodate newconnection requests. Do not set Maximum Incomplete High to lowerthan the current Maximum Incomplete Low number.For example, if you set the maximum incomplete high to 100, the P-793H v2 starts deleting half-open sessions when the number ofexisting half-open sessions rises above 100. It stops deleting half-open sessions when the number of existing half-open sessions drops belowthe number set as the maximum incomplete low.
TCP MaximumIncompleteAn unusually high number of half-open sessions with the samedestination host address could indicate that a DoS attack is beinglaunched against the host.Specify the number of existing half-open TCP sessions with the samedestination host IP address that causes the firewall to start droppinghalf-open sessions to that same destination host IP address. Enter anumber between 1 and 256. As a general rule, you should choose asmaller number for a smaller network, a slower system or limitedbandwidth. The P-793H v2 sends alerts whenever the TCP MaximumIncomplete is exceeded.
Action takenwhen TCPMaximumIncompletereachedthresholdSelect the action that P-793H v2 should take when the TCP maximumincomplete threshold is reached. You can have the P-793H v2 either:Delete the oldest half open session when a new connection requestcomes.orDeny new connection requests for the number of minutes that youspecify (between 1 and 255).
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

9.5 Firewall Technical Reference

This section provides some technical background information about the topics covered in this chapter.

9.5.1 Firewall Rules Overview

Your customized rules take precedence and override the P-793H v2's default settings. The P-793H v2 checks the source IP address, destination IP address and IP protocol type of network traffic against the firewall rules (in the order you list them). When the traffic matches a rule, the P-793H v2 takes the action specified in the rule.

Firewall rules are grouped based on the direction of travel of packets to which they apply:

  • LAN to LAN/ Router
  • WAN to LAN
    LAN to WAN WAN to WAN/Router

By default, the P-793H v2's stateful packet inspection allows packets traveling in the following directions:

  • LAN to LAN/ Router

These rules specify which computers on the LAN can manage the P-793H v2 (remote management) and communicate between networks or subnets connected to the LAN interface (IP alias).

Note: You can also configure the remote management settings to allow only a specific computer to manage the P-793H v2.

  • LAN to WAN

These rules specify which computers on the LAN can access which computers or services on the WAN.

By default, the P-793H v2's stateful packet inspection drops packets traveling in the following directions:

  • WAN to LAN

These rules specify which computers on the WAN can access which computers or services on the LAN.

Note: You also need to configure NAT port forwarding (or full featured NAT address mapping rules) to allow computers on the WAN to access devices on the LAN.

  • WAN to WAN/ Router

By default the P-793H v2 stops computers on the WAN from managing the P-793H v2 or using the P-793H v2 as a gateway to communicate with other computers on the WAN. You could configure one of these rules to allow a WAN computer to manage the P-793H v2.

Note: You also need to configure the remote management settings to allow a WAN computer to manage the P-793H v2.

You may define additional rules and sets or modify existing ones but please exercise extreme caution in doing so.

For example, you may create rules to:

  • Block certain types of traffic, such as IRC (Internet Relay Chat), from the LAN to the Internet.
  • Allow certain types of traffic, such as Lotus Notes database synchronization, from specific hosts on the Internet to specific hosts on the LAN.
  • Allow everyone except your competitors to access a web server.
  • Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.

These custom rules work by comparing the source IP address, destination IP address and IP protocol type of network traffic to rules set by the administrator. Your customized rules take precedence and override the P-793H v2's default rules.

9.5.2 Guidelines For Enhancing Security With Your Firewall

6 Change the default password via web configurator.
7 Think about access control before you connect to the network in any way.
8 Limit who can access your router.
9 Don't enable any local service (such as telnet or FTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network.
10 For local services that are enabled, protect against misuse. Protect by configuring the services to communicate only with specific peers, and protect by configuring rules to block packets for the services at specific interfaces.
11 Protect against IP spoofing by making sure the firewall is active.
12 Keep the firewall in a secured (locked) room.

9.5.3 Security Considerations

Note: Incorrectly configuring the firewall may block valid access or introduce security risks to the P-793H v2 and your protected network. Use caution when creating or deleting firewall rules and test your rules after you configure them.

Consider these security ramifications before creating a rule:

1 Does this rule stop LAN users from accessing critical resources on the Internet? For example, if IRC is blocked, are there users that require this service?
2 Is it possible to modify the rule to be more specific? For example, if IRC is blocked for all users, will a rule that blocks just certain users be more effective?
3 Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For example, if FTP ports (TCP 20, 21) are allowed from the Internet to the LAN, Internet users may be able to connect to computers with running FTP servers.
4 Does this rule conflict with any existing rules?

Once these questions have been answered, adding rules is simply a matter of entering the information into the correct fields in the web configurator screens.

9.5.4 Triangle Route

When the firewall is on, your P-793H v2 acts as a secure gateway between your LAN and the Internet. In an ideal network topology, all incoming and outgoing network traffic passes through the P-793H v2 to protect your LAN against attacks.

ZYXEL ARMOR Z1 NWD6605 - Triangle Route - 1
Figure 62 Ideal Firewall Setup

9.5.4.1 The "Triangle Route" Problem

A traffic route is a path for sending or receiving data packets between two Ethernet devices. You may have more than one connection to the Internet (through one or more ISPs). If an alternate gateway is on the LAN (and its IP address is in the same subnet as the P-793H v2's LAN IP address), the "triangle route" (also called asymmetrical route) problem may occur. The steps below describe the "triangle route" problem.

1 A computer on the LAN initiates a connection by sending out a SYN packet to a receiving server on the WAN.
2 The P-793H v2 reroutes the SYN packet through Gateway A on the LAN to the WAN.
3 The reply from the WAN goes directly to the computer on the LAN without going through the P-793H v2.

As a result, the P-793H v2 resets the connection, as the connection has not been acknowledged.

ZYXEL ARMOR Z1 NWD6605 - The "Triangle Route" Problem - 1
Figure 63 "Triangle Route" Problem

9.5.4.2 Solving the "Triangle Route" Problem

If you have the P-793H v2 allow triangle route sessions, traffic from the WAN can go directly to a LAN computer without passing through the P-793H v2 and its firewall protection.

Another solution is to use IP alias. IP alias allows you to partition your network into logical sections over the same Ethernet interface. Your P-793H v2 supports up to three logical LAN interfaces with the P-793H v2 being the gateway for each logical network.

It's like having multiple LAN networks that actually use the same physical cables and ports. By putting your LAN and Gateway A in different subnets, all returning network traffic must pass through the P-793H v2 to your LAN. The following steps describe such a scenario.

1 A computer on the LAN initiates a connection by sending a SYN packet to a receiving server on the WAN.
2 The P-793H v2 reroutes the packet to Gateway A, which is in Subnet 2.
3 The reply from the WAN goes to the P-793H v2.
4 The P-793H v2 then sends it to the computer on the LAN in Subnet 1.

ZYXEL ARMOR Z1 NWD6605 - Solving the "Triangle Route" Problem - 1
Figure 64 IP Alias

Content Filtering

10.1 Overview

Internet content filtering allows you to block web sites based on keywords in the URL.

See Section 10.1.4 on page 156 for an example of setting up content filtering.

10.1.1 What You Can Do in the Content Filter Screens

  • Use the Keyword screen (Section 10.2 on page 158) to block web sites based on a keyword in the URL.
  • Use the Schedule screen (Section 10.3 on page 159) to specify the days and times keyword blocking is active.
  • Use the Trusted screen (Section 10.4 on page 160) to exclude computers and other devices on your LAN from the keyword blocking filter.

10.1.2 What You Need to Know About Content Filtering

URL

The URL (Uniform Resource Locator) identifies and helps locate resources on a network. On the Internet the URL is the web address that you type in the address bar of your Internet browser, for example "http://www.zyxel.com".

10.1.3 Before You Begin

To use the Trusted screen, you need the IP addresses of devices on your network. See the LAN section (Section 10.4 on page 160) for more information.

10.1.4 Content Filtering Example

The following shows the steps required for a parent (Bob) to set up content filtering on a home network in order to limit his children's access to certain web sites. In the following example, all URLs containing the word 'bad' are blocked.

1 Click Security > Content Filter to display the following screen.
2 Select Active Keyword Blocking.
3 In the Keyword field type keywords to identify websites to be blocked.
4 Click Add Keyword for each keyword to be entered.
5 Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Content Filtering Example - 1

Bob's son arrives home from school at four, while his parents arrive later, at about 7pm. So keyword blocking is enabled for these times on weekdays and not on the weekend when the parents are at home.

1 Click Security > Content Filter > Schedule.
2 Click Edit Daily to Block and select all weekdays.
3 Under Start Time and End Time, type the times for blocking to begin and end (16:00 ~ 17:00 in this example).

4 Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Click Apply. - 1

The children can access the family computer in the living room, while only the parents use another computer in the study room. So keyword blocking is only needed on the family computer and the study computer can be excluded from keyword blocking. Bob's home network is on the domain "192.168.1.xxx". Bob gave his home computer a static IP address of 192.168.1.2 and the study computer a static IP address of 192.168.1.3. To exclude the study computer from keyword blocking he follows these steps.

1 Click Security > Content Filter > Trusted.
2 In the Start IP Address and End IP Address fields, type 192.168.1.3.
3 Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Click Apply. - 2

That finishes setting up keyword blocking on the home computer.

10.2 The Keyword Screen

Use this screen to block sites containing certain keywords in the URL. For example, if you enable the keyword "bad", the P-793H v2 blocks all sites containing this keyword including the URL http://www.example.com/bad.html.

To have your P-793H v2 block websites containing keywords in their URLs, click Security > Content Filter. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The Keyword Screen - 1
Figure 65 Security > Content Filtering > Keyword

The following table describes the labels in this screen.

Table 38 Security > Content Filtering > Keyword

LABELDESCRIPTION
Active Keyword BlockingSelect this check box to enable this feature.
Block Websites that contain these keywords in the URL:This box contains the list of all the keywords that you have configured the P-793H v2 to block.
DeleteHighlight a keyword in the box and click this to remove it.
Clear AllClick this to remove all of the keywords from the list.
KeywordType a keyword in this field. You may use any character (up to 127 characters). Wildcards are not allowed.
Add KeywordClick this after you have typed a keyword.Repeat this procedure to add other keywords. Up to 64 keywords are allowed.When you try to access a web page containing a keyword, you will get a message telling you that the content filter is blocking this request.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

10.3 The Schedule Screen

Use this screen to set the days and times for the P-793H v2 to perform content filtering. Click Security > Content Filter > Schedule. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The Schedule Screen - 1
Figure 66 Security > Content Filter > Schedule

The following table describes the labels in this screen.

Table 39 Security > Content Filter: Schedule

LABELDESCRIPTION
ScheduleSelect Block Everyday to make the content filtering active everyday. Otherwise, select Edit Daily to Block and configure which days of the week (or everyday) and which time of the day you want the content filtering to be active.
ActiveSelect the check box to have the content filtering to be active on the selected day.
Start TImeEnter the time when you want the content filtering to take effect in hour-minute format.
End TimeEnter the time when you want the content filtering to stop in hour-minute format.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

10.4 The Trusted Screen

Use this screen to exclude a range of users on the LAN from content filtering on your P-793H v2. Click Security > Content Filter > Trusted. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The Trusted Screen - 1
Figure 67 Security > Content Filter: Trusted

The following table describes the labels in this screen.

Table 40 Security > Content Filter: Trusted

LABELDESCRIPTION
Start IP AddressType the IP address of a computer (or the beginning IP address of a specific range of computers) on the LAN that you want to exclude from content filtering.
End IP AddressType the ending IP address of a specific range of users on your LAN that you want to exclude from content filtering. Leave this field blank if you want to exclude an individual computer.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

11.1 Overview

A virtual private network (VPN) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing. It is used to transport traffic over the Internet or any insecure network that uses TCP/IP for communication.

Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for secure data communications across a public network like the Internet. IPSec is built around a number of standardized cryptographic techniques to provide confidentiality, data integrity and authentication at the IP layer. The following figure is an example of an IPSec VPN tunnel.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 68 VPN: Example

11.1.1 What You Can Do in the VPN Screens

  • Use the Setup screen (Section 11.2 on page 163) to view the configured VPN policies and add, edit or remove a VPN policy.
  • Use the Monitor screen (Section 11.7 on page 177) to display and manage the current active VPN connections.
  • Use the VPN Global Setting screen (Section 11.8 on page 179) to allow NetBIOS packets passing through the VPN connection.

11.1.2 What You Need to Know About IPSec VPN

A VPN tunnel is usually established in two phases. Each phase establishes a security association (SA), a contract indicating what security parameters the P-793H v2 and the remote IPSec router will use. The first phase establishes an Internet Key Exchange (IKE) SA between the P-793H v2 and remote IPSec router. The second phase uses the IKE SA to securely establish an IPSec SA through which the P-793H v2 and remote IPSec router can send data between computers on the local network and remote network. The following figure illustrates this.

ZYXEL ARMOR Z1 NWD6605 - What You Need to Know About IPSec VPN - 1
Figure 69 VPN: IKE SA and IPSec SA

In this example, a computer in network A is exchanging data with a computer in network B. Inside networks A and B, the data is transmitted the same way data is normally transmitted in the networks. Between routers X and Y, the data is protected by tunneling, encryption, authentication, and other security features of the IPSec SA. The IPSec SA is established securely using the IKE SA that routers X and Y established first.

My IP Address

My IP Address is the WAN IP address of the P-793H v2. The P-793H v2 has to rebuild the VPN tunnel if My IP Address changes after setup.

The following applies if this field is configured as 0.0.0.0:

  • The P-793H v2 uses the current P-793H v2 WAN IP address (static or dynamic) to set up the VPN tunnel.

Secure Gateway Address

Secure Gateway Address is the WAN IP address or domain name of the remote IPSec router (secure gateway).

If the remote secure gateway has a static WAN IP address, enter it in the Secure Gateway Address field. You may alternatively enter the remote secure gateway's domain name (if it has one) in the Secure Gateway Address field.

You can also enter a remote secure gateway's domain name in the Secure Gateway Address field if the remote secure gateway has a dynamic WAN IP address and is using DDNS. The P-793H v2 has to rebuild the VPN tunnel each time the remote secure gateway's WAN IP address changes (there may be a delay until the DDNS servers are updated with the remote gateway's new WAN IP address).

Dynamic Secure Gateway Address

If the remote secure gateway has a dynamic WAN IP address and does not use DDNS, enter 0.0.0.0 as the secure gateway's address. In this case only the remote secure gateway can initiate SAs. This may be useful for telecommuters initiating a VPN tunnel to the company network (see Section 11.9.12 on page 188 for configuration examples).

The Secure Gateway IP Address may be configured as 0.0.0.0 only when using IKE key management and not Manual key management.

Finding Out More

See Section 11.9 on page 179 for advanced technical information on IPSec VPN.

11.1.3 Before You Begin

If a VPN tunnel uses Telnet, FTP, WWW, then you should configure remote management (Remote MGMT) to allow access for that service.

11.2 VPN Setup Screen

The following figure helps explain the main fields in the web configurator.

Figure 70 IPSec Summary Fields
ZYXEL ARMOR Z1 NWD6605 - VPN Setup Screen - 1
Local and remote IP addresses must be static.

Click Security > VPN to open the VPN Setup screen. This is a menu of your IPSec rules (tunnels). The IPSec summary menu is read-only. Edit a VPN by selecting an index number and then configuring its associated submenus.

ZYXEL ARMOR Z1 NWD6605 - VPN Setup Screen - 2
Figure 71 Security >VPN > Setup

The following table describes the fields in this screen.

Table 41 Security >VPN > Setup

LABELDESCRIPTION
No.This is the VPN policy index number. Click a number to edit VPN policies.
ActiveThis field displays whether the VPN policy is active or not. A Yes signifies that this VPN policy is active. No signifies that this VPN policy is not active.
NameThis field displays the identification name for this VPN policy.
Local AddressThis is the IP address(es) of computer(s) on your local network behind your P-793H v2.The same (static) IP address is displayed twice when the Local Address Type field in the VPN Setup - Edit screen is configured to Single.The beginning and ending (static) IP addresses, in a range of computers are displayed when the Local Address Type field in the VPN Setup - Edit screen is configured to Range.A (static) IP address and a subnet mask are displayed when the Local Address Type field in the VPN Setup - Edit screen is configured to Subnet.
Remote AddressThis is the IP address(es) of computer(s) on the remote network behind the remote IPSec router.
This field displays N/A when the Secure Gateway Address field displays 0.0.0.0. In this case only the remote IPSec router can initiate the VPN.
The same (static) IP address is displayed twice when the Remote Address Type field in the VPN Setup - Edit screen is configured to Single.
The beginning and ending (static) IP addresses, in a range of computers are displayed when the Remote Address Type field in the VPN Setup - Edit screen is configured to Range.
A (static) IP address and a subnet mask are displayed when the Remote Address Type field in the VPN Setup - Edit screen is configured to Subnet.
Encap.This field displays Tunnel or Transport mode (Tunnel is the default selection).
IPSec AlgorithmThis field displays the security protocols used for an SA.
Both AH and ESP increase P-793H v2 processing requirements and communications latency (delay).
Secure Gateway IPThis is the static WAN IP address or URL of the remote IPSec router. This field displays 0.0.0.0 when you configure the Secure Gateway Address field in the VPN-IKE screen to 0.0.0.0.
ModifyClick the Edit icon to go to the screen where you can edit the VPN configuration.
Click the Remove icon to remove an existing VPN configuration.
ApplyClick this to save your changes and apply them to the P-793H v2.
CancelClick this return your settings to their last saved values.

11.3 The VPN Edit Screen

Click an Edit icon in the VPN Setup screen to edit VPN policies.

ZYXEL ARMOR Z1 NWD6605 - The VPN Edit Screen - 1
Figure 72 Security >VPN > Setup > Edit

The following table describes the fields in this screen.

Table 42 Security > VPN > Setup > Edit

LABELDESCRIPTION
IPSec Setup
ActiveSelect this check box to activate this VPN policy. This option determines whether a VPN rule is applied before a packet leaves the firewall.
Keep AliveSelect either Yes or No from the drop-down list box.Select Yes to have the P-793H v2 automatically reinitiate the SA after the SA lifetime times out, even if there is no traffic. The remote IPSec router must also have keep alive enabled in order for this feature to work.

Table 42 Security > VPN > Setup > Edit

LABELDESCRIPTION
NAT TraversalThis function is available if the VPN Protocol is ESP. Select this check box if you want to set up a VPN tunnel when there are NAT routers between the P-793H v2 and remote IPSec router. The remote IPSec router must also enable NAT traversal, and the NAT routers have to forward UDP port 500 packets to the remote IPSec router behind the NAT router.
NameType up to 32 characters to identify this VPN policy. You may use any character, including spaces, but the P-793H v2 drops trailing spaces.
IPSec Key ModeSelect IKE or Manual from the drop-down list box. IKE provides more protection so it is generally recommended. Manual is a useful option for troubleshooting if you have problems using IKE key management.
Negotiation ModeSelect Main or Aggressive from the drop-down list box. Multiple SAs connecting through a secure gateway must have the same negotiation mode.
Encapsulation ModeSelect Tunnel mode or Transport mode from the drop-down list box.
DNS Server (for IPSec VPN)If there is a private DNS server that services the VPN, type its IP address here. The P-793H v2 assigns this additional DNS server to the P-793H v2's DHCP clients that have IP addresses in this IPSec rule's range of local addresses.A DNS server allows clients on the VPN to find other computers and servers on the VPN by their (private) domain names.
LocalSpecify the IP addresses of the devices behind the P-793H v2 that can use the VPN tunnel. The local IP addresses must correspond to the remote IPSec router's configured remote IP addresses.Two active SAs cannot have the local and remote IP address(es) both the same. Two active SAs can have the same local or remote IP address, but not both. You can configure multiple SAs between the same local and remote IP addresses, as long as only one is active at any time.
Local Address TypeUse the drop-down menu to choose Single, Range, or Subnet. Select Single for a single IP address. Select Range for a specific range of IP addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
IP Address StartWhen the Local Address Type field is configured to Single, enter a (static) IP address on the LAN behind your P-793H v2. When the Local Address Type field is configured to Range, enter the beginning (static) IP address, in a range of computers on your LAN behind your P-793H v2. When the Local Address Type field is configured to Subnet, this is a (static) IP address on the LAN behind your P-793H v2.
End / Subnet MaskWhen the Local Address Type field is configured to Single, this field is N/A. When the Local Address Type field is configured to Range, enter the end (static) IP address, in a range of computers on the LAN behind your P-793H v2. When the Local Address Type field is configured to Subnet, this is a subnet mask on the LAN behind your P-793H v2.

Table 42 Security > VPN > Setup > Edit

LABELDESCRIPTION
RemoteSpecify the IP addresses of the devices behind the remote IPSec router that can use the VPN tunnel. The remote IP addresses must correspond to the remote IPSec router's configured local IP addresses. Two active SAs cannot have the local and remote IP address(es) both the same. Two active SAs can have the same local or remote IP address, but not both. You can configure multiple SAs between the same local and remote IP addresses, as long as only one is active at any time.
Remote Address TypeUse the drop-down menu to choose Single, Range, or Subnet. Select Single with a single IP address. Select Range for a specific range of IP addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
IP Address StartWhen the Remote Address Type field is configured to Single, enter a (static) IP address on the network behind the remote IPSec router. When the Remote Address Type field is configured to Range, enter the beginning (static) IP address, in a range of computers on the network behind the remote IPSec router. When the Remote Address Type field is configured to Subnet, enter a (static) IP address on the network behind the remote IPSec router.
End / Subnet MaskWhen the Remote Address Type field is configured to Single, this field is N/A. When the Remote Address Type field is configured to Range, enter the end (static) IP address, in a range of computers on the network behind the remote IPSec router. When the Remote Address Type field is configured to Subnet, enter a subnet mask on the network behind the remote IPSec router.
Address Information
Local ID TypeSelect IP to identify this P-793H v2 by its IP address. Select DNS to identify this P-793H v2 by a domain name. Select E-mail to identify this P-793H v2 by an e-mail address.
ContentWhen you select IP in the Local ID Type field, type the IP address of your computer in the local Content field. The P-793H v2 automatically uses the IP address in the My IP Address field (refer to the My IP Address field description) if you configure the local Content field to 0.0.0.0 or leave it blank. It is recommended that you type an IP address other than 0.0.0.0 in the local Content field or use the DNS or E-mail ID type in the following situations. When there is a NAT router between the two IPSec routers. When you want the remote IPSec router to be able to distinguish between VPN connection requests that come in from IPSec routers with dynamic WAN IP addresses. When you select DNS or E-mail in the Local ID Type field, type a domain name or e-mail address by which to identify this P-793H v2 in the local Content field. Use up to 31 ASCII characters including spaces, although trailing spaces are truncated. The domain name or e-mail address is for identification purposes only and can be any string.

Table 42 Security > VPN > Setup > Edit

LABELDESCRIPTION
My IP AddressEnter the WAN IP address of your P-793H v2. The VPN tunnel has to be rebuilt if this IP address changes.The following applies if this field is configured as 0.0.0.0:The P-793H v2 uses the current P-793H v2 WAN IP address (static or dynamic) to set up the VPN tunnel.
Peer ID TypeSelect IP to identify the remote IPSec router by its IP address.Select DNS to identify the remote IPSec router by a domain name.Select E-mail to identify the remote IPSec router by an e-mail address.
ContentThe configuration of the peer content depends on the peer ID type.For IP, type the IP address of the computer with which you will make the VPN connection. If you configure this field to 0.0.0.0 or leave it blank, the P-793H v2 will use the address in the Secure Gateway Address field (refer to the Secure Gateway Address field description).For DNS or E-mail, type a domain name or e-mail address by which to identify the remote IPSec router. Use up to 31 ASCII characters including spaces, although trailing spaces are truncated. The domain name or e-mail address is for identification purposes only and can be any string.It is recommended that you type an IP address other than 0.0.0.0 or use the DNS or E-mail ID type in the following situations:When there is a NAT router between the two IPSec routers.When you want the P-793H v2 to distinguish between VPN connection requests that come in from remote IPSec routers with dynamic WAN IP addresses.
Secure Gateway AddressType the WAN IP address or the URL (up to 31 characters) of the IPSec router with which you're making the VPN connection. Set this field to 0.0.0.0 if the remote IPSec router has a dynamic WAN IP address (the IPSec Key Mode field must be set to IKE).In order to have more than one active rule with the Secure Gateway Address field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between rules.If you configure an active rule with 0.0.0.0 in the Secure Gateway Address field and the LAN's full IP address range as the local IP address, then you cannot configure any other active rules with the Secure Gateway Address field set to 0.0.0.0.
Security Protocol
VPN ProtocolSelect ESP if you want to use ESP (Encapsulation Security Payload).The ESP protocol (RFC 2406) provides encryption as well as some of the services offered by AH. If you select ESP here, you must select options from the Encryption Algorithm and Authentication Algorithm fields (described below).

Table 42 Security > VPN > Setup > Edit

LABELDESCRIPTION
Pre-Shared KeyClick the button to use a pre-shared key for authentication, and type in your pre-shared key. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection.Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal ("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x" (zero x), which is not counted as part of the 16 to 62 character range for the key. For example, in "0x0123456789ABCDEF", "0x" denotes that the key is hexadecimal and "0123456789ABCDEF" is the key itself.Both ends of the VPN tunnel must use the same pre-shared key. You will receive a "PYLD_MALFORMED" (payload malformed) packet if the same pre-shared key is not used on both ends.
Encryption AlgorithmSelect DES, 3DES, AES or NULL from the drop-down list box.When you use one of these encryption algorithms for data communications, both the sending device and the receiving device must use the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. This implementation of AES uses a 128-bit key. AES is faster than 3DES.Select NULL to set up a tunnel without encryption. When you select NULL, you do not enter an encryption key.
Authentication AlgorithmSelect SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for maximum security.
BackClick Back to return to the previous screen.
ApplyClick Apply to save your changes back to the P-793H v2.
CancelClick Cancel to begin configuring this screen afresh.
Advanced SetupClick Advanced Setup to configure more detailed settings of your IKE key management.

11.4 Configuring Advanced IKE Settings

Click Advanced Setup in the VPN Setup-Edit screen to open this screen.

ZYXEL ARMOR Z1 NWD6605 - Configuring Advanced IKE Settings - 1
Figure 73 Security >VPN > Setup > Edit > Advanced Setup

The following table describes the fields in this screen.

Table 43 Security > VPN > Setup > Edit > Advanced Setup

LABELDESCRIPTION
VPN - IKE - Advanced Setup
ProtocolEnter 1 for ICMP, 6 for TCP, 17 for UDP, and so on. 0 is the default and signifies any protocol.
Enable Replay DetectionAs a VPN setup is processing intensive, the system is vulnerable to Denial of Service (DoS) attacks The IPSec receiver can detect and reject old or duplicate packets to protect against replay attacks. Select YES from the drop-down menu to enable replay detection, or select NO to disable it.
Local Start Port0 is the default and signifies any port. Type a port number from 0 to 65535. Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, HTTP; 25, SMTP; 110, POP3.
EndEnter a port number in this field to define a port range. This port number must be greater than that specified in the previous field. If Local Start Port is left at 0, End will also remain at 0.
Remote Start Port0 is the default and signifies any port. Type a port number from 0 to 65535. Some of the most common IP ports are: 21, FTP; 53, DNS; 23, Telnet; 80, HTTP; 25, SMTP; 110, POP3.
EndEnter a port number in this field to define a port range. This port number must be greater then that specified in the previous field. If Remote Start Port is left at 0, End will also remain at 0.
Phase 1
Negotiation ModeSelect Main or Aggressive from the drop-down list box. Multiple SAs connecting through a secure gateway must have the same negotiation mode.
Pre-Shared KeyType your pre-shared key in this field. A pre-shared key identifies a communicating party during a phase 1 IKE negotiation. It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection.Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal ("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x" (zero x), which is not counted as part of the 16 to 62-character range for the key. For example, in "0x0123456789ABCDEF", "0x" denotes that the key is hexadecimal and "0123456789ABCDEF" is the key itself.Both ends of the VPN tunnel must use the same pre-shared key. You will receive a "PYLD_MALFORMED" (payload malformed) packet if the same pre-shared key is not used on both ends.
Encryption AlgorithmSelect DES, 3DES or AES from the drop-down list box.When you use one of these encryption algorithms for data communications, both the sending device and the receiving device must use the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. This implementation of AES uses a 128-bit key. AES is faster than 3DES.
Authentication AlgorithmSelect SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for maximum security.
SA Life Time (Seconds)Define the length of time before an IPSec SA automatically renegotiates in this field. It may range from 60 to 3,000,000 seconds (almost 35 days).A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected.
Key GroupYou must choose a key group for phase 1 IKE setup. DH1 (default) refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number.
Phase 2
Active ProtocolUse the drop-down list box to choose from ESP or AH.
Encryption AlgorithmThis field is available when you select ESP in the Active Protocol field. Select DES, 3DES, AES or NULL from the drop-down list box. When you use one of these encryption algorithms for data communications, both the sending device and the receiving device must use the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. This implementation of AES uses a 128-bit key. AES is faster than 3DES. Select NULL to set up a tunnel without encryption. When you select NULL, you do not enter an encryption key.
Authentication AlgorithmSelect SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for maximum security.
SA Life Time (Seconds)Define the length of time before an IKE SA automatically renegotiates in this field. It may range from 60 to 3,000,000 seconds (almost 35 days). A short SA Life Time increases security by forcing the two VPN gateways to update the encryption and authentication keys. However, every time the VPN tunnel renegotiates, all users accessing remote resources are temporarily disconnected.
EncapsulationSelect Tunnel mode or Transport mode from the drop-down list box.
Perfect Forward Secrecy (PFS)Perfect Forward Secrecy (PFS) is disabled (NONE) by default in phase 2 IPSec SA setup. This allows faster IPSec setup, but is not so secure. Choose DH1 or DH2 from the drop-down list box to enable PFS. DH1 refers to Diffie-Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number (more secure, yet slower).
BackClick Back to return to the previous screen.
ApplyClick Apply to save your changes back to the P-793H v2 and return to the VPN-IKE screen.
CancelClick Cancel to return to the VPN-IKE screen without saving your changes.

11.5 Manual Key Setup

Manual key management is useful if you have problems with IKE key management.

11.5.1 Security Parameter Index (SPI)

An SPI is used to distinguish different SAs terminating at the same destination and using the same IPSec protocol. This data allows for the multiplexing of SAs to a single gateway. The SPI (Security Parameter Index) along with a destination IP address uniquely identify a particular Security Association (SA). The SPI is transmitted from the remote VPN gateway to the local VPN gateway. The local VPN gateway then uses the network, encryption and key values that the administrator associated with the SPI to establish the tunnel.

Current ZyXEL implementation assumes identical outgoing and incoming SPIs.

11.6 Configuring Manual Key

You only configure VPN manual key when you select Manual in the IPSec Key Mode field on the VPN Setup-Edit screen. This is the VPN Setup - Manual Key screen as shown next.

ZYXEL ARMOR Z1 NWD6605 - Configuring Manual Key - 1
Figure 74 Security > VPN > Setup > Manual Key

The following table describes the fields in this screen.

Table 44 Security > VPN > Setup > Manual Key

LABELDESCRIPTION
IPSec Setup
ActiveSelect this check box to activate this VPN policy.
NameType up to 32 characters to identify this VPN policy. You may use any character, including spaces, but the P-793H v2 drops trailing spaces.
IPSec Key ModeSelect IKE or Manual from the drop-down list box. Manual is a useful option for troubleshooting if you have problems using IKE key management.
SPIType a number (base 10) from 1 to 999999 for the Security Parameter Index.
Encapsulation ModeSelect Tunnel mode or Transport mode from the drop-down list box.
DNS Server (for IPSec VPN)If there is a private DNS server that services the VPN, type its IP address here. The P-793H v2 assigns this additional DNS server to the P-793H v2 's DHCP clients that have IP addresses in this IPSec rule's range of local addresses.A DNS server allows clients on the VPN to find other computers and servers on the VPN by their (private) domain names.
LocalLocal IP addresses must be static and correspond to the remote IPSec router's configured remote IP addresses.Two active SAs cannot have the local and remote IP address(es) both the same. Two active SAs can have the same local or remote IP address, but not both. You can configure multiple SAs between the same local and remote IP addresses, as long as only one is active at any time.
Local Address TypeUse the drop-down menu to choose Single, Range, or Subnet. Select Single for a single IP address. Select Range for a specific range of IP addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
IP Address StartWhen the Local Address Type field is configured to Single, enter a (static) IP address on the LAN behind your P-793H v2. When the Local Address Type field is configured to Range, enter the beginning (static) IP address, in a range of computers on your LAN behind your P-793H v2. When the Local Address Type field is configured to Subnet, this is a (static) IP address on the LAN behind your P-793H v2.
End / Subnet MaskWhen the Local Address Type field is configured to Single, this field is N/A. When the Local Address Type field is configured to Range, enter the end (static) IP address, in a range of computers on the LAN behind your P-793H v2. When the Local Address Type field is configured to Subnet, this is a subnet mask on the LAN behind your P-793H v2.
RemoteRemote IP addresses must be static and correspond to the remote IPSec router's configured local IP addresses.Two active SAs cannot have the local and remote IP address(es) both the same. Two active SAs can have the same local or remote IP address, but not both. You can configure multiple SAs between the same local and remote IP addresses, as long as only one is active at any time.
Remote Address TypeUse the drop-down menu to choose Single, Range, or Subnet. Select Single with a single IP address. Select Range for a specific range of IP addresses. Select Subnet to specify IP addresses on a network by their subnet mask.
IP Address StartWhen the Remote Address Type field is configured to Single, enter a (static) IP address on the network behind the remote IPSec router.When the Remote Address Type field is configured to Range, enter the beginning (static) IP address, in a range of computers on the network behind the remote IPSec router. When the Remote Address Type field is configured to Subnet, enter a (static) IP address on the network behind the remote IPSec router.
End / Subnet MaskWhen the Remote Address Type field is configured to Single, this field is N/A. When the Remote Address Type field is configured to Range, enter the end (static) IP address, in a range of computers on the network behind the remote IPSec router. When the Remote Address Type field is configured to Subnet, enter a subnet mask on the network behind the remote IPSec router.
Address Information
My IP AddressEnter the WAN IP address of your P-793H v2. The VPN tunnel has to be rebuilt if this IP address changes.The following applies if this field is configured as 0.0.0.0:The P-793H v2 uses the current P-793H v2 WAN IP address (static or dynamic) to set up the VPN tunnel.
Secure Gateway AddressType the WAN IP address or the URL (up to 31 characters) of the IPSec router with which you're making the VPN connection.
Security Protocol
IPSec ProtocolSelect ESP if you want to use ESP (Encapsulation Security Payload). The ESP protocol (RFC 2406) provides encryption as well as some of the services offered by AH. If you select ESP here, you must select options from the Encryption Algorithm and Authentication Algorithm fields (described next).
Encryption AlgorithmSelect DES, 3DES or NULL from the drop-down list box.When DES is used for data communications, both sender and receiver must know the same secret key, which can be used to encrypt and decrypt the message or to generate and verify a message authentication code. The DES encryption algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a 168-bit key. As a result, 3DES is more secure than DES. It also requires more processing power, resulting in increased latency and decreased throughput. Select NULL to set up a tunnel without encryption. When you select NULL, you do not enter an encryption key.
Encapsulation Key (only with ESP)With DES, type a unique key 8 characters long. With 3DES, type a unique key 24 characters long. Any characters may be used, including spaces, but trailing spaces are truncated.
Authentication AlgorithmSelect SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet data. The SHA1 algorithm is generally considered stronger than MD5, but is slower. Select MD5 for minimal security and SHA-1 for maximum security.
Authentication KeyType a unique authentication key to be used by IPSec if applicable. Enter 16 characters for MD5 authentication or 20 characters for SHA-1 authentication. Any characters may be used, including spaces, but trailing spaces are truncated.
BackClick Back to return to the previous screen.
ApplyClick Apply to save your changes back to the P-793H v2.
CancelClick Cancel to begin configuring this screen afresh.

11.7 Viewing SA Monitor

Click Security > VPN > Monitor to open the screen as shown. Use this screen to display and manage active VPN connections.

A Security Association (SA) is the group of security settings related to a specific VPN tunnel. This screen displays active VPN connections. Use Refresh to display active VPN connections. This screen is read-only. The following table describes the fields in this tab.

When there is outbound traffic but no inbound traffic, the SA times out automatically after two minutes. A tunnel with no outbound or inbound traffic is "idle" and does not timeout until the SA lifetime period expires. See Section

11.9.7 on page 185 on keep alive to have the P-793H v2 renegotiate an IPSec SA when the SA lifetime expires, even if there is no traffic.

ZYXEL ARMOR Z1 NWD6605 - Viewing SA Monitor - 1
Figure 75 Security >VPN>Monitor

The following table describes the fields in this screen.

Table 45 Security >VPN >Monitor

LABELDESCRIPTION
NoThis is the security association index number.
NameThis field displays the identification name for this VPN policy.
EncapsulationThis field displays Tunnel or Transport mode.
IPSec AlgorithmThis field displays the security protocol, encryption algorithm, and authentication algorithm used in each VPN tunnel.
DisconnectSelect one of the security associations, and then click Disconnect to stop that security association.
RefreshClick Refresh to display the current active VPN connection(s).

11.8 Configuring VPN Global Setting

To change your P-793H v2's global settings, click VPN > VPN Global Setting. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - Configuring VPN Global Setting - 1
Figure 76 Security > VPN > Global Setting

The following table describes the fields in this screen.

Table 46 Security > VPN > Global Setting

LABELDESCRIPTION
Windows Networking (NetBIOS over TCP/IP)NetBIOS (Network Basic Input/Output System) are TCP or UDP packets that enable a computer to find other computers. It may sometimes be necessary to allow NetBIOS packets to pass through VPN tunnels in order to allow local computers to find computers on the remote network and vice versa.
Allow NetBIOS Traffic Through All IPSec TunnelsSelect this check box to send NetBIOS packets through the VPN connection.
ApplyClick Apply to save your changes back to the P-793H v2.
CancelClick Cancel to begin configuring this screen afresh.

11.9 IPSec VPN Technical Reference

This section provides some technical background information about the topics covered in this chapter.

11.9.1 IPSec Architecture

The overall IPSec architecture is shown as follows.

ZYXEL ARMOR Z1 NWD6605 - IPSec Architecture - 1
Figure 77 IPSec Architecture

IPSec Algorithms

The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header) protocol (RFC 2402) describe the packet formats and the default standards for packet structure (including implementation algorithms).

The Encryption Algorithm describes the use of encryption techniques such as DES (Data Encryption Standard) and Triple DES algorithms.

The Authentication Algorithms, HMAC-MD5 (RFC 2403) and HMAC-SHA-1 (RFC 2404), provide an authentication mechanism for the AH and ESP protocols.

Key Management

Key management allows you to determine whether to use IKE (ISAKMP) or manual key configuration in order to set up a VPN.

11.9.2 IPSec and NAT

Read this section if you are running IPSec on a host computer behind the P-793H v2.

NAT is incompatible with the AH protocol in both Transport and Tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data

payload and headers, with a hash value appended to the packet. When using AH protocol, packet contents (the data payload) are not encrypted.

A NAT device in between the IPSec endpoints will rewrite either the source or destination address with one of its own choosing. The VPN device at the receiving end will verify the integrity of the incoming packet by computing its own hash value, and complain that the hash value appended to the received packet doesn't match. The VPN device at the receiving end doesn't know about the NAT in the middle, so it assumes that the data has been maliciously altered.

IPSec using ESP in Tunnel mode encapsulates the entire original packet (including headers) in a new IP packet. The new IP packet's source address is the outbound address of the sending VPN gateway, and its destination address is the inbound address of the VPN device at the receiving end. When using ESP protocol with authentication, the packet contents (in this case, the entire original packet) are encrypted. The encrypted contents, but not the new headers, are signed with a hash value appended to the packet.

Tunnel mode ESP with authentication is compatible with NAT because integrity checks are performed over the combination of the "original header plus original payload," which is unchanged by a NAT device.

Transport mode ESP with authentication is not compatible with NAT.

Table 47 VPN and NAT

SECURITY PROTOCOLMODENAT
AHTransportN
AHTunnelN
ESPTransportN
ESPTunnelY

11.9.3 VPN, NAT, and NAT Traversal

NAT is incompatible with the AH protocol in both transport and tunnel mode. An IPSec VPN using the AH protocol digitally signs the outbound packet, both data payload and headers, with a hash value appended to the packet, but a NAT device between the IPSec endpoints rewrites the source or destination address. As a result, the VPN device at the receiving end finds a mismatch between the hash value and the data and assumes that the data has been maliciously altered.

NAT is not normally compatible with ESP in transport mode either, but the P-793H v2's NAT Traversal feature provides a way to handle this. NAT traversal allows

you to set up an IKE SA when there are NAT routers between the two IPSec routers.

ZYXEL ARMOR Z1 NWD6605 - VPN, NAT, and NAT Traversal - 1
Figure 78 NAT RouterBetweenIPSecRouters

Normally you cannot set up an IKE SA with a NAT router between the two IPSec routers because the NAT router changes the header of the IPSec packet. NAT traversal solves the problem by adding a UDP port 500 header to the IPSec packet. The NAT router forwards the IPSec packet with the UDP port 500 header unchanged. In Figure 78 on page 182, when IPSec router A tries to establish an IKE SA, IPSec router B checks the UDP port 500 header, and IPSec routers A and B build the IKE SA.

For NAT traversal to work, you must:

  • Use ESP security protocol (in either transport or tunnel mode).
  • Use IKE keying mode.
  • Enable NAT traversal on both IPSec endpoints.
  • Set the NAT router to forward UDP port 500 to IPSec router A.

Finally, NAT is compatible with ESP in tunnel mode because integrity checks are performed over the combination of the "original header plus original payload," which is unchanged by a NAT device. The compatibility of AH and ESP with NAT in tunnel and transport modes is summarized in the following table.

Table 48 VPN and NAT

SECURITY PROTOCOLMODENAT
AHTransportN
AHTunnelN
ESPTransportY*
ESPTunnelY

Y* - This is supported in the P-793H v2 if you enable NAT traversal.

11.9.4 Encapsulation

The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode.

ZYXEL ARMOR Z1 NWD6605 - Encapsulation - 1
Figure 79 Transport and Tunnel Mode IPSec Encapsulation

Transport Mode

Transport mode is used to protect upper layer protocols and only affects the data in the IP packet. In Transport mode, the IP packet contains the security protocol (AH or ESP) located after the original IP header and options, but before any upper layer protocols contained in the packet (such as TCP and UDP).

