Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Network Router
ZyXEL ZyWALL P1
ZyXEL Communications ZyXEL ZyWALL P1 Manuals
Manuals and User Guides for ZyXEL Communications ZyXEL ZyWALL P1. We have
4
ZyXEL Communications ZyXEL ZyWALL P1 manuals available for free PDF download: User Manual, Quick Start Manual
ZyXEL Communications ZyXEL ZyWALL P1 User Manual (490 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Network Hardware
| Size: 17.44 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
23
List of Tables
31
Introduction
37
PART I Introduction
37
Chapter 1 Getting to Know Your Zywall
39
Figure 1 Application: Telecommuters
39
Overview
39
Secure Network Access for Telecommuters
39
LAN Network Protection
40
Leds
40
Zywall Hardware Connections
40
Figure 2 Application: LAN Network Protection
40
Figure 3 Front Panel: Leds
41
Table 1 LED Descriptions
41
Chapter 2 Introducing the Web Configurator
43
Accessing the Zywall Web Configurator
43
Web Configurator Overview
43
Figure 4 Web Configurator: Login Screen
44
Figure 5 Change Password Screen
44
Figure 6 Replace Certificate Screen
45
Figure 7 HOME Screen
45
Web Configurator Overview
45
Main Window
46
Navigation Panel
46
Table 2 Title Bar: Web Configurator Icons
46
Table 3 Device Mode Features Comparison
46
Title Bar
46
Table 4 Screens Summary
47
Figure 8 Web Configurator HOME Screen in Router Mode
50
HOME Screen: Router Mode
50
Figure 9 Web Configurator HOME Screen in Bridge Mode
53
Table 6 Web Configurator HOME Screen in Bridge Mode
54
Figure 10 HOME > more
56
Network Status: more
56
Port Statistics
56
Table 7 HOME > more
56
DHCP Table Screen
57
Figure 11 HOME > Show Statistics
57
Table 8 HOME > Show Statistics
57
Figure 12 HOME > DHCP Table
58
Table 9 HOME > DHCP Table
58
VPN Status
58
Figure 13 HOME > VPN Status
59
Table 10 HOME > VPN Status
59
Table 5 Web Configurator HOME Screen in Router Mode
50
HOME Screen: Bridge Mode
53
Internet Access
61
Wizard Setup Overview
61
Chapter 3 Wizard Setup
61
Figure 14 Wizard Setup Welcome
61
Wizard Setup
61
Figure 15 ISP Parameters: Ethernet Encapsulation
62
Table 11 ISP Parameters: Ethernet Encapsulation
62
Figure 16 ISP Parameters: Pppoe Encapsulation
63
Table 12 ISP Parameters: Pppoe Encapsulation
64
Figure 17 ISP Parameters: PPTP Encapsulation
65
Table 13 ISP Parameters: PPTP Encapsulation
65
Figure 18 Internet Access Wizard: Second Screen
66
Figure 19 Internet Access Setup Complete
67
Internet Access Wizard: Registration
67
Figure 20 Internet Access Wizard: Registration
68
Figure 21 Internet Access Wizard: Registered Device
68
Table 14 Internet Access Wizard: Registration
68
Figure 24 Service Activation
70
Figure 25 Internet Access Wizard: Activated Services
70
Table 15 Service Activation
70
Figure 26 Internet Access Wizard: Registration in Progress
71
Figure 27 Internet Access Wizard: Status
71
Internet Access Wizard: Status
71
VPN Wizard Gateway Setting
71
Figure 28 VPN Wizard: Gateway Setting
72
Table 16 VPN Wizard: Gateway Setting
72
VPN Wizard Network Setting
72
Figure 29 VPN Wizard: Network Setting
73
Table 17 VPN Wizard: Network Setting
73
Figure 30 VPN Wizard: IKE Tunnel Setting
74
VPN Wizard IKE Tunnel Setting (IKE Phase 1)
74
Table 18 VPN Wizard: IKE Tunnel Setting
75
Figure 31 VPN Wizard: Ipsec Setting
76
Table 19 VPN Wizard: Ipsec Setting
76
VPN Wizard Ipsec Setting (IKE Phase 2)
76
VPN Wizard Status Summary
77
Figure 32 VPN Wizard: VPN Status
78
Table 20 VPN Wizard: VPN Status
78
VPN Wizard Setup Complete
79
Figure 33 VPN Wizard Setup Complete
80
Figure 34 Tutorial: VPN Networks Example
81
Table 21 Tutorial: Settings to Use
81
Tutorial
81
Configure the VPN Rule on Zywall a
82
Figure 35 Tutorial: Wizard Welcome Screen
82
Figure 36 Tutorial: VPN Wizard: Gateway Setting
83
Figure 37 Tutorial: VPN Wizard: Network Setting
83
Figure 38 Tutorial: VPN Wizard: IKE Tunnel Setting
84
Figure 39 Tutorial: VPN Wizard: Ipsec Setting
84
Configure the VPN Rule on Zywall B
85
Figure 40 Tutorial: VPN Wizard: VPN Status
85
Figure 41 Tutorial: VPN Wizard Setup Complete
85
Figure 42 Tutorial: VPN Wizard: Gateway Setting
86
