ZyXEL Communications P 660H TX User Manual

P-660H-Tx v2 Series  
ADSL2+ 4-port Gateway  
Support Notes  
Version3.40  
Feb. 2007  
P-660H-Tx v2 Support Notes  
2
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
3
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
FAQ  
ZyNOS FAQ  
1. What is ZyNOS?  
ZyNOS is ZyXEL's proprietary Network Operating System. It is the platform on  
all Prestige routers that delivers network services and applications. It is  
designed in a modular fashion so it is easy for developers to add new features.  
New ZyNOS software upgrades can be easily downloaded from our FTP sites  
as they become available.  
2. What’s Multilingual Embedded Web Configurator?  
Multilinggual Embedded Web Configurator means that it can display with 3  
kinds of languanges: English, French, and German. By factory default it  
displays with English, and you can change it in Web GUI.  
3. How do I access the P-660H-Tx v2 Command Line Interface (CLI)?  
The Command Line Interface is for the Administrator use only, and it could be  
accessed via telnet session.  
Note: It is protected by super password, ‘1234’ by factory default.  
4. How do I update the firmware and configuration file?  
You can do this if you access the P-660H-Tx v2 as Administrator. You can  
upload the firmware and configuration file to Prestige from Web Condigurator,  
or using FTP or TFTP client software. You CAN NOT upload the firmware and  
configuration file via Telnet because the Telnet connection will be dropped  
during uploading the firmware. Please do not power off the router right after the  
FTP or TFTP uploading is finished, the router will upload the firmware to its  
flash at this moment.  
Note: There may be firmware that could not be upgraded from Web  
Configurator. In this case, ZyXEL will prepare special Upload Software  
for you. Please read the firmware release note carefully when you want to  
upload a new fireware.  
5. How do I upgrade/backup the ZyNOS firmware by using TFTP client  
program via LAN?  
The P-660H-Tx v2 allows you to transfer the firmware to P-660H-Tx v2 using  
TFTP program via LAN. The procedure for uploading ZyNOS via TFTP is as  
follows.  
4
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
a. Use the TELNET client program in your PC to login to your P-660H-Tx  
v2.  
b. Enter CI command 'sys stdio 0' to disable Stdio idle timeout  
c. To upgrade firmware, use TFTP client program to put firmware in file  
'ras' in the Prestige. After data transfer is finished, the P-660H-Tx v2  
will program the upgraded firmware into FLASH ROM and reboot itself.  
d. To backup your firmware, use the TFTP client program to get file 'ras'  
from the Prestige.  
6. How do I restore P-660H-Tx v2 configurations by using TFTP client  
program via LAN?  
a. Use the TELNET client program in your PC to login to your P-660H-Tx  
v2.  
b. Enter CI command 'sys stdio 0' disable Stdio idle timeout  
c. To backup the P-660H-Tx v2 configurations, use TFTP client program  
to get file 'rom-0' from the P-660H-Tx v2.  
d. To restore the P-660H-Tx v2 configurations, use the TFTP client  
program to put your configuration in file rom-0 in the P-660H-Tx v2.  
7. What should I do if I forget the system password?  
In case you forget the system password, you can erase the current  
configuration and restore factory defaults this way:  
Use the RESET button on the rear panel of P-660H-Tx v2 to reset the router.  
After the router is reset, the LAN IP address will be reset to '192.168.1.1', the  
common user password will be reset to 'user', the Administrator password will  
be reset to ‘1234’.  
8. How to use the Reset button?  
a. Turn your P-660H-Tx v2 on. Make sure the Power LED is on (not  
blinking)  
b. Press the RESET button for longer than one second and shorter than  
five seconds and release it. If the Power LED begins to blink, the  
P-660H-Tx v2’s wireless auto security function-OTIST has been  
enabled.  
c. Press the RESET button for six seconds and then release it. If the  
Power LED begins to blink, the default configuration has been restored  
and the P-660H-Tx v2 restarts.  
5
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
9. What is SUA? When should I use SUA?  
SUA (Single User Account) is a unique feature supported by Prestige router  
which allows multiple people to access Internet concurrently for the cost of a  
single user account.  
When Prestige acting as SUA receives a packet from a local client destined for  
the outside Internet, it replaces the source address in the IP packet header  
with its own address and the source port in the TCP or UDP header with  
another value chosen out of a local pool. It then recomputes the appropriate  
header checksums and forwards the packet to the Internet as if it is originated  
from Prestige using the IP address assigned by ISP. When reply packets from  
the external Internet are received by Prestige, the original IP source address  
and TCP/UDP source port numbers are written into the destination fields of the  
packet (since it is now moving in the opposite direction), the checksums are  
recomputed, and the packet is delivered to its true destination. This is because  
SUA keeps a table of the IP addresses and port numbers of the local systems  
currently using it.  
10. What is the difference between SUA and Full Feature NAT?  
When you edit a remote node in Web Configurator, Advanced Setup, Network  
-> Remote Node -> Edit, there will be three options for you:  
None  
SUA Only  
Full Feature  
SUA (Single User Account) in previous ZyNOS versions is a NAT set with 2  
rules: Many-to-One and Server. With SUA, 'visible' servers had to be mapped  
to different ports, since the servers share only one global IP.  
The P-660H-Tx v2 now has Full Feature NAT which supports five types of  
IP/Port mapping: One to One, Many to One, Many to Many Overload, Many to  
Many No Overload and Server. You can make special application when you  
select Full Feature NAT. For example: With multiple global IP addresses,  
multiple severs using the same port (e.g., FTP servers using port 21/20) are  
allowed on the LAN for outside access.  
The P-660H-Tx v2 supports NAT sets on a remote node basis. They are  
reusable, but only one set is allowed for each remote node. The P-660H-Tx v2  
supports 8 sets since there are 8 remote nodes.  
By fatory default, the NAT is select as SUA in Web Configurator, Advanced  
Setup, Network -> NAT -> General -> NAT Setup.  
6
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
11. Is it possible to access a server running behind SUA from the outside  
Internet? How can I do it?  
Yes, it is possible because P-660H-Tx v2 delivers the packet to the local  
server by looking up to a SUA server table. Therefore, to make a local server  
accessible to the outside users, the port number and the inside IP address of  
the server must be configured. (You can configure it in Web Configurator,  
Advanced Setup, Network -> NAT -> Port Forwarding).  
12. When do I need select Full Feature NAT?  
Make multiple local servers on the LAN accessible from outside with  
multiple global IP addresses  
With SUA, 'visible' servers had to be mapped to different ports, since the  
servers share only one global IP. But when you select Full Feature, you can  
make multiple local servers (mapping the same port or not) on the LAN  
accessible from outside with multiple global IP addresses.  
Support Non-NAT Friendly Applications  
Some servers providing Internet applications such as some MIRC servers do  
not allow users to login using the same IP address. Thus, users on the same  
network can not login to the same server simultaneously. In this case it is  
better to use Many-to-Many No Overload or One-to-One NAT mapping types,  
thus each user login to the server using a unique global IP address.  
13. What IP/Port mapping does Multi-NAT support?  
Multi-NAT supports five types of IP/port mapping: One to One, Many to One,  
Many to Many Overload, Many to Many No Overload and Server. The details  
of the mapping between ILA and IGA are described as below. Here we define  
the local IP addresses as the Internal Local Addresses (ILA) and the global IP  
addresses as the Inside Global Address (IGA),  
One to One: In One-to-One mode, the P-660H-Tx v2 maps one ILA to  
one IGA.  
Many to One: In Many-to-One mode, the P-660H-Tx v2 maps multiple  
ILA to one IGA. This is equivalent to SUA (i.e., PAT, port address  
translation), ZyXEL's Single User Account feature that previous ZyNOS  
routers supported (the SUA is optional in today's Prestige routers).  
Many to Many Overload: In Many-to-Many Overload mode, the  
P-660H-Tx v2 maps the multiple ILA to shared IGA.  
7
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Many One-to-One: In Many One-to-One mode, the P-660H-Tx v2  
maps each ILA to unique IGA.  
Server: In Server mode, the P-660H-Tx v2 maps multiple inside servers  
to one global IP address. This allows us to specify multiple servers of  
different types behind the NAT for outside access. Noteif you want to  
map each server to one unique IGA please use the One-to-One mode.  
The following table summarizes the five types.  
NAT Type  
IP Mapping  
One-to-One  
ILA1<--->IGA1  
ILA1<--->IGA1  
ILA2<--->IGA1  
...  
Many-to-One  
(SUA/PAT)  
ILA1<--->IGA1  
ILA2<--->IGA2  
ILA3<--->IGA1  
ILA4<--->IGA2  
...  
Many-to-Many  
Overload  
ILA1<--->IGA1  
ILA2<--->IGA2  
ILA3<--->IGA3  
ILA4<--->IGA4  
...  
Many  
One-to-One  
Server 1 IP<--->IGA1  
Server 2 IP<--->IGA1  
Server  
14. How many network users can the SUA/NAT support?  
The Prestige does not limit the number of the users but the number of the  
sessions. The P-660H-Tx v2 supports 2048 sessions that you can use the 'ip  
nat session' command in CLI to see. You can also use ‘ip nat hashTable  
wanif0’ to view the current active NAT sessions.  
15. What are Device filters and Protocol filters?  
In ZyNOS, the filters have been separated into two groups. One group is  
called 'device filter group', and the other is called 'protocol filter  
group'. Generic filters belong to the 'device filter group', TCP/IP and IPX filters  
belong to the 'protocol filter group'. You can configure the filter rule in CLI.  
Note: In ZyNOS, you can not mix different filter groups in the same filter set.  
8
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
16. How can I protect against IP spoofing attacks?  
The P-660H-Tx v2's filter sets provide a means to protect against IP spoofing  
attacks. The basic scheme is as follows:  
For the input data filter:  
Deny packets from the outside that claim to be from the inside  
Allow everything that is not spoofing us  
Filter rule setup:  
Filter type =TCP/IP Filter Rule  
Active =Yes  
Source IP Addr =a.b.c.d  
Source IP Mask =w.x.y.z  
Action Matched =Drop  
Action Not Matched =Forward  
Where a.b.c.d is an IP address on your local network and w.x.y.z is your  
netmask:  
For the output data filters:  
Deny bounce back packet  
Allow packets that originate from us  
Filter rule setup:  
Filter Type =TCP/IP Filter Rule  
Active =Yes  
Destination IP Addr =a.b.c.d  
Destination IP Mask =w.x.y.z  
Action Matched =Drop  
Action No Matched =Forward  
Where a.b.c.d is an IP address on your local network and w.x.y.z is your  
netmask.  
9
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Product FAQ  
1. How can I manage P-660H-Tx v2?  
ƒ
ƒ
ƒ
Multilingual Embedded Web GUI for Local and Remote management  
CLI (Command-line interface)  
Telnet support (Administrator Password Protected ) for remote  
configuration change and status monitoring  
ƒ
FTP/ TFTP sever, firmware upgrade and configuration backup and  
restore are supported(Administrator Password Protected)  
2. What is the default password for Web Configurator?  
There are two different accounts for P-660H-Tx v2 Web Configurator:  
Common User Account and Administrator Account.  
By factory default the password for the two accounts are:  
Common User Account: user  
Administrator Account: 1234.  
You can change the password after you logging in the Web Configurator.  
Please record your new password whenever you change it. The system  
will lock you out if you have forgotten your password.  
3. What’s the difference between ‘Common User Account’ and  
‘Administrator Account’?  
For Common User Account, it can only access the status monitor of  
P-660H-Tx v2 and check the current system status.  
For Administrator Account, besides accessing the status monitor of P-660H-Tx  
v2, it can also access Winzard setup/ Advanced setup of P-660H-Tx v2:  
Moreover, only with Administrator Password, you could manage the  
P-660H-Tx v2 via FTP/TFTP or Telnet.  
10  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
4. How do I know the P-660H-Tx v2's WAN IP address assigned by the  
ISP?  
You can view "My WAN IP <from ISP> : x.x.x.x" shown in Web Configurator  
‘Status->Device Information ->WAN Information’ to check this IP address.  
5. What is the micro filter or splitter used for?  
Generally, the voice band uses the lower frequency ranging from 0 to 4KHz,  
while ADSL data transmission uses the higher frequency. The micro filter acts  
as a low-pass filter for your telephone set to ensure that ADSL transmissions  
do not interfere with your voice transmissions. For the details about how to  
connect the micro filter please refer to the user's manual.  
6. The P-660H-Tx v2 supports Bridge and Router mode, what's the  
difference between them?  
When the ISP limits some specific computers to access Internet, which means  
only the traffic to/from these computers will be forwarded and the other will be  
filtered. In this case, we use bridge mode which works as an ADSL modem to  
connect to the ISP. The ISP will generally give one Internet account and limit  
only one computer to access the Internet.  
For most Internet users having multiple computers want to share an Internet  
account for Internet access, they have to add another Internet sharing device,  
like a router. In this case, we use the router mode which works as a general  
Router plus an ADSL Modem.  
