NBG-419N v2 Wireless N NetUSB Router Default Login Details LAN IP Address http://192.168.1.1 Password Version 1.00 Edition 2, 04/2012 1234 IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. www.zyxel.com www.zyxel.
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Graphics in this book may differ slightly from the product due to differences in operating systems, operating system versions, or if you installed updated firmware/software for your device. Every effort has been made to ensure that the information in this manual is accurate. Related Documentation • Quick Start Guide The Quick Start Guid shows how to connect the NBG-419N v2 and access the Web Configurator .
Contents Overview Contents Overview User’s Guide .......................................................................................................................................13 Getting to Know Your Router ..................................................................................................................15 ZyXEL NetUSB Share Center Utility .......................................................................................................20 Connection Wizard .....................
Contents Overview 4 NBG-419N v2 User’s Guide
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ......................................................................................... 13 Chapter 1 Getting to Know Your Router............................
Table of Contents 3.5 Wireless Security ..............................................................................................................................34 3.5.1 Wireless Security: No Security ................................................................................................34 3.5.2 Wireless Security: WPA-PSK/WPA2-PSK ...............................................................................35 Chapter 4 Introducing the Web Configurator ......................................
Table of Contents 7.6.5 Firewall ....................................................................................................................................58 7.6.6 Wireless Security .....................................................................................................................58 7.6.7 WPS ........................................................................................................................................60 7.7 Status Screen in Easy Mode ...................
Table of Contents 11.3.2 PIN Configuration ...................................................................................................................89 11.4 Enabling and Configuring Wireless Security (No WPS) ..................................................................91 11.4.1 Configure Your Notebook .......................................................................................................92 11.5 Connecting to USB Storage with the ZyXEL NetUSB Share Center Utility .............
Table of Contents Chapter 14 LAN ....................................................................................................................................................131 14.1 Overview .......................................................................................................................................131 14.2 What You Can Do .........................................................................................................................131 14.
Table of Contents 19.1 Overview ......................................................................................................................................151 19.2 What You Can Do .........................................................................................................................151 19.3 RIP Screen ..................................................................................................................................151 Chapter 20 Firewall ........................
Table of Contents 24.1 Overview ......................................................................................................................................171 24.2 What You Can Do .........................................................................................................................171 24.3 What You Need to Know ...............................................................................................................171 24.3.1 NAT Traversal ................................
Table of Contents 12 NBG-419N v2 User’s Guide
P ART I User’s Guide 13
C HAPT ER 1 Getting to Know Your Router 1.1 Overview This chapter introduces the main features and applications of the Router. The Router extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/ n compatible devices. A range of services such as a firewall and content filtering are also available for secure Internet computing.
Chapter 1 Getting to Know Your Router • Web Configurator. This is recommended for everyday management of the Router using a (supported) web browser. • Wireless switch. You can use the built-in switch of the Router to turn the wireless function on and off without opening the Web Configurator. • WPS (Wi-Fi Protected Setup) button. You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your Router. 1.
Chapter 1 Getting to Know Your Router 1.5 LEDs Figure 1 Front Panel Power LAN 1-4 WAN WPS USB WLAN The following table describes the LEDs and the WPS button. Table 1 Front Panel LEDs and WPS Button LED COLOR STATUS DESCRIPTION POWER Green On The Router is receiving power and functioning properly. Off The Router is not receiving power. On The Router has a successful 10/100MB Ethernet connection.
Chapter 1 Getting to Know Your Router Table 1 Front Panel LEDs and WPS Button (continued) LED COLOR STATUS DESCRIPTION USB Green On The Router has a USB device installed. Blinking The Router is transmitting and/or receiving data from routers through an installed USB device. Off There is no USB device connected to the Router. 1.6 The WPS Button Your Router supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network.
Chapter 1 Getting to Know Your Router 3 If using screw anchors, drill two holes for the screw anchors into the wall. Push the anchors into the full depth of the holes, then insert the screws into the anchors. Do not insert the screws all the way in - leave a small gap of about 0.5 cm. If not using screw anchors, use a screwdriver to insert the screws into the wall. Do not insert the screws all the way in - leave a gap of about 0.5 cm.
C HAPT ER 2 ZyXEL NetUSB Share Center Utility 2.1 Overview The ZyXEL NetUSB Share Center Utility allows you to work with the USB devices that are connected directly to the Router as if they are connected directly to your computer.
Note: The following operating systems are supported: Windows XP/Vista/7 (32 and 64-bit versions), and Mac OS X 10.6. 3 To open the ZyXEL NetUSB Share Center Utility, double-click its system tray icon. 2.2 The ZyXEL NetUSB Share Center Utility This section describes the ZyXEL NetUSB Share Center Utility main window. Figure 3 ZyXEL NetUSB Share Center Utility Main Window The following table describes the icons in this window.
Chapter 2 ZyXEL NetUSB Share Center Utility Table 3 ZyXEL NetUSB Share Center Utility Main Window Icons (continued) ICON DESCRIPTION Connect Select a USB device and then click this button to connect to it. Your computer can connect to as many USB devices as are connected to the Router. Disconnect Select a device to which your computer is connected and then click this button to disconnect from it. Request to Connect Some USB devices may not allow automatic connections over the network.
Chapter 2 ZyXEL NetUSB Share Center Utility Table 4 ZyXEL NetUSB Share Center Utility Main Screen Menus (continued) MENU ITEM DESCRIPTION Auto-Connect Printer Set Auto-Connect Printer You can set the selected printer to ‘auto-connect’ after you have connected it to your computer during inital connection. If the printer is auto-connected to your computer, they will always be connected over the network. You do not need to configure it manually each time.
Chapter 2 ZyXEL NetUSB Share Center Utility The following table describes the labels in this window. Table 5 ZyXEL NetUSB Share Center Utility Configuration Window LABEL DESCRIPTION Basic Select this to run the utility automatically when you log into or start up Windows. Language Select a language for the ZyXEL NetUSB Share Center Utility. You must restart the utility for the change to take effect. OK Click this to save your changes and close the window.
Chapter 2 ZyXEL NetUSB Share Center Utility 2.2.4 Exit the ZyXEL NetUSB Share Center Utility If you want to exit the ZyXEL NetUSB Share Center Utility when your computer is not connected to any USB device, follow the steps below: 1 Click System > Exit on the Utility screen. The Utility will automatically close. Or you can close the Utlity screen first, then exit: 1 Click the X on the upper-right corner of the Utility: 2 This will close the Utility screen to an icon at the system tray of your computer.
Chapter 2 ZyXEL NetUSB Share Center Utility 26 NBG-419N v2 User’s Guide
C HAPT ER 3 Connection Wizard 3.1 Overview This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP for your Internet account information. Leave a field blank if you don’t have that information. 3.2 Accessing the Wizard Launch your web browser and type "http://192.168.1.1" as the website address. Type "1234" (default) as the password and click Login.
Chapter 3 Connection Wizard 3.3 Connect to Internet The Router offers five Internet connection types. They are Static IP, DHCP, PPPoE, PPTP or L2TP. The wizard attempts to detect which WAN connection type you are using. Figure 8 Detecting your Internet Connection Type If the wizard does not detect a connection type, you must select one from the drop-down list box. Check with your ISP to make sure you use the correct type. Note: If you get an error message, check your hardware connections.
Chapter 3 Connection Wizard 3.3.1 Connection Type: DHCP Choose DHCP as the Internet Connection Type when the WAN port is used as a regular Ethernet. Click Next. Figure 10 Internet Connection Type: DHCP Note: If you get an error screen after clicking Next, you might have selected the wrong Internet Connection type. Click Back, make sure your Internet connection is working and select the right Connection Type. Contact your ISP if you are not sure of your Internet Connection type. 3.3.
