Object
Device Insight
Use this screen to configure profiles to block specified clients from accessing the Internet or the Zyxel Device in Configuration > Security Policy > Policy Control. Configure profiles for WiFi and wired clients connected to the Zyxel Device according to the types of devices they use or operating systems their devices use.
*To collect clients’ information using Device Insight, the clients must be in the same IP subnet in the LAN/VLAN/DMZ networks behind the Zyxel Device. Information from clients that are in different IP subnets in the LAN/VLAN/DMZ networks might not be collected correctly as traffic must pass through another router or a layer-2 switch to the Zyxel Device.
Here’s the process for the Zyxel Device to block a profile in this screen:
1 Create a profile in the Device Insight screen to block specific clients.
2 Add the created device insight profile to one of the rules in Policy Control.
3 The Zyxel Device will block clients if they match the settings you configure in the Device Insight profile.
The following table describes the labels in this screen.
Configuration > Object > Device Insight
Label
Description
General Settings
 
Enable
Select this to enable device insight. Clear this to disable it.
Add
Click this to create a new, user-configured zone.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove a user-configured trunk, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.Click Refresh to update information in this screen.
#
This field is a sequential value, and it is not associated with any interface.
Name
This field displays the name of the device.
Description
If the device insight profile has a description configured, it displays here.
Reference
This field displays the number of times an Object Reference is used in a policy.
Device Insight Add/Edit
The Device Insight Add/Edit screen allows you to add a new device insight profile or edit and existing one. The following table describes the labels in this screen.
Configuration > Object > Device Insight > Add/Edit 
Label
Description
Profile Name
Type a name for this device insight profile. You may use 1-31 alphanumeric character, underscores (_), or dashes (-), but the first character cannot be a number. Spaces and duplicate names are not allowed. This value is case-sensitive.
Description
Enter the description of each device insight profile. You can use 1 to 63 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_
&.<>[\]^‘{|} are not allowed.
Category
Select the type of device used by the connected client for this profile.
IoT (Internet of Things) is a device with sensors and software that collects and analyzes data. It exchanges the data it collects with other devices over the Internet. IoT is used in many places, such as home assistant, personal care or toys.
For example, a smart watch that your grandparents wear is an IoT. It can detects the heart rate and blood pressure of the person wearing it. It sends out warning to other devices, such as your parents phones, if it detects something wrong.
Operating System
Select the device operating system used by the connected client for this profile.
OK
Click this button to save your changes to the Zyxel Device and return to the summary screen.
Cancel
Click this button to return to the summary screen without saving any changes.
Example: Block a Profile
In this example, company A on the Zyxel Device LAN1 wants to block its subsidiary employees on LAN2 from accessing the company A local networks with their mobile phones. Company A can create a profile that includes all operating systems mobile phones, and then apply it to the LAN2_To_LAN1 policy you created. Clients using mobile phones on the Zyxel Device LAN2 will be blocked from accessing the Zyxel Device LAN1.
Here’s the process to use a Device Insight profile in a Zyxel Device security policy. The example below uses the parameters in this table.
Device Insight Profile Configurations Example
profile name
description
category
operating system
applied policy
MobilePhone
profile for mobile clients
Mobile Phone/Tablet
Windows
macOS
Linux
OS
Android
Others
LAN2_To_LAN1
The security policy LAN2_To_LAN1 uses the parameters in this table
Device Insight Profile Configurations Example
to
from
action
device insight profile
LAN1
LAN2
deny
MobilePhone
1 Go to Object > Device Insight and click Add. Follow the parameters in the table above to configure a profile for clients using mobile phones. Click OK to save your changes.
2 Go to Configuration > Security Policy > Policy Control. Click Add to create a rule and name it as LAN2_To_LAN1.
3 In the Add Policy screen, set From to LAN2 and To to LAN1 to configure the traffic direction for the security policy. Add the created Device Insight (MobilePhone) profile to the security policy.
4 Set the Action to deny then click OK to save your changes. Check that the Device Insight profile name (MobilePhone) shows under the Device column to make sure clients using mobile phones are blocked from accessing the Zyxel Device LAN1 from LAN2.
*Make sure to configure a security policy to ensure your access to the Zyxel Device before blocking a Device Insight profile. Reset the Zyxel Device if you’re blocked from accessing the Zyxel Device.
Zones Overview
Set up zones to configure network security and network policies in the Zyxel Device. A zone is a group of interfaces and/or VPN tunnels. The Zyxel Device uses zones instead of interfaces in many security and policy settings, such as Secure Policies rules, Security Service, and remote management.
Zones cannot overlap. Each Ethernet interface, VLAN interface, bridge interface, PPPoE/PPTP interface and VPN tunnel can be assigned to at most one zone. Virtual interfaces are automatically assigned to the same zone as the interface on which they run.
What You Need to Know
Zones effectively divide traffic into three types--intra-zone traffic, inter-zone traffic, and extra-zone traffic.
Intra-zone Traffic
Intra-zone traffic is traffic between interfaces or VPN tunnels in the same zone.
Inter-zone Traffic
Inter-zone traffic is traffic between interfaces or VPN tunnels in different zones.
Extra-zone Traffic
Extra-zone traffic is traffic to or from any interface or VPN tunnel that is not assigned to a zone.
Some zone-based security and policy settings may apply to extra-zone traffic, especially if you can set the zone attribute in them to Any or All. See the specific feature for more information.
Zone
The Zone screen provides a summary of all zones. In addition, this screen allows you to add, edit, and remove zones.
Configuration > Object > Zone 
Label
Description
User Configuration / System Default
The Zyxel Device comes with pre-configured System Default zones that you cannot delete. You can create your own User Configuration zones
Add
Click this to create a new, user-configured zone.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove a user-configured trunk, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.Click Refresh to update information in this screen.
#
This field is a sequential value, and it is not associated with any interface.
Name
This field displays the name of the zone.
Member
This field displays the names of the interfaces that belong to each zone.
Reference
This field displays the number of times an Object Reference is used in a policy.
Zone Edit
The Zone Edit screen allows you to add or edit a zone.
Configuration > Object > Zone > Add/Edit 
Label
Description
Name
For a system default zone, the name is read only.
For a user-configured zone, type the name used to refer to the zone. You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Member List
Available lists the interfaces and VPN tunnels that do not belong to any zone. Select the interfaces and VPN tunnels that you want to add to the zone you are editing, and click the right arrow button to add them.
Member lists the interfaces and VPN tunnels that belong to the zone. Select any interfaces that you want to remove from the zone, and click the left arrow button to remove them.
OK
Click OK to save your customized settings and exit this screen.
Cancel
Click Cancel to exit this screen without saving.
User/Group
This section describes how to set up user accounts, user groups, and user settings for the Zyxel Device. You can also set up rules that control when users have to log in to the Zyxel Device before the Zyxel Device routes traffic for them.
The User screen (see User/Group User Summary) provides a summary of all user accounts.
The Group screen (see User/Group Group Summary) provides a summary of all user groups. In addition, this screen allows you to add, edit, and remove user groups. User groups may consist of access users and other user groups. You cannot put admin users in user groups.
The Setting screen (see User/Group Setting) controls default settings, login settings, lockout settings, and other user settings for the Zyxel Device. You can also use this screen to specify when users must log in to the Zyxel Device before it routes traffic for them.
The MAC Address screen (see User/Group MAC Address Summary) allows you to configure the MAC addresses or OUI (Organizationally Unique Identifier) of wireless clients for MAC authentication using the local user database. The OUI is the first three octets in a MAC address and uniquely identifies the manufacturer of a network device.
What You Need To Know
User Account
A user account defines the privileges of a user logged into the Zyxel Device. User accounts are used in security policies, in addition to controlling access to configuration and services in the Zyxel Device.
User Types
These are the types of user accounts the Zyxel Device uses.
Types of User Accounts 
Type
Abilities
Login Method(s)
Admin Users
 
 
admin
Change Zyxel Device configuration (web, CLI)
WWW, TELNET, SSH, FTP, Console
Access Users
 
 
limited-admin
Look at Zyxel Device configuration (web, CLI)
Perform basic diagnostics (CLI)
Cannot execute commands such as 'show running-config'
WWW, TELNET, SSH, Console
user
Access network services
Browse user-mode commands (CLI)
WWW, TELNET, SSH
guest
Access network services
WWW
ext-user
External user account
WWW
ext-group-user
External group user account
WWW
guest-manager
Create dynamic guest accounts
WWW
dynamic-guest
Access network services
Hotspot Portal
*The default admin account is always authenticated locally, regardless of the authentication method setting.
Ext-User Accounts
Set up an ext-user account if the user is authenticated by an external server and you want to set up specific policies for this user in the Zyxel Device. If you do not want to set up policies for this user, you do not have to set up an ext-user account.
All ext-user users should be authenticated by an external server, such as AD, LDAP or RADIUS. If the Zyxel Device tries to use the local database to authenticate an ext-user, the authentication attempt always fails.
*If the Zyxel Device tries to authenticate an ext-user using the local database, the attempt always fails.
Once an ext-user user has been authenticated, the Zyxel Device tries to get the user type from the external server. If the external server does not have the information, the Zyxel Device sets the user type for this session to User.
For the rest of the user attributes, such as reauthentication time, the Zyxel Device checks the following places, in order.
1 User account in the remote server.
2 User account (Ext-User) in the Zyxel Device.
3 Default user account for AD users (ad-users), LDAP users (ldap-users) or RADIUS users (radius-users) in the Zyxel Device.
See Setting up User Attributes in an External Server for a list of attributes and how to set up the attributes in an external server.
Ext-Group-User Accounts
Ext-Group-User accounts work are similar to ext-user accounts but allow you to group users by the value of the group membership attribute configured for the AD or LDAP server. See Adding an Active Directory or LDAP Server for more on the group membership attribute.
Dynamic-Guest Accounts
Dynamic guest accounts are guest accounts, but are created dynamically and stored in the Zyxel Device’s local user database. A dynamic guest account has a dynamically-created user name and password. A dynamic guest account user can access the Zyxel Device’s services only within a given period of time and will become invalid after the expiration date/time.
There are three types of dynamic guest accounts depending on how they are created or authenticated: billing-users, ua-users and trial-users.
billing-users are guest account created with the guest manager account or an external printer and paid by cash or created and paid through the on-line payment service. ua-users are users that log in from the user agreement page. trial-users are free guest accounts that are created with the Free Time function.
User Groups
User groups may consist of user accounts or other user groups. Use user groups when you want to create the same rule for several user accounts, instead of creating separate rules for each one.
*You cannot put access users and admin users in the same user group.
