ZyWALL 5 - 4.04
ZyWALL 5 - 4.04
ZyWALL 5 - 4.04
User’s Guide
Version 4.04
03/2008
Edition 1
DEFAULT LOGIN
IP Address http://192.168.1.1
Password 1234
www.zyxel.com
About This User's Guide
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It contains
information on setting up your network and configuring for Internet access.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• CLI Reference Guide
The CLI Reference Guide explains how to use the Command-Line Interface (CLI) to
configure the ZyWALL.
• Supporting Disk
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com for additional support documentation and product
certifications.
Document Conventions
Warnings and Notes
These are how warnings and notes are shown in this User’s Guide.
1 Warnings tell you about things that could harm you or your device.
" Notes tell you other important information (for example, other things you may
need to configure or helpful tips) or recommendations.
Syntax Conventions
• The ZyWALL 5/35/70 series may be referred to as the “ZyWALL”, the “device” or the
“system” in this User’s Guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A key stroke is denoted by square brackets and uppercase text, for example, [ENTER]
means the “enter” or “return” key on your keyboard.
• “Enter” means for you to type one or more characters and then press the [ENTER] key.
“Select” or “choose” means for you to use one of the predefined choices.
• A right angle bracket ( > ) within a screen name denotes a mouse click. For example,
Maintenance > Log > Log Setting means you first click Maintenance in the navigation
panel, then the Log sub menu and finally the Log Setting tab to get to that screen.
• Units of measurement may denote the “metric” value or the “scientific” value. For
example, “k” for kilo may denote “1000” or “1024”, “M” for mega may denote “1000000”
or “1048576” and so on.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
Switch Router
Safety Warnings
1 For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT store things on the device.
• Do NOT install, use, or service this device during a thunderstorm. There is a remote risk
of electric shock from lightning.
• Connect ONLY suitable accessories to the device.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel should
service or disassemble this device. Please contact your vendor for further information.
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this device before servicing or disassembling.
• Use ONLY an appropriate power adaptor or cord for your device.
• Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in
North America or 230V AC in Europe).
• Do NOT remove the plug and connect it to a power outlet by itself; always attach the plug
to the power adaptor first before connecting it to a power outlet.
• Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
• Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
• If the power adaptor or cord is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a
new one.
• Do not use the device outside, and make sure all the connections are indoors. There is a
remote risk of electric shock from lightning.
• CAUTION: RISK OF EXPLOSION IF BATTERY (on the motherboard) IS REPLACED
BY AN INCORRECT TYPE. DISPOSE OF USED BATTERIES ACCORDING TO
THE INSTRUCTIONS. Dispose them at the applicable collection point for the recycling
of electrical and electronic equipment. For detailed information about recycling of this
product, please contact your local city office, your household waste disposal service or the
store where you purchased the product.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Fuse Warning! Replace a fuse only with a fuse of the same type and rating.
Contents Overview
Introduction ............................................................................................................................ 49
Table of Contents
About This User's Guide .......................................................................................................... 3
Document Conventions............................................................................................................ 4
Safety Warnings........................................................................................................................ 6
Table of Contents.................................................................................................................... 11
List of Tables........................................................................................................................... 41
Part I: Introduction................................................................................. 49
Chapter 1
Getting to Know Your ZyWALL.............................................................................................. 51
Chapter 2
Hardware Installation.............................................................................................................. 55
Chapter 3
Introducing the Web Configurator ........................................................................................ 61
Chapter 4
Wizard Setup ........................................................................................................................... 87
Chapter 5
Tutorials ................................................................................................................................. 109
5.1.5 Using the Dynamic VPN Rule for More VPN Tunnels ...............................................119
5.2 Security Settings for VPN Traffic ........................................................................................119
5.2.1 IDP for From VPN Traffic Example .......................................................................... 120
5.2.2 IDP for To VPN Traffic Example ............................................................................... 121
5.3 Firewall Rule for VPN Example ......................................................................................... 122
5.3.1 Configuring the VPN Rule ........................................................................................ 123
5.3.2 Configuring the Firewall Rules ................................................................................. 127
5.4 How to Set up a 3G WAN Connection ............................................................................... 130
5.4.1 Inserting a 3G Card .................................................................................................. 130
5.4.2 Configuring 3G WAN Settings .................................................................................. 131
5.4.3 Checking WAN Connections .................................................................................... 132
5.5 Configuring Load Balancing .............................................................................................. 132
5.6 Configuring Content Filtering ............................................................................................. 133
5.6.1 Enable Content Filtering ........................................................................................... 133
5.6.2 Block Categories of Web Content ............................................................................ 134
5.6.3 Assign Bob’s Computer a Specific IP Address ......................................................... 136
5.6.4 Create a Content Filter Policy for Bob ...................................................................... 136
5.6.5 Set the Content Filter Schedule ............................................................................... 137
5.6.6 Block Categories of Web Content for Bob ............................................................... 138
Chapter 6
Registration Screens ............................................................................................................ 141
Chapter 7
LAN Screens.......................................................................................................................... 149
Chapter 8
Bridge Screens...................................................................................................................... 161
Chapter 9
WAN Screens......................................................................................................................... 169
Chapter 10
DMZ Screens ......................................................................................................................... 207
Chapter 11
WLAN Screens ...................................................................................................................... 219
Chapter 12
Wireless Screens .................................................................................................................. 229
Chapter 13
Firewall Screens.................................................................................................................... 251
Chapter 14
Intrusion Detection and Prevention (IDP) Screens ........................................................... 277
Chapter 15
Anti-Virus Screens................................................................................................................ 299
Chapter 16
Anti-Spam Screens ............................................................................................................... 313
Chapter 17
Content Filtering Screens .................................................................................................... 327
Chapter 18
Content Filtering Reports..................................................................................................... 349
Chapter 19
IPSec VPN.............................................................................................................................. 357
Chapter 20
Certificates ............................................................................................................................ 399
Chapter 21
Authentication Server Screens............................................................................................ 427
Chapter 22
Network Address Translation (NAT).................................................................................... 435
Chapter 23
Static Route Screens ............................................................................................................ 451
Chapter 24
Policy Route Screens ........................................................................................................... 457
Chapter 25
Bandwidth Management Screens........................................................................................ 465
Chapter 26
DNS Screens ......................................................................................................................... 479
Chapter 27
Remote Management Screens............................................................................................. 491
Chapter 28
UPnP Screens ....................................................................................................................... 519
Chapter 29
Custom Application Screen ................................................................................................. 529
Chapter 30
ALG Screen ........................................................................................................................... 531
Chapter 31
Reports Screens ................................................................................................................... 539
Chapter 32
Logs Screens ....................................................................................................................... 555
Chapter 33
Maintenance Screens ........................................................................................................... 585
Chapter 34
Introducing the SMT ............................................................................................................. 605
Chapter 35
SMT Menu 1 - General Setup ............................................................................................... 613
Chapter 36
WAN and Dial Backup Setup................................................................................................ 619
Chapter 37
LAN Setup.............................................................................................................................. 633
Chapter 38
Internet Access ..................................................................................................................... 639
Chapter 39
DMZ Setup ............................................................................................................................. 645
Chapter 40
Route Setup........................................................................................................................... 649
Chapter 41
Wireless Setup ...................................................................................................................... 653
Chapter 42
Remote Node Setup.............................................................................................................. 659
Chapter 43
IP Static Route Setup............................................................................................................ 669
Chapter 44
Network Address Translation (NAT).................................................................................... 673
Chapter 45
Introducing the ZyWALL Firewall ........................................................................................ 693
Chapter 46
Filter Configuration............................................................................................................... 695
Chapter 47
SNMP Configuration ............................................................................................................. 711
Chapter 48
System Information & Diagnosis......................................................................................... 713
Chapter 49
Firmware and Configuration File Maintenance .................................................................. 725
Chapter 50
System Maintenance Menus 8 to 10.................................................................................... 739
Chapter 51
Remote Management............................................................................................................ 745
Chapter 52
IP Policy Routing .................................................................................................................. 749
Chapter 53
Call Scheduling ..................................................................................................................... 757
Chapter 54
Troubleshooting.................................................................................................................... 763
Chapter 55
Product Specifications ......................................................................................................... 769
Appendix D Windows 98 SE/Me Requirements for Anti-Virus Message Display ................. 801
Index....................................................................................................................................... 815
List of Figures
Figure 1 Secure Internet Access via Cable, DSL or Wireless Modem ................................................... 52
Figure 2 VPN Application ....................................................................................................................... 53
Figure 3 3G WAN Application ................................................................................................................. 53
Figure 4 Attaching Rubber Feet ............................................................................................................ 56
Figure 5 Attaching Mounting Brackets and Screws ................................................................................ 57
Figure 6 Rack Mounting ......................................................................................................................... 57
Figure 7 WLAN Card Installation ............................................................................................................ 58
Figure 8 ZyWALL 70 Front Panel ........................................................................................................... 59
Figure 9 ZyWALL 35 Front Panel ........................................................................................................... 59
Figure 10 ZyWALL 5 Front Panel ........................................................................................................... 59
Figure 11 Change Password Screen ...................................................................................................... 62
Figure 12 Replace Certificate Screen ..................................................................................................... 62
Figure 13 Example Xmodem Upload ...................................................................................................... 63
Figure 14 HOME Screen ........................................................................................................................ 64
Figure 15 Web Configurator HOME Screen in Router Mode (ZyWALL 5) ............................................ 65
Figure 16 Web Configurator HOME Screen in Bridge Mode .................................................................. 71
Figure 17 HOME > Port Statistics ........................................................................................................... 80
Figure 18 HOME > Show Statistics > Line Chart .................................................................................... 81
Figure 19 HOME > Show DHCP Table ................................................................................................... 82
Figure 20 HOME > VPN Status .............................................................................................................. 83
Figure 21 Home > Bandwidth Monitor .................................................................................................... 84
Figure 22 Wizard Setup Welcome .......................................................................................................... 87
Figure 23 ISP Parameters: Ethernet Encapsulation ............................................................................... 88
Figure 24 ISP Parameters: PPPoE Encapsulation ................................................................................. 89
Figure 25 ISP Parameters: PPTP Encapsulation ................................................................................... 91
Figure 26 Internet Access Wizard: Second Screen ................................................................................ 92
Figure 27 Internet Access Setup Complete ............................................................................................ 93
Figure 28 Internet Access Wizard: Registration ..................................................................................... 93
Figure 29 Internet Access Wizard: Registration in Progress .................................................................. 94
Figure 30 Internet Access Wizard: Status .............................................................................................. 95
Figure 31 Internet Access Wizard: Registration Failed .......................................................................... 95
Figure 32 Internet Access Wizard: Registered Device ........................................................................... 95
Figure 33 Internet Access Wizard: Activated Services ........................................................................... 96
Figure 34 VPN Wizard: Gateway Setting ............................................................................................... 96
Figure 35 VPN Wizard: Network Setting ................................................................................................ 98
Figure 36 VPN Wizard: IKE Tunnel Setting ............................................................................................ 99
Figure 37 VPN Wizard: IPSec Setting .................................................................................................. 101
Figure 38 VPN Wizard: VPN Status ..................................................................................................... 102
Figure 168 SECURITY > IDP > Signature: Query View ....................................................................... 285
Figure 169 SECURITY > IDP > Signature: Query by Partial Name ..................................................... 287
Figure 170 SECURITY > IDP > Signature: Query by Complete ID ...................................................... 288
Figure 171 Signature Query by Attribute. ............................................................................................. 289
Figure 172 SECURITY > IDP > Anomaly ............................................................................................. 290
Figure 173 SECURITY > IDP > Update ............................................................................................... 292
Figure 174 SECURITY > IDP > Backup & Restore .............................................................................. 294
Figure 175 ZyWALL Anti-virus Overview ........................................................................................... 299
Figure 176 SECURITY > ANTI-VIRUS > General ............................................................................... 302
Figure 177 SECURITY > ANTI-VIRUS > Signature: Query View ......................................................... 304
Figure 178 Query Example Search Criteria .......................................................................................... 305
Figure 179 Query Example Search Results ......................................................................................... 306
Figure 180 SECURITY > ANTI-VIRUS > Update ................................................................................. 307
Figure 181 SECURITY > ANTI-VIRUS > Backup and Restore ............................................................ 309
Figure 182 Anti-spam Overview ........................................................................................................... 313
Figure 183 SECURITY > ANTI-SPAM > General ................................................................................. 316
Figure 184 SECURITY > ANTI-SPAM > External DB .......................................................................... 319
Figure 185 SECURITY > ANTI-SPAM > Lists ...................................................................................... 321
Figure 186 SECURITY > ANTI-SPAM > Lists > Edit ........................................................................... 322
Figure 187 Content Filtering Lookup Procedure ................................................................................... 328
Figure 188 SECURITY > CONTENT FILTER > General ...................................................................... 329
Figure 189 SECURITY > CONTENT FILTER > Policy ......................................................................... 331
Figure 190 SECURITY > CONTENT FILTER > Policy > General ........................................................ 333
Figure 191 SECURITY > CONTENT FILTER > Policy > External Database ....................................... 334
Figure 192 SECURITY > CONTENT FILTER > Policy > Customization .............................................. 341
Figure 193 SECURITY > CONTENT FILTER > Policy > Schedule ...................................................... 343
Figure 194 SECURITY > CONTENT FILTER > Object ........................................................................ 344
Figure 195 SECURITY > CONTENT FILTER > Cache ........................................................................ 346
Figure 196 myZyXEL.com: Login ......................................................................................................... 350
Figure 197 myZyXEL.com: Welcome ................................................................................................... 350
Figure 198 myZyXEL.com: Service Management ................................................................................ 351
Figure 199 Blue Coat: Login ................................................................................................................. 351
Figure 200 Content Filtering Reports Main Screen .............................................................................. 352
Figure 201 Blue Coat: Report Home .................................................................................................... 352
Figure 202 Global Report Screen Example .......................................................................................... 353
Figure 203 Requested URLs Example ................................................................................................. 354
Figure 204 Web Page Review Process Screen ................................................................................... 355
Figure 205 VPN: Example .................................................................................................................... 357
Figure 206 VPN: IKE SA and IPSec SA .............................................................................................. 358
Figure 207 Gateway and Network Policies .......................................................................................... 359
Figure 208 IPSec Fields Summary ...................................................................................................... 359
Figure 209 SECURITY > VPN > VPN Rules (IKE) .............................................................................. 360
Figure 210 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ......................................... 362
Figure 211 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ........................................... 368
Figure 212 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............. 373
Figure 213 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy ........................................ 374
Figure 214 SECURITY > VPN > VPN Rules (Manual) ........................................................................ 375
Figure 215 SECURITY > VPN > VPN Rules (Manual) > Edit .............................................................. 376
Figure 216 SECURITY > VPN > SA Monitor ....................................................................................... 379
Figure 217 Overlap in a Dynamic VPN Rule ........................................................................................ 380
Figure 218 Overlap in IP Alias and VPN Remote Networks ................................................................. 381
Figure 219 SECURITY > VPN > Global Setting .................................................................................. 381
Figure 220 Telecommuters Sharing One VPN Rule Example .............................................................. 383
Figure 221 Telecommuters Using Unique VPN Rules Example ........................................................... 384
Figure 222 VPN for Remote Management Example ............................................................................ 385
Figure 223 VPN Topologies .................................................................................................................. 386
Figure 224 Hub-and-spoke VPN Example ........................................................................................... 387
Figure 225 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal ......................................... 388
Figure 226 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange ...................................... 389
Figure 227 IKE SA: Main Negotiation Mode, Steps 5 - 6: Authentication ............................................. 389
Figure 228 VPN/NAT Example ............................................................................................................. 392
Figure 229 Virtual Mapping of Local and Remote Network IP Addresses ............................................ 394
Figure 230 VPN: Transport and Tunnel Mode Encapsulation .............................................................. 394
Figure 231 IPSec High Availability ....................................................................................................... 397
Figure 232 Certificates on Your Computer ........................................................................................... 400
Figure 233 Certificate Details .............................................................................................................. 401
Figure 234 SECURITY > CERTIFICATES > My Certificates ............................................................... 402
Figure 235 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 404
Figure 236 SECURITY > CERTIFICATES > My Certificates > Export ................................................. 406
Figure 237 SECURITY > CERTIFICATES > My Certificates > Import ................................................. 408
Figure 238 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ............................... 408
Figure 239 SECURITY > CERTIFICATES > My Certificates > Create (Basic) .................................... 409
Figure 240 SECURITY > CERTIFICATES > My Certificates > Create (Advanced) ............................. 410
Figure 241 SECURITY > CERTIFICATES > Trusted CAs ................................................................... 414
Figure 242 SECURITY > CERTIFICATES > Trusted CAs > Details .................................................... 416
Figure 243 SECURITY > CERTIFICATES > Trusted CAs > Import ..................................................... 419
Figure 244 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 420
Figure 245 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ..................................... 421
Figure 246 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 422
Figure 247 SECURITY > CERTIFICATES > Directory Servers ............................................................ 424
Figure 248 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 425
Figure 249 SECURITY > AUTH SERVER > Local User Database ...................................................... 429
Figure 250 SECURITY > AUTH SERVER > RADIUS .......................................................................... 430
Figure 251 ADVANCED > NAT > NAT Overview .................................................................................. 437
Figure 252 ADVANCED > NAT > Address Mapping ............................................................................. 439
Figure 253 ADVANCED > NAT > Address Mapping > Edit .................................................................. 440
List of Tables
Table 1 ZyWALL Model Specific Features ............................................................................................. 52
Table 2 Front Panel Lights ..................................................................................................................... 59
Table 3 Title Bar: Web Configurator Icons ............................................................................................. 64
Table 4 Web Configurator HOME Screen in Router Mode .................................................................... 65
Table 5 Web Configurator HOME Screen in Bridge Mode .................................................................... 71
Table 6 Bridge and Router Mode Features Comparison ....................................................................... 74
Table 7 Screens Summary .................................................................................................................... 75
Table 8 HOME > Port Statistics ............................................................................................................. 80
Table 9 HOME > Show Statistics > Line Chart ...................................................................................... 82
Table 10 HOME > Show DHCP Table ................................................................................................... 82
Table 11 HOME > VPN Status ............................................................................................................... 83
Table 12 ADVANCED > BW MGMT > Monitor ...................................................................................... 84
Table 13 ISP Parameters: Ethernet Encapsulation ............................................................................... 88
Table 14 ISP Parameters: PPPoE Encapsulation ................................................................................. 90
Table 15 ISP Parameters: PPTP Encapsulation .................................................................................... 91
Table 16 Internet Access Wizard: Registration ...................................................................................... 94
Table 17 VPN Wizard: Gateway Setting ................................................................................................ 96
Table 18 VPN Wizard: Network Setting ................................................................................................. 98
Table 19 VPN Wizard: IKE Tunnel Setting ........................................................................................... 100
Table 20 VPN Wizard: IPSec Setting ................................................................................................... 101
Table 21 VPN Wizard: VPN Status ...................................................................................................... 103
Table 22 Anti-Spam Wizard: Email Server Location Setting ................................................................ 105
Table 23 Anti-Spam Wizard: Direction Configuration ........................................................................... 107
Table 24 Dynamic VPN Rule Tutorial Settings .................................................................................... 109
Table 25 REGISTRATION > Registration ............................................................................................ 143
Table 26 REGISTRATION > Service ................................................................................................... 145
Table 27 NETWORK > LAN ................................................................................................................. 153
Table 28 NETWORK > LAN > Static DHCP ........................................................................................ 156
Table 29 NETWORK > LAN > IP Alias ................................................................................................ 158
Table 30 NETWORK > LAN > Port Roles ............................................................................................ 159
Table 31 NETWORK > Bridge ............................................................................................................. 163
Table 32 NETWORK > Bridge > Port Roles ........................................................................................ 165
Table 33 STP Path Costs .................................................................................................................... 166
Table 34 STP Port States .................................................................................................................... 167
Table 35 NETWORK > WAN > General .............................................................................................. 175
Table 36 Least Load First: Example 1 ................................................................................................. 178
Table 37 Least Load First: Example 2 ................................................................................................. 178
Table 38 Load Balancing: Least Load First ......................................................................................... 179
Table 82 SECURITY > IDP > Signature: Query View .......................................................................... 285
Table 83 SECURITY > IDP > Anomaly ................................................................................................ 290
Table 84 SECURITY > IDP > Update .................................................................................................. 292
Table 85 SECURITY > ANTI-VIRUS > General .................................................................................. 302
Table 86 SECURITY > ANTI-VIRUS > Signature: Query View ........................................................... 304
Table 87 Common Computer Virus Types ........................................................................................... 310
Table 88 SECURITY > ANTI-SPAM > General ................................................................................... 316
Table 89 SECURITY > ANTI-SPAM > External DB ............................................................................. 319
Table 90 SECURITY > ANTI-SPAM > Lists ......................................................................................... 321
Table 91 SECURITY > ANTI-SPAM > Lists > Edit ............................................................................... 323
Table 92 SECURITY > CONTENT FILTER > General ........................................................................ 329
Table 93 SECURITY > CONTENT FILTER > Policy ........................................................................... 332
Table 94 SECURITY > CONTENT FILTER > Policy > General ........................................................... 333
Table 95 SECURITY > CONTENT FILTER > Policy > External Database .......................................... 335
Table 96 SECURITY > CONTENT FILTER > Policy > Customization ................................................. 342
Table 97 SECURITY > CONTENT FILTER > Policy > Schedule ........................................................ 343
Table 98 SECURITY > CONTENT FILTER > Object ........................................................................... 345
Table 99 SECURITY > CONTENT FILTER > Cache ........................................................................... 346
Table 100 SECURITY > VPN > VPN Rules (IKE) ............................................................................... 360
Table 101 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy ........................................... 363
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy ............................................ 369
Table 103 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding ............... 373
Table 104 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy .......................................... 374
Table 105 SECURITY > VPN > VPN Rules (Manual) ......................................................................... 375
Table 106 SECURITY > VPN > VPN Rules (Manual) > Edit ............................................................... 377
Table 107 SECURITY > VPN > SA Monitor ........................................................................................ 379
Table 108 SECURITY > VPN > Global Setting .................................................................................... 381
Table 109 Telecommuters Sharing One VPN Rule Example ............................................................... 383
Table 110 Telecommuters Using Unique VPN Rules Example ............................................................ 384
Table 111 VPN Example: Matching ID Type and Content .................................................................... 390
Table 112 VPN Example: Mismatching ID Type and Content .............................................................. 390
Table 113 SECURITY > CERTIFICATES > My Certificates ................................................................ 402
Table 114 SECURITY > CERTIFICATES > My Certificates > Details ................................................. 404
Table 115 SECURITY > CERTIFICATES > My Certificates > Export .................................................. 406
Table 116 SECURITY > CERTIFICATES > My Certificates > Import .................................................. 408
Table 117 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12 ................................ 408
Table 118 SECURITY > CERTIFICATES > My Certificates > Create .................................................. 410
Table 119 SECURITY > CERTIFICATES > Trusted CAs .................................................................... 414
Table 120 SECURITY > CERTIFICATES > Trusted CAs > Details ..................................................... 416
Table 121 SECURITY > CERTIFICATES > Trusted CAs Import ......................................................... 419
Table 122 SECURITY > CERTIFICATES > Trusted Remote Hosts .................................................... 420
Table 123 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import ...................................... 421
Table 124 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details ..................................... 423
Table 125 SECURITY > CERTIFICATES > Directory Servers ............................................................ 425
Table 126 SECURITY > CERTIFICATES > Directory Server > Add ................................................... 426
Table 127 SECURITY > AUTH SERVER > Local User Database ....................................................... 430
Table 128 SECURITY > AUTH SERVER > RADIUS .......................................................................... 430
Table 129 NAT Mapping Types ............................................................................................................ 436
Table 130 ADVANCED > NAT > NAT Overview .................................................................................. 437
Table 131 ADVANCED > NAT > Address Mapping ............................................................................. 439
Table 132 ADVANCED > NAT > Address Mapping > Edit ................................................................... 441
Table 133 ADVANCED > NAT > Port Forwarding ................................................................................ 444
Table 134 ADVANCED > NAT > Port Triggering ................................................................................. 446
Table 135 ADVANCED > STATIC ROUTE > IP Static Route .............................................................. 453
Table 136 ADVANCED > STATIC ROUTE > IP Static Route > Edit .................................................... 454
Table 137 ADVANCED > POLICY ROUTE > Policy Route Summary ................................................. 459
Table 138 ADVANCED > POLICY ROUTE > Edit ............................................................................... 461
Table 139 Application and Subnet-based Bandwidth Management Example ..................................... 466
Table 140 Over Allotment of Bandwidth Example ............................................................................... 467
Table 141 ADVANCED > BW MGMT > Summary ............................................................................... 469
Table 142 Maximize Bandwidth Usage Example ................................................................................. 470
Table 143 Priority-based Allotment of Unused and Unbudgeted Bandwidth Example ........................ 470
Table 144 Fairness-based Allotment of Unused and Unbudgeted Bandwidth Example ..................... 471
Table 145 ADVANCED > BW MGMT > Class Setup ........................................................................... 472
Table 146 ADVANCED > BW MGMT > Class Setup > Add Sub-Class ............................................... 474
Table 147 Bandwidth Borrowing Example ........................................................................................... 476
Table 148 ADVANCED > DNS > Add (Address Record) ..................................................................... 484
Table 149 ADVANCED > REMOTE MGMT > WWW ........................................................................... 506
Table 150 ADVANCED > REMOTE MGMT > SSH ............................................................................. 508
Table 151 ADVANCED > REMOTE MGMT > Telnet ........................................................................... 509
Table 152 ADVANCED > REMOTE MGMT > FTP .............................................................................. 510
Table 153 SNMP Traps ........................................................................................................................ 512
Table 154 ADVANCED > REMOTE MGMT > SNMP .......................................................................... 513
Table 155 ADVANCED > REMOTE MGMT > DNS ............................................................................. 514
Table 156 ADVANCED > REMOTE MGMT > CNM ............................................................................. 515
Table 157 ADVANCED > UPnP ........................................................................................................... 526
Table 158 ADVANCED > UPnP > Ports .............................................................................................. 527
Table 159 ADVANCED > Custom APP ................................................................................................ 530
Table 160 ADVANCED > ALG ............................................................................................................. 536
Table 161 REPORTS > Traffic Statistics .............................................................................................. 540
Table 162 REPORTS > Traffic Statistics: Web Site Hits Report .......................................................... 542
Table 163 REPORTS > Traffic Statistics: Host IP Address .................................................................. 543
Table 164 REPORTS > Traffic Statistics: Protocol/ Port ...................................................................... 544
Table 165 Report Specifications .......................................................................................................... 545
Table 166 REPORTS > IDP ................................................................................................................. 546
Table 167 REPORTS > Anti-Virus ....................................................................................................... 548
49
50
CHAPTER 1
Getting to Know Your ZyWALL
This chapter introduces the main features and applications of the ZyWALL.
Table Key: A Y in a model’s column shows that the model has the specified feature. The
information in this table was correct at the time of writing, although it may be subject to
change.
DMZ
WAN
LAN
" At the time of writing, only ZyWALL 5 supports 3G, so all 3G descriptions
relate to ZyWALL 5 only. See Section 9.4 on page 192 for more information
about 3G.
With both the primary WAN (physical WAN port) and 3G WAN connections enabled, you
can use load balancing to improve quality of service and maximize bandwidth utilization or set
one of the WAN connections as a backup.
" For proper ventilation, allow at least 4 inches (10 cm) of clearance at the front
and two sides and 3.4 inches (8 cm) at the back of the ZyWALL. This is
especially important for enclosed rack installations.
" Do not block the ventilation holes. Leave space between ZyWALLs when
stacking.
" Make sure the rack will safely support the combined weight of all the
equipment it contains.
Make sure the position of the ZyWALL does not make the rack unstable or top-
heavy. Take all necessary precautions to anchor the rack securely before
installing the unit.
" Failure to use the proper screws may damage the unit.
3 After attaching both mounting brackets, position the ZyWALL in the rack by lining up
the holes in the brackets with the appropriate holes on the rack. Secure the ZyWALL to
the rack with the rack-mounting screws.
" Do not insert or remove a card with the ZyWALL turned on.
Make sure the ZyWALL is off before inserting or removing an 802.11b/g-compliant wireless
LAN PCMCIA or CardBus card, 3G card or ZyWALL Turbo Card (to avoid damage). Slide
the connector end of the card into the slot as shown next.
" Only certain ZyXEL wireless LAN cards or 3G card are compatible with the
ZyWALL. Only the ZyWALL 5 can use a 3G card.
Do not force, bend or twist the wireless LAN card, 3G card or ZyWALL Turbo
Card.
• Web browser pop-up windows from your device. Web pop-up blocking is enabled by
default in Windows XP SP (Service Pack) 2.
• JavaScripts (enabled by default).
• Java permissions (enabled by default).
See Appendix B on page 785 if you want to make sure these functions are allowed in Internet
Explorer or Netscape Navigator.
" By default, the packets from WLAN to WLAN/ZyWALL are dropped and users
cannot configure the ZyWALL wirelessly.
1 Make sure your ZyWALL hardware is properly connected and prepare your computer/
computer network to connect to the ZyWALL (refer to the Quick Start Guide).
2 Launch your web browser.
3 Type "192.168.1.1" as the URL.
4 Type "1234" (default) as the password and click Login. In some versions, the default
password appears automatically - if this is the case, click Login.
5 You should see a screen asking you to change your password (highly recommended) as
shown next. Type a new password (and retype it to confirm) and click Apply or click
Ignore.
6 Click Apply in the Replace Certificate screen to create a certificate using your
ZyWALL’s MAC address that will be specific to this device.
" If you do not replace the default certificate here or in the CERTIFICATES
screen, this screen displays every time you access the web configurator.
7 You should now see the HOME screen (see Figure 15 on page 65).
" The management session automatically times out when the time period set in
the Administrator Inactivity Timer field expires (default five minutes). Simply
log back into the ZyWALL if this happens to you.
D
As illustrated above, the main screen is divided into these parts:
• A - title bar
• B - navigation panel
• C - main window
• D - status bar
Note: The ZyWALL must have a Turbo Card installed and a valid
service subscription to use the IDP and anti-virus features.
IDP/Anti-Virus This is the version number of the signatures set that the ZyWALL is using and the
Definitions date and time that the set was released. Click the field label to go to the screen
where you can update the signatures. N/A displays when there is no Turbo Card
installed or the service subscription has expired.
IDP/Anti-Virus This is the date the IDP/anti-virus service subscription expires. Click the field label
Expiration Date to go to the screen where you can update your service subscription.
Anti-Spam This is the date the anti-spam service subscription expires. Click the field label to
Expiration Date go to the screen where you can update your service subscription.
Content Filter This is the date the category-based content filtering service subscription expires.
Expiration Date Click the field label to go to the screen where you can update your service
subscription.
Intrusion Detected This displays how many intrusions the ZyWALL has detected since it last started
up. N/A displays when the ZyWALL has never had an IDP subscription or there is
no Turbo Card installed. Disable displays when IDP threat statistics collection is
disabled.
Click the field label to go to the related screen.
Note: The budget counters will not be reset when you restore the
factory defaults. The budget counters are saved to the flash
every hour or when the 3G connection is dropped. If you
restart the ZyWALL within one hour, any change in the
counters will not be saved.
Reset time and This displays when you enable budget control in the Network > WAN > 3G (WAN
data budget 2) screen.
counters Click this button to reset the time and data budgets immediately. The count starts
over with the 3G connection’s full configured monthly time and data budgets. This
does not affect the normal monthly budget restart.
Latest Alerts This table displays the five most recent alerts recorded by the ZyWALL. You can
see more information in the View Log screen, such as the source and destination
IP addresses and port numbers of the incoming packets.
Date/Time This is the date and time the alert was recorded.
Message This is the reason for the alert.
System Status
Port Statistics Click Port Statistics to see router performance statistics such as the number of
packets sent and number of packets received for each port.
DHCP Table Click DHCP Table to show current DHCP client information.
VPN Click VPN to display the active VPN connections.
Bandwidth Click Bandwidth to view the ZyWALL’s bandwidth usage and allotments.
Note: The ZyWALL must have a Turbo Card installed and a valid
service subscription to use the IDP and anti-virus features.
IDP/Anti-Virus This is the version number of the signatures set that the ZyWALL is using and the
Definitions date and time that the set was released. Click the field label to go to the screen
where you can update the signatures. N/A displays when there is no Turbo Card
installed or the service subscription has expired.
IDP/Anti-Virus This is the date the IDP/anti-virus service subscription expires. Click the field label
Expiration Date to go to the screen where you can update your service subscription.
Anti-Spam This is the date the anti-spam service subscription expires. Click the field label to
Expiration Date go to the screen where you can update your service subscription.
Content Filter This is the date the category-based content filtering service subscription expires.
Expiration Date Click the field label to go to the screen where you can update your service
subscription.
Intrusion This displays how many intrusions the ZyWALL has detected since it last started
Detected up.
N/A displays when there is no valid license or there is no Turbo Card installed.
Disable displays when the IDP threat statistics collection is disabled.
Click the field label to go to the screen where you can turn the statistics collection
on or off.
Virus Detected This displays how many virus-infected files the ZyWALL has detected since it last
started up. It also displays the percentage of virus-infected files out of the total
number of files that the ZyWALL has scanned (since it last started up).
N/A displays when there is no valid license or there is no Turbo Card installed.
Disable displays when the anti-virus threat statistics collection is disabled.
Click the field label to go to the screen where you can turn the statistics collection
on or off.
Table Key: A Y in a mode’s column shows that the device mode has the specified feature. The
information in this table was correct at the time of writing, although it may be subject to
change.
The following table describes the sub-menus.
Table 7 Screens Summary
LINK TAB FUNCTION
HOME This screen shows the ZyWALL’s general device and network
status information. Use this screen to access the wizards,
statistics and DHCP table.
REGISTRATIO Registration Use this screen to register your ZyWALL and activate the trial
N service subscriptions.
Service Use this to manage and update the service status and license
information.
NETWORK
Reports Use this screen to have the ZyWALL record and display network
usage reports.
IDP Use this screen to collect and display statistics on the intrusions
that the ZyWALL has detected.
Anti-Virus Use this screen to collect and display statistics on the viruses that
the ZyWALL has detected.
Anti-Spam Use this screen to collect and display statistics on spam mail that
the ZyWALL has detected.
E-mail Report Use this screen to have reports emailed in a single file.
LOGS View Log Use this screen to view the logs for the categories that you
selected.
Log Settings Use this screen to change your ZyWALL’s log settings.
Port Select the check box(es) to display the throughput statistics of the corresponding
interface(s).
B/s Specify the direction of the traffic for which you want to show throughput statistics in
this table.
Select Tx to display transmitted traffic throughput statistics and the amount of traffic
(in bytes). Select Rx to display received traffic throughput statistics and the amount
of traffic (in bytes).
Throughput Set the range of the throughput (in B/s, KB/s or MB/s) to display.
Range Click Set Range to save this setting back to the ZyWALL.
4.2.1.1 Ethernet
For ISPs (such as Telstra) that send UDP heartbeat packets to verify that the customer is still
online, please create a WAN-to-WAN/ZyWALL firewall rule for those packets. Contact your
ISP to find the correct port number.
Choose Ethernet when the WAN port is used as a regular Ethernet.
" The ZyWALL supports one PPTP server connection at any given time.
" Make sure you have installed the ZyWALL Turbo Card before you activate the
IDP and anti-virus subscription services.
Turn the ZyWALL off before you install or remove the ZyWALL Turbo Card.
" If you want to activate a standard service with your iCard’s PIN number
(license key), use the REGISTRATION > Service screen.
After you fill in the fields and click Next, the following screen shows indicating the
registration is in progress. Wait for the registration progress to finish.
A screen similar to the following appears if the registration was not successful. Click Return
to go back to the Device Registration screen and check your settings.
• For e-mail servers on the LAN, DMZ, or WLAN the ZyWALL recommends checking
traffic that comes from the WAN to the zone(s) where the e-mail server is located. This is
to check for spam coming to the ZyWALL’s e-mail server from outside e-mail servers.
• For e-mail servers on the Internet, the ZyWALL recommends checking traffic that comes
from the WAN to the LAN, DMZ, and WLAN zones. This is to check for spam coming to
the ZyWALL’s local users from the outside e-mail server.
• For e-mail servers located at the other end of a VPN tunnel, the ZyWALL recommends
checking traffic that comes from the VPN to the LAN, DMZ, and WLAN zones. This is to
check for spam coming to the ZyWALL’s local users from the e-mail server at the VPN
peer.
• If you have (your) e-mail server at the WAN zone, the ZyWALL recommends having
anti-spam functionality installed on another device between the e-mail server and the
Internet. Another option would be to move the e-mail server to the LAN, DMZ, or
WLAN.
• Click Back to return to the previous screen.
• Click Next to continue.
X Y
A B
0.0.0.0 192.168.167.2
10.0.0.2~10.0.0.64 1.2.3.4
3 Click Apply.
1 Click SECURITY > VPN > VPN Rules (IKE), and then the add gateway policy ( )
icon to display the Edit Gateway Policy screen. Use this screen to configure the VPN
gateway policy that identifies the ZyWALLs.
The company’s ZyWALL (A) and the telecommuter’s ZyWALL (B) gateway policy edit
screens are shown next.
• The information that identifies the ZyWALL 70 (A) is circled in red.
• The information that identifies the ZyWALL P1 (B) is circled in yellow.
• Information that is the same in both is circled in orange.
• Extended authentication settings are in green.
2 After you click Apply, the A-B_Gateways gateway policy displays as shown next. Click
SECURITY > VPN and the A-B_Gateways’ add network policy ( ) icon. The
following figure shows ZyWALL A’s screen.
3 Edit the VPN-Network Policy -Edit screen to configure network policies. A network
policy identifies the devices behind the IPSec routers at either end of a VPN tunnel and
specifies the authentication, encryption and other settings needed to negotiate a phase 2
IPSec SA.
Here are the company’s ZyWALL (A) and the telecommuter’s ZyWALL (B) network
policy edit screens.
• The information that identifies network X is circled in red.
• The information that identifies network Y is circled in yellow.
4 After you click Apply, the network policy displays with the gateway policy.
5 In the ZyWALL B, select "X-Y_Networks" in the Activating VPN Rule field to activate
the VPN rule. The color of "X-Y_Networks" VPN policy changes to pink.
You have configured the company’s ZyWALL (A) and the telecommuter’s ZyWALL (B).
4 Click Apply. The system reboots automatically and restarts in zero configuration mode.
C:\>ipconfig
3 Open a web browser (like Internet Explorer) to connect to the ZyWALL P1’s LAN IP
address (http://192.168.167.1 in this example).
4 The user mode screen for VPN authentication displays. Enter the user name
"SalesManager" and password "Manager1234". Click Activate.
5 ZyWALL B automatically initiates and negotiates the VPN tunnel with ZyWALL A
after you pass the authentication. A successful screen displays. Click Return.
6 Send a ping from the telecommuter’s computer (IP address 192.168.167.2) to a device
on the office network (X), for example 10.0.0.2. You should get a response.
To do this in most Windows computers, click Start > Run, enter cmd, and then enter
ping followed by the IP address of a computer on network X. Here is an example.
C:\>ping 10.0.0.2
If there is no reply to the ping, the system log can help identify a configuration problem. Click
LOGS to see the system log. See Section on page 561 for information on the log messages.
You may need to click LOGS > Log Settings in the advanced web configurator and make
sure IKE and IPSec logging is enabled at both ends. You can clear the existing log and re-
attempt to build the tunnel (this makes it easier to identify the relevant logs).
When you can ping IP address 10.0.0.2 from the computer with IP address 192.168.167.2
behind ZyWALL B, you know the VPN tunnel works.
5.1.5 Using the Dynamic VPN Rule for More VPN Tunnels
Other remote users (like sales people and telecommuters) using IPSec routers with dynamic
WAN IP addresses can also use the same gateway and network policy on ZyWALL A. The
gateway policies you configure on the remote IPSec routers differ by user name and password.
The network policies on the remote IPSec routers differ by the IP address of the computer
behind the remote IPSec router. Even though all of the remote IPSec routers use the same
gateway policy and network policy on ZyWALL A, ZyWALL A builds a different VPN
tunnel for each remote IPSec router. See Section 19.9 on page 379 to display VPN tunnels.
D
10.0.0.2~10.0.0.64 L
0.0.0.0 192.168.167.34
• Create a unique user name and password for each remote IPSec router in ZyWALL A’s
local user database (or on a RADIUS server that ZyWALL A is configured to use).
• Configure a gateway policy on each remote IPSec router. Use the same MyZyWALL and
Primary Remote Gateway address and Pre-Shared Key settings on all of the remote
IPSec routers, but a different user name and password for each.
• Configure a different network policy for each remote IPSec router. Make sure the IP
addresses of the computers (behind the remote IPSec routers) that can trigger the dynamic
rule VPN tunnels do not overlap with each other. For example, computers Y, Z, and L all
use different private IP addresses. You can also use virtual address mapping (NAT over
IPSec) to avoid an overlap (see Section on page 393).
" The security settings apply to VPN traffic going to or from the ZyWALL’s VPN
tunnels. They do not apply to other VPN traffic for which the ZyWALL is not
one of the gateways (VPN pass-through traffic).
You can turn on content filtering for all of the ZyWALL’s VPN traffic (regardless of its
direction of travel). You can apply firewall, IDP, anti-virus and anti-spam security to VPN
traffic based on its direction of travel. The following examples show how you do this for IDP
and the firewall.
2 Use this screen to set up the connection between the routers. Configure the fields that are
circled as follows and click Apply.
Figure 59 SECURITY > VPN > VPN Rules (IKE)> Add Gateway Policy
Figure 60 SECURITY > VPN > VPN Rules (IKE): With Gateway Policy Example
4 Use this screen to specify which computers behind the routers can use the VPN tunnel.
Configure the fields that are circled as follows and click Apply. You may notice that the
example does not specify the port numbers. This is due to the following reasons.
• While FTP uses a control session on port 20, the port for the data session is not fixed.
So this example uses the firewall’s FTP application layer gateway (ALG) to handle
this instead of specifying port numbers in this VPN network policy.
• The firewall provides better security because it operates at layer 4 and checks traffic
sessions. The VPN network policy only operates at layer 3 and just checks IP
addresses and port numbers.