With ESP, protection is applied only to the upper layer protocols contained in the packet. The IP header information and options are not used in the authentication process. Therefore, the originating IP address cannot be verified for integrity against the data.

With the use of AH as the security protocol, protection is extended forward into the IP header to verify the integrity of the entire packet by use of portions of the original IP header in the hashing process.

Tunnel Mode

Tunnel mode encapsulates the entire IP packet to transmit it securely. A Tunnel mode is required for gateway services to provide access to internal systems.

Tunnel mode is fundamentally an IP tunnel with authentication and encryption. This is the most common mode of operation. Tunnel mode is required for gateway to gateway and host to gateway communications. Tunnel mode communications have two sets of IP headers:

  • Outside header: The outside IP header contains the destination IP address of the VPN gateway.
  • Inside header: The inside IP header contains the destination IP address of the final system behind the VPN gateway. The security protocol appears after the outer IP header and before the inside IP header.

11.9.5 IKE Phases

There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses that SA to negotiate SAs for IPSec.

ZYXEL ARMOR Z1 NWD6605 - IKE Phases - 1
Figure 80 Two Phases to Set Up the IPSec SA

In phase 1 you must:

  • Choose a negotiation mode.
  • Confirm that the connection is working properly.
  • Choose an encryption algorithm.
  • Choose an authentication algorithm.
  • Choose a Diffie-Hellman public-key cryptography key group (DH1 or DH2).
  • Set the IKE SA lifetime. This field allows you to determine how long an IKE SA should stay up before it times out. An IKE SA times out when the IKE SA lifetime period expires. If an IKE SA times out when an IPSec SA is already established, the IPSec SA stays connected.

In phase 2 you must:

  • Choose which protocol to use (ESP or AH) for the IKE key exchange.
  • Choose an encryption algorithm.
  • Choose an authentication algorithm
  • Choose whether to enable Perfect Forward Secrecy (PFS) using Diffie-Hellman public-key cryptography. Select None (the default) to disable PFS.
  • Choose Tunnel mode or Transport mode.

  • Set the IPSec SA lifetime. This field allows you to determine how long the IPSec SA should stay up before it times out. The P-793H v2 automatically renegotiates the IPSec SA if there is traffic when the IPSec SA lifetime period expires. The P-793H v2 also automatically renegotiates the IPSec SA if both IPSec routers have keep alive enabled, even if there is no traffic. If an IPSec SA times out, then the IPSec router must renegotiate the SA the next time someone attempts to send traffic.

11.9.6 Negotiation Mode

The phase 1 Negotiation Mode you select determines how the Security Association (SA) will be established for each connection through IKE negotiations.

  • Main Mode ensures the highest level of security when the communicating parties are negotiating authentication (phase 1). It uses 6 messages in three round trips: SA negotiation, Diffie-Hellman exchange and an exchange of nonces (a nonce is a random number). This mode features identity protection (your identity is not revealed in the negotiation).
  • Aggressive Mode is quicker than Main Mode because it eliminates several steps when the communicating parties are negotiating authentication (phase 1). However the trade-off is that faster speed limits its negotiating power and it also does not provide identity protection. It is useful in remote access situations where the address of the initiator is not known by the responder and both parties want to use pre-shared key authentication.

11.9.7 Keep Alive

When you initiate an IPSec tunnel with keep alive enabled, the P-793H v2 automatically renegotiates the tunnel when the IPSec SA lifetime period expires (see Section 11.9.5 on page 184 for more on the IPSec SA lifetime). In effect, the IPSec tunnel becomes an "always on" connection after you initiate it. Both IPSec routers must have a P-793H v2-compatible keep alive feature enabled in order for this feature to work.

If the P-793H v2 has its maximum number of simultaneous IPSec tunnels connected to it and they all have keep alive enabled, then no other tunnels can take a turn connecting to the P-793H v2 because the P-793H v2 never drops the tunnels that are already connected.

When there is outbound traffic with no inbound traffic, the P-793H v2 automatically drops the tunnel after two minutes.

11.9.8 Remote DNS Server

In cases where you want to use domain names to access Intranet servers on a remote network that has a DNS server, you must identify that DNS server. You

cannot use DNS servers on the LAN or from the ISP since these DNS servers cannot resolve domain names to private IP addresses on the remote network

The following figure depicts an example where three VPN tunnels are created from P-793H v2 A; one to branch office 2, one to branch office 3 and another to headquarters. In order to access computers that use private domain names on the headquarters (HQ) network, the P-793H v2 at branch office 1 uses the Intranet DNS server in headquarters. The DNS server feature for VPN does not work with Windows 2000 or Windows XP.

ZYXEL ARMOR Z1 NWD6605 - Remote DNS Server - 1
Figure 81 VPN Host using Intranet DNS Server Example

If you do not specify an Intranet DNS server on the remote network, then the VPN host must use IP addresses to access the computers on the remote network.

11.9.9 ID Type and Content

With aggressive negotiation mode (seeSection 11.9.6 on page 185), the P-793H v2 identifies incoming SAs by ID type and content since this identifying information is not encrypted. This enables the P-793H v2 to distinguish between multiple rules for SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. Telecommuters can use separate passwords to simultaneously connect to the P-793H v2 from IPSec routers with dynamic IP addresses (seeSection 11.9.12 on page 188 for a telecommuter configuration example).

Regardless of the ID type and content configuration, the P-793H v2 does not allow you to save multiple active rules with overlapping local and remote IP addresses.

With main mode (seeSection 11.9.6 on page 185), the ID type and content are encrypted to provide identity protection. In this case the P-793H v2 can only

distinguish between up to 12 different incoming SAs that connect from remote IPSec routers that have dynamic WAN IP addresses. The P-793H v2 can distinguish up to 12 incoming SAs because you can select between three encryption algorithms (DES, 3DES and AES), two authentication algorithms (MD5 and SHA1) and two key groups (DH1 and DH2) when you configure a VPN rule (seeSection 11.4 on page 171). The ID type and content act as an extra level of identification for incoming SAs.

The type of ID can be a domain name, an IP address or an e-mail address. The content is the IP address, domain name, or e-mail address.

Table 49 Local ID Type and Content Fields

LOCAL ID TYPE=CONTENT=
IPType the IP address of your computer or leave the field blank to have the P-793H v2 automatically use its own IP address.
DNSType a domain name (up to 31 characters) by which to identify this P-793H v2.
E-mailType an e-mail address (up to 31 characters) by which to identify this P-793H v2.
The domain name or e-mail address that you use in the Content field is used for identification purposes only and does not need to be a real domain name or e-mail address.

Table 50 Peer ID Type and Content Fields

PEER ID TYPE=CONTENT=
IPType the IP address of the computer with which you will make the VPN connection or leave the field blank to have the P-793H v2 automatically use the address in the Secure Gateway Address field.
DNSType a domain name (up to 31 characters) by which to identify the remote IPSec router.
E-mailType an e-mail address (up to 31 characters) by which to identify the remote IPSec router.
The domain name or e-mail address that you use in the Content field is used for identification purposes only and does not need to be a real domain name or e-mail address. The domain name also does not have to match the remote router's IP address or what you configure in the Secure Gateway Address field below.

11.9.9.1 ID Type and Content Examples

Two IPSec routers must have matching ID type and content configuration in order to set up a VPN tunnel.

The two P-793H v2s in this example can complete negotiation and establish a VPN tunnel.

Table 51 Matching ID Type and Content Configuration Example

P-793H V2 AP-793H V2 B
Local ID type: E-mailLocal ID type: IP
Local ID content: tom@yourcompany.comLocal ID content: 1.1.1.2
Peer ID type: IPPeer ID type: E-mail
Peer ID content: 1.1.1.2Peer ID content: tom@yourcompany.com

The two P-793H v2s in this example cannot complete their negotiation because P-793H v2 B's Local ID type is IP, but P-793H v2 A's Peer ID type is set to E-mail. An "ID mismatched" message displays in the IPSEC LOG.

Table 52 Mismatching ID Type and Content Configuration Example

P-793H V2 AP-793H V2 B
Local ID type: IPLocal ID type: IP
Local ID content: 1.1.1.10Local ID content: 1.1.1.10
Peer ID type: E-mailPeer ID type: IP
Peer ID content: aa@yahoo.comPeer ID content: N/A

11.9.10 Pre-Shared Key

A pre-shared key identifies a communicating party during a phase 1 IKE negotiation (see Section 11.9.5 on page 184 for more on IKE phases). It is called "pre-shared" because you have to share it with another party before you can communicate with them over a secure connection.

11.9.11 Diffie-Hellman (DH) Key Groups

Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish a shared secret over an unsecured communications channel. Diffie-Hellman is used within IKE SA setup to establish session keys. 768-bit (Group 1 - DH1) and 1024-bit (Group 2 - DH2) Diffie-Hellman groups are supported. Upon completion of the Diffie-Hellman exchange, the two peers have a shared secret, but the IKE SA is not authenticated. For authentication, use pre-shared keys.

11.9.12 Telecommuter VPN/IPSec Examples

The following examples show how multiple telecommuters can make VPN connections to a single P-793H v2 at headquarters. The telecommuters use IPSec routers with dynamic WAN IP addresses. The P-793H v2 at headquarters has a static public IP address.

11.9.12.1 Telecommuters Sharing One VPN Rule Example

See the following figure and table for an example configuration that allows multiple telecommuters (A, B and C in the figure) to use one VPN rule to simultaneously access a P-793H v2 at headquarters (HQ in the figure). The telecommuters do not have domain names mapped to the WAN IP addresses of their IPSec routers. The telecommuters must all use the same IPSec parameters but the local IP addresses (or ranges of addresses) should not overlap.

ZYXEL ARMOR Z1 NWD6605 - Telecommuters Sharing One VPN Rule Example - 1
Figure 82 Telecommuters Sharing One VPN Rule Example

Table 53 Telecommuters Sharing One VPN Rule Example

FIELDSTELECOMMUTERSHEADQUARTERS
My IP Address:0.0.0.0 (dynamic IP address assigned by the ISP)Public static IP address
Secure Gateway IP Address:Public static IP address0.0.0.0 With this IP address only the telecommuter can initiate the IPSec tunnel.
Local IP Address:Telecommuter A: 192.168.2.12 Telecommuter B: 192.168.3.2 Telecommuter C: 192.168.4.15192.168.1.10
Remote IP Address:192.168.1.100.0.0.0 (N/A)

11.9.12.2 Telecommuters Using Unique VPN Rules Example

In this example the telecommuters (A, B and C in the figure) use IPSec routers with domain names that are mapped to their dynamic WAN IP addresses (use Dynamic DNS to do this).

With aggressive negotiation mode (see Section 11.9.6 on page 185), the P-793H v2 can use the ID types and contents to distinguish between VPN rules.

Telecommuters can each use a separate VPN rule to simultaneously access a P-793H v2 at headquarters. They can use different IPSec parameters. The local IP addresses (or ranges of addresses) of the rules configured on the P-793H v2 at

headquarters can overlap. The local IP addresses of the rules configured on the telecommuters' IPSec routers should not overlap.

See the following table and figure for an example where three telecommuters each use a different VPN rule for a VPN connection with a P-793H v2 located at headquarters. The P-793H v2 at headquarters (HQ in the figure) identifies each incoming SA by its ID type and content and uses the appropriate VPN rule to establish the VPN connection.

The P-793H v2 at headquarters can also initiate VPN connections to the telecommuters since it can find the telecommuters by resolving their domain names.

ZYXEL ARMOR Z1 NWD6605 - Telecommuters Using Unique VPN Rules Example - 1
Figure 83 Telecommuters Using Unique VPN Rules Example

Table 54 Telecommuters Using Unique VPN Rules Example

TELECOMMUTERSHEADQUARTERS
All Telecommuter Rules:All Headquarters Rules:
My IP Address 0.0.0.0My IP Address: bigcompanyhq.com
Secure Gateway Address: bigcompanyhq.comLocal IP Address: 192.168.1.10
Remote IP Address: 192.168.1.10Local ID Type: E-mail
Peer ID Type: E-mailLocal ID Content: bob@bigcompanyhq.com
Peer ID Content: bob@bigcompanyhq.com
Telecommuter A (telecommutera.dydns.org)Headquarters P-793H v2 Rule 1:
Local ID Type: IPPeer ID Type: IP
Local ID Content: 192.168.2.12Peer ID Content: 192.168.2.12
Local IP Address: 192.168.2.12Secure Gateway Address: telecommuter1.com
Remote Address 192.168.2.12
Telecommuter B (telecommuterb.dydns.org)Headquarters P-793H v2 Rule 2:
Local ID Type: DNSPeer ID Type: DNS
Local ID Content: telecommuterb.comPeer ID Content: telecommuterb.com
Local IP Address: 192.168.3.2Secure Gateway Address: telecommuterb.com
Remote Address 192.168.3.2
Telecommuter C (telecommuterc.dydns.org)Headquarters P-793H v2 Rule 3:
Local ID Type: E-mailPeer ID Type: E-mail
Local ID Content: myVPN@myplace.comPeer ID Content: myVPN@myplace.com
Local IP Address: 192.168.4.15Secure Gateway Address: telecommuterc.com
Remote Address 192.168.4.15

12.1 Overview

This chapter describes how your P-793H v2 can use certificates as a means of authenticating clients. It gives background information about public-key certificates and explains how to use them.

A certificate contains the certificate owner's identity and public key. Certificates provide a way to exchange public keys for use in authentication.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 84 Certificates Example

In the figure above, the P-793H v2 (Z) checks the identity of the notebook (A) using a certificate before granting it access to the network.

12.1.1 What You Need to Know About Certificates

Certification Authority

A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner. There are commercial certification authorities like CyberTrust or VeriSign and government certification authorities. You can use the P-793H v2 to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority.

Certificate File Formats

The certification authority certificate that you want to import has to be in one of these file formats:

  • Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.
  • PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.

Factory Default Certificate

The P-793H v2 generates its own unique self-signed certificate when you first turn it on. This certificate is referred to in the GUI as the factory default certificate.

12.1.2 Verifying a Certificate

Before you import a trusted certificate into the P-793H v2, you should verify that you have the correct certificate. You can do this using the certificate's fingerprint. A certificate's fingerprint is a message digest calculated using the MD5 or SHA1 algorithm. The following procedure describes how to check a certificate's fingerprint to verify that you have the actual certificate.

1 Browse to where you have the certificate saved on your computer.
2 Make sure that the certificate has a ".cer" or ".crt" file name extension.

ZYXEL ARMOR Z1 NWD6605 - Verifying a Certificate - 1
Figure 85 Remote Host Certificates

3 Double-click the certificate's icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.

ZYXEL ARMOR Z1 NWD6605 - Verifying a Certificate - 2
Figure 86 Certificate Details

4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection.

Finding Out More

See Section 12.3 on page 200 for technical background information on certificates.

12.2 The Trusted CAs Screen

This screen displays a summary list of certificates of the certification authorities that you have set the P-793H v2 to accept as trusted. The P-793H v2 accepts any valid certificate signed by a certification authority on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these

certification authorities. Click Security > Certificates > Trusted CAs to open the following screen.

ZYXEL ARMOR Z1 NWD6605 - The Trusted CAs Screen - 1
Figure 87 Trusted CAs

The following table describes the labels in this screen.

Table 55 Trusted CAs

LABELDESCRIPTION
PKI Storage Space in UseThis bar displays the percentage of the P-793H v2's PKI storage space that is currently in use. The bar turns from blue to red when the maximum is being approached. When the bar is red, you should consider deleting expired or unnecessary certificates before adding more certificates.
#This field displays the certificate index number. The certificates are listed in alphabetical order.
NameThis field displays the name used to identify this certificate.
Valid FromThis field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable.
Valid ToThis field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired.
ModifyClick the Edit icon to open a screen with an in-depth list of information about the certificate. Click the Remove icon to remove the certificate. A window displays asking you to confirm that you want to delete the certificates. Note that subsequent certificates move up by one when you take this action.
ImportClick this to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the P-793H v2.
RefreshClick this to display the current validity status of the certificates.

12.2.1 Trusted CA Import

Follow the instructions in this screen to save a trusted certification authority's certificate to the P-793H v2. Click Security > Certificates to open the Trusted CAs screen and then click Import to open the Trusted CA Import screen.

Note: You must remove any spaces from the certificate's filename before you can import the certificate.

ZYXEL ARMOR Z1 NWD6605 - Trusted CA Import - 1
Figure 88 Trusted CA Import

The following table describes the labels in this screen.

Table 56 Trusted CA Import

LABELDESCRIPTION
File PathType in the location of the file you want to upload in this field or click Browse to find it.
BrowseClick this to find the certificate file you want to upload.
BackClick this to return to the previous screen without saving.
ApplyClick this to save the certificate on the P-793H v2.
CancelClick this to restore your previously saved settings.

12.2.2 Trusted CA Details

Use this screen to view in-depth information about the certification authority's certificate, change the certificate's name and set whether or not you want the P-793H v2 to check a certification authority's list of revoked certificates before trusting a certificate issued by the certification authority. Click Security > Certificates > Trusted CAs to open the Trusted CAs screen. Click the details icon to open the Trusted CA Details screen.

ZYXEL ARMOR Z1 NWD6605 - Trusted CA Details - 1
Figure 89 Trusted CA Details

The following table describes the labels in this screen.

Table 57 Trusted CA Details

LABELDESCRIPTION
Certificate NameThis field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this key certificate. You may use any character (not including spaces).
Certificate InformationThese read-only fields display detailed information about the certificate.
TypeThis field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate's owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
VersionThis field displays the X.509 version number.
Serial NumberThis field displays the certificate's identification number given by the certification authority.
Signature AlgorithmThis field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid FromThis field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable.
Valid ToThis field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired.
Key AlgorithmThis field displays the type of algorithm that was used to generate the certificate's key pair (the P-793H v2 uses RSA encryption) and the length of the key set in bits (1024 bits for example).
MD5 FingerprintThis is the certificate's message digest that the P-793H v2 calculated using the MD5 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
SHA1 FingerprintThis is the certificate's message digest that the P-793H v2 calculated using the SHA1 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
Certificate in PEM (Base-64) Encoded FormatThis read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the binary certificate into a printable form. You can copy and paste the certificate into an e-mail to send to friends or colleagues or you can copy and paste the certificate into a text editor and save the file on a management computer for later distribution (via floppy disk for example).
BackClick this to return to the previous screen without saving.
ExportClick this and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
ApplyClick this to save your changes. You can only change the name and/or set whether or not you want the P-793H v2 to check the CRL that the certification authority issues before trusting a certificate issued by the certification authority.
CancelClick this to restore your previously saved settings.

12.3 Certificates Technical Reference

This section provides technical background information about the topics covered in this chapter.

12.3.1 Certificates Overview

The P-793H v2 can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner's identity and public key. Certificates provide a way to exchange public keys for use in authentication.

The P-793H v2 uses certificates based on public-key cryptography to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection. For example, a VPN tunnel might use the triple DES encryption algorithm.

The certification authority uses its private key to sign certificates. Anyone can then use the certification authority's public key to verify the certificates.

Advantages of Certificates

Certificates offer the following benefits.

  • The P-793H v2 only has to store the certificates of the certification authorities that you decide to trust, no matter how many devices you need to authenticate.
    Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys.

12.3.2 Private-Public Certificates

When using public-key cryptography for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure.

These keys work like a handwritten signature (in fact, certificates are often referred to as "digital signatures"). Only you can write your signature exactly as it should look. When people know what your signature looks like, they can verify whether something was signed by you, or by someone else. In the same way, your private key "writes" your digital signature and your public key allows people to verify whether data was signed by you, or by someone else. This process works as follows.

1 Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that the message content has not been altered by anyone else along the way. Tim generates a public key pair (one public key and one private key).
2 Tim keeps the private key and makes the public key openly available. This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not.
3 Tim uses his private key to sign the message and sends it to Jenny.
4 Jenny receives the message and uses Tim's public key to verify it. Jenny knows that the message is from Tim, and that although other people may have been able to read the message, no-one can have altered it (because they cannot re-sign the message with Tim's private key).
5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny's public key to verify the message.

Static Route

13.1 Overview

The P-793H v2 usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the P-793H v2 send data to devices not reachable through the default gateway, use static routes.

For example, the next figure shows a computer (A) connected to the P-793H v2's LAN interface. The P-793H v2 routes most traffic from A to the Internet through the P-793H v2's default gateway (R1). You create one static route to connect to services offered by your ISP behind router R2. You create another static route to communicate with a separate network behind a router R3 connected to the LAN.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 90 Example of Static Routing Topology

13.2 The Static Route Screen

Use this screen to view the static route rules. Click Advanced > Static Route to open the Static Route screen.

ZYXEL ARMOR Z1 NWD6605 - The Static Route Screen - 1
Figure 91 Advanced > Static Route

The following table describes the labels in this screen.

Table 58 Advanced > Static Route

LABELDESCRIPTION
#This is the number of an individual static route.
ActiveThis field indicates whether the rule is active or not.Clear the check box to disable the rule. Select the check box to enable it.
NameThis is the name that describes or identifies this route.
DestinationThis parameter specifies the IP network address of the final destination.Routing is always based on network number.
GatewayThis is the IP address of the gateway. The gateway is a router or switch on the same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations.
Subnet MaskThis parameter specifies the IP network subnet mask of the final destination.
ModifyClick the Edit icon to go to the screen where you can set up a static route on the P-793H v2.Click the Remove icon to remove a static route from the P-793H v2. A window displays asking you to confirm that you want to delete the route.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

13.2.1 Static Route Edit

Use this screen to configure the required information for a static route. Select a static route index number and click Edit. The screen shown next appears.

ZYXEL ARMOR Z1 NWD6605 - Static Route Edit - 1
Figure 92 Advanced > Static Route: Edit

The following table describes the labels in this screen.

Table 59 Advanced > Static Route: Edit

LABELDESCRIPTION
ActiveThis field allows you to activate/deactivate this static route.
Route NameEnter the name of the IP static route. The text may consist of up to 9 letters, numerals and any printable character found on a typical English language keyboard. Leave this field blank to delete this static route.
Destination IP AddressThis parameter specifies the IP network address of the final destination. Routing is always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID.
IP Subnet MaskEnter the IP subnet mask here.
Gateway TypeUse either Gateway Address or Gateway Node to configure a static route.
Gateway IP AddressEnter the IP address of the gateway. The gateway is a router or switch on the same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations.
Gateway NodeThis field is available when you select Gateway Node from Gateway Type. Select a remote node to set the static route. A remote note is a connection point outside of the local area network. One example of a remote node is your connection to your ISP.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

14.1 Overview

This chapter describes how to configure the 802.1Q/1P settings.

A Virtual Local Area Network (VLAN) allows a physical network to be partitioned into multiple logical networks. A VLAN group can be treated as an individual device. Each group can have its own rules about where and how to forward traffic. You can assign any ports on the P-793H v2 to a VLAN group and configure the settings for the group. You may also set the priority level for traffic transmitted through the ports.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 93 802.1Q/1P

14.1.1 What You Can Do in the 802.1Q/1P Screens

  • Use the Group Setting screen (Section 14.2 on page 213) to activate 802.1Q/1P, specify the management VLAN group, display the VLAN groups and configure the settings for each VLAN group.
  • Use the Port Setting screen (Section 14.3 on page 215) to configure the PVID and assign traffic priority for each port.

14.1.2 What You Need to Know About 802.1Q/1P

IEEE 802.1P Priority

IEEE 802.1P specifies the user priority field and defines up to eight separate traffic types by inserting a tag into a MAC-layer frame that contains bits to define class of service.

IEEE 802.1Q Tagged VLAN

Tagged VLAN uses an explicit tag (VLAN ID) in the MAC header to identify the VLAN membership of a frame across bridges - they are not confined to the device on which they were created. The VLAN ID associates a frame with a specific VLAN and provides the information that devices need to process the frame across the network.

PVC

A virtual circuit is a logical point-to-point circuit between customer sites.

Permanent means that the circuit is preprogrammed by the carrier as a path through the network. It does not need to be set up or torn down for each session.

Forwarding Tagged and Untagged Frames

Each port on the device is capable of passing tagged or untagged frames. To forward a frame from an 802.1Q VLAN-aware device to an 802.1Q VLAN-unaware device, the P-793H v2 first decides where to forward the frame and then strips off the VLAN tag. To forward a frame from an 802.1Q VLAN-unaware device to an 802.1Q VLAN-aware switch, the P-793H v2 first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port's default VID. The default PVID is VLAN 1 for all ports, but this can be changed.

Whether to tag an outgoing frame depends on the setting of the egress port on a per-VLAN, per-port basis (recall that a port can belong to multiple VLANs). If the tagging on the egress port is enabled for the VID of a frame, then the frame is transmitted as a tagged frame; otherwise, it is transmitted as an untagged frame.

14.1.3 802.1Q/1P Example

This example shows how to configure the 802.1Q/1P settings on the P-793H v2.

ZYXEL ARMOR Z1 NWD6605 - 802.1Q/1P Example - 1

LAN1 and LAN2 are connected to ATAs (Analogue Telephone Adapters) and used for VoIP traffic. You want to create high priority for this type of traffic, so you want to group these ports into one VLAN (VLAN2) and then to a PVC (PVC1) where the priority is set to high level of service.

You would start with the following steps.

1 Click Advanced > 802.1Q/1P > Group Setting, and then click the Edit button to display the following screen.
2 In the Name field type VoIP to identify the group.
3 In the VLAN ID field type in 2 to identify the VLAN group.
4 Select PVC1 from the Default Gateway drop-down list box.
5 In the Control field, select Fixed for LAN1, LAN2 and PVC1 to be permanent members of the VLAN group.

6 Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Click Apply. - 1

To set a high priority for VoIP traffic, follow these steps.

1 Click Advanced > 802.1Q/1P > Port Setting to display the following screen.
2 Type 2 in the 802.1Q PVID column for LAN1, LAN2 and PVC1.
3 Select 7 from the 802.1P Priority drop-down list box for LAN1, LAN2 and PVC1.

4 Click Apply.

ZYXEL ARMOR Z1 NWD6605 - Click Apply. - 1

Ports 3 and 4 are connected to desktop computers and are used for Internet traffic. You want to create low priority for this type of traffic, so you want to group these ports and PVC2 into one VLAN (VLAN3). PVC2 priority is set to low level of service.

Follow the same steps as in VLAN2 to configure the settings for VLAN3. The summary screen should then display as follows.

ZYXEL ARMOR Z1 NWD6605 - Click Apply. - 2

This completes the 802.1Q/1P setup.

14.2 The 802.1Q/1P Group Setting Screen

Use this screen to activate 802.1Q/1P and display the VLAN groups. Click Advanced > 802.1Q/1P to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - The 802.1Q/1P Group Setting Screen - 1
Figure 94 Advanced > 802.1Q/1P > Group Setting

The following table describes the labels in this screen.

Table 60 Advanced > 802.1Q/1P > Group Setting

LABELDESCRIPTION
802.1Q/1P
ActiveSelect this check box to activate the 802.1P/1Q feature.
Management VLAN IDEnter the ID number of a VLAN group. All interfaces (ports, SSIDs and PVCs) are in the management VLAN by default. If you disable the management VLAN, you will not be able to access the P-793H v2.
Summary
#This field displays the index number of the VLAN group.
NameThis field displays the name of the VLAN group.
VIDThis field displays the ID number of the VLAN group.
Port NumberThese columns display the VLAN's settings for each port. A tagged port is marked as T, an untagged port is marked as U and ports not participating in a VLAN are marked as “-”.
ModifyClick the Edit button to configure the ports in the VLAN group. Click the Remove button to delete the VLAN group.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

14.2.1 Editing 802.1Q/1P Group Setting

Use this screen to configure the settings for each VLAN group.

In the 802.1Q/1P screen, click the Edit button from the Modify filed to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - Editing 802.1Q/1P Group Setting - 1
Figure 95 Advanced > 802.1Q/1P > Group Setting > Edit

The following table describes the labels in this screen.

Table 61 Advanced > 802.1Q/1P > Group Setting > Edit

LABELDESCRIPTION
NameEnter a descriptive name for the VLAN group for identification purposes. The text may consist of up to 8 letters, numerals, “-”,“_” and “@”.
VLAN IDAssign a VLAN ID for the VLAN group. The valid VID range is between 1 and 4094.
Default GatewaySelect the default gateway for the VLAN group.
PortsThis field displays the types of ports available to join the VLAN group.
ControlSelect Fixed for the port to be a permanent member of the VLAN group. Select Forbidden if you want to prohibit the port from joining the VLAN group.
Tx TagSelect Tx Tagging if you want the port to tag all outgoing traffic transmitted through this VLAN. You select this if you want to create VLANs across different devices and not just the P-793H v2.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

14.3 The 802.1Q/1P Port Setting Screen

Use this screen to configure the PVID and assign traffic priority for each port. Click Advanced > 802.1Q/1P > Port Setting to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - The 802.1Q/1P Port Setting Screen - 1
Figure 96 Advanced > 802.1Q/1P > Port Setting

The following table describes the labels in this screen.

Table 62 Advanced > 802.1Q/1P > Port Setting

LABELDESCRIPTION
PortsThis field displays the types of ports available to join the VLAN group.
802.1Q PVIDAssign a VLAN ID for the port. The valid VID range is between 1 and 4094. The P-793H v2 assigns the PVID to untagged frames or priority-tagged frames received on this port.
802.1P PriorityAssign a priority for the traffic transmitted through the port. Select Same if you do not want to modify the priority. You may choose a priority level from 0-7, with 0 being the lowest level and 7 being the highest level.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

Quality of Service (QoS)

15.1 Overview

Use the QoS screens to set up your P-793H v2 to use QoS for traffic management.

Quality of Service (QoS) refers to both a network's ability to deliver data with minimum delay, and the networking methods used to control bandwidth. QoS allows the P-793H v2 to group and prioritize application traffic and fine-tune network performance.

Without QoS, all traffic data are equally likely to be dropped when the network is congested. This can cause a reduction in network performance and make the network inadequate for time-critical applications such as video-on-demand.

The P-793H v2 assigns each packet a priority and then queues the packet accordingly. Packets assigned with a high priority are processed more quickly than those with low priorities if there is congestion, allowing time-sensitive applications to flow more smoothly. Time-sensitive applications include both those that require a low level of latency (delay) and a low level of jitter (variations in delay) such as Voice over IP (VoIP) or Internet gaming, and those for which jitter alone is a problem such as Internet radio or streaming video.

15.2 QoS Overview

The following figure gives an overview of how to configure QoS on this P-793H v2:

ZYXEL ARMOR Z1 NWD6605 - QoS Overview - 1

1 First, you have to configure WAN connection(s) in Network > WAN > Internet Access Setup and Network > WAN > More Connections. Click the Advanced Setup button on the corresponding PVC setting screens to configure ATM QoS, if you want to prioritize traffic and eliminate congestion over the ATM network (at the ATM layer).
2 Configure queue settings in Advanced > QoS > Queue Setup according to the priority you want to apply to different types of traffic.
3 Configure class settings in Advanced > QoS > Class Setup. This associates queues with PVCs by mapping the priority of queues to the index number of PVCs.

15.2.1 What You Can Do in the QoS Screens

  • Use the General screen (Section 15.3 on page 223) to enable QoS on the P-793H v2, decide allowable bandwidth using QoS and configure priority mapping settings for traffic that does not match a custom class.
  • Use the Class Setup screen (Section 15.4 on page 224) to set up classifiers to sort traffic into different flows and assign priority and define actions to be performed for a classified traffic flow.
  • Use the Monitor screen (Section 15.5 on page 230) to view the P-793H v2's QoS-related packet statistics.

15.2.2 What You Need to Know About QoS

QoS versus Cos

QoS is used to prioritize source-to-destination traffic flows. All packets in the same flow are given the same priority. Class of Service (CoS) is a way of managing traffic in a network by grouping similar types of traffic together and treating each type as a class. You can use CoS to give different priorities to different packet types.

CoS technologies include IEEE 802.1p layer 2 tagging and Differentiated Services (DiffServ or DS). IEEE 802.1p tagging makes use of three bits in the packet header, while DiffServ is a new protocol and defines a new DS field, which replaces the eight-bit Type of Service (ToS) field in the IP header.

Tagging and Marking

In a QoS class, you can configure whether to add or change the DiffServ Code Point (DSCP) value, IEEE 802.1p priority level and VLAN ID number in a matched packet. When the packet passes through a compatible network, the networking device, such as a backbone switch, can provide specific treatment or service based on the tag or marker.

Finding Out More

See Section 15.6 on page 231 for advanced technical information on QoS.

15.2.3 QoS Class Setup Example

In the following figure, your Internet connection has an upstream transmission speed of 50 Mbps. You configure a classifier to assign the highest priority queue (6) to VoIP traffic from the LAN interface, so that voice traffic would not get delayed when there is network congestion. Traffic from the boss's IP address (192.168.1.23 for example) is mapped to queue 5. Traffic that does not match

these two classes are assigned priority queue based on the internal QoS mapping table on the P-793H v2.

ZYXEL ARMOR Z1 NWD6605 - QoS Class Setup Example - 1
Figure 97 QoS Example

ZYXEL ARMOR Z1 NWD6605 - QoS Class Setup Example - 2
Figure 98 QoS Class Example: VoIP -1

ZYXEL ARMOR Z1 NWD6605 - QoS Class Setup Example - 3
Figure 99 QoS Class Example: VoIP -2

ZYXEL ARMOR Z1 NWD6605 - QoS Class Setup Example - 4
Figure 100 QoS Class Example: Boss -1

ZYXEL ARMOR Z1 NWD6605 - QoS Class Setup Example - 5
Figure 101 QoS Class Example: Boss -2

15.3 The QoS General Screen

Use this screen to enable or disable QoS and have the P-793H v2 automatically assign priority to traffic according to the IEEE 802.1p priority level, IP precedence and/or packet length.

Click Advanced > QoS to open the screen as shown next.

ZYXEL ARMOR Z1 NWD6605 - The QoS General Screen - 1
Figure 102 Advanced > QoS > General

The following table describes the labels in this screen.

Table 63 Advanced > QoS > General

LABELDESCRIPTION
Active QoSSelect the check box to turn on QoS to improve your network performance. You can give priority to traffic that the P-793H v2 forwards out through the WAN interface. Give high priority to voice and video to make them run more smoothly. Similarly, give low priority to many large file downloads so that they do not reduce the quality of other applications.
WAN Managed BandwidthEnter the amount of bandwidth for the WAN interface that you want to allocate using QoS. The recommendation is to set this speed to match the interface's actual transmission speed. For example, set the WAN interface speed to 100000 kbps if your Internet connection has an upstream transmission speed of 100 Mbps. You can set this number higher than the interface's actual transmission speed. This will stop lower priority traffic from being sent if higher priority traffic uses all of the actual bandwidth. You can also set this number lower than the interface's actual transmission speed. This will cause the P-793H v2 to not use some of the interface's available bandwidth.

Table 63 Advanced > QoS > General

LABELDESCRIPTION
Traffic priority will be automatically assigned byThese fields are ignored if traffic matches a class you configured in the Class Setup screen.If you select ON and traffic does not match a class configured in the Class Setup screen, the P-793H v2 assigns priority to unmatched traffic based on the IEEE 802.1p priority level, IP precedence and/or packet length. See Section 15.6.4 on page 232 for more information.If you select OFF, traffic which does not match a class is mapped to queue two.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

15.4 The Class Setup Screen

Use this screen to add, edit or delete classifiers. A classifier groups traffic into data flows according to specific criteria such as the source address, destination address, source port number, destination port number or incoming interface. For example, you can configure a classifier to select traffic from the same protocol port (such as Telnet) to form a flow.

Click Advanced > QoS > Class Setup to open the following screen.

ZYXEL ARMOR Z1 NWD6605 - The Class Setup Screen - 1
Figure 103 Advanced > QoS > Class Setup

The following table describes the labels in this screen.

Table 64 Advanced > QoS > Class Setup

LABELDESCRIPTION
Create a new ClassClick Add to create a new classifier.
NoThis is the number of each classifier. The ordering of the classifiers is important as the classifiers are applied in turn.
ActiveSelect the check box to enable this classifier.
NameThis is the name of the classifier.
InterfaceThis shows the interface from which traffic of this classifier should come.
PriorityThis is the priority assigned to traffic of this classifier.
Filter ContentThis shows criteria specified in this classifier.
ModifyClick the Edit icon to go to the screen where you can edit the classifier. Click the Remove icon to delete an existing classifier.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

15.4.1 The Class Configuration Screen

Use this screen to configure a classifier. Click the Add button or the Edit icon in the Modify field to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - The Class Configuration Screen - 1
Figure 104 Advanced > QoS > Class Setup: Edit

See Appendix F on page 473 for a list of commonly-used services. The following table describes the labels in this screen.

Table 65 Advanced > QoS > Class Setup: Edit

LABELDESCRIPTION
Class Configuration
ActiveSelect the check box to enable this classifier.
NameThe text may consist of up to 20 letters, numerals and any printable character found on a typical English language keyboard.
InterfaceSelect from which interface traffic of this class should come.
PrioritySelect a priority level (between 0 and 7) or select Auto to have the P-793H v2 map the matched traffic to a queue according to the internal QoS mapping table. See Section 15.6.4 on page 232 for more information. "0" is the lowest priority level and "7" is the highest.
Routing PolicySelect the next hop to which traffic of this class should be forwarded. Select By Routing Table to have the P-793H v2 use the routing table to find a next hop and forward the matched packets automatically. Select To WAN Index to route the matched packets through the specified PVC. This option is available only when the WAN type is ADSL. Select To Gateway Address to route the matched packets to the router or switch you specified in the Gateway Address field.
WAN IndexSelect a PVC index number.
Gateway AddressEnter the IP address of the gateway, which should be a router or switch on the same segment as the P-793H v2's interface(s), that can forward the packet to the destination.
OrderThis shows the ordering number of this classifier. Select an existing number for where you want to put this classifier and click Apply to move the classifier to the number you selected. For example, if you select 2, the classifier you are moving becomes number 2 and the previous classifier 2 gets pushed down one.
Tag Configuration
DSCP ValueSelect Same to keep the DSCP fields in the packets. Select Auto to map the DSCP value to 802.1 priority level automatically. Select Mark to set the DSCP field with the value you configure in the field provided.
802.1Q TagSelect Same to keep the priority setting and VLAN ID of the frames. Select Auto to map the 802.1 priority level to the DSCP value automatically. Select Remove to delete the priority queue tag and VLAN ID of the frames. Select Mark to replace the 802.1 priority field and VLAN ID with the value you set in the fields below. Select Add to treat all matched traffic untagged and add a second priority queue tag and VLAN.
Ethernet PrioritySelect a priority level (between 0 and 7) from the drop down list box.
VLAN IDSpecify a VLAN ID number between 2 and 4094.
Filter ConfigurationUse the following fields to configure the criteria for traffic classification.
Source
AddressSelect the check box and enter the source IP address in dotted decimal notation. A blank source IP address means any source IP address.
Subnet NetmaskEnter the source subnet mask. Refer to the appendix for more information on IP subnetting.
PortSelect the check box and enter the port number of the source. 0 means any source port number. See Appendix F on page 473 for some common services and port numbers.
MACSelect the check box and enter the source MAC address of the packet.
MAC MaskType the mask for the specified MAC address to determine which bits a packet's MAC address should match. Enter "f" for each bit of the specified source MAC address that the traffic's MAC address should match. Enter "0" for the bit(s) of the matched traffic's MAC address, which can be of any hexadecimal character(s). For example, if you set the MAC address to 00:13:49:00:00:00 and the mask to ff:ff:ff:00:00:00, a packet with a MAC address of 00:13:49:12:34:56 matches this criteria.
ExcludeSelect this option to exclude the packets that match the specified criteria from this classifier.
Destination
AddressSelect the check box and enter the destination IP address in dotted decimal notation.
Subnet NetmaskEnter the destination subnet mask. Refer to the appendix for more information on IP subnetting.
PortSelect the check box and enter the port number of the destination. 0 means any source port number. See Appendix F on page 473 for some common services and port numbers.
MACSelect the check box and enter the destination MAC address of the packet.
MAC MaskType the mask for the specified MAC address to determine which bits a packet's MAC address should match. Enter "f" for each bit of the specified destination MAC address that the traffic's MAC address should match. Enter "0" for the bit(s) of the matched traffic's MAC address, which can be of any hexadecimal character(s). For example, if you set the MAC address to 00:13:49:00:00 and the mask to ff:ff:ff:00:00, a packet with a MAC address of 00:13:49:12:34:56 matches this criteria.
ExcludeSelect this option to exclude the packets that match the specified criteria from this classifier.
Others
ServiceThis field simplifies classifier configuration by allowing you to select a predefined application. When you select a predefined application, you do not configure the rest of the filter fields. SIP (Session Initiation Protocol) is a signaling protocol used in Internet telephony, instant messaging and other VoIP (Voice over IP) applications. Select the check box and select VoIP(SIP) from the drop-down list box to configure this classifier for traffic that uses SIP. File Transfer Protocol (FTP) is an Internet file transfer service that operates on the Internet and over TCP/IP networks. A system running the FTP server accepts commands from a system running an FTP client. The service allows users to send commands to the server for uploading and downloading files. Select the check box and select FTP from the drop-down list box to configure this classifier for FTP traffic.
ProtocolSelect this option and select the protocol (TCP or UDP) or select User defined and enter the protocol (service type) number. 0 means any protocol number.
Packet LengthSelect this option and enter the minimum and maximum packet length (from 28 to 1500) in the fields provided.
DSCPSelect this option and specify a DSCP (DiffServ Code Point) number between 0 and 63 in the field provided.
Ethernet PrioritySelect this option and select a priority level (between 0 and 7) from the drop down list box. "0" is the lowest priority level and "7" is the highest.
VLAN IDSelect this option and specify a VLAN ID number between 2 and 4094.
Physical PortSelect this option and select a LAN port.
Remote NodeSelect this option and select a remote node from the drop down list box. When the WAN type is Ethernet in the WAN > Internet Access Setup screen, you can select WAN1 only.
ExcludeSelect this option to exclude the packets that match the specified criteria from this classifier.
BackClick this to return to the previous screen without saving.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

15.5 The QoS Monitor Screen

Use this screen to view the P-793H v2's QoS packet statistics. Click Advanced > QoS > Monitor. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The QoS Monitor Screen - 1
Figure 105 Advanced > QoS > Monitor

The following table describes the labels in this screen.

Table 66 Advanced > QoS > Monitor

LABELDESCRIPTION
Priority QueueThis shows the priority queue number.Traffic assigned to higher index queues gets through faster while traffic in lower index queues is dropped if the network is congested.
PassThis shows how many packets mapped to this priority queue are transmitted successfully.
DropThis shows how many packets mapped to this priority queue are dropped.
Poll Interval(s)Enter the time interval for refreshing statistics in this field.
Set IntervalClick this to apply the new poll interval you entered in the Poll Interval(s) field.
StopClick this to stop refreshing statistics.

