Chapter 12 SIP 12.1.7.2 Use NAT If you know the NAT routers public IP address and SIP port number, you can use the Use NAT feature to manually configure the ZyXEL Device to use a them in the SIP messages. This eliminates the need for STUN or a SIP ALG. You must also configure the NAT router to forward traffic with this port number to the ZyXEL Device. 12.1.7.
Chapter 12 SIP G.711 provides excellent sound quality but requires 64kbps of bandwidth. G.723 is an Adaptive Differential Pulse Code Modulation (ADPCM) waveform codec. Differential (or Delta) PCM is similar to PCM, but encodes the audio signal based on the difference between one sample and a prediction based on previous samples, rather than encoding the samples actual quantized value.
Chapter 12 SIP 12.1.11 Custom Tones (IVR) IVR (Interactive Voice Response) is a feature that allows you to use your telephone to interact with the ZyXEL Device. The ZyXEL Device allows you to record custom tones for the Caller Ringing Tone and On Hold Tone functions. The same recordings apply to both the caller ringing and on hold tones.
Chapter 12 SIP 12.1.12.1 Type Of Service (ToS) Network traffic can be classified by setting the ToS (Type Of Service) values at the data source (for example, at the ZyXEL Device) so a server can decide the best method of delivery, that is the least cost, fastest route and so on. 12.1.12.2 DiffServ DiffServ is a class of service (CoS) model that marks packets so that they receive specific perhop treatment at DiffServ-compliant network devices along the route based on the application types and traffic flow.
Chapter 12 SIP 12.2 SIP Screens 12.2.1 SIP Settings Screen Use this screen to maintain basic information about each SIP account. Your VoIP service provider (the company that lets you make phone calls over the Internet) should provide this. You can also enable and disable each SIP account. To access this screen, click VoIP > SIP > SIP Settings. Figure 104 VoIP > SIP > SIP Settings Each field is described in the following table.
Chapter 12 SIP Table 59 VoIP > SIP > SIP Settings LABEL DESCRIPTION REGISTER Server Address Enter the IP address or domain name of the SIP register server, if your VoIP service provider gave you one. Otherwise, enter the same address you entered in the SIP Server Address field. You can use up to 95 printable ASCII characters. REGISTER Server Port Enter the SIP register servers listening port number, if your VoIP service provider gave you one.
Chapter 12 SIP Figure 105 VoIP > SIP > SIP Settings > Advanced MAX-200HW2 Series Users Guide 159
Chapter 12 SIP Each field is described in the following table. Table 60 VoIP > SIP > SIP Settings > Advanced LABEL DESCRIPTION SIP Account This field displays the SIP account you see in this screen. SIP Server Settings URL Type Select whether or not to include the SIP service domain name when the ZyXEL Device sends the SIP number.
Chapter 12 SIP Table 60 VoIP > SIP > SIP Settings > Advanced LABEL DESCRIPTION DTMF Mode Control how the ZyXEL Device handles the tones that your telephone makes when you push its buttons. You should use the same mode your VoIP service provider uses. RFC 2833 - send the DTMF tones in RTP packets PCM - send the DTMF tones in the voice data stream. This method works best when you are using a codec that does not use compression (like G.711). Codecs that use compression (like G.729) can distort the tones.
Chapter 12 SIP Table 60 VoIP > SIP > SIP Settings > Advanced LABEL DESCRIPTION Enable Select this if you want to hear a waiting (beeping) dial tone on your phone when you have at least one voice message. Your VoIP service provider must support this feature. Expiration Time Keep the default value, unless your VoIP service provider tells you to change it. Enter the number of seconds the SIP server should provide the message waiting service each time the ZyXEL Device subscribes to the service.
Chapter 12 SIP Figure 106 VoIP > SIP > QoS Each field is described in the following table. Table 61 VoIP > SIP > QoS LABEL DESCRIPTION SIP TOS Priority Setting Enter the priority for SIP voice transmissions. The ZyXEL Device creates Type of Service priority tags with this priority to voice traffic that it transmits. RTP TOS Priority Setting Enter the priority for RTP voice transmissions. The ZyXEL Device creates Type of Service priority tags with this priority to RTP traffic that it transmits.
