Table of Contents. Previous Page. Next Page. Phw series All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. Page 5 to Certifications 1 Go to www.
Page 7: Zyxel Limited Warranty Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Page 13 5. Page 15 9. Page 18 Page 24 Figure 72 Application Priority Configuration Page 27 Figure Connecting a Microfilter Page 31 Table 94 Maintenance Restore Configuration User Guide Feedback Help us help you.
E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters zyxel. The management server can securely manage and update configuration changes in the PH-Ds. The LAN is not connected. Click Login to proceed to a screen asking you to change your password or click Cancel to revert to the default password. Figure 5 Password Screen 6 If you entered the user password, skip the next two steps and refer to Section 2. Use this screen to access the summary statistics tables.
Page 47 Use this screen to block sites containing certain keywords in the URL. Page Status Screen This screen contains administrative and system-related information and also allows you to change your password. Logs View Log Use this screen to view the logs for the categories that you selected. The bar turns from green to red when the maximum is being approached.
Packet Statistics Use this screen to view port status and packet specific statistics. TIme Refresh Click Refresh to reload this screen. Node-Link This field displays the remote node index number and link type. Page Changing Login Password Click this button to halt the refreshing of the system statistics.
If not given, leave the fields set to the default. Back Click Back to go back to the previous wizard screen. Exit Click Exit to close the wizard screen without saving your changes. Figure Figure 26 Connection Test Failed Click Next to continue. Internet access is just the beginning. Refer to the rest of this guide for more detailed information on the complete range of ZyXEL Device features. This helps keep one service from using all of the available bandwidth and shutting out other users.
They use default port Select Services Setup to allocate bandwidth based on the service requirements. Back Click Back to display the previous screen. A service with High priority is given as much bandwidth as it needs.
Page Chapter 5 Wan Setup 5. What method s you use also depends on how many VCs you have and how many different network protocols you need. The first is that idle timeout is disabled. The second is that the ZyXEL Device will try to bring up the connection when turned on and whenever the connection is down.
A nailed-up connection can be very expensive for obvious reasons. Page Atm Traffic Classes An example application is background file transfer. The screen differs by the encapsulation. Page 84 Select Nailed-Up Connection when you want your connection up all the time. Connect on Demand Select Connect on Demand when you don't want the connection up all the time and specify an idle time-out in the Max Idle Timeout field. The screen appears as shown. Figure 41 Advanced Internet Connection Setup The following table describes the labels in this screen.
Active This display whether this connection is activated. Clear the check box to disable the connection. If you select Bridge, the ZyXEL Device will forward any packet that it does not route to this remote node; otherwise, the packets are discarded. Page 89 Select Nailed-Up Connection when you want your connection up all the time.
Put the protected LAN in one subnet Subnet 1 in the following figure and the backup gateway in another subnet Subnet 2.
Page Chapter 6 Lan Setup 6. In cases where your computer is required to use a static IP address in another network, you may need to manually configure the network settings of the computer every time you want to access the Internet via the ZyXEL Device.
Chapter 6 LAN Setup If the fields are left as 0. Page Lan Ip Alias IP alias allows you to partition a physical network into different logical networks over the same Ethernet interface.
Page RIP packets. Page Wireless Lan The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients. The wireless clients use the access point AP to interact with other devices such as the printer or with the Internet. Every wireless network must follow these basic guidelines. It can also protect the information that is sent in the wireless network. You can make every user log in to the wireless network before they can use it.
This is called user authentication. However, every wireless client in the wireless network has to support IEEE As a result, you do not have to set up the SSID and encryption on every device in the wireless network. Page Figure 58 Wireless: No Security Select No Security to allow wireless clients to communicate with the access points without any data encryption. Note: If you do not enable any wireless security on your ZyXEL Device, your network is accessible to any wireless networking device that is within range.
The key is not sent over the network. Antenna gain is the increase in coverage. Higher antenna gain improves the range of the signal for better communications.
Page Otist Enter 0 to disable this feature. Back Click Back to return to the previous screen. Cancel Click Cancel to reload the previous configuration for this screen.
Chapter 7 Wireless LAN Page Wmm Qos Example You can assign different priorities to different applications. This prevents reductions in data transmission for applications that are sensitive. Please refer to RFC for further information about port numbers. Next to the name of the service, two fields appear in brackets.
Click the Remove icon to delete an application entry. Page Priority Select a priority from the drop-down list box. Cancel Click Cancel to return to the previous screen without saving your changes. The ZyXEL Device keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored.
The following figure illustrates this. If you do not assign a Default Server IP address, the ZyXEL Device discards all packets received for ports that are not specified here or in the remote management setup. Ordering your rules is important because the ZyXEL Device applies the rules in the order that you specify. When a rule matches the current packet, the ZyXEL Device takes the corresponding action and the remaining rules are ignored. This is equivalent to SUA i. Page Server Mapping Set field.
Cancel Click Cancel to begin configuring this screen afresh. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. Their goal is not to steal information, but to disable a device or network so users no longer have access to network resources. However other Telnet traffic initiated from the WAN is blocked.
Page Tcp Security Below is a brief technical description of how these connections are tracked. Specifically, only outgoing echoes will allow incoming echo replies, outgoing address mask requests will allow incoming address mask replies, and outgoing timestamp requests will allow incoming timestamp replies.
Page Packet Filtering Vs Firewall 9. Page Chapter 10 Firewall Configuration For this reason, it is recommended that you configure your firewall using the web configurator. CLI Command Line Interpreter commands provide limited configuration options and are only recommended for advanced users. See the appendix for more on triangle route topology. Page Configuring Firewall Rules The ordering of your rules is important as they are applied in order of their numbering.
When Matched For further information on these services, please read Section This action displays the following screen. Refer to Section 9. Click Apply when you are done. The second field indicates the IP port number that defines the service.
Note that there may be more than one IP protocol type. This ensures that the number of half-open sessions to a given host will never exceed the threshold. Your router has a web interface, so you will login to it using your web browser. It usually does not matter which browser you choose to use. Open up your web browser and find the address bar. It should look something like this:. Above is an example of what a web browser address bar looks like.
Find the address bar in your router and type in your router's IP address. After entering the IP address of your router you can simply press enter. If all goes well you will see the following screen:. Now we need to find the port forwarding section in your router. Here's how you do it. Starting from the first page in your router:. Create a name for this forward and put it in the Service Name box. The name is only used as a reminder and has no effect on the port forward.
If you are forwarding a single port, enter that port number into the Start Port and the End Port boxes. If you are forwarding a range of ports, enter the lowest number of that range into the Start Port box. Then enter the highest number of that range into the End Port box. You can enter either the IP address of your computer or the IP address of another computer or device on your network.
When you're finished, click Apply near the bottom of the screen to save your changes. To test if your port has been properly forwarded, you can use our Network Utilities tool, which includes a free Open Port Checker. We also have the Internets largest collection of Router Screenshots.
0コメント