7. How do I know I am using PPPoE?  
PPPoE requires a user account to login to the provider's server. If you need to  
configure a user name and password on your computer to connect to the ISP  
you are probably using PPPoE. If you are simply connected to the Internet  
when you turn on your computer, you probably are not. You can also check  
your ISP or the information sheet given by the ISP. Please choose PPPoE as  
the encapsulation type in the P-660H-Tx v2 if the ISP uses PPPoE.  
8. Why does my provider use PPPoE?  
PPPoE emulates a familiar Dial-Up connection. It allows your ISP to provide  
services using their existing network configuration over the broadband  
connections. Besides, PPPoE supports a broad range of existing applications  
and service including authentication, accounting, secure access and  
configuration management.  
11  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
9. What is DDNS?  
The Dynamic DNS service allows you to alias a dynamic IP address to a static  
hostname, allowing your computer to be more easily accessed from various  
locations on the Internet. To use the service, you must first apply an account  
Without DDNS, we always tell the users to use the WAN IP of the P-660H-Tx  
v2 to reach our internal server. It is inconvenient for the users if this IP is  
dynamic. With DDNS supported by the P-660H-Tx v2, you apply a DNS name  
server. The outside users can always access the web server using the  
When the ISP assigns the P-660H-Tx v2 a new IP, the P-660H-Tx v2 updates  
this IP to DDNS server so that the server can update its IP-to-DNS entry. Once  
the IP-to-DNS table in the DDNS server is updated, the DNS name for your  
10. When do I need DDNS service?  
When you want your internal server to be accessed by using DNS name rather  
than using the dynamic IP address we can use the DDNS service. The DDNS  
server allows to alias a dynamic IP address to a static hostname. Whenever  
the ISP assigns you a new IP, the P-660H-Tx v2 sends this IP to the DDNS  
server for its updates.  
11. What is DDNS wildcard? Does the P-660H-Tx v2 support DDNS  
wildcard?  
Some DDNS servers support the wildcard feature which allows the hostname,  
*.yourhost.dyndns.org, to be aliased to the same IP address as  
yourhost.dyndns.org. This feature is useful when there are multiple servers  
inside and you want users to be able to use things such as  
supports. When using wildcard, you simply enter yourhost.dyndns.org in the  
Host field in Menu 1.1 Configure Dynamic DNS.  
12. Can the P-660H-Tx v2's SUA handle IPSec packets sent by the IPSec  
gateway?  
Yes, the P-660H-Tx v2's SUA can handle IPSec ESP Tunneling mode. We  
know when packets go through SUA, SUA will change the source IP address  
12  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
and source port for the host. To pass IPSec packets, SUA must understand  
the ESP packet with protocol number 50, replace the source IP address of the  
IPSec gateway to the router's WAN IP address. However, SUA should not  
change the source port of the UDP packets which are used for key  
managements. Because the remote gateway checks this source port during  
connections, the port thus is not allowed to be changed.  
13. How do I setup my P-660H-Tx v2 for routing IPSec packets over SUA?  
For outgoing IPSec tunnels, no extra setting is required.  
For forwarding the inbound IPSec ESP tunnel, A 'Default' server set is required.  
You could configure it in Web Configurator, Advanced Setup, Network -> NAT  
-> Port Forwarding -> Default Server Setup:  
It is because SUA makes your LAN appear as a single machine to the outside  
world. LAN users are invisible to outside users. So, to make an internal server  
for outside access, we must specify the service port and the LAN IP of this  
server in Web configurator. Thus SUA is able to forward the incoming packets  
to the requested service behind SUA and the outside users access the server  
using the P-660H-Tx v2's WAN IP address. So, we have to configure the  
internal IPsec client as a default server (unspecified service port) when it acts  
a server gateway.  
14. What is Traffic Shaping?  
Traffic Shaping allocates the bandwidth to WAN dynamically and aims at  
boosting the efficiency of the bandwidth. If there are serveral VCs in the  
P-660H-Tx v2 but only one VC activated at one time, the P-660H-Tx v2  
allocates all the Bandwidth to the VC and the VC gets full bandwidth. If another  
VCs are activated later, the bandwidth is yield to other VCs after ward.  
13  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
15. Why do we perform traffic shaping in the P-660H-Tx v2?  
The P-660H-Tx v2 must manage traffic fairly and provide bandwidth allocation  
for different sorts of applications, such as voice, video, and data. All  
applications have their own natural bit rate. Large data transactions have a  
fluctuating natural bit rate. The P-660H-Tx v2 is able to support variable traffic  
among different virtual connections. Certain traffic may be discarded if the  
virtual connection experiences congestion. Traffic shaping defines a set of  
actions taken by the P-660H-Tx v2 to avoid congestion; traffic shaping takes  
measures to adapt to unpredictable fluctuations in traffic flows and other  
problems among virtual connections.  
16. What do the parameters (PCR, SCR, MBS) mean?  
Traffic shaping parameters (PCR, SCR, MBS) can be set in Web Configurator,  
Advanced Setup, Network -> Remote Node -> Edit -> ATM Setup:  
Peak Cell Rate(PCR): The maximum bandwidth allocated to this connection.  
The VC connection throughput is limited by PCR.  
Sustainable Cell Rate(SCR): The least guaranteed bandwidth of a VC.  
When there are multi-VCs on the same line, the VC throughput is guaranteed  
by SCR.  
Maximum Burst Size(MBS): The amount of cells transmitted through this  
VC at the Peak Cell Rate before yielding to other VCs. Total bandwidth of the  
line is dedicated to single VC if there is only one VC on the line. However, as  
the other VC asking the bandwidth, the MBS defines the maximum number of  
cells transmitted via this VC with Peak Cell rate before yielding to other VCs.  
The P-660H-Tx v2 holds the parameters for shaping the traffic among its  
virtual channels. If you do not need traffic shaping, please set SCR = 0, MBS =  
0 and PCR as the maximum value according to the line rate (for example, 2.3  
Mbps line rate will result PCR as 5424 cell/sec.)  
17. What do the ATM QoS Types (CBR, UBR, VBR-nRT, VBR-RT) mean?  
Constant bit rate(CBR): An ATM bandwidth-allocation service that requires  
the user to determine a fixed bandwidth requirement at the time the connection  
is set up so that the data can be sent in a steady stream. CBR service is often  
used when transmitting fixed-rate uncompressed video.  
Unspecified bit rate(UBR): An ATM bandwidth-allocation service that does  
not guarantee any throughput levels and uses only available bandwidth. UBR  
is often used when transmitting data that can tolerate delays, such as e-mail.  
14  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Variable bit rate(VBR): An ATM bandwidth-allocation service that allows  
users to specify a throughput capacity (i.e., a peak rate) and a sustained rate  
but data is not sent evenly. You can select VBR for bursty traffic and  
bandwidth sharing with other applications. It contains two subclasses:  
Variable bit rate nonreal time (VBR-nRT):  
Variable bit rate real time (VBR-RT):  
18. What is content filter?  
Internet Content filter allows you to create and enforce Internet access policies  
tailored to your needs. Content filter gives you the ability to block web sites that  
contain key words (that you specify) in the URL. You can set a schedule for  
when the P-660H-Tx v2 performs content filtering. You can also specify trusted  
IP Addresses on LAN for which the P-660H-Tx v2 will not perform content  
filtering. You can configure the details about it in Web Configurator, Advanced  
setup, Security -> Content Filter.  
15  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
ADSL FAQ  
1. How does ADSL compare to Cable modems?  
ADSL provides a dedicated service over a single telephone line; cable  
modems offer a dedicated service over a shared media. While cable modems  
have greater downstream bandwidth capabilities (up to 30 Mbps), that  
bandwidth is shared among all users on a line, and will therefore vary, perhaps  
dramatically, as more users in a neighborhood get online at the same time.  
Cable modem upstream traffic will in many cases be slower than ADSL, either  
because the particular cable modem is inherently slower, or because of rate  
reductions caused by contention for upstream bandwidth slots. The big  
difference between ADSL and cable modems, however, is the number of lines  
available to each. There are no more than 12 million homes passed today that  
can support two-way cable modem transmissions, and while the figure also  
grows steadily, it will not catch up with telephone lines for many years.  
Additionally, many of the older cable networks are not capable of offering a  
return channel; consequently, such networks will need significant upgrading  
before they can offer high bandwidth services.  
2. What is the expected throughput?  
In our test, we can get about 1.6Mbps data rate on 15Kft using the 26AWG  
loop. The shorter the loop, the better the throughput is.  
3. What is the microfilter used for?  
Generally, the voice band uses the lower frequency ranging from 0 to 4KHz,  
while ADSL data transmission uses the higher frequency. The micro filter acts  
as a low-pass filter for your telephone set to ensure that ADSL transmissions  
do not interfere with your voice transmissions. For the details about how to  
connect the micro filter please refer to the user's manual.  
16  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
4. How do I know the ADSL line is up?  
You can see the DSL LED Green on the P-660H-Tx v2's front panel is on when  
the ADSL physical layer is up.  
5. How does the P-660H-Tx v2 work on a noisy ADSL?  
Depending on the line quality, the P-660H-Tx v2 uses "Fall Back" and "Fall  
Forward" to automatically adjust the date rate.  
6. Does the VC-based multiplexing perform better than the LLC-based  
multiplexing?  
Though the LLC-based multiplexing can carry multiple protocols over a single  
VC, it requires extra header information to identify the protocol being carried  
on the virtual circuit (VC). The VC-based multiplexing needs a separate VC for  
carrying each protocol but it does not need the extra headers. Therefore, the  
VC-based multiplexing is more efficient.  
7. How do I know the details of my ADSL line statistics?  
You can use the following CI commands to check the ADSL line  
statistics.  
CI> wan adsl perfdata  
CI> wan adsl status  
CI> wan adsl linedata far  
CI> wan adsl linedata near  
You can also do it in Web Configurator, Advanced Setup,  
Maintenance -> Diagnostic -> DSL Line -> DSL Status:  
17  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
8. What are the signaling pins of the ADSL connector?  
The signaling pins on the P-660H-Tx v2's ADSL connector are pin 3 and pin 4.  
The middle two pins for a RJ11 cable.  
9. What is triple play?  
More and more Telco/ISPs are providing three kinds of services (VoIP, Video  
and Internet) over one existing ADSL connection.  
The different services (such as video, VoIP and Internet access) require  
different Qulity of Service.  
The high priority is Voice (VoIP) data.  
The Medium priority is Video (IPTV) data.  
The low priority is internet access such as ftp etc …  
Triple Play is a port-based policy to forward packets from different LAN port to  
different PVCs, thus you can configure each PVC separately to assign different  
QoS to different application.  
18  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Firewall FAQ  
General  
1. What is a network firewall?  
A firewall is a system or group of systems that enforces an access-control  
policy between two networks. It may also be defined as a mechanism used to  
protect a trusted network from an untrusted network. The firewall can be  
thought of two mechanisms: One to block the traffic, and the other to permit  
traffic.  
2. What makes P-660H-Tx v2 secure?  
The P-660H-Tx v2 is pre-configured to automatically detect and thwart Denial  
of Service (DoS) attacks such as Ping of Death, SYN Flood, LAND attack, IP  
Spoofing, etc. It also uses stateful packet inspection to determine if an inbound  
connection is allowed through the firewall to the private LAN. The P-660H-Tx  
v2 supports Network Address Translation (NAT), which translates the private  
local addresses to one or multiple public addresses. This adds a level of  
security since the clients on the private LAN are invisible to the Internet.  
3. What are the basic types of firewalls?  
Conceptually, there are three types of firewalls:  
1. Packet Filtering Firewall  
2. Application-level Firewall  
3. Stateful Inspection Firewall  
Packet Filtering Firewalls generally make their decisions based on the header  
information in individual packets. These headers information include the  
source, destination addresses and ports of the packets.  
Application-level Firewalls generally are hosts running proxy servers, which  
permit no traffic directly between networks, and which perform logging and  
auditing of traffic passing through them. A proxy server is an application  
gateway or circuit-level gateway that runs on top of general operating system  
such as UNIX or Windows NT. It hides valuable data by requiring users to  
communicate with secure systems by mean of a proxy. A key drawback of this  
device is performance.  
Stateful Inspection Firewalls restrict access by screening data packets against  
defined access rules. They make access control decisions based on IP  
19  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
address and protocol. They also 'inspect' the session data to assure the  
integrity of the connection and to adapt to dynamic protocols. The flexible  
nature of Stateful Inspection firewalls generally provides the best speed and  
transparency, however, they may lack the granular application level access  
control or caching that some proxies support.  
4. What kind of firewall is the P-660H-Tx v2?  
1. The P-660H-Tx v2's firewall inspects packets contents and IP headers.  
It is applicable to all protocols, which understands data in the packet is  
intended for other layers, from network layer up to the application layer.  
2. The P-660H-Tx v2's firewall performs stateful inspection. It takes into  
account the state of connections it handles so that, for example, a  
legitimate incoming packet can be matched with the outbound request  
for that packet and allowed in. Conversely, an incoming packet  
masquerading as a response to a nonexistent outbound request can be  
blocked.  
3. The P-660H-Tx v2's firewall uses session filtering, i.e., smart rules, that  
enhance the filtering process and control the network session rather  
than control individual packets in a session.  