*You cannot put the default admin account into any user group.
The sequence of members in a user group is not important.
User Awareness
By default, users do not have to log into the Zyxel Device to use the network services it provides. The Zyxel Device automatically routes packets for everyone. If you want to restrict network services that certain users can use through the Zyxel Device, you can require them to log in to the Zyxel Device first. The Zyxel Device is then ‘aware’ of the user who is logged in and you can create ‘user-aware policies’ that define what services they can use. See User /Group Technical Reference for a user-aware login example.
Finding Out More
See User /Group Technical Reference for some information on users who use an external authentication server in order to log in.
The Zyxel Device supports TTLS using PAP so you can use the Zyxel Device’s local user database to authenticate users with WPA or WPA2 instead of needing an external RADIUS server.
User/Group User Summary
The User screen provides a summary of all user accounts.
Configuration > Object > User/Group > User 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
Local Administrator
Use this table to view and configure the Zyxel Device admin accounts.
#
This field is a sequential value, and it is not associated with a specific user.
User Name
This field displays the user name of each user.
User Type
This field displays the admin accounts the Zyxel Device uses. Admin accounts are users that can look at and change the configuration of the Zyxel Device
Description
This field displays the description for each user.
Created Date
This field displays the date the account is created.
This field displays - if the account is created before the Zyxel Device upgrades firmware to version 5.10 or later.
Password Last Change
This field displays the last time the user changed the account password.
Password Expired Date
This field displays the account password expiry date. The user should change the password before it expires.
Reference
This displays the number of times an object reference is used in a profile.
User
Use this table to configure the Zyxel Device:
Limited-admin accounts.
User accounts.
Guest accounts.
Ext-user accounts.
Ext-group-user accounts.
#
This field is a sequential value, and it is not associated with a specific user.
User Name
This field displays the user name of each user.
User Type
This field displays the types of user accounts the Zyxel Device uses:
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it
dynamic-guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
user - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI).
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
guest-manager - this user can log in through the web configurator login screen and create dynamic guest accounts using the Account Generator screen that pops up.
Description
This field displays the description for each user.
Create Date
This field displays the date the account is created.
Password Last Change
This field displays the last time the user changes the account password.
Reference
This displays the number of times an object reference is used in a profile.
User Add/Edit General
The User Add/Edit General screen allows you to create a new user account or edit an existing one.
Rules for User Names
Enter a user name from 1 to 31 characters.
The user name can only contain the following characters:
Alphanumeric A-z 0-9 (there is no unicode support)
_ [underscores]
- [dashes]
The first character must be alphabetical (A-Z a-z), an underscore (_), or a dash (-). Other limitations on user names are:
User names are case-sensitive. If you enter a user 'bob' but use 'BOB' when connecting through CIFS or FTP, it will use the account settings used for 'BOB' not ‘bob’.
User names have to be different than user group names.
Here are the reserved user names:
adm
admin
any
bin
daemon
debug
devicehaecived
ftp
games
halt
ldap-users
lp
mail
news
nobody
operator
radius-users
root
shutdown
sshd
sync
uucp
zyxel
 
 
Configuration > Object > User/Group > User > Add/Edit_General 
Label
Description
User Name
Type the user name for this user account. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User names have to be different than user group names, and some words are reserved.
User Type
This field is not available if you’re adding an account to the Local Administrator table.
Select the types of user accounts the Zyxel Device uses from the drop-down list box:
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it
user - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI).
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
Password
This field is not available if you select the ext-user or ext-group-user type.
Enter a password of from 1 to 64 characters for this user account. If you selected Enable Password Complexity in Configuration > Object > User/Group > Setting, it must consist of at least 8 characters and at most 64. At least 1 character must be a number, at least 1 a lower case letter, at least 1 an upper case letter and at least 1 a special character from the keyboard, such as !@#$%^&*()_+.
*After the first login, you are not allowed to set the password to 1234.
Retype
This field is not available if you select the ext-user or ext-group-user type.
Group Identifier
This field is available for a ext-group-user type user account.
Specify the value of the AD or LDAP server’s Group Membership Attribute that identifies the group to which this user belongs.
Associated AAA Server Object
This field is available for a ext-group-user type user account. Select the AAA server to use to authenticate this account’s users.
Description
Enter the description of each user, if any. You can use 1 to 63 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_
&.<>[\]{|}^‘are not allowed. Default descriptions are provided.
Email
Type one or more valid email addresses for this user so that email messages can be sent to this user if required. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com.
Mobile Number
Type a valid mobile telephone number for this user so that SMS messages can be sent to this user if required. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-].
Send Code
This button is available when the user type is admin or limited-admin.
Click this and an authorization email or SMS message with a code of six digits will be sent to the email addresses or mobile telephone number you put in.
Enter the verification code to verify your email addresses or mobile telephone number.
Authentication Timeout Settings
If you want the system to use default settings, select Use Default Settings. If you want to set authentication timeout to a value other than the default settings, select Use Manual Settings then fill your preferred values in the fields that follow.
Lease Time
If you select Use Default Settings in the Authentication Timeout Settings field, the default lease time is shown.
If you select Use Manual Settings, you need to enter the number of minutes this user has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this checkbox on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication Time
If you select Use Default Settings in the Authentication Timeout Settings field, the default reauthentication time is shown.
If you select Use Manual Settings, you need to type the number of minutes this user can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
User VLAN ID
This field is available for a ext-group-user type user account.
Select this option to enable dynamic VLAN assignment on the Zyxel Device. When a user is authenticated successfully, all data traffic from this user is tagged with the VLAN ID number you specify here.
This allows you to assign a user of the ext-group-user type to a specific VLAN based on the user credentials instead of using an AAA server.
Configuration Validation
Use a user account from the group specified above to test if the configuration is correct. Enter the account’s user name in the User Name field and click Test.
OK
Click OK to save your changes back to the Zyxel Device and close the screen.
Cancel
Click Cancel to exit this screen without saving your changes.
Save
This button is only available when adding a new user. Click Save to save your changes back to the Zyxel Device and then go to the Two-factor Authentication screen.
User Add/Edit Two-factor Authentication
The User Add/Edit Two-factor Authentication screen allows you to create two-factor security for VPN access or admin access for this user to the Zyxel Device.
Two-factor authentication adds an extra layer of security for users logging into the Zyxel Device. When two-factor authentication is enabled, a user has to first enter their username and password, and then click on a temporary link or enter a one-time password when logging in.
You can enable two-factor authentication for users who are logging into the Zyxel Device to create a VPN tunnel (VPN access), and for administrator and limited admin users who are logging into the Web Configurator or CLI (admin access) to configure the Zyxel Device.
Two Factor Authentication Methods 
Access Type
Two-Factor Authentication Methods
Factor 2 Password
VPN
SMS
Code
VPN
Email
Link
VPN
Google Authenticator app
Code
Admin
SMS
Code
Admin
Email
Link
Admin
Google Authenticator app
Code
You must first enable two-factor authentication on the Zyxel Device in Object > Auth. Method > Two-factor Authentication > VPN Access and Object > Auth. Method > Two-factor Authentication > Admin Access. See Two-Factor Authentication and Two-Factor Authentication Admin Access for more prerequisites and other information.
In Object > User/Group > User, click Add to create a new entry or select an entry and click Edit to modify the entry. You must create a user account first before you can edit the two-factor authentication settings.
You can configure two-factor authentication for non-VPN and non-admin users in web authentication.
*The admin two-factor authentication settings override the web authentication two-factor authentication settings.
The following table describes the labels in this screen.
Configuration > Object > User/Group > User > Add_Two-factor Authentication 
Label
Description
Enable Two-factor Authentication for VPN Access
Select this to require two-factor authentication for this user to use a pre-configured VPN tunnel for secure access to a network behind the Zyxel Device. Select the types of VPN allowed in Object > Auth. Method > Two-factor Authentication > VPN Access. You may choose from:
SSL VPN Access
IPSec VPN Access
L2TP/IPSec VPN Access
Enable Two-factor Authentication for Admin Access
Select this to require two-factor authentication for an admin user to access the Zyxel Device. Select the types of access allowed in Object > Auth. Method > Two-factor Authentication > Admin Access. You may choose from:
Web
SSH
TELNET
Two-factor Auth. Method
Select Default or User Defined and select from PIN code by SMS/Email or Google Authenticator
Set up Google Authenticator
If you chose Google Authenticator for offline two-factor authentication, on your mobile device, go to an app store to download Google Authenticator. To add your account to Google Authenticator, press the plus (+) icon, select Scan Barcode, then use your mobile device's camera to scan the barcode. Finally enter the verification code you receive on your mobile device in Verify your device.
View your backup codes
You see this after successful Google authentication. In the event that you do not have access to email or your mobile device, click Download to create backup codes as second-factor authentication. Make sure to put them in a safe place.
Verify your device
In the event that you do not have access to email or your mobile device, enter a backup code here as second factor authentication. You can use each code only once. If you generate a new set of backup codes (Regenerate backup codes), the old set become obsolete.
Revoke
Click this to cancel Google authentication as second-factor authentication for Admin Access. You must then use a PIN code by SMS or email as second-factor authentication instead.
OK
Click OK to save your changes back to the Zyxel Device and close the screen.
Cancel
Click Cancel to exit this screen without saving your changes.
Google Two-Factor Authentication Setup Example
You can use two-factor authentication through SMS, email or Google Authenticator (more secure). Google Authenticator is more secure as it generates a new code every 30 seconds, and each code expires in 30 seconds.
Two-Factor with Google Authenticator Overview
Enable Google Authentication for a User
Go to Configuration > Object > User/Group > User , select a user, and click Edit. The following screen appears. Click Set up Google Authenticator.
Configuration > Object > User/Group > User > Edit User > Two-Factor Authentication
Set Up Google Authenticator
Follow the instructions on the Configuration > Object > User/Group > User > Edit User > Two-Factor Authentication screen to set up Google Authenticator.
Configuration > Object > User/Group > User > Edit User > Two-Factor Authentication
1 Download and install Google Authenticator from Google Play or the App Store on your mobile device.
2 Open the Google Authenticator app and scan the QR code on the screen.
3 Enter the code displayed in Google Authenticator from Step 3 in the Web Configurator, then click Verify Code and finish to complete the verification.
4 If two-factor verification is successful, the following message appears. If it fails, an error message will be displayed. Try again when the next code appears and ensure you enter the correct code within the time limit.
5 After 2FA registration is successfully set up, backup codes will be available in Configuration > Object > User/Group > User > Edit User > Two-Factor Authentication. These codes can be used for device login if you don't have access to the application on your mobile device. Download the backup codes and store them in a safe place.
