User Guide
Page 9
... to Know Your NBG-460N 23 The WPS Button ...29 Introducing the Web Configurator 31 Connection Wizard ...45 Tutorials ...63 AP Mode ...81 Network ...89 Wireless LAN ...91 WAN ...123 LAN ...139 DHCP ...147 Network Address Translation (NAT 153 Dynamic DNS ...163 Security ...167 Firewall ...169 Content Filtering ...179 IPSec VPN ...185 Management...
... to Know Your NBG-460N 23 The WPS Button ...29 Introducing the Web Configurator 31 Connection Wizard ...45 Tutorials ...63 AP Mode ...81 Network ...89 Wireless LAN ...91 WAN ...123 LAN ...139 DHCP ...147 Network Address Translation (NAT 153 Dynamic DNS ...163 Security ...167 Firewall ...169 Content Filtering ...179 IPSec VPN ...185 Management...
User Guide
Page 12
... 5.2.1 Configure Wireless Security Using WPS on both your NBG-460N and Wireless Client 63 5.2.2 Enable and Configure Wireless Security without WPS on your NBG-460N 67 5.2.3 Configure Your Notebook 68 5.3 Site-To-Site VPN Tunnel Tutorial 70 5.3.1 Configuring Bob's NBG-460N VPN Settings 71 5.3.2 Configuring Jack's NBG-460N VPN Settings 73 5.3.3 Checking the VPN Connection 75 5.4 Bandwidth Management for your Network 76...
... 5.2.1 Configure Wireless Security Using WPS on both your NBG-460N and Wireless Client 63 5.2.2 Enable and Configure Wireless Security without WPS on your NBG-460N 67 5.2.3 Configure Your Notebook 68 5.3 Site-To-Site VPN Tunnel Tutorial 70 5.3.1 Configuring Bob's NBG-460N VPN Settings 71 5.3.2 Configuring Jack's NBG-460N VPN Settings 73 5.3.3 Checking the VPN Connection 75 5.4 Bandwidth Management for your Network 76...
User Guide
Page 16
... ...183 14.6.1 Customizing Keyword Blocking URL Checking 184 Chapter 15 IPSec VPN...185 15.1 Overview ...185 15.2 What You Can Do ...185 ...15.4 The General Screen ...188 15.4.1 VPN Rule Setup (Basic 189 15.4.2 VPN Rule Setup (Advanced 194 15.4.3 VPN Rule Setup (Manual 201 15.5 The...VPN and Remote Management 206 15.6.2 IKE SA Proposal ...207 15.6.3 Diffie-Hellman (DH) Key Exchange 208 15.6.4 Authentication ...208 15.6.5 Negotiation Mode 209 15.6.6 VPN... SA Proposal and Perfect Forward Secrecy 212 15.6.10 Additional IPSec VPN Topics 212 Part IV: Management 215 Chapter 16 Static Route ...217...
... ...183 14.6.1 Customizing Keyword Blocking URL Checking 184 Chapter 15 IPSec VPN...185 15.1 Overview ...185 15.2 What You Can Do ...185 ...15.4 The General Screen ...188 15.4.1 VPN Rule Setup (Basic 189 15.4.2 VPN Rule Setup (Advanced 194 15.4.3 VPN Rule Setup (Manual 201 15.5 The...VPN and Remote Management 206 15.6.2 IKE SA Proposal ...207 15.6.3 Diffie-Hellman (DH) Key Exchange 208 15.6.4 Authentication ...208 15.6.5 Negotiation Mode 209 15.6.6 VPN... SA Proposal and Perfect Forward Secrecy 212 15.6.10 Additional IPSec VPN Topics 212 Part IV: Management 215 Chapter 16 Static Route ...217...
User Guide
Page 23
...information.) 1.2 Applications Your can create the following networks using the NBG-460N: • Wired. NBG-460N User's Guide 23 A range of the NBG460N so that they... with each other IEEE 802.11b/g/n compatible devices. Additionally, you to Know Your NBG-460N 1.1 Overview This chapter introduces the main features and applications of your network. CHAPTER ...highly important applications such as Voice over the Internet (VoIP). The NBG-460N extends the range of the NBG-460N. You can configure your NBG-460N to have a port for your Internet Protocol Television (IPTV) service...
