P-663HN-51 802.11n ADSL2+ Bonded 4-port Gateway Default Login Details IP Address http://192.168.1.1 User Name admin Password 1234 Firmware Version 1.01 www.zyxel.com Edition 1, 7/2009 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the ZyXEL Device using the web configurator. Related Documentation Note: It is recommended you use the web configurator to configure the ZyXEL Device. • Support Disc Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications.
About This User's Guide • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product. • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The P-663HN-51 may be referred to as the “ZyXEL Device”, the “device” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The ZyXEL Device icon is not an exact representation of your device.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. • Do NOT open the device or unit.
Safety Warnings 8 P-663HN-51 User’s Guide
Contents Overview Contents Overview Introduction ............................................................................................................................ 19 Introducing the ZyXEL Device ................................................................................................... 21 Introducing the Web Configurator .............................................................................................. 27 Initial Configuration .................................................
Contents Overview 10 P-663HN-51 User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents Chapter 4 Device Information.................................................................................................................. 37 4.1 Device Information Summary .............................................................................................. 37 4.2 WAN Information ................................................................................................................. 39 4.3 LAN Statistics ..............................................................
Table of Contents 5.15 IGMP Multicast .................................................................................................................. 70 5.16 NAT, IGMP Multicast, and WAN Service ........................................................................... 72 5.17 WAN Setup Summary ........................................................................................................ 73 Chapter 6 LAN Setup...................................................................................
Table of Contents 10.1 QoS Overview ................................................................................................................ 103 10.1.1 IEEE 802.1Q Tag ................................................................................................... 103 10.1.2 IP Precedence ........................................................................................................ 104 10.1.3 DiffServ .....................................................................................
Table of Contents Chapter 17 Certificates ............................................................................................................................ 133 17.1 Overview ......................................................................................................................... 133 17.1.1 What You Can Do in the Certificates Screens ........................................................ 133 17.1.2 What You Need to Know About Certificates ........................................
Table of Contents 20.1 Backup Configuration Using the Web Configurator ......................................................... 175 20.2 Restore Configuration Using the Web Configurator ........................................................ 176 20.3 Restoring Factory Defaults .............................................................................................. 177 Chapter 21 Logs ...................................................................................................................
Table of Contents Part IV: Troubleshooting and Specifications..................................... 201 Chapter 28 Troubleshooting.................................................................................................................... 203 28.1 Power, Hardware Connections, and LEDs ...................................................................... 203 28.2 ZyXEL Device Access and Login .................................................................................... 204 28.
Table of Contents 18 P-663HN-51 User’s Guide
P ART I Introduction Introducing the ZyXEL Device (21) Introducing the Web Configurator (27) 19
CHAPTER 1 Introducing the ZyXEL Device This chapter introduces the main applications and features of the ZyXEL Device. It also introduces the ways you can manage the ZyXEL Device. 1.1 Overview The ZyXEL Device is an ADSL2+ pair bonding gateway that allows super-fast Internet access over analog (POTS) telephone lines. It bonds two ADSL2+ lines into a single logical connection to provide increased throughput at longer distances. The ZyXEL Device also provides IEEE 802.
Chapter 1 Introducing the ZyXEL Device A typical Internet access application is shown below Figure 1 Protected Internet Access Applications WLAN You can also use the ZyXEL Device to connect two geographically dispersed networks over the ADSL line. A typical LAN-to-LAN application example is shown as follows. Figure 2 LAN-to-LAN Application Example WLAN The ZyXEL Device is compatible with the ADSL/ADSL2/ADSL2+ standards (see Table 76 on page 207 for more details).
Chapter 1 Introducing the ZyXEL Device • Web Configurator. Use this for everyday management of the ZyXEL Device using a (supported) web browser. • SNMP. The device can be monitored by an SNMP manager. See the SNMP chapter in this User’s Guide. 1.3 Good Habits for Managing the ZyXEL Device Do the following things regularly to make the ZyXEL Device more secure and to manage the ZyXEL Device more effectively. • Change the password.
Chapter 1 Introducing the ZyXEL Device 1.4.2 Telephone Microfilters Telephone voice transmissions take place in the lower frequency range, 0 - 4KHz, while ADSL transmissions take place in the higher bandwidth range, above 4KHz. A microfilter acts as a low-pass filter, for your telephone, to ensure that ADSL transmissions do not interfere with your telephone voice transmissions. The use of a telephone microfilter is optional. 1 Locate and disconnect each telephone.
Chapter 1 Introducing the ZyXEL Device 1.5 System Startup and LEDs After you are done making the hardware connections, press the power button to the ON position. Look at the LEDs (lights) on the front panel. The following figure shows the ZyXEL Device’s LEDs.
Chapter 1 Introducing the ZyXEL Device The following table describes the LEDs. Table 1 Front Panel LEDs LED COLOR STATUS DESCRIPTION POWER Green On The ZyXEL Device is receiving power. Blinking The ZyXEL Device is performing a self-test. Off The ZyXEL Device is not receiving power. On The ZyXEL Device has a successful Ethernet connection. Blinking The ZyXEL Device is sending/receiving data. Off The ZyXEL Device is not connected to the LAN.
CHAPTER 2 Introducing the Web Configurator This chapter describes how to access and navigate the web configurator. 2.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy ZyXEL Device setup and management via Internet browser. Use Internet Explorer 6.0 and later versions. The recommended screen resolution is 1024 by 768 pixels. In order to use the web configurator you need to allow web browser pop-up windows from your device.
Chapter 2 Introducing the Web Configurator 5 A screen displays as shown. Figure 5 Password Screen 2.2.1 User Access The user account can only access the ZyXEL Device from the LAN. For user access, enter the user account’s user name (user) and password (1234 is the default) and click OK to view the status only. The following screen appears.
Chapter 2 Introducing the Web Configurator 2.2.2 Administrator Access The admin account can only access the ZyXEL Device from the LAN. For administrator access, enter the administrator user name (admin) and password (1234 is the default) and click OK to enter the configuration screens. Note: The management session automatically times out if it is left idle for five minutes. Simply log back into the ZyXEL Device if this happens. 2.
Chapter 2 Introducing the Web Configurator 2.4 Navigating the Web Configurator After you log in, use the sub-menus on the navigation panel to go to other screens. Some fields or links are not available if you entered the user password in the login password screen (see Figure 5 on page 28).
Chapter 2 Introducing the Web Configurator Table 2 Web Configurator Screens Summary (continued) LINK/ICON SUB-LINK FUNCTION Route This screen displays information about the ZyXEL Device’s routes for sending traffic. ARP This screen displays the IP addresses and MAC addresses that the ZyXEL Device has resolved. DHCP This screen lists the ZyXEL Device’s DHCP clients. Advanced Setup WAN Use these screens to view and configure the ZyXEL Device’s WAN (Internet) connection settings.
Chapter 2 Introducing the Web Configurator Table 2 Web Configurator Screens Summary (continued) LINK/ICON SUB-LINK FUNCTION DSL Use this screen to configure the ZyXEL Device’s DSL settings. Interface Group Use this screen to map ports to PVCs and create bridging groups. Certificate Use these screens to import Trusted CA certificates that the ZyXEL Device can use in authenticating wireless clients.
Chapter 2 Introducing the Web Configurator Table 2 Web Configurator Screens Summary (continued) LINK/ICON SUB-LINK FUNCTION Access Control Services Use this screen to enable or disable service access to the ZyXEL Device. IP Addresses Use these screens to configure the IP addresses of trusted computers that may manage the ZyXEL Device. Passwords Use this screen to change the passwords for the ZyXEL Device’s accounts.
Chapter 2 Introducing the Web Configurator 34 P-663HN-51 User’s Guide
CHAPTER 3 Initial Configuration This chapter introduces the initial configuration that you may need to perform on the ZyXEL Device. 3.1 WAN Configuration If you connect your ZyXEL Device and are able to access the Internet without configuring the ZyXEL Device, it may be that your ISP pre-configured the ZyXEL Device for you or the Internet connection works with the ZyXEL Device’s default settings.
Chapter 3 Initial Configuration 3.2 QoS Configuration If the ISP gave you QoS settings to use, click Advanced Setup > QoS and configure the ZyXEL Device to use them. See Chapter 10 on page 103 for details. If the WAN connection uses VLAN multiplexing, you can apply different QoS settings to different VLANs within the same WAN connection. If you are not using VLAN multiplexing, you may need to configure separate WAN connections (using different PVCs) in order to give different traffic different priorities.
CHAPTER 4 Device Information Use the Device Info screens to see information about your ZyXEL Device and its connections. 4.1 Device Information Summary The Device Info > Summary screen displays when you log in. To get to it from another screen, just click Device Info > Summary. This screen displays general information about the ZyXEL Device.
Chapter 4 Device Information The following table describes the labels shown in the Status screen. Table 3 Device Info > Summary 38 LABEL DESCRIPTION Product Name This is your ZyXEL Device’s model name. Software Version This is the number of the firmware release the ZyXEL Device is using. Bootloader (CFE) Version This is the number of the bootloader the ZyXEL Device is using. Line Rate Upstream (Kbps) This is the speed of the upstream (outgoing) connection link.
Chapter 4 Device Information 4.2 WAN Information Click Device Info > WAN to open the following screen. Each row in the table displays information about one of the ZyXEL Device’s WAN connections. Figure 11 Device Info > WAN The following table describes the labels in this screen. Table 4 Device Info > WAN LABEL DESCRIPTION Port/VPI/VCI This field displays the WAN connection’s DSL port, Virtual Path Identifier, and Virtual Channel Identifier.
