NBG4615 Wireless N Gigabit NetUSB Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 3, 10/2011 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NBG4615 using the Web Configurator. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http:// www.adobe.com. • Use the PDF’s bookmarks to quickly navigate to the areas that interest you.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NBG4615 may be referred to as the “NBG4615”, the “device”, the “product” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG4615 icon is not an exact representation of your device.
Safety Warnings Safety Warnings • • • • • • • • • • • • • • • • • • • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. Do NOT open the device or unit.
Contents Overview Contents Overview User’s Guide .......................................................................................................................................19 Introduction .............................................................................................................................................21 The WPS Button .....................................................................................................................................
Contents Overview 8 NBG4615 User’s Guide
Table of Contents Table of Contents About This User's Guide ......................................................................................................................3 Document Conventions .......................................................................................................................4 Safety Warnings....................................................................................................................................6 Contents Overview ......................
Table of Contents 4.3 Connect to Internet ............................................................................................................................34 4.3.1 Connection Type: DHCP .........................................................................................................35 4.3.2 Connection Type: Static IP ......................................................................................................35 4.3.3 Connection Type: PPPoE .......................................
Table of Contents 8.4 Navigation Panel ...............................................................................................................................59 8.5 Network Map .....................................................................................................................................59 8.6 Control Panel ....................................................................................................................................60 8.6.1 Game Engine ...................
Table of Contents 12.1 Overview .........................................................................................................................................90 12.2 What You Can Do ...........................................................................................................................90 12.3 What You Need to Know .................................................................................................................90 12.3.1 Setting your NBG4615 to WISP Mode ........
Table of Contents 15.1.2 What You Should Know .......................................................................................................126 15.2 General Wireless LAN Screen .....................................................................................................128 15.2.1 Guest WLAN ........................................................................................................................129 15.3 Wireless Security Screen ................................................
Table of Contents 18.3 What You Need To Know ..............................................................................................................164 18.3.1 IP Pool Setup .......................................................................................................................164 18.3.2 LAN TCP/IP .........................................................................................................................164 18.3.3 IP Alias .................................................
Table of Contents 23.1 Overview ......................................................................................................................................185 23.2 RIP Screen ..................................................................................................................................185 Chapter 24 Firewall ..............................................................................................................................................187 24.1 Overview .........
Table of Contents 28.2.1 NAT Traversal ......................................................................................................................207 28.2.2 Cautions with UPnP .............................................................................................................207 28.3 UPnP Screen ...............................................................................................................................208 28.4 Technical Reference ......................................
Table of Contents Appendix I Legal Information ...........................................................................................................351 Index ..................................................................................................................................................
Table of Contents 18 NBG4615 User’s Guide
P ART I User’s Guide 19
C HAPT ER 1 Introduction 1.1 Overview This chapter introduces the main features and applications of the NBG4615. The NBG4615 extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/ n compatible devices. A range of services such as a firewall and content filtering are also available for secure Internet computing.
Chapter 1 Introduction 1.4 Good Habits for Managing the NBG4615 Do the following things regularly to make the NBG4615 more secure and to manage the NBG4615 more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place. • Back up the configuration (and make sure you know how to restore it).
Chapter 1 Introduction Table 1 Front panel LEDs and WPS button (continued) LED COLOR WAN Green Amber STATUS On The NBG4615’s WAN connection is ready. Blinking The NBG4615 is sending/receiving data through the WAN with a 10/100Mbps transmission rate. Blinking The NBG4615 is sending/receiving data through the WAN with a 1000Mbps transmission rate. Off WLAN/WPS Green DESCRIPTION The WAN connection is not ready, or has failed.
C HAPT ER 2 The WPS Button 2.1 Overview Your NBG4615 supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Each WPS connection works between two devices. Both devices must support WPS (check each device’s documentation to make sure).
C HAPT ER 3 ZyXEL NetUSB Share Center Utility 3.1 Overview The ZyXEL NetUSB Share Center Utility allows you to work with the USB devices that are connected directly to the NBG4615 as if they are connected directly to your computer.
Chapter 3 ZyXEL NetUSB Share Center Utility Note: The following operating systems are supported: Windows XP/Vista/7 (32 and 64-bit versions), and Mac OS X 10.6. 3 To open the ZyXEL NetUSB Share Center Utility, double-click its system tray icon. 3.2 The ZyXEL NetUSB Share Center Utility This section describes the ZyXEL NetUSB Share Center Utility main window.
Chapter 3 ZyXEL NetUSB Share Center Utility The following table describes the icons in this window. Table 2 ZyXEL NetUSB Share Center Utility Main Window Icons ICON DESCRIPTION Configure Server Click to open the NBG4615’s built-in Web Configurator, which you can use to set up the NBG4615 (see Chapter 5 on page 43 for details). Auto-Connect Printer You can set the selected printer to ‘auto-connect’ after you have connected it to your computer during inital connection.
Chapter 3 ZyXEL NetUSB Share Center Utility The following table describes the menus in this screen. Table 3 ZyXEL NetUSB Share Center Utility Main Screen Menus MENU ITEM DESCRIPTION System Exit This closes the ZyXEL NetUSB Share Center Utility. Tools Configuration This opens the ZyXEL NetUSB Share Center Utility configuration window. Auto-Connect Printer List This opens the list window that displays all of the printing devices connected to the NBG4615.
Chapter 3 ZyXEL NetUSB Share Center Utility 3.2.2 The ZyXEL NetUSB Share Center Configuration Window This section describes the utility’s configuration window, which allows you to set certain options for the utility. These options do not apply to the USB devices connected to the NBG4615. You can open it by clicking the Tools > Configuration menu command. Figure 4 ZyXEL NetUSB Share Center Utility Configuration Window The following table describes the labels in this window.
Chapter 3 ZyXEL NetUSB Share Center Utility Figure 5 ZyXEL NetUSB Share Center Utility Auto-Connect Printer List Window The following table describes the labels in this screen. Table 5 ZyXEL NetUSB Share Center Utility Auto-Connect Printer List Window LABEL DESCRIPTION Server IP & Printer Name Displays a list of print server IPs and printer names connected to this NBG4615. Windows Printer Name Displays a corresponding list of Windows printer names connected to this devices listed in the other list.
Chapter 3 ZyXEL NetUSB Share Center Utility 1 Click the X on the upper-right corner of the Utility: 2 This will close the Utility screen to an icon at the system tray of your computer. Right-click on the Utility’s icon and click Exit.
Chapter 3 ZyXEL NetUSB Share Center Utility 32 NBG4615 User’s Guide
C HAPT ER 4 Connection Wizard 4.1 Overview This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP for your Internet account information. Leave a field blank if you don’t have that information. 4.2 Accessing the Wizard Launch your web browser and type "http://192.168.1.1" as the website address. Type "1234" (default) as the password and click Login.
Chapter 4 Connection Wizard 4.3 Connect to Internet The NBG4615 offers five Internet connection types. They are Static IP, DHCP, PPPoE, PPTP or L2TP. The wizard attempts to detect which WAN connection type you are using. Figure 7 Detecting your Internet Connection Type If the wizard does not detect a connection type, you must select one from the drop-down list box. Check with your ISP to make sure you use the correct type. Note: If you get an error message, check your hardware connections.
Chapter 4 Connection Wizard 4.3.1 Connection Type: DHCP Choose DHCP as the Internet Connection Type when the WAN port is used as a regular Ethernet. Click Next. Figure 9 Internet Connection Type: DHCP Note: If you get an error screen after clicking Next, you might have selected the wrong Internet Connection type. Click Back, make sure your Internet connection is working and select the right Connection Type. Contact your ISP if you are not sure of your Internet Connection type. 4.3.
Chapter 4 Connection Wizard Table 7 Internet Connection Type: Static IP (continued) LABEL DESCRIPTION Default Gateway Enter the gateway IP address in this field. Primary DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 8 Internet Connection Type: PPPoE LABEL DESCRIPTION Internet Connection Type Select the PPPoE option for a dial-up connection. Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address. Static IP Select this radio button, provided by your ISP to give the NBG4615 a fixed, unique IP address. IP Address Type the name of your service provider.
Chapter 4 Connection Wizard The following table describes the fields in this screen Table 9 Internet Connection Type: PPTP LABEL DESCRIPTION Internet Connection Type Select PPTP from the drop-down list box. To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection. Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address.
Chapter 4 Connection Wizard Table 10 Internet Connection Type: L2TP (continued) LABEL DESCRIPTION Static IP Select this radio button, provided by your ISP to give the NBG4615 a fixed, unique IP address. L2TP Address Type the (static) IP address assigned to you by your ISP. L2TP Subnet Mask Type the subnet mask assigned to you by your ISP (if given). L2TP Gateway IP Address Type the gateway IP address of the L2TP server. L2TP Server IP Address Type the server IP address of the L2TP server.
Chapter 4 Connection Wizard 4.4 Router Password Change the login password in the following screen. Enter the new password and retype it to confirm. Click Next to proceed with the Wireless Security screen. Figure 15 Router Password 4.5 Wireless Security Configure Wireless Settings. Configure the wireless network settings on your NBG4615 in the following screen. The fields that show up depend on the kind of security you select. 4.5.
Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 11 Wireless Security: No Security LABEL DESCRIPTION Wireless Network Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. Security mode Select a Security level from the drop-down list box. If you change this field on the NBG4615, make sure all wireless stations use the same SSID in order to access the network.
Chapter 4 Connection Wizard Table 12 Wireless Security: WPA-PSK/WPA2-PSK (continued) LABEL DESCRIPTION Verify Password Retype the password to confirm. Exit Click this to close the wizard screen without saving. Back Click this to return to the previous screen. Next Click this to continue. Congratulations! Open a web browser, such as Internet Explorer, to visit your favorite website.
C HAPT ER 5 Introducing the Web Configurator 5.1 Overview This chapter describes how to access the NBG4615 Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG4615 via Internet browser. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3 and later versions, or Safari 2.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 5 Introducing the Web Configurator The Web Configurator initially displays the following login screen. Figure 19 Login screen The following table describes the labels in this screen. Table 13 Login screen LABEL DESCRIPTION Password Type "1234" (default) as the password. Language Select the language you want to use to configure the Web Configurator. Click Login. This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 5.2.3.1 on page 46.
Chapter 5 Introducing the Web Configurator The following table describes the labels in this screen. Table 14 Change Password Screen LABEL DESCRIPTION New Password Type a new password. Retype to Confirm Retype the password for confirmation. Apply Click Apply to save your changes back to the NBG4615. Ignore Click Ignore if you do not want to change the password this time.