*If you click Regenerate backup codes or revoke the Google Authenticator registration and re-register, the backup codes will change.
Configure Two-Factor Authentication for a Remote VPN User
 
Follow these steps to set a valid time and allowed login method for a remote user who connects securely to the network behind the Zyxel Device through a Virtual Private Network (VPN):
1 Go to Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access and configure the following fields:
Valid time (optional): Enter the maximum time (in minutes) that you must enter the code in Google Authenticator in order to get authorization for the VPN connection.
Two-factor Authentication for Services: Select which kinds of VPN tunnels require Two-Factor Authentication. You should have configured the VPN tunnel first.
Deliver Authorize Link Method: Select Google Authenticator. You will receive an authentication code in Google Authenticator. Log in to the Zyxel Device by entering the authentication code from Google Authenticator.
Authorized Port: Configure a new port between 1024 to 65535 that is not in use by other services. Use this port for two-factor authentication of VPN clients to access the network behind the Zyxel Device. VPN clients do not need to change the port number on their devices, because the link to access the network behind the Zyxel Device will contain the new port number.
2 Click Apply to save the changes to the Zyxel Device.
Test the Remote VPN Two-Factor Authentication
To verify whether the remote VPN user can successfully use two-factor authentication to access the Zyxel Device, follow these steps:
1 The remote user should establish a VPN connection using a VPN client application. See The VPN Connection Screen for more information about establishing a VPN connection.
2 The Web Configurator displays the following screen. Enter the code shown in Google Authenticator and click Authorize.
*If you don’t have a mobile device on hand, you can find a backup code in Configuration > Object > User/Group > User > Edit User > Two-Factor Authentication and enter it.
3 The remote VPN user can now access the Zyxel Device.
User/Group Group Summary
User groups consist of access users and other user groups. You cannot put admin users in user groups. The Group screen provides a summary of all user groups. In addition, this screen allows you to add, edit, and remove user groups.
Configuration > Object > User/Group > Group 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Removing a group does not remove the user accounts in the group.
References
Select an entry and click References to open a screen that shows which settings use the entry
#
This field is a sequential value, and it is not associated with a specific user group.
Group Name
This field displays the name of each user group.
Description
This field displays the description for each user group.
Member
This field lists the members in the user group. Each member is separated by a comma.
Reference
This displays the number of times an object reference is used in a profile.
Group Add/Edit
The Group Add/Edit screen allows you to create a new user group or edit an existing one.
Configuration > Object > User/Group > Group > Add 
Label
Description
Name
Type the name for this user group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User group names have to be different than user names.
Description
Enter the description of the user group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Member List
The Member list displays the names of the users and user groups that have been added to the user group. The order of members is not important. Select users and groups from the Available list that you want to be members of this group and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
User/Group Setting
The Setting screen controls default settings, login settings, lockout settings, and other user settings for the Zyxel Device. You can also use this screen to specify when users must log in to the Zyxel Device before it routes traffic for them.
Configuration > Object > User/Group > Setting 
Label
Description
User Authentication Timeout Settings
Default Authentication Timeout Settings
These authentication timeout settings are used by default when you create a new user account. They also control the settings for any existing user accounts that are set to use the default settings. You can still manually configure any user account’s authentication timeout settings.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
#
This field is a sequential value, and it is not associated with a specific entry.
User Type
These are the kinds of user account the Zyxel Device supports.
admin - this user can look at and change the configuration of the Zyxel Device
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it
user - this user has access to the Zyxel Device’s services but cannot look at the configuration
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
Lease Time
This is the default lease time in minutes for each type of user account. It defines the number of minutes the user has to renew the current session before the user is logged out.
Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically, the users can select this checkbox on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication Time
This is the default reauthentication time in minutes for each type of user account. It defines the number of minutes the user can be logged into the Zyxel Device in one session before having to log in again. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
Miscellaneous Settings
Allow renewing lease time automatically
Select this checkbox if access users can renew lease time automatically, as well as manually, simply by selecting the Updating lease time automatically checkbox on their screen.
Enable user idle detection
This is applicable for access users.
Select this checkbox if you want the Zyxel Device to monitor how long each access user is logged in and idle (in other words, there is no traffic for this access user). The Zyxel Device automatically logs out the access user once the User idle timeout has been reached.
User idle timeout
This is applicable for access users.
This field is effective when Enable user idle detection is checked. Type the number of minutes each access user can be logged in and idle before the Zyxel Device automatically logs out the access user.
Login Security
Password must changed every (days):
Enter how often local users of User Type ‘admin’ must change their login passwords. You can choose from once a day to once a year.
Password reset link (FQDN/IP):
Associate the password expiration to a specific Zyxel Device. Default is this Zyxel Device (myrouter) or select Custom and enter the IP address or Fully Qualified Domain Name (FQDN).
Enable Password Complexity
Select this to enforce the following conditions in a user password. Requiring a strong password is good for security. The conditions are that the password must consist of at least 8 characters and at most 64. At least 1 character must be a number, at least 1 a lower case letter, at least 1 an upper case letter and at least 1 a special character from the keyboard, such as !@#$%^&*()_+.
User Logon Settings
Limit the number of simultaneous logons for administration account
Select this checkbox if you want to set a limit on the number of simultaneous logins by admin users. If you do not select this, admin users can login as many times as they want at the same time using the same or different IP addresses.
Maximum number per administration account
This field is effective when Limit ... for administration account is checked. Type the maximum number of simultaneous logins by each admin user.
Limit the number of simultaneous logons for access account
Select this checkbox if you want to set a limit on the number of simultaneous logins by non-admin users. If you do not select this, access users can login as many times as they want as long as they use different IP addresses.
Maximum number per access account
This field is effective when Limit ... for access account is checked. Type the maximum number of simultaneous logins by each access user.
User IP Lockout Settings
Enable logon retry limit
Select this checkbox to set a limit on the number of times each user can login unsuccessfully (for example, wrong password) before the IP address is locked out for a specified amount of time.
Maximum retry count
This field is effective when Enable logon retry limit is checked. Type the maximum number of times each user can login unsuccessfully before the IP address is locked out for the specified lockout period. The number must be between 1 and 99.
Lockout period
This field is effective when Enable logon retry limit is checked. Type the number of minutes the user must wait to try to login again, if logon retry limit is enabled and the maximum retry count is reached. This number must be between 1 and 65,535 (about 45.5 days).
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Default User Authentication Timeout Settings Edit
The Default Authentication Timeout Settings Edit screen allows you to set the default authentication timeout settings for the selected type of user account. These default authentication timeout settings also control the settings for any existing user accounts that are set to use the default settings. You can still manually configure any user account’s authentication timeout settings.
Configuration > Object > User/Group > Setting > Edit 
Label
Description
User Type
This read-only field identifies the type of user account for which you are configuring the default settings.
admin - this user can look at and change the configuration of the Zyxel Device
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it.
dynamic-guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
user - this user has access to the Zyxel Device’s services but cannot look at the configuration.
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
guest-manager - this user can log in through the web configurator login screen and create dynamic guest accounts using the Account Generator screen that pops up.
Lease Time
Enter the number of minutes this type of user account has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited.
Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this checkbox on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication Time
Type the number of minutes this type of user account can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
User Aware Login Example
Access users cannot use the Web Configurator to browse the configuration of the Zyxel Device. Instead, after access users log into the Zyxel Device.
Web Configurator for Non-Admin Users 
Label
Description
User-defined lease time (max ... minutes)
Access users can specify a lease time shorter than or equal to the one that you specified. The default value is the lease time that you specified.
Renew
Access users can click this button to reset the lease time, the amount of time remaining before the Zyxel Device automatically logs them out. The Zyxel Device sets this amount of time according to the:
User-defined lease time field in this screen
Lease time field in the User Add/Edit screen
Lease time field in the Setting screen .
Updating lease time automatically
This box appears if you checked the Allow renewing lease time automatically box in the Setting screen. Access users can select this checkbox to reset the lease time automatically 30 seconds before it expires. Otherwise, access users have to click the Renew button to reset the lease time.
Remaining time before lease timeout
This field displays the amount of lease time that remains, though the user might be able to reset it.
Remaining time before auth. timeout
This field displays the amount of time that remains before the Zyxel Device automatically logs the access user out, regardless of the lease time.
User/Group MAC Address Summary
This screen shows the MAC addresses of wireless clients, which can be authenticated by their MAC addresses using the local user database.
*You need to configure an SSID security profile’s MAC authentication settings to have the AP use the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses.
Configuration > Object > User/Group > MAC Address  
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
MAC Address/OUI
This field displays the MAC address or OUI (Organizationally Unique Identifier of computer hardware manufacturers) of wireless clients using MAC authentication with the Zyxel Device local user database.
Description
This field displays a description of the device identified by the MAC address or OUI.
MAC Address Add/Edit
This screen allows you to create a new allowed device or edit an existing one.
Configuration > Object > User/Group > > Add 
Label
Description
MAC Address/OUI
Type the MAC address (six hexadecimal number pairs separated by colons or hyphens) or OUI (three hexadecimal number pairs separated by colons or hyphens) to identify specific wireless clients for MAC authentication using the Zyxel Device local user database. The OUI is the first three octets in a MAC address and uniquely identifies the manufacturer of a network device.
Description
Enter an optional description of the wireless device(s) identified by the MAC or OUI. You can use up to 60 characters, punctuation marks, and spaces.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
User /Group Technical Reference
This section provides some information on users who use an external authentication server in order to log in.
Setting up User Attributes in an External Server
To set up user attributes, such as reauthentication time, in LDAP or RADIUS servers, use the following keywords in the user configuration file.
LDAP/RADIUS: Keywords for User Attributes 
Keyword
Corresponding Attribute in Web Configurator
type
User Type. Possible Values: admin, limited-admin, dynamic-guest, user, guest.
leaseTime
Lease Time. Possible Values: 1-1440 (minutes).
reauthTime
Reauthentication Time. Possible Values: 1-1440 (minutes).
Creating a Large Number of Ext-User Accounts
If you plan to create a large number of Ext-User accounts, you might use CLI commands, instead of the Web Configurator, to create the accounts. Extract the user names from the LDAP or RADIUS server, and create a shell script that creates the user accounts.
Address/Geo IP Overview
Address objects can represent a single IP address or a range of IP addresses. Address groups are composed of address objects and other address groups.
What You Need To Know
Address objects and address groups are used in dynamic routes, security policies, content filtering, and VPN connection policies. For example, addresses are used to specify where content restrictions apply in content filtering. Please see the respective sections for more information about how address objects and address groups are used in each one.
Address groups are composed of address objects and address groups. The sequence of members in the address group is not important.
