FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF USER GUIDE

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF USER MANUAL

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF OWNER GUIDE

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF OWNER MANUAL

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF REFERENCE GUIDE

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF INSTRUCTION GUIDE

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF REFERENCE MANUAL

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF INSTRUCTION MANUAL

FREE ENGLISH ZYXEL USG FLEX 50 USG20-VPN (01) PDF OPERATING INSTRUCTIONS


CLICK HERE TO DOWNLOAD ZYXEL USG FLEX 50 USG20-VPN (01) PDF MANUAL

If this is not the document you want for this product, click here to see if we have any other documents for this product.

What are the default login details for the ZyWALL USG FLEX 50(AX) Series?

The default login details are as follows:
SettingValue
Login IP Addresshttps://(IP assigned by NCC) or https://myrouter.local or https://192.168.1.1
User Nameadmin
Password1234

Where can I find related documentation for the Zyxel Device?

Related documentation includes:

• Quick Start Guide: Shows how to connect the Zyxel Device and access the Web Configurator wizards. It also contains a connection diagram and package contents list.

• CLI Reference Guide: Explains how to use the Command-Line Interface (CLI) to configure the Zyxel Device. (Note: It is recommended you use the Web Configurator).

• Web Configurator Online Help: Click the help icon in any screen for help on configuring that screen and supplementary information.

• More Information: Go to support.zyxel.com to find other information on Zyxel Device.


What are the document conventions used in the User’s Guide?

Warnings and Notes:

Warnings tell you about things that could harm you or your device.

Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.

Syntax Conventions:

• All models in this series may be referred to as the “Zyxel Device” in this guide.

• Product labels, screen names, field labels and field choices are all in bold font.

• A right angle bracket (>) within a screen name denotes a mouse click. For example, Configuration > Network > Interface > Ethernet means you first click Configuration in the navigation panel, then Network, then the Interface sub menu and finally the Ethernet tab to get to that screen.

Icons Used in Figures:

Figures may use generic icons. The Zyxel Device icon is not an exact representation of your device. Common icons represent: Zyxel Device, Generic Router, Wireless Router / Access Point, Switch, Firewall, Server, Internet, Network Cloud, Smartphone, USB Dongle.


What are the feature differences between the USG FLEX 50 Series models?

The following table compares features across the USG FLEX 50 (USG20-VPN), USG20W-VPN, and USG FLEX 50AX models:
FEATURE/MODELUSG FLEX 50 (USG20-VPN)USG20W-VPNUSG FLEX 50AX
Microsoft AzureYESYESYES
Amazon VPCCLI onlyCLI onlyCLI only
Anomaly Detection & PreventionYESYESYES
Anti-SpamYESYESYES
IPS (IDP)NONONO
Anti-MalwareNONONO
App PatrolNONONO
Web Security (Content Filtering)YESYESYES
SecuReporterYESYESYES
Reputation Filter (IP & DNS)NONONO
URL Threat FilterNONONO
SandboxingNONONO
IP ExceptionNONONO
AP ControllerNONONO
Device HA ProNONONO
Easy ModeYESYESNO
Hotspot ManagementNONONO
Concurrent Device UpgradeNONONO
LAGNONONO
Port GroupNONONO
Port RoleYESYESYES
SD-WAN ModeNONONO
SSL ApplicationYESYESYES
SSL encrypted traffic inspectionYESYESYES
Bundled UTM Feature License Validity1 year1 year1 year
WiFi functionality (built-in)NOYESYES
Virtual Server Load BalancingNONONO
Built-in APNOYESYES
Management by Nebula Control Center (NCC)YESYESYES
Note: Not all models support all features. USG FLEX 50AX does not support anti-spam.

Which security features work without a security license?

The following security features work without a security license:

• Configuration > Content Filter > Trusted Web Sites

• Configuration > Anti-Spam/Email Security > Block/Allow List


What is On Premises Mode?

When you log into the Web Configurator for the first time or reset the device, the Initial Setup Wizard appears. Choose On Premises Mode to manage your Zyxel Device directly using either the browser-based Web Configurator or the Command Line Interface (CLI). Follow the wizard to configure network settings. Note that after completing device registration at portal.myzyxel.com in this mode, you cannot change to Nebula Mode without resetting the Zyxel Device.

What is Monitor Mode?

Select Monitor Mode in Configuration > Mgmt. & Analytics > Nebula > Monitor Mode to monitor your Zyxel Device using Nebula Control Center (NCC) while still configuring settings locally on the web configurator. You must have an organization and a site created on NCC first. Note: Monitor Mode cannot be used if Device HA is enabled.

What is Nebula Mode?

When you log into the Web Configurator for the first time or reset the device, the Initial Setup Wizard appears. Choose Nebula Mode to manage your Zyxel Device remotely using Nebula Control Center (NCC). Select this mode if you want to configure and monitor one or more Zyxel Devices through the cloud. Follow the wizard to configure WAN settings to connect to NCC. Note that once you complete the WAN configuration step, you cannot change to On Premises Mode without resetting the Zyxel Device.

How do I set up Nebula Mode management via the NCC Portal?

You need a myZyxel.com account first. Follow these steps at the NCC portal:

1. Log into NCC (https://nebula.zyxel.com) with your Zyxel account. If you don’t have one, you’ll be prompted to create one.

2. After logging in, click Go under Nebula Control Center, then Let’s Start to run the NCC setup wizard. Create or select an existing organization and site.

3. Add the Zyxel Device to the site by entering its MAC address and serial number (found on the device label) or by scanning the QR code with the Nebula Mobile app.

4. Configure the WAN interface the Zyxel Device will use to connect to NCC via the Internet.

5. If possible, select Native Mode. If not available, configure the email address of the person who will manage the device via NCC. An activation email will be sent to this person.


How do I prepare my Zyxel Device for Nebula Mode management?

The person managing the device via NCC should follow these steps:

1. Connect the WAN port (P1 or P2) of the Zyxel Device to an Ethernet port providing Internet access.

2. Connect a LAN port (P3 or P4) of the Zyxel Device to your computer. Ensure your computer obtains an IP address automatically (default setting).

3. Connect the power and turn on the Zyxel Device. Wait for the SYS LED to turn solid green.

4. (Optional but recommended) Back up your current configuration via Maintenance > File Manager > Configuration File > startup-config.conf > Download.

5. If you could not select Native Mode in the NCC Portal setup: Reset the Zyxel Device to factory defaults by pressing the Reset button until port LEDs turn off (approx. 5 seconds). This erases all previous configurations. Skip this if the device was never configured before. A reset is necessary if it doesn’t have the factory default configuration.


What should I do if I receive a Nebula Activation Email?

If you couldn’t select Native Mode during NCC setup and received an activation email after the Zyxel Device is powered on:

1. Check your mailbox (including spam folder) for an email from NCC.

2. Follow the instructions in the email. Click the activation link or copy it to your web browser. You will see a screen indicating NCC registration is in progress.

3. Wait for the confirmation screen stating NCC registration has succeeded. Management is now passed to Nebula Control Center.

Note: ZTP (Zero Touch Provisioning) via email activation is supported in firmware version 5.37 or earlier.

How do I change from Nebula Mode to On Premises Mode?

Follow these steps to manage the device directly via the web configurator or CLI:

1. Log into NCC (https://nebula.zyxel.com) with your Zyxel account.

2. Go to Organization-wide > License & Inventory > Devices.

3. Select the Zyxel Device you want to remove from NCC (identify by MAC address and serial number).

4. Click Remove from organization.

5. If the Zyxel Device is connected to NCC, it will automatically reset after removal. If not connected, press the reset button manually to reboot to factory defaults. All NCC configurations will be erased.

6. Log into the Zyxel Device’s web configurator. Run the Initial Setup Wizard and choose On Premises Mode.

7. (Optional) To restore a previous configuration backup: Go to Maintenance > File Manager > Configuration File. Under Upload Configuration File, browse to your saved startup-config.conf file and click Upload.


How do I change from On Premises Mode to Nebula Mode?

1. (Optional but recommended) Back up your current configuration in Maintenance > File Manager > Configuration File.

2. Reset the Zyxel Device to factory defaults by pushing the Reset button until the port connection LEDs turn off (about 5 seconds). The device will reboot.

3. Log into the Zyxel Device’s web configurator. Run the Initial Setup Wizard and choose Nebula Mode.

4. If prompted to choose between Native Mode or ZTP, select Native Mode.

5. Follow the steps in the Nebula Mode setup wizard (adding the device to NCC, etc.).


Why and how should I register my Zyxel Device?

Registration is done at portal.myZyxel.com, Zyxel’s online services center. You need to register your device to manage subscription services (viewable in Configuration > Licensing > Registration > Service).

• Devices with firmware 4.25 or later require registration and service activation via myZyxel.com (can be done through the device interface).

• Devices upgrading to 4.25 or later can potentially skip registration/activation, but it’s highly recommended to register. Registration provides benefits like the Firmware Upgrade license (for Cloud Helper notifications), which is often free upon registration.

You’ll need a Zyxel account (create one at portal.myZyxel.com) and may need the device’s serial number and LAN MAC address (found on the label).


What are some common application scenarios for the Zyxel Device?

Security Router: Provides security features including a Stateful Packet Inspection (SPI) firewall.

IPv6 Routing: Supports IPv6 Ethernet, PPP, VLAN, and bridge routing. Can create IPv6 policy routes/objects and route IPv6 packets through IPv4 networks using tunneling.

VPN Connectivity: Set up secure VPN tunnels (site-to-site, remote access for telecommuters/travelers) to access your network. Can use an external Authentication Server (AS).

SSL VPN Network Access: Allows remote users easy VPN access via web browsers. Full tunnel mode provides a private IP address on the local subnet for seamless resource access.

User-Authentication Access Control: Restrict access to resources based on user identity. Different users can have different access levels (e.g., Internet only, Internet + file server).

Load Balancing: Set up multiple Internet connections (on the same or different ports, including cellular) and balance traffic loads between them.


How can I manage the Zyxel Device?

You can manage the Zyxel Device using:

Web Configurator: An HTML-based interface for easy setup and management via an Internet browser (HTML5 compatible like Edge, IE11, Firefox, Chrome recommended).

Command-Line Interface (CLI): Use text-based commands for configuration. Access via remote management (SSH, Telnet) or the physical/Web Console port.

FTP: Use File Transfer Protocol for firmware upgrades and configuration backup/restore.

SNMP: Monitor and/or manage the device using an SNMP manager.

CloudCNM: Enable and configure management via a Central Network Management system (details in Configuration > Mgmt. & Analytics > Nebula).

Nebula Control Center (NCC): Manage the device remotely via the cloud portal (requires Nebula Mode).


What are the default Console Port settings?

The default settings for the console port are:
SETTINGVALUE
Speed115200 bps
Data Bits8
ParityNone
Stop Bit1
Flow ControlOff

What methods are available for management authentication?

Managers must authenticate using a username and password via one of these methods:

• Local Zyxel Device authentication

• An external RADIUS server

• An external LDAP server

• Certificates


What are the requirements for using the Web Configurator?

To use the Web Configurator, you need:

• A compatible browser (HTML5 support, e.g., Microsoft Edge, Internet Explorer 11, Mozilla Firefox, Google Chrome).

• Web browser pop-up windows allowed from your device.

• JavaScript enabled (default).

• Java permissions enabled (default).

• Recommended minimum screen resolution: 1024 x 768 pixels.


How do I access the Web Configurator?

1. Ensure hardware is properly connected (see Quick Start Guide).

2. Open your browser and go to https://192.168.1.1 or https://myrouter.local. The device defaults to HTTPS.

3. The Login screen appears.


How do I log in for the first time and handle password requirements?

1. On the Login screen, enter the default User Name (“admin”) and Password (“1234”).

2. Optionally, select a different display language from the drop-down list.

3. Click Login.

4. You will be immediately prompted by the Update Admin Info screen to change the default password. Enter a new password (1 to 64 characters) and confirm it.

5. Note the Password Complexity option (Configuration > Object > User/Group > Setting): If enabled, the password must be 8-64 characters and include at least one number, one lowercase letter, one uppercase letter, and one special character (e.g., !@#$%^&*()_+). You can also enforce periodic password changes here.

6. Click Apply after entering the new password.

7. A Terms of Use screen appears. Read it and click Acknowledge. (Note: May download automatically in Internet Explorer).


What are the Password Change Notification and Network Risk Warning screens?

Password Change Notification: This screen appears after the Terms of Use (step 7 above). It lists privileged accounts and their last password change/expiry dates. It reminds you to change passwords regularly for better security. You can select how often to see this reminder (e.g., “every time”) and click OK.

Network Risk Warning: This screen appears next. It highlights any unregistered or disabled security services. If the device isn’t registered, it prompts you to do so. Select how often to display this screen and click OK.


How can I bring back the Network Risk Warning screen if I selected ‘Never’?

You can use the following CLI commands:
Router> enable
Router# configure terminal
Router(config)# service-register_setremind every-time
Router(config)#
Replace `every-time` with other options like `after-10-days`, `after-30-days`, `after-180-days`, or `never` as needed. Note the space before the underscore in the command.

What settings can I configure in the ‘Security Check for Web Interface’ screen?

This screen appears if the device detects a rule allowing broad access (e.g., HTTP/HTTPS/SSL from any WAN source), posing a security risk. You can configure settings to secure access:

• Secure SSL access from the Internet to the Zyxel Device.

• Secure SSL access from the Internet to the network behind the Zyxel Device.

• The default port for IPSec VPN clients to retrieve VPN rules.

• The default port for two-factor authentication for VPN clients.


How can I secure remote management access (HTTPS) to the Zyxel Device from the Internet?

You can configure secure SSL (HTTPS) access for up to 3 trusted computers/locations from the Internet.

• The default HTTPS port is 443. If you change this port (e.g., to 8800), remote connections must use the new port (e.g., https://[Device_IP]:8800).

• Use the ‘Security Check for Web Interface’ screen or relevant configuration sections to specify the trusted source IP addresses or FQDNs allowed for remote management.

• Configure a new port between 1024 and 65535 that is not used by other services.


How can I secure SSL VPN access from the Internet to the network behind the Zyxel Device?

• The default SSL VPN port is 443. If you change this port on the Zyxel Device, you must make the same change in the SecuExtender SSL VPN client software.

• Configure a new port between 1024 and 65535 that is not used by other services.

• You can restrict SSL VPN access to up to 3 specific locations (IP addresses, FQDNs, or geographic regions) from the Internet using the ‘Security Check for Web Interface’ screen or relevant configuration sections.

The following table shows example country abbreviations:
ABBREVIATIONCOUNTRY
JPJapan
KRKorea
FRFrance

How do I change the port used for IPSec VPN Provisioning?

You can change the default port (443) that IPSec VPN clients use to retrieve VPN rule settings from the Zyxel Device. Since 443 is often used for remote management and SSL VPN, changing this can avoid conflicts.

• Configure a new port between 1024 and 65535 that is not in use by other services.

• If you change the port on the Zyxel Device, you must configure the Zyxel IPSec VPN client to use the same new port.

Note: If default ports (443) are unchanged for remote management, SSL VPN, and IPSec VPN provisioning, only 3 simultaneous connections across these services might be allowed.

How do I change the port used for Two-Factor VPN Access Authentication?

You can change the default port used by VPN clients for two-factor authentication when accessing the network behind the Zyxel Device.

• VPN clients do not need to manually change the port number on their end; the authentication link provided (via email/SMS) will automatically include the new port number (e.g., https://[Device_Link]:8008 if changed to 8008).

• Configure a new port between 1024 and 65535 that is not in use by other services.

• This port can also be changed in Object > Auth. Method > Two-factor Authentication > VPN Access.


What is an example configuration for remote access ports to avoid conflict?

Here is an example to avoid using the default port 443 for multiple services:
SERVICEEXAMPLE PORT
REMOTE MANAGEMENT8800
SSL VPN8080
IPSEC VPN PROVISIONING443 (default)
TWO-FACTOR VPN ACCESS AUTHENTICATION8008

What other security measures should I take?

• Regularly check for and update firmware via Maintenance > Firmware Management.

• Change admin passwords regularly.

• Enable Password Complexity (Object > User/Group > Setting) to enforce strong passwords (at least 8 characters, including upper case, lower case, number, and special character).


What do the fields in the ‘Security Check for Web Interface’ screen mean?

This table describes the fields on the Security Check screen:
LABELDESCRIPTION
Allow secure remote management from WANSelect this to allow remote access to the Zyxel Device web configurator only from specified IP addresses or FQDNs.
Port (under Remote Management)Configure a new port (1024-65535, not already in use) for remote HTTPS access. Example: Use https://1.1.1.1:8800 if changed to 8800.
Trusted Host 1-3 (under Remote Management)Configure the specific IP addresses or FQDNs allowed for remote management access.
Allow SSL VPN access from WANSelect this to allow SSL VPN client access to the Zyxel Device only from specified regions or hosts.
Port (under SSL VPN)Configure a new port (1024-65535, not already in use) for SSL VPN access. This port must match the one configured in the SecuExtender client.
Trusted Geolocation 1-3 (under SSL VPN)Select the geographic regions (countries) allowed for SSL VPN access from the drop-down list.
Change Two-Factor Authentication PortSelect this to change the port used for two-factor authentication for VPN clients accessing the LAN.
Port (under Two-Factor Authentication)Configure a new port (1024-65535, not already in use).
Change Zyxel IPSec VPN Client Provisioning PortSelect this to change the port IPSec VPN clients use to retrieve VPN rule settings.
Port (under IPSec VPN Provisioning)Configure a new port (1024-65535, not already in use). Must match the port used in the Zyxel IPSec VPN client.
Please remind meSelect how often to display this Security Check screen from the drop-down list box (e.g., every time, never).
OKClick OK to save your changes.
CancelClick Cancel to exit without saving changes.

What security measures are available for remote access to the Zyxel Device networks?

The Zyxel Device offers several measures to secure external access to your internal networks:

Two-Factor Authentication: Adds a second layer of security for VPN access. After username/password (first layer), users must authenticate via an authorized SMS or email address (second layer).

Device Insight: Identify and view basic info/status of clients connected to the Zyxel Device networks (Monitor > Network Status > Device Insight). Create profiles (Configuration > Object > Device Insight) to block specific clients from accessing the Internet or the Zyxel Device.

IPSec VPN: Create highly secure VPN connections using IKEv2 or EAP authentication for remote workers to access company resources.

Upload Bandwidth Limit: (Requires Zyxel SecuExtender subscription and specific client versions) Set maximum upload bandwidth limits for traffic from IPSec VPN clients over their tunnels.


What are the main parts of the Web Configurator screen?

The Web Configurator screen is divided into:

• A – Title bar

• B – Navigation panel

• C – Main window


What do the icons in the Web Configurator Title Bar do?

ICON/LABELDESCRIPTION
SecuReporterIndicates SecuReporter is enabled and the device is added to an organization. Click to open the SecuReporter portal.
Web ConsoleClick to open one or multiple console windows for running CLI commands (requires login). Uses HTTPS for secure connection.
CLIClick to open a popup showing the CLI commands sent by the Web Configurator for recent actions.
ReferenceClick to check which configuration items reference a specific object.
Site MapClick to see an overview map of links to all Web Configurator screens.
CommunityGo to https://community.zyxel.com for product discussions.
HelpClick to open the online help page for the currently displayed screen.
Notification(Admin/Limited Admin only) Displays new firmware info or expiring security services. Click items for details, click Refresh icon to update. Shows up to 5; click “All Notifications” for more. Slide switch to Off to disable.
AboutClick to display basic device information (firmware version, etc.).
Easy ModeClick to go to the Initial Setup Wizard in Easy Mode. Enters Easy Mode on subsequent logins.
LogoutClick to log out of the Web Configurator.

What information is shown in the ‘About’ screen?

The About screen displays:
LABELDESCRIPTION
Current VersionThe firmware version of the Zyxel Device.
Released DateThe date (yyyy-mm-dd) and time (hh:mm:ss) when the firmware was released.
System Protection SignatureThe version of the system protection signatures. These signatures (updated daily via Cloud Helper Server, no license needed) protect against web attacks like command injection, cross-site scripting, and path traversal.
OKClick this to close the screen.

What is the Site Map used for?

Click the Site Map icon in the title bar to see an overview of links to all the Web Configurator screens. You can click a screen’s link within the map to navigate directly to that screen.

What is the Web Console used for?

Click the Web Console icon in the title bar to open one or multiple console windows. From these windows, you can run Command Line Interface (CLI) commands to configure the device. You will be prompted for your username and password. The connection uses HTTPS.

What is the Reference screen used for?

Click the Reference icon in the title bar to open the References screen. Here, you can select an object type (e.g., Address Object, Service Object) and a specific object name. After clicking Refresh, the screen shows a list of all configuration settings (like firewall rules, VPN settings, etc.) that currently use or ‘refer to’ the selected object. This helps understand where an object is being used before modifying or deleting it.

What do the fields in the Reference screen mean?

The fields vary, but common ones include:
LABELDESCRIPTION
TypeSelect the type of object (e.g., User, Address, Service) you want to check references for.
Name (Object)Select the specific object name for which you want to see configuration references. Clicking the name navigates to that object’s configuration screen.
#Sequential row number.
ServiceThe type of configuration setting (e.g., Security Policy, VPN Gateway) that references the selected object. Clicking the name navigates to that service’s configuration screen.
PriorityIf applicable (like in ordered lists), shows the position of the referencing item. Otherwise, N/A.
Name (Referencing Item)The specific name of the configuration item (e.g., a specific firewall rule name) that references the object.
DescriptionThe description of the referencing configuration item, if configured.
RefreshClick to update the list of references for the selected object.
CancelClick to close the References screen.

What is the CLI Messages window?

Click the CLI icon in the title bar to open the CLI Messages pop-up window. This window displays the corresponding CLI commands that the Web Configurator sends to the device’s backend when you perform actions in the graphical interface (like clicking menus, applying settings, etc.). It helps visualize the underlying commands being executed.

What are the Navigation Panel and Dashboard?

Navigation Panel: Located on the left side of the Web Configurator, this panel contains menu items (like Monitor, Configuration, Maintenance) that expand to show links to various status and configuration screens. You can click the arrow on its right edge to hide/show the panel or drag to resize it.

Dashboard: The main screen displayed after login (if not intercepted by wizards or warnings). It shows widgets with general device information, system status, resource usage, licensed service status, and interface status. You can rearrange these widgets to suit your needs.


What information is available in the Monitor menu?

The Monitor menu provides status and statistics:
FOLDER OR LINKTABFUNCTION
Traffic Statistics
Port StatisticsPort StatisticsDisplays packet statistics for each physical port.
Interface StatusInterface SummaryDisplays general interface information and packet statistics.
Traffic StatisticsTraffic StatisticsCollect and display traffic statistics.
Session MonitorSession MonitorDisplays the status of all current sessions.
Network Status
DHCP TableDHCP TableDisplays a list of interfaces and their DHCP-assigned IP addresses.
Device InsightDevice InsightDisplays a list of WiFi and wireless clients connected to the Zyxel Device networks.
Login UsersLogin UsersLists the users currently logged into the Zyxel Device.
IGMP StatisticsIGMP StatisticsCollect and display IGMP statistics.
DDNS StatusDDNS StatusDisplays the status of the Zyxel Device’s DDNS domain names.
IP/MAC BindingIP/MAC BindingLists devices that received an IP address from interfaces using IP/MAC binding.
Cellular StatusCellular StatusDisplays details about the mobile broadband connection status.
UPnP Port StatusPort StatisticsDisplays details about UPnP connections going through the Zyxel Device.
USB StorageStorage InformationDisplays details about USB device connected to the Zyxel Device.
Ethernet NeighborEthernet NeighborView/manage neighboring devices via Smart Connect (LLDP) or Zyxel One Network (ZDP).
FQDN ObjectFQDN ObjectDisplays FQDN object cache lists used in DNS queries.
Wireless
AP InformationRadio ListLists wireless details of APs managed by the Zyxel Device.
SSID InfoSSID InfoDisplay information about the AP’s wireless clients.
Station InfoStation ListLists wireless clients associated with APs managed by the Zyxel Device.
Top N StationsLists wireless stations with the most wireless traffic usage.
Single StationLists wireless traffic usage for an associated wireless station.
VPN Monitor
IPSecIPSecDisplays and manages the active IPSec SAs.
SSLSSLLists users currently logged into the VPN SSL client portal; allows logout/deletion.
L2TP over IPSecL2TP over IPSecDisplays details about current L2TP sessions.
Security Statistics
Content FilterWeb Content FilterCollect and display web content filter statistics.
DNS Content FilterCollect and display DNS content filter statistics.
Anti-SpamSummaryCollect and display spam statistics.
StatusDisplays mail session check count and DNSBL statistics.
Log
LogView LogLists log entries.

What can I configure in the Configuration menu?

The Configuration menu allows setup of Zyxel Device features:
FOLDER OR LINKTABFUNCTION
Quick SetupQuickly configure WAN interfaces or VPN connections.
Licensing
RegistrationRegistrationRegister the device and activate trial services.
ServiceView licensed service status and upgrade licenses.
Wireless
Built-in APGeneralAllow WiFi clients wireless access via the built-in AP.
Network
InterfacePort / Port Role/Port Group/ Port ConfigurationSet flexible port roles (LAN, OPT, WLAN, DMZ). Manage Ethernet, virtual Ethernet, PPPoE, PPTP, Cellular, Tunneling (IPv4/IPv6), VLAN, Bridge, VTI, and Trunk interfaces.
RoutingPolicy Route / Static Route / RIP / OSPF / BGPCreate/manage routing policies, static routes, and dynamic routing protocols (RIP, OSPF, BGP over IPSec).
DDNSDDNSDefine and manage the device’s DDNS domain names.
NATNATSet up and manage port forwarding (NAT) rules.
Redirect ServiceRedirect ServiceSet up HTTP and SMTP redirection rules.
ALGALGConfigure SIP, H.323, and FTP Application Layer Gateway pass-through settings.
UPnPUPnPConfigure interfaces for UPnP and NAT-PMP connections.
IP/MAC BindingSummary / Exempt ListConfigure IP-to-MAC address bindings and exemption lists.
Layer 2 IsolationGeneral / Allow ListEnable Layer-2 isolation and configure allow lists.
DNS Inbound LBDNS Load BalancingConfigure DNS Load Balancing for inbound traffic.
VPN
IPSec VPNVPN Connection / VPN Gateway / Concentrator / Configuration ProvisioningConfigure IPSec tunnels, IKE gateways, VPN concentrator, and client provisioning.
SSL VPNAccess Privilege / Global SettingConfigure SSL VPN access rights and global settings.
L2TP VPNL2TP VPNConfigure L2TP over IPSec tunnels.
BWM (Bandwidth Management)
BWMBWMEnable and configure bandwidth management rules.
Web Authentication
Web AuthenticationGeneral/Authentication Type/Custom Web Portal File/Custom User Agreement FileDefine web authentication portals and exempt services.
SSOConfigure the device for Single Sign On integration.
Security Policy
Policy ControlPolicyCreate and manage firewall rules (Level-3 traffic rules) and apply Security Service profiles.
ADPGeneral / Profile / Allow ListManage Anomaly Detection and Prevention (ADP) bindings, profiles, and allow lists.
Session ControlSession ControlLimit the number of concurrent NAT/security policy sessions.
Security Service
Content FilterWeb Content Filter / DNS Content Filter (General, Trusted/Forbidden/Allow/Block Lists)Manage web and DNS content filtering profiles, rules, and custom lists.
Anti-SpamProfile / Mail Scan / Block/Allow List / DNSBLManage anti-spam profiles, scanning details, block/allow lists, and DNS Block Lists.
Object
Device InsightDevice InsightConfigure profiles to block clients identified by Device Insight.
ZoneZoneConfigure zone templates.
User/GroupUser / Group / Setting / MAC AddressCreate/manage users, groups, default settings, authentication rules, and MAC authentication lists.
Address/Geo IPAddress / Address Group / Geo IPCreate/manage address objects (host, range, subnet), address groups, and Geo IP definitions/updates.
ServiceService / Service GroupCreate/manage TCP/UDP service objects and service groups.
ScheduleSchedule / Schedule GroupCreate/manage one-time/recurring schedule objects and schedule groups.
AAA ServerActive Directory / LDAP / RADIUSConfigure AAA server settings for AD, LDAP, and RADIUS.
Auth. MethodAuthentication Method / Two-factor AuthenticationCreate/manage authentication methods/sequences and configure two-factor authentication (SMS/email).
CertificateMy Certificates / Trusted CertificatesCreate/manage the device’s own certificates and import/manage trusted CA certificates.
ISP AccountISP AccountCreate/manage ISP account information for PPPoE/PPTP interfaces.
Mgmt. & Analytics
SecuManagerEnable/configure management by a Central Network Management system (SecuManager/CloudCNM).
SecuReporterEnable SecuReporter logging and access the analytics portal.
NebulaConfigure Nebula cloud management (Nebula Mode / Monitor Mode).
System
Host NameHost NameConfigure the system hostname and domain name.
USB StorageSettingsConfigure settings for connected USB devices.
Date/TimeDate/TimeConfigure date, time, time zone, and NTP settings.
Console SpeedConsole SpeedSet the console port speed.
DNSDNSConfigure DNS server settings and local DNS records.
WWWService Control / Login PageConfigure web server (HTTP/HTTPS) settings, access control, and login page customization.
SSHSSHConfigure SSH server and service settings.
TELNETTELNETConfigure Telnet server settings.
FTPFTPConfigure FTP server settings.
SNMPSNMPConfigure SNMP communities and services.
Auth. ServerAuth. ServerConfigure the device to act as a RADIUS server.
NotificationMail Server / SMS / Response MessageConfigure email server, SMS service for notifications, and custom response messages for security actions.
LanguageLanguageSelect the Web Configurator display language.
IPv6IPv6Enable/configure IPv6 settings globally.
ZONZONView/manage neighbors via Zyxel One Network (ZDP) utility.
AdvancedFast ForwardingEnable fast forwarding to maximize network performance.

What functions are available in the Maintenance menu?

The Maintenance menu provides system management tools:
FOLDER OR LINKTABFUNCTION
File ManagerConfiguration FileManage and upload configuration files.
Firmware ManagementView current firmware, upload new firmware, reboot with selected firmware.
Shell ScriptManage and run shell script files.
DiagnosticsDiagnostics (Controller / Filer)Collect diagnostic information.
Packet Capture (Capture / Files)Capture network packets for analysis and manage capture files.
CPU/Memory StatusView CPU and memory usage statistics.
System LogArchive system logs to a connected USB device.
Network ToolIdentify connection problems using Ping or Traceroute.
Routing TracesConfigure traceroute to identify packet drop locations.
Wireless Frame CaptureCapture wireless frames from APs for analysis.
Packet Flow ExploreRouting StatusCheck how the device determines packet routes.
SNAT StatusView how the device performs Source NAT and related settings.
Shutdown/ RebootShutdown/ RebootTurn off (shutdown) or restart (reboot) the Zyxel Device.

How can I work with tables and lists in the Web Configurator?

Sorting: Click a column heading to sort the table entries based on that column’s criteria. Click again to reverse the sort order.

Filtering/Grouping/Columns: Click the down arrow next to a column heading for more options:

• Sort Ascending/Descending.

• Columns: Select which columns to display or hide.

• Group By This Field: Group entries that have the same value in this column.

• Show in Groups: Toggle the display of grouped entries.

• Filters: Apply filters based on mathematical operators (<, >, =) or text search for that column.

Resizing Columns: Click and drag the right border of a column heading cell to resize the column width.

Moving Columns: Click and drag a column heading cell to a different position. A green check mark indicates a valid drop location.

Navigating Pages: Use the icons (|< < > >|) and page number fields at the bottom of the table to navigate through multiple pages of entries. Use the “Show [number] items” dropdown to change how many entries display per page.

Selecting Multiple Entries: You can often use [Shift]+click or [Ctrl]+click to select multiple entries for actions like removing, activating, or deactivating.


What do the common icons in tables mean?

ICON/LABELDESCRIPTION
+ AddClick to create a new entry. In ordered lists (like security policies), selecting an entry first and then clicking Add creates the new entry after the selected one.
EditDouble-click an entry or select it and click Edit to modify its settings. Some tables allow direct inline editing (indicated by red triangles for unsaved changes).
RemoveSelect an entry and click Remove to delete it (confirmation is usually required).
ActivateSelect an entry and click Activate to turn it on or enable it.
InactivateSelect an entry and click Inactivate to turn it off or disable it.
ConnectSelect an entry and click Connect to establish a connection (e.g., VPN tunnel).
DisconnectSelect an entry and click Disconnect to terminate a connection.
ReferencesSelect an entry and click References to check which other settings use this entry/object.
Move(For numbered/ordered lists) Select an entry, click Move, then type the desired new position number and press [ENTER].

How do I use Available/Selected lists?

When you see two lists side-by-side labeled “Available” and “Selected” (or similar):

• Double-click an item in either list to move it to the other list.

• Select one or more items (using [Shift] or [Ctrl] keys for multiple selections) in one list.

• Click the arrow button pointing towards the other list to move the selected item(s).


What is the Initial Setup Wizard?

The Initial Setup Wizard appears when you log into the Web Configurator for the first time or after resetting the device to defaults. It guides you through selecting a management mode (On Premises or Nebula), configuring Internet connection settings, and activating subscription services. You can click Logout to exit, Next to continue, or Finish at the end. Click the double arrow for help.

What settings are configured in the On Premises Initial Setup Wizard?

After selecting On Premises Mode, the wizard guides you through these steps:

1. Welcome Screen (Overview)

2. Connect to Internet (WAN): Configure primary (and optionally secondary) WAN interface settings (Encapsulation, IP assignment, etc.).

3. Date and Time Settings: Synchronize time.

4. Register Device: Register the device with myZyxel.com.

5. Activate Service: Activate licensed security services.

6. Service Settings: Enable/configure specific services like Content Filter, Anti-Spam, SecuReporter.

7. Wireless Settings (if applicable): Configure built-in AP settings (SSID, security).

8. Remote Management: Configure secure remote access settings.


How do I configure the WAN interface in the Initial Setup Wizard?

The screens vary based on encapsulation type. Enter information provided by your ISP.

I have two ISPs: (First WAN interface screen only) Select to configure two connections; leave unchecked for one.

VLAN Tagged: Select to enable 802.1Q tagging. Enter the VLAN ID (1-4080).

Encapsulation: Choose Ethernet (standard), PPPoE, PPTP, or L2TP based on ISP info.

MTU: Maximum Transmission Unit (bytes, 576-1500, usually 1500).

WAN Interface: Shows the interface being configured (e.g., wan1, wan2).

Zone: Security zone for this interface (usually WAN).

IP Address Assignment: Select Auto (for DHCP) or Static (if ISP provided a fixed IP).

DHCP Option 60: (If Auto IP is selected) Enter a Vendor Class Identifier string (up to 63 chars: a-zA-Z0-9!\”#$%&\'()*+,-./:;<=>?@\[\\\]^_`{}) if required by the ISP’s DHCP server.

If Static IP Address Assignment selected:

IP Address: Enter the static IP address from your ISP.

IP Subnet Mask: Enter the subnet mask from your ISP.

Gateway IP Address: Enter the default gateway IP address from your ISP.

First / Second DNS Server: Enter primary and secondary DNS server IP addresses. Leave as 0.0.0.0 if not configuring DNS here.

Specific Encapsulation Settings:

PPPoE: Service Name (optional, alphanumeric+- _@$./, up to 64 chars), Authentication Type (Chap/PAP, Chap, PAP, MSCHAP, MSCHAP-V2), User Name (alphanumeric+- _@$./, up to 31 chars), Password (up to 64 ASCII, no []?), Nailed-Up (keep connection active) or Idle Timeout (seconds).

PPTP: Authentication Type (as PPPoE), User Name, Password, Nailed-Up/Idle Timeout. Requires: Base Interface (Ethernet port), Base IP Address (static), IP Subnet Mask, Gateway IP Address, Server IP (PPTP server), Connection ID (optional, “c:id” or “n:name” format, alphanumeric+-_:, up to 31 chars).

L2TP: Authentication Type (as PPPoE), User Name, Password, Nailed-Up/Idle Timeout. Requires: Base Interface, Base IP Address, IP Subnet Mask, Gateway IP Address, Server IP (L2TP server).


How do I troubleshoot WAN connection errors during setup?

General checks:

• Ensure the cable is connected to the correct WAN port on the Zyxel Device and to the modem/Internet source.

• Verify the modem/Internet source device is powered on and connected. The WAN port LED on the Zyxel Device should be lit (typically orange or green).

Specific errors:

Ethernet (DHCP): If no IP obtained, confirm ISP uses DHCP. Check settings with ISP.

Ethernet (Static): If IP address fails, double-check the IP, subnet mask, and gateway address provided by ISP. Re-enter exactly. Check with ISP if errors persist.

PPPoE: Check Service Name (if used) and Authentication Type are correct. Re-enter username/password exactly. Confirm WAN settings and credentials with ISP.

PPTP: Check Service IP, Base IP, Subnet Mask, Gateway IP, Connection ID (if used), and Authentication Type. Re-enter username/password exactly. Confirm WAN settings and credentials with ISP.

L2TP: Check Server IP, Subnet Mask, Gateway IP, Base IP, and Authentication Type. Re-enter username/password exactly. Confirm WAN settings and credentials with ISP.

Static IP Assignment (General): If static IP fails, re-enter IP, subnet mask, gateway, and DNS server info exactly as provided by ISP. Check with ISP if errors persist.

After making corrections, click Back to re-enter settings or use the Connection Test button on the summary screen.


What happens after configuring the WAN interface(s) in the wizard?

A summary screen (“Congratulations”) displays the configured settings for the WAN interface(s). Click the “Connection Test” button to verify Internet connectivity. If the test fails, click Back to review and correct the settings. If successful, click Next to proceed to the next step (Date and Time Settings).

How are Date and Time settings configured in the wizard?

The Zyxel Device attempts to automatically detect your time zone and update the date and time using external time servers (NTP). This is important for accurate logs and scheduling. The screen shows the current detected date, time, and time zone. If the device cannot connect to a time server (e.g., due to failed Internet connection setup), the time might be incorrect. Ensure Internet access is working, then click “Sync. Now” to manually force an update. Click Next to continue.

How do I register the device in the Initial Setup Wizard?

The Register Device screen shows the current registration status (“Not registered” or “Registered”). Registration at myZyxel.com is required for firmware update notifications and activating licensed services. Ensure the device has Internet connectivity. Click the “Register” button. This will typically redirect you to the myZyxel login page. Log in with your Zyxel account (or create one) and follow the prompts to register the device using its serial number and MAC address. After successful registration, return to the wizard screen. Click “Refresh” to update the status to “Registered”. You can “Skip” registration, but it’s highly recommended. Click Next to continue (Note: you cannot switch to Nebula Mode later if you proceed past registration in On Premises mode without resetting).

How do I activate services in the Initial Setup Wizard?

After registration, the Activate Service screen appears, listing the available subscription security services for your model and their status (e.g., Activated, Not activated). Click “Refresh” to ensure the status is up-to-date after registration. If a service is not activated, you may need to manage licenses via myZyxel.com. Available services can include Web Filtering (CF), Anti-Spam, SecuReporter, Network Premium. Click Next to proceed.

How do I configure initial Service Settings in the wizard?

The Service Settings screen allows you to enable or disable key security features initially. Options typically include:

Content Filter: Enable/Disable (Recommended: Enable)

Anti-Spam: Enable/Disable (Recommended: Enable) (Note: USG FLEX 50AX does not support anti-spam)

SecuReporter: Enable/Disable. If enabling SecuReporter for the first time, you may need to accept the Terms of Use/GDPR policy via a checkbox.

Click Next to continue.

How are SecuReporter settings configured in the wizard?

If SecuReporter is enabled, a configuration screen appears:

Server Status: Shows connection status (Connected, Timeout, Fail).

Device Name: Enter a name for this device within SecuReporter.

Organization:

• If you have existing organizations: Select “Select from existing organization” and choose the organization from the dropdown.

• If creating a new one: Select “Create new organization”, enter a name (up to 255 chars) and optionally a description.

Data Protection Policy: Choose the level of data anonymization for logs sent to SecuReporter:

Partially Anonymous: Replaces personal data (usernames, MACs, emails, hostnames) with artificial identifiers in downloaded logs. Data can be removed.

Fully Anonymous: Replaces personal data with anonymized info in Analyzer, Reports, and logs. Data cannot be traced back.

Non-Anonymous: Personal data is clearly identifiable. Data cannot be removed.

If the device is already added to an organization, the screen will simply display the Server Status, Device Name, and Organization.

Click Next to continue.

How are Wireless Settings configured in the wizard (for models with built-in AP)?

For models with a built-in AP (e.g., USG20W-VPN, USG FLEX 50AX):

1. Management Mode Screen: Choose “Built-in AP” to use the device’s wireless capabilities or “AP Controller” to manage external Zyxel APs (cannot do both). Click Next.

2. AP Controller Screen (if AP Controller selected): Choose Yes to enable the AP Controller feature, No otherwise. Click Next.

3. SSID & Security Screen (if Built-in AP selected):

SSID: Enter a wireless network name (up to 32 printable characters).

Security Mode: Select “Pre-Shared Key” for password protection or “None” for an open network.

Pre-Shared Key: (If Security Mode is Pre-Shared Key) Enter a password (8-63 case-sensitive ASCII characters or 64 hex characters).

Hidden SSID: Check this box to prevent the SSID from being broadcast.

Enable Intra-BSS Traffic Blocking: Check this to prevent wireless clients on this SSID from communicating directly with each other (they can still access the wired network).

Bridged to: (Specific models like ‘W’ versions) Select a wired interface (e.g., lan1) to bridge the wireless network to. Wireless clients will be part of the same broadcast domain as the selected wired interface.

Click Next to continue.

How is Remote Management configured in the Initial Setup Wizard?

The Remote Management screen helps secure access from the Internet. It adds a high-priority rule in Policy Control.

Allow secure remote management from WAN: Check to enable remote HTTPS access.

Port: Set the HTTPS port (default 443, range 1-65535). Change recommended.

Restrict access only to trusted host: Check to limit access.

Trusted Host 1-3: Enter allowed source IP addresses or FQDNs (optional).

Allow SSL VPN access from WAN: Check to enable remote SSL VPN access.

Port: Set the SSL VPN port (default 443, range 1-65535). Change recommended.

Restrict access by GeoIP: Check to limit access by country.

Trusted Geolocation 1-3: Select allowed countries (optional).

Click Finish to complete the On Premises setup wizard.

What settings are configured in the Nebula Mode Initial Setup Wizard?

After selecting Nebula Mode, the wizard focuses on establishing the connection to Nebula Control Center (NCC):

1. Connect to Internet (WAN): Configure the primary (and optionally secondary) WAN interface that the device will use to reach NCC. Settings are similar to the On Premises wizard (Encapsulation, IP assignment, VLAN, MTU etc.).

2. Add Device / Go to Nebula: After WAN configuration, a screen appears with instructions and a QR code to add the device to your Nebula organization/site using either the Nebula web portal or the Nebula mobile app.


How do I add the device to Nebula using the wizard’s final screen?

The final screen in the Nebula Mode wizard provides instructions for adding the device:

Using Nebula Portal:

1. Log into the Nebula portal (http://nebula.zyxel.com) with your myZyxel account.

2. Follow the portal’s wizard/instructions to create/select an organization and site.

3. Enter the device’s MAC address and serial number (S/N) found on the label when prompted.

4. Click “Go To Nebula” (or similar prompt in the portal) to finish.

Using Nebula App:

1. Download the Nebula app (App Store/Google Play).

2. Run the app and select/create a site.

3. Scan the QR code displayed in the wizard screen using the app to register the device with its MAC/Serial Number.

Click “Finish” in the Zyxel Device’s wizard screen after successfully adding the device via either method.

If you cannot access Nebula after this step, log into the device locally using the support account and use the Local GUI/Web Configurator for troubleshooting the WAN connection.


What do the Front Panel LEDs indicate?

LEDCOLORSTATUSDESCRIPTION
PWRGreenOnThe Zyxel Device is turned on.
RedOnHardware component failure. Shut down, wait, restart. Contact vendor if red again.
OffThe Zyxel Device is turned off.
SYSGreenOnThe Zyxel Device is ready and running.
BlinkingThe Zyxel Device is booting.
RedOnThe Zyxel Device has an error or has failed.
OffThe Zyxel Device is not ready or has failed.
USBGreenOnSupported mobile broadband card or USB storage device connected.
OffNo device connected or connected device not supported.
OrangeOnConnected to a mobile broadband network via USB card.
P1, P2… (Ethernet Ports)GreenOnSuccessful 10/100 Mbps link.
BlinkingSending/receiving packets at 10/100 Mbps.
OffNo traffic on this port (at 10/100 Mbps).
P1, P2… (Ethernet Ports)YellowOnSuccessful 1000 Mbps (Gigabit) link.
BlinkingSending/receiving packets at 1000 Mbps.
OffNo connection on this port (at 1000 Mbps).
WLAN (Models with WiFi)(Color varies)On/BlinkingIndicates wireless activity/status.

What are the functions of the Front Panel Ports?

LABELDESCRIPTION
RESETPress and hold for ~5 seconds (until SYS LED blinks) then release to reset to factory defaults (Password: 1234, LAN IP: 192.168.1.1, etc.).
CONSOLERJ-45 port for CLI management using a console cable and terminal software (115200 bps, 8N1, No Flow Control).
USBPort for connecting a USB storage device (for logs/storage) or a supported mobile broadband card.
P1 ~ P6 (or P5)1G RJ-45 Ethernet ports. Default mapping varies by model (see Default Port Mapping table). Can be configured for WAN, LAN, DMZ, OPT roles.
SFP (Specific Models)Slot for an SFP transceiver, typically used as an alternative WAN or LAN port.

What are the items on the Rear Panel?

LABELDESCRIPTION
ConsoleRJ-45 port for CLI management (see settings above).
PowerSocket for connecting the included power cord/adapter. May include an On/Off switch.
LockKensington lock slot (small, metal-reinforced oval hole) for securing the device with a lock-and-cable.
FanVentilation fans for cooling. Ensure these are not obstructed.
Ethernet Ports (P1-P6/P5)1G RJ-45 Ethernet ports, functions depend on configuration (WAN/LAN/DMZ/OPT).
SFP (Specific Models)SFP port slot.
Antenna Connectors (Wireless Models)Connectors for attaching WiFi antennas.
Note: Use an 8-wire Ethernet cable for 1000 Mbps (Gigabit) connections. A 4-wire cable limits speed to 100 Mbps. Connection speed also depends on the connected device.

What are the Console Port pinouts and signal names?

The pinouts for an RJ-45 to DB-9 console cable are:
CONSOLE PORT / RJ-45 PINSIGNALDB-9 PIN
1DTR6
2DSR4
3RxD3
4CTS7
5GND5
6TxD2
7RTS8
8NC1, 9
Signal Names:
SIGNALSIGNAL NAME
RxDReceive Data
TxDTransmit Data
DTRData Terminal Ready
GNDGround
DSRData Set Ready
RTSRequest to Send
CTSClear to Send
RIRing Indicator
NCNot Connected

How should I install the Zyxel Device?

The device can be placed on a desk or wall-mounted. WARNING! Do NOT block ventilation holes. Allow 100 mm clearance around ventilation holes for cooling. Do not store things on the device or place it on other high-temperature devices, as overheating can affect performance or cause damage.

How do I prepare the device for desk-mounting?

1. Ensure the device surface is clean and dry.

2. Remove the adhesive backing from the included rubber feet.

3. Attach one rubber foot to each corner on the bottom of the Zyxel Device to prevent shock/vibration and allow air circulation.


How do I wall-mount the Zyxel Device?

1. Determine the correct distance “X” between mounting holes for your model:

MODEL NAMEDISTANCE “X”
USG FLEX 50 (USG20-VPN)174 mm (6.85″)
USG FLEX 50W (USG20W-VPN)174 mm (6.85″)

2. Drill two holes in the wall, distance “X” apart. Holes should be 3-4 mm (0.12″-0.16″) wide and 20-30 mm (0.79″-1.18″) deep. Insert the included screw anchors into the holes.

3. Screw the included screws (with 6-8 mm / 0.24″-0.31″ wide heads) into the anchors. Do NOT screw them all the way in. Leave a gap of 1-1.5 mm (0.04″-0.06″) between the screw head and the wall. Ensure screws are securely fixed and can hold the device’s weight.

4. Align the mounting holes on the bottom of the Zyxel Device with the screws in the wall and slide the device down to hang it on the screws. The gap allows cables to run behind the device.

Important: Wall-mount the Zyxel Device horizontally. Do NOT mount it with the side panels (containing ventilation slots) facing up or down, as this position is less safe.

What are the default port-to-interface mappings?

Default mappings at the time of writing:
PORT / INTERFACEP1P2P3P4P5P6P7P8
USG FLEX 50 (USG20-VPN)sfpwanlan1lan1lan1lan1
USG FLEX 50AXwanlan1lan1lan1opt
USG20W-VPNsfpwanlan1lan1lan1lan1
Note: An OPT (optional) port can typically be configured as WAN, LAN, WLAN, or DMZ. ‘lan1’ indicates the port belongs to the default LAN1 interface group.

What are the default interface-to-zone mappings?

Default mappings at the time of writing:
ZONE / INTERFACEWANLAN1LAN2DMZOPTNO DEFAULT ZONE
USG FLEX 50 (USG20-VPN) / USG FLEX 50AX / USG20W-VPNWAN, WAN_PPPLAN1LAN2DMZOPT, OPT_PPP
Note: Interface names like WAN_PPP or OPT_PPP appear when PPP-type connections (PPPoE, PPTP, L2TP) are configured on the base WAN or OPT interface.

How should I stop or shut down the Zyxel Device?

Always use the software shutdown command before turning off the power switch or unplugging the device. This prevents potential firmware corruption. Use either:

• Web Configurator: Maintenance > Shutdown > Shutdown

• CLI command: `shutdown`

Wait for the device to complete the shutdown process before removing power.

What is Easy Mode and how does it differ from Expert Mode?

Easy Mode: Designed for simpler network environments (typically one WAN, one LAN). It provides wizards for common tasks (Initial Setup, VPN, Port Forwarding, Wi-Fi/Guest, Security Service), links to portals (MyZyxel, One Security), and basic dashboard views. Configuration changes made here automatically create corresponding objects and rules prefixed with “EZ_” in Expert Mode.

Expert Mode: Provides access to the full set of advanced configuration menus and features.

Switching: You can switch between modes. When logged in, Easy Mode shows an “Expert Mode” button/link, and Expert Mode shows an “Easy Mode” button/link. When switching to Expert Mode for the first time after login, a confirmation prompt appears asking which mode should be the default starting mode for future logins.

Note: Changes made in Expert Mode might not display correctly back in Easy Mode. Some models do not support Easy Mode (check Section 1.1).

Guest Network Note: Enabling the guest network in Easy Mode renames the OPT port (or the highest-numbered copper Ethernet port, P6 by default) to “guest” and creates a corresponding guest interface (visible in Expert Mode’s Configuration > Network > Interface > Port Role).


Can I edit or delete objects/rules created by Easy Mode (“EZ_” prefix)?

You generally interact with Easy Mode settings via the Easy Mode interface. If you switch to Expert Mode, you can see the “EZ_” objects and rules created by Easy Mode.

Editing/Deleting rules in Expert Mode:

OBJECT/RULE TYPE (Examples)SCREEN (Expert Mode)EDIT in Expert ModeDELETE in Expert Mode
guest interfaceConfiguration > Network > Interface > EthernetX (Not Allowed)X (Not Allowed)
Content Filtering ProfileConfiguration > UTM ProfileV (Allowed)V (Allowed)
IDP Profile(Relevant UTM Profile screen)VV
Anti-Virus Profile(Relevant UTM Profile screen)VV
Static DHCP BindingConfiguration > Network > IP/MAC BindingXV
Address ObjectConfiguration > Object > AddressXV
IPSec VPN ConnectionConfiguration > VPN > IPSec VPNXV
IPSec VPN GatewayConfiguration > VPN > IPSec VPNXV
AP groupConfiguration > WirelessXV
Radio ProfileConfiguration > WirelessXV
NAT RuleConfiguration > Network > NATXV
Security policyConfiguration > Security PolicyXV
Zone ObjectConfiguration > Object > ZoneXV
AP profileConfiguration > WirelessXV
Security Profile (UTM)(Relevant UTM Profile screen)XV
SSID ProfileConfiguration > WirelessXV
Address/Geo IP ObjectConfiguration > Object > Address/Geo IPXV
Service ObjectConfiguration > Object > ServiceXV

Important:

• Editing EZ_ rules directly in Expert Mode might cause unexpected behavior in Easy Mode.

• You cannot delete EZ_ objects or rules if they are currently used by a policy. You must first delete the corresponding policy/configuration in Easy Mode or remove the reference in Expert Mode.

• If you delete an EZ_ object/rule in Expert Mode, the corresponding configuration in Easy Mode may stop working.

• It is generally recommended to manage Easy Mode configurations through the Easy Mode interface.


What wizards and links are available in Easy Mode?

Easy Mode provides:

Wizards:

• Initial Setup Wizard: For first-time Internet access setup.

• VPN Wizard: For site-to-site or remote client VPN tunnels.

• Port Forwarding Wizard: To set up access to internal servers (like NAS).

• Wi-Fi and Guest Wizard: To configure wireless network name/security for normal and guest access.

• Security Service Wizard: To configure subscriptions like content filtering, IDP, anti-virus.

Links:

• MyZyxel Portal: To subscribe to security services.

• One Security Portal: For configuration walkthroughs and help on security/VPN.

• Expert Mode: To access the full advanced configuration menus.


What options are in the Easy Mode Settings menu?

Click the Settings icon in Easy Mode to access these options:

Create Recovery Point: Saves the current device configuration as a restore point. Use this when the configuration is known to be working correctly.

Restore Last Recovery Point: Reverts the device configuration back to the most recently created recovery point. Use this if recent changes caused problems. All changes made after the recovery point was created will be lost.

Restart: Reboots the Zyxel Device. Useful after firmware upgrades or for troubleshooting. Web configurator changes are saved automatically; CLI changes require the ‘write’ command before rebooting to persist.

Shutdown: Safely prepares the device to be powered off. Writes cached data, stops processes. Does not physically turn off power. Wait for completion before removing power.


What is the Cloud Helper icon in Easy Mode?

The Cloud Helper icon (labeled “Check new F/W”) is used to check for new firmware updates available at myZyxel.com.

• If new firmware is available, the icon displays a red “N”.

• Clicking the icon (with or without the red “N”) checks for updates.

• If an update is found, a “What’s New” pop-up appears showing release notes.

• To upgrade directly from this pop-up, you need a Firmware Upgrade license associated with the device. If licensed, the “Upgrade Now” button is active. Click it to download and install the firmware (the device will reboot automatically).

• If unlicensed, “Upgrade Now” is grayed out.

• If the device is not registered with myZyxel, a message indicating this will appear.


What information does the Easy Mode Dashboard display?

The Easy Mode Dashboard provides a summary view with widgets including:

System Information: Firmware Version, System Uptime, Current Date/Time.

Internet Status: Connection Type, WAN IP, Gateway, DNS. Includes a “Test Connection” button.

VPN Status: Indicates if VPN rules are configured. Links to VPN Wizard if none exist.

Security Status: Shows Firewall status (Enable/Disable) and Content Filter status (Enable/Disable, Licensed/Not Licensed). Links to Security Service Wizard.

Network Client (LAN): Shows which ports are assigned to LAN1. Displays the number of connected clients.

Network Client (Guest): Shows the guest network status (often N/A initially). Displays number of connected clients and guest Wi-Fi status.

Wi-Fi / AP Status: Indicates if APs are configured. Links to Wi-Fi and Guest Wizard if none exist.

Guest Wi-Fi / AP Status: Indicates if Guest APs are configured. Links to Wi-Fi and Guest Wizard if none exist.


What information is available on the Easy Mode dashboard?

The Easy Mode dashboard contains the following:

• System information, such as firmware version, the length of time the Zyxel Device has been on, date and time.

• Internet information such as Internet connection type, WAN IP address and a button to test the connection.

• VPN tunnel information and a button to monitor and create VPN tunnels.

• Security information such as if the firewall is enabled and if supported security services are licensed. You will be prompted to create a secure policy when a service is licensed and you turn it on in order for the service to be used.

• Network Client information.


How do I add a new network client in Easy Mode?

Under the Network Client section on the Easy Mode dashboard:

1. Click the settings icon to manage clients.

2. Click + to add a new network client.

3. In the pop-up screen (Add a Client Device), enter the client’s interface (LAN1 or Guest), IP Address, MAC Address and Name.

4. Click OK.


What information is displayed under the Network Client section in Easy Mode?

• LAN information on wired and wireless connections to the Zyxel Device

• Guest Network information on guest wired and wireless connections to the Zyxel Device

• Wi-Fi button to change Wi-Fi channel

• Guest button turn the guest wireless network off or on.


What are the basic steps in the Initial Setup Wizard?

The Initial Setup Wizard guides you through these basic setup steps:

1. Connect to Internet (WAN)

2. Date and Time Setting

3. Register Device

4. Activate Service

5. Wireless LAN


What optional features can be configured in the Initial Setup Wizard?

After the basic setup, the wizard offers the option to configure these features:

• Security Service (Content Filter)

• Port Forwarding

• Guest LAN (Wired Network)

• VPN

You can choose to configure these later using separate links in the Easy Mode main screen.

How do I choose the language for Easy Mode and Expert Mode?

The first screen of the Initial Setup Wizard allows you to choose your language from a drop-down menu. This language setting applies to both Easy Mode and Expert Mode screens.

How does the Initial Setup Wizard connect to the Internet?

In Step 1: Connect to the Internet, the Zyxel Device will try to detect internet connectivity automatically. Ensure your WAN (P1) port is connected and the WAN1 LED is lit. If automatic detection fails or the connection type is incorrect, you can configure it manually by selecting the Connection Type (DHCP, Ethernet Fixed IP, or PPPoE) and entering the required details provided by your ISP. You can use the Connection Test button to verify the settings.

When should I choose DHCP in the Initial Setup Wizard Internet settings?

Choose DHCP if you were not given a specific IP address for the Zyxel Device by your ISP. This allows the Zyxel Device to obtain an IP address automatically from the ISP.

When should I choose Ethernet Fixed IP in the Initial Setup Wizard Internet settings?

Choose Ethernet Fixed IP if you were given a specific IP address, subnet mask, and gateway address for the Zyxel Device by your ISP. You will need to enter this information manually.

When should I choose PPPoE in the Initial Setup Wizard Internet settings?

Choose PPPoE if your ISP provided you with a PPPoE user name and password for your Internet connection. You will need to enter these credentials manually.

What should I do if I see a “WAN 1 Down” error?

Check that the cable connecting the WAN1 interface on the Zyxel Device to your Internet access device (like a broadband router or modem) is securely plugged in at both ends. Ensure the Internet access device is turned on. The WAN1 LED on the Zyxel Device should ideally be orange (indicating link/activity).

What should I do if I encounter a PPPoE error during setup?

This error indicates the Zyxel Device couldn’t obtain an IP address using PPPoE.

1. Verify that your Internet access information uses PPPoE as the WAN connection type.

2. Re-enter your PPPoE user name and password exactly as provided by your ISP.

3. If the error persists, contact your ISP to confirm the correct WAN settings and user credentials.


What should I do if I encounter a DHCP error during setup?