Chapter 5 Introducing the Web Configurator Table 15 Home Screen (continued) LABEL DESCRIPTION (This is just an example). This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 5.2.3.1 on page 46. (This is just an example). This shows the time (hh:mm:ss) and date (yyyy:mm:dd) of the timezone you select in Section 5.2.3.2 on page 46 or Section 29.5 on page 217. 5.2.3.
Chapter 5 Introducing the Web Configurator 5.3 Resetting the NBG4615 If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the NBG4615 to reload the factory-default configuration file. This means that you will lose all configurations that you had previously saved, the password will be reset to “1234” and the IP address will be reset to “192.168.1.1”. 5.3.1 How to Use the RESET Button 1 Make sure the power LED is on.
Chapter 5 Introducing the Web Configurator 48 NBG4615 User’s Guide
C HAPT ER 6 Monitor 6.1 Overview This chapter discusses read-only information related to the device state of the NBG4615. To access the Monitor screens, go to Expert Mode after login, then click show the complete menu. . Click open all to You can also click the links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/received as well as the status of clients connected to the NBG4615. 6.
Chapter 6 Monitor 6.3.1 View Log Use the View Log screen to see the logged messages for the NBG4615. The log wraps around and deletes the old entries after it fills. Select what logs you want to see from the Display drop list. The log choices depend on your settings in the Log Settings screen. Click Refresh to renew the log screen. Click Clear to delete all the logs. Figure 24 View Log You can configure which logs to display in the View Log screen.
Chapter 6 Monitor 6.4 BW MGMT Monitor The Bandwidth Management (BW MGMT) Monitor allows you to view the amount of network bandwidth that applications running in the network are using. The bandwidth is measured in kilobytes per second (kbps). The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 26 Summary: BW MGMT Monitor 6.
Chapter 6 Monitor Address, IP Address, and Expiration time) of all network clients using the NBG4615’s DHCP server. Figure 27 Summary: DHCP Table The following table describes the labels in this screen. Table 18 Summary: DHCP Table LABEL DESCRIPTION # This is the index number of the host computer. MAC Address This field shows the MAC address of the computer with the name in the Host Name field. Every Ethernet device has a unique MAC (Media Access Control) address which uniquely identifies a device.
Chapter 6 Monitor 6.6 Packet Statistics Click the Packet Statistics (Details...) hyperlink in the Status screen. Read-only information here includes port status, packet specific statistics and the "system up time". The Poll Interval(s) field is configurable and is used for refreshing the screen. Figure 28 Summary: Packet Statistics The following table describes the labels in this screen. Table 19 Summary: Packet Statistics LABEL DESCRIPTION Port This is the NBG4615’s port type.
Chapter 6 Monitor 6.7 WLAN Station Status Click the WLAN Station Status (Details...) hyperlink in the Status screen. View the wireless stations that are currently associated to the NBG4615 in the Association List. Association means that a wireless client (for example, your network or computer with a wireless network card) has connected successfully to the AP (or wireless router) using the same SSID, channel and security settings.
C HAPT ER 7 NBG4615 Modes 7.1 Overview This chapter introduces the different modes available on your NBG4615. First, the term “mode” refers to two things in this User’s Guide. • Web Configurator mode. This refers to the Web Configurator interface you want to use for editing NBG4615 features. • Device mode. This is the operating mode of your NBG4615, or simply how the NBG4615 is being used in the network. 7.1.
Chapter 7 NBG4615 Modes For more information on these modes and to change the mode of your NBG4615, refer to Chapter 29 on page 224. The menu for changing device modes is available in Expert mode only. Note: Choose your Device Mode carefully to avoid having to change it later. When changing to another mode, the IP address of the NBG4615 changes. The running applications and services of the network devices connected to the NBG4615 can be interrupted.
C HAPT ER 8 Easy Mode 8.1 Overview The Web Configurator is set to Easy Mode by default. You can configure several key features of the NBG4615 in this mode. This mode is useful to users who are not fully familiar with some features that are usually intended for network administrators. When you log in to the Web Configurator, the following screen opens.
Chapter 8 Easy Mode Click Status to open the following screen. Figure 31 Easy Mode: Status Screen Navigation Panel Go to Network Map Screen Status Screen Control Panel 8.2 What You Can Do You can do the following in this mode: • Use this Navigation Panel to opt out of the Easy mode (Section 8.4 on page 59). • Use the Network Map screen to check if your NBG4615 can ping the gateway and whether it is connected to the Internet (Section 8.5 on page 59).
Chapter 8 Easy Mode 8.4 Navigation Panel Use this navigation panel to opt out of the Easy mode. Figure 32 Control Panel The following table describes the labels in this screen. Table 21 Control Panel ITEM DESCRIPTION Home Click this to go to the Login page. Expert Mode Click this to change to Expert mode and customize features of the NBG4615. Logout Click this to end the Web Configurator session. 8.
Chapter 8 Easy Mode The line connecting the NBG4615 to the gateway becomes green when the NBG4615 is able to ping the gateway. It becomes red when the ping initiating from the NBG4615 does not get a response from the gateway. The same rule applies to the line connecting the gateway to the Internet. You can also view the devices (represented by icons indicating the kind of network device) connected to the NBG4615, including those connecting wirelessly.
Chapter 8 Easy Mode Table 22 Control Panel (continued) ITEM DESCRIPTION Firewall Switch ON to ensure that your network is protected from Denial of Service (DoS) attacks. Otherwise, switch OFF. Refer to Section 8.6.5 on page 64 to see this screen. Wireless Security Click this to configure the wireless security, such as SSID, security mode and WPS key on your NBG4615. Refer to Section 8.6.6 on page 64 to see this screen. 8.6.
Chapter 8 Easy Mode Disabling the wireless capability lowers the energy consumption of the of the NBG4615. Figure 36 Power Saving The following table describes the labels in this screen. Table 23 Power Saving LABEL DESCRIPTION WLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off (depending on what you selected in the WLAN Status field). This field works in conjunction with the Day and For the following times fields.
Chapter 8 Easy Mode 8.6.3 Content Filter Use this screen to restrict access to certain websites, based on keywords contained in URLs, to which you do not want users in your network to open. Figure 37 Content Filter The following table describes the labels in this screen. Table 24 Content Filter LABEL DESCRIPTION Add Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed. Note: The NBG4615 does not recognize wildcard characters as keywords.
Chapter 8 Easy Mode The NBG4615 uses bandwidth management for incoming and outgoing traffic. Rank the services and applications by dragging them accordingly from High to Low and click Apply. Click Cancel to close the screen. Figure 38 Bandwidth MGNT Use your mouse to drag the items according to how you want to prioritize them. Left-click and slide up or down. 8.6.5 Firewall Enable this feature to protect the network from Denial of Service (DoS) attacks.
Chapter 8 Easy Mode Note: You can enable the Wireless function of your NBG4615 by first turning on the switch in the back panel. Figure 40 Wireless Security The following table describes the general wireless LAN labels in this screen. Table 25 Wireless Security LABEL DESCRIPTION Wireless Network Name (SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID.
Chapter 8 Easy Mode 8.6.7 WPS Use this screen to add a wireless station to the network using WPS. Click WPS in the Wireless Security to open the following screen. Figure 41 Wireless Security: WPS The following table describes the labels in this screen. Table 26 Wireless Security: WPS LABEL DESCRIPTION Wireless Security Click this to go back to the Wireless Security screen. WPS Create a secure wireless network simply by pressing a button.
Chapter 8 Easy Mode 8.7 Status Screen in Easy Mode In the Network Map screen, click Status to view read-only information about the NBG4615. Figure 42 Status Screen in Easy Mode The following table describes the labels in this screen. Table 27 Status Screen in Easy Mode ITEM DESCRIPTION Name This is the name of the NBG4615 in the network. You can change this in the Maintenance > General screen in Section 29.3 on page 215. Time This is the current system date and time.
C HAPT ER 9 Router Mode 9.1 Overview The NBG4615 is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the NBG4615 connects the local network (LAN1 ~ LAN4) to the Internet. Figure 43 NBG4615 Network Modem Note: The Status screen is shown after changing to the Expert mode of the Web Configurator. It varies depending on the device mode of your NBG4615.
Chapter 9 Router Mode 9.2 Router Mode Status Screen Click to open the status screen. Figure 44 Status Screen: Router Mode The following table describes the icons shown in the Status screen. Table 28 Status Screen Icon Key: Router Mode ICON DESCRIPTION Logout Click this at any time to exit the Web Configurator. Click this to go to the Home page. See Chapter 6 on page 49. Click this icon to view copyright and a link for related product information. Click this icon to go to Easy Mode.
Chapter 9 Router Mode Table 28 Status Screen Icon Key: Router Mode (continued) ICON DESCRIPTION Click this icon to see the Status page. The information in this screen depends on the device mode you select. Click this icon to see the Monitor navigation menu. Click this icon to see the Configuration navigation menu. Click this icon to see the Maintenance navigation menu. The following table describes the labels shown in the Status screen.
Chapter 9 Router Mode Table 29 Status Screen: Router Mode (continued) LABEL DESCRIPTION Item This column shows the type of data the NBG4615 is recording. Data This column shows the actual data recorded by the NBG4615. System Up Time This is the total time the NBG4615 has been on. Current Date/Time This field displays your NBG4615’s present date and time. System Resource - CPU Usage This displays what percentage of the NBG4615’s processing ability is currently used.
Chapter 9 Router Mode 9.2.1 Navigation Panel Use the sub-menus on the navigation panel to configure NBG4615 features. Figure 45 Navigation Panel: Router Mode The following table describes the sub-menus. Table 30 Navigation Panel: Router Mode LINK TAB Status FUNCTION This screen shows the NBG4615’s general device, system and interface status information. Use this screen to access the wizard, and summary statistics tables.
Chapter 9 Router Mode Table 30 Navigation Panel: Router Mode (continued) LINK TAB FUNCTION General Use this screen to configure wireless LAN. Security Use this screen to configure the level of wireless security for the NBG4615. MAC Filter Use the MAC filter screen to configure the NBG4615 to block access to devices or block the devices from accessing the NBG4615. Advanced This screen allows you to configure advanced wireless settings.
Chapter 9 Router Mode Table 30 Navigation Panel: Router Mode (continued) LINK TAB FUNCTION General Use this screen to enable bandwidth management. Advanced Use this screen to set the upstream bandwidth and edit a bandwidth management rule. Monitor Use this screen to view the amount of network bandwidth that applications running in the network are using. Remote Management WWW Use this screen to be able to access the NBG4615 from the LAN, WAN or both.
