Chapter 16 Bandwidth Management tia You can limit an application’s uplink or downlink bandwidth. This limit keeps the traffic from using up too much of the out-going interface’s bandwidth. This way you can make sure there is bandwidth for other applications. Use the following guidelines: l 16.
Chapter 16 Bandwidth Management The following table describes the labels in this screen. Table 55 Management > Bandwidth MGMT > General LABEL DESCRIPTION tia This field allows you to have NBG4604 apply bandwidth management. Select Priority Queue or Bandwidth Allocation to enable bandwidth management. • • Select Priority Queue to allocate bandwidth based on the predefined priority assigned to an application. Refer to Section 16.5 on page 149.
Chapter 16 Bandwidth Management Click Management > Bandwidth MGMT > Advanced to open the bandwidth management Advanced screen. om pa ny C on fid en tia l Figure 83 Management > Bandwidth MGMT > Advanced The following table describes the labels in this screen. Table 56 Management > Bandwidth MGMT > Advanced C LABEL 150 DESCRIPTION Priority Queue Local IP Address Enter the IP address of the computer to which bandwidth management does not apply.
Chapter 16 Bandwidth Management Table 56 Management > Bandwidth MGMT > Advanced (continued) DESCRIPTION # This is the number of an individual bandwidth management rule. Enable Select this check box to have the NBG4604 apply this bandwidth management rule. Service This is the name of the service. tia l LABEL You can also enter the name (up to 10 keyboard characters) of a service you want to add in the priority queue (for example, Messenger). Select a priority from the drop down list box.
Chapter 16 Bandwidth Management 16.5.1 Priority Levels tia The following describes the priorities that you can apply to traffic that the NBG4604 forwards out through an interface. l Traffic with a higher priority gets through faster while traffic with a lower priority is dropped if the network is congested. • High - Typically used for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay).
DESCRIPTION Port Range Enter the range of ports for which the bandwidth management rule applies. Policy Select Max or Min and specify the maximum or minimum bandwidth allowed for the rule in bits per second in the field below. Rate (bps) Type or select the maximum or minimum bandwidth allowed (refer to the field above) for the rule in bits per second. tia LABEL l Chapter 16 Bandwidth Management en If you type the amount of bandwidth, the selection automatically becomes User Defined.
Chapter 16 Bandwidth Management Table 58 Media Bandwidth Management Setup: Services (continued) DESCRIPTION BitTorrent BitTorrent is a free P2P (peer-to-peer) sharing tool allowing you to distribute large software and media files using ports 6881 to 6889. BitTorrent requires you to search for a file with a searching engine yourself. It distributes files by corporation and trading, that is, the client downloads the file in small pieces and share the pieces with other peers to get other half of the file.
CHAPTER 17 tia l Remote Management en 17.1 Overview This chapter provides information on the Remote Management screens. fid Remote management allows you to determine which services/protocols can access which NBG4604 interface (if any) from which computers.
Chapter 17 Remote Management 17.3.1 Remote Management Limitations Remote management over LAN or WAN will not work when: You have disabled that service in one of the remote management screens. 2 The IP address in the Secured Client IP Address field does not match the client IP address. If it does not match, the NBG4604 will disconnect the session immediately. 3 There is already another remote management session with an equal or higher priority running.
Chapter 17 Remote Management 17.4 WWW Screen l To change your NBG4604’s World Wide Web settings, click Management > Remote MGMT to display the WWW screen. on fid en tia Figure 85 Management > Remote MGMT > WWW The following table describes the labels in this screen Table 59 Management > Remote MGMT > WWW DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
C om pa ny C on fid en tia l Chapter 17 Remote Management 158 NBG4604 User’s Guide
CHAPTER 18 tia l Universal Plug-and-Play (UPnP) en 18.1 Overview This chapter introduces the UPnP feature in the Web Configurator. C 18.2 What You Can Do on fid Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
Chapter 18 Universal Plug-and-Play (UPnP) • Dynamic port mapping • Learning public IP addresses tia Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. en Cautions with UPnP l • Assigning lease times to mappings fid The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues.
Chapter 18 Universal Plug-and-Play (UPnP) The following table describes the labels in this screen. Table 60 Management > UPnP > General DESCRIPTION Enable the Universal Plug and Play (UPnP) Feature Select this check box to activate UPnP. Be aware that anyone could use a UPnP application to open the Web Configurator's login screen without entering the NBG4604's IP address (although you must still enter the password to access the Web Configurator).