Figure 43 Tutorial: VPN Wizard: Network Setting
87
Figure 44 Tutorial: Telecommuter X Pinging a Network y IP Address Example
87
Testing Your VPN Configuration
87
Figure 45 Tutorial: VPN Summary Screens Comparison Example
88
Figure 46 Tutorial: VPN Gateway Policy Edit Screens Comparison Example
89
Figure 47 Tutorial: VPN Network Policy Edit Screens Comparison Example
90
Figure 48 Tutorial: Other Computers Pinging a Network y IP Address Example
91
IDP for from VPN Traffic Example
91
Security Settings for VPN Traffic
91
Figure 49 Tutorial: IDP for from VPN Traffic
92
Figure 50 Tutorial: IDP Configuration for Traffic from VPN
92
IDP for to VPN Traffic Example
92
Figure 51 Tutorial: IDP for to VPN Traffic
93
Figure 52 Tutorial: IDP Configuration for to VPN Traffic
93
Firewall Rule for VPN Example
93
Configuring the VPN Rule
94
Figure 53 Tutorial: Firewall Rule for VPN
94
Figure 54 Tutorial: SECURITY > VPN > VPN Rules (IKE)
94
Figure 55 Tutorial: SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
95
Figure 56 Tutorial: SECURITY > VPN > VPN Rules (IKE): with Gateway Policy Example
96
Figure 57 Tutorial: SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
97
Configuring the Firewall Rules
98
Figure 58 Tutorial: SECURITY > FIREWALL > Rule Summary
98
Figure 59 Tutorial: SECURITY > FIREWALL > Rule Summary > Edit: Allow
99
Figure 60 Tutorial: SECURITY > FIREWALL > Rule Summary: Allow
100
Figure 61 Tutorial: SECURITY > FIREWALL > Default Rule: Block from VPN to LAN
100
Registration
101
Figure 22 Internet Access Wizard: Registration in Progress
69
Figure 23 Internet Access Wizard: Registration Failed
69
Internet Access Wizard: Service Activation
70
Chapter 4 Tutorial
81
How to Set up a VPN Tunnel
81
Chapter 5 Registration
101
ISP Parameters
62
Internet Access Wizard: Second Screen
66
Myzyxel.com Overview
101
Subscription Services Available on the Zywall
101
Figure 62 REGISTRATION
102
Registration
102
Figure 63 REGISTRATION: Registered Device
103
Table 22 REGISTRATION
103
Figure 64 REGISTRATION > Service
104
Service
104
Table 23 REGISTRATION > Service
104
Network
105
Part II: Network
105
LAN Screens
107
LAN, WAN and the Zywall
107
Chapter 6 LAN Screens
107
Figure 65 LAN and WAN
107
Dhcp
108
IP Pool Setup
108
Multicast
108
RIP Setup
108
DNS Overview
109
DNS Servers
109
Wins
109
Figure 66 Private DNS Server Example
110
Lan
110
Private DNS Server Behind a Remote Ipsec Router
110
Figure 67 NETWORK > LAN
111
Table 24 NETWORK > LAN
111
LAN Static DHCP
113
Figure 68 NETWORK > LAN > Static DHCP
114
LAN IP Alias
114
Table 25 NETWORK > LAN > Static DHCP
114
Figure 69 Physical Network and Partitioned Logical Networks
115
Figure 70 NETWORK > LAN > IP Alias
115
Figure 71 NETWORK > LAN > MAC Address Filter
117
Table 27 NETWORK > LAN > MAC Address Filter
117
Bridge Loop
119
Bridge Screens
119
Rapid STP (RSTP)
120
Spanning Tree Protocol (STP)
120
STP Terminology
120
Table 29 STP Port States
121
Figure 73 NETWORK > Bridge
122
Table 30 NETWORK > Bridge
122
WAN Overview
125
WAN Route
125
WAN Screens
125
Table 31 NETWORK > WAN (Route)
126
Table 32 Private IP Address Ranges
126
DNS Server Address Assignment
127
Table 33 Example of Network Properties for LAN Servers with Fixed IP Addresses
127
Wan
127
WAN MAC Address
127
Figure 75 NETWORK > WAN > WAN (Ethernet Encapsulation)
128
Table 34 NETWORK > WAN > WAN (Ethernet Encapsulation)
128
WAN Ethernet Encapsulation
128
Pppoe Encapsulation
130
Figure 76 NETWORK > WAN > WAN (Pppoe Encapsulation)
131
Table 35 NETWORK > WAN > WAN (Pppoe Encapsulation)
131
PPTP Encapsulation
133
Figure 77 NETWORK > WAN > WAN (PPTP Encapsulation)
134
Table 36 NETWORK > WAN > WAN (PPTP Encapsulation)
134
Dynamic DNS
136
Configuring Dynamic DNS
137
DYNDNS Wildcard
137
Private Network
110
Table 26 NETWORK > LAN > IP Alias
115
MAC Filter
116
Chapter 7 Bridge Screens
119
Figure 72 Bridge Loop: Bridge Connected to Wired LAN
119
Table 28 STP Path Costs
120
Bridge
121
How STP Works
121
STP Port States
121
Figure 78 NETWORK > WAN > DDNS
137
Security
139
Part III: Security
139
Firewall
141
Firewall Overview
141
Figure 82 from LAN to VPN Example
145
