Chapter 14 MON Profile Table 64 Configuration > Object > MON Profile (continued) LABEL DESCRIPTION Object Reference Click this to view which other objects are linked to the selected monitor mode profile (for example, an AP management profile). # This field is a sequential value, and it is not associated with a specific profile. Status This field shows whether or not the entry is activated. Profile Name This field indicates the name assigned to the monitor profile. 14.2.
Chapter 14 MON Profile The following table describes the labels in this screen. Table 65 Configuration > Object > MON Profile > Add/Edit MON Profile LABEL DESCRIPTION Activate Select this to activate this monitor mode profile. Profile Name This field indicates the name assigned to the monitor mode profile. Channel dwell time Enter the interval (in milliseconds) before the Zyxel Device switches to another channel for monitoring.
C H A P T E R 15 WDS Profile 15.1 Overview This chapter shows you how to configure WDS (Wireless Distribution System) profiles for the Zyxel Device to form a WDS with other APs. 15.1.1 What You Can Do in this Chapter The WDS Profile screen (Section 15.2 on page 153) creates preset WDS configurations that can be used by the Zyxel Device. 15.2 WDS Profile This screen allows you to manage and create WDS profiles that can be used by the APs. To access this screen, click Configuration > Object > WDS Profile.
Chapter 15 WDS Profile 15.2.1 Add/Edit WDS Profile This screen allows you to create a new WDS profile or edit an existing one. To access this screen, click the Add button or select and existing profile and click the Edit button. Figure 93 Configuration > Object > WDS Profile > Add/Edit WDS Profile The following table describes the labels in this screen.
C H A P T E R 16 Certificates 16.1 Overview The Zyxel Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication. 16.1.1 What You Can Do in this Chapter • The My Certificates screens (Section 16.
Chapter 16 Certificates 5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny’s public key to verify the message. The Zyxel Device uses certificates based on public-key cryptology to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection.
Chapter 16 Certificates • Binary PKCS#12: This is a format for transferring public key and private key certificates.The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the Zyxel Device. Note: Be careful not to convert a binary file to text during the transfer process.
Chapter 16 Certificates 16.2 My Certificates Click Configuration > Object > Certificate > My Certificates to open this screen. This is the Zyxel Device’s summary list of certificates and certification requests. Figure 94 Configuration > Object > Certificate > My Certificates The following table describes the labels in this screen.
Chapter 16 Certificates Table 68 Configuration > Object > Certificate > My Certificates (continued) LABEL DESCRIPTION Issuer This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. Valid From This field displays the date that the certificate becomes applicable.
Chapter 16 Certificates The following table describes the labels in this screen. Table 69 Configuration > Object > Certificate > My Certificates > Add LABEL DESCRIPTION Name Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Subject Information Use these fields to record information that identifies the owner of the certificate.
Chapter 16 Certificates Table 69 Configuration > Object > Certificate > My Certificates > Add (continued) LABEL DESCRIPTION Create a certification request and enroll for a certificate immediately online Select this to have the Zyxel Device generate a request for a certificate and apply to a certification authority for a certificate. You must have the certification authority’s certificate already imported in the Trusted Certificates screen.
Chapter 16 Certificates Figure 96 Configuration > Object > Certificate > My Certificates > Edit NWA/WAC/WAX Series User’s Guide 162
Chapter 16 Certificates The following table describes the labels in this screen. Table 70 Configuration > Object > Certificate > My Certificates > Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. Certification Path This field displays for a certificate, not a certification request.
Chapter 16 Certificates Table 70 Configuration > Object > Certificate > My Certificates > Edit LABEL DESCRIPTION MD5 Fingerprint This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm. SHA1 Fingerprint This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm. Certificate in PEM (Base-64) Encoded Format This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format.
Chapter 16 Certificates Figure 97 Configuration > Object > Certificate > My Certificates > Import The following table describes the labels in this screen. Table 71 Configuration > Object > Certificate > My Certificates > Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device.