This error means the Zyxel Device could not obtain an IP address using DHCP.

1. Confirm that your Internet access information uses DHCP as the WAN connection type.

2. If it fails again, check with your ISP to ensure DHCP is expected and verify the correct WAN settings.


What should I do if I encounter an Ethernet Fixed IP error during setup?

This error suggests the Zyxel Device couldn’t use the static IP address information you entered.

1. Double-check that you were given a specific IP address, subnet mask, and gateway address by your ISP.

2. Re-enter the IP address, subnet mask, and gateway address exactly as provided.

3. If the problem continues, contact your ISP to verify the correct IP address, subnet mask, gateway address, and any other necessary WAN settings.


Why is it important to have the correct date and time on the Zyxel Device?

Accurate date and time settings are crucial for effective scheduling and logging. Correct timestamps in logs are essential for troubleshooting and security analysis.

How does the Zyxel Device set its date and time?

By default, the Zyxel Device attempts to automatically get the current date and time from an external time server (NTP server) periodically. It detects your time zone and whether Daylight Saving Time is in effect. This requires a working Internet connection.

What should I do if the Zyxel Device cannot get the correct date and time?

If the device cannot automatically get the date and time, it might be unable to connect to a time server.

1. Ensure the Zyxel Device has a working Internet connection.

2. In the ‘Date and Time Settings’ step of the wizard, click the ‘Sync. Now’ button to manually trigger synchronization with the time server.


Why do I need to register my Zyxel Device?

Registering your device (required for firmware version 4.25 or later) is a prerequisite for:

• Receiving notifications about new firmware availability.

• Activating security service licenses (like Content Filter, IDP, Anti-Virus).


How do I register my Zyxel Device in the Initial Setup Wizard?

In Step 3: Register Device, if the status shows “Not registered”, click the “Register” button. This will typically direct you to the myZyxel portal (portal.myzyxel.com) to complete the registration process. You will need an active internet connection. If the device is already registered, the status will show “Registered”.

What happens if my Zyxel Device is not registered?

If your device is not registered, you may see a “Registration Warning” prompt. Registering is required for activating security services and receiving notifications about new firmware. You can choose to be reminded later or click “Register Now”.

How do I register my device if prompted during setup?

Click the “Register Now” button in the “Registration Warning” prompt. This will direct you to register your device at portal.myzyxel.com. You need to create a myZyxel account first if you don’t have one. Ensure the Zyxel Device is connected to the Internet.

What information is needed when registering the Zyxel Device at myZyxel?

When registering at portal.myzyxel.com, you might be prompted for the Zyxel Device’s serial number and LAN MAC address. This information can usually be found on a label at the back of the Zyxel Device.

What is Step 4 of the Initial Setup Wizard?

Step 4 is “Activate Services”. This step allows you to activate security service licenses that you have purchased and registered for your device through myZyxel.

How do I activate services after registering my Zyxel Device?

After registering your device and any associated service licenses on myZyxel, proceed to Step 4: Activate Services in the Initial Setup Wizard. The screen will show the license status for supported services (e.g., Content Filter). If a service shows “Not Licensed”, you may need to purchase or register a license. If it shows “Licensed”, it’s activated. Click the “Refresh” button to update the status from myZyxel.

What are examples of security services I can activate?

Examples of services include:

• Content Filter (to block websites by category, such as Gambling)

• IDP (Intrusion Detection & Protection, to recognize and drop traffic with attack patterns)

• Anti-Virus (to detect virus patterns in files)

• Anti-Spam (to mark or discard unsolicited commercial or junk e-mail)

Availability depends on your device model and purchased licenses.

What should I do if the service license status doesn’t update after clicking Refresh?

1. Wait a few moments for the information to update.

2. Ensure the Zyxel Device has a working Internet connection. Try accessing the Internet from a computer connected to a LAN port on the Zyxel Device.

3. If the Internet connection is working, click “Refresh” again.

4. If you still cannot connect, check your Internet access settings on the Zyxel Device.


How do I set up the main Wi-Fi network in the Initial Setup Wizard?

In Step 5: Wi-Fi Network Setup:

1. Select the “Enable Wi-Fi Network” checkbox.

2. Configure a descriptive name (SSID) for the wireless network under “Wi-Fi”. Use 1 to 32 alphanumeric characters, hyphens, or underscores (a-z A-Z 0-9 -_).

3. Set a strong “Password” (see requirements).

Note: You must change the default password to continue.


What are the password requirements for the Wi-Fi network?

The Wi-Fi password must be between 8 and 63 printable ASCII characters (including spaces and symbols) or exactly 64 hexadecimal characters (0-9, a-f). You must change the default password to proceed in the wizard.

How do I set up the Guest Wi-Fi network in the Initial Setup Wizard?

In Step 5: Wi-Fi Network Setup:

1. Select the “Enable Guest Wi-Fi Network” checkbox.

2. Configure a descriptive name (SSID) for the guest wireless network under “Guest Wi-Fi”. Use 1 to 32 alphanumeric characters, hyphens, or underscores (a-z A-Z 0-9 -_).

3. Set a strong “Password” (same requirements as the main Wi-Fi password).

Note: The Guest Wi-Fi Network allows Internet access only for a limited time (default 4 hours).


What is the default access duration for the Guest Wi-Fi network?

By default, the Guest Wi-Fi Network allows Internet access for up to 4 hours. After this time elapses, users need to log in again. You can change this default duration later in the “Wi-Fi and Guest Wizard”.

What Wi-Fi security standard does the Zyxel Device use?

The Zyxel Device uses WPA2-PSK with AES encryption. Wireless clients must support AES encryption to connect using WPA2-PSK.

What happens after the basic setup in the Initial Setup Wizard is complete?

After successfully configuring Internet access (and optionally Wi-Fi), the wizard displays a “Congratulations!” screen. From here, you can choose to finish the wizard or continue to configure optional features like Security Service, Port Forwarding, Guest LAN, and VPN.

What optional features can I configure immediately after the basic setup?

The wizard allows you to immediately proceed with configuring:

• Security Service (Content Filter, IDP, Anti Virus)

• Port Forwarding

• Guest LAN (Wired Network)

• VPN

Select the desired services on the “Congratulations!” screen and click “Continue” (the button changes from “Finish” if options are selected). Alternatively, clear all selections and click “Finish” to configure them later.

What is the purpose of Security Service (Content Filter, IDP, Anti Virus) configuration?

This allows you to configure subscription-based security services like Content Filtering (blocking website categories), Intrusion Detection/Prevention (blocking known attack patterns), and Anti-Virus (scanning files for viruses).

What is the purpose of Port Forwarding configuration?

Port Forwarding allows you to set up rules so that people outside your network can access a specific server (like a web server or NAS) located inside your network.

What is the purpose of Guest LAN (Wired Network) configuration?

This sets up a guest network using a wired connection to the OPT port (or P6, depending on model). Users connected to this port can only access the Internet for a limited time and are isolated from your main network resources.

What is the purpose of VPN configuration?

VPN (Virtual Private Network) configuration allows you to set up secure, encrypted tunnels for various purposes:

• Site-to-site: Connecting two Zyxel Device networks securely.

• Remote client (Zyxel client): Allowing remote users with Zyxel VPN software to connect securely to your network.

• Remote client (Other): Allowing remote users with other standard VPN software (like L2TP) to connect securely.


What does the “Create a restore point” option do?

Selecting this option on the “Congratulations!” screen creates a backup (restore point) of the Zyxel Device’s configuration settings as they are upon completion of the wizard steps. This allows you to revert to this configuration later if you encounter problems.

How do I configure basic Content Filter settings in the Initial Setup Wizard?

If you choose to configure Security Service after the basic setup, the wizard presents the Content Filter screen.

1. Ensure the service is licensed (not grayed out). Activate it at myZyxel if necessary and click Refresh.

2. Select the “Enable Content Filter with the following contents blocked” checkbox.

3. Select the checkboxes for the website categories you wish to block.

4. Click Next.

Note: Blocking “Chat” blocks chat websites, not necessarily chat applications like Skype.

What types of websites does the ‘Chat’ category block?

Sites that enable web-based exchange of real time messages through chat services or chat rooms. For example, me.sohu.com, blufiles.storage.live.com. (Note: This blocks chat websites, not necessarily chat applications like Skype.)

What types of websites does the ‘Dating & Personals’ category block?

Sites that promote networking for interpersonal relationships such as dating and marriage. Includes sites for match-making, online dating, spousal introduction. For example, http://www.i-part.com.tw, http://www.imatchi.com.

What types of websites does the ‘Gambling’ category block?

Sites that offer or are related to online gambling, lottery, casinos and betting agencies involving chance. For example, http://www.taiwanlottery.com.tw, http://www.i-win.com.tw, http://www.hkjc.com.

What types of websites does the ‘Games’ category block?

Sites relating to computer or other games, information about game producers, or how to obtain cheat codes. Game-related publication sites. For example, http://www.gamer.com.tw, http://www.wowtaiwan.com.tw, tw.lineage.gamania.com.

What types of websites does the ‘Hacking’ category block?

Sites that promote or give advice about how to gain unauthorized access to proprietary computer systems, for the purpose of stealing information, perpetrating fraud, creating viruses, or committing other illegal activity related to theft of digital information. For example, http://www.hackbase.com, http://www.chinahacker.com.

What types of websites does the ‘Illegal Software’ category block?

Sites that illegally distribute software or copyrighted materials such as movies or music, software cracks, illicit serial numbers, illegal license key generators. For example, http://www.zhaokey.com.cn, http://www.tiansha.net.

What types of websites does the ‘Instant Messaging’ category block?

Sites that enable logging in to instant messaging services such as ICQ, AOL Instant Messenger, IRC, MSN, Jabber, Yahoo Messenger, and the like. For example, http://www.meebo.com, http://www.aim.com, www. ebuddy.com.

What types of websites does the ‘Job Search’ category block?

Sites containing job listings, career information, assistance with job searches (such as resume writing, interviewing tips, etc.), employment agencies or head hunters. For example, http://www.104.com.tw, http://www.1111.com.tw, http://www.yes123.com.tw.

What types of websites does the ‘Pornography/Sexually Explicit’ category block?

Sites that contain explicit sexual content. Includes adult products such as sex toys, CD-ROMs, and videos, adult services such as videoconferencing, escort services, and strip clubs, erotic stories and textual descriptions of sexual acts. For example, http://www.dvd888.com, http://www.18center.com, blog.sina.com.tw.

What types of websites does the ‘Social Networking’ category block?

Sites that enable social networking for online communities of various topics, for friendship, dating, or professional reasons. For example, http://www.facebook.com, http://www.flickr.com, http://www.groups.google.com.

What types of websites does the ‘Streaming Media & Downloads’ category block?

Sites that deliver streaming content, such as Internet radio, Internet TV or MP3 and live or archived media download sites. Includes fan sites, or official sites run by musicians, bands, or record labels. For example, http://www.youtube.com, pfp.sina.com.cn, my.xunlei.com.

What types of websites does the ‘Tasteless’ category block?

Sites with offensive or tasteless content such as bathroom humor or profanity. For example, comedycentral.com, dilbert.com.

What types of websites does the ‘Violence’ category block?

Sites that contain images or text depicting or advocating physical assault against humans, animals, or institutions. Sites of a particularly gruesome nature such as shocking depictions of blood or wounds, or cruel animal treatment. For example, crimescene.com, deathnet.com, michiganmilitia.com.

How can I enable IDP (Intrusion Detection & Protection) during the Initial Setup Wizard?

In the Security Service configuration part of the wizard (after Content Filter), you can select “Enable IDP”. This option will only be available if the IDP service is licensed and activated. IDP helps drop traffic associated with recognized intrusion and attack patterns. Use the main Security Service Wizard for more detailed settings later if needed.

How can I enable Anti-Virus during the Initial Setup Wizard?

In the Security Service configuration part of the wizard (after Content Filter), you can select “Enable Anti-Virus”. This option requires the Anti-Virus service to be licensed and activated. Anti-Virus detects known virus patterns in files passing through the device. Use the main Security Service Wizard for more detailed settings later if needed.

What is NAT port forwarding?

NAT port forwarding allows the Zyxel Device to direct incoming traffic from the Internet to a specific virtual server (like a NAS or web server) within your local network. It makes internal services accessible from outside your network.

How do I set up port forwarding in the Initial Setup Wizard?

If you choose to configure Port Forwarding after the basic setup:

1. From the ‘Client’ drop-down list, select the internal device (e.g., NAS server) that will receive the forwarded traffic. (Click ‘Add here’ if the client is not listed).

2. From the ‘Service List’ (Available box), select the service(s) or port(s) that the internal device provides (e.g., FTP, HTTP, HTTPS).

3. Use the right arrow button to move the selected service(s) to the ‘Member’ box.

4. Click Next.


Why does a device acting as a server for port forwarding need a static IP address?

If the internal device (server) uses a dynamic IP address (obtained via DHCP), its IP address might change when it reboots. If the IP address changes, the port forwarding rule configured on the Zyxel Device will no longer point to the correct device, and external access will fail. A static IP ensures the forwarding rule always targets the right server.

What if the service I need is not in the Port Forwarding list?

If the required service (port or port range) is not predefined in the ‘Available’ list, you will need to define it later using the main Port Forwarding Wizard accessible from the Easy Mode screen.

How do I set up a wired Guest LAN in the Initial Setup Wizard?

If you choose to configure Guest LAN after the basic setup:

1. Select the “Enable Guest Network (for wired clients)” checkbox.

2. Click Next.

This action converts the OPT port (or P6, depending on model) into a guest interface.

What happens when I enable the Guest Network (for wired clients)?

Enabling this option changes the function of the OPT (or P6) port from a standard LAN/DMZ port to a dedicated Guest port. It isolates devices connected to this port from your main LAN/DMZ networks.

What access do devices connected to the guest port have?

When the OPT/P6 port is configured as a guest port (by enabling “Guest Network (for wired clients)”), devices connected to it are only allowed Internet access. They cannot access devices or resources connected to the other LAN/DMZ ports. If the Guest Network is not enabled for the port, devices connected to it can communicate with all networks.

What access do users have if I connect an Access Point (AP) to a LAN port?

If you connect an Access Point (AP) to one of the standard LAN ports, wireless users connecting to that AP’s SSID can access all wired resources connected to the LAN ports (LAN/DMZ Resource) as well as the Internet.

What access do users have if I connect an Access Point (AP) to the Guest port?

If you connect an AP to the designated Guest port (OPT/P6, after enabling the wired Guest LAN feature), wireless users connecting to that AP’s SSID can only access the Internet. They cannot access resources on your main LAN/DMZ network.

What settings must be enabled for an AP connected to the Guest port to work correctly?

To allow wireless guests Internet-only access via an AP connected to the Guest port (OPT/P6), you must enable both:

1. Enable Guest Wi-Fi Network (in the Wi-Fi setup step or wizard).

2. Enable Guest LAN (Wired Network) (to designate the OPT/P6 port as the guest port).


What is a VPN?

A VPN (Virtual Private Network) is a secure, private connection established between two endpoints over a public network like the Internet. An endpoint can be a VPN gateway (like the Zyxel Device) or a computer/mobile device with VPN software installed. VPNs encrypt traffic to ensure confidentiality and integrity.

How do I start configuring a VPN in the Initial Setup Wizard?

If you choose to configure VPN after the basic setup, the wizard presents the VPN type selection screen. Choose the type of VPN tunnel you want to create:

• IPSec VPN Settings (for site-to-site or standard client VPNs)

• IPSec VPN Settings for Configuration Provisioning (for Zyxel VPN clients)

• VPN Settings for L2TP VPN Settings (for L2TP clients)

Select the desired type and click “Launch”. This closes the Initial Setup Wizard and opens the selected VPN Quick Setup Wizard. Clicking “Exit” leaves the wizard without saving changes.

What is the purpose of the ‘IPSec VPN Settings’ option in the VPN wizard?

This option launches a wizard to create a standard IPSec VPN tunnel. It’s typically used for creating a secure, private connection between two Zyxel Devices (site-to-site VPN), allowing networks behind each device to communicate securely.

What needs to be ensured when setting up an IPSec VPN between two Zyxel Devices?

• Settings on both Zyxel Devices must be correct and reciprocal (e.g., local settings on one match remote settings on the other).

• The pre-shared key, negotiation mode, encryption, authentication settings, DH key group, etc., must be identical on both devices.

• Both devices must be able to communicate with each other (try pinging the remote gateway).

• Ensure no firewall in front of either Zyxel Device is blocking VPN traffic (typically UDP ports 500 and 4500, and ESP protocol).


What is the purpose of the ‘IPSec VPN Settings for Configuration Provisioning’ option?

This option launches a wizard to create a secure, private IPSec VPN connection specifically designed for use with Zyxel’s client VPN software (SecuExtender or the Zyxel IPSec VPN Client). It allows the client software to automatically retrieve the necessary VPN configuration from the Zyxel Device.

What is required for the ‘IPSec VPN Settings for Configuration Provisioning’ to work?

• The Zyxel client VPN software must be installed and configured correctly on the remote computer.

• The VPN settings (pre-shared key/certificate, negotiation mode, encryption, authentication, DH group) must match between the client configuration and the Zyxel Device rule.

• The client must be able to communicate with the Zyxel Device (try pinging the Zyxel Device from the client).


What is the purpose of the ‘VPN Settings for L2TP VPN Settings’ option?

This option launches a wizard to create a secure L2TP over IPSec VPN connection. This type of VPN is often used by built-in VPN clients found in many computer operating systems (like Windows, macOS) and mobile devices (like iOS, Android).

What is required for an L2TP VPN connection to work?

• The L2TP VPN client software must be installed and configured correctly on the remote computer or device (refer to the OS/device help).

• The client must be able to communicate with the Zyxel Device (try pinging the Zyxel Device from the client).

• Ensure that L2TP traffic (typically UDP ports 500, 4500, and 1701) is allowed through the WAN on the Zyxel Device and not blocked by any intermediate firewalls.


What is the difference between Express and Advanced mode in the VPN Setup Wizard?

• Express: Creates a VPN rule using default Phase 1 and Phase 2 settings, typically for connecting to another ZLD-based Zyxel Device using a pre-shared key. It simplifies the setup process.

• Advanced: Allows you to customize the Phase 1 and Phase 2 settings (like negotiation mode, encryption/authentication algorithms, key groups, lifetimes) and/or use certificates instead of a pre-shared key. It offers more flexibility for connecting to other IPSec devices or meeting specific security requirements.


What is IKE (Internet Key Exchange) and what are the differences between IKEv1 and IKEv2 mentioned?

IKE (Internet Key Exchange) is a protocol used to set up secure connections (security associations) for VPNs. It handles authentication (using pre-shared keys or certificates) and key generation.

• IKEv1: Supports X-Auth for authentication.

• IKEv2: Supports Extended Authentication Protocol (EAP), which is important for integrating with existing enterprise authentication systems (like RADIUS).


What are the requirements for the Rule Name in the VPN wizard?

The Rule Name is used to identify the VPN connection and its corresponding VPN gateway policy.

• Length: 1 to 31 characters.

• Allowed characters: Alphanumeric (a-z, A-Z, 0-9), underscores (_), dashes (-).

• Restriction: The first character cannot be a number.

• Case-sensitive: Yes.


When should I choose the ‘Site-to-site’ VPN scenario?

Choose this scenario when connecting your Zyxel Device to another remote IPSec router (peer) that has a static public IP address or a fully qualified domain name (FQDN). In this setup, either side can initiate the VPN tunnel (provided your Zyxel device also has a static IP or FQDN if the remote side needs to initiate).

When should I choose the ‘Site-to-site with Dynamic Peer’ VPN scenario?

Choose this scenario when the remote IPSec router you are connecting to has a dynamic IP address (an IP address that can change). In this case, your Zyxel Device must have a static IP address or a domain name. You won’t specify the remote router’s IP address directly in the configuration, but you will define the network(s) behind it (remote policy). Only the remote router (with the dynamic IP) can initiate the VPN tunnel.

When should I choose the ‘Remote Access (Server Role)’ VPN scenario?

Choose this scenario when you want your Zyxel Device to act as a VPN server, allowing incoming connections from multiple IPSec VPN clients (often called dial-in users or road warriors). These clients typically have dynamic IP addresses. You don’t specify the client IP addresses or their network policies in the rule. Only the remote clients can initiate the VPN tunnel to the Zyxel Device (Server).

When should I choose the ‘Remote Access (Client Role)’ VPN scenario?

Choose this scenario when your Zyxel Device needs to act as a VPN client to connect to a remote IPSec server (which is configured as Server Role). Your Zyxel Device (Client Role) can have a dynamic IP address. The remote IPSec server does not need to have specific IP or policy information about your Zyxel Device configured. Only your Zyxel Device (Client Role) can initiate the VPN tunnel to the server.

What is ‘My Address (interface)’ in the VPN Express Wizard?

This setting specifies which network interface on your Zyxel Device (e.g., wan, wan1, ge1) will be used as the local endpoint for this VPN tunnel. Select the appropriate WAN interface from the drop-down list.

What is ‘Secure Gateway’ in the VPN Express Wizard? When should I use 0.0.0.0?

This field defines the IP address or domain name (FQDN) of the remote IPSec device (the peer or gateway you are connecting to).

• If the scenario chosen makes this field non-configurable (like Remote Access Server Role or Site-to-Site with Dynamic Peer), it will display “Any”.

• Otherwise, enter the static WAN IP address or domain name of the remote peer.

• Use 0.0.0.0 if the remote IPSec router has a dynamic WAN IP address (applicable in the Site-to-Site scenario when the remote peer initiates).


What is the ‘Pre-Shared Key’ in the VPN Express Wizard and what are its requirements?

This is the secret password used to authenticate the two ends of the VPN tunnel during the initial connection phase (IKE Phase 1).

• Both ends of the VPN tunnel must use the exact same Pre-Shared Key.

• Requirements: Up to 128 case-sensitive ASCII characters OR up to 128 pairs of hexadecimal characters (“0-9”, “A-F”).

• Hexadecimal keys must be preceded with “0x” (e.g., 0x1234ABCD…).

• Using mismatched keys will result in connection failure (PYLD_MALFORMED error).


What is ‘Local Policy (IP/Mask)’ in the VPN Express Wizard?

This defines the local network(s) behind your Zyxel Device whose traffic should be sent through the VPN tunnel. Enter the IP address and subnet mask of the local computer or subnet (e.g., 192.168.1.0 / 255.255.255.0). This must match the ‘Remote Policy’ configured on the remote IPSec device.

What is ‘Remote Policy (IP/Mask)’ in the VPN Express Wizard?

This defines the remote network(s) behind the peer IPSec device that you want to reach through the VPN tunnel.

• If the scenario chosen makes this field non-configurable (like Remote Access Server Role or Client Role), it will display “Any”.

• Otherwise, enter the IP address and subnet mask of the remote computer or subnet (e.g., 192.168.10.0 / 255.255.255.0). This must match the ‘Local Policy’ configured on the remote IPSec device.


What information is shown on the VPN Express Wizard Summary screen?

The summary screen provides a read-only overview of the VPN tunnel settings you configured:

• Rule Name

• Secure Gateway (IP address, FQDN, or Any)

• Pre-Shared Key (masked or displayed depending on context)

• Local Policy (IP/Mask)

• Remote Policy (IP/Mask or Any)

It also includes a ‘Configuration for Secure Gateway’ section with commands for the remote peer.

What is the ‘Configuration for Secure Gateway’ section used for in the VPN Express Wizard summary?

This section provides command-line interface (CLI) commands based on the settings you just configured. You can copy these commands and paste them into the CLI of another compatible ZLD-based Zyxel Device to quickly configure it as the other end (peer) of the VPN tunnel. You can also save these commands as a shell script file (.zysh extension) and run it using the file manager on the remote Zyxel device.

Where can I find the VPN rules created by the wizard after completion?

After clicking ‘Save’ or ‘Finish’ in the VPN wizard:

• The Phase 1 rule settings (IKE settings) appear in the VPN > IPSec VPN > VPN Gateway screen.

• The Phase 2 rule settings (IPSec policy) appear in the VPN > IPSec VPN > VPN Connection screen.

• For L2TP rules, they appear in VPN > L2TP VPN and also influence the IPSec VPN Gateway/Connection screens.


How do I exit the VPN Express Wizard?

Click the “Close” button on the final screen (VPN Express Wizard: Finish).

How do I start the VPN Advanced Wizard?

In the VPN Setup Wizard: Wizard Type screen (Figure 150 or equivalent), select the “Advanced” radio button and click “Next”.

What are the two phases of IKE negotiation?

Every IKE (Internet Key Exchange) negotiation involves two phases:

• Phase 1 (Authentication): Establishes a secure channel called the IKE SA (Security Association). This phase authenticates the peers and agrees on cryptographic parameters for securing the IKE communication itself.

• Phase 2 (Key Exchange): Uses the secure IKE SA established in Phase 1 to negotiate the parameters for the actual data tunnel, known as the IPSec SA. This defines how user data will be encrypted and authenticated.


What is ‘Negotiation Mode’ in VPN Phase 1 settings and what are the options?

This setting determines how the initial IKE Phase 1 negotiation is conducted. The options are:

• Main: More secure as it encrypts the identities of the communicating peers (ZyWALL/USG and remote router). However, it takes more time and message exchanges to establish the IKE SA.

• Aggressive: Faster negotiation as it exchanges more information in fewer messages. However, it does not encrypt the peer identities during the exchange, making it potentially less secure against eavesdropping.

Both the ZyWALL/USG and the remote IPSec router must use the same negotiation mode. Multiple SAs connecting through the same secure gateway must also use the same mode.

What Encryption Algorithms are available in VPN Phase 1 settings?

The wizard typically offers symmetric encryption algorithms like:

• 3DES (Triple DES): Uses a 168-bit key. More secure than DES but slower and requires more processing power.

• AES (Advanced Encryption Standard): Offered in different key lengths:

• AES128: Uses a 128-bit key. Faster than 3DES.

• AES192: Uses a 192-bit key.

• AES256: Uses a 256-bit key. Offers the highest level of encryption strength but may impact throughput most.

The longer the key, generally the higher the security, but potentially lower throughput. Both VPN peers must use the same algorithm.

What Authentication Algorithms are available in VPN Phase 1 settings?

These are hash algorithms used to verify the integrity and authenticity of the IKE messages. Common options include:

• MD5 (Message Digest 5): Provides minimal security; generally considered weak and deprecated for security purposes.

• SHA1 (Secure Hash Algorithm 1): Stronger than MD5, but also has known vulnerabilities.

• SHA256 (SHA-2 family): Offers higher security than SHA1.

• SHA512 (SHA-2 family): Offers the highest security among common options.

Stronger algorithms provide better security but are computationally more intensive and may result in slightly lower performance. Both VPN peers must use the same algorithm.

What Key Groups (DH Groups) are available in VPN Phase 1 settings?

These refer to Diffie-Hellman (DH) groups, used to securely establish a shared secret key over an insecure channel during IKE Phase 1. The group number determines the strength (bit length) of the key exchange. Common options include:

• DH1: 768-bit random number (considered weak).

• DH2: 1024-bit (1Kb) random number (minimum recommended).

• DH5: 1536-bit random number (stronger).

Higher DH groups provide stronger security for the key exchange but require more computational resources and may increase connection setup time. DH5 is more secure than DH1 or DH2. Both VPN peers must use the same DH group.

What is ‘SA Life Time’ in VPN Phase 1 settings?

This setting determines how long the IKE Security Association (SA), established in Phase 1, remains valid before it needs to be renegotiated. It’s typically set in seconds (e.g., 86400 seconds = 24 hours). A shorter lifetime increases security because keys are refreshed more often, but each renegotiation causes a brief interruption in the VPN tunnel’s ability to establish new Phase 2 SAs.

What is ‘NAT Traversal’ in VPN Phase 1 settings and when should it be selected?

NAT Traversal (NAT-T) is a feature that allows IPSec VPN traffic to pass through Network Address Translation (NAT) devices (like common home routers). Select this checkbox if either your Zyxel Device or the remote IPSec peer is located behind a NAT router. If selected, the remote IPSec device must also have NAT Traversal enabled. NAT-T typically encapsulates IPSec traffic within UDP packets (usually on port 4500).

What is ‘Dead Peer Detection (DPD)’ in VPN Phase 1 settings?

Dead Peer Detection (DPD) is a mechanism for the Zyxel Device to check if the remote VPN peer is still responsive. If enabled, and there has been no VPN traffic for a certain period (e.g., 15 seconds), the Zyxel Device sends a DPD message to the peer. If the peer responds, the connection is considered active. If the peer does not respond after retries, the Zyxel Device assumes the peer is down and tears down the IKE SA (Phase 1) and associated IPSec SAs (Phase 2). This helps clean up stale connections.

What are the ‘Authentication Method’ options in VPN Phase 1 settings?

This determines how the VPN peers prove their identity to each other during IKE Phase 1. The options are:

• Pre-Shared Key: Both peers are configured with the same secret password (the pre-shared key). This is simpler to set up.

• Certificate: Each peer uses a digital certificate (issued by a Certificate Authority or self-signed) to authenticate. This is generally considered more secure and scalable, especially for larger deployments, but requires managing certificates.


What is configured in Phase 2 of an IKE negotiation?

Phase 2 uses the secure channel established in Phase 1 (the IKE SA) to negotiate the specific parameters for the actual data tunnel, known as the IPSec SA (Security Association). This includes defining how the user data passing through the VPN will be protected, specifying the protocols, encryption/authentication algorithms, and the network traffic (policies) that should use this tunnel.

What are the ‘Active Protocol’ options in VPN Phase 2 settings?

This selects the IPSec protocol used to secure the data:

• ESP (Encapsulating Security Payload): Provides confidentiality (encryption), data origin authentication, connectionless integrity, and anti-replay protection. ESP is compatible with NAT Traversal.

• AH (Authentication Header): Provides data origin authentication, connectionless integrity, and anti-replay protection, but does NOT provide encryption (confidentiality). AH is generally NOT compatible with NAT.

ESP is almost always preferred due to its inclusion of encryption and NAT compatibility. AH might not be available in some wizard modes (e.g., Configuration Provisioning).

What are the ‘Encapsulation’ options in VPN Phase 2 settings?

This defines how the IPSec protocol (usually ESP) encapsulates the original IP packets:

• Tunnel: Encapsulates the entire original IP packet (including header) inside a new IP packet. The new IP header has the source and destination IP addresses of the VPN gateways. Tunnel mode is required for site-to-site VPNs and is compatible with NAT.

• Transport: Only encrypts/authenticates the payload of the original IP packet, keeping the original IP header. This is typically used for end-to-end security between two hosts on the same network and is generally not compatible with NAT.

Tunnel mode is used for most VPN scenarios configured via the wizard.

What Encryption Algorithms are available in VPN Phase 2 settings?

Similar to Phase 1, these algorithms encrypt the actual user data passing through the VPN tunnel (if using ESP). Options typically include:

• 3DES

• AES128

• AES192

• AES256

• Null: This option specifies that no encryption should be applied. This is generally only used if confidentiality is not required or if AH protocol is used (which doesn’t support encryption).

Longer keys provide higher security but may reduce throughput. Both peers must use the same algorithm.

What Authentication Algorithms are available in VPN Phase 2 settings?

These hash algorithms verify the integrity and authenticity of the user data packets within the IPSec tunnel. Common options include:

• MD5

• SHA1

• SHA256

• SHA512

Stronger algorithms provide better security but may impact performance. Both peers must use the same algorithm.

What is ‘SA Life Time’ in VPN Phase 2 settings?

This sets the duration for which the IPSec Security Association (the actual data tunnel) remains valid before it must be renegotiated. It is set in seconds (e.g., 28800 seconds = 8 hours). Similar to Phase 1, a shorter lifetime enhances security by refreshing keys more frequently, but the renegotiation process temporarily disconnects the specific data tunnel.

What is ‘Perfect Forward Secrecy (PFS)’ in VPN Phase 2 settings and what are the options?

Perfect Forward Secrecy (PFS) ensures that the session keys used for encrypting data in Phase 2 are not derived solely from the Phase 1 key material. If PFS is enabled, a new Diffie-Hellman exchange is performed during Phase 2 negotiation to generate fresh keying material for the IPSec SA. This means that even if the Phase 1 key (or pre-shared key) is compromised later, past session data encrypted with keys derived using PFS cannot be decrypted.

• Options involve selecting a Diffie-Hellman group (e.g., DH1, DH2, DH5) for this Phase 2 key exchange.

• DH5 is more secure than DH1 or DH2, but may slow down the Phase 2 setup.

• Disabling PFS allows faster IPSec setup but is less secure, as compromising the Phase 1 key could potentially compromise all data sent over the tunnel.

Both peers must agree on whether to use PFS and use the same DH group if enabled.

What is ‘Local Policy (IP/Mask)’ in VPN Phase 2 settings?

This defines the source network traffic from behind your Zyxel Device that is allowed to use this specific IPSec tunnel. Enter the IP address and subnet mask of the local computer or subnet. This must match the Remote Policy configured on the remote peer for this tunnel.

What is ‘Remote Policy (IP/Mask)’ in VPN Phase 2 settings?

This defines the destination network traffic behind the remote peer that this specific IPSec tunnel is allowed to reach. Enter the IP address and subnet mask of the remote computer or subnet. This must match the Local Policy configured on the remote peer for this tunnel. In some scenarios (like Client Role or Configuration Provisioning), this might be set to ‘Any’.

What is ‘Nailed-Up’ in VPN Phase 2 settings and when is it applicable?

The ‘Nailed-Up’ option typically displays for site-to-site and remote access client role scenarios. If selected (set to ‘true’ or checked), the Zyxel Device will automatically try to renegotiate the IPSec SA (Phase 2 tunnel) as soon as its lifetime expires, attempting to keep the tunnel constantly active. If not selected, the tunnel will only be re-established when there is traffic that needs to use it after the lifetime has expired.

What information is shown on the VPN Advanced Wizard Summary screen?

The summary provides a read-only overview of all configured settings:

• Rule Name

• Secure Gateway

• Pre-Shared Key / Certificate Info

• My Address (interface)

• Phase 1 settings (Negotiation Mode, Encryption, Authentication, Key Group, SA Life Time, NAT-T, DPD)

• Phase 2 settings (Active Protocol, Encapsulation, Encryption, Authentication, SA Life Time, PFS)

• Policy settings (Local Policy, Remote Policy, Nailed-Up)

• Configuration for Secure Gateway script


How do I save the VPN rule created by the Advanced Wizard?

After reviewing the settings on the Summary screen, click the “Save” button to apply the configuration and create the VPN rule on the Zyxel Device.

What is the purpose of the ‘VPN Settings for Configuration Provisioning’ wizard?

This wizard specifically sets up an IPSec VPN rule (acting as Remote Access Server Role) whose configuration parameters can be automatically retrieved and applied by the Zyxel Device IPSec VPN Client software running on remote user machines. It simplifies VPN setup for end-users using the Zyxel client.

What settings are NOT allowed in VPN rules for Configuration Provisioning?

VPN rules created for use with the Zyxel Device IPSec VPN Client via Configuration Provisioning have restrictions and must *not* contain:

• AH active protocol (only ESP is supported)

• NULL encryption (data must be encrypted)

• SHA512 authentication (use SHA1 or SHA256)

• A subnet or range remote policy (the client typically determines its own traffic)


What is the only Application Scenario allowed in the Configuration Provisioning wizard?

Only the “Remote Access (Server Role)” scenario is permitted when using the VPN Settings for Configuration Provisioning wizard. This is because the Zyxel Device must act as the server to provide the configuration to the connecting Zyxel VPN clients.

Why is ‘Secure Gateway’ set to Any in the Configuration Provisioning wizard?

In the context of Configuration Provisioning (Remote Access Server Role), the ‘Secure Gateway’ field represents the remote clients. Since multiple clients with potentially dynamic IP addresses will connect, their specific addresses are not pre-configured in the rule. Therefore, ‘Secure Gateway’ is set to ‘Any’ to allow incoming connections from any Zyxel Device IPSec VPN Client.

What information is shown on the Configuration Provisioning Express Wizard Summary screen?

The summary screen shows the configured settings:

• Rule Name

• Secure Gateway (will be ‘Any’)

• Pre-Shared Key

• Local Policy (IP/Mask)

• Remote Policy (will be ‘Any’)

It also includes the ‘Configuration for Secure Gateway’ section, which in this context, displays the configuration parameters that the Zyxel VPN Client will retrieve.

What does the ‘Configuration for Secure Gateway’ section represent in the Configuration Provisioning wizard summary?

In the Configuration Provisioning wizards (Express and Advanced), this section displays the actual VPN settings (based on the rule you created) that the Zyxel Device IPSec VPN Client software will automatically download and apply when it connects to the Zyxel Device’s IP address using the configured username and password.

How does the Zyxel Device IPSec VPN Client get the settings configured using the Configuration Provisioning wizard?

After you save the rule on the Zyxel Device (server), the user only needs to enter the public IP address (or domain name) of the Zyxel Device into their Zyxel Device IPSec VPN Client software. The client software then contacts the Zyxel Device, authenticates (usually prompting for user credentials associated with the rule), and automatically downloads and applies all the necessary Phase 1 and Phase 2 VPN settings from the ‘Configuration for Secure Gateway’ profile stored on the Zyxel Device.

Why is AH protocol not available in the Configuration Provisioning Advanced Wizard Phase 2?

The Zyxel Device IPSec VPN Client software, which retrieves settings via Configuration Provisioning, requires ESP (Encapsulating Security Payload) for compatibility and encryption. AH (Authentication Header) does not provide encryption and is therefore not supported in this specific wizard designed for the Zyxel client.

Why is Remote Policy set to Any in the Configuration Provisioning Advanced Wizard Phase 2?

In a Remote Access (Server Role) scenario like Configuration Provisioning, the Zyxel Device (server) doesn’t know the specific network addresses behind each connecting client. The clients could be connecting from various locations with different local networks. Setting Remote Policy to ‘Any’ allows traffic destined for any network behind the client to potentially use the tunnel, although typically clients are configured to only send specific traffic (Split Tunnel) or all traffic (Full Tunnel) based on the Local Policy defined on the server.

What is the purpose of the ‘VPN Settings for L2TP VPN Settings’ wizard?

This wizard is used to configure the Zyxel Device to act as an L2TP over IPSec VPN server. This allows clients using built-in L2TP/IPSec VPN capabilities (common in Windows, macOS, iOS, Android) to establish secure VPN connections to your network.

What settings are configured on the first screen of the L2TP VPN Settings wizard?

The first settings screen (Phase 1 Setting) for L2TP VPN configures:

• Rule Name: A name to identify the L2TP VPN rule.

• My Address (interface): The WAN interface on the Zyxel Device that will accept L2TP connections.

• Authentication Method (Pre-Shared Key): The secret key that both the L2TP client and the Zyxel Device must use for the initial IPSec authentication.


What is the ‘IP Address Pool’ used for in L2TP VPN settings?

The IP Address Pool defines a range of IP addresses (or a subnet) that the Zyxel Device will assign to connecting L2TP VPN clients. Each client receives a temporary IP address from this pool for the duration of their VPN session. You can select ‘RANGE’ and define a Starting and Ending IP Address, or select ‘SUBNET’ and define a Network IP and Netmask.

What does the ‘Allow L2TP traffic Through WAN’ option do?

Selecting this checkbox creates the necessary firewall rules to permit incoming L2TP over IPSec traffic from the Internet (WAN) to reach the Zyxel Device. This is required for L2TP clients to be able to connect.

Why is configuring DNS servers important for L2TP VPN clients?

When connected via L2TP VPN, clients often need to resolve internal network names (e.g., server hostnames) or external domain names. Providing DNS server addresses (First DNS Server, Second DNS Server) in the L2TP configuration allows the Zyxel Device to push these DNS settings to the connecting clients, enabling them to resolve names correctly while connected to the VPN. Without configured DNS servers, clients might only be able to access resources by IP address. You can leave the fields as 0.0.0.0 if you do not want to configure DNS servers via the VPN.

What information is shown on the L2TP VPN Settings Wizard Summary screen?

The summary screen displays the settings you have configured:

• Rule Name

• Secure Gateway (will be ‘Any’ as it’s a server role)

• Pre-Shared Key

• My Address (interface)

• IP Address Pool (Range or Subnet details)


Where can I find the L2TP VPN rules created by the wizard?

After completing the wizard and clicking ‘Save’, the L2TP VPN rule settings appear in the VPN > L2TP VPN screen. The underlying IPSec configuration components will also appear in the VPN > IPSec VPN > VPN Connection and VPN Gateway screens.

How do I configure Port Forwarding from the Easy Mode dashboard?

You can access the Port Forwarding wizard from the Easy Mode dashboard, likely via a dedicated tab or link (the PDF shows it as section 4.9). The wizard guides you through selecting the internal client (server) and the service(s)/port(s) to forward from the Internet to that client.

How do I add a client to the Port Forwarding list if it’s not present?

In the Port Forwarding wizard, click the Edit icon (pencil) next to the Client List. In the pop-up screen (Add a Client Device), you can add a new client by entering its Name, IP Address, and MAC Address. Click OK to add it. Remember, this client should ideally have a static IP address.

How do I add a custom service to the Port Forwarding list?

In the Port Forwarding wizard, click the Edit icon (pencil) next to the Service List. In the “User Defined Port” pop-up screen:

1. Click Add.

2. Enter a descriptive Service Name.

3. Enter the Starting Port number (1-65535).

4. Enter the Ending Port number (1-65535). Use the same number as the starting port if forwarding a single port.

5. Click OK.


What are UPnP and NAT-PMP?

• UPnP (Universal Plug and Play) and NAT-PMP (NAT Port Mapping Protocol) are network protocols that allow devices on your local network (like game consoles, media servers, etc.) to automatically discover each other and configure network services, including automatically creating port forwarding rules on the Zyxel Device (router) without manual configuration.


How do I enable UPnP/NAT-PMP using the Port Forwarding wizard?

The Port Forwarding wizard includes a step specifically for UPnP configuration.

1. Select the “Enable UPnP” checkbox.

2. Click Refresh to view the current UPnP Port Status (rules automatically created by devices).

3. Click Finish.

Note: Only enable UPnP if required by specific services and if you understand the security implications, as it allows devices to open ports automatically.

How do I configure Wi-Fi settings using the Wi-Fi and Guest Network Wizard?

This wizard, accessible from Easy Mode, combines Wi-Fi, Guest Wi-Fi, and wired Guest LAN setup.

To configure Wi-Fi:

1. Check “Enable Wi-Fi Network”.

2. Set the Wi-Fi name (SSID).

3. Set the Password.

To configure Guest Wi-Fi:

1. Check “Enable Guest Wi-Fi Network”.

2. Set the Guest Wi-Fi name (SSID).

3. Set the Password.

4. Specify the access Duration (default 4 hours) or select Always.


How long can guests access the Guest Wi-Fi network configured through the wizard?

In the Wi-Fi and Guest Network Wizard, you can set a specific time duration (in hours and minutes) for which guests can access the network before being disconnected. The default is 4 hours. Alternatively, you can select the “Always” option for unlimited duration.

How do I configure the wired Guest LAN using the Wi-Fi and Guest Network Wizard?

The Wi-Fi and Guest Network Wizard includes a “Guest LAN (Wired Network)” section.

1. Select the “Enable Guest Network (for wired clients)” checkbox.

2. Click Finish.

This configures the OPT/P6 port as an isolated guest port providing Internet-only access.

What does the Security Service Wizard configure?

The Security Service Wizard helps configure licensed security features like Content Filter (blocking websites by category and specific URLs), IDP (Intrusion Detection and Prevention signature updates and enabling), and Anti-Virus (signature updates and enabling).

What should I do before running the Security Service Wizard?

You must first register your Zyxel Device at portal.myzyxel.com and activate the licenses for the security services you want to use (e.g., Content Filter, IDP, Anti-Virus). The wizard relies on activated licenses.

How do I check the license status in the Security Service Wizard?

The first screen of the Security Service Wizard displays the “Service License Status” for features like Content Filter, IDP Signature, and Anti-Virus. It will show “Licensed” or “Not Licensed”. Click the “Refresh” button to update the status from the myZyxel portal. Ensure your device has internet access for the refresh to work.

How do I select categories to block using the Content Filter in the Security Service Wizard?

In the “Content Filter Categories” step of the wizard:

1. Ensure the “Enable Content Filter with following contents blocked” checkbox is selected.

2. Review the listed categories (grouped under headings like Adult Related, Leisure, Liability Concerns, etc.).

3. Select the checkboxes next to the categories you wish to block.

4. Click Next.


What types of websites does the ‘Nudity’ category block? (Adult Related)

Sites that contain full or partial nudity that are not necessarily overtly sexual in intent. Includes sites that advertise or sell lingerie, intimate apparel, or swim wear. For example, http://www.easyshop.com.tw, http://www.faster-swim.com.tw, image.baidu.com.

What types of websites does the ‘Pornography/Sexually Explicit’ category block? (Adult Related)

Sites that contain explicit sexual content. Includes adult products such as sex toys, CD-ROMs, and videos, adult services such as videoconferencing, escort services, and strip clubs, erotic stories and textual descriptions of sexual acts. For example, http://www.dvd888.com, http://www.18center.com, blog.sina.com.tw.

What types of websites does the ‘Tasteless’ category block? (Adult Related)

Sites with offensive or tasteless content such as bathroom humor or profanity. For example, comedycentral.com, dilbert.com.

What types of websites does the ‘Games’ category block? (Leisure)

Sites relating to computer or other games, information about game producers, or how to obtain cheat codes. Game-related publication sites. For example, http://www.gamer.com.tw, http://www.wowtaiwan.com.tw, tw.lineage.gamania.com.

What types of websites does the ‘Streaming Media & Downloads’ category block? (Leisure)

Sites that deliver streaming content, such as Internet radio, Internet TV or MP3 and live or archived media download sites. Includes fan sites, or official sites run by musicians, bands, or record labels. For example, http://www.youtube.com, pfp.sina.com.cn, my.xunlei.com.

What types of websites does the ‘Peer to Peer’ category block? (Leisure)

Sites that enable direct exchange of files between users without dependence on a central server. For example, http://www.eyny.com.

What types of websites does the ‘Hacking’ category block? (Technology)

Sites that promote or give advice about how to gain unauthorized access to proprietary computer systems, for the purpose of stealing information, perpetrating fraud, creating viruses, or committing other illegal activity related to theft of digital information. For example, http://www.hackbase.com, http://www.chinahacker.com.

What types of websites does the ‘Child Abuse Images’ category block? (Liability Concerns)

Sites that portray or discuss children in sexual or other abusive acts. For example, a.uuzhijia.info.

What types of websites does the ‘Criminal Activity’ category block? (Liability Concerns)

Sites that offer advice on how to commit illegal or criminal activities, or to avoid detection. These can include how to commit murder, build bombs, pick locks, etc. Also includes sites with information about illegal manipulation of electronic devices, hacking, fraud and illegal distribution of software. For example, http://www.hackbase.com, jia.hackbase.com, ad.adver.com.tw.

What types of websites does the ‘Gambling’ category block? (Liability Concerns)

Sites that offer or are related to online gambling, lottery, casinos and betting agencies involving chance. For example, http://www.taiwanlottery.com.tw, http://www.i-win.com.tw, http://www.hkjc.com.

What types of websites does the ‘Hate & Intolerance’ category block? (Liability Concerns)

Sites that promote a supremacist political agenda, encouraging oppression of people or groups of people based on their race, religion, gender, age, disability, sexual orientation or nationality. For example, http://www.racist-jokes.com, aryan-nations.org, whitepower.com.

What types of websites does the ‘Illegal Drugs’ category block? (Liability Concerns)

Sites with information on the purchase, manufacture, and use of illegal or recreational drugs and their paraphernalia, and misuse of prescription drugs and other compounds. For example, http://www.cannabis.net, http://www.amphetamines.com.

What types of websites does the ‘Illegal Software’ category block? (Liability Concerns)

Sites that illegally distribute software or copyrighted materials such as movies or music, software cracks, illicit serial numbers, illegal license key generators. For example, http://www.zhaokey.com.cn, http://www.tiansha.net.

What types of websites does the ‘Weapons’ category block? (Liability Concerns)

Sites that depict, sell, review or describe guns and weapons, including for sport. For example, http://www.ak-47.net, warfare.ru.

What types of websites does the ‘Violence’ category block? (Liability Concerns)

Sites that contain images or text depicting or advocating physical assault against humans, animals, or institutions. Sites of a particularly gruesome nature such as shocking depictions of blood or wounds, or cruel animal treatment. For example, crimescene.com, deathnet.com, michiganmilitia.com.

What types of websites does the ‘Chat’ category block? (Social Interaction)

Sites that enable web-based exchange of real time messages through chat services or chat rooms. For example, me.sohu.com, blufiles.storage.live.com.

What types of websites does the ‘Dating & Personals’ category block? (Social Interaction)

Sites that promote networking for interpersonal relationships such as dating and marriage. Includes sites for match-making, online dating, spousal introduction. For example, http://www.i-part.com.tw, http://www.imatchi.com.

What types of websites does the ‘Instant Messaging’ category block? (Social Interaction)

Sites that enable logging in to instant messaging services such as ICQ, AOL Instant Messenger, IRC, MSN, Jabber, Yahoo Messenger, and the like. For example, http://www.meebo.com, http://www.aim.com, http://www.ebuddy.com.

What types of websites does the ‘Social Networking’ category block? (Social Interaction)

Sites that enable social networking for online communities of various topics, for friendship, dating, or professional reasons. For example, http://www.facebook.com, http://www.flickr.com, http://www.groups.google.com.

What types of websites does the ‘Job Search’ category block? (Commerce)

Sites containing job listings, career information, assistance with job searches (such as resume writing, interviewing tips, etc.), employment agencies or head hunters. For example, http://www.104.com.tw, http://www.1111.com.tw, http://www.yes123.com.tw.

What types of websites does the ‘Advertisements & Pop-Ups’ category block? (Commerce)

Sites that provide advertising graphics or other ad content files such as banners and pop-ups. For example, pagead2.googlesyndication.com, ad.yieldmanager.com.

What types of websites does the ‘Sex Education’ category block? (Information Related)

Sites relating to sex education, including subjects such as respect for partner, abortion, gay and lesbian lifestyle, contraceptives, sexually transmitted diseases, and pregnancy. For example, apps.rockyou.com, http://www.howmama.com.tw, http://www.mombaby.com.tw.

How do I add specific trusted or forbidden websites in the Security Service Wizard?

In the “Websites (URL) Filter” step of the wizard:

• To add a trusted (always allowed) site: Click Add under “Trusted Web Sites”, enter the host name (e.g., http://www.good-site.com, *.zyxel.com) without “http://&#8221;, and click OK/Save.

• To add a forbidden (always blocked) site: Click Add under “Forbidden Web Sites”, enter the host name (e.g., http://www.bad-site.com, *.malicious.com) without “http://&#8221;, and click OK/Save.

Use up to 127 characters (0-9a-z-). Casing does not matter. The entry must contain at least one period “.”.

How do I use wildcards when adding trusted or forbidden websites?

You can use an asterisk (*) as a wildcard to match any string. For example:

• `*zyxel.com` allows or blocks `www.zyxel.com`, `partner.zyxel.com`, `press.zyxel.com`, etc.

• `*.com` allows or blocks all `.com` domains.


How do I remove a trusted or forbidden website entry?

In the “Websites (URL) Filter” step of the Security Service Wizard, select the entry you want to remove from the Trusted Web Sites or Forbidden Web Sites list and click the trash can icon associated with that list.

How can I exempt specific devices from Content Filter policies using the Security Service Wizard?

In the “Exemptions” step of the wizard:

1. Find the device you want to exempt in the “Client_list”.

2. Select the device.

3. Click the right arrow button (>) to move it to the “Exemption_list”.

Devices in the Exemption_list will bypass Content Filter category blocking and trusted/forbidden website policies.

How do I add a device to the exemption list if it’s not already there?

If the device you want to exempt is not in the “Client_list”:

1. Click the “Add Client Address” button.

2. In the pop-up screen, enter the client’s Name, IP Address, and MAC Address.

3. Specify the interface (e.g., LAN1).

4. Click OK.

The device will now appear in the Client_list, and you can move it to the Exemption_list.

How do I enable IDP and Anti-Virus in the Security Service Wizard?

In the “IDP/AV” step of the Security Service Wizard:

• To enable IDP: Select the “Enable IDP” checkbox.

• To enable Anti-Virus: Select the “Enable Anti-Virus” checkbox.

Ensure the respective services are licensed first. The screen also displays the current signature version and release date for each service. Click “Finish” to apply the settings.

Why is it important to keep IDP and Anti-Virus signatures updated?

IDP and Anti-Virus rely on signature databases that contain patterns of known malicious data, intrusions, viruses, and worms. New threats emerge constantly. Keeping the signatures up to date is crucial for the Zyxel Device to effectively detect and prevent the latest threats.

How do I update IDP and Anti-Virus signatures?

You need an active subscription license for IDP and/or Anti-Virus registered via myZyxel. Signature updates are typically handled automatically by the Zyxel Device if licenses are active and the device can reach the update servers. In the “IDP/AV” step of the Security Service Wizard, you can manually trigger an update check by clicking the “Update Signature Now” button.

What is the MyZyxel Portal (portal.myzyxel.com)?

MyZyxel is Zyxel’s online services center. It’s where you register your Zyxel Device(s) and manage subscription services (licenses) like Content Filter, IDP, Anti-Virus, etc. Registration and license activation on MyZyxel are necessary to use these subscription services and to update their signature files.

How do I register my device and manage licenses?

1. Go to portal.myzyxel.com.

2. Create an account or sign in.

3. Follow the instructions on the portal to register your device. You may need the device’s serial number and LAN MAC address (usually found on a label on the device).

4. If you purchased subscription services (e.g., via an iCard), enter the license key(s) on the portal to activate the services for your registered device.


What is the Threat Intelligence Portal (threatintelligence.zyxel.com)?

The Zyxel Threat Intelligence Portal (https://threatintelligence.zyxel.com) is a website offering information and guidance on security threats relevant to Zyxel security features. It includes an encyclopedia of threats, release notes for signatures, and details on Virus/Malware, Intrusion Detection, Application Patrol, and a URL Checker.

What information can I find on the Threat Intelligence Portal?

The portal provides:

• An Encyclopedia: Search for virus/malware names or file hashes to view details, history, signature info, and how ZyWALL defends against them.

• Release Notes: Information about signature updates.

• Virus / Malware Information: Details on viruses and malware.

• Intrusion Detection Information: Details on network-based intrusions.

• Application Patrol Information: Details on application identification signatures.

• URL Checker: Allows you to check the categorization of a specific website URL.


What does the Virus/Malware section of the Threat Intelligence Portal cover?

Clicking this icon provides more information on viruses and malware. Malware is malicious software designed to corrupt, alter, or damage computers and systems.

What does the Intrusion Detection section of the Threat Intelligence Portal cover?

Clicking this icon provides more information on Intrusion Detection, which involves detecting malicious or suspicious network packets based on known patterns used in network-based intrusions.

What does the Application Patrol section of the Threat Intelligence Portal cover?

Clicking this icon provides more information on Application Patrol, a feature that identifies specific types of application traffic passing through the Zyxel Device, allowing you to decide whether to deny, allow, or reject that traffic. Traffic not recognized by Application Patrol signatures is ignored by this feature.

What does the URL Checker section of the Threat Intelligence Portal cover?

Clicking this icon accesses the URL Checker tool. You can enter a website URL to see how Zyxel’s Content Filter service categorizes it (e.g., Business, Portal Site, Search Engine).

What wizards are available in the main Quick Setup section (Expert Mode)?

The main Quick Setup screen provides access to several wizards:

• WAN Interface: Configures a WAN (Internet) connection, including ISP account settings for PPPoE/PPTP/L2TP.

• Remote Access VPN Setup: Configures VPN rules for remote clients (IKEv2 IPSec or L2TP over IPSec).

• VPN Setup: Configures general VPN rules, including site-to-site, Configuration Provisioning for Zyxel clients, and L2TP for clients.

• Wireless Setup: Configures the device as an AP Controller or manages the built-in AP (if applicable).


How do I access the help section within a Quick Setup wizard?

If the help panel does not display automatically when you run a wizard, look for an arrow icon, typically located at the edge of the screen or near the top right. Clicking this arrow should expand or display the context-sensitive help panel for the current wizard screen.

How do I select the physical interface for the WAN connection in the wizard?

In the WAN Interface Quick Setup wizard, the first step after the Welcome screen is usually “Choose Ethernet”. Here, you select the physical WAN interface (e.g., wan1, sfp, ge1 – names vary by model) that you want to configure for the Internet connection from the “Ethernet Selection” drop-down menu. Click Next after selecting.

How do I select the WAN connection type (Encapsulation) in the wizard?

In the “Enter WAN Settings” step of the WAN Interface Quick Setup wizard, use the “WAN Type Selection” drop-down menu.

• Choose Ethernet if your connection uses standard Ethernet (typically with Auto/DHCP or Static IP).

• Choose PPPoE, PPTP, or L2TP if your ISP requires a dial-up type connection using one of these protocols (you’ll need credentials from your ISP).


How do I configure the IP Address Assignment (Auto/Static) for an Ethernet WAN connection?

If you selected “Ethernet” as the WAN Type:

• For dynamic IP: Select “Auto” from the “IP Address Assignment” drop-down. The device will attempt to get an IP via DHCP.

• For fixed IP: Select “Static” from the “IP Address Assignment” drop-down. You will then need to enter the IP Address, IP Subnet Mask, Gateway IP Address, and optionally DNS Server addresses provided by your ISP.


What information is needed for a PPTP connection?

When configuring a PPTP WAN connection in the wizard, you typically need:

• Authentication Type (e.g., Chap/PAP)

• User Name (from ISP)

• Password (from ISP)

• Base Interface (the physical Ethernet port used)

• Server IP (the IP address of the ISP’s PPTP server)

Optional settings may include Nailed-Up, Idle Timeout, Connection ID, Base IP Address, Subnet Mask, Gateway IP, and DNS Servers, depending on ISP requirements.

What information is needed for a PPPoE connection?

When configuring a PPPoE WAN connection in the wizard, you typically need:

• Authentication Type (e.g., Chap/PAP)

• User Name (from ISP)

• Password (from ISP)

Optional settings may include Service Name, Nailed-Up, Idle Timeout, and DNS Servers, depending on ISP requirements. The wizard usually automatically handles the IP address assignment.

What Authentication Types are supported for PPPoE/PPTP/L2TP connections?

The drop-down list for Authentication Type typically includes:

• CHAP/PAP: Accepts either CHAP or PAP when requested by the remote server.

• CHAP: Accepts only CHAP (Challenge Handshake Authentication Protocol).

• PAP: Accepts only PAP (Password Authentication Protocol).

• MSCHAP: Accepts only MSCHAP.

• MSCHAP-V2: Accepts only MSCHAP-V2.

You should select the type specified by your ISP.

What does ‘Nailed-Up’ mean for PPPoE/PPTP/L2TP connections?

If you select the ‘Nailed-Up’ option (checkbox), the Zyxel Device will attempt to keep the PPPoE, PPTP, or L2TP connection active continuously and will not disconnect based on the Idle Timeout setting. If unchecked, the connection may disconnect after a period of inactivity defined by the Idle Timeout.

