www.zyxel.comwww.zyxel.comISG50Integrated Service GatewayIMPORTANT!READ CAREFULLY BEFORE USE.KEEP THIS GUIDE FOR FUTURE REFERENCE.Copyright © 2012 ZyX
Table of ContentsISG50 User’s Guide1010.7 IP/MAC Binding Monitor ...
Chapter 6 Configuration BasicsISG50 User’s Guide100Zones cannot overlap. Each interface and VPN tunnel can be assigned to at most one zone. Virtual in
Chapter 6 Configuration BasicsISG50 User’s Guide1016.6.10 HTTP RedirectConfigure this feature to have the ISG50 transparently forward HTTP (web) tra
Chapter 6 Configuration BasicsISG50 User’s Guide102To-ISG50 firewall rules control access to the ISG50. Configure to-ISG50 firewall rules for remote m
Chapter 6 Configuration BasicsISG50 User’s Guide103Examples: Suppose you want to give a user named Bob FTP access but with a limited download speed o
Chapter 6 Configuration BasicsISG50 User’s Guide1046.7.1 User/GroupUse these screens to configure the ISG50’s administrator and user accounts. The IS
Chapter 6 Configuration BasicsISG50 User’s Guide1053 Click Configuration > System > WWW to configure the HTTP management access. Enable HTTPS a
Chapter 6 Configuration BasicsISG50 User’s Guide106
ISG50 User’s Guide 107CHAPTER 7General TutorialsHere are examples of using the Web Configurator to configure general settings in the ISG50. See Chap
Chapter 7 General TutorialsISG50 User’s Guide1087.1.1 Configure a WAN Ethernet InterfaceYou need to assign the ISG50’s wan1 interface a static IP add
Chapter 7 General TutorialsISG50 User’s Guide1092 Select WIZ_VPN and move it to the Member box and click OK.Figure 74 Configuration > Network &
Table of ContentsISG50 User’s Guide1112.6 VLAN Interfaces ...
Chapter 7 General TutorialsISG50 User’s Guide110Figure 76 Configuration > Network > Interface > Cellular > Edit Note: The Network Sele
Chapter 7 General TutorialsISG50 User’s Guide111To fine-tune the load balancing configuration, see Chapter 13 on page 281. See also Section 7.3 on pa
Chapter 7 General TutorialsISG50 User’s Guide112Figure 79 Configuration > Network > Interface > Ethernet > Edit (wan1) 2 Repeat the p
Chapter 7 General TutorialsISG50 User’s Guide113Figure 80 Configuration > Network > Interface > Trunk > Add 3 Select the trunk as th
Chapter 7 General TutorialsISG50 User’s Guide114Figure 82 VPN ExampleIn this example, the ISG50 is router X (1.2.3.4), and the remote IPSec router i
Chapter 7 General TutorialsISG50 User’s Guide115Figure 83 Configuration > VPN > IPSec VPN > VPN Gateway > Add 7.4.2 Set Up the VPN Co
Chapter 7 General TutorialsISG50 User’s Guide1164 Enable the VPN connection and name it (“VPN_CONN_EXAMPLE”). Under VPN Gateway select Site-to-site an
Chapter 7 General TutorialsISG50 User’s Guide117example that does not include priorities for different types of traffic. See Chapter 25 on page 397 f
Chapter 7 General TutorialsISG50 User’s Guide1187.5.2 Set Up User GroupsSet up the user groups and assign the users to the user groups.1 Click Config
Chapter 7 General TutorialsISG50 User’s Guide119Figure 88 Configuration > Object > AAA Server > RADIUS > Add2 Click Configuration >
Table of ContentsISG50 User’s Guide1216.1 Zones Overview ...
Chapter 7 General TutorialsISG50 User’s Guide120Figure 90 Configuration > Object > User/Group > Setting > Add (Force User Authentication
Chapter 7 General TutorialsISG50 User’s Guide121Figure 91 Configuration > Object > AAA Server > RADIUS > Add2 Now you add ext-group-use
Chapter 7 General TutorialsISG50 User’s Guide1227.7 How to Use Authentication PoliciesHere is how to use authentication policies to make sure that us
Chapter 7 General TutorialsISG50 User’s Guide123Figure 94 Configuration > Auth. Policy 7.8 How to Configure Service ControlService control
Chapter 7 General TutorialsISG50 User’s Guide124Figure 95 Configuration > System > WWW3 In the Zone field select LAN1 and click OK. Figure 96
Chapter 7 General TutorialsISG50 User’s Guide125Figure 98 Configuration > System > WWW > Service Control Rule Edit 6 Click Apply.Figure
Chapter 7 General TutorialsISG50 User’s Guide126Figure 100 WAN to LAN H.323 Peer-to-peer Calls Example7.9.1 Turn On the ALGClick Configuration >
Chapter 7 General TutorialsISG50 User’s Guide127Figure 102 Create Address Objects 2 Click Configuration > Network > NAT > Add.Configure a
Chapter 7 General TutorialsISG50 User’s Guide128Figure 103 Configuration > Network > NAT > Add 7.9.3 Set Up a Firewall Rule For H.323The
Chapter 7 General TutorialsISG50 User’s Guide129Figure 104 Configuration > Firewall > Add 7.10 How to Allow Public Access to a Web ServerTh
Table of ContentsISG50 User’s Guide1321.1.1 What You Can Do in this Chapter ...
Chapter 7 General TutorialsISG50 User’s Guide130Figure 106 Creating the Address Object for the HTTP Server’s Private IP Address 2 Create a host addr
Chapter 7 General TutorialsISG50 User’s Guide131Figure 108 Creating the NAT Entry 7.10.3 Set Up a Firewall RuleThe firewall blocks traffic fro
Chapter 7 General TutorialsISG50 User’s Guide132Figure 109 Configuration > Firewall > Add 7.11 How to Use Multiple Static Public WAN IP Addre
Chapter 7 General TutorialsISG50 User’s Guide133Although adding a description is optional, it is recommended. This example uses LAN-to-WAN-Range. Spe
Chapter 7 General TutorialsISG50 User’s Guide1347.12 Initial Setup VideoUse Adobe Reader 9 or later or a recent version of Foxit Reader to play this
ISG50 User’s Guide 135CHAPTER 8PBX TutorialsHere are examples of using the web configurator to set up and use the ISG50 for a telephone network as s
Chapter 8 PBX TutorialsISG50 User’s Guide136Note: This chapter assumes that you have already configured your network settings. See the QSG, the instal
Chapter 8 PBX TutorialsISG50 User’s Guide1371 In the web configurator, click Configuration > PBX > Extension Management > Authority Group to
Chapter 8 PBX TutorialsISG50 User’s Guide138The SIP username for extension 1001 is 1001 and the SIP password for this extension is 11100199. You do no
Chapter 8 PBX TutorialsISG50 User’s Guide1395 The SIP extensions display in the Edit Authority Group Basic screen. Click OK. 6 Keep a list of the SIP
Table of ContentsISG50 User’s Guide1425.1 Overview ...
Chapter 8 PBX TutorialsISG50 User’s Guide1408.1.2 Connect IP PhonesYou can now set up your IP phones. For example, you can connect all of the IP phon
Chapter 8 PBX TutorialsISG50 User’s Guide141Complete the SIP registration for all the IP phones on your network. When all the phones are registered,
Chapter 8 PBX TutorialsISG50 User’s Guide1421 Click Configuration > PBX > Auto Provision. Then double-click a SIP extension entry.2 Enter the SI
Chapter 8 PBX TutorialsISG50 User’s Guide1438.3 Making PSTN CallsThe following section shows you how to make and receive calls via a connection to t
Chapter 8 PBX TutorialsISG50 User’s Guide1441 In the web configurator, click Configuration > PBX > Outbound Line Management > Outbound Trunk
Chapter 8 PBX TutorialsISG50 User’s Guide145The LCRs determine which outside line the ISG50 should use to complete outbound calls. In our example we
Chapter 8 PBX TutorialsISG50 User’s Guide146• Click OK. 3 Click OK again and you are done configuring the LCR. However, before it can be used by any
Chapter 8 PBX TutorialsISG50 User’s Guide1472 Select the LocalCall entry’s Association checkbox. Click OK. 3 You can now use the telephones that ar
Chapter 8 PBX TutorialsISG50 User’s Guide148• Assigning an LCR to an Authority Group - giving extensions the right to make outbound calls via the ITSP
Chapter 8 PBX TutorialsISG50 User’s Guide1491 In the web configurator, click Configuration > PBX > Outbound Line Management > Outbound Line
Table of ContentsISG50 User’s Guide1528.1 Overview ...
Chapter 8 PBX TutorialsISG50 User’s Guide1502 Click the Add icon in the SIP Trunk section. Enter the name of the group (“ITSP1” in this example). Fill
Chapter 8 PBX TutorialsISG50 User’s Guide1513 People from the outside world can now call the ISG50 using the numbers provided by your ITSP. The defau
Chapter 8 PBX TutorialsISG50 User’s Guide1522 The Dial Condition screen appears. •Type 1XXXXX followed by a period (.) in the Dial Condition field. Th
Chapter 8 PBX TutorialsISG50 User’s Guide1531 Click Configuration > PBX > Group Management and double-click the Basic entry. 2 Select the Long
Chapter 8 PBX TutorialsISG50 User’s Guide1543 You can now use the telephones that are part of the Basic authority group to make long distance calls us
Chapter 8 PBX TutorialsISG50 User’s Guide1558.5.1 The ISDN ConnectionRefer to the Quick Start Guide to connect your telephone cables to the outlets
Chapter 8 PBX TutorialsISG50 User’s Guide1562 Enter the name of the group (BRI1 in this example). Assume you want calls to be answered by the Auto-At
Chapter 8 PBX TutorialsISG50 User’s Guide1571 In the web configurator, click Configuration > PBX > Outbound Line Management > LCR > Add.
Chapter 8 PBX TutorialsISG50 User’s Guide158• Click OK. 3 Click OK again and you are done configuring the LCR. However, before it can be used by any
Chapter 8 PBX TutorialsISG50 User’s Guide1592 Select the ISDN_call entry’s checkbox in the Association column and click OK. 3 You can now use the te
Table of ContentsISG50 User’s Guide1630.2.10 Auto-Attendant for Incoming BRI Calls ...
Chapter 8 PBX TutorialsISG50 User’s Guide160The following figure shows the three examples (1 ~ 3).Figure 125 ISDN Network Configuration8.6.1 Exampl
Chapter 8 PBX TutorialsISG50 User’s Guide161• If you want outsiders to dial in directly to extensions without going through the Auto-Attendant, follo
Chapter 8 PBX TutorialsISG50 User’s Guide162• If you don’t want incoming calls to go through the Auto-Attendant, select Direct. • If you are using BRI
Chapter 8 PBX TutorialsISG50 User’s Guide163• Like Example 2, you can also select Direct (if you want the callers from the PBX’s extensions to the IS
Chapter 8 PBX TutorialsISG50 User’s Guide1648.8 Using the Extension PortalEvery phone user has a personal extension portal on the ISG50. You can log
Chapter 8 PBX TutorialsISG50 User’s Guide165Continue past any warning messages to the Login screen. Click the Extension Portal tab.Figure 128 Exten
Chapter 8 PBX TutorialsISG50 User’s Guide166The Web Phone screen displays.Figure 130 Tutorial: The Web PhoneNote: Make sure you have a headset (or s
Chapter 8 PBX TutorialsISG50 User’s Guide167Note: The SIP Auth Password field does not display if you connect to the ISG50 using a regular analog tel
Chapter 8 PBX TutorialsISG50 User’s Guide168The following screen displays.Figure 132 Tutorial: Configuring Call SettingsEXAMPLE
Chapter 8 PBX TutorialsISG50 User’s Guide169The following table shows the example call setting information. You can also use this table to make a not
Table of ContentsISG50 User’s Guide1734.3 The Call Park Screen ...
Chapter 8 PBX TutorialsISG50 User’s Guide1708.8.6 Setting Up VoicemailNext, you can set up your voicemail inbox to automatically send your received m
Chapter 8 PBX TutorialsISG50 User’s Guide1718.9 Capturing Packets Using the Web ConfiguratorThe following section shows you how to capture packets u
Chapter 8 PBX TutorialsISG50 User’s Guide172• Duration: 10 secondsThen click Capture. 2 Re-initialize the SIP phone. This helps to get a complete pac
Chapter 8 PBX TutorialsISG50 User’s Guide173If you cannot solve the problem, contact customer support and send this file.You may be asked to provide
Chapter 8 PBX TutorialsISG50 User’s Guide174In order to do this, he must map his connections: • The first menu and the submenus both utilize an auto-a
Chapter 8 PBX TutorialsISG50 User’s Guide1751 Log into the ISG50, then go to the Configuration > PBX > ACD > Agent screen.2 For each of your
Chapter 8 PBX TutorialsISG50 User’s Guide176“Technical Support” as a skill, then any caller who presses the key for that skill is immediately forwarde
Chapter 8 PBX TutorialsISG50 User’s Guide1772 For each skill, click the Add button to open the Add New Skill screen, and assign configure the followi
Chapter 8 PBX TutorialsISG50 User’s Guide178having two agents linked to this skill (Pam and Steven). He decides that the person who has received the f
Chapter 8 PBX TutorialsISG50 User’s Guide1792 Click the Add button.3 On the Add Customized Auto-Attendant screen, enter a Name and a Description (opt
Table of ContentsISG50 User’s Guide1838.6.1 The Skill Menu Settings Screen ...
Chapter 8 PBX TutorialsISG50 User’s Guide1804 In the Office Hour tab provide an audio file saying something like “Press 1 for English or 2 for Spanish
Chapter 8 PBX TutorialsISG50 User’s Guide1815 In the Add Option screen, enter a keypad number and action for your auto-attendant. Because this is the
Chapter 8 PBX TutorialsISG50 User’s Guide1828 On the Add Option screen, enter the keypad number and action for the submenu item. The company manager f
183PART IITechnical Reference
184
ISG50 User’s Guide 185CHAPTER 9Dashboard9.1 OverviewUse the Dashboard screens to check status information about the ISG50.9.1.1 What You Can Do in
Chapter 9 DashboardISG50 User’s Guide186licensed service status, and interface status in widgets that you can re-arrange to suit your needs. You can a
Chapter 9 DashboardISG50 User’s Guide187Virtual Device Hover your cursor over a LED, interface or slot to view details about the status of the ISG50
Chapter 9 DashboardISG50 User’s Guide188Current Date/TimeThis field displays the current date and time in the ISG50. The format is yyyy-mm-dd hh:mm:ss
Chapter 9 DashboardISG50 User’s Guide189Action Use this field to get or to update the IP address for the interface. Click Renew to send a new DHCP re
Table of ContentsISG50 User’s Guide1942.5.1 Local Phonebook Add/Edit Screen ...
Chapter 9 DashboardISG50 User’s Guide1909.2.1 The CPU Usage ScreenUse this screen to look at a chart of the ISG50’s recent CPU usage. To access this
Chapter 9 DashboardISG50 User’s Guide191The following table describes the labels in this screen. 9.2.3 The Active Sessions ScreenUse this screen to
Chapter 9 DashboardISG50 User’s Guide1929.2.4 The VPN Status ScreenUse this screen to look at the VPN tunnels that are currently established. To acce
Chapter 9 DashboardISG50 User’s Guide193The following table describes the labels in this screen. 9.2.6 The Number of Login Users ScreenUse this scre
Chapter 9 DashboardISG50 User’s Guide194IP address This field displays the IP address of the computer used to log in to the ISG50.Force Logout Click t
ISG50 User’s Guide 195CHAPTER 10Monitor10.1 OverviewUse the Monitor screens to check status and statistics information.10.1.1 What You Can Do in t
Chapter 10 MonitorISG50 User’s Guide196•Use the PBX > BRI Trunk screen (Section 10.17 on page 218) to display status information about external con
Chapter 10 MonitorISG50 User’s Guide19710.2.1 The Port Statistics Graph Screen Use this screen to look at a line graph of packet statistics for each
Chapter 10 MonitorISG50 User’s Guide198The following table describes the labels in this screen. 10.3 Interface Status ScreenThis screen lists all of
Chapter 10 MonitorISG50 User’s Guide199Each field is described in the following table. Table 35 Monitor > System Status > Interface StatusLAB
ISG50 User’s Guide2IMPORTANT!READ CAREFULLY BEFORE USE.KEEP THIS GUIDE FOR FUTURE REFERENCE.Graphics in this book may differ slightly from the product
Table of ContentsISG50 User’s Guide20Chapter 47Schedules...