Figure 61 SECURITY > VPN > VPN Rules (IKE)> Add Network Policy
4 Configure the rule as follows and click Apply. The source addresses are the VPN rule’s
remote network and the destination address is the LAN FTP server.
Figure 63 SECURITY > FIREWALL > Rule Summary > Edit: Allow
5 The rule displays in the summary list of VPN to LAN firewall rules.
Figure 65 SECURITY > FIREWALL > Default Rule: Block From VPN To LAN
" See Table 272 on page 773 for the 3G wireless cards you can use in the
ZyWALL 5.
1 Make sure the ZyWALL is off before inserting or removing a card (to avoid damage).
2 If you have a wireless card or Turbo card in the ZyWALL, remove it.
3 Slide the connector end of the 3G card into the slot.
4 Connect the ZyWALL’s power.
" The ordering of your policies is very important as the ZyWALL applies policies
in the order they are listed.
The ZyWALL applies the content filter policies based on the source address and the schedule.
So for this example, when the ZyWALL receives a request from the LAN for a web page, it
checks the request against the first policy. If the traffic matches (that is if it is from Bob’s
computer and the time is between 12:00 and 13:00), the ZyWALL applies the first policy. Any
traffic that does not match the first policy will match the default policy and the ZyWALL
treats it based on the default policy.
" You must register for external content filtering before you can use it.
Use the REGISTRATION screens (see Chapter 6 on page 141) to create a myZyXEL.com
account, register your device and activate the external content filtering service.
1 Click SECURITY > CONTENT FILTER.
2 Enable the content filter and external database content filtering.
3 Click Apply.
2 Select Active.
3 Select the categories to block.
4 Click Apply.
Figure 71 SECURITY > CONTENT FILTER > Policy > External Database (Default)
2 Select Active.
3 Give the policy a name.
4 Configure a single address of 192.168.1.33.
5 Click Apply.
Figure 76 SECURITY > CONTENT FILTER > Policy > Schedule (Bob)
2 Select Active.
3 Select the categories to block. This is very similar to Section 5.6.2 on page 134, except
you do not select the arts and entertainment category.
4 Click Apply.
Figure 78 SECURITY > CONTENT FILTER > Policy > External Database (Bob)
6.1 Overview
The registration screens let you activate and update your account with myZyXEL.com,
allowing you access to subscription services required for the ZyWALL’s security features.
myZyXEL.com
myZyXEL.com is ZyXEL’s online services center where you can register your ZyWALL and
manage subscription services available for the ZyWALL.
Content Filtering
Content filtering allows or blocks access to web sites. Subscribe to category-based content
filtering to block access to categories of web sites based on content. Your ZyWALL accesses
an external database that has millions of web sites categorized based on content. You can have
the ZyWALL block, block and/or log access to web sites based on these categories.
Anti-spam
Anti-spam identifies and marks or discards spam e-mail. An anti-spam subscription lets the
ZyWALL check e-mail with an external anti-spam server.
Anti-virus
Anti-virus allows the ZyWALL to scan packets for computer viruses and deletes the infected
packets.
IDP
IDP allows the ZyWALL to detect malicious or suspicious packets and respond immediately.
Signatures
This is the pattern of code used by a particular virus. The ZyWALL compares files with a
database of signatures to identify possible viruses. The ID&P and anti-virus features use the
same signature files on the ZyWALL to detect and scan for viruses.
Signature Updates
After the service is activated, the ZyWALL downloads the up-to-date signature files from the
update server (http://myupdate.zywall.zyxel.com). You will get automatic e-mail notification
of new signature releases from mySecurityZone after you activate the IDP/Anti-virus service.
You can also check for new signature or virus updates at http://mysecurity.zyxel.com.
" To update the signature file or use a subscription service, you have to register
and activate the corresponding service at myZyXEL.com (through the
ZyWALL).
" If the ZyWALL is registered already, this screen is read-only and indicates
whether trial services are activated. Use the Service screen to update your
service subscription status.
" If you restore the ZyWALL to the default configuration file or upload a different
configuration file after you register, click the Service License Refresh button
to update license information.
147
148
CHAPTER 7
LAN Screens
7.1 Overview
A network is a shared communication system to which many computers are attached.
The Local Area Network (LAN) includes the computers and networking devices in your home
or office that you connect to the ZyWALL’s LAN ports.
The Wide Area Network (WAN) is another network (most likely the Internet) that you connect
to the ZyWALL’s WAN port. See Chapter 9 on page 169 for how to use the WAN screens to
set up your WAN connection.
The LAN and the WAN are two separate networks. The ZyWALL controls the traffic that
goes between them. The following graphic gives an example.
LAN WAN
INTERNET
" This chapter is only applicable when the ZyWALL is in router mode.
• Use the IP Alias screen (Section 7.4 on page 156) to configure IP alias settings on the
ZyWALL’s LAN ports.
• Use the Port Roles screen (Section 7.5 on page 158) to configure LAN ports on the
ZyWALL. The Port Roles screen is available on the ZyWALL 5 and ZyWALL 35.
Private IP Addresses
Every machine on the Internet must have a unique address. If your networks are isolated from
the Internet, for example, only between your two branch offices, you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private
networks:
• 10.0.0.0 — 10.255.255.255
• 172.16.0.0 — 172.31.255.255
• 192.168.0.0 — 192.168.255.255
You can obtain your IP address from the IANA, from an ISP or it can be assigned from a
private network. If you belong to a small organization and your Internet access is through an
ISP, the ISP can provide you with the Internet addresses for your local networks. On the other
hand, if you are part of a much larger organization, you should consult your network
administrator for the appropriate IP addresses.
MAC Address
Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address
is assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02.
DHCP
The ZyWALL can use DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC
2132) to automatically assign IP addresses subnet masks, gateways, and some network
information like the IP addresses of DNS servers to the computers on your LAN. You can
alternatively have the ZyWALL relay DHCP information from another DHCP server. If you
disable the ZyWALL’s DHCP service, you must have another DHCP server on your LAN, or
else the computers must be manually configured.
IP Pool Setup
The ZyWALL is pre-configured with a pool of IP addresses for the computers on your LAN.
See Table 269 on page 770 for the default IP pool range. Do not assign your LAN computers
static IP addresses that are in the DHCP pool.
RIP Setup
RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to exchange
routing information with other routers. RIP Direction controls the sending and receiving of
RIP packets. When set to Both or Out Only, the ZyWALL will broadcast its routing table
periodically. When set to Both or In Only, it will incorporate the RIP information that it
receives; when set to None, it will not send any RIP packets and will ignore any RIP packets
received.
RIP Version controls the format and the broadcasting method of the RIP packets that the
ZyWALL sends (it recognizes both formats when receiving). RIP-1 is universally supported;
but RIP-2 carries more information. RIP-1 is probably adequate for most networks, unless you
have an unusual network topology.
Both RIP-2B and RIP-2M send routing data in RIP-2 format; the difference being that RIP-
2B uses subnet broadcasting while RIP-2M uses multicasting. Multicasting can reduce the
load on non-router machines since they generally do not listen to the RIP multicast address
and so will not receive the RIP packets. However, if one router uses multicasting, then all
routers on your network must use multicasting, also.
By default, RIP Direction is set to Both and RIP Version to RIP-1.
Multicast
Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1
recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to
a group of hosts on the network - not everybody and not just 1.
IGMP (Internet Group Management Protocol) is a network-layer protocol used to establish
membership in a Multicast group - it is not used to carry user data. IGMP version 2 (RFC
2236) is an improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use. If
you would like to read more detailed information about interoperability between IGMP
version 2 and version 1, please see sections 4 and 5 of RFC 2236. The class D IP address is
used to identify host groups and can be in the range 224.0.0.0 to 239.255.255.255. The address
224.0.0.0 is not assigned to any group and is used by IP multicast computers. The address
224.0.0.1 is used for query messages and is assigned to the permanent group of all IP hosts
(including gateways). All hosts must join the 224.0.0.1 group in order to participate in IGMP.
The address 224.0.0.2 is assigned to the multicast routers group.
The ZyWALL supports both IGMP version 1 (IGMP-v1) and IGMP version 2 (IGMP-v2). At
start up, the ZyWALL queries all directly connected networks to gather group membership.
After that, the ZyWALL periodically updates this information. IP multicasting can be enabled/
disabled on the ZyWALL LAN and/or WAN interfaces in the web configurator (LAN;
WAN). Select None to disable IP multicasting on these interfaces.
WINS
WINS (Windows Internet Naming Service) is a Windows implementation of NetBIOS Name
Server (NBNS) on Windows. It keeps track of NetBIOS computer names. It stores a mapping
table of your network’s computer names and IP addresses. The table is dynamically updated
for IP addresses assigned by DHCP. This helps reduce broadcast traffic since computers can
query the server instead of broadcasting a request for a computer name’s IP address. In this
way WINS is similar to DNS, although WINS does not use a hierarchy (unlike DNS). A
network can have more than one WINS server. Samba can also serve as a WINS server.
IP Alias
IP alias allows you to partition a physical network into different logical networks over the
same Ethernet interface. The LAN, DMZ or WLAN may all be partitioned in this way.
Port Roles
Port Roles allows you to set ports as part of the LAN, DMZ and/or WLAN interface.
The ZyWALL has a single LAN interface. Even though more than one of ports 1~4 may be in
the LAN port role, they are all still part of a single physical Ethernet interface and all use the
same IP address.
The ZyWALL supports three logical LAN interfaces via its single physical LAN Ethernet
interface. The ZyWALL itself is the gateway for each of the logical LAN networks.
When you use IP alias, you can also configure firewall rules to control access between the
LAN's logical networks (subnets).
" Make sure that the subnets of the logical networks do not overlap.
To change your ZyWALL’s IP alias settings, click NETWORK > LAN > IP Alias. The
screen appears as shown.
" Do the following if you are configuring from a computer connected to a LAN,
DMZ or WLAN port and changing the port's role:
1 A port's IP address varies as its role changes, make sure your computer's IP address is in
the same subnet as the ZyWALL's LAN, DMZ or WLAN IP address.
2 Use the appropriate LAN, DMZ or WLAN IP address to access the ZyWALL.
To change your ZyWALL’s port role settings, click NETWORK > LAN > Port Roles. The
screen appears as shown.
The radio buttons correspond to Ethernet ports on the front panel of the ZyWALL. On the
ZyWALL 70, ports 1 to 4 are all DMZ ports by default. On the ZyWALL 5 or ZyWALL 35,
ports 1 to 4 are all LAN ports by default.
" Your changes are also reflected in the DMZ Port Roles and WLAN Port
Roles screens.
After you change the LAN/DMZ/WLAN port roles and click Apply, please wait for few
seconds until the following screen appears. Click Return to go back to the Port Roles screen.
8.1 Overview
The ZyWALL can act as a bridge between a switch and a wired LAN or between two routers.
This chapter describes how to configure bridge settings. This chapter is only applicable when
the ZyWALL is in bridge mode.
In bridge mode, the ZyWALL functions as a transparent firewall (also known as a bridge
firewall). The ZyWALL bridges traffic traveling between the ZyWALL's interfaces and still
filters and inspects packets. You do not need to change the configuration of your existing
network.
In the first figure below the ZyWALL is in bridge mode and is bridging traffic on the WAN.
The router device has a public WAN IP address and the ZyWALL is transparent. In the second
figure the ZyWALL is in router mode and has a public WAN IP address and routes traffic
between the LAN and WAN.
LAN WAN
192.168.1.1 A.B.C.D
192.168.0.1
LAN WAN
192.168.1.33 192.168.1.1 A.B.C.D
Bridge Loop
Be careful to avoid bridge loops when you enable bridging in the ZyWALL. Bridge loops
cause broadcast traffic to circle the network endlessly, resulting in possible throughput
degradation and disruption of communications. The following example shows the network
topology that can lead to this problem:
• If your ZyWALL (in bridge mode) is connected to a wired LAN while communicating
with another bridge or a switch that is also connected to the same wired LAN as shown
next.
To prevent bridge loops, ensure that your ZyWALL is not set to bridge mode while connected
to two wired segments of the same LAN or you enable RSTP in the Bridge screen.
Rapid STP
The ZyWALL uses IEEE 802.1w RSTP (Rapid Spanning Tree Protocol) that allow faster
convergence of the spanning tree (while also being backwards compatible with STP-only
aware bridges). Using RSTP, topology change information does not have to propagate to the
root bridge and unwanted learned addresses are flushed from the filtering database. In RSTP,
the port states are Discarding, Learning, and Forwarding.
The radio buttons correspond to Ethernet ports on the front panel of the ZyWALL. On the
ZyWALL 70, ports 1 to 4 are all DMZ ports by default. On the ZyWALL 5 or ZyWALL 35,
ports 1 to 4 are all LAN ports by default.
After you change the LAN/DMZ/WLAN port roles and click Apply, please wait for few
seconds until the following screen appears. Click Return to go back to the Port Roles screen.
STP Terminology
The root bridge is the base of the spanning tree. Path cost is the cost of transmitting a frame
from the root bridge to that port. It is assigned according to the speed of the link to which a
port is attached. The slower the media, the higher the cost - see the next table.
Table 33 STP Path Costs
LINK RECOMMENDED RECOMMENDED ALLOWED
SPEED VALUE RANGE RANGE
Path Cost 4Mbps 250 100 to 1000 1 to 65535
Path Cost 10Mbps 100 50 to 600 1 to 65535
Path Cost 16Mbps 62 40 to 400 1 to 65535
Path Cost 100Mbps 19 10 to 60 1 to 65535
Path Cost 1Gbps 4 3 to 10 1 to 65535
Path Cost 10Gbps 2 1 to 5 1 to 65535
On each bridge, the root port is the port through which this bridge communicates with the root.
It is the port on this switch with the lowest path cost to the root (the root path cost). If there is
no root port, then this bridge has been accepted as the root bridge of the spanning tree network.
For each LAN segment, a designated bridge is selected. This bridge has the lowest cost to the
root among the bridges connected to the LAN.
9.1 Overview
This chapter discusses the ZyWALL’s WAN screens. Use these screens to configure your
ZyWALL for Internet access.
A WAN (Wide Area Network) connection is an outside connection to another network or the
Internet. It connects your private networks (such as a LAN (Local Area Network) and other
networks, so that a computer in one location can communicate with computers in other
locations.
The ZyWALL has a multiple WAN feature which enables you to connect up to two ISPs (or
networks). The ZyWALL 5 also supports a 3G WAN connection. You can configure the
distribution of traffic on the WAN connections using the load balancing settings.
You can have either a wired WAN connection with a 3G (WAN) connection or two wired
WAN connections as shown in the following figures.
ISP
LAN
WAN 1
3G
LAN
WAN 1 ISP 1
WAN 2
ISP 2
WAN IP Address
The WAN IP address is an IP address for the ZyWALL, which makes it accessible from an
outside network. It is used by the ZyWALL to communicate with other devices in other
networks. It can be static (fixed) or dynamically assigned by the ISP each time the ZyWALL
tries to access the Internet.
If your ISP assigns you a static WAN IP address, they should also assign you the subnet mask
and DNS server IP address(es) (and a gateway IP address if you use the Ethernet or ENET
ENCAP encapsulation method).
3G
3G (Third Generation) is a digital, packet-switched wireless technology. Bandwidth usage is
optimized as multiple users share the same channel and bandwidth is only allocated to users
when they send data. It allows fast transfer of voice and non-voice data and provides
broadband Internet access to mobile devices.
You can use policy routing to specify the WAN interface that specific services go through. An
ISP may give traffic from certain (more expensive) connections priority over the traffic from
other accounts. You could route delay intolerant traffic (like voice over IP calls) through this
kind of connection. Other traffic could be routed through a cheaper broadband Internet
connection that does not provide priority service. If one WAN interface's connection goes
down, the ZyWALL can automatically send its traffic through the other WAN interface. See
Chapter 24 on page 457 for details.
The ZyWALL's NAT feature allows you to configure sets of rules for one WAN interface and
separate sets of rules for the other WAN interface. Refer to Chapter 22 on page 435 for details.
You can select through which WAN interface you want to send out traffic from UPnP-enabled
applications (see Chapter 28 on page 519).
The ZyWALL's DDNS lets you select which WAN interface you want to use for each
individual domain name. The DDNS high availability feature lets you have the ZyWALL use
the other WAN interface for a domain name if the configured WAN interface's connection
goes down. See Section 26.1.2 on page 479 for details.
When configuring a VPN rule, you have the option of selecting one of the ZyWALL's domain
names in the My Address field.
Load Balancing
On the ZyWALL, load balancing is the process of dividing traffic loads between the two
WAN interfaces (or ports). This allows you to improve quality of services and maximize
bandwidth utilization.
See also policy routing to provide quality of service by dedicating a route for a specific traffic
type and bandwidth management to specify a set amount of bandwidth for a specific traffic
type on an interface.
The ZyWALL uses three load balancing methods (least load first, weighted round robin and
spillover) to decide which WAN interface the traffic for a session1 (from the LAN) uses.
The available bandwidth you configure on the ZyWALL refers to the actual bandwidth
provided by the ISP and the measured bandwidth refers to the bandwidth an interface is
currently using.
1. In the load balancing section, a session may refer to normal connection-oriented, UDP and SNMP2 traffic.
Lets say that you have the WAN operation mode set to active/passive, meaning the ZyWALL
uses the second highest priority WAN interface as a back up. The WAN 1 route has a metric of
"2", the WAN 2 route has a metric of "3", the traffic-redirect route has a metric of "14" and the
dial-backup route has a metric of "15". In this case, the WAN 1 route acts as the primary
default route. If the WAN 1 route fails to connect to the Internet, the ZyWALL tries the WAN
2 route next. If the WAN 2 route fails, the ZyWALL tries the traffic-redirect route. In the same
manner, the ZyWALL uses the dial-backup route if the traffic-redirect route also fails.
The dial-backup or traffic redirect routes cannot take priority over the WAN 1 and WAN 2
routes.
Internet
WAN 1 WAN 2
LAN
A C
1 LAN user A wants to download a file from a remote server on the Internet. The
ZyWALL is using active/active load balancing and sends the request to an update server
(B) through WAN 1.
2 Update server B sends a file list to LAN user A. The download address of the desired file
is a file server (C). At the same time, update server B informs file server C that a
computer located at the WAN 1’s IP address will download a file.
3 When LAN user A tries to retrieve the file from file server C, the request goes through
WAN 2.
File server C finds that the request comes from WAN 2’s IP address instead of WAN 1’s IP
address and rejects the request.
" WAN 2 refers to either the physical WAN 2 port on a ZyWALL with multiple
WAN ports or the 3G card on a single WAN ZyWALL in router mode.
If the outbound bandwidth utilization is used as the load balancing index and the measured
outbound throughput of WAN 1 is 412K and WAN 2 is 198K, the ZyWALL calculates the
load balancing index as shown in the table below.
Since WAN 2 has a smaller load balancing index (meaning that it is less utilized than WAN 1),
the ZyWALL will send the subsequent new session traffic through WAN 2.
Table 36 Least Load First: Example 1
OUTBOUND LOAD BALANCING INDEX
INTERFACE
AVAILABLE (A) MEASURED (M) (M/A)
Example 2
This example uses the same network scenario as in Figure 99 on page 177, but uses both the
outbound and inbound bandwidth utilization in calculating the load balancing index. If the
measured inbound stream throughput for both WAN 1 and WAN 2 is 1600K, the ZyWALL
calculates the average load balancing indices as shown in the table below.
Since WAN 1 has a smaller load balancing index (meaning that it is less utilized than WAN 2),
the ZyWALL will send the next new session traffic through WAN 1.
Table 37 Least Load First: Example 2
OUTBOUND INBOUND AVERAGE LOAD
INTERFACE BALANCING INDEX
AVAILABLE MEASURED AVAILABLE MEASURED (OM / OA + IM / IA) / 2
(OA) (OM) (IA) (IM)
WAN 1 512 K 412 K 8000 K 1600 K ( 0.8 + 0.2) / 2 = 0.5
WAN 2 256 K 198 K 2000 K 1600 K ( 0.77 + 0.8 ) / 2 = 0.79
To configure Least Load First, select Least Load First in the Load Balancing Algorithm
field.
To load balance using the weighted round robin method, select Weighted Round Robin in the
Load Balancing Algorithm field.
9.2.5 Spillover
With the spillover load balancing algorithm, the ZyWALL sends network traffic to the
primary interface until the maximum allowable load is reached, then the ZyWALL sends the
excess network traffic of new sessions to the secondary WAN interface. Configure the Route
Priority metrics in the WAN General screen to determine the primary and secondary WANs.
In cases where the primary WAN interface uses an unlimited access Internet connection and
the secondary WAN uses a per-use timed access plan, the ZyWALL will only use the
secondary WAN interface when the traffic load reaches the upper threshold on the primary
WAN interface. This allows you to fully utilize the bandwidth of the primary WAN interface
while avoiding overloading it and reducing Internet connection fees at the same time.
In the following example figure, the upper threshold of the primary WAN interface is set to
800K. The ZyWALL sends network traffic of a new session that exceeds this limit to the
secondary WAN interface.
To load balance using the spillover method, select Spillover in the Load Balancing
Algorithm field.
Configure the Route Priority metrics in the WAN General screen to determine the primary
and secondary WANs. By default, WAN 1 is the primary WAN and WAN 2 is the secondary
WAN.
" The WAN 1 and WAN 2 IP addresses of a ZyWALL with multiple WAN
interfaces must be on different subnets.
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the
ISP can provide you with the Internet addresses for your local networks. On the other hand, if
you are part of a much larger organization, you should consult your network administrator for
the appropriate IP addresses.
One of the benefits of PPPoE is the ability to let you access one of multiple network services,
a function known as dynamic service selection. This enables the service provider to easily
create and offer new IP services for individuals.
Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires
no specific configuration of the broadband modem at the customer site.
By implementing PPPoE directly on the ZyWALL (rather than individual computers), the
computers on the LAN do not need PPPoE software installed, since the ZyWALL does that
part of the task. Furthermore, with NAT, all of the LANs’ computers will have access.
The screen shown next is for PPPoE encapsulation.
" The actual data rate you obtain varies depending the 3G card you use, the
signal strength to the service provider’s base station, and so on.
If the signal strength of a 3G network is too low, the 3G card may switch to an available 2.5G
or 2.75G network. Refer to Section 9.8 on page 204 for a comparison between 2G, 2.5G,
2.75G and 3G wireless technologies.
" Turn the ZyWALL off before you install or remove the 3G card.
" The WAN 1 and WAN 2 IP addresses of a ZyWALL with multiple WAN
interfaces must be on different subnets.
To change your ZyWALL 5's 3G WAN settings, click NETWORK > WAN > 3G (WAN 2)
or NETWORK > WIRELESS > 3G (WAN2).
IP alias allows you to avoid triangle route security issues when the backup gateway is
connected to the LAN or DMZ. Use IP alias to configure the LAN into two or three logical
networks with the ZyWALL itself as the gateway for each LAN network. Put the protected
LAN in one subnet (Subnet 1 in the following figure) and the backup gateway in another
subnet (Subnet 2). Configure a LAN to LAN/ZyWALL firewall rule that forwards packets
from the protected LAN (Subnet 1) to the backup gateway (Subnet 2).
" For the ZyWALL 5, if the traffic redirect feature does not work after you
configure the ZyWALL’s traffic redirect settings in the Traffic Redirect screen,
you may need to turn on the WAN ping check by entering sys rn pingDrop
in the command interpreter. See the CLI Reference Guide.
AT Command Strings
For regular telephone lines, the default Dial string tells the modem that the line uses tone
dialing. ATDT is the command for a switch that requires tone dialing. If your switch requires
pulse dialing, change the string to ATDP.
For ISDN lines, there are many more protocols and operational modes. Please consult the
documentation of your TA. You may need additional commands in both Dial and Init strings.
DTR Signal
The majority of WAN devices default to hanging up the current call when the DTR (Data
Terminal Ready) signal is dropped by the DTE. When the Drop DTR When Hang Up check
box is selected, the ZyWALL uses this hardware signal to force the WAN device to hang up,
in addition to issuing the drop command ATH.
Response Strings
The response strings tell the ZyWALL the tags, or labels, immediately preceding the various
call parameters sent from the WAN device. The response strings have not been standardized;
please consult the documentation of your WAN device to find the correct tags.
" Consult the manual of your WAN device connected to your dial backup port for
specific AT commands.
Figure 113 NETWORK > WAN > Dial Backup > Edit
Table 48 NETWORK > WAN > Dial Backup > Edit (continued)
LABEL DESCRIPTION
Retry Interval Type a number of seconds for the ZyWALL to wait before trying another call after a
(sec) call has failed. This applies before a phone number is blacklisted.
Drop Timeout Type the number of seconds for the ZyWALL to wait before dropping the DTR
(sec) signal if it does not receive a positive disconnect confirmation.
Call Back Delay Type a number of seconds for the ZyWALL to wait between dropping a callback
(sec) request call and dialing the corresponding callback call.
Apply Click Apply to save your changes back to the ZyWALL.
Cancel Click Cancel to exit this screen without saving.
3G Comparison Table
See the following table for a comparison between 2G, 2.5G, 2.75G and 3G wireless
technologies.
Table 49 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies
MOBILE PHONE AND DATA STANDARDS DATA
NAME TYPE SPEED
GSM-BASED CDMA-BASED
2G Circuit- GSM (Global System for Mobile Interim Standard 95 (IS-95), the first Slow
switched Communications), Personal Handy- CDMA-based digital cellular standard
phone System (PHS), etc. pioneered by Qualcomm. The brand
name for IS-95 is cdmaOne. IS-95 is
also known as TIA-EIA-95.
2.5G Packet- GPRS (General Packet Radio CDMA2000 is a hybrid 2.5G / 3G
switched Services), High-Speed Circuit- protocol of mobile telecommunications
Switched Data (HSCSD), etc. standards that use CDMA, a multiple
access scheme for digital radio.
2.75G Packet- Enhanced Data rates for GSM
switched Evolution (EDGE), Enhanced GPRS CDMA2000 1xRTT (1 times Radio
(EGPRS), etc. Transmission Technology) is the core
CDMA2000 wireless air interface
standard. It is also known as 1x, 1xRTT,
or IS-2000 and considered to be a 2.5G
or 2.75G technology.
3G Packet- UMTS (Universal Mobile CDMA2000 EV-DO (Evolution-Data
switched Telecommunications System), a third- Optimized, originally 1x Evolution-Data
generation (3G) wireless standard Only), also referred to as EV-DO,
defined in ITUA specification, is EVDO, or just EV, is an evolution of
sometimes marketed as 3GSM. The CDMA2000 1xRTT and enables high-
UMTS uses GSM infrastructures and speed wireless connectivity. It is also
W-CDMA (Wideband Code Division denoted as IS-856 or High Data Rate
Multiple Access) as the air interface. (HDR).
3.5G Packet- HSDPA (High-Speed Downlink Packet
switched Access) is a mobile telephony
protocol, used for UMTS-based 3G
networks and allows for higher data
transfer speeds. Fast
A. The International Telecommunication Union (ITU) is an international organization within which governments and the private
sector coordinate global telecom networks and services.
10.1 Overview
The DeMilitarized Zone (DMZ) provides a way for public servers (Web, e-mail, FTP, etc.) to
be visible to the outside world (while still being protected from DoS (Denial of Service)
attacks such as SYN flooding and Ping of Death). These public servers can also still be
accessed from the secure LAN.
Internet
DMZ
LAN
DHCP
See Section 7.1.2 on page 150 for more information on DHCP.
Like the LAN, the ZyWALL can also assign TCP/IP configuration via DHCP to computers
connected to the DMZ ports.
IP alias
See Section 7.4 on page 156 for more information on IP alias.
Port roles
See Section 7.5 on page 158 for more information on port roles.
Note: Make sure the IP addresses of the LAN, WAN, WLAN and
DMZ are on separate subnets.
IP Subnet Mask The subnet mask specifies the network number portion of an IP address. Your
ZyWALL will automatically calculate the subnet mask based on the IP address
that you assign. Unless you are implementing subnetting, use the subnet mask
computed by the ZyWALL 255.255.255.0.
RIP Direction RIP (Routing Information Protocol, RFC1058 and RFC 1389) allows a router to
exchange routing information with other routers. The RIP Direction field controls
the sending and receiving of RIP packets. Select the RIP direction from Both/In
Only/Out Only/None. When set to Both or Out Only, the ZyWALL will
broadcast its routing table periodically. When set to Both or In Only, it will
incorporate the RIP information that it receives; when set to None, it will not send
any RIP packets and will ignore any RIP packets received. Both is the default.
" Make sure that the subnets of the logical networks do not overlap.
To change your ZyWALL’s IP alias settings, click NETWORK > DMZ > IP Alias. The
screen appears as shown.
Note: Make sure the IP addresses of the LAN, WAN, WLAN and
DMZ are on separate subnets.
IP Subnet Mask Your ZyWALL will automatically calculate the subnet mask based on the IP
address that you assign. Unless you are implementing subnetting, use the subnet
mask computed by the ZyWALL.
RIP Direction RIP (Routing Information Protocol, RFC1058 and RFC 1389) allows a router to
exchange routing information with other routers. The RIP Direction field controls
the sending and receiving of RIP packets. Select the RIP direction from Both/In
Only/Out Only/None. When set to Both or Out Only, the ZyWALL will broadcast
its routing table periodically. When set to Both or In Only, it will incorporate the
RIP information that it receives; when set to None, it will not send any RIP packets
and will ignore any RIP packets received.
RIP Version The RIP Version field controls the format and the broadcasting method of the RIP
packets that the ZyWALL sends (it recognizes both formats when receiving). RIP-
1 is universally supported but RIP-2 carries more information. RIP-1 is probably
adequate for most networks, unless you have an unusual network topology. Both
RIP-2B and RIP-2M sends the routing data in RIP-2 format; the difference being
that RIP-2B uses subnet broadcasting while RIP-2M uses multicasting.
Multicasting can reduce the load on non-router machines since they generally do
not listen to the RIP multicast address and so will not receive the RIP packets.
However, if one router uses multicasting, then all routers on your network must
use multicasting, also. By default, RIP direction is set to Both and the Version set
to RIP-1.
" Your changes are also reflected in the LAN and/or WLAN Port Roles
screens.
11.1 Overview
A wireless LAN can be as simple as two computers with wireless LAN adapters
communicating in a peer-to-peer network or as complex as a number of computers with
wireless LAN adapters communicating through access points which bridge network traffic to
the wired LAN.
To add a wireless network to the ZyWALL, install a wireless card or connect a wireless device
such as an Access Point to one of the ZyWALL's Ethernet ports. This chapter describes
configuring one (or more) of the ZyWALL's Ethernet ports to use as a separate network for
connecting wireless devices. See Section 12.2 on page 232 for information on configuring
wireless LAN settings for a wireless card installed in the ZyWALL.
The following diagram shows the ZyWALL connecting to a wireless LAN through an AP.
• Use the Port Roles screen (Section 11.5 on page 226) to set a port to be part of the WLAN
and connect an Access Point (AP) to the WLAN interface to extend the ZyWALL’s
wireless LAN coverage.
IP alias
See Section 7.4 on page 156 for more information on IP alias.
Port roles
See Section 7.5 on page 158 for more information on port roles.
" Turn the ZyWALL off before you install or remove the wireless LAN card. See
the product specifications chapter for a table of compatible ZyXEL WLAN
cards (and the WLAN security features each card supports) and how to install
a WLAN card.
Insert a compatible wireless LAN card and enable the card in the WIRELESS > Wi-Fi screen
(see Figure 130 on page 232).
Click NETWORK > WLAN to open the WLAN screen to configure the IP address for the
ZyWALL’s WLAN interface, other TCP/IP and DHCP settings.
Note: Make sure the IP addresses of the LAN, WAN, WLAN and
DMZ are on separate subnets.
IP Subnet Mask The subnet mask specifies the network number portion of an IP address. Your
ZyWALL automatically calculates the subnet mask based on the IP address that
you assign. Unless you are implementing subnetting, use the subnet mask
computed by the ZyWALL.
RIP Direction RIP (Routing Information Protocol, RFC1058 and RFC 1389) allows a router to
exchange routing information with other routers. The RIP Direction field controls
the sending and receiving of RIP packets. Select the RIP direction from Both/In
Only/Out Only/None. When set to Both or Out Only, the ZyWALL will broadcast
its routing table periodically. When set to Both or In Only, it will incorporate the
RIP information that it receives; when set to None, it will not send any RIP packets
and will ignore any RIP packets received. Both is the default.
" Make sure that the subnets of the logical networks do not overlap.
To change your ZyWALL’s IP alias settings, click NETWORK > WLAN > IP Alias. The
screen appears as shown.
See Section 7.5 on page 158 for more information on port roles.
To change your ZyWALL’s port role settings, click NETWORK > WLAN > Port Roles. The
screen appears as shown.
The radio buttons correspond to Ethernet ports on the front panel of the ZyWALL. On the
ZyWALL 70, ports 1 to 4 are all DMZ ports by default. On the ZyWALL 5 or ZyWALL 35,
ports 1 to 4 are all LAN ports by default.
" Your changes are also reflected in the LAN and/or DMZ Port Roles screen.
After you change the LAN/DMZ/WLAN port roles and click Apply, please wait for few
seconds until the following screen appears. Click Return to go back to the Port Roles screen.
Figure 127 NETWORK > WLAN > Port Roles: Change Complete
12.1 Overview
In this section you can enable your wireless card and configure wireless security. You can
configure the ZyWALL to use data encryption and user authentication methods to help protect
data transmitted on your network and to ensure only devices with permission to access your
network can do so.
The following diagram shows authenticated wireless devices transmitting encrypted data on a
wireless network which an unauthenticated device cannot access.
The figure below shows the possible wireless security levels on your ZyWALL.
If you do not enable any wireless security on your ZyWALL, your network is accessible to any
wireless networking device that is within range.
ESSID
ESSID (Extended Service Set IDentity) identifies the Service Set with which a wireless station
is associated. If you hide the ESSID, then the ZyWALL cannot be seen when a wireless client
scans for local APs. The trade-off for the extra security of “hiding” the ZyWALL may be
inconvenience for some valid WLAN clients.
WEP Encryption
WEP (Wired Equivalent Privacy) as specified in the IEEE 802.11 standard provides methods
for both data encryption and wireless station authentication. WEP provides a mechanism for
encrypting data using encryption keys. Both the AP and the wireless stations must use the
same WEP key to encrypt and decrypt data. Your ZyWALL allows you to configure up to four
64-bit or 128-bit WEP keys, but only one key can be used at any one time.
IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management. Authentication can be done using the local
user database internal to the ZyWALL (authenticate up to 32 users) or an external RADIUS
server for an unlimited number of users.
To use 802.1x you need the following.
• A computer with an IEEE 802.11b wireless LAN card.
• A computer equipped with a web browser (with JavaScript enabled) and/or Telnet.
• A wireless station must be running IEEE 802.1x-compliant software. Currently, this is
offered in Windows XP.
• An optional network RADIUS server for remote user authentication and accounting.
EAP Authentication
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, the access point helps a
wireless station and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server or the AP.
Your ZyWALL supports EAP-MD5 (Message-Digest Algorithm 5) with the local user
database.
RADIUS
A RADIUS (Remote Authentication Dial In User Service) server enables user authentication,
authorization and accounting. RADIUS is based on a client-sever model that supports
authentication and accounting, where the access point is the client and the server is the
RADIUS server. The RADIUS server handles the following tasks among others:
• Authentication
Determines the identity of the users.
• Accounting
Keeps track of the client’s network activity.
WPA
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences
between WPA and WEP are user authentication and improved data encryption.
" Turn the ZyWALL off before you install or remove the wireless LAN card. See
the product specifications chapter for a list of compatible ZyXEL WLAN cards
(and the WLAN security features each card supports) and how to install a
WLAN card.
" You can install either a ZyWALL Turbo Card or a wireless card or a 3G card,
but not both at the same time. When you have a wireless card or 3G card
installed, you cannot use the anti-virus and IDP features.
If you are configuring the ZyWALL from a computer connected to the wireless LAN and you
change the ZyWALL’s ESSID or security settings, you will lose your wireless connection
when you press Apply to confirm. You must then change the wireless settings of your
computer to match the ZyWALL’s new settings.
Click WIRELESS > Wi-Fi > Wireless Card to open the Wireless Card screen. The screen
varies according to the security features you select.
Note: If you set the wireless card to be part of the LAN or DMZ, you
can still use wireless access. The firewall will treat the wireless
card as part of the LAN or DMZ respectively.
Hide ESSID Select this to hide the ESSID in the outgoing beacon frame so a station cannot obtain
the ESSID through scanning.
Channel ID This allows you to set the operating frequency/channel depending on your particular
region. Select a channel from the drop-down list box.
RTS/CTS Use RTS/CTS to reduce data collisions on the wireless network if you have wireless
Threshold clients that are associated with the same AP but out of range of one another. When
enabled, a wireless client sends an RTS (Request To Send) and then waits for a CTS
(Clear To Send) before it transmits. This stops wireless clients from transmitting
packets at the same time (and causing data collisions).
A wireless client sends an RTS for all packets larger than the number (of bytes) that
you enter here. Set the RTS/CTS equal to or higher than the fragmentation threshold
to turn RTS/CTS off.
Fragmentatio This is the threshold (number of bytes) for the fragmentation boundary for directed
n Threshold messages. It is the maximum data fragment size that can be sent.
Note: The installed ZyXEL WLAN card may not support all of the
WLAN security features you can configure in the ZyWALL.
Figure 131 WIRELESS > Wi-Fi > Wireless Card: Static WEP
The following table describes the wireless LAN security labels in this screen.
Table 59 WIRELESS > Wi-Fi > Wireless Card: Static WEP
LABEL DESCRIPTION
Security Select Static WEP from the drop-down list.
WEP WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized
Encryption wireless stations from accessing data transmitted over the wireless network.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Key 1 to Key 4 If you chose 64-bit WEP in the WEP Encryption field, then enter any 5 characters
(ASCII string) or 10 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
If you chose 128-bit WEP in the WEP Encryption field, then enter 13 characters
(ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
There are four data encryption keys to secure your data from eavesdropping by
unauthorized wireless users. The values for the keys must be set up exactly the same
on the access points as they are on the wireless stations.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
12.2.2 WPA-PSK
Click WIRELESS > Wi-Fi > Wireless Card to display the Wireless Card screen. Select
WPA-PSK from the Security list.
The following wireless LAN security fields become available when you select WPA-PSK in
the Security drop down list-box.
Table 60 WIRELESS > Wi-Fi > Wireless Card: WPA-PSK
LABEL DESCRIPTION
Security Select WPA-PSK from the drop-down list.
Pre-Shared Key The encryption mechanisms used for WPA and WPA-PSK are the same. The only
difference between the two is that WPA-PSK uses a simple common password,
instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
ReAuthentication Specify how often wireless stations have to resend user names and passwords in
Timer (Seconds) order to stay connected. Enter a time interval between 10 and 65535 seconds.
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Idle Timeout The ZyWALL automatically disconnects a wireless station from the wireless
(Seconds) network after a period of inactivity. The wireless station needs to send the
username and password again before it can use the wireless network again. Some
wireless clients may prompt users for a username and password; other clients may
use saved login credentials. In either case, there is usually a short delay while the
wireless client logs in to the wireless network again.
This value is usually smaller when the wireless network is keeping track of how
much time each wireless station is connected to the wireless network (for example,
using an authentication server). If the wireless network is not keeping track of this
information, you can usually set this value higher to reduce the number of delays
caused by logging in again.
WPA Group Key The WPA Group Key Update Timer is the rate at which the AP (if using WPA-
Update Timer PSK key management) or RADIUS server (if using WPA key management) sends
(Seconds) a new group key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the WEP key for an AP and all stations in a WLAN on a
periodic basis. Setting of the WPA Group Key Update Timer is also supported in
WPA-PSK mode.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
12.2.3 WPA
Click WIRELESS > Wi-Fi > Wireless Card to display the Wireless Card screen. Select
WPA from the Security list.
The following wireless LAN security fields become available when you select WPA in the
Security drop down list-box.
Table 61 WIRELESS > Wi-Fi > Wireless Card: WPA
LABEL DESCRIPTION
Security Select WPA from the drop-down list.
ReAuthentication Specify how often wireless stations have to resend user names and passwords in
Timer (Seconds) order to stay connected. Enter a time interval between 10 and 65535 seconds.
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Idle Timeout The ZyWALL automatically disconnects a wireless station from the wireless
(Seconds) network after a period of inactivity. The wireless station needs to send the
username and password again before it can use the wireless network again. Some
wireless clients may prompt users for a username and password; other clients may
use saved login credentials. In either case, there is usually a short delay while the
wireless client logs in to the wireless network again.
This value is usually smaller when the wireless network is keeping track of how
much time each wireless station is connected to the wireless network (for example,
using an authentication server). If the wireless network is not keeping track of this
information, you can usually set this value higher to reduce the number of delays
caused by logging in again.
Authentication Click RADIUS to go to the RADIUS screen where you can configure the ZyWALL
Databases to check an external RADIUS server.
WPA Group Key The WPA Group Key Update Timer is the rate at which the AP (if using WPA-
Update Timer PSK key management) or RADIUS server (if using WPA key management) sends
(Seconds) a new group key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the WEP key for an AP and all stations in a WLAN on a
periodic basis. Setting of the WPA Group Key Update Timer is also supported in
WPA-PSK mode.
Figure 134 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP
The following wireless LAN security fields become available when you select 802.1x +
Dynamic WEP in the Security drop down list-box.
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP
LABEL DESCRIPTION
Security Select 802.1x + Dynamic WEP from the drop-down list.
ReAuthentication Specify how often wireless stations have to resend user names and passwords in
Timer (Seconds) order to stay connected. Enter a time interval between 10 and 65535 seconds.
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Idle Timeout The ZyWALL automatically disconnects a wireless station from the wireless
(Seconds) network after a period of inactivity. The wireless station needs to send the
username and password again before it can use the wireless network again. Some
wireless clients may prompt users for a username and password; other clients may
use saved login credentials. In either case, there is usually a short delay while the
wireless client logs in to the wireless network again.
This value is usually smaller when the wireless network is keeping track of how
much time each wireless station is connected to the wireless network (for example,
using an authentication server). If the wireless network is not keeping track of this
information, you can usually set this value higher to reduce the number of delays
caused by logging in again.
