Manuals / Brands / Computer Equipment / Network Card / ZyXEL Communications / Computer Equipment / Network Card

ZyXEL Communications 2WE manual 332

1 433
Download 433 pages, 10.14 Mb
Contents
User’s Guide Copyright Copyright © 2003 by ZyXEL Communications Corporation Disclaimer Trademarks Notice Certifications Information for Canadian Users Caution Note ZyXEL Limited Warranty NOTE Customer Support Table of Contents Chapter 8 Wireless LAN Security Setup Page Chapter 13 Firewalls Chapter 14 Introducing the ZyWALL Firewall Chapter 16 Creating Custom Rules Logs, Filter Configuration, and SNMP Configuration Chapter 18 Centralized Logs System Maintenance and Information and Remote Management Chapter 24 Remote Management Call Scheduling and VPN/IPSec Page General Appendices Appendix C Triangle Route Appendix E Wireless LAN and IEEE 802.11 Appendix F Wireless LAN With IEEE 802.1x Appendix G PPPoE Page List of Figures Page Page Page Page Page Page List of Tables Page Page Page Preface About This User's Manual Related Documentation Syntax Conventions Control Panels Modem Part I: Overview Page Getting to Know Your ZyWALL 1.1Introducing the ZyWALL 2/2WE Internet Security Gateway 1.2Features 1.2.1Physical Features 4-PortSwitch 1.2.2Non-PhysicalFeatures IPSec VPN Capability Firewall EAP (RFC2284) RADIUS (RFC2138, 2139) IEEE 802.1x for Network Security Wireless LAN MAC Address Filtering Brute-ForcePassword Guessing Protection Content Filtering Dynamic DNS Support IP Multicast IP Alias Central Network Management SNMP 1.3Applications for the ZyWALL 1.3.1Secure Broadband Internet Access and VPN 1.3.2Wireless LAN Application Hardware Installation 2.1Introduction to Hardware Installation 2.2Front Panels LEDs 2.3LED Descriptions 2.4ZyWALL Rear Panels and Connections 2.5Hardware Connections 2.5.1Connecting a Broadband Modem to the WAN Port 2.5.2Connecting the Console Port 2.5.3Connecting the AUX Port 2.5.4LAN 10/100M Ports 2.5.5Connecting the Power to your ZyWALL 2.6Hardware Mounting Options 2.7Additional Installation Requirements for Using 2.8Turning On Your ZyWALL Page Part II: Initial Setup and Configuration Page Introducing the Web Configurator 3.1Introduction to the Web Configurator 3.2Accessing the ZyWALL Web Configurator 3.3Web Configurator Navigation Introducing the SMT 4.1Introduction to the SMT 4.2Accessing the Console Port via the Console Port 4.2.1Initial Screen 4.2.2Entering the Password 4.3Navigating the SMT Interface 4.3.1Main Menu 4.3.2System Management Terminal Interface Summary 4.3.3SMT Menus at a Glance Figure 4-4Getting Started and Advanced Applications SMT Menus (ZyWALL 2WE) Figure 4-5Advanced Management SMT Menus 4.4Changing the System Password 4.5Resetting the ZyWALL 4.5.1Uploading a Configuration File Via Console Port 4.5.2Procedure To Use The Reset Button Page SMT Menu 1 - General Setup 5.1Introduction to General Setup 5.2 System Name 5.3 Dynamic DNS 5.3.1DYNDNS Wildcard 5.4General Setup 5.4.1Configuring Dynamic DNS Page Page Page WAN Setup 6.1Introduction to WAN Setup 6.2Cloning The MAC Address 6.3WAN Setup Table 6-1MAC Address Cloning in WAN Setup LAN Setup 7.1Introduction to LAN Setup 7.2Accessing the LAN Menus 7.3LAN Port Filter Setup 7.4TCP/IP and LAN DHCP 7.4.1Factory LAN Defaults 7.4.2DHCP Configuration