Chapter 18 Universal Plug-and-Play (UPnP) 2 Right-click the icon and select Properties. en tia l Figure 87 Network Connections In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
Chapter 18 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. en tia l Figure 89 Internet Connection Properties: Advanced Settings C on fid Figure 90 Internet Connection Properties: Advanced Settings: Add Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 18 Universal Plug-and-Play (UPnP) 6 Double-click on the icon to display your current Internet connection status. fid en tia l Figure 92 Internet Connection Status 18.5.2 Web Configurator Easy Access on With UPnP, you can access the web-based configurator on the NBG4604 without finding out the IP address of the NBG4604 first. This comes helpful if you do not know the IP address of the NBG4604. C Follow the steps below to access the Web Configurator. Click Start and then Control Panel.
Chapter 18 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. C on fid en tia l Figure 93 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your NBG4604 and select Invoke. The Web Configurator login screen displays.
Chapter 18 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your NBG4604 and select Properties. A properties window displays with basic information about the NBG4604.
CHAPTER 19 tia l SNMP en 19.1 Overview fid Simple Network Management Protocol (SNMP) is a protocol for collecting and managing information about network devices. Your NBG4604 supports SNMP agent functionality, which allows a manager station to manage and monitor the NBG4604 through the network. The NBG4604 supports SNMP version one (SNMPv1) and version two (SNMPv2c). on Note: Only configure the SNMP feature with settings provided by your ISP. C 19.
Chapter 19 SNMP l An agent is a management software module that resides in a managed device (the NBG4604). An agent translates the local management information from the managed device into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices.
Chapter 19 SNMP The following table describes the labels in this screen. DESCRIPTION Enable SNMP Select this to enable SNMP on this device. SNMP version Select the SNMP version that corresponds the SNMP used by the server. Read Community Enter the SNMP read community information here. Get Community Enter the SNMP get community information here. System Location Enter the SNMP system location. System Contact Enter the SNMP system contact. Apply Click Apply to save the setting to the NBG4604.
C om pa ny C on fid en tia l Chapter 19 SNMP 170 NBG4604 User’s Guide
CHAPTER 20 tia l ACS en 20.1 Overview fid This chapter shows you to configure the NBG4604’s ACS settings so that it can be remotely configured by an Auto-Configuration Server (ACS). on An administrator can use an ACS to remotely set up the NBG4604, modify its settings, perform firmware upgrades, and monitor and diagnose it. In order to do so, you must enable the TR-069 feature on your NBG4604 and then configure it appropriately.
Chapter 20 ACS OUI Filter tia l An Organizationally Unique Identifier (OUI) filter blocks or forwards packets from devices with the specified OUI in the MAC address. The OUI field is the first three octets in a MAC address and uniquely identifies the manufacturer of a network device. STUN en STUN allows a device to find the public IP address assigned by a NAT router and/ or a firewall between it and the public Internet. fid 20.
Chapter 20 ACS 3 The NBG4604 uses the public IP address and port number in the SIP packets that it sends to the SIP server (C). C om pa ny C on Figure 99 Management > ACS > General fid Click Management > ACS to open this screen.
Chapter 20 ACS The following table describes the labels in this screen. Table 62 Management > ACS > General LABEL DESCRIPTION l ACS Server Setup Enter the URL of the ACS server. Account Name Enter the login name used by the NBG4604 to log into the ACS server. Password Enter the password for the account used to log into the ACS server. Period Enter the duration in seconds over which the NBG4604 attempts to log into the ACS server.
Chapter 20 ACS 20.5 Certificate Screen l This screen allows you to upload security certificates to the NBG4604. Click Management > ACS > Certificates to open this screen. Table 63 Management > UPnP > General en fid The following table describes the labels in this screen. tia Figure 100 Management > ACS > Certificates DESCRIPTION File Path Enter the path of the certificate file’s location on your local computer, or click the Browse button to open a browse dialog box to search for it.
Chapter 20 ACS 20.6 Technical Reference tia l TR-069 is an abbreviation of “Technical Reference 069”, a protocol designed to facilitate the remote management of Customer Premise Equipement (CPE), such as the NBG4604. It can be managed over a WAN by means of an Auto Configuration Server (ACS). TR-069 is based on sending Remote Procedure Calls (RPCs) between the ACS and the client device. RPCs are sent in Extensible Markup Language (XML) format over HTTP or HTTPS.