Chapter 12 SIP 164 MAX-200HW2 Series Users Guide
CHAPTER 13 Phone Use these screens to configure the phone you use to make phone calls with the ZyXEL Device. 13.1 Phone Overview You can configure the volume, echo cancellation, VAD settings and custom tones for the phone port on the ZyXEL Device. You can also select which SIP account to use for making outgoing calls. 13.1.1 Voice Activity Detection/Silence Suppression/Comfort Noise Voice Activity Detection (VAD) detects whether or not speech is present.
Chapter 13 Phone CLIR (Calling Line Identification Restriction) To take full advantage of the supplementary phone services available though the ZyXEL Device's phone port, you may need to subscribe to the services from your VoIP service provider. 13.1.3.1 The Flash Key Flashing means to press the hook for a short period of time (a few hundred milliseconds) before releasing it. On newer telephones, there should be a "flash" key (button) that generates the signal electronically.
Chapter 13 Phone Press the flash key and then 1 to disconnect the current call and resume the call on hold. If you hang up the phone but a caller is still on hold, there will be a remind ring. 13.1.3.2.2 European Call Waiting This allows you to place a call on hold while you answer another incoming call on the same telephone (directory) number. If there is a second call to a telephone number, you will hear a call waiting tone. Take one of the following actions. Reject the second call.
Chapter 13 Phone After pressing the flash key, if you do not issue the sub-command before the default subcommand timeout (2 seconds) expires or issue an invalid sub-command, the current operation will be aborted. Table 63 USA Type Flash Key Commands COMMAND SUB-COMMAND Flash Flash DESCRIPTION Put a current call on hold to place a second call. After the second call is successful, press the flash key again to have a three-way conference call. Put a current call on hold to answer an incoming call.
Chapter 13 Phone 13.2 Phone Screens 13.2.1 Analog Phone Screen Use this screen to control which SIP accounts and PSTN line each phone uses. To access this screen, click VoIP > Phone > Analog Phone. Figure 107 VoIP > Phone > Analog Phone Each field is described in the following table. Table 64 VoIP > Phone > Analog Phone LABEL DESCRIPTION Phone Port Settings Select the phone port you want to see in this screen. If you change this field, the screen automatically refreshes.
Chapter 13 Phone 13.2.2 Advanced Analog Phone Setup Screen Use this screen to edit advanced settings for each phone port. To access this screen, click Advanced Setup in VoIP > Phone > Analog Phone. Figure 108 VoIP > Phone > Analog Phone > Advanced Each field is described in the following table. Table 65 VoIP > Phone > Analog Phone > Advanced LABEL DESCRIPTION Analog Phone This field displays the phone port you see in this screen.
Chapter 13 Phone 13.2.3 Common Phone Settings Screen Use this screen to activate and deactivate immediate dialing. To access this screen, click VoIP > Phone > Common. Figure 109 VoIP > Phone > Common Each field is described in the following table.
Chapter 13 Phone Table 67 VoIP > Phone > Region 172 LABEL DESCRIPTION Apply Click this to save your changes and to apply them to the ZyXEL Device. Reset Click this to set every field in this screen to its last-saved value.
CHAPTER 14 Phone Book Use these screens to maintain call-forwarding rules and speed-dial settings. 14.1 Phone Book Overview Speed dial provides shortcuts for dialing frequently used (VoIP) phone numbers. It is also required if you want to make peer-to-peer calls. In peer-to-peer calls, you call another VoIP device directly without going through a SIP server. In the ZyXEL Device, you must set up a speed dial entry in the phone book in order to do this.
Chapter 14 Phone Book Figure 111 VoIP > Phone Book > Incoming Call Policy You can create two sets of call-forwarding rules. Each one is stored in a call-forwarding table. Each field is described in the following table. Table 68 VoIP > Phone Book > Incoming Call Policy 174 LABEL DESCRIPTION Table Number Select the call-forwarding table you want to see in this screen. If you change this field, the screen automatically refreshes.