Chapter 16 Certificates Figure 98 Configuration > Object > Certificate > Trusted Certificates The following table describes the labels in this screen. Table 72 Configuration > Object > Certificate > Trusted Certificates LABEL DESCRIPTION PKI Storage Space in Use This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Chapter 16 Certificates certification authority’s list of revoked certificates before trusting a certificate issued by the certification authority.
Chapter 16 Certificates The following table describes the labels in this screen. Table 73 Configuration > Object > Certificate > Trusted Certificates > Edit LABEL DESCRIPTION Name This field displays the identifying name of this certificate. You can change the name. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Chapter 16 Certificates Table 73 Configuration > Object > Certificate > Trusted Certificates > Edit (continued) LABEL DESCRIPTION Valid From This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable. Valid To This field displays the date that the certificate expires.
Chapter 16 Certificates Figure 100 Configuration > Object > Certificate > Trusted Certificates > Import The following table describes the labels in this screen. Table 74 Configuration > Object > Certificate > Trusted Certificates > Import LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device.
C H A P T E R 17 System 17.1 Overview Use the system screens to configure general Zyxel Device settings. 17.1.1 What You Can Do in this Chapter • The Host Name screen (Section 17.2 on page 171) configures a unique name for the Zyxel Device in your network. • The Power Mode screen (Section 17.3 on page 172) configures the Zyxel Device’s power settings. • The Date/Time screen (Section 17.4 on page 173) configures the date and time for the Zyxel Device. • The WWW screens (Section 17.
Chapter 17 System The following table describes the labels in this screen. Table 75 Configuration > System > Host Name LABEL DESCRIPTION System Name Choose a descriptive name to identify your Zyxel Device device. This name can be up to 64 alphanumeric characters long. Spaces are not allowed, but dashes (-) underscores (_) and periods (.) are accepted. System Location Specify the name of the place where the Zyxel Device is located.
Chapter 17 System 17.4 Date and Time For effective scheduling and logging, the Zyxel Device system time must be accurate. The Zyxel Device has a software mechanism to set the time manually or get the current time and date from an external server. To change your Zyxel Device’s time based on your local time zone and date, click Configuration > System > Date/Time. The screen displays as shown.
Chapter 17 System Table 77 Configuration > System > Date/Time (continued) LABEL DESCRIPTION New Date (yyyy-mm-dd) This field displays the last updated date from the time server or the last date configured manually. When you set Time and Date Setup to Manual, enter the new date in this field and then click Apply. Get from Time Server Select this radio button to have the Zyxel Device get the time and date from the time server you specify below.
Chapter 17 System 17.4.1 Pre-defined NTP Time Servers List When you turn on the Zyxel Device for the first time, the date and time start at 2003-01-01 00:00:00. The Zyxel Device then attempts to synchronize with one of the following pre-defined list of Network Time Protocol (NTP) time servers. The Zyxel Device continues to use the following pre-defined list of NTP time servers if you do not specify a time server or it cannot synchronize with the time server you specified. Table 78 Default Time Servers 0.
Chapter 17 System To get the Zyxel Device date and time from a time server: 1 Click System > Date/Time. 2 Select Get from Time Server under Time and Date Setup. 3 Under Time Zone Setup, select your Time Zone from the list. 4 Under Time and Date Setup, enter a Time Server Address. 5 Click Apply. 17.5 WWW Overview The following figure shows secure and insecure management of the Zyxel Device coming in from the WAN. HTTPS and SSH access are secure.
Chapter 17 System 17.5.3 HTTPS You can set the Zyxel Device to use HTTP or HTTPS (HTTPS adds security) for Web Configurator sessions. HTTPS (HyperText Transfer Protocol over Secure Socket Layer, or HTTP over SSL) is a web protocol that encrypts and decrypts web pages.
