Version
May
Copyright
Federal Communications Commission (FCC) Interference Statement
ZyXEL Limited Warranty
Customer Support
Page
Table of Contents
Page
Chapter 8 WAN Screens
Chapter 9 Single User Account (SUA) / Network Address Translation (NAT)
FIREWALL AND REMOTE MANAGEMENT
Chapter 12 Firewall Screens
Chapter 14 UPnP Screen
Chapter 15 Logs Screens
Chapter 16 Maintenance
Chapter 17 Introducing the SMT
Chapter 18 General and WAN Setup
Chapter 20 Internet Access
Chapter 21 Remote Node Configuration
Chapter 25 SNMP Configuration
Chapter 26 System Security
FTP
Web
Table of
Contents
APPENDICES
A-1
Appendix B Brute-ForcePassword Guessing Protection
B-1
C-1
List of Figures
Page
Page
Page
Page
Page
Page
List of Tables
Page
Page
Preface
Control Panels
Modem
User Guide Feedback
Page
Part I:
OVERVIEW
Page
1.1Introducing the ZyAIR Wireless Gateway Series
1.2ZyAIR Features
4-PortSwitch
10/100M Auto-negotiatingEthernet/Fast Ethernet Interface
10/100M Auto-crossoverEthernet/Fast Ethernet Interface
10/100 Mbps Ethernet WAN
Reset Button
ZyAIR LED
802.11b Wireless LAN Standard
Output Power Management
Limit the number of Client Connections
SSL Passthrough
Wi-FiProtected Access
Firewall
IEEE 802.1x Network Security
Wireless LAN MAC Address Filtering
Universal Plug and Play (UPnP)
PPTP Encapsulation
Network Address Translation (NAT)
NAT for Single-IP-addressInternet Access
DHCP (Dynamic Host Configuration Protocol)
Multicast
SNMP
Full Network Management
Logging and Tracing
Diagnostics Capabilities
Embedded FTP and TFTP Servers
1.3Application for the ZyAIR
1.3.1 Internet Access Application
Page
2.1Web Configurator Overview
2.2Accessing the ZyAIR Web Configurator
2.3Resetting the ZyAIR
2.3.1 Procedure to Use the Reset Button
2.3.2 Uploading a Configuration File via Console Port
2.4Navigating the ZyAIR Web Configurator
3.1Wizard Setup Overview
3.1.1 Channel
3.1.2 ESS ID
3.1.3 WEP Encryption
3.2Wizard Setup: General Setup
3.3Wizard Setup: Wireless LAN Setup
Figure 3-2Wizard 2: Wireless LAN Setup
Table 3-2Wizard 2: Wireless LAN Setup
3.4Wizard Setup: ISP Parameters
3.4.1 Ethernet
Figure 3-3Wizard 3: Ethernet Encapsulation
Table 3-3Wizard 3: Ethernet Encapsulation
3.4.2 PPTP Encapsulation
Figure 3-4Wizard 3: PPTP Encapsulation
Table 3-4Wizard 3: PPTP Encapsulation
3.4.3 PPPoE Encapsulation
Figure 3-5Wizard 3: PPPoE Encapsulation
Table 3-5Wizard 3: PPPoE Encapsulation
3.5Wizard Setup: WAN and DNS
3.5.1 WAN IP Address Assignment
3.5.2 IP Address and Subnet Mask
3.5.3 DNS Server Address Assignment
3.5.4 WAN MAC Address
Figure 3-6Wizard 4: WAN and DNS
Table 3-8Wizard 4: WAN and DNS
Page
3.6Basic Setup Complete
Figure 3-7Setup Complete
Page
Part II:
SYSTEM, LAN AND WIRELESS
Page
4.1System Overview
4.2Configuring General Setup
4.3Dynamic DNS
4.3.1 DYNDNS Wildcard
4.4Configuring Dynamic DNS
Figure 4-2DDNS
Table 4-2DDNS
4.5Configuring Password
4.6Configuring Time Setting
Figure 4-4Time Setting
Table 4-4Time Setting
Page
5.1LAN Overview
5.2LANs and WANs
5.2.1 LANs, WANs and the ZyAIR
5.3DHCP Setup
5.4Factory LAN Defaults
5.5RIP Setup
5.6Multicast
5.7Configuring the LAN IP Screens
Figure 5-2IP
Table 5-1IP
Page
Page