Address Summary
The address screens are used to create, maintain, and remove addresses.There are the types of address objects:
HOST - the object uses an IP Address to define a host address
RANGE - the object uses a range address defined by a Starting IP Address and an Ending IP Address
SUBNET - the object uses a network address defined by a Network IP address and Netmask subnet mask
INTERFACE IP - the object uses the IP address of one of the Zyxel Device’s interfaces
INTERFACE SUBNET - the object uses the subnet mask of one of the Zyxel Device’s interfaces
INTERFACE GATEWAY - the object uses the gateway IP address of one of the Zyxel Device’s interfaces
GEOGRAPHY - the object uses the IP addresses of a country to represent a country
FQDN - the object uses a FQDN (Fully Qualified Domain Name). An FQDN consists of a host and domain name. For example, www.zyxel.com is a fully qualified domain name, where “www” is the host, “zyxel” is the second-level domain, and “com” is the top level domain. mail.myZyxel.com.tw is also an FQDN, where “mail” is the host, “myZyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain.
FQDN Example
http://
www.
zyxel.
com
 
host name
second-level domain name
top-level domain name
 
FQDN
Uniform Resource Locator (URL)
In an address FQDN object, you can also use one wildcard. For example, *.zyxel.com.
The Address screen provides a summary of all addresses in the Zyxel Device. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Address/Geo IP > Address 
Label
Description
IPv4 Address Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry
#
This field is a sequential value, and it is not associated with a specific address.
Name
This field displays the configured name of each address object.
Type
This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces.
IPv4 Address
This field displays the IPv4 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Reference
This displays the number of times an object reference is used in a profile.
IPv6 Address Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific address.
Name
This field displays the configured name of each address object.
Type
This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces.
IPv6 Address
This field displays the IPv6 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Reference
This displays the number of times an object reference is used in a profile.
IPv4 Address Add/Edit
The Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4) screen allows you to create a new address or edit an existing one.
The following table describes the labels in this screen.
Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4)
Label
Description
Name
Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Address Type
Select the type of address you want to create.
*The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
IP Address
This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
Starting IP Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
Ending IP Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
Network
This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the IP address of the network that this address object represents.
Netmask
This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the subnet mask of the network that this address object represents. Use dotted decimal format.
Interface
If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents.
Region
If you selected GEOGRAPHY as the Address Type, use this field to select a country or continent.
A GEOGRAPHY object uses the data from the country-to-IP/continent-to-IP address database. Go to the Configuration > Object > Address/Geo IP > Geo IP screen to configure the custom country-to-IP/continent-to-IP address mappings for a GEOGRAPHY object.
Country
If you selected Geography as the Address Type, use this field to select a country.
FQDN
If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
IPv6 Address Add/Edit
The Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6) screen allows you to create a new address or edit an existing one.
The following table describes the labels in this screen.
Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6)
Label
Description
Name
Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Object Type
Select the type of address you want to create.
*The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
IPv6 Address
This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
IPv6 Starting Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
IPv6 Ending Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
IPv6 Address Prefix
This field is only available if the Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address.
Interface
If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents.
IPv6 Address Type
Select whether the IPv6 address is a link-local IP address (LINK LOCAL), static IP address (STATIC), an IPv6 StateLess Address Auto Configuration IP address (SLAAC), or is obtained from a DHCPv6 server (DHCPv6).
Region
If you selected Geography as the Address Type, use this field to select a country or continent.
FQDN
If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Address Group Summary
The Address Group screen provides a summary of all address groups. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Address/Geo IP > Address Group 
Label
Description
IPv4 Address Group Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific address group.
Name
This field displays the name of each address group.
Description
This field displays the description of each address group, if any.
Reference
This displays the number of times an object reference is used in a profile.
IPv6 Address Group Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific address group.
Name
This field displays the name of each address group.
Description
This field displays the description of each address group, if any.
Reference
This displays the number of times an object reference is used in a profile.
Address Group Add/Edit
The Address Group Add/Edit screen allows you to create a new address group or edit an existing one.
IPv4/IPv6 Address Group Configuration > Add 
Label
Description
Name
Enter a name for the address group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description
This field displays the description of each address group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Address Type
Select the type of address you want to create.
*The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
Member List
The Member list displays the names of the address and address group objects that have been added to the address group. The order of members is not important.
Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
*Only objects of the same address type can be added to a address group.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Geo IP Summary
Use this screen to update the database of country-to-IP and continent-to-IP address mappings and manually configure custom country-to-IP and continent-to-IP address mappings in geographic address objects. You can then use geographic address objects in security policies to forward or deny traffic to whole countries or regions.
Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Address/Geo IP > Geo IP 
Label
Description
Country Database Update
Latest Version
This is the latest country-to-IP address database version on myZyxel.
Current Version
This is the country-to-IP address database version currently on the Zyxel Device.
Update Now
Click this to check for the latest country-to-IP address database version on myZyxel. The latest version is downloaded to the Zyxel Device and replaces the current version if it is newer. There are logs to show the update status.
Auto Update
If you want the Zyxel Device to check weekly for the latest country-to-IP address database version on myZyxel, select the checkbox, choose a day and time each week and then click Apply. The default day and time displayed is the Zyxel Device current day and time.
Custom IPv4/IPv6 to Geography Rules
IPv4/IPv6 to Geography
Enter an IP address, then click this button to query which country this IP address belongs to.
Add
Click this to create a new entry.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
#
This field is a sequential value, and it is not associated with a specific entry.
Geolocation
This field displays the name of the country or region that is associated with this IP address.
Type
This field displays whether this address object is HOST, RANGE or SUBNET.
IPv4/IPv6 Address
This field displays the IPv4/IPv6 addresses represented by the type of address object.
Region vs. Continent
Region
Enter a country name, then click the Region to Continent button to query which continent this country belongs to.
Continent
Select a continent, then click the Region List button to query which countries belong to the continent.
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Add Custom IPv4/IPv6 Address to Geography
This screen allows you to create a new geography-to-IP address mapping.
Geo IP > Add 
Label
Description
Region
Select the country or continent that maps to this IP address.
Address Type
Select the type of address you want to create. Choices are: HOST, RANGE, SUBNET.
IP Address
This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
IP Starting Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
IP Ending Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
Network / Netmask
These fields are only available if the IPv4 Address Type is SUBNET. They cannot be blank. Enter the network IP and subnet mask that defines the IPv4 subnet.
IPv6 Address Prefix
This field is only available if the IPv6 Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Service
Use service objects to define TCP applications, UDP applications, and ICMP messages. You can also create service groups to refer to multiple service objects in other features.
What You Need to Know
IP Protocols
IP protocols are based on the eight-bit protocol field in the IP header. This field represents the next-level protocol that is sent in this packet. This section discusses three of the most common IP protocols.
Computers use Transmission Control Protocol (TCP, IP protocol 6) and User Datagram Protocol (UDP, IP protocol 17) to exchange data with each other. TCP guarantees reliable delivery but is slower and more complex. Some uses are FTP, HTTP, SMTP, and TELNET. UDP is simpler and faster but is less reliable. Some uses are DHCP, DNS, RIP, and SNMP.
TCP creates connections between computers to exchange data. Once the connection is established, the computers exchange data. If data arrives out of sequence or is missing, TCP puts it in sequence or waits for the data to be re-transmitted. Then, the connection is terminated.
In contrast, computers use UDP to send short messages to each other. There is no guarantee that the messages arrive in sequence or that the messages arrive at all.
Both TCP and UDP use ports to identify the source and destination. Each port is a 16-bit number. Some port numbers have been standardized and are used by low-level system processes; many others have no particular meaning.
Unlike TCP and UDP, Internet Control Message Protocol (ICMP, IP protocol 1) is mainly used to send error messages or to investigate problems. For example, ICMP is used to send the response if a computer cannot be reached. Another use is ping. ICMP does not guarantee delivery, but networks often treat ICMP messages differently, sometimes looking at the message itself to decide where to send it.
Service Objects and Service Groups
Use service objects to define IP protocols.
TCP applications
UDP applications
ICMP messages
user-defined services (for other types of IP protocols)
These objects are used in policy routes and security policies.
Use service groups when you want to create the same rule for several services, instead of creating separate rules for each service. Service groups may consist of services and other service groups. The sequence of members in the service group is not important.
Service Summary
The Service summary screen provides a summary of all services and their definitions. In addition, this screen allows you to add, edit, and remove services.
Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Service > Service 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific service.
Name
This field displays the name of each service.
Content
This field displays a description of each service.
Reference
This displays the number of times an object reference is used in a profile.
Service Add/Edit
The Service Add/Edit screen allows you to create a new service or edit an existing one.
Configuration > Object > Service > Service > Edit 
Label
Description
Name
Type the name used to refer to the service. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
IP Protocol
Select the protocol the service uses. Choices are: TCP, UDP, ICMP, ICMPv6, and User Defined.
Starting Port
Ending Port
This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports.
ICMP Type
This field appears if the IP Protocol is ICMP or ICMPv6.
Select the ICMP message used by this service. This field displays the message text, not the message number.
IP Protocol Number
This field appears if the IP Protocol is User Defined.
Enter the number of the next-level protocol (IP protocol). Allowed values are 1 - 255.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Service Group Summary
The Service Group summary screen provides a summary of all service groups. In addition, this screen allows you to add, edit, and remove service groups.
*If you want to access the Zyxel Device using HTTP, HTTPS, SSH, and/or, TELNET, you must add them in the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group, which is used in the WAN_to_Device security policy.
Configuration > Object > Service > Service Group 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific service group.
Family
This field displays the Server Group supported type, which is according to your configurations in the Service Group Add/Edit screen.
There are 3 types of families:
IPv4 only
IPv6 only
IPv4 and IPv6
Name
This field displays the name of each service group.
By default, the Zyxel Device uses services starting with “Default_Allow_” in the security policies to allow certain services to connect to the Zyxel Device.
Description
This field displays the description of each service group, if any.
Reference
This displays the number of times an object reference is used in a profile.
Service Group Add/Edit
The Service Group Add/Edit screen allows you to create a new service group or edit an existing one.
Configuration > Object > Service > Service Group > Edit 
Label
Description
Name
Enter the name of the service group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description
Enter a description of the service group, if any. You can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_
&.<>[\]^‘{|} are not allowed.
Configuration
The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important.
Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Schedule Overview
Use schedules to set up one-time and recurring schedules for policy routes, security policies, and content filtering. The Zyxel Device supports one-time and recurring schedules. One-time schedules are effective only once, while recurring schedules usually repeat. Both types of schedules are based on the current date and time in the Zyxel Device.