What is ‘Idle Timeout’ for PPPoE/PPTP/L2TP connections?

This value, entered in seconds, specifies how long the PPPoE, PPTP, or L2TP connection can remain idle (no traffic passing) before the Zyxel Device automatically disconnects it. A value of 0 usually means no timeout (the connection stays up unless Nailed-Up is also unchecked, or the connection drops for other reasons). This setting is ignored if ‘Nailed-Up’ is selected.

What is the ‘Connection ID’ field used for in PPTP/L2TP?

The Connection ID is an optional field that might be required by some ISP DSL modems or connection setups. It’s entered in a specific format like “c:id” or “n:name” (e.g., C:12 or N:MyISP). You should only enter a value here if instructed to do so by your ISP. It can contain alphanumeric and -_: characters, up to 31 characters long.

What settings are shown in the WAN Interface Wizard Summary?

The summary screen displays the configured settings for the WAN interface, which will vary depending on the chosen encapsulation type and IP assignment method. It typically includes:

• Encapsulation (Ethernet, PPPoE, etc.)

• WAN Interface name

• Zone (usually WAN)

• IP Address Assignment (Auto or Static)

• IP Address

• IP Subnet Mask

• Gateway IP Address

• DNS Servers

• ISP Parameters (User Name, Service Name, Server IP, etc., if applicable)


What is the purpose of the Remote Access VPN Setup wizard?

This wizard specifically helps create VPN rules designed for remote users (employees, individuals) to securely connect to the company’s network (behind the Zyxel Device) from anywhere. It focuses on client-to-site VPN scenarios using either IKEv2 IPSec or L2TP over IPSec.

When should I use the IKEv2 IPSec Client scenario in the Remote Access VPN wizard?

Use this scenario if the remote VPN client is:

• Using the Zyxel SecuExtender IPSec VPN client software.

• Using a computer or mobile operating system with built-in IKEv2 support (referred to as a non-SecuExtender VPN client).


What operating systems support the IKEv2 IPSec Client scenario (non-SecuExtender)?

Supported computer or mobile operating systems for non-SecuExtender IKEv2 clients include:

• Windows 8 and later versions.

• iOS 14.8 and later versions.

• macOS 10.12 and later versions.

• Android 10.0 and later versions (requires installing strongSwan first).


When should I use the L2TP over IPSec Client scenario in the Remote Access VPN wizard?

Use this scenario if the remote VPN client is using a supported computer or mobile operating system with a built-in L2TP over IPSec client. This wizard creates a Full Tunnel VPN rule only for these clients.

What operating systems support the L2TP over IPSec Client scenario?

Supported clients include:

• Windows 8 and later versions.

• iOS 13 and later versions.

• macOS 10.12.2 and later versions.

• Android 10.0 and later versions.


What VPN Authentication Method is used for the IKEv2 IPSec Client scenario?

The IKEv2 IPSec Client scenario in this wizard uses Extended Authentication Protocol (EAP) for authentication. This method is important for integrating with enterprise authentication systems. User authentication is configured in a later step.

How do I specify the Incoming Interface for the IKEv2 VPN?

Under “Incoming Interface”, you have two choices:

• Interface: Select a pre-configured physical interface (like ge2, wan1) from the drop-down list. Use this if the Zyxel Device has a static IP on that interface.

• Domain Name / IPv4: Select this if you are using DDNS to assign a dynamic IP address a domain name, or if you want to enter a static IP address directly. Enter the domain name (e.g., vpn.zyxel.com) or the static IPv4 address in the text box.


How is the Zyxel Device’s certificate configured for the IKEv2 VPN?

Under “Certificate for VPN Client”, you have two options for the certificate the Zyxel Device uses to identify itself:

• Auto: The Zyxel Device generates a certificate automatically based on the wizard settings (recommended for simplicity).

• Manual: Select an existing certificate from the drop-down list. Ensure the certificate’s Host IP Address or Domain Name matches the Incoming Interface setting. You may need to create a suitable certificate first under Configuration > Object > Certificate > My Certificate.


What is the difference between Full Tunnel and Split Tunnel for IKEv2 VPN?

Under “Local Network”, you choose the tunnel mode:

• Full Tunnel: All network traffic from the remote VPN client is encrypted and sent through the VPN tunnel to the Zyxel Device. This includes traffic destined for the internal network and traffic destined for the Internet.

• Allow Client VPN Traffic Through WAN: Check this box to allow the client’s Internet traffic to exit through the Zyxel Device’s WAN connection. Clear it to block client Internet access via the tunnel.

• Split Tunnel: Only traffic destined for specific networks behind the Zyxel Device is encrypted and sent through the VPN tunnel. Select the local network interface (LAN, DMZ, guest) from the drop-down list. Traffic destined for the Internet from the remote client does not go through the Zyxel Device and is not encrypted by this VPN.

Note: Non-SecuExtender clients typically only support Full Tunnel configuration via this wizard/script provisioning.

How is the IP Address Pool assigned to IKEv2 VPN clients?

Under “Client Network > IP Address Pool”, you define the range of IP addresses assigned to connecting clients.

• Default Range (e.g., 192.168.50.1-192.168.50.250): Use the default range provided.

• Custom Defined: Select this to enter a specific Starting IP Address and Ending IP Address for the pool.


How are DNS servers assigned to IKEv2 VPN clients?

Under “Client Network”, you specify the DNS server(s) clients should use:

• First DNS Server:

• ZyWALL: The Zyxel Device acts as a DNS proxy.

• Custom Defined: Enter the IP address of a specific DNS server reachable from the network behind the Zyxel Device.

• Second DNS Server: Optionally enter a secondary DNS server IP address (checked if the first is unavailable).


What is the Upload Bandwidth Limit setting for IKEv2 VPN clients?

This setting allows you to limit the maximum upload bandwidth (from the client to the Zyxel Device network) for Zyxel subscription-based SecuExtender IPSec VPN clients (Windows 5.6.80.007+ or macOS 1.2.0.7+). Enter the limit in Kbps (1-1048576). This feature is not supported for non-SecuExtender clients configured via script provisioning. You can also change this limit later in Configuration > VPN > IPSec VPN > Configuration Provisioning.

How do I specify which users can connect via the IKEv2 VPN?

In the “User Authentication” step of the IKEv2 IPSec Client wizard:

1. A list of “Available” local users configured on the Zyxel Device is shown.

2. Select the user(s) you want to allow VPN access.

3. Click the right arrow button (>) to move them to the “Member” list.

Only users in the Member list will be permitted to authenticate and connect via this VPN rule. You can click “+ Add New User” to create a new local user directly.

Can I use users from external databases with this wizard?

The wizard itself only allows adding local users configured directly on the Zyxel Device to the allowed list (“Member” list). If you want to allow users from external databases (like RADIUS or Active Directory), you need to modify the VPN rule after completing the wizard. This is done in Expert Mode under Configuration > Object > User/Group > User (or Group) by adding the external user/group object and then associating it with the VPN rule.

What is the default rule name for the IKEv2 VPN created by the wizard?

The default name assigned to the VPN rule created by the IKEv2 IPSec Client wizard is “RemoteAccess_Wiz”. You can see this on the Summary screen. It’s recommended to change this name if you modify the rule outside the wizard later.

How do I provide configuration settings to non-SecuExtender IKEv2 VPN clients?

After completing the IKEv2 wizard and saving the rule, click “Non SecuExtender VPN Clients” on the left panel. This takes you to the “Config Provision” screen. From here, you can download VPN configuration scripts:

• For Windows, iOS, macOS clients: Click the appropriate download link, save the script file, and send it to the remote VPN user to install/run on their device.

• For Android clients: Install strongSwan on the Android device first. Then click the download link for Android, save the script file, and send it to the user along with the Pre-Shared Key (if used) for manual configuration within strongSwan.


What features are not supported for non-SecuExtender IKEv2 clients via script provisioning?

The VPN settings configured via downloaded scripts for non-SecuExtender clients (native OS clients, strongSwan) do not support:

• Upload Bandwidth Limit

• Split Tunnel (only Full Tunnel is configured via script)

• Two-factor Authentication (like Google Authenticator)


What settings are configured on the first screen for L2TP over IPSec VPN?

The initial VPN Configuration screen for L2TP over IPSec sets up the basic IPSec parameters:

• Pre-Shared Key: The secret key for IPSec authentication (8-128 alphanumeric or hex pairs starting with 0x).

• Incoming Interface: The WAN interface (physical like ge4 or logical like Domain Name/IPv4) that will accept the L2TP/IPSec connections.

• Local Network: Set to Full Tunnel. You can choose whether to “Allow L2TP traffic Through WAN” (allowing clients Internet access via the tunnel).


What tunnel mode is used for L2TP over IPSec VPN?

The Remote Access VPN Setup wizard configures L2TP over IPSec using only Full Tunnel mode. This means all traffic from the connected L2TP client is sent through the VPN tunnel.

How are IP addresses and DNS servers assigned to L2TP over IPSec VPN clients?

In the “Client Network” section of the L2TP over IPSec VPN configuration:

• IP Address Pool: Define the range of IP addresses assigned to clients (either the default 192.168.50.1-192.168.50.250 or a Custom Defined range).

• First DNS Server / Second DNS Server: Specify DNS servers for clients (either ZyWALL proxy or Custom Defined IPs).


How do I specify which users can connect via the L2TP over IPSec VPN?

In the “User Authentication” step:

1. Select allowed local users from the “Available” list.

2. Move them to the “Member” list using the arrow button.

Only users in the Member list can authenticate for the L2TP connection (which happens after the initial IPSec tunnel is established using the pre-shared key). You can add new local users via “+ Add New User”. External database users require configuration outside the wizard.

What is the default rule name for the L2TP over IPSec VPN created by the wizard?

The default name assigned by the wizard is “RemoteAccess_L2TP_Wiz”. This is shown on the Summary screen.

How do I provide configuration settings to L2TP over IPSec VPN clients?

The “Config Provision” screen for L2TP over IPSec provides download links for scripts:

• For Windows, iOS, macOS clients: Download the script file and send it to the user to run on their device.

• For Android and Windows 7 clients: These require manual configuration. You need to provide the user with the Pre-Shared Key and the Zyxel Device’s public IP address or domain name (from the Incoming Interface setting) so they can configure the L2TP over IPSec connection manually on their device.


Which L2TP clients require manual configuration?

Based on the Config Provision screen for L2TP over IPSec, Android and Windows 7 clients require manual configuration. Users will need the Pre-Shared Key and the Zyxel Device’s interface IP or domain name.

How do I start the Wireless Setup Wizard?

Click Wireless Setup in the main Quick Setup screen to begin the wireless setup wizard. Changes in the wizard are not saved until you save them in the Summary screen.

What are the options in the Quick Setup Wizard?

The Quick Setup Wizard provides the following options:

• WAN Interface: Walks you through getting your device connected online.

• Remote Access VPN Setup: Allows employees anywhere to securely connect to their company’s remote LAN.

• VPN Setup: Provides a simplified process for creating secure communications between nodes.

• Wireless Setup: Walks you through getting your device connected online via Wireless LAN.


How do I configure SSID settings in the Wireless Setup Wizard?

In the SSID screen of the Wireless Setup Wizard, you can manage internal WiFi networks:

1. Select a WiFi network and click Edit, or create a new one.

2. Configure the following fields:

• Activate: Check this box to enable the WiFi network.

• Wireless Name (SSID): Enter a unique name to identify the WiFi network.

• Outgoing Interface: Select the interface the wireless network uses to transmit packets.

• Security Mode: Select WPA2 to use WPA2 security with a Pre-Shared Key. Enter the key in the Pre-Shared Key field. Select Open if you do not want security (not recommended).

3. Click OK to save the settings and return to the wizard, or click Cancel to discard changes. Click Next to proceed to the Radio settings.


How do I configure Radio settings in the Wireless Setup Wizard?

In the Radio screen (Figures 177 & 178), configure the following for 2.4G and 5G bands:

• Band Mode: Select the wireless band (2.4GHz for 802.11b/g/n/ax, 5GHz for 802.11ax/ac/a/n).

• Channel Width: Select the channel bandwidth (20 MHz, 40 MHz, 80 MHz, 160 MHz, 320 MHz, or combinations like 20/40MHz). Select 20 MHz for environments with obstructions or interference, or if clients don’t support bonding. Note: The device may switch to lower bandwidth in poor SNR environments.

• Channel Selection: Choose DCS (Dynamic Channel Selection) for automatic channel selection based on interference, or Manual to specify a channel. DCS is not supported in repeater mode.

• Output Power: Set the transmission power. Higher power increases coverage but may cause interference.

Click Next to continue or Back to return to SSID settings.


How do I complete the Wireless Setup Wizard?

1. Review your settings on the Summary screen (Figure 179).

2. Click Save to apply the changes to the Zyxel Device.

3. Click Back if you need to make further changes.

4. The Wizard Completed screen (Figure 180) confirms your changes have been saved.

5. Click Close to exit the wizard.


What information is available on the Dashboard?

The Dashboard (Figure 181) displays general device information, system status, system resource usage, licensed service status, and interface status in widgets. You can view:

• System Resources: CPU Usage, Memory Usage, Flash Usage, USB Storage Usage, Active Sessions.

• Network Status: DHCP Table count, Number of Login Users, VPN Status, SSL VPN Status.

• Device Status: Virtual Device panel (front/rear panel status), Device Information (System Name, Serial Number, MAC Address, Firmware Version), System Status (Boot Status, Uptime, Date/Time), Tx/Rx Statistics, The Latest Logs.

You can rearrange, collapse, refresh, and close individual widgets. Clicking the OneSecurity icon provides guidance on configuration walkthroughs and troubleshooting.


How can I interpret the status of interfaces shown on the Dashboard Virtual Device panel?

When hovering over an interface on the Virtual Device panel (Figure 181, Table 24), the status indicates:

• Ethernet Interface:

• Inactive: Interface is disabled.

• Down: Interface is enabled but not connected, or has no associated physical ports.

• Speed / Duplex: Interface is enabled and connected, showing port speed and duplex (Full or Half).

• WLAN Card: Status is ‘none’.

• Cellular Interface: See Section 10.7 for possible statuses.

• Auxiliary Interface:

• Inactive: Interface is disabled.

• Connected: Interface is enabled and connected.

• Disconnected: Interface is enabled but not connected.

The Zone and IP Address/Mask for the interface are also displayed.

What information is shown in the Device Information widget on the Dashboard?

The Device Information widget (Figure 183, Table 25) displays:

• System Name: The name identifying the Zyxel Device on the network. Click the link to edit the Host Name.

• Serial Number: The unique serial number for device tracking and control.

• MAC Address Range: The MAC addresses used by the device’s physical ports.

• Firmware Version: The currently running firmware version and date. Click the link to access the Firmware Package screen for uploads.


What do the different Boot Status messages mean in the System Status widget?

The Boot Status in the System Status widget (Figure 184, Table 26) indicates the startup state:

• OK: Successful startup.

• Firmware update OK: Successful firmware update.

• Problematic configuration after firmware update: Configuration failed after firmware upgrade.

• System default configuration: Successfully applied system defaults (first start or intentional reset).

• Fallback to lastgood configuration: Failed to apply startup-config.conf, used lastgood.conf instead.

• Fallback to system default configuration: Failed to apply lastgood.conf, used system-default.conf instead.

• Booting in progress: System configuration application is ongoing.


How do I view Tx/Rx Statistics on the Dashboard?

The Tx/Rx Statistics widget (Figure 185, Table 27) displays a line graph showing transmission (Tx) and reception (Rx) speed (Mbps) over time for a selected physical port (e.g., P2). You can select the port using the Port Selection dropdown.

What information is shown in The Latest Logs widget?

The Latest Logs widget (Figure 186, Table 28) displays recent alert logs with the following details:

• #: Entry rank.

• Time: Date and time the log was created.

• Priority: Severity of the log.

• Category: Type of log generated.

• Message: The actual log message text.

• Source: Source IP address (if applicable).

• Destination: Destination IP address (if applicable).


How can I view detailed System Resource usage?

The System Resources widget (Figure 187, Table 29) shows current usage percentages for CPU, Memory, Flash, and USB Storage. It also shows the number of Active Sessions.

• Hover over CPU Usage or Memory Usage to see an icon; click it to view a historical usage chart (Figure 188).

• Hover over Active Sessions to see icons; click the Detail icon to go to the Session Monitor screen, or click the Show Active Sessions icon for a usage chart.

The System Resources Chart screen (Figure 188, Table 30) allows you to set a refresh interval for the chart.

How do I view and manage the DHCP Table from the Dashboard?

Click the number in the DHCP Table widget on the Dashboard to open the DHCP Table screen (Figure 189).

This screen (Table 31) shows IP addresses assigned to DHCP clients or reserved for specific MAC addresses. You can:

• Set a Refresh Interval for automatic updates or click Refresh Now to update immediately.

• View details: Interface, IP Address, Host Name, MAC Address, Expiration Time, Description.

• Identify static entries via the Reserve checkbox and Description field.

• Create a static entry: Select an existing dynamic entry, check the Reserve box, and click Apply.

• Remove a static entry: Select a static entry, uncheck the Reserve box, and click Apply.

• Click Cancel to close the window.


How do I view and manage logged-in users from the Dashboard?

Click the link in the Number of Login Users widget on the Dashboard to open the Number of Login Users screen (Figure 190).

This screen (Table 32 & Table 44) lists currently logged-in users. You can:

• View details: User ID, Reauth/Lease Time, Session Timeout, Type (login method), IP Address, User Info (account type/group), Created Date, Accounting Status, RADIUS Profile Name.

• Force Logout: Select a user row and click the Logout icon to end their session.

• Refresh: Click the Refresh button to update the list.


How do I view VPN status from the Dashboard?

• VPN Tunnel Status: Click the link in the VPN Status widget to view currently established VPN tunnels (Figure 192, Table 33). You can see the tunnel Name, Encapsulation type, and hash Algorithm. Set a Refresh Interval or click Refresh Now.

• SSL VPN Status: The SSL VPN Status widget (Figure 193) shows the current number of active SSL VPN tunnels versus the maximum allowed.

• VPN Overview (VPN Models): The VPN tab on the Dashboard (Figure 194) provides a detailed overview including:

• Connections/max per type (IPSec/L2TP/SSL).

• In/Out traffic (bps) per type.

• Number of connected tunnels per type (Site to Site/Dynamic/L2TP/SSL).

• Top 5 Logged in VPN Users (per country, per Service Type, online).

• Tunnel Health (Top 5 DPD Failures).

• Top 5 Connectivity Failures.

• Graphical tunnel statistics.

Click the Refresh icon to update this screen.


How do I monitor port statistics?

Go to Monitor > Traffic Statistics > Port Statistics (Figure 195, Table 34).

• Set the Poll Interval (1-60 seconds) and click Set Interval for automatic updates, or click Stop to halt updates.

• View statistics per port: Status (Down, Speed/Duplex), Transmitted Packets (TxPkts), Received Packets (RxPkts), Collisions, Transmission Speed (Tx B/s), Reception Speed (Rx B/s), Up Time.

• Click Switch To Graphic View to see a line graph of Tx/Rx speed over time for a selected port (Figure 196, Table 35). Set Refresh Interval or click Refresh Now on the graph view. Click Switch To Grid View to return to the table.


How do I view interface status and statistics?

Go to Monitor > Traffic Statistics > Interface Summary (Figure 197, Table 36). This screen lists all interfaces (Ethernet, Tunnel, IPv6) and their status and packet statistics.

• Interface Status (IPv4): View Name, Port/Binding, Status (Inactive, Down, Speed/Duplex, Connected, Disconnected, Up), Zone, IP Address/Netmask, IP Assignment (Static, DHCP Client), Services provided (DHCP, DDNS, RIP, OSPF), and Actions (Renew DHCP, Connect PPPoE/PPTP).

• Tunnel Interface Status: View Name, Status (Active/Inactive icon), Zone, IP Address, My Address, Remote Gateway Address, Mode.

• IPv6 Interface Status: Similar to IPv4 status, showing IPv6 addresses and services.

• Interface Statistics: Click Refresh to update packet stats. View Status, Transmitted Packets (TxPkts), Received Packets (RxPkts), Transmission Speed (Tx B/s), Reception Speed (Rx B/s) for each interface. Click the ‘+’ icon next to an interface name to view virtual interface details if applicable.


How do I use the Traffic Statistics screen?

Go to Monitor > Traffic Statistics > Traffic Statistics (Figure 198, Table 37). This screen requires manual start and stop for data collection.

1. Data Collection:

• Check the ‘Collect Statistics’ box and click Apply to start collecting data. The collection period will be displayed.

• Uncheck the box and click Apply to stop collection.

• Click Reset to revert to the last saved settings.

2. Statistics:

• Select the Interface to monitor.

• Choose the report type from the Sort By dropdown: Host IP Address/User, Service/Port, Web Site Hits, or Country.

• Click Refresh to update the displayed statistics report.

• Click Flush Data to discard all collected statistics for the screen and update the display.

The report shows ranked data based on the ‘Sort By’ selection, including direction (Ingress/Egress) and amount of traffic or hits. Note the limits on records, byte count, and hit count (Table 38).


What are the maximum values for Traffic Statistics reports?

Table 38 Maximum Values for Reports
LABEL DESCRIPTION
Maximum Number of Records 20
Byte Count Limit 264 bytes; this is just less than 17 million terabytes.
Hit Count Limit 264 hits; this is over 1.8 x 1019 hits.

How do I monitor active sessions?

Go to Monitor > Traffic Statistics > Session Monitor (Figure 199, Table 39). This screen displays established sessions passing through the device.

• Use the View dropdown to display sessions grouped by users, services, source IP, source region, destination IP, destination region, or view all sessions individually.

• When viewing ‘all sessions’, you can filter by User, Service, Source Address, Destination Address, Source Country, and Destination Country. Enter criteria and click Search.

• View session details: User, Service (protocol), Source IP/Port/Country, Destination IP/Port/Country, Rx Bytes, Tx Bytes, Duration (seconds).

• Click Refresh to update the list.

• To terminate sessions: Select one or more sessions and click Clear, or click Clear All to terminate all displayed sessions. Terminated sessions are logged in Log > View Log.


How do I view and manage the DHCP server table?

Go to Monitor > Network Status > DHCP Table (Figure 200, Table 40).

• Filter the list by selecting an Interface and/or entering a Keyword, then click Search.

• Click Reset to clear filters.

• View lease details: Interface, IP Address, Host Name, MAC Address, Expiration Time, Last Access Time, Description, Static (Yes/No).

• Release a dynamic lease: Select the entry and click Release.

• Reserve an IP (Static DHCP): Select a dynamic entry and click Reserve.

• Unreserve an IP (Make Static Dynamic): Select a static entry and click Unreserve.

• Export the table: Select entries and click Export to save as a CSV file. This file can be imported later in Configuration > Network > Interface > Ethernet/VLAN > DCHP Setting.


How do I use the Device Insight screen?

Go to Monitor > Network Status > Device Insight (Figure 202, Table 41) to view and manage clients connected to internal LAN/VLAN/DMZ networks (clients must be in the same IP subnet).

• View client details: Status (Online, Offline, Blocked, CDR Blocked), MAC/IP Address, Hostname, Manufacturer, Category, OS, Type, First/Last Seen, User, Auth Method, TX/RX Rate, Connected To, Description.

• Toggle Hide/Show Advanced Settings for more/less detail.

• Edit Description: Select a client and click Edit, or double-click the entry (Figure 203, Table 42). Enter a descriptive name and click OK.

• Remove inactive client: Select a client that is no longer connected and click Remove (cannot remove blocked clients).

• Block/Unblock client: Select a client and click Add to block list or Remove from block list.

• Provide Feedback: If a client is misidentified, select it and click Feedback (Figure 204, Table 43). Correct the Category, Operating System, or Type as needed and click OK to send feedback to Zyxel.


How do I view currently logged-in users?

Go to Monitor > Network Status > Login Users (Figure 205, Table 44).

• View user details: User ID, Reauth/Lease Time, Session Timeout, Login Type, IP Address, Country, MAC Address, User Info, Accounting Status, RADIUS Profile Name, Created Date.

• Force Logout: Select a user and click the Force Logout icon.

• Refresh: Click the Refresh button to update the list.


How do I monitor IGMP statistics?

Go to Monitor > Network Status > IGMP Statistics (Figure 206, Table 45). This screen shows information about multicast group memberships.

• View details: Group, Source IP, Incoming Interface, Packet Count, Bytes transferred, Outgoing Interface.

• Click Refresh to update the statistics.


How do I check the DDNS status?

Go to Monitor > Network Status > DDNS Status (Figure 207, Table 46).

• View status per profile: Profile Name, Domain Name, Effective IP (resolved IP), Last Update status (Successful/Updating), Last Update Time.

• Click Update next to an entry to force the Zyxel Device to attempt to resolve the IP address for that domain name and update the DDNS server.

• Click Refresh to update the displayed information.


How do I view IP/MAC Binding information?

Go to Monitor > Network Status > IP/MAC Binding (Figure 208, Table 47). This screen lists devices that received an IP from an interface with IP/MAC binding enabled AND have established a session.

• Select the Interface from the dropdown menu.

• View details: IP Address, Host Name, MAC Address, Last Access time, Description.

• Click Refresh to update the information.


How do I check the Cellular connection status?

Go to Monitor > Network Status > Cellular Status (Figure 209, Table 48).

• View basic status: Extension Slot, Connected Device model, Status (e.g., No device, No Service, Device detected, Active, Device ready, etc.), Service Provider, Cellular System type, Signal Quality.

• Click Refresh to update the status.

• For more details (requires attached/activated device), click More Information (Figure 210, Table 49). This shows Signal Strength (dBm), Device Manufacturer/Model/Firmware, IMEI/ESN, and SIM Card IMSI. Click Cancel to close the detailed view.


How do I view and manage UPnP Port Status?

Go to Monitor > Network Status > UPnP Port Status (Figure 211, Table 50). This screen shows NAT port mapping rules created by UPnP.

• View rule details: Remote Host (source IP), External Port, Protocol (TCP/UDP), Internal Port, Internal Client (IP or name), Internal Client Type, Description.

• Remove a rule: Select the entry and click Remove.

• Remove all rules: Click Delete All.

• Click Refresh to update the list.


How do I check USB Storage status?

Go to Monitor > Network Status > USB Storage (Figure 212, Table 51).

• View information: Device Description, Usage (used/total %), File System (shows Unknown if unsupported like NTFS), Speed, Status (Ready, Unused, none), Detail (Deactivated, OutofSpace, Mounting, Removing, none).

• If Status is Ready: Click Remove Now to safely unmount the device before removing it.

• If Status is Unused (and file system is supported): Click Use It to mount the device.


How do I view Ethernet Neighbor information?

Go to Monitor > Network Status > Ethernet Neighbor (Figure 213, Table 52). This uses LLDP (Smart Connect) to discover neighboring devices. Smart Connect must be enabled on the System > ZON screen.

• View discovered neighbor details: Local Port (on Zyxel Device), Model Name, System Name, Firmware Version, Port (first internal port on neighbor), IP Address, MAC Address.

• Click Refresh to update the information.


How do I view FQDN Object cache?

Go to Monitor > Network Status > FQDN Object (Figure 214, Table 53). This screen shows cached FQDN-to-IP mappings.

• View IPv4 or IPv6 cache lists separately.

• Select a configured FQDN Object from the dropdown to filter the list for related caches.

• View cache details: Name (of FQDN object), FQDN, IP Address (mapped IP), TTL (seconds remaining in cache).

• Click Refresh to update the displayed cache information.

Note: FQDN objects are configured in Configuration > Object > Address/Geo IP.


How do I monitor AP Radio List information?

Go to Monitor > Wireless > AP Information > Radio List (Figure 215, Table 54).

• View list of AP radios: Loading status, AP Description, Frequency Band, Channel ID, Tx Power, Station count, Rx/Tx bytes, Model, MAC Address, Radio number, Operating Mode.

• Click Refresh to update the list.

• Check ‘Enable Column Freeze’ to lock index columns while scrolling.

• Click the More Information icon for a selected radio to see detailed statistics (traffic, station count, SSID info, etc.) for the last 24 hours (Figure 216, Table 55). Click OK or Cancel to close the detailed view.


How do I view SSID information?

Go to Monitor > Wireless > SSID Info (Figure 217, Table 56).

• View information per SSID: Name, Number of connected clients on 2.4GHz/5GHz/6GHz bands, SSID Profile Name, Security Mode.

• Click the number link in the 2.4GHz, 5GHz, or 6GHz column to go to the Station Info > Station List screen, filtered for that SSID and band.

• Click Refresh to update the screen.


How do I view and filter the wireless station list?

Go to Monitor > Wireless > Station Info > Station List (Figure 218, Table 57).

• View connected station details: MAC Address, SSID Name, Associated AP, IP Address, Channel, Rx/Tx Rate, Signal Strength, Association Time, etc. Use Hide/Show Advanced Settings for more/less detail.

• Click Show Filter to reveal filtering options.

• Enter criteria: IP Address, SSID Name (multi-select), Security Mode (multi-select), Associated AP (multi-select), MAC Address, Band, Account, Login Type.

• Click Search to apply filters. Click Reset to clear filters.

• Click Refresh to update the list.

• Check ‘Enable Column Freeze’ to lock index columns.


How do I view top wireless station statistics?

• Top N Stations: Go to Monitor > Wireless > Station Info > Top N Stations (Figure 219, Table 58). Select View (Top 5 or Top 10 by Usage), Usage by (GB or MB), and Date range. The graph shows traffic usage for the top stations. Click Refresh to update.

• Single Station: Go to Monitor > Wireless > Station Info > Single Station (Figure 220, Table 59). Select the specific Station from the dropdown, Usage by (GB or MB), and Date range. The graph shows download and upload traffic for that station. Click Refresh to update.


How do I monitor and manage IPSec VPN connections?

Go to Monitor > VPN Monitor > IPSec (Figure 221, Table 60).

• View active IPSec Security Associations (SAs).

• Filter the list by Name or Policy using keywords or regular expressions (see Section 7.22.1 for regex help) and click Search.

• View SA details: User (if EAP/X-auth), System Name, SA Name, Policy, My Address, Secure Gateway, Up Time, Timeout remaining, Inbound Bytes, Outbound Bytes.

• Disconnect an SA: Select the SA and click Disconnect.

• Check Connection: Select the SA and click Connection Check.

• Click Refresh to update the list.


How do I monitor and manage SSL VPN connections?

Go to Monitor > VPN Monitor > SSL (Figure 222, Table 61).

• View active SSL VPN user connections.

• View details: User account, Access (application), Login Address, Connected Time, Inbound Bytes, Outbound Bytes.

• Terminate a connection: Select the user connection and click Disconnect. This removes the entry and deletes session information.

• Click Refresh to update the list.


How do I monitor and manage L2TP over IPSec VPN sessions?

Go to Monitor > VPN Monitor > L2TP over IPSec (Figure 223, Table 62).

• View connected L2TP VPN sessions.

• View details: User Name, Hostname, Assigned IP (tunnel IP), Public IP (user’s internet IP).

• Disconnect a session: Select the session and click Disconnect.

• Click Refresh to update the list.


How do I monitor Content Filter statistics?

Go to Monitor > Security Statistics > Content Filter. This screen has two tabs: Web Content Filter and DNS Content Filter.

• Enable Collection: On either tab, check ‘Collect Statistics’ and click Apply to start collecting data (Figure 224, 225; Table 63, 64). Collection starts from the displayed time. Statistics are erased on device restart or by clicking Flush Data.

• Update/Clear Stats: Click Refresh to update the display. Click Flush Data to discard all statistics for the current tab.

• Web Content Filter Tab (Table 63): View summary statistics like Total Web Pages Inspected, Blocked counts (by category, custom service, restricted features, forbidden sites, URL keywords), Warned count, and Passed count.

• DNS Content Filter Tab (Table 64): View summary statistics like Total DNS Inspected, Redirected count, and Passed count.

• Click Reset on either tab to return to last-saved settings.


How do I monitor Anti-Spam statistics and status?

Go to Monitor > Security Statistics > Anti-Spam. This has two tabs: Summary and Status.

• Summary Tab (Figure 226, Table 65):

• Enable Collection: Check ‘Collect Statistics’ and click Apply. Start time is displayed. Stats erased on restart/Flush Data.

• Update/Clear Stats: Click Refresh to update. Click Flush Data to discard stats.

• View Email Summary: Total Scanned, Safe Mails (Total, By White List), Spam Mails (Total, By Black List, By Malicious Mail, By DNSBL), Query Timeouts, Sessions Forwarded/Dropped (when threshold reached).

• View Statistics: Select Top Sender By (Sender IP or Sender Email Address) to see top spam sources and occurrence count.

• Click Reset to return to last-saved settings.

• Status Tab (Figure 227, Table 66):

• Resource Status: View Concurrent Mail Session Scanning load (current/max/historical high).

• Mail Scan Statistics: View queries, average response time, and no responses for Mail Scan and IP Reputation services.

• DNSBL Statistics: View queries, average response time, and no responses for configured DNSBL domains.

• Click Refresh to update status. Click Flush to clear DNSBL stats and the scanning historical high.


How do I view and filter logs?

Go to Monitor > Log > View Log (Figure 228, Table 67).

• View Logs: Regular logs display in black, alerts in red. Columns are sortable.

• Filter Logs: Click Show Filter. Select Category (All Logs, specific category, Debug Log). Optionally filter by Priority, Source/Destination Address, Source/Destination Interface, Service, Keyword, Protocol. Click Search to apply filters. Filter settings are saved if you navigate away.

• Email Logs: Click Email Log Now to send unsent logs matching configured active categories to configured email addresses.

• Refresh/Clear: Click Refresh to update the log view. Click Clear to delete the entire log.

• View Details: Time, Priority, Category, Message, Source, Destination, Note.


What features are available without a license?

You can use the following Zyxel Device features without purchasing a license (Table 68):

• MONITOR: Traffic Statistics, Wireless, VPN Monitor, Log.

• CONFIGURATION: Wireless, Network, VPN, BWM, Web Authentication, Security Policy, Object, System, Log & Report.

• MAINTENANCE: File Manager, Diagnostics, Packet Flow Explore, Shutdown/Reboot.

Note: Security services like Content Filtering, Anti-Spam, IDP, etc., require licenses.


How do I register my Zyxel Device and manage licenses?

Go to Configuration > Licensing > Registration.

• Register: Click the portal.myzyxel.com link (Figure 229) to register your device. Ensure the device has Internet access.

• Refresh Registration Status: After registering or making changes on the portal, click Refresh on the Registration tab (Figure 229) to update the ‘Device Registration Status’.

• View Service Status: Click the Service tab (Figure 231, Table 69) to see the Status (Activated, Expired, Not Licensed, etc.), Service Type (Standard, Trial), Expiration Date, and Count (if applicable) for your subscription services.

• Activate/Renew/Buy Licenses:

• Use the Action column on the Service tab: Click Buy to purchase a new license, or Renew to extend an expired Standard license. This usually involves going to the MyZyxel portal.

• If you have purchased an iCard (license key), register it on portal.myzyxel.com.

• After purchasing/registering, click Activate in the Action column (if available) or click the Service License Refresh button to update the license status on the device.

Note: License updates require TCP port 443 to be allowed outbound.


How do I configure the Built-in AP?

Go to Configuration > Wireless > Built-in AP. This area has two main tabs: General and Radio.

• General Tab (SSID Summary – Figure 232, Table 70):

• Manage SSIDs: Add, Edit, Activate, or Inactivate SSID profiles (up to 4).

• Quick Setup: Launch the Wireless Setup Wizard.

• Dynamic Channel Selection (DCS): Apply DCS to selected APs (if applicable, usually configured under Radio).

• Click Apply to save changes, Reset to discard.

• Radio Tab (Figure 234, Table 72): Configure 2.4GHz and 5GHz radio settings including 802.11 Band, Channel Width, Channel Selection (DCS/Manual), Output Power, advanced settings like Guard Interval, Aggregation, Thresholds, Beacon/DTIM intervals, Signal Thresholds, and Multicast settings.


How do I add or edit an SSID profile for the Built-in AP?

On the Configuration > Wireless > Built-in AP > General screen, click Add to create a new SSID profile, or select an existing profile and click Edit. This opens the Add/Edit SSID Profile screen (Figure 233, Table 71).

Configure the following main settings:

• Activate: Enable or disable the profile.

• SSID: Enter the network name (up to 32 characters).

• Band Mode: Choose 2.4 GHz or 5 GHz.

• Outgoing Interface: Select the LAN interface.

• Security Mode: Choose security type (e.g., open, wpa2, wpa3). Configure relevant settings like Pre-Shared Key (for Personal modes) or RADIUS settings (for Enterprise modes).

• Optional Settings: Configure QoS, Hidden SSID, Intra-BSS blocking, U-APSD, ARP Proxy, Scheduling, MAC Authentication, MAC Filtering, etc.

• Click OK to save the profile, or Cancel to discard.


What are the Security Mode options when configuring an SSID?

When editing an SSID profile (Table 71), you can select from:

• open: No security. Allows any client to connect without authentication.

• wep: Older, less secure encryption method.

• wpa2: Standard WPA2 security. Can be used in Personal (Pre-Shared Key) or Enterprise (802.1x/RADIUS) mode.

• wpa2-mix: Allows both WPA2 and older WPA clients to connect (transitional mode).

• wpa3: Latest security standard, offering enhanced protection. Can be used in Personal or Enterprise mode.

You must configure additional settings based on the chosen mode (e.g., Pre-Shared Key for Personal, RADIUS server settings for Enterprise).

How do I configure Radio settings for the Built-in AP?

Go to Configuration > Wireless > Built-in AP > Radio (Figure 234, Table 72). Configure settings for both 2.4GHz and 5GHz radios:

• 802.11 Band: Select the allowed Wi-Fi standards (e.g., 11b/g/n, 11ax for 2.4GHz; 11a/n, 11ac, 11ax for 5GHz).

• Channel Width: Set the channel width (e.g., 20MHz, 20/40MHz, 20/40/80MHz).

• Channel Selection: Choose DCS (automatic) or Manual. If Manual, specify the channel(s). Configure DCS options like Client Aware, Selection Method, Deployment, Time Interval/Schedule.

• Output Power: Set the transmission power (dBm).

• Advanced Settings: Configure Guard Interval, A-MPDU/A-MSDU Aggregation limits, RTS/CTS Threshold, Beacon Interval, DTIM period.

• Signal Threshold: Enable and set thresholds for minimum connection signal and dissociation signal strength. Configure retry options.

• Multicast Settings: Configure Transmission Mode (Multicast to Unicast / Fixed Rate) and the Multicast Rate (Mbps) if fixed.

• Click Apply to save changes, Reset to discard.


What is Dynamic Channel Selection (DCS)?

Dynamic Channel Selection (DCS), described in Section 9.3.1, allows the Zyxel Device’s built-in AP to automatically scan the surrounding area and select the radio channel with the least amount of interference. This helps optimize wireless performance in environments with multiple APs. You can configure how DCS operates, such as the scanning interval or schedule, and whether it avoids specific channels (like DFS channels in the 5GHz band). Examples of channel deployment strategies (Three-Channel, Four-Channel) are provided in Figures 235-237.

What is Wireless Load Balancing?

Wireless Load Balancing (Section 9.3.2) helps maintain bandwidth integrity in crowded areas by limiting connections to an AP. There are two types:

• Load balancing by station number: Limits the maximum number of devices that can connect to the AP.

• Load balancing by traffic level: Limits the total bandwidth usage allowed for connected devices. Connections are allowed as long as the total usage is below the configured cap.

When the limit (station number or traffic level) is reached, new connections may be rejected or delayed, potentially being directed to other nearby APs if available.

What are the different types of interfaces on the Zyxel Device?

The Zyxel Device supports various interface types (Section 10.1.2, Table 73):

• Ethernet: The foundation for most network connections, bound to physical ports or port groups.

• PPP: For Point-to-Point Protocol connections like PPPoE, PPTP, L2TP, typically requiring ISP accounts.

• Cellular: For connections using a mobile broadband card.

• VLAN: Logical interfaces that receive/send tagged frames, dividing a physical network into multiple logical ones. Each VLAN is associated with one Ethernet interface.

• Bridge: Software connection merging multiple Ethernet or VLAN interfaces into a single L2 segment.

• Tunnel: For Generic Routing Encapsulation (GRE), IPv6 in IPv4, or 6to4 tunnels.

• Virtual (VTI): Used for route-based VPNs (IPSec).

• Port Group: Hardware L2 connection grouping multiple physical ports (created via Port Role/Port Group screens).

• Trunk: Manages load balancing between multiple interfaces.


What are the relationships between different interface types?

Interfaces are often built on top of others (Table 74):

• Ethernet interfaces require a physical port or port group.

• VLAN interfaces require an Ethernet interface.

• Bridge interfaces require Ethernet or VLAN interfaces.

• PPP interfaces can be built on Ethernet, VLAN, or bridge interfaces (or specific WAN/OPT ports).

• Virtual interfaces (Ethernet, VLAN, Bridge) require the corresponding base interface type.

• Trunk interfaces require Ethernet, Cellular, VLAN, bridge, or PPP interfaces.

Note: You cannot create PPP or virtual interfaces on an interface that is part of a bridge. You also cannot add an interface to a bridge if it already has a PPP or virtual interface configured on it.


How do I configure Port Roles?

Go to Configuration > Network > Interface > Port Role (Figure 238). Use this screen to assign physical ports to specific ZONE interfaces (e.g., wan1, lan1, dmz). This creates a hardware-level (Layer 2) connection.

• Use the radio buttons in the matrix to select the desired ZONE interface for each physical port.

• Be aware that changing the role of a port you are connected through may change its IP address, potentially requiring you to adjust your computer’s IP or reconnect using the new interface IP.

• Click Apply to save changes.

• Click Reset to revert to the last saved configuration.

Note: This feature may not be available on all models.


How do I configure Port Groups?

Assigning multiple physical ports to the same network interface (using the Port Role screen) automatically creates a port group. You can view these groupings in Configuration > Network > Interface > Port Group (Figure 239). Port groups act as a Layer 2 switch for the included ports. You can assign these logical port group interfaces (e.g., ge1, ge2) to Ethernet interfaces. Click Apply to save changes or Reset to revert. Note: This feature relates to port roles and may not be available on all models.

How do I configure physical port settings?

Go to Configuration > Network > Interface > Port Configuration (Figure 240, Table 76).

• Select a port entry and click Edit.

• In the Settings dropdown, choose the desired speed and duplex mode:

• Auto Negotiate (Recommended): Allows the port to automatically determine the best speed/duplex with its peer.

• Manual Settings (e.g., 1000Mbps-Full Duplex, 100Mbps-Full Duplex, 100Mbps-Half Duplex, etc.): Forces the port to use the selected mode. Ensure the peer port is configured identically if not using Auto Negotiate.

• Click OK in the edit window.

• Click Apply on the main screen to save changes.

• Click Reset to revert to the last saved configuration.

Note: Speed and duplex cannot be configured for fiber ports.


How do I manage Ethernet interfaces?

Go to Configuration > Network > Interface > Ethernet (Figure 243, Table 77).

• View Interfaces: See both IPv4 (Configuration) and IPv6 (IPv6 Configuration) interfaces, their status, name, description, IP address, and mask.

• Edit: Select an interface and click Edit (or double-click) to configure its settings (IP assignment, parameters, RIP, OSPF, DHCP, etc. – see Section 10.5.1, Figure 245).

• Activate/Inactivate: Select an interface and click Activate or Inactivate to enable/disable it.

• Create Virtual Interface: Select a base Ethernet interface and click Create Virtual Interface to add a virtual interface on top of it.

• Remove Virtual Interface: Select a virtual interface (e.g., lan1:1) and click Remove.

• References: Select an interface and click References to see where it’s used in the configuration.

• Apply/Reset: Click Apply to save changes, Reset to revert.

Important Note: Ensure WAN and LAN IPv4 subnets do not conflict. The device may automatically change the default LAN subnet (e.g., 192.168.1.0/24 to 192.168.10.0/24) upon detecting a conflict with the WAN IP if the LAN is still using default settings (Figure 241, 242).


How do I edit Ethernet interface settings?

Go to Configuration > Network > Interface > Ethernet, select an interface, and click Edit (Figure 245). Key configuration areas include:

• General Settings: Enable/disable the interface.

• Interface Properties: View/set Type, Name, Port, Zone, MAC Address (Use Default, Overwrite, Clone), Description.

• IP Address Assignment:

• Get Automatically (DHCP Client): Obtain IP, subnet mask, gateway via DHCP. Can configure DHCP Option 60.

• Use Fixed IP Address: Manually assign IP Address, Subnet Mask, Gateway.

• Set Metric (routing priority, lower is preferred).

• Enable IGMP Support: Configure as IGMP Upstream or Downstream for IGMP Proxy (Section 10.5.1.1).

• Interface Parameters: Set Egress/Ingress Bandwidth limits (Kbps), MTU size (Bytes).

• Connectivity Check: Enable checks (ICMP/TCP/HTTP) to verify gateway or specified addresses are reachable. Configure Check Method, Period, Timeout, Fail Tolerance.

• RIP Setting: Enable RIP, set Direction (Send/Receive/Both), Send/Receive Versions, V2-Broadcast.

• OSPF Setting: Assign to OSPF Area, set Priority, Link Cost, Passive Interface option, Authentication.

• MAC Address Setting: Choose to use default, overwrite, or clone MAC address.

• Proxy ARP: Enable and add IP addresses for which the device should answer ARP requests.

• Related Setting: Link to configure PPPoE/PPTP if applicable.

• Click OK to save changes to the interface, then Apply on the summary screen.


How do I configure an internal Ethernet interface?

To configure an internal Ethernet interface on the USG FLEX 50(AX), navigate to Configuration > Network > Interface > Ethernet and select the interface to edit (e.g., lan1). The following settings can be configured:

General Settings:

Enable Interface: Check this box to enable the interface.

Interface Properties:

Interface Type: Set to ‘internal’.

Interface Name: e.g., lan1 (read-only for default interfaces).

Port: Displays the physical ports assigned (e.g., P3, P4, P5).

Zone: Select the security zone (e.g., LAN1).

MAC Address: Displays the interface’s MAC address (read-only).

Description: Enter an optional description.

IP Address Assignment:

IP Address: Enter the static IP address for this interface (e.g., 192.168.1.1).

Subnet Mask: Enter the subnet mask (e.g., 255.255.255.0).

Enable IGMP Support: Optionally enable IGMP proxy functions (Upstream/Downstream).

Interface Parameters:

Egress Bandwidth: Set the outgoing bandwidth limit (Kbps).

Ingress Bandwidth: Set the incoming bandwidth limit (Kbps).

MTU: Set the Maximum Transmission Unit size in bytes (e.g., 1500).

Connectivity Check (Optional):

Enable Connectivity Check: Check to enable.

Check Method: Select ‘icmp’ or ‘tcp’.

Check Period: Enter the interval in seconds (5-600).

Check Timeout: Enter the timeout in seconds (1-10).

Check Fail Tolerance: Enter the number of failures before considering the connection down (1-10).

Check These Addresses: Specify IP addresses or domain names to check.

Probe Succeeds When: Choose if ‘any one’ or ‘all’ addresses must respond.

DHCP Setting:

DHCP: Select ‘DHCP Server’.

IP Pool Start Address: Enter the starting IP address for the DHCP pool (e.g., 192.168.1.33).

Pool Size: Enter the number of addresses in the pool (e.g., 200).

First/Second/Third DNS Server: Configure DNS servers for clients (e.g., ZyWALL, None, Custom).

First/Second WINS Server (Optional): Configure WINS servers.

Default Router: Set the default gateway for clients (e.g., lan1 IP).

Lease Time: Set the DHCP lease duration (e.g., infinite, 2 days).

Extended Options (Optional): Add custom DHCP options.

PXE Server (Optional):

PXE Server: Enter the IP address of the PXE server.

PXE Boot Loader File: Enter the boot loader filename.

IP/MAC Binding (Optional):

Enable IP/MAC Binding: Check to enforce IP/MAC binding.

Enable Logs for IP/MAC Binding Violation: Check to log violations.

Static DHCP Table: Add static DHCP entries (IP, MAC, Description).

RIP Setting (Optional):

Enable RIP: Check to enable RIP.

Direction: Select BiDir, In-Only, or Out-Only.

Send/Receive Version: Select RIP version (1, 2, or 1 and 2).

V2-Broadcast: Optionally enable broadcast for RIPv2.

OSPF Setting (Optional):

Area: Select the OSPF area or ‘none’ to disable.

Priority: Set the OSPF priority (0-255).

Link Cost: Set the OSPF cost (1-65535).

Passive Interface: Check to make the interface passive.

Authentication: Configure OSPF authentication (None, Text, MD5).

Click OK to save the settings.


How do I configure an OPT (general) Ethernet interface?

To configure an OPT (general) Ethernet interface on the USG FLEX 50(AX), navigate to Configuration > Network > Interface > Ethernet and select the interface to edit (e.g., opt on P6). Set the Interface Type to ‘general’. Configure the following settings:

General Settings:

Enable Interface: Check this box.

Interface Properties:

Interface Type: ‘general’.

Interface Name: e.g., opt.

Port: Displays the physical port (e.g., P6).

Zone: Select the security zone (e.g., OPT).

MAC Address: Displays the MAC address.

Description: Optional description.

IP Address Assignment:

Get Automatically: Select this to obtain an IP via DHCP. Optionally specify DHCP Option 60.

Use Fixed IP Address: Select this to assign a static IP.

IP Address: Enter static IP (e.g., 0.0.0.0 if unused or a specific IP).

Subnet Mask: Enter static subnet mask.

Gateway: Enter static default gateway IP.

Metric: Set the metric for the gateway (0-15).

Enable IGMP Support: Optional.

Interface Parameters:

Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).

MTU: Set MTU size (Bytes).

Connectivity Check (Optional): Configured similarly to the internal interface.

DHCP Setting:

DHCP: Usually set to ‘None’ for a general interface unless acting as a relay or server for a specific scenario.

Enable IP/MAC Binding: Optional.

Static DHCP Table: Optional.

RIP Setting (Optional): Configure as needed.

OSPF Setting (Optional): Configure as needed.

MAC Address Setting:

Use Default MAC Address: Use the factory default MAC.

Overwrite Default MAC Address: Manually specify a MAC or clone from a host.

Proxy ARP (Optional):

Enable Proxy ARP: Check to enable.

Add IP Address/Range: Define target IP addresses for ARP responses.

Related Settings: Optionally configure PPPoE/PPTP, WAN TRUNK, or Policy Route.

Click OK to save.


What are the configurable fields when editing an Ethernet interface?

The following table describes the fields available when editing an Ethernet interface under Configuration > Network > Interface > Ethernet > Edit. Note that availability depends on the Interface Type selected (internal, external, general) and whether IPv4/IPv6 views are active.

General Settings

Enable Interface: Enable or disable the interface.

General IPv6 Setting

Enable IPv6: Enable or disable IPv6 on this interface.

Interface Properties

Interface Type: Select internal, external, or general (configurable for OPT interface only). Determines automatic configuration adjustments (routing, SNAT, DHCP options).

Interface Name: Specify a unique name (alphanumeric, hyphens, underscores, up to 11 characters).

Port: Displays the physical port name (read-only).

MAC Address: Displays the interface’s MAC address (read-only).

Description: Optional description (up to 60 characters).

IP Address Assignment (IPv4)

Get Automatically: (External/General) Use DHCP to get IP configuration.

DHCP Option 60: (External/General with Get Auto) Specify Vendor Class Identifier (VCI) string for DHCP server identification.

Use Fixed IP Address: (External/General) Manually configure IP settings.

IP Address: Enter the IPv4 address.

Subnet Mask: Enter the IPv4 subnet mask.

Gateway: (External/General) Enter the default gateway IP address.

Metric: (External/General) Set the gateway priority (lower number = higher priority).

Enable IGMP Support: Enable IGMP proxy functionality.

IGMP Upstream: Enable on the interface connecting towards the multicast server.

IGMP Downstream: Enable on the interface connecting to multicast hosts.

IPv6 Address Assignment

Enable Stateless Address Auto-configuration (SLAAC): Generate IPv6 address from prefix obtained from an IPv6 router.

Link-Local Address: Displays the generated IPv6 link-local address (read-only).

IPv6 Address/Prefix Length: Enter a static IPv6 address and prefix length (optional).

Gateway: Enter the IPv6 default gateway address.

Metric: Set the IPv6 gateway priority.

Address from DHCPv6 Prefix Delegation: Configure prefix delegation.

Delegated Prefix: Select a DHCPv6 request object.

Suffix Address: Enter the suffix and prefix length to append to the delegated prefix.

Address: Displays the combined IPv6 address (read-only after saving).

DHCPv6 Setting

DHCPv6: Select N/A, Client, Server, or Relay.

DUID: Displays the DHCP Unique Identifier.

DUID as MAC: Generate DUID from default MAC address.

Customized DUID: Enter a custom DUID.

Enable Rapid Commit: Shorten DHCPv6 message exchange (requires client support).

Information Refresh Time: (Client) Seconds to wait before refreshing info.

Request Address: (Client) Request an IPv6 address from the server.

DHCPv6 Request/Lease Options: Configure options to request (Client) or offer (Server).

Relay Server: (Relay) Specify DHCPv6 server IP address.

IPv6 Router Advertisement Setting

Enable Router Advertisement: Enable periodic RA messages.

Advertised Hosts Get Network Configuration From DHCPv6: Indicate hosts should use DHCPv6 for network settings.

Advertised Hosts Get Other Configuration From DHCPv6: Indicate hosts should use DHCPv6 for DNS information.

Router Preference: Set router preference (Low, Medium, High).

MTU (IPv6): Set IPv6 Maximum Transmission Unit.

Hop Limit: Set IPv6 hop limit.

Advertised Prefix Table: Configure fixed IPv6 prefixes to advertise.

Advertised Prefix from DHCPv6 Prefix Delegation: (Internal) Configure network prefix using a delegated prefix.

Interface Parameters (IPv4/IPv6)

Egress Bandwidth: Outgoing bandwidth limit (Kbps).

Ingress Bandwidth: Incoming bandwidth limit (Kbps).

MTU: Maximum Transmission Unit (Bytes).

Connectivity Check (IPv4 – External/General)

Enable Connectivity Check: Enable the check.

Check Method: Select icmp or tcp.

Check Period: Interval in seconds (5-600).

Check Timeout: Timeout in seconds (1-10).

Check Fail Tolerance: Number of failures before marking down (1-10).

Check Default Gateway: Use the default gateway for the check.

Check this address: Specify a custom IP or domain name for the check.

Check Port: (TCP only) Specify the port number.

Check These Addresses: Specify up to two IPs or domain names.

Probe Succeeds When: Select ‘any one’ or ‘all’ for multi-address checks.

DHCP Setting (IPv4 – Internal/General)

DHCP: Select None, DHCP Relay, or DHCP Server.

Relay Server 1 / Relay Server 2: (Relay) Specify DHCP server IPs.

IP Pool Start Address: (Server) Starting IP of the pool.

Pool Size: (Server) Number of IPs in the pool.

DNS Server(s): (Server) Specify DNS servers for clients (Custom Defined, From ISP, Zyxel Device).

WINS Server(s): (Server) Specify WINS servers.

Default Router: (Server) Specify default gateway for clients (Interface IP, Custom Defined).

Lease Time: (Server) Set lease duration (infinite, days/hours/minutes).

Extended Options: (Server) Configure additional DHCP options.

PXE Server (IPv4 – Internal)

PXE Server: IP address of the PXE server.

PXE Boot Loader File: Filename of the boot loader.

IP/MAC Binding (IPv4 – Internal/General)

Enable IP/MAC Binding: Enforce static IP/MAC mapping.

Enable Logs for IP/MAC Binding Violation: Log binding violations.

Static DHCP Table: Configure static IP assignments based on MAC address.

Import/Export: Import/Export static DHCP entries via CSV.

RIP Setting (IPv4/IPv6)

Enable RIP: Enable RIP protocol.

Direction: BiDir, In-Only, Out-Only.

Send Version: RIP version for sending (1, 2, 1 and 2).

Receive Version: RIP version for receiving (1, 2, 1 and 2).

V2-Broadcast: Use broadcast instead of multicast for RIPv2.

OSPF Setting (IPv4/IPv6)

Area: OSPF area ID or ‘none’.

Priority: OSPF router priority (0-255).

Link Cost: OSPF interface cost (1-65535).

Passive Interface: Prevent sending OSPF hellos.

Authentication: Configure OSPF authentication (Same-as-Area, None, Text, MD5).

MAC Address Setting (External/General)

Use Default MAC Address: Use the factory MAC.

Overwrite Default MAC Address: Specify a custom MAC or clone from host.

Proxy ARP (IPv4 – External/General)

Enable Proxy ARP: Enable the feature.

Add: Add target IP addresses or ranges for which the device will answer ARP requests.

Related Settings

Configure PPPoE/PPTP: Link to PPPoE/PPTP configuration.

Configure WAN TRUNK: Link to WAN Trunk configuration.

Configure Policy Route: Link to Policy Route configuration.


How does Proxy ARP work?

Proxy ARP (Address Resolution Protocol), as defined in RFC 1027, allows the Zyxel Device to answer external interface ARP requests on behalf of a device located on one of its internal interfaces (Ethernet, VLAN, or Bridge).

Normally, ARP requests are broadcast only within the same subnet. If a host (Sender) on an external network (e.g., WAN Subnet A) needs the MAC address of a target IP address that resides on an internal network (e.g., LAN Subnet B) with the same network IP range, its ARP broadcast won’t reach the target because routers don’t forward these layer-2 broadcasts.

When Proxy ARP is enabled on the Zyxel Device’s external interface, and the target IP address matches an entry configured in the Proxy ARP list:

1. The Zyxel Device receives the ARP request from the Sender on its external interface.

2. Instead of forwarding the broadcast, the Zyxel Device replies to the ARP request using its own external interface’s MAC address.

3. The Sender updates its ARP table, associating the target IP address with the Zyxel Device’s external MAC address.

4. Subsequent packets from the Sender destined for the target IP address are sent to the Zyxel Device’s external MAC address.

5. The Zyxel Device receives these packets and forwards them to the actual target device on the internal network.

To configure it, you need to enable Proxy ARP on the external/general interface and add the specific internal IP addresses (or ranges/CIDR blocks) that the Zyxel Device should respond for.


How do I add a Proxy ARP entry?

1. Navigate to the interface configuration screen (e.g., Configuration > Network > Interface > Ethernet > Edit for the WAN/OPT interface). 2. Go to the Proxy ARP section. 3. Ensure ‘Enable Proxy ARP’ is checked. 4. Click the ‘Add’ button. 5. In the ‘Add Proxy ARP Address’ window:

Interface Name: This field shows the interface you are configuring (read-only).

Address Type: Select the type of target address:

IPv4 Address: For a single host IP.

IPv4 CIDR: For a subnet (e.g., 192.168.1.0/24).

IPv4 Range: For a range of IPs (e.g., 192.168.1.100-192.168.1.150).

Enter the target IP address information based on the selected type.

6. Click OK to add the entry. 7. Click OK on the main interface edit screen to save the changes.

How do I create a Virtual Interface?

