Manuals / Brands / Computer Equipment / Network Router / ZyXEL Communications / Computer Equipment / Network Router

ZyXEL Communications Wireless Gateway Series manual 168

1 420
Download 420 pages, 12.23 Mb
Contents
Version May Copyright Federal Communications Commission (FCC) Interference Statement ZyXEL Limited Warranty Customer Support Page Table of Contents Page Chapter 8 WAN Screens Chapter 9 Single User Account (SUA) / Network Address Translation (NAT) FIREWALL AND REMOTE MANAGEMENT Chapter 12 Firewall Screens Chapter 14 UPnP Screen Chapter 15 Logs Screens Chapter 16 Maintenance Chapter 17 Introducing the SMT Chapter 18 General and WAN Setup Chapter 20 Internet Access Chapter 21 Remote Node Configuration Chapter 25 SNMP Configuration Chapter 26 System Security FTP Web Table of Contents APPENDICES A-1 Appendix B Brute-ForcePassword Guessing Protection B-1 C-1 List of Figures Page Page Page Page Page Page List of Tables Page Page Preface Control Panels Modem User Guide Feedback Page Part I: OVERVIEW Page 1.1Introducing the ZyAIR Wireless Gateway Series 1.2ZyAIR Features 4-PortSwitch 10/100M Auto-negotiatingEthernet/Fast Ethernet Interface 10/100M Auto-crossoverEthernet/Fast Ethernet Interface 10/100 Mbps Ethernet WAN Reset Button ZyAIR LED 802.11b Wireless LAN Standard Output Power Management Limit the number of Client Connections SSL Passthrough Wi-FiProtected Access Firewall IEEE 802.1x Network Security Wireless LAN MAC Address Filtering Universal Plug and Play (UPnP) PPTP Encapsulation Network Address Translation (NAT) NAT for Single-IP-addressInternet Access DHCP (Dynamic Host Configuration Protocol) Multicast SNMP Full Network Management Logging and Tracing Diagnostics Capabilities Embedded FTP and TFTP Servers 1.3Application for the ZyAIR 1.3.1 Internet Access Application Page 2.1Web Configurator Overview 2.2Accessing the ZyAIR Web Configurator 2.3Resetting the ZyAIR 2.3.1 Procedure to Use the Reset Button 2.3.2 Uploading a Configuration File via Console Port 2.4Navigating the ZyAIR Web Configurator 3.1Wizard Setup Overview 3.1.1 Channel 3.1.2 ESS ID 3.1.3 WEP Encryption 3.2Wizard Setup: General Setup 3.3Wizard Setup: Wireless LAN Setup Figure 3-2Wizard 2: Wireless LAN Setup Table 3-2Wizard 2: Wireless LAN Setup 3.4Wizard Setup: ISP Parameters 3.4.1 Ethernet Figure 3-3Wizard 3: Ethernet Encapsulation Table 3-3Wizard 3: Ethernet Encapsulation 3.4.2 PPTP Encapsulation Figure 3-4Wizard 3: PPTP Encapsulation Table 3-4Wizard 3: PPTP Encapsulation 3.4.3 PPPoE Encapsulation Figure 3-5Wizard 3: PPPoE Encapsulation Table 3-5Wizard 3: PPPoE Encapsulation 3.5Wizard Setup: WAN and DNS 3.5.1 WAN IP Address Assignment 3.5.2 IP Address and Subnet Mask 3.5.3 DNS Server Address Assignment 3.5.4 WAN MAC Address Figure 3-6Wizard 4: WAN and DNS Table 3-8Wizard 4: WAN and DNS Page 3.6Basic Setup Complete Figure 3-7Setup Complete Page Part II: SYSTEM, LAN AND WIRELESS Page 4.1System Overview 4.2Configuring General Setup 4.3Dynamic DNS 4.3.1 DYNDNS Wildcard 4.4Configuring Dynamic DNS Figure 4-2DDNS Table 4-2DDNS 4.5Configuring Password 4.6Configuring Time Setting Figure 4-4Time Setting Table 4-4Time Setting Page 