Chapter 17 System Figure 107 Configuration > System > WWW > Service Control The following table describes the labels in this screen. Table 79 Configuration > System > WWW > Service Control LABEL DESCRIPTION HTTPS Enable Select the check box to allow or disallow the computer with the IP address that matches the IP address(es) in the Service Control table to access the Zyxel Device Web Configurator using secure HTTPs connections. Server Port The HTTPS server listens on port 443 by default.
Chapter 17 System 17.5.5.1 Google Chrome Warning Messages When you attempt to access the Zyxel Device HTTPS server, you will see the error message shown in the following screen. Figure 108 Security Alert Dialog Box (Google Chrome) Select Advanced > Proceed to 192.168.1.2 (unsafe) to proceed to the Web Configurator login screen. 17.5.5.2 Mozilla Firefox Warning Messages When you attempt to access the Zyxel Device HTTPS server, a Warning screen appears as shown in the following screen. Click Learn More...
Chapter 17 System Figure 109 Security Certificate 1 (Firefox) 17.5.5.3 Avoiding Browser Warning Messages Here are the main reasons your browser displays warnings about the Zyxel Device’s HTTPS server certificate and what you can do to avoid seeing the warnings: • The issuing certificate authority of the Zyxel Device’s HTTPS server certificate is not one of the browser’s trusted certificate authorities.
Chapter 17 System Figure 110 Trusted Certificates The CA sends you a package containing the CA’s trusted certificate(s), your personal certificate(s) and a password to install the personal certificate(s). 17.5.5.5 Installing a Personal Certificate You need a password in advance. The CA may issue the password or you may have to specify it during the enrollment. Double-click the personal certificate given to you by the CA to produce a screen similar to the one shown next. 1 Click Next to begin the wizard.
Chapter 17 System 3 Enter the password given to you by the CA. 4 Have the wizard determine where the certificate should be saved on your computer or select Place all certificates in the following store and choose a different location.
Chapter 17 System 5 Click Finish to complete the wizard and begin the import process. 6 You should see the following screen when the certificate is correctly installed on your computer. 17.5.5.
Chapter 17 System 1 Enter ‘https://Zyxel Device IP Address/’ in your browser’s web address field. 2 When Authenticate Client Certificates is selected on the Zyxel Device, the following screen asks you to select a personal certificate to send to the Zyxel Device. This screen displays even if you only have a single certificate as in the example. 3 You next see the Web Configurator login screen. 17.6 SSH You can use SSH (Secure SHell) to securely access the Zyxel Device’s command line interface.
Chapter 17 System 17.6.1 How SSH Works The following figure is an example of how a secure connection is established between two remote hosts using SSH v1. Figure 112 How SSH v1 Works Example 1 Host Identification The SSH client sends a connection request to the SSH server. The server identifies itself with a host key. The client encrypts a randomly generated session key with the host key and server key and sends the result back to the server. The client automatically saves any new server public keys.
Chapter 17 System 17.6.2 SSH Implementation on the Zyxel Device Your Zyxel Device supports SSH versions 1 and 2 using RSA authentication and four encryption methods (AES, 3DES, Archfour, and Blowfish). The SSH server is implemented on the Zyxel Device for management using port 22 (by default). 17.6.3 Requirements for Using SSH You must install an SSH client program on a client computer (Windows or Linux operating system) that is used to connect to the Zyxel Device over SSH. 17.6.
Chapter 17 System 17.6.5 Examples of Secure Telnet Using SSH This section shows two examples using a command interface and a graphical interface SSH client program to remotely access the Zyxel Device. The configuration and connection steps are similar for most SSH client programs. Refer to your SSH client program user’s guide. 17.6.5.1 Example 1: Microsoft Windows This section describes how to access the Zyxel Device using the Secure Shell Client program.
Chapter 17 System Figure 115 SSH Example 2: Test $ telnet 192.168.1.2 22 Trying 192.168.1.2... Connected to 192.168.1.2. Escape character is '^]'. SSH-1.5-1.0.0 2 Enter “ssh –2 192.168.1.2”. This command forces your computer to connect to the Zyxel Device using SSH version 1. If this is the first time you are connecting to the Zyxel Device using SSH, a message displays prompting you to save the host information of the Zyxel Device. Type “yes” and press [ENTER].
