prestige 334 user's guide.pdf

395
Prestige 334 Intelligent Broadband Sharing Gateway User’s Guide Version 3.60 December 2003

Upload: stefanmircea265

Post on 10-Sep-2015

272 views

Category:

Documents


11 download

TRANSCRIPT

  • Prestige 334 Intelligent Broadband Sharing Gateway

    Users Guide Version 3.60

    December 2003

  • Prestige 334 Users Guide

    ii Copyright

    Copyright Copyright 2003 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.

    Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.

    Trademarks Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.

  • Prestige 334 Users Guide

    FCC iii

    Federal Communications Commission (FCC) Interference Statement

    This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: This device may not cause harmful interference. This device must accept any interference received, including interference that may cause undesired operations. This equipment has been tested and found to comply with the limits for a CLASS B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help.

    Notice 1 Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.

    Certifications 1. Go to www.zyxel.com. 2. Select your product from the drop-down list box on the ZyXEL home page to go to that product's page. 3. Select the certification you wish to view from this page.

  • Prestige 334 Users Guide

    iv Information for Canadian Users

    Information for Canadian Users The Industry Canada label identifies certified equipment. This certification means that the equipment meets certain telecommunications network protective, operation, and safety requirements. The Industry Canada does not guarantee that the equipment will operate to a user's satisfaction. Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. In some cases, the company's inside wiring associated with a single line individual service may be extended by means of a certified connector assembly. The customer should be aware that the compliance with the above conditions may not prevent degradation of service in some situations. Repairs to certified equipment should be made by an authorized Canadian maintenance facility designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment. For their own protection, users should ensure that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas.

    Caution Users should not attempt to make such connections themselves, but should contact the appropriate electrical inspection authority, or electrician, as appropriate.

    Note This digital apparatus does not exceed the class A limits for radio noise emissions from digital apparatus set out in the radio interference regulations of Industry Canada.

  • Prestige 334 Users Guide

    Warranty v

    ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.

    NOTE Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser. To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.

    Online Registration Register online registration at www.zyxel.com for free future product updates and information.

  • Prestige 334 Users Guide

    vi Customer Support

    Customer Support When you contact your customer support representative please have the following information ready: Please have the following information ready when you contact customer support. Product model and serial number. Warranty Information. Date that you received your device. Brief description of the problem and the steps you took to solve it.

    METHOD

    LOCATION

    E-MAIL SUPPORT/SALES

    TELEPHONE/FAX WEB SITE/ FTP SITE REGULAR MAIL

    [email protected]

    +886-3-578-3942 www.zyxel.com

    www.europe.zyxel.com

    ftp.zyxel.com

    WORLDWIDE

    [email protected] +886-3-578-2439 ftp.europe.zyxel.com

    ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu 300, Taiwan.

    [email protected] +1-800-255-4101 www.us.zyxel.com NORTH AMERICA

    [email protected] +1-714-632-0858 ftp.us.zyxel.com

    ZyXEL Communications Inc., 1130 N. Miller St. Anaheim, CA 92806, U.S.A.

    [email protected] +45-3955-0700 www.zyxel.dk SCANDINAVIA

    [email protected] +45-3955-0707 ftp.zyxel.dk

    ZyXEL Communications A/S, Columbusvej 5, 2860 Soeborg, Denmark.

    [email protected] +49-2405-6909-0 www.zyxel.de GERMANY [email protected] +49-2405-6909-99

    ZyXEL Deutschland GmbH. Adenauerstr. 20/A2 D-52146 Wuerselen, Germany

  • Prestige 334 Users Guide

    Table of Contents vii

    Table of Contents

    Copyright......................................................................................................................................................ii Federal Communications Commission (FCC) Interference Statement................................................. iii Information for Canadian Users ...............................................................................................................iv ZyXEL Limited Warranty ..........................................................................................................................v Customer Support ......................................................................................................................................vi List of Figures .......................................................................................................................................... xiii List of Tables .............................................................................................................................................xix Preface .................................................................................................................................................... xxiii

    Getting Started ................................................................................................................................................. I Chapter 1 Getting to Know Your Prestige ............................................................................................. 1-1

    1.1 Prestige Internet Security Gateway Overview ........................................................................... 1-1 1.2 Prestige Features ........................................................................................................................ 1-1 1.3 Applications for the Prestige ...................................................................................................... 1-4

    Chapter 2 Introducing the Web Configurator ...................................................................................... 2-1 2.1 Web Configurator Overview...................................................................................................... 2-1 2.2 Accessing the Prestige Web Configurator.................................................................................. 2-1 2.3 Resetting the Prestige................................................................................................................. 2-2 2.4 Navigating the Prestige Web Configurator ................................................................................ 2-2

    Chapter 3 Wizard Setup.......................................................................................................................... 3-1 3.1 Wizard Setup Overview ............................................................................................................. 3-1 3.2 Wizard Setup: General Setup and System Name ....................................................................... 3-1 3.3 Wizard Setup: Screen 2 .............................................................................................................. 3-2 3.4 Wizard Setup: Screen 3 .............................................................................................................. 3-7 3.5 Basic Setup Complete .............................................................................................................. 3-11

    System, LAN and WAN ..................................................................................................................................II Chapter 4 System Screens ....................................................................................................................... 4-1

    4.1 System Overview ....................................................................................................................... 4-1 4.2 Configuring General Setup......................................................................................................... 4-1 4.3 Dynamic DNS ............................................................................................................................ 4-2 4.4 Configuring Dynamic DNS........................................................................................................ 4-3 4.5 Configuring Password................................................................................................................ 4-4 4.6 Configuring Time Setting........................................................................................................... 4-5

    Chapter 5 LAN Screens........................................................................................................................... 5-1 5.1 LAN Overview........................................................................................................................... 5-1 5.2 DHCP Setup............................................................................................................................... 5-1 5.3 LAN TCP/IP .............................................................................................................................. 5-1 5.4 Configuring IP............................................................................................................................ 5-3 5.5 Configuring IP Alias .................................................................................................................. 5-6