Chapter 14 Phone Book Table 68 VoIP > Phone Book > Incoming Call Policy LABEL DESCRIPTION # This field is a sequential value, and it is not associated with a specific rule. The sequence is important, however. The ZyXEL Device checks each rule in order, and it only follows the first one that applies. Activate Select this to enable this rule. Clear this to disable this rule. Incoming Call Number Enter the phone number to which this rule applies.
Chapter 14 Phone Book Figure 112 VoIP > Phone Book > Speed Dial Each field is described in the following table. Table 69 VoIP > Phone Book > Speed Dial 176 LABEL DESCRIPTION Speed Dial Use this section to create or edit speed-dial entries. Speed Dial Select the speed-dial number you want to use for this phone number. Number Enter the SIP number you want the ZyXEL Device to call when you dial the speeddial number.
Chapter 14 Phone Book Table 69 VoIP > Phone Book > Speed Dial LABEL DESCRIPTION Modify Use this field to edit or erase the speed-dial entry. Click the Edit icon to copy the information for this speed-dial entry into the Speed Dial section, where you can change it. Click the Remove icon to erase this speed-dial entry. Clear Click this to erase all the speed-dial entries. Reset Click this to set every field in this screen to its last-saved value.
Chapter 14 Phone Book 178 MAX-200HW2 Series Users Guide
CHAPTER 15 Firewall Use these screens to enable, configure and disable the firewall that protects your ZyXEL Device and your LAN from unwanted or malicious traffic. 15.1 Firewall Overview Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks.
Chapter 15 Firewall The ZyXEL Device has one Ethernet (LAN) port. The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world. These computers will have access to Internet services such as e-mail, FTP and the World Wide Web. However, inbound access is not allowed (by default) unless the remote host is authorized to use a specific service. 15.1.
Chapter 15 Firewall LAN-to-LAN/ZyXEL Device means the LAN to the ZyXEL Device LAN interface. This is always allowed, as this is how you manage the ZyXEL Device from your local computer. 15.1.4.2 WAN-to-LAN rules WAN-to-LAN rules are Internet to your local network firewall rules. The default is to block all traffic from the Internet to your local network.
Chapter 15 Firewall 3 The reply from the WAN goes directly to the computer on the LAN without going through the ZyXEL Device. As a result, the ZyXEL Device resets the connection, as the connection has not been acknowledged. Figure 115 Triangle Route Problem 15.2.2 Solving the Triangle Route Problem If you have the ZyXEL Device allow triangle route sessions, traffic from the WAN can go directly to a LAN computer without passing through the ZyXEL Device and its firewall protection.
Chapter 15 Firewall 15.3 Firewall Screens 15.3.1 General Firewall Screen Use this screen to configure the basic settings for your firewall. To access this screen, click Security > Firewall > General. Figure 117 Security > Firewall > General Each field is described in the following table. Table 70 Security > Firewall > General LABEL DESCRIPTION Enable Firewall Select this to activate the firewall.
Chapter 15 Firewall Figure 118 Security > Firewall > Services Each field is described in the following table. Table 71 Security > Firewall > Services LABEL DESCRIPTION Service Setup Enable Services Blocking Select this to activate service blocking. The Schedule to Block section controls what days and what times service blocking is actually effective, however. Available Services This is a list of pre-defined services (destination ports) you may prohibit your LAN computers from using.
Chapter 15 Firewall Table 71 Security > Firewall > Services LABEL DESCRIPTION Day to Block Select which days of the week you want the service blocking to be effective. Time of Day to Block Select what time each day you want service blocking to be effective. Enter times in 24-hour format; for example, 3:00pm should be entered as 15:00. Apply Click this to save your changes. Reset Click this to set every field in this screen to its last-saved value.
Chapter 15 Firewall 186 MAX-200HW2 Series Users Guide
CHAPTER 16 Certificates This chapter gives background information about public-key certificates and explains how to use the Certificates screens. 16.1 Certificates Overview The ZyXEL Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owners identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 16 Certificates The ZyXEL Device uses certificates based on public-key cryptology to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection. For example, a VPN tunnel might use the triple DES encryption algorithm. The certification authority uses its private key to sign certificates.