Virtual interfaces add secondary IP addresses to existing physical (Ethernet, VLAN, Bridge) interfaces. They share the MTU and bandwidth settings of the underlying interface but require manual IP configuration. 1. Navigate to the summary screen for the underlying interface type (e.g., Configuration > Network > Interface > Ethernet). 2. Click the ‘Create Virtual Interface’ icon (often looks like a plus sign on the interface entry or nearby). Alternatively, some summary screens might have a dedicated button. 3. The ‘Create Virtual Interface’ screen appears. 4. Configure the following:

Interface Properties:

Interface Name: Automatically derived from the underlying interface (e.g., wan2:1). (Read-only)

Description: Enter an optional description.

IP Address Assignment:

IP Address: Enter the static IP address for this virtual interface.

Subnet Mask: Enter the subnet mask for this virtual interface.

Gateway: Enter the default gateway IP address (optional, must be on the same network).

Metric: Enter the priority for the gateway (0-15).

5. Click OK to create the virtual interface.

How do I use the References screen?

When a configuration screen includes a ‘References’ icon or button (often next to configurable objects like interfaces, address objects, service objects, etc.): 1. Select the configuration object (e.g., an interface name like ‘ge1’ or an address object like ‘MyServer’) in the list or table. 2. Click the ‘References’ icon/button. 3. The References screen opens, displaying a list of other configuration settings that currently use the selected object.

The screen typically shows:

Name (at the top): The object you selected.

#: Sequential number.

Service: The type of configuration using the object (e.g., Policy Route, Security Policy, NAT Rule). Clicking the service name often navigates to that configuration section.

Priority: The position of the item in its list, if applicable (e.g., policy route number).

Name: The specific name of the configuration item using the object (e.g., the policy route name).

Description: The description of the configuration item, if configured.

You can use the Refresh button to update the list. Click Cancel to close the References screen.

This screen is useful for understanding where an object is used before deleting or modifying it, helping to avoid unintended consequences.


How do I add or edit DHCPv6 Request/Lease Options?

1. Navigate to the interface configuration screen (e.g., Configuration > Network > Interface > Ethernet > Edit). 2. In the DHCPv6 Setting section, ensure DHCPv6 is set to either ‘Client’ or ‘Server’. 3. Locate the ‘DHCPv6 Request Options’ table (for Client mode) or ‘DHCPv6 Lease Options’ table (for Server mode). 4. To add an option:

Click the ‘Add’ button below the table.

The ‘Add Request Object’ (or similar) window appears.

Select one object: Choose a pre-configured DHCPv6 request or lease object from the dropdown list. You may need to create these objects beforehand (e.g., via the ‘Create new Object’ button on the main interface screen if available, or in the Object > DHCPv6 Option menu).

Click OK.

5. To edit an option: This typically involves editing the referenced DHCPv6 request/lease object itself in the Object menu, not directly in this table. 6. To remove an option:

Select the entry in the table.

Click the ‘Remove’ button below the table.

7. Click OK on the main interface edit screen to save changes.

How do I add or edit DHCP Extended Options (Option 43, 66, etc.)?

These options are configured for an interface acting as a DHCPv4 server. 1. Navigate to the interface configuration screen (e.g., Configuration > Network > Interface > Ethernet > Edit). 2. In the DHCP Setting section, ensure DHCP is set to ‘DHCP Server’. 3. Expand the ‘Advance’ section within DHCP Setting if necessary. 4. Locate the ‘Extended Options’ table. 5. To Add an option:

Click the ‘Add’ button.

The ‘Add DHCP Option’ window appears.

Option: Select the desired DHCP option from the dropdown list (e.g., TFTP Server Name (66), VIVC (124), SIP Server (120)) or select ‘User Defined’ for custom options.

Name: Displays the standard name or allows you to enter a name for ‘User Defined’.

Code: Displays the standard option code or allows you to enter a code for ‘User Defined’.

Type: Displays the required data type (e.g., TEXT, IP, BOOLE) or allows selection for ‘User Defined’.

Value: Enter the appropriate value based on the selected option and type. For options requiring IP addresses (like TFTP Server, NTP Server, SIP Server), you can enter one or more IPs.

Click OK.

6. To Edit an option:

Select the option in the table.

Click the ‘Edit’ button.

Modify the values in the ‘Edit DHCP Option’ window.

Click OK.

7. To Remove an option:

Select the option in the table.

Click the ‘Remove’ button.

8. Click OK on the main interface edit screen to save changes. Available Standard Options (Table 83):
OPTION NAMECODEDESCRIPTION
Time Offset2Specifies the offset of the client’s subnet in seconds from Coordinated Universal Time (UTC).
Time Server4Specifies a list of Time servers available to the client.
NTP Server42Specifies a list of the NTP servers available to the client by IP address.
TFTP Server Name66Used to identify a TFTP server when the “sname” field has been used for other DHCP options. Min length 1.
Bootfile67Used to identify a bootfile when the “file” field has been used for other DHCP options. Min length 1.
SIP Server120Carries an IPv4 address or DNS domain name for SIP client server location.
VIVC124Vendor-Identifying Vendor Class option. Identifies vendor hardware/software.
VIVS125Vendor-Identifying Vendor-Specific option. Exchange vendor-specific information.
CAPWAP AC138CAPWAP Access Controller addresses option. List of IPv4 addresses for WTPs to discover ACs.
TFTP Server150Contains one or more IPv4 addresses for TFTP server(s). Used for VoIP config download, etc.

How do I configure a PPP (PPPoE/PPTP/L2TP) interface?

Note: You must first create an ISP Account object (Configuration > Object > ISP Account) corresponding to your provider’s settings (PPPoE, PPTP, or L2TP, username, password, etc.). 1. Navigate to Configuration > Network > Interface > PPP. 2. Click ‘Add’ to create a new PPP interface. 3. Configure the following settings in the ‘Add PPPoE/PPTP’ screen:

General Settings:

Enable Interface: Check to enable.

General IPv6 Setting (Optional):

Enable IPv6: Check to enable IPv6 over this PPP interface.

Interface Properties:

Interface Name: Enter a name (up to 11 characters).

Base Interface: Select the physical interface (e.g., wan1, sfp) this PPP connection runs over.

Zone: Select the security zone (e.g., WAN).

Description: Optional description.

Connectivity:

Nailed-Up: Connection is always active.

Dial-on-Demand: Connection activates only when traffic needs to pass.

ISP Setting:

Account Profile: Select the pre-configured ISP Account object.

Protocol, User Name, Service Name: Displayed from the selected profile (read-only).

IP Address Assignment (IPv4):

Get Automatically: Obtain IP address from the ISP automatically (most common).

Use Fixed IP Address: Manually specify an IP address provided by the ISP.

IP Address: (Fixed IP only) Enter the static IP.

Gateway: (Fixed IP only, Advanced) Enter gateway IP if needed (usually not required for PPP).

Metric: Set the priority for the gateway (0-15).

IPv6 Address Assignment (if IPv6 enabled):

Enable Stateless Address Auto-configuration (SLAAC): Obtain IPv6 address automatically.

Metric: Set IPv6 gateway priority (0-15).

Address from DHCPv6 Prefix Delegation (Advanced): Configure if your ISP provides a prefix via DHCPv6-PD.

DHCPv6 Setting (if IPv6 enabled):

DHCPv6: Select ‘Client’ to act as a DHCPv6 client or ‘N/A’.

DUID: Configure DUID settings (DUID as MAC / Customized DUID).

Enable Rapid Commit: Optional.

Request Address: Request an IPv6 address via DHCPv6.

DHCPv6 Request Options: Add DHCPv6 request objects.

Interface Parameters:

Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).

MTU: Set Maximum Transmission Unit (Bytes, e.g., 1492 for PPPoE).

Connectivity Check (Optional):

Enable Connectivity Check: Enable the check.

Configure Method, Period, Timeout, Fail Tolerance, Check Default Gateway / Check this address similar to Ethernet interfaces.

Related Setting: Configure WAN TRUNK or Policy Route if needed.

4. Click OK to save the PPP interface configuration.

How do I configure a Cellular interface?

Note: Ensure a compatible mobile broadband USB dongle is connected and your device is registered at portal.myzyxel.com for potential firmware/driver updates. 1. Navigate to Configuration > Network > Interface > Cellular. 2. Click ‘Add’ (or select an existing entry and click ‘Edit’). 3. If adding, a ‘Slot selection’ pop-up may appear. Choose the USB slot where the dongle is connected (e.g., USB 1) and click OK. 4. Configure the following in the ‘Add/Edit Cellular configuration’ screen:

General Settings:

Enable Interface: Check to enable.

Interface Properties:

Interface Name: Enter a name (e.g., cellular1).

Zone: Select the security zone (e.g., WAN).

Extension Slot: Displays the selected USB slot (read-only).

Connected Device: Displays the detected dongle model (read-only).

Description: Optional description.

Connectivity:

Nailed-Up: Connection is always active.

Idle timeout: Set time in seconds (0-360) before disconnecting an idle connection (0 = disabled).

ISP Settings:

Profile Selection: Choose ‘Device’ to use profiles stored on the dongle (select Profile 1 unless instructed otherwise) or ‘Custom’ to manually configure.

APN: (Custom or if not on device profile) Enter the Access Point Name provided by your carrier.

Dial String: (Custom or if not on device profile, GSM only) Enter the dial string if provided by your carrier (often includes APN).

Authentication Type: (Custom or if not on device profile) Select None, CHAP, or PAP as required by your carrier.

User Name / Password: (Custom or if not on device profile) Enter credentials if required by your carrier.

SIM Card Setting:

PIN Code: Enter the SIM card PIN if required. Enter it twice (Retype to Confirm).

Interface Parameters:

Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).

MTU: Set Maximum Transmission Unit (Bytes, e.g., 1492).

Connectivity Check (Optional): Configure similarly to Ethernet interfaces.

IP Address:

Get Automatically: Obtain IP address from the carrier (most common).

Use Fixed IP Address: Manually specify a static IP if provided by the carrier.

Metric: Set the gateway priority (0-15).

Device Settings (Advanced):

Network Selection: Choose ‘auto’ or manually select network type (e.g., LTE only, WCDMA only) if supported by the dongle.

Band Selection: Choose ‘auto’ or manually select frequency bands if supported.

Budget Setup (Optional):

Enable Budget Control: Check to enable usage limits.

Time Budget: Set monthly hour limit.

Data Budget: Set monthly Mbyte limit (Download/upload/both).

Reset counters on: Select day of the month to reset counters.

Actions when over budget: Configure logging, new connection behavior (Allow/Disallow), current connection behavior (Keep/Drop).

Actions when over % budget: Configure actions when a percentage threshold is reached.

5. Click OK to save the configuration.

How do I configure a Tunnel interface (GRE, IPv6-in-IPv4, 6to4)?

1. Navigate to Configuration > Network > Interface > Tunnel. 2. Click ‘Add’ to create a new tunnel interface. 3. Configure the following in the ‘Add corresponding’ screen:

General Settings:

Enable: Check to enable the interface.

Interface Properties:

Interface Name: Enter a name (e.g., tunnel0, tunnel1…).

Zone: Select the security zone (e.g., TUNNEL, IPSEC_VPN).

Tunnel Mode: Select GRE, IPv6-in-IPv4, or 6to4.

IP Address Assignment (for GRE):

IP Address: Enter the IPv4 address for this end of the GRE tunnel.

Subnet Mask: Enter the subnet mask for the tunnel interface.

Metric: Enter the metric for routing purposes (0-15).

IPv6 Address Assignment (for IPv6-in-IPv4 or 6to4):

IPv6 Address/Prefix Length: Optionally enter a static IPv6 address and prefix length for the tunnel interface.

Metric: Enter the metric for routing purposes (0-15).

6to4 Tunnel Parameter (for 6to4):

6to4 Prefix: Enter the IPv6 prefix of the destination network.

Relay Router: Enter the IPv4 address of a 6to4 relay router.

Remote Gateway Prefix: Enter the IPv4 network address and bits of a remote 6to4 gateway.

Gateway Settings:

My Address: Select the source ‘Interface’ or specify a source ‘IP Address’ used to identify this end of the tunnel.

Remote Gateway Address: Enter the IP address or domain name of the remote tunnel endpoint. (Displays ‘Automatic’ for 6to4).

Interface Parameters:

Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).

MTU: Set Maximum Transmission Unit (Bytes, e.g., 1476 for GRE).

Connectivity Check (for GRE, Optional): Configure similarly to Ethernet interfaces.

Related Setting: Configure WAN TRUNK or Policy Route if needed.

4. Click OK to save the tunnel interface.

How do I configure a VLAN interface?

1. Navigate to Configuration > Network > Interface > VLAN. 2. Click ‘Add’ to create a new VLAN interface. 3. Configure the following in the ‘Add VLAN’ screen:

General Settings:

Enable Interface: Check to enable.

General IPv6 Setting (Optional):

Enable IPv6: Check to enable IPv6 on this VLAN.

Interface Properties:

Interface Type: Select ‘internal’, ‘external’, or ‘general’. This affects automatic routing/SNAT settings and available DHCP options.

Interface Name: Enter a name (e.g., vlan10).

Zone: Select the security zone (e.g., LAN1, DMZ, CUSTOM_ZONE).

Base Port: Select the physical Ethernet interface this VLAN runs on (e.g., ge3, sfp).

VLAN ID: Enter the VLAN tag number (1-4094).

Priority Code (Advanced): Set the 802.1p priority (0-7).

Description: Optional description.

IP Address Assignment (IPv4): Configure as ‘Get Automatically’ or ‘Use Fixed IP Address’, similar to Ethernet interfaces, depending on the Interface Type selected.

IPv6 Address Assignment (if IPv6 enabled): Configure SLAAC, static addressing, or Prefix Delegation as needed, similar to Ethernet interfaces.

DHCPv6 Setting (if IPv6 enabled): Configure as N/A, Client, Server, or Relay.

IPv6 Router Advertisement Setting (if IPv6 enabled): Configure RA settings.

Interface Parameters: Configure Egress/Ingress Bandwidth and MTU.

Connectivity Check (Optional, for external/general): Configure connectivity checks.

DHCP Setting (IPv4, for internal/general): Configure as None, DHCP Relay, or DHCP Server.

IP/MAC Binding (Optional): Configure static DHCP and IP/MAC binding.

RIP Setting (Optional): Configure RIP.

OSPF Setting (Optional): Configure OSPF.

MAC Address Setting (Optional, for external/general): Configure MAC address override.

Proxy ARP (Optional, for external/general): Configure Proxy ARP.

Related Setting: Configure WAN TRUNK or Policy Route if needed.

4. Click OK to save the VLAN interface.

How do I configure a Bridge interface?

A bridge interface combines multiple Ethernet and/or VLAN interfaces into a single Layer 2 broadcast domain with a single IP interface. 1. Navigate to Configuration > Network > Interface > Bridge. 2. Click ‘Add’ to create a new bridge interface. 3. Configure the following in the ‘Add Bridge’ screen:

General Settings:

Enable Interface: Check to enable.

General IPv6 Setting (Optional):

Enable IPv6: Check to enable IPv6 on this bridge.

Interface Properties:

Interface Type: Select ‘internal’, ‘external’, or ‘general’.

Interface Name: Enter a name (e.g., br0).

Zone: Select the security zone (e.g., LAN1).

Description: Optional description.

Member Configuration:

Available: Lists interfaces that can be added to the bridge.

Member: Lists interfaces currently in the bridge.

Use the >> and << arrows to move interfaces between the Available and Member lists. Note: An interface cannot be added if it has a virtual interface or is part of another bridge. A bridge can contain at most one VLAN interface.

IP Address Assignment (IPv4): Configure as ‘Get Automatically’ or ‘Use Fixed IP Address’.

IPv6 Address Assignment (if IPv6 enabled): Configure SLAAC, static addressing, or Prefix Delegation.

DHCPv6 Setting (if IPv6 enabled): Configure as N/A, Client, Server, or Relay.

IPv6 Router Advertisement Setting (if IPv6 enabled): Configure RA settings.

Interface Parameters: Configure Egress/Ingress Bandwidth and MTU.

DHCP Setting (IPv4, for internal/general): Configure as None, DHCP Relay, or DHCP Server.

IP/MAC Binding (Optional): Configure static DHCP and IP/MAC binding.

Connectivity Check (Optional, for external/general): Configure connectivity checks.

Proxy ARP (Optional, for external/general): Configure Proxy ARP.

Related Setting: Configure WAN TRUNK or Policy Route if needed.

4. Click OK to save the bridge interface.

How do I configure a VTI (Virtual Tunnel Interface) for IPSec?

Note: You must first create a VPN Gateway and a VPN Connection configured for ‘VPN Tunnel Interface’ application scenario (typically in Configuration > VPN > IPSec VPN). 1. Navigate to Configuration > Network > Interface > VTI. 2. Click ‘Add’ to create a new VTI. 3. Configure the following in the ‘Add corresponding’ screen:

General Settings:

Enable: Check to enable the VTI.

Interface Properties:

Interface Name: Enter a name in vtix format (e.g., vti0).

Zone: Select the security zone (e.g., IPSec_VPN).

vpn-rule: Select the pre-configured VPN Connection rule that uses the VPN Tunnel Interface scenario.

IP Address Assignment:

IP Address: Enter the IPv4 address for this end of the VTI tunnel.

Subnet Mask: Enter the subnet mask for the VTI interface (often a /30 or /31 mask).

Metric: Enter the metric for routing purposes (0-15).

Enable IGMP Support: Optional, enable if multicast routing over VTI is needed.

Interface Parameters:

Egress/Ingress Bandwidth: Set bandwidth limits (Kbps).

RIP Setting (Optional): Configure RIP if needed for dynamic routing over the VTI.

OSPF Setting (Optional): Configure OSPF if needed for dynamic routing over the VTI.

Connectivity Check (Optional): Configure connectivity check for the tunnel endpoint if needed (appears when a vpn-rule is selected).

Related Setting: Configure WAN TRUNK or Policy Route if needed.

4. Click OK to save the VTI. You can now use this VTI interface in static routes or policy routes.

How do I configure a WAN Trunk for load balancing or failover?

Configuring the Trunk: 1. Navigate to Configuration > Network > Interface > Trunk. 2. In the ‘User Configuration’ section, click ‘Add’ (or select an existing trunk and click ‘Edit’). 3. In the ‘Add Trunk’ (or ‘Edit Trunk’) screen:

Name: Enter a descriptive name for the trunk (e.g., Main_Trunk, Failover_Trunk).

Load Balancing Algorithm: Select the desired method:

Least Load First: Sends new sessions to the least utilized member based on current bandwidth usage relative to configured capacity.

Weighted Round Robin: Distributes sessions based on assigned weights (requires configuring weights for members).

Spillover: Fills the first active interface up to its threshold (if set, otherwise its capacity) before sending new sessions to the next active interface.

Load Balancing Index(es) (Least Load First/Spillover): Select which traffic direction(s) the algorithm applies to (Outbound, Inbound, Outbound + Inbound). For Spillover, specify the Egress Bandwidth threshold (Kbps) for each interface before spilling over.

4. Configure Member Interfaces:

Click ‘Add’ in the member table section.

Member: Select a WAN interface (e.g., wan1, wan2, ppp0, cellular1) from the dropdown.

Mode: Choose ‘Active’ (interface participates in load balancing/is primary for failover) or ‘Passive’ (interface is used only if all Active members fail). Only one passive member is typically used per trunk.

Weight (Weighted Round Robin only): Assign a weight (1-10).

Bandwidth/Spillover: Displays bandwidth (for LLF) or allows setting the spillover threshold (for Spillover).

Repeat to add all desired WAN interfaces to the trunk.

Use ‘Edit’, ‘Remove’, or ‘Move’ to manage the member list. The order matters for Spillover.

5. Click OK to save the trunk configuration. Setting the Default Trunk: 1. On the main Trunk screen (Configuration > Network > Interface > Trunk). 2. In the ‘Default Trunk Selection’ section:

Select ‘SYSTEM_DEFAULT_WAN_TRUNK’ to use the automatic trunk containing all external interfaces.

Select ‘User Configured Trunk’ and choose the trunk you created from the dropdown list to make it the default gateway for traffic not matching any policy routes.

3. Click ‘Apply’. Configuring Failover (Example): 1. Ensure Connectivity Check is configured on the primary WAN interface (e.g., wan1) under its Ethernet/PPP/Cellular settings. 2. Create a User Configured Trunk. 3. Add the primary WAN interface (e.g., wan1) with Mode ‘Active’. 4. Add the backup WAN interface (e.g., wan2) with Mode ‘Passive’. 5. Set the Load Balancing Algorithm to ‘Spillover’. 6. Make this trunk the Default Trunk Selection.

How do I configure Policy Routes?

Policy routes override default routing based on specific criteria. 1. Navigate to Configuration > Network > Routing > Policy Route. 2. Choose the IPv4 Configuration or IPv6 Configuration tab. 3. Click ‘Add’ to create a new policy route. 4. Configure the following in the ‘Add Policy Route’ screen:

Configuration:

Enable: Check to activate the route.

Description: Enter a descriptive name.

Criteria: Define the traffic this route applies to.

User: Select ‘any’ or a specific user/group object.

Incoming: Select the incoming interface (e.g., ‘any’, ‘lan1’, ‘ge3’). ‘any (Excluding ZyWALL)’ excludes traffic originating from the device itself.

Source Address: Select ‘any’ or an address/geoIP/FQDN object/group.

Destination Address: Select ‘any’ or an address/geoIP/FQDN object/group.

DSCP Code: Select ‘any’, ‘default’, a specific AF code, or ‘User Define’ (requires entering code in User-Defined DSCP Code field).

Schedule: Select ‘none’ for always active (if enabled) or a schedule object.

Service: Select ‘any’ or a service object/group.

Source Port (Advanced): Select ‘any’ or a service object/group for the source port.

Next-Hop: Define where matching traffic should be sent.

Type: Select the next-hop type:

Auto: Use the standard routing table.

Interface: Send out a specific interface towards a directly connected gateway.

Trunk: Send via a configured WAN Trunk.

VPN Tunnel: Send through a specific IPSec VPN tunnel (including VTI).

Gateway: Send to a specific gateway IP address (requires a HOST object for the gateway).

Specify the Interface, Trunk, VPN Tunnel, or Gateway object based on the selected Type.

Auto Destination Address (VPN Tunnel Type, Dynamic Peer): Automatically use the remote peer’s network as the destination.

DSCP Marking: Define how the DSCP value of outgoing packets is handled.

DSCP Marking: Select ‘preserve’, ‘default’, a specific AF value, or ‘User Define’ (requires entering code in User-Defined DSCP Marking field).

Address Translation (SNAT – IPv4 only): Define source NAT.

Source Network Address Translation: Select ‘none’, ‘outgoing-interface’, or a specific address object/group to use as the source IP.

Healthy Check (Optional): Configure connectivity checks for Interface or Gateway next-hop types.

Enable Connectivity Check: Enable the check.

Configure Method, Period, Timeout, Fail Tolerance, Check this address similar to interface connectivity checks.

Disable policy route automatically while Interface link down: Automatically disable this policy route if the next-hop interface or trunk goes down.

5. Click OK to save the policy route. 6. Use the Move button on the summary screen to reorder routes if necessary, as they are processed top-down. 7. Click Apply on the summary screen.

How do I configure Static Routes?

Static routes manually define paths to networks not reachable via the default gateway. They are needed if you use RIP or OSPF to propagate routes. 1. Navigate to Configuration > Network > Routing > Static Route. 2. Choose the IPv4 Configuration or IPv6 Configuration tab. 3. Click ‘Add’ to create a new static route. 4. Configure the following in the ‘IPv4/IPv6 Static Route Setting’ screen:

IPv4:

Destination IP: Enter the destination network address.

Subnet Mask: Enter the subnet mask for the destination network.

Select Next-Hop Type:

Gateway IP: Select this and enter the IP address of the next-hop router.

Interface: Select this and choose the outgoing interface from the dropdown.

Metric: Enter the cost metric for this route (0-127, lower is preferred).

IPv6:

Destination IP: Enter the destination IPv6 network address (use :: for default route).

Prefix Length: Enter the prefix length for the destination network (use 0 for default route).

Select Next-Hop Type:

Gateway IP: Select this and enter the IPv6 address of the next-hop router.

Interface: Select this and choose the outgoing interface from the dropdown.

Metric: Enter the cost metric for this route (0-127, lower is preferred).

5. Click OK to save the static route.

How do I configure RIP on the Zyxel Device?

Use the RIP screen (Configuration > Network > Routing > RIP) to configure the Zyxel Device to use RIP to receive and/or send routing information. Key configurations include:

Authentication: Specifies how to verify routing information. Options are None, Text (plain text password), or MD5 (most secure). Authentication is only available in RIP version 2.

Redistribute: Allows RIP to advertise routes learned from other protocols like OSPF or static routes. You must specify a Metric (cost) for these redistributed routes, typically between 0 and 16 (2 or 3 is common).

RIP uses UDP port 520.


What are the differences between RIP and OSPF?

Table 112 RIP vs. OSPF
Feature RIP OSPF
Network Size Small (with up to 15 routers) Large
Metric Hop count Bandwidth, hop count, throughput, round trip time and reliability.
Convergence Slow Fast

RIP is suitable for small networks (up to 15 routers), uses hop count as its metric, and converges slowly. OSPF is suitable for large networks, uses multiple factors for its metric (bandwidth, hop count, etc.), and converges quickly.


How do I configure OSPF on the Zyxel Device?

Configuring OSPF involves several steps and screens:

1. Enable OSPF: This is typically done on the main OSPF screen.

2. Configure OSPF Router ID: Use the OSPF screen (Configuration > Network > Routing > OSPF) to set the Router ID. This can be set to ‘Default’ (uses the first available interface IP) or ‘User Defined’ (manually enter an IP address format ID).

3. Set up OSPF Areas: Use the OSPF Area Add/Edit screen (accessed from the OSPF screen) to create or edit areas. You define the Area ID (32-bit integer or IP format) and Area Type (Normal, Stub, NSSA).

4. Configure Area Authentication: Within the Area Add/Edit screen, set the default authentication (None, Text, MD5) for the area.

5. Configure Interfaces: Assign interfaces to the appropriate OSPF areas (See Section 10.5.1 in the PDF).

6. Configure Redistribution (Optional): On the OSPF screen, you can configure redistribution of routes learned from RIP into OSPF. Select ‘Active RIP’ and choose Type 1 or Type 2 metric calculation, specifying an external cost (Metric).

7. Set up Virtual Links (Optional): If an area is not directly connected to the backbone (Area 0), configure a virtual link through an intermediate Normal area on the relevant ABRs using the OSPF Area Add/Edit screen.

OSPF uses IP protocol 89.


What are the different OSPF Area types?

OSPF Autonomous Systems (AS) are divided into areas:

Backbone (Area 0): The central transit area. All other areas must connect to the backbone (directly or via virtual link).

Normal Area: A standard area that has full routing information about the OSPF AS and any connected external networks.

Stub Area: Has routing information about the OSPF AS but lacks information about external networks. It uses a default route to send traffic outside the OSPF AS.

Not So Stubby Area (NSSA): Similar to a stub area but can import external routes (like those from RIP or static routes) learned by an ASBR within the NSSA. It still relies on a default route for other external destinations.


What are the different types of OSPF routers?

Routers in OSPF can perform different roles, and one router can have multiple roles:

Internal Router (IR): Exchanges routing information only with routers in the same area.

Area Border Router (ABR): Connects two or more areas (one of which is often the backbone Area 0). It filters, summarizes, and exchanges routing information between areas.

Autonomous System Boundary Router (ASBR): Exchanges routing information with routers outside the OSPF AS (e.g., routers running RIP or BGP). This process is called redistribution.

Backbone Router (BR): Any router with at least one interface in Area 0. All ABRs are backbone routers.

Designated Router (DR) / Backup Designated Router (BDR): Elected on multi-access network segments (like Ethernet) to reduce the amount of OSPF traffic. Routers on the segment only exchange information with the DR and BDR.


How does OSPF redistribution work?

Redistribution is the process where an ASBR exchanges routing information between OSPF and another routing protocol (like RIP) or static routes. The Zyxel Device allows redistribution of RIP routes and static routes into OSPF.

From RIP to OSPF: Configured on the OSPF screen (Configuration > Network > Routing > OSPF). You enable ‘Active RIP’ and select a ‘Type’ (Type 1 or Type 2) for cost calculation and specify a ‘Metric’ (external cost). Routes learned from RIP are advertised into Normal and NSSA areas, but not Stub areas.

From OSPF to RIP: Configured on the RIP screen (Configuration > Network > Routing > RIP). You enable ‘Active OSPF’ and specify a ‘Metric’ (cost in RIP terms, 1-14). OSPF routes are advertised into the RIP network.

The table below shows which external sources can be redistributed into different OSPF area types:

Table 114 OSPF: Redistribution from Other Sources to Each Type of Area
SOURCE \ TYPE OF AREA NORMAL NSSA STUB
Static routes Yes Yes No
RIP Yes Yes Yes

How do I configure an OSPF Virtual Link?

A virtual link logically connects an area to the backbone (Area 0) through an intermediate “transit” area when a direct physical connection is not possible.

1. Go to the OSPF Area Add/Edit screen for the transit area (the area through which the virtual link will pass). This area must be a ‘Normal’ type area.

2. Navigate to the ‘Virtual Link’ section (this section only appears for Normal areas).

3. Click ‘Add’ to open the Virtual Link Add/Edit screen.

4. Enter the ‘Peer Router ID’ (the 32-bit Router ID of the ABR at the other end of the virtual link, which connects the area needing backbone access).

5. Configure ‘Authentication’ for the virtual link (None, Text, MD5, or Same as Area).

6. Click OK.

Note: You must configure the virtual link on the ABRs at both ends of the transit area. You cannot create a virtual link to a router in a different area.


How do I configure BGP on the Zyxel Device?

Configuring BGP (eBGP) involves allowing BGP traffic and then setting up BGP parameters:

1. Allow BGP Packets:

Go to Configuration > Object > Service > Service Group.

Select the Default_Allow_WAN_To_ZyWALL rule and click Edit.

Move BGP from the Available list to the Member list.

Click OK.

2. Configure BGP Screen (Configuration > Network > Routing > BGP):

AS Number: Enter the Autonomous System number (1-4294967295) for the Zyxel Device. Private AS numbers are 4200000000 – 4294967294.

Router ID: Optionally, type the IP address of the interface on the Zyxel Device to use as the BGP Router ID.

Redistribute: Select ‘Connected’ to redistribute routes of directly attached devices into the BGP RIB.

Neighbors Section: Click ‘Add’ to configure peer BGP routers.

IP Address: Enter the peer BGP router’s IP address.

AS Number: Enter the peer BGP router’s AS number.

Enable EBGP Multihop (Optional): Select if the peer is not directly connected (specify max hops).

Update Source: Select the source IP for BGP sessions (Gateway IP, Interface, or None).

MD5 authentication key (Optional): Enter a shared password for MD5 authentication.

Weight (Optional): Specify a weight for routes learned from this peer (higher is preferred).

Keepalive Time: Interval for sending keepalive messages (default 60s).

Hold Time: Max time to wait for a keepalive before declaring peer dead (must be > Keepalive Time, default 180s).

Maximum Prefix (Optional): Limit the number of prefixes received from this neighbor.

Network Section: Click ‘Add’ to configure network routes (IP/mask bits) that will be announced to all BGP neighbors (up to 16).

3. Click Apply to save changes.


How do I set up Dynamic DNS (DDNS)?

1. Get a DDNS Account: Sign up with a supported DDNS provider (e.g., DynDNS, Dynu, No-IP). Record your username, password, and the domain name you registered.

2. Configure the Zyxel Device:

Navigate to Configuration > Network > DDNS.

Click ‘Add’ to open the DDNS Add/Edit screen.

Check ‘Enable DDNS Profile’.

Enter a ‘Profile Name’.

Select your ‘DDNS Type’ (provider) from the list or choose ‘User custom’ for unsupported providers.

Optionally, enable ‘HTTPS’ if your provider supports it.

Enter your DDNS account ‘Username’ and ‘Password’ (retype to confirm).

Under DDNS Settings, enter the ‘Domain Name’ you registered.

Configure ‘Primary Binding Address’:

Interface: Select the WAN interface whose IP address should be associated with the domain name.

IP Address: Choose how the IP is determined: ‘Interface’ (uses the selected interface’s current IP), ‘Auto’ (DDNS server determines source IP, useful behind NAT), or ‘Custom’ (enter a static IP).

Configure ‘Backup Binding Address’ (optional) similarly, selecting an alternate interface (or ‘None’).

Configure Advanced options (Wildcard, Mail Exchanger – DynDNS only) if needed.

If using ‘User custom’, fill in ‘DYNDNS Server’, ‘URL’, and ‘Additional DDNS Options’.

3. Click OK to save the DDNS entry.

4. Click Apply on the main DDNS screen.

Note: You must have a public WAN IP address to use DDNS.


What DDNS providers are supported?

At the time of writing, the Zyxel Device supports the following DDNS service providers:

Table 120 DDNS Service Providers
PROVIDER SERVICE TYPES SUPPORTED WEBSITE
DynDNS Dynamic DNS, Static DNS, and Custom DNS http://www.dyndns.com
Dynu Basic, Premium http://www.dynu.com
No-IP No-IP http://www.no-ip.com
Peanut Hull Peanut Hull http://www.oray.cn
3322 3322 Dynamic DNS, 3322 Static DNS http://www.3322.org
Selfhost Selfhost selfhost.de

You can also use the ‘User custom’ option to configure other DDNS services.


How do I configure Network Address Translation (NAT)?

1. Navigate to Configuration > Network > NAT.

2. Click ‘Add’ to create a new NAT rule (or select an existing rule and click ‘Edit’).

3. Check ‘Enable Rule’.

4. Enter a descriptive ‘Rule Name’.

5. Select the ‘Classification’ (Port Mapping Type):

Virtual Server: Makes internal servers accessible from the public network (most common for incoming traffic).

1:1 NAT: Maps one external IP to one internal IP for both incoming and outgoing traffic.

Many 1:1 NAT: Maps a range or subnet of external IPs to an equal-sized range or subnet of internal IPs.

6. Configure the ‘Mapping Rule’:

Incoming Interface: Select the interface where the external traffic arrives (e.g., wan1).

Source IP: Usually ‘any’, or specify allowed source IPs/objects.

External IP: The public IP address packets are sent to. Select ‘User Defined’ and enter the IP, select a host object, or choose an interface IP object. For Many 1:1 NAT, select a subnet or range object.

Internal IP: The private IP address packets should be forwarded to. Select ‘User Defined’ and enter the IP, or select a HOST address object. For Many 1:1 NAT, select a subnet or range object.

Port Mapping Type: (For Virtual Server) Select how ports are mapped: ‘Any’, ‘Port’, ‘Ports’, ‘Service’, or ‘Service-Group’.

Protocol Type: (If Port Mapping Type is Port or Ports) Select TCP, UDP, or Any.

External Port / Internal Port: (If Port Mapping Type is Port) Enter the original (external) and translated (internal) port numbers.

External/Internal Start/End Port: (If Port Mapping Type is Ports) Enter the ranges for original and translated ports (ranges must be the same size).

7. Configure ‘Related Settings’:

Enable NAT Loopback (Optional): Allows internal users to access internal servers using the external IP address.

Configure Security Policy: Click this link to create a corresponding firewall rule to allow the NAT traffic.

8. Click OK.

9. Click Apply on the main NAT screen.

Note: For SNAT (Source NAT, changing the source IP of outgoing traffic), configure this using Policy Routes (Configuration > Network > Routing > Policy Route).

Note: Consider enabling the “Use Static-Dynamic Route to Control 1-1 NAT Route” checkbox if using SiteToSite VPN and 1-1 SNAT to simplify routing.


What is NAT Loopback?

NAT loopback allows users on an internal network (like LAN) to access a server on the same or another internal network using the server’s public (External IP) address defined in a NAT rule, instead of its private (Internal IP) address.

When NAT loopback is enabled for a NAT rule:

1. An internal user tries to connect to the server’s public IP address.

2. The Zyxel Device intercepts this traffic.

3. Instead of sending the traffic out to the Internet and back, it changes the destination IP to the server’s Internal IP address.

4. It also changes the source IP address of the traffic to the Zyxel Device’s own IP address on the user’s internal interface.

5. The server receives the traffic as if it came from the Zyxel Device’s internal interface IP and replies to that IP.

6. The Zyxel Device receives the reply, changes the source IP back to the server’s public IP, and forwards it to the original internal user.

This ensures that the connection succeeds because the reply traffic source matches the user’s original destination. Without NAT loopback, the server might reply directly to the user using its private IP, causing the user’s computer to drop the connection as the source IP doesn’t match the expected public IP.

You enable NAT Loopback in the ‘Related Settings’ section when adding or editing a NAT rule.


What are well-known ports?

Port numbers identify specific services or applications on a network device. They range from 0 to 65535.

Well-known ports (0-1023): Reserved for standard, privileged services. Examples include:

  • 20/21: FTP (File Transfer Protocol)
  • 22: SSH (Secure Shell)
  • 23: Telnet
  • 25: SMTP (Simple Mail Transfer Protocol)
  • 53: DNS (Domain Name System)
  • 80: HTTP (Hypertext Transfer Protocol)
  • 110: POP3 (Post Office Protocol version 3)
  • 143: IMAP (Internet Message Access Protocol)
  • 161: SNMP (Simple Network Management Protocol)
  • 179: BGP (Border Gateway Protocol)
  • 443: HTTPS (HTTP Secure)

Registered ports (1024-49151): Used by specific applications or services registered with IANA (Internet Assigned Numbers Authority).

Dynamic/Private ports (49152-65535): Used for temporary client-side connections.

The PDF provides a more extensive list (Table 123) of common ports.


How do I configure HTTP or SMTP Redirect?

Redirect Service forwards HTTP or SMTP traffic to a specific server (like a web proxy or dedicated SMTP server).

1. Navigate to Configuration > Network > Redirect Service.

2. Click ‘Add’ (or select an existing rule and click ‘Edit’).

3. Check ‘Enable’.

4. Select the ‘Service’ to redirect: HTTP Redirect or SMTP redirect.

5. Enter a descriptive ‘Name’ for the rule.

6. Under ‘Criteria’:

User: Select the user account or group this rule applies to (or ‘any’).

Interface: Select the incoming interface where the request must be received (or ‘any’).

Source Address: Select the source IP address object the traffic should come from (or ‘any’).

7. Under ‘Redirect Settings’:

Server: Enter the IP address of the HTTP proxy or SMTP server to redirect traffic to.

Port: Enter the service port number used by the redirect server.

8. Click OK.

9. Click Apply on the main Redirect Service screen.

Important:

You also need appropriate Security Policy rules to allow traffic from the client to the redirect server.

You typically need a Policy Route rule to allow traffic from the redirect server out to the Internet.

Redirect rules are checked before Policy Routes for the same traffic type.


How do I configure Application Layer Gateways (ALG)?

ALGs help NAT-unfriendly applications (like SIP, H.323, FTP) work correctly through the Zyxel Device’s NAT and firewall by inspecting packet payloads and dynamically opening necessary ports or modifying embedded IP addresses.

1. Navigate to Configuration > Network > ALG.

2. For each protocol (SIP, H.323, FTP):

Check ‘Enable [Protocol] ALG’ to turn the ALG on or off.

Check ‘Enable [Protocol] Transformations’ if the Zyxel Device needs to modify IP addresses and port numbers embedded within the protocol’s data payload. Clear this if your end device or server handles transformations itself.

Enter the standard ‘[Protocol] Signaling Port’ (e.g., 5060 for SIP, 1720 for H.323, 21 for FTP).

Optionally, add ‘Additional [Protocol] Signaling Port for Transformations’ if the protocol uses non-standard ports.

3. For SIP ALG specifically:

Optionally, check ‘Enable Configure SIP Inactivity Timeout’ to override session timers.

Set ‘SIP Media Inactivity Timeout’ (time without voice traffic before dropping audio session).

Set ‘SIP Signaling Inactivity Timeout’ (time without signaling traffic before dropping signaling session).

Optionally, check ‘Restrict Peer to Peer Signaling Connection’ and ‘Restrict Peer to Peer Media Connection’ to only allow connections from registered IP addresses.

4. Click Apply.

Note: ALGs are generally only needed for traffic passing through NAT. You also need appropriate NAT (port forwarding) and Security Policy rules configured to allow the initial connection to internal servers.


How do I enable UPnP or NAT-PMP?

UPnP (Universal Plug and Play) and NAT-PMP (NAT Port Mapping Protocol) allow devices on the internal network to automatically discover each other and configure port mappings on the Zyxel Device.

1. Navigate to Configuration > Network > UPnP.

2. Under ‘General Setting’:

Check ‘Enable UPnP’ to activate UPnP.

Check ‘Enable NAT-PMP’ to activate NAT-PMP.

Optionally, check ‘Allow UPnP or NAT-PMP to pass through Firewall’ to let application traffic bypass the security policy. If unchecked, security policies will block UPnP/NAT-PMP packets.

Select the ‘Outgoing WAN Interface’ (e.g., ‘ALL’ or a specific WAN interface) through which UPnP/NAT-PMP traffic should be sent.

3. Under ‘Support LAN List’:

Move the internal interfaces (e.g., lan1, lan2) on which you want to enable UPnP/NAT-PMP from the ‘Available’ list to the ‘Member’ list.

4. Click Apply.

Caution: Enabling UPnP/NAT-PMP can pose security risks as devices can automatically open ports. Disable it if not needed.


How can I use UPnP to find devices or access the Web Configurator?

If UPnP is enabled on the Zyxel Device and your computer (Windows 7/10 examples provided):

Finding Devices:

1. Ensure Network Discovery is turned on in your Windows advanced sharing settings.

2. Open File Explorer (Windows Explorer in Win 7).

3. Click on ‘Network’ in the left pane.

4. UPnP-enabled devices, including the Zyxel Device, should appear under ‘Network Infrastructure’.

5. Right-click the Zyxel Device icon and select ‘Properties’. Click the ‘Network Device’ tab to view information like manufacturer, model, and IP address.

Accessing Web Configurator:

1. Follow steps 1-4 above to find the Zyxel Device icon in the Network view.

2. Right-click the Zyxel Device icon.

3. Select ‘View device webpage’.

4. The Zyxel Device’s web configurator login page should open in your browser, without needing to know its IP address beforehand.


How do I configure IP/MAC Binding?

IP/MAC Binding links a specific IP address to a specific MAC address on an interface, preventing other devices from using that IP address.

Enable Binding on an Interface:

1. Navigate to Configuration > Network > IP/MAC Binding.

2. Select the interface where you want to enforce binding.

3. Click ‘Edit’.

4. Check ‘Enable IP/MAC Binding’.

5. Optionally, check ‘Enable Logs for IP/MAC Binding Violation’.

Add Static Bindings (Optional but Recommended):

6. While editing the interface, go to the ‘Static DHCP Bindings’ section.

7. Click ‘Add’.

8. Enter the ‘IP Address’ you want to reserve.

9. Enter the ‘MAC Address’ of the device that should receive this IP.

10. Enter a ‘Description’.

11. Click OK.

12. Repeat steps 7-11 for all desired static bindings.

13. Click OK on the IP/MAC Binding Edit screen.

14. Click Apply on the IP/MAC Binding Summary screen.

Note: IP/MAC binding relies on the Zyxel Device’s DHCP server functionality (both dynamic leases and static bindings).


How do I exempt IP addresses from IP/MAC Binding?

You can configure ranges of IP addresses where IP/MAC binding checks will not be applied.

1. Navigate to Configuration > Network > IP/MAC Binding.

2. Click the ‘Exempt List’ tab.

3. Click ‘Add’.

4. Enter a ‘Name’ for the exempt range.

5. Enter the ‘Start IP’ address of the range.

6. Enter the ‘End IP’ address of the range.

7. Click OK (or Apply on the main screen if adding directly there).


How do I configure Layer 2 Isolation?

Layer 2 Isolation prevents devices connected to the same internal interface(s) from communicating directly with each other, except for devices specified in an Allow List.

Enable Layer 2 Isolation:

1. Navigate to Configuration > Network > Layer 2 Isolation.

2. On the ‘General’ tab, check ‘Enable Layer 2 Isolation’. (Note: Security Policy control must be enabled first).

3. In the ‘Member List’, move the internal interface(s) (e.g., lan1, Vlan10) on which you want to enable isolation from the ‘Available’ list to the ‘Member’ list.

4. Click Apply.

Configure Allow List (Optional):

5. Click the ‘Allow List’ tab.

6. Check ‘Enable Allow List’.

7. Click ‘Add’.

8. Check ‘Enable’ for the rule.

9. Enter the ‘Host IP Address’ of a device (e.g., a shared printer or server) that should be accessible by other devices on the isolated interface(s).

10. Enter an optional ‘Description’.

11. Click OK.

12. Repeat steps 7-11 for all devices to be allowed.

13. Click Apply.

Devices on an isolated interface can still access devices on non-isolated interfaces, the Zyxel Device itself, and the Internet (subject to firewall rules), and any device on the Allow List.


How do I configure DNS Inbound Load Balancing?

DNS Inbound Load Balancing allows the Zyxel Device to respond to DNS queries for a specific domain name with the IP address of the least loaded WAN interface.

1. Navigate to Configuration > Network > Inbound LB.

2. Check ‘Enable DNS Load Balancing’.

3. Click ‘Add’ under the Configuration section.

4. Check ‘Enable’ for the rule.

5. Under ‘DNS Settings’:

Enter the ‘Query Domain Name’ (e.g., http://www.example.com, *.example.com) that this rule applies to.

Set the ‘Time to Live’ (TTL) in seconds (0 means use DNS server’s TTL).

6. Under ‘Query From Settings’ (Optional):

Specify the ‘IP Address’ (source IP object) or ‘Zone’ from which queries must originate for this rule to apply (default is ‘any’).

7. Under ‘Load Balancing Member’:

Select the ‘Load Balancing Algorithm’: Weighted Round Robin, Least Connection, Least Load – Outbound, Least Load – Inbound, or Least Load – Total.

Optionally, enter a ‘Failover IP Address’ to return if all member interfaces are unavailable.

Click ‘Add’ to add a member interface.

Select the ‘Monitor Interface’ (e.g., wan1).

If using Weighted Round Robin, enter a ‘Weight’ (1-10).

Select the ‘IP Address’ to return for this interface (‘Same as Monitor Interface’ or ‘Custom’).

Click OK.

Repeat adding members for all desired WAN interfaces.

8. Click OK on the Add DNS Load Balancing screen.

9. Click Apply on the main DNS Load Balancing screen.

Note: You must also configure corresponding Security Policy and NAT rules to allow Internet users to access your internal servers via the WAN interface IPs used in the load balancing.


What are the different IPSec VPN Application Scenarios?

The Zyxel Device offers pre-defined scenarios to simplify IPSec VPN configuration:

Table 140 IPSec VPN Application Scenarios
Scenario Description Initiation Peer IP Zyxel IP
Site-to-Site Connects two sites where both ends have static IP addresses or domain names. Either side can initiate. Static IP or Domain Name Static IP or Domain Name
Site-to-Site with Dynamic Peer Connects two sites where the remote site has a dynamic IP address. Only remote (dynamic) peer can initiate. Dynamic IP (address not specified in config) Static IP or Domain Name
Remote Access (Server Role) Allows multiple remote clients (dial-in users) with dynamic IPs to connect to the Zyxel Device. Only clients can initiate. Dynamic IP (clients not specified in config) Static IP or Domain Name
Remote Access (Client Role) Configures the Zyxel Device as a client to connect to a remote IPSec server (dial-in). Only this Zyxel Device (client) can initiate. Static IP or Domain Name (of server) Can be Dynamic IP
VPN Tunnel Interface Creates a virtual interface (VTI) to bind to a VPN connection, primarily used for routing or load balancing over VPN. Typically Zyxel Device initiates (depends on underlying connection). Static IP or Domain Name Static IP or Domain Name

These scenarios pre-fill certain settings in the VPN Connection and VPN Gateway configuration screens.


How do I configure an IPSec VPN Connection?

The VPN Connection defines the Phase 2 parameters (IPSec SA) for a VPN tunnel.

1. Navigate to Configuration > VPN > IPSec VPN > VPN Connection.

2. Click ‘Add’ (or select and ‘Edit’ an existing connection).

3. Check ‘Enable’.

4. Enter a ‘Connection Name’.

5. Select the ‘Application Scenario’ that best fits your needs.

6. Select the ‘VPN Gateway’ (Phase 1 settings) this connection will use. You might need to create this first.

7. Define the ‘Policy’:

Local Policy: Select the address object representing the network behind the Zyxel Device.

Remote Policy: Select the address object representing the network behind the remote peer.

Optionally enable ‘Policy Enforcement’ to strictly enforce traffic matching these policies.

8. Configure ‘Phase 2 Setting’:

Set the ‘SA Life Time’ (in seconds).

Select the ‘Active Protocol’ (ESP is most common).

Select ‘Encapsulation’ (Tunnel is most common).

Configure ‘Proposal(s)’: Click Add/Edit to define acceptable Encryption and Authentication algorithms (e.g., AES128/SHA256). Both sides must have at least one matching proposal.

Select ‘Perfect Forward Secrecy (PFS)’ DH group (or ‘none’ to disable).

9. Configure ‘Related Settings’:

Set the ‘Zone’ (usually IPSec_VPN).

Optionally enable ‘Connectivity Check’ to monitor tunnel status using ICMP or TCP.

10. Optionally configure ‘Inbound/Outbound traffic NAT’ if NAT is required specifically for this tunnel’s traffic.

11. Configure Advanced settings (Nailed-Up, Replay Detection, NetBIOS, MSS Adjustment, GRE, Mode Config, Configuration Payload) as needed based on scenario and peer requirements.

12. Click OK.


How do I configure an IPSec VPN Gateway?

The VPN Gateway defines the Phase 1 parameters (IKE SA) for a VPN tunnel.

1. Navigate to Configuration > VPN > IPSec VPN > VPN Gateway.

2. Click ‘Add’ (or select and ‘Edit’ an existing gateway).

3. Check ‘Enable’.

4. Enter a ‘VPN Gateway Name’.

5. Select the ‘IKE Version’ (IKEv1 or IKEv2).

6. Configure ‘Gateway Settings’:

My Address: Select the Interface or enter the Domain Name/IP the Zyxel Device uses for this gateway.

Peer Gateway Address: Select ‘Static Address’ and enter the peer’s IP/Domain name, or select ‘Dynamic Address’ if the peer’s IP changes.

7. Configure ‘Authentication’:

Select ‘Pre-Shared Key’ and enter/confirm the key, or select ‘Certificate’ and choose the Zyxel Device’s certificate (My Certificates).

Configure ‘Local ID Type’/’Content’ and ‘Peer ID Type’/’Content’ to match the peer’s configuration.

8. Configure ‘Phase 1 Settings’:

Set the ‘SA Life Time’ (in seconds).

Select the ‘Negotiation Mode’ (Main/Aggressive for IKEv1; IKEv2 uses a standard mode).

Configure ‘Proposal(s)’: Click Add/Edit to define acceptable Encryption, Authentication algorithms, and the ‘Key Group’ (Diffie-Hellman group, e.g., DH2, DH5, DH14). Both sides must have at least one matching proposal.

Enable ‘NAT Traversal’ if NAT exists between peers (always on for IKEv2).

Enable ‘Dead Peer Detection (DPD)’ (always on for IKEv2).

9. Configure ‘X-Auth’ (IKEv1) or ‘Extended Authentication Protocol’ (IKEv2) if needed for user authentication (Server Mode or Client Mode).

10. Click OK.


What is a VPN Concentrator?

A VPN Concentrator is a configuration on the Zyxel Device (acting as a hub) that combines multiple individual IPSec VPN connections (spokes) into a single logical entity. It simplifies management and routing in a hub-and-spoke topology compared to a fully-meshed setup where every site connects directly to every other site.

Instead of each spoke needing routes for every other spoke, they only need a route to the hub (concentrator). The concentrator handles routing traffic between the different spokes.

Requirements/Suggestions:

  • Local policy IP addresses in the member VPN rules should not overlap.
  • The concentrator needs at least one VPN rule per spoke.
  • Security policies can still block VPN traffic.
  • Policy Enforcement must be disabled for member VPN Connection rules.

Configure it under Configuration > VPN > IPSec VPN > Concentrator.


How do I configure VPN Concentrator?

1. Ensure you have already configured the individual IPSec VPN Gateway and VPN Connection policies for each spoke router that will connect to this hub.

2. Important: For each VPN Connection policy that will be part of the concentrator, edit it and ensure ‘Policy Enforcement’ under the ‘Policy’ section is disabled.

3. Navigate to Configuration > VPN > IPSec VPN > Concentrator.

4. Choose ‘IPv4 Configuration’ or ‘IPv6 Configuration’.

5. Click ‘Add’.

6. Enter a ‘Name’ for the concentrator.

7. In the ‘Member’ section, select the pre-configured VPN Connection policies (from step 1) from the ‘Available’ list and move them to the ‘Member’ list using the arrow buttons.

8. Click OK.


What is IPSec VPN Client Configuration Provisioning?

Configuration Provisioning allows the Zyxel Device IPSec VPN Client software (installed on a user’s computer) to automatically retrieve VPN rule settings from the Zyxel Device simply by entering the Zyxel Device’s IP address.

This simplifies client setup as manual configuration is not needed.

Configure which users or groups can retrieve settings via Configuration > VPN > IPSec VPN > Configuration Provisioning.

Restrictions:

The VPN rules provisioned cannot use:

  • AH active protocol
  • NULL encryption
  • SHA512 authentication
  • A subnet or range as the remote policy

The associated VPN Gateway rules cannot use:

  • IKEv2 version (for IPv4 rules)
  • User-based PSK authentication (for IPv4 rules)

You must enable IPv6 in System > IPv6 on the Zyxel Device to provision IPv6 VPN rules.


What fields are described in Table 147 for IPSec VPN Configuration Provisioning?

Table 147 Configuration > VPN > IPSec VPN > Configuration Provisioning
LABELDESCRIPTION
Enable Configuration ProvisioningSelect this for users to be able to retrieve VPN rule settings using the Zyxel Device IPSec VPN client.
VPN Provisioning PortChange the default port that IPSec VPN clients use to retrieve VPN rule settings from the Zyxel Device. The default is 443 which is already in use for remote management by default. If you change the default IPSec VPN port on the Zyxel Device, make sure to make the same change to the Zyxel IPSec VPN client. See Section 1.8.2 on page 41 for more information. Configure a new port between 1024 to 65535 that is not in use by other services.
Client Authentication MethodChoose how users should be authenticated. They can be authenticated using the local database on the Zyxel Device or an external authentication database such as LDAP, Active Directory or RADIUS. default is a method you configured in Object > Auth Method. You may configure multiple methods there. If you choose the local database on the Zyxel Device, then configure users using the Object > User/Group screen. If you choose LDAP, Active Directory or RADIUS authentication servers, then configure users on the respective server.
ConfigurationWhen you add or edit a configuration provisioning entry, you are allowed to set the VPN Connection and Allowed User fields.
Duplicate entries are not allowed. You cannot select the same VPN Connection and Allowed User pair in a new entry if the same pair exists in a previous entry.
You can bind different rules to the same user, but the Zyxel Device will only allow VPN rule setting retrieval for the first match found.
AddClick Add to bind a configured VPN rule to a user or group. Only that user or group may then retrieve the specified VPN rule settings.
If you click Add without selecting an entry in advance then the new entry appears as the first entry. Entry order is important as the Zyxel Device searches entries in the order listed here to find a match. After a match is found, the Zyxel Device stops searching. If you want to add an entry as number three for example, then first select entry 2 and click Add. To reorder an entry, use Move.
EditSelect an existing entry and click Edit to change its settings.
RemoveTo remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
ActivateTo turn on an entry, select it and click Activate. Make sure that Enable Configuration Provisioning is also selected.
InactivateTo turn off an entry, select it and click Inactivate.
MoveUse Move to reorder a selected entry. Select an entry, click Move, type the number where the entry should be moved, press , then click Apply.
StatusThis icon shows if the entry is active (yellow) or not (gray). VPN rule settings can only be retrieved when the entry is activated (and Enable Configuration Provisioning is also selected).
PriorityPriority shows the order of the entry in the list. Entry order is important as the Zyxel Device searches entries in the order listed here to find a match. After a match is found the Zyxel Device stops searching.
VPN ConnectionThis field shows all configured VPN rules that match the rule criteria for the Zyxel Device IPSec VPN client. Select a rule to bind to the associated user or group.
Upload Bandwidth LimitUpload Bandwidth Limit is only available for Zyxel subscription-based SecuExtender IPSec VPN clients. Windows VPN clients support Zyxel SecuExtender versions 5.6.80.007 or later. macOS VPN clients support Zyxel SecuExtender versions 1.2.0.7 or later.
Use Upload Bandwidth Limit to set the maximum bandwidth for uploading traffic from Zyxel IPSec VPN clients over IPSec VPN tunnels.
Allowed UserSelect which user or group of users is allowed to retrieve the associated VPN rule settings using the Zyxel Device IPSec VPN client. A user may belong to a number of groups. If entries are configured for different groups, the Zyxel Device will allow VPN rule setting retrieval based on the first match found.
Users of type admin or limited-admin are not allowed.
TypeThis field shows how traffic is tunneled from the Zyxel Device to the Zyxel VPN client:
• 6in4 (tunnel IPv6 traffic from the Zyxel Device to the Zyxel client in an IPv4 network);
• 4in6 (tunnel IPv4 traffic from the Zyxel Device to the Zyxel client in an IPv6 network);
• 4in4 (tunnel IPv4 traffic from the Zyxel Device to the Zyxel client in an IPv4 network).
ApplyClick Apply to save your changes back to the Zyxel Device.
ResetClick Reset to return the screen to its last-saved settings.

How do I configure an IPSec VPN with IKEv2 on Android (version 13)?

This example uses Android software version 13.

1. Go to Settings, search for “VPN”, open the VPN settings screen, and then tap Add.

2. Enter a name for the VPN rule in the Name field.

3. Select IKEv2 as Type.

4. Enter the WAN IP address your Zyxel Device is currently using in the Server address field.

5. Enter the IPSec identifier. By default, it is 0.0.0.0.

6. Enter the pre-shared key in the IPSec pre-shared key field. You can find the pre-shared key on the VPN Gateway screen in the Web Configurator.

7. Tap Save to create the VPN rule.

8. Select the VPN rule you created and tap Connect.

9. To check the connection status, go to Configuration > VPN > IPSec VPN in the Web Configurator.


How do I configure an IPSec VPN with IKEv2 on iOS (version 17)?

This example uses iOS software version 17.

1. Go to Settings, search for “VPN”, open the VPN & Device Management screen, and then tap Add VPN Configuration.

2. Select IKEv2 as Type.

3. Enter a name for the VPN rule in the Name field.

4. Enter the WAN IP address your Zyxel Device is currently using in the Server field.

5. Enter the Remote ID. By default, it is 0.0.0.0.

6. Select None as User Authentication.

7. Disable Use Certificate.

8. Enter the pre-shared key in the Password field. You can find the pre-shared key on the VPN Gateway screen in the Web Configurator.

9. Tap Done to create the VPN rule.

10. Select the VPN rule you created and tap Connect.

11. To check the connection status, go to Configuration > VPN > IPSec VPN in the Web Configurator.


What happens if the ID type and content do not match between routers during IKE SA authentication?

If the local and peer ID types and contents do not match correctly between the Zyxel Device and the remote IPSec router, they cannot authenticate each other and, therefore, cannot establish an IKE SA.