Chapter 10 MonitorISG50 User’s Guide20010.4 The Traffic Statistics ScreenClick Monitor > System Status > Traffic Statistics to display the Traf
Chapter 10 MonitorISG50 User’s Guide201You use the Traffic Statistics screen to tell the ISG50 when to start and when to stop collecting information
Chapter 10 MonitorISG50 User’s Guide202Top Select the type of report to display. Choices are:Host IP Address/User - displays the IP addresses or users
Chapter 10 MonitorISG50 User’s Guide203The following table displays the maximum number of records shown in the report, the byte count limit, and the
Chapter 10 MonitorISG50 User’s Guide204The following table describes the labels in this screen. Table 38 Monitor > System Status > Session Mon
Chapter 10 MonitorISG50 User’s Guide20510.6 The DDNS Status ScreenThe DDNS Status screen shows the status of the ISG50’s DDNS domain names. Click Mo
Chapter 10 MonitorISG50 User’s Guide206IP/MAC binding enabled and have ever established a session with the ISG50. Devices that have never established
Chapter 10 MonitorISG50 User’s Guide207The following table describes the labels in this screen. 10.9 Cellular Status ScreenThis screen displays your
Chapter 10 MonitorISG50 User’s Guide208Status No device - no 3G device is connected to the ISG50.No Service - no 3G network is available in the area;
Chapter 10 MonitorISG50 User’s Guide20910.9.1 More Information This screen displays more information on your 3G, such as the signal strength, IMEA/E
Table of ContentsISG50 User’s Guide2150.3.2 The Trusted Certificates Import Screen ...
Chapter 10 MonitorISG50 User’s Guide21010.10 USB Storage ScreenThis screen displays information about a connected USB storage device. Click Monitor &
Chapter 10 MonitorISG50 User’s Guide21110.11 The IPSec Monitor ScreenYou can use the IPSec Monitor screen to display and to manage active IPSec SAs.
Chapter 10 MonitorISG50 User’s Guide212Each field is described in the following table. 10.11.1 Regular Expressions in Searching IPSec SAsA question m
Chapter 10 MonitorISG50 User’s Guide213The whole VPN connection or policy name has to match if you do not use a question mark or asterisk. 10.12 SIP
Chapter 10 MonitorISG50 User’s Guide21410.13 FXS Peer ScreenThis screen displays information about the ISG50’s FXS extensions. Click Monitor > PBX
Chapter 10 MonitorISG50 User’s Guide21510.14 SIP Trunk ScreenThis screen displays status information about external connections to other SIP servers
Chapter 10 MonitorISG50 User’s Guide21610.15 CTI Peer ScreenThis screen displays status information about the ISG50’s Computer Telephony Integration
Chapter 10 MonitorISG50 User’s Guide21710.16 FXO Trunk ScreenThis screen displays status information about external connections via FXO interfaces.
Chapter 10 MonitorISG50 User’s Guide21810.17 BRI Trunk ScreenThis screen displays status information about external connections via BRI interfaces. C
Chapter 10 MonitorISG50 User’s Guide21910.18 ACD Queue Screen Use this screen to monitor phone call activity for Automatic Call Distribution (ACD) a
Table of ContentsISG50 User’s Guide2252.8.4 Configuring SSH ...
Chapter 10 MonitorISG50 User’s Guide22010.19 Log ScreenLog messages are stored in two separate logs, one for regular log messages and one for debuggi
Chapter 10 MonitorISG50 User’s Guide221The following table describes the labels in this screen. Table 53 Monitor > LogLABEL DESCRIPTIONShow Filt
Chapter 10 MonitorISG50 User’s Guide222The Web Configurator saves the filter settings if you leave the View Log screen and return to it later.10.20 Q
Chapter 10 MonitorISG50 User’s Guide22310.20.1 Call Recordings File ListThis screen lists the call recordings that matched your specified criteria.
Chapter 10 MonitorISG50 User’s Guide224Backup Now Click the Backup Now button to save a CDR backup file on the ISG50.RemoveIf you no longer want to st
Chapter 10 MonitorISG50 User’s Guide22510.22 CDR Query Screen Use this screen to search for call records on the ISG50. Click Monitor > Log > C
Chapter 10 MonitorISG50 User’s Guide226Call Time Call time is the time from when a caller finishes dialing a number until one of the parties hangs up.
Chapter 10 MonitorISG50 User’s Guide22710.23 CDR Query Result Screen This screen displays the results of your search for call records on the ISG50.
Chapter 10 MonitorISG50 User’s Guide228
ISG50 User’s Guide 229CHAPTER 11Registration11.1 OverviewUse the Configuration > Licensing > Registration screens to register your ISG50 and
Table of ContentsISG50 User’s Guide2356.1 Overview ...
Chapter 11 RegistrationISG50 User’s Guide23011.2 The Registration ScreenUse this screen to register your ISG50 with myZyXEL.com and activate a servic
Chapter 11 RegistrationISG50 User’s Guide231Note: If the ISG50 is registered already, this screen is read-only and indicates whether trial services a
Chapter 11 RegistrationISG50 User’s Guide232(license key) in this screen. Click Configuration > Licensing > Registration > Service to open th
ISG50 User’s Guide 233CHAPTER 12Interfaces12.1 Interface OverviewUse the Interface screens to configure the ISG50’s interfaces. You can also create
Chapter 12 InterfacesISG50 User’s Guide234• Many interfaces can share the same physical port.• An interface belongs to at most one zone.• Many interfa
Chapter 12 InterfacesISG50 User’s Guide235 - * The format of interface names other than the Ethernet and ppp interface names is strict. Each name co
Chapter 12 InterfacesISG50 User’s Guide23612.2 Port Role To access this screen, click Configuration > Network > Interface > Port Role. Use t
Chapter 12 InterfacesISG50 User’s Guide23712.3 Ethernet Summary ScreenThis screen lists every Ethernet interface and virtual interface created on to
Chapter 12 InterfacesISG50 User’s Guide238Each field is described in the following table. 12.3.1 Ethernet Edit The Ethernet Edit screen lets you con
Chapter 12 InterfacesISG50 User’s Guide239With OSPF, you can use Ethernet interfaces to do the following things.• Enable and disable OSPF in the unde
Table of ContentsISG50 User’s Guide2461.1 Resetting the ISG50 ...
Chapter 12 InterfacesISG50 User’s Guide240Figure 172 Configuration > Network > Interface > Ethernet > Edit (WAN)
Chapter 12 InterfacesISG50 User’s Guide241Figure 173 Configuration > Network > Interface > Ethernet > Edit (DMZ)
Chapter 12 InterfacesISG50 User’s Guide242This screen’s fields are described in the table below. Table 65 Configuration > Network > Inter
Chapter 12 InterfacesISG50 User’s Guide243MTU Maximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can move through t
Chapter 12 InterfacesISG50 User’s Guide244Pool Size Enter the number of IP addresses to allocate. This number must be at least one and is limited by t
Chapter 12 InterfacesISG50 User’s Guide245Send Version This field is effective when RIP is enabled. Select the RIP version(s) used for sending RIP pa
Chapter 12 InterfacesISG50 User’s Guide24612.3.2 Object ReferencesWhen a configuration screen includes an Object References icon, select a configurat
Chapter 12 InterfacesISG50 User’s Guide247Figure 175 Example: PPPoE/PPTP InterfacesPPPoE/PPTP interfaces are similar to other interfaces in some wa
Chapter 12 InterfacesISG50 User’s Guide248Each field is described in the table below.12.4.2 PPP Interface Add or Edit Note: You have to set up an ISP
Chapter 12 InterfacesISG50 User’s Guide249Figure 177 Configuration > Network > Interface > PPP > Add Each field is explained in the f
25PART IUser’s Guide
Chapter 12 InterfacesISG50 User’s Guide250Enable Interface Select this to enable this interface. Clear this to disable this interface.Interface Proper
Chapter 12 InterfacesISG50 User’s Guide25112.5 Cellular Configuration Screen (3G)3G (Third Generation) is a digital, packet-switched wireless techno
Chapter 12 InterfacesISG50 User’s Guide252• You can set the 3G device to connect only to the home network, which is the network to which you are origi
Chapter 12 InterfacesISG50 User’s Guide253Figure 178 Configuration > Network > Interface > Cellular The following table describes the la
Chapter 12 InterfacesISG50 User’s Guide254Figure 179 Configuration > Network > Interface > Cellular > Add
Chapter 12 InterfacesISG50 User’s Guide255The following table describes the labels in this screen.Table 71 Configuration > Network > Interfac
Chapter 12 InterfacesISG50 User’s Guide256User Name This field displays when you select an authentication type other than None. This field is read-onl
Chapter 12 InterfacesISG50 User’s Guide257Check Fail ToleranceEnter the number of consecutive failures before the ISG50 stops routing through the gat
Chapter 12 InterfacesISG50 User’s Guide258Network SelectionHome network is the network to which you are originally subscribed. Select Home to have the
Chapter 12 InterfacesISG50 User’s Guide25912.6 VLAN Interfaces A Virtual Local Area Network (VLAN) divides a physical network into multiple logical
26
Chapter 12 InterfacesISG50 User’s Guide260Figure 181 Example: After VLANEach VLAN is a separate network with separate IP addresses, subnet masks, an
Chapter 12 InterfacesISG50 User’s Guide261Note: Each VLAN interface is created on top of only one Ethernet interface.Otherwise, VLAN interfaces are s
Chapter 12 InterfacesISG50 User’s Guide26212.6.2 VLAN Add/Edit This screen lets you configure IP address assignment, interface bandwidth parameters,
Chapter 12 InterfacesISG50 User’s Guide263Figure 183 Configuration > Network > Interface > VLAN > Edit
Chapter 12 InterfacesISG50 User’s Guide264Each field is explained in the following table. Table 73 Configuration > Network > Interface > VL
Chapter 12 InterfacesISG50 User’s Guide265Connectivity Check The ISG50 can regularly check the connection to the gateway you specified to make sure i
Chapter 12 InterfacesISG50 User’s Guide266Pool Size Enter the number of IP addresses to allocate. This number must be at least one and is limited by t
Chapter 12 InterfacesISG50 User’s Guide26712.7 Bridge Interfaces This section introduces bridges and bridge interfaces and then explains the screens
Chapter 12 InterfacesISG50 User’s Guide268Bridge OverviewA bridge creates a connection between two or more network segments at the layer-2 (MAC addres
Chapter 12 InterfacesISG50 User’s Guide269• Zero or one VLAN interfaces (and any associated virtual VLAN interfaces)• Any number of Ethernet interfac
ISG50 User’s Guide 27CHAPTER 1Introducing the ISG50This chapter gives an overview of the ISG50. It explains the front panel ports, LEDs, introduces
Chapter 12 InterfacesISG50 User’s Guide27012.7.2 Bridge Add/Edit This screen lets you configure IP address assignment, interface bandwidth parameters
Chapter 12 InterfacesISG50 User’s Guide271Figure 185 Configuration > Network > Interface > Bridge > Add
Chapter 12 InterfacesISG50 User’s Guide272Each field is described in the table below.Table 78 Configuration > Network > Interface > Bridge
Chapter 12 InterfacesISG50 User’s Guide273Interface ParametersEgress BandwidthEnter the maximum amount of traffic, in kilobits per second, the ISG50
Chapter 12 InterfacesISG50 User’s Guide274Lease time Specify how long each computer can use the information (especially the IP address) before it has
Chapter 12 InterfacesISG50 User’s Guide27512.7.3 Virtual Interfaces Add/EditThis screen lets you configure IP address assignment and interface param
Chapter 12 InterfacesISG50 User’s Guide27612.8 Interface Technical ReferenceHere is more detailed information about interfaces on the ISG50.IP Addres
Chapter 12 InterfacesISG50 User’s Guide277In the example above, if the ISG50 gets a packet with a destination address of 5.5.5.5, it might not find a
Chapter 12 InterfacesISG50 User’s Guide278In the ISG50, some interfaces can provide DHCP services to the network. In this case, the interface can be a
Chapter 12 InterfacesISG50 User’s Guide279PPPoE/PPTP OverviewPoint-to-Point Protocol over Ethernet (PPPoE, RFC 2516) and Point-to-Point Tunneling Pro
Chapter 1 Introducing the ISG50ISG50 User’s Guide28company can call each other by dialing extensions. Calls to the outside world go through the IP PBX
Chapter 12 InterfacesISG50 User’s Guide280
ISG50 User’s Guide 281CHAPTER 13Trunks13.1 OverviewUse trunks for WAN traffic load balancing to increase overall network throughput and reliability
Chapter 13 TrunksISG50 User’s Guide282• You can define multiple trunks for the same physical interfaces. Link StickingYou can have the ISG50 send each
Chapter 13 TrunksISG50 User’s Guide283Least Load First The least load first algorithm uses the current (or recent) outbound bandwidth utilization of
Chapter 13 TrunksISG50 User’s Guide284the weight of wan1 and wan2 to 2 and 1 respectively. The ISG50 assigns the traffic of two sessions to wan1 for e
Chapter 13 TrunksISG50 User’s Guide28513.2 The Trunk Summary ScreenClick Configuration > Network > Interface > Trunk to open the Trunk scre
Chapter 13 TrunksISG50 User’s Guide286The following table describes the items in this screen. Table 84 Configuration > Network > Interface >
Chapter 13 TrunksISG50 User’s Guide28713.3 Configuring a Trunk Click Configuration > Network > Interface > Trunk and then the Add (or Edit)
Chapter 13 TrunksISG50 User’s Guide28813.4 Trunk Technical ReferenceRound Robin Load Balancing AlgorithmRound Robin scheduling services queues on a r
ISG50 User’s Guide 289CHAPTER 14Policy and Static Routes14.1 Policy and Static Routes OverviewUse policy routes and static routes to override the I
Chapter 1 Introducing the ISG50ISG50 User’s Guide291.1.3.1 All-in-oneUse the ISG50 to provide VoIP and security services. Figure 2 All-in-one Appl
Chapter 14 Policy and Static RoutesISG50 User’s Guide29014.1.2 What You Need to Know Policy RoutingTraditionally, routing is based on the destinatio
Chapter 14 Policy and Static RoutesISG50 User’s Guide291DiffServ (Differentiated Services) is a class of service (CoS) model that marks packets so th
Chapter 14 Policy and Static RoutesISG50 User’s Guide292Note: Policy routes do not apply to the routing of PBX traffic. Figure 195 Configuration >
Chapter 14 Policy and Static RoutesISG50 User’s Guide293Incoming This is the interface on which the packets are received.Source This is the name of
Chapter 14 Policy and Static RoutesISG50 User’s Guide29414.2.1 Policy Route Edit ScreenClick Configuration > Network > Routing to open the Poli
Chapter 14 Policy and Static RoutesISG50 User’s Guide295Incoming Select where the packets are coming from; any, an interface, a tunnel, or the ISG50
Chapter 14 Policy and Static RoutesISG50 User’s Guide296Interface This field displays when you select Interface in the Type field. Select an interface
Chapter 14 Policy and Static RoutesISG50 User’s Guide29714.3 IP Static Route ScreenClick Configuration > Network > Routing > Static Route t
Chapter 14 Policy and Static RoutesISG50 User’s Guide298The following table describes the labels in this screen. 14.3.1 Static Route Add/Edit ScreenS
Chapter 14 Policy and Static RoutesISG50 User’s Guide29914.4 Policy Routing Technical ReferenceHere is more detailed information about some of the f
Contents OverviewISG50 User’s Guide3Contents OverviewUser’s Guide ...