Chapter 4 Device Information 4.3 LAN Statistics Click Device Info > Statistics > LAN to open the following screen. This screen displays statistics about the ZyXEL Device’s LAN connections. Figure 12 Device Info > Statistics > LAN The following table describes the labels in this screen. Table 5 Device Info > Statistics > LAN 40 LABEL DESCRIPTION Interface This field displays the type of LAN connection. Received These statistics are for traffic the ZyXEL Device has received on the interface.
Chapter 4 Device Information 4.4 WAN Statistics Click Device Info > Statistics > WAN to open the following screen. Each row in the table displays statistics about a WAN connection. Figure 13 Device Info > Statistics > WAN The following table describes the labels in this screen. Table 6 Device Info > Statistics > WAN LABEL DESCRIPTION Service If the WAN connection is using bridging, the name of the bridge displays here.
Chapter 4 Device Information 4.5 ATM Statistics Click Device Info > Statistics > ATM to open the following screen. This screen shows low-level ATM protocol statistics. Figure 14 Device Info > Statistics > ATM The following table describes the labels in this screen. Table 7 Device Info > Statistics > ATM LABEL DESCRIPTION ATM Interface Statistics These are statistics for the ATM interface. In Octets How many octets the interface received. Out Octets How many octets the interface transmitted.
Chapter 4 Device Information Table 7 Device Info > Statistics > ATM (continued) LABEL DESCRIPTION In Circuit Type Errors How many idle cells the ZyXEL Device received with illegal circuit types. In OAM RM CRC Errors How many Operational, Administration and Maintenance Function 5 (OAM) and RM (Rate Management) cells the ZyXEL Device received with a Cyclic Redundancy Check error. In GFC Errors How many cells the ZyXEL Device received with non-zero GFCs.
Chapter 4 Device Information 4.6 ADSL Statistics Click Device Info > Statistics > ADSL to open the following screen. This screen displays statistics about the ZyXEL Device’s ADSL connection. Figure 15 Device Info > Statistics > ADSL The following table describes the labels in this screen. Table 8 Device Info > Statistics > ADSL 44 LABEL DESCRIPTION Mode This is the ADSL mode that the ADSL link is using.
Chapter 4 Device Information Table 8 Device Info > Statistics > ADSL (continued) LABEL DESCRIPTION Link Power State This is the ADSL connection’s current power management mode. SNR Margin (dB) This is the upstream and downstream Signal-to-Noise Ratio Margin (in dB). A DMT sub-carrier’s SNR is the ratio between the received signal power and the received noise power.
Chapter 4 Device Information Table 8 Device Info > Statistics > ADSL (continued) LABEL DESCRIPTION Bit Errors The total numbers of downstream and upstream bit errors. Total ES The number of Errored SecondS that have occurred within the period. Total SES The number of Severely Errored Seconds that have occurred within the period. Total UAS The number of UnAvailable Seconds that have occurred within the period.
Chapter 4 Device Information The ADSL BER test results show how many bits were sent, how many of the transferred bits were errored, and the error ratio. Click Close when you are done. 4.8 Route Info Click Device Info > Route to open the following screen. This screen displays information about the ZyXEL Device’s routes for sending traffic. Figure 18 Device Info > Route The following table describes the labels in this screen.
Chapter 4 Device Information Table 9 Device Info > Route (continued) LABEL DESCRIPTION Service This displays what type of traffic this route is for. The field is blank when the route is for all types of service. Interface This route has the ZyXEL Device send traffic through this interface. 4.9 ARP Info Click Device Info > ARP to open the following screen. This screen displays information about the IP addresses the ZyXEL Device has resolved into MAC addresses.
Chapter 4 Device Information DHCP service is disabled, there must be another DHCP server, or else the computer must be manually configured. Click Device Info > DHCP to display the following screen. This is only available when the ZyXEL Device’s DHCP server function is enabled. The DHCP table shows current DHCP client information (including IP Address, Host Name and MAC Address) of all network clients using the ZyXEL Device’s DHCP server.
Chapter 4 Device Information 50 P-663HN-51 User’s Guide
P ART II Advanced WAN Setup (53) LAN Setup (75) Network Address Translation (NAT) Screens (83) Security (93) Quality of Service (QoS) (103) Routing (115) RIP (119) DNS Setup (121) Dynamic DNS Setup (123) DSL Setup (127) Interface Group (129) 51
CHAPTER 5 WAN Setup 5.1 WAN Overview A WAN (Wide Area Network) is an outside connection to another network or the Internet. 5.1.1 VPI and VCI Be sure to use the correct Virtual Path Identifier (VPI) and Virtual Channel Identifier (VCI) numbers assigned to you. The valid range for the VPI is 0 to 255 and for the VCI is 32 to 65535 (0 to 31 is reserved for local management of ATM traffic). Please see the appendix for more information. 5.1.
Chapter 5 WAN Setup 5.2 Traffic Shaping Traffic shaping is an agreement between the carrier and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network. This agreement helps eliminate congestion, which is important for transmission of real time data such as audio and video connections. Note: Traffic shaping controls outgoing (upstream) traffic, not incoming (downstream). Peak Cell Rate (PCR) is the maximum rate at which the sender can send cells.
Chapter 5 WAN Setup 5.2.1.1 Constant Bit Rate (CBR) Constant Bit Rate (CBR) provides fixed bandwidth that is always available even if no data is being sent. CBR traffic is generally time-sensitive (doesn't tolerate delay). CBR is used for connections that continuously require a specific amount of bandwidth. A PCR is specified and if traffic exceeds this rate, cells may be dropped. Examples of connections that need CBR would be high-resolution video and voice. 5.2.1.
Chapter 5 WAN Setup See Section 5.1 on page 53 for more information. Figure 22 Advanced Setup > WAN The following table describes the labels in this screen. Table 12 Advanced Setup > WAN 56 LABEL DESCRIPTION Port/VPI/VCI This field displays the WAN connection’s DSL port, Virtual Path Identifier, and Virtual Channel Identifier. The DSL port is always 0 because the DSL ports are bonded into a single logical port. VLAN Mux. This field shows whether or not VLAN multiplexing is enabled.
Chapter 5 WAN Setup 5.4 WAN ATM PVC Configuration and QoS Click Advanced Setup > WAN > Add (or Edit) to open the following screen. Use this screen to configure ATM PVC settings and enable or disable QoS. The screen differs by the service category. See Section 5.1 on page 53 for more information. Figure 23 Advanced Setup > WAN > Add The following table describes the labels in this screen.
Chapter 5 WAN Setup Table 13 Advanced Setup > WAN > Add (continued) LABEL DESCRIPTION Service Category Select UBR (unspecified bit rate) for applications that are non-time sensitive, such as e-mail. Use it with PCR if you want to specify a maximum rate at which the sender can send cells. Select CBR (constant bit rate) to specify fixed (always-on) bandwidth for voice or data traffic.
Chapter 5 WAN Setup 5.5.2 PPPoE PPPoE (Point to Point Protocol over Ethernet) provides access control and billing functionality in a manner similar to dial-up services using PPP. The ZyXEL Device bridges a PPP session over Ethernet (PPP over Ethernet, RFC 2516) from your computer to an ATM PVC (Permanent Virtual Circuit) which connects to ADSL Access Concentrator where the PPP session terminates. One PVC can support any number of PPP sessions from your LAN.
Chapter 5 WAN Setup 5.6.1 LLC-based Encapsulation In this case one VC carries multiple protocols with protocol identifying information being contained in each packet header. Despite the extra bandwidth and processing overhead, this method may be advantageous if it is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on the number of simultaneous VCs. 5.6.
Chapter 5 WAN Setup The following table describes the labels in this screen. Table 14 Advanced Setup > WAN LABEL DESCRIPTION Connection Type Select the type of network protocol the ISP uses for IP over Ethernet. Encapsulation Mode Select the encapsulation mode that your ISP uses. MTU This field applies to the PPPoE and MER encapsulation types. Maximum Transmission Unit. Type the maximum size of each data packet, in bytes, that can go through this interface.
Chapter 5 WAN Setup 5.10 PPPoA WAN Connection Setup When you select PPPoA in the second WAN setup add (or edit) screen, this screen displays next. Use this screen to configure PPPoA connection settings. Figure 25 Advanced Setup > WAN > Add (3: PPPoA) The following table describes the labels in this screen. Table 15 Advanced Setup > WAN > Add (3: PPPoA) 62 LABEL DESCRIPTION PPP User Name Enter the login name that your ISP gives you.
Chapter 5 WAN Setup Table 15 Advanced Setup > WAN > Add (3: PPPoA) (continued) LABEL DESCRIPTION Authentication Method The ZyXEL Device supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is readily available on more platforms. Use the drop-down list box to select an authentication protocol for outgoing calls.
Chapter 5 WAN Setup Table 15 Advanced Setup > WAN > Add (3: PPPoA) (continued) LABEL DESCRIPTION Use Static IP Address If the ISP gave you a static (fixed) IP address, select this option and enter it in the IP Address field. If the ISP did not give you a static IP address, clear the Use Static IP Address option. The ISP automatically assigns the WAN connection an IP address when it connects. 64 Enable PPP debug mode Select this to turn on the debug mode for the PPP connection.