C HAPTER 10 Access Point Mode 10.1 Overview Use your NBG4615 as an access point (AP) if you already have a router or gateway on your network. In this mode your NBG4615 bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example. Figure 46 Wireless Internet Access in Access Point Mode Many screens that are available in Router mode are not available in Access Point mode, such as bandwidth management and firewall.
Chapter 10 Access Point Mode 10.3.1 Setting your NBG4615 to AP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To use your NBG4615 as an access point, go to Maintenance > Sys OP Mode > General and select Access Point mode. Figure 47 Changing to Access Point mode Note: You have to log in to the Web Configurator again when you change modes.As soon as you do, your NBG4615 is already in Access Point mode.
Chapter 10 Access Point Mode 3 Click Start > Run on your computer in Windows. Type “cmd” in the dialog box. Enter “ipconfig” to show your computer’s IP address. If your computer’s IP address is not in the correct range then see Appendix D on page 263 for information on changing your computer’s IP address. 4 After you’ve set your computer’s IP address, open a web browser such as Internet Explorer and type “192.168.1.2” as the web address in your web browser.
Chapter 10 Access Point Mode 10.4 AP Mode Status Screen Click to open the Status screen. Figure 49 Status Screen: Access Point Mode The following table describes the labels shown in the Status screen. Table 31 Status Screen: Access Point Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes.
Chapter 10 Access Point Mode Table 31 Status Screen: Access Point Mode (continued) LABEL DESCRIPTION - WLAN OP Mode This is the device mode (Section 7.1.2 on page 55) to which the NBG4615’s wireless LAN is set - Access Point Mode. - MAC Address This shows the wireless adapter MAC Address of your device. - Status This shows the current status of the Wireless LAN - ON or OFF. - Name (SSID) This shows a descriptive name used to identify the NBG4615 in the wireless LAN.
Chapter 10 Access Point Mode 10.4.1 Navigation Panel Use the menu in the navigation panel to configure NBG4615 features in Access Point mode. The following screen and table show the features you can configure in Access Point mode. Figure 50 Menu: Access Point Mode Refer to Table 30 on page 72 for descriptions of the labels shown in the Navigation panel. 10.5 LAN Screen Use this section to configure your LAN settings while in Access Point mode. Click Network > LAN to see the screen below.
Chapter 10 Access Point Mode The table below describes the labels in the screen. Table 32 Network > LAN > IP LABEL DESCRIPTION Get from DHCP Server Click this to deploy the NBG4615 as an access point in the network. When you enable this, the NBG4615 gets its IP address from the network’s DHCP server (for example, your ISP). Users connected to the NBG4615 can now access the network (i.e., the Internet if the IP address is given by the ISP).
C HAPTER 11 Universal Repeater Mode 11.1 Overview In universal repeater mode, your NBG4615 can act as an access point and wireless client at the same time. The NBG4615 can connect to an existing network through another access point and also lets wireless clients connect to the network through it. This helps you expand wireless coverage when you have an access point or wireless router already in your network. In the example below, the NBG4615 (A) is configured as a universal repeater.
Chapter 11 Universal Repeater Mode 11.3 What You Need to Know With the exception of the Wireless LAN > AP Client screen, other configuration screens in Universal Repeater mode are similar to the ones in Access Point Mode. See Chapter 15 on page 125 through Chapter 29 on page 224 of this User’s Guide. 11.4 Setting your NBG4615 to Universal Repeater Mode 1 Connect your computer to the LAN port of the NBG4615. 2 The default IP address of the NBG4615 is “192.168.1.2”.
Chapter 11 Universal Repeater Mode Note: The Universal Repeater mode IP address is always the same as the Access Point mode IP address. If you changed the IP address of your NBG4615 while in Access Point mode, use this IP address in Universal Repeater mode. 9 When you select Universal Repeater Mode, the following pop-up message window appears. Figure 54 Pop up for Universal Repeater mode Click OK. The Web Configurator refreshes once the change to Universal Repeater mode is successful. 11.
Chapter 11 Universal Repeater Mode The following table describes the labels shown in the Status screen. Table 33 Status Screen: Universal Repeater Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes. Firmware Version This is the firmware version and the date created. Sys OP Mode This is the device mode (Section 7.1.
Chapter 11 Universal Repeater Mode Table 33 Status Screen: Universal Repeater Mode (continued) LABEL DESCRIPTION Packet Statistics Click Details... to go to the Monitor > Packet Statistics screen (Section 6.6 on page 53). Use this screen to view port status and packet specific statistics. WLAN Station Status Click Details... to go to the Monitor > WLAN Station Status screen (Section 6.7 on page 54). Use this screen to view the wireless stations that are currently associated to the NBG4615.
Chapter 11 Universal Repeater Mode Note: To have wireless clients access or acquire an IP address from another access point or wireless router (B) through the NBG4615 (A) in universal repeater mode, you must set the channel number in the Wireless LAN > General screen to be the same as the one on the wireless router or AP to which the NBG4615 wants to connect. B A 11.6.
Chapter 11 Universal Repeater Mode 11.6.2 Static WEP Figure 58 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static WEP The following table describes the labels in this screen. Table 35 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static WEP LABEL DESCRIPTION Universal Repeater Parameters Enable Select this option to have the NBG4615 connect to the specified access point. SSID Enter the name of the access point to which you are connecting.
Chapter 11 Universal Repeater Mode Table 35 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static WEP (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to reload the previous configuration for this screen. 11.6.3 WPA(2)-PSK Figure 59 Universal Repeater Mode: Wireless LAN > Universal Repeater: WPA(2)-PSK The following table describes the labels in this screen.
C HAPTER 12 WISP Mode 12.1 Overview Your NBG4615 can act as a wireless client. In wireless client mode, it can connect to an existing network via an access point. Use this mode if you already have an access point or router in your network. In the example below, one NBG4615 (A) is configured as a wireless client and another is used as an access point (B). The wireless client has two clients that need to connect to the Internet. The NBG4615 wirelessly connects to the available access point (B).
Chapter 12 WISP Mode 12.3.1 Setting your NBG4615 to WISP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To set your NBG4615 to WISP Mode, go to Maintenance > Sys OP Mode > General and select WISP Mode. Figure 61 Changing to WISP mode Note: You have to log in to the Web Configurator again when you change modes.As soon as you do, your NBG4615 is already in WISP mode.
Chapter 12 WISP Mode 2 The default IP address of the NBG4615 is “192.168.1.1”. If you did not change this, you can use the same IP address in WISP Mode. Open a web browser such as Internet Explorer and type “192.168.1.1” as the web address in your web browser. If you changed the IP address of your NBG4615 while in Router mode, use this IP address in WISP Mode. The WISP Mode IP address is always the same as the Router mode IP address. Note: After clicking Login, the Easy Mode appears.
Chapter 12 WISP Mode Table 37 Status Screen: WISP Mode (continued) LABEL DESCRIPTION Sys OP Mode This is the device mode (Section 7.1.2 on page 55) to which the NBG4615 is set - WISP Mode. WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device. - IP Address This shows the WAN port’s IP address. - IP Subnet Mask This shows the WAN port’s subnet mask. - Default Gateway This shows the WAN port’s gateway IP address.
Chapter 12 WISP Mode Table 37 Status Screen: WISP Mode (continued) LABEL DESCRIPTION DHCP Table Click Details... to go to the Monitor > DHCP Table screen (Section 6.5 on page 51). Use this screen to view current DHCP client information. Packet Statistics Click Details... to go to the Monitor > Packet Statistics screen (Section 6.6 on page 53). Use this screen to view port status and packet specific statistics. Interface Status Interface This displays the NBG4615 port types.
Chapter 12 WISP Mode 12.5 Wireless LAN General Screen Use this screen to configure the wireless LAN settings of your NBG4615. Go to Configuration > Wireless LAN > General to open the following screen. Figure 65 WISP Mode: Wireless LAN > General The following table describes the labels in this screen. Table 38 WISP Mode: Wireless LAN > General LABEL DESCRIPTION WISP Parameters SSID Enter the name of the access point to which you are connecting.
Chapter 12 WISP Mode Table 39 No Security (WISP) (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to reload the previous configuration for this screen. 12.5.1 Static WEP Use this screen if the access point to which you want to connect to uses WEP security mode. Figure 67 WEP (WISP) The following table describes the labels in this screen.
Chapter 12 WISP Mode Table 40 WEP (WISP) (continued) LABEL DESCRIPTION Key 1 to Key 4 The WEP keys are used to encrypt data. Both the NBG4615 and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). You must configure at least one key, only one key can be activated at any one time.
Chapter 12 WISP Mode 12.5.3 Site Survey Screen Use this screen to scan for and connect to a wireless network automatically. Go to Configuration > Site Survey to open the following screen. Figure 69 Configuration > Wireless LAN > Site Survey (WISP) The following table describes the labels in this screen.
C HAPTER 13 WISP + UR Mode 13.1 Overview In WISP + UR mode, the NBG4615 has the same function as in WISP mode. In addition, it can provide WiFi function to the clients on the LAN side. In the example below, one NBG4615 (A) is configured as WISP +UR mode and another is used as an access point (B). The NBG4615 (A) wirelessly connects to the available access point (B), and can provide WiFi wireless function to clients on its LAN side.
Chapter 13 WISP + UR Mode 13.3.1 Setting your NBG4615 to WISP + UR Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To set your NBG4615 to WISP + UR Mode Mode, go to Maintenance > Sys OP Mode > General and select WISP + UR Mode. Figure 71 Changing to WISP + UR mode Note: You have to log in to the Web Configurator again when you change modes. As soon as you do, your NBG4615 is already in WISP + UR mode.
Chapter 13 WISP + UR Mode 2 The default IP address of the NBG4615 is “192.168.1.1”. If you did not change this, you can use the same IP address in WISP + UR Mode. Open a web browser such as Internet Explorer and type “192.168.1.1” as the web address in your web browser. If you changed the IP address of your NBG4615 while in Router mode, use this IP address in WISP + UR Mode Mode. The WISP + UR Mode Mode IP address is always the same as the Router mode IP address.
Chapter 13 WISP + UR Mode The following table describes the labels shown in the Status screen. Table 43 Status Screen: WISP + UR Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes. Firmware Version This is the firmware version and the date created. Sys OP Mode This is the device mode (Section 7.1.
Chapter 13 WISP + UR Mode Table 43 Status Screen: WISP + UR Mode (continued) LABEL DESCRIPTION - Memory Usage This shows what percentage of the heap memory the NBG4615 is using. System Setting - Firewall This shows whether the firewall is enabled or not. - Bandwidth Management This shows whether the bandwidth management is enabled or not. - UPnP This shows whether UPnP is enabled or not. - Configuration Mode This shows the web configurator mode you are viewing - Expert.
