NBG6503 Simultaneous Dual-band Wireless AC750 Home Router Version 1.00 Edition 1, 04/2013 Quick Start Guide User’s Guide Default Details LAN IP Address - Router Mode http://192.168.1.1 (Default mode) www.zyxel.com - AP Mode http://192.168.1.
IMPORTANT! READ CAREFULLY BEFORE USE. KEEP THIS GUIDE FOR FUTURE REFERENCE. Related Documentation • Quick Start Guide The Quick Start Guide shows how to connect the NBG6503 and access the Web Configurator wizards. It also contains a connection diagram and package contents list. Note: It is recommended you use the Web Configurator to configure the NBG6503.
Contents Overview Contents Overview User’s Guide .......................................................................................................................................13 Getting to Know Your Router ..................................................................................................................15 Connection Wizard ..................................................................................................................................
Contents Overview 4 NBG6503 User’s Guide
Table of Contents Table of Contents Contents Overview ..............................................................................................................................3 Table of Contents .................................................................................................................................5 Part I: User’s Guide ......................................................................................... 13 Chapter 1 Getting to Know Your Router............................
Table of Contents 3.3.1 Procedure to Use the Reset Button .........................................................................................35 Chapter 4 Monitor.................................................................................................................................................37 4.1 Overview ...........................................................................................................................................37 4.2 What You Can Do ....................
Table of Contents Chapter 8 Access Point Mode.............................................................................................................................65 8.1 Overview ...........................................................................................................................................65 8.2 What You Can Do .............................................................................................................................65 8.3 What You Need to Know .........
Table of Contents Chapter 11 WAN .....................................................................................................................................................99 11.1 Overview .........................................................................................................................................99 11.2 What You Can Do ............................................................................................................................99 11.
Table of Contents 15.1 Overview ......................................................................................................................................123 15.2 What You Can Do .........................................................................................................................123 15.3 What You Need To Know ..............................................................................................................123 15.4 Dynamic DNS Screen .............................
Table of Contents 20.3 What You Need to Know ...............................................................................................................145 20.3.1 Remote Management and NAT ...........................................................................................145 20.3.2 System Timeout ..................................................................................................................146 20.4 WWW Screen ..................................................................
Table of Contents Appendix E Legal Information..........................................................................................................227 Index ..................................................................................................................................................
Table of Contents 12 NBG6503 User’s Guide
P ART I User’s Guide 13
C HAPT ER 1 Getting to Know Your Router 1.1 Overview This chapter introduces the main features and applications of the Router. The Router upgrades the speed of your existing wireless network, providing faster network access to mobile users. Making use of IEEE 802.11AC technology, it not only upgrades your network to the next level but also eliminates dead spots, while offering backward compatibility with other IEEE 802.11b/g/n compatible devices.
Chapter 1 Getting to Know Your Router 1.4 Good Habits for Managing the Router Do the following things regularly to make the Router more secure and to manage the Router more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place. • Back up the configuration (and make sure you know how to restore it).
Chapter 1 Getting to Know Your Router 1.5 LEDs Figure 1 Front Panel Power WAN LAN 1-4 WLAN 5GHz WLAN WPS 2.4GHz The following table describes the LEDs and the WPS button. Table 1 Front Panel LEDs and WPS Button LED COLOR STATUS POWER Green On The Router is receiving power and functioning properly. Off The Router is not receiving power. On The Router has a successful 10/100MB WAN connection. Blinking The Router is sending/receiving data through the WAN.
Chapter 1 Getting to Know Your Router Table 1 Front Panel LEDs and WPS Button (continued) LED COLOR STATUS DESCRIPTION WLAN 2.4 GHz Green On The Router is ready, but is not sending/receiving data through the wireless LAN 2.4 GHz band. Blinking The Router is sending/receiving data through the wireless LAN 2.4 GHz band. Off The wireless LAN 2.4 GHz band is not ready or has failed. On WPS is enabled. Blinking The Router is negotiating a WPS connection with a wireless client.
Chapter 1 Getting to Know Your Router 3 If using screw anchors, drill two holes for the screw anchors into the wall. Push the anchors into the full depth of the holes, then insert the screws into the anchors. Do not insert the screws all the way in - leave a small gap of about 0.5 cm. If not using screw anchors, use a screwdriver to insert the screws into the wall. Do not insert the screws all the way in - leave a gap of about 0.5 cm.
C HAPT ER 2 Connection Wizard 2.1 Overview This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP for your Internet account information. Leave a field blank if you don’t have that information. 2.2 Accessing the Wizard Launch your web browser and type "http://192.168.1.1" as the website address. Type "1234" (default) as the password and click Login.
Chapter 2 Connection Wizard 2.3 Connect to Internet The Router offers four Internet connection types. They are Static IP, DHCP, PPPoE, or PPTP. The wizard attempts to detect which WAN connection type you are using. Figure 4 Detecting your Internet Connection Type If the wizard does not detect a connection type, you must select one from the drop-down list box. Check with your ISP to make sure you use the correct type. Note: If you get an error message, check your hardware connections.
Chapter 2 Connection Wizard 2.3.1 Connection Type: DHCP Choose DHCP as the Internet Connection Type when the WAN port is used as a regular Ethernet. Click Next. Figure 6 Internet Connection Type: DHCP Note: If you get an error screen after clicking Next, you might have selected the wrong Internet Connection type. Click Back, make sure your Internet connection is working and select the right Connection Type. Contact your ISP if you are not sure of your Internet Connection type. 2.3.
Chapter 2 Connection Wizard Table 4 Internet Connection Type: Static IP (continued) LABEL DESCRIPTION Subnet Mask Enter the IP subnet mask in this field. Default Gateway Enter the gateway IP address in this field. Primary DNS DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
Chapter 2 Connection Wizard The following table describes the labels in this screen. Table 5 Internet Connection Type: PPPoE LABEL DESCRIPTION Internet Connection Type Select the PPPoE option for a dial-up connection. Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address. Static IP Select this radio button, provided by your ISP to give the Router a fixed, unique IP address. User Name Type the user name given to you by your ISP.
Chapter 2 Connection Wizard Table 6 Internet Connection Type: PPTP (continued) LABEL DESCRIPTION Static IP Select this radio button, provided by your ISP to give the Router a fixed, unique IP address. PPTP Address Type the (static) IP address assigned to you by your ISP. PPTP Subnet Mask Type the subnet mask assigned to you by your ISP (if given). PPTP Gateway IP Address Type the gateway IP address of the PPTP server. PPTP Server IP Address Type the server IP address of the PPTP server.
Chapter 2 Connection Wizard 2.4 Router Password Change the login password in the following screen. Enter the new password and retype it to confirm. Click Next to proceed with the Wireless Security screen. Figure 11 Router Password 2.5 Wireless Security Configure Wireless Settings. Configure the wireless network settings on your Router in the following screen. The fields that show up depend on the kind of security you select. 2.5.