4. The P-660H-Tx v2's firewall is fast. It uses a hashing function to search  
the matched session cache instead of going through every individual  
rule for a packet.  
5. The P-660H-Tx v2's firewall provides email service to notify you for  
routine reports and when alerts occur.  
5. Why do you need a firewall when your router has packet filtering and  
NAT built-in?  
With the spectacular growth of the Internet and online access, companies that  
do business on the Internet face greater security threats. Although packet filter  
and NAT restrict access to particular computers and networks, however, for  
the other companies this security may be insufficient, because packets filters  
typically cannot maintain session state. Thus, for greater security, a firewall is  
considered.  
6. What is Denials of Service (DoS) attack?  
Denial of Service (DoS) attacks is aimed at devices and networks with a  
connection to the Internet. Their goal is not to steal information, but to disable  
a device or network so users no longer have access to network resources.  
There are four types of DoS attacks:  
20  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
1. Those that exploits bugs in a TCP/IP implementation such as Ping of  
Death and Teardrop.  
2. Those that exploits weaknesses in the TCP/IP specification such as  
SYN Flood and LAND Attacks.  
3. Brute-force attacks that flood a network with useless data such as  
Smurf attack.  
4. IP Spoofing  
7. What is Ping of Death attack?  
Ping of Death uses a 'PING' utility to create an IP packet that exceeds the  
maximum 65535 bytes of data allowed by the IP specification. The oversize  
packet is then sent to an unsuspecting system. Systems may crash, hang, or  
reboot.  
8. What is Teardrop attack?  
Teardrop attack exploits weakness in the reassemble of the IP packet  
fragments. As data is transmitted through a network, IP packets are often  
broken up into smaller chunks. Each fragment looks like the original packet  
except that it contains an offset field. The Teardrop program creates a series of  
IP fragments with overlapping offset fields. When these fragments are  
reassembled at the destination, some systems will crash, hang, or reboot.  
9. What is SYN Flood attack?  
SYN attack floods a targeted system with a series of SYN packets. Each  
packet causes the targeted system to issue a SYN-ACK response, While the  
targeted system waits for the ACK that follows the SYN-ACK, it queues up all  
outstanding SYN-ACK responses on what is known as a backlog queue.  
SYN-ACKs are moved off the queue only when an ACK comes back or when  
an internal timer (which is set a relatively long intervals) terminates the TCP  
three-way handshake. Once the queue is full, the system will ignore all  
incoming SYN requests, making the system unavailable for legitimate users.  
10. What is LAND attack?  
In a LAN attack, hackers flood SYN packets to the network with a spoofed  
source IP address of the targeted system. This makes it appear as if the host  
computer sent the packets to itself, making the system unavailable while the  
target system tries to respond to itself.  
21  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
11 What is Brute-force attack?  
A Brute-force attack, such as 'Smurf' attack, targets a feature in the IP  
specification known as directed or subnet broadcasting, to quickly flood the  
target network with useless data. A Smurf hacker flood a destination IP  
address of each packet as the broadcast address of the network, the router will  
broadcast the ICMP echo request packet to all hosts on the network. If there  
are numerous hosts, this will create a large amount of ICMP echo request  
packet, the resulting ICMP traffic will not only clog up the 'intermediary'  
network, but will also congest the network of the spoofed source IP address,  
known as the 'victim' network. This flood of broadcast traffic consumes all  
available bandwidth, making communications impossible.  
12. What is IP Spoofing attack?  
Many DoS attacks also use IP Spoofing as part of their attack. IP Spoofing  
may be used to break into systems, to hide the hacker's identity, or to magnify  
the effect of the DoS attack. IP Spoofing is a technique used to gain  
unauthorized access to computers by tricking a router or firewall into thinking  
that the communications are coming from within the trusted network. To  
engage in IP Spoofing, a hacker must modify the packet headers so that it  
appears that the packets originate from a trusted host and should be allowed  
through the router or firewall.  
13. What are the default ACL firewall rules in P-660H-Tx v2?  
There are two default ACLs pre-configured in the P-660H-Tx v2, one allows all  
connections from LAN to WAN and the other blocks all connections from WAN  
to LAN except of the DHCP packets.  
Configuration  
1. How do I configure the firewall?  
You can use the Web Configurator to configure the firewall for P-660H-Tx v2.  
By factory default, if you connect your PC to the LAN Interface of P-660H-Tx  
v2, you can access Web Configurator via ‘http://192.168.1.1’.  
Note: Don’t forget to type in the Administrator Password.  
2. How do I prevent others from configuring my firewall?  
There are several ways to protect others from touching the settings of your  
firewall.  
22  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
1. Change the default Administrator password since it is required when  
setting up the firewall.  
2. Limit who can access to your P-660H-Tx v2’s Web Configurator or CLI.  
You can enter the IP address of the secured LAN host in Web  
Configurator, Advanced Setup, Advanced -> Remote MGNT ->  
[Service] ->Secured Client IP to allow special access to your  
P-660H-Tx v2:  
The default value in this field is 0.0.0.0, which means you do not care which  
host is trying to telnet your P-660H-Tx v2 or access the Web Configurator.  
3. Why can't I configure my P-660H-Tx v2 using Web Configurator/Telnet  
over WAN?  
There are four reasons that WWW/Telnet from WAN is blocked.  
(1) When the firewall is turned on, all connections from WAN to LAN are  
blocked by the default ACL rule. To enable Telnet from WAN, you must turn  
the firewall off, or create a firewall rule to allow WWW/Telnet connection  
from WAN. The WAN-to-LAN ACL summary will look like as shown below.  
WWW (For accessing Web Configurator):  
Source IP= Remote trusted host  
Destination IP= router' WAN IP  
Service= TCP/80  
Action=Forward  
TELNET (For accessing Command Line Interface):  
Source IP= Telnet Client host  
Destination IP= router' WAN IP  
Service= TCP/23  
Action=Forward  
(2)You have disabled WWW/Telnet service in Web Configurator, Advanced  
setup, Advanced -> Remote MGNT:  
23  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
(3) WWW/Telnet service is enabled but your host IP is not the secured host  
entered in Web Configurator, Advanced setup, Advanced -> Remote  
MGNT:  
(4)A filter set which blocks WWW/Telnet from WAN is applied to WAN node.  
You can check by command:  
wan node index [index #]  
wan node display  
4. Why can't I upload the firmware and configuration file using FTP over  
WAN?  
(1) When the firewall is turned on, all connections from WAN to LAN are  
blocked by the default ACL rule. To enable FTP from WAN, you must turn  
the firewall off or create a firewall rule to allow FTP connection from WAN.  
The WAN-to-LAN ACL summary will look like as shown below.  
Source IP= FTP host  
Destination IP= P-660H-Tx v2's WAN IP  
Service= FTP TCP/21, TCP/20  
Action=Forward  
24  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
(2) You have disabled FTP service in Web Configurator, Advanced setup,  
Advanced -> Remote MGNT.  
(3) FTP service is enabled but your host IP is not the secured host entered  
in Web Configurator, Advanced setup, Advanced -> Remote MGNT.  
(4) A filter set which blocks FTP from WAN is applied to WAN node. You  
can check by command:  
wan node index [index #]  
wan node display  
Log and Alert  
1. When does the P-660H-Tx v2 generate the firewall log?  
The P-660H-Tx v2 generates the firewall log immediately when the packet  
matches a firewall rule. The log for Default Firewall Policy (LAN to WAN, WAN  
to LAN, WAN to WAN) is generated automatically with factory default setting,  
but you can change it in Web Configurator.  
2. What does the log show to us?  
The log supports up to 128 entries. There are 5 columns for each entry. Please  
see the example shown below:  
3. How do I view the firewall log?  
All logs generated in P-660H-Tx v2, including firewall logs, IPSec logs, system  
logs are migrated to centralized logs. So you can view firewall logs in  
Centralized logs: Web Configurator, Advanced setup, Maintenance -> Logs  
->View Log.  
The log keeps 128 entries, the new entries will overwrite the old entries when  
the log has over 128 entries.  
Before you can view firewall logs there are two steps you need to do:  
(1) Enable log function in Centralized logs setup via either one of the following  
methods,  
25  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Web configuration: Advanced Setup, Maintenance -> Logs -> Log  
Settings, check Access Control and Attacks options depending on  
your real situation.  
CI command: sys logs category [access | attack]  
(2) Enable log function in firewall default policy or in firewall rules.  
After the above two steps, you can view firewall logs via  
Web Configurator: Advanced setup, Maintenance -> Logs ->View  
Log.  
View the log by CI command: sys logs disp  
You can also view Centralized logs via mail or syslog, please configure mail  
server or Unix Syslog server in Web configuration: Advanced Setup,  
Maintenance -> Logs -> Log Settings.  
4. When does the P-660H-Tx v2 generate the firewall alert?  
The P-660H-Tx v2 generates the alert when an attack is detected by the  
firewall and sends it via Email. So, to send the alert, you must configure the  
mail server and Email address using Web Configurator, Advanced Setup,  
Maintenance -> Logs -> Log Settings. You can also specify how frequently  
you want to receive the alert in it.  
5. What is the difference between the log and alert?  
A log entry is just added to the log inside the P-660H-Tx v2 and e-mailed  
together with all other log entries at the scheduled time as configured. An alert  
is e-mailed immediately after an attacked is detected.  
26  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Application Notes  
General Application Notes  
1. Internet Access Using P-660H-Tx v2 under Bridge mode  
Setup your workstation  
Setup your P-660H-Tx v2 under bridge mode  
If the ISP limits some specific computers to access Internet, that means only  
the traffic to/from these computers will be forwarded and the other will be  
filtered. In this case, we use P-660H-Tx v2 which works as an ADSL bridge  
modem to connect to the ISP. The ISP will generally give one Internet account  
and limit only one computer to access the Internet.  
Set up your workstation  
(1) Ethernet connection  
To connect your computer to the P-660H-Tx v2's LAN port, the computer must  
have an Ethernet adapter card installed. For connecting a single computer to  
the P-660H-Tx v2, we use a Ethernet cable.  
(2) TCP/IP configuration  
In most cases, the IP address of the computer is assigned by the ISP  
dynamically so you have to configure the computer as a DHCP client which  
obtains the IP from the ISP using DHCP protocol. The ISP may also provide  
the gateway, DNS via DHCP if they are available. Otherwise, please enter the  
static IP addresses for all that the ISP gives to you in the network TCP/IP  
settings. For Windows, we check the option 'Obtain an IP address  
automatically' in its TCP/IP setup, please see the example shown below.  
27  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Setup your P-660H-Tx v2 under bridge mode  
The following procedure shows you how to configure your P-660H-Tx v2 as  
bridge mode. We will use Web Configurator to guide you through the related  
menu.  
(1) Configure P-660H-Tx v2 as bridge mode and configure Internet setup  
parameters in Web Configurator, Advanced Setup, Network -> WAN ->  
Internet Connection.  
28  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Key Settings:  
Option  
Description  
Select the correct Encapsulation type that your ISP supports. For  
example, RFC 1483.  
Encapsulation  
Select the correct Multiplexing type that your ISP supports. For example,  
LLC.  
Multiplexing  
VPI & VCI  
number  
Specify a VPI (Virtual Path Identifier) and a VCI (Virtual Channel  
Identifier) given to you by your ISP.  
(2) Turn off DHCP Server and configure a LAN IP for the P-660H-Tx v2 in Web  
Configurator, Advanced Setup, Network -> LAN. We use 192.168.1.1 as the  
LAN IP for P-660H-Tx v2 in this case:  
Step 1: Disactive DHCP Server and apply it:  
Step 2: Assign an IP to the LAN Interface of P-660H-Tx v2, e.g.: 192.168.1.1:  
2. Internet Access Using P-660H-Tx v2 under Routing mode  
For most Internet users having multiple computers want to share an Internet  
account for Internet access, they have to install an Internet sharing device, like  
a router. In this case, we use the P-660H-Tx v2 which works as a general  
Router plus an ADSL Modem.  
Set up your workstation  
(1) Ethernet connection  
29  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Connect the LAN ports of all computers to the LAN Interface of P-660H-Tx v2  
using Ethernet cable.  
(2) TCP/IP configuration  
Since the P-660H-Tx v2 is set to DHCP server as default, so you need only to  
configure the workstations as the DHCP clients in the networking settings. In  
this case, the IP address of the computer is assigned by the P-660H-Tx v2.  
The P-660H-Tx v2 can also provide the DNS to the clients via DHCP if it is  
available. For this setup in Windows, we check the option 'Obtain an IP  
address automatically' in its TCP/IP setup. Please see the example shown  
below.  
Set up your P-660H-Tx v2 under routing mode  
The following procedure shows you how to configure your P-660H-Tx v2 as  
Routing mode for routing traffic. We will use Web Configurator to guide you  
through the related menu.  
(1) Configure P-660H-Tx v2 as routing mode and configure Internet setup  
parameters in Web Configurator, Advanced Setup, Network -> WAN ->  
Internet Connection.  