Chapter 3 Connection Wizard Table 8 Internet Connection Type: Static IP (continued) LABEL DESCRIPTION Subnet Mask Enter the IP subnet mask in this field. Default Gateway Enter the gateway IP address in this field. Primary DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
Chapter 3 Connection Wizard The following table describes the labels in this screen. Table 9 Internet Connection Type: PPPoE LABEL DESCRIPTION Internet Connection Type Select the PPPoE option for a dial-up connection. Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address. Static IP Select this radio button, provided by your ISP to give the Router a fixed, unique IP address. IP Address Type the name of your service provider.
Chapter 3 Connection Wizard The following table describes the fields in this screen Table 10 Internet Connection Type: PPTP LABEL DESCRIPTION Internet Connection Type Select PPTP from the drop-down list box. To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection. Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address.
Chapter 3 Connection Wizard Table 11 Internet Connection Type: L2TP (continued) LABEL DESCRIPTION Static IP Select this radio button, provided by your ISP to give the Router a fixed, unique IP address. L2TP Address Type the (static) IP address assigned to you by your ISP. L2TP Subnet Mask Type the subnet mask assigned to you by your ISP (if given). L2TP Gateway IP Address Type the gateway IP address of the L2TP server. L2TP Server IP Address Type the server IP address of the L2TP server.
Chapter 3 Connection Wizard 3.4 Router Password Change the login password in the following screen. Enter the new password and retype it to confirm. Click Next to proceed with the Wireless Security screen. Figure 16 Router Password 3.5 Wireless Security Configure Wireless Settings. Configure the wireless network settings on your Router in the following screen. The fields that show up depend on the kind of security you select. 3.5.
Chapter 3 Connection Wizard The following table describes the labels in this screen. Table 12 Wireless Security: No Security LABEL DESCRIPTION Wireless Network Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. Security mode Select a Security level from the drop-down list box. If you change this field on the Router, make sure all wireless stations use the same SSID in order to access the network.
Chapter 3 Connection Wizard Table 13 Wireless Security: WPA-PSK/WPA2-PSK (continued) LABEL DESCRIPTION Back Click this to return to the previous screen. Next Click this to continue. Congratulations! Open a web browser, such as Internet Explorer, to visit your favorite website. Note: If you cannot access the Internet when your computer is connected to one of the Router’s LAN ports, check your connections. Then turn the Router off, wait for a few seconds then turn it back on.
C HAPT ER 4 Introducing the Web Configurator 4.1 Overview This chapter describes how to access the Router Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the Router via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions or Safari 2.0 or later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 4 Introducing the Web Configurator The Web Configurator initially displays the following login screen. Figure 20 Login screen The following table describes the labels in this screen. Table 14 Login screen LABEL DESCRIPTION Password Type "1234" (default) as the password. Language Select the language you want to use to configure the Web Configurator. Click Login. This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 4.2.3.1 on page 40.
Chapter 4 Introducing the Web Configurator The following table describes the labels in this screen. Table 15 Change Password Screen LABEL DESCRIPTION New Password Type a new password. Retype to Confirm Retype the password for confirmation. Apply Click Apply to save your changes back to the Router. Ignore Click Ignore if you do not want to change the password this time.
Chapter 4 Introducing the Web Configurator Table 16 Home Screen (continued) LABEL DESCRIPTION (This is just an example). This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 4.2.3.1 on page 40. (This is just an example). This shows the time (hh:mm:ss) and date (yyyy:mm:dd) of the timezone you select in Section 4.2.3.2 on page 40 or Section 25.5 on page 181. 4.2.3.
Chapter 4 Introducing the Web Configurator 4.3 Resetting the Router If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the Router to reload the factory-default configuration file. This means that you will lose all configurations that you had previously saved, the password will be reset to “1234” and the IP address will be reset to “192.168.1.1”. 4.3.1 Procedure to Use the Reset Button 1 Make sure the power LED is on.
Chapter 4 Introducing the Web Configurator 42 NBG-419N v2 User’s Guide
C HAPT ER 5 Monitor 5.1 Overview This chapter discusses read-only information related to the device state of the Router. Note: To access the Monitor screens, you can also click the links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/received as well as the status of clients connected to the Router. 5.2 What You Can Do • Use the Log (Section 5.3 on page 43) screen to see the logs for the activity on the Router. • Use the BW MGMT Monitor screen (Section 5.
Chapter 5 Monitor log choices depend on your settings in the Log Settings screen. Click Refresh to renew the log screen. Click Clear to delete all the logs. Figure 25 View Log You can configure which logs to display in the View Log screen. Go to the Log Settings screen and select the logs you wish to display. Click Apply to save your settings. Click Refresh to start the screen afresh.
Chapter 5 Monitor 5.4 BW MGMT Monitor The Bandwidth Management (BW MGMT) Monitor allows you to view the amount of network bandwidth that applications running in the network are using. The bandwidth is measured in kilobits per second (kbps). The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 27 Summary: BW MGMT Monitor 5.
Chapter 5 Monitor The following table describes the labels in this screen. Table 19 Summary: DHCP Table LABEL DESCRIPTION # This is the index number of the host computer. MAC Address This field shows the MAC address of the computer with the name in the Host Name field. Every Ethernet device has a unique MAC (Media Access Control) address which uniquely identifies a device. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
Chapter 5 Monitor Table 20 Summary: Packet Statistics (continued) LABEL DESCRIPTION Collisions This is the number of collisions on this port. Tx B/s This displays the transmission speed in bytes per second on this port. Rx B/s This displays the reception speed in bytes per second on this port. Up Time This is the total time the Router has been for each session. System Up Time This is the total time the Router has been on.
Chapter 5 Monitor 48 NBG-419N v2 User’s Guide
C HAPT ER 6 Router Modes 6.1 Overview This chapter introduces the different modes available on your Router. First, the term “mode” refers to two things in this User’s Guide. • Web Configurator mode. This refers to the Web Configurator interface you want to use for editing Router features. • Device mode. This is the operating mode of your Router, or simply how the Router is being used in the network. 6.1.
Chapter 6 Router Modes When changing to another mode, the IP address of the Router changes. The running applications and services of the network devices connected to the Router can be interrupted. In WISP mode, you should know the SSID and wireless security details of the access point to which you want to connect.
C HAPT ER 7 Easy Mode 7.1 Overview The Web Configurator is set to Easy Mode by default. You can configure several key features of the Router in this mode. This mode is useful to users who are not fully familiar with some features that are usually intended for network administrators. When you log in to the Web Configurator, the following screen opens.
Chapter 7 Easy Mode Click Status to open the following screen screen. Figure 32 Easy Mode: Status Screen Navigation Panel Go to Network Map Screen Status Screen Control Panel 7.2 What You Can Do You can do the following in this mode: • Use this Navigation Panel (Section 7.4 on page 53) to opt out of the Easy mode. • Use the Network Map screen (Section 7.5 on page 53) to check if your Router can ping the gateway and whether it is connected to the Internet. • Use the Control Panel (Section 7.
Chapter 7 Easy Mode 7.4 Navigation Panel Use this navigation panel to opt out of the Easy mode. Figure 33 Control Panel The following table describes the labels in this screen. Table 22 Control Panel ITEM DESCRIPTION Home Click this to go to the Login page. Expert Mode Click this to change to Expert mode and customize features of the Router. Logout Click this to end the Web Configurator session. 7.