Chapter 2 Connection Wizard The following table describes the labels in this screen. Table 7 Wireless Security: No Security LABEL DESCRIPTION Wireless Radio Select a wireless radio from the drop-down list box. Choose 2.4G Hz to set the security setting for the wireless 2.4G band. Choose 5G Hz to set the security setting for the wireless 5G band. Wireless Network Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN.
Chapter 2 Connection Wizard Table 8 Wireless Security: WPA-PSK/WPA2-PSK (continued) LABEL DESCRIPTION Security mode Select a Security level from the drop-down list box. Choose WPA-PSK or WPA2-PSK security to configure a Pre-Shared Key. Choose this option only if your wireless clients support WPA-PSK or WPA2-PSK respectively. Wireless password Type from 8 to 63 case-sensitive ASCII characters. You can set up the most secure wireless connection by configuring WPA in the wireless LAN screens.
C HAPT ER 3 Introducing the Web Configurator 3.1 Overview This chapter describes how to access the Router Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the Router via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions or Safari 2.0 or later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 3 Introducing the Web Configurator The Web Configurator initially displays the following login screen. Figure 15 Login screen The following table describes the labels in this screen. Table 9 Login screen LABEL DESCRIPTION Password Type "1234" (default) as the password. Language Select the language you want to use to configure the Web Configurator. Click Login. This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 3.2.3.1 on page 34.
Chapter 3 Introducing the Web Configurator The following table describes the labels in this screen. Table 10 Change Password Screen LABEL DESCRIPTION New Password Type a new password. Retype to Confirm Retype the password for confirmation. Apply Click Apply to save your changes back to the Router. Ignore Click Ignore if you do not want to change the password this time.
Chapter 3 Introducing the Web Configurator Table 11 Home Screen (continued) LABEL DESCRIPTION (This is just an example). This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 3.2.3.1 on page 34. (This is just an example). This shows the time (hh:mm:ss) and date (yyyy:mm:dd) of the timezone you select in Section 3.2.3.2 on page 34 or Section 22.5 on page 157. 3.2.3.
Chapter 3 Introducing the Web Configurator 3.3 Resetting the Router If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the Router to reload the factory-default configuration file. This means that you will lose all configurations that you had previously saved, the password will be reset to “1234” and the IP address will be reset to “192.168.1.1”. 3.3.1 Procedure to Use the Reset Button 1 Make sure the power LED is on.
C HAPT ER 4 Monitor 4.1 Overview This chapter discusses read-only information related to the device state of the Router. Note: To access the Monitor screens, you can also click the links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/received as well as the status of clients connected to the Router. 4.2 What You Can Do • Use the Log (Section 4.3 on page 37) screen to see the logs for the activity on the Router. • Use the BW MGMT Monitor screen (Section 4.
Chapter 4 Monitor log choices depend on your settings in the Log Settings screen. Click Refresh to renew the log screen. Click Clear to delete all the logs. Figure 20 View Log You can configure which logs to display in the View Log screen. Go to the Log Settings screen and select the logs you wish to display. Click Apply to save your settings. Click Refresh to start the screen afresh.
Chapter 4 Monitor 4.4 BW MGMT Monitor The Bandwidth Management (BW MGMT) Monitor allows you to view the amount of network bandwidth that applications running in the network are using. The bandwidth is measured in kilobits per second (kbps). The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 22 Summary: BW MGMT Monitor 4.
Chapter 4 Monitor The following table describes the labels in this screen. Table 14 Summary: DHCP Table LABEL DESCRIPTION # This is the index number of the host computer. MAC Address This field shows the MAC address of the computer with the name in the Host Name field. Every Ethernet device has a unique MAC (Media Access Control) address which uniquely identifies a device. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
Chapter 4 Monitor Table 15 Summary: Packet Statistics (continued) LABEL DESCRIPTION Collisions This is the number of collisions on this port. Tx B/s This displays the transmission speed in bytes per second on this port. Rx B/s This displays the reception speed in bytes per second on this port. Up Time This is the total time the Router has been for each session. System Up Time This is the total time the Router has been on.
Chapter 4 Monitor connected successfully to the AP (or wireless router) using the same SSID, channel and security settings. Figure 26 Summary: Wireless Association List The following table describes the labels in this screen. Table 17 Summary: Wireless Association List 42 LABEL DESCRIPTION # This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station.
C HAPT ER 5 Router Modes 5.1 Overview This chapter introduces the different modes available on your Router. First, the term “mode” refers to two things in this User’s Guide. • Web Configurator mode. This refers to the Web Configurator interface you want to use for editing Router features. • Device mode. This is the operating mode of your Router, or simply how the Router is being used in the network. 5.1.
Chapter 5 Router Modes 44 NBG6503 User’s Guide
C HAPT ER 6 Easy Mode 6.1 Overview The Web Configurator is set to Easy Mode by default. You can configure several key features of the Router in this mode. This mode is useful to users who are not fully familiar with some features that are usually intended for network administrators. When you log in to the Web Configurator, the following screen opens.
Chapter 6 Easy Mode Click Status to open the following screen screen. Figure 28 Easy Mode: Status Screen Navigation Panel Go to Network Map Screen Status Screen Control Panel Right-click NBG6503 to open the pop up menu.
Chapter 6 Easy Mode 6.2 What You Can Do You can do the following in this mode: • Use this Navigation Panel (Section 6.4 on page 47) to opt out of the Easy mode. • Use the Network Map screen (Section 6.5 on page 47) to check if your Router can ping the gateway and whether it is connected to the Internet. • Use the Control Panel (Section 6.6 on page 48) to configure and enable Router features, including wireless security, wireless scheduling and bandwidth management and so on.
Chapter 6 Easy Mode Note: Don’t worry if the Network Map does not display in your web browser. This feature may not be supported by your system. You can still configure the Control Panel (Section 6.6 on page 48) in the Easy Mode and the Router features that you want to use in the Expert Mode. When you log into the Network Configurator, the Network Map is shown as follows. Figure 31 Network Map The line connecting the Router to the gateway becomes green when the Router is able to ping the gateway.
Chapter 6 Easy Mode The following table describes the labels in this screen. Table 19 Control Panel ITEM DESCRIPTION Game Engine Switch ON to maximize bandwidth for gaming traffic in your network. Otherwise, switch OFF. Refer to Section 6.6.1 on page 49 to see this screen. Power Saving Click this to schedule the wireless feature of the Router. Disabling the wireless function helps lower the energy consumption of the Router. Switch ON to apply wireless scheduling. Otherwise, switch OFF.