Table 148 VPN Example: Matching ID Type and Content

ZYXEL DEVICEREMOTE IPSEC ROUTER
Local ID type: E-mailLocal ID type: IP
Local ID content: tom@yourcompany.comLocal ID content: 1.1.1.2
Peer ID type: IPPeer ID type: E-mail
Peer ID content: 1.1.1.2Peer ID content: tom@yourcompany.com

Table 149 VPN Example: Mismatching ID Type and Content

ZYXEL DEVICEREMOTE IPSEC ROUTER
Local ID type: E-mailLocal ID type: IP
Local ID content: tom@yourcompany.comLocal ID content: 1.1.1.2
Peer ID type: IPPeer ID type: E-mail
Peer ID content: 1.1.1.20Peer ID content: tom@yourcompany.com

What SSL Access Policy Objects can be configured?

Table 150 Objects
OBJECT TYPEOBJECT SCREENDESCRIPTION
User AccountsUser Account/ User GroupConfigure a user account or user group to which you want to apply this SSL access policy.
ApplicationSSL ApplicationConfigure an SSL application object to specify the type of application and the address of the local computer, server, or web site SSL users are to be able to access.
IP PoolAddressConfigure an address object that defines a range of private IP addresses to assign to user computers so they can access the internal network through a VPN connection.
Server AddressesAddressConfigure address objects for the IP addresses of the DNS and WINS servers that the Zyxel Device sends to the VPN connection users.
VPN NetworkAddressConfigure an address object to specify which network segment users are allowed to access through a VPN connection.

What are the fields in the SSL Access Privilege screen?

Table 151 VPN > SSL VPN > Access Privilege
LABELDESCRIPTION
Access Policy SummaryThis screen shows a summary of SSL VPN policies created. Click on the VPN icon to go to the Zyxel VPN Client product page at the Zyxel website.
AddClick this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
EditDouble-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
RemoveTo remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
ActivateTo turn on an entry, select it and click Activate.
InactivateTo turn off an entry, select it and click Inactivate.
MoveTo move an entry to a different number in the list, click the Move icon. In the field that appears, specify the number to which you want to move the interface.
ReferencesSelect an entry and click References to open a screen that shows which settings use the entry. Click Refresh to update information on this screen.
#This field displays the index number of the entry.
StatusThis icon is lit when the entry is active and dimmed when the entry is inactive.
NameThis field displays the descriptive name of the SSL access policy for identification purposes.
User/GroupThis field displays the user account or user group name(s) associated to an SSL access policy. This field displays up to three names.
Access Policy SummaryThis field displays details about the SSL application object this policy uses including its name, type, and address.
ApplyClick Apply to save the settings.
ResetClick Reset to discard all changes.

What are the fields in the SSL Access Privilege Policy Add/Edit screen?

Table 152 VPN > SSL VPN > Access Privilege > Add/Edit
LABELDESCRIPTION
Create new ObjectUse to configure any new settings objects that you need to use in this screen.
Configuration
Enable PolicySelect this option to activate this SSL access policy.
NameEnter a descriptive name to identify this policy. You can enter up to 31 characters (“a-z”, A-Z”, “0-9”) with no spaces allowed.
ZoneSelect the zone to which to add this SSL access policy. You use zones to apply security settings such as security policy and remote management.
DescriptionEnter additional information about this SSL access policy. You can enter up to 60 characters (“0-9”, “a-z”, “A-Z”, “-” and “_”).
User/GroupThe Selectable User/Group Objects list displays the name(s) of the user account and/or user group(s) to which you have not applied an SSL access policy yet.
To associate a user or user group to this SSL access policy, select a user account or user group and click the right arrow button to add to the Selected User/Group Objects list. You can select more than one name.
To remove a user or user group, select the name(s) in the Selected User/Group Objects list and click the left arrow button.
Note: Although you can select admin and limited-admin accounts in this screen, they are reserved for device configuration only. You cannot use them to access the SSL VPN portal.
Network Extension (Optional)
Enable Network ExtensionSelect this option to create a VPN tunnel between the authenticated users and the internal network. This allows the users to access the resources on the network as if they were on the same local network. This includes access to resources not supported by SSL application objects. For example this lets users Telnet to the internal network even though the Zyxel Device does not have SSL application objects for Telnet.
Clear this option to disable this feature. Users can only access the applications as defined by the VPN tunnel’s selected SSL application settings and the remote user computers are not made to be a part of the local network.
Force all client traffic to SSL VPN tunnelSelect this to send all traffic from the SSL VPN clients through the SSL VPN tunnel. This replaces the default gateway of the SSL VPN clients with the SSL VPN gateway.
NetBIOS broadcast over SSL VPN TunnelSelect this to search for a remote computer and access its applications as if it was in a Local Area Network. The user can find a computer not only by its IP address but also by computer name.
Assign IP PoolDefine a separate pool of IP addresses to assign to the SSL users. Select it here.
The SSL VPN IP pool should not overlap with IP addresses on the Zyxel Device’s local networks (LAN and DMZ for example), the SSL user’s network, or the networks you specify in the SSL VPN Network List.
DNS/WINS Server 1..2Select the name of the DNS or WINS server whose information the Zyxel Device sends to the remote users. This allows them to access devices on the local network using domain names instead of IP addresses.
Network ListTo allow user access to local network(s), select a network name in the Selectable Address Objects list and click the right arrow button to add to the Selected Address Objects list. You can select more than one network.
To block access to a network, select the network name in the Selected Address Objects list and click the left arrow button.
OKClick OK to save the changes and return to the main Access Privilege screen.
CancelClick Cancel to discard all changes and return to the main Access Privilege screen.

What are the fields in the SSL Global Setting screen?

Table 153 VPN > SSL VPN > Global Setting
LABELDESCRIPTION
Global Setting
Network Extension Local IPSpecify the IP address of the Zyxel Device (or a gateway device) for full tunnel mode SSL VPN access.
Leave this field to the default settings unless it conflicts with another interface.
SSL VPN Server PortSpecify the SSL VPN server port of the Zyxel Device for full tunnel mode SLL VPN access.
Leave this field to default settings unless it conflicts with another interface.
ApplyClick Apply to save the changes and/or start the logo file upload process.
ResetClick Reset to return the screen to its last-saved settings.

What are the fields in the L2TP VPN configuration screen?

Table 154 Configuration > VPN > L2TP VPN
LABELDESCRIPTION
Show Advanced Settings / Hide Advanced SettingsClick this button to display a greater or lesser number of configuration fields.
Create new ObjectUse to configure any new settings objects that you need to use in this screen.
Enable L2TP Over IPSecUse this field to turn the Zyxel Device’s L2TP VPN function on or off.
VPN ConnectionSelect the IPSec VPN connection the Zyxel Device uses for L2TP VPN. Only the configured VPN connections in Configuration > VPN > IPSec VPN > VPN Connection that meet the following requirements are displayed here.
• Remote Access (Server Role)
• Use transport mode
• Configuration Payload is disabled
• X-Auth is disabled
Your VPN settings must also meet the requirements listed in IPSec Configuration Required for L2TP VPN.
Note: Selecting a different VPN connection (or modifying the VPN gateway that it uses) disconnects any existing L2TP VPN sessions.
IP Address PoolSelect the pool of IP addresses that the Zyxel Device uses to assign to the L2TP VPN clients. Use Create new Object if you need to configure a new pool of IP addresses.
This should not conflict with any WAN, LAN, DMZ or WLAN subnet even if they are not in use.
Authentication MethodSelect how the Zyxel Device authenticates a remote user before allowing access to the L2TP VPN tunnel.
The authentication method has the Zyxel Device check a user’s user name and password against the Zyxel Device’s local database, a remote LDAP, RADIUS, a Active Directory server, or more than one of these.
Authentication Server CertificateSelect the certificate to use to identify the Zyxel Device for L2TP VPN connections. You must have certificates already configured in the My Certificates screen. The certificate is used with the EAP, PEAP, and MSCHAPv2 authentication protocols.
Allowed UserThe remote user must log into the Zyxel Device to use the L2TP VPN tunnel.
Select a user or user group that can use the L2TP VPN tunnel. Use Create new Object if you need to configure a new user account. Otherwise, select any to allow any user with a valid account and password on the Zyxel Device to log in.
Keep Alive TimerThe Zyxel Device sends a Hello message after waiting this long without receiving any traffic from the remote user. The Zyxel Device disconnects the VPN tunnel if the remote user does not respond. (Value is 1-180 seconds).
First DNS Server, Second DNS ServerSpecify the IP addresses of DNS servers to assign to the remote users. You can specify these IP addresses two ways.
Custom Defined – enter a static IP address.
From ISP – use the IP address of a DNS server that another interface received from its DHCP server.
First WINS Server, Second WINS ServerThe WINS (Windows Internet Naming Service) server keeps a mapping table of the computer names on your network and the IP addresses that they are currently using.
Type the IP addresses of up to two WINS servers to assign to the remote users. You can specify these IP addresses two ways: Custom Defined (static IP).
ApplyClick Apply to save your changes in the Zyxel Device.
ResetClick Reset to return the screen to its last-saved settings.

What are the steps to configure L2TP VPN when the Zyxel Device is behind a NAT router?

If the Zyxel Device (Z) is behind a NAT router (N), then do the following for remote clients (C) to access the network behind the Zyxel Device (Z) using L2TP over IPv4.

1. Create an address object in Configuration > Object > Address/GEO IP > Address for the WAN IP address of the NAT router.

2. Go to Configuration > VPN > IPSec VPN > VPN Connection and click Add for IPv4 Configuration to create a new VPN connection.

3. Select Remote Access (Server Role) as the VPN scenario for the remote client.

4. Select the NAT router WAN IP address object as the Local Policy.

5. Go to Configuration > VPN > L2TP VPN and select the VPN Connection just configured.


What happens if configured BWM rates total less than the available bandwidth (Maximize Bandwidth Usage disabled)?

In the following table the configured rates total less than the available bandwidth and maximize bandwidth usage is disabled, both servers get their configured rate.

Table 155 Configured Rate Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A300 kbpsNo1300 kbps
B200 kbpsNo1200 kbps

What happens if configured BWM rates total more than the available bandwidth?

Here the configured rates total more than the available bandwidth. Because server A has higher priority, it gets up to its configured rate (800 kbps), leaving only 200 kbps for server B.

Table 156 Priority Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A800 kbpsYes1800 kbps
B1000 kbpsYes2200 kbps

What happens when ‘Maximize Bandwidth Usage’ is enabled and configured rates are met?

With maximize bandwidth usage enabled, after each server gets its configured rate, the rest of the available bandwidth is divided equally between the two. So server A gets its configured rate of 300 kbps and server B gets its configured rate of 200 kbps. Then the Zyxel Device divides the remaining bandwidth (1000 – 500 = 500) equally between the two (500 / 2 = 250 kbps for each). The priority has no effect on how much of the unused bandwidth each server gets.

So server A gets its configured rate of 300 kbps plus 250 kbps for a total of 550 kbps. Server B gets its configured rate of 200 kbps plus 250 kbps for a total of 450 kbps.

Table 157 Maximize Bandwidth Usage Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A300 kbpsYes1550 kbps
B200 kbpsYes2450 kbps

What is the effect of Priority with Over Allotment of Bandwidth?

Server A has a configured rate that equals the total amount of available bandwidth and a higher priority. You should regard extreme over allotment of traffic with different priorities (as shown here) as a configuration error. Even though the Zyxel Device still attempts to let all traffic get through and not be lost, regardless of its priority, server B gets almost no bandwidth with this configuration.

Table 158 Priority and Over Allotment of Bandwidth Effect

POLICYCONFIGURED RATEMAX. B. U.PRIORITYACTUAL RATE
A1000 kbpsYes1999 kbps
B1000 kbpsYes21 kbps

What are the fields in the Bandwidth Management configuration screen?

Table 159 Configuration > Bandwidth Management
LABELDESCRIPTION
Enable BWMSelect this check box to activate management bandwidth.
Enable Highest Bandwidth Priority for SIP TrafficSelect this to maximize the throughput of SIP traffic to improve SIP-based VoIP call sound quality. This has the Zyxel Device immediately send SIP traffic upon identifying it.
AddClick this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
EditSelect an entry and click this to be able to modify it.
RemoveSelect an entry and click this to delete it.
ActivateTo turn on an entry, select it and click Activate.
InactivateTo turn off an entry, select it and click Inactivate.
MoveTo change an entry’s position in the numbered list, select it and click Move to display a field to type a number for where you want to put that entry and press [ENTER] to move the entry to the number that you typed.
StatusThe activate (light bulb) icon is lit when the entry is active and dimmed when the entry is inactive. The status icon is not available for the default bandwidth management policy.
PriorityThis field displays a sequential value for each bandwidth management policy and it is not associated with a specific setting.
This field displays default for the default bandwidth management policy.
DescriptionThis field displays additional information about this policy.
BWM TypeThis field displays the below types of BWM:
• Shared, when the policy is set for all matched traffic
• Per User, when the policy is set for an individual user or a user group
• Per-Source-IP, when the policy is set for a source IP
UserThis is the type of user account to which the policy applies. If any displays, the policy applies to all user accounts.
ScheduleThis is the schedule that defines when the policy applies. none means the policy always applies.
Incoming InterfaceThis is the source interface of the traffic to which this policy applies.
Outgoing InterfaceThis is the destination interface of the traffic to which this policy applies.
SourceThis is the source address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. If any displays, the policy is effective for every source.
DestinationThis is the destination address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. If any displays, the policy is effective for every destination.
DSCP CodeThese are the DSCP code point values of incoming and outgoing packets to which this policy applies. The lower the number the higher the priority with the exception of 0 which is usually given only best-effort treatment.
any means all DSCP value or no DSCP marker.
default means traffic with a DSCP value of 0. This is usually best effort traffic
The “af” options stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences.
ServiceApp and the service name displays if you selected Application Object for the service type. An Application Object is a pre-defined service.
Obj and the service name displays if you selected Service Object for the service type. A Service Object is a customized pre-defined service or another service. Mouse over the service object name to view the corresponding IP protocol number.
BWM In/Pri/Out/PriThis field shows the inbound/outbound bandwidth and traffic priority.
In – This is how much inbound bandwidth, in kilobits per second, this policy allows the matching traffic to use. Inbound refers to the traffic that the Zyxel Device sends to a connection’s initiator. If no displays here, this policy does not apply bandwidth management for the inbound traffic.
Out – This is how much outbound bandwidth, in kilobits per second, this policy allows the matching traffic to use. Outbound refers to the traffic the Zyxel Device sends out from a connection’s initiator. If no displays here, this policy does not apply bandwidth management for the outbound traffic.
Pri – This is the priority for the inbound (the first Pri value) or outbound (the second Pri value) traffic that matches this policy. The smaller the number, the higher the priority. Traffic with a higher priority is given bandwidth before traffic with a lower priority. If the inbound or outbound limit is set to 0, the traffic is assigned to the lowest priority (7) regardless of this field’s configuration.
DSCP MarkingThis is how the Zyxel Device handles the DSCP value of the incoming and outgoing packets that match this policy.
In – Inbound, the traffic the Zyxel Device sends to a connection’s initiator.
Out – Outbound, the traffic the Zyxel Device sends out from a connection’s initiator.
If this field displays a DSCP value, the Zyxel Device applies that DSCP value to the route’s outgoing packets.
preserve means the Zyxel Device does not modify the DSCP value of the route’s outgoing packets.
default means the Zyxel Device sets the DSCP value of the route’s outgoing packets to 0.
The “af” choices stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences.
ApplyClick Apply to save your changes back to the Zyxel Device.
ResetClick Reset to return the screen to its last-saved settings.

What do the fields in an 802.1Q frame represent?

Table 161 802.1Q Frame
FIELDDESCRIPTION
DADestination Address
SASource Address
TPIDTag Protocol IDentifier
Priority802.1p Priority
VIDVLAN ID
Len/EtypeLength and type of Ethernet frame
DataFrame data
FCSFrame Check Sequence

What are the standard traffic types associated with 802.1p Priority Codes?

Table 162 Priority Code and Types of Traffic
PRIORITYTRAFFIC TYPES
0 (lowest)Background
1Best Effort
2Excellent Effort
3Critical Applications
4Video, less than 100 ms latency and jitter
5Voice, less than 10 ms latency and jitter
6Internetwork Control
7 (highest)Network Control

What are the fields in the Bandwidth Management Add/Edit screen?

Table 163 Configuration > Bandwidth Management > Add/Edit
LABELDESCRIPTION
Create new ObjectUse to configure any new settings objects that you need to use in this screen.
Configuration
EnableSelect this check box to turn on this policy.
DescriptionEnter a description of this policy. It is not used elsewhere. You can use alphanumeric and ()+/:+?!*#@$_%- characters, and it can be up to 60 characters long.
CriteriaUse this section to configure the conditions of traffic to which this policy applies.
BWM TypeThis field displays the below types of BWM rule:
• Shared, when the policy is set for all users
• Per User, when the policy is set for an individual user or a user group
• Per Source IP, when the policy is set for a source IP
UserSelect a user name or user group to which to apply the policy. Use Create new Object if you need to configure a new user account. Select any to apply the policy for every user.
ScheduleSelect a schedule that defines when the policy applies or select Create Object to configure a new one. Otherwise, select none to make the policy always effective.
Incoming InterfaceSelect the source interface of the traffic to which this policy applies.
Outgoing InterfaceSelect the destination interface of the traffic to which this policy applies.
SourceSelect a source address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Use Create new Object if you need to configure a new one. Select any if the policy is effective for every source.
DestinationSelect a destination address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Use Create new Object if you need to configure a new one. Select any if the policy is effective for every destination.
DSCP CodeSelect a DSCP code point value of incoming packets to which this policy route applies or select User Defined to specify another DSCP code point. The lower the number the higher the priority with the exception of 0 which is usually given only best-effort treatment.
any means all DSCP value or no DSCP marker.
default means traffic with a DSCP value of 0. This is usually best effort traffic
The “af” choices stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences.
User-Defined DSCP CodeUse this field to specify a custom DSCP code point.
Service TypeSelect Service Object or Application Object if you want a specific service (defined in a service object) to which the policy applies.
Service ObjectThis field is available if you selected Service Object as the service type.
Select a service or service group to identify the type of traffic to which this policy applies. any means all services.
Application ObjectThis field is available if you selected Application Object as the service type.
Click on the blank field to show the available options.
Select application patrol services to identify the specific traffic to which this policy applies.
If you select BitTorrent, it includes the services listed below at the time of writing:
• BitTorrent
• BitTorrent_FileTransfer
• BitTorrent_Application
• BitTorrent_Bundle
DSCP MarkingSet how the Zyxel Device handles the DSCP value of the incoming and outgoing packets that match this policy. Inbound refers to the traffic the Zyxel Device sends to a connection’s initiator. Outbound refers to the traffic the Zyxel Device sends out from a connection’s initiator.
Select one of the pre-defined DSCP values to apply or select User Defined to specify another DSCP value. The “af” choices stand for Assured Forwarding. The number following the “af” identifies one of four classes and one of three drop preferences.
Select preserve to have the Zyxel Device keep the packets’ original DSCP value.
Select default to have the Zyxel Device set the DSCP value of the packets to 0.
Bandwidth ShapingConfigure these fields to set the amount of bandwidth the matching traffic can use.
Inbound kbpsType how much inbound bandwidth, in kilobits per second, this policy allows the traffic to use. Inbound refers to the traffic the Zyxel Device sends to a connection’s initiator.
If you enter 0 here, this policy does not apply bandwidth management for the matching traffic that the Zyxel Device sends to the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7).
If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.
Outbound kbpsType how much outbound bandwidth, in kilobits per second, this policy allows the traffic to use. Outbound refers to the traffic the Zyxel Device sends out from a connection’s initiator.
If you enter 0 here, this policy does not apply bandwidth management for the matching traffic that the Zyxel Device sends out from the initiator. Traffic with bandwidth management disabled (inbound and outbound are both set to 0) is automatically treated as the lowest priority (7).
If the sum of the bandwidths for routes using the same next hop is higher than the actual transmission speed, lower priority traffic may not be sent if higher priority traffic uses all of the actual bandwidth.
PriorityThis field displays when the inbound or outbound bandwidth management is not set to 0. Enter a number between 1 and 7 to set the priority for traffic that matches this policy. The smaller the number, the higher the priority.
Traffic with a higher priority is given bandwidth before traffic with a lower priority. When traffic with higher priority has reached the full bandwidth, the traffic with lower priority can use the remaining bandwidth.
The Zyxel Device uses a fairness-based (round-robin) scheduler to divide bandwidth between traffic flows with the same priority.
If the inbound or outbound limit is set to 0, the traffic is assigned to the lowest priority (7) regardless of this field’s configuration.
Maximize Bandwidth UsageThis field displays when the inbound or outbound bandwidth management is not set to 0 and the BWM Type is set to Shared. Enable maximize bandwidth usage to let the traffic matching this policy “borrow” all unused bandwidth on the out-going interface.
After each application or type of traffic gets its configured bandwidth rate, the Zyxel Device uses the fairness-based scheduler to divide any unused bandwidth on the out-going interface among applications and traffic types that need more bandwidth and have maximize bandwidth usage enabled.
MaximumIf you did not enable Maximize Bandwidth Usage, then type the maximum unused bandwidth that traffic matching this policy is allowed to “borrow” on the out-going interface (in Kbps), here.
802.1P MarkingUse 802.1P to prioritize outgoing traffic from a VLAN interface.
Priority CodeThis is a 3-bit field within a 802.1Q VLAN tag that’s used to prioritize associated outgoing VLAN traffic. “O” is the lowest priority level and “7” is the highest. See Table 162 on page 532. The setting configured here overwrites existing priority settings.
InterfaceChoose a VLAN interface to which to apply the priority level for matching frames.
Related Setting
LogSelect whether to have the Zyxel Device generate a log (log), log and alert (log alert) or neither (no) when any traffic matches this policy.
OKClick OK to save your changes back to the Zyxel Device.
CancelClick Cancel to exit this screen without saving your changes.

What fields are configured when adding a User object for BWM?

Table 164 Configuration > BWM > Create New Object > Add User
LABELDESCRIPTION
User NameType a user or user group object name of the rule.
User TypeSelect a user type from the drop down menu. The user types are Admin, Limited admin, User, Guest, Ext-user, Ext-group-user.
PasswordType a password for the user object. The password can consist of alphanumeric characters, the underscore, and some punctuation marks (+-/*= :; .! @$&%#~ ‘ \ ()), and it can be up to eight characters long.
RetypeRetype the password to confirm.
DescriptionEnter a description of this policy. It is not used elsewhere. You can use alphanumeric and ()+/:+?!*#@$_%- characters, and it can be up to 60 characters long.
Authentication Timeout SettingsChoose either Use Default setting option, which shows the default Lease Time of 1,440 minutes and Reauthentication Time of 1,440 minutes or you can enter them manually by choosing Use Manual Settings option.
Lease TimeThis shows the Lease Time setting for the user, by default it is 1,440 minutes.
Reauthentication TimeThis shows the Reauthentication Time for the user, by default it is 1,440 minutes.
OKClick OK to save the setting.
CancelClick Cancel to abandon this screen.

What fields are configured when adding a Schedule object?

Table 165 Configuration > BWM > Create New Object > Add Schedule
LABELDESCRIPTION
NameEnter a name for the schedule object of the rule.
TypeSelect an option from the drop down menu for the schedule object. It will show One Time or Recurring.
Start DateClick the icon menu on the right to choose a Start Date for the schedule object.
Start TimeClick the icon menu on the right to choose a Start Time for the schedule object.
Stop DateClick the icon menu on the right to choose a Stop Date for schedule object.
Stop TimeClick the icon menu on the right to choose a Stop Time for the schedule object.

What fields are configured when adding an Address object?

Table 166 Configuration > BWM > Create New Object > Add Address
LABELDESCRIPTION
NameEnter a name for the Address object of the rule.
Address TypeSelect an Address Type from the drop down menu on the right. The Address Types are Host, Range, Subnet, Interface IP, Interface Subnet, and Interface Gateway.
IP AddressEnter an IP address for the Address object.
OKClick OK to save the setting.
CancelClick Cancel to abandon the setting.

How can I prioritize Microsoft Teams traffic using BWM?

Scenario: Client on LAN1 uses Teams. Goal is to prioritize Teams traffic.

Configuration Steps:

1. Go to Configuration > BWM. Click Add.

2. Set the BWM Type to Shared to apply the BWM rule to all matched traffic.

3. Under Criteria > Service Type, select Application Object, then click the Application Group field and select Teams.

4. Set Guaranteed Bandwidth (Inbound/Outbound) and Priority. For example, set Inbound and Outbound to 20000 kbps and Priority to 1 (highest).

5. Select Maximize Bandwidth Usage to allow the traffic that matches this rule borrow all unused bandwidth on the outgoing interface.

6. Click OK to save your changes.

Example Parameters (based on text and screenshot interpretation):

Table 167 BWM Example (Modified based on steps)
DESCRIPTIONBWM TYPESERVICE TYPEAPPLICATION GROUPGUARANTEED BANDWIDTHMAXIMIZE BW USAGE
TeamsSharedApplication ObjectTeamsInbound: 20000 kbps/ Priority: 1
Outbound: 20000 kbps/ Priority: 1
Enabled

What are the user authentication steps for different client types and Google Authenticator usage?

Table 168 User Authentication Methods
CLIENTGOOGLE AUTHENTICATORUSER AUTHENTICATION STEPS
802.1XNo1. 802.1X – Username/password
2. Web Authentication Portal – Username/password
802.1XYes1. 802.1X – Username/password
2. Web Authentication Portal – Username/password
3. Web Authentication Portal – Google Authenticator code
Non-802.1XNo1. Web Authentication Portal – Username/password
Non-802.1XYes1. Web Authentication Portal – Username/password
2. Web Authentication Portal – Google Authenticator code
Windows (Non-802.1X)NoNone needed (if user is using Windows)
Windows (Non-802.1X)YesNone needed (if user is using Windows)

What are the fields in the Web Authentication General screen?

Table 169 Configuration > Web Authentication > General
LABELDESCRIPTION
Global Setting
Enable Web AuthenticationSelect the check box to turn on the web authentication feature. Otherwise, clear the check box to turn it off.
Once enabled, all network traffic is blocked until a client authenticates with the Zyxel Device through the specifically designated web portal or user agreement page.
Web Portal General Setting
Enable Session PageSelect this to display a page showing information on the user session after s/he logs in. It displays remaining time with an option to renew or log out immediately.
Logout IPSpecify an IP address that users can use to terminate their sessions manually by entering the IP address in the address bar of the web browser.
User Agreement General Setting
Enforce data collectionSelect this to require users to fill in their registration information (name, telephone number, address and email address) on the User Agreement (PC or mobile) page.
Google Authentication SettingWeb authentication supports two-factor authentication using Google Authenticator. When enabled, the web authentication page first prompts the user to enter their username and password (factor 1), and then prompts them to enter a time-limited code from the Google Authenticator app (factor 2).
It is also possible to configure two-factor authentication for VPN and admin users.
The admin two-factor authentication settings override the web authentication two-factor authentication settings if both are configured.
Valid TimeEnter the time limit (1-5 minutes) for the code from the Google Authenticator app to be used for login.
Exceptional ServicesUse this table to list services that users can access without logging in.
Click Add to change the list’s membership. A screen appears. Available services appear on the left. Select any services you want users to be able to access without logging in and click the right arrow button to add them. The member services are on the right. Select any service that you want to remove from the member list, and click the left arrow button to remove them.
Keeping DNS as a member allows users’ computers to resolve domain names into IP addresses.
Web Authentication Policy SummaryUse this table to manage the Zyxel Device’s list of web authentication policies.
AddClick this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
EditDouble-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
RemoveTo remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. In the table, select one or more entries and click Remove to delete it or them.
ActivateTo turn on an entry, select it and click Activate.
InactivateTo turn off an entry, select it and click Inactivate.
MoveTo move an entry to a different number in the list, click the Move icon. In the field that appears, specify the number to which you want to move the interface.
#This field is a sequential value showing the number of the profile. The profile order is not important.
StatusThis icon is lit when the entry is active and dimmed when the entry is inactive.
PriorityThis is the position of the authentication policy in the list. The priority is important as the policies are applied in order of priority. Default displays for the default authentication policy that the Zyxel Device uses on traffic that does not match any exceptional service or other authentication policy. You can edit the default rule but not delete it.
Incoming InterfaceThis field displays the interface on which packets for this policy are received.
SourceThis displays the source address object, including geographic address and FQDN (group) objects, to which this policy applies.
DestinationThis displays the destination address object, including geographic address and FQDN (group) objects, to which this policy applies.
ScheduleThis field displays the schedule object that dictates when the policy applies. none means the policy is active at all times if enabled.
AuthenticationThis field displays the authentication requirement for users when their traffic matches this policy.
unnecessary – Users do not need to be authenticated.
required – Users need to be authenticated. They must manually go to the login screen or user agreement page. The Zyxel Device will not redirect them to the login screen.
force – Users need to be authenticated. The Zyxel Device automatically displays the login screen or user agreement page whenever it routes HTTP traffic for users who have not logged in yet.
Authentication TypeThis field displays the name of the authentication type profile used in this policy to define how users authenticate their sessions. It shows n/a if Authentication is set to unnecessary.
DescriptionIf the entry has a description configured, it displays here. This is n/a for the default policy.
ApplyClick this button to save your changes to the Zyxel Device.
ResetClick this button to return the screen to its last-saved settings.

How do I add/edit a Web Authentication Policy?

Open the Configuration > Web Authentication > General screen, then click the Add icon or select an entry and click the Edit icon in the Web Authentication Policy Summary section to open the Auth. Policy Add/Edit screen.

Table 170 Configuration > Web Authentication > General > Add Authentication Policy
LABELDESCRIPTION
Create new ObjectUse to configure any new settings objects that you need to use in this screen. Select Address or Schedule.
Enable PolicySelect this check box to activate the authentication policy. This field is available for user-configured policies.
DescriptionEnter a descriptive name with 1 to 63 single-byte characters, including a-zA-Z0-9!”#$%&'()*+,-/:;=?@_ and spaces.
.<<>[\]^'{|} are not allowed. This field is available for user-configured policies.
User Authentication PolicyUse this section of the screen to determine which traffic requires (or does not require) the senders to be authenticated in order to be routed.
Incoming InterfaceSelect the interface on which packets for this policy are received.
Source AddressSelect a source address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Select any if the policy is effective for every source. This is any and not configurable for the default policy.
Destination AddressSelect a destination address or address group, including geographic address and FQDN (group) objects, for whom this policy applies. Select any if the policy is effective for every destination. This is any and not configurable for the default policy.
ScheduleSelect a schedule that defines when the policy applies. Otherwise, select none and the rule is always effective. This is none and not configurable for the default policy.
AuthenticationSelect the authentication requirement for users when their traffic matches this policy.
unnecessary – Users do not need to be authenticated.
required – Users need to be authenticated. If Force User Authentication is selected, all HTTP traffic from unauthenticated users is redirected to a default or user-defined login page. Otherwise, they must manually go to the login screen. The Zyxel Device will not redirect them to the login screen.
Force User AuthenticationThis field is available for user-configured policies that require authentication. Select this to have the Zyxel Device automatically display the login screen when users who have not logged in yet try to send HTTP traffic.
Authentication TypeSelect an authentication method.
default-web-portal: the default login page built into the Zyxel Device.
default-user-agreement: the default user agreement page built into the Zyxel Device.
Single Sign-On using 802.1X802.1X Single Sign-On allows the Zyxel Device to use the same username and password for 802.1X WiFi authentication and web authentication. When enabled, a user logs into a WiFi network on the Zyxel Device that has 802.1X (WPA Enterprise) enabled. The Zyxel Device then reuses the 802.1X username and password for web authentication, preventing the user from having to log in twice.
Active Directory Single Sign-On takes priority over 802.1X Single Sign-On, if both are enabled.
Google AuthenticatorSelect Google Authenticator to first prompt a user to enter their username and password (factor 1), and then prompt the user to enter a time-limited code from the Google Authenticator app (factor 2).
OKClick OK to save your changes back to the Zyxel Device.
CancelClick Cancel to exit this screen without saving.

How do I set up user accounts for authentication via an external RADIUS server?

Set up user accounts in the RADIUS server. This example uses the Web Configurator. If you can export user names from the RADIUS server to a text file, then you might configure a script to create the user accounts instead.

1. Click Configuration > Object > User/Group > User. Click the Add icon.

2. Enter the same user name that is used in the RADIUS server, and set the User Type to ext-user because this user account is authenticated by an external server. Click OK.

3. Repeat this process to set up the remaining user accounts.


How do I set up user groups and assign users for RADIUS authentication?

Set up the user groups and assign the users to the user groups.

1. Click Configuration > Object > User/Group > Group. Click the Add icon.

2. Enter the name of the group. In this example, it is “Finance”. Then, select Object/Leo and click the right arrow to move him to the Member list. This example only has one member in this group, so click OK. Of course you could add more members later.

3. Repeat this process to set up the remaining user groups.


How do I configure the Zyxel Device to use a RADIUS server for authentication?

This step sets up user authentication using the RADIUS server. First, configure the settings for the RADIUS server. Then, set up the authentication method, and configure the Zyxel Device to use the authentication method.

1. Click Configuration > Object > AAA Server > RADIUS. Double-click the radius entry. Configure the RADIUS server’s address, authentication port (1812 if you were not told otherwise), and key. Click OK.

2. Click Configuration > Object > Auth. Method. Double-click the default entry. Click the Add icon. Select group radius because the Zyxel Device should use the specified RADIUS server for authentication. Click OK.

3. Click Configuration > Web Authentication. In the Web Authentication > General screen, select Enable Web Authentication to turn on the web authentication feature and click Apply.


How do I create the web authentication policy to enforce RADIUS login?

4. In the Web Authentication Policy Summary section, click the Add icon to set up a default policy that has priority over other policies and forces every user to log into the Zyxel Device before the Zyxel Device routes traffic for them.

5. Select Enable Policy. Enter a descriptive name, “default_policy” for example. Set the Authentication field to required, and make sure Force User Authentication is selected. Select an authentication type profile (“default-web-portal” in this example). Keep the rest of the default settings, and click OK.

Note: The users must log in at the Web Configurator login screen before they can use HTTP or MSN.

When the users try to browse the web (or use any HTTP application), the login screen appears. They have to log in using the user name and password in the RADIUS server.


How can I authenticate users based on group membership defined on a RADIUS server?

The previous example showed how to have a RADIUS server authenticate individual user accounts. If the RADIUS server has different user groups distinguished by the value of a specific attribute, you can make a couple of slight changes in the configuration to have the RADIUS server authenticate groups of user accounts defined in the RADIUS server.

1. Click Configuration > Object > AAA Server > RADIUS. Double-click the radius entry. Besides configuring the RADIUS server’s address, authentication port, and key; set the Group Membership Attribute field to the attribute that the Zyxel Device is to check to determine to which group a user belongs. This example uses Class. This attribute’s value is called a group identifier; it determines to which group a user belongs. In this example the values are Finance, Engineer, Sales, and Boss.

2. Now you add ext-group-user objects to identify groups based on the group identifier values. Set up one user account for each group of user accounts in the RADIUS server. Click Configuration > Object > User/Group > User. Click the Add icon.

3. Enter a user name and set the User Type to ext-group-user. In the Group Identifier field, enter Finance, Engineer, Sales, or Boss and set the Associated AAA Server Object to radius.

4. Repeat this process to set up the remaining groups of user accounts.


What are the fields in the Authentication Type screen?

Table 171 Configuration > Web Authentication > Authentication Type
LABELDESCRIPTION
AddClick this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
EditDouble-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
RemoveTo remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
#This field is a sequential value, and it is not associated with a specific entry.
NameThis field displays the name of the profile.
default-web-portal: the default login page built into the Zyxel Device.
Note: You can also customize the default login page built into the Zyxel Device in the System > WWW > Login Page screen.
default-user-agreement: the default user agreement page built into the Zyxel Device.
TypeThis field displays the type of the web authentication page used by this profile.
Web PageThis field displays whether this profile uses the default web authentication page built into the Zyxel Device (System Default Page) or custom web authentication pages from an external web server (External Page).
ResetClick Reset to return the screen to its last-saved settings.

What are the fields for adding/editing an Authentication Type Profile?

Table 172 Configuration > Web Authentication > Authentication Type: Add/Edit
LABELDESCRIPTION
TypeSelect the type of the web authentication page through which users authenticate their connections.
If you select User Agreement, by agreeing to the policy of user agreement, users can access the Internet without a guest account.
Profile NameEnter a name for the profile.
You can use up to 31 alphanumeric characters (A-Z, a-z, 0-9) and underscores (_). Spaces are not allowed. The first character must be a letter.
The following fields are available if you set Type to Web Portal.
Internal Web PortalSelect this to use the web portal pages uploaded to the Zyxel Device.
The login page appears whenever the web portal intercepts network traffic, preventing unauthorized users from gaining access to the network.
PreviewSelect to display the page you uploaded to the Zyxel Device in a new frame.
Note: You must select a custom file uploaded to the Zyxel Device before you can preview the pages.
Customize fileSelect the file name of the web portal file in the Zyxel Device.
Note: You can upload zipped custom web portal files to the Zyxel Device using the Configuration > Web Authentication > Web Portal Customize File screen.
External Web PortalSelect this to use a custom login page from an external web portal instead of the one uploaded to the Zyxel Device. You can configure the look and feel of the web portal page.
Login URLSpecify the login page’s URL; for example, http://IIS server IP Address/login.html.
The Internet Information Server (IIS) is the web server on which the web portal files are installed.
Logout URLSpecify the logout page’s URL; for example, http://IIS server IP Address/logout.html.
The Internet Information Server (IIS) is the web server on which the web portal files are installed.
Welcome URLSpecify the welcome page’s URL; for example, http://IIS server IP Address/welcome.html.
Users will be redirected to the welcome page after authentication. This field is optional.
The Internet Information Server (IIS) is the web server on which the web portal files are installed.
Session URLSpecify the session page’s URL; for example, http://IIS server IP Address/session.html.
The Internet Information Server (IIS) is the web server on which the web portal files are installed.
Error URLSpecify the error page’s URL; for example, http://IIS server IP Address/error.html.
The Internet Information Server (IIS) is the web server on which the web portal files are installed.
DownloadClick this to download an example external web portal file for your reference.
The following fields are available if you set Type to User Agreement.
Enable Idle DetectionThis is applicable for access users.
Select this check box if you want the Zyxel Device to monitor how long each access user is logged in and idle (in other words, there is no traffic for this access user). The Zyxel Device automatically logs out the access user once the Idle timeout has been reached.
Idle timeoutThis is applicable for access users.
This field is effective when Enable Idle Detection is checked. Type the number of minutes each access user can be logged in and idle before the Zyxel Device automatically logs out the access user.
Reauthentication TimeEnter the number of minutes the user can be logged into the Zyxel Device in one session before having to log in again. (Value 0 means unlimited)
Internal User AgreementSelect this to use the user agreement pages in the Zyxel Device. The user agreement page appears whenever the Zyxel Device intercepts network traffic, preventing unauthorized users from gaining access to the network.
PreviewSelect to display the page you uploaded to the Zyxel Device in a new frame.
Note: You must select a custom file uploaded to the Zyxel Device before you can preview the pages.
Customize fileSelect the file name of the user agreement file in the Zyxel Device.
Note: You can upload zipped custom user agreement files to the Zyxel Device using the Configuration > Web Authentication > User Agreement Customize File screen.
External User AgreementSelect this to use custom user agreement pages from an external web server instead of the default one built into the Zyxel Device. You can configure the look and feel of the user agreement page.
Agreement URLSpecify the user agreement page’s URL; for example, http://IIS server IP Address/logout.html.
The Internet Information Server (IIS) is the web server on which the user agreement files are installed.
Welcome URLSpecify the welcome page’s URL; for example, http://IIS server IP Address/welcome.html.
The Internet Information Server (IIS) is the web server on which the user agreement files are installed.
If you leave this field blank, the Zyxel Device will use the welcome page of internal user agreement file.
DownloadClick this to download an example external user agreement file for your reference.
OKClick OK to save your changes back to the Zyxel Device.
CancelClick Cancel to exit this screen without saving.

What are the fields in the Custom Web Portal / User Agreement File screen?

Table 173 Configuration > Web Authentication > Custom Web Portal / User Agreement File
LABELDESCRIPTION
RemoveClick a file’s row to select it and click Remove to delete it from the Zyxel Device.
DownloadClick a file’s row to select it and click Download to save the zipped file to your computer.
#This column displays the index number for each file entry. This field is a sequential value, and it is not associated with a specific entry.
File NameThis column displays the label that identifies a web portal or user agreement file.
SizeThis column displays the size (in KB) of a file.
Last ModifiedThis column displays the date and time that the individual files were last changed or saved.
Browse / UploadClick Browse… to find the zipped file you want to upload, then click the Upload button to put it on the Zyxel Device.
Download (External Example)Click this to download an example external web portal or user agreement file for your reference.

Where are corresponding settings configured between the Zyxel Device and the SSO Agent?

Table 174 Zyxel Device – SSO Agent Field Mapping
ZYXEL DEVICE SCREENZYXEL DEVICE FIELDSSO SCREENSSO FIELD
Web Authentication > SSOListen PortAgent Configuration Page > Gateway SettingGateway Port
Web Authentication > SSOPrimary Agent PortAgent Configuration PageAgent Listening Port
Object > User/Group > User > AddGroup IdentifierAgent Configuration Page > Configure LDAP/AD ServerGroup Membership
Object > AAA Server > Active Directory > AddBase DNAgent Configuration Page > Configure LDAP/AD ServerBase DN
Object > AAA Server > Active Directory > AddBind DNAgent Configuration Page > Configure LDAP/AD ServerBind DN
Object > User/Group > User > AddUser NameAgent Configuration Page > Configure LDAP/AD ServerLogin Name Attribute
Object > AAA Server > Active Directory > AddServer AddressAgent Configuration Page > Configure LDAP/AD ServerServer Address
Network > Interface > Ethernet > wan (IPv4)IP addressAgent Configuration Page > Gateway SettingGateway IP

What needs to be configured on the Zyxel Device for SSO?

These are the screens you need to configure:

• Configure the Zyxel Device to Communicate with SSO on page 563

• Enable Web Authentication on page 564

• Create a Security Policy on page 566

• Configure User Information on page 567

• Configure an Authentication Method on page 568

• Configure Active Directory on page 569


How do I configure the Zyxel Device communication settings for the SSO agent?

Use Configuration > Web Authentication > SSO to configure how the Zyxel Device communicates with the Single Sign-On (SSO) agent.

Table 175 Configuration > Web Authentication > SSO
LABELDESCRIPTION
Listen PortThe default agent listening port is 2158. If you change it on the Zyxel Device, then change it to the same number in the Gateway Port field on the SSO agent too. Type a number ranging from 1025 to 65535.
Agent PreShareKeyType 8-32 single-byte characters, including 0-9a-zA_Z!”#$%&'()*+,-./:;<=>?@\^_’
[] are not allowed. The Agent PreShareKey is used to encrypt communications between the Zyxel Device and the SSO agent.
Primary AgentType the IPv4 address of the SSO agent. The Zyxel Device and the SSO agent must be in the same domain and be able to communicate with each other.
Primary Agent PortType the same port number here as in the Agent Listening Port field on the SSO agent. Type a number ranging from 1025 to 65535.
Secondary Agent Address (Optional)Type the IPv4 address of the backup SSO agent if there is one. The Zyxel Device and the backup SSO agent must be in the same domain and be able to communicate with each other.
Secondary Agent Port (Optional)Type the same port number here as in the Agent Listening Port field on the backup SSO agent if there is one. Type a number ranging from 1025 to 65535.
ApplyClick this button to save your changes to the Zyxel Device.
ResetClick this button to return the screen to its last-saved settings

How do I configure the Zyxel SSO Agent?

After you install the SSO agent, you will see an icon in the system tray (bottom right of the screen).

Right-click the SSO icon and select Configure Zyxel SSO Agent.

Configure the Agent Listening Port, AD server exactly as you have done on the Zyxel Device. Add the Zyxel Device IP address as the Gateway. Make sure the Zyxel Device and SSO agent are able to communicate with each other.

Configure the Server Address, Port, Base DN, Bind DN, Login Name Attribute and Group Membership for the AD server settings exactly as you have done on the Zyxel Device. Group Membership is called Group Identifier on the Zyxel Device.

Configure the Gateway IP address, Gateway Port and PreShareKey exactly as you have done in the Zyxel Device Configuration > Web Authentication > SSO screen. If you want to use Generate Key to have the SSO create a random password, select Check to show PreShareKey as clear Text so as to see the password, then copy and paste it to the Zyxel Device.

After all SSO agent configurations are done, right-click the SSO icon in the system tray and select Enable Zyxel SSO Agent.


What is the default behavior for traffic between different zones?

Table 176 Directional Security Policy Behavior
FROM ZONE TO ZONEBEHAVIOR
From any to DeviceDHCP traffic from any interface to the Zyxel Device is allowed.
From LAN1 to any (other than the Zyxel Device)Traffic from the LAN1 to any of the networks connected to the Zyxel Device is allowed.
From LAN2 to any (other than the Zyxel Device)Traffic from the LAN2 to any of the networks connected to the Zyxel Device is allowed.
From LAN1 To DeviceTraffic from the LAN1 to the Zyxel Device itself is allowed.
From LAN2 to DeviceTraffic from the LAN2 to the Zyxel Device itself is allowed.
From WAN to DeviceThe default services listed in To-Device Policies are allowed from the WAN to the Zyxel Device itself. All other WAN to Zyxel Device traffic is dropped.
From any to anyTraffic that does not match any Security policy is dropped. This includes traffic from the WAN to any of the networks behind the Zyxel Device.
This also includes traffic to or from interfaces that are not assigned to a zone (extra-zone traffic).

How does the Zyxel Device apply security policies?

The Zyxel Device applies security policies in the order they are listed. When the device receives traffic, it checks it against the first policy. If the traffic matches the criteria of the policy, the device takes the action specified in that policy (e.g., allow, deny/drop) and stops checking subsequent policies. If the traffic does not match the first policy, it moves to the next policy, and so on. Any traffic that does not match any of the custom security policies will typically match the final default security policy.

How can I block all LAN to WAN IRC traffic?

You can configure a security policy rule similar to the example in Table 191. This involves creating a rule that specifically denies the IRC service from any source on the LAN to any destination on the WAN. This rule should be placed before the default allow rule.

Table 191 Blocking All LAN to WAN IRC Traffic Example

#USERSOURCEDESTINATIONSCHEDULESERVICEACTION
1AnyAnyAnyAnyIRCDeny
2AnyAnyAnyAnyAnyAllow
  • The first row blocks LAN access to the IRC service on the WAN.
  • The second row is the Security Policy’s default policy that allows all LAN1 to WAN traffic.

How can I block all LAN to WAN IRC traffic except for a specific user like the CEO?

You need to create specific security policies. One method involves using the CEO’s computer IP address, and another involves using the CEO’s username.

Method 1: Using CEO’s IP Address (e.g., 172.16.1.7)

Configure the policies as shown in Table 192. The first rule allows IRC traffic specifically from the CEO’s IP address. The second rule denies IRC traffic from all other LAN sources. The third rule is the default policy allowing other traffic.

Table 192 Limited LAN1 to WAN IRC Traffic Example 1

#USERSOURCEDESTINATIONSCHEDULESERVICEACTION
1Any172.16.1.7AnyAnyIRCAllow
2AnyAnyAnyAnyIRCDeny
3AnyAnyAnyAnyAnyAllow
  • The first row allows the LAN1 computer at IP address 172.16.1.7 to access the IRC service on the WAN.
  • The second row blocks LAN1 access to the IRC service on the WAN.
  • The third row is the default policy of allowing all traffic from the LAN1 to go to the WAN.

Method 2: Using CEO’s User Name (e.g., CEO)

Configure the policies as shown in Table 193. The first rule allows IRC traffic for the user “CEO” regardless of the source IP address. The second rule denies IRC traffic for all other users. The third rule is the default policy.

Table 193 Limited LAN1 to WAN IRC Traffic Example 2

#USERSOURCEDESTINATIONSCHEDULESERVICEACTION
1CEOAnyAnyAnyIRCAllow
2AnyAnyAnyAnyIRCDeny
3AnyAnyAnyAnyAnyAllow
  • The first row allows any LAN1 computer to access the IRC service on the WAN by logging into the Zyxel Device with the CEO’s user name.
  • The second row blocks LAN1 access to the IRC service on the WAN.
  • The third row is the default policy of allowing allows all traffic from the LAN1 to go to the WAN.

Important Note on Policy Order: In both methods, the policy allowing the CEO’s traffic *must* come before the policy that blocks general IRC traffic. This ensures the CEO’s traffic matches the allow rule first.


What are the requirements for ensuring a specific computer (e.g., CEO’s) always gets the same IP address for policy application?

To ensure a specific computer, like the CEO’s, always uses the same IP address for security policies based on IP, you must make sure it either:

Has a static IP address configured directly on the computer,

OR

You configure a static DHCP entry for it on the Zyxel Device. This makes the Zyxel Device’s DHCP server always assign the same IP address to that computer based on its MAC address.


Why must the policy allowing specific traffic (like the CEO’s IRC) come before a policy blocking general traffic of the same type?

Security policies on the Zyxel Device are applied in order from top to bottom. If a general blocking policy (like blocking all LAN1 to WAN IRC) comes first, traffic that should be allowed by a later, more specific rule (like allowing the CEO’s IRC traffic) will match the blocking rule first. Once traffic matches a rule, the device takes the specified action (in this case, block/drop) and stops processing further rules for that traffic. Therefore, specific ‘allow’ exceptions must be placed before general ‘deny’ rules.

What can I do with the Web Content Filter feature?

The Web Content Filter feature allows you to control access to specific websites or web content. You can:

– Set up web content filtering profiles (General screens).

– Create a common list of allowed websites (Trusted Web Sites).

– Create a common list of blocked websites (Forbidden Web Sites).

– Block specific web features like cookies or ActiveX by inspecting web pages.

– Block access to websites by inspecting the URL or Server Name Indication (SNI).


What can I do with the DNS Content Filter feature?

The DNS Content Filter feature allows you to control access to specific websites by inspecting DNS queries made by users. You can:

– Set up DNS content filtering profiles (General screens).

– Create a list of allowed website addresses (Allow List).

– Create a list of blocked website addresses (Block List).

– Block access even if the user is using TLS 1.3 with Encrypted SNI (ESNI), unlike the Web Content Filter.


What is the process flow for Web Content Filtering?

1. A user enters a URL into their web browser.

2. The user’s computer sends a DNS query for the URL.

3. The DNS server returns an IP address for the URL.

4. The user’s web browser connects to the IP address.

5. The Web Content Filter detects an HTTP(S) connection and inspects the website requested, often using Server Name Indication (SNI) for HTTPS traffic.

6. If the website contains prohibited material according to the configured policies and profiles, the HTTP request is redirected to a block page (or the connection is dropped/handled as configured).


What is required for Web Content Filter to work if the user’s browser uses encryption (HTTPS)?

If the user’s web browser is using encryption (HTTPS), you must enable SSL Inspection for Web Content Filter to effectively inspect and filter the content of the encrypted traffic. Basic HTTPS Domain Filtering might work without full SSL inspection for category blocking based on domain names found in the SNI, but full content inspection requires SSL Inspection.

When will DNS Content Filter not work?

While DNS Content Filter works with TLS 1.3 and ESNI, the PDF notes on page 604 that “If the user’s web browser is using Encrypted Server Name Indication (ESNI), DNS Content Filter will not work.” This seems contradictory to the description on page 605 (“Unlike the Web Content Filter, the DNS Content Filter works if the user is using TLS 1.3 with ESNI.”). Given the typical functionality, DNS Content Filter *should* work by inspecting the initial DNS query *before* ESNI comes into play during the TLS handshake. However, relying solely on the text, page 604 indicates it won’t work with ESNI. *User should verify current device behavior or documentation updates.*

What can be configured within a Web Content Filtering Policy?

A web content filtering policy allows you to:

– Use schedule objects to define *when* to apply a content filter profile.

– Use address and/or user/group objects to define *to whose* web access the content filter profile applies.

– Apply a specific, custom-tailored content filter *profile* that defines the filtering rules (categories, features, specific sites).


What features can be customized in a Web Content Filtering Profile?

A web content filtering profile stores custom settings for:

– Category-based Blocking: Block access to websites based on predefined content categories (e.g., pornography, gambling).

– Restrict Web Features: Disable web proxies and block features like ActiveX controls, Java applets, and cookies.

– Customize Web Site Access: Specify particular URLs to block or, alternatively, block all URLs except specific allowed ones. You can also block URLs containing specific keywords.


How does the Zyxel Device process Web Content Filtering policies?

When the Zyxel Device receives an HTTP request, the content filter checks policies in order based on their policy numbers. It searches for a policy that matches the source address and time schedule. When a matching policy is found, the content filter applies the settings (allow or block based on categories, keywords, etc.) defined in the profile specified by that policy and stops checking further policies.

What happens if an HTTP request doesn’t match any content filter policy?

If an HTTP request does not match any configured content filter policy, the Zyxel Device’s action depends on the default policy setting:

– If the default policy is not set to block, the request is allowed.

– If the default policy is set to block, the request is blocked.


What is the External Web Filtering Service?

When you register for and enable the external web filtering service (which requires a license), your Zyxel Device gains access to an external, cloud-based database containing millions of websites categorized by content. This allows the Zyxel Device to block, log, or block and log access to websites based on these up-to-date categories.

What is HTTPS Domain Filter and how does it differ from SSL Inspection?

HTTPS Domain Filter is a feature that works with Content Filter categories to identify and take action on HTTPS traffic. It *only* identifies keywords within the *domain name* part of a URL (extracted typically via SNI) and matches it to a category. For example, it can identify ‘google’ in ‘www.google.com’. SSL Inspection is a more comprehensive feature that identifies HTTPS traffic for *all* Security Services. It can inspect the full URL path, not just the domain name, after decrypting the traffic (requires certificate deployment). Therefore, SSL Inspection has higher priority and can identify keywords anywhere in the URL, like ‘picture’ in ‘http://www.google.com/picture/index.htm&#8217;, whereas HTTPS Domain Filter cannot identify ‘picture’ in that example because it’s not in the domain name.

How does the Zyxel Device perform keyword blocking based on URLs?

When performing keyword blocking, the Zyxel Device checks the URL’s domain name (or IP address) and the file path separately.

– The domain name/IP address is the part before the first slash (e.g., `www.zyxel.com.tw` in `www.zyxel.com.tw/news/pressroom.php`).

– The file path is the part after the first slash (e.g., `news/pressroom.php` in the same URL).

Because it checks them separately, it will not find keywords that span across the domain name and file path. For instance, it would find “tw” in the domain and “news” in the path of the example URL, but it would *not* find “tw/news”.

What is DNS Content Filter and how does it work?

DNS Content Filter allows the Zyxel Device to block access to specific websites by inspecting the DNS queries made by users on the network *before* they connect to the website. If a requested website in a DNS query matches prohibited criteria (like a blocked category or domain), the Zyxel Device intercepts the query and replies with an IP address that points to a block page instead of the actual website’s IP address. Unlike Web Content Filter, DNS Content Filter can work even if the user is using TLS 1.3 with ESNI because it acts at the DNS resolution stage.

What is the process flow for DNS Content Filter?

1. A user enters a URL into their web browser.

2. The user’s computer sends a DNS query for the URL (to the Zyxel Device if it’s the DNS server/forwarder).

3. The DNS Content Filter inspects the requested website domain in the DNS query packet.

4. If the website domain matches prohibited criteria, the DNS reply sent back to the user is altered to redirect the user to a block page IP address instead of the actual website’s IP.


What needs to be configured before setting up a content security policy?

Before you can set up a content security policy (like Web Content Filter or DNS Content Filter policy), you must typically configure:

– An address object (defining source/destination IPs or users/groups)

– A schedule object (defining when the policy applies)

– A filtering profile (defining the specific content filtering rules, categories, actions, etc.)

Additionally, for features relying on external databases (like category filtering), you must have the appropriate Content Filtering license activated.

How do I access and use the Web Content Filter General screen?

Access the screen by navigating to Configuration > Security Service > Content Filter > Web Content Filter > General.

Use this screen to:

– Enable overall content filtering.

– Enable specific features like HTTPS Domain Filter.

– Configure global settings like block/warn pages, redirect URLs, and denied access messages.

– Set the timeout for the category service.

– Test website categories.

– Manage (Add, Edit, Remove, Reorder) Web Content Filter profiles.

Refer to Table 194 for details on each field.

Table 194 Configuration > Security Service > Content Filter > Web Content Filter> General (Selected Fields)

LABELDESCRIPTION
General Settings
Enable HTTPS Domain Filter for HTTPS trafficSelect this check box to have the Zyxel Device block HTTPS web pages using the cloud category service by checking the SNI in the client request against categories (domain name match only).
Enable Content Filter HTTPS Domain Filter Block/Warn PageUse this field to have the Zyxel Device display a warning page instead of a blank page when an HTTPS connection is redirected.
Block/Warn Page PortUse the default port number or specify a unique custom port for the warning page.
Drop connection when HTTPS connection with SSL V3 or previous versionSelect this check box to have the Zyxel Device block HTTPS web pages using SSL V3 or a previous version.
Content Filter Category Service TimeoutSpecify the allowable time period in seconds (1-60) for accessing the external web filtering service’s server.
Denied Access MessageEnter a message (up to 127 characters) to display when content filter blocks access to a web page.
Redirect URLEnter the URL of a web page to send users to when their web access is blocked. This page opens in a new frame below the denied access message (if configured). Format: “http://&#8221; or “https://&#8221; followed by URL.
Test Web Site Category
URL to testEnter a web site URL to check which category it belongs to according to the Zyxel Device’s database. Displays results for both full URL (Content Filtering) and domain name (HTTPS Domain Filter).
If you think the category is incorrect…Click this link to see the category recorded in the Zyxel Device’s database or submit a review request if you believe it’s incorrect.
Profile Management
AddClick Add to create a new content filter profile.
EditClick Edit to make changes to a selected content filter profile.
RemoveClick Remove to delete a selected content filter profile.
ReferencesSelect an entry and click References to see which settings use this profile.
#Index number of the content filter profile.
NameName of the content filter profile rule.
DescriptionDescription of the content filter profile rule.
ReferenceDisplays the number of times this profile is used in an Object Reference (e.g., in a security policy).
ActionClick the icon to apply the content filter profile within a security policy (navigates to Policy Control screen).
ApplyClick Apply to save changes made on this screen.
ResetClick Reset to revert the screen to its last-saved settings.

How do I apply a Web Content Filter profile to a Security Policy?

1. Navigate to the Web Content Filter General screen (Configuration > Security Service > Content Filter > Web Content Filter > General).

2. In the Profile Management section, select the content filter profile you want to apply.

3. Click the icon in the Action column for that profile.

4. This will take you to the Configuration > Security Policy > Policy Control screen.

5. Find the security policy rule you want to apply the profile to (e.g., LAN1_Outgoing).

6. Edit that security policy rule.

7. In the policy rule’s settings, locate the UTM Profile section.

8. Select your desired Web Content Filter profile from the dropdown list.

9. Configure the logging option for the profile (e.g., Log: by profile).

10. Click OK to save the changes to the security policy rule.


What information is displayed for each security policy rule in the Policy Control screen?