Table 62 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Dynamic WEP
LABEL DESCRIPTION
Authentication Click RADIUS to go to the RADIUS screen where you can configure the ZyWALL
Databases to check an external RADIUS server.
Dynamic WEP Select 64-bit WEP or 128-bit WEP to enable data encryption.
Key Exchange
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
Figure 135 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP
The following wireless LAN security fields become available when you select 802.1x + Static
WEP in the Security drop down list-box.
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP
LABEL DESCRIPTION
Security Select 802.1x + Static WEP from the drop-down list.
WEP Encryption WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized
wireless stations from accessing data transmitted over the wireless network.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Table 63 WIRELESS > Wi-Fi > Wireless Card: 802.1x + Static WEP (continued)
LABEL DESCRIPTION
Key 1 to Key 4 If you chose 64-bit WEP in the WEP Encryption field, then enter any 5 characters
(ASCII string) or 10 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
If you chose 128-bit WEP in the WEP Encryption field, then enter 13 characters
(ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
There are four data encryption keys to secure your data from eavesdropping by
unauthorized wireless users. The values for the keys must be set up exactly the
same on the access points as they are on the wireless stations.
ReAuthenticatio Specify how often wireless stations have to resend user names and passwords in
n Timer order to stay connected. Enter a time interval between 10 and 65535 seconds.
(Seconds) If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Idle Timeout The ZyWALL automatically disconnects a wireless station from the wireless network
(Seconds) after a period of inactivity. The wireless station needs to send the username and
password again before it can use the wireless network again. Some wireless clients
may prompt users for a username and password; other clients may use saved login
credentials. In either case, there is usually a short delay while the wireless client
logs in to the wireless network again.
This value is usually smaller when the wireless network is keeping track of how
much time each wireless station is connected to the wireless network (for example,
using an authentication server). If the wireless network is not keeping track of this
information, you can usually set this value higher to reduce the number of delays
caused by logging in again.
Authentication Click Local User to go to the Local User Database screen where you can view
Databases and/or edit the list of users and passwords. Click RADIUS to go to the RADIUS
screen where you can configure the ZyWALL to check an external RADIUS server.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
Figure 136 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP
The following wireless LAN security fields become available when you select 802.1x + No
WEP in the Security drop down list-box.
Table 64 WIRELESS > Wi-Fi > Wireless Card: 802.1x + No WEP
LABEL DESCRIPTION
Security Select 802.1x + No WEP from the drop-down list.
ReAuthenticatio Specify how often wireless stations have to resend user names and passwords in
n Timer order to stay connected. Enter a time interval between 10 and 65535 seconds.
(Seconds) If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Idle Timeout The ZyWALL automatically disconnects a wireless station from the wireless network
(Seconds) after a period of inactivity. The wireless station needs to send the username and
password again before it can use the wireless network again. Some wireless clients
may prompt users for a username and password; other clients may use saved login
credentials. In either case, there is usually a short delay while the wireless client
logs in to the wireless network again.
This value is usually smaller when the wireless network is keeping track of how
much time each wireless station is connected to the wireless network (for example,
using an authentication server). If the wireless network is not keeping track of this
information, you can usually set this value higher to reduce the number of delays
caused by logging in again.
Authentication Click Local User to go to the Local User Database screen where you can view
Databases and/or edit the list of users and passwords. Click RADIUS to go to the RADIUS
screen where you can configure the ZyWALL to check an external RADIUS server.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
Figure 137 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP
The following wireless LAN security fields become available when you select No Access
802.1x + Static WEP in the Security drop down list-box.
Table 65 WIRELESS > Wi-Fi > Wireless Card: No Access 802.1x + Static WEP
LABEL DESCRIPTION
Security Select No Access 802.1x + Static WEP from the drop-down list.
WEP WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized
Encryption wireless stations from accessing data transmitted over the wireless network.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Key 1 to Key 4 If you chose 64-bit WEP in the WEP Encryption field, then enter any 5 characters
(ASCII string) or 10 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
If you chose 128-bit WEP in the WEP Encryption field, then enter 13 characters
(ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
There are four data encryption keys to secure your data from eavesdropping by
unauthorized wireless users. The values for the keys must be set up exactly the same
on the access points as they are on the wireless stations.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
IRADIUS
RADIUS user is a simple package exchange in which your ZyWALL acts as a message relay
between the wireless station and the network RADIUS server. See RFC 2138 and RFC 2139
for more on RADIUS.
EAP Authentication
The following figure shows an overview of authentication when you specify a RADIUS server
on your access point.
The details below provide a general description of how IEEE 802.1x EAP authentication
works.
• The wireless station sends a start message to the ZyWALL.
• The ZyWALL sends a request identity message to the wireless station for identity
information.
• The wireless station replies with identity information, including user name and password.
• The RADIUS server checks the user information against its user profile database and
determines whether or not to authenticate the wireless station.
WPA
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. Key differences
between WPA and WEP are user authentication and improved data encryption.
User Authentication
WPA applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate
wireless clients using an external RADIUS database.
Encryption
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message
Integrity Check (MIC) and IEEE 802.1x.
Temporal Key Integrity Protocol (TKIP) uses 128-bit keys that are dynamically generated and
distributed by the authentication server. It includes a per-packet key mixing function, a
Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with
sequencing rules, and a re-keying mechanism.
TKIP regularly changes and rotates the encryption keys so that the same encryption key is
never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP
that then sets up a key hierarchy and management system, using the pair-wise key to
dynamically generate unique data encryption keys to encrypt every data packet that is
wirelessly communicated between the AP and the wireless clients. This all happens in the
background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data
packets, altering them and resending them. The MIC provides a strong mathematical function
in which the receiver and the transmitter each compute and then compare the MIC. If they do
not match, it is assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), TKIP makes it much more difficult to decode data on a Wi-Fi
network than WEP, making it difficult for an intruder to break into the network.
The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference
between the two is that WPA-PSK uses a simple common password, instead of user-specific
credentials. The common-password approach makes WPA-PSK susceptible to brute-force
password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-
use, consistent, single, alphanumeric password.
WPA-PSK Application
A WPA-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters (including spaces and
symbols).
2 The AP checks each client's password and (only) allows it to join the network if it
matches its password.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP encryption process to encrypt data exchanged
between them.
2 The RADIUS server then checks the user's identification against its database and grants
or denies network access accordingly.
3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then
sets up a key hierarchy and management system, using the pair-wise key to dynamically
generate unique data encryption keys to encrypt every data packet that is wirelessly
communicated between the AP and the wireless clients.
249
250
CHAPTER 13
Firewall Screens
This chapter shows you how to configure your ZyWALL’s firewall.
13.1 Overview
A firewall is a system that enforces an access-control policy between two networks. It is
generally a mechanism used to protect a trusted network from an untrusted network.
The ZyWALL physically separates the LAN, DMZ, WLAN and the WAN and acts as a secure
gateway for all data passing between the networks. The ZyWALL protects against Denial of
Service (DoS) attacks, prevents theft, destruction and modification of data, and logs events.
Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and
control access between the LAN, DMZ, WLAN and WAN. By default the firewall:
• allows traffic that originates from your LAN computers to go to all of the networks.
• blocks traffic that originates on the other networks from going to the LAN.
• allows traffic that originates on the WLAN to go to the WAN.
• allows traffic that originates on the WAN to go to the DMZ and protects your DMZ
computers against DoS attacks.
• allows VPN traffic between any of the networks.
The following figure illustrates the default firewall action. User A can initiate an IM (Instant
Messaging) session from the LAN to the WAN (1). Return traffic for this session is also
allowed (2). However other traffic initiated from the WAN is blocked (3 and 4).
Your customized rules take precedence and override the ZyWALL’s default settings. The
ZyWALL checks the source IP address, destination IP address and IP protocol type of network
traffic against the firewall rules (in the order you list them). When the traffic matches a rule,
the ZyWALL takes the action specified in the rule.
Asymmetrical Routes
Asymmetrical routes only apply if you have another gateway on your LAN, the ZyWALL is in
Router mode, and the firewall is enabled. If return traffic is routed through the LAN gateway
(instead of the ZyWALL), then the ZyWALL may reset the ‘incomplete’ connection. When
you enable asymmetrical routes, interface to same interface (for example WAN 1 to WAN 1,
VPN to VPN and so on) traffic is not checked by the firewall. See Asymmetrical Routes and
IP Alias on page 274 for information on how to use IP alias instead of asymmetrical routes.
• The first row blocks LAN access to the IRC service on the WAN.
• The second row is the firewall’s default policy that allows all traffic from the LAN to go to
the WAN.
The ZyWALL applies the firewall rules in order. So for this example, when the ZyWALL
receives traffic from the LAN, it checks it against the first rule. If the traffic matches (if it is
IRC traffic) the firewall takes the action in the rule (drop) and stops checking the firewall
rules. Any traffic that does not match the first firewall rule will match the default rule and the
ZyWALL forwards it.
Now suppose that your company wants to let the CEO use IRC. You can configure a LAN to
WAN firewall rule that allows IRC traffic from the IP address of the CEO’s computer. In order
to make sure that the CEO’s computer always uses the same IP address, make sure it either:
• has a static IP address,
• or you configure a static DHCP entry for it so the ZyWALL always assigns it the same IP
address (see Section 7.3 on page 155 for information on static DHCP).
Now you configure a LAN to WAN firewall rule that allows IRC traffic from the IP address of
the CEO’s computer (192.168.1.7 for example) to go to any destination address. You do not
need to specify a schedule since you want the firewall rule to always be in effect. The
following figure shows the results of your two custom rules.
• The first row allows the LAN computer at IP address 192.168.1.7 to access the IRC
service on the WAN.
• The second row blocks LAN access to the IRC service on the WAN.
• The third row is (still) the firewall’s default policy of allowing all traffic from the LAN to
go to the WAN.
The rule for the CEO must come before the rule that blocks all LAN to WAN IRC traffic. If
the rule that blocks all LAN to WAN IRC traffic came first, the CEO’s IRC traffic would
match that rule and the ZyWALL would drop it and not check any other firewall rules.
Figure 145 SECURITY > FIREWALL > Default Rule (Router Mode)
Note: When you activate the firewall, all current connections through
the ZyWALL are dropped when you apply your changes.
Allow If an alternate gateway on the LAN has an IP address in the same subnet as the
Asymmetrical ZyWALL’s LAN IP address, return traffic may not go through the ZyWALL. This is
Route called an asymmetrical or “triangle” route. This causes the ZyWALL to reset the
connection, as the connection has not been acknowledged.
Select this check box to have the ZyWALL permit the use of asymmetrical route
topology on the network (not reset the connection).
Note: Allowing asymmetrical routes may let traffic from the WAN go
directly to the LAN without passing through the ZyWALL. A
better solution is to use IP alias to put the ZyWALL and the
backup gateway on separate subnets. See Section 13.9 on
page 271 for an example.
Table 69 SECURITY > FIREWALL > Default Rule (Router Mode) (continued)
LABEL DESCRIPTION
From, To The firewall rules are grouped by the direction of packet travel. The number of rules
for each packet direction displays. Click Edit to go to a summary screen of the rules
for that packet direction.
Here are some example descriptions of the directions of travel.
From LAN To LAN means packets traveling from a computer on one LAN subnet to
a computer on another LAN subnet on the LAN interface of the ZyWALL or the
ZyWALL itself. The ZyWALL does not apply the firewall to packets traveling from a
LAN computer to another LAN computer on the same subnet.
From VPN means traffic that came into the ZyWALL through a VPN tunnel and is
going to the selected “to” interface. For example, From VPN To LAN specifies the
VPN traffic that is going to the LAN. The ZyWALL applies the firewall to the traffic
after decrypting it.
To VPN is traffic that comes in through the selected “from” interface and goes out
through any VPN tunnel. For example, From LAN To VPN specifies the traffic that
is coming from the LAN and going out through a VPN tunnel. The ZyWALL applies
the firewall to the traffic before encrypting it.
From VPN To VPN means traffic that comes in through a VPN tunnel and goes out
through (another) VPN tunnel or terminates at the ZyWALL. This is the case when
the ZyWALL is the hub in a hub-and-spoke VPN. This is also the case if you allow
someone to use a service (like Telnet or HTTP) through a VPN tunnel to manage
the ZyWALL. The ZyWALL applies the firewall to the traffic after decrypting it.
Use the drop-down list box to set the firewall’s default actions based on the direction
of travel of packets.
Select Drop to silently discard the packets without sending a TCP reset packet or
an ICMP destination-unreachable message to the sender.
Select Reject to deny the packets and send a TCP reset packet (for a TCP packet)
or an ICMP destination-unreachable message (for a UDP packet) to the sender.
Select Permit to allow the passage of the packets.
The firewall rules for the WAN port with a higher route priority also apply to the dial
backup connection.
Log Select the check box next to a direction of packet travel to create a log when the
configured action is taken for packets that are traveling in that direction and do not
match any of your customized rules.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
Figure 146 SECURITY > FIREWALL > Default Rule (Bridge Mode)
Note: When you activate the firewall, all current connections through
the ZyWALL are dropped when you apply your changes.
Table 70 SECURITY > FIREWALL > Default Rule (Bridge Mode) (continued)
LABEL DESCRIPTION
From, To The firewall rules are grouped by the direction of packet travel. The number of rules
for each packet direction displays. Click Edit to go to a summary screen of the rules
for that packet direction.
Here are some example descriptions of the directions of travel.
From LAN To LAN means packets traveling from a computer on one LAN subnet to
a computer on another LAN subnet on the LAN interface of the ZyWALL or the
ZyWALL itself. The ZyWALL does not apply the firewall to packets traveling from a
LAN computer to another LAN computer on the same subnet.
From VPN means traffic that came into the ZyWALL through a VPN tunnel and is
going to the selected “to” interface. For example, From VPN To LAN specifies the
VPN traffic that is going to the LAN. The ZyWALL applies the firewall to the traffic
after decrypting it.
To VPN is traffic that comes in through the selected “from” interface and goes out
through any VPN tunnel. For example, From LAN To VPN specifies the traffic that
is coming from the LAN and going out through a VPN tunnel. The ZyWALL applies
the firewall to the traffic before encrypting it.
From VPN To VPN means traffic that comes in through a VPN tunnel and goes out
through (another) VPN tunnel or terminates at the ZyWALL. This is the case when
the ZyWALL is the hub in a hub-and-spoke VPN. This is also the case if you allow
someone to use a service (like Telnet or HTTP) through a VPN tunnel to manage
the ZyWALL. The ZyWALL applies the firewall to the traffic after decrypting it.
Use the drop-down list box to set the firewall’s default actions based on the direction
of travel of packets.
Select Drop to silently discard the packets without sending a TCP reset packet or
an ICMP destination-unreachable message to the sender.
Select Reject to deny the packets and send a TCP reset packet (for a TCP packet)
or an ICMP destination-unreachable message (for a UDP packet) to the sender.
Select Permit to allow the passage of the packets.
The firewall rules for the WAN port with a higher route priority also apply to the dial
backup connection.
Log Select the check box next to a direction of packet travel to create a log when the
configured action is taken for packets that are traveling in that direction and do not
match any of your customized rules.
Log Broadcast Select this to create a log for any broadcast frames traveling in the selected
Frame (Bridge direction. Many of these logs in a short time period could indicate a broadcast storm.
mode only) A broadcast storm occurs when a packet triggers multiple responses from all hosts
on a network or when computers attempt to respond to a host that never replies. As
a result, duplicated packets are continuously created and circulated in the network,
thus reducing network performance or even rendering it inoperable. A broadcast
storm can be caused by an attack on the network, an incorrect network topology
(such as a bridge loop) or a malfunctioning network device.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
" The ordering of your rules is very important as rules are applied in the order
that they are listed.
See Section 13.1 on page 251 for more information about the firewall.
Figure 148 SECURITY > FIREWALL > Rule Summary > Edit
Note: You also need to configure NAT port forwarding (or full
featured NAT address mapping rules) if you want to allow
computers on the WAN to access devices on the LAN.
3 Click Rule Summary. Select WAN1 to LAN from the Packet Direction drop-down list
boxes and click Refresh.
4 In the Rule Summary screen, type the index number for where you want to put the rule.
For example, if you type 6, your new rule becomes number 6 and the previous rule 6 (if
there is one) becomes rule 7.
5 Click Insert at the top of the Modify column to display the firewall rule configuration
screen.
9 In the Edit Rule screen, use the arrows between Available Services and Selected
Service(s) to configure it as follows. Click Apply when you are done.
" Custom services show up with an * before their names in the Services list box
and the Rule Summary list box.
Rule 1 allows a My Service connection from the WAN to IP addresses 10.0.0.10 through
10.0.0.15 on the LAN.
• LAN to LAN These rules specify which computers on the LAN can manage the
ZyWALL (remote management) and communicate between networks or
subnets connected to the LAN interface (IP alias).
• WAN 1 to LAN These rules specify which computers connected to WAN 1 can access
which computers or services on the LAN. For example, you may
create rules to:
• Allow certain types of traffic, such as Lotus Notes database
synchronization, from specific hosts on the Internet to specific
hosts on the LAN.
• Allow public access to a Web server on your protected network.
You could also block certain IP addresses from accessing it.
Note: You also need to configure NAT port forwarding (or full
featured NAT address mapping rules) to allow computers
on the WAN to access devices on the LAN. See Section
22.4.3 on page 442 for an example.
See Chapter 5 on page 109 for information about packets traveling to or from the VPN tunnels.
If an alternate gateway on the LAN has an IP address in the same subnet as the ZyWALL’s
LAN IP address, return traffic may not go through the ZyWALL. This is called an
asymmetrical or “triangle” route. This causes the ZyWALL to reset the connection, as the
connection has not been acknowledged.
You can have the ZyWALL permit the use of asymmetrical route topology on the network
(not reset the connection).
Allowing asymmetrical routes may let traffic from the WAN go directly to the LAN without
passing through the ZyWALL. A better solution is to use IP alias to put the ZyWALL and the
backup gateway on separate subnets.
DoS Thresholds
For TCP, half-open means that the session has not reached the established state-the TCP three-
way handshake has not yet been completed. Under normal circumstances, the application that
initiates a session sends a SYN (synchronize) packet to the receiving server. The receiver
sends back an ACK (acknowledgment) packet and its own SYN, and then the initiator
responds with an ACK (acknowledgment). After this handshake, a connection is established.
For UDP, half-open means that the firewall has detected no return traffic. An unusually high
number (or arrival rate) of half-open sessions could indicate a DOS attack.
Threshold Values
If everything is working properly, you probably do not need to change the threshold settings as
the default threshold values should work for most small offices. Tune these parameters when
you believe the ZyWALL has been receiving DoS attacks that are not recorded in the logs or
the logs show that the ZyWALL is classifying normal traffic as DoS attacks. Factors
influencing choices for threshold values are:
Security Considerations
" Incorrectly configuring the firewall may block valid access or introduce security
risks to the ZyWALL and your protected network. Use caution when creating or
deleting firewall rules and test your rules after you configure them.
14.1 Overview
An IDP system can detect malicious or suspicious packets and respond instantaneously. It can
detect anomalies based on violations of protocol standards (RFCs – Requests for Comments)
or traffic flows and abnormal flows such as port scans.
The following figure represents a typical business network consisting of a LAN, a DMZ
(DeMilitarized Zone) containing the company web, FTP, mail servers etc., a firewall and/or
NAT router connected to a broadband modem (M) for Internet access.
• Use the Update screen (Section 14.5 on page 291) to immediately download or schedule
new signature downloads.
• Use the Backup & Restore screen (Section 14.6 on page 293) to back up IDP signatures
with your custom configured settings, restore previously saved IDP signatures (with your
custom configured settings) or revert to the original ZSRT-defined signature Active, Log,
Alert and/or Action settings.
Network Intrusions
The ZyWALL Internet Security Appliance is designed to protect against network-based
intrusions. Network-based intrusions have the goal of bringing down a network or networks by
attacking computer(s), switch(es), router(s) or modem(s). If a LAN switch is compromised for
example, then the whole LAN is compromised (see Figure 164 on page 277). Typical
“network-based intrusions” are SQL slammer, Blaster, Nimda, MyDoom etc.
See Section 14.2 on page 279 for more information on how to apply IDP to ZyWALL
interfaces.
" Turn the ZyWALL off before you install or remove the ZyWALL Turbo card.
Note: You cannot configure and save the IDP and Anti-Virus
screens if the ZyWALL Turbo Card is not installed.
From, To Select the directions of travel of packets that you want to check. Select or clear
a row or column’s first check box (with the interface label) to select or clear the
interface’s whole row or column.
You could for example have the ZyWALL check packets traveling between the
LAN and the WAN interfaces (From WAN1 to LAN, From WAN2 to LAN, From
LAN To WAN1, and From LAN To WAN2).
From LAN To LAN means packets traveling from a computer on one LAN
subnet to a computer on another LAN subnet via the LAN interface of the
ZyWALL. The ZyWALL does not check packets traveling from a LAN computer
to another LAN computer on the same subnet.
From WAN1 To WAN1 means packets that come in through the WAN 1
interface and the ZyWALL routes back out through the WAN 1 interface.
From VPN means traffic that came into the ZyWALL through a VPN tunnel and
is going to the selected “to” interface. For example, From VPN To LAN
specifies the VPN traffic that is going to the LAN or terminating at the ZyWALL’s
LAN interface. The ZyWALL checks the traffic after decrypting it.
To VPN is traffic that comes in through the selected “from” interface and goes
out through any VPN tunnel. For example, From LAN To VPN specifies the
traffic that is coming from the LAN and going out through a VPN tunnel. The
ZyWALL checks the traffic before encrypting it.
From VPN To VPN means traffic that comes in through a VPN tunnel and goes
out through (another) VPN tunnel. This is the case when the ZyWALL is the hub
in a hub-and-spoke VPN. The ZyWALL checks the traffic after decrypting it
(before encrypting it again).
Active Select the check box in the heading row to automatically select all check boxes
and enable all signatures.
Clear it to clear all entries and disable all signatures on the current page. For
example, you could clear all check boxes for signatures that targets operating
systems not in your network. This would speed up the IDP signature checking
process.
Alternatively, you may select or clear individual entries. The check box becomes
gray when you select the check box.
If you edited any of the check boxes in this column on the current page, use the
check box in the heading row to switch between the settings (last partial edited, all
selected and all cleared).
Log Select this check box to have a log generated when a match is found for a
signature.
Select the check box in the heading row to automatically select all check boxes or
clear it to clear all entries on the current page.
Alternatively, you may select or clear individual entries. The check box becomes
gray when you select the check box.
If you edited any of the check boxes in this column on the current page, use the
check box in the heading row to switch between the settings (last partial edited, all
selected and all cleared).
Alert You can only edit the Alert check box when the corresponding Log check box is
selected.
Select this check box to have an e-mail sent when a match is found for a
signature.
Select the check box in the heading row to automatically select all check boxes or
clear it to clear all entries on the current page.
Alternatively, you may select or clear individual entries. The check box becomes
gray when you select the check box.
If you edited any of the check boxes in this column on the current page, use the
check box in the heading row to switch between the settings (last partial edited, all
selected and all cleared).
Action You can change the default signature action here. See Table 80 on page 282 for
more details on actions.
Apply Click this button to save your changes back to the ZyWALL.
Reset Click this button to begin configuring this screen afresh.
" A partial name may be searched but a complete ID number must be entered
before a match can be found. For example, a search by name for “w” (in the
first example) finds all intrusions that contain this letter in the name field.
However a search by ID for “1” would return no match. You must enter the
complete ID as shown in the second example.
4 Click Search. If the search finds more signatures than can be displayed on one page, use
the Go to Page list box to view other pages of signatures found in the search.
5 If you change the Active, Log, Alert and/or Action signature fields in the signatures
found, then click Apply to save the changes to the ZyWALL.
Figure 169 SECURITY > IDP > Signature: Query by Partial Name
" You should have already registered the ZyWALL at myZyXEL.com (http://
www.myzyxel.com/myzyxel/) and also have either activated the trial license or
standard license (iCard). If your license has expired, you will have to renew it
before updates are allowed.
14.5.1 mySecurityZone
mySecurityZone is a web portal that provides all security-related information such as intrusion
and anti-virus information for ZyXEL security products.
Click the intrusion ID hyperlink to go directly to information on that signature or enter https://
mysecurity.zyxel.com/mysecurity/ as the URL in your web browser.
You should have already registered your ZyWALL on myZyXEL.com at:
http://www.myzyxel.com/myzyxel/.
You can use your myZyXEL.com username and password to log into mySecurityZone.
" You do not have to reboot the ZyWALL when you upload new signatures.
To back up IDP signatures, click Backup and then choose a location and filename for the IDP
configuration set.
To restore previously saved IDP signatures, type in the location where the previously saved
file resides on your computer or click Browse ... to find it, then click Upload.
To revert to the factory-default signature (Active, Log, Alert and/or Action) settings, click
Reset.
Host IDP
The goal of host-based intrusions is to infiltrate files on an individual computer or server in
with the goal of accessing confidential information or destroying information on a computer.
You must install Host IDP directly on the system being protected. It works closely with the
operating system, monitoring and intercepting system calls to the kernel or APIs in order to
prevent attacks as well as log them.
Disadvantages of host IDPs are that you have to install them on each device (that you want to
protect) in your network and due to the necessarily tight integration with the host operating
system, future operating system upgrades could cause problems.
Network IDP
Network-based intrusions have the goal of bringing down a network or networks by attacking
computer(s), switch(es), router(s) or modem(s). If a LAN switch is compromised for example,
then the whole LAN is compromised, resulting in the equivalent of a LAN Denial of Service
(DoS) attack. Host-based intrusions may be used to cause network-based intrusions when the
goal of the host virus is to propagate attacks on the network, or attack computer/server
operating system vulnerabilities with the goal of bringing down the computer/server. Typical
“network-based intrusions” are SQL slammer, Blaster, Nimda, MyDoom etc.
A Network IDP has at least two network interfaces, one internal and one external. As packets
appear at an interface they are passed to the detection engine, which determines whether they
are malicious or not. If a malicious packet is detected, an action is taken. The remaining
packets that make up that particular TCP session are also discarded.
Example Intrusions
The following are some examples of intrusions.
Blaster W32.Worm
This is a worm that exploits the DCOM RPC vulnerability (see Microsoft Security Bulletin
MS03-026 and Microsoft Security Bulletin MS03-039) using TCP port 135. The worm targets
only Windows 2000 and Windows XP machines. While Windows NT and Windows 2003
Server machines are vulnerable (if not properly patched), the worm is not coded to replicate on
those systems. This worm attempts to download the msblast.exe file to the
%WinDir%\system32 directory and then execute it. W32.Blaster.Worm does not mass mail to
other devices.
Nimda
Its name (backwards for "admin") refers to an "admin.DLL" file that, when run, continues to
propagate the virus. Nimda probes each IP address within a randomly selected range of IP
addresses, attempting to exploit weaknesses that, unless already patched, are known to exist in
computers with Microsoft's Internet Information Server. A system with an exposed IIS Web
server will read a Web page containing an embedded JavaScript that automatically executes,
causing the same JavaScript code to propagate to all Web pages on that server. As Microsoft
Internet Explorer browsers version 5.01 or earlier visit sites at the infected Web server, they
unwittingly download pages with the JavaScript code that automatically executes, causing the
virus to be sent to other computers on the Internet in a somewhat random fashion. Nimda also
can infect users within the Web server's own internal network that have been given a network
share (a portion of file space). Finally, one of the things that Nimda has an infected system do
is to send an e-mail with a "readme.exe" attachment to the addresses in the local Windows
address book. A user who opens or previews this attachment (which is a Web page with the
JavaScript) propagates the virus further.
Server administrators should get and apply the cumulative IIS patch that Microsoft has
provided for previous viruses and ensure that no one at the server opens e-mail. You should
update your Internet Explorer version to IE 5.5 SP2 or later. Scan and cleanse your system
with anti-virus software.
MyDoom
MyDoom W32.Mydoom.A@mm (also known as W32.Novarg.A) is a mass-mailing worm
that arrives as an attachment with an bat, cmd, exe, pif, scr, or zip file extension. When a
computer is infected, the worm sets up a backdoor into the system by opening TCP ports 3127
through 3198, which can potentially allow an attacker to connect to the computer and use it as
a proxy to gain access to its network resources. In addition, the backdoor can download and
execute arbitrary files. Systems affected are Windows 95, Windows 98, Windows Me,
Windows NT, Windows 2000, Windows XP and Windows Server 2003.
15.1 Overview
This section shows you how to configure the ZyWALL to scan files transmitted through the
enabled interfaces into your network. As a network-based anti-virus scanner, the ZyWALL
helps stop threats at the network edge before they reach the local host computers.
The following figure shows the ZyWALL virus-scanning files going to the LAN from WAN1
and WAN2.
Virus
A computer virus is a small program designed to corrupt and/or alter the operation of other
legitimate programs. A worm is a self-replicating virus that resides in active memory and
duplicates itself. The effect of a virus attack varies from doing so little damage that you are
unaware your computer is infected to wiping out the entire contents of a hard drive to
rendering your computer inoperable.
Signature
This is the pattern of code used by a particular virus. The virus-scanner compares files with a
database of signatures to identify possible viruses.
" Since the ZyWALL erases the infected portion of the file before sending it, you
may not be able to open the file.
2. For Windows 98/Me, refer to the Appendix D on page 801 for requirements.
• Simultaneous downloads of a file using multiple connections. For example, when you
use FlashGet to download sections of a file simultaneously.
• Encrypted traffic (such as on a VPN) or password-protected files.
• Traffic through custom (non-standard) ports.
• ZIP file(s) within a ZIP file.
" Turn the ZyWALL off before you install or remove the ZyWALL Turbo card.
" The ZyWALL Turbo Card does not have a MAC address.
" Before you use the anti-virus feature, you must register for the service (refer to
the chapter on registration for more information).
Note: You cannot configure and save the IDP and Anti-Virus
screens if the ZyWALL Turbo Card is not installed.
Available Service
" You should have already registered the ZyWALL at myZyXEL.com (http://
www.myzyxel.com/myzyxel/) and also have either activated the trial license or
standard license (iCard). If your license has expired, you will have to renew it
before updates are allowed.
15.4.1 mySecurityZone
mySecurityZone is a web portal that provides all security-related information such as intrusion
and anti-virus information for ZyXEL security products.
You should have already registered your ZyWALL on myZyXEL.com at:
http://www.myzyxel.com/myzyxel/.
You can use your myZyXEL.com username and password to log into mySecurityZone.
" The ZyWALL does not have to reboot when you upload new signatures.
16.1 Overview
The ZyWALL’s anti-spam feature identifies unsolicited commercial or junk e-mail (spam).
You can set the ZyWALL to mark or discard spam. The ZyWALL can use an anti-spam
external database to help identify spam. Use the whitelist to identify legitimate e-mail. Use the
blacklist to identify spam e-mail.
The following is an figure showing the ZyWALL checking e-mail with the external database.
1 E-mail comes into the ZyWALL from an e-mail server (A in the figure).
2 The ZyWALL calculates a digest of the e-mail and sends it to the anti-spam external
database.
3 The anti-spam external database calculates a spam score for the e-mail and sends the
score back to the ZyWALL.
4 The ZyWALL forwards the e-mail if the spam score is at or below the ZyWALL’s spam
threshold. If the spam score is higher than the spam threshold, the ZyWALL takes the
action that you configured for dealing with spam.
MIME Headers
MIME (Multipurpose Internet Mail Extensions) allows varied media types to be used in e-
mail. MIME headers describe an e-mail’s content encoding and type. For example, it may
show which program generated the e-mail and what type of text is used in the e-mail body.
Here are some examples of MIME headers:
• X-Priority: 3 (Normal)
• X-MSMail-Priority: Normal
In an MIME header, the part that comes before the colon (:) is the header. The part that comes
after the colon is the value. Spam often has blank header values or comments in them that are
part of an attempt to bypass spam filters.
Whitelist
Configure whitelist entries to identify legitimate e-mail. The whitelist entries have the
ZyWALL classify any e-mail that is from a specified sender or uses a specified MIME header
or MIME header value as being legitimate. The anti-spam feature checks an e-mail against the
whitelist entries before doing any other anti-spam checking. If the e-mail matches a whitelist
entry, the ZyWALL classifies the e-mail as legitimate and does not perform any more anti-
spam checking on that individual e-mail. A properly configured whitelist helps keep important
e-mail from being incorrectly classified as spam. The whitelist can also increases the
ZyWALL’s anti-spam speed and efficiency by not having the ZyWALL perform the full anti-
spam checking process on legitimate e-mail.
Blacklist
Configure blacklist entries to identify spam. The blacklist entries have the ZyWALL classify
any e-mail that is from a specified sender or uses a specified MIME header or MIME header
value as being spam. If an e-mail does not match any of the whitelist entries, the ZyWALL
checks it against the blacklist entries. The ZyWALL classifies an e-mail that matches a
blacklist entry as spam and immediately takes the action that you configured for dealing with
spam. The ZyWALL does not perform any more anti-spam checking on that individual e-mail.
A properly configured blacklist helps catch spam e-mail and increases the ZyWALL’s anti-
spam speed and efficiency.
3. Bayesian analysis interprets probabilities as degrees of belief rather than as proportions, frequencies and
such. Bayesian analysis frequently uses Bayes' theorem, hence the name.
SpamBulk Engine
The e-mail fingerprint ID that the ZyWALL generates and sends to the anti-spam external
database only includes the parts of the e-mail that are the most difficult for spammers (senders
of spam) to change or fake. The anti-spam external database maintains a database of e-mail
fingerprint IDs. The anti-spam external database SpamBulk engine then queries the database
in analyzing later e-mails.
The SpamBulk Engine also uses Bayesian statistical analysis to detect whether an e-mail is
fundamentally the same as a known spam message in spite of a spammer’s attempt to disguise
it.
Spam Threshold
You can configure the threshold for what spam score is classified as spam. The ZyWALL
considers any e-mail with a spam score higher than the spam threshold to be spam. Any e-mail
with a score less than or equal to the spam threshold is treated as legitimate.
Phishing
Phishing is a scam where fraudsters send e-mail claiming to be from a well-known enterprise
in an attempt to steal private information. For example, the e-mail might appear to be from a
bank, online payment service, or even a government agency. It generally tells you to click a
link and update your identity information in order for the business or organization to verify
your account. The link directs you to a phony website that mimics the business or
organization’s website. The fraudsters then use your personal information to pretend to be you
and commit crimes like running up bills in your name (identity theft).
The anti-spam external database checks for spoofing of e-mail attributes (like the IP address)
and uses statistical analysis to detect phishing.
Click SECURITY > ANTI-SPAM to open the Anti-Spam General screen. The following
screen appears.
Note: You must register for and enable the anti-spam external
database feature in order for the ZyWALL to use this tag
(see Chapter 6 on page 141 for details).
Spam Tag Enter a message or label (up to 16 ASCII characters) to add to the mail
subject of e-mails that the ZyWALL classifies as spam.
SpamRepute Engine
The SpamRepute engine calculates the reputation of the sender (whether or not most people
want to receive the e-mail from this sender).
The SpamRepute engine checks proprietary and third-party databases of known spammer
email addresses, domains and IP addresses. The SpamRepute engine also uses Bayesian
statistical analysis to detect whether an e-mail is sent from a known in spite of a spammer’s
attempt to disguise the sender’s identity. The anti-spam external database combines all of this
data into a SpamRepute Index for calculating the reputation of the sender in order to guard
against foreign language spam, fraud and phishing.
SpamContent Engine
The SpamContent engine examines the e-mail’s content to decide if it would generally be
considered offensive. The vocabulary design, format and layout are considered as part of
thousands of checks on message attributes that include the following.
• To Field
• Subject Field
• Header Fields
• Email Format, Design, and Layout
• Vocabulary, Word Formatting and Word Patterns
• Foreign Language Detection
• SMTP Envelope Content and Analysis
• Country Trace
• Image Layout Classification
• Hyperlink Analysis and Comparison
• Contact Verification
The SpamContent engine parses words into pieces to detect similar vocabulary even if the
words do not match exactly. The anti-spam external database also performs Bayesian
statistical analysis on the e-mail’s content. The engine uses artificial intelligence technology to
'learn' over time, as spam changes.
SpamTricks Engine
The SpamTricks engine checks for the tactics that spammers use to minimize the expense of
sending lots of e-mail and tactics that they use to bypass spam filters.
Use of relays, image-only e-mails, manipulation of mail formats and HTML obfuscation are
common tricks for which the SpamTricks engine checks. The SpamTricks engine also checks
for “phishing” (see Section 16.2 on page 315 for more on phishing).
17.1 Overview
Content filtering allows you to block certain web features, such as cookies, and/or block
access to specific websites. With content filtering, you can do the following:
• Restrict web features. The ZyWALL can block web features such as ActiveX controls,
Java applets, cookies and disable web proxies.
• Create a filter list. You can select categories, such as pornography or racial intolerance, to
block from a pre-defined list.
• Customize web site access. You can specify URLs to which the ZyWALL blocks access.
You can alternatively block access to all URLs except ones that you specify. You can also
have the ZyWALL block access to URLs that contain key words that you specify.
Policies
Content filtering policies allow you to have different content filtering settings for different
users or groups of users. For example, you may want to block most employees from accessing
finance or stock websites, but allow the finance department to access these. You can set the
ZyWALL to use external database content filtering and select which web site categories to
block and/or log.
" You must register for external content filtering before you can use it.
Use the REGISTRATION screens (see Chapter 6 on page 141) to create a myZyXEL.com
account, register your device and activate the external content filtering service.
Note: After you register for content filtering, you need to wait
up to five minutes for content filtering to be activated.
See Section 18.2 on page 349 for how to check the
content filtering activation.
" The ordering of your policies is very important as the ZyWALL applies policies
in the order they are listed.
Figure 190 SECURITY > CONTENT FILTER > Policy > General
Table 94 SECURITY > CONTENT FILTER > Policy > General (continued)
LABEL DESCRIPTION
Start IP Address Enter the single IP address or the starting IP address in a range here.
End IP Address Enter the ending IP address in a range here.
Subnet Mask Enter the subnet mask here, if applicable.
Add Click Add to add a new address to the Configured Address box. You
can add multiple addresses, ranges of addresses, and/or subnets.
Modify To edit an existing source or destination address, select it from the box
and click Modify.
Delete Highlight an existing source or destination address from the
Configured Address box and click Delete to remove it.
Apply Click Apply to save your customized settings and exit this screen.
Cancel Click Cancel to exit this screen without saving.
Figure 191 SECURITY > CONTENT FILTER > Policy > External Database
Table 95 SECURITY > CONTENT FILTER > Policy > External Database (continued)
LABEL DESCRIPTION
Gambling Selecting this category excludes pages where a user can place a bet or
participate in a betting pool (including lotteries) online. It also includes
pages that provide information, assistance, recommendations, or
training on placing bets or participating in games of chance. It does not
include pages that sell gambling related products or machines. It also
does not include pages for offline casinos and hotels (as long as those
pages do not meet one of the above requirements).
Violence/Hate/Racism Selecting this category excludes pages that depict extreme physical
harm to people or property, or that advocate or provide instructions on
how to cause such harm. It also includes pages that advocate, depict
hostility or aggression toward, or denigrate an individual or group on the
basis of race, religion, gender, nationality, ethnic origin, or other
characteristics.
Weapons Selecting this category excludes pages that sell, review, or describe
weapons such as guns, knives or martial arts devices, or provide
information on their use, accessories, or other modifications. It does not
include pages that promote collecting weapons, or groups that either
support or oppose weapons use.
Abortion Selecting this category excludes pages that provide information or
arguments in favor of or against abortion, describe abortion
procedures, offer help in obtaining or avoiding abortion, or provide
information on the effects, or lack thereof, of abortion.
Hacking Selecting this category excludes pages that distribute, promote, or
provide hacking tools and/or information which may help gain
unauthorized access to computer systems and/or computerized
communication systems. Hacking encompasses instructions on illegal
or questionable tactics, such as creating viruses, distributing cracked or
pirated software, or distributing other protected intellectual property.
Phishing Selecting this category excludes pages that are designed to appear as
a legitimate bank or retailer with the intent to fraudulently capture
sensitive data (i.e. credit card numbers, pin numbers).
Arts/Entertainment Selecting this category excludes pages that promote and provide
information about motion pictures, videos, television, music and
programming guides, books, comics, movie theatres, galleries, artists
or reviews on entertainment.
Business/Economy Selecting this category excludes pages devoted to business firms,
business information, economics, marketing, business management
and entrepreneurship. This does not include pages that perform
services that are defined in another category (such as Information
Technology companies, or companies that sell travel services).
Alternative Spirituality/Occult Selecting this category excludes pages that promote and provide
information on religions such as Wicca, Witchcraft or Satanism. Occult
practices, atheistic views, voodoo rituals or any other form of mysticism
are represented here. Includes sites that endorse or offer methods,
means of instruction, or other resources to affect or influence real
events through the use of spells, incantations, curses and magic
powers. This category includes sites which discuss or deal with
paranormal or unexplained events.
Illegal Drugs Selecting this category excludes pages that promote, offer, sell, supply,
encourage or otherwise advocate the illegal use, cultivation,
manufacture, or distribution of drugs, pharmaceuticals, intoxicating
plants or chemicals and their related paraphernalia.
Table 95 SECURITY > CONTENT FILTER > Policy > External Database (continued)
LABEL DESCRIPTION
Education Selecting this category excludes pages that offer educational
information, distance learning and trade school information or
programs. It also includes pages that are sponsored by schools,
educational facilities, faculty, or alumni groups.
Cultural/Charitable Selecting this category excludes pages that nurture cultural
Organization understanding and foster volunteerism such as 4H, the Lions and
Rotary Clubs. Also encompasses non-profit associations that cultivate
philanthropic or relief efforts. Sites that provide a learning environment
or cultural refinement/awareness outside of the strictures of formalized
education such as museums and planetariums are included under this
heading.
Financial Services Selecting this category excludes pages that provide or advertise
banking services (online or offline) or other types of financial
information, such as loans. It does not include pages that offer market
information, brokerage or trading services.
Brokerage/Trading Selecting this category excludes pages that provide or advertise trading
of securities and management of investment assets (online or offline).
It also includes insurance pages, as well as pages that offer financial
investment strategies, quotes, and news.