5.1LAN Overview 5.2LANs and WANs 5.2.1 LANs, WANs and the ZyAIR 5.3DHCP Setup 5.4Factory LAN Defaults 5.5RIP Setup 5.6Multicast 5.7Configuring the LAN IP Screens Figure 5-2IP Table 5-1IP Page Page the screen 6.1Wireless LAN Overview 6.1.1 IBSS 6.1.2 BSS 6.1.3 ESS 6.2Wireless LAN Basics 6.2.1 RTS/CTS 6.2.2 Fragmentation Threshold 6.3Configuring Wireless Figure 6-5Wireless Table 6-1Wireless If you are configuring the ZyAIR from a computer connected to the wireless LAN and you change the ZyAIR’s ESSID or WEP settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of 6.4Configuring Roaming 6.4.1 Requirements for Roaming Table 6-2Roaming All APs on the same subnet and the wireless stations must have 7.1Wireless Security Overview 7.2WEP Overview 7.2.1 Data Encryption 7.2.2 Authentication 7.3Configuring WEP Encryption Figure 7-3Wireless Table 7-1Wireless : WEP Fields 7.4MAC Filter Figure 7-4MAC Address Filter 7.5802.1x Overview 7.6Dynamic WEP Key Exchange 7.7Introduction to WPA 7.7.1 User Authentication 7.7.2 Encryption 7.8WPA-PSKApplication Example 7.9WPA with RADIUS Application Example 7.10 Security Parameters Summary 7.11 Wireless Client WPA Supplicants 7.12 Configuring 802.1x and WPA 7.12.1 Authentication Required: Figure 7-8Wireless LAN: 802.1x/WPA for 802.1x Protocol Table 7-5Wireless LAN: 802.1x/WPA for 802.1x Protocol If wireless station authentication is done using a RADIUS server, the reauthentication timer on the RADIUS server has 7.12.2 Authentication Required: WPA Figure 7-9Wireless LAN: 802.1x/WPA for WPA Protocol The following table describes the labels not previously discussed Table 7-6Wireless LAN: 802.1x/WPA for WPA Protocol 7.12.3 Authentication Required: WPA-PSK 7.13 Introduction to Local User Database 7.14 Configuring Local User Database Figure 7-11Local User Database 7.15 Introduction to RADIUS •Authentication •Accounting Types of RADIUS Messages •Access-Request 7.15.1 EAP Authentication Overview 7.16 Configuring RADIUS Table 7-9RADIUS Part III: WAN Page 8.1WAN Overview 8.2Configuring WAN ISP 8.2.1 Ethernet Encapsulation Service Type 8.2.2 PPPoE Encapsulation Figure 8-3PPPoE Encapsulation Table 8-3PPPoE Encapsulation 8.2.3 PPTP Encapsulation Figure 8-4PPTP Encapsulation Table 8-4PPTP Encapsulation 8.3TCP/IP Priority (Metric) 8.4Configuring WAN IP Page Page 8.5Configuring WAN MAC Page Part IV: SUA/NAT AND STATIC ROUTE Page ZyAIR 9.1NAT Overview 9.1.1 NAT Definitions 9.1.2 What NAT Does 9.1.3 How NAT Works 9.1.4 NAT Application 9.1.5 NAT Mapping Types 9.1.6 SUA (Single User Account) Versus NAT 9.2SUA Server Default Server IP Address 9.2.1 Port Forwarding: Services and Port Numbers 9.2.2 Configuring Servers Behind SUA (Example) 9.3Configuring SUA Server Figure 9-4SUA/NAT Setup Table 9-4SUA/NAT Setup 9.4Configuring Address Mapping Figure 9-5Address Mapping Table 9-5Address Mapping 9.4.1 Configuring Address Mapping Rule Page 10.1 Static Route Overview 10.2 Configuring IP Static Route Figure 10-2IP Static Route Summary Table 10-1IP Static Route Summary 10.2.1 Configuring Route Entry Page Part V: FIREWALL AND REMOTE MANAGEMENT Page 11.1 Firewall Overview 11.2 Types of Firewalls 11.2.1 Packet Filtering