ZyXEL Communications 128L manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications 128L, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications 128L one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications 128L. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL Communications 128L should contain:
- informations concerning technical data of ZyXEL Communications 128L
- name of the manufacturer and a year of construction of the ZyXEL Communications 128L item
- rules of operation, control and maintenance of the ZyXEL Communications 128L item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications 128L alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications 128L, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications 128L.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications 128L item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Prestige 128L User’s Manual Version 1.0 ZyXEL A CCESSING I NTERNET & I NTRANET[...]

  • Page 2

    ii ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two (2) years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or ma[...]

  • Page 3

    iii you specific legal rights, and you may also have other rights which vary from state to state. Copyright © 1997 by ZyXEL The contents of this book may not be reproduced (in any part or as a whole) or transmitted in any form or by any means without the written permission of the publisher. Published by ZyXEL Communications Corporation. All rights[...]

  • Page 4

    iv limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. If this equipment does cause harmful inte[...]

  • Page 5

    v company. The equipment must also be installed using an acceptable method of connection. In some cases, the company’s inside wiring associated with a single line individual service may be extended by means of a certified connector assembly. The customer should be aware that the compliance with the above conditions may not prevent degradation of [...]

  • Page 6

    vi Outside North America, you can dial +886 - 3 - 5783942 EXT 252 between 8:00AM and 5:00PM Taiwan time (GMT +8:00). • Fax : ZyXEL in North America: (714) 693 - 8811 or Taiwan: +886 - 3 - 5782439 • E - mail : • Sales inquiries : sales@zyxel.com in North America. sales@zyxel.com.tw outside North America. • Technical support : support@zyxel.c[...]

  • Page 7

    vii Contents ZyXEL Limited Warranty ............................................................ ii Copyright © 1997 by ZyXEL ...................................................... iii Acknowledgments ....................................................................... iii FCC Part 15 Information ................................................[...]

  • Page 8

    viii Collecting General Setup Information ...........................................9 Collecting IDSL Information ........................................................9 Collecting Ethernet Setup Information ........................................10 3 Installation ............................................................. 15 A Warning On Con[...]

  • Page 9

    ix 6 TCP/IP Configuration ........................................... 45 IP Subnet Mask .........................................................................45 LAN - to - LAN Application ..........................................................46 Remote Node Setup ..................................................................47 Static Rout[...]

  • Page 10

    x About SNMP ..............................................................................79 Configuring Your Prestige For SNMP Support ........................79 11 System Security ................................................... 83 Configuring the SMT Password ................................................83 12 Telnet Configuration and Capa[...]

  • Page 11

    xi 15 Index .................................................................. 101[...]

  • Page 12

    [...]

  • Page 13

    Introduction 1 1 Introduction Congratulations on your purchase of the ZyXEL Prestige 128L IDSL Router. The Prestige integrates a Router and Bridge, offering inexpensive yet complete telecommunications and internetworking solutions for your home or branch office. The Prestige is ideal for everything from Internet access, to receiving calls from Remo[...]

  • Page 14

    2 Introduction ISDN Digital Subscriber Line (IDSL) IDSL uses the 2B1Q line coding standard for ISDN BRI circuits. Used for data - only applications, IDSL can use unshielded twisted pair wire for transmitting data at 64/128Kbps for up to 18,000 feet. The di fferences between IDSL and ISDN are: 1. ISDN passes through the phone company's central [...]

  • Page 15

    Introduction 3 Data Compression The Prestige incorporates Stac data compression and Compression Control Protocol. Applications For Your Prestige Some applications for your Prestige include: Internet Access The Prestige suppor ts TCP/IP protocol. It is also compatible with other IDSL access servers manufactured by vendors such as Ascend. Internet Si[...]

  • Page 16

    4 Introduction • Release notes for firmware upgrades and other information can be accessed through a ZyXEL FTP server site. For ZyXEL contact information see page v . Packing List Before you proceed further, check all items you received with your Prestige 128L against this list to make sure nothing is missing. The complete package should include:[...]

  • Page 17

    Introduction 5 • IDSL service provided by local phone company (optional). • An Ethernet connection to your computer. • A computer equipped with communications software configured to the following parameters: • VT100 terminal emulation. • 9600 Baud rate. • No parity, 8 Data bits, 1 Stop bit. After the Prestige has been successfully conne[...]