Figure 83 Block LAN to VPN Traffic by Default Example
145
Figure 84 from VPN to LAN Example
146
Figure 85 Block VPN to LAN Traffic by Default Example
146
From VPN to VPN Packet Direction
146
Figure 86 from VPN to VPN Example
147
Figure 87 Block VPN to VPN Traffic by Default Example
147
Security Considerations
147
Figure 88 Blocking All LAN to WAN IRC Traffic Example
148
Firewall Rules Example
148
Table 37 Blocking All LAN to WAN IRC Traffic Example
148
Figure 90 Using IP Alias to Solve the Triangle Route Problem
150
Figure 91 SECURITY > FIREWALL > Default Rule (Router Mode)
151
Table 39 SECURITY > FIREWALL > Default Rule (Router Mode)
151
Firewall Default Rule (Bridge Mode)
152
Figure 92 SECURITY > FIREWALL > Default Rule (Bridge Mode)
153
Table 40 SECURITY > FIREWALL > Default Rule (Bridge Mode)
153
Figure 93 SECURITY > FIREWALL > Rule Summary
154
Firewall Rule Summary
154
Table 41 SECURITY > FIREWALL > Rule Summary
155
Firewall Edit Rule
156
Figure 94 SECURITY > FIREWALL > Rule Summary > Edit
157
Table 42 SECURITY > FIREWALL > Rule Summary > Edit
158
Anti-Probing
159
Figure 95 SECURITY > FIREWALL > Anti-Probing
159
Figure 96 Three-Way Handshake
160
Firewall Thresholds
160
Table 43 SECURITY > FIREWALL > Anti-Probing
160
Figure 97 SECURITY > FIREWALL > Threshold
161
Threshold Screen
161
Threshold Values
161
Table 44 SECURITY > FIREWALL > Threshold
162
Service
163
Figure 98 SECURITY > FIREWALL > Service
164
Figure 99 Firewall Edit Custom Service
165
Firewall Edit Custom Service
165
Table 45 SECURITY > FIREWALL > Service
165
My Service Firewall Rule Example
166
Figure 89 Limited LAN to WAN IRC Traffic Example
149
Table 38 Limited LAN to WAN IRC Traffic Example
149
Asymmetrical Routes
150
Asymmetrical Routes and IP Alias
150
Firewall Default Rule (Router Mode)
150
Chapter 8 WAN Screens
125
Figure 74 NETWORK > WAN (Route)
125
WAN IP Address Assignment
126
Chapter 9 Firewall
141
Figure 79 Default Firewall Action
141
Figure 80 SECURITY > FIREWALL > Default Rule (Router Mode)
142
Figure 81 Default Block Traffic from WAN to LAN Example
143
To VPN Packet Direction
144
From VPN Packet Direction
145
Packet Direction Matrix
142
Packet Direction Examples
143
Figure 100 My Service Firewall Rule Example: Service
166
Table 46 SECURITY > FIREWALL > Service > Add
166
Figure 101 My Service Firewall Rule Example: Edit Custom Service
167
Figure 102 My Service Firewall Rule Example: Rule Summary
167
Figure 103 My Service Firewall Rule Example: Rule Edit
168
Figure 104 My Service Firewall Rule Example: Rule Configuration
169
Figure 105 My Service Firewall Rule Example: Rule Summary
170
Chapter 10 Intrusion Detection and Prevention (IDP)
171
Figure 106 Network Intrusions
171
Chapter 11 Configuring IDP
175
Firewalls and Intrusions
171
Introduction to IDP
171
Example Intrusions
172
Host IDP
172
IDS and IDP
172
Network IDP
172
Blaster W32.Worm
173
Mydoom
173
Nimda
173
SQL Slammer Worm
173
Zywall IDP
174
Configuring IDP
175
Figure 107 Applying IDP to Interfaces
175
Figure 108 SECURITY > IDP > General
176
Table 47 SECURITY > IDP > General Setup
176
Attack Types
177
Figure 109 SECURITY > IDP > Signatures: Attack Types
177
IDP Signatures
177
Table 48 SECURITY > IDP > Signature: Attack Types
177
Table 49 SECURITY > IDP > Signature: Intrusion Severity
178
Configuring IDP Signatures
179
Figure 110 SECURITY > IDP > Signature: Actions
179
Figure 112 SECURITY > IDP > Signature: Query View
181
Table 52 SECURITY > IDP > Signature: Query View
181
Figure 113 SECURITY > IDP > Signature: Query by Partial Name
184
Figure 114 SECURITY > IDP > Signature: Query by Complete ID
184
Figure 115 Signature Query by Attribute
185
Configuring IDP Update
186
Figure 116 SECURITY > IDP > Update
186
Table 53 SECURITY > IDP > Update
187
Backup and Restore
188
Figure 117 SECURITY > IDP > Backup & Restore
188
Anti-Virus
189
Anti-Virus Overview
189
Computer Virus Infection and Prevention
189
Types of Computer Viruses
189
Figure 118 Zywall Anti-Virus Example
191
Figure 119 SECURITY > ANTI-VIRUS > General
192
Table 55 SECURITY > ANTI-VIRUS > General
192
Signature Searching
193
Figure 120 SECURITY > ANTI-VIRUS > Signature: Query View