Chapter 5 WAN Setup 5.11 PPPoE WAN Connection Setup When you select PPPoE in the second WAN setup add (or edit) screen, this screen displays next. Use this screen to configure PPPoE connection settings. Figure 26 Advanced Setup > WAN > Add (3: PPPoE) The following table describes the labels in this screen. Table 16 Advanced Setup > WAN > Add (3: PPPoE) LABEL DESCRIPTION PPP User Name Enter the login name that your ISP gives you. PPP Password Enter the password associated with the user name above.
Chapter 5 WAN Setup Table 16 Advanced Setup > WAN > Add (3: PPPoE) (continued) LABEL DESCRIPTION Authentication Method The ZyXEL Device supports PAP (Password Authentication Protocol) and CHAP (Challenge Handshake Authentication Protocol). CHAP is more secure than PAP; however, PAP is readily available on more platforms. Use the drop-down list box to select an authentication protocol for outgoing calls.
Chapter 5 WAN Setup Table 16 Advanced Setup > WAN > Add (3: PPPoE) (continued) LABEL DESCRIPTION Use Static IP Address If the ISP gave you a static (fixed) IP address, select this option and enter it in the IP Address field. If the ISP did not give you a static IP address, clear the Use Static IP Address option. The ISP automatically assigns the WAN connection an IP address when it connects. Enable PPP debug mode Select this to turn on the debug mode for the PPP connection.
Chapter 5 WAN Setup 5.12 MER WAN Connection Setup When you select MER in the second WAN setup add (or edit) screen, this screen displays next. Use this screen to configure MER connection settings. Figure 27 Advanced Setup > WAN > Add (3: MER) The following table describes the labels in this screen. Table 17 Advanced Setup > WAN > Add (3: MER) 68 LABEL DESCRIPTION Obtain an IP address automatically The WAN connection’s IP address identifies the ZyXEL Device on the Internet.
Chapter 5 WAN Setup Table 17 Advanced Setup > WAN > Add (3: MER) (continued) LABEL DESCRIPTION Obtain DNS server addresses automatically The ZyXEL Device uses a DNS server to resolve a domain name (find the numeric IP address associated with the domain name). Select this option if the ISP did not give you a specific DNS server IP address. The ISP automatically assigns the DNS server IP addresses when the ZyXEL Device connects.
Chapter 5 WAN Setup Table 18 Advanced Setup > WAN > Add (3: IPoA) (continued) LABEL DESCRIPTION Use the following default gateway The default is a neighboring router that helps the ZyXEL Device forward traffic to its destination. Select this option and enter the gateway’s IP address or select the WAN interface to use to connect to it. Use the following DNS server addresses The ZyXEL Device uses a DNS server to resolve a domain name (find the numeric IP address associated with the domain name).
Chapter 5 WAN Setup Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. IGMP (Internet Group Management Protocol) is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data. IGMP version 2 (RFC 2236) is an improvement over version 1 (RFC 1112) but IGMP version 1 is still in wide use.
Chapter 5 WAN Setup 5.16 NAT, IGMP Multicast, and WAN Service This is the fourth WAN screen to display for every connection type except bridging (for which this is the third screen). This screen varies depending on the connection type. Use this screen to configure NAT, IGMP multicast, and WAN service settings. Figure 30 Advanced Setup > WAN > Add (4: MER) The following table describes the labels in this screen.
Chapter 5 WAN Setup Table 20 Advanced Setup > WAN > Add (4: MER) (continued) LABEL DESCRIPTION Service Name This is the name for the WAN connection. Use the default or define your own. Back Click this to return to the previous screen. Next Click this to go to the following screen. 5.17 WAN Setup Summary This is the last WAN setup screen to display. Use this screen to check your settings before saving them. Click Back if you need to make any changes.
Chapter 5 WAN Setup 74 P-663HN-51 User’s Guide
CHAPTER 6 LAN Setup This chapter describes how to configure LAN settings. 6.1 LAN Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses. See Section 6.5 on page 80 to configure the LAN screens. 6.1.
Chapter 6 LAN Setup 6.1.2 DHCP Setup DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the ZyXEL Device as a DHCP server or disable it. When configured as a server, the ZyXEL Device provides the TCP/IP configuration for the clients. If you turn DHCP service off, you must have another DHCP server on your LAN, or else the computer must be manually configured.
Chapter 6 LAN Setup address that you entered. You don't need to change the subnet mask computed by the ZyXEL Device unless you are instructed to do otherwise. 6.2.1.1 Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems.
Chapter 6 LAN Setup to participate in IGMP. The address 224.0.0.2 is assigned to the multicast routers group. The ZyXEL Device supports both IGMP version 1 (IGMP-v1) and IGMP version 2 (IGMP-v2). At start up, the ZyXEL Device queries all directly connected networks to gather group membership. After that, the ZyXEL Device periodically updates this information. IP multicasting can be enabled/disabled on the ZyXEL Device LAN and/or WAN interfaces in the web configurator (LAN; WAN).
Chapter 6 LAN Setup 6.4.3 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. When a UPnP device joins a network, it announces its presence with a multicast message. For security reasons, the ZyXEL Device allows multicast messages only on the LAN.
Chapter 6 LAN Setup 6.5 LAN Setup Click Advanced Setup > LAN to open the IP screen. See Section 6.1 on page 75 for background information. Some fields may not display depending on your WAN configuration. Figure 33 Advanced Setup > LAN The following table describes the fields in this screen. Table 21 Advanced Setup > LAN 80 LABEL DESCRIPTION IP Address Enter the LAN IP address of your ZyXEL Device in dotted decimal notation, for example, 192.168.1.1 (factory default).
Chapter 6 LAN Setup Table 21 Advanced Setup > LAN (continued) LABEL DESCRIPTION Enable UPnP Select this check box to activate UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the ZyXEL Device's IP address (although you must still enter the password to access the web configurator).
Chapter 6 LAN Setup 6.6 The DHCP Static Lease Screen In the Advanced Setup > LAN screen, click Add Entries to open the DHCP Static Lease screen. Use this screen to configure the list of static IP addresses the ZyXEL Device assigns to computers connected to the interface. If a computer’s MAC address is in the LAN’s static DHCP table, the ZyXEL Device assigns the corresponding IP address. Otherwise, the ZyXEL Device assigns an IP address dynamically using the interface’s Start Address and Pool Size.
CHAPTER 7 Network Address Translation (NAT) Screens This chapter discusses how to configure NAT on the ZyXEL Device. 7.1 NAT Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network. 7.
Chapter 7 Network Address Translation (NAT) Screens periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP. 7.2.1 Virtual Server: Services and Port Numbers See Appendix E on page 279 for commonly used port numbers. 7.2.
Chapter 7 Network Address Translation (NAT) Screens Click Advanced Setup > NAT > Virtual Servers to open the following screen. Figure 36 Advanced Setup > NAT > Virtual Servers See Appendix E on page 279 for port numbers commonly used for particular services. The following table describes the fields in this screen. Table 23 NAT Port Forwarding LABEL DESCRIPTION Add Click this button to go to a screen where you can configure a new entry.
Chapter 7 Network Address Translation (NAT) Screens 7.3.1 Virtual Server Rule Add To create a virtual server rule, click Advanced Setup > NAT > Virtual Servers > Add to open the following screen. Figure 37 Advanced Setup > NAT > Virtual Servers > Add The following table describes the fields in this screen. Table 24 Advanced Setup > NAT > Virtual Servers > Add 86 LABEL DESCRIPTION Server Name Either select a pre-defined service or select Custom Server and enter a name manually.
Chapter 7 Network Address Translation (NAT) Screens Table 24 Advanced Setup > NAT > Virtual Servers > Add (continued) LABEL DESCRIPTION External Port Start Enter a port number in this field. To forward only one port, enter the port number again in the External Port End field. To forward a series of ports, enter the start port number here and the end port number in the External Port End field. External Port End Enter a port number in this field.
Chapter 7 Network Address Translation (NAT) Screens For example: Figure 38 Trigger Port Forwarding Process: Example 1 Jane (A) requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the ZyXEL Device to record Jane’s computer IP address. The ZyXEL Device associates Jane's computer IP address with the "incoming" port range of 6970-7170. 3 The Real Audio server responds using a port number ranging between 6970-7170.
Chapter 7 Network Address Translation (NAT) Screens The following table describes the labels in this screen. Table 25 Advanced Setup > NAT > Port Triggering LABEL DESCRIPTION Add Click this button to go to a screen where you can configure a new entry. Remove To remove an entry(ies), select its Remove check box and click the Remove button. Application Name for identification purposes.
Chapter 7 Network Address Translation (NAT) Screens The following table describes the labels in this screen. Table 26 Advanced Setup > NAT > Port Triggering > Add LABEL DESCRIPTION Application Name Either select a pre-defined application or select Custom Application and enter a name manually. Save/Apply When using a pre-defined service, if you do not want to modify the port numbers, you can click this button to save the changes and have the ZyXEL Device start using them.
Chapter 7 Network Address Translation (NAT) Screens Click Advanced Setup > NAT > DMZ Host to open the following screen. Use this screen to specify a DMZ host IP address. Figure 41 Advanced Setup > NAT > DMZ Host The following table describes the labels in this screen.
Chapter 7 Network Address Translation (NAT) Screens 92 P-663HN-51 User’s Guide
CHAPTER 8 Security This chapter describes how to configure security settings. 8.1 Outgoing IP Filtering By default, the ZyXEL Device allows traffic from the LAN to go to the Internet. Click Advanced Setup > Security > IP Filtering > Outgoing to open the following screen. This screen lists the currently configured filtering entries. Figure 42 Advanced Setup > Security > IP Filtering > Outgoing The following table describes the labels in this menu.