  • Page 18

    6 Introduction[...]

  • Page 19

    Before You Begin 7 2 Before You Begin To ensure successful installation of your Prestige, we strongly recommend that you carefully follow the steps outlined in Chapters 2 and 3 . These chapters are designed as a guide for you to collect all necessary information about your LAN. Once this information has been collected, it will be used to configure [...]

  • Page 20

    8 Before You Begin Figure 2 - 1 Installation Guide Completing the Worksheet Before you continue, locate the worksheet at the end of thi s chapter. This information worksheet has been provided to help you get through setup and installation of your Prestige as easily as possible. Ordering Your IDSL Line There is no need to order an IDSL line if you a[...]

  • Page 21

    Before You Begin 9 Collecting General Setup Information Your Prestige requires the fol lowing system information. You can obtain all the pertinent information from your network administrator. Record this information into the worksheet as it becomes available. This worksheet will later be referred to as you configure your Prestige. • System Name -[...]

  • Page 22

    10 Before You Begin Collecting Ethernet Setup Information This section assumes that you are setting up your Prestige for a TCP/IP connection. If you want to configure the Prestige for other protocols (e.g., IPX ), refer to the appropriate chapters. • Ethernet Interface - The first step is to determine the type of Ethernet interface you will be us[...]

  • Page 23

    Before You Begin 11 IP Subnet Mask Number of Host Number of Bits 255.255.255.0 254 24 255.255.255.128 126 25 255.255.255.192 62 26 255.255.255.224 30 27 255.255.255.255 1 32[...]

  • Page 24

    12 Before You Begin Prestige Setup and Installation Worksheet General Setup Information • System Name (for identification purposes): _______________________________________ • Protocol Routing: ___TCP/IP ___IPX ___Bridging IDSL Setup Information • Service Type (check one): ___Client ___Server • Transfer Type (check one): ___Leased 128 ___Lea[...]

  • Page 25

    Bef ore You Begin 13 ___UTP • IP Address: _______._______._______._______ • IP Subnet Mask: _______._______._______._______ Notes:[...]

  • Page 26

    14 Before You Begin[...]

  • Page 27

    Installation 15 3 Installation This chapter outlines how to connect your Prestige to the LAN and IDSL line. Refer to the diagram below to identify all of the ports on your device when you attempt to make the various connections. Figure 3 - 1 Rear Panel Diagram A Warning On Connection Cables The IDSL line and Ethernet cable, are very similar to each[...]

  • Page 28

    16 Installation Connecting Your Computer and Your Prestige For the initial setup of your Prestige, use the provided RS - 232 cable and communications software to configure your Prestige. After your Prestige has been successfully installed, you can modify the configuration through a remote Telnet connection. See Chapter 12 for detailed instructions [...]

  • Page 29

    Installation 17 The UTP port is used to connect to a 10Base - T network. 10Base - T networks use Unshielded Twisted Pair (UTP) cable and RJ - 45 connectors that look like a bigger telephone plug with 8 pins. Two types of gray Ethernet cables come with the package: • Straight through cable (white tag): Connect your Prestige 128L to a 10Base - T hu[...]

  • Page 30

    18 Installation Figure 3 - 2 Front Panel PWR - Comes on as soon as you connect your Prestige to the power supply and switch it to the I (on) position. TST - Should be blinking if your Prestige is functioning properly. Line: LNK - Indicates that your Prestige has an ISDN line connected to the WAN interface and it has been successfully initialized. 6[...]

  • Page 31

    Installation 19 Figure 3 - 3 Power on Messages If you press ENTER , your Prestige will display a login screen and ask you to enter the password as shown below: Figure 3 - 4 Login Screen Enter the default password, 1234 to get into the Main Menu of System Management Terminal (SMT ). Note that once you are in the S MT and if there is no activity for [...]

  • Page 32

    20 Installation Navigating Through the System Management Terminal Interface Use the SMT to configure your Prestige. Several operations that you should be familiar with before you attempt to modify the configuration are listed below: • Moving Forward to Another Menu. To move forward to a sub - menu below the cur rent one, type in the number of the[...]