Chapter 13 WISP + UR Mode The following screen and table show the features you can configure in Access Point mode. Figure 74 Menu: WISP +UR Mode Refer to Table 30 on page 72 for descriptions of the labels shown in the Navigation panel.
C HAPTER 14 Tutorials 14.1 Overview This chapter provides tutorials for setting up your NBG4615. • Set Up a Wireless Network with WPS • Configure Wireless Security without WPS • Using Multiple SSIDs on the NBG4615 • Connecting the NBG4615 (in Universal Repeater Mode) to an AP or Wireless Router • Connecting to USB Storage with the ZyXEL NetUSB Share Center Utility • Automatically Connecting to a USB Printer 14.
Chapter 14 Tutorials 4 Log into NBG4615’s Web Configurator and press the Push Button in the Configuration > Network > Wireless Client > WPS Station screen. Note: Your NBG4615 has a WPS button located on its back panel, as well as a WPS button in its configuration utility. Both buttons have exactly the same function; you can use one or the other. Note: It doesn’t matter which button is pressed first. You must press the second button within two minutes of pressing the first one.
Chapter 14 Tutorials 2 Enter the PIN number to the PIN field in the Configuration > Network > Wireless LAN > WPS Station screen on the NBG4615. 3 Click Start buttons (or button next to the PIN field) on both the wireless client utility screen and the NBG4615’s WPS Station screen within two minutes. The NBG4615 authenticates the wireless client and sends the proper configuration settings to the wireless client. This may take up to two minutes.
Chapter 14 Tutorials Follow the steps below to configure the wireless settings on your NBG4615. The instructions require that your hardware is connected (see the Quick Start Guide) and you are logged into the Web Configurator through your LAN connection (see Section 5.2 on page 43). 108 1 Make sure the WLAN switch (at the back panel of the NBG4615) is set to ON. 2 Open the Configuration > Wireless LAN > General screen in the AP’s Web Configurator. 3 Confirm that the status of wireless LAN is ON.
Chapter 14 Tutorials 6 Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. 14.3.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 1 The NBG4615 supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
Chapter 14 Tutorials 110 4 Select SSID_Example3 and click Connect. 5 Select WPA-PSK and type the security key in the following screen. Click Next. 6 The Confirm Save window appears. Check your settings and click Save to continue.
Chapter 14 Tutorials 7 Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide. If your connection is successful, open your Internet browser and enter http://www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured. 14.
Chapter 14 Tutorials For example, you may set up three wireless networks (A, B and C) in your office. A is for workers, B is for guests and C is specific to a VoIP device in the meeting room. A SSID_Worker C SSID_VoIP B SSID_Guest 14.4.1 Configuring Security Settings of Multiple SSIDs The NBG4615 is in access point mode by default. If you want to use multiple SSIDs when the NBG4615 is in universal repeater mode, see Chapter 11 on page 82 for how to set the NBG4615 to universal repeater mode.
Chapter 14 Tutorials 5 Enter “1234” (default) as the password and click Login. 6 Type a new password and retype it to confirm, then click Apply. Otherwise, click Ignore. 7 The Easy mode appears. Click Expert Mode in the navigation panel. 8 Go to Configuration > Network > Wireless LAN > General. Configure the screen as follows. In this example, you select Enable Intra-BSS Traffic for SSID_Worker and SSID_Guest to allow wireless clients in the same wireless network to communicate with each other.
Chapter 14 Tutorials 10 Select SSID_Guest from the SSID drop-down list. Configure the screen as follows. Click Apply. 11 Select SSID_VoIP from the SSID drop-down list. Configure the screen as follows. Click Apply.
Chapter 14 Tutorials 12 Click the MAC Filter tab to configure MAC filtering for the SSID_VoIP wireless network. Select SSID_VoIP from the SSID drop-down list and select Allow in the Policy field. Enter the VoIP device’s MAC address in the Add a station Mac Address field and click Apply to allow only the VoIP device to associate with the NBG4615 using this SSID. 14.
Chapter 14 Tutorials 8 On the left of the screen, click Maintenance > Sys OP Mode and select Universal Repeater Mode. Click Apply. The NBG4615 restarts. 9 Enter the password and click Login to access the web configurator again. Click Expert Mode. 10 Go to Configuration > Network > Wireless LAN > Universal Repeater to connect the NBG4615 wirelessly to an AP. Select Enable. Enter the SSID of the existing AP or wireless router to which you want to connect (“SSIDofMyAP” in this example).
Chapter 14 Tutorials 11 Set the channel number in the Wireless LAN > General screen to be the same as the one on the wireless router or AP to which the NBG4615 is connecting. This allows wireless clients access or acquire an IP address from another AP or wireless router through the NBG4615 in universal repeater mode.
Chapter 14 Tutorials 12 Go to the Status screen. If the NBG4615 has successfully connected to an AP or wireless router, it displays the SSID and MAC address of the AP or wireless router in the field next to WLAN Station Status under Device Information. To check whether a wireless client is currently connecting to the NBG4615, click the WLAN Station Status (Details...) hyperlink under Summary in the Status screen or Monitor > WLAN Station Status. See Chapter 6 on page 49 for more information.
Chapter 14 Tutorials 14.6 Connecting to USB Storage with the ZyXEL NetUSB Share Center Utility This tutorial shows you how to connect to a USB device over your NBG4615 network by using the ZyXEL NetUSB Share Center Utility. 1 Install the ZyXEL NetUSB Share Center Utility on the computer to which you want to connect the USB device. See Chapter 3 on page 26 for details on the installation. 2 Connect a USB device to one of the USB ports of the NBG4615.
Chapter 14 Tutorials 1 After the first computer (A) finishes using the USB device, click Disconnect on the Utilty to unmount it. 2 Click Connect on the Utility of the second computer (B) to mount the USB device on B. 3 If A does not disconnect from the USB device, B cannot use it. B can click the Request to Connect button to request A to disconnect. B will see the following message on its Utility: 4 A will receive the following message on its Utility screen.
Chapter 14 Tutorials 14.7 Automatically Connecting to a USB Printer Your computer can connect to a shared USB printer by using the ZyXEL NetUSB Share Center Utility. This tutorial shows you how to set your computer to automatically connect to a shared USB printer over your NBG4615 network each time you log into your computer. 1 Install the ZyXEL NetUSB Share Center Utility to your computer. See Chapter 3 on page 26 for details on the installation.
Chapter 14 Tutorials 122 6 Select the USB printer you want to connect to and click Apply. 7 Now your computer can automatically connect to this shared USB printer over your NBG4615 network each time you log into your computer. The printer will be automatically added to your printer list. 8 The Utility supports one connection to the NBG4615’s USB device at a time.
P ART II Technical Reference 123
C HAPTER 15 Wireless LAN 15.1 Overview This chapter discusses how to configure the wireless network settings in your NBG4615. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 77 Example of a Wireless Network The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.
Chapter 15 Wireless LAN • Use the Advanced screen to allow intra-BSS networking and set the RTS/CTS Threshold (Section 15.5 on page 136). • Use the QoS screen to ensure Quality of Service (QoS) in your wireless network (Section 15.6 on page 137). • Use the WPS screen to quickly set up a wireless network with strong security, without having to configure security settings manually (Section 15.7 on page 137). • Use the WPS Station screen to add a wireless station using WPS (Section 15.8 on page 139).
Chapter 15 Wireless LAN 00:A0:C5:00:00:02. To get the MAC address for each wireless client, see the appropriate User’s Guide or other documentation. You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security).
Chapter 15 Wireless LAN For example, if the wireless network has a RADIUS server, you can choose WPA or WPA2. If users do not log in to the wireless network, you can choose no encryption, Static WEP, WPA-PSK, or WPA2-PSK. Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. For example, suppose the AP does not have a local user database, and you do not have a RADIUS server. Therefore, there is no user authentication.
Chapter 15 Wireless LAN Note: If you are configuring the NBG4615 from a computer connected to the wireless LAN and you change the NBG4615’s SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the NBG4615’s new settings. 15.2.
Chapter 15 Wireless LAN home or office network. An example is shown next to define maximum bandwidth for your networks (A is Guest WLAN and N is home or company network.) Figure 79 Example: Bandwidth for Different Networks N 600 kbps 300 kbps A 100 kbps Click Network > Wireless LAN to open the General screen.
Chapter 15 Wireless LAN The following table describes the general wireless LAN labels in this screen. Table 45 Network > Wireless LAN > General LABEL DESCRIPTION Wireless LAN This shows whether the wireless LAN is ON or OFF. You can enable or disable the wireless LAN by using the WLAN switch located on the back panel of the NBG4615. Network Name(SSID) The SSID (Service Set IDentity) identifies the Service Set with which a wireless client is associated.
Chapter 15 Wireless LAN See the rest of this chapter for information on the other labels in this screen. 15.3 Wireless Security Screen Use this screen to select the wireless security mode for each SSID. Click Network > Wireless LAN > Security to open the Security screen. The screen varies depending on what you select in the Security Mode field. 15.3.1 No Security Select No Security to allow wireless clients to communicate with the access points without any data encryption.
Chapter 15 Wireless LAN Select Static WEP from the Security Mode list. Figure 82 Network > Wireless LAN > Security: Static WEP The following table describes the wireless LAN security labels in this screen. Table 47 Network > Wireless LAN > Security: Static WEP LABEL DESCRIPTION SSID Select the SSID for which you want to configure the security. Security Mode Select Static WEP to enable data encryption. PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate.
Chapter 15 Wireless LAN Table 47 Network > Wireless LAN > Security: Static WEP (continued) LABEL DESCRIPTION Key 1 to Key 4 The WEP keys are used to encrypt data. Both the NBG4615 and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F").
Chapter 15 Wireless LAN 15.4 MAC Filter The MAC filter screen allows you to configure the NBG4615 to give exclusive access to devices (Allow) or exclude devices from accessing the NBG4615 (Deny). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure this screen.
Chapter 15 Wireless LAN 15.5 Wireless LAN Advanced Screen Use this screen to allow wireless advanced features, such as the output power, RTS/CTS Threshold and high-throughput physical mode settings. Click Network > Wireless LAN > Advanced. The screen appears as shown. Figure 85 Network > Wireless LAN > Advanced The following table describes the labels in this screen.