Online Games Selecting this category excludes pages that provide information and
support game playing or downloading, video games, computer games,
electronic games, tips, and advice on games or how to obtain cheat
codes. It also includes pages dedicated to selling board games as well
as journals and magazines dedicated to game playing. It includes
pages that support or host online sweepstakes and giveaways.
Government/Legal Selecting this category excludes pages sponsored by or which provide
information on government, government agencies and government
services such as taxation and emergency services. It also includes
pages that discuss or explain laws of various governmental entities.
Military Selecting this category excludes pages that promote or provide
information on military branches or armed services.
Political/Activist Groups Selecting this category excludes pages sponsored by or which provide
information on political parties, special interest groups, or any
organization that promotes change or reform in public policy, public
opinion, social practice, or economic activities.
Health Selecting this category excludes pages that provide advice and
information on general health such as fitness and well-being, personal
health or medical services, drugs, alternative and complimentary
therapies, medical information about ailments, dentistry, optometry,
general psychiatry, self-help, and support organizations dedicated to a
disease or condition.
Computers/Internet Selecting this category excludes pages that sponsor or provide
information on computers, technology, the Internet and technology-
related organizations and companies.
Search Engines/Portals Selecting this category excludes pages that support searching the
Internet, indices, and directories.
Table 95 SECURITY > CONTENT FILTER > Policy > External Database (continued)
LABEL DESCRIPTION
Spyware/Malware Sources Selecting this category excludes pages which distribute spyware and
other malware. Spyware is defined as software which takes control of
your computer, modifies computer settings, collects or reports personal
information, or misrepresents itself by tricking users to install,
download, or enter personal information. This includes drive-by
downloads; browser hijackers; dialers; intrusive advertising; any
program which modifies your homepage, bookmarks, or security
settings; and keyloggers. It also includes any software which bundles
spyware (as defined above) as part of its offering. Information collected
or reported is "personal" if it contains uniquely identifying data, such as
e-mail addresses, name, social security number, IP address, etc. A site
is not classified as spyware if the user is reasonably notified that the
software will perform these actions (that is, it alerts that it will send
personal information, be installed, or that it will log keystrokes). Note:
Sites rated as spyware should have a second category assigned with
them.
Spyware Effects/Privacy Selecting this category excludes pages to which spyware (as defined in
Concerns the Spyware/Malware Sources category) reports its findings or from
which it alone downloads advertisements. Also includes sites that
contain serious privacy issues, such as “phone home” sites to which
software can connect and send user info; sites that make extensive use
of tracking cookies without a posted privacy statement; and sites to
which browser hijackers redirect users. Usually does not include sites
that can be marked as Spyware/Malware. Note: Sites rated as spyware
effects typically have a second category assigned with them.
Job Search/Careers Selecting this category excludes pages that provide assistance in
finding employment, and tools for locating prospective employers.
News/Media Selecting this category excludes pages that primarily report information
or comments on current events or contemporary issues of the day. It
also includes radio stations and magazines. It does not include pages
that can be rated in other categories.
Personals/Dating Selecting this category excludes pages that promote interpersonal
relationships.
Reference Selecting this category excludes pages containing personal,
professional, or educational reference, including online dictionaries,
maps, census, almanacs, library catalogues, genealogy-related pages
and scientific information.
Open Image/Media Search Selecting this category excludes pages with image or video search
capabilities which return graphical results (i.e. thumbnail pictures) that
include potentially pornographic content along with non-pornographic
content (as defined in the Pornography category). Sites that explicitly
exclude offensive content are not included in this category.
Chat/Instant Messaging Selecting this category excludes pages that provide chat or instant
messaging capabilities or client downloads.
Email Selecting this category excludes pages offering web-based e-mail
services, such as online e-mail reading, e-cards, and mailing list
services.
Blogs/Newsgroups Selecting this category excludes pages that offer access to Usenet
news groups or other messaging or bulletin board systems. Also, blog
specific sites or an individual with his own blog. This does not include
social networking communities with blogs.
Table 95 SECURITY > CONTENT FILTER > Policy > External Database (continued)
LABEL DESCRIPTION
Religion Selecting this category excludes pages that promote and provide
information on conventional or unconventional religious or quasi-
religious subjects, as well as churches, synagogues, or other houses of
worship. It does not include pages containing alternative religions such
as Wicca or witchcraft (Cult/Occult) or atheist beliefs (Political/Activist
Groups).
Social Networking Selecting this category excludes pages that enable people to connect
with others to form an online community. Typically members describe
themselves in personal web page policies and form interactive
networks, linking them with other members based on common interests
or acquaintances. Instant messaging, file sharing and web logs (blogs)
are common features of Social Networking sites. Note: These sites may
contain offensive material in the community-created content. Sites in
this category are also referred to as "virtual communities" or "online
communities". This category does not include more narrowly focused
sites, like those that specifically match descriptions for Personals/
Dating sites or Business sites.
Online Storage Selecting this category excludes pages that provide a secure,
encrypted, off-site backup and restoration of personal data. These
online repositories are typically used to store, organize and share
videos, music, movies, photos, documents and other electronically
formatted information. Sites that fit this criteria essentially act as your
personal hard drive on the Internet.
Remote Access Tools Selecting this category excludes pages that primarily focus on providing
information about and/or methods that enables authorized access to
and use of a desktop computer or private network remotely.
Shopping Selecting this category excludes pages that provide or advertise the
means to obtain goods or services. It does not include pages that can
be classified in other categories (such as vehicles or weapons).
Auctions Selecting this category excludes pages that support the offering and
purchasing of goods between individuals. This does not include
classified advertisements.
Real Estate Selecting this category excludes pages that provide information on
renting, buying, or selling real estate or properties.
Society/Lifestyle Selecting this category excludes pages providing information on
matters of daily life. This does not include pages relating to
entertainment, sports, jobs, sex or pages promoting alternative
lifestyles such as homosexuality. Personal homepages fall within this
category if they cannot be classified in another category.
Sexuality/Alternative Selecting this category excludes pages that provide information,
Lifestyles promote, or cater to gays, lesbians, swingers, other sexual orientations
or practices, or a particular fetish. This category does not include sites
that are sexually gratuitous in nature which would typically fall under the
Pornography category.
Restaurants/Dining/Food Selecting this category excludes pages that list, review, discuss,
advertise and promote food, catering, dining services, cooking and
recipes.
Sports/Recreation/Hobbies Selecting this category excludes pages that promote or provide
information about spectator sports, recreational activities, or hobbies.
This includes pages that discuss or promote camping, gardening, and
collecting.
Table 95 SECURITY > CONTENT FILTER > Policy > External Database (continued)
LABEL DESCRIPTION
Travel Selecting this category excludes pages that promote or provide
opportunity for travel planning, including finding and making travel
reservations, vehicle rentals, descriptions of travel destinations, or
promotions for hotels or casinos.
Vehicles Selecting this category excludes pages that provide information on or
promote vehicles, boats, or aircraft, including pages that support online
purchase of vehicles or parts.
Humor/Jokes Selecting this category excludes pages that primarily focus on comedy,
jokes, fun, etc. This may include pages containing jokes of adult or
mature nature. Pages containing humorous Adult/Mature content also
have an Adult/Mature category rating.
Software Downloads Selecting this category excludes pages that are dedicated to the
electronic download of software packages, whether for payment or at
no charge.
Pay to Surf Selecting this category excludes pages that pay users in the form of
cash or prizes, for clicking on or reading specific links, e-mail, or web
pages.
Peer-to-Peer Selecting this category excludes pages that distribute software to
facilitate the direct exchange of files between users, including software
that enables file search and sharing across a network without
dependence on a central server.
Streaming Media/MP3s Selecting this category excludes pages that sell, deliver, or stream
music or video content in any format, including sites that provide
downloads for such viewers.
Proxy Avoidance Selecting this category excludes pages that provide information on how
to bypass proxy server/appliance features or gain access to URLs in
any way that bypasses the proxy server/appliance. It also includes any
service that will allow a person to bypass the content filtering feature,
such as anonymous surfing services.
For Kids Selecting this category excludes pages designed specifically for
children.
Web Advertisements Selecting this category excludes pages that provide online
advertisements or banners. This does not include advertising servers
that serve adult-oriented advertisements.
Web Hosting Selecting this category excludes pages of organizations that provide
top-level domain pages, as well as web communities or hosting
services.
Advanced/Basic Click Advanced to see an expanded list of categories, or click Basic to
see a smaller list.
Test Web Site Attribute
Test if Web site is blocked You can check whether or not the content filter policy currently blocks
any given web page. Enter a web site URL in the text box.
Test Against Local Cache Click this button to test whether or not the web site above is saved in
the ZyWALL’s database of restricted web pages.
Test Against Internet Server Click this button to test whether or not the web site above is saved in
the external content filter server’s database of restricted web pages.
Apply Click Apply to save your settings and exit this screen.
Cancel Click Cancel to exit this screen without saving.
" Use the SECURITY > CONTENT FILTER > Object screen (see Section 17.8
on page 343) first to configure the master lists of trusted (allowed) web sites,
forbidden (blocked) web sites, and keywords.
Figure 192 SECURITY > CONTENT FILTER > Policy > Customization
Figure 193 SECURITY > CONTENT FILTER > Policy > Schedule
Use this screen to configure a list of allowed web site addresses for this policy and a list of
blocked web site addresses. You can also block web sites based on whether the web site’s
address contains a keyword. Use this screen to add or remove specific sites or keywords from
the filter list.
" To use this screens settings in content filtering, you must use the SECURITY >
CONTENT FILTER > Policy > Customization screen to set individual policies
to add or remove specific sites or keywords for individual policies.
18.1 Overview
This chapter describes how to view content filtering reports after you have activated the
category-based content filtering subscription service.
See Chapter 6 on page 141 on how to create a myZyXEL.com account, register your device
and activate the subscription services using the REGISTRATION screens.
3 A welcome screen displays. Click your ZyWALL’s model name and/or MAC address
under Registered ZyXEL Products. You can change the descriptive name for your
ZyWALL using the Rename button in the Service Management screen (see Figure 198
on page 351).
4 In the Service Management screen click Content Filter in the Service Name field to
open the Blue Coat login screen.
5 Enter your ZyXEL device's MAC address (in lower case) in the Name field. You can
find this MAC address in the Service Management screen (Figure 198 on page 351).
Type your myZyXEL.com account password in the Password field.
6 Click Submit.
8 Select items under Global Reports or Single User Reports to view the corresponding
reports.
9 Select a time period in the Date Range field, either Allowed or Blocked in the Action
Taken field and a category (or enter the user name if you want to view single user
reports) and click Run Report.The screens vary according to the report type you
selected in the Report Home screen.
10 A chart and/or list of requested web site categories display in the lower half of the
screen.
11 You can click a category in the Categories report or click URLs in the Report Home
screen to see the URLs that were requested.
3 Type the web site’s URL in the field and click Submit to have the web site reviewed.
19.1 Overview
A virtual private network (VPN) provides secure communications between sites without the
expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption,
authentication, access control and auditing. It is used to transport traffic over the Internet or
any insecure network that uses TCP/IP for communication.
Internet Protocol Security (IPSec) is a standards-based VPN that offers flexible solutions for
secure data communications across a public network like the Internet. IPSec is built around a
number of standardized cryptographic techniques to provide confidentiality, data integrity and
authentication at the IP layer. The following figure is an example of an IPSec VPN tunnel.
The VPN tunnel connects the ZyWALL (X) and the remote IPSec router (Y). These routers
then connect the local network (A) and remote network (B).
• Use the VPN Global Setting screen (see Section 19.10 on page 379) to change settings
that apply to all of your VPN tunnels.
This figure helps explain the main fields in the VPN setup.
Negotiation Mode
It takes several steps to establish an IKE SA. The negotiation mode determines the number of
steps to use. There are two negotiation modes--main mode and aggressive mode. Main mode
provides better security, while aggressive mode is faster.
These modes are discussed in more detail in Negotiation Mode on page 391. Main mode is
used in various examples in the rest of this section.
You can usually provide a static IP address or a domain name for the ZyWALL. Sometimes,
your ZyWALL might also offer another alternative, such as using the IP address of a port or
interface.
You can usually provide a static IP address or a domain name for the remote IPSec router as
well. Sometimes, you might not know the IP address of the remote IPSec router (for example,
telecommuters). In this case, you can still set up the IKE SA, but only the remote IPSec router
can initiate an IKE SA.
# This is your VPN rule number. Click + to expand or - to collapse the VPN rule’s
network policies.
Table 100 SECURITY > VPN > VPN Rules (IKE) (continued)
LABEL DESCRIPTION
Gateway Policies The first row of each VPN rule represents the gateway policy.
The gateway policy identifies the IPSec routers at either end of a VPN tunnel (My
ZyWALL and Remote Gateway) and specifies the authentication, encryption and
other settings needed to negotiate a phase 1 IKE SA (click the edit icon to display
the other settings).
My This represents your ZyWALL.
ZyWALL The WAN IP address, domain name or dynamic domain name of your ZyWALL
displays in router mode.
The ZyWALL’s IP address displays in bridge mode.
Remote This represents the remote secure gateway.
Gateway The IP address, domain name or dynamic domain name of the remote IPSec
router displays if you specify it, otherwise Dynamic displays.
Click this icon to add a VPN network policy.
Network Policies The subsequent rows in a VPN rule are network policies. A network policy
identifies the devices behind the IPSec routers at either end of a VPN tunnel and
specifies the authentication, encryption and other settings needed to negotiate a
phase 2 IPSec SA.
Y/N This field displays whether the network policy is active (Y) or not (N). Click the
setting to change it.
Local This is the network behind the ZyWALL. A network policy specifies which devices
Network (behind the IPSec routers) can use the VPN tunnel.
Remote This is the remote network behind the remote IPsec router.
Network
Click this icon to display a screen in which you can associate a network policy to a
gateway policy or move it to the recycle bin.
Click this icon to display a screen in which you can change the settings of a
gateway or network policy.
Click this icon to delete a gateway or network policy. When you delete a gateway,
the ZyWALL automatically moves the associated network policy(ies) to the recycle
bin. When you delete a network policy, it is just deleted.
Click this icon to establish a VPN connection to a remote network.
Recycle Bin The recycle bin appears when you have any network policies that are not
associated to a gateway policy.
• When you delete a gateway, the ZyWALL automatically moves the associated
network policy(ies) to the recycle bin.
• You can also manually move a network policy that you do not need (but may
want to use again later) to the recycle bin. Click the network policy’s move or
edit icon and set its Gateway Policy to Recycle Bin.
Use this screen to configure a VPN gateway policy. The gateway policy identifies the IPSec
routers at either end of a VPN tunnel (My ZyWALL and Remote Gateway) and specifies the
authentication, encryption and other settings needed to negotiate a phase 1 IKE SA.
Figure 210 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy
Note: The remote IPSec router must also have NAT traversal
enabled. See VPN, NAT, and NAT Traversal on page 392
for more information.
You can use NAT traversal with ESP protocol using Transport or Tunnel mode,
but not with AH protocol nor with manual key management. In order for an IPSec
router behind a NAT router to receive an initiating IPSec packet, set the NAT
router to forward UDP ports 500 and 4500 to the IPSec router behind the NAT
router.
Gateway Policy
Information
My ZyWALL When the ZyWALL is in router mode, this field identifies the WAN IP address or
domain name of the ZyWALL. You can select My Address and enter the
ZyWALL's static WAN IP address (if it has one) or leave the field set to 0.0.0.0.
The ZyWALL uses its current WAN IP address (static or dynamic) in setting up
the VPN tunnel if you leave this field as 0.0.0.0. If the WAN connection goes
down, the ZyWALL uses the dial backup IP address for the VPN tunnel when
using dial backup or the LAN IP address when using traffic redirect.
Otherwise, you can select My Domain Name and choose one of the dynamic
domain names that you have configured (in the DDNS screen) to have the
ZyWALL use that dynamic domain name's IP address.
When the ZyWALL is in bridge mode, this field is read-only and displays the
ZyWALL’s IP address.
The VPN tunnel has to be rebuilt if the My ZyWALL IP address changes after
setup.
Primary Remote Type the WAN IP address or the domain name (up to 31 characters) of the IPSec
Gateway router with which you're making the VPN connection. Set this field to 0.0.0.0 if the
remote IPSec router has a dynamic WAN IP address.
In order to have more than one active rule with the Primary Remote Gateway
field set to 0.0.0.0, the ranges of the local IP addresses cannot overlap between
rules.
If you configure an active rule with 0.0.0.0 in the Primary Remote Gateway field
and the LAN’s full IP address range as the local IP address, then you cannot
configure any other active rules with the Primary Remote Gateway field set to
0.0.0.0.
Enable IPSec High Turn on the high availability feature to use a redundant (backup) VPN connection
Availability to another WAN interface on the remote IPSec router if the primary (regular) VPN
connection goes down. The remote IPSec router must have a second WAN
connection in order for you to use this.
To use this, you must identify both the primary and the redundant remote IPSec
routers by WAN IP address or domain name (you cannot set either to 0.0.0.0).
Redundant Type the WAN IP address or the domain name (up to 31 characters) of the
Remote Gateway backup IPSec router to use when the ZyWALL cannot connect to the primary
remote gateway.
Table 101 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy (continued)
LABEL DESCRIPTION
Fall back to Select this to have the ZyWALL change back to using the primary remote
Primary Remote gateway if the connection becomes available again.
Gateway when
possible
Fall Back Check Set how often the ZyWALL should check the connection to the primary remote
Interval* gateway while connected to the redundant remote gateway.
Each gateway policy uses one or more network policies. If the fall back check
interval is shorter than a network policy’s SA life time, the fall back check interval
is used as the check interval and network policy SA life time. If the fall back check
interval is longer than a network policy’s SA life time, the SA lifetime is used as
the check interval and network policy SA life time.
Authentication Key
Pre-Shared Key Select the Pre-Shared Key radio button and type your pre-shared key in this
field. A pre-shared key identifies a communicating party during a phase 1 IKE
negotiation. It is called "pre-shared" because you have to share it with another
party before you can communicate with them over a secure connection.
Type from 8 to 31 case-sensitive ASCII characters or from 16 to 62 hexadecimal
("0-9", "A-F") characters. You must precede a hexadecimal key with a "0x (zero
x), which is not counted as part of the 16 to 62 character range for the key. For
example, in "0x0123456789ABCDEF", 0x denotes that the key is hexadecimal
and 0123456789ABCDEF is the key itself.
Both ends of the VPN tunnel must use the same pre-shared key. You will receive
a PYLD_MALFORMED (payload malformed) packet if the same pre-shared key
is not used on both ends.
Certificate Select the Certificate radio button to identify the ZyWALL by a certificate.
Use the drop-down list box to select the certificate to use for this VPN tunnel. You
must have certificates already configured in the My Certificates screen. Click My
Certificates to go to the My Certificates screen where you can view the
ZyWALL's list of certificates.
Local ID Type Select IP to identify this ZyWALL by its IP address.
Select DNS to identify this ZyWALL by a domain name.
Select E-mail to identify this ZyWALL by an e-mail address.
You do not configure the local ID type and content when you set Authentication
Key to Certificate. The ZyWALL takes them from the certificate you select.
Content When you select IP in the Local ID Type field, type the IP address of your
computer in the local Content field. The ZyWALL automatically uses the IP
address in the My ZyWALL field (refer to the My ZyWALL field description) if you
configure the local Content field to 0.0.0.0 or leave it blank.
It is recommended that you type an IP address other than 0.0.0.0 in the local
Content field or use the DNS or E-mail ID type in the following situations.
1. When there is a NAT router between the two IPSec routers.
2. When you want the remote IPSec router to be able to distinguish between VPN
connection requests that come in from IPSec routers with dynamic WAN IP
addresses.
When you select DNS or E-mail in the Local ID Type field, type a domain name
or e-mail address by which to identify this ZyWALL in the local Content field. Use
up to 31 ASCII characters including spaces, although trailing spaces are
truncated. The domain name or e-mail address is for identification purposes only
and can be any string.
Table 101 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy (continued)
LABEL DESCRIPTION
Peer ID Type Select from the following when you set Authentication Key to Pre-shared Key.
Select IP to identify the remote IPSec router by its IP address.
Select DNS to identify the remote IPSec router by a domain name.
Select E-mail to identify the remote IPSec router by an e-mail address.
Select from the following when you set Authentication Key to Certificate.
Select IP to identify the remote IPSec router by the IP address in the subject
alternative name field of the certificate it uses for this VPN connection.
Select DNS to identify the remote IPSec router by the domain name in the subject
alternative name field of the certificate it uses for this VPN connection.
Select E-mail to identify the remote IPSec router by the e-mail address in the
subject alternative name field of the certificate it uses for this VPN connection.
Select Subject Name to identify the remote IPSec router by the subject name of
the certificate it uses for this VPN connection.
Select Any to have the ZyWALL not check the remote IPSec router's ID.
Content The configuration of the peer content depends on the peer ID type.
Do the following when you set Authentication Key to Pre-shared Key.
For IP, type the IP address of the computer with which you will make the VPN
connection. If you configure this field to 0.0.0.0 or leave it blank, the ZyWALL will
use the address in the Primary Remote Gateway field (refer to the Primary
Remote Gateway field description).
For DNS or E-mail, type a domain name or e-mail address by which to identify
the remote IPSec router. Use up to 31 ASCII characters including spaces,
although trailing spaces are truncated. The domain name or e-mail address is for
identification purposes only and can be any string.
It is recommended that you type an IP address other than 0.0.0.0 or use the DNS
or E-mail ID type in the following situations:
1. When there is a NAT router between the two IPSec routers.
2. When you want the ZyWALL to distinguish between VPN connection requests
that come in from remote IPSec routers with dynamic WAN IP addresses.
Do the following when you set Authentication Key to Certificate.
1. For IP, type the IP address from the subject alternative name field of the
certificate the remote IPSec router will use for this VPN connection. If you
configure this field to 0.0.0.0 or leave it blank, the ZyWALL will use the address in
the Primary Remote Gateway field (refer to the Primary Remote Gateway field
description).
2. For DNS or E-mail, type the domain name or e-mail address from the subject
alternative name field of the certificate the remote IPSec router will use for this
VPN connection.
3. For Subject Name, type the subject name of the certificate the remote IPSec
router will use for this VPN connection. Use up to255 ASCII characters including
spaces.
4. For Any, the peer Content field is not available.
5. Regardless of how you configure the ID Type and Content fields, two active
IPSec SAs cannot have both the local and remote IP address ranges overlap
between rules.
Extended
Authentication
Enable Extended Select this check box to activate extended authentication.
Authentication
Table 101 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy (continued)
LABEL DESCRIPTION
Server Mode Select Server Mode to have this ZyWALL authenticate extended authentication
clients that request this VPN connection.
You must also configure the extended authentication clients’ usernames and
passwords in the authentication server’s local user database or a RADIUS server
(see Chapter 21 on page 427).
Click Local User to go to the Local User Database screen where you can view
and/or edit the list of user names and passwords. Click RADIUS to go to the
RADIUS screen where you can configure the ZyWALL to check an external
RADIUS server.
During authentication, if the ZyWALL (in server mode) does not find the extended
authentication clients’ user name in its internal user database and an external
RADIUS server has been enabled, it attempts to authenticate the client through
the RADIUS server.
Client Mode Select Client Mode to have your ZyWALL use a username and password when
initiating this VPN connection to the extended authentication server ZyWALL.
Only a VPN extended authentication client can initiate this VPN connection.
User Name Enter a user name for your ZyWALL to be authenticated by the VPN peer (in
server mode). The user name can be up to 31 case-sensitive ASCII characters,
but spaces are not allowed. You must enter a user name and password when you
select client mode.
Password Enter the corresponding password for the above user name. The password can
be up to 31 case-sensitive ASCII characters, but spaces are not allowed.
IKE Proposal
Negotiation Mode Select Main or Aggressive from the drop-down list box. Multiple SAs connecting
through a secure gateway must have the same negotiation mode.
Encryption Select which key size and encryption algorithm to use in the IKE SA. Choices are:
Algorithm DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algorithm
AES - a 128/192/256-bit key with the AES encryption algorithm
The ZyWALL and the remote IPSec router must use the same algorithms and
keys. Longer keys require more processing power, resulting in increased latency
and decreased throughput.
Authentication Select which hash algorithm to use to authenticate packet data in the IKE SA.
Algorithm Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5,
but it is also slower.
SA Life Time Define the length of time before an IKE SA automatically renegotiates in this field.
(Seconds) It may range from 180 to 3,000,000 seconds (almost 35 days).
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Key Group Select which Diffie-Hellman key group (DHx) you want to use for encryption keys.
Choices are:
DH1 - use a 768-bit random number
DH2 - use a 1024-bit random number
DH5 - use a 1536-bit random number.
The longer the key, the more secure the encryption, but also the longer it takes to
encrypt and decrypt information. Both routers must use the same DH key group.
Table 101 SECURITY > VPN > VPN Rules (IKE) > Edit Gateway Policy (continued)
LABEL DESCRIPTION
Enable Multiple Select this to allow the ZyWALL to use any of its phase 1 key groups and
Proposals encryption and authentication algorithms when negotiating an IKE SA.
When you enable multiple proposals, the ZyWALL allows the remote IPSec
router to select which phase 1 key groups and encryption and authentication
algorithms to use for the IKE SA, even if they are less secure than the ones you
configure for the VPN rule.
Clear this to have the ZyWALL use only the configured phase 1 key groups and
encryption and authentication algorithms when negotiating an IKE SA.
Associated The following table shows the policy(ies) you configure for this rule.
Network Policies To add a VPN policy, click the add network policy ( ) icon in the VPN Rules
(IKE) screen (see Figure 209 on page 360). Refer to Section 19.4 on page 367
for more information.
# This field displays the policy index number.
Name This field displays the policy name.
Local Network This field displays one or a range of IP address(es) of the computer(s) behind the
ZyWALL.
Remote Network This field displays one or a range of IP address(es) of the remote network behind
the remote IPsec router.
Edit Click this icon to open the screen where you can configure the network policy.
Delete Click this icon to remove the network policy.
Apply Click Apply to save your changes back to the ZyWALL.
Cancel Click Cancel to exit this screen without saving.
Figure 211 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy (continued)
LABEL DESCRIPTION
Port Forwarding If you are configuring a Many-to-One rule, click this button to go to a screen
Rules where you can configure port forwarding for your VPN tunnels. The VPN
network policy port forwarding rules let the ZyWALL forward traffic coming in
through the VPN tunnel to the appropriate IP address.
Type Select One-to-One to translate a single (static) IP address on your LAN to a
single virtual IP address.
Select Many-to-One to translate a range of (static) IP addresses on your LAN
to a single virtual IP address. Many-to-one rules are for traffic going out from
your LAN, through the VPN tunnel, to the remote network. Use port forwarding
rules to allow incoming traffic from the remote network.
Select Many One-to-One to translate a range of (static) IP addresses on your
LAN to a range of virtual IP addresses.
Private Starting IP Specify the IP addresses of the devices behind the ZyWALL that can use the
Address VPN tunnel.
When you select One-to-One in the Type field, enter the (static) IP address of a
computer on the LAN behind your ZyWALL.
When you select Many-to-One or Many One-to-One in the Type field, enter
the beginning (static) IP address in a range of computers on the LAN behind
your ZyWALL.
Private Ending IP When you select Many-to-One or Many One-to-One in the Type field, enter
Address the ending (static) IP address in a range of computers on the LAN behind your
ZyWALL.
Virtual Starting IP Enter the (static) IP addresses that represent the translated private IP
Address addresses. These must correspond to the remote IPSec router's configured
remote IP addresses.
When you select One-to-One or Many-to-One in the Type field, enter an IP
address as the translated IP address. Many-to-one rules are only for traffic
going to the remote network. Use port forwarding rules to allow incoming traffic
from the remote network.
When you select Many One-to-One in the Type field, enter the beginning IP
address of a range of translated IP addresses.
Virtual Ending IP When you select Many One-to-One in the Type field, enter the ending (static)
Address IP address of a range of translated IP addresses.
The size of the private address range must be equal to the size of the translated
virtual address range.
Local Network Specify the IP addresses of the devices behind the ZyWALL that can use the
VPN tunnel. The local IP addresses must correspond to the remote IPSec
router's configured remote IP addresses.
Two active SAs cannot have the local and remote IP address(es) both the
same. Two active SAs can have the same local or remote IP address, but not
both. You can configure multiple SAs between the same local and remote IP
addresses, as long as only one is active at any time.
Address Type Use the drop-down list box to choose Single Address, Range Address, or
Subnet Address. Select Single Address for a single IP address. Select
Range Address for a specific range of IP addresses. Select Subnet Address
to specify IP addresses on a network by their subnet mask.
Starting IP Address When the Address Type field is configured to Single Address, enter a (static)
IP address on the LAN behind your ZyWALL. When the Address Type field is
configured to Range Address, enter the beginning (static) IP address, in a
range of computers on the LAN behind your ZyWALL. When the Address Type
field is configured to Subnet Address, this is a (static) IP address on the LAN
behind your ZyWALL.
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy (continued)
LABEL DESCRIPTION
Ending IP Address/ When the Address Type field is configured to Single Address, this field is N/A.
Subnet Mask When the Address Type field is configured to Range Address, enter the end
(static) IP address, in a range of computers on the LAN behind your ZyWALL.
When the Address Type field is configured to Subnet Address, this is a
subnet mask on the LAN behind your ZyWALL.
Local Port 0 is the default and signifies any port. Type a port number from 0 to 65535 in the
Start and End fields. Some of the most common IP ports are: 21, FTP; 53,
DNS; 23, Telnet; 80, HTTP; 25, SMTP; 110, POP3.
Remote Network Specify the IP addresses of the devices behind the remote IPSec router that
can use the VPN tunnel. The remote IP addresses must correspond to the
remote IPSec router's configured local IP addresses.
Two active SAs cannot have the local and remote IP address(es) both the
same. Two active SAs can have the same local or remote IP address, but not
both. You can configure multiple SAs between the same local and remote IP
addresses, as long as only one is active at any time.
Address Type Use the drop-down list box to choose Single Address, Range Address, or
Subnet Address. Select Single Address with a single IP address. Select
Range Address for a specific range of IP addresses. Select Subnet Address
to specify IP addresses on a network by their subnet mask.
Starting IP Address When the Address Type field is configured to Single Address, enter a (static)
IP address on the network behind the remote IPSec router. When the Addr
Type field is configured to Range Address, enter the beginning (static) IP
address, in a range of computers on the network behind the remote IPSec
router. When the Address Type field is configured to Subnet Address, enter a
(static) IP address on the network behind the remote IPSec router.
Ending IP Address/ When the Address Type field is configured to Single Address, this field is N/A.
Subnet Mask When the Address Type field is configured to Range Address, enter the end
(static) IP address, in a range of computers on the network behind the remote
IPSec router. When the Address Type field is configured to Subnet Address,
enter a subnet mask on the network behind the remote IPSec router.
Remote Port 0 is the default and signifies any port. Type a port number from 0 to 65535 in the
Start and End fields. Some of the most common IP ports are: 21, FTP; 53,
DNS; 23, Telnet; 80, HTTP; 25, SMTP; 110, POP3.
IPSec Proposal
Encapsulation Mode Select Tunnel mode or Transport mode.
Active Protocol Select the security protocols used for an SA.
Both AH and ESP increase processing requirements and communications
latency (delay).
Encryption Algorithm Select which key size and encryption algorithm to use in this SA. Choices are:
NULL - no encryption key or algorithm
DES - a 56-bit key with the DES encryption algorithm
3DES - a 168-bit key with the DES encryption algorithm
AES - a 128/192/256-bit key with the AES encryption algorithm
The ZyWALL and the remote IPSec router must use the same algorithms and
keys. Longer keys require more processing power, resulting in increased
latency and decreased throughput.
Authentication Select which hash algorithm to use to authenticate packet data in the IPSec SA.
Algorithm Choices are SHA1 and MD5. SHA1 is generally considered stronger than MD5,
but it is also slower.
Table 102 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy (continued)
LABEL DESCRIPTION
SA Life Time Define the length of time before an IPSec SA automatically renegotiates in this
(Seconds) field. The minimum value is 180 seconds.
A short SA Life Time increases security by forcing the two VPN gateways to
update the encryption and authentication keys. However, every time the VPN
tunnel renegotiates, all users accessing remote resources are temporarily
disconnected.
Perfect Forward Select whether or not you want to enable Perfect Forward Secrecy (PFS) and, if
Secret (PFS) you do, which Diffie-Hellman key group to use for encryption. Choices are:
NONE - disable PFS
DH1 - enable PFS and use a 768-bit random number
DH2 - enable PFS and use a 1024-bit random number
DH5 - enable PFS and use a 1536-bit random number
PFS changes the root key that is used to generate encryption keys for each
IPSec SA. The longer the key, the more secure the encryption, but also the
longer it takes to encrypt and decrypt information. Both routers must use the
same DH key group.
Enable Replay As a VPN setup is processing intensive, the system is vulnerable to Denial of
Detection Service (DOS) attacks. The IPSec receiver can detect and reject old or
duplicate packets to protect against replay attacks. Enable replay detection by
selecting this check box.
Enable Multiple Select this to allow the ZyWALL to use any of its phase 2 encryption and
Proposals authentication algorithms when negotiating an IPSec SA.
When you enable multiple proposals, the ZyWALL allows the remote IPSec
router to select which phase 2 encryption and authentication algorithms to use
for the IPSec SA, even if they are less secure than the ones you configure for
the VPN rule.
Clear this to have the ZyWALL use only the configured phase 2 encryption and
authentication algorithms when negotiating an IPSec SA.
Apply Click Apply to save the changes.
Cancel Click Cancel to discard all changes and return to the main VPN screen.
Figure 212 SECURITY > VPN > VPN Rules (IKE) > Edit Network Policy > Port Forwarding
Figure 213 SECURITY > VPN > VPN Rules (IKE) > Move Network Policy
Table 105 SECURITY > VPN > VPN Rules (Manual) (continued)
LABEL DESCRIPTION
Encap. This field displays Tunnel or Transport mode (Tunnel is the default selection).
IPSec Algorithm This field displays the security protocols used for an SA.
Both AH and ESP increase ZyWALL processing requirements and
communications latency (delay).
Remote Gateway This is the static WAN IP address of the remote IPSec router.
Address
Modify Click the edit icon to edit the VPN policy.
Click the delete icon to remove the VPN policy. A window displays asking you to
confirm that you want to delete the VPN rule. When a VPN policy is deleted,
subsequent policies move up in the page list.
Add Click Add to add a new VPN policy.
Figure 215 SECURITY > VPN > VPN Rules (Manual) > Edit
Table 106 SECURITY > VPN > VPN Rules (Manual) > Edit (continued)
LABEL DESCRIPTION
Ending IP When the Address Type field is configured to Single Address, this field is N/A.
Address/Subnet When the Address Type field is configured to Range Address, enter the end
Mask (static) IP address, in a range of computers on the network behind the remote
IPSec router. When the Address Type field is configured to Subnet Address,
enter a subnet mask on the network behind the remote IPSec router.
Gateway Policy
Information
My ZyWALL When the ZyWALL is in router mode, enter the WAN IP address of your ZyWALL
or leave the field set to 0.0.0.0.
The ZyWALL uses its current WAN IP address (static or dynamic) in setting up the
VPN tunnel if you leave this field as 0.0.0.0. If the WAN connection goes down, the
ZyWALL uses the dial backup IP address for the VPN tunnel when using dial
backup or the LAN IP address when using traffic redirect.
The VPN tunnel has to be rebuilt if this IP address changes.
When the ZyWALL is in bridge mode, this field is read-only and displays the
ZyWALL’s IP address.
Primary Remote Type the WAN IP address of the IPSec router with which you're making the VPN
Gateway connection.
Manual Proposal
SPI Type a unique SPI (Security Parameter Index) from one to four characters long.
Valid Characters are "0, 1, 2, 3, 4, 5, 6, 7, 8, and 9".
Encapsulation Select Tunnel mode or Transport mode from the drop-down list box.
Mode
Active Protocol Select ESP if you want to use ESP (Encapsulation Security Payload). The ESP
protocol (RFC 2406) provides encryption as well as some of the services offered
by AH. If you select ESP here, you must select options from the Encryption
Algorithm and Authentication Algorithm fields (described next).
Select AH if you want to use AH (Authentication Header Protocol). The AH
protocol (RFC 2402) was designed for integrity, authentication, sequence integrity
(replay resistance), and non-repudiation but not for confidentiality, for which the
ESP was designed. If you select AH here, you must select options from the
Authentication Algorithm field (described next).
Encryption Select DES, 3DES or NULL from the drop-down list box.
Algorithm When DES is used for data communications, both sender and receiver must know
the Encryption Key, which can be used to encrypt and decrypt the message or to
generate and verify a message authentication code. The DES encryption
algorithm uses a 56-bit key. Triple DES (3DES) is a variation on DES that uses a
168-bit key. As a result, 3DES is more secure than DES. It also requires more
processing power, resulting in increased latency and decreased throughput.
Select NULL to set up a tunnel without encryption. When you select NULL, you do
not enter an encryption key.
Authentication Select SHA1 or MD5 from the drop-down list box. MD5 (Message Digest 5) and
Algorithm SHA1 (Secure Hash Algorithm) are hash algorithms used to authenticate packet
data. The SHA1 algorithm is generally considered stronger than MD5, but is
slower. Select MD5 for minimal security and SHA-1 for maximum security.
Encryption Key This field is applicable when you select ESP in the Active Protocol field above.
With DES, type a unique key 8 characters long. With 3DES, type a unique key 24
characters long. Any characters may be used, including spaces, but trailing
spaces are truncated.
Authentication Type a unique authentication key to be used by IPSec if applicable. Enter 16
Key characters for MD5 authentication or 20 characters for SHA-1 authentication. Any
characters may be used, including spaces, but trailing spaces are truncated.
Table 106 SECURITY > VPN > VPN Rules (Manual) > Edit (continued)
LABEL DESCRIPTION
Apply Click Apply to save your changes back to the ZyWALL.
Cancel Click Cancel to exit this screen without saving.
192.168.1.0/24 0.0.0.0
• Setting Local and Remote IP Address Conflict Resolution to The Local Network
has the ZyWALL X check if a packet’s destination is also at the local network before
forwarding the packet. If it is, the ZyWALL sends the traffic to the local network.
• Setting Local and Remote IP Address Conflict Resolution to The Remote
Network disables the checking for local network IP addresses.
IP Alias
You could have an IP alias network that overlaps with the VPN remote network (see Figure
218). For example, you have an IP alias network M (10.1.2.0/24) in ZyWALL X’s LAN. For
the VPN rule, you configure the VPN network as follows.
• Local IP address start: 192.168.1.1, end: 192.168.1.254
• Remote IP address start: 10.1.2.240, end: 10.1.2.254
• IP addresses 10.1.2.240 to 10.1.2.254 overlap.
In this case, if you want to send packets from network A to an overlapped IP (ex. 10.1.2.241)
that is in the IP alias network M, you have to set Local and Remote IP Address Conflict
Resolution to The Local Network.
See the following table and figure for an example where three telecommuters each use a
different VPN rule for a VPN connection with a ZyWALL located at headquarters. The
ZyWALL at headquarters (HQ in the figure) identifies each incoming SA by its ID type and
content and uses the appropriate VPN rule to establish the VPN connection.
The ZyWALL at headquarters can also initiate VPN connections to the telecommuters since it
can find the telecommuters by resolving their domain names.
Hub-and-spoke VPN reduces the number of VPN connections that you have to set up and
maintain in the network. Small office or telecommuter IPSec routers that support a limited
number of VPN tunnels are also able to use VPN to connect to more networks. Hub-and-spoke
VPN makes it easier for the hub router to manage the traffic between the spoke routers. If you
have the spoke routers access the Internet through the hub-and-spoke VPN tunnel, the hub
router can also provide content filtering, IDP, anti-spam and anti-virus protection for the spoke
routers.
You should not use a hub-and-spoke VPN in every situation, however. The hub router is a
single point of failure, so a hub-and-spoke VPN may not be appropriate if the connection
between the spoke routers cannot be down occasionally (for maintenance, for example). In
addition, there is a significant burden on the hub router. It receives VPN traffic from one
spoke, decrypts it, inspects it to find out where to send it, encrypts it, and sends it to the
appropriate spoke. Therefore, a hub-and-spoke VPN is more suitable when there is a minimum
amount of traffic between spoke routers.
• The hub router must have at least one separate VPN rule for each spoke. In the local IP
address, specify the IP addresses of the hub-and-spoke networks with which the spoke is
to be able to have a VPN tunnel. This may require you to use more than one VPN rule.
• If you want to have the spoke routers access the Internet through the hub-and-spoke VPN
tunnel, set the VPN rules in the spoke routers to use 0.0.0.0 (any) as the remote IP address.
• Make sure that your From VPN and To VPN firewall rules do not block the VPN packets.
IKE SA Proposal
The IKE SA proposal is used to identify the encryption algorithm, authentication algorithm,
and Diffie-Hellman (DH) key group that the ZyWALL and remote IPSec router use in the IKE
SA. In main mode, this is done in steps 1 and 2, as illustrated below.
Figure 225 IKE SA: Main Negotiation Mode, Steps 1 - 2: IKE SA Proposal
The ZyWALL sends one or more proposals to the remote IPSec router. (In some devices, you
can set up only one proposal.) Each proposal consists of an encryption algorithm,
authentication algorithm, and DH key group that the ZyWALL wants to use in the IKE SA.
The remote IPSec router selects an acceptable proposal and sends the accepted proposal back
to the ZyWALL. If the remote IPSec router rejects all of the proposals (for example, if the
VPN tunnel is not configured correctly), the ZyWALL and remote IPSec router cannot
establish an IKE SA.
" Both routers must use the same encryption algorithm, authentication
algorithm, and DH key group.
See the field descriptions for information about specific encryption algorithms, authentication
algorithms, and DH key groups. See Diffie-Hellman (DH) Key Exchange on page 389 for
more information about DH key groups.
Figure 226 IKE SA: Main Negotiation Mode, Steps 3 - 4: DH Key Exchange
The DH key exchange is based on DH key groups. Each key group is a fixed number of bits
long. The longer the key, the more secure the encryption keys, but also the longer it takes to
encrypt and decrypt information. For example, DH2 keys (1024 bits) are more secure than
DH1 keys (768 bits), but DH2 encryption keys take longer to encrypt and decrypt.
