Page 16 / 427 Scroll up to view Page 11 - 15
P-2602H(W)(L)-DxA Series User’s Guide
16
Table of Contents
16.1.1 IPSec
....................................................................................................
215
16.1.2 Security Association
.............................................................................
215
16.1.3 Other Terminology
................................................................................
215
16.1.3.1 Encryption
...................................................................................
215
16.1.3.2 Data Confidentiality
.....................................................................
216
16.1.3.3 Data Integrity
...............................................................................
216
16.1.3.4 Data Origin Authentication
..........................................................
216
16.1.4 VPN Applications
..................................................................................
216
16.2 IPSec Architecture
.........................................................................................
216
16.2.1 IPSec Algorithms
..................................................................................
217
16.2.2 Key Management
..................................................................................
217
16.3 Encapsulation
.................................................................................................
217
16.3.1 Transport Mode
....................................................................................
218
16.3.2 Tunnel Mode
........................................................................................
218
16.4 IPSec and NAT
...............................................................................................
218
Chapter 17
VPN Screens
.........................................................................................................
221
17.1 VPN/IPSec Overview
.....................................................................................
221
17.2 IPSec Algorithms
............................................................................................
221
17.2.1 AH (Authentication Header) Protocol
....................................................
221
17.2.2 ESP (Encapsulating Security Payload) Protocol
..................................
221
17.3 My IP Address
................................................................................................
222
17.4 Secure Gateway Address
..............................................................................
223
17.4.1 Dynamic Secure Gateway Address
......................................................
223
17.5 VPN Setup Screen
........................................................................................
223
17.6 Keep Alive
......................................................................................................
225
17.7 VPN, NAT, and NAT Traversal
.......................................................................
226
17.8 Remote DNS Server
......................................................................................
227
17.9 ID Type and Content
......................................................................................
227
17.9.1 ID Type and Content Examples
............................................................
229
17.10 Pre-Shared Key
............................................................................................
229
17.11 Editing VPN Policies
....................................................................................
229
17.12
IKE Phases
.................................................................................................
234
17.12.1 Negotiation Mode
................................................................................
235
17.12.2 Diffie-Hellman (DH) Key Groups
.........................................................
236
17.12.3 Perfect Forward Secrecy (PFS)
.........................................................
236
17.13 Configuring Advanced IKE Settings
............................................................
236
17.14 Manual Key Setup
........................................................................................
239
17.14.1 Security Parameter Index (SPI)
.........................................................
239
17.15 Configuring Manual Key
..............................................................................
239
17.16 Viewing SA Monitor
.....................................................................................
242
17.17 Configuring Global Setting
..........................................................................
244
Page 17 / 427
P-2602H(W)(L)-DxA Series User’s Guide
Table of Contents
17
17.18 Telecommuter VPN/IPSec Examples
...........................................................
244
17.18.1 Telecommuters Sharing One VPN Rule Example
..............................
244
17.18.2 Telecommuters Using Unique VPN Rules Example
...........................
245
17.19 VPN and Remote Management
...................................................................
247
Chapter 18
Static Route
..........................................................................................................
249
18.1 Static Route
.................................................................................................
249
18.2 Configuring Static Route
...............................................................................
249
18.2.1 Static Route Edit
..................................................................................
250
Chapter 19
Bandwidth Management
......................................................................................
253
19.1 Bandwidth Management Overview
...............................................................
253
19.2 Application-based Bandwidth Management
...................................................
253
19.3 Subnet-based Bandwidth Management
.........................................................
253
19.4 Application and Subnet-based Bandwidth Management
...............................
254
19.5 Scheduler
.......................................................................................................
254
19.5.1 Priority-based Scheduler
......................................................................
254
19.5.2 Fairness-based Scheduler
....................................................................
255
19.6 Maximize Bandwidth Usage
...........................................................................
255
19.6.1 Reserving Bandwidth for Non-Bandwidth Class Traffic
........................
255
19.6.2 Maximize Bandwidth Usage Example
..................................................
256
19.6.2.1 Priority-based Allotment of Unused and Unbudgeted Bandwidth 256
19.6.2.2 Fairness-based Allotment of Unused and Unbudgeted Bandwidth ...
257
19.6.3 Bandwidth Management Priorities
........................................................
257
19.7 Configuring Summary
...................................................................................
257
19.8 Bandwidth Management Rule Setup
............................................................
259
19.8.1 Rule Configuration
.................................................................................
260
19.9 Bandwidth Monitor
.......................................................................................
262
Chapter 20
Dynamic DNS Setup
.............................................................................................
263
20.1 Dynamic DNS Overview
...............................................................................
263
20.1.1 DYNDNS Wildcard
................................................................................
263
20.2 Configuring Dynamic DNS
............................................................................
263
Chapter 21
Remote Management Configuration
..................................................................
267
21.1 Remote Management Overview
....................................................................
267
21.1.1 Remote Management Limitations
.........................................................
267
21.1.2 Remote Management and NAT
............................................................
268
Page 18 / 427
P-2602H(W)(L)-DxA Series User’s Guide
18
Table of Contents
21.1.3
System Timeout
...................................................................................
268
21.2 WWW
.............................................................................................................
268
21.3 Telnet
..............................................................................................................
269
21.4 Configuring Telnet
..........................................................................................
269
21.5 Configuring FTP
............................................................................................
270
21.6 SNMP
.............................................................................................................
271
21.6.1 Supported MIBs
....................................................................................
272
21.6.2 SNMP Traps
.........................................................................................
273
21.6.3 Configuring SNMP
.................................................................................
273
21.7 Configuring DNS
..........................................................................................
275
21.8 Configuring ICMP
...........................................................................................
275
Chapter 22
Universal Plug-and-Play (UPnP)
.........................................................................