Chapter 7 Easy Mode The line connecting the Router to the gateway becomes green when the Router is able to ping the gateway. It becomes red when the ping initiating from the Router does not get a response from the gateway. The same rule applies to the line connecting the gateway to the Internet. You can also view the devices (represented by icons indicating the kind of network device) connected to the Router, including those connecting wirelessly.
Chapter 7 Easy Mode Table 23 Control Panel (continued) ITEM DESCRIPTION Firewall Switch ON to ensure that your network is protected from Denial of Service (DoS) attacks. Otherwise, switch OFF. Refer to Section 7.6.5 on page 58 to see this screen. Wireless Security Click this to configure the wireless security, such as SSID, security mode and WPS key on your Router. Refer to Section 7.6.6 on page 58 to see this screen. 7.6.
Chapter 7 Easy Mode Disabling the wireless capability lowers the energy consumption of the of the Router. Figure 37 Power Saving The following table describes the labels in this screen. Table 24 Power Saving LABEL DESCRIPTION WLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off (depending on what you selected in the WLAN Status field). This field works in conjunction with the Day and Except for the following times fields.
Chapter 7 Easy Mode 7.6.3 Content Filter Use this screen to restrict access to certain websites, based on keywords contained in URLs, to which you do not want users in your network to open. Figure 38 Content Filter The following table describes the labels in this screen. Table 25 Content Filter LABEL DESCRIPTION Add Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed. Note: The Router does not recognize wildcard characters as keywords.
Chapter 7 Easy Mode The Router uses bandwidth management for incoming and outgoing traffic. Rank the services and applications by dragging them accordingly from High to Low and click Apply. Click Cancel to close the screen. Figure 39 Bandwidth MGNT Use your mouse to drag the items according to how you want to prioritze them. Left-click and slide up or down. 7.6.5 Firewall Enable this feature to protect the network from Denial of Service (DoS) attacks.
Chapter 7 Easy Mode Note: You can enable the Wireless function of your Router by first turning on the switch in the back panel. Figure 41 Wireless Security The following table describes the general wireless LAN labels in this screen. Table 26 Wireless Security LABEL DESCRIPTION Wireless Network Name (SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID.
Chapter 7 Easy Mode 7.6.7 WPS Use this screen to add a wireless station to the network using WPS. Click WPS in the Wireless Security to open the following screen. Figure 42 Wireless Security: WPS The following table describes the labels in this screen. Table 27 Wireless Security: WPS LABEL DESCRIPTION Wireless Security Click this to go back to the Wireless Security screen. WPS Create a secure wireless network simply by pressing a button.
Chapter 7 Easy Mode 7.7 Status Screen in Easy Mode In the Network Map screen, click Status to view read-only information about the Router. Figure 43 Status Screen in Easy Mode The following table describes the labels in this screen. Table 28 Status Screen in Easy Mode ITEM DESCRIPTION Name This is the name of the Router in the network. You can change this in the Maintenance > General screen in Section 25.3 on page 179. Time This is the current system date and time.
C HAPT ER 8 Router Mode 8.1 Overview The Router is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the Router connects the local network (LAN1 ~ LAN4) to the Internet. Figure 44 Router Network Router Modem Note: The Status screen is shown after changing to the Expert mode of the Web Configurator. It varies depending on the device mode of your Router. 8.2 What You Can Do Use the Status screen (Section 8.
Chapter 8 Router Mode 8.3 Status Screen Click to open the status screen. Figure 45 Status Screen: Router Mode The following table describes the icons shown in the Status screen. Table 29 Status Screen Icon Key: Router Mode ICON DESCRIPTION Click this icon to view copyright and a link for related product information. Click this icon to go to Easy Mode. See Chapter 7 on page 51. Click this to go to the Home page. See Chapter 5 on page 43.
Chapter 8 Router Mode Table 29 Status Screen Icon Key: Router Mode (continued) ICON DESCRIPTION Click this button to refresh the status screen statistics. Click this icon to see the Status page. The information in this screen depends on the device mode you select. Click this icon to see the Monitor navigation menu. Click this icon to see the Configuration navigation menu. Click this icon to see the Maintenance navigation menu. The following table describes the labels shown in the Status screen.
Chapter 8 Router Mode Table 30 Status Screen: Router Mode (continued) LABEL - WPS DESCRIPTION This displays Configured when the WPS has been set up. This displays Unconfigured if the WPS has not been set up. Click the status to display Network > Wireless LAN > WPS screen. System Status Item This column shows the type of data the Router is recording. Data This column shows the actual data recorded by the Router. System Up Time This is the total time the Router has been on.
Chapter 8 Router Mode 8.3.1 Navigation Panel Use the sub-menus on the navigation panel to configure Router features. Figure 46 Navigation Panel: Router Mode The following table describes the sub-menus. Table 31 Navigation Panel: Router Mode LINK TAB Status FUNCTION This screen shows the Router’s general device, system and interface status information. Use this screen to access the wizard, and summary statistics tables.
Chapter 8 Router Mode Table 31 Navigation Panel: Router Mode (continued) LINK TAB FUNCTION General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the Router to block access to devices or block the devices from accessing the Router. Advanced This screen allows you to configure advanced wireless settings. QoS Use this screen to configure Wi-Fi Multimedia Quality of Service (WMM QoS).
Chapter 8 Router Mode Table 31 Navigation Panel: Router Mode (continued) LINK TAB FUNCTION MAINTENANCE General Password Password Setup Use this screen to change the password of your Router. Time Time Setting Use this screen to change your Router’s time and date. Remote Management WWW Use this screen to configure through which interface(s) and from which IP address(es) users can use HTTP to manage the Router. Firmware Upgrade Use this screen to upload firmware to your Router.
C HAPT ER 9 Access Point Mode 9.1 Overview Use your Router as an access point (AP) if you already have a router or gateway on your network. In this mode your Router bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example. Figure 47 Wireless Internet Access in Access Point Mode Router Many screens that are available in Router mode are not available in Access Point mode, such as bandwidth management and firewall.
Chapter 9 Access Point Mode 9.3.1 Setting your Router to AP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To use your Router as an access point, go to Maintenance > Sys OP Mode > General and select Access Point mode. Figure 48 Changing to Access Point mode Note: You have to log in to the Web Configurator again when you change modes. As soon as you do, your Router is already in Access Point mode.
Chapter 9 Access Point Mode 4 After you’ve set your computer’s IP address, open a web browser such as Internet Explorer and type “192.168.1.2” as the web address in your web browser. Note: After clicking Login, the Easy mode appears. Refer to page 51 for the Easy mode screens. Change to Expert mode to see the screens described in the sections following this. 9.3.
Chapter 9 Access Point Mode 9.4 AP Mode Status Screen Click to open the Status screen. Figure 50 Status Screen: Access Point Mode The following table describes the labels shown in the Status screen. Table 32 Status Screen: Access Point Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes.
Chapter 9 Access Point Mode Table 32 Status Screen: Access Point Mode (continued) LABEL DESCRIPTION - WLAN OP Mode This is the device mode (Section 6.1.2 on page 49) to which the Router’s wireless LAN is set - Access Point Mode. - MAC Address This shows the wireless adapter MAC Address of your device. - Status This shows the current status of the Wireless LAN - ON or OFF. - Name (SSID) This shows a descriptive name used to identify the Router in the wireless LAN.
Chapter 9 Access Point Mode 9.4.0.1 Navigation Panel Use the menu in the navigation panel to configure Router features in Access Point mode. The following screen and table show the features you can configure in Access Point mode. Figure 51 Menu: Access Point Mode Refer to Table 31 on page 66 for descriptions of the labels shown in the Navigation panel. 9.5 LAN Screen Use this section to configure your LAN settings while in Access Point mode. Click Network > LAN to see the screen below.