Chapter 16 Certificates Binary PKCS#7: This is a standard that defines the general syntax for data (including digital signatures) that may be encrypted. A PKCS #7 file is used to transfer a public key certificate. The private key is not included. The ZyXEL Device currently allows the importation of a PKS#7 file that contains a single certificate.
Chapter 16 Certificates 3 Double-click the certificates icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields. Figure 120 Certificate Details 4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection. 16.
Chapter 16 Certificates Figure 121 Security > Certificates > My Certificates The following table describes the labels in this screen. Table 72 Security > Certificates > My Certificates LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the ZyXEL Devices PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Chapter 16 Certificates Table 72 Security > Certificates > My Certificates (continued) LABEL DESCRIPTION Modify Click the Details icon to open a screen with an in-depth list of information about the certificate. Click the Export icon to save a copy of the certificate without its private key. Browse to the location you want to use and click Save. Click the Remove icon to delete a certificate. A window displays asking you to confirm that you want to delete the certificate.
Chapter 16 Certificates Figure 122 Security > Certificates > My Certificates > Create The following table describes the labels in this screen. Table 73 Security > Certificates > My Certificates > Create LABEL DESCRIPTION Certificate Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;~!@#$%^&()_+[]{},.=- characters. Subject Information Use these fields to record information that identifies the owner of the certificate.
Chapter 16 Certificates Table 73 Security > Certificates > My Certificates > Create 194 LABEL DESCRIPTION Country Identify the state in which the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. Key Length Select a number from the drop-down list box to determine how many bits the key should use (512 to 2048). The longer the key, the more secure it is. A longer key also uses more PKI storage space.
Chapter 16 Certificates Table 73 Security > Certificates > My Certificates > Create LABEL DESCRIPTION Request Authentication When you select Create a certification request and enroll for a certificate immediately online, the certification authority may want you to include a reference number and key to identify you when you send a certification request. Fill in both the Reference Number and the Key fields if your certification authority uses CMP enrollment protocol.
Chapter 16 Certificates Figure 123 Security > Certificates > My Certificates > Details The following table describes the labels in this screen. Table 74 Security > Certificates > My Certificates > Details 196 LABEL DESCRIPTION Name This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;~!@#$%^&()_+[]{},.=- characters.
Chapter 16 Certificates Table 74 Security > Certificates > My Certificates > Details LABEL DESCRIPTION Type This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificates owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
Chapter 16 Certificates Table 74 Security > Certificates > My Certificates > Details LABEL DESCRIPTION Certificate in PEM (Base-64) Encoded Format This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert the binary certificate into a printable form.
Chapter 16 Certificates Figure 124 Security > Certificates > My Certificates > Import The following table describes the labels in this screen. Table 75 Security > Certificates > My Certificates > Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the ZyXEL Device. Browse Click Browse to find the certificate file you want to upload.
Chapter 16 Certificates Figure 125 Security > Certificates > Trusted CAs The following table describes the labels in this screen. Table 76 Security > Certificates > Trusted CAs 200 LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the ZyXEL Devices PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Chapter 16 Certificates Table 76 Security > Certificates > Trusted CAs (continued) LABEL DESCRIPTION Import Click Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the ZyXEL Device. Refresh Click this button to display the current validity status of the certificates. 16.8 Trusted CA Details Click Security > Certificates > Trusted CAs to open the Trusted CAs screen. Click the details icon to open the Trusted CA Details screen.
Chapter 16 Certificates The following table describes the labels in this screen. Table 77 Security > Certificates > Trusted CAs > Details LABEL DESCRIPTION Name This field displays the identifying name of this certificate. If you want to change the name, type up to 31 characters to identify this key certificate. You may use any character (not including spaces).