CHAPTER 21 tia l System en 21.1 Overview This chapter provides information on the System screens. fid See the chapter about wizard setup for more information on the next few screens. on 21.2 What You Can Do • Use the General screen (Section 21.3 on page 177) to enter a name to identify the NBG4604 in the network and set the password. C • Use the Time Setting screen (Section 21.4 on page 179) to change your NBG4604’s time and date. ny 21.
Chapter 21 System The following table describes the labels in this screen. Table 64 Maintenance > System > General LABEL DESCRIPTION System Name is a unique name to identify the NBG4604 in an Ethernet network. It is recommended you enter your computer’s “Computer name” in this field (see the chapter about wizard setup for how to find your computer’s name). tia System Name l System Setup Domain Name en This name can be up to 30 alphanumeric characters long.
Chapter 21 System 21.4 Time Setting Screen tia l To change your NBG4604’s time and date, click Maintenance > System > Time Setting. The screen appears as shown. Use this screen to configure the NBG4604’s time based on your local time zone. ny C on fid en Figure 103 Maintenance > System > Time Setting pa he following table describes the labels in this screen.
Chapter 21 System Table 65 Maintenance > System > Time Setting LABEL DESCRIPTION New Time This field displays the last updated time from the time server or the last time configured manually. (hh:mm:ss) New Date (yyyy/mm/dd) tia l When you set Time and Date Setup to Manual, enter the new time in this field and then click Apply. This field displays the last updated date from the time server or the last date configured manually.
Chapter 21 System Table 65 Maintenance > System > Time Setting DESCRIPTION End Date Configure the day and time when Daylight Saving Time ends if you selected Daylight Savings. The o'clock field uses the 24 hour format. Here are a couple of examples: l LABEL tia Daylight Saving Time ends in the United States on the last Sunday of October. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time.
C om pa ny C on fid en tia l Chapter 21 System 182 NBG4604 User’s Guide
CHAPTER 22 tia l Logs en 22.1 Overview fid This chapter contains information about configuring general log settings and viewing the NBG4604’s logs. 22.2 What You Can Do on The Web Configurator allows you to look at all of the NBG4604’s logs in one location. C • Use the View Log screen (Section 22.4 on page 184) to see the logs for the categories such as system maintenance, system errors, access control, allowed or blocked web sites, blocked web features, and so on.
Chapter 22 Logs 22.4 View Log Screen tia l Use the View Log screen to see the logged messages for the NBG4604. Options include logs about system maintenance, system errors, access control, allowed or blocked web sites, blocked web features (such as ActiveX controls, Java and cookies), attacks (such as DoS) and IPSec. en Log entries in red indicate system error logs. The log wraps around and deletes the old entries after it fills. Click a column heading to sort the entries.
Chapter 22 Logs 22.5 Log Settings Screen Click Maintenance > Logs > Log Settings to open this screen. fid en Figure 105 Maintenance > Logs > Log Settings tia l Use this screen to send copies of the NBG4604 syslog files to a dedicated syslog server. For information on setting up a syslog server, consult the documentation that came with your syslog server product. on The following table describes the labels in this screen.
C om pa ny C on fid en tia l Chapter 22 Logs 186 NBG4604 User’s Guide
CHAPTER 23 tia l Tools en 23.1 Overview fid This chapter shows you how to upload a new firmware, upload or save backup configuration files and restart the NBG4604. on 23.2 What You Can Do • Use the Firmware screen (Section 23.3 on page 187) to upload firmware to your NBG4604. • Use the Configuration screen (Section 23.4 on page 190) to view information related to factory defaults, backup configuration, and restoring configuration. ny C • Use the Restart screen (Section 23.
Chapter 23 Tools Click Maintenance > Tools. Follow the instructions in this screen to upload firmware to your NBG4604. fid en tia l Figure 106 Maintenance > Tools > Firmware The following table describes the labels in this screen. Table 68 Maintenance > Tools > Firmware DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload.
Chapter 23 Tools The NBG4604 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. tia l Figure 108 Network Temporarily Disconnected en After two minutes, log in again and check your new firmware version in the Status screen. C om pa ny C on Figure 109 Upload Error Message fid If the upload was not successful, the following screen will appear. Click Return to go back to the Firmware screen.