Chapter 6 Easy Mode 6.6.2 Power Saving Use this screen to set the day of the week and time of the day when your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. Disabling the wireless capability lowers the energy consumption of the of the Router. Figure 34 Power Saving The following table describes the labels in this screen. Table 20 Power Saving LABEL DESCRIPTION Wireless Radio Select the wireless radio to set its power saving settings.
Chapter 6 Easy Mode 6.6.3 Content Filter Use this screen to restrict access to certain websites, based on keywords contained in URLs, to which you do not want users in your network to open. Figure 35 Content Filter The following table describes the labels in this screen. Table 21 Content Filter LABEL DESCRIPTION Add Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed. Note: The Router does not recognize wildcard characters as keywords.
Chapter 6 Easy Mode The Router uses bandwidth management for incoming and outgoing traffic. Rank the services and applications by dragging them accordingly from High to Low and click Apply. Click Cancel to close the screen. Figure 36 Bandwidth MGNT Use your mouse to drag the items according to how you want to prioritze them. Left-click and slide up or down. 6.6.5 Firewall Enable this feature to protect the network from Denial of Service (DoS) attacks.
Chapter 6 Easy Mode Note: You can enable the Wireless function of your Router by first turning on the switch in the back panel. Figure 38 Wireless Security The following table describes the general wireless LAN labels in this screen. Table 22 Wireless Security LABEL DESCRIPTION Wireless Radio Select the wireless radio to set its security setting. Wireless Network Name (SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated.
Chapter 6 Easy Mode 6.6.7 WPS Use this screen to add a wireless station to the network using WPS. Click WPS in the Wireless Security to open the following screen. Figure 39 Wireless Security: WPS The following table describes the labels in this screen. Table 23 Wireless Security: WPS LABEL DESCRIPTION Wireless Security Click this to go back to the Wireless Security screen. WPS Create a secure wireless network simply by pressing a button.
Chapter 6 Easy Mode 6.7 Status Screen in Easy Mode In the Network Map screen, click Status to view read-only information about the Router. Figure 40 Status Screen in Easy Mode The following table describes the labels in this screen. Table 24 Status Screen in Easy Mode ITEM DESCRIPTION Name This is the name of the Router in the network. You can change this in the Maintenance > General screen in Section 22.3 on page 155. Time This is the current system date and time.
Chapter 6 Easy Mode 56 NBG6503 User’s Guide
C HAPT ER 7 Router Mode 7.1 Overview The Router is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the Router connects the local network (LAN1 ~ LAN4) to the Internet. Figure 41 Router Network Router Modem Note: The Status screen is shown after changing to the Expert mode of the Web Configurator. It varies depending on the device mode of your Router. 7.2 What You Can Do Use the Status screen (Section 7.
Chapter 7 Router Mode 7.3 Status Screen Click to open the status screen. Figure 42 Status Screen: Router Mode The following table describes the icons shown in the Status screen. Table 25 Status Screen Icon Key: Router Mode ICON DESCRIPTION Click this icon to view copyright and a link for related product information. Click this icon to go to Easy Mode. See Chapter 6 on page 45. Click this to go to the Home page. See Chapter 4 on page 37.
Chapter 7 Router Mode Table 25 Status Screen Icon Key: Router Mode (continued) ICON DESCRIPTION Click this icon to see the Configuration navigation menu. Click this icon to see the Maintenance navigation menu. The following table describes the labels shown in the Status screen. Table 26 Status Screen: Router Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen.
Chapter 7 Router Mode Table 26 Status Screen: Router Mode (continued) LABEL Current Date/Time DESCRIPTION This field displays your Router’s present date and time. System Resource - CPU Usage This displays what percentage of the Router’s processing ability is currently used. When this percentage is close to 100%, the Router is running at full load, and the throughput is not going to improve anymore.
Chapter 7 Router Mode 7.3.1 Navigation Panel Use the sub-menus on the navigation panel to configure Router features. Figure 43 Navigation Panel: Router Mode The following table describes the sub-menus. Table 27 Navigation Panel: Router Mode LINK TAB Status FUNCTION This screen shows the Router’s general device, system and interface status information. Use this screen to access the wizard, and summary statistics tables.
Chapter 7 Router Mode Table 27 Navigation Panel: Router Mode (continued) LINK TAB FUNCTION General Use this screen to configure wireless 2.4G LAN. MAC Filter Use the MAC filter screen to configure the Router to block access to devices or block the devices from accessing the Router. Advanced This screen allows you to configure advanced wireless settings. QoS Use this screen to configure Wi-Fi Multimedia Quality of Service (WMM QoS).
Chapter 7 Router Mode Table 27 Navigation Panel: Router Mode (continued) LINK TAB FUNCTION General Use this screen to enable bandwidth management. Advanced Use this screen to set the upstream bandwidth and edit a bandwidth management rule. Monitor Use this screen to view the amount of network bandwidth that applications running in the network are using. Remote Management WWW Use this screen to be able to access the Router from the LAN, WAN or both.
Chapter 7 Router Mode 64 NBG6503 User’s Guide
C HAPT ER 8 Access Point Mode 8.1 Overview Use your Router as an access point (AP) if you already have a router or gateway on your network. In this mode your Router bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example. Figure 44 Wireless Internet Access in Access Point Mode Router Many screens that are available in Router mode are not available in Access Point mode, such as bandwidth management and firewall.
Chapter 8 Access Point Mode 8.3.1 Setting your Router to AP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To use your Router as an access point, go to Maintenance > Sys OP Mode and select Access Point mode. Figure 45 Changing to Access Point mode Note: You have to log in to the Web Configurator again when you change modes. As soon as you do, your Router is already in Access Point mode.
Chapter 8 Access Point Mode 3 Click Start > Run on your computer in Windows. Type “cmd” in the dialog box. Enter “ipconfig” to show your computer’s IP address. If your computer’s IP address is not in the correct range then see Appendix B on page 181 for information on changing your computer’s IP address. 4 After you’ve set your computer’s IP address, open a web browser such as Internet Explorer and type “192.168.1.2” as the web address in your web browser.
Chapter 8 Access Point Mode 8.4 AP Mode Status Screen Click to open the Status screen. Figure 47 Status Screen: Access Point Mode The following table describes the labels shown in the Status screen. Table 28 Status Screen: Access Point Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes.
Chapter 8 Access Point Mode Table 28 Status Screen: Access Point Mode (continued) LABEL DESCRIPTION WLAN 2.4G Information - WLAN OP Mode This is the device mode (Section 5.1.2 on page 43) to which the Router’s wireless LAN is set - Access Point Mode. - MAC Address This shows the wireless adapter MAC Address of your device. - SSID This shows a descriptive name used to identify the Router in the wireless 2.4G LAN. - Channel This shows the channel number which you select manually.
