User Guide
Page 13
... ...151 8.4.1 Trigger Port Configuration 154 8.5 The DMZ Host Screen ...156 8.6 The ALG Screen ...156 8.7 Technical Reference ...157 Chapter 9 MAC Filter ...159 P-870HN-5xb User's Guide 13
... ...151 8.4.1 Trigger Port Configuration 154 8.5 The DMZ Host Screen ...156 8.6 The ALG Screen ...156 8.7 Technical Reference ...157 Chapter 9 MAC Filter ...159 P-870HN-5xb User's Guide 13
User Guide
Page 14
... Can Do in this Chapter 181 12.2 The Static Route Screen 182 12.2.1 Static Route Edit 183 Chapter 13 Policy Forwarding...185 13.1 Overview ...185 13.1.1 What You Can Do in this Chapter 185 13.2 The Policy Forwarding Screen 185 13.2.1 Policy Forwarding Setup 186 Chapter 14 DNS Route ...189 14 P-870HN-5xb User's Guide
... Can Do in this Chapter 181 12.2 The Static Route Screen 182 12.2.1 Static Route Edit 183 Chapter 13 Policy Forwarding...185 13.1 Overview ...185 13.1.1 What You Can Do in this Chapter 185 13.2 The Policy Forwarding Screen 185 13.2.1 Policy Forwarding Setup 186 Chapter 14 DNS Route ...189 14 P-870HN-5xb User's Guide
User Guide
Page 36
Figure 14 ZyXEL Utility: Profile Encryption 6 In the next screen, leave both boxes checked. Figure 15 Profile: Wireless Protocol Settings. 36 P-870HN-5xb User's Guide Enter the pre-shared key and leave the encryption type at the default setting. Figure 13 ZyXEL Utility: Profile Security 5 This screen varies depending on the encryption method you want to connect (In this example, WPA-PSK). Chapter 2 Tutorials 4 Choose the same encryption method as the AP to which you selected in the previous screen.
Figure 14 ZyXEL Utility: Profile Encryption 6 In the next screen, leave both boxes checked. Figure 15 Profile: Wireless Protocol Settings. 36 P-870HN-5xb User's Guide Enter the pre-shared key and leave the encryption type at the default setting. Figure 13 ZyXEL Utility: Profile Security 5 This screen varies depending on the encryption method you want to connect (In this example, WPA-PSK). Chapter 2 Tutorials 4 Choose the same encryption method as the AP to which you selected in the previous screen.
User Guide
Page 80
... through this connection. Click Network > WAN > Internet Connection. Figure 33 Internet Connection The following table describes the labels in Kbps) allowed for each interface. Table 13 Internet Connection LABEL DESCRIPTION Interface This shows the name of connections over the same PVC or the VLAN ID number assigned to traffic sent through...
... through this connection. Click Network > WAN > Internet Connection. Figure 33 Internet Connection The following table describes the labels in Kbps) allowed for each interface. Table 13 Internet Connection LABEL DESCRIPTION Interface This shows the name of connections over the same PVC or the VLAN ID number assigned to traffic sent through...
User Guide
Page 81
... activated or not for this connection. MLD This shows whether Multicast Listener Discovery (MLD) is activated or not for this connection. Chapter 5 WAN Setup Table 13 Internet Connection LABEL DESCRIPTION Vlan8021p This indicates the 802.1P priority level assigned to traffic sent through this connection. Firewall This shows whether the firewall...
... activated or not for this connection. MLD This shows whether Multicast Listener Discovery (MLD) is activated or not for this connection. Chapter 5 WAN Setup Table 13 Internet Connection LABEL DESCRIPTION Vlan8021p This indicates the 802.1P priority level assigned to traffic sent through this connection. Firewall This shows whether the firewall...
User Guide
Page 123
...; Both the Device and the wireless stations must use for data transmission. If you chose 64-bit WEP in the WEP Encryption field, then enter 13 characters (ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each key. Figure 55 Wireless LAN > General: WPA(2)-PSK P-870HN-5xb User's Guide 123...
...; Both the Device and the wireless stations must use for data transmission. If you chose 64-bit WEP in the WEP Encryption field, then enter 13 characters (ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each key. Figure 55 Wireless LAN > General: WPA(2)-PSK P-870HN-5xb User's Guide 123...
User Guide
Page 185
...Can Do in this Chapter The Policy Forwarding screens let you view and configure routing policies on the Device (Section 13.2 on page 185). 13.2 The Policy Forwarding Screen Click Advanced > Policy Forwarding to override the default routing behavior and alter the packet forwarding ...forwarding allows the Device to open the Policy Forwarding screen. Figure 96 Advanced > Policy Forwarding P-870HN-5xb User's Guide 185 CHAPTER 13 Policy Forwarding 13.1 Overview Traditionally, routing is applied to outgoing packets, prior to forward a packet. Policy-based routing is based on the policy ...