Chapter 23 Tools tia Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. l 23.4 Configuration Screen C on fid en Figure 110 Maintenance > Tools > Configuration ny 23.4.1 Backup Configuration pa Backup configuration allows you to back up (save) the NBG4604’s current configuration to a file on your computer.
Chapter 23 Tools 23.4.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG4604. tia l Table 69 Maintenance Restore Configuration DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them.
Chapter 23 Tools If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen. en tia l Figure 113 Configuration Restore Error 23.4.3 Back to Factory Defaults fid Pressing the Reset button in this section clears all user-entered configuration information and returns the NBG4604 to its factory defaults. C 23.5 Restart Screen on You can also press the RESET button on the rear panel to reset the factory defaults of your NBG4604.
CHAPTER 24 tia l Sys OP Mode en 24.1 Overview fid The Sys OP Mode (System Operation Mode) function lets you configure whether your NBG4604 is a router or AP. 24.2 What You Can Do on You can choose between Router Mode and AP Mode depending on your network topology and the features you require from your device. See Section 1.1 on page 21 for more information on which mode to choose. ny C Use the General screen (Section 24.4 on page 194) to select how you connect to the Internet. 24.
Chapter 24 Sys OP Mode AP l An AP extends one network and so has just one IP address. All Ethernet ports on the AP have the same IP address. To connect to the Internet, another device, such as a router, is required. on 24.4 General Screen fid en tia Figure 116 IP Address in AP Mode Use this screen to select how you connect to the Internet. pa ny C Figure 117 Maintenance > Sys OP Mode > General If you select Router Mode, the following pop-up message window appears.
Chapter 24 Sys OP Mode • You can configure the IP address settings on your WAN port. Contact your ISP or system administrator for more information on appropriate settings. If you select Access Point the following pop-up message window appears. en tia l Figure 119 Maintenance > Sys Op Mode > General: AP • In AP Mode all Ethernet ports have the same IP address. • All ports on the rear panel of the device are LAN ports, including the port labeled WAN. There is no WAN port.
C om pa ny C on fid en tia l Chapter 24 Sys OP Mode 196 NBG4604 User’s Guide
CHAPTER 25 tia l Language en 25.1 Language Screen Use this screen to change the language for the Web Configurator display. fid Click the language you prefer. The Web Configurator language changes after a while without restarting the NBG4604.
C om pa ny C on fid en tia l Chapter 25 Language 198 NBG4604 User’s Guide
CHAPTER 26 tia l Troubleshooting en This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Internet Access fid • NBG4604 Access and Login • Resetting the NBG4604 to Its Factory Defaults on • Wireless Router/AP Troubleshooting C 26.1 Power, Hardware Connections, and LEDs ny The NBG4604 does not turn on. None of the LEDs turn on.
Chapter 26 Troubleshooting Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the NBG4604. 5 If the problem continues, contact the vendor. tia l 3 en 26.2 NBG4604 Access and Login fid I don’t know the IP address of my NBG4604. The default IP address is 192.168.1.1.
Chapter 26 Troubleshooting 2 If this does not work, you have to reset the device to its factory defaults. See Section 26.4 on page 203. tia 1 l I cannot see or access the Login screen in the Web Configurator. Make sure you are using the correct IP address. en • The default IP address is 192.168.1.1. • If you changed the IP address (Section 7.3 on page 102), use the new IP address.
This can happen when you fail to log out properly from your last session. Try logging in again after 5 minutes. 3 Disconnect and re-connect the power adaptor or cord to the NBG4604. 4 If this does not work, you have to reset the device to its factory defaults. See Section 26.4 on page 203. tia 2 l Chapter 26 Troubleshooting en 26.3 Internet Access fid I cannot access the Internet. Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide.
Chapter 26 Troubleshooting Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.5 on page 22. 2 Reboot the NBG4604. 3 If the problem continues, contact your ISP. tia l 1 en The Internet connection is slow or intermittent. There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5 on page 22.
Chapter 26 Troubleshooting 2 Press the RESET button for longer than 1 second to restart/reboot the NBG4604. 3 Press the RESET button for longer than five seconds to set the NBG4604 back to its factory-default configurations. tia l If the NBG4604 restarts automatically, wait for the NBG4604 to finish restarting, and log in to the Web Configurator. The password is “1234”. en If the NBG4604 does not restart automatically, disconnect and reconnect the NBG4604’s power.