  • Prestige 334 Users Guide

    viii Table of Contents

    Chapter 6 WAN Screens...........................................................................................................................6-1 6.1 WAN Overview ..........................................................................................................................6-1 6.2 TCP/IP Priority (Metric) .............................................................................................................6-1 6.3 Configuring Route ......................................................................................................................6-1 6.4 Configuring WAN ISP................................................................................................................6-2 6.5 Configuring WAN IP..................................................................................................................6-7 6.6 Configuring WAN MAC ..........................................................................................................6-11 6.7 Traffic Redirect.........................................................................................................................6-12 6.8 Configuring Traffic Redirect ....................................................................................................6-13

    NAT and Static Route ................................................................................................................................... III Chapter 7 Network Address Translation (NAT) Screens ......................................................................7-1

    7.1 NAT Overview ...........................................................................................................................7-1 7.2 Using NAT..................................................................................................................................7-6 7.3 SUA Server .................................................................................................................................7-6 7.4 Configuring SUA Server.............................................................................................................7-8 7.5 Configuring Address Mapping..................................................................................................7-10 7.6 Trigger Port Forwarding ...........................................................................................................7-13 7.7 Configuring Trigger Port Forwarding.......................................................................................7-14

    Chapter 8 Static Route Screens ...............................................................................................................8-1 8.1 Static Route Overview ................................................................................................................8-1 8.2 Configuring IP Static Route........................................................................................................8-1

    UPnP and Firewall .........................................................................................................................................IV Chapter 9 UPnP........................................................................................................................................9-1

    9.1 Universal Plug and Play Overview .............................................................................................9-1 9.2 UPnP and ZyXEL .......................................................................................................................9-2 9.3 Configuring UPnP.......................................................................................................................9-2 9.4 Installing UPnP in Windows Example........................................................................................9-4 9.5 Using UPnP in Windows XP Example .......................................................................................9-6

    Chapter 10 Firewall................................................................................................................................10-1 10.1 Introduction...........................................................................................................................10-1 10.2 Firewall Settings Screen .......................................................................................................10-3 10.3 The Firewall, NAT and Remote Management ......................................................................10-5 10.4 Configuring Content Filtering...............................................................................................10-6 10.5 Services.................................................................................................................................10-8

    Remote Management and VPN/IPSec........................................................................................................... V Chapter 11 Remote Management Screens............................................................................................ 11-1

    11.1 Remote Management Overview............................................................................................11-1 11.2 Configuring WWW...............................................................................................................11-2 11.3 Configuring Telnet................................................................................................................11-3 11.4 Configuring TELNET...........................................................................................................11-4 11.5 Configuring FTP ...................................................................................................................11-5

  • Prestige 334 Users Guide

    Table of Contents ix

    11.6 SNMP................................................................................................................................... 11-6 11.7 Configuring DNS ............................................................................................................... 11-10 11.8 Configuring Security .......................................................................................................... 11-11

    Chapter 12 Introduction to IPSec......................................................................................................... 12-1 12.1 VPN Overview..................................................................................................................... 12-1 12.2 IPSec Architecture ............................................................................................................... 12-3 12.3 Encapsulation ....................................................................................................................... 12-4 12.4 IPSec and NAT .................................................................................................................... 12-5

    Chapter 13 VPN Screens ....................................................................................................................... 13-1 13.1 VPN/IPSec Overview........................................................................................................... 13-1 13.2 IPSec Algorithms ................................................................................................................. 13-1 13.3 My IP Address...................................................................................................................... 13-2 13.4 Secure Gateway Address...................................................................................................... 13-2 13.5 Summary Screen .................................................................................................................. 13-3 13.6 Keep Alive ........................................................................................................................... 13-5 13.7 NAT Traversal ..................................................................................................................... 13-6 13.8 ID Type and Content ............................................................................................................ 13-8 13.9 Pre-Shared Key .................................................................................................................. 13-10 13.10 Editing VPN Rules............................................................................................................. 13-10 13.11 IKE Phases ......................................................................................................................... 13-15 13.12 Configuring Advanced IKE Settings.................................................................................. 13-18 13.13 Manual Key Setup.............................................................................................................. 13-25 13.14 Configuring Manual Key ................................................................................................... 13-26 13.15 Viewing SA Monitor.......................................................................................................... 13-30 13.16 Configuring Global Setting ................................................................................................ 13-32 13.17 Telecommuter VPN/IPSec Examples ................................................................................ 13-33 13.18 VPN and Remote Management.......................................................................................... 13-36

    Logs and Maintenance.................................................................................................................................. VI Chapter 14 Centralized Logs ................................................................................................................ 14-1

    14.1 View Log.............................................................................................................................. 14-1 14.2 Log Settings ......................................................................................................................... 14-2

    Chapter 15 Maintenance ....................................................................................................................... 15-1 15.1 Maintenance Overview ........................................................................................................ 15-1 15.2 Status Screen ........................................................................................................................ 15-1 15.3 DHCP Table Screen ............................................................................................................. 15-4 15.4 F/W Upload Screen .............................................................................................................. 15-5 15.5 Configuration Screen............................................................................................................ 15-7 15.6 Restart Screen..................................................................................................................... 15-10

    SMT General Configuration .......................................................................................................................VII Chapter 16 Introducing the SMT......................................................................................................... 16-1

    16.1 SMT Introduction................................................................................................................. 16-1

  • Prestige 334 Users Guide

    x Table of Contents

    16.2 Navigating the SMT Interface...............................................................................................16-4 16.3 Changing the System Password ............................................................................................16-6

    Chapter 17 Menu 1 General Setup .......................................................................................................17-1 17.1 General Setup........................................................................................................................17-1 17.2 Procedure To Configure Menu 1 ..........................................................................................17-1

    Chapter 18 Menu 2 WAN Setup............................................................................................................18-1 18.1 Introduction to WAN ............................................................................................................18-1 18.2 WAN Setup...........................................................................................................................18-1

    Chapter 19 Menu 3 LAN Setup.............................................................................................................19-1 19.1 LAN Setup ............................................................................................................................19-1 19.2 Protocol Dependent Ethernet Setup ......................................................................................19-2 19.3 TCP/IP Ethernet Setup and DHCP........................................................................................19-2