Chapter 1 Introducing the ISG50ISG50 User’s Guide30provides the VoIP services listed in the previous scenario, and the USG provides the security servi
Chapter 14 Policy and Static RoutesISG50 User’s Guide300to connect to the remote server without manually configuring a port forwarding rule for each c
Chapter 14 Policy and Static RoutesISG50 User’s Guide301When multiple policy routes require more bandwidth, the ISG50 gives the highest priority poli
ISG50 User’s Guide 302CHAPTER 15Routing Protocols15.1 Routing Protocols OverviewRouting protocols give the ISG50 routing information about the netw
Chapter 15 Routing ProtocolsISG50 User’s Guide303protocols, it uses hop count to decide which route is the shortest. Unfortunately, it also broadcast
Chapter 15 Routing ProtocolsISG50 User’s Guide30415.3 The OSPF ScreenOSPF (Open Shortest Path First, RFC 2328) is a link-state protocol designed to d
Chapter 15 Routing ProtocolsISG50 User’s Guide305• The backbone is the transit area that routes packets between other areas. All other areas are conn
Chapter 15 Routing ProtocolsISG50 User’s Guide306• An Area Border Router (ABR) connects two or more areas. It is a member of all the areas to which it
Chapter 15 Routing ProtocolsISG50 User’s Guide307Virtual LinksIn some OSPF AS, it is not possible for an area to be directly connected to the backbon
Chapter 15 Routing ProtocolsISG50 User’s Guide308Click Configuration > Network > Routing > OSPF to open the following screen.Figure 204 Con
Chapter 15 Routing ProtocolsISG50 User’s Guide30915.3.2 OSPF Area Add/Edit Screen The OSPF Area Add/Edit screen allows you to create a new area or e
Chapter 1 Introducing the ISG50ISG50 User’s Guide311.1.3.4 N-site In addition to one of the application scenarios already described, you can also us
Chapter 15 Routing ProtocolsISG50 User’s Guide310The following table describes the labels in this screen. Table 95 Configuration > Network >
Chapter 15 Routing ProtocolsISG50 User’s Guide31115.3.3 Virtual Link Add/Edit Screen The Virtual Link Add/Edit screen allows you to create a new vir
Chapter 15 Routing ProtocolsISG50 User’s Guide312Authentication TypesAuthentication is used to guarantee the integrity, but not the confidentiality, o
ISG50 User’s Guide 313CHAPTER 16Zones16.1 Zones OverviewSet up zones to configure network security and network policies in the ISG50. A zone is a g
Chapter 16 ZonesISG50 User’s Guide314Intra-zone Traffic• Intra-zone traffic is traffic between interfaces or VPN tunnels in the same zone. For example
Chapter 16 ZonesISG50 User’s Guide315The following table describes the labels in this screen. 16.3 Zone Edit The Zone Edit screen allows you to add
Chapter 16 ZonesISG50 User’s Guide316The following table describes the labels in this screen. Table 98 Network > Zone > EditLABEL DESCRIPTION
ISG50 User’s Guide 317CHAPTER 17DDNS17.1 DDNS OverviewDynamic DNS (DDNS) services let you use a domain name with a dynamic IP address.17.1.1 What
Chapter 17 DDNSISG50 User’s Guide318Finding Out MoreSee Section 6.6.8 on page 100 for related information on these screens.17.2 The DDNS ScreenThe DD
Chapter 17 DDNSISG50 User’s Guide31917.2.1 The Dynamic DNS Add/Edit ScreenThe DDNS Add/Edit screen allows you to add a domain name to the ISG50 or t
Chapter 1 Introducing the ISG50ISG50 User’s Guide32Use a #2 Phillips screwdriver to install the screws.Note: Failure to use the proper screws may dama
Chapter 17 DDNSISG50 User’s Guide320The following table describes the labels in this screen. Table 101 Configuration > Network > DDNS > Add
Chapter 17 DDNSISG50 User’s Guide321IP Address The options available in this field vary by DDNS provider.Interface -The ISG50 uses the IP address of
Chapter 17 DDNSISG50 User’s Guide322
ISG50 User’s Guide 323CHAPTER 18NAT18.1 NAT OverviewNAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a hos
Chapter 18 NATISG50 User’s Guide324•See Section 7.10.2 on page 130 for an example of how to configure NAT to allow web traffic from the WAN to a serve
Chapter 18 NATISG50 User’s Guide32518.2.1 The NAT Add/Edit ScreenThe NAT Add/Edit screen lets you create new NAT rules and edit existing ones. To op
Chapter 18 NATISG50 User’s Guide326Classification Select what kind of NAT this rule is to perform.Virtual Server - This makes computers on a private n
Chapter 18 NATISG50 User’s Guide327Port Mapping TypeUse the drop-down list box to select how many original destination ports this NAT rule supports f
Chapter 18 NATISG50 User’s Guide32818.3 NAT Technical ReferenceHere is more detailed information about NAT on the ISG50.NAT LoopbackSuppose a NAT 1:1
Chapter 18 NATISG50 User’s Guide329The LAN user’s computer then sends traffic to IP address 1.1.1.1. NAT loopback uses the IP address of the ISG50’s
Chapter 1 Introducing the ISG50ISG50 User’s Guide33Connect the frame ground before you connect any other cables or wiring.Figure 8 Frame Ground
Chapter 18 NATISG50 User’s Guide330
ISG50 User’s Guide 331CHAPTER 19HTTP Redirect19.1 OverviewHTTP redirect forwards the client’s HTTP request (except HTTP traffic destined for the IS
Chapter 19 HTTP RedirectISG50 User’s Guide332A client connects to a web proxy server each time he/she wants to access the Internet. The web proxy prov
Chapter 19 HTTP RedirectISG50 User’s Guide333Note: You can configure up to one HTTP redirect rule for each (incoming) interface.Figure 219 Configur
Chapter 19 HTTP RedirectISG50 User’s Guide334The following table describes the labels in this screen. Table 105 Network > HTTP Redirect > Edit
ISG50 User’s Guide 335CHAPTER 20ALG20.1 ALG OverviewApplication Layer Gateway (ALG) allows the following applications to operate properly through t
Chapter 20 ALGISG50 User’s Guide336The following example shows H.323 signaling (1) and audio (2) sessions between H.323 devices A and B.Figure 221 H
Chapter 20 ALGISG50 User’s Guide337address B to receive calls through public WAN IP address 2. You configure corresponding policy routes to have call
Chapter 20 ALGISG50 User’s Guide33820.2 The ALG Screen Click Configuration > Network > ALG to open the ALG screen. Use this screen to turn ALGs
Chapter 20 ALGISG50 User’s Guide33920.3 ALG Technical ReferenceHere is more detailed information about the Application Layer Gateway.ALGSome applica
Chapter 1 Introducing the ISG50ISG50 User’s Guide341.5 3G PCMCIA Card InstallationOnly insert a compatible 3G card. Slide the connector end of the ca
Chapter 20 ALGISG50 User’s Guide340RTPWhen you make a VoIP call using H.323, the RTP (Real time Transport Protocol) is used to handle voice data trans
ISG50 User’s Guide 341CHAPTER 21IP/MAC Binding21.1 IP/MAC Binding OverviewIP address to MAC address binding helps ensure that only the intended dev
Chapter 21 IP/MAC BindingISG50 User’s Guide342Interfaces Used With IP/MAC BindingIP/MAC address bindings are grouped by interface. You can use IP/MAC
Chapter 21 IP/MAC BindingISG50 User’s Guide34321.2.1 IP/MAC Binding EditClick Configuration > Network > IP/MAC Binding > Edit to open the I
Chapter 21 IP/MAC BindingISG50 User’s Guide34421.2.2 Static DHCP EditClick Configuration > Network > IP/MAC Binding > Edit to open the IP/MA
Chapter 21 IP/MAC BindingISG50 User’s Guide34521.3 IP/MAC Binding Exempt ListClick Configuration > Network > IP/MAC Binding > Exempt List t
Chapter 21 IP/MAC BindingISG50 User’s Guide346
ISG50 User’s Guide 347CHAPTER 22Authentication Policy22.1 Overview Use authentication policies to control who can access the network. You can authe
Chapter 22 Authentication PolicyISG50 User’s Guide348Click Configuration > Auth. Policy to display the screen. Figure 230 Configuration > Auth
Chapter 22 Authentication PolicyISG50 User’s Guide349The following table gives an overview of the objects you can configure. Table 111 Configurati
Chapter 1 Introducing the ISG50ISG50 User’s Guide35Web ConfiguratorThe Web Configurator allows easy ISG50 setup and management using an Internet brow
Chapter 22 Authentication PolicyISG50 User’s Guide35022.2.1 Creating/Editing an Authentication PolicyClick Configuration > Auth. Policy and then t
Chapter 22 Authentication PolicyISG50 User’s Guide351The following table gives an overview of the objects you can configure. Table 112 Configurati
Chapter 22 Authentication PolicyISG50 User’s Guide352
ISG50 User’s Guide 353CHAPTER 23Firewall23.1 OverviewUse the firewall to block or allow services that use static port numbers. The firewall can als
Chapter 23 FirewallISG50 User’s Guide35423.1.2 What You Need to KnowStateful InspectionThe ISG50 has a stateful inspection firewall. The ISG50 restri
Chapter 23 FirewallISG50 User’s Guide355You can configure a To-ISG50 firewall rule (with From Any To Device direction) for traffic from an interface
Chapter 23 FirewallISG50 User’s Guide35623.1.3 Firewall Rule Example ApplicationsSuppose that your company decides to block all of the LAN users from
Chapter 23 FirewallISG50 User’s Guide357Now you configure a LAN1 to WAN firewall rule that allows IRC traffic from the IP address of the CEO’s comput
Chapter 23 FirewallISG50 User’s Guide358The rule for the CEO must come before the rule that blocks all LAN1 to WAN IRC traffic. If the rule that block
Chapter 23 FirewallISG50 User’s Guide3595 The screen for configuring a service object opens. Configure it as follows and click OK.Figure 238 Firewa
Chapter 1 Introducing the ISG50ISG50 User’s Guide36Always use Maintenance > Shutdown > Shutdown or the shutdown command before you turn off the
Chapter 23 FirewallISG50 User’s Guide36023.2 The Firewall ScreenAsymmetrical RoutesIf an alternate gateway on the LAN has an IP address in the same s
Chapter 23 FirewallISG50 User’s Guide361• If you enable intra-zone traffic blocking (see the chapter about zones), the firewall automatically creates
Chapter 23 FirewallISG50 User’s Guide362From Zone / To ZoneThis is the direction of travel of packets. Select from which zone the packets come and to
Chapter 23 FirewallISG50 User’s Guide36323.2.2 The Firewall Add/Edit ScreenIn the Firewall screen, click the Edit or Add icon to display the Firewal
Chapter 23 FirewallISG50 User’s Guide36423.3 The Session Limit ScreenClick Configuration > Firewall > Session Limit to display the Firewall Ses
Chapter 23 FirewallISG50 User’s Guide36523.3.1 The Session Limit Add/Edit ScreenClick Configuration > Firewall > Session Limit and the Add or
Chapter 23 FirewallISG50 User’s Guide366The following table describes the labels in this screen. Table 120 Configuration > Firewall > Sessi
ISG50 User’s Guide 367CHAPTER 24IPSec VPN24.1 IPSec VPN OverviewA virtual private network (VPN) provides secure communications between sites withou
Chapter 24 IPSec VPNISG50 User’s Guide36824.1.2 What You Need to KnowAn IPSec VPN tunnel is usually established in two phases. Each phase establishes
Chapter 24 IPSec VPNISG50 User’s Guide369Application ScenariosThe ISG50’s application scenarios make it easier to configure your VPN connection setti
ISG50 User’s Guide 37CHAPTER 2Features and ApplicationsThis chapter introduces the main features and applications of the ISG50.2.1 FeaturesVoice ov
Chapter 24 IPSec VPNISG50 User’s Guide37024.1.3 Before You BeginThis section briefly explains the relationship between VPN tunnels and other features
Chapter 24 IPSec VPNISG50 User’s Guide371Each field is discussed in the following table. See Section 24.2.2 on page 377 and Section 24.2.1 on page 37
Chapter 24 IPSec VPNISG50 User’s Guide372the Add icon, you have to select a specific VPN gateway in the VPN Gateway field before the following screen
Chapter 24 IPSec VPNISG50 User’s Guide373Each field is described in the following table. Table 123 Configuration > VPN > IPSec VPN > VPN
Chapter 24 IPSec VPNISG50 User’s Guide374Policy EnforcementClear this to allow traffic with source and destination IP addresses that do not match the
Chapter 24 IPSec VPNISG50 User’s Guide375Authentication Select which hash algorithm to use to authenticate packet data in the IPSec SA. Choices are S
Chapter 24 IPSec VPNISG50 User’s Guide376Source Select the address object that represents the original source address (or select Create Object to conf
Chapter 24 IPSec VPNISG50 User’s Guide37724.2.2 The VPN Connection Add/Edit Manual Key Screen The VPN Connection Add/Edit Manual Key screen allows y
Chapter 24 IPSec VPNISG50 User’s Guide378Secure Gateway AddressType the IP address of the remote IPSec router in the IPSec SA. SPI Type a unique SPI (
Chapter 24 IPSec VPNISG50 User’s Guide37924.3 The VPN Gateway ScreenThe VPN Gateway summary screen displays the IPSec VPN gateway policies in the IS
Chapter 2 Features and ApplicationsISG50 User’s Guide38F: SIP Servers - Servers (D) located at your Internet Telephony Service Provider (ITSP) which p
Chapter 24 IPSec VPNISG50 User’s Guide380To access this screen, click Configuration > VPN > Network > IPSec VPN > VPN Gateway. The followi
Chapter 24 IPSec VPNISG50 User’s Guide38124.3.1 The VPN Gateway Add/Edit ScreenThe VPN Gateway Add/Edit screen allows you to create a new VPN gatewa
Chapter 24 IPSec VPNISG50 User’s Guide382Each field is described in the following table. Table 126 Configuration > VPN > IPSec VPN > VPN G
Chapter 24 IPSec VPNISG50 User’s Guide383Local ID Type This field is read-only if the ISG50 and remote IPSec router use certificates to identify each
Chapter 24 IPSec VPNISG50 User’s Guide384Content This field is disabled if the Peer ID Type is Any. Type the identity of the remote IPSec router durin
Chapter 24 IPSec VPNISG50 User’s Guide385# This field is a sequential value, and it is not associated with a specific proposal. The sequence of propo
Chapter 24 IPSec VPNISG50 User’s Guide38624.4 IPSec VPN Background InformationHere is some more detailed IPSec VPN background information.IKE SA Over
Chapter 24 IPSec VPNISG50 User’s Guide387IKE SA ProposalThe IKE SA proposal is used to identify the encryption algorithm, authentication algorithm, a
Chapter 24 IPSec VPNISG50 User’s Guide388Diffie-Hellman (DH) Key ExchangeThe ISG50 and the remote IPSec router use DH public-key cryptography to estab
Chapter 24 IPSec VPNISG50 User’s Guide389You have to create (and distribute) a pre-shared key. The ISG50 and remote IPSec router use it in the authen
Chapter 2 Features and ApplicationsISG50 User’s Guide39• B - Connecting several ISG50s together to manage a larger telephone network.Figure 13 Scal
Chapter 24 IPSec VPNISG50 User’s Guide390Main mode takes six steps to establish an IKE SA.Steps 1 - 2: The ISG50 sends its proposals to the remote IPS
Chapter 24 IPSec VPNISG50 User’s Guide391• Configure the NAT router to forward packets with the extra header unchanged. (See the field description fo
Chapter 24 IPSec VPNISG50 User’s Guide392Active ProtocolThe active protocol controls the format of each packet. It also specifies how much of each pac
Chapter 24 IPSec VPNISG50 User’s Guide393If you enable PFS, the ISG50 and remote IPSec router perform a DH key exchange every time an IPSec SA is est
Chapter 24 IPSec VPNISG50 User’s Guide394• Destination address in inbound packets - this translation is used if you want to forward packets (for examp
Chapter 24 IPSec VPNISG50 User’s Guide395Destination Address in Inbound Packets (Inbound Traffic, Destination NAT)You can set up this translation if
Chapter 24 IPSec VPNISG50 User’s Guide396
ISG50 User’s Guide 397CHAPTER 25Bandwidth Management25.1 OverviewBandwidth management provides a convenient way to manage the use of various servic
Chapter 25 Bandwidth ManagementISG50 User’s Guide398Connection and Packet Directions Bandwidth management looks at the connection direction, that is f
Chapter 25 Bandwidth ManagementISG50 User’s Guide399• Inbound traffic is limited to 500 kbs. The connection initiator is on the LAN1 so inbound means
Contents OverviewISG50 User’s Guide4Meet-me Conference ...