15.6 QoS Technical Reference

This section provides some technical background information about the topics covered in this chapter.

15.6.1 IEEE 802.1Q Tag

The IEEE 802.1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges. A VLAN tag includes the 12-bit VLAN ID and 3-bit user priority. The VLAN ID associates a frame with a specific VLAN and provides the information that devices need to process the frame across the network.

IEEE 802.1p specifies the user priority field and defines up to eight separate traffic types. The following table describes the traffic types defined in the IEEE 802.1d standard (which incorporates the 802.1p).

Table 67 IEEE 802.1p Priority Level and Traffic Type

PRIORITY LEVELTRAFFIC TYPE
Level 7Typically used for network control traffic such as router configuration messages.
Level 6Typically used for voice traffic that is especially sensitive to jitter (jitter is the variations in delay).
Level 5Typically used for video that consumes high bandwidth and is sensitive to jitter.
Level 4Typically used for controlled load, latency-sensitive traffic such as SNA (Systems Network Architecture) transactions.
Level 3Typically used for “excellent effort” or better than best effort and would include important business traffic that can tolerate some delay.
Level 2This is for “spare bandwidth”.
Level 1This is typically used for non-critical “background” traffic such as bulk transfers that are allowed but that should not affect other applications and users.
Level 0Typically used for best-effort traffic.

15.6.2 IP Precedence

Similar to IEEE 802.1p prioritization at layer-2, you can use IP precedence to prioritize packets in a layer-3 network. IP precedence uses three bits of the eight-bit ToS (Type of Service) field in the IP header. There are eight classes of services (ranging from zero to seven) in IP precedence. Zero is the lowest priority level and seven is the highest.

15.6.3 DiffServ

QoS is used to prioritize source-to-destination traffic flows. All packets in the flow are given the same priority. You can use CoS (class of service) to give different priorities to different packet types.

Differentiated Services (DiffServ) is a Class of Service (CoS) model that marks packets so that they receive specific per-hop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow. Packets are marked with DiffServ Code Points (DSCPs) indicating the level of service desired. This allows the intermediary DiffServ-compliant network devices to handle the packets differently depending on the code points without the need to negotiate paths or remember state information for every flow. In addition, applications do not have to request a particular service or give advanced notice of where the traffic is going.

DSCP and Per-Hop Behavior

DiffServ defines a new Differentiated Services (DS) field to replace the Type of Service (TOS) field in the IP header. The DS field contains a 2-bit unused field and a 6-bit DSCP field which can define up to 64 service levels. The following figure illustrates the DS field.

DSCP is backward compatible with the three precedence bits in the ToS octet so that non-DiffServ compliant, ToS-enabled network device will not conflict with the DSCP mapping.

DSCP (6 bits)

Unused (2 bits)

The DSCP value determines the forwarding behavior, the PHB (Per-Hop Behavior), that each packet gets across the DiffServ network. Based on the marking rule, different kinds of traffic can be marked for different kinds of forwarding. Resources can then be allocated according to the DSCP values and the configured policies.

15.6.4 Automatic Priority Queue Assignment

If you enable QoS on the P-793H v2, the P-793H v2 can automatically base on the IEEE 802.1p priority level, IP precedence and/or packet length to assign priority to traffic which does not match a class.

The following table shows you the internal layer-2 and layer-3 QoS mapping on the P-793H v2. On the P-793H v2, traffic assigned to higher priority queues gets

through faster while traffic in lower index queues is dropped if the network is congested.

Table 68 Internal Layer2 and Layer3 QoS Mapping

PRIORITY QUEUELAYER 2LAYER 3
IEEE 802.1P USER PRIORITY (ETHERNET PRIORITY)TOS (IP PRECEDENCE)DSCPIP PACKET LENGTH (BYTE)
010000000
12
200000000>1100
331001110250~1100
001100
001010
001000
442010110
010100
010010
010000
553011110<250
011100
011010
011000
664100110
100100
100010
100000
5101110
101000
776110000
7111000

Dynamic DNS Setup

16.1 Overview

Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect. Your friends or relatives will always be able to call you even if they don't know your IP address.

First of all, you need to have registered a dynamic DNS account with www.dyndns.org. This is for people with a dynamic IP from their ISP or DHCP server that would still like to have a domain name. The Dynamic DNS service provider will give you a password or key.

16.1.1 What You Need To Know About DDNS

DYNDNS Wildcard

Enabling the wildcard feature for your host causes *.yourhost.dyndns.org to be aliased to the same IP address as yourhost.dyndns.org. This feature is useful if you want to be able to use, for example, www.yourhost.dyndns.org and still reach your hostname.

If you have a private WAN IP address, then you cannot use Dynamic DNS.

16.2 The Dynamic DNS Screen

Use this screen to change your P-793H v2's DDNS. Click Advanced > Dynamic DNS. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The Dynamic DNS Screen - 1
Figure 106 Advanced > Dynamic DNS

The following table describes the fields in this screen.

Table 69 Advanced > Dynamic DNS

LABELDESCRIPTION
Dynamic DNS Setup
Active Dynamic DNSSelect this check box to use dynamic DNS.
Service ProviderThis is the name of your Dynamic DNS service provider.
Dynamic DNS TypeSelect the type of service that you are registered for from your Dynamic DNS service provider.
Host NameType the domain name assigned to your P-793H v2 by your Dynamic DNS provider. You can specify up to two host names in the field separated by a comma ("",").
User NameType your user name.
PasswordType the password assigned to you.
Enable Wildcard OptionSelect the check box to enable DynDNS Wildcard.
Enable off line optionThis option is available when CustomDNS is selected in the DDNS Type field. Check with your Dynamic DNS service provider to have traffic redirected to a URL (that you can specify) while you are off line.
IP Address Update Policy
Use WAN IP AddressSelect this option to update the IP address of the host name(s) to the WAN IP address.
Dynamic DNS server auto detect IP AddressSelect this option only when there are one or more NAT routers between the P-793H v2 and the DDNS server. This feature has the DDNS server automatically detect and use the IP address of the NAT router that has a public IP address.Note: The DDNS server may not be able to detect the proper IP address if there is an HTTP proxy server between the P-793H v2 and the DDNS server.
Use specified IP AddressType the IP address of the host name(s). Use this if you have a static IP address.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

Remote Management

17.1 Overview

Remote management allows you to determine which services/protocols can access which P-793H v2 interface (if any) from which computers.

The following figure shows remote management of the P-793H v2 coming in from the WAN.

ZYXEL ARMOR Z1 NWD6605 - Overview - 1
Figure 107 Remote Management From the WAN

Note: When you configure remote management to allow management from the WAN, you still need to configure a firewall rule to allow access.

You may manage your P-793H v2 from a remote location via:

  • Internet (WAN only)
  • LAN only
  • ALL (WAN and LAN)
  • None (Disable)

To disable remote management of a service, select Disable in the corresponding Access Status field.

You may only have one remote management session running at a time. The P-793H v2 automatically disconnects a remote management session of lower priority when another remote management session of higher priority starts. The priorities for the different types of remote management sessions are as follows.

1 Telnet
2 HTTP

17.1.1 What You Can Do in the Remote Management Screens

  • Use the WWW screen (Section 17.2 on page 241) to configure through which interface(s) and from which IP address(es) users can use HTTP to manage the P-793H v2.
  • Use the Telnet screen (Section 17.3 on page 242) to configure through which interface(s) and from which IP address(es) users can use Telnet to manage the P-793H v2.
  • Use the FTP screen (Section 17.4 on page 243) to configure through which interface(s) and from which IP address(es) users can use FTP to access the P-793H v2.
  • Use the SNMP screen (Section 17.5 on page 248) to configure your P-793H v2's settings for Simple Network Management Protocol management.
  • Use the DNS screen (Section 17.6 on page 248) to configure through which interface(s) and from which IP address(es) users can send DNS queries to the P-793H v2.
  • Use the ICMP screen (Section 17.7 on page 249) to set whether or not your P-793H v2 will respond to pings and probes for services that you have not made available.

17.1.2 What You Need to Know About Remote Management

Remote Management Limitations

Remote management does not work when:

  • You have not enabled that service on the interface in the corresponding remote management screen.
  • You have disabled that service in one of the remote management screens.
  • The IP address in the Secured Client IP field does not match the client IP address. If it does not match, the P-793H v2 will disconnect the session immediately.

  • There is already another remote management session with an equal or higher priority running. You may only have one remote management session running at one time.

  • There is a firewall rule that blocks it.

Remote Management and NAT

When NAT is enabled:

  • Use the P-793H v2's WAN IP address when configuring from the WAN.
  • Use the P-793H v2's LAN IP address when configuring from the LAN.

System Timeout

There is a default system management idle timeout of five minutes (three hundred seconds). The P-793H v2 automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling.

17.2 The WWW Screen

Use this screen to specify how to connect to the P-793H v2 from a web browser, such as Internet Explorer. You can also specify which IP addresses the access can come from.

Note: If you disable the WWW service in this screen, then the P-793H v2 blocks all HTTP connection attempts.

17.2.1 Configuring the WWW Screen

Click Advanced > Remote MGMT to display the WWW screen.

ZYXEL ARMOR Z1 NWD6605 - Configuring the WWW Screen - 1
Figure 108 Advanced > Remote Management > WWW

The following table describes the labels in this screen.

Table 70 Advanced > Remote Management > WWW

LABELDESCRIPTION
PortYou may change the server port number for a service, if needed. However, you must use the same port number in order to use that service for remote management.
Access StatusSelect the interface(s) through which a computer may access the P-793H v2 using this service.
Secured Client IPA secured client is a “trusted” computer that is allowed to communicate with the P-793H v2 using this service. Select All to allow any computer to access the P-793H v2 using this service. Choose Selected to just allow the computer with the IP address that you specify to access the P-793H v2 using this service.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

17.3 The Telnet Screen

You can use Telnet to access the P-793H v2's command line interface. Specify which interfaces allow Telnet access and from which IP address the access can come.

Click Advanced > Remote MGMT > Telnet tab to display the screen as shown.

ZYXEL ARMOR Z1 NWD6605 - The Telnet Screen - 1
Figure 109 Advanced > Remote Management > Telnet

The following table describes the labels in this screen.

Table 71 Advanced > Remote Management > Telnet

LABELDESCRIPTION
PortYou may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Access StatusSelect the interface(s) through which a computer may access the P-793H v2 using this service.
Secured Client IPA secured client is a “trusted” computer that is allowed to communicate with the P-793H v2 using this service. Select All to allow any computer to access the P-793H v2 using this service. Choose Selected to just allow the computer with the IP address that you specify to access the P-793H v2 using this service.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

17.4 The FTP Screen

You can use FTP (File Transfer Protocol) to upload and download the P-793H v2's firmware and configuration files. Please see the User's Guide chapter on firmware and configuration file maintenance for details. To use this feature, your computer must have an FTP client.

Use this screen to specify which interfaces allow FTP access and from which IP address the access can come. To change your P-793H v2's FTP settings, click Advanced > Remote MGMT > FTP. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The FTP Screen - 1
Figure 110 Advanced > Remote Management > FTP

The following table describes the labels in this screen.

Table 72 Advanced > Remote Management > FTP

LABELDESCRIPTION
PortYou may change the server port number for a service, if needed. However, you must use the same port number in order to use that service for remote management.
Access StatusSelect the interface(s) through which a computer may access the P-793H v2 using this service.
Secured Client IPA secured client is a “trusted” computer that is allowed to communicate with the P-793H v2 using this service. Select All to allow any computer to access the P-793H v2 using this service. Choose Selected to just allow the computer with the IP address that you specify to access the P-793H v2 using this service.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

17.5 The SNMP Screen

Simple Network Management Protocol (SNMP) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your P-793H v2 supports SNMP agent functionality, which allows a manager station to manage and monitor the P-793H v2 through the network. The P-793H v2 supports SNMP version one (SNMPv1) and version two (SNMPv2). The next figure illustrates an SNMP management operation.

Note: SNMP is only available if TCP/IP is configured.

ZYXEL ARMOR Z1 NWD6605 - The SNMP Screen - 1
Figure 111 SNMP Management Model

An SNMP managed network consists of two main types of component: agents and a manager.

An agent is a management software module that resides in a managed device (the P-793H v2). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices.

The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects.

SNMP itself is a simple request/response protocol based on the manager/agent model. The manager issues a request and the agent returns responses using the following protocol operations:

  • Get - Allows the manager to retrieve an object variable from the agent.
  • GetNext - Allows the manager to retrieve the next object variable from a table or list within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table from an agent, it initiates a Get operation, followed by a series of GetNext operations.
  • Set - Allows the manager to set values for object variables within an agent
  • Trap - Used by the agent to inform the manager of some events.

17.5.1 Supported MIBs

The P-793H v2 supports MIB II, which is defined in RFC-1213 and RFC-1215. The focus of the MIBs is to let administrators collect statistical data and monitor status and performance.

17.5.2 SNMP Traps

The P-793H v2 will send traps to the SNMP manager when any one of the following events occurs:

Table 73 SNMP Traps

TRAP #TRAP NAMEDESCRIPTION
0coldStart (defined in RFC-1215)A trap is sent after booting (power on).
1warmStart (defined in RFC-1215)A trap is sent after booting (software reboot).
4authenticationFailure (defined in RFC-1215)A trap is sent to the manager when receiving any SNMP get or set requirements with the wrong community (password).
6whyReboot (defined in ZYXEL-MIB)A trap is sent with the reason of restart before rebooting when the system is going to restart (warm start).
6aFor intentional reboot:A trap is sent with the message "System reboot by user!" if reboot is done intentionally, (for example, download new files, CI command "sys reboot", etc.).
6bFor fatal error:A trap is sent with the message of the fatal code if the system reboots because of fatal errors.

17.5.3 Configuring SNMP

To change your P-793H v2's SNMP settings, click Advanced > Remote MGMT > SNMP. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - Configuring SNMP - 1
Figure 112 Advanced > Remote Management > SNMP

The following table describes the labels in this screen.

Table 74 Advanced > Remote Management > SNMP

LABELDESCRIPTION
SNMP
PortYou may change the server port number for a service, if needed. However, you must use the same port number in order to use that service for remote management.
Access StatusSelect the interface(s) through which a computer may access the P-793H v2 using this service.
Secured Client IPA secured client is a “trusted” computer that is allowed to communicate with the P-793H v2 using this service. Select All to allow any computer to access the P-793H v2 using this service. Choose Selected to just allow the computer with the IP address that you specify to access the P-793H v2 using this service.
SNMP Configuration
Get CommunityEnter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests.
Set CommunityEnter the Set community, which is the password for incoming Set requests from the management station. The default is public and allows all requests.
TrapCommunityType the trap community, which is the password sent with each trap to the SNMP manager. The default is public and allows all requests.
TrapDestinationType the IP address of the station to send your SNMP traps to.

Table 74 Advanced > Remote Management > SNMP

LABELDESCRIPTION
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

17.6 The DNS Screen

Use DNS (Domain Name System) to map a domain name to its corresponding IP address and vice versa. Refer to Chapter 7 on page 101 for background information.

Use this screen to set from which IP address the P-793H v2 will accept DNS queries and on which interface it can send them your P-793H v2's DNS settings. This feature is not available when the P-793H v2 is set to bridge mode. Click Advanced > Remote MGMT > DNS to change your P-793H v2's DNS settings.

ZYXEL ARMOR Z1 NWD6605 - The DNS Screen - 1
Figure 113 Advanced > Remote Management > DNS

The following table describes the labels in this screen.

Table 75 Advanced > Remote Management > DNS

LABELDESCRIPTION
PortThe DNS service port number is 53 and cannot be changed here.
Access StatusSelect the interface(s) through which a computer may send DNS queries to the P-793H v2.
Secured Client IPA secured client is a “trusted” computer that is allowed to send DNS queries to the P-793H v2. Select All to allow any computer to send DNS queries to the P-793H v2. Choose Selected to just allow the computer with the IP address that you specify to send DNS queries to the P-793H v2.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

17.7 The ICMP Screen

To change your P-793H v2's security settings, click Advanced > Remote MGMT > ICMP. The screen appears as shown.

If an outside user attempts to probe an unsupported port on your P-793H v2, an ICMP response packet is automatically returned. This allows the outside user to know the P-793H v2 exists. Your P-793H v2 supports anti-probing, which prevents the ICMP response packet from being sent. This keeps outsiders from discovering your P-793H v2 when unsupported ports are probed.

Note: If you want your device to respond to pings and requests for unauthorized services, you may also need to configure the firewall anti probing settings to match.

ZYXEL ARMOR Z1 NWD6605 - The ICMP Screen - 1
Figure 114 Advanced > Remote Management > ICMP

The following table describes the labels in this screen.

Table 76 Advanced > Remote Management > ICMP

LABELDESCRIPTION
ICMPInternet Control Message Protocol is a message control and error-reporting protocol between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP software and directly apparent to the application user.
Respond to Ping onThe P-793H v2 will not respond to any incoming Ping requests when Disable is selected. Select LAN to reply to incoming LAN Ping requests. Select WAN to reply to incoming WAN Ping requests. Otherwise select LAN & WAN to reply to both incoming LAN and WAN Ping requests.
Do not respond to requests for unauthorized servicesSelect this option to prevent hackers from finding the P-793H v2 by probing for unused ports. If you select this option, the P-793H v2 will not respond to port request(s) for unused ports, thus leaving the unused ports and the P-793H v2 unseen. If this option is not selected, the P-793H v2 will reply with an ICMP port unreachable packet for a port probe on its unused UDP ports and a TCP reset packet for a port probe on its unused TCP ports.Note that the probing packets must first traverse the P-793H v2's firewall rule checks before reaching this anti-probing mechanism.Therefore if a firewall rule stops a probing packet, the P-793H v2 reacts based on the firewall rule to either send a TCP reset packet for a blocked TCP packet (or an ICMP port-unreachable packet for a blocked UDP packets) or just drop the packets without sending a response packet.

Table 76 Advanced > Remote Management > ICMP

LABELDESCRIPTION
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

Universal Plug-and-Play (UPnP)

18.1 Overview

Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.

18.1.1 What You Can Do in the UPnP Screen

Use the UPnP screen (Section 18.2 on page 253) to enable UPnP on the P-793H v2 and allow UPnP-enabled applications to automatically configure the P-793H v2.

18.1.2 What You Need to Know About UPnP

Identifying UPnP Devices

UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP compatible device installed on your network will appear as a separate icon. Selecting the icon of a UPnP device will allow you to access the information and properties of that device.

NAT Traversal

UPnP NAT traversal automates the process of allowing an application to operate through NAT. UPnP network devices can automatically configure network addressing, announce their presence in the network to other UPnP devices and enable exchange of simple product and service descriptions. NAT traversal allows the following:

  • Dynamic port mapping
  • Learning public IP addresses
  • Assigning lease times to mappings

Windows Messenger is an example of an application that supports NAT traversal and UPnP.

See the NAT chapter for more information on NAT.

Cautions with UPnP

The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments.

When a UPnP device joins a network, it announces its presence with a multicast message. For security reasons, the P-793H v2 allows multicast messages on the LAN only.

All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention.

UPnP and ZyXEL

ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum UPnP™ Implementers Corp. (UIC). ZyXEL's UPnP implementation supports Internet Gateway Device (IGD) 1.0.

See the following sections for examples of installing and using UPnP.

18.2 The UPnP Screen

Use the following screen to configure the UPnP settings on your P-793H v2. Click Advanced > UPnP to display the screen shown next.

See Section 18.1 on page 251 for more information.

ZYXEL ARMOR Z1 NWD6605 - The UPnP Screen - 1
Figure 115 Advanced > UPnP > General

The following table describes the fields in this screen.

Table 77 Advanced > UPnP > General

LABELDESCRIPTION
Active the Universal Plug and Play (UPnP) FeatureSelect this check box to activate UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the P-793H v2's IP address (although you must still enter the password to access the web configurator).
Allow users to make configuration changes through UPnPSelect this check box to allow UPnP-enabled applications to automatically configure the P-793H v2 so that they can communicate through the P-793H v2, for example by using NAT traversal, UPnP applications automatically reserve a NAT forwarding port in order to communicate with another UPnP enabled device; this eliminates the need to manually configure port forwarding for the UPnP enabled application.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

18.3 Installing UPnP in Windows Example

This section shows how to install UPnP in Windows Me and Windows XP.

Installing UPnP in Windows Me

Follow the steps below to install the UPnP in Windows Me.

1 Click Start and Control Panel. Double-click Add/Remove Programs.
2 Click on the Windows Setup tab and select Communication in the Components selection box. Click Details.

ZYXEL ARMOR Z1 NWD6605 - Installing UPnP in Windows Me - 1

3 In the Communications window, select the Universal Plug and Play check box in the Components selection box.

ZYXEL ARMOR Z1 NWD6605 - Installing UPnP in Windows Me - 2

4 Click OK to go back to the Add/Remove Programs Properties window and click Next.
5 Restart the computer when prompted.

Installing UPnP in Windows XP

Follow the steps below to install the UPnP in Windows XP.

1 Click Start and Control Panel.
2 Double-click Network Connections.

3 In the Network Connections window, click Advanced in the main menu and select Optional Networking Components ....

ZYXEL ARMOR Z1 NWD6605 - Installing UPnP in Windows XP - 1

4 The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details.

ZYXEL ARMOR Z1 NWD6605 - Installing UPnP in Windows XP - 2

5 In the Networking Services window, select the Universal Plug and Play check box.

ZYXEL ARMOR Z1 NWD6605 - Installing UPnP in Windows XP - 3

6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next.

18.4 Using UPnP in Windows XP Example

This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the P-793H v2.

Make sure the computer is connected to a LAN port of the P-793H v2. Turn on your computer and the P-793H v2.

Auto-discover Your UPnP-enabled Network Device

1 Click Start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway.

2 Right-click the icon and select Properties.

ZYXEL ARMOR Z1 NWD6605 - Right-click the icon and select Properties. - 1

3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.

ZYXEL ARMOR Z1 NWD6605 - In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. - 1

4 You may edit or delete the port mappings or click Add to manually add port mappings.

ZYXEL ARMOR Z1 NWD6605 - In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. - 2

ZYXEL ARMOR Z1 NWD6605 - In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. - 3

5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.

6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.

ZYXEL ARMOR Z1 NWD6605 - In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. - 4

7 Double-click on the icon to display your current Internet connection status.

ZYXEL ARMOR Z1 NWD6605 - In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. - 5

Web Configurator Easy Access

With UPnP, you can access the web-based configurator on the P-793H v2 without finding out the IP address of the P-793H v2 first. This comes helpful if you do not know the IP address of the P-793H v2.

Follow the steps below to access the web configurator.

1 Click Start and then Control Panel.
2 Double-click Network Connections.

3 Select My Network Places under Other Places.

ZYXEL ARMOR Z1 NWD6605 - Select My Network Places under Other Places. - 1

4 An icon with the description for each UPnP-enabled device displays under Local Network.

5 Right-click on the icon for your P-793H v2 and select Invoke. The web configurator login screen displays.

ZYXEL ARMOR Z1 NWD6605 - Select My Network Places under Other Places. - 2

6 Right-click on the icon for your P-793H v2 and select Properties. A properties window displays with basic information about the P-793H v2.

ZYXEL ARMOR Z1 NWD6605 - Select My Network Places under Other Places. - 3

System Settings

19.1 Overview

This chapter shows you how to configure system related settings, such as system time, password, name, the domain name and the inactivity timeout interval.

19.1.1 What You Can Do in the System Settings Screens

  • Use the General screen (Section 19.2 on page 264) to configure system settings.
  • Use the Time Setting screen (Section 19.3 on page 266) to set the system time.

19.1.2 What You Need to Know About System Settings

DHCP

DHCP (Dynamic Host Configuration Protocol) is a method of allocating IP addresses to devices on a network from a DHCP Server. Often your ISP or a router on your network performs this function.

LAN

A LAN (local area network) is typically a network which covers a small area, made up of computers and other devices which share resources such as Internet access, printers etc.

19.2 The General Screen

Use this screen to configure system settings such as the system and domain name, inactivity timeout interval and system password.

The System Name is for identification purposes. However, because some ISPs check this name you should enter your computer's "Computer Name". Find the system name of your Windows computer by following one of the steps below.

  • In Windows 95/98 click Start, Settings, Control Panel, Network. Click the Identification tab, note the entry for the Computer Name field and enter it as the System Name.
  • In Windows 2000, click Start, Settings, Control Panel and then double-click System. Click the Network Identification tab and then the Properties button. Note the entry for the Computer name field and enter it as the System Name.
  • In Windows XP, click start, My Computer, View system information and then click the Computer Name tab. Note the entry in the Full computer name field and enter it as the P-793H v2 System Name.

Click Maintenance > System to open the General screen.

ZYXEL ARMOR Z1 NWD6605 - The General Screen - 1
Figure 116 Maintenance > System > General

The following table describes the labels in this screen.

Table 78 Maintenance > System > General

LABELDESCRIPTION
System Setup
System NameChoose a descriptive name for identification purposes. It is recommended you enter your computer's "Computer name" in this field. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes "- " and underscores "_ " are accepted.
Domain NameEnter the domain name (if you know it) here. If you leave this field blank, the ISP may assign a domain name via DHCP.The domain name entered by you is given priority over the ISP assigned domain name.The Domain Name entry is propagated to the DHCP clients on the LAN.
Administrator Inactivity TimerType how many minutes a management session (either via the web configurator or telnet) can be left idle before the session times out. The default is 5 minutes. After it times out you have to log in with your password again. Very long idle timeouts may have security risks. A value of "0" means a management session never times out, no matter how long it has been left idle (not recommended).
Password
User Password
New PasswordType your new user password (up to 30 characters). Note that as you type a password, the screen displays a (*) for each character you type. After you change the password, use the new password to access the P-793H v2.
Retype to confirmType the new password again for confirmation.
Admin Password
Old PasswordType the default password or the existing password you use to access the system in this field.
New PasswordType your new system password (up to 30 characters). Note that as you type a password, the screen displays a (*) for each character you type. After you change the password, use the new password to access the P-793H v2.
Retype to confirmType the new password again for confirmation.
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

19.3 The Time Setting Screen

Use this screen to configure the P-793H v2's time based on your local time zone. To change your P-793H v2's time and date, click Maintenance > System > Time Setting. The screen appears as shown.

ZYXEL ARMOR Z1 NWD6605 - The Time Setting Screen - 1
Figure 117 Maintenance > System > Time Setting

The following table describes the fields in this screen.

Table 79 Maintenance > System > Time Setting

LABELDESCRIPTION
Current Time
Current TimeThis field displays the time of your P-793H v2. Each time you reload this page, the P-793H v2 synchronizes the time with the time server.
Current DateThis field displays the date of your P-793H v2. Each time you reload this page, the P-793H v2 synchronizes the date with the time server.
Time and Date Setup
ManualSelect this radio button to enter the time and date manually. If you configure a new time and date, Time Zone and Daylight Saving at the same time, the new time and date you entered has priority and the Time Zone and Daylight Saving settings do not affect it.
New Time (hh:mm:ss)This field displays the last updated time from the time server or the last time configured manually. When you set Time and Date Setup to Manual, enter the new time in this field and then click Apply.
New Date (yyyy/mm/dd)This field displays the last updated date from the time server or the last date configured manually. When you set Time and Date Setup to Manual, enter the new date in this field and then click Apply.
Get from Time ServerSelect this radio button to have the P-793H v2 get the time and date from the time server you specified below.
Time ProtocolSelect the time service protocol that your time server sends when you turn on the P-793H v2. Not all time servers support all protocols, so you may have to check with your ISP/network administrator or use trial and error to find a protocol that works. The main difference between them is the format. Daytime (RFC 867) format is day/month/year/time zone of the server. Time (RFC 868) format displays a 4-byte integer giving the total number of seconds since 1970/1/1 at 0:0:0. The default, NTP (RFC 1305), is similar to Time (RFC 868).
Time Server AddressEnter the IP address or URL (up to 20 extended ASCII characters in length) of your time server. Check with your ISP/network administrator if you are unsure of this information.
Time Zone Setup
Time ZoneChoose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT).
Daylight SavingsDaylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening. Select this option if you use Daylight Saving Time.
Start DateConfigure the day and time when Daylight Saving Time starts if you selected Enable Daylight Saving. The o'clock field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Second, Sunday, March and type 2 in the o'clock field. Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, March. The time you type in the o'clock field depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
End DateConfigure the day and time when Daylight Saving Time ends if you selected Enable Daylight Saving. The o'clock field uses the 24 hour format. Here are a couple of examples:Daylight Saving Time ends in the United States on the first Sunday of November. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select First, Sunday, November and type 2 in the o'clock field.Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Last, Sunday, October. The time you type in the o'clock field depends on your time zone. In Germany for instance, you would type 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
ApplyClick this to save your changes.
CancelClick this to restore your previously saved settings.

20.1 Overview

This chapter contains information about configuring general log settings and viewing the P-793H v2's logs.

The web configurator allows you to choose which categories of events and/or alerts to have the P-793H v2 log and then display the logs or have the P-793H v2 send them to an administrator (as e-mail) or to a syslog server.

20.1.1 What You Can Do in the Log Screens

  • Use the View Log screen (Section 20.2 on page 270) to see the logs for the categories that you selected in the Log Settings screen.
  • Use The Log Settings screen (Section 20.3 on page 271) to configure the mail server, the syslog server, when to send logs and what logs to send.

20.1.2 What You Need To Know About Logs

Alerts

An alert is a message that is enabled as soon as the event occurs. They include system errors, attacks (access control) and attempted access to blocked web sites. Some categories such as System Errors consist of both logs and alerts. You may differentiate them by their color in the View Log screen. Alerts display in red and logs display in black.

Logs

A log is a message about an event that occurred on your P-793H v2. For example, when someone logs in to the P-793H v2, you can set a schedule for how often logs should be enabled, or sent to a syslog server.

20.2 The View Log Screen

Use the View Log screen to see the logs for the categories that you selected in the Log Settings screen (see Section 20.3 on page 271). Click Maintenance > Logs to open the View Log screen.

Entries in red indicate alerts. The log wraps around and deletes the old entries after it fills. Click a column heading to sort the entries by that column's criteria. Click the heading cell again to reverse the sort order. A triangle indicates ascending or descending sort order.

ZYXEL ARMOR Z1 NWD6605 - The View Log Screen - 1
Figure 118 Maintenance > Logs > View Log

The following table describes the fields in this screen.

Table 80 Maintenance > Logs > View Log

LABELDESCRIPTION
DisplayThe categories that you select in the Log Settings screen display in the drop-down list box. Select a category of logs to view; select All Logs to view logs from all of the log categories that you selected in the Log Settings page.
Email Log NowClick this to send the log screen to the e-mail address specified in the Log Settings page (make sure that you have first filled in the E-mail Log Settings fields in Log Settings).
RefreshClick this to renew the log screen.
Clear LogClick this to delete all the logs.
#This field is a sequential value and is not associated with a specific entry.
TimeThis field displays the time the log was recorded.
MessageThis field states the reason for the log.
SourceThis field lists the source IP address and the port number of the incoming packet.

Table 80 Maintenance > Logs > View Log

LABELDESCRIPTION
DestinationThis field lists the destination IP address and the port number of the incoming packet.
NotesThis field displays additional information about the log entry.

20.3 The Log Settings Screen

Use the Log Settings screen to configure the mail server, the syslog server, when to send logs and what logs to send.

To change your P-793H v2's log settings, click Maintenance > Logs > Log Settings. The screen appears as shown.

Alerts are e-mailed as soon as they happen. Logs may be e-mailed as soon as the log is full. Selecting many alert and/or log categories (especially Access Control) may result in many e-mails being sent.

ZYXEL ARMOR Z1 NWD6605 - The Log Settings Screen - 1
Figure 119 Maintenance > Logs > Log Settings

The following table describes the fields in this screen.

Table 81 Maintenance > Logs > Log Settings

LABELDESCRIPTION
E-mail Log Settings
Mail ServerEnter the server name or the IP address of the mail server for the e-mail addresses specified below. If this field is left blank, logs and alert messages will not be sent via E-mail.
Mail SubjectType a title that you want to be in the subject line of the log e-mail message that the P-793H v2 sends. Not all P-793H v2 models have this field.
Send Log toThe P-793H v2 sends logs to the e-mail address specified in this field. If this field is left blank, the P-793H v2 does not send logs via e-mail.
Send Alerts toAlerts are real-time notifications that are sent as soon as an event, such as a DoS attack, system error, or forbidden web access attempt occurs. Enter the E-mail address where the alert messages will be sent. Alerts include system errors, attacks and attempted access to blocked web sites. If this field is left blank, alert messages will not be sent via E-mail.
Log ScheduleThis drop-down menu is used to configure the frequency of log messages being sent as E-mail: • Daily • Weekly • Hourly • When Log is Full • None. If you select Weekly or Daily, specify a time of day when the E-mail should be sent. If you select Weekly, then also specify which day of the week the E-mail should be sent. If you select When Log is Full, an alert is sent when the log fills up. If you select None, no log messages are sent.
Day for Sending LogUse the drop down list box to select which day of the week to send the logs.
Time for Sending LogEnter the time of the day in 24-hour format (for example 23:00 equals 11:00 pm) to send the logs.
Clear log after sending mailSelect the checkbox to delete all the logs after the P-793H v2 sends an E-mail of the logs.
Syslog LoggingThe P-793H v2 sends a log to an external syslog server.
ActiveClick Active to enable syslog logging.
Syslog IP AddressEnter the server name or IP address of the syslog server that will log the selected categories of logs.
Log FacilitySelect a location from the drop down list box. The log facility allows you to log the messages to different files in the syslog server. Refer to the syslog server manual for more information.
Active Log and Alert
LogSelect the categories of logs that you want to record.

Table 81 Maintenance > Logs > Log Settings

LABELDESCRIPTION
Send Immediate AlertSelect log categories for which you want the P-793H v2 to send E-mail alerts immediately.
ApplyClick this to save your customized settings and exit this screen.
CancelClick this to restore your previously saved settings.

20.4 SMTP Error Messages

If there are difficulties in sending e-mail the following error message appears.

"SMTP action request failed. ret = ???". The "???are described in the following table.

Table 82 SMTP Error Messages

-1 means P-793H v2 out of socket
-2 means tcp SYN fail
-3 means smtp server OK fail
-4 means HELO fail
-5 means MAIL FROM fail
-6 means RCPT TO fail
-7 means DATA fail
-8 means mail data send fail

20.4.1 Example E-mail Log

An "End of Log" message displays for each mail in which a complete log has been sent. The following is an example of a log sent by e-mail.

  • You may edit the subject title.

  • "End of Log" message shows that a complete log has been sent.

Figure 120 E-mail Log Example

Subject: Firewall Alert From Date: Fri, 07 Apr 2000 10:05:42 From: user@zyxel.com To: user@zyxel.com 1|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 default policy forward 09:54:03 UDP src port:00520 dest port:00520 <1,00> 2|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 default policy forward 09:54:17 UDP src port:00520 dest port:00520 <1,00> 3|Apr 7 00 |From:192.168.1.6 To:10.10.10.10 match forward 09:54:19 UDP src port:03516 dest port:00053 <1,01>   
{snip}   
{snip}   
126|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 match forward 10:05:00 UDP src port:00520 dest port:00520 <1,02>   
127|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 match forward 10:05:17 UDP src port:00520 dest port:00520 <1,02>   
128|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 match forward 10:05:30 UDP src port:00520 dest port:00520 <1,02>   
End of Firewall Log 

20.5 Log Descriptions

This section provides descriptions of example log messages.

Table 83 System Maintenance Logs

LOGMESSAGEDESCRIPTION
Time calibration is successfulThe router has adjusted its time based on information from the time server.
Time calibration failedThe router failed to get information from the time server.
WAN interface gets IP: %sA WAN interface got a new IP address from the DHCP, PPPoE, or dial-up server.
DHCP client IP expiredA DHCP client's IP address has expired.
DHCP server assigns %sThe DHCP server assigned an IP address to a client.
Successful WEB loginSomeone has logged on to the router's web configurator interface.
WEB login failedSomeone has failed to log on to the router's web configurator interface.
Successful TELNET loginSomeone has logged on to the router via telnet.
TELNET login failedSomeone has failed to log on to the router via telnet.
Successful FTP loginSomeone has logged on to the router via ftp.
FTP login failedSomeone has failed to log on to the router via ftp.
NAT Session Table is Full!The maximum number of NAT session table entries has been exceeded and the table is full.
Starting Connectivity MonitorStarting Connectivity Monitor.
Time initialized by Daytime ServerThe router got the time and date from the Daytime server.
Time initialized by Time serverThe router got the time and date from the time server.
Time initialized by NTP serverThe router got the time and date from the NTP server.
Connect to Daytime server failThe router was not able to connect to the Daytime server.
Connect to Time server failThe router was not able to connect to the Time server.
Connect to NTP server failThe router was not able to connect to the NTP server.
Too large ICMP packet has been droppedThe router dropped an ICMP packet that was too large.
Configuration Change: PC = 0x%x, Task ID = 0x%xThe router is saving configuration changes.
Successful SSH loginSomeone has logged on to the router's SSH server.
SSH login failedSomeone has failed to log on to the router's SSH server.
Successful HTTPS loginSomeone has logged on to the router's web configurator interface using HTTPS protocol.
HTTPS login failedSomeone has failed to log on to the router's web configurator interface using HTTPS protocol.

Table 84 System Error Logs

LOGMESSAGEDESCRIPTION
%sexceeds the max. number of session per host!This attempt to create a NAT session exceeds the maximum number of NAT session table entries allowed to be created per host.
setNetBIOSFilter:%XThe router failed to allocate memory for the NetBIOS filter settings.
readNetBIOSFilter:%XThe router failed to allocate memory for the NetBIOS filter settings.
WAN connection is down.A WAN connection is down. You cannot access the network through this interface.

Table 85 Access Control Logs

LOGMESSAGEDESCRIPTION
Firewall default policy: [TCP | UDP | IGMP | ESP | GRE | OSPF ] <Packet Direction>Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched the default policy and was blocked or forwarded according to the default policy's setting.
Firewall rule [NOT] match: [TCP | UDP | IGMP | ESP | GRE | OSPF ] <Packet Direction>, <rule:%d>Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched (or did not match) a configured firewall rule (denoted by its number) and was blocked or forwarded according to the rule.
Triangle route packet forwarded: [TCP | UDP | IGMP | ESP | GRE | OSPF ]The firewall allowed a triangle route session to pass through.
Packet without a NAT table entry blocked: [TCP | UDP | IGMP | ESP | GRE | OSPF ]The router blocked a packet that didn't have a corresponding NAT table entry.
Router sent blocked web site message: TCPThe router sent a message to notify a user that the router blocked access to a web site that the user requested.

Table 86 TCP Reset Logs

LOGMESSAGEDESCRIPTION
Under SYN flood attack, sent TCP RSTThe router sent a TCP reset packet when a host was under a SYN flood attack (the TCP incomplete count is per destination host.)
Exceed TCP MAX incomplete, sent TCP RSTThe router sent a TCP reset packet when the number of TCP incomplete connections exceeded the user configured threshold. (the TCP incomplete count is per destination host.) Note: Refer to TCP Maximum Incomplete in the Firewall Attack Alerts screen.
Peer TCP state out of order, sent TCP RSTThe router sent a TCP reset packet when a TCP connection state was out of order. Note: The firewall refers to RFC793 Figure 6 to check the TCP state.
Firewall session time out, sent TCP RSTThe router sent a TCP reset packet when a dynamic firewall session timed out.Default timeout values: ICMP idle timeout (s): 60UDP idle timeout (s): 60TCP connection (three way handshaking) timeout (s): 30TCP FIN-wait timeout (s): 60TCP idle (established) timeout (s): 3600
Exceed MAX incomplete, sent TCP RSTThe router sent a TCP reset packet when the number of incomplete connections (TCP and UDP) exceeded the user-configured threshold. (Incomplete count is for all TCP and UDP connections through the firewall.)Note: When the number of incomplete connections (TCP + UDP) > "Maximum Incomplete High", the router sends TCP RST packets for TCP connections and destroys TOS (firewall dynamic sessions) until incomplete connections < "Maximum Incomplete Low".
Access block, sent TCP RSTThe router sends a TCP RST packet and generates this log if you turn on the firewall TCP reset mechanism (via CI command: "sys firewall tcprst").

Table 87 Packet Filter Logs

LOGMESSAGEDESCRIPTION
[TCP | UDP | ICMP | IGMP | Generic ] packet filter matched (set:%d, rule:%d)Attempted access matched a configured filter rule (denoted by its set and rule number) and was blocked or forwarded according to the rule.

For type and code details, see Table 96 on page 280.

Table 88 ICMP Logs

LOGMESSAGEDESCRIPTION
Firewall default policy: ICMP <Packet Direction>, <type:%d>, <code:%d>ICMP access matched the default policy and was blocked or forwarded according to the user's setting.
Firewall rule [NOT] match: ICMP <Packet Direction>, <rule:%d>, <type:%d>, <code:%d>ICMP access matched (or didn't match) a firewall rule (denoted by its number) and was blocked or forwarded according to the rule.
Triangle route packet forwarded: ICMPThe firewall allowed a triangle route session to pass through.
Packet without a NAT table entry blocked: ICMPThe router blocked a packet that didn't have a corresponding NAT table entry.
Unsupported/out-of-order ICMP: ICMPThe firewall does not support this kind of ICMP packets or the ICMP packets are out of order.
Router reply ICMP packet: ICMPThe router sent an ICMP reply packet to the sender.

Table 89 CDR Logs

LOGMESSAGEDESCRIPTION
board %d line %d channel %d, call %d, %s C01 Outgoing Call dev=%x ch=%x %sThe router received the setup requirements for a call. "call" is the reference (count) number of the call. "dev" is the device type (3 is for dial-up, 6 is for PPPoE, 10 is for PPTP). "channel" or "ch" is the call channel ID. For example, "board 0 line 0 channel 0, call 3, C01 Outgoing Call dev=6 ch=0 "Means the router has dialed to the PPPoE server 3 times.
board %d line %d channel %d, call %d, %s C02 OutCall Connected %d %sThe PPPoE, PPTP or dial-up call is connected.
board %d line %d channel %d, call %d, %s C02 Call TerminatedThe PPPoE, PPTP or dial-up call was disconnected.