    Chapter 20 Internet Access....................................................................................................................20-1 20.1 Introduction to Internet Access Setup ...................................................................................20-1 20.2 Ethernet Encapsulation .........................................................................................................20-1 20.3 Configuring the PPTP Client ................................................................................................20-3 20.4 Configuring the PPPoE Client ..............................................................................................20-4 20.5 Basic Setup Complete ...........................................................................................................20-5

    Chapter 21 Remote Node Configuration..............................................................................................21-1 21.1 Introduction to Remote Node Setup......................................................................................21-1 21.2 Remote Node Profile Setup...................................................................................................21-1 21.3 Edit IP ...................................................................................................................................21-7 21.4 Remote Node Filter...............................................................................................................21-9

    Chapter 22 Static Route Setup ..............................................................................................................22-1 22.1 IP Static Route Setup ............................................................................................................22-1

    Chapter 23 Network Address Translation (NAT) ................................................................................23-1 23.1 Using NAT............................................................................................................................23-1 23.2 Applying NAT ......................................................................................................................23-1 23.3 NAT Setup ............................................................................................................................23-3 23.4 Configuring a Server behind NAT........................................................................................23-9 23.5 General NAT Examples ......................................................................................................23-10 23.6 Configuring Trigger Port Forwarding.................................................................................23-18

    Chapter 24 Enabling the Firewall .........................................................................................................24-1 24.1 Remote Management and the Firewall .................................................................................24-1 24.2 Access Methods ....................................................................................................................24-1 24.3 Enabling the Firewall ............................................................................................................24-1

    SMT Advanced Management.....................................................................................................................VIII Chapter 25 Filter Configuration ...........................................................................................................25-1

    25.1 Introduction to Filters ...........................................................................................................25-1 25.2 Configuring a Filter Set ........................................................................................................25-4 25.3 Example Filter.....................................................................................................................25-13

  • Prestige 334 Users Guide

    Table of Contents xi

    25.4 Filter Types and NAT ........................................................................................................ 25-15 25.5 Firewall Versus Filters ....................................................................................................... 25-16 25.6 Applying a Filter ................................................................................................................ 25-16

    Chapter 26 SNMP Configuration ......................................................................................................... 26-1 26.1 About SNMP........................................................................................................................ 26-1 26.2 Supported MIBs ................................................................................................................... 26-2 26.3 SNMP Configuration............................................................................................................ 26-2 26.4 SNMP Traps......................................................................................................................... 26-4

    Chapter 27 System Information and Diagnosis................................................................................... 27-1 27.1 System Status ....................................................................................................................... 27-1 27.2 System Information.............................................................................................................. 27-3 27.3 Log and Trace ...................................................................................................................... 27-5 27.4 Diagnostic ............................................................................................................................ 27-9

    Chapter 28 Firmware and Configuration File Maintenance ............................................................. 28-1 28.1 Filename Conventions.......................................................................................................... 28-1 28.2 Backup Configuration .......................................................................................................... 28-2 28.3 Restore Configuration .......................................................................................................... 28-6 28.4 Uploading Firmware and Configuration Files...................................................................... 28-8

    Chapter 29 System Maintenance.......................................................................................................... 29-1 29.1 Command Interpreter Mode ................................................................................................. 29-1 29.2 Call Control Support ............................................................................................................ 29-2 29.3 Time and Date Setting.......................................................................................................... 29-4

    Chapter 30 Remote Management......................................................................................................... 30-1 30.1 Remote Management............................................................................................................ 30-1

    Chapter 31 Call Scheduling .................................................................................................................. 31-1 31.1 Introduction to Call Scheduling ........................................................................................... 31-1

    SMT VPN/IPSec ............................................................................................................................................ IX Chapter 32 VPN/IPSec Setup ............................................................................................................... 32-1

    32.1 VPN/IPSec Overview........................................................................................................... 32-1 32.2 IPSec Summary Screen ........................................................................................................ 32-2 32.3 IPSec Setup .......................................................................................................................... 32-5 32.4 IKE Setup........................................................................................................................... 32-10 32.5 Manual Setup ..................................................................................................................... 32-13

    Chapter 33 SA Monitor ......................................................................................................................... 33-1 33.1 SA Monitor Overview.......................................................................................................... 33-1 33.2 Using SA Monitor ................................................................................................................ 33-1

    Appendices and Index.....................................................................................................................................X Appendix A PPPoE ..................................................................................................................................A-1 Appendix B PPTP....................................................................................................................................B-1 Appendix C NetBIOS Filter Commands ...............................................................................................C-1 Appendix D Log Descriptions.................................................................................................................D-1

  • Prestige 334 Users Guide

    xii Table of Contents

    Appendix E Setting up Your Computers IP Address........................................................................... E-1 Appendix F Brute-Force Password Guessing Protection ..................................................................... F-1 Appendix G Triangle Route ....................................................................................................................G-1 Appendix H Index ...................................................................................................................................H-1