Chapter 17 System Table 81 Configuration > System > TELNET (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the Zyxel Device. Reset Click Reset to return the screen to its last-saved settings. 17.8 FTP You can upload and download the Zyxel Device’s firmware and configuration files using FTP. To use this feature, your computer must have an FTP client. See Chapter 19 on page 206 for more information about firmware and configuration files.
Chapter 17 System 17.9 SNMP Simple Network Management Protocol is a protocol used for exchanging management information between network devices. Your Zyxel Device supports SNMP agent functionality, which allows a manager station to manage and monitor the Zyxel Device through the network. The Zyxel Device supports SNMP version one (SNMPv1), version two (SNMPv2c), and version three (SNMPv3). The next figure illustrates an SNMP management operation.
Chapter 17 System • Trap - Used by the agent to inform the manager of some events. 17.9.1 Supported MIBs The Zyxel Device supports MIB II that is defined in RFC-1213 and RFC-1215. The Zyxel Device also supports private MIBs (ZYXEL-ES-CAPWAP.MIB, ZYXEL-ES-COMMON.MIB, ZYXEL-ES-ZyXELAPMgmt.MIB, ZYXEL-ESPROWLAN.MIB, ZYXEL-ES-RFMGMT.MIB, ZYXEL-ES-SMI.MIB, and ZYXEL-ES-WIRELESS.MIB) to collect information about CPU and memory usage and VPN total throughput.
Chapter 17 System The following table describes the labels in this screen. Table 84 Configuration > System > SNMP LABEL DESCRIPTION Enable Select the check box to allow or disallow users to access the Zyxel Device using SNMP. Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Trap Community Type the trap community, which is the password sent with each trap to the SNMP manager.
Chapter 17 System Figure 121 Configuration > System > SNMP > Add The following table describes the labels in this screen. Table 85 Configuration > System > SNMP LABEL DESCRIPTION User Name Select the user name of the user account for which this SNMPv3 user profile is configured. Authentication Select the type of authentication the SNMPv3 user must use to connect to the Zyxel Device using this SNMPv3 user profile. Select MD5 to require the SNMPv3 user’s password be encrypted by MD5 for authentication.
C H A P T E R 18 Log and Report 18.1 Overview Use the system screens to configure daily reporting and log settings. 18.1.1 What You Can Do In this Chapter • The Email Daily Report screen (Section 18.2 on page 194) configures how and where to send daily reports and what reports to send. • The Log Setting screens (Section 18.3 on page 196) specify which logs are e-mailed, where they are emailed, and how often they are e-mailed. 18.
Chapter 18 Log and Report Figure 122 Configuration > Log & Report > Email Daily Report The following table describes the labels in this screen. Table 86 Configuration > Log & Report > Email Daily Report LABEL DESCRIPTION Enable Email Daily Report Select this to send reports by e-mail every day. Mail Server Type the name or IP address of the outgoing SMTP server.
Chapter 18 Log and Report Table 86 Configuration > Log & Report > Email Daily Report (continued) LABEL DESCRIPTION SSL/TLS Encryption Select SSL/TLS to use Secure Sockets Layer (SSL) or Transport Layer Security (TLS) if you want encrypted communications between the mail server and the Zyxel Device. Select STARTTLS to upgrade a plain text connection to a secure connection using SSL/TLS. Select No to not encrypt the communications.
Chapter 18 Log and Report Alternatively, if you want to edit what events is included in each log, you can also use the Active Log Summary screen to edit this information for all logs at the same time. 18.3.1 Log Setting Screen To access this screen, click Configuration > Log & Report > Log Setting. Figure 123 Configuration > Log & Report > Log Setting The following table describes the labels in this screen.