Key Settings:  
30  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Option  
Description  
Select the correct Encapsulation type that your ISP supports. For  
example, RFC 1483.  
Encapsulation  
Select the correct Multiplexing type that your ISP supports. For  
example, LLC.  
Multiplexing  
VPI & VCI  
number  
Specify a VPI (Virtual Path Identifier) and a VCI (Virtual Channel  
Identifier) given to you by your ISP.  
Set to Dynamic if the ISP provides the IP for the P-660H-Tx v2  
dynamically. Otherwise, set to Static and enter the IP in the IP  
Address field.  
IP Address  
Assignment  
(2) Configure a LAN IP for the P-660H-Tx v2 and the DHCP settings in Web  
Configurator, Advanced Setup, Network -> LAN.  
3. Setup the P-660H-Tx v2 as a DHCP Relay  
What is DHCP Relay?  
DHCP stands for Dynamic Host Configuration Protocol. In addition to the  
DHCP server feature, the P-660H-Tx v2 supports the DHCP relay function.  
When it is configured as DHCP server, it assigns the IP addresses to the LAN  
clients. When it is configured as DHCP relay, it is responsible for forwarding  
the requests and responses negotiating between the DHCP clients and the  
server. See figure 1.  
Setup the P-660H-Tx v2 as a DHCP Relay  
We could set the P-660H-Tx v2 as a DHCP Relay by the following command in  
CLI:  
Ip dhcp enif0 mode relay  
Ip dhcp enif0 relay server [Server IP Address]  
31  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
4. SUA Notes  
Tested SUA/NAT Applications (e.g., Cu-SeeMe, ICQ, NetMeeting)  
Introduction  
Generally, SUA makes your LAN appear as a single machine to the outside  
world. LAN users are invisible to outside users. However, some applications  
such as Cu-SeeMe, and ICQ will need to connect to the local user behind the  
P-660H-Tx v2. In such case, a SUA server must be configured to forward the  
incoming packets to the true destination behind SUA. After the required server  
are configured in Web Configurator, Advanced Setup, Network -> NAT ->  
Port Forwarding, the internal server or client applications can be accessed by  
using the P-660H-Tx v2's WAN IP Address.  
SUA Supporting Table  
The following are the required Web Configurator, Advanced Setup, Network  
-> NAT -> Port Forwarding for the various applications running SUA mode.  
ZyXEL SUA Supporting Table1  
Required Settings in Port Forwarding  
Port/IP  
Application  
Incoming  
Outgoing Connection  
Connection  
HTTP  
FTP  
None  
None  
None  
80/client IP  
21/client IP  
TELNET  
23/client IP  
(and active Telnet  
service from WAN)  
POP3  
SMTP  
None  
None  
110/client IP  
25/client IP  
32  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
None for Chat.  
mIRC  
For DCC, please set  
Default/Client IP  
.
Windows PPTP  
ICQ 99a  
None  
1723/client IP  
None for Chat.  
Default/client IP  
For DCC, please set:  
ICQ -> preference ->  
connections -> firewall  
and set the firewall time  
out to 80 seconds in  
firewall setting.  
ICQ 2000b  
None for Chat  
None  
None for Chat  
6701/client IP  
7648/client IP  
Default/client IP  
ICQ Phone 2000b  
Cornell 1.1 Cu-SeeMe  
White Pine 3.1.2 Cu-SeeMe2 7648/client IP &  
None  
24032/client IP  
White Pine 4.0 Cu-SeeMe  
7648/client IP &  
24032/client IP  
Default/client IP  
Microsoft NetMeeting 2.1 & None  
3.013  
1720/client IP  
1503/client IP  
Cisco IP/TV 2.0.0  
RealPlayer G2  
VDOLive  
None  
.
None  
.
None  
.
Quake1.064  
None  
Default/client IP  
QuakeII2.305  
QuakeIII1.05 beta  
StartCraft.  
None  
Default/client IP  
None  
.
.
.
6112/client IP  
None  
Quick Time 4.0  
5631/client IP  
5632/client IP  
22/client IP  
pcAnywhere 8.0  
None  
IPsec (ESP tunneling mode) None (one client only)  
Default/Client  
6901/client IP  
Microsoft Messenger Service  
6901/client IP  
3.0  
Microsoft Messenger Service  
None for Chat, File  
4.6/ 4.7/ 5.0/…  
None for Chat, File  
transfer, Video and  
Voice  
transfer ,Video and Voice  
(none UPnP)6  
Net2Phone  
None  
6701/client IP  
33  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Network Time Protocol (NTP) None  
123 /server IP  
Win2k Terminal Server  
Remote Anything  
None  
None  
3389/server IP  
3996 - 4000/client IP  
5500/client IP  
5800/client IP  
5900/client IP  
Virtual Network Computing  
(VNC)  
None  
None for Chat and  
IM  
AIM (AOL Instant Messenger) None for Chat and IM  
e-Donkey  
None  
None  
4661 - 4662/client IP  
POLYCOM Video  
Conferencing  
Default/client IP  
iVISTA 4.1  
Microsoft Xbox Live7  
None  
None  
80/server IP  
N/A  
1 Since SUA enables your LAN to appear as a single computer to the Internet,  
it is not possible to configure similar servers on the same LAN behind SUA.  
2 Because White Pine Cu-SeeMe uses dedicate ports (port 7648 & port 24032)  
to transmit and receive data, therefore only one local Cu-SeeMe is allowed  
within the same LAN.  
3 In SUA mode, only one local NetMeeting user is allowed because the  
outsiders can not distinguish between local users using the same internet IP.  
4 Certain Quake servers do not allow multiple users to login using the same  
unique IP, so only one Quake user will be allowed in this case. Moreover,  
when a Quake server is configured behind SUA, P-660H-Tx v2 will not be able  
to provide information of that server on the internet.  
5 Quake II has the same limitations as that of Quake I.  
6 P-660H-Tx v2 supports MSN Messenger 4.6/ 4.7/ 5.0/video/ voice  
pass-through NAT. In addition, for the Windows OS supported UPnP  
(Universal Plug and Play), such as Windows XP and Windows ME, UPnP  
supported in P-660H-Tx v2 is an alternative solution to pass through MSN  
Messenger video/ voice traffic. For more detail, please refer to UPnP  
application note.  
7 P-660H-Tx v2 support Microsoft Xbox Live with factory default configuration.  
Configurations  
For example, if the workstation operating Cu-SeeMe has an IP of 192.168.1.34,  
then the default SUA server must be set to 192.168.1.34. The peer Cu-SeeMe  
user can reach this workstation by using P-660H-Tx v2's WAN IP address  
which can be obtained from Web Configurator, Status -> WAN Information.  
34  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Configure an Internal Server behind SUA  
Introduction  
If you wish, you can make internal servers (e.g., Web, ftp or mail server)  
accessible for outside users, even though SUA makes your LAN appear as a  
single machine to the outside world. A service is identified by the port number.  
Also, since you need to specify the IP address of a server behind the  
P-660H-Tx v2, a server must have a fixed IP address and not be a DHCP  
client whose IP address potentially changes each time P-660H-Tx v2 is  
powered on.  
In addition to the servers for specific services, SUA supports a default server.  
A service request that does not have a server explicitly designated for is  
forwarded to the default server. If the default server is not defined, the service  
request is simply discarded.  
Configuration  
To make a server visible to the outside world, specify the port number of the  
service and the inside address of the server in Web Configurator, Advanced  
35  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Setup, Network -> NAT -> Port Forwarding. The outside users can access  
the local server using the P-660H-Tx v2's WAN IP address which can be  
obtained from Web Configurator, Status -> WAN Information.  
For example:  
Configuring an internal Web server for outside access (suppose the  
Server IP Address is 192.168.1.10 ) :  
(1) Fill in the service name and server IP Address, press button ‘Add’  
(2) If add successfully, the Web Configurator will display message  
‘Configuration updated successfully’ at the bottom. You can see the port  
forwarding rule on the same page, the default port for Web Server is 80:  
(3) If you want to change the port for Web Server, you could press button  
‘Modify’ on corresponding rule, then modify and apply it.  
Default port numbers for some services  
Service  
Port Number  
FTP  
21  
36  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Telnet  
23  
25  
53  
80  
SMTP  
DNS (Domain Name Server)  
www-http (Web)  
Configure a PPTP server behind SUA  
Introduction  
PPTP is a tunneling protocol defined by the PPTP forum that allows PPP  
packets to be encapsulated within Internet Protocol (IP) packets and  
forwarded over any IP network, including the Internet itself.  
In order to run the Windows 9x PPTP client, you must be able to establish an  
IP connection with a tunnel server such as the Windows NT Server 4.0  
Remote Access Server.  
Windows Dial-Up Networking uses the Internet standard Point-to-Point (PPP)  
to provide a secure, optimized multiple-protocol network connection over  
dial-up telephone lines. All data sent over this connection can be encrypted  
and compressed, and multiple network level protocols (TCP/IP, NetBEUI and  
IPX) can be run correctly. Windows NT Domain Login level security is  
preserved even across the Internet.  
37  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Window98 PPTP Client / Internet / NT RAS Server Protocol Stack  
PPTP appears as new modem type (Virtual Private Networking Adapter) that  
can be selected when setting up a connection in the Dial-Up Networking folder.  
The VPN Adapter type does not appear elsewhere in the system. Since PPTP  
encapsulates its data stream in the PPP protocol, the VPN requires a second  
dial-up adapter. This second dial-up adapter for VPN is added during the  
installation phase of the Upgrade in addition to the first dial-up adapter that  
provides PPP support for the analog or ISDN modem.  
The PPTP is supported in Windows NT and Windows 98 already. For  
Windows 95, it needs to be upgraded by the Dial-Up Networking 1.2 upgrade.  
Configuration  
This application note explains how to establish a PPTP connection with a  
remote private network in the P-660H-Tx v2 SUA case. In ZyNOS, all PPTP  
packets can be forwarded to the internal PPTP Server (WinNT server) behind  
SUA. The port number of the PPTP has to be entered in the Web  
Configurator, Advanced Setup, Network -> NAT -> Port Forwarding on  
P-660H-Tx v2 to forward to the appropriate private IP address of Windows NT  
server.  
38  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Example  
The following example shows how to dial to an ISP via the P-660H-Tx v2 and  
then establish a tunnel to a private network. There will be three items that you  
need to set up for PPTP application, these are PPTP server (WinNT), PPTP  
client (Win9x) and the P-660H-Tx v2.  
(1) PPTP server setup (WinNT)  
Add the VPN service from Control Panel ->Network  
Add an user account for PPTP logged on user  
Enable RAS port  
Select the network protocols from RAS such as IPX, TCP/IP NetBEUI  
Set the Internet gateway to P-660H-Tx v2  
(2) PPTP client setup (Win9x)  
Add one VPN connection from Dial-Up Networking by entering the  
correct username & password and the IP address of the P-660H-Tx v2's  
Internet IP address for logging to NT RAS server.  
Set the Internet gateway to the router that is connecting to ISP  
(3) P-660H-Tx v2 setup  
Before making a VPN connection from Win9x to WinNT server, you  
need to connect P-660H-Tx v2 router to your ISP first.  
Enter the IP address of the PPTP server (WinNT server) and the  
port number for PPTP as shown below:  
39  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Select service name as ‘PPTP’, fill in the Server IP Address, then press button  
‘Add’.  
When you have finished the above settings, you can ping to the remote Win9x  
client from WinNT. This ping command is used to demonstrate that remote  
the Win9x can be reached across the Internet. If the Internet connection  
between two LANs is achievable, you can place a VPN call from the remote  
Win9x client.  
For example: C:\ping 203.66.113.2  
When a dial-up connection to ISP is established, a default gateway is assigned  
to the router traffic through that connection. Therefore, the output below shows  
the default gateway of the Win9x client after the dial-up connection has been  
established.  
Before making a VPN connection from the Win9x client to the NT server, you  
need to know the exact Internet IP address that the ISP assigns to P-660H-Tx  
v2 router in SUA mode and enter this IP address in the VPN dial-up dialog box.  
You can check this Internet IP address from PNC Monitor or S Web  
Configurator, Status -> WAN Information. If the Internet IP address is a  
fixed IP address provided by ISP in SUA mode, then you can always use this  
IP address for reaching the VPN server.  
In the following example, the IP address '140.113.1.225' is dynamically  
assigned by ISP. You must enter this IP address in the 'VPN Server' dialog box  
for reaching the PPTP server. After the VPN link is established, you can start  
the network protocol application such as IP, IPX and NetBEUI.  
40  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
5. Using Full Feature NAT  
When P-660H-Tx v2 is in Routing mode, you can select NAT Option as  
Full Feature in Network -> General ->NAT Setup  
Key Settings:  
Field  
Options  
Description  
When you select this option you can select  
Address Mapping Set Number 1~8 in the  
pull-down menu on the right.  
Full Feature  
When you select this option, this remote node will  
use default SUA Address Mapping Set. You can  
see it in CLI by command ‘ip nat lookup 255’. It’s  
a read-only set with two rules: Many-to-One and  
server mapping. Select Full Feature when you  
require other mapping types.  