Chapter 2 Features and ApplicationsISG50 User’s Guide40Set up multiple connections to the Internet on the same port, or set up multiple connections on
Chapter 25 Bandwidth ManagementISG50 User’s Guide4001000 kbps, but the WAN is set to a maximum outgoing speed of 1000 kbps. You configure policy A for
Chapter 25 Bandwidth ManagementISG50 User’s Guide401Priority and Over Allotment of Bandwidth EffectServer A has a configured rate that equals the tot
Chapter 25 Bandwidth ManagementISG50 User’s Guide402• FTP traffic from the LAN1 to the DMZ can use more bandwidth since the interfaces support up to 1
Chapter 25 Bandwidth ManagementISG50 User’s Guide403• Enable maximize bandwidth usage so the SIP traffic can borrow unused bandwidth.Figure 263 SIP
Chapter 25 Bandwidth ManagementISG50 User’s Guide404• Disable maximize bandwidth usage since you do not want to give FTP more bandwidth. Figure 265
Chapter 25 Bandwidth ManagementISG50 User’s Guide405Click Configuration > Bandwidth Management to open the following screen.Figure 267 Configur
Chapter 25 Bandwidth ManagementISG50 User’s Guide40625.2.1 The Bandwidth Management Add/Edit ScreenThe Configuration > Bandwidth Management Add/E
Chapter 25 Bandwidth ManagementISG50 User’s Guide407Management screen (see Section 25.2 on page 404), and click either the Add icon or an Edit icon.F
Chapter 25 Bandwidth ManagementISG50 User’s Guide408DSCP Marking Set how the ISG50 handles the DSCP value of the outgoing packets that match this poli
Chapter 25 Bandwidth ManagementISG50 User’s Guide409OK Click OK to save your changes back to the ISG50.Cancel Click Cancel to exit this screen withou
Chapter 2 Features and ApplicationsISG50 User’s Guide41travelers to provide secure access to your network. You can also set up additional connections
Chapter 25 Bandwidth ManagementISG50 User’s Guide410
ISG50 User’s Guide 411CHAPTER 26ADP26.1 OverviewThis chapter introduces ADP (Anomaly Detection and Prevention), anomaly profiles and applying an AD
Chapter 26 ADPISG50 User’s Guide412Base ADP ProfilesBase ADP profiles are templates that you use to create new ADP profiles.The ISG50 comes with sever
Chapter 26 ADPISG50 User’s Guide41326.3 The Profile Summary ScreenUse this screen to:• Create a new profile using an existing base profile• Edit an
Chapter 26 ADPISG50 User’s Guide414• Delete an existing profile26.3.1 Base ProfilesThe ISG50 comes with base profiles. You use base profiles to creat
Chapter 26 ADPISG50 User’s Guide415The following table describes the fields in this screen. 26.3.3 Creating New ADP Profiles You may want to create
Chapter 26 ADPISG50 User’s Guide416Figure 272 Profiles: Traffic Anomaly
Chapter 26 ADPISG50 User’s Guide417The following table describes the fields in this screen. Table 138 Configuration > ADP > Profile > Tra
Chapter 26 ADPISG50 User’s Guide41826.3.5 Protocol Anomaly Profiles Protocol anomaly is the third screen in an ADP profile. Protocol anomaly (PA) rul
Chapter 26 ADPISG50 User’s Guide419Figure 273 Profiles: Protocol Anomaly
Chapter 2 Features and ApplicationsISG50 User’s Guide42User-Aware Access ControlSet up security policies that restrict access to sensitive information
Chapter 26 ADPISG50 User’s Guide420The following table describes the fields in this screen. Table 139 Configuration > ADP > Profile > Prot
Chapter 26 ADPISG50 User’s Guide42126.4 ADP Technical ReferenceThis section is divided into traffic anomaly background information and protocol anom
Chapter 26 ADPISG50 User’s Guide422Decoy Port ScansDecoy port scans are scans where the attacker has spoofed the source address. These are some decoy
Chapter 26 ADPISG50 User’s Guide423Flood DetectionFlood attacks saturate a network with useless data, use up all available bandwidth, and therefore m
Chapter 26 ADPISG50 User’s Guide424A SYN flood attack is when an attacker sends a series of SYN packets. Each packet causes the receiver to reply with
Chapter 26 ADPISG50 User’s Guide425HTTP Inspection and TCP/UDP/ICMP DecodersThe following table gives some information on the HTTP inspection, TCP de
Chapter 26 ADPISG50 User’s Guide426OVERSIZE-REQUEST-URI-DIRECTORY ATTACKThis rule takes a non-zero positive integer as an argument. The argument speci
Chapter 26 ADPISG50 User’s Guide427ICMP DecoderTRUNCATED-ADDRESS-HEADER ATTACKThis is when an ICMP packet is sent which has an ICMP datagram length o
Chapter 26 ADPISG50 User’s Guide428
ISG50 User’s Guide 429CHAPTER 27Global PBX Settings27.1 Overview This chapter shows you how to set up your ISG50-wide PBX settings including SIP se
ISG50 User’s Guide 43CHAPTER 3Web ConfiguratorThe ISG50 Web Configurator allows easy ISG50 setup and management using an Internet browser.3.1 Web C
Chapter 27 Global PBX SettingsISG50 User’s Guide430•Use the Peer to peer screen to set up a direct connection between two IP phones on the same subnet
Chapter 27 Global PBX SettingsISG50 User’s Guide431The ISG50 can be configured to change the priority field of IP packets for all outgoing RTP (Real
Chapter 27 Global PBX SettingsISG50 User’s Guide432See Section 13.2 on page 285 to set the WAN trunk the ISG50 uses for default traffic.Figure 278 C
Chapter 27 Global PBX SettingsISG50 User’s Guide43327.3 The Feature Code Screen Use this screen to set values for the feature codes the ISG50 suppor
Chapter 27 Global PBX SettingsISG50 User’s Guide434The following table describes the labels in this screen. Table 142 Configuration > PBX > Gl
Chapter 27 Global PBX SettingsISG50 User’s Guide43527.4 The E-Mail ScreenUse this screen to configure the mail server information through which the
Chapter 27 Global PBX SettingsISG50 User’s Guide436Click Configuration > PBX > Global > Fake IP to view the screen as shown next.Figure 281
Chapter 27 Global PBX SettingsISG50 User’s Guide437Each field is described in the following table.27.6.1 How the Peer-to-Peer SIP Connection WorksTh
Chapter 27 Global PBX SettingsISG50 User’s Guide438Note: If either phone A or B requests to use a feature specific to the ISG50, such as call parking
Chapter 27 Global PBX SettingsISG50 User’s Guide439Each field is described in the following table.27.6.3 How Local Net and Peer-to-Peer Work Togethe
Chapter 3 Web ConfiguratorISG50 User’s Guide443 Type the user name (default: “admin”) and password (default: “1234”).If your account is configured to
Chapter 27 Global PBX SettingsISG50 User’s Guide4403 However, peer-to-peer calls cannot be made between devices if one of them belongs to a subnet lis
Chapter 27 Global PBX SettingsISG50 User’s Guide441Each field is described in the following table. Table 147 Configuration > PBX > Global &g
Chapter 27 Global PBX SettingsISG50 User’s Guide44227.8 The TAPI ScreenUse this screen to enable TAPI, configure TAPI line settings on the ISG50 and
Chapter 27 Global PBX SettingsISG50 User’s Guide44327.8.1 Setting Up the TAPI Driver and Utility on Your ComputerYour computer needs to be running W
Chapter 27 Global PBX SettingsISG50 User’s Guide4441 Click Configuration > PBX > Global > TAPI. Click Download and save the file to your comp
Chapter 27 Global PBX SettingsISG50 User’s Guide4454 In the Server window, click Settings...5 Enter the ISG50’s host name and IP address. If you wan
Chapter 27 Global PBX SettingsISG50 User’s Guide4466 In the Devices window, you can view the state and channel for the TAPI lines that you can control
Chapter 27 Global PBX SettingsISG50 User’s Guide44727.9 Network Technical ReferenceThis section contains background material relevant to the Server
ISG50 User’s Guide 448CHAPTER 28Voice Interfaces28.1 Overview This chapter shows you how to configure parameters for FXO/FXS, and ISDN BRI channels
Chapter 28 Voice InterfacesISG50 User’s Guide449performance, monitoring, power transfer, and multiplexing of the channels. You must connect a TE devi
Chapter 3 Web ConfiguratorISG50 User’s Guide453.3 Web Configurator Screens OverviewFigure 19 Dashboard The Web Configurator screen is divided into
Chapter 28 Voice InterfacesISG50 User’s Guide45028.3 The FXO Screen Use this screen to configure settings related to the FXO lines configured on the
Chapter 28 Voice InterfacesISG50 User’s Guide45128.4 The BRI Screen Use this screen to configure ISDN BRI interface settings on the ISG50. Click Co
Chapter 28 Voice InterfacesISG50 User’s Guide452Type of Number Select the type for the prefix number which might be required by your telephone company
ISG50 User’s Guide 453CHAPTER 29Extension Management29.1 Overview This chapter shows you how to configure settings for managing groups of extension
Chapter 29 Extension ManagementISG50 User’s Guide454The following figure shows the ISG50’s extensions divided into three authority groups (AG1, 2 and
Chapter 29 Extension ManagementISG50 User’s Guide455make long distance calls). She enters the code number and is able to place a call over the long d
Chapter 29 Extension ManagementISG50 User’s Guide456• Each extension can be a member of only one authority group.• SIP and FXS extensions are treated
Chapter 29 Extension ManagementISG50 User’s Guide457Click-To-Talk (CTT)A Click-To-Talk (CTT) group allows visitors to your website to click an HTML l
Chapter 29 Extension ManagementISG50 User’s Guide45829.2 The Authority Group ScreenUse this screen to set up authority groups on the ISG50. To access
Chapter 29 Extension ManagementISG50 User’s Guide459Each field is described in the following table.29.2.2 The Authority Group Edit Screen Use this s
Chapter 3 Web ConfiguratorISG50 User’s Guide463.3.1.1 About Click this to display basic information about the ISG50.Figure 21 Title BarThe followin
Chapter 29 Extension ManagementISG50 User’s Guide460Note: You can use a subscription to increase the number of supported extensions. See Chapter 11 on
Chapter 29 Extension ManagementISG50 User’s Guide46129.3 Extension FeaturesYou can configure the following features on a per extension basis:Batch A
Chapter 29 Extension ManagementISG50 User’s Guide462• Call Forwarding - set up call forwarding rules for the individual extension based on the followi
Chapter 29 Extension ManagementISG50 User’s Guide46329.3.2 The Extension Call Forward Screen Use this screen to set up call forwarding and call bloc
Chapter 29 Extension ManagementISG50 User’s Guide464To access this screen, click the Call Forward tab in any of the SIP extension configuration screen
Chapter 29 Extension ManagementISG50 User’s Guide465Each field is described in the following table.Table 156 Extension Add/Edit: Call ForwardLABEL
Chapter 29 Extension ManagementISG50 User’s Guide466No Answer Forward Select Disable to turn this feature off for this extension.Select Enable to forw
Chapter 29 Extension ManagementISG50 User’s Guide46729.3.3 The Extension Voice Mail Settings Screen Use this screen to configure voice mail settings
Chapter 29 Extension ManagementISG50 User’s Guide46829.3.4 The Extension Advanced Screen Use this screen to configure advanced settings for this exte
Chapter 29 Extension ManagementISG50 User’s Guide46929.3.5 The Batch Add SIP Screen Use this screen to configure a range of extensions for IP phones
Chapter 3 Web ConfiguratorISG50 User’s Guide47drag it to resize them. The following sections introduce the ISG50’s navigation panel menus and their
Chapter 29 Extension ManagementISG50 User’s Guide470Each field is described in the following table.Table 159 Batch Add SIP ExtensionsLABEL DESCRIPTI
Chapter 29 Extension ManagementISG50 User’s Guide47129.4 The Group Access Code ScreenUse this screen to manage the access codes for authority groups
Chapter 29 Extension ManagementISG50 User’s Guide47229.5 The Click To Talk Group ScreenThis screen allows you to set up CTT groups and their associat
Chapter 29 Extension ManagementISG50 User’s Guide473Click the Add or Edit icon in the Click To Talk Group screen to display the options as shown next
Chapter 29 Extension ManagementISG50 User’s Guide47429.5.1.1 Sample HTML for a Click-To-Talk ExtensionThis is the basic JavaScript and HTML code used
Chapter 29 Extension ManagementISG50 User’s Guide47529.6 Authority Group Technical ReferenceThis section contains technical background information a
Chapter 29 Extension ManagementISG50 User’s Guide476into video signals. Although the ISG50 does not perform any video coding, it does support the pass
ISG50 User’s Guide 477CHAPTER 30Outbound Trunk Group30.1 Overview This covers you how to manage outside lines on the ISG50. The following diagram s
Chapter 30 Outbound Trunk GroupISG50 User’s Guide478•Use the LCR screens (starting in Section 31.2 on page 505) to configure the Configure Least Cost
Chapter 30 Outbound Trunk GroupISG50 User’s Guide479AA (Auto Attendant)After calling the number, the caller is prompted to dial the extension number.
Chapter 3 Web ConfiguratorISG50 User’s Guide483.3.2.3 Configuration MenuUse the configuration menu screens to configure the ISG50’s features. BRI Tru
Chapter 30 Outbound Trunk GroupISG50 User’s Guide480This example also shows three call examples. A - When an outsider calls 555-123457, the call is ma
Chapter 30 Outbound Trunk GroupISG50 User’s Guide48130.1.3 Before You BeginBefore you start to configure an outbound line group, please consider the
Chapter 30 Outbound Trunk GroupISG50 User’s Guide482Each field is described in the following table.Table 165 Outbound Line Management > Outbound
Chapter 30 Outbound Trunk GroupISG50 User’s Guide48330.2.1 SIP Trunk Add/Edit Use this screen to configure a SIP trunk. Click the Add or Edit icon i
Chapter 30 Outbound Trunk GroupISG50 User’s Guide484Each field is described in the following table.Table 166 SIP Trunk Add/EditLABEL DESCRIPTIONTrun
Chapter 30 Outbound Trunk GroupISG50 User’s Guide485Minimum SE Enter the minimum session expiry time in seconds. The allowable range is 90~1800 secon
Chapter 30 Outbound Trunk GroupISG50 User’s Guide48630.2.2 SIP Auto Attendant and DDI Setup Use this screen to select which auto-attendant should be
Chapter 30 Outbound Trunk GroupISG50 User’s Guide487your DID (Direct Inward Dialing) settings. In the the Outbound Trunk Group configuration screen,
Chapter 30 Outbound Trunk GroupISG50 User’s Guide48830.2.3 Add DDI/DID NumberUse this screen to add a DDI/DID number for an auto attendant to allow o
Chapter 30 Outbound Trunk GroupISG50 User’s Guide489Each field is described in the following table.Table 168 Add DDI/DID NumberLABEL DESCRIPTIONDDI
Chapter 3 Web ConfiguratorISG50 User’s Guide49VPNIPSec VPN VPN Connection Configure IPSec tunnels.VPN Gateway Configure IKE tunnels.BWM Control bandw
Chapter 30 Outbound Trunk GroupISG50 User’s Guide49030.2.4 Trusted Peer Trunk Add/Edit Use this screen to configure a trusted peer trunk. Click the A
Chapter 30 Outbound Trunk GroupISG50 User’s Guide491Each field is described in the following table.Table 169 Trusted Peer Trunk Add/Edit LABEL DESC
Chapter 30 Outbound Trunk GroupISG50 User’s Guide492CallerID Setting Configure this section to change the format of identification you want to send wh
Chapter 30 Outbound Trunk GroupISG50 User’s Guide49330.2.5 Trusted Peer Auto Attendant and DDI SetupUse this screen to select which auto-attendant s
Chapter 30 Outbound Trunk GroupISG50 User’s Guide494DID (Direct Inward Dialing) settings. In the the Outbound Trunk Group configuration screen, select
Chapter 30 Outbound Trunk GroupISG50 User’s Guide49530.2.6 Add/Edit FXO Trunk The screens for editing or adding FXO trunks on the ISG50 contain the
Chapter 30 Outbound Trunk GroupISG50 User’s Guide496Each field is described in the following table.30.2.7 FXO or BRI Auto Attendant Use this screen t
Chapter 30 Outbound Trunk GroupISG50 User’s Guide497Each field is described in the following table.30.2.8 Add/Edit BRI Trunk Use this screen to conf
Chapter 30 Outbound Trunk GroupISG50 User’s Guide498Settings section of the Outbound Trunk Group configuration screen to view the screen as shown. Fig
Chapter 30 Outbound Trunk GroupISG50 User’s Guide499Figure 321 BRI Trunk - Add/Edit: DDI/DID
Table of ContentsISG50 User’s Guide5Table of ContentsContents Overview ...