Chapter 8 Access Point Mode 8.4.0.1 Navigation Panel Use the menu in the navigation panel to configure Router features in Access Point mode. The following screen and table show the features you can configure in Access Point mode. Figure 48 Menu: Access Point Mode Refer to Table 27 on page 61 for descriptions of the labels shown in the Navigation panel. 8.5 LAN Screen Use this section to configure your LAN settings while in Access Point mode. Click Network > LAN to see the screen below.
Chapter 8 Access Point Mode Table 29 Network > LAN > IP LABEL DESCRIPTION Get from DHCP Server Click this to deploy the Router as an access point in the network. When you enable this, the Router gets its IP address from the network’s DHCP server (for example, your ISP). Users connected to the Router can now access the network (i.e., the Internet if the IP address is given by the ISP).
C HAPT ER 9 Tutorials 9.1 Overview This chapter provides tutorials for your Router as follows: • Connecting to the Internet from an Access Point • Configuring Wireless Security Using WPS • Enabling and Configuring Wireless Security (No WPS) • If your connection is successful, open your Internet browser and enter http://www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured. 9.
Chapter 9 Tutorials • Push Button Configuration (PBC) - create a secure wireless network simply by pressing a button. See Section 9.3.1 on page 74.This is the easier method. • PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the Router’s interface. See Section 9.3.2 on page 75. This is the more secure method, since one device can authenticate the other. 9.3.
Chapter 9 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both Router and wireless client (the NWD210N in this example). Figure 51 Example WPS Process: PBC Method Router Wireless Client WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 9.3.2 PIN Configuration When you use the PIN configuration method, you need to use both Router’s configuration interface and the client’s utilities. 1 Launch your wireless client’s configuration utility.
Chapter 9 Tutorials The following figure shows you the example to set up wireless network and security on Router and wireless client (ex. NWD210N in this example) by using PIN method.
Chapter 9 Tutorials 9.4 Enabling and Configuring Wireless Security (No WPS) This example shows you how to configure wireless security settings with the following parameters on your Router. SSID SSID_Example3 Channel 6 Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your Router.
Chapter 9 Tutorials 5 Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. Figure 54 Tutorial: Checking Wireless Settings 9.4.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 1 The Router supports IEEE 802.11b, IEEE 802.11g, IEEE 802.11n and IEEE 802.11ac wireless clients.
Chapter 9 Tutorials 5 Select WPA-PSK and type the security key in the following screen. Click Next. Figure 56 Security Settings 6 The Confirm Save window appears. Check your settings and click Save to continue. Figure 57 Confirm Save 7 Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide.
Chapter 9 Tutorials 80 NBG6503 User’s Guide
P ART II Technical Reference 81
82
C HAPTER 10 Wireless LAN 10.1 Overview This chapter discusses how to configure the wireless network settings in your Router. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 59 Example of a Wireless Network Router A B 2.4G C 5G The wireless 2.4G network is the part in the blue circle and wireless 5G network is the part in the green circle.
Chapter 10 Wireless LAN • Use the Advanced screen (Section 10.6 on page 91) to allow wireless advanced features, such as intra-BSS networking and set the RTS/CTS Threshold. • Use the QoS screen (Section 10.7 on page 93) to set priority levels to services, such as e-mail, VoIP, chat, and so on. • Use the WPS screen (Section 10.8 on page 94) to quickly set up a wireless network with strong security, without having to configure security settings manually. • Use the WPS Station screen (Section 10.
Chapter 10 Wireless LAN 00:A0:C5:00:00:02. To get the MAC address for each wireless client, see the appropriate User’s Guide or other documentation. You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security).
Chapter 10 Wireless LAN 10.3.1.5 WDS Wireless Distribution System or WDS security is used between bridged APs. It is independent of the security between the wired networks and their respective APs. If you do not enable WDS security, traffic between APs is not encrypted. When WDS security is enabled, both APs must use the same pre-shared key. 10.4 General Wireless LAN 2.4G/5G Screen Use this screen to enable the Wireless LAN 2.4G or 5G, enter the SSID and select the wireless security mode.
Chapter 10 Wireless LAN Table 31 Network > Wireless LAN 2.4G/5G > General (continued) LABEL DESCRIPTION Channel Selection Set the operating frequency/channel depending on your particular region. Select a channel from the drop-down list box. The options vary depending on the frequency band and the country you are in. Refer to the Connection Wizard chapter for more information on channels. This option is only available if Auto Channel Selection is disabled.
Chapter 10 Wireless LAN The following table describes the labels in this screen. Table 32 Network > Wireless LAN 2.4G/5G > General: No Security LABEL DESCRIPTION Security Mode Choose No Security from the drop-down list box. Apply Click Apply to save your changes back to the Router. Cancel Click Cancel to reload the previous configuration for this screen. Refer to Table 31 on page 86 for descriptions of the other labels in this screen. 10.4.
Chapter 10 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 33 Network > Wireless LAN 2.4G/5G > General: Static WEP LABEL DESCRIPTION Security Mode Select Static WEP to enable data encryption. PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate. A passphrase functions like a password. In WEP security mode, it is further converted by the Router into a complicated string that is referred to as the “key”.
Chapter 10 Wireless LAN 10.4.3 WPA-PSK/WPA2-PSK Click Network > Wireless LAN 2.4G or Wireless LAN 5G to display the General screen. Select WPA-PSK or WPA2-PSK from the Security Mode list. Figure 63 Network > Wireless LAN 2.4G/5G> General: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 34 Network > Wireless LAN 2.4G/5G > General: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Security Mode Select WPA-PSK or WPA2-PSK to enable data encryption.
Chapter 10 Wireless LAN pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure this screen. To change your Router’s MAC filter settings, click Network > Wireless LAN 2.4G or Wireless LAN 5G > MAC Filter. The screen appears as shown. Figure 64 Network > Wireless LAN 2.4G/5G > MAC Filter The following table describes the labels in this menu. Table 35 Network > Wireless LAN 2.
Chapter 10 Wireless LAN Click Network > Wireless LAN 2.4G or Wireless LAN 5G > Advanced. The screen appears as shown. Figure 65 Network > Wireless LAN > Advanced The following table describes the labels in this screen. Table 36 Network > Wireless LAN 2.4G/5G > Advanced LABEL DESCRIPTION RTS/CTS Threshold Data with its frame size larger than this value will perform the RTS (Request To Send)/CTS (Clear To Send) handshake.
Chapter 10 Wireless LAN Table 36 Network > Wireless LAN 2.4G/5G > Advanced (continued) LABEL DESCRIPTION Network Mode (Wireless LAN 5G) Select 11a/n mixed mode to allow IEEE802.11a and IEEE802.11n compliant WLAN devices to associate with the Router. Select 11a only to allow only IEEE 802.11a compliant WLAN devices to associate with the Router. Select 11a/an/ac to allow only IEEE 802.11a, IEEE802.11an and IEEE802.11ac compliant WLAN devices to associate with the Router.
