Label | Description |
---|---|
System Settings | |
Host Name | Enter a descriptive name to identify your Zyxel Device device. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes (-) underscores (_) and periods (.) are accepted. |
System Time | |
Current Time | This field displays the present date and time of your Zyxel Device. |
Time | Select Auto Sync to have the Zyxel Device get the time and date from the time server. The Zyxel Device requests time and date settings from the time server under the following circumstances. • When the Zyxel Device starts up. • When you click Apply after selecting Auto Sync in this screen. • 24-hour intervals after starting up. Select Manual to enter or select the time and date manually. When you enter the time and date settings manually, the Zyxel Device uses the new settings once you click Apply. |
Timezone | Select Auto Sync for the Zyxel Device to automatically get its timezone. Select Manual to choose the timezone of your location. This will set the time difference between your timezone and Greenwich Mean Time (GMT). |
Administration Settings | |
HTTP Enable | Enable to allow access to the Zyxel Device using HTTP connections. |
HTTP Port | The HTTP server listens on port 80 by default. If you change the HTTP port to a different number on the Zyxel Device, for example 8080, then you must notify people who need to access the Zyxel Device Web Configurator to use “http://Zyxel Device IP Address:8080” as the URL. If you choose a port already in use, you will see a port conflict message telling you to choose another port. ![]() |
Redirect to HTTPS | Enable this to redirect all HTTP connection requests to the HTTPS server to allow only secure Web Configurator access. |
HTTPS Enable | Enable to allow access to the Zyxel Device Web Configurator using secure HTTPS connections. |
HTTPS Port | The HTTPS server listens on port 443 by default. If you change the HTTPS port to a different number on the Zyxel Device, for example 8443, then you must notify people who need to access the Zyxel Device Web Configurator to use “https://Zyxel Device IP Address:8443” as the URL. If you choose a port already in use, you will see a port conflict message telling you to choose another port. ![]() |
Authenticate Client Certificates | Enable this to require the SSL client to authenticate itself to the Zyxel Device by sending the Zyxel Device a certificate. To do that the SSL client must have a CA-signed certificate from a CA that has been imported as a trusted CA on the Zyxel Device. |
Server Certificate | Select a certificate the HTTPS server (the Zyxel Device) uses to authenticate itself to the HTTPS client. You must have certificates already configured in the My Certificates screen. |
SSH Enable | Enable to allow access to the Zyxel Device using SSH connections. |
SSH Port | The SSH port is 22 by default. You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. If you choose a port already in use, you will see a port conflict message telling you to choose another port. ![]() |
Server Certificate | Select a certificate whose corresponding private key is to be used to identify the Zyxel Device for SSH connections. You must have certificates already configured in the My Certificates screen. |
FTP Enable | Enable to allow access to the Zyxel Device using FTP connections. |
TLS required | Enable to use FTP over TLS (Transport Layer Security) to encrypt communication. This implements TLS as a security mechanism to secure FTP clients and servers. |
FTP Port | The FTP port is 21 by default. You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. If you choose a port already in use, you will see a port conflict message telling you to choose another port. ![]() |
Server Certificate | Select a certificate whose corresponding private key is to be used to identify the Zyxel Device for FTP connections. You must have certificates already configured in the My Certificates screen. |
Display | |
Language | Select a display language for the Zyxel Device’s web configurator screens. The web configurator screens will display in the new language after you click Apply. |
User LED | The USER LED is located at the front panel of the Zyxel Device. Use this LED to check one of the following: • Admin account login status. • User IP address locked out status. • License status. • New firmware available for update. |
Event | Select how you want the USER LED to behave. • Select Admin login (green on) if you want the USER LED to be steady green when there are admin accounts logged into the Zyxel Device. • Select User Lockout (amber on) if you want the USER LED to be steady amber when a user IP address is locked out of the Zyxel Device. A user IP address will be locked out when the user has logged into the Zyxel Device unsuccessfully (for example, wrong password) for more than three times. • Select License Expired (amber on) if you want the USER LED to be steady amber when a Zyxel Device service license has expired. • Select New Firmware Available (green blinking) if you want the USER LED to blink green when there is new firmware available for upload. • Select Off to turn off the USER LED. |
Device Insight | Enable Device Insight to collect status and basic information of the clients connected to the Zyxel Device internal interfaces or IPSec VPN. |
Apply | Click Apply to save your changes to the Zyxel Device. |
Reset | Click Reset to return the screen to its last-saved settings. |
Model | heartbeat port |
---|---|
USG FLEX 200H / 200 HP | 8 |
USG FLEX 500H / 700 H | 12 |
Device HA Status | Active Zyxel Device | Passive Zyxel Device |
---|---|---|
Pairing in Progress | Green / Red Alternating | Green Steady On |
Pairing Failed | Red Blinking | Green Steady On |
Full Synch In Progress | Green Steady On | Amber Blinking |
Full Synch Complete | Green Steady On | Amber Steady On |
Running | Green Steady On | Amber Steady On |
Label | Description |
---|---|
Status | Zyxel Devices are displayed according to role with the active Zyxel Device on the left and the passive Zyxel Device on the right. The active Zyxel Device is the initial active Zyxel Device, and the passive Zyxel Device is the initial passive Zyxel Device. The active becomes passive if failover occurs. The heartbeat link shows one of the following icons: • ![]() • ![]() • ![]() |
Device HA Status | This displays if Device HA is Enabled or Disabled. |
Pairing Status | Device HA pairing occurs when Device HA is set up successfully on both Zyxel Devices. This field displays one of the following: • Pairing, indicating that Device HA is in progress • Paired, indicating that Device HA has completed successfully • Error, showing the reason that Device HA failed. |
Synchronization Status | This section displays information on feature transfer status and time after full synchronization occurs. |
Last Full Sync Status | This displays In Progress, Success, Fail or none (if Device HA is not enabled or just after the Zyxel Device reboots). |
Last Failover Time | This displays the date and time feature transfer occurred or none (if Device HA is not enabled or just after the Zyxel Device reboots). |