the
screen
6.1Wireless LAN Overview
6.1.1 IBSS
6.1.2 BSS
6.1.3 ESS
6.2Wireless LAN Basics
6.2.1 RTS/CTS
6.2.2 Fragmentation Threshold
6.3Configuring Wireless
Figure 6-5Wireless
Table 6-1Wireless
If you are configuring the ZyAIR from a computer connected to
the wireless LAN and you change the ZyAIR’s ESSID or WEP
settings, you will lose your wireless connection when you press
Apply to confirm. You must then change the wireless settings of
6.4Configuring Roaming
6.4.1 Requirements for Roaming
Table 6-2Roaming
All APs on the same subnet and the wireless stations must have
7.1Wireless Security Overview
7.2WEP Overview
7.2.1 Data Encryption
7.2.2 Authentication
7.3Configuring WEP Encryption
Figure 7-3Wireless
Table 7-1Wireless : WEP Fields
7.4MAC Filter
Figure 7-4MAC Address Filter
7.5802.1x Overview
7.6Dynamic WEP Key Exchange
7.7Introduction to WPA
7.7.1 User Authentication
7.7.2 Encryption
7.8WPA-PSKApplication Example
7.9WPA with RADIUS Application Example
7.10 Security Parameters Summary
7.11 Wireless Client WPA Supplicants
7.12 Configuring 802.1x and WPA
7.12.1 Authentication Required:
Figure 7-8Wireless LAN: 802.1x/WPA for 802.1x Protocol
Table 7-5Wireless LAN: 802.1x/WPA for 802.1x Protocol
If wireless station authentication is done using a RADIUS
server, the reauthentication timer on the RADIUS server has
7.12.2 Authentication Required: WPA
Figure 7-9Wireless LAN: 802.1x/WPA for WPA Protocol
The following table describes the labels not previously discussed
Table 7-6Wireless LAN: 802.1x/WPA for WPA Protocol
7.12.3 Authentication Required: WPA-PSK
7.13 Introduction to Local User Database
7.14 Configuring Local User Database
Figure 7-11Local User Database
7.15 Introduction to RADIUS
•Authentication
•Accounting
Types of RADIUS Messages
•Access-Request
7.15.1 EAP Authentication Overview
7.16 Configuring RADIUS
Table 7-9RADIUS
Part III:
WAN
Page
8.1WAN Overview
8.2Configuring WAN ISP
8.2.1 Ethernet Encapsulation
Service Type
8.2.2 PPPoE Encapsulation
Figure 8-3PPPoE Encapsulation
Table 8-3PPPoE Encapsulation
8.2.3 PPTP Encapsulation
Figure 8-4PPTP Encapsulation
Table 8-4PPTP Encapsulation
8.3TCP/IP Priority (Metric)
8.4Configuring WAN IP
Page
Page
8.5Configuring WAN MAC
Page
Part IV:
SUA/NAT AND STATIC ROUTE
Page
ZyAIR
9.1NAT Overview
9.1.1 NAT Definitions
9.1.2 What NAT Does
9.1.3 How NAT Works
9.1.4 NAT Application
9.1.5 NAT Mapping Types
9.1.6 SUA (Single User Account) Versus NAT
9.2SUA Server
Default Server IP Address
9.2.1 Port Forwarding: Services and Port Numbers
9.2.2 Configuring Servers Behind SUA (Example)
9.3Configuring SUA Server
Figure 9-4SUA/NAT Setup
Table 9-4SUA/NAT Setup
9.4Configuring Address Mapping
Figure 9-5Address Mapping
Table 9-5Address Mapping
9.4.1 Configuring Address Mapping Rule
Page
10.1 Static Route Overview
10.2 Configuring IP Static Route
Figure 10-2IP Static Route Summary
Table 10-1IP Static Route Summary
10.2.1 Configuring Route Entry
Page
Part V:
FIREWALL AND REMOTE MANAGEMENT
Page
11.1 Firewall Overview
11.2 Types of Firewalls
11.2.1 Packet Filtering Firewalls
11.2.2 Application-levelFirewalls
11.2.3 Stateful Inspection Firewalls