IP Pool Setup DNS Server Address 7.4.3IP Address and Subnet Mask Private IP Addresses 7.4.4RIP Setup 7.4.5IP Multicast 7.4.6IP Alias 7.5TCP/IP and DHCP Ethernet Setup Menu Figure 7-5Menu 3: TCP/IP and DHCP Setup TCP/IP and DHCP Setup Menu 3.2: TCP/IP and DHCP Ethernet Setup Figure 7-6Menu 3.2: TCP/IP and DHCP Ethernet Setup Table 7-3DHCP Ethernet Setup Menu Fields Table 7-4LAN TCP/IP Setup Menu Fields 7.5.1IP Alias Setup Figure 7-7Menu 3.2.1: IP Alias Setup Table 7-5IP Alias Setup Menu Fields 7.6Wireless LAN 7.6.1Channel 7.6.2ESS ID 7.6.3RTS Threshold 7.6.4Fragmentation Threshold 7.7Wireless LAN Setup Menu LAN Setup Wireless LAN Setup Figure 7-9Menu 3.5 – Wireless LAN Setup The settings of all client stations on the wireless LAN must match those of the The ZyWALL LAN Ethernet and wireless ports can transparently communicate with each other (transparent bridge) Page Wireless LAN Security Setup 8.1Introduction to Wireless LAN Security 8.2Levels of Security 8.3Data Encryption with WEP 8.3.1Setting Up WEP 8.4Network Authentication 8.4.1EAP 8.4.2RADIUS •Authentication •Authorization •Accounting Types of RADIUS Messages •Access-Request 8.4.3Sequence for EAP Authentication 8.4.4Enable EAP Authentication on Your ZyWALL 8.4.5Configuring an External RADIUS Server Figure 8-5Authentication RADIUS Table 8-3Authentication RADIUS 8.5Local User Authentication Figure 8-6Local User Database 8.6MAC Address Filtering Table 8-5WLAN MAC Address Filter Page Internet Access 9.1Introduction to Internet Access Setup 9.2Ethernet Encapsulation 9.3PPTP Encapsulation 9.3.1Configuring the PPTP Client 9.4PPPoE Encapsulation 9.4.1Configuring the PPPoE Client 9.5Basic Setup Complete Page Part III: Advanced Applications Page Remote Node Setup 10.1 Introduction to Remote Node Setup 10.2 Remote Node Setup 10.3 Remote Node Profile Setup 10.3.1 Ethernet Encapsulation 10.3.2 PPPoE Encapsulation PPPoE Figure 10-3Menu 11.1: Remote Node Profile for PPPoE Encapsulation Outgoing Authentication Protocol Nailed-UpConnection Metric Table 10-2Fields in Menu 11.1 (PPPoE Encapsulation Specific) 10.3.3 PPTP Encapsulation 10.4 Edit IP Table 10-4Remote Node Network Layer Options Menu Fields 10.5 Remote Node Filter 10.6 Traffic Redirect Figure 10-9Traffic Redirect LAN Setup Menu 11.1— Remote Node Profile Figure 10-10Menu 11.1: Remote Node Profile Edit Traffic Redirect 10.6.1 Traffic Redirect Setup Page Page IP Static Route Setup 11.1 Introduction to Static Route 11.2 IP Static Route Setup Figure 11-3Menu 12. 1: Edit IP Static Route Table 11-1IP Static Route Menu Fields Page Network Address Translation (NAT) 12.1 Introduction to NAT 12.1.1 NAT Definitions 12.1.2 What NAT Does 12.1.3 How NAT Works Figure 12-1How NAT Works 12.1.4 NAT Application 12.1.5 NAT Mapping Types Many to One Many to Many Overload Many One to One Server Port numbers do not change for One-to-One and Many-One-to-One NAT mapping 12.2 Using NAT 12.2.1 SUA (Single User Account) Versus NAT 12.2.2 Applying NAT [ENTER] to bring up Menu 11.3 - Remote Node Network Layer Options 12.3 NAT Setup 12.3.1 Address Mapping Sets Figure 12-7Menu 15.1.255: SUA Address Mapping Rules Menu 15.1.255 is read-only Table 12-4SUA Address Mapping Rules User-DefinedAddress Mapping Sets Select Rule Set Name The entire set will be