194
Table 56 SECURITY > ANTI-VIRUS > Signature: Query View
194
Figure 121 Query Example Search Criteria
195
Signature Search Example
195
Figure 122 Query Example Search Results
196
Configuring Anti-Virus Update
197
Mysecurityzone
197
Signature Update
197
Figure 123 SECURITY > ANTI-VIRUS > Update
198
Backup and Restore
199
Figure 124 SECURITY > ANTI-VIRUS > Backup and Restore
199
Ipsec VPN
201
Ipsec VPN Overview
201
IKE SA Overview
202
Figure 127 Gateway and Network Policies
203
Figure 128 Ipsec Fields Summary
203
Figure 129 SECURITY > VPN > VPN Rules (IKE)
204
Table 57 SECURITY > VPN > VPN Rules (IKE)
204
IKE SA Proposal
205
IKE SA Setup
205
Intrusion Severity
178
Signature Actions
178
Mysecurityzone
185
Update
185
Chapter 12 Anti-Virus
189
Table 54 Common Computer Virus Types
189
How the Zywall Anti-Virus Scanner Works
190
Introduction to the Zywall Anti-Virus Scanner
190
Types of Anti-Virus Scanner
190
General Anti-Virus Setup
191
Notes about the Zywall Anti-Virus
191
Chapter 13 Ipsec VPN
201
General Setup
175
Overview
175
Figure 111 SECURITY > IDP > Signature: Group View
179
Table 50 SECURITY > IDP > Signature: Actions
179
Table 51 SECURITY > IDP > Signature: Group View
180
Query View
181
Figure 125 VPN: Example
201
Figure 126 VPN: IKE SA and Ipsec SA
202
VPN Rules (IKE)
203
Figure 130 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
205
Figure 131 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange
206
Figure 132 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication
207
Table 58 VPN Example: Matching ID Type and Content
207
Table 59 VPN Example: Mismatching ID Type and Content
208
Figure 133 VPN/NAT Example
209
Negotiation Mode
209
Additional Ipsec VPN Topics
210
Dynamic Ipsec Rule
210
Full Feature NAT Mode
210
SA Life Time
210
Figure 134 Ipsec High Availability
211
Ipsec High Availability
211
Encryption and Authentication Algorithms
212
VPN Rules (IKE) Gateway Policy Edit
212
Figure 135 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy
213
Table 60 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy
214
Ipsec SA Overview
218
Local and Remote Networks
218
Figure 136 Local and Remote Network IP Address Overlap
219
Virtual Address Mapping
219
Figure 137 Virtual Mapping of Local and Remote Network IP Addresses
220
Active Protocol
221
Encapsulation
221
Figure 138 Virtual Mapping of Local and Remote Network IP Addresses
221
Figure 139 VPN: Transport and Tunnel Mode Encapsulation
222
Ipsec SA Proposal and Perfect Forward Secrecy
222
VPN Rules (IKE): Network Policy Edit
223
Figure 140 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy
224
Table 61 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy
225
VPN Rules (IKE): Network Policy Edit: Port Forwarding
228
Figure 141 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding
229
Table 62 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding
229
Figure 142 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy
230
Table 63 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy
230
VPN Rules (IKE): Network Policy Move
230
Dialing the VPN Tunnel Via Web Configurator
231
Figure 143 VPN Rule Configured
231
Figure 144 VPN Dial
231
Figure 145 VPN Tunnel Established
231
Ipsec Debug
232
Figure 146 Ike/Ipsec Debug Example
233
VPN SA Monitor
233
Figure 147 SECURITY > VPN > SA Monitor
234
VPN Global Setting
234
Figure 149 Telecommuters Sharing One VPN Rule Example
236
Table 66 Telecommuters Sharing One VPN Rule Example
236
Figure 150 Telecommuters Using Unique VPN Rules Example
237
Table 67 Telecommuters Using Unique VPN Rules Example
237
Figure 151 VPN for Remote Management Example
238
VPN and Remote Management
238
Certificates
239
Certificates Overview
239
Advantages of Certificates
240
Checking the Fingerprint of a Certificate on Your Computer
240
Self-Signed Certificates
240
Verifying a Certificate
240
Figure 153 Certificate Details
241
Figure 154 Certificate Configuration Overview
241
Figure 155 SECURITY > CERTIFICATES > My Certificates
242
My Certificates
242
Table 68 SECURITY > CERTIFICATES > My Certificates
242