  • Page 33

    Installation 21 • Saving Your Configuration. You can save your configuration by pressing ENTER at the message: Press ENTER to confirm or ESC to cancel: Saving the data on the screen will take you in most cases to the previous menu. The SMT main menu is shown below: Figure 3 - 5 SMT Main Menu System Management Terminal Interface Summary This secti[...]

  • Page 34

    22 Installation # Menu Title Description Remote Nodes. 12 Static Routing Setup Setup static route for different protocols. There are four static routes for each protocol. 21 Filter Set Configuration Setup filters to be used in Menu 3 and Menu 11 to provide security, call control, etc. 22 SNMP Configuration Setup SNMP related parameters. 23 System S[...]

  • Page 35

    Installation 23 1. System Name - Choose a descriptive name for identification purposes, e.g., p128l. This name should be no more than 8 alphanumeric characters. Spaces are not allowed, but “ - ” and “_” are accepted. This name can be retrieved remotely via SNMP , used for CHAP authentication, and will be displayed as the prompt in the Comma[...]

  • Page 36

    24 Installation 1. Service Type - There are two options: Client or Server. Server provides clock to synchronize signals transmitted on the line. 2. Transfer Type - There are two options: Leased 128K or Leased 64K, which deci de the IDSL line’s baud rate. Ethernet Setup Menu 3 is used to enter Ethernet related information. Depending on the protoco[...]

  • Page 37

    Installation 25 General Ethernet Setup This menu determines the type of Ethernet interface you are using as well as the filter sets you wish to implement to monitor your Ethernet traffic. From Menu 3 - Ethernet Setup, enter 1 to go to menu 3.1 - General Etherne t Setup. Figure 3 - 7 Menu 3.1 - General Ethernet Setup 1. Ethernet Interface - Your Pre[...]

  • Page 38

    26 Installation network (looks like a bigger telephone plug). Determine which type you are using and select the appropriate option. 2. Input and Output Filter Sets - Filter sets are used to block certain packets to reduce traffic and to prevent a security breach. Filtering is a very involved subject, so leave these fields blank for the time being. [...]

  • Page 39

    Installation 27 will act as a DHCP server, capable of automatically assigning IP addre sses to Windows 95, Windows NT, and other systems that support the DHCP client. When DHCP is used, the following four items need to be set. Do not set this field to Server if there is already a DHCP server on your network. 2. Client IP Pool Starting Address - DHC[...]

  • Page 40

    28 Installation on the IP address that you assign. Unless you have special need for subnetting, use the default subnet mask calculated by your Prestige. 7. RIP Direction - This parameter determines how your Prestige handles RIP (Routing Information Protocol ). If set to Both (default) , your Prestige will broadcast its routing table on the LAN , an[...]

  • Page 41

    Installation 29 When you are finished, press ENTER at the message: Press ENTER to Confirm... to save your selections, or press ESC at any time to cancel them. Novell IPX Ethernet Setup Refer to the chapter on Novell IPX configuration. Bridge Ethernet Setup Refer to the chapter on Bridging configuration.[...]

  • Page 42

    30 Installatio n[...]

  • Page 43

    Configuring for Internet Access 31 4 Configuring for Internet Access Menu 4 of the SMT allows you to configure Internet access on one screen. Before you configure your Prestige for Internet access, you need to collect the following information from your ISP (Internet Service Provider). • IP address of the ISP’s gateway (optional). • Login nam[...]

  • Page 44

    32 Configuring for Internet Access IP Addresses and the Internet Conventionally, the Internet (with a capital I) refers the large - scale interconnected networks across the world that was originally developed by the US Department of Defense. The Internet uses exclusively the TCP/IP suite of protocols. The term “internet” (lower case i), however[...]

  • Page 45

    Configuring for Internet Access 33 A LLOCATION FOR P RIVATE I NTERNET ’ S AND RFC 1466, G UIDELINES FOR M ANAGEMENT OF IP A DDRESS S PACE . Once you have determined the IP address range for your local network, you may want to use DHCP (Dy namic Host Configuration Protocol) to assign addresses to individual hosts on the network, as an alternative [...]

  • Page 46

    34 Configuring for Internet Access 3. ISP IP Addr - Enter the IP Address of the remote gateway at the ISP’s site. If you do not have this data, just leave it blank. 4. My Login Name - Enter the login name provided by your ISP. 5. My Password - Enter the p assword associated with the login name above. Note that this login name/password pair is onl[...]