Chapter 16 Certificates Table 77 Security > Certificates > Trusted CAs > Details (continued) LABEL DESCRIPTION MD5 Fingerprint This is the certificates message digest that the ZyXEL Device calculated using the MD5 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate. SHA1 Fingerprint This is the certificates message digest that the ZyXEL Device calculated using the SHA1 algorithm.
Chapter 16 Certificates Figure 127 Security > Certificates > Trusted CAs > Import The following table describes the labels in this screen. Table 78 Security > Certificates > Trusted CAs Import 204 LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. Choose... Click Choose... to find the certificate file you want to upload. Apply Click Apply to save the certificate on the ZyXEL Device.
CHAPTER 17 Content Filter Use these screens to create and enforce policies that restrict access to the Internet based on content. 17.1 Content Filtering Overview Internet content filtering allows you to create and enforce Internet access policies tailored to their needs. Content filtering is the ability to block certain web features or specific URL keywords. The ZyXEL Device can block web features such as ActiveX controls, Java applets, cookies and disable web proxies.
Chapter 17 Content Filter Figure 128 Security > Content Filter > Filter Each field is described in the following table. Table 79 Security > Content Filter > Filter LABEL DESCRIPTION Trusted IP Setup Trusted Computer IP Address You can allow a specific computer to access all Internet resources without the restrictions you set in these screens. Enter the IP address of the trusted computer. Restrict Web Features Select the web features you want to disable.
Chapter 17 Content Filter Table 79 Security > Content Filter > Filter LABEL DESCRIPTION Delete Click Delete to remove the selected keyword in the Keyword List. The keyword disappears after you click Apply. Clear All Click this button to remove all of the keywords in the Keyword List. Denied Access Message Enter the message that is displayed when the ZyXEL Devices content filter feature blocks access to a web site. Apply Click this to save your changes and to apply them to the ZyXEL Device.
Chapter 17 Content Filter 208 MAX-200HW2 Series Users Guide
CHAPTER 18 Static Route Use these screens to configure static routes on the ZyXEL Device. 18.1 Static Route Overview Each remote node specifies only the network to which the gateway is directly connected, and the ZyXEL Device has no knowledge of the networks beyond. For instance, the ZyXEL Device knows about network N2 in the following figure through remote node Router 1.
Chapter 18 Static Route The first static route is the default route and cannot be modified or deleted. Figure 131 Management > Static Route > IP Static Route Each field is described in the following table. Table 81 Management > Static Route > IP Static Route LABEL DESCRIPTION # This field is a sequential value, and it is not associated with a specific rule. The sequence is important, however. The ZyXEL Device checks each rule in order, and it follows only the first one that applies.
Chapter 18 Static Route Figure 132 Management > Static Route > IP Static Route > Edit Each field is described in the following table. Table 82 Management > Static Route > IP Static Route > Edit LABEL DESCRIPTION Route Name Enter the name of the static route. Active Select this if you want the static route to be used. Clear this if you do not want the static route to be used. Private Select this if you do not want the ZyXEL Device to tell other routers about this static route.
Chapter 18 Static Route 212 MAX-200HW2 Series Users Guide
CHAPTER 19 Remote MGMT Use these screens to control which computers can use which services to access the ZyXEL Device on each interface. 19.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which ZyXEL Device interface (if any) from which computers. You may manage your ZyXEL Device from a remote location via: Table 83 Internet (WAN only) ALL (LAN and WAN) LAN only Neither (Disable).
Chapter 19 Remote MGMT Use the ZyXEL Devices WAN IP address when configuring from the WAN. Use the ZyXEL Devices LAN IP address when configuring from the LAN. 19.1.3 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The ZyXEL Device automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling.
Chapter 19 Remote MGMT Figure 134 Management > Remote MGMT > Telnet Each field is described in the following table. Table 85 Management > Remote MGMT > Telnet LABEL DESCRIPTION Server Port Enter the port number this service can use to access the ZyXEL Device. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the ZyXEL Device using this service.