  • Prestige 334 Users Guide

    List of Figures xiii

    List of Figures Figure 1-1 Secure Internet Access via Cable, DSL or Wireless Modem........................................................ 1-5 Figure 1-2 VPN Application .......................................................................................................................... 1-5 Figure 2-1 Change Password Screen.............................................................................................................. 2-1 Figure 2-2 The MAIN MENU Screen of the Web Configurator.................................................................... 2-3 Figure 3-1 Wizard 1 ....................................................................................................................................... 3-2 Figure 3-2 Wizard 2: Ethernet Encapsulation ................................................................................................ 3-3 Figure 3-3 Wizard2: PPPoE Encapsulation.................................................................................................... 3-5 Figure 3-4 Wizard 2: PPTP Encapsulation..................................................................................................... 3-6 Figure 3-5 Wizard 3 ..................................................................................................................................... 3-10 Figure 4-1 System General Setup .................................................................................................................. 4-1 Figure 4-2 DDNS........................................................................................................................................... 4-3 Figure 4-3 Password....................................................................................................................................... 4-5 Figure 4-4 Time Setting ................................................................................................................................. 4-6 Figure 5-1 IP .................................................................................................................................................. 5-3 Figure 5-2 IP Alias ......................................................................................................................................... 5-6 Figure 6-1 WAN: Route ................................................................................................................................... 6-2 Figure 6-2 Ethernet Encapsulation.................................................................................................................... 6-3 Figure 6-3 PPPoE Encapsulation...................................................................................................................... 6-5 Figure 6-4 PPTP Encapsulation........................................................................................................................ 6-6 Figure 6-5 WAN: IP......................................................................................................................................... 6-8 Figure 6-6 MAC Setup ...................................................................................................................................6-11 Figure 6-7 Traffic Redirect WAN Setup....................................................................................................... 6-12 Figure 6-8 Traffic Redirect LAN Setup ....................................................................................................... 6-12 Figure 6-9 WAN: Traffic Redirect .................................................................................................................. 6-13 Figure 7-1 How NAT Works .......................................................................................................................... 7-3 Figure 7-2 NAT Application With IP Alias .................................................................................................... 7-4 Figure 7-3 Multiple Servers Behind NAT Example ....................................................................................... 7-8 Figure 7-4 SUA/NAT Setup ........................................................................................................................... 7-9 Figure 7-5 Address Mapping........................................................................................................................ 7-10 Figure 7-6 Address Mapping Edit ................................................................................................................ 7-12 Figure 7-7 Trigger Port Forwarding Process: Example................................................................................ 7-13 Figure 7-8 Trigger Port ................................................................................................................................ 7-15 Figure 8-1 Example of Static Routing Topology............................................................................................ 8-1 Figure 8-2 Static Route .................................................................................................................................. 8-2 Figure 8-3 Static Route: Edit.......................................................................................................................... 8-3 Figure 9-1 Configuring UPnP ........................................................................................................................ 9-3 Figure 10-1 Firewall: Settings...................................................................................................................... 10-3 Figure 10-2 Firewall Rule Directions........................................................................................................... 10-5

  • Prestige 334 Users Guide

    xiv List of Figures

    Figure 10-3 Firewall: Filter...........................................................................................................................10-7 Figure 10-4 Firewall: Service .......................................................................................................................10-9 Figure 11-1 Remote Management: WWW ...................................................................................................11-3 Figure 11-2 Telnet Configuration on a TCP/IP Network ..............................................................................11-4 Figure 11-3 Remote Management: Telnet.....................................................................................................11-4 Figure 11-4 Remote Management: FTP........................................................................................................11-6 Figure 11-5 SNMP Management Model.......................................................................................................11-7 Figure 11-6 Remote Management: SNMP....................................................................................................11-9 Figure 11-7 Remote Management: DNS..................................................................................................... 11-11 Figure 11-8 Security ...................................................................................................................................11-12 Figure 12-1 Encryption and Decryption .......................................................................................................12-2 Figure 12-2 IPSec Architecture.....................................................................................................................12-3 Figure 12-3 Transport and Tunnel Mode IPSec Encapsulation.....................................................................12-4 Figure 13-1 IPSec Summary Fields ..............................................................................................................13-3 Figure 13-2 VPN: Summary .........................................................................................................................13-4 Figure 13-3 NAT Router Between IPSec Routers.........................................................................................13-6 Figure 13-4 VPN Host using Intranet DNS Server Example........................................................................13-7 Figure 13-5 VPN: Rule Setup (Basic).........................................................................................................13-11 Figure 13-6 Two Phases to Set Up the IPSec SA........................................................................................13-16 Figure 13-7 VPN IKE: Advanced ...............................................................................................................13-19 Figure 13-8 Rule Setup: Manual.................................................................................................................13-27 Figure 13-9 SA Monitor..............................................................................................................................13-31 Figure 13-10 VPN: Global Setting .............................................................................................................13-32 Figure 13-11 Telecommuters Sharing One VPN Rule Example.................................................................13-34 Figure 13-12 Telecommuters Using Unique VPN Rules Example .............................................................13-35 Figure 14-1 View Log...................................................................................................................................14-1 Figure 14-2 Log Settings ..............................................................................................................................14-3 Figure 15-1 System Status ............................................................................................................................15-1 Figure 15-2 System Status: Show Statistics..................................................................................................15-3 Figure 15-3 DHCP Table ..............................................................................................................................15-4 Figure 15-4 Firmware Upload ......................................................................................................................15-5 Figure 15-5 Firmware Upload ......................................................................................................................15-6 Figure 15-6 Firmware Upload In Process .....................................................................................................15-6 Figure 15-7 Network Temporarily Disconnected..........................................................................................15-6 Figure 15-8 Firmware Upload Error .............................................................................................................15-7 Figure 15-9 Configuration ............................................................................................................................15-8 Figure 15-10 Configuration Upload Successful............................................................................................15-9 Figure 15-11 Network Temporarily Disconnected........................................................................................15-9 Figure 15-12 Restore Configuration Error..................................................................................................15-10 Figure 15-13 Reset Warning Message ........................................................................................................15-10 Figure 15-14 Restart ...................................................................................................................................15-11