  • Page 47

    Configuring for Internet Access 35 This feat ure may also be used to connect to TCP/IP remote nodes other than Internet Service Providers. For example this feature can be used to simplify the allocation of IP addresses when connecting branch offices to the corporate network. The IP address for the Single User Account can be either fixed or dynamica[...]

  • Page 48

    36 Configuring for Internet Access • UDP and TCP datagrams can be routed. In addition, ICMP echo can also be routed. The figure below shows an example of a small office connected to the Internet via a Single User Account using your Prestige. Note that if you enable the Single User Account feature, your local IP address MUST be selected from the l[...]

  • Page 49

    Configuring for Internet Access 37 static IP address enter that IP address here. You have to use a static IP address if you are using a pair of Prestiges. 3. Si ngle User Account : Server IP Addr - If you want to make a single server, e.g., a Web server, accessible to outside users, enter that server’s IP address here. Press ENTER at the message:[...]

  • Page 50

    38 Configuring for Intern et Access[...]

  • Page 51

    Remote Node Configuration 39 5 Remote Node Configuration A Remote Node represents both a remote gateway and the internet behind it, across an IDSL connection. A Remote Node is required for connecting to the remote network directly. Note that when you use Menu 4 to configure the Internet, your Prestige will automatically add a Remote Node for you. E[...]

  • Page 52

    40 Remote Node Configuration Figure 5 - 1 Menu 11 - Remote Node Setup Enter the Remote Node number to edit and you will go to the next submenu: 11.1 - Remote Node Profile as shown below: Figure 5 - 2 Menu 11.1 - Remote Node Profil e 1. Rem Node Name - This is a required field. Enter a descriptive name for the Remote Node , e.g., SJHQ. This field ca[...]

  • Page 53

    Remote Node Configuration 41 2. Active - Press the space bar to toggle between Yes and No. When a Remote Node is deactivated, it has no effect on the operation of your Prestige, even though it is still kept in the database and can be activated in the future. Deactivate d nodes are displayed with a - (minus sign) at the beginning of the name in Menu[...]

  • Page 54

    42 Remote Node Configuration • CHAP /PAP - Your Prestige will try CHAP when CHAP is requested by the Remote Node or PAP when PAP is requested by the Remote Node. • CHAP - Use CHAP only. • PAP - Use PAP only. 8. Route - This field determines the protocols that your Prestige will route. The choices for this field are determined by the features [...]

  • Page 55

    Remote Node Configuration 43 and your Prestige. You can choose from 12 different filter sets. In addition, you can link up to 4 filter sets together for further customization (e.g., 1, 5, 9, 12). Note that spaces and , are accepted in this field. For more information on customizing your filter sets, see Chapter 9. The default is blank, i.e., no fil[...]

  • Page 56

    44 Remote Node Configuration 2. Compression - Turns on Stac Compression. The default for this field is Off. Once you have completed Menu 11.2 - Remote Node PPP Op tions, press ENTER at the message: Press ENTER to Confirm ... to confirm your selections, or press ESC to cancel your selections.[...]

  • Page 57

    TCP/IP Configuration 45 6 TCP/IP Configuration This chapter shows you how to configure your Prestige for TCP/IP . Depending on your particular applications, you will need to configure different menus. For instance, Internet access is the most common application of TCP/IP. For this application, you should configure Menu 4. We will illustrate the con[...]

  • Page 58

    46 TCP/IP Configuration to partition your class C network 204.247.203.0 with subnet mask 255.255.255.0 into 16 subnets (4 bits), the new subnet mask becomes 255.255.255.240. Number of Bits Dot Decimal 1 128 2 192 3 224 4 240 5 248 6 252 7 254 8 255 LAN - to - LAN Application A typical LAN - to - LAN application is to use your Prestige to call from [...]

  • Page 59

    TCP/IP Configuration 47 configure Static Routes if some services reside beyond the immediate remote LAN . Remote Node Setup Follow the procedure in Chapter 5 to fill the protocol - independent parameters in Menu 11, Remote Node Profi le. For the protocol - dependent parameters, follow the instructions below. 1. Route - Make sure IP is among the pro[...]