277
22.1 Introducing Universal Plug and Play
.............................................................
277
22.1.1 How do I know if I'm using UPnP?
........................................................
277
22.1.2 NAT Traversal
.......................................................................................
277
22.1.3 Cautions with UPnP
..............................................................................
278
22.2 UPnP and ZyXEL
...........................................................................................
278
22.2.1 Configuring UPnP
.................................................................................
278
22.3 Installing UPnP in Windows Example
............................................................
279
22.4 Using UPnP in Windows XP Example
...........................................................
282
Chapter 23
System
..................................................................................................................
289
23.1 General Setup and System Name
.................................................................
289
23.1.1 General Setup
.......................................................................................
289
23.2 Time Setting
..................................................................................................
291
Chapter 24
Logs
......................................................................................................................
295
24.1 Logs Overview
..............................................................................................
295
24.1.1 Alerts and Logs
.....................................................................................
295
24.2 Viewing the Logs
............................................................................................
295
24.3 Configuring Log Settings
...............................................................................
296
24.4 SMTP Error Messages
...................................................................................
299
24.4.1 Example E-mail Log
..............................................................................
299
Chapter 25
Tools
......................................................................................................................
301
25.1 Introduction
....................................................................................................
301
25.2 Filename Conventions
...................................................................................
301
25.3 File Maintenance Over WAN
..........................................................................
302
Page 19 / 427
P-2602H(W)(L)-DxA Series User’s Guide
Table of Contents
19
25.4 Firmware Upgrade Screen
...........................................................................
302
25.5 Backup and Restore
......................................................................................
304
25.5.1 Backup Configuration
..........................................................................
305
25.5.2 Restore Configuration
..........................................................................
305
25.5.3 Reset to Factory Defaults
....................................................................
307
25.6 Restart
............................................................................................................
307
25.7 Using FTP or TFTP to Back Up Configuration
...............................................
308
25.7.1 Using the FTP Commands to Back Up Configuration
..........................
308
25.7.2 FTP Command
Configuration Backup Example
..................................
308
25.7.3 Configuration Backup Using GUI-based FTP Clients
...........................
309
25.7.4 Backup Configuration Using TFTP
.......................................................
309
25.7.5 TFTP Command Configuration Backup Example
.................................
310
25.7.6 Configuration Backup Using GUI-based TFTP Clients
.........................
310
25.8 Using FTP or TFTP to Restore Configuration
..............................................
310
25.8.1 Restore Using FTP Session Example
..................................................
311
25.9 FTP and TFTP Firmware and Configuration File Uploads
.............................
311
25.9.1 FTP File Upload Command from the DOS Prompt Example
................
311
25.9.2 FTP Session Example of Firmware File Upload
...................................
312
25.9.3 TFTP File Upload
..................................................................................
312
25.9.4 TFTP Upload Command Example
........................................................
313
Chapter 26
Diagnostic
............................................................................................................
315
26.1 General Diagnostic
........................................................................................
315
26.2 DSL Line Diagnostic
.....................................................................................
315
Chapter 27
Troubleshooting
...................................................................................................
319
27.1 Problems Starting Up the ZyXEL Device
.......................................................
319
27.2 Problems with the LAN
...................................................................................
319
27.3 Problems with the WAN
.................................................................................
320
27.4 Problems Accessing the ZyXEL Device
.........................................................
321
27.4.1 Pop-up Windows, JavaScripts and Java Permissions
..........................
321
27.4.1.1 Internet Explorer Pop-up Blockers
..............................................
322
27.4.1.2 JavaScripts
..................................................................................
325
27.4.1.3 Java Permissions
........................................................................
327
27.5 Telephone Problems
......................................................................................
329
27.6 Problems With Multiple SIP Accounts
............................................................
330
27.6.1 Outgoing Calls
......................................................................................
330
27.6.2 Incoming Calls
......................................................................................
331
Appendix A
Product Specifications
.......................................................................................
333
Page 20 / 427
P-2602H(W)(L)-DxA Series User’s Guide
20
Table of Contents
P-2602HWL Series Power Adaptor Specifications
.................................................
336
Appendix B
Splitters and Microfilters
.....................................................................................
339
Connecting a POTS Splitter
...................................................................................
339
Telephone Microfilters
............................................................................................
339
ZyXEL Device With ISDN
.......................................................................................
340
Appendix C
Setting up Your Computer’s IP Address
............................................................
341
Windows 95/98/Me
.................................................................................................
341
Configuring
......................................................................................................
343
Verifying Settings
.............................................................................................
344
Windows 2000/NT/XP
............................................................................................
344
Verifying Settings
.............................................................................................
348
Macintosh OS 8/9
...................................................................................................
349
Verifying Settings
.............................................................................................
350
Macintosh OS X
.....................................................................................................
350
Verifying Settings
.............................................................................................
351
Appendix D
IP Addresses and Subnetting
.............................................................................
353
Introduction to IP Addresses
..................................................................................
353
IP Address Classes and Hosts
........................................................................
353
Subnet Masks
........................................................................................................
355
Subnetting
..............................................................................................................
355
Example: Two Subnets
..........................................................................................
356
Example: Four Subnets
..........................................................................................
357
Example Eight Subnets
..........................................................................................
358
Subnetting With Class A and Class B Networks
....................................................
359
Appendix E
Wireless LANs
......................................................................................................
361
Wireless LAN Topologies
.......................................................................................
361
Ad-hoc Wireless LAN Configuration
................................................................
361
BSS
..................................................................................................................
361
ESS
..................................................................................................................
362
Channel
..................................................................................................................
363
RTS/CTS
................................................................................................................
363
Fragmentation Threshold
.......................................................................................
364
Preamble Type
.......................................................................................................
365
IEEE 802.1x
...........................................................................................................
366

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top