Chapter 9 Access Point Mode Table 33 Network > LAN > IP LABEL DESCRIPTION Get from DHCP Server Click this to deploy the Router as an access point in the network. When you enable this, the Router gets its IP address from the network’s DHCP server (for example, your ISP). Users connected to the Router can now access the network (i.e., the Internet if the IP address is given by the ISP).
C HAPTER 10 WISP Mode 10.1 Overview Your Router can act as a wireless client. In wireless client mode, it can connect to an existing network via an access point. Use this mode if you already have an access point or router in your network. In the example below, one Router (A) is configured as a wireless client and another is used as an access point (B). The wireless client has two clients that need to connect to the Internet. The Router wirelessly connects to the available access point (B).
Chapter 10 WISP Mode 10.3.1 Setting your Router to WISP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To set your Router to AP Mode, go to Maintenance > Sys OP Mode > General and select WISP Mode. Figure 54 Changing to WISP mode Note: You have to log in to the Web Configurator again when you change modes.As soon as you do, your Router is already in WISP mode.
Chapter 10 WISP Mode Note: After clicking Login, the Easy mode appears. Refer to Section on page 51 for the Easy mode screens. Click Expert mode to see the screens described in the sections following this. 10.4 WISP Mode Status Screen Click to open the status screen. Figure 56 Status: WISP Mode The following table describes the labels shown in the Status screen. Table 34 Status Screen: WISP Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator.
Chapter 10 WISP Mode Table 34 Status Screen: WISP Mode (continued) LABEL DESCRIPTION - MAC Address This shows the WAN Ethernet adapter MAC Address of your device. - IP Address This shows the WAN port’s IP address. - IP Subnet Mask This shows the WAN port’s subnet mask. - Default Gateway This shows the WAN port’s gateway IP address. - DHCP This shows the LAN port’s DHCP role - Client or Server. LAN Information - MAC Address This shows the LAN Ethernet adapter MAC Address of your device.
Chapter 10 WISP Mode Table 34 Status Screen: WISP Mode (continued) LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation and Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE or PPTP encapsulation. This field displays N/A when the line is disconnected.
Chapter 10 WISP Mode 10.5.0.1 No Security Use this screen if the access point to which you want to connect does not use encryption. Figure 58 No Security (WISP) The following table describes the labels in this screen. Table 36 No Security (WISP) LABEL DESCRIPTION Wireless Setup Network Name (SSID) Enter the name of the access point to which you are connecting. Security Security Mode Select No Security in this field. Apply Click Apply to save your changes back to the Router.
Chapter 10 WISP Mode 10.5.1 Static WEP Use this screen if the access point to which you want to connect to uses WEP security mode. Figure 59 WEP (WISP) The following table describes the labels in this screen.. Table 37 WEP (WISP) LABEL DESCRIPTION Wireless Setup Network Name (SSID) Enter the name of the access point to which you are connecting. Security Security Mode Select Static WEP to enable data encryption. PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate.
Chapter 10 WISP Mode Table 37 WEP (WISP) (continued) LABEL DESCRIPTION Hex Select this option in order to enter hexadecimal characters as a WEP key. The preceding "0x", that identifies a hexadecimal key, is entered automatically. Key 1 to Key 4 The WEP keys are used to encrypt data. Both the Router and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F").
Chapter 10 WISP Mode 10.5.3 Advance Screen Use this screen to enable the power saving mode of your Router. Go to Configuration > Wireless LAN to open the following screen. Figure 61 Configuration > Wireless LAN > Advance Screen (WISP) The following table describes the labels in this screen.
Chapter 10 WISP Mode 10.5.4 Site Survey Screen Use this screen to scan for and connect to a wireless network automatically. Go to Configuration > Site Survey to open the following screen. Figure 62 Configuration > Wireless LAN > Site Survey (WISP) The following table describes the labels in this screen.
Chapter 10 WISP Mode 86 NBG-419N v2 User’s Guide
C HAPTER 11 Tutorials 11.1 Overview This chapter provides tutorials for your Router as follows: • Connecting to the Internet from an Access Point • Configuring Wireless Security Using WPS • Enabling and Configuring Wireless Security (No WPS) • Connecting to USB Storage with the ZyXEL NetUSB Share Center Utility • Automatically Connecting to a USB Printer 11.
Chapter 11 Tutorials • Push Button Configuration (PBC) - create a secure wireless network simply by pressing a button. See Section 11.3.1 on page 88.This is the easier method. • PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the Router’s interface. See Section 11.3.2 on page 89. This is the more secure method, since one device can authenticate the other. 11.3.
Chapter 11 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both Router and wireless client (the NWD210N in this example). Figure 64 Example WPS Process: PBC Method NBG-419N v2 Wireless Client WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 11.3.2 PIN Configuration When you use the PIN configuration method, you need to use both Router’s configuration interface and the client’s utilities.
Chapter 11 Tutorials The following figure shows you the example to set up wireless network and security on Router and wireless client (ex. NWD210N in this example) by using PIN method.
Chapter 11 Tutorials 11.4 Enabling and Configuring Wireless Security (No WPS) This example shows you how to configure wireless security settings with the following parameters on your Router. SSID SSID_Example3 Channel 6 Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your Router.
Chapter 11 Tutorials 5 Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. Figure 67 Tutorial: Checking Wireless Settings 11.4.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 1 The Router supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
Chapter 11 Tutorials 5 Select WPA-PSK and type the security key in the following screen. Click Next. Figure 69 Security Settings 6 The Confirm Save window appears. Check your settings and click Save to continue. Figure 70 Confirm Save 7 Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide.
Chapter 11 Tutorials 11.5 Connecting to USB Storage with the ZyXEL NetUSB Share Center Utility This tutorial shows you how to connect to a USB device over your Router network by using the ZyXEL NetUSB Share Center Utility. 1 Install the ZyXEL NetUSB Share Center Utility on the computer to which you want to connect the USB device. See Chapter 2 on page 20 for details on the installation. 2 Connect a USB device to one of the USB ports of the Router.
Chapter 11 Tutorials 1 After the first computer (A) finishes using the USB device, click Disconnect on the Utilty to unmount it. 2 Click Connect on the Utility of the second computer (B) to mount the USB device on B. 3 If A does not disconnect from the USB device, B cannot use it. B can click the Request to Connect button to request A to disconnect. B will see the following message on its Utility: 4 A will receive the following message on its Utility screen.
Chapter 11 Tutorials 11.6 Automatically Connecting to a USB Printer Your computer can connect to a shared USB printer by using the ZyXEL NetUSB Share Center Utility. This tutorial shows you how to set your computer to automatically connect to a shared USB printer over your Router network each time you log into your computer. 96 1 Install the ZyXEL NetUSB Share Center Utility to your computer. See Chapter 2 on page 20 for details on the installation.
Chapter 11 Tutorials 6 Select the USB printer you want to connect to and click Apply. 7 Now your computer can automatically connect to this shared USB printer over your Router network each time you log into your computer. The printer will be automatically added to your printer list. 8 The Utility supports one connection to the Router’s USB device at a time.
Chapter 11 Tutorials 98 NBG-419N v2 User’s Guide
P ART II Technical Reference 99
C HAPTER 12 Wireless LAN 12.1 Overview This chapter discusses how to configure the wireless network settings in your Router. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 72 Example of a Wireless Network Router A B The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.