  • Page 60

    48 TCP/IP Configurat ion 2. Rem IP Subnet Mask - Enter the subnet mask for the remote network. 3. My WAN Addr - Some implementations, especially the UNIX derivatives, require hosts on both ends of the ISDN lin k to have separate addresses from the LAN , and that the addresses must have the same network number. If this is the case, enter the IP addr[...]

  • Page 61

    TCP/IP Configuration 49 not be pr ecise, but it must be between 1 and 16. In practice, 2 or 3 is usually a good number. 7. Private - This parameter determines if your Prestige will include the route to this Remote Node in its RIP broadcasts. If set to yes, this route is kept private and not included in RIP broadcast. If no, the route to this Remote[...]

  • Page 62

    50 TCP/IP Configuration or a Remote Node , a static route is implicitly created by your Prestige. An example is given below. In the example, stations on the 204.5.1.0/24 subnet work can access the remote stations using the static route. The route will have a destination of 204.5.1.64/26 with the gateway address being that of the Remote Node (204.5.[...]

  • Page 63

    TCP/IP Configuration 51 Figure 6 - 5 Menu 12 - Static Route Setup - Main Menu Figure 6 - 6 IP Static Route Setup 1. Route Name - Enter a descriptive name for this route. This is for identification purpose only. 2. Active - This fields allows you to activate/deactivate this static route. 3. Destination IP Address - This parameter specifies the IP ne[...]

  • Page 64

    52 TCP/IP Configuration use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID. 4. IP Subnet Mask - Enter the subnet mask for this destination. Follow the discussion on IP subnet mask in this chapter. 5. Gateway IP Address - Enter the IP address of the gateway. The gateway is an imme[...]

  • Page 65

    Novell IPX Configuration 53 7 Novell IPX Configuration This chapter shows you how to configure your Prestige for IPX . Depending on your particular applications, you will need to configure different menus. We will illustrate the configuration for some applications in the following sections. IPX Network Environment Frame Type The stations on an IPX [...]

  • Page 66

    54 Novell IPX Configuration Figure 7 - 1 Prestige Operating in IPX Environment Prestige on LAN with Server When your Prestige is being connected to a LAN with an existing NetWare server station, you will not need to configure it as a seed router, and hence the network number parameter in the Ethernet Setup Menu. Rather, your Prestige will learn the[...]

  • Page 67

    Novell IPX Configuration 55 IPX Ethernet Setup The first step is to set up your Prestige on the LAN . From menu 3, select option 3 to go to Menu 3.3 - Novell IPX Ethernet Setup as seen below: Figure 7 - 2 Menu 3.3 - Novell IPX Ethernet Setup 1. Seed Router - Determine if your Prestige is to act as a seed router. This value depends on the existing n[...]

  • Page 68

    56 Novell IPX Configuration • SNAP 3. IPX Network # - If you selected your Prestige to act as a seed router, you need to prov ide a unique network number to be associated with the network that it has joined. Keep in mind that this number must not be used anywhere else on the network. Once you have completed filling in the Menu 3.3, press ENTER th[...]

  • Page 69

    Novell IPX Configuration 57 Remote Node Setup Follow the procedure in Chapter 5 to fill the protocol - independent parameters in Menu 11, Remote Node Profile. For the protocol - dependent parameters, follow t he ensuing instructions. 1. Route - Make sure IPX is among the protocols in the Route field. 2. Edit IP/IPX /Bridge - Press the space bar to [...]

  • Page 70

    58 Novell IPX Configuration 6. Tick Count - This field indicates the time - ticks required to reach the Remote Node . The default is two (2). 7. W/D Spoofing (min) - This field is used for your Prestige on the server side LAN . Your Prestige can spoof a response to a server’s Watch Dog request after an expected drop of connection. In this field, [...]

  • Page 71

    Novell IP X Configuration 59 Figure 7 - 5 NetWare Servers on Both Sides of the Link This may present a problem if you desire your client station to access a server at a r emote site. For example, in the above diagram, suppose that a client station on the network on the left wishes to access the NetWare server on the right (internal network number =[...]

  • Page 72

    60 Novell IPX Configuration Figure 7 - 6 Menu 12.2 - Edit IPX Static Route 1. Server Name - In this field, enter in the name that has been configured for the server. This name must be the exact name configured in the NetWare server. 2. Network # - This field contains the internal network number of the remote server which you wish to access. Do not [...]