deleted if you leave the Set Name field blank and press [ENTER] are the bottom of the screen Table 12-5Fields in Menu No changes to the set take place until this action is taken Edit Menu 15.1.1.1 - Address Mapping Rule Local Figure 12-9Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set Table 12-6Menu 15.1.1.1: Editing/Configuring an Individual Rule in a Set 12.4 NAT Server Sets – Port Forwarding 12.4.1 Configuring a Server behind NAT Figure 12-10Menu 15.2: NAT Server Setup Figure 12-11Multiple Servers Behind NAT Example 12.5 General NAT Examples 12.5.1 Internet Access Only 12.5.2 Example 2: Internet Access with an Inside Server 12.5.3 Example 3: Multiple Public IP Addresses With Inside Servers Figure 12-16NAT Example Menu 15.1 - Address Mapping Sets Edit Action Start IP Figure 12-17Example 3: Menu Figure 12-18Example 3: Menu Figure 12-19Example 3: Final Menu Figure 12-20Example 3: Menu 12.5.4 Example 4: NAT Unfriendly Application Programs 12.6 Trigger Port Forwarding 12.6.1 Trigger Port Forwarding Process 12.6.2 Two Points To Remember About Trigger Ports Table 12-8Menu 15.3—TriggerPort Setup Description Page Part IV: Firewall and Content Filters Page Firewalls 13.1 Introduction to Firewalls 13.2 Types of Firewalls 13.2.1 Packet Filtering Firewalls 13.2.2 Application-levelFirewalls 13.3 Introduction to ZyXEL’s Firewall 13.4 Denial of Service 13.4.1 Basics 13.4.2 Types of DoS Attacks Figure 13-2 Three-WayHandshake SYN Attack Figure 13-3SYN Flood LAND Attack brute-force Figure 13-4Smurf Attack Table 13-2ICMP Commands That Trigger Alerts 13.5 Stateful Inspection 13.5.1 Stateful Inspection Process 13.5.2 Stateful Inspection and the ZyWALL 13.5.3 TCP Security 13.5.4 UDP/ICMP Security 13.5.5 Upper Layer Protocols 13.6 Guidelines For Enhancing Security With Your Firewall 13.7 Packet Filtering Vs Firewall 13.7.1 Packet Filtering: 13.7.2 Firewall When To Use The Firewall Page Introducing the ZyWALL Firewall 14.1 Introduction to the ZyWALL Firewall 14.2 Remote Management and the Firewall 14.3 Access Methods 14.4 Using ZyWALL SMT Menus 14.4.1 Activating the Firewall Firewall Configuration 15.1 Introduction to Firewall Configuration 15.2 Enabling the Firewall 15.2.1 Alerts 15.3 Attack Alert 15.3.1 Threshold Values 15.3.2 Half-OpenSessions one-minute TCP Maximum Incomplete and Blocking Time TCP Maximum Incomplete Figure 15-2Attack Alert Table 15-1Attack Alert Page Page Page Creating Custom Rules 16.1 Introduction to Custom Rules 16.2 Rule Logic Overview 16.2.1 Rule Checklist 16.2.2 Security Ramifications 16.2.3 Key Fields For Configuring Rules 16.3 Connection Direction Examples 16.3.1 LAN to WAN Rules 16.3.2 WAN to LAN Rules 16.4 Rule Summary Page 16.5 Predefined Services Page Page 16.5.1 Creating/Editing Firewall Rules Figure 16-4Creating/Editing A Firewall Rule Table 16-3Creating/Editing A Firewall Rule Page 16.5.2 Source and Destination Addresses 16.6 Custom Ports 16.7 Creating/Editing A Custom Port 16.8 Example Firewall Rule Figure 16-7Firewall Rule Configuration Screen Example Any ScrDelete ScrAdd Figure 16-8Firewall IP Config Screen Example Custom Port Custom Port Configuration Figure 16-9Custom Port Example Available Serv Selected Services Figure 16-10Rule Configuration Example Rule Summary Figure 16-11Rule Summary