Chapter 15 Wireless LAN Table 50 Network > Wireless LAN > Advanced (continued) LABEL DESCRIPTION Guard Interval Select Auto to increase data throughput. However, this may make data transfer more prone to errors. Select Long to prioritize data integrity. This may be because your wireless network is busy and congested or the NBG4615 is located in an environment prone to radio interference. Extension Channel This is set to Auto by default.
Chapter 15 Wireless LAN Note: With WPS, wireless clients can only connect to the wireless network using the first SSID on the NBG4615. Figure 87 Network > Wireless LAN > WPS The following table describes the labels in this screen. Table 52 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select this to enable the WPS feature. PIN Number This displays a PIN number last time system generated. Click Generate to generate a new PIN number.
Chapter 15 Wireless LAN 15.8 WPS Station Screen Use this screen when you want to add a wireless station using WPS. To open this screen, click Network > Wireless LAN > WPS Station tab. Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes. To add the second wireless station, you have to press these buttons on both device and the wireless station again after the first 2 minutes.
Chapter 15 Wireless LAN 15.9 Scheduling Screen Use this screen to set the times your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. The wireless LAN can be scheduled to turn on or off on certain days and at certain times. To open this screen, click Network > Wireless LAN > Scheduling tab. Figure 89 Network > Wireless LAN > Scheduling The following table describes the labels in this screen.
Chapter 15 Wireless LAN 15.10 WDS Screen A Wireless Distribution System (WDS) is a wireless connection between two or more APs. Use this screen to set the operating mode of your NBG4615 to AP + Bridge or Bridge and establish wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode. Note: You must enable the same wireless security settings on the NBG4615 and on all wireless clients that you want to associate with it.
Chapter 15 Wireless LAN Table 55 Network > Wireless LAN > WDS (continued) LABEL DESCRIPTION Remote MAC Address This is the MAC address of the peer device that your NBG4615 wants to make a bridge connection with. You can connect to up to 4 peer devices. Security EncrypType Select whether to use WEP, TKIP or AES encryption for your WDS connection in this field. Otherwise, select No Security. 142 EncrypKey The Encryp Key is used to encrypt data. Peers must use the same key for data transmission.
C HAPTER 16 IPv6 16.1 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. • See Appendix G on page 309 for more information on IPv6. 16.1.1 What You Need to Know IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
Chapter 16 IPv6 When IPv6 is enabled on a device, its interface automatically generates a link-local address (beginning with fe80). When the interface is connected to a network with a router and the NBG4615 is set to automatically obtain an IPv6 network prefix from the router for the interface, it generates 3another address which combines its interface ID and global and subnet information advertised from the router. This is a routable global IP address.
Chapter 16 IPv6 16.2.1 IPv6 Connection: Ethernet If you select Ethernet as the IPv6 Connection Type, the following screen displays. Figure 91 Network > IPv6: Ethernet The following table describes the fields in this screen. Table 56 Network > IPv6: Ethernet LABEL DESCRIPTION IPv6 Connection Type Setup IPv6 Connection Type Select Ethernet as the IPv6 connection type if your ISP provides you a static IPv6 address. You need to enter the IPv6 information below according to what your ISP provided.
Chapter 16 IPv6 Table 56 Network > IPv6: Ethernet (continued) LABEL DESCRIPTION Address Autoconfiguration Setup Enable Address Autoconfiguration Select the checkbox to enable Address Autoconfiguration on the NBG4615. Type Select the IPv6 autoconfiguration type: Stateless or Stateful. If you choose Stateful, enter the beginning and end of the IPv6 address range in the fields below. If you choose Stateless, IP addresses are not generated by a DHCP server.
Chapter 16 IPv6 The following table describes the fields in this screen. Table 57 Network > IPv6: DHCPv6 LABEL DESCRIPTION IPv6 Connection Type Setup IPv6 Connection Type Select DHCPv6 as the IPv6 connection type if you want to obtain an IPv6 address from a DHCPv6 server. IPv6 DNS Setup DNS Setup Select From ISP if your ISP dynamically assigns IPv6 DNS server information. Or select User-Defined to configure them manually. First DNS Server Enter the primary DNS server's IP address in this field.
Chapter 16 IPv6 If you select Link-local only as the IPv6 Connection Type, the following screen displays.
C HAPTER 17 WAN 17.1 Overview This chapter discusses the NBG4615’s WAN screens. Use these screens to configure your NBG4615 for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations. Figure 94 LAN and WAN 17.
Chapter 17 WAN 17.3.1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Chapter 17 WAN 17.3.2 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. Figure 95 Multicast Example In the multicast example above, systems A and D comprise one multicast group. In multicasting, the server only needs to send one data stream and this is delivered to systems A and D.
Chapter 17 WAN This screen displays when you select Ethernet encapsulation. Figure 96 Network > WAN > Internet Connection: Ethernet Encapsulation The following table describes the labels in this screen. Table 58 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation You must choose the Ethernet option when the WAN port is used as a regular Ethernet.
Chapter 17 WAN Table 58 Network > WAN > Internet Connection: Ethernet Encapsulation (continued) LABEL DESCRIPTION Use Fixed IP Address Select this option If the ISP assigned a fixed IP address. IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address. IP Subnet Mask Enter the IP Subnet Mask in this field. Gateway IP Address Enter a Gateway IP Address (if your ISP gave you one) in this field.
Chapter 17 WAN By implementing PPPoE directly on the NBG4615 (rather than individual computers), the computers on the LAN do not need PPPoE software installed, since the NBG4615 does that part of the task. Furthermore, with NAT, all of the LANs’ computers will have access. This screen displays when you select PPPoE encapsulation. Figure 97 Network > WAN > Internet Connection: PPPoE Encapsulation The following table describes the labels in this screen.
Chapter 17 WAN Table 59 Network > WAN > Internet Connection: PPPoE Encapsulation (continued) LABEL DESCRIPTION WAN IP Address Assignment Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection. Use Fixed IP Address Select this option If the ISP assigned a fixed IP address. My WAN IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address.
Chapter 17 WAN This screen displays when you select PPTP encapsulation. Figure 98 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen. Table 60 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access 156 Connection Type To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection.
Chapter 17 WAN Table 60 Network > WAN > Internet Connection: PPTP Encapsulation (continued) LABEL DESCRIPTION Idle Timeout This value specifies the time in minutes that elapses before the NBG4615 automatically disconnects from the PPTP server. PPTP Configuration Server IP Address Type the IP address of the PPTP server. Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection.
Chapter 17 WAN This screen displays when you select L2TP encapsulation. Figure 99 Network > WAN > Internet Connection: L2TP Encapsulation The following table describes the labels in this screen. Table 61 Network > WAN > Internet Connection: L2TP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type To configure a L2TP client, you must configure the User Name and Password fields for a layer-2 connection and the L2TP parameters for an L2TP connection.
Chapter 17 WAN Table 61 Network > WAN > Internet Connection: L2TP Encapsulation (continued) LABEL DESCRIPTION IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address. IP Subnet Mask Your NBG4615 will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the NBG4615. Gateway IP Address Enter a Gateway IP Address (if your ISP gave you one) in this field.
Chapter 17 WAN To change your NBG4615’s advanced WAN settings, click Network > WAN > Advanced. The screen appears as shown. Figure 100 Network > WAN > Advanced The following table describes the labels in this screen. Table 62 Network > WAN > Advanced LABEL DESCRIPTION Multicast Setup Multicast Select IGMPv1/v2 to enable multicasting. This applies to traffic routed from the WAN to the LAN. Select None to disable this feature.
Chapter 17 WAN IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group - it is not used to carry user data. Click Network > WAN > IGMP Snooping. The screen appears as shown. Figure 101 Network > WAN > IGMP Snooping The following table describes the labels in this screen. Table 63 Network > WAN > IGMP Snooping LABEL DESCRIPTION Enable IGMP Snooping Select this option to have the NBG4615 use IGMP snooping.
Chapter 17 WAN 162 NBG4615 User’s Guide
C HAPTER 18 LAN 18.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks. Figure 102 LAN Example The LAN screens can help you manage IP addresses. 18.
Chapter 18 LAN 18.3 What You Need To Know The actual physical connection determines whether the NBG4615 ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 103 LAN and WAN IP Addresses The LAN parameters of the NBG4615 are preset in the factory with the following values: • IP address of 192.168.1.1 with subnet mask of 255.255.255.
Chapter 18 LAN 18.4 LAN IP Screen Use this screen to change the IP address for your NBG4615. Click Network > LAN > IP. Figure 104 Network > LAN > IP The following table describes the labels in this screen. Table 64 Network > LAN > IP LABEL DESCRIPTION IP Address Type the IP address of your NBG4615 in dotted decimal notation. IP Subnet Mask The subnet mask specifies the network number portion of an IP address.
Chapter 18 LAN Table 65 Network > LAN > IP Alias (continued) 166 LABEL DESCRIPTION IP Subnet Mask The subnet mask specifies the network number portion of an IP address. Your NBG4615 will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the NBG4615. Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to begin configuring this screen afresh.
C HAPTER 19 DHCP Server 19.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG4615’s LAN as a DHCP server or disable it. When configured as a server, the NBG4615 provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 19.1.
Chapter 19 DHCP Server 19.2 General Use this screen to enable the DHCP server. Click Network > DHCP Server. The following screen displays. Figure 106 Network > DHCP Server > General The following table describes the labels in this screen. Table 66 Network > DHCP Server > General LABEL DESCRIPTION Enable DHCP Server Select the checkbox to enable DHCP for LAN.
Chapter 19 DHCP Server 19.3 Advanced This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses. You can also use this screen to configure the DNS server information that the NBG4615 sends to the DHCP clients. To change your NBG4615’s static DHCP settings, click Network > DHCP Server > Advanced. The following screen displays. Figure 107 Network > DHCP Server > Advanced The following table describes the labels in this screen.
Chapter 19 DHCP Server Table 67 Network > DHCP Server > Advanced (continued) LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG4615's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
C HAPTER 20 NAT 20.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. The figure below is a simple illustration of a NAT network.
Chapter 20 NAT • Use the Advanced screen to change your NBG4615’s trigger port settings (Section 20.5.3 on page 178). 20.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. Inside/Outside This denotes where a host is located relative to the NBG4615, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.
Chapter 20 NAT all incoming inquiries, thus preventing intruders from probing your network. For more information on IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT). How NAT Works Each packet has two addresses – a source address and a destination address. For outgoing packets, the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address) is the source address on the WAN.
Chapter 20 NAT The following table describes the labels in this screen. Table 69 Network > NAT > General LABEL DESCRIPTION NAT Setup Enable Network Address Translation Network Address Translation (NAT) allows the translation of an Internet protocol address used within one network (for example a private IP address used in a local network) to a different IP address known within another network (for example a public IP address used on the Internet). Select the check box to enable NAT.