  • Page 73

    Novell IPX Configuration 61 The Hop Count and Tick Count fields have the same meaning as those in the Remote Node Setup. Once you have completed filling in the menu, press ENTER at the message: Press ENTER to Confirm ... to save your selections, or press ESC at any time to cancel your selections.[...]

  • Page 74

    62 Novell IPX Configuration[...]

  • Page 75

    Bridging Configuration 63 8 Bridging Configuration This chapter shows you how to configure the Bridging options for your Prestige. Depending on your particu lar applications, you will need to configure different menus. We will illustrate the configuration for some applications in the following sections. Bridge Ethernet Setup Bridging is used to for[...]

  • Page 76

    64 Bridging Configuration Figure 8 - 7 Remote Node Bridging Configuration 3. Ethernet Addr Timeout (min) - In this field, enter the time (number of minutes) that you wish your Prestige to retain the Ethernet Addr information in its internal tables while the line is down. If this information is retained, then your Prestige will not have to re - nego[...]

  • Page 77

    Bridging Configuration 65 Figure 8 - 8 Menu 12.4 - Bridge Static Route 1. Route Name - For identification purp oses enter a name for the bridge static route. 2. Active - Indicates whether the static route is active or not. 3. Ether Address - Enter the MAC address of the destination device that you wish to bridge your packets to. 4. IP Address - If [...]

  • Page 78

    66 Bridging Configuration[...]

  • Page 79

    Filter Configuration 67 9 Filter Configuration About Filtering Your Prestige uses filters to decide whether or not to allow passage of a data packet and/or to make a call over the ISDN line. There are two types of filters involved: incoming data filters and outgoing da ta filters. Data filters screen the data to determine if the packet should be al[...]

  • Page 80

    68 Filter Configuration Prestige’s Filter Structure You can configur e up to twelve filter sets with six rules in each set. Therefore, your Prestige allows you to customize up to 72 filter rules (12 x 6). When implementing these filter sets, you can link up to four of the filter sets together to screen the data packet. Therefore, with each filter[...]

  • Page 81

    Filter Configuration 69 Figure 9 - 2 Menu 21 - Filter Set Configuration Once you press ENTER, you will be taken to Menu - 21.1 - Filter Rules Summary as seen below. The information displayed in th is menu is read - only. From here, you can examine the parameters of each rule that you have configured for that set. The following is a brief descriptio[...]

  • Page 82

    70 Filter Configuration • m - Refers to Action Matched. F means to forward the packet, D means to drop the packet, and N means check the next rule. • n - Refers to Action Not Matched. F means to forward the packet, D means to drop the packet, and N means check the next rule. Figure 9 - 3 Menu 21.1 - Filter Rules Summary If the filter type is IP[...]

  • Page 83

    Filter Configuration 71 • PT - IPX Packet Type. • SS - Source Socket. • DS - Destination Socket. For more information on configuring th e filter rule parameters, refer to the next section. To configure a specific filter rule, simply select the number of the filter rule (1 - 6) you wish to configure and press ENTER. This will take you to Menu [...]

  • Page 84

    72 Filter Configuration Figure 9 - 4 Menu 21.1.1 - TCP/IP Filter Rule 1. Active - In this field, you can make the filter rule active or inactive. There are two options: • Yes. • No. 2. IP Protocol - Protocol refers to the IP specific number of the protocol. The range for this value should be between 0 and 255. For example, 6 refers to the TCP p[...]

  • Page 85

    Filter Configuration 73 6. Destination: Port # - Enter the destination port of the packets that you wish to filter. The range of this field is 0 to 65535. 7. Destination: Port # Comp - In this field, you can select what comparison quantifier you wish to enable to compare to the value given in Destination: Port #. There are five options for this fie[...]

  • Page 86

    74 Filter Configuration (TCP protocol). In this field you determine what type of TCP packets to filter. There are two options: • Yes - filter matches only established TCP co nnections. • No - filter matches both initial and established TCP connections . 13. More - In this field, you can determine if you want to pass the packet through the next [...]

  • Page 87

    Filter Configuration 75 16. Action Not Matched - If the conditions for the filter rule are not met, you can specify what to do with the packet. There are three options for this field: • Check Next Rule . • Forward. • Drop. Once you have completed filling in Menu 21.1.1 - TCP/IP Filter Rule, press ENTER at the message: Press ENTER to Confirm .[...]