Chapter 8 Security Table 28 Advanced Setup > Security > IP Filtering > Outgoing LABEL DESCRIPTION Add Click this button to go to a screen where you can configure settings for a new entry. Remove To remove a WAN connection, select its Remove check box and click the Remove button. 8.2 Adding Outgoing IP Filtering Rules To add an outgoing IP filtering rule, click Advanced Setup > Security > IP Filtering > Outgoing > Add. The screen appears as shown.
Chapter 8 Security Table 29 Advanced Setup > Security > IP Filtering > Outgoing > Add LABEL DESCRIPTION Destination Port Type the destination port for traffic to which this entry applies. Save/Apply Click this button to save the changes and have the ZyXEL Device start using them. 8.3 Incoming IP Filtering By default, the ZyXEL Device blocks traffic from the Internet from going to the LAN. Use incoming IP filtering to allow certain traffic to come in from the Internet to the LAN.
Chapter 8 Security Table 30 Advanced Setup > Security > IP Filtering > Incoming LABEL DESCRIPTION Add Click this button to go to a screen where you can configure settings for a new entry. Remove To remove a WAN connection, select its Remove check box and click the Remove button. 8.4 Adding Incoming IP Filtering Rules To add an incoming IP filtering rule, click Advanced Setup > Security > IP Filtering > Incoming > Add. The screen appears as shown.
Chapter 8 Security Table 31 Advanced Setup > Security > IP Filtering > Incoming > Add LABEL DESCRIPTION Destination IP Address This is the IP address and subnet mask of a LAN computer to which this entry allows access. Destination Subnet Mask Type the subnet mask of the LAN computer to which this entry applies. Destination Port Type the destination port for traffic to which this entry applies. WAN Interfaces Select the WAN interface(s) to which this rule applies.
Chapter 8 Security 98 P-663HN-51 User’s Guide
CHAPTER 9 Parental Control (Blocking Schedule) Click Advanced Setup > Security > Parental Control to display the following screen. This screen shows policies controlling which days and times Internet access is blocked from specific MAC addresses. Figure 46 Advanced Setup > Security > Parental Control The following table describes the labels in this screen. Table 32 Advanced Setup > Security > Parental Control LABEL DESCRIPTION Username This name identifies to whom the blocking schedule applies.
Chapter 9 Parental Control (Blocking Schedule) 9.1 Adding Parental Control (Blocking Schedule) Entries Click Advanced Setup > Security > Parental Control > Add to display the following screen. Use this screen to configure which days and times Internet access is blocked from a specific MAC address. Figure 47 Advanced Setup > Security > Parental Control > Add The following table describes the labels in this screen.
Chapter 9 Parental Control (Blocking Schedule) Table 33 Advanced Setup > Security > Parental Control > Add LABEL DESCRIPTION End Blocking Time This is the ending time for the blocking period. Include a two-digit number of hours followed by a colon and a. two-digit number of hours. Save/Apply P-663HN-51 User’s Guide Click this button to save the changes and have the ZyXEL Device start using them.
Chapter 9 Parental Control (Blocking Schedule) 102 P-663HN-51 User’s Guide
CHAPTER 10 Quality of Service (QoS) This chapter contains information about configuring QoS, editing classifiers and viewing the ZyXEL Device’s QoS packet statistics. 10.1 QoS Overview Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth. Without QoS, all traffic data is equally likely to be dropped when the network is congested.
Chapter 10 Quality of Service (QoS) 12-bit VLAN ID and 3-bit user priority. The VLAN ID associates a frame with a specific VLAN and provides the information that devices need to process the frame across the network. IEEE 802.1p specifies the user priority field and defines up to eight separate traffic types. The following table describes the traffic types defined in the IEEE 802.1d standard (which incorporates the 802.1p). Table 34 IEEE 802.
Chapter 10 Quality of Service (QoS) to handle the packets differently depending on the code points without the need to negotiate paths or remember state information for every flow. In addition, applications do not have to request a particular service or give advanced notice of where the traffic is going. 10.1.3.1 DSCP and Per-Hop Behavior DiffServ defines a new DS (Differentiated Services) field to replace the Type of Service (TOS) field in the IP header.
Chapter 10 Quality of Service (QoS) Use this screen to enable or disable QoS, and select a DSCP mark to use on all outgoing packets that do not match a QoS classification rule. Figure 48 Advanced > Quality of Service The following table describes the labels in this screen. Table 35 Advanced > Quality of Service LABEL DESCRIPTION Enable QoS Select the check box to turn on QoS to improve your network performance.
Chapter 10 Quality of Service (QoS) 10.3 Queue Configuration Click Advanced > Quality of Service > Queue Configuration to open the following screen. This screen lists the QoS queues. A QoS queue sets the priority used for incoming packets that the QoS classifier has grouped into a flow. Figure 49 Advanced > Quality of Service > Queue Configuration The following table describes the labels in this screen.
Chapter 10 Quality of Service (QoS) 10.4 Adding a Queue Click Advanced > Quality of Service > Queue Configuration > Add to open the following screen. Use this screen to configure a QoS queue. A QoS queue sets the priority used for incoming packets that the QoS classifier has grouped into a flow. Note: You can only add QoS queues for WAN interfaces that have QoS enabled. Figure 50 Advanced > Quality of Service > Queue Configuration > Add The following table describes the labels in this screen.
Chapter 10 Quality of Service (QoS) 10.5 Class Setup Click Advanced > Quality of Service > QoS Classification to open the following screen. This screen lists the QoS classifiers. A classifier groups upstream traffic into data flows according to specific criteria such as the source address, destination address, source port number, destination port number or incoming interface. For example, you can configure a classifier to select traffic from the same protocol port (such as Telnet) to form a flow.
Chapter 10 Quality of Service (QoS) Table 38 Advanced > Quality of Service > QoS Classification (continued) LABEL DESCRIPTION Dest. Addr./Mask This is the IP address (and optionally the subnet mask) of the device that the traffic is going to. Dest. Port This is the port number on a device to which the traffic is going. Source MAC Addr./Mask This is the MAC address (and optionally the subnet mask) of the device that sent the traffic. Dest. MAC Addr.
Chapter 10 Quality of Service (QoS) LAN port. Set-2 is based on the MAC layer IEEE 802.1p priority field. Use one set or the other for a class (not both sets). Figure 52 QoS Class Configuration See Appendix E on page 279 for a list of commonly-used services. The following table describes the labels in this screen. Table 39 QoS Class Configuration LABEL DESCRIPTION Traffic Class Name Type a name for the classifier. Rule Order Select the classifier’s place in the classifiers list.
Chapter 10 Quality of Service (QoS) Table 39 QoS Class Configuration (continued) LABEL DESCRIPTION Assign Classification Queue Select the QoS queue the ZyXEL Device uses for the packets of upstream traffic that match this QoS classifier. Assign Differentiated Services Code Point (DSCP) Mark Select the DSCP mark the ZyXEL Device assigns to the packets of upstream traffic that match this QoS classifier. Mark 802.1p if Select the IEEE 802.1p mark the ZyXEL Device assigns to the packets 802.
Chapter 10 Quality of Service (QoS) P-663HN-51 User’s Guide 113
Chapter 10 Quality of Service (QoS) 114 P-663HN-51 User’s Guide
CHAPTER 11 Routing This chapter shows you how to configure the default gateway and static routes for your ZyXEL Device. 11.1 Default Gateway Setup The default gateway is a neighboring router that helps the ZyXEL Device forward traffic to its destination. Click Advanced > Routing > Default Gateway to open the following screen. Use this screen to change the ZyXEL Device’s default gateway settings.
Chapter 11 Routing Table 40 Advanced Setup > Routing > Default Gateway (continued) LABEL DESCRIPTION Use Interface To have the ZyXEL Device use a specific WAN interface for sending traffic to the default gateway, select this option and choose the WAN interface from the drop-down list box. Save/Apply Click this button to save the changes and have the ZyXEL Device start using them. 11.
Chapter 11 Routing 11.3 Configuring Static Route Click Advanced > Routing > Static Route to open the Static Route screen. Figure 55 Advanced > Routing > Static Route The following table describes the labels in this screen. Table 41 Advanced > Routing > Static Route LABEL DESCRIPTION Destination This parameter specifies the IP network address of the final destination. Routing is always based on network number. Subnet Mask This is the IP subnet mask. Gateway This is the IP address of the gateway.
Chapter 11 Routing The following table describes the labels in this screen. Table 42 Advanced > Routing > Static Route > Add 118 LABEL DESCRIPTION Destination Network Address This parameter specifies the IP network address of the final destination. Routing is always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID.
CHAPTER 12 RIP This chapter covers configuring the RIP settings for your ZyXEL Device. 12.1 RIP Setup RIP (Routing Information Protocol, RFC 1058 and RFC 1389) allows a router to exchange routing information with other routers. RIP Direction controls the sending and receiving of RIP packets. When set to Both or Out Only, the ZyXEL Device will broadcast its routing table periodically.
Chapter 12 RIP Click Advanced > Routing > RIP to open the following screen. Use this screen to change the ZyXEL Device’s RIP settings. Figure 57 Advanced Setup > Routing > RIP The following table describes the labels in this screen. Table 43 Advanced Setup > Routing > RIP 120 LABEL DESCRIPTION Global RIP Mode Use these fields to turn RIP on or off for the whole ZyXEL Device. When you disable RIP, the ZyXEL Device will not send any RIP packets and will ignore any RIP packets received.
