Chapter 14 Product Specifications 14.1 Wall-Mounting This section shows you how to mount your MAX208M2W Series on a wall using the ZyXEL Wall-Mounting kit (not included). 14.1.1 The Wall-Mounting Kit The wall-mounting kit contains the following parts: 1 2 1 Two Mortar Plugs (M4*L30 mm) 2 Two Screws (M4*L30 mm) 3 Wall-Mounting Chassis 3 If any parts are missing, contact your vendor. 14.1.
Chapter 14 Product Specifications 3 Attach the wall mounting chassis with the plugs and screws as shown below: 4 Connect the MAX208M2W Series to the wall mounting chassis by snapping the chassis two upper chassis hooks into the matching holes on the MAX208M2W Series: Do not pinch or server the cable connections between the wallmounting chassis the MAX208M2W Series.
Chapter 14 Product Specifications 5 Snap the lower chassis hooks into the matching holes on the MAX208M2W Series. The cable connections should come out either the left or right gaps between the wall-mounting chassis and the MAX208M2W Series 6 Once you have snapped the wall-mounting chassis in place, the MAX208M2W Series is securely fastened to the wall.
Chapter 14 Product Specifications 204 MAX208M2W Series Users Guide
APPENDIX A WiMAX Security Wireless security is vital to protect your wireless communications. Without it, information transmitted over the wireless network would be accessible to any networking device within range. User Authentication and Data Encryption The WiMAX (IEEE 802.16) standard employs user authentication and encryption to ensure secured communication at all times. User authentication is the process of confirming a users identity and level of authorization.
Appendix A WiMAX Security RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The base station is the client and the server is the RADIUS server. The RADIUS server handles the following tasks: Authentication Determines the identity of the users. Authorization Determines the network services available to authenticated users once they are connected to the network. Accounting Keeps track of the clients network activity.
Appendix A WiMAX Security the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access. Diameter Diameter (RFC 3588) is a type of AAA server that provides several improvements over RADIUS in efficiency, security, and support for roaming. Security Association The set of information about user authentication and data encryption between two computers is known as a security association (SA).
Appendix A WiMAX Security Authentication The MAX208M2W Series supports EAP-TTLS authentication. EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the server-side authentications to establish a secure connection (with EAPTLS digital certifications are needed by both the server and the wireless clients for mutual authentication).
APPENDIX B Setting Up Your Computers IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computers IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 1 Click Start > Control Panel. Figure 101 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computers IP Address 3 Right-click Local Area Connection and then select Properties. Figure 103 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computers IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 105 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computers IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. Figure 106 Windows Vista: Start Menu 2 In the Control Panel, click the Network and Internet icon. Figure 107 Windows Vista: Control Panel 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computers IP Address 4 Click Manage network connections. Figure 109 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 110 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computers IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computers IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 112 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix B Setting Up Your Computers IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 113 Mac OS X 10.4: Apple Menu 2 In the System Preferences window, click the Network icon. Figure 114 Mac OS X 10.
Appendix B Setting Up Your Computers IP Address 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 115 Mac OS X 10.4: Network Preferences 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 116 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
Appendix B Setting Up Your Computers IP Address 5 For statically assigned settings, do the following: From the Configure IPv4 list, select Manually. In the IP Address field, type your IP address. In the Subnet Mask field, type your subnet mask. In the Router field, type the IP address of your device. Figure 117 Mac OS X 10.
Appendix B Setting Up Your Computers IP Address Click Apply Now and close the window.Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 118 Mac OS X 10.
Appendix B Setting Up Your Computers IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 119 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 120 Mac OS X 10.
Appendix B Setting Up Your Computers IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 121 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: From the Configure list, select Manually. In the IP Address field, enter your IP address. In the Subnet Mask field, enter your subnet mask.
Appendix B Setting Up Your Computers IP Address In the Router field, enter the IP address of your MAX208M2W Series. Figure 122 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix B Setting Up Your Computers IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 123 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computers TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computers IP Address 1 Click System > Administration > Network. Figure 124 Ubuntu 8: System > Administration Menu 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix B Setting Up Your Computers IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 126 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix B Setting Up Your Computers IP Address 5 The Properties dialog box opens. Figure 128 Ubuntu 8: Network Settings > Properties In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix B Setting Up Your Computers IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 129 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix B Setting Up Your Computers IP Address tab. The Interface Statistics column shows data if your connection is working properly.
