FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF USER GUIDE
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF USER MANUAL
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF OWNER GUIDE
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF OWNER MANUAL
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF REFERENCE GUIDE
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF INSTRUCTION GUIDE
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF REFERENCE MANUAL
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF INSTRUCTION MANUAL
FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF OPERATING INSTRUCTIONS
CLICK HERE TO DOWNLOAD ZYXEL USG FLEX 50 USG20-VPN (01) PDF MANUAL
If this is not the document you want for this product, click here to see if we have any other documents for this product.
What are the default login details for the ZyWALL USG FLEX 50(AX) Series?
| Setting | Value |
|---|---|
| Login IP Address | https://(IP assigned by NCC) or https://myrouter.local or https://192.168.1.1 |
| User Name | admin |
| Password | 1234 |
Where can I find related documentation for the Zyxel Device?
• Quick Start Guide: Shows how to connect the Zyxel Device and access the Web Configurator wizards. It also contains a connection diagram and package contents list.
• CLI Reference Guide: Explains how to use the Command-Line Interface (CLI) to configure the Zyxel Device. (Note: It is recommended you use the Web Configurator).
• Web Configurator Online Help: Click the help icon in any screen for help on configuring that screen and supplementary information.
• More Information: Go to support.zyxel.com to find other information on Zyxel Device.
What are the document conventions used in the User’s Guide?
Warnings and Notes:
Warnings tell you about things that could harm you or your device.
Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
Syntax Conventions:
• All models in this series may be referred to as the “Zyxel Device” in this guide.
• Product labels, screen names, field labels and field choices are all in bold font.
• A right angle bracket (>) within a screen name denotes a mouse click. For example, Configuration > Network > Interface > Ethernet means you first click Configuration in the navigation panel, then Network, then the Interface sub menu and finally the Ethernet tab to get to that screen.
Icons Used in Figures:
Figures may use generic icons. The Zyxel Device icon is not an exact representation of your device. Common icons represent: Zyxel Device, Generic Router, Wireless Router / Access Point, Switch, Firewall, Server, Internet, Network Cloud, Smartphone, USB Dongle.
What are the feature differences between the USG FLEX 50 Series models?
| FEATURE/MODEL | USG FLEX 50 (USG20-VPN) | USG20W-VPN | USG FLEX 50AX |
|---|---|---|---|
| Microsoft Azure | YES | YES | YES |
| Amazon VPC | CLI only | CLI only | CLI only |
| Anomaly Detection & Prevention | YES | YES | YES |
| Anti-Spam | YES | YES | YES |
| IPS (IDP) | NO | NO | NO |
| Anti-Malware | NO | NO | NO |
| App Patrol | NO | NO | NO |
| Web Security (Content Filtering) | YES | YES | YES |
| SecuReporter | YES | YES | YES |
| Reputation Filter (IP & DNS) | NO | NO | NO |
| URL Threat Filter | NO | NO | NO |
| Sandboxing | NO | NO | NO |
| IP Exception | NO | NO | NO |
| AP Controller | NO | NO | NO |
| Device HA Pro | NO | NO | NO |
| Easy Mode | YES | YES | NO |
| Hotspot Management | NO | NO | NO |
| Concurrent Device Upgrade | NO | NO | NO |
| LAG | NO | NO | NO |
| Port Group | NO | NO | NO |
| Port Role | YES | YES | YES |
| SD-WAN Mode | NO | NO | NO |
| SSL Application | YES | YES | YES |
| SSL encrypted traffic inspection | YES | YES | YES |
| Bundled UTM Feature License Validity | 1 year | 1 year | 1 year |
| WiFi functionality (built-in) | NO | YES | YES |
| Virtual Server Load Balancing | NO | NO | NO |
| Built-in AP | NO | YES | YES |
| Management by Nebula Control Center (NCC) | YES | YES | YES |
Which security features work without a security license?
• Configuration > Content Filter > Trusted Web Sites
• Configuration > Anti-Spam/Email Security > Block/Allow List
What is On Premises Mode?
What is Monitor Mode?
What is Nebula Mode?
How do I set up Nebula Mode management via the NCC Portal?
1. Log into NCC (https://nebula.zyxel.com) with your Zyxel account. If you don’t have one, you’ll be prompted to create one.
2. After logging in, click Go under Nebula Control Center, then Let’s Start to run the NCC setup wizard. Create or select an existing organization and site.
3. Add the Zyxel Device to the site by entering its MAC address and serial number (found on the device label) or by scanning the QR code with the Nebula Mobile app.
4. Configure the WAN interface the Zyxel Device will use to connect to NCC via the Internet.
5. If possible, select Native Mode. If not available, configure the email address of the person who will manage the device via NCC. An activation email will be sent to this person.
How do I prepare my Zyxel Device for Nebula Mode management?
1. Connect the WAN port (P1 or P2) of the Zyxel Device to an Ethernet port providing Internet access.
2. Connect a LAN port (P3 or P4) of the Zyxel Device to your computer. Ensure your computer obtains an IP address automatically (default setting).
3. Connect the power and turn on the Zyxel Device. Wait for the SYS LED to turn solid green.
4. (Optional but recommended) Back up your current configuration via Maintenance > File Manager > Configuration File > startup-config.conf > Download.
5. If you could not select Native Mode in the NCC Portal setup: Reset the Zyxel Device to factory defaults by pressing the Reset button until port LEDs turn off (approx. 5 seconds). This erases all previous configurations. Skip this if the device was never configured before. A reset is necessary if it doesn’t have the factory default configuration.
What should I do if I receive a Nebula Activation Email?
1. Check your mailbox (including spam folder) for an email from NCC.
2. Follow the instructions in the email. Click the activation link or copy it to your web browser. You will see a screen indicating NCC registration is in progress.
3. Wait for the confirmation screen stating NCC registration has succeeded. Management is now passed to Nebula Control Center.
Note: ZTP (Zero Touch Provisioning) via email activation is supported in firmware version 5.37 or earlier.How do I change from Nebula Mode to On Premises Mode?
1. Log into NCC (https://nebula.zyxel.com) with your Zyxel account.
2. Go to Organization-wide > License & Inventory > Devices.
3. Select the Zyxel Device you want to remove from NCC (identify by MAC address and serial number).
4. Click Remove from organization.
5. If the Zyxel Device is connected to NCC, it will automatically reset after removal. If not connected, press the reset button manually to reboot to factory defaults. All NCC configurations will be erased.
6. Log into the Zyxel Device’s web configurator. Run the Initial Setup Wizard and choose On Premises Mode.
7. (Optional) To restore a previous configuration backup: Go to Maintenance > File Manager > Configuration File. Under Upload Configuration File, browse to your saved startup-config.conf file and click Upload.
How do I change from On Premises Mode to Nebula Mode?
1. (Optional but recommended) Back up your current configuration in Maintenance > File Manager > Configuration File.
2. Reset the Zyxel Device to factory defaults by pushing the Reset button until the port connection LEDs turn off (about 5 seconds). The device will reboot.
3. Log into the Zyxel Device’s web configurator. Run the Initial Setup Wizard and choose Nebula Mode.
4. If prompted to choose between Native Mode or ZTP, select Native Mode.
5. Follow the steps in the Nebula Mode setup wizard (adding the device to NCC, etc.).
Why and how should I register my Zyxel Device?
Registration is done at portal.myZyxel.com, Zyxel’s online services center. You need to register your device to manage subscription services (viewable in Configuration > Licensing > Registration > Service).
• Devices with firmware 4.25 or later require registration and service activation via myZyxel.com (can be done through the device interface).
• Devices upgrading to 4.25 or later can potentially skip registration/activation, but it’s highly recommended to register. Registration provides benefits like the Firmware Upgrade license (for Cloud Helper notifications), which is often free upon registration.
You’ll need a Zyxel account (create one at portal.myZyxel.com) and may need the device’s serial number and LAN MAC address (found on the label).
What are some common application scenarios for the Zyxel Device?
• Security Router: Provides security features including a Stateful Packet Inspection (SPI) firewall.
• IPv6 Routing: Supports IPv6 Ethernet, PPP, VLAN, and bridge routing. Can create IPv6 policy routes/objects and route IPv6 packets through IPv4 networks using tunneling.
• VPN Connectivity: Set up secure VPN tunnels (site-to-site, remote access for telecommuters/travelers) to access your network. Can use an external Authentication Server (AS).
• SSL VPN Network Access: Allows remote users easy VPN access via web browsers. Full tunnel mode provides a private IP address on the local subnet for seamless resource access.
• User-Authentication Access Control: Restrict access to resources based on user identity. Different users can have different access levels (e.g., Internet only, Internet + file server).
• Load Balancing: Set up multiple Internet connections (on the same or different ports, including cellular) and balance traffic loads between them.
How can I manage the Zyxel Device?
• Web Configurator: An HTML-based interface for easy setup and management via an Internet browser (HTML5 compatible like Edge, IE11, Firefox, Chrome recommended).
• Command-Line Interface (CLI): Use text-based commands for configuration. Access via remote management (SSH, Telnet) or the physical/Web Console port.
• FTP: Use File Transfer Protocol for firmware upgrades and configuration backup/restore.
• SNMP: Monitor and/or manage the device using an SNMP manager.
• CloudCNM: Enable and configure management via a Central Network Management system (details in Configuration > Mgmt. & Analytics > Nebula).
• Nebula Control Center (NCC): Manage the device remotely via the cloud portal (requires Nebula Mode).
What are the default Console Port settings?
| SETTING | VALUE |
|---|---|
| Speed | 115200 bps |
| Data Bits | 8 |
| Parity | None |
| Stop Bit | 1 |
| Flow Control | Off |
What methods are available for management authentication?
• Local Zyxel Device authentication
• An external RADIUS server
• An external LDAP server
• Certificates
What are the requirements for using the Web Configurator?
• A compatible browser (HTML5 support, e.g., Microsoft Edge, Internet Explorer 11, Mozilla Firefox, Google Chrome).
• Web browser pop-up windows allowed from your device.
• JavaScript enabled (default).
• Java permissions enabled (default).
• Recommended minimum screen resolution: 1024 x 768 pixels.
How do I access the Web Configurator?
1. Ensure hardware is properly connected (see Quick Start Guide).
2. Open your browser and go to https://192.168.1.1 or https://myrouter.local. The device defaults to HTTPS.
3. The Login screen appears.
How do I log in for the first time and handle password requirements?
1. On the Login screen, enter the default User Name (“admin”) and Password (“1234”).
2. Optionally, select a different display language from the drop-down list.
3. Click Login.
4. You will be immediately prompted by the Update Admin Info screen to change the default password. Enter a new password (1 to 64 characters) and confirm it.
5. Note the Password Complexity option (Configuration > Object > User/Group > Setting): If enabled, the password must be 8-64 characters and include at least one number, one lowercase letter, one uppercase letter, and one special character (e.g., !@#$%^&*()_+). You can also enforce periodic password changes here.
6. Click Apply after entering the new password.
7. A Terms of Use screen appears. Read it and click Acknowledge. (Note: May download automatically in Internet Explorer).
What are the Password Change Notification and Network Risk Warning screens?
• Password Change Notification: This screen appears after the Terms of Use (step 7 above). It lists privileged accounts and their last password change/expiry dates. It reminds you to change passwords regularly for better security. You can select how often to see this reminder (e.g., “every time”) and click OK.
• Network Risk Warning: This screen appears next. It highlights any unregistered or disabled security services. If the device isn’t registered, it prompts you to do so. Select how often to display this screen and click OK.
How can I bring back the Network Risk Warning screen if I selected ‘Never’?
Router> enable Router# configure terminal Router(config)# service-register_setremind every-time Router(config)#Replace `every-time` with other options like `after-10-days`, `after-30-days`, `after-180-days`, or `never` as needed. Note the space before the underscore in the command.
What settings can I configure in the ‘Security Check for Web Interface’ screen?
• Secure SSL access from the Internet to the Zyxel Device.
• Secure SSL access from the Internet to the network behind the Zyxel Device.
• The default port for IPSec VPN clients to retrieve VPN rules.
• The default port for two-factor authentication for VPN clients.
How can I secure remote management access (HTTPS) to the Zyxel Device from the Internet?
• The default HTTPS port is 443. If you change this port (e.g., to 8800), remote connections must use the new port (e.g., https://[Device_IP]:8800).
• Use the ‘Security Check for Web Interface’ screen or relevant configuration sections to specify the trusted source IP addresses or FQDNs allowed for remote management.
• Configure a new port between 1024 and 65535 that is not used by other services.
How can I secure SSL VPN access from the Internet to the network behind the Zyxel Device?
• The default SSL VPN port is 443. If you change this port on the Zyxel Device, you must make the same change in the SecuExtender SSL VPN client software.
• Configure a new port between 1024 and 65535 that is not used by other services.
• You can restrict SSL VPN access to up to 3 specific locations (IP addresses, FQDNs, or geographic regions) from the Internet using the ‘Security Check for Web Interface’ screen or relevant configuration sections.
The following table shows example country abbreviations:| ABBREVIATION | COUNTRY |
|---|---|
| JP | Japan |
| KR | Korea |
| FR | France |
How do I change the port used for IPSec VPN Provisioning?
You can change the default port (443) that IPSec VPN clients use to retrieve VPN rule settings from the Zyxel Device. Since 443 is often used for remote management and SSL VPN, changing this can avoid conflicts.
• Configure a new port between 1024 and 65535 that is not in use by other services.
• If you change the port on the Zyxel Device, you must configure the Zyxel IPSec VPN client to use the same new port.
Note: If default ports (443) are unchanged for remote management, SSL VPN, and IPSec VPN provisioning, only 3 simultaneous connections across these services might be allowed.How do I change the port used for Two-Factor VPN Access Authentication?
You can change the default port used by VPN clients for two-factor authentication when accessing the network behind the Zyxel Device.
• VPN clients do not need to manually change the port number on their end; the authentication link provided (via email/SMS) will automatically include the new port number (e.g., https://[Device_Link]:8008 if changed to 8008).
• Configure a new port between 1024 and 65535 that is not in use by other services.
• This port can also be changed in Object > Auth. Method > Two-factor Authentication > VPN Access.
What is an example configuration for remote access ports to avoid conflict?
| SERVICE | EXAMPLE PORT |
|---|---|
| REMOTE MANAGEMENT | 8800 |
| SSL VPN | 8080 |
| IPSEC VPN PROVISIONING | 443 (default) |
| TWO-FACTOR VPN ACCESS AUTHENTICATION | 8008 |
What other security measures should I take?
• Regularly check for and update firmware via Maintenance > Firmware Management.
• Change admin passwords regularly.
• Enable Password Complexity (Object > User/Group > Setting) to enforce strong passwords (at least 8 characters, including upper case, lower case, number, and special character).
What do the fields in the ‘Security Check for Web Interface’ screen mean?
| LABEL | DESCRIPTION |
|---|---|
| Allow secure remote management from WAN | Select this to allow remote access to the Zyxel Device web configurator only from specified IP addresses or FQDNs. |
| Port (under Remote Management) | Configure a new port (1024-65535, not already in use) for remote HTTPS access. Example: Use https://1.1.1.1:8800 if changed to 8800. |
| Trusted Host 1-3 (under Remote Management) | Configure the specific IP addresses or FQDNs allowed for remote management access. |
| Allow SSL VPN access from WAN | Select this to allow SSL VPN client access to the Zyxel Device only from specified regions or hosts. |
| Port (under SSL VPN) | Configure a new port (1024-65535, not already in use) for SSL VPN access. This port must match the one configured in the SecuExtender client. |
| Trusted Geolocation 1-3 (under SSL VPN) | Select the geographic regions (countries) allowed for SSL VPN access from the drop-down list. |
| Change Two-Factor Authentication Port | Select this to change the port used for two-factor authentication for VPN clients accessing the LAN. |
| Port (under Two-Factor Authentication) | Configure a new port (1024-65535, not already in use). |
| Change Zyxel IPSec VPN Client Provisioning Port | Select this to change the port IPSec VPN clients use to retrieve VPN rule settings. |
| Port (under IPSec VPN Provisioning) | Configure a new port (1024-65535, not already in use). Must match the port used in the Zyxel IPSec VPN client. |
| Please remind me | Select how often to display this Security Check screen from the drop-down list box (e.g., every time, never). |
| OK | Click OK to save your changes. |
| Cancel | Click Cancel to exit without saving changes. |
What security measures are available for remote access to the Zyxel Device networks?
• Two-Factor Authentication: Adds a second layer of security for VPN access. After username/password (first layer), users must authenticate via an authorized SMS or email address (second layer).
• Device Insight: Identify and view basic info/status of clients connected to the Zyxel Device networks (Monitor > Network Status > Device Insight). Create profiles (Configuration > Object > Device Insight) to block specific clients from accessing the Internet or the Zyxel Device.
• IPSec VPN: Create highly secure VPN connections using IKEv2 or EAP authentication for remote workers to access company resources.
• Upload Bandwidth Limit: (Requires Zyxel SecuExtender subscription and specific client versions) Set maximum upload bandwidth limits for traffic from IPSec VPN clients over their tunnels.
What are the main parts of the Web Configurator screen?
• A – Title bar
• B – Navigation panel
• C – Main window
What do the icons in the Web Configurator Title Bar do?
| ICON/LABEL | DESCRIPTION |
|---|---|
| SecuReporter | Indicates SecuReporter is enabled and the device is added to an organization. Click to open the SecuReporter portal. |
| Web Console | Click to open one or multiple console windows for running CLI commands (requires login). Uses HTTPS for secure connection. |
| CLI | Click to open a popup showing the CLI commands sent by the Web Configurator for recent actions. |
| Reference | Click to check which configuration items reference a specific object. |
| Site Map | Click to see an overview map of links to all Web Configurator screens. |
| Community | Go to https://community.zyxel.com for product discussions. |
| Help | Click to open the online help page for the currently displayed screen. |
| Notification | (Admin/Limited Admin only) Displays new firmware info or expiring security services. Click items for details, click Refresh icon to update. Shows up to 5; click “All Notifications” for more. Slide switch to Off to disable. |
| About | Click to display basic device information (firmware version, etc.). |
| Easy Mode | Click to go to the Initial Setup Wizard in Easy Mode. Enters Easy Mode on subsequent logins. |
| Logout | Click to log out of the Web Configurator. |
What information is shown in the ‘About’ screen?
| LABEL | DESCRIPTION |
|---|---|
| Current Version | The firmware version of the Zyxel Device. |
| Released Date | The date (yyyy-mm-dd) and time (hh:mm:ss) when the firmware was released. |
| System Protection Signature | The version of the system protection signatures. These signatures (updated daily via Cloud Helper Server, no license needed) protect against web attacks like command injection, cross-site scripting, and path traversal. |
| OK | Click this to close the screen. |
What is the Site Map used for?
What is the Web Console used for?
What is the Reference screen used for?
What do the fields in the Reference screen mean?
| LABEL | DESCRIPTION |
|---|---|
| Type | Select the type of object (e.g., User, Address, Service) you want to check references for. |
| Name (Object) | Select the specific object name for which you want to see configuration references. Clicking the name navigates to that object’s configuration screen. |
| # | Sequential row number. |
| Service | The type of configuration setting (e.g., Security Policy, VPN Gateway) that references the selected object. Clicking the name navigates to that service’s configuration screen. |
| Priority | If applicable (like in ordered lists), shows the position of the referencing item. Otherwise, N/A. |
| Name (Referencing Item) | The specific name of the configuration item (e.g., a specific firewall rule name) that references the object. |
| Description | The description of the referencing configuration item, if configured. |
| Refresh | Click to update the list of references for the selected object. |
| Cancel | Click to close the References screen. |
What is the CLI Messages window?
What are the Navigation Panel and Dashboard?
Navigation Panel: Located on the left side of the Web Configurator, this panel contains menu items (like Monitor, Configuration, Maintenance) that expand to show links to various status and configuration screens. You can click the arrow on its right edge to hide/show the panel or drag to resize it.
Dashboard: The main screen displayed after login (if not intercepted by wizards or warnings). It shows widgets with general device information, system status, resource usage, licensed service status, and interface status. You can rearrange these widgets to suit your needs.
What information is available in the Monitor menu?
| FOLDER OR LINK | TAB | FUNCTION |
|---|---|---|
| Traffic Statistics | ||
| Port Statistics | Port Statistics | Displays packet statistics for each physical port. |
| Interface Status | Interface Summary | Displays general interface information and packet statistics. |
| Traffic Statistics | Traffic Statistics | Collect and display traffic statistics. |
| Session Monitor | Session Monitor | Displays the status of all current sessions. |
| Network Status | ||
| DHCP Table | DHCP Table | Displays a list of interfaces and their DHCP-assigned IP addresses. |
| Device Insight | Device Insight | Displays a list of WiFi and wireless clients connected to the Zyxel Device networks. |
| Login Users | Login Users | Lists the users currently logged into the Zyxel Device. |
| IGMP Statistics | IGMP Statistics | Collect and display IGMP statistics. |
| DDNS Status | DDNS Status | Displays the status of the Zyxel Device’s DDNS domain names. |
| IP/MAC Binding | IP/MAC Binding | Lists devices that received an IP address from interfaces using IP/MAC binding. |
| Cellular Status | Cellular Status | Displays details about the mobile broadband connection status. |
| UPnP Port Status | Port Statistics | Displays details about UPnP connections going through the Zyxel Device. |
| USB Storage | Storage Information | Displays details about USB device connected to the Zyxel Device. |
| Ethernet Neighbor | Ethernet Neighbor | View/manage neighboring devices via Smart Connect (LLDP) or Zyxel One Network (ZDP). |
| FQDN Object | FQDN Object | Displays FQDN object cache lists used in DNS queries. |
| Wireless | ||
| AP Information | Radio List | Lists wireless details of APs managed by the Zyxel Device. |
| SSID Info | SSID Info | Display information about the AP’s wireless clients. |
| Station Info | Station List | Lists wireless clients associated with APs managed by the Zyxel Device. |
| Top N Stations | Lists wireless stations with the most wireless traffic usage. | |
| Single Station | Lists wireless traffic usage for an associated wireless station. | |
| VPN Monitor | ||
| IPSec | IPSec | Displays and manages the active IPSec SAs. |
| SSL | SSL | Lists users currently logged into the VPN SSL client portal; allows logout/deletion. |
| L2TP over IPSec | L2TP over IPSec | Displays details about current L2TP sessions. |
| Security Statistics | ||
| Content Filter | Web Content Filter | Collect and display web content filter statistics. |
| DNS Content Filter | Collect and display DNS content filter statistics. | |
| Anti-Spam | Summary | Collect and display spam statistics. |
| Status | Displays mail session check count and DNSBL statistics. | |
| Log | ||
| Log | View Log | Lists log entries. |
What can I configure in the Configuration menu?
| FOLDER OR LINK | TAB | FUNCTION |
|---|---|---|
| Quick Setup | Quickly configure WAN interfaces or VPN connections. | |
| Licensing | ||
| Registration | Registration | Register the device and activate trial services. |
| Service | View licensed service status and upgrade licenses. | |
| Wireless | ||
| Built-in AP | General | Allow WiFi clients wireless access via the built-in AP. |
| Network | ||
| Interface | Port / Port Role/Port Group/ Port Configuration | Set flexible port roles (LAN, OPT, WLAN, DMZ). Manage Ethernet, virtual Ethernet, PPPoE, PPTP, Cellular, Tunneling (IPv4/IPv6), VLAN, Bridge, VTI, and Trunk interfaces. |
| Routing | Policy Route / Static Route / RIP / OSPF / BGP | Create/manage routing policies, static routes, and dynamic routing protocols (RIP, OSPF, BGP over IPSec). |
| DDNS | DDNS | Define and manage the device’s DDNS domain names. |
| NAT | NAT | Set up and manage port forwarding (NAT) rules. |
| Redirect Service | Redirect Service | Set up HTTP and SMTP redirection rules. |
| ALG | ALG | Configure SIP, H.323, and FTP Application Layer Gateway pass-through settings. |
| UPnP | UPnP | Configure interfaces for UPnP and NAT-PMP connections. |
| IP/MAC Binding | Summary / Exempt List | Configure IP-to-MAC address bindings and exemption lists. |
| Layer 2 Isolation | General / Allow List | Enable Layer-2 isolation and configure allow lists. |
| DNS Inbound LB | DNS Load Balancing | Configure DNS Load Balancing for inbound traffic. |
| VPN | ||
| IPSec VPN | VPN Connection / VPN Gateway / Concentrator / Configuration Provisioning | Configure IPSec tunnels, IKE gateways, VPN concentrator, and client provisioning. |
| SSL VPN | Access Privilege / Global Setting | Configure SSL VPN access rights and global settings. |
| L2TP VPN | L2TP VPN | Configure L2TP over IPSec tunnels. |
| BWM (Bandwidth Management) | ||
| BWM | BWM | Enable and configure bandwidth management rules. |
| Web Authentication | ||
| Web Authentication | General/Authentication Type/Custom Web Portal File/Custom User Agreement File | Define web authentication portals and exempt services. |
| SSO | Configure the device for Single Sign On integration. | |
| Security Policy | ||
| Policy Control | Policy | Create and manage firewall rules (Level-3 traffic rules) and apply Security Service profiles. |
| ADP | General / Profile / Allow List | Manage Anomaly Detection and Prevention (ADP) bindings, profiles, and allow lists. |
| Session Control | Session Control | Limit the number of concurrent NAT/security policy sessions. |
| Security Service | ||
| Content Filter | Web Content Filter / DNS Content Filter (General, Trusted/Forbidden/Allow/Block Lists) | Manage web and DNS content filtering profiles, rules, and custom lists. |
| Anti-Spam | Profile / Mail Scan / Block/Allow List / DNSBL | Manage anti-spam profiles, scanning details, block/allow lists, and DNS Block Lists. |
| Object | ||
| Device Insight | Device Insight | Configure profiles to block clients identified by Device Insight. |
| Zone | Zone | Configure zone templates. |
| User/Group | User / Group / Setting / MAC Address | Create/manage users, groups, default settings, authentication rules, and MAC authentication lists. |
| Address/Geo IP | Address / Address Group / Geo IP | Create/manage address objects (host, range, subnet), address groups, and Geo IP definitions/updates. |
| Service | Service / Service Group | Create/manage TCP/UDP service objects and service groups. |
| Schedule | Schedule / Schedule Group | Create/manage one-time/recurring schedule objects and schedule groups. |
| AAA Server | Active Directory / LDAP / RADIUS | Configure AAA server settings for AD, LDAP, and RADIUS. |
| Auth. Method | Authentication Method / Two-factor Authentication | Create/manage authentication methods/sequences and configure two-factor authentication (SMS/email). |
| Certificate | My Certificates / Trusted Certificates | Create/manage the device’s own certificates and import/manage trusted CA certificates. |
| ISP Account | ISP Account | Create/manage ISP account information for PPPoE/PPTP interfaces. |
| Mgmt. & Analytics | ||
| SecuManager | Enable/configure management by a Central Network Management system (SecuManager/CloudCNM). | |
| SecuReporter | Enable SecuReporter logging and access the analytics portal. | |
| Nebula | Configure Nebula cloud management (Nebula Mode / Monitor Mode). | |
| System | ||
| Host Name | Host Name | Configure the system hostname and domain name. |
| USB Storage | Settings | Configure settings for connected USB devices. |
| Date/Time | Date/Time | Configure date, time, time zone, and NTP settings. |
| Console Speed | Console Speed | Set the console port speed. |
| DNS | DNS | Configure DNS server settings and local DNS records. |
| WWW | Service Control / Login Page | Configure web server (HTTP/HTTPS) settings, access control, and login page customization. |
| SSH | SSH | Configure SSH server and service settings. |
| TELNET | TELNET | Configure Telnet server settings. |
| FTP | FTP | Configure FTP server settings. |
| SNMP | SNMP | Configure SNMP communities and services. |
| Auth. Server | Auth. Server | Configure the device to act as a RADIUS server. |
| Notification | Mail Server / SMS / Response Message | Configure email server, SMS service for notifications, and custom response messages for security actions. |
| Language | Language | Select the Web Configurator display language. |
| IPv6 | IPv6 | Enable/configure IPv6 settings globally. |
| ZON | ZON | View/manage neighbors via Zyxel One Network (ZDP) utility. |
| Advanced | Fast Forwarding | Enable fast forwarding to maximize network performance. |
What functions are available in the Maintenance menu?
| FOLDER OR LINK | TAB | FUNCTION |
|---|---|---|
| File Manager | Configuration File | Manage and upload configuration files. |
| Firmware Management | View current firmware, upload new firmware, reboot with selected firmware. | |
| Shell Script | Manage and run shell script files. | |
| Diagnostics | Diagnostics (Controller / Filer) | Collect diagnostic information. |
| Packet Capture (Capture / Files) | Capture network packets for analysis and manage capture files. | |
| CPU/Memory Status | View CPU and memory usage statistics. | |
| System Log | Archive system logs to a connected USB device. | |
| Network Tool | Identify connection problems using Ping or Traceroute. | |
| Routing Traces | Configure traceroute to identify packet drop locations. | |
| Wireless Frame Capture | Capture wireless frames from APs for analysis. | |
| Packet Flow Explore | Routing Status | Check how the device determines packet routes. |
| SNAT Status | View how the device performs Source NAT and related settings. | |
| Shutdown/ Reboot | Shutdown/ Reboot | Turn off (shutdown) or restart (reboot) the Zyxel Device. |
How can I work with tables and lists in the Web Configurator?
Sorting: Click a column heading to sort the table entries based on that column’s criteria. Click again to reverse the sort order.
Filtering/Grouping/Columns: Click the down arrow next to a column heading for more options:
• Sort Ascending/Descending.
• Columns: Select which columns to display or hide.
• Group By This Field: Group entries that have the same value in this column.
• Show in Groups: Toggle the display of grouped entries.
• Filters: Apply filters based on mathematical operators (<, >, =) or text search for that column.
Resizing Columns: Click and drag the right border of a column heading cell to resize the column width.
Moving Columns: Click and drag a column heading cell to a different position. A green check mark indicates a valid drop location.
Navigating Pages: Use the icons (|< < > >|) and page number fields at the bottom of the table to navigate through multiple pages of entries. Use the “Show [number] items” dropdown to change how many entries display per page.
Selecting Multiple Entries: You can often use [Shift]+click or [Ctrl]+click to select multiple entries for actions like removing, activating, or deactivating.
What do the common icons in tables mean?
| ICON/LABEL | DESCRIPTION |
|---|---|
| + Add | Click to create a new entry. In ordered lists (like security policies), selecting an entry first and then clicking Add creates the new entry after the selected one. |
| Edit | Double-click an entry or select it and click Edit to modify its settings. Some tables allow direct inline editing (indicated by red triangles for unsaved changes). |
| Remove | Select an entry and click Remove to delete it (confirmation is usually required). |
| Activate | Select an entry and click Activate to turn it on or enable it. |
| Inactivate | Select an entry and click Inactivate to turn it off or disable it. |
| Connect | Select an entry and click Connect to establish a connection (e.g., VPN tunnel). |
| Disconnect | Select an entry and click Disconnect to terminate a connection. |
| References | Select an entry and click References to check which other settings use this entry/object. |
| Move | (For numbered/ordered lists) Select an entry, click Move, then type the desired new position number and press [ENTER]. |
How do I use Available/Selected lists?
• Double-click an item in either list to move it to the other list.
• Select one or more items (using [Shift] or [Ctrl] keys for multiple selections) in one list.
• Click the arrow button pointing towards the other list to move the selected item(s).
What is the Initial Setup Wizard?
What settings are configured in the On Premises Initial Setup Wizard?
1. Welcome Screen (Overview)
2. Connect to Internet (WAN): Configure primary (and optionally secondary) WAN interface settings (Encapsulation, IP assignment, etc.).
3. Date and Time Settings: Synchronize time.
4. Register Device: Register the device with myZyxel.com.
5. Activate Service: Activate licensed security services.
6. Service Settings: Enable/configure specific services like Content Filter, Anti-Spam, SecuReporter.
7. Wireless Settings (if applicable): Configure built-in AP settings (SSID, security).
8. Remote Management: Configure secure remote access settings.
How do I configure the WAN interface in the Initial Setup Wizard?
• I have two ISPs: (First WAN interface screen only) Select to configure two connections; leave unchecked for one.
• VLAN Tagged: Select to enable 802.1Q tagging. Enter the VLAN ID (1-4080).
• Encapsulation: Choose Ethernet (standard), PPPoE, PPTP, or L2TP based on ISP info.
• MTU: Maximum Transmission Unit (bytes, 576-1500, usually 1500).
• WAN Interface: Shows the interface being configured (e.g., wan1, wan2).
• Zone: Security zone for this interface (usually WAN).
• IP Address Assignment: Select Auto (for DHCP) or Static (if ISP provided a fixed IP).
• DHCP Option 60: (If Auto IP is selected) Enter a Vendor Class Identifier string (up to 63 chars: a-zA-Z0-9!\”#$%&\'()*+,-./:;<=>?@\[\\\]^_`{}) if required by the ISP’s DHCP server.
If Static IP Address Assignment selected:
• IP Address: Enter the static IP address from your ISP.
• IP Subnet Mask: Enter the subnet mask from your ISP.
• Gateway IP Address: Enter the default gateway IP address from your ISP.
• First / Second DNS Server: Enter primary and secondary DNS server IP addresses. Leave as 0.0.0.0 if not configuring DNS here.
Specific Encapsulation Settings:
• PPPoE: Service Name (optional, alphanumeric+- _@$./, up to 64 chars), Authentication Type (Chap/PAP, Chap, PAP, MSCHAP, MSCHAP-V2), User Name (alphanumeric+- _@$./, up to 31 chars), Password (up to 64 ASCII, no []?), Nailed-Up (keep connection active) or Idle Timeout (seconds).
• PPTP: Authentication Type (as PPPoE), User Name, Password, Nailed-Up/Idle Timeout. Requires: Base Interface (Ethernet port), Base IP Address (static), IP Subnet Mask, Gateway IP Address, Server IP (PPTP server), Connection ID (optional, “c:id” or “n:name” format, alphanumeric+-_:, up to 31 chars).
• L2TP: Authentication Type (as PPPoE), User Name, Password, Nailed-Up/Idle Timeout. Requires: Base Interface, Base IP Address, IP Subnet Mask, Gateway IP Address, Server IP (L2TP server).
How do I troubleshoot WAN connection errors during setup?
• Ensure the cable is connected to the correct WAN port on the Zyxel Device and to the modem/Internet source.
• Verify the modem/Internet source device is powered on and connected. The WAN port LED on the Zyxel Device should be lit (typically orange or green).
Specific errors:
• Ethernet (DHCP): If no IP obtained, confirm ISP uses DHCP. Check settings with ISP.
• Ethernet (Static): If IP address fails, double-check the IP, subnet mask, and gateway address provided by ISP. Re-enter exactly. Check with ISP if errors persist.
• PPPoE: Check Service Name (if used) and Authentication Type are correct. Re-enter username/password exactly. Confirm WAN settings and credentials with ISP.
• PPTP: Check Service IP, Base IP, Subnet Mask, Gateway IP, Connection ID (if used), and Authentication Type. Re-enter username/password exactly. Confirm WAN settings and credentials with ISP.
• L2TP: Check Server IP, Subnet Mask, Gateway IP, Base IP, and Authentication Type. Re-enter username/password exactly. Confirm WAN settings and credentials with ISP.
• Static IP Assignment (General): If static IP fails, re-enter IP, subnet mask, gateway, and DNS server info exactly as provided by ISP. Check with ISP if errors persist.
After making corrections, click Back to re-enter settings or use the Connection Test button on the summary screen.
What happens after configuring the WAN interface(s) in the wizard?
How are Date and Time settings configured in the wizard?
How do I register the device in the Initial Setup Wizard?
How do I activate services in the Initial Setup Wizard?
How do I configure initial Service Settings in the wizard?
• Content Filter: Enable/Disable (Recommended: Enable)
• Anti-Spam: Enable/Disable (Recommended: Enable) (Note: USG FLEX 50AX does not support anti-spam)
• SecuReporter: Enable/Disable. If enabling SecuReporter for the first time, you may need to accept the Terms of Use/GDPR policy via a checkbox.
Click Next to continue.How are SecuReporter settings configured in the wizard?
• Server Status: Shows connection status (Connected, Timeout, Fail).
• Device Name: Enter a name for this device within SecuReporter.
• Organization:
• If you have existing organizations: Select “Select from existing organization” and choose the organization from the dropdown.
• If creating a new one: Select “Create new organization”, enter a name (up to 255 chars) and optionally a description.
• Data Protection Policy: Choose the level of data anonymization for logs sent to SecuReporter:
• Partially Anonymous: Replaces personal data (usernames, MACs, emails, hostnames) with artificial identifiers in downloaded logs. Data can be removed.
• Fully Anonymous: Replaces personal data with anonymized info in Analyzer, Reports, and logs. Data cannot be traced back.
• Non-Anonymous: Personal data is clearly identifiable. Data cannot be removed.
If the device is already added to an organization, the screen will simply display the Server Status, Device Name, and Organization.
Click Next to continue.How are Wireless Settings configured in the wizard (for models with built-in AP)?
1. Management Mode Screen: Choose “Built-in AP” to use the device’s wireless capabilities or “AP Controller” to manage external Zyxel APs (cannot do both). Click Next.
2. AP Controller Screen (if AP Controller selected): Choose Yes to enable the AP Controller feature, No otherwise. Click Next.
3. SSID & Security Screen (if Built-in AP selected):
• SSID: Enter a wireless network name (up to 32 printable characters).
• Security Mode: Select “Pre-Shared Key” for password protection or “None” for an open network.
• Pre-Shared Key: (If Security Mode is Pre-Shared Key) Enter a password (8-63 case-sensitive ASCII characters or 64 hex characters).
• Hidden SSID: Check this box to prevent the SSID from being broadcast.
• Enable Intra-BSS Traffic Blocking: Check this to prevent wireless clients on this SSID from communicating directly with each other (they can still access the wired network).
• Bridged to: (Specific models like ‘W’ versions) Select a wired interface (e.g., lan1) to bridge the wireless network to. Wireless clients will be part of the same broadcast domain as the selected wired interface.
Click Next to continue.How is Remote Management configured in the Initial Setup Wizard?
• Allow secure remote management from WAN: Check to enable remote HTTPS access.
• Port: Set the HTTPS port (default 443, range 1-65535). Change recommended.
• Restrict access only to trusted host: Check to limit access.
• Trusted Host 1-3: Enter allowed source IP addresses or FQDNs (optional).
• Allow SSL VPN access from WAN: Check to enable remote SSL VPN access.
• Port: Set the SSL VPN port (default 443, range 1-65535). Change recommended.
• Restrict access by GeoIP: Check to limit access by country.
• Trusted Geolocation 1-3: Select allowed countries (optional).
Click Finish to complete the On Premises setup wizard.What settings are configured in the Nebula Mode Initial Setup Wizard?
1. Connect to Internet (WAN): Configure the primary (and optionally secondary) WAN interface that the device will use to reach NCC. Settings are similar to the On Premises wizard (Encapsulation, IP assignment, VLAN, MTU etc.).
2. Add Device / Go to Nebula: After WAN configuration, a screen appears with instructions and a QR code to add the device to your Nebula organization/site using either the Nebula web portal or the Nebula mobile app.
How do I add the device to Nebula using the wizard’s final screen?
Using Nebula Portal:
1. Log into the Nebula portal (http://nebula.zyxel.com) with your myZyxel account.
2. Follow the portal’s wizard/instructions to create/select an organization and site.
3. Enter the device’s MAC address and serial number (S/N) found on the label when prompted.
4. Click “Go To Nebula” (or similar prompt in the portal) to finish.
Using Nebula App:
1. Download the Nebula app (App Store/Google Play).
2. Run the app and select/create a site.
3. Scan the QR code displayed in the wizard screen using the app to register the device with its MAC/Serial Number.
Click “Finish” in the Zyxel Device’s wizard screen after successfully adding the device via either method.
If you cannot access Nebula after this step, log into the device locally using the support account and use the Local GUI/Web Configurator for troubleshooting the WAN connection.
What do the Front Panel LEDs indicate?
| LED | COLOR | STATUS | DESCRIPTION |
|---|---|---|---|
| PWR | Green | On | The Zyxel Device is turned on. |
| Red | On | Hardware component failure. Shut down, wait, restart. Contact vendor if red again. | |
| Off | The Zyxel Device is turned off. | ||
| SYS | Green | On | The Zyxel Device is ready and running. |
| Blinking | The Zyxel Device is booting. | ||
| Red | On | The Zyxel Device has an error or has failed. | |
| Off | The Zyxel Device is not ready or has failed. | ||
| USB | Green | On | Supported mobile broadband card or USB storage device connected. |
| Off | No device connected or connected device not supported. | ||
| Orange | On | Connected to a mobile broadband network via USB card. | |
| P1, P2… (Ethernet Ports) | Green | On | Successful 10/100 Mbps link. |
| Blinking | Sending/receiving packets at 10/100 Mbps. | ||
| Off | No traffic on this port (at 10/100 Mbps). | ||
| P1, P2… (Ethernet Ports) | Yellow | On | Successful 1000 Mbps (Gigabit) link. |
| Blinking | Sending/receiving packets at 1000 Mbps. | ||
| Off | No connection on this port (at 1000 Mbps). | ||
| WLAN (Models with WiFi) | (Color varies) | On/Blinking | Indicates wireless activity/status. |
What are the functions of the Front Panel Ports?
| LABEL | DESCRIPTION |
|---|---|
| RESET | Press and hold for ~5 seconds (until SYS LED blinks) then release to reset to factory defaults (Password: 1234, LAN IP: 192.168.1.1, etc.). |
| CONSOLE | RJ-45 port for CLI management using a console cable and terminal software (115200 bps, 8N1, No Flow Control). |
| USB | Port for connecting a USB storage device (for logs/storage) or a supported mobile broadband card. |
| P1 ~ P6 (or P5) | 1G RJ-45 Ethernet ports. Default mapping varies by model (see Default Port Mapping table). Can be configured for WAN, LAN, DMZ, OPT roles. |
| SFP (Specific Models) | Slot for an SFP transceiver, typically used as an alternative WAN or LAN port. |
What are the items on the Rear Panel?
| LABEL | DESCRIPTION |
|---|---|
| Console | RJ-45 port for CLI management (see settings above). |
| Power | Socket for connecting the included power cord/adapter. May include an On/Off switch. |
| Lock | Kensington lock slot (small, metal-reinforced oval hole) for securing the device with a lock-and-cable. |
| Fan | Ventilation fans for cooling. Ensure these are not obstructed. |
| Ethernet Ports (P1-P6/P5) | 1G RJ-45 Ethernet ports, functions depend on configuration (WAN/LAN/DMZ/OPT). |
| SFP (Specific Models) | SFP port slot. |
| Antenna Connectors (Wireless Models) | Connectors for attaching WiFi antennas. |
What are the Console Port pinouts and signal names?
| CONSOLE PORT / RJ-45 PIN | SIGNAL | DB-9 PIN |
|---|---|---|
| 1 | DTR | 6 |
| 2 | DSR | 4 |
| 3 | RxD | 3 |
| 4 | CTS | 7 |
| 5 | GND | 5 |
| 6 | TxD | 2 |
| 7 | RTS | 8 |
| 8 | NC | 1, 9 |
| SIGNAL | SIGNAL NAME |
|---|---|
| RxD | Receive Data |
| TxD | Transmit Data |
| DTR | Data Terminal Ready |
| GND | Ground |
| DSR | Data Set Ready |
| RTS | Request to Send |
| CTS | Clear to Send |
| RI | Ring Indicator |
| NC | Not Connected |
How should I install the Zyxel Device?
How do I prepare the device for desk-mounting?
1. Ensure the device surface is clean and dry.
2. Remove the adhesive backing from the included rubber feet.
3. Attach one rubber foot to each corner on the bottom of the Zyxel Device to prevent shock/vibration and allow air circulation.
How do I wall-mount the Zyxel Device?
1. Determine the correct distance “X” between mounting holes for your model:
| MODEL NAME | DISTANCE “X” |
|---|---|
| USG FLEX 50 (USG20-VPN) | 174 mm (6.85″) |
| USG FLEX 50W (USG20W-VPN) | 174 mm (6.85″) |
2. Drill two holes in the wall, distance “X” apart. Holes should be 3-4 mm (0.12″-0.16″) wide and 20-30 mm (0.79″-1.18″) deep. Insert the included screw anchors into the holes.
3. Screw the included screws (with 6-8 mm / 0.24″-0.31″ wide heads) into the anchors. Do NOT screw them all the way in. Leave a gap of 1-1.5 mm (0.04″-0.06″) between the screw head and the wall. Ensure screws are securely fixed and can hold the device’s weight.
4. Align the mounting holes on the bottom of the Zyxel Device with the screws in the wall and slide the device down to hang it on the screws. The gap allows cables to run behind the device.
Important: Wall-mount the Zyxel Device horizontally. Do NOT mount it with the side panels (containing ventilation slots) facing up or down, as this position is less safe.What are the default port-to-interface mappings?
| PORT / INTERFACE | P1 | P2 | P3 | P4 | P5 | P6 | P7 | P8 |
|---|---|---|---|---|---|---|---|---|
| USG FLEX 50 (USG20-VPN) | sfp | wan | lan1 | lan1 | lan1 | lan1 | ||
| USG FLEX 50AX | wan | lan1 | lan1 | lan1 | opt | |||
| USG20W-VPN | sfp | wan | lan1 | lan1 | lan1 | lan1 |
What are the default interface-to-zone mappings?
| ZONE / INTERFACE | WAN | LAN1 | LAN2 | DMZ | OPT | NO DEFAULT ZONE |
|---|---|---|---|---|---|---|
| USG FLEX 50 (USG20-VPN) / USG FLEX 50AX / USG20W-VPN | WAN, WAN_PPP | LAN1 | LAN2 | DMZ | OPT, OPT_PPP |
How should I stop or shut down the Zyxel Device?
• Web Configurator: Maintenance > Shutdown > Shutdown
• CLI command: `shutdown`
Wait for the device to complete the shutdown process before removing power.What is Easy Mode and how does it differ from Expert Mode?
Easy Mode: Designed for simpler network environments (typically one WAN, one LAN). It provides wizards for common tasks (Initial Setup, VPN, Port Forwarding, Wi-Fi/Guest, Security Service), links to portals (MyZyxel, One Security), and basic dashboard views. Configuration changes made here automatically create corresponding objects and rules prefixed with “EZ_” in Expert Mode.
Expert Mode: Provides access to the full set of advanced configuration menus and features.
Switching: You can switch between modes. When logged in, Easy Mode shows an “Expert Mode” button/link, and Expert Mode shows an “Easy Mode” button/link. When switching to Expert Mode for the first time after login, a confirmation prompt appears asking which mode should be the default starting mode for future logins.
Note: Changes made in Expert Mode might not display correctly back in Easy Mode. Some models do not support Easy Mode (check Section 1.1).
Guest Network Note: Enabling the guest network in Easy Mode renames the OPT port (or the highest-numbered copper Ethernet port, P6 by default) to “guest” and creates a corresponding guest interface (visible in Expert Mode’s Configuration > Network > Interface > Port Role).
Can I edit or delete objects/rules created by Easy Mode (“EZ_” prefix)?
You generally interact with Easy Mode settings via the Easy Mode interface. If you switch to Expert Mode, you can see the “EZ_” objects and rules created by Easy Mode.
Editing/Deleting rules in Expert Mode:
| OBJECT/RULE TYPE (Examples) | SCREEN (Expert Mode) | EDIT in Expert Mode | DELETE in Expert Mode |
|---|---|---|---|
| guest interface | Configuration > Network > Interface > Ethernet | X (Not Allowed) | X (Not Allowed) |
| Content Filtering Profile | Configuration > UTM Profile | V (Allowed) | V (Allowed) |
| IDP Profile | (Relevant UTM Profile screen) | V | V |
| Anti-Virus Profile | (Relevant UTM Profile screen) | V | V |
| Static DHCP Binding | Configuration > Network > IP/MAC Binding | X | V |
| Address Object | Configuration > Object > Address | X | V |
| IPSec VPN Connection | Configuration > VPN > IPSec VPN | X | V |
| IPSec VPN Gateway | Configuration > VPN > IPSec VPN | X | V |
| AP group | Configuration > Wireless | X | V |
| Radio Profile | Configuration > Wireless | X | V |
| NAT Rule | Configuration > Network > NAT | X | V |
| Security policy | Configuration > Security Policy | X | V |
| Zone Object | Configuration > Object > Zone | X | V |
| AP profile | Configuration > Wireless | X | V |
| Security Profile (UTM) | (Relevant UTM Profile screen) | X | V |
| SSID Profile | Configuration > Wireless | X | V |
| Address/Geo IP Object | Configuration > Object > Address/Geo IP | X | V |
| Service Object | Configuration > Object > Service | X | V |
Important:
• Editing EZ_ rules directly in Expert Mode might cause unexpected behavior in Easy Mode.