Authentication
Before the ZyWALL and remote IPSec router establish an IKE SA, they have to verify each
other’s identity. This process is based on pre-shared keys and router identities.
In main mode, the ZyWALL and remote IPSec router authenticate each other in steps 5 and 6,
as illustrated below. Their identities are encrypted using the encryption algorithm and
encryption key the ZyWALL and remote IPSec router selected in previous steps.
The ZyWALL and remote IPSec router use a pre-shared key in the authentication process,
though it is not actually transmitted or exchanged.
" The ZyWALL and the remote IPSec router must use the same pre-shared key.
Router identity consists of ID type and ID content. The ID type can be IP address, domain
name, or e-mail address, and the ID content is a specific IP address, domain name, or e-mail
address. The ID content is only used for identification; the IP address, domain name, or e-mail
address that you enter does not have to actually exist.
The ZyWALL and the remote IPSec router each has its own identity, so each one must store
two sets of information, one for itself and one for the other router. Local ID type and ID
content refers to the ID type and ID content that applies to the router itself, and peer ID type
and ID content refers to the ID type and ID content that applies to the other router in the IKE
SA.
" The ZyWALL’s local and peer ID type and ID content must match the remote
IPSec router’s peer and local ID type and ID content, respectively.
In the following example, the ID type and content match so the ZyWALL and the remote
IPSec router authenticate each other successfully.
Table 111 VPN Example: Matching ID Type and Content
ZYWALL REMOTE IPSEC ROUTER
Local ID type: E-mail Local ID type: IP
Local ID content: [email protected] Local ID content: 1.1.1.2
Peer ID type: IP Peer ID type: E-mail
Peer ID content: 1.1.1.2 Peer ID content: [email protected]
In the following example, the ID type and content do not match so the authentication fails and
the ZyWALL and the remote IPSec router cannot establish an IKE SA.
Table 112 VPN Example: Mismatching ID Type and Content
ZYWALL REMOTE IPSEC ROUTER
Local ID type: E-mail Local ID type: IP
Local ID content: [email protected] Local ID content: 1.1.1.2
Peer ID type: IP Peer ID type: E-mail
Peer ID content: 1.1.1.15 Peer ID content: [email protected]
It is also possible to configure the ZyWALL to ignore the identity of the remote IPSec router.
In this case, you usually set the peer ID type to Any. This is not as secure as other peer ID
types, however.
Certificates
It is also possible for the ZyWALL and remote IPSec router to authenticate each other with
certificates. In this case, the authentication process is different.
• Instead of using the pre-shared key, the ZyWALL and remote IPSec router check each
other’s certificates.
• The local ID type and ID content come from the certificate. On the ZyWALL, you simply
select which certificate to use.
• If you set the peer ID type to Any, the ZyWALL authenticates the remote IPSec router
using the trusted certificates and trusted CAs you have set up. Alternatively, if you want to
use a specific certificate to authenticate the remote IPSec router, you can use the
information in the certificate to specify the peer ID type and ID content.
" You must set up the certificates for the ZyWALL and remote IPSec router
before you can use certificates in IKE SA. See Chapter 20 on page 399 for
more information about certificates.
Extended Authentication
Extended authentication is often used when multiple IPSec routers use the same VPN tunnel to
connect to a single IPSec router. For example, this might be used with telecommuters.
Extended authentication occurs right after the authentication described in Authentication on
page 389.
In extended authentication, one of the routers (the ZyWALL or the remote IPSec router)
provides a user name and password to the other router, which uses a local user database and/or
an external server to verify the user name and password. If the user name or password is
wrong, the routers do not establish an IKE SA.
You can set up the ZyWALL to provide a user name and password to the remote IPSec router,
or you can set up the ZyWALL to check a user name and password that is provided by the
remote IPSec router.
Negotiation Mode
There are two negotiation modes: main mode and aggressive mode. Main mode provides
better security, while aggressive mode is faster.
Main mode takes six steps to establish an IKE SA.
Steps 1-2: The ZyWALL sends its proposals to the remote IPSec router. The remote IPSec
router selects an acceptable proposal and sends it back to the ZyWALL.
Steps 3-4: The ZyWALL and the remote IPSec router participate in a Diffie-Hellman key
exchange, based on the accepted DH key group, to establish a shared secret.
Steps 5-6: Finally, the ZyWALL and the remote IPSec router generate an encryption key from
the shared secret, encrypt their identities, and exchange their encrypted identity information
for authentication.
In contrast, aggressive mode only takes three steps to establish an IKE SA.
Step 1: The ZyWALL sends its proposals to the remote IPSec router. It also starts the Diffie-
Hellman key exchange and sends its (unencrypted) identity to the remote IPSec router for
authentication.
Step 2: The remote IPSec router selects an acceptable proposal and sends it back to the
ZyWALL. It also finishes the Diffie-Hellman key exchange, authenticates the ZyWALL, and
sends its (unencrypted) identity to the ZyWALL for authentication.
Step 3: The ZyWALL authenticates the remote IPSec router and confirms that the IKE SA is
established.
Aggressive mode does not provide as much security as main mode because the identity of the
ZyWALL and the identity of the remote IPSec router are not encrypted. It is usually used
when the address of the initiator is not known by the responder and both parties want to use
pre-shared keys for authentication (for example, telecommuters).
If router A does NAT, it might change the IP addresses, port numbers, or both. If router X and
router Y try to establish a VPN tunnel, the authentication fails because it depends on this
information. The routers cannot establish a VPN tunnel.
Most routers like router A now have an IPSec pass-through feature. This feature helps router A
recognize VPN packets and route them appropriately. If router A has this feature, router X and
router Y can establish a VPN tunnel as long as the active protocol is ESP. (See Active Protocol
on page 394 for more information about active protocols.)
If router A does not have an IPSec pass-through or if the active protocol is AH, you can solve
this problem by enabling NAT traversal. In NAT traversal, router X and router Y add an extra
header to the IKE SA and IPSec SA packets. If you configure router A to forward these
packets unchanged, router X and router Y can establish a VPN tunnel.
You have to do the following things to set up NAT traversal.
• Enable NAT traversal on the ZyWALL and remote IPSec router.
• Configure the NAT router to forward packets with the extra header unchanged. (See the
field description for detailed information about the extra header.)
The extra header may be UDP port 500 or UDP port 4500, depending on the standard(s) the
ZyWALL and remote IPSec router support.
IPSec SA Overview
Once the ZyWALL and remote IPSec router have established the IKE SA, they can securely
negotiate an IPSec SA through which to send data between computers on the networks.
" The IPSec SA stays connected even if the underlying IKE SA is not available
anymore.
" It is not recommended to set a VPN rule’s local and remote network settings
both to 0.0.0.0 (any).
In most cases you should use virtual address mapping (see Virtual Address Mapping on page
393) to avoid overlapping local and remote network IP addresses. See Section 19.10 on page
379 for how the ZyWALL handles overlapping local and remote network IP addresses.
Active Protocol
The active protocol controls the format of each packet. It also specifies how much of each
packet is protected by the encryption and authentication algorithms. IPSec VPN includes two
active protocols, AH (Authentication Header, RFC 2402) and ESP (Encapsulating Security
Payload, RFC 2406).
Usually, you should select ESP. AH does not support encryption, and ESP is more suitable
with NAT.
Encapsulation
There are two ways to encapsulate packets. Usually, you should use tunnel mode because it is
more secure. Transport mode is only used when the IPSec SA is used for communication
between the ZyWALL and remote IPSec router (for example, for remote management), not
between computers on the local and remote networks.
These modes are illustrated below.
Figure 230 VPN: Transport and Tunnel Mode Encapsulation
In tunnel mode, the ZyWALL uses the active protocol to encapsulate the entire IP packet. As a
result, there are two IP headers:
• Outside header: The outside IP header contains the IP address of the ZyWALL or remote
IPSec router, whichever is the destination.
• Inside header: The inside IP header contains the IP address of the computer behind the
ZyWALL or remote IPSec router. The header for the active protocol (AH or ESP) appears
between the IP headers.
In transport mode, the encapsulation depends on the active protocol. With AH, the ZyWALL
includes part of the original IP header when it encapsulates the packet. With ESP, however,
the ZyWALL does not include the IP header when it encapsulates the packet, so it is not
possible to verify the integrity of the source IP address.
SA Life Time
SAs have a lifetime that specifies how long the SA lasts until it times out. When an SA times
out, the ZyWALL automatically renegotiates the SA in the following situations:
• There is traffic when the SA life time expires
• The IPSec SA is configured on the ZyWALL as nailed up (see below)
Otherwise, the ZyWALL must re-negotiate the SA the next time someone wants to send
traffic.
" If the IKE SA times out while an IPSec SA is connected, the IPSec SA stays
connected.
An IPSec SA can be set to nailed up. Normally, the ZyWALL drops the IPSec SA when the
life time expires or after two minutes of outbound traffic with no inbound traffic. If you set the
IPSec SA to nailed up, the ZyWALL automatically renegotiates the IPSec SA when the SA
life time expires, and it does not drop the IPSec SA if there is no inbound traffic.
" The SA life time and nailed up settings only apply if the rule identifies the
remote IPSec router by a static IP address or a domain name. If the Primary
Remote Gateway field is set to 0.0.0.0, the ZyWALL cannot initiate the tunnel
(and cannot renegotiate the SA).
When setting up an IPSec high availability VPN tunnel, the remote IPSec router:
• Must have multiple WAN connections
• Only needs one corresponding IPSec rule
• Should only have IPSec high availability settings in its corresponding IPSec rule if your
ZyWALL has multiple WAN connections
• Should ideally identify itself by a domain name or dynamic domain name (it must
otherwise have My Address set to 0.0.0.0)
• Should use a WAN connectivity check to this ZyWALL’s WAN IP address
If the remote IPSec router is not a ZyWALL, you may also want to avoid setting the IPSec rule
to nailed up.
20.1 Overview
The ZyWALL can use certificates (also called digital IDs) to authenticate users. Certificates
are based on public-private key pairs. A certificate contains the certificate owner’s identity and
public key. Certificates provide a way to exchange public keys for use in authentication.
Advantages of Certificates
Certificates offer the following benefits.
• The ZyWALL only has to store the certificates of the certification authorities that you
decide to trust, no matter how many devices you need to authenticate.
• Key distribution is simple and very secure since you can freely distribute public keys and
you never need to transmit private keys.
Self-signed Certificates
You can have the ZyWALL act as a certification authority and sign its own certificates.
3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab
and scroll down to the Thumbprint Algorithm and Thumbprint fields.
4 Use a secure method to verify that the certificate owner has the same information in the
Thumbprint Algorithm and Thumbprint fields. The secure method may very based
on your situation. Possible examples would be over the telephone or through an HTTPS
connection.
Table 114 SECURITY > CERTIFICATES > My Certificates > Details (continued)
LABEL DESCRIPTION
Issuer This field displays identifying information about the certificate’s issuing
certification authority, such as Common Name, Organizational Unit,
Organization and Country.
With self-signed certificates, this is the same as the Subject Name field.
Signature Algorithm This field displays the type of algorithm that was used to sign the certificate. The
ZyWALL uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and
the SHA1 hash algorithm). Some certification authorities may use rsa-pkcs1-
md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid From This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not
yet become applicable.
Valid To This field displays the date that the certificate expires. The text displays in red
and includes an Expiring! or Expired! message if the certificate is about to expire
or has already expired.
Key Algorithm This field displays the type of algorithm that was used to generate the
certificate’s key pair (the ZyWALL uses RSA encryption) and the length of the
key set in bits (1024 bits for example).
Subject Alternative This field displays the certificate owner‘s IP address (IP), domain name (DNS)
Name or e-mail address (EMAIL).
Key Usage This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
MD5 Fingerprint This is the certificate’s message digest that the ZyWALL calculated using the
MD5 algorithm.
SHA1 Fingerprint This is the certificate’s message digest that the ZyWALL calculated using the
SHA1 algorithm.
Certificate in PEM This read-only text box displays the certificate or certification request in Privacy
(Base-64) Encoded Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
Format binary certificate into a printable form.
You can copy and paste a certification request into a certification authority’s web
page, an e-mail that you send to the certification authority or a text editor and
save the file on a management computer for later manual enrollment.
You can copy and paste a certificate into an e-mail to send to friends or
colleagues or you can copy and paste a certificate into a text editor and save the
file on a management computer for later distribution (via floppy disk for
example).
Apply Click Apply to save your changes back to the ZyWALL. You can only change
the name, except in the case of a self-signed certificate, which you can also set
to be the default self-signed certificate that signs the imported trusted remote
host certificates.
Cancel Click Cancel to quit and return to the My Certificates screen.
" Remove any spaces from the certificate’s filename before you import it.
" Be careful not to convert a binary file to text during the transfer process. It is
easy for this to occur since many programs use text files by default.
When you import a binary PKCS#12 format certificate, another screen displays for you to
enter the password.
Figure 238 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
Figure 239 SECURITY > CERTIFICATES > My Certificates > Create (Basic)
Figure 240 SECURITY > CERTIFICATES > My Certificates > Create (Advanced)
Table 118 SECURITY > CERTIFICATES > My Certificates > Create (continued)
LABEL DESCRIPTION
Common Name Select a radio button to identify the certificate’s owner by IP address, domain
name or e-mail address. Type the IP address (in dotted decimal notation),
domain name or e-mail address in the field provided. The domain name or e-
mail address can be up to 31 ASCII characters. The domain name or e-mail
address is for identification purposes only and can be any string.
Organizational Unit Type up to 63 characters to identify the organizational unit or department to
which the certificate owner belongs. You may use any character, including
spaces, but the ZyWALL drops trailing spaces.
Organization Type up to 63 characters to identify the company or group to which the
certificate owner belongs. You may use any character, including spaces, but
the ZyWALL drops trailing spaces.
Country Type up to 63 characters to identify the nation where the certificate owner is
located. You may use any character, including spaces, but the ZyWALL drops
trailing spaces.
The fields below display when you click Advanced >>.
Subject Name You must configure at least one of these fields.
Select an item from the drop-down list box and enter the corresponding
information in the field to the right.
SN (serial number) - select this and enter the certificate’s identification
number, such as the ZyWALL’s MAC address. You can use up to 63
characters.
CN (common name) - select this and enter a name to identify the owner of the
certificate. You can use up to 63 characters.
OU (organizational unit) - select this and enter a unit within the organization
to identify the owner of the certificate. You can use up to 63 characters.
O (organization) - select this and enter an organization to identify the owner
of the certificate. You can use up to 63 characters.
DC (domain component) - select this and enter the domain component of a
domain to identify the owner of the certificate. For example, if the domain is
zyxel.com, the domain component is “zyxel” or “com”. You can use up to 63
characters.
L (locality name) - select this and enter the place where the owner of the
certificate resides, such as a city or county. You can use up to 63 characters.
ST (state or province name) - select this and enter the state or province in
which the owner of the certificate resides. You can use up to 63 characters.
C (country) - select this and enter the name of the country at which the owner
of the certificate resides. You can use up to 63 characters.
unstructuredName (PKCS 9 unname) - select this and enter the name of the
owner of the certificate as an unstructured ASCII string. You can use up to 63
characters. Check with the certificate’s issuing certification authority for their
interpretation in this field if you select to apply to a certification authority for a
certificate.
unstructuredAddress (PKCS 9 unaddr) - select this and enter the address
of the owner of the certificate as an unstructured ASCII string. You can use up
to 63 characters. Check with the certificate’s issuing certification authority for
their interpretation in this field if you select to apply to a certification authority
for a certificate.
MAILTO (PKCS 9 email address) - select this and enter the email address of
the owner of the certificate. You can use up to 63 characters. Check with the
certificate’s issuing certification authority for their interpretation in this field if
you select to apply to a certification authority for a certificate.
Table 118 SECURITY > CERTIFICATES > My Certificates > Create (continued)
LABEL DESCRIPTION
Subject Alternative Select a radio button to identify the certificate’s owner by IP address, domain
Name name or e-mail address. Type the IP address (in dotted decimal notation),
domain name or e-mail address in the field provided. The domain name or e-
mail address can be up to 31 ASCII characters. The domain name or e-mail
address is for identification purposes only and can be any string.
Key Length Select a number from the drop-down list box to determine how many bits the
key should use (512 to 2048). The longer the key, the more secure it is. A
longer key also uses more PKI storage space.
<< Basic/Advanced Click << Basic to configure basic subject information. Click Advanced >> to
>> configure more subject information for a certificate.
Enrollment Options These radio buttons deal with how and when the certificate is to be generated.
Create a self-signed Select Create a self-signed certificate to have the ZyWALL generate the
certificate certificate and act as the Certification Authority (CA) itself. This way you do not
need to apply to a certification authority for certificates.
Create a certification Select Create a certification request and save it locally for later manual
request and save it enrollment to have the ZyWALL generate and store a request for a certificate.
locally for later Use the My Certificate Details screen to view the certification request and
manual enrollment copy it to send to the certification authority.
Copy the certification request from the My Certificate Details screen (see
Section 20.2.1 on page 403) and then send it to the certification authority.
Create a certification Select Create a certification request and enroll for a certificate
request and enroll for immediately online to have the ZyWALL generate a request for a certificate
a certificate and apply to a certification authority for a certificate.
immediately online You must have the certification authority’s certificate already imported in the
Trusted CAs screen.
When you select this option, you must select the certification authority’s
enrollment protocol and the certification authority’s certificate from the drop-
down list boxes and enter the certification authority’s server address. You also
need to fill in the Reference Number and Key if the certification authority
requires them.
Enrollment Protocol Select the certification authority’s enrollment protocol from the drop-down list
box.
Simple Certificate Enrollment Protocol (SCEP) is a TCP-based enrollment
protocol that was developed by VeriSign and Cisco.
Certificate Management Protocol (CMP) is a TCP-based enrollment protocol
that was developed by the Public Key Infrastructure X.509 working group of
the Internet Engineering Task Force (IETF) and is specified in RFC 2510.
CA Server Address Enter the IP address (or URL) of the certification authority server.
CA Certificate Select the certification authority’s certificate from the CA Certificate drop-
down list box.
You must have the certification authority’s certificate already imported in the
Trusted CAs screen. Click Trusted CAs to go to the Trusted CAs screen
where you can view (and manage) the ZyWALL's list of certificates of trusted
certification authorities.
Enrollment via an RA If you select Create a certification request and enroll for a certificate
immediately online, you can select this option to apply for a certificate
through a RA (Registration Authority). The RA is an intermediary authorized by
a CA to verify each subscriber’s identity and forward the requests to the CA.
After the CA signs and issues the certificates, the RA distributes the
certificates to the subscribers.
Table 118 SECURITY > CERTIFICATES > My Certificates > Create (continued)
LABEL DESCRIPTION
RA Signing Certificate If you select Enrollment via an RA, select the CA’s RA signing certificate from
the drop-down list box. You must have the certificate already imported in the
Trusted CAs screen.
Click Trusted CAs to go to the Trusted CAs screen where you can view (and
manage) the ZyWALL's list of certificates of trusted certification authorities.
RA Encryption If you select Enrollment via an RA, select the CA’s RA encryption certificate
Certificate from the drop-down list box. You must have the certificate already imported in
the Trusted CAs screen.
Click Trusted CAs to go to the Trusted CAs screen where you can view (and
manage) the ZyWALL's list of certificates of trusted certification authorities.
Request When you select Create a certification request and enroll for a certificate
Authentication immediately online, the certification authority may want you to include a
reference number and key to identify you when you send a certification
request. Fill in both the Reference Number and the Key fields if your
certification authority uses CMP enrollment protocol. Just fill in the Key field if
your certification authority uses the SCEP enrollment protocol.
Reference Number Enter the reference number that the certification authority gave you. You can
use up to 31 ASCII printable characters. Spaces are allowed.
Key Type the key that the certification authority gave you. You can use up to 31
ASCII printable characters. Spaces are allowed.
Apply Click Apply to begin certificate or certification request generation.
Cancel Click Cancel to quit and return to the My Certificates screen.
• After you click Apply in the My Certificate Create screen, you see a screen that tells you
the ZyWALL is generating the self-signed certificate or certification request.
• After the ZyWALL successfully enrolls a certificate or generates a certification request or
a self-signed certificate, you see a screen with a Return button that takes you back to the
My Certificates screen.
• If you configured the My Certificate Create screen to have the ZyWALL enroll a
certificate and the certificate enrollment is not successful, you see a screen with a Return
button that takes you back to the My Certificate Create screen. Click Return and check
your information in the My Certificate Create screen. Make sure that the certification
authority information is correct and that your Internet connection is working properly if
you want the ZyWALL to enroll a certificate online.
Figure 242 SECURITY > CERTIFICATES > Trusted CAs > Details
Table 120 SECURITY > CERTIFICATES > Trusted CAs > Details (continued)
LABEL DESCRIPTION
Certification Path Click the Refresh button to have this read-only text box display the end entity’s
certificate and a list of certification authority certificates that shows the hierarchy
of certification authorities that validate the end entity’s certificate. If the issuing
certification authority is one that you have imported as a trusted certification
authority, it may be the only certification authority in the list (along with the end
entity’s own certificate). The ZyWALL does not trust the end entity’s certificate
and displays “Not trusted” in this field if any certificate on the path has expired or
been revoked.
Refresh Click Refresh to display the certification path.
Certificate These read-only fields display detailed information about the certificate.
Information
Type This field displays general information about the certificate. CA-signed means
that a Certification Authority signed the certificate. Self-signed means that the
certificate’s owner signed the certificate (not a certification authority). X.509
means that this certificate was created and signed according to the ITU-T X.509
recommendation that defines the formats for public-key certificates.
Version This field displays the X.509 version number.
Serial Number This field displays the certificate’s identification number given by the certification
authority.
Subject This field displays information that identifies the owner of the certificate, such as
Common Name (CN), Organizational Unit (OU), Organization (O) and Country
(C).
Issuer This field displays identifying information about the certificate’s issuing
certification authority, such as Common Name, Organizational Unit,
Organization and Country.
With self-signed certificates, this is the same information as in the Subject
Name field.
Signature Algorithm This field displays the type of algorithm that was used to sign the certificate.
Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key
encryption algorithm and the SHA1 hash algorithm). Other certification
authorities may use rsa-pkcs1-md5 (RSA public-private key encryption
algorithm and the MD5 hash algorithm).
Valid From This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not
yet become applicable.
Valid To This field displays the date that the certificate expires. The text displays in red
and includes an Expiring! or Expired! message if the certificate is about to expire
or has already expired.
Key Algorithm This field displays the type of algorithm that was used to generate the
certificate’s key pair (the ZyWALL uses RSA encryption) and the length of the
key set in bits (1024 bits for example).
Subject Alternative This field displays the certificate’s owner‘s IP address (IP), domain name (DNS)
Name or e-mail address (EMAIL).
Key Usage This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
Table 120 SECURITY > CERTIFICATES > Trusted CAs > Details (continued)
LABEL DESCRIPTION
CRL Distribution This field displays how many directory servers with Lists of revoked certificates
Points the issuing certification authority of this certificate makes available. This field
also displays the domain names or IP addresses of the servers.
MD5 Fingerprint This is the certificate’s message digest that the ZyWALL calculated using the
MD5 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
SHA1 Fingerprint This is the certificate’s message digest that the ZyWALL calculated using the
SHA1 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
Certificate in PEM This read-only text box displays the certificate or certification request in Privacy
(Base-64) Encoded Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
Format binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Apply Click Apply to save your changes back to the ZyWALL. You can only change
the name and/or set whether or not you want the ZyWALL to check the CRL that
the certification authority issues before trusting a certificate issued by the
certification authority.
Cancel Click Cancel to quit and return to the Trusted CAs screen.
" You must remove any spaces from the certificate’s filename before you can
import the certificate.
Figure 243 SECURITY > CERTIFICATES > Trusted CAs > Import
" The trusted remote host certificate must be a self-signed certificate; and you
must remove any spaces from its filename before you can import it.
Figure 245 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
Figure 246 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
Table 124 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details (continued)
LABEL DESCRIPTION
MD5 Fingerprint This is the certificate’s message digest that the ZyWALL calculated using the
MD5 algorithm. The ZyWALL uses one of its own self-signed certificates to
sign the imported trusted remote host certificates. This changes the fingerprint
value displayed here (so it does not match the original). See Section 20.1.3 on
page 400 for how to verify a remote host’s certificate before you import it into
the ZyWALL.
SHA1 Fingerprint This is the certificate’s message digest that the ZyWALL calculated using the
SHA1 algorithm. The ZyWALL uses one of its own self-signed certificates to
sign the imported trusted remote host certificates. This changes the fingerprint
value displayed here (so it does not match the original). See Section 20.1.3 on
page 400 for how to verify a remote host’s certificate before you import it into
the ZyWALL.
Certificate in PEM This read-only text box displays the certificate or certification request in Privacy
(Base-64) Encoded Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
Format binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Apply Click Apply to save your changes back to the ZyWALL. You can only change
the name of the certificate.
Cancel Click Cancel to quit configuring this screen and return to the Trusted Remote
Hosts screen.
Figure 248 SECURITY > CERTIFICATES > Directory Server > Add
21.1 Overview
This chapter discusses how to configure the ZyWALL’s authentication server feature.
A ZyWALL set to be a VPN extended authentication server can use either the local user
database internal to the ZyWALL or an external RADIUS server for an unlimited number of
users. The ZyWALL uses the same local user database for VPN extended authentication and
wireless LAN security.
RADIUS
The ZyWALL can use an external RADIUS server to authenticate an unlimited number of
users. RADIUS is based on a client-server model that supports authentication and accounting,
where access point is the client and the server is the RADIUS server.
• Authentication
Determines the identity of the users.
• Accounting
Keeps track of the client’s network activity.
RADIUS user is a simple package exchange in which your ZyWALL acts as a message relay
between the wireless station and the network RADIUS server.
Figure 249 SECURITY > AUTH SERVER > Local User Database
433
434
CHAPTER 22
Network Address Translation
(NAT)
22.1 Overview
NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a
host in a packet. For example, the source address of an outgoing packet, used within one
network is changed to a different IP address known within another network.
" Port numbers do not change for One-to-One and Many-One-to-One NAT
mapping types.
The copy button is best suited for initial NAT configuration where you have
configured NAT port forwarding or trigger port rules for one interface and want to
use similar rules for the other WAN interface. You can use the other NAT screens to
edit the NAT rules after you copy them from one WAN interface to the other.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
Use this screen to change your ZyWALL’s address mapping settings. Not all fields are
available on all models.
Ordering your rules is important because the ZyWALL applies the rules in the order that you
specify. When a rule matches the current packet, the ZyWALL takes the corresponding action
and the remaining rules are ignored. If there are any empty rules before your new configured
rule, your configured rule will be pushed up by that number of empty rules. For example, if
you have already configured rules 1 to 6 in your current set and now you configure rule
number 9. In the set summary screen, the new rule will be rule 7, not 9. Now if you delete rule
4, rules 5 to 7 will be pushed up by 1 rule, so old rules 5, 6 and 7 become new rules 4, 5 and 6.
Figure 253 ADVANCED > NAT > Address Mapping > Edit
" If you do not assign a Default Server IP address, the ZyWALL discards all
packets received for ports that are not specified here or in the remote
management setup.
" In this example, anyone wanting to access server A from the Internet must use
port 8080. Anyone wanting to access server B from the Internet must use port
8100.
" If you do not assign a Default Server IP address, the ZyWALL discards all
packets received for ports that are not specified here or in the remote
management setup.
Refer to Appendix B on page 783 for port numbers commonly used for particular services.
" The last port forwarding rule is reserved for Roadrunner services. The rule is
activated only when you set the WAN Encapsulation to Ethernet and the
Service Type to something other than Standard.
1 Jane (A) requests a file from the Real Audio server (port 7070).
2 Port 7070 is a “trigger” port and causes the ZyWALL to record Jane’s computer IP
address. The ZyWALL associates Jane's computer IP address with the "incoming" port
range of 6970-7170.
3 The Real Audio server responds using a port number ranging between 6970-7170.
4 The ZyWALL forwards the traffic to Jane’s computer IP address.
5 Only Jane can connect to the Real Audio server until the connection is closed or times
out. The ZyWALL times out in three minutes with UDP (User Datagram Protocol) or
two hours with TCP/IP (Transfer Control Protocol/Internet Protocol).
NAT Application
The following figure illustrates a possible NAT application, where three inside LANs (logical
LANs using IP Alias) behind the ZyWALL can communicate with three distinct WAN
networks. More examples follow at the end of this chapter.
23.1 Overview
This chapter shows you how to configure static routes for your ZyWALL.
The ZyWALL usually uses the default gateway to route outbound traffic from local computers
to the Internet. To have the ZyWALL send data to devices not reachable through the default
gateway, use static routes.
For example, the next figure shows a computer (A) connected to the ZyWALL’s LAN
interface. The ZyWALL routes most traffic from A to the Internet through the default gateway
(R1). You create one static route to connect to services offered by your ISP behind router R2.
You create another static route to communicate with a separate network behind a router (R3)
connected to the LAN.
A R1
INTERNET
LAN WAN
R3
R2
• Use the IP Static Route Edit screen (Section 23.2.1 on page 454) to configure the
required information for a static route.
Figure 264 ADVANCED > STATIC ROUTE > IP Static Route > Edit
Table 136 ADVANCED > STATIC ROUTE > IP Static Route > Edit
LABEL DESCRIPTION
Private This parameter determines if the ZyWALL will include this route to a remote node in
its RIP broadcasts.
Select this check box to keep this route private and not included in RIP broadcasts.
Clear this check box to propagate this route to other hosts through RIP broadcasts.
Apply Click Apply to save your changes back to the ZyWALL.
Cancel Click Cancel to exit this screen without saving.
24.1 Overview
This chapter covers setting and applying policies used for IP routing.
Traditionally, routing is based on the destination address only and the ZyWALL takes the
shortest path to forward a packet. IP Policy Routing (IPPR) provides a mechanism to override
the default routing behavior and alter the packet forwarding based on the policy defined by the
network administrator. Policy-based routing is applied to incoming packets on a per interface
basis, prior to the normal routing.
Benefits
• Source-Based Routing – Network administrators can use policy-based routing to direct
traffic from different users through different connections.
• Quality of Service (QoS) – Organizations can differentiate traffic by setting the
precedence or ToS (Type of Service) values in the IP header at the periphery of the
network to enable the backbone to prioritize traffic.
• Cost Savings – IPPR allows organizations to distribute interactive traffic on high-
bandwidth, high-cost paths while using low-cost paths for batch traffic.
• Load Sharing – Network administrators can use IPPR to distribute traffic among multiple
paths.
Routing Policy
Individual routing policies are used as part of the overall IPPR process. A policy defines the
matching criteria and the action to take when a packet meets the criteria. The action is taken
only when all the criteria are met. The criteria include the source address and port, IP protocol
(ICMP, UDP, TCP, etc.), destination address and port, ToS and precedence (fields in the IP
header) and length. The inclusion of length criterion is to differentiate between interactive and
bulk traffic. Interactive applications, e.g., telnet, tend to have short packets, while bulk traffic,
e.g., file transfer, tends to have large packets.
The actions that can be taken include:
• Routing the packet to a different gateway (and hence the outgoing interface).
• Setting the ToS and precedence fields in the IP header.
IPPR follows the existing packet filtering facility of RAS in style and in implementation.
Figure 265 ADVANCED > POLICY ROUTE > Policy Route Summary
Table 137 ADVANCED > POLICY ROUTE > Policy Route Summary
LABEL DESCRIPTION
Gateway Enter the IP address of the gateway. The gateway is a router or switch on the same
network segment as the device's LAN or WAN port. The gateway helps forward
packets to their destinations.
Protocol This is the IP protocol and can be ALL(0), ICMP(1), IGMP(2), TCP(6), UDP(17),
GRE(47), ESP(50) or AH(51).
Action This field specifies whether action should be taken on criteria Matched or Not
Matched.
Modify Click the edit icon to go to the screen where you can edit the routing policy on the
ZyWALL.
Click the delete icon to remove an existing routing policy from the ZyWALL. A
window display asking you to confirm that you want to delete the routing policy.
Move Type a policy route's index number and the number for where you want to put that
rule. Click Move to move the rule to the number that you typed.
The ordering of your rules is important as they are applied in order of their
numbering.
Note: If you select H.323, make sure you also use the ALG screen
to turn on the H.323 ALG.
Note: If you select SIP, make sure you also use the ALG screen to
turn on the SIP ALG.
Source
Interface Use the check box to select LAN, DMZ, WAN 1, WAN 2 and/or WLAN.
Starting IP Enter the source starting IP address.
Address
Ending IP Enter the source ending IP address.
Address
Starting Port Enter the source starting port number. This field is applicable only when you select
TCP or UDP in the IP Protocol field and Custom in the Application field.
Ending Port Enter the source ending port number. This field is applicable only when you select
TCP or UDP in the IP Protocol field and Custom in the Application field.
Destination
Starting IP Enter the destination starting IP address.
Address
Ending IP Enter the destination ending IP address.
Address
Starting Port Enter the destination starting port number. This field is applicable only when you
select TCP or UDP in the IP Protocol field and Custom in the Application field.
Ending Port Enter the destination ending port number. This field is applicable only when you
select TCP or UDP in the IP Protocol field and Custom in the Application field.
Action Applies to Specifies whether action should be taken on criteria Matched or Not Matched.
Routing Action
25.1 Overview
Bandwidth management allows you to allocate an interface’s outgoing capacity to specific
types of traffic. It can also help you make sure that the ZyWALL forwards certain types of
traffic, such as Voice-over-IP (VoIP), with minimum delay.
Bandwidth management addresses questions such as:
• Who gets how much access to specific applications?
• What priority level should you give to each type of traffic?
• Which traffic must have guaranteed delivery?
• How much bandwidth should be allotted to guarantee delivery?
Bandwidth management also allows you to configure the allowed output for an interface to
match what the network can handle. This helps reduce delays and dropped packets at the next
routing device. For example, you can set the WAN interface speed to 1024 kbps (or less) if the
broadband device connected to the WAN port has an upstream speed of 1024 kbps.
If you use VoIP and OpenPhone at the same time, the device allocates up to 500 Kbps of
bandwidth to each of them before it allocates any bandwidth to FTP. As a result, FTP can only
use bandwidth when VoIP and OpenPhone do not use all of their allocated bandwidth.
Suppose you try to browse the web too. In this case, VoIP, OpenPhone and FTP all have
higher priority, so they get to use the bandwidth first. You can only browse the web when
VoIP, OpenPhone, and FTP do not use all 1000 Kbps of available bandwidth.
Bandwidth Class
Enable bandwidth management on an interface and set the maximum allowed bandwidth for
that interface.
You can configure up to one bandwidth filter per bandwidth class. You can also configure
bandwidth classes without bandwidth filters. However, it is recommended that you configure
sub-classes with filters for any classes that you configure without filters. The ZyWALL leaves
the bandwidth budget allocated and unused for a class that does not have a filter or sub-classes
with filters.
The total of the configured bandwidth budgets for sub-classes cannot exceed the configured
bandwidth budget speed of the parent class.
Note: The WLAN class refers to the Ethernet interfaces in the WLAN
port role. The ZyWALL does not apply bandwidth
management to an installed wireless card's traffic.
The ZyWALL divides up the unbudgeted 2048 kbps among the classes that require more
bandwidth. If the administration department only uses 1024 kbps of the budgeted 2048 kbps,
the ZyWALL also divides the remaining 1024 kbps among the classes that require more
bandwidth. Therefore, the ZyWALL divides a total of 3072 kbps of unbudgeted and unused
bandwidth among the classes that require more bandwidth.
Suppose that all of the classes except for the administration class need more bandwidth.
• Each class gets up to its budgeted bandwidth. The administration class only uses 1024
kbps of its budgeted 2048 kbps.
• The sales and marketing are first to get extra bandwidth because they have the highest
priority (6). If they each require 1536 kbps or more of extra bandwidth, the ZyWALL
divides the total 3072 kbps total of unbudgeted and unused bandwidth equally between the
sales and marketing departments (1536 kbps extra to each for a total of 3584 kbps for
each) because they both have the highest priority level.
• Research requires more bandwidth but only gets its budgeted 2048 kbps because all of the
unbudgeted and unused bandwidth goes to the higher priority sales and marketing classes.
Suppose that all of the classes except for the administration class need more bandwidth.
• Each class gets up to its budgeted bandwidth. The administration class only uses 1024
kbps of its budgeted 2048 kbps.
• The ZyWALL divides the total 3072 kbps total of unbudgeted and unused bandwidth
equally among the other classes. 1024 kbps extra goes to each so the other classes each get
a total of 3072 kbps.
Bandwidth Borrowing
Bandwidth borrowing allows a sub-class to borrow unused bandwidth from its parent class,
whereas maximize bandwidth usage allows bandwidth classes to borrow any unused or
unbudgeted bandwidth on the whole interface.
Enable bandwidth borrowing on a sub-class to allow the sub-class to use its parent class’s
unused bandwidth. A parent class’s unused bandwidth is given to the highest priority sub-class
first. The sub-class can also borrow bandwidth from a higher parent class (grandparent class)
if the sub-class’s parent class is also configured to borrow bandwidth from its parent class.
This can go on for as many levels as are configured to borrow bandwidth from their parent
class (see Section 25.4.1 on page 476).
The total of the bandwidth allotments for sub-classes cannot exceed the bandwidth allotment
of their parent class. The ZyWALL uses the scheduler to divide a parent class’s unused
bandwidth among the sub-classes.
Click ADVANCED > BW MGMT > Class Setup > Add Sub-Class or Edit to open the
following screen. Use this screen to add a child class.
Figure 270 ADVANCED > BW MGMT > Class Setup > Add Sub-Class
Table 146 ADVANCED > BW MGMT > Class Setup > Add Sub-Class (continued)
LABEL DESCRIPTION
Enable Bandwidth Select Enable Bandwidth Filter to have the ZyWALL use this bandwidth filter
Filter when it performs bandwidth management.
You must enter a value in at least one of the following fields (other than the
Subnet Mask fields which are only available when you enter the destination or
source IP address).
Service This field simplifies bandwidth class configuration by allowing you to select a
predefined application. When you select a predefined application, you do not
configure the rest of the bandwidth filter fields (other than enabling or disabling
the filter).
FTP (File Transfer Program) is a program to enable fast transfer of files,
including large files that may not be possible by e-mail. Select FTP from the
drop-down list box to configure the bandwidth filter for TCP packets with a port
21 destination.
H.323 is a protocol used for multimedia communications over networks, for
example OpenPhone. Select H.323 from the drop-down list box to configure
the bandwidth filter for TCP packets with a port 1720 destination.
Note: If you select H.323, make sure you also use the ALG
screen to turn on the H.323 ALG.
Note: If you select SIP, make sure you also use the ALG screen
to turn on the SIP ALG.
Select Custom from the drop-down list box if you do not want to use a
predefined application for the bandwidth class. When you select Custom, you
need to configure at least one of the following fields (other than the Subnet
Mask fields which you only enter if you also enter a corresponding destination
or source IP address).
Destination Address Do you want your rule to apply to packets coming going to a particular (single)
Type IP, a range of IP addresses (for example 192.168.1.10 to 192.169.1.50) or a
subnet? Select Single Address, Range Address or Subnet Address.
Destination IP Enter the single IP address or the starting IP address in a range here.
Address
Destination End If you are configuring a range of IP addresses, enter the ending IP address
Address / Subnet here. If you are configuring a subnet of addresses, enter the subnet mask here.
Mask Refer to Appendix E on page 817 for more information on IP subnetting.
Destination Port Enter the starting and ending destination port numbers. Enter the same port
number in both fields to specify a single port number. See Appendix B on page
783 for a table of services and port numbers.
Table 146 ADVANCED > BW MGMT > Class Setup > Add Sub-Class (continued)
LABEL DESCRIPTION
Source Address Type Do you want your rule to apply to packets coming from a particular (single) IP,
a range of IP addresses (for example 192.168.1.10 to 192.169.1.50) or a
subnet? Select Single Address, Range Address or Subnet Address.
Source IP Address Enter the single IP address or the starting IP address in a range here.
Source End Address If you are configuring a range of IP addresses, enter the ending IP address
/ Subnet Mask here. If you are configuring a subnet of addresses, enter the subnet mask here.
Refer to Appendix E on page 817 for more information on IP subnetting.
Source Port Enter the starting and ending destination port numbers. Enter the same port
number in both fields to specify a single port number. See Appendix B on page
783 for a table of services and port numbers.
Protocol ID Enter the protocol ID (service type) number, for example: 1 for ICMP, 6 for TCP
or 17 for UDP.
Apply Click Apply to save your changes back to the ZyWALL.
Cancel Click Cancel to exit this screen without saving.
• The Bill class can borrow unused bandwidth from the Sales USA class because the Bill
class has bandwidth borrowing enabled.
• The Bill class can also borrow unused bandwidth from the Sales class because the Sales
USA class also has bandwidth borrowing enabled.
• The Bill class cannot borrow unused bandwidth from the Root class because the Sales
class has bandwidth borrowing disabled.
• The Amy class cannot borrow unused bandwidth from the Sales USA class because the
Amy class has bandwidth borrowing disabled.
• The Research Software and Hardware classes can both borrow unused bandwidth from the
Research class because the Research Software and Hardware classes both have bandwidth
borrowing enabled.
• The Research Software and Hardware classes can also borrow unused bandwidth from the
Root class because the Research class also has bandwidth borrowing enabled.
Figure 271 ADVANCED > BW MGMT > Class Setup > Statistics
26.1 Overview
This chapter shows you how to configure the DNS screens.
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address
and vice versa. The DNS server is extremely important because without it, you must know the
IP address of a machine before you can access it. The ZyWALL uses a system DNS server (in
the order you specify in the DNS System screen) to resolve domain names, for example, VPN,
DDNS and the time server.
3 You can manually enter the IP addresses of other DNS servers. These servers can be
public or private. A DNS server could even be behind a remote IPSec router (see Section
on page 480).
Address Record
An address record contains the mapping of a fully qualified domain name (FQDN) to an IP
address. An FQDN consists of a host and domain name and includes the top-level domain. For
example, www.zyxel.com.tw is a fully qualified domain name, where “www” is the host,
“zyxel” is the second-level domain, and “com.tw” is the top level domain.
mail.myZyXEL.com.tw is also a FQDN, where "mail" is the host, "myZyXEL" is the second-
level domain, and "com.tw" is the top level domain.