Appendix B Setting Up Your Computers IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computers TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator.
Appendix B Setting Up Your Computers IP Address 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 132 openSUSE 10.3: K Menu > Computer Menu 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 133 openSUSE 10.
Appendix B Setting Up Your Computers IP Address 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 134 openSUSE 10.
Appendix B Setting Up Your Computers IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 135 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computers IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 136 openSUSE 10.3: Network Settings 9 234 Click Finish to save your settings and close the window.
Appendix B Setting Up Your Computers IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 137 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
Appendix B Setting Up Your Computers IP Address 236 MAX208M2W Series Users Guide
APPENDIX C Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: Web browser pop-up windows from your device. JavaScript (enabled by default). Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix C Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 140 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix C Pop-up Windows, JavaScript and Java Permissions 2 Select Settings to open the Pop-up Blocker Settings screen. Figure 141 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix http://. For example, http://192.168.167.1.
Appendix C Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 142 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript is allowed.
Appendix C Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 143 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix C Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 144 Security Settings - Java Scripting Java Permissions 242 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix C Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 145 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix C Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window. Figure 146 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix C Pop-up Windows, JavaScript and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix C Pop-up Windows, JavaScript and Java Permissions 246 MAX208M2W Series Users Guide
APPENDIX D IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix D IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 149 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix D IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a 1 value). For example, an 8-bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
Appendix D IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a / followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
Appendix D IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 150 Subnetting Example: Before Subnetting You can borrow one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The borrowed host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25.
Appendix D IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 151 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 2 or 126 possible hosts (a host ID of all zeroes is the subnets address itself, all ones is the subnets broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix D IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnets broadcast address). Table 92 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.
Appendix D IP Addresses and Subnetting Table 95 Subnet 4 (continued) LAST OCTET BIT VALUE IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix D IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 98 16-bit Network Number Subnet Planning NO. BORROWED HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 2046 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.
Appendix D IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the MAX208M2W Series unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
Appendix D IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 152 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the routers LAN and WAN addresses must be on different subnets.
Appendix D IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the routers LAN port.
APPENDIX E Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix E Importing Certificates Internet Explorer The following example uses Microsoft Internet Explorer 7 on Windows XP Professional; however, they can also apply to Internet Explorer on Windows Vista. 1 If your devices web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Figure 155 Internet Explorer 7: Certification Error 2 Click Continue to this website (not recommended).
Appendix E Importing Certificates 3 In the Address Bar, click Certificate Error > View certificates. Figure 157 Internet Explorer 7: Certificate Error 4 In the Certificate dialog box, click Install Certificate.
Appendix E Importing Certificates 5 In the Certificate Import Wizard, click Next. Figure 159 Internet Explorer 7: Certificate Import Wizard 6 If you want Internet Explorer to Automatically select certificate store based on the type of certificate, click Next again and then go to step 9.
Appendix E Importing Certificates 7 Otherwise, select Place all certificates in the following store and then click Browse. Figure 161 Internet Explorer 7: Certificate Import Wizard 8 In the Select Certificate Store dialog box, choose a location in which to save the certificate and then click OK.
Appendix E Importing Certificates 9 In the Completing the Certificate Import Wizard screen, click Finish. Figure 163 Internet Explorer 7: Certificate Import Wizard 10 If you are presented with another Security Warning, click Yes.
Appendix E Importing Certificates 11 Finally, click OK when presented with the successful certificate installation message. Figure 165 Internet Explorer 7: Certificate Import Wizard 12 The next time you start Internet Explorer and go to a ZyXEL web configurator page, a sealed padlock icon appears in the address bar. Click it to view the pages Website Identification information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Internet Explorer Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 167 Internet Explorer 7: Public Key Certificate File 2 In the security warning dialog box, click Open.