Failover Status | This section displays the reason for failover and the time it occurred. |
Failover Reason | This displays the reason for failover, such as Heartbeats missed, Monitor interface link down, Monitor interface connectivity check fail, Firmware upgrade, Heartbeats conflict. Heartbeats conflict may occur if both Zyxel Devices send heartbeats at the same time, for example, if both Zyxel Devices start up at the same time. |
Last Failover Time | This displays the date and time the failover occurred. |
Label | Description |
---|---|
General Settings | |
Enable Device HA | You must enable Device HA on both the active and passive Zyxel Devices. Before enabling Device HA, go to Network > Interface to configure the heartbeat link connectivity check between the initial active and initial passive Zyxel Devices. Make sure the passive Zyxel Device is offline when you enable Device HA on the active Zyxel Device. You cannot use Recovery Manager when you enable Device HA. |
Management Configuration | Management IPs allows you to manage whichever is the active Zyxel Device when Device HA is paired. You must configure management IP addresses for both the active and passive Zyxel Devices and they must have the same subnet mask. |
Initial Role | Select if this Zyxel Device is the initial active (Primary (License Controller)) or initial passive (Secondary) Zyxel Device. When you apply Device HA on the Secondary Zyxel Device, the LAN/WAN links will go down and you will be logged out of the web configurator. The following fields will also be grayed out. You must configure the following fields when you select Primary (License Controller). |
HA MAC Address | Enter either the Physical MAC address of the initially active Zyxel Device or the Virtual MAC address. See Dashboard > System for the Physical MAC address of this Zyxel Device. The Zyxel Device automatically generates the Virtual MAC address. It has priority over the Physical MAC address. With a Virtual MAC address, you can hot swap the active Zyxel Device without reconfiguring Device HA. At the time of writing, the Virtual MAC address begins with “X6”, (X6:XX:XX:XX:XX:XX). You can see the Virtual MAC address generated in Network > Interface > Edit of the active Zyxel Device. |
Active Node Management IP | Type the IPv4 address of the highest-numbered copper Ethernet port on the active Zyxel Device (the heartbeat dedicated link port). |
Passive Node Management IP | Type the IPv4 address of the highest-numbered copper Ethernet port on the passive Zyxel Device (the heartbeat dedicated link port). |
Management IP Subnet Mask | Primary and Secondary Zyxel Devices must use the same subnet mask. Enter a subnet mask such as 255.255.255.0, of the management IP addresses. |
Monitor Interface | |
Member | Member interface types can be Ethernet, VLAN, or Bridge. Select an interface to be monitored by Device HA to determine if a passive Zyxel Device should become active. |
Failover on Monitored Interface Link Down | Enable this to have the passive Zyxel Device become the active Zyxel Device when a selected monitored interface fails. |
Failover on Monitored Connectivity Check Failure | Enable this to have the passive Zyxel Device become the active Zyxel Device when the connectivity check fails on a selected monitored interface. |
Advanced Settings | |
Pause Device HA | Enable this if you want to temporarily stop Device HA without unpairing the active and passive Zyxel Devices. You may do this to troubleshoot the active Zyxel Device for example. ![]() After successfully troubleshooting, remember to disable Pause Device HA, then turn on and reconnect ALL cables on the passive Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Apply | Click Apply to save your Device HA configurations back to the Zyxel Device but keep the Zyxel Device using Device HA (general). |
Label | Description |
---|---|
View Logs | |
Local | This displays Device HA logs on the Zyxel Device that you are currently logged into. |
Peer | This displays Device HA logs on the Zyxel Device that has a heartbeat link to the Zyxel Device that you are currently logged into, that is, the Device HA peer. |
Refresh | Click Refresh to update information in this screen. |
provider | Service Types supported | Website |
---|---|---|
DynDNS | Dynamic DNS, Static DNS, and Custom DNS | www.dyndns.com |
Dynu | Basic, Premium | www.dynu.com |
No-IP | No-IP | www.no-ip.com |
Peanut Hull | Peanut Hull | www.oray.cn |
3322 | 3322 Dynamic DNS, 3322 Static DNS | www.3322.org |
Selfhost | Selfhost | selfhost.de |
Label | Description |
---|---|
Address/PTR Record | This record specifies the mapping of a Fully-Qualified Domain Name (FQDN) to an IP address. An FQDN consists of a host and domain name. For example, www.zyxel.com.tw is a fully qualified domain name, where “www” is the host, “zyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain. |
Add | Click this to create a new entry. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Note that subsequent entries move up by one when you take this action. |
Edit icon | Double-click an entry or select it to display an Edit icon that allows you to modify the entry’s settings. |
Hostname | This is the name of the host. |
Domain | This is the host’s fully qualified domain name. |
IP Address | This is the IP address of a host. |
CNAME Record | This record specifies an alias for a FQDN. Use this record to bind all subdomains with the same IP address as the FQDN without having to update each one individually, which increases chance for errors. See CNAME Record (CNAME Record) for more details. |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Note that subsequent entries move up by one when you take this action. |
Hostname | This is the name of the host. |
Domain | This is the host’s fully qualified domain name. |
Alias Name | This displays the alias name. |
MX Record (for My FQDN) | A MX (Mail eXchange) record identifies a mail server that handles the mail for a particular domain. |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Note that subsequent entries move up by one when you take this action. |
Hostname | This is the name of the host. |
Domain | This is the domain name where the mail is destined for. |
IP/FQDN | This is the IP address or Fully-Qualified Domain Name (FQDN) of a mail server that handles the mail for the domain specified in the field above. |
Domain Zone Forwarder | This specifies a DNS server’s IP address. The Zyxel Device can query the DNS server to resolve domain zones for features like VPN, DDNS and the time server. When the Zyxel Device needs to resolve a domain zone, it checks it against the domain zone forwarder entries in the order that they appear in this list. |
Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Note that subsequent entries move up by one when you take this action. |
Move | To change an entry’s position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed. |