My Certificate Details
243
Figure 156 SECURITY > CERTIFICATES > My Certificates > Details
244
Table 69 SECURITY > CERTIFICATES > My Certificates > Details
244
Certificate File Export Formats
246
My Certificate Export
246
Certificate File Formats
247
Figure 157 SECURITY > CERTIFICATES > My Certificates > Export
247
My Certificate Import
247
Table 70 SECURITY > CERTIFICATES > My Certificates > Export
247
Figure 158 SECURITY > CERTIFICATES > My Certificates > Import
248
Table 71 SECURITY > CERTIFICATES > My Certificates > Import
248
Figure 159 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
249
My Certificate Create
249
Table 72 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
249
Figure 160 SECURITY > CERTIFICATES > My Certificates > Create
250
Table 73 SECURITY > CERTIFICATES > My Certificates > Create
250
Figure 161 SECURITY > CERTIFICATES > Trusted cas
252
Table 74 SECURITY > CERTIFICATES > Trusted cas
252
Trusted cas
252
Trusted CA Details
253
Figure 162 SECURITY > CERTIFICATES > Trusted cas > Details
254
Table 75 SECURITY > CERTIFICATES > Trusted cas > Details
254
Trusted CA Import
256
Figure 163 SECURITY > CERTIFICATES > Trusted cas > Import
257
Table 76 SECURITY > CERTIFICATES > Trusted cas Import
257
Trusted Remote Hosts
257
Figure 164 SECURITY > CERTIFICATES > Trusted Remote Hosts
258
Table 77 SECURITY > CERTIFICATES > Trusted Remote Hosts
258
Figure 165 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
259
Table 78 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
259
Trusted Remote Hosts Import
259
Figure 166 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
260
Trusted Remote Host Certificate Details
260
Table 79 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
261
Directory Servers
262
Figure 167 SECURITY > CERTIFICATES > Directory Servers
262
Directory Server Add or Edit
263
Figure 148 SECURITY > VPN > Global Setting
234
Table 64 SECURITY > VPN > SA Monitor
234
Table 65 SECURITY > VPN > Global Setting
235
Telecommuter Vpn/Ipsec Examples
236
Telecommuters Sharing One VPN Rule Example
236
Telecommuters Using Unique VPN Rules Example
236
Chapter 14 Certificates
239
Figure 152 Certificates on Your Computer
240
Configuration Summary
241
Figure 168 SECURITY > CERTIFICATES > Directory Server > Add
263
Table 80 SECURITY > CERTIFICATES > Directory Servers
263
Table 81 SECURITY > CERTIFICATES > Directory Server > Add
264
Chapter 15 Authentication Server
265
Authentication Server Overview
265
Local User Database
265
Radius
265
Figure 169 SECURITY > AUTH SERVER > Local User Database
266
Local User Database
266
Radius
267
Figure 170 SECURITY > AUTH SERVER > RADIUS
267
Table 82 SECURITY > AUTH SERVER > Local User Database
267
Table 83 SECURITY > AUTH SERVER > RADIUS
267
Advanced
269
Part IV: Advanced
269
Advertisement
ZyXEL Communications ZyXEL ZyWALL P1 User Manual (369 pages)
Brand:
ZyXEL Communications
| Category:
Network Router
| Size: 10.84 MB
Table of Contents
Copyright
2
Federal Communications Commission (FCC) Interference Statement
3
Safety Warnings
4
Zyxel Limited Warranty
5
Customer Support
7
Table of Contents
10
Preface
30
Related Documentation
30
Syntax Conventions
30
User Guide Feedback
30
Chapter 1 Getting to Know Your Zywall
32
Overview
32
Zywall Features
32
Physical Features
32
Table 1 Feature Specifications
32
Non-Physical Features
33
Reset Button
33
Ipsec Vpn Capability
33
Pptp Encapsulation
34
Dynamic Dns Support
34
Central Network Management
35
Full Network Management
35
Roadrunner Support
35
Logging and Tracing
35
Applications
36
Secure Network Access for Telecommuters
36
LAN Network Protection
36
Figure 1 Application: Telecommuters
36
Upgrade Zywall Firmware Via Lan
36
Zywall Hardware Connection
37
Front Panel LED
37
Figure 2 Application: LAN Network Protection
37
Figure 3 Front Panel: Leds
37
Table 2 Front Panel Leds
38
Chapter 2 Introducing the Web Configurator
40
Overview
40
Accessing the Web Configurator
40
Figure 4 Web Configurator: Initial Screen
41
Figure 5 Web Configurator: Login Screen
41
Resetting the Zywall
42
Figure 6 Change Password Screen
42
Figure 7 Replace Certificate Screen
42