Appendix E Importing Certificates Removing a Certificate in Internet Explorer This section shows you how to remove a public key certificate in Internet Explorer 7. 1 Open Internet Explorer and click TOOLS > Internet Options. Figure 169 Internet Explorer 7: Tools Menu 2 In the Internet Options dialog box, click Content > Certificates.
Appendix E Importing Certificates 3 In the Certificates dialog box, click the Trusted Root Certificates Authorities tab, select the certificate that you want to delete, and then click Remove. Figure 171 Internet Explorer 7: Certificates 4 In the Certificates confirmation, click Yes. Figure 172 Internet Explorer 7: Certificates 5 In the Root Certificate Store dialog box, click Yes.
Appendix E Importing Certificates 6 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Firefox The following example uses Mozilla Firefox 2 on Windows XP Professional; however, the screens can also apply to Firefox 2 on all platforms. 1 If your devices web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Select Accept this certificate permanently and click OK.
Appendix E Importing Certificates 3 The certificate is stored and you can now connect securely to the web configurator. A sealed padlock appears in the address bar, which you can click to open the Page Info > Security window to view the web pages security information.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Firefox Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Firefox and click TOOLS > Options. Figure 176 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, click Web Sites > Import. Figure 178 4 Use the Select File dialog box to locate the certificate and then click Open. Figure 179 5 Firefox 2: Certificate Manager Firefox 2: Select File The next time you visit the web site, click the padlock in the address bar to open the Page Info > Security window to see the web pages security information.
Appendix E Importing Certificates Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox 2. 1 Open Firefox and click TOOLS > Options. Figure 180 Firefox 2: Tools Menu 2 In the Options dialog box, click ADVANCED > Encryption > View Certificates.
Appendix E Importing Certificates 3 In the Certificate Manager dialog box, select the Web Sites tab, select the certificate that you want to remove, and then click Delete. Figure 182 4 Firefox 2: Certificate Manager In the Delete Web Site Certificates dialog box, click OK. Figure 183 Firefox 2: Delete Web Site Certificates 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
Appendix E Importing Certificates Opera The following example uses Opera 9 on Windows XP Professional; however, the screens can apply to Opera 9 on all platforms. 1 If your devices web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Install to accept the certificate.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web pages security details.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Opera Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Open Opera and click TOOLS > Preferences.
Appendix E Importing Certificates 2 In Preferences, click ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates Manager, click Authorities > Import. Figure 188 4 Use the Import certificate dialog box to locate the certificate and then click Open.
Appendix E Importing Certificates 5 In the Install authority certificate dialog box, click Install. Figure 190 6 Next, click OK. Figure 191 7 Opera 9: Install authority certificate Opera 9: Install authority certificate The next time you visit the web site, click the padlock in the address bar to open the Security information window to view the web pages security details.
Appendix E Importing Certificates Removing a Certificate in Opera This section shows you how to remove a public key certificate in Opera 9. 1 Open Opera and click TOOLS > Preferences. Figure 192 Opera 9: Tools Menu 2 In Preferences, ADVANCED > Security > Manage certificates.
Appendix E Importing Certificates 3 In the Certificates manager, select the Authorities tab, select the certificate that you want to remove, and then click Delete. Figure 194 4 Opera 9: Certificate manager The next time you go to the web site that issued the public key certificate you just removed, a certification error appears. Note: There is no confirmation when you delete a certificate authority, so be absolutely certain that you want to go through with it before clicking the button.
Appendix E Importing Certificates Konqueror The following example uses Konqueror 3.5 on openSUSE 10.3, however the screens apply to Konqueror 3.5 on all Linux KDE distributions. 1 If your devices web configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. 2 Click Continue. Figure 195 Konqueror 3.5: Server Authentication 3 Click Forever when prompted to accept the certificate. Figure 196 Konqueror 3.
Appendix E Importing Certificates 4 Click the padlock in the address bar to open the KDE SSL Information window and view the web pages security details. Figure 197 Konqueror 3.
Appendix E Importing Certificates Installing a Stand-Alone Certificate File in Konqueror Rather than browsing to a ZyXEL web configurator and installing a public key certificate when prompted, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. Figure 198 Konqueror 3.5: Public Key Certificate File 2 In the Certificate Import Result - Kleopatra dialog box, click OK. Figure 199 Konqueror 3.