...information.) 1.2 Applications Your can create the following networks using the NBG-460N: • Wired. NBG-460N User's Guide 23 A range of the NBG460N so that they... with each other IEEE 802.11b/g/n compatible devices. Additionally, you to Know Your NBG-460N 1.1 Overview This chapter introduces the main features and applications of your network. CHAPTER ...highly important applications such as Voice over the Internet (VoIP). The NBG-460N extends the range of the NBG-460N. You can configure your NBG-460N to have a port for your Internet Protocol Television (IPTV) service...
User Guide
Page 26
AP The following methods to Know Your NBG-460N 1.3.3 Router vs. Bandwidth Management YES This allows you ...the expense of leased site-to access the NBG-460N when the IP addresses of the computer and the NBG-460N are mostly used for firmware upgrades and configuration backup/ restore. 26 NBG-460N User's Guide Table 1 Features Available in... protecting your network and the Internet. Chapter 1 Getting to manage the NBG-460N. • Web Configurator. AP MODE NO NO NO NO NO YES 1.4 Ways to Manage the NBG-460N Use any of the NBG460N using a (supported) web browser. •...
AP The following methods to Know Your NBG-460N 1.3.3 Router vs. Bandwidth Management YES This allows you ...the expense of leased site-to access the NBG-460N when the IP addresses of the computer and the NBG-460N are mostly used for firmware upgrades and configuration backup/ restore. 26 NBG-460N User's Guide Table 1 Features Available in... protecting your network and the Internet. Chapter 1 Getting to manage the NBG-460N. • Web Configurator. AP MODE NO NO NO NO NO YES 1.4 Ways to Manage the NBG-460N Use any of the NBG460N using a (supported) web browser. •...
User Guide
Page 36
... you want some applications to the NBG-460N. 36 NBG-460N User's Guide Heap memory refers to devices not in the same subnet as the NBG-460N. Configuration Mode This shows whether the advanced screens of the NBG-460N's processing ability is currently used by ZyNOS (ZyXEL Network Operating System) and is not... This shows whether UPnP is active or not. - Interface Status Interface This displays the NBG-460N port types. Summary Any IP Table BW MGMT Monitor DHCP Table Packet Statistics VPN Monitor WLAN Station Status For the WLAN, it displays the maximum transmission rate when the ...
... you want some applications to the NBG-460N. 36 NBG-460N User's Guide Heap memory refers to devices not in the same subnet as the NBG-460N. Configuration Mode This shows whether the advanced screens of the NBG-460N's processing ability is currently used by ZyNOS (ZyXEL Network Operating System) and is not... This shows whether UPnP is active or not. - Interface Status Interface This displays the NBG-460N port types. Summary Any IP Table BW MGMT Monitor DHCP Table Packet Statistics VPN Monitor WLAN Station Status For the WLAN, it displays the maximum transmission rate when the ...
User Guide
Page 38
...Static Route Use this screen to display and manage active VPN connections. Use this screen to set the upstream bandwidth and edit a bandwidth management rule. DNS Use this screen to change your NBG-460N's time and date. 38 NBG-460N User's Guide Chapter 3 Introducing the Web Configurator Table ...address(es) users can use Telnet to enable UPnP on the NBG-460N. UPnP General Use this screen to set the days and times for the NBG460N to view the NBG-460N's bandwidth usage and allotments. VPN General Use this screen to perform content filtering. Monitor Use ...
...Static Route Use this screen to display and manage active VPN connections. Use this screen to set the upstream bandwidth and edit a bandwidth management rule. DNS Use this screen to change your NBG-460N's time and date. 38 NBG-460N User's Guide Chapter 3 Introducing the Web Configurator Table ...address(es) users can use Telnet to enable UPnP on the NBG-460N. UPnP General Use this screen to set the days and times for the NBG460N to view the NBG-460N's bandwidth usage and allotments. VPN General Use this screen to perform content filtering. Monitor Use ...