...Can Do in this Chapter The Policy Forwarding screens let you view and configure routing policies on the Device (Section 13.2 on page 185). 13.2 The Policy Forwarding Screen Click Advanced > Policy Forwarding to override the default routing behavior and alter the packet forwarding ...forwarding allows the Device to open the Policy Forwarding screen. Figure 96 Advanced > Policy Forwarding P-870HN-5xb User's Guide 185 CHAPTER 13 Policy Forwarding 13.1 Overview Traditionally, routing is applied to outgoing packets, prior to forward a packet. Policy-based routing is based on the policy ...
User Guide
Page 186
... is the WAN interface through which the traffic is the source MAC address. SourceMAC This is routed. Chapter 13 Policy Forwarding The following table describes the labels in this to create a new rule. 13.2.1 Policy Forwarding Setup Click the Add button in this screen to delete the rule. Table 62 Advanced > Policy...
... is the WAN interface through which the traffic is the source MAC address. SourceMAC This is routed. Chapter 13 Policy Forwarding The following table describes the labels in this to create a new rule. 13.2.1 Policy Forwarding Setup Click the Add button in this screen to delete the rule. Table 62 Advanced > Policy...
User Guide
Page 187
Back Click Back to return to begin configuring this screen afresh. Cancel Click Cancel to the previous screen without saving. Chapter 13 Policy Forwarding Table 63 Policy Forwarding: Add LABEL DESCRIPTION Source Port Enter the source port number. Apply Click Apply to save your changes back to the Device. Use Interface Select a WAN interface through which the traffic is sent. You must have the WAN interface(s) already configured in the WAN screens. P-870HN-5xb User's Guide 187
Back Click Back to return to begin configuring this screen afresh. Cancel Click Cancel to the previous screen without saving. Chapter 13 Policy Forwarding Table 63 Policy Forwarding: Add LABEL DESCRIPTION Source Port Enter the source port number. Apply Click Apply to save your changes back to the Device. Use Interface Select a WAN interface through which the traffic is sent. You must have the WAN interface(s) already configured in the WAN screens. P-870HN-5xb User's Guide 187
User Guide
Page 204
... 71 QoS Class Configuration (continued) LABEL DESCRIPTION Ether Type Select a predefined application to ff:ff:ff:00:00:00, a packet with a MAC address of 00:13:49:12:34:56 matches this criteria. For example, if you also need to ff:ff:ff:00:00:00, a packet with a MAC address of... the source. Enter the source subnet mask. If you select IP, you set the MAC address to 00:13:49:00:00:00 and the mask to configure a class for the bit(s) of the matched traffic's MAC address, which can be of any hexadecimal...
... 71 QoS Class Configuration (continued) LABEL DESCRIPTION Ether Type Select a predefined application to ff:ff:ff:00:00:00, a packet with a MAC address of 00:13:49:12:34:56 matches this criteria. For example, if you also need to ff:ff:ff:00:00:00, a packet with a MAC address of... the source. Enter the source subnet mask. If you select IP, you set the MAC address to 00:13:49:00:00:00 and the mask to configure a class for the bit(s) of the matched traffic's MAC address, which can be of any hexadecimal...
User Guide
Page 335
... 126 10 255.255.255.192 (/26) 1024 62 11 255.255.255.224 (/27) 2048 30 12 255.255.255.240 (/28) 4096 14 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you...
... 126 10 255.255.255.192 (/26) 1024 62 11 255.255.255.224 (/27) 2048 30 12 255.255.255.240 (/28) 4096 14 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you...
User Guide
Page 358
... Protocol version six) which combines its interface. When IPv6 is a collection of related IP addresses. The DHCP client uses the 3. MAC 00 : 13 : 49 : 12 : 34 : 56 EUI-64 02 : 13 : 49 : FF : FE : 12 : 34 : 56 Stateless Autoconfiguration With stateless autoconfiguration in IPv6 stateful autoconfiguration, the owner and status of the...
... Protocol version six) which combines its interface. When IPv6 is a collection of related IP addresses. The DHCP client uses the 3. MAC 00 : 13 : 49 : 12 : 34 : 56 EUI-64 02 : 13 : 49 : FF : FE : 12 : 34 : 56 Stateless Autoconfiguration With stateless autoconfiguration in IPv6 stateful autoconfiguration, the owner and status of the...