11.3 Introduction to ZyXEL’s Firewall
11.4 Denial of Service
11.4.1 Basics
11.4.2 Types of DoS Attacks
SYN Attack
Figure 11-3SYN Flood
LAND Attack
brute-force
Figure 11-4Smurf Attack
Table 11-2ICMP Commands That Trigger Alerts
Table 11-3Legal NetBIOS Commands
11.5 Stateful Inspection
Figure 11-5Stateful Inspection
12.1 Access Methods
12.2 Firewall Policies Overview
12.3 Rule Logic Overview
12.3.1 Rule Checklist
12.3.2 Security Ramifications
12.3.3 Key Fields For Configuring Rules
12.4 Guidelines For Enhancing Security With Your Firewall
12.5 Connection Direction Examples
12.5.1 LAN to WAN Rules
12.5.2 WAN to LAN Rules
12.6 Enabling Firewall
Figure 12-3Firewall Settings
Table 12-1Firewall Settings
12.6.1 Configuring Content Filtering
Page
Table 12-2Firewall Filter
12.6.2 Configuring Firewall Services
Table 12-3Creating/Editing A Firewall Rule
12.6.3 Predefined Services
Page
Page
Page
13.1 Remote Management Overview
13.1.1 Remote Management Limitations
13.1.2 Remote Management and NAT
13.1.3 System Timeout
13.2 Telnet
13.3 Configuring TELNET
13.4 Configuring FTP
13.5 Configuring WWW
13.6 Configuring SNMP
Figure 13-5SNMP Management Model
13.6.1 Supported MIBs
13.6.2 SNMP Traps
13.6.3 REMOTE MANAGEMENT: SNMP
13.7 Configuring DNS
13.8 Configuring Security
Figure 13-8Security
Table 13-8Security
Page
Page
Part VI:
UPNP AND LOGS
Page
14.1 Universal Plug and Play Overview
14.1.1 How Do I Know If I'm Using UPnP
14.1.2 NAT Traversal
14.1.3 Cautions with UPnP
14.2 UPnP and ZyXEL
14.3 Configuring UPnP
Figure 14-1Configuring UPnP
Table 14-1Configuring UPnP
14.4 Installing UPnP in Windows Example
14.4.1 Installing UPnP in Windows Me
14.4.2 Installing UPnP in Windows XP
Click
14.5 Using UPnP in Windows XP Example
14.5.1 Auto-discoverYour UPnP-enabledNetwork Device
Step 3. In the Internet Connection Properties
Add
14.5.2 Web Configurator Easy Access
Control
Panel
Connections
Step 3. Select My Network Places under
Other Places
Page
15.1 Using the View Log Screen
Figure 15-1View Log
Table 15-1View Log
15.2 Configuring Log Settings
Figure 15-2Log Settings
Table 15-2Log Settings
15.3 Configuring Reports
Page
15.3.1 Viewing Protocol/Port
Figure 15-4Protocol/Port Report
Table 15-4Protocol/Port Report
15.3.2 Viewing LAN IP Address
15.3.3 Reports Specifications
Page
Part VII:
MAINTENANCE
Page
16.1 Maintenance Overview
16.2 System Status Screen
16.2.1 System Statistics
Figure 16-2Status: Show Statistics
Table 16-2Status: Show Statistics
16.3 DHCP Table Screen
16.4 Association List
16.5 Channel Usage
Table 16-5Channel Usage (ZyAIR B-2000)
Figure 16-6Channel Usage
Table 16-6Channel Usage
16.6 F/W Upload Screen
Table 16-7Firmware Upload
Do not turn off the device while firmware upload is in progress
Firmware Upload in Process
Figure 16-8Firmware Upload In Process
Figure 16-9Network Temporarily Disconnected
16.7 Configuration Screen
16.7.1 Backup Configuration
16.7.2 Restore Configuration
16.7.3 Back to Factory Defaults
16.8 Restart Screen
Part VIII:
SMT GETTING STARTED MENUS
Page
17.1 Connect to your ZyAIR Using Telnet
17.2 Connect to Your ZyAIR Using the Console Port
17.2.1 Initial Screen
17.2.2 Entering Password