Chapter 3 Web ConfiguratorISG50 User’s Guide50Call Service Auto Callback Automatically call an extension once it becomes available (ends an existing c
Chapter 30 Outbound Trunk GroupISG50 User’s Guide500Figure 322 BRI Trunk - Add/Edit: DirectEach field is described in the following table.Table 173
Chapter 30 Outbound Trunk GroupISG50 User’s Guide501Available InterfaceFor DDI/DID, AA, and Direct, this list displays the available slots and ports
Chapter 30 Outbound Trunk GroupISG50 User’s Guide50230.2.9 Add BRI Trunk DDI/DID Mapping Use this screen to add or edit DDI/DID mapping table entries
ISG50 User’s Guide 503CHAPTER 31Auto-attendant31.1 OverviewThis chapter shows you how to configure auto-attendant on the ISG50. An auto-attendant i
Chapter 31 Auto-attendantISG50 User’s Guide504Default Auto-Attendant StructureThe ISG50 comes with a default auto-attendant. The default auto-attendan
Chapter 31 Auto-attendantISG50 User’s Guide505• Direct a call to an extension. “Dial 1 to reach the operator.”• Direct a caller to the next menu. “Di
Chapter 31 Auto-attendantISG50 User’s Guide506Click Configuration > PBX > Outbound Line Management > Auto-Attendant to view the screen as sho
Chapter 31 Auto-attendantISG50 User’s Guide50731.3 The Customized Auto-Attendant ScreenUse this screen to view, add, edit or delete auto-attendants
Chapter 31 Auto-attendantISG50 User’s Guide50831.3.1 The Add/Edit Auto-Attendant ScreenUse this screen to add or edit an auto-attendant. To access th
Chapter 31 Auto-attendantISG50 User’s Guide50931.3.2 Auto Attendant Settings: Office Hours Use this screen to edit auto-attendant office hour settin
Chapter 3 Web ConfiguratorISG50 User’s Guide51Address Address Create and manage host, range, and network (subnet) addresses.Address Group Create and
Chapter 31 Auto-attendantISG50 User’s Guide510Auto-Attendant Audio FilesYou can record your own custom auto-attendant messages. The audio files you re
Chapter 31 Auto-attendantISG50 User’s Guide51131.3.3 The Add/Edit Auto-Attendant Option Screen Use this screen to configure an option for an auto-at
Chapter 31 Auto-attendantISG50 User’s Guide51231.3.4 The Auto-Attendant Sub Menu Screen Use this screen to configure an option for an auto-attendant
Chapter 31 Auto-attendantISG50 User’s Guide51331.3.5 Auto Attendant Settings: Night ServiceUse this screen to configure Night Service settings for t
Chapter 31 Auto-attendantISG50 User’s Guide51431.3.5.1 The Add/Edit Night Service Auto-Attendant ScreenThe Add/Edit Night Service Auto-Attendant scre
Chapter 31 Auto-attendantISG50 User’s Guide51531.3.6 GreetingUse this screen to set up custom auto-attendant messages. The Temporary Greeting can be
Chapter 31 Auto-attendantISG50 User’s Guide516Each field is described in the following table.31.4 Technical ReferenceThe following section contains a
Chapter 31 Auto-attendantISG50 User’s Guide517Note: Make sure you have a microphone connected to your computer or that your system has an internal mi
Chapter 31 Auto-attendantISG50 User’s Guide5184 Specify the file format. In the Sound Selection window. Choose PCM in the Format field. Next, set the
ISG50 User’s Guide 519CHAPTER 32LCR32.1 OverviewThis chapter shows you how to configure dialing rules, also referred to as LCR (Least Cost Routing)
Chapter 3 Web ConfiguratorISG50 User’s Guide523.3.2.4 Maintenance MenuUse the maintenance menu screens to manage configuration and firmware files, ru
Chapter 32 LCRISG50 User’s Guide520only has LCR1 assigned to it, so extensions that are part of Research cannot use outbound line group ITSP.Figure 34
Chapter 32 LCRISG50 User’s Guide521• You have to define your outbound dialing plan. For example, dial a number starting with “0” is for local calls,
Chapter 32 LCRISG50 User’s Guide522Note: Only the Add LCR screen is shown. In the Edit LCR screen, some of the fields are read-only. Before you config
Chapter 32 LCRISG50 User’s Guide52332.2.2 Add/Edit LCR Dial Condition Use this screen to set up a dialing condition for an LCR. To access this scree
Chapter 32 LCRISG50 User’s Guide524Note: Only the Add Dial Condition screen is shown. In the Edit Dial Condition screen, some of the fields are read-o
Chapter 32 LCRISG50 User’s Guide525Prefix Specify a number which should be inserted at the beginning of the dialed number before it is sent out from
ISG50 User’s Guide 526CHAPTER 33Group Management33.1 Overview This chapter shows you how to manage the ISG50’s authority groups and outbound line g
Chapter 33 Group ManagementISG50 User’s Guide52733.1.1 What You Can Do in this ChapterUse the Group Management screens to view and manage the associ
Chapter 33 Group ManagementISG50 User’s Guide528and LCR2 (this could be an LCR for long distance calls via your VoIP service provider ITSP). AG2 is as
Chapter 33 Group ManagementISG50 User’s Guide529Note: You must also configure auto-attendant settings before calls coming in from outside lines can c
Chapter 3 Web ConfiguratorISG50 User’s Guide533.3.3.2 Site MapClick Site MAP to see an overview of links to the Web Configurator screens. Click a sc
Chapter 33 Group ManagementISG50 User’s Guide53033.1.3 Before You BeginBefore you start to configure a group management, you need to do the following
Chapter 33 Group ManagementISG50 User’s Guide53133.2.1 Edit Group Management Associations Use this screen to configure links from an authority group
ISG50 User’s Guide 532CHAPTER 34Call Services34.1 Overview This chapter shows you how to configure and use call services on the ISG50. There are a
Chapter 34 Call ServicesISG50 User’s Guide533made from VoIP accounts to emergency dispatchers, but also provide information on the call’s originating
Chapter 34 Call ServicesISG50 User’s Guide534The following table describes the labels in this screen. 34.3 The Call Park ScreenCall parking is simila
Chapter 34 Call ServicesISG50 User’s Guide53534.3.1 Configuring the Call Park ScreenUse this screen to configure call parking on the ISG50. Click Co
Chapter 34 Call ServicesISG50 User’s Guide53634.4 The Call Waiting ScreenCall waiting allows you to put a present call on hold and answer a new call.
Chapter 34 Call ServicesISG50 User’s Guide537However, for extensions for which you do not enable the call waiting feature, the following happens.Figu
Chapter 34 Call ServicesISG50 User’s Guide538The following table describes the labels in this screen. 34.5 The Emergency Call Screen The ISG50 allows
Chapter 34 Call ServicesISG50 User’s Guide539The following table describes the labels in this screen. 34.6 The Music on Hold Screen The ISG50 allows
Chapter 3 Web ConfiguratorISG50 User’s Guide54The fields vary with the type of object. The following table describes labels that can appear in this sc
Chapter 34 Call ServicesISG50 User’s Guide540Click Configuration > PBX > Call Service > Music On Hold to open the screen as shown.Figure 360
Chapter 34 Call ServicesISG50 User’s Guide54134.6.1 Add or Edit Custom Music On HoldUse this screen to create or edit a music on hold profile and up
Chapter 34 Call ServicesISG50 User’s Guide54234.7.1 Configuring the Call Transfer ScreenUse this screen to configure call transfer on the ISG50. Clic
Chapter 34 Call ServicesISG50 User’s Guide543Each field is described in the following table.Table 198 Configuration > PBX > Call Service >
ISG50 User’s Guide 544CHAPTER 35Call Recording35.1 OverviewUse the call recording feature to record all the calls going to or from specific extensi
Chapter 35 Call RecordingISG50 User’s Guide545• The maximum call recording time depends on the storage capacity of the connected USB storage device.•
Chapter 35 Call RecordingISG50 User’s Guide546The following table describes the labels in this screen. Table 199 Configuration > PBX > Call Re
ISG50 User’s Guide 547CHAPTER 36Meet-me ConferenceThe ISG50 allows you to set up specific extension numbers which callers can dial to join a confere
Chapter 36 Meet-me ConferenceISG50 User’s Guide548Note: The screen for editing an existing conference room has the same fields as the screen shown bel
ISG50 User’s Guide 549CHAPTER 37Paging Group37.1 Overview This chapter shows you how to create and manage paging groups on the ISG50. Paging groups
Chapter 3 Web ConfiguratorISG50 User’s Guide551 Click a column heading to sort the table’s entries according to that column’s criteria. Figure 27 S
Chapter 37 Paging GroupISG50 User’s Guide550Each field is described in the following table.37.2.1 The Add/Edit Paging Group Screen The screens for ed
Chapter 37 Paging GroupISG50 User’s Guide551Each field is described in the following table.Table 203 Add Paging GroupLABEL DESCRIPTIONPaging Number
Chapter 37 Paging GroupISG50 User’s Guide552
ISG50 User’s Guide 553CHAPTER 38ACD38.1 OverviewThis chapter shows you how to configure Automatic Call Distribution (ACD). ACD utilizes Skill-Based
Chapter 38 ACDISG50 User’s Guide554•Use the Skill Menu screen to create menus that a caller can use while in the queue waiting for an agent to respond
Chapter 38 ACDISG50 User’s Guide5551 Create at least 2 agent identities in the ACD system (Section 38.3 on page 556) to ultimately receive incoming c
Chapter 38 ACDISG50 User’s Guide55638.2 The ACD Global Screen Use this screen to set the global “wrap up” time for each extension in the ACD system.
Chapter 38 ACDISG50 User’s Guide557Each field is described in the following table.38.3.1 The Agent Settings Screen Use this screen to create or edi
Chapter 38 ACDISG50 User’s Guide55838.4 The Skill Screen This screen allows you to manage the ACD skills. It can also serve as a jumping off point f
Chapter 38 ACDISG50 User’s Guide55938.4.1 The Add/Edit Skill Screen Use this screen to create or edit a skill. A skill allows you to create rules f
Chapter 3 Web ConfiguratorISG50 User’s Guide564 Select a column heading and drag and drop it to change the column order. A green check mark displays n
Chapter 38 ACDISG50 User’s Guide560Each field is described in the following table.Table 208 Add SkillLABEL DESCRIPTIONSkill SettingNumber Enter the
Chapter 38 ACDISG50 User’s Guide561Waiting Timeout Enter the duration in seconds (up to 99999) that the call to the agents associated with the skill
Chapter 38 ACDISG50 User’s Guide56238.5 The Hunt Group ScreenUse this screen to manage hunt groups on the ISG50. To access this screen, click Configu
Chapter 38 ACDISG50 User’s Guide56338.5.1 The Add/Edit Hunt Group Screen The screens for editing or adding Hunt groups on the ISG50 contain the same
Chapter 38 ACDISG50 User’s Guide56438.6 The Skill Menu Screen This screen allows you to create menus that a caller can use while in the queue waitin
Chapter 38 ACDISG50 User’s Guide565For example, if a caller enters the queue for the “English” skill but an English-speaking sales representative has
Chapter 38 ACDISG50 User’s Guide566Click either the Add or Edit icon in the Skill Menu screen to display the options as shown next.Figure 379 Add Sk
Chapter 38 ACDISG50 User’s Guide567Click either the Add or Edit icons in the Skill Menu Add or Edit screen to display the options as shown next.Figur
ISG50 User’s Guide 568CHAPTER 39Sound FilesYou can upload sound files for different language menus. You can also 39.1 OverviewThis chapter shows yo
Chapter 39 Sound FilesISG50 User’s Guide569Click Configuration > PBX > Sound File to open this screen.Figure 381 Configuration > PBX >
Chapter 3 Web ConfiguratorISG50 User’s Guide573.3.4.3 Working with ListsWhen a list of available entries displays next to a list of selected entries
Chapter 39 Sound FilesISG50 User’s Guide570Click either the Add or Edit icon in the System Sound screen to display the options as shown next.Figure 38
Chapter 39 Sound FilesISG50 User’s Guide571Each field is described in the following table.39.3.1 The Add/Edit Sound File Screen Use this screen to
Chapter 39 Sound FilesISG50 User’s Guide572Click Configuration > PBX > Sound File > Record Peer to open this screen.Figure 385 Configuratio
ISG50 User’s Guide 573CHAPTER 40Auto Provision40.1 OverviewThis chapter shows you how to set up auto provisioning for the ISG50’s supported SIP cli
Chapter 40 Auto ProvisionISG50 User’s Guide574How to Configure Auto ProvisioningTake the following steps to configure auto provisioning for the VoIP d
Chapter 40 Auto ProvisionISG50 User’s Guide57540.2 Auto Provision SetupUse this screen to screens to configure auto provisioning for the snom VoIP d
Chapter 40 Auto ProvisionISG50 User’s Guide57640.2.1 snom Batch Configuration XML FileHere is an example of the snom batch configuration XML file. Re
Chapter 40 Auto ProvisionISG50 User’s Guide57740.2.2 Auto Provision Edit Use this screen to set up the auto provisioning settings for a snom extensi
Chapter 40 Auto ProvisionISG50 User’s Guide57840.3 Auto Provision Advanced Screen Use this screen to configure the feature key settings and firmware
Chapter 40 Auto ProvisionISG50 User’s Guide579Firmware Upgrade File Location SettingsThis list corresponds to the snom products supported by the ISG5
Chapter 3 Web ConfiguratorISG50 User’s Guide583.3.4.5 iNotesThe iNote icon is a green square with an ‘i’. Hover your cursor over the icon to display
Chapter 40 Auto ProvisionISG50 User’s Guide580
ISG50 User’s Guide 581CHAPTER 41Voice Mail41.1 Overview This chapter shows you how to set up voice mail for the ISG50’s calls. Voice mail messages
Chapter 41 Voice MailISG50 User’s Guide58241.2 The Voice Mail ScreenUse this screen to set up the voice mail settings on the ISG50. To access this sc
Chapter 41 Voice MailISG50 User’s Guide58341.3 Accessing Voice MailUsers can access their personal voice mail system by dialing the feature code for
Chapter 41 Voice MailISG50 User’s Guide584Personal Voice Mail Main FlowThe following figure describes the main flow in the personal voice mail system.
Chapter 41 Voice MailISG50 User’s Guide585Voice Message MenuThe following figure describes the Voice Message Menu. From Voice Mail Main, press number
Chapter 41 Voice MailISG50 User’s Guide586Mail Box Options MenuThe following figure describes the Mail Box Options Menu. From Voice Mail Main, press n
ISG50 User’s Guide 587CHAPTER 42Phonebook42.1 Overview This chapter shows you how to set up a phonebook for the ISG50. There are two ways to set up
Chapter 42 PhonebookISG50 User’s Guide58842.1.3 Before You BeginIf you intend to configure the ISG50 to use an LDAP phonebook, you need the following
Chapter 42 PhonebookISG50 User’s Guide58942.3 The LDAP Phonebook Summary Screen Use this screen to view the phonebook entries retrieved from the LDA
ISG50 User’s Guide 59CHAPTER 4Installation Setup Wizard4.1 Installation Setup Wizard Screens If you log into the Web Configurator when the ISG50 is
Chapter 42 PhonebookISG50 User’s Guide590the LDAP phonebook search filter. To access this screen, click Configuration > PBX > Phonebook > LDA
Chapter 42 PhonebookISG50 User’s Guide59142.5 The Local Phonebook Screen Use this screen to import or export your local phonebook and manage the ISG
Chapter 42 PhonebookISG50 User’s Guide592Each field is described in the following table.42.5.1 Local Phonebook Add/Edit Screen The screens for editin
Chapter 42 PhonebookISG50 User’s Guide593entries on the ISG50. Click the Add (or Edit) icon in the Local Phonebook screen to view the screen as shown
Chapter 42 PhonebookISG50 User’s Guide594
ISG50 User’s Guide 595CHAPTER 43Office Hours43.1 OverviewThis chapter shows you how to set the office hours for the ISG50. You can use office hours
Chapter 43 Office HoursISG50 User’s Guide596Note: The office hour configuration here is used as the default for all new extensions. To customize offic
Chapter 43 Office HoursISG50 User’s Guide597Edit Double-click an entry or select it and click Edit to modify it. Remove To remove an entry, select it
Chapter 43 Office HoursISG50 User’s Guide598
ISG50 User’s Guide 599CHAPTER 44User/Group44.1 OverviewThis chapter describes how to set up user accounts, user groups, and user settings for the I
Table of ContentsISG50 User’s Guide64.1.1 Internet Access Setup - WAN Interface ...
