ZyXEL Communications P-335WT User Manual
P-335, P-335wt, User’s guide
Table of contents
Document Outline
- User’s Guide
- Copyright
- Federal Communications Commission (FCC) Interference Statement
- ZyXEL Limited Warranty
- Customer Support
- Table of Contents
- List of Figures
- List of Tables
- Preface
- Getting to Know Your Prestige
- 1.1 Prestige Internet Security Gateway Overview
- 1.2 Prestige Features
- 1.2.1 Physical Features
- 1.2.2 Non-Physical Features
- 1.2.2.1 Print Server
- 1.2.2.2 OTIST (P-335WT only)
- 1.2.2.3 Media Bandwidth Management
- 1.2.2.4 Trend Micro Security Services
- 1.2.2.5 IPSec VPN Capability
- 1.2.2.6 Firewall
- 1.2.2.7 IEEE 802.1x Network Security (P-335WT only)
- 1.2.2.8 Content Filtering
- 1.2.2.9 Brute-Force Password Guessing Protection
- 1.2.2.10 802.11b Wireless LAN Standard (P-335WT only)
- 1.2.2.11 802.11g Wireless LAN Standard (P-335WT only)
- 1.2.2.12 Packet Filtering
- 1.2.2.13 Universal Plug and Play (UPnP)
- 1.2.2.14 Call Scheduling
- 1.2.2.15 PPPoE
- 1.2.2.16 PPTP Encapsulation
- 1.2.2.17 Dynamic DNS Support
- 1.2.2.18 IP Multicast
- 1.2.2.19 IP Alias
- 1.2.2.20 SNMP
- 1.2.2.21 Network Address Translation (NAT)
- 1.2.2.22 Traffic Redirect
- 1.2.2.23 Port Forwarding
- 1.2.2.24 DHCP (Dynamic Host Configuration Protocol)
- 1.2.2.25 Any IP
- 1.2.2.26 Full Network Management
- 1.2.2.27 RoadRunner Support
- 1.2.2.28 Logging and Tracing
- 1.2.2.29 Upgrade Prestige Firmware via LAN
- 1.2.2.30 Embedded FTP and TFTP Servers
- 1.2.2.31 Wireless Association List (P-335WT only)
- 1.2.2.32 Wireless LAN Channel Usage (P-335WT only)
- 1.3 Applications for the Prestige
- Introducing the Web Configurator
- Wizard Setup
- Media Bandwidth Management Setup
- System Screens
- LAN Screens
- Wireless LAN (P-335WT)
- 7.1 Introduction
- 7.2 Wireless Security Overview
- 7.3 Configuring Wireless LAN on the Prestige
- 7.4 Configuring the Wireless Screen
- 7.4.1 No Security
- 7.4.2 WEP Encryption
- 7.4.3 Configuring WEP Encryption
- 7.4.4 Introduction to WPA
- 7.4.5 WPA-PSK Application Example
- 7.4.6 Configuring WPA-PSK Authentication
- 7.4.7 Wireless Client WPA Supplicants
- 7.4.8 WPA with RADIUS Application Example
- 7.4.9 Configuring WPA Authentication
- 7.4.10 802.1x Overview
- 7.4.11 Configuring 802.1x and Dynamic WEP Key Exchange
- 7.4.12 Configuring 802.1x and Static WEP Key Exchange
- 7.4.13 Configuring 802.1x
- 7.5 MAC Filter
- 7.6 Roaming
- 7.7 OTIST
- WAN Screens
- Network Address Translation (NAT) Screens
- Static Route Screens
- UPnP
- Trend Micro Security Services
- Firewall
- Content Filtering
- Remote Management Screens
- Introduction to IPSec
- VPN Screens
- 17.1 VPN/IPSec Overview
- 17.2 IPSec Algorithms
- 17.3 My IP Address
- 17.4 Secure Gateway Address
- 17.5 Summary Screen
- 17.6 Keep Alive
- 17.7 NAT Traversal
- 17.8 ID Type and Content
- 17.9 Pre-Shared Key
- 17.10 Editing VPN Rules
- 17.11 IKE Phases
- 17.12 Configuring Advanced IKE Settings
- 17.13 Manual Key Setup
- 17.14 Configuring Manual Key
- 17.15 Viewing SA Monitor
- 17.16 Configuring Global Setting
- 17.17 Telecommuter VPN/IPSec Examples
- 17.18 VPN and Remote Management
- Centralized Logs
- Print Server
- Media Bandwidth Management
- 20.1 Media Bandwidth Management Overview
- 20.2 Media Bandwidth Management Configuration Screen
- 20.3 Editing Bandwidth Management Rules
- 20.4 Configuring Bandwidth Management Rules and Services
- 20.5 Monitor Screen
- Maintenance
- Introducing the SMT
- Menu 1 General Setup
- Menu 2 WAN Setup
- Menu 3 LAN Setup
- Internet Access
- Remote Node Configuration
- Static Route Setup
- Network Address Translation (NAT)
- Enabling the Firewall
- Filter Configuration
- SNMP Configuration
- System Security
- System Information and Diagnosis
- Firmware and Configuration File Maintenance
- 35.1 Filename Conventions
- 35.2 Backup Configuration
- 35.2.1 Backup Configuration
- 35.2.2 Using the FTP Command from the Command Line
- 35.2.3 Example of FTP Commands from the Command Line
- 35.2.4 GUI-based FTP Clients
- 35.2.5 TFTP and FTP over WAN Management Limitations
- 35.2.6 Backup Configuration Using TFTP
- 35.2.7 TFTP Command Example
- 35.2.8 GUI-based TFTP Clients
- 35.3 Restore Configuration
- 35.4 Uploading Firmware and Configuration Files
- System Maintenance
- Remote Management
- Call Scheduling
- VPN/IPSec Setup
- SA Monitor
- Troubleshooting
- Appendix A
- Appendix B
- Appendix C
- Appendix D
- Appendix E
- Appendix F
- Appendix G
- Appendix H
- Appendix I
- Appendix J
- Appendix K
- Appendix L
- Appendix M
- Index