Chapter 12 Wireless LAN • Use the Advanced screen (Section 12.6 on page 109) to allow wireless advanced features, such as intra-BSS networking and set the RTS/CTS Threshold. • Use the QoS screen (Section 12.7 on page 111) to set priority levels to services, such as e-mail, VoIP, chat, and so on. • Use the WPS screen (Section 12.8 on page 112) to quickly set up a wireless network with strong security, without having to configure security settings manually. • Use the WPS Station screen (Section 12.
Chapter 12 Wireless LAN 00:A0:C5:00:00:02. To get the MAC address for each wireless client, see the appropriate User’s Guide or other documentation. You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security).
Chapter 12 Wireless LAN 12.3.1.5 WDS Wireless Distribution System or WDS security is used between bridged APs. It is independent of the security between the wired networks and their respective APs. If you do not enable WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must use the same pre-shared key. 12.4 General Wireless LAN Screen Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode.
Chapter 12 Wireless LAN Table 42 Network > Wireless LAN > General (continued) LABEL DESCRIPTION Channel Selection Set the operating frequency/channel depending on your particular region. Select a channel from the drop-down list box. The options vary depending on the frequency band and the country you are in. Refer to the Connection Wizard chapter for more information on channels. This option is only available if Auto Channel Selection is disabled.
Chapter 12 Wireless LAN The following table describes the labels in this screen. Table 43 Network > Wireless LAN > General: No Security LABEL DESCRIPTION Security Mode Choose No Security from the drop-down list box. Apply Click Apply to save your changes back to the Router. Cancel Click Cancel to reload the previous configuration for this screen. Refer to Table 42 on page 104 for descriptions of the other labels in this screen. 12.4.
Chapter 12 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 44 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Security Mode Select Static WEP to enable data encryption. PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate. A passphrase functions like a password. In WEP security mode, it is further converted by the Router into a complicated string that is referred to as the “key”.
Chapter 12 Wireless LAN 12.4.3 WPA-PSK/WPA2-PSK Click Network > Wireless LAN to display the General screen. Select WPA-PSK or WPA2-PSK from the Security Mode list. Figure 76 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 45 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Security Mode Select WPA-PSK or WPA2-PSK to enable data encryption.
Chapter 12 Wireless LAN pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure this screen. To change your Router’s MAC filter settings, click Network > Wireless LAN > MAC Filter. The screen appears as shown. Figure 77 Network > Wireless LAN > MAC Filter The following table describes the labels in this menu.
Chapter 12 Wireless LAN Click Network > Wireless LAN > Advanced. The screen appears as shown. Figure 78 Network > Wireless LAN > Advanced The following table describes the labels in this screen. Table 47 Network > Wireless LAN > Advanced LABEL DESCRIPTION RTS/CTS Threshold Data with its frame size larger than this value will perform the RTS (Request To Send)/CTS (Clear To Send) handshake. Fragmentation Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages.
Chapter 12 Wireless LAN Table 47 Network > Wireless LAN > Advanced (continued) LABEL DESCRIPTION HT (High Throughput) Physical Mode - Use the fields below to configure the 802.11 wireless environment of your Router. Operating Mode Choose this according to the wireless mode(s) used in your network. Mixed Mode - Select this if the wireless clients in your network use different wireless modes (for example, IEEE 802.11b/g and IEEE 802.
Chapter 12 Wireless LAN 12.8 WPS Screen Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status. To open this screen, click Network > Wireless LAN > WPS tab. Figure 80 Network > Wireless LAN > WPS The following table describes the labels in this screen. Table 49 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select this to enable the WPS feature. PIN Number This displays a PIN number last time system generated.
Chapter 12 Wireless LAN 12.9 WPS Station Screen Use this screen when you want to add a wireless station using WPS. To open this screen, click Network > Wireless LAN > WPS Station tab. Note: Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes. To add the second wireless station, you have to press these buttons on both device and the wireless station again after the first 2 minutes.
Chapter 12 Wireless LAN 12.10 Scheduling Screen Use this screen to set the times your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. The wireless LAN can be scheduled to turn on or off on certain days and at certain times. To open this screen, click Network > Wireless LAN > Scheduling tab. Figure 82 Network > Wireless LAN > Scheduling The following table describes the labels in this screen.
Chapter 12 Wireless LAN 12.11 WDS Screen A Wireless Distribution System is a wireless connection between two or more APs. Use this screen to set the operating mode of your Router to AP + Bridge or Bridge Only and establish wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode. Note: You must enable the same wireless security settings on the Router and on all wireless clients that you want to associate with it.
Chapter 12 Wireless LAN Table 52 Network > Wireless LAN > WDS (continued) LABEL DESCRIPTION EncrypType Select whether to use WEP, TKIP or AES encryption for your WDS connection in this field. Otherwise, select No Security. 116 EncrypKey The Encryp key is used to encrypt data. Peers must use the same key for data transmission. Apply Click Apply to save your changes to Router. Cancel Click Cancel to reload the previous configuration for this screen.
C HAPTER 13 WAN 13.1 Overview This chapter discusses the Router’s WAN screens. Use these screens to configure your Router for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations. Figure 84 LAN and WAN Router 13.
Chapter 13 WAN 13.3.1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Chapter 13 WAN 13.3.2 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. Figure 85 Multicast Example Router In the multicast example above, systems A and D comprise one multicast group. In multicasting, the server only needs to send one data stream and this is delivered to systems A and D.
Chapter 13 WAN This screen displays when you select Ethernet encapsulation. Figure 86 Network > WAN > Internet Connection: Ethernet Encapsulation The following table describes the labels in this screen. Table 53 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation You must choose the Ethernet option when the WAN port is used as a regular Ethernet.
Chapter 13 WAN Table 53 Network > WAN > Internet Connection: Ethernet Encapsulation (continued) LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the Router's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
Chapter 13 WAN This screen displays when you select PPPoE encapsulation. Figure 87 Network > WAN > Internet Connection: PPPoE Encapsulation The following table describes the labels in this screen. Table 54 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Select PPP over Ethernet if you connect to your Internet via dial-up. User Name Type the user name given to you by your ISP.
Chapter 13 WAN Table 54 Network > WAN > Internet Connection: PPPoE Encapsulation (continued) LABEL DESCRIPTION Use Fixed IP Address Select this option If the ISP assigned a fixed IP address. My WAN IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address. WAN DNS Assignment First DNS Server Second DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the Router's WAN IP address).
Chapter 13 WAN This screen displays when you select PPTP encapsulation. Figure 88 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen. Table 55 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access 124 Connection Type To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection.
Chapter 13 WAN Table 55 Network > WAN > Internet Connection: PPTP Encapsulation (continued) LABEL DESCRIPTION Nailed-up Connection Select Nailed-Up Connection if you do not want the connection to time out. Idle Timeout This value specifies the time in minutes that elapses before the Router automatically disconnects from the PPTP server. PPTP Configuration Server IP Address Type the IP address of the PPTP server.
Chapter 13 WAN 13.4.4 L2TP Encapsulation The Layer 2 Tunneling Protocol (L2TP) works at layer 2 (the data link layer) to tunnel network traffic between two peer devices over another network (like the Internet). This screen displays when you select L2TP encapsulation. Figure 89 Network > WAN > Internet Connection: L2TP Encapsulation The following table describes the labels in this screen.
Chapter 13 WAN Table 56 Network > WAN > Internet Connection: L2TP Encapsulation (continued) LABEL DESCRIPTION L2TP Configuration Server IP Address Type the IP address of the L2TP server. Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection. Use Fixed IP Address Select this option If the ISP assigned a fixed IP address. IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address.