Chapter 4 Installation Setup WizardISG50 User’s Guide60Note: Enter the Internet access information exactly as your ISP gave it to you.Figure 36 Inte
Chapter 44 User/GroupISG50 User’s Guide600Note: The default admin account is always authenticated locally, regardless of the authentication method set
Chapter 44 User/GroupISG50 User’s Guide601User AwarenessBy default, users do not have to log into the ISG50 to use the network services it provides.
Chapter 44 User/GroupISG50 User’s Guide60244.2.1 User Add/Edit ScreenThe User Add/Edit screen allows you to create a new user account or edit an exis
Chapter 44 User/GroupISG50 User’s Guide603The following table describes the labels in this screen. Table 231 Configuration > User/Group > Us
Chapter 44 User/GroupISG50 User’s Guide60444.3 User Group Summary ScreenUser groups consist of access users and other user groups. You cannot put adm
Chapter 44 User/GroupISG50 User’s Guide60544.3.1 Group Add/Edit ScreenThe Group Add/Edit screen allows you to create a new user group or edit an exi
Chapter 44 User/GroupISG50 User’s Guide606To access this screen, login to the Web Configurator, and click Configuration > Object > User/Group &g
Chapter 44 User/GroupISG50 User’s Guide607User Type These are the kinds of user account the ISG50 supports.• admin - this user can look at and change
Chapter 44 User/GroupISG50 User’s Guide60844.4.1 Default User Authentication Timeout Settings Edit ScreensThe Default Authentication Timeout Settings
Chapter 44 User/GroupISG50 User’s Guide609The following table describes the labels in this screen. 44.4.2 User Aware Login ExampleAccess users cann
Chapter 4 Installation Setup WizardISG50 User’s Guide61Note: Enter the Internet access information exactly as given to you by your ISP.Figure 37 In
Chapter 44 User/GroupISG50 User’s Guide610The following table describes the labels in this screen. 44.5 User /Group Technical ReferenceThis section
Chapter 44 User/GroupISG50 User’s Guide611Creating a Large Number of Ext-User AccountsIf you plan to create a large number of Ext-User accounts, you
Chapter 44 User/GroupISG50 User’s Guide612
ISG50 User’s Guide 613CHAPTER 45Addresses45.1 OverviewAddress objects can represent a single IP address or a range of IP addresses. Address groups
Chapter 45 AddressesISG50 User’s Guide614The Address screen provides a summary of all addresses in the ISG50. To access this screen, click Configurati
Chapter 45 AddressesISG50 User’s Guide615The following table describes the labels in this screen. 45.3 Address Group Summary ScreenThe Address Group
Chapter 45 AddressesISG50 User’s Guide616The following table describes the labels in this screen. See Section 45.3.1 on page 616 for more information
Chapter 45 AddressesISG50 User’s Guide617Member List The Member list displays the names of the address and address group objects that have been added
Chapter 45 AddressesISG50 User’s Guide618
ISG50 User’s Guide 619CHAPTER 46Services46.1 OverviewUse service objects to define TCP applications, UDP applications, and ICMP messages. You can a
Chapter 4 Installation Setup WizardISG50 User’s Guide624.1.3 Internet Access: PPPoENote: Enter the Internet access information exactly as given to yo
Chapter 46 ServicesISG50 User’s Guide620Service Objects and Service GroupsUse service objects to define IP protocols.• TCP applications• UDP applicati
Chapter 46 ServicesISG50 User’s Guide621To access this screen, log in to the Web Configurator, and click Configuration > Object > Service >
Chapter 46 ServicesISG50 User’s Guide62246.2.1 The Service Add/Edit ScreenThe Service Add/Edit screen allows you to create a new service or edit an e
Chapter 46 ServicesISG50 User’s Guide623To access this screen, log in to the Web Configurator, and click Configuration > Object > Service >
Chapter 46 ServicesISG50 User’s Guide62446.3.1 The Service Group Add/Edit ScreenThe Service Group Add/Edit screen allows you to create a new service
ISG50 User’s Guide 625CHAPTER 47Schedules47.1 OverviewUse schedules to set up one-time and recurring schedules for policy routes and firewall rule
Chapter 47 SchedulesISG50 User’s Guide62647.2 The Schedule Summary ScreenThe Schedule summary screen provides a summary of all schedules in the ISG50
Chapter 47 SchedulesISG50 User’s Guide62747.2.1 The One-Time Schedule Add/Edit ScreenThe One-Time Schedule Add/Edit screen allows you to define a on
Chapter 47 SchedulesISG50 User’s Guide62847.2.2 The Recurring Schedule Add/Edit ScreenThe Recurring Schedule Add/Edit screen allows you to define a r
Chapter 47 SchedulesISG50 User’s Guide629StartTime Specify the hour and minute when the schedule begins each day.Hour - 0 - 23Minute - 0 - 59StopTime
Chapter 4 Installation Setup WizardISG50 User’s Guide63• First / Second DNS Server: These fields display if you selected static IP address assignment
Chapter 47 SchedulesISG50 User’s Guide630
ISG50 User’s Guide 631CHAPTER 48AAA Server48.1 Overview You can use a AAA (Authentication, Authorization, Accounting) server to provide access cont
Chapter 48 AAA ServerISG50 User’s Guide632user database that is limited to the memory capacity of the device. In essence, RADIUS authentication allows
Chapter 48 AAA ServerISG50 User’s Guide633• Directory Service (LDAP/AD) LDAP (Lightweight Directory Access Protocol)/AD (Active Directory) is a direc
Chapter 48 AAA ServerISG50 User’s Guide634Bind DN A bind DN is used to authenticate with an LDAP/AD server. For example a bind DN of cn=ISG50Admin all
Chapter 48 AAA ServerISG50 User’s Guide63548.2.1 Adding an Active Directory or LDAP ServerClick Object > AAA Server > Active Directory (or LDA
Chapter 48 AAA ServerISG50 User’s Guide63648.3 RADIUS Server SummaryUse the RADIUS screen to manage the list of RADIUS servers the ISG50 can use in a
Chapter 48 AAA ServerISG50 User’s Guide637The following table describes the labels in this screen. 48.3.1 Adding a RADIUS Server Click Configuratio
Chapter 48 AAA ServerISG50 User’s Guide638The following table describes the labels in this screen. Table 252 Configuration > Object > AAA Ser
ISG50 User’s Guide 639CHAPTER 49Authentication Method49.1 Overview Authentication method objects set how the ISG50 authenticates wireless, HTTP/HTT
Chapter 4 Installation Setup WizardISG50 User’s Guide64•Select Nailed-Up if you do not want the connection to time out. Otherwise, type the Idle Timeo
Chapter 49 Authentication MethodISG50 User’s Guide6404 Click OK to save the settings. Figure 427 Example: Using Authentication Method in VPN 49.2 A
Chapter 49 Authentication MethodISG50 User’s Guide64149.2.1 Creating an Authentication Method Object Follow the steps below to create an authenticat
Chapter 49 Authentication MethodISG50 User’s Guide642Edit Double-click an entry or select it and click Edit to open a screen where you can modify the
ISG50 User’s Guide 643CHAPTER 50Certificates50.1 OverviewThe ISG50 can use certificates (also called digital IDs) to authenticate users. Certificat
Chapter 50 CertificatesISG50 User’s Guide6445 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny’s public key to verify
Chapter 50 CertificatesISG50 User’s Guide645• Binary PKCS#12: This is a format for transferring public key and private key certificates.The private k
Chapter 50 CertificatesISG50 User’s Guide6463 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll dow
Chapter 50 CertificatesISG50 User’s Guide647The following table describes the labels in this screen. Table 255 Configuration > Object > Certi
Chapter 50 CertificatesISG50 User’s Guide64850.2.1 The My Certificates Add ScreenClick Configuration > Object > Certificate > My Certificate
Chapter 50 CertificatesISG50 User’s Guide649The following table describes the labels in this screen. Table 256 Configuration > Object > Certi
Chapter 4 Installation Setup WizardISG50 User’s Guide654.1.6 Internet Access Setup - Second WAN InterfaceIf you selected I have two ISPs, after you
Chapter 50 CertificatesISG50 User’s Guide650If you configured the My Certificate Create screen to have the ISG50 enroll a certificate and the certific
Chapter 50 CertificatesISG50 User’s Guide65150.2.2 The My Certificates Edit ScreenClick Configuration > Object > Certificate > My Certifica
Chapter 50 CertificatesISG50 User’s Guide652The following table describes the labels in this screen. Table 257 Configuration > Object > Certi
Chapter 50 CertificatesISG50 User’s Guide65350.2.3 The My Certificates Import Screen Click Configuration > Object > Certificate > My Certif
Chapter 50 CertificatesISG50 User’s Guide654The certificate you import replaces the corresponding request in the My Certificates screen.You must remov
Chapter 50 CertificatesISG50 User’s Guide655as being trustworthy; thus you do not need to import any certificate that is signed by one of these certi
Chapter 50 CertificatesISG50 User’s Guide65650.3.1 The Trusted Certificates Edit Screen Click Configuration > Object > Certificate > Trusted
Chapter 50 CertificatesISG50 User’s Guide657The following table describes the labels in this screen. Table 260 Configuration > Object > Cert
Chapter 50 CertificatesISG50 User’s Guide658Issuer This field displays identifying information about the certificate’s issuing certification authority
Chapter 50 CertificatesISG50 User’s Guide65950.3.2 The Trusted Certificates Import Screen Click Configuration > Object > Certificate > Trus
Chapter 4 Installation Setup WizardISG50 User’s Guide664.1.7 Internet Access - Finish You have set up your ISG50 to access the Internet. After config
Chapter 50 CertificatesISG50 User’s Guide660
ISG50 User’s Guide 661CHAPTER 51ISP Accounts51.1 OverviewUse ISP accounts to manage Internet Service Provider (ISP) account information for PPPoE/P
Chapter 51 ISP AccountsISG50 User’s Guide662The following table describes the labels in this screen. See the ISP Account Add/Edit section below for mo
Chapter 51 ISP AccountsISG50 User’s Guide663The following table describes the labels in this screen. Table 263 Configuration > Object > ISP
Chapter 51 ISP AccountsISG50 User’s Guide664OK Click OK to save your changes back to the ISG50. If there are no errors, the program returns to the ISP
ISG50 User’s Guide 665CHAPTER 52System52.1 OverviewUse the system screens to configure general ISG50 settings. 52.1.1 What You Can Do in this Chap
Chapter 52 SystemISG50 User’s Guide66652.2 Host NameA host name is the unique name by which a device is known on a network. Click Configuration >
Chapter 52 SystemISG50 User’s Guide667Click Configuration > System > USB Storage to open the screen as shown next.Figure 442 Configuration &g
Chapter 52 SystemISG50 User’s Guide668To change your ISG50’s time based on your local time zone and date, click Configuration > System > Date/Ti
Chapter 52 SystemISG50 User’s Guide669Get from Time ServerSelect this radio button to have the ISG50 get the time and date from the time server you s
Chapter 4 Installation Setup WizardISG50 User’s Guide67Use the Registration > Service screen to update your service subscription status.Figure 42
Chapter 52 SystemISG50 User’s Guide67052.4.1 Pre-defined NTP Time Servers ListWhen you turn on the ISG50 for the first time, the date and time start
Chapter 52 SystemISG50 User’s Guide6717 Click Apply.To get the ISG50 date and time from a time server1 Click System > Date/Time.2 Select Get from
Chapter 52 SystemISG50 User’s Guide67252.6 DNS OverviewDNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice
Chapter 52 SystemISG50 User’s Guide673The following table describes the labels in this screen. Table 269 Configuration > System > DNSLABEL D
Chapter 52 SystemISG50 User’s Guide67452.6.3 Address Record An address record contains the mapping of a Fully-Qualified Domain Name (FQDN) to an IP a
Chapter 52 SystemISG50 User’s Guide67552.6.4 PTR RecordA PTR (pointer) record is also called a reverse record or a reverse lookup record. It is a ma
Chapter 52 SystemISG50 User’s Guide67652.6.7 Adding a Domain Zone Forwarder Click the Add icon in the Domain Zone Forwarder table to add a domain zon
Chapter 52 SystemISG50 User’s Guide677be delivered to your mail server and vice versa. Each host or domain can have only one MX record, that is, one
Chapter 52 SystemISG50 User’s Guide67852.7 WWW OverviewThe following figure shows secure and insecure management of the ISG50 coming in from the WAN.
Chapter 52 SystemISG50 User’s Guide679Each user is also forced to log in the ISG50 for authentication again when the reauthentication time expires. Y
Chapter 4 Installation Setup WizardISG50 User’s Guide68• Country Code: Select your country from the drop-down box list.Figure 43 Registration: Regis
Chapter 52 SystemISG50 User’s Guide68052.7.4 Configuring WWW Service ControlClick Configuration > System > WWW to open the WWW screen. Use this
Chapter 52 SystemISG50 User’s Guide681The following table describes the labels in this screen. Table 274 Configuration > System > WWW > S
Chapter 52 SystemISG50 User’s Guide682Enable Select the check box to allow or disallow the computer with the IP address that matches the IP address(es
Chapter 52 SystemISG50 User’s Guide68352.7.5 Service Control RulesClick Add or Edit in the Service Control table in a WWW, SSH, Telnet, FTP or SNMP
Chapter 52 SystemISG50 User’s Guide684displays after an access user logs into the Web Configurator to access network services like the Internet. See C
Chapter 52 SystemISG50 User’s Guide685The following figures identify the parts you can customize in the login and access pages.Figure 455 Login Pag
Chapter 52 SystemISG50 User’s Guide686• Enter a pound sign (#) followed by the six-digit hexadecimal number that represents the desired color. For exa
Chapter 52 SystemISG50 User’s Guide68752.7.7 HTTPS ExampleIf you haven’t changed the default HTTPS port on the ISG50, then in your browser enter “ht
Chapter 52 SystemISG50 User’s Guide68852.7.7.3 Login ScreenAfter you accept the certificate, the ISG50 login screen appears. The lock displayed in th
Chapter 52 SystemISG50 User’s Guide68952.7.7.4.1 Installing the CA’s Certificate1 Double click the CA’s trusted certificate to produce a screen simi
ISG50 User’s Guide 69CHAPTER 5Quick Setup5.1 Quick Setup OverviewThe Web Configurator's quick setup wizards help you configure Internet and VP
Chapter 52 SystemISG50 User’s Guide6901 Click Next to begin the wizard.Figure 461 Personal Certificate Import Wizard 12 The file name and path of th
Chapter 52 SystemISG50 User’s Guide6913 Enter the password given to you by the CA.Figure 463 Personal Certificate Import Wizard 34 Have the wizard
Chapter 52 SystemISG50 User’s Guide6925 Click Finish to complete the wizard and begin the import process.Figure 465 Personal Certificate Import Wiza
Chapter 52 SystemISG50 User’s Guide6932 When Authenticate Client Certificates is selected on the ISG50, the following screen asks you to select a per
Chapter 52 SystemISG50 User’s Guide694following figure, computer A on the Internet uses SSH to securely connect to the WAN port of the ISG50 for a man
Chapter 52 SystemISG50 User’s Guide6953 Authentication and Data TransmissionAfter the identification is verified and data encryption activated, a sec
Chapter 52 SystemISG50 User’s Guide696The following table describes the labels in this screen. 52.8.5 Secure Telnet Using SSH ExamplesThis section s
Chapter 52 SystemISG50 User’s Guide6973 A window displays prompting you to store the host key in you computer. Click Yes to continue. Figure 473 SS
Chapter 52 SystemISG50 User’s Guide69852.9 Telnet You can use Telnet to access the ISG50’s command line interface. Specify which zones allow Telnet a
Chapter 52 SystemISG50 User’s Guide69952.10 FTP You can upload and download the ISG50’s firmware and configuration files using FTP. To use this feat
Table of ContentsISG50 User’s Guide76.5.2 NAT Table Checking Flow ...