Chapter 18 Log and Report Table 87 Configuration > Log & Report > Log Setting (continued) LABEL DESCRIPTION Log Format This field displays the format of the log. Internal - system log; you can view the log on the View Log tab. VRPT/Syslog - Zyxel’s Vantage Report, syslog-compatible format. CEF/Syslog - Common Event Format, syslog-compatible format. Summary This field is a summary of the settings for each log. Active Log Summary Click this button to open the Active Log Summary screen.
Chapter 18 Log and Report Figure 124 Configuration > Log & Report > Log Setting > Edit System Log Setting NWA/WAC/WAX Series User’s Guide 199
Chapter 18 Log and Report The following table describes the labels in this screen. Table 88 Configuration > Log & Report > Log Setting > Edit System Log Setting LABEL DESCRIPTION E-Mail Server 1/2 Active Select this to send log messages and alerts according to the information in this section. You specify what kinds of log messages are included in log information and what kinds of log messages are included in alerts in the Active Log and Alert section.
Chapter 18 Log and Report Table 88 Configuration > Log & Report > Log Setting > Edit System Log Setting (continued) LABEL E-mail Server 1 DESCRIPTION Use the E-Mail Server 1 drop-down list to change the settings for e-mailing logs to e-mail server 1 for all log categories. Using the System Log drop-down list to disable all logs overrides your e-mail server 1 settings. enable normal logs (green check mark) - e-mail log messages for all categories to e-mail server 1.
Chapter 18 Log and Report 18.3.3 Edit Remote Server This screen controls the settings for each log in the remote server (syslog). Select a remote server entry in the Log Setting screen and click the Edit icon.
Chapter 18 Log and Report The following table describes the labels in this screen. Table 89 Configuration > Log & Report > Log Setting > Edit Remote Server LABEL DESCRIPTION Log Settings for Remote Server Active Select this check box to send log information according to the information in this section. You specify what kinds of messages are included in log information in the Active Log section. Log Format This field displays the format of the log information. It is read-only.
Chapter 18 Log and Report Figure 126 Active Log Summary This screen provides a different view and a different way of indicating which messages are included in each log and each alert. (The Default category includes debugging messages generated by open source software.) The following table describes the fields in this screen.
Chapter 18 Log and Report Table 90 Configuration > Log & Report > Log Setting > Active Log Summary (continued) LABEL DESCRIPTION E-mail Server 1 Use the E-Mail Server 1 drop-down list to change the settings for e-mailing logs to e-mail server 1 for all log categories. Using the System Log drop-down list to disable all logs overrides your e-mail server 1 settings. enable normal logs (green check mark) - e-mail log messages for all categories to e-mail server 1.
C H A P T E R 19 File Manager 19.1 Overview Configuration files define the Zyxel Device’s settings. Shell scripts are files of commands that you can store on the Zyxel Device and run when you need them. You can apply a configuration file or run a shell script without the Zyxel Device restarting. You can store multiple configuration files and shell script files on the Zyxel Device. You can edit configuration files or shell scripts in a text editor and upload them to the Zyxel Device.
Chapter 19 File Manager While configuration files and shell scripts have the same syntax, the Zyxel Device applies configuration files differently than it runs shell scripts. This is explained below. Table 91 Configuration Files and Shell Scripts in the Zyxel Device Configuration Files (.conf) Shell Scripts (.zysh) • • • • • Resets to default configuration. Goes into CLI Configuration mode. Runs the commands in the configuration file. Goes into CLI Privilege mode.
Chapter 19 File Manager Once your Zyxel Device is configured and functioning properly, it is highly recommended that you back up your configuration file before making further configuration changes. The backup configuration file will be useful in case you need to return to your previous settings. Configuration File Flow at Restart • If there is not a startup-config.
Chapter 19 File Manager The following table describes the labels in this screen. Table 92 Maintenance > File Manager > Configuration File LABEL DESCRIPTION Rename Use this button to change the label of a configuration file on the Zyxel Device. You can only rename manually saved configuration files. You cannot rename the lastgood.conf, systemdefault.conf and startup-config.conf files. You cannot rename a configuration file to the name of another configuration file in the Zyxel Device.