• You cannot delete EZ_ objects or rules if they are currently used by a policy. You must first delete the corresponding policy/configuration in Easy Mode or remove the reference in Expert Mode.
• If you delete an EZ_ object/rule in Expert Mode, the corresponding configuration in Easy Mode may stop working.
• It is generally recommended to manage Easy Mode configurations through the Easy Mode interface.
What wizards and links are available in Easy Mode?
Wizards:
• Initial Setup Wizard: For first-time Internet access setup.
• VPN Wizard: For site-to-site or remote client VPN tunnels.
• Port Forwarding Wizard: To set up access to internal servers (like NAS).
• Wi-Fi and Guest Wizard: To configure wireless network name/security for normal and guest access.
• Security Service Wizard: To configure subscriptions like content filtering, IDP, anti-virus.
Links:
• MyZyxel Portal: To subscribe to security services.
• One Security Portal: For configuration walkthroughs and help on security/VPN.
• Expert Mode: To access the full advanced configuration menus.
What options are in the Easy Mode Settings menu?
• Create Recovery Point: Saves the current device configuration as a restore point. Use this when the configuration is known to be working correctly.
• Restore Last Recovery Point: Reverts the device configuration back to the most recently created recovery point. Use this if recent changes caused problems. All changes made after the recovery point was created will be lost.
• Restart: Reboots the Zyxel Device. Useful after firmware upgrades or for troubleshooting. Web configurator changes are saved automatically; CLI changes require the ‘write’ command before rebooting to persist.
• Shutdown: Safely prepares the device to be powered off. Writes cached data, stops processes. Does not physically turn off power. Wait for completion before removing power.
What is the Cloud Helper icon in Easy Mode?
• If new firmware is available, the icon displays a red “N”.
• Clicking the icon (with or without the red “N”) checks for updates.
• If an update is found, a “What’s New” pop-up appears showing release notes.
• To upgrade directly from this pop-up, you need a Firmware Upgrade license associated with the device. If licensed, the “Upgrade Now” button is active. Click it to download and install the firmware (the device will reboot automatically).
• If unlicensed, “Upgrade Now” is grayed out.
• If the device is not registered with myZyxel, a message indicating this will appear.
What information does the Easy Mode Dashboard display?
• System Information: Firmware Version, System Uptime, Current Date/Time.
• Internet Status: Connection Type, WAN IP, Gateway, DNS. Includes a “Test Connection” button.
• VPN Status: Indicates if VPN rules are configured. Links to VPN Wizard if none exist.
• Security Status: Shows Firewall status (Enable/Disable) and Content Filter status (Enable/Disable, Licensed/Not Licensed). Links to Security Service Wizard.
• Network Client (LAN): Shows which ports are assigned to LAN1. Displays the number of connected clients.
• Network Client (Guest): Shows the guest network status (often N/A initially). Displays number of connected clients and guest Wi-Fi status.
• Wi-Fi / AP Status: Indicates if APs are configured. Links to Wi-Fi and Guest Wizard if none exist.
• Guest Wi-Fi / AP Status: Indicates if Guest APs are configured. Links to Wi-Fi and Guest Wizard if none exist.
What information is available on the Easy Mode dashboard?
• System information, such as firmware version, the length of time the Zyxel Device has been on, date and time.
• Internet information such as Internet connection type, WAN IP address and a button to test the connection.
• VPN tunnel information and a button to monitor and create VPN tunnels.
• Security information such as if the firewall is enabled and if supported security services are licensed. You will be prompted to create a secure policy when a service is licensed and you turn it on in order for the service to be used.
• Network Client information.
How do I add a new network client in Easy Mode?
1. Click the settings icon to manage clients.
2. Click + to add a new network client.
3. In the pop-up screen (Add a Client Device), enter the client’s interface (LAN1 or Guest), IP Address, MAC Address and Name.
4. Click OK.
What information is displayed under the Network Client section in Easy Mode?
• LAN information on wired and wireless connections to the Zyxel Device
• Guest Network information on guest wired and wireless connections to the Zyxel Device
• Wi-Fi button to change Wi-Fi channel
• Guest button turn the guest wireless network off or on.
What are the basic steps in the Initial Setup Wizard?
1. Connect to Internet (WAN)
2. Date and Time Setting
3. Register Device
4. Activate Service
5. Wireless LAN
What optional features can be configured in the Initial Setup Wizard?
• Security Service (Content Filter)
• Port Forwarding
• Guest LAN (Wired Network)
• VPN
You can choose to configure these later using separate links in the Easy Mode main screen.How do I choose the language for Easy Mode and Expert Mode?
How does the Initial Setup Wizard connect to the Internet?
When should I choose DHCP in the Initial Setup Wizard Internet settings?
When should I choose Ethernet Fixed IP in the Initial Setup Wizard Internet settings?
When should I choose PPPoE in the Initial Setup Wizard Internet settings?
What should I do if I see a “WAN 1 Down” error?
What should I do if I encounter a PPPoE error during setup?
1. Verify that your Internet access information uses PPPoE as the WAN connection type.
2. Re-enter your PPPoE user name and password exactly as provided by your ISP.
3. If the error persists, contact your ISP to confirm the correct WAN settings and user credentials.
What should I do if I encounter a DHCP error during setup?
1. Confirm that your Internet access information uses DHCP as the WAN connection type.
2. If it fails again, check with your ISP to ensure DHCP is expected and verify the correct WAN settings.
What should I do if I encounter an Ethernet Fixed IP error during setup?
1. Double-check that you were given a specific IP address, subnet mask, and gateway address by your ISP.
2. Re-enter the IP address, subnet mask, and gateway address exactly as provided.
3. If the problem continues, contact your ISP to verify the correct IP address, subnet mask, gateway address, and any other necessary WAN settings.
Why is it important to have the correct date and time on the Zyxel Device?
How does the Zyxel Device set its date and time?
What should I do if the Zyxel Device cannot get the correct date and time?
1. Ensure the Zyxel Device has a working Internet connection.
2. In the ‘Date and Time Settings’ step of the wizard, click the ‘Sync. Now’ button to manually trigger synchronization with the time server.
Why do I need to register my Zyxel Device?
• Receiving notifications about new firmware availability.
• Activating security service licenses (like Content Filter, IDP, Anti-Virus).
How do I register my Zyxel Device in the Initial Setup Wizard?
What happens if my Zyxel Device is not registered?
How do I register my device if prompted during setup?
What information is needed when registering the Zyxel Device at myZyxel?
What is Step 4 of the Initial Setup Wizard?
How do I activate services after registering my Zyxel Device?
What are examples of security services I can activate?
• Content Filter (to block websites by category, such as Gambling)
• IDP (Intrusion Detection & Protection, to recognize and drop traffic with attack patterns)
• Anti-Virus (to detect virus patterns in files)
• Anti-Spam (to mark or discard unsolicited commercial or junk e-mail)
Availability depends on your device model and purchased licenses.What should I do if the service license status doesn’t update after clicking Refresh?
1. Wait a few moments for the information to update.
2. Ensure the Zyxel Device has a working Internet connection. Try accessing the Internet from a computer connected to a LAN port on the Zyxel Device.
3. If the Internet connection is working, click “Refresh” again.
4. If you still cannot connect, check your Internet access settings on the Zyxel Device.
How do I set up the main Wi-Fi network in the Initial Setup Wizard?
1. Select the “Enable Wi-Fi Network” checkbox.
2. Configure a descriptive name (SSID) for the wireless network under “Wi-Fi”. Use 1 to 32 alphanumeric characters, hyphens, or underscores (a-z A-Z 0-9 -_).
3. Set a strong “Password” (see requirements).
Note: You must change the default password to continue.
What are the password requirements for the Wi-Fi network?
How do I set up the Guest Wi-Fi network in the Initial Setup Wizard?
1. Select the “Enable Guest Wi-Fi Network” checkbox.
2. Configure a descriptive name (SSID) for the guest wireless network under “Guest Wi-Fi”. Use 1 to 32 alphanumeric characters, hyphens, or underscores (a-z A-Z 0-9 -_).
3. Set a strong “Password” (same requirements as the main Wi-Fi password).
Note: The Guest Wi-Fi Network allows Internet access only for a limited time (default 4 hours).
What is the default access duration for the Guest Wi-Fi network?
What Wi-Fi security standard does the Zyxel Device use?
What happens after the basic setup in the Initial Setup Wizard is complete?
What optional features can I configure immediately after the basic setup?
• Security Service (Content Filter, IDP, Anti Virus)
• Port Forwarding
• Guest LAN (Wired Network)
• VPN
Select the desired services on the “Congratulations!” screen and click “Continue” (the button changes from “Finish” if options are selected). Alternatively, clear all selections and click “Finish” to configure them later.What is the purpose of Security Service (Content Filter, IDP, Anti Virus) configuration?
What is the purpose of Port Forwarding configuration?
What is the purpose of Guest LAN (Wired Network) configuration?
What is the purpose of VPN configuration?
• Site-to-site: Connecting two Zyxel Device networks securely.
• Remote client (Zyxel client): Allowing remote users with Zyxel VPN software to connect securely to your network.
• Remote client (Other): Allowing remote users with other standard VPN software (like L2TP) to connect securely.
What does the “Create a restore point” option do?
How do I configure basic Content Filter settings in the Initial Setup Wizard?
1. Ensure the service is licensed (not grayed out). Activate it at myZyxel if necessary and click Refresh.
2. Select the “Enable Content Filter with the following contents blocked” checkbox.
3. Select the checkboxes for the website categories you wish to block.
4. Click Next.
Note: Blocking “Chat” blocks chat websites, not necessarily chat applications like Skype.What types of websites does the ‘Chat’ category block?
What types of websites does the ‘Dating & Personals’ category block?
What types of websites does the ‘Gambling’ category block?
What types of websites does the ‘Games’ category block?
What types of websites does the ‘Hacking’ category block?
What types of websites does the ‘Illegal Software’ category block?
What types of websites does the ‘Instant Messaging’ category block?
What types of websites does the ‘Job Search’ category block?
What types of websites does the ‘Pornography/Sexually Explicit’ category block?
What types of websites does the ‘Social Networking’ category block?
What types of websites does the ‘Streaming Media & Downloads’ category block?
What types of websites does the ‘Tasteless’ category block?
What types of websites does the ‘Violence’ category block?
How can I enable IDP (Intrusion Detection & Protection) during the Initial Setup Wizard?
How can I enable Anti-Virus during the Initial Setup Wizard?
What is NAT port forwarding?
How do I set up port forwarding in the Initial Setup Wizard?
1. From the ‘Client’ drop-down list, select the internal device (e.g., NAS server) that will receive the forwarded traffic. (Click ‘Add here’ if the client is not listed).
2. From the ‘Service List’ (Available box), select the service(s) or port(s) that the internal device provides (e.g., FTP, HTTP, HTTPS).
3. Use the right arrow button to move the selected service(s) to the ‘Member’ box.
4. Click Next.
Why does a device acting as a server for port forwarding need a static IP address?
What if the service I need is not in the Port Forwarding list?
How do I set up a wired Guest LAN in the Initial Setup Wizard?
1. Select the “Enable Guest Network (for wired clients)” checkbox.
2. Click Next.
This action converts the OPT port (or P6, depending on model) into a guest interface.What happens when I enable the Guest Network (for wired clients)?
What access do devices connected to the guest port have?
What access do users have if I connect an Access Point (AP) to a LAN port?
What access do users have if I connect an Access Point (AP) to the Guest port?
What settings must be enabled for an AP connected to the Guest port to work correctly?
1. Enable Guest Wi-Fi Network (in the Wi-Fi setup step or wizard).
2. Enable Guest LAN (Wired Network) (to designate the OPT/P6 port as the guest port).
What is a VPN?
How do I start configuring a VPN in the Initial Setup Wizard?
• IPSec VPN Settings (for site-to-site or standard client VPNs)
• IPSec VPN Settings for Configuration Provisioning (for Zyxel VPN clients)
• VPN Settings for L2TP VPN Settings (for L2TP clients)
Select the desired type and click “Launch”. This closes the Initial Setup Wizard and opens the selected VPN Quick Setup Wizard. Clicking “Exit” leaves the wizard without saving changes.What is the purpose of the ‘IPSec VPN Settings’ option in the VPN wizard?
What needs to be ensured when setting up an IPSec VPN between two Zyxel Devices?
• Settings on both Zyxel Devices must be correct and reciprocal (e.g., local settings on one match remote settings on the other).
• The pre-shared key, negotiation mode, encryption, authentication settings, DH key group, etc., must be identical on both devices.
• Both devices must be able to communicate with each other (try pinging the remote gateway).
• Ensure no firewall in front of either Zyxel Device is blocking VPN traffic (typically UDP ports 500 and 4500, and ESP protocol).
What is the purpose of the ‘IPSec VPN Settings for Configuration Provisioning’ option?
What is required for the ‘IPSec VPN Settings for Configuration Provisioning’ to work?
• The Zyxel client VPN software must be installed and configured correctly on the remote computer.
• The VPN settings (pre-shared key/certificate, negotiation mode, encryption, authentication, DH group) must match between the client configuration and the Zyxel Device rule.
• The client must be able to communicate with the Zyxel Device (try pinging the Zyxel Device from the client).
What is the purpose of the ‘VPN Settings for L2TP VPN Settings’ option?
What is required for an L2TP VPN connection to work?
• The L2TP VPN client software must be installed and configured correctly on the remote computer or device (refer to the OS/device help).
• The client must be able to communicate with the Zyxel Device (try pinging the Zyxel Device from the client).
• Ensure that L2TP traffic (typically UDP ports 500, 4500, and 1701) is allowed through the WAN on the Zyxel Device and not blocked by any intermediate firewalls.
What is the difference between Express and Advanced mode in the VPN Setup Wizard?
• Express: Creates a VPN rule using default Phase 1 and Phase 2 settings, typically for connecting to another ZLD-based Zyxel Device using a pre-shared key. It simplifies the setup process.
• Advanced: Allows you to customize the Phase 1 and Phase 2 settings (like negotiation mode, encryption/authentication algorithms, key groups, lifetimes) and/or use certificates instead of a pre-shared key. It offers more flexibility for connecting to other IPSec devices or meeting specific security requirements.
What is IKE (Internet Key Exchange) and what are the differences between IKEv1 and IKEv2 mentioned?
• IKEv1: Supports X-Auth for authentication.
• IKEv2: Supports Extended Authentication Protocol (EAP), which is important for integrating with existing enterprise authentication systems (like RADIUS).
What are the requirements for the Rule Name in the VPN wizard?
• Length: 1 to 31 characters.
• Allowed characters: Alphanumeric (a-z, A-Z, 0-9), underscores (_), dashes (-).
• Restriction: The first character cannot be a number.
• Case-sensitive: Yes.
When should I choose the ‘Site-to-site’ VPN scenario?
When should I choose the ‘Site-to-site with Dynamic Peer’ VPN scenario?
When should I choose the ‘Remote Access (Server Role)’ VPN scenario?
When should I choose the ‘Remote Access (Client Role)’ VPN scenario?
What is ‘My Address (interface)’ in the VPN Express Wizard?
What is ‘Secure Gateway’ in the VPN Express Wizard? When should I use 0.0.0.0?
• If the scenario chosen makes this field non-configurable (like Remote Access Server Role or Site-to-Site with Dynamic Peer), it will display “Any”.
• Otherwise, enter the static WAN IP address or domain name of the remote peer.
• Use 0.0.0.0 if the remote IPSec router has a dynamic WAN IP address (applicable in the Site-to-Site scenario when the remote peer initiates).
What is the ‘Pre-Shared Key’ in the VPN Express Wizard and what are its requirements?
• Both ends of the VPN tunnel must use the exact same Pre-Shared Key.
• Requirements: Up to 128 case-sensitive ASCII characters OR up to 128 pairs of hexadecimal characters (“0-9”, “A-F”).
• Hexadecimal keys must be preceded with “0x” (e.g., 0x1234ABCD…).
• Using mismatched keys will result in connection failure (PYLD_MALFORMED error).
What is ‘Local Policy (IP/Mask)’ in the VPN Express Wizard?
What is ‘Remote Policy (IP/Mask)’ in the VPN Express Wizard?
• If the scenario chosen makes this field non-configurable (like Remote Access Server Role or Client Role), it will display “Any”.
• Otherwise, enter the IP address and subnet mask of the remote computer or subnet (e.g., 192.168.10.0 / 255.255.255.0). This must match the ‘Local Policy’ configured on the remote IPSec device.
What information is shown on the VPN Express Wizard Summary screen?
• Rule Name
• Secure Gateway (IP address, FQDN, or Any)
• Pre-Shared Key (masked or displayed depending on context)
• Local Policy (IP/Mask)
• Remote Policy (IP/Mask or Any)
It also includes a ‘Configuration for Secure Gateway’ section with commands for the remote peer.What is the ‘Configuration for Secure Gateway’ section used for in the VPN Express Wizard summary?
Where can I find the VPN rules created by the wizard after completion?
• The Phase 1 rule settings (IKE settings) appear in the VPN > IPSec VPN > VPN Gateway screen.
• The Phase 2 rule settings (IPSec policy) appear in the VPN > IPSec VPN > VPN Connection screen.
• For L2TP rules, they appear in VPN > L2TP VPN and also influence the IPSec VPN Gateway/Connection screens.
How do I exit the VPN Express Wizard?
How do I start the VPN Advanced Wizard?
What are the two phases of IKE negotiation?
• Phase 1 (Authentication): Establishes a secure channel called the IKE SA (Security Association). This phase authenticates the peers and agrees on cryptographic parameters for securing the IKE communication itself.
• Phase 2 (Key Exchange): Uses the secure IKE SA established in Phase 1 to negotiate the parameters for the actual data tunnel, known as the IPSec SA. This defines how user data will be encrypted and authenticated.
What is ‘Negotiation Mode’ in VPN Phase 1 settings and what are the options?
• Main: More secure as it encrypts the identities of the communicating peers (ZyWALL/USG and remote router). However, it takes more time and message exchanges to establish the IKE SA.
• Aggressive: Faster negotiation as it exchanges more information in fewer messages. However, it does not encrypt the peer identities during the exchange, making it potentially less secure against eavesdropping.
Both the ZyWALL/USG and the remote IPSec router must use the same negotiation mode. Multiple SAs connecting through the same secure gateway must also use the same mode.What Encryption Algorithms are available in VPN Phase 1 settings?
• 3DES (Triple DES): Uses a 168-bit key. More secure than DES but slower and requires more processing power.
• AES (Advanced Encryption Standard): Offered in different key lengths:
• AES128: Uses a 128-bit key. Faster than 3DES.
• AES192: Uses a 192-bit key.
• AES256: Uses a 256-bit key. Offers the highest level of encryption strength but may impact throughput most.
The longer the key, generally the higher the security, but potentially lower throughput. Both VPN peers must use the same algorithm.What Authentication Algorithms are available in VPN Phase 1 settings?
• MD5 (Message Digest 5): Provides minimal security; generally considered weak and deprecated for security purposes.
• SHA1 (Secure Hash Algorithm 1): Stronger than MD5, but also has known vulnerabilities.
• SHA256 (SHA-2 family): Offers higher security than SHA1.
• SHA512 (SHA-2 family): Offers the highest security among common options.
Stronger algorithms provide better security but are computationally more intensive and may result in slightly lower performance. Both VPN peers must use the same algorithm.What Key Groups (DH Groups) are available in VPN Phase 1 settings?
• DH1: 768-bit random number (considered weak).
• DH2: 1024-bit (1Kb) random number (minimum recommended).
• DH5: 1536-bit random number (stronger).
Higher DH groups provide stronger security for the key exchange but require more computational resources and may increase connection setup time. DH5 is more secure than DH1 or DH2. Both VPN peers must use the same DH group.What is ‘SA Life Time’ in VPN Phase 1 settings?
What is ‘NAT Traversal’ in VPN Phase 1 settings and when should it be selected?
What is ‘Dead Peer Detection (DPD)’ in VPN Phase 1 settings?
What are the ‘Authentication Method’ options in VPN Phase 1 settings?
• Pre-Shared Key: Both peers are configured with the same secret password (the pre-shared key). This is simpler to set up.
• Certificate: Each peer uses a digital certificate (issued by a Certificate Authority or self-signed) to authenticate. This is generally considered more secure and scalable, especially for larger deployments, but requires managing certificates.
What is configured in Phase 2 of an IKE negotiation?
What are the ‘Active Protocol’ options in VPN Phase 2 settings?
• ESP (Encapsulating Security Payload): Provides confidentiality (encryption), data origin authentication, connectionless integrity, and anti-replay protection. ESP is compatible with NAT Traversal.
• AH (Authentication Header): Provides data origin authentication, connectionless integrity, and anti-replay protection, but does NOT provide encryption (confidentiality). AH is generally NOT compatible with NAT.
ESP is almost always preferred due to its inclusion of encryption and NAT compatibility. AH might not be available in some wizard modes (e.g., Configuration Provisioning).What are the ‘Encapsulation’ options in VPN Phase 2 settings?
• Tunnel: Encapsulates the entire original IP packet (including header) inside a new IP packet. The new IP header has the source and destination IP addresses of the VPN gateways. Tunnel mode is required for site-to-site VPNs and is compatible with NAT.
• Transport: Only encrypts/authenticates the payload of the original IP packet, keeping the original IP header. This is typically used for end-to-end security between two hosts on the same network and is generally not compatible with NAT.
Tunnel mode is used for most VPN scenarios configured via the wizard.What Encryption Algorithms are available in VPN Phase 2 settings?
• 3DES
• AES128
• AES192
• AES256
• Null: This option specifies that no encryption should be applied. This is generally only used if confidentiality is not required or if AH protocol is used (which doesn’t support encryption).
Longer keys provide higher security but may reduce throughput. Both peers must use the same algorithm.What Authentication Algorithms are available in VPN Phase 2 settings?
• MD5
• SHA1
• SHA256
• SHA512
Stronger algorithms provide better security but may impact performance. Both peers must use the same algorithm.What is ‘SA Life Time’ in VPN Phase 2 settings?
What is ‘Perfect Forward Secrecy (PFS)’ in VPN Phase 2 settings and what are the options?
• Options involve selecting a Diffie-Hellman group (e.g., DH1, DH2, DH5) for this Phase 2 key exchange.
• DH5 is more secure than DH1 or DH2, but may slow down the Phase 2 setup.
• Disabling PFS allows faster IPSec setup but is less secure, as compromising the Phase 1 key could potentially compromise all data sent over the tunnel.
Both peers must agree on whether to use PFS and use the same DH group if enabled.What is ‘Local Policy (IP/Mask)’ in VPN Phase 2 settings?
What is ‘Remote Policy (IP/Mask)’ in VPN Phase 2 settings?
What is ‘Nailed-Up’ in VPN Phase 2 settings and when is it applicable?
What information is shown on the VPN Advanced Wizard Summary screen?
• Rule Name
• Secure Gateway
• Pre-Shared Key / Certificate Info
• My Address (interface)
• Phase 1 settings (Negotiation Mode, Encryption, Authentication, Key Group, SA Life Time, NAT-T, DPD)
• Phase 2 settings (Active Protocol, Encapsulation, Encryption, Authentication, SA Life Time, PFS)
• Policy settings (Local Policy, Remote Policy, Nailed-Up)
• Configuration for Secure Gateway script
How do I save the VPN rule created by the Advanced Wizard?
What is the purpose of the ‘VPN Settings for Configuration Provisioning’ wizard?
What settings are NOT allowed in VPN rules for Configuration Provisioning?
• AH active protocol (only ESP is supported)
• NULL encryption (data must be encrypted)
• SHA512 authentication (use SHA1 or SHA256)
• A subnet or range remote policy (the client typically determines its own traffic)
What is the only Application Scenario allowed in the Configuration Provisioning wizard?
Why is ‘Secure Gateway’ set to Any in the Configuration Provisioning wizard?
What information is shown on the Configuration Provisioning Express Wizard Summary screen?
• Rule Name
• Secure Gateway (will be ‘Any’)
• Pre-Shared Key
• Local Policy (IP/Mask)
• Remote Policy (will be ‘Any’)
It also includes the ‘Configuration for Secure Gateway’ section, which in this context, displays the configuration parameters that the Zyxel VPN Client will retrieve.What does the ‘Configuration for Secure Gateway’ section represent in the Configuration Provisioning wizard summary?
How does the Zyxel Device IPSec VPN Client get the settings configured using the Configuration Provisioning wizard?
Why is AH protocol not available in the Configuration Provisioning Advanced Wizard Phase 2?
Why is Remote Policy set to Any in the Configuration Provisioning Advanced Wizard Phase 2?
What is the purpose of the ‘VPN Settings for L2TP VPN Settings’ wizard?
What settings are configured on the first screen of the L2TP VPN Settings wizard?
• Rule Name: A name to identify the L2TP VPN rule.
• My Address (interface): The WAN interface on the Zyxel Device that will accept L2TP connections.
• Authentication Method (Pre-Shared Key): The secret key that both the L2TP client and the Zyxel Device must use for the initial IPSec authentication.
What is the ‘IP Address Pool’ used for in L2TP VPN settings?
What does the ‘Allow L2TP traffic Through WAN’ option do?
Why is configuring DNS servers important for L2TP VPN clients?
What information is shown on the L2TP VPN Settings Wizard Summary screen?
• Rule Name
• Secure Gateway (will be ‘Any’ as it’s a server role)
• Pre-Shared Key
• My Address (interface)
• IP Address Pool (Range or Subnet details)
Where can I find the L2TP VPN rules created by the wizard?
How do I configure Port Forwarding from the Easy Mode dashboard?
How do I add a client to the Port Forwarding list if it’s not present?
How do I add a custom service to the Port Forwarding list?
1. Click Add.
2. Enter a descriptive Service Name.
3. Enter the Starting Port number (1-65535).
4. Enter the Ending Port number (1-65535). Use the same number as the starting port if forwarding a single port.
5. Click OK.
What are UPnP and NAT-PMP?
• UPnP (Universal Plug and Play) and NAT-PMP (NAT Port Mapping Protocol) are network protocols that allow devices on your local network (like game consoles, media servers, etc.) to automatically discover each other and configure network services, including automatically creating port forwarding rules on the Zyxel Device (router) without manual configuration.
How do I enable UPnP/NAT-PMP using the Port Forwarding wizard?
1. Select the “Enable UPnP” checkbox.
2. Click Refresh to view the current UPnP Port Status (rules automatically created by devices).
3. Click Finish.
Note: Only enable UPnP if required by specific services and if you understand the security implications, as it allows devices to open ports automatically.How do I configure Wi-Fi settings using the Wi-Fi and Guest Network Wizard?
To configure Wi-Fi:
1. Check “Enable Wi-Fi Network”.
2. Set the Wi-Fi name (SSID).
3. Set the Password.
To configure Guest Wi-Fi:
1. Check “Enable Guest Wi-Fi Network”.
2. Set the Guest Wi-Fi name (SSID).
3. Set the Password.
4. Specify the access Duration (default 4 hours) or select Always.
How long can guests access the Guest Wi-Fi network configured through the wizard?
How do I configure the wired Guest LAN using the Wi-Fi and Guest Network Wizard?
1. Select the “Enable Guest Network (for wired clients)” checkbox.
2. Click Finish.
This configures the OPT/P6 port as an isolated guest port providing Internet-only access.What does the Security Service Wizard configure?
What should I do before running the Security Service Wizard?
How do I check the license status in the Security Service Wizard?
How do I select categories to block using the Content Filter in the Security Service Wizard?
1. Ensure the “Enable Content Filter with following contents blocked” checkbox is selected.
2. Review the listed categories (grouped under headings like Adult Related, Leisure, Liability Concerns, etc.).
3. Select the checkboxes next to the categories you wish to block.
4. Click Next.
What types of websites does the ‘Nudity’ category block? (Adult Related)
What types of websites does the ‘Pornography/Sexually Explicit’ category block? (Adult Related)
What types of websites does the ‘Tasteless’ category block? (Adult Related)
What types of websites does the ‘Games’ category block? (Leisure)
What types of websites does the ‘Streaming Media & Downloads’ category block? (Leisure)
What types of websites does the ‘Peer to Peer’ category block? (Leisure)
What types of websites does the ‘Hacking’ category block? (Technology)
What types of websites does the ‘Child Abuse Images’ category block? (Liability Concerns)
What types of websites does the ‘Criminal Activity’ category block? (Liability Concerns)
What types of websites does the ‘Gambling’ category block? (Liability Concerns)
What types of websites does the ‘Hate & Intolerance’ category block? (Liability Concerns)
What types of websites does the ‘Illegal Drugs’ category block? (Liability Concerns)
What types of websites does the ‘Illegal Software’ category block? (Liability Concerns)
What types of websites does the ‘Weapons’ category block? (Liability Concerns)
What types of websites does the ‘Violence’ category block? (Liability Concerns)
What types of websites does the ‘Chat’ category block? (Social Interaction)
What types of websites does the ‘Dating & Personals’ category block? (Social Interaction)
What types of websites does the ‘Instant Messaging’ category block? (Social Interaction)
What types of websites does the ‘Social Networking’ category block? (Social Interaction)
What types of websites does the ‘Job Search’ category block? (Commerce)
What types of websites does the ‘Advertisements & Pop-Ups’ category block? (Commerce)
What types of websites does the ‘Sex Education’ category block? (Information Related)
How do I add specific trusted or forbidden websites in the Security Service Wizard?
• To add a trusted (always allowed) site: Click Add under “Trusted Web Sites”, enter the host name (e.g., http://www.good-site.com, *.zyxel.com) without “http://”, and click OK/Save.
• To add a forbidden (always blocked) site: Click Add under “Forbidden Web Sites”, enter the host name (e.g., http://www.bad-site.com, *.malicious.com) without “http://”, and click OK/Save.
Use up to 127 characters (0-9a-z-). Casing does not matter. The entry must contain at least one period “.”.How do I use wildcards when adding trusted or forbidden websites?
• `*zyxel.com` allows or blocks `www.zyxel.com`, `partner.zyxel.com`, `press.zyxel.com`, etc.
• `*.com` allows or blocks all `.com` domains.
How do I remove a trusted or forbidden website entry?
How can I exempt specific devices from Content Filter policies using the Security Service Wizard?
1. Find the device you want to exempt in the “Client_list”.
2. Select the device.
3. Click the right arrow button (>) to move it to the “Exemption_list”.
Devices in the Exemption_list will bypass Content Filter category blocking and trusted/forbidden website policies.How do I add a device to the exemption list if it’s not already there?
1. Click the “Add Client Address” button.
2. In the pop-up screen, enter the client’s Name, IP Address, and MAC Address.
3. Specify the interface (e.g., LAN1).
4. Click OK.
The device will now appear in the Client_list, and you can move it to the Exemption_list.How do I enable IDP and Anti-Virus in the Security Service Wizard?
• To enable IDP: Select the “Enable IDP” checkbox.
• To enable Anti-Virus: Select the “Enable Anti-Virus” checkbox.
Ensure the respective services are licensed first. The screen also displays the current signature version and release date for each service. Click “Finish” to apply the settings.Why is it important to keep IDP and Anti-Virus signatures updated?
How do I update IDP and Anti-Virus signatures?
What is the MyZyxel Portal (portal.myzyxel.com)?
How do I register my device and manage licenses?
1. Go to portal.myzyxel.com.
2. Create an account or sign in.
3. Follow the instructions on the portal to register your device. You may need the device’s serial number and LAN MAC address (usually found on a label on the device).
4. If you purchased subscription services (e.g., via an iCard), enter the license key(s) on the portal to activate the services for your registered device.
What is the Threat Intelligence Portal (threatintelligence.zyxel.com)?
What information can I find on the Threat Intelligence Portal?
• An Encyclopedia: Search for virus/malware names or file hashes to view details, history, signature info, and how ZyWALL defends against them.
• Release Notes: Information about signature updates.
• Virus / Malware Information: Details on viruses and malware.
• Intrusion Detection Information: Details on network-based intrusions.
• Application Patrol Information: Details on application identification signatures.
• URL Checker: Allows you to check the categorization of a specific website URL.
What does the Virus/Malware section of the Threat Intelligence Portal cover?
What does the Intrusion Detection section of the Threat Intelligence Portal cover?
What does the Application Patrol section of the Threat Intelligence Portal cover?
What does the URL Checker section of the Threat Intelligence Portal cover?
What wizards are available in the main Quick Setup section (Expert Mode)?
• WAN Interface: Configures a WAN (Internet) connection, including ISP account settings for PPPoE/PPTP/L2TP.
• Remote Access VPN Setup: Configures VPN rules for remote clients (IKEv2 IPSec or L2TP over IPSec).
• VPN Setup: Configures general VPN rules, including site-to-site, Configuration Provisioning for Zyxel clients, and L2TP for clients.
• Wireless Setup: Configures the device as an AP Controller or manages the built-in AP (if applicable).
How do I access the help section within a Quick Setup wizard?
How do I select the physical interface for the WAN connection in the wizard?
How do I select the WAN connection type (Encapsulation) in the wizard?
• Choose Ethernet if your connection uses standard Ethernet (typically with Auto/DHCP or Static IP).
• Choose PPPoE, PPTP, or L2TP if your ISP requires a dial-up type connection using one of these protocols (you’ll need credentials from your ISP).
How do I configure the IP Address Assignment (Auto/Static) for an Ethernet WAN connection?
• For dynamic IP: Select “Auto” from the “IP Address Assignment” drop-down. The device will attempt to get an IP via DHCP.
• For fixed IP: Select “Static” from the “IP Address Assignment” drop-down. You will then need to enter the IP Address, IP Subnet Mask, Gateway IP Address, and optionally DNS Server addresses provided by your ISP.
What information is needed for a PPTP connection?
• Authentication Type (e.g., Chap/PAP)
• User Name (from ISP)
• Password (from ISP)
• Base Interface (the physical Ethernet port used)
• Server IP (the IP address of the ISP’s PPTP server)
Optional settings may include Nailed-Up, Idle Timeout, Connection ID, Base IP Address, Subnet Mask, Gateway IP, and DNS Servers, depending on ISP requirements.What information is needed for a PPPoE connection?
• Authentication Type (e.g., Chap/PAP)
• User Name (from ISP)
• Password (from ISP)
Optional settings may include Service Name, Nailed-Up, Idle Timeout, and DNS Servers, depending on ISP requirements. The wizard usually automatically handles the IP address assignment.What Authentication Types are supported for PPPoE/PPTP/L2TP connections?
• CHAP/PAP: Accepts either CHAP or PAP when requested by the remote server.
• CHAP: Accepts only CHAP (Challenge Handshake Authentication Protocol).
• PAP: Accepts only PAP (Password Authentication Protocol).
• MSCHAP: Accepts only MSCHAP.
• MSCHAP-V2: Accepts only MSCHAP-V2.
You should select the type specified by your ISP.What does ‘Nailed-Up’ mean for PPPoE/PPTP/L2TP connections?
What is ‘Idle Timeout’ for PPPoE/PPTP/L2TP connections?
What is the ‘Connection ID’ field used for in PPTP/L2TP?
What settings are shown in the WAN Interface Wizard Summary?
• Encapsulation (Ethernet, PPPoE, etc.)
• WAN Interface name
• Zone (usually WAN)
• IP Address Assignment (Auto or Static)
• IP Address
• IP Subnet Mask
• Gateway IP Address
• DNS Servers
• ISP Parameters (User Name, Service Name, Server IP, etc., if applicable)
What is the purpose of the Remote Access VPN Setup wizard?
When should I use the IKEv2 IPSec Client scenario in the Remote Access VPN wizard?
• Using the Zyxel SecuExtender IPSec VPN client software.
• Using a computer or mobile operating system with built-in IKEv2 support (referred to as a non-SecuExtender VPN client).
What operating systems support the IKEv2 IPSec Client scenario (non-SecuExtender)?
• Windows 8 and later versions.
• iOS 14.8 and later versions.
• macOS 10.12 and later versions.
• Android 10.0 and later versions (requires installing strongSwan first).
When should I use the L2TP over IPSec Client scenario in the Remote Access VPN wizard?
What operating systems support the L2TP over IPSec Client scenario?
• Windows 8 and later versions.
• iOS 13 and later versions.
• macOS 10.12.2 and later versions.
• Android 10.0 and later versions.
What VPN Authentication Method is used for the IKEv2 IPSec Client scenario?
How do I specify the Incoming Interface for the IKEv2 VPN?
• Interface: Select a pre-configured physical interface (like ge2, wan1) from the drop-down list. Use this if the Zyxel Device has a static IP on that interface.
• Domain Name / IPv4: Select this if you are using DDNS to assign a dynamic IP address a domain name, or if you want to enter a static IP address directly. Enter the domain name (e.g., vpn.zyxel.com) or the static IPv4 address in the text box.
How is the Zyxel Device’s certificate configured for the IKEv2 VPN?
• Auto: The Zyxel Device generates a certificate automatically based on the wizard settings (recommended for simplicity).
• Manual: Select an existing certificate from the drop-down list. Ensure the certificate’s Host IP Address or Domain Name matches the Incoming Interface setting. You may need to create a suitable certificate first under Configuration > Object > Certificate > My Certificate.
What is the difference between Full Tunnel and Split Tunnel for IKEv2 VPN?
• Full Tunnel: All network traffic from the remote VPN client is encrypted and sent through the VPN tunnel to the Zyxel Device. This includes traffic destined for the internal network and traffic destined for the Internet.
• Allow Client VPN Traffic Through WAN: Check this box to allow the client’s Internet traffic to exit through the Zyxel Device’s WAN connection. Clear it to block client Internet access via the tunnel.
• Split Tunnel: Only traffic destined for specific networks behind the Zyxel Device is encrypted and sent through the VPN tunnel. Select the local network interface (LAN, DMZ, guest) from the drop-down list. Traffic destined for the Internet from the remote client does not go through the Zyxel Device and is not encrypted by this VPN.
Note: Non-SecuExtender clients typically only support Full Tunnel configuration via this wizard/script provisioning.How is the IP Address Pool assigned to IKEv2 VPN clients?
• Default Range (e.g., 192.168.50.1-192.168.50.250): Use the default range provided.
• Custom Defined: Select this to enter a specific Starting IP Address and Ending IP Address for the pool.
How are DNS servers assigned to IKEv2 VPN clients?
• First DNS Server:
• ZyWALL: The Zyxel Device acts as a DNS proxy.
• Custom Defined: Enter the IP address of a specific DNS server reachable from the network behind the Zyxel Device.
• Second DNS Server: Optionally enter a secondary DNS server IP address (checked if the first is unavailable).
What is the Upload Bandwidth Limit setting for IKEv2 VPN clients?
How do I specify which users can connect via the IKEv2 VPN?
1. A list of “Available” local users configured on the Zyxel Device is shown.
2. Select the user(s) you want to allow VPN access.
3. Click the right arrow button (>) to move them to the “Member” list.
Only users in the Member list will be permitted to authenticate and connect via this VPN rule. You can click “+ Add New User” to create a new local user directly.Can I use users from external databases with this wizard?
What is the default rule name for the IKEv2 VPN created by the wizard?
How do I provide configuration settings to non-SecuExtender IKEv2 VPN clients?
• For Windows, iOS, macOS clients: Click the appropriate download link, save the script file, and send it to the remote VPN user to install/run on their device.
• For Android clients: Install strongSwan on the Android device first. Then click the download link for Android, save the script file, and send it to the user along with the Pre-Shared Key (if used) for manual configuration within strongSwan.
What features are not supported for non-SecuExtender IKEv2 clients via script provisioning?
• Upload Bandwidth Limit
• Split Tunnel (only Full Tunnel is configured via script)
• Two-factor Authentication (like Google Authenticator)
What settings are configured on the first screen for L2TP over IPSec VPN?
• Pre-Shared Key: The secret key for IPSec authentication (8-128 alphanumeric or hex pairs starting with 0x).
• Incoming Interface: The WAN interface (physical like ge4 or logical like Domain Name/IPv4) that will accept the L2TP/IPSec connections.
• Local Network: Set to Full Tunnel. You can choose whether to “Allow L2TP traffic Through WAN” (allowing clients Internet access via the tunnel).
What tunnel mode is used for L2TP over IPSec VPN?
How are IP addresses and DNS servers assigned to L2TP over IPSec VPN clients?
• IP Address Pool: Define the range of IP addresses assigned to clients (either the default 192.168.50.1-192.168.50.250 or a Custom Defined range).
• First DNS Server / Second DNS Server: Specify DNS servers for clients (either ZyWALL proxy or Custom Defined IPs).
How do I specify which users can connect via the L2TP over IPSec VPN?
1. Select allowed local users from the “Available” list.
2. Move them to the “Member” list using the arrow button.
Only users in the Member list can authenticate for the L2TP connection (which happens after the initial IPSec tunnel is established using the pre-shared key). You can add new local users via “+ Add New User”. External database users require configuration outside the wizard.What is the default rule name for the L2TP over IPSec VPN created by the wizard?
How do I provide configuration settings to L2TP over IPSec VPN clients?
• For Windows, iOS, macOS clients: Download the script file and send it to the user to run on their device.
• For Android and Windows 7 clients: These require manual configuration. You need to provide the user with the Pre-Shared Key and the Zyxel Device’s public IP address or domain name (from the Incoming Interface setting) so they can configure the L2TP over IPSec connection manually on their device.
Which L2TP clients require manual configuration?
How do I start the Wireless Setup Wizard?
What are the options in the Quick Setup Wizard?
• WAN Interface: Walks you through getting your device connected online.
• Remote Access VPN Setup: Allows employees anywhere to securely connect to their company’s remote LAN.
• VPN Setup: Provides a simplified process for creating secure communications between nodes.
• Wireless Setup: Walks you through getting your device connected online via Wireless LAN.
How do I configure SSID settings in the Wireless Setup Wizard?
1. Select a WiFi network and click Edit, or create a new one.
2. Configure the following fields:
• Activate: Check this box to enable the WiFi network.
• Wireless Name (SSID): Enter a unique name to identify the WiFi network.
• Outgoing Interface: Select the interface the wireless network uses to transmit packets.
• Security Mode: Select WPA2 to use WPA2 security with a Pre-Shared Key. Enter the key in the Pre-Shared Key field. Select Open if you do not want security (not recommended).
3. Click OK to save the settings and return to the wizard, or click Cancel to discard changes. Click Next to proceed to the Radio settings.
How do I configure Radio settings in the Wireless Setup Wizard?
• Band Mode: Select the wireless band (2.4GHz for 802.11b/g/n/ax, 5GHz for 802.11ax/ac/a/n).
• Channel Width: Select the channel bandwidth (20 MHz, 40 MHz, 80 MHz, 160 MHz, 320 MHz, or combinations like 20/40MHz). Select 20 MHz for environments with obstructions or interference, or if clients don’t support bonding. Note: The device may switch to lower bandwidth in poor SNR environments.
• Channel Selection: Choose DCS (Dynamic Channel Selection) for automatic channel selection based on interference, or Manual to specify a channel. DCS is not supported in repeater mode.
• Output Power: Set the transmission power. Higher power increases coverage but may cause interference.
Click Next to continue or Back to return to SSID settings.
How do I complete the Wireless Setup Wizard?
1. Review your settings on the Summary screen (Figure 179).
2. Click Save to apply the changes to the Zyxel Device.
3. Click Back if you need to make further changes.
4. The Wizard Completed screen (Figure 180) confirms your changes have been saved.
5. Click Close to exit the wizard.
What information is available on the Dashboard?
• System Resources: CPU Usage, Memory Usage, Flash Usage, USB Storage Usage, Active Sessions.
• Network Status: DHCP Table count, Number of Login Users, VPN Status, SSL VPN Status.
• Device Status: Virtual Device panel (front/rear panel status), Device Information (System Name, Serial Number, MAC Address, Firmware Version), System Status (Boot Status, Uptime, Date/Time), Tx/Rx Statistics, The Latest Logs.
You can rearrange, collapse, refresh, and close individual widgets. Clicking the OneSecurity icon provides guidance on configuration walkthroughs and troubleshooting.
How can I interpret the status of interfaces shown on the Dashboard Virtual Device panel?
• Ethernet Interface:
• Inactive: Interface is disabled.
• Down: Interface is enabled but not connected, or has no associated physical ports.
• Speed / Duplex: Interface is enabled and connected, showing port speed and duplex (Full or Half).
• WLAN Card: Status is ‘none’.
• Cellular Interface: See Section 10.7 for possible statuses.
• Auxiliary Interface:
• Inactive: Interface is disabled.
• Connected: Interface is enabled and connected.
• Disconnected: Interface is enabled but not connected.
The Zone and IP Address/Mask for the interface are also displayed.What information is shown in the Device Information widget on the Dashboard?
• System Name: The name identifying the Zyxel Device on the network. Click the link to edit the Host Name.
• Serial Number: The unique serial number for device tracking and control.
• MAC Address Range: The MAC addresses used by the device’s physical ports.
• Firmware Version: The currently running firmware version and date. Click the link to access the Firmware Package screen for uploads.
What do the different Boot Status messages mean in the System Status widget?
• OK: Successful startup.
• Firmware update OK: Successful firmware update.
• Problematic configuration after firmware update: Configuration failed after firmware upgrade.
• System default configuration: Successfully applied system defaults (first start or intentional reset).
• Fallback to lastgood configuration: Failed to apply startup-config.conf, used lastgood.conf instead.
• Fallback to system default configuration: Failed to apply lastgood.conf, used system-default.conf instead.
• Booting in progress: System configuration application is ongoing.
How do I view Tx/Rx Statistics on the Dashboard?
What information is shown in The Latest Logs widget?
• #: Entry rank.
• Time: Date and time the log was created.
• Priority: Severity of the log.
• Category: Type of log generated.
• Message: The actual log message text.
• Source: Source IP address (if applicable).
• Destination: Destination IP address (if applicable).
How can I view detailed System Resource usage?
• Hover over CPU Usage or Memory Usage to see an icon; click it to view a historical usage chart (Figure 188).
• Hover over Active Sessions to see icons; click the Detail icon to go to the Session Monitor screen, or click the Show Active Sessions icon for a usage chart.
The System Resources Chart screen (Figure 188, Table 30) allows you to set a refresh interval for the chart.How do I view and manage the DHCP Table from the Dashboard?
Click the number in the DHCP Table widget on the Dashboard to open the DHCP Table screen (Figure 189).
This screen (Table 31) shows IP addresses assigned to DHCP clients or reserved for specific MAC addresses. You can:
• Set a Refresh Interval for automatic updates or click Refresh Now to update immediately.
• View details: Interface, IP Address, Host Name, MAC Address, Expiration Time, Description.
• Identify static entries via the Reserve checkbox and Description field.
• Create a static entry: Select an existing dynamic entry, check the Reserve box, and click Apply.
• Remove a static entry: Select a static entry, uncheck the Reserve box, and click Apply.
• Click Cancel to close the window.
How do I view and manage logged-in users from the Dashboard?
Click the link in the Number of Login Users widget on the Dashboard to open the Number of Login Users screen (Figure 190).
This screen (Table 32 & Table 44) lists currently logged-in users. You can:
• View details: User ID, Reauth/Lease Time, Session Timeout, Type (login method), IP Address, User Info (account type/group), Created Date, Accounting Status, RADIUS Profile Name.
• Force Logout: Select a user row and click the Logout icon to end their session.
• Refresh: Click the Refresh button to update the list.
How do I view VPN status from the Dashboard?
• VPN Tunnel Status: Click the link in the VPN Status widget to view currently established VPN tunnels (Figure 192, Table 33). You can see the tunnel Name, Encapsulation type, and hash Algorithm. Set a Refresh Interval or click Refresh Now.
• SSL VPN Status: The SSL VPN Status widget (Figure 193) shows the current number of active SSL VPN tunnels versus the maximum allowed.
• VPN Overview (VPN Models): The VPN tab on the Dashboard (Figure 194) provides a detailed overview including:
• Connections/max per type (IPSec/L2TP/SSL).
• In/Out traffic (bps) per type.
• Number of connected tunnels per type (Site to Site/Dynamic/L2TP/SSL).
• Top 5 Logged in VPN Users (per country, per Service Type, online).
• Tunnel Health (Top 5 DPD Failures).
• Top 5 Connectivity Failures.
• Graphical tunnel statistics.
Click the Refresh icon to update this screen.
How do I monitor port statistics?
• Set the Poll Interval (1-60 seconds) and click Set Interval for automatic updates, or click Stop to halt updates.
• View statistics per port: Status (Down, Speed/Duplex), Transmitted Packets (TxPkts), Received Packets (RxPkts), Collisions, Transmission Speed (Tx B/s), Reception Speed (Rx B/s), Up Time.
• Click Switch To Graphic View to see a line graph of Tx/Rx speed over time for a selected port (Figure 196, Table 35). Set Refresh Interval or click Refresh Now on the graph view. Click Switch To Grid View to return to the table.
How do I view interface status and statistics?