Chapter 13 WAN 13.5 Advanced WAN Screen Use this screen to enable Multicast and enable Auto-bridge. Note: The categories shown in this screen are independent of each other. To change your Router’s advanced WAN settings, click Network > WAN > Advanced. The screen appears as shown. Figure 90 Network > WAN > Advanced The following table describes the labels in this screen. Table 57 Network > WAN > Advanced LABEL DESCRIPTION Multicast Setup Multicast Select IGMPv1/v2 to enable multicasting.
Chapter 13 WAN 13.6 IGMP Blocking Screen Use this screen to enable IGMP blocking (snooping) if you have LAN users that subscribe to multicast services. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group - it is not used to carry user data. Click Network > WAN > IGMP Blocking. The screen appears as shown. Figure 91 Network > WAN > IGMP Blocking The following table describes the labels in this screen.
Chapter 13 WAN 130 NBG-419N v2 User’s Guide
C HAPTER 14 LAN 14.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks. Figure 92 LAN Example The LAN screens can help you manage IP addresses. 14.
Chapter 14 LAN 14.3 What You Need To Know The actual physical connection determines whether the Router ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 93 LAN and WAN IP Addresses The LAN parameters of the Router are preset in the factory with the following values: • IP address of 192.168.1.1 with subnet mask of 255.255.255.0 (24 bits) • DHCP server enabled with 32 client IP addresses starting from 192.
Chapter 14 LAN 14.4 LAN IP Screen Use this screen to change the IP address for your Router. Click Network > LAN > IP. Figure 94 Network > LAN > IP The following table describes the labels in this screen. Table 59 Network > LAN > IP LABEL DESCRIPTION IP Address Type the IP address of your Router in dotted decimal notation. IP Subnet Mask The subnet mask specifies the network number portion of an IP address.
Chapter 14 LAN Table 60 Network > LAN > IP Alias (continued) 134 LABEL DESCRIPTION IP Subnet Mask The subnet mask specifies the network number portion of an IP address. Your Router will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the Router. Apply Click Apply to save your changes back to the Router. Reset Click Reset to begin configuring this screen afresh.
C HAPTER 15 DHCP Server 15.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the Router’s LAN as a DHCP server or disable it. When configured as a server, the Router provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 15.
Chapter 15 DHCP Server Table 61 Network > DHCP Server > General (continued) LABEL DESCRIPTION Pool Size This field specifies the size, or count of the IP address pool for LAN. Apply Click Apply to save your changes back to the Router. Reset Click Reset to begin configuring this screen afresh. 15.4 Advanced Screen This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses.
Chapter 15 DHCP Server Table 62 Network > DHCP Server > Advanced (continued) LABEL DESCRIPTION IP Address Type the LAN IP address of a computer on your LAN. DNS Server DNS Servers Assigned by DHCP Server The Router passes a DNS (Domain Name System) server IP address (in the order you specify here) to the DHCP clients. The Router only passes this information to the LAN DHCP clients when you select the Enable DHCP Server check box.
Chapter 15 DHCP Server 138 NBG-419N v2 User’s Guide
C HAPTER 16 Network Address Translation (NAT) 16.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. Each packet has two addresses – a source address and a destination address.
Chapter 16 Network Address Translation (NAT) 16.3 General NAT Screen Use this screen to enable NAT and set a default server. Click Network > NAT > General to open the following screen. Figure 99 Network > NAT > General The following table describes the labels in this screen.
Chapter 16 Network Address Translation (NAT) Note: Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP. Port forwarding allows you to define the local servers to which the incoming services will be forwarded.
Chapter 16 Network Address Translation (NAT) Table 64 Network > NAT > Application (continued) LABEL DESCRIPTION Application Rules Summary # This is the number of an individual port forwarding server entry. Active This icon is turned on when the rule is enabled. Name This field displays a name to identify this rule. Port This field displays the port number(s). Server IP Address This field displays the inside IP address of the server.
Chapter 16 Network Address Translation (NAT) Note: Only one LAN computer can use a trigger port (range) at a time. Figure 101 Network > NAT > Advanced The following table describes the labels in this screen. Table 65 Network > NAT > Advanced LABEL DESCRIPTION # This is the rule index number (read-only). Name Type a unique name (up to 15 characters) for identification purposes. All characters are permitted - including spaces.
Chapter 16 Network Address Translation (NAT) 16.5.1 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 102 Trigger Port Forwarding Process: Example Router Router 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the Router to record Jane’s computer IP address. The Router associates Jane's computer IP address with the "incoming" port range of 6970-7170.
C HAPTER 17 Dynamic DNS 17.1 Overview Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address. 17.2 What You Can Do Use the Dynamic DNS screen (Section 17.4 on page 145) to enable DDNS and configure the DDNS settings on the Router. 17.3 What You Need To Know Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.).
Chapter 17 Dynamic DNS The following table describes the labels in this screen. Table 66 Network > DDNS 146 LABEL DESCRIPTION Enable Dynamic DNS Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. Host Name Enter a host names in the field provided. You can specify up to two host names in the field separated by a comma (","). User Name Enter your user name. Password Enter the password assigned to you.
C HAPTER 18 Static Route 18.1 Overview This chapter shows you how to configure static routes for your Router. Each remote node specifies only the network to which the gateway is directly connected, and the Router has no knowledge of the networks beyond. For instance, the Router knows about network N2 in the following figure through remote node Router 1.
Chapter 18 Static Route 18.3 IP Static Route Screen Click Network > Static Route to open the IP Static Route screen. Figure 105 Network > Static Route The following table describes the labels in this screen. Table 67 Network > Static Route LABEL DESCRIPTION Static Routing Settings Route Name Enter a the name that describes or identifies this route. Destination IP Address Enter the IP network address of the final destination.
Chapter 18 Static Route Table 67 Network > Static Route LABEL DESCRIPTION Metric This is the number assigned to the route. Delete Click the Delete icon to remove a static route from the Router. A window displays asking you to confirm that you want to delete the route.
Chapter 18 Static Route 150 NBG-419N v2 User’s Guide
C HAPTER 19 RIP 19.1 Overview Routing Information Protocol (RIP) is an interior or intra-domain routing protocol that uses distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers. 19.2 What You Can Do Use the RIP screen (Section 19.3 on page 151) to enable RIPv1 or RIPv2, which are LAN broadcast protocols. 19.
Chapter 19 RIP 152 NBG-419N v2 User’s Guide
C HAPTER 20 Firewall 20.1 Overview This chapter shows you how to enable and configure the firewall that protects your Router and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN.
Chapter 20 Firewall 20.3 What You Need To Know The Router’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks. It is designed to protect against Denial of Service (DoS) attacks when activated (click the General tab under Firewall and then click the Enable Firewall check box). The Router's purpose is to allow a private Local Area Network (LAN) to be securely connected to the Internet.
Chapter 20 Firewall 20.5 Services Screen If an outside user attempts to probe an unsupported port on your Router, an ICMP response packet is automatically returned. This allows the outside user to know the Router exists. Use this screen to prevent the ICMP response packet from being sent. This keeps outsiders from discovering your Router when unsupported ports are probed.
Chapter 20 Firewall Table 70 Security > Firewall > Services (continued) LABEL DESCRIPTION Enable Firewall Rule Enable Firewall Rule Select this check box to activate the firewall rules that you define (see Add Firewall Rule below) Apply Click Apply to save the settings. Add Firewall Rule Service Name Enter a name that identifies or describes the firewall rule. MAC Address Enter the MAC address of the computer for which the firewall rule applies.