User Guide
Page 42
... is the total amount of time the line has been up. Refresh Both AH and ESP increase NBG-460N processing requirements and communications latency (delay). Figure 12 Summary: VPN Monitor The following table describes the labels in this port. Poll Interval(s) Enter the time interval for...A Security Association (SA) is the total time the NBG-460N has been on this port. System Up Time This is the group of security settings related to a specific VPN tunnel. This screen displays read-only information about the active VPN connections. Tx B/s This displays the transmission speed in...
... is the total amount of time the line has been up. Refresh Both AH and ESP increase NBG-460N processing requirements and communications latency (delay). Figure 12 Summary: VPN Monitor The following table describes the labels in this port. Poll Interval(s) Enter the time interval for...A Security Association (SA) is the total time the NBG-460N has been on this port. System Up Time This is the group of security settings related to a specific VPN tunnel. This screen displays read-only information about the active VPN connections. Tx B/s This displays the transmission speed in...
User Guide
Page 53
...Exit Click Exit to close the wizard screen without saving. 4.4.3 PPTP Connection Point-to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. PPTP supports on-demand, multi-protocol, and virtual private networking over Ethernet option for Internet Access Connection Type... Name Type the name of the task. Back Click Back to return to continue. Next Click Next to the previous screen. NBG-460N User's Guide 53 Refer to the appendix for more information on PPPoE. Refer to the appendix for more information on PPTP. Figure...
...Exit Click Exit to close the wizard screen without saving. 4.4.3 PPTP Connection Point-to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. PPTP supports on-demand, multi-protocol, and virtual private networking over Ethernet option for Internet Access Connection Type... Name Type the name of the task. Back Click Back to return to continue. Next Click Next to the previous screen. NBG-460N User's Guide 53 Refer to the appendix for more information on PPPoE. Refer to the appendix for more information on PPTP. Figure...
User Guide
Page 63
... card). B can access the Internet through the AP wirelessly. This example uses the NBG-460N as the AP and NWD210N as follows: • How to Connect to the Internet from an AP • Site-To-Site VPN Tunnel Tutorial • Bandwidth Management for your Network 5.2 How to Connect to the ...Internet from an AP This section gives you an example of how to set up wireless network using WPS. NBG-460N User's Guide 63 CHAPTER 5 Tutorials 5.1 Overview This...
... card). B can access the Internet through the AP wirelessly. This example uses the NBG-460N as the AP and NWD210N as follows: • How to Connect to the Internet from an AP • Site-To-Site VPN Tunnel Tutorial • Bandwidth Management for your Network 5.2 How to Connect to the ...Internet from an AP This section gives you an example of how to set up wireless network using WPS. NBG-460N User's Guide 63 CHAPTER 5 Tutorials 5.1 Overview This...
User Guide
Page 70
... your wireless connection is successful, open your connection is successfully configured. 5.3 Site-To-Site VPN Tunnel Tutorial Bob and Jack want to setup a VPN connection between their NBG-460Ns to configure their offices. Bob and Jack each have no connection, see the Troubleshooting section of...-To-Site VPN Tunnel Settings SETTING BOB'S NBG-460N Active YES IPSec Keying IKE Mode JACK'S NBG-460N YES IKE 70 NBG-460N User's Guide This tutorial covers how to create a secure connection. Figure 39 Link Status 8 If your Internet browser and enter http:// www.zyxel.com or the...
... your wireless connection is successful, open your connection is successfully configured. 5.3 Site-To-Site VPN Tunnel Tutorial Bob and Jack want to setup a VPN connection between their NBG-460Ns to configure their offices. Bob and Jack each have no connection, see the Troubleshooting section of...-To-Site VPN Tunnel Settings SETTING BOB'S NBG-460N Active YES IPSec Keying IKE Mode JACK'S NBG-460N YES IKE 70 NBG-460N User's Guide This tutorial covers how to create a secure connection. Figure 39 Link Status 8 If your Internet browser and enter http:// www.zyxel.com or the...
User Guide
Page 71
...(basic) screen. 2 Select the Active checkbox to enable the VPN rule after it has been created. Chapter 5 Tutorials Table 23 Site-To-Site VPN Tunnel Settings (continued) SETTING BOB'S NBG-460N JACK'S NBG-460N Local Address 192.168.1.35 10.0.0.7 Local Address End /Mask ...ThisIsMySecretKey Encryption Algorithm 3DES 3DES Authentication Algorithm SHA1 SHA1 5.3.1 Configuring Bob's NBG-460N VPN Settings To configure these settings Bob uses the NBG-460N Web Configurator. 1 Log into the NBG-460N Web Configurator and click VPN > Modify icon. Make sure IKE is selected as the IPSec Keying...