Procedure to Use the Reset Button
43
Navigating the Web Configurator
43
The HOME Screen
43
Figure 8 Web Configurator: HOME
44
Table 3 Web Configurator: HOME
44
Navigation Panel
45
Table 4 Navigation Panel: Menu Summary
46
System Statistics
47
DHCP Table Screen
48
Figure 9 Home : Show Statistics
48
Table 5 Home: Show Statistics
48
VPN Status
49
Figure 10 Home: DHCP Table
49
Table 6 Home: DHCP Table
49
Figure 11 Home : VPN Status
50
Table 7 Home: VPN Status
50
Chapter 3 Wizard Setup
52
Overview
52
Internet Access Wizard Setup
52
ISP Parameters
52
WAN and DNS
52
WAN IP Address Assignment
52
Table 8 Private IP Address Ranges
52
IP Address and Subnet Mask
53
DNS Server Address Assignment
53
Ethernet
54
Figure 12 Internet Access Wizard: Ethernet Encapsulation
54
Pppoe Encapsulation
55
Table 9 Internet Access Wizard: Ethernet Encapsulation
55
Figure 13 Internet Access Wizard: Pppoe Encapsulation
56
Table 10 Internet Access Wizard: Pppoe Encapsulation
56
PPTP Encapsulation
57
Figure 14 Internet Access Wizard: PPTP Encapsulation
58
Table 11 Internet Access Wizard: PPTP Encapsulation
58
Internet Access Wizard Setup Complete
59
VPN Wizard Setup
59
Figure 15 Internet Access Wizard: Complete
59
Ipsec
60
My IP Address
60
Secure Gateway Address
60
Dynamic Secure Gateway Address
60
Security Association
60
VPN Wizard: Gateway Policy Setting
60
Figure 16 VPN Wizard: Gateway Policy Setting
61
Table 12 VPN Wizard: Gateway Policy Setting
61
VPN Wizard: Network Setting
61
Figure 17 VPN Wizard: Network Setting
62
Table 13 VPN Wizard: Network Setting
62
IKE Phases
63
Figure 18 Two Phases to Set up the Ipsec SA
63
Diffie-Hellman (DH) Key Groups
64
Negotiation Mode
64
Pre-Shared Key
64
Perfect Forward Secrecy (PFS)
65
Ipsec Algorithms
65
AH (Authentication Header) Protocol
65
ESP (Encapsulating Security Payload) Protocol
65
Table 14 ESP and AH
66
IKE Tunnel Setting (IKE Phase 1)
67
Figure 19 VPN Wizard: IKE Tunnel Setting
67
Table 15 VPN Wizard: IKE Tunnel Setting
67
Ipsec Setting (IKE Phase 2)
68
Figure 20 VPN Wizard: Ipsec Setting
68
Table 16 VPN Wizard: Ipsec Setting
68
VPN Status Summary
69
Figure 21 VPN Wizard: VPN Status
70
Table 17 VPN Wizard: VPN Status
70
VPN Wizard Setup Complete
71
Figure 22 VPN Wizard: Complete
72
Chapter 4 LAN Screens
74
LAN Overview
74
DHCP Setup
74
IP Pool Setup
74
DNS Servers
74
Lan Tcp/Ip
75
Factory LAN Defaults
75
IP Address and Subnet Mask
75
RIP Setup
75
Multicast
76
Configuring LAN
76
Figure 23 LAN: LAN
76
Table 18 LAN: LAN
77
Configuring Static DHCP
78
Figure 24 LAN: Static DHCP
79
Table 19 LAN: Static DHCP
79
Chapter 5 WAN Screens
80
WAN Overview
80
TCP/IP Priority (Metric)
80
WAN MAC Address
80
WAN Route Setup
80
Table 20 Example of Network Properties for LAN Servers with Fixed IP Addresses
80
Configuring WAN Setup
81
Ethernet Encapsulation
81
Figure 25 WAN: Route
81
Table 21 WAN: Route
81
Figure 26 WAN: WAN: Ethernet
82
Table 22 WAN: WAN: Ethernet
82
Pppoe Encapsulation
84
Figure 27 WAN: WAN: Pppoe
85
Table 23 WAN: WAN: Pppoe
85
PPTP Encapsulation
86
Figure 28 WAN: WAN: PPTP
87
Table 24 WAN: WAN: PPTP
87
Dynamic DNS
88
DYNDNS Wildcard
88
Configuring Dynamic DNS
89
Figure 29 WAN: DDNS
89
Table 25 WAN: DDNS
89
Chapter 6 Firewalls
92
Firewall Overview
92
Types of Firewalls
92
Packet Filtering Firewalls
92
Application-Level Firewalls
92
Stateful Inspection Firewalls
93
Introduction to Zyxel's Firewall
93
Denial of Service
94
Basics
94
Figure 30 Zywall Firewall Application
94
Table 26 Common IP Ports
94
Types of Dos Attacks
95
Figure 31 Three-Way Handshake
95
Figure 32 SYN Flood
96
Figure 33 Smurf Attack
97
ICMP Vulnerability
97
Illegal Commands (Netbios and SMTP)
97
Table 27 ICMP Commands that Trigger Alerts
97
Table 28 Legal Netbios Commands
97
Traceroute
98
Stateful Inspection
98
Table 29 Legal SMTP Commands
98
Figure 34 Stateful Inspection
99
Stateful Inspection Process
99
Stateful Inspection and the Zywall
100
TCP Security
100
UDP/ICMP Security
101
Upper Layer Protocols
101
Guidelines for Enhancing Security with Your Firewall
102
Packet Filtering Vs Firewall
102
Packet Filtering
102
When to Use Filtering
102