Network Address  
Translation  
SUA Only  
Configuring NAT  
Address Mapping Sets and NAT Server Sets  
41  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
The P-660H-Tx v2 has 8 remote nodes and so allows you to configure 8 NAT  
Address Mapping Sets, You must specify which NAT Address Mapping Set  
(1~8) to use in the remote node when you select Full Feature NAT.  
You can edit 10 rules for each Address Mapping Set. You can edit the rules for  
Address Mapping Sets #1 in Web Configurator. The other Address Mapping  
Sets #2~8 can only be configured in CLI (Command Line Interface).  
The NAT Server Set is a list of LAN side servers mapped to external ports. We  
can configure it in Web Configurator, Advanced Setup, Network -> NAT ->  
Port Forwarding. To use the NAT server sets you’ve configured, a Server  
rule must be set up inside the NAT Address Mapping set. Please see NAT  
Server Sets for further information on how to apply it.  
When you select SUA Only, the P-660H-Tx v2 will use a default SUA Address  
Mapping set for it. It has two rules: Many-to-One and Server. You can see it in  
CLI by command ‘ip nat lookup 255’:  
Please note that the fields in this menu are read-only. However, the settings of  
the rule set 2 can be modified in Web Configurator, Advanced Setup, Network  
-> NAT -> Port Forwarding. The following table explains the fields in this  
above screen:  
Field  
Description  
Option/Example  
set  
This is sequence number for Address Mapping Sets 255 for SUA  
Internal  
Start IP  
0.0.0.0 for the  
This is the starting local IP address (ILA).  
Many-to-One type.  
This is the starting local IP address (ILA). If the rule is  
for all local IPs, then the Start IP is 0.0.0.0 and the  
End IP is 255.255.255.255.  
Local End  
IP  
255.255.255.255  
0.0.0.0  
Global Start This is the starting global IP address (IGA). If you  
IP have a dynamic IP, enter 0.0.0.0 as the Global Start  
42  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
IP.  
Global End  
IP  
This is the ending global IP address (IGA).  
N/A  
Many-to-One and  
Server  
Type  
This is the NAT mapping types.  
Here we’ll guide you to configure Address Mapping Sets from Web  
Configurator and CLI. (Since in Web Configurator we can only edit the rules  
for Address Mapping Sets #1. The other Address Mapping Sets #2~8 can only  
be configured in CLI)  
Now let's begin with Web Configurator:  
Firstly let’s come to Web Configurator, Advanced Setup, Network -> NAT ->  
Address Mapping:  
This menu is for Address Mapping Set #1, you can edit 10 Address Mapping  
Rules for Set #1. You can edit or remove a rule by clicking the two buttons on  
the rule table.  
Click the ‘Edit’ Button on the rule #1, then you can enter the window in which  
you can edit an individual rule and configure the Mapping Type, Local and  
Global Start/End IPs:  
43  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
The following table describes the fields in this screen.  
Field  
Description  
Option/Example  
1. One-to-One  
2. Many-to-One  
3. Many-to-Many  
Overload  
You can select one of the five mapping types from the  
pull-down menu  
Type  
4. Many-to-Many No  
Overload  
5. Server  
Start This is the starting local IP address (ILA)  
0.0.0.0  
This is the ending local IP address (ILA). If the rule is  
Local  
IP  
for all local IPs, then put the Start IP as 0.0.0.0 and the  
End  
255.255.255.255  
End IP as 255.255.255.255. This field is N/A for  
One-to-One type.  
This is the starting global IP address (IGA). If you have  
Start  
0.0.0.0  
a dynamic IP, enter 0.0.0.0 as the Global Start IP.  
Global  
IP  
This is the ending global IP address (IGA). This  
field is N/A for One-to-One, Many-to-One and Server  
End  
200.1.1.64  
types.  
Note: For all Local and Global IPs, the End IP address must begin after the IP  
Start address, i.e., you cannot have an End IP address beginning before the  
Start IP address.  
Configure Address Mapping Sets in CLI  
Setp 1: Telnet to the P-660H-Tx v2. (We suppose the LAN IP Address of  
P-660H-Tx v2 is 192.168.1.1)  
Step 2: Select one Address Mapping Set (#1~#8) by command ‘ip nat  
addrmap map [map #] [set name]’ (set name is optional). Suppose we  
configure set 2 in the example.  
44  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Setp 3: Set NAT address mapping rule for the Address Mapping Set you just  
configured (Set 2 in this example) by command ‘ip nat addrmap rule [rule#]  
[insert | edit] [type] [local start IP] [local end IP] [global start IP] [global  
end IP] [server set #]’. Suppose we set a Many-to-One rule for set 2 by  
command ‘ip nat addrmap rule 1 edit 1 192.168.1.10 192.168.1.20 172.1.1.1  
172.1.1.1’  
Setp 4: Save the configuration by command ‘ip nat addrmap save’. You can  
apply the Address Mapping Set 2 to remote nodes in Web Configurator when  
you select Full Feature NAT. See the intire process as follows:  
Set 5: You can lookup the successfully configured Address Mapping Sets by  
command ‘ip nat addrmap disp’  
Key Settings:  
CI Command  
Description  
Select NAT address mapping set and set mapping set  
name, but set name is optional  
Example:  
ip nat addrmap map [map#] [set  
name]  
> ip nat addrmap map 2 Test  
Set NAT address mapping rule. If the “type” is not  
“inside-server” then the “type” field will still need a  
dummy value like “0”.  
ip nat addrmap rule [rule#] [insert |  
edit] [type] [local start IP] [local end IP]  
[global start IP] [global end IP] [server  
set #]  
Type is 0 - 4 = one-to-one, many-to-one,  
many-to-many-overload, many-to-many-non overload,  
inside-server  
Example:  
> ip nat addrmap rule 1 edit 3 192.168.1.10  
192.168.1.20 172.1.1.1 172.1.1.1  
Clear the selected rule of the set  
Discard Changes  
ip nat addrmap clear [map#] [rule#]  
ip nat addrmap freememory  
ip nat addrmap disp  
Display nat set information  
ip nat addrmap save  
Save settings  
ip nat server load [set#]  
Load the server sets of NAT into buffer  
“disp 1” means to display the NAT server set in buffer,  
if parameter “1” is omitted, then it will display all the  
ip nat server disp [1]  
45  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
server sets  
ip nat server save  
Save the NAT server set buffer into flash  
Clear the server set [set#], must use “save” command  
to let it save into flash  
ip nat server clear [set#]  
Activate the rule [rule#], rule number is 1 to 24, the  
number 25-36 is for UPNP application  
ip nat server edit [rule#] active  
ip nat server edit [rule#] svrport <start Configure the port range from <start port > to <end  
port> <end port> port>  
ip nat server edit [rule#] remotehost Configure the IP address range of remote host (Leave  
<start IP> <end IP>  
it to be default value if you don’t need this command)  
Configure the lease time (Leave it to be default value if  
you don’t want this command)  
ip nat server edit [rule#] leasetime  
<seconds>  
ip nat server edit [rule#] rulename  
<string>  
Configure the name of the rule (Leave it to be default  
value if you don’t want this command)  
ip nat server edit [rule#] forwardip <IP  
address>  
Configure the LAN IP address to be forwarded  
ip nat server edit [rule#] protocol  
<TCP|UDP|ALL>  
Configure the protocol to be used TCP , UDP or ALL  
(it must be capital)  
NAT Server Sets  
The NAT Server Set is a list of LAN side servers mapped to external ports  
(similar to the old SUA menu of before). If you wish, you can make inside  
servers for different services, e.g., Web or FTP, visible to the outside users,  
even though NAT makes your network appears as a single machine to the  
outside world. A server is identified by the port number, e.g., Web service is on  
port 80 and FTP on port 21.  
As an example (see the following figure), if you have a Web server at  
192.168.1.36 and a FTP server at 192.168.1.33, then you need to specify for  
port 80 (Web) the server at IP address 192.168.1.36 and for port 21 (FTP)  
another at IP address 192.168.1.33.  
46  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Please note that a server can support more than one service, e.g., a server  
can provide both FTP and Mail service, while another provides only Web  
service.  
The following procedures show how to configure a server behind NAT.  
Step 1: Login Web Configurator, Advanced Setup, Network -> NAT -> Port  
Forwarding.  
Step 2: Select the service name from the pull-down menu, and fill in the server  
Address on ‘Server IP Address’, then click button ‘Add’ to save it.  
Step 3: You could click the button ‘Edit’ on the rule to modify the Service name,  
Server IP Address, Start/End Port.  
The most often used port numbers are shown in the following table. Please  
refer RFC 1700 for further information about port numbers.  
Service  
Port Number  
FTP  
21  
23  
25  
53  
80  
Telnet  
SMTP  
DNS (Domain Name Server)  
www-http (Web)  
PPTP (Point-to-Point Tunneling 1723  
Protocol)  
Examples  
Internet Access Only  
Internet Access with an Internal Server  
Using Multiple Global IP addresses for clients and servers  
Support Non NAT Friendly Applications  
(1) Internet Access Only  
In our Internet Access example, we only need one rule where all our ILAs map  
to one IGA assigned by the ISP. You can just use the default SUA NAT, or you  
47  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
could select Full Feature NAT and select an Address Mapping Set with a  
Many-to-One Rule. See the following figure.  
(2) Internet Access with an Internal Server  
In this case, we do exactly as the figure (use the convenient pre-configured  
SUA Only set) and also go to Web Configurator, Advanced Setup, Network ->  
NAT -> Port Forwarding to specify the Internet Server behind the NAT as  
48  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
below:  
(3) Using Multiple Global IP addresses for clients and servers  
(One-to-One, Many-to-One, Server Set mapping types are used)  
In this case we have 3 IGAs from the ISP. We have two very busy internal FTP  
servers and also an internal general server for the web and mail. In this case,  
we want to assign the 3 IGAs by the following way using 4 NAT rules.  
Rule 1 (One-to-One type) to map the FTP Server 1 with ILA1  
(192.168.1.10) to IGA1 (200.0.0.1).  
Rule 2 (One-to-One type) to map the FTP Server 2 with ILA2  
(192.168.1.11) to IGA2 (200.0.0.2).  
Rule 3 (Many-to-One type) to map the other clients to IGA3 (200.0.0.3).  
Rule 4 (Server type) to map a web server and mail server with ILA3  
(192.168.1.20) to IGA3. Type Server allows us to specify multiple  
servers, of different types, to other machines behind NAT on the LAN.  
49  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Step 1: In this case, we need to map ILA to more than one IGA, therefore we  
must choose the Full Feature option from the NAT field in currently active  
remote node, and assign IGA3 to P-660H-Tx v2’s WAN IP Address.  
Step 2: Go to Web Configurator, Advanced Setup, Network -> NAT ->  
Address Mapping to begin configuring Address Mapping Set #1. We can see  
there are 10 blank rule table that could be configured. See the following setup  
for the four rules in our case.  
Rule 1 Setup: Select One-to-One type to map the FTP Server 1 with ILA1  
(192.168.1.10) to IGA1 (200.0.0.1).  
Rule 2 Setup: Selecting One-to-One type to map the FTP Server 2 with ILA2  
(192.168.1.11) to IGA2 (200.0.0.2).  
50  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Rule 3 Setup: Select Many-to-One type to map the other clients to IGA3  
(200.0.0.3).  
Rule 4 Setup: Select Server type to map our web server and mail server with  
ILA3 (192.168.1.20) to IGA3.  
Menu Network -> NAT -> Address Mapping should look as follows now:  
51  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Step 3: Now we configure all other incoming traffic to go to our web server and  
mail server from Web Configurator, Advanced Setup, Network -> NAT -> Port  
Forwarding:  
(4) Support Non NAT Friendly Applications  
Some servers providing Internet applications such as some mIRC servers do  
not allow users to login using the same IP address. In this case it is better to  
use Many-to-Many No Overload or One-to-One NAT mapping types, thus each  
user login to the server using a unique global IP address. The following figure  
illustrates this.  
52  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
One rule configured for using Many-to-Many No Overload mapping type is  
shown below.  
We can also do this by configure threeOne-to-One mapping type rules.  
6. Using the Dynamic DNS (DDNS)  
What is DDNS?  
The DDNS service, an IP Registry provides a public central database where  
information such as email addresses, hostnames, IPs etc. can be stored and  
retrieved. This solves the problems if your DNS server uses an IP associated  
with dynamic IPs.  
Without DDNS, we always tell the users to use the WAN IP of the P-660H-Tx  
v2 to access the internal server. It is inconvenient for the users if this IP is  
dynamic. With DDNS supported by the P-660H-Tx v2, you apply a DNS name  
server. The outside users can always access the web server using the  
53  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
When the ISP assigns the P-660H-Tx v2 a new IP, the P-660H-Tx v2 must  
inform the DDNS server the change of this IP so that the server can update its  
IP-to-DNS entry. Once the IP-to-DNS table in the DDNS server is updated, the  
The DDNS servers the P-660H-Tx v2 supports currently is  
WWW.DYNDNS.ORG where you apply the DNS from and update the WAN IP  
to.  