Chapter 19 File Manager Table 92 Maintenance > File Manager > Configuration File (continued) LABEL DESCRIPTION Apply Use this button to have the Zyxel Device use a specific configuration file. Click a configuration file’s row to select it and click Apply to have the Zyxel Device use that configuration file. The Zyxel Device does not have to restart in order to use a different configuration file, although you will need to wait for a few minutes while the system reconfigures.
Chapter 19 File Manager Table 92 Maintenance > File Manager > Configuration File (continued) LABEL DESCRIPTION Last Modified This column displays the date and time that the individual configuration files were last changed or saved. Upload Configuration File The bottom part of the screen allows you to upload a new or previously saved configuration file from your computer to your Zyxel Device You cannot upload a configuration file named system-default.conf or lastgood.conf. If you upload startup-config.
Chapter 19 File Manager C:\>ftp 192.168.1.2 Connected to 192.168.1.2. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------220-You are user number 1 of 5 allowed. 220-Local time is now 21:28. Server port: 21. 220-This is a private system - No anonymous login 220 You will be disconnected after 600 minutes of inactivity. User (192.168.1.2:(none)): admin 331 User admin OK. Password required Password: 230 OK. Current restricted directory is / ftp> cd conf 250 OK.
Chapter 19 File Manager Figure 129 Maintenance > File Manager > Firmware Package The following table describes the labels in this screen. Table 93 Maintenance > File Manager > Firmware Package LABEL DESCRIPTION Boot Module This is the version of the boot module that is currently on the Zyxel Device. Current Version This is the firmware version and the date created. Released Date This is the date that the version of the firmware was created.
Chapter 19 File Manager 3 Use an FTP client on your computer to connect to the Zyxel Device. For example, in the Windows command prompt, type ftp 192.168.1.2. Keep the console session connected in order to see when the firmware recovery finishes. 4 Enter your user name when prompted. 5 Enter your password as requested. 6 Enter “hash” for FTP to print a `#' character for every 1024 bytes of data you upload so that you can watch the file transfer progress.
Chapter 19 File Manager Figure 131 Maintenance > File Manager > Shell Script Each field is described in the following table. Table 94 Maintenance > File Manager > Shell Script LABEL DESCRIPTION Rename Use this button to change the label of a shell script file on the Zyxel Device. You cannot rename a shell script to the name of another shell script in the Zyxel Device. Click a shell script’s row to select it and click Rename to open the Rename File screen. Specify the new name for the shell script file.
Chapter 19 File Manager Table 94 Maintenance > File Manager > Shell Script (continued) LABEL DESCRIPTION Browse... Click Browse... to find the .zysh file you want to upload. Upload Click Upload to begin the upload process. This process may take up to several minutes.
C H A P T E R 20 Diagnostics 20.1 Overview Use the diagnostics screen for troubleshooting. 20.1.1 What You Can Do in this Chapter The Diagnostics screen (Section 20.2 on page 217) generates a file containing the Zyxel Device’s configuration and diagnostic information if you need to provide it to customer support during troubleshooting. 20.2 Diagnostics This screen provides an easy way for you to generate a file containing the Zyxel Device’s configuration and diagnostic information.
Chapter 20 Diagnostics Figure 133 Maintenance > Diagnostics: Debug Information Collector NWA/WAC/WAX Series User’s Guide 218
C H A P T E R 21 LEDs 21.1 Overview The LEDs of your Zyxel Device can be controlled such that they stay lit (ON) or OFF after the Zyxel Device is ready. There are two features that control the LEDs of your Zyxel Device - Locator and Suppression (see Section 1.4 on page 19). 21.1.1 What You Can Do in this Chapter • The Suppression screen (Section 21.2 on page 219) allows you to set how you want the LEDs to behave after the Zyxel Device is ready. • The Locator screen (Section 21.