Priority | This is the index number of the domain zone forwarder record. The ordering of your rules is important as rules are applied in sequence. A hyphen (-) displays for the default domain zone forwarder record. The default record is not configurable. The Zyxel Device uses this default record if the domain zone that needs to be resolved does not match any of the other domain zone forwarder records. |
Domain | A domain zone is a fully qualified domain name without the host. For example, zyxel.com.tw is the domain zone for the www.zyxel.com.tw fully qualified domain name. A “*” means all domain zones. |
Type | This displays whether the DNS server IP address is assigned by the ISP dynamically through a specified interface or configured manually (User-defined). |
DNS Server | This is the IP address of a DNS server. This field displays N/A if you have the Zyxel Device get a DNS server IP address from the ISP dynamically but the specified interface is not active. |
Query Via | This is the interface through which the Zyxel Device sends DNS queries to the entry’s DNS server. If the Zyxel Device connects through a VPN tunnel, tunnel displays. |
Security Option Control | Click the arrow in the Advanced Settings field to display this part of the screen. There are two control policies: Default Action and Customize Action. |
Query Recursion | This displays if the Zyxel Device is allowed or denied to forward DNS client requests to DNS servers for resolution. |
Additional Info from Cache | This displays if the Zyxel Device is allowed or denied to cache Resource Records (RR) obtained from previous DNS queries. |
Source Address | These are the object addresses used in the control policy. RFC1918 refers to private IP address ranges. It can be modified in Object > Address. |
label | description |
---|---|
Hostname | Enter the hostname of a server. |
Domain | Type a Fully-Qualified Domain Name (FQDN) of a server. An FQDN starts with a host name and continues all the way up to the top-level domain name. For example, www.zyxel.com.tw is a fully qualified domain name, where “www” is the host, “zyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain. Underscores are not allowed. Use "*." as a prefix in the FQDN for a wildcard domain name (for example, *.example.com). |
IP Address | Enter the IP address of the host in dotted decimal notation. |
Save changes | Click the Save changes icon to save your customized settings and exit this screen. |
Cancel changes | Click the Cancel changes icon to exit this screen without saving. |
label | description |
---|---|
Hostname | Enter the hostname of a server. |
Domain | Type a Fully-Qualified Domain Name (FQDN) of a server. An FQDN starts with a host name and continues all the way up to the top-level domain name. For example, www.zyxel.com.tw is a fully qualified domain name, where “www” is the host, “zyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain. Underscores are not allowed. Use "*." as a prefix in the FQDN for a wildcard domain name (for example, *.example.com). |
Alias name | Enter an Alias Name. Use "*." as a prefix in the Alias name for a wildcard domain name (for example, *.example.com). |
Save changes | Click the Save changes icon to save your customized settings and exit this screen. |
Cancel changes | Click the Cancel changes icon to exit this screen without saving. |
Label | Description |
---|---|
Hostname | Enter the hostname of a server. |
Domain | Enter the domain name where the mail is destined for. |
IP/FQDN | Enter the IP address or Fully-Qualified Domain Name (FQDN) of a mail server that handles the mail for the domain specified in the field above. |
Save changes | Click the Save changes icon to save your customized settings and exit this screen. |
Cancel changes | Click the Cancel changes icon to exit this screen without saving. |
Label | Description |
---|---|
Domain | A domain zone is a fully qualified domain name without the host. For example, zyxel.com.tw is the domain zone for the www.zyxel.com.tw fully qualified domain name. For example, whenever the Zyxel Device receives needs to resolve a zyxel.com.tw domain name, it can send a query to the recorded name server IP address. Enter * if all domain zones are served by the specified DNS server(s). |
Type | This displays whether the DNS server IP address is assigned by the ISP dynamically through a specified interface or configured manually (User-defined). |
DNS Server | Select DNS Server(s) from ISP if your ISP dynamically assigns DNS server information. You also need to select an interface through which the ISP provides the DNS server IP address(es). The interface should be activated and set to be a DHCP client. The fields below display the (read-only) DNS server IP address(es) that the ISP assigns. N/A displays for any DNS server IP address fields for which the ISP does not assign an IP address. Select Public DNS Server if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. The Zyxel Device must be able to connect to the DNS server without using a VPN tunnel. The DNS server could be on the Internet or one of the Zyxel Device’s local networks. You cannot use 0.0.0.0. Select Private DNS Server if you have the IP address of a DNS server to which the Zyxel Device connects through a VPN tunnel. Enter the DNS server's IP address in the field to the right. You cannot use 0.0.0.0. |
Query Via | Use the Query Via field to select the interface through which the Zyxel Device sends DNS queries to a DNS server. |
Save changes | Click the Save changes icon to save your customized settings and exit this screen. |
Cancel changes | Click the Cancel changes icon to exit this screen without saving. |
Label | Description |
---|---|
Query Recursion | Choose if the Zyxel Device is allowed or denied to forward DNS client requests to DNS servers for resolution. This can apply to specific open DNS servers using the address objects in a customized rule. |
Additional Info from Cache | Choose if the Zyxel Device is allowed or denied to cache Resource Records (RR) obtained from previous DNS queries. |
Source Address | This field displays address objects created in Object > Address. Select one or more address object(s) to have it (them) to apply to this rule. For example, you could specify an open DNS server suspect of sending compromised resource records by adding an address object for that server to the member list. |
Apply | Click Apply to save your customized settings and exit this screen. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
Status | This icon is lit when the entry is active and dimmed when the entry is inactive. |
Profile Name | This field displays the descriptive profile name for this entry. |
DDNS Type | This field displays which DDNS service you are using. |
Domain Name | This field displays each domain name the Zyxel Device can route. |
Primary Interface/IP | This field displays the interface to use for updating the IP address mapped to the domain name followed by how the Zyxel Device determines the IP address for the domain name. from interface - The IP address comes from the specified interface. auto detected -The DDNS server checks the source IP address of the packets from the Zyxel Device for the IP address to use for the domain name. custom - The IP address is static. |
Backup Interface/IP | This field displays the alternate interface to use for updating the IP address mapped to the domain name followed by how the Zyxel Device determines the IP address for the domain name. The Zyxel Device uses the backup interface and IP address when the primary interface is disabled, its link is down or its connectivity check fails. from interface - The IP address comes from the specified interface. auto detected -The DDNS server checks the source IP address of the packets from the Zyxel Device for the IP address to use for the domain name. custom - The IP address is static. |
Apply | Click this button to save your changes to the Zyxel Device. |
Cancel | Click this button to return the screen to its last-saved settings. |
Label | Description |
---|---|
Enable Profile | Slide the switch to the right to use this DDNS entry. |
Profile Name | When you are adding a DDNS entry, type a descriptive name for this DDNS entry in the Zyxel Device. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. This field is read-only when you are editing an entry. |
DDNS Type | Select the type of DDNS service you are using. Select User custom to create your own DDNS service and configure the DDNS Server URL Hostname, URL Path, and Additional DDNS Options fields below. |
HTTPS | Enable this to encrypt traffic using SSL (port 443), including traffic with username and password, to the DDNS server. Not all DDNS providers support this option. |
Username | Type the user name used when you registered your domain name. You can use up to 31 alphanumeric characters and (:_.-@). Spaces are not allowed. For a Dynu DDNS entry, this user name is the one you use for logging into the service, not the name recorded in your personal information in the Dynu website. |
Password | Type the password provided by the DDNS provider. You can use up to 64 alphanumeric characters and the underscore. Spaces are not allowed. Your password will be encrypted when you configure this field. |
Retype to Confirm | Type the password again to confirm it. |
DDNS Settings | |
Domain | Type the domain name you registered. You can use up to 255 characters. |
Primary Address | Use these fields to set how the Zyxel Device determines the IP address that is mapped to your domain name in the DDNS server. The Zyxel Device uses the Backup Address if the interface specified by these settings is not available. |
Interface | Select the interface to use for updating the IP address mapped to the domain name. Select Any to let the domain name be used with any interface. |
IP Address | The options available in this field vary by DDNS provider. Interface -The Zyxel Device uses the IP address of the specified interface. This option appears when you select a specific interface in the Primary Binding Address Interface field. Auto - If the interface has a dynamic IP address, the DDNS server checks the source IP address of the packets from the Zyxel Device for the IP address to use for the domain name. You may want to use this if there are one or more NAT routers between the Zyxel Device and the DDNS server. ![]() Custom IP - If you have a static IP address, you can select this to use it for the domain name. The Zyxel Device still sends the static IP address to the DDNS server. Type the IP address in the user defined field or you can select an address object to use for the domain name. Public IP - Select this if your Zyxel Device is behind a NAT router, and the NAT router has a public WAN IP address. The DDNS provider will use the public WAN IP address of the NAT router for domain name mapping of the Zyxel Device. |
Backup Address | Use these fields to set an alternate interface to map the domain name to when the interface specified by the Primary Interface settings is not available. |
Interface | Select the interface to use for updating the IP address mapped to the domain name. Select Any to let the domain name be used with any interface. Select None to not use a backup address. |
IP Address | The options available in this field vary by DDNS provider. Interface -The Zyxel Device uses the IP address of the specified interface. This option appears when you select a specific interface in the Backup Binding Address Interface field. Auto -The DDNS server checks the source IP address of the packets from the Zyxel Device for the IP address to use for the domain name. You may want to use this if there are one or more NAT routers between the Zyxel Device and the DDNS server. ![]() Custom IP - If you have a static IP address, you can select this to use it for the domain name. The Zyxel Device still sends the static IP address to the DDNS server. Type the IP address in the user defined field or you can select an address object to use for the domain name. Public IP - Select this if your Zyxel Device is behind a NAT router, and the NAT router has a public WAN IP address. The DDNS provider will use the public WAN IP address of the NAT router for domain name mapping of the Zyxel Device. |
Enable Checking Public IP | |
Checking Public IP URL | Type the URL the Zyxel Device uses to check its public WAN IP address for DDNS updates. Use “http://” or “https://” followed by up to 255 characters (a-zA-Z0-9/?@=.&_-). This field is only available when the IP Address is Public IP. |
Check Period | Type the number of minutes between URL check attempts. Enter a number between 5 and 1440. This field is only available when the IP Address is Public IP. |
URL Hostname | This field is only available when the DDNS Type is User Custom. Type the FQDN of the server that will host the DDSN service. |
URL Path | This field is only available when the DDNS Type is User Custom. Type the URL that can be used to access the server that will host the DDSN service. |
Additional DDNS Options | These are the options supported at the time of writing: • dyndns_system to specify the DYNDNS Server type - for example, dyndns@dyndns.org • ip_server_name which should be the URL to get the server’s public IP address - for example, http://myip.easylife.tw/ |
Advanced Settings | Click the arrow in the Advanced Settings field to show the following options. |
Enable Wildcard | Enable the wildcard feature to alias subdomains to be aliased to the same IP address as your (dynamic) domain name. This feature is useful if you want to be able to use, for example, www.yourhost.dyndns.org and still reach your hostname. |
Mail Exchanger | DynDNS can route email for your domain name to a mail server (called a mail exchanger). For example, DynDNS routes email for john-doe@yourhost.dyndns.org to the host record specified as the mail exchanger. If you are using this service, type the host record of your mail server here. Otherwise leave the field blank. See www.dyndns.org for more information about mail exchangers. |
Backup Mail Exchanger | Select this check box if you are using DynDNS’s backup service for email. With this service, DynDNS holds onto your email if your mail server is not available. Once your mail server is available again, the DynDNS server delivers the mail to you. See www.dyndns.org for more information about this service. |
Apply | Click this button to save your changes to the Zyxel Device. |
Cancel | Click this button to return the screen to its last-saved settings. |
OBJECT LABEL | OBJECT ID | description |
---|---|---|
Cold Start | 1.3.6.1.6.3.1.1.5.1 | This trap is sent when the Zyxel Device is turned on or an agent restarts. |
linkDown | 1.3.6.1.6.3.1.1.5.3 | This trap is sent when the Ethernet link is down. |
linkUp | 1.3.6.1.6.3.1.1.5.4 | This trap is sent when the Ethernet link is up. |
authenticationFailure | 1.3.6.1.6.3.1.1.5.5 | This trap is sent when an SNMP request comes from non-authenticated hosts. |
vpnTunnelDisconnected | 1.3.6.1.4.1.890.1.6.22.2.3 | This trap is sent when an IPSec VPN tunnel is disconnected. |
vpnTunnelName | 1.3.6.1.4.1.890.1.6.22.2.2.1.1 | This trap is sent along with the vpnTunnelDisconnected trap. This trap carries the disconnected tunnel’s IPSec SA name. |
vpnIKEName | 1.3.6.1.4.1.890.1.6.22.2.2.1.2 | This trap is sent along with the vpnTunnelDisconnected trap. This trap carries the disconnected tunnel’s IKE SA name. |
vpnTunnelSPI | 1.3.6.1.4.1.890.1.6.22.2.2.1.3 | This trap is sent along with the vpnTunnelDisconnected trap. This trap carries the security parameter index (SPI) of the disconnected VPN tunnel. |
Label | Description |
---|---|
SNMP | Enable this to allow to access the Zyxel Device using this service. |
Server Port | The SSH port is 161 by default. You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. |
SNMP V1 | SNMP version 1 is a basic protocol used for network management, enabling devices to communicate status and performance data to a central management system. The SNMP version on the Zyxel Device must match the version on the SNMP manager. |
SNMP V2C | SNMP V2C improves on SNMPv1 with enhanced performance, error handling, and support for bulk data retrieval, using community-based security for network management. Select the SNMP version for the Zyxel Device. The SNMP version on the Zyxel Device must match the version on the SNMP manager. |
SNMP Community | |
Community 1/2 | Enter the community, which is the password for the incoming Get or Set requests from the management station. You can use up to 64 single-byte characters, including 0-9a-zA-Z_.-. The first character cannot be a period (.). |
Community 1/2 Authorization | Select the access rights to the community. • read-write: A read-write community string enables users to both retrieve and modify device data, allowing for comprehensive network management and configuration. • read-only: A read-only community string allows the retrieval of device data for monitoring but prevents any configuration changes |
Trap | |
Destination | Type the IP address of the station to send your SNMP traps to. |
Community | A Trap community in SNMP is a string used to define the group or community to which an SNMP agent sends trap messages (alerts). It acts as a password-like identifier, ensuring that trap notifications are sent to authorized network management systems (NMS) that belong to the specified community. The community string of the Trap is not mandatory. If filled in, it must be consistent with the string of SNMP community 1 or community 2. |
SNMPV3 | Select the SNMP version for the Zyxel Device. The SNMP version on the Zyxel Device must match the version on the SNMP manager. SNMPv3 (RFCs 3413 to 3415) provides secure access by authenticating and encrypting data packets over the network. The Zyxel Device uses your login password as the SNMPv3 authentication and encryption passphrase. ![]() |
Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Note that subsequent entries move up by one when you take this action. |
User | This displays the name of the user object to be sent to the SNMP manager along with the SNMP v3 trap. |
Authentication | This displays the authentication algorithm used for this entry. MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are hash algorithms used to authenticate SNMP data. SHA authentication is generally considered stronger than MD5, but is slower. |
Privacy | This displays the encryption method for SNMP communication from this user. Methods available are: • DES - Data Encryption Standard is a widely used (but breakable) method of data encryption. It applies a 56-bit key to each 64-bit block of data. • AES - Advanced Encryption Standard is another method for data encryption that also uses a secret key. AES applies a 128-bit key to 128-bit blocks of data. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
LABEL | Description |
---|---|
User | Specify the username of a login account on the Zyxel Device. The associated password is used in authentication algorithms and encryption methods. It must begin with a letter and cannot exceed 31 characters. The valid characters are [0-9][a-z][A-Z][_-.]. |
Password | Enters a password consists of eight characters. Your login password must consist of at least 8 printable characters for SNMPv3. |
User Authentication | Select an authentication algorithm. MD5 (Message Digest 5) and SHA (Secure Hash Algorithm) are hash algorithms used to authenticate SNMP data. SHA authentication is generally considered stronger than MD5, but is slower. |
Privacy | Specify the encryption method for SNMP communication from this user. You can choose one of the following: • DES - Data Encryption Standard is a widely used (but breakable) method of data encryption. It applies a 56-bit key to each 64-bit block of data. • AES - Advanced Encryption Standard is another method for data encryption that also uses a secret key. AES applies a 128-bit key to 128-bit blocks of data. |
Group | Select the access rights to MIBs: • read-write - The associated user can create and edit the MIBs on the Zyxel Device, except the user account. • read-only - The associated user can only collect information from the Zyxel Device. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
Mail Server | Type the name or IP address of the outgoing SMTP server. |
Port | Enter the same port number here as is on the mail server for mail traffic. |
TLS Security | Enable this if the mail server uses Transport Layer Security (TLS) for encrypted communications between the mail server and the Zyxel Device. |
STARTTLS | Enable this if the mail server uses SSL or TLS for encrypted communications between the mail server and the Zyxel Device. |
Authenticate Server | Enable this if the Zyxel Device authenticates the mail server in the TLS handshake. |
SMTP Authentication | Select this check box if it is necessary to provide a user name and password to the SMTP server. |
User Name | This box is effective when you select the SMTP Authentication check box. Type the user name to provide to the SMTP server when the log is emailed. Use up to 30 characters, including 0-9a-zA-Z@._- |
Password | This box is effective when you select the SMTP Authentication check box. Type a password to provide to the SMTP server when the log is emailed. Use 4 to 63 characters, including 0-9a-zA-Z‘~!@#$%^&*()_+={}|\;:”<>’./ |
Retype | Type the password again to make sure that you have entered is correctly. |
Default Sender and Recipient | |
Send From | Type the default email address from which the outgoing email is delivered. This address is used in replies. The value should be an email address. It can be up to 83 characters. The valid characters are [a-z][A-Z][/=?^_.{|}~w-!#$%*+]. The entry will be automatically filled into other sender fields in the web configurator and cannot be edited: • The Email From field in the Log & Report > Email Daily Report. • The Send From field in System > Notification > Alert > Event Notification/Log Alert. |
Recipient | Enter the email address of the recipient to whom the outgoing email is sent. This is the address that will receive the email. It can be up to 83 characters. The valid characters are [a-z][A-Z][/=?^_.{|}~w-!#$%*+]. The entry will be automatically filled into other recipient fields in the web configurator and can be edited: • The Email To field in Log & Report > Email Daily Report. • The Recipients field in System > Notification > Alert > Event Notification/Log Alert. • The Recipients field in Maintenance > Firmware/File Manager > Configuration File. |
Send Test Email | Click this button to send an email to the default mail to recipient to test if the email can be successfully received. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
Event Notification | |
Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms if you want to remove it before doing so. |
Active | To turn on an entry, select it and click Activate. |
Inactive | To turn off an entry, select it and click Inactivate. |
# | This field is a sequential value and is not associated with any entry. |
Status | This field displays the current status of each profile. |
Event | This field displays the type(s) of event to create a log or send an email notification. |
Action | This field displays the action to take when specified type(s) of events occur: • Email: Create a log and send an email notification. • Log: Create a log. |
Description | This field displays the profile’s description. |
Log Alert | |
Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms if you want to remove it before doing so. |
Active | To turn on an entry, select it and click Activate. |
Inactive | To turn off an entry, select it and click Inactivate. |
# | This field is a sequential value and is not associated with any entry. |
Status | This field displays the current status of each profile. |
Category | This field displays the type(s) of log to send an email notification. |
Description | This field displays the profile’s description. |
Label | Description |
---|---|
Enable | Enable this to create a log or send an email notification when the specified type(s) of event occur. |
Event | Select the type(s) of event to create a log or send an email notification. |
Description | Enter a description of this policy to identify it. You can use up to 512 single-byte characters, special characters and spaces are allowed. |
Alert Inhibition | Enable this to temporarily stop receiving notifications for CPU Usage over Threshold, Memory Usage over Threshold, Temperature too high (CPU, Switch, Board), USB Disk Full Alert, USB Disk Full Warning, and Storage Usage over Threshold. Other event types will not be affected. |
Interval | Specify how long to stop receiving the above notifications. The range is from 5 to 1440 minutes. The default is 60 minutes. |
Action | Select the action to take when specified type(s) of event occur: • Email: Create a log and send an email notification when the selected type(s) of event occur. • Log: Create a log when the selected type(s) of event occur. |
Email Subject | Enter the subject line for the outgoing email with 1-128 characters. It may consist of letters, numbers, and the following special characters: '()+,./:=?;!*#@$_%-. If you leave this field blank, the email subject will be the event name(s). |
Send From | Enter the email address from which the outgoing email is delivered. This address is used in replies. |
Recipients | Enter up to 83 characters for the email address of the receiver. It may consist of letters, numbers, and the following special characters: /=?^_.{|}~w-!#$%*+. You can enter up to five recipients. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Apply | Click Apply to save your settings to the Zyxel Device. |
Label | Description |
---|---|
Send Alert | Enable this to send an email notification when the specified type(s) of log occur. |
Category | Select the type(s) of log to send an email notification. |
Description | Enter a description of this policy to identify it. You can use up to 512 single-byte characters, special characters and spaces are allowed. |
Email Subject | Enter the subject line for the outgoing email with 1-128 characters. It may consist of letters, numbers, and the following special characters: '()+,./:=?;!*#@$_%- |
Send From | Enter the email address from which the outgoing email is delivered. This address is used in replies. |
Recipients | Enter up to 83 characters for the email address of the receiver. It may consist of letters, numbers, and the following special characters: /=?^_.{|}~w-!#$%*+. You can enter up to five recipients. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Apply | Click Apply to save your settings to the Zyxel Device. |
Label | Description |
---|---|
Add | Click this to go to the screen where you can have the Zyxel Device generate a certificate or a certification request. |
Edit | Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate. |
Remove | The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action. |
Reference | Select an entry and click Reference to check which settings use the entry. |
Email | Click this to email the selected certificate to the configured email address(es) for SSL or site to site VPN connection establishment. This enables you to establish an connection on your laptops, tablets, or smartphones. Click this and the following screen will appear. Here are the field descriptions: • Email Subject: Type the subject line for outgoing email from the Zyxel Device. Enter a email subject text of 1-60 characters. It may consist of letters, numbers, and the following special characters: ‘()+,./:=?;!*#@$%- • Email To: Type the email address to which the outgoing email is delivered using up to 83 characters. • Email Content: Create the email content in English, and use up to 250 keyboard characters. The special characters listed in the brackets [0-9a-zA-Z!”#$%&’()*+,-./:;<=>@\[]^_‘{}|] are allowed. • Cancel: Click this to return to the previous screen without saving your changes. • Send Email: Click this to send the selected certificate. |
Import | Click Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the Zyxel Device. |
Export | Click this and the following screen will appear. Type the selected certificate’s password and save the selected certificate to your computer. |
Name | This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name. |
Type | This field displays what kind of certificate this is. REQ represents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate. Use the My Certificate Import screen to import the certificate and replace the request. SELF represents a self-signed certificate. CERT represents a certificate issued by a certification authority. |
Subject | This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information. |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. |
Valid From | This field displays the date that the certificate becomes applicable. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. |
Reference | You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry. |
Label | Description |
---|---|
Name | Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. |
Subject Information | Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although you must specify a Host IP Address, Host Domain Name, or E-Mail. The certification authority may add fields (such as a serial number) to the subject information when it issues a certificate. It is recommended that each certificate have unique subject information. Select a radio button to identify the certificate’s owner by IP address, domain name or email address. Type the IP address (in dotted decimal notation), domain name or email address in the field provided. The domain name or email address is for identification purposes only and can be any string. A domain name can be up to 30 characters. You can use alphanumeric characters and periods. An email address can be up to 63 characters. You can use alphanumeric characters, the hyphen, the @ symbol, periods and the underscore. |
Organizational Unit | Identify the organizational unit or department to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
Organization | Identify the company or group to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
Town (City) | Identify the town or city where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
State (Province) | Identify the state or province where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
Country | Enter a two-letter country code to Identify the nation where the certificate owner is located. |
Key Type | This sets the certificate’s encryption algorithm and signature hash algorithm. Encryption algorithms: • RSA: Rivest, Shamir and Adleman public-key algorithm. • DSA: Digital Signature Algorithm public-key algorithm. • ECDSA: Elliptic Curve Digital Signature Algorithm. Signature hash algorithms: • SHA256 • SHA384 • SHA512 RSA and SHA256 are less secure but more compatible with different clients and applications. ECDSA and SHA512 are the more secure but less compatible. |
Key Length | Select a number from the drop-down list box to determine how many bits the key should use (256 to 384). The longer the key, the more secure it is. A longer key also uses more PKI storage space. ECDSA keys are significant shorter than RSA and DSA keys, while offering equal or higher security. |
LifeTimes | Select how long the certificate is valid. It can be valid from 1 to 10 years. |
Extended Key Usage | |
Server Authentication | Select this to have Zyxel Device generate and store a request for server authentication certificate. |
Client Authentication | Select this to have Zyxel Device generate and store a request for client authentication certificate. |
IKE Intermediate | Select this to have Zyxel Device generate and store a request for IKE Intermediate authentication certificate. |
Create a self-signed certificate | Select this to have the Zyxel Device generate the certificate and act as the Certification Authority (CA) itself. This way you do not need to apply to a certification authority for certificates. |
Create a certification request and save it locally for later manual enrollment | Select this to have the Zyxel Device generate and store a request for a certificate. Use the My Certificate Details screen to view the certification request and copy it to send to the certification authority. Copy the certification request from the My Certificate Details screen and then send it to the certification authority. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
Name | This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. |
Type | This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates. |
Version | This field displays the X.509 version number. |
Serial Number | This field displays the certificate’s identification number given by the certification authority or generated by the Zyxel Device. |
Subject | This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O), State (ST), and Country (C). |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country. With self-signed certificates, this is the same as the Subject Name field. “none” displays for a certification request. |
Signature Algorithm | This field displays the type of algorithm that was used to sign the certificate. The Zyxel Device uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Some certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm). |
Valid From | This field displays the date that the certificate becomes applicable. “none” displays for a certification request. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. “none” displays for a certification request. |
Key Algorithm | This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example). |
Subject Alternative Name | This field displays the certificate owner‘s IP address (IP), domain name (DNS) or email address (EMAIL). |
Key Usage | This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. |
Extended Key Usage | This field displays how the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate. |
Basic Constraint | This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path. This field does not display for a certification request. |
PEM Encoded Format | This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form. You can copy and paste a certification request into a certification authority’s web page, an email that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment. You can copy and paste a certificate into an email to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution (via external storage device for example). |
MD5 Fingerprint | It is a unique 128-bit checksum value generated by the MD5 hashing algorithm, used to verify data integrity and identify cryptographic keys, though it is no longer considered secure. |
SHA1 Fingerprint | It is a 160-bit hash value produced by the SHA-1 hashing algorithm, commonly used to verify data integrity and identify cryptographic keys, although it is now considered weak due to vulnerabilities. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
File Path | Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device. |
Browse | Click Browse to find the certificate file you want to upload. |
Password | This field only applies when you import a binary PKCS#12 format file. Type the file’s password that was created when the PKCS #12 file was exported. |