  • Page 88

    76 Filter Configuration 1. Offset - Offset refers to the value of the byte that you want to use as your starting offset. That is, i n the data packet, at what point do you want to begin the comparison. The range for this field is from 0 to 255. Default = 0 2. Length - This field refers to the length (in bytes) of the data in the packet that your Pr[...]

  • Page 89

    Filter Configuration 77 Novell IPX Filter Rule This section will show you how to configure the protocol - dependent param eters for an IPX filter. The fields in the menu are displayed in bold type. Figure 9 - 6 Menu 21.1.3 - IPX Filter Rule 1. IPX Packet Type - Enter the IPX packet type value of the packet you wish to filter. This value should be t[...]

  • Page 90

    78 Filter Configuration 6. Operation - This field is only active if one of the Socket # fields is 0452 or 0453 indicating SAP and RIP packets. There are seven options for this field which determines the operation for the IPX packet. • None. • RIP Request. • RIP Response. • SAP Request. • SAP Response. • SAP Get Nearest Server Request. ?[...]

  • Page 91

    SNMP 79 10 SNMP About SNMP The Simple Network Management Protocol (SNMP ) is a protocol governing network management and the monitoring of network devices and their functions. The Prestige 128L supports the utilization of SNMP to regulate the communication that occurs between the manager station and the agent stations in a network. Basically, your [...]

  • Page 92

    80 SNMP Figure 10 - 1 Menu 22 - SNMP Configuration 1. From the Main Menu, select option 22. SNMP Confi guration. This will bring you to Menu 22 - SNMP Configuration. 2. You will then be prompted to enter the following information. Steps 3 - 7 will describe the specific parameters involved in the configuration. The parameters you will have to fill i[...]

  • Page 93

    SNMP 81 leave the field blank (d efault), then your Prestige will respond to all SNMP messages it receives, regardless of origin. 6. Trap: Community - In this field, enter the community name that is sent with each trap to the SNMP manager. This should be treated like a password and match what the SNMP manager is expecting. The default is public. 7.[...]

  • Page 94

    82 SNMP[...]

  • Page 95

    System Security 83 11 System Security The Prestige 128L incorporates a number of security measures to prevent unauthorized access to your network. For example, your Prestige supports both PAP (Password Authentication Protocol ) and CHAP (Challenge Handshake Authentication Protocol ) in authenticating a Remote Node . In addition, your Prestige also [...]

  • Page 96

    84 System Securit y The following step s describe a simple setup procedure for configuring the SMT password. 1. From the Main Menu, select option 23. System Security. This will bring you to Menu 23 - System Security. 2. From this menu, you can select option 1. Change Password. This will bring you to Menu 23.1 - System Security - Change Password. 3.[...]

  • Page 97

    Telnet Configuration and Capabilities 85 12 Telnet Configuration and Capabilities About Telnet Configuration When you first configure your Prestige, it must be done via a computer connected to the RS - 232 port. However, once your Prestige has been initially configured, you can use telnet to configure the device remotely as s hown below: Figure 12 [...]

  • Page 98

    86 Telnet Configuration and Capabilities management . If your Prestige is configured for IPX routing but not IP in menu 1, telnet will still be available provided you assign your Prestige an IP address. Telnet Capabilities Single Administrator To prevent confusion and discrepancy on the configuration, your Prestige will only allow one terminal conn[...]

  • Page 99

    System Maintenance 87 13 System Maintenance The Prestige 128L provides a full rang e of diagnostic tools to help you monitor and maintain your system. Some of these tools provide updates on system status, ISDN B channel status, log and trace capabilities and upgrades to system software. System Status System Status can be used to monitor your Presti[...]

  • Page 100

    88 System Maintenance Figure 13 - 2 Example of Menu 24.1 - System Maintenance - Status 1. To get to the System Status, select option 24. System Maintenance. This will bring you to Menu 24 - System Maintenance. 2. From this menu, select option 1. System Status. 3. There are two (2) possible commands in Menu 24.1. 3 will reset the counters; and ESC w[...]

  • Page 101

    System Maintenance 89 11. CLU - (C urrent Line Utilization) - percentage of current bandwidth used on this channel. 12. ALU - (Average Line Utilization) - average CLU for this channel. 13. Up Time - time this channel has been connected to the current Remote Node . 14. Ethernet - shows the current status of the LAN connection on your Prestige. 15. S[...]