Firewalls 11.2.2 Application-levelFirewalls 11.2.3 Stateful Inspection Firewalls 11.3 Introduction to ZyXEL’s Firewall 11.4 Denial of Service 11.4.1 Basics 11.4.2 Types of DoS Attacks SYN Attack Figure 11-3SYN Flood LAND Attack brute-force Figure 11-4Smurf Attack Table 11-2ICMP Commands That Trigger Alerts Table 11-3Legal NetBIOS Commands 11.5 Stateful Inspection Figure 11-5Stateful Inspection 12.1 Access Methods 12.2 Firewall Policies Overview 12.3 Rule Logic Overview 12.3.1 Rule Checklist 12.3.2 Security Ramifications 12.3.3 Key Fields For Configuring Rules 12.4 Guidelines For Enhancing Security With Your Firewall 12.5 Connection Direction Examples 12.5.1 LAN to WAN Rules 12.5.2 WAN to LAN Rules 12.6 Enabling Firewall Figure 12-3Firewall Settings Table 12-1Firewall Settings 12.6.1 Configuring Content Filtering Page Table 12-2Firewall Filter 12.6.2 Configuring Firewall Services Table 12-3Creating/Editing A Firewall Rule 12.6.3 Predefined Services Page Page Page 13.1 Remote Management Overview 13.1.1 Remote Management Limitations 13.1.2 Remote Management and NAT 13.1.3 System Timeout 13.2 Telnet 13.3 Configuring TELNET 13.4 Configuring FTP 13.5 Configuring WWW 13.6 Configuring SNMP Figure 13-5SNMP Management Model 13.6.1 Supported MIBs 13.6.2 SNMP Traps 13.6.3 REMOTE MANAGEMENT: SNMP 13.7 Configuring DNS 13.8 Configuring Security Figure 13-8Security Table 13-8Security Page Page Part VI: UPNP AND LOGS Page 14.1 Universal Plug and Play Overview 14.1.1 How Do I Know If I'm Using UPnP 14.1.2 NAT Traversal 14.1.3 Cautions with UPnP 14.2 UPnP and ZyXEL 14.3 Configuring UPnP Figure 14-1Configuring UPnP Table 14-1Configuring UPnP 14.4 Installing UPnP in Windows Example 14.4.1 Installing UPnP in Windows Me 14.4.2 Installing UPnP in Windows XP Click 14.5 Using UPnP in Windows XP Example 14.5.1 Auto-discoverYour UPnP-enabledNetwork Device Step 3. In the Internet Connection Properties Add 14.5.2 Web Configurator Easy Access Control Panel Connections Step 3. Select My Network Places under Other Places Page 15.1 Using the View Log Screen Figure 15-1View Log Table 15-1View Log 15.2 Configuring Log Settings Figure 15-2Log Settings Table 15-2Log Settings 15.3 Configuring Reports Page 15.3.1 Viewing Protocol/Port Figure 15-4Protocol/Port Report Table 15-4Protocol/Port Report 15.3.2 Viewing LAN IP Address 15.3.3 Reports Specifications Page Part VII: MAINTENANCE Page 16.1 Maintenance Overview 16.2 System Status Screen 16.2.1 System Statistics Figure 16-2Status: Show Statistics Table 16-2Status: Show Statistics 16.3 DHCP Table Screen 16.4 Association List 16.5 Channel Usage Table 16-5Channel Usage (ZyAIR B-2000) Figure 16-6Channel Usage Table 16-6Channel Usage 16.6 F/W Upload Screen Table 16-7Firmware Upload Do not turn off the device while firmware upload is in progress Firmware Upload in Process Figure 16-8Firmware Upload In Process Figure 16-9Network Temporarily Disconnected 16.7 Configuration Screen 16.7.1 Backup Configuration 16.7.2 Restore Configuration 16.7.3 Back to Factory Defaults 16.8 Restart Screen Part VIII: SMT GETTING STARTED MENUS Page 17.1 Connect to your ZyAIR Using Telnet 17.2 Connect to Your ZyAIR Using