Chapter 10 Wireless LAN The following table describes the labels in this screen. Table 37 Network > Wireless LAN 2.4G/5G > QoS LABEL DESCRIPTION Enable WMM QoS Check this to have the Router automatically give a service a priority level according to the ToS value in the IP header of packets it sends. WMM QoS (Wifi MultiMedia Quality of Service) gives high priority to voice and video, which makes them run more smoothly. Apply Click Apply to save your changes to the Router.
Chapter 10 Wireless LAN Table 38 Network > Wireless LAN 2.4G/5G > WPS (continued) LABEL DESCRIPTION Release Configuration This button is only available when the WPS status displays Configured. 802.11 Mode This is the 802.11 mode used. Only compliant WLAN devices can associate with the Router. SSID This is the name of the wireless network. Security This is the type of wireless security employed by the network. Apply Click Apply to save your changes back to the Router.
Chapter 10 Wireless LAN The following table describes the labels in this screen. Table 39 Network > Wireless LAN > WPS Station LABEL DESCRIPTION Push Button Use this button when you use the PBC (Push Button Configuration) method to configure wireless stations’s wireless settings. See Section 9.3.1 on page 74. Click this to start WPS-aware wireless station scanning and the wireless security information synchronization.
Chapter 10 Wireless LAN Table 40 Network > Wireless LAN 2.4G/5G > Scheduling (continued) LABEL DESCRIPTION WLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off. This field works in conjunction with the Day and Except for the following times fields. Day Select Everyday or the specific days to turn the Wireless LAN on or off. If you select Everyday you can not select any specific days. This field works in conjunction with the Except for the following times field.
Chapter 10 Wireless LAN The following table describes the labels in this screen. Table 41 Network > Wireless LAN 2.4G > WDS LABEL DESCRIPTION WDS Setup Basic Settings Select the operating mode for your Router. • • AP + Bridge - The Router functions as a bridge and access point simultaneously. Bridge - The Router acts as a wireless network bridge and establishes wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode.
C HAPTER 11 WAN 11.1 Overview This chapter discusses the Router’s WAN screens. Use these screens to configure your Router for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations. Figure 71 LAN and WAN Router 11.
Chapter 11 WAN 11.3.1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Chapter 11 WAN 11.3.2 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. Figure 72 Multicast Example Router In the multicast example above, systems A and D comprise one multicast group. In multicasting, the server only needs to send one data stream and this is delivered to systems A and D.
Chapter 11 WAN 11.4 Internet Connection Use this screen to change your Router’s Internet access settings. Click WAN from the Configuration menu. The screen differs according to the encapsulation you choose. 11.4.1 Ethernet Encapsulation This screen displays when you select Ethernet encapsulation. Figure 73 Network > WAN > Internet Connection: Ethernet Encapsulation The following table describes the labels in this screen.
Chapter 11 WAN Table 42 Network > WAN > Internet Connection: Ethernet Encapsulation (continued) LABEL DESCRIPTION IP Subnet Mask Enter the IP Subnet Mask in this field. Gateway IP Address Enter a Gateway IP Address (if your ISP gave you one) in this field. MTU Size Enter the Maximum Transmission Unit (MTU) or the largest packet size per frame that your Router can receive and process.
Chapter 11 WAN This screen displays when you select PPPoE encapsulation. Figure 74 Network > WAN > Internet Connection: PPPoE Encapsulation The following table describes the labels in this screen. Table 43 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Select PPP over Ethernet if you connect to your Internet via dial-up. User Name Type the user name given to you by your ISP.
Chapter 11 WAN Table 43 Network > WAN > Internet Connection: PPPoE Encapsulation (continued) LABEL DESCRIPTION Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection. Use Fixed IP Address Select this option If the ISP assigned a fixed IP address. My WAN IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address.
Chapter 11 WAN This screen displays when you select PPTP encapsulation. Figure 75 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen. Table 44 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access 106 Connection Type To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection.
Chapter 11 WAN Table 44 Network > WAN > Internet Connection: PPTP Encapsulation (continued) LABEL DESCRIPTION Nailed-up Connection Select Nailed-Up Connection if you do not want the connection to time out. Idle Timeout This value specifies the time in minutes that elapses before the Router automatically disconnects from the PPTP server. PPTP Configuration Server IP Address Type the IP address of the PPTP server.
Chapter 11 WAN 11.5 Advanced WAN Screen Use this screen to enable Multicast and enable Auto-bridge. Note: The categories shown in this screen are independent of each other. To change your Router’s advanced WAN settings, click Network > WAN > Advanced. The screen appears as shown. Figure 76 Network > WAN > Advanced The following table describes the labels in this screen. Table 45 Network > WAN > Advanced LABEL DESCRIPTION Multicast Setup Multicast Select IGMPv1/v2 to enable multicasting.
C HAPTER 12 LAN 12.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks. Figure 77 LAN Example The LAN screens can help you manage IP addresses. 12.
Chapter 12 LAN 12.3 What You Need To Know The actual physical connection determines whether the Router ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 78 LAN and WAN IP Addresses The LAN parameters of the Router are preset in the factory with the following values: • IP address of 192.168.1.1 with subnet mask of 255.255.255.0 (24 bits) • DHCP server enabled with 32 client IP addresses starting from 192.
Chapter 12 LAN 12.4 LAN IP Screen Use this screen to change the IP address for your Router. Click Network > LAN > IP. Figure 79 Network > LAN > IP The following table describes the labels in this screen. Table 46 Network > LAN > IP LABEL DESCRIPTION IP Address Type the IP address of your Router in dotted decimal notation. IP Subnet Mask The subnet mask specifies the network number portion of an IP address.
Chapter 12 LAN Table 47 Network > LAN > IP Alias (continued) 112 LABEL DESCRIPTION IP Subnet Mask The subnet mask specifies the network number portion of an IP address. Your Router will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the Router. Apply Click Apply to save your changes back to the Router. Reset Click Reset to begin configuring this screen afresh.
C HAPTER 13 DHCP Server 13.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the Router’s LAN as a DHCP server or disable it. When configured as a server, the Router provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 13.
Chapter 13 DHCP Server Table 48 Network > DHCP Server > General (continued) LABEL DESCRIPTION Pool Size This field specifies the size, or count of the IP address pool for LAN. Apply Click Apply to save your changes back to the Router. Reset Click Reset to begin configuring this screen afresh. 13.4 Advanced Screen This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses.