Example Content Filtering 17.1 Introduction to Content Filtering 17.2 Restrict Web Features 17.3 Days and Times 17.4 Configure Content Filtering Figure 17-1ContentFilter Table 17-1Content Filter Page Page Part V: Logs, Filter Configuration, and SNMP Configuration Page Centralized Logs 18.1 Introduction to Centralized Logs 18.1.1 Alerts and Logs 18.2 View Log Figure 18-1View Log Table 18-1View Log 18.3 Log Settings Figure 18-2Log Settings Table 18-2Log Settings 18.4 Reports Figure 18-3Reports Enabling the ZyWALL’s reporting function decreases the overall throughput by about 1 Mbps 18.4.1 Web Site Hits 18.4.2 Protocol/Port Figure 18-5Protocol/Port Report Example Table 18-5Protocol/Port Report 18.4.3 LAN IP Address 18.4.4 Reports Specifications Filter Configuration 19.1 Introduction to Filters 19.1.1 The Filter Structure of the ZyWALL Filter Set Execute Filter Rule Figure 19-2Filter Rule Process 19.2 Configuring a Filter Set Edit Comments Table 19-1Abbreviations Used in the Filter Rules Summary Menu 19.2.1 Configuring a Filter Rule 19.2.2 Configuring a TCP/IP Filter Rule TCP/IP Filter Rule Filter Type open Menu 21.1.x.x - TCP/IP Filter Rule, as shown next Figure 19-5Menu 21.1.1.1: TCP/IP Filter Rule Table 19-3TCP/IP Filter Rule Menu Fields Page Page Figure 19-6Executing an IP Filter 19.2.3 Configuring a Generic Filter Rule Table 19-4Generic Filter Rule Menu Fields 19.3 Example Filter Figure 19-9Example Filter: Menu Figure 19-10Example Filter Rules Summary: Menu 19.4 Filter Types and SUA/NAT 19.5 Firewall Versus Filters 19.6 Applying a Filter and Factory Defaults 19.6.1 Applying LAN Filters 19.6.2 Applying Remote Node Filters Figure 19-13Filtering Remote Node Traffic SNMP Configuration 20.1 Introduction to SNMP Figure 20-1SNMP Management Model 20.2 Supported MIBs 20.3 SNMP Configuration 20.4 SNMP Traps Part VI: System Information and Diagnosis and Firmware and Configuration File Maintenance Page System Information & Diagnosis 21.1 Introduction to System Status 21.2 System Status Step 1. Enter number 24 to go to Menu 24 - System Maintenance Menu 24.1 - System Maintenance - Status Figure 21-2Menu 24.1: System Maintenance: Status (ZyWALL 2WE) Table 21-1System Maintenance: Status Menu Fields 21.3 System Information and Console Port Speed 21.3.1 System Information 21.3.2 Console Port Speed 21.4 Log and Trace 21.4.1 Viewing Error Log 21.4.2 UNIX Syslog Table 21-3System Maintenance Menu Syslog Parameters Page 21.4.3 Call-TriggeringPacket 21.5 Diagnostic 21.5.1 WAN DHCP Figure 21-11WAN & LAN DHCP Table 21-4System Maintenance Menu Diagnostic Page Firmware and Configuration File Maintenance 22.1 Filename Conventions 22.2 Backup Configuration 22.2.1 Backup Configuration 22.2.2 Using the FTP Command from the Command Line 22.2.3 Example of FTP Commands from the Command Line 22.2.4 GUI-basedFTP Clients 22.2.5 File Maintenance Over WAN 22.2.6 Backup Configuration Using TFTP 22.2.7 TFTP Command Example 22.2.8 GUI-basedTFTP Clients 22.2.9 Backup Via Console Port Figure 22-3System Maintenance: Backup Configuration Figure 22-4System Maintenance: Starting Xmodem Download Screen Receive File Figure 22-5Backup Configuration Example Figure 22-6Successful Backup Confirmation Screen 22.3 Restore Configuration 22.3.1 Restore Using FTP Figure 