...(basic) screen. 2 Select the Active checkbox to enable the VPN rule after it has been created. Chapter 5 Tutorials Table 23 Site-To-Site VPN Tunnel Settings (continued) SETTING BOB'S NBG-460N JACK'S NBG-460N Local Address 192.168.1.35 10.0.0.7 Local Address End /Mask ...ThisIsMySecretKey Encryption Algorithm 3DES 3DES Authentication Algorithm SHA1 SHA1 5.3.1 Configuring Bob's NBG-460N VPN Settings To configure these settings Bob uses the NBG-460N Web Configurator. 1 Log into the NBG-460N Web Configurator and click VPN > Modify icon. Make sure IKE is selected as the IPSec Keying...
User Guide
Page 72
...Policy 5 Enter the IP address "1.1.1.1" in the Remote Address Start text box. This is the type of content that only Bob and Jack know. 72 NBG-460N User's Guide Figure 44 Tutorial: Authentication Method 9 Select Tunnel as the Encapsulation Mode and ESP as the IPSec Protocol. 10 Enter "ThisIsMySecretKey" as the...Local Address End/Mask text box. Enter the IP address "10.0.0.7" in the Secure Gateway Address text box. This is the password for the VPN tunnel that will be used to access this single IP address. This is Jack's Local Content WAN IP address. This is the IP address ...
...Policy 5 Enter the IP address "1.1.1.1" in the Remote Address Start text box. This is the type of content that only Bob and Jack know. 72 NBG-460N User's Guide Figure 44 Tutorial: Authentication Method 9 Select Tunnel as the Encapsulation Mode and ESP as the IPSec Protocol. 10 Enter "ThisIsMySecretKey" as the...Local Address End/Mask text box. Enter the IP address "10.0.0.7" in the Secure Gateway Address text box. This is the password for the VPN tunnel that will be used to access this single IP address. This is Jack's Local Content WAN IP address. This is the IP address ...
User Guide
Page 73
... Keying Mode. Select the authentication algorithm as the encyption algorithm. These algorithms are more secure. Figure 46 Tutorial: VPN Summary 5.3.2 Configuring Jack's NBG-460N VPN Settings To configure these settings Jack uses the NBG-460N Web Configurator. 1 Log into the NBG-460N Web Configurator and click VPN > Modify icon. Chapter 5 Tutorials 11 Select 3DES as SHA1. This displays the...
... Keying Mode. Select the authentication algorithm as the encyption algorithm. These algorithms are more secure. Figure 46 Tutorial: VPN Summary 5.3.2 Configuring Jack's NBG-460N VPN Settings To configure these settings Jack uses the NBG-460N Web Configurator. 1 Log into the NBG-460N Web Configurator and click VPN > Modify icon. Chapter 5 Tutorials 11 Select 3DES as SHA1. This displays the...
User Guide
Page 74
...Type. This is Bob's Local Content WAN IP address. This value is Bob's WAN IP address. 8 Select IP as Jack only wants Bob to Bob's NBG-460N. 7 Enter the IP address "1.1.1.1" in the My IP Address text box. Enter the IP address "192.168.1.35" in the Local Content text box. Enter...Peer Content text box. This is the password for the VPN tunnel that will be used to access this single IP address. Figure 49 Tutorial: Remote Policy 5 Enter the IP address "2.2.2.2" in the Secure Gateway Address text box. This identifies Jack's NBG-460N to access this single IP address. This is the IP...
...Type. This is Bob's Local Content WAN IP address. This value is Bob's WAN IP address. 8 Select IP as Jack only wants Bob to Bob's NBG-460N. 7 Enter the IP address "1.1.1.1" in the My IP Address text box. Enter the IP address "192.168.1.35" in the Local Content text box. Enter...Peer Content text box. This is the password for the VPN tunnel that will be used to access this single IP address. Figure 49 Tutorial: Remote Policy 5 Enter the IP address "2.2.2.2" in the Secure Gateway Address text box. This identifies Jack's NBG-460N to access this single IP address. This is the IP...