C HAPTER 21 Content Filter 21.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords. 21.2 What You Can Do Use the Content Filter (Section 21.4 on page 158) screen to restrict web features, add keywords for blocking and designate a trusted computer. 21.
Chapter 21 Content Filter Since the Router checks the URL’s domain name (or IP address) and file path separately, it will not find items that go across the two. For example, with the URL www.zyxel.com.tw/news/ pressroom.php, the Router would find “tw” in the domain name (www.zyxel.com.tw). It would also find “news” in the file path (news/pressroom.php) but it would not find “tw/news”. 21.
Chapter 21 Content Filter Table 71 Security > Content Filter > Content Filter (continued) LABEL DESCRIPTION Cookies Used by Web servers to track usage and provide service based on ID. Web Proxy A server that acts as an intermediary between a user and the Internet to provide security, administrative control, and caching service. When a proxy server is located on the WAN it is possible for LAN users to circumvent content filtering by pointing to this proxy server.
Chapter 21 Content Filter 160 NBG-419N v2 User’s Guide
C HAPTER 22 Bandwidth Management 22.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN. Downlink traffic comes back from the WAN device (B) to the LAN device (A).
Chapter 22 Bandwidth Management 22.3 What You Need To Know The sum of the bandwidth allotments that apply to the WAN interface (LAN to WAN, WLAN to WAN) must be less than or equal to the Upstream Bandwidth that you configure in the Bandwidth Management Advanced screen (Section 22.5 on page 162).
Chapter 22 Bandwidth Management Note: The two tables shown in this screen can be configured and applied at the same time. Click Management > Bandwidth Management > Advanced to open the bandwidth management Advanced screen. Figure 113 Management > Bandwidth Management > Advanced The following table describes the labels in this screen.
Chapter 22 Bandwidth Management Table 73 Management > Bandwidth Management > Advanced (continued) LABEL DESCRIPTION # This is the number of an individual bandwidth management rule. Priority Select a priority from the drop down list box. Choose High, Mid or Low. • • • High - Select this for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay).
Chapter 22 Bandwidth Management The following table describes the labels in this screen. Table 74 Bandwidth Management Rule Configuration: Application List LABEL DESCRIPTION # This is the number of an individual bandwidth management rule. Enable Select an interface’s check box to enable bandwidth management on that interface. Direction These read-only labels represent the physical interfaces.
Chapter 22 Bandwidth Management Table 75 Bandwidth Management Rule Configuration: User-defined Service LABEL DESCRIPTION BW Budget Select Maximum Bandwidth or Minimum Bandwidth and specify the maximum or minimum bandwidth allowed for the rule in kilobits per second. Destination Address Enter the IP address of the destination computer. Destination Subnet Netmask Enter the subnet netmask of the destination of the traffic for which the bandwidth management rule applies.
Chapter 22 Bandwidth Management The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 116 Management > Bandwidth Management > Monitor 22.6.1 Predefined Bandwidth Management Services The following is a description of some services that you can select and to which you can apply media bandwidth management in the Management > Bandwidth Management > Advanced screen.
C HAPTER 23 Remote Management 23.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your Router from a remote location through the following interfaces: • LAN and WAN • LAN only • WAN only Note: The Router is managed using the Web Configurator. 23.2 What You Can Do Use the WWW screen (Section 23.4 on page 169) to define the interface/s from which the Router can be managed remotely and specify a secure client that can manage the Router.
Chapter 23 Remote Management 23.3.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The Router automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling. You can change the timeout period in the System screen 23.4 WWW Screen To change your Router’s remote management settings, click Management > Remote Management > WWW.
Chapter 23 Remote Management 170 NBG-419N v2 User’s Guide
C HAPTER 24 Universal Plug-and-Play (UPnP) 24.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.
Chapter 24 Universal Plug-and-Play (UPnP) 24.3.2 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. When a UPnP device joins a network, it announces its presence with a multicast message. For security reasons, the Router allows multicast messages on the LAN only.
Chapter 24 Universal Plug-and-Play (UPnP) Make sure the computer is connected to a LAN port of the Router. Turn on your computer and the Router. 24.5.1.1 Auto-discover Your UPnP-enabled Network Device 1 Click start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. 2 Right-click the icon and select Properties.
Chapter 24 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. Figure 121 Internet Connection Properties: Advanced Settings Figure 122 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 24 Universal Plug-and-Play (UPnP) 6 Double-click on the icon to display your current Internet connection status. Figure 124 Internet Connection Status 24.5.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the Router without finding out the IP address of the Router first. This comes helpful if you do not know the IP address of the Router. Follow the steps below to access the web configurator. 1 Click Start and then Control Panel.
Chapter 24 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 125 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your Router and select Invoke. The web configurator login screen displays.
Chapter 24 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your Router and select Properties. A properties window displays with basic information about the Router.
Chapter 24 Universal Plug-and-Play (UPnP) 178 NBG-419N v2 User’s Guide
C HAPTER 25 Maintenance 25.1 Overview This chapter provides information on the Maintenance screens. 25.2 What You Can Do • Use the General screen to configure system and domain name. You can also set the timeout period of the management session (Section 25.3 on page 179). • Use the Password screen to change your Router’s system password (Section 25.4 on page 180). • Use the Time screen to change your Router’s time and date (Section 25.5 on page 181).
Chapter 25 Maintenance The following table describes the labels in this screen. Table 79 Maintenance > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the Router in an Ethernet network. Domain Name Enter the domain name you want to give to the Router. Administrator Inactivity Timer Type how many minutes a management session can be left idle before the session times out. The default is 5 minutes.
Chapter 25 Maintenance 25.5 Time Setting Screen Use this screen to configure the Router’s time based on your local time zone. To change your Router’s time and date, click Maintenance > Time. The screen appears as shown. Figure 130 Maintenance > Time The following table describes the labels in this screen. Table 81 Maintenance > Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your Router.
Chapter 25 Maintenance Table 81 Maintenance > Time (continued) LABEL DESCRIPTION Get from Time Server Select this radio button to have the Router get the time and date from the time server you specified below. Auto Select Auto to have the Router automatically search for an available time server and synchronize the date and time with the time server after you click Apply.
Chapter 25 Maintenance Click Maintenance > Firmware Upgrade. Follow the instructions in this screen to upload firmware to your Router. Figure 131 Maintenance > Firmware Upgrade The following table describes the labels in this screen. Table 82 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload.
Chapter 25 Maintenance 25.7 Configuration Backup/Restore Screen Backup configuration allows you to back up (save) the Router’s current configuration to a file on your computer. Once your Router is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
Chapter 25 Maintenance Table 83 Maintenance > Backup/Restore (continued) LABEL DESCRIPTION Upload Click Upload to begin the upload process. Note: Do not turn off the Router while configuration file upload is in progress. After you see a “configuration upload successful” screen, you must then wait one minute before logging into the Router again. The Router automatically restarts in this time causing a temporary network disconnect.
Chapter 25 Maintenance Router A router connects your local network with another network, such as the Internet. The router has two IP addresses, the LAN IP address and the WAN IP address. Figure 135 LAN and WAN IP Addresses in Router Mode Access Point An access point enabled all ethernet ports to be bridged together and be in the same subnet. To connect to the Internet, another device, such as a router, is required.
Chapter 25 Maintenance 25.10 Sys OP Mode Screen Use this screen to select how you want to use your Router. Figure 138 Maintenance > Sys OP Mode The following table describes the labels in the General screen. Table 84 Maintenance > Sys OP Mode LABEL DESCRIPTION System Operation Mode Router Select Router Mode if your device routes traffic between a local network and another network such as the Internet. This mode offers services such as a firewall or bandwidth management.