Chapter 20 NAT The following table describes the labels in this screen. Table 70 Network > NAT > Application LABEL DESCRIPTION Add Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address. Clear the checkbox to disallow forwarding of these ports to an inside server without having to delete the entry.
Chapter 20 NAT 20.4 Advanced To change your NBG4615’s trigger port settings, click Network > NAT > Advanced. The screen appears as shown. Note: Only one LAN computer can use a trigger port (range) at a time. Figure 112 Network > NAT > Advanced The following table describes the labels in this screen. Table 71 Network > NAT > Advanced LABEL DESCRIPTION # This is the rule index number (read-only). Name Type a unique name (up to 15 characters) for identification purposes.
Chapter 20 NAT 20.5 Technical Reference The following section contains additional technical information about the NBG4615 features described in this chapter. 20.5.1 NATPort Forwarding: Services and Port Numbers A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make accessible to the outside world even though NAT makes your whole inside network appear as a single machine to the outside world.
Chapter 20 NAT 20.5.3 Trigger Port Forwarding Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is that port forwarding only forwards a service to a single LAN IP address.
Chapter 20 NAT 20.5.5 Two Points To Remember About Trigger Ports 1 Trigger events only happen on data that is going coming from inside the NBG4615 and going to the outside. 2 If an application needs a continuous data stream, that port (range) will be tied up so that another computer on the LAN can’t trigger it.
Chapter 20 NAT 180 NBG4615 User’s Guide
C HAPTER 21 DDNS 21.1 Overview DDNS services let you use a domain name with a dynamic IP address. 21.1.1 What You Need To Know The following terms and concepts may help as you read through this chapter. What is DDNS? DDNS, or Dynamic DNS, allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.
Chapter 21 DDNS 21.2 General To change your NBG4615’s DDNS, click Network > DDNS. The screen appears as shown. Figure 115 Dynamic DNS The following table describes the labels in this screen. Table 72 Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup 182 Enable Dynamic DNS Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. Host Name Enter a host names in the field provided.
C HAPTER 22 Static Route 22.1 Overview This chapter shows you how to configure static routes for your NBG4615. Each remote node specifies only the network to which the gateway is directly connected, and the NBG4615 has no knowledge of the networks beyond. For instance, the NBG4615 knows about network N2 in the following figure through remote node Router 1.
Chapter 22 Static Route 22.2 IP Static Route Screen Click Network > Static Route to open the IP Static Route screen. Figure 117 Network > Static Route The following table describes the labels in this screen. Table 73 Network > Static Route LABEL DESCRIPTION Static Routing Settings Route Name Enter a the name that describes or identifies this route. Destination IP Address Enter the IP network address of the final destination.
C HAPTER 23 RIP 23.1 Overview Routing Information Protocol (RIP) is an interior or intra-domain routing protocol that uses distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers. 23.2 RIP Screen Use this screen to enable RIPv1 or RIPv2, which are LAN broadcast protocols. Click Network > RIP. The screen appears as shown.
Chapter 23 RIP 186 NBG4615 User’s Guide
C HAPTER 24 Firewall 24.1 Overview Use these screens to enable and configure the firewall that protects your NBG4615 and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN.
Chapter 24 Firewall What is a Firewall? Originally, the term “firewall” referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from a network that is not trusted. Of course, firewalls cannot solve every security problem.
Chapter 24 Firewall 4 Don't enable any local service (such as NTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network. 5 For local services that are enabled, protect against misuse. Protect by configuring the services to communicate only with specific peers, and protect by configuring rules to block packets for the services at specific interfaces.
Chapter 24 Firewall Click Security > Firewall > Services. The screen appears as shown next. Figure 121 Security > Firewall > Services l The following table describes the labels in this screen. Table 76 Security > Firewall > Services LABEL DESCRIPTION LABEL DESCRIPTION ICMP Internet Control Message Protocol is a message control and error-reporting protocol between a host server and a gateway to the Internet.
Chapter 24 Firewall Table 76 Security > Firewall > Services (continued) LABEL DESCRIPTION Protocol Select the protocol (ALL,TCP, UDP or BOTH) used to transport the packets for which you want to apply the firewall rule. Dest Port Range Enter the port number/range of the destination that define the traffic type, for example TCP port 80 defines web traffic. Source Port Range Enter the port number/range of the source that define the traffic type, for example TCP port 80 defines web traffic.
C HAPTER 25 Content Filtering 25.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords. 25.1.1 What You Need To Know The following terms and concepts may help as you read through this chapter.
Chapter 25 Content Filtering 25.2 Content Filter Use this screen to restrict web features, add keywords for blocking and designate a trusted computer. Click Security > Content Filter to open the Content Filter screen. Figure 122 Security > Content Filter The following table describes the labels in this screen.
Chapter 25 Content Filtering Table 77 Security > Content Filter (continued) LABEL DESCRIPTION Keyword Type a keyword in this field. You may use any character (up to 64 characters). Wildcards are not allowed. You can also enter a numerical IP address. Keyword List This list displays the keywords already added. Add Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed.
Chapter 25 Content Filtering File Name URL Checking Filename URL checking has the NBG4615 check all of the characters in the URL. For example, filename URL checking searches for keywords within the URL www.zyxel.com.tw/ news/pressroom.php. Use the ip urlfilter customize actionFlags 8 [disable | enable] command to extend (or not extend) the keyword blocking search to include the URL's complete filename.
Chapter 25 Content Filtering 196 NBG4615 User’s Guide
C HAPTER 26 Bandwidth Management 26.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN. Downlink traffic comes back from the WAN device (B) to the LAN device (A).
Chapter 26 Bandwidth Management 26.3 What You Need To Know The sum of the bandwidth allotments that apply to the WAN interface (LAN to WAN, WLAN to WAN) must be less than or equal to the Upstream Bandwidth that you configure in the Bandwidth Management Advanced screen (Section 26.5 on page 198).
Chapter 26 Bandwidth Management Note: The two tables shown in this screen can be configured and applied at the same time. Click Management > Bandwidth Management > Advanced to open the bandwidth management Advanced screen. Figure 125 Management > Bandwidth Management > Advanced The following table describes the labels in this screen.
Chapter 26 Bandwidth Management Table 79 Management > Bandwidth Management > Advanced (continued) LABEL DESCRIPTION Application List Use this table to allocate specific amounts of bandwidth based on a pre-defined service. # This is the number of an individual bandwidth management rule. Priority Select a priority from the drop down list box. Choose High, Mid or Low. • • • High - Select this for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay).
Chapter 26 Bandwidth Management 26.5.1 Rule Configuration: Application Rule Configuration If you want to edit a bandwidth management rule for a pre-defined service or application, click the Edit icon in the Application List table of the Advanced screen. The following screen displays. Figure 126 Bandwidth Management Rule Configuration: Application List The following table describes the labels in this screen.
Chapter 26 Bandwidth Management 26.5.2 Rule Configuration: User Defined Service Rule Configuration If you want to edit a bandwidth management rule for other applications or services, click the Edit icon in the User-defined Service table of the Advanced screen. The following screen displays. Figure 127 Bandwidth Management Rule Configuration: User-defined Service The following table describes the labels in this screen.
Chapter 26 Bandwidth Management See Appendix F on page 305 for commonly used services and port numbers. 26.6 Monitor Screen Use this screen to view the amount of network bandwidth that applications running in the network are using. The bandwidth is measured in kilobits per second (kbps). The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using.
Chapter 26 Bandwidth Management Table 82 Media Bandwidth Management Setup: Services (continued) SERVICE DESCRIPTION VoIP (SIP) Sending voice signals over the Internet is called Voice over IP or VoIP. Session Initiated Protocol (SIP) is an internationally recognized standard for implementing VoIP. SIP is an application-layer control (signaling) protocol that handles the setting up, altering and tearing down of voice and multimedia sessions over the Internet.
C HAPTER 27 Remote Management 27.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your NBG4615 from a remote location through the following interfaces: • LAN and WAN • LAN only • WAN only Note: The NBG4615 is managed using the Web Configurator. 27.2 What You Need to Know Remote management over LAN or WAN will not work when: 1 The IP address in the Secured Client IP Address field (Section 27.
Chapter 27 Remote Management 27.3 WWW Screen To change your NBG4615’s remote management settings, click Management > Remote Management > WWW. Figure 129 Management > Remote Management > WWW The following table describes the labels in this screen. Table 83 Management > Remote Management > WWW 206 LABEL DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
C HAPTER 28 Universal Plug-and-Play (UPnP) 28.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.
Chapter 28 Universal Plug-and-Play (UPnP) All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention. 28.3 UPnP Screen Use this screen to enable UPnP on your NBG4615. Click Management > UPnP to display the screen shown next. Figure 130 Management > UPnP The following table describes the fields in this screen.
Chapter 28 Universal Plug-and-Play (UPnP) 2 Right-click the icon and select Properties. Figure 131 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
Chapter 28 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. Figure 133 Internet Connection Properties: Advanced Settings Figure 134 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 28 Universal Plug-and-Play (UPnP) 6 Double-click on the icon to display your current Internet connection status. Figure 136 Internet Connection Status 28.4.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG4615 without finding out the IP address of the NBG4615 first. This comes helpful if you do not know the IP address of the NBG4615. Follow the steps below to access the web configurator. 1 Click Start and then Control Panel.
Chapter 28 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 137 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your NBG4615 and select Invoke. The web configurator login screen displays.
Chapter 28 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your NBG4615 and select Properties. A properties window displays with basic information about the NBG4615.
Chapter 28 Universal Plug-and-Play (UPnP) 214 NBG4615 User’s Guide
C HAPTER 29 Maintenance 29.1 Overview This chapter provides information on the Maintenance screens. 29.2 What You Can Do • Use the General screen to set the timeout period of the management session (Section 29.3 on page 215). • Use the Password screen to change your NBG4615’s system password (Section 29.4 on page 216). • Use the Time screen to change your NBG4615’s time and date (Section 29.5 on page 217). • Use the Firmware Upgrade screen to upload firmware to your NBG4615 (Section 29.6 on page 219).
Chapter 29 Maintenance The following table describes the labels in this screen. Table 85 Maintenance > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the NBG4615 in an Ethernet network. Domain Name Enter the domain name you want to give to the NBG4615. Administrator Inactivity Timer Type how many minutes a management session can be left idle before the session times out. The default is 5 minutes.