  • Prestige 334 Users Guide

    List of Figures xv

    Figure 16-1 Login Screen ............................................................................................................................ 16-2 Figure 16-2 SMT Menu Overview............................................................................................................... 16-3 Figure 16-3 SMT Main Menu ...................................................................................................................... 16-5 Figure 16-4 Menu 23 System Password....................................................................................................... 16-6 Figure 17-1 Menu 1 General Setup.............................................................................................................. 17-2 Figure 17-2 Menu 1.1 Configure Dynamic DNS......................................................................................... 17-4 Figure 18-1 Menu 2 WAN Setup.................................................................................................................. 18-1 Figure 19-1 Menu 3 LAN Setup .................................................................................................................. 19-1 Figure 19-2 Menu 3.1 LAN Port Filter Setup .............................................................................................. 19-1 Figure 19-3 Menu 3.2 TCP/IP and DHCP Ethernet Setup ........................................................................... 19-2 Figure 19-4 Menu 3.2.1: IP Alias Setup....................................................................................................... 19-5 Figure 20-1 Menu 4 Internet Access Setup .................................................................................................. 20-1 Figure 20-2 Internet Access Setup (PPTP)................................................................................................... 20-4 Figure 20-3 Internet Access Setup (PPPoE)................................................................................................. 20-5 Figure 21-1 Menu 11.1 Remote Node Profile for Ethernet Encapsulation .................................................. 21-2 Figure 21-2 Menu 11.1 Remote Node Profile for PPPoE Encapsulation..................................................... 21-4 Figure 21-3 Menu 11.1 Remote Node Profile for PPTP Encapsulation ....................................................... 21-6 Figure 21-4 Menu 11.3 Remote Node Network Layer Options for Ethernet Encapsulation........................ 21-7 Figure 21-5 Menu 11.5: Remote Node Filter (Ethernet Encapsulation)....................................................... 21-9 Figure 21-6 Menu 11.5: Remote Node Filter (PPPoE or PPTP Encapsulation)......................................... 21-10 Figure 21-7 Menu 11.6: Traffic Redirect Setup ......................................................................................... 21-10 Figure 22-1 Menu 12 IP Static Route Setup................................................................................................. 22-1 Figure 22-2 Menu12.1 Edit IP Static Route ................................................................................................. 22-2 Figure 23-1 Menu 4 Applying NAT for Internet Access .............................................................................. 23-2 Figure 23-2 Menu 11.3 Applying NAT to the Remote Node ....................................................................... 23-3 Figure 23-3 Menu 15 NAT Setup................................................................................................................. 23-4 Figure 23-4 Menu 15.1 Address Mapping Sets............................................................................................ 23-4 Figure 23-5 Menu 15.1.255 SUA Address Mapping Rules.......................................................................... 23-5 Figure 23-6 Menu 15.1.1 First Set ............................................................................................................... 23-6 Figure 23-7 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set .............................................. 23-8 Figure 23-8 Menu 15.2.1 NAT Server Setup................................................................................................ 23-9 Figure 23-9 Multiple Servers Behind NAT Example ................................................................................. 23-10 Figure 23-10 NAT Example 1 .................................................................................................................... 23-10 Figure 23-11 Menu 4 Internet Access & NAT Example..............................................................................23-11 Figure 23-12 NAT Example 2 .....................................................................................................................23-11 Figure 23-13 Menu 15.2.1 Specifying an Inside Server............................................................................. 23-12 Figure 23-14 NAT Example 3 .................................................................................................................... 23-13 Figure 23-15 Example 3: Menu 11.3.......................................................................................................... 23-14 Figure 23-16 Example 3: Menu 15.1.1.1 ................................................................................................... 23-14 Figure 23-17 Example 3: Final Menu 15.1.1 ............................................................................................. 23-15 Figure 23-18 NAT Example 4 .................................................................................................................... 23-16

  • Prestige 334 Users Guide

    xvi List of Figures

    Figure 23-19 Example 4: Menu 15.1.1.1 Address Mapping Rule...............................................................23-17 Figure 23-20 Example 4: Menu 15.1.1 Address Mapping Rules ................................................................23-17 Figure 23-21 Menu 15.3 Trigger Port Setup ...............................................................................................23-18 Figure 24-1 Menu 21.2 Firewall Setup .........................................................................................................24-2 Figure 25-1 Outgoing Packet Filtering Process ............................................................................................25-2 Figure 25-2 Filter Rule Process ....................................................................................................................25-3 Figure 25-4 Menu 21: Filter and Firewall Setup...........................................................................................25-4 Figure 25-5 Menu 21.1: Filter Set Configuration .........................................................................................25-4 Figure 25-6 Menu 21.1.1.1 TCP/IP Filter Rule.............................................................................................25-7 Figure 25-7 Executing an IP Filter..............................................................................................................25-10 Figure 25-8 Menu 21.1.4.1 Generic Filter Rule..........................................................................................25-11 Figure 25-9 Telnet Filter Example ..............................................................................................................25-13 Figure 25-10 Example Filter: Menu 21.1.3.1..............................................................................................25-14 Figure 25-11 Example Filter Rules Summary: Menu 21.1.3 ......................................................................25-15 Figure 25-12 Protocol and Device Filter Sets.............................................................................................25-16 Figure 25-13 Filtering LAN Traffic ............................................................................................................25-17 Figure 25-14 Filtering Remote Node Traffic ..............................................................................................25-18 Figure 26-1 SNMP Management Model.......................................................................................................26-1 Figure 26-2 Menu 22 SNMP Configuration .................................................................................................26-3 Figure 27-1 Menu 24 System Maintenance ..................................................................................................27-1 Figure 27-2 Menu 24.1 System Maintenance : Status ..................................................................................27-2 Figure 27-3 Menu 24.2 System Information and Console Port Speed..........................................................27-3 Figure 27-4 Menu 24.2.1 System Maintenance : Information ......................................................................27-4 Figure 27-5 Menu 24.2.2 System Maintenance : Change Console Port Speed.............................................27-5 Figure 27-6 Menu 24.3.2 System Maintenance : Syslog Logging................................................................27-5 Figure 27-7 Call-Triggering Packet Example ...............................................................................................27-9 Figure 27-8 Menu 24.4 System Maintenance : Diagnostic.........................................................................27-10 Figure 27-9 LAN & WAN DHCP...............................................................................................................27-10 Figure 28-1 Telnet in Menu 24.5 ..................................................................................................................28-3 Figure 28-2 FTP Session Example................................................................................................................28-4 Figure 28-3 Telnet into Menu 24.6 ...............................................................................................................28-7 Figure 28-4 Restore Using FTP Session Example ........................................................................................28-8 Figure 28-5 Telnet Into Menu 24.7.1 Upload System Firmware ..................................................................28-9 Figure 28-6 Telnet Into Menu 24.7.2 System Maintenance ..........................................................................28-9 Figure 28-7 FTP Session Example of Firmware File Upload .....................................................................28-10 Figure 29-1 Command Mode in Menu 24 ....................................................................................................29-1 Figure 29-2 Valid Commands .......................................................................................................................29-2 Figure 29-3 Menu 24.9 System Maintenance : Call Control ........................................................................29-2 Figure 29-4 Budget Management .................................................................................................................29-3 Figure 29-5 Call History ...............................................................................................................................29-4 Figure 29-6 Menu 24: System Maintenance .................................................................................................29-5