CHAPTER 13 DNS Setup This chapter describes how to configure DNS settings. 13.1 DNS Server Address DNS (Domain Name System) maps a domain name to its corresponding IP address and vice versa. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. The DNS server addresses you enter when you set up DHCP are passed to the client machines along with the assigned IP address and subnet mask.
Chapter 13 DNS Setup 13.2 DNS Setup Click Advanced Setup > DNS > DNS Server to open the following screen. Figure 58 Advanced Setup > DNS > DNS Server The following table describes the fields in this screen. Table 44 Advanced Setup > DNS > DNS Server 122 LABEL DESCRIPTION Enable Automatic Assigned DNS Select this option to have the ZyXEL Device accept and use the first DNS server IP address it gets from a WAN connection.
CHAPTER 14 Dynamic DNS Setup This chapter discusses how to configure your ZyXEL Device to use Dynamic DNS. 14.1 Dynamic DNS Overview Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CUSeeMe, etc.). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.
Chapter 14 Dynamic DNS Setup 14.2 Dynamic DNS Click Advanced Setup > DNS > Dynamic DNS to open the following screen. Figure 59 Advanced Setup > DNS > Dynamic DNS The following table describes the fields in this screen. Table 45 Advanced Setup > DNS > Dynamic DNS 124 LABEL DESCRIPTION Host Name This is the domain name assigned to your ZyXEL Device by your Dynamic DNS provider. User Name This is the user name for the host name’s DDNS account.
Chapter 14 Dynamic DNS Setup 14.3 Configuring Dynamic DNS Click Advanced Setup > DNS > Dynamic DNS > Add to open the following screen. Figure 60 Advanced Setup > DNS > Dynamic DNS > Add The following table describes the fields in this screen. Table 46 Advanced Setup > DNS > Dynamic DNS > Add LABEL DESCRIPTION D-DNS Provider Select the name of your Dynamic DNS service provider. Host Name Type the domain name assigned to your ZyXEL Device by your dynamic DNS provider.
Chapter 14 Dynamic DNS Setup 126 P-663HN-51 User’s Guide
CHAPTER 15 DSL Setup This chapter explains how to configure ADSL port settings. 15.1 DSL Setup Click Advanced > DSL to open the following screen where you can configure the ZyXEL Device’s DSL settings.
Chapter 15 DSL Setup The following table describes the labels in this screen. Table 47 Advanced > DSL LABEL DESCRIPTION Select the modulation below Select the port’s ADSL operational mode. Select multiple modes to let the ZyXEL Device and the DSLAM automatically determine the mode to use. AnnexL (reach extended ADSL2) is an ADSL2+ mode that allows increased connection distances. AnnexM (double upstream mode) is an ADSL2+ mode that has the upstream connection use tones 6 to 63.
CHAPTER 16 Interface Group 16.1 Interface Groups Overview Interface Groups let you map ports to PVCs and create bridging groups. 16.2 Interface Groups Setup Click Advanced Setup > Interface Groups to open the following screen. Use this screen to map ports to PVCs and create bridging groups.
Chapter 16 Interface Group The following table describes the labels in this screen. Table 48 Advanced Setup > Interface Groups 130 LABEL DESCRIPTION Enable virtual ports on Select this option to treat the LAN ports as separate (virtual) interfaces. Group Name This is the name configured to identify the group. Remove To remove an entry, select its Remove check box and click the Save/ Apply button. Edit Click Edit to configure the group’s settings.
Chapter 16 Interface Group 16.3 Adding an Interface Group Click Advanced Setup > Interface Groups > Add to open the following screen. Use this screen to map ports to PVCs and create bridging groups. Figure 63 Advanced Setup > Interface Groups > Add The following table describes the labels in this screen. Table 49 Advanced Setup > Interface Groups > Add LABEL DESCRIPTION Group Name Configure a name to identify the group. Grouped Interfaces Select interfaces to add to the group.
Chapter 16 Interface Group Table 49 Advanced Setup > Interface Groups > Add (continued) 132 LABEL DESCRIPTION Automatically Add Clients With the following DHCP Vendor IDs If you want LAN clients to get public IP addresses, you can list their DHCP vendor IDs here. Save/Apply Click this button to save the changes and have the ZyXEL Device start using them.
CHAPTER 17 Certificates 17.1 Overview This chapter describes how your ZyXEL Device can use certificates as a means of authenticating wireless clients. It gives background information about public-key certificates and explains how to use them. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 17 Certificates Certificate File Formats The certification authority certificate that you want to import has to be in one of these file formats: • Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates. • PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.
Chapter 17 Certificates The following table describes the labels in this screen. Table 50 Trusted CAs LABEL DESCRIPTION Name This field displays the name used to identify this certificate. Subject This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Chapter 17 Certificates 17.2.1 Trusted CA Details Use this screen to view in-depth information about the certification authority’s certificate. Click Advanced Setup > Certificate to open the Trusted CAs screen. Then click a certificate’s View button to open the details screen. Figure 66 Trusted CA Details The following table describes the labels in this screen. Table 51 Trusted CA Details 136 LABEL DESCRIPTION Name This field displays the identifying name of this certificate.
Chapter 17 Certificates 17.2.2 Trusted CA Import Click Advanced Setup > Certificate to open the Trusted CA screen and then click Import Certificate to open the following screen. Use this screen to save a trusted certification authority’s certificate to the ZyXEL Device. Note: You must remove any spaces from the certificate’s filename before you can import the certificate. Figure 67 Trusted CA Import The following table describes the labels in this screen.
Chapter 17 Certificates 17.3.1 Certificates Overview The ZyXEL Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
Chapter 17 Certificates 17.3.2 Private-Public Certificates When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure. These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it should look.
Chapter 17 Certificates 1 Browse to where you have the remote host’s certificate saved on your computer. 2 Make sure that the certificate has a “.cer” or “.crt” file name extension. Figure 68 Remote Host Certificates 3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.
CHAPTER 18 Wireless LAN 18.1 Overview This chapter describes how to perform tasks related to setting up and optimizing your wireless network, including the following. • Turning the wireless connection on or off. • Configuring a name, wireless channel and security for the network. • Using WiFi Protected Setup (WPS) to configure your wireless network. • Using a MAC (Media Access Control) address filter to restrict access to the wireless network. See Section 18.
Chapter 18 Wireless LAN You don’t necessarily need to use all these screens to set up your wireless connection. For example, you may just want to set up a network name, a wireless radio channel and some security in the General screen. 18.2 What You Need to Know Wireless Basics “Wireless” is essentially radio communication. In the same way that walkie-talkie radios send and receive information over the airwaves, wireless networking devices exchange information with one another.
Chapter 18 Wireless LAN Radio Channels In the radio spectrum, there are certain frequency bands allocated for unlicensed, civilian use. For the purposes of wireless networking, these bands are divided into numerous channels. This allows a variety of networks to exist in the same place without interfering with one another. When you create a network, you must select a channel to use. Since the available unlicensed spectrum varies from one country to another, the number of available channels also varies.
Chapter 18 Wireless LAN mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point (which you know was made in 1971) you could use “70dodchal71vanpoi” as your security key. Signal Problems Because wireless networks are radio networks, their signals are subject to limitations of distance, interference and absorption. Problems with distance occur when the two radios are too far apart. Problems with interference occur when other radio waves interrupt the data signal.
Chapter 18 Wireless LAN Note: If you have a wireless connection to the ZyXEL Device and you change the ZyXEL Device’s SSID or country settings, you will lose your wireless connection when you click Save/Apply. You must then change your wireless client’s settings to match the ZyXEL Device’s new settings. Figure 70 Wireless > Basic The following table describes the labels in this screen. Table 53 Wireless > Basic LABEL DESCRIPTION Enable Wireless Select this to turn on the wireless LAN.
Chapter 18 Wireless LAN Table 53 Wireless > Basic LABEL DESCRIPTION SSID This is the name of the ZyXEL Device’s wireless network. The SSID (Service Set IDentity) identifies the service set with which a wireless device is associated. Wireless devices associating to the access point (AP) must have the same SSID. Enter a descriptive name (up to 32 printable 7bit ASCII characters) for the wireless LAN.
Chapter 18 Wireless LAN Table 53 Wireless > Basic LABEL DESCRIPTION BSSID This shows the MAC address of the wireless interface on the ZyXEL Device when wireless LAN is enabled. Save/Apply Click this button to save the changes and have the ZyXEL Device start using them. 18.5 Wireless Security Click Wireless > Security to open the Wireless Security screen. Use this screen to configure wireless security settings.
Chapter 18 Wireless LAN Note: If you have a wireless connection to the ZyXEL Device and you change the ZyXEL Device’s security settings, you will lose your connection when you click Save/Apply. You must then change your wireless client’s settings to match the ZyXEL Device’s new settings. Figure 71 Wireless > Security The following table describes the labels in this screen.
Chapter 18 Wireless LAN Table 54 Wireless > Security LABEL DESCRIPTION Push Button Select this to use the PBC (Push Button Configuration) method to send the ZyXEL Device’s wireless settings to your wireless stations. Click Add Enrollee to start WPS-aware wireless station scanning and the wireless security information synchronization. Note: After you click Add Enrollee, you have 2 minutes to click a similar button in the wireless station’s utility.