Table 90 PPP Logs

LOGMESSAGEDESCRIPTION
ppp:LCP StartingThe PPP connection's Link Control Protocol stage has started.
ppp:LCP OpeningThe PPP connection's Link Control Protocol stage is opening.
ppp:CHAP OpeningThe PPP connection's Challenge Handshake Authentication Protocol stage is opening.
ppp:IPCP StartingThe PPP connection's Internet Protocol Control Protocol stage is starting.
ppp:IPCP OpeningThe PPP connection's Internet Protocol Control Protocol stage is opening.
ppp:LCP ClosingThe PPP connection's Link Control Protocol stage is closing.
ppp:IPCP ClosingThe PPP connection's Internet Protocol Control Protocol stage is closing.

Table 91 UPnP Logs

LOGMESSAGEDESCRIPTION
UPnP pass through FirewallUPnP packets can pass through the firewall.

Table 92 Content Filtering Logs

LOGMESSAGEDESCRIPTION
%s: block keywordThe content of a requested web page matched a user defined keyword.
%sThe system forwarded web content.

For type and code details, see Table 96 on page 280.

Table 93 Attack Logs

LOGMESSAGEDESCRIPTION
attack [ TCP | UDP | IGMP | ESP | GRE | OSPF ]The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
attack ICMP (type:%d, code:%d)The firewall detected an ICMP attack.
land [ TCP | UDP | IGMP | ESP | GRE | OSPF ]The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land attack.
land ICMP (type:%d, code:%d)The firewall detected an ICMP land attack.
ip spoofing - WAN [ TCP | UDP | IGMP | ESP | GRE | OSPF ]The firewall detected an IP spoofing attack on the WAN port.
ip spoofing - WAN ICMP (type:%d, code:%d)The firewall detected an ICMP IP spoofing attack on the WAN port.
icmp echo : ICMP (type:%d, code:%d)The firewall detected an ICMP echo attack.
syn flood TCPThe firewall detected a TCP syn flood attack.
ports scan TCPThe firewall detected a TCP port scan attack.
teardrop TCPThe firewall detected a TCP teardrop attack.
teardrop UDPThe firewall detected an UDP teardrop attack.
teardrop ICMP (type:%d, code:%d)The firewall detected an ICMP teardrop attack.
illegal command TCPThe firewall detected a TCP illegal command attack.
NetBIOS TCPThe firewall detected a TCP NetBIOS attack.
ip spoofing - no routing entry [ TCP | UDP | IGMP | ESP | GRE | OSPF ]The firewall classified a packet with no source routing entry as an IP spoofing attack.
ip spoofing - no routing entry ICMP (type:%d, code:%d)The firewall classified an ICMP packet with no source routing entry as an IP spoofing attack.
vulnerability ICMP (type:%d, code:%d)The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d, code:%d)The firewall detected an ICMP traceroute attack.

Table 94 802.1X Logs

LOGMESSAGEDESCRIPTION
RADIUS accepts user.A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check RADIUS Server.A user was not authenticated by the RADIUS Server. Please check the RADIUS Server.
User logout because of session timeout expired.The router logged out a user whose session expired.
User logout because of user deassociation.The router logged out a user who ended the session.
User logout because of no authentication response from user.The router logged out a user from which there was no authentication response.
User logout because of idle timeout expired.The router logged out a user whose idle timeout period expired.
User logout because of user request.A user logged out.
No response from RADIUS.Pls check RADIUS Server.There is no response message from the RADIUS server, please check the RADIUS server.
Use RADIUS to authenticate user.The RADIUS server is operating as the authentication server.
No Server to authenticate user.There is no authentication server to authenticate a user.

Table 95 ACL Setting Notes

PACKET DIRECTIONDIRECTIONDESCRIPTION
(L to W)LAN to WANACL set for packets traveling from the LAN to the WAN.
(W to L)WAN to LANACL set for packets traveling from the WAN to the LAN.
(L to L/P-793H v2)LAN to LAN/P-793H v2ACL set for packets traveling from the LAN to the LAN or the P-793H v2.
(W to W/P-793H v2)WAN to WAN/P-793H v2ACL set for packets traveling from the WAN to the WAN or the P-793H v2.

Table 96 ICMP Notes

TYPECODEDESCRIPTION
0Echo Reply
0Echo reply message
3Destination Unreachable
0Net unreachable
1Host unreachable
2Protocol unreachable
3Port unreachable
4A packet that needed fragmentation was dropped because it was set to Don't Fragment (DF)
5Source route failed
4Source Quench
0A gateway may discard internet datagrams if it does not have the buffer space needed to queue the datagrams for output to the next network on the route to the destination network.
5Redirect
0Redirect datagrams for the Network
1Redirect datagrams for the Host
2Redirect datagrams for the Type of Service and Network
3Redirect datagrams for the Type of Service and Host
8Echo
0Echo message
11Time Exceeded
0Time to live exceeded in transit
1Fragment reassembly time exceeded
12Parameter Problem
0Pointer indicates the error
13Timestamp
0Timestamp request message
14Timestamp Reply
0Timestamp reply message
15Information Request
0Information request message
16Information Reply
0Information reply message

Table 97 Syslog Logs

LOGMESSAGEDESCRIPTION
<Facility*8 + Severity>Mon dd hr:mm:ss hostname src="<srcIP:srcPort>" dst="<dstIP:dstPort>" msg="<msg>" note="<note>" devID="<mac address last three numbers>" cat="<category""This message is sent by the system ("RAS" displays as the system name if you haven't configured one) when the router generates a syslog. The facility is defined in the web MAIN MENU->LOGS->Log Settings page. The severity is the log's syslog class. The definition of messages and notes are defined in the various log charts throughout this appendix. The "devID" is the last three characters of the MAC address of the router's LAN port. The "cat" is the same as the category in the router's logs.

The following table shows RFC-2408 ISAKMP payload types that the log displays. Please refer to RFC 2408 for detailed information on each type.

Table 98 RFC-2408 ISAKMP Payload Types

LOG DISPLAYPAYLOAD TYPE
SASecurity Association
PROPProposal
TRANSTransform
KEKey Exchange
IDIdentification
CERCertificate
CER_REQCertificate Request
HASHHash
SIGSignature
NONCENonce
NOTFYNotification
DELDelete
VIDVendor ID

21.1 Overview

This chapter explains how to upload new firmware, manage configuration files and restart your P-793H v2.

Use the instructions in this chapter to change the device's configuration file or upgrade its firmware. After you configure your device, you can backup the configuration file to a computer. That way if you later misconfigure the device, you can upload the backed up configuration file to return to your previous settings. You can alternately upload the factory default configuration file if you want to return the device to the original default settings. The firmware determines the device's available features and functionality. You can download new firmware releases from your nearest ZyXEL FTP site (or www.zyxel.com) to use to upgrade your device's performance.

Only use firmware for your device's specific model. Refer to the label on the bottom of your P-793H v2.

21.1.1 What You Can Do in the Tool Screens

  • Use the Firmware Upgrade screen (Section 21.2 on page 291) to upload firmware to your device.
  • Use the Configuration screen (Section 21.3 on page 293) to backup and restore device configurations. You can also reset your device settings back to the factory default.
  • Use the Restart screen (Section 21.4 on page 295) to restart your ZyXEL device.

21.1.2 What You Need To Know About Tools

Filename Conventions

The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password, DHCP Setup, TCP/IP Setup, etc. It arrives from ZyXEL with a "rom" filename extension. Once you have customized the P-793H v2's settings, they can be saved back to your computer under a filename of your choosing.

ZyNOS (ZyXEL Network Operating System sometimes referred to as the "ras" file) is the system firmware and has a "bin" filename extension. Find this firmware at www.zyxel.com.With many FTP and TFTP clients, the filenames are similar to those seen next.

ftp> put firmware.bin ras

This is a sample FTP session showing the transfer of the computer file "firmware.bin" to the P-793H v2.

ftp> get rom-0 config.cfg

This is a sample FTP session saving the current configuration to the computer file "config.cfg".

If your (T)FTP client does not allow you to have a destination filename different than the source, you will need to rename them as the P-793H v2 only recognizes "rom-0" and "ras". Be sure you keep unaltered copies of both files for later use.

The following table is a summary. Please note that the internal filename refers to the filename on the P-793H v2 and the external filename refers to the filename not on the P-793H v2, that is, on your computer, local network or FTP site and so the name (but not the extension) may vary. After uploading new firmware, see the Status screen to confirm that you have uploaded the correct firmware version.

Table 99 Filename Conventions

FILE TYPEINTERNAL NAMEEXTERNAL NAMEDESCRIPTIO N
Configuration FileRom-0This is the configuration filename on the P-793H v2. Uploading the rom-0 file replaces the entire ROM file system, including your P-793H v2 configurations, system-related data (including the default password), the error log and the trace log.*.rom
FirmwareRasThis is the generic name for the ZyNOS firmware on the P-793H v2.*.bin

FTP Restrictions

FTP will not work when:

1 The firewall is active (turn the firewall off or create a firewall rule to allow access from the WAN).
2 You have disabled the FTP service in the Remote Management screen.
3 The IP you entered in the Secured Client IP field does not match the client IP. If it does not match, the device will disallow the FTP session.

21.1.3 Before You Begin

  • Ensure you have either created a firewall rule to allow access from the WAN or turned the firewall off, otherwise the FTP will not function.
  • Make sure the FTP service has not been disabled in the Remote Management screen.

21.1.4 Tool Examples

Using FTP or TFTP to Restore Configuration

This example shows you how to restore a previously saved configuration. Note that this function erases the current configuration before restoring a previous backup configuration; please do not attempt to restore unless you have a backup configuration file stored on disk.

FTP is the preferred method for restoring your current computer configuration to your device since FTP is faster. Please note that you must wait for the system to automatically restart after the file transfer is complete.

Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE your device. When the Restore Configuration process is complete, the device automatically restarts.

Restore Using FTP Session Example

Figure 121 Restore Using FTP Session Example

ftp> put config.rom rom-0  
200 Port command okay  
150 Opening data connection for STOR rom-0  
226 File received OK  
221 Goodbye for writing flash  
ftp: 16384 bytes sent in 0.06Seconds 273.07Kbytes/sec.  
ftp>quit 

Refer to Section 21.1.2 on page 284 to read about configurations that disallow FTP and FTP over WAN.

FTP and TFTP Firmware and Configuration File Uploads

These examples show you how to upload firmware and configuration files.

Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE your device.

FTP is the preferred method for uploading the firmware and configuration. To use this feature, your computer must have an FTP client. The following sections give examples of how to upload the firmware and the configuration files.

FTP File Upload Command from the DOS Prompt Example

1 Launch the FTP client on your computer.
2 Enter "open", followed by a space and the IP address of your device.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is "1234").
5 Enter "bin" to set transfer mode to binary.
6 Use "put" to transfer files from the computer to the device, for example, "put firmware.bin ras" transfers the firmware on your computer (firmware.bin) to the device and renames it "ras". Similarly, "put config.rom rom-0" transfers the configuration file on your computer (config.rom) to the device and renames it "rom-0". Likewise "get rom-0 config.rom" transfers the configuration file on the device to your computer and renames it "config.rom." See earlier in this chapter for more information on filename conventions.
7 Enter "quit" to exit the ftp prompt.

FTP Session Example of Firmware File Upload

Figure 122 FTP Session Example of Firmware File Upload

331 Enter PASS command  
Password:  
230 Logged in  
ftp> bin  
200 Type I OK  
ftp> put firmware.bin ras  
200 Port command okay  
150 Opening data connection for STOR ras  
226 File received OK  
ftp: 1103936 bytes sent in 1.10Seconds 297.89Kbytes/sec.  
ftp> quit 

More commands (found in GUI-based FTP clients) are listed in this chapter.

Refer to Section 21.1.2 on page 284 to read about configurations that disallow TFTP and FTP over WAN.

TFTP File Upload

The device also supports the uploading of firmware files using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended.

To use TFTP, your computer must have both telnet and TFTP clients. To transfer the firmware and the configuration file, follow the procedure shown next.

1 Use telnet from your computer to connect to the device and log in. Because TFTP does not have any security checks, the device records the IP address of the telnet client and accepts TFTP requests only from this address.
2 Enter the command "sys stdio 0" to disable the management idle timeout, so the TFTP transfer will not be interrupted. Enter "command sys stdio 5" to restore the five-minute management idle timeout (default) when the file transfer is complete.
3 Launch the TFTP client on your computer and connect to the device. Set the transfer mode to binary before starting data transfer.
4 Use the TFTP client (see the example below) to transfer files between the device and the computer. The file name for the firmware is "ras".

Note that the telnet connection must be active and the device in CI mode before and during the TFTP transfer. For details on TFTP commands (see following example), please consult the documentation of your TFTP client program. For

UNIX, use "get" to transfer from the device to the computer, "put" the other way around, and "binary" to set binary transfer mode.

TFTP Upload Command Example

The following is an example TFTP command:

tftp [-i] host put firmware.bin ras

Where "i" specifies binary image transfer mode (use this mode when transferring binary files), "host" is the device's IP address, "put" transfers the file source on the computer (firmware.bin - name of the firmware on the computer) to the file destination on the remote host (ras - name of the firmware on the device).

Commands that you may see in GUI-based TFTP clients are listed earlier in this chapter.

Using the FTP Commands to Back Up Configuration

1 Launch the FTP client on your computer.
2 Enter "open", followed by a space and the IP address of your P-793H v2.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is "1234").
5 Enter "bin" to set transfer mode to binary.
6 Use "get" to transfer files from the P-793H v2 to the computer, for example, "get rom-0 config.rom" transfers the configuration file on the P-793H v2 to your computer and renames it "config.rom". See earlier in this chapter for more information on filename conventions.
7 Enter "quit" to exit the ftp prompt.

FTP Command Configuration Backup Example

This figure gives an example of using FTP commands from the DOS command prompt to save your device's configuration onto your computer.

Figure 123 FTP Session Example

331 Enter PASS command  
Password:  
230 Logged in  
ftp> bin  
200 Type I OK  
ftp> get rom-0 zyxel.rom  
200 Port command okay  
150 Opening data connection for STOR ras  
226 File received OK  
ftp: 16384 bytes sent in 1.10Seconds 297.89Kbytes/sec.  
ftp> quit 

Configuration Backup Using GUI-based FTP Clients

The following table describes some of the commands that you may see in GUI-based FTP clients.

Table 100 General Commands for GUI-based FTP Clients

COMMANDDESCRIPTION
Host AddressEnter the address of the host server.
Login TypeAnonymous.This is when a user I.D. and password is automatically supplied to the server for anonymous access. Anonymous logins will work only if your ISP or service administrator has enabled this option.Normal.The server requires a unique User ID and Password to login.
Transfer TypeTransfer files in either ASCII (plain text format) or in binary mode.
Initial Remote DirectorySpecify the default remote directory (path).
Initial Local DirectorySpecify the default local directory (path).

Backup Configuration Using TFTP

The P-793H v2 supports the up/downloading of the firmware and the configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended.

To use TFTP, your computer must have both telnet and TFTP clients. To backup the configuration file, follow the procedure shown next.

1 Use telnet from your computer to connect to the P-793H v2 and log in. Because TFTP does not have any security checks, the P-793H v2 records the IP address of the telnet client and accepts TFTP requests only from this address.
2 Enter command "sys stdio 0" to disable the management idle timeout, so the TFTP transfer will not be interrupted. Enter command "sys stdio 5" to restore the five-minute management idle timeout (default) when the file transfer is complete.
3 Launch the TFTP client on your computer and connect to the P-793H v2. Set the transfer mode to binary before starting data transfer.
4 Use the TFTP client (see the example below) to transfer files between the P-793H v2 and the computer. The file name for the configuration file is "rom-0" (rom-zero, not capital o).

Note that the telnet connection must be active before and during the TFTP transfer. For details on TFTP commands (see following example), please consult the documentation of your TFTP client program. For UNIX, use "get" to transfer from the P-793H v2 to the computer and "binary" to set binary transfer mode.

TFTP Command Configuration Backup Example

The following is an example TFTP command:

ftftp [-i] host get rom-0 config.rom

where "i" specifies binary image transfer mode (use this mode when transferring binary files), "host" is the P-793H v2 IP address, "get" transfers the file source on the P-793H v2 (rom-0, name of the configuration file on the P-793H v2) to the file destination on the computer and renames it config.rom.

Configuration Backup Using GUI-based TFTP Clients

The following table describes some of the fields that you may see in GUI-based TFTP clients.

Table 101 General Commands for GUI-based TFTP Clients

COMMANDDESCRIPTION
HostEnter the IP address of the P-793H v2. 192.168.1.1 is the P-793H v2's default IP address when shipped.
Send/ FetchUse “Send” to upload the file to the P-793H v2 and “Fetch” to back up the file on your computer.
Local FileEnter the path and name of the firmware file (*.bin extension) or configuration file (*.rom extension) on your computer.
Remote FileThis is the filename on the P-793H v2. The filename for the firmware is “ras” and for the configuration file, is “rom-0”.
BinaryTransfer the file in binary mode.
AbortStop transfer of the file.

Refer to Section 21.1.2 on page 284 to read about configurations that disallow FTP and FTP over WAN.

21.2 The Firmware Screen

Click Maintenance > Tools to open the Firmware screen. Follow the instructions in this screen to upload firmware to your P-793H v2. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. See Section 21.1.4 on page 285 for upgrading firmware using FTP/TFTP commands.

Do NOT turn off the P-793H v2 while firmware upload is in progress!

ZYXEL ARMOR Z1 NWD6605 - Do NOT turn off the P-793H v2 while firmware upload is in progress! - 1
Figure 124 Maintenance > Tools > Firmware

The following table describes the labels in this screen.

Table 102 Maintenance > Tools > Firmware

LABELDESCRIPTION
Current Firmware VersionThis is the present Firmware version and the date created.
File PathType in the location of the file you want to upload in this field or click Browse … to find it.
Browse...Click this to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them.
UploadClick this to begin the upload process. This process may take up to two minutes.

After you see the Firmware Upload in Progress screen, wait two minutes before logging into the P-793H v2 again.

ZYXEL ARMOR Z1 NWD6605 - Do NOT turn off the P-793H v2 while firmware upload is in progress! - 2
Figure 125 Firmware Upload In Progress

The P-793H v2 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.

ZYXEL ARMOR Z1 NWD6605 - Do NOT turn off the P-793H v2 while firmware upload is in progress! - 3
Figure 126 Network Temporarily Disconnected

After two minutes, log in again and check your new firmware version in the Status screen.

If the upload was not successful, the following screen will appear. Click Return to go back to the Firmware screen.

ZYXEL ARMOR Z1 NWD6605 - Do NOT turn off the P-793H v2 while firmware upload is in progress! - 4
Figure 127 Error Message

21.3 The Configuration Screen

See Section 21.1.4 on page 285 for transferring configuration files using FTP/TFTP commands.

Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears in this screen, as shown next.

ZYXEL ARMOR Z1 NWD6605 - The Configuration Screen - 1
Figure 128 Maintenance > Tools > Configuration

Backup Configuration

Backup Configuration allows you to back up (save) the P-793H v2's current configuration to a file on your computer. Once your P-793H v2 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.

Click Backup to save the P-793H v2's current configuration to your computer.

Restore Configuration

Restore Configuration allows you to upload a new or previously saved configuration file from your computer to your P-793H v2.

Table 103 Restore Configuration

LABELDESCRIPTION
File PathType in the location of the file you want to upload in this field or click Browse ... to find it.
Browse...Click this to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them.
UploadClick this to begin the upload process.

Do not turn off the P-793H v2 while configuration file upload is in progress.

After you see a "restore configuration successful" screen, you must then wait one minute before logging into the P-793H v2 again.

ZYXEL ARMOR Z1 NWD6605 - Do not turn off the P-793H v2 while configuration file upload is in progress. - 1
Figure 129 Configuration Upload Successful

The P-793H v2 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.

ZYXEL ARMOR Z1 NWD6605 - Do not turn off the P-793H v2 while configuration file upload is in progress. - 2
Figure 130 Network Temporarily Disconnected

If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default device IP address (192.168.1.1). See Appendix C on page 429 for details on how to set up your computer's IP address.

If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen.

ZYXEL ARMOR Z1 NWD6605 - Do not turn off the P-793H v2 while configuration file upload is in progress. - 3
Figure 131 Configuration Upload Error

Reset to Factory Defaults

Click the Reset button to clear all user-entered configuration information and return the P-793H v2 to its factory defaults. The following warning screen appears.

ZYXEL ARMOR Z1 NWD6605 - Reset to Factory Defaults - 1
Figure 132 Reset Warning Message
Figure 133 Reset In Process Message

ZYXEL ARMOR Z1 NWD6605 - Reset to Factory Defaults - 2

You can also press the RESET button on the rear panel to reset the factory defaults of your P-793H v2. Refer to Section 1.5 on page 41 for more information on the RESET button.

21.4 The Restart Screen

System restart allows you to reboot the P-793H v2 remotely without turning the power off. You may need to do this if the P-793H v2 hangs, for example.

Click Maintenance > Tools > Restart. Click Restart to have the P-793H v2 reboot. This does not affect the P-793H v2's configuration.

ZYXEL ARMOR Z1 NWD6605 - The Restart Screen - 1
Figure 134 Maintenance > Tools > Restart

22.1 Overview

These read-only screens display information to help you identify problems with the P-793H v2.

22.1.1 What You Can Do in the Diagnostic Screens

  • Use the General screen (Section 22.2 on page 297) to ping an IP address.
  • Use the DSL Line screen (Section 22.3 on page 298) to view the DSL line statistics and reset the ADSL line.

22.2 The General Diagnostic Screen

Use this screen to ping an IP address. Click Maintenance > Diagnostic to open the screen shown next.

ZYXEL ARMOR Z1 NWD6605 - The General Diagnostic Screen - 1
Figure 135 Maintenance > Diagnostic > General

The following table describes the fields in this screen.

Table 104 Maintenance > Diagnostic > General

LABELDESCRIPTION
TCP/IP AddressType the IP address of a computer that you want to ping in order to test a connection.
PingClick this to ping the IP address that you entered.

22.3 The DSL Line Diagnostic Screen

Use this screen to view the DSL line statistics and reset the ADSL line. Click Maintenance > Diagnostic > DSL Line to open the screen shown next.

ZYXEL ARMOR Z1 NWD6605 - The DSL Line Diagnostic Screen - 1
Figure 136 Maintenance > Diagnostic > DSL Line

The following table describes the fields in this screen.

Table 105 Maintenance > Diagnostic > DSL Line

LABELDESCRIPTION
ATM StatusClick this to view your DSL connection's Asynchronous Transfer Mode (ATM) statistics. ATM is a networking technology that provides high-speed data transfer. ATM uses fixed-size packets of information called cells. With ATM, a high QoS (Quality of Service) can be guaranteed.The (Segmentation and Reassembly) SAR driver translates packets into ATM cells. It also receives ATM cells and reassembles them into packets.These counters are set back to zero whenever the device starts up.inPkts is the number of good ATM cells that have been received.inDiscards is the number of received ATM cells that were rejected.outPkts is the number of ATM cells that have been sent.outDiscards is the number of ATM cells sent that were rejected.inF4Pkts is the number of ATM Operations, Administration, and Management (OAM) F4 cells that have been received. See ITU recommendation I.610 for more on OAM for ATM.outF4Pkts is the number of ATM OAM F4 cells that have been sent.inF5Pkts is the number of ATM OAM F5 cells that have been received.outF5Pkts is the number of ATM OAM F5 cells that have been sent.openChan is the number of times that the P-793H v2 has opened a logical DSL channel.closeChan is the number of times that the P-793H v2 has closed a logical DSL channel.txRate is the number of bytes transmitted per second.rxRate is the number of bytes received per second.
ATM Loopback TestClick this to start the ATM loopback test. Make sure you have configured at least one PVC with proper VPIs/VCIs before you begin this test. The P-793H v2 sends an OAM F5 packet to the DSLAM/ATM switch and then returns it (loops it back) to the P-793H v2. The ATM loopback test is useful for troubleshooting problems with the DSLAM and ATM network.
DSL Line StatusClick this to view statistics about the DSL connections. noise margin downstream is the signal to noise ratio for the downstream part of the connection (coming into the P-793H v2 from the ISP). It is measured in decibels. The higher the number the more signal and less noise there is. output power upstream is the amount of power (in decibels) that the P-793H v2 is using to transmit to the ISP. attenuation downstream is the reduction in amplitude (in decibels) of the DSL signal coming into the P-793H v2 from the ISP. Discrete Multi-Tone (DMT) modulation divides up a line's bandwidth into sub-carriers (sub-channels) of 4.3125 KHz each called tones. The rest of the display is the line's bit allocation. This is displayed as the number (in hexadecimal format) of bits transmitted for each tone. This can be used to determine the quality of the connection, whether a given sub-carrier loop has sufficient margins to support certain ADSL transmission rates, and possibly to determine whether particular specific types of interference or line attenuation exist. Refer to the ITU-T G.992.1 recommendation for more information on DMT. The better (or shorter) the line, the higher the number of bits transmitted for a DMT tone. The maximum number of bits that can be transmitted per DMT tone is 15. There will be some tones without any bits as there has to be space between the upstream and downstream channels.
Reset ADSL LineClick this to reinitialize the ADSL line. The large text box above then displays the progress and results of this operation, for example: "Start to reset ADSL Loading ADSL modem F/W... Reset ADSL Line Successfully!"
Capture All LogsClick this to display information and statistics about your P-793H v2's ATM statistics, DSL connection statistics, DHCP settings, firmware version, WAN and gateway IP address, VPI/VCI and LAN IP address.

Introducing the SMT

The System Management Terminal (SMT) provides a text-based, menu-driven console to manage the P-793H v2. This chapter describes how to access the SMT and then provides an overview of its menus.

23.1 Accessing the SMT

Use Telnet to access the SMT. Follow these steps.

1 In Windows, click Start > Run.
2 Type "telnet w.x.y.z", and click OK.

w.x.y.z is the IP address of the P-793H v2; the default address is 192.168.1.1.

The P-793H v2 prompts you for the password.

Figure 137 Login Screen

Password : xxxx

3 Enter the password. The default password is 1234. As you type the password, the screen displays an asterisk ** for each character you type.
4 After you enter the password, the SMT main menu appears, as shown next.

Note: Use menu 23.1 to change the password.

Figure 138 SMT Main Menu
ZYXEL ARMOR Z1 NWD6605 - Figure 137 Login Screen - 1
Note: There is an inactivity timeout, and the default value is ten minutes. If there is no activity for longer than this, your P-793H v2 will automatically log you out. You will then have to telnet into the P-793H v2 again. You can use the web configurator or the CI commands (menu 24.8) to change the inactivity timeout period.

23.2 SMT Menu Items

The following table provides an overview of each menu item.

Table 106 Main Menu Summary

MENUFUNCTION
1 General SetupUse this menu to set up device mode, dynamic DNS and administrative information.
2 WAN SetupUse this menu to configure the DSL connection, and traffic redirect interface.
3 LAN SetupUse this to apply LAN filters, configure LAN DHCP and TCP/IP settings, and to allow or block layer-2 traffic between each pair of ports.
4 Internet Access SetupUse this menu to configure your Internet connection.

Table 106 Main Menu Summary

MENUFUNCTION
11 Remote Node SetupUse this menu to configure detailed remote node settings (for example, your ISP is a remote node) as well as apply filters.
12 Static Routing SetupUse this menu to configure IP and bridge (MAC) static routes.
15 NAT SetupUse this menu to configure Network Address Translation (NAT) on the P-793H v2.
21 Filter and Firewall SetupUse this menu to configure filters and to activate or deactivate the firewall.
22 SNMP ConfigurationUse this menu to configure SNMP.
23 System PasswordUse this menu to change your password.
24 System MaintenanceUse this menu for comprehensive system maintenance, from looking at the system status to uploading firmware. You can also access the Command Interface (CI).
26 Schedule SetupUse this menu to configure schedule sets.
99 ExitUse this menu to exit the SMT.

The following table gives you an overview of the various SMT menus.

Table 107 SMT Menus Overview

MENUSSUB MENUS
1 General Setup1.1 Configure Dynamic DNS
2 WAN Setup2.1 Traffic Redirect Setup
3 LAN Setup3.1 LAN Port Filter Setup
3.2 TCP/IP and DHCP Setup3.2.1 IP Alias Setup
4 Internet Access Setup
11 Remote Node Setup11.1 Remote Node Profile11.1.3 Remote Node Network Layer Options
11.1.5 Remote Node Filter
11.1.6 Remote Node ATM Layer Options
12 Static Route Setup12.1 IP Static Route Setup12.1.1 Edit IP Static Route
12.3 Bridge Static Route Setup12.3.1 Edit Bridge Static Route
15 NAT Setup15.1 Address Mapping Sets15.1.x Address Mapping Rules15.1.x.x Address Mapping Rule
15.2 NAT Server Sets15.2.x NAT Server Setup
21 Filter and Firewall Setup21.1 Filter Set Configuration21.1.x Filter Rules Summary21.1.x.x Generic Filter Rule
21.1.x.x TCP/IP Filter Rule
21.2 Firewall Setup
22 SNMP Configuration
23 System Password
24 System Maintenance24.1 System Maintenance - Status
24.2 System Information and Console Port Speed24.2.1 System Maintenance - Information
24.2.2 System Maintenance - Change Console Port Speed
24.3 System Maintenance - Log and Trace24.3.1 View Error Log
24.3.2 System Maintenance - UNIX Syslog
24.4 System Maintenance - Diagnostic
24.5 Backup Configuration
24.6 Restore Configuration
24.7 System Maintenance - Upload Firmware24.7.1 System Maintenance - Upload System Firmware
24.7.2 System Maintenance - Upload System Configuration File
24.8 Command Interpreter Mode
24.9 System Maintenance - Call Control2324.9.1 Budget Management
24.10 System Maintenance - Time and Date Setting
24.11 Remote Management Control
26 Schedule Setup26.1 Schedule Set Setup

23.3 Navigating the SMT Interface

You should be familiar with the following operations before you try to use the SMT to modify the configuration.

Table 108 Main Menu Commands

OPERATIONKEYSTROKEDESCRIPTION
Move down to another menu[ENTER]To move forward to a submenu, type in the number of the desired submenu and press [ENTER].
Move up to a previous menu[ESC]Press [ESC] to move back to the previous menu.
Move to a "hidden" menuPress [SPACE BAR] to change No to Yes then press [ENTER].Fields beginning with "Edit" lead to hidden menus and have a default setting of No. Press [SPACE BAR] once to change No to Yes, then press [ENTER] to go to the "hidden" menu.
Move the cursor[ENTER] or [UP]/[DOWN] arrow keys.Within a menu, press [ENTER] to move to the next field. You can also use the [UP]/[DOWN] arrow keys to move to the previous and the next field, respectively.
Entering informationType in or press [SPACE BAR], then press [ENTER].You need to fill in two types of fields. The first requires you to type in the appropriate information. The second allows you to cycle through the available choices by pressing [SPACE BAR].
Required fields<?> or ChangeMeAll fields with the symbol <?> must be filled in order to be able to save the new configuration. All fields with ChangeMe must not be left blank in order to be able to save the new configuration.
N/A fields<N/A>Some of the fields in the SMT will show a <N/A>. This symbol refers to an option that is Not Applicable.
Save your configuration[ENTER]Save your configuration by pressing [ENTER] at the message "Press ENTER to confirm or ESC to cancel". Saving the data on the screen will take you, in most cases to the previous menu.
Exit the SMTType 99, then press [ENTER].Type 99 at the main menu prompt and press [ENTER] to exit the SMT interface.

Use this menu to set up device mode, dynamic DNS and administrative information.

24.1 Configuring General Setup

1 Enter 1 in the main menu to open Menu 1 - General Setup.
2 The Menu 1 - General Setup screen appears, as shown next. Fill in the required fields.

Figure 139 Menu 1: General Setup

Menu 1 - General Setup System Name= P-793H v2 Location= Contact Person's Name= Domain Name= First DNS Server= 0.0.0.0 Secondary DNS Server= 0.0.0.0 Third DNS Server= 0.0.0.0 Edit Dynamic DNS= No Route IP= Yes Bridge= No 

The following table describes the fields in this menu.

Table 109 Menu 1: General Setup

FIELDDESCRIPTION
System NameChoose a descriptive name for identification purposes. It is recommended you enter your computer's "Computer name" in this field. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes "-" and underscores "-" are accepted.
LocationEnter a descriptive name for the place where the P-793H v2 is located. You can enter up to 31 characters, or you can leave this field blank.
Contact Person's NameEnter the name of the person to contact for questions about the P-793H v2. You can enter up to 30 characters, or you can leave this field blank.
Domain NameEnter the domain name (if you know it) here. If you leave this field blank, the ISP may assign a domain name via DHCP. You can go to menu 24.8 and type "sys domain name" to see the current domain name used by your router.The domain name entered by you is given priority over the ISP assigned domain name. If you want to clear this field just press [SPACE BAR] and then [ENTER].
Edit Dynamic DNSPress [SPACE BAR] and then [ENTER] to select Yes or No (default).Select Yes to configure Menu 1.1: Configure Dynamic DNS discussed next.
Route IPSelect Yes to enable IP-based routing in the P-793H v2. This is not effective for a specific remote node unless you enable IP-based routing in the remote node too. See Menu 11.1: Remote Node Profile (nodes 1-7) in Section 28.3 on page 326.You should enable Route IP, Bridge, or both in this screen. If you disable Route IP and Bridge, the device does not send traffic between the LAN ports and remote node.
Bridge345If Route IP is Yes, select Yes in this field to enable bridging in the P-793H v2 for protocols that are not supported by IP-based routing (for example, SNA).If Route IP is No, select Yes in this field to enable bridging in the P-793H v2 for all protocols.In either case, this setting is not effective for a specific remote node unless you enable bridging in the remote node too. See Menu 11.1: Remote Node Profile (nodes 1-7) in Section 28.3 on page 326.You should enable Route IP, Bridge, or both in this screen. If you disable Route IP and Bridge, the device does not send traffic between the LAN ports and remote node.
When you have completed this menu, press [ENTER] at the prompt "Press ENTER to Confirm..." to save your configuration, or press [ESC] at any time to cancel.

24.1.1 Configuring Dynamic DNS

To configure Dynamic DNS, set the P-793H v2 to router mode in menu 1 or in the MAINTENANCE Device Mode screen and go to Menu 1 - General Setup and

press [SPACE BAR] to select Yes in the Edit Dynamic DNS field. Press [ENTER] to display Menu 1.1 - Configure Dynamic DNS (shown next).

Figure 140 Menu 1.1: Configure Dynamic DNS
Menu 1.1 - Configure Dynamic DNS Service Provider= WWW.DynDNS.ORG Active= No DDNSType= DynamicDNS Host 1= Host 2= Host 3=Username= Password=* Enable Wildcard Option=No Enable Off Line Option = N/A IP Address Update Policy: DDNS Server Auto Detect IP Address = No Use Specified IP Address = No Use IP Address = N/A

Follow the instructions in the next table to configure Dynamic DNS parameters.

Table 110 Menu 1.1: Configure Dynamic DNS

FIELDDESCRIPTION
Service ProviderThis is the name of your Dynamic DNS service provider.
ActivePress [SPACE BAR] to select Yes and then press [ENTER] to make dynamic DNS active.
DDNSTypePress [SPACE BAR] and then [ENTER] to select DynamicDNS if you have the Dynamic DNS service. Select StaticDNS if you have the Static DNS service. Select CustomDNS if you have the Custom DNS service.
Host 1-3Enter up to three host names in these fields.
UsernameEnter your user name.
PasswordEnter the password assigned to you.
Enable Wildcard OptionYour P-793H v2 supports DYNDNS Wildcard. Press [SPACE BAR] and then [ENTER] to select Yes or No. This field is N/A when you choose DDNS client as your service provider.
Enable Off Line OptionThis field is only available when CustomDNS is selected in the DDNS Type field. Press [SPACE BAR] and then [ENTER] to select Yes. When Yes is selected, http://www.dyndns.org/ traffic is redirected to a URL that you have previously specified (see www.dyndns.org for details).

Table 110 Menu 1.1: Configure Dynamic DNS

FIELDDESCRIPTION
IP Address Update Policy:You can select Yes in either the DDNS Server Auto Detect IP Address field (recommended) or the Use Specified IP Address field, but not both.With the DDNS Server Auto Detect IP Address and Use Specified IP Address fields both set to No, the DDNS server automatically updates the IP address of the host name(s) with the P-793H v2's WAN IP address.DDNS does not work with a private IP address. When both fields are set to No, the P-793H v2 must have a public WAN IP address in order for DDNS to work.
DDNS Server Auto Detect IP AddressOnly select this option when there are one or more NAT routers between the P-793H v2 and the DDNS server. Press [SPACE BAR] to select Yes and then press [ENTER] to have the DDNS server automatically detect and use the IP address of the NAT router that has a public IP address.Note: The DDNS server may not be able to detect the proper IP address if there is an HTTP proxy server between the P-793H v2 and the DDNS server.
Use Specified IP AddressPress [SPACE BAR] to select Yes and then press [ENTER] to update the IP address of the host name(s) to the IP address specified below.Only select Yes if the P-793H v2 uses or is behind a static public IP address.
Use IP AddressEnter the static public IP address if you select Yes in the Use Specified IP Address field.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm...” to save your configuration, or press [ESC] at any time to cancel.

Use this menu to configure the DSL connection, and traffic redirect interface.

25.1 WAN Setup

From the main menu, enter 2 to open menu 2.

Figure 141 Menu 2: WAN Setup

Menu 2 - WAN Setup
Service Mode= 2wire DSL Mode = ATM
Service Type= Server
Rate Adaption= Disable Rate Adaption= N/A
        Transfer Max Rate(Kbps) = 5696 Transfer Max Rate(Kbps) = N/A
        Transfer Min Rate(Kbps) = 192 Transfer Min Rate(Kbps) = N/A
        Standard Mode= ETSI(ANNEX_B) Standard Mode= N/A
Wan Backup Setup:
Check Mechanism = ICMP
Check WAN IP Address1 = 0.0.0.0
Check WAN IP Address2 = 0.0.0.0
Check WAN IP Address3 = 0.0.0.0
        KeepAlive Fail Tolerance = 31
        Recovery Interval(sec) = 3
        ICMP Timeout(sec) = 9677
        Traffic Redirect = No 

The following table describes the fields in this screen.

Table 111 Menu 2: WAN Setup

FIELDDESCRIPTION
Service ModePress [SPACE BAR] to indicate whether the P-793H v2 should use 2-wire or 4-wire mode for the DSL connection. This is related to the phone line you use and affects the maximum speed of the connection. In 2-wire mode, the maximum data rate is up to 5.69 Mbps, while in 4-wire mode, the maximum data rate us up to 11.38 Mbps. See Section 25.1.1 on page 313 for information on 2wire-2line service mode.
DSL ModePress [SPACE BAR] to select the transfer mode you want to use.PTM (Packet Transfer Mode): The P-793H v2 uses the SHDSL technology for data transmission over the DSL port.ATM (Asynchronous Transfer Mode): The P-793H v2 uses the ADSL technology for data transmission over the DSL port.
Service TypePress [SPACE BAR] to indicate whether the P-793H v2 is the server or the client in the DSL connection. Select Server if this P-793H v2 is the server in a point-to-point application. (See Chapter 5 on page 67.) Otherwise, select Client.
Rate AdaptionThis field is configurable if Service Type is Server. Press [SPACE BAR] to let the P-793H v2 adjust the speed of its connection to that of the other device.
Transfer Max Rate(Kbps)This field is enabled if Service Type is Server. Press [SPACE BAR] to set the maximum rate at which the P-793H v2 sends and receives information. If you enable Rate Adaption, the P-793H v2 adjusts to the speed of the other device and may exceed this rate.
Transfer Min Rate(Kbps)This field is enabled if Service Type is Server. Press [SPACE BAR] to set the minimum rate at which the P-793H v2 sends and receives information. If you enable Rate Adaption, the P-793H v2 adjusts to the speed of the other device and may transfer information at less than this rate.
Standard ModeThis field is enabled if Service Type is Server. Press [SPACE BAR] to select the operational mode the P-793H v2 uses in the DSL connection.
Wan Backup Setup
Check MechanismSelect the method that the P-793H v2 uses to check the DSL connection. Select DSL Link to have the P-793H v2 check if the connection to the DSLAM is up. Select ICMP to have the P-793H v2 periodically ping the IP addresses configured in the Check WAN IP Address fields.
Check WAN IP Address1
Check WAN IP Address2
Check WAN IP Address3Configure this field to test your P-793H v2's WAN accessibility. Type the IP address of up to three reliable, nearby computers (for example, your ISP's DNS server address).Note: If you activate either traffic redirect or dial backup, you must configure at least one IP address here.When using a WAN backup connection, the P-793H v2 periodically pings the addresses configured here and uses the other WAN backup connection (if configured) if there is no response.
KeepAlive Fail ToleranceType the number of times (2 recommended) that your P-793H v2 may ping the IP addresses configured in the Check WAN IP Address field without getting a response before switching to a WAN backup connection (or a different WAN backup connection).
Recovery Interval(sec)When the P-793H v2 is using a lower priority connection (usually a WAN backup connection), it periodically checks to whether or not it can use a higher priority connection. Type the number of seconds (30 recommended) for the P-793H v2 to wait between checks. Allow more time if your destination IP address handles lots of traffic.
ICMP Timeout(sec)Type the number of seconds (3 recommended) for your P-793H v2 to wait for a ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request. The WAN connection is considered "down" after the P-793H v2 times out the number of times specified in the Fail Tolerance field. Use a higher value in this field if your network is busy or congested.
Traffic RedirectPress [SPACE BAR] to select Yes and then press [ENTER] to activate traffic redirect and to edit its settings.
When you have completed this menu, press [ENTER] at the prompt "Press ENTER to Confirm..." to save your configuration, or press [ESC] at any time to cancel.

25.1.1 2wire-2line Service Mode

From the main menu, enter 2 to open menu 2, then select 2wire-2line in the Service Mode field to see the screen as shown below.

Figure 142 Menu 2: 2wire-2line Service Mode
Menu 2 - WAN Setup Service Mode= 2wire-2line Service Type= N/A Rate Adaption= Disable Rate Adaption= Enable Transfier Max Rate(Kbps) = 4480 Transfer Max Rate(Kbps) = 5696 Transfier Min Rate(Kbps) = 4480 Transfer Min Rate(Kbps) = 3200 Standard Mode= ANSI(ANNEX_A) Standard Mode= ANSI(ANNEX_A) Wan Backup Setup: Check Mechanism = DSL Link Check WAN IP Address1 = 0.0.0.0 Check WAN IP Address2 = 0.0.0.0 Check WAN IP Address3 = 0.0.0.0 KeepAlive Fail Tolerance = 0 Recovery Interval(sec) = 0 ICMP Timeout(sec) = 0 Traffic Redirect = No

The following table describes the fields in this screen.