Chapter 5 Quick SetupISG50 User’s Guide705.2 WAN Interface Quick SetupClick WAN Interface in the main Quick Setup screen to open the WAN Interface Qu
Chapter 52 SystemISG50 User’s Guide700The following table describes the labels in this screen. 52.11 SNMP Simple Network Management Protocol is a pr
Chapter 52 SystemISG50 User’s Guide701one (SNMPv1) and version two (SNMPv2c). The next figure illustrates an SNMP management operation. Figure 478
Chapter 52 SystemISG50 User’s Guide70252.11.1 Supported MIBsThe ISG50 supports MIB II that is defined in RFC-1213 and RFC-1215. The ISG50 also suppor
Chapter 52 SystemISG50 User’s Guide703The following table describes the labels in this screen. Table 281 Configuration > System > SNMPLABEL
Chapter 52 SystemISG50 User’s Guide70452.12 Language Screen Click Configuration > System > Language to open the following screen. Use this scre
ISG50 User’s Guide 705CHAPTER 53Log and Report53.1 OverviewUse these screens to configure daily reporting and log settings. 53.1.1 What You Can Do
Chapter 53 Log and ReportISG50 User’s Guide706Click Configuration > Log & Report > Email Daily Report to display the following screen. Confi
Chapter 53 Log and ReportISG50 User’s Guide707The following table describes the labels in this screen. 53.3 Log Setting Screens The Log Setting scre
Chapter 53 Log and ReportISG50 User’s Guide708server names, etc.) for any log. Alternatively, if you want to edit what events is included in each log,
Chapter 53 Log and ReportISG50 User’s Guide709Log Format This field displays the format of the log. Internal - system log; you can view the log on th
Chapter 5 Quick SetupISG50 User’s Guide715.2.2 Select WAN TypeWAN Type Selection: Select the type of encapsulation this connection is to use. Choose
Chapter 53 Log and ReportISG50 User’s Guide71053.3.2 Edit System Log Settings The Log Settings Edit screen controls the detailed settings for each lo
Chapter 53 Log and ReportISG50 User’s Guide711The following table describes the labels in this screen. Table 285 Configuration > Log & Repor
Chapter 53 Log and ReportISG50 User’s Guide712E-mail Server 2 Use the E-Mail Server 2 drop-down list to change the settings for e-mailing logs to e-ma
Chapter 53 Log and ReportISG50 User’s Guide71353.3.3 Edit Log on USB Storage Setting The Edit Log on USB Storage Setting screen controls the detaile
Chapter 53 Log and ReportISG50 User’s Guide714Selection Select what information you want to log from each Log Category (except All Logs; see below). C
Chapter 53 Log and ReportISG50 User’s Guide71553.3.4 Edit Remote Server Log Settings The Log Settings Edit screen controls the detailed settings for
Chapter 53 Log and ReportISG50 User’s Guide716The following table describes the labels in this screen. 53.3.5 Active Log Summary ScreenThe Active Lo
Chapter 53 Log and ReportISG50 User’s Guide717names).To access this screen, go to the Log Settings Summary screen (see Section 53.3.1 on page 708), a
Chapter 53 Log and ReportISG50 User’s Guide718E-mail Server 1 Use the E-Mail Server 1 drop-down list to change the settings for e-mailing logs to e-ma
Chapter 53 Log and ReportISG50 User’s Guide719Remote Server 1~4For each remote server, select what information you want to log from each Log Category
Chapter 5 Quick SetupISG50 User’s Guide725.2.3 Configure WAN SettingsUse this screen to select whether the interface should use a fixed or dynamic IP
ISG50 User’s Guide 720CHAPTER 54Call Detail Record (CDR)54.1 Overview This chapter shows you how to collect and manage Call Detail Records (CDRs) o
Chapter 54 Call Detail Record (CDR)ISG50 User’s Guide721CDR Database Management via PostgreSQLPostgreSQL is a database management system based on SQL
Chapter 54 Call Detail Record (CDR)ISG50 User’s Guide722Each field is described in the following table. 54.2.1 Configure Your Remote ServerThe proced
Chapter 54 Call Detail Record (CDR)ISG50 User’s Guide7235 Move the cdr.sql file to “PostgreSQL installed directory”/bin and change to this directory
Chapter 54 Call Detail Record (CDR)ISG50 User’s Guide724
ISG50 User’s Guide 725CHAPTER 55File Manager55.1 OverviewConfiguration files define the ISG50’s settings. Shell scripts are files of commands that
Chapter 55 File ManagerISG50 User’s Guide726 These files have the same syntax, which is also identical to the way you run CLI commands manually. An ex
Chapter 55 File ManagerISG50 User’s Guide727Line 3 in the following example exits sub command mode.Lines 1 and 3 in the following example are comment
Chapter 55 File ManagerISG50 User’s Guide728 Configuration File Flow at Restart• If there is not a startup-config.conf when you restart the ISG50 (whe
Chapter 55 File ManagerISG50 User’s Guide729The following table describes the labels in this screen. Table 291 Maintenance > File Manager >
Chapter 5 Quick SetupISG50 User’s Guide73Note: Enter the Internet access information exactly as your ISP gave it to you.Figure 49 WAN and ISP Conne
Chapter 55 File ManagerISG50 User’s Guide730Apply Use this button to have the ISG50 use a specific configuration file.Click a configuration file’s row
Chapter 55 File ManagerISG50 User’s Guide73155.3 The Firmware Package Screen Click Maintenance > File Manager > Firmware Package to open the F
Chapter 55 File ManagerISG50 User’s Guide732The firmware update can take up to five minutes. Do not turn off or reset the ISG50 while the firmware upd
Chapter 55 File ManagerISG50 User’s Guide733After five minutes, log in again and check your new firmware version in the HOME screen.If the upload was
Chapter 55 File ManagerISG50 User’s Guide734Each field is described in the following table. Table 293 Maintenance > File Manager > Shell Scri
Chapter 55 File ManagerISG50 User’s Guide735Upload Shell ScriptThe bottom part of the screen allows you to upload a new or previously saved shell scr
Chapter 55 File ManagerISG50 User’s Guide736
ISG50 User’s Guide 737CHAPTER 56Diagnostics56.1 OverviewUse the diagnostics screens for troubleshooting.56.1.1 What You Can Do in this Chapter•Use
Chapter 56 DiagnosticsISG50 User’s Guide738The following table describes the labels in this screen. 56.2.1 The Diagnostics Files ScreenClick Mainten
Chapter 56 DiagnosticsISG50 User’s Guide73956.3 The Packet Capture ScreenUse this screen to capture network traffic going through the ISG50’s interf
Chapter 5 Quick SetupISG50 User’s Guide74Retype to ConfirmType your password again for confirmation.Nailed-Up Select Nailed-Up if you do not want the
Chapter 56 DiagnosticsISG50 User’s Guide740Host Port This field is configurable when you set the IP Type to any, tcp, or udp. Specify the port number
Chapter 56 DiagnosticsISG50 User’s Guide74156.3.1 The Packet Capture Files ScreenClick Maintenance > Diagnostics > Packet Capture > Files t
Chapter 56 DiagnosticsISG50 User’s Guide74256.3.2 Example of Viewing a Packet Capture FileHere is an example of a packet capture file viewed in the W
Chapter 56 DiagnosticsISG50 User’s Guide743Click Maintenance > Diagnostics > Core Dump to open the following screen.Figure 505 Maintenance &g
Chapter 56 DiagnosticsISG50 User’s Guide744The following table describes the labels in this screen. 56.5 The System Log ScreenClick Maintenance >
ISG50 User’s Guide 745CHAPTER 57Packet Flow Explore57.1 OverviewUse this to get a clear picture on how the ISG50 determines where to forward a pack
Chapter 57 Packet Flow ExploreISG50 User’s Guide746Note: Once a packet matches the criteria of a routing rule, the ISG50 takes the corresponding actio
Chapter 57 Packet Flow ExploreISG50 User’s Guide747Figure 511 Maintenance > Packet Flow Explore > Routing Status (SitetoSite VPN)Figure 512
Chapter 57 Packet Flow ExploreISG50 User’s Guide748Figure 514 Maintenance > Packet Flow Explore > Routing Status (Default WAN Trunk)Figure 515
Chapter 57 Packet Flow ExploreISG50 User’s Guide749Metric This is the route’s priority among the displayed routes. FlagsThis indicates additional inf
Chapter 5 Quick SetupISG50 User’s Guide755.2.5 Quick Setup Interface Wizard: SummaryThis screen displays the WAN interface’s settings.Figure 50 In
Chapter 57 Packet Flow ExploreISG50 User’s Guide75057.3 The SNAT Status ScreenThe SNAT Status screen allows you to view and quickly link to specific
Chapter 57 Packet Flow ExploreISG50 User’s Guide751Note: Once a packet matches the criteria of an SNAT rule, the ISG50 takes the corresponding action
Chapter 57 Packet Flow ExploreISG50 User’s Guide752The following table describes the labels in this screen.Table 302 Maintenance > Packet Flow Ex
ISG50 User’s Guide 753CHAPTER 58Reboot58.1 OverviewUse this to restart the device (for example, if the device begins behaving erratically). See als
Chapter 58 RebootISG50 User’s Guide754
ISG50 User’s Guide 755CHAPTER 59Shutdown59.1 OverviewUse this to shutdown the device in preparation for disconnecting the power. See also Section 1
Chapter 59 ShutdownISG50 User’s Guide756
ISG50 User’s Guide 757CHAPTER 60Extension Portal60.1 OverviewUse the extension portal to make calls via the web phone and manage settings for indiv
Chapter 60 Extension PortalISG50 User’s Guide758•Use the Call Recording screen to play back calls you recorded on your extension. See Section 60.6 on
Chapter 60 Extension PortalISG50 User’s Guide75960.2 Web Phone Use this screen to make calls from the web phone. To access this screen, click the We
Chapter 5 Quick SetupISG50 User’s Guide765.3 VPN Quick SetupClick VPN Setup in the main Quick Setup screen to open the VPN Setup Wizard Welcome scree
Chapter 60 Extension PortalISG50 User’s Guide76060.3 Peer InfoUse this screen to manage the passwords associated with your extension. To access this
Chapter 60 Extension PortalISG50 User’s Guide76160.4 Call Forwarding and Blocking Use this screen to set up call forwarding and call blocking rules
Chapter 60 Extension PortalISG50 User’s Guide762Each field is described in the following table.Table 305 Forward/BlockLABEL DESCRIPTIONCall Forward
Chapter 60 Extension PortalISG50 User’s Guide76360.5 Voice Mail Settings Use this screen to set up the voice mail settings for your extension. To ac
Chapter 60 Extension PortalISG50 User’s Guide764Each field is described in the following table. 60.6 Call RecordingUse this screen to play back calls
ISG50 User’s Guide 765CHAPTER 61TroubleshootingThis chapter offers some suggestions to solve problems you might encounter. • You can also refer to t
Chapter 61 TroubleshootingISG50 User’s Guide766• If you’ve forgotten the ISG50’s IP address, you can use the commands through the console port to chec
Chapter 61 TroubleshootingISG50 User’s Guide767• The format of interface names other than the Ethernet interface names is very strict. Each name cons
Chapter 61 TroubleshootingISG50 User’s Guide768• Make sure the cellular interface has the correct user name, password, and PIN code configured with th
Chapter 61 TroubleshootingISG50 User’s Guide769• You may need to configure the DDNS entry’s IP Address setting to Auto if the interface has a dynamic
Chapter 5 Quick SetupISG50 User’s Guide775.4 VPN Setup Wizard: Wizard TypeA VPN (Virtual Private Network) tunnel is a secure connection to another c
Chapter 61 TroubleshootingISG50 User’s Guide770• The ISG50’s local and peer ID type and content must match the remote IPSec router’s peer and local ID
Chapter 61 TroubleshootingISG50 User’s Guide771The ISG50 automatically updates address objects based on an interface’s IP address, subnet, or gateway
Chapter 61 TroubleshootingISG50 User’s Guide772• Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.• PEM (
Chapter 61 TroubleshootingISG50 User’s Guide773The commands in my configuration file or shell script are not working properly.• In a configuration fi
Chapter 61 TroubleshootingISG50 User’s Guide77461.1 Resetting the ISG50If you cannot access the ISG50 by any method, try restarting it by turning the
ISG50 User’s Guide 775APPENDIX ALog DescriptionsThis appendix provides descriptions of example log messages for the ISG50. The logs do not all apply
Appendix A Log DescriptionsISG50 User’s Guide776The PBX supplemental service logs deal with supplemental service errors. The call was reject due to th
Appendix A Log DescriptionsISG50 User’s Guide777The PBX dialplan logs deal with dialplan information and errors.. Table 310 PBX Dialplan LogsLOG ME
Appendix A Log DescriptionsISG50 User’s Guide778The call from extension %s was blocked due to no caller ID.A call from the specified extenstion was b
Appendix A Log DescriptionsISG50 User’s Guide779The incoming call dials number is an invalid numberThe incoming call dialed an invalid number.The inc
Chapter 5 Quick SetupISG50 User’s Guide785.5 VPN Express Wizard - Scenario Click the Express radio button as shown in Figure 52 on page 77 to display
Appendix A Log DescriptionsISG50 User’s Guide780Mobile extension %s logon failed. The inputing PIN code is incorrect.The listed mobile extension faile
Appendix A Log DescriptionsISG50 User’s Guide781The PBX SIP logs deal with SIP information and errors. Table 311 PBX SIP LogsLOG MESSAGE DESCRIPTIO
Appendix A Log DescriptionsISG50 User’s Guide782Call rejected due to SDP issue (Got "488 Not acceptable here").There was an SDP processing e
Appendix A Log DescriptionsISG50 User’s Guide783Unknown SIP response. Response code: %d. Response method: %s. Address: %s. The ISG50 received an unkn
Appendix A Log DescriptionsISG50 User’s Guide784The PBX trunk logs deal with the SIP trunk being disconnected or recovered. The PBX DSP logs deal with
Appendix A Log DescriptionsISG50 User’s Guide785 FXO port %u is down.The listed FXO port is offline.1st %u: Port numberFXS initialization has succeed
Appendix A Log DescriptionsISG50 User’s Guide786Phonebook LDAP server Base DN is empty.The ISG50 tried to perform an automatic LDAP phonebook update a
Appendix A Log DescriptionsISG50 User’s Guide787The ZySH logs deal with internal system errors. Failed login attempt to Extension Portal due to the e
Appendix A Log DescriptionsISG50 User’s Guide788can't get reference count: %s!1st:zysh list namecan't print entry name: %s!1st:zysh entry na
Appendix A Log DescriptionsISG50 User’s Guide789Table 317 ADP LogsLOG MESSAGE DESCRIPTIONfrom <zone> to <zone> [type=<type>] <
Chapter 5 Quick SetupISG50 User’s Guide795.5.1 VPN Express Wizard - Configuration Figure 54 VPN Express Wizard: Step 3 • Secure Gateway: If Any di
Appendix A Log DescriptionsISG50 User’s Guide790Table 318 User LogsLOG MESSAGE DESCRIPTION%s %s from %s has logged in ISG50A user logged into the IS
Appendix A Log DescriptionsISG50 User’s Guide791 Failed login attempt to ISG50 from %s (reach the max. number of simultaneous logon)The ISG50 blocked
Appendix A Log DescriptionsISG50 User’s Guide792Trial service activation has failed. Because of lack must fields.The device received an incomplete res
Appendix A Log DescriptionsISG50 User’s Guide793Verify server's certificate has failed. Update stop.The device could not process an HTTPS connec
Appendix A Log DescriptionsISG50 User’s Guide794Expiration daily-check has failed:%s.The daily check for service expiration failed, an error message r
Appendix A Log DescriptionsISG50 User’s Guide795 Certification verification failed: Depth: %d, Error Number(%d):%s.Verification of a server’s certifi
Appendix A Log DescriptionsISG50 User’s Guide796[ID] : Tunnel [%s] Phase 2 Remote ID mismatch%s is the tunnel name. When negotiating Phase-2 and check
Appendix A Log DescriptionsISG50 User’s Guide797[SA] : Tunnel [%s] Phase 2 SA protocol mismatch%s is the tunnel name. When negotiating Phase-2, the S
Appendix A Log DescriptionsISG50 User’s Guide798The cookie pair is : 0x%08x%08x / 0x%08x%08xIndicates the initiator/responder cookie pair.The IPSec tu
Appendix A Log DescriptionsISG50 User’s Guide799 Tunnel [%s:%s] Sending IKE requestThe variables represent the phase 1 name and tunnel name. The de
Table of ContentsISG50 User’s Guide87.5.2 Set Up User Groups ...