Chapter 19 Remote MGMT Table 86 Management > Remote MGMT > FTP LABEL DESCRIPTION Secured Client IP Address Select All to allow any computer to access the ZyXEL Device using this service. Select Selected to only allow the computer with the IP address that you specify to access the ZyXEL Device using this service. Apply Click this to save your changes and to apply them to the ZyXEL Device. Reset Click this to set every field in this screen to its default value. 19.
Chapter 19 Remote MGMT The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects. SNMP allows a manager and agents to communicate for the purpose of accessing these objects. SNMP itself is a simple request/response protocol based on the manager/agent model.
Chapter 19 Remote MGMT Figure 137 Management > Remote MGMT > SNMP The following table describes the labels in this screen. Table 88 Remote Management: SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community, which is the password for the incoming Get and GetNext requests from the management station. The default is public and allows all requests. Set Community Enter the Set community, which is the password for incoming Set requests from the management station.
Chapter 19 Remote MGMT Figure 138 Management > Remote MGMT > DNS Each field is described in the following table. Table 89 Management > Remote MGMT > DNS LABEL DESCRIPTION Server Port This field is read-only. This field displays the port number this service uses to access the ZyXEL Device. The computer must use the same port number. Server Access Select the interface(s) through which a computer may access the ZyXEL Device using this service.
Chapter 19 Remote MGMT Each field is described in the following table. Table 90 Management > Remote MGMT > Security 220 LABEL DESCRIPTION Respond to Ping on Select the interface(s) on which the ZyXEL Device should respond to incoming ping requests. Disable - the ZyXEL Device does not respond to any ping requests. LAN - the ZyXEL Device only responds to ping requests received from the LAN. WAN - the ZyXEL Device only responds to ping requests received from the WAN.
CHAPTER 20 UPnP Use this screen to set up UPnP. 20.1 Introducing Universal Plug and Play Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use. 20.1.
Chapter 20 UPnP 20.1.4 UPnP and ZyXEL ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum Creates UPnP Implementors Corp. (UIC). ZyXEL's UPnP implementation supports IGD 1.0 (Internet Gateway Device). At the time of writing ZyXEL's UPnP implementation supports Windows Messenger 4.6 and 4.7 while Windows Messenger 5.0 and Xbox are still being tested. The ZyXEL Device only sends UPnP multicasts to the LAN.
Chapter 20 UPnP 3 In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 141 Add/Remove Programs: Windows Setup: Communication Components 4 Click OK to go back to the Add/Remove Programs Properties window and click Next. 5 Restart the computer when prompted. 20.2.1.2 Installing UPnP in Windows XP Follow the steps below to install the UPnP in Windows XP. 1 Click Start and Control Panel. 2 Double-click Network Connections.
Chapter 20 UPnP Figure 143 Windows Optional Networking Components Wizard 5 In the Networking Services window, select the Universal Plug and Play check box. Figure 144 Networking Services 6 Click OK to go back to the Windows Optional Networking Component Wizard window and click Next.
Chapter 20 UPnP 20.2.2 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the ZyXEL Device. Make sure the computer is connected to a LAN port of the ZyXEL Device. Turn on your computer and the ZyXEL Device. 20.2.2.1 Auto-discover Your UPnP-enabled Network Device 1 Click Start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway.
Chapter 20 UPnP Figure 146 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings.
Chapter 20 UPnP Figure 147 Internet Connection Properties: Advanced Settings Figure 148 Internet Connection Properties: Advanced Settings: Add 5 When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 6 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 20 UPnP Figure 149 System Tray Icon 7 Double-click on the icon to display your current Internet connection status. Figure 150 Internet Connection Status 20.2.2.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the ZyXEL Device without finding out the IP address of the ZyXEL Device first. This becomes helpful if you do not know the IP address of the ZyXEL Device. Follow the steps below to access the web configurator. 1 Click Start and then Control Panel.
Chapter 20 UPnP Figure 151 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your ZyXEL Device and select Invoke. The web configurator login screen displays.
Chapter 20 UPnP Figure 152 Network Connections: My Network Places 6 Right-click on the icon for your ZyXEL Device and select Properties. A properties window displays with basic information about the ZyXEL Device.