• Interface Status (IPv4): View Name, Port/Binding, Status (Inactive, Down, Speed/Duplex, Connected, Disconnected, Up), Zone, IP Address/Netmask, IP Assignment (Static, DHCP Client), Services provided (DHCP, DDNS, RIP, OSPF), and Actions (Renew DHCP, Connect PPPoE/PPTP).
• Tunnel Interface Status: View Name, Status (Active/Inactive icon), Zone, IP Address, My Address, Remote Gateway Address, Mode.
• IPv6 Interface Status: Similar to IPv4 status, showing IPv6 addresses and services.
• Interface Statistics: Click Refresh to update packet stats. View Status, Transmitted Packets (TxPkts), Received Packets (RxPkts), Transmission Speed (Tx B/s), Reception Speed (Rx B/s) for each interface. Click the ‘+’ icon next to an interface name to view virtual interface details if applicable.
How do I use the Traffic Statistics screen?
1. Data Collection:
• Check the ‘Collect Statistics’ box and click Apply to start collecting data. The collection period will be displayed.
• Uncheck the box and click Apply to stop collection.
• Click Reset to revert to the last saved settings.
2. Statistics:
• Select the Interface to monitor.
• Choose the report type from the Sort By dropdown: Host IP Address/User, Service/Port, Web Site Hits, or Country.
• Click Refresh to update the displayed statistics report.
• Click Flush Data to discard all collected statistics for the screen and update the display.
The report shows ranked data based on the ‘Sort By’ selection, including direction (Ingress/Egress) and amount of traffic or hits. Note the limits on records, byte count, and hit count (Table 38).
What are the maximum values for Traffic Statistics reports?
| LABEL | DESCRIPTION |
|---|---|
| Maximum Number of Records | 20 |
| Byte Count Limit | 264 bytes; this is just less than 17 million terabytes. |
| Hit Count Limit | 264 hits; this is over 1.8 x 1019 hits. |
How do I monitor active sessions?
• Use the View dropdown to display sessions grouped by users, services, source IP, source region, destination IP, destination region, or view all sessions individually.
• When viewing ‘all sessions’, you can filter by User, Service, Source Address, Destination Address, Source Country, and Destination Country. Enter criteria and click Search.
• View session details: User, Service (protocol), Source IP/Port/Country, Destination IP/Port/Country, Rx Bytes, Tx Bytes, Duration (seconds).
• Click Refresh to update the list.
• To terminate sessions: Select one or more sessions and click Clear, or click Clear All to terminate all displayed sessions. Terminated sessions are logged in Log > View Log.
How do I view and manage the DHCP server table?
• Filter the list by selecting an Interface and/or entering a Keyword, then click Search.
• Click Reset to clear filters.
• View lease details: Interface, IP Address, Host Name, MAC Address, Expiration Time, Last Access Time, Description, Static (Yes/No).
• Release a dynamic lease: Select the entry and click Release.
• Reserve an IP (Static DHCP): Select a dynamic entry and click Reserve.
• Unreserve an IP (Make Static Dynamic): Select a static entry and click Unreserve.
• Export the table: Select entries and click Export to save as a CSV file. This file can be imported later in Configuration > Network > Interface > Ethernet/VLAN > DCHP Setting.
How do I use the Device Insight screen?
• View client details: Status (Online, Offline, Blocked, CDR Blocked), MAC/IP Address, Hostname, Manufacturer, Category, OS, Type, First/Last Seen, User, Auth Method, TX/RX Rate, Connected To, Description.
• Toggle Hide/Show Advanced Settings for more/less detail.
• Edit Description: Select a client and click Edit, or double-click the entry (Figure 203, Table 42). Enter a descriptive name and click OK.
• Remove inactive client: Select a client that is no longer connected and click Remove (cannot remove blocked clients).
• Block/Unblock client: Select a client and click Add to block list or Remove from block list.
• Provide Feedback: If a client is misidentified, select it and click Feedback (Figure 204, Table 43). Correct the Category, Operating System, or Type as needed and click OK to send feedback to Zyxel.
How do I view currently logged-in users?
• View user details: User ID, Reauth/Lease Time, Session Timeout, Login Type, IP Address, Country, MAC Address, User Info, Accounting Status, RADIUS Profile Name, Created Date.
• Force Logout: Select a user and click the Force Logout icon.
• Refresh: Click the Refresh button to update the list.
How do I monitor IGMP statistics?
• View details: Group, Source IP, Incoming Interface, Packet Count, Bytes transferred, Outgoing Interface.
• Click Refresh to update the statistics.
How do I check the DDNS status?
• View status per profile: Profile Name, Domain Name, Effective IP (resolved IP), Last Update status (Successful/Updating), Last Update Time.
• Click Update next to an entry to force the Zyxel Device to attempt to resolve the IP address for that domain name and update the DDNS server.
• Click Refresh to update the displayed information.
How do I view IP/MAC Binding information?
• Select the Interface from the dropdown menu.
• View details: IP Address, Host Name, MAC Address, Last Access time, Description.
• Click Refresh to update the information.
How do I check the Cellular connection status?
• View basic status: Extension Slot, Connected Device model, Status (e.g., No device, No Service, Device detected, Active, Device ready, etc.), Service Provider, Cellular System type, Signal Quality.
• Click Refresh to update the status.
• For more details (requires attached/activated device), click More Information (Figure 210, Table 49). This shows Signal Strength (dBm), Device Manufacturer/Model/Firmware, IMEI/ESN, and SIM Card IMSI. Click Cancel to close the detailed view.
How do I view and manage UPnP Port Status?
• View rule details: Remote Host (source IP), External Port, Protocol (TCP/UDP), Internal Port, Internal Client (IP or name), Internal Client Type, Description.
• Remove a rule: Select the entry and click Remove.
• Remove all rules: Click Delete All.
• Click Refresh to update the list.
How do I check USB Storage status?
• View information: Device Description, Usage (used/total %), File System (shows Unknown if unsupported like NTFS), Speed, Status (Ready, Unused, none), Detail (Deactivated, OutofSpace, Mounting, Removing, none).
• If Status is Ready: Click Remove Now to safely unmount the device before removing it.
• If Status is Unused (and file system is supported): Click Use It to mount the device.
How do I view Ethernet Neighbor information?
• View discovered neighbor details: Local Port (on Zyxel Device), Model Name, System Name, Firmware Version, Port (first internal port on neighbor), IP Address, MAC Address.
• Click Refresh to update the information.
How do I view FQDN Object cache?
• View IPv4 or IPv6 cache lists separately.
• Select a configured FQDN Object from the dropdown to filter the list for related caches.
• View cache details: Name (of FQDN object), FQDN, IP Address (mapped IP), TTL (seconds remaining in cache).
• Click Refresh to update the displayed cache information.
Note: FQDN objects are configured in Configuration > Object > Address/Geo IP.
How do I monitor AP Radio List information?
• View list of AP radios: Loading status, AP Description, Frequency Band, Channel ID, Tx Power, Station count, Rx/Tx bytes, Model, MAC Address, Radio number, Operating Mode.
• Click Refresh to update the list.
• Check ‘Enable Column Freeze’ to lock index columns while scrolling.
• Click the More Information icon for a selected radio to see detailed statistics (traffic, station count, SSID info, etc.) for the last 24 hours (Figure 216, Table 55). Click OK or Cancel to close the detailed view.
How do I view SSID information?
• View information per SSID: Name, Number of connected clients on 2.4GHz/5GHz/6GHz bands, SSID Profile Name, Security Mode.
• Click the number link in the 2.4GHz, 5GHz, or 6GHz column to go to the Station Info > Station List screen, filtered for that SSID and band.
• Click Refresh to update the screen.
How do I view and filter the wireless station list?
• View connected station details: MAC Address, SSID Name, Associated AP, IP Address, Channel, Rx/Tx Rate, Signal Strength, Association Time, etc. Use Hide/Show Advanced Settings for more/less detail.
• Click Show Filter to reveal filtering options.
• Enter criteria: IP Address, SSID Name (multi-select), Security Mode (multi-select), Associated AP (multi-select), MAC Address, Band, Account, Login Type.
• Click Search to apply filters. Click Reset to clear filters.
• Click Refresh to update the list.
• Check ‘Enable Column Freeze’ to lock index columns.
How do I view top wireless station statistics?
• Top N Stations: Go to Monitor > Wireless > Station Info > Top N Stations (Figure 219, Table 58). Select View (Top 5 or Top 10 by Usage), Usage by (GB or MB), and Date range. The graph shows traffic usage for the top stations. Click Refresh to update.
• Single Station: Go to Monitor > Wireless > Station Info > Single Station (Figure 220, Table 59). Select the specific Station from the dropdown, Usage by (GB or MB), and Date range. The graph shows download and upload traffic for that station. Click Refresh to update.
How do I monitor and manage IPSec VPN connections?
• View active IPSec Security Associations (SAs).
• Filter the list by Name or Policy using keywords or regular expressions (see Section 7.22.1 for regex help) and click Search.
• View SA details: User (if EAP/X-auth), System Name, SA Name, Policy, My Address, Secure Gateway, Up Time, Timeout remaining, Inbound Bytes, Outbound Bytes.
• Disconnect an SA: Select the SA and click Disconnect.
• Check Connection: Select the SA and click Connection Check.
• Click Refresh to update the list.
How do I monitor and manage SSL VPN connections?
• View active SSL VPN user connections.
• View details: User account, Access (application), Login Address, Connected Time, Inbound Bytes, Outbound Bytes.
• Terminate a connection: Select the user connection and click Disconnect. This removes the entry and deletes session information.
• Click Refresh to update the list.
How do I monitor and manage L2TP over IPSec VPN sessions?
• View connected L2TP VPN sessions.
• View details: User Name, Hostname, Assigned IP (tunnel IP), Public IP (user’s internet IP).
• Disconnect a session: Select the session and click Disconnect.
• Click Refresh to update the list.
How do I monitor Content Filter statistics?
• Enable Collection: On either tab, check ‘Collect Statistics’ and click Apply to start collecting data (Figure 224, 225; Table 63, 64). Collection starts from the displayed time. Statistics are erased on device restart or by clicking Flush Data.
• Update/Clear Stats: Click Refresh to update the display. Click Flush Data to discard all statistics for the current tab.
• Web Content Filter Tab (Table 63): View summary statistics like Total Web Pages Inspected, Blocked counts (by category, custom service, restricted features, forbidden sites, URL keywords), Warned count, and Passed count.
• DNS Content Filter Tab (Table 64): View summary statistics like Total DNS Inspected, Redirected count, and Passed count.
• Click Reset on either tab to return to last-saved settings.
How do I monitor Anti-Spam statistics and status?
• Summary Tab (Figure 226, Table 65):
• Enable Collection: Check ‘Collect Statistics’ and click Apply. Start time is displayed. Stats erased on restart/Flush Data.
• Update/Clear Stats: Click Refresh to update. Click Flush Data to discard stats.
• View Email Summary: Total Scanned, Safe Mails (Total, By White List), Spam Mails (Total, By Black List, By Malicious Mail, By DNSBL), Query Timeouts, Sessions Forwarded/Dropped (when threshold reached).
• View Statistics: Select Top Sender By (Sender IP or Sender Email Address) to see top spam sources and occurrence count.
• Click Reset to return to last-saved settings.
• Status Tab (Figure 227, Table 66):
• Resource Status: View Concurrent Mail Session Scanning load (current/max/historical high).
• Mail Scan Statistics: View queries, average response time, and no responses for Mail Scan and IP Reputation services.
• DNSBL Statistics: View queries, average response time, and no responses for configured DNSBL domains.
• Click Refresh to update status. Click Flush to clear DNSBL stats and the scanning historical high.
How do I view and filter logs?
• View Logs: Regular logs display in black, alerts in red. Columns are sortable.
• Filter Logs: Click Show Filter. Select Category (All Logs, specific category, Debug Log). Optionally filter by Priority, Source/Destination Address, Source/Destination Interface, Service, Keyword, Protocol. Click Search to apply filters. Filter settings are saved if you navigate away.
• Email Logs: Click Email Log Now to send unsent logs matching configured active categories to configured email addresses.
• Refresh/Clear: Click Refresh to update the log view. Click Clear to delete the entire log.
• View Details: Time, Priority, Category, Message, Source, Destination, Note.
What features are available without a license?
• MONITOR: Traffic Statistics, Wireless, VPN Monitor, Log.
• CONFIGURATION: Wireless, Network, VPN, BWM, Web Authentication, Security Policy, Object, System, Log & Report.
• MAINTENANCE: File Manager, Diagnostics, Packet Flow Explore, Shutdown/Reboot.
Note: Security services like Content Filtering, Anti-Spam, IDP, etc., require licenses.
How do I register my Zyxel Device and manage licenses?
• Register: Click the portal.myzyxel.com link (Figure 229) to register your device. Ensure the device has Internet access.
• Refresh Registration Status: After registering or making changes on the portal, click Refresh on the Registration tab (Figure 229) to update the ‘Device Registration Status’.
• View Service Status: Click the Service tab (Figure 231, Table 69) to see the Status (Activated, Expired, Not Licensed, etc.), Service Type (Standard, Trial), Expiration Date, and Count (if applicable) for your subscription services.
• Activate/Renew/Buy Licenses:
• Use the Action column on the Service tab: Click Buy to purchase a new license, or Renew to extend an expired Standard license. This usually involves going to the MyZyxel portal.
• If you have purchased an iCard (license key), register it on portal.myzyxel.com.
• After purchasing/registering, click Activate in the Action column (if available) or click the Service License Refresh button to update the license status on the device.
Note: License updates require TCP port 443 to be allowed outbound.
How do I configure the Built-in AP?
• General Tab (SSID Summary – Figure 232, Table 70):
• Manage SSIDs: Add, Edit, Activate, or Inactivate SSID profiles (up to 4).
• Quick Setup: Launch the Wireless Setup Wizard.
• Dynamic Channel Selection (DCS): Apply DCS to selected APs (if applicable, usually configured under Radio).
• Click Apply to save changes, Reset to discard.
• Radio Tab (Figure 234, Table 72): Configure 2.4GHz and 5GHz radio settings including 802.11 Band, Channel Width, Channel Selection (DCS/Manual), Output Power, advanced settings like Guard Interval, Aggregation, Thresholds, Beacon/DTIM intervals, Signal Thresholds, and Multicast settings.
How do I add or edit an SSID profile for the Built-in AP?
Configure the following main settings:
• Activate: Enable or disable the profile.
• SSID: Enter the network name (up to 32 characters).
• Band Mode: Choose 2.4 GHz or 5 GHz.
• Outgoing Interface: Select the LAN interface.
• Security Mode: Choose security type (e.g., open, wpa2, wpa3). Configure relevant settings like Pre-Shared Key (for Personal modes) or RADIUS settings (for Enterprise modes).
• Optional Settings: Configure QoS, Hidden SSID, Intra-BSS blocking, U-APSD, ARP Proxy, Scheduling, MAC Authentication, MAC Filtering, etc.
• Click OK to save the profile, or Cancel to discard.
What are the Security Mode options when configuring an SSID?
• open: No security. Allows any client to connect without authentication.
• wep: Older, less secure encryption method.
• wpa2: Standard WPA2 security. Can be used in Personal (Pre-Shared Key) or Enterprise (802.1x/RADIUS) mode.
• wpa2-mix: Allows both WPA2 and older WPA clients to connect (transitional mode).
• wpa3: Latest security standard, offering enhanced protection. Can be used in Personal or Enterprise mode.
You must configure additional settings based on the chosen mode (e.g., Pre-Shared Key for Personal, RADIUS server settings for Enterprise).How do I configure Radio settings for the Built-in AP?
• 802.11 Band: Select the allowed Wi-Fi standards (e.g., 11b/g/n, 11ax for 2.4GHz; 11a/n, 11ac, 11ax for 5GHz).
• Channel Width: Set the channel width (e.g., 20MHz, 20/40MHz, 20/40/80MHz).
• Channel Selection: Choose DCS (automatic) or Manual. If Manual, specify the channel(s). Configure DCS options like Client Aware, Selection Method, Deployment, Time Interval/Schedule.
• Output Power: Set the transmission power (dBm).
• Advanced Settings: Configure Guard Interval, A-MPDU/A-MSDU Aggregation limits, RTS/CTS Threshold, Beacon Interval, DTIM period.
• Signal Threshold: Enable and set thresholds for minimum connection signal and dissociation signal strength. Configure retry options.
• Multicast Settings: Configure Transmission Mode (Multicast to Unicast / Fixed Rate) and the Multicast Rate (Mbps) if fixed.
• Click Apply to save changes, Reset to discard.
What is Dynamic Channel Selection (DCS)?
What is Wireless Load Balancing?
• Load balancing by station number: Limits the maximum number of devices that can connect to the AP.
• Load balancing by traffic level: Limits the total bandwidth usage allowed for connected devices. Connections are allowed as long as the total usage is below the configured cap.
When the limit (station number or traffic level) is reached, new connections may be rejected or delayed, potentially being directed to other nearby APs if available.What are the different types of interfaces on the Zyxel Device?
• Ethernet: The foundation for most network connections, bound to physical ports or port groups.
• PPP: For Point-to-Point Protocol connections like PPPoE, PPTP, L2TP, typically requiring ISP accounts.
• Cellular: For connections using a mobile broadband card.
• VLAN: Logical interfaces that receive/send tagged frames, dividing a physical network into multiple logical ones. Each VLAN is associated with one Ethernet interface.
• Bridge: Software connection merging multiple Ethernet or VLAN interfaces into a single L2 segment.
• Tunnel: For Generic Routing Encapsulation (GRE), IPv6 in IPv4, or 6to4 tunnels.
• Virtual (VTI): Used for route-based VPNs (IPSec).
• Port Group: Hardware L2 connection grouping multiple physical ports (created via Port Role/Port Group screens).
• Trunk: Manages load balancing between multiple interfaces.
What are the relationships between different interface types?
• Ethernet interfaces require a physical port or port group.
• VLAN interfaces require an Ethernet interface.
• Bridge interfaces require Ethernet or VLAN interfaces.
• PPP interfaces can be built on Ethernet, VLAN, or bridge interfaces (or specific WAN/OPT ports).
• Virtual interfaces (Ethernet, VLAN, Bridge) require the corresponding base interface type.
• Trunk interfaces require Ethernet, Cellular, VLAN, bridge, or PPP interfaces.
Note: You cannot create PPP or virtual interfaces on an interface that is part of a bridge. You also cannot add an interface to a bridge if it already has a PPP or virtual interface configured on it.
How do I configure Port Roles?
• Use the radio buttons in the matrix to select the desired ZONE interface for each physical port.
• Be aware that changing the role of a port you are connected through may change its IP address, potentially requiring you to adjust your computer’s IP or reconnect using the new interface IP.
• Click Apply to save changes.
• Click Reset to revert to the last saved configuration.
Note: This feature may not be available on all models.
How do I configure Port Groups?
How do I configure physical port settings?
• Select a port entry and click Edit.
• In the Settings dropdown, choose the desired speed and duplex mode:
• Auto Negotiate (Recommended): Allows the port to automatically determine the best speed/duplex with its peer.
• Manual Settings (e.g., 1000Mbps-Full Duplex, 100Mbps-Full Duplex, 100Mbps-Half Duplex, etc.): Forces the port to use the selected mode. Ensure the peer port is configured identically if not using Auto Negotiate.
• Click OK in the edit window.
• Click Apply on the main screen to save changes.
• Click Reset to revert to the last saved configuration.
Note: Speed and duplex cannot be configured for fiber ports.
How do I manage Ethernet interfaces?
• View Interfaces: See both IPv4 (Configuration) and IPv6 (IPv6 Configuration) interfaces, their status, name, description, IP address, and mask.
• Edit: Select an interface and click Edit (or double-click) to configure its settings (IP assignment, parameters, RIP, OSPF, DHCP, etc. – see Section 10.5.1, Figure 245).
• Activate/Inactivate: Select an interface and click Activate or Inactivate to enable/disable it.
• Create Virtual Interface: Select a base Ethernet interface and click Create Virtual Interface to add a virtual interface on top of it.
• Remove Virtual Interface: Select a virtual interface (e.g., lan1:1) and click Remove.
• References: Select an interface and click References to see where it’s used in the configuration.
• Apply/Reset: Click Apply to save changes, Reset to revert.
Important Note: Ensure WAN and LAN IPv4 subnets do not conflict. The device may automatically change the default LAN subnet (e.g., 192.168.1.0/24 to 192.168.10.0/24) upon detecting a conflict with the WAN IP if the LAN is still using default settings (Figure 241, 242).
How do I edit Ethernet interface settings?
• General Settings: Enable/disable the interface.
• Interface Properties: View/set Type, Name, Port, Zone, MAC Address (Use Default, Overwrite, Clone), Description.
• IP Address Assignment:
• Get Automatically (DHCP Client): Obtain IP, subnet mask, gateway via DHCP. Can configure DHCP Option 60.
• Use Fixed IP Address: Manually assign IP Address, Subnet Mask, Gateway.
• Set Metric (routing priority, lower is preferred).
• Enable IGMP Support: Configure as IGMP Upstream or Downstream for IGMP Proxy (Section 10.5.1.1).
• Interface Parameters: Set Egress/Ingress Bandwidth limits (Kbps), MTU size (Bytes).
• Connectivity Check: Enable checks (ICMP/TCP/HTTP) to verify gateway or specified addresses are reachable. Configure Check Method, Period, Timeout, Fail Tolerance.
• RIP Setting: Enable RIP, set Direction (Send/Receive/Both), Send/Receive Versions, V2-Broadcast.
• OSPF Setting: Assign to OSPF Area, set Priority, Link Cost, Passive Interface option, Authentication.
• MAC Address Setting: Choose to use default, overwrite, or clone MAC address.
• Proxy ARP: Enable and add IP addresses for which the device should answer ARP requests.
• Related Setting: Link to configure PPPoE/PPTP if applicable.
• Click OK to save changes to the interface, then Apply on the summary screen.
How do I configure an internal Ethernet interface?
General Settings:
Enable Interface: Check this box to enable the interface.
Interface Properties:
Interface Type: Set to ‘internal’.
Interface Name: e.g., lan1 (read-only for default interfaces).
Port: Displays the physical ports assigned (e.g., P3, P4, P5).
Zone: Select the security zone (e.g., LAN1).
MAC Address: Displays the interface’s MAC address (read-only).
Description: Enter an optional description.
IP Address Assignment:
IP Address: Enter the static IP address for this interface (e.g., 192.168.1.1).
Subnet Mask: Enter the subnet mask (e.g., 255.255.255.0).
Enable IGMP Support: Optionally enable IGMP proxy functions (Upstream/Downstream).
Interface Parameters:
Egress Bandwidth: Set the outgoing bandwidth limit (Kbps).
Ingress Bandwidth: Set the incoming bandwidth limit (Kbps).
MTU: Set the Maximum Transmission Unit size in bytes (e.g., 1500).
Connectivity Check (Optional):
Enable Connectivity Check: Check to enable.
Check Method: Select ‘icmp’ or ‘tcp’.
Check Period: Enter the interval in seconds (5-600).
Check Timeout: Enter the timeout in seconds (1-10).
Check Fail Tolerance: Enter the number of failures before considering the connection down (1-10).
Check These Addresses: Specify IP addresses or domain names to check.
Probe Succeeds When: Choose if ‘any one’ or ‘all’ addresses must respond.
DHCP Setting:
DHCP: Select ‘DHCP Server’.
IP Pool Start Address: Enter the starting IP address for the DHCP pool (e.g., 192.168.1.33).
Pool Size: Enter the number of addresses in the pool (e.g., 200).
First/Second/Third DNS Server: Configure DNS servers for clients (e.g., ZyWALL, None, Custom).
First/Second WINS Server (Optional): Configure WINS servers.
Default Router: Set the default gateway for clients (e.g., lan1 IP).
Lease Time: Set the DHCP lease duration (e.g., infinite, 2 days).
Extended Options (Optional): Add custom DHCP options.
PXE Server (Optional):
PXE Server: Enter the IP address of the PXE server.
PXE Boot Loader File: Enter the boot loader filename.
IP/MAC Binding (Optional):
Enable IP/MAC Binding: Check to enforce IP/MAC binding.
Enable Logs for IP/MAC Binding Violation: Check to log violations.
Static DHCP Table: Add static DHCP entries (IP, MAC, Description).
RIP Setting (Optional):
Enable RIP: Check to enable RIP.
Direction: Select BiDir, In-Only, or Out-Only.
Send/Receive Version: Select RIP version (1, 2, or 1 and 2).
V2-Broadcast: Optionally enable broadcast for RIPv2.
OSPF Setting (Optional):
Area: Select the OSPF area or ‘none’ to disable.
Priority: Set the OSPF priority (0-255).
Link Cost: Set the OSPF cost (1-65535).
Passive Interface: Check to make the interface passive.
Authentication: Configure OSPF authentication (None, Text, MD5).
Click OK to save the settings.
How do I configure an OPT (general) Ethernet interface?
General Settings:
Enable Interface: Check this box.
Interface Properties:
Interface Type: ‘general’.
Interface Name: e.g., opt.
Port: Displays the physical port (e.g., P6).
Zone: Select the security zone (e.g., OPT).
MAC Address: Displays the MAC address.
Description: Optional description.
IP Address Assignment:
Get Automatically: Select this to obtain an IP via DHCP. Optionally specify DHCP Option 60.
Use Fixed IP Address: Select this to assign a static IP.
IP Address: Enter static IP (e.g., 0.0.0.0 if unused or a specific IP).
Subnet Mask: Enter static subnet mask.
Gateway: Enter static default gateway IP.
Metric: Set the metric for the gateway (0-15).
Enable IGMP Support: Optional.
Interface Parameters:
Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).
MTU: Set MTU size (Bytes).
Connectivity Check (Optional): Configured similarly to the internal interface.
DHCP Setting:
DHCP: Usually set to ‘None’ for a general interface unless acting as a relay or server for a specific scenario.
Enable IP/MAC Binding: Optional.
Static DHCP Table: Optional.
RIP Setting (Optional): Configure as needed.
OSPF Setting (Optional): Configure as needed.
MAC Address Setting:
Use Default MAC Address: Use the factory default MAC.
Overwrite Default MAC Address: Manually specify a MAC or clone from a host.
Proxy ARP (Optional):
Enable Proxy ARP: Check to enable.
Add IP Address/Range: Define target IP addresses for ARP responses.
Related Settings: Optionally configure PPPoE/PPTP, WAN TRUNK, or Policy Route.
Click OK to save.
What are the configurable fields when editing an Ethernet interface?
General Settings
Enable Interface: Enable or disable the interface.
General IPv6 Setting
Enable IPv6: Enable or disable IPv6 on this interface.
Interface Properties
Interface Type: Select internal, external, or general (configurable for OPT interface only). Determines automatic configuration adjustments (routing, SNAT, DHCP options).
Interface Name: Specify a unique name (alphanumeric, hyphens, underscores, up to 11 characters).
Port: Displays the physical port name (read-only).
MAC Address: Displays the interface’s MAC address (read-only).
Description: Optional description (up to 60 characters).
IP Address Assignment (IPv4)
Get Automatically: (External/General) Use DHCP to get IP configuration.
DHCP Option 60: (External/General with Get Auto) Specify Vendor Class Identifier (VCI) string for DHCP server identification.
Use Fixed IP Address: (External/General) Manually configure IP settings.
IP Address: Enter the IPv4 address.
Subnet Mask: Enter the IPv4 subnet mask.
Gateway: (External/General) Enter the default gateway IP address.
Metric: (External/General) Set the gateway priority (lower number = higher priority).
Enable IGMP Support: Enable IGMP proxy functionality.
IGMP Upstream: Enable on the interface connecting towards the multicast server.
IGMP Downstream: Enable on the interface connecting to multicast hosts.
IPv6 Address Assignment
Enable Stateless Address Auto-configuration (SLAAC): Generate IPv6 address from prefix obtained from an IPv6 router.
Link-Local Address: Displays the generated IPv6 link-local address (read-only).
IPv6 Address/Prefix Length: Enter a static IPv6 address and prefix length (optional).
Gateway: Enter the IPv6 default gateway address.
Metric: Set the IPv6 gateway priority.
Address from DHCPv6 Prefix Delegation: Configure prefix delegation.
Delegated Prefix: Select a DHCPv6 request object.
Suffix Address: Enter the suffix and prefix length to append to the delegated prefix.
Address: Displays the combined IPv6 address (read-only after saving).
DHCPv6 Setting
DHCPv6: Select N/A, Client, Server, or Relay.
DUID: Displays the DHCP Unique Identifier.
DUID as MAC: Generate DUID from default MAC address.
Customized DUID: Enter a custom DUID.
Enable Rapid Commit: Shorten DHCPv6 message exchange (requires client support).
Information Refresh Time: (Client) Seconds to wait before refreshing info.
Request Address: (Client) Request an IPv6 address from the server.
DHCPv6 Request/Lease Options: Configure options to request (Client) or offer (Server).
Relay Server: (Relay) Specify DHCPv6 server IP address.
IPv6 Router Advertisement Setting
Enable Router Advertisement: Enable periodic RA messages.
Advertised Hosts Get Network Configuration From DHCPv6: Indicate hosts should use DHCPv6 for network settings.
Advertised Hosts Get Other Configuration From DHCPv6: Indicate hosts should use DHCPv6 for DNS information.
Router Preference: Set router preference (Low, Medium, High).
MTU (IPv6): Set IPv6 Maximum Transmission Unit.
Hop Limit: Set IPv6 hop limit.
Advertised Prefix Table: Configure fixed IPv6 prefixes to advertise.
Advertised Prefix from DHCPv6 Prefix Delegation: (Internal) Configure network prefix using a delegated prefix.
Interface Parameters (IPv4/IPv6)
Egress Bandwidth: Outgoing bandwidth limit (Kbps).
Ingress Bandwidth: Incoming bandwidth limit (Kbps).
MTU: Maximum Transmission Unit (Bytes).
Connectivity Check (IPv4 – External/General)
Enable Connectivity Check: Enable the check.
Check Method: Select icmp or tcp.
Check Period: Interval in seconds (5-600).
Check Timeout: Timeout in seconds (1-10).
Check Fail Tolerance: Number of failures before marking down (1-10).
Check Default Gateway: Use the default gateway for the check.
Check this address: Specify a custom IP or domain name for the check.
Check Port: (TCP only) Specify the port number.
Check These Addresses: Specify up to two IPs or domain names.
Probe Succeeds When: Select ‘any one’ or ‘all’ for multi-address checks.
DHCP Setting (IPv4 – Internal/General)
DHCP: Select None, DHCP Relay, or DHCP Server.
Relay Server 1 / Relay Server 2: (Relay) Specify DHCP server IPs.
IP Pool Start Address: (Server) Starting IP of the pool.
Pool Size: (Server) Number of IPs in the pool.
DNS Server(s): (Server) Specify DNS servers for clients (Custom Defined, From ISP, Zyxel Device).
WINS Server(s): (Server) Specify WINS servers.
Default Router: (Server) Specify default gateway for clients (Interface IP, Custom Defined).
Lease Time: (Server) Set lease duration (infinite, days/hours/minutes).
Extended Options: (Server) Configure additional DHCP options.
PXE Server (IPv4 – Internal)
PXE Server: IP address of the PXE server.
PXE Boot Loader File: Filename of the boot loader.
IP/MAC Binding (IPv4 – Internal/General)
Enable IP/MAC Binding: Enforce static IP/MAC mapping.
Enable Logs for IP/MAC Binding Violation: Log binding violations.
Static DHCP Table: Configure static IP assignments based on MAC address.
Import/Export: Import/Export static DHCP entries via CSV.
RIP Setting (IPv4/IPv6)
Enable RIP: Enable RIP protocol.
Direction: BiDir, In-Only, Out-Only.
Send Version: RIP version for sending (1, 2, 1 and 2).
Receive Version: RIP version for receiving (1, 2, 1 and 2).
V2-Broadcast: Use broadcast instead of multicast for RIPv2.
OSPF Setting (IPv4/IPv6)
Area: OSPF area ID or ‘none’.
Priority: OSPF router priority (0-255).
Link Cost: OSPF interface cost (1-65535).
Passive Interface: Prevent sending OSPF hellos.
Authentication: Configure OSPF authentication (Same-as-Area, None, Text, MD5).
MAC Address Setting (External/General)
Use Default MAC Address: Use the factory MAC.
Overwrite Default MAC Address: Specify a custom MAC or clone from host.
Proxy ARP (IPv4 – External/General)
Enable Proxy ARP: Enable the feature.
Add: Add target IP addresses or ranges for which the device will answer ARP requests.
Related Settings
Configure PPPoE/PPTP: Link to PPPoE/PPTP configuration.
Configure WAN TRUNK: Link to WAN Trunk configuration.
Configure Policy Route: Link to Policy Route configuration.
How does Proxy ARP work?
Normally, ARP requests are broadcast only within the same subnet. If a host (Sender) on an external network (e.g., WAN Subnet A) needs the MAC address of a target IP address that resides on an internal network (e.g., LAN Subnet B) with the same network IP range, its ARP broadcast won’t reach the target because routers don’t forward these layer-2 broadcasts.
When Proxy ARP is enabled on the Zyxel Device’s external interface, and the target IP address matches an entry configured in the Proxy ARP list:
1. The Zyxel Device receives the ARP request from the Sender on its external interface.
2. Instead of forwarding the broadcast, the Zyxel Device replies to the ARP request using its own external interface’s MAC address.
3. The Sender updates its ARP table, associating the target IP address with the Zyxel Device’s external MAC address.
4. Subsequent packets from the Sender destined for the target IP address are sent to the Zyxel Device’s external MAC address.
5. The Zyxel Device receives these packets and forwards them to the actual target device on the internal network.
To configure it, you need to enable Proxy ARP on the external/general interface and add the specific internal IP addresses (or ranges/CIDR blocks) that the Zyxel Device should respond for.
How do I add a Proxy ARP entry?
Interface Name: This field shows the interface you are configuring (read-only).
Address Type: Select the type of target address:
IPv4 Address: For a single host IP.
IPv4 CIDR: For a subnet (e.g., 192.168.1.0/24).
IPv4 Range: For a range of IPs (e.g., 192.168.1.100-192.168.1.150).
Enter the target IP address information based on the selected type.
6. Click OK to add the entry. 7. Click OK on the main interface edit screen to save the changes.How do I create a Virtual Interface?
Interface Properties:
Interface Name: Automatically derived from the underlying interface (e.g., wan2:1). (Read-only)
Description: Enter an optional description.
IP Address Assignment:
IP Address: Enter the static IP address for this virtual interface.
Subnet Mask: Enter the subnet mask for this virtual interface.
Gateway: Enter the default gateway IP address (optional, must be on the same network).
Metric: Enter the priority for the gateway (0-15).
5. Click OK to create the virtual interface.How do I use the References screen?
The screen typically shows:
Name (at the top): The object you selected.
#: Sequential number.
Service: The type of configuration using the object (e.g., Policy Route, Security Policy, NAT Rule). Clicking the service name often navigates to that configuration section.
Priority: The position of the item in its list, if applicable (e.g., policy route number).
Name: The specific name of the configuration item using the object (e.g., the policy route name).
Description: The description of the configuration item, if configured.
You can use the Refresh button to update the list. Click Cancel to close the References screen.
This screen is useful for understanding where an object is used before deleting or modifying it, helping to avoid unintended consequences.
How do I add or edit DHCPv6 Request/Lease Options?
Click the ‘Add’ button below the table.
The ‘Add Request Object’ (or similar) window appears.
Select one object: Choose a pre-configured DHCPv6 request or lease object from the dropdown list. You may need to create these objects beforehand (e.g., via the ‘Create new Object’ button on the main interface screen if available, or in the Object > DHCPv6 Option menu).
Click OK.
5. To edit an option: This typically involves editing the referenced DHCPv6 request/lease object itself in the Object menu, not directly in this table. 6. To remove an option:Select the entry in the table.
Click the ‘Remove’ button below the table.
7. Click OK on the main interface edit screen to save changes.How do I add or edit DHCP Extended Options (Option 43, 66, etc.)?
Click the ‘Add’ button.
The ‘Add DHCP Option’ window appears.
Option: Select the desired DHCP option from the dropdown list (e.g., TFTP Server Name (66), VIVC (124), SIP Server (120)) or select ‘User Defined’ for custom options.
Name: Displays the standard name or allows you to enter a name for ‘User Defined’.
Code: Displays the standard option code or allows you to enter a code for ‘User Defined’.
Type: Displays the required data type (e.g., TEXT, IP, BOOLE) or allows selection for ‘User Defined’.
Value: Enter the appropriate value based on the selected option and type. For options requiring IP addresses (like TFTP Server, NTP Server, SIP Server), you can enter one or more IPs.
Click OK.
6. To Edit an option:Select the option in the table.
Click the ‘Edit’ button.
Modify the values in the ‘Edit DHCP Option’ window.
Click OK.
7. To Remove an option:Select the option in the table.
Click the ‘Remove’ button.
8. Click OK on the main interface edit screen to save changes. Available Standard Options (Table 83):| OPTION NAME | CODE | DESCRIPTION |
|---|---|---|
| Time Offset | 2 | Specifies the offset of the client’s subnet in seconds from Coordinated Universal Time (UTC). |
| Time Server | 4 | Specifies a list of Time servers available to the client. |
| NTP Server | 42 | Specifies a list of the NTP servers available to the client by IP address. |
| TFTP Server Name | 66 | Used to identify a TFTP server when the “sname” field has been used for other DHCP options. Min length 1. |
| Bootfile | 67 | Used to identify a bootfile when the “file” field has been used for other DHCP options. Min length 1. |
| SIP Server | 120 | Carries an IPv4 address or DNS domain name for SIP client server location. |
| VIVC | 124 | Vendor-Identifying Vendor Class option. Identifies vendor hardware/software. |
| VIVS | 125 | Vendor-Identifying Vendor-Specific option. Exchange vendor-specific information. |
| CAPWAP AC | 138 | CAPWAP Access Controller addresses option. List of IPv4 addresses for WTPs to discover ACs. |
| TFTP Server | 150 | Contains one or more IPv4 addresses for TFTP server(s). Used for VoIP config download, etc. |
How do I configure a PPP (PPPoE/PPTP/L2TP) interface?
General Settings:
Enable Interface: Check to enable.
General IPv6 Setting (Optional):
Enable IPv6: Check to enable IPv6 over this PPP interface.
Interface Properties:
Interface Name: Enter a name (up to 11 characters).
Base Interface: Select the physical interface (e.g., wan1, sfp) this PPP connection runs over.
Zone: Select the security zone (e.g., WAN).
Description: Optional description.
Connectivity:
Nailed-Up: Connection is always active.
Dial-on-Demand: Connection activates only when traffic needs to pass.
ISP Setting:
Account Profile: Select the pre-configured ISP Account object.
Protocol, User Name, Service Name: Displayed from the selected profile (read-only).
IP Address Assignment (IPv4):
Get Automatically: Obtain IP address from the ISP automatically (most common).
Use Fixed IP Address: Manually specify an IP address provided by the ISP.
IP Address: (Fixed IP only) Enter the static IP.
Gateway: (Fixed IP only, Advanced) Enter gateway IP if needed (usually not required for PPP).
Metric: Set the priority for the gateway (0-15).
IPv6 Address Assignment (if IPv6 enabled):
Enable Stateless Address Auto-configuration (SLAAC): Obtain IPv6 address automatically.
Metric: Set IPv6 gateway priority (0-15).
Address from DHCPv6 Prefix Delegation (Advanced): Configure if your ISP provides a prefix via DHCPv6-PD.
DHCPv6 Setting (if IPv6 enabled):
DHCPv6: Select ‘Client’ to act as a DHCPv6 client or ‘N/A’.
DUID: Configure DUID settings (DUID as MAC / Customized DUID).
Enable Rapid Commit: Optional.
Request Address: Request an IPv6 address via DHCPv6.
DHCPv6 Request Options: Add DHCPv6 request objects.
Interface Parameters:
Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).
MTU: Set Maximum Transmission Unit (Bytes, e.g., 1492 for PPPoE).
Connectivity Check (Optional):
Enable Connectivity Check: Enable the check.
Configure Method, Period, Timeout, Fail Tolerance, Check Default Gateway / Check this address similar to Ethernet interfaces.
Related Setting: Configure WAN TRUNK or Policy Route if needed.
4. Click OK to save the PPP interface configuration.How do I configure a Cellular interface?
General Settings:
Enable Interface: Check to enable.
Interface Properties:
Interface Name: Enter a name (e.g., cellular1).
Zone: Select the security zone (e.g., WAN).
Extension Slot: Displays the selected USB slot (read-only).
Connected Device: Displays the detected dongle model (read-only).
Description: Optional description.
Connectivity:
Nailed-Up: Connection is always active.
Idle timeout: Set time in seconds (0-360) before disconnecting an idle connection (0 = disabled).
ISP Settings:
Profile Selection: Choose ‘Device’ to use profiles stored on the dongle (select Profile 1 unless instructed otherwise) or ‘Custom’ to manually configure.
APN: (Custom or if not on device profile) Enter the Access Point Name provided by your carrier.
Dial String: (Custom or if not on device profile, GSM only) Enter the dial string if provided by your carrier (often includes APN).
Authentication Type: (Custom or if not on device profile) Select None, CHAP, or PAP as required by your carrier.
User Name / Password: (Custom or if not on device profile) Enter credentials if required by your carrier.
SIM Card Setting:
PIN Code: Enter the SIM card PIN if required. Enter it twice (Retype to Confirm).
Interface Parameters:
Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).
MTU: Set Maximum Transmission Unit (Bytes, e.g., 1492).
Connectivity Check (Optional): Configure similarly to Ethernet interfaces.
IP Address:
Get Automatically: Obtain IP address from the carrier (most common).
Use Fixed IP Address: Manually specify a static IP if provided by the carrier.
Metric: Set the gateway priority (0-15).
Device Settings (Advanced):
Network Selection: Choose ‘auto’ or manually select network type (e.g., LTE only, WCDMA only) if supported by the dongle.
Band Selection: Choose ‘auto’ or manually select frequency bands if supported.
Budget Setup (Optional):
Enable Budget Control: Check to enable usage limits.
Time Budget: Set monthly hour limit.
Data Budget: Set monthly Mbyte limit (Download/upload/both).
Reset counters on: Select day of the month to reset counters.
Actions when over budget: Configure logging, new connection behavior (Allow/Disallow), current connection behavior (Keep/Drop).
Actions when over % budget: Configure actions when a percentage threshold is reached.
5. Click OK to save the configuration.How do I configure a Tunnel interface (GRE, IPv6-in-IPv4, 6to4)?
General Settings:
Enable: Check to enable the interface.
Interface Properties:
Interface Name: Enter a name (e.g., tunnel0, tunnel1…).
Zone: Select the security zone (e.g., TUNNEL, IPSEC_VPN).
Tunnel Mode: Select GRE, IPv6-in-IPv4, or 6to4.
IP Address Assignment (for GRE):
IP Address: Enter the IPv4 address for this end of the GRE tunnel.
Subnet Mask: Enter the subnet mask for the tunnel interface.
Metric: Enter the metric for routing purposes (0-15).
IPv6 Address Assignment (for IPv6-in-IPv4 or 6to4):
IPv6 Address/Prefix Length: Optionally enter a static IPv6 address and prefix length for the tunnel interface.
Metric: Enter the metric for routing purposes (0-15).
6to4 Tunnel Parameter (for 6to4):
6to4 Prefix: Enter the IPv6 prefix of the destination network.
Relay Router: Enter the IPv4 address of a 6to4 relay router.
Remote Gateway Prefix: Enter the IPv4 network address and bits of a remote 6to4 gateway.
Gateway Settings:
My Address: Select the source ‘Interface’ or specify a source ‘IP Address’ used to identify this end of the tunnel.
Remote Gateway Address: Enter the IP address or domain name of the remote tunnel endpoint. (Displays ‘Automatic’ for 6to4).
Interface Parameters:
Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).
MTU: Set Maximum Transmission Unit (Bytes, e.g., 1476 for GRE).
Connectivity Check (for GRE, Optional): Configure similarly to Ethernet interfaces.
Related Setting: Configure WAN TRUNK or Policy Route if needed.
4. Click OK to save the tunnel interface.How do I configure a VLAN interface?
General Settings:
Enable Interface: Check to enable.
General IPv6 Setting (Optional):
Enable IPv6: Check to enable IPv6 on this VLAN.
Interface Properties:
Interface Type: Select ‘internal’, ‘external’, or ‘general’. This affects automatic routing/SNAT settings and available DHCP options.
Interface Name: Enter a name (e.g., vlan10).
Zone: Select the security zone (e.g., LAN1, DMZ, CUSTOM_ZONE).
Base Port: Select the physical Ethernet interface this VLAN runs on (e.g., ge3, sfp).
VLAN ID: Enter the VLAN tag number (1-4094).
Priority Code (Advanced): Set the 802.1p priority (0-7).
Description: Optional description.
IP Address Assignment (IPv4): Configure as ‘Get Automatically’ or ‘Use Fixed IP Address’, similar to Ethernet interfaces, depending on the Interface Type selected.
IPv6 Address Assignment (if IPv6 enabled): Configure SLAAC, static addressing, or Prefix Delegation as needed, similar to Ethernet interfaces.
DHCPv6 Setting (if IPv6 enabled): Configure as N/A, Client, Server, or Relay.
IPv6 Router Advertisement Setting (if IPv6 enabled): Configure RA settings.
Interface Parameters: Configure Egress/Ingress Bandwidth and MTU.
Connectivity Check (Optional, for external/general): Configure connectivity checks.
DHCP Setting (IPv4, for internal/general): Configure as None, DHCP Relay, or DHCP Server.
IP/MAC Binding (Optional): Configure static DHCP and IP/MAC binding.
RIP Setting (Optional): Configure RIP.
OSPF Setting (Optional): Configure OSPF.
MAC Address Setting (Optional, for external/general): Configure MAC address override.
Proxy ARP (Optional, for external/general): Configure Proxy ARP.
Related Setting: Configure WAN TRUNK or Policy Route if needed.
4. Click OK to save the VLAN interface.How do I configure a Bridge interface?
General Settings:
Enable Interface: Check to enable.
General IPv6 Setting (Optional):
Enable IPv6: Check to enable IPv6 on this bridge.
Interface Properties:
Interface Type: Select ‘internal’, ‘external’, or ‘general’.
Interface Name: Enter a name (e.g., br0).
Zone: Select the security zone (e.g., LAN1).
Description: Optional description.
Member Configuration:
Available: Lists interfaces that can be added to the bridge.
Member: Lists interfaces currently in the bridge.
Use the >> and << arrows to move interfaces between the Available and Member lists. Note: An interface cannot be added if it has a virtual interface or is part of another bridge. A bridge can contain at most one VLAN interface.
IP Address Assignment (IPv4): Configure as ‘Get Automatically’ or ‘Use Fixed IP Address’.
IPv6 Address Assignment (if IPv6 enabled): Configure SLAAC, static addressing, or Prefix Delegation.
DHCPv6 Setting (if IPv6 enabled): Configure as N/A, Client, Server, or Relay.
IPv6 Router Advertisement Setting (if IPv6 enabled): Configure RA settings.
Interface Parameters: Configure Egress/Ingress Bandwidth and MTU.
DHCP Setting (IPv4, for internal/general): Configure as None, DHCP Relay, or DHCP Server.
IP/MAC Binding (Optional): Configure static DHCP and IP/MAC binding.
Connectivity Check (Optional, for external/general): Configure connectivity checks.
Proxy ARP (Optional, for external/general): Configure Proxy ARP.
Related Setting: Configure WAN TRUNK or Policy Route if needed.
4. Click OK to save the bridge interface.How do I configure a VTI (Virtual Tunnel Interface) for IPSec?
General Settings:
Enable: Check to enable the VTI.
Interface Properties:
Interface Name: Enter a name in vtix format (e.g., vti0).
Zone: Select the security zone (e.g., IPSec_VPN).
vpn-rule: Select the pre-configured VPN Connection rule that uses the VPN Tunnel Interface scenario.
IP Address Assignment:
IP Address: Enter the IPv4 address for this end of the VTI tunnel.
Subnet Mask: Enter the subnet mask for the VTI interface (often a /30 or /31 mask).
Metric: Enter the metric for routing purposes (0-15).
Enable IGMP Support: Optional, enable if multicast routing over VTI is needed.
Interface Parameters:
Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).
RIP Setting (Optional): Configure RIP if needed for dynamic routing over the VTI.
OSPF Setting (Optional): Configure OSPF if needed for dynamic routing over the VTI.
Connectivity Check (Optional): Configure connectivity check for the tunnel endpoint if needed (appears when a vpn-rule is selected).
Related Setting: Configure WAN TRUNK or Policy Route if needed.
4. Click OK to save the VTI. You can now use this VTI interface in static routes or policy routes.How do I configure a WAN Trunk for load balancing or failover?
Name: Enter a descriptive name for the trunk (e.g., Main_Trunk, Failover_Trunk).