Chapter 13 DHCP Server Table 49 Network > DHCP Server > Advanced (continued) LABEL DESCRIPTION IP Address Type the LAN IP address of a computer on your LAN. DNS Server DNS Servers Assigned by DHCP Server The Router passes a DNS (Domain Name System) server IP address (in the order you specify here) to the DHCP clients. The Router only passes this information to the LAN DHCP clients when you select the Enable DHCP Server check box.
C HAPTER 14 Network Address Translation (NAT) 14.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. Each packet has two addresses – a source address and a destination address.
Chapter 14 Network Address Translation (NAT) 14.3 General NAT Screen Use this screen to enable NAT and set a default server. Click Network > NAT > General to open the following screen. Figure 84 Network > NAT > General The following table describes the labels in this screen.
Chapter 14 Network Address Translation (NAT) Note: Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP. Port forwarding allows you to define the local servers to which the incoming services will be forwarded.
Chapter 14 Network Address Translation (NAT) Table 51 Network > NAT > Application (continued) LABEL DESCRIPTION Application Rules Summary # This is the number of an individual port forwarding server entry. Active This icon is turned on when the rule is enabled. Name This field displays a name to identify this rule. Port This field displays the port number(s). Server IP Address This field displays the inside IP address of the server.
Chapter 14 Network Address Translation (NAT) Note: Only one LAN computer can use a trigger port (range) at a time. Figure 86 Network > NAT > Advanced The following table describes the labels in this screen. Table 52 Network > NAT > Advanced LABEL DESCRIPTION # This is the rule index number (read-only). Name Type a unique name (up to 15 characters) for identification purposes. All characters are permitted - including spaces.
Chapter 14 Network Address Translation (NAT) 14.5.1 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 87 Trigger Port Forwarding Process: Example Router Router 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the Router to record Jane’s computer IP address. The Router associates Jane's computer IP address with the "incoming" port range of 6970-7170.
C HAPTER 15 Dynamic DNS 15.1 Overview Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address. 15.2 What You Can Do Use the Dynamic DNS screen (Section 15.4 on page 123) to enable DDNS and configure the DDNS settings on the Router. 15.3 What You Need To Know Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.).
Chapter 15 Dynamic DNS The following table describes the labels in this screen. Table 53 Network > DDNS 124 LABEL DESCRIPTION Enable Dynamic DNS Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. Host Name Enter a host names in the field provided. You can specify up to two host names in the field separated by a comma (","). User Name Enter your user name. Password Enter the password assigned to you.
C HAPTER 16 Static Route 16.1 Overview This chapter shows you how to configure static routes for your Router. Each remote node specifies only the network to which the gateway is directly connected, and the Router has no knowledge of the networks beyond. For instance, the Router knows about network N2 in the following figure through remote node Router 1.
Chapter 16 Static Route 16.3 IP Static Route Screen Click Network > Static Route to open the IP Static Route screen. Figure 90 Network > Static Route The following table describes the labels in this screen. Table 54 Network > Static Route LABEL DESCRIPTION Static Routing Settings Route Name Enter a the name that describes or identifies this route. Destination IP Address Enter the IP network address of the final destination.
Chapter 16 Static Route Table 54 Network > Static Route LABEL DESCRIPTION Destination This parameter specifies the IP network address of the final destination. Routing is always based on network number. Gateway This is the IP address of the gateway. The gateway is a router or switch on the same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations. Metric This is the number assigned to the route.
C HAPTER 17 Firewall 17.1 Overview This chapter shows you how to enable and configure the firewall that protects your Router and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN.
Chapter 17 Firewall 17.3 What You Need To Know The Router’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks. It is designed to protect against Denial of Service (DoS) attacks when activated (click the General tab under Firewall and then click the Enable Firewall check box). The Router's purpose is to allow a private Local Area Network (LAN) to be securely connected to the Internet.
Chapter 17 Firewall 17.5 Services Screen If an outside user attempts to probe an unsupported port on your Router, an ICMP response packet is automatically returned. This allows the outside user to know the Router exists. Use this screen to prevent the ICMP response packet from being sent. This keeps outsiders from discovering your Router when unsupported ports are probed.
Chapter 17 Firewall Table 56 Security > Firewall > Services (continued) LABEL DESCRIPTION Enable Firewall Rule Enable Firewall Rule Select this check box to activate the firewall rules that you define (see Add Firewall Rule below) Apply Click Apply to save the settings. Add Firewall Rule Service Name Enter a name that identifies or describes the firewall rule. MAC Address Enter the MAC address of the computer for which the firewall rule applies.
C HAPTER 18 Content Filter 18.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords. 18.2 What You Can Do Use the Content Filter (Section 18.4 on page 134) screen to restrict web features, add keywords for blocking and designate a trusted computer. 18.
Chapter 18 Content Filter Since the Router checks the URL’s domain name (or IP address) and file path separately, it will not find items that go across the two. For example, with the URL www.zyxel.com.tw/news/ pressroom.php, the Router would find “tw” in the domain name (www.zyxel.com.tw). It would also find “news” in the file path (news/pressroom.php) but it would not find “tw/news”. 18.
Chapter 18 Content Filter Table 57 Security > Content Filter > Content Filter (continued) LABEL DESCRIPTION Cookies Used by Web servers to track usage and provide service based on ID. Web Proxy A server that acts as an intermediary between a user and the Internet to provide security, administrative control, and caching service. When a proxy server is located on the WAN it is possible for LAN users to circumvent content filtering by pointing to this proxy server.
C HAPTER 19 Bandwidth Management 19.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN. Downlink traffic comes back from the WAN device (B) to the LAN device (A).
Chapter 19 Bandwidth Management 19.3 What You Need To Know The sum of the bandwidth allotments that apply to the WAN interface (LAN to WAN, WLAN to WAN) must be less than or equal to the Upstream Bandwidth that you configure in the Bandwidth Management Advanced screen (Section 19.5 on page 138).
Chapter 19 Bandwidth Management Note: The two tables shown in this screen can be configured and applied at the same time. Click Management > Bandwidth Management > Advanced to open the bandwidth management Advanced screen. Figure 97 Management > Bandwidth Management > Advanced The following table describes the labels in this screen.
Chapter 19 Bandwidth Management Table 59 Management > Bandwidth Management > Advanced LABEL DESCRIPTION Management Bandwidth Upstream Bandwidth Select the total amount of bandwidth (from 64 Kilobits to 50 Megabits) that you want to dedicate to uplink traffic. This is traffic from LAN/WLAN to WAN. Downstream Bandwidth Select the total amount of bandwidth (from 64 Kilobits to 50 Megabits) that you want to dedicate to uplink traffic. This is traffic from WAN to LAN/WLAN.
Chapter 19 Bandwidth Management 19.5.1 Rule Configuration: Application Rule Configuration If you want to edit a bandwidth management rule for a pre-defined service or application, click the Edit icon in the Application List table of the Advanced screen. The following screen displays. Figure 98 Bandwidth Management Rule Configuration: Application List The following table describes the labels in this screen.