The ZyWALL allows you to configure address records about the ZyWALL itself or another
device. This way you can keep a record of DNS names and addresses that people on your
network may use frequently. If the ZyWALL receives a DNS query for an FQDN for which
the ZyWALL has an address record, the ZyWALL can send the IP address in a DNS response
without having to query a DNS name server.
DNS Wildcard
Enabling the wildcard feature for your host causes *.yourhost.com to be aliased to the same IP
address as yourhost.com. This feature is useful if you want to be able to use, for example,
www.yourhost.com and still reach your hostname.
" If you do not specify an Intranet DNS server on the remote network, then the
VPN host must use IP addresses to access the computers on the remote
private network.
DDNS
DDNS (Dynamic DNS) allows you to update your current dynamic IP address with one or
many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe,
etc.). You can also access your FTP server or Web site on your own computer using a domain
name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never
change instead of using an IP address that changes each time you reconnect. Your friends or
relatives will always be able to call you even if they don't know your IP address.
LABEL DESCRIPTION
Domain Zone A domain zone is a fully qualified domain name without the host. For example,
zyxel.com.tw is the domain zone for the www.zyxel.com.tw fully qualified
domain name.
From This field displays whether the IP address of a DNS server is from a WAN
interface (and which it is) or specified by the user.
DNS Server This is the IP address of a DNS server.
Modify Click a triangle icon to move the record up or down in the list.
Click the edit icon to go to the screen where you can edit the record.
Click the delete icon to remove an existing record. A window display asking you
to confirm that you want to delete the record. Note that subsequent records
move up by one when you take this action.
Insert Click Insert to open a screen where you can insert a new name server record.
Refer to Table 152 on page 485 for information on the fields.
Figure 276 ADVANCED > DNS > Insert (Name Server Record)
LABEL DESCRIPTION
Remaining Time This is the number of seconds left before the DNS resolution entry is discarded
(sec) from the cache.
Modify Click the delete icon to remove the DNS resolution entry from the cache.
LABEL DESCRIPTION
IP Select From ISP if your ISP dynamically assigns DNS server information (and
the ZyWALL's WAN IP address). Use the drop-down list box to select a DNS
server IP address that the ISP assigns in the field to the right.
Select User-Defined if you have the IP address of a DNS server. Enter the
DNS server's IP address in the field to the right. If you chose User-Defined, but
leave the IP address set to 0.0.0.0, User-Defined changes to None after you
click Apply. If you set a second choice to User-Defined, and enter the same IP
address, the second User-Defined changes to None after you click Apply.
Select DNS Relay to have the ZyWALL act as a DNS proxy. The ZyWALL's
LAN, DMZ or WLAN IP address displays in the field to the right (read-only). The
ZyWALL tells the DHCP clients on the LAN, DMZ or WLAN that the ZyWALL
itself is the DNS server. When a computer on the LAN, DMZ or WLAN sends a
DNS query to the ZyWALL, the ZyWALL forwards the query to the ZyWALL's
system DNS server (configured in the DNS System screen) and relays the
response back to the computer. You can only select DNS Relay for one of the
three servers; if you select DNS Relay for a second or third DNS server, that
choice changes to None after you click Apply.
Select None if you do not want to configure DNS servers. You must have
another DHCP sever on your LAN, or else the computers must have their DNS
server addresses manually configured. If you do not configure a DNS server,
you must know the IP address of a computer in order to access it.
Apply Click Apply to save your changes back to the ZyWALL.
Reset Click Reset to begin configuring this screen afresh.
" You must go to the Dynamic DNS service provider’s website and register a
user account and a domain name before you can use the Dynamic DNS
service with your ZyWALL.
DYNDNS Wildcard
Enabling the wildcard feature for your host causes *.yourhost.dyndns.com to be aliased to the
same IP address as yourhost.dyndns.com. This feature is useful if you want to be able to use,
for example, www.yourhost.dyndns.com and still reach your hostname.
" If you have a private WAN IP address, then you cannot use Dynamic DNS.
High Availability
A DNS server maps a domain name to a port's IP address. If that WAN port loses its
connection, high availability allows the router to substitute another port's IP address for the
domain name mapping.
LABEL DESCRIPTION
Domain Name 1~5 Enter the host names in these fields.
DDNS Type Select the type of service that you are registered for from your Dynamic DNS
service provider if you have selected WWW.DynDNS.COM.
Select Dynamic if you have the Dynamic DNS service.
Select Static if you have the Static DNS service.
Select Custom if you have the Custom DNS service.
Offline This option is available when Custom is selected in the DDNS Type field.
Check with your Dynamic DNS service provider to have traffic redirected to a
URL (that you can specify) while you are off line.
Wildcard Select the check box to enable DYNDNS Wildcard.
WAN Interface Select the WAN interface to use for updating the IP address of the domain
name.
IP Address Update Select Use WAN IP Address to have the ZyWALL update the domain name
Policy with the WAN interface's IP address.
Select Use User-Defined and enter the IP address if you have a static IP
address.
Select Let DDNS Server Auto Detect only when there are one or more NAT
routers between the ZyWALL and the DDNS server. This feature has the DDNS
server automatically detect and use the IP address of the NAT router that has a
public IP address.
Note: The DDNS server may not be able to detect the proper IP
address if there is an HTTP proxy server between the
ZyWALL and the DDNS server.
HA Select this check box to enable the high availability (HA) feature. High
availability has the ZyWALL update a domain name with another interface’s IP
address when the normal WAN interface does not have a connection.
If the WAN interface specified in the WAN Interface field does not have a
connection, the ZyWALL will attempt to use the IP address of another WAN
interface to update the domain name.
When the WAN interfaces are in the active/passive operating mode, the
ZyWALL will update the domain name with the IP address of whichever WAN
interface has a connection, regardless of the setting in the WAN Interface field.
Disable this feature and the ZyWALL will only update the domain name with an
IP address of the WAN interface specified in the WAN Interface field. If that
WAN interface does not have a connection, the ZyWALL will not update the
domain name with another port’s IP address.
27.1 Overview
This chapter provides information on the remote management screens. Remote management
allows you to determine which services/protocols can access which ZyWALL interface (if
any) from which computers.
The following figure shows secure and insecure management of the ZyWALL coming in from
the WAN. HTTPS and SSH access are secure. HTTP and Telnet access are not secure.
Figure 280 Secure and Insecure Remote Management From the WAN
Firewall Rules
When you configure remote management to allow management from any network except the
LAN, you still need to configure a firewall rule to allow access. See Chapter 13 on page 251
for details on configuring firewall rules.
You can also disable a service on the ZyWALL by not allowing access for the service/protocol
through any of the ZyWALL interfaces.
System Timeout
There is a default system management idle timeout of five minutes (three hundred seconds).
The ZyWALL automatically logs you out if the management session remains idle for longer
than this timeout period. The management session does not time out when a statistics screen is
polling. You can change the timeout period in the MAINTENANCE > General screen.
6a Click REMOTE MGMT. Write down the name of the certificate displayed in the
Server Certificate field.
6b Click CERTIFICATES. Find the certificate and check its Subject column. CN
stands for certificate’s common name (see Figure 286 on page 496 for an example).
Use this procedure to have the ZyWALL use a certificate with a common name that matches
the ZyWALL’s actual IP address. You cannot use this procedure if you need to access the
WAN port and it uses a dynamically assigned IP address.
6a Create a new certificate for the ZyWALL that uses the IP address (of the
ZyWALL’s port that you are trying to access) as the certificate’s common name.
For example, to use HTTPS to access a LAN port with IP address 192.168.1.1,
create a certificate that uses 192.168.1.1 as the common name.
6b Go to the remote management WWW screen and select the newly created certificate
in the Server Certificate field. Click Apply.
Click Apply in the Replace Certificate screen to create a certificate using your ZyWALL’s
MAC address that will be specific to this device. Click CERTIFICATES to open the My
Certificates screen. You will see information similar to that shown in the following figure.
Click Ignore in the Replace Certificate screen to use the common ZyWALL certificate. You
will then see this information in the My Certificates screen.
The CA sends you a package containing the CA’s trusted certificate(s), your personal
certificate(s) and a password to install the personal certificate(s).
2 Click Install Certificate and follow the wizard as shown earlier in this appendix.
2 The file name and path of the certificate you double-clicked should automatically appear
in the File name text box. Click Browse if you wish to import a different certificate.
4 Have the wizard determine where the certificate should be saved on your computer or
select Place all certificates in the following store and choose a different location.
5 Click Finish to complete the wizard and begin the import process.
6 You should see the following screen when the certificate is correctly installed on your
computer.
Enter the password to log in to the ZyWALL. The SMT main menu displays next.
$ telnet 192.168.1.1 22
Trying 192.168.1.1...
Connected to 192.168.1.1.
Escape character is '^]'.
SSH-1.5-1.0.0
$ ssh –1 192.168.1.1
The authenticity of host '192.168.1.1 (192.168.1.1)' can't be
established.
RSA1 key fingerprint is
21:6c:07:25:7e:f4:75:80:ec:af:bd:d4:3d:80:53:d1.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.1.1' (RSA1) to the list of
known hosts.
[email protected]'s password:
$ sftp -1 192.168.1.1
Connecting to 192.168.1.1...
The authenticity of host '192.168.1.1 (192.168.1.1)' can't be
established.
RSA1 key fingerprint is
21:6c:07:25:7e:f4:75:80:ec:af:bd:d4:3d:80:53:d1.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.1.1' (RSA1) to the list of
known hosts.
[email protected]'s password:
sftp> put firmware.bin ras
Uploading firmware.bin to /ras
Read from remote host 192.168.1.1: Connection reset by peer
Connection closed
$
" If you disable the HTTP service in the REMOTE MGMT > WWW screen, then
the ZyWALL blocks all HTTP connection attempts.
" It is recommended that you disable Telnet and FTP when you configure SSH
for secure connections.
" It is recommended that you disable Telnet and FTP when you configure SSH
for secure connections.
" It is recommended that you disable Telnet and FTP when you configure SSH
for secure connections.
An SNMP managed network consists of two main types of component: agents and a manager.
An agent is a management software module that resides in a managed device (the ZyWALL).
An agent translates the local management information from the managed device into a form
compatible with SNMP. The manager is the console through which network administrators
perform network management functions. It executes applications that control and monitor
managed devices.
The managed devices contain object variables/managed objects that define each piece of
information to be collected about a device. Examples of variables include such as number of
packets received, node port status etc. A Management Information Base (MIB) is a collection
of managed objects. SNMP allows a manager and agents to communicate for the purpose of
accessing these objects.
SNMP itself is a simple request/response protocol based on the manager/agent model. The
manager issues a request and the agent returns responses using the following protocol
operations:
• Get - Allows the manager to retrieve an object variable from the agent.
• GetNext - Allows the manager to retrieve the next object variable from a table or list
within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table
from an agent, it initiates a Get operation, followed by a series of GetNext operations.
• Set - Allows the manager to set values for object variables within an agent.
• Trap - Used by the agent to inform the manager of some events.
Supported MIBs
The ZyWALL supports MIB II that is defined in RFC-1213 and RFC-1215. The focus of the
MIBs is to let administrators collect statistical data and monitor status and performance.
SNMP Traps
The ZyWALL will send traps to the SNMP manager when any one of the following events
occurs:
Table 153 SNMP Traps
TRAP # TRAP NAME DESCRIPTION
0 coldStart (defined in RFC-1215) A trap is sent after booting (power on).
1 warmStart (defined in RFC- A trap is sent after booting (software reboot).
1215)
4 authenticationFailure (defined in A trap is sent to the manager when receiving any SNMP
RFC-1215) get or set requirements with the wrong community
(password).
6 whyReboot (defined in ZYXEL- A trap is sent with the reason of restart before rebooting
MIB) when the system is going to restart (warm start).
6a For intentional reboot : A trap is sent with the message "System reboot by user!"
if reboot is done intentionally, (for example, download
new files, CI command "sys reboot", etc.).
6b For fatal error : A trap is sent with the message of the fatal code if the
system reboots because of fatal errors.
1 Host Identification
The SSH client sends a connection request to the SSH server. The server identifies itself
with a host key. The client encrypts a randomly generated session key with the host key
and server key and sends the result back to the server.
The client automatically saves any new server public keys. In subsequent connections, the
server public key is checked against the saved version on the client computer.
2 Encryption Method
Once the identification is verified, both the client and server must agree on the type of
encryption method to use.
3 Authentication and Data Transmission
After the identification is verified and data encryption activated, a secure tunnel is established
between the client and the server. The client then sends its authentication information (user
name and password) to the server to log in to the server.
28.1 Overview
This chapter introduces the Universal Plug and Play feature. This chapter is only applicable
when the ZyWALL is in router mode.
Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP
for simple peer-to-peer network connectivity between devices. A UPnP device can
dynamically join a network, obtain an IP address, convey its capabilities and learn about other
devices on the network. In turn, a device can leave a network smoothly and automatically
when it is no longer in use.
NAT Traversal
UPnP NAT traversal automates the process of allowing an application to operate through
NAT. UPnP network devices can automatically configure network addressing, announce their
presence in the network to other UPnP devices and enable exchange of simple product and
service descriptions. NAT traversal allows the following:
• Dynamic port mapping
• Learning public IP addresses
• Assigning lease times to mappings
Windows Messenger is an example of an application that supports NAT traversal and UPnP.
See Chapter 22 on page 436 for further information about NAT.
3 In the Internet Connection Properties You may edit or delete the port mappings or
window, click Settings to see the port click Add to manually add port mappings.
mappings that were automatically
created.
" When the UPnP-enabled device is disconnected from your computer, all port
mappings will be deleted automatically.
29.1 Overview
Use custom application to have the ZyWALL’s ALG, anti-spam, anti-virus, and content
filtering features monitor traffic on custom ports, in addition to the default ports.
Default ports
By default, these ZyWALL features monitor traffic for the following protocols on these port
numbers.
• FTP: 21
• SIP: 5060
• H.323: 1720
• SMTP: 25
• POP3: 110
• HTTP: 80
" This screen only specifies what port numbers the ZyWALL checks for specific
protocol traffic. Use other screens to enable or disable the monitoring of the
protocol traffic.
" Changes in the Custom APP screen do not apply to the firewall.
30.1 Overview
This chapter covers how to use the ZyWALL’s ALG feature to allow certain applications to
pass through the ZyWALL.
An Application Layer Gateway (ALG) manages a specific protocol (such as SIP, H.323 or
FTP) at the application layer. The ZyWALL can function as an ALG to allow certain NAT un-
friendly applications (such as SIP) to operate properly through the ZyWALL.
Some applications cannot operate through NAT (are NAT un-friendly) because they embed IP
addresses and port numbers in their packets’ data payload. The ZyWALL examines and uses
IP address and port number information embedded in the data stream. When a device behind
the ZyWALL uses an application for which the ZyWALL has ALG service enabled, the
ZyWALL translates the device’s private IP address inside the data stream to a public IP
address. It also records session port numbers and dynamically creates implicit NAT port
forwarding and firewall rules for the application’s traffic to come in from the WAN to the
LAN.
To configure the ALG screen proceed to Section 30.2 on page 535.
" See Section 29.2 on page 529 if you need to use the ALG for SIP, H.323 or
FTP traffic on custom ports.
FTP
File Transfer Protocol (FTP) is an Internet file transfer service that operates on the Internet and
over TCP/IP networks. A system running the FTP server accepts commands from a system
running an FTP client. The service allows users to send commands to the server for uploading
and downloading files.
If the FTP server is located on the LAN, you must also configure NAT port forwarding and
firewall rules if you want to allow access to the server from the WAN.
H.323
H.323 is a standard teleconferencing protocol suite that provides audio, data and video
conferencing. It allows for real-time point-to-point and multipoint communication between
client computers over a packet-based network that does not provide a guaranteed quality of
service. NetMeeting uses H.323.
RTP
When you make a VoIP call using H.323 or SIP, the RTP (Real time Transport Protocol) is
used to handle voice data transfer. See RFC 1889 for details on RTP.
• You must configure the firewall and port forwarding to allow incoming (peer-to-peer)
calls from the WAN to a private IP address on the LAN, DMZ or WLAN. The following
example shows H.323 signaling (1) and audio (2) sessions between H.323 devices A and
B.
• With multiple WAN IP addresses on the ZyWALL, you can configure different firewall
and port forwarding rules to allow incoming calls from each WAN IP address to go to a
specific IP address on the LAN, DMZ or WLAN. Use policy routing to have the H.323
calls from each of those LAN, DMZ or WLAN IP addresses go out through the same
WAN IP address that calls come in on. The policy routing lets the ZyWALL correctly
forward the return traffic for the calls initiated from the LAN IP addresses.
For example, you configure firewall and port forwarding rules to allow LAN IP address A
to receive calls through public WAN IP address 1. You configure different firewall and
port forwarding rules to allow LAN IP address B to receive calls through public WAN IP
address 2. You configure corresponding policy routes to have calls from LAN IP address
A go out through WAN IP address 1 and calls from LAN IP address B go out through
WAN IP address 2.
• When you configure the firewall and port forwarding to allow calls from the WAN to a
specific IP address on the LAN, you can also use policy routing to have H.323 calls from
other LAN, DMZ or WLAN IP addresses go out through a different WAN IP address. The
policy routing lets the ZyWALL correctly forward the return traffic for the calls initiated
from the LAN, DMZ or WLAN IP addresses.
For example, you configure the firewall and port forwarding to allow LAN IP address A to
receive calls from the Internet through WAN IP address 1. You also use a policy route to
have LAN IP address A make calls out through WAN IP address 1. Configure another
policy route to have H.323 calls from LAN IP addresses B and C go out through WAN IP
address 2. Even though only LAN IP address A can receive incoming calls from the
Internet, LAN IP addresses B and C can still make calls out to the Internet.
Figure 319 H.323 Calls from the WAN with Multiple Outgoing Calls
• The H.323 ALG operates on TCP packets with a port 1720 destination.
• The ZyWALL allows H.323 audio connections.
• The ZyWALL can also apply bandwidth management to traffic that goes through the
H.323 ALG.
SIP
The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol that
handles the setting up, altering and tearing down of voice and multimedia sessions over the
Internet. SIP is used in VoIP (Voice over IP), the sending of voice signals over the Internet
Protocol.
SIP signaling is separate from the media for which it handles sessions. The media that is
exchanged during the session can use a different path from that of the signaling. SIP handles
telephone calls and can interface with traditional circuit-switched telephone networks.
STUN
STUN (Simple Traversal of User Datagram Protocol (UDP) through Network Address
Translators) allows the VoIP device to find the presence and types of NAT routers and/or
firewalls between it and the public Internet. STUN also allows the VoIP device to find the
public IP address that NAT assigned, so the VoIP device can embed it in the SIP data stream.
See RFC 3489 for details on STUN. You do not need to use STUN for devices behind the
ZyWALL if you enable the SIP ALG.
" If the ZyWALL provides an ALG for a service, you must enable the ALG in
order to perform bandwidth management on that service’s traffic.
537
538
CHAPTER 31
Reports Screens
31.1 Overview
The Reports screens display statistics about network usage and IDP, anti-virus and anti-spam
statistics. You can also configure how reports are emailed.
" The web site hit count may not be 100% accurate because sometimes when
an individual web page loads, it may contain references to other web sites that
also get counted as hits.
" Enabling the ZyWALL’s reporting function decreases the overall throughput by
about 1 Mbps.
" All of the recorded reports data is erased when you turn off the ZyWALL.
Figure 323 REPORTS > Traffic Statistics: Web Site Hits Example
" Computers take turns using dynamically assigned LAN, DMZ or WLAN IP
addresses. The ZyWALL continues recording the bytes sent to or from a LAN,
DMZ or WLAN IP address when it is assigned to a different computer.
The statistics display as follows when you display the top entries by source.
The statistics display as follows when you display the top entries by destination.
The statistics display as follows when you display the top entries by source.
The statistics display as follows when you display the top entries by destination.
The statistics display as follows when you display the top entries by source.
The statistics display as follows when you display the score distribution.
32.1 Overview
In the log screens you can configure general log settings and view the ZyWALL’s logs. The
logs cover categories such as system maintenance, system errors, access control, allowed or
blocked web sites, blocked web features (such as ActiveX controls, java and cookies), attacks
(such as DoS) and IPSec.
" Alerts are e-mailed as soon as they happen. Logs may be e-mailed as soon as
the log is full (see Log Schedule). Selecting many alert and/or log categories
(especially Access Control) may result in many e-mails being sent.
Log Descriptions
This section provides descriptions of example log messages.
The variables “%d”, “%x” and “%s” respectively refer to decimal numbers, hexadecimal
numbers and strings (a list of upper/lower case letters or numbers).
Table 173 System Maintenance Logs
LOG MESSAGE DESCRIPTION
Time set from NTP server: The router has adjusted its time based on information from
<server address>, offset: the time server.
<time offset> sec
Failed to sync with <time The router failed to get information from the time server.
server type> server: <time
server address>
WAN interface gets IP: %s A WAN interface got a new IP address from the DHCP,
PPPoE, PPTP or dial-up server.
DHCP client IP expired A DHCP client's IP address has expired.
DHCP server assigns %s The DHCP server assigned an IP address to a client.
Successful SMT login Someone has logged on to the router's SMT interface.
SMT login failed Someone has failed to log on to the router's SMT interface.
Successful WEB login Someone has logged on to the router's web configurator
interface.
WEB login failed Someone has failed to log on to the router's web configurator
interface.
Successful TELNET login Someone has logged on to the router via telnet.
TELNET login failed Someone has failed to log on to the router via telnet.
Successful FTP login Someone has logged on to the router via FTP.
FTP login failed Someone has failed to log on to the router via FTP.
NAT Session Table is Full! The maximum number of NAT session table entries has been
exceeded and the table is full.
setNetBIOSFilter: calloc The router failed to allocate memory for the NetBIOS filter
error settings.
readNetBIOSFilter: calloc The router failed to allocate memory for the NetBIOS filter
error settings.
WAN%d connection is up The specified WAN connection is up.
WAN connection is down. A WAN connection is down. You cannot access the network
through this interface.
Dial Backup starts Dial backup started working.
Dial Backup ends Dial backup stopped working.
DHCP Server cannot assign The LAN subnet, LAN alias 1, or LAN alias 2 was changed and
the static IP %S (out of the specified static DHCP IP addresses are no longer valid.
range).
The DHCP static IP %s is The static DHCP IP address conflicts with another host.
conflict.
SMTP fail (%s) The device failed to send an e-mail (error message included).
SMTP authentication fail The device failed to authenticate with the SMTP server (error
(%s) message included).
%s The device will send a Gratuitous ARP to detect the IP collision. If
the collision happens, there will be a log in centralized log
For type and code details, see Table 192 on page 578.
Table 178 ICMP Logs
LOG MESSAGE DESCRIPTION
Firewall default policy: ICMP ICMP access matched the default policy and was
<Packet Direction>, <type:%d>, blocked or forwarded according to the user's setting.
<code:%d>
Firewall rule [NOT] match: ICMP ICMP access matched (or didn’t match) a firewall rule
<Packet Direction>, <rule:%d>, (denoted by its number) and was blocked or forwarded
<type:%d>, <code:%d> according to the rule.
Triangle route packet forwarded: The firewall allowed a triangle route session to pass
ICMP through.
Packet without a NAT table entry The router blocked a packet that didn’t have a
blocked: ICMP corresponding NAT table entry.
Unsupported/out-of-order ICMP: The firewall does not support this kind of ICMP packets
ICMP or the ICMP packets are out of order.
Router reply ICMP packet: ICMP The router sent an ICMP reply packet to the sender.
3G card has no response, The card was reset due to no response from the card for a
card is restarted. period of time.
3G SIM card PIN code is The specified PIN code does not match the inserted GSM 3G
incorrect. card.
The 3G card is not The user account of the 3G card is not activated.
activated.
3G Modem is locked. The internal modem on the inserted 3G card is blocked.
SIM card not inserted or There is no SIM card in the inserted GSM 3G card or the SIM
damaged. card is damaged.
3G connection has been The 3G connection has been dropped due to the specific
dropped - %s. reason, such as idle timeout, manual disconnection, failure to
get an IP address, switching to WAN 1, ping check failure,
connection reset, and so on.
3G signal strength is The ZyWALL updated the 3G network signal strength
refreshed (%d dBm). indication.
Warning: (%IMSI% or %ESN%) This shows that the pre-configured time budget was exceeded.
Over time budget! (budget = This also displays the IMSI of the SIM card in an inserted GSM
%CONFIGURED_BUDGET% hours, 3G card or the ESN of the inserted CDMA 3G card and the 3G
used = %USED_VOLUME%(2 connection’s usage time in hours.
decimals) hours).
Warning: (%IMSI% or %ESN%) This shows that the specified percentage of the time budget
Over %THRESHOLD%% of time was exceeded. This also displays the IMSI of the SIM card in
budget (%REMAIN_BUDGET%(2 an inserted GSM 3G card or the ESN of the inserted CDMA 3G
decimals) hours remain in card and the amount of time (in hours) the 3G connection can
%CONFIGURED_BUDGET% hours still be used.
budget).
Warning: (%ESN% or %IMSI%) This shows that the pre-configured data limit was exceeded.
Over data budget! (budget The IMSI of the SIM card in an inserted GSM 3G card or the
=%CONFIGURED_BUDGET%(2 ESN of the inserted CDMA 3G card is displayed. The amount
decimals Mbytes, used = of data (in Mbytes) sent and/or received (depending on your
%USED_VOLUME%(2 decimals) configuration) through the 3G connection is also displayed.
Mbytes).
Warning: (%ESN% or %IMSI%) This shows that the specified percentage of data limit was
Over %THRESHOLD%% of data exceeded. This also displays the IMSI of the SIM card in an
budget (%REMAIN_BUDGET%(2 inserted GSM 3G card or the ESN of the inserted CDMA 3G
decimals) Mbytes remain in card and how much data (in Mbytes) can still be transmitted
%CONFIGURED_BUDGET% Mbytes through the 3G connection.
budget).
For type and code details, see Table 192 on page 578.
Table 184 Attack Logs
LOG MESSAGE DESCRIPTION
attack [ TCP | UDP | IGMP The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
| ESP | GRE | OSPF ]
attack ICMP (type:%d, The firewall detected an ICMP attack.
code:%d)
land [ TCP | UDP | IGMP | The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
ESP | GRE | OSPF ] attack.
land ICMP (type:%d, The firewall detected an ICMP land attack.
code:%d)
CODE DESCRIPTION
1 Algorithm mismatch between the certificate and the search constraints.
2 Key usage mismatch between the certificate and the search constraints.
3 Certificate was not valid in the time interval.
4 (Not used)
5 Certificate is not valid.
6 Certificate signature was not verified correctly.
7 Certificate was revoked by a CRL.
CODE DESCRIPTION
8 Certificate was not added to the cache.
9 Certificate decoding failed.
10 Certificate was not found (anywhere).
11 Certificate chain looped (did not find trusted root).
12 Certificate contains critical extension that was not handled.
13 Certificate issuer was not valid (CA specific information missing).
14 (Not used)
15 CRL is too old.
16 CRL is not valid.
17 CRL signature was not verified correctly.
18 CRL was not found (anywhere).
19 CRL was not added to the cache.
20 CRL decoding failed.
21 CRL is not currently valid, but in the future.
22 CRL contains duplicate serial numbers.
23 Time interval is not continuous.
24 Time information not available.
25 Database method failed due to timeout.
26 Database method failed.
27 Path was not verified.
28 Maximum path length reached.
Mail From:Email address This is the source and subject of an e-mail for which the anti-spam
Subject:Mail Subject! external database query failed.
Unknown anti-spam query The device received a response with an unknown format from the
response - [%Rating anti-spam external database server. The following log identifies the
Server IP Address%]! e-mail that was being checked.
Syslog Logs
There are two types of syslog: event logs and traffic logs. The device generates an event log
when a system event occurs, for example, when a user logs in or the device is under attack.
The device generates a traffic log when a "session" is terminated. A traffic log summarizes the
session's type, when it started and stopped the amount of traffic that was sent and received and
so on. An external log analyzer can reconstruct and analyze the traffic flowing through the
device after collecting the traffic logs.
Table 196 Syslog Logs
LOG MESSAGE DESCRIPTION
Event Log: <Facility*8 + This message is sent by the system ("RAS" displays as the
Severity>Mon dd hr:mm:ss system name if you haven’t configured one) when the
hostname src="<srcIP:srcPort>" router generates a syslog. The facility is defined in the web
dst="<dstIP:dstPort>" MAIN MENU, LOGS, Log Settings page. The severity is
msg="<msg>" note="<note>" the log’s syslog class. The definition of messages and
notes are defined in the other log tables. The “devID” is the
devID="<mac address>"
MAC address of the router’s LAN port. The “cat” is the
cat="<category>" same as the category in the router’s logs.
Traffic Log: <Facility*8 + This message is sent by the device when the connection
Severity>Mon dd hr:mm:ss (session) is closed. The facility is defined in the Log
hostname src="<srcIP:srcPort>" Settings screen. The severity is the traffic log type. The
dst="<dstIP:dstPort>" message and note always display "Traffic Log". The "proto"
msg="Traffic Log" field lists the service name. The "dir" field lists the incoming
and outgoing interfaces ("LAN:LAN", "LAN:WAN",
note="Traffic Log" devID="<mac
"LAN:DMZ", "LAN:DEV" for example).
address>" cat="Traffic Log"
duration=seconds
sent=sentBytes
rcvd=receiveBytes
dir="<from:to>"
protoID=IPProtocolID
proto="serviceName"
trans="IPSec/Normal"
Event Log: <Facility*8 + This message is sent by the device ("RAS" displays as the
Severity>Mon dd hr:mm:ss system name if you haven’t configured one) at the time
hostname src="<srcIP:srcPort>" when this syslog is generated. The facility is defined in the
dst="<dstIP:dstPort>" web MAIN MENU, LOGS, Log Settings page. The
ob="<0|1>" ob_mac="<mac severity is the log’s syslog class. The definition of
messages and notes are defined in the other log tables. OB
address>" msg="<msg>"
is the Out Break flag and the mac address of the Out Break
note="<note>" devID="<mac PC.
address>" cat="<category>"
Event Log: <Facility*8 + This message is sent by the device ("RAS" displays as the
Severity>Mon dd hr:mm:ss system name if you haven’t configured one) at the time
hostname src="<srcIP:srcPort>" when this syslog is generated. The facility is defined in the
dst="<dstIP:dstPort>" web MAIN MENU, LOGS, Log Settings page. The
ob="0|1" ob_mac="<mac severity is the log’s syslog class. The "encode" message
address>" msg="<msg>" indicates the mail attachments encoding method. The
note="<note>" devID="<mac definition of messages and notes are defined in the Anti-
address>" cat="Anti Virus" Virus log descriptions.
encode="< uu | b64 >"
The following table shows RFC-2408 ISAKMP payload types that the log displays. Please
refer to the RFC for detailed information on each type.
Table 197 RFC-2408 ISAKMP Payload Types
LOG DISPLAY PAYLOAD TYPE
SA Security Association
PROP Proposal
TRANS Transform
KE Key Exchange
ID Identification
CER Certificate
CER_REQ Certificate Request
HASH Hash
SIG Signature
NONCE Nonce
NOTFY Notification
DEL Delete
VID Vendor ID
33.1 Overview
This chapter displays information on the maintenance screens. The maintenance screens can
help you view system information, upload new firmware, manage configuration and restart
your ZyWALL.
• In Windows XP, click Start, My Computer, View system information and then click
the Computer Name tab. Note the entry in the Full computer name field and enter it as
the ZyWALL System Name.
Click MAINTENANCE to open the General screen. Use this screen to configure
administrative and system-related information.
" The ZyWALL can use the NTP time server pools regardless of the time
protocol you select.
When the ZyWALL uses the NTP time server pools, it randomly selects one pool and tries to
synchronize with a server in it. If the synchronization fails, then the ZyWALL goes through
the rest of the list in order from the first one tried until either it is successful or all the pre-
defined NTP time server pools have been tried.
Click the Return button to go back to the Time and Date screen after the time and date is
updated successfully.
If the update was not successful, the following screen appears. Click Return to go back to the
Time and Date screen.
For example, if a bridge receives a frame via port 1 from host A (MAC address
00a0c5123478), the bridge associates host A with port 1. When the bridge receives another
frame on one of its ports with destination address 00a0c5123478, it forwards the frame
directly through port 1 after checking the internal table.
The bridge takes one of these actions after it checks the destination address of an incoming
frame with its internal table:
• If the table contains an association between the destination address and any of the bridge's
ports aside from the one on which the frame was received, the frame is forwarded out the
associated port.
• If no association is found, the frame is flooded to all ports except the inbound port.
Broadcasts and multicasts also are flooded in this way.
• If the associated port is the same as the incoming port, then the frame is dropped (filtered).
Transparent Firewalls
A transparent firewall (also known as a transparent, in-line, shadow, stealth or bridging
firewall) has the following advantages over “router firewalls”:
1 The use of a bridging firewall reduces configuration and deployment time because no
networking configuration changes to your existing network (hosts, neighboring routers
and the firewall itself) are needed. Just put it in-line with the network it is protecting. As
it only moves frames between ports (after inspecting them), it is completely transparent.
2 Performance is improved as there's less processing overhead.
3 As a transparent bridge does not modify the frames it forwards, it is effectively “stealth”
as it is invisible to attackers.
Bridging devices are most useful in complex environments that require a rapid or new firewall
deployment. A transparent, bridging firewall can also be good for companies with several
branch offices since the setups at these offices are often the same and it's likely that one design
can be used for many of the networks. A bridging firewall could be configured at HQ, sent to
the branches and then installed directly without additional configuration.
In bridge mode, the ZyWALL cannot get an IP address from a DHCP server. The LAN, WAN,
DMZ and WLAN interfaces all have the same (static) IP address and subnet mask. You can
configure the ZyWALL's IP address in order to access the ZyWALL for management. If you
connect your computer directly to the ZyWALL, you also need to assign your computer a
static IP address in the same subnet as the ZyWALL's IP address in order to access the
ZyWALL.
You can use the firewall and VPN in bridge mode. See Table 6 on page 74the user’s guide for
a detailed list of other features available in bridge mode.
After you see the Firmware Upload in Process screen, wait two minutes before logging into
the ZyWALL again.
The ZyWALL automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
After two minutes, log in again and check your new firmware version in the HOME screen.
If the upload was not successful, the following screen will appear. Click Return to go back to
the F/W Upload screen.
Backup Configuration
Backup configuration allows you to back up (save) the ZyWALL’s current configuration to a
file on your computer. Once your ZyWALL is configured and functioning properly, it is
highly recommended that you back up your configuration file before making configuration
changes. The backup configuration file will be useful in case you need to return to your
previous settings.
Click Backup to save the ZyWALL’s current configuration to your computer.
Restore Configuration
Load a configuration file from your computer to your ZyWALL.
Table 205 Restore Configuration
LABEL DESCRIPTION
File Path Type in the location of the file you want to upload in this field or click Browse ... to find it.
Browse... Click Browse... to find the file you want to upload. Remember that you must
decompress compressed (.ZIP) files before you can upload them.
Upload Click Upload to begin the upload process.
1 Do not turn off the ZyWALL while configuration file upload is in progress.
After you see a “restore configuration successful” screen, you must then wait one minute
before logging into the ZyWALL again.
The ZyWALL automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
If you uploaded the default configuration file you may need to change the IP address of your
computer to be in the same subnet as that of the default device IP address (192.168.1.1). See
your Quick Start Guide for details on how to set up your computer’s IP address.
If the upload was not successful, the following screen will appear. Click Return to go back to
the Configuration screen.
You can also press the hardware RESET button to reset the factory defaults of your
ZyWALL. Refer to Section 3.3 on page 63 for more information on the RESET button.
" The ZyWALL sends only one diagnostic e-mail within five minutes (unless you
click Perform Diagnostics Now).
603
604
CHAPTER 34
Introducing the SMT
This chapter explains how to access the System Management Terminal and gives an overview
of its menus.
99. Exit
7. Wireless Setup
99. Exit
Old Password= ?
New Password= ?
Retype to confirm= ?
System Name=
Domain Name=
System Name=
Domain Name=
IP Address= 192.168.1.1
Network Mask= 255.255.255.0
Gateway= 0.0.0.0
First System DNS Server
IP Address= 0.0.0.0
Second System DNS Server
IP Address= 0.0.0.0
Third System DNS Server
IP Address= 0.0.0.0
The following table describes the fields not previously discussed (see Table 210 on page 613).
Table 211 Menu 1: General Setup (Bridge Mode)
FIELD DESCRIPTION
Device Mode Press [SPACE BAR] and then [ENTER] to select Bridge Mode.
IP Address Enter the IP address of your ZyWALL in dotted decimal notation.
Network Mask Enter the subnet mask of your ZyWALL.
Gateway Enter the gateway IP address.
First System Enter the DNS server's IP address(es) in the IP Address field(s) if you have the IP
DNS Server address(es) of the DNS server(s).
Second System
DNS Server
Third System
DNS Server
Follow the instructions in the next table to configure Dynamic DNS parameters.
Table 212 Menu 1.1: Configure Dynamic DNS
FIELD DESCRIPTION
Service This is the name of your Dynamic DNS service provider.
Provider
Active Press [SPACE BAR] to select Yes and then press [ENTER] to make dynamic DNS
active.
Username Enter your user name.
Password Enter the password assigned to you.
Edit Host Press [SPACE BAR] and then [ENTER] to select Yes if you want to configure a
DDNS host.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to
save your configuration, or press [ESC] at any time to cancel.
# Summary
--- - -------------------------------------------------------
01 Hostname=ZyWALL,
Type=Dynamic,WC=Yes,Offline=No,Policy=DDNS Server
Detect, WAN1, HA=Yes
02 _______________________________________________________
_______________________________________________________
03 _______________________________________________________
_______________________________________________________
04 _______________________________________________________
_______________________________________________________
05 _______________________________________________________
_______________________________________________________
5 Select Edit in the Select Command field; type the index number of the DDNS host you
want to configure in the Select Rule field and press [ENTER] to open Menu 1.1.1 -
DDNS Edit Host (see the next figure).
Hostname= ZyWALL
DDNS Type= DynamicDNS
Enable Wildcard Option= Yes
Enable Off Line Option= N/A
Bind WAN= 1
HA= Yes
IP Address Update Policy:
Let DDNS Server Auto Detect= Yes
Use User-Defined= N/A
Use WAN IP Address= N/A
Note: If you enable high availability, DDNS can also function when the
ZyWALL uses the dial backup port. DDNS does not function
when the ZyWALL uses traffic redirect.
Note: The DDNS server may not be able to detect the proper IP
address if there is an HTTP proxy server between the ZyWALL
and the DDNS server.
Use User- Press [SPACE BAR] to select Yes and then press [ENTER] to update the IP address
Defined of the host name(s) to the IP address specified below.
Only select Yes if the ZyWALL uses or is behind a static public IP address.
Use WAN IP Enter the static public IP address if you select Yes in the Use User-Defined field.
Address
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to
save your configuration, or press [ESC] at any time to cancel.
The IP address updates when you reconfigure menu 1 or perform DHCP client renewal.
Dial-Backup:
Active= No
Port Speed= 115200
AT Command String:
Init= at&fs0=0
Edit Advanced Setup= No
Dial-Backup:
Active= No
Port Speed= 115200
AT Command String:
Init= at&fs0=0
Edit Advanced Setup= Yes
" Consult the manual of your WAN device connected to your Dial Backup port
for specific AT commands.
To edit the advanced setup for the Dial Backup port, move the cursor to the Edit Advanced
Setup field in Menu 2 - WAN Setup, press the [SPACE BAR] to select Yes and then press
[ENTER].
AT Response Strings:
CLID= NMBR =
Called Id=
Speed= CONNECT
Session Options:
Edit Filter Sets= No
Idle Timeout(sec)= 100
To handle the first prompt, you specify “ogin: ” as the ‘Expect’ string and “myLogin” as
the ‘Send’ string in set 1. The reason for leaving out the leading “L” is to avoid having to know
exactly whether it is upper or lower case. Similarly, you specify “word: ” as the ‘Expect’
string and your password as the ‘Send’ string for the second prompt in set 2.
You can use two variables, $USERNAME and $PASSWORD (all UPPER case), to represent the
actual user name and password in the script, so they will not show in the clear. They are
replaced with the outgoing login name and password in the remote node when the ZyWALL
sees them in a ‘Send’ string. Please note that both variables must been entered exactly as
shown. No other characters may appear before or after, either, i.e., they must be used alone in
response to login and password prompts.
Please note that the ordering of the sets is significant, i.e., starting from set 1, the ZyWALL
will wait until the ‘Expect’ string is matched before it proceeds to set 2, and so on for the rest
of the script. When both the ‘Expect’ and the ‘Send’ fields of the current set are empty, the
ZyWALL will terminate the script processing and start PPP negotiation. This implies two
things: first, the sets must be contiguous; the sets after an empty one are ignored. Second, the
last set should match the final message sent by the server. For instance, if the server prints:
login successful.
Starting PPP...
after you enter the password, then you should create a third set to match the final “PPP...”
but without a “Send” string. Otherwise, the ZyWALL will start PPP prematurely right after
sending your password to the server.
If there are errors in the script and it gets stuck at a set for longer than the “Dial Timeout” in
menu 2 (default 60 seconds), the ZyWALL will timeout and drop the line. To debug a script,
go to Menu 24.4 to initiate a manual call and watch the trace display to see if the sequence of
messages and prompts from the server differs from what you expect.
Active= No
Set 1: Set 5:
Expect= Expect=
Send= Send=
Set 2: Set 6:
Expect= Expect=
Send= Send=
Set 3:
Expect=
Send=
Set 4:
Expect=
Send=
" It is not necessary to configure menu 2 with a Sierra Wireless AC595 3G card.
Dial-Backup:
Active= No
Port Speed= 115200
AT Command String:
Init= at&fs0=0
Edit Advanced Setup= No
3G Modem Setup:
Init= Configure APN
APN =internet
PIN code= 0000
Session Options:
Edit Filter Sets= No
Idle Timeout(sec)= 100
Table 223 Menu 11.2: Remote Node Profile (3G WAN) (continued)
FIELD DESCRIPTION
Retype to Enter your password again to make sure that you have entered is correctly.