Chapter 25 Maintenance 188 NBG-419N v2 User’s Guide
C HAPTER 26 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Router Access and Login • Internet Access • Resetting the Router to Its Factory Defaults • Wireless Router/AP Troubleshooting • ZyXEL Share Center Utility Problems 26.1 Power, Hardware Connections, and LEDs The Router does not turn on. None of the LEDs turn on.
Chapter 26 Troubleshooting 26.2 Router Access and Login I don’t know the IP address of my Router. 1 The default IP address is 192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the Router by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 26 Troubleshooting 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled. See Appendix A on page 197. 4 Make sure your computer is in the same subnet as the Router. (If you know that there are routers between your computer and the Router, skip this step.
Chapter 26 Troubleshooting 2 Make sure you entered your ISP account information correctly in the wizard. These fields are casesensitive, so make sure [Caps Lock] is not on. 3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP. • Go to Network > Wireless LAN > General > WDS and check if the Router is set to bridge mode. Select Disable and try to connect to the Internet again.
Chapter 26 Troubleshooting • Check the settings for QoS. If it is disabled, you might consider activating it. If it is enabled, you might consider raising or lowering the priority for some applications. 26.4 Resetting the Router to Its Factory Defaults If you reset the Router, you lose all of the changes you have made. The Router re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the RESET button.
Chapter 26 Troubleshooting 7 Make sure you allow the Router to be remotely accessed through the WLAN interface. Check your remote management settings. • See the chapter on Wireless LAN in the User’s Guide for more information. I set up URL keyword blocking, but I can still access a website that should be blocked. Make sure that you select the Enable URL Keyword Blocking check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Keyword List.
Chapter 26 Troubleshooting 1 Make sure that the set up program is one required for your operating system. 2 Install the latest patches and updates for your operating system. 3 Check the zyxel.com download site for a newer version of the utility. Two computers cannot connect the USB storage at the same time using the ZyXEL Share Center Utility. Only one computer can connect to the USB storage through the ZyXEL Share Center Utlity at a time.
Chapter 26 Troubleshooting 196 NBG-419N v2 User’s Guide
A PPENDIX A Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix A Pop-up Windows, JavaScript and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 140 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 198 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix A Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 141 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix A Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 142 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Appendix A Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 143 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix A Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 144 Security Settings - Java Scripting Java Permissions 202 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix A Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 145 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix A Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 146 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix A Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 148 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly.
Appendix A Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 149 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the leftside menu. Select the check boxes as shown in the following screen.
Appendix A Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 151 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply.
Appendix A Pop-up Windows, JavaScript and Java Permissions 208 NBG-419N v2 User’s Guide
A PPENDIX B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix B IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 152 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix B IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 86 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8-bit mask 11111111 00000000 00000000 00000000 255.0.0.0 16-bit mask 11111111 11111111 00000000 00000000 255.255.0.0 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.
Appendix B IP Addresses and Subnetting Table 88 Alternative Subnet Mask Notation (continued) SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.252 /30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub-networks.
Appendix B IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 154 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix B IP Addresses and Subnetting Table 89 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 90 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix B IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 93 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix B IP Addresses and Subnetting Table 95 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix B IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix B IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
A PPENDIX C Setting Up Your Computer’s IP Address Note: Your specific Router may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix C Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 220 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon.
Appendix C Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix C Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix C Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix C Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix C Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix C Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix C Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix C Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix C Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix C Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix C Setting Up Your Computer’s IP Address 232 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix C Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 158 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 234 Click Apple > System Preferences.
Appendix C Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix C Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your Router. 6 236 Click Apply and close the window.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 159 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix C Setting Up Your Computer’s IP Address 238 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix C Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix C Setting Up Your Computer’s IP Address 240 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 160 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix C Setting Up Your Computer’s IP Address 242 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix C Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix C Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 161 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 244 Click Next to save the changes and close the Network Card Setup window.
Appendix C Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 162 openSUSE 10.
Appendix C Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 165 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 166 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix D Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 167 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Appendix D Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix D Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your Router. Table 97 Wireless Security Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.
Appendix D Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access.
Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses.
Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
Appendix D Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
Appendix D Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server.
Appendix D Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 169 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix D Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz or 5GHz is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area. Antenna Gain Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Appendix D Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area.
A PPENDIX E Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix E Common Services Table 100 Commonly Used Services (continued) 262 NAME PROTOCOL PORT(S) DESCRIPTION HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program.
Appendix E Common Services Table 100 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP 161 Simple Network Management Program. SNMP-TRAPS TCP/UDP 162 Traps for use with the SNMP (RFC:1215).
Appendix E Common Services 264 NBG-419N v2 User’s Guide
A PPENDIX F Legal Information Copyright Copyright © 2012 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix F Legal Information 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4 Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. • IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
Appendix F Legal Information 2 this device must accept any interference, including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms.
Appendix F Legal Information Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com. Open Source Licenses This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided with the firmware package. You can download the latest firmware at www.zyxel.com. To obtain the source code covered under those Licenses, please contact support@zyxel.com.tw to get it.
Appendix F Legal Information [Maltese] Hawnhekk, ZyXEL, jiddikjara li dan tagħmir jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC. [Hungarian] Alulírott, ZyXEL nyilatkozom, hogy a berendezés megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EK irányelv egyéb elõírásainak. [Polish] Niniejszym ZyXEL oświadcza, że sprzęt jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC.
Appendix F Legal Information The following countries have restrictions and/or requirements in addition to those given in the table labeled “Overview of Regulatory Requirements for Wireless LANs”:. Overview of Regulatory Requirements for Wireless LANs Frequency Band (MHz) Max Power Level Indoor ONLY Indoor and Outdoor (EIRP)1 (mW) 2400-2483.
Appendix F Legal Information boundaries of the owner's property, its use requires a “general authorization.” Please check http:// www.sviluppoeconomico.gov.it/ for more details. Questo prodotto è conforme alla specifiche di Interfaccia Radio Nazionali e rispetta il Piano Nazionale di ripartizione delle frequenze in Italia. Se non viene installato all 'interno del proprio fondo, l'utilizzo di prodotti Wireless LAN richiede una “Autorizzazione Generale”. Consultare http:// www.sviluppoeconomico.gov.
Appendix F Legal Information • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information. • Make sure to connect the cables to the correct ports. • Place connecting cables carefully so that no one will step on them or stumble over them. • Always disconnect all cables from this device before servicing or disassembling.
Index Index A ActiveX 158 Address Assignment 118 Advanced Encryption Standard See AES.
Index Dynamic Host Configuration Protocol 135 dynamic WEP key exchange 254 I DynDNS 145 IANA 216 DynDNS see also DDNS 145 IBSS 247 IEEE 802.
Index MAC filter 108 managing the device good habits 16 using the web configurator. See web configurator. using the wireless switch. using the WPS. See WPS.
Index Service Set 59, 104 Service Set IDentification 59, 104 V Service Set IDentity. See SSID.
Index interference 249 security parameters 258 World Wide Web 167 WPA 255 key caching 256 pre-authentication 256 user authentication 256 vs WPA-PSK 256 wireless client supplicant 256 with RADIUS application example 257 WPA compatible 103 WPA2 255 user authentication 256 vs WPA2-PSK 256 wireless client supplicant 256 with RADIUS application example 257 WPA2-Pre-Shared Key 255 WPA2-PSK 255, 256 application example 257 WPA-PSK 255, 256 application example 257 WPS 16 WWW 167 X Xbox Live 167 NBG-419N v2 User’
Index 278 NBG-419N v2 User’s Guide