Chapter 19 Bandwidth Management 19.5.2 Rule Configuration: User Defined Service Rule Configuration If you want to edit a bandwidth management rule for other applications or services, click the Edit icon in the User-defined Service table of the Advanced screen. The following screen displays.
Chapter 19 Bandwidth Management 19.6 Monitor Screen Use this screen to view the amount of network bandwidth that applications running in the network are using. The bandwidth is measured in kilobits per second (kbps). The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 100 Management > Bandwidth Management > Monitor 19.6.
Chapter 19 Bandwidth Management Table 62 Media Bandwidth Management Setup: Services (continued) 144 SERVICE DESCRIPTION BitTorrent BitTorrent is a free P2P (peer-to-peer) sharing tool allowing you to distribute large software and media files. BitTorrent requires you to search for a file with a searching engine yourself. It distributes files by corporation and trading, that is, the client downloads the file in small pieces and share the pieces with other peers to get other half of the file.
C HAPTER 20 Remote Management 20.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your Router from a remote location through the following interfaces: • LAN and WAN • LAN only • WAN only Note: The Router is managed using the Web Configurator. 20.2 What You Can Do Use the WWW screen (Section 20.4 on page 146) to define the interface/s from which the Router can be managed remotely and specify a secure client that can manage the Router.
Chapter 20 Remote Management 20.3.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The Router automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling. You can change the timeout period in the System screen 20.4 WWW Screen To change your Router’s remote management settings, click Management > Remote Management > WWW.
C HAPTER 21 Universal Plug-and-Play (UPnP) 21.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.
Chapter 21 Universal Plug-and-Play (UPnP) 21.3.2 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. When a UPnP device joins a network, it announces its presence with a multicast message. For security reasons, the Router allows multicast messages on the LAN only.
Chapter 21 Universal Plug-and-Play (UPnP) Make sure the computer is connected to a LAN port of the Router. Turn on your computer and the Router. 21.5.1.1 Auto-discover Your UPnP-enabled Network Device 1 Click start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. 2 Right-click the icon and select Properties.
Chapter 21 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. Figure 105 Internet Connection Properties: Advanced Settings Figure 106 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 21 Universal Plug-and-Play (UPnP) 6 Double-click on the icon to display your current Internet connection status. Figure 108 Internet Connection Status 21.5.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the Router without finding out the IP address of the Router first. This comes helpful if you do not know the IP address of the Router. Follow the steps below to access the web configurator. 1 Click Start and then Control Panel.
Chapter 21 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 109 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your Router and select Invoke. The web configurator login screen displays.
Chapter 21 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your Router and select Properties. A properties window displays with basic information about the Router.
C HAPTER 22 Maintenance 22.1 Overview This chapter provides information on the Maintenance screens. 22.2 What You Can Do • Use the General screen to configure system and domain name. You can also set the timeout period of the management session (Section 22.3 on page 155). • Use the Password screen to change your Router’s system password (Section 22.4 on page 156). • Use the Time screen to change your Router’s time and date (Section 22.5 on page 157).
Chapter 22 Maintenance The following table describes the labels in this screen. Table 65 Maintenance > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the Router in an Ethernet network. Domain Name Enter the domain name you want to give to the Router. Administrator Inactivity Timer Type how many minutes a management session can be left idle before the session times out. The default is 5 minutes.
Chapter 22 Maintenance 22.5 Time Setting Screen Use this screen to configure the Router’s time based on your local time zone. To change your Router’s time and date, click Maintenance > Time. The screen appears as shown. Figure 114 Maintenance > Time The following table describes the labels in this screen. Table 67 Maintenance > Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your Router.
Chapter 22 Maintenance Table 67 Maintenance > Time (continued) LABEL DESCRIPTION Get from Time Server Select this radio button to have the Router get the time and date from the time server you specified below. Auto Select Auto to have the Router automatically search for an available time server and synchronize the date and time with the time server after you click Apply.
Chapter 22 Maintenance Click Maintenance > Firmware Upgrade. Follow the instructions in this screen to upload firmware to your Router. Figure 115 Maintenance > Firmware Upgrade The following table describes the labels in this screen. Table 68 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload.
Chapter 22 Maintenance 22.7 Configuration Backup/Restore Screen Backup configuration allows you to back up (save) the Router’s current configuration to a file on your computer. Once your Router is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
Chapter 22 Maintenance Table 69 Maintenance > Backup/Restore (continued) LABEL DESCRIPTION Upload Click Upload to begin the upload process. Note: Do not turn off the Router while configuration file upload is in progress. After you see a “configuration upload successful” screen, you must then wait one minute before logging into the Router again. The Router automatically restarts in this time causing a temporary network disconnect.
Chapter 22 Maintenance Router A router connects your local network with another network, such as the Internet. The router has two IP addresses, the LAN IP address and the WAN IP address. Figure 119 LAN and WAN IP Addresses in Router Mode Access Point An access point enabled all ethernet ports to be bridged together and be in the same subnet. To connect to the Internet, another device, such as a router, is required.
Chapter 22 Maintenance 22.10 Sys OP Mode Screen Use this screen to select how you want to use your Router. Figure 121 Maintenance > Sys OP Mode The following table describes the labels in the General screen. Table 70 Maintenance > Sys OP Mode LABEL DESCRIPTION System Operation Mode Router Select Router Mode if your device routes traffic between a local network and another network such as the Internet. This mode offers services such as a firewall or bandwidth management.
C HAPTER 23 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Router Access and Login • Internet Access • Resetting the Router to Its Factory Defaults • Wireless Router/AP Troubleshooting 23.1 Power, Hardware Connections, and LEDs The Router does not turn on. None of the LEDs turn on.
Chapter 23 Troubleshooting 23.2 Router Access and Login I don’t know the IP address of my Router. 1 The default IP address is 192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the Router by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 23 Troubleshooting 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 3 Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled. See Appendix A on page 173. 4 Make sure your computer is in the same subnet as the Router. (If you know that there are routers between your computer and the Router, skip this step.
Chapter 23 Troubleshooting 2 Make sure you entered your ISP account information correctly in the wizard. These fields are casesensitive, so make sure [Caps Lock] is not on. 3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP. • Go to Network > Wireless LAN 2.4G > General > WDS and check if the Router is set to bridge mode. Select Disable and try to connect to the Internet again.
Chapter 23 Troubleshooting • Check the settings for QoS. If it is disabled, you might consider activating it. If it is enabled, you might consider raising or lowering the priority for some applications. I set up URL keyword blocking, but I can still access a website that should be blocked. Make sure that you select the Enable URL Keyword Blocking check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Keyword List.