Chapter 20 UPnP 20.3 UPnP Screen Use this screen to set up UPnP in your ZyXEL Device. To access this screen, click Management > UPnP. Figure 154 Management > UPnP Each field is described in the following table. Table 91 Management > UPnP LABEL DESCRIPTION Device Name This field identifies your device in UPnP applications. Enable the Universal Plug and Play (UPnP) Feature Select this to activate UPnP.
Chapter 20 UPnP 232 MAX-200HW2 Series Users Guide
CHAPTER 21 System Use this screen to set up general system settings, change the system mode, change the password, configure the DDNS server settings, and set the current date and time. 21.1 System Features Overview 21.1.1 System Name System Name is for identification purposes. However, because some ISPs check this name you should enter your computer's "Computer Name". In Windows 95/98 click Start, Settings, Control Panel, Network.
Chapter 21 System 2 If the ISP did not give you DNS server information, leave the DNS Server fields in the SYSTEM General screen set to 0.0.0.0 for the ISP to dynamically assign the DNS server IP addresses. 21.1.4 Dynamic DNS Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.
Chapter 21 System Table 92 Pre-defined NTP Time Servers ntp1.sp.se time1.stupi.se tick.stdtime.gov.tw tock.stdtime.gov.tw time.stdtime.gov.tw 21.1.6 Resetting the Time The ZyXEL Device resets the time in the following instances: When the ZyXEL Device starts up. When you click Apply in the Time Setting Screen. 24-hour intervals after starting. 21.2 System Screens 21.2.
Chapter 21 System Table 93 Maintenance > System > General LABEL DESCRIPTION Domain Name Enter the domain name entry that is propagated to DHCP clients on the LAN. If you leave this blank, the domain name obtained from the ISP is used. Use up to 38 alphanumeric characters. Spaces are not allowed, but dashes - and periods "." are accepted. Administrator Inactivity Timer Enter the number of minutes a management session can be left idle before the session times out.
Chapter 21 System Each field is described in the following table. Table 94 Maintenance > System > Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup Enable Dynamic DNS Select this to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. Dynamic DNS Type Select the type of service that you are registered for from your Dynamic DNS service provider. Host Name Enter the host name. You can specify up to two host names, separated by a comma (",").
Chapter 21 System Figure 157 Maintenance > System > Time Setting Each field is described in the following table. Table 95 Maintenance > System > Time Setting LABEL DESCRIPTION Current Time and Date This section displays the current date and time. Time and Date Setup Manual Select this if you want to specify the current date and time in the fields below. New Time Enter the new time in this field, and click Apply. New Date Enter the new date in this field, and click Apply.
Chapter 21 System Table 95 Maintenance > System > Time Setting LABEL DESCRIPTION Start Date Enter which hour on which day of which week of which month daylight-savings time starts. End Date Enter which hour on the which day of which week of which month daylight-savings time ends. Apply Click this to save your changes and to apply them to the ZyXEL Device. Reset Click this to set every field in this screen to its last-saved value.
Chapter 21 System 240 MAX-200HW2 Series Users Guide
CHAPTER 22 Logs Use these screens to look at log entries and alerts and to configure the ZyXEL Devices log and alert settings. 22.1 Logs Overview For a list of log messages, see Section 22.3 on page 245. 22.1.1 Alerts An alert is a type of log that warrants more serious attention. Some categories such as System Errors consist of both logs and alerts. 22.1.2 Syslog Logs There are two types of syslog: event logs and traffic logs.
Chapter 22 Logs Table 96 Syslog Logs LOG MESSAGE DESCRIPTION Event Log: Mon dd hr:mm:ss hostname src="" dst="" msg="" note="" devID="" cat="" This message is sent by the system ("RAS" displays as the system name if you havent configured one) when the router generates a syslog. The facility is defined in the Log Settings screen. The severity is the logs syslog class.
Chapter 22 Logs 22.2 Logs Screens 22.2.1 Log Viewer Screen Use this screen to look at log entries and alerts. Alerts are written in red. To access this screen, click Maintenance > Logs > View Log. Figure 158 Maintenance > Logs > View Log Click a column header to sort log entries in descending (later-to-earlier) order. Click again to sort in ascending order.