the Console Port 17.2.1 Initial Screen 17.2.2 Entering Password 17.3 Changing the System Password 17.4 ZyAIR SMT Menu Overview Example Figure 17-4ZyAIR B-2000v.2 SMT Menu Overview Example 17.5 Navigating the SMT Interface 17.5.1 System Management Terminal Interface Summary Page Page 18.1 General Setup 18.1.1 Dynamic DNS 18.1.2 Procedure To Configure Menu Figure 18-1Menu 1 General Setup Table 18-1Menu 1 General Setup 18.1.3 Procedure to Configure Dynamic DNS Page 18.2 WAN Setup Page 19.1 LAN Setup 19.1.1 General Ethernet Port Filter Setup 19.2 TCP/IP Ethernet and DHCP Setup Table 19-1Menu 3.2 DHCP Ethernet Setup Table 19-2Menu3.2 TCP/IP Ethernet Setup SPACE BAR 19.3 IP Alias 19.3.1 IP Alias Setup 19.4 Wireless LAN Setup Figure 19-8Menu 3.5 Wireless LAN Setup Table 19-4Menu 3.5 Wireless LAN Setup Page 19.4.1 Configuring MAC Address Filter Figure 19-10Menu 3.5.1 WLAN MAC Address Filter Table 19-5Menu 3.5.1 WLAN MAC Address Filter 19.4.2 Configuring Roaming on the ZyAIR Table 19-6Menu 3.5.2 Roaming Configuration 20.1 Internet Access Configuration 20.2 Internet Access Setup Refer to the System Security chapter for the wireless LAN security setup Page Part IX: SMT ADVANCED APPLICATION MENUS Page 21.1 Remote Node Profile 21.1.1 Encapsulation Scenarios Figure 21-1Menu 11.1 Remote Node Profile Menu 11.1 – Remote Node Profile Table 21-1Menu 11.1 Remote Node Profile Page 21.1.2 Outgoing Authentication Protocol 21.1.3 Remote Node Setup Edit IP Remote Node Network Layer Options Figure 21-2Menu 11.3 Remote Node Network Layer Options The next table explains the fields in this menu Table 21-2Menu 11.3 Remote Node Network Layer Options 21.2 Remote Node Filter 21.2.1 IP Static Route Setup Configuration Static Route Setup Figure 21-5Menu 12.1 IP Static Route Setup Step 2. Now, type the route number of a static route you want to configure Figure 21-6Menu 12.1 Edit IP Static Route Page Page 22.1 Dial-inUser Setup Table 22-1Menu 14.1- Edit Dial-inUser 23.1 Introduction 23.1.1 Applying NAT 23.2 NAT Setup 23.2.1 Address Mapping Sets Figure 23-5Menu 15.1.255 SUA Address Mapping Rules The following table explains the fields in this menu Table 23-2Menu 15.1.255 SUA Address Mapping Rules User-DefinedAddress Mapping Sets Select Rule Set Name Figure 23-6Menu 15.1.1 Address Mapping Rules The table below describes the fields for configuration in this menu 23.2.2 Configuring Individual Rule 23.3 Port Forwarding Setup - NAT Server Sets 23.3.1 Configuring a Server behind NAT 23.4 General NAT Examples 23.4.1 Example 1: Internet Access Only Figure 23-9NAT Example Figure 23-10Menu 4 Internet Access Setup Network Address Translation 23.4.2 Example 2: Internet Access with an Inside Server 23.4.3 Example 3: Multiple Public IP Addresses With Inside Servers 1 : Many : Server Figure 23-13NAT Example Menu 15.1 - Address Mapping Sets Figure 23-14Menu 11.3 Remote Node Network Layer Options Edit Action Start IP Figure 23-15Menu 15.1.1.1 Address Mapping Rule Step 7. When finished, menu 15.1.1 should look like as shown next Figure 23-16Menu 15.1.1 Address Mapping Rules Menu 15.2 – Port Forwarding Setup Example 3: Menu 15.2 Port Forwarding Setup 23.4.4 