Load Balancing Algorithm: Select the desired method:
Least Load First: Sends new sessions to the least utilized member based on current bandwidth usage relative to configured capacity.
Weighted Round Robin: Distributes sessions based on assigned weights (requires configuring weights for members).
Spillover: Fills the first active interface up to its threshold (if set, otherwise its capacity) before sending new sessions to the next active interface.
Load Balancing Index(es) (Least Load First/Spillover): Select which traffic direction(s) the algorithm applies to (Outbound, Inbound, Outbound + Inbound). For Spillover, specify the Egress Bandwidth threshold (Kbps) for each interface before spilling over.
4. Configure Member Interfaces:Click ‘Add’ in the member table section.
Member: Select a WAN interface (e.g., wan1, wan2, ppp0, cellular1) from the dropdown.
Mode: Choose ‘Active’ (interface participates in load balancing/is primary for failover) or ‘Passive’ (interface is used only if all Active members fail). Only one passive member is typically used per trunk.
Weight (Weighted Round Robin only): Assign a weight (1-10).
Bandwidth/Spillover: Displays bandwidth (for LLF) or allows setting the spillover threshold (for Spillover).
Repeat to add all desired WAN interfaces to the trunk.
Use ‘Edit’, ‘Remove’, or ‘Move’ to manage the member list. The order matters for Spillover.
5. Click OK to save the trunk configuration. Setting the Default Trunk: 1. On the main Trunk screen (Configuration > Network > Interface > Trunk). 2. In the ‘Default Trunk Selection’ section:Select ‘SYSTEM_DEFAULT_WAN_TRUNK’ to use the automatic trunk containing all external interfaces.
Select ‘User Configured Trunk’ and choose the trunk you created from the dropdown list to make it the default gateway for traffic not matching any policy routes.
3. Click ‘Apply’. Configuring Failover (Example): 1. Ensure Connectivity Check is configured on the primary WAN interface (e.g., wan1) under its Ethernet/PPP/Cellular settings. 2. Create a User Configured Trunk. 3. Add the primary WAN interface (e.g., wan1) with Mode ‘Active’. 4. Add the backup WAN interface (e.g., wan2) with Mode ‘Passive’. 5. Set the Load Balancing Algorithm to ‘Spillover’. 6. Make this trunk the Default Trunk Selection.How do I configure Policy Routes?
Configuration:
Enable: Check to activate the route.
Description: Enter a descriptive name.
Criteria: Define the traffic this route applies to.
User: Select ‘any’ or a specific user/group object.
Incoming: Select the incoming interface (e.g., ‘any’, ‘lan1’, ‘ge3’). ‘any (Excluding ZyWALL)’ excludes traffic originating from the device itself.
Source Address: Select ‘any’ or an address/geoIP/FQDN object/group.
Destination Address: Select ‘any’ or an address/geoIP/FQDN object/group.
DSCP Code: Select ‘any’, ‘default’, a specific AF code, or ‘User Define’ (requires entering code in User-Defined DSCP Code field).
Schedule: Select ‘none’ for always active (if enabled) or a schedule object.
Service: Select ‘any’ or a service object/group.
Source Port (Advanced): Select ‘any’ or a service object/group for the source port.
Next-Hop: Define where matching traffic should be sent.
Type: Select the next-hop type:
Auto: Use the standard routing table.
Interface: Send out a specific interface towards a directly connected gateway.
Trunk: Send via a configured WAN Trunk.
VPN Tunnel: Send through a specific IPSec VPN tunnel (including VTI).
Gateway: Send to a specific gateway IP address (requires a HOST object for the gateway).
Specify the Interface, Trunk, VPN Tunnel, or Gateway object based on the selected Type.
Auto Destination Address (VPN Tunnel Type, Dynamic Peer): Automatically use the remote peer’s network as the destination.
DSCP Marking: Define how the DSCP value of outgoing packets is handled.
DSCP Marking: Select ‘preserve’, ‘default’, a specific AF value, or ‘User Define’ (requires entering code in User-Defined DSCP Marking field).
Address Translation (SNAT – IPv4 only): Define source NAT.
Source Network Address Translation: Select ‘none’, ‘outgoing-interface’, or a specific address object/group to use as the source IP.
Healthy Check (Optional): Configure connectivity checks for Interface or Gateway next-hop types.
Enable Connectivity Check: Enable the check.
Configure Method, Period, Timeout, Fail Tolerance, Check this address similar to interface connectivity checks.
Disable policy route automatically while Interface link down: Automatically disable this policy route if the next-hop interface or trunk goes down.
5. Click OK to save the policy route. 6. Use the Move button on the summary screen to reorder routes if necessary, as they are processed top-down. 7. Click Apply on the summary screen.How do I configure Static Routes?
IPv4:
Destination IP: Enter the destination network address.
Subnet Mask: Enter the subnet mask for the destination network.
Select Next-Hop Type:
Gateway IP: Select this and enter the IP address of the next-hop router.
Interface: Select this and choose the outgoing interface from the dropdown.
Metric: Enter the cost metric for this route (0-127, lower is preferred).
IPv6:
Destination IP: Enter the destination IPv6 network address (use :: for default route).
Prefix Length: Enter the prefix length for the destination network (use 0 for default route).
Select Next-Hop Type:
Gateway IP: Select this and enter the IPv6 address of the next-hop router.
Interface: Select this and choose the outgoing interface from the dropdown.
Metric: Enter the cost metric for this route (0-127, lower is preferred).
5. Click OK to save the static route.How do I configure RIP on the Zyxel Device?
Use the RIP screen (Configuration > Network > Routing > RIP) to configure the Zyxel Device to use RIP to receive and/or send routing information. Key configurations include:
Authentication: Specifies how to verify routing information. Options are None, Text (plain text password), or MD5 (most secure). Authentication is only available in RIP version 2.
Redistribute: Allows RIP to advertise routes learned from other protocols like OSPF or static routes. You must specify a Metric (cost) for these redistributed routes, typically between 0 and 16 (2 or 3 is common).
RIP uses UDP port 520.
What are the differences between RIP and OSPF?
| Feature | RIP | OSPF |
|---|---|---|
| Network Size | Small (with up to 15 routers) | Large |
| Metric | Hop count | Bandwidth, hop count, throughput, round trip time and reliability. |
| Convergence | Slow | Fast |
RIP is suitable for small networks (up to 15 routers), uses hop count as its metric, and converges slowly. OSPF is suitable for large networks, uses multiple factors for its metric (bandwidth, hop count, etc.), and converges quickly.
How do I configure OSPF on the Zyxel Device?
Configuring OSPF involves several steps and screens:
1. Enable OSPF: This is typically done on the main OSPF screen.
2. Configure OSPF Router ID: Use the OSPF screen (Configuration > Network > Routing > OSPF) to set the Router ID. This can be set to ‘Default’ (uses the first available interface IP) or ‘User Defined’ (manually enter an IP address format ID).
3. Set up OSPF Areas: Use the OSPF Area Add/Edit screen (accessed from the OSPF screen) to create or edit areas. You define the Area ID (32-bit integer or IP format) and Area Type (Normal, Stub, NSSA).
4. Configure Area Authentication: Within the Area Add/Edit screen, set the default authentication (None, Text, MD5) for the area.
5. Configure Interfaces: Assign interfaces to the appropriate OSPF areas (See Section 10.5.1 in the PDF).
6. Configure Redistribution (Optional): On the OSPF screen, you can configure redistribution of routes learned from RIP into OSPF. Select ‘Active RIP’ and choose Type 1 or Type 2 metric calculation, specifying an external cost (Metric).
7. Set up Virtual Links (Optional): If an area is not directly connected to the backbone (Area 0), configure a virtual link through an intermediate Normal area on the relevant ABRs using the OSPF Area Add/Edit screen.
OSPF uses IP protocol 89.
What are the different OSPF Area types?
OSPF Autonomous Systems (AS) are divided into areas:
Backbone (Area 0): The central transit area. All other areas must connect to the backbone (directly or via virtual link).
Normal Area: A standard area that has full routing information about the OSPF AS and any connected external networks.
Stub Area: Has routing information about the OSPF AS but lacks information about external networks. It uses a default route to send traffic outside the OSPF AS.
Not So Stubby Area (NSSA): Similar to a stub area but can import external routes (like those from RIP or static routes) learned by an ASBR within the NSSA. It still relies on a default route for other external destinations.
What are the different types of OSPF routers?
Routers in OSPF can perform different roles, and one router can have multiple roles:
Internal Router (IR): Exchanges routing information only with routers in the same area.
Area Border Router (ABR): Connects two or more areas (one of which is often the backbone Area 0). It filters, summarizes, and exchanges routing information between areas.
Autonomous System Boundary Router (ASBR): Exchanges routing information with routers outside the OSPF AS (e.g., routers running RIP or BGP). This process is called redistribution.
Backbone Router (BR): Any router with at least one interface in Area 0. All ABRs are backbone routers.
Designated Router (DR) / Backup Designated Router (BDR): Elected on multi-access network segments (like Ethernet) to reduce the amount of OSPF traffic. Routers on the segment only exchange information with the DR and BDR.
How does OSPF redistribution work?
Redistribution is the process where an ASBR exchanges routing information between OSPF and another routing protocol (like RIP) or static routes. The Zyxel Device allows redistribution of RIP routes and static routes into OSPF.
From RIP to OSPF: Configured on the OSPF screen (Configuration > Network > Routing > OSPF). You enable ‘Active RIP’ and select a ‘Type’ (Type 1 or Type 2) for cost calculation and specify a ‘Metric’ (external cost). Routes learned from RIP are advertised into Normal and NSSA areas, but not Stub areas.
From OSPF to RIP: Configured on the RIP screen (Configuration > Network > Routing > RIP). You enable ‘Active OSPF’ and specify a ‘Metric’ (cost in RIP terms, 1-14). OSPF routes are advertised into the RIP network.
The table below shows which external sources can be redistributed into different OSPF area types:
| SOURCE \ TYPE OF AREA | NORMAL | NSSA | STUB |
|---|---|---|---|
| Static routes | Yes | Yes | No |
| RIP | Yes | Yes | Yes |
How do I configure an OSPF Virtual Link?
A virtual link logically connects an area to the backbone (Area 0) through an intermediate “transit” area when a direct physical connection is not possible.
1. Go to the OSPF Area Add/Edit screen for the transit area (the area through which the virtual link will pass). This area must be a ‘Normal’ type area.
2. Navigate to the ‘Virtual Link’ section (this section only appears for Normal areas).
3. Click ‘Add’ to open the Virtual Link Add/Edit screen.
4. Enter the ‘Peer Router ID’ (the 32-bit Router ID of the ABR at the other end of the virtual link, which connects the area needing backbone access).
5. Configure ‘Authentication’ for the virtual link (None, Text, MD5, or Same as Area).
6. Click OK.
Note: You must configure the virtual link on the ABRs at both ends of the transit area. You cannot create a virtual link to a router in a different area.
How do I configure BGP on the Zyxel Device?
Configuring BGP (eBGP) involves allowing BGP traffic and then setting up BGP parameters:
1. Allow BGP Packets:
Go to Configuration > Object > Service > Service Group.
Select the Default_Allow_WAN_To_ZyWALL rule and click Edit.
Move BGP from the Available list to the Member list.
Click OK.
2. Configure BGP Screen (Configuration > Network > Routing > BGP):
AS Number: Enter the Autonomous System number (1-4294967295) for the Zyxel Device. Private AS numbers are 4200000000 – 4294967294.
Router ID: Optionally, type the IP address of the interface on the Zyxel Device to use as the BGP Router ID.
Redistribute: Select ‘Connected’ to redistribute routes of directly attached devices into the BGP RIB.
Neighbors Section: Click ‘Add’ to configure peer BGP routers.
IP Address: Enter the peer BGP router’s IP address.
AS Number: Enter the peer BGP router’s AS number.
Enable EBGP Multihop (Optional): Select if the peer is not directly connected (specify max hops).
Update Source: Select the source IP for BGP sessions (Gateway IP, Interface, or None).
MD5 authentication key (Optional): Enter a shared password for MD5 authentication.
Weight (Optional): Specify a weight for routes learned from this peer (higher is preferred).
Keepalive Time: Interval for sending keepalive messages (default 60s).
Hold Time: Max time to wait for a keepalive before declaring peer dead (must be > Keepalive Time, default 180s).
Maximum Prefix (Optional): Limit the number of prefixes received from this neighbor.
Network Section: Click ‘Add’ to configure network routes (IP/mask bits) that will be announced to all BGP neighbors (up to 16).
3. Click Apply to save changes.
How do I set up Dynamic DNS (DDNS)?
1. Get a DDNS Account: Sign up with a supported DDNS provider (e.g., DynDNS, Dynu, No-IP). Record your username, password, and the domain name you registered.
2. Configure the Zyxel Device:
Navigate to Configuration > Network > DDNS.
Click ‘Add’ to open the DDNS Add/Edit screen.
Check ‘Enable DDNS Profile’.
Enter a ‘Profile Name’.
Select your ‘DDNS Type’ (provider) from the list or choose ‘User custom’ for unsupported providers.
Optionally, enable ‘HTTPS’ if your provider supports it.
Enter your DDNS account ‘Username’ and ‘Password’ (retype to confirm).
Under DDNS Settings, enter the ‘Domain Name’ you registered.
Configure ‘Primary Binding Address’:
Interface: Select the WAN interface whose IP address should be associated with the domain name.
IP Address: Choose how the IP is determined: ‘Interface’ (uses the selected interface’s current IP), ‘Auto’ (DDNS server determines source IP, useful behind NAT), or ‘Custom’ (enter a static IP).
Configure ‘Backup Binding Address’ (optional) similarly, selecting an alternate interface (or ‘None’).
Configure Advanced options (Wildcard, Mail Exchanger – DynDNS only) if needed.
If using ‘User custom’, fill in ‘DYNDNS Server’, ‘URL’, and ‘Additional DDNS Options’.
3. Click OK to save the DDNS entry.
4. Click Apply on the main DDNS screen.
Note: You must have a public WAN IP address to use DDNS.
What DDNS providers are supported?
At the time of writing, the Zyxel Device supports the following DDNS service providers:
| PROVIDER | SERVICE TYPES SUPPORTED | WEBSITE |
|---|---|---|
| DynDNS | Dynamic DNS, Static DNS, and Custom DNS | http://www.dyndns.com |
| Dynu | Basic, Premium | http://www.dynu.com |
| No-IP | No-IP | http://www.no-ip.com |
| Peanut Hull | Peanut Hull | http://www.oray.cn |
| 3322 | 3322 Dynamic DNS, 3322 Static DNS | http://www.3322.org |
| Selfhost | Selfhost | selfhost.de |
You can also use the ‘User custom’ option to configure other DDNS services.
How do I configure Network Address Translation (NAT)?
1. Navigate to Configuration > Network > NAT.
2. Click ‘Add’ to create a new NAT rule (or select an existing rule and click ‘Edit’).
3. Check ‘Enable Rule’.
4. Enter a descriptive ‘Rule Name’.
5. Select the ‘Classification’ (Port Mapping Type):
Virtual Server: Makes internal servers accessible from the public network (most common for incoming traffic).
1:1 NAT: Maps one external IP to one internal IP for both incoming and outgoing traffic.
Many 1:1 NAT: Maps a range or subnet of external IPs to an equal-sized range or subnet of internal IPs.
6. Configure the ‘Mapping Rule’:
Incoming Interface: Select the interface where the external traffic arrives (e.g., wan1).
Source IP: Usually ‘any’, or specify allowed source IPs/objects.
External IP: The public IP address packets are sent to. Select ‘User Defined’ and enter the IP, select a host object, or choose an interface IP object. For Many 1:1 NAT, select a subnet or range object.
Internal IP: The private IP address packets should be forwarded to. Select ‘User Defined’ and enter the IP, or select a HOST address object. For Many 1:1 NAT, select a subnet or range object.
Port Mapping Type: (For Virtual Server) Select how ports are mapped: ‘Any’, ‘Port’, ‘Ports’, ‘Service’, or ‘Service-Group’.
Protocol Type: (If Port Mapping Type is Port or Ports) Select TCP, UDP, or Any.
External Port / Internal Port: (If Port Mapping Type is Port) Enter the original (external) and translated (internal) port numbers.
External/Internal Start/End Port: (If Port Mapping Type is Ports) Enter the ranges for original and translated ports (ranges must be the same size).
7. Configure ‘Related Settings’:
Enable NAT Loopback (Optional): Allows internal users to access internal servers using the external IP address.
Configure Security Policy: Click this link to create a corresponding firewall rule to allow the NAT traffic.
8. Click OK.
9. Click Apply on the main NAT screen.
Note: For SNAT (Source NAT, changing the source IP of outgoing traffic), configure this using Policy Routes (Configuration > Network > Routing > Policy Route).
Note: Consider enabling the “Use Static-Dynamic Route to Control 1-1 NAT Route” checkbox if using SiteToSite VPN and 1-1 SNAT to simplify routing.
What is NAT Loopback?
NAT loopback allows users on an internal network (like LAN) to access a server on the same or another internal network using the server’s public (External IP) address defined in a NAT rule, instead of its private (Internal IP) address.
When NAT loopback is enabled for a NAT rule:
1. An internal user tries to connect to the server’s public IP address.
2. The Zyxel Device intercepts this traffic.
3. Instead of sending the traffic out to the Internet and back, it changes the destination IP to the server’s Internal IP address.
4. It also changes the source IP address of the traffic to the Zyxel Device’s own IP address on the user’s internal interface.
5. The server receives the traffic as if it came from the Zyxel Device’s internal interface IP and replies to that IP.
6. The Zyxel Device receives the reply, changes the source IP back to the server’s public IP, and forwards it to the original internal user.
This ensures that the connection succeeds because the reply traffic source matches the user’s original destination. Without NAT loopback, the server might reply directly to the user using its private IP, causing the user’s computer to drop the connection as the source IP doesn’t match the expected public IP.
You enable NAT Loopback in the ‘Related Settings’ section when adding or editing a NAT rule.
What are well-known ports?
Port numbers identify specific services or applications on a network device. They range from 0 to 65535.
Well-known ports (0-1023): Reserved for standard, privileged services. Examples include:
- 20/21: FTP (File Transfer Protocol)
- 22: SSH (Secure Shell)
- 23: Telnet
- 25: SMTP (Simple Mail Transfer Protocol)
- 53: DNS (Domain Name System)
- 80: HTTP (Hypertext Transfer Protocol)
- 110: POP3 (Post Office Protocol version 3)
- 143: IMAP (Internet Message Access Protocol)
- 161: SNMP (Simple Network Management Protocol)
- 179: BGP (Border Gateway Protocol)
- 443: HTTPS (HTTP Secure)
Registered ports (1024-49151): Used by specific applications or services registered with IANA (Internet Assigned Numbers Authority).
Dynamic/Private ports (49152-65535): Used for temporary client-side connections.
The PDF provides a more extensive list (Table 123) of common ports.
How do I configure HTTP or SMTP Redirect?
Redirect Service forwards HTTP or SMTP traffic to a specific server (like a web proxy or dedicated SMTP server).
1. Navigate to Configuration > Network > Redirect Service.
2. Click ‘Add’ (or select an existing rule and click ‘Edit’).
3. Check ‘Enable’.
4. Select the ‘Service’ to redirect: HTTP Redirect or SMTP redirect.
5. Enter a descriptive ‘Name’ for the rule.
6. Under ‘Criteria’:
User: Select the user account or group this rule applies to (or ‘any’).
Interface: Select the incoming interface where the request must be received (or ‘any’).
Source Address: Select the source IP address object the traffic should come from (or ‘any’).
7. Under ‘Redirect Settings’:
Server: Enter the IP address of the HTTP proxy or SMTP server to redirect traffic to.
Port: Enter the service port number used by the redirect server.
8. Click OK.
9. Click Apply on the main Redirect Service screen.
Important:
You also need appropriate Security Policy rules to allow traffic from the client to the redirect server.
You typically need a Policy Route rule to allow traffic from the redirect server out to the Internet.
Redirect rules are checked before Policy Routes for the same traffic type.
How do I configure Application Layer Gateways (ALG)?
ALGs help NAT-unfriendly applications (like SIP, H.323, FTP) work correctly through the Zyxel Device’s NAT and firewall by inspecting packet payloads and dynamically opening necessary ports or modifying embedded IP addresses.
1. Navigate to Configuration > Network > ALG.
2. For each protocol (SIP, H.323, FTP):
Check ‘Enable [Protocol] ALG’ to turn the ALG on or off.
Check ‘Enable [Protocol] Transformations’ if the Zyxel Device needs to modify IP addresses and port numbers embedded within the protocol’s data payload. Clear this if your end device or server handles transformations itself.
Enter the standard ‘[Protocol] Signaling Port’ (e.g., 5060 for SIP, 1720 for H.323, 21 for FTP).
Optionally, add ‘Additional [Protocol] Signaling Port for Transformations’ if the protocol uses non-standard ports.
3. For SIP ALG specifically:
Optionally, check ‘Enable Configure SIP Inactivity Timeout’ to override session timers.
Set ‘SIP Media Inactivity Timeout’ (time without voice traffic before dropping audio session).
Set ‘SIP Signaling Inactivity Timeout’ (time without signaling traffic before dropping signaling session).
Optionally, check ‘Restrict Peer to Peer Signaling Connection’ and ‘Restrict Peer to Peer Media Connection’ to only allow connections from registered IP addresses.
4. Click Apply.
Note: ALGs are generally only needed for traffic passing through NAT. You also need appropriate NAT (port forwarding) and Security Policy rules configured to allow the initial connection to internal servers.
How do I enable UPnP or NAT-PMP?
UPnP (Universal Plug and Play) and NAT-PMP (NAT Port Mapping Protocol) allow devices on the internal network to automatically discover each other and configure port mappings on the Zyxel Device.
1. Navigate to Configuration > Network > UPnP.
2. Under ‘General Setting’:
Check ‘Enable UPnP’ to activate UPnP.
Check ‘Enable NAT-PMP’ to activate NAT-PMP.
Optionally, check ‘Allow UPnP or NAT-PMP to pass through Firewall’ to let application traffic bypass the security policy. If unchecked, security policies will block UPnP/NAT-PMP packets.
Select the ‘Outgoing WAN Interface’ (e.g., ‘ALL’ or a specific WAN interface) through which UPnP/NAT-PMP traffic should be sent.
3. Under ‘Support LAN List’:
Move the internal interfaces (e.g., lan1, lan2) on which you want to enable UPnP/NAT-PMP from the ‘Available’ list to the ‘Member’ list.
4. Click Apply.
Caution: Enabling UPnP/NAT-PMP can pose security risks as devices can automatically open ports. Disable it if not needed.
How can I use UPnP to find devices or access the Web Configurator?
If UPnP is enabled on the Zyxel Device and your computer (Windows 7/10 examples provided):
Finding Devices:
1. Ensure Network Discovery is turned on in your Windows advanced sharing settings.
2. Open File Explorer (Windows Explorer in Win 7).
3. Click on ‘Network’ in the left pane.
4. UPnP-enabled devices, including the Zyxel Device, should appear under ‘Network Infrastructure’.
5. Right-click the Zyxel Device icon and select ‘Properties’. Click the ‘Network Device’ tab to view information like manufacturer, model, and IP address.
Accessing Web Configurator:
1. Follow steps 1-4 above to find the Zyxel Device icon in the Network view.
2. Right-click the Zyxel Device icon.
3. Select ‘View device webpage’.
4. The Zyxel Device’s web configurator login page should open in your browser, without needing to know its IP address beforehand.
How do I configure IP/MAC Binding?
IP/MAC Binding links a specific IP address to a specific MAC address on an interface, preventing other devices from using that IP address.
Enable Binding on an Interface:
1. Navigate to Configuration > Network > IP/MAC Binding.
2. Select the interface where you want to enforce binding.
3. Click ‘Edit’.
4. Check ‘Enable IP/MAC Binding’.
5. Optionally, check ‘Enable Logs for IP/MAC Binding Violation’.
Add Static Bindings (Optional but Recommended):
6. While editing the interface, go to the ‘Static DHCP Bindings’ section.
7. Click ‘Add’.
8. Enter the ‘IP Address’ you want to reserve.
9. Enter the ‘MAC Address’ of the device that should receive this IP.
10. Enter a ‘Description’.
11. Click OK.
12. Repeat steps 7-11 for all desired static bindings.
13. Click OK on the IP/MAC Binding Edit screen.
14. Click Apply on the IP/MAC Binding Summary screen.
Note: IP/MAC binding relies on the Zyxel Device’s DHCP server functionality (both dynamic leases and static bindings).
How do I exempt IP addresses from IP/MAC Binding?
You can configure ranges of IP addresses where IP/MAC binding checks will not be applied.
1. Navigate to Configuration > Network > IP/MAC Binding.
2. Click the ‘Exempt List’ tab.
3. Click ‘Add’.
4. Enter a ‘Name’ for the exempt range.
5. Enter the ‘Start IP’ address of the range.
6. Enter the ‘End IP’ address of the range.
7. Click OK (or Apply on the main screen if adding directly there).
How do I configure Layer 2 Isolation?
Layer 2 Isolation prevents devices connected to the same internal interface(s) from communicating directly with each other, except for devices specified in an Allow List.
Enable Layer 2 Isolation:
1. Navigate to Configuration > Network > Layer 2 Isolation.
2. On the ‘General’ tab, check ‘Enable Layer 2 Isolation’. (Note: Security Policy control must be enabled first).
3. In the ‘Member List’, move the internal interface(s) (e.g., lan1, Vlan10) on which you want to enable isolation from the ‘Available’ list to the ‘Member’ list.
4. Click Apply.
Configure Allow List (Optional):
5. Click the ‘Allow List’ tab.
6. Check ‘Enable Allow List’.
7. Click ‘Add’.
8. Check ‘Enable’ for the rule.
9. Enter the ‘Host IP Address’ of a device (e.g., a shared printer or server) that should be accessible by other devices on the isolated interface(s).
10. Enter an optional ‘Description’.
11. Click OK.
12. Repeat steps 7-11 for all devices to be allowed.
13. Click Apply.
Devices on an isolated interface can still access devices on non-isolated interfaces, the Zyxel Device itself, and the Internet (subject to firewall rules), and any device on the Allow List.
How do I configure DNS Inbound Load Balancing?
DNS Inbound Load Balancing allows the Zyxel Device to respond to DNS queries for a specific domain name with the IP address of the least loaded WAN interface.
1. Navigate to Configuration > Network > Inbound LB.
2. Check ‘Enable DNS Load Balancing’.
3. Click ‘Add’ under the Configuration section.
4. Check ‘Enable’ for the rule.
5. Under ‘DNS Settings’:
Enter the ‘Query Domain Name’ (e.g., http://www.example.com, *.example.com) that this rule applies to.
Set the ‘Time to Live’ (TTL) in seconds (0 means use DNS server’s TTL).
6. Under ‘Query From Settings’ (Optional):
Specify the ‘IP Address’ (source IP object) or ‘Zone’ from which queries must originate for this rule to apply (default is ‘any’).
7. Under ‘Load Balancing Member’:
Select the ‘Load Balancing Algorithm’: Weighted Round Robin, Least Connection, Least Load – Outbound, Least Load – Inbound, or Least Load – Total.
Optionally, enter a ‘Failover IP Address’ to return if all member interfaces are unavailable.
Click ‘Add’ to add a member interface.
Select the ‘Monitor Interface’ (e.g., wan1).
If using Weighted Round Robin, enter a ‘Weight’ (1-10).
Select the ‘IP Address’ to return for this interface (‘Same as Monitor Interface’ or ‘Custom’).
Click OK.
Repeat adding members for all desired WAN interfaces.
8. Click OK on the Add DNS Load Balancing screen.
9. Click Apply on the main DNS Load Balancing screen.
Note: You must also configure corresponding Security Policy and NAT rules to allow Internet users to access your internal servers via the WAN interface IPs used in the load balancing.
What are the different IPSec VPN Application Scenarios?
The Zyxel Device offers pre-defined scenarios to simplify IPSec VPN configuration:
| Scenario | Description | Initiation | Peer IP | Zyxel IP |
|---|---|---|---|---|
| Site-to-Site | Connects two sites where both ends have static IP addresses or domain names. | Either side can initiate. | Static IP or Domain Name | Static IP or Domain Name |
| Site-to-Site with Dynamic Peer | Connects two sites where the remote site has a dynamic IP address. | Only remote (dynamic) peer can initiate. | Dynamic IP (address not specified in config) | Static IP or Domain Name |
| Remote Access (Server Role) | Allows multiple remote clients (dial-in users) with dynamic IPs to connect to the Zyxel Device. | Only clients can initiate. | Dynamic IP (clients not specified in config) | Static IP or Domain Name |
| Remote Access (Client Role) | Configures the Zyxel Device as a client to connect to a remote IPSec server (dial-in). | Only this Zyxel Device (client) can initiate. | Static IP or Domain Name (of server) | Can be Dynamic IP |
| VPN Tunnel Interface | Creates a virtual interface (VTI) to bind to a VPN connection, primarily used for routing or load balancing over VPN. | Typically Zyxel Device initiates (depends on underlying connection). | Static IP or Domain Name | Static IP or Domain Name |
These scenarios pre-fill certain settings in the VPN Connection and VPN Gateway configuration screens.
How do I configure an IPSec VPN Connection?
The VPN Connection defines the Phase 2 parameters (IPSec SA) for a VPN tunnel.
1. Navigate to Configuration > VPN > IPSec VPN > VPN Connection.
2. Click ‘Add’ (or select and ‘Edit’ an existing connection).
3. Check ‘Enable’.
4. Enter a ‘Connection Name’.
5. Select the ‘Application Scenario’ that best fits your needs.
6. Select the ‘VPN Gateway’ (Phase 1 settings) this connection will use. You might need to create this first.
7. Define the ‘Policy’:
Local Policy: Select the address object representing the network behind the Zyxel Device.
Remote Policy: Select the address object representing the network behind the remote peer.
Optionally enable ‘Policy Enforcement’ to strictly enforce traffic matching these policies.
8. Configure ‘Phase 2 Setting’:
Set the ‘SA Life Time’ (in seconds).
Select the ‘Active Protocol’ (ESP is most common).
Select ‘Encapsulation’ (Tunnel is most common).
Configure ‘Proposal(s)’: Click Add/Edit to define acceptable Encryption and Authentication algorithms (e.g., AES128/SHA256). Both sides must have at least one matching proposal.
Select ‘Perfect Forward Secrecy (PFS)’ DH group (or ‘none’ to disable).
9. Configure ‘Related Settings’:
Set the ‘Zone’ (usually IPSec_VPN).
Optionally enable ‘Connectivity Check’ to monitor tunnel status using ICMP or TCP.
10. Optionally configure ‘Inbound/Outbound traffic NAT’ if NAT is required specifically for this tunnel’s traffic.
11. Configure Advanced settings (Nailed-Up, Replay Detection, NetBIOS, MSS Adjustment, GRE, Mode Config, Configuration Payload) as needed based on scenario and peer requirements.
12. Click OK.
How do I configure an IPSec VPN Gateway?
The VPN Gateway defines the Phase 1 parameters (IKE SA) for a VPN tunnel.
1. Navigate to Configuration > VPN > IPSec VPN > VPN Gateway.
2. Click ‘Add’ (or select and ‘Edit’ an existing gateway).
3. Check ‘Enable’.
4. Enter a ‘VPN Gateway Name’.
5. Select the ‘IKE Version’ (IKEv1 or IKEv2).
6. Configure ‘Gateway Settings’:
My Address: Select the Interface or enter the Domain Name/IP the Zyxel Device uses for this gateway.
Peer Gateway Address: Select ‘Static Address’ and enter the peer’s IP/Domain name, or select ‘Dynamic Address’ if the peer’s IP changes.
7. Configure ‘Authentication’:
Select ‘Pre-Shared Key’ and enter/confirm the key, or select ‘Certificate’ and choose the Zyxel Device’s certificate (My Certificates).
Configure ‘Local ID Type’/’Content’ and ‘Peer ID Type’/’Content’ to match the peer’s configuration.
8. Configure ‘Phase 1 Settings’:
Set the ‘SA Life Time’ (in seconds).
Select the ‘Negotiation Mode’ (Main/Aggressive for IKEv1; IKEv2 uses a standard mode).
Configure ‘Proposal(s)’: Click Add/Edit to define acceptable Encryption, Authentication algorithms, and the ‘Key Group’ (Diffie-Hellman group, e.g., DH2, DH5, DH14). Both sides must have at least one matching proposal.
Enable ‘NAT Traversal’ if NAT exists between peers (always on for IKEv2).
Enable ‘Dead Peer Detection (DPD)’ (always on for IKEv2).
9. Configure ‘X-Auth’ (IKEv1) or ‘Extended Authentication Protocol’ (IKEv2) if needed for user authentication (Server Mode or Client Mode).
10. Click OK.
What is a VPN Concentrator?
A VPN Concentrator is a configuration on the Zyxel Device (acting as a hub) that combines multiple individual IPSec VPN connections (spokes) into a single logical entity. It simplifies management and routing in a hub-and-spoke topology compared to a fully-meshed setup where every site connects directly to every other site.
Instead of each spoke needing routes for every other spoke, they only need a route to the hub (concentrator). The concentrator handles routing traffic between the different spokes.
Requirements/Suggestions:
- Local policy IP addresses in the member VPN rules should not overlap.
- The concentrator needs at least one VPN rule per spoke.
- Security policies can still block VPN traffic.
- Policy Enforcement must be disabled for member VPN Connection rules.
Configure it under Configuration > VPN > IPSec VPN > Concentrator.
How do I configure VPN Concentrator?
1. Ensure you have already configured the individual IPSec VPN Gateway and VPN Connection policies for each spoke router that will connect to this hub.
2. Important: For each VPN Connection policy that will be part of the concentrator, edit it and ensure ‘Policy Enforcement’ under the ‘Policy’ section is disabled.
3. Navigate to Configuration > VPN > IPSec VPN > Concentrator.
4. Choose ‘IPv4 Configuration’ or ‘IPv6 Configuration’.
5. Click ‘Add’.
6. Enter a ‘Name’ for the concentrator.
7. In the ‘Member’ section, select the pre-configured VPN Connection policies (from step 1) from the ‘Available’ list and move them to the ‘Member’ list using the arrow buttons.
8. Click OK.
What is IPSec VPN Client Configuration Provisioning?
Configuration Provisioning allows the Zyxel Device IPSec VPN Client software (installed on a user’s computer) to automatically retrieve VPN rule settings from the Zyxel Device simply by entering the Zyxel Device’s IP address.
This simplifies client setup as manual configuration is not needed.
Configure which users or groups can retrieve settings via Configuration > VPN > IPSec VPN > Configuration Provisioning.
Restrictions:
The VPN rules provisioned cannot use:
- AH active protocol
- NULL encryption
- SHA512 authentication
- A subnet or range as the remote policy
The associated VPN Gateway rules cannot use:
- IKEv2 version (for IPv4 rules)
- User-based PSK authentication (for IPv4 rules)
You must enable IPv6 in System > IPv6 on the Zyxel Device to provision IPv6 VPN rules.
What fields are described in Table 147 for IPSec VPN Configuration Provisioning?
| LABEL | DESCRIPTION |
|---|---|
| Enable Configuration Provisioning | Select this for users to be able to retrieve VPN rule settings using the Zyxel Device IPSec VPN client. |
| VPN Provisioning Port | Change the default port that IPSec VPN clients use to retrieve VPN rule settings from the Zyxel Device. The default is 443 which is already in use for remote management by default. If you change the default IPSec VPN port on the Zyxel Device, make sure to make the same change to the Zyxel IPSec VPN client. See Section 1.8.2 on page 41 for more information. Configure a new port between 1024 to 65535 that is not in use by other services. |
| Client Authentication Method | Choose how users should be authenticated. They can be authenticated using the local database on the Zyxel Device or an external authentication database such as LDAP, Active Directory or RADIUS. default is a method you configured in Object > Auth Method. You may configure multiple methods there. If you choose the local database on the Zyxel Device, then configure users using the Object > User/Group screen. If you choose LDAP, Active Directory or RADIUS authentication servers, then configure users on the respective server. |
| Configuration | When you add or edit a configuration provisioning entry, you are allowed to set the VPN Connection and Allowed User fields. Duplicate entries are not allowed. You cannot select the same VPN Connection and Allowed User pair in a new entry if the same pair exists in a previous entry. You can bind different rules to the same user, but the Zyxel Device will only allow VPN rule setting retrieval for the first match found. |
| Add | Click Add to bind a configured VPN rule to a user or group. Only that user or group may then retrieve the specified VPN rule settings. If you click Add without selecting an entry in advance then the new entry appears as the first entry. Entry order is important as the Zyxel Device searches entries in the order listed here to find a match. After a match is found, the Zyxel Device stops searching. If you want to add an entry as number three for example, then first select entry 2 and click Add. To reorder an entry, use Move. |
| Edit | Select an existing entry and click Edit to change its settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| Activate | To turn on an entry, select it and click Activate. Make sure that Enable Configuration Provisioning is also selected. |
| Inactivate | To turn off an entry, select it and click Inactivate. |
| Move | Use Move to reorder a selected entry. Select an entry, click Move, type the number where the entry should be moved, press |
| Status | This icon shows if the entry is active (yellow) or not (gray). VPN rule settings can only be retrieved when the entry is activated (and Enable Configuration Provisioning is also selected). |
| Priority | Priority shows the order of the entry in the list. Entry order is important as the Zyxel Device searches entries in the order listed here to find a match. After a match is found the Zyxel Device stops searching. |
| VPN Connection | This field shows all configured VPN rules that match the rule criteria for the Zyxel Device IPSec VPN client. Select a rule to bind to the associated user or group. |
| Upload Bandwidth Limit | Upload Bandwidth Limit is only available for Zyxel subscription-based SecuExtender IPSec VPN clients. Windows VPN clients support Zyxel SecuExtender versions 5.6.80.007 or later. macOS VPN clients support Zyxel SecuExtender versions 1.2.0.7 or later. Use Upload Bandwidth Limit to set the maximum bandwidth for uploading traffic from Zyxel IPSec VPN clients over IPSec VPN tunnels. |
| Allowed User | Select which user or group of users is allowed to retrieve the associated VPN rule settings using the Zyxel Device IPSec VPN client. A user may belong to a number of groups. If entries are configured for different groups, the Zyxel Device will allow VPN rule setting retrieval based on the first match found. Users of type admin or limited-admin are not allowed. |
| Type | This field shows how traffic is tunneled from the Zyxel Device to the Zyxel VPN client: • 6in4 (tunnel IPv6 traffic from the Zyxel Device to the Zyxel client in an IPv4 network); • 4in6 (tunnel IPv4 traffic from the Zyxel Device to the Zyxel client in an IPv6 network); • 4in4 (tunnel IPv4 traffic from the Zyxel Device to the Zyxel client in an IPv4 network). |
| Apply | Click Apply to save your changes back to the Zyxel Device. |
| Reset | Click Reset to return the screen to its last-saved settings. |
How do I configure an IPSec VPN with IKEv2 on Android (version 13)?
This example uses Android software version 13.
1. Go to Settings, search for “VPN”, open the VPN settings screen, and then tap Add.
2. Enter a name for the VPN rule in the Name field.
3. Select IKEv2 as Type.
4. Enter the WAN IP address your Zyxel Device is currently using in the Server address field.
5. Enter the IPSec identifier. By default, it is 0.0.0.0.
6. Enter the pre-shared key in the IPSec pre-shared key field. You can find the pre-shared key on the VPN Gateway screen in the Web Configurator.
7. Tap Save to create the VPN rule.
8. Select the VPN rule you created and tap Connect.
9. To check the connection status, go to Configuration > VPN > IPSec VPN in the Web Configurator.
How do I configure an IPSec VPN with IKEv2 on iOS (version 17)?
This example uses iOS software version 17.
1. Go to Settings, search for “VPN”, open the VPN & Device Management screen, and then tap Add VPN Configuration.
2. Select IKEv2 as Type.
3. Enter a name for the VPN rule in the Name field.
4. Enter the WAN IP address your Zyxel Device is currently using in the Server field.
5. Enter the Remote ID. By default, it is 0.0.0.0.
6. Select None as User Authentication.
7. Disable Use Certificate.
8. Enter the pre-shared key in the Password field. You can find the pre-shared key on the VPN Gateway screen in the Web Configurator.
9. Tap Done to create the VPN rule.
10. Select the VPN rule you created and tap Connect.
11. To check the connection status, go to Configuration > VPN > IPSec VPN in the Web Configurator.
What happens if the ID type and content do not match between routers during IKE SA authentication?
Table 148 VPN Example: Matching ID Type and Content
| ZYXEL DEVICE | REMOTE IPSEC ROUTER |
|---|---|
| Local ID type: E-mail | Local ID type: IP |
| Local ID content: tom@yourcompany.com | Local ID content: 1.1.1.2 |
| Peer ID type: IP | Peer ID type: E-mail |
| Peer ID content: 1.1.1.2 | Peer ID content: tom@yourcompany.com |
Table 149 VPN Example: Mismatching ID Type and Content
| ZYXEL DEVICE | REMOTE IPSEC ROUTER |
|---|---|
| Local ID type: E-mail | Local ID type: IP |
| Local ID content: tom@yourcompany.com | Local ID content: 1.1.1.2 |
| Peer ID type: IP | Peer ID type: E-mail |
| Peer ID content: 1.1.1.20 | Peer ID content: tom@yourcompany.com |
What SSL Access Policy Objects can be configured?
| OBJECT TYPE | OBJECT SCREEN | DESCRIPTION |
|---|---|---|
| User Accounts | User Account/ User Group | Configure a user account or user group to which you want to apply this SSL access policy. |
| Application | SSL Application | Configure an SSL application object to specify the type of application and the address of the local computer, server, or web site SSL users are to be able to access. |
| IP Pool | Address | Configure an address object that defines a range of private IP addresses to assign to user computers so they can access the internal network through a VPN connection. |
| Server Addresses | Address | Configure address objects for the IP addresses of the DNS and WINS servers that the Zyxel Device sends to the VPN connection users. |
| VPN Network | Address | Configure an address object to specify which network segment users are allowed to access through a VPN connection. |
What are the fields in the SSL Access Privilege screen?
| LABEL | DESCRIPTION |
|---|---|
| Access Policy Summary | This screen shows a summary of SSL VPN policies created. Click on the VPN icon to go to the Zyxel VPN Client product page at the Zyxel website. |
| Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
| Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| Activate | To turn on an entry, select it and click Activate. |
| Inactivate | To turn off an entry, select it and click Inactivate. |
| Move | To move an entry to a different number in the list, click the Move icon. In the field that appears, specify the number to which you want to move the interface. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. Click Refresh to update information on this screen. |
| # | This field displays the index number of the entry. |
| Status | This icon is lit when the entry is active and dimmed when the entry is inactive. |
| Name | This field displays the descriptive name of the SSL access policy for identification purposes. |
| User/Group | This field displays the user account or user group name(s) associated to an SSL access policy. This field displays up to three names. |
| Access Policy Summary | This field displays details about the SSL application object this policy uses including its name, type, and address. |
| Apply | Click Apply to save the settings. |
| Reset | Click Reset to discard all changes. |
What are the fields in the SSL Access Privilege Policy Add/Edit screen?
| LABEL | DESCRIPTION |
|---|---|
| Create new Object | Use to configure any new settings objects that you need to use in this screen. |
| Configuration | |
| Enable Policy | Select this option to activate this SSL access policy. |
| Name | Enter a descriptive name to identify this policy. You can enter up to 31 characters (“a-z”, A-Z”, “0-9”) with no spaces allowed. |
| Zone | Select the zone to which to add this SSL access policy. You use zones to apply security settings such as security policy and remote management. |
| Description | Enter additional information about this SSL access policy. You can enter up to 60 characters (“0-9”, “a-z”, “A-Z”, “-” and “_”). |
| User/Group | The Selectable User/Group Objects list displays the name(s) of the user account and/or user group(s) to which you have not applied an SSL access policy yet. To associate a user or user group to this SSL access policy, select a user account or user group and click the right arrow button to add to the Selected User/Group Objects list. You can select more than one name. To remove a user or user group, select the name(s) in the Selected User/Group Objects list and click the left arrow button. Note: Although you can select admin and limited-admin accounts in this screen, they are reserved for device configuration only. You cannot use them to access the SSL VPN portal. |
| Network Extension (Optional) | |
| Enable Network Extension | Select this option to create a VPN tunnel between the authenticated users and the internal network. This allows the users to access the resources on the network as if they were on the same local network. This includes access to resources not supported by SSL application objects. For example this lets users Telnet to the internal network even though the Zyxel Device does not have SSL application objects for Telnet. Clear this option to disable this feature. Users can only access the applications as defined by the VPN tunnel’s selected SSL application settings and the remote user computers are not made to be a part of the local network. |
| Force all client traffic to SSL VPN tunnel | Select this to send all traffic from the SSL VPN clients through the SSL VPN tunnel. This replaces the default gateway of the SSL VPN clients with the SSL VPN gateway. |
| NetBIOS broadcast over SSL VPN Tunnel | Select this to search for a remote computer and access its applications as if it was in a Local Area Network. The user can find a computer not only by its IP address but also by computer name. |
| Assign IP Pool | Define a separate pool of IP addresses to assign to the SSL users. Select it here. The SSL VPN IP pool should not overlap with IP addresses on the Zyxel Device’s local networks (LAN and DMZ for example), the SSL user’s network, or the networks you specify in the SSL VPN Network List. |
| DNS/WINS Server 1..2 | Select the name of the DNS or WINS server whose information the Zyxel Device sends to the remote users. This allows them to access devices on the local network using domain names instead of IP addresses. |
| Network List | To allow user access to local network(s), select a network name in the Selectable Address Objects list and click the right arrow button to add to the Selected Address Objects list. You can select more than one network. To block access to a network, select the network name in the Selected Address Objects list and click the left arrow button. |
| OK | Click OK to save the changes and return to the main Access Privilege screen. |
| Cancel | Click Cancel to discard all changes and return to the main Access Privilege screen. |
What are the fields in the SSL Global Setting screen?
| LABEL | DESCRIPTION |
|---|---|
| Global Setting | |
| Network Extension Local IP | Specify the IP address of the Zyxel Device (or a gateway device) for full tunnel mode SSL VPN access. Leave this field to the default settings unless it conflicts with another interface. |
| SSL VPN Server Port | Specify the SSL VPN server port of the Zyxel Device for full tunnel mode SLL VPN access. Leave this field to default settings unless it conflicts with another interface. |
| Apply | Click Apply to save the changes and/or start the logo file upload process. |
| Reset | Click Reset to return the screen to its last-saved settings. |
What are the fields in the L2TP VPN configuration screen?
| LABEL | DESCRIPTION |
|---|---|
| Show Advanced Settings / Hide Advanced Settings | Click this button to display a greater or lesser number of configuration fields. |
| Create new Object | Use to configure any new settings objects that you need to use in this screen. |
| Enable L2TP Over IPSec | Use this field to turn the Zyxel Device’s L2TP VPN function on or off. |
| VPN Connection | Select the IPSec VPN connection the Zyxel Device uses for L2TP VPN. Only the configured VPN connections in Configuration > VPN > IPSec VPN > VPN Connection that meet the following requirements are displayed here. • Remote Access (Server Role) • Use transport mode • Configuration Payload is disabled • X-Auth is disabled Your VPN settings must also meet the requirements listed in IPSec Configuration Required for L2TP VPN. Note: Selecting a different VPN connection (or modifying the VPN gateway that it uses) disconnects any existing L2TP VPN sessions. |
| IP Address Pool | Select the pool of IP addresses that the Zyxel Device uses to assign to the L2TP VPN clients. Use Create new Object if you need to configure a new pool of IP addresses. This should not conflict with any WAN, LAN, DMZ or WLAN subnet even if they are not in use. |
| Authentication Method | Select how the Zyxel Device authenticates a remote user before allowing access to the L2TP VPN tunnel. The authentication method has the Zyxel Device check a user’s user name and password against the Zyxel Device’s local database, a remote LDAP, RADIUS, a Active Directory server, or more than one of these. |
| Authentication Server Certificate | Select the certificate to use to identify the Zyxel Device for L2TP VPN connections. You must have certificates already configured in the My Certificates screen. The certificate is used with the EAP, PEAP, and MSCHAPv2 authentication protocols. |
| Allowed User | The remote user must log into the Zyxel Device to use the L2TP VPN tunnel. Select a user or user group that can use the L2TP VPN tunnel. Use Create new Object if you need to configure a new user account. Otherwise, select any to allow any user with a valid account and password on the Zyxel Device to log in. |
| Keep Alive Timer | The Zyxel Device sends a Hello message after waiting this long without receiving any traffic from the remote user. The Zyxel Device disconnects the VPN tunnel if the remote user does not respond. (Value is 1-180 seconds). |
| First DNS Server, Second DNS Server | Specify the IP addresses of DNS servers to assign to the remote users. You can specify these IP addresses two ways. Custom Defined – enter a static IP address. From ISP – use the IP address of a DNS server that another interface received from its DHCP server. |
| First WINS Server, Second WINS Server | The WINS (Windows Internet Naming Service) server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using. Type the IP addresses of up to two WINS servers to assign to the remote users. You can specify these IP addresses two ways: Custom Defined (static IP). |
| Apply | Click Apply to save your changes in the Zyxel Device. |
| Reset | Click Reset to return the screen to its last-saved settings. |
What are the steps to configure L2TP VPN when the Zyxel Device is behind a NAT router?