Chapter 26 Troubleshooting Make sure that you select the Enable URL Keyword Blocking check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Keyword List. en I can access the Internet, but I cannot open my network folders. tia l If a keyword that is listed in the Keyword List is not blocked when it is found in a URL, customize the keyword blocking using commands. See the Customizing Keyword Blocking URL Checking section in the Content Filter chapter.
C om pa ny C on fid en tia l Chapter 26 Troubleshooting 206 NBG4604 User’s Guide
CHAPTER 27 tia l Product Specifications Table 71 Hardware Features en The following tables summarize the NBG4604’s hardware and firmware features. 140 mm x 110 mm x 30 mm Weight 190 g Power Specification Input: 100~240 AC, 50~60 Hz Ethernet ports Auto-negotiating: 10/100/1000 Mbps in either half-duplex or fullduplex mode. on Output: 12 V DC 1A fid Dimensions (W x D x H) Auto-crossover: Use either crossover or straight-through Ethernet cables.
Chapter 27 Product Specifications FEATURE DESCRIPTION Default LAN IP Address 192.168.1.1 (router) l Table 72 Firmware Features Default LAN Subnet Mask 255.255.255.0 (24 bits) Default Password 1234 tia 192.168.1.2. (AP) 192.168.1.33 to 192.168.1.64 Wireless Interface Wireless LAN Default Wireless SSID ZyXEL Device Management Use the Web Configurator to easily configure the rich range of features on the NBG4604. Wireless Functionality Allows IEEE 802.11b and/or IEEE 802.
Chapter 27 Product Specifications Table 72 Firmware Features DESCRIPTION Bandwidth Management You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and/or to particular computers. Remote Management This allows you to decide whether a service (HTTP or FTP traffic for example) from a computer on a network (LAN or WAN for example) can access the NBG4604.
Chapter 27 Product Specifications Do not insert the screws all the way into the wall. Leave a small gap of about 0.5 cm between the heads of the screws and the wall. 4 Make sure the screws are snugly fastened to the wall. They need to hold the weight of the NBG4604 with the connection cables. 5 Align the holes on the back of the NBG4604 with the screws on the wall. Hang the NBG4604 on the screws.
APPENDIX A en This appendix introduces IP addresses and subnet masks. tia l IP Addresses and Subnetting fid IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. on Subnet masks determine the maximum number of possible hosts on a network.
Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. on fid en tia l Figure 123 Network Number and Host ID Subnet Masks C How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix A IP Addresses and Subnetting Network Number 1ST OCTET: 2ND OCTET: 3RD OCTET: 4TH OCTET (192) (168) (1) (2) 11000000 10101000 00000001 00000010 tia Host ID l Table 73 Subnet Mask - Identifying Network Number en By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
Appendix A IP Addresses and Subnetting As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows: HOST ID SIZE 8 bits 24 bits 255.0.0.0 16 bits 255.255.0.0 MAXIMUM NUMBER OF HOSTS 224 – 2 16 16 bits 2 16777214 –2 65534 8 8 bits 2 –2 254 3 bits 23 – 2 6 en 24 bits 255.255.255.0 29 bits 255.255.255.
Appendix A IP Addresses and Subnetting Subnetting tia l You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons. In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.
Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. on fid en tia l Figure 125 Subnetting Example: After Subnetting C In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). ny 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.
Appendix A IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.
Appendix A IP Addresses and Subnetting Table 80 Subnet 4 (continued) Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 tia NETWORK NUMBER l LAST OCTET BIT VALUE IP/SUBNET MASK en Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). Table 81 Eight Subnets fid The following table shows IP address last octet values for each subnet.
Appendix A IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. NO. HOSTS PER NO. SUBNETS SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 6 255.255.252.0 (/22) 64 7 255.255.254.0 (/23) 128 8 255.255.255.0 (/24) 256 9 255.255.255.128 (/25) 10 255.255.255.192 (/26) 11 255.255.255.224 (/27) 12 255.255.