Chapter 18 Wireless LAN Table 54 Wireless > Security LABEL DESCRIPTION Device PIN This shows the ZyXEL Device’s PIN (Personal Identification Number). Enter this PIN in the external registrar within two minutes of clicking Config AP. WSC Add External Registrar This is available when you set the WPS AP Mode to Configured. Click Start AddER to have an external registrar to authenticate wireless clients using WPS. See Section 18.10.5 on page 170 for how to use Windows Vista as an external registrar.
Chapter 18 Wireless LAN Table 54 Wireless > Security LABEL DESCRIPTION Network Re-auth Interval This field is available only with WPA2 network authentication. Specify how often wireless stations have to resend usernames and passwords in order to stay connected. Enter a time interval between 0 and 4294967295 seconds. 0 disables the re-authentication. Note: The re-authentication timer on the RADIUS server has priority over your setting here.
Chapter 18 Wireless LAN Table 54 Wireless > Security LABEL DESCRIPTION Network Key 1 to Key 4 These fields are required when you use WEP encryption. If you set the Encryption Strength field to characters (ASCII string) or 10 hexadecimal preceded by 0x for each key. If you set the Encryption Strength field to characters (ASCII string) or 26 hexadecimal preceded by 0x for each key.
Chapter 18 Wireless LAN The following table describes the labels in this screen. Table 55 Wireless LAN > MAC Filter LABEL DESCRIPTION Select SSID Select the wireless network for which you want to configure MAC filter settings. MAC Restrict Mode Define the filter action for the list of MAC addresses in the table below. Select Disabled to turn off MAC address filtering. Select Allow to permit access to the ZyXEL Device, MAC addresses not listed will be denied access to the ZyXEL Device.
Chapter 18 Wireless LAN 18.7 Wireless Bridge Screen The ZyXEL Device can wirelessly connect APs. This is also known as a Wireless Distribution System (WDS). In the following figure a wireless client connects to access point AP 1. AP 1 has no wired Internet connection, but it can establish a bridge link to access point AP 2, which has a wired Internet connection. This lets the notebook computer access the Internet through AP 2.
Chapter 18 Wireless LAN The following table describes the labels in this screen. Table 57 Wireless > Bridge LABEL DESCRIPTION AP Mode Select the operating mode for your ZyXEL Device. • • Access Point - The ZyXEL Device functions as a bridge and access point simultaneously. Bridge - The ZyXEL Device acts as a wireless network bridge and establishes wireless links with other APs. To disable wireless bridging, set the Bridge Restrict field to Enabled and do not list any remote bridge MAC addresses.
Chapter 18 Wireless LAN Note: If have a wireless connection to the ZyXEL Device and you change the ZyXEL Device’s wireless settings, you may lose your wireless connection when you click Save/Apply. You must then change your wireless client’s settings to match the ZyXEL Device’s new settings. Figure 76 Wireless LAN > Advanced Setup The following table describes the labels in this screen. Table 58 Wireless LAN > Advanced Setup 156 LABEL DESCRIPTION Band Select an operating band to use.
Chapter 18 Wireless LAN Table 58 Wireless LAN > Advanced Setup LABEL DESCRIPTION Auto Channel Timer If you set the channel to Auto, specify the interval in minutes for how often the ZyXEL Device scans for the best channel. Enter 0 to disable the periodical scan. 802.11n/EWC Select whether to enable (Auto) or disable (Disabled) the use of the wireless 802.11n modes defined by the Enhanced Wireless Consortium (EWC).
Chapter 18 Wireless LAN Table 58 Wireless LAN > Advanced Setup LABEL DESCRIPTION Fragmentation Threshold This is the maximum data fragment size that can be sent. Enter a value between 256 and 2432. RTS Threshold Use CTS/RTS to reduce data collisions on the wireless network if you have wireless clients that are associated with the same AP but out of range of one another. When enabled, a wireless client sends an RTS (Request To Send) and then waits for a CTS (Clear To Send) before it transmits.
Chapter 18 Wireless LAN Table 58 Wireless LAN > Advanced Setup LABEL DESCRIPTION WMM APSD When using WMM, enable APSD (Automatic Power Save Delivery) to have the ZyXEL Device manage radio usage to help increase battery life for battery-powered wireless clients. APSD uses a longer beacon interval when transmitting traffic that does not require a short packet exchange interval. For example, web browsing or using e-mail does not require a short packet exchange interval but Voice Over IP (VoIP) does.
Chapter 18 Wireless LAN 18.10 Technical Reference This section discusses wireless LANs in depth. For more information, see the appendix. 18.10.1 Wireless Network Overview The following figure provides an example of a wireless network. Figure 78 Example of a Wireless Network AP A B The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point (AP) to interact with the other devices (such as the printer) or with the Internet.
Chapter 18 Wireless LAN • Every device in the same wireless network must use security compatible with the AP. Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 18.10.2 Additional Wireless Terms The following table describes some wireless network terms and acronyms used in the ZyXEL Device’s Web Configurator.
Chapter 18 Wireless LAN This type of security is fairly weak, however, because there are ways for unauthorized wireless devices to get the SSID. In addition, unauthorized wireless devices can still see the information that is sent in the wireless network. 18.10.3.2 MAC Address Filter Every device that can use a wireless network has a unique identification number, called a MAC address.2 A MAC address is usually written using twelve hexadecimal characters3; for example, 00A0C5000002 or 00:A0:C5:00:00:02.
Chapter 18 Wireless LAN 18.10.3.4 Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. The types of encryption you can choose depend on the type of authentication. (See Section 18.10.3.3 on page 162 for information about this.
Chapter 18 Wireless LAN 18.10.4 WiFi Protected Setup Your ZyXEL Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Each WPS connection works between two devices. Both devices must support WPS (check each device’s documentation to make sure).
Chapter 18 Wireless LAN 18.10.4.2 PIN Configuration Each WPS-enabled device has its own PIN (Personal Identification Number). This may either be static (it cannot be changed) or dynamic (in some devices you can generate a new PIN by clicking on a button in the configuration interface).
Chapter 18 Wireless LAN The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 79 Example WPS Process: PIN Method ENROLLEE REGISTRAR WPS This device’s WPS PIN: 123456 WPS Enter WPS PIN from other device: WPS START WPS START WITHIN 2 MINUTES SECURE EAP TUNNEL SSID WPA(2)-PSK COMMUNICATION 18.10.4.3 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role.
Chapter 18 Wireless LAN The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point. Figure 80 How WPS works ACTIVATE WPS ACTIVATE WPS WITHIN 2 MINUTES WPS HANDSHAKE ENROLLEE REGISTRAR SECURE TUNNEL SECURITY INFO COMMUNICATION The roles of registrar and enrollee last only as long as the WPS setup process is active (two minutes). The next time you use WPS, a different device can be the registrar if necessary.
Chapter 18 Wireless LAN 18.10.4.4 Example WPS Network Setup This section shows how security settings are distributed in an example WPS setup. The following figure shows an example network. In step 1, both AP1 and Client 1 are unconfigured. When WPS is activated on both, they perform the handshake. In this example, AP1 is the registrar, and Client 1 is the enrollee. The registrar randomly generates the security information to set up the network, since it is unconfigured and has no existing information.
Chapter 18 Wireless LAN point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead. Figure 83 WPS: Example Network Step 3 EXISTING CONNECTION CLIENT 1 E N TIO EC N ON GC N I T XIS AP1 REGISTRAR CLIENT 2 SE CU RIT Y ENROLLEE INF O AP2 18.10.4.5 Limitations of WPS WPS has some limitations of which you should be aware. • WPS works in Infrastructure networks only (where an AP and a wireless client communicate).
Chapter 18 Wireless LAN • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network. This is because the registrar has no way of identifying the “correct” enrollee, and cannot differentiate between your enrollee and a rogue device. This is a possible way for a hacker to gain access to a network. You can easily check to see if this has happened.
P ART III Diagnostics and Management Diagnostics (173) Settings (175) Logs (179) SNMP (183) Time (189) Access Control (191) Update Software (197) Save/Reboot and Logout (199) 171
CHAPTER 19 Diagnostics These read-only screens display information to help you identify problems with the ZyXEL Device. 19.1 Diagnostics Click Diagnostics to open the screen shown next. Use this screen to test the ZyXEL Devices connections. The ENET connections appear as four separate connections when you enable virtual ports (see Chapter 16 on page 129), otherwise they appear as a single connection.
Chapter 19 Diagnostics 174 P-663HN-51 User’s Guide
CHAPTER 20 Settings This chapter describes how to manage your ZyXEL Device’s configuration. 20.1 Backup Configuration Using the Web Configurator Click Management > Settings > Backup to open the following screen. Use this screen to back up (save) the ZyXEL Device’s current configuration to a file on your computer. Once your ZyXEL Device is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
Chapter 20 Settings 20.2 Restore Configuration Using the Web Configurator Click Management > Settings > Update to open the following screen. Use this screen to upload a new or previously saved configuration file from your computer to your ZyXEL Device. Figure 86 Management > Settings > Update Table 62 Settings File Name Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the file you want to upload.
Chapter 20 Settings 20.3 Restoring Factory Defaults Click Management > Settings > Restore Default to open the following screen. Figure 88 Management > Settings > Restore Default Click Restore Default Settings to clear all user-entered configuration information and return the ZyXEL Device to its factory defaults. You can also press the RESET button on the rear panel to reset the factory defaults of your ZyXEL Device.
Chapter 20 Settings 178 P-663HN-51 User’s Guide
CHAPTER 21 Logs This chapter contains information about configuring general log settings and viewing the ZyXEL Device’s logs. Refer to the appendix for example log message explanations. 21.1 Logs Overview The web configurator allows you to choose which levels of events to have the ZyXEL Device log and then display the logs or have the ZyXEL Device send them to an administrator (as e-mail) or to a syslog server. 21.2 System Log Click Management > System Log to open the following screen.