The Policy Control screen (Configuration > Security Policy > Policy Control) displays the following information for each IPv4 and IPv6 security policy rule:

Table 195 Configuration > Security Service > Content Filter > Action (Columns)

LABELDESCRIPTION
Priority (Pri…)The position of the policy in the list; policies are applied in sequence. ‘Default’ indicates the default policy.
Status (St…)An icon indicating if the policy is active (lit) or inactive (dimmed).
NameThe name of the Security policy.
From / ToThe direction of traffic flow (source zone to destination zone) the policy applies to (e.g., LAN1 to WAN, any to ZyWALL).
IPv4/IPv6 SourceThe source address object(s) (IP, FQDN, geographic, group) the policy applies to.
IPv4/IPv6 DestinationThe destination address object(s) (IP, FQDN, geographic, group) the policy applies to.
ServiceThe service object(s) (protocol, port) the policy applies to.
UserThe user or user group object the policy applies to.
ScheduleThe schedule object defining when the policy is active. ‘none’ means always active if enabled.
Action (A…)The action taken when traffic matches the policy: allow, deny, or reject.
LogIndicates whether logging (no, log, log alert) is enabled for matched traffic.
ProfileShows which Security Service profiles (e.g., Content Filter, Anti-Malware) are applied to this policy. Icons can be clicked to edit the profile.

How do I add or edit a Web Content Filter profile based on Category Service?

1. Navigate to Configuration > Security Service > Content Filter > Web Content Filter > General.

2. In the Profile Management section, click Add to create a new profile or select an existing profile and click Edit.

3. Ensure the Category Service tab is selected.

4. Configure the General Settings:

– Enter a Name and optional Description.

– Optionally enable SafeSearch for supported search engines.

– Enable Content Filter Category Service to use the external database (requires license).

– Configure logging options (Log all web pages).

– Choose the Action (Pass, Block, Warn, Log) for Managed Web Pages (categorized sites).

– Choose the Action (Pass, Block, Warn, Log) for Unrated Web Pages (uncategorized sites).

– Choose the Action (Pass, Block, Warn) when the Category Server is unavailable.

– Optionally enable Log-alert for Block/Warn actions.

5. Select Categories: Check the boxes for the website categories you want to manage (typically block).

6. Optionally test a URL against the category server.

7. Click OK to save the profile.

Refer to Table 196 for detailed descriptions of each field.

Table 196 Configuration > Security Service > Content Filter > Web Content Filter > General > Add > Category Service (Selected Fields)

LABELDESCRIPTION
NameEnter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive.
DescriptionOptional description (1-31 alphanumeric, _, -; no number first). Case-sensitive.
Enable SafeSearchAutomatically filter explicit results on Yahoo, Google, MSN Live Bing, Yandex.
Enable Content Filter Category ServiceEnable use of external database for categorization. Requires license.
Log all web pagesRecord access attempts for pages matching selected categories, unrated pages, or when the server is unavailable.
Action for Managed Web PagesSelect Pass, Block, or Log for pages matching selected categories. Blocked pages show denied message/redirect. If a page matches multiple categories and at least one is Block, it’s blocked.
Action for Unrated Web PagesSelect Pass, Block, Warn, or Log for pages not categorized by the service. Warn displays a message before allowing access.
Action When Category Server Is UnavailableSelect Pass, Block, or Warn for requested pages when the external database cannot be reached (timeout, resolution error, license issue).
Log-alert for Block/Warn actionGenerate logs at alert level (instead of info) for Block/Warn actions if Log is also selected for the corresponding action. Check logs in Monitor > Log > View Log > Priority.
Select All CategoriesCheck this box to select all categories below.
Clear All CategoriesCheck this box to deselect all categories below.
Managed CategoriesCheck the boxes for categories to which the ‘Action for Managed Web Pages’ applies. Requires Category Service license. See Table 197 for descriptions.
URL to testEnter a URL to see its category according to the content filter database.
Test Against Content Filter Category ServerClick to query the external server database for the category of the test URL.

Can you describe the Managed Categories available for Web Content Filtering?

Table 197 provides detailed descriptions for the managed categories used in Web Content Filtering. These categories cover a wide range of topics. Examples include:

Adult Topics: Content unsuitable for children.

Alcohol: Sites selling/promoting alcohol.

Anonymizing Utilities: Services that hide user identity.

Auctions Classifieds: Online bidding/selling sites.

Blogs/Wiki: Sites with dynamic user-generated content.

Business: Business-related information and services.

Chat: Real-time web-based messaging rooms (includes IRC).

Computing Internet: Computer hardware/software reviews, news.

Consumer Protection: Sites known for cheating consumers.

Content Server: URLs hosting images/media for other sites.

Dating Personals: Online dating, matchmaking sites.

Drugs: Information on illegal/recreational drugs.

Education Reference: Academic content, school sites.

Entertainment: Movies, music, TV, celebrity news.

Finance Banking: Financial information, online banking access.

Gambling: Sites allowing online betting/wagering.

Games: Online games, cheats, game info (non-profit).

Government Military: Official government/military sites.

Health: Health information and services.

Illegal UK: Specific illegal content hosted in the UK.

Information Security: Legitimate data protection information.

Job Search: Job listings, resume help.

Media Sharing: Sites for uploading/sharing media files.

Pornography: Materials intended to be sexually arousing.

Remote Access: Sites providing remote computer access.

Social Networking: General social interaction sites.

Weapons: Information on buying, making, using weapons.

… and many others.

Refer to Table 197 in the PDF for the complete list and detailed descriptions of all categories.


How do I configure a Web Content Filter profile using Custom Service (allowed/blocked lists and keywords)?

1. Navigate to Configuration > Security Service > Content Filter > Web Content Filter > General.

2. Click Add or select a profile and click Edit.

3. Select the Custom Service tab.

4. Configure the General Settings:

– Enter a Name and optional Description.

– Select Enable Custom Service.

– Optionally, select Allow web traffic for trusted web sites only to block everything *except* sites in the Trusted list.

– Optionally, select Check Common Trusted/Forbidden List to include the global lists configured separately.

5. Configure Restricted Web Features:

– Check boxes under Block to block ActiveX, Java, Cookies, or Web Proxy access.

– Optionally, select Allow Java/ActiveX/Cookies/Web proxy to trusted web sites to permit these features only for sites in the profile’s Trusted Web Sites list.

6. Manage Trusted Web Sites:

– Click Add/Edit/Remove to manage the list of allowed websites (enter domain names like `*.example.com` or `www.good-site.com`).

7. Manage Forbidden Web Sites:

– Click Add/Edit/Remove to manage the list of blocked websites (enter domain names like `*.bad-site.com`).

8. Manage Blocked URL Keywords:

– Click Add/Edit/Remove to manage the list of keywords. URLs containing these keywords in the domain name or path will be blocked (e.g., `*keyword*`).

9. Click OK to save the profile.

Refer to Table 198 for detailed descriptions of each field.

Table 198 Configuration > Security Service > Content Filter > Web Content Filter > General > Custom Service (Selected Fields)

LABELDESCRIPTION
NameEnter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive.
DescriptionOptional description (1-31 alphanumeric, _, -; no number first). Case-sensitive.
Enable Custom ServiceSelect to enable the trusted/forbidden lists and keyword blocking configured in this profile.
Allow Web traffic for trusted web sites onlyIf checked, blocks access to all sites *except* those listed in the Trusted Web Sites list below.
Check Common Trusted/ Forbidden ListSelect to incorporate the globally defined Common Trusted and Forbidden Web Sites lists (configured under Trusted/Forbidden Web Sites tabs) into this profile’s checks.
Restricted Web Features – BlockCheck boxes to block ActiveX, Java, Cookies, or Web Proxy. ActiveX/Java blocks the specific element; Proxy/Cookies blocks/removes the item but the page may load.
Allow Java/ActiveX/Cookies/ Web proxy to trusted web sitesIf checked, allows these restricted features only for sites included in the Trusted Web Sites list configured within this profile.
Trusted Web SitesManage the list of websites always allowed by this profile. Use Add/Edit/Remove. Enter host names (e.g., http://www.example.com, *.example.com). “*” is wildcard. Must contain “.”. Max 127 chars. Case-insensitive.
Forbidden Web SitesManage the list of websites always blocked by this profile. Use Add/Edit/Remove. Enter host names similarly to Trusted Web Sites.
Blocked URL KeywordsManage the list of keywords. Sites whose URLs contain these keywords (in domain or path) will be blocked. Use Add/Edit/Remove. Enter keywords (e.g., *bad_word*). “*” is wildcard. Max 127 chars. Case-insensitive. “|” is single char wildcard.

How do I manage the common Trusted and Forbidden Web Sites lists?

These lists provide a global set of allowed (Trusted) and blocked (Forbidden) websites that can be referenced by individual Content Filter profiles.

Accessing the Lists:

– Navigate to Configuration > Security Service > Content Filter > Web Content Filter > Trusted/Forbidden Web Sites.

– Click the Trusted Web Sites tab for the allowed list or the Forbidden Web Sites tab for the blocked list.

Managing Entries:

– Use the Add, Edit, and Remove buttons to manage the site entries.

– Enter host names (e.g., `www.example.com`, `*.example.com`). Do not include “http://&#8221;.

– Use “*” as a wildcard to match any string. Entries must contain at least one “.”. Maximum 127 characters, case-insensitive.

– Click Apply to save changes.

Using the Lists:

– Within a specific Web Content Filter profile (under the Custom Service tab), check the box labeled “Check Common Trusted/Forbidden List” to make that profile use these global lists in addition to its own specific lists.

Refer to Table 199 (Trusted) and Table 200 (Forbidden) for screen label details.

Table 199/200 Configuration > Security Service > Content Filter > Web Content Filter > Trusted/Forbidden Web Sites (Selected Fields)

LABELDESCRIPTION
Common Trusted/Forbidden Web SitesThe main list area displaying the sites.
AddClick to create a new entry.
EditSelect an entry and click to modify it.
RemoveSelect an entry and click to delete it.
#Index number of the site entry.
Trusted/Forbidden Web SiteDisplays the configured host name entry. Entry rules: Host names (e.g., http://www.good-site.com, *.zyxel.com). No “http://&#8221;. “*” wildcard allowed. Must contain “.”. Max 127 chars (0-9a-z-). Case-insensitive.
ApplyClick to save changes back to the Zyxel Device.
ResetClick to return the screen to its last-saved settings.

How do I access and use the DNS Content Filter General screen?

Access the screen by navigating to Configuration > Security Service > Content Filter > DNS Content Filter > General.

Use this screen to:

– Configure the Redirect IP address (default or custom) used when a DNS query is blocked.

– Test domain name categories.

– Manage (Add, Edit, Remove, Reorder) DNS Content Filter profiles.

Refer to Table 201 for details on each field.

Table 201 Configuration > Security Service > Content Filter > DNS Content Filter> General (Selected Fields)

LABELDESCRIPTION
General Settings
Redirect IPSelect ‘default’ to use the Zyxel default block page or ‘custom defined’ to specify a custom URL (IPv4 or IPv6 format like “http://[2001::1]/blocked_access”) where users are sent when DNS filtering blocks their request.
Test Domain Name Category
Domain name to testEnter a domain name to check its category.
If you think the category is incorrect…Click this link to see the category recorded in the Zyxel Device’s database or submit a review request.
Profile Management
AddClick Add to create a new DNS content filter profile.
EditClick Edit to make changes to a selected profile.
RemoveClick Remove to delete a selected profile.
ReferencesSelect an entry and click References to see which settings use this profile.
#Index number of the DNS content filter profile.
NameName of the DNS content filter profile.
DescriptionDescription of the profile.
ReferenceNumber of times this profile is used in an Object Reference.
ActionClick the icon to apply the profile within a security policy.
ApplyClick Apply to save changes made on this screen.
ResetClick Reset to revert the screen to its last-saved settings.

How do I add or edit a DNS Content Filter profile?

1. Navigate to Configuration > Security Service > Content Filter > DNS Content Filter > General.

2. In the Profile Management section, click Add or select a profile and click Edit.

3. Configure the General Settings:

– Enter a Name and optional Description.

– Select the Action (pass or redirect) for matching categories.

– Select the Log option (no, log, alert).

– Optionally enable SafeSearch and Restrict YouTube Access (Strict or Moderate).

4. Configure Scan Options:

– Optionally check Allow List and/or Block List to use the globally defined DNS Allow/Block lists.

5. Select Categories:

– Check the boxes for the website categories you want this profile’s Action to apply to.

– Optionally, Clone Categories Setting From Profile to copy settings from an existing profile.

6. Optionally test a domain name.

7. Click OK to save the profile.

Refer to Table 202 for detailed descriptions of each field.

Table 202 DNS Content Filter Add/Edit Profile (Selected Fields)

LABELDESCRIPTION
NameEnter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive.
DescriptionOptional description (1-31 alphanumeric, _, -; no number first). Case-sensitive.
ActionSelect ‘pass’ to allow access or ‘redirect’ to send users to the configured Redirect IP for matching categories.
LogSelect ‘no’, ‘log’, or ‘alert’ for attempts accessing sites in selected categories.
Enable SafeSearchAutomatically filter explicit results on YouTube, Google, MSN Live Bing.
Restrict YouTube AccessSelect ‘Strict’ (strong filtering) or ‘Moderate’ (allows more videos) to filter YouTube content.
Check White ListSelect to check the DNS Content Filter Allow List. Traffic matching the Allow List bypasses category checks in this profile.
Check Black ListSelect to check the DNS Content Filter Block List. Traffic matching the Block List is blocked/redirected regardless of category.
Select All CategoriesCheck to select all managed categories below.
Clear All CategoriesCheck to deselect all managed categories below.
Clone Categories Setting From ProfileChoose an existing profile to copy its category selections into this new profile.
Managed CategoriesCheck the boxes for categories to which the selected Action applies. Requires license. See Table 203 for descriptions.

Can you describe the Managed Categories available for DNS Content Filtering?

Table 203 provides detailed descriptions for the managed categories used in DNS Content Filtering. These categories are largely the same as those used for Web Content Filtering (Table 197) and cover a wide range of topics. Refer to Table 203 in the PDF for the complete list and detailed descriptions. Examples include Adult Topics, Alcohol, Business, Chat, Drugs, Gambling, Games, Social Networking, Weapons, etc.

How do I manage the DNS Content Filter Allow List and Block List?

These lists provide global sets of allowed (Allow List) and blocked (Block List) domains/IPs specifically for the DNS Content Filter feature.

Accessing the Lists:

– Navigate to Configuration > Security Service > Content Filter > DNS Content Filter.

– Click the Allow List tab or the Block List tab.

Managing Entries:

– Use the Add, Edit, and Remove buttons.

– When Adding/Editing, enter the IPv4 address (Allow List) or domain/FQDN (Block List) associated with the rule.

– Use Activate and Inactivate buttons to enable or disable specific rules.

– Click Apply to save changes.

Using the Lists:

– Within a specific DNS Content Filter profile, check the boxes labeled “Check Allow List” and/or “Check Block List” to make that profile use these global lists. The Allow List check happens first, bypassing other checks if matched. The Block List check typically happens next, blocking if matched.

Refer to Table 204 (Allow List) and Table 205 (Block List) for screen label details.

Table 204/205 DNS Content Filter Allow/Block List (Selected Fields)

LABELDESCRIPTION
AddClick to add a new rule. Enter the IPv4 address (Allow) or FQDN (Block).
EditClick to edit the selected rule.
RemoveClick to remove the selected rule.
ActivateSelect an entry and click to turn it on. (Block List: treats FQDN as prohibited).
InactivateSelect an entry and click to turn it off.
#Sequential value, not associated with a specific rule.
StatusIcon indicates if rule is active (lit) or inactive (dimmed).
White List / Black ListDisplays the configured IP address (Allow List) or FQDN (Block List).
ApplyClick to save changes back to the Zyxel Device.
ResetClick to return the screen to its last-saved settings.

What is the External Content Filter Server Lookup Procedure?

The lookup process when using the external database for Web Content Filtering (Category Service) is as follows:

1. A computer behind the Zyxel Device tries to access a website.

2. The Zyxel Device first checks its local Content Filter Cache for the website’s category. If found, it applies the configured action (block, log, etc.) based on the cached category.

3. The Content Filter Cache screen allows configuration of cache duration. The cache is cleared on device restart.

4. If the website is not in the cache, the Zyxel Device queries the external content filter database AND simultaneously sends the user’s request to the web server.

5. The external content filter server responds with the category information. The Zyxel Device then blocks and/or logs access based on the profile settings for that category and stores the website’s address and category in its local cache.


How can I block LAN users from using a remote WAN application like TeamViewer using Content Filtering?

This example demonstrates blocking TeamViewer, often categorized under “Remote Access”.

Step 1: Create/Edit a Content Filtering Profile

1. Go to Configuration > Security Service > Content Filter > Web Content Filter > General.

2. Click Add (or Edit an existing profile). Name it (e.g., NoRemoteAccess).

3. On the Category Service tab:

– Ensure Enable Content Filter Category Service is checked.

– Set Action for Managed Web Pages to Block.

– Select Log for Action for Managed Web Pages.

– Check the box for the Managed Category: Remote Access.

– Optionally enable Log-alert for Block/Warn action.

(See Table 206 for parameter summary)

Step 2: Add TeamViewer to Forbidden Sites/Keywords (Optional but Recommended)

1. In the same profile (NoRemoteAccess), go to the Custom Service tab.

2. Select Enable Custom Service.

3. Under Forbidden Web Sites, click Add.

4. Enter `*.*teamviewer*.*` as the keyword/site. (See Table 207)

5. Click OK to save the profile.

Step 3: Apply the Profile to Security Policy

1. Go to Configuration > Security Policy > Policy Control.

2. Select the outgoing LAN policy (e.g., LAN1_Outgoing, LAN2_Outgoing) and click Edit.

3. In the UTM Profile section, select the Web Content Filter profile you created (NoRemoteAccess).

4. Set Log to ‘by profile’.

5. Click OK.

6. Repeat for other LAN outgoing policies if necessary (e.g., LAN2_Outgoing).

Step 4: Verify

1. Check the Policy Control screen; mouse-over the UTM profile icon for the LAN_Outgoing rules to confirm NoRemoteAccess is applied.

2. Check logs in Monitor > Log > View Log for blocked attempts if LAN clients try to access TeamViewer.

Parameter Summary Tables:

Table 206 Content Filtering Profile Configuration Example

PROFILE NAMEENABLE CONTENT FILTER CATEGORY SERVICEACTIONLOGMANAGED CATEGORIESLOG-ALERT FOR BLOCK/WARN ACTION
NoRemoteAccessEnabledBlockLogRemote AccessEnabled

Table 207 Forbidden Web Sites Configuration Example

ENABLE CUSTOM SERVICEFORBIDDEN WEB SITES KEYWORD
Enabled*.*teamviewer*.*

Table 208 Security Policy Configuration Example

TOFROMLOGCONTENT FILTERING PROFILE
WANLAN1/LAN2By ProfileNoRemoteAccess

What is the purpose of the Anti-Spam feature?

The Anti-Spam feature helps identify and manage unsolicited commercial or junk e-mail (spam). It can mark suspected spam emails or discard them based on configured policies. It uses Allow Lists to identify legitimate email and Block Lists (including DNS Black Lists – DNSBL) to identify known or suspected spam sources, improving accuracy and efficiency.

What configuration options are available for Anti-Spam?

You can configure the Anti-Spam feature using several screens:

General Profile screens: Turn anti-spam on/off, manage anti-spam policies, and define actions for exceeding mail session thresholds.

Mail Scan screen: Enable and configure specific mail scanning functions like malicious mail checking and query timeouts.

Block/Allow List screens: Set up custom lists to explicitly identify spam (Block List) or legitimate email (Allow List) based on sender IP/email, headers, or subject.

DNSBL screens: Configure the device to check email sender/relay IPs against external DNS Black Lists.


What is the purpose of the Anti-Spam Allow List?

The Allow List is used to identify legitimate e-mail. You configure entries based on specific senders (IP or email address) or specific mail header fields/values. The Anti-Spam feature checks incoming email against the Allow List *first*. If an email matches an Allow List entry, it’s classified as legitimate, and no further anti-spam checks are performed on it. This helps prevent important emails from being misclassified as spam and improves processing speed.

What is the purpose of the Anti-Spam Block List?

The Block List is used to identify spam e-mail. You configure entries based on specific senders or forwarding servers (IP address), sender email addresses, specific header fields/values, or subject line content. If an email doesn’t match the Allow List, the Zyxel Device checks it against the Block List. If it matches a Block List entry, the email is classified as spam, and the configured action (e.g., drop, tag) is taken immediately. No further anti-spam checks are needed for that email, improving efficiency.

Which protocols does the Zyxel Anti-Spam feature check by default?

By default, the Zyxel Device’s anti-spam feature checks SMTP (Simple Mail Transfer Protocol) on TCP port 25 and POP3 (Post Office Protocol 3) on TCP port 110. You can also specify custom SMTP and POP3 ports for checking.

How can I view all headers of an email?

Most email programs only show basic headers like To:, From:, Subject:, and Date:. To see all headers (like Received:, Content-Type:), you need to look at the email’s properties or details within your email client. For example, in Microsoft Outlook Express, you would select the email, then go to File > Properties > Details. Clicking “Message Source” usually shows the entire raw email content, including all headers and the body. The exact steps vary depending on the email program used.

What is the E-mail Header Buffer Size for the Zyxel Device?

The Zyxel Device has a 5 KB buffer for checking an individual e-mail’s header. If an email’s header is longer than 5 KB, the device only checks the content within the first 5 KB of the header.

What is DNSBL in the context of Anti-Spam?

DNSBL stands for DNS Black List (also known as a DNS-based Blackhole List or DNS Block List). It’s an external server/service that maintains lists of IP addresses known or suspected of sending or forwarding spam. The Zyxel Device can be configured to query one or more DNSBLs using the IP addresses found in an email’s routing headers (Received: headers). If a DNSBL responds indicating that an IP address is listed, the Zyxel Device can classify the email as spam.

What needs to be done before using Anti-Spam features like IP Reputation, Mail Content Analysis, and Virus Outbreak Detection?

Before using these advanced Anti-Spam features, you must activate your Anti-Spam Service license for the Zyxel Device. You also need to configure your network zones before configuring anti-spam policies that reference them.

How do I access and use the Anti-Spam Profile screen?

Access the screen by navigating to Configuration > Security Service > Anti-Spam.

Use this screen to:

– Turn the anti-spam feature on or off globally (implicitly by having active profiles and applying them).

– Select the action (Forward Session or Drop Session) the device takes when the concurrent mail session threshold is reached.

– Manage (Add, Edit, Remove, Reorder) Anti-Spam profiles.

– Check the status of your Anti-Spam service license.

Refer to Table 209 for details on each field.

Table 209 Configuration > Security Service > Anti-Spam > Profile (Selected Fields)

LABELDESCRIPTION
General Settings
Action taken when mail sessions threshold is reachedSelect ‘Forward Session’ to allow excess sessions without spam filtering, or ‘Drop Session’ to drop excess mail connections.
Profile Management
AddClick to create a new anti-spam profile rule.
EditSelect a profile and click to modify it.
RemoveSelect a profile and click to delete it.
ReferencesSelect a profile and click to see which settings use it.
PriorityIndex number; rules are applied in turn.
NameName identifying the anti-spam rule.
DescriptionOptional extra information about the rule.
Scan OptionsShows which types (protocols) of traffic are scanned for spam by this profile.
ReferenceShows how many objects reference this rule.
Service
Service StatusDisplays license status: Activated, Not Activated, Expired, Not Licensed. May show remaining Grace Period if expired. Buttons Buy/Renew/Activate appear as needed.
Service TypeDisplays the type of registration: None, Standard, Trial.
Expiration DateDate your service license expires.
ApplyClick Apply to save changes made on this screen.
ResetClick Reset to revert the screen to its last-saved settings.

How do I add or edit an Anti-Spam profile?

1. Navigate to Configuration > Security Service > Anti-Spam.

2. In the Profile Management section, click Add or select an existing profile and click Edit.

3. Configure the General Settings:

– Enter a Name and optional Description.

– Select the Log option (no, log, log alert) for events related to this profile (DNSBL timeouts, list matches).

4. Configure Scan Options:

– Check the boxes for the lists/checks you want this profile to perform: Check Allow List, Check Block List, Check Malicious Mail, Check DNSBL.

5. Configure Actions For Spam Mail:

– For SMTP, select the action: drop, forward, or forward-with-tag.

– For POP3, select the action: forward or forward-with-tag.

6. Click OK to save the profile.

Refer to Table 210 for detailed descriptions of each field.

Table 210 Configuration > Security Service > Anti-Spam > Profile > Add (Selected Fields)

LABELDESCRIPTION
NameEnter a unique, descriptive name (1-31 alphanumeric, _, -; no number first). Case-sensitive.
DescriptionOptional description.
LogSelect ‘no’, ‘log’, or ‘log alert’ for DNSBL timeouts or list matches.
Check Allow ListSelect to check email against the configured Allow List first.
Check Block ListSelect to check email against the configured Block List.
Check Malicious MailSelect to enable malicious mail content checking (requires configuration on Mail Scan screen).
Check DNSBLSelect to check email against configured DNSBL domains.
Actions For Spam Mail – SMTPSelect ‘drop’ (discard), ‘forward’ (allow through), or ‘forward-with-tag’ (add tag to subject and allow).
Actions For Spam Mail – POP3Select ‘forward’ or ‘forward-with-tag’.

How do I access and use the Anti-Spam Mail Scan screen?

Access the screen by navigating to Configuration > Security Service > Anti-Spam > Mail Scan.

Use this screen to enable and configure Mail Scan functions, which must be enabled here before they can be selected within an Anti-Spam profile.

Options:

Enable Malicious Mail Checking: Turn on checking for malicious content.

– Define the tag (e.g., `[Malicious]`) added to the subject of detected emails.

– Define a custom X-Header name/value added to detected emails.

Query Timeout Settings: Configure how the device handles timeouts when querying external mail scan servers (if applicable, though DNSBL timeout is separate).

– Define actions for SMTP and POP3 timeouts (drop, forward, forward with tag).

– Set the Timeout Value (1-10 seconds).

– Define the tag added to the subject on timeout.

– Define a custom X-Header added on timeout.

Click Apply to save settings.

Refer to Table 211 for detailed descriptions.

Table 211 Configuration > Security Service > Anti-Spam > Mail Scan (Selected Fields)

LABELDESCRIPTION
Enable Malicious Mail CheckingSelect to identify spam by content (e.g., malicious content).
Malicious Mail TagEnter text (up to 15 ASCII) added to subject if malicious mail is found and policy is ‘forward with tag’.
Malicious X-HeaderSpecify X-Header name and value added to emails determined as spam.
Query Timeout Settings – SMTPSelect action (drop, forward, forward with tag) if SMTP query times out.
Query Timeout Settings – POP3Select action (forward, forward with tag) if POP3 query times out.
Timeout ValueHow long (1-10 sec) Zyxel Device waits for reply from mail scan server before timeout action.
Timeout TagEnter text (up to 15 ASCII) added to subject if query times out and action is ‘forward with tag’.
Timeout X-HeaderSpecify X-Header name and value added if query times out.

How do I access and use the Anti-Spam Block List screen?

Access the screen by navigating to Configuration > Security Service > Anti-Spam > Block/Allow List, and ensure the Block List tab is selected.

Use this screen to configure entries that identify spam e-mail based on various criteria.

Options:

Enable Block List Checking: Globally enables/disables using active Block List entries.

Block List Spam Tag: Define a tag (up to 15 ASCII) added to the subject of emails matching the Block List if the profile action is ‘forward with tag’.

Block List X-Header: Specify a custom X-Header name/value added to emails matching the Block List.

Rule Summary: Manage individual block list entries using Add, Edit, Remove, Activate, Inactivate buttons.

– Entries can be of Type: Subject, IP Address, IPv6 Address, E-Mail Address, or Mail Header.

– Content field shows the specific value being checked for each entry type.

Click Apply to save settings.

Refer to Table 212 for detailed descriptions.

Table 212 Configuration > Security Service > Anti-Spam > Block/Allow List > Block List (Selected Fields)

LABELDESCRIPTION
Enable Block List CheckingSelect check box to have Zyxel Device treat email matching an active block list entry as spam.
Block List Spam TagEnter text (up to 15 ASCII) added to subject if matched and policy is ‘forward with tag’.
Block List X-HeaderSpecify X-Header name and value added to matched emails.
AddClick to create a new block list entry.
EditSelect an entry and click to modify it.
RemoveSelect an entry and click to delete it.
ActivateSelect an entry and click to enable it.
InactivateSelect an entry and click to disable it.
StatusIcon shows if entry is active or inactive.
#Entry’s index number.
TypeCriterion: Subject, source/relay IP Address, source/relay IPv6 Address, source E-Mail Address, or Mail Header.
ContentThe actual value checked: subject text, IP/IPv6 address, email address, or header value.

How do I add or edit entries in the Anti-Spam Block or Allow List?

1. Navigate to Configuration > Security Service > Anti-Spam > Block/Allow List.

2. Select the Block List tab or the Allow List tab.

3. Click Add to create a new entry, or select an existing entry and click Edit.

4. Check the Enable Rule box to make this entry active.

5. Select the Type of check:

Subject: Check the email’s subject line.

IP Address: Check the source or relay IPv4 address.

IPv6 Address: Check the source or relay IPv6 address.

E-Mail Address: Check the source email address or domain name.

Mail Header: Check a specific header field and value.

6. Enter the corresponding keyword or value:

– For Subject: Enter text (up to 63 ASCII) to find in the subject. Use ‘?’ or ‘*’ wildcards if needed.

– For IP Address: Enter the IPv4 address (dotted decimal) and optionally Netmask.

– For IPv6 Address: Enter the IPv6 address with prefix.

– For E-Mail Address: Enter a keyword (up to 63 ASCII) like an address or domain (*.example.com). Use ‘?’ or ‘*’ wildcards.

– For Mail Header: Enter the Mail Header Field Name (e.g., Received) and the Field Value Keyword (e.g., spamdomain.com). Use ‘?’ or ‘*’ wildcards in the value.

7. Click OK to save the entry.

Refer to Table 213 for detailed field descriptions and Section 27.5.2 for wildcard usage.

Table 213 Anti-Spam Block/Allow List Add/Edit Fields

LABELDESCRIPTION
Enable RuleSelect to activate this entry. Must also enable list checking globally and use in a profile.
TypeSelect Subject, IP Address, IPv6 Address, E-Mail Address, or Mail Header.
Mail Subject Keyword(Subject Type) Enter text (up to 63 ASCII) to match in subject. Spaces not allowed (? wildcard can substitute). See Sec 27.5.2.
Sender or Mail Relay IP Address(IP Address Type) Enter IPv4 address (dotted decimal).
Sender or Mail Relay IPv6 Address(IPv6 Address Type) Enter IPv6 address with prefix.
Netmask(IP Address Type) Enter subnet mask if applicable.
Sender E-Mail Address(E-Mail Type) Enter keyword (up to 63 ASCII, e.g., user@example.com, *.example.com). See Sec 27.5.2.
Mail Header Field Name(Mail Header Type) Enter header name part (before colon, e.g., Received). Up to 63 ASCII.
Field Value Keyword(Mail Header Type) Enter header value part (after colon, e.g., mail.example.com). Up to 63 ASCII. See Sec 27.5.2.

What regular expressions or wildcards can be used in Anti-Spam Block/Allow list entries?

When configuring entries based on e-mail subject, e-mail address, or e-mail header value, you can use:

– A question mark (?) as a single-character wildcard. For example, `a?c` matches `abc`, `acc`, etc.

– An asterisk (*) as a multi-character wildcard matching any string. It can be used anywhere in the string, and multiple asterisks can be used, but not side-by-side (must have other characters between them). For example, `*@example.com` matches any email address ending in `@example.com`. `*bad_word*` matches if “bad_word” appears anywhere.

Note: For Mail Header checks, the Zyxel Device only checks the *first* header that matches the specified Field Name.


How do I access and use the Anti-Spam Allow List screen?

Access the screen by navigating to Configuration > Security Service > Anti-Spam > Block/Allow List, and then clicking the Allow List tab.

Use this screen to configure entries that identify legitimate e-mail, ensuring it bypasses further spam checks.

Options:

Enable Allow List Checking: Globally enables/disables using active Allow List entries. Email matching an active entry is forwarded without further checks.

Allow List X-Header: Specify a custom X-Header name/value added to emails matching the Allow List.

Rule Summary: Manage individual allow list entries using Add, Edit, Remove, Activate, Inactivate buttons (similar to the Block List).

– Entries can be of Type: Subject, IP Address, IPv6 Address, E-Mail Address, or Mail Header.

– Content field shows the specific value being checked.

Click Apply to save settings.

Refer to Table 214 for detailed descriptions.

Table 214 Configuration > Security Service > Anti-Spam > Block/Allow List > Allow List (Selected Fields)

LABELDESCRIPTION
Enable Allow List CheckingSelect check box to have Zyxel Device forward email matching an active allow list entry without further spam checks.
Allow List X-HeaderSpecify X-Header name and value added to matched emails.
AddClick to create a new allow list entry. See Sec 27.5.1.
EditSelect an entry and click to modify it. See Sec 27.5.1.
RemoveSelect an entry and click to delete it.
ActivateSelect an entry and click to enable it.
InactivateSelect an entry and click to disable it.
StatusIcon shows if entry is active or inactive.
#Entry’s index number.
TypeCriterion: Subject, source/relay IP Address, source/relay IPv6 Address, source E-Mail Address, or Mail Header.
ContentThe actual value checked: subject text, IP/IPv6 address, email address, or header value.

How do I access and use the Anti-Spam DNSBL screen?

Access the screen by navigating to Configuration > Security Service > Anti-Spam > DNSBL.

Use this screen to configure the Zyxel Device to check sender and relay IP addresses from email headers against external DNS Black Lists (DNSBLs).

Options:

Enable DNS Black List (DNSBL) Checking: Turns the DNSBL feature on/off.

DNSBL Spam Tag: Define a tag (up to 15 ASCII) added to the subject of emails flagged by DNSBL if the profile action is ‘forward with tag’.

Advanced Settings (Show/Hide):

Max. IPs Checking Per Mail: Set the maximum number (1-5) of sender/relay IPs from the header to check against DNSBLs.

IP Selection Per Mail: Choose whether to check the ‘first N IPs’ (starting from sender) or ‘last N IPs’ (starting from final relay) in the header.

Query Timeout Settings: Configure actions if DNSBL queries time out.

– Define actions for SMTP and POP3 timeouts (drop, forward, forward with tag).

– Set the Timeout Value (1-10 seconds).

– Define the tag added to the subject on timeout.

– Define a custom X-Header added on timeout.

DNSBL Domain List: Manage the list of DNSBL server domains to query using Add, Edit, Remove, Activate, Inactivate buttons.

Click Apply to save settings.

Refer to Table 215 for detailed descriptions.

Table 215 Configuration > Security Service > Anti-Spam > DNSBL (Selected Fields)

LABELDESCRIPTION
Enable DNS Black List (DNSBL) CheckingSelect to enable checking sender/relay IPs against DNSBL domains listed below.
DNSBL Spam TagEnter text (up to 15 ASCII) added to subject if matched and policy is ‘forward with tag’.
Max. IPs Checking Per MailSet maximum number (1-5) of IPs in mail header to check.
IP Selection Per MailSelect ‘first N IPs’ (start check from sender IP) or ‘last N IPs’ (start check from last relay IP).
Query Timeout Settings – SMTPSelect action (drop, forward, forward with tag) if SMTP DNSBL query times out.
Query Timeout Settings – POP3Select action (forward, forward with tag) if POP3 DNSBL query times out.
Timeout ValueHow long (1-10 sec) Zyxel Device waits for reply from DNSBL server before timeout action.
Timeout TagEnter text (up to 15 ASCII) added to subject if query times out and action is ‘forward with tag’.
Timeout X-HeaderSpecify X-Header name and value added if query times out.
Add (DNSBL Domain List)Click to add a new DNSBL domain server.
EditSelect a domain and click to modify it.
RemoveSelect a domain and click to delete it.
ActivateSelect a domain and click to enable checks against it.
InactivateSelect a domain and click to disable checks against it.
StatusIcon shows if domain checking is active or inactive.
#Domain entry index number.
DNSBL DomainThe name of the DNSBL domain server (e.g., sbl.spamhaus.org).

What are some technical details about how the Zyxel Device performs DNSBL checks?

– The Zyxel Device checks only public sender and relay IP addresses found in the email headers; it does not check private IP addresses.

– For each public IP address being checked (up to the configured maximum), the device sends a separate DNS lookup query to *each* of the active DNSBL domains configured in its list, simultaneously.

– DNSBL servers reply indicating whether the queried IP address is listed (spam) or not.

– If *any* DNSBL server replies indicating an IP address is listed, the Zyxel Device *immediately* classifies the email as spam and takes the configured action (e.g., drop, tag), without waiting for further replies.

– If the device receives at least one non-spam reply for *each* of the checked IP addresses (from any of the queried DNSBLs), it classifies the email as legitimate and forwards it, without waiting for all replies.

– Any further DNSBL replies arriving after the email has been classified (as spam or legitimate) have no effect.

– The Zyxel Device caches DNSBL responses for IP addresses for up to 72 hours to reduce external queries.

– If conflicting replies are received for the same IP address (e.g., one DNSBL says spam, another says not spam before a classification is made based on other IPs), the device classifies the email as spam.


What is Astra Cloud Security?

Astra Cloud Security is a platform providing security services, like content filtering and URL blocking, to protect mobile devices that have the Astra app installed. It consists of:

– The Astra web portal: Managed by an administrator to configure security services and manage users/devices.

– The Astra app: Installed on members’ mobile devices to enforce the security policies configured by the admin, protecting traffic even when users are outside the main network perimeter. It can also provide email leakage detection alerts.


How many mobile devices can use the same account to log into the Astra app simultaneously?

Only two mobile devices can use the same member account to log into the Astra app at a time. If a user wants to log in on a third device, the administrator needs to remove one of the existing devices associated with that account via the Astra web portal first.

How do I access the Astra Cloud Security information screen on the Zyxel Device?

Click Security Service > Astra Cloud Security on the Zyxel Device’s Web Configurator. This screen provides links to the Astra product page (‘Learn More’), the admin web portal (‘Astra portal’), and QR codes for downloading the Astra app for Android (Google Play) and iOS (App Store).

What is the Device Insight feature used for?

Device Insight allows administrators to identify and create profiles based on the types of devices (e.g., computer, mobile phone, IoT device) and their operating systems (e.g., Windows, iOS, Android) connected to the Zyxel Device’s LAN, VLAN, or DMZ networks. These profiles can then be used in Security Policies (Policy Control) to enforce rules, such as blocking specific device types from accessing certain resources or the Internet.

What is a requirement for Device Insight to collect client information correctly?

For Device Insight to collect client information, the clients must be in the same IP subnet within the LAN, VLAN, or DMZ networks directly behind the Zyxel Device. Information from clients in different IP subnets might not be collected correctly, especially if traffic passes through another router or Layer-2 switch first.

How do I access and use the Device Insight screen?

Access the screen by navigating to Configuration > Object > Device Insight.

Use this screen to:

– Enable or disable the Device Insight feature globally.

– Manage (Add, Edit, Remove) Device Insight profiles.

– View existing profiles, their descriptions, and how many policies reference them.

Refer to Table 216 for details.

Table 216 Configuration > Object > Device Insight

LABELDESCRIPTION
EnableSelect to enable device insight feature. Clear to disable it.
AddClick to create a new, user-configured profile.
EditSelect a profile and click Edit (or double-click) to modify its settings.
RemoveSelect a profile and click Remove to delete it (confirmation required).
ReferencesSelect a profile and click References to see which settings use it.
#Sequential value identifying the profile row.
NameDisplays the name of the device insight profile.
DescriptionDisplays the description, if configured.
ReferenceDisplays the number of times this profile is used in a policy.

How do I add or edit a Device Insight profile?

1. Navigate to Configuration > Object > Device Insight.

2. Click Add or select an existing profile and click Edit.

3. Enter a Profile Name (1-31 alphanumeric, _, -; no number first; unique; case-sensitive).

4. Enter an optional Description (up to 63 single-byte characters).

5. Under Category, check the box(es) for the type(s) of devices this profile should match (e.g., Computer, IP Camera, Mobile Phone/Tablet, IoT).

6. Under Operating System, check the box(es) for the OS(es) this profile should match (e.g., Windows, iOS, macOS, Android, Linux, Others).

7. Click OK to save the profile.

Refer to Table 217 for details.

Table 217 Configuration > Object > Device Insight> Add/Edit

LABELDESCRIPTION
Profile NameType a unique name (1-31 alphanumeric, _, -; no number first; case-sensitive).
DescriptionOptional description (up to 63 single-byte chars).
CategorySelect the type(s) of device used by the connected client (e.g., Computer, Mobile Phone/Tablet, IoT).
Operating SystemSelect the operating system(s) used by the connected client (e.g., Windows, macOS, iOS, Android, Linux).

How can I block specific device types (e.g., mobile phones) on one LAN from accessing another LAN using Device Insight?

Here’s the process to block mobile phones on LAN2 from accessing LAN1:

1. Create a Device Insight Profile for Mobile Phones:

– Go to Configuration > Object > Device Insight and click Add.

– Name the profile (e.g., `MobilePhone`).

– Optionally add a description.

– Under Category, check `Mobile Phone/Tablet`.

– Under Operating System, check all relevant mobile OSes (e.g., `iOS`, `Android`, potentially `Others`).

– Click OK.

2. Create or Edit the Security Policy:

– Go to Configuration > Security Policy > Policy Control.

– Click Add to create a new policy (or find and Edit an existing policy governing LAN2 to LAN1 traffic).

– Name the policy (e.g., `LAN2_TO_LAN1_Mobile_Block`).

– Set From to `LAN2`.

– Set To to `LAN1`.

– Set Source, Destination, Service usually to `any` unless more specific rules are needed.

– In the Device field, select the `MobilePhone` profile you created.

– Set the Action to `deny`.

– Configure logging if desired.

– Click OK.

3. Ensure Policy Order and Access:

– Make sure this new blocking policy is placed correctly relative to other policies (usually specific blocks come before general allows).

– **Important:** Ensure you have other policies allowing necessary access (like your own management access to the device) *before* this blocking rule, otherwise you might lock yourself out. Resetting the device might be necessary if blocked.

(Based on Example in Sec 29.1.2, Tables 218, 219)


What precaution should be taken when creating blocking policies based on Device Insight?

Make sure to configure necessary security policies to ensure your own administrative access to the Zyxel Device *before* creating and applying broad blocking policies based on Device Insight. If a blocking policy inadvertently matches your management traffic, you could be locked out of the device, potentially requiring a device reset.

What are Zones used for on the Zyxel Device?

Zones are used to group network interfaces (Ethernet, VLAN, Bridge, PPPoE/PPTP) and/or VPN tunnels. Instead of applying settings to individual interfaces, the Zyxel Device uses these zones as source or destination points in many security and policy settings, such as Security Policies, Security Services (like Content Filter, Anti-Malware), and remote management rules. This simplifies configuration and management when multiple interfaces share the same security posture.

Can zones overlap? Can a single interface be assigned to multiple zones?

No, zones cannot overlap. Each physical interface, VLAN interface, bridge interface, PPPoE/PPTP interface, and VPN tunnel can be assigned to at most one zone. Virtual interfaces (like VLANs) are automatically assigned to the same zone as the physical interface on which they run.

What is Intra-zone traffic?

Intra-zone traffic is network traffic that occurs *between* interfaces or VPN tunnels that are members of the *same* zone. For example, if VLAN 2 and the LAN2 Ethernet interface are both in the ‘LAN2’ zone, traffic flowing directly between a device on VLAN 2 and a device on the LAN2 Ethernet segment is intra-zone traffic. Security policies may treat intra-zone traffic differently than inter-zone traffic (often allowing it by default unless specific rules are made).

What is Inter-zone traffic?

Inter-zone traffic is network traffic that flows *between* interfaces or VPN tunnels belonging to *different* zones. For example, traffic from an interface in the ‘LAN1’ zone to an interface in the ‘WAN’ zone is inter-zone traffic. This is the most common scenario where zone-based security policies and security service rules are applied.

What is Extra-zone traffic?

Extra-zone traffic is network traffic originating from or destined to any interface or VPN tunnel that is *not* currently assigned to any zone. Some zone-based security and policy settings might apply to this traffic, especially if the zone attribute in the rule can be set to ‘Any’ or ‘All’.

How do I access and use the Zone screen?

Access the screen by navigating to Configuration > Object > Zone.

Use this screen to:

– View a summary of all System Default zones (which cannot be deleted) and User Configuration zones.

– Add new User Configuration zones.

– Edit existing User Configuration zones (and view members of System Default zones).

– Remove User Configuration zones.

– View which interfaces or VPN tunnels are members of each zone.

– See how many times each zone is referenced in other configurations (e.g., policies).

Refer to Table 220 for details.

Table 220 Configuration > Object > Zone

LABELDESCRIPTION
User Configuration / System DefaultSections separating user-created zones from non-deletable built-in zones.
AddClick to create a new User Configuration zone.
EditSelect a zone and click Edit (or double-click) to modify its members (User zones) or view members (System zones).
RemoveSelect a User Configuration zone and click Remove to delete it (confirmation required).
ReferencesSelect a zone and click References to see where it’s used.
#Sequential value identifying the zone row.
NameDisplays the name of the zone.
MemberDisplays the names of the interfaces and/or VPN tunnels belonging to this zone.
ReferenceDisplays the number of times this zone is used as an Object Reference in policies, etc.

How do I add or edit a Zone?

1. Navigate to Configuration > Object > Zone.

2. To add, click Add. To edit, select a User Configuration zone and click Edit.

3. If adding, enter a Name for the zone (1-31 alphanumeric, _, -; no number first; case-sensitive).

4. Use the Member List section:

– The Available list shows interfaces and VPN tunnels not currently assigned to any zone.

– The Member list shows interfaces and VPN tunnels currently assigned to this zone.

– Select items in the Available list and click the right arrow button (`>`) to add them to this zone.

– Select items in the Member list and click the left arrow button (`<`) to remove them from this zone (they return to Available).

– You can use Shift or Ctrl keys to select multiple items.

5. Click OK to save the zone configuration.

Refer to Table 221 for details.

Table 221 Configuration > Object > Zone > Add/Edit

LABELDESCRIPTION
Name(Read-only for system default). For user zones: Type name (1-31 alphanumeric, _, -; no number first; case-sensitive).
Member ListUse the Available list, Member list, and arrow buttons to assign/unassign interfaces and VPN tunnels to this zone.

What features are available for managing Users and Groups?

The User/Group section allows you to manage user access and policies:

User screen: Provides a summary of all user accounts (admin, limited-admin, user, guest, ext-user, ext-group-user, dynamic-guest, guest-manager). Allows adding, editing, and removing user accounts and configuring their properties (type, password, authentication timeouts, group membership, 2FA, etc.).

Group screen: Provides a summary of all user groups. Allows adding, editing, and removing groups. Groups can contain access users (user, guest, ext-user, ext-group-user) and other groups, but not admin users.

Setting screen: Controls default settings for different user types (authentication timeouts), miscellaneous settings (lease renewal, idle timeout), login security (password complexity, change frequency, reset link), simultaneous login limits, and IP lockout settings for failed login attempts.

MAC Address screen: Allows configuration of allowed MAC addresses or OUIs for MAC authentication using the local user database (relevant for wireless SSIDs configured for MAC filtering).


What are the different types of user accounts available on the Zyxel Device and their capabilities/login methods?

Table 222 Types of User Accounts

TYPEABILITIESLOGIN METHOD(S)
Admin Users
adminChange Zyxel Device configuration (web, CLI)WWW, TELNET, SSH, FTP, Console
Access Users
limited-adminLook at Zyxel Device configuration (web, CLI)
Perform basic diagnostics (CLI)
Cannot execute commands such as ‘show running-config’
WWW, TELNET, SSH, Console
userAccess network services
Browse user-mode commands (CLI)
WWW, TELNET, SSH
guestAccess network servicesWWW
ext-userExternal user account (authenticated by external server like AD/LDAP/RADIUS)WWW
ext-group-userExternal group user account (authenticated by external server, membership checked)WWW
guest-managerCreate dynamic guest accountsWWW
dynamic-guestAccess network services (created dynamically, often time-limited)Hotspot Portal

Note: The default ‘admin’ account is always authenticated locally.


What is an ‘ext-user’ account? How is it authenticated?

An ‘ext-user’ account is a user account type configured on the Zyxel Device that corresponds to a user account stored and managed on an *external* authentication server, such as Active Directory (AD), LDAP, or RADIUS.

Authentication for ‘ext-user’ types should always be handled by the configured external server. The Zyxel Device forwards the authentication request to the external server. If the Zyxel Device attempts to authenticate an ‘ext-user’ against its local database, the attempt will fail.

You typically create ‘ext-user’ accounts on the Zyxel Device if you need to apply specific policies (like firewall rules or content filter profiles) to users who authenticate externally. If no specific Zyxel policies are needed for the external user, you don’t necessarily have to create a corresponding ‘ext-user’ account on the device.


What is an ‘ext-group-user’ account?

An ‘ext-group-user’ account type on the Zyxel Device is similar to ‘ext-user’ in that the user is primarily authenticated by an external AD or LDAP server. However, ‘ext-group-user’ allows you to group these external users on the Zyxel Device based on their group membership information *on the external server*. You configure the specific group attribute and value (on the external server) that defines membership in this Zyxel ‘ext-group-user’ object. This allows applying policies on the Zyxel Device based on external group membership.

What are dynamic-guest accounts and what types are there?

Dynamic guest accounts are temporary guest accounts created dynamically and stored in the Zyxel Device’s local user database. They have dynamically generated usernames and passwords and are typically valid only for a specific duration, expiring after a set date/time. They provide network access but usually cannot view device configuration.

There are three types based on creation/authentication method:

billing-users: Created by a guest manager or external printer (paid by cash) or created and paid for via an online payment service.

ua-users: Users who log in via the user agreement page (if configured).

trial-users: Free guest accounts created using the Free Time function (if configured).


What are User Groups used for, and are there any restrictions?

User Groups are used to apply the same rule or policy to multiple user accounts simultaneously, instead of creating separate rules for each user. A group can contain multiple user accounts and/or other user groups.

Restrictions:

– You cannot put admin users (like ‘admin’ or ‘limited-admin’) into a user group.

– You cannot put the default ‘admin’ account into any user group.

– User group names must be different from user account names.


What is User Awareness?

User Awareness refers to the Zyxel Device’s ability to identify and associate network traffic with specific users who have logged into the device. By default, users don’t need to log in; the device routes traffic for everyone. However, you can require users to authenticate (log in) first. Once a user logs in, the device becomes ‘aware’ of that user and their associated traffic (based on source IP). This allows you to create ‘user-aware policies’ (like firewall rules, content filter profiles) that apply specific restrictions or permissions based on the logged-in user or their group membership.

How do I access the User Summary screen?

Log into the Web Configurator and navigate to Configuration > Object > User/Group. The User tab is displayed by default, showing the user summary screen.

What are the rules and restrictions for creating user names?

– Length: 1 to 31 characters.

– Allowed characters: Alphanumeric (A-z, 0-9, no Unicode support), underscores (_), dashes (-).

– First character: Must be alphabetical (A-Z, a-z), underscore (_), or dash (-). Cannot be a number.

– Case-sensitivity: User names are case-sensitive (e.g., ‘bob’ is different from ‘BOB’).

– Uniqueness: User names must be different from user group names.

– Reserved names: Certain names are reserved and cannot be used (e.g., adm, admin, any, bin, daemon, debug, ftp, games, halt, ldap-users, lp, mail, news, nobody, operator, radius-users, root, shutdown, sshd, sync, uucp, zyxel).


Are there any reserved user names that cannot be used?

Yes, the following user names are reserved and cannot be used for user accounts: adm, admin, any, bin, daemon, debug, devicehaecived, ftp, games, halt, ldap-users, lp, mail, news, nobody, operator, radius-users, root, shutdown, sshd, sync, uucp, zyxel.

What options are available on the User Add/Edit General screen?

This screen allows configuration of individual user accounts.

Table 224 Configuration > Object > User/Group > User > Add/Edit_General

LABELDESCRIPTION
User NameType the username (following naming rules).
User TypeSelect the type: limited-admin, user, guest, ext-user, ext-group-user. (Not shown/editable for default admin).
PasswordEnter the password (1-64 chars). Complexity rules apply if enabled globally. Not available for ext-user/ext-group-user. Cannot be ‘1234’ after first login.
RetypeRe-enter the password for confirmation. Not available for ext-user/ext-group-user.
Group Identifier(ext-group-user only) Specify the value of the group membership attribute from the external AD/LDAP server.
Associated AAA Server Object(ext-group-user only) Select the AAA server object (AD/LDAP) used to authenticate this user.
DescriptionOptional description (up to 63 single-byte chars).
EmailEnter valid email address(es) for notifications or 2FA.
Mobile NumberEnter valid mobile number (up to 20 digits/chars: 1-9, +, *, #, (, ), -) for SMS notifications or 2FA.
Send Code(admin/limited-admin only) Click to send a verification code to the entered Email/Mobile Number for validation.
Authentication Timeout SettingsChoose ‘Use Default Settings’ (from Setting screen) or ‘Use Manual Settings’.
Lease Time(Manual Settings only) Minutes (1-1440, 0=unlimited) user has to renew session before logout.
Reauthentication Time(Manual Settings only) Minutes (1-1440, 0=unlimited) user can stay logged in before needing to re-authenticate.
User VLAN ID(ext-group-user only) Optionally select to enable dynamic VLAN assignment and specify the VLAN ID tag for this user’s traffic upon successful authentication.
Configuration Validation(ext-group-user only) Enter a username from the specified group and click Test to verify external server configuration.
OKSave changes and close.
CancelClose without saving.
Save(Add mode only) Save changes and proceed to Two-factor Authentication screen.

What are the password complexity requirements if enabled?

If Enable Password Complexity is checked in Configuration > Object > User/Group > Setting, passwords for local users must meet these criteria:

– Minimum length: 8 characters.

– Maximum length: 64 characters.

– Must include at least 1 uppercase letter (A-Z).

– Must include at least 1 lowercase letter (a-z).

– Must include at least 1 numeric character (0-9).

– Must include at least 1 special character (e.g., !@#$%^&*()_+).


How can I configure Two-Factor Authentication (2FA) for a user?

First, ensure 2FA is enabled globally for the desired access type (VPN Access and/or Admin Access) in Object > Auth. Method > Two-factor Authentication.

Then, configure it per user:

1. Go to Configuration > Object > User/Group > User.

2. Add a new user (click Add, configure General tab, then click Save) or select an existing user and click Edit.

3. Go to the Two-factor Authentication tab.

4. Check the box for Enable Two-Factor Authentication for VPN Access and/or Enable Two-Factor Authentication for Admin Access.

5. For each enabled access type, select the Two-factor Auth. Method:

Default: Inherits method from global settings.

User Defined: Choose explicitly for this user:

PIN code by SMS/Email: Sends code/link via SMS or Email (requires valid number/address on General tab).

Google Authenticator: Uses Time-based One-Time Passwords (TOTP) from the app.

6. If using Google Authenticator:

– Follow the on-screen steps (Step 1-3) to download the app, scan the QR code (or enter key manually) to add the account, and verify by entering the current code from the app.

– Once verified, download the backup codes for emergency login.

7. Click OK to save the user’s 2FA settings.

Refer to Table 226 for details.

Table 226 User Add/Edit Two-factor Authentication Screen (Selected Fields)

LABELDESCRIPTION
Enable Two-factor Authentication for VPN AccessRequire 2FA for this user’s VPN connections (types allowed globally are checked).
Enable Two-factor Authentication for Admin AccessRequire 2FA for this user’s admin login (Web/SSH/TELNET allowed globally are checked).
Two-factor Auth. MethodSelect Default (inherit) or User Defined (choose SMS/Email or Google Authenticator).
Set up Google AuthenticatorSteps (scan QR code, verify code) to link user account with Google Authenticator app.
View your backup codes(Appears after Google Auth setup) Download one-time use codes for login if app/device is unavailable.
Verify your device(During Google Auth setup) Enter code from app to complete setup.
RevokeClick to remove Google Authenticator registration for this user (reverts to SMS/Email if enabled).

What methods are available for Two-Factor Authentication for VPN and Admin access?

Table 225 Two Factor Authentication Methods

ACCESS TYPETWO-FACTOR AUTHENTICATION METHODSFACTOR 2 PASSWORD
VPNSMSCode
VPNEmailLink
VPNGoogle Authenticator appCode
AdminSMSCode
AdminEmailLink
AdminGoogle Authenticator appCode

What are backup codes used for in 2FA?

Backup codes are provided after successfully setting up Google Authenticator for 2FA. They are a set of one-time use codes that you should download and store safely. In the event that you cannot access your mobile device or the Google Authenticator app, you can use one of these backup codes instead of the app-generated code as the second factor during login. Each code can only be used once. If you regenerate backup codes, the old set becomes invalid.

How do I access the Group Summary screen?

Log into the Web Configurator and navigate to Configuration > Object > User/Group > Group.

What information and options are available on the Group Summary screen?

The Group screen provides a summary of user groups.

Table 227 Configuration > Object > User/Group > Group

LABELDESCRIPTION
AddClick to create a new user group.
EditSelect a group and click Edit (or double-click) to modify it.
RemoveSelect a group and click Remove to delete it (users within the group are not deleted). Confirmation required.
ReferencesSelect a group and click References to see where it’s used.
#Sequential value identifying the group row.
Group NameDisplays the name of the user group.
DescriptionDisplays the description for the user group.
MemberLists the members (users or other groups) in this user group, separated by commas.
ReferenceDisplays the number of times this group is used in a policy or other setting.

How do I add or edit a user group?

1. Navigate to Configuration > Object > User/Group > Group.

2. Click Add to create a new group, or select an existing group and click Edit.

3. Enter a Group Name (1-31 alphanumeric, _, -; no number first; unique; case-sensitive; different from user names).

4. Enter an optional Description (up to 60 characters, punctuation, spaces).

5. Use the Member List section:

– The Available list shows users (access users only) and other groups not currently in this group.

– The Member list shows the current members of this group.

– Select items (users/groups) from Available and click the right arrow (`>`) to add them.

– Select items from Member and click the left arrow (`<`) to remove them.

– Use Shift/Ctrl to select multiple items.

6. Click OK to save the group configuration.

Refer to Table 228 for details.

Table 228 Configuration > Object > User/Group > Group > Add

LABELDESCRIPTION
NameType user group name (1-31 alphanumeric, _, -; no number first; case-sensitive; different from usernames).
DescriptionOptional description (up to 60 chars, punctuation, spaces).
Member ListUse Available list, Member list, and arrow buttons to add/remove users (access types) and other groups as members.

How do I access the User/Group Setting screen? What is its purpose?

Access the screen by logging into the Web Configurator and navigating to Configuration > Object > User/Group > Setting.

Its purpose is to control various default and global settings related to user accounts, login behavior, and security, including:

– Default authentication timeout settings (Lease Time, Reauthentication Time) for each user type.