Appendix A IP Addresses and Subnetting that you entered. You don't need to change the subnet mask computed by the NBG4604 unless you are instructed to do otherwise. Private IP Addresses • 10.0.0.0 • 172.16.0.0 en tia l Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
APPENDIX B In order to use the Web Configurator you need to allow: • JavaScript (enabled by default). • Java permissions (enabled by default). fid • Web browser pop-up windows from your device. en tia l Pop-up Windows, JavaScript and Java Permissions on Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. C Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Click Apply to save this setting.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. C Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. C on fid en tia l Figure 129 Pop-up Blocker Settings Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts ny 5 C om pa If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. on fid en tia l Figure 130 Internet Options: Security Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. on fid en tia l Figure 131 Security Settings - Java Scripting C Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. on fid en tia l Figure 132 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window.
APPENDIX C en tia l Setting up Your Computer’s IP Address fid All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. on Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer. Windows 3.1 requires the purchase of a thirdparty TCP/IP application package.
Appendix C Setting up Your Computer’s IP Address Windows 95/98/Me l Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. ny C on fid en tia Figure 134 WIndows 95/98/Me: Network: Configuration Installing Components pa The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: In the Network window, click Add.
Appendix C Setting up Your Computer’s IP Address 3 Select Microsoft from the list of manufacturers. 4 Select TCP/IP from the list of network protocols and then click OK. l If you need Client for Microsoft Networks: Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK. 5 Restart your computer so the changes you made take effect.
Appendix C Setting up Your Computer’s IP Address 3 Click the DNS Configuration tab. • If you do not know your DNS information, select Disable DNS. Click the Gateway tab. ny 4 C on fid en tia Figure 136 Windows 95/98/Me: TCP/IP Properties: DNS Configuration l • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). • If you do not know your gateway’s IP address, remove previously installed gateways.
Appendix C Setting up Your Computer’s IP Address 3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. tia l Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. 1 Click start (Start in Windows 2000/NT), Settings, Control Panel.
Appendix C Setting up Your Computer’s IP Address 2 In the Control Panel, double-click Network Connections (Network and Dialup Connections in Windows 2000/NT). 3 fid en tia l Figure 138 Windows XP: Control Panel Right-click Local Area Connection and then click Properties.
Appendix C Setting up Your Computer’s IP Address 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. 5 C on fid en tia l Figure 140 Windows XP: Local Area Connection Properties The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). ny • If you have a dynamic IP address click Obtain an IP address automatically.
Appendix C Setting up Your Computer’s IP Address • Click Advanced. on fid en tia l Figure 141 Windows XP: Internet Protocol (TCP/IP) Properties If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. C 6 ny Do one or more of the following if you want to configure additional IP addresses: • In the IP Settings tab, in IP addresses, click Add.
Appendix C Setting up Your Computer’s IP Address • Click OK when finished. In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): ny 7 C on fid en tia l Figure 142 Windows XP: Advanced TCP/IP Properties • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
Appendix C Setting up Your Computer’s IP Address If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. C on fid en tia l Figure 143 Windows XP: Internet Protocol (TCP/IP) Properties Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
Appendix C Setting up Your Computer’s IP Address Macintosh OS 8/9 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/ IP Control Panel.
Appendix C Setting up Your Computer’s IP Address 2 Select Ethernet built-in from the Connect via list. fid en tia l Figure 145 Macintosh OS 8/9: TCP/IP For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: on 3 • From the Configure box, select Manually. C • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box.
Appendix C Setting up Your Computer’s IP Address Macintosh OS X Click the Apple menu, and click System Preferences to open the System Preferences window. l 1 2 Click Network in the icon bar. fid • Select Automatic from the Location list. en tia Figure 146 Macintosh OS X: Apple Menu • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. For dynamically assigned settings, select Using DHCP from the Configure list.
Appendix C Setting up Your Computer’s IP Address 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. Click Apply Now and close the window. 6 Turn on your Prestige and restart your computer (if prompted). Verifying Settings fid Check your TCP/IP properties in the Network window. en 5 tia • Type the IP address of your Prestige in the Router address box. l • Type your subnet mask in the Subnet mask box.
Appendix C Setting up Your Computer’s IP Address 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. on fid en tia l Figure 149 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list.
Appendix C Setting up Your Computer’s IP Address 5 Click the Devices tab. 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen. fid 7 en tia l Figure 151 Red Hat 9.
Appendix C Setting up Your Computer’s IP Address • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0. tia en DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.1.10 NETMASK=255.255.255.