17.3 Changing the System Password
17.4 ZyAIR SMT Menu Overview Example
Figure 17-4ZyAIR B-2000v.2 SMT Menu Overview Example
17.5 Navigating the SMT Interface
17.5.1 System Management Terminal Interface Summary
Page
Page
18.1 General Setup
18.1.1 Dynamic DNS
18.1.2 Procedure To Configure Menu
Figure 18-1Menu 1 General Setup
Table 18-1Menu 1 General Setup
18.1.3 Procedure to Configure Dynamic DNS
Page
18.2 WAN Setup
Page
19.1 LAN Setup
19.1.1 General Ethernet Port Filter Setup
19.2 TCP/IP Ethernet and DHCP Setup
Table 19-1Menu 3.2 DHCP Ethernet Setup
Table 19-2Menu3.2 TCP/IP Ethernet Setup
SPACE BAR
19.3 IP Alias
19.3.1 IP Alias Setup
19.4 Wireless LAN Setup
Figure 19-8Menu 3.5 Wireless LAN Setup
Table 19-4Menu 3.5 Wireless LAN Setup
Page
19.4.1 Configuring MAC Address Filter
Figure 19-10Menu 3.5.1 WLAN MAC Address Filter
Table 19-5Menu 3.5.1 WLAN MAC Address Filter
19.4.2 Configuring Roaming on the ZyAIR
Table 19-6Menu 3.5.2 Roaming Configuration
20.1 Internet Access Configuration
20.2 Internet Access Setup
Refer to the System Security chapter for the wireless LAN security setup
Page
Part IX:
SMT ADVANCED APPLICATION MENUS
Page
21.1 Remote Node Profile
21.1.1 Encapsulation Scenarios
Figure 21-1Menu 11.1 Remote Node Profile
Menu 11.1 – Remote Node Profile
Table 21-1Menu 11.1 Remote Node Profile
Page
21.1.2 Outgoing Authentication Protocol
21.1.3 Remote Node Setup
Edit IP
Remote Node Network Layer Options
Figure 21-2Menu 11.3 Remote Node Network Layer Options
The next table explains the fields in this menu
Table 21-2Menu 11.3 Remote Node Network Layer Options
21.2 Remote Node Filter
21.2.1 IP Static Route Setup
Configuration
Static Route Setup
Figure 21-5Menu 12.1 IP Static Route Setup
Step 2. Now, type the route number of a static route you want to configure
Figure 21-6Menu 12.1 Edit IP Static Route
Page
Page
22.1 Dial-inUser Setup
Table 22-1Menu 14.1- Edit Dial-inUser
23.1 Introduction
23.1.1 Applying NAT
23.2 NAT Setup
23.2.1 Address Mapping Sets
Figure 23-5Menu 15.1.255 SUA Address Mapping Rules
The following table explains the fields in this menu
Table 23-2Menu 15.1.255 SUA Address Mapping Rules
User-DefinedAddress Mapping Sets
Select Rule
Set Name
Figure 23-6Menu 15.1.1 Address Mapping Rules
The table below describes the fields for configuration in this menu
23.2.2 Configuring Individual Rule
23.3 Port Forwarding Setup - NAT Server Sets
23.3.1 Configuring a Server behind NAT
23.4 General NAT Examples
23.4.1 Example 1: Internet Access Only
Figure 23-9NAT Example
Figure 23-10Menu 4 Internet Access Setup
Network Address Translation
23.4.2 Example 2: Internet Access with an Inside Server
23.4.3 Example 3: Multiple Public IP Addresses With Inside Servers
1 :
Many :
Server
Figure 23-13NAT Example
Menu 15.1 - Address Mapping Sets
Figure 23-14Menu 11.3 Remote Node Network Layer Options
Edit Action
Start IP
Figure 23-15Menu 15.1.1.1 Address Mapping Rule
Step 7. When finished, menu 15.1.1 should look like as shown next
Figure 23-16Menu 15.1.1 Address Mapping Rules
Menu 15.2 – Port Forwarding Setup
Example 3: Menu 15.2 Port Forwarding Setup
23.4.4 Example 4: NAT Unfriendly Application Programs