22-7Telnet into Menu 22.3.2 Restore Using FTP Session Example 22.3.3 Restore Via Console Port 22.4 Uploading Firmware and Configuration Files 22.4.1 Firmware File Upload 22.4.2 Configuration File Upload 22.4.3 FTP File Upload Command from the DOS Prompt Example 22.4.4 FTP Session Example of Firmware File Upload 22.4.5 TFTP File Upload 22.4.6 TFTP Upload Command Example 22.4.7 Uploading Via Console Port 22.4.8 Uploading Firmware File Via Console Port 22.4.9 Example Xmodem Firmware Upload Using HyperTerminal 22.4.10Uploading Configuration File Via Console Port 22.4.11Example Xmodem Configuration Upload Using HyperTerminal Figure 22-19Example Xmodem Upload Part VII: System Maintenance and Information and Remote Management Page System Maintenance & Information 23.1 Command Interpreter Mode 23.2 Call Control Support 23.2.1 Budget Management Figure 23-4Budget Management Table 23-1Budget Management 23.2.2 Call History 23.3 Time and Date Setting 23.3.1 Resetting the Time Page Page Remote Management 24.1 Remote Management and the Firewall 24.2 Telnet 24.3 FTP 24.4 Web 24.5 SNMP 24.6 DNS 24.7 Remote Management When you Choose WAN only or ALL (LAN & WAN), you still need to configure a firewall rule to allow access Disable Server Access Enter 11 from menu 24 to bring up Menu 24.11 – Remote Management Control 24.8 Remote Management and SUA/NAT 24.9 System Timeout Page Part VIII: Call Scheduling and VPN/IPSec Page Call Scheduling 25.1 Introduction to Call Scheduling 25.2 Configuring Call Scheduling To delete a schedule set, enter the set number and press [SPACE BAR] and then [ENTER] or [DEL] in the Edit Name field Menu 26.1 - Schedule Set Setup Figure 25-2Schedule Set Setup Duration 25.3 Applying Schedule Sets Figure 25-3Applying Schedule Set(s) to a Remote Node (PPPoE) Figure 25-4Applying Schedule Set(s) to a Remote Node (PPTP) Page Introduction to IPSec 26.1 VPN Overview 26.1.1 IPSec 26.1.2 Security Association 26.1.3 Other Terminology 26.1.4 VPN Applications 26.2 IPSec Architecture 26.2.1 IPSec Algorithms 26.2.2 Key Management 26.3 Encapsulation 26.3.1 Transport Mode 26.3.2 Tunnel Mode 26.4 IPSec and NAT Table 26-1VPN and NAT VPN/IPSec Setup 27.1 VPN/IPSec Overview 27.2 IPSec Algorithms 27.2.1 AH (Authentication Header) Protocol 27.2.2 ESP (Encapsulating Security Payload) Protocol 27.3 My IP Address 27.4 Secure Gateway Address 27.4.1 Dynamic Secure Gateway Address 27.5 Summary Screen 27.6 Keep Alive 27.7 NAT Traversal 27.7.1 NAT Traversal Configuration 27.8 ID Type and Content Table 27-3Local ID Type and Content Fields Table 27-4Peer ID Type and Content Fields 27.8.1 ID Type and Content Examples 27.9 Configuring Basic IKE VPN Rule Setup Figure 27-4Basic IKE VPN Rule Setup Table 27-7Basic IKE VPN Rule Setup Page Page Page 27.10IKE Phases 27.10.1Negotiation Mode 27.10.2Pre-SharedKey 27.10.3Diffie-Hellman(DH) Key Groups 27.10.4Perfect Forward Secrecy (PFS) 27.11Configuring Advanced IKE Setup Figure 27-6Advanced IKE VPN Rule Setup Table 27-8Advanced IKE VPN Rule Setup Page Page Page 27.12Manual Key Setup 27.12.1Security Parameter Index (SPI) 27.13Configuring Edit Manual Setup Manual Figure 27-7Manual IKE VPN Rule Setup Table 27-9Manual IKE VPN Rule Setup Page Page 27.14SA Monitor Figure 27-8VPN SA Monitor Table 27-10VPN SA Monitor 