Chapter 21 Logs 21.3 Viewing the System Log Click Management > System Log > View System Log to view the ZyXEL Device’s system logs. Figure 90 Management > System Log > View System Log The following table describes the fields in this screen. Table 63 Management > System Log > View System Log 180 LABEL DESCRIPTION Date/Time This field displays when the log was recorded. Facility This is the log’s category. Severity This is the event’s degree of seriousness.
Chapter 21 Logs 21.4 Configuring Log Settings Click Management > System Log > Configure System Log to display the following screen. Use this screen to configure the level of events to log and where to send logs. Figure 91 Management > System Log > Configure System Log The following table describes the fields in this screen. Table 64 Management > System Log > Configure System Log LABEL DESCRIPTION Log This controls whether or not the ZyXEL Device logs events.
Chapter 21 Logs 182 P-663HN-51 User’s Guide
CHAPTER 22 SNMP 22.1 SNMP Overview Simple Network Management Protocol is a protocol used for exchanging management information between network devices. SNMP is a member of TCP/IP protocol suite. A manager station can monitor the ZyXEL Device through the network via SNMP version one (SNMPv1) and/or SNMP version 2c. The next figure illustrates an SNMP management operation. SNMP is only available if TCP/IP is configured.
Chapter 22 SNMP through which network administrators perform network management functions. It executes applications that control and monitor managed devices. The managed devices contain object variables/managed objects that define each piece of information to be collected about a device. Examples of variables include such as number of packets received, node port status etc. A Management Information Base (MIB) is a collection of managed objects.
Chapter 22 SNMP 22.2 SNMP Screen To open this screen, click Advanced Application, Access Control, SNMP. Figure 93 SNMP The following table describes the labels in this screen. Table 66 SNMP LABEL DESCRIPTION SNMP Agent Enable the SNMP agent to turn on SNMP on the ZyXEL Device. Read Community Enter the get community, which is the password for the incoming Get- and GetNext- requests from the management station.
Chapter 22 SNMP 186 P-663HN-51 User’s Guide
CHAPTER 23 TR-069 Client 23.1 TR-069 Client Screen TR-069 is a protocol that defines how your ZyXEL Device can be managed via a management server such as ZyXEL’s Vantage CNM Access. An administrator can use an Auto Configuration Server (ACS) to remotely set up the ZyXEL device, modify settings, perform firmware upgrades as well as monitor and diagnose the ZyXEL device. All you have to do is enable the device to be managed by an ACS and specify the ACS IP address or domain name and username and password.
Chapter 23 TR-069 Client The following table describes the fields in this screen. Table 67 Management > TR-069 Client 188 LABEL DESCRIPTION Inform Select whether to Enable or Disable CPE WAN Management Protocol (CWMP) operation. Inform Interval The interval between the device’s attempt to connect to the Auto Configuration Server (ACS) to send information and check for configuration updates. ACS URL Enter the address of the ACS. ACS User Name Enter the username for the ACS.
CHAPTER 24 Time This chapter covers how to set the time in the ZyXEL Device. 24.1 Time Setup Click Management > Internet Time to open the following screen. Use this screen to configure how the ZyXEL Device synchronizes its internal clock with a time server on the Internet. Figure 95 Management > Internet Time The following table describes the labels in this screen.
Chapter 24 Time Table 68 Management > Internet Time (continued) 190 LABEL DESCRIPTION Time Zone Choose the time zone of your location. This sets the time difference between your time zone and Greenwich Mean Time (GMT). Save/Apply Click this button to save the changes and have the ZyXEL Device start using them.
CHAPTER 25 Access Control This chapter describes how to configure access control. 25.1 Access Control Screen Use the access control screens to enable or disable service access to the ZyXEL Device. 25.2 Service Access Control Screen To open this screen, click Management > Access Control > Services.
Chapter 25 Access Control The following table describes the labels in this screen. Table 69 Management > Access Control > Services LABEL DESCRIPTION Services Services you may use to access the ZyXEL Device are listed here. LAN Select the Enable check boxes for the corresponding services that you want to allow to access the ZyXEL Device from the LAN. WAN Select the Enable check boxes for the corresponding services that you want to allow to access the ZyXEL Device from the WAN.
Chapter 25 Access Control Table 70 Management > Access Control > IP Addresses (continued) LABEL DESCRIPTION Remove To remove an entry, select its Remove check box and click the Remove button. Add Click this button to go to a screen where you can configure settings for a new trusted IP address. 25.4 Adding IP Addresses Use this screen to add IP addresses of trusted computers that may manage the ZyXEL Device. To open this screen, click Management > Access Control > IP Addresses > Add.
Chapter 25 Access Control Note: The “support” user name and password for ISP technician login only works through the DSL connection. Figure 99 Management > Access Control > Passwords The following table describes the labels in this screen. Table 72 Management > Access Control > Passwords LABEL DESCRIPTION Username Select the user name for which you want to configure the password. The admin or user account can only access the ZyXEL Device from the LAN.
Chapter 25 Access Control 25.6 Authentication Click Management > Access Control > Authentication to open the following screen. Use this screen to set whether or not users must enter a user name and password to access the ZyXEL Device’s system information summary page. Figure 100 Management > Access Control > Authentication The following table describes the labels in this screen.
Chapter 25 Access Control 196 P-663HN-51 User’s Guide
CHAPTER 26 Update Software This chapter covers upgrading the ZyXEL Device’s firmware. 26.1 Uploading Firmware The software embedded in the ZyXEL Device is called “firmware”. Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a .bin extension, for example, "ZyXEL Device.bin". The upload process described here may take up to two minutes. After a successful upload, the system will reboot. Only use firmware for your device’s specific model.
Chapter 26 Update Software The following table describes the labels in this screen. Table 74 Management > Update Software LABEL DESCRIPTION Software File name Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse... Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Update Software Click Upload to begin the upload process.
CHAPTER 27 Save/Reboot and Logout This chapter covers the save and reboot screen. 27.1 Save/Reboot Click Management > Save/Reboot to open the following screen. Click Save/ Reboot to save all of your ZyXEL Device’s settings and reboot the without turning the power off. Figure 103 Management > Save/Reboot 27.2 Logout Click Management > Logout to exit the web configurator.
Chapter 27 Save/Reboot and Logout 200 P-663HN-51 User’s Guide
P ART IV Troubleshooting and Specifications Troubleshooting (203) Product Specifications (207) 201
CHAPTER 28 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • ZyXEL Device Access and Login • Internet Access 28.1 Power, Hardware Connections, and LEDs The ZyXEL Device does not turn on. None of the LEDs turn on. 1 Make sure the ZyXEL Device is turned on. 2 Make sure you are using the power adaptor or cord included with the ZyXEL Device.
Chapter 28 Troubleshooting 2 Check the hardware connections. See Section 1.4 on page 23. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Turn the ZyXEL Device off and on. 5 If the problem continues, contact the vendor. 28.2 ZyXEL Device Access and Login I forgot the IP address for the ZyXEL Device. 1 The default IP address is 192.168.1.1.
Chapter 28 Troubleshooting • If you changed the IP address (Section 6.2.1 on page 76), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I forgot the IP address for the ZyXEL Device. 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See Section 1.4 on page 23 and Section 1.5 on page 25. 3 Make sure your Internet browser does not block pop-up windows. See Appendix C on page 201.
Chapter 28 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See Section 1.4 on page 23 and Section 1.5 on page 25. 2 If your ISP gave you Internet connection information, make sure you entered it correctly in the Network > WAN > Internet Connection screen. These fields are case-sensitive, so make sure [Caps Lock] is not on. 3 Disconnect all the cables from your device, and follow the directions in Section 1.4 on page 23 again.
CHAPTER 29 Product Specifications The following tables summarize the ZyXEL Device’s hardware and firmware features. Table 75 Device Specifications Dimensions (W x D x H) 255 x 165 x 63 mm Power Specification 12 VDC 1.5 A Built-in Switch Four auto-negotiating, auto MDI/MDI-X (auto-crossover) 10/ 100 Mbps RJ-45 Ethernet ports Reset Button The reset button is built into the rear panel. Use this button to restore the ZyXEL Device to its factory default settings.
Chapter 29 Product Specifications Table 76 Firmware Specifications FEATURE DESCRIPTION ADSL Standards Multi-Mode standard (ANSI T1.413,Issue 2; G.dmt(G.992.1); G.lite(G992.2)). ADSL2 G.dmt.bis (G.992.3) ADSL2 G.lite.bis (G.992.4) ADSL2+ (G.992.
Chapter 29 Product Specifications Table 76 Firmware Specifications FEATURE DESCRIPTION Wireless Functionality Allows IEEE 802.11n, IEEE 802.11g and/or IEEE 802.11b wireless clients to connect to the ZyXEL Device wirelessly. Enable wireless security (WPA(2)-PSK) and/or MAC filtering to protect your wireless network. Note: The ZyXEL Device may be prone to RF (Radio Frequency) interference from other 2.
Chapter 29 Product Specifications Table 76 Firmware Specifications FEATURE DESCRIPTION IP Multicast IP multicast is used to send traffic to a specific group of computers. The ZyXEL Device supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236). Time and Date Get the current time and date from an external server when you turn on your ZyXEL Device. These dates and times are then used in logs.