*Schedules are based on the Zyxel Device’s current date and time.
What You Need to Know
One-time Schedules
One-time schedules begin on a specific start date and time and end on a specific stop date and time. One-time schedules are useful for long holidays and vacation periods.
Recurring Schedules
Recurring schedules begin at a specific start time and end at a specific stop time on selected days of the week (Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday). Recurring schedules always begin and end in the same day. Recurring schedules are useful for defining the workday and off-work hours.
Schedule
The Schedule screen provides a summary of all schedules in the Zyxel Device.
Configuration > Object > Schedule 
Label
Description
One Time
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific schedule.
Name
This field displays the name of the schedule, which is used to refer to the schedule.
Start Day / Time
This field displays the date and time at which the schedule begins.
Stop Day / Time
This field displays the date and time at which the schedule ends.
Reference
This displays the number of times an object reference is used in a profile.
Recurring
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific schedule.
Name
This field displays the name of the schedule, which is used to refer to the schedule.
Start Time
This field displays the time at which the schedule begins.
Stop Time
This field displays the time at which the schedule ends.
Reference
This displays the number of times an object reference is used in a profile.
One-Time Schedule Add/Edit
The One-Time Schedule Add/Edit screen allows you to define a one-time schedule or edit an existing one.
Configuration > Object > Schedule > Edit (One Time) 
Label
Description
Configuration
Name
Type the name used to refer to the one-time schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Day Time
StartDate
Specify the year, month, and day when the schedule begins.
Year - 1900 - 2999
Month - 1 - 12
Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.)
StartTime
Specify the hour and minute when the schedule begins.
Hour - 0 - 23
Minute - 0 - 59
StopDate
Specify the year, month, and day when the schedule ends.
Year - 1900 - 2999
Month - 1 - 12
Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.)
StopTime
Specify the hour and minute when the schedule ends.
Hour - 0 - 23
Minute - 0 - 59
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Recurring Schedule Add/Edit
The Recurring Schedule Add/Edit screen allows you to define a recurring schedule or edit an existing one.
Configuration > Object > Schedule > Edit (Recurring) 
Label
Description
Configuration
Name
Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Date Time
StartTime
Specify the hour and minute when the schedule begins each day.
Hour - 0 - 23
Minute - 0 - 59
StopTime
Specify the hour and minute when the schedule ends each day.
Hour - 0 - 23
Minute - 0 - 59
Weekly
Week Days
Select each day of the week the recurring schedule is effective.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Schedule Group
The Schedule Group screen provides a summary of all groups of schedules in the Zyxel Device. The following table describes the fields in the above screen.
Configuration > Object > Schedule > Schedule Group 
Label
Description
Configuration
 
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific schedule.
Name
This field displays the name of the schedule group, which is used to refer to the schedule.
Description
This field displays the description of the schedule group.
Members
This field lists the members in the schedule group. Each member is separated by a comma.
Reference
This displays the number of times an object reference is used in a profile.
Schedule Group Add/Edit
The Schedule Group Add/Edit screen allows you to define a schedule group or edit an existing one.The following table describes the fields in the above screen.
Configuration > Object > Schedule > Schedule Group > Add
Label
Description
Group Members
 
Name
Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description
Enter a description of the service group, if any. You can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_
&.<>[\]^‘{|} are not allowed.
Member List
The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important.
Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
AAA Server Overview
You can use a AAA (Authentication, Authorization, Accounting) server to provide access control to your network. The AAA server can be a Active Directory, LDAP, or RADIUS server. Use the AAA Server screens to create and manage objects that contain settings for using AAA servers. You use AAA server objects in configuring ext-group-user user objects and authentication method objects .
Directory Service (AD/LDAP)
LDAP/AD allows a client (the Zyxel Device) to connect to a server to retrieve information from a directory.
The following describes the user authentication procedure through an LDAP/AD server.
1 A user logs in with a user name and password pair.
2 The Zyxel Device tries to bind (or log in) to the LDAP/AD server.
3 When the binding process is successful, the Zyxel Device checks the user information in the directory against the user name and password pair.
4 If it matches, the user is allowed access. Otherwise, access is blocked.
RADIUS Server
RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external server instead of (or in addition to) an internal device user database that is limited to the memory capacity of the device. In essence, RADIUS authentication allows you to validate a large number of users from a central location.
ASAS
ASAS (Authenex Strong Authentication System) is a RADIUS server that works with the One-Time Password (OTP) feature. Purchase a Zyxel Device OTP package in order to use this feature. The package contains server software and physical OTP tokens (PIN generators). Do the following to use OTP. See the documentation included on the ASAS’ CD for details.
1 Install the ASAS server software on a computer.
2 Create user accounts on the Zyxel Device and in the ASAS server.
3 Import each token’s database file (located on the included CD) into the server.
4 Assign users to OTP tokens (on the ASAS server).
5 Configure the ASAS as a RADIUS server in the Zyxel Device’s Configuration > Object > AAA Server screens.
6 Give the OTP tokens to (local or remote) users.
AAA Servers Supported by the Zyxel Device
The following lists the types of authentication server the Zyxel Device supports.
Local user database
The Zyxel Device uses the built-in local user database to authenticate administrative users logging into the Zyxel Device’s Web Configurator or network access users logging into the network through the Zyxel Device. You can also use the local user database to authenticate VPN users.
Directory Service (LDAP/AD)
LDAP (Lightweight Directory Access Protocol)/AD (Active Directory) is a directory service that is both a directory and a protocol for controlling access to a network. The directory consists of a database specialized for fast information retrieval and filtering activities. You create and store user profile and login information on the external server.
RADIUS
RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external or built-in RADIUS server. RADIUS authentication allows you to validate a large number of users from a central location.
Directory Structure
The directory entries are arranged in a hierarchical order much like a tree structure. Normally, the directory structure reflects the geographical or organizational boundaries.
Distinguished Name (DN)
A DN uniquely identifies an entry in a directory. A DN consists of attribute-value pairs separated by commas. The leftmost attribute is the Relative Distinguished Name (RDN). This provides a unique name for entries that have the same “parent DN” (“cn=domain1.com, ou=Sales, o=MyCompany” in the following examples).
cn=domain1.com, ou = Sales, o=MyCompany, c=US
cn=domain1.com, ou = Sales, o=MyCompany, c=JP
Base DN
A base DN specifies a directory. A base DN usually contains information such as the name of an organization, a domain name and/or country. For example, o=MyCompany, c=UK where o means organization and c means country.
Bind DN
A bind DN is used to authenticate with an LDAP/AD server. For example a bind DN of cn=zywallAdmin allows the Zyxel Device to log into the LDAP/AD server using the user name of zywallAdmin. The bind DN is used in conjunction with a bind password. When a bind DN is not specified, the Zyxel Device will try to log in as an anonymous user. If the bind password is incorrect, the login will fail.
Use the Active Directory or LDAP screen to manage the list of AD or LDAP servers the Zyxel Device can use in authenticating users.
Configuration > Object > AAA Server > Active Directory (or LDAP)  
label
description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific AD or LDAP server.
Name
This field displays the name of the Active Directory.
Server Address
This is the address of the AD or LDAP server.
Base DN
This specifies a directory. For example, o=Zyxel, c=US.
Adding an Active Directory or LDAP Server
Use this screen to create a new AD or LDAP entry or edit an existing one.
Configuration > Object > AAA Server > Active Directory (or LDAP) > Add 
label
description
Name
Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes.
Description
Enter the description of each server, if any. ou can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_
&.<>[\]^‘{|} are not allowed.
Server Address
Enter the address of the AD or LDAP server.
Backup Server Address
If the AD or LDAP server has a backup server, enter its address here.
Port
Specify the port number on the AD or LDAP server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535.
This port number should be the same on all AD or LDAP server(s) in this group.
Base DN
Specify the directory (up to 127 alphanumerical characters). For example, o=Zyxel, c=US.
This is only for LDAP.
Use SSL
Select Use SSL to establish a secure connection to the AD or LDAP server(s).
Search time limit
Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the AD or LDAP server. In this case, user authentication fails.
Search timeout occurs when either the user information is not in the AD or LDAP server(s) or the AD or LDAP server(s) is down.
Case-sensitive User Names
Select this if the server checks the case of the usernames.
Bind DN
Specify the bind DN for logging into the AD or LDAP server. Enter up to 127 alphanumerical characters.
For example, cn=zywallAdmin specifies zywallAdmin as the user name.
Password
If required, enter the password (up to 15 alphanumerical characters) for the Zyxel Device to bind (or log in) to the AD or LDAP server.
Your password will be encrypted when you configure this field.
Retype to Confirm
Retype your new password for confirmation.
Login Name Attribute
Enter the type of identifier the users are to use to log in. For example “name” or “email address”.
Alternative Login Name Attribute
If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”.
Group Membership Attribute
An AD or LDAP server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device is to check to determine to which group a user belongs. The value for this attribute is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values.
For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”.
Domain Authentication for MSChap
Select the Enable checkbox to enable domain authentication for MSChap.
This is only for Active Directory.
User Name
Enter the user name for the user who has rights to add a machine to the domain.
This is only for Active Directory.
User Password
Enter the password for the associated user name.
This is only for Active Directory.
Retype to Confirm
Retype your new password for confirmation.
This is only for Active Directory.
Realm
Enter the realm FQDN.
This is only for Active Directory.
NetBIOS Name
Type the NetBIOS name. This field is optional. NetBIOS packets are TCP or UDP packets that enable a computer to connect to and communicate with a LAN which allows local computers to find computers on the remote network and vice versa.
Configuration Validation
Use a user account from the server specified above to test if the configuration is correct. Enter the account’s user name in the Username field and click Test.
OK
Click OK to save the changes.
Cancel
Click Cancel to discard the changes.
RADIUS Server Summary
Use the RADIUS screen to manage the list of RADIUS servers the Zyxel Device can use in authenticating users.
Configuration > Object > AAA Server > RADIUS 
label
description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field displays the index number.
Name
This is the name of the RADIUS server entry.
Server Address
This is the address of the AD or LDAP server.
Adding a RADIUS Server
Use this screen to create a new AD or LDAP entry or edit an existing one.
Configuration > Object > AAA Server > RADIUS > Add 
label
description
Name
Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes.
Description
Enter the description of each server, if any. ou can use 1 to 60 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_
&.<>[\]^‘{|} are not allowed.
Server Address
Enter the address of the RADIUS server.
Authentication Port
Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535.
Backup Server Address
If the RADIUS server has a backup server, enter its address here.
Backup Authentication Port
Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535.
Key
Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device. Your password will be encrypted when you configure this field.
The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device.