Appendix C Setting up Your Computer’s IP Address 27.1.1 Verifying Settings Enter ifconfig in a terminal screen to check your TCP/IP properties. tia l Figure 156 Red Hat 9.0: Checking TCP/IP Properties C om pa ny C on fid en [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.
APPENDIX D tia l Wireless LANs en Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. fid Ad-hoc Wireless LAN Configuration on The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C).
Appendix D Wireless LANs with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. ny C on fid en tia l Figure 158 Basic Service Set ESS pa An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS).
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate. C on fid en tia l Figure 159 Infrastructure WLAN ny Channel pa A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area.
Appendix D Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. RTS/CTS fid en tia l Figure 160 on When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix D Wireless LANs Fragmentation Threshold tia l A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix D Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/ 48/54 OFDM (Orthogonal Frequency Division Multiplexing) tia MODULATION en DATA RATE (MBPS) l Table 84 IEEE 802.11g fid IEEE 802.1x on In June 2001, the IEEE 802.
Appendix D Wireless LANs Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: l • Access-Request tia Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. en • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge fid Sent by a RADIUS server requesting more information in order to allow access.
Appendix D Wireless LANs tia l However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 authentication method does not support data encryption with dynamic session key.
Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled.
Appendix D Wireless LANs tia l TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. This all happens in the background automatically.
Appendix D Wireless LANs 27.1.2 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols). 2 The AP checks each wireless client's password and (only) allows it to join the network if the password matches. 3 The AP derives and distributes keys to the wireless clients.
Appendix D Wireless LANs Security Parameters Summary Table 86 Wireless Security Relational Matrix ENCRYPTIO ENTER IEEE 802.1X N METHOD MANUAL KEY Open None en AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL tia l Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features.
APPENDIX E tia l Services en The following table lists some commonly-used services and their associated protocols and port numbers. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. fid • Protocol: This is the type of IP protocol used by the service. If this is TCP/ UDP, then the service uses the same port number with TCP and UDP. If this is User-Defined, the Port(s) is the IP protocol number, not the port number.
Appendix E Services Table 87 Examples of Services (continued) PROTOCOL PORT(S) DESCRIPTION FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 TCP 1720 NetMeeting uses this protocol. HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce.
Appendix E Services Table 87 Examples of Services (continued) PROTOCOL PORT(S) DESCRIPTION POP3 TCP 110 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). POP3S TCP 995 This is a more secure version of POP3 that runs over SSL. PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel.
Appendix E Services Table 87 Examples of Services (continued) PROTOCOL PORT(S) DESCRIPTION SSDP UDP 1900 The Simple Service Discovery Protocol supports Universal Plug-and-Play (UPnP). SSH TCP/UDP 22 Secure Shell Remote Login Program. STRM WORKS UDP 1558 Stream Works Protocol. SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server. TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System).
APPENDIX F tia l Open Software Announcements en End-User License Agreement for “NBG4604” WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE fid READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix F Open Software Announcements ing. Portions of the Software utilize or include third party software and other copyright material. Acknowledgements, licensing terms and disclaimers for such material are contained in the License Notice as below for the Software, and your use of such material is governed by their respective terms. ZyXEL has provided, as part of the Software package, access to certain third party software as a convenience.
Appendix F Open Software Announcements or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
Appendix F Open Software Announcements Open-Sourced Components 3rd party software Version Web Address Of The Software License Term 2.6.21 http://www.kernel.org/ busybox-1.7.5 1.7.5 http://www.busybox.net/ libesmtp-1.0.4 1.0.4 http://www.stafford.uklinux.net/libesmtp libupnp-1.6.0 1.6.0 http://pupnp.sourceforge.net/ pcre-6.7 6.7 http://www.pcre.org/ igmpproxy-0.1-beta2 0.1-beta2 http://sourceforge.net/projects/igmpproxy dnsmasq-2.39 2.39 http://thekelleys.org.uk/dnsmasq/doc.
Appendix F Open Software Announcements Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its l users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose tia authors commit to using it.
Appendix F Open Software Announcements These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works.
Appendix F Open Software Announcements in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 8.
Appendix F Open Software Announcements lic Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
Appendix F Open Software Announcements FICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".
Appendix F Open Software Announcements source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. l 5.
Appendix F Open Software Announcements This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work. 8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License.