Firewall
103
When to Use the Firewall
103
Chapter 7 Firewall Screens
104
Access Methods
104
Firewall Policies Overview
104
Rule Logic Overview
105
Rule Checklist
105
Security Ramifications
105
Key Fields for Configuring Rules
106
Action
106
Service
106
Source Address
106
Destination Address
106
Connection Direction Examples
106
LAN to WAN Rules
107
WAN to LAN Rules
107
Alerts
107
Figure 35 LAN to WAN Traffic
107
Figure 36 WAN to LAN Traffic
107
Configuring Firewall
108
Rule Summary
108
Figure 37 Firewall: Default Rule
108
Table 30 Firewall: Default Rule
108
Figure 38 Firewall: Rule Summary
109
Table 31 Firewall: Rule Summary
109
Configuring Firewall Rules
110
Figure 39 Firewall: Creating/Editing a Firewall Rule
111
Table 32 Firewall: Creating/Editing a Firewall Rule
112
Configuring Custom Services
113
Example Firewall Rule
113
Figure 40 Firewall: Creating/Editing a Custom Service
113
Table 33 Firewall: Creating/Editing a Custom Service
113
Figure 41 Firewall Example: Rule Summary
114
Figure 42 Firewall Example: Rule Edit
114
Figure 43 Firewall Example: Edit Custom Service
115
Figure 44 Firewall Example: My Service Rule Configuration
116
Predefined Services
117
Figure 45 Firewall Example: My Service Example Rule Summary
117
Table 34 Predefined Services
117
Anti-Probing
119
Configuring Attack Alert
120
Figure 46 Firewall: Anti-Probing
120
Table 35 Firewall: Anti-Probing
120
Half-Open Sessions
121
TCP Maximum Incomplete and Blocking Time
121
Figure 47 Firewall: Threshold
122
Table 36 Firewall: Threshold
122
Threshold Values
121
Chapter 8 Introduction to Ipsec
124
VPN Overview
124
Ipsec
124
Security Association
124
Other Terminology
124
Encryption
124
Data Confidentiality
125
Data Integrity
125
Data Origin Authentication
125
VPN Applications
125
Linking Two or more Private Networks Together
125
Accessing Network Resources When NAT Is Enabled
125
Unsupported IP Applications
125
Figure 48 Encryption and Decryption
125
Ipsec Architecture
126
Ipsec Algorithms
126
Key Management
126
Encapsulation
126
Figure 49 Ipsec Architecture
126
Transport Mode
127
Tunnel Mode
127
Ipsec and NAT
127
Figure 50 Transport and Tunnel Mode Ipsec Encapsulation
127
Table 37 VPN and NAT
128
Chapter 9 VPN Screens
130
Vpn/Ipsec Overview
130
Ipsec Algorithms
130
AH (Authentication Header) Protocol
130
ESP (Encapsulating Security Payload) Protocol
130
My Zywall
131
Secure Gateway Address
131
Table 38 ESP and AH
131
Dynamic Secure Gateway Address
132
Nailed up
132
NAT Traversal
132
NAT Traversal Configuration
133
X-Auth (Extended Authentication)
133
Authentication Server
133
Figure 51 NAT Router between Ipsec Routers
133
ID Type and Content
134
Table 39 Local ID Type and Content Fields
134
Table 40 Peer ID Type and Content Fields
134
ID Type and Content Examples
135
Pre-Shared Key
135
Table 41 Matching ID Type and Content Configuration Example
135
Table 42 Mismatching ID Type and Content Configuration Example
135
IKE VPN Rule Summary Screen
136
Configurign an IKE VPN Rule
136
Figure 52 Ipsec Summary Fields
136
Figure 53 VPN Rules (IKE)
136
Figure 54 VPN Rules (IKE): Gateway Policy
137
Table 43 VPN Rules (IKE): Gateway Policy
137
Configuring an IKE VPN Policy
141
Figure 55 VPN Rules (IKE): Network Policy
142
Table 44 VPN Rules (IKE): Add Policy
142
Activating a VPN Connection
145
Viewing SA Monitor
145
Figure 56 VPN Rule (IKE): VPN Activation
145
Table 45 VPN Rule (IKE): VPN Activation
145
Configuring Global Setting
146
Figure 57 VPN: SA Monitor
146
Table 46 SA Monitor
146
Telecommuter Vpn/Ipsec Examples
147
Figure 58 VPN: Global Setting
147
Table 47 VPN: Global Setting
147
Figure 59 Telecommuters Sharing One VPN Rule Example
148
Table 48 Telecommuters Sharing One VPN Rule Example
148
Telecommuters Sharing One VPN Rule Example
148
Telecommuters Using Unique VPN Rules Example
148
Figure 60 Telecommuters Using Unique VPN Rules Example
149
Table 49 Telecommuters Using Unique VPN Rules Example
149
VPN and Remote Management
150
Chapter 10 Certificates
152
Certificates Overview
152
Advantages of Certificates
153
Self-Signed Certificates
153
Configuration Summary
153
My Certificates