Change of Authorization
The external RADIUS server can change its authentication policy and send CoA (Change of Authorization) or RADIUS Disconnect messages in order to terminate the subscriber’s service.
Select this option to allow the Zyxel Device to disconnect wireless clients based on the information (such as client’s user name and MAC address) specified in CoA or RADIUS Disconnect messages sent by the RADIUS server.
Server Address
Enter the IP address or Fully-Qualified Domain Name (FQDN) of the RADIUS accounting server.
Accounting Port
Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535.
Backup Server Address
If the RADIUS server has a backup accounting server, enter its address here.
Backup Accounting Port
Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535.
Key
Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device.
The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device.
Maximum Retry Count
At times the Zyxel Device may not be able to use the primary RADIUS accounting server. Specify the number of times the Zyxel Device should reattempt to use the primary RADIUS server before attempting to use the secondary RADIUS server. This also sets how many times the Zyxel Device will attempt to use the secondary RADIUS server.
For example, you set this field to 3. If the Zyxel Device does not get a response from the primary RADIUS server, it tries again up to three times. If there is no response, the Zyxel Device tries the secondary RADIUS server up to three times.
If there is also no response from the secondary RADIUS server, the Zyxel Device stops attempting to authenticate the subscriber. The subscriber will see a message that says the RADIUS server was not found.
Enable Accounting Interim Update
This field is configurable only after you configure a RADIUS accounting server address. Select this to have the Zyxel Device send subscriber status updates to the RADIUS server at the interval you specify.
Interim Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the RADIUS server.
Timeout
Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the RADIUS server. In this case, user authentication fails.
Search timeout occurs when either the user information is not in the RADIUS server or the RADIUS server is down.
NAS IP Address
Type the IP address of the NAS (Network Access Server).
NAS Identifier
If the RADIUS server requires the Zyxel Device to provide the Network Access Server identifier attribute with a specific value, enter it here.
Case-sensitive User Names
Select this if you want configure your username as case-sensitive.
Group Membership Attribute
A RADIUS server defines attributes for its accounts. Select the name and number of the attribute that the Zyxel Device is to check to determine to which group a user belongs. If it does not display, select user-defined and specify the attribute’s number.
This attribute’s value is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values.
For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”.
OK
Click OK to save the changes.
Cancel
Click Cancel to discard the changes.
Auth. Method
Authentication method objects set how the Zyxel Device authenticates wireless, HTTP/HTTPS clients, and peer IPSec routers (extended authentication) clients. Configure authentication method objects to have the Zyxel Device use the local user database, and/or the authentication servers and authentication server groups specified by AAA server objects. By default, user accounts created and stored on the Zyxel Device are authenticated locally.
Configure AAA server objects before you configure authentication method objects.
Authentication Method Objects
*You can create up to 16 authentication method objects.
Configuration > Object > Auth. Method 
label
description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field displays the index number.
Method Name
This field displays a descriptive name for identification purposes.
Server Profile/Server Type
This field displays the authentication method(s) for this entry.
Creating an Authentication Method Object
Follow the steps below to create an authentication method object.
1 Click Configuration > Object > Auth. Method.
2 Click Add.
3 Specify a descriptive name for identification purposes in the Name field. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”.
4 Click Add to insert an authentication method in the table.
5 Select a server object from the Method List drop-down list box.
6 You can add up to four server objects to the table. The ordering of the Method List column is important. The Zyxel Device authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen.
If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server.
*You can NoT select two server objects of the same type.
7 Click OK to save the settings or click Cancel to discard all changes and return to the previous screen.
The following table describes the labels in this screen.
Configuration > Object > Auth. Method > Add 
label
description
Name
Specify a descriptive name for identification purposes.
You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”.
Add
Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
Move
To change a method’s position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed.
The ordering of your methods is important as Zyxel Device authenticates the users using the authentication methods in the order they appear in this screen.
#
This field displays the index number.
Method List
Select a server object from the drop-down list box. You can create a server object in the AAA Server screen.
The Zyxel Device authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen.
If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server.
OK
Click OK to save the changes.
Cancel
Click Cancel to discard the changes.
Two-Factor Authentication
Use two-factor authentication to have double-layer security to access the Zyxel Device through a VPN tunnel, Web Configurator, SSH, or Telnet.
The first layer is the VPN client/Zyxel Device’s login user name / password and the second layer is an authorized SMS (through mobile phone number) or email address.
Overview
This section introduces how two-factor authentication works.
VPN Access Through a VPN Tunnel
1 A user runs a VPN client and logs in with the user name and password for this VPN tunnel.
2 The VPN client connects to the Zyxel Device and authenticates using the specified username and password.
3 The Zyxel Device requests the user’s user-name, password and mobile phone number or email address from the Active Directory (AD), RADIUS server or local Zyxel Device database in order to authenticate this user (factor 1). If they are not found, then the Zyxel Device terminates the connection.
4 If all correct credentials are found, then the Zyxel Device performs one of the following actions:
Emails an authorization link to the admin user
Requests that the Email-to-SMS cloud system send an SMS with the authorization link
5 The client must open the authorization link or enter the authorization code within a specified deadline (Valid Time).
6 If the authorization is correct and received on time, then the client can access the secured network (SN) through the VPN tunnel. If the authorization deadline has expired, then the client has to log into the Zyxel Device again. If authorization credentials are incorrect or if the SMS/email was not received, then the client should contact the network administrator.
Admin Access Through the Web Configurator, SSH, or Telnet
1 An admin user connects to the Zyxel Device through the Web Configurator, SSH, or Telnet.
2 The Zyxel Device requests the admin user’s user-name, password and mobile phone number or email address from the Active Directory (AD), RADIUS server or local Zyxel Device database in order to authenticate this admin user.
3 If all correct credentials are found, then the Zyxel Device performs one of the following actions:
Requests the Google Authenticator code
Emails an authorization link or code to the admin user
Requests that the Email-to-SMS cloud system send an SMS with an authorization link or code
4 The admin user must open the authorization link or enter the authorization code within a specified deadline (Valid Time).
5 If the authorization is correct and received on time, then the admin user can log into Zyxel Device. If the authorization deadline has expired, then the admin user has to log in again. If authorization credentials are incorrect code was received, then the admin user should contact the network administrator.
Pre-configuration
Before configuration, you must:
Set up the user’s user-name, password and email address or mobile number in the Active Directory, RADIUS server or local Zyxel Device database
Enable Two-factor Authentication in Object > User/Group > User > Edit > Two-factor Authentication for a specific user
Enable Two-factor Authentication in Object > Auth. Method > Two-factor Authentication for the Zyxel Device
Enable HTTP and/or HTTPS in System > WWW > Service Control
Enable SSH and/or Telnet in System > SSH and/or System > TELNET
Add HTTP, HTTPS, SSH, and/or, TELNET in the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group. This service group defines the default services allowed in the WAN_to_Device security policy.
For VPN access, configure the VPN tunnel for this user on the Zyxel Device
Email Authentication
Configure Mail Server in System > Notification > Mail Server.
SMS Authentication
Configure Mail Server in System > Notification > Mail Server.
Configure SMS in System > Notification > SMS.
Have an account with an Email-to-SMS cloud provider to be able to send SMS authorization requests
Google Authentication
Install Google Authenticator
Two-Factor authentication will fail under the following conditions:
You omit any of the pre-configuration items. Make sure to perform all pre-configuration items.
The user cannot receive the authorization SMS or email. Make sure the mobile telephone number or email address of the user in the Active Directory, RADIUS Server or local Zyxel Device database is configured correctly.
Email-to-SMS cloud system authentication fails. Make sure that SMS is enabled and credentials are correct in System > Notification > SMS.
Mail server authentication fails. Make sure the System > Notification > Mail Server settings are correct.
Authorization times out. Extend the Valid Time in Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access.
You are unable to access Google Authenticator (you lost your phone or uninstalled the app). Log in using one of the backup codes.
You get a Google Authenticator verification error. You must enter the code within the time displayed in Google Authenticator. The time on your cellphone and the time on the Zyxel Device must be the same.
Google Authenticator Settings
The following is a list of specifications and limitations on using Google Authenticator for two-factor authentication.
Ext-users (authenticated by external servers) are not supported.
A user must setup Google Authenticator on their mobile device before they can successfully authenticate with the Zyxel Device.
Verification code length: 6 digits.
Maximum verification code failed attempts: 3
Backup code length: 8 digits
Google authenticator is supported in device High Availability (HA) mode. The secret keys are synchronized between all Zyxel Devices.
You can configure two-factor authentication for non-VPN and non-admin users in web authentication.
*The admin two-factor authentication settings override the web authentication two-factor authentication settings if both are configured.
Two-Factor Authentication VPN Access
Use this screen to select the users and VPN services that requires two-factor authentication.
The following table describes the labels in this screen.
Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access
label
description
General Settings
 
Enable
Select the checkbox to require double-layer security to access the Zyxel Device through a VPN tunnel.
Valid Time
Enter the maximum time (in minutes) that the user must tap or click the authorization link in the SMS or email in order to get authorization for the VPN connection.
Two-factor Authentication for Services:
Select which kinds of VPN tunnels require Two-Factor Authentication. You should have configured the VPN tunnel first.
SSL VPN Access
IPSec VPN Access
L2TP/IPSec VPN Access
User/Group
This list displays the names of the users and user groups that can be selected for two-factor authentication. The order of members is not important. Select users and groups from the Selectable User/Group Objects list that require two-factor authentication for VPN access to a secured network behind the Zyxel Device and move them to the Selected User/Group Objects list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Similarly, move user/groups that do not you do not require two-factor authentication back to the Selectable User/Group Objects list.
Delivery Settings
Use this section to configure how to send an SMS or email for authorization.
Deliver Authorize Link Method:
The second factor authentication is done by sending a URL link by text (SMS) or email, or using Google Authenticator. Select one or up to three methods. You will get a URL link by text and email, and a authentication code for Google Authenticator if you select all three methods. Log in to the Zyxel Device by either clicking the URL in the text or email you received, or enter the authentication code in Google Authenticator.
SMS: Object > User/Group > User must contain a valid mobile telephone number. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-].
Email: Object > User/Group > User must contain a valid email address. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com
Google Authenticator: You must first set up your Zyxel Device on the Google Authenticator app in Configuration > Object > User/Group > User > Add > Two-factor Authentication; see User Add/Edit Two-factor Authentication for more information. Then enter a time-limited code from the Google Authenticator app.
Authorize Link URL Address:
Configure the link that the user will receive in the SMS or email. The user must be able to access the link.
http/https: you must enable HTTP or HTTPS in System > WWW > Service Control
From Interface/User-Defined: select the Zyxel Device WAN interface (wan1/2) or select User-Defined and then enter an IP address.