Table 112 Menu 2: 2wire-2line Service Mode

FIELDDESCRIPTION
Service ModePress [SPACE BAR] to select 2wire-2line service mode. This means you are establishing a point-to-2point connection. In 2wire-2line mode, the maximum data rate is up to 5.69 Mbps for each DSL connection.
Service TypeThe P-793H v2 automatically acts as a server in 2wire-2line mode.
Rate AdaptionThe field on the left refers to DSL 1 connection and the field on the right refers to DSL 2 connection. Press [SPACE BAR] to let the P-793H v2 adjust the speed of its connection to that of the other device.
Transfer Max Rate(Kbps)The field on the left refers to DSL 1 connection and the field on the right refers to DSL 2 connection. Press [SPACE BAR] to set the maximum rate at which the P-793H v2 sends and receives information. If you enable Rate Adaption, the P-793H v2 adjusts to the speed of the other device and may exceed this rate.
Transfer Min Rate(Kbps)The field on the left refers to DSL 1 connection and the field on the right refers to DSL 2 connection. Press [SPACE BAR] to set the minimum rate at which the P-793H v2 sends and receives information. If you enable Rate Adaption, the P-793H v2 adjusts to the speed of the other device and may transfer information at less than this rate.
Standard ModeThe field on the left refers to DSL 1 connection and the field on the right refers to DSL 2 connection. Press [SPACE BAR] to select the operational mode the P-793H v2 uses in the DSL connection.
Wan Backup Setup
Check MechanismSelect the method that the P-793H v2 uses to check the DSL connection. Select DSL Link to have the P-793H v2 check if the connection to the DSLAM is up. Select ICMP to have the P-793H v2 periodically ping the IP addresses configured in the Check WAN IP Address fields.
Check WAN IP Address1
Check WAN IP Address2
Check WAN IP Address3
KeepAlive Fail ToleranceType the number of times (2 recommended) that your P-793H v2 may ping the IP addresses configured in the Check WAN IP Address field without getting a response before switching to a WAN backup connection (or a different WAN backup connection).
Recovery Interval(sec)When the P-793H v2 is using a lower priority connection (usually a WAN backup connection), it periodically checks to whether or not it can use a higher priority connection. Type the number of seconds (30 recommended) for the P-793H v2 to wait between checks. Allow more time if your destination IP address handles lots of traffic.
ICMP Timeout(sec)Type the number of seconds (3 recommended) for your P-793H v2 to wait for a ping response from one of the IP addresses in the Check WAN IP Address field before timing out the request. The WAN connection is considered "down" after the P-793H v2 times out the number of times specified in the Fail Tolerance field. Use a higher value in this field if your network is busy or congested.
Traffic RedirectThis feature is disabled in 2wire-2line service mode.
When you have completed this menu, press [ENTER] at the prompt "Press ENTER to Confirm..." to save your configuration, or press [ESC] at any time to cancel.

25.2 Configuring Traffic Redirect

From the main menu, in menu 2, select Yes in Traffic Redirect, and then press [ENTER].

ZYXEL ARMOR Z1 NWD6605 - Configuring Traffic Redirect - 1
Figure 143 Menu 2.1: Traffic Redirect Setup

The following table describes the fields in this menu.

Table 113 Menu 2.1: Traffic Redirect Setup

FIELDDESCRIPTION
ActiveUse this field to turn the traffic redirect feature on (Yes) or off (No).
Configuration
Backup Gateway IP AddressType the IP address of your backup gateway in dotted decimal notation. The P-793H v2 automatically forwards traffic to this IP address if the P-793H v2's Internet connection terminates.
MetricThis field sets this route's priority among the routes the P-793H v2 uses. The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number greater than "15" means the link is down. The smaller the number, the lower the "cost".
When you have completed this menu, press [ENTER] at the prompt "Press ENTER to Confirm..." to save your configuration, or press [ESC] at any time to cancel.

Use this to apply LAN filters, configure LAN DHCP and TCP/IP settings, and to activate or deactivate VLAN on each LAN port.

26.1 Accessing the LAN Menus

From the main menu, enter 3 to open Menu 3 - LAN Setup.

Figure 144 Menu 3: LAN Setup

Menu 3 - LAN Setup  
1. LAN Port Filter Setup  
2. TCP/IP and DHCP Setup 

26.2 LAN Port Filter Setup

This menu allows you to specify the filter sets that you wish to apply to the LAN traffic. You seldom need to filter the LAN traffic, however, the filter sets may be useful to block certain packets, reduce traffic and prevent security breaches.

Figure 145 Menu 3.1: LAN Port Filter Setup

Menu 3.1 - LAN Port Filter Setup  
Input Filter Sets:  
    protocol filters=  
    device filters=  
Output Filter Sets:  
    protocol filters=  
    device filters= 

26.3 TCP/IP and DHCP Setup Menu

From the main menu, enter 3 to open Menu 3 - LAN Setup to configure TCP/IP (RFC 1155) and DHCP setup. From menu 3, select the submenu option TCP/IP and DHCP Setup and press [ENTER]. The screen now displays Menu 3.2 - TCP/IP and DHCP Ethernet Setup, as shown next. Not all fields are available on all models.

Figure 146 Menu 3.2: TCP/IP and DHCP Ethernet Setup

Menu 3.2 - TCP/IP and DHCP Setup  
DHCP= Server  
Client IP Pool Starting Address= 192.168.1.33  
Size of Client IP Pool= 32  
First DNS Server= 0.0.0.0  
Secondary DNS Server= 0.0.0.0  
Third DNS Server= 0.0.0.0  
DHCP Server Address= N/A  
TCP/IP Setup:  
IP Address= 192.168.1.1  
IP Subnet Mask= 255.255.255.0  
RIP Direction= Both  
Version= RIP-2B  
Multicast= IGMP-v2  
IP Policies=  
Edit IP Alias= No 

Follow the instructions in the next table to configure these fields.

Table 114 Menu 3.2: TCP/IP and DHCP Ethernet Setup

FIELDDESCRIPTION
DHCP Setup
DHCPThis field enables/disables the DHCP server. If set to Server, your P-793H v2 will act as a DHCP server. You should configure the rest of the fields in this section except for Remote DHCP Server. If set to Relay, the P-793H v2 acts as a surrogate DHCP server and relays requests and responses between the remote server and the clients. The Remote DHCP Server needs to be set. If set to None, the DHCP server will be disabled.
Client IP Pool Starting Address:This field specifies the first of the contiguous addresses in the IP address pool.
Size of Client IP PoolThis field specifies the size, or count of the IP address pool.
First DNS ServerThe P-793H v2 passes a DNS (Domain Name System) server IP address (in the order you specify here) to the DHCP clients.
Secondary DNS ServerSelect From ISP if your ISP dynamically assigns DNS server information (and the P-793H v2's WAN IP address). The IP Address field below displays the (read-only) DNS server IP address that the ISP assigns.
Third DNS ServerSelect User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the IP Address field below. If you chose User-Defined, but leave the IP address set to 0.0.0.0, User-Defined changes to None after you save your changes. If you set a second choice to User-Defined, and enter the same IP address, the second User-Defined changes to None after you save your changes.
Select DNS Relay to have the P-793H v2 act as a DNS proxy. The P-793H v2's LAN IP address displays in the IP Address field below (read-only). The P-793H v2 tells the DHCP clients on the LAN that the P-793H v2 itself is the DNS server. When a computer on the LAN sends a DNS query to the P-793H v2, the P-793H v2 forwards the query to the P-793H v2's system DNS server (configured in menu 1) and relays the response back to the computer. You can only select DNS Relay for one of the three servers; if you select DNS Relay for a second or third DNS server, that choice changes to None after you save your changes.
Select None if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a machine in order to access it.
DHCP Server AddressIf Relay is selected in the DHCP field above, then type the IP address of the actual remote DHCP server here.
TCP/IP Setup:
IP AddressEnter the LAN IP address of your P-793H v2 in dotted decimal notation
IP Subnet MaskYour P-793H v2 will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the P-793H v2.
RIP DirectionPress [SPACE BAR] and then [ENTER] to select the RIP direction. Options are: Both, In Only, Out Only or None.
VersionPress [SPACE BAR] and then [ENTER] to select the RIP version. Options are: RIP-1, RIP-2B or RIP-2M.
MulticastIGMP (Internet Group Multicast Protocol) is a session-layer protocol used to establish membership in a Multicast group. The P-793H v2 supports both IGMP version 1 (IGMP-v1) and version 2 (IGMP-v2). Press [SPACE BAR] and then [ENTER] to enable IP Multicasting or select None (default) to disable it.
Edit IP AliasThe P-793H v2 supports three logical LAN interfaces via its single physical Ethernet interface with the P-793H v2 itself as the gateway for each LAN network. Press [SPACE BAR] to select Yes and then press [ENTER] to display menu 3.2.1.
When you have completed this menu, press [ENTER] at the prompt [Press ENTER to Confirm...] to save your configuration, or press [ESC] at any time to cancel.

26.4 LAN IP Alias

Use menu 3.2 to configure the first network, and you use menu 3.2.1 to configure the other two networks. Move the cursor to the Edit IP Alias field, press [SPACE BAR] to choose Yes and press [ENTER] to configure the second and third network.

ZYXEL ARMOR Z1 NWD6605 - LAN IP Alias - 1
Figure 147 Menu 3.2.1: IP Alias Setup

Use the instructions in the following table to configure IP alias parameters.

Table 115 Menu 3.2.1: IP Alias Setup

FIELDDESCRIPTION
IP Alias 1, 2Choose Yes to configure the LAN network for the P-793H v2.
IP AddressEnter the IP address of your P-793H v2 in dotted decimal notation.
IP Subnet MaskYour P-793H v2 will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the P-793H v2.
RIP DirectionPress [SPACE BAR] and then [ENTER] to select the RIP direction. Options are Both, In Only, Out Only or None.
VersionPress [SPACE BAR] and then [ENTER] to select the RIP version. Options are RIP-1, RIP-2B or RIP-2M.
Incoming protocol filtersEnter the filter set(s) you wish to apply to the incoming traffic between this node and the P-793H v2.
Outgoing protocol filtersEnter the filter set(s) you wish to apply to the outgoing traffic between this node and the P-793H v2.
When you have completed this menu, press [ENTER] at the prompt [Press ENTER to Confirm...] to save your configuration, or press [ESC] at any time to cancel.

Internet Access Setup

Use this menu to configure your Internet connection. Use information from your ISP along with the instructions in this chapter to set up your P-793H v2 to access the Internet. Contact your ISP to determine what encapsulation type you should use.

27.1 Internet Access Setup

Enter 4 in the main menu.

Figure 148 Menu 4: Internet Access Setup

Menu 4 - Internet Access Setup  
ISP's Name= MyISP  
Encapsulation= ENET ENCAP  
Multiplexing= LLC-based  
VPI#=0  
VCI#=33  
ATM QoS Type= UBR  
Peak Cell Rate (PCR)=0  
Sustain Cell Rate (SCR)=0  
Maximum Burst Size (MBS)=0  
My Login=N/A  
My Password=N/A  
ENET ENCAP Gateway=0.0.0.0  
IP Address Assignment=Static  
IP Address=0.0.0.0  
Network Address Translation= SUA Only  
Address Mapping Set=N/A 

The following table describes the fields in this menu.

Table 116 Menu 4: Internet Access Setup

FIELDDESCRIPTION
ISP's NameEnter a descriptive name for your ISP for identification purposes.
EncapsulationPress [SPACE BAR] and then press [ENTER] to select the type of encapsulation your ISP uses.
MultiplexingPress [SPACE BAR] to select the method of multiplexing used by your ISP. Choices are VC-based or LLC-based.
VPIVPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual circuit. The valid range for the VPI is 0 to 255. Enter the VPI assigned to you.
VCIThe valid range for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Enter the VCI assigned to you.
ATM QoS TypeSelect CBR (Constant Bit Rate) to specify fixed (always-on) bandwidth for voice or data traffic. Select UBR (Unspecified Bit Rate) for applications that are non-time sensitive, such as e-mail. Select VBR (Variable Bit Rate) for bursty traffic and bandwidth sharing with other applications.
Peak Cell Rate (PCR)Divide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell Rate (PCR). This is the maximum rate at which the sender can send cells. Type the PCR here.
Sustain Cell Rate (SCR)The Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be transmitted. Type the SCR, which must be less than the PCR. Note that system default is 0 cells/sec.
Maximum Burst Size (MBS)Maximum Burst Size (MBS) refers to the maximum number of cells that can be sent at the peak rate. Type the MBS, which is less than 65535.
My Login(PPPoE and PPPoA only) Enter the login name given to you by your ISP.
My Password(PPPoE and PPPoA only) Type your password again for confirmation.
ENET ENCAP Gateway(ENET ENCAP only) Enter the gateway IP address provided by your ISP.
Idle Timeout (sec)(PPPoE and PPPoA only) Specify an idle time-out. The default setting is 0, which means the Internet session will not timeout.
IP Address AssignmentIf your ISP did not assign you a fixed IP address, press [SPACE BAR] and then [ENTER] to select Dynamic, otherwise select Static and enter the IP address and subnet mask in the following fields.
IP AddressThis field is enabled if the IP Address Assignment is Static. Enter the (fixed) IP address assigned to you by your ISP (static IP address assignment is selected in the previous field).
Network Address TranslationNetwork Address Translation (NAT) allows the translation of an Internet protocol address used within one network (for example a private IP address used in a local network) to a different IP address known within another network (for example a public IP address used on the Internet). Choose None to disable NAT. Choose SUA Only if you have a single public IP address. SUA (Single User Account) is a subset of NAT that supports two types of mapping: Many-to-One and Server. Choose Full Feature if you have multiple public IP addresses. Full Feature mapping types include: One-to-One, Many-to-One (SUA/PAT), Many-to-Many Overload, Many- One-to-One and Server. When you select Full Feature you must configure at least one address mapping set. Please see Chapter 8 on page 117 for a more detailed discussion on the Network Address Translation feature.
Address Mapping SetThis field is enabled if the Network Address Translation is Full Feature. Enter the number of the address mapping set you want to use for your Internet connection.
When you have completed this menu, press [ENTER] at the prompt "Press ENTER to Confirm..." to save your configuration, or press [ESC] at any time to cancel.

Remote Node Setup

Use this menu to configure detailed remote node settings (for example, your ISP is a remote node) as well as apply filters.

28.1 Introduction to Remote Node Setup

A remote node is required for placing calls to a remote gateway. A remote node represents both the remote gateway and the network behind it across a WAN connection. Note that when you use menu 4 to set up Internet access, you are actually configuring a remote node.

28.2 Remote Node Setup

From the main menu, select menu option 11 to open Menu 11 - Remote Node Setup (shown below).

Figure 149 Menu 11: Remote Node Setup

Menu 11 - Remote Node Setup  
1. MyISP (ISP, SUA)  
2. ____________  
3. ____________  
4. ____________  
5. ____________  
6. ____________  
7. ____________  
8. ChangeMe (BACKUP_ISP, SUA)  
Enter Node # to Edit: 

Type the node number you want to configure and press [ENTER].

28.3 Remote Node Profile

The following explains how to configure remote nodes 1-7.

ZYXEL ARMOR Z1 NWD6605 - Remote Node Profile - 1
Figure 150 Menu 11.1: Remote Node Profile (nodes 1-7)

The following table describes the labels in this menu.

Table 117 Menu 11.1: Remote Node Profile (nodes 1-7)

FIELDDESCRIPTION
Rem Node NameEnter the name of the ISP.
ActiveSelect whether or not you want to use this Internet connection.
EncapsulationSelect the type of encapsulation your ISP uses.
MultiplexingSelect the method of multiplexing used by your ISP from the drop-down list. Choices are VC or LLC.
Service Name(PPPoE only) Enter the service name provided by your ISP. Leave this field blank if your ISP did not provide one.
IncomingThis section is only enabled for PPPoA or PPPoE connections.
Rem LoginType the login name that this remote node will use to call your P-793H v2. The login name and the Rem Password will be used to authenticate this node.
Rem PasswordType the password used when this remote node calls your P-793H v2.
OutgoingThis section is only enabled for PPPoA or PPPoE connections.
My LoginEnter the user name provided by your ISP.
My PasswordEnter the password provided by your ISP.
Retype to ConfirmEnter the password again.
AuthenThis field appears if you select PPPoE in the Encapsulation field. Select what type of authentication your ISP uses. Select CHAP/PAP if you want the P-793H v2 to support both choices.
LineSelect the DSL connection you want the ZyXEL Device to use for outgoing traffic.
RoutePress [SPACE BAR] and then [ENTER] to select IP to enable IP-based routing to this remote node. This is not effective unless you enable IP-based routing in the P-793H v2 too. See Menu 1: General Setup in Section 24.1 on page 307.You should enable Route IP, Bridge, or both in this screen. If you disable Route IP and Bridge, the device does not send traffic between the LAN ports and remote node.
BridgeIf Route is IP, select Yes in this field to enable bridging to this remote node for protocols that are not supported by IP-based routing (for example, SNA).If Route is None, select Yes in this field to enable bridging to this remote node for all protocols.In either case, this setting is not effective unless you enable bridging in the P-793H v2 too. See Menu 1: General Setup in Section 24.1 on page 307.You should enable Route IP, Bridge, or both in this screen. If you disable Route IP and Bridge, the device does not send traffic between the LAN ports and remote node.
Edit IP/BridgeThis field is enabled if Route is IP. If you want to set up the WAN IP address and advanced features for the WAN port, press [SPACE BAR] to select Yes and press [ENTER]. Menu 11.3 appears.
Edit ATM OptionsThis field is enabled if Route is IP. Press [SPACE BAR] to select Yes and press [ENTER] to edit the virtual channel and ATM QoS settings. Menu 11.6 appears.
Edit Advance OptionsThis field is displayed if you are editing remote node 1, and it is only enabled for PPPoE connections. If you want to set up advanced features for the Internet connection, press [SPACE BAR] to select Yes and press [ENTER]. Menu 11.8 appears.
Telco OptionThis section is only enabled for PPPoA or PPPoE connections.
Allocated Budget(min)Enter the maximum amount of time (in minutes) each call can last.Enter 0 if there is no limit. With Period, you can set a limit on the total outgoing call time of the P-793H v2 within a certain period of time. When the total outgoing call time exceeds the limit, the current call will be dropped and any future outgoing calls will be blocked.
Period(hr)Enter how often (in hours) the Allocated Budget is reset. For example, if you can call for thirty minutes every hour, set the Allocated Budget to 30, and set this field to 1.
Schedule SetsEnter the schedule sets that apply to this connection.
Nailed-Up ConnectionSelect this if you want the P-793H v2 to automatically connect to your ISP when it is turned on and to remain connected all the time.This is not recommended if you pay for your Internet connected based on the amount of time you are connected.
Session Options
Edit Filter SetsIf you want to specify input and output filter sets for the WAN port, press [SPACE BAR] to select Yes and press [ENTER]. Menu 11.5 appears.
Idle Timeout(sec)Enter the number of seconds the P-793H v2 should wait while there is no Internet traffic before it automatically disconnects from the ISP. Enter a time interval between 10 and 9999 seconds.

28.4 Remote Node Network Layer Options

Move the cursor to the Edit IP/Bridge field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to open Menu 11.3 - Remote Node Network Layer Options.

Figure 151 Menu 11.3: Remote Node Network Layer Options

Menu 11.3 - Remote Node Network Layer Options  
IP Options: Bridge Options:  
IP Address Assignment = Static Ethernet Addr Timeout(min) = N/A  
Rem IP Addr = 0.0.0.0  
Rem Subnet Mask = 0.0.0.0  
My WAN Addr = 0.0.0.0  
NAT = SUA Only  
Address Mapping Set = N/A  
Metric = 2  
Private = No  
RIP Direction = Both  
Version = RIP-2B  
Multicast = None  
IP Policies = 

The following table describes the fields in this menu.

Table 118 Menu 11.3: Remote Node Network Layer Options

FIELDDESCRIPTION
IP Address AssignmentSelect Dynamic if your ISP did not give you a fixed (static) IP address. Select Static if your ISP gave you a fixed (static) IP address. The next three fields are not available if you select Dynamic.
Rem IP AddrEnter the IP address of the remote (peer) computer to which the P-793H v2 connects.
Rem Subnet MaskEnter the subnet mask of the remote (peer) computer to which the P-793H v2 connects.
My WAN AddrEnter the fixed (static) IP address provided by your ISP.
NATSelect None if you do not want to use port forwarding, trigger ports, or NAT.
Select SUA Only if you want to use one or more of these features and have only one WAN IP address for your P-793H v2.
Select Full Feature if you want to use one or more of these features and have more than one public WAN IP address for your P-793H v2.
Address Mapping SetThis field is enabled if NAT is Full Feature. Specify which address mapping set you want to use for this remote node.
MetricThis field sets this route's priority among the routes the P-793H v2 uses.The metric represents the "cost of transmission". A router determines the best route for transmission by choosing a path with the lowest "cost". RIP routing uses hop count as the measurement of cost, with a minimum of "1" for directly connected networks. The number must be between "1" and "15"; a number greater than "15" means the link is down. The smaller the number, the lower the "cost".
PrivateThis field is related to RIP. This field determines whether or not the P-793H v2 includes the route to this remote node in its RIP broadcasts. If you select Yes, this route is not included in RIP broadcast. If you select No, the route to this remote node is propagated to other hosts through RIP broadcasts. Usually, you should keep the default value.
RIP DirectionUse this field to control how much routing information the P-793H v2 sends and receives through this connection.None - The P-793H v2 does not send or receive routing information through this connection.Both - The P-793H v2 sends and receives routing information through this connection.In Only - The P-793H v2 only receives routing information through this connection.Out Only - The P-793H v2 only sends routing information through this connection.
VersionSelect which version of RIP the P-793H v2 uses when it sends or receives information on the subnet.RIP-1 - The P-793H v2 uses RIPv1 to exchange routing information.RIP-2B - The P-793H v2 broadcasts RIPv2 to exchange routing information.RIP-2M - The P-793H v2 multicasts RIPv2 to exchange routing information.
MulticastYou do not have to enable multicasting to use RIP-2M. (See RIP Version.)Select which version of IGMP the P-793H v2 uses to support multicasting on this port. Multicasting only sends packets to some computers and is an alternative to unicast (sending packets to one computer) and broadcasting (sending packets to every computer).None - The P-793H v2 does not support multicasting.IGMP-v1 - The P-793H v2 supports IGMP version 1.IGMP-v2 - The P-793H v2 supports IGMP version 2.Multicasting can improve overall network performance. However, it requires extra processing and generates more network traffic. In addition, other computers have to support the same version of IGMP.
IP PoliciesYou can apply up to four policy routes for this remote nodeConfigure the policy routes in menu 25 first. See Chapter 37 on page 411 for information about policy routes.
Bridge Options
Ethernet Addr Timeout(min)This field is enabled if Bridge is Yes in SMT Menu 11.1: Remote Node Profile (nodes 1-7). Type the time (in minutes) for the P-793H v2 to retain the Ethernet address information in its internal tables while the line is down. If this information is retained, your P-793H v2 will not have to recompile the tables when the line comes back up.
Once you have completed filling in this menu, press [ENTER] at the message “Press ENTER to Confirm...” to save your configuration and return to menu 11.1, or press [ESC] at any time to cancel.

28.5 Remote Node Filter

Move the cursor to the field Edit Filter Sets in menu 11.1, and then press [SPACE BAR] to set the value to Yes. Press [ENTER] to open Menu 11.1.5 - Remote Node Filter.

Use this menu to specify the filter set(s) to apply to the incoming and outgoing traffic between this remote node and the P-793H v2 to prevent certain packets from triggering calls. You can specify up to 4 filter sets separated by commas, for example, 1, 5, 9, 12, in each filter field. Note that spaces are accepted in this field. For more information on defining the filters, please refer to Chapter 32 on

page 357. For PPPoE or PPTP encapsulation, you have the additional option of specifying remote node call filter sets.

Figure 152 Menu 11.5: Remote Node Filter

Menu 11.5 - Remote Node Filter  
Input Filter Sets:  
    protocol filters=  
    device filters=  
Output Filter Sets:  
    protocol filters=  
    device filters= 

The following table describes the labels in this menu.

Table 119 Menu 11.5: Remote Node Filter

FIELDDESCRIPTION
Input Filter Sets
protocol filtersEnter up to four filter sets. If you enter more than one, separate each one with a comma ( , ).
device filtersEnter up to four filter sets. If you enter more than one, separate each one with a comma ( , ).
Output Filter Sets
protocol filtersEnter up to four filter sets. If you enter more than one, separate each one with a comma ( , ).
device filtersEnter up to four filter sets. If you enter more than one, separate each one with a comma ( , ).

28.6 Remote Node ATM Layer Options

Move the cursor to the Edit ATM Options field in menu 11.1, then press [SPACE BAR] to select Yes. Press [ENTER] to open this menu. This menu depends on the multiplexing and encapsulation you select in menu 11.1.

Figure 153 Menu 11.6: Remote Node ATM Layer Options

Menu 11.6 - Remote Node ATM Layer Options
VPI/VCI (LLC-Multiplexing or PPP-Encapsulation)
VPI # = 0 VCI # = 38 ATM QoS Type= UBR
Peak Cell Rate (PCR)= 0
Sustain Cell Rate (SCR)= 0
Maximum Burst Size (MBS)= 0

The following table describes the fields in this menu.

Table 120 Menu 11.6: Remote Node ATM Layer Options

FIELDDESCRIPTION
VPIThe valid range for the VPI is 0 to 255. Enter the VPI assigned to you.
VCIThe valid range for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Enter the VCI assigned to you.
ATM QoS TypeSelect CBR (Constant Bit Rate) to specify fixed (always-on) bandwidth for voice or data traffic. Select UBR (Unspecified Bit Rate) for applications that are non-time sensitive, such as e-mail. Select VBR (Variable Bit Rate) for bursty traffic and bandwidth sharing with other applications.
Peak Cell Rate (PCR)Divide the DSL line rate (bps) by 424 (the size of an ATM cell) to find the Peak Cell Rate (PCR). This is the maximum rate at which the sender can send cells. Type the PCR here.
Sustain Cell Rate (SCR)The Sustain Cell Rate (SCR) sets the average cell rate (long-term) that can be transmitted. Type the SCR, which must be less than the PCR. Note that system default is 0 cells/sec.
Maximum Burst Size (MBS)Maximum Burst Size (MBS) refers to the maximum number of cells that can be sent at the peak rate. Type the MBS, which is less than 65535.
Once you have completed filling in this menu, press [ENTER] at the message “Press ENTER to Confirm...” to save your configuration and return to menu 11.1, or press [ESC] at any time to cancel.

28.7 Advance Setup Options

You can edit advanced setup options when the encapsulation is PPPoE. Move the cursor to the Edit Advance Options field in menu 11.1 (only for remote node 1), then press [SPACE BAR] to select Yes. Press [ENTER] to open Menu 11.8 - Advanced Setup Options.

Figure 154 Menu 11.8: Advance Setup Options

Menu 11.8 - Advance Setup Options

PPPoE pass-through= No

The following table describes the fields in this menu.

Table 121 Menu 11.8: Advance Setup Options

FIELDDESCRIPTION
PPPoE pass-throughIn addition to the ZyXEL Device's built-in PPPoE client, you can enable PPPoE Passthrough to allow up to ten hosts on the LAN to use PPPoE client software on their computers to connect to the ISP via the ZyXEL Device. Each host can have a separate account and a public WAN IP address.PPPoE pass through is an alternative to NAT for applications where NAT is not appropriate.Disable PPPoE passthrough if you do not need to allow hosts on the LAN to use PPPoE client software on their computers to connect to the ISP.
Once you have completed filling in this menu, press [ENTER] at the message “Press ENTER to Confirm...” to save your configuration and return to menu 11.1, or press [ESC] at any time to cancel.

Static Route Setup

Use this menu to configure IP and bridge (MAC) static routes.

29.1 IP Static Route Setup

Enter 1 from the menu 12. Select one of the IP static routes as shown next to configure IP static routes in menu 12.1.

Figure 155 Menu 12.1: IP Static Route Setup

Menu 12.1 - IP Static Route Setup

  1. 16.

Now, enter the index number of the static route that you want to configure.

ZYXEL ARMOR Z1 NWD6605 - IP Static Route Setup - 1
Figure 156 Menu 12.1.1: Edit IP Static Route

The following table describes the fields in this screen.

Table 122 Menu 12.1.1: Edit IP Static Route

FIELDDESCRIPTION
Route #This is the index number of the static route that you chose in menu 12.
Route NameEnter a descriptive name for this route. This is for identification purposes only.
ActiveThis field allows you to activate/deactivate this static route.
Destination IP AddressThis parameter specifies the IP network address of the final destination. Routing is always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID.
IP Subnet MaskEnter the IP subnet mask for this destination.
Gateway IP AddressEnter the IP address of the gateway. The gateway is an immediate neighbor of your P-793H v2 that will forward the packet to the destination. On the LAN, the gateway must be a router on the same segment as your P-793H v2; over the WAN, the gateway must be the IP address of one of the remote nodes.
MetricEnter a number from 1 to 15 to set this route's priority among the P-793H v2's routes (see Section 6.6 on page 96). The smaller the number, the higher priority the route has.
PrivateThis parameter determines if the P-793H v2 will include the route to this remote node in its RIP broadcasts. If set to Yes, this route is kept private and not included in RIP broadcast. If No, the route to this remote node will be propagated to other hosts through RIP broadcasts.
Once you have completed filling in this menu, press [ENTER] at the message “Press ENTER to Confirm...” to save your configuration, or press [ESC] to cancel.

29.2 Bridge Static Route Setup

Enter 3 from menu 12. Select one of the bridge static routes as shown next to configure IP static routes in menu 12.3.

ZYXEL ARMOR Z1 NWD6605 - Bridge Static Route Setup - 1
Figure 157 Menu 12.3: Bridge Static Route Setup

Now, enter the index number of the static route that you want to configure.

ZYXEL ARMOR Z1 NWD6605 - Bridge Static Route Setup - 2
Figure 158 Menu 12.3.1: Edit Bridge Static Route

The following table describes the fields in this screen.

Table 123 Menu 12.3.1: Edit Bridge Static Route

FIELDDESCRIPTION
Route #This is the index number of the static route that you chose in menu 12.
Route NameEnter a descriptive name for this route. This is for identification purposes only.
ActiveThis field allows you to activate/deactivate this static route.
Ether AddressThis parameter specifies the MAC address of the final destination.
IP AddressEnter the IP address of the gateway. The gateway is an immediate neighbor of your P-793H v2 that will forward the packet to the destination. On the LAN, the gateway must be a router on the same segment as your P-793H v2; over the WAN, the gateway must be the IP address of one of the remote nodes.
Gateway NodePress [SPACE BAR] and then [ENTER] to select the number of the remote node that is the gateway for this static route.
Once you have completed filling in this menu, press [ENTER] at the message “Press ENTER to Confirm...” to save your configuration, or press [ESC] to cancel.

Use this menu to configure Network Address Translation (NAT) on the P-793H v2.

30.1 Using NAT

Note: You must create a firewall rule in addition to setting up SUA/NAT, to allow traffic from the WAN to be forwarded through the P-793H v2.

30.1.1 SUA (Single User Account) Versus NAT

SUA (Single User Account) is a ZyNOS implementation of a subset of NAT that supports two types of mapping, Many-to-One and Server. See Section 30.2.1 on page 342 for a detailed description of the NAT set for SUA. The P-793H v2 also supports Full Feature NAT to map multiple global IP addresses to multiple private LAN IP addresses of clients or servers using mapping types.

Choose SUA Only if you have just one public WAN IP address for your P-793H v2.

Note: Choose Full Feature if you have multiple public WAN IP addresses for your P-793H v2.

30.1.2 Applying NAT

You apply NAT via menus 4 or 11.3 as displayed next. The next figure shows you how to apply NAT for Internet access in menu 4. Enter 4 from the main menu to go to Menu 4 - Internet Access Setup.

ZYXEL ARMOR Z1 NWD6605 - Applying NAT - 1
Figure 159 Menu 4: Applying NAT for Internet Access

The following figure shows how you apply NAT to the remote node in menu 11.3.

1 Enter 11 from the main menu.
2 Enter 1 to open Menu 11.1 - Remote Node Profile.

3 Move the cursor to the Edit IP/Bridge field, press [SPACE BAR] to select Yes and then press [ENTER] to bring up Menu 11.3 - Remote Node Network Layer Options.

Figure 160 Menu 11.3: Applying NAT to the Remote Node

Menu 11.3 - Remote Node Network Layer Options  
IP Options: Bridge Options:  
IP Address Assignment = Static Ethernet Addr Timeout(min) = N/A  
Rem IP Addr = 0.0.0.0  
Rem Subnet Mask = 0.0.0.0  
My WAN Addr = 0.0.0.0  
NAT = SUA Only  
Address Mapping Set = N/A  
Metric = 2  
Private = No  
RIP Direction = Both  
Version = RIP-2B  
Multicast = None  
IP Policies = 

The following table describes the fields in this menu.

Table 124 Applying NAT in Menus 4 & 11.3

FIELDDESCRIPTIONOPTIONS
Network Address TranslationWhen you select this option the SMT will use the specified address mapping set (menu 15.1 - see Section 30.2.1 on page 342 for further discussion). You can configure any of the mapping types described in Chapter 8 on page 117. Choose Full Feature if you have multiple public WAN IP addresses for your P-793H v2. When you select Full Feature you must configure at least one address mapping set.Full Feature
NAT is disabled when you select this option.None
When you select this option the SMT will use Address Mapping Set 255 (menu 15.1 - see Section 30.2.1 on page 342). Choose SUA Only if you have just one public WAN IP address for your P-793H v2.SUA Only

30.2 NAT Setup

Use the address mapping sets menus and submenus to create the mapping table used to assign global addresses to computers on the LAN and the DMZ. Set 255 is used for SUA. When you select Full Feature in menu 4 or menu 11.3, the SMT will use the address mapping set that you specify. When you select SUA Only, the SMT will use the pre-configured Set 255 (read only).

A server set is a list of LAN servers mapped to external ports. To use this set, a server rule must be set up inside the NAT address mapping set. Please see the section on port forwarding in Section 8.3 on page 120 for further information on these menus. To configure NAT, enter 15 from the main menu to bring up the following screen.

Figure 161 Menu 15: NAT Setup

Menu 15 - NAT Setup

  1. Address Mapping Sets
  2. NAT Server Sets

30.2.1 Address Mapping Sets

Enter 1 to bring up Menu 15.1.1 - Address Mapping Sets.

Figure 162 Menu 15.1: Address Mapping Sets

Menu 15.1 - Address Mapping Sets  
1. ACL Default Set  
2.  
3.  
4.  
5.  
6.  
7.  
8.  
255. SUA (read only) 

Select the address mapping set you want to modify. The fields in address 255 are used for SUA and are read-only.

30.2.1.1 User-Defined Address Mapping Sets

Note: The entire set will be deleted if you leave the Set Name field blank and press [ENTER] at the bottom of the screen.

ZYXEL ARMOR Z1 NWD6605 - User-Defined Address Mapping Sets - 1
Figure 163 Menu 15.1.1: Address Mapping Rules

Note: The Type, Local and Global Start/End IPs are configured in menu 15.1.1.1 (described later) and the values are displayed here.

Table 125 Menu 15.1.1: Address Mapping Rules

FIELDDESCRIPTION
Set NameThis is the name of the set you selected in menu 15.1 or enter the name of a new set you want to create.
IdxThis is the index or rule number.
Local Start IPLocal Start IP is the starting local IP address (ILA).
Local End IPLocal End IP is the ending local IP address (ILA). If the rule is for all local IPs, then the start IP is 0.0.0.0 and the end IP is 255.255.255.255.
Global Start IPThis is the starting global IP address (IGA). If you have a dynamic IP, enter 0.0.0.0 as the Global Start IP.
Global End IPThis is the ending global IP address (IGA).
TypeThese are the mapping types discussed above. Server allows us to specify multiple servers of different types behind NAT to this machine. See later for some examples.
Once you have finished configuring a rule in this menu, press [ENTER] at the message “Press ENTER to Confirm...” to save your configuration, or press [ESC] to cancel.

Ordering your rules is important because the P-793H v2 applies the rules in the order that you specify. When a rule matches the current packet, the P-793H v2 takes the corresponding action and the remaining rules are ignored. If there are any empty rules before your new configured rule, your configured rule will be pushed up by that number of empty rules. For example, if you have already configured rules 1 to 6 in your current set and now you configure rule number 9. In the set summary screen, the new rule will be rule 7, not 9.

Now if you delete rule 4, rules 5 to 7 will be pushed up by 1 rule, so as old rule 5 becomes rule 4, old rule 6 becomes rule 5 and old rule 7 becomes rule 6.

Note: You must press [ENTER] at the bottom of the screen to save the whole set. You must do this again if you make any changes to the set – including deleting a rule. No changes to the set take place until this action is taken.

Selecting Edit in the Action field and then selecting a rule brings up the following menu, Menu 15.1.1.1 - Address Mapping Rule in which you can edit an individual rule and configure the Type, Local and Global Start/End IPs.

Note: An IP End address must be numerically greater than its corresponding IP Start address.

Figure 164 Menu 15.1.1.1: Address Mapping Rule

Menu 15.1.1.1 Address Mapping Rule  
Type= Server  
Local IP:  
    Start= N/A  
    End = N/A  
Global IP:  
    Start= 0.0.0.0  
    End = N/A  
Server Mapping Set= 2 

The following table describes the fields in this menu.

Table 126 Menu 15.1.1.1: Address Mapping Rule

FIELDDESCRIPTION
TypePress [SPACE BAR] and then [ENTER] to select from a total of five types. These are the mapping types discussed in Chapter 8 on page 117. Server allows you to specify multiple servers of different types behind NAT to this computer. See Section 30.4.3 on page 348 for an example.
Local IPThese fields are enabled depending on the Type.
StartEnter the starting local IP address (ILA).
EndEnter the ending local IP address (ILA). If the rule is for all local IPs, then put the Start IP as 0.0.0.0 and the End IP as 255.255.255.255. This field is N/A for One-to-One and Server types.
Global IPThese fields are enabled depending on the Type.
StartEnter the starting global IP address (IGA). If you have a dynamic IP, enter 0.0.0.0 as the Global IP Start. Note that Global IP Start can be set to 0.0.0.0 only if the types are Many-to-One or Server.
EndEnter the ending global IP address (IGA). This field is N/A for One-to-One, Many-to-One and Server types.
Server Mapping SetThis field is available only when you select Server in the Type field. Select which server mapping set to use for this rule.
Once you have finished configuring a rule in this menu, press [ENTER] at the message "Press ENTER to Confirm..." to save your configuration, or press [ESC] to cancel.

30.3 Configuring a Server behind NAT

Note: If you do not assign a Default Server IP address, the P-793H v2 discards all packets received for ports that are not specified here or in the remote management setup.

Follow these steps to configure a server behind NAT:

1 Enter 15 in the main menu to go to Menu 15 - NAT Setup.
2 Enter 2 to open menu 15.2 (and configure the address mapping rules for the WAN port on a P-793H v2 with a single WAN port).

Figure 165 Menu 15.2: NAT Server Sets

ZYXEL ARMOR Z1 NWD6605 - Configuring a Server behind NAT - 1

3 Enter 1 to configure the server set used by SUA, or enter the number of the server set you want to modify for full-feature NAT. In Menu 15.2 - NAT Server Setup, configure the port forwarding rules.

Figure 166 Menu 15.2: NAT Server Setup

Menu 15.2 - NAT Server Setup

Rule Start Port No. End Port No. IP Address

1.DefaultDefault0.0.0.0
2.8080192.168.1.10
3.000.0.0.0
4.000.0.0.0
5.000.0.0.0
6.000.0.0.0
7.000.0.0.0
8.000.0.0.0
9.000.0.0.0
10.000.0.0.0
11.000.0.0.0
12.000.0.0.0

The first entry is for the Default Server. The following table describes the labels in this menu.

Table 127 Menu 15.2: NAT Server Setup

FIELDDESCRIPTION
RuleThis field is a sequential value, and it is not associated with a specific rule. The sequence is important, however. The P-793H v2 checks each active rule in order, and it only follows the first one that applies.
Start PortThis field displays the beginning of the range of port numbers forwarded by this rule.
End PortThis field displays the end of the range of port numbers forwarded by this rule. If it is the same as the Start Port, only one port number is forwarded.
IP AddressThis field displays the IP address of the server to which packet for the selected port(s) are forwarded.

30.4 General NAT Examples

The following are some examples of NAT configuration.

30.4.1 Internet Access Only

In the following Internet access example, you only need one rule where all your ILAs (Inside Local addresses) map to one dynamic IGA (Inside Global Address) assigned by your ISP.

ZYXEL ARMOR Z1 NWD6605 - Internet Access Only - 1
Figure 167 NAT Example 1
Figure 168 Menu 4: Internet Access & NAT Example

Menu 4 - Internet Access Setup  
ISP's Name= MyISP  
Encapsulation= ENET ENCAP  
Multiplexing= LLC-based  
VPI#=0  
VCI#=33  
ATM QoS Type= UBR  
Peak Cell Rate (PCR)=0  
Sustain Cell Rate (SCR)=0  
Maximum Burst Size (MBS)=0  
My Login=N/A  
My Password=N/A  
ENET ENCAP Gateway=0.0.0.0  
IP Address Assignment=Static  
IP Address=0.0.0.0  
Network Address Translation= SUA Only  
Address Mapping Set=N/A 

From menu 4 shown above, simply choose the SUA Only option from the Network Address Translation field. This is the Many-to-One mapping discussed in Section 30.4 on page 346. The SUA Only read-only option from the Network Address Translation field in menus 4 and 11.3 is specifically pre-configured to handle this case.

30.4.2 Example 2: Internet Access with a Default Server

ZYXEL ARMOR Z1 NWD6605 - Example 2: Internet Access with a Default Server - 1
Figure 169 NAT Example 2

In this case, you do exactly as above (use the convenient pre-configured SUA Only set) and also go to menu 15.2.1 to specify the Default Server behind the NAT as shown in the next figure.

ZYXEL ARMOR Z1 NWD6605 - Example 2: Internet Access with a Default Server - 2
Figure 170 Menu 15.2: Specifying an Inside Server

30.4.3 Example 3: Multiple Public IP Addresses With Inside Servers

In this example, there are 3 IGAs from our ISP. There are many departments but two have their own FTP server. All departments share the same router. The example will reserve one IGA for each department with an FTP server and all departments use the other IGA. Map the FTP servers to the first two IGAs and the other LAN traffic to the remaining IGA. Map the third IGA to an inside web server and mail server. Four rules need to be configured, two bi-directional and two unidirectional as follows.

1 Map the first IGA to the first inside FTP server for FTP traffic in both directions (1: 1 mapping, giving both local and global IP addresses).
2 Map the second IGA to our second inside FTP server for FTP traffic in both directions (1:1 mapping, giving both local and global IP addresses).
3 Map the other outgoing LAN traffic to IGA3 (Many:1 mapping).
4 You also map your third IGA to the web server and mail server on the LAN. Type Server allows you to specify multiple servers, of different types, to other computers behind NAT on the LAN.

The example situation looks somewhat like this:

ZYXEL ARMOR Z1 NWD6605 - Example 3: Multiple Public IP Addresses With Inside Servers - 1
Figure 171 NAT Example 3

1 In this case you need to configure Address Mapping Set 1 from Menu 15.1 - Address Mapping Sets. Therefore you must choose the Full Feature option from the Network Address Translation field (in menu 4 or menu 11.3) in Figure 172 on page 350.
2 Then enter 15 from the main menu.
3 Enter 1 to configure the Address Mapping Sets.
4 Enter 1 to begin configuring this new set. Enter a Set Name, choose the Edit Action and then enter 1 for the Select Rule field. Press [ENTER] to confirm.
5 Select Type as One-to-One (direct mapping for packets going both ways), and enter the local Start IP as 192.168.1.10 (the IP address of FTP Server 1), the global Start IP as 10.132.50.1 (our first IGA). (See Figure 173 on page 351).
6 Repeat the previous step for rules 2 to 4 as outlined above.

7 When finished, menu 15.1.1 should look like as shown in Figure 174 on page 351.

ZYXEL ARMOR Z1 NWD6605 - Example 3: Multiple Public IP Addresses With Inside Servers - 2
Figure 172 Example 3: Menu 11.3

The following figure shows how to configure the first rule.

Figure 173 Example 3: Menu 15.1.1.1

Menu 15.1.1.1 Address Mapping Rule  
Type= One-to-One  
Local IP:  
    Start= 192.168.1.10  
    End = N/A  
Global IP:  
    Start= 10.132.50.1  
    End = N/A  
Server Mapping Set= N/A 

Figure 174 Example 3: Final Menu 15.1.1

Menu 15.1.1 - Address Mapping Rules
Set Name=Example3
Idx Local Start IP Local End IP Global Start IP Global End IP Type
--- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    1. 192.168.1.10 10.132.50.1
    2. 192.168.1.11 10.132.50.2
    3. 0.0.0.0 255.255.255.255 10.32.50.3
    4.
    5.
    6.
    7.
    8.
    9.
    10.
Action= None Select Rule= N/A 

Now configure the IGA3 to map to our web server and mail server on the LAN.

1 Enter 15 from the main menu.
2 Enter 2 to go to menu 15.2.

3 (Enter 1 or 2 from menu 15.2 on a P-793H v2 with multiple WAN ports) configure the menu as shown in Figure 175 on page 352.

Figure 175 Example 3: Menu 15.2

Menu 15.2 - NAT Server Setup

Rule Start Port No. End Port No. IP Address

  1. Default Default 0.0.0.0
  2. 80 80 192.168.1.21
  3. 25 192.168.1.20
  4. 0 0.0.0.0
  5. 0 0.0.0.0
  6. 0 0 0.0.0.0
  7. 0 0 0.0.0.0
  8. 0 0.0.0.0
  9. 0 0.0.0.0
  10. 0 0.0.0.0
  11. 0 0.0.0.0
  12. 0 0.0.0.0

30.4.4 Example 4: NAT Unfriendly Application Programs

Some applications do not support NAT Mapping using TCP or UDP port address translation. In this case it is better to use Many-One-to-One mapping as port numbers do not change for Many-One-to-One (and One-to-One) NAT mapping types. The following figure illustrates this.

ZYXEL ARMOR Z1 NWD6605 - Example 4: NAT Unfriendly Application Programs - 1
Figure 176 NAT Example 4

Note: Other applications such as some gaming programs are NAT unfriendly because they embed addressing information in the data stream. These applications won't work through NAT even when using One-to-One and Many-One-to-One mapping types.

Follow the steps outlined in example 3 above to configure these two menus as follows.

Figure 177 Example 4: Menu 15.1.1.1: Address Mapping Rule

Menu 15.1.1.1 Address Mapping Rule  
Type= Many-to-Many No Overload  
Local IP:  
    Start= 192.168.1.10  
    End = 192.168.1.12  
Global IP:  
    Start= 10.132.50.1  
    End = 10.132.50.3  
Server Mapping Set= N/A 

After you've configured your rule, you should be able to check the settings in menu 15.1.1 as shown next.Example 4: Menu 15.1.1: Address Mapping Rules

Menu 15.1.1 - Address Mapping Rules
Set Name= Example4
Idx Local Start IP Local End IP Global Start IP Global End IP Type
1. 192.168.1.10 192.168.1.12 10.132.50.1 10.132.50.3 M-M N+
2.
3.
4.
5.
6.
7.
8.
9.
10.
Action= None Select Rule= N/A 

Use this menu to activate or deactivate the firewall.

31.1 Using P-793H v2 SMT Menus

From the main menu enter 21 to go to Menu 21 - Filter and Firewall Setup to display the screen shown next.

Figure 178 Menu 21: Filter and Firewall Setup

Menu 21 - Filter and Firewall Setup

  1. Filter Setup
  2. Firewall Setup

31.1.1 Activating the Firewall

Enter option 2 in this menu to bring up the following screen. Press [SPACE BAR] and then [ENTER] to select Yes in the Active field to activate the firewall. The firewall must be active to protect against Denial of Service (DoS) attacks. Use the web configurator to configure firewall rules. Use the web configurator or SMT

menu 15 to configure the LAN-to-WAN Set Name and WAN-to-LAN Set Name.

Figure 179 Menu 21.2: Firewall Setup

Menu 21.2 - Firewall Setup

The firewall protects against Denial of Service (DoS) attacks when it is active. The default Policy sets

  1. allow all sessions originating from the LAN to the WAN and
  2. deny all sessions originating from the WAN to the LAN

You may define additional Policy rules or modify existing ones but please exercise extreme caution in doing so

Active: Yes

LAN-to-WAN Set Name: ACL Default Set
WAN-to-LAN Set Name: ACL Default Set

Please configure the Firewall function through Web Configurator

Note: It is recommended to configure the firewall rules using the web configurator.

Filter Configuration

This chapter shows you how to create and apply filters.

32.1 Introduction to Filters

Your P-793H v2 uses filters to decide whether to allow passage of a data packet and/or to make a call. There are two types of filter applications: data filtering and call filtering. Filters are subdivided into device and protocol filters, which are discussed later.

Data filtering screens the data to determine if the packet should be allowed to pass. Data filters are divided into incoming and outgoing filters, depending on the direction of the packet relative to a port. Data filtering can be applied on either the WAN side or the LAN side. Call filtering is used to determine if a packet should be allowed to trigger a call. Remote node call filtering is only applicable when using PPPoE encapsulation. Outgoing packets must undergo data filtering before they encounter call filtering as shown in the following figure.

ZYXEL ARMOR Z1 NWD6605 - Introduction to Filters - 1
Figure 180 Outgoing Packet Filtering Process

For incoming packets, your P-793H v2 applies data filters only. Packets are processed depending upon whether a match is found. The following sections describe how to configure filter sets.

32.1.1 The Filter Structure of the P-793H v2

A filter set consists of one or more filter rules. Usually, you would group related rules, for example all the rules for NetBIOS, into a single set and give it a descriptive name. The P-793H v2 allows you to configure up to twelve filter sets with six rules in each set, for a total of 72 filter rules in the system. You cannot mix device filter rules and protocol filter rules within the same set. You can apply up to four filter sets to a particular port to block multiple types of packets. With each filter set having up to six rules, you can have a maximum of 24 rules active for a single port.

Sets of factory default filter rules have been configured in menu 21 to prevent NetBIOS traffic from triggering calls and to prevent incoming telnet sessions. A summary of their filter rules is shown in the figures that follow.

The following figure illustrates the logic flow when executing a filter rule. See also Figure 186 on page 365 for the logic flow when executing an IP filter.

ZYXEL ARMOR Z1 NWD6605 - The Filter Structure of the P-793H v2 - 1
Figure 181 Filter Rule Process

You can apply up to four filter sets to a particular port to block multiple types of packets. With each filter set having up to six rules, you can have a maximum of 24 rules active for a single port.

32.2 Configuring a Filter Set

The P-793H v2 includes filtering for NetBIOS over TCP/IP packets by default. To configure another filter set, follow the procedure below.

1 Enter 21 in the main menu to open menu 21.

Figure 182 Menu 21: Filter and Firewall Setup

Menu 21 - Filter and Firewall Setup

  1. Filter Setup
  2. Firewall Setup

2 Enter 1 to bring up the following menu.

Figure 183 Menu 21.1: Filter Set Configuration

Menu 21.1 - Filter Set Configuration
Filter
Set # Comments
1 NetBIOS WAN
2 NetBIOS LAN
3 TELNET WAN
4 PPPoE
5 FTP WAN
6 Enter Filter Set Number to Configure=0
Edit Comments= N/A 

3 Select the filter set you wish to configure (1-12) and press [ENTER].
4 Enter a descriptive name or comment in the Edit Comments field and press [ENTER].
5 Press [ENTER] at the message [Press ENTER to confirm] to open Menu 21.1.1 - Filter Rules Summary.

This screen shows the summary of the existing rules in the filter set.

ZYXEL ARMOR Z1 NWD6605 - Configuring a Filter Set - 1
Figure 184 Menu 21.1.1: Filter Rules Summary

The following table describes the labels in this screen.

Table 128 Abbreviations Used in the Filter Rules Summary Menu

FIELDDESCRIPTION
#This is an index number.
AActive: "Y" means the rule is active. "N" means the rule is inactive.
TypeThe type of filter rule: "GEN" for Generic, "IP" for TCP/IP.
Filter RulesThese parameters are displayed here.
MMore. "Y" means there are more rules to check which form a rule chain with the present rule. An action cannot be taken until the rule chain is complete. "N" means there are no more rules to check. You can specify an action to be taken, in other words forward the packet, drop the packet or check the next rule. For the latter, the next rule is independent of the rule just checked.
mAction Matched. "F" means to forward the packet immediately and skip checking the remaining rules. "D" means to drop the packet. "N" means to check the next rule.
nAction Not Matched. "F" means to forward the packet immediately and skip checking the remaining rules. "D" means to drop the packet. "N" means to check the next rule.

The following tables contain a brief description of the abbreviations used in the previous menus. The protocol dependent filter rules abbreviation are listed as follows:

Table 129 Rule Abbreviations Used

ABBREVIATIONDESCRIPTION
IP
PrProtocol
SASource Address
SPSource Port number
DADestination Address
DPDestination Port number
GEN
OffOffset
LenLength

Refer to the next section for information on configuring the filter rules.

32.2.1 Configuring a Filter Rule

To configure a filter rule, type its number in Menu 21.1.1 - Filter Rules Summary and press [ENTER] to open menu 21.1.1.1 for the rule.

To speed up filtering, all rules in a filter set must be of the same class, that is, protocol filters or generic filters. The class of a filter set is determined by the first rule that you create. When applying the filter sets to a port, separate menu fields are provided for protocol and device filter sets. If you include a protocol filter set in a device filter field or vice versa, the P-793H v2 will warn you and will not allow you to save.

32.2.2 Configuring a TCP/IP Filter Rule

This section shows you how to configure a TCP/IP filter rule. TCP/IP rules allow you to base the rule on the fields in the IP and the upper layer protocol, for example, UDP and TCP headers.

To configure TCP/IP rules, select TCP/IP Filter Rule from the Filter Type field and press [ENTER] to open Menu 21.1.1.1 - TCP/IP Filter Rule, as shown next.

Figure 185 Menu 21.1.1.1: TCP/IP Filter Rule

Menu 21.1.1.1 - TCP/IP Filter Rule  
Filter #: 1,1  
Filter Type= TCP/IP Filter Rule  
Active= No  
IP Protocol= 0 IP Source Route= No  
Destination: IP Addr=  
    IP Mask=  
    Port #=  
    Port # Comp= None  
Source: IP Addr=  
    IP Mask=  
    Port #=  
    Port # Comp= None  
TCP Estab= N/A  
More= No Log= None  
Action Matched= Check Next Rule  
Action Not Matched= Check Next Rule 

The following table describes how to configure your TCP/IP filter rule.

Table 130 Menu 21.1.1.1: TCP/IP Filter Rule

FIELDDESCRIPTION
ActivePress [SPACE BAR] and then [ENTER] to select Yes to activate the filter rule or No to deactivate it.
IP ProtocolProtocol refers to the upper layer protocol, for example TCP is 6, UDP is 17 and ICMP is 1. Type a value between 0 and 255. A value of 0 matches ANY protocol.
IP Source RoutePress [SPACE BAR] and then [ENTER] to select Yes to apply the rule to packets with an IP source route option. Otherwise the packets must not have a source route option. The majority of IP packets do not have source route.
Destination
IP AddrEnter the destination IP Address of the packet you wish to filter. This field is ignored if it is 0.0.0.0.
IP MaskEnter the IP mask to apply to the Destination: IP Addr.
Port #Enter the destination port of the packets that you wish to filter. The range of this field is 0 to 65535. This field is ignored if it is 0.
Port # CompPress [SPACE BAR] and then [ENTER] to select the comparison to apply to the destination port in the packet against the value given in Destination: Port#.Options are None, Equal, Not Equal, Less and Greater.
Source

Table 130 Menu 21.1.1.1: TCP/IP Filter Rule

FIELDDESCRIPTION
IP AddrEnter the source IP Address of the packet you wish to filter. This field is ignored if it is 0.0.0.0.
IP MaskEnter the IP mask to apply to the Source: IP Addr.
Port #Enter the source port of the packets that you wish to filter. The range of this field is 0 to 65535. This field is ignored if it is 0.
Port # CompPress [SPACE BAR] and then [ENTER] to select the comparison to apply to the source port in the packet against the value given in Source: Port#.Options are None, Equal, Not Equal, Less and Greater.
TCP EstabThis field is applicable only when the IP Protocol field is 6, TCP. Press [SPACE BAR] and then [ENTER] to select Yes, to have the rule match packets that want to establish a TCP connection (SYN=1 and ACK=0); if No, it is ignored.
MorePress [SPACE BAR] and then [ENTER] to select Yes or No. If Yes, a matching packet is passed to the next filter rule before an action is taken; if No, the packet is disposed of according to the action fields.If More is Yes, then Action Matched and Action Not Matched will be N/A.
LogPress [SPACE BAR] and then [ENTER] to select a logging option from the following:None - No packets will be logged.Action Matched - Only packets that match the rule parameters will be logged.Action Not Matched - Only packets that do not match the rule parameters will be logged.Both - All packets will be logged.
ActionMatchedPress [SPACE BAR] and then [ENTER] to select the action for a matching packet OPCs are Check Next Rule, Forward and Drop.
Action NotMatchedPress [SPACE BAR] and then [ENTER] to select the action for a packet not matching the rule OPCs are Check Next Rule, Forward and Drop.
When you have Menu 21.1.1.1 - TCP/IP Filter Rule configured, press [ENTER] at the message "Press ENTER to Confirm" to save your configuration, or press [ESC] to cancel. This data will now be displayed on Menu 21.1.1 - Filter Rules Summary.

The following figure illustrates the logic flow of an IP filter.

ZYXEL ARMOR Z1 NWD6605 - Configuring a TCP/IP Filter Rule - 1
Figure 186 Executing an IP Filter

32.2.3 Configuring a Generic Filter Rule

This section shows you how to configure a generic filter rule. The purpose of generic rules is to allow you to filter non-IP packets. For IP, it is generally easier to use the IP rules directly.

For generic rules, the P-793H v2 treats a packet as a byte stream as opposed to an IP or IPX packet. You specify the portion of the packet to check with the Offset (from 0) and the Length fields, both in bytes. The P-793H v2 applies the Mask (bit-wise ANDing) to the data portion before comparing the result against the Value to determine a match. The Mask and Value are specified in hexadecimal numbers. Note that it takes two hexadecimal digits to represent a byte, so if the length is 4, the value in either field will take 8 digits, for example, FFFFFFFF.

To configure a generic rule, select Generic Filter Rule in the Filter Type field in menu 21.1.1.1 and press [ENTER] to open Generic Filter Rule, as shown below.

Figure 187 Menu 21.1.1.1: Generic Filter Rule

Menu 21.1.1.1 - Generic Filter Rule
Filter #: 1,1
Filter Type= Generic Filter Rule
Active= No
Offset= 0
Length= 0
Mask= N/A
Value= N/A
More= No Log= None
Action Matched= Check Next Rule
Action Not Matched= Check Next Rule 

The following table describes the fields in the Generic Filter Rule menu.

Table 131 Menu 21.1.1.1: Generic Filter Rule

FIELDDESCRIPTION
Filter #This is the filter set, filter rule co-ordinates, in other words 2,3 refers to the second filter set and the third rule of that set.
Filter TypeUse [SPACE BAR] and then [ENTER] to select a rule type. Parameters displayed below each type will be different. TCP/IP filter rules are used to filter IP packets while generic filter rules allow filtering of non-IP packets. Options are Generic Filter Rule and TCP/IP Filter Rule.
ActiveSelect Yes to turn on the filter rule or No to turn it off.
OffsetEnter the starting byte of the data portion in the packet that you wish to compare. The range for this field is from 0 to 255.
LengthEnter the byte count of the data portion in the packet that you wish to compare. The range for this field is 0 to 8.
MaskEnter the mask (in Hexadecimal notation) to apply to the data portion before comparison.
ValueEnter the value (in Hexadecimal notation) to compare with the data portion.
MoreIf Yes, a matching packet is passed to the next filter rule before an action is taken; else the packet is disposed of according to the action fields. If More is Yes, then Action Matched and Action Not Matched will be No.
LogSelect the logging option from the following: None - No packets will be logged. Action Matched - Only packets that match the rule parameters will be logged. Action Not Matched - Only packets that do not match the rule parameters will be logged. Both - All packets will be logged.
Action MatchedSelect the action for a packet matching the rule. Options are Check Next Rule, Forward and Drop.
Action Not MatchedSelect the action for a packet not matching the rule. Options are Check Next Rule, Forward and Drop.
Once you have completed filling in Menu 21.1.1.1 - Generic Filter Rule, press [ENTER] at the message “Press ENTER to Confirm” to save your configuration, or press [ESC] to cancel. This data will now be displayed on Menu 21.1.1 - Filter Rules Summary.

32.3 Example Filter

Let's look at an example to block outside users from accessing the P-793H v2 via telnet. Please see our included disk for more example filters.

ZYXEL ARMOR Z1 NWD6605 - Example Filter - 1
Figure 188 Telnet Filter Example

1 Enter 21 from the main menu to open Menu 21 - Filter and Firewall Setup.

2 Enter 1 to open Menu 21.1 - Filter Set Configuration.
3 Enter the index of the filter set you wish to configure (say 3) and press [ENTER].
4 Enter a descriptive name or comment in the Edit Comments field and press [ENTER].
5 Press [ENTER] at the message [Press ENTER to confirm] to open Menu 21.1.3 - Filter Rules Summary.
6 Enter 1 to configure the first filter rule (the only filter rule of this set). Make the entries in this menu as shown in the following figure.

ZYXEL ARMOR Z1 NWD6605 - Example Filter - 2
Figure 189 Example Filter: Menu 21.1.3.1

The port number for the telnet service (TCP protocol) is 23. See RFC 1060 for port numbers of well-known services.

When you press [ENTER] to confirm, you will see the following screen. Note that there is only one filter rule in this set.

Figure 190 Example Filter Rules Summary: Menu 21.1.3

Menu 21.1.3 - Filter Rules Summary
<h1 id="a-type-filter-rules-m-m-n">A Type Filter Rules M m n</h1>
- - -
1 Y IP Pr=6, SA=0.0.0.0, DA=0.0.0.0, DP=23 N D F
2 N
3 N
4 N
5 N
6 N 

This shows you that you have configured and activated (A = Y) a TCP/IP filter rule (Type = , Pr = 6 ) for destination telnet ports ( DP = 23 ).

M = N means an action can be taken immediately. The action is to drop the packet (m = D) if the action is matched and to forward the packet immediately (n = F) if the action is not matched no matter whether there are more rules to be checked (there aren't in this example).

After you've created the filter set, you must apply it.

1 Enter 11 from the main menu to go to menu 11.
2 Enter 1 or 2 to open Menu 11.x - Remote Node Profile.
3 Go to the Edit Filter Sets field, press [SPACE BAR] to select Yes and press [ENTER].
4 This brings you to menu 11.1.4. Apply a filter set (our example filter set 3) as shown in Figure 152 on page 331.
5 Press [ENTER] to confirm after you enter the set numbers and to leave menu 11.1.4.

32.4 Filter Types and NAT

There are two classes of filter rules, Generic Filter (Device) rules and protocol filter (TCP/IP) rules. Generic filter rules act on the raw data from/to LAN and WAN. Protocol filter rules act on the IP packets. Generic and TCP/IP filter rules are discussed in more detail in the next section. When NAT (Network Address

Translation) is enabled, the inside IP address and port number are replaced on a connection-by-connection basis, which makes it impossible to know the exact address and port on the wire. Therefore, the P-793H v2 applies the protocol filters to the "native" IP address and port number before NAT for outgoing packets and after NAT for incoming packets. On the other hand, the generic, or device filters are applied to the raw packets that appear on the wire. They are applied at the point when the P-793H v2 is receiving and sending the packets; in other words the interface. The interface can be an Ethernet port or any other hardware port. The following diagram illustrates this.

ZYXEL ARMOR Z1 NWD6605 - Filter Types and NAT - 1
Figure 191 Protocol and Device Filter Sets

32.5 Firewall Versus Filters

Firewall configuration is discussed in Chapter 10 on page 149. Further comparisons are also made between filtering, NAT and the firewall.

32.6 Applying a Filter

This section shows you where to apply the filter(s) after you design it (them). The P-793H v2 already has filters to prevent NetBIOS traffic from triggering calls, and block incoming telnet, FTP and HTTP connections.

Note: If you do not activate the firewall, it is advisable to apply filters.

32.6.1 Applying LAN Filters

LAN traffic filter sets may be useful to block certain packets, reduce traffic and prevent security breaches. Go to menu 3.1 (shown next) and enter the number(s) of the filter set(s) that you want to apply as appropriate. You can choose up to four filter sets (from twelve) by entering their numbers separated by commas, for

example 3, 4, 6, 11. Input filter sets filter incoming traffic to the P-793H v2 and output filter sets filter outgoing traffic from the P-793H v2.

Figure 192 Filtering LAN Traffic

Menu 3.1 - LAN Port Filter Setup  
Input Filter Sets:  
    protocol filters=  
    device filters=  
Output Filter Sets:  
    protocol filters=  
    device filters= 

32.6.2 Applying Remote Node Filters

Go to menu 11.5 (shown below – note that call filter sets are only present for PPPoA or PPPoE encapsulation) and enter the number(s) of the filter set(s) as appropriate. You can cascade up to four filter sets by entering their numbers separated by commas. The P-793H v2 already has filters to prevent NetBIOS traffic from triggering calls, and block incoming telnet, FTP and HTTP connections.

Figure 193 Filtering Remote Node Traffic

Menu 11.5 - Remote Node Filter  
Input Filter Sets:  
    protocol filters=  
        device filters=  
Output Filter Sets:  
    protocol filters=  
        device filters=  
Call Filter Sets:  
    protocol filters=  
        device filters= 

System Password

Use this menu to change your password. This is the same password used to access the web configurator. To open this menu, enter 23 in the main menu.

ZYXEL ARMOR Z1 NWD6605 - System Password - 1
Figure 194 Menu 23: System Password

The following table describes the labels in this menu.

Table 132 Menu 23: System Password

FIELDDESCRIPTION
Old PasswordEnter the current administrator password for the P-793H v2.
New PasswordEnter the new administrator password for the P-793H v2.
Retype to confirmEnter the new administrator password again.

System Information & Diagnosis

This chapter covers SMT menus 24.1 to 24.4.

34.1 Introduction to System Status

This chapter covers the diagnostic tools that help you to maintain your P-793H v2. These tools include updates on system status, port status and log and trace capabilities.

Select menu 24 in the main menu to open Menu 24 - System Maintenance, as shown below.

Figure 195 Menu 24: System Maintenance

Menu 24 - System Maintenance

  1. System Status
  2. System Information and Console Port Speed
  3. Log and Trace
  4. Diagnostic
  5. Backup Configuration
  6. Restore Configuration
  7. Upload Firmware
  8. Command Interpreter Mode
  9. Call Control
  10. Time and Date Setting
  11. Remote Management

34.2 System Status

The first selection, System Status, gives you information on the version of your system firmware and the status4 and statistics of the ports, as shown in the next figure. System Status is a tool that can be used to mon23itor your P-793H v2. Specifically, it gives you information on your system firmware version, number of packets sent and number of packets received.

To get to the System Status:

1 Enter number 24 to go to Menu 24 - System Maintenance.
2 In this menu, enter 1 to open System Maintenance - Status.
3 There are three commands in Menu 24.1 - System Maintenance - Status. Entering 1 drops the WAN connection, 9 resets the counters and [ESC] takes you back to the previous screen.

Figure 196 Menu 24.1: System Maintenance - Status

Menu 24.1 - System Maintenance - Status 06:28:45 Sat. Jan. 01, 2000
Node-Lnk StatusTxPktsRxPktsErrorsTx B/sRx B/sUp Time
1-ENET N/A000000:00:00
2 N/A000000:00:00
3 N/A000000:00:00
4 N/A000000:00:00
5 N/A000000:00:00
6 N/A000000:00:00
7 N/A000000:00:00
8 N/A000000:00:00
My WAN IP (from ISP): 0.0.0.0
Ethernet: WAN: Status: 100M/Full Duplex TxPkts: 4210 Line Status: Down Collisions: 0 RxPkts: 4466 Transfer Rate: 0 kbps CPU Load = 1.27% Press Command: COMMANDS: 1-Reset Counters ESC-Exit

The following table describes the fields present in Menu 24.1 - System Maintenance - Status. These fields are read-only and meant for diagnostic purposes. The upper right corner of the screen shows the time and date.

Table 133 Menu 24.1: System Maintenance - Status

FIELDDESCRIPTION
Node-LnkThis field is the remote node index number and link type (encapsulation).
StatusThis field displays Down (line is down), Up (line is up or connected) if you're using Ethernet encapsulation and Down (line is down), Up (line is up or connected), Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE encapsulation. It displays N/A if the port is not connected.
TxPktsThis is the number of packets transmitted from the P-793H v2 to the remote node.
RxPktsThis is the number of packets received by the P-793H v2 from the remote node.
ErrorsThis is the number of error packets on this connection.
Tx B/sThis field shows the transmission rate in bytes per second on this port.
Rx B/sThis field shows the reception rate in bytes per second on this port.
Up TimeThis is the total amount of time the this channel has been connected to the remote node.
My WAN IP (from ISP)This is the IP address assigned by your ISP or the static IP address you set up in menu 4.
Ethernet:This section displays information about the LAN ports.
StatusThis field displays the speed and duplex settings of the LAN ports.
CollisionsThis is the number of collisions on this port.
TxPktsThis is the number of transmitted packets on this port.
RxPktsThis is the number of received packets on this port.
WANThis section displays information about the WAN port. Note: In a point-to-2points connection this field only displays line 1 status.
Line StatusThis field displays the port speed and duplex setting if you're using Ethernet encapsulation and Down (line is down or not connected), Idle (line (ppp) idle), Dial (starting to trigger a call) or Drop (dropping a call) if you're using PPPoE encapsulation.
Transfer RateThis field shows the transmission speed in kilobits per second on this port.
CPU LoadThis field displays the percentage of CPU utilization.
You may enter 1 to reset the counters or [ESC] to return to menu 24.

34.3 System Information and Console Port Speed

This section describes your system and allows you to choose different console port speeds. To get to the System Information and Console Port Speed:

1 Enter 24 to go to Menu 24 - System Maintenance.
2 Enter 2 to open Menu 24.2 - System Information and Console Port Speed

3 From this menu you have two choices as shown in the next figure:

Figure 197 Menu 24.2: System Information and Console Port Speed

Menu 24.2 - System Information and Console Port Speed 
  1. System Information
  2. Console Port Speed

34.3.1 System Information

System Information gives you information about your system as shown below. More specifically, it gives you information on your routing protocol, Ethernet address, IP address, etc.

Figure 198 Menu 24.2.1: System Maintenance - Information

Menu 24.2.1 - System Maintenance - Information 
Name: P-793H v2   
Routing: IP ZyNOS F/W Version: V3.40(BKT.0)b1_20100115 | 01/15/2010 SHDSL Chipset Vendor: IFX Soc2U 1.1-1.6.0_001 Standard: ETSI(ANNEX_B) LAN Ethernet Address: 00:13:49:65:43:21 IP Address: 192.168.1.1 IP Mask: 255.255.255.0 DHCP: Server 

The following table describes the fields in this screen.

Table 134 Menu 24.2.1: System Maintenance - Information

FIELDDESCRIPTION
NameThis is the P-793H v2's system name + domain name assigned in menu 1. For example, System Name= xxx; Domain Name= baboo.mickey.com Name= xxx.baboo.mickey.com
RoutingRefers to the routing protocol used.
ZyNOS F/W VersionRefers to the version of ZyXEL's Network Operating System software.
SHDSL Chipset VendorRefers to the SHDSL chipset inside the P-793H v2.
StandardThis refers to the operational protocol the P-793H v2 and DSLAM (Digital Subscriber Line Access Multiplexer) are using.
LAN
Ethernet AddressRefers to the Ethernet MAC (Media Access Control) address of your P-793H v2.
IP AddressThis is the IP address of the P-793H v2 in dotted decimal notation.
IP MaskThis shows the IP mask of the P-793H v2.
DHCPThis field shows the DHCP setting of the P-793H v2.
When finished viewing, press [ESC] or [ENTER] to exit.

34.3.2 Console Port Speed

You can change the speed of the console port through Menu 24.2.2 - System Maintenance - Change Console Port Speed. Your P-793H v2 supports 9600 (default), 19200, 38400, 57600, and 115200 bps for the console port. Press [SPACE BAR] and then [ENTER] to select the desired speed in menu 24.2.2, as shown next.

Figure 199 Menu 24.2.2: System Maintenance: Change Console Port Speed

Menu 24.2.2 - System Maintenance - Change Console Port Speed Console Port Speed: 9600 

34.4 Log and Trace

There are two logging facilities in the P-793H v2. The first is the error logs and trace records that are stored locally. The second is the UNIX syslog facility for message logging.

34.4.1 Viewing Error Log

The first place you should look for clues when something goes wrong is the error/trace log. Follow the procedure below to view the local error/trace log:

1 Select option 24 from the main menu to open Menu 24 - System Maintenance.
2 From menu 24, select option 3 to open Menu 24.3 - System Maintenance - Log and Trace.
3 Select the first option from Menu 24.3 - System Maintenance - Log and Trace to display the error log in the system.

After the P-793H v2 finishes displaying, you will have the option to clear the error log.

Figure 200 Menu 24.3: System Maintenance - Log and Trace

Menu 24.3 - System Maintenance - Log and Trace 
1. View Error Log 
2. UNIX Syslog 

Examples of typical error and information messages are presented in the following figure.

Figure 201 Examples of Error and Information Messages

34 Sat Jan 1 00:00:02 2000 PP05 -WARN SNMP TRAP 3: link up  
35 Sat Jan 1 00:00:04 2000 PP00 INFO Channel 0 ok  
36 Sat Jan 1 00:00:06 2000 PP0c INFO LAN promiscuous mode <0>  
37 Sat Jan 1 00:00:06 2000 PP00 -WARN SNMP TRAP 0: cold start  
38 Sat Jan 1 00:00:06 2000 PP00 INFO main: init completed  
39 Sat Jan 1 00:00:06 2000 PP00 INFO Starting Connectivity Monitor  
40 Sat Jan 1 00:00:06 2000 PP18 INFO adjtime task pause 1 day  
41 Sat Jan 1 00:00:06 2000 PP19 INFO monitoring WAN connectivity  
42 Sat Jan 1 00:00:06 2000 PP06 WARN MPOA Link Down  
43 Sat Jan 1 04:10:22 2000 PP0c WARN netMakeChannDial: err=-3001  
44 Sat Jan 1 04:10:42 2000 PP10 WARN Last errorlog repeat 18 Times  
45 Sat Jan 1 04:10:42 2000 PP10 INFO SMT Password pass  
46 Sat Jan 1 04:10:42 2000 PP00 INFO SMT Session Begin  
47 Sat Jan 1 04:10:44 2000 PPoC WARN netMakeChannDial: err=-3001  
48 Sat Jan 1 04:46:08 2000 PPoC WARN Last errorlog repeat 216 Times  
49 Sat Jan 1 04:46:08 2000 PPoC INFO SMT Session End  
51 Sat Jan 1 04:46:59 2000 PPoC WARN netMakeChannDial: err=-3001  
52 Sat Jan 1 04:58:00 2000 PP1O WARN Last errorlog repeat 65 Times  
53 Sat Jan 1 04:58:0O 2OOO PP1O INFO SMT Password pass  
Clear Error Log (y/n): 

34.4.2 Syslog Logging

The P-793H v2 uses the syslog facility to log the CDR (Call Detail Record) and system messages to a syslog server. Syslog and accounting can be configured in Menu 24.3.2 - System Maintenance - Syslog Logging, as shown next.

ZYXEL ARMOR Z1 NWD6605 - Syslog Logging - 1
Figure 202 Menu 24.3.2: System Maintenance - UNIX Syslog

You need to configure the syslog parameters described in the following table to activate syslog then choose what you want to log.

Table 135 Menu 24.3.2: System Maintenance - UNIX Syslog

FIELDDESCRIPTION
UNIX Syslog:
ActivePress [SPACE BAR] and then [ENTER] to turn syslog on or off.
Syslog IP AddressEnter the server name or IP address of the syslog server that will log the selected categories of logs.
Log FacilityPress [SPACE BAR] and then [ENTER] to select a location. The log facility allows you to log the messages to different files in the syslog server. Refer to the documentation of your syslog program for more details.
When finished configuring this screen, press [ENTER] to confirm or [ESC] to cancel.

Your P-793H v2 sends five types of syslog messages. Some examples (not all P-793H v2 specific) of these syslog messages with their message formats are shown next:

1 CDR

CDR Message Format
SdcmdSyslogSend( SYSLOG_CDR, SYSLOG_INFO, String);
String = board xx line xx channel xx, call xx, str
board = the hardware board ID
line = the WAN ID in a board
Channel = channel ID within the WAN
call = the call reference number which starts from 1 and increments by 1 for each new call
str = C01 Outgoing Call dev xx ch xx (dev:device No. ch:channel No.)
L02 Tunnel Connected(L2TP)
C02 OutCall Connected xxxx (means connected speed) xxxx (means Remote Call Number)
L02 Call Terminated
C02 Call Terminated
Jul 19 11:19:27 192.168.102.2 ZyXEL: board 0 line 0 channel 0, call 1, C01 Outgoing Call dev=2 ch=0 40002
Jul 19 11:19:32 192.168.102.2 ZyXEL: board 0 line 0 channel 0, call 1, C02 OutCall Connected 64000 40002
Jul 19 11:20:06 192.168.102.2 ZyXEL: board 0 line 0 channel 0, call 1, C02 Call Terminated

2 Packet triggered

Packet triggered Message Format
SdcmdSyslogSend( SYSLOG_PKTRI, SYSLOG_NOTICE, String ); String = Packet trigger: Protocol=xx Data=xxxxxxxxx......x Protocol: (1:IP 2:IPX 3:IPXHC 4:BPDU 5:ATALK 6:IPNG) Data: We will send forty-eight Hex characters to the server
Jul 19 11:28:39 192.168.102.2 ZyXEL: Packet Trigger: Protocol=1, Data=4500003c100100001f010004c0a86614ca849a7b08004a5c0200010061626364 65666768696a6b6c6d6e6f7071727374 Jul 19 11:28:56 192.168.102.2 ZyXEL: Packet Trigger: Protocol=1, Data=4500002c1b0140001f06b50ec0a86614ca849a7b0427001700195b3e00000000 600220008cd40000020405b4 Jul 19 11:29:06 192.168.102.2 ZyXEL: Packet Trigger: Protocol=1, Data=45000028240140001f06ac12c0a86614ca849a7b0427001700195b451d143013 5004000077600000

3 Filter log

Filter log Message Format
SdcmdSyslogSend(SYSLOG_FILLOG, SYSLOG_NOTICE, String);
String = IP[Src=xx.xx.xx.xx Dst=xx.xx.xx.xx prot spi=xxxx dpo=xxxx] S04>R01mD
IP[...] is the packet header and S04>R01mD means filter set 4 (S) and rule 1 (R), match (m) drop (D).
Src: Source Address
Dst: Destination Address
prot: Protocol ("TCP","UDP","ICMP")
spo: Source port
dpo: Destination portMar 03 10:39:43 202.132.155.97 ZyXEL:GEN[FFFFFFnordff0080] }S05>R01mF
Mar 03 10:41:29 202.132.155.97 ZyXEL:
GEN[00a0c5f502fnord010080] }S05>R01mF
Mar 03 10:41:34 202.132.155.97 ZyXEL:
IP[Src=192.168.2.33 Dst=202.132.155.93 ICMP]} }S04>R01mF
Mar 03 11:59:20 202.132.155.97 ZyXEL:
GEN[00a0c5f502fnord010080] }S05>R01mF
Mar 03 12:00:52 202.132.155.97 ZyXEL:
GEN[FFFFFF0080] }S05>R01mF
Mar 03 12:00:57 202.132.155.97 ZyXEL:
GEN[00a0c5f502010080] }S05>R01mF
Mar 03 12:01:06 202.132.155.97 ZyXEL:
IP[Src=192.168.2.33 Dst=202.132.155.93 TCP spi=01170 dpo=00021]} }S04>R01mF

4 PPP log

PPP Log Message Format
SdcmdSyslogSend( SYSLOG_PPPLOG, SYSLOG_NOTICE, String);
String = ppp:Proto Starting / ppp:Proto Opening / ppp:Proto Closing / ppp:Proto Shutdown
Proto = LCP / ATCP / BACP / BCP / CBCP / CCP / CHAP/ PAP / IPCP / IPXCP
Jul 19 11:42:44 192.168.102.2 ZyXEL: ppp:LCP Closing
Jul 19 11:42:49 192.168.102.2 ZyXEL: ppp:IPCP Closing
Jul 19 11:42:54 192.168.102.2 ZyXEL: ppp:CCP Closing

5 Firewall log

Firewall Log Message Format
SdcmdSyslogSend(SYSLOG FIREWALL, SYSLOG_NOTICE, buf);
buf = IP[Src=xx.xx.xx.xx :spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx | prot | rule | action]
Src: Source Address
spo: Source port (empty means no source port information)
Dst: Destination Address
dpo: Destination port (empty means no destination port information)
prot: Protocol ("TCP","UDP","ICMP","IGMP","GRE","ESP")
rule: <a,b> where a means "set" number; b means "rule" number.
Action: nothing(N) block (B) forward (F)
08-01-200011:48:41Local1Notice192.168.10.10RAS: FW 172.21.1.80 :137 - >172.21.1.80 :137 |UDP|default permit:<2,0>|B
08-01-200011:48:41Local1Notice192.168.10.10RAS: FW 192.168.77.88 :520 - >192.168.77.88 :520 |UDP|default permit:<2,0>|B
08-01-200011:48:39Local1Notice192.168.10.10RAS: FW 172.21.1.50 - >172.21.1.50 |IGMP<2>|default permit:<2,0>|B
08-01-200011:48:39Local1Notice192.168.10.10RAS: FW 172.21.1.25 - >172.21.1.25 |IGMP<2>|default permit:<2,0>|B

34.5 Diagnostic

The diagnostic facility allows you to test the different aspects of your P-793H v2 to determine if it is working properly. Menu 24.4 allows you to choose among various

types of diagnostic tests to evaluate your system, as shown next. Not all fields are available on all models.

Follow the procedure below to get to Menu 24.4 - System Maintenance - Diagnostic.

1 From the main menu, select option 24 to open Menu 24 - System Maintenance.
2 From this menu, select option 4. Diagnostic. This will open Menu 24.4 - System Maintenance - Diagnostic.

Figure 203 Menu 24.4: System Maintenance - Diagnostic

Menu 24.4 - System Maintenance - Diagnostic  
xDSL System  
1. Reset xDSL 21. Reboot System  
22. Command Mode  
TCP/IP  
12. Ping Host  
Enter Menu Selection Number:  
Host IP Address= N/A 

The following table describes the labels in this screen.

Table 136 Menu 24.4: System Maintenance - Diagnostic

FIELDDESCRIPTION
Reset xDSLEnter 1 to reset the DSL connection on the WAN port.
Ping HostEnter 12 to ping any machine (with an IP address) on your LAN or WAN. Enter its IP address in the Host IP Address field below.
Reboot SystemEnter 11 to reboot the P-793H v2.
Command ModeEnter 22 to go to the Command Interpreter (CI) for further diagnosis. You can also enter the CI using menu 24.8.
Host IP AddressIf you entered 1in the Enter Menu Selection Number field, then enter the IP address of the computer you want to ping in this field.
Enter the number of the selection you would like to perform or press [ESC] to cancel.

Firmware and Configuration File Maintenance

This chapter tells you how to back up and restore your configuration file as well as upload new firmware and a new configuration file.

35.1 Introduction

Use the instructions in this chapter to change the P-793H v2's configuration file or upgrade its firmware. After you configure your P-793H v2, you can backup the configuration file to a computer. That way if you later misconfigure the P-793H v2, you can upload the backed up configuration file to return to your previous settings. You can alternately upload the factory default configuration file if you want to return the P-793H v2 to the original default settings. The firmware determines the P-793H v2's available features and functionality. You can download new firmware releases from your nearest ZyXEL FTP site to use to upgrade your P-793H v2's performance.

35.2 Filename Conventions

The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password, DHCP Setup, TCP/IP Setup, etc. It arrives from ZyXEL with a "rom" filename extension. Once you have customized the P-793H v2's settings, they can be saved back to your computer under a filename of your choosing.

ZyNOS (ZyXEL Network Operating System sometimes referred to as the "ras" file) is the system firmware and has a "bin" filename extension. With many FTP and TFTP clients, the filenames are similar to those seen next.

ftp> put firmware.bin ras
This is a sample FTP session showing the transfer of the computer file "firmware.bin" to the P-793H v2.

ftp> get rom-0 config.cfg

This is a sample FTP session saving the current configuration to the computer file "config.cfg".

If your (T)FTP client does not allow you to have a destination filename different than the source, you will need to rename them as the P-793H v2 only recognizes "rom-0" and "ras". Be sure you keep unaltered copies of both files for later use.