Chapter 22 Logs Figure 159 Maintenance > Logs > Log Settings Each field is described in the following table. Table 99 Maintenance > Logs > Log Settings LABEL DESCRIPTION E-mail Log Settings 244 Mail Server Enter the server name or the IP address of the mail server the ZyXEL Device should use to e-mail logs and alerts. Leave this field blank if you do not want to send logs or alerts by e-mail. Mail Subject Enter the subject line used in e-mail messages the ZyXEL Device sends.
Chapter 22 Logs Table 99 Maintenance > Logs > Log Settings LABEL DESCRIPTION Log Schedule Select the frequency with which the ZyXEL Device should send log messages by e-mail. Daily Weekly Hourly When Log is Full None. If the Weekly or the Daily option is selected, specify a time of day when the E-mail should be sent. If the Weekly option is selected, then also specify which day of the week the E-mail should be sent.
Chapter 22 Logs Table 101 System Maintenance Logs LOG MESSAGE DESCRIPTION Time calibration is successful The device has adjusted its time based on information from the time server. Time calibration failed The device failed to get information from the time server. WAN interface gets IP: %s The WAN interface got a new IP address from the DHCP or PPPoE server. DHCP client gets %s A DHCP client got a new IP address from the DHCP server. DHCP client IP expired A DHCP client's IP address has expired.
Chapter 22 Logs Table 102 Access Control Logs (continued) LOG MESSAGE DESCRIPTION Triangle route packet forwarded: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] The firewall allowed a triangle route session to pass through. Packet without a NAT table entry blocked: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] The router blocked a packet that didn't have a corresponding NAT table entry.
Chapter 22 Logs Table 104 Packet Filter Logs LOG MESSAGE DESCRIPTION [ TCP | UDP | ICMP | IGMP | Generic ] packet filter matched (set: %d, rule: %d) Attempted access matched a configured filter rule (denoted by its set and rule number) and was blocked or forwarded according to the rule. For type and code details, see Table 112 on page 251.
Chapter 22 Logs Table 107 PPP Logs (continued) LOG MESSAGE DESCRIPTION ppp:IPCP Opening The PPP connections Internet Protocol Control Protocol stage is opening. ppp:LCP Closing The PPP connections Link Control Protocol stage is closing. ppp:IPCP Closing The PPP connections Internet Protocol Control Protocol stage is closing. Table 108 UPnP Logs LOG MESSAGE DESCRIPTION UPnP pass through Firewall UPnP packets can pass through the firewall.
Chapter 22 Logs Table 110 Attack Logs (continued) LOG MESSAGE DESCRIPTION land ICMP (type:%d, code:%d) The firewall detected an ICMP land attack. ip spoofing - WAN [ TCP | UDP | IGMP | ESP | GRE | OSPF ] The firewall detected an IP spoofing attack on the WAN port. ip spoofing - WAN ICMP (type:%d, code:%d) The firewall detected an ICMP IP spoofing attack on the WAN port. icmp echo : ICMP (type:%d, code:%d) The firewall detected an ICMP echo attack.
Chapter 22 Logs Table 111 Remote Management Logs LOG MESSAGE DESCRIPTION Remote Management: HTTP or UPnP denied Attempted use of HTTP or UPnP service was blocked according to remote management settings. Remote Management: WWW denied Attempted use of WWW service was blocked according to remote management settings. Remote Management: HTTPS denied Attempted use of HTTPS service was blocked according to remote management settings.
Chapter 22 Logs Table 112 ICMP Notes (continued) TYPE CODE DESCRIPTION Timestamp 13 0 Timestamp request message Timestamp Reply 14 0 Timestamp reply message Information Request 15 0 Information request message Information Reply 16 0 Information reply message Table 113 SIP Logs LOG MESSAGE DESCRIPTION SIP Registration Success by SIP:SIP Phone Number The listed SIP account was successfully registered with a SIP register server.