Example 4: NAT Unfriendly Application Programs 23.5 Trigger Port Setup Two Points To Remember About Trigger Ports Menu 15.3 — Trigger Port Setup Figure 23-21Menu 15.3 Trigger Port Setup Table 23-6Menu 15.3 Trigger Port Setup Page Part X: SMT ADVANCED MANAGEMENT MENUS Page 24.1 About Filtering Execute Figure 24-2Filter Rule Process 24.2 Configuring a Filter Set Figure 24-4NetBIOS_WAN Filter Rules Summary Figure 24-5NetBIOS_LAN Filter Rules Summary Figure 24-6TEL_FTP_WEB_WAN Filter Rules Summary 24.2.1 Filter Rules Summary Menus 24.3 Configuring a Filter Rule 24.3.1 TCP/IP Filter Rule Figure 24-7Menu 21.1.1 TCP/IP Filter Rule The following table describes how to configure your TCP/IP filter rule Table 24-3Menu 21.1.1 TCP/IP Filter Rule Page The following figure illustrates the logic flow of an IP filter Figure 24-8Executing an IP Filter 24.3.2 Generic Filter Rule 24.4 Filter Types and NAT 24.5 Example Filter TCP/IP Filter Rule Figure 24-12Sample Filter - Menu 24.6 Applying Filters and Factory Defaults 24.6.1 Ethernet Traffic 24.6.2 Remote Node Filters 24.7 Firewall Setup Page 25.1 SNMP Configuration Page 26.1 System Security 26.1.1 System Password 26.1.2 Configuring External RADIUS Server Figure 26-3Menu 23.2 System Security : RADIUS Server Table 26-1Menu 23.2 System Security : RADIUS Server 26.1.3 IEEE802.1x Figure 26-5Menu 23.4 System Security : IEEE802.1x Table 26-2Menu 23.4 System Security : IEEE802.1x Page Page 27.1 System Status Figure 27-2Menu 24.1 System Maintenance : Status Table 27-1Menu 24.1 System Maintenance : Status 27.2 System Information 27.2.1 System Information 27.2.2 Console Port Speed 27.3 Log and Trace 27.3.1 Viewing Error Log 27.3.2 Syslog Logging 27.3.3 Call-TriggeringPacket 27.4 Diagnostic 28.1 Filename Conventions 28.2 Backup Configuration 28.2.1 Backup Configuration 28.2.2 Using the FTP Command from the Command Line 28.2.3 Example of FTP Commands from the Command Line 28.2.4 GUI-basedFTP Clients 28.2.5 TFTP and FTP over WAN Management Limitations 28.2.6 Backup Configuration Using TFTP 28.2.7 TFTP Command Example 28.2.8 GUI-basedTFTP Clients 28.2.9 Backup Via Console Port (only for ZyAIR B-2000) 28.3 Restore Configuration 28.3.1 Restore Using FTP 28.3.2 Restore Using FTP Session Example 28.3.3 Restore Via Console Port (only for ZyAIR B-2000) 28.4 Uploading Firmware and Configuration Files 28.4.1 Firmware File Upload 28.4.2 Configuration File Upload 28.4.3 FTP File Upload Command from the DOS Prompt Example 28.4.4 FTP Session Example of Firmware File Upload 28.4.5 TFTP File Upload 28.4.6 TFTP Upload Command Example 28.4.7 Uploading Via Console Port (only for ZyAIR B-2000) 28.4.8 Uploading Firmware File Via Console Port (only for ZyAIR B-2000) 28.4.9 Example Xmodem Firmware Upload Using HyperTerminal 28.4.11Example Xmodem Configuration Upload Using HyperTerminal Figure 28-19Example Xmodem Upload 29.1 Command Interpreter Mode 29.2 Call Control Support 29.2.1 Budget Management 29.2.2 Call History 29.3 Time and Date Setting Figure 29-6Menu 24.10 System Maintenance : Time and Date Setting Table 29-3Menu 24.10 System Maintenance : Time and Date Setting 29.3.1 Resetting the Time 30.1 Telnet 