If the Zyxel Device (Z) is behind a NAT router (N), then do the following for remote clients (C) to access the network behind the Zyxel Device (Z) using L2TP over IPv4.
1. Create an address object in Configuration > Object > Address/GEO IP > Address for the WAN IP address of the NAT router.
2. Go to Configuration > VPN > IPSec VPN > VPN Connection and click Add for IPv4 Configuration to create a new VPN connection.
3. Select Remote Access (Server Role) as the VPN scenario for the remote client.
4. Select the NAT router WAN IP address object as the Local Policy.
5. Go to Configuration > VPN > L2TP VPN and select the VPN Connection just configured.
What happens if configured BWM rates total less than the available bandwidth (Maximize Bandwidth Usage disabled)?
In the following table the configured rates total less than the available bandwidth and maximize bandwidth usage is disabled, both servers get their configured rate.
Table 155 Configured Rate Effect
| POLICY | CONFIGURED RATE | MAX. B. U. | PRIORITY | ACTUAL RATE |
|---|---|---|---|---|
| A | 300 kbps | No | 1 | 300 kbps |
| B | 200 kbps | No | 1 | 200 kbps |
What happens if configured BWM rates total more than the available bandwidth?
Here the configured rates total more than the available bandwidth. Because server A has higher priority, it gets up to its configured rate (800 kbps), leaving only 200 kbps for server B.
Table 156 Priority Effect
| POLICY | CONFIGURED RATE | MAX. B. U. | PRIORITY | ACTUAL RATE |
|---|---|---|---|---|
| A | 800 kbps | Yes | 1 | 800 kbps |
| B | 1000 kbps | Yes | 2 | 200 kbps |
What happens when ‘Maximize Bandwidth Usage’ is enabled and configured rates are met?
With maximize bandwidth usage enabled, after each server gets its configured rate, the rest of the available bandwidth is divided equally between the two. So server A gets its configured rate of 300 kbps and server B gets its configured rate of 200 kbps. Then the Zyxel Device divides the remaining bandwidth (1000 – 500 = 500) equally between the two (500 / 2 = 250 kbps for each). The priority has no effect on how much of the unused bandwidth each server gets.
So server A gets its configured rate of 300 kbps plus 250 kbps for a total of 550 kbps. Server B gets its configured rate of 200 kbps plus 250 kbps for a total of 450 kbps.
Table 157 Maximize Bandwidth Usage Effect
| POLICY | CONFIGURED RATE | MAX. B. U. | PRIORITY | ACTUAL RATE |
|---|---|---|---|---|
| A | 300 kbps | Yes | 1 | 550 kbps |
| B | 200 kbps | Yes | 2 | 450 kbps |
What is the effect of Priority with Over Allotment of Bandwidth?
Server A has a configured rate that equals the total amount of available bandwidth and a higher priority. You should regard extreme over allotment of traffic with different priorities (as shown here) as a configuration error. Even though the Zyxel Device still attempts to let all traffic get through and not be lost, regardless of its priority, server B gets almost no bandwidth with this configuration.
Table 158 Priority and Over Allotment of Bandwidth Effect
| POLICY | CONFIGURED RATE | MAX. B. U. | PRIORITY | ACTUAL RATE |
|---|---|---|---|---|
| A | 1000 kbps | Yes | 1 | 999 kbps |
| B | 1000 kbps | Yes | 2 | 1 kbps |
What are the fields in the Bandwidth Management configuration screen?
| LABEL | DESCRIPTION |
|---|---|
| Enable BWM | Select this check box to activate management bandwidth. |
| Enable Highest Bandwidth Priority for SIP Traffic | Select this to maximize the throughput of SIP traffic to improve SIP-based VoIP call sound quality. This has the Zyxel Device immediately send SIP traffic upon identifying it. |
| Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
| Edit | Select an entry and click this to be able to modify it. |
| Remove | Select an entry and click this to delete it. |
| Activate | To turn on an entry, select it and click Activate. |
| Inactivate | To turn off an entry, select it and click Inactivate. |
| Move | To change an entry’s position in the numbered list, select it and click Move to display a field to type a number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed. |
| Status | The activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. The status icon is not available for the default bandwidth management policy. |
| Priority | This field displays a sequential value for each bandwidth management policy and it is not associated with a specific setting. This field displays default for the default bandwidth management policy. |
| Description | This field displays additional information about this policy. |
| BWM Type | This field displays the below types of BWM: • Shared, when the policy is set for all matched traffic • Per User, when the policy is set for an individual user or a user group • Per-Source-IP, when the policy is set for a source IP |
| User | This is the type of user account to which the policy applies. If any displays, the policy applies to all user accounts. |
| Schedule | This is the schedule that defines when the policy applies. none means the policy always applies. |
| Incoming Interface | This is the source interface of the traffic to which this policy applies. |
| Outgoing Interface | This is the destination interface of the traffic to which this policy applies. |
| Source | This is the source address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. If any displays, the policy is effective for every source. |
| Destination | This is the destination address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. If any displays, the policy is effective for every destination. |
| DSCP Code | These are the DSCP code point values of incoming and outgoing packets to which this policy applies. The lower the number the higher the priority with the exception of 0 which is usually given only best-effort treatment. any means all DSCP value or no DSCP marker. default means traffic with a DSCP value of 0. This is usually best effort traffic The “af” options stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences. |
| Service | App and the service name displays if you selected Application Object for the service type. An Application Object is a pre-defined service. Obj and the service name displays if you selected Service Object for the service type. A Service Object is a customized pre-defined service or another service. Mouse over the service object name to view the corresponding IP protocol number. |
| BWM In/Pri/Out/Pri | This field shows the inbound/outbound bandwidth and traffic priority. In – This is how much inbound bandwidth, in kilobits per second, this policy allows the matching traffic to use. Inbound refers to the traffic that the Zyxel Device sends to a connection’s initiator. If no displays here, this policy does not apply bandwidth management for the inbound traffic. Out – This is how much outbound bandwidth, in kilobits per second, this policy allows the matching traffic to use. Outbound refers to the traffic the Zyxel Device sends out from a connection’s initiator. If no displays here, this policy does not apply bandwidth management for the outbound traffic. Pri – This is the priority for the inbound (the first Pri value) or outbound (the second Pri value) traffic that matches this policy. The smaller the number, the higher the priority. Traffic with a higher priority is given bandwidth before traffic with a lower priority. If the inbound or outbound limit is set to 0, the traffic is assigned to the lowest priority (7) regardless of this field’s configuration. |
| DSCP Marking | This is how the Zyxel Device handles the DSCP value of the incoming and outgoing packets that match this policy. In – Inbound, the traffic the Zyxel Device sends to a connection’s initiator. Out – Outbound, the traffic the Zyxel Device sends out from a connection’s initiator. If this field displays a DSCP value, the Zyxel Device applies that DSCP value to the route’s outgoing packets. preserve means the Zyxel Device does not modify the DSCP value of the route’s outgoing packets. default means the Zyxel Device sets the DSCP value of the route’s outgoing packets to 0. The “af” choices stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences. |
| Apply | Click Apply to save your changes back to the Zyxel Device. |
| Reset | Click Reset to return the screen to its last-saved settings. |
What do the fields in an 802.1Q frame represent?
| FIELD | DESCRIPTION |
|---|---|
| DA | Destination Address |
| SA | Source Address |
| TPID | Tag Protocol IDentifier |
| Priority | 802.1p Priority |
| VID | VLAN ID |
| Len/Etype | Length and type of Ethernet frame |
| Data | Frame data |
| FCS | Frame Check Sequence |
What are the standard traffic types associated with 802.1p Priority Codes?
| PRIORITY | TRAFFIC TYPES |
|---|---|
| 0 (lowest) | Background |
| 1 | Best Effort |
| 2 | Excellent Effort |
| 3 | Critical Applications |
| 4 | Video, less than 100 ms latency and jitter |
| 5 | Voice, less than 10 ms latency and jitter |
| 6 | Internetwork Control |
| 7 (highest) | Network Control |
What are the fields in the Bandwidth Management Add/Edit screen?
| LABEL | DESCRIPTION |
|---|---|
| Create new Object | Use to configure any new settings objects that you need to use in this screen. |
| Configuration | |
| Enable | Select this check box to turn on this policy. |
| Description | Enter a description of this policy. It is not used elsewhere. You can use alphanumeric and ()+/:+?!*#@$_%- characters, and it can be up to 60 characters long. |
| Criteria | Use this section to configure the conditions of traffic to which this policy applies. |
| BWM Type | This field displays the below types of BWM rule: • Shared, when the policy is set for all users • Per User, when the policy is set for an individual user or a user group • Per Source IP, when the policy is set for a source IP |
| User | Select a user name or user group to which to apply the policy. Use Create new Object if you need to configure a new user account. Select any to apply the policy for every user. |
| Schedule | Select a schedule that defines when the policy applies or select Create Object to configure a new one. Otherwise, select none to make the policy always effective. |
| Incoming Interface | Select the source interface of the traffic to which this policy applies. |
| Outgoing Interface | Select the destination interface of the traffic to which this policy applies. |
| Source | Select a source address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Use Create new Object if you need to configure a new one. Select any if the policy is effective for every source. |
| Destination | Select a destination address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Use Create new Object if you need to configure a new one. Select any if the policy is effective for every destination. |
| DSCP Code | Select a DSCP code point value of incoming packets to which this policy route applies or select User Defined to specify another DSCP code point. The lower the number the higher the priority with the exception of 0 which is usually given only best-effort treatment. any means all DSCP value or no DSCP marker. default means traffic with a DSCP value of 0. This is usually best effort traffic The “af” choices stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences. |
| User-Defined DSCP Code | Use this field to specify a custom DSCP code point. |
| Service Type | Select Service Object or Application Object if you want a specific service (defined in a service object) to which the policy applies. |
| Service Object | This field is available if you selected Service Object as the service type. Select a service or service group to identify the type of traffic to which this policy applies. any means all services. |
| Application Object | This field is available if you selected Application Object as the service type. Click on the blank field to show the available options. Select application patrol services to identify the specific traffic to which this policy applies. If you select BitTorrent, it includes the services listed below at the time of writing: • BitTorrent • BitTorrent_FileTransfer • BitTorrent_Application • BitTorrent_Bundle |
| DSCP Marking | Set how the Zyxel Device handles the DSCP value of the incoming and outgoing packets that match this policy. Inbound refers to the traffic the Zyxel Device sends to a connection’s initiator. Outbound refers to the traffic the Zyxel Device sends out from a connection’s initiator. Select one of the pre-defined DSCP values to apply or select User Defined to specify another DSCP value. The “af” choices stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences. Select preserve to have the Zyxel Device keep the packets’ original DSCP value. Select default to have the Zyxel Device set the DSCP value of the packets to 0. |
| Bandwidth Shaping | Configure these fields to set the amount of bandwidth the matching traffic can use. |
| Inbound kbps | Type how much inbound bandwidth, in kilobits per second, this policy allows the traffic to use. Inbound refers to the traffic the Zyxel Device sends to a connection’s initiator. If you enter 0 here, this policy does not apply bandwidth management for the matching traffic that the Zyxel Device sends to the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7). If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth. |
| Outbound kbps | Type how much outbound bandwidth, in kilobits per second, this policy allows the traffic to use. Outbound refers to the traffic the Zyxel Device sends out from a connection’s initiator. If you enter 0 here, this policy does not apply bandwidth management for the matching traffic that the Zyxel Device sends out from the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7). If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth. |
| Priority | This field displays when the inbound or outbound bandwidth management is not set to 0. Enter a number between 1 and 7 to set the priority for traffic that matches this policy. The smaller the number, the higher the priority. Traffic with a higher priority is given bandwidth before traffic with a lower priority. When traffic with higher priority has reached the full bandwidth, the traffic with lower priority can use the remaining bandwidth. The Zyxel Device uses a fairness-based (round-robin) scheduler to divide bandwidth between traffic flows with the same priority. If the inbound or outbound limit is set to 0, the traffic is assigned to the lowest priority (7) regardless of this field’s configuration. |
| Maximize Bandwidth Usage | This field displays when the inbound or outbound bandwidth management is not set to 0 and the BWM Type is set to Shared. Enable maximize bandwidth usage to let the traffic matching this policy “borrow” all unused bandwidth on the out-going interface. After each application or type of traffic gets its configured bandwidth rate, the Zyxel Device uses the fairness-based scheduler to divide any unused bandwidth on the out-going interface among applications and traffic types that need more bandwidth and have maximize bandwidth usage enabled. |
| Maximum | If you did not enable Maximize Bandwidth Usage, then type the maximum unused bandwidth that traffic matching this policy is allowed to “borrow” on the out-going interface (in Kbps), here. |
| 802.1P Marking | Use 802.1P to prioritize outgoing traffic from a VLAN interface. |
| Priority Code | This is a 3-bit field within a 802.1Q VLAN tag that’s used to prioritize associated outgoing VLAN traffic. “O” is the lowest priority level and “7” is the highest. See Table 162 on page 532. The setting configured here overwrites existing priority settings. |
| Interface | Choose a VLAN interface to which to apply the priority level for matching frames. |
| Related Setting | |
| Log | Select whether to have the Zyxel Device generate a log (log), log and alert (log alert) or neither (no) when any traffic matches this policy. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
What fields are configured when adding a User object for BWM?
| LABEL | DESCRIPTION |
|---|---|
| User Name | Type a user or user group object name of the rule. |
| User Type | Select a user type from the drop down menu. The user types are Admin, Limited admin, User, Guest, Ext-user, Ext-group-user. |
| Password | Type a password for the user object. The password can consist of alphanumeric characters, the underscore, and some punctuation marks (+-/*= :; .! @$&%#~ ‘ \ ()), and it can be up to eight characters long. |
| Retype | Retype the password to confirm. |
| Description | Enter a description of this policy. It is not used elsewhere. You can use alphanumeric and ()+/:+?!*#@$_%- characters, and it can be up to 60 characters long. |
| Authentication Timeout Settings | Choose either Use Default setting option, which shows the default Lease Time of 1,440 minutes and Reauthentication Time of 1,440 minutes or you can enter them manually by choosing Use Manual Settings option. |
| Lease Time | This shows the Lease Time setting for the user, by default it is 1,440 minutes. |
| Reauthentication Time | This shows the Reauthentication Time for the user, by default it is 1,440 minutes. |
| OK | Click OK to save the setting. |
| Cancel | Click Cancel to abandon this screen. |
What fields are configured when adding a Schedule object?
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a name for the schedule object of the rule. |
| Type | Select an option from the drop down menu for the schedule object. It will show One Time or Recurring. |
| Start Date | Click the icon menu on the right to choose a Start Date for the schedule object. |
| Start Time | Click the icon menu on the right to choose a Start Time for the schedule object. |
| Stop Date | Click the icon menu on the right to choose a Stop Date for schedule object. |
| Stop Time | Click the icon menu on the right to choose a Stop Time for the schedule object. |
What fields are configured when adding an Address object?
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a name for the Address object of the rule. |
| Address Type | Select an Address Type from the drop down menu on the right. The Address Types are Host, Range, Subnet, Interface IP, Interface Subnet, and Interface Gateway. |
| IP Address | Enter an IP address for the Address object. |
| OK | Click OK to save the setting. |
| Cancel | Click Cancel to abandon the setting. |
How can I prioritize Microsoft Teams traffic using BWM?
Scenario: Client on LAN1 uses Teams. Goal is to prioritize Teams traffic.
Configuration Steps:
1. Go to Configuration > BWM. Click Add.
2. Set the BWM Type to Shared to apply the BWM rule to all matched traffic.
3. Under Criteria > Service Type, select Application Object, then click the Application Group field and select Teams.
4. Set Guaranteed Bandwidth (Inbound/Outbound) and Priority. For example, set Inbound and Outbound to 20000 kbps and Priority to 1 (highest).
5. Select Maximize Bandwidth Usage to allow the traffic that matches this rule borrow all unused bandwidth on the outgoing interface.
6. Click OK to save your changes.
Example Parameters (based on text and screenshot interpretation):
Table 167 BWM Example (Modified based on steps)| DESCRIPTION | BWM TYPE | SERVICE TYPE | APPLICATION GROUP | GUARANTEED BANDWIDTH | MAXIMIZE BW USAGE |
|---|---|---|---|---|---|
| Teams | Shared | Application Object | Teams | Inbound: 20000 kbps/ Priority: 1 Outbound: 20000 kbps/ Priority: 1 | Enabled |
What are the user authentication steps for different client types and Google Authenticator usage?
| CLIENT | GOOGLE AUTHENTICATOR | USER AUTHENTICATION STEPS |
|---|---|---|
| 802.1X | No | 1. 802.1X – Username/password 2. Web Authentication Portal – Username/password |
| 802.1X | Yes | 1. 802.1X – Username/password 2. Web Authentication Portal – Username/password 3. Web Authentication Portal – Google Authenticator code |
| Non-802.1X | No | 1. Web Authentication Portal – Username/password |
| Non-802.1X | Yes | 1. Web Authentication Portal – Username/password 2. Web Authentication Portal – Google Authenticator code |
| Windows (Non-802.1X) | No | None needed (if user is using Windows) |
| Windows (Non-802.1X) | Yes | None needed (if user is using Windows) |
What are the fields in the Web Authentication General screen?
| LABEL | DESCRIPTION |
|---|---|
| Global Setting | |
| Enable Web Authentication | Select the check box to turn on the web authentication feature. Otherwise, clear the check box to turn it off. Once enabled, all network traffic is blocked until a client authenticates with the Zyxel Device through the specifically designated web portal or user agreement page. |
| Web Portal General Setting | |
| Enable Session Page | Select this to display a page showing information on the user session after s/he logs in. It displays remaining time with an option to renew or log out immediately. |
| Logout IP | Specify an IP address that users can use to terminate their sessions manually by entering the IP address in the address bar of the web browser. |
| User Agreement General Setting | |
| Enforce data collection | Select this to require users to fill in their registration information (name, telephone number, address and email address) on the User Agreement (PC or mobile) page. |
| Google Authentication Setting | Web authentication supports two-factor authentication using Google Authenticator. When enabled, the web authentication page first prompts the user to enter their username and password (factor 1), and then prompts them to enter a time-limited code from the Google Authenticator app (factor 2). It is also possible to configure two-factor authentication for VPN and admin users. The admin two-factor authentication settings override the web authentication two-factor authentication settings if both are configured. |
| Valid Time | Enter the time limit (1-5 minutes) for the code from the Google Authenticator app to be used for login. |
| Exceptional Services | Use this table to list services that users can access without logging in. Click Add to change the list’s membership. A screen appears. Available services appear on the left. Select any services you want users to be able to access without logging in and click the right arrow button to add them. The member services are on the right. Select any service that you want to remove from the member list, and click the left arrow button to remove them. Keeping DNS as a member allows users’ computers to resolve domain names into IP addresses. |
| Web Authentication Policy Summary | Use this table to manage the Zyxel Device’s list of web authentication policies. |
| Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
| Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. In the table, select one or more entries and click Remove to delete it or them. |
| Activate | To turn on an entry, select it and click Activate. |
| Inactivate | To turn off an entry, select it and click Inactivate. |
| Move | To move an entry to a different number in the list, click the Move icon. In the field that appears, specify the number to which you want to move the interface. |
| # | This field is a sequential value showing the number of the profile. The profile order is not important. |
| Status | This icon is lit when the entry is active and dimmed when the entry is inactive. |
| Priority | This is the position of the authentication policy in the list. The priority is important as the policies are applied in order of priority. Default displays for the default authentication policy that the Zyxel Device uses on traffic that does not match any exceptional service or other authentication policy. You can edit the default rule but not delete it. |
| Incoming Interface | This field displays the interface on which packets for this policy are received. |
| Source | This displays the source address object, including geographic address and FQDN (group) objects, to which this policy applies. |
| Destination | This displays the destination address object, including geographic address and FQDN (group) objects, to which this policy applies. |
| Schedule | This field displays the schedule object that dictates when the policy applies. none means the policy is active at all times if enabled. |
| Authentication | This field displays the authentication requirement for users when their traffic matches this policy. unnecessary – Users do not need to be authenticated. required – Users need to be authenticated. They must manually go to the login screen or user agreement page. The Zyxel Device will not redirect them to the login screen. force – Users need to be authenticated. The Zyxel Device automatically displays the login screen or user agreement page whenever it routes HTTP traffic for users who have not logged in yet. |
| Authentication Type | This field displays the name of the authentication type profile used in this policy to define how users authenticate their sessions. It shows n/a if Authentication is set to unnecessary. |
| Description | If the entry has a description configured, it displays here. This is n/a for the default policy. |
| Apply | Click this button to save your changes to the Zyxel Device. |
| Reset | Click this button to return the screen to its last-saved settings. |
How do I add/edit a Web Authentication Policy?
Open the Configuration > Web Authentication > General screen, then click the Add icon or select an entry and click the Edit icon in the Web Authentication Policy Summary section to open the Auth. Policy Add/Edit screen.
Table 170 Configuration > Web Authentication > General > Add Authentication Policy| LABEL | DESCRIPTION |
|---|---|
| Create new Object | Use to configure any new settings objects that you need to use in this screen. Select Address or Schedule. |
| Enable Policy | Select this check box to activate the authentication policy. This field is available for user-configured policies. |
| Description | Enter a descriptive name with 1 to 63 single-byte characters, including a-zA-Z0-9!”#$%&'()*+,-/:;=?@_ and spaces. .<<>[\]^'{|} are not allowed. This field is available for user-configured policies. |
| User Authentication Policy | Use this section of the screen to determine which traffic requires (or does not require) the senders to be authenticated in order to be routed. |
| Incoming Interface | Select the interface on which packets for this policy are received. |
| Source Address | Select a source address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Select any if the policy is effective for every source. This is any and not configurable for the default policy. |
| Destination Address | Select a destination address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Select any if the policy is effective for every destination. This is any and not configurable for the default policy. |
| Schedule | Select a schedule that defines when the policy applies. Otherwise, select none and the rule is always effective. This is none and not configurable for the default policy. |
| Authentication | Select the authentication requirement for users when their traffic matches this policy. unnecessary – Users do not need to be authenticated. required – Users need to be authenticated. If Force User Authentication is selected, all HTTP traffic from unauthenticated users is redirected to a default or user-defined login page. Otherwise, they must manually go to the login screen. The Zyxel Device will not redirect them to the login screen. |
| Force User Authentication | This field is available for user-configured policies that require authentication. Select this to have the Zyxel Device automatically display the login screen when users who have not logged in yet try to send HTTP traffic. |
| Authentication Type | Select an authentication method. default-web-portal: the default login page built into the Zyxel Device. default-user-agreement: the default user agreement page built into the Zyxel Device. |
| Single Sign-On using 802.1X | 802.1X Single Sign-On allows the Zyxel Device to use the same username and password for 802.1X WiFi authentication and web authentication. When enabled, a user logs into a WiFi network on the Zyxel Device that has 802.1X (WPA Enterprise) enabled. The Zyxel Device then reuses the 802.1X username and password for web authentication, preventing the user from having to log in twice. Active Directory Single Sign-On takes priority over 802.1X Single Sign-On, if both are enabled. |
| Google Authenticator | Select Google Authenticator to first prompt a user to enter their username and password (factor 1), and then prompt the user to enter a time-limited code from the Google Authenticator app (factor 2). |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving. |
How do I set up user accounts for authentication via an external RADIUS server?
Set up user accounts in the RADIUS server. This example uses the Web Configurator. If you can export user names from the RADIUS server to a text file, then you might configure a script to create the user accounts instead.
1. Click Configuration > Object > User/Group > User. Click the Add icon.
2. Enter the same user name that is used in the RADIUS server, and set the User Type to ext-user because this user account is authenticated by an external server. Click OK.
3. Repeat this process to set up the remaining user accounts.
How do I set up user groups and assign users for RADIUS authentication?
Set up the user groups and assign the users to the user groups.
1. Click Configuration > Object > User/Group > Group. Click the Add icon.
2. Enter the name of the group. In this example, it is “Finance”. Then, select Object/Leo and click the right arrow to move him to the Member list. This example only has one member in this group, so click OK. Of course you could add more members later.
3. Repeat this process to set up the remaining user groups.
How do I configure the Zyxel Device to use a RADIUS server for authentication?
This step sets up user authentication using the RADIUS server. First, configure the settings for the RADIUS server. Then, set up the authentication method, and configure the Zyxel Device to use the authentication method.
1. Click Configuration > Object > AAA Server > RADIUS. Double-click the radius entry. Configure the RADIUS server’s address, authentication port (1812 if you were not told otherwise), and key. Click OK.
2. Click Configuration > Object > Auth. Method. Double-click the default entry. Click the Add icon. Select group radius because the Zyxel Device should use the specified RADIUS server for authentication. Click OK.
3. Click Configuration > Web Authentication. In the Web Authentication > General screen, select Enable Web Authentication to turn on the web authentication feature and click Apply.
How do I create the web authentication policy to enforce RADIUS login?
4. In the Web Authentication Policy Summary section, click the Add icon to set up a default policy that has priority over other policies and forces every user to log into the Zyxel Device before the Zyxel Device routes traffic for them.
5. Select Enable Policy. Enter a descriptive name, “default_policy” for example. Set the Authentication field to required, and make sure Force User Authentication is selected. Select an authentication type profile (“default-web-portal” in this example). Keep the rest of the default settings, and click OK.
Note: The users must log in at the Web Configurator login screen before they can use HTTP or MSN.
When the users try to browse the web (or use any HTTP application), the login screen appears. They have to log in using the user name and password in the RADIUS server.
How can I authenticate users based on group membership defined on a RADIUS server?
The previous example showed how to have a RADIUS server authenticate individual user accounts. If the RADIUS server has different user groups distinguished by the value of a specific attribute, you can make a couple of slight changes in the configuration to have the RADIUS server authenticate groups of user accounts defined in the RADIUS server.
1. Click Configuration > Object > AAA Server > RADIUS. Double-click the radius entry. Besides configuring the RADIUS server’s address, authentication port, and key; set the Group Membership Attribute field to the attribute that the Zyxel Device is to check to determine to which group a user belongs. This example uses Class. This attribute’s value is called a group identifier; it determines to which group a user belongs. In this example the values are Finance, Engineer, Sales, and Boss.
2. Now you add ext-group-user objects to identify groups based on the group identifier values. Set up one user account for each group of user accounts in the RADIUS server. Click Configuration > Object > User/Group > User. Click the Add icon.
3. Enter a user name and set the User Type to ext-group-user. In the Group Identifier field, enter Finance, Engineer, Sales, or Boss and set the Associated AAA Server Object to radius.
4. Repeat this process to set up the remaining groups of user accounts.
What are the fields in the Authentication Type screen?
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
| Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| # | This field is a sequential value, and it is not associated with a specific entry. |
| Name | This field displays the name of the profile. default-web-portal: the default login page built into the Zyxel Device. Note: You can also customize the default login page built into the Zyxel Device in the System > WWW > Login Page screen. default-user-agreement: the default user agreement page built into the Zyxel Device. |
| Type | This field displays the type of the web authentication page used by this profile. |
| Web Page | This field displays whether this profile uses the default web authentication page built into the Zyxel Device (System Default Page) or custom web authentication pages from an external web server (External Page). |
| Reset | Click Reset to return the screen to its last-saved settings. |
What are the fields for adding/editing an Authentication Type Profile?
| LABEL | DESCRIPTION |
|---|---|
| Type | Select the type of the web authentication page through which users authenticate their connections. If you select User Agreement, by agreeing to the policy of user agreement, users can access the Internet without a guest account. |
| Profile Name | Enter a name for the profile. You can use up to 31 alphanumeric characters (A-Z, a-z, 0-9) and underscores (_). Spaces are not allowed. The first character must be a letter. |
| The following fields are available if you set Type to Web Portal. | |
| Internal Web Portal | Select this to use the web portal pages uploaded to the Zyxel Device. The login page appears whenever the web portal intercepts network traffic, preventing unauthorized users from gaining access to the network. |
| Preview | Select to display the page you uploaded to the Zyxel Device in a new frame. Note: You must select a custom file uploaded to the Zyxel Device before you can preview the pages. |
| Customize file | Select the file name of the web portal file in the Zyxel Device. Note: You can upload zipped custom web portal files to the Zyxel Device using the Configuration > Web Authentication > Web Portal Customize File screen. |
| External Web Portal | Select this to use a custom login page from an external web portal instead of the one uploaded to the Zyxel Device. You can configure the look and feel of the web portal page. |
| Login URL | Specify the login page’s URL; for example, http://IIS server IP Address/login.html. The Internet Information Server (IIS) is the web server on which the web portal files are installed. |
| Logout URL | Specify the logout page’s URL; for example, http://IIS server IP Address/logout.html. The Internet Information Server (IIS) is the web server on which the web portal files are installed. |
| Welcome URL | Specify the welcome page’s URL; for example, http://IIS server IP Address/welcome.html. Users will be redirected to the welcome page after authentication. This field is optional. The Internet Information Server (IIS) is the web server on which the web portal files are installed. |
| Session URL | Specify the session page’s URL; for example, http://IIS server IP Address/session.html. The Internet Information Server (IIS) is the web server on which the web portal files are installed. |
| Error URL | Specify the error page’s URL; for example, http://IIS server IP Address/error.html. The Internet Information Server (IIS) is the web server on which the web portal files are installed. |
| Download | Click this to download an example external web portal file for your reference. |
| The following fields are available if you set Type to User Agreement. | |
| Enable Idle Detection | This is applicable for access users. Select this check box if you want the Zyxel Device to monitor how long each access user is logged in and idle (in other words, there is no traffic for this access user). The Zyxel Device automatically logs out the access user once the Idle timeout has been reached. |
| Idle timeout | This is applicable for access users. This field is effective when Enable Idle Detection is checked. Type the number of minutes each access user can be logged in and idle before the Zyxel Device automatically logs out the access user. |
| Reauthentication Time | Enter the number of minutes the user can be logged into the Zyxel Device in one session before having to log in again. (Value 0 means unlimited) |
| Internal User Agreement | Select this to use the user agreement pages in the Zyxel Device. The user agreement page appears whenever the Zyxel Device intercepts network traffic, preventing unauthorized users from gaining access to the network. |
| Preview | Select to display the page you uploaded to the Zyxel Device in a new frame. Note: You must select a custom file uploaded to the Zyxel Device before you can preview the pages. |
| Customize file | Select the file name of the user agreement file in the Zyxel Device. Note: You can upload zipped custom user agreement files to the Zyxel Device using the Configuration > Web Authentication > User Agreement Customize File screen. |
| External User Agreement | Select this to use custom user agreement pages from an external web server instead of the default one built into the Zyxel Device. You can configure the look and feel of the user agreement page. |
| Agreement URL | Specify the user agreement page’s URL; for example, http://IIS server IP Address/logout.html. The Internet Information Server (IIS) is the web server on which the user agreement files are installed. |
| Welcome URL | Specify the welcome page’s URL; for example, http://IIS server IP Address/welcome.html. The Internet Information Server (IIS) is the web server on which the user agreement files are installed. If you leave this field blank, the Zyxel Device will use the welcome page of internal user agreement file. |
| Download | Click this to download an example external user agreement file for your reference. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving. |
What are the fields in the Custom Web Portal / User Agreement File screen?
| LABEL | DESCRIPTION |
|---|---|
| Remove | Click a file’s row to select it and click Remove to delete it from the Zyxel Device. |
| Download | Click a file’s row to select it and click Download to save the zipped file to your computer. |
| # | This column displays the index number for each file entry. This field is a sequential value, and it is not associated with a specific entry. |
| File Name | This column displays the label that identifies a web portal or user agreement file. |
| Size | This column displays the size (in KB) of a file. |
| Last Modified | This column displays the date and time that the individual files were last changed or saved. |
| Browse / Upload | Click Browse… to find the zipped file you want to upload, then click the Upload button to put it on the Zyxel Device. |
| Download (External Example) | Click this to download an example external web portal or user agreement file for your reference. |
Where are corresponding settings configured between the Zyxel Device and the SSO Agent?
| ZYXEL DEVICE SCREEN | ZYXEL DEVICE FIELD | SSO SCREEN | SSO FIELD |
|---|---|---|---|
| Web Authentication > SSO | Listen Port | Agent Configuration Page > Gateway Setting | Gateway Port |
| Web Authentication > SSO | Primary Agent Port | Agent Configuration Page | Agent Listening Port |
| Object > User/Group > User > Add | Group Identifier | Agent Configuration Page > Configure LDAP/AD Server | Group Membership |
| Object > AAA Server > Active Directory > Add | Base DN | Agent Configuration Page > Configure LDAP/AD Server | Base DN |
| Object > AAA Server > Active Directory > Add | Bind DN | Agent Configuration Page > Configure LDAP/AD Server | Bind DN |
| Object > User/Group > User > Add | User Name | Agent Configuration Page > Configure LDAP/AD Server | Login Name Attribute |
| Object > AAA Server > Active Directory > Add | Server Address | Agent Configuration Page > Configure LDAP/AD Server | Server Address |
| Network > Interface > Ethernet > wan (IPv4) | IP address | Agent Configuration Page > Gateway Setting | Gateway IP |
What needs to be configured on the Zyxel Device for SSO?
These are the screens you need to configure:
• Configure the Zyxel Device to Communicate with SSO on page 563
• Enable Web Authentication on page 564
• Create a Security Policy on page 566
• Configure User Information on page 567
• Configure an Authentication Method on page 568
• Configure Active Directory on page 569
How do I configure the Zyxel Device communication settings for the SSO agent?
Use Configuration > Web Authentication > SSO to configure how the Zyxel Device communicates with the Single Sign-On (SSO) agent.
Table 175 Configuration > Web Authentication > SSO| LABEL | DESCRIPTION |
|---|---|
| Listen Port | The default agent listening port is 2158. If you change it on the Zyxel Device, then change it to the same number in the Gateway Port field on the SSO agent too. Type a number ranging from 1025 to 65535. |
| Agent PreShareKey | Type 8-32 single-byte characters, including 0-9a-zA_Z!”#$%&'()*+,-./:;<=>?@\^_’ [] are not allowed. The Agent PreShareKey is used to encrypt communications between the Zyxel Device and the SSO agent. |
| Primary Agent | Type the IPv4 address of the SSO agent. The Zyxel Device and the SSO agent must be in the same domain and be able to communicate with each other. |
| Primary Agent Port | Type the same port number here as in the Agent Listening Port field on the SSO agent. Type a number ranging from 1025 to 65535. |
| Secondary Agent Address (Optional) | Type the IPv4 address of the backup SSO agent if there is one. The Zyxel Device and the backup SSO agent must be in the same domain and be able to communicate with each other. |
| Secondary Agent Port (Optional) | Type the same port number here as in the Agent Listening Port field on the backup SSO agent if there is one. Type a number ranging from 1025 to 65535. |
| Apply | Click this button to save your changes to the Zyxel Device. |
| Reset | Click this button to return the screen to its last-saved settings |
How do I configure the Zyxel SSO Agent?
After you install the SSO agent, you will see an icon in the system tray (bottom right of the screen).
Right-click the SSO icon and select Configure Zyxel SSO Agent.
Configure the Agent Listening Port, AD server exactly as you have done on the Zyxel Device. Add the Zyxel Device IP address as the Gateway. Make sure the Zyxel Device and SSO agent are able to communicate with each other.
Configure the Server Address, Port, Base DN, Bind DN, Login Name Attribute and Group Membership for the AD server settings exactly as you have done on the Zyxel Device. Group Membership is called Group Identifier on the Zyxel Device.
Configure the Gateway IP address, Gateway Port and PreShareKey exactly as you have done in the Zyxel Device Configuration > Web Authentication > SSO screen. If you want to use Generate Key to have the SSO create a random password, select Check to show PreShareKey as clear Text so as to see the password, then copy and paste it to the Zyxel Device.
After all SSO agent configurations are done, right-click the SSO icon in the system tray and select Enable Zyxel SSO Agent.
What is the default behavior for traffic between different zones?
| FROM ZONE TO ZONE | BEHAVIOR |
|---|---|
| From any to Device | DHCP traffic from any interface to the Zyxel Device is allowed. |
| From LAN1 to any (other than the Zyxel Device) | Traffic from the LAN1 to any of the networks connected to the Zyxel Device is allowed. |
| From LAN2 to any (other than the Zyxel Device) | Traffic from the LAN2 to any of the networks connected to the Zyxel Device is allowed. |
| From LAN1 To Device | Traffic from the LAN1 to the Zyxel Device itself is allowed. |
| From LAN2 to Device | Traffic from the LAN2 to the Zyxel Device itself is allowed. |
| From WAN to Device | The default services listed in To-Device Policies are allowed from the WAN to the Zyxel Device itself. All other WAN to Zyxel Device traffic is dropped. |
| From any to any | Traffic that does not match any Security policy is dropped. This includes traffic from the WAN to any of the networks behind the Zyxel Device. This also includes traffic to or from interfaces that are not assigned to a zone (extra-zone traffic). |
How does the Zyxel Device apply security policies?
How can I block all LAN to WAN IRC traffic?
Table 191 Blocking All LAN to WAN IRC Traffic Example
| # | USER | SOURCE | DESTINATION | SCHEDULE | SERVICE | ACTION |
|---|---|---|---|---|---|---|
| 1 | Any | Any | Any | Any | IRC | Deny |
| 2 | Any | Any | Any | Any | Any | Allow |
- The first row blocks LAN access to the IRC service on the WAN.
- The second row is the Security Policy’s default policy that allows all LAN1 to WAN traffic.
How can I block all LAN to WAN IRC traffic except for a specific user like the CEO?
Method 1: Using CEO’s IP Address (e.g., 172.16.1.7)
Configure the policies as shown in Table 192. The first rule allows IRC traffic specifically from the CEO’s IP address. The second rule denies IRC traffic from all other LAN sources. The third rule is the default policy allowing other traffic.
Table 192 Limited LAN1 to WAN IRC Traffic Example 1
| # | USER | SOURCE | DESTINATION | SCHEDULE | SERVICE | ACTION |
|---|---|---|---|---|---|---|
| 1 | Any | 172.16.1.7 | Any | Any | IRC | Allow |
| 2 | Any | Any | Any | Any | IRC | Deny |
| 3 | Any | Any | Any | Any | Any | Allow |
- The first row allows the LAN1 computer at IP address 172.16.1.7 to access the IRC service on the WAN.
- The second row blocks LAN1 access to the IRC service on the WAN.
- The third row is the default policy of allowing all traffic from the LAN1 to go to the WAN.
Method 2: Using CEO’s User Name (e.g., CEO)
Configure the policies as shown in Table 193. The first rule allows IRC traffic for the user “CEO” regardless of the source IP address. The second rule denies IRC traffic for all other users. The third rule is the default policy.
Table 193 Limited LAN1 to WAN IRC Traffic Example 2
| # | USER | SOURCE | DESTINATION | SCHEDULE | SERVICE | ACTION |
|---|---|---|---|---|---|---|
| 1 | CEO | Any | Any | Any | IRC | Allow |
| 2 | Any | Any | Any | Any | IRC | Deny |
| 3 | Any | Any | Any | Any | Any | Allow |
- The first row allows any LAN1 computer to access the IRC service on the WAN by logging into the Zyxel Device with the CEO’s user name.
- The second row blocks LAN1 access to the IRC service on the WAN.
- The third row is the default policy of allowing allows all traffic from the LAN1 to go to the WAN.
Important Note on Policy Order: In both methods, the policy allowing the CEO’s traffic *must* come before the policy that blocks general IRC traffic. This ensures the CEO’s traffic matches the allow rule first.
What are the requirements for ensuring a specific computer (e.g., CEO’s) always gets the same IP address for policy application?
Has a static IP address configured directly on the computer,
OR
You configure a static DHCP entry for it on the Zyxel Device. This makes the Zyxel Device’s DHCP server always assign the same IP address to that computer based on its MAC address.
Why must the policy allowing specific traffic (like the CEO’s IRC) come before a policy blocking general traffic of the same type?
What can I do with the Web Content Filter feature?
– Set up web content filtering profiles (General screens).
– Create a common list of allowed websites (Trusted Web Sites).
– Create a common list of blocked websites (Forbidden Web Sites).
– Block specific web features like cookies or ActiveX by inspecting web pages.
– Block access to websites by inspecting the URL or Server Name Indication (SNI).
What can I do with the DNS Content Filter feature?
– Set up DNS content filtering profiles (General screens).
– Create a list of allowed website addresses (Allow List).
– Create a list of blocked website addresses (Block List).
– Block access even if the user is using TLS 1.3 with Encrypted SNI (ESNI), unlike the Web Content Filter.
What is the process flow for Web Content Filtering?
1. A user enters a URL into their web browser.
2. The user’s computer sends a DNS query for the URL.
3. The DNS server returns an IP address for the URL.
4. The user’s web browser connects to the IP address.
5. The Web Content Filter detects an HTTP(S) connection and inspects the website requested, often using Server Name Indication (SNI) for HTTPS traffic.
6. If the website contains prohibited material according to the configured policies and profiles, the HTTP request is redirected to a block page (or the connection is dropped/handled as configured).
What is required for Web Content Filter to work if the user’s browser uses encryption (HTTPS)?
When will DNS Content Filter not work?
What can be configured within a Web Content Filtering Policy?
– Use schedule objects to define *when* to apply a content filter profile.
– Use address and/or user/group objects to define *to whose* web access the content filter profile applies.
– Apply a specific, custom-tailored content filter *profile* that defines the filtering rules (categories, features, specific sites).
What features can be customized in a Web Content Filtering Profile?
– Category-based Blocking: Block access to websites based on predefined content categories (e.g., pornography, gambling).
– Restrict Web Features: Disable web proxies and block features like ActiveX controls, Java applets, and cookies.
– Customize Web Site Access: Specify particular URLs to block or, alternatively, block all URLs except specific allowed ones. You can also block URLs containing specific keywords.
How does the Zyxel Device process Web Content Filtering policies?
What happens if an HTTP request doesn’t match any content filter policy?
– If the default policy is not set to block, the request is allowed.
– If the default policy is set to block, the request is blocked.
What is the External Web Filtering Service?
What is HTTPS Domain Filter and how does it differ from SSL Inspection?
How does the Zyxel Device perform keyword blocking based on URLs?
– The domain name/IP address is the part before the first slash (e.g., `www.zyxel.com.tw` in `www.zyxel.com.tw/news/pressroom.php`).
– The file path is the part after the first slash (e.g., `news/pressroom.php` in the same URL).
Because it checks them separately, it will not find keywords that span across the domain name and file path. For instance, it would find “tw” in the domain and “news” in the path of the example URL, but it would *not* find “tw/news”.What is DNS Content Filter and how does it work?
What is the process flow for DNS Content Filter?
1. A user enters a URL into their web browser.
2. The user’s computer sends a DNS query for the URL (to the Zyxel Device if it’s the DNS server/forwarder).
3. The DNS Content Filter inspects the requested website domain in the DNS query packet.
4. If the website domain matches prohibited criteria, the DNS reply sent back to the user is altered to redirect the user to a block page IP address instead of the actual website’s IP.
What needs to be configured before setting up a content security policy?
– An address object (defining source/destination IPs or users/groups)
– A schedule object (defining when the policy applies)
– A filtering profile (defining the specific content filtering rules, categories, actions, etc.)
Additionally, for features relying on external databases (like category filtering), you must have the appropriate Content Filtering license activated.How do I access and use the Web Content Filter General screen?
Access the screen by navigating to Configuration > Security Service > Content Filter > Web Content Filter > General.
Use this screen to:
– Enable overall content filtering.
– Enable specific features like HTTPS Domain Filter.
– Configure global settings like block/warn pages, redirect URLs, and denied access messages.
– Set the timeout for the category service.
– Test website categories.
– Manage (Add, Edit, Remove, Reorder) Web Content Filter profiles.
Refer to Table 194 for details on each field.
Table 194 Configuration > Security Service > Content Filter > Web Content Filter> General (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Enable HTTPS Domain Filter for HTTPS traffic | Select this check box to have the Zyxel Device block HTTPS web pages using the cloud category service by checking the SNI in the client request against categories (domain name match only). |
| Enable Content Filter HTTPS Domain Filter Block/Warn Page | Use this field to have the Zyxel Device display a warning page instead of a blank page when an HTTPS connection is redirected. |
| Block/Warn Page Port | Use the default port number or specify a unique custom port for the warning page. |
| Drop connection when HTTPS connection with SSL V3 or previous version | Select this check box to have the Zyxel Device block HTTPS web pages using SSL V3 or a previous version. |
| Content Filter Category Service Timeout | Specify the allowable time period in seconds (1-60) for accessing the external web filtering service’s server. |
| Denied Access Message | Enter a message (up to 127 characters) to display when content filter blocks access to a web page. |
| Redirect URL | Enter the URL of a web page to send users to when their web access is blocked. This page opens in a new frame below the denied access message (if configured). Format: “http://” or “https://” followed by URL. |
| Test Web Site Category | |
| URL to test | Enter a web site URL to check which category it belongs to according to the Zyxel Device’s database. Displays results for both full URL (Content Filtering) and domain name (HTTPS Domain Filter). |
| If you think the category is incorrect… | Click this link to see the category recorded in the Zyxel Device’s database or submit a review request if you believe it’s incorrect. |
| Profile Management | |
| Add | Click Add to create a new content filter profile. |
| Edit | Click Edit to make changes to a selected content filter profile. |
| Remove | Click Remove to delete a selected content filter profile. |
| References | Select an entry and click References to see which settings use this profile. |
| # | Index number of the content filter profile. |
| Name | Name of the content filter profile rule. |
| Description | Description of the content filter profile rule. |
| Reference | Displays the number of times this profile is used in an Object Reference (e.g., in a security policy). |
| Action | Click the icon to apply the content filter profile within a security policy (navigates to Policy Control screen). |
| Apply | Click Apply to save changes made on this screen. |
| Reset | Click Reset to revert the screen to its last-saved settings. |
How do I apply a Web Content Filter profile to a Security Policy?
1. Navigate to the Web Content Filter General screen (Configuration > Security Service > Content Filter > Web Content Filter > General).
2. In the Profile Management section, select the content filter profile you want to apply.
3. Click the icon in the Action column for that profile.
4. This will take you to the Configuration > Security Policy > Policy Control screen.
5. Find the security policy rule you want to apply the profile to (e.g., LAN1_Outgoing).
6. Edit that security policy rule.
7. In the policy rule’s settings, locate the UTM Profile section.
8. Select your desired Web Content Filter profile from the dropdown list.
9. Configure the logging option for the profile (e.g., Log: by profile).
10. Click OK to save the changes to the security policy rule.
What information is displayed for each security policy rule in the Policy Control screen?
Table 195 Configuration > Security Service > Content Filter > Action (Columns)
| LABEL | DESCRIPTION |
|---|---|
| Priority (Pri…) | The position of the policy in the list; policies are applied in sequence. ‘Default’ indicates the default policy. |
| Status (St…) | An icon indicating if the policy is active (lit) or inactive (dimmed). |
| Name | The name of the Security policy. |
| From / To | The direction of traffic flow (source zone to destination zone) the policy applies to (e.g., LAN1 to WAN, any to ZyWALL). |
| IPv4/IPv6 Source | The source address object(s) (IP, FQDN, geographic, group) the policy applies to. |
| IPv4/IPv6 Destination | The destination address object(s) (IP, FQDN, geographic, group) the policy applies to. |
| Service | The service object(s) (protocol, port) the policy applies to. |
| User | The user or user group object the policy applies to. |
| Schedule | The schedule object defining when the policy is active. ‘none’ means always active if enabled. |
| Action (A…) | The action taken when traffic matches the policy: allow, deny, or reject. |
| Log | Indicates whether logging (no, log, log alert) is enabled for matched traffic. |
| Profile | Shows which Security Service profiles (e.g., Content Filter, Anti-Malware) are applied to this policy. Icons can be clicked to edit the profile. |
How do I add or edit a Web Content Filter profile based on Category Service?
1. Navigate to Configuration > Security Service > Content Filter > Web Content Filter > General.
2. In the Profile Management section, click Add to create a new profile or select an existing profile and click Edit.
3. Ensure the Category Service tab is selected.
4. Configure the General Settings:
– Enter a Name and optional Description.
– Optionally enable SafeSearch for supported search engines.