Authorized Port
Configure a new port between 1024 to 65535 that is not in use by other services.
Use this port for two-factor authentication of VPN clients to access the network behind the Zyxel Device. VPN clients do not need to change the port number on their devices, because the link to access the network behind the Zyxel Devices will contain the new port number.
For example, if you change this to port 8008 and the link is using a.b.c.d, then VPN clients will see this link in their email or SMS to retrieve settings: https://a.b.c.d:8008.
Message
You can either create a default message in the text box or upload a message file (Use Multilingual file) from your computer. The message file must be named '2FA-msg.txt' and be in UTF-8 format. To create the file, click Download the default 2FA-msg.txt example and edit the file for your needs. (If you make a mistake, use Restore Customized File to Default to restore your customized file to the default.) Use Select a File Path to locate the final file on your computer and then click Upload to transfer it to the Zyxel Device.
The message in either the text box or the file must contain the <url> variable within angle brackets, while the <user>, <host>, and <time> variables are optional.
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Two-Factor Authentication Admin Access
Use this screen to select the service (Web, SSH, and TELNET) that requires two-factor authentication for the admin user.
The following table describes the labels in this screen.
Configuration > Object > Auth. Method > Two-factor Authentication > Admin Access 
label
description
General Settings
 
Enable
Select the checkbox to require double-layer security to access the Zyxel Device through the Web Configurator, SSH, or Telnet.
Valid Time
Enter the maximum time (in minutes) that the user must click or tap the authorization link in the SMS or email in order to get authorization for logins through the Web Configurator, SSH, or Telnet.
Two-factor Authentication for Services:
Select which services require Two-Factor Authentication for the admin user.
Web
SSH
TELNET
Delivery Settings
Use this section to configure how to send an SMS or email for authorization.
Verification Code Delivery Method
Select one or both (All) methods:
SMS: Object > User/Group > User must contain a valid mobile telephone number. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-].
Email: Object > User/Group > User must contain a valid email address. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Example: Admin Login with Two-factor Authentication by SMS
Email-to-SMS service allows you to convert an email to a SMS message with an authentication code that is used for two-factor authentication login to the Zyxel Device. The user can receive an SMS message even if he has no Internet connection.
1 First subscribe for an Email-to-SMS service. Enter the email address which will send email to the Email-to-SMS service.
2 Then, in the Zyxel Device web configurator, go to CONFIGURATION > System > Notification > SMS and enter the SMS Provider Email server domain name in Provider Domain, and the sender’s email address in Mail From.
3 Next, go to CONFIGURATION > System > Notification > Mail to set up the following fields for the mail server:
Mail server
Mail server ports
Mail From
SMTP Authentication
4 Then go to Configuration > Object > User/Group > User > Add to create an admin type user. Enter the phone number for this user to receive SMS messages.
5 Next, set up two-factor authentication for this user in CONFIGURATION > Object > Auth Method > Two-Factor Authentication > Admin Access. Select which services, HTTPS (web), SSH and/or Telnet which requires Two-Factor authentication, and the user. Select SMS to send the verification code by SMS.
When this user logs into the Zyxel Device he will be asked to enter the verification code that was sent by SMS to his mobile phone.
Certificate Overview
The Zyxel Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure.
These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it should look. When people know what your signature looks like, they can verify whether something was signed by you, or by someone else. In the same way, your private key “writes” your digital signature and your public key allows people to verify whether data was signed by you, or by someone else. This process works as follows.
1 Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that the message content has not been altered by anyone else along the way. Tim generates a public key pair (one public key and one private key).
2 Tim keeps the private key and makes the public key openly available. This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not.
3 Tim uses his private key to sign the message and sends it to Jenny.
4 Jenny receives the message and uses Tim’s public key to verify it. Jenny knows that the message is from Tim, and that although other people may have been able to read the message, no-one can have altered it (because they cannot re-sign the message with Tim’s private key).
5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny’s public key to verify the message.
The Zyxel Device uses certificates based on public-key cryptology to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection. For example, a VPN tunnel might use the triple DES encryption algorithm.
The certification authority uses its private key to sign certificates. Anyone can then use the certification authority’s public key to verify the certificates.
A certification path is the hierarchy of certification authority certificates that validate a certificate. The Zyxel Device does not trust a certificate if any certificate on its path has expired or been revoked.
Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The Zyxel Device can check a peer’s certificate against a directory server’s list of revoked certificates. The framework of servers, software, procedures and policies that handles keys is called PKI (public-key infrastructure).
Advantages of Certificates
Certificates offer the following benefits.
The Zyxel Device only has to store the certificates of the certification authorities that you decide to trust, no matter how many devices you need to authenticate.
Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys.
Self-signed Certificates
You can have the Zyxel Device act as a certification authority and sign its own certificates.
Factory Default Certificate
The Zyxel Device generates its own unique self-signed certificate when you first turn it on. This certificate is referred to in the GUI as the factory default certificate.
Certificate File Formats
Any certificate that you want to import has to be in one of these file formats:
Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.
PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.
Binary PKCS#7: This is a standard that defines the general syntax for data (including digital signatures) that may be encrypted. A PKCS #7 file is used to transfer a public key certificate. The private key is not included. The Zyxel Device currently allows the importation of a PKS#7 file that contains a single certificate.
PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses lowercase letters, uppercase letters and numerals to convert a binary PKCS#7 certificate into a printable form.
Binary PKCS#12: This is a format for transferring public key and private key certificates. The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the Zyxel Device.
*Be careful not to convert a binary file to text during the transfer process. It is easy for this to occur since many programs use text files by default.
Verifying a Certificate
Before you import a trusted certificate into the Zyxel Device, you should verify that you have the correct certificate. You can do this using the certificate’s fingerprint. A certificate’s fingerprint is a message digest calculated using the MD5 or SHA1 algorithm. The following procedure describes how to check a certificate’s fingerprint to verify that you have the actual certificate.
1 Browse to where you have the certificate saved on your computer.
2 Make sure that the certificate has a “.cer” or “.crt” file name extension.
3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.
4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection.
The My Certificates Screen
This is the Zyxel Device’s summary list of certificates and certification requests.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates 
Label
Description
PKI Storage Space in Use
This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Add
Click this to go to the screen where you can have the Zyxel Device generate a certificate or a certification request.
Edit
Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate.
Remove
The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action.
References
You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry.
Download
Click this and the following screen will appear.
Type the selected certificate’s password and save the selected certificate to your computer.
Email
Click this to email the selected certificate to the configured email address(es) for SSL connection establishment. This enables you to establish an SSL connection on your laptops, tablets, or smartphones.
 
Mail Subject: Type the subject line for outgoing email from the Zyxel Device.
Mail To: Type the email address (or addresses) to which the outgoing email is delivered.
Send Certificate with Private Key: Select the checkbox to send the selected certificate with a private key.
Password: Enter a private key of up to 31 keyboard characters for the certificate. The special characters listed in the brackets [;\|`~!@#$%^&*()_+\\{}':,./<>=-"] are allowed.
E-mail Content: Create the email content in English, and use up to 250 keyboard characters. The special characters listed in the brackets [;\|`~!@#$%^&*()_+\\{}':,./<>=-"] are allowed.
Compress as a ZIP File: Select the checkbox to compress the selected certificate.
Make sure the endpoint devices can decompress ZIP files before sending the compressed certificate.
It's recommended to compress the certificate with a private key. Some email servers block PKCS #12 files.
Send Email: Click this to send the selected certificate.
Cancel: Click this to return to the previous screen without saving your changes.
#
This field displays the certificate index number. The certificates are listed in alphabetical order.
Name
This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name.
Type
This field displays what kind of certificate this is.
REQ represents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate. Use the My Certificate Import screen to import the certificate and replace the request.
SELF represents a self-signed certificate.
CERT represents a certificate issued by a certification authority.
Subject
This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
Import
Click Import to open a screen where you can save a certificate to the Zyxel Device.
Refresh
Click Refresh to display the current validity status of the certificates.
My Certificates Add
Use this screen to have the Zyxel Device create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates > Add 
Label
Description
Name
Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Subject Information
Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although you must specify a Host IP Address, Host IPv6 Address, Host Domain Name, or E-Mail. The certification authority may add fields (such as a serial number) to the subject information when it issues a certificate. It is recommended that each certificate have unique subject information.
Select a radio button to identify the certificate’s owner by IP address, domain name or email address. Type the IP address (in dotted decimal notation), domain name or email address in the field provided. The domain name or email address is for identification purposes only and can be any string.
A domain name can be up to 255 characters. You can use alphanumeric characters, the hyphen and periods.
An email address can be up to 63 characters. You can use alphanumeric characters, the hyphen, the @ symbol, periods and the underscore.
Organizational Unit
Identify the organizational unit or department to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Organization
Identify the company or group to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Town (City)
Identify the town or city where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
State, (Province)
Identify the state or province where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Country
Enter a two-letter country code to Identify the nation where the certificate owner is located.
Key Type
This sets the certificate’s encryption algorithm and signature hash algorithm.
Encryption algorithms:
RSA: Rivest, Shamir and Adleman public-key algorithm.
DSA: Digital Signature Algorithm public-key algorithm.
ECDSA: Elliptic Curve Digital Signature Algorithm.
Signature hash algorithms:
SHA256
SHA384
SHA512
RSA and SHA256 are less secure but more compatible with different clients and applications. ECDSA and SHA512 are the more secure but less compatible.
Key Length
Select a number from the drop-down list box to determine how many bits the key should use (1024 to 2048). The longer the key, the more secure it is. A longer key also uses more PKI storage space. ECDSA keys are significant shorter than RSA and DSA keys, while offering equal or higher security.
LifeTimes
Select how long the certificate is valid. It can be valid from 2 to 10 years.
Extended Key Usage
 
Server Authentication
Select this to have Zyxel Device generate and store a request for server authentication certificate.
Client Authentication
Select this to have Zyxel Device generate and store a request for client authentication certificate.
IKE Intermediate
Select this to have Zyxel Device generate and store a request for IKE Intermediate authentication certificate.
Create a self-signed certificate
Select this to have the Zyxel Device generate the certificate and act as the Certification Authority (CA) itself. This way you do not need to apply to a certification authority for certificates.
Create a certification request and save it locally for later manual enrollment
Select this to have the Zyxel Device generate and store a request for a certificate. Use the My Certificate Details screen to view the certification request and copy it to send to the certification authority.
Copy the certification request from the My Certificate Details screen and then send it to the certification authority.
OK
Click OK to begin certificate or certification request generation.