User Guide
Page 75
... the computer on the other side of the VPN connection. These algorithms are more secure. Figure 52 Tutorial: VPN Summary 5.3.3 Checking the VPN Connection Check if the VPN connection is pinging Jack's computer. Figure 53 Pinging Jack's Local IP Address NBG-460N User's Guide 75 Figure 51 Tutorial: IPSec ...Algorithm 12 Click Apply to save the new rule and click VPN in the Web Configurator menu to return to the VPN Summary screen. In the example below . Chapter 5 Tutorials...
... the computer on the other side of the VPN connection. These algorithms are more secure. Figure 52 Tutorial: VPN Summary 5.3.3 Checking the VPN Connection Check if the VPN connection is pinging Jack's computer. Figure 53 Pinging Jack's Local IP Address NBG-460N User's Guide 75 Figure 51 Tutorial: IPSec ...Algorithm 12 Click Apply to save the new rule and click VPN in the Web Configurator menu to return to the VPN Summary screen. In the example below . Chapter 5 Tutorials...
User Guide
Page 76
... If pinging is successful which means a VPN tunnel has been established between Bob and Jack's NBG-460Ns. Congratulations! To check this example, your Network This section shows you to specify bandwidth management rules based on the NBG-460N to configure the bandwidth management feature on an application or subnet. ZyXEL's bandwidth management feature allows you how...
... If pinging is successful which means a VPN tunnel has been established between Bob and Jack's NBG-460Ns. Congratulations! To check this example, your Network This section shows you to specify bandwidth management rules based on the NBG-460N to configure the bandwidth management feature on an application or subnet. ZyXEL's bandwidth management feature allows you how...
User Guide
Page 134
PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet. This screen displays when you select PPTP encapsulation. Chapter 8 WAN 8.4.3 PPTP Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. Figure 91 Network > WAN > Internet Connection: PPTP Encapsulation 134 NBG-460N User's Guide
PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet. This screen displays when you select PPTP encapsulation. Chapter 8 WAN 8.4.3 PPTP Encapsulation Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. Figure 91 Network > WAN > Internet Connection: PPTP Encapsulation 134 NBG-460N User's Guide
User Guide
Page 135
... the default selection. PPTP supports on the IP address that enables secure transfer of the PPTP server. My IP Subnet Mask Your NBG-460N will automatically calculate the subnet mask based on -demand, multi-protocol, and virtual private networking over public networks, such as the ...sure that you a fixed IP address. Nailed-up Connection Select Nailed-Up Connection if you by the NBG-460N. Retype to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. Idle Timeout This value specifies the time in this field if you assign...
... the default selection. PPTP supports on the IP address that enables secure transfer of the PPTP server. My IP Subnet Mask Your NBG-460N will automatically calculate the subnet mask based on -demand, multi-protocol, and virtual private networking over public networks, such as the ...sure that you a fixed IP address. Nailed-up Connection Select Nailed-Up Connection if you by the NBG-460N. Retype to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. Idle Timeout This value specifies the time in this field if you assign...
User Guide
Page 185
... of leased site-to provide confidentiality, data integrity and authentication at the IP layer. Figure 117 IPSec VPN: Overview The VPN tunnel connects the NBG-460N (X) and the remote IPSec router (Y). Internet Protocol Security (IPSec) is a combination of standardized cryptographic ...IPSec is used to display and manage the NBG-460N's VPN rules (tunnels). It is built around a number of tunneling, encryption, authentication, access control and auditing. CHAPTER 15 IPSec VPN 15.1 Overview A virtual private network (VPN) provides secure communications between sites without the ...
... of leased site-to provide confidentiality, data integrity and authentication at the IP layer. Figure 117 IPSec VPN: Overview The VPN tunnel connects the NBG-460N (X) and the remote IPSec router (Y). Internet Protocol Security (IPSec) is a combination of standardized cryptographic ...IPSec is used to display and manage the NBG-460N's VPN rules (tunnels). It is built around a number of tunneling, encryption, authentication, access control and auditing. CHAPTER 15 IPSec VPN 15.1 Overview A virtual private network (VPN) provides secure communications between sites without the ...