  • Prestige 334 Users Guide

    List of Figures xvii

    Figure 29-7 Menu 24.10 System Maintenance: Time and Date Setting....................................................... 29-5 Figure 30-1 Menu 24.11 Remote Management Control............................................................................ 30-1 Figure 31-1 Menu 26 Schedule Setup .......................................................................................................... 31-1 Figure 31-2 Menu 26.1 Schedule Set Setup................................................................................................. 31-2 Figure 31-3 Applying Schedule Set(s) to a Remote Node (PPPoE)............................................................. 31-4 Figure 32-1 VPN SMT Menu Tree............................................................................................................... 32-1 Figure 32-2 Menu 27 VPN/IPSec Setup ...................................................................................................... 32-2 Figure 32-3 Menu 27.1 IPSec Summary...................................................................................................... 32-2 Figure 32-4 Menu 27.1.1 IPSec Setup ......................................................................................................... 32-6 Figure 32-5 Menu 27.1.1.1 IKE Setup ............................................................................................................32-11 Figure 32-6 Menu 27.1.1.2 Manual Setup ................................................................................................. 32-14 Figure 33-1 Menu 27.2 SA Monitor............................................................................................................. 33-1

  • Prestige 334 Users Guide

    List of Tables xix

    List of Tables Table 2-1 Screens Summary........................................................................................................................... 2-3 Table 3-1 Ethernet Encapsulation .................................................................................................................. 3-3 Table 3-2 PPPoE Encapsulation..................................................................................................................... 3-5 Table 3-3 PPTP Encapsulation ....................................................................................................................... 3-7 Table 3-4 Private IP Address Ranges ............................................................................................................. 3-8 Table 3-5 Example of Network Properties for LAN Servers with Fixed IP Addresses.................................. 3-9 Table 3-6 WAN Setup .................................................................................................................................. 3-10 Table 4-1 System General Setup .................................................................................................................... 4-1 Table 4-2 DDNS............................................................................................................................................. 4-4 Table 4-3 Password ........................................................................................................................................ 4-5 Table 4-4 Time Setting................................................................................................................................... 4-6 Table 5-1 IP.................................................................................................................................................... 5-3 Table 5-2 IP Alias........................................................................................................................................... 5-6 Table 6-1 WAN: Route..................................................................................................................................... 6-2 Table 6-2 Ethernet Encapsulation ..................................................................................................................... 6-3 Table 6-3 PPPoE Encapsulation ....................................................................................................................... 6-5 Table 6-4 PPTP Encapsulation ......................................................................................................................... 6-7 Table 6-5 WAN: IP .......................................................................................................................................... 6-8 Table 6-6 WAN: Traffic Redirect.................................................................................................................... 6-13 Table 7-1 NAT Definitions............................................................................................................................. 7-1 Table 7-2 NAT Mapping Types ...................................................................................................................... 7-5 Table 7-3 Services and Port Numbers ............................................................................................................ 7-7 Table 7-4 SUA/NAT Setup............................................................................................................................. 7-9 Table 7-5 Address Mapping ..........................................................................................................................7-11 Table 7-6 Address Mapping Edit.................................................................................................................. 7-12 Table 7-7 Trigger Port .................................................................................................................................. 7-15 Table 8-1 Static Route.................................................................................................................................... 8-2 Table 8-2 Static Route: Edit ........................................................................................................................... 8-3 Table 9-1 Configuring UPnP.......................................................................................................................... 9-3 Table 10-1 Firewall: Settings ....................................................................................................................... 10-4 Table 10-2 Firewall: Filter ........................................................................................................................... 10-7 Table 10-3 Firewall: Service ........................................................................................................................ 10-9 Table 11-1 Remote Management: WWW .....................................................................................................11-3 Table 11-2 Remote Management: Telnet.......................................................................................................11-5 Table 11-3 Remote Management: FTP..........................................................................................................11-6 Table 11-4 SNMP Traps ................................................................................................................................11-8 Table 11-5 Remote Management: SNMP....................................................................................................11-10 Table 11-6 Remote Management: DNS ......................................................................................................11-11

  • Prestige 334 Users Guide

    xx List of Tables

    Table 11-7 Security .....................................................................................................................................11-12 Table 12-1 VPN and NAT.............................................................................................................................12-5 Table 13-1 AH and ESP ................................................................................................................................13-2 Table 13-2 VPN: Summary...........................................................................................................................13-4 Table 13-3 Local ID Type and Content Fields ..............................................................................................13-8 Table 13-4 Peer ID Type and Content Fields ................................................................................................13-9 Table 13-5 Matching ID Type and Content Configuration Example ............................................................13-9 Table 13-6 Mismatching ID Type and Content Configuration Example.......................................................13-9 Table 13-7 VPN: Rule Setup (Basic) ..........................................................................................................13-11 Table 13-8 VPN IKE: Advanced.................................................................................................................13-20 Table 13-9 Rule Setup: Manual ..................................................................................................................13-28 Table 13-10 SA Monitor .............................................................................................................................13-31 Table 13-11 VPN: Global Setting ...............................................................................................................13-32 Table 13-12 Telecommuter and Headquarters Configuration Example ......................................................13-33 Table 14-1 View Log ....................................................................................................................................14-2 Table 14-2 Log Settings................................................................................................................................14-4 Table 15-1 System Status..............................................................................................................................15-2 Table 15-2 System Status: Show Statistics ...................................................................................................15-3 Table 15-3 DHCP Table ................................................................................................................................15-4 Table 15-4 Restore Configuration.................................................................................................................15-9 Table 16-1 Main Menu Commands ..............................................................................................................16-4 Table 16-2 Main Menu Summary .................................................................................................................16-5 Table 17-1 Menu 1 General Setup ................................................................................................................17-2 Table 17-2 Menu 1.1 Configure Dynamic DNS ...........................................................................................17-4 Table 18-1 Menu 2 WAN Setup....................................................................................................................18-1 Table 19-1 Menu 3.2: DHCP Ethernet Setup Fields .....................................................................................19-2 Table 19-2 Menu 3.2: LAN TCP/IP Setup Fields .........................................................................................19-3 Table 19-3 Menu 3.2.1: IP Alias Setup .........................................................................................................19-5 Table 20-1 Menu 4: Internet Access Setup (Ethernet) .................................................................................20-2 Table 20-2 New Fields in Menu 4 (PPTP) Screen ........................................................................................20-4 Table 20-3 New Fields in Menu 4 (PPPoE) screen.......................................................................................20-5 Table 21-1 Menu 11.1 Remote Node Profile for Ethernet Encapsulation.....................................................21-2 Table 21-2 Fields in Menu 11.1 (PPPoE Encapsulation Specific) ................................................................21-5 Table 21-3 Menu 11.1 Remote Node Profile for PPTP Encapsulation .........................................................21-6 Table 21-4 Remote Node Network Layer Options .......................................................................................21-7 Table 21-5 Menu 11.6: Traffic Redirect Setup............................................................................................21-10 Table 22-1 Menu12.1 Edit IP Static Route ...................................................................................................22-2 Table 23-1 Applying NAT in Menus 4 & 11.3 ..............................................................................................23-3 Table 23-2 SUA Address Mapping Rules .....................................................................................................23-5 Table 23-3 Menu 15.1.1 First Set..................................................................................................................23-7 Table 23-4 Menu 15.1.1.1 Editing/Configuring an Individual Rule in a Set ................................................23-8