30.2 FTP 30.3 Web 30.4 Remote Management 30.4.1 Remote Management Setup 30.4.2 Remote Management Limitations 30.5 Remote Management and NAT 30.6 System Timeout 31.1 Introduction To delete a schedule set, enter the set number and press [SPACE BAR] and then [ENTER] (or delete) in the Edit Name field Edit Name Menu 26.1 - Schedule Set Setup Figure 31-2Menu 26.1 Schedule Set Setup Main Menu PPPoE PPTP Figure 31-3Applying Schedule Set(s) to a Remote Node (PPTP) Part XI: APPENDICES Page Problems Starting Up the ZyAIR Problems with the Password Problems with the Ethernet Interface Problems with the WAN Interface Problems with Internet Access Problems with Telnet Problems with the WLAN Interface Appendix B Brute-ForcePassword Guessing Protection Chart B-1 Brute-ForcePassword Guessing Protection Commands Brute-ForcePassword Guessing Protection Page Windows 95/98/Me If you need the adapter: If you need TCP/IP: If you need Client for Microsoft Networks: C-2 C-3 Windows 2000/NT/XP C-5 C-6 C-7 Macintosh OS 8/9 C-9 Macintosh OS Check your TCP/IP properties in the Network window C-11 Page Benefits of a Wireless LAN Ad-hocWireless LAN Configuration Infrastructure Wireless LAN Configuration Diagram D-2ESS Provides Campus-WideCoverage Page Security Flaws with IEEE Deployment Issues with IEEE Advantages of the IEEE Diagram E-1Sequences for EAP MD5–ChallengeAuthentication EAP-MD5 (Message-DigestAlgorithm 5) EAP-TLS(Transport Layer Security) EAP-TTLS(Tunneled Transport Layer Service) PEAP (Protected EAP) Comparison of EAP Authentication Types Antenna Characteristics Frequency Radiation Pattern Antenna Gain Types of Antennas For WLAN Positioning Antennas Connector Type PPPoE in Action Benefits of PPPoE Traditional Dial-upScenario How PPPoE Works ZyAIR as a PPPoE Client What is PPTP PPTP and the ZyAIR PPTP Protocol Overview Control & PPP connections Call Connection PPP Data Connection Page IP Addressing IP Classes Subnet Masks Subnetting Example: Two Subnets Page Example: Four Subnets Example Eight Subnets Subnetting With Class A and Class B Networks J-8 Command Syntax Command Usage Page Introduction Display NetBIOS Filter Settings NetBIOS Filter Configuration Appendix M Boot Commands Diagram M-1Option to Enter Debug Mode Diagram M-2Boot Module Commands M-2 The Ideal Setup The “Triangle Route” Problem The “Triangle Route” Solutions IP Aliasing Gateways on the WAN Side Page Appendix O Log Descriptions Chart O-1System Error Logs Chart O-2System Maintenance Logs Log Descriptions Chart O-3UPnP Logs Chart O-4ICMP Notes O-2 O-3 Log Commands Log Command Example Page Appendix P Power Adaptor Specifications Power Adaptor Specifications P-1 P-2 3-11 D-2 Alternative Subnet Mask Notation .................. J-3 Appendix Q Index 29-3 Maximum Number of Schedule Sets Precedence Example 13-10 3-3, 3-12, 9-6 DoS Basics Types Frequency-HoppingSpread Spectrum ...........D-2 4-2, 5-2, 9-6, 13-1, 13-4 Restrictions 13-1 Management Information Base (MIB) See NAT Many to One Message Digest Algorithm 5 See MD5 Remote Node Profile 5-2, 19-3 Roaming 6-3 12-1 TFTP and FTP over WAN Will Not Work When… TFTP Restrictions TKIP See Temporal Key Integrity Protocol