Chapter 29 Maintenance 29.5 Time Setting Screen Use this screen to configure the NBG4615’s time based on your local time zone. To change your NBG4615’s time and date, click Maintenance > Time. The screen appears as shown. Figure 142 Maintenance > Time The following table describes the labels in this screen. Table 87 Maintenance > Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NBG4615.
Chapter 29 Maintenance Table 87 Maintenance > Time (continued) LABEL DESCRIPTION New Date This field displays the last updated date from the time server or the last date configured manually. (yyyy/mm/dd) When you select Manual, enter the new date in this field and then click Apply. Get from Time Server Select this radio button to have the NBG4615 get the time and date from the time server you specified below.
Chapter 29 Maintenance 29.6 Firmware Upgrade Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a “*.bin” extension, e.g., “NBG4615.bin”. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. Click Maintenance > Firmware Upgrade. Follow the instructions in this screen to upload firmware to your NBG4615.
Chapter 29 Maintenance If the upload was not successful, an error message appears. Click Return to go back to the Firmware Upgrade screen. 29.7 Configuration Backup/Restore Screen Backup configuration allows you to back up (save) the NBG4615’s current configuration to a file on your computer. Once your NBG4615 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
Chapter 29 Maintenance Table 89 Maintenance > Backup/Restore (continued) LABEL DESCRIPTION Upload Click Upload to begin the upload process. Note: Do not turn off the NBG4615 while configuration file upload is in progress. After you see a “configuration upload successful” screen, you must then wait one minute before logging into the NBG4615 again. The NBG4615 automatically restarts in this time causing a temporary network disconnect.
Chapter 29 Maintenance Router A router connects your local network with another network, such as the Internet. The router has two IP addresses, the LAN IP address and the WAN IP address. Figure 147 LAN and WAN IP Addresses in Router Mode Access Point An access point enabled all ethernet ports to be bridged together and be in the same subnet. To connect to the Internet, another device, such as a router, is required.
Chapter 29 Maintenance Universal Repeater NBG4615 in Universal Repeater mode work as an access point and wireless client simultaneously. Figure 149 Universal Repeater Mode WISP A WISP client connects to an existing access point wirelessly. It acts just like a wireless client in notebooks/computers.
Chapter 29 Maintenance 29.10 Sys OP Mode Screen Use this screen to select how you want to use your NBG4615. Figure 151 Maintenance > Sys OP Mode The following table describes the labels in the General screen. Table 90 Maintenance > Sys OP Mode LABEL DESCRIPTION System Operation Mode Router Select Router Mode if your device routes traffic between a local network and another network such as the Internet. This mode offers services such as a firewall or bandwidth management.
Chapter 29 Maintenance Table 90 Maintenance > Sys OP Mode (continued) LABEL DESCRIPTION WISP Mode Select WISP Mode if your device needs a wireless client to connect to an existing access point. • • You cannot configure Wireless LAN settings (including WPS) and scheduling in the WISP Mode. The IP address of the device on the local network is the same as the IP address given to the NBG4615 while in router mode (default is 192.168.1.1). Apply Click Apply to save your settings.
Chapter 29 Maintenance 226 NBG4615 User’s Guide
C HAPTER 30 Troubleshooting 30.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG4615 Access and Login • Internet Access • Resetting the NBG4615 to Its Factory Defaults • Wireless Router/AP Troubleshooting • USB Device Problems • ZyXEL Share Center Utility Problems 30.2 Power, Hardware Connections, and LEDs The NBG4615 does not turn on.
Chapter 30 Troubleshooting 4 Disconnect and re-connect the power adaptor to the NBG4615. 5 If the problem continues, contact the vendor. 30.3 NBG4615 Access and Login I don’t know the IP address of my NBG4615. 1 The default IP address is 192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the NBG4615 by looking up the IP address of the default gateway for your computer.
Chapter 30 Troubleshooting • If you changed the IP address (Section 18.4 on page 165), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I don’t know the IP address of my NBG4615. 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled. See Appendix B on page 241.
Chapter 30 Troubleshooting 30.4 Internet Access I cannot access the Internet. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 2 Make sure you entered your ISP account information correctly in the wizard. These fields are casesensitive, so make sure [Caps Lock] is not on. 3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP.
Chapter 30 Troubleshooting 3 Reboot the NBG4615. 4 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestion • Check the settings for QoS. If it is disabled, you might consider activating it. 30.5 Resetting the NBG4615 to Its Factory Defaults If you reset the NBG4615, you lose all of the changes you have made. The NBG4615 re-loads its default settings, and the password resets to 1234. You have to make all of your changes again.
Chapter 30 Troubleshooting 4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the NBG4615. 5 Check that both the NBG4615 and your wireless station are using the same wireless and wireless security settings. 6 Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the NBG4615. 7 Make sure you allow the NBG4615 to be remotely accessed through the WLAN interface. Check your remote management settings.
Chapter 30 Troubleshooting • Building Materials: metal doors, aluminum studs. • Electrical devices: microwaves, monitors, electric motors, cordless phones, and other wireless devices. To optimize the speed and quality of your wireless connection, you can: • Move your wireless device closer to the AP if the signal strength is low. • Reduce wireless interference that may be caused by other wireless networks or surrounding wireless electronics such as cordless phones.
Chapter 30 Troubleshooting 1 It is strongly recommended to use version 2.0 or lower USB storage devices (such as memory sticks, USB hard drives) and/or USB devices (such as USB printers). Other USB products are not guaranteed to function properly with the NBG4615. 30.8 ZyXEL Share Center Utility Problems I cannot access or see a USB device that is connected to the NBG4615. 1 Disconnect the problematic USB device, then reconnect it to the NBG4615. 2 Ensure that the USB device in question has power.
Chapter 30 Troubleshooting 3 If A does not disconnect the USB storage, B should click Request to Connect in the Utility to request A to disconnect. B cannot access the USB storage until A disconnects. • See Chapter 14 on page 119 for more details on connecting to USB storage by the Utility.
Chapter 30 Troubleshooting 236 NBG4615 User’s Guide
A PPENDIX A Product Specifications The following tables summarize the NBG4615’s hardware and firmware features. Table 91 Hardware Features Dimensions 162 mm (W) x 106 mm (D) x 28 mm (H) Weight 285g SDRAM 32 MB Flash Memory 8 MB Power Specification Input: 100~240 AC, 50~60 Hz Output: 12 V DC 1.5A Ethernet ports Auto-negotiating: 100 Mbps, 1000 Mbps in either half-duplex or fullduplex mode. Auto-crossover: Use either crossover or straight-through Ethernet cables.
Appendix A Product Specifications Table 92 Firmware Features (continued) FEATURE DESCRIPTION Default Password 1234 DHCP Pool 192.168.1.33 to 192.168.1.64 Wireless Interface Wireless LAN Default Wireless SSID ZyXEL Device Management Use the Web Configurator to easily configure the rich range of features on the NBG4615. Wireless Functionality Allows IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n wireless clients to connect to the NBG4615 wirelessly.
Appendix A Product Specifications Table 92 Firmware Features (continued) FEATURE DESCRIPTION IP Multicast IP Multicast is used to send traffic to a specific group of computers. The NBG4615 supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236). Logging Use logs for troubleshooting. You can view logs in the Web Configurator. PPPoE PPPoE mimics a dial-up Internet access connection.
Appendix A Product Specifications The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm).
A PPENDIX B Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 155 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 242 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 156 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 157 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 158 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 159 Security Settings - Java Scripting Java Permissions 246 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 160 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 161 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 163 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly.
Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 164 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the leftside menu. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 166 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply.
Appendix B Pop-up Windows, JavaScript and Java Permissions 252 NBG4615 User’s Guide
A PPENDIX C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 167 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix C IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 94 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8-bit mask 11111111 00000000 00000000 00000000 255.0.0.0 16-bit mask 11111111 11111111 00000000 00000000 255.255.0.0 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.
Appendix C IP Addresses and Subnetting Table 96 Alternative Subnet Mask Notation (continued) SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.252 /30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub-networks.
Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 169 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix C IP Addresses and Subnetting Table 97 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 98 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix C IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 101 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix C IP Addresses and Subnetting Table 103 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix C IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix C IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
A PPENDIX D Setting Up Your Computer’s IP Address Note: Your specific NBG4615 may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix D Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 264 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon.
Appendix D Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix D Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix D Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix D Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix D Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix D Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix D Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix D Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix D Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix D Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix D Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix D Setting Up Your Computer’s IP Address 276 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix D Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 173 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 278 Click Apple > System Preferences.
Appendix D Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix D Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NBG4615. 6 280 Click Apply and close the window.
Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 174 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix D Setting Up Your Computer’s IP Address 282 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix D Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix D Setting Up Your Computer’s IP Address 284 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 175 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix D Setting Up Your Computer’s IP Address 286 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix D Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix D Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 176 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 288 Click Next to save the changes and close the Network Card Setup window.
Appendix D Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 177 openSUSE 10.
Appendix D Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX E Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix E Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 180 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 181 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix E Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 182 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Appendix E Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix E Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your NBG4615. Table 105 Wireless Security Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.
Appendix E Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access.
Appendix E Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses.
Appendix E Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
Appendix E Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
Appendix E Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server.
Appendix E Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 184 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix E Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.11a) is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area.
Appendix E Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area.
A PPENDIX F Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix F Common Services Table 108 Commonly Used Services (continued) 306 NAME PROTOCOL PORT(S) DESCRIPTION HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program.
Appendix F Common Services Table 108 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP 161 Simple Network Management Program. SNMP-TRAPS TCP/UDP 162 Traps for use with the SNMP (RFC:1215).
Appendix F Common Services 308 NBG4615 User’s Guide
A PPENDIX G IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. IPv6 addresses can be abbreviated in two ways: • Leading zeros in a block can be omitted.
Appendix G IPv6 Global Address A global address uniquely identifies a device on the Internet. It is similar to a “public IP address” in IPv4. A global unicast address starts with a 2 or 3. Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address. It is similar to “0.0.0.0” in IPv4. Loopback Address A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1” in IPv4.
Appendix G IPv6 Table 111 Reserved Multicast Address (continued) MULTICAST ADDRESS FF08:0:0:0:0:0:0:0 FF09:0:0:0:0:0:0:0 FF0A:0:0:0:0:0:0:0 FF0B:0:0:0:0:0:0:0 FF0C:0:0:0:0:0:0:0 FF0D:0:0:0:0:0:0:0 FF0E:0:0:0:0:0:0:0 FF0F:0:0:0:0:0:0:0 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F).