Confirm
Authen This field sets the authentication protocol used for outgoing calls.
Options for this field are:
CHAP/PAP - Your ZyWALL will accept either CHAP or PAP when requested by this
remote node.
CHAP - accept CHAP only.
PAP - accept PAP only.
Pri Phone # Enter the phone number (dial string) used to dial up a connection to your service
provider’s base station. Your ISP should provide the phone number.
For example, *99# is the dial string to establish a GPRS or 3G connection in Taiwan.
Edit IP This field leads to a “hidden” menu. Press [SPACE BAR] to select Yes and press
[ENTER] to go to Menu 11.3.2 - Remote Node Network Layer Options. See
Section 36.3.4 on page 625 for more information.
Edit Script Press [SPACE BAR] to select Yes and press [ENTER] to edit the AT script for the
Options dial backup remote node (Menu 11.3.3 - Remote Node Script). See Section 36.3.5
on page 626 for more information.
Always On Press [SPACE BAR] to select Yes to set this connection to be on all the time,
regardless of whether or not there is any traffic. Select No to have this connection act
as a dial-up connection.
Session
Options
Edit Filter sets This field leads to another “hidden” menu. Use [SPACE BAR] to select Yes and press
[ENTER] to open menu 11.3.4 to edit the filter sets. See Section 36.3.6 on page 628
for more details.
Idle Timeout Enter the number of seconds of idle time (when there is no traffic from the ZyWALL to
the remote node) that can elapse before the ZyWALL automatically disconnects the
3G connection.
Once you have configured this menu, press [ENTER] at the message “Press ENTER to Confirm...” to
save your configuration, or press [ESC] at any time to cancel.
From menu 3, select the submenu option TCP/IP and DHCP Setup and press [ENTER]. The
screen now displays Menu 3.2 - TCP/IP and DHCP Ethernet Setup, as shown next. Not all
fields are available on all models.
Follow the instructions in the next table on how to configure the DHCP fields.
Table 224 Menu 3.2: DHCP Ethernet Setup Fields
FIELD DESCRIPTION
DHCP This field enables/disables the DHCP server.
If set to Server, your ZyWALL will act as a DHCP server.
If set to None, the DHCP server will be disabled.
If set to Relay, the ZyWALL acts as a surrogate DHCP server and relays requests
and responses between the remote server and the clients.
When set to Server, the following items need to be set:
Client IP Pool:
Starting Address This field specifies the first of the contiguous addresses in the IP address pool.
Size of Client IP This field specifies the size, or count of the IP address pool.
Pool
DHCP Server If Relay is selected in the DHCP field above, then type the IP address of the actual,
Address remote DHCP server here.
Use the instructions in the following table to configure TCP/IP parameters for the LAN port.
IP Alias 1= Yes
IP Address= 192.168.2.1
IP Subnet Mask= 255.255.255.0
RIP Direction= None
Version= RIP-1
Incoming protocol filters=
Outgoing protocol filters=
IP Alias 2= No
IP Address= N/A
IP Subnet Mask= N/A
RIP Direction= N/A
Version= N/A
Incoming protocol filters= N/A
Outgoing protocol filters= N/A
" This menu configures WAN 1 on a ZyWALL with multiple WAN ports.
Configure the WAN 2 port in Menu 11.2 - Remote Node Profile or in the WAN
> WAN 2 screen via the web configurator.
Note: DSL users must choose the Standard option only. The My Login, My
Password and Login Server fields are not applicable in this case.
My Login Enter the login name given to you by your ISP.
My Password Type your password again for confirmation.
Retype to Enter your password again to make sure that you have entered is correctly.
Confirm
Login Server The ZyWALL will find the RoadRunner Server IP if this field is left blank. If it does
not, then you must enter the authentication server IP address.
Relogin Every This field is available when you select Telia Login in the Service Type field.
(min) The Telia server logs the ZyWALL out if the ZyWALL does not log in periodically.
Type the number of minutes from 1 to 59 (30 recommended) for the ZyWALL to wait
between logins.
IP Address If your ISP did not assign you a fixed IP address, press [SPACE BAR] and then
Assignment [ENTER] to select Dynamic, otherwise select Static and enter the IP address and
subnet mask in the following fields.
IP Address Enter the (fixed) IP address assigned to you by your ISP (static IP address
assignment is selected in the previous field).
IP Subnet Mask Enter the subnet mask associated with your static IP.
" The ZyWALL supports only one PPTP server connection at any given time.
To configure a PPTP client, you must configure the My Login and Password fields for a PPP
connection and the PPTP parameters for a PPTP connection.
After configuring My Login and Password for PPP connection, press [SPACE BAR] and
then [ENTER] in the Encapsulation field in Menu 4 -Internet Access Setup to choose
PPTP as your encapsulation option. This brings up the following screen.
The following table contains instructions about the new fields when you choose PPTP in the
Encapsulation field in menu 4.
Table 228 New Fields in Menu 4 (PPTP) Screen
FIELD DESCRIPTION
Encapsulation Press [SPACE BAR] and then press [ENTER] to choose PPTP. The encapsulation
method influences your choices for the IP Address field.
Idle Timeout This value specifies the time, in seconds, that elapses before the ZyWALL
automatically disconnects from the PPTP server.
The following table contains instructions about the new fields when you choose PPPoE in the
Encapsulation field in menu 4.
Table 229 New Fields in Menu 4 (PPPoE) screen
FIELD DESCRIPTION
Encapsulation Press [SPACE BAR] and then press [ENTER] to choose PPPoE. The
encapsulation method influences your choices in the IP Address field.
Idle Timeout This value specifies the time in seconds that elapses before the ZyWALL
automatically disconnects from the PPPoE server.
If you need a PPPoE service name to identify and reach the PPPoE server, please go to menu
11 and enter the PPPoE service name provided to you in the Service Name field.
" When the firewall is activated, the default policy allows all communications to
the Internet that originate from the LAN, and blocks all traffic to the LAN that
originates from the Internet.
You may deactivate the firewall in menu 21.2 or via the ZyWALL embedded web
configurator. You may also define additional firewall rules or modify existing ones but please
exercise extreme caution in doing so. See the chapters on firewall for more information on the
firewall.
39.3.1 IP Address
From the main menu, enter 5 to open Menu 5 - DMZ Setup to configure TCP/IP (RFC 1155).
From menu 5, select the submenu option 2. TCP/IP and DHCP Setup and press [ENTER].
The screen now displays Menu 5.2 - TCP/IP and DHCP Ethernet Setup, as shown next.
The DHCP and TCP/IP setup fields are the same as the ones in Menu 3.2 - TCP/IP and
DHCP Ethernet Setup. Each public server will need a unique IP address. Refer to Section
37.4 on page 634 for information on how to configure these fields.
" DMZ, WLAN and LAN IP addresses must be on separate subnets. You must
also configure NAT for the DMZ port (see Chapter 44 on page 673) in menus
15.1 and 15.2.
IP Alias 1= No
IP Address= N/A
IP Subnet Mask= N/A
RIP Direction= N/A
Version= N/A
Incoming protocol filters= N/A
Outgoing protocol filters= N/A
IP Alias 2= No
IP Address= N/A
IP Subnet Mask= N/A
RIP Direction= N/A
Version= N/A
Incoming protocol filters= N/A
Outgoing protocol filters= N/A
Refer to Table 226 on page 637 for instructions on configuring IP alias parameters.
1. Route Assessment
2. Traffic Redirect
3. Route Failover
Active= No
Configuration:
Backup Gateway IP Address= 0.0.0.0
Metric= 14
Period= 5
Timeout=: 3
Fail Tolerance= 3
" If you are configuring the ZyWALL from a computer connected to the wireless
LAN and you change the ZyWALL’s ESSID or WEP settings, you will lose your
wireless connection when you press [ENTER] to confirm. You must then
change the wireless settings of your computer to match the ZyWALL’s new
settings.
From the main menu, enter 7 to open Menu 7 - WLAN Setup to configure the Wireless LAN
setup. To edit the wireless LAN configuration, enter 1 to open Menu 7.1 - Wireless Setup as
shown next.
" The settings of all client stations on the wireless LAN must match those of the
ZyWALL.
Follow the instructions in the next table on how to configure the wireless LAN parameters.
Table 233 Menu 7.1: Wireless Setup
FIELD DESCRIPTION
Enable Press [SPACE BAR] to select Yes to turn on the wireless LAN. The wireless LAN is off
Wireless by default. Configure wireless LAN security features such as Mac filters and 802.1X
LAN before you turn on the wireless LAN.
Bridge Select LAN to use the wireless card as part of the LAN.
Channel Select DMZ to use the wireless card as part of the DMZ.
Select WLAN to use the wireless card as part of the WLAN.
The ZyWALL restarts after you change the wireless card setting.
Note: If you set the wireless card to be part of the LAN or DMZ, you can
still use wireless access, but not the WLAN interface in the
firewall. The firewall will treat the wireless card as part of the LAN
or DMZ respectively.
ESSID (Extended Service Set IDentification) The ESSID identifies the AP to which the wireless
stations associate. Wireless stations associating to the Access Point must have the
same ESSID. Enter a descriptive name (up to 32 characters) for the wireless LAN.
Hide ESSID Press [SPACE BAR] to select Yes to hide the ESSID in the outgoing beacon frame so
a station cannot obtain the ESSID through passive scanning.
Channel ID This allows you to set the operating frequency/channel depending on your particular
region. Use the [SPACE BAR] to select a channel.
RTS Use RTS/CTS to reduce data collisions on the wireless network if you have wireless
Threshold clients that are associated with the same AP but out of range of one another. When
enabled, a wireless client sends an RTS (Request To Send) and then waits for a CTS
(Clear To Send) before it transmits. This stops wireless clients from transmitting
packets at the same time (and causing data collisions).
A wireless client sends an RTS for all packets larger than the number (of bytes) that
you enter here. Set the RTS/CTS equal to or higher than the fragmentation threshold to
turn RTS/CTS off.
Frag. The threshold (number of bytes) for the fragmentation boundary for directed messages.
Threshold It is the maximum data fragment size that can be sent.
WEP Select Disable to allow wireless stations to communicate with the access points
without any data encryption.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Default Key Enter the key number (1 to 4) in this field. Only one key can be enabled at any one
time. This key must be the same on the ZyWALL and the wireless stations to
communicate.
Note: Enter “0x” before the key to denote a hexadecimal key. Don’t
enter “0x” before the key to denote an ASCII key.
Edit MAC Press [SPACE BAR] to select Yes and then press [ENTER] to display menu 7.1.1.
Address
Filter
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to
save your configuration, or press [ESC] at any time to cancel.
Active= No
Filter Action= Allowed Association
MAC Address Filter
Address 1= 00:00:00:00:00:00
Address 2= 00:00:00:00:00:00
Address 3= 00:00:00:00:00:00
Address 4= 00:00:00:00:00:00
Address 5= 00:00:00:00:00:00
Address 6= 00:00:00:00:00:00
Address 7= 00:00:00:00:00:00
Address 8= 00:00:00:00:00:00
Address 9= 00:00:00:00:00:00
Address 10= 00:00:00:00:00:00
Address 11= 00:00:00:00:00:00
Address 12= 00:00:00:00:00:00
The default action, Allowed Association, permits association with the ZyWALL.
MAC addresses not listed will be denied access to the router.
MAC Address
Filter
Address 1..12 Enter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the client computers
that are allowed or denied access to the ZyWALL in these address fields.
When you have completed this menu, press [ENTER] at the prompt [Press ENTER to Confirm…] to
save your configuration, or press [ESC] at any time to cancel.
41.2.1 IP Address
From the main menu, enter 7 to open Menu 7 - WLAN Setup to configure TCP/IP (RFC
1155).
1. Wireless Setup
2. TCP/IP and DHCP Setup
From menu 7, select the submenu option 2. TCP/IP and DHCP Setup and press [ENTER].
The screen now displays Menu 7.2 - TCP/IP and DHCP Ethernet Setup, as shown next.
The DHCP and TCP/IP setup fields are the same as the ones in Menu 3.2 - TCP/IP and
DHCP Ethernet Setup. Each public server will need a unique IP address. Refer to Section
37.4 on page 634 for information on how to configure these fields.
" DMZ, WLAN and LAN IP addresses must be on separate subnets. You must
also configure NAT for the WLAN port (see Chapter 44 on page 673) in menus
15.1 and 15.2.
IP Alias 1= No
IP Address= N/A
IP Subnet Mask= N/A
RIP Direction= N/A
Version= N/A
IP Alias 2= No
IP Address= N/A
IP Subnet Mask= N/A
RIP Direction= N/A
Version= N/A
Refer to Table 226 on page 637 for instructions on configuring IP alias parameters.
Figure 401 Menu 11.1: Remote Node Profile for Ethernet Encapsulation
Table 235 Menu 11.1: Remote Node Profile for Ethernet Encapsulation (continued)
FIELD DESCRIPTION
My Password Enter the password assigned by your ISP when the ZyWALL calls this remote node.
Valid for PPPoE encapsulation only.
Retype to Type your password again to make sure that you have entered it correctly.
Confirm
Server This field is valid only when RoadRunner is selected in the Service Type field. The
ZyWALL will find the RoadRunner Server IP automatically if this field is left blank. If
it does not, then you must enter the authentication server IP address here.
Relogin Every This field is available when you select Telia Login in the Service Type field.
(min) The Telia server logs the ZyWALL out if the ZyWALL does not log in periodically.
Type the number of minutes from 1 to 59 (30 recommended) for the ZyWALL to wait
between logins.
Route This field refers to the protocol that will be routed by your ZyWALL – IP is the only
option for the ZyWALL.
Edit IP This field leads to a “hidden” menu. Press [SPACE BAR] to select Yes and press
[ENTER] to go to Menu 11.x.2 - Remote Node Network Layer Options.
Session Options
Schedules You can apply up to four schedule sets here. For more details please refer to
Chapter 53 on page 757.
Edit Filter Sets This field leads to another “hidden” menu. Use [SPACE BAR] to select Yes and
press [ENTER] to open menu 11.x.4 to edit the filter sets. See Section 42.5 on page
666 for more details.
Once you have configured this menu, press [ENTER] at the message “Press ENTER to Confirm...” to
save your configuration, or press [ESC] at any time to cancel.
Figure 402 Menu 11.1: Remote Node Profile for PPPoE Encapsulation
42.3.2.3 Metric
See Section on page 171 for details on the Metric field.
Table 236 Fields in Menu 11.1 (PPPoE Encapsulation Specific)
FIELD DESCRIPTION
Service Name If you are using PPPoE encapsulation, then type the name of your PPPoE service
here. Only valid with PPPoE encapsulation.
Authen This field sets the authentication protocol used for outgoing calls.
Options for this field are:
CHAP/PAP - Your ZyWALL will accept either CHAP or PAP when requested by this
remote node.
CHAP - accept CHAP only.
PAP - accept PAP only.
Telco Option
Allocated The field sets a ceiling for outgoing call time for this remote node. The default for this
Budget field is 0 meaning no budget control.
Period(hr) This field is the time period that the budget should be reset. For example, if we are
allowed to call this remote node for a maximum of 10 minutes every hour, then the
Allocated Budget is (10 minutes) and the Period(hr) is 1 (hour).
Schedules You can apply up to four schedule sets here. For more details please refer to
Chapter 53 on page 757.
Nailed-Up This field specifies if you want to make the connection to this remote node a nailed-
Connection up connection. More details are given earlier in this section.
Session
Options
Idle Timeout Type the length of idle time (when there is no traffic from the ZyWALL to the remote
node) in seconds that can elapse before the ZyWALL automatically disconnects the
PPPoE connection. This option only applies when the ZyWALL initiates the call.
Figure 403 Menu 11.1: Remote Node Profile for PPTP Encapsulation
The next table shows how to configure fields in menu 11.1 not previously discussed.
Table 237 Menu 11.1: Remote Node Profile for PPTP Encapsulation
FIELD DESCRIPTION
Encapsulation Press [SPACE BAR] and then [ENTER] to select PPTP. You must also go to menu
11.3 to check the IP Address setting once you have selected the encapsulation
method.
My IP Addr Enter the IP address of the WAN Ethernet port.
My IP Mask Enter the subnet mask of the WAN Ethernet port.
Server IP Addr Enter the IP address of the ANT modem.
Connection ID/ Enter the connection ID or connection name in the ANT. It must follow the “c:id” and
Name “n:name” format.
This field is optional and depends on the requirements of your DSL modem.
Schedules You can apply up to four schedule sets here. For more details refer to Chapter 53
on page 757.
Nailed-Up Press [SPACE BAR] and then [ENTER] to select Yes if you want to make the
Connections connection to this remote node a nailed-up connection.
42.4 Edit IP
Move the cursor to the Edit IP field in menu 11.1, then press [SPACE BAR] to select Yes.
Press [ENTER] to open Menu 11.1.2 - Remote Node Network Layer Options. Not all fields
are available on all models.
Figure 404 Menu 11.1.2: Remote Node Network Layer Options for Ethernet Encapsulation
This menu displays the My WAN Addr field for PPPoE and PPTP encapsulations and
Gateway IP Addr field for Ethernet encapsulation. The following table describes the fields
in this menu.
Table 238 Remote Node Network Layer Options Menu Fields
FIELD DESCRIPTION
IP Address If your ISP did not assign you an explicit IP address, press [SPACE BAR] and then
Assignment [ENTER] to select Dynamic; otherwise select Static and enter the IP address &
subnet mask in the following fields.
(Rem) IP If you have a static IP Assignment, enter the IP address assigned to you by your ISP.
Address
(Rem) IP If you have a static IP Assignment, enter the subnet mask assigned to you.
Subnet Mask
Gateway IP This field is applicable to Ethernet encapsulation only. Enter the gateway IP address
Addr assigned to you if you are using a static IP address.
My WAN Addr This field is applicable to PPPoE and PPTP encapsulations only. Some
implementations, especially the UNIX derivatives, require the WAN link to have a
separate IP network number from the LAN and each end must have a unique address
within the WAN network number. If this is the case, enter the IP address assigned to
the WAN port of your ZyWALL.
Note that this is the address assigned to your local ZyWALL, not the remote router.
Network Network Address Translation (NAT) allows the translation of an Internet protocol
Address address used within one network (for example a private IP address used in a local
Translation network) to a different IP address known within another network (for example a public
IP address used on the Internet).
Choose None to disable NAT.
Choose SUA Only if you have a single public IP address. SUA (Single User Account)
is a subset of NAT that supports two types of mapping: Many-to-One and Server.
Choose Full Feature if you have multiple public IP addresses. Full Feature mapping
types include: One-to-One, Many-to-One (SUA/PAT), Many-to-Many Overload,
Many- One-to-One and Server. When you select Full Feature you must configure at
least one address mapping set.
See Chapter 22 on page 435 for a full discussion on this feature.
Table 238 Remote Node Network Layer Options Menu Fields (continued)
FIELD DESCRIPTION
NAT Lookup If you select SUA Only in the Network Address Translation field, it displays 255 and
Set indicates the SMT will use the pre-configured Set 255 (read only) in menu 15.1.
If you select Full Feature or None in the Network Address Translation field, it
displays 1, 2 or 3 and indicates the SMT will use the pre-configured Set 1 in menu
15.1 for the first WAN port, Set 2 in menu 15.1 for the second WAN port and Set 3 for
the Backup port.
Refer to Section 44.2 on page 675 for more information.
Metric Enter a number from 1 to 15 to set this route’s priority among the ZyWALL’s routes
(see Section on page 171). The smaller the number, the higher priority the route has.
Private This field is valid only for PPTP/PPPoE encapsulation. This parameter determines if
the ZyWALL will include the route to this remote node in its RIP broadcasts. If set to
Yes, this route is kept private and not included in RIP broadcast. If No, the route to this
remote node will be propagated to other hosts through RIP broadcasts.
RIP Direction Press [SPACE BAR] and then [ENTER] to select the RIP direction from Both/ None/In
Only/Out Only. See Chapter 7 on page 149 for more information on RIP. The default
for RIP on the WAN side is None. It is recommended that you do not change this
setting.
Version Press [SPACE BAR] and then [ENTER] to select the RIP version from RIP-1/RIP-2B/
RIP-2M or None.
Multicast IGMP (Internet Group Management Protocol) is a network-layer protocol used to
establish membership in a Multicast group. The ZyWALL supports both IGMP version
1 (IGMP-v1) and version 2 (IGMP-v2). Press [SPACE BAR] to enable IP Multicasting
or select None to disable it. See Chapter 7 on page 149 for more information on this
feature.
Once you have completed filling in Menu 11.3 Remote Node Network Layer Options, press [ENTER]
at the message “Press ENTER to Confirm...” to save your configuration and return to menu 11, or
press [ESC] at any time to cancel.
Figure 406 Menu 11.1.4: Remote Node Filter (PPPoE or PPTP Encapsulation)
" The first two static route entries are for default WAN1 and WAN2 routes on a
ZyWALL with multiple WAN interfaces. You cannot modify or delete a static
default route.
The default route is disabled after you change the static WAN IP address to a
dynamic WAN IP address.
" The “-” before a route name indicates the static route is inactive.
Now, enter the index number of the static route that you want to configure.
Route #: 3
Route Name= ?
Active= No
Destination IP Address= ?
IP Subnet Mask= ?
Gateway IP Address= ?
Metric= 2
Private= No
" You must create a firewall rule in addition to setting up SUA/NAT, to allow
traffic from the WAN to be forwarded through the ZyWALL.
" Choose SUA Only if you have just one public WAN IP address for your
ZyWALL.
Choose Full Feature if you have multiple public WAN IP addresses for your
ZyWALL.
The following figure shows how you apply NAT to the remote node in menu 11.1.
1 Enter 11 from the main menu.
2 Enter 1 to open Menu 11.1 - Remote Node Profile.
3 Move the cursor to the Edit IP field, press [SPACE BAR] to select Yes and then press
[ENTER] to bring up Menu 11.1.2 - Remote Node Network Layer Options.
" On a ZyWALL with two WAN interfaces, you can configure port forwarding and
trigger port rules for the first WAN interface and separate sets of rules for the
second WAN interface.
" Configure DMZ, WLAN and LAN IP addresses in NAT menus 15.1 and 15.2.
DMZ, WLAN and LAN IP addresses must be on separate subnets.
1. NAT_SET
2. example
255. SUA (read only)
Idx Local Start IP Local End IP Global Start IP Global End IP Type
--- --------------- --------------- --------------- --------------- ---
1. 0.0.0.0 255.255.255.255 0.0.0.0 M-1
2. 0.0.0.0 Server
3.
4.
5.
6.
7.
8.
9.
10.
" The entire set will be deleted if you leave the Set Name field blank and press
[ENTER] at the bottom of the screen.
Idx Local Start IP Local End IP Global Start IP Global End IP Type
--- --------------- --------------- --------------- --------------- --
1. 0.0.0.0 255.255.255.255 0.0.0.0 M-1
2. 0.0.0.0 Server
3.
4.
5.
6.
7.
8.
9.
10.
" The Type, Local and Global Start/End IPs are configured in menu 15.1.1.1
(described later) and the values are displayed here.
Now if you delete rule 4, rules 5 to 7 will be pushed up by 1 rule, so as old rule 5 becomes rule
4, old rule 6 becomes rule 5 and old rule 7 becomes rule 6.
Table 242 Fields in Menu 15.1.1
FIELD DESCRIPTION
Set Name Enter a name for this set of rules. This is a required field. If this field is left blank, the entire
set will be deleted.
Action Press [SPACE BAR] to choose from None, Edit, Insert Before, Delete, Go To Rule,
Next Page or Previous Page and then press [ENTER]. You must select a rule in the next
field when you choose the Edit, Insert Before, Delete or Go To Rule commands.
None disables the Select Rule item.
Use Edit to create or edit a rule.
Use Insert Before to insert a rule before the rule selected.
Use Delete to delete the selected rule and then all the rules after the selected one will be
advanced one rule.
Use Go To Rule to view the page where your desired rule is listed.
Select Next Page or Previous Page to view the next or previous page of rules
(respectively).
Select When you choose Edit, Insert Before or Delete in the previous field the cursor jumps to
Rule this field to allow you to select the rule to apply the action in question.
" You must press [ENTER] at the bottom of the screen to save the whole set.
You must do this again if you make any changes to the set – including deleting
a rule. No changes to the set take place until this action is taken.
Selecting Edit in the Action field and then selecting a rule brings up the following menu,
Menu 15.1.1.1 - Address Mapping Rule in which you can edit an individual rule and
configure the Type, Local and Global Start/End IPs.
" An IP End address must be numerically greater than its corresponding IP Start
address.
Type= One-to-One
Local IP:
Start=
End = N/A
Global IP:
Start=
End = N/A
" If you do not assign a Default Server IP address, the ZyWALL discards all
packets received for ports that are not specified here or in the remote
management setup.
1. Server Set 1
2. Server Set 2
3 Enter 1 or 2 to go to Menu 15.2.x - NAT Server Setup and configure the address
mapping rules for the WAN 1 or WAN 2 interface on a ZyWALL with multiple WAN
interfaces.
4 Select Edit Rule in the Select Command field; type the index number of the NAT
server you want to configure in the Select Rule field and press [ENTER] to open Menu
15.2.x.x - NAT Server Configuration (see the next figure).
Wan= 1 Index= 2
------------------------------------------------
Name= 1
Active= Yes
IP Address= 192.168.1.33
5 Enter a port number in the Start Port field. To forward only one port, enter it again in
the End Port field. To specify a range of ports, enter the last port to be forwarded in the
End Port field.
6 Enter the inside IP address of the server in the IP Address field. In the following figure,
you have a computer acting as an FTP, Telnet and SMTP server (ports 21, 23 and 25) at
192.168.1.33.
7 Press [ENTER] at the “Press ENTER to confirm …” prompt to save your configuration
after you define all the servers or press [ESC] at any time to cancel.
You assign the private network IP addresses. The NAT network appears as a single host on the
Internet. A is the FTP/Telnet/SMTP server.
From menu 4 shown above, simply choose the SUA Only option from the Network Address
Translation field. This is the Many-to-One mapping discussed in Section 44.4 on page 683.
The SUA Only read-only option from the Network Address Translation field in menus 4
and 11.3 is specifically pre-configured to handle this case.
In this case, you do exactly as above (use the convenient pre-configured SUA Only set) and
also go to menu 15.2.1 to specify the Default Server behind the NAT as shown in the next
figure.
2 Map the second IGA to our second inside FTP server for FTP traffic in both directions (1
: 1 mapping, giving both local and global IP addresses).
3 Map the other outgoing LAN traffic to IGA3 (Many : 1 mapping).
4 You also map your third IGA to the web server and mail server on the LAN. Type
Server allows you to specify multiple servers, of different types, to other computers
behind NAT on the LAN.
The example situation looks somewhat like this:
1 In this case you need to configure Address Mapping Set 1 from Menu 15.1 - Address
Mapping Sets. Therefore you must choose the Full Feature option from the Network
Address Translation field (in menu 4 or menu 11.3) in Figure 426 on page 687.
2 Then enter 15 from the main menu.
3 Enter 1 to configure the Address Mapping Sets.
4 Enter 1 to begin configuring this new set. Enter a Set Name, choose the Edit Action
and then enter 1 for the Select Rule field. Press [ENTER] to confirm.
5 Select Type as One-to-One (direct mapping for packets going both ways), and enter
the local Start IP as 192.168.1.10 (the IP address of FTP Server 1), the global Start IP
as 10.132.50.1 (our first IGA). (See Figure 427 on page 687).
6 Repeat the previous step for rules 2 to 4 as outlined above.
7 When finished, menu 15.1.1 should look like as shown in Figure 428 on page 688.
Type= One-to-One
Local IP:
Start= 192.168.1.10
End = N/A
Global IP:
Start= 10.132.50.1
End = N/A
Idx Local Start IP Local End IP Global Start IP Global End IP Type
--- --------------- --------------- --------------- --------------- ---
1. 192.168.1.10 10.132.50.1 1-1
2 192.168.1.11 10.132.50.2 1-1
3. 0.0.0.0 255.255.255.255 10.132.50.3 M-1
4. 10.132.50.3 Server
5.
6.
7.
8.
9.
10.
Now configure the IGA3 to map to our web server and mail server on the LAN.
1 Enter 15 from the main menu.
2 Enter 2 to go to menu 15.2.
3 (Enter 1 or 2 from menu 15.2 on a ZyWALL with multiple WAN ports) configure the
menu as shown in Figure 429 on page 688.
" Other applications such as some gaming programs are NAT unfriendly
because they embed addressing information in the data stream. These
applications won’t work through NAT even when using One-to-One and
Many-One-to-One mapping types.
Follow the steps outlined in example 3 above to configure these two menus as follows.
Type= Many-One-to-One
Local IP:
Start= 192.168.1.10
End = 192.168.1.12
Global IP:
Start= 10.132.50.1
End = 10.132.50.3
After you’ve configured your rule, you should be able to check the settings in menu 15.1.1 as
shown next.
Idx Local Start IP Local End IP Global Start IP Global End IP Type
--- --------------- --------------- --------------- --------------- ---
1. 192.168.1.10 192.168.1.12 10.132.50.1 10.132.50.3 M-1-1
2.
3.
4.
5.
6.
7.
8.
9.
10.
" Only one LAN computer can use a trigger port (range) at a time.
Enter 3 in menu 15 to display Menu 15.3 - Trigger Ports. For a ZyWALL with multiple
WAN interfaces, enter 1 or 2 from menu 15.3 to go to Menu 15.3.1 or Menu 15.3.2 - Trigger
Port Setup and configure trigger port rules for the first or second WAN interface.
Incoming Trigger
Rule Name Start Port End Port Start Port End Port
--------------------------------------------------------------
1. Real Audio 6970 7170 7070 7070
2. 0 0 0 0
3. 0 0 0 0
4. 0 0 0 0
5. 0 0 0 0
6. 0 0 0 0
7. 0 0 0 0
8. 0 0 0 0
9. 0 0 0 0
10. 0 0 0 0
11. 0 0 0 0
12. 0 0 0 0
1. Filter Setup
2. Firewall Setup
Active: Yes
" Configure the firewall rules using the web configurator or CLI commands.
For incoming packets, your ZyWALL applies data filters only. Packets are processed
depending upon whether a match is found. The following sections describe how to configure
filter sets.
You can apply up to four filter sets to a particular port to block multiple types of packets. With
each filter set having up to six rules, you can have a maximum of 24 rules active for a single
port.
1. Filter Setup
2. Firewall Setup
Filter Filter
Set # Comments Set # Comments
------ ----------------- ------ -----------------
1 _______________ 7 _______________
2 _______________ 8 _______________
3 _______________ 9 _______________
4 _______________ 10 _______________
5 _______________ 11 _______________
6 _______________ 12 _______________
3 Select the filter set you wish to configure (1-12) and press [ENTER].
4 Enter a descriptive name or comment in the Edit Comments field and press [ENTER].
5 Press [ENTER] at the message [Press ENTER to confirm] to open Menu 21.1.x -
Filter Rules Summary.
This screen shows the summary of the existing rules in the filter set. The following tables
contain a brief description of the abbreviations used in the previous menus.
Refer to the next section for information on configuring the filter rules.
Filter #: 1,1
Filter Type= TCP/IP Filter Rule
Active= Yes
IP Protocol= 0 IP Source Route= No
Destination: IP Addr=
IP Mask=
Port #=
Port # Comp= None
Source: IP Addr=
IP Mask=
Port #=
Port # Comp= None
TCP Estab= N/A
More= No Log= None
Action Matched= Check Next Rule
Action Not Matched= Check Next Rule
The following table describes how to configure your TCP/IP filter rule.
Table 248 Menu 21.1.1.1: TCP/IP Filter Rule
FIELD DESCRIPTION
Active Press [SPACE BAR] and then [ENTER] to select Yes to activate the filter rule or No
to deactivate it.
IP Protocol Protocol refers to the upper layer protocol, e.g., TCP is 6, UDP is 17 and ICMP is 1.
Type a value between 0 and 255. A value of 0 matches ANY protocol.
IP Source Route Press [SPACE BAR] and then [ENTER] to select Yes to apply the rule to packets
with an IP source route option. Otherwise the packets must not have a source route
option. The majority of IP packets do not have source route.
Destination
IP Addr Enter the destination IP Address of the packet you wish to filter. This field is ignored
if it is 0.0.0.0.
IP Mask Enter the IP mask to apply to the Destination: IP Addr.
Port # Enter the destination port of the packets that you wish to filter. The range of this field
is 0 to 65535. This field is ignored if it is 0.
For generic rules, the ZyWALL treats a packet as a byte stream as opposed to an IP or IPX
packet. You specify the portion of the packet to check with the Offset (from 0) and the Length
fields, both in bytes. The ZyWALL applies the Mask (bit-wise ANDing) to the data portion
before comparing the result against the Value to determine a match. The Mask and Value are
specified in hexadecimal numbers. Note that it takes two hexadecimal digits to represent a
byte, so if the length is 4, the value in either field will take 8 digits, for example, FFFFFFFF.
To configure a generic rule, select Generic Filter Rule in the Filter Type field in menu
21.1.x.x and press [ENTER] to open Generic Filter Rule, as shown below.
Filter #: 1,1
Filter Type= Generic Filter Rule
Active= No
Offset= 0
Length= 0
Mask= N/A
Value= N/A
More= No Log= None
Action Matched= Check Next Rule
Action Not Matched= Check Next Rule
The following table describes the fields in the Generic Filter Rule menu.
Table 249 Generic Filter Rule Menu Fields
FIELD DESCRIPTION
Filter # This is the filter set, filter rule co-ordinates, i.e., 2,3 refers to the second filter set and the
third rule of that set.
Filter Type Use [SPACE BAR] and then [ENTER] to select a rule type. Parameters displayed below
each type will be different. TCP/IP filter rules are used to filter IP packets while generic
filter rules allow filtering of non-IP packets.
Options are Generic Filter Rule and TCP/IP Filter Rule.
Active Select Yes to turn on the filter rule or No to turn it off.
Offset Enter the starting byte of the data portion in the packet that you wish to compare. The
range for this field is from 0 to 255.
Length Enter the byte count of the data portion in the packet that you wish to compare. The range
for this field is 0 to 8.
Mask Enter the mask (in Hexadecimal notation) to apply to the data portion before comparison.
Value Enter the value (in Hexadecimal notation) to compare with the data portion.
More If Yes, a matching packet is passed to the next filter rule before an action is taken; else
the packet is disposed of according to the action fields.
If More is Yes, then Action Matched and Action Not Matched will be No.
1 Enter 21 from the main menu to open Menu 21 - Filter and Firewall Setup.
2 Enter 1 to open Menu 21.1 - Filter Set Configuration.
3 Enter the index of the filter set you wish to configure (say 3) and press [ENTER].
4 Enter a descriptive name or comment in the Edit Comments field and press [ENTER].
5 Press [ENTER] at the message [Press ENTER to confirm] to open Menu 21.1.3 - Filter
Rules Summary.
6 Enter 1 to configure the first filter rule (the only filter rule of this set). Make the entries
in this menu as shown in the following figure.
Filter #: 3,1
Filter Type= TCP/IP Filter Rule
Active= Yes
IP Protocol= 6 IP Source Route= No
Destination: IP Addr= 0.0.0.0
IP Mask= 0.0.0.0
Port #= 23
Port # Comp= Equal
Source: IP Addr= 0.0.0.0
IP Mask= 0.0.0.0
Port #= 0
Port # Comp= None
TCP Estab= No
More= No Log= None
Action Matched= Drop
Action Not Matched= Forward
The port number for the telnet service (TCP protocol) is 23. See RFC 1060 for port numbers of
well-known services.
When you press [ENTER] to confirm, you will see the following screen. Note that there is
only one filter rule in this set.
This shows you that you have configured and activated (A = Y) a TCP/IP filter rule (Type =
IP, Pr = 6) for destination telnet ports (DP = 23).
M = N means an action can be taken immediately. The action is to drop the packet (m = D) if
the action is matched and to forward the packet immediately (n = F) if the action is not
matched no matter whether there are more rules to be checked (there aren’t in this example).
After you’ve created the filter set, you must apply it.
1 Enter 11 from the main menu to go to menu 11.
2 Enter 1 or 2 to open Menu 11.x - Remote Node Profile.
3 Go to the Edit Filter Sets field, press [SPACE BAR] to select Yes and press [ENTER].
4 This brings you to menu 11.1.4. Apply a filter set (our example filter set 3) as shown in
Figure 449 on page 709.
5 Press [ENTER] to confirm after you enter the set numbers and to leave menu 11.1.4.
46.5.2 Firewall
• The firewall inspects packet contents as well as their source and destination addresses.
Firewalls of this type employ an inspection module, applicable to all protocols, that
understands data in the packet is intended for other layers, from the network layer (IP
headers) up to the application layer.
• The firewall performs stateful inspection. It takes into account the state of connections it
handles so that, for example, a legitimate incoming packet can be matched with the
outbound request for that packet and allowed in. Conversely, an incoming packet
masquerading as a response to a non-existent outbound request can be blocked.
• The firewall uses session filtering, i.e., smart rules, that enhance the filtering process and
control the network session rather than control individual packets in a session.
• The firewall provides e-mail service to notify you of routine reports and when alerts occur.
SNMP:
Get Community= public
Set Community= public
Trusted Host= 0.0.0.0
Trap:
Community= public
Destination= 0.0.0.0
1. System Status
2. System Information and Console Port Speed
3. Log and Trace
4. Diagnostic
5. Backup Configuration
6. Restore Configuration
7. Upload Firmware
8. Command Interpreter Mode
9. Call Control
10. Time and Date Setting
11. Remote Management Setup
3 There are three commands in Menu 24.1 - System Maintenance - Status. Entering 1 or
2 drops the WAN1 or WAN2 connection, 9 resets the counters and [ESC] takes you
back to the previous screen.
Press Command:
The following table describes the fields present in Menu 24.1 - System Maintenance -
Status. These fields are READ-ONLY and meant for diagnostic purposes. The upper right
corner of the screen shows the time and date according to the format you set in menu 24.10.
Table 252 System Maintenance: Status Menu Fields
FIELD DESCRIPTION
Port This field identifies an interface (WAN1, WAN2, LAN, WCRD (wireless LAN card),
DMZ or WLAN) on the ZyWALL.
Status For the LAN, DMZ, and WLAN Interfaces, this displays the port speed and duplex
setting.
For the WAN interfaces, it displays the port speed and duplex setting if you’re
using Ethernet encapsulation or the remote node name (configured through the
SMT) for a PPP connection and Down (line is down or not connected), Idle (line
(ppp) idle), Dial (starting to trigger a call) or Drop (dropping a call) if you’re using
PPPoE encapsulation.
For the wireless card, it displays the transmission rate when a wireless LAN card
is inserted and WLAN is enabled or Down when a wireless LAN is not inserted or
WLAN is disabled.
Note: In Menu 24.1, WCRD only represents the WLAN card status.
The WCRD status is always down when a TURBO card is
installed.
TxPkts This is the number of transmitted packets on this port.
RxPkts This is the number of received packets on this port.
Figure 453 Menu 24.2: System Information and Console Port Speed
1. System Information
2. Console Port Speed
Name:
Routing: IP
ZyNOS F/W Version: V4.03(WM.0)b1 | 06/29/2007
Country Code: 255
LAN
Ethernet Address: 00:13:49:00:00:02
IP Address: 192.168.1.1
IP Mask: 255.255.255.0
DHCP: Server
Figure 455 Menu 24.2.2: System Maintenance: Change Console Port Speed
4. Call-Triggering Packet
Examples of typical error and information messages are presented in the following figure.
52 Thu Jul 1 05:54:53 2004 PP05 ERROR Wireless LAN init fail, code=15
53 Thu Jul 1 05:54:53 2004 PINI INFO Channel 0 ok
54 Thu Jul 1 05:54:56 2004 PP05 -WARN SNMP TRAP 3: interface 3: link up
55 Thu Jul 1 05:54:56 2004 PP0d INFO LAN promiscuous mode <0>
57 Thu Jul 1 05:54:56 2004 PP0d INFO LAN promiscuous mode <1>
58 Thu Jul 1 05:54:56 2004 PINI INFO Last errorlog repeat 1 Times
59 Thu Jul 1 05:54:56 2004 PINI INFO main: init completed
60 Thu Jul 1 05:55:26 2004 PSSV -WARN SNMP TRAP 0: cold start
61 Thu Jul 1 05:56:56 2004 PINI INFO SMT Session Begin
62 Thu Jul 1 07:50:58 2004 PINI INFO SMT Session End
63 Thu Jul 1 07:53:28 2004 PINI INFO SMT Session Begin
Clear Error Log (y/n):
Syslog:
Active= No
Syslog Server IP Address= 0.0.0.0
Log Facility= Local 1
You need to configure the syslog parameters described in the following table to activate syslog
then choose what you want to log.
Table 254 System Maintenance Menu Syslog Parameters
FIELD DESCRIPTION
Syslog:
Active Press [SPACE BAR] and then [ENTER] to turn syslog on or off.
Syslog Server IP Enter the server n77777ame or IP address of the syslog server that will log the
Address selected categories of logs.
Log Facility Press [SPACE BAR] and then [ENTER] to select a location. The log facility allows
you to log the messages to different files in the syslog server. Refer to the
documentation of your syslog program for more details.
When finished configuring this screen, press [ENTER] to confirm or [ESC] to cancel.
Your ZyWALL sends five types of syslog messages. Some examples (not all ZyWALL
specific) of these syslog messages with their message formats are shown next:
1 CDR
2 Packet triggered
3 Filter log
4 PPP log
5 Firewall log
IP Header:
IP Version = 4
Header Length = 20
Type of Service = 0x00 (0)
Total Length = 0x002C (44)
Identification = 0x0002 (2)
Flags = 0x00
Fragment Offset = 0x00
Time to Live = 0xFE (254)
Protocol = 0x06 (TCP)
Header Checksum = 0xFB20 (64288)
Source IP = 0xC0A80101 (192.168.1.1)
Destination IP = 0x00000000 (0.0.0.0)
TCP Header:
Source Port = 0x0401 (1025)
Destination Port = 0x000D (13)
Sequence Number = 0x05B8D000 (95997952)
Ack Number = 0x00000000 (0)
Header Length = 24
Flags = 0x02 (....S.)