The following table is a summary. Please note that the internal filename refers to the filename on the P-793H v2 and the external filename refers to the filename not on the P-793H v2, that is, on your computer, local network or FTP site and so the name (but not the extension) may vary. After uploading new firmware, see the ZyNOS F/W Version field in Menu 24.2.1 - System Maintenance -

Information to confirm that you have uploaded the correct firmware version. The AT command is the command you enter after you press "y" when prompted in the SMT menu to go into debug mode.

Table 137 Filename Conventions

FILE TYPEINTERNA L NAMEEXTERNAL NAMEDESCRIPTIO N
Configuration FileRom-0This is the configuration filename on the P- 793H v2. Uploading the rom-0 file replaces the entire ROM file system, including your P- 793H v2 configurations, system-related data (including the default password), the error log and the trace log.*.rom
FirmwareRasThis is the generic name for the ZyNOS firmware on the P-793H v2.*.bin

35.3 Backup Configuration

Note: The P-793H v2 displays different messages explaining different ways to backup, restore and upload files in menus 24.5, 24.6, 24.7.1 and 24.7.2 depending on whether you use the console port or Telnet.

Option 5 from Menu 24 - System Maintenance allows you to backup the current P-793H v2 configuration to your computer. Backup is highly recommended once your P-793H v2 is functioning properly. FTP is the preferred method for backing up your current configuration to your computer since it is faster. You can also perform backup and restore using menu 24 through the console port. Any serial communications program should work fine; however, you must use Xmodem protocol to perform the download/upload and you don't have to rename the files.

Please note that terms "download" and "upload" are relative to the computer. Download means to transfer from the P-793H v2 to the computer, while upload means from your computer to the P-793H v2.

35.3.1 Backup Configuration

Follow the instructions as shown in the next screen.

Figure 204 Menu 24.5: Backup Configuration

To transfer the configuration file to your computer, follow the procedure below:

  1. Launch the FTP client on your computer.
  2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  3. Locate the 'rom-0' file.
  4. Type 'get rom-0' to back up the current system configuration to your computer.

For details on FTP commands, please consult the documentation of your FTP client program. For details on backup using TFTP (note that you must remain

in this menu to back up using TFTP), please see your user manual.

35.3.2 Using the FTP Command from the Command Line

1 Launch the FTP client on your computer.
2 Enter "open", followed by a space and the IP address of your P-793H v2.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is "1234").
5 Enter "bin" to set transfer mode to binary.
6 Use "get" to transfer files from the P-793H v2 to the computer, for example, "get rom-0 config.rom" transfers the configuration file on the P-793H v2 to your computer and renames it "config.rom". See earlier in this chapter for more information on filename conventions.
7 Enter "quit" to exit the ftp prompt.

35.3.3 Example of FTP Commands from the Command Line

Figure 205 FTP Session Example

331 Enter PASS command  
Password:  
230 Logged in  
ftp> bin  
200 Type I OK  
ftp> get rom-0 zyxel.rom  
200 Port command okay  
150 Opening data connection for STOR ras  
226 File received OK  
ftp: 16384 bytes sent in 1.10Seconds 297.89Kbytes/sec.  
ftp> quit 

35.3.4 GUI-based FTP Clients

The following table describes some of the commands that you may see in GUI-based FTP clients.

Table 138 General Commands for GUI-based FTP Clients

COMMANDDESCRIPTION
Host AddressEnter the address of the host server.
Login TypeAnonymous. This is when a user I.D. and password is automatically supplied to the server for anonymous access. Anonymous logins will work only if your ISP or service administrator has enabled this option. Normal. The server requires a unique User ID and Password to login.
Transfer TypeTransfer files in either ASCII (plain text format) or in binary mode. Configuration and firmware files should be transferred in binary mode
Initial Remote DirectorySpecify the default remote directory (path).
Initial Local DirectorySpecify the default local directory (path).

35.3.5 File Maintenance Over WAN

TFTP, FTP and Telnet over the WAN will not work when:

1 The firewall is active (turn the firewall off in menu 21.2 or create a firewall rule to allow access from the WAN).
2 You have disabled Telnet service in menu 24.11.

3 You have applied a filter in menu 3.1 (LAN) or in menu 11.5 (WAN) to block Telnet service.
4 The IP you entered in the Secured Client IP field in menu 24.11 does not match the client IP. If it does not match, the P-793H v2 will disconnect the Telnet session immediately.
5 You have an SMT console session running.

35.3.6 Backup Configuration Using TFTP

The P-793H v2 supports the up/downloading of the firmware and the configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended.

To use TFTP, your computer must have both telnet and TFTP clients. To backup the configuration file, follow the procedure shown next.

1 Use telnet from your computer to connect to the P-793H v2 and log in. Because TFTP does not have any security checks, the P-793H v2 records the IP address of the telnet client and accepts TFTP requests only from this address.
2 Put the SMT in command interpreter (CI) mode by entering 8 in Menu 24 - System Maintenance.
3 Enter command "sys stdio 0" to disable the SMT timeout, so the TFTP transfer will not be interrupted. Enter command "sys stdio 5" to restore the five-minute SMT timeout (default) when the file transfer is complete.
4 Launch the TFTP client on your computer and connect to the P-793H v2. Set the transfer mode to binary before starting data transfer.
5 Use the TFTP client (see the example below) to transfer files between the P-793H v2 and the computer. The file name for the configuration file is "rom-0" (rom-zero, not capital o).

Note that the telnet connection must be active and the SMT in CI mode before and during the TFTP transfer. For details on TFTP commands (see following example), please consult the documentation of your TFTP client program. For UNIX, use "get" to transfer from the P-793H v2 to the computer and "binary" to set binary transfer mode.

35.3.7 TFTP Command Example

The following is an example TFTP command:

tftp [-i] host get rom-0 config.rom

Where "i" specifies binary image transfer mode (use this mode when transferring binary files), "host" is the P-793H v2 IP address, "get" transfers the file source on the P-793H v2 (rom-0, name of the configuration file on the P-793H v2) to the file destination on the computer and renames it config.rom.

35.3.8 GUI-based TFTP Clients

The following table describes some of the fields that you may see in GUI-based TFTP clients.

Table 139 General Commands for GUI-based TFTP Clients

COMMANDDESCRIPTION
HostEnter the IP address of the P-793H v2. 192.168.1.1 is the P-793H v2's default IP address when shipped.
Send/FetchUse “Send” to upload the file to the P-793H v2 and “Fetch” to back up the file on your computer.
Local FileEnter the path and name of the firmware file (*.bin extension) or configuration file (*.rom extension) on your computer.
Remote FileThis is the filename on the P-793H v2. The filename for the firmware is "ras" and for the configuration file, is "rom-0".
BinaryTransfer the file in binary mode.
AbortStop transfer of the file.

Refer to Section 35.3.5 on page 390 to read about configurations that disallow TFTP and FTP over WAN.

35.3.9 Backup Via Console Port

Back up configuration via console port by following the HyperTerminal procedure shown next. Procedures using other serial communications programs should be similar.

1 Display menu 24.5 and enter "y" at the following screen.

Figure 206 System Maintenance: Backup Configuration

Ready to backup Configuration via Xmodem.

Do you want to continue (y/n):

2 The following screen indicates that the Xmodem download has started.

Figure 207 System Maintenance: Starting Xmodem Download Screen

You can enter ctrl-x to terminate operation any time. Starting XMODEM download... 

3 Run the HyperTerminal program by clicking Transfer, then Receive File as shown in the following screen.

ZYXEL ARMOR Z1 NWD6605 - Backup Via Console Port - 1
Figure 208 Backup Configuration Example

Type a location for storing the configuration file or click Browse to look for one.

Choose the Xmodem protocol.

Then click Receive.