  • Prestige 334 Users Guide

    List of Tables xxi

    Table 23-5 Menu 15.3 Trigger Port Setup.................................................................................................. 23-18 Table 25-1 Abbreviations Used in the Filter Rules Summary Menu............................................................ 25-5 Table 25-2 Rule Abbreviations Used ........................................................................................................... 25-6 Table 25-3 TCP/IP Filter Rule...................................................................................................................... 25-7 Table 25-4 Generic Filter Rule Menu Fields...............................................................................................25-11 Table 26-1 Menu 22 SNMP Configuration .................................................................................................. 26-3 Table 26-2 SNMP Traps............................................................................................................................... 26-4 Table 26-3 Ports and Permanent Virtual Circuits ......................................................................................... 26-4 Table 27-1 System Maintenance: Status Menu Fields.................................................................................. 27-2 Table 27-2 Menu 24.2.1 System Maintenance : Information ....................................................................... 27-4 Table 27-3 Menu 24.3.2 System Maintenance : Syslog and Accounting ..................................................... 27-5 Table 27-4 System Maintenance Menu Diagnostic.....................................................................................27-11 Table 28-1 Filename Conventions................................................................................................................ 28-2 Table 28-2 General Commands for GUI-based FTP Clients........................................................................ 28-4 Table 28-3 General Commands for GUI-based TFTP Clients ..................................................................... 28-6 Table 29-1 Budget Management .................................................................................................................. 29-3 Table 29-2 Call History Fields ..................................................................................................................... 29-4 Table 29-3 Time and Date Setting Fields ..................................................................................................... 29-6 Table 30-1 Menu 24.11 Remote Management Control ............................................................................. 30-2 Table 31-1 Menu 26.1 Schedule Set Setup................................................................................................... 31-2 Table 32-1 Menu 27.1 IPSec Summary ....................................................................................................... 32-2 Table 32-2 Menu 27.1.1 IPSec Setup........................................................................................................... 32-6 Table 32-3 Menu 27.1.1.1 IKE Setup..............................................................................................................32-11 Table 32-4 Active Protocol: Encapsulation and Security Protocol............................................................. 32-13 Table 32-5 Menu 27.1.1.2 Manual Setup ................................................................................................... 32-14 Table 33-1 Menu 27.2 SA Monitor .............................................................................................................. 33-2 Table C-1 NetBIOS Filter Default Settings....................................................................................................C-2

  • Prestige 334 Users Guide

    Preface xxiii

    Preface About This User's Manual Congratulations on your purchase of the Prestige 334 Intelligent Broadband Sharing Gateway. This manual is designed to guide you through the configuration of your Prestige for its various applications.

    Use the web configurator, System Management Terminal (SMT) or command interpreter interface to configure your Prestige. Not all features can be configured

    through all interfaces.

    The web configurator parts of this guide contain background information on features configurable by the web configurator and the SMT. The SMT parts of this guide contain background information solely on features not configurable by the web configurator. This manual may refer to the Prestige 334 Broadband Security Gateway with 4 Port Switch as the Prestige.

    Related Documentation Support Disk

    Refer to the included CD for support documents. Quick Start Guide

    The Quick Start Guide is designed to help you get up and running right away. It contains a detailed easy-to-follow connection diagram, default settings, handy checklists and information on setting up your network and configuring for Internet access.

    Web Configurator Online Help Embedded web help for descriptions of individual screens and supplementary information.

    Packing List Card The Packing List Card lists all items that should have come in the package.

    Certifications Refer to the product page at www.zyxel.com for information on product certifications.

    ZyXEL Glossary and Web Site Please refer to www.zyxel.com for an online glossary of networking terms and additional support

    documentation.

    Users Guide Feedback Help us help you. E-mail all Users Guide-related comments, questions or suggestions for improvement to [email protected] or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.

    Syntax Conventions

  • Prestige 334 Users Guide

    xxiv Preface

    The version number on the title page is the latest firmware version that is documented in this Users Guide. Earlier versions may also be included.

    Enter means for you to type one or more characters and press the carriage return. Select or Choose means for you to use one of the predefined choices.

    The SMT menu titles and labels are in Bold Times New Roman font. Command and arrow keys are enclosed in square brackets. [ENTER] means the Enter, or carriage return key; [ESC] means the Escape key and [SPACE BAR] means the Space Bar.

    The choices of a menu item are in Bold Arial font. Mouse action sequences are denoted using a comma. For example, click the Apple icon, Control

    Panels and then Modem means first click the Apple icon, then point your mouse pointer to Control Panels and then click Modem.

    For brevitys sake, we will use e.g. as a shorthand for for instance and i.e. for that is or in other words throughout this manual.