– Enable Content Filter Category Service to use the external database (requires license).
– Configure logging options (Log all web pages).
– Choose the Action (Pass, Block, Warn, Log) for Managed Web Pages (categorized sites).
– Choose the Action (Pass, Block, Warn, Log) for Unrated Web Pages (uncategorized sites).
– Choose the Action (Pass, Block, Warn) when the Category Server is unavailable.
– Optionally enable Log-alert for Block/Warn actions.
5. Select Categories: Check the boxes for the website categories you want to manage (typically block).
6. Optionally test a URL against the category server.
7. Click OK to save the profile.
Refer to Table 196 for detailed descriptions of each field.
Table 196 Configuration > Security Service > Content Filter > Web Content Filter > General > Add > Category Service (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Description | Optional description (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Enable SafeSearch | Automatically filter explicit results on Yahoo, Google, MSN Live Bing, Yandex. |
| Enable Content Filter Category Service | Enable use of external database for categorization. Requires license. |
| Log all web pages | Record access attempts for pages matching selected categories, unrated pages, or when the server is unavailable. |
| Action for Managed Web Pages | Select Pass, Block, or Log for pages matching selected categories. Blocked pages show denied message/redirect. If a page matches multiple categories and at least one is Block, it’s blocked. |
| Action for Unrated Web Pages | Select Pass, Block, Warn, or Log for pages not categorized by the service. Warn displays a message before allowing access. |
| Action When Category Server Is Unavailable | Select Pass, Block, or Warn for requested pages when the external database cannot be reached (timeout, resolution error, license issue). |
| Log-alert for Block/Warn action | Generate logs at alert level (instead of info) for Block/Warn actions if Log is also selected for the corresponding action. Check logs in Monitor > Log > View Log > Priority. |
| Select All Categories | Check this box to select all categories below. |
| Clear All Categories | Check this box to deselect all categories below. |
| Managed Categories | Check the boxes for categories to which the ‘Action for Managed Web Pages’ applies. Requires Category Service license. See Table 197 for descriptions. |
| URL to test | Enter a URL to see its category according to the content filter database. |
| Test Against Content Filter Category Server | Click to query the external server database for the category of the test URL. |
Can you describe the Managed Categories available for Web Content Filtering?
– Adult Topics: Content unsuitable for children.
– Alcohol: Sites selling/promoting alcohol.
– Anonymizing Utilities: Services that hide user identity.
– Auctions Classifieds: Online bidding/selling sites.
– Blogs/Wiki: Sites with dynamic user-generated content.
– Business: Business-related information and services.
– Chat: Real-time web-based messaging rooms (includes IRC).
– Computing Internet: Computer hardware/software reviews, news.
– Consumer Protection: Sites known for cheating consumers.
– Content Server: URLs hosting images/media for other sites.
– Dating Personals: Online dating, matchmaking sites.
– Drugs: Information on illegal/recreational drugs.
– Education Reference: Academic content, school sites.
– Entertainment: Movies, music, TV, celebrity news.
– Finance Banking: Financial information, online banking access.
– Gambling: Sites allowing online betting/wagering.
– Games: Online games, cheats, game info (non-profit).
– Government Military: Official government/military sites.
– Health: Health information and services.
– Illegal UK: Specific illegal content hosted in the UK.
– Information Security: Legitimate data protection information.
– Job Search: Job listings, resume help.
– Media Sharing: Sites for uploading/sharing media files.
– Pornography: Materials intended to be sexually arousing.
– Remote Access: Sites providing remote computer access.
– Social Networking: General social interaction sites.
– Weapons: Information on buying, making, using weapons.
… and many others.
Refer to Table 197 in the PDF for the complete list and detailed descriptions of all categories.
How do I configure a Web Content Filter profile using Custom Service (allowed/blocked lists and keywords)?
1. Navigate to Configuration > Security Service > Content Filter > Web Content Filter > General.
2. Click Add or select a profile and click Edit.
3. Select the Custom Service tab.
4. Configure the General Settings:
– Enter a Name and optional Description.
– Select Enable Custom Service.
– Optionally, select Allow web traffic for trusted web sites only to block everything *except* sites in the Trusted list.
– Optionally, select Check Common Trusted/Forbidden List to include the global lists configured separately.
5. Configure Restricted Web Features:
– Check boxes under Block to block ActiveX, Java, Cookies, or Web Proxy access.
– Optionally, select Allow Java/ActiveX/Cookies/Web proxy to trusted web sites to permit these features only for sites in the profile’s Trusted Web Sites list.
6. Manage Trusted Web Sites:
– Click Add/Edit/Remove to manage the list of allowed websites (enter domain names like `*.example.com` or `www.good-site.com`).
7. Manage Forbidden Web Sites:
– Click Add/Edit/Remove to manage the list of blocked websites (enter domain names like `*.bad-site.com`).
8. Manage Blocked URL Keywords:
– Click Add/Edit/Remove to manage the list of keywords. URLs containing these keywords in the domain name or path will be blocked (e.g., `*keyword*`).
9. Click OK to save the profile.
Refer to Table 198 for detailed descriptions of each field.
Table 198 Configuration > Security Service > Content Filter > Web Content Filter > General > Custom Service (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Description | Optional description (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Enable Custom Service | Select to enable the trusted/forbidden lists and keyword blocking configured in this profile. |
| Allow Web traffic for trusted web sites only | If checked, blocks access to all sites *except* those listed in the Trusted Web Sites list below. |
| Check Common Trusted/ Forbidden List | Select to incorporate the globally defined Common Trusted and Forbidden Web Sites lists (configured under Trusted/Forbidden Web Sites tabs) into this profile’s checks. |
| Restricted Web Features – Block | Check boxes to block ActiveX, Java, Cookies, or Web Proxy. ActiveX/Java blocks the specific element; Proxy/Cookies blocks/removes the item but the page may load. |
| Allow Java/ActiveX/Cookies/ Web proxy to trusted web sites | If checked, allows these restricted features only for sites included in the Trusted Web Sites list configured within this profile. |
| Trusted Web Sites | Manage the list of websites always allowed by this profile. Use Add/Edit/Remove. Enter host names (e.g., http://www.example.com, *.example.com). “*” is wildcard. Must contain “.”. Max 127 chars. Case-insensitive. |
| Forbidden Web Sites | Manage the list of websites always blocked by this profile. Use Add/Edit/Remove. Enter host names similarly to Trusted Web Sites. |
| Blocked URL Keywords | Manage the list of keywords. Sites whose URLs contain these keywords (in domain or path) will be blocked. Use Add/Edit/Remove. Enter keywords (e.g., *bad_word*). “*” is wildcard. Max 127 chars. Case-insensitive. “|” is single char wildcard. |
How do I manage the common Trusted and Forbidden Web Sites lists?
These lists provide a global set of allowed (Trusted) and blocked (Forbidden) websites that can be referenced by individual Content Filter profiles.
Accessing the Lists:
– Navigate to Configuration > Security Service > Content Filter > Web Content Filter > Trusted/Forbidden Web Sites.
– Click the Trusted Web Sites tab for the allowed list or the Forbidden Web Sites tab for the blocked list.
Managing Entries:
– Use the Add, Edit, and Remove buttons to manage the site entries.
– Enter host names (e.g., `www.example.com`, `*.example.com`). Do not include “http://”.
– Use “*” as a wildcard to match any string. Entries must contain at least one “.”. Maximum 127 characters, case-insensitive.
– Click Apply to save changes.
Using the Lists:
– Within a specific Web Content Filter profile (under the Custom Service tab), check the box labeled “Check Common Trusted/Forbidden List” to make that profile use these global lists in addition to its own specific lists.
Refer to Table 199 (Trusted) and Table 200 (Forbidden) for screen label details.
Table 199/200 Configuration > Security Service > Content Filter > Web Content Filter > Trusted/Forbidden Web Sites (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Common Trusted/Forbidden Web Sites | The main list area displaying the sites. |
| Add | Click to create a new entry. |
| Edit | Select an entry and click to modify it. |
| Remove | Select an entry and click to delete it. |
| # | Index number of the site entry. |
| Trusted/Forbidden Web Site | Displays the configured host name entry. Entry rules: Host names (e.g., http://www.good-site.com, *.zyxel.com). No “http://”. “*” wildcard allowed. Must contain “.”. Max 127 chars (0-9a-z-). Case-insensitive. |
| Apply | Click to save changes back to the Zyxel Device. |
| Reset | Click to return the screen to its last-saved settings. |
How do I access and use the DNS Content Filter General screen?
Access the screen by navigating to Configuration > Security Service > Content Filter > DNS Content Filter > General.
Use this screen to:
– Configure the Redirect IP address (default or custom) used when a DNS query is blocked.
– Test domain name categories.
– Manage (Add, Edit, Remove, Reorder) DNS Content Filter profiles.
Refer to Table 201 for details on each field.
Table 201 Configuration > Security Service > Content Filter > DNS Content Filter> General (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Redirect IP | Select ‘default’ to use the Zyxel default block page or ‘custom defined’ to specify a custom URL (IPv4 or IPv6 format like “http://[2001::1]/blocked_access”) where users are sent when DNS filtering blocks their request. |
| Test Domain Name Category | |
| Domain name to test | Enter a domain name to check its category. |
| If you think the category is incorrect… | Click this link to see the category recorded in the Zyxel Device’s database or submit a review request. |
| Profile Management | |
| Add | Click Add to create a new DNS content filter profile. |
| Edit | Click Edit to make changes to a selected profile. |
| Remove | Click Remove to delete a selected profile. |
| References | Select an entry and click References to see which settings use this profile. |
| # | Index number of the DNS content filter profile. |
| Name | Name of the DNS content filter profile. |
| Description | Description of the profile. |
| Reference | Number of times this profile is used in an Object Reference. |
| Action | Click the icon to apply the profile within a security policy. |
| Apply | Click Apply to save changes made on this screen. |
| Reset | Click Reset to revert the screen to its last-saved settings. |
How do I add or edit a DNS Content Filter profile?
1. Navigate to Configuration > Security Service > Content Filter > DNS Content Filter > General.
2. In the Profile Management section, click Add or select a profile and click Edit.
3. Configure the General Settings:
– Enter a Name and optional Description.
– Select the Action (pass or redirect) for matching categories.
– Select the Log option (no, log, alert).
– Optionally enable SafeSearch and Restrict YouTube Access (Strict or Moderate).
4. Configure Scan Options:
– Optionally check Allow List and/or Block List to use the globally defined DNS Allow/Block lists.
5. Select Categories:
– Check the boxes for the website categories you want this profile’s Action to apply to.
– Optionally, Clone Categories Setting From Profile to copy settings from an existing profile.
6. Optionally test a domain name.
7. Click OK to save the profile.
Refer to Table 202 for detailed descriptions of each field.
Table 202 DNS Content Filter Add/Edit Profile (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Description | Optional description (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Action | Select ‘pass’ to allow access or ‘redirect’ to send users to the configured Redirect IP for matching categories. |
| Log | Select ‘no’, ‘log’, or ‘alert’ for attempts accessing sites in selected categories. |
| Enable SafeSearch | Automatically filter explicit results on YouTube, Google, MSN Live Bing. |
| Restrict YouTube Access | Select ‘Strict’ (strong filtering) or ‘Moderate’ (allows more videos) to filter YouTube content. |
| Check White List | Select to check the DNS Content Filter Allow List. Traffic matching the Allow List bypasses category checks in this profile. |
| Check Black List | Select to check the DNS Content Filter Block List. Traffic matching the Block List is blocked/redirected regardless of category. |
| Select All Categories | Check to select all managed categories below. |
| Clear All Categories | Check to deselect all managed categories below. |
| Clone Categories Setting From Profile | Choose an existing profile to copy its category selections into this new profile. |
| Managed Categories | Check the boxes for categories to which the selected Action applies. Requires license. See Table 203 for descriptions. |
Can you describe the Managed Categories available for DNS Content Filtering?
How do I manage the DNS Content Filter Allow List and Block List?
These lists provide global sets of allowed (Allow List) and blocked (Block List) domains/IPs specifically for the DNS Content Filter feature.
Accessing the Lists:
– Navigate to Configuration > Security Service > Content Filter > DNS Content Filter.
– Click the Allow List tab or the Block List tab.
Managing Entries:
– Use the Add, Edit, and Remove buttons.
– When Adding/Editing, enter the IPv4 address (Allow List) or domain/FQDN (Block List) associated with the rule.
– Use Activate and Inactivate buttons to enable or disable specific rules.
– Click Apply to save changes.
Using the Lists:
– Within a specific DNS Content Filter profile, check the boxes labeled “Check Allow List” and/or “Check Block List” to make that profile use these global lists. The Allow List check happens first, bypassing other checks if matched. The Block List check typically happens next, blocking if matched.
Refer to Table 204 (Allow List) and Table 205 (Block List) for screen label details.
Table 204/205 DNS Content Filter Allow/Block List (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Add | Click to add a new rule. Enter the IPv4 address (Allow) or FQDN (Block). |
| Edit | Click to edit the selected rule. |
| Remove | Click to remove the selected rule. |
| Activate | Select an entry and click to turn it on. (Block List: treats FQDN as prohibited). |
| Inactivate | Select an entry and click to turn it off. |
| # | Sequential value, not associated with a specific rule. |
| Status | Icon indicates if rule is active (lit) or inactive (dimmed). |
| White List / Black List | Displays the configured IP address (Allow List) or FQDN (Block List). |
| Apply | Click to save changes back to the Zyxel Device. |
| Reset | Click to return the screen to its last-saved settings. |
What is the External Content Filter Server Lookup Procedure?
1. A computer behind the Zyxel Device tries to access a website.
2. The Zyxel Device first checks its local Content Filter Cache for the website’s category. If found, it applies the configured action (block, log, etc.) based on the cached category.
3. The Content Filter Cache screen allows configuration of cache duration. The cache is cleared on device restart.
4. If the website is not in the cache, the Zyxel Device queries the external content filter database AND simultaneously sends the user’s request to the web server.
5. The external content filter server responds with the category information. The Zyxel Device then blocks and/or logs access based on the profile settings for that category and stores the website’s address and category in its local cache.
How can I block LAN users from using a remote WAN application like TeamViewer using Content Filtering?
This example demonstrates blocking TeamViewer, often categorized under “Remote Access”.
Step 1: Create/Edit a Content Filtering Profile
1. Go to Configuration > Security Service > Content Filter > Web Content Filter > General.
2. Click Add (or Edit an existing profile). Name it (e.g., NoRemoteAccess).
3. On the Category Service tab:
– Ensure Enable Content Filter Category Service is checked.
– Set Action for Managed Web Pages to Block.
– Select Log for Action for Managed Web Pages.
– Check the box for the Managed Category: Remote Access.
– Optionally enable Log-alert for Block/Warn action.
(See Table 206 for parameter summary)
Step 2: Add TeamViewer to Forbidden Sites/Keywords (Optional but Recommended)
1. In the same profile (NoRemoteAccess), go to the Custom Service tab.
2. Select Enable Custom Service.
3. Under Forbidden Web Sites, click Add.
4. Enter `*.*teamviewer*.*` as the keyword/site. (See Table 207)
5. Click OK to save the profile.
Step 3: Apply the Profile to Security Policy
1. Go to Configuration > Security Policy > Policy Control.
2. Select the outgoing LAN policy (e.g., LAN1_Outgoing, LAN2_Outgoing) and click Edit.
3. In the UTM Profile section, select the Web Content Filter profile you created (NoRemoteAccess).
4. Set Log to ‘by profile’.
5. Click OK.
6. Repeat for other LAN outgoing policies if necessary (e.g., LAN2_Outgoing).
Step 4: Verify
1. Check the Policy Control screen; mouse-over the UTM profile icon for the LAN_Outgoing rules to confirm NoRemoteAccess is applied.
2. Check logs in Monitor > Log > View Log for blocked attempts if LAN clients try to access TeamViewer.
Parameter Summary Tables:
Table 206 Content Filtering Profile Configuration Example
| PROFILE NAME | ENABLE CONTENT FILTER CATEGORY SERVICE | ACTION | LOG | MANAGED CATEGORIES | LOG-ALERT FOR BLOCK/WARN ACTION |
|---|---|---|---|---|---|
| NoRemoteAccess | Enabled | Block | Log | Remote Access | Enabled |
Table 207 Forbidden Web Sites Configuration Example
| ENABLE CUSTOM SERVICE | FORBIDDEN WEB SITES KEYWORD |
|---|---|
| Enabled | *.*teamviewer*.* |
Table 208 Security Policy Configuration Example
| TO | FROM | LOG | CONTENT FILTERING PROFILE |
|---|---|---|---|
| WAN | LAN1/LAN2 | By Profile | NoRemoteAccess |
What is the purpose of the Anti-Spam feature?
What configuration options are available for Anti-Spam?
– General Profile screens: Turn anti-spam on/off, manage anti-spam policies, and define actions for exceeding mail session thresholds.
– Mail Scan screen: Enable and configure specific mail scanning functions like malicious mail checking and query timeouts.
– Block/Allow List screens: Set up custom lists to explicitly identify spam (Block List) or legitimate email (Allow List) based on sender IP/email, headers, or subject.
– DNSBL screens: Configure the device to check email sender/relay IPs against external DNS Black Lists.
What is the purpose of the Anti-Spam Allow List?
What is the purpose of the Anti-Spam Block List?
Which protocols does the Zyxel Anti-Spam feature check by default?
How can I view all headers of an email?
What is the E-mail Header Buffer Size for the Zyxel Device?
What is DNSBL in the context of Anti-Spam?
What needs to be done before using Anti-Spam features like IP Reputation, Mail Content Analysis, and Virus Outbreak Detection?
How do I access and use the Anti-Spam Profile screen?
Access the screen by navigating to Configuration > Security Service > Anti-Spam.
Use this screen to:
– Turn the anti-spam feature on or off globally (implicitly by having active profiles and applying them).
– Select the action (Forward Session or Drop Session) the device takes when the concurrent mail session threshold is reached.
– Manage (Add, Edit, Remove, Reorder) Anti-Spam profiles.
– Check the status of your Anti-Spam service license.
Refer to Table 209 for details on each field.
Table 209 Configuration > Security Service > Anti-Spam > Profile (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Action taken when mail sessions threshold is reached | Select ‘Forward Session’ to allow excess sessions without spam filtering, or ‘Drop Session’ to drop excess mail connections. |
| Profile Management | |
| Add | Click to create a new anti-spam profile rule. |
| Edit | Select a profile and click to modify it. |
| Remove | Select a profile and click to delete it. |
| References | Select a profile and click to see which settings use it. |
| Priority | Index number; rules are applied in turn. |
| Name | Name identifying the anti-spam rule. |
| Description | Optional extra information about the rule. |
| Scan Options | Shows which types (protocols) of traffic are scanned for spam by this profile. |
| Reference | Shows how many objects reference this rule. |
| Service | |
| Service Status | Displays license status: Activated, Not Activated, Expired, Not Licensed. May show remaining Grace Period if expired. Buttons Buy/Renew/Activate appear as needed. |
| Service Type | Displays the type of registration: None, Standard, Trial. |
| Expiration Date | Date your service license expires. |
| Apply | Click Apply to save changes made on this screen. |
| Reset | Click Reset to revert the screen to its last-saved settings. |
How do I add or edit an Anti-Spam profile?
1. Navigate to Configuration > Security Service > Anti-Spam.
2. In the Profile Management section, click Add or select an existing profile and click Edit.
3. Configure the General Settings:
– Enter a Name and optional Description.
– Select the Log option (no, log, log alert) for events related to this profile (DNSBL timeouts, list matches).
4. Configure Scan Options:
– Check the boxes for the lists/checks you want this profile to perform: Check Allow List, Check Block List, Check Malicious Mail, Check DNSBL.
5. Configure Actions For Spam Mail:
– For SMTP, select the action: drop, forward, or forward-with-tag.
– For POP3, select the action: forward or forward-with-tag.
6. Click OK to save the profile.
Refer to Table 210 for detailed descriptions of each field.
Table 210 Configuration > Security Service > Anti-Spam > Profile > Add (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive. |
| Description | Optional description. |
| Log | Select ‘no’, ‘log’, or ‘log alert’ for DNSBL timeouts or list matches. |
| Check Allow List | Select to check email against the configured Allow List first. |
| Check Block List | Select to check email against the configured Block List. |
| Check Malicious Mail | Select to enable malicious mail content checking (requires configuration on Mail Scan screen). |
| Check DNSBL | Select to check email against configured DNSBL domains. |
| Actions For Spam Mail – SMTP | Select ‘drop’ (discard), ‘forward’ (allow through), or ‘forward-with-tag’ (add tag to subject and allow). |
| Actions For Spam Mail – POP3 | Select ‘forward’ or ‘forward-with-tag’. |
How do I access and use the Anti-Spam Mail Scan screen?
Access the screen by navigating to Configuration > Security Service > Anti-Spam > Mail Scan.
Use this screen to enable and configure Mail Scan functions, which must be enabled here before they can be selected within an Anti-Spam profile.
Options:
– Enable Malicious Mail Checking: Turn on checking for malicious content.
– Define the tag (e.g., `[Malicious]`) added to the subject of detected emails.
– Define a custom X-Header name/value added to detected emails.
– Query Timeout Settings: Configure how the device handles timeouts when querying external mail scan servers (if applicable, though DNSBL timeout is separate).
– Define actions for SMTP and POP3 timeouts (drop, forward, forward with tag).
– Set the Timeout Value (1-10 seconds).
– Define the tag added to the subject on timeout.
– Define a custom X-Header added on timeout.
Click Apply to save settings.
Refer to Table 211 for detailed descriptions.
Table 211 Configuration > Security Service > Anti-Spam > Mail Scan (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Enable Malicious Mail Checking | Select to identify spam by content (e.g., malicious content). |
| Malicious Mail Tag | Enter text (up to 15 ASCII) added to subject if malicious mail is found and policy is ‘forward with tag’. |
| Malicious X-Header | Specify X-Header name and value added to emails determined as spam. |
| Query Timeout Settings – SMTP | Select action (drop, forward, forward with tag) if SMTP query times out. |
| Query Timeout Settings – POP3 | Select action (forward, forward with tag) if POP3 query times out. |
| Timeout Value | How long (1-10 sec) Zyxel Device waits for reply from mail scan server before timeout action. |
| Timeout Tag | Enter text (up to 15 ASCII) added to subject if query times out and action is ‘forward with tag’. |
| Timeout X-Header | Specify X-Header name and value added if query times out. |
How do I access and use the Anti-Spam Block List screen?
Access the screen by navigating to Configuration > Security Service > Anti-Spam > Block/Allow List, and ensure the Block List tab is selected.
Use this screen to configure entries that identify spam e-mail based on various criteria.
Options:
– Enable Block List Checking: Globally enables/disables using active Block List entries.
– Block List Spam Tag: Define a tag (up to 15 ASCII) added to the subject of emails matching the Block List if the profile action is ‘forward with tag’.
– Block List X-Header: Specify a custom X-Header name/value added to emails matching the Block List.
– Rule Summary: Manage individual block list entries using Add, Edit, Remove, Activate, Inactivate buttons.
– Entries can be of Type: Subject, IP Address, IPv6 Address, E-Mail Address, or Mail Header.
– Content field shows the specific value being checked for each entry type.
Click Apply to save settings.
Refer to Table 212 for detailed descriptions.
Table 212 Configuration > Security Service > Anti-Spam > Block/Allow List > Block List (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Enable Block List Checking | Select check box to have Zyxel Device treat email matching an active block list entry as spam. |
| Block List Spam Tag | Enter text (up to 15 ASCII) added to subject if matched and policy is ‘forward with tag’. |
| Block List X-Header | Specify X-Header name and value added to matched emails. |
| Add | Click to create a new block list entry. |
| Edit | Select an entry and click to modify it. |
| Remove | Select an entry and click to delete it. |
| Activate | Select an entry and click to enable it. |
| Inactivate | Select an entry and click to disable it. |
| Status | Icon shows if entry is active or inactive. |
| # | Entry’s index number. |
| Type | Criterion: Subject, source/relay IP Address, source/relay IPv6 Address, source E-Mail Address, or Mail Header. |
| Content | The actual value checked: subject text, IP/IPv6 address, email address, or header value. |
How do I add or edit entries in the Anti-Spam Block or Allow List?
1. Navigate to Configuration > Security Service > Anti-Spam > Block/Allow List.
2. Select the Block List tab or the Allow List tab.
3. Click Add to create a new entry, or select an existing entry and click Edit.
4. Check the Enable Rule box to make this entry active.
5. Select the Type of check:
– Subject: Check the email’s subject line.
– IP Address: Check the source or relay IPv4 address.
– IPv6 Address: Check the source or relay IPv6 address.
– E-Mail Address: Check the source email address or domain name.
– Mail Header: Check a specific header field and value.
6. Enter the corresponding keyword or value:
– For Subject: Enter text (up to 63 ASCII) to find in the subject. Use ‘?’ or ‘*’ wildcards if needed.
– For IP Address: Enter the IPv4 address (dotted decimal) and optionally Netmask.
– For IPv6 Address: Enter the IPv6 address with prefix.
– For E-Mail Address: Enter a keyword (up to 63 ASCII) like an address or domain (*.example.com). Use ‘?’ or ‘*’ wildcards.
– For Mail Header: Enter the Mail Header Field Name (e.g., Received) and the Field Value Keyword (e.g., spamdomain.com). Use ‘?’ or ‘*’ wildcards in the value.
7. Click OK to save the entry.
Refer to Table 213 for detailed field descriptions and Section 27.5.2 for wildcard usage.
Table 213 Anti-Spam Block/Allow List Add/Edit Fields
| LABEL | DESCRIPTION |
|---|---|
| Enable Rule | Select to activate this entry. Must also enable list checking globally and use in a profile. |
| Type | Select Subject, IP Address, IPv6 Address, E-Mail Address, or Mail Header. |
| Mail Subject Keyword | (Subject Type) Enter text (up to 63 ASCII) to match in subject. Spaces not allowed (? wildcard can substitute). See Sec 27.5.2. |
| Sender or Mail Relay IP Address | (IP Address Type) Enter IPv4 address (dotted decimal). |
| Sender or Mail Relay IPv6 Address | (IPv6 Address Type) Enter IPv6 address with prefix. |
| Netmask | (IP Address Type) Enter subnet mask if applicable. |
| Sender E-Mail Address | (E-Mail Type) Enter keyword (up to 63 ASCII, e.g., user@example.com, *.example.com). See Sec 27.5.2. |
| Mail Header Field Name | (Mail Header Type) Enter header name part (before colon, e.g., Received). Up to 63 ASCII. |
| Field Value Keyword | (Mail Header Type) Enter header value part (after colon, e.g., mail.example.com). Up to 63 ASCII. See Sec 27.5.2. |
What regular expressions or wildcards can be used in Anti-Spam Block/Allow list entries?
– A question mark (?) as a single-character wildcard. For example, `a?c` matches `abc`, `acc`, etc.
– An asterisk (*) as a multi-character wildcard matching any string. It can be used anywhere in the string, and multiple asterisks can be used, but not side-by-side (must have other characters between them). For example, `*@example.com` matches any email address ending in `@example.com`. `*bad_word*` matches if “bad_word” appears anywhere.
Note: For Mail Header checks, the Zyxel Device only checks the *first* header that matches the specified Field Name.
How do I access and use the Anti-Spam Allow List screen?
Access the screen by navigating to Configuration > Security Service > Anti-Spam > Block/Allow List, and then clicking the Allow List tab.
Use this screen to configure entries that identify legitimate e-mail, ensuring it bypasses further spam checks.
Options:
– Enable Allow List Checking: Globally enables/disables using active Allow List entries. Email matching an active entry is forwarded without further checks.
– Allow List X-Header: Specify a custom X-Header name/value added to emails matching the Allow List.
– Rule Summary: Manage individual allow list entries using Add, Edit, Remove, Activate, Inactivate buttons (similar to the Block List).
– Entries can be of Type: Subject, IP Address, IPv6 Address, E-Mail Address, or Mail Header.
– Content field shows the specific value being checked.
Click Apply to save settings.
Refer to Table 214 for detailed descriptions.
Table 214 Configuration > Security Service > Anti-Spam > Block/Allow List > Allow List (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Enable Allow List Checking | Select check box to have Zyxel Device forward email matching an active allow list entry without further spam checks. |
| Allow List X-Header | Specify X-Header name and value added to matched emails. |
| Add | Click to create a new allow list entry. See Sec 27.5.1. |
| Edit | Select an entry and click to modify it. See Sec 27.5.1. |
| Remove | Select an entry and click to delete it. |
| Activate | Select an entry and click to enable it. |
| Inactivate | Select an entry and click to disable it. |
| Status | Icon shows if entry is active or inactive. |
| # | Entry’s index number. |
| Type | Criterion: Subject, source/relay IP Address, source/relay IPv6 Address, source E-Mail Address, or Mail Header. |
| Content | The actual value checked: subject text, IP/IPv6 address, email address, or header value. |
How do I access and use the Anti-Spam DNSBL screen?
Access the screen by navigating to Configuration > Security Service > Anti-Spam > DNSBL.
Use this screen to configure the Zyxel Device to check sender and relay IP addresses from email headers against external DNS Black Lists (DNSBLs).
Options:
– Enable DNS Black List (DNSBL) Checking: Turns the DNSBL feature on/off.
– DNSBL Spam Tag: Define a tag (up to 15 ASCII) added to the subject of emails flagged by DNSBL if the profile action is ‘forward with tag’.
– Advanced Settings (Show/Hide):
– Max. IPs Checking Per Mail: Set the maximum number (1-5) of sender/relay IPs from the header to check against DNSBLs.
– IP Selection Per Mail: Choose whether to check the ‘first N IPs’ (starting from sender) or ‘last N IPs’ (starting from final relay) in the header.
– Query Timeout Settings: Configure actions if DNSBL queries time out.
– Define actions for SMTP and POP3 timeouts (drop, forward, forward with tag).
– Set the Timeout Value (1-10 seconds).
– Define the tag added to the subject on timeout.
– Define a custom X-Header added on timeout.
– DNSBL Domain List: Manage the list of DNSBL server domains to query using Add, Edit, Remove, Activate, Inactivate buttons.
Click Apply to save settings.
Refer to Table 215 for detailed descriptions.
Table 215 Configuration > Security Service > Anti-Spam > DNSBL (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Enable DNS Black List (DNSBL) Checking | Select to enable checking sender/relay IPs against DNSBL domains listed below. |
| DNSBL Spam Tag | Enter text (up to 15 ASCII) added to subject if matched and policy is ‘forward with tag’. |
| Max. IPs Checking Per Mail | Set maximum number (1-5) of IPs in mail header to check. |
| IP Selection Per Mail | Select ‘first N IPs’ (start check from sender IP) or ‘last N IPs’ (start check from last relay IP). |
| Query Timeout Settings – SMTP | Select action (drop, forward, forward with tag) if SMTP DNSBL query times out. |
| Query Timeout Settings – POP3 | Select action (forward, forward with tag) if POP3 DNSBL query times out. |
| Timeout Value | How long (1-10 sec) Zyxel Device waits for reply from DNSBL server before timeout action. |
| Timeout Tag | Enter text (up to 15 ASCII) added to subject if query times out and action is ‘forward with tag’. |
| Timeout X-Header | Specify X-Header name and value added if query times out. |
| Add (DNSBL Domain List) | Click to add a new DNSBL domain server. |
| Edit | Select a domain and click to modify it. |
| Remove | Select a domain and click to delete it. |
| Activate | Select a domain and click to enable checks against it. |
| Inactivate | Select a domain and click to disable checks against it. |
| Status | Icon shows if domain checking is active or inactive. |
| # | Domain entry index number. |
| DNSBL Domain | The name of the DNSBL domain server (e.g., sbl.spamhaus.org). |
What are some technical details about how the Zyxel Device performs DNSBL checks?
– The Zyxel Device checks only public sender and relay IP addresses found in the email headers; it does not check private IP addresses.
– For each public IP address being checked (up to the configured maximum), the device sends a separate DNS lookup query to *each* of the active DNSBL domains configured in its list, simultaneously.
– DNSBL servers reply indicating whether the queried IP address is listed (spam) or not.
– If *any* DNSBL server replies indicating an IP address is listed, the Zyxel Device *immediately* classifies the email as spam and takes the configured action (e.g., drop, tag), without waiting for further replies.
– If the device receives at least one non-spam reply for *each* of the checked IP addresses (from any of the queried DNSBLs), it classifies the email as legitimate and forwards it, without waiting for all replies.
– Any further DNSBL replies arriving after the email has been classified (as spam or legitimate) have no effect.
– The Zyxel Device caches DNSBL responses for IP addresses for up to 72 hours to reduce external queries.
– If conflicting replies are received for the same IP address (e.g., one DNSBL says spam, another says not spam before a classification is made based on other IPs), the device classifies the email as spam.
What is Astra Cloud Security?
– The Astra web portal: Managed by an administrator to configure security services and manage users/devices.
– The Astra app: Installed on members’ mobile devices to enforce the security policies configured by the admin, protecting traffic even when users are outside the main network perimeter. It can also provide email leakage detection alerts.
How many mobile devices can use the same account to log into the Astra app simultaneously?
How do I access the Astra Cloud Security information screen on the Zyxel Device?
What is the Device Insight feature used for?
What is a requirement for Device Insight to collect client information correctly?
How do I access and use the Device Insight screen?
Access the screen by navigating to Configuration > Object > Device Insight.
Use this screen to:
– Enable or disable the Device Insight feature globally.
– Manage (Add, Edit, Remove) Device Insight profiles.
– View existing profiles, their descriptions, and how many policies reference them.
Refer to Table 216 for details.
Table 216 Configuration > Object > Device Insight
| LABEL | DESCRIPTION |
|---|---|
| Enable | Select to enable device insight feature. Clear to disable it. |
| Add | Click to create a new, user-configured profile. |
| Edit | Select a profile and click Edit (or double-click) to modify its settings. |
| Remove | Select a profile and click Remove to delete it (confirmation required). |
| References | Select a profile and click References to see which settings use it. |
| # | Sequential value identifying the profile row. |
| Name | Displays the name of the device insight profile. |
| Description | Displays the description, if configured. |
| Reference | Displays the number of times this profile is used in a policy. |
How do I add or edit a Device Insight profile?
1. Navigate to Configuration > Object > Device Insight.
2. Click Add or select an existing profile and click Edit.
3. Enter a Profile Name (1-31 alphanumeric, _, -; no number first; unique; case-sensitive).
4. Enter an optional Description (up to 63 single-byte characters).
5. Under Category, check the box(es) for the type(s) of devices this profile should match (e.g., Computer, IP Camera, Mobile Phone/Tablet, IoT).
6. Under Operating System, check the box(es) for the OS(es) this profile should match (e.g., Windows, iOS, macOS, Android, Linux, Others).
7. Click OK to save the profile.
Refer to Table 217 for details.
Table 217 Configuration > Object > Device Insight> Add/Edit
| LABEL | DESCRIPTION |
|---|---|
| Profile Name | Type a unique name (1-31 alphanumeric, _, -; no number first; case-sensitive). |
| Description | Optional description (up to 63 single-byte chars). |
| Category | Select the type(s) of device used by the connected client (e.g., Computer, Mobile Phone/Tablet, IoT). |
| Operating System | Select the operating system(s) used by the connected client (e.g., Windows, macOS, iOS, Android, Linux). |
How can I block specific device types (e.g., mobile phones) on one LAN from accessing another LAN using Device Insight?
1. Create a Device Insight Profile for Mobile Phones:
– Go to Configuration > Object > Device Insight and click Add.
– Name the profile (e.g., `MobilePhone`).
– Optionally add a description.
– Under Category, check `Mobile Phone/Tablet`.
– Under Operating System, check all relevant mobile OSes (e.g., `iOS`, `Android`, potentially `Others`).
– Click OK.
2. Create or Edit the Security Policy:
– Go to Configuration > Security Policy > Policy Control.
– Click Add to create a new policy (or find and Edit an existing policy governing LAN2 to LAN1 traffic).
– Name the policy (e.g., `LAN2_TO_LAN1_Mobile_Block`).
– Set From to `LAN2`.
– Set To to `LAN1`.
– Set Source, Destination, Service usually to `any` unless more specific rules are needed.
– In the Device field, select the `MobilePhone` profile you created.
– Set the Action to `deny`.
– Configure logging if desired.
– Click OK.
3. Ensure Policy Order and Access:
– Make sure this new blocking policy is placed correctly relative to other policies (usually specific blocks come before general allows).
– **Important:** Ensure you have other policies allowing necessary access (like your own management access to the device) *before* this blocking rule, otherwise you might lock yourself out. Resetting the device might be necessary if blocked.
(Based on Example in Sec 29.1.2, Tables 218, 219)
What precaution should be taken when creating blocking policies based on Device Insight?
What are Zones used for on the Zyxel Device?
Can zones overlap? Can a single interface be assigned to multiple zones?
What is Intra-zone traffic?
What is Inter-zone traffic?
What is Extra-zone traffic?
How do I access and use the Zone screen?
Access the screen by navigating to Configuration > Object > Zone.
Use this screen to:
– View a summary of all System Default zones (which cannot be deleted) and User Configuration zones.
– Add new User Configuration zones.
– Edit existing User Configuration zones (and view members of System Default zones).
– Remove User Configuration zones.
– View which interfaces or VPN tunnels are members of each zone.
– See how many times each zone is referenced in other configurations (e.g., policies).
Refer to Table 220 for details.
Table 220 Configuration > Object > Zone
| LABEL | DESCRIPTION |
|---|---|
| User Configuration / System Default | Sections separating user-created zones from non-deletable built-in zones. |
| Add | Click to create a new User Configuration zone. |
| Edit | Select a zone and click Edit (or double-click) to modify its members (User zones) or view members (System zones). |
| Remove | Select a User Configuration zone and click Remove to delete it (confirmation required). |
| References | Select a zone and click References to see where it’s used. |
| # | Sequential value identifying the zone row. |
| Name | Displays the name of the zone. |
| Member | Displays the names of the interfaces and/or VPN tunnels belonging to this zone. |
| Reference | Displays the number of times this zone is used as an Object Reference in policies, etc. |
How do I add or edit a Zone?
1. Navigate to Configuration > Object > Zone.
2. To add, click Add. To edit, select a User Configuration zone and click Edit.
3. If adding, enter a Name for the zone (1-31 alphanumeric, _, -; no number first; case-sensitive).
4. Use the Member List section:
– The Available list shows interfaces and VPN tunnels not currently assigned to any zone.
– The Member list shows interfaces and VPN tunnels currently assigned to this zone.
– Select items in the Available list and click the right arrow button (`>`) to add them to this zone.
– Select items in the Member list and click the left arrow button (`<`) to remove them from this zone (they return to Available).
– You can use Shift or Ctrl keys to select multiple items.
5. Click OK to save the zone configuration.
Refer to Table 221 for details.
Table 221 Configuration > Object > Zone > Add/Edit
| LABEL | DESCRIPTION |
|---|---|
| Name | (Read-only for system default). For user zones: Type name (1-31 alphanumeric, _, -; no number first; case-sensitive). |
| Member List | Use the Available list, Member list, and arrow buttons to assign/unassign interfaces and VPN tunnels to this zone. |
What features are available for managing Users and Groups?
– User screen: Provides a summary of all user accounts (admin, limited-admin, user, guest, ext-user, ext-group-user, dynamic-guest, guest-manager). Allows adding, editing, and removing user accounts and configuring their properties (type, password, authentication timeouts, group membership, 2FA, etc.).
– Group screen: Provides a summary of all user groups. Allows adding, editing, and removing groups. Groups can contain access users (user, guest, ext-user, ext-group-user) and other groups, but not admin users.
– Setting screen: Controls default settings for different user types (authentication timeouts), miscellaneous settings (lease renewal, idle timeout), login security (password complexity, change frequency, reset link), simultaneous login limits, and IP lockout settings for failed login attempts.
– MAC Address screen: Allows configuration of allowed MAC addresses or OUIs for MAC authentication using the local user database (relevant for wireless SSIDs configured for MAC filtering).
What are the different types of user accounts available on the Zyxel Device and their capabilities/login methods?
Table 222 Types of User Accounts
| TYPE | ABILITIES | LOGIN METHOD(S) |
|---|---|---|
| Admin Users | ||
| admin | Change Zyxel Device configuration (web, CLI) | WWW, TELNET, SSH, FTP, Console |
| Access Users | ||
| limited-admin | Look at Zyxel Device configuration (web, CLI) Perform basic diagnostics (CLI) Cannot execute commands such as ‘show running-config’ | WWW, TELNET, SSH, Console |
| user | Access network services Browse user-mode commands (CLI) | WWW, TELNET, SSH |
| guest | Access network services | WWW |
| ext-user | External user account (authenticated by external server like AD/LDAP/RADIUS) | WWW |
| ext-group-user | External group user account (authenticated by external server, membership checked) | WWW |
| guest-manager | Create dynamic guest accounts | WWW |
| dynamic-guest | Access network services (created dynamically, often time-limited) | Hotspot Portal |
Note: The default ‘admin’ account is always authenticated locally.
What is an ‘ext-user’ account? How is it authenticated?
Authentication for ‘ext-user’ types should always be handled by the configured external server. The Zyxel Device forwards the authentication request to the external server. If the Zyxel Device attempts to authenticate an ‘ext-user’ against its local database, the attempt will fail.
You typically create ‘ext-user’ accounts on the Zyxel Device if you need to apply specific policies (like firewall rules or content filter profiles) to users who authenticate externally. If no specific Zyxel policies are needed for the external user, you don’t necessarily have to create a corresponding ‘ext-user’ account on the device.
What is an ‘ext-group-user’ account?
What are dynamic-guest accounts and what types are there?
There are three types based on creation/authentication method:
– billing-users: Created by a guest manager or external printer (paid by cash) or created and paid for via an online payment service.
– ua-users: Users who log in via the user agreement page (if configured).
– trial-users: Free guest accounts created using the Free Time function (if configured).
What are User Groups used for, and are there any restrictions?
Restrictions:
– You cannot put admin users (like ‘admin’ or ‘limited-admin’) into a user group.
– You cannot put the default ‘admin’ account into any user group.
– User group names must be different from user account names.
What is User Awareness?
How do I access the User Summary screen?
What are the rules and restrictions for creating user names?
– Length: 1 to 31 characters.
– Allowed characters: Alphanumeric (A-z, 0-9, no Unicode support), underscores (_), dashes (-).
– First character: Must be alphabetical (A-Z, a-z), underscore (_), or dash (-). Cannot be a number.
– Case-sensitivity: User names are case-sensitive (e.g., ‘bob’ is different from ‘BOB’).
– Uniqueness: User names must be different from user group names.
– Reserved names: Certain names are reserved and cannot be used (e.g., adm, admin, any, bin, daemon, debug, ftp, games, halt, ldap-users, lp, mail, news, nobody, operator, radius-users, root, shutdown, sshd, sync, uucp, zyxel).
Are there any reserved user names that cannot be used?
What options are available on the User Add/Edit General screen?
Table 224 Configuration > Object > User/Group > User > Add/Edit_General
| LABEL | DESCRIPTION |
|---|---|
| User Name | Type the username (following naming rules). |
| User Type | Select the type: limited-admin, user, guest, ext-user, ext-group-user. (Not shown/editable for default admin). |
| Password | Enter the password (1-64 chars). Complexity rules apply if enabled globally. Not available for ext-user/ext-group-user. Cannot be ‘1234’ after first login. |
| Retype | Re-enter the password for confirmation. Not available for ext-user/ext-group-user. |
| Group Identifier | (ext-group-user only) Specify the value of the group membership attribute from the external AD/LDAP server. |
| Associated AAA Server Object | (ext-group-user only) Select the AAA server object (AD/LDAP) used to authenticate this user. |
| Description | Optional description (up to 63 single-byte chars). |
| Enter valid email address(es) for notifications or 2FA. | |
| Mobile Number | Enter valid mobile number (up to 20 digits/chars: 1-9, +, *, #, (, ), -) for SMS notifications or 2FA. |
| Send Code | (admin/limited-admin only) Click to send a verification code to the entered Email/Mobile Number for validation. |
| Authentication Timeout Settings | Choose ‘Use Default Settings’ (from Setting screen) or ‘Use Manual Settings’. |
| Lease Time | (Manual Settings only) Minutes (1-1440, 0=unlimited) user has to renew session before logout. |
| Reauthentication Time | (Manual Settings only) Minutes (1-1440, 0=unlimited) user can stay logged in before needing to re-authenticate. |
| User VLAN ID | (ext-group-user only) Optionally select to enable dynamic VLAN assignment and specify the VLAN ID tag for this user’s traffic upon successful authentication. |
| Configuration Validation | (ext-group-user only) Enter a username from the specified group and click Test to verify external server configuration. |
| OK | Save changes and close. |
| Cancel | Close without saving. |
| Save | (Add mode only) Save changes and proceed to Two-factor Authentication screen. |
What are the password complexity requirements if enabled?
– Minimum length: 8 characters.
– Maximum length: 64 characters.
– Must include at least 1 uppercase letter (A-Z).
– Must include at least 1 lowercase letter (a-z).
– Must include at least 1 numeric character (0-9).
– Must include at least 1 special character (e.g., !@#$%^&*()_+).
How can I configure Two-Factor Authentication (2FA) for a user?
First, ensure 2FA is enabled globally for the desired access type (VPN Access and/or Admin Access) in Object > Auth. Method > Two-factor Authentication.
Then, configure it per user:
1. Go to Configuration > Object > User/Group > User.
2. Add a new user (click Add, configure General tab, then click Save) or select an existing user and click Edit.
3. Go to the Two-factor Authentication tab.
4. Check the box for Enable Two-Factor Authentication for VPN Access and/or Enable Two-Factor Authentication for Admin Access.
5. For each enabled access type, select the Two-factor Auth. Method:
– Default: Inherits method from global settings.
– User Defined: Choose explicitly for this user:
– PIN code by SMS/Email: Sends code/link via SMS or Email (requires valid number/address on General tab).
– Google Authenticator: Uses Time-based One-Time Passwords (TOTP) from the app.
6. If using Google Authenticator:
– Follow the on-screen steps (Step 1-3) to download the app, scan the QR code (or enter key manually) to add the account, and verify by entering the current code from the app.
– Once verified, download the backup codes for emergency login.
7. Click OK to save the user’s 2FA settings.
Refer to Table 226 for details.
Table 226 User Add/Edit Two-factor Authentication Screen (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| Enable Two-factor Authentication for VPN Access | Require 2FA for this user’s VPN connections (types allowed globally are checked). |
| Enable Two-factor Authentication for Admin Access | Require 2FA for this user’s admin login (Web/SSH/TELNET allowed globally are checked). |
| Two-factor Auth. Method | Select Default (inherit) or User Defined (choose SMS/Email or Google Authenticator). |
| Set up Google Authenticator | Steps (scan QR code, verify code) to link user account with Google Authenticator app. |
| View your backup codes | (Appears after Google Auth setup) Download one-time use codes for login if app/device is unavailable. |
| Verify your device | (During Google Auth setup) Enter code from app to complete setup. |
| Revoke | Click to remove Google Authenticator registration for this user (reverts to SMS/Email if enabled). |
What methods are available for Two-Factor Authentication for VPN and Admin access?
Table 225 Two Factor Authentication Methods
| ACCESS TYPE | TWO-FACTOR AUTHENTICATION METHODS | FACTOR 2 PASSWORD |
|---|---|---|
| VPN | SMS | Code |
| VPN | Link | |
| VPN | Google Authenticator app | Code |
| Admin | SMS | Code |
| Admin | Link | |
| Admin | Google Authenticator app | Code |
What are backup codes used for in 2FA?
How do I access the Group Summary screen?
What information and options are available on the Group Summary screen?
Table 227 Configuration > Object > User/Group > Group
| LABEL | DESCRIPTION |
|---|---|
| Add | Click to create a new user group. |
| Edit | Select a group and click Edit (or double-click) to modify it. |
| Remove | Select a group and click Remove to delete it (users within the group are not deleted). Confirmation required. |
| References | Select a group and click References to see where it’s used. |
| # | Sequential value identifying the group row. |
| Group Name | Displays the name of the user group. |
| Description | Displays the description for the user group. |
| Member | Lists the members (users or other groups) in this user group, separated by commas. |
| Reference | Displays the number of times this group is used in a policy or other setting. |
How do I add or edit a user group?
1. Navigate to Configuration > Object > User/Group > Group.
2. Click Add to create a new group, or select an existing group and click Edit.
3. Enter a Group Name (1-31 alphanumeric, _, -; no number first; unique; case-sensitive; different from user names).
4. Enter an optional Description (up to 60 characters, punctuation, spaces).
5. Use the Member List section:
– The Available list shows users (access users only) and other groups not currently in this group.
– The Member list shows the current members of this group.
– Select items (users/groups) from Available and click the right arrow (`>`) to add them.
– Select items from Member and click the left arrow (`<`) to remove them.