Chapter 5 Quick SetupISG50 User’s Guide805.5.2 VPN Express Wizard - Summary This screen provides a read-only summary of the VPN tunnel’s configuratio
Appendix A Log DescriptionsISG50 User’s Guide800 Table 322 Firewall LogsLOG MESSAGE DESCRIPTIONpriority:%lu, from %s to %s, service %s, %s1st varia
Appendix A Log DescriptionsISG50 User’s Guide801 Table 324 Policy Route LogsLOG MESSAGE DESCRIPTIONCan't open bwm_entriesPolicy routing can&ap
Appendix A Log DescriptionsISG50 User’s Guide802 Interface %s alive, related policy route rules will be re-enabledAn interface came back up so the ISG
Appendix A Log DescriptionsISG50 User’s Guide803TELNET port has been changed to port %s.An administrator changed the port number for TELNET.%s is por
Appendix A Log DescriptionsISG50 User’s Guide804DNS access control rule %u has been appendedAn administrator appended a new rule.%u is rule numberDNS
Appendix A Log DescriptionsISG50 User’s Guide805 Access control rule %u of %s was appended.A new built-in service access control rule was appended.%u
Appendix A Log DescriptionsISG50 User’s Guide806DHCP Server executed with cautious mode enabledDHCP Server executed with cautious mode enabled.DHCP Se
Appendix A Log DescriptionsISG50 User’s Guide807NTP update failedThe device was not able to synchronize with the NTP time server successfully.Device
Appendix A Log DescriptionsISG50 User’s Guide808Update the profile %s has failed because the feature requested is only available to donators.Update pr
Appendix A Log DescriptionsISG50 User’s Guide809 DDNS profile %s has been renamed as %s.Rename DDNS profile, 1st %s is the original profile name, 2nd
Chapter 5 Quick SetupISG50 User’s Guide815.5.3 VPN Express Wizard - Finish Now you can use the VPN tunnel.Figure 56 VPN Express Wizard: Finish Not
Appendix A Log DescriptionsISG50 User’s Guide810The connectivity-check is activate for %s interfaceThe link status of interface is still activate afte
Appendix A Log DescriptionsISG50 User’s Guide811 The %s routing status seted ACTIVATE by connectivity-checkThe interface routing can forward packet.%
Appendix A Log DescriptionsISG50 User’s Guide812RIP text authentication key has been deleted.RIP text authentication key has been deleted.RIP md5 auth
Appendix A Log DescriptionsISG50 User’s Guide813 Invalid OSPF virtual-link %s authentication of area %s.Virtual-link %s authentication has been set t
Appendix A Log DescriptionsISG50 User’s Guide814 Table 330 PKI LogsLOG MESSAGE DESCRIPTIONGenerate X509certifiate "%s" successfullyThe rou
Appendix A Log DescriptionsISG50 User’s Guide815Import PKCS#7 certificate "%s" into "My Certificate" successfullyThe device impor
Appendix A Log DescriptionsISG50 User’s Guide816 Table 331 Certificate Path Verification Failure Reason CodesCODE DESCRIPTION1 Algorithm mismatch b
Appendix A Log DescriptionsISG50 User’s Guide817Interface %s has been added.An administrator added a new interface. %s: interface name.Interface %s i
Appendix A Log DescriptionsISG50 User’s Guide818Interface %s connect failed: MS-CHAP authentication failed.MS-CHAP authentication failed (the server m
Appendix A Log DescriptionsISG50 User’s Guide819"SIM card has been successfully unlocked by PUK code on interface cellular%d.You entered the cor
Chapter 5 Quick SetupISG50 User’s Guide825.5.4 VPN Advanced Wizard - Scenario Click the Advanced radio button as shown in Figure 52 on page 77 to dis
Appendix A Log DescriptionsISG50 User’s Guide820"Cellular device [%s %s] has been removed from %s.The cellular device (identified by its manufact
Appendix A Log DescriptionsISG50 User’s Guide821Configured interface name match reserved prefix.A reserved pre-fix was not permitted to be used in an
Appendix A Log DescriptionsISG50 User’s Guide822 name=%s,status=%s,TxPkts=%u,RxPkts=%u,Colli.=%u,TxB/s=%u,RxB/s=%u,UpTime=%sThis log is sent to the V
Appendix A Log DescriptionsISG50 User’s Guide823 Table 335 Force Authentication LogsLOG MESSAGE DESCRIPTIONForce User Authentication will be en
Appendix A Log DescriptionsISG50 User’s Guide824 Table 337 DHCP LogsLOG MESSAGE DESCRIPTIONCan't find any lease for this client - %s, DHCP po
Appendix A Log DescriptionsISG50 User’s Guide825Table 339 IP-MAC Binding LogsLOG MESSAGE DESCRIPTIONDrop packet %s-%u.%u.%u.%u-%02X:%02X:%02X:%02X:
Appendix A Log DescriptionsISG50 User’s Guide826
ISG50 User’s Guide 827APPENDIX BCommon ServicesThe following table lists some commonly-used services and their associated protocols and port numbers
Appendix B Common ServicesISG50 User’s Guide828HTTP TCP 80 Hyper Text Transfer Protocol - a client/server protocol for the world wide web.HTTPS TCP 44
Appendix B Common ServicesISG50 User’s Guide829SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enab
Chapter 5 Quick SetupISG50 User’s Guide835.5.5 VPN Advanced Wizard - Phase 1 Settings There are two phases to every IKE (Internet Key Exchange) nego
Appendix B Common ServicesISG50 User’s Guide830
ISG50 User’s Guide 831APPENDIX CImporting CertificatesThis appendix shows you how to import public key certificates into your web browser. Public ke
Appendix C Importing CertificatesISG50 User’s Guide8321 If your device’s Web Configurator is set to use SSL certification, then the first time you bro
Appendix C Importing CertificatesISG50 User’s Guide8334 In the Certificate dialog box, click Install Certificate.Figure 533 Internet Explorer 7: Ce
Appendix C Importing CertificatesISG50 User’s Guide8346 If you want Internet Explorer to Automatically select certificate store based on the type of c
Appendix C Importing CertificatesISG50 User’s Guide8359 In the Completing the Certificate Import Wizard screen, click Finish.Figure 538 Internet Ex
Appendix C Importing CertificatesISG50 User’s Guide83612 The next time you start Internet Explorer and go to a ZyXEL Web Configurator page, a sealed p
Appendix C Importing CertificatesISG50 User’s Guide8372 In the security warning dialog box, click Open.Figure 543 Internet Explorer 7: Open File -
Appendix C Importing CertificatesISG50 User’s Guide8382 In the Internet Options dialog box, click Content > Certificates.Figure 545 Internet Expl
Appendix C Importing CertificatesISG50 User’s Guide8394 In the Certificates confirmation, click Yes.Figure 547 Internet Explorer 7: Certificates5 I
Chapter 5 Quick SetupISG50 User’s Guide84• SA Life Time: Set how often the ISG50 renegotiates the IKE SA. A short SA life time increases security, but
Appendix C Importing CertificatesISG50 User’s Guide8402 Select Accept this certificate permanently and click OK.Figure 549 Firefox 2: Website Certif
Appendix C Importing CertificatesISG50 User’s Guide8411 Open Firefox and click Tools > Options.Figure 551 Firefox 2: Tools Menu2 In the Options
Appendix C Importing CertificatesISG50 User’s Guide8423 In the Certificate Manager dialog box, click Web Sites > Import.Figure 553 Firefox 2: Ce
Appendix C Importing CertificatesISG50 User’s Guide843Removing a Certificate in FirefoxThis section shows you how to remove a public key certificate
Appendix C Importing CertificatesISG50 User’s Guide8443 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that y
Appendix C Importing CertificatesISG50 User’s Guide8452 Click Install to accept the certificate.Figure 559 Opera 9: Certificate signer not found3 T
Appendix C Importing CertificatesISG50 User’s Guide8461 Open Opera and click Tools > Preferences.Figure 561 Opera 9: Tools Menu2 In Preferences,
Appendix C Importing CertificatesISG50 User’s Guide8473 In the Certificates Manager, click Authorities > Import.Figure 563 Opera 9: Certificate
Appendix C Importing CertificatesISG50 User’s Guide8485 In the Install authority certificate dialog box, click Install.Figure 565 Opera 9: Install
Appendix C Importing CertificatesISG50 User’s Guide8491 Open Opera and click Tools > Preferences.Figure 567 Opera 9: Tools Menu2 In Preferences,
Chapter 5 Quick SetupISG50 User’s Guide85• Perfect Forward Secrecy (PFS): Disabling PFS allows faster IPSec setup, but is less secure. Select DH1, DH
Appendix C Importing CertificatesISG50 User’s Guide8503 In the Certificates manager, select the Authorities tab, select the certificate that you want
Appendix C Importing CertificatesISG50 User’s Guide8513 Click Forever when prompted to accept the certificate.Figure 571 Konqueror 3.5: Server Auth
Appendix C Importing CertificatesISG50 User’s Guide8522 In the Certificate Import Result - Kleopatra dialog box, click OK.Figure 574 Konqueror 3.5:
Appendix C Importing CertificatesISG50 User’s Guide8531 Open Konqueror and click Settings > Configure Konqueror.Figure 576 Konqueror 3.5: Settin
Appendix C Importing CertificatesISG50 User’s Guide854
ISG50 User’s Guide 855APPENDIX DLegal InformationCopyrightCopyright © 2012 by ZyXEL Communications Corporation.The contents of this publication may
Appendix D Legal InformationISG50 User’s Guide856RegistrationRegister your product online to receive e-mail notices of firmware upgrades and informati
IndexISG50 User’s Guide 857IndexSymbolsNumbers3322 Dynamic DNS 3173DES 3873G 1093G see also cellular 251AAA 479, 497, 500AAABase DN 633Bind DN 634, 6
IndexISG50 User’s Guide858and SNMP 703and SSH 696and Telnet 699and VPN connections 370and WWW 683HOST 613RANGE 613SUBNET 613types of 613where used 103
IndexISG50 User’s Guide 859self-directory-traversal attack 426truncated-address-header 427truncated-header 426, 427truncated-options 426truncated-tim
Chapter 5 Quick SetupISG50 User’s Guide865.5.8 VPN Advanced Wizard - Finish Now you can use the VPN tunnel.Figure 61 VPN Wizard: Step 6: Advanced
IndexISG50 User’s Guide860bad-length-options attack 426bandwidth 430egress 256ingress 256bandwidth limittroubleshooting 768bandwidth managementand pol
IndexISG50 User’s Guide 861CDR 720aged file 720backup results 223executing SQL script 721external server 721local database 720management 721overview
IndexISG50 User’s Guide862text file 141configuration filetroubleshooting 773configuration files 725at restart 728backing up 727downloading 729download
IndexISG50 User’s Guide 863DiffServ 299, 430, 447DiffServ Code Pointsee DSCPdigit handling 451digital sampling 475Digital Signature Algorithm public-
IndexISG50 User’s Guide864export phonebook 588extended authenticationand VPN gateways 370IKE SA 391extension portal 757account settings 760call forwar
IndexISG50 User’s Guide 865forcing login 347Foreign Exchange Officesee FXOForeign Exchange Subscribersee FXSforwarding calls 463FQDN 674fragmenting I
IndexISG50 User’s Guide866authenticating clients 679avoiding warning messages 687example 687vs HTTP 679with Internet Explorer 687hunt group 562HyperTe
IndexISG50 User’s Guide 867PPPoE/PPTP, see also PPPoE/PPTP interfaces.prerequisites 98, 235relationships between 235static DHCP 278subnet mask 276tru
IndexISG50 User’s Guide868Perfect Forward Secrecy (PFS) 392proposal 392remote policy 391search by name 212search by policy 212Security Parameter Index
IndexISG50 User’s Guide 869search time limit 636user attributes 610Least Cost Routingsee LCRleast load first load balancing 283LED troubleshooting 76
ISG50 User’s Guide 87CHAPTER 6Configuration BasicsThis information is provided to help you configure the ISG50 effectively. Some of it is helpful wh
IndexISG50 User’s Guide870ACD queue 219BRI trunk 218call recordings 222CDR backup 223CTI peer 216FXO trunk 217FXS peer 214SA 211SIP peer 213SIP trunk
IndexISG50 User’s Guide 871addresses and address groups 613authentication method 639certificates 643for configuration 91introduction to 91schedules 6
IndexISG50 User’s Guide872adding 550, 563editing 550, 563PAP (Password Authentication Protocol) 663parking lot extension 534parking, call 532Password
IndexISG50 User’s Guide 873subnet mask 276PPPoE 279and RADIUS 279TCP port 1723 279PPPoE/PPTP interfaces 234, 246and ISP accounts 247, 661basic charac
IndexISG50 User’s Guide874reportscollecting data 201configuration overview 105daily 706daily e-mail 706specifications 203traffic statistics 200represe
IndexISG50 User’s Guide 875service groups 620and firewall 363and port triggering 297where used 103service objects 619and firewall 620and IP protocols
IndexISG50 User’s Guide876SSL 679stac compression 663starting the device 35, 36startup-config.conf 731if errors 728missing at restart 728present at re
IndexISG50 User’s Guide 877and OSPF 304and remote management 354and RIP 303and service control 678and VPN 770global rules 354see also firewall 354tok
IndexISG50 User’s Guide878UUDP 619decoder 418, 425decoy portscan 422distributed portscan 422flood attack 424messages 619port numbers 619portscan 421po
IndexISG50 User’s Guide 879Virtual Private Network, see VPNVLAN 259advantages 260and MAC address 260ID 260troubleshooting 768VLAN interfaces 234, 260
Chapter 6 Configuration BasicsISG50 User’s Guide88• FXS (Foreign Exchange Subscriber) Extension - This is an extension assigned to an analog phone dir
IndexISG50 User’s Guide880see also HTTP, HTTPS 123, 680Zzones 92, 313and firewall 354, 362and FTP 700and interfaces 92, 313and SNMP 703and SSH 696and
Chapter 6 Configuration BasicsISG50 User’s Guide89• Auto-Attendant - This is a feature which routes incoming calls to their proper extension. An auto
Table of ContentsISG50 User’s Guide98.7 Using Call Features ...
Chapter 6 Configuration BasicsISG50 User’s Guide90In the most basic setup example an organization has one authority group (with all of the company’s e
Chapter 6 Configuration BasicsISG50 User’s Guide916.2 Object-based ConfigurationThe ISG50 stores information or settings as objects. You use these o
Chapter 6 Configuration BasicsISG50 User’s Guide926.3 Zones, Interfaces, and Physical PortsZones (groups of interfaces and VPN tunnels) simplify secu
Chapter 6 Configuration BasicsISG50 User’s Guide93• Virtual interfaces increase the amount of routing information in the ISG50. There are three types
Chapter 6 Configuration BasicsISG50 User’s Guide946.4 Terminology in the ISG50This section highlights some terminology or organization for the ISG50.
Chapter 6 Configuration BasicsISG50 User’s Guide95• Automatic SNAT and WAN trunk routing for traffic going from internal to external interfaces (you
Chapter 6 Configuration BasicsISG50 User’s Guide962 Policy Routes: These are the user-configured policy routes. Configure policy routes to send packet
Chapter 6 Configuration BasicsISG50 User’s Guide971 SNAT defined in the policy routes.2 1 to 1 SNAT (including Many 1 to 1) is also included in the N
Chapter 6 Configuration BasicsISG50 User’s Guide986.6.2 Licensing RegistrationUse these screens to register your ISG50 and subscribe to services. You
Chapter 6 Configuration BasicsISG50 User’s Guide99Example: You have an FTP server connected to P6 (in the DMZ zone). You want to limit the amount of
Commentaires sur ces manuels