  • Page 102

    90 System Maintenance Figure 13 - 3 Menu 24.2 - System Maintenance - Change Terminal Baud Rate Log and Trace Log and trace tools allow you to view the error logs and trace records to troubleshoot any er rors that may occur. Your Prestige is also able to generate syslogs to send to other machines. 1. To get to the Log and Trace, select option 24. Sy[...]

  • Page 103

    System Maintenance 91 View Error Log Selecting the first option from Menu 24.3 - System Maintenance - Log and Trace will display the system Error Log. The Error Log does not only provide the error messages but it is also a source of information about your Prestige. You can also clear the Error Log on your Prestige. After each display, you are promp[...]

  • Page 104

    92 System Maintenance 2. Syslog IP Address - Input the IP Address that you wish to send your syslog to. The address is usually written in dotted decimal notation such as a.b.c.d where a, b, c, and d are numbers betwee n 0 and 255. 3. Log Facility - Use the space bar to toggle between the 7 different Local options. This feature is used for UNIX appl[...]

  • Page 105

    System Maintenance 93 3. Items 4 - 7 will describes the four (4) options to test your Prestige and its connections. 4. Internet Setup Test - This test checks to see if y our Internet access configuration has been done correctly. When this option is chosen, your Prestige will PING the Internet IP Address. If everything is working properly, you will [...]

  • Page 106

    94 System Maintenance Restore Configuration Selecting option 6 from Menu 24 - Maintenance will restore backup configuration from disk to your Prestige. You need to upload a backup file to your Prestige. Procedure for uploading varies depending on the type of software used to access the Prestige but you must use the XMODEM protocol to restore the co[...]

  • Page 107

    System Maintenanc e 95 Figure 13 - 6 Example of uploading RAS using PCPLUS Command Interpreter Mode This option allows the user to enter the command interpreter mode. This mode allows you t o diagnose, test, and configure your Prestige using a specified set of commands. A list of valid commands can be found by typing help at the command prompt. For[...]

  • Page 108

    96 System Maintenance[...]

  • Page 109

    Troubleshooting 97 14 Troubleshooting This chapter contains some problems you may run into when using your Prestige. After each problem description, we have provided some instructions to help you diagnose and solve the problem. Problems Starting Up the Prestige None of the LEDs are on when you power up the Prestige • Check the power cord and the [...]

  • Page 110

    98 Troubleshooting Problems With the IDSL Line The IDSL LEDs Not On Check the connection between your two routers. When they are connected, the link and B1/B2 LED should be on if the transfer type is leased 128; and the link and B1 LED are on if the transfer type is leased 64. 1. Check the IDSL line if it is a single line to connect a pair of route[...]

  • Page 111

    Troubleshooting 99 Problems Connecting to a Remote Node or ISP 1. Check menu 24.1 to verify the IDSL status. If it is down then refer to the section on the IDSL line problems. 2. If you check the error log in menu 24.3.1, this will usually give you some logs regarding where goes wrong. If there is nothing in the log, it may be an IP address c onfig[...]

  • Page 112

    100 Troubleshooting[...]

  • Page 113

    Index 101 15 Index 10Base2, 10, 17 10Base5. See AUI 10Base - T, 9, 10, 16, 17, 24 Accounting, 91 AUI, 10, 17, 25, 98 BNC. See 10Base2 Bridging, 1, 2, 9, 29, 42, 63, 64 Canadian User Information, iv Challenge Handshake Authentication Protocol. See CHAP CHAP, 2, 23, 41, 42, 83 Contacting ZyXEL, vi DHCP, 26, 33 DHCP server, 27 Dynamic Host Configurati[...]

  • Page 114

    102 Index RIP, 28, 49, 54, 58, 77, 78 Routing Information Protocol. See RIP RS - 232, iv, 2, 16, 17, 85, 86, 90, 94, 97 SAP, 58, 59, 77, 78 Simple Network Management Protocol. See SNMP Single User Account, 3, 34, 35, 36, 37 SMT, 19, 20, 21, 22, 31, 34, 83, 84, 97 SNMP, 2, 9, 22, 23, 79, 80, 81 Spoofing, 58 Stac, 3 SUA. See Single User Account Syste[...]