– Allowing automatic lease time renewal for access users.

– Enabling user idle detection and setting the timeout period.

– Enforcing password complexity rules.

– Setting password change frequency for admin users and the password reset link FQDN/IP.

– Limiting the number of simultaneous logins allowed per admin account and per access account.

– Configuring IP lockout based on failed login attempts (retry limit, lockout period).


What settings can be configured on the User/Group Setting screen?

The User/Group Setting screen allows configuration of several global user-related parameters.

Table 229 Configuration > Object > User/Group > Setting (Selected Fields)

LABELDESCRIPTION
User Authentication Timeout Settings
Default Authentication Timeout SettingsView default Lease Time and Reauthentication Time for each User Type. Click Edit icon to modify defaults for a type.
Miscellaneous Settings
Allow renewing lease time automatically(Access users) Check to allow users to select auto-renewal on their login status screen.
Enable user idle detection(Access users) Check to enable logging out idle users.
User idle timeout(Access users) Minutes an access user can be idle before automatic logout (if enabled).
Login Security
Password must changed every (days)(Admin type users) Set frequency (1-365 days) for required password changes.
Password reset link (FQDN/IP)Set the FQDN or IP address for the password reset link (Default: myrouter.local, or select Custom).
Enable Password ComplexitySelect to enforce strong password rules (min 8 chars, upper, lower, number, special char).
User Logon Settings
Limit the number of simultaneous logons for administration accountCheck to limit concurrent admin logins.
Maximum number per administration accountSet max concurrent logins (1-64) per admin user (if limit enabled).
Limit the number of simultaneous logons for access accountCheck to limit concurrent access user logins (per user, from different IPs).
Maximum number per access accountSet max concurrent logins (1-64) per access user (if limit enabled).
User IP Lockout Settings
Enable logon retry limitCheck to enable locking out IP addresses after too many failed login attempts.
Maximum retry countNumber of failed logins (1-99) from an IP before lockout (if enabled).
Lockout periodMinutes (1-65535) an IP address remains locked out after exceeding retry count (if enabled).
ApplyClick Apply to save changes.
ResetClick Reset to revert to last-saved settings.

How do I edit the default authentication timeout settings for a specific user type?

1. Navigate to Configuration > Object > User/Group > Setting.

2. In the Default Authentication Timeout Settings section, locate the row for the User Type you want to modify (e.g., admin, user, guest).

3. Click the Edit icon (pencil) at the beginning of that row.

4. A new screen (Edit User Auth Settings) will appear.

5. Enter the desired Lease Time in minutes (0-1440, 0 is unlimited).

6. Enter the desired Reauthentication Time in minutes (0-1440, 0 is unlimited).

7. Click OK.

Refer to Table 230 for field details.

Table 230 Default Auth Timeout Edit Screen

LABELDESCRIPTION
User TypeRead-only field showing the user type being edited.
Lease TimeEnter default lease time (minutes, 1-1440, 0=unlimited) for this user type.
Reauthentication TimeEnter default reauthentication time (minutes, 1-1440, 0=unlimited) for this user type.

What screen appears when a non-admin user logs into the Zyxel Device? What can they do?

When a non-admin user (like ‘user’ or ‘guest’) logs into the Zyxel Device web interface, they see a status screen (shown in Figure 462). This screen does *not* allow them to view or change device configuration.

From this screen, the user can:

– View their remaining Lease Time and Reauthentication Time.

– Optionally set a custom User-defined lease time (up to the max configured for their user type or default).

– Manually reset their lease time by clicking the Renew button (if applicable).

– Check a box to enable Updating lease time automatically (if allowed in the global Setting screen), which resets the lease time 30 seconds before expiry.

– Click Logout to terminate their session.

Refer to Table 231 for details.

Table 231 Web Configurator for Non-Admin Users

LABELDESCRIPTION
User-defined lease time (max … minutes)Allows user to set a lease time shorter than or equal to the maximum defined for their account. Default is the max/defined time.
RenewClick to manually reset the remaining lease time to the User-defined lease time value.
Updating lease time automaticallyAppears if allowed globally. User can check this box to have the session auto-renew 30 seconds before lease expiry.
Remaining time before lease timeoutDisplays current remaining lease time. Can be reset by Renew button or auto-renewal.
Remaining time before auth. timeoutDisplays current remaining reauthentication time. Cannot be reset by user.
LogoutClick to end the current login session.

How do I access and use the MAC Address Summary screen? What is its purpose?

Access the screen by navigating to Configuration > Object > User/Group > MAC Address.

Its purpose is to manage a list of allowed MAC addresses or Organizationally Unique Identifiers (OUIs) for wireless clients that will be authenticated using the Zyxel Device’s local database. This requires configuring an AP’s SSID security profile to use the Zyxel Device’s local database for MAC authentication.

Use this screen to:

– Add, Edit, or Remove specific MAC addresses or OUIs.

– View the list of configured MACs/OUIs and their descriptions.

Refer to Table 232 for details.

Table 232 Configuration > Object > User/Group > MAC Address

LABELDESCRIPTION
AddClick to create a new MAC/OUI entry.
EditSelect an entry and click Edit (or double-click) to modify it.
RemoveSelect an entry and click Remove to delete it (confirmation required).
MAC Address/ OUIDisplays the configured MAC address or OUI used for local MAC authentication.
DescriptionDisplays the optional description for the device/manufacturer.

How do I add or edit MAC addresses for authentication?

1. Navigate to Configuration > Object > User/Group > MAC Address.

2. Click Add or select an existing entry and click Edit.

3. In the MAC Address/OUI field, enter either:

– A full MAC address (six hexadecimal pairs separated by colons or hyphens, e.g., 00:11:22:AA:BB:CC).

– An OUI (the first three hexadecimal pairs identifying the manufacturer, e.g., 00:11:22).

4. Optionally, enter a Description for this entry (up to 60 characters, punctuation, spaces).

5. Click OK.

Refer to Table 233 for details.

Table 233 Configuration > Object > User/Group > MAC Address > Add

LABELDESCRIPTION
MAC Address/ OUIType the full MAC address or the OUI (first 3 octets). Use colons or hyphens as separators.
DescriptionOptional description (up to 60 characters).

What keywords are used to configure user attributes (type, leaseTime, reauthTime) in external LDAP or RADIUS servers?

When configuring user attributes on an external LDAP or RADIUS server to be recognized by the Zyxel Device, use the following keywords/attributes in the user’s configuration file or directory entry:

Table 234 LDAP/RADIUS: Keywords for User Attributes

KEYWORDCORRESPONDING ATTRIBUTE IN WEB CONFIGURATOR
typeUser Type. Possible Values: admin, limited-admin, dynamic-guest, user, guest.
leaseTimeLease Time. Possible Values: 1-1440 (minutes).
reauthTimeReauthentication Time. Possible Values: 1-1440 (minutes).

Example Formats:

– LDAP: Attributes might look like `type: admin`, `leaseTime: 99`, `reauthTime: 199` on separate lines or as defined by your LDAP schema.

– RADIUS: Attributes are often sent as Vendor-Specific Attributes (VSAs) or standard attributes in the reply packet, potentially formatted like `type=user;leaseTime=222;reauthTime=222` in a single string attribute, depending on the RADIUS server configuration.


How can a large number of Ext-User accounts be created efficiently?

If you need to create many Ext-User accounts on the Zyxel Device (e.g., to apply specific policies to users authenticated externally), using the Web Configurator individually can be time-consuming. A more efficient method is to use CLI (Command Line Interface) commands. You can extract the required user names from your external LDAP or RADIUS server and then create a script (e.g., a shell script) that uses Zyxel CLI commands to automatically generate the corresponding Ext-User accounts on the Zyxel Device.

What are the built-in system accounts, their purpose, activation, and default credentials?

These accounts are disabled by default unless specific features are activated.

Table 235 Built-in System Accounts

ACCOUNT NAMEACTIVATIONPURPOSESUPPORTED MODELSUSER NAME / PASSWORD
debug Owner must create an admin account for remote CLI (Telnet/SSH) access. Used by RD (Research & Development/Support) for troubleshooting information collection via CLI. Cannot log in via WWW/FTP. ZyWALL ATP, USG Flex (On-Premise/Cloud), VPN (Standalone/Nebula Orchestrator) User: debug
Password: Authentication Phrase (generated internally, time-limited, single-use).
devicehaecived Enabled when Device HA is configured. Cannot log in via WWW/SSH/FTP. Used internally by Zyxel Device to synchronize configuration, firmware, and licenses to a backup Device HA unit. ZyWALL ATP, USG Flex (On-Premise), VPN models supporting Device HA. User: devicehaecived
Password: Zyxel Device HA Pro Password (configured in Device HA settings).
support Activated during factory default setup using Nebula Control Center (NCC) Zero Touch Provisioning (ZTP). Allows administrator access via WWW/SSH/FTP for troubleshooting a Zyxel Device managed by NCC. ZyWALL USG Flex (On-Cloud mode) User: support
Password: Default is Zyxel Device serial number. Changed automatically when managed by NCC. Can be changed via NCC.
sdwan Activated when the Zyxel Device is managed by Nebula Orchestrator. Allows administrator access via WWW/SSH/FTP for troubleshooting a Zyxel Device managed by Nebula Orchestrator. ZyWALL VPN (Nebula Orchestrator managed) User: sdwan
Password: Default is Zyxel Device serial number. Can be changed using Nebula Orchestrator.

What are Address Objects and Address Groups used for?

Address Objects and Address Groups are fundamental building blocks for defining network entities in various Zyxel Device configurations.

Address Objects: Represent specific network addresses. They can define a single IP address (host), a range of IP addresses, or an entire subnet.

Address Groups: Collections of Address Objects and/or other Address Groups. They are used to simplify policy creation by allowing you to reference multiple network entities with a single group name.

They are used extensively in features like:

– Dynamic Routes

– Security Policies (Firewall Rules)

– Content Filtering Policies

– VPN Connection Policies (e.g., Policy Routes)


What is the Geo IP feature used for?

The Geo IP feature allows the Zyxel Device to identify the geographical location (country) associated with IP addresses. It uses a database that maps IP address blocks to countries. This feature enables you to:

– Update the Geo IP database.

– Manually configure specific country-to-IP address mappings.

– Use country information as criteria in security policies (e.g., block traffic to/from specific countries) and potentially other features like logging and reporting.


What are the types of address objects available on the Zyxel Device?

The types of address objects are:

HOST – the object uses an IP Address to define a host address

RANGE – the object uses a range address defined by a Starting IP Address and an Ending IP Address

SUBNET – the object uses a network address defined by a Network IP address and Netmask subnet mask

INTERFACE IP – the object uses the IP address of one of the Zyxel Device’s interfaces

INTERFACE SUBNET – the object uses the subnet mask of one of the Zyxel Device’s interfaces

INTERFACE GATEWAY – the object uses the gateway IP address of one of the Zyxel Device’s interfaces

GEOGRAPHY – the object uses the IP addresses of a country to represent a country

FQDN – the object uses a FQDN (Fully Qualified Domain Name).


What is an FQDN address object?

An FQDN (Fully Qualified Domain Name) object uses a domain name. An FQDN consists of a host and domain name. For example, http://www.zyxel.com is a fully qualified domain name, where “www” is the host, “zyxel” is the second-level domain, and “com” is the top level domain. mail.myZyxel.com.tw is also an FQDN, where “mail” is the host, “myZyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain.
In an address FQDN object, you can also use one wildcard. For example, *.zyxel.com. An FQDN is resolved to its IP address using the DNS server configured on the Zyxel Device.
FQDN Example Table:
HTTP:// WWW. ZYXEL. COM
host name second-level domain name top-level domain name
FQDN
Uniform Resource Locator (URL)

How can I access the Address Summary screen?

To access the Address Summary screen, click Configuration > Object > Address > Address.

What information is shown on the Address Summary screen (IPv4 and IPv6)?

The Address Summary screen (Configuration > Object > Address/Geo IP > Address) displays lists of IPv4 and IPv6 address objects configured on the Zyxel Device. The following table describes the labels and actions available on this screen:
Table 237 Configuration > Object > Address/Geo IP > Address
LABEL DESCRIPTION
IPv4 Address Configuration
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific address.
Name This field displays the configured name of each address object.
Type This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces.
IPv4 Address This field displays the IPv4 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Reference This displays the number of times an object reference is used in a profile.
IPv6 Address Configuration
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific address.
Name This field displays the configured name of each address object.
Type This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces.
IPv6 Address This field displays the IPv6 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Reference This displays the number of times an object reference is used in a profile.

How do I add or edit an IPv4 address object?

To access the IPv4 Address Add/Edit screen, go to the Address screen (Configuration > Object > Address/GeoIP > Address), and click either the Add icon or an Edit icon in the IPv4 Address Configuration section. This screen allows you to create a new IPv4 address or edit an existing one.

What fields are available when adding/editing an IPv4 address object?

The following table describes the labels available in the Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4) screen:
Table 238 Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4)
LABEL DESCRIPTION
Name Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Address Type Select the type of address you want to create. Note: The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
IP Address This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
Starting IP Address This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
Ending IP Address This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
Network This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the IP address of the network that this address object represents.
Netmask This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the subnet mask of the network that this address object represents. Use dotted decimal format.
Interface If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents.
Region If you selected GEOGRAPHY as the Address Type, use this field to select a country or continent. A GEOGRAPHY object uses the data from the country-to-IP/continent-to-IP address database. Go to the Configuration > Object > Address/Geo IP > Geo IP screen to configure the custom country-to-IP/continent-to-IP address mappings for a GEOGRAPHY object.
Country If you selected Geography as the Address Type, use this field to select a country.
FQDN If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

How do I add or edit an IPv6 address object?

To access the IPv6 Address Add/Edit screen, go to the Address screen (Configuration > Object > Address/GeoIP > Address), and click either the Add icon or an Edit icon in the IPv6 Address Configuration section. This screen allows you to create a new IPv6 address or edit an existing one.

What fields are available when adding/editing an IPv6 address object?

The following table describes the labels available in the Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6) screen:
Table 239 Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6)
LABEL DESCRIPTION
Name Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Object Type Select the type of address you want to create. Note: The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
IPv6 Address This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
IPv6 Starting Address This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
IPv6 Ending Address This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
IPv6 Address Prefix This field is only available if the Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address.
Interface If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents.
IPv6 Address Type Select whether the IPv6 address is a link-local IP address (LINK LOCAL), static IP address (STATIC), an IPv6 Stateless Address Auto Configuration IP address (SLAAC), or is obtained from a DHCPv6 server (DHCPv6).
Region If you selected Geography as the Address Type, use this field to select a country or continent.
FQDN If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

How do I access the Address Group Summary screen?

To access the Address Group screen, click Configuration > Object > Address/Geo IP > Address Group.

What information is shown on the Address Group Summary screen?

The Address Group screen provides a summary of all address groups. The following table describes the labels and actions available on this screen:
Table 240 Configuration > Object > Address/Geo IP > Address Group
LABEL DESCRIPTION
IPv4 Address Group Configuration
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific address group.
Name This field displays the name of each address group.
Description This field displays the description of each address group, if any.
Reference This displays the number of times an object reference is used in a profile.
IPv6 Address Group Configuration
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific address group.
Name This field displays the name of each address group.
Description This field displays the description of each address group, if any.
Reference This displays the number of times an object reference is used in a profile.

How do I add or edit an address group?

To access the Address Group Add/Edit screen, go to the Address Group screen (Configuration > Object > Address/Geo IP > Address Group), and click either the Add icon or an Edit icon in the IPv4 Address Group Configuration or IPv6 Address Group Configuration section. This screen allows you to create a new address group or edit an existing one.

What fields are available when adding/editing an address group?

The following table describes the labels available in the IPv4/IPv6 Address Group Configuration > Add/Edit screen:
Table 241 IPv4/IPv6 Address Group Configuration > Add
LABEL DESCRIPTION
Name Enter a name for the address group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description This field displays the description of each address group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Address Type Select the type of address you want to create. Note: The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
Member List The Member list displays the names of the address and address group objects that have been added to the address group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. Note: Only objects of the same address type can be added to a address group.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

Can objects of different address types be added to the same address group?

No. Only objects of the same address type (e.g., all IPv4 or all IPv6) can be added to a single address group.

What is the purpose of the Geo IP Summary screen?

The Geo IP Summary screen (Configuration > Object > Address/Geo IP > Geo IP) is used to update the database of country-to-IP and continent-to-IP address mappings and manually configure custom country-to-IP and continent-to-IP address mappings in geographic address objects. You can then use geographic address objects in security policies to forward or deny traffic to whole countries or regions.

What fields and actions are available on the Geo IP Summary screen?

The following table describes the labels available on the Configuration > Object > Address/Geo IP > Geo IP screen:
Table 242 Configuration > Object > Address/Geo IP > Geo IP
LABEL DESCRIPTION
Country Database Update
Latest Version This is the latest country-to-IP address database version on myZyxel.
Current Version This is the country-to-IP address database version currently on the Zyxel Device.
Update Now Click this to check for the latest country-to-IP address database version on myZyxel. The latest version is downloaded to the Zyxel Device and replaces the current version if it is newer. There are logs to show the update status. Note: Your Security Pack license must be valid.
Auto Update If you want the Zyxel Device to check weekly for the latest country-to-IP address database version on myZyxel, select the checkbox, choose a day and time each week and then click Apply. The default day and time displayed is the Zyxel Device current day and time.
Custom IPv4/IPv6 to Geography Rules
IPv4/IPv6 to Geography Enter an IP address, then click this button to query which country this IP address belongs to.
Add Click this to create a new entry.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
# This field is a sequential value, and it is not associated with a specific entry.
Geolocation This field displays the name of the country or region that is associated with this IP address.
Type This field displays whether this address object is HOST, RANGE or SUBNET.
IPv4/IPv6 Address This field displays the IPv4/IPv6 addresses represented by the type of address object.
Region vs. Continent
Region Enter a country name, then click the Region to Continent button to query which continent this country belongs to.
Continent Select a continent, then click the Region List button to query which countries belong to the continent.
Apply Click Apply to save the changes.
Reset Click Reset to return the screen to its last-saved settings.

How do I create a new geography-to-IP address mapping?

To create a new geography-to-IP address mapping, go to the Geo IP screen (Configuration > Object > Address/Geo IP > Geo IP), and click the Add icon in the Custom IPv4 to Geography Rules or Custom IPv6 to Geography Rules section.

What fields are available when adding a custom geography-to-IP address mapping?

The following table describes the labels available in the Geo IP > Add screen:
Table 243 Geo IP > Add
LABEL DESCRIPTION
Region Select the country or continent that maps to this IP address.
Address Type Select the type of address you want to create. Choices are: HOST, RANGE, SUBNET.
IP Address This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
IP Starting Address This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
IP Ending Address This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
Network / Netmask These fields are only available if the IPv4 Address Type is SUBNET. They cannot be blank. Enter the network IP and subnet mask that defines the IPv4 subnet.
IPv6 Address Prefix This field is only available if the IPv6 Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

What are service objects used for?

Service objects are used to define TCP applications, UDP applications, and ICMP messages. They are used in policy routes and security policies.

What are service groups used for?

Service groups are used when you want to create the same rule for several services, instead of creating separate rules for each service. Service groups may consist of services and other service groups. The sequence of members in the service group is not important.

What are the common IP protocols mentioned?

TCP (Transmission Control Protocol, IP protocol 6): Guarantees reliable delivery but is slower and more complex. Used for FTP, HTTP, SMTP, and TELNET. Creates connections and ensures data arrives in sequence.

UDP (User Datagram Protocol, IP protocol 17): Simpler and faster but less reliable. Used for DHCP, DNS, RIP, and SNMP. Sends short messages without guaranteeing sequence or arrival.

ICMP (Internet Control Message Protocol, IP protocol 1): Mainly used for error messages and diagnostics (like ping). Does not guarantee delivery.

Both TCP and UDP use 16-bit port numbers to identify source and destination applications.


How do I access the Service Summary screen?

To access the Service Summary screen, log in to the Web Configurator, and click Configuration > Object > Service > Service.

What information is shown on the Service Summary screen?

The Service Summary screen provides a summary of all services and their definitions. The following table describes the labels and actions available on this screen:
Table 244 Configuration > Object > Service > Service
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific service.
Name This field displays the name of each service.
Content This field displays a description of each service.
Reference This displays the number of times an object reference is used in a profile.

How do I add or edit a service object?

To access the Service Add/Edit screen, go to the Service screen (Configuration > Object > Service > Service), and click either the Add icon or an Edit icon. This screen allows you to create a new service or edit an existing one.

What fields are available when adding/editing a service object?

The following table describes the labels available in the Configuration > Object > Service > Service > Add/Edit screen:
Table 245 Configuration > Object > Service > Service > Edit
LABEL DESCRIPTION
Name Type the name used to refer to the service. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
IP Protocol Select the protocol the service uses. Choices are: TCP, UDP, ICMP, ICMPv6, and User Defined.
Starting Port This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports. (Valid range: 1-65535)
Ending Port This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports. (Valid range: 1-65535)
ICMP Type This field appears if the IP Protocol is ICMP or ICMPv6. Select the ICMP message used by this service. This field displays the message text, not the message number.
IP Protocol Number This field appears if the IP Protocol is User Defined. Enter the number of the next-level protocol (IP protocol). Allowed values are 1 – 255.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

How do I access the Service Group Summary screen?

To access the Service Group Summary screen, log in to the Web Configurator, and click Configuration > Object > Service > Service Group.

What is the purpose of the Default_Allow_WAN_To_ZyWALL service group?

If you want to access the Zyxel Device using HTTP, HTTPS, SSH, and/or TELNET from the WAN, you must add these service objects to the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group. This group is used in the default WAN_to_Device security policy to permit management access.

What information is shown on the Service Group Summary screen?

The Service Group Summary screen provides a summary of all service groups. The following table describes the labels and actions available on this screen:
Table 246 Configuration > Object > Service > Service Group
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific service group.
Family This field displays the Server Group supported type, according to your configurations in the Service Group Add/Edit screen. There are 3 types of families: Supports IPv4 only, Supports IPv6 only, Supports both IPv4 and IPv6.
Name This field displays the name of each service group. By default, the Zyxel Device uses services starting with “Default_Allow_” in the security policies to allow certain services to connect to the Zyxel Device.
Description This field displays the description of each service group, if any.
Reference This displays the number of times an object reference is used in a profile.

How do I add or edit a service group?

To access the Service Group Add/Edit screen, go to the Service Group screen (Configuration > Object > Service > Service Group), and click either the Add icon or an Edit icon. This screen allows you to create a new service group or edit an existing one.

What fields are available when adding/editing a service group?

The following table describes the labels available in the Configuration > Object > Service > Service Group > Add/Edit screen:
Table 247 Configuration > Object > Service > Service Group > Edit
LABEL DESCRIPTION
Name Enter the name of the service group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description Enter a description of the service group, if any. You can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed.
Configuration (Member List) The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

What are schedules used for on the Zyxel Device?

Schedules are used to set up one-time and recurring schedules for policy routes, security policies, and content filtering. Schedules are based on the Zyxel Device’s current date and time.

What are the types of schedules supported?

One-time Schedules: Begin on a specific start date and time and end on a specific stop date and time. Useful for long holidays and vacation periods.

Recurring Schedules: Begin at a specific start time and end at a specific stop time on selected days of the week (Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday). They always begin and end on the same day. Useful for defining workday and off-work hours.


How do I access the Schedule screen?

To access the Schedule screen, click Configuration > Object > Schedule.

What information is shown on the Schedule screen?

The Schedule screen provides a summary of all schedules. The following table describes the labels and actions available:
Table 248 Configuration > Object > Schedule
LABEL DESCRIPTION
One Time
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific schedule.
Name This field displays the name of the schedule, which is used to refer to the schedule.
Start Day / Time This field displays the date and time at which the schedule begins.
Stop Day / Time This field displays the date and time at which the schedule ends.
Reference This displays the number of times an object reference is used in a profile.
Recurring
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific schedule.
Name This field displays the name of the schedule, which is used to refer to the schedule.
Start Time This field displays the time at which the schedule begins.
Stop Time This field displays the time at which the schedule ends.
Reference This displays the number of times an object reference is used in a profile.

How do I add or edit a one-time schedule?

To access the One-Time Schedule Add/Edit screen, go to the Schedule screen (Configuration > Object > Schedule), and click either the Add icon or an Edit icon in the One Time section.

What fields are available when adding/editing a one-time schedule?

The following table describes the labels available in the Configuration > Object > Schedule > Edit (One Time) screen:
Table 249 Configuration > Object > Schedule > Edit (One Time)
LABEL DESCRIPTION
Configuration
Name Type the name used to refer to the one-time schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Day Time
StartDate Specify the year, month, and day when the schedule begins.

• Year 1900 – 2999

• Month 1 – 12

• Day 1 – 31 (it is not possible to specify illegal dates, such as February 31.)

StartTime Specify the hour and minute when the schedule begins.

• Hour – 0 – 23

• Minute – 0 – 59

StopDate Specify the year, month, and day when the schedule ends.

• Year 1900 – 2999

• Month 1 – 12

• Day – 1 – 31 (it is not possible to specify illegal dates, such as February 31.)

StopTime Specify the hour and minute when the schedule ends.

• Hour – 0 – 23

• Minute – 0 – 59

OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

How do I add or edit a recurring schedule?

To access the Recurring Schedule Add/Edit screen, go to the Schedule screen (Configuration > Object > Schedule), and click either the Add icon or an Edit icon in the Recurring section.

What fields are available when adding/editing a recurring schedule?

The following table describes the labels available in the Configuration > Object > Schedule > Edit (Recurring) screen:
Table 250 Configuration > Object > Schedule > Edit (Recurring)
LABEL DESCRIPTION
Configuration
Name Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Date Time (Note: Year, Month, and Day columns are not used)
StartTime Specify the hour and minute when the schedule begins each day.

• Hour – 0 – 23

• Minute – 0 – 59

StopTime Specify the hour and minute when the schedule ends each day.

• Hour – 0 – 23

• Minute – 0 – 59

Weekly
Week Days Select each day of the week the recurring schedule is effective.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

How do I access the Schedule Group screen?

To access the Schedule Group screen, click Configuration > Object > Schedule > Group.

What information is shown on the Schedule Group screen?

The Schedule Group screen provides a summary of all groups of schedules. The following table describes the fields:
Table 251 Configuration > Object > Schedule > Schedule Group
LABEL DESCRIPTION
Configuration
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific schedule.
Name This field displays the name of the schedule group, which is used to refer to the schedule.
Description This field displays the description of the schedule group.
Members This field lists the members in the schedule group. Each member is separated by a comma.
Reference This displays the number of times an object reference is used in a profile.

How do I add or edit a schedule group?

To access the Schedule Group Add/Edit screen, go to the Schedule Group screen (Configuration > Object > Schedule > Group), and click either the Add icon or an Edit icon in the Schedule Group section.

What fields are available when adding/editing a schedule group?

The following table describes the labels available in the Configuration > Object > Schedule > Schedule Group > Add/Edit screen:
Table 252 Configuration > Object > Schedule > Schedule Group > Add
LABEL DESCRIPTION
Group Members
Name Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description Enter a description of the service group, if any. You can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed.
Member List The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list.
OK Click OK to save your changes back to the Zyxel Device.
Cancel Click Cancel to exit this screen without saving your changes.

What types of AAA servers can be used for access control?

You can use an AAA (Authentication, Authorization, Accounting) server to provide access control. The AAA server can be an Active Directory (AD), LDAP, or RADIUS server.

What are AAA server objects used for?

AAA server objects are used to create and manage settings for using AAA servers (AD, LDAP, RADIUS). These objects are then used when configuring external group user objects (ext-group-user) and authentication method objects.

How does user authentication via an LDAP/AD server work?

The procedure is as follows:

1. A user logs in with a user name and password pair.

2. The Zyxel Device tries to bind (or log in) to the LDAP/AD server.

3. When the binding process is successful, the Zyxel Device checks the user information in the directory against the user name and password pair.

4. If it matches, the user is allowed access. Otherwise, access is blocked.


What is ASAS?

ASAS (Authenex Strong Authentication System) is a RADIUS server that works with the One-Time Password (OTP) feature. You need to purchase a Zyxel Device OTP package (which includes server software and physical OTP tokens/PIN generators) to use this feature.

How do I set up and use OTP with ASAS?

Follow these steps to use OTP with ASAS (refer to the documentation on the ASAS CD for details):

1. Install the ASAS server software on a computer.

2. Create user accounts on the Zyxel Device and in the ASAS server.

3. Import each token’s database file (located on the included CD) into the server.

4. Assign users to OTP tokens (on the ASAS server).

5. Configure the ASAS as a RADIUS server in the Zyxel Device’s Configuration > Object > AAA Server screens.

6. Give the OTP tokens to (local or remote) users.

• Use the Configuration > Object > AAA Server > Active Directory (or LDAP) screens to configure Active Directory or LDAP server objects.

• Use the Configuration > Object > AAA Server > RADIUS screen to configure the default external RADIUS server to use for user authentication.


What types of authentication servers does the Zyxel Device support?

The Zyxel Device supports the following types of authentication servers:

Local user database: The built-in database for authenticating administrative users (Web Configurator), network access users, and VPN users.

Directory Service (LDAP/AD): Lightweight Directory Access Protocol / Active Directory allows authentication against an external directory server where user profiles and login information are stored.

RADIUS: Remote Authentication Dial-In User Service allows authentication against an external or built-in RADIUS server, enabling validation of many users from a central location.


What is a Distinguished Name (DN)?

A Distinguished Name (DN) uniquely identifies an entry in a directory. It consists of attribute-value pairs separated by commas. The leftmost attribute is the Relative Distinguished Name (RDN), which provides a unique name for entries that share the same “parent DN”. For example: `cn=domain1.com, ou=Sales, o=MyCompany, c=US`.

What is a Base DN?

A Base DN specifies a starting point for searches within a directory. It usually contains information like the organization name, domain name, and/or country. For example: `o=MyCompany, c=UK`.

What is a Bind DN?

A Bind DN is used to authenticate the Zyxel Device itself to the LDAP/AD server when performing operations like searching or validating user credentials. It’s essentially the username the Zyxel Device uses to log into the directory server, used in conjunction with a bind password. For example: `cn=zywallAdmin`. If no Bind DN is specified, the device may try to bind anonymously. If the bind password is incorrect, the login fails.

How do I access the Active Directory or LDAP server summary screen?

Click Configuration > Object > AAA Server > Active Directory (or LDAP) to display the Active Directory (or LDAP) summary screen.

What information is shown on the Active Directory or LDAP server summary screen?

This screen manages the list of AD or LDAP servers used for authentication. The following table describes the labels and actions:
Table 253 Configuration > Object > AAA Server > Active Directory (or LDAP)
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific AD or LDAP server.
Name This field displays the name of the Active Directory.
Server Address This is the address of the AD or LDAP server.
Base DN This specifies a directory. For example, o=Zyxel, c=US.

How do I add or edit an Active Directory or LDAP server entry?

Click Object > AAA Server > Active Directory (or LDAP) to display the summary screen. Then, click the Add icon or an Edit icon to display the Add/Edit screen. Use this screen to create a new AD or LDAP entry or edit an existing one.

What fields are available when adding/editing an Active Directory or LDAP server?

The following table describes the labels available in the Configuration > Object > AAA Server > Active Directory (or LDAP) > Add/Edit screen:
Table 254 Configuration > Object > AAA Server > Active Directory (or LDAP) > Add
LABEL DESCRIPTION
Name Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes.
Description Enter the description of each server, if any. ou can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed.
Server Address Enter the address (IP or FQDN) of the AD or LDAP server.
Backup Server Address (Optional) If the AD or LDAP server has a backup server, enter its address (IP or FQDN) here.
Port Specify the port number (1-65535) on the AD or LDAP server to which the Zyxel Device sends authentication requests. This port number should be the same on all AD or LDAP server(s) in this group. (Default: 389)
Base DN Specify the directory (up to 127 alphanumerical characters). For example, o=Zyxel, c=US. This is only for LDAP.
Use SSL Select Use SSL to establish a secure connection to the AD or LDAP server(s). This is only for LDAP.
Search time limit Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the AD or LDAP server. User authentication fails if timeout occurs (user info not found or server down).
Case-sensitive User Names Select this if the server checks the case of the usernames.
Bind DN Specify the bind DN for logging into the AD or LDAP server. Enter up to 127 alphanumerical characters. For example, cn=zywallAdmin specifies zywallAdmin as the user name.
Password If required, enter the password (up to 15 alphanumerical characters) for the Zyxel Device to bind (or log in) to the AD or LDAP server. Your password will be encrypted.
Retype to Confirm Retype your new password for confirmation.
Login Name Attribute Enter the type of identifier the users are to use to log in. For example “name” or “email address”. Default for AD is `sAMAccountName`.
Alternative Login Name Attribute (Optional) If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”.
Group Membership Attribute An AD or LDAP server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device checks to determine group membership. The value for this attribute is a group identifier. You can add ext-group-user objects based on these values. For example, attribute “memberOf” with values “sales”, “RD”, “management”. Default for AD is `memberOf`.
Domain Authentication for MSChap Select the Enable checkbox to enable domain authentication for MSChap. This is only for Active Directory.
User Name Enter the user name for the user who has rights to add a machine to the domain. This is only for Active Directory.
User Password Enter the password for the associated user name (who has rights to add a machine). This is only for Active Directory.
Retype to Confirm Retype your new password for confirmation. This is only for Active Directory.
Realm Enter the realm FQDN. This is only for Active Directory.
NetBIOS Name (Optional) Type the NetBIOS name. NetBIOS packets enable computer discovery and communication on a LAN. This is only for Active Directory.
Configuration Validation (Username, Test button) Use a user account from the server specified above to test if the configuration is correct. Enter the account’s user name in the Username field and click Test.
OK Click OK to save the changes.
Cancel Click Cancel to discard the changes.

How do I access the RADIUS server summary screen?

Click Configuration > Object > AAA Server > RADIUS to display the RADIUS screen.

What information is shown on the RADIUS server summary screen?

This screen manages the list of RADIUS servers used for authentication. The following table describes the labels and actions:
Table 255 Configuration > Object > AAA Server > RADIUS
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field displays the index number.
Name This is the name of the RADIUS server entry.
Server Address This is the address of the RADIUS server.

How do I add or edit a RADIUS server entry?

Click Configuration > Object > AAA Server > RADIUS to display the RADIUS screen. Click the Add icon or an Edit icon to display the Add/Edit screen. Use this screen to create a new RADIUS entry or edit an existing one.

What fields are available when adding/editing a RADIUS server?

The following table describes the labels available in the Configuration > Object > AAA Server > RADIUS > Add/Edit screen:
Table 256 Configuration > Object > AAA Server > RADIUS > Add
LABEL DESCRIPTION
General Settings
Name Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes.
Description Enter the description of each server, if any. ou can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%'()*+,-/:;=?@_. Characters &.<>[\\]^'{|} are not allowed.
Authentication Server Settings
Server Address Enter the address (IP or FQDN) of the RADIUS server.
Authentication Port Specify the port number (1-65535) on the RADIUS server to which the Zyxel Device sends authentication requests. (Default: 1812)
Backup Server Address (Optional) If the RADIUS server has a backup server, enter its address (IP or FQDN) here.
Backup Authentication Port (Optional) Specify the port number (1-65535) on the backup RADIUS server.
Key Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device. This key must be the same on both servers and is not sent over the network. Your password will be encrypted.
Change of Authorization Select this option to allow the Zyxel Device to disconnect wireless clients based on information (like client username/MAC address) specified in CoA (Change of Authorization) or RADIUS Disconnect messages sent by the RADIUS server.
Accounting Server Settings
Server Address (Optional) Enter the IP address or Fully-Qualified Domain Name (FQDN) of the RADIUS accounting server.
Accounting Port (Optional) Specify the port number (1-65535) on the RADIUS server to which the Zyxel Device sends accounting information.
Backup Server Address (Optional) If the RADIUS server has a backup accounting server, enter its address (IP or FQDN) here.
Backup Accounting Port (Optional) Specify the port number (1-65535) on the backup RADIUS server for accounting.
Key Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device for accounting. This key must be the same on both servers and is not sent over the network. Your password will be encrypted.
Maximum retry count Specify the number of times (1-10) the Zyxel Device should reattempt to use the primary RADIUS accounting server before trying the secondary. This also sets retry attempts for the secondary. Default is 3.
Enable Accounting Interim update This field is configurable only after you configure a RADIUS accounting server address. Select this to have the Zyxel Device send subscriber status updates to the RADIUS server at the specified interval.
Interim Interval Specify the time interval (1-1440 minutes) for how often the Zyxel Device sends subscriber status updates to the RADIUS server. Default is 10.
General Server Settings
Timeout Specify the timeout period (1-300 seconds) before the Zyxel Device disconnects from the RADIUS server if no response is received. User authentication fails. Default is 5.
NAS IP Address Type the IP address of the NAS (Network Access Server). Default is 127.0.0.1.
NAS Identifier If the RADIUS server requires the Zyxel Device to provide the Network Access Server identifier attribute with a specific value, enter it here.
Case-sensitive User Names Select this if you want configure your username as case-sensitive.
User Login Settings
Group Membership Attribute A RADIUS server defines attributes for its accounts. Select the name and number of the attribute that the Zyxel Device checks to determine group membership. If needed, select user-defined and specify the attribute number. The attribute’s value is a group identifier. You can add ext-group-user objects based on these values. Example: Attribute “Filter-Id(11)”.
OK Click OK to save the changes.
Cancel Click Cancel to discard the changes.

What are authentication method objects used for?

Authentication method objects set how the Zyxel Device authenticates wireless, HTTP/HTTPS clients, and peer IPSec routers (extended authentication) clients. They configure the Zyxel Device to use the local user database, and/or authentication servers (specified by AAA server objects). By default, locally created user accounts are authenticated locally.

How do I specify an authentication method for a VPN connection?

Follow these steps after creating an authentication method object:

1. Access the Configuration > VPN > IPSec VPN > VPN Gateway > Edit screen.

2. Click Show Advance Setting and select Enable Extended Authentication.

3. Select Server Mode and choose an authentication method object from the AAA Method drop-down list box.

4. Click OK to save the settings.


How do I access the Authentication Method objects screen?

Click Configuration > Object > Auth. Method to display the Authentication Method screen.

What information is shown on the Authentication Method objects screen?

This screen lists the configured authentication method objects. You can create up to 16 objects.
Table 257 Configuration > Object > Auth. Method
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field displays the index number.
Method Name This field displays a descriptive name for identification purposes.
Server Profile/ Server Type This field displays the authentication method(s) for this entry.

How do I create an authentication method object?

Follow these steps:

1. Click Configuration > Object > Auth. Method.

2. Click Add.

3. Specify a descriptive name (1-31 alphanumeric, _, -; no number first; case-sensitive) in the Name field. Example: “My_Device”.

4. Click Add below the Method List table to insert a row.

5. Select a server object (local, RADIUS, LDAP, AD – created in AAA Server screens) from the Method List drop-down list box.

6. You can add up to four server objects. The order is important; authentication is attempted sequentially. If an account exists on multiple servers, authentication stops at the first server where the username is found, even if the password doesn’t match.

Note: You cannot select two server objects of the same type (e.g., two LDAP servers).

7. Click OK to save or Cancel to discard.


What fields are available when creating an authentication method object?

The following table describes the labels available in the Configuration > Object > Auth. Method > Add screen:
Table 258 Configuration > Object > Auth. Method > Add
LABEL DESCRIPTION
General Settings
Name Specify a descriptive name for identification purposes. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”.
Add Click this to create a new entry in the Method List below. Select an entry and click Add to create a new entry after the selected entry.
Edit Double-click an entry in the Method List or select it and click Edit to open a screen where you can modify the entry’s settings (select a different server).
Remove To remove an entry from the Method List, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
Move To change a method’s position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed. The ordering is important as authentication is attempted in this order.
# This field displays the index number in the Method List.
Method List Select a server object from the drop-down list box. You can create a server object in the AAA Server screen. The Zyxel Device authenticates users using the databases (local or external) in the order they appear in this list. If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server.
OK Click OK to save the changes.
Cancel Click Cancel to discard the changes.

What is two-factor authentication used for on the Zyxel Device?

Two-factor authentication provides double-layer security to access the Zyxel Device via a VPN tunnel, Web Configurator, SSH, or Telnet. The first layer is the standard login (username/password), and the second layer is an authorized SMS (via mobile phone number), email address, or Google Authenticator code.

How does two-factor authentication work for VPN access?

The process for VPN access is:

1. A user runs a VPN client and logs in with their username and password.

2. The VPN client connects to the Zyxel Device and authenticates using the specified username and password.

3. The Zyxel Device requests the user’s username, password, and mobile phone number or email address from the configured authentication source (Active Directory, RADIUS, local database) to authenticate (factor 1). If not found, the connection terminates.

4. If factor 1 credentials are correct, the Zyxel Device performs one of the following (factor 2):

• Emails an authorization link to the user.

• Requests the Email-to-SMS cloud system send an SMS with the authorization link.

• (Implicitly, if Google Authenticator is configured) Expects the user to provide the code.

5. The client must open the authorization link or enter the authorization code within a specified deadline (Valid Time).

6. If the authorization is correct and timely, the client accesses the secured network. If the deadline expires, the login process must restart. If credentials are incorrect or SMS/email isn’t received, the user should contact the administrator.


How does two-factor authentication work for Admin access (Web Configurator, SSH, Telnet)?

The process for admin access is:

1. An admin user connects to the Zyxel Device via Web Configurator, SSH, or Telnet.

2. The Zyxel Device requests the admin user’s username, password, and mobile phone number or email address from the configured authentication source (Active Directory, RADIUS, local database) to authenticate (factor 1).

3. If factor 1 credentials are correct, the Zyxel Device performs one of the following (factor 2):

• Requests the Google Authenticator code.

• Emails an authorization link or code to the admin user.

• Requests the Email-to-SMS cloud system send an SMS with an authorization link or code.

4. The admin user must open the authorization link or enter the authorization code within a specified deadline (Valid Time).

5. If the authorization is correct and timely, the admin user logs into the Zyxel Device. If the deadline expires, the login process must restart. If authorization credentials/code are incorrect, the admin user should contact the network administrator.


What pre-configuration is required for two-factor authentication?

Before configuring two-factor authentication settings, you must:

• Set up the user’s username, password, and email address or mobile number in the Active Directory, RADIUS server, or local Zyxel Device database.

• Enable Two-factor Authentication in Object > User/Group > User > Edit > Two-factor Authentication for a specific user.

• Enable Two-factor Authentication in Object > Auth. Method > Two-factor Authentication for the Zyxel Device.

• Enable HTTP and/or HTTPS in System > WWW > Service Control.

• Enable SSH and/or Telnet in System > SSH and/or System > TELNET.

• Add HTTP, HTTPS, SSH, and/or TELNET in the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group. This group defines the default services allowed in the WAN_to_Device security policy.

• For VPN access, configure the VPN tunnel for this user on the Zyxel Device.


What pre-configuration is needed specifically for Email Authentication?

• Configure Mail Server in System > Notification > Mail Server.

What pre-configuration is needed specifically for SMS Authentication?

• Configure Mail Server in System > Notification > Mail Server.

• Configure SMS in System > Notification > SMS.

• Have an account with an Email-to-SMS cloud provider to be able to send SMS authorization requests.


What pre-configuration is needed specifically for Google Authentication?

• Install Google Authenticator on the user’s mobile device.

• A user must set up Google Authenticator on their mobile device before they can successfully authenticate with the Zyxel Device.


Under what conditions will Two-Factor authentication fail?

Two-Factor authentication will fail under the following conditions:

• You omit any of the pre-configuration items. Make sure to perform all pre-configuration items.

• The user cannot receive the authorization SMS or email. Make sure the mobile telephone number or email address of the user in the Active Directory, RADIUS Server or local Zyxel Device database is configured correctly.

• Email-to-SMS cloud system authentication fails. Make sure that SMS is enabled and credentials are correct in System > Notification > SMS.

• Mail server authentication fails. Make sure the System > Notification > Mail Server settings are correct.

• Authorization times out. Extend the Valid Time in Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access.

• You are unable to access Google Authenticator (you lost your phone or uninstalled the app). Log in using one of the backup codes.

• You get a Google Authenticator verification error. You must enter the code within the time displayed in Google Authenticator. The time on your cellphone and the time on the Zyxel Device must be the same.


What are the specifications and limitations of using Google Authenticator for two-factor authentication?

The following is a list of specifications and limitations:

• Ext-users (authenticated by external servers) are not supported.

• A user must setup Google Authenticator on their mobile device before they can successfully authenticate with the Zyxel Device.

• Verification code length: 6 digits.

• Maximum verification code failed attempts: 3

• Backup code length: 8 digits

• Google authenticator is supported in device High Availability (HA) mode. The secret keys are synchronized between all Zyxel Devices.


How do I configure two-factor authentication for VPN access?

Go to Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access and configure the settings on that screen. Use this screen to select the users and VPN services that require two-factor authentication.

What fields are available when configuring two-factor authentication for VPN access?

The following table describes the labels available in the Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access screen:
Table 259 Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access
LABEL DESCRIPTION
General Settings
Enable Select the check box to require double-layer security to access the Zyxel Device via a VPN tunnel.
Valid Time Enter the maximum time (in minutes, 1-15) that the user must tap or click the authorization link in the SMS or email in order to get authorization for the VPN connection.
Two-factor Authentication for Services: Select which kinds of VPN tunnels require Two-Factor Authentication. You should have configured the VPN tunnel first.

• SSL VPN Access

• IPSec VPN Access

• L2TP/IPSec VPN Access

User/Group This list displays the names of the users and user groups that can be selected for two-factor authentication. Select users/groups from the Selectable list that require 2FA for VPN access and move them to the Selected list. Move users/groups that do not require 2FA back to the Selectable list.
Delivery Settings
Deliver Authorize Link Method: The second factor authentication is done by sending a URL link by text (SMS) or email, or using Google Authenticator. Select one or up to three methods.

SMS: User object (Object > User/Group > User) must contain a valid mobile phone number (up to 20 chars: 1-9, +*#()-).

Email: User object must contain a valid email address (must contain @).

Google Authenticator: You must first set up the Zyxel Device on the Google Authenticator app (Configuration > Object > User/Group > User > Add > Two-factor Authentication). Then enter the time-limited code from the app.

Authorize Link URL Address: Configure the link that the user will receive in the SMS or email. The user must be able to access the link.

http/https: you must enable HTTP or HTTPS in System > WWW > Service Control

From Interface/User-Defined: select the Zyxel Device WAN interface (wan1/2) or select User-Defined and then enter an IP address.

Authorized Port Configure a new port (1024-65535) not used by other services. This port is used for 2FA of VPN clients. VPN clients don’t need to change their port settings; the link they receive will contain this new port number. Example: If port 8008 is used and link is https://a.b.c.d, clients see https://a.b.c.d:8008.
Message You can either create a default message in the text box or upload a message file (Use Multilingual file). The file must be named ‘2FA-msg.txt’, be in UTF-8 format. Click Download the default 2FA-msg.txt example to edit. Use Restore Customized File to Default if needed. Use Select a File Path and Upload. The message (text box or file) must contain the `` variable. Optional variables: ``, ``, `
Apply Click Apply to save the changes.
Reset Click Reset to return the screen to its last-saved settings.

How do I configure two-factor authentication for admin access (Web, SSH, Telnet)?

Go to Configuration > Object > Auth. Method > Two-factor Authentication > Admin Access and configure the settings on that screen. Use this screen to select the service (Web, SSH, and TELNET) that requires two-factor authentication for the admin user.

What fields are available when configuring two-factor authentication for admin access?

The following table describes the labels available in the Configuration > Object > Auth. Method > Two-factor Authentication > Admin Access screen:
Table 260 Configuration > Object > Auth. Method > Two-factor Authentication > Admin Access
LABEL DESCRIPTION
General Settings
Enable Select the check box to require double-layer security to access the Zyxel Device via the Web Configurator, SSH, or Telnet.
Valid Time Enter the maximum time (in minutes, 1-5) that the user must click or tap the authorization link in the SMS or email in order to get authorization for logins via the Web Configurator, SSH, or Telnet.
Two-factor Authentication for Services: Select which services require Two-Factor Authentication for the admin user.

• Web

• SSH

• TELNET

Delivery Settings
Verification Code Delivery Method Select one or both (All) methods for sending the second factor verification:

SMS: User object (Object > User/Group > User) must contain a valid mobile telephone number (up to 20 chars: 1-9, +*#()-).

Email: User object must contain a valid email address (must contain @).

Apply Click Apply to save the changes.
Reset Click Reset to return the screen to its last-saved settings.

How do I set up admin login with two-factor authentication using SMS?

This uses an Email-to-SMS service to convert an email to an SMS containing the authentication code.

1. First subscribe for an Email-to-SMS service. Obtain the email address format used by the service to send emails that become SMS messages.

2. In the Zyxel Device web configurator, go to CONFIGURATION > System > Notification > SMS and enter the SMS Provider Email server domain name in Provider Domain, and the sender’s email address in Mail From.

3. Next, go to CONFIGURATION > System > Notification > Mail to set up the following fields for the mail server used to send the email to the Email-to-SMS gateway:

• Mail server

• Mail server ports

• Mail From

• SMTP Authentication (if required)

4. Then go to Configuration > Object > User/Group > User > Add to create an admin type user. Enter the phone number for this user in the format required by your Email-to-SMS provider’s email address (this typically involves appending the provider’s domain to the phone number).

5. Next, set up two-factor authentication for this user in CONFIGURATION > Object > Auth Method > Two-Factor Authentication > Admin Access. Select which services (HTTPS (web), SSH, Telnet) require Two-Factor authentication for this user. Select SMS to send the verification code by SMS.

When this user logs into the Zyxel Device, they will be asked to enter the verification code sent via SMS to their mobile phone.


What are certificates used for on the Zyxel Device?

Certificates (also called digital IDs) are used to authenticate users. They are based on public-private key pairs. A certificate contains the owner’s identity and public key, providing a way to exchange public keys for authentication.

What are the differences between My Certificates and Trusted Certificates screens?

My Certificates screens (Configuration > Object > Certificate > My Certificates): Used to generate and export self-signed certificates or certification requests, and import CA-signed certificates issued *for* the Zyxel Device itself.

Trusted Certificates screens (Configuration > Object > Certificate > Trusted Certificates): Used to save CA certificates and trusted remote host certificates *to* the Zyxel Device. The Zyxel Device trusts any valid certificate imported here, and any valid certificate signed by a CA whose certificate is imported here.


How does public-key cryptography work for authentication?

Each host has two keys: a public key (openly available) and a private key (kept secure). These act like digital signatures. Only the owner can “write” with their private key, but anyone with the corresponding public key can verify the signature.

Example:

1. Tim wants to send a secure message to Jenny. He generates a public-private key pair.

2. Tim keeps the private key secret and makes the public key available.

3. Tim uses his private key to sign the message and sends it to Jenny.

4. Jenny receives the message and uses Tim’s public key to verify the signature. This confirms the message is from Tim and hasn’t been altered.

5. Jenny can also sign her reply with her private key, and Tim uses her public key to verify it.

Certificates are used for authentication, not necessarily encryption of the data itself (though the connection established after authentication might be encrypted, like with VPN).


What is a Certificate Revocation List (CRL)?

A Certificate Revocation List (CRL) is a directory maintained by certification authorities listing certificates that have been revoked before their scheduled expiration date. The Zyxel Device can check a peer’s certificate against a directory server’s CRL as part of the Public Key Infrastructure (PKI).

What are the advantages of using certificates?

• The Zyxel Device only needs to store the certificates of trusted certification authorities, regardless of how many devices need authentication.

• Key distribution is simple and secure, as public keys can be freely distributed without compromising private keys.


What are self-signed certificates?

You can configure the Zyxel Device to act as its own certification authority and sign its own certificates. These are known as self-signed certificates.

What is the factory default certificate?

The Zyxel Device generates its own unique self-signed certificate upon first startup. This is referred to as the ‘factory default certificate’ in the GUI.

What certificate file formats can be imported?

Certificates must be in one of the following formats for import:

Binary X.509: Standard format defined by ITU-T X.509.

PEM (Base-64) encoded X.509: Printable format using letters and numerals to represent a binary X.509 certificate.

Binary PKCS#7: Standard for transferring public key certificates (private key not included). The Zyxel Device currently supports importing PKCS#7 files containing a single certificate.

PEM (Base-64) encoded PKCS#7: Printable format for a binary PKCS#7 certificate.

Binary PKCS#12: Format for transferring both public and private key certificates. The private key is within a password-encrypted envelope. You must provide the password when importing.

Note: Be careful not to convert binary files to text during transfer, as many programs default to text.


How can I verify a certificate before importing it?

You should verify a trusted certificate using its fingerprint (a message digest using MD5 or SHA1) before importing.

1. Browse to where the certificate is saved on your computer.

2. Ensure the certificate file has a “.cer” or “.crt” extension.

3. Double-click the certificate icon to open the Certificate window.

4. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.

5. Use a secure method (like telephone or HTTPS connection) to verify that the certificate owner has the same Thumbprint information.


How do I access the My Certificates screen?

Click Configuration > Object > Certificate > My Certificates to open the My Certificates screen.

What information and actions are available on the My Certificates screen?

This screen summarizes certificates and certification requests for the Zyxel Device itself.
Table 261 Configuration > Object > Certificate > My Certificates
LABEL DESCRIPTION
PKI Storage Space in Use Displays the percentage of PKI storage used. Delete unnecessary certificates if space is low.
Add Click to generate a certificate or certification request.
Edit Double-click an entry or select and click Edit for detailed certificate information.
Remove Select an entry and click Remove to delete it (confirmation required). Cannot delete certificates currently in use.
References Select an entry and click References to see where the certificate is used.
Download Click this to download the selected certificate. A dialog appears to optionally include the private key by entering a password.
Email Click to email the selected certificate. A dialog appears with fields:

Mail Subject: Subject line for the email.

Mail To: Recipient email address(es).

Send Certificate with Private Key: Checkbox to include the private key.

Password: (If sending private key) Enter a password (up to 31 chars; ;\|`~!@#$%^&*()_+\\{}’:,./<>=-” allowed).

E-mail Content: Email body text (up to 250 chars; same special chars as password allowed).

Compress as a ZIP File: Checkbox to compress the certificate. Recommended when sending with a private key, as some email servers block PKCS#12 files.

Send Email: Click to send.

Cancel: Click to close without sending.

# Certificate index number (alphabetical order).
Name Name used to identify the certificate. Recommended to be unique.
Type Displays the certificate type:

REQ: Certification request (not yet valid). Send to CA for signing, then import the issued certificate using the Import button.

SELF: Self-signed certificate.

CERT: Certificate issued by a certification authority.

Subject Identifying information about the certificate’s owner (CN, OU, O, C). Recommended to be unique.
Issuer Identifying information about the issuing CA. Same as Subject for self-signed certificates.
Valid From Date the certificate becomes applicable.
Valid To Date the certificate expires. Displays in red with “Expired!” message if expired.
Import Click Import to open a screen to save a certificate to the Zyxel Device.
Refresh Click Refresh to display the current validity status of the certificates.

How do I access the My Certificates Add screen?

Click Configuration > Object > Certificate > My Certificates and then click the Add icon.

What is the purpose of the My Certificates Add screen?

This screen allows the Zyxel Device to create a self-signed certificate, enroll a certificate with a certification authority, or generate a certification request.

What fields are available when adding a certificate or request in My Certificates?

The following table describes the labels available in the Configuration > Object > Certificate > My Certificates > Add screen:
Table 262 Configuration > Object > Certificate > My Certificates > Add
LABEL DESCRIPTION
Name Type a name (up to 31 alphanumeric and ;’~!@#$%^&()_+[]{}’,.=- characters) to identify this certificate.
Subject Information Record identifying information for the certificate owner. Must specify one of: Host IP Address, Host IPv6 Address, Host Domain Name, or E-Mail. Select the radio button and enter the value. Domain name (up to 255 chars: alphanumeric, -, .) or email address (up to 63 chars: alphanumeric, -, @, ., _). Recommended to be unique.
Organizational Unit Identify the unit/department (up to 31 chars: alphanumeric, -, _).
Organization Identify the company/group (up to 31 chars: alphanumeric, -, _).
Town (City) Identify the town/city (up to 31 chars: alphanumeric, -, _).
State, (Province) Identify the state/province (up to 31 chars: alphanumeric, -, _).
Country Enter a two-letter country code.
Key Type Sets the encryption algorithm (RSA, DSA, ECDSA) and signature hash algorithm (SHA256, SHA384, SHA512). RSA/SHA256 is more compatible; ECDSA/SHA512 is more secure.
Key Length Select key length (1024, 2048 bits for RSA/DSA). Longer keys are more secure but use more storage. ECDSA keys are shorter for similar security.
LifeTimes Select certificate validity period (2 to 10 years).
Extended Key Usage
Server Authentication Select to generate/store request for server authentication certificate.
Client Authentication Select to generate/store request for client authentication certificate.
IKE Intermediate Select to generate/store request for IKE Intermediate authentication certificate.
Enrollment Options
Create a self-signed certificate Select to have the Zyxel Device generate the certificate and act as its own CA.
Create a certification request and save it locally for later manual enrollment Select to generate a request. Use My Certificate Details screen to view/copy the request to send to a CA. Copy the request from the Details screen and send to CA.
OK Click to begin certificate or request generation. If enrollment fails, a Return button appears; check info and connection.
Cancel Click to quit and return to My Certificates screen.

How do I access the My Certificates Edit screen?

Click Configuration > Object > Certificate > My Certificates and then click the Edit icon for a specific certificate.

What information and actions are available on the My Certificates Edit screen?

This screen displays detailed information about a certificate or request and allows changing its name.
Table 263 Configuration > Object > Certificate > My Certificates > Edit
LABEL DESCRIPTION
Configuration
Name Displays identifying name. Can change it (up to 31 alphanumeric and ;’~!@#$%^&()_+[]{}’,.=- characters).
Certification Path
Certification Path (Text Box) Displays hierarchy validating the certificate. Click Refresh to update. Shows “Not trusted” if path is invalid (expired/revoked). For self-signed, only the certificate itself is listed.
Refresh Click Refresh to display the certification path.
Certificate Information (Read-only fields)
Type Displays certificate type (CA-signed, Self-signed) and format (X.509).
Version Displays X.509 version number.
Serial Number Certificate identification number (from CA or generated by Zyxel Device).
Subject Owner’s identifying information (CN, OU, O, ST, C).
Issuer Issuing CA’s identifying information. Same as Subject for self-signed. “none” for request.
Signature Algorithm Algorithm used to sign the certificate (e.g., rsa-pkcs1-sha1, rsa-pkcs1-md5).
Valid From Date certificate becomes applicable. “none” for request.
Valid To Date certificate expires. Red text and “Expired!” message if expired. “none” for request.
Key Algorithm Algorithm used for key pair generation (e.g., RSA) and key length (e.g., 1024 bits).
Subject Alternative Name Displays owner’s IP address (IP), domain name (DNS), or email address (EMAIL).
Key Usage Functions the key can be used for (e.g., DigitalSignature, KeyEncipherment).
Extended Key Usage How Zyxel Device generated/stored request (server auth, client auth, IKE Intermediate).
Basic Constraint General info (e.g., Subject Type=CA, Path Length Constraint=1). Not displayed for request.
MD5 Fingerprint Certificate’s MD5 message digest.
SHA1 Fingerprint Certificate’s SHA1 message digest.
Certificate in PEM (Base-64) Encoded Format Read-only text box displaying certificate/request in PEM format. Can copy/paste for enrollment or distribution.
Export Certificate Only Click to save certificate without private key. Click Save in File Download screen, browse, click Save.
Password (For exporting with private key) Create and enter password here. Keep it safe.
Export Certificate with Private Key Click to save certificate with private key. Enter password, click button. Click Save in File Download screen, browse, click Save.
OK Click OK to save changes (name only) back to Zyxel Device.
Cancel Click Cancel to quit and return to My Certificates screen.