Chapter 21 LEDs Figure 134 Maintenance > LEDs > Suppression The following table describes fields in the above screen. Table 95 Maintenance > LED > Suppression LABEL DESCRIPTION Suppression On If the Suppression On check box is checked, the LEDs of your Zyxel Device will turn off after it’s ready. Apply Click Apply to save your changes back to the Zyxel Device. Reset Click Reset to return the screen to its last-saved settings.
Chapter 21 LEDs Figure 135 Maintenance > LEDs > Locator The following table describes fields in the above screen. Table 96 Maintenance > LED > Locator LABEL DESCRIPTION Turn On Click Turn On button to activate the locator. The Locator function will show the actual location of the Zyxel Device between several devices in the network. Turn Off Otherwise, click Turn Off to disable the locator feature.
C H A P T E R 22 Antenna Switch 22.1 Overview Use this screen to adjust coverage depending on the orientation of the antenna. 22.1.1 What You Need To Know Positioning the antennas properly increases the range and coverage area of a wireless LAN. On the Zyxel Device that comes with internal antennas and also has an antenna switch, you can adjust coverage depending on the antenna orientation for the Zyxel Device radios using the web configurator, the command line interface (CLI) or a physical switch.
Chapter 22 Antenna Switch Figure 137 Maintenance > Antenna > Antenna Switch (Per Radio) Figure 138 Maintenance > Antenna > Antenna Switch (Per AP) If the Zyxel Device has a physical antenna switch, select the Enable Software Control option to use the Web configurator to adjust coverage depending on each radio’s antenna orientation for better coverage. Select Wall if you mount the Zyxel Device to a wall. Select Ceiling if the Zyxel Device is mounted on a ceiling.
C H A P T E R 23 Reboot 23.1 Overview Use this screen to restart the Zyxel Device. 23.1.1 What You Need To Know If you applied changes in the Web configurator, these were saved automatically and do not change when you reboot. If you made changes in the CLI, however, you have to use the write command to save the configuration before you reboot. Otherwise, the changes are lost when you reboot. Reboot is different to reset; reset returns the Zyxel Device to its default configuration. 23.
C H A P T E R 24 Shutdown 24.1 Overview Use this screen to shut down the Zyxel Device. Always use Maintenance > Shutdown > Shutdown or the shutdown command before you turn off the Zyxel Device or remove the power. Not doing so can cause the firmware to become corrupt. 24.1.1 What You Need To Know Shutdown writes all cached data to the local storage and stops the system processes. Shutdown is different to reset; reset returns the Zyxel Device to its default configuration. 24.
P ART II Local Configuration in Cloud Mode 226
C H A P T E R 25 Cloud Mode 25.1 Overview The Zyxel Device is managed and provisioned automatically by the NCC (Nebula Control Center) when it is connected to the Internet and has been registered in the NCC. If you need to change the Zyxel Device’s VLAN setting or manually set its IP address, access its simplified web configurator (see Chapter 4 on page 53). You can check the NCC's Access Point > Monitor > Access Points screen or the connected gateway for the Zyxel Device's current LAN IP address.
Chapter 25 Cloud Mode • Maintenance > Log These screens also have fewer options than those in standalone Zyxel Devices. The rest of the Zyxel Device’s features must be configured through the NCC.
C H A P T E R 26 Dashboard This screen displays general AP information, and client information in widgets that you can re-arrange to suit your needs. You can also collapse, refresh, and close individual widgets. Figure 141 Dashboard The following table describes the labels in this screen. Table 97 Dashboard LABEL DESCRIPTION AP Information MAC Address This field displays the MAC address of the Zyxel Device. Serial Number This field displays the serial number of the Zyxel Device.
Chapter 26 Dashboard Table 97 Dashboard (continued) LABEL DESCRIPTION Nebula Control Center Activation Status This field displays whether the Zyxel Device has been registered and can be managed by the NCC. Use Proxy to Access NCC This displays whether the NAP uses a proxy server to access the NCC (Nebula Control Center). If the Zyxel Device cannot connect to the Internet or to NCC, an error message is shown on this screen, as in the following.