– Use Shift/Ctrl to select multiple items.
6. Click OK to save the group configuration.
Refer to Table 228 for details.
Table 228 Configuration > Object > User/Group > Group > Add
| LABEL | DESCRIPTION |
|---|---|
| Name | Type user group name (1-31 alphanumeric, _, -; no number first; case-sensitive; different from usernames). |
| Description | Optional description (up to 60 chars, punctuation, spaces). |
| Member List | Use Available list, Member list, and arrow buttons to add/remove users (access types) and other groups as members. |
How do I access the User/Group Setting screen? What is its purpose?
Access the screen by logging into the Web Configurator and navigating to Configuration > Object > User/Group > Setting.
Its purpose is to control various default and global settings related to user accounts, login behavior, and security, including:
– Default authentication timeout settings (Lease Time, Reauthentication Time) for each user type.
– Allowing automatic lease time renewal for access users.
– Enabling user idle detection and setting the timeout period.
– Enforcing password complexity rules.
– Setting password change frequency for admin users and the password reset link FQDN/IP.
– Limiting the number of simultaneous logins allowed per admin account and per access account.
– Configuring IP lockout based on failed login attempts (retry limit, lockout period).
What settings can be configured on the User/Group Setting screen?
Table 229 Configuration > Object > User/Group > Setting (Selected Fields)
| LABEL | DESCRIPTION |
|---|---|
| User Authentication Timeout Settings | |
| Default Authentication Timeout Settings | View default Lease Time and Reauthentication Time for each User Type. Click Edit icon to modify defaults for a type. |
| Miscellaneous Settings | |
| Allow renewing lease time automatically | (Access users) Check to allow users to select auto-renewal on their login status screen. |
| Enable user idle detection | (Access users) Check to enable logging out idle users. |
| User idle timeout | (Access users) Minutes an access user can be idle before automatic logout (if enabled). |
| Login Security | |
| Password must changed every (days) | (Admin type users) Set frequency (1-365 days) for required password changes. |
| Password reset link (FQDN/IP) | Set the FQDN or IP address for the password reset link (Default: myrouter.local, or select Custom). |
| Enable Password Complexity | Select to enforce strong password rules (min 8 chars, upper, lower, number, special char). |
| User Logon Settings | |
| Limit the number of simultaneous logons for administration account | Check to limit concurrent admin logins. |
| Maximum number per administration account | Set max concurrent logins (1-64) per admin user (if limit enabled). |
| Limit the number of simultaneous logons for access account | Check to limit concurrent access user logins (per user, from different IPs). |
| Maximum number per access account | Set max concurrent logins (1-64) per access user (if limit enabled). |
| User IP Lockout Settings | |
| Enable logon retry limit | Check to enable locking out IP addresses after too many failed login attempts. |
| Maximum retry count | Number of failed logins (1-99) from an IP before lockout (if enabled). |
| Lockout period | Minutes (1-65535) an IP address remains locked out after exceeding retry count (if enabled). |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to revert to last-saved settings. |
How do I edit the default authentication timeout settings for a specific user type?
1. Navigate to Configuration > Object > User/Group > Setting.
2. In the Default Authentication Timeout Settings section, locate the row for the User Type you want to modify (e.g., admin, user, guest).
3. Click the Edit icon (pencil) at the beginning of that row.
4. A new screen (Edit User Auth Settings) will appear.
5. Enter the desired Lease Time in minutes (0-1440, 0 is unlimited).
6. Enter the desired Reauthentication Time in minutes (0-1440, 0 is unlimited).
7. Click OK.
Refer to Table 230 for field details.
Table 230 Default Auth Timeout Edit Screen
| LABEL | DESCRIPTION |
|---|---|
| User Type | Read-only field showing the user type being edited. |
| Lease Time | Enter default lease time (minutes, 1-1440, 0=unlimited) for this user type. |
| Reauthentication Time | Enter default reauthentication time (minutes, 1-1440, 0=unlimited) for this user type. |
What screen appears when a non-admin user logs into the Zyxel Device? What can they do?
From this screen, the user can:
– View their remaining Lease Time and Reauthentication Time.
– Optionally set a custom User-defined lease time (up to the max configured for their user type or default).
– Manually reset their lease time by clicking the Renew button (if applicable).
– Check a box to enable Updating lease time automatically (if allowed in the global Setting screen), which resets the lease time 30 seconds before expiry.
– Click Logout to terminate their session.
Refer to Table 231 for details.
Table 231 Web Configurator for Non-Admin Users
| LABEL | DESCRIPTION |
|---|---|
| User-defined lease time (max … minutes) | Allows user to set a lease time shorter than or equal to the maximum defined for their account. Default is the max/defined time. |
| Renew | Click to manually reset the remaining lease time to the User-defined lease time value. |
| Updating lease time automatically | Appears if allowed globally. User can check this box to have the session auto-renew 30 seconds before lease expiry. |
| Remaining time before lease timeout | Displays current remaining lease time. Can be reset by Renew button or auto-renewal. |
| Remaining time before auth. timeout | Displays current remaining reauthentication time. Cannot be reset by user. |
| Logout | Click to end the current login session. |
How do I access and use the MAC Address Summary screen? What is its purpose?
Access the screen by navigating to Configuration > Object > User/Group > MAC Address.
Its purpose is to manage a list of allowed MAC addresses or Organizationally Unique Identifiers (OUIs) for wireless clients that will be authenticated using the Zyxel Device’s local database. This requires configuring an AP’s SSID security profile to use the Zyxel Device’s local database for MAC authentication.
Use this screen to:
– Add, Edit, or Remove specific MAC addresses or OUIs.
– View the list of configured MACs/OUIs and their descriptions.
Refer to Table 232 for details.
Table 232 Configuration > Object > User/Group > MAC Address
| LABEL | DESCRIPTION |
|---|---|
| Add | Click to create a new MAC/OUI entry. |
| Edit | Select an entry and click Edit (or double-click) to modify it. |
| Remove | Select an entry and click Remove to delete it (confirmation required). |
| MAC Address/ OUI | Displays the configured MAC address or OUI used for local MAC authentication. |
| Description | Displays the optional description for the device/manufacturer. |
How do I add or edit MAC addresses for authentication?
1. Navigate to Configuration > Object > User/Group > MAC Address.
2. Click Add or select an existing entry and click Edit.
3. In the MAC Address/OUI field, enter either:
– A full MAC address (six hexadecimal pairs separated by colons or hyphens, e.g., 00:11:22:AA:BB:CC).
– An OUI (the first three hexadecimal pairs identifying the manufacturer, e.g., 00:11:22).
4. Optionally, enter a Description for this entry (up to 60 characters, punctuation, spaces).
5. Click OK.
Refer to Table 233 for details.
Table 233 Configuration > Object > User/Group > MAC Address > Add
| LABEL | DESCRIPTION |
|---|---|
| MAC Address/ OUI | Type the full MAC address or the OUI (first 3 octets). Use colons or hyphens as separators. |
| Description | Optional description (up to 60 characters). |
What keywords are used to configure user attributes (type, leaseTime, reauthTime) in external LDAP or RADIUS servers?
Table 234 LDAP/RADIUS: Keywords for User Attributes
| KEYWORD | CORRESPONDING ATTRIBUTE IN WEB CONFIGURATOR |
|---|---|
| type | User Type. Possible Values: admin, limited-admin, dynamic-guest, user, guest. |
| leaseTime | Lease Time. Possible Values: 1-1440 (minutes). |
| reauthTime | Reauthentication Time. Possible Values: 1-1440 (minutes). |
Example Formats:
– LDAP: Attributes might look like `type: admin`, `leaseTime: 99`, `reauthTime: 199` on separate lines or as defined by your LDAP schema.
– RADIUS: Attributes are often sent as Vendor-Specific Attributes (VSAs) or standard attributes in the reply packet, potentially formatted like `type=user;leaseTime=222;reauthTime=222` in a single string attribute, depending on the RADIUS server configuration.
How can a large number of Ext-User accounts be created efficiently?
What are the built-in system accounts, their purpose, activation, and default credentials?
Table 235 Built-in System Accounts
| ACCOUNT NAME | ACTIVATION | PURPOSE | SUPPORTED MODELS | USER NAME / PASSWORD |
|---|---|---|---|---|
| debug | Owner must create an admin account for remote CLI (Telnet/SSH) access. | Used by RD (Research & Development/Support) for troubleshooting information collection via CLI. Cannot log in via WWW/FTP. | ZyWALL ATP, USG Flex (On-Premise/Cloud), VPN (Standalone/Nebula Orchestrator) | User: debug Password: Authentication Phrase (generated internally, time-limited, single-use). |
| devicehaecived | Enabled when Device HA is configured. Cannot log in via WWW/SSH/FTP. | Used internally by Zyxel Device to synchronize configuration, firmware, and licenses to a backup Device HA unit. | ZyWALL ATP, USG Flex (On-Premise), VPN models supporting Device HA. | User: devicehaecived Password: Zyxel Device HA Pro Password (configured in Device HA settings). |
| support | Activated during factory default setup using Nebula Control Center (NCC) Zero Touch Provisioning (ZTP). | Allows administrator access via WWW/SSH/FTP for troubleshooting a Zyxel Device managed by NCC. | ZyWALL USG Flex (On-Cloud mode) | User: support Password: Default is Zyxel Device serial number. Changed automatically when managed by NCC. Can be changed via NCC. |
| sdwan | Activated when the Zyxel Device is managed by Nebula Orchestrator. | Allows administrator access via WWW/SSH/FTP for troubleshooting a Zyxel Device managed by Nebula Orchestrator. | ZyWALL VPN (Nebula Orchestrator managed) | User: sdwan Password: Default is Zyxel Device serial number. Can be changed using Nebula Orchestrator. |
What are Address Objects and Address Groups used for?
– Address Objects: Represent specific network addresses. They can define a single IP address (host), a range of IP addresses, or an entire subnet.
– Address Groups: Collections of Address Objects and/or other Address Groups. They are used to simplify policy creation by allowing you to reference multiple network entities with a single group name.
They are used extensively in features like:– Dynamic Routes
– Security Policies (Firewall Rules)
– Content Filtering Policies
– VPN Connection Policies (e.g., Policy Routes)
What is the Geo IP feature used for?
– Update the Geo IP database.
– Manually configure specific country-to-IP address mappings.
– Use country information as criteria in security policies (e.g., block traffic to/from specific countries) and potentially other features like logging and reporting.
What are the types of address objects available on the Zyxel Device?
• HOST – the object uses an IP Address to define a host address
• RANGE – the object uses a range address defined by a Starting IP Address and an Ending IP Address
• SUBNET – the object uses a network address defined by a Network IP address and Netmask subnet mask
• INTERFACE IP – the object uses the IP address of one of the Zyxel Device’s interfaces
• INTERFACE SUBNET – the object uses the subnet mask of one of the Zyxel Device’s interfaces
• INTERFACE GATEWAY – the object uses the gateway IP address of one of the Zyxel Device’s interfaces
• GEOGRAPHY – the object uses the IP addresses of a country to represent a country
• FQDN – the object uses a FQDN (Fully Qualified Domain Name).
What is an FQDN address object?
In an address FQDN object, you can also use one wildcard. For example, *.zyxel.com. An FQDN is resolved to its IP address using the DNS server configured on the Zyxel Device.
FQDN Example Table:
| HTTP:// | WWW. | ZYXEL. | COM |
|---|---|---|---|
| host name | second-level domain name | top-level domain name | |
| FQDN | |||
| Uniform Resource Locator (URL) | |||
How can I access the Address Summary screen?
What information is shown on the Address Summary screen (IPv4 and IPv6)?
Table 237 Configuration > Object > Address/Geo IP > Address
| LABEL | DESCRIPTION |
|---|---|
| IPv4 Address Configuration | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific address. |
| Name | This field displays the configured name of each address object. |
| Type | This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces. |
| IPv4 Address | This field displays the IPv4 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings. |
| Reference | This displays the number of times an object reference is used in a profile. |
| IPv6 Address Configuration | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific address. |
| Name | This field displays the configured name of each address object. |
| Type | This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces. |
| IPv6 Address | This field displays the IPv6 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings. |
| Reference | This displays the number of times an object reference is used in a profile. |
How do I add or edit an IPv4 address object?
What fields are available when adding/editing an IPv4 address object?
Table 238 Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4)
| LABEL | DESCRIPTION |
|---|---|
| Name | Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Address Type | Select the type of address you want to create. Note: The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object. |
| IP Address | This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents. |
| Starting IP Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents. |
| Ending IP Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents. |
| Network | This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the IP address of the network that this address object represents. |
| Netmask | This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the subnet mask of the network that this address object represents. Use dotted decimal format. |
| Interface | If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents. |
| Region | If you selected GEOGRAPHY as the Address Type, use this field to select a country or continent. A GEOGRAPHY object uses the data from the country-to-IP/continent-to-IP address database. Go to the Configuration > Object > Address/Geo IP > Geo IP screen to configure the custom country-to-IP/continent-to-IP address mappings for a GEOGRAPHY object. |
| Country | If you selected Geography as the Address Type, use this field to select a country. |
| FQDN | If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
How do I add or edit an IPv6 address object?
What fields are available when adding/editing an IPv6 address object?
Table 239 Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6)
| LABEL | DESCRIPTION |
|---|---|
| Name | Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Object Type | Select the type of address you want to create. Note: The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object. |
| IPv6 Address | This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents. |
| IPv6 Starting Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents. |
| IPv6 Ending Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents. |
| IPv6 Address Prefix | This field is only available if the Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address. |
| Interface | If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents. |
| IPv6 Address Type | Select whether the IPv6 address is a link-local IP address (LINK LOCAL), static IP address (STATIC), an IPv6 Stateless Address Auto Configuration IP address (SLAAC), or is obtained from a DHCPv6 server (DHCPv6). |
| Region | If you selected Geography as the Address Type, use this field to select a country or continent. |
| FQDN | If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
How do I access the Address Group Summary screen?
What information is shown on the Address Group Summary screen?
Table 240 Configuration > Object > Address/Geo IP > Address Group
| LABEL | DESCRIPTION |
|---|---|
| IPv4 Address Group Configuration | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific address group. |
| Name | This field displays the name of each address group. |
| Description | This field displays the description of each address group, if any. |
| Reference | This displays the number of times an object reference is used in a profile. |
| IPv6 Address Group Configuration | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific address group. |
| Name | This field displays the name of each address group. |
| Description | This field displays the description of each address group, if any. |
| Reference | This displays the number of times an object reference is used in a profile. |
How do I add or edit an address group?
What fields are available when adding/editing an address group?
Table 241 IPv4/IPv6 Address Group Configuration > Add
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a name for the address group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Description | This field displays the description of each address group, if any. You can use up to 60 characters, punctuation marks, and spaces. |
| Address Type | Select the type of address you want to create. Note: The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object. |
| Member List | The Member list displays the names of the address and address group objects that have been added to the address group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. Note: Only objects of the same address type can be added to a address group. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
Can objects of different address types be added to the same address group?
What is the purpose of the Geo IP Summary screen?
What fields and actions are available on the Geo IP Summary screen?
Table 242 Configuration > Object > Address/Geo IP > Geo IP
| LABEL | DESCRIPTION |
|---|---|
| Country Database Update | |
| Latest Version | This is the latest country-to-IP address database version on myZyxel. |
| Current Version | This is the country-to-IP address database version currently on the Zyxel Device. |
| Update Now | Click this to check for the latest country-to-IP address database version on myZyxel. The latest version is downloaded to the Zyxel Device and replaces the current version if it is newer. There are logs to show the update status. Note: Your Security Pack license must be valid. |
| Auto Update | If you want the Zyxel Device to check weekly for the latest country-to-IP address database version on myZyxel, select the checkbox, choose a day and time each week and then click Apply. The default day and time displayed is the Zyxel Device current day and time. |
| Custom IPv4/IPv6 to Geography Rules | |
| IPv4/IPv6 to Geography | Enter an IP address, then click this button to query which country this IP address belongs to. |
| Add | Click this to create a new entry. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| # | This field is a sequential value, and it is not associated with a specific entry. |
| Geolocation | This field displays the name of the country or region that is associated with this IP address. |
| Type | This field displays whether this address object is HOST, RANGE or SUBNET. |
| IPv4/IPv6 Address | This field displays the IPv4/IPv6 addresses represented by the type of address object. |
| Region vs. Continent | |
| Region | Enter a country name, then click the Region to Continent button to query which continent this country belongs to. |
| Continent | Select a continent, then click the Region List button to query which countries belong to the continent. |
| Apply | Click Apply to save the changes. |
| Reset | Click Reset to return the screen to its last-saved settings. |
How do I create a new geography-to-IP address mapping?
What fields are available when adding a custom geography-to-IP address mapping?
Table 243 Geo IP > Add
| LABEL | DESCRIPTION |
|---|---|
| Region | Select the country or continent that maps to this IP address. |
| Address Type | Select the type of address you want to create. Choices are: HOST, RANGE, SUBNET. |
| IP Address | This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents. |
| IP Starting Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents. |
| IP Ending Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents. |
| Network / Netmask | These fields are only available if the IPv4 Address Type is SUBNET. They cannot be blank. Enter the network IP and subnet mask that defines the IPv4 subnet. |
| IPv6 Address Prefix | This field is only available if the IPv6 Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
What are service objects used for?
What are service groups used for?
What are the common IP protocols mentioned?
• TCP (Transmission Control Protocol, IP protocol 6): Guarantees reliable delivery but is slower and more complex. Used for FTP, HTTP, SMTP, and TELNET. Creates connections and ensures data arrives in sequence.
• UDP (User Datagram Protocol, IP protocol 17): Simpler and faster but less reliable. Used for DHCP, DNS, RIP, and SNMP. Sends short messages without guaranteeing sequence or arrival.
• ICMP (Internet Control Message Protocol, IP protocol 1): Mainly used for error messages and diagnostics (like ping). Does not guarantee delivery.
Both TCP and UDP use 16-bit port numbers to identify source and destination applications.
How do I access the Service Summary screen?
What information is shown on the Service Summary screen?
Table 244 Configuration > Object > Service > Service
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific service. |
| Name | This field displays the name of each service. |
| Content | This field displays a description of each service. |
| Reference | This displays the number of times an object reference is used in a profile. |
How do I add or edit a service object?
What fields are available when adding/editing a service object?
Table 245 Configuration > Object > Service > Service > Edit
| LABEL | DESCRIPTION |
|---|---|
| Name | Type the name used to refer to the service. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| IP Protocol | Select the protocol the service uses. Choices are: TCP, UDP, ICMP, ICMPv6, and User Defined. |
| Starting Port | This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports. (Valid range: 1-65535) |
| Ending Port | This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports. (Valid range: 1-65535) |
| ICMP Type | This field appears if the IP Protocol is ICMP or ICMPv6. Select the ICMP message used by this service. This field displays the message text, not the message number. |
| IP Protocol Number | This field appears if the IP Protocol is User Defined. Enter the number of the next-level protocol (IP protocol). Allowed values are 1 – 255. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
How do I access the Service Group Summary screen?
What is the purpose of the Default_Allow_WAN_To_ZyWALL service group?
What information is shown on the Service Group Summary screen?
Table 246 Configuration > Object > Service > Service Group
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific service group. |
| Family | This field displays the Server Group supported type, according to your configurations in the Service Group Add/Edit screen. There are 3 types of families: Supports IPv4 only, Supports IPv6 only, Supports both IPv4 and IPv6. |
| Name | This field displays the name of each service group. By default, the Zyxel Device uses services starting with “Default_Allow_” in the security policies to allow certain services to connect to the Zyxel Device. |
| Description | This field displays the description of each service group, if any. |
| Reference | This displays the number of times an object reference is used in a profile. |
How do I add or edit a service group?
What fields are available when adding/editing a service group?
Table 247 Configuration > Object > Service > Service Group > Edit
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter the name of the service group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Description | Enter a description of the service group, if any. You can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed. |
| Configuration (Member List) | The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
What are schedules used for on the Zyxel Device?
What are the types of schedules supported?
One-time Schedules: Begin on a specific start date and time and end on a specific stop date and time. Useful for long holidays and vacation periods.
Recurring Schedules: Begin at a specific start time and end at a specific stop time on selected days of the week (Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday). They always begin and end on the same day. Useful for defining workday and off-work hours.
How do I access the Schedule screen?
What information is shown on the Schedule screen?
Table 248 Configuration > Object > Schedule
| LABEL | DESCRIPTION |
|---|---|
| One Time | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific schedule. |
| Name | This field displays the name of the schedule, which is used to refer to the schedule. |
| Start Day / Time | This field displays the date and time at which the schedule begins. |
| Stop Day / Time | This field displays the date and time at which the schedule ends. |
| Reference | This displays the number of times an object reference is used in a profile. |
| Recurring | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific schedule. |
| Name | This field displays the name of the schedule, which is used to refer to the schedule. |
| Start Time | This field displays the time at which the schedule begins. |
| Stop Time | This field displays the time at which the schedule ends. |
| Reference | This displays the number of times an object reference is used in a profile. |
How do I add or edit a one-time schedule?
What fields are available when adding/editing a one-time schedule?
Table 249 Configuration > Object > Schedule > Edit (One Time)
| LABEL | DESCRIPTION |
|---|---|
| Configuration | |
| Name | Type the name used to refer to the one-time schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Day Time | |
| StartDate | Specify the year, month, and day when the schedule begins.
• Year 1900 – 2999 • Month 1 – 12 • Day 1 – 31 (it is not possible to specify illegal dates, such as February 31.) |
| StartTime | Specify the hour and minute when the schedule begins.
• Hour – 0 – 23 • Minute – 0 – 59 |
| StopDate | Specify the year, month, and day when the schedule ends.
• Year 1900 – 2999 • Month 1 – 12 • Day – 1 – 31 (it is not possible to specify illegal dates, such as February 31.) |
| StopTime | Specify the hour and minute when the schedule ends.
• Hour – 0 – 23 • Minute – 0 – 59 |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
How do I add or edit a recurring schedule?
What fields are available when adding/editing a recurring schedule?
Table 250 Configuration > Object > Schedule > Edit (Recurring)
| LABEL | DESCRIPTION |
|---|---|
| Configuration | |
| Name | Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Date Time (Note: Year, Month, and Day columns are not used) | |
| StartTime | Specify the hour and minute when the schedule begins each day.
• Hour – 0 – 23 • Minute – 0 – 59 |
| StopTime | Specify the hour and minute when the schedule ends each day.
• Hour – 0 – 23 • Minute – 0 – 59 |
| Weekly | |
| Week Days | Select each day of the week the recurring schedule is effective. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
How do I access the Schedule Group screen?
What information is shown on the Schedule Group screen?
Table 251 Configuration > Object > Schedule > Schedule Group
| LABEL | DESCRIPTION |
|---|---|
| Configuration | |
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific schedule. |
| Name | This field displays the name of the schedule group, which is used to refer to the schedule. |
| Description | This field displays the description of the schedule group. |
| Members | This field lists the members in the schedule group. Each member is separated by a comma. |
| Reference | This displays the number of times an object reference is used in a profile. |
How do I add or edit a schedule group?
What fields are available when adding/editing a schedule group?
Table 252 Configuration > Object > Schedule > Schedule Group > Add
| LABEL | DESCRIPTION |
|---|---|
| Group Members | |
| Name | Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
| Description | Enter a description of the service group, if any. You can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed. |
| Member List | The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. |
| OK | Click OK to save your changes back to the Zyxel Device. |
| Cancel | Click Cancel to exit this screen without saving your changes. |
What types of AAA servers can be used for access control?
What are AAA server objects used for?
How does user authentication via an LDAP/AD server work?
1. A user logs in with a user name and password pair.
2. The Zyxel Device tries to bind (or log in) to the LDAP/AD server.
3. When the binding process is successful, the Zyxel Device checks the user information in the directory against the user name and password pair.
4. If it matches, the user is allowed access. Otherwise, access is blocked.
What is ASAS?
How do I set up and use OTP with ASAS?
1. Install the ASAS server software on a computer.
2. Create user accounts on the Zyxel Device and in the ASAS server.
3. Import each token’s database file (located on the included CD) into the server.
4. Assign users to OTP tokens (on the ASAS server).
5. Configure the ASAS as a RADIUS server in the Zyxel Device’s Configuration > Object > AAA Server screens.
6. Give the OTP tokens to (local or remote) users.
• Use the Configuration > Object > AAA Server > Active Directory (or LDAP) screens to configure Active Directory or LDAP server objects.
• Use the Configuration > Object > AAA Server > RADIUS screen to configure the default external RADIUS server to use for user authentication.
What types of authentication servers does the Zyxel Device support?
• Local user database: The built-in database for authenticating administrative users (Web Configurator), network access users, and VPN users.
• Directory Service (LDAP/AD): Lightweight Directory Access Protocol / Active Directory allows authentication against an external directory server where user profiles and login information are stored.
• RADIUS: Remote Authentication Dial-In User Service allows authentication against an external or built-in RADIUS server, enabling validation of many users from a central location.
What is a Distinguished Name (DN)?
What is a Base DN?
What is a Bind DN?
How do I access the Active Directory or LDAP server summary screen?
What information is shown on the Active Directory or LDAP server summary screen?
Table 253 Configuration > Object > AAA Server > Active Directory (or LDAP)
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific AD or LDAP server. |
| Name | This field displays the name of the Active Directory. |
| Server Address | This is the address of the AD or LDAP server. |
| Base DN | This specifies a directory. For example, o=Zyxel, c=US. |
How do I add or edit an Active Directory or LDAP server entry?
What fields are available when adding/editing an Active Directory or LDAP server?
Table 254 Configuration > Object > AAA Server > Active Directory (or LDAP) > Add
| LABEL | DESCRIPTION |
|---|---|
| Name | Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes. |
| Description | Enter the description of each server, if any. ou can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed. |
| Server Address | Enter the address (IP or FQDN) of the AD or LDAP server. |
| Backup Server Address | (Optional) If the AD or LDAP server has a backup server, enter its address (IP or FQDN) here. |
| Port | Specify the port number (1-65535) on the AD or LDAP server to which the Zyxel Device sends authentication requests. This port number should be the same on all AD or LDAP server(s) in this group. (Default: 389) |
| Base DN | Specify the directory (up to 127 alphanumerical characters). For example, o=Zyxel, c=US. This is only for LDAP. |
| Use SSL | Select Use SSL to establish a secure connection to the AD or LDAP server(s). This is only for LDAP. |
| Search time limit | Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the AD or LDAP server. User authentication fails if timeout occurs (user info not found or server down). |
| Case-sensitive User Names | Select this if the server checks the case of the usernames. |
| Bind DN | Specify the bind DN for logging into the AD or LDAP server. Enter up to 127 alphanumerical characters. For example, cn=zywallAdmin specifies zywallAdmin as the user name. |
| Password | If required, enter the password (up to 15 alphanumerical characters) for the Zyxel Device to bind (or log in) to the AD or LDAP server. Your password will be encrypted. |
| Retype to Confirm | Retype your new password for confirmation. |
| Login Name Attribute | Enter the type of identifier the users are to use to log in. For example “name” or “email address”. Default for AD is `sAMAccountName`. |
| Alternative Login Name Attribute | (Optional) If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”. |
| Group Membership Attribute | An AD or LDAP server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device checks to determine group membership. The value for this attribute is a group identifier. You can add ext-group-user objects based on these values. For example, attribute “memberOf” with values “sales”, “RD”, “management”. Default for AD is `memberOf`. |
| Domain Authentication for MSChap | Select the Enable checkbox to enable domain authentication for MSChap. This is only for Active Directory. |
| User Name | Enter the user name for the user who has rights to add a machine to the domain. This is only for Active Directory. |
| User Password | Enter the password for the associated user name (who has rights to add a machine). This is only for Active Directory. |
| Retype to Confirm | Retype your new password for confirmation. This is only for Active Directory. |
| Realm | Enter the realm FQDN. This is only for Active Directory. |
| NetBIOS Name | (Optional) Type the NetBIOS name. NetBIOS packets enable computer discovery and communication on a LAN. This is only for Active Directory. |
| Configuration Validation (Username, Test button) | Use a user account from the server specified above to test if the configuration is correct. Enter the account’s user name in the Username field and click Test. |
| OK | Click OK to save the changes. |
| Cancel | Click Cancel to discard the changes. |
How do I access the RADIUS server summary screen?
What information is shown on the RADIUS server summary screen?
Table 255 Configuration > Object > AAA Server > RADIUS
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field displays the index number. |
| Name | This is the name of the RADIUS server entry. |
| Server Address | This is the address of the RADIUS server. |
How do I add or edit a RADIUS server entry?
What fields are available when adding/editing a RADIUS server?
Table 256 Configuration > Object > AAA Server > RADIUS > Add
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Name | Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes. |
| Description | Enter the description of each server, if any. ou can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed. |
| Authentication Server Settings | |
| Server Address | Enter the address (IP or FQDN) of the RADIUS server. |
| Authentication Port | Specify the port number (1-65535) on the RADIUS server to which the Zyxel Device sends authentication requests. (Default: 1812) |
| Backup Server Address | (Optional) If the RADIUS server has a backup server, enter its address (IP or FQDN) here. |
| Backup Authentication Port | (Optional) Specify the port number (1-65535) on the backup RADIUS server. |
| Key | Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device. This key must be the same on both servers and is not sent over the network. Your password will be encrypted. |
| Change of Authorization | Select this option to allow the Zyxel Device to disconnect wireless clients based on information (like client username/MAC address) specified in CoA (Change of Authorization) or RADIUS Disconnect messages sent by the RADIUS server. |
| Accounting Server Settings | |
| Server Address | (Optional) Enter the IP address or Fully-Qualified Domain Name (FQDN) of the RADIUS accounting server. |
| Accounting Port | (Optional) Specify the port number (1-65535) on the RADIUS server to which the Zyxel Device sends accounting information. |
| Backup Server Address | (Optional) If the RADIUS server has a backup accounting server, enter its address (IP or FQDN) here. |
| Backup Accounting Port | (Optional) Specify the port number (1-65535) on the backup RADIUS server for accounting. |
| Key | Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device for accounting. This key must be the same on both servers and is not sent over the network. Your password will be encrypted. |
| Maximum retry count | Specify the number of times (1-10) the Zyxel Device should reattempt to use the primary RADIUS accounting server before trying the secondary. This also sets retry attempts for the secondary. Default is 3. |
| Enable Accounting Interim update | This field is configurable only after you configure a RADIUS accounting server address. Select this to have the Zyxel Device send subscriber status updates to the RADIUS server at the specified interval. |
| Interim Interval | Specify the time interval (1-1440 minutes) for how often the Zyxel Device sends subscriber status updates to the RADIUS server. Default is 10. |
| General Server Settings | |
| Timeout | Specify the timeout period (1-300 seconds) before the Zyxel Device disconnects from the RADIUS server if no response is received. User authentication fails. Default is 5. |
| NAS IP Address | Type the IP address of the NAS (Network Access Server). Default is 127.0.0.1. |
| NAS Identifier | If the RADIUS server requires the Zyxel Device to provide the Network Access Server identifier attribute with a specific value, enter it here. |
| Case-sensitive User Names | Select this if you want configure your username as case-sensitive. |
| User Login Settings | |
| Group Membership Attribute | A RADIUS server defines attributes for its accounts. Select the name and number of the attribute that the Zyxel Device checks to determine group membership. If needed, select user-defined and specify the attribute number. The attribute’s value is a group identifier. You can add ext-group-user objects based on these values. Example: Attribute “Filter-Id(11)”. |
| OK | Click OK to save the changes. |
| Cancel | Click Cancel to discard the changes. |
What are authentication method objects used for?
How do I specify an authentication method for a VPN connection?
1. Access the Configuration > VPN > IPSec VPN > VPN Gateway > Edit screen.
2. Click Show Advance Setting and select Enable Extended Authentication.
3. Select Server Mode and choose an authentication method object from the AAA Method drop-down list box.
4. Click OK to save the settings.
How do I access the Authentication Method objects screen?
What information is shown on the Authentication Method objects screen?
Table 257 Configuration > Object > Auth. Method
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field displays the index number. |
| Method Name | This field displays a descriptive name for identification purposes. |
| Server Profile/ Server Type | This field displays the authentication method(s) for this entry. |
How do I create an authentication method object?
1. Click Configuration > Object > Auth. Method.
2. Click Add.
3. Specify a descriptive name (1-31 alphanumeric, _, -; no number first; case-sensitive) in the Name field. Example: “My_Device”.
4. Click Add below the Method List table to insert a row.
5. Select a server object (local, RADIUS, LDAP, AD – created in AAA Server screens) from the Method List drop-down list box.
6. You can add up to four server objects. The order is important; authentication is attempted sequentially. If an account exists on multiple servers, authentication stops at the first server where the username is found, even if the password doesn’t match.
Note: You cannot select two server objects of the same type (e.g., two LDAP servers).
7. Click OK to save or Cancel to discard.
What fields are available when creating an authentication method object?
Table 258 Configuration > Object > Auth. Method > Add
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Name | Specify a descriptive name for identification purposes. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”. |
| Add | Click this to create a new entry in the Method List below. Select an entry and click Add to create a new entry after the selected entry. |
| Edit | Double-click an entry in the Method List or select it and click Edit to open a screen where you can modify the entry’s settings (select a different server). |
| Remove | To remove an entry from the Method List, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| Move | To change a method’s position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed. The ordering is important as authentication is attempted in this order. |
| # | This field displays the index number in the Method List. |
| Method List | Select a server object from the drop-down list box. You can create a server object in the AAA Server screen. The Zyxel Device authenticates users using the databases (local or external) in the order they appear in this list. If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server. |
| OK | Click OK to save the changes. |
| Cancel | Click Cancel to discard the changes. |
What is two-factor authentication used for on the Zyxel Device?
How does two-factor authentication work for VPN access?
1. A user runs a VPN client and logs in with their username and password.
2. The VPN client connects to the Zyxel Device and authenticates using the specified username and password.
3. The Zyxel Device requests the user’s username, password, and mobile phone number or email address from the configured authentication source (Active Directory, RADIUS, local database) to authenticate (factor 1). If not found, the connection terminates.
4. If factor 1 credentials are correct, the Zyxel Device performs one of the following (factor 2):
• Emails an authorization link to the user.
• Requests the Email-to-SMS cloud system send an SMS with the authorization link.
• (Implicitly, if Google Authenticator is configured) Expects the user to provide the code.
5. The client must open the authorization link or enter the authorization code within a specified deadline (Valid Time).
6. If the authorization is correct and timely, the client accesses the secured network. If the deadline expires, the login process must restart. If credentials are incorrect or SMS/email isn’t received, the user should contact the administrator.
How does two-factor authentication work for Admin access (Web Configurator, SSH, Telnet)?
1. An admin user connects to the Zyxel Device via Web Configurator, SSH, or Telnet.
2. The Zyxel Device requests the admin user’s username, password, and mobile phone number or email address from the configured authentication source (Active Directory, RADIUS, local database) to authenticate (factor 1).
3. If factor 1 credentials are correct, the Zyxel Device performs one of the following (factor 2):
• Requests the Google Authenticator code.
• Emails an authorization link or code to the admin user.
• Requests the Email-to-SMS cloud system send an SMS with an authorization link or code.
4. The admin user must open the authorization link or enter the authorization code within a specified deadline (Valid Time).
5. If the authorization is correct and timely, the admin user logs into the Zyxel Device. If the deadline expires, the login process must restart. If authorization credentials/code are incorrect, the admin user should contact the network administrator.
What pre-configuration is required for two-factor authentication?
• Set up the user’s username, password, and email address or mobile number in the Active Directory, RADIUS server, or local Zyxel Device database.
• Enable Two-factor Authentication in Object > User/Group > User > Edit > Two-factor Authentication for a specific user.
• Enable Two-factor Authentication in Object > Auth. Method > Two-factor Authentication for the Zyxel Device.
• Enable HTTP and/or HTTPS in System > WWW > Service Control.
• Enable SSH and/or Telnet in System > SSH and/or System > TELNET.
• Add HTTP, HTTPS, SSH, and/or TELNET in the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group. This group defines the default services allowed in the WAN_to_Device security policy.
• For VPN access, configure the VPN tunnel for this user on the Zyxel Device.
What pre-configuration is needed specifically for Email Authentication?
What pre-configuration is needed specifically for SMS Authentication?
• Configure Mail Server in System > Notification > Mail Server.
• Configure SMS in System > Notification > SMS.
• Have an account with an Email-to-SMS cloud provider to be able to send SMS authorization requests.
What pre-configuration is needed specifically for Google Authentication?
• A user must set up Google Authenticator on their mobile device before they can successfully authenticate with the Zyxel Device.
Under what conditions will Two-Factor authentication fail?
• You omit any of the pre-configuration items. Make sure to perform all pre-configuration items.
• The user cannot receive the authorization SMS or email. Make sure the mobile telephone number or email address of the user in the Active Directory, RADIUS Server or local Zyxel Device database is configured correctly.
• Email-to-SMS cloud system authentication fails. Make sure that SMS is enabled and credentials are correct in System > Notification > SMS.
• Mail server authentication fails. Make sure the System > Notification > Mail Server settings are correct.
• Authorization times out. Extend the Valid Time in Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access.
• You are unable to access Google Authenticator (you lost your phone or uninstalled the app). Log in using one of the backup codes.
• You get a Google Authenticator verification error. You must enter the code within the time displayed in Google Authenticator. The time on your cellphone and the time on the Zyxel Device must be the same.
What are the specifications and limitations of using Google Authenticator for two-factor authentication?
• Ext-users (authenticated by external servers) are not supported.
• A user must setup Google Authenticator on their mobile device before they can successfully authenticate with the Zyxel Device.
• Verification code length: 6 digits.
• Maximum verification code failed attempts: 3
• Backup code length: 8 digits
• Google authenticator is supported in device High Availability (HA) mode. The secret keys are synchronized between all Zyxel Devices.
How do I configure two-factor authentication for VPN access?
What fields are available when configuring two-factor authentication for VPN access?
Table 259 Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Enable | Select the check box to require double-layer security to access the Zyxel Device via a VPN tunnel. |
| Valid Time | Enter the maximum time (in minutes, 1-15) that the user must tap or click the authorization link in the SMS or email in order to get authorization for the VPN connection. |
| Two-factor Authentication for Services: | Select which kinds of VPN tunnels require Two-Factor Authentication. You should have configured the VPN tunnel first.
• SSL VPN Access • IPSec VPN Access • L2TP/IPSec VPN Access |
| User/Group | This list displays the names of the users and user groups that can be selected for two-factor authentication. Select users/groups from the Selectable list that require 2FA for VPN access and move them to the Selected list. Move users/groups that do not require 2FA back to the Selectable list. |
| Delivery Settings | |
| Deliver Authorize Link Method: | The second factor authentication is done by sending a URL link by text (SMS) or email, or using Google Authenticator. Select one or up to three methods.
• SMS: User object (Object > User/Group > User) must contain a valid mobile phone number (up to 20 chars: 1-9, +*#()-). • Email: User object must contain a valid email address (must contain @). • Google Authenticator: You must first set up the Zyxel Device on the Google Authenticator app (Configuration > Object > User/Group > User > Add > Two-factor Authentication). Then enter the time-limited code from the app. |
| Authorize Link URL Address: | Configure the link that the user will receive in the SMS or email. The user must be able to access the link.
• http/https: you must enable HTTP or HTTPS in System > WWW > Service Control • From Interface/User-Defined: select the Zyxel Device WAN interface (wan1/2) or select User-Defined and then enter an IP address. |
| Authorized Port | Configure a new port (1024-65535) not used by other services. This port is used for 2FA of VPN clients. VPN clients don’t need to change their port settings; the link they receive will contain this new port number. Example: If port 8008 is used and link is https://a.b.c.d, clients see https://a.b.c.d:8008. |
| Message | You can either create a default message in the text box or upload a message file (Use Multilingual file). The file must be named ‘2FA-msg.txt’, be in UTF-8 format. Click Download the default 2FA-msg.txt example to edit. Use Restore Customized File to Default if needed. Use Select a File Path and Upload. The message (text box or file) must contain the ` |
| Apply | Click Apply to save the changes. |
| Reset | Click Reset to return the screen to its last-saved settings. |
How do I configure two-factor authentication for admin access (Web, SSH, Telnet)?
What fields are available when configuring two-factor authentication for admin access?
Table 260 Configuration > Object > Auth. Method > Two-factor Authentication > Admin Access
| LABEL | DESCRIPTION |
|---|---|
| General Settings | |
| Enable | Select the check box to require double-layer security to access the Zyxel Device via the Web Configurator, SSH, or Telnet. |
| Valid Time | Enter the maximum time (in minutes, 1-5) that the user must click or tap the authorization link in the SMS or email in order to get authorization for logins via the Web Configurator, SSH, or Telnet. |
| Two-factor Authentication for Services: | Select which services require Two-Factor Authentication for the admin user.
• Web • SSH • TELNET |
| Delivery Settings | |
| Verification Code Delivery Method | Select one or both (All) methods for sending the second factor verification:
• SMS: User object (Object > User/Group > User) must contain a valid mobile telephone number (up to 20 chars: 1-9, +*#()-). • Email: User object must contain a valid email address (must contain @). |
| Apply | Click Apply to save the changes. |
| Reset | Click Reset to return the screen to its last-saved settings. |
How do I set up admin login with two-factor authentication using SMS?
1. First subscribe for an Email-to-SMS service. Obtain the email address format used by the service to send emails that become SMS messages.
2. In the Zyxel Device web configurator, go to CONFIGURATION > System > Notification > SMS and enter the SMS Provider Email server domain name in Provider Domain, and the sender’s email address in Mail From.
3. Next, go to CONFIGURATION > System > Notification > Mail to set up the following fields for the mail server used to send the email to the Email-to-SMS gateway:
• Mail server
• Mail server ports
• Mail From
• SMTP Authentication (if required)
4. Then go to Configuration > Object > User/Group > User > Add to create an admin type user. Enter the phone number for this user in the format required by your Email-to-SMS provider’s email address (this typically involves appending the provider’s domain to the phone number).
5. Next, set up two-factor authentication for this user in CONFIGURATION > Object > Auth Method > Two-Factor Authentication > Admin Access. Select which services (HTTPS (web), SSH, Telnet) require Two-Factor authentication for this user. Select SMS to send the verification code by SMS.
When this user logs into the Zyxel Device, they will be asked to enter the verification code sent via SMS to their mobile phone.
What are certificates used for on the Zyxel Device?
What are the differences between My Certificates and Trusted Certificates screens?
• My Certificates screens (Configuration > Object > Certificate > My Certificates): Used to generate and export self-signed certificates or certification requests, and import CA-signed certificates issued *for* the Zyxel Device itself.
• Trusted Certificates screens (Configuration > Object > Certificate > Trusted Certificates): Used to save CA certificates and trusted remote host certificates *to* the Zyxel Device. The Zyxel Device trusts any valid certificate imported here, and any valid certificate signed by a CA whose certificate is imported here.
How does public-key cryptography work for authentication?
Example:
1. Tim wants to send a secure message to Jenny. He generates a public-private key pair.
2. Tim keeps the private key secret and makes the public key available.
3. Tim uses his private key to sign the message and sends it to Jenny.
4. Jenny receives the message and uses Tim’s public key to verify the signature. This confirms the message is from Tim and hasn’t been altered.
5. Jenny can also sign her reply with her private key, and Tim uses her public key to verify it.
Certificates are used for authentication, not necessarily encryption of the data itself (though the connection established after authentication might be encrypted, like with VPN).
What is a Certificate Revocation List (CRL)?
What are the advantages of using certificates?
• The Zyxel Device only needs to store the certificates of trusted certification authorities, regardless of how many devices need authentication.
• Key distribution is simple and secure, as public keys can be freely distributed without compromising private keys.
What are self-signed certificates?
What is the factory default certificate?
What certificate file formats can be imported?
• Binary X.509: Standard format defined by ITU-T X.509.
• PEM (Base-64) encoded X.509: Printable format using letters and numerals to represent a binary X.509 certificate.
• Binary PKCS#7: Standard for transferring public key certificates (private key not included). The Zyxel Device currently supports importing PKCS#7 files containing a single certificate.
• PEM (Base-64) encoded PKCS#7: Printable format for a binary PKCS#7 certificate.
• Binary PKCS#12: Format for transferring both public and private key certificates. The private key is within a password-encrypted envelope. You must provide the password when importing.
Note: Be careful not to convert binary files to text during transfer, as many programs default to text.
How can I verify a certificate before importing it?
1. Browse to where the certificate is saved on your computer.
2. Ensure the certificate file has a “.cer” or “.crt” extension.
3. Double-click the certificate icon to open the Certificate window.
4. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.
5. Use a secure method (like telephone or HTTPS connection) to verify that the certificate owner has the same Thumbprint information.
How do I access the My Certificates screen?
What information and actions are available on the My Certificates screen?
Table 261 Configuration > Object > Certificate > My Certificates
| LABEL | DESCRIPTION |
|---|---|
| PKI Storage Space in Use | Displays the percentage of PKI storage used. Delete unnecessary certificates if space is low. |
| Add | Click to generate a certificate or certification request. |
| Edit | Double-click an entry or select and click Edit for detailed certificate information. |
| Remove | Select an entry and click Remove to delete it (confirmation required). Cannot delete certificates currently in use. |
| References | Select an entry and click References to see where the certificate is used. |
| Download | Click this to download the selected certificate. A dialog appears to optionally include the private key by entering a password. |
| Click to email the selected certificate. A dialog appears with fields:
• Mail Subject: Subject line for the email. • Mail To: Recipient email address(es). • Send Certificate with Private Key: Checkbox to include the private key. • Password: (If sending private key) Enter a password (up to 31 chars; ;\|`~!@#$%^&*()_+\\{}’:,./<>=-” allowed). • E-mail Content: Email body text (up to 250 chars; same special chars as password allowed). • Compress as a ZIP File: Checkbox to compress the certificate. Recommended when sending with a private key, as some email servers block PKCS#12 files. • Send Email: Click to send. • Cancel: Click to close without sending. |
|
| # | Certificate index number (alphabetical order). |
| Name | Name used to identify the certificate. Recommended to be unique. |
| Type | Displays the certificate type:
• REQ: Certification request (not yet valid). Send to CA for signing, then import the issued certificate using the Import button. • SELF: Self-signed certificate. • CERT: Certificate issued by a certification authority. |
| Subject | Identifying information about the certificate’s owner (CN, OU, O, C). Recommended to be unique. |
| Issuer | Identifying information about the issuing CA. Same as Subject for self-signed certificates. |
| Valid From | Date the certificate becomes applicable. |
| Valid To | Date the certificate expires. Displays in red with “Expired!” message if expired. |
| Import | Click Import to open a screen to save a certificate to the Zyxel Device. |
| Refresh | Click Refresh to display the current validity status of the certificates. |
How do I access the My Certificates Add screen?
What is the purpose of the My Certificates Add screen?
What fields are available when adding a certificate or request in My Certificates?
Table 262 Configuration > Object > Certificate > My Certificates > Add
| LABEL | DESCRIPTION |
|---|---|
| Name | Type a name (up to 31 alphanumeric and ;’~!@#$%^&()_+[]{}’,.=- characters) to identify this certificate. |
| Subject Information | Record identifying information for the certificate owner. Must specify one of: Host IP Address, Host IPv6 Address, Host Domain Name, or E-Mail. Select the radio button and enter the value. Domain name (up to 255 chars: alphanumeric, -, .) or email address (up to 63 chars: alphanumeric, -, @, ., _). Recommended to be unique. |
| Organizational Unit | Identify the unit/department (up to 31 chars: alphanumeric, -, _). |
| Organization | Identify the company/group (up to 31 chars: alphanumeric, -, _). |
| Town (City) | Identify the town/city (up to 31 chars: alphanumeric, -, _). |
| State, (Province) | Identify the state/province (up to 31 chars: alphanumeric, -, _). |
| Country | Enter a two-letter country code. |
| Key Type | Sets the encryption algorithm (RSA, DSA, ECDSA) and signature hash algorithm (SHA256, SHA384, SHA512). RSA/SHA256 is more compatible; ECDSA/SHA512 is more secure. |
| Key Length | Select key length (1024, 2048 bits for RSA/DSA). Longer keys are more secure but use more storage. ECDSA keys are shorter for similar security. |
| LifeTimes | Select certificate validity period (2 to 10 years). |
| Extended Key Usage | |
| Server Authentication | Select to generate/store request for server authentication certificate. |
| Client Authentication | Select to generate/store request for client authentication certificate. |
| IKE Intermediate | Select to generate/store request for IKE Intermediate authentication certificate. |
| Enrollment Options | |
| Create a self-signed certificate | Select to have the Zyxel Device generate the certificate and act as its own CA. |
| Create a certification request and save it locally for later manual enrollment | Select to generate a request. Use My Certificate Details screen to view/copy the request to send to a CA. Copy the request from the Details screen and send to CA. |
| OK | Click to begin certificate or request generation. If enrollment fails, a Return button appears; check info and connection. |
| Cancel | Click to quit and return to My Certificates screen. |
How do I access the My Certificates Edit screen?