Setup the DDNS  
1. Before configuring the DDNS settings in the P-660H-Tx v2, you must  
register an account from the DDNS server such as  
WWW.DYNDNS.ORG first. After the registration, you have a hostname  
for your internal server and a password using to update the IP to the  
DDNS server.  
2. Login Web Configurator, Advanced Setup, Advanced -> Dynamic DNS  
Select 'Active Dynamic DNS' option:  
Key Settings:  
Option  
Description  
Enter the DDNS server in this field. Currently, we support  
WWW.DYNDNS.ORG.  
Service Provider  
Toggle to 'Yes'.  
Active  
Enter the hostname you subscribe from the above DDNS server.  
Host Name  
54  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
For example, zyxel.com.tw.  
Enter the user name that the DDNS server gives to you.  
Enter the password that the DDNS server gives to you.  
User Name  
Password  
Enter the hostname for the wildcard function that the  
WWW.DYNDNS.ORG supports. Note that Wildcard option is  
available only when the provider is http://www.dyndns.org/.  
Enable Wildcard  
7. Network Management Using SNMP  
ZyXEL SNMP Implementation  
ZyXEL currently includes SNMP support in some P-660H-Tx v2 routers. It is  
implemented based on the SNMPv1, so it will be able to communicate with  
SNMPv1 NMSs. Further, users can also add ZyXEL's private MIB in the NMS  
to monitor and control additional system variables. The ZyXEL's private MIB  
tree is shown in figure 3. For SNMPv1 operation, ZyXEL permits one  
community string so that the router can belong to only one community and  
allows trap messages to be sent to only one NMS manager.  
Some traps are sent to the SNMP manager when anyone of the following  
events happens:  
1. coldStart (defined in RFC-1215) :  
If the machine coldstarts, the trap will be sent after booting.  
2. warmStart (defined in RFC-1215) :  
If the machine warmstarts, the trap will be sent after booting.  
3. linkDown (defined in RFC-1215) :  
If any link of IDSL or WAN is down, the trap will be sent with the port  
number . The port number is its interface index under the interface  
group.  
4. linkUp (defined in RFC-1215) :  
If any link of IDSL or WAN is up, the trap will be sent with the port  
number . The port number is its interface index under the interface  
group.  
5. authenticationFailure (defined in RFC-1215) :  
55  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
When receiving any SNMP get or set requirement with wrong community,  
this trap is sent to the manager.  
6. whyReboot (defined in ZYXEL-MIB) :  
When the system is going to restart (warmstart), the trap will be sent with the  
reason of restart before rebooting.  
(1) For intentional reboot :  
In some cases (download new files, CI command "sys reboot", ...), reboot is  
done intentionally. And traps with the message "System reboot by user !" will  
be sent.  
(2) For fatal error :  
System has to reboot for some fatal errors. And traps with the message of the  
fatal code will be sent.  
Configure the P-660H-Tx v2 for SNMP  
56  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
The SNMP related settings in P-660H-Tx v2 are configured in Web  
Configurator, Advanced Setup, Advanced -> Remote MGNT -> SNMP The  
following steps describe a simple setup procedure for configuring all SNMP  
settings.  
Key Settings:  
Option  
Descriptions  
Enter the correct Get Community. This Get Community must match the  
'Get-' and 'GetNext' community requested from the NMS. The default is  
'public'.  
Get  
Community  
Enter the correct Set Community. This Set Community must match the  
'Set-community requested from the NMS. The default is 'public'.  
Set  
Community  
Enter the IP address of the NMS. The P-660H-Tx v2HW-DX will only  
respond to SNMP messages coming from this IP address. If 0.0.0.0 is  
entered, the P-660H-Tx v2HW-DX will respond to all NMS managers.  
Trusted  
Host  
Enter the community name in each sent trap to the NMS. This Trap  
Community must match what the NMS is expecting. The default is  
Trap  
Community  
57  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
'public'.  
Enter the IP address of the NMS that you wish to send the traps to. If  
0.0.0.0 is entered, the P-660H-Tx v2HW-DX will not send trap any  
NMS manager.  
Trap  
Destination  
Note: You may need to edit a firewall rule to permit SNMP Packets.  
8. Using syslog  
You can configure it in Web Configurator, Advanced Setup, Maintenance ->  
Logs -> Log Settings -> Syslog logging.  
Key Settings:  
Active: Select it to active UNIX Syslog.  
Syslog IP Address: Enter the IP address of the UNIX server that you wish to  
send the syslog.  
Log Facility: Select from the 7 different local options. The log facility lets you  
log the message in different server files. Refer to your UNIX manual.  
9. Using IP Alias  
What is IP Alias ?  
In a typical environment, a LAN router is required to connect two local  
networks. The P-660H-Tx v2 can connect three local networks to the ISP or a  
remote node, we call this function as 'IP Alias'. In this case, an internal router  
is not required. For example, the network manager can divide the local  
network into three networks and connect them to the Internet using P-660H-Tx  
v2's single user account. See the figure below.  
58  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
The P-660H-Tx v2 supports three virtual LAN interfaces via its single physical  
Ethernet interface. The first network can be configured in Web Configurator,  
Advanced Setup, Network -> LAN -> DHCP Setup. The second and third  
networks that we call 'IP Alias 1' and 'IP Alias 2' can be configured in  
Network -> LAN -> IP Alias.  
There are three internal virtual LAN interfaces for the P-660H-Tx v2 to route  
the packets from/to the three networks correctly. They are enif0 for the major  
network, enif0:0 for the IP alias 1 and enif0:1 for the IP alias 2. Therefore,  
three routes are created in the P-660H-Tx v2 as shown below when the three  
networks are configured. If the P-660H-Tx v2's DHCP is also enabled, the IP  
pool for the clients can be any of the three networks.  
59  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
You can edit filter rule to accept or deny LAN packets from/to the IP alias 1/2  
go through the P-660H-Tx v2 by command in CLI:  
lan index [index number]  
Usage: index number =1 main LAN  
2 IP Alias#1  
3 IP Alias#2  
lan filter <incoming|outgoing> <tcpip|generic> [set#]  
Usage: set#= the corresponding filter set number you’ve configured  
lan save  
IP Alias Setup  
(1) Edit the first network in Web Configurator, Advanced Setup, Network ->  
LAN -> IP/DHCP Setup by configuring the P-660H-Tx v2's first LAN IP  
address.  
Key Settings:  
If the P-660H-Tx v2's DHCP server is enabled, the IP pool for the clients  
can be any of the three networks.  
DHCP  
Setup  
Enter the first LAN IP address for the P-660H-Tx v2. This will create the  
first route in the enif0 interface.  
TCP/IP  
Setup  
(2) Edit the second and third networks in Network -> LAN -> IP Alias by  
configuring the P-660H-Tx v2's second and third LAN IP addresses.  
Key Settings:  
Active it and enter the second LAN IP address for the P-660H-Tx v2. This  
IP Alias 1  
will create the second route in the enif0:0 interface.  
Active it and enter the third LAN IP address for the P-660H-Tx v2. This will  
IP Alias 2  
create the third route in the enif0:1 interface.  
10. Using IP Policy Routing  
What is IP Policy Routing (IPPR)?  
Traditionally, routing is based on the destination address only and the router  
takes the shortest path to forward a packet. IP Policy Routing (IPPR) provides  
a mechanism to override the default routing behavior and alter the packet  
forwarding based on the policy defined by the network administrator.  
Policy-based routing is applied to incoming packets on a per interface basis,  
prior to the normal routing. Network administrators can use IPPR to distribute  
60  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
traffic among multiple paths. For example, if a network has both the Internet  
and remote node connections, we can route the Web packets to the Internet  
using one policy and route the FTP packets to the remote LAN using another  
policy. See the figure below.  
Use IPPR to distribute traffic among multiple paths  
Benefits  
Source-Based Routing - Network administrators can use policy-based  
routing to direct traffic from different users through different connections.  
Quality of Service (QoS)- Organizations can differentiate traffic by setting the  
precedence or TOS (Type of Service) values in the IP header at the periphery  
of the network to enable the backbone to prioritize traffic.  
Cost Savings- IPPR allows organizations to distribute interactive traffic on  
high-bandwidth, high-cost path while using low-path for batch traffic.  
Load Sharing- Network administrators can use IPPR to distribute traffic  
among multiple paths.  
How does the IPPR work?  
A policy defines the matching criteria and the action to take when a packet  
meets the criteria. The action is taken only when all the criteria are met. The  
criteria include the source address and port, IP protocol (ICMP, UDP, TCP,etc),  
destination address and port, TOS and precedence (fields in the IP header)  
and length. The inclusion of length criterion is to differentiate between  
interactive and bulk traffic. Interactive applications, e.g., Telnet, tend to have  
short packets, while bulk traffic, e.g., file transfer, tends to have large packets.  
61  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
The actions that can be taken include routing the packet to a different gateway  
(and hence the outgoing interface) and the TOS and precedence fields in the  
IP header. IPPR follows the existing packet filtering facility of ZyNOS in style  
and in implementation. The policies are divided into sets, where related  
policies are grouped together. A use defines the policies before applying them  
to an interface or a remote node, in the same fashion as the filters. There are  
12 policy sets with 6 policies in each set.  
Setup the IP Policy Routing  
Setp 1: Set the index of IP routing policy set rule by command ‘ip  
policyrouting set index [set#] [rule#]’. Suppose set#=1, rule#=1 in this  
example.  
Step 2: Suppose we’d like to edit the rule like this:  
Policy Set Name=Test  
Active= Yes  
Criteria:  
IP Protocol = 6  
Type of Service= Don't Care  
Packet length= 0  
Len Comp= N/A  
Precedence  
Source:  
= Don't Care  
addr start= 192.168.1.2  
port start= 0  
end= 192.168.1.20  
end= N/A  
Destination:  
addr start= 0.0.0.0  
port start= 80  
end= N/A  
end= 80  
Action= Matched  
Gateway addr = 192.168.1.254  
Type of Service= No Change  
Log= No  
Precedence  
= No Change  
This policy example forces the Web packets originated from the clients with IP  
addresses from 192.168.1.2 to 192.168.1.20 be routed to the remote LAN via  
the gateway 192.168.1.254.  
To implement this, we need to invoke the following command one by one:  
ip policyrouting set name Test  
(Set the name as Test of IP routing policy rule )  
ip policyrouting set active yes  
(Enable the rule)  
ip policyrouting set criteria protocol 6  
62  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
(Set the protocol ID as 6(TCP) for the rule)  
ip policyrouting set criteria serviceType 0  
(Set the criteria type of service as don’t care for this rule)  
ip policyrouting set criteria precedence 8  
(Set the precedence as don’t care for this rule)  
ip policyrouting set criteria packetlength 0  
(Set the packet length as 0 for the rule)  
ip policyrouting set criteria srcip 192.168.1.2 192.168.1.20  
(Set the source IP address for the rule: Start=192.168.1.2, end=192.168.1.20)  
ip policyrouting set criteria srcport 0  
(Set the source port for the rule: Start=0)  
ip policyrouting set criteria destip 0.0.0.0  
(Set the destination port for the rule: Start=0.0.0.0)  
ip policyrouting set criteria destport 80 80  
(Set the destination port for the rule: Start=80, end=80)  
ip policyrouting set action actmatched  
(Set the action for the rule: Matched)  
ip policyrouting set action gatewaytype 0  
(Set gateway type for the rule: Gateway Address)  
ip policyrouting set action gatewayaddr 192.168.1.254  
(Set the gateway address for the rule: 192.168.1.254)  
ip policyrouting set criteria serviceType 0  
(Set the action type of service as don’t care for this rule)  
ip policyrouting set criteria precedence 8  
(Set the action precedence as don’t care for this rule)  
ip policyrouting set action log no  
(Set log option for the rule: no log)  
ip polictrouting set save  
(Save the rule)  
Step 3: Apply the IP policy routing. There are two interfaces to apply the policy  
set, they are the LAN interface and WAN interface. It depends where the  
gateway specified in the policy rule is located. If the gateway you specified is  
located on the local LAN you apply the policy set in LAN interface. If the  
gateway you specified is located on the remote WAN site you apply the policy  
set in WAN interface.  
Apply to WAN Interface (Suppose we apply it to remote node 1 in the  
example):  
wan node index 1  
wan node ippolicy 1  
63  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
11. Using Call Scheduling  
What is Call Scheduling?  
Call scheduling enables the mechanism for the P-660H-Tx v2 to run the  
remote node connection according to the pre-defined schedule. This feature is  
just like the scheduler ina video recorder which records the program according  
to the specified time. Users can apply at most 4 schedule sets in Remote Node.  
The remote node configured with the schedule set could be "Forced On",  
"Forced Down", "Enable Dial-On-Demand", or "Disable Dial-On-Demand" on  
specified date and time.  
How to configure a Call Scheduling?  
You can configure a call scheduling in CLI  
Suppose we want to edit a call schedule set like this:  
Call Schedule Set #=1  
Set name=Test  
Active= Yes  
Start Date(yyyy-mm-dd)= 2005 - 12 - 27  
How Often= Once  
Once:  
Date(yyyy-mm-dd)= 2005 -12 -27  
Start Time(hh:mm)= 12 : 00  
Duration(hh:mm)= 16 : 00  
Action= Enable Dial-on-demand  
This schedule example permits a demand call on the line on 12:00 a.m.,  
2005-12-27. The maximum length of time this connection is allowed is 16  
hours.  