Appendix F Open Software Announcements COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16.
Appendix F Open Software Announcements ible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion. fid en tia l 1. Source Code.
Appendix F Open Software Announcements compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate. 6. Conveying Non-Source Forms.
Appendix F Open Software Announcements material be marked in reasonable ways as different from the original version; or d) Limiting the use for publicity purposes of names of licensors or authors of the material; or e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or en tia l f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liab
Appendix F Open Software Announcements tia l modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it. A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License.
Appendix F Open Software Announcements This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. fid en tia l You should have received a copy of the GNU General Public License along with this program. If not, see . Also add information on how to contact you by electronic and paper mail.
Appendix F Open Software Announcements License /* zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.3, July 18th, 2005 tia l Copyright (C) 1995-2005 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty.
APPENDIX G tia l Legal Information en Copyright Copyright © 2010 by ZyXEL Communications Corporation. on fid The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Appendix G Legal Information harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. tia l If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna.
Appendix G Legal Information To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication. tia l IMPORTANT NOTE: IC Radiation Exposure Statement: C on fid en This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. This equipment should be installed and operated with minimum distance 20cm between the radiator & your body.
Appendix G Legal Information ZyXEL Limited Warranty fid en tia l ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Appendix G Legal Information 1 Grant of License for Personal Use 2 en tia l ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, nonsublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice.
Appendix G Legal Information Confidentiality fid 5 en tia l permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity. You may not cause, assist or permit any third party to do any of the foregoing. Portions of the Software utilize or include third party software and other copyright material.
Appendix G Legal Information 8 fid en tia l IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Appendix G Legal Information 11 General fid en tia l This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan. This License Agreement shall constitute the entire Agreement between the parties hereto.
Index content filtering 139 by keyword (in URL) 140 by web feature 139 Address Assignment 102 Alert 183 CPU usage 31, 57 AP 21 en copyright 281 alternative subnet mask notation 214 AP Mode menu 58 overview 55 status screen 56 D fid CTS (Clear to Send) 250 AP (Access Point) 249 Daylight saving 180 Auto-bridge 112 DDNS 131 see also Dynamic DNS service providers 132 on AP+Bridge 21 BitTorrent 154 ny Bandwidth management overview 147 priority 152 services 153 Bridge/Repeater 21 C pa BSS 2
Index DynDNS see also DDNS 132 H DynDNS Wildcard 131 Hidden Node 249 HTTP 153 Hyper Text Transfer Protocol 153 tia l E EAP Authentication 253 e-mail 92 encryption 80 and local (user) database 80 key 81 WPA compatible 80 IANA 220 IBSS 247 IEEE 802.
Index operating mode 21 M P MAC 87 P2P 154 MAC address 79, 103 cloning 52, 103 peer-to-peer 154 MAC address filter 79 Point-to-Point Tunneling Protocol 47, 108 MAC address filtering 87 Pool Size 118 MAC filter 87 Port forwarding 125 default server 125 local server 125 managing the device good habits 22 using the Web Configurator. See Web Configurator. using the WPS. See WPS.
Index subnet 211 remote management session 155 system timeout 156 subnetting 215 Restore configuration 191 Summary DHCP table 34 Packet statistics 35 Wireless station status 36 RF (Radio Frequency) 208 RFC 3489 172 Roaming 89 syntax conventions 6 RTS (Request To Send) 250 Sys Op Mode 193 RTS/CTS Threshold 78, 89 System General Setup 177 System Name 178 en RTS Threshold 249, 250 tia subnet mask 50, 212 Reset the device 29 l Subnet Mask 115 Reset button 29, 192 System name 40 vs computer na
Index WPS 63 V WLAN Interference 249 Security Parameters 258 W WAN IP address assignment 49 WPA compatible 80 WAN (Wide Area Network) 101 WPA, WPA2 255 WAN advanced 111 WPS 22 WAN IP address 49 WWW 92, 153 WAN MAC address 103 warranty 284 note 284 X Web Configurator 22 how to access 27 Overview 27 on Xbox Live 154 Web configurator navigating 29 C WEP Encryption 85 fid WAN IP address assignment 51 en World Wide Web 153 tia VPN 108 l Wizard setup 39 complete 53 Internet connection 44
C om pa ny C on fid en tia l Index 294 NBG4604 User’s Guide