23.5 Trigger Port Setup
Two Points To Remember About Trigger Ports
Menu 15.3 — Trigger Port Setup
Figure 23-21Menu 15.3 Trigger Port Setup
Table 23-6Menu 15.3 Trigger Port Setup
Page
Part X:
SMT ADVANCED MANAGEMENT MENUS
Page
24.1 About Filtering
Execute
Figure 24-2Filter Rule Process
24.2 Configuring a Filter Set
Figure 24-4NetBIOS_WAN Filter Rules Summary
Figure 24-5NetBIOS_LAN Filter Rules Summary
Figure 24-6TEL_FTP_WEB_WAN Filter Rules Summary
24.2.1 Filter Rules Summary Menus
24.3 Configuring a Filter Rule
24.3.1 TCP/IP Filter Rule
Figure 24-7Menu 21.1.1 TCP/IP Filter Rule
The following table describes how to configure your TCP/IP filter rule
Table 24-3Menu 21.1.1 TCP/IP Filter Rule
Page
The following figure illustrates the logic flow of an IP filter
Figure 24-8Executing an IP Filter
24.3.2 Generic Filter Rule
24.4 Filter Types and NAT
24.5 Example Filter
TCP/IP Filter Rule
Figure 24-12Sample Filter - Menu
24.6 Applying Filters and Factory Defaults
24.6.1 Ethernet Traffic
24.6.2 Remote Node Filters
24.7 Firewall Setup
Page
25.1 SNMP Configuration
Page
26.1 System Security
26.1.1 System Password
26.1.2 Configuring External RADIUS Server
Figure 26-3Menu 23.2 System Security : RADIUS Server
Table 26-1Menu 23.2 System Security : RADIUS Server
26.1.3 IEEE802.1x
Figure 26-5Menu 23.4 System Security : IEEE802.1x
Table 26-2Menu 23.4 System Security : IEEE802.1x
Page
Page
27.1 System Status
Figure 27-2Menu 24.1 System Maintenance : Status
Table 27-1Menu 24.1 System Maintenance : Status
27.2 System Information
27.2.1 System Information
27.2.2 Console Port Speed
27.3 Log and Trace
27.3.1 Viewing Error Log
27.3.2 Syslog Logging
27.3.3 Call-TriggeringPacket
27.4 Diagnostic
28.1 Filename Conventions
28.2 Backup Configuration
28.2.1 Backup Configuration
28.2.2 Using the FTP Command from the Command Line
28.2.3 Example of FTP Commands from the Command Line
28.2.4 GUI-basedFTP Clients
28.2.5 TFTP and FTP over WAN Management Limitations
28.2.6 Backup Configuration Using TFTP
28.2.7 TFTP Command Example
28.2.8 GUI-basedTFTP Clients
28.2.9 Backup Via Console Port (only for ZyAIR B-2000)
28.3 Restore Configuration
28.3.1 Restore Using FTP
28.3.2 Restore Using FTP Session Example
28.3.3 Restore Via Console Port (only for ZyAIR B-2000)
28.4 Uploading Firmware and Configuration Files
28.4.1 Firmware File Upload
28.4.2 Configuration File Upload
28.4.3 FTP File Upload Command from the DOS Prompt Example
28.4.4 FTP Session Example of Firmware File Upload
28.4.5 TFTP File Upload
28.4.6 TFTP Upload Command Example
28.4.7 Uploading Via Console Port (only for ZyAIR B-2000)
28.4.8 Uploading Firmware File Via Console Port (only for ZyAIR B-2000)
28.4.9 Example Xmodem Firmware Upload Using HyperTerminal
28.4.11Example Xmodem Configuration Upload Using HyperTerminal
Figure 28-19Example Xmodem Upload
29.1 Command Interpreter Mode
29.2 Call Control Support
29.2.1 Budget Management
29.2.2 Call History
29.3 Time and Date Setting
Figure 29-6Menu 24.10 System Maintenance : Time and Date Setting
Table 29-3Menu 24.10 System Maintenance : Time and Date Setting
29.3.1 Resetting the Time
30.1 Telnet
30.2 FTP
30.3 Web