Chapter 29 Product Specifications Table 77 Standards Supported STANDARD DESCRIPTION RFC 868 Time Protocol RFC 1305 Network Time Protocol (Version 3) Specification, Implementation RFC 1334 (PAP) PPP Authentication Protocols RFC 1994 (CHAP) PPP Challenge Handshake Authentication Protocol RFC 1332 (IPCP) The PPP Internet Protocol Control Protocol RFC 1058 (RIP-1) Routing Information Protocol RFC 1723 (RIP-2) RIP Version 2 - Carrying Additional Information RFC 1631 (NAT) IP Network Address Tra
Chapter 29 Product Specifications 29.2 Power Adaptor Specifications Table 78 North American Plug Standards 212 AC POWER ADAPTOR MODEL 12V 1.5 A Switching Power Adapter INPUT POWER 100-240 VAC, 50/60 HZ, 0.5 A OUTPUT POWER 12 VDC, 1.5 A POWER CONSUMPTION 18 W MAX. SAFETY STANDARDS UL, CUL (UL 60950-1 FIRST EDITION CSA C22.2 NO. 60950-1-03 1ST.
P ART V Appendices and Index Setting Up Your Computer’s IP Address (215) IP Addresses and Subnetting (251) Pop-up Windows (201) Common Services (279) Legal Information (289) Customer Support (25) Index (293) 213
APPENDIX A Setting Up Your Computer’s IP Address Note: Your specific ZyXEL device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix A Setting Up Your Computer’s IP Address 1 Click Start > Control Panel. Figure 105 Windows XP: Start Menu 2 In the Control Panel, click the Network Connections icon.
Appendix A Setting Up Your Computer’s IP Address 3 Right-click Local Area Connection and then select Properties. Figure 107 Windows XP: Control Panel > Network Connections > Properties 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. Figure 109 Windows XP: Internet Protocol (TCP/IP) Properties 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix A Setting Up Your Computer’s IP Address 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel.
Appendix A Setting Up Your Computer’s IP Address 3 Click the Network and Sharing Center icon. Figure 112 Windows Vista: Network And Internet 4 Click Manage network connections. Figure 113 Windows Vista: Network and Sharing Center 5 Right-click Local Area Connection and then select Properties. Figure 114 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix A Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix A Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 116 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
Appendix A Setting Up Your Computer’s IP Address 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences. Figure 117 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address 2 In the System Preferences window, click the Network icon. Figure 118 Mac OS X 10.4: System Preferences 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 119 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 120 Mac OS X 10.4: Network Preferences > TCP/IP Tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask.
Appendix A Setting Up Your Computer’s IP Address • In the Router field, type the IP address of your device. Figure 121 Mac OS X 10.4: Network Preferences > Ethernet 6 Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 122 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address Mac OS X: 10.5 The screens in this section are from Mac OS X 10.5. 1 Click Apple > System Preferences. Figure 123 Mac OS X 10.5: Apple Menu 2 In System Preferences, click the Network icon. Figure 124 Mac OS X 10.
Appendix A Setting Up Your Computer’s IP Address 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 125 Mac OS X 10.5: Network Preferences > Ethernet 4 From the Configure list, select Using DHCP for dynamically assigned settings. 5 For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask.
Appendix A Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your ZyXEL Device. Figure 126 Mac OS X 10.5: Network Preferences > Ethernet 6 Click Apply and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 127 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix A Setting Up Your Computer’s IP Address 1 Click System > Administration > Network. Figure 128 Ubuntu 8: System > Administration Menu 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
Appendix A Setting Up Your Computer’s IP Address 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 130 Ubuntu 8: Administrator Account Authentication 4 In the Network Settings window, select the connection that you want to configure, then click Properties.
Appendix A Setting Up Your Computer’s IP Address 5 The Properties dialog box opens. Figure 132 Ubuntu 8: Network Settings > Properties • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. 6 Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen.
Appendix A Setting Up Your Computer’s IP Address 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 133 Ubuntu 8: Network Settings > DNS 8 Click the Close button to apply the changes.
Appendix A Setting Up Your Computer’s IP Address tab. The Interface Statistics column shows data if your connection is working properly. Figure 134 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
Appendix A Setting Up Your Computer’s IP Address 1 Click K Menu > Computer > Administrator Settings (YaST). Figure 135 openSUSE 10.3: K Menu > Computer Menu 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 136 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 137 openSUSE 10.3: YaST Control Center 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 138 openSUSE 10.
Appendix A Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 139 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 238 Click Next to save the changes and close the Network Card Setup window.
Appendix A Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 140 openSUSE 10.3: Network Settings 9 Click Finish to save your settings and close the window.
Appendix A Setting Up Your Computer’s IP Address Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 141 openSUSE 10.3: KNetwork Manager When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
APPENDIX B Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 144 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 145 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 146 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 147 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 148 Security Settings - Java Scripting Java Permissions 246 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 149 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 150 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 250 P-663HN-51 User’s Guide
APPENDIX C IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 153 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix C IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
Appendix C IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128.
Appendix C IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 154 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25.
Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 155 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix C IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 83 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.
Appendix C IP Addresses and Subnetting Table 86 Subnet 4 (continued) LAST OCTET BIT VALUE IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix C IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 89 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 2046 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.
Appendix C IP Addresses and Subnetting address that you entered. You don't need to change the subnet mask computed by the ZyXEL Device unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
Appendix C IP Addresses and Subnetting address to computer A or setting computer A to obtain an IP address automatically. Figure 156 Conflicting Computer IP Addresses Example Conflicting Router IP Addresses Example Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s LAN and WAN addresses must be on different subnets.
Appendix C IP Addresses and Subnetting The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
APPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 160 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 161 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix D Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 162 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix D Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix D Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 90 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.
Appendix D Wireless LANs IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: • User based identification that allows for roaming.
Appendix D Wireless LANs • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: • Accounting-Request Sent by the access point requesting accounting.
Appendix D Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 authentication method does not support data encryption with dynamic session key.
Appendix D Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
Appendix D Wireless LANs If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x.
Appendix D Wireless LANs keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
Appendix D Wireless LANs 4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. Figure 163 WPA(2) with RADIUS Application Example WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows.
Appendix D Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 164 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix D Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.
Appendix D Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points. • Directional antennas concentrate the RF signal in a beam, like a flashlight does with the light from its bulb.
APPENDIX E Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix E Common Services Table 94 Commonly Used Services (continued) 280 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix E Common Services Table 94 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix E Common Services Table 94 Commonly Used Services (continued) 282 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX F Open Software Announcements End-User License Agreement for "P-663HN-51" Note: WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL, INC.
Appendix F Open Software Announcements 3.Copyright The Software and Documentation contain material that is protected by United States Copyright Law and trade secret law, and by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4.
Appendix F Open Software Announcements 5.Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information.
Appendix F Open Software Announcements NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8.Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME.
Appendix F Open Software Announcements exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan. This License Agreement shall constitute the entire Agreement between the parties hereto. This License Agreement, the rights granted hereunder, the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL.
Appendix F Open Software Announcements 288 P-663HN-51 User’s Guide
APPENDIX G Legal Information Copyright Copyright © 2009 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix G Legal Information • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
Appendix G Legal Information 受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。 本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。 減少電磁波影響,請妥適使用。 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003.
Appendix G Legal Information implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped.
Index Index Numerics BSS 263 10/100 Mbps 207 C A CA 133, 271 trusted 134, 136 access control 191 adding IP addresses 193 IP addresses 192 passwords 193 services 191 Certificate Authority See CA. ADSL setup 127 ADSL standards 208 ADSL synchronization test 173 Advanced Encryption Standard See AES.
Index default LAN IP address 27 Extended Service Set, See ESS 264 device management 23 device model number 197 DHCP 48, 76, 208 static 82 F DHCP vendor IDs 132 FCC interference statement 289 diagnostics 173 DiffServ (Differentiated Services) 104 filename extension 197 DiffServ Code Point (DSCP) 104 filtering 93, 95 DiffServ marking rule 105 firewall 209 dimensions 207 DMZ host 90 firmware 21, 197 upgrade 197 upload 197 DNS 121 fragmentation threshold 267 disclaimer 289 domain name system se
Index Internet access 22 Internet access blocking 99 Internet Assigned Numbers Authority See IANA 260 see IANA 77 Internet Group Management Protocol see IGMP Internet time 189 IP address 76, 207 IP addresses access control 192 adding in access control 193 IP filtering 93, 95 IP precedence 104 VC-based 53, 60 Multiprotocol Encapsulation 59 N nailed-up connection 61 NAT 76, 83, 84, 90, 209, 259 DMZ host 90 port triggering 87 virtual servers 83 NAT traversal 78 navigating the web configurator 30 Network Addr
Index PPP 208 PPP session over Ethernet (PPP over Ethernet, RFC 2516) 59 preamble mode 267 product registration 292 version 119 RJ-45 ports 207 Routing Information Protocol. See RIP.
Index ToS (Type of Service) 104 trademarks 289 traffic shaping 54 trigger port forwarding 87 trusted CA 134, 136 importing 135 note 291 WDS example 154 web configurator 27, 30 screen summary 30 WEP encryption 150 Wide Area Network see WAN U unicast 70 upgrading firmware 197 uploading firmware 197 UPnP 78 application 78 security issues 79 user names 207 V VC 53 permanent virtual circuit see PVC Wi-Fi Protected Access 272 wireless client WPA supplicants 274 wireless LAN WDS example 154 wireless security 2
Index 298 P-663HN-51 User’s Guide