4 After a successful backup you will see the following screen. Press any key to return to the SMT menu.

Figure 209 Successful Backup Confirmation Screen

** Backup Configuration completed. OK.  
```bash
** Hit any key to continue. 

35.4 Restore Configuration

This section shows you how to restore a previously saved configuration. Note that this function erases the current configuration before restoring a previous back up configuration; please do not attempt to restore unless you have a backup configuration file stored on disk.

FTP is the preferred method for restoring your current computer configuration to your P-793H v2 since FTP is faster. Please note that you must wait for the system to automatically restart after the file transfer is complete.

Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE YOUR P-793H v2. When the Restore Configuration process is complete, the P-793H v2 will automatically restart.

35.4.1 Restore Using FTP

For details about backup using (T)FTP please refer to earlier sections on FTP and TFTP file upload in this chapter.

Figure 210 Menu 24.6:Restore Configuration

To transfer the firmware and the configuration file, follow the procedure below:

  1. Launch the FTP client on your computer.
  2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  3. Type "put backupfilename rom-0" where backupfilename is the name of your backup configuration file on your computer and rom-0 is the remote file name on the system. This restores the configuration to your system.
  4. The system reboots automatically after a successful file transfer.

For details on FTP commands, please consult the documentation of your FTP client program. For details on restoring using TFTP (note that you must remain on this menu to restore using TFTP), please see your user manual.

1 Launch the FTP client on your computer.
2 Enter "open", followed by a space and the IP address of your P-793H v2.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is "1234").
5 Enter "bin" to set transfer mode to binary.
6 Find the "rom" file (on your computer) that you want to restore to your P-793H v2.
7 Use "put" to transfer files from the P-793H v2 to the computer, for example, "put config.rom rom-0" transfers the configuration file "config.rom" on your computer to the P-793H v2. See earlier in this chapter for more information on filename conventions.

8 Enter "quit" to exit the ftp prompt. The P-793H v2 will automatically restart after a successful restore process.

35.4.2 Restore Using FTP Session Example

Figure 211 Restore Using FTP Session Example

ftp> put config.rom rom-0  
200 Port command okay  
150 Opening data connection for STOR rom-0  
226 File received OK  
221 Goodbye for writing flash  
ftp: 16384 bytes sent in 0.06Seconds 273.07Kbytes/sec.  
ftp>quit 

Refer to Section 35.3.5 on page 390 to read about configurations that disallow FTP and FTP over WAN.

35.4.3 Restore Via Console Port

Restore configuration via console port by following the HyperTerminal procedure shown next. Procedures using other serial communications programs should be similar.

1 Display menu 24.6 and enter "y" at the following screen.

Figure 212 System Maintenance:Restore Configuration

Ready to restore Configuration via Xmodem. Do you want to continue (y/n): 

2 The following screen indicates that the Xmodem download has started.

Figure 213 System Maintenance: Starting Xmodem Download Screen

Starting XMODEM download (CRC mode) ...CCCCCCCCCC 

3 Run the HyperTerminal program by clicking Transfer, then Send File as shown in the following screen.

Figure 214 Restore Configuration Example

ZYXEL ARMOR Z1 NWD6605 - Restore Via Console Port - 1
Figure 215 Successful Restoration Confirmation Screen

4 After a successful restoration you will see the following screen. Press any key to restart the P-793H v2 and return to the SMT menu.

Save to ROM

Hit any key to start system reboot.

35.5 Uploading Firmware and Configuration Files

This section shows you how to upload firmware and configuration files. You can upload configuration files by following the procedure in Section 35.4 on page 393 or by following the instructions in Menu 24.7.2 - System Maintenance - Upload System Configuration File (for console port).

Do not interrupt the file transfer process as this may PERMANENTLY DAMAGE YOUR P-793H v2.

35.5.1 Firmware File Upload

FTP is the preferred method for uploading the firmware and configuration. To use this feature, your computer must have an FTP client.

When you telnet into the P-793H v2, you will see the following screens for uploading firmware and the configuration file using FTP.

Figure 216 Menu 24.7.1: System Maintenance - Upload System Firmware

Menu 24.7.1 - System Maintenance - Upload System Firmware

To upload the system firmware, follow the procedure below:

  1. Launch the FTP client on your workstation.
  2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  3. Type "put firmwarefilename ras" where "firmwarefilename" is the name of your firmware upgrade file on your workstation and "ras" is the remote file name on the system.
  4. The system reboots automatically after a successful firmware upload.

For details on FTP commands, please consult the documentation of your FTP client program. For details on uploading system firmware using TFTP (note that you must remain on this menu to upload system firmware using TFTP), please see your manual.

35.5.2 Configuration File Upload

You see the following screen when you telnet into menu 24.7.2.

Figure 217 Menu 24.7.2: System Maintenance - Upload System Configuration File

Menu 24.7.2 - System Maintenance - Upload System Configuration File

To upload the system configuration file, follow the procedure below:

  1. Launch the FTP client on your workstation.
  2. Type "open" and the IP address of your system. Then type "root" and SMT password as requested.
  3. Type "put configurationfilename rom-0" where "configurationfilename" is the name of your system configuration file on your workstation, which will be transferred to the "rom-0" file on the system.
  4. The system reboots automatically after the upload system configuration file process is complete.

For details on FTP commands, please consult the documentation of your FTP client program. For details on uploading system firmware using TFTP (note that you must remain on this menu to upload system firmware using TFTP), please see your manual.

To upload the firmware and the configuration file, follow these examples

35.5.3 FTP File Upload Command from the DOS Prompt Example

1 Launch the FTP client on your computer.
2 Enter "open", followed by a space and the IP address of your P-793H v2.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is "1234").
5 Enter "bin" to set transfer mode to binary.
6 Use "put" to transfer files from the computer to the P-793H v2, for example, "put firmware.bin ras" transfers the firmware on your computer (firmware.bin) to the P-793H v2 and renames it "ras". Similarly, "put config.rom rom-0" transfers the configuration file on your computer (config.rom) to the P-793H v2 and renames it "rom-0". Likewise "get rom-0 config.rom" transfers the configuration file on the P-793H v2 to your computer and renames it "config.rom." See earlier in this chapter for more information on filename conventions.
7 Enter "quit" to exit the ftp prompt.

35.5.4 FTP Session Example of Firmware File Upload

Figure 218 FTP Session Example of Firmware File Upload

331 Enter PASS command  
Password:  
230 Logged in  
ftp> bin  
200 Type I OK  
ftp> put firmware.bin ras  
200 Port command okay  
150 Opening data connection for STOR ras  
226 File received OK  
ftp: 1103936 bytes sent in 1.10Seconds 297.89Kbytes/sec.  
ftp> quit 

More commands (found in GUI-based FTP clients) are listed earlier in this chapter.

Refer to Section 35.3.5 on page 390 to read about configurations that disallow TFTP and FTP over WAN.

35.5.5 TFTP File Upload

The P-793H v2 also supports the uploading of firmware files using TFTP (Trivial File Transfer Protocol) over LAN. Although TFTP should work over WAN as well, it is not recommended.

To use TFTP, your computer must have both telnet and TFTP clients. To transfer the firmware and the configuration file, follow the procedure shown next.

1 Use telnet from your computer to connect to the P-793H v2 and log in. Because TFTP does not have any security checks, the P-793H v2 records the IP address of the telnet client and accepts TFTP requests only from this address.
2 Put the SMT in command interpreter (CI) mode by entering 8 in Menu 24 - System Maintenance.
3 Enter the command "sys stdio 0" to disable the console timeout, so the TFTP transfer will not be interrupted. Enter "command sys stdio 5" to restore the five-minute console timeout (default) when the file transfer is complete.
4 Launch the TFTP client on your computer and connect to the P-793H v2. Set the transfer mode to binary before starting data transfer.
5 Use the TFTP client (see the example below) to transfer files between the P-793H v2 and the computer. The file name for the firmware is "ras".

Note that the telnet connection must be active and the P-793H v2 in CI mode before and during the TFTP transfer. For details on TFTP commands (see following example), please consult the documentation of your TFTP client program. For UNIX, use "get" to transfer from the P-793H v2 to the computer, "put" the other way around, and "binary" to set binary transfer mode.

35.5.6 TFTP Upload Command Example

The following is an example TFTP command:

tftp [-i] host put firmware.bin ras

Where "i" specifies binary image transfer mode (use this mode when transferring binary files), "host" is the P-793H v2's IP address, "put" transfers the file source on the computer (firmware.bin - name of the firmware on the computer) to the file destination on the remote host (ras - name of the firmware on the P-793H v2).

Commands that you may see in GUI-based TFTP clients are listed earlier in this chapter.

35.5.7 Uploading Via Console Port

FTP or TFTP are the preferred methods for uploading firmware to your P-793H v2. However, in the event of your network being down, uploading files is only possible with a direct connection to your P-793H v2 via the console port. Uploading files via the console port under normal conditions is not recommended since FTP or TFTP is faster. Any serial communications program should work fine; however, you must use the Xmodem protocol to perform the download/upload.

35.5.8 Uploading Firmware File Via Console Port

1 Select 1 from Menu 24.7 - System Maintenance - Upload Firmware to display Menu 24.7.1 - System Maintenance - Upload System Firmware, and then follow the instructions as shown in the following screen.

ZYXEL ARMOR Z1 NWD6605 - Uploading Firmware File Via Console Port - 1
Figure 219 Menu 24.7.1 As Seen Using the Console Port

2 After the "Starting Xmodem upload" message appears, activate the Xmodem protocol on your computer. Follow the procedure as shown previously for the HyperTerminal program. The procedure for other serial communications programs should be similar.

35.5.9 Example Xmodem Firmware Upload Using HyperTerminal

Click Transfer, then Send File to display the following screen.

Figure 220 Example Xmodem Upload

ZYXEL ARMOR Z1 NWD6605 - Example Xmodem Firmware Upload Using HyperTerminal - 1
Figure 221 Menu 24.7.2 As Seen Using the Console Port

After the firmware upload process has completed, the P-793H v2 will automatically restart.

35.5.10装载器配置及安装配置

1 Select 2 from Menu 24.7 - System Maintenance - Upload Firmware to display Menu 24.7.2 - System Maintenance - Upload System Configuration File. Follow the instructions as shown in the next screen.

Menu 24.7.2 - System Maintenance - Upload System Configuration File

To upload system configuration file:

  1. Enter "y" at the prompt below to go into debug mode.
  2. Enter "at1c" after "Enter Debug Mode" message.
  3. Wait for "Starting XMODEM upload" message before activating Xmodem upload on your terminal.
  4. After successful firmware upload, enter "atgo" to restart the system.

Warning:

  1. Proceeding with the upload will erase the current configuration file.
  2. The system's console port speed (Menu 24.2.2) may change when it is restarted; please adjust your terminal's speed accordingly. The password may change (menu 23), also.
  3. When uploading the DEFAULT configuration file, the console port speed will be reset to 9600 bps and the password to "1234".

Do You Wish To Proceed: (Y/N)

2 After the "Starting Xmodem upload" message appears, activate the Xmodem protocol on your computer. Follow the procedure as shown previously for the HyperTerminal program. The procedure for other serial communications programs should be similar.
3 Enter "atgo" to restart the P-793H v2.

35.5.11 Example Xmodem Configuration Upload Using HyperTerminal

Click Transfer, then Send File to display the following screen.

ZYXEL ARMOR Z1 NWD6605 - Example Xmodem Configuration Upload Using HyperTerminal - 1
Figure 222 Example Xmodem Upload

After the configuration upload process has completed, restart the P-793H v2 by entering "atgo".

This chapter leads you through SMT menus 24.8 to 24.11.

36.1 Command Interpreter Mode

The Command Interpreter (CI) is a part of the main router firmware. The CI provides much of the same functionality as the SMT, while adding some low-level setup and diagnostic functions. Enter the CI from the SMT by selecting menu 24.8. Access can be by Telnet or by a connection to the console port, although some commands are only available with a console connection. See the included disk or zyxel.com for more detailed information on CI commands. Enter 8 from Menu 24 - System Maintenance.

Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable.

Figure 223 Command Mode in Menu 24

  1. System Status
  2. System Information and Console Port Speed
  3. Log and Trace
  4. Diagnostic
  5. Backup Configuration
  6. Restore Configuration
  7. Upload Firmware
  8. Command Interpreter Mode
  9. Call Control
  10. Time and Date Setting
  11. Remote Management

36.1.1 Command Syntax

The command keywords are in courier new font.

Enter the command keywords exactly as shown, do not abbreviate.

The required fields in a command are enclosed in angle brackets .

The optional fields in a command are enclosed in square brackets [ ].

The |symbol means "or".

For example,

sys filter netbios config

means that you must specify the type of netbios filter and whether to turn it on or off.

36.1.2 Command Usage

A list of commands can be found by typing help or ? at the command prompt. Always type the full command. Type exit to return to the SMT main menu when finished.

Figure 224 Valid Commands

Copyright (c) 1994 - 2006 ZyXEL Communications Corp.  
P-793H> ?  
Valid commands are:  
sys exit device ether  
wan poe xsd1 aux  
config ip ipsec ppp  
bridge hdap bm lan  
P-793H> 

36.2 Call Control Support

The P-793H v2 provides a call control function for budget management. Please note that this menu is only applicable when Encapsulation is set to PPPoE or PPPoA in menu 4 or menu 11.1.

The budget management function allows you to set a limit on the total outgoing call time of the P-793H v2 within certain times. When the total outgoing call time exceeds the limit, the current call will be dropped and any future outgoing calls will be blocked.

Call history chronicles preceding incoming and outgoing calls.

To access the call control menu, select option 9 in menu 24 to go to Menu 24.9 - System Maintenance - Call Control, as shown in the next table.

Figure 225 Menu 24.9: System Maintenance - Call Control

Menu 24.9 - System Maintenance - Call Control

  1. Budget Management

36.2.1 Budget Management

Menu 24.9.1 shows the budget management statistics for outgoing calls. Enter 1 from Menu 24.9 - System Maintenance - Call Control to bring up the following menu. Not all fields are available on all models.

Figure 226 Menu 24.9.1 - Budget Management

Menu 24.9.1 - Budget Management
Remote NodeConnection Time/Total BudgetElapsed Time/Total Period
1.MyISPNo BudgetNo Budget
2.-----------
3.-----------
4.-----------
5.-----------
6.-----------
7.-----------
8.-----------

The total budget is the time limit on the accumulated time for outgoing calls to a remote node. When this limit is reached, the call will be dropped and further outgoing calls to that remote node will be blocked. After each period, the total budget is reset. The default for the total budget is 0 minutes and the period is 0 hours, meaning no budget control. You can reset the accumulated connection time in this menu by entering the index of a remote node. Enter 0 to update the screen. The budget and the reset period can be configured in menu 11.1 for the remote node.

Table 140 Menu 24.9.1 - Budget Management

FIELDDESCRIPTIONEXAMPLE
Remote NodeEnter the index number of the remote node you want to reset (just one in this case)1
Connection Time/Total BudgetThis is the total connection time that has gone by (within the allocated budget that you set in menu 11.1).5/10 means that 5 minutes out of a total allocation of 10 minutes have lapsed.
Elapsed Time/Total PeriodThe period is the time cycle in hours that the allocation budget is reset (see menu 11.1.) The elapsed time is the time used up within this period.0.5/1 means that 30 minutes out of the 1-hour time period has lapsed.
Enter “0” to update the screen or press [ESC] to return to the previous screen.

36.3 Time and Date Setting

The P-793H v2's Real Time Chip (RTC) keeps track of the time and date. There is also a software mechanism to set the time manually or get the current time and date from an external server when you turn on your P-793H v2. Menu 24.10 allows you to update the time and date settings of your P-793H v2. The real time is then displayed in the P-793H v2 error logs and firewall logs.

Select menu 24 in the main menu to open Menu 24 - System Maintenance, as shown next.

ZYXEL ARMOR Z1 NWD6605 - Time and Date Setting - 1
Figure 227 Menu 24: System Maintenance

Enter 10 to go to Menu 24.10 - System Maintenance - Time and Date Setting to update the time and date settings of your P-793H v2 as shown in the following screen.

Figure 228 Menu 24.10: System Maintenance - Time and Date Setting

Menu 24.10 - System Maintenance - Time and Date Setting  
Time Protocol= None  
Time Server Address= N/A  
Current Time: 06 : 43 : 17  
New Time (hh:mm:ss): 06 : 43 : 00  
Current Date: 2000 - 01 - 01  
New Date (yyyy-mm-dd): 2000 - 01 - 01  
Time Zone= (GMT+0100) Brussels, Copenhagen, Madrid, Paris  
Daylight Saving= No  
Start Date (mm-nth-week-hr): Jan. - 1st - Sun.(02) - 00  
End Date (mm-nth-week-hr): Jan. - 1st - Sun.(02) - 00 

The following table describes the fields in this screen.

Table 141 Menu 24.10: System Maintenance - Time and Date Setting

FIELDDESCRIPTION
Time ProtocolEnter the time service protocol that your timeserver uses. Not all time servers support all protocols, so you may have to check with your ISP/ network administrator or use trial and error to find a protocol that works. The main differences between them are the format.Daytime (RFC 867) format is day/month/year/time zone of the server.Time (RFC-868) format displays a 4-byte integer giving the total number of seconds since 1970/1/1 at 0:0:0.The default, NTP (RFC-1305), is similar to Time (RFC-868).Select None to enter the new time and new date manually.
Time Server AddressEnter the IP address or domain name of your timeserver. Check with your ISP/network administrator if you are unsure of this information.The default is tick.sttdtime.gov.tw
Current TimeThis field displays an updated time only when you reenter this menu.
New Time (hh:mm:ss)Enter the new time in hour, minute and second format. This field is available when you select None in the Time Protocol field.
Current DateThis field displays an updated date only when you reenter this menu.
New Date (yyyy-mm-dd)Enter the new date in year, month and day format. This field is available when you select None in the Time Protocol field.
Time ZonePress [SPACE BAR] and then [ENTER] to set the time difference between your time zone and Greenwich Mean Time (GMT).
Daylight SavingDaylight Saving Time is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daylight time in the evenings. If you use daylight savings time, then choose Yes.
Start Date (mm-nth-week-hr)Configure the day and time when Daylight Saving Time starts if you selected Yes in the Daylight Saving field. The hr field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the first Sunday of April. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Apr., 1st, Sun. and type 02 in the hr field. Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Mar., Last, Sun. The time you type in the hr field depends on your time zone. In Germany for instance, you would type 02 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
End Date (mm-nth-week-hr)Configure the day and time when Daylight Saving Time ends if you selected Yes in the Daylight Saving field. The hr field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time ends in the United States on the last Sunday of October. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Oct., Last, Sun. and type 02 in the hr field. Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select Oct., Last, Sun. The time you type in the hr field depends on your time zone. In Germany for instance, you would type 02 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1).
Once you have filled in this menu, press [ENTER] at the message "Press ENTER to Confirm or ESC to Cancel" to save your configuration, or press [ESC] to cancel.

36.4 Remote Management

To disable remote management of a service, select Disable in the corresponding Server Access field. Enter 11 from menu 24 to bring up Menu 24.11 - Remote Management Control.

Figure 229 Menu 24.11 - Remote Management Control

Menu 24.11 - Remote Management Control  
TELNET Server:  
Server Port = 23 Server Access = ALL  
Secured Client IP = 0.0.0.0  
FTP Server:  
Server Port = 21 Server Access = ALL  
Secured Client IP = 0.0.0.0  
HTTP Server:  
Server Port = 80 Server Access = ALL  
Secured Client IP = 0.0.0.0 

The following table describes the fields in this screen.

Table 142 Menu 24.11 - Remote Management Control

FIELDDESCRIPTION
TELNET Server FTP Server HTTP ServerEach of these read-only labels denotes a service that you may use to remotely manage the P-793H v2.
Server PortThis field shows the port number for the service or protocol. You may change the port number if needed, but you must use the same port number to access the P-793H v2.
Server AccessSelect the access interface (if any) by pressing [SPACE BAR], then [ENTER] to choose from: LAN only, WAN only, ALL or Disable.
Secured Client IPThe default 0.0.0.0 allows any client to use this service to remotely manage the P-793H v2. Enter an IP address to restrict access to a client with a matching IP address.
Once you have filled in this menu, press [ENTER] at the message "Press ENTER to Confirm or ESC to Cancel" to save your configuration, or press [ESC] to cancel.

36.4.1 Remote Management Limitations

Remote management over LAN or WAN will not work when:

1 A filter in menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service.

2 You have disabled that service in menu 24.11.
3 The IP address in the Secure Client IP field (menu 24.11) does not match the client IP address. If it does not match, the P-793H v2 will disconnect the session immediately.
4 There is an SMT console session running.
5 There is already another remote management session with an equal or higher priority running. You may only have one remote management session running at one time.
6 There is a firewall rule that blocks it.

Use this menu to look at and configure the schedule sets in the P-793H v2.

37.1 Schedule Set Overview

Call scheduling (applicable for PPPoE encapsulation only) allows the P-793H v2 to manage a remote node and dictate when a remote node should be called and for how long. This feature is similar to the scheduler that lets you specify a time period to record a television program in a VCR or TiVo.

37.2 Schedule Setup

This menu is only applicable if your Internet connection uses PPPoE encapsulation. Use this menu to look at the schedule sets in the P-793H v2. To open this menu, enter 26 in the main menu.

ZYXEL ARMOR Z1 NWD6605 - Schedule Setup - 1
Figure 230 Menu 26: Schedule Setup

The following table describes the labels in this menu.

Table 143 Menu 26: Schedule Setup

FIELDDESCRIPTION
1-12This field shows the beginning of the name of each schedule set. Lower numbered sets take precedence over higher numbered sets. This avoids scheduling conflicts. For example, if sets 1, 2, 3 and 4 in are applied in the remote node, then set 1 takes precedence over set 2, 3 and 4.
Enter Schedule Set Number to ConfigureIf you want to configure a schedule set, enter the number of the static route in this field, enter the name in the Edit Name field, and press [ENTER]. Menu 26.1 appears. If you want to delete a schedule set, enter the number of the static route in this field, leave the name blank in the Edit Name field, and press [ENTER].
Edit NameEnter the name of the schedule set you want to configure, or leave this field blank to delete the specified schedule set.

37.3 Schedule Set Setup

This menu is only applicable if your Internet connection uses PPPoE encapsulation. Use this menu to configure the schedule sets in the P-793H v2. To open this menu, enter the number of the schedule set in the Enter Schedule Set Number to Configure field, enter the name of the schedule set in the Edit Name field, and press [ENTER] in menu 26.

Figure 231 Menu 26.1: Schedule Set Setup

Menu 26.1 Schedule Set Setup  
Active= Yes  
Start Date(yyyy-mm-dd) = 2000 - 01 - 01  
How Often= Once  
Once:  
    Date(yyyy-mm-dd) = 2000 - 01 - 01  
Weekdays:  
    Sunday= N/A  
    Monday= N/A  
    Tuesday= N/A  
    Wednesday= N/A  
    Thursday= N/A  
    Friday= N/A  
    Saturday= N/A  
Start Time(hh:mm) = 00 : 00  
Duration(hh:mm) = 00 : 00  
Action= Forced On 

The following table describes the labels in this menu.

Table 144 Menu 26.1: Schedule Set Setup

FIELDDESCRIPTION
ActivePress [SPACE BAR] to select Yes or No. Choose Yes and press [ENTER] to activate the schedule set.
Start DateShould this schedule set recur weekly or be used just once only? Press the [SPACE BAR] and then [ENTER] to select Once or Weekly. Both these options are mutually exclusive. If Once is selected, then all weekday settings are N/A. When Once is selected, the schedule rule deletes automatically after the scheduled time elapses.
How OftenEnter the start date when you wish the set to take effect in year - month-date format. Valid dates are from the present to 2036-February-5.
Once
DateIf you selected Once in the How Often field above, then enter the date the set should activate here in year-month-date format.
WeekdaysIf you selected Weekly in the How Often field above, then select the day(s) when the set should activate (and recur) by going to that day(s) and pressing [SPACE BAR] to select Yes, then press [ENTER].
Start TimeEnter the start time when you wish the schedule set to take effect in hour-minute format.
DurationEnter the maximum length of time this connection is allowed in hour-minute format.
ActionForced On means that the connection is maintained whether or not there is a demand call on the line and will persist for the time period specified in the Duration field. Forced Down means that the connection is blocked whether or not there is a demand call on the line. Enable Dial-On-Demand means that this schedule permits a demand call on the line. Disable Dial-On-Demand means that this schedule prevents a demand call on the line.

Troubleshooting

This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories.

  • Power, Hardware Connections, and LEDs
  • P-793H v2 Access and Login
  • Internet Access
    Network Connections

38.1 Power, Hardware Connections, and LEDs

The P-793H v2 does not turn on. None of the LEDs turn on.

1 Make sure the P-793H v2 is turned on.
2 Make sure you are using the power adaptor or cord included with the P-793H v2.
3 Make sure the power adaptor or cord is connected to the P-793H v2 and plugged in to an appropriate power source. Make sure the power source is turned on.
4 Turn the P-793H v2 off and on.
5 If the problem continues, contact the vendor.

One of the LEDs does not behave as expected.

1 Make sure you understand the normal behavior of the LED. See Section 1.4 on page 40.
2 Check the hardware connections.

3 Inspect your cables for damage. Contact the vendor to replace any damaged cables.
4 Turn the P-793H v2 off and on.
5 If the problem continues, contact the vendor.

38.2 P-793H v2 Access and Login

I forgot the IP address for the P-793H v2.

1 The default IP address is 192.168.1.1.
2 If you changed the IP address and have forgotten it, you might get the IP address of the P-793H v2 by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig. The IP address of the Default Gateway might be the IP address of the P-793H v2 (it depends on the network), so enter this IP address in your Internet browser.
3 If this does not work, you have to reset the device to its factory defaults. See Section 1.5 on page 41.

I forgot the password.

1 The default admin password is 1234, and the default user password is user.
2 If this does not work, you have to reset the device to its factory defaults. See Section 1.5 on page 41.

I cannot see or access the Login screen in the web configurator.

1 Make sure you are using the correct IP address.

  • The default IP address is 192.168.1.1.
  • If you changed the IP address (Section 7.2 on page 103), use the new IP address.

  • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the P-793H v2.

2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide.
3 Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java enabled. See Appendix D on page 453.

  • If there is a DHCP server on your network, make sure your computer is using a dynamic IP address. See Appendix C on page 429. Your P-793H v2 is a DHCP server by default.
  • If there is no DHCP server on your network, make sure your computer's IP address is in the same subnet as the P-793H v2. See Appendix C on page 429.

4 Reset the device to its factory defaults, and try to access the P-793H v2 with the default IP address. See Section 1.5 on page 41.
5 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions.

Advanced Suggestions

  • Try to access the P-793H v2 using another service, such as Telnet. If you can access the P-793H v2, check the remote management settings and firewall rules to find out why the P-793H v2 does not respond to HTTP.
  • If your computer is connected to the WAN port, use a computer that is connected to a ETHERNET port.

I can see the Login screen, but I cannot log in to the P-793H v2.

1 Make sure you have entered the password correctly. The default admin password is 1234, and the default user password is user. The field is case-sensitive, so make sure [Caps Lock] is not on.
2 You cannot log in to the web configurator while someone is using Telnet to access the P-793H v2. Log out of the P-793H v2 in the other session, or ask the person who is logged in to log out.
3 Turn the P-793H v2 off and on.
4 If this does not work, you have to reset the device to its factory defaults. See Section 1.5 on page 41.

I cannot Telnet to the P-793H v2.

See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser.

I cannot use FTP to upload / download the configuration file. / I cannot use FTP to upload new firmware.

See the troubleshooting suggestions for I cannot see or access the Login screen in the web configurator. Ignore the suggestions about your browser.

38.3 Internet Access

I cannot access the Internet.

1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.4 on page 40.
2 Make sure you entered your ISP account information correctly in the wizard. These fields are case-sensitive, so make sure [Caps Lock] is not on.
3 Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again.
4 If the problem continues, contact your ISP.

I cannot access the Internet anymore. I had access to the Internet (with the P-793H v2), but my Internet connection is not available anymore.

1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.4 on page 40.
2 Turn the P-793H v2 off and on.

3 If the problem continues, contact your ISP.

The Internet connection is slow or intermittent.

1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.4 on page 40. If the P-793H v2 is sending or receiving a lot of information, try closing some programs that use the Internet, especially peer-to-peer applications.
2 Turn the P-793H v2 off and on.
3 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions.

Advanced Suggestions

  • Check the settings for QoS. If it is disabled, you might consider activating it. If it is enabled, you might consider raising or lowering the priority for some applications.

38.4 Network Connections

My network cannot be connected. How can I check the Internet connection status?

1 Check the LEDs on the P-793H v2 for the following situations:

  • If the DSL LEDs are off, there is no DSL connection. Check if your cables are connected properly to the P-793H v2.
  • If the DSL LEDs are blinking fast, the P-793H v2 is initializing the DSL line. If they keeps blinking for a long time, please reboot the device.

Note: For Internet access setup or point-to-point connections, the DSL1 and DSL2 LEDs indicate the status of a single connection (act as one LED). For point-to-2point connections, the DSL1 and DSL2 LEDs indicate the status of connection 1 and connection 2 respectively.

  • If the INTERNET LED lights red, the P-793H v2 attempted to become IP connected but failed. The reason might be no DHCP response, no PPPoE response, PPPoE authentication failed, or no IP address from IPCP. Please check if you have entered the correct ISP account and password when setting up the Internet connection. If the status is the same, reboot the device. If the problem remains, please contact your vendor or customer support.

2 Excess errors may occur if the quality of your line is poor. If you hear noise on the line while making a telephone call, you should ask your local telecommunications office to check the lines in your house or apartment building and the line from your residence to your DSL service provider.

Product Specifications

Table 145 Device

Default IP Address192.168.1.1
Default Subnet Mask255.255.255.0 (24 bits)
Default Passworduser: "user" administrator: "1234"
DHCP Pool192.168.1.33 to 192.168.1.64
Dimensions (W x D x H)178 x 125 x 31 mm
Power Specification12V AC 1A
G.SHDSL PortRJ-14 interface Data Rate: 192 Kbps - 5696 Kbps, 192-11392 kbps (4-wire mode) Line Code: TC-PAM modulation Line Impedance: 135 W Connection Loops: two pairs (4-wire)
Operation Temperature0°C ~ 40°C
Storage Temperature-20° ~ 60°C
Operation Humidity20% ~ 90% RH
Storage Humidity20% ~ 95% RH

Table 146 Firmware

Routing/Bridge SupportIP (RFC 791) routing is supported. TCP, UDP, ICMP, IGMP v1 and v2, ARP, RIP v1, RIP v2 Transparent bridging (IEEE 802.1D) PPP BCP (RFC 3185) support
G.SHDSLConnection with symmetric speed up to 11.4 Mbps in either ATM mode and EFM mode Support ITU-T G991.2 / G.994.1 standards Support ITU-T G.998.3 (G.bond) Support IPOE TC-PAM line modulation Configurable as either server or client mode OAM IEEE 802.3 chapter 57 compliant IEEE 802.3 2BASE-TL (aka 802.3ah) compliant Rate negotiating / Manually rate adaptation configuration 2-wire and 4-wire rate auto detect in either ATM mode and EFM mode. Data Rate Selections: From 192 kbps to 5700 kbps (2-wire mode) Data Rate Selections: From 192 kbps to 11400 kbps (4-wire mode) Support Bonding based on EFM and ATM
ATM SupportMultiple protocols over AAL5 (RFC1483) PPP over ATM (RFC 2364) ATM AAL5 supported Support 8 PVCs ATM Forum UNI3.0/4.0 PVC OAM F4/F5 Loopback, RDI, AIS UBR CBR, and nrt-VBR traffic shaping
EFM SupportEFM mode compliant to IEEE 802.3, G.998.3 bonding PPP over Ethernet (RFC2516) VLAN base QoS (802.1P/Q)
Internet Access SharingNAT (includes multi-to-multi NAT) / SUA, 2048 NAT sessions
Port restricted cone NAT
SIP ALG pass-through
NAT server (Port forwarding)
Multi-NAT
Dynamic DNS (www.dyndns.org)
DHCP server/client/relay
SecurityUser Authentication (PAP, CHAP) with PPP (RFC 1334, RFC 1994)
Microsoft CHAP
Stateful packet inspection firewall
Content filter
Prevent Denial of service
Access control of service
Real-time attack alert and log
Network ManagementWeb-based Configuration
Command-line interface
Password-protected Telnet support
SNMP MIB I /MIB II support
TFTP & FTP firmware upgrade and configuration backup
TR-069(HTTPS)
VPNIPSec VPN support
10 VPN tunnels
IKE/ Manual Key
DES/3DES/AES Encryption (HW DES)
MD5/ SHA1 Authentication
FQDN
NETBIOS pass-through for IPSec
IPSec VPN keep-alive
IPSec NAT Traversal
Diagnostics Capabilities (for the following circuitry)FLASH memory SDSL circuitry RAM LAN port
OthersDNS Proxy UNIX syslog

Table 147 Firmware Features

FEATUREDESCRIPTION
Firmware UpgradeDownload new firmware (when available) from the ZyXEL web site and use the web configurator, an FTP or a TFTP tool to put it on the P-793H v2.Note: Only upload firmware for your specific model!
Configuration Backup & RestorationMake a copy of the P-793H v2's configuration. You can put it back on the P-793H v2 later if you decide to revert back to an earlier configuration.
Network Address Translation (NAT)Each computer on your network must have its own unique IP address. Use NAT to convert your public IP address(es) to multiple private IP addresses for the computers on your network.
Port ForwardingIf you have a server (mail or web server for example) on your network, you can use this feature to let people access it from the Internet.
DHCP (Dynamic Host Configuration Protocol)Use this feature to have the P-793H v2 assign IP addresses, an IP default gateway and DNS servers to computers on your network.
Dynamic DNS SupportWith Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic IP address. You must register for this service with a Dynamic DNS service provider.
IP MulticastIP multicast is used to send traffic to a specific group of computers. The P-793H v2 supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236).
IP AliasIP alias allows you to subdivide a physical network into logical networks over the same Ethernet interface with the P-793H v2 itself as the gateway for each subnet.
Time and DateGet the current time and date from an external server when you turn on your P-793H v2. You can also set the time manually. These dates and times are then used in logs.
Logging and TracingUse packet tracing and logs for troubleshooting. You can send logs from the P-793H v2 to an external syslog server.
PPPoEPPPoE mimics a dial-up Internet access connection.
PPTP EncapsulationPoint-to-Point Tunneling Protocol (PPTP) enables secure transfer of data through a Virtual Private Network (VPN). The P-793H v2 supports one PPTP connection at a time.
Universal Plug and Play (UPnP)A UPnP-enabled device can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network.
FirewallYou can configure firewall on the ZyXEL Device for secure Internet access. When the firewall is on, by default, all incoming traffic from the Internet to your network is blocked unless it is initiated from your network. This means that probes from the outside to your network are not allowed, but you can safely browse the Internet and download files for example.

Table 147 Firmware Features

FEATUREDESCRIPTION
Content FilterThe P-793H v2 blocks or allows access to web sites that you specify and blocks access to web sites with URLs that contain keywords that you specify. You can define time periods and days during which content filtering is enabled. You can also include or exclude particular computers on your network from content filtering.
Bandwidth ManagementYou can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and/or to particular computers.
Remote ManagementThis allows you to decide whether a service (HTTP or FTP traffic for example) from a computer on a network (LAN or WAN for example) can access the P-793H v2.

ZYXEL ARMOR Z1 NWD6605 - Product Specifications - 1
Figure 232 Y-Cable Configuration

Wall-mounting Instructions

Do the following to hang your P-793H v2 on a wall.

Note: See the product specifications appendix for the size of screws to use and how far apart to place them.

1 Locate a high position on a wall that is free of obstructions. Use a sturdy wall.
2 Drill two holes for the screws. Make sure the distance between the centers of the holes matches what is listed in the product specifications appendix.

Note: Be careful to avoid damaging pipes or cables located inside the wall when drilling holes for the screws.

3 Do not screw the screws all the way into the wall. Leave a small gap of about 0.5 cm between the heads of the screws and the wall.
4 Make sure the screws are snugly fastened to the wall. They need to hold the weight of the P-793H v2 with the connection cables.
5 Align the holes on the back of the P-793H v2 with the screws on the wall. Hang the P-793H v2 on the screws.

ZYXEL ARMOR Z1 NWD6605 - Wall-mounting Instructions - 1
Figure 233 Wall-mounting Example

Setting up Your Computer's IP Address

All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed.

Windows 95/98/Me/NT/2000/XP/Vista, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer. Windows 3.1 requires the purchase of a third-party TCP/IP application package.

TCP/IP should already be installed on computers using Windows NT/2000/XP, Macintosh OS 7 and later operating systems.

After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network.

If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the P-793H v2's LAN port.

Windows 95/98/Me

Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.

ZYXEL ARMOR Z1 NWD6605 - Windows 95/98/Me - 1
Figure 234 Windows 95/98/Me: Network: Configuration

Installing Components

The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks.

If you need the adapter:

1 In the Network window, click Add.
2 Select Adapter and then click Add.
3 Select the manufacturer and model of your network adapter and then click OK. If you need TCP/IP:
1 In the Network window, click Add.
2 Select Protocol and then click Add.

3 Select Microsoft from the list of manufacturers.
4 Select TCP/IP from the list of network protocols and then click OK.

If you need Client for Microsoft Networks:

1 Click Add.
2 Select Client and then click Add.
3 Select Microsoft from the list of manufacturers.
4 Select Client for Microsoft Networks from the list of network clients and then click OK.
5 Restart your computer so the changes you made take effect.

Configuring

1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties
2 Click the IP Address tab.

  • If your IP address is dynamic, select Obtain an IP address automatically.
  • If you have a static IP address, select Specify an IP address and type your information into the IP Address and Subnet Mask fields.

ZYXEL ARMOR Z1 NWD6605 - Configuring - 1
Figure 235 Windows 95/98/Me: TCP/IP Properties: IP Address

3 Click the DNS Configuration tab.

  • If you do not know your DNS information, select Disable DNS.
  • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in).

ZYXEL ARMOR Z1 NWD6605 - Configuring - 2
Figure 236 Windows 95/98/Me: TCP/IP Properties: DNS Configuration

4 Click the Gateway tab.

  • If you do not know your gateway's IP address, remove previously installed gateways.
  • If you have a gateway IP address, type it in the New gateway field and click Add.

5 Click OK to save and close the TCP/IP Properties window.
6 Click OK to close the Network window. Insert the Windows CD if prompted.
7 Turn on your P-793H v2 and restart your computer when prompted.

Verifying Settings

1 Click Start and then Run.
2 In the Run window, type "winipcfg" and then click OK to open the IP Configuration window.
3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway.

Windows 2000/NT/XP

The following example figures use the default Windows XP GUI theme.

1 Click start (Start in Windows 2000/NT), Settings, Control Panel.

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 1
Figure 237 Windows XP: Start Menu

2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT).

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 2
Figure 238 Windows XP: Control Panel

3 Right-click Local Area Connection and then click Properties.

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 3
Figure 239 Windows XP: Control Panel: Network Connections: Properties

4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties.

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 4
Figure 240 Windows XP: Local Area Connection Properties

5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).

  • If you have a dynamic IP address click Obtain an IP address automatically.
  • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields.
  • Click Advanced.

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 5
Figure 241 Windows XP: Internet Protocol (TCP/IP) Properties

6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK.

Do one or more of the following if you want to configure additional IP addresses:

  • In the IP Settings tab, in IP addresses, click Add.
  • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
  • Repeat the above two steps for each IP address you want to add.
  • Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways.
  • In TCP/IP Gateway Address, type the IP address of the default gateway in Gateway. To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric.
  • Click Add.
  • Repeat the previous three steps for each default gateway you want to add.

  • Click OK when finished.

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 6
Figure 242 Windows XP: Advanced TCP/IP Properties

7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP):

  • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
  • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.

If you have previously configured DNS servers, click Advanced and then the DNS tab to order them.

ZYXEL ARMOR Z1 NWD6605 - Windows 2000/NT/XP - 7
Figure 243 Windows XP: Internet Protocol (TCP/IP) Properties

8 Click OK to close the Internet Protocol (TCP/IP) Properties window.
9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window.
10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
11 Turn on your P-793H v2 and restart your computer (if prompted).

Verifying Settings

1 Click Start, All Programs, Accessories and then Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.

Windows Vista

This section shows screens from Windows Vista Enterprise Version 6.0.

1 Click the Start icon, Control Panel.

ZYXEL ARMOR Z1 NWD6605 - Click the Start icon, Control Panel. - 1
Figure 244 Windows Vista: Start Menu

2 In the Control Panel, double-click Network and Internet.

ZYXEL ARMOR Z1 NWD6605 - In the Control Panel, double-click Network and Internet. - 1
Figure 245 Windows Vista: Control Panel

3 Click Network and Sharing Center.

ZYXEL ARMOR Z1 NWD6605 - Click Network and Sharing Center. - 1
Figure 246 Windows Vista: Network And Internet

4 Click Manage network connections.

ZYXEL ARMOR Z1 NWD6605 - Click Manage network connections. - 1
Figure 247 Windows Vista: Network and Sharing Center

5 Right-click Local Area Connection and then click Properties.

Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.

ZYXEL ARMOR Z1 NWD6605 - Right-click Local Area Connection and then click Properties. - 1
Figure 248 Windows Vista: Network and Sharing Center

6 Select Internet Protocol Version 4 (TCP/IPv4) and click Properties.

ZYXEL ARMOR Z1 NWD6605 - Select Internet Protocol Version 4 (TCP/IPv4) and click Properties. - 1
Figure 249 Windows Vista: Local Area Connection Properties

7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens (the General tab).

  • If you have a dynamic IP address click Obtain an IP address automatically.
  • If you have a static IP address click Use the following IP address and fill in the IP address, Subnet mask, and Default gateway fields.

  • Click Advanced.

ZYXEL ARMOR Z1 NWD6605 - The Internet Protocol Version 4 (TCP/IPv4) Properties window opens (the General tab). - 1
Figure 250 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties

8 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK.

Do one or more of the following if you want to configure additional IP addresses:

  • In the IP Settings tab, in IP addresses, click Add.
  • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
  • Repeat the above two steps for each IP address you want to add.
  • Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways.
  • In TCP/IP Gateway Address, type the IP address of the default gateway in Gateway. To manually configure a default metric (the number of transmission hops), clear the Automatic metric check box and type a metric in Metric.
  • Click Add.
  • Repeat the previous three steps for each default gateway you want to add.

  • Click OK when finished.

ZYXEL ARMOR Z1 NWD6605 - The Internet Protocol Version 4 (TCP/IPv4) Properties window opens (the General tab). - 2
Figure 251 Windows Vista: Advanced TCP/IP Properties

9 In the Internet Protocol Version 4 (TCP/IPv4) Properties window, (the General tab):

  • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
  • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.

If you have previously configured DNS servers, click Advanced and then the DNS tab to order them.

ZYXEL ARMOR Z1 NWD6605 - The Internet Protocol Version 4 (TCP/IPv4) Properties window opens (the General tab). - 3
Figure 252 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties

10 Click OK to close the Internet Protocol Version 4 (TCP/IPv4) Properties window.
11 Click Close to close the Local Area Connection Properties window.
12 Close the Network Connections window.
13 Turn on your P-793H v2 and restart your computer (if prompted).

Verifying Settings

1 Click Start, All Programs, Accessories and then Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.

Macintosh OS 8/9

1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel.

ZYXEL ARMOR Z1 NWD6605 - Macintosh OS 8/9 - 1
Figure 253 Macintosh OS 8/9: Apple Menu

2 Select Ethernet built-in from the Connect via list.

ZYXEL ARMOR Z1 NWD6605 - Macintosh OS 8/9 - 2
Figure 254 Macintosh OS 8/9: TCP/IP

3 For dynamically assigned settings, select Using DHCP Server from the Configure: list.
4 For statically assigned settings, do the following:

From the Configure box, select Manually.
- Type your IP address in the IP Address box.
- Type your subnet mask in the Subnet mask box.
- Type the IP address of your P-793H v2 in the Router address box.

5 Close the TCP/IP Control Panel.
6 Click Save if prompted, to save changes to your configuration.
7 Turn on your P-793H v2 and restart your computer (if prompted).

Verifying Settings

Check your TCP/IP properties in the TCP/IP Control Panel window.

Macintosh OS X

1 Click the Apple menu, and click System Preferences to open the System Preferences window.

ZYXEL ARMOR Z1 NWD6605 - Macintosh OS X - 1
Figure 255 Macintosh OS X: Apple Menu

2 Click Network in the icon bar.

  • Select Automatic from the Location list.
  • Select Built-in Ethernet from the Show list.
  • Click the TCP/IP tab.

3 For dynamically assigned settings, select Using DHCP from the Configure list.

ZYXEL ARMOR Z1 NWD6605 - Macintosh OS X - 2
Figure 256 Macintosh OS X: Network

4 For statically assigned settings, do the following:

From the Configure box, select Manually.
- Type your IP address in the IP Address box.
- Type your subnet mask in the Subnet mask box.
- Type the IP address of your P-793H v2 in the Router address box.

5 Click Apply Now and close the window.
6 Turn on your P-793H v2 and restart your computer (if prompted).

Verifying Settings

Check your TCP/IP properties in the Network window.

Linux

This section shows you how to configure your computer's TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may vary depending on your Linux distribution and release version.

Note: Make sure you are logged in as the root administrator.

Using the K Desktop Environment (KDE)

Follow the steps below to configure your computer IP address using the KDE.

1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network.

ZYXEL ARMOR Z1 NWD6605 - Using the K Desktop Environment (KDE) - 1
Figure 257 Red Hat 9.0: KDE: Network Configuration: Devices

2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown.

ZYXEL ARMOR Z1 NWD6605 - Using the K Desktop Environment (KDE) - 2
Figure 258 Red Hat 9.0: KDE: Ethernet Device: General

  • If you have a dynamic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list.
  • If you have a static IP address, click statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.

3 Click OK to save the changes and close the Ethernet Device General screen.
4 If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen. Enter the DNS server information in the fields provided.

ZYXEL ARMOR Z1 NWD6605 - Using the K Desktop Environment (KDE) - 3
Figure 259 Red Hat 9.0: KDE: Network Configuration: DNS

5 Click the Devices tab.

6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens.

ZYXEL ARMOR Z1 NWD6605 - Using the K Desktop Environment (KDE) - 4
Figure 260 Red Hat 9.0: KDE: Network Configuration: Activate

7 After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.

Using Configuration Files

Follow the steps below to edit the network configuration files and set your computer IP address.

1 Assuming that you have only one network card on the computer, locate the ifconfig-eth0 configuration file (where eth0 is the name of the Ethernet card). Open the configuration file with any plain text editor.

  • If you have a dynamic IP address, enter dhcp in the BOOTPROTO= field. The following figure shows an example.

Figure 261 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0

DEVICE eth0
ONBOOT yes
BOOTPROTO dhcp
USERCTL no
PEERDNS yes
TYPE Ethernet

  • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0.

Figure 262 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0

DEVICE eth0
ONBOOT yes
BOOTPROTO static
IPADDR = 192.168.1.10 NETMASK = 255.255.255.0 USERCTL no
PEERDNS yes
TYPE Ethernet

2 If you know your DNS server IP address(es), enter the DNS server information in the resolv.conf file in the /etc directory. The following figure shows an example where two DNS server IP addresses are specified.

Figure 263 Red Hat 9.0: DNS Settings in resolv.conf

nameserver 172.23.5.1  
nameserver 172.23.5.2 

3 After you edit and save the configuration files, you must restart the network card. Enter ./network restart in the /etc/rc.d/init.d directory. The following figure shows an example.

Figure 264 Red Hat 9.0: Restart Ethernet Card

[root@localhost init.d]# network restart Shutting down interface eth0: [OK] Shutting down loopback interface: [OK] Setting network parameters: [OK] Bringing up loopback interface: [OK] Bringing up interface eth0: [OK] 

Verifying Settings

Enter ifconfig in a terminal screen to check your TCP/IP properties.

Figure 265 Red Hat 9.0: Checking TCP/IP Properties

[root@localhost]# ifconfig   
eth0 Link encaps:Ethernet HWaddr 00:50:BA:72:5B:44 inlet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:717 errors:0 dropped:0 overruns:0 frame:0 TX packets:13 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:730412 (713.2 Kb) TX bytes:1570 (1.5 Kb) Interrupt:10 Base address:0x1000   
[root@localhost]# 

Pop-up Windows, JavaScript and Java Permissions

In order to use the web configurator you need to allow:

  • Web browser pop-up windows from your device.
  • JavaScripts (enabled by default).
  • Java permissions (enabled by default).

Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary.

Internet Explorer Pop-up Blockers

You may have to disable pop-up blocking to log into your device.

Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device's IP address.

Disable Pop-up Blockers

1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker.

ZYXEL ARMOR Z1 NWD6605 - Disable Pop-up Blockers - 1
Figure 266 Pop-up Blocker

You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab.

1 In Internet Explorer, select Tools, Internet Options, Privacy.
2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled.

ZYXEL ARMOR Z1 NWD6605 - Disable Pop-up Blockers - 2
Figure 267 Internet Options: Privacy

3 Click Apply to save this setting.

Enable Pop-up Blockers with Exceptions

Alternatively, if you only want to allow pop-up windows from your device, see the following steps.

1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.

2 Select Settings...to open the Pop-up Blocker Settings screen.

ZYXEL ARMOR Z1 NWD6605 - Enable Pop-up Blockers with Exceptions - 1
Figure 268 Internet Options: Privacy

3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix "http://". For example, http://192.168.167.1.

4 Click Add to move the IP address to the list of Allowed sites.

ZYXEL ARMOR Z1 NWD6605 - Enable Pop-up Blockers with Exceptions - 2
Figure 269 Pop-up Blocker Settings

5 Click Close to return to the Privacy screen.
6 Click Apply to save this setting.

JavaScript

If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.

1 In Internet Explorer, click Tools, Internet Options and then the Security tab.

ZYXEL ARMOR Z1 NWD6605 - JavaScript - 1
Figure 270 Internet Options: Security

2 Click the Custom Level... button.
3 Scroll down to Scripting.
4 Under Active scripting make sure that Enable is selected (the default).
5 Under Scripting of Java applets make sure that Enable is selected (the default).

6 Click OK to close the window.

ZYXEL ARMOR Z1 NWD6605 - JavaScript - 2
Figure 271 Security Settings - Java Scripting

Java Permissions

1 From Internet Explorer, click Tools, Internet Options and then the Security tab.
2 Click the Custom Level... button.
3 Scroll down to Microsoft VM.
4 Under Java permissions make sure that a safety level is selected.

5 Click OK to close the window.

ZYXEL ARMOR Z1 NWD6605 - Java Permissions - 1
Figure 272 Security Settings - Java

JAVA (Sun)

1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab.
2 Make sure that Use Java 2 for under Java (Sun) is selected.

3 Click OK to close the window.

ZYXEL ARMOR Z1 NWD6605 - Click OK to close the window. - 1
Figure 273 Java (Sun)

Mozilla Firefox

Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary.

You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.

ZYXEL ARMOR Z1 NWD6605 - Mozilla Firefox - 1
Figure 274 Mozilla Firefox: Tools > Options

Click Content to show the screen below. Select the check boxes as shown in the following screen.

ZYXEL ARMOR Z1 NWD6605 - Mozilla Firefox - 2
Figure 275 Mozilla Firefox Content Security

IP Addresses and Subnetting

This appendix introduces IP addresses and subnet masks.

IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts.

Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.

Introduction to IP Addresses

One part of the IP address is the network number, and the other part is the host ID. In the same way that houses on a street share a common street name, the hosts on a network share a common network number. Similarly, as each house has its own house number, each host on the network has its own unique identifying number - the host ID. Routers use the network number to send packets to the correct network, while the host ID determines to which host on the network the packets are delivered.

Structure

An IP address is made up of four parts, written in dotted decimal notation (for example, 192.168.1.1). Each of these four parts is known as an octet. An octet is an eight-digit binary number (for example 11000000, which is 192 in decimal notation).

Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal.

The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID.

ZYXEL ARMOR Z1 NWD6605 - Structure - 1
Figure 276 Network Number and Host ID

How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.

Subnet Masks

A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation). The term "subset" is short for "sub-network".

A subnet mask has 32 bits. If a bit in the subnet mask is a "1" then the corresponding bit in the IP address is part of the network number. If a bit in the subnet mask is "0" then the corresponding bit in the IP address is part of the host ID.

The following example shows a subnet mask identifying the network number (in bold text) and host ID of an IP address (192.168.1.2 in decimal).

Table 148 Subnet Masks

1ST OCTET: (192)2ND OCTET: (168)3RD OCTET: (1)4TH OCTET (2)
IP Address (Binary)11000000101010000000000100000010
Subnet Mask (Binary)11111111111111111111111100000000
Network Number110000001010100000000001
Host ID00000010

By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.

Subnet masks can be referred to by the size of the network number part (the bits with a "1" value). For example, an "8-bit mask" means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.

Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks.

Table 149 Subnet Masks

BINARYDECIMAL
1ST OCTET2ND OCTET3RD OCTET4TH OCTET
8-bit mask11111111000000000000000000000000255.0.0.0
16-bit mask11111111111111110000000000000000255.255.0.0
24-bit mask11111111111111111111111100000000255.255.255.0
29-bit mask11111111111111111111111111111000255.255.255.248

Network Size

The size of the network number determines the maximum number of possible hosts you can have on your network. The larger the number of network number bits, the smaller the number of remaining host ID bits.

An IP address with host IDs of all zeros is the IP address of the network (192.168.1.0 with a 24-bit subnet mask, for example). An IP address with host IDs of all ones is the broadcast address for that network (192.168.1.255 with a 24-bit subnet mask, for example).

As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows:

Table 150 Maximum Host Numbers

SUBNET MASKHOST ID SIZEMAXIMUM NUMBER OF HOSTS
8 bits255.0.0.024 bits\( 2^{24} - 2 \)16777214
16 bits255.255.0.016 bits\( 2^{16} - 2 \)65534
24 bits255.255.255.08 bits\( 2^8 - 2 \)254
29 bits255.255.255.2 483 bits\( 2^3 - 2 \)6

Notation

Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address.

For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.

The following table shows some possible subnet masks using both notations.

Table 151 Alternative Subnet Mask Notation

SUBNET MASKALTERNATIVE NOTATIONLAST OCTET (BINARY)LAST OCTET (DECIMAL)
255.255.255.0/240000 00000
255.255.255.128/251000 0000128
255.255.255.192/261100 0000192
255.255.255.224/271110 0000224
255.255.255.240/281111 0000240
255.255.255.248/291111 1000248
255.255.255.252/301111 1100252

Subnetting

You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons.

In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.1) are the network number, and the remaining octet is the host ID, allowing a maximum of 2^8 - 2 or 254 possible hosts.

The following figure shows the company network before subnetting.

ZYXEL ARMOR Z1 NWD6605 - Subnetting - 1
Figure 277 Subnetting Example: Before Subnetting

You can "borrow" one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).

The "borrowed" host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25.

The following figure shows the company network after subnetting. There are now two sub-networks, A and B.

ZYXEL ARMOR Z1 NWD6605 - Subnetting - 2
Figure 278 Subnetting Example: After Subnetting

In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2^7 - 2 or 126 possible hosts (a host ID of all zeroes is the subnet's address itself, all ones is the subnet's broadcast address).

192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned to an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126.

Similarly, the host ID range for subnet B is 192.168.1.129 to 192.168.1.254.

Example: Four Subnets

The previous example illustrated using a 25-bit subnet mask to divide a 24-bit address into two subnets. Similarly, to divide a 24-bit address into four subnets, you need to "borrow" two host ID bits to give four possible combinations (00, 01, 10 and 11). The subnet mask is 26 bits

(11111111.11111111.11111111.11000000) or 255.255.255.192.

Each subnet contains 6 host ID bits, giving 2^6 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet's broadcast address).

Table 152 Subnet 1

IP/SUBNET MASKNETWORK NUMBERLAST OCTET BIT VALUE
IP Address (Decimal)192.168.1.0
IP Address (Binary)11000000.10101000.00000001.00000000
Subnet Mask (Binary)11111111.11111111.11111111.11000000
Subnet Address: 192.168.1.0Lowest Host ID: 192.168.1.1
Broadcast Address: 192.168.1.63Highest Host ID: 192.168.1.62

Table 153 Subnet 2

IP/SUBNET MASKNETWORK NUMBERLAST OCTET BIT VALUE
IP Address192.168.1.64
IP Address (Binary)11000000.10101000.00000001.01000000
Subnet Mask (Binary)11111111.11111111.11111111.11000000
Subnet Address: 192.168.1.64Lowest Host ID: 192.168.1.65
Broadcast Address: 192.168.1.127Highest Host ID: 192.168.1.126

Table 154 Subnet 3

IP/SUBNET MASKNETWORK NUMBERLAST OCTET BIT VALUE
IP Address192.168.1.128
IP Address (Binary)11000000.10101000.00000001.10000000
Subnet Mask (Binary)11111111.11111111.11111111.11000000
Subnet Address: 192.168.1.128Lowest Host ID: 192.168.1.129
Broadcast Address: 192.168.1.191Highest Host ID: 192.168.1.190

Table 155 Subnet 4

IP/SUBNET MASKNETWORK NUMBERLAST OCTET BIT VALUE
IP Address192.168.1.192
IP Address (Binary)11000000.10101000.00000001 .11000000
Subnet Mask (Binary)11111111.11111111.11111111 .11000000
Subnet Address: 192.168.1.192Lowest Host ID: 192.168.1.193
Broadcast Address: 192.168.1.255Highest Host ID: 192.168.1.254

Example: Eight Subnets

Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).

The following table shows IP address last octet values for each subnet.

Table 156 Eight Subnets

SUBNETSUBNET ADDRESSFIRST ADDRESSLAST ADDRESSBROADCAST ADDRESS
1013031
232336263
364659495
49697126127
5128129158159
6160161190191
7192193222223
8224225254255

Subnet Planning

The following table is a summary for subnet planning on a network with a 24-bit network number.

Table 157 24-bit Network Number Subnet Planning

NO. “BORROWED” HOST BITSSUBNET MASKNO. SUBNETSNO. HOSTS PER SUBNET
1255.255.255.128 (/25)2126
2255.255.255.192 (/26)462
3255.255.255.224 (/27)830
4255.255.255.240 (/28)1614
5255.255.255.248 (/29)326
6255.255.255.252 (/30)642
7255.255.255.254 (/31)1281

The following table is a summary for subnet planning on a network with a 16-bit network number.

Table 158 16-bit Network Number Subnet Planning

NO. “BORROWED” HOST BITSSUBNET MASKNO. SUBNETSNO. HOSTS PER SUBNET
1255.255.128.0 (/17)232766
2255.255.192.0 (/18)416382
3255.255.224.0 (/19)88190
4255.255.240.0 (/20)164094
5255.255.248.0 (/21)322046
6255.255.252.0 (/22)641022
7255.255.254.0 (/23)128510
8255.255.255.0 (/24)256254
9255.255.255.128 (/25)512126
10255.255.255.192 (/26)102462
11255.255.255.224 (/27)204830
12255.255.255.240 (/28)409614
13255.255.255.248 (/29)81926
14255.255.255.252 (/30)163842
15255.255.255.254 (/31)327681

Configuring IP Addresses

Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP

addresses, follow their instructions in selecting the IP addresses and the subnet mask.

If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. If this is the case, it is recommended that you select a network number from 192.168.0.0 to 192.168.255.0. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. You must also enable Network Address Translation (NAT) on the P-793H v2.

Once you have decided on the network number, pick an IP address for your P-793H v2 that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.

The subnet mask specifies the network number portion of an IP address. Your P-793H v2 will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the P-793H v2 unless you are instructed to do otherwise.

Private IP Addresses

Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks:

10.0.0.0 -10.255.255.255
172.16.0.0 — 172.31.255.255
- 192.168.0.0 — 192.168.255.255

You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a private network. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses.

Regardless of your particular situation, do not create an arbitrary IP address; always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Intermets and RFC 1466, Guidelines for Management of IP Address Space.

Services

The following table lists some commonly-used services and their associated protocols and port numbers.

  • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like.
  • Protocol: This is the type of IP protocol used by the service. If this is TCP/UDP, then the service uses the same port number with TCP and UDP. If this is USER-DEFINED, the Port(s) is the IP protocol number, not the port number.
  • Port(s): This value depends on the Protocol.

  • If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number.

  • If the Protocol is USER, this is the IP protocol number.

  • Description: This is a brief explanation of the applications that use this service or the situations in which this service is used.

Table 159 Examples of Services

NAMEPROTOCOLPORT(S)DESCRIPTION
AH(IPSEC_TUNNEL)User-Defined51The IPSEC AH (Authentication Header) tunneling protocol uses this service.
AIMTCP5190AOL's Internet Messenger service.
AUTHTCP113Authentication protocol used by some servers.
BGPTCP179Border Gateway Protocol.
BOOTP_CLIENTUDP68DHCP Client.
BOOTP_SERVERUDP67DHCP Server.
CU-SEEMETCP/UDP7648A popular videoconferencing solution from White Pines Software.
TCP/UDP24032
DNSTCP/UDP53Domain Name Server, a service that matches web names (for instance www.zyxel.com) to IP numbers.
ESP(IPSEC_TUNNEL)User-Defined50The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service.
FINGERTCP79Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
FTPTCP20File Transfer Protocol, a program to enable fast transfer of files, including large files that may not be possible by e-mail.
TCP21
H.323TCP1720NetMeeting uses this protocol.
HTTPTCP80Hyper Text Transfer Protocol - a client/server protocol for the world wide web.
HTTPSTCP443HTTPS is a secured http session often used in e-commerce.
ICMPUser-Defined1Internet Control Message Protocol is often used for diagnostic purposes.
ICQUDP4000This is a popular Internet chat program.
IGMP(MULTICAST)User-Defined2Internet Group Multicast Protocol is used when sending packets to a specific group of hosts.
IKEUDP500The Internet Key Exchange algorithm is used for key distribution and management.
IMAP4TCP143The Internet Message Access Protocol is used for e-mail.
IMAP4STCP993This is a more secure version of IMAP4 that runs over SSL.
IRCTCP/UDP6667This is another popular Internet chat program.
MSN MessengerTCP1863Microsoft Networks' messenger service uses this protocol.
NetBIOSTCP/UDP137The Network Basic Input/Output System is used for communication between computers in a LAN.
TCP/UDP138
TCP/UDP139
TCP/UDP445
NEW-ICQTCP5190An Internet chat program.
NEWSTCP144A protocol for news groups.
NFSUDP2049Network File System - NFS is a client/server distributed file service that provides transparent file sharing for network environments.
NNTPTCP119Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service.
PINGUser-Defined1Packet INternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable.
POP3TCP110Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other).
POP3STCP995This is a more secure version of POP3 that runs over SSL.
PPTPTCP1723Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel.
PPTP_TUNNEL (GRE)User-Defined47PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel.
RCMDTCP512Remote Command Service.
REAL=AUDIOTCP7070A streaming audio service that enables real time sound over the web.
REEXECTCP514Remote Execution Daemon.
RLOGINTCP513Remote Login.
ROADRUNNERTCP/UDP1026This is an ISP that provides services mainly for cable modems.
RTELNETTCP107Remote Telnet.
RTSPTCP/UDP554The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet.
SFTPTCP115The Simple File Transfer Protocol is an old way of transferring files between computers.
SMTPTCP25Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another.
SMTPSTCP465This is a more secure version of SMTP that runs over SSL.
SNMPTCP/UDP161Simple Network Management Program.
SNMP-TRAPSTCP/UDP162Traps for use with the SNMP (RFC: 1215).
SQL-NETTCP1521Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers.
SSDPUDP1900The Simple Service Discovery Protocol supports Universal Plug-and-Play (UPnP).
SSHTCP/UDP22Secure Shell Remote Login Program.
STRM WORKSUDP1558Stream Works Protocol.
SYSLOGUDP514Syslog allows you to send system logs to a UNIX server.
TACACSUDP49Login Host Protocol used for (Terminal Access Controller Access Control System).
TELNETTCP23Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
TFTPUDP69Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol).
VDOLIVETCP7000A videoconferencing solution. The UDP port number is specified in the application.
UDPuser-defined

Copyright © 2010 by ZyXEL Communications Corporation.

The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.

Published by ZyXEL Communications Corporation. All rights reserved.

Disclaimer

ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.

Trademarks

ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.

Certifications

Federal Communications Commission (FCC) Interference Statement

The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:

  • This device may not cause harmful interference.

  • This device must accept any interference received, including interference that may cause undesired operations.

This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.

If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures:

1 Reorient or relocate the receiving antenna.
2 Increase the separation between the equipment and the receiver.
3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4 Consult the dealer or an experienced radio/TV technician for help.

ZYXEL ARMOR Z1 NWD6605 - Federal Communications Commission (FCC) Interference Statement - 1

FCC Radiation Exposure Statement

  • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
  • IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
  • To comply with FCC RF exposure compliance requirements, a separation distance of at least 20~cm must be maintained between the antenna of this device and all persons.

注意!

依據 低功率電波輻射性電機管理辦法

Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.

This Class B digital apparatus complies with Canadian ICES-003.

Viewing Certifications

1 Go to http://www.zyxel.com.
2 Select your product on the ZyXEL home page to go to that product's page.
3 Select the certification you wish to view from this page.

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.

Note

Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.

To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http:// www.zyxel.com/web/support_warranty_info.php.

Registration

Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com.

Index

Numerics

802.1Q/1P 207

activation 213

example 209

group settings 214

management VLAN 213

port settings 215

priority 207, 216

PVC 208

PVID 216

tagging frames 208, 215

A

activation

802.1Q/1P 213

classifiers 224

content filtering 158

dynamic DNS 236

DYNDNS wildcard 236

firewalls 139

NAT 119

portforwarding123

QoS 223

SIP ALG 127

static route 204

UPnP 253

address mapping 123

rules 125

types 125, 126, 130

administrator password 265

AH 180

errors 269

firewalls 143

algorithm, certificates 199

MD5 fingerprint 199

SHA1 fingerprint 199

algorithms 180

alternative subnet mask notation 466

anti-probing 134

Any IP

status 54

applications

high-speed Internet access 37

point-to-point connections 38

applications, NAT 130

asymmetrical routes 139

Asynchronous Transfer Mode, see ATM

ATM 76, 299

MBS 84,91

PCR 84, 91

QoS 84, 90, 99

SCR 84, 91

status 299

B

backup

configuration 288, 289, 293

backup type 92

bandwidth management 223

broadcast 76

budget management 404

C

CA 193

algorithm 199

trusted 195, 198

call control 404

call history 404

CBR 84, 90, 99

certificates 193, 200

advantages 200

algorithm 199

CA 193

trusted 195, 198

example 193

exporting 199

factory-default 194

formats 193

PEM 199

thumbprint algorithms 195

thumbprints 195

verifying fingerprints 194

Certification Authority, see CA

certifications 477

notices 479

viewing 479

Change Password screen 44

Class of Service, see CoS

classifiers 224

802.1Q tags 228

activation 224

configuration 226

creation 224

DSCP 227, 229

FTP 229

priority 227

remote node 229

routing policy 227

SIP 229

client list 108

command interface 39

Command Interpreter (CI) 403

command syntax 403

command usage 404

configuration 293

backup 288, 289, 293

classifiers 226

DHCP 107

file 284

firewalls 138, 142, 147

IP alias 110

logs 271

portforwarding121

reset 295

restoring 285, 293

SNMP 247

static route 205

WAN78

wizard 60

configuration file 387

back up 388

back up using FTP 389

backing up using console port 392

backing up using TFTP 391

restore 393

restoring using console port 395

restoring using FTP 394

connection

nailed-up 89, 96

on demand 89

console port

for backing up configuration file 392

for restoring configuration file 395

for upgrading firmware 400

content filtering 155

activation 158

example 156

keywords 158

schedules 159

trusted IP addresses 160

URL 155

copyright 477

CoS 218

DiffServ 232

creation

classifiers 224

customized services 143, 144, 145

D

data filter set. See filter set, data.

default password 44

default server, NAT 120, 122

default URL 43

Denials of Service, see DoS

DH 188

DHCP 102, 107, 112, 263

diagnostic 297

Differentiated Services, see DiffServ

Diffie-Hellman key groups 188

DiffServ 232

DiffServ Code Point, see DSCP

disclaimer 477

DNS 80, 102, 107, 112, 248

DNS Server

for VPN host 185

Domain Name System, see DNS

DoS 134

three-way handshake 145

thresholds 134, 145, 146, 147

DSCP 227, 229, 232

DSL connections, status 300

DSL interface 76

dynamic DNS 235

activation 236

wildcard 235

activation 236

Dynamic Host Configuration Protocol, see DHCP

dynamic secure gateway address 163

DYNDNS wildcard 235

activation 236

E

e-mail logs 272

encapsulation 76, 79, 88, 183

ENET ENCAP 94

PPPoA 94

PPPoE 94

RFC 1483 94

ENET ENCAP 79,88,94

ESP 180

exporting

trusted CA 199

F

FCC interference statement 477

filter set 357

and firewall370

and NAT 369

and remote node 330

data 357

generic filter rule 366

structure 358

TCP/IP filter rule 362

filters

content 155

activation 158

example 156

keywords 158

schedules 159

trusted IP addresses 160

URL 155

firewall

and filter set 370

firewalls 133

actions 143

activation 139

address types 143

errors 143

anti-probing 134

asymmetrical routes 139

configuration 138, 142, 147

customized services 143, 144, 145

default action 139

DoS 134

thresholds 134, 145, 146, 147

example 135

half-open sessions 148

ICMP 134

logs 143

maximum incomplete 148

P2P 147

packet direction 139

rules 140, 149

schedules 143

security 150

status 52

three-way handshake 145

triangle route 139, 151, 152

solutions 152

firmware 284, 291

upgrading 286

version 52

firmware upgrade 387, 396, 400

using FTP 398

usingTFTP399

forwarding ports 118, 120

activation 123

configuration 121

example 121

rules 122

front panel 40

FTP 39,243

backing up configuration 288

for backing up configuration file 389

for restoring configuration file 394

for upgrading firmware 398

limitations 285

QoS 229

restoring configuration 285, 286

upgrading firmware 286, 287

algorithms 180

architecture 180

NAT 180

see also VPN

H

half-open sessions 148

high-speed Internet access 37

HTTPS

authenticating clients 241

K

keep alive 185

L

LAN 101

client list 108

DHCP 102, 107, 112

DNS 102, 107, 112

IGMP 102, 115

IP address 102, 103, 113

IP alias 109

configuration 110

MAC address 108

multicast 102, 105, 114

NetBIOS 105

packet filter 105

RIP 102, 105, 110, 114

status 52

subset mask 102, 103, 113

LEDS 40

limitations

FTP 285

Local Area Network, see LAN

login

passwords 44

Login screen 44

logs 269

errors 269

e-mail 272

error messages 273

example 273

firewalls 143

schedules 272

settings 271

M

MAC address 108

management VLAN 213

managing the device good habits 40

using FTP. See FTP.

using SMT. See SMT.

using SNMP. See SNMP.

using Telnet. See command interface.

using the command interface. See command interface.

using the web configurator. See web configurator.

using TR-069. See TR-069.

mapping address 123

rules 125

types 125, 126, 130

Maximum Burst Size, see MBS

maximum incomplete 148

Maximum Transmission Unit, see MTU

MBS 84,91,98

MD5 fingerprint 199

metric 96

and policy route 97

and pre-defined priority 96

monitor, QoS 230

MTU 85, 91

multicast 76,84,90,102,105,114

IGMPInternet Group Multicast Protocol, see IGMP

multiplexing 79, 88, 95

LLC-based 95

VC-based 95

my IP address 162

N

nailed-up connection 80, 89, 96

NAT 89, 117, 118, 127, 128, 471

activation 119

address mapping 123

rules 125

types 125, 126, 130

and filter set 369

applications 130

IP alias 130

default server IP address 120, 122

example 129

examples 346

global 128

IGA 128

ILA 128

inside 128

IPSec 180

local 128

outside 128

P2P 119

portforwarding118,120

activation 123

configuration 121

example 121

rules 122

remote management 241

SIP ALG 127

activation 127

SUA 118, 119

traversal 181

negotiation mode 185

NetBIOS 105

Network Address Translation

see NAT

Network Address Translation, see NAT

Network Basic Input/Output System

0

outsideheader183

P

P2P 119, 147

packet direction 139

packet filter

LAN 105

WAN 85, 91

packet statistics 55

Packet Transfer Mode 76

passthrough, PPPoE 84

passwords 44

administrator 265

users 265

PCR 84,91,98

Peak Cell Rate, see PCR

PEM 199

point-to-point connections 38, 67, 70

procedure 67, 70

policy route

and metric 97

portforwarding118,120

activation 123

configuration 121

example 121

rules 122

PPPoA 79,88,94

PPPoE 79,88,94

passthrough 84

pre-shared key 188

private IP address 113

probing, firewalls 134

product registration 480

PTM 76

public-private key pairs 200

PVC 208

PVID 216

Q

QoS 217

802.1Q tags 228, 231

activation 223

bandwidth 223

classifiers 224

activation 224

configuration 226

creation 224

priority 227

CoS 218

DiffServ 232

DSCP 227, 229, 232

example 219

FTP 229

IP precedence 231

monitor 230

priority queue 232

remote node 229

routing policy 227

SIP 229

Quality of Service, see QoS

R

registration

product 480

related documentation 3

remote management 239

DNS 248

FTP 243

ICMP 249

limitations 240, 409

NAT 241

SNMP 244

configuration 247

Telnet 242

WWW 241

remote node 229, 325

and filter set 330

reset 295

restart 295

restoring configuration 285, 293

restrictions

FTP 285

RFC 1483 79, 88, 94

RIP 83, 90, 102, 105, 110, 114

Routing Information Protocol, see RIP

routing policy 227

rules, port forwarding 122

s

safety warnings 8

schedule set 411

schedules

content filtering 159

firewalls 143

logs 272

SCR 84, 91, 98

secure gateway address 162

security

network 150

security associations, see VPN

Security Parameter Index 174

Select Mode screen 45

Session Initiation Protocol, see SIP

setup 293

classifiers 226

DHCP 107

firewalls 138, 142, 147

IP alias 110

logs 271

portforwarding121

SNMP 247

static route 205

WAN 78

wizard 60

SHA1 fingerprint 199

shaping traffic 98, 99

Simple Network Management Protocol, see SNMP

Single User Account, see SUA

SIP ALG 127, 229

activation 127

SMT 39, 301

accessing 301

menu items 302

navigation 305

SNMP 39,244

configuration 247

specifications 421

SPI 174

static route 203

activation 204

configuration 205

example 203

status 46, 51, 53

Any IP 54

ATM 299

DSL connections 300

firewalls 52

firmware version 52

LAN 52

packet statistics 55

WAN 52

SUA 118, 119

subset 463

subset mask 102, 113, 464

subsetting 466

Sustain Cell Rate, see SCR

syntax conventions 6

system 264

backing up configuration 289

backup configuration 288

firmware 284, 291

upgrading 286

version 52

name 265

passwords 44

administrator 265

users 265

restoring configuration 285

status 46, 51

firewalls 52

LAN 52

WAN 52

time 266

System Management Terminal

see SMT

System Management Terminal. See SMT.

T

tagging frames 208, 215

Telnet 242

TFTP 289

backing up configuration 289

for backing up configuration file 391

for upgrading firmware 399

upgrading firmware 287

three-way handshake 145

thresholds

DoS 134, 145, 146, 147

P2P 147

time 266

TR-069 39

trademarks 477

trafficpriority207,216

traffic redirect 93, 97

and IP alias 97

and triangle route 97

traffic shaping 98

example 99

transport mode 183

triangle route 139, 151, 152

and traffic redirect 97

solutions 152

trusted CA 195, 198

algorithm 199

exporting 199

importing 196

MD5 fingerprint 199

PEM 199

SHA1 fingerprint 199

tunnel mode 183

group settings 214

management group 213

port settings 215

PVC 208

PVID 216

tagging frames 208, 215

VPI 79,88,95

VPN 161

established in two phases 162

IPSec 161

security associations (SA) 162

see also IKE SA, IPSec SA

U

UBR 84, 90, 100

unicast 76

Universal Plug and Play, see UPnP

upgrading firmware 286, 291

UPnP 251

activation 253

cautions 252

example 253

installation 253

NAT traversal 251

URL 155

using console port 400

W

wall-mounting 427

WAN 75

ATM QoS 84, 90, 99

DNS 80

encapsulation 76, 79, 88

IGMP 77

IP address 76, 80, 88, 95

mode 79, 87

modulation 81

MTU 85, 91

multicast 76,84,90

multiplexing 79, 88, 95

nailed-up connection 80, 89, 96

NAT 89

packet filter 85, 91

RIP 83, 90

setup 78

status 52

traffic shaping 98

example 99

VCI 79,88,95

VPI 79,88,95

warranty 479

note 479

web configurator 39, 43

accessing 43

minimum requirements 43

passwords 44

Wide Area Network, see WAN

wizard 57

configuration 60

V

VBR 99

VBR-nRT 84,90,99

VBR-RT 84,90,99

VCI 79,88,95

Virtual Channel Identifier, see VCI

Virtual Local Area Network, see VLAN

Virtual Path Identifier, see VPI

Virtual Private Network, see VPN

VLAN 207

802.1P priority 207, 216

activation 213

example 209

Table of contents Click a title to access it
Manual assistant
Powered by Anthropic
Waiting for your message
Product information

Brand : ZYXEL

Model : ARMOR Z1 NWD6605

Category : Wi-Fi Router