To implement this, we need to invoke the following command one by one:  
wan callsch index 1  
(Set call schedule index #= 1. You must apply this command first before you  
begin to configure call schedule)  
wan callsch name Test  
(Set the schedule name as Test)  
wan callsch active Yes  
(Enable schedule)  
wan callsch startdate 2005 12 27  
(Set schedule start date as 2005-12-27)  
64  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
wan callsch oncedate 2005 12 27  
(Set the schedule used just once, it works on 2005-12-27)  
wan callsch starttime 12 00  
(Set the schedule start time as 12:00)  
wan callsch duration 16 00  
(Set schedule duration time as 16 hours)  
wan callsch action 2  
(Set action as dial-on-demand)  
wan callsch save  
(Save the current call schedule set)  
Key Settings:  
Start date of this schedule rule. It can be unmatched with weekday  
Start Date  
setting. For example, if Start Date is 2000/10/02(Monday), but Monday  
setting in weekday can be No.  
The node will always keep up during the setting period. It is equivalent  
to diable the idel timeout.  
Forced On  
The node will always keep doen during the setting period. The  
connected remote node will be dropped.  
Forced Down  
Enable  
The remote node accepts Dial-on-demand during this period.  
Dial-On-Demand  
The remote node denies any demand dial during the period. For the  
existing connected nodes, it will be dropped after idle timeout and no  
triggered up.  
Disable  
Dial-On-Demand  
Start Time/  
Duration  
Start Time and Duration of this schedule.  
Apply the schedule to the Remote node  
Multiple scheduling rules can program in a Remote node, and they have  
priority. For example, if we program the sets as 1,2,3,4 in remote node, then  
the set 1 will override set 2,3,4. set 2 will override 3,4, and so on.  
We can apply the schedule to the remote node in CLI by the commands:  
wan node index []index#]  
wan node callsch [index#]  
wan node save  
For example, if we want to apply the call schedule set 1 to remote node 1, we  
could use the commands:  
wan node index 1  
wan node callsch 1  
wan node save  
65  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Time Service in P-660H-Tx v2  
There is no RTC (Real-Time Clock) chip so the P-660H-Tx v2 should launch a  
mechanism to get current time and date from external server in boot time.  
Time service is implemented by the Daytime protocol(RFC-867), Time  
protocol(RFC-868), and NTP protocol(RFC-1305). You have to assign an IP  
address of a time server and then, the P-660H-Tx v2 will get the date, time,  
and time-zone information from this server. You can configure it in Web  
Configurator, Advanced Setup, Maintenance -> System -> Time Setting.  
12. Using IP Multicast  
What is IP Multicast ?  
Traditionally, IP packets are transmitted in two ways - unicast or broadcast.  
Multicast is a third way to deliver IP packets to a group of hosts. Host groups  
are identified by class D IP addresses, i.e., those with "1110" as their  
higher-order bits. In dotted decimal notation, host group addresses range from  
224.0.0.0 to 239.255.255.255. Among them, 224.0.0.1 is assigned to the  
permanent IP hosts group, and 224.0.0.2 is assigned to the multicast routers  
group.  
IGMP (Internet Group Management Protocol) is the protocol used to support  
multicast groups. The latest version is version 2 (see RFC2236). IP hosts use  
IGMP to report their multicast group membership to any immediate-neighbor  
multicast routers so the multicast routers can decide if a multicast packet  
66  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
needs to be forwarded. At start up, the P-660H-Tx v2 queries all directly  
connected networks to gather group membership.  
After that, the P-660H-Tx v2 updates the information by periodic queries. The  
P-660H-Tx v2 implementation of IGMP is also compatible with version 1. The  
multicast setting can be turned on or off on Ethernet and remote nodes.  
IP Multicast Setup  
(1) Enable IGMP in P-660H-Tx v2's LAN in Web Configurator, Advanced  
Setup, Network -> LAN -> IP -> Advanced Setup.  
(2) Enable IGMP in P-660H-Tx v2's remote node in Web Configurator,  
Advanced Setup, Network -> Remote Node -> Edit -> Multicast.  
Key Settings:  
IGMP-v1 for IGMP version 1, IGMP-v2 for IGMP version 2.  
Multicast  
13. Using Bandwidth Management  
Why Bandwidth Management (BWM)?  
Nowadays, we have many different traffic types for Internet applications. Some  
traffic may consume high bandwidth, such as FTP (File Transfer Protocol).  
Some other traffic may not require high bandwidth, but they require stable  
supply of bandwidth, such as VoIP traffic. The VoIP quality would not be good,  
if all of the outgoing bandwidth is occupied via FTP. Additionally, chances are  
that you would like to grant higher bandwidth for some body specially who is  
using specific IP address in your network. All of these are reasons why we  
need bandwidth management.  
Using BWM  
Setp 1: Go to Web Configurator, Advanced Setup, Advanced -> Bandwidth  
MGMT->Summary, activate bandwidth management on the interface you  
would like to manage. We enable the BWM function on WAN interface in this  
example.  
Enter the total speed for this interface that you want to allocate using  
bandwidth management. This appears as the bandwidth budget of the  
interface’s root class.  
Select how you want the bandwidth to be allocated. Priority-Based means  
bandwidth is allocated via priority, so the traffic with highest priority would be  
served first, then the second priority is served secondly and so on. If  
67  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Fairness-Based is chosen, then the bandwidth is allocated by ratio. Which  
means if A class needs 300 kbps, B class needs 600 kbps, then the ratio of A  
and B's actual bandwidth is 1:2. So if we get 450 kbps in total, then A would  
get 150 kbps, B would get 300 kbps. We select Priority-Based in this  
example.  
Key Settings:  
Check the box to enable BWM on the interface. Note that if you would like  
to manage traffic from WAN to LAN, you should apply BWM on LAN  
Active  
interface. If you would like to management traffic from WAN to DMZ,  
please apply BWM on DMZ interface.  
Enter the total speed to manage on this interface. This value is the budget  
Speed  
of the class tree's root.  
Choose the principle to allocate bandwidth on this interface.  
Priority-Based allocates bandwidth via priority. Fairness-Based allocates  
Scheduler  
bandwidth by ratio.  
Check this box if you would like to give residuary bandwidth from Interface  
to the classes who need more bandwidth than configured amount. Do not  
select this if you want to reserve bandwidth for traffic that does not match a  
bandwidth class or you want to limit the bandwidth of each class at the  
configured value. (Please note that to meat the second condition, you  
should also disable Use All Managed Bandwidth in the BWM rule.)  
Maximize  
Bandwidth  
Usage  
Step 2: Go to Web Configurator, Advanced Setup, Advanced -> Bandwidth  
MGMT-> Rule Setup, select the interface, Service, Priority, and Allocated  
Bandwidth for this rule, then click button ‘Add’ to apply this rule.  
68  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Step 3: You can modify the rule by clicking the button ‘Edit’ on the rule:  
Key Settings:  
Give this rule a name, for example, 'WWW'  
RuleName  
Configure the bandwidth you would like to allocate to this rule  
BW Budget  
Enter a number between 0 and 7 to set the priority of this class. The  
higher the number, the higher the priority. The default setting is 3.  
Priority  
Check this box if you would like to let this class to borrow bandwidth from  
it's parents when the required bandwidth is higher than the configured  
amount. Do not check this if you want to limit the bandwidth of this class  
at the configured value.(Please note that you should also disable  
Maximize Bandwidth Usage on the interface to meet the condition.)  
Use All  
Managed  
Bandwidth  
Select User-defined, SIP, FTP, or H.323 to specify the traffic types  
Service  
Destination  
IP Address  
Enter the IP address of destination that meets this class.  
69  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Destination  
Subnet  
Enter the destination subnet mask.  
Mask  
Destination  
Port  
Enter the destination port number of the traffic.  
Enter the IP address of source that meats this class. Note that for traffic  
from 'LAN to WAN', since BWM is before NAT, you should use the IP  
address before NAT processing.  
Source IP  
Address  
Source  
Subnet  
Mask  
Enter the destination subnet mask.  
Enter the source port number of the traffic.  
Source Port  
Enter the protocol number for the traffic. 1 for ICMP, 6 for TCP or 17 for  
UDP  
Protocol ID  
After configuration BWM, you can check current bandwidth of the configured  
traffic in Web Configurator, Advanced Setup, Advanced -> Bandwidth  
MGMT-> Monitor.  
14. Using Zero-Configuration  
Zero-Configuration and VC auto-hunting  
Zero-Configure feature can help customer to reduce the burden of setting  
efforts. Whenever system ADSL links up system will send out some probing  
patterns, system will analyze the packets returned from ISP, and decide which  
services the ISP may provide. Because ADSL is based on a ATM network, so  
system have to pre-configured a VPI/VCI hunting pool before Auto-Configure  
function begins to work.  
The Zero-Configuration feature can hunt the encapsulation and VPI/VCI value,  
and system will automatically configure itself if the hunting result is  
successfully. This feature has two constraints:  
1. It supports the ISP provides one kind of service (PPPoE/PPPoA, etc.)  
only, otherwise the hunting will get confusing and failed.  
2. VC auto-hunting only supports dynamic WAN IP address. If the router is  
set a static WAN IP address. VC auto-hunting function will be disabled.  
The entry of hunting pool must also contain the VPI, VCI, and which kinds of  
hunting patterns you wish to send. Whenever system send out all the probing  
patterns with specific VPI/VCI, system will wait for 5~10 seconds and get the  
response from ISP, the response patterns will decide which kinds of ADSL  
70  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
services of the line will be. After that, system will save back the correct VPI,  
VCI and also services (encapsulation) type into profile of WAN interface.  
Configure the VC auto-hunting preconfigured table.  
(1) Display auto-haunting preconfigured table by using command from CLI:  
wan atm vchunt display  
(2) Add items to the auto-haunting preconfigured table by using commands:  
wan atm vchunt add <remoteNodeIndex> <vpi> <vci> <service  
bit(hex)>  
wan atm vchunt save  
Note: <remote node> : input the remote node index 1-8  
<vpi> : vpi value  
<vci> : vci value  
<service>: it’s a hex value, bit0:PPPoE/VC (1), bit1:PPPoE/LLC (2) ,  
bit2:PPPoA/VC (4), bit3:PPPoA/LLC (8), bit4:Enet/VC (16), bit5 :Enet/LLC (32)  
For example:  
(1) If you need service PPPoE/LLC and Enet/LLC then the service bits will be  
2+32 = 34 (decimal) = 22 (hex), you must input 22  
(2) If you want to enable all service for VC hunting, the service bits will be  
1+2+4+8+16+32=63(decimal)= 3f (hex), you must input 3f  
Need to perform save after this by command ‘wan atm vchunt save’  
71  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
(3) Delete items from the auto-haunting preconfigured table by useing  
command:  
wan atm vchunt remove <remote node> <vpi> <vci>  
Using Zero configuration.  
You can enable/disable Zero Configuration in Network -> WAN -> Advanced  
Setup:  
(1) After configure the auto-haunting preconfigured table. You just need a PC  
connected to the device LAN Ethernet port with the DSL sync up.  
(2) Open your web browser to access a Web site. It should prompt and request  
for your username password of your ISP account, if your ISP provide PPPoE  
or PPPoA service.  
(3) After key-in the correct info, it will than test the connection. If it is  
successful it will than close the browser and you can open a new browser to  
surf the Internet. If the connection test fail, it will go back to the page ask for  
user name and password.  
72  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
(4) Basically the zero configuration only work on the VC that was preconigured  
in the auto-haunting preconfigured table.  
15. How could I configure triple play on P-660H-Tx v2?  
The common triple play scenario is as follows:  
0/32  
Port1  
Port2  
PVC1  
PVC2  
Port1  
Port2  
Port3  
VOIP Server  
IPTV Server  
VOIP Telephone  
Video Client  
0/34  
0/55  
1/32  
Port3  
Port4  
PVC3  
PVC4  
Clients surfing  
Other clients  
Internet  
Others  
Port4  
ATUR  
IP-DSLAM  
VL-Switch  
Access Network  
ISP  
CPE  
Triple Play is a port-based policy to forward packets from different LAN port to  
different PVCs, thus we could assign different parameters to the PVC (CBR,  
UBR, VBR-RT, VBR-nRT) to guarantee different applications.  
We could configure triple play on P-660H-Tx v2 via CLI. The command is:  
sys tripleplay set portbase <EportID> <PVCID>  
For example: sys tripleplay portbase set 1 1  
sys tripleplay portbase set 2 2  
sys tripleplay portbase set 3 3  
The traffic from Ethernet port 1 must be forwarded to PVC1, vice versa.  
The traffic from Ethernet port 2 must be forwarded to PVC2, vice versa.  
The traffic from Ethernet Port3 must be forwarded to PVC3, vice versa.  