What information and actions are available on the My Certificates Edit screen?
Table 263 Configuration > Object > Certificate > My Certificates > Edit
| LABEL | DESCRIPTION |
|---|---|
| Configuration | |
| Name | Displays identifying name. Can change it (up to 31 alphanumeric and ;’~!@#$%^&()_+[]{}’,.=- characters). |
| Certification Path | |
| Certification Path (Text Box) | Displays hierarchy validating the certificate. Click Refresh to update. Shows “Not trusted” if path is invalid (expired/revoked). For self-signed, only the certificate itself is listed. |
| Refresh | Click Refresh to display the certification path. |
| Certificate Information (Read-only fields) | |
| Type | Displays certificate type (CA-signed, Self-signed) and format (X.509). |
| Version | Displays X.509 version number. |
| Serial Number | Certificate identification number (from CA or generated by Zyxel Device). |
| Subject | Owner’s identifying information (CN, OU, O, ST, C). |
| Issuer | Issuing CA’s identifying information. Same as Subject for self-signed. “none” for request. |
| Signature Algorithm | Algorithm used to sign the certificate (e.g., rsa-pkcs1-sha1, rsa-pkcs1-md5). |
| Valid From | Date certificate becomes applicable. “none” for request. |
| Valid To | Date certificate expires. Red text and “Expired!” message if expired. “none” for request. |
| Key Algorithm | Algorithm used for key pair generation (e.g., RSA) and key length (e.g., 1024 bits). |
| Subject Alternative Name | Displays owner’s IP address (IP), domain name (DNS), or email address (EMAIL). |
| Key Usage | Functions the key can be used for (e.g., DigitalSignature, KeyEncipherment). |
| Extended Key Usage | How Zyxel Device generated/stored request (server auth, client auth, IKE Intermediate). |
| Basic Constraint | General info (e.g., Subject Type=CA, Path Length Constraint=1). Not displayed for request. |
| MD5 Fingerprint | Certificate’s MD5 message digest. |
| SHA1 Fingerprint | Certificate’s SHA1 message digest. |
| Certificate in PEM (Base-64) Encoded Format | Read-only text box displaying certificate/request in PEM format. Can copy/paste for enrollment or distribution. |
| Export Certificate Only | Click to save certificate without private key. Click Save in File Download screen, browse, click Save. |
| Password | (For exporting with private key) Create and enter password here. Keep it safe. |
| Export Certificate with Private Key | Click to save certificate with private key. Enter password, click button. Click Save in File Download screen, browse, click Save. |
| OK | Click OK to save changes (name only) back to Zyxel Device. |
| Cancel | Click Cancel to quit and return to My Certificates screen. |
How do I access the My Certificates Import screen?
What is the purpose of the My Certificates Import screen?
What fields are available on the My Certificates Import screen?
Table 264 Configuration > Object > Certificate > My Certificates > Import
| LABEL | DESCRIPTION |
|---|---|
| File Path | Type the location of the file or click Browse. Cannot import with same name as existing certificate. |
| Browse | Click Browse to find the certificate file. |
| Password | Only applies when importing binary PKCS#12 format. Type the password created when the file was exported. |
| OK | Click OK to save the certificate on the Zyxel Device. |
| Cancel | Click Cancel to quit and return to the My Certificates screen. |
How do I access the Trusted Certificates screen?
What information and actions are available on the Trusted Certificates screen?
Table 265 Configuration > Object > Certificate > Trusted Certificates
| LABEL | DESCRIPTION |
|---|---|
| PKI Storage Space in Use | Displays the percentage of PKI storage used. Delete unnecessary certificates if space is low. |
| Edit | Double-click an entry or select and click Edit for detailed certificate information. |
| Remove | Select an entry and click Remove to delete it (confirmation required). Cannot delete certificates currently in use. |
| References | Select an entry and click References to see where the certificate is used. |
| # | Certificate index number (alphabetical order). |
| Name | Name used to identify this certificate. |
| Subject | Identifying information about the certificate’s owner (CN, OU, O, C). Recommended to be unique. |
| Issuer | Identifying information about the issuing CA. Same as Subject for self-signed certificates. |
| Valid From | Date the certificate becomes applicable. |
| Valid To | Date the certificate expires. Displays in red with “Expired!” message if expired. |
| Import | Click Import to open a screen to save a trusted CA certificate from your computer. |
| Refresh | Click this button to display the current validity status of the certificates. |
How do I access the Trusted Certificates Edit screen?
What information and actions are available on the Trusted Certificates Edit screen?
Table 266 Configuration > Object > Certificate > Trusted Certificates > Edit
| LABEL | DESCRIPTION |
|---|---|
| Configuration | |
| Name | Displays identifying name. Can change it (up to 31 alphanumeric and ;’~!@#$%^&()_+[]{}’,.=- characters). |
| Certification Path | |
| Certification Path (Text Box) | Displays hierarchy validating the end entity’s certificate. Click Refresh to update. Shows “Not trusted” if path is invalid (expired/revoked). |
| Refresh | Click Refresh to display the certification path. |
| Certificate Validation | |
| Enable X.509v3 CRL Distribution Points and OCSP checking | Select to turn on certificate revocation checking. Validates certificate via CRL (HTTP/LDAP) and OCSP. |
| OCSP Server | Select if directory server uses OCSP. |
| URL | Type protocol, IP address, path name of OCSP server. |
| ID | (If needed) Type login name (up to 31 ASCII) for OCSP server access. |
| Password | (If needed) Type password (up to 31 ASCII) for OCSP server access. |
| LDAP Server | Select if directory server uses LDAP for CRLs. |
| Address | Type IP address (dotted decimal) of LDAP directory server. |
| Port | Specify LDAP server port number (default 389). Must match server. |
| ID | (If needed) Type login name (up to 31 ASCII) for CRL directory server access. |
| Password | (If needed) Type password (up to 31 ASCII) for CRL directory server access. |
| Certificate Information (Read-only fields) | |
| Type | Displays certificate type (CA-signed, Self-signed) and format (X.509). |
| Version | Displays X.509 version number. |
| Serial Number | Certificate identification number (from CA). |
| Subject | Owner’s identifying information (CN, OU, O, C). |
| Issuer | Issuing CA’s identifying information. Same as Subject for self-signed. |
| Signature Algorithm | Algorithm used to sign the certificate (e.g., rsa-pkcs1-sha1, rsa-pkcs1-md5). |
| Valid From | Date certificate becomes applicable. Red text and “Not Yet Valid!” if not yet applicable. |
| Valid To | Date certificate expires. Red text and “Expiring!” or “Expired!” message if near/past expiry. |
| Key Algorithm | Algorithm used for key pair generation (e.g., RSA) and key length (e.g., 1024 bits). |
| Subject Alternative Name | Displays owner’s IP address (IP), domain name (DNS), or email address (EMAIL). |
| Key Usage | Functions the key can be used for (e.g., DigitalSignature, KeyEncipherment). |
| Extended Key Usage | Displays method Zyxel Device generated/stored request (server auth, client auth, IKE Intermediate). |
| Basic Constraint | General info (e.g., Subject Type=CA, Path Length Constraint=1). |
| MD5 Fingerprint | Certificate’s MD5 message digest. Use for verification. |
| SHA1 Fingerprint | Certificate’s SHA1 message digest. Use for verification. |
| Certificate (PEM Format) | Read-only text box displaying certificate in PEM format. Can copy/paste for distribution. |
| Export Certificate | Click to save the certificate. Click Save in File Download screen, browse, click Save. |
| OK | Click OK to save changes (name only) back to Zyxel Device. |
| Cancel | Click Cancel to quit and return to the Trusted Certificates screen. |
How do I access the Trusted Certificates Import screen?
What fields are available on the Trusted Certificates Import screen?
Table 267 Configuration > Object > Certificate > Trusted Certificates > Import
| LABEL | DESCRIPTION |
|---|---|
| File Path | Type the location of the file or click Browse. Cannot import with same name as existing certificate. File formats: Binary X.509, PEM X.509, Binary PKCS#7, PEM PKCS#7. |
| Browse | Click Browse to find the certificate file. |
| OK | Click OK to save the certificate on the Zyxel Device. |
| Cancel | Click Cancel to quit and return to the previous screen. |
What is OCSP (Online Certificate Status Protocol)?
What are ISP accounts used for?
How do I access the ISP Account Summary screen?
What information is shown on the ISP Account Summary screen?
Table 268 Configuration > Object > ISP Account
| LABEL | DESCRIPTION |
|---|---|
| Add | Click this to create a new entry. |
| Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
| Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
| References | Select an entry and click References to open a screen that shows which settings use the entry. |
| # | This field is a sequential value, and it is not associated with a specific entry. |
| Profile Name | This field displays the profile name of the ISP account. This name is used to identify the ISP account. |
| Protocol | This field displays the protocol used by the ISP account. |
| Authentication Type | This field displays the authentication type used by the ISP account. |
| User Name | This field displays the user name of the ISP account. |
How do I add or edit an ISP account?
What fields are available when adding/editing an ISP account?
Table 269 Configuration > Object > ISP Account > Edit
| LABEL | DESCRIPTION |
|---|---|
| Profile Name | (Read-only if editing) Type the profile name (1-31 alphanumeric, _, -; no number first; case-sensitive). Used to identify the account. |
| Protocol | (Read-only if editing) Select the protocol: pppoe, pptp, l2tp. |
| Authentication Type | Select authentication protocol for outgoing calls: CHAP/PAP, Chap, PAP, MSCHAP, MSCHAP-V2. |
| Encryption Method | (Available for PPTP) Select Microsoft Point-to-Point Encryption (MPPE): nomppe, mppe-40 (40-bit), mppe-128 (128-bit). |
| User Name | Type the user name provided by your ISP. |
| Password | Type the password (alphanumeric A-Z, a-z, 0-9 only) for the user name. Can be blank. Will be encrypted. |
| Retype to Confirm | Type the password again for confirmation. |
| IP Address/FQDN | Enter the IP address or Fully-Qualified Domain Name (FQDN) of the PPTP or L2TP server. |
| Connection ID | (Available for PPTP) Type identification name for the PPTP server. Can be blank. |
| Service Name | (Available for PPPoE) Type the PPPoE service name to access. Used to identify and reach the PPPoE server. Can be blank. |
| Compression | Select On for stac compression, Off otherwise. Stac compression can compress data by a factor of about four. (Not displayed for PPTP). |
| Idle Timeout | Specify seconds (0-3600) of outbound traffic inactivity before disconnecting from PPPoE/PPTP server. 0 disables timeout. |
| OK | Click OK to save changes. Returns to ISP Account screen if no errors. Stays on Edit screen if errors occur. |
| Cancel | Click Cancel to return to ISP Account screen without saving changes. |
What is needed to use Cloud CNM SecuManager?
What management and analytics features are covered in Chapter 30?
• Using the Mgmt. & Analytics > SecuManager screen to enable/configure management by a Central Network Management (CNM) system.
• Using the Mgmt. & Analytics > SecuReporter screen to enable logging, view license status, and access the SecuReporter web portal for security analytics.
• Using the Mgmt. & Analytics > Nebula screen to allow Nebula to manage the Zyxel Device remotely.
What is Cloud CNM SecuManager?
What features does Cloud CNM SecuManager include?
• Batch import of managed devices using CSV file.
• Overview of all managed devices and system information.
• Device monitoring and management.
• Firmware installation to multiple devices of the same model simultaneously.
• Device configuration backup and restore.
• Map view of managed device locations.
• Event and alarm notifications (e.g., device down).
• Graphical monitoring of individual devices with statistics.
• Direct access to devices for remote configuration.
• Four types of administrators with different privileges.
• Site-to-Site, Hub & Spoke, Fully-meshed, and Remote Access VPN provisioning.
What is required to allow Cloud CNM SecuManager management of a Zyxel Device?
• You must have a Cloud CNM SecuManager license with CNM ID number or a Cloud CNM SecuManager server URL.
• The Zyxel Device must be able to communicate with the Cloud CNM SecuManager server.
• You must configure Configuration > Cloud CNM > SecuManager on the Zyxel Device to allow it to find the server.
How do I configure SecuManager settings on the Zyxel Device?
Table 270 Configuration > Cloud CNM > SecuManager
| LABEL | DESCRIPTION |
|---|---|
| Show/Hide Advanced Settings | Click to toggle display of advanced fields. |
| Enable | Select to allow management by Cloud CNM SecuManager. |
| Auto | Select if your SecuManager server can access myZyxel to automatically get the VM server URL. Requires CNM ID from license. myZyxel associates CNM ID with CNM URL. |
| CNM URL (Auto) | (Read-only when Auto selected) Displays the URL retrieved from myZyxel. |
| Custom | Select if your server cannot access myZyxel, or if server/device are in private network/behind NAT. |
| CNM URL (Custom) | Manually enter the VM server URL: IPv4 address, port (default 7547 HTTPS, 7549 HTTP), and CNM ID. Example: `1.1.1.1:7547/V6ABQNTPYG` or `1.1.1.1:7549/V6ABQNTPYG`. |
| Transfer Protocol | Choose CNM URL protocol: HTTP or HTTPS. Must match the protocol/port used in the CNM URL (Custom) field. Example: `https://1.1.1.1:7547` or `http://1.1.1.1:7549`. |
| Periodic Inform | Enable for Zyxel Device to inform SecuManager server of its presence at intervals. |
| Interval | (If Periodic Inform enabled) Type how often (10-86400 seconds) the device should inform the server. |
| HTTPS Authentication | Select if you have an HTTPS server certificate. |
| Server Certificate | (If HTTPS Authentication enabled) Select a certificate the HTTPS server (Zyxel Device) uses to authenticate itself to the HTTPS client (SecuManager). See Trusted CAs link. |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
What is Cloud CNM SecuReporter?
How do I activate and enable SecuReporter?
1. Check if Service Status displays Activated in Configuration > Cloud CNM > SecuReporter. If not, log in to myZyxel.com and activate the SecuReporter license for this Zyxel Device. The device needs connectivity to myZyxel. The license appears in Configuration > Licensing > Registration > Service after activation.
2. After activation, go back to Configuration > Cloud CNM > SecuReporter and select the log categories to send.
3. Select Enable SecuReporter. (Do not proceed to the portal yet). View license status, type, expiration date here.
4. Click Apply and wait.
How do I add a Zyxel Device to SecuReporter?
1. Log in to the SecuReporter portal.
2. Go to Settings > Organization & Devices > Add to create an organization.
3. Add this Zyxel Device to the organization using the hyperlink under Unclaimed Device.
When does the SecuReporter banner appear on the Zyxel Device?
1. SecuReporter hasn’t been enabled before.
2. The Zyxel Device is not added to an organization in SecuReporter yet.
Clicking the “Enable SecuReporter” button in the banner allows configuration.What settings are configured via the SecuReporter Banner?
• Server Status: Connection status (Connected, Timeout, Fail).
• Device Name: Enter name for the device in SecuReporter.
• Organization: Appears if no organization exists yet. Enter name (up to 255 chars) and description.
• Select from existing organization: Select an existing org from drop-down.
• Create new organization: Type name (up to 255 chars) and description.
• Data Protection Policy: Choose data privacy level:
• Partially Anonymous: Personal data (usernames, MACs, emails, hostnames) replaced with artificial identifiers in downloaded logs.
• Fully Anonymous: Personal data replaced with anonymized info in logs. Data cannot be traced back.
• Non-Anonymous: Personal data identifiable in logs.
• Accept Terms of Use checkbox.
• Complete and Close Window button.
How do I configure SecuReporter settings (Enable, Categories) on the Zyxel Device?
Table 271 Configuration > Cloud CNM > SecuReporter
| LABEL | DESCRIPTION |
|---|---|
| Enable SecuReporter | Select to have SecuReporter collect/analyze logs. Selected by default if Standard license activated; must select if Trial license. Not available if no license. Click GDPR link for privacy policy. |
| Categories (Security, Network) | Select log categories (Anti-Spam, Content Filter, Threat Protection (ADP), Traffic Log, Interface Statistics) to send for analysis. |
| SecuReporter Service License Status | |
| Service Status | Displays license status at myZyxel: Activated, Not Activated, Expired, Not Licensed. Shows Grace Period if expired. Links to Buy/Activate. |
| Service Type | Displays license type: Trial or Standard. Blank if not activated. |
| Expiration Date | Displays service expiry date. |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
What is Cloud Monitoring Mode for Nebula?
What is Cloud Mode for Nebula?
How do I set the Zyxel Device to Cloud Monitoring Mode?
How do I switch from On Premises Mode to Cloud Monitoring Mode?
1. Back up the Zyxel Device configurations.
2. Select Cloud Monitoring Mode in Configuration > Mgmt. & Analytics > Nebula, then select Enable.
3. Enter the Monitor mode ID of an organization you created on Nebula (found in Nebula under Organization-wide > Organization-wide manage > Organization settings).
4. Click Apply. Check the result in the Status field.
What do the different statuses mean in Cloud Monitoring Mode?
| Status | Meaning |
|---|---|
| N/A | You’ve not entered a Monitor mode ID on the Zyxel Device. |
| Connected | The Zyxel Device is connected to Nebula. Check the Zyxel Device Device Type on Nebula in Organization-wide > License & inventory. |
| Disconnected – Server is not reachable | The Zyxel Device cannot connect to Nebula. Ensure device can access *.nebula.zyxel.com and ports 443, 4335, 6667. |
| Disconnected – Connection failure | The Zyxel Device failed to connect to Nebula. Ensure device settings match Nebula settings. |
| Disconnected – Registration failure | The email registered on myZyxel and the email for the target Nebula organization are different. |
| Disconnected – Operation modes mismatch | Remove the Zyxel Device from the Nebula organization and site. |
How do I switch from Nebula Mode to Cloud Monitoring Mode?
1. Remove the Zyxel Device from the organization and site in Nebula.
2. If the Zyxel Device was connected to Nebula, it will automatically reset. If not connected, press the physical reset button.
3. After the PWR LED is steady green, log into the Zyxel Device, select On Premises Mode, go to Configuration > Mgmt. & Analytics > Nebula, select Cloud Monitoring Mode and follow screen prompts (enter Monitor ID, Apply).
How do I switch from Cloud Monitoring Mode to Nebula Mode?
1. Remove the Zyxel Device from the organization and site in Nebula (while in cloud monitoring mode).
2. Back up your current configuration in Maintenance > File Manager > Configuration File.
3. Reset the Zyxel Device to factory default (push Reset button until port LEDs turn off, ~5 seconds). Device reboots.
4. Log into the Zyxel Device. Run the initial setup wizard and choose Nebula Mode.
When does the Native Mode Cloud Management screen appear?
• Your Zyxel Device supports Native Mode.
• You can connect to Nebula with your current WAN settings.
If these criteria are met, Nebula uses the current WAN settings, and other settings are reset to factory defaults upon registration.Which WAN settings are shown in the Nebula Internet Access table for Native Mode?
• External interface (connects to external network like Internet or PPPoE; automatically added to default WAN trunk).
• Base port (Ethernet interface on which a VLAN interface runs).
• Ethernet, VLAN or Ethernet/VLAN interface on which a PPPoE interface runs.
How do I register the Zyxel Device to Nebula using Native Mode?
1. Select up to two WAN interfaces from the physical ports shown (max one per port) for Nebula connectivity.
2. Click Test to check Nebula connectivity through the selected ports.
Note: If you cannot access Nebula after clicking Apply & Go To Nebula, access the local GUI via LAN using the support account.
3. Click Apply & Go to Nebula. The device will:
• Back up current configuration.
• Reset configuration to factory defaults (except WAN settings).
• Automatically restart.
Note: You will lose WAN access to the device; use Nebula for management.
4. Use the Nebula web portal or app to create an organization/site and add the Zyxel Device.
Note: The Nebula app registration option won’t appear if logged in as a limited admin.
What fields are shown in the Nebula Cloud Management (Native Mode) screen?
| LABEL | DESCRIPTION |
|---|---|
| Nebula Internet Access (Select WAN interfaces for Nebula connection) | |
| # | Sequential value for interface listing. |
| Name | Displays the name of the interface. |
| Status | Current status:
• Ethernet: Inactive, Down, Speed/Duplex (Full/Half). • VLAN: Up, Down. • PPPoE: Connected, Disconnected. |
| IP Addr/Netmask | Current IP address/subnet mask. Shows management IP if VRRP backup, static IP if master. Not shown if static IP is 0.0.0.0. |
| IP Assignment | How interface gets IP: Static, Dynamic, DHCP Client. |
| DNS Server | DNS server IP address used by the interface. |
| Connection | Click Test to check Nebula accessibility via this interface. |
| Register Zyxel Device on Nebula | |
| Nebula portal | Instructions: Log into Nebula portal, create org/site, enter MAC/Serial Number. |
| Nebula app | Instructions: Download app, select site, scan QR code. |
| Apply & Go to Nebula | Click to pass management to Nebula. Device resets (except WAN settings) and restarts. |
What general Zyxel Device settings can be configured in the System screens?
• System > Host Name: Configure a unique device name.
• System > USB Storage: Configure settings for connected USB devices.
• System > Date/Time: Configure device date and time.
• System > Console Speed: Configure console port speed.
• System > DNS: Configure DNS server settings.
• System > WWW: Configure HTTP/HTTPS access and login page settings.
• System > SSH: Configure Secure Shell access.
• System > TELNET: Configure Telnet access.
• System > FTP: Configure FTP access.
• System > SNMP: Configure SNMP agent settings.
• System > Auth. Server: Configure the device as a RADIUS server.
• Notification > Mail Server: Configure email notification settings.
• Notification > SMS: Configure SMS notification/authorization settings.
• Notification > Response Message: Create custom block pages.
• System > Language: Set Web Configurator language.
• System > IPv6: Enable/disable IPv6 support.
• System > ZON: Enable/disable Zyxel One Network utility.
• System > Advanced: Enable/disable Fast Forwarding.
How do I configure the Host Name and Domain Name for the Zyxel Device?
Table 274 Configuration > System > Host Name
| LABEL | DESCRIPTION |
|---|---|
| System Name | Enter a descriptive name (up to 64 alphanumeric, -, ., _). Spaces not allowed. Note: For Windows AD auth, keep shorter than 15 chars. |
| Domain Name | (Optional) Enter the domain name. Propagated to DHCP clients if DHCP server enabled (up to 254 alphanumeric, -). Spaces not allowed. |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
How do I configure USB storage settings?
Table 275 Configuration > System > USB Storage
| LABEL | DESCRIPTION |
|---|---|
| Activate USB storage service | Select to use the connected USB device(s) for logs/diagnostics. |
| Disk full warning when remaining space is less than | Set a number and unit (MB or %) to trigger an alert log when remaining space falls below this level. |
| Overwrite the oldest log file | Select to overwrite the oldest log file when space is less than the warning level set above. Note: Save log files to your computer if needed. |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
When does the Zyxel Device generate logs at the alert level for USB storage?
• The remaining USB storage space is less than the value set in “Disk full warning”.
• The Zyxel Device overwrites the oldest log files (if enabled).
Check log priority in Monitor > Log > View Log > Priority.How do I configure the Date and Time settings on the Zyxel Device?
Table 276 Configuration > System > Date and Time
| LABEL | DESCRIPTION |
|---|---|
| Current Time and Date | |
| Current Time | Displays present time. |
| Current Date | Displays present date. |
| Time and Date Setup | |
| Manual | Select to enter time/date manually. Settings take effect on Apply. |
| New Time (hh-mm-ss) | Displays last updated/set time. If Manual, enter new time here. |
| New Date (yyyy-mm-dd) | Displays last updated/set date. If Manual, enter new date here. |
| Get from Time Server | Select to get time/date from NTP server. Requests on startup, Apply/Sync Now click, and 24-hour intervals. |
| Time Server Address* | Enter IP or URL of NTP server. (*Optional, uses pre-defined list if blank). |
| Sync. Now | Click to get time/date from specified server now. Saves changes (except daylight saving). |
| Time Zone Setup | |
| Time Zone | Choose time zone relative to GMT. |
| Automatically Sync Time Zone | Select for Zyxel Device to automatically get its time zone. |
| Daylight Saving | |
| Enable Daylight Savings | Select if you use Daylight Saving Time (DST). |
| Automatically adjust clock for Daylight Saving Time | Select for device to automatically adjust time if DST implemented in selected time zone. |
| Start Date | Configure day/time DST starts (if Manual DST selected). Uses 24hr format. Examples: US (Second Sunday March @ 2), EU (Last Sunday March @ 1 GMT – adjust ‘at’ field per zone). |
| End Date | Configure day/time DST ends (if Manual DST selected). Uses 24hr format. Examples: US (First Sunday November @ 2), EU (Last Sunday October @ 1 GMT – adjust ‘at’ field per zone). |
| Offset | Specify DST offset (1 to 5.5 hours in 0.5 increments). Example: 3.5 offset makes 6 PM log appear as 10:30 PM. |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
What are the pre-defined NTP time servers used by the Zyxel Device?
Table 277 Default Time Servers
| 0.pool.ntp.org |
| 1.pool.ntp.org |
| 2.pool.ntp.org |
How does the Zyxel Device use the pre-defined NTP time server list?
How do I synchronize the time with an NTP server immediately?
How do I manually set the date and time?
1. Click System > Date/Time.
2. Select Manual under Time and Date Setup.
3. Enter the time in the New Time field.
4. Enter the date in the New Date field.
5. Under Time Zone Setup, select your Time Zone.
6. (Optional) Select Enable Daylight Saving and configure start/end/offset if needed.
7. Click Apply.
How do I set the device to get the date and time from a time server?
1. Click System > Date/Time.
2. Select Get from Time Server under Time and Date Setup.
3. Under Time Zone Setup, select your Time Zone.
4. (Optional) Select Enable Daylight Saving and configure start/end/offset if needed.
5. Under Time and Date Setup, enter a Time Server Address (or leave blank to use defaults).
6. Click Apply.
How do I configure the Console Port Speed?
Table 278 Configuration > System > Console Speed
| LABEL | DESCRIPTION |
|---|---|
| Console Port Speed | Use the drop-down to change console port speed. Supports 9600, 19200, 38400, 57600, 115200 bps (default). Applies to physical console port connection, not Web Configurator Console. |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
How can the Zyxel Device get DNS server addresses?
• Manually enter addresses provided by your ISP.
• Dynamically obtain addresses from the ISP (if assigned with WAN IP).
• Manually enter addresses of other DNS servers.
How do I configure DNS settings on the Zyxel Device?
Table 279 Configuration > System > DNS
| LABEL | DESCRIPTION |
|---|---|
| Address/PTR Record | |
| # | Index number. |
| FQDN | Host’s fully qualified domain name. |
| IP Address | IP address of the host. |
| Add/Edit/Remove | Manage Address/PTR records. |
| IPv6 Address/PTR Record | |
| # | Index number. |
| FQDN | Host’s fully qualified domain name. |
| IP Address | IPv6 address of the host. |
| Add/Edit/Remove | Manage IPv6 Address/PTR records. |
| CNAME Record | |
| # | Index number. |
| Alias Name | Alias for the FQDN (use *. prefix for wildcard). |
| FQDN | Canonical (true) fully qualified domain name. |
| Add/Edit/Remove | Manage CNAME records. |
| Domain Zone Forwarder | |
| # | Index number (rules applied in order). Hyphen (-) for non-configurable default record. |
| Domain Zone | FQDN without host (e.g., zyxel.com.tw). “*” means all zones. |
| Type | DNS Server source: User-Defined or dynamically from ISP interface. |
| DNS Server | IP address of DNS server. N/A if dynamic & interface inactive. |
| Query Via | Interface used to send queries to this DNS server (tunnel if VPN). |
| Add/Edit/Remove/Move | Manage Domain Zone Forwarder records. |
| MX Record (for My FQDN) | |
| # | Index number. |
| Domain Name | Domain name where mail is destined. |
| IP/FQDN | IP address or FQDN of the mail server handling mail for the domain. |
| Add/Edit/Remove | Manage MX records. |
| Security Option Control (Advanced Setting) | |
| Edit | Click policy (Default/Customize) then Edit to change allow/deny actions. |
| Priority | Customize policy checked first, then Default if no match. |
| Name | Name of policy (Default or Customize). Can change Customize name. |
| Address | Address objects used in control policy (e.g., RFC1918). Modified in Object > Address. |
| Additional Info from Cache | Displays if device allowed/denied to cache RRs from previous queries. |
| Query Recursion | Displays if device allowed/denied to forward client DNS requests. |
| Service Control | |
| # | Index number (rules applied in order). Hyphen (-) for non-configurable default policy. |
| Zone | Zone on Zyxel Device allowed/denied access. |
| Address | Object name of IP address(es) allowed/denied to send DNS queries. |
| Action | Accept (allow query) or Deny (discard query). |
| Add/Edit/Remove/Move | Manage Service Control rules. |
How do I add an IPv4 or IPv6 Address/PTR record?
Table 280 Configuration > System > DNS > (IPv6) Address/PTR Record Edit
| LABEL | DESCRIPTION |
|---|---|
| FQDN | Type Fully-Qualified Domain Name (FQDN) of server. Use “*.” prefix for wildcard (e.g., *.example.com). Underscores not allowed. |
| IP Address | Enter the IPv4 (dotted decimal) or IPv6 address of the host. |
| OK | Click OK to save. |
| Cancel | Click Cancel to exit without saving. |
How do I add a CNAME record?
Table 281 Configuration > System > DNS > CNAME Record > Add
| LABEL | DESCRIPTION |
|---|---|
| Alias name | Enter Alias Name. Use “*.” prefix for wildcard (e.g., *.example.com). |
| FQDN | Type Fully-Qualified Domain Name (FQDN) of canonical server. Use “*.” prefix for wildcard (e.g., *.example.com). Underscores not allowed. |
| OK | Click OK to save. |
| Cancel | Click Cancel to exit without saving. |
How do I add a Domain Zone Forwarder record?
Table 282 Configuration > System > DNS > Domain Zone Forwarder Add
| LABEL | DESCRIPTION |
|---|---|
| Domain Zone | Enter fully qualified domain name without host (e.g., zyxel.com.tw). Enter * if server serves all zones. |
| DNS Server |
• DNS Server(s) from ISP: Select if ISP dynamically assigns DNS. Select interface. Read-only fields show assigned IPs (N/A if no IP assigned). • Public DNS Server: Select if known IP address accessible without VPN. Enter IP (cannot be 0.0.0.0). Select Query via interface. • Private DNS Server: Select if known IP address accessible via VPN tunnel. Enter IP (cannot be 0.0.0.0). |
| OK | Click OK to save. |
| Cancel | Click Cancel to exit without saving. |
How do I add an MX record?
Table 283 Configuration > System > DNS > MX Record Add
| LABEL | DESCRIPTION |
|---|---|
| Domain Name | Enter the domain name where the mail is destined for. |
| IP Address/FQDN | Enter the IP address or Fully-Qualified Domain Name (FQDN) of the mail server handling mail for the domain. |
| OK | Click OK to save. |
| Cancel | Click Cancel to exit without saving. |
How do I edit a DNS Security Option Control policy?
Table 284 Configuration > System > DNS > Security Option Control Edit (Customize)
| LABEL | DESCRIPTION |
|---|---|
| Name | (Customize policy only) Change the name for the policy. |
| Query Recursion | Choose if device allowed/denied to forward DNS client requests for resolution. Can apply to specific servers via Address List for customized rule. |
| Additional Info from Cache | Choose if device allowed/denied to cache Resource Records (RR) from previous DNS queries. |
| Address List | (Customize policy only) Manage address objects for this rule. |
| Available | Displays address objects (from Object > Address). Select object(s) and click > to add to Member list. |
| Member | Displays address objects rule applies to. |
| OK | Click OK to save settings. |
| Cancel | Click Cancel to exit without saving. |
How do I add a DNS Service Control rule?
Table 285 Configuration > System > DNS > Service Control Rule Add
| LABEL | DESCRIPTION |
|---|---|
| Create new Object | Configure new address/zone objects if needed. |
| Address Object | Select ALL to apply to any computer, or select a predefined address object to apply only to computer(s) with that IP. |
| Zone | Select ALL to apply to queries through any zone, or select a predefined zone. |
| Action | Select Accept to allow queries, Deny to reject queries from specified computer/zone. |
| OK | Click OK to save. |
| Cancel | Click Cancel to exit without saving. |
Under what conditions can a service (like HTTP/HTTPS) NOT be used to access the Zyxel Device?
1. The service is disabled in its corresponding screen (e.g., System > WWW).
2. The client IP address does not match the allowed IP address (address object) in the Service Control table for that service.
3. The client IP address (address object) is not in an allowed zone, or the action is set to Deny in the Service Control table.
4. A security policy rule blocks the traffic.
How do I configure WWW (HTTP/HTTPS) Service Control?
Table 286 Configuration > System > WWW > Service Control
| LABEL | DESCRIPTION |
|---|---|
| HTTPS | |
| Enable | Select to allow/disallow access via HTTPS based on rules below. |
| Server Port | HTTPS listening port (default 443). Change requires users to specify port in URL (e.g., https://IP:8443). |
| Authenticate Client Certificates | (Optional) Select to require client browser to present certificate from trusted CA (configured in Trusted Certificates). Client needs CA-signed certificate. If enabled without trusted CA, clients cannot connect. To disable via CLI: `configure terminal`, `no ip http secure-server auth-client`, `write`, `exit`. |
| Server Certificate | Select certificate device uses to authenticate itself to HTTPS client (from My Certificates). |
| Redirect HTTP to HTTPS | Select to redirect all HTTP requests to HTTPS for secure access only. |
| Admin/User Service Control | Tables define allowed zones/IPs for admin/user HTTPS access. Add/Edit/Remove/Move rules. Default rule (-) allows ALL/ALL/accept. |
| # | Rule index number. |
| Zone | Zone allowed/denied access. |
| Address | Address object allowed/denied access. |
| Action | Accept or Deny access. |
| HTTP | |
| Enable | Select to allow/disallow access via HTTP based on rules below. |
| Server Port | HTTP listening port (default 80). Change requires users to specify port in URL. |
| Admin/User Service Control | Tables define allowed zones/IPs for admin/user HTTP access. Add/Edit/Remove/Move rules. Default rule (-) allows ALL/ALL/accept. |
| # | Rule index number. |
| Zone | Zone allowed/denied access. |
| Address | Address object allowed/denied access. |
| Action | Accept or Deny access. |
| Authentication | |
| Client Authentication Method | Select method HTTPS/HTTP server uses to authenticate client (configured in Object > Auth. method). |
| Apply | Click Apply to save changes. |
| Reset | Click Reset to return to last-saved settings. |
How do I add or edit a generic Service Control rule (for WWW, SSH, Telnet, FTP, SNMP)?
Table 287 Configuration > System > Service Control Rule > Edit
| LABEL | DESCRIPTION |
|---|---|
| Create new Object | Configure new address/zone objects if needed. |
| Address Object | Select ALL to apply to any computer, or select predefined address object. |
| Zone | Select ALL to apply to any zone, or select predefined zone. |
| Action | Select Accept to allow access, Deny to block access for specified address/zone. |
| OK | Click OK to save settings. |
| Cancel | Click Cancel to exit without saving. |
What should I do if none of the LEDs turn on?
How can I finish Nebula registration if I did not connect a computer to the Zyxel Device LAN?
1. Connect a USB disk drive in FAT32 format to a USB port on your computer.
2. Go to your mailbox and find the email from Nebula. Save the JSON file in the email attachment to the root folder of the USB drive.
3. Connect the USB drive to the Zyxel Device. The SYS LED will blink. Please wait until the SYS LED is solid green again. The Nebula administrator should now check if the Zyxel Device is online indicating Nebula registration has succeeded.
What should I do if I cannot access the Zyxel Device from the LAN?
• Check the cable connection between the Zyxel Device and your computer or switch.
• Ping the Zyxel Device from a LAN computer. Make sure your computer’s Ethernet card is installed and functioning properly. Also make sure that its IP address is in the same subnet as the Zyxel Device’s.
• In the computer, click Start, (All) Programs, Accessories and then Command Prompt. In the Command Prompt window, type “ping” followed by the Zyxel Device’s LAN IP address (192.168.1.1 is the default) and then press [ENTER]. The Zyxel Device should reply.
• If you’ve forgotten the Zyxel Device’s password, use the RESET button. Press the button in for about 5 seconds (or until the SYS LED starts to blink), then release it. It returns the Zyxel Device to the factory defaults (password is 1234, LAN IP address 192.168.1.1, etc).
• If you’ve forgotten the Zyxel Device’s IP address, you can use the commands through the CONSOLE port to check it. Connect your computer to the CONSOLE port using a console cable. Your computer should have a terminal emulation communications program (such as HyperTerminal) set to VT100 terminal emulation, no parity, 8 data bits, 1 stop bit, no flow control and 115200 bps port speed.
What should I do if I cannot access the Internet?
• Check the Zyxel Device’s connection to the Ethernet jack with Internet access. Make sure the Internet gateway device (such as a DSL modem) is working properly.
• Check the WAN interface’s status in the Dashboard. Use the installation setup wizard again and make sure that you enter the correct settings. Use the same case as provided by your ISP.
Why is the content filter category service not working?
• Make sure your Zyxel Device has the content filter category service registered and that the license is not expired. Purchase a new license if the license is expired.
• Make sure your Zyxel Device is connected to the Internet.
• Make sure you select Enable Content Filter Category Service when you add a filter profile in the Configuration > Security Service > Content Filter > Profile > Add or Edit screen.
• Block QUIC UDP ports 80 and 443. QUIC (Quick UDP Internet Connections) is a UDP protocol used by Google Chrome and Chromium web browsers.
Why aren’t my configured security settings being applied to certain interfaces?
Why isn’t the custom policy route I configured being applied?
Why isn’t the custom security policy I configured being applied?
Why can’t I enter the interface name I want?
• The format of interface names other than the Ethernet interface names is very strict. Each name consists of 2-4 letters (interface type), followed by a number (x, limited by the maximum number of each type of interface). For example, VLAN interfaces are vlan0, vlan1, vlan2,…; and so on.
• The names of virtual interfaces are derived from the interfaces on which they are created. For example, virtual interfaces created on Ethernet interface wan1 are called wan1:1, wan1:2, and so on. Virtual interfaces created on VLAN interface vlan2 are called vlan2:1, vlan2:2, and so on. You cannot specify the number after the colon(:) in the Web Configurator; it is a sequential number. You can specify the number after the colon if you use the CLI to set up a virtual interface.
Why can’t I set up a PPP interface, virtual Ethernet interface or virtual VLAN interface on an Ethernet interface?
Why do my rules and settings that apply to a particular interface no longer work?
Why can’t I set up a PPP interface?
Why are the data rates through my cellular connection much lower than expected?
I created a cellular interface but cannot connect through it. What should I check?
• Make sure you have a compatible mobile broadband device installed or connected. See http://www.zyxel.com for details.
• Make sure you have the cellular interface enabled.
• Make sure the cellular interface has the correct user name, password, and PIN code configured with the correct casing.
• If the Zyxel Device has multiple WAN interfaces, make sure their IP addresses are on different subnets.
What should I do if hackers have accessed my WEP-encrypted wireless LAN?
Why is the wireless security not following the re-authentication timer setting I specified?
Why can’t I configure a particular VLAN interface on top of an Ethernet interface even though I have it configured on top of another Ethernet interface?
Why isn’t the Zyxel Device applying an interface’s configured ingress bandwidth limit?
Why isn’t the Zyxel Device scanning some zipped files?
Why is the Zyxel Device deleting some zipped files?
Why does the Zyxel Device’s performance seem slower after configuring ADP?
Why is my Collaborative Detection & Response (CDR) not working?
Why can’t I block traffic from an AP using CDR?
• The AP is managed by the Zyxel Device.
• The AP must be in the Zyxel Device’s supported list.
Why are quarantined/blocked clients released before I want them to?
Why does the Zyxel Device route and apply SNAT for traffic from some interfaces but not from others?
Why can’t I get Dynamic DNS to work?
• You must have a public WAN IP address to use Dynamic DNS.
• Make sure you recorded your DDNS account’s user name, password, and domain name and have entered them properly in the Zyxel Device.
• You may need to configure the DDNS entry’s IP Address setting to Auto if the interface has a dynamic IP address or there are one or more NAT routers between the Zyxel Device and the DDNS server.
• The Zyxel Device may not determine the proper IP address if there is an HTTP proxy server between the Zyxel Device and the DDNS server.
Why can’t I create a second HTTP redirect rule for an incoming interface?
Why does the Zyxel Device keep resetting the connection?
Why can’t I set up an IPSec VPN tunnel to another device?
• The system log can often help to identify a configuration problem.
• If you enable NAT traversal, the remote IPSec device must also have NAT traversal enabled.
• The Zyxel Device and remote IPSec router must use the same authentication method to establish the IKE SA.
• Both routers must use the same negotiation mode.
• Both routers must use the same encryption algorithm, authentication algorithm, and DH key group.
• When using pre-shared keys, the Zyxel Device and the remote IPSec router must use the same pre shared key.
• The Zyxel Device’s local and peer ID type and content must match the remote IPSec router’s peer and local ID type and content, respectively.
• The Zyxel Device and remote IPSec router must use the same active protocol.
• The Zyxel Device and remote IPSec router must use the same encapsulation.
• The Zyxel Device and remote IPSec router must use the same SPI.
• If the sites are/were previously connected using a leased line or ISDN router, physically disconnect these devices from the network before testing your new VPN connection. The old route may have been learned by RIP and would take priority over the new VPN connection.
• To test whether or not a tunnel is working, ping from a computer at one site to a computer at the other. Before doing so, ensure that both computers have Internet access (via the IPSec routers).
• It is also helpful to have a way to look at the packets that are being sent and received by the Zyxel Device and remote IPSec router (for example, by using a packet sniffer).
Check the configuration for the following Zyxel Device features.• The Zyxel Device does not put IPSec SAs in the routing table. You must create a policy route for each VPN tunnel.
• Make sure the To-Zyxel Device security policies allow IPSec VPN traffic to the Zyxel Device. IKE uses UDP port 500, AH uses IP protocol 51, and ESP uses IP protocol 50.
• The Zyxel Device supports UDP port 500 and UDP port 4500 for NAT traversal. If you enable this, make sure the To-Zyxel Device security policies allow UDP port 4500 too.
• Make sure regular security policies allow traffic between the VPN tunnel and the rest of the network. Regular security policies check packets the Zyxel Device sends before the Zyxel Device encrypts them and check packets the Zyxel Device receives after the Zyxel Device decrypts them. This depends on the zone to which you assign the VPN tunnel and the zone from which and to which traffic may be routed.
• If you set up a VPN tunnel across the Internet, make sure your ISP supports AH or ESP (whichever you are using).
• If you have the Zyxel Device and remote IPSec router use certificates to authenticate each other, You must set up the certificates for the Zyxel Device and remote IPSec router first and make sure they trust each other’s certificates. If the Zyxel Device’s certificate is self-signed, import it into the remote IPSec router. If it is signed by a CA, make sure the remote IPSec router trusts that CA. The Zyxel Device uses one of its Trusted Certificates to authenticate the remote IPSec router’s certificate. The trusted certificate can be the remote IPSec router’s self-signed certificate or that of a trusted CA that signed the remote IPSec router’s certificate.
• Multiple SAs connecting through a secure gateway must have the same negotiation mode.
Why can’t VPN traffic be transmitted through the VPN tunnel even though the VPN connection is up?
Why doesn’t the logo I uploaded for the SSL VPN user screens display properly?
I logged into the SSL VPN but cannot see some of the resource links. Why?
Why can’t I set up a Remote AP VPN tunnel?
• Your AP supports remote AP VPN. Check the AP Role Capability in the Mgnt. AP List screen.
• The Zyxel Device has 5.00 or later firmware and the managed AP has 6.20 or later firmware.
• Your Secure WiFi license is activated and not expired. Purchase a new license if the license is expired.
• You’ve selected the Remote AP check box in Configuration > Wireless > AP Management on the AP you want to set up as a remote AP.
• You’ve configured your AP using a Secure Tunnel SSID profile.
I changed the LAN IP address and can no longer access the Internet. Why?
Why isn’t the bandwidth management being applied properly for policy routes managing TCP and UDP traffic?
Why can’t the RADIUS server authenticate the Zyxel Device‘s default admin account?
Why does the Zyxel Device fail to authenticate the ext-user user accounts I configured?
Why can’t I add admin users to a user group with access users?
Why can’t I add the default admin account to a user group?
Why is my two-factor authentication not working?
• Ext-users (authenticated by external servers) are not supported.
• You must setup Google Authenticator on their mobile device before you can successfully authenticate with the Zyxel Device.
• Click or tap the authorization link in the SMS or email within the valid time. You can extend the time in Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access.
Why can’t I receive the authorization SMS or email for two factor authentication?
• Make sure the mobile telephone number or email address of the user in the Active Directory, RADIUS Server or local Zyxel Device database is configured correctly.
• Email-to-SMS cloud system authentication fails. Make sure that SMS is enabled and credentials are correct in System > Notification > SMS.
• Mail server authentication fails. Make sure the System > Notification > Mail Server settings are correct if you’re using email for authentication.
Why do I get a Google Authenticator verification error?
• Check that you enter the right verification code. The verification code should be 6 digits.
• You must enter the code within the time displayed in Google Authenticator.
• You’ve exceeded the maximum verification code failed attempts.
Why is the schedule I configured not being applied at the configured times?
Why can’t I get a certificate to import into the Zyxel Device?
1. For My Certificates, you can import a certificate that matches a corresponding certification request that was generated by the Zyxel Device. You can also import a certificate in PKCS#12 format, including the certificate’s public and private keys.
2. You must remove any spaces from the certificate’s filename before you can import the certificate.
3. Any certificate that you want to import has to be in one of these file formats:
• Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.
• PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.
• Binary PKCS#7: This is a standard that defines the general syntax for data (including digital signatures) that may be encrypted. A PKCS #7 file is used to transfer a public key certificate. The private key is not included. The Zyxel Device currently allows the importation of a PKS#7 file that contains a single certificate.
• PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses lowercase letters, uppercase letters and numerals to convert a binary PKCS#7 certificate into a printable form.
• Binary PKCS#12: This is a format for transferring public key and private key certificates.The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the Zyxel Device.
Note: Be careful not to convert a binary file to text during the transfer process. It is easy for this to occur since many programs use text files by default.Why can’t I access the Zyxel Device from a computer connected to the Internet?
Why doesn’t the logo I uploaded for the Web Configurator login screen/access page display properly?
Why doesn’t the logo I uploaded for the screen/window background display properly?
Why did the Zyxel Device’s traffic throughput rate decrease after I started collecting traffic statistics?
I can only see newer logs. Older logs are missing. Why?
Why aren’t the commands in my configuration file or shell script working properly?
• In a configuration file or shell script, use “#” or “!” as the first character of a command line to have the Zyxel Device treat the line as a comment.
• Your configuration files or shell scripts can use “exit” or a command line consisting of a single “!” to have the Zyxel Device exit sub command mode.
• Include write commands in your scripts. Otherwise the changes will be lost when the Zyxel Device restarts. You could use multiple write commands in a long script.
Note: “exit” or “!” must follow sub commands if it is to make the Zyxel Device exit sub command mode.Why can’t I get the firmware uploaded using the commands?
Why did my packet capture capture less than I wanted or fail?
Why are my earlier packet capture files missing?
Why is the clients’ information I collected using device insight not correct?
Why can’t I remove a client in Monitor > Device Insight?
Why can’t I block clients using device insight profiles?
Why can’t I set the upload bandwidth limit for IPSec VPN configuration provisioning?
Why can’t I access the Zyxel Device from the WAN after configuring settings in Security Check for Web Interface?
Why can’t I access the Zyxel Device from the SSL VPN port after configuring settings in Security Check for Web Interface?
Why can’t I retrieve VPN rule settings from the Zyxel Device after configuring settings in Security Check for Web Interface?
Why is my Zyxel Device CPU usage too high?
• Go to Configuration > Object > User/Group > Setting and select Limit the number of simultaneous logons for administration account. Set a number in Maximum number per administration account to limit the number of simultaneous logins for each admin.
• Go to Configuration > Web Authentication > Exceptional Services to select services you want users to access without logging in.
Why can’t I see my WAN settings in Mgmt. & Analytics > Nebula?
I’ve passed the Zyxel Device management to Nebula, but I cannot access Nebula. Why?
How do I reset the Zyxel Device?
1. Make sure the SYS LED is on and not blinking.
2. Press the RESET button and hold it until the SYS LED begins to blink. (This usually takes about five seconds.)
3. Release the RESET button, and wait for the Zyxel Device to restart.
You should be able to access the Zyxel Device using the default settings.CLICK HERE TO DOWNLOAD ZYXEL USG FLEX 50 USG20-VPN (01) PDF MANUAL