Window Size = 0x2000 (8192)
Checksum = 0xE06A (57450)
Urgent Ptr = 0x0000 (0)
Options =
0000: 02 04 02 00
RAW DATA:
0000: 45 00 00 2C 00 02 00 00-FE 06 FB 20 C0 A8 01 01 E......... ....
0010: 00 00 00 00 04 01 00 0D-05 B8 D0 00 00 00 00 00
................
0020: 60 02 20 00 E0 6A 00 00-02 04 02 00
Press any key to continue...
48.5 Diagnostic
The diagnostic facility allows you to test the different aspects of your ZyWALL to determine
if it is working properly. Menu 24.4 allows you to choose among various types of diagnostic
tests to evaluate your system, as shown next. Not all fields are available on all models.
Follow the procedure below to get to Menu 24.4 - System Maintenance - Diagnostic.
1 From the main menu, select option 24 to open Menu 24 - System Maintenance.
2 From this menu, select option 4. Diagnostic. This will open Menu 24.4 - System
Maintenance - Diagnostic.
TCP/IP
1. Ping Host
2. WAN DHCP Release
3. WAN DHCP Renewal
4. PPPoE/PPTP/3G Setup Test
System
11. Reboot System
WAN=
Host IP Address= N/A
The following table describes the diagnostic tests available in menu 24.4 for your ZyWALL
and associated connections.
49.1 Introduction
Use the instructions in this chapter to change the ZyWALL’s configuration file or upgrade its
firmware. After you configure your ZyWALL, you can backup the configuration file to a
computer. That way if you later misconfigure the ZyWALL, you can upload the backed up
configuration file to return to your previous settings. You can alternately upload the factory
default configuration file if you want to return the ZyWALL to the original default settings.
The firmware determines the ZyWALL’s available features and functionality. You can
download new firmware releases from your nearest ZyXEL FTP site to use to upgrade your
ZyWALL’s performance.
If your (T)FTP client does not allow you to have a destination filename different than the
source, you will need to rename them as the ZyWALL only recognizes “rom-0” and “ras”. Be
sure you keep unaltered copies of both files for later use.
The following table is a summary. Please note that the internal filename refers to the filename
on the ZyWALL and the external filename refers to the filename not on the ZyWALL, that is,
on your computer, local network or FTP site and so the name (but not the extension) may vary.
After uploading new firmware, see the ZyNOS F/W Version field in Menu 24.2.1 - System
Maintenance - Information to confirm that you have uploaded the correct firmware version.
The AT command is the command you enter after you press “y” when prompted in the SMT
menu to go into debug mode.
Table 256 Filename Conventions
INTERNAL EXTERNAL NAME
FILE TYPE DESCRIPTION
NAME
Configuration Rom-0 This is the configuration filename on the ZyWALL. *.rom
File Uploading the rom-0 file replaces the entire ROM file
system, including your ZyWALL configurations,
system-related data (including the default
password), the error log and the trace log.
Firmware Ras This is the generic name for the ZyNOS firmware on *.bin
the ZyWALL.
" The ZyWALL displays different messages explaining different ways to backup,
restore and upload files in menus 24.5, 24.6, 24. 7.1 and 24.7.2 depending on
whether you use the console port or Telnet.
Option 5 from Menu 24 - System Maintenance allows you to backup the current ZyWALL
configuration to your computer. Backup is highly recommended once your ZyWALL is
functioning properly. FTP is the preferred method for backing up your current configuration to
your computer since it is faster. You can also perform backup and restore using menu 24
through the console port. Any serial communications program should work fine; however, you
must use Xmodem protocol to perform the download/upload and you don’t have to rename the
files.
Please note that terms “download” and “upload” are relative to the computer. Download
means to transfer from the ZyWALL to the computer, while upload means from your
computer to the ZyWALL.
4 Launch the TFTP client on your computer and connect to the ZyWALL. Set the transfer
mode to binary before starting data transfer.
5 Use the TFTP client (see the example below) to transfer files between the ZyWALL and
the computer. The file name for the configuration file is “rom-0” (rom-zero, not capital
o).
Note that the telnet connection must be active and the SMT in CI mode before and during the
TFTP transfer. For details on TFTP commands (see following example), please consult the
documentation of your TFTP client program. For UNIX, use “get” to transfer from the
ZyWALL to the computer and “binary” to set binary transfer mode.
Refer to Section 49.3.5 on page 728 to read about configurations that disallow TFTP and FTP
over WAN.
2 The following screen indicates that the Xmodem download has started.
3 Run the HyperTerminal program by clicking Transfer, then Receive File as shown in
the following screen.
Type a location for storing the configuration file or click Browse to look for one.
Choose the Xmodem protocol.
Then click Receive.
4 After a successful backup you will see the following screen. Press any key to return to
the SMT menu.
FTP is the preferred method for restoring your current computer configuration to your
ZyWALL since FTP is faster. Please note that you must wait for the system to automatically
restart after the file transfer is complete.
" WARNING!
Do not interrupt the file transfer process as this may PERMANENTLY
DAMAGE YOUR ZyWALL. When the Restore Configuration process is
complete, the ZyWALL will automatically restart.
Refer to Section 49.3.5 on page 728 to read about configurations that disallow TFTP and FTP
over WAN.
2 The following screen indicates that the Xmodem download has started.
3 Run the HyperTerminal program by clicking Transfer, then Send File as shown in the
following screen.
4 After a successful restoration you will see the following screen. Press any key to restart
the ZyWALL and return to the SMT menu.
Save to ROM
Hit any key to start system reboot.
To upload the firmware and the configuration file, follow these examples
49.5.3 FTP File Upload Command from the DOS Prompt Example
1 Launch the FTP client on your computer.
2 Enter “open”, followed by a space and the IP address of your ZyWALL.
3 Press [ENTER] when prompted for a username.
4 Enter your password as requested (the default is “1234”).
5 Enter “bin” to set transfer mode to binary.
6 Use “put” to transfer files from the computer to the ZyWALL, for example, “put
firmware.bin ras” transfers the firmware on your computer (firmware.bin) to the
ZyWALL and renames it “ras”. Similarly, “put config.rom rom-0” transfers the
configuration file on your computer (config.rom) to the ZyWALL and renames it “rom-
0”. Likewise “get rom-0 config.rom” transfers the configuration file on the ZyWALL to
your computer and renames it “config.rom.” See earlier in this chapter for more
information on filename conventions.
7 Enter “quit” to exit the ftp prompt.
More commands (found in GUI-based FTP clients) are listed earlier in this chapter.
Refer to Section 49.3.5 on page 728 to read about configurations that disallow TFTP and FTP
over WAN.
2 Put the SMT in command interpreter (CI) mode by entering 8 in Menu 24 – System
Maintenance.
3 Enter the command “sys stdio 0” to disable the console timeout, so the TFTP
transfer will not be interrupted. Enter “command sys stdio 5” to restore the five-
minute console timeout (default) when the file transfer is complete.
4 Launch the TFTP client on your computer and connect to the ZyWALL. Set the transfer
mode to binary before starting data transfer.
5 Use the TFTP client (see the example below) to transfer files between the ZyWALL and
the computer. The file name for the firmware is “ras”.
Note that the telnet connection must be active and the ZyWALL in CI mode before and during
the TFTP transfer. For details on TFTP commands (see following example), please consult the
documentation of your TFTP client program. For UNIX, use “get” to transfer from the
ZyWALL to the computer, “put” the other way around, and “binary” to set binary transfer
mode.
Warning: Proceeding with the upload will erase the current system
firmware.
2 After the "Starting Xmodem upload" message appears, activate the Xmodem protocol on
your computer. Follow the procedure as shown previously for the HyperTerminal
program. The procedure for other serial communications programs should be similar.
After the firmware upload process has completed, the ZyWALL will automatically restart.
Warning:
1. Proceeding with the upload will erase the current
configuration file.
2. The system's console port speed (Menu 24.2.2) may change when it is
restarted; please adjust your terminal's speed accordingly. The password
may change (menu 23), also.
3. When uploading the DEFAULT configuration file, the console
port speed will be reset to 9600 bps and the password to "1234".
2 After the "Starting Xmodem upload" message appears, activate the Xmodem protocol on
your computer. Follow the procedure as shown previously for the HyperTerminal
program. The procedure for other serial communications programs should be similar.
3 Enter “atgo” to restart the ZyWALL.
After the configuration upload process has completed, restart the ZyWALL by entering
“atgo”.
1. System Status
2. System Information and Console Port Speed
3. Log and Trace
4. Diagnostic
5. Backup Configuration
6. Restore Configuration
7. Upload Firmware
8. Command Interpreter Mode
9. Call Control
10. Time and Date Setting
11. Remote Management Setup
1.Budget Management
2.Call History
The total budget is the time limit on the accumulated time for outgoing calls to a remote node.
When this limit is reached, the call will be dropped and further outgoing calls to that remote
node will be blocked. After each period, the total budget is reset. The default for the total
budget is 0 minutes and the period is 0 hours, meaning no budget control. You can reset the
accumulated connection time in this menu by entering the index of a remote node. Enter 0 to
update the screen. The budget and the reset period can be configured in menu 11.1 for the
remote node.
Table 259 Budget Management
FIELD DESCRIPTION EXAMPLE
Remote Node Enter the index number of the remote node you 1
want to reset (just one in this case)
Connection Time/ This is the total connection time that has gone by 5/10 means that 5 minutes
Total Budget (within the allocated budget that you set in menu out of a total allocation of 10
11.1). minutes have lapsed.
Elapsed Time/Total The period is the time cycle in hours that the 0.5/1 means that 30
Period allocation budget is reset (see menu 11.1.) The minutes out of the 1-hour
elapsed time is the time used up within this time period has lapsed.
period.
Enter “0” to update the screen or press [ESC] to return to the previous screen.
1. System Status
2. System Information and Console Port Speed
3. Log and Trace
4. Diagnostic
5. Backup Configuration
6. Restore Configuration
7. Upload Firmware
8. Command Interpreter Mode
9. Call Control
10. Time and Date Setting
11. Remote Management Setup
Enter 10 to go to Menu 24.10 - System Maintenance - Time and Date Setting to update the
time and date settings of your ZyWALL as shown in the following screen.
Figure 486 Menu 24.10 System Maintenance: Time and Date Setting
Current Time: 08 : 24 : 26
New Time (hh:mm:ss): N/A N/A N/A
Daylight Saving= No
Start Date (mm-nth-week-hr): Jan. - 1st - Sun. - 00
End Date (mm-nth-week-hr): Jan. - 1st - Sun. - 00
Table 261 Menu 24.10 System Maintenance: Time and Date Setting
FIELD DESCRIPTION
Start Date (mm- Configure the day and time when Daylight Saving Time starts if you selected Yes
nth-week-hr) in the Daylight Saving field. The hr field uses the 24 hour format. Here are a
couple of examples:
Daylight Saving Time starts in most parts of the United States on the second
Sunday of March. Each time zone in the United States starts using Daylight Saving
Time at 2 A.M. local time. So in the United States you would select Mar., 2nd, Sun.
and type 02 in the hr field.
Daylight Saving Time starts in the European Union on the last Sunday of March. All
of the time zones in the European Union start using Daylight Saving Time at the
same moment (1 A.M. GMT or UTC). So in the European Union you would select
Mar., Last, Sun. The time you type in the hr field depends on your time zone. In
Germany for instance, you would type 02 because Germany's time zone is one
hour ahead of GMT or UTC (GMT+1).
End Date (mm- Configure the day and time when Daylight Saving Time ends if you selected Yes in
nth-week-hr) the Daylight Saving field. The hr field uses the 24 hour format. Here are a couple
of examples:
Daylight Saving Time ends in the United States on the first Sunday of November.
Each time zone in the United States stops using Daylight Saving Time at 2 A.M.
local time. So in the United States you would select Nov., First, Sun. and type 02
in the hr field.
Daylight Saving Time ends in the European Union on the last Sunday of October.
All of the time zones in the European Union stop using Daylight Saving Time at the
same moment (1 A.M. GMT or UTC). So in the European Union you would select
Oct., Last, Sun. The time you type in the hr field depends on your time zone. In
Germany for instance, you would type 02 because Germany's time zone is one
hour ahead of GMT or UTC (GMT+1).
Once you have filled in this menu, press [ENTER] at the message “Press ENTER to Confirm or ESC to
Cancel“ to save your configuration, or press [ESC] to cancel.
" When you configure remote management to allow management from any
network except the LAN, you still need to configure a firewall rule to allow
access. See Chapter 13 on page 251 for details on configuring firewall rules.
You can also disable a service on the ZyWALL by not allowing access for the service/protocol
through any of the ZyWALL interfaces.
To disable remote management of a service, select Disable in the corresponding Access field.
Enter 11 from menu 24 to bring up Menu 24.11 - Remote Management Control.
# A Criteria/Action
--- - -------------------------------------------------------
001 N SA=1.1.1.1-1.1.1.1 DA=2.2.2.2-2.2.2.5
SP=20-25 DP=20-25 P=6 T=NM PR=0 |GW=192.168.1.1 T=MT PR=0
002 N _______________________________________________________
_______________________________________________________
003 N _______________________________________________________
_______________________________________________________
004 N _______________________________________________________
_______________________________________________________
005 N _______________________________________________________
_______________________________________________________
006 N _______________________________________________________
_______________________________________________________
2 Select Edit in the Select Command field; type the index number of the rule you want to
configure in the Select Rule field and press [ENTER] to open Menu 25.1 - IP Routing
Policy Setup (see the next figure).
To force Web packets coming from clients with IP addresses of 192.168.1.33 to 192.168.1.64
to be routed to the Internet via the WAN port of the ZyWALL, follow the steps as shown next.
1 Create a rule in Menu 25.1 - IP Routing Policy Setup as shown next.
2 Select Yes in the LAN field in menu 25.1.1 to apply the policy to packets received on the
LAN port.
3 Check Menu 25 - IP Routing Policy Summary to see if the rule is added correctly.
4 Create another rule in menu 25.1 for this rule to route packets from any host (IP=0.0.0.0
means any host) with protocol TCP and port FTP access through another gateway
(192.168.1.100).
5 Select Yes in the LAN field in menu 25.1.1 to apply the policy to packets received on the
LAN port.
6 Check Menu 25 - IP Routing Policy Summary to see if the rule is added correctly.
Schedule Schedule
Set # Name Set # Name
------ ------------------ ------ ------------------
1 _________________ 7 _________________
2 _________________ 8 _________________
3 _________________ 9 _________________
4 _________________ 10 _________________
5 _________________ 11 _________________
6 _________________ 12 _________________
Lower numbered sets take precedence over higher numbered sets thereby avoiding scheduling
conflicts. For example, if sets 1, 2, 3 and 4 are applied in the remote node, then set 1 will take
precedence over set 2, 3 and 4 as the ZyWALL, by default, applies the lowest numbered set
first. Set 2 will take precedence over set 3 and 4, and so on.
You can design up to 12 schedule sets but you can only apply up to four schedule sets for a
remote node.
" To delete a schedule set, enter the set number and press [SPACE BAR] and
then [ENTER] or [DEL] in the Edit Name field.
To set up a schedule set, select the schedule set you want to setup from menu 26 (1-12) and
press [ENTER] to see Menu 26.1 - Schedule Set Setup as shown next.
Active= Yes
How Often= Once
Start Date(yyyy-mm-dd) = N/A
Once:
Date(yyyy-mm-dd)= 2000 - 01 - 01
Weekdays:
Sunday= N/A
Monday= N/A
Tuesday= N/A
Wednesday= N/A
Thursday= N/A
Friday= N/A
Saturday= N/A
Start Time (hh:mm)= 00 : 00
Duration (hh:mm)= 00 : 00
Action= Forced On
If a connection has been already established, your ZyWALL will not drop it. Once the
connection is dropped manually or it times out, then that remote node can't be triggered up
until the end of the Duration.
Table 267 Schedule Set Setup
FIELD DESCRIPTION
Active Press [SPACE BAR] to select Yes or No. Choose Yes and press [ENTER] to activate
the schedule set.
How Often Should this schedule set recur weekly or be used just once only? Press [SPACE BAR]
and then [ENTER] to select Once or Weekly. Both these options are mutually
exclusive. If Once is selected, then all weekday settings are N/A. When Once is
selected, the schedule rule deletes automatically after the scheduled time elapses.
Start Date Enter the start date when you wish the set to take effect in year -month-date format.
Valid dates are from the present to 2036-February-5.
Once:
Date If you selected Once in the How Often field above, then enter the date the set should
activate here in year-month-date format.
Weekdays:
Once your schedule sets are configured, you must then apply them to the desired remote
node(s). Enter 11 from the Main Menu and then enter the target remote node index. Press
[SPACE BAR] and then [ENTER] to select PPPoE in the Encapsulation field to make the
schedule sets field available as shown next.
You can apply up to four schedule sets, separated by commas, for one remote node. Change
the schedule set numbers to your preference(s).
761
762
CHAPTER 54
Troubleshooting
This chapter offers some suggestions to solve problems you might encounter. The potential
problems are divided into the following categories.
• Power, Hardware Connections, and LEDs
• ZyWALL Access and Login
• Internet Access
• Wireless Router/AP Troubleshooting
• UPnP
V The ZyWALL does not turn on. None of the LEDs turn on.
1 Make sure you understand the normal behavior of the LED. See Section 2.6 on page 59.
2 Check the hardware connections. See the Quick Start Guide.
3 Inspect your cables for damage. Contact the vendor to replace any damaged cables.
4 Turn the ZyWALL off and on or disconnect and re-connect the power adaptor or cord to
the ZyWALL.
5 If the problem continues, contact the vendor.
• If there is a DHCP server on your network, make sure your computer is using a
dynamic IP address. See Appendix D on page 795. Your ZyWALL is a DHCP server
by default.
6 Reset the device to its factory defaults, and try to access the ZyWALL with the default
IP address. See Section 3.3 on page 63.
7 If the problem continues, contact the network administrator or vendor, or try one of the
advanced suggestions.
Advanced Suggestions
• Try to access the ZyWALL using another service, such as Telnet. If you can access the
ZyWALL, check the remote management settings, firewall rules, and SMT filters to find
out why the ZyWALL does not respond to HTTP.
• If your computer is connected to the WAN port or is connected wirelessly, use a computer
that is connected to a LAN port.
• You may also need to clear your Internet browser’s cache.
In Internet Explorer, click Tools and then Internet Options to open the Internet Options
screen.
In the General tab, click Delete Files. In the pop-up window, select the Delete all offline
content check box and click OK. Click OK in the Internet Options screen to close it.
• If you disconnect your computer from one device and connect it to another device that has
the same IP address, your computer’s ARP (Address Resolution Protocol) table may
contain an entry that maps the management IP address to the previous device’s MAC
address).
In Windows, use arp -d at the command prompt to delete all entries in your computer’s
ARP table.
V I can see the Login screen, but I cannot log in to the ZyWALL.
1 Make sure you have entered the user name and password correctly. The default user
name is admin, and the default password is 1234. These fields are case-sensitive, so
make sure [Caps Lock] is not on.
2 You cannot log in to the web configurator while someone is using the SMT, Telnet, or
the console port to access the ZyWALL. Log out of the ZyWALL in the other session, or
ask the person who is logged in to log out.
3 Turn the ZyWALL off and on or disconnect and re-connect the power adaptor or cord to
the ZyWALL.
4 If this does not work, you have to reset the device to its factory defaults. See Section 3.3
on page 63.
See the troubleshooting suggestions for I cannot see or access the Login screen in the web
configurator. Ignore the suggestions about your browser.
V I cannot use FTP to upload / download the configuration file. / I cannot use
FTP to upload new firmware.
See the troubleshooting suggestions for I cannot see or access the Login screen in the web
configurator. Ignore the suggestions about your browser.
1 The ISP provides the WAN IP address after authenticating you. Authentication may be
through the user name and password, the MAC address or the host name.
The username and password apply to PPPoE and PPPoA encapsulation only. Make sure
that you have entered the correct Service Type, User Name and Password (be sure to
use the correct casing). Refer to the WAN setup chapter (web configurator or SMT).
2 Disconnect all the cables from your device, and follow the directions in the Quick Start
Guide again.
3 If the problem continues, contact your ISP.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See
the Quick Start Guide and Section 2.6 on page 59.
2 Make sure you entered your ISP account information correctly in the wizard, WAN
screen or SMT menu. These fields are case-sensitive, so make sure [Caps Lock] is not
on.
3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the
wireless client are the same as the settings in the AP.
4 Disconnect all the cables from your device, and follow the directions in the Quick Start
Guide again.
5 If the problem continues, contact your ISP.
V I cannot access the Internet anymore. I had access to the Internet (with the
ZyWALL), but my Internet connection is not available anymore.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See
the Quick Start Guide and Section 2.6 on page 59.
2 Check the schedule rules. Refer to Chapter 53 on page 757 (SMT).
3 If you use PPPoA or PPPoE encapsulation, check the idle time-out setting. Refer to the
Chapter 9 on page 169 (web configurator) or Chapter 38 on page 639 (SMT).
4 Reboot the ZyWALL.
5 If the problem continues, contact your ISP.
1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 2.6
on page 59. If the ZyWALL is sending or receiving a lot of information, try closing some
programs that use the Internet, especially peer-to-peer applications.
2 Check the signal strength. If the signal strength is low, try moving the ZyWALL closer
to the AP if possible, and look around to see if there are any devices that might be
interfering with the wireless network (for example, microwaves, other wireless
networks, and so on).
3 Reboot the ZyWALL.
4 If the problem continues, contact the network administrator or vendor, or try one of the
advanced suggestions.
Advanced Suggestions
• Check the settings for bandwidth management. If it is disabled, you might consider
activating it. If it is enabled, you might consider changing the allocations.
V I cannot access the ZyWALL or ping any computer from the WLAN.
5 Check that both the ZyWALL and your wireless station are using the same wireless and
wireless security settings.
6 Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the
ZyWALL.
7 Make sure you allow the ZyWALL to be remotely accessed through the WLAN
interface. Check your remote management settings.
54.5 UPnP
V When using UPnP and the ZyWALL reboots, my computer cannot detect
UPnP and refresh My Network Places > Local Network.
1 Disconnect the Ethernet cable from the ZyWALL’s LAN port or from your computer.
2 Re-connect the Ethernet cable.
V The Local Area Connection icon for UPnP disappears in the screen.
V I cannot open special applications such as white board, file transfer and video
when I use the MSN messenger.
" Check the product page on the www.zyxel.com website for updates on ZyXEL
WLAN cards that you can use in the ZyWALL.
779
780
APPENDIX A
Removing and Installing a Fuse
This appendix shows you how to remove and install fuses for the ZyWALL.
If you need to install a new fuse, follow the procedure below.
" If you use a fuse other than the included fuses, make sure it matches the fuse
specifications in the product specifications chapter.
Removing a Fuse
" Disconnect all power from the ZyWALL before you begin this procedure.
Installing a Fuse
1 The ZyWALL is shipped from the factory with one spare fuse included in a box-like
section of the fuse housing. Push the middle part of the box-like section to access the
spare fuse. Put another spare fuse in its place in order to always have one on hand.
2 Push the replacement fuse into the fuse housing until you hear a click.
3 Firmly, but gently, push the fuse housing back into the ZyWALL until you hear a click.
4 Plug the power cord back into the unit.
BSS
A Basic Service Set (BSS) exists when all communications between wireless clients or
between a wireless client and a wired network client go through one access point (AP).
Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled,
wireless client A and B can access the wired network and communicate with each other. When
Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot
communicate with each other.
ESS
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an
access point, with each access point connected together by a wired network. This wired
connection between APs is called a Distribution System (DS).
This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not
only provide communication with the wired network but also mediate wireless network traffic
in the immediate neighborhood.
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their
associated wireless clients within the same ESS must have the same ESSID in order to
communicate.
Channel
A channel is the radio frequency(ies) used by wireless devices to transmit and receive data.
Channels available depend on your geographical area. You may have a choice of channels (for
your region) so you should use a channel different from an adjacent AP (access point) to
reduce interference. Interference occurs when radio signals from different access points
overlap causing interference and degrading performance.
Adjacent channels partially overlap however. To avoid interference due to overlap, your AP
should be on a channel at least five channels away from a channel that an adjacent AP is using.
For example, if your region has 11 channels and an adjacent AP is using channel 1, then you
need to select a channel between 6 or 11.
RTS/CTS
A hidden node occurs when two stations are within range of the same access point, but are not
within range of each other. The following figure illustrates a hidden node. Both stations (STA)
are within range of the access point (AP) or wireless gateway, but out-of-range of each other,
so they cannot "hear" each other, that is they do not know if the channel is currently being
used. Therefore, they are considered hidden from each other.
When station A sends data to the AP, it might not know that the station B is already using the
channel. If these two stations send data at the same time, collisions may occur when both sets
of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the
biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send)
handshake is invoked.
When a data frame exceeds the RTS/CTS value you set (between 0 to 2432 bytes), the station
that wants to transmit this frame must first send an RTS (Request To Send) message to the AP
for permission to send it. The AP then responds with a CTS (Clear to Send) message to all
other stations within its range to notify them to defer their transmission. It also reserves and
confirms with the requesting station the time frame for the requested transmission.
Stations can send frames smaller than the specified RTS/CTS directly to the AP without the
RTS (Request To Send)/CTS (Clear to Send) handshake.
You should only configure RTS/CTS if the possibility of hidden nodes exists on your network
and the "cost" of resending large frames is more than the extra network overhead involved in
the RTS (Request To Send)/CTS (Clear to Send) handshake.
If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the
RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will
be fragmented before they reach RTS/CTS size.
" Enabling the RTS Threshold causes redundant network overhead that could
negatively affect the throughput performance instead of providing a remedy.
Fragmentation Threshold
A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432
bytes) that can be sent in the wireless network before the AP will fragment the packet into
smaller data frames.
A large Fragmentation Threshold is recommended for networks not prone to interference
while you should set a smaller threshold for busy networks or networks that are prone to
interference.
If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously)
you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as
data frames will be fragmented before they reach RTS/CTS size.
Preamble Type
Preamble is used to signal that data is coming to the receiver. Short and long refer to the length
of the synchronization field in a packet.
Short preamble increases performance as less time sending preamble means more time for
sending data. All IEEE 802.11 compliant wireless adapters support long preamble, but not all
support short preamble.
Use long preamble if you are unsure what preamble mode other wireless devices on the
network support, and to provide more reliable communications in busy wireless networks.
Use short preamble if you are sure all wireless devices on the network support it, and to
provide more efficient communications.
Use the dynamic setting to automatically use short preamble when all wireless devices on the
network support it, otherwise the ZyWALL uses long preamble.
" The wireless devices MUST use the same preamble mode in order to
communicate.
Wireless security methods available on the ZyWALL are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the ZyWALL identity.
The following figure shows the relative effectiveness of these wireless security methods
available on your ZyWALL.
Table 285 Wireless Security Levels
SECURITY SECURITY TYPE
LEVEL
Least Unique SSID (Default)
Secure
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
Most Secure WPA2
" You must enable the same wireless security settings on the ZyWALL and on
all wireless clients that you want to associate with it.
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to
support extended authentication as well as providing additional accounting and control
features. It is supported by Windows XP and a number of network devices. Some advantages
of IEEE 802.1x are:
• User based identification that allows for roaming.
• Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for
centralized user profile and accounting management on a network RADIUS server.
• Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional
authentication methods to be deployed with no changes to the access point or the wireless
clients.
RADIUS
RADIUS is based on a client-server model that supports authentication, authorization and
accounting. The access point is the client and the server is the RADIUS server. The RADIUS
server handles the following tasks:
• Authentication
Determines the identity of the users.
• Authorization
Determines the network services available to authenticated users once they are connected
to the network.
• Accounting
Keeps track of the client’s network activity.
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
For EAP-TLS authentication type, you must first have a wired connection to the network and
obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs)
can be used to authenticate users and a CA issues certificates and guarantees the identity of
each certificate owner.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use
dynamic keys for data encryption. They are often deployed in corporate environments, but for
public deployment, a simple user name and password pair is more practical. The following
table is a comparison of the features of authentication types.
Table 286 Comparison of EAP Authentication Types
EAP-MD5 EAP-TLS EAP-TTLS PEAP LEAP
Mutual Authentication No Yes Yes Yes Yes
Certificate – Client No Yes Optional Optional No
Certificate – Server No Yes Yes Yes No
Dynamic Key Exchange No Yes Yes Yes Yes
Credential Integrity None Strong Strong Strong Moderate
Deployment Difficulty Easy Hard Moderate Moderate Moderate
Client Identity Protection No No Yes Yes No
Encryption
Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol
(TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA and WPA2 use Advanced
Encryption Standard (AES) in the Counter mode with Cipher block chaining Message
authentication code Protocol (CCMP) to offer stronger encryption than TKIP.
TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication
server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit
mathematical algorithm called Rijndael. They both include a per-packet key mixing function,
a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with
sequencing rules, and a re-keying mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption
key is never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up
a key hierarchy and management system, using the PMK to dynamically generate unique data
encryption keys to encrypt every data packet that is wirelessly communicated between the AP
and the wireless clients. This all happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data
packets, altering them and resending them. The MIC provides a strong mathematical function
in which the receiver and the transmitter each compute and then compare the MIC. If they do
not match, it is assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi
network than WEP and difficult for an intruder to break into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only
difference between the two is that WPA(2)-PSK uses a simple common password, instead of
user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to
brute-force password-guessing attacks but it’s still an improvement over WEP as it employs a
consistent, single, alphanumeric password to derive a PMK which is used to generate unique
temporal encryption keys. This prevent all wireless devices sharing the same encryption keys.
(a weakness of WEP)
User Authentication
WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to
authenticate wireless clients using an external RADIUS database. WPA2 reduces the number
of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time
required to connect to a network. Other WPA2 authentication features that are different from
WPA include key caching and pre-authentication. These two features are optional and may not
be supported in all wireless devices.
Key caching allows a wireless client to store the PMK it derived through a successful
authentication with an AP. The wireless client uses the PMK when it tries to connect to the
same AP and does not need to go with the authentication process again.
Pre-authentication enables fast roaming by allowing the wireless client (already connecting to
an AP) to perform IEEE 802.1x authentication with another AP before connecting to it.
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key
itself is not sent over the network, but is derived from the PSK and the SSID.
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and
information exchanged in a handshake to create temporal encryption keys. They use
these keys to encrypt data exchanged between them.
Antenna Overview
An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF
signal to the antenna, which propagates the signal through the air. The antenna also operates in
reverse by capturing RF signals from the air.
Positioning the antennas properly increases the range and coverage area of a wireless LAN.
Antenna Characteristics
Frequency
An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE
802.11a) is needed to communicate efficiently in a wireless LAN
Radiation Pattern
A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s
coverage area.
Antenna Gain
Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Higher antenna gain improves the range of the signal for better communications.
For an indoor site, each 1 dB increase in antenna gain results in a range increase of
approximately 2.5%. For an unobstructed outdoor site, each 1dB increase in gain results in a
range increase of approximately 5%. Actual results may vary depending on the network
environment.
Antenna gain is sometimes specified in dBi, which is how much the antenna increases the
signal power compared to using an isotropic antenna. An isotropic antenna is a theoretical
perfect antenna that sends out radio signals equally well in all directions. dBi represents the
true gain that the antenna provides.
Positioning Antennas
In general, antennas should be mounted as high as practically possible and free of
obstructions. In point-to–point application, position both antennas at the same height and in a
direct line of sight to each other to attain the best performance.
For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For
omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single
AP application, place omni-directional antennas as close to the center of the coverage area as
possible.
For directional antennas, point the antenna in the direction of the desired coverage area.
If you want to display the WinPopup window at startup, follow the steps below for Windows
98 SE (steps are similar for Windows Me).
1 Right-click on the program task bar and click Properties.
2 Click the Start Menu Programs tab and click Advanced ...
5 A Create Shortcut window displays. Enter “winpopup” in the Command line field and
click Next.
6 Specify a name for the shortcut or accept the default and click Finish.
Figure 510 Windows 98 SE: Startup: Select a Title for the Program
7 A shortcut is created in the StartUp pane. Restart the computer when prompted.
" The WinPopup window displays after the computer finishes the startup
process (see Figure 505 on page 801).
Copyright
Copyright © 2008 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Your use of the ZyWALL is subject to the terms and conditions of your service provider.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Certifications
Federal Communications Commission (FCC) Interference Statement
The device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This device has been tested and found to comply with the limits for a Class B digital device
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This device generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation.
If this device does cause harmful interference to radio/television reception, which can be
determined by turning the device off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1 Reorient or relocate the receiving antenna.
2 Increase the separation between the equipment and the receiver.
3 Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
4 Consult the dealer or an experienced radio/TV technician for help.
注意 !
依據 低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用
者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍
受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
Notices
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
This device has been designed for the WLAN 2.4 GHz network throughout the EC region and
Switzerland, with restrictions in France.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Viewing Certifications
1 Go to http://www.zyxel.com.
2 Select your product on the ZyXEL home page to go to that product's page.
3 Select the certification you wish to view from this page.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact your vendor. You may also refer to the
warranty policy for the region in which you bought the device at http://www.zyxel.com/web/
support_warranty_info.php.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information
at www.zyxel.com for global products, or at www.us.zyxel.com for North American products.
Required Information
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
“+” is the (prefix) number you dial to make an international telephone call.
Costa Rica
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +506-2017878
• Fax: +506-2015098
• Web: www.zyxel.co.cr
• Regular Mail: ZyXEL Costa Rica, Plaza Roble Escazú, Etapa El Patio, Tercer Piso, San
José, Costa Rica
Czech Republic
• E-mail: [email protected]
• Telephone: +420-241-091-350
• Fax: +420-241-091-359
• Web: www.zyxel.cz
• Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 -
Modrany, Ceská Republika
Denmark
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +45-39-55-07-00
• Fax: +45-39-55-07-07
• Web: www.zyxel.dk
• Regular Mail: ZyXEL Communications A/S, Columbusvej, 2860 Soeborg, Denmark
Finland
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +358-9-4780-8411
• Fax: +358-9-4780-8448
• Web: www.zyxel.fi
• Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland
France
• E-mail: [email protected]
• Telephone: +33-4-72-52-97-97
• Fax: +33-4-72-52-19-20
• Web: www.zyxel.fr
• Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France
Germany
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +49-2405-6909-69
• Fax: +49-2405-6909-99
• Web: www.zyxel.de
• Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen,
Germany
Hungary
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +36-1-3361649
• Fax: +36-1-3259100
• Web: www.zyxel.hu
• Regular Mail: ZyXEL Hungary, 48, Zoldlomb Str., H-1025, Budapest, Hungary
India
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +91-11-30888144 to +91-11-30888153
• Fax: +91-11-30888149, +91-11-26810715
• Web: http://www.zyxel.in
• Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1,
New Delhi 110020, India
Japan
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +81-3-6847-3700
• Fax: +81-3-6847-3705
• Web: www.zyxel.co.jp
• Regular Mail: ZyXEL Japan, 3F, Office T&U, 1-10-10 Higashi-Gotanda, Shinagawa-ku,
Tokyo 141-0022, Japan
Kazakhstan
• Support: http://zyxel.kz/support
• Sales E-mail: [email protected]
• Telephone: +7-3272-590-698
• Fax: +7-3272-590-689
• Web: www.zyxel.kz
• Regular Mail: ZyXEL Kazakhstan, 43 Dostyk Ave., Office 414, Dostyk Business Centre,
050010 Almaty, Republic of Kazakhstan
Malaysia
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +603-8076-9933
• Fax: +603-8076-9833
• Web: http://www.zyxel.com.my
• Regular Mail: ZyXEL Malaysia Sdn Bhd., 1-02 & 1-03, Jalan Kenari 17F, Bandar
Puchong Jaya, 47100 Puchong, Selangor Darul Ehsan, Malaysia
North America
• Support E-mail: [email protected]
• Support Telephone: +1-800-978-7222
• Sales E-mail: [email protected]
• Sales Telephone: +1-714-632-0882
• Fax: +1-714-632-0858
• Web: www.zyxel.com
• Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 92806-
2001, U.S.A.
Norway
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +47-22-80-61-80
• Fax: +47-22-80-61-81
• Web: www.zyxel.no
• Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway
Poland
• E-mail: [email protected]
• Telephone: +48-22-333 8250
• Fax: +48-22-333 8251
• Web: www.pl.zyxel.com
• Regular Mail: ZyXEL Communications, ul. Okrzei 1A, 03-715 Warszawa, Poland
Russia
• Support: http://zyxel.ru/support
• Sales E-mail: [email protected]
• Telephone: +7-095-542-89-29
• Fax: +7-095-542-89-25
• Web: www.zyxel.ru
• Regular Mail: ZyXEL Russia, Ostrovityanova 37a Str., Moscow 117279, Russia
Singapore
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +65-6899-6678
• Fax: +65-6899-8887
• Web: http://www.zyxel.com.sg
• Regular Mail: ZyXEL Singapore Pte Ltd., No. 2 International Business Park, The Strategy
#03-28, Singapore 609930
Spain
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +34-902-195-420
• Fax: +34-913-005-345
• Web: www.zyxel.es
• Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain
Sweden
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +46-31-744-7700
• Fax: +46-31-744-7701
• Web: www.zyxel.se
• Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden
Taiwan
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +886-2-27399889
• Fax: +886-2-27353220
• Web: http://www.zyxel.com.tw
• Address: Room B, 21F., No.333, Sec. 2, Dunhua S. Rd., Da-an District, Taipei
Thailand
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +662-831-5315
• Fax: +662-831-5395
• Web: http://www.zyxel.co.th
• Regular Mail: ZyXEL Thailand Co., Ltd., 1/1 Moo 2, Ratchaphruk Road, Bangrak-Noi,
Muang, Nonthaburi 11000, Thailand.
Turkey
• Support E-mail: [email protected]
• Telephone: +90 212 222 55 22
• Fax: +90-212-220-2526
• Web: http:www.zyxel.com.tr
• Address: Kaptanpasa Mahallesi Piyalepasa Bulvari Ortadogu Plaza N:14/13 K:6
Okmeydani/Sisli Istanbul/Turkey
Ukraine
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +380-44-247-69-78
• Fax: +380-44-494-49-32
• Web: www.ua.zyxel.com
• Regular Mail: ZyXEL Ukraine, 13, Pimonenko Str., Kiev 04050, Ukraine
United Kingdom
• Support E-mail: [email protected]
• Sales E-mail: [email protected]
• Telephone: +44-1344-303044, 0845 122 0301 (UK only)
• Fax: +44-1344-303034
• Web: www.zyxel.co.uk
• Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road,
Bracknell, Berkshire RG12 2XB, United Kingdom (UK)
Index
Bridge Protocol Data Unit. See BPDU. via console port 737
broadcast 152 connection ID/name 664
BSS 787 console port 605, 715
budget 663 configuration upload 737
budget management 740 data bits 605
file backup 729
buffer overflow 281
file upload 736
flow control 605
parity 605
restoring files 732
C settings 605
speed 715, 716
stop bit 605
CA 399, 794
contact information 809
call back delay 623
content filter general 328
call control 740
content filtering
call history 741
categories 327, 331
call scheduling 757 customizing 343
max number of schedule sets 757 days and times 327
PPPoE 759 filter list 327
precedence 757 restrict web features 327
setting up a schedule 758 URL for blocked access 331
call-triggering packet 721 copyright 805
certificate 364 CTS (Clear to Send) 790
Certificate Authority custom ports 267
See CA.
customer support 809
certificates 399
and IKE SA 390
CA 399
thumbprint algorithms 400
thumbprints 400 D
verifying fingerprints 400
Certification Authority. See CA. data bits 605
certifications 805 Data Terminal Ready. See DTR
notices 806 date setting 588, 742
viewing 807
daylight saving 589, 743
changing the password 610
Daytime time protocol 589
channel 789
DDNS
ID 233, 654
configuration 615
interference 789
host 617
CHAP 624, 631, 663 offline 617
CNM 514 type 617
command interpreter mode 739 use server detected IP 618
command line 727 wildcard 617
commands default configuration 63
FTP 727 default server IP address 441
computer names 152, 154 default settings 598
computer virus 300 Denial of Service. See DoS.
infection and prevention 310 device introduction 51
types 310 DHCP 82, 151, 152, 488, 635
concurrent e-mail sessions 318 Relay 635
configuration backup 597, 726 Server 635
TFTP 728 WAN 723
configuration information 599 DHCP clients 586
configuration restore 597, 730 DHCP table 82
time 588 V
and date setting 742
Daylight Saving Time 589
resetting 588 Vantage CNM 514
synchronization with server 590 virtual address mapping 393
zone 589, 744 virtual address mapping over VPN 369
Time protocol 589 virtual interfaces
time protocol 589 vs asymmetrical routes 274
Daytime 589 vs triangle routes 274
NTP 589 Virtual Private Network. See VPN.
Time 589 virus 281
time setting 742 virus attack 300
timeout virus life cycle 310
system 492
virus scan 300
TKIP 245
VPN 189, 357
To VPN traffic 121 active protocol 394
ToS 457 adjust TCP maximum segment size 382
trace 717 and NAT 392
trademarks 805 and the firewall 122
traffic avoiding overlap 393
from VPN 120 certificate 364
redirect 197 From VPN traffic 120
to VPN 121 gateway policy 96, 361, 362
IPSec 357
transparent firewall 71, 161, 591, 593
IPSec SA. See IPSec SA.
triangle routes 274 local and remote network any 393
vs virtual interfaces 274 local and remote overlap 393
trigger port forwarding 690 avoiding 393
Trivial File Transfer Protocol. See TFTP. local policy 392
trojan horse 281 misconfiguration 393
NAT 393
troubleshooting 599
network policy 97, 113, 361, 367
Type of Service. See ToS. overlap 393
port forwarding 372
pre-shared key 364
proposal 388
U remote policy 392
security associations (SA) 358
security on traffic 119
unicast 152
skip overlap 393
Universal Plug and Play. See UPnP. To VPN traffic 121
unsolicited commercial e-mail 87, 313 virtual address mapping 369, 393
upgrading firmware 595 VPN. See also IKE SA, IPSec SA.
upload 737 VT100 terminal emulation 605
firmware 733
UPnP 519, 526
examples 520
forum 520 W
NAT traversal 519
port mapping 527
UPnP Implementers Corp. 520 WAN
user authentication 245 file maintenance 728
user profiles 427 WAN (Wide Area Network) 169
WAN DHCP 723
WAN IP address 182
WAN setup 619, 629
X
Xmodem 737