Appendix E Importing Certificates 3 The next time you visit the web site, click the padlock in the address bar to open the KDE SSL Information window to view the web pages security details.
Appendix E Importing Certificates Removing a Certificate in Konqueror This section shows you how to remove a public key certificate in Konqueror 3.5. 1 Open Konqueror and click Settings > Configure Konqueror. Figure 201 Konqueror 3.5: Settings Menu 2 In the Configure dialog box, select Crypto. 3 On the Peer SSL Certificates tab, select the certificate you want to delete and then click Remove. Figure 202 Konqueror 3.
Appendix E Importing Certificates Note: There is no confirmation when you remove a certificate authority, so be absolutely certain you want to go through with it before clicking the button.
Appendix E Importing Certificates 290 MAX208M2W Series Users Guide
APPENDIX F Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. Protocol: This is the type of IP protocol used by the service.
Appendix F Common Services Table 99 Commonly Used Services (continued) 292 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix F Common Services Table 99 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix F Common Services Table 99 Commonly Used Services (continued) 294 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX G Legal Information Copyright Copyright © 2011 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix G Legal Information Certifications Federal Communications Commission (FCC) Interference Statement This equipmentThe has device been tested and found to comply limits for a Class B digitalto device, complies with Part 15 of with FCC the rules. Operation is subject the pursuant to Part 15 of the FCC Rules. These are designed to provide reasonable protection against harmful interference in following twolimits conditions: a residential installation.
Appendix G Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page.
Appendix G Legal Information Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor.
Index Index A CBC-MAC 207 CCMP 205, 207 AAA 70 cell 69 AbS 134 certificates 205 CA 71 formats 72 verification 207 accounting server see AAA ACK message 155 activity 70 Advanced Encryption Standard see AES AES 207 ALG 92 alternative subnet mask notation 250 analysis-by-synthesis 134 Application Layer Gateway see ALG authentication 70, 205 inner 208 key server 70 types 208 authorization 205 request and reply 207 server 70 auto-discovery UPnP 118 certification notices 297 viewing 297 Certification Auth
Index Differentiated Services see DiffServ H DiffServ 134 DiffServ Code Point (DSCP) 134 marking rule 138 hybrid waveform codec 134 digital ID 72, 205 DS field 137 I DSCP see DiffServ IANA 256 DTMF 143 dual-tone multi-frequency see DTMF Dynamic Host Configuration Protocol see DHCP identity 70, 205 idle timeout 162 IEEE 802.16 69, 205 IEEE 802.16e 69 IGD 1.
Index mobile station see MS MS 70 multimedia 135 SIP 140 public certificate 207 public key 205 pulse code modulation 134 push button 104 N NAT 255 and remote management 162 server sets 91 traversal 93 Q QoS 134 quality of service NAT routers 141 network activity 70 services 70 network address translators 141 O OK response 155 outbound proxy 142 SIP 142 outbound proxy server 142 R RADIUS 70, 72, 206 Message Types 206 Messages 206 Shared Secret Key 206 Real-time Transport Protocol see RTP register serve
Index services 70 TLS 205 Session Initiation Protocol see SIP ToS 134 silence suppression 157 transport encryption key see TEK silent packets 157 SIP 134 account 140 ACK message 155 ALG 92, 142 Application Layer Gateway, see ALG BYE request 155 call progression 154 client 155 client server 155 identities 140 INVITE request 155 number 140 OK response 155 proxy server 140 register server 140 servers 155 service domain 140 URI 140 user agent 140 SIP outbound proxy 142 SNMP 162 manager 164 sound quality 1
Index W waveform codec 134 WiFi Protected Setup, see WPS WiMAX 6970 security 207 WiMAX Forum 69 Wireless Interoperability for Microwave Access see WiMAX wireless LAN WPS 104 adding stations 104 push button 104 Wireless Metropolitan Area Network see MAN wireless network access 69 standard 69 wireless security 205 wizard setup 31 WPS 104 adding stations 104 push button 104 MAX208M2W Series Users Guide 303
Index 304 MAX208M2W Series Users Guide