OK | Click OK to save the certificate on the Zyxel Device. |
Label | Description |
---|---|
Edit | Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate. |
Remove | The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action. |
Import | Click Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the Zyxel Device. |
Export | Click this and the following screen will appear. Type the selected certificate’s password and save the selected certificate to your computer. |
Name | This field displays the name used to identify this certificate. |
Subject | This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information. |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. |
Valid From | This field displays the date that the certificate becomes applicable. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. |
Label | Description |
---|---|
Certification Path | Click the Refresh button to have this read-only text box display the end entity’s certificate and a list of certification authority certificates that shows the hierarchy of certification authorities that validate the end entity’s certificate. If the issuing certification authority is one that you have imported as a trusted certificate, it may be the only certification authority in the list (along with the end entity’s own certificate). The Zyxel Device does not trust the end entity’s certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked. |
Refresh | Click Refresh to display the certification path. |
Name | This field displays the identifying name of this certificate. |
Type | This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates. |
Version | This field displays the X.509 version number. |
Serial Number | This field displays the certificate’s identification number given by the certification authority. |
Subject | This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C). |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country. With self-signed certificates, this is the same information as in the Subject Name field. |
Signature Algorithm | This field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm). |
Valid From | This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired. |
Key Algorithm | This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example). |
Subject Alternative Name | This field displays the certificate’s owner‘s IP address (IP), domain name (DNS) or email address (EMAIL). |
Key Usage | This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. |
Extended Key Usage | This field displays the method that the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate. |
Basic Constraint | This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path. |
MD5 Fingerprint | It is a unique 128-bit checksum value generated by the MD5 hashing algorithm, used to verify data integrity and identify cryptographic keys, though it is no longer considered secure. |
SHA1 Fingerprint | It is a 160-bit hash value produced by the SHA-1 hashing algorithm, commonly used to verify data integrity and identify cryptographic keys, although it is now considered weak due to vulnerabilities. |
Certificate in PEM (Base-64) Encoded Format | This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form. You can copy and paste the certificate into an email to send to friends or colleagues or you can copy and paste the certificate into a text editor and save the file on a management computer for later distribution (via external storage device for example). |
Label | Description |
---|---|
File Path | Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device. |
Browse | Click Browse to find the certificate file you want to upload. |
OK | Click OK to save the certificate on the Zyxel Device. |
Label | Description |
---|---|
System Parameters | |
Name | This field displays the name of the system parameter. UDP Timeout: After the UDP client sends a request to the server, if there is no response from the server within this set time, the Zyxel Device ends the UDP connection. UDP Timeout Stream: The UDP client sends a request to the server and receives a response, but the connection is interrupted. If there is no further response from the server within this set time, the Zyxel Device ends the UDP connection ICMP Timeout: This shows how long the Zyxel Device waits before considering the ICMP connection attempt a failure. |
Description | This field displays the description of the system information. |
Value | This field displays the value of the system information. Click the Edit icon to modify the value. |
Additional Features | |
Enabled | Click this switch to enable or disable the feature. When the switch turns green, the function is enabled. |
Name | This field displays the name of the following features. |
ARP Spoofing Prevention | Enable this feature to prevent and create a log on the Zyxel Device when there is a fake ARP message that failed the ARP verification. |
Category Query Fail-open | A category server classifies IP addresses and URLs to different categories, such as anonymizers, browser exploits, and malicious downloads. Enable this feature to allow traffic to bypass if the Zyxel Device cannot access the category server. Click on the Edit icon next to this field to configure more settings. Use Log to generate a log (log)or not (no) when the query to the category server failed. |
Device Insight | Enable this feature to collect status and basic information of the clients connected to the Zyxel Device. |
Drop Invalid TCP Flags Pkt | Enable this feature to allow the Zyxel Device to inspect TCP packets and drop any with invalid flags, such as FIN + SYN, FIN + RST, and SYN + RST flag combinations. Click on the Edit icon next to this field to configure more settings. Use Log to generate a log (log), log and alert (log alert) or not (no) when the Zyxel Device detects an invalid TCP flag. |
Drop SYN with Payload Pkt | When setting up a TCP connection, a SYN packet is used during the initial handshake to establish connection between two network devices, and typically does not carry any data payload. A SYN packet with a payload may indicate a potential attack, such as a SYN flood. Enable this feature to allow your Zyxel Device to drop SYN packets with a payload. Click on the Edit icon next to this field to configure more settings. Log: Generate a log (log), log and alert (log alert) or not (no) when there is a SYN packet with payload detected by the Zyxel Device. Destination Port: Specify a destination port number to drop SYN packets with a payload sent to that port. If set to 0, SYN packets with a payload sent to any port will be dropped. Payload Size (greater than or equal to): Specify the size (in bytes) to drop SYN packets with a payload of this size or larger. |
LLDP | Link Layer Discovery Protocol (LLDP, IEEE 802.1AB) is a Layer 2 protocol that allows network devices to advertise their identity and capabilities on a LAN. Enable this feature to allow your Zyxel Device to share its identity and capabilities on the local network. |
Description | This field displays what the feature does. |