27.15Global Settings 27.16Telecommuter VPN/IPSec Examples 27.16.1Telecommuters Sharing One VPN Rule Example 27.16.2Telecommuters Using Unique VPN Rules Example Figure 27-11Telecommuters Using Unique VPN Rules Example Page Part IX: Troubleshooting Page Troubleshooting 23.1 Problems Starting Up the ZyWALL 28.1 Problems with a LAN Interface 28.2 Problems with the WAN Interface 28.3 Problems with Internet Access 23.2 Problems with the Password 28.4 Problems with Remote Management Page Part X: General Appendices Page Setting up Your Computer’s IP Address Windows 95/98/Me Configuration Page Page Page Windows 2000/NT/XP Page Page Page Page Macintosh OS 8/9 Macintosh OS Page Antennas Antenna Characteristics Types of Antennas For WLAN Positioning Antennas Triangle Route The Ideal Setup The “Triangle Route” Problem The “Triangle Route” Solutions IP Aliasing Gateways on the WAN Side The Big Picture Wireless LAN and IEEE Benefits of a Wireless LAN IEEE Ad-hocWireless LAN Configuration Infrastructure Wireless LAN Configuration Wireless LAN With IEEE Security Flaws with IEEE Deployment Issues with IEEE Advantages of the IEEE Diagram F-1Sequences for EAP MD5–ChallengeAuthentication Page Page PPPoE PPPoE in Action Benefits of PPPoE Traditional Dial-upScenario How PPPoE Works ZyWALL as a PPPoE Client PPTP What is PPTP PPTP and the ZyWALL PPTP Protocol Overview Control & PPP connections PPP Data Connection Hardware Specifications Cable Pin Assignments Chart I-2Console/Dial Backup Port Pin Assignments Chart I-3Ethernet Cable Pin Assignments Power Adaptor Specifications Chart I-6UK AC Power Adaptor Specifications Chart I-7Japan AC Power Adaptor Specifications Chart I-8Australia and New Zealand AC Power Adaptor Specifications Universal Plug and Play UPnP and ZyXEL NAT Traversal Opening UPnP Installing UPnP in Windows Examples Step 1. Click Start and Control Panel. Double-click Add/Remove Programs Windows Setup Communication Components Using UPnP in Windows XP Example Auto-discoverYour UPnP-enabledNetwork Device start Step 3. In the Internet Connection Properties Web Configurator Easy Access Panel Connections Step 3. Select My Network Places under Other Places Local Network Page IP Subnetting IP Addressing IP Classes Subnet Masks Subnetting Example: Two Subnets Chart K-5Subnet Chart K-6Subnet Example: Four Subnets Example Eight Subnets Subnetting With Class A and Class B Networks Page Safety Warnings and Instructions Page Part XI: Command and Log Appendices Page Command Interpreter Command Syntax Command Usage Firewall Commands Page Page Page Page Page Page NetBIOS Filter Commands Introduction Display NetBIOS Filter Settings NetBIOS Filter Configuration Page Boot Commands Diagram P-2Boot Module Commands Log Descriptions Chart Q-3UPnP Logs Chart Q-4Content Filtering Logs Chart Q-5Attack Logs Page Page Chart Q-6Access Logs Page Page Page Chart Q-7ACL Setting Notes Chart Q-8ICMP Notes Page VPN/IPSec logs VPN Responder IPSec Log A PYLD_MALFORMED packet usually means that the two ends of the VPN tunnel are not using the same pre-sharedkey Chart Q-10Sample IKE Key Exchange Logs Page Chart Q-11Sample IPSec Logs During Packet Transmission Log Commands Log Command Example Page Brute-ForcePassword Guessing Protection Part XII: Index Page Index