Cancel
Click Cancel to quit and return to the My Certificates screen.
If you configured the My Certificate Create screen to have the Zyxel Device enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen. Click Return and check your information in the My Certificate Create screen. Make sure that the certification authority information is correct and that your Internet connection is working properly if you want the Zyxel Device to enroll a certificate online.
My Certificates Edit
You can use this screen to view in-depth certificate information and change the certificate’s name.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates > Edit 
Label
Description
Name
This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Certification Path
This field displays for a certificate, not a certification request.
Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
If the issuing certification authority is one that you have imported as a trusted certification authority, it may be the only certification authority in the list (along with the certificate itself). If the certificate is a self-signed certificate, the certificate itself is the only one in the list. The Zyxel Device does not trust the certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked.
Refresh
Click Refresh to display the certification path.
Certificate Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). “X.509” means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification authority or generated by the Zyxel Device.
Subject
This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O), State (ST), and Country (C).
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country.
With self-signed certificates, this is the same as the Subject Name field.
“none” displays for a certification request.
Signature Algorithm
This field displays the type of algorithm that was used to sign the certificate. The Zyxel Device uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Some certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. “none” displays for a certification request.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. “none” displays for a certification request.
Key Algorithm
This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example).
Subject Alternative Name
This field displays the certificate owner‘s IP address (IP), domain name (DNS) or email address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text.
Extended Key Usage
This field displays how the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate.
Basic Constraint
This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path. This field does not display for a certification request.
MD5 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm.
SHA1 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm.
Certificate in PEM (Base-64) Encoded Format
This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form.
You can copy and paste a certification request into a certification authority’s web page, an email that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment.
You can copy and paste a certificate into an email to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution (through external storage device for example).
Export Certificate Only
Use this button to save a copy of the certificate without its private key. Click this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
Password
If you want to export the certificate with its private key, create a password and type it here. Make sure you keep this password in a safe place. You will need to use it if you import the certificate to another device.
Export Certificate with Private Key
Use this button to save a copy of the certificate with its private key. Type the certificate’s password and click this button. Click Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
OK
Click OK to save your changes back to the Zyxel Device. You can only change the name.
Cancel
Click Cancel to quit and return to the My Certificates screen.
My Certificates Import
Follow the instructions in this screen to save an existing certificate to the Zyxel Device.
*You can import a certificate that matches a corresponding certification request that was generated by the Zyxel Device. You can also import a certificate in PKCS#12 format, including the certificate’s public and private keys.
The certificate you import replaces the corresponding request in the My Certificates screen.
You must remove any spaces from the certificate’s filename before you can import it.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates > Import 
Label
Description
File Path
Type in the location of the file you want to upload in this field or click Browse to find it.
You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device.
Browse
Click Browse to find the certificate file you want to upload.
Password
This field only applies when you import a binary PKCS#12 format file. Type the file’s password that was created when the PKCS #12 file was exported.
OK
Click OK to save the certificate on the Zyxel Device.
Cancel
Click Cancel to quit and return to the My Certificates screen.
Trusted Certificates
This screen displays a summary list of certificates that you have set the Zyxel Device to accept as trusted. The Zyxel Device also accepts any valid certificate signed by a certificate on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certificates.
The following table describes the labels in this screen.
Configuration > Object > Certificate > Trusted Certificates 
Label
Description
PKI Storage Space in Use
This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Edit
Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate.
Remove
The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action.
References
You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry.
#
This field displays the certificate index number. The certificates are listed in alphabetical order.
Name
This field displays the name used to identify this certificate.
Subject
This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
Import
Click Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the Zyxel Device.
Refresh
Click this button to display the current validity status of the certificates.
Trusted Certificates Edit
Use this screen to view in-depth information about the certificate, change the certificate’s name and set whether or not you want the Zyxel Device to check a certification authority’s list of revoked certificates before trusting a certificate issued by the certification authority.
The following table describes the labels in this screen.
Configuration > Object > Certificate > Trusted Certificates > Edit 
Label
Description
Name
This field displays the identifying name of this certificate. You can change the name. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Certification Path
Click the Refresh button to have this read-only text box display the end entity’s certificate and a list of certification authority certificates that shows the hierarchy of certification authorities that validate the end entity’s certificate. If the issuing certification authority is one that you have imported as a trusted certificate, it may be the only certification authority in the list (along with the end entity’s own certificate). The Zyxel Device does not trust the end entity’s certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked.
Refresh
Click Refresh to display the certification path.
Enable X.509v3 CRL Distribution Points and OCSP checking
Select this checkbox to turn on/off certificate revocation. When it is turned on, the Zyxel Device validates a certificate by getting Certificate Revocation List (CRL) through HTTP or LDAP (can be configured after selecting the LDAP Server checkbox) and online responder (can be configured after selecting the OCSP Server checkbox).
OCSP Server
Select this checkbox if the directory server uses OCSP (Online Certificate Status Protocol).
URL
Type the protocol, IP address and path name of the OCSP server.
ID
The Zyxel Device may need to authenticate itself in order to assess the OCSP server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority).
Password
Type the password (up to 31 ASCII characters) from the entity maintaining the OCSP server (usually a certification authority).
LDAP Server
Select this checkbox if the directory server uses LDAP (Lightweight Directory Access Protocol). LDAP is a protocol over TCP that specifies how clients access directories of certificates and lists of revoked certificates.
Address
Type the IP address (in dotted decimal notation) of the directory server.
Port
Use this field to specify the LDAP server port number. You must use the same server port number that the directory server uses. 389 is the default server port number for LDAP.
ID
The Zyxel Device may need to authenticate itself in order to assess the CRL directory server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority).
Password
Type the password (up to 31 ASCII characters) from the entity maintaining the CRL directory server (usually a certification authority).
Certificate Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification authority.
Subject
This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C).
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country.
With self-signed certificates, this is the same information as in the Subject Name field.
Signature Algorithm
This field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired.
Key Algorithm
This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example).
Subject Alternative Name
This field displays the certificate’s owner‘s IP address (IP), domain name (DNS) or email address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text.
Extended Key Usage
This field displays the method that the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate.Zyxel Device
Basic Constraint
This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path.
MD5 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
SHA1 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
Certificate
This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form.
You can copy and paste the certificate into an email to send to friends or colleagues or you can copy and paste the certificate into a text editor and save the file on a management computer for later distribution (through external storage device for example).
Export Certificate
Click this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
OK
Click OK to save your changes back to the Zyxel Device. You can only change the name.
Cancel
Click Cancel to quit and return to the Trusted Certificates screen.
Trusted Certificates Import
Follow the instructions in this screen to save a trusted certificate to the Zyxel Device.
*You must remove any spaces from the certificate’s filename before you can import the certificate.
The following table describes the labels in this screen.
Configuration > Object > Certificate > Trusted Certificates > Import 
Label
Description
File Path
Type in the location of the file you want to upload in this field or click Browse to find it.
You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device.
Browse
Click Browse to find the certificate file you want to upload.
OK
Click OK to save the certificate on the Zyxel Device.
Cancel
Click Cancel to quit and return to the previous screen.
ISP Account Overview
Use ISP accounts to manage Internet Service Provider (ISP) account information for PPPoE/PPTP/L2TP interfaces. An ISP account is a profile of settings for Internet access using PPPoE, PPTP or L2TP.
ISP Account Summary
This screen provides a summary of ISP accounts in the Zyxel Device.
The following table describes the labels in this screen.
Configuration > Object > ISP Account 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific entry.
Profile Name
This field displays the profile name of the ISP account. This name is used to identify the ISP account.
Protocol
This field displays the protocol used by the ISP account.
Authentication Type
This field displays the authentication type used by the ISP account.
User Name
This field displays the user name of the ISP account.
ISP Account Add/Edit
The ISP Account Add/Edit screen lets you add information about new accounts and edit information about existing accounts.
The following table describes the labels in this screen.
Configuration > Object > ISP Account > Edit 
Label
Description
Profile Name
This field is read-only if you are editing an existing account. Type in the profile name of the ISP account. The profile name is used to refer to the ISP account. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Protocol
This field is read-only if you are editing an existing account. Select the protocol used by the ISP account. Your ISP will provide you with a related username, password and IP (server) information. Options are:
pppoe - This ISP account uses the PPPoE protocol.
pptp - This ISP account uses the PPTP protocol.
l2tp - This ISP account uses the L2TP protocol.
Authentication Type
Use the drop-down list box to select an authentication protocol for outgoing calls. Options are:
CHAP/PAP - Your Zyxel Device accepts either CHAP or PAP when requested by this remote node.
Chap - Your Zyxel Device accepts CHAP only.
PAP - Your Zyxel Device accepts PAP only.
MSCHAP - Your Zyxel Device accepts MSCHAP only.
MSCHAP-V2 - Your Zyxel Device accepts MSCHAP-V2 only.
Encryption Method
This field is available if this ISP account uses the PPTP protocol. Use the drop-down list box to select the type of Microsoft Point-to-Point Encryption (MPPE). Options are:
nomppe - This ISP account does not use MPPE.
mppe-40 - This ISP account uses 40-bit MPPE.
mppe-128 - This ISP account uses 128-bit MMPE.
User Name
Type the user name given to you by your ISP.
Password
Type the password associated with the user name above. The password can only consist of alphanumeric characters (A-Z, a-z, 0-9). This field can be blank.
Your password will be encrypted when you configure this field.
Retype to Confirm
Type your password again to make sure that you have entered is correctly.
IP Address/FQDN
Enter the IP address or Fully-Qualified Domain Name (FQDN) of the PPTP or L2TP server.
Connection ID
This field is available if this ISP account uses the PPTP protocol. Type your identification name for the PPTP server. This field can be blank.
Service Name
If this ISP account uses the PPPoE protocol, type the PPPoE service name to access. PPPoE uses the specified service name to identify and reach the PPPoE server. This field can be blank.
If this ISP account uses the PPTP protocol, this field is not displayed.
Compression
Select On button to turn on stac compression, and select Off to turn off stac compression. Stac compression is a data compression technique capable of compressing data by a factor of about four.
Idle Timeout
This value specifies the number of seconds that must elapse without outbound traffic before the Zyxel Device automatically disconnects from the PPPoE/PPTP server. This value must be an integer between 0 and 360. If this value is zero, this timeout is disabled.
OK
Click OK to save your changes back to the Zyxel Device. If there are no errors, the program returns to the ISP Account screen. If there are errors, a message box explains the error, and the program stays in the ISP Account Edit screen.
Cancel
Click Cancel to return to the ISP Account screen without creating the profile (if it is new) or saving any changes to the profile (if it already exists).