30.4 Remote Management
30.4.1 Remote Management Setup
30.4.2 Remote Management Limitations
30.5 Remote Management and NAT
30.6 System Timeout
31.1 Introduction
To delete a schedule set, enter the set number and press [SPACE BAR] and then
[ENTER] (or delete) in the Edit Name field
Edit Name
Menu 26.1 - Schedule Set Setup
Figure 31-2Menu 26.1 Schedule Set Setup
Main Menu
PPPoE
PPTP
Figure 31-3Applying Schedule Set(s) to a Remote Node (PPTP)
Part XI:
APPENDICES
Page
Problems Starting Up the ZyAIR
Problems with the Password
Problems with the Ethernet Interface
Problems with the WAN Interface
Problems with Internet Access
Problems with Telnet
Problems with the WLAN Interface
Appendix B
Brute-ForcePassword Guessing
Protection
Chart B-1 Brute-ForcePassword Guessing Protection Commands
Brute-ForcePassword Guessing Protection
Page
Windows 95/98/Me
If you need the adapter:
If you need TCP/IP:
If you need Client for Microsoft Networks:
C-2
C-3
Windows 2000/NT/XP
C-5
C-6
C-7
Macintosh OS 8/9
C-9
Macintosh OS
Check your TCP/IP properties in the Network window
C-11
Page
Benefits of a Wireless LAN
Ad-hocWireless LAN Configuration
Infrastructure Wireless LAN Configuration
Diagram D-2ESS Provides Campus-WideCoverage
Page
Security Flaws with IEEE
Deployment Issues with IEEE
Advantages of the IEEE
Diagram E-1Sequences for EAP MD5–ChallengeAuthentication
EAP-MD5 (Message-DigestAlgorithm 5)
EAP-TLS(Transport Layer Security)
EAP-TTLS(Tunneled Transport Layer Service)
PEAP (Protected EAP)
Comparison of EAP Authentication Types
Antenna Characteristics
Frequency
Radiation Pattern
Antenna Gain
Types of Antennas For WLAN
Positioning Antennas
Connector Type
PPPoE in Action
Benefits of PPPoE
Traditional Dial-upScenario
How PPPoE Works
ZyAIR as a PPPoE Client
What is PPTP
PPTP and the ZyAIR
PPTP Protocol Overview
Control & PPP connections
Call Connection
PPP Data Connection
Page
IP Addressing
IP Classes
Subnet Masks
Subnetting
Example: Two Subnets
Page
Example: Four Subnets
Example Eight Subnets
Subnetting With Class A and Class B Networks
J-8
Command Syntax
Command Usage
Page
Introduction
Display NetBIOS Filter Settings
NetBIOS Filter Configuration
Appendix M
Boot Commands
Diagram M-1Option to Enter Debug Mode
Diagram M-2Boot Module Commands
M-2
The Ideal Setup
The “Triangle Route” Problem
The “Triangle Route” Solutions
IP Aliasing
Gateways on the WAN Side
Page
Appendix O
Log Descriptions
Chart O-1System Error Logs
Chart O-2System Maintenance Logs
Log Descriptions
Chart O-3UPnP Logs
Chart O-4ICMP Notes
O-2
O-3
Log Commands
Log Command Example
Page
Appendix P
Power Adaptor Specifications
Power Adaptor Specifications
P-1
P-2
3-11
D-2
Alternative Subnet Mask Notation
.................. J-3
Appendix Q
Index
29-3
Maximum Number of Schedule Sets
Precedence Example
13-10
3-3, 3-12, 9-6
DoS
Basics
Types
Frequency-HoppingSpread Spectrum
...........D-2
4-2, 5-2, 9-6, 13-1, 13-4
Restrictions
13-1
Management Information Base (MIB)
See NAT
Many to One
Message Digest Algorithm 5
See MD5
Remote Node Profile
5-2, 19-3
Roaming
6-3
12-1
TFTP and FTP over WAN Will Not Work
When…
TFTP Restrictions
TKIP
See Temporal Key Integrity Protocol