Appendix G IPv6 the time T2 is reached and the server does not respond, the client sends a Rebind message to any available server (S2). For an IA_TA, the client may send a Renew or Rebind message at the client's discretion. T2 T1 Renew Renew to S1 to S1 Renew Renew to S1 to S1 Renew to S1 Renew to S1 Rebind to S2 Rebind to S2 DHCP Relay Agent A DHCP relay agent is on the same network as the DHCP clients and helps forward messages between the DHCP server and clients.
Appendix G IPv6 • Neighbor advertisement: A response from a node to announce its link-layer address. • Router solicitation: A request from a host to locate a router that can act as the default router and forward packets. • Router advertisement: A response to a router solicitation or a periodical multicast advertisement from a router to advertise its presence and other parameters. IPv6 Cache An IPv6 host is required to have a neighbor cache, destination cache, prefix list and default router list.
Appendix G IPv6 Example - Enabling IPv6 on Windows XP/2003/Vista By default, Windows XP and Windows 2003 support IPv6. This example shows you how to use the ipv6 install command on Windows XP/2003 to enable IPv6. This also displays how to use the ipconfig command to see auto-generated IP addresses. C:\>ipv6 install Installing... Succeeded. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific IP Address. . . . . Subnet Mask . . . . IP Address. . . . .
Appendix G IPv6 4 Double click Dibbler - a DHCPv6 client. 5 Click Start and then OK. 6 Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer. To enable IPv6 in Windows 7: 1 Select Control Panel > Network and Sharing Center > Local Area Connection. 2 Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it.
Appendix G IPv6 4 Click Close to exit the Local Area Connection Status screen. 5 Select Start > All Programs > Accessories > Command Prompt. 6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS IPv6 Address. . . . . . Link-local IPv6 Address IPv4 Address. . . . . . Subnet Mask . . . . . .
A PPENDIX H Open Software Announcements End-User License Agreement for "NBG4615" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix H Open Software Announcements The Software and Documentation contain material that is protected by international copyright law, trade secret law, international treaty provisions, and the applicable national laws of each respective country. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4.
Appendix H Open Software Announcements THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.
Appendix H Open Software Announcements Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.
Appendix H Open Software Announcements When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
Appendix H Open Software Announcements a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.
Appendix H Open Software Announcements counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License.
Appendix H Open Software Announcements a version number of this License, you may choose any version ever published by the Free Software Foundation. 10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this.
Appendix H Open Software Announcements FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Appendix H Open Software Announcements 1.2 "GoAhead" means Go Ahead Software, Inc. 1.3 "Intellectual Property Rights" means all rights, whether now existing or hereinafter acquired, in and to trade secrets, patents, copyrights, trademarks, know-how, as well as moral rights and similar rights of any type under the laws of any governmental authority, domestic or foreign, including rights in and to all applications and registrations relating to any of the foregoing. 1.
Appendix H Open Software Announcements GoAhead hereby grants You a world-wide, royalty-free, non-exclusive license, subject to third party intellectual property claims, to use, reproduce, modify, copy and distribute the Original Code. 2.2 Binary Code. GoAhead hereby grants You a world-wide, royalty-free, non-exclusive license to copy and distribute the binary code versions of the Original Code together with Your Modifications. 2.3 License Back to GoAhead.
Appendix H Open Software Announcements GoAhead hereby grants to You a limited world-wide, royalty-free, non-exclusive license to use the GoAhead trade names, trademarks, logos, service marks and product designations posted in Exhibit A (collectively, the "GoAhead Marks") in connection with the activities by You under this Agreement. Additionally, GoAhead grants You a license under the terms above to such GoAhead trademarks as shall be identified at a URL (the "URL") provided by GoAhead.
Appendix H Open Software Announcements (including any Modifications You make) and the Documentation is with You. Should the Original Code or the Documentation prove defective, You (and not GoAhead or its distributors, licensors or dealers) assume the entire cost of all necessary servicing or repair.
Appendix H Open Software Announcements OR ANY DEFECT IN THE ORIGINAL CODE, INCLUDING ANY LOST PROFITS, EVEN IF THEY HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. You agree that GoAhead and its distributors and dealers will not be LIABLE for defense or indemnity with respect to any claim against You by any third party arising from your possession or use of the Original Code or the Documentation.
Appendix H Open Software Announcements The Original Code is not fault-tolerant and is not designed , manufactured or intended for use or resale as online control equipment in hazardous environments requiring fail-safe performance, such as in the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines or weapons systems, in which the failure of the Original Code could lead directly to death, personal injury, or severe physical or envir
Appendix H Open Software Announcements provided in the contract between the vendor and the governmental entity; and (iv) in all respects is proprietary data belonging solely to GoAhead (or its licensor(s)). 10. Governing Law and Interpretation. This Agreement shall be interpreted under and governed by the laws of the State of Washington, without regard to its rules governing the conflict of laws.
Appendix H Open Software Announcements Exhibit A GoAhead Trademarks, Logos, and Product Designation Information 01/28/00 This Product includes LLTD software under below license LICENSE NOTICE. Use of the Microsoft Windows Rally Development Kit is covered under the Microsoft Windows Rally Development Kit License Agreement, which is provided within the Microsoft Windows Rally Development Kit or at http://www.microsoft.com/whdc/rally/rallykit.mspx.
Appendix H Open Software Announcements the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
Appendix H Open Software Announcements The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License * Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved.
Appendix H Open Software Announcements * endorse or promote products derived from this software without * prior written permission. For written permission, please contact * openssl-core@openssl.org. * * 5. Products derived from this software may not be called "OpenSSL" * nor may "OpenSSL" appear in their names without prior written * permission of the OpenSSL Project. * * 6.
Appendix H Open Software Announcements Original SSLeay License * Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. * * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.
Appendix H Open Software Announcements * 2. Redistributions in binary form must reproduce the above copyright * notice, this list of conditions and the following disclaimer in the * documentation and/or other materials provided with the distribution. * 3. All advertising materials mentioning features or use of this software * must display the following acknowledgement: * "This product includes cryptographic software written by * Eric Young (eay@cryptsoft.
Appendix H Open Software Announcements * [including the GNU Public Licence.] This Product includes ppp software under below license Copyrights: *********** All of the code can be freely used and redistributed. The individual source files each have their own copyright and permission notice. Pppd, pppstats and pppdump are under BSD-style notices. Some of the pppd plugins are GPL'd. Chat is public domain. The BSD license Copyright (c) , All rights reserved.
Appendix H Open Software Announcements binary forms, with or without modification, of the software and documentation provided that the following conditions are met: 0. If you receive a version of the software that is specifically labelled as not being for redistribution (check the version message and/or README), you are not permitted to redistribute that version of the software in any way or form. 1. All terms of all other applicable copyrights and licenses must be followed. 2.
Appendix H Open Software Announcements WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
Appendix H Open Software Announcements including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software. If you use this software in a product, an acknowledgment in the product documentation would be appreciated but is not required. 2.
Appendix H Open Software Announcements All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
Appendix H Open Software Announcements Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
Appendix H Open Software Announcements Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license.
Appendix H Open Software Announcements modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library.
Appendix H Open Software Announcements Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library.
Appendix H Open Software Announcements 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications.
Appendix H Open Software Announcements "b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License.
Appendix H Open Software Announcements 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
A PPENDIX I Legal Information Copyright Copyright © 2011 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix I Legal Information If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1 Reorient or relocate the receiving antenna. 2 Increase the separation between the equipment and the receiver. 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
Appendix I Legal Information 率 輻 理 率 不 更 率 率 率 更 不 立 率 療 不 輻 不 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Appendix I Legal Information Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor.
Appendix I Legal Information [Lithuanian] Šiuo ZyXEL deklaruoja, kad šis įranga atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. [Dutch] Hierbij verklaart ZyXEL dat het toestel uitrusting in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EC. [Maltese] Hawnhekk, ZyXEL, jiddikjara li dan tagħmir jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC.
Appendix I Legal Information The requirements for any country may evolve. ZyXEL recommends that you check with the local authorities for the latest status of their national regulations for both the 2,4- and 5-GHz wireless LANs. The following countries have restrictions and/or requirements in addition to those given in the table labeled “Overview of Regulatory Requirements for Wireless LANs”:. Overview of Regulatory Requirements for Wireless LANs Frequency Band (MHz) Max Power Level (EIRP)1 2400-2483.
Appendix I Legal Information Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy. Unless this wireless LAN product is operating within the boundaries of the owner's property, its use requires a “general authorization.” Please check http:// www.sviluppoeconomico.gov.it/ for more details.
Appendix I Legal Information 358 NBG4615 User’s Guide
Index Index A ActiveX 193 Address Assignment 150 Advanced Encryption Standard See AES.
Index DynDNS 182 DynDNS see also DDNS 182 DynDNS Wildcard 181 H hidden node 293 HTTP 203 Hyper Text Transfer Protocol 203 E EAP Authentication 297 encryption 127, 299 and local (user) database 128 key 128 WPA compatible 128 ESS 292 ESSID 231 Extended Service Set, See ESS 292 I IANA 260 IBSS 291 IEEE 802.
Index see also Network Address Translation server 172 server sets 177 L LAN 163 IP pool setup 164 NAT Traversal 207 LAN overview 163 Navigation Panel 72, 80, 86, 94, 103 LAN setup 163 navigation panel 72, 80, 86, 94, 103 LAN TCP/IP 164 Network Address Translation 171, 174 Language 221 Link type 71, 79, 86, 94, 103 local (user) database 127 and encryption 128 O Local Area Network 163 Operating Channel 70, 79, 85, 102 operating mode 21 M P MAC 135 MAC address 126, 150 cloning 150 P2P 204 MAC a
Index R subnet mask 254 RADIUS 296 message types 297 messages 297 shared secret key 297 Summary DHCP table 51 Packet statistics 53 Wireless station status 54 RADIUS server 127 syntax conventions 4 registration product 354 System General Setup 215 subnetting 256 System restart 221 related documentation 3 Remote management and NAT 205 limitations 205 system timeout 205 Reset button 47 Reset the device 47 Restore configuration 220 RF (Radio Frequency) 238 RIP 185 Roaming 136 Router Mode status scree
Index pre-authentication 300 user authentication 300 vs WPA-PSK 300 wireless client supplicant 300 with RADIUS application example 301 W WAN (Wide Area Network) 149 WAN advanced 159 WAN MAC address 150 warranty 353 note 354 WPA compatible 128 Web Configurator how to access 43 Overview 43 WPA2 299 user authentication 300 vs WPA2-PSK 300 wireless client supplicant 300 with RADIUS application example 301 web configurator 21 WPA2-Pre-Shared Key 299 Web Proxy 193 WPA2-PSK 299, 300 application example 30
Index 364 NBG4615 User’s Guide