  • Getting Started

    I

    Part I:

    Getting Started

    This part helps you get to know your Prestige, introduces the web configurator and covers how to configure the Wizard Setup screens.

  • Prestige 334 Users Guide

    Introducing the Web Configurator 1-1

    Chapter 1 Getting to Know Your Prestige

    This chapter introduces the main features and applications of the Prestige.

    1.1 Prestige Internet Security Gateway Overview The Prestige is the ideal secure gateway for all data passing between the Internet and LANs. By integrating NAT, firewall and VPN capability, ZyXELs Prestige is a complete security solution that protects your Intranet and efficiently manages data traffic on your network. The embedded web configurator is easy to operate.

    1.2 Prestige Features The following sections describe Prestige features.

    1.2.1 Physical Features 10/100M Auto-negotiating Ethernet/Fast Ethernet Interface(s) This auto-negotiation feature allows the Prestige to detect the speed of incoming transmissions and adjust appropriately without manual intervention. It allows data transfer of either 10 Mbps or 100 Mbps in either half-duplex or full-duplex mode depending on your Ethernet network. Auto-crossover 10/100 Mbps Ethernet Interface(s) These interfaces automatically adjust to either a crossover or straight-through Ethernet cable. 4-Port Switch A combination of switch and router makes your Prestige a cost-effective and viable network solution. You can add up to four computers to the Prestige without the cost of a hub. Add more than four computers to your LAN by using a hub. Time and Date The Prestige allows you to get the current time and date from an external server when you turn on your Prestige. You can also set the time manually. Reset Button The Prestige reset button is built into the rear panel. Use this button to restore the factory default password to 1234; IP address to 192.168.1.1, subnet mask to 255.255.255.0 and DHCP server enabled with a pool of 32 IP addresses starting at 192.168.1.33.

  • Prestige 334 Users Guide

    1-2 Introducing the Web Configurator

    1.2.2 Non-Physical Features IPSec VPN Capability Establish a Virtual Private Network (VPN) to connect with business partners and branch offices using data encryption and the Internet to provide secure communications without the expense of leased site-to-site lines. The Prestige VPN is based on the IPSec standard and is fully interoperable with other IPSec-based VPN products. Firewall The Prestige is a stateful inspection firewall with DoS (Denial of Service) protection. By default, when the firewall is activated, all incoming traffic from the WAN to the LAN is blocked unless it is initiated from the LAN. The Prestige firewall supports TCP/UDP inspection, DoS detection and prevention, real time alerts, reports and logs. Content Filtering The Prestige can also block access to web sites containing keywords that you specify. You can define time periods and days during which content filtering is enabled and include or exclude a range of users on the LAN from content filtering. Brute-Force Password Guessing Protection The Prestige has a special protection mechanism to discourage brute-force password guessing attacks on the Prestiges management interfaces. You can specify a wait-time that must expire before entering a fourth password after three incorrect passwords have been entered. Please see the appendices for details about this feature. Packet Filtering The packet filtering mechanism blocks unwanted traffic from entering/leaving your network. Universal Plug and Play (UPnP) Using the standard TCP/IP protocol, the Prestige and other UPnP enabled devices can dynamically join a network, obtain an IP address and convey its capabilities to other devices on the network. Call Scheduling Configure call time periods to restrict and allow access for users on remote nodes. PPPoE PPPoE facilitates the interaction of a host with an Internet modem to achieve access to high-speed data networks via a familiar "dial-up networking" user interface. PPTP Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using a TCP/IP-based network.

  • Prestige 334 Users Guide

    Introducing the Web Configurator 1-3

    PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet. The Prestige supports one PPTP server connection at any given time. Dynamic DNS Support With Dynamic DNS (Domain Name System) support, you can have a static hostname alias for a dynamic IP address, allowing the host to be more easily accessible from various locations on the Internet. You must register for this service with a Dynamic DNS service provider. IP Multicast Deliver IP packets to a specific group of hosts using IP multicast. IGMP (Internet Group Management Protocol) is the protocol used to support multicast groups. The latest version is version 2 (see RFC 2236); the Prestige supports both versions 1 and 2. IP Alias IP Alias allows you to partition a physical network into logical networks over the same Ethernet interface. The Prestige supports three logical LAN interfaces via its single physical Ethernet LAN interface with the Prestige itself as the gateway for each LAN network. SNMP SNMP (Simple Network Management Protocol) is a protocol used for exchanging management information between network devices. SNMP is a member of the TCP/IP protocol suite. Your Prestige supports SNMP agent functionality, which allows a manager station to manage and monitor the Prestige through the network. The Prestige supports SNMP version one (SNMPv1). Network Address Translation (NAT) Network Address Translation (NAT) allows the translation of an Internet protocol address used within one network (for example a private IP address used in a local network) to a different IP address known within another network (for example a public IP address used on the Internet). Traffic Redirect Traffic Redirect forwards WAN traffic to a backup gateway on the LAN when the Prestige cannot connect to the Internet, thus acting as an auxiliary backup when your regular WAN connection fails. Port Forwarding Use this feature to forward incoming service requests to a server on your local network. You may enter a single port number or a range of port numbers to be forwarded, and the local IP address of the desired server. DHCP (Dynamic Host Configuration Protocol) DHCP (Dynamic Host Configuration Protocol) allows the individual client computers to obtain the TCP/IP configuration at start-up from a centralized DHCP server. The Prestige has built-in DHCP server capability, enabled by default, which means it can assign IP addresses, an IP default gateway and DNS servers to all

  • Prestige 334 Users Guide

    1-4 Introducing the Web Configurator

    systems that support the DHCP client. The Prestige can also act as a surrogate DHCP server (DHCP Relay) where it relays IP address assignment from the actual real DHCP server to the clients. Full Network Management The embedded web configurator is an all-platform web-based utility that allows you to easily access the Prestiges management settings and configure the firewall. Most functions of the Prestige are also software configurable via the SMT (System Management Terminal) interface. The SMT is a menu-driven interface that you can access over a telnet connection. RoadRunner Support In addition to standard cable modem services, the Prestige supports Time