How do I access the My Certificates Import screen?

Click Configuration > Object > Certificate > My Certificates > Import.

What is the purpose of the My Certificates Import screen?

Use this screen to import an existing certificate for the Zyxel Device. You can import a certificate matching a generated request (replacing the request) or import a PKCS#12 file (including public and private keys). You must remove spaces from the filename before importing.

What fields are available on the My Certificates Import screen?

The following table describes the labels:
Table 264 Configuration > Object > Certificate > My Certificates > Import
LABEL DESCRIPTION
File Path Type the location of the file or click Browse. Cannot import with same name as existing certificate.
Browse Click Browse to find the certificate file.
Password Only applies when importing binary PKCS#12 format. Type the password created when the file was exported.
OK Click OK to save the certificate on the Zyxel Device.
Cancel Click Cancel to quit and return to the My Certificates screen.

How do I access the Trusted Certificates screen?

Click Configuration > Object > Certificate > Trusted Certificates.

What information and actions are available on the Trusted Certificates screen?

This screen lists certificates trusted by the Zyxel Device (CA certificates, remote host certificates). The device trusts any valid certificate signed by a CA listed here.
Table 265 Configuration > Object > Certificate > Trusted Certificates
LABEL DESCRIPTION
PKI Storage Space in Use Displays the percentage of PKI storage used. Delete unnecessary certificates if space is low.
Edit Double-click an entry or select and click Edit for detailed certificate information.
Remove Select an entry and click Remove to delete it (confirmation required). Cannot delete certificates currently in use.
References Select an entry and click References to see where the certificate is used.
# Certificate index number (alphabetical order).
Name Name used to identify this certificate.
Subject Identifying information about the certificate’s owner (CN, OU, O, C). Recommended to be unique.
Issuer Identifying information about the issuing CA. Same as Subject for self-signed certificates.
Valid From Date the certificate becomes applicable.
Valid To Date the certificate expires. Displays in red with “Expired!” message if expired.
Import Click Import to open a screen to save a trusted CA certificate from your computer.
Refresh Click this button to display the current validity status of the certificates.

How do I access the Trusted Certificates Edit screen?

Click Configuration > Object > Certificate > Trusted Certificates and then click a certificate’s Edit icon.

What information and actions are available on the Trusted Certificates Edit screen?

Use this screen to view details, change the name, and set CRL/OCSP checking options for a trusted certificate.
Table 266 Configuration > Object > Certificate > Trusted Certificates > Edit
LABEL DESCRIPTION
Configuration
Name Displays identifying name. Can change it (up to 31 alphanumeric and ;’~!@#$%^&()_+[]{}’,.=- characters).
Certification Path
Certification Path (Text Box) Displays hierarchy validating the end entity’s certificate. Click Refresh to update. Shows “Not trusted” if path is invalid (expired/revoked).
Refresh Click Refresh to display the certification path.
Certificate Validation
Enable X.509v3 CRL Distribution Points and OCSP checking Select to turn on certificate revocation checking. Validates certificate via CRL (HTTP/LDAP) and OCSP.
OCSP Server Select if directory server uses OCSP.
URL Type protocol, IP address, path name of OCSP server.
ID (If needed) Type login name (up to 31 ASCII) for OCSP server access.
Password (If needed) Type password (up to 31 ASCII) for OCSP server access.
LDAP Server Select if directory server uses LDAP for CRLs.
Address Type IP address (dotted decimal) of LDAP directory server.
Port Specify LDAP server port number (default 389). Must match server.
ID (If needed) Type login name (up to 31 ASCII) for CRL directory server access.
Password (If needed) Type password (up to 31 ASCII) for CRL directory server access.
Certificate Information (Read-only fields)
Type Displays certificate type (CA-signed, Self-signed) and format (X.509).
Version Displays X.509 version number.
Serial Number Certificate identification number (from CA).
Subject Owner’s identifying information (CN, OU, O, C).
Issuer Issuing CA’s identifying information. Same as Subject for self-signed.
Signature Algorithm Algorithm used to sign the certificate (e.g., rsa-pkcs1-sha1, rsa-pkcs1-md5).
Valid From Date certificate becomes applicable. Red text and “Not Yet Valid!” if not yet applicable.
Valid To Date certificate expires. Red text and “Expiring!” or “Expired!” message if near/past expiry.
Key Algorithm Algorithm used for key pair generation (e.g., RSA) and key length (e.g., 1024 bits).
Subject Alternative Name Displays owner’s IP address (IP), domain name (DNS), or email address (EMAIL).
Key Usage Functions the key can be used for (e.g., DigitalSignature, KeyEncipherment).
Extended Key Usage Displays method Zyxel Device generated/stored request (server auth, client auth, IKE Intermediate).
Basic Constraint General info (e.g., Subject Type=CA, Path Length Constraint=1).
MD5 Fingerprint Certificate’s MD5 message digest. Use for verification.
SHA1 Fingerprint Certificate’s SHA1 message digest. Use for verification.
Certificate (PEM Format) Read-only text box displaying certificate in PEM format. Can copy/paste for distribution.
Export Certificate Click to save the certificate. Click Save in File Download screen, browse, click Save.
OK Click OK to save changes (name only) back to Zyxel Device.
Cancel Click Cancel to quit and return to the Trusted Certificates screen.

How do I access the Trusted Certificates Import screen?

Click Configuration > Object > Certificate > Trusted Certificates > Import.

What fields are available on the Trusted Certificates Import screen?

Use this screen to save a trusted certificate (like a CA certificate) to the Zyxel Device. Remove spaces from filename before importing.
Table 267 Configuration > Object > Certificate > Trusted Certificates > Import
LABEL DESCRIPTION
File Path Type the location of the file or click Browse. Cannot import with same name as existing certificate. File formats: Binary X.509, PEM X.509, Binary PKCS#7, PEM PKCS#7.
Browse Click Browse to find the certificate file.
OK Click OK to save the certificate on the Zyxel Device.
Cancel Click Cancel to quit and return to the previous screen.

What is OCSP (Online Certificate Status Protocol)?

OCSP allows an application or device like the Zyxel Device to check the validity status of individual certificates in real-time, instead of downloading a potentially large Certificate Revocation List (CRL). When the Zyxel Device queries an OCSP server, the server responds with the certificate’s status: “expired”, “current”, or “unknown”.

What are ISP accounts used for?

ISP accounts are used to manage Internet Service Provider (ISP) account information required for PPPoE, PPTP, or L2TP interfaces. An ISP account is a profile containing settings needed for Internet access using these protocols.

How do I access the ISP Account Summary screen?

To access the ISP Account Summary screen, click Configuration > Object > ISP Account.

What information is shown on the ISP Account Summary screen?

This screen provides a summary of configured ISP accounts.
Table 268 Configuration > Object > ISP Account
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References Select an entry and click References to open a screen that shows which settings use the entry.
# This field is a sequential value, and it is not associated with a specific entry.
Profile Name This field displays the profile name of the ISP account. This name is used to identify the ISP account.
Protocol This field displays the protocol used by the ISP account.
Authentication Type This field displays the authentication type used by the ISP account.
User Name This field displays the user name of the ISP account.

How do I add or edit an ISP account?

Open the ISP Account screen (Configuration > Object > ISP Account). Then, click an Add icon or Edit icon to open the ISP Account Add/Edit screen.

What fields are available when adding/editing an ISP account?

The following table describes the labels available in the Configuration > Object > ISP Account > Add/Edit screen:
Table 269 Configuration > Object > ISP Account > Edit
LABEL DESCRIPTION
Profile Name (Read-only if editing) Type the profile name (1-31 alphanumeric, _, -; no number first; case-sensitive). Used to identify the account.
Protocol (Read-only if editing) Select the protocol: pppoe, pptp, l2tp.
Authentication Type Select authentication protocol for outgoing calls: CHAP/PAP, Chap, PAP, MSCHAP, MSCHAP-V2.
Encryption Method (Available for PPTP) Select Microsoft Point-to-Point Encryption (MPPE): nomppe, mppe-40 (40-bit), mppe-128 (128-bit).
User Name Type the user name provided by your ISP.
Password Type the password (alphanumeric A-Z, a-z, 0-9 only) for the user name. Can be blank. Will be encrypted.
Retype to Confirm Type the password again for confirmation.
IP Address/FQDN Enter the IP address or Fully-Qualified Domain Name (FQDN) of the PPTP or L2TP server.
Connection ID (Available for PPTP) Type identification name for the PPTP server. Can be blank.
Service Name (Available for PPPoE) Type the PPPoE service name to access. Used to identify and reach the PPPoE server. Can be blank.
Compression Select On for stac compression, Off otherwise. Stac compression can compress data by a factor of about four. (Not displayed for PPTP).
Idle Timeout Specify seconds (0-3600) of outbound traffic inactivity before disconnecting from PPPoE/PPTP server. 0 disables timeout.
OK Click OK to save changes. Returns to ISP Account screen if no errors. Stays on Edit screen if errors occur.
Cancel Click Cancel to return to ISP Account screen without saving changes.

What is needed to use Cloud CNM SecuManager?

You need the SecuManager license to get a CNM ID, which allows you to access the SecuManager server. This is independent of the Zyxel Device licenses.

What management and analytics features are covered in Chapter 30?

Chapter 30 covers:

• Using the Mgmt. & Analytics > SecuManager screen to enable/configure management by a Central Network Management (CNM) system.

• Using the Mgmt. & Analytics > SecuReporter screen to enable logging, view license status, and access the SecuReporter web portal for security analytics.

• Using the Mgmt. & Analytics > Nebula screen to allow Nebula to manage the Zyxel Device remotely.


What is Cloud CNM SecuManager?

Cloud CNM SecuManager is a Virtual Machine-based (VM) management system using the TR-069 protocol to manage and monitor Zyxel Devices (which must have firmware supporting TR-069).

What features does Cloud CNM SecuManager include?

• Batch import of managed devices using CSV file.

• Overview of all managed devices and system information.

• Device monitoring and management.

• Firmware installation to multiple devices of the same model simultaneously.

• Device configuration backup and restore.

• Map view of managed device locations.

• Event and alarm notifications (e.g., device down).

• Graphical monitoring of individual devices with statistics.

• Direct access to devices for remote configuration.

• Four types of administrators with different privileges.

• Site-to-Site, Hub & Spoke, Fully-meshed, and Remote Access VPN provisioning.


What is required to allow Cloud CNM SecuManager management of a Zyxel Device?

• You must have a Cloud CNM SecuManager license with CNM ID number or a Cloud CNM SecuManager server URL.

• The Zyxel Device must be able to communicate with the Cloud CNM SecuManager server.

• You must configure Configuration > Cloud CNM > SecuManager on the Zyxel Device to allow it to find the server.


How do I configure SecuManager settings on the Zyxel Device?

Use the Configuration > Cloud CNM > SecuManager screen.
Table 270 Configuration > Cloud CNM > SecuManager
LABEL DESCRIPTION
Show/Hide Advanced Settings Click to toggle display of advanced fields.
Enable Select to allow management by Cloud CNM SecuManager.
Auto Select if your SecuManager server can access myZyxel to automatically get the VM server URL. Requires CNM ID from license. myZyxel associates CNM ID with CNM URL.
CNM URL (Auto) (Read-only when Auto selected) Displays the URL retrieved from myZyxel.
Custom Select if your server cannot access myZyxel, or if server/device are in private network/behind NAT.
CNM URL (Custom) Manually enter the VM server URL: IPv4 address, port (default 7547 HTTPS, 7549 HTTP), and CNM ID. Example: `1.1.1.1:7547/V6ABQNTPYG` or `1.1.1.1:7549/V6ABQNTPYG`.
Transfer Protocol Choose CNM URL protocol: HTTP or HTTPS. Must match the protocol/port used in the CNM URL (Custom) field. Example: `https://1.1.1.1:7547` or `http://1.1.1.1:7549`.
Periodic Inform Enable for Zyxel Device to inform SecuManager server of its presence at intervals.
Interval (If Periodic Inform enabled) Type how often (10-86400 seconds) the device should inform the server.
HTTPS Authentication Select if you have an HTTPS server certificate.
Server Certificate (If HTTPS Authentication enabled) Select a certificate the HTTPS server (Zyxel Device) uses to authenticate itself to the HTTPS client (SecuManager). See Trusted CAs link.
Apply Click Apply to save changes.
Reset Click Reset to return to last-saved settings.

What is Cloud CNM SecuReporter?

Cloud CNM SecuReporter is a security analytics portal that collects and analyzes logs from SecuReporter-licensed Zyxel Devices. It identifies anomalies, alerts on potential threats, and reports on network usage. Requires a license registered at myZyxel (you must be a registered user). Access is via web browser or mobile app notifications.

How do I activate and enable SecuReporter?

1. Check if Service Status displays Activated in Configuration > Cloud CNM > SecuReporter. If not, log in to myZyxel.com and activate the SecuReporter license for this Zyxel Device. The device needs connectivity to myZyxel. The license appears in Configuration > Licensing > Registration > Service after activation.

2. After activation, go back to Configuration > Cloud CNM > SecuReporter and select the log categories to send.

3. Select Enable SecuReporter. (Do not proceed to the portal yet). View license status, type, expiration date here.

4. Click Apply and wait.


How do I add a Zyxel Device to SecuReporter?

After enabling SecuReporter on the Zyxel Device:

1. Log in to the SecuReporter portal.

2. Go to Settings > Organization & Devices > Add to create an organization.

3. Add this Zyxel Device to the organization using the hyperlink under Unclaimed Device.


When does the SecuReporter banner appear on the Zyxel Device?

The SecuReporter banner appears on the Zyxel Device’s dashboard when:

1. SecuReporter hasn’t been enabled before.

2. The Zyxel Device is not added to an organization in SecuReporter yet.

Clicking the “Enable SecuReporter” button in the banner allows configuration.

What settings are configured via the SecuReporter Banner?

Clicking the banner button opens a settings window:

Server Status: Connection status (Connected, Timeout, Fail).

Device Name: Enter name for the device in SecuReporter.

Organization: Appears if no organization exists yet. Enter name (up to 255 chars) and description.

Select from existing organization: Select an existing org from drop-down.

Create new organization: Type name (up to 255 chars) and description.

Data Protection Policy: Choose data privacy level:

Partially Anonymous: Personal data (usernames, MACs, emails, hostnames) replaced with artificial identifiers in downloaded logs.

Fully Anonymous: Personal data replaced with anonymized info in logs. Data cannot be traced back.

Non-Anonymous: Personal data identifiable in logs.

• Accept Terms of Use checkbox.

Complete and Close Window button.


How do I configure SecuReporter settings (Enable, Categories) on the Zyxel Device?

Use the Configuration > Cloud CNM > SecuReporter screen.
Table 271 Configuration > Cloud CNM > SecuReporter
LABEL DESCRIPTION
Enable SecuReporter Select to have SecuReporter collect/analyze logs. Selected by default if Standard license activated; must select if Trial license. Not available if no license. Click GDPR link for privacy policy.
Categories (Security, Network) Select log categories (Anti-Spam, Content Filter, Threat Protection (ADP), Traffic Log, Interface Statistics) to send for analysis.
SecuReporter Service License Status
Service Status Displays license status at myZyxel: Activated, Not Activated, Expired, Not Licensed. Shows Grace Period if expired. Links to Buy/Activate.
Service Type Displays license type: Trial or Standard. Blank if not activated.
Expiration Date Displays service expiry date.
Apply Click Apply to save changes.
Reset Click Reset to return to last-saved settings.

What is Cloud Monitoring Mode for Nebula?

Cloud Monitoring Mode allows you to monitor your Zyxel Device using Nebula Control Center (NCC) while still configuring the device in On Premises Mode (using the web configurator/CLI). Remote access to the web configurator is possible via reverse SSH/HTTPS tunnel. Note: Cannot be used if Device HA is enabled.

What is Cloud Mode for Nebula?

Cloud Mode allows you to manage your Zyxel Device using Nebula only, with accounts at different privilege levels. Licenses and status can also be managed via Nebula. The device uses Native Mode to register with Nebula in this mode.

How do I set the Zyxel Device to Cloud Monitoring Mode?

You must first create an organization and a site on Nebula. Then follow the steps to switch from On Premises Mode.

How do I switch from On Premises Mode to Cloud Monitoring Mode?

1. Back up the Zyxel Device configurations.

2. Select Cloud Monitoring Mode in Configuration > Mgmt. & Analytics > Nebula, then select Enable.

3. Enter the Monitor mode ID of an organization you created on Nebula (found in Nebula under Organization-wide > Organization-wide manage > Organization settings).

4. Click Apply. Check the result in the Status field.


What do the different statuses mean in Cloud Monitoring Mode?

Table 272 Cloud Monitoring Mode Status
Status Meaning
N/A You’ve not entered a Monitor mode ID on the Zyxel Device.
Connected The Zyxel Device is connected to Nebula. Check the Zyxel Device Device Type on Nebula in Organization-wide > License & inventory.
Disconnected – Server is not reachable The Zyxel Device cannot connect to Nebula. Ensure device can access *.nebula.zyxel.com and ports 443, 4335, 6667.
Disconnected – Connection failure The Zyxel Device failed to connect to Nebula. Ensure device settings match Nebula settings.
Disconnected – Registration failure The email registered on myZyxel and the email for the target Nebula organization are different.
Disconnected – Operation modes mismatch Remove the Zyxel Device from the Nebula organization and site.

How do I switch from Nebula Mode to Cloud Monitoring Mode?

1. Remove the Zyxel Device from the organization and site in Nebula.

2. If the Zyxel Device was connected to Nebula, it will automatically reset. If not connected, press the physical reset button.

3. After the PWR LED is steady green, log into the Zyxel Device, select On Premises Mode, go to Configuration > Mgmt. & Analytics > Nebula, select Cloud Monitoring Mode and follow screen prompts (enter Monitor ID, Apply).


How do I switch from Cloud Monitoring Mode to Nebula Mode?

1. Remove the Zyxel Device from the organization and site in Nebula (while in cloud monitoring mode).

2. Back up your current configuration in Maintenance > File Manager > Configuration File.

3. Reset the Zyxel Device to factory default (push Reset button until port LEDs turn off, ~5 seconds). Device reboots.

4. Log into the Zyxel Device. Run the initial setup wizard and choose Nebula Mode.


When does the Native Mode Cloud Management screen appear?

You will see the Native Mode screen (Scenario A) if:

• Your Zyxel Device supports Native Mode.

• You can connect to Nebula with your current WAN settings.

If these criteria are met, Nebula uses the current WAN settings, and other settings are reset to factory defaults upon registration.

Which WAN settings are shown in the Nebula Internet Access table for Native Mode?

Only WAN settings meeting the following criteria will be shown:

• External interface (connects to external network like Internet or PPPoE; automatically added to default WAN trunk).

• Base port (Ethernet interface on which a VLAN interface runs).

• Ethernet, VLAN or Ethernet/VLAN interface on which a PPPoE interface runs.


How do I register the Zyxel Device to Nebula using Native Mode?

From the Native Mode Cloud Management screen:

1. Select up to two WAN interfaces from the physical ports shown (max one per port) for Nebula connectivity.

2. Click Test to check Nebula connectivity through the selected ports.

Note: If you cannot access Nebula after clicking Apply & Go To Nebula, access the local GUI via LAN using the support account.

3. Click Apply & Go to Nebula. The device will:

• Back up current configuration.

• Reset configuration to factory defaults (except WAN settings).

• Automatically restart.

Note: You will lose WAN access to the device; use Nebula for management.

4. Use the Nebula web portal or app to create an organization/site and add the Zyxel Device.

Note: The Nebula app registration option won’t appear if logged in as a limited admin.


What fields are shown in the Nebula Cloud Management (Native Mode) screen?

Table 273 Configuration > Mgmt. & Analytics > Nebula > Cloud Management
LABEL DESCRIPTION
Nebula Internet Access (Select WAN interfaces for Nebula connection)
# Sequential value for interface listing.
Name Displays the name of the interface.
Status Current status:

• Ethernet: Inactive, Down, Speed/Duplex (Full/Half).

• VLAN: Up, Down.

• PPPoE: Connected, Disconnected.

IP Addr/Netmask Current IP address/subnet mask. Shows management IP if VRRP backup, static IP if master. Not shown if static IP is 0.0.0.0.
IP Assignment How interface gets IP: Static, Dynamic, DHCP Client.
DNS Server DNS server IP address used by the interface.
Connection Click Test to check Nebula accessibility via this interface.
Register Zyxel Device on Nebula
Nebula portal Instructions: Log into Nebula portal, create org/site, enter MAC/Serial Number.
Nebula app Instructions: Download app, select site, scan QR code.
Apply & Go to Nebula Click to pass management to Nebula. Device resets (except WAN settings) and restarts.

What general Zyxel Device settings can be configured in the System screens?

System > Host Name: Configure a unique device name.

System > USB Storage: Configure settings for connected USB devices.

System > Date/Time: Configure device date and time.

System > Console Speed: Configure console port speed.

System > DNS: Configure DNS server settings.

System > WWW: Configure HTTP/HTTPS access and login page settings.

System > SSH: Configure Secure Shell access.

System > TELNET: Configure Telnet access.

System > FTP: Configure FTP access.

System > SNMP: Configure SNMP agent settings.

System > Auth. Server: Configure the device as a RADIUS server.

Notification > Mail Server: Configure email notification settings.

Notification > SMS: Configure SMS notification/authorization settings.

Notification > Response Message: Create custom block pages.

System > Language: Set Web Configurator language.

System > IPv6: Enable/disable IPv6 support.

System > ZON: Enable/disable Zyxel One Network utility.

System > Advanced: Enable/disable Fast Forwarding.


How do I configure the Host Name and Domain Name for the Zyxel Device?

Go to Configuration > System > Host Name.
Table 274 Configuration > System > Host Name
LABEL DESCRIPTION
System Name Enter a descriptive name (up to 64 alphanumeric, -, ., _). Spaces not allowed. Note: For Windows AD auth, keep shorter than 15 chars.
Domain Name (Optional) Enter the domain name. Propagated to DHCP clients if DHCP server enabled (up to 254 alphanumeric, -). Spaces not allowed.
Apply Click Apply to save changes.
Reset Click Reset to return to last-saved settings.

How do I configure USB storage settings?

Go to Configuration > System > USB Storage. Connect only one USB device (must allow writing, FAT16/FAT32/EXT2/EXT3 format).
Table 275 Configuration > System > USB Storage
LABEL DESCRIPTION
Activate USB storage service Select to use the connected USB device(s) for logs/diagnostics.
Disk full warning when remaining space is less than Set a number and unit (MB or %) to trigger an alert log when remaining space falls below this level.
Overwrite the oldest log file Select to overwrite the oldest log file when space is less than the warning level set above. Note: Save log files to your computer if needed.
Apply Click Apply to save changes.
Reset Click Reset to return to last-saved settings.

When does the Zyxel Device generate logs at the alert level for USB storage?

An alert level log is generated when:

• The remaining USB storage space is less than the value set in “Disk full warning”.

• The Zyxel Device overwrites the oldest log files (if enabled).

Check log priority in Monitor > Log > View Log > Priority.

How do I configure the Date and Time settings on the Zyxel Device?

Go to Configuration > System > Date/Time.
Table 276 Configuration > System > Date and Time
LABEL DESCRIPTION
Current Time and Date
Current Time Displays present time.
Current Date Displays present date.
Time and Date Setup
Manual Select to enter time/date manually. Settings take effect on Apply.
New Time (hh-mm-ss) Displays last updated/set time. If Manual, enter new time here.
New Date (yyyy-mm-dd) Displays last updated/set date. If Manual, enter new date here.
Get from Time Server Select to get time/date from NTP server. Requests on startup, Apply/Sync Now click, and 24-hour intervals.
Time Server Address* Enter IP or URL of NTP server. (*Optional, uses pre-defined list if blank).
Sync. Now Click to get time/date from specified server now. Saves changes (except daylight saving).
Time Zone Setup
Time Zone Choose time zone relative to GMT.
Automatically Sync Time Zone Select for Zyxel Device to automatically get its time zone.
Daylight Saving
Enable Daylight Savings Select if you use Daylight Saving Time (DST).
Automatically adjust clock for Daylight Saving Time Select for device to automatically adjust time if DST implemented in selected time zone.
Start Date Configure day/time DST starts (if Manual DST selected). Uses 24hr format. Examples: US (Second Sunday March @ 2), EU (Last Sunday March @ 1 GMT – adjust ‘at’ field per zone).
End Date Configure day/time DST ends (if Manual DST selected). Uses 24hr format. Examples: US (First Sunday November @ 2), EU (Last Sunday October @ 1 GMT – adjust ‘at’ field per zone).
Offset Specify DST offset (1 to 5.5 hours in 0.5 increments). Example: 3.5 offset makes 6 PM log appear as 10:30 PM.
Apply Click Apply to save changes.
Reset Click Reset to return to last-saved settings.

What are the pre-defined NTP time servers used by the Zyxel Device?

The default servers are:
Table 277 Default Time Servers
0.pool.ntp.org
1.pool.ntp.org
2.pool.ntp.org

How does the Zyxel Device use the pre-defined NTP time server list?

If no time server is specified or synchronization fails with the specified server, the device randomly selects one server from the pre-defined list and tries to sync. If that fails, it tries the rest of the list sequentially until successful or all servers have been tried.

How do I synchronize the time with an NTP server immediately?

In the Configuration > System > Date/Time screen, under “Get from Time Server”, ensure the Time Server Address is correct and click the Synchronize Now button. A “Loading…” message appears. If successful, the Current Time/Date fields update. If unsuccessful, check the View Log screen.

How do I manually set the date and time?

1. Click System > Date/Time.

2. Select Manual under Time and Date Setup.

3. Enter the time in the New Time field.

4. Enter the date in the New Date field.

5. Under Time Zone Setup, select your Time Zone.

6. (Optional) Select Enable Daylight Saving and configure start/end/offset if needed.

7. Click Apply.


How do I set the device to get the date and time from a time server?

1. Click System > Date/Time.

2. Select Get from Time Server under Time and Date Setup.

3. Under Time Zone Setup, select your Time Zone.

4. (Optional) Select Enable Daylight Saving and configure start/end/offset if needed.

5. Under Time and Date Setup, enter a Time Server Address (or leave blank to use defaults).

6. Click Apply.


How do I configure the Console Port Speed?

Go to Configuration > System > Console Speed.
Table 278 Configuration > System > Console Speed
LABEL DESCRIPTION
Console Port Speed Use the drop-down to change console port speed. Supports 9600, 19200, 38400, 57600, 115200 bps (default). Applies to physical console port connection, not Web Configurator Console.
Apply Click Apply to save changes.
Reset Click Reset to return to last-saved settings.

How can the Zyxel Device get DNS server addresses?

• Manually enter addresses provided by your ISP.

• Dynamically obtain addresses from the ISP (if assigned with WAN IP).

• Manually enter addresses of other DNS servers.


How do I configure DNS settings on the Zyxel Device?

Go to Configuration > System > DNS. This screen configures DNS for system features (VPN, DDNS, time server) and DNS query handling. Configure DNS info for DHCP clients via Network > Interface screens. Click Show Advanced Settings to see Security Option Control.
Table 279 Configuration > System > DNS
LABEL DESCRIPTION
Address/PTR Record
#Index number.
FQDNHost’s fully qualified domain name.
IP AddressIP address of the host.
Add/Edit/RemoveManage Address/PTR records.
IPv6 Address/PTR Record
#Index number.
FQDNHost’s fully qualified domain name.
IP AddressIPv6 address of the host.
Add/Edit/RemoveManage IPv6 Address/PTR records.
CNAME Record
#Index number.
Alias NameAlias for the FQDN (use *. prefix for wildcard).
FQDNCanonical (true) fully qualified domain name.
Add/Edit/RemoveManage CNAME records.
Domain Zone Forwarder
#Index number (rules applied in order). Hyphen (-) for non-configurable default record.
Domain ZoneFQDN without host (e.g., zyxel.com.tw). “*” means all zones.
TypeDNS Server source: User-Defined or dynamically from ISP interface.
DNS ServerIP address of DNS server. N/A if dynamic & interface inactive.
Query ViaInterface used to send queries to this DNS server (tunnel if VPN).
Add/Edit/Remove/MoveManage Domain Zone Forwarder records.
MX Record (for My FQDN)
#Index number.
Domain NameDomain name where mail is destined.
IP/FQDNIP address or FQDN of the mail server handling mail for the domain.
Add/Edit/RemoveManage MX records.
Security Option Control (Advanced Setting)
EditClick policy (Default/Customize) then Edit to change allow/deny actions.
PriorityCustomize policy checked first, then Default if no match.
NameName of policy (Default or Customize). Can change Customize name.
AddressAddress objects used in control policy (e.g., RFC1918). Modified in Object > Address.
Additional Info from CacheDisplays if device allowed/denied to cache RRs from previous queries.
Query RecursionDisplays if device allowed/denied to forward client DNS requests.
Service Control
#Index number (rules applied in order). Hyphen (-) for non-configurable default policy.
ZoneZone on Zyxel Device allowed/denied access.
AddressObject name of IP address(es) allowed/denied to send DNS queries.
ActionAccept (allow query) or Deny (discard query).
Add/Edit/Remove/MoveManage Service Control rules.

How do I add an IPv4 or IPv6 Address/PTR record?

Click the Add icon in the Address/PTR Record or IPv6 Address/PTR Record table in the Configuration > System > DNS screen.
Table 280 Configuration > System > DNS > (IPv6) Address/PTR Record Edit
LABEL DESCRIPTION
FQDN Type Fully-Qualified Domain Name (FQDN) of server. Use “*.” prefix for wildcard (e.g., *.example.com). Underscores not allowed.
IP Address Enter the IPv4 (dotted decimal) or IPv6 address of the host.
OK Click OK to save.
Cancel Click Cancel to exit without saving.

How do I add a CNAME record?

Click the Add icon in the CNAME Record table in the Configuration > System > DNS screen. Use “*.” as prefix for wildcard alias (e.g., *.example.com).
Table 281 Configuration > System > DNS > CNAME Record > Add
LABEL DESCRIPTION
Alias name Enter Alias Name. Use “*.” prefix for wildcard (e.g., *.example.com).
FQDN Type Fully-Qualified Domain Name (FQDN) of canonical server. Use “*.” prefix for wildcard (e.g., *.example.com). Underscores not allowed.
OK Click OK to save.
Cancel Click Cancel to exit without saving.

How do I add a Domain Zone Forwarder record?

Click the Add icon in the Domain Zone Forwarder table in the Configuration > System > DNS screen.
Table 282 Configuration > System > DNS > Domain Zone Forwarder Add
LABEL DESCRIPTION
Domain Zone Enter fully qualified domain name without host (e.g., zyxel.com.tw). Enter * if server serves all zones.
DNS Server

DNS Server(s) from ISP: Select if ISP dynamically assigns DNS. Select interface. Read-only fields show assigned IPs (N/A if no IP assigned).

Public DNS Server: Select if known IP address accessible without VPN. Enter IP (cannot be 0.0.0.0). Select Query via interface.

Private DNS Server: Select if known IP address accessible via VPN tunnel. Enter IP (cannot be 0.0.0.0).

OK Click OK to save.
Cancel Click Cancel to exit without saving.

How do I add an MX record?

Click the Add icon in the MX Record (for My FQDN) table in the Configuration > System > DNS screen.
Table 283 Configuration > System > DNS > MX Record Add
LABEL DESCRIPTION
Domain Name Enter the domain name where the mail is destined for.
IP Address/FQDN Enter the IP address or Fully-Qualified Domain Name (FQDN) of the mail server handling mail for the domain.
OK Click OK to save.
Cancel Click Cancel to exit without saving.

How do I edit a DNS Security Option Control policy?

In the Configuration > System > DNS screen (click Show Advanced Settings), click a control policy (Default or Customize) in the Security Option Control section, then click the Edit button.
Table 284 Configuration > System > DNS > Security Option Control Edit (Customize)
LABEL DESCRIPTION
Name (Customize policy only) Change the name for the policy.
Query Recursion Choose if device allowed/denied to forward DNS client requests for resolution. Can apply to specific servers via Address List for customized rule.
Additional Info from Cache Choose if device allowed/denied to cache Resource Records (RR) from previous DNS queries.
Address List (Customize policy only) Manage address objects for this rule.
Available Displays address objects (from Object > Address). Select object(s) and click > to add to Member list.
Member Displays address objects rule applies to.
OK Click OK to save settings.
Cancel Click Cancel to exit without saving.

How do I add a DNS Service Control rule?

Click the Add icon in the Service Control table in the Configuration > System > DNS screen.
Table 285 Configuration > System > DNS > Service Control Rule Add
LABEL DESCRIPTION
Create new Object Configure new address/zone objects if needed.
Address Object Select ALL to apply to any computer, or select a predefined address object to apply only to computer(s) with that IP.
Zone Select ALL to apply to queries through any zone, or select a predefined zone.
Action Select Accept to allow queries, Deny to reject queries from specified computer/zone.
OK Click OK to save.
Cancel Click Cancel to exit without saving.

Under what conditions can a service (like HTTP/HTTPS) NOT be used to access the Zyxel Device?

Access using a service is not possible when:

1. The service is disabled in its corresponding screen (e.g., System > WWW).

2. The client IP address does not match the allowed IP address (address object) in the Service Control table for that service.

3. The client IP address (address object) is not in an allowed zone, or the action is set to Deny in the Service Control table.

4. A security policy rule blocks the traffic.


How do I configure WWW (HTTP/HTTPS) Service Control?

Go to Configuration > System > WWW > Service Control. This screen specifies zones and IP addresses allowed for HTTP/HTTPS access. Admin Service Control manages access to the Web Configurator; User Service Control manages user access (e.g., login portal).
Table 286 Configuration > System > WWW > Service Control
LABEL DESCRIPTION
HTTPS
EnableSelect to allow/disallow access via HTTPS based on rules below.
Server PortHTTPS listening port (default 443). Change requires users to specify port in URL (e.g., https://IP:8443).
Authenticate Client Certificates(Optional) Select to require client browser to present certificate from trusted CA (configured in Trusted Certificates). Client needs CA-signed certificate. If enabled without trusted CA, clients cannot connect. To disable via CLI: `configure terminal`, `no ip http secure-server auth-client`, `write`, `exit`.
Server CertificateSelect certificate device uses to authenticate itself to HTTPS client (from My Certificates).
Redirect HTTP to HTTPSSelect to redirect all HTTP requests to HTTPS for secure access only.
Admin/User Service ControlTables define allowed zones/IPs for admin/user HTTPS access. Add/Edit/Remove/Move rules. Default rule (-) allows ALL/ALL/accept.
#Rule index number.
ZoneZone allowed/denied access.
AddressAddress object allowed/denied access.
ActionAccept or Deny access.
HTTP
EnableSelect to allow/disallow access via HTTP based on rules below.
Server PortHTTP listening port (default 80). Change requires users to specify port in URL.
Admin/User Service ControlTables define allowed zones/IPs for admin/user HTTP access. Add/Edit/Remove/Move rules. Default rule (-) allows ALL/ALL/accept.
#Rule index number.
ZoneZone allowed/denied access.
AddressAddress object allowed/denied access.
ActionAccept or Deny access.
Authentication
Client Authentication MethodSelect method HTTPS/HTTP server uses to authenticate client (configured in Object > Auth. method).
ApplyClick Apply to save changes.
ResetClick Reset to return to last-saved settings.
Note: If SSL VPN port (VPN > SSL VPN > Global Setting) is same as HTTPS port, User Service Control settings apply to SSL VPN users accessing the device via HTTPS. If ports differ, these settings only apply to HTTPS access, not SSL VPN.

How do I add or edit a generic Service Control rule (for WWW, SSH, Telnet, FTP, SNMP)?

Click Add or Edit in the relevant Service Control table (Admin or User) within the configuration screen for the specific service (e.g., System > WWW, System > SSH).
Table 287 Configuration > System > Service Control Rule > Edit
LABEL DESCRIPTION
Create new Object Configure new address/zone objects if needed.
Address Object Select ALL to apply to any computer, or select predefined address object.
Zone Select ALL to apply to any zone, or select predefined zone.
Action Select Accept to allow access, Deny to block access for specified address/zone.
OK Click OK to save settings.
Cancel Click Cancel to exit without saving.

What should I do if none of the LEDs turn on?

Make sure that you have the power cord connected to the Zyxel Device and plugged in to an appropriate power source. Make sure you have the Zyxel Device turned on. Check all cable connections. If the LEDs still do not turn on, you may have a hardware problem. In this case, you should contact your local vendor.

How can I finish Nebula registration if I did not connect a computer to the Zyxel Device LAN?

Follow these steps if you did not connect a computer to the LAN port of the Zyxel Device:

1. Connect a USB disk drive in FAT32 format to a USB port on your computer.

2. Go to your mailbox and find the email from Nebula. Save the JSON file in the email attachment to the root folder of the USB drive.

3. Connect the USB drive to the Zyxel Device. The SYS LED will blink. Please wait until the SYS LED is solid green again. The Nebula administrator should now check if the Zyxel Device is online indicating Nebula registration has succeeded.


What should I do if I cannot access the Zyxel Device from the LAN?

• Check the cable connection between the Zyxel Device and your computer or switch.

• Ping the Zyxel Device from a LAN computer. Make sure your computer’s Ethernet card is installed and functioning properly. Also make sure that its IP address is in the same subnet as the Zyxel Device’s.

• In the computer, click Start, (All) Programs, Accessories and then Command Prompt. In the Command Prompt window, type “ping” followed by the Zyxel Device’s LAN IP address (192.168.1.1 is the default) and then press [ENTER]. The Zyxel Device should reply.

• If you’ve forgotten the Zyxel Device’s password, use the RESET button. Press the button in for about 5 seconds (or until the SYS LED starts to blink), then release it. It returns the Zyxel Device to the factory defaults (password is 1234, LAN IP address 192.168.1.1, etc).

• If you’ve forgotten the Zyxel Device’s IP address, you can use the commands through the CONSOLE port to check it. Connect your computer to the CONSOLE port using a console cable. Your computer should have a terminal emulation communications program (such as HyperTerminal) set to VT100 terminal emulation, no parity, 8 data bits, 1 stop bit, no flow control and 115200 bps port speed.


What should I do if I cannot access the Internet?

• Check the Zyxel Device’s connection to the Ethernet jack with Internet access. Make sure the Internet gateway device (such as a DSL modem) is working properly.

• Check the WAN interface’s status in the Dashboard. Use the installation setup wizard again and make sure that you enter the correct settings. Use the same case as provided by your ISP.


Why is the content filter category service not working?

• Make sure your Zyxel Device has the content filter category service registered and that the license is not expired. Purchase a new license if the license is expired.

• Make sure your Zyxel Device is connected to the Internet.

• Make sure you select Enable Content Filter Category Service when you add a filter profile in the Configuration > Security Service > Content Filter > Profile > Add or Edit screen.

• Block QUIC UDP ports 80 and 443. QUIC (Quick UDP Internet Connections) is a UDP protocol used by Google Chrome and Chromium web browsers.


Why aren’t my configured security settings being applied to certain interfaces?

Many security settings are usually applied to zones. Make sure you assign the interfaces to the appropriate zones. When you create an interface, there is no security applied on it until you assign it to a zone.

Why isn’t the custom policy route I configured being applied?

The Zyxel Device checks the policy routes in the order that they are listed. So make sure that your custom policy route comes before any other routes that the traffic would also match.

Why isn’t the custom security policy I configured being applied?

The Zyxel Device checks the security policies in the order that they are listed. So make sure that your custom security policy comes before any other rules that the traffic would also match.

Why can’t I enter the interface name I want?

• The format of interface names other than the Ethernet interface names is very strict. Each name consists of 2-4 letters (interface type), followed by a number (x, limited by the maximum number of each type of interface). For example, VLAN interfaces are vlan0, vlan1, vlan2,…; and so on.

• The names of virtual interfaces are derived from the interfaces on which they are created. For example, virtual interfaces created on Ethernet interface wan1 are called wan1:1, wan1:2, and so on. Virtual interfaces created on VLAN interface vlan2 are called vlan2:1, vlan2:2, and so on. You cannot specify the number after the colon(:) in the Web Configurator; it is a sequential number. You can specify the number after the colon if you use the CLI to set up a virtual interface.


Why can’t I set up a PPP interface, virtual Ethernet interface or virtual VLAN interface on an Ethernet interface?

You cannot set up a PPP interface, virtual Ethernet interface or virtual VLAN interface if the underlying interface is a member of a bridge. You also cannot add an Ethernet interface or VLAN interface to a bridge if the member interface has a virtual interface or PPP interface on top of it.

Why do my rules and settings that apply to a particular interface no longer work?

The interface’s IP address may have changed. To avoid this, create an IP address object based on the interface. This way the Zyxel Device automatically updates every rule or setting that uses the object whenever the interface’s IP address settings change. For example, if you change LAN1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN1 subnet address object.

Why can’t I set up a PPP interface?

You have to set up an ISP account before you create a PPPoE or PPTP interface.

Why are the data rates through my cellular connection much lower than expected?

The actual cellular data rate you obtain varies depending on the cellular device you use, the signal strength to the service provider’s base station, and so on.

I created a cellular interface but cannot connect through it. What should I check?

• Make sure you have a compatible mobile broadband device installed or connected. See http://www.zyxel.com for details.

• Make sure you have the cellular interface enabled.

• Make sure the cellular interface has the correct user name, password, and PIN code configured with the correct casing.

• If the Zyxel Device has multiple WAN interfaces, make sure their IP addresses are on different subnets.


What should I do if hackers have accessed my WEP-encrypted wireless LAN?

WEP is extremely insecure. Its encryption can be broken by an attacker, using widely-available software. It is strongly recommended that you use a more effective security mechanism. Use the strongest security mechanism that all the wireless devices in your network support. WPA2 or WPA2-PSK is recommended.

Why is the wireless security not following the re-authentication timer setting I specified?

If a RADIUS server authenticates wireless stations, the re-authentication timer on the RADIUS server has priority. Change the RADIUS server’s configuration if you need to use a different re-authentication timer setting.

Why can’t I configure a particular VLAN interface on top of an Ethernet interface even though I have it configured on top of another Ethernet interface?

Each VLAN interface is created on top of only one Ethernet interface.

Why isn’t the Zyxel Device applying an interface’s configured ingress bandwidth limit?

At the time of writing, the Zyxel Device does not support ingress bandwidth management.

Why isn’t the Zyxel Device scanning some zipped files?

The Zyxel Device cannot unzip password protected ZIP files or a ZIP file within another ZIP file. There are also limits to the number of ZIP files that the Zyxel Device can concurrently unzip.

Why is the Zyxel Device deleting some zipped files?

The Zyxel Device cannot unzip password protected ZIP files or a ZIP file within another ZIP file. There are also limits to the number of ZIP files that the Zyxel Device can concurrently unzip.

Why does the Zyxel Device’s performance seem slower after configuring ADP?

Depending on your network topology and traffic load, applying an anomaly profile to each and every packet direction may affect the Zyxel Device’s performance.

Why is my Collaborative Detection & Response (CDR) not working?

CDR signature are a subset of Web Filtering, Anti-Malware (Anti-Virus) and IPS (IDP) license signatures. No checking for malicious traffic is done if these licenses have expired or are not active. Make sure these licenses are activated and not expired. Purchase new licenses if the license are expired.

Why can’t I block traffic from an AP using CDR?

The Zyxel Device can only blocked traffic from Nebula-managed APs in your network using CDR. Make sure:

• The AP is managed by the Zyxel Device.

• The AP must be in the Zyxel Device’s supported list.


Why are quarantined/blocked clients released before I want them to?

Check if your CDR license is expired or disabled. Check if the Containment Period is expired in Configuration > Security Service > Collaborative Detection & Response screen.

Why does the Zyxel Device route and apply SNAT for traffic from some interfaces but not from others?

The Zyxel Device automatically uses SNAT for traffic it routes from internal interfaces to external interfaces. For example LAN to WAN traffic. You must manually configure a policy route to add routing and SNAT settings for an interface with the Interface Type set to General. You can also configure a policy route to override the default routing and SNAT behavior for an interface with the Interface Type set to Internal or External.

Why can’t I get Dynamic DNS to work?

• You must have a public WAN IP address to use Dynamic DNS.

• Make sure you recorded your DDNS account’s user name, password, and domain name and have entered them properly in the Zyxel Device.

• You may need to configure the DDNS entry’s IP Address setting to Auto if the interface has a dynamic IP address or there are one or more NAT routers between the Zyxel Device and the DDNS server.

• The Zyxel Device may not determine the proper IP address if there is an HTTP proxy server between the Zyxel Device and the DDNS server.


Why can’t I create a second HTTP redirect rule for an incoming interface?

You can configure up to one HTTP redirect rule for each (incoming) interface.

Why does the Zyxel Device keep resetting the connection?

If an alternate gateway on the LAN has an IP address in the same subnet as the Zyxel Device’s LAN IP address, return traffic may not go through the Zyxel Device. This is called an asymmetrical or “triangle” route. This causes the Zyxel Device to reset the connection, as the connection has not been acknowledged. You can set the Zyxel Device’s security policy to permit the use of asymmetrical route topology on the network (so it does not reset the connection) although this is not recommended since allowing asymmetrical routes may let traffic from the WAN go directly to the LAN without passing through the Zyxel Device. A better solution is to use virtual interfaces to put the Zyxel Device and the backup gateway on separate subnets. See Asymmetrical Routes and the chapter about interfaces for more information.

Why can’t I set up an IPSec VPN tunnel to another device?

If the IPSec tunnel does not build properly, the problem is likely a configuration error at one of the IPSec routers. Log into both Zyxel IPSec routers and check the settings in each field methodically and slowly. Make sure both the Zyxel Device and remote IPSec router have the same security settings for the VPN tunnel. It may help to display the settings for both routers side-by-side. Here are some general suggestions.

• The system log can often help to identify a configuration problem.

• If you enable NAT traversal, the remote IPSec device must also have NAT traversal enabled.

• The Zyxel Device and remote IPSec router must use the same authentication method to establish the IKE SA.

• Both routers must use the same negotiation mode.

• Both routers must use the same encryption algorithm, authentication algorithm, and DH key group.

• When using pre-shared keys, the Zyxel Device and the remote IPSec router must use the same pre shared key.

• The Zyxel Device’s local and peer ID type and content must match the remote IPSec router’s peer and local ID type and content, respectively.

• The Zyxel Device and remote IPSec router must use the same active protocol.

• The Zyxel Device and remote IPSec router must use the same encapsulation.

• The Zyxel Device and remote IPSec router must use the same SPI.

• If the sites are/were previously connected using a leased line or ISDN router, physically disconnect these devices from the network before testing your new VPN connection. The old route may have been learned by RIP and would take priority over the new VPN connection.

• To test whether or not a tunnel is working, ping from a computer at one site to a computer at the other. Before doing so, ensure that both computers have Internet access (via the IPSec routers).

• It is also helpful to have a way to look at the packets that are being sent and received by the Zyxel Device and remote IPSec router (for example, by using a packet sniffer).

Check the configuration for the following Zyxel Device features.

• The Zyxel Device does not put IPSec SAs in the routing table. You must create a policy route for each VPN tunnel.

• Make sure the To-Zyxel Device security policies allow IPSec VPN traffic to the Zyxel Device. IKE uses UDP port 500, AH uses IP protocol 51, and ESP uses IP protocol 50.

• The Zyxel Device supports UDP port 500 and UDP port 4500 for NAT traversal. If you enable this, make sure the To-Zyxel Device security policies allow UDP port 4500 too.

• Make sure regular security policies allow traffic between the VPN tunnel and the rest of the network. Regular security policies check packets the Zyxel Device sends before the Zyxel Device encrypts them and check packets the Zyxel Device receives after the Zyxel Device decrypts them. This depends on the zone to which you assign the VPN tunnel and the zone from which and to which traffic may be routed.

• If you set up a VPN tunnel across the Internet, make sure your ISP supports AH or ESP (whichever you are using).

• If you have the Zyxel Device and remote IPSec router use certificates to authenticate each other, You must set up the certificates for the Zyxel Device and remote IPSec router first and make sure they trust each other’s certificates. If the Zyxel Device’s certificate is self-signed, import it into the remote IPSec router. If it is signed by a CA, make sure the remote IPSec router trusts that CA. The Zyxel Device uses one of its Trusted Certificates to authenticate the remote IPSec router’s certificate. The trusted certificate can be the remote IPSec router’s self-signed certificate or that of a trusted CA that signed the remote IPSec router’s certificate.

• Multiple SAs connecting through a secure gateway must have the same negotiation mode.


Why can’t VPN traffic be transmitted through the VPN tunnel even though the VPN connection is up?

If you have the Configuration > VPN > IPSec VPN > VPN Connection screen’s Use Policy Route to control dynamic IPSec rules option enabled, check the routing policies to see if they are sending traffic elsewhere instead of through the VPN tunnels.

Why doesn’t the logo I uploaded for the SSL VPN user screens display properly?

The logo graphic must be GIF, JPG, or PNG format. The graphic should use a resolution of 103 x 29 pixels to avoid distortion when displayed. The Zyxel Device automatically resizes a graphic of a different resolution to 103 x 29 pixels. The file size must be 100 kilobytes or less. Transparent background is recommended.

I logged into the SSL VPN but cannot see some of the resource links. Why?

Available resource links vary depending on the SSL application object’s configuration.

Why can’t I set up a Remote AP VPN tunnel?

Check the settings in each field methodically and slowly. Make sure:

• Your AP supports remote AP VPN. Check the AP Role Capability in the Mgnt. AP List screen.

• The Zyxel Device has 5.00 or later firmware and the managed AP has 6.20 or later firmware.

• Your Secure WiFi license is activated and not expired. Purchase a new license if the license is expired.

• You’ve selected the Remote AP check box in Configuration > Wireless > AP Management on the AP you want to set up as a remote AP.

• You’ve configured your AP using a Secure Tunnel SSID profile.


I changed the LAN IP address and can no longer access the Internet. Why?

The Zyxel Device automatically updates address objects based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. However, you need to manually edit any address objects for your LAN that are not based on the interface.

Why isn’t the bandwidth management being applied properly for policy routes managing TCP and UDP traffic?

It is recommended to use application patrol instead of policy routes to manage the bandwidth of TCP and UDP traffic.

Why can’t the RADIUS server authenticate the Zyxel Device‘s default admin account?

The default admin account is always authenticated locally, regardless of the authentication method setting.

Why does the Zyxel Device fail to authenticate the ext-user user accounts I configured?

An external server such as AD, LDAP or RADIUS must authenticate the ext-user accounts. If the Zyxel Device tries to use the local database to authenticate an ext-user, the authentication attempt will always fail. (This is related to AAA servers and authentication methods.)

Why can’t I add admin users to a user group with access users?

You cannot put access users and admin users in the same user group.

Why can’t I add the default admin account to a user group?

You cannot put the default admin account into any user group.

Why is my two-factor authentication not working?

Check that match the specifications and limitation in the following list:

• Ext-users (authenticated by external servers) are not supported.

• You must setup Google Authenticator on their mobile device before you can successfully authenticate with the Zyxel Device.

• Click or tap the authorization link in the SMS or email within the valid time. You can extend the time in Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access.


Why can’t I receive the authorization SMS or email for two factor authentication?

• Make sure the mobile telephone number or email address of the user in the Active Directory, RADIUS Server or local Zyxel Device database is configured correctly.

• Email-to-SMS cloud system authentication fails. Make sure that SMS is enabled and credentials are correct in System > Notification > SMS.

• Mail server authentication fails. Make sure the System > Notification > Mail Server settings are correct if you’re using email for authentication.


Why do I get a Google Authenticator verification error?

• Check that you enter the right verification code. The verification code should be 6 digits.

• You must enter the code within the time displayed in Google Authenticator.

• You’ve exceeded the maximum verification code failed attempts.


Why is the schedule I configured not being applied at the configured times?

Make sure the Zyxel Device’s current date and time are correct.

Why can’t I get a certificate to import into the Zyxel Device?

1. For My Certificates, you can import a certificate that matches a corresponding certification request that was generated by the Zyxel Device. You can also import a certificate in PKCS#12 format, including the certificate’s public and private keys.

2. You must remove any spaces from the certificate’s filename before you can import the certificate.

3. Any certificate that you want to import has to be in one of these file formats:

• Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.

• PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.

• Binary PKCS#7: This is a standard that defines the general syntax for data (including digital signatures) that may be encrypted. A PKCS #7 file is used to transfer a public key certificate. The private key is not included. The Zyxel Device currently allows the importation of a PKS#7 file that contains a single certificate.

• PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses lowercase letters, uppercase letters and numerals to convert a binary PKCS#7 certificate into a printable form.

• Binary PKCS#12: This is a format for transferring public key and private key certificates.The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the Zyxel Device.

Note: Be careful not to convert a binary file to text during the transfer process. It is easy for this to occur since many programs use text files by default.

Why can’t I access the Zyxel Device from a computer connected to the Internet?

Check the service control rules and to-Zyxel Device security policies.

Why doesn’t the logo I uploaded for the Web Configurator login screen/access page display properly?

Make sure the logo file is a GIF, JPG, or PNG of 100 kilobytes or less.

Why doesn’t the logo I uploaded for the screen/window background display properly?

Make sure the logo file is a GIF, JPG, or PNG of 100 kilobytes or less.

Why did the Zyxel Device’s traffic throughput rate decrease after I started collecting traffic statistics?

Data collection may decrease the Zyxel Device’s traffic throughput rate.

I can only see newer logs. Older logs are missing. Why?

When a log reaches the maximum number of log messages, new log messages automatically overwrite existing log messages, starting with the oldest existing log message first.

Why aren’t the commands in my configuration file or shell script working properly?

• In a configuration file or shell script, use “#” or “!” as the first character of a command line to have the Zyxel Device treat the line as a comment.

• Your configuration files or shell scripts can use “exit” or a command line consisting of a single “!” to have the Zyxel Device exit sub command mode.

• Include write commands in your scripts. Otherwise the changes will be lost when the Zyxel Device restarts. You could use multiple write commands in a long script.

Note: “exit” or “!” must follow sub commands if it is to make the Zyxel Device exit sub command mode.

Why can’t I get the firmware uploaded using the commands?

The Web Configurator is the recommended method for uploading firmware. You only need to use the command line interface if you need to recover the firmware. See the CLI Reference Guide for how to determine if you need to recover the firmware and how to recover it.

Why did my packet capture capture less than I wanted or fail?

The packet capture screen’s File Size sets a maximum size limit for the total combined size of all the capture files on the Zyxel Device, including any existing capture files and any new capture files you generate. If you have existing capture files you may need to set this size larger or delete existing capture files. The Zyxel Device stops the capture and generates the capture file when either the capture files reach the File Size or the time period specified in the Duration field expires.

Why are my earlier packet capture files missing?

New capture files overwrite existing files of the same name. Change the File Suffix field’s setting to avoid this.

Why is the clients’ information I collected using device insight not correct?

Make sure your clients are in the same IP subnet in the LAN/VLAN/DMZ networks behind the Zyxel Device. Information from clients that are in different IP subnets in the LAN/VLAN/DMZ networks might not be collected correctly. To report on clients that are wrongly identified, go to Monitor > Network Status > Device Insight > Feedback.

Why can’t I remove a client in Monitor > Device Insight?

Clients that are blocked cannot be removed. Please make sure to unblock the client you want to remove first.

Why can’t I block clients using device insight profiles?

Make sure you select the correct device types and operating systems in device insight profiles. Make sure you’ve applied the device insight profiles to the right policy in Security Policy and set the action to deny.

Why can’t I set the upload bandwidth limit for IPSec VPN configuration provisioning?

Upload bandwidth limit is only available for Zyxel subscription-based SecuExtender IPSec VPN clients for Windows and macOS clients. Make sure the VPN clients are using SecuExtender with supported operating system versions. See the related section for more information.

Why can’t I access the Zyxel Device from the WAN after configuring settings in Security Check for Web Interface?

If you change the default HTTPS SSL port (443), make sure to use the new port to access the Zyxel Device. Make sure to access the Zyxel Device from the specified IP address or FQDNs you set. Reset the Zyxel Device if none of the above works.

Why can’t I access the Zyxel Device from the SSL VPN port after configuring settings in Security Check for Web Interface?

If you change the default SSL VPN port (443), make sure to use the new port to access the Zyxel Device. Make sure to make the same change to SecuExtender. Make sure to access the Zyxel Device from the specified regions you set. Reset the Zyxel Device if none of the above works.

Why can’t I retrieve VPN rule settings from the Zyxel Device after configuring settings in Security Check for Web Interface?

If you change the default port that IPSec VPN clients use to retrieve VPN rule settings from the Zyxel Device, make sure to make the same change to the Zyxel IPSec VPN clients. Reset the Zyxel Device if none of the above works.

Why is my Zyxel Device CPU usage too high?

The Zyxel Device may receive too many HTTPS connection requests when Web Authentication is enabled. Do the following to reduce the number of HTTPS connection requests:

• Go to Configuration > Object > User/Group > Setting and select Limit the number of simultaneous logons for administration account. Set a number in Maximum number per administration account to limit the number of simultaneous logins for each admin.

• Go to Configuration > Web Authentication > Exceptional Services to select services you want users to access without logging in.


Why can’t I see my WAN settings in Mgmt. & Analytics > Nebula?

Make sure your Zyxel Device supports Native Mode or you’ve managed your Zyxel Device with Nebula before. Make sure you can connect to Nebula with your current WAN settings. See the related section for more information.

I’ve passed the Zyxel Device management to Nebula, but I cannot access Nebula. Why?

You can no longer access the Zyxel Device through the WAN after you let Nebula manage your Zyxel Device. Connect your computer to the Zyxel Device LAN port to access the local GUI with your support account for troubleshooting. See the ZyWALL Series Local GUI User’s Guide for more information.

How do I reset the Zyxel Device?

If you cannot access the Zyxel Device by any method, try restarting it by turning the power off and then on again. If you still cannot access the Zyxel Device by any method or you forget the administrator password(s), you can reset the Zyxel Device to its factory-default settings. Any configuration files or shell scripts that you saved on the Zyxel Device should still be available afterwards. Use the following procedure to reset the Zyxel Device to its factory-default settings. This overwrites the settings in the startup-config.conf file with the settings in the system-default.conf file. Note: This procedure removes the current configuration.

1. Make sure the SYS LED is on and not blinking.

2. Press the RESET button and hold it until the SYS LED begins to blink. (This usually takes about five seconds.)

3. Release the RESET button, and wait for the Zyxel Device to restart.

You should be able to access the Zyxel Device using the default settings.

CLICK HERE TO DOWNLOAD ZYXEL USG FLEX 50 USG20-VPN (01) PDF MANUAL


Leave comments, questions, reviews, tips, tricks, hacks or page errors below. Account not required.