153
Figure 61 Certificate Configuration Overview
153
Figure 62 VPN: My Certificates
154
Table 50 Certificate: My Certificates
154
Certificate File Formats
155
Importing a Certificate
156
Figure 63 Certificate: My Certificate: Import
156
Table 51 Certificate: My Certificate: Import
156
Creating a Certificate
157
Figure 64 Certificate: My Certificate: Create
157
Table 52 Certificate: My Certificate: Create
157
My Certificate Details
159
Figure 65 Certificate: My Certificate: Details
160
Table 53 Certificate: My Certificate: Details
161
Trusted Cas
162
Figure 66 Certificates: Trusted Cas
163
Table 54 Certificates: Trusted Cas
163
Importing a Trusted Ca's Certificate
164
Figure 67 Trusted CA Import
164
Trusted CA Certificate Details
165
Table 55 Certificates: Trusted CA: Import
165
Figure 68 Certificates: Trusted CA: Details
166
Table 56 Certificates: Trusted CA: Details
166
Trusted Remote Hosts
168
Figure 69 Certificates: Trusted Remote Hosts
169
Table 57 Certificates: Trusted Remote Hosts
169
Verifying a Trusted Remote Host's Certificate
170
Trusted Remote Host Certificate Fingerprints
170
Figure 70 Remote Host Certificates
170
Importing a Trusted Remote Host's Certificate
171
Figure 71 Certificate Details
171
Trusted Remote Host Certificate Details
172
Figure 72 Certificates: Trusted Remote Host: Import
172
Table 58 Certificates: Trusted Remote Host: Import
172
Figure 73 Certificates: Trusted Remote Host: Details
173
Table 59 Certificates: Trusted Remote Host: Details
173
Directory Servers
175
Figure 74 Certificates: Directory Servers
175
Add or Edit a Directory Server
176
Figure 75 Certificates: Directory Server: Add
176
Table 60 Certificates: Directory Servers
176
Table 61 Certificates: Directory Server: Add
177
Chapter 11 Network Address Translation (NAT)
178
NAT Overview
178
NAT Definitions
178
Table 62 NAT Definitions
178
What NAT Does
179
How NAT Works
179
NAT Mapping Types
179
Figure 76 How NAT Works
179
Using NAT
180
Table 63 NAT Mapping Types
180
SUA (Single User Account) Versus NAT
181
Configuring NAT Overview
181
Figure 77 NAT Overview
181
Table 64 NAT Overview
181
Port Forwarding
182
Default Server IP Address
182
Port Forwarding: Services and Port Numbers
182
Configuring Servers Behind Port Forwarding (Example)
183
Figure 78 Multiple Servers Behind NAT Example
183
Figure 107 SNMP
183
Table 65 Services and Port Numbers
183
Table 75 SNMP
183
Port Translation
184
Configuring Port Forwarding
184
Figure 79 Port Translation Example
184
Figure 80 NAT: Port Forwarding
185
Table 66 NAT: Port Forwarding
185
Configuring Trigger Port
186
Figure 81 Trigger Port Forwarding Process: Example
186
Figure 82 NAT: Port Triggering
187
Table 67 NAT: Port Triggering
187
Chapter 12 Static Route
188
Static Route Overview
188
Configuring IP Static Route
188
Figure 83 Example of Static Routing Topology
188
Figure 84 Static Route
188
Configuring a Static Route Entry
189
Table 68 Static Route
189
Figure 85 Static Route: Edit
190
Table 69 Static Route: Edit
190
ZyXEL Communications ZyXEL ZyWALL P1 Quick Start Manual (72 pages)
Internet Security Appliance
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.86 MB
Table of Contents
Table of Contents
1
Quick Start Guide
1
English
2
Accessing the Web Configurator
4
Internet Access Setup
4
Troubleshooting
8
Deutsch
11
Español
23
Français
34
Italiano
45
Risoluzione Dei Problemi
52
Svenska
56
中文
65
Advertisement
ZyXEL Communications ZyXEL ZyWALL P1 Quick Start Manual (64 pages)
Internet security Appliance
Brand:
ZyXEL Communications
| Category:
Gateway
| Size: 0.61 MB
Table of Contents
Table of Contents
1
Quick Start Guide
1
English
2
Hardware Connections
2
Troubleshooting
8
Deutsch
12
Español
24
Français
35
Italiano
46
Advertisement
Related Products
ZyXEL Communications P-1100
ZyXEL Communications Prestige P128
ZyXEL Communications P-128IMH
ZyXEL Communications P-128MH
ZyXEL Communications P-153
ZyXEL Communications P-100
ZyXEL Communications P-100IH
ZyXEL Communications P-100MH
ZyXEL Communications P-100WH
ZyXEL Communications P-2302R-P1 Series
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL