User Guide
Page 12
Table of Contents Chapter 3 Wizard Setup for Internet Access 59 3.1 Introduction ...59 3.2 Internet Access Wizard Setup 59 3.2.1 Automatic Detection 61 3.2.2 Manual Configuration 61 3.3 Wireless Connection Wizard Setup 66 3.3.1 Automatically assign a WPA key 69 3.3.2 Manually assign a WPA-PSK key 69 3.3.3 Manually assign a WEP key 69 Chapter 4 Bandwidth Management Wizard ...
Table of Contents Chapter 3 Wizard Setup for Internet Access 59 3.1 Introduction ...59 3.2 Internet Access Wizard Setup 59 3.2.1 Automatic Detection 61 3.2.2 Manual Configuration 61 3.3 Wireless Connection Wizard Setup 66 3.3.1 Automatically assign a WPA key 69 3.3.2 Manually assign a WPA-PSK key 69 3.3.3 Manually assign a WEP key 69 Chapter 4 Bandwidth Management Wizard ...
User Guide
Page 23
... of Figures Figure 1 ZyXEL Device Internet Access Application 40 Figure 2 ZyXEL Device LAN-to-LAN Application Example 40 Figure 3 Firewall Application ...41 Figure 4 P-662H Front Panel ...41 Figure 5 P-662HW Front Panel ...41 Figure... Detection: No DSL Connection 60 Figure 21 Auto Detection: Failed ...61 Figure 22 Auto-Detection: PPPoE ...61 Figure 23 Internet Access Wizard Setup: ISP Parameters 62 Figure 24 Internet...Failed-2...66 Figure 30 Connection Test Successful 66 Figure 31 Wireless LAN Setup Wizard 1 67 Figure 32 Wireless LAN Setup Wizard 2 68 Figure 33 Manually assign a WPA key...
... of Figures Figure 1 ZyXEL Device Internet Access Application 40 Figure 2 ZyXEL Device LAN-to-LAN Application Example 40 Figure 3 Firewall Application ...41 Figure 4 P-662H Front Panel ...41 Figure 5 P-662HW Front Panel ...41 Figure... Detection: No DSL Connection 60 Figure 21 Auto Detection: Failed ...61 Figure 22 Auto-Detection: PPPoE ...61 Figure 23 Internet Access Wizard Setup: ISP Parameters 62 Figure 24 Internet...Failed-2...66 Figure 30 Connection Test Successful 66 Figure 31 Wireless LAN Setup Wizard 1 67 Figure 32 Wireless LAN Setup Wizard 2 68 Figure 33 Manually assign a WPA key...
User Guide
Page 24
...DHCP Setup ...108 Figure 58 LAN Client List ...110 Figure 59 Physical Network & Partitioned Logical Networks 111 Figure 60 LAN IP Alias ...111 Figure 61 Example of a Wireless Network 113 Figure 62 Wireless LAN: General ...117 Figure 63 Wireless: No Security ...119 Figure 64 Wireless: Static WEP ...Encryption 120 Figure 65 Wireless: WPA(2)-PSK ...121 Figure 66 Wireless: WPA(2) ...122 Figure 67 Advanced ...124 Figure 68 OTIST ...126 Figure 69 Example Wireless Client OTIST Screen 127 Figure 70 Security Key ...127 Figure 71 OTIST in Progress ...
...DHCP Setup ...108 Figure 58 LAN Client List ...110 Figure 59 Physical Network & Partitioned Logical Networks 111 Figure 60 LAN IP Alias ...111 Figure 61 Example of a Wireless Network 113 Figure 62 Wireless LAN: General ...117 Figure 63 Wireless: No Security ...119 Figure 64 Wireless: Static WEP ...Encryption 120 Figure 65 Wireless: WPA(2)-PSK ...121 Figure 66 Wireless: WPA(2) ...122 Figure 67 Advanced ...124 Figure 68 OTIST ...126 Figure 69 Example Wireless Client OTIST Screen 127 Figure 70 Security Key ...127 Figure 71 OTIST in Progress ...
User Guide
Page 32
... Port ...152 Table 58 Trigger Port Edit ...153 Table 59 Common IP Ports ...159 Table 60 ICMP Commands That Trigger Alerts 162 Table 61 Legal NetBIOS Commands 162 Table 62 Legal SMTP Commands ...162 Table 63 Firewall: General ...173 Table 64 Firewall Rules ...174 Table 65 Firewall...: Edit Rule ...177 Table 66 Customized Services ...178 Table 67 Firewall: Configure Customized Services 179 Table 68 Predefined Services ...183 Table 69 Firewall: Anti Probing ...186 Table 70 Firewall: Threshold ...188 Table 71 ...
... Port ...152 Table 58 Trigger Port Edit ...153 Table 59 Common IP Ports ...159 Table 60 ICMP Commands That Trigger Alerts 162 Table 61 Legal NetBIOS Commands 162 Table 62 Legal SMTP Commands ...162 Table 63 Firewall: General ...173 Table 64 Firewall Rules ...174 Table 65 Firewall...: Edit Rule ...177 Table 66 Customized Services ...178 Table 67 Firewall: Configure Customized Services 179 Table 68 Predefined Services ...183 Table 69 Firewall: Anti Probing ...186 Table 70 Firewall: Threshold ...188 Table 71 ...
User Guide
Page 60
...Connection If the wizard still cannot detect a connection type and the following screen appears (see Figure 21 on page 61), click Next and refer to Section 3.2.2 on page 61 on the connection type you are using. If the wizard does not detect a connection type and the following ...screen appears (see Figure 20 on page 61. Chapter 3 Wizard Setup for Internet Access 2 Click INTERNET/WIRELESS SETUP to have the ZyXEL Device detect your hardware connections and click Restart the Internet/ Wireless Setup Wizard to configure the system...
...Connection If the wizard still cannot detect a connection type and the following screen appears (see Figure 21 on page 61), click Next and refer to Section 3.2.2 on page 61 on the connection type you are using. If the wizard does not detect a connection type and the following ...screen appears (see Figure 20 on page 61. Chapter 3 Wizard Setup for Internet Access 2 Click INTERNET/WIRELESS SETUP to have the ZyXEL Device detect your hardware connections and click Restart the Internet/ Wireless Setup Wizard to configure the system...
User Guide
Page 61
...: PPPoE 3.2.2 Manual Configuration 1 If the ZyXEL Device fails to detect your DSL connection type, enter the Internet access information given to you to the default. If not given, leave the fields set to enter your ISP exactly in the wizard screen. P-662H/HW-D Series User's Guide 61 Figure 21 Auto Detection: Failed...
...: PPPoE 3.2.2 Manual Configuration 1 If the ZyXEL Device fails to detect your DSL connection type, enter the Internet access information given to you to the default. If not given, leave the fields set to enter your ISP exactly in the wizard screen. P-662H/HW-D Series User's Guide 61 Figure 21 Auto Detection: Failed...
User Guide
Page 113
...the same SSID. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. Figure 61 Example of a Wireless Network The wireless network is the name of a wireless network. The SSID is the part in the blue circle. P-662H... they should use the access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your ZyXEL Device is the AP. CHAPTER 7 Wireless LAN This chapter discusses how to configure the wireless network settings in the same wireless network must ...
...the same SSID. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information. Figure 61 Example of a Wireless Network The wireless network is the name of a wireless network. The SSID is the part in the blue circle. P-662H... they should use the access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your ZyXEL Device is the AP. CHAPTER 7 Wireless LAN This chapter discusses how to configure the wireless network settings in the same wireless network must ...
User Guide
Page 162
IP Spoofing is a technique used to gain unauthorized access to be trusted. Table 61 Legal NetBIOS Commands MESSAGE: REQUEST: POSITIVE: VE: RETARGET: KEEPALIVE: All SMTP commands are coming from a trusted host and should be used to determine if they ... effect of the DoS attack. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of their attack. The ZyXEL Device blocks all others are already known to computers by tricking a router or firewall into systems, to hide the hacker's identity, or to packets that...
IP Spoofing is a technique used to gain unauthorized access to be trusted. Table 61 Legal NetBIOS Commands MESSAGE: REQUEST: POSITIVE: VE: RETARGET: KEEPALIVE: All SMTP commands are coming from a trusted host and should be used to determine if they ... effect of the DoS attack. Sometimes when a packet filter firewall is configured incorrectly an attacker can traceroute the firewall gaining knowledge of their attack. The ZyXEL Device blocks all others are already known to computers by tricking a router or firewall into systems, to hide the hacker's identity, or to packets that...