Chapter 23 Troubleshooting 2 Make sure the wireless adapter on the wireless station is working properly. 3 Make sure the wireless adapter installed on your computer is IEEE 802.11 compatible and supports the same wireless standard as the Router. 4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the Router. 5 Check that both the Router and your wireless station are using the same wireless and wireless security settings.
A PPENDIX A IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 122 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix A IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 72 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8-bit mask 11111111 00000000 00000000 00000000 255.0.0.0 16-bit mask 11111111 11111111 00000000 00000000 255.255.0.0 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.
Appendix A IP Addresses and Subnetting Table 74 Alternative Subnet Mask Notation (continued) SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.252 /30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 124 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix A IP Addresses and Subnetting Table 75 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 76 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix A IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 79 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix A IP Addresses and Subnetting Table 81 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix A IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix A IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
A PPENDIX B Setting Up Your Computer’s IP Address Note: Your specific Router may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix B Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. 182 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon.
Appendix B Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix B Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix B Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix B Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix B Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix B Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings 1 Click Start > All Programs > Accessories > Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix B Setting Up Your Computer’s IP Address 194 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix B Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 128 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 196 Click Apple > System Preferences.
Appendix B Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix B Setting Up Your Computer’s IP Address 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your Router. 6 198 Click Apply and close the window.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 129 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix B Setting Up Your Computer’s IP Address 200 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix B Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix B Setting Up Your Computer’s IP Address 202 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 130 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address 204 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix B Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix B Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 131 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 206 Click Next to save the changes and close the Network Card Setup window.
Appendix B Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 132 openSUSE 10.
Appendix B Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX C Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix C Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 135 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix C Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 136 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix C Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 137 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Appendix C Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix C Wireless LANs IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: • User based identification that allows for roaming.
Appendix C Wireless LANs • Accounting-Request Sent by the access point requesting accounting. • Accounting-Response Sent by the RADIUS server to indicate that it has started or stopped accounting. In order to ensure network security, the access point and the RADIUS server use a shared secret key, which is a password, they both know. The key is not sent over the network. In addition to the shared key, password information exchanged is also encrypted to protect the network from unauthorized access.
Appendix C Wireless LANs EAP-TTLS (Tunneled Transport Layer Service) EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the serverside authentications to establish a secure connection. Client authentication is then done by sending username and password through the secure connection, thus client identity is protected. For client authentication, EAP-TTLS supports EAP methods and legacy authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2.
Appendix C Wireless LANs WPA and WPA2 Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA or WPA2 and WEP are improved data encryption and user authentication. If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption.
Appendix C Wireless LANs password-guessing attacks but it’s still an improvement over WEP as it employs a consistent, single, alphanumeric password to derive a PMK which is used to generate unique temporal encryption keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database.
Appendix C Wireless LANs 4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. Figure 138 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows.
Appendix C Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 139 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix C Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz or 5GHz is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area. Antenna Gain Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Appendix C Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area.
A PPENDIX D Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix D Common Services Table 85 Commonly Used Services (continued) 224 NAME PROTOCOL PORT(S) DESCRIPTION HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program.
Appendix D Common Services Table 85 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP 161 Simple Network Management Program. SNMP-TRAPS TCP/UDP 162 Traps for use with the SNMP (RFC:1215).
A PPENDIX E Legal Information Copyright Copyright © 2013 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix E Legal Information 4 Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. • IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
Appendix E Legal Information This device has been designed to operate with an antenna having a maximum gain of 5dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication.
Appendix E Legal Information Open Source Licenses This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided with the firmware package. You can download the latest firmware at www.zyxel.com. To obtain the source code covered under those Licenses, please contact support@zyxel.com.tw to get it. Regulatory Information European Union The following information applies if you use the product within the European Union.
Appendix E Legal Information [Portuguese] ZyXEL declara que este equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/EC. [Slovenian] ZyXEL izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/EC. [Slovak] ZyXEL týmto vyhlasuje, že zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/EC.
Appendix E Legal Information The following countries have restrictions and/or requirements in addition to those given in the table labeled “Overview of Regulatory Requirements for Wireless LANs”:. Overview of Regulatory Requirements for Wireless LANs Frequency Band (MHz) Max Power Level Indoor ONLY Indoor and Outdoor (EIRP)1 (mW) 2400-2483.
Appendix E Legal Information boundaries of the owner's property, its use requires a “general authorization.” Please check http:// www.sviluppoeconomico.gov.it/ for more details. Questo prodotto è conforme alla specifiche di Interfaccia Radio Nazionali e rispetta il Piano Nazionale di ripartizione delle frequenze in Italia. Se non viene installato all 'interno del proprio fondo, l'utilizzo di prodotti Wireless LAN richiede una “Autorizzazione Generale”. Consultare http:// www.sviluppoeconomico.gov.
Appendix E Legal Information • • • • • • • • • • Use ONLY an appropriate power adaptor or cord for your device. Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe). Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord. Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.
Index Index A ActiveX 134 Address Assignment 100 Advanced Encryption Standard See AES.
Index Dynamic Host Configuration Protocol 113 dynamic WEP key exchange 216 I DynDNS 123 IANA 178 DynDNS see also DDNS 123 IBSS 209 E EAP Authentication 215 encryption 85, 217 key 85 WPA compatible 85 IGMP 101 see also Internet Group Multicast Protocol version IGMP version 101 Independent Basic Service Set See IBSS 209 initialization vector (IV) 217 ESS 210 Internet Assigned Numbers Authority See IANA 178 ESSID 169 Internet Group Multicast Protocol 101 Extended Service Set, See ESS 210 IP Addre
Index managing the device good habits 16 using the web configurator. See web configurator. using the wireless switch. using the WPS. See WPS.
Index Session Initiated Protocol 143 SIP 143 W SSID 53, 59, 69, 84, 86 WAN (Wide Area Network) 99 Static DHCP 114 WAN advanced 108 Static Route 125 WAN MAC address 100 Status 58 warranty 229 note 229 subnet 171 Subnet Mask 111, 112 subnet mask 172 subnetting 174 Web Configurator how to access 31 Overview 31 web configurator 15 Summary DHCP table 39 Packet statistics 40 Wireless station status 41 WEP encryption 88 System General Setup 155 WEP key 88 System restart 161 Wi-Fi Protected Access
Index key caching 218 pre-authentication 218 user authentication 218 vs WPA-PSK 217 wireless client supplicant 218 with RADIUS application example 218 WPA compatible 85 WPA2 217 user authentication 218 vs WPA2-PSK 217 wireless client supplicant 218 with RADIUS application example 218 WPA2-Pre-Shared Key 217 WPA2-PSK 217 application example 219 WPA-PSK 217 application example 219 WPS 15 WWW 143 X Xbox Live 144 NBG6503 User’s Guide 239
Index 240 NBG6503 User’s Guide