16. How to configure packet filter on P-660H-Tx v2?  
The P-660H-Tx v2 allows you to configure up to twelve filter sets with six rules  
in each set, for a total of 72 filter rules in the system. You can apply up to four  
filter sets to a particular port to block multiple types of packets. With each filter  
set having up to six rules, you can have a maximum of 24 rules active for a  
single port.  
73  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
The packet filter function on P-660H-Tx v2 is the same as before, just that you  
could only configure the filter set and apply them by command in CLI. It’s very  
complex for common users to do it. So here’s the recommendation:  
(1) Usually if you want to block special packets, you could edit a firewall rule in  
Web Configurator.  
(2) By factory default, ZyXEL has preconfigured many filter sets for your  
reference, you can check them by command:  
sys filter set index [set#] [rule#]  
Usage: set#: 1~12; rule#: 1~6. Commonly the preconfigured filter sets are as  
follows: <set 2, rule 1~6>, <set 3, rule 1>, <set 4, rule 1>.  
sys filter set display  
For example:  
This could satisfy mostly requirement. You could select any of them to apply to  
the WAN node or LAN Interface on demand. The command is as follows:  
Apply to WAN node:  
wan node index <node#>  
Usage: node#= 1~8, corresponding to the remote node 1~8  
wan node filter <incoming|outgoing> <tcpip|generic> <set1#> <set2#>  
<set3#> <set4#>  
Usage: You can apply at most four filter sets to one remote node.  
wan node save  
74  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Apply to LAN Interface:  
lan index [index#]  
Usage: index#=1 main LAN  
2 IP Alias#1  
3 IP Alias#2  
lan filter <incoming|outgoing> <tcpip|generic> <set1#> <set2#> <set3#>  
<set4#>  
Usage: You can apply at most four filter sets to LAN Interface.  
lan save  
(3) If you are very advanced user, you could edit filter set by the following  
command:  
sys filter set [set#] [rule#]  
Usage: Set up a filter set index to edit a set.  
set#: 1~12  
rule#: 1~6  
sys filter set type [typeID]  
Usage: typeID: tcpip or generic.  
Note: In one filter set, you should configure all the rules in one type: either  
tcpip or generic.  
sys filter set enable  
Usage: Enable(active) the rule.  
sys filter set ……(You could configure a filter rule on demand, the newest  
command is available on release note)  
sys filter set save  
Usage: Don’t forget to save the rule everytime you’ve configured it.  
Reference Commands:  
Set the index of filter set rule, you must apply this  
sys filter set index [set#] [rule#]  
command first before you begin to configure the  
filter rules  
sys filter set name [set name]  
sys filter set type [tcpip | generic]  
sys filter set enable  
Set the name of filter set  
Set the type of filter rule  
Enable the rule  
sys filter set disable  
Disable the rule  
sys filter set protocol [protocol #]  
sys filter set sourceroute [yes|no]  
sys filter set destip [address] [subnet  
Set the protocol ID of the rule  
Set the sourceroute yes/no  
Set the destination IP address and subnet mask of  
75  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
mask]  
the rule  
Set the destination port and compare type (compare  
type could be 0(none)|1(equal)|2(not  
equal)|3(less)|4(greater) )  
sys filter set destport [port#] [compare  
type = none|equal|notequal|less|greater]  
sys filter set srcip [address] [subnet  
mask]  
Set the source IP address and subnet mask  
sys filter set srcport [port#] [compare  
type = none|equal|not  
Set the source port and compare type (compare  
type could be 0(none)|1(equal)|2(not  
equal)|3(less)|4(greater) )  
equal|less|greater]  
sys filter set tcpEstab [yes|no]  
sys filter set more [yes|no]  
Set TCP establish option  
Set the more option to yes/no  
sys filter set log [type 0-3= none | match| Set the log type (it could be 0-3 =none, match, not  
notmatch | both ]  
match, both)  
sys filter set actmatch[type 0-2 =  
checknext | forward | drop]  
sys filter set actnomatch [type 0-2 =  
checknext | forward | drop]  
sys filter set offset [#]  
Set the action for match  
Set the action for not match  
Set offset for the generic rule  
Set the length for generic rule  
Set the mask for generic rule  
sys filter set length [#]  
sys filter set mask [#]  
sys filter set value [(depend on length in  
hex)]  
Set the value for generic rule  
sys filter set clear  
Clear the current filter set  
sys filter set save  
Save the filter set parameters  
Display Filter set information. W/o parameter, it will  
display buffer information.  
sys filter set display [set#][rule#]  
sys filter set freememory  
Discard Changes  
76  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Support Tool  
1. LAN/WAN Packet Trace  
The Prestige packet trace records and analyzes packets running on LAN and  
WAN interfaces. It is designed for users with technical backgrounds who are  
interested in the details of the packet flow on LAN or WAN end of Prestige. It is  
also very helpful for diagnostics if you have compatibility problems with your  
ISP or if you want to know the details of a packet for configuring a filter rule.  
The format of the display is as following:  
Packet:  
[index] [timer/second][channel-receive/transmit][length] [protocol]  
[sourceIP/port] [destIP/port]  
There are two ways to dump the trace:  
Online Trace--display the trace real time on screen  
Offline Trace--capture the trace first and display later  
The details for capturing the trace in CLI as follows:  
First of all, you need to telnet to the P-660H-Tx v2 firstly. The password is  
Administrator passwords, ‘admin’ by default.  
Online Trace  
(1) Trace LAN packet  
Disable to capture the WAN packet by entering: sys trcp channel mpoa00  
none  
Enable to capture the LAN packet by entering: sys trcp channel enet0  
bothway  
Enable the trace log by entering: sys trcp sw on & sys trcl sw on  
Display the brief trace online by entering: sys trcd brief  
Display the detailed trace online by entering: sys trcd parse  
Example:  
77  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
(2) Trace WAN packet  
Disable the capture of the LAN packet by entering: sys trcp channel enet0  
none  
Enable to capture the WAN packet by entering: sys trcp channel mpoa00  
bothway  
Enable the trace log by entering: sys trcp sw on & sys trcl sw on  
Display the brief trace online by entering: sys trcd brief  
Display the detailed trace online by entering: sys trcd parse  
Example:  
78  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Offline Trace  
Disable the capture of the WAN packet by entering: sys trcp channel  
mpoa00 none  
Enable the capture of the LAN packet by entering: sys trcp channel enet0  
bothway  
Enable the trace log by entering: sys trcp sw on & sys trcl sw on  
Wait for packet passing through the Prestige over LAN  
Disable the trace log by entering: sys trcp sw off & sys trcl sw off  
Display the trace briefly by entering: sys trcp brief  
Display specific packets by using: sys trcp parse <from_index> <to_index>  
79  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Capture the detailed logs by Hyper Terminal  
Step 1: Initiate a hyper terminal connection from your PC(suppose you  
connected to the LAN port of P-660H-Tx v2)  
Step 2: Click the ‘properties’ to configure parameters to telnet to the  
P-660H-Tx v2.  
80  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
Step 3: So that after you invoke the relevant commands, you could save the  
logs you’ve captured.  
81  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
2. Firmware/Configurations Uploading and Downloading using TFTP  
Using TFTP client software  
Upload/download ZyNOS via LAN  
Upload/download Prestige configurations via LAN  
(1) Using TFTP to upload/download ZyNOS via LAN  
Step 1: TELNET to your Prestige first before running the TFTP software  
Step 2: Type the CI command 'sys stdio 0' to disable console idle timeout  
in Command Line Interface (CLI)  
Step 3: Run the TFTP client software  
Step 4: Enter the IP address of the Prestige  
Step 5:To upload the firmware, please save the remote file as 'ras' to  
Prestige. After the transfer is complete, the Prestige will program the upgraded  
firmware into FLASH ROM and reboot itself.  
An example:  
82  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
The 192.168.1.1 is the IP address of the Prestige. The local file is the source  
file of the ZyNOS firmware that is available in your hard disk. The remote file is  
the file name that will be saved in Prestige. Check the port number 69 and  
512-Octet blocks for TFTP. Check 'Binary' mode for file transfering.  
(2) Using TFTP to upload/download SMT configurations via LAN  
Step 1: TELNET to your Prestige first before running the TFTP software  
Step 2: Type the command 'sys stdio 0' to disable console idle timeout in  
Command Line Interface (CLI).  
Step 3: Run the TFTP client software  
Step 4: To download the P-660H-Tx v2 configuration, please get the  
remote file 'rom-0' from the Prestige.  
Step 5: To upload the P-660H-Tx v2 configuration, please save the remote  
file as 'rom-0' in the Prestige.  
An example:  
83  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
ƒ
ƒ
The 192.168.1.1 is the IP address of the Prestige.  
The local file is the source file of your configuration file that is available  
in your hard disk.  
ƒ
ƒ
ƒ
The remote file is the file name that will be saved in Prestige.  
Check the port number 69 and 512-Octet blocks for TFTP.  
Check 'Binary' mode for file transfering.  
Using TFTP command on Windows NT  
Step 1: TELNET to your Prestige first before using TFTP command  
Step 2: Type the CI command 'sys stdio 0' to disable console idle timeout in  
Command Line Interface (CLI).  
Step 3: Download ZyNOS via LAN : c:\tftp -i [PrestigeIP] get ras [localfile]  
Step 4: Upload P-660H-Tx v2 configurations via LAN: c:\tftp -i [PrestigeIP] put  
[localfile] rom-0  
Step 5: Download P-660H-Tx v2 configurations via LAN: c:\tftp -i [PrestigeIP] get  
rom-0 [localfile]  
Using TFTP command on UNIX  
Before you begin:  
1. TELNET to your Prestige first before using TFTP command  
2. Type the CI command 'sys stdio 0' to disable console idle timeout in  
Command Line Interface (CLI)  
Example:  
[cppwu@faelinux cppwu]$ telnet 192.168.1.1  
Trying 192.168.1.1...  
Connected to 192.168.1.1.  
Escape character is '^]'.  
Password: ****  
ras> sys stdio 0  
(Open a new window)  
[cppwu@faelinux cppwu]$ tftp -I 192.168.1.1 get rom-0 [local-rom] <- change to binary mode  
<- download configurations  
[cppwu@faelinux cppwu]$ tftp -I 192.168.1.1 put [local-rom] rom-0 <- upload configurations  
[cppwu@faelinux cppwu]$ tftp -I 192.168.1.1 get ras [local-ras ] <- download firmware  
84  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
[cppwu@faelinux cppwu]$ tftp -I 192.168.1.1 put [local-ras] ras <- upload firmware  
3. Using FTP to Upload the Firmware and Configuration Files  
In addition to upload the firmware and configuration file via the console port  
and TFTP client, you can also upload the firmware and configuration files to  
the Prestige using FTP.  
To use this feature, your workstation must have a FTP client software. See the  
example shown below.  
Note: The remote file name for the firmware is 'ras' and the configuration file is  
'rom-0'.  
Use FTP client from your workstation to connect to the Prestige by  
entering the IP address of the Prestige.  
Step 1  
Press 'Enter' key to ignore the username, because the Prestige does  
not check the username.  
Step2  
Enter the CLI password as the FTP login password, the default is  
'admin'.  
Step 3  
Step 4 Enter command 'bin' to set the transfer type to binary.  
Step 5 Use 'put' command to transfer the file to the Prestige.  
Example:  
Step 1: Connect to the Prestige by entering the Prestige's IP and Administrator  
password in the FTP software. Set the transfer type to 'Auto-Detect' or  
85  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 
P-660H-Tx v2 Support Notes  
'Binary'.  
Step 2: Press 'OK' to ignore the 'Username' prompt.  
Step 3: To upload the firmware file, we transfer the local 'ras' file to overwrite  
the remote 'ras' file.  
To upload the configuration file, we transfer the local 'rom-0' to overwrite  
the remote 'rom-0' file.  
86  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
Step 4: The Prestige reboots automatically after the uploading is finished.  
Please do not power off the router at this moment.  
87  
All contents copyright © 2006 ZyXEL Communications Corporation.  
P-660H-Tx v2 Support Notes  
CI Command Reference  
Command Syntax and General User Interface  
CI has the following command syntax:  
command <iface | device > subcommand [param]  
command subcommand [param]  
command ? | help  
command subcommand ? | help  
General user interface:  
Shows the following commands and all major (sub)commands  
Exit Subcommand  
1.  
?
2. exit  
To get the latest CI Command list  
The latest CI Command list is available in release note of every ZyXEL  
firmware release. Please goto ZyXEL public WEB site  
package (*.zip), you should unzip the package to get the release note in PDF  
format.  
88  
All contents copyright © 2006 ZyXEL Communications Corporation.  
 

VXI BlueParrott B100 User Manual
Vita Mix On Counter Blending Station Advance User Manual
Sony Handycam DCR TRV240 User Manual
Sony ERA 210C1 User Manual
Sony DVW 700WSP User Manual
Sony DCR PC120BT DCR PC115 User Manual
Sony Car Stereo System WRU 806B User Manual
Sony Camorder User Manual
Sirius Satellite Radio Chrysler Radio Navigation System RB4 User Manual
Sanyo FXCD 550 User Manual