C H A P T E R 27 Network 27.1 Overview This chapter describes how you can configure the management IP address and VLAN settings of your Zyxel Device in cloud mode. See Section 9.1 on page 94 for information about IP addresses. Note: Make sure your VLAN settings allow the Zyxel Device to connect to the Internet so you could manage it with NCC. 27.1.1 What You Can Do in this Chapter • The IP Setting screen (Section 27.2 on page 231) configures the Zyxel Device’s LAN IP address.
Chapter 27 Network Figure 142 Configuration > Network > IP Setting Each field is described in the following table. Table 98 Configuration > Network > IP Setting LABEL DESCRIPTION IP Address Assignment Get Automatically Select this to make the interface a DHCP client and automatically get the IP address, subnet mask, and gateway address from a DHCP server. Use Fixed IP Address Select this if you want to specify the IP address, subnet mask, and gateway manually.
Chapter 27 Network 27.3 VLAN This section discusses how to configure the Zyxel Device’s VLAN settings. See Section 9.3 on page 98 for more information about VLAN. Use this screen to configure the VLAN settings for your Zyxel Device. To access this screen, click Configuration > Network > VLAN. Figure 143 Configuration > Network > VLAN Each field is described in the following table.
C H A P T E R 28 Maintenance 28.1 Overview When the Zyxel Device is set to work in cloud mode, the Maintenance screens let you mange shell script files on the Zyxel Device, generate a diagnostic file, or view log messages. See Chapter 19 on page 206 for information about shell scripts. 28.1.1 What You Can Do in this Chapter • The Shell Script screen (Section 28.2 on page 234) stores, names, downloads, and uploads shell script files. • The Diagnostics screen (Section 28.
Chapter 28 Maintenance Each field is described in the following table. Table 100 Maintenance > Shell Script LABEL DESCRIPTION Rename Use this button to change the label of a shell script file on the Zyxel Device. You cannot rename a shell script to the name of another shell script in the Zyxel Device. Click a shell script’s row to select it and click Rename to open the Rename File screen. Specify the new name for the shell script file. Use up to 25 characters (including a-zA-Z09;‘~!@#$%^&()_+[]{}’,.=-).
Chapter 28 Maintenance Figure 145 Maintenance > Diagnostics The Debug Information Center screen then displays showing whether the collection is in progress, was successful, or has failed. When the data collection is done, click Download to save the most recent diagnostic file to a computer. Figure 146 Maintenance > Diagnostics: Debug Information Collector 28.4 View Log The NCC periodically gathers log files from the devices being managed by it.
Chapter 28 Maintenance Figure 147 Maintenance > Log > View Log The following table describes the labels in this screen. Table 101 Maintenance > Log > View Log LABEL DESCRIPTION Show Filter / Hide Filter Click this button to show or hide the filter settings. If the filter settings are hidden, the Display, Email Log Now, Refresh, and Clear Log fields are available.
Chapter 28 Maintenance Table 101 Maintenance > Log > View Log (continued) LABEL DESCRIPTION Refresh Click this to update the list of logs. Clear Log Click this button to clear the whole log, regardless of what is currently displayed on the screen. # This field is a sequential value, and it is not associated with a specific log message. Time This field displays the time the log message was recorded. Priority This field displays the priority of the log message.
P ART III Appendices and Troubleshooting 239
C H A P T E R 29 Troubleshooting 29.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LED • Zyxel Device Management, Access, and Login • Internet Access • WiFi Network • Resetting the Zyxel Device 29.2 Power, Hardware Connections, and LED The Zyxel Device does not turn on. The LED is not on.
Chapter 29 Troubleshooting 4 Disconnect and re-connect the power adapter or PoE power injector to the Zyxel Device. 5 If the problem continues, contact the vendor. 29.3 Zyxel Device Management, Access, and Login I forgot the IP address for the Zyxel Device. 1 The default IP address (in standalone mode) is 192.168.1.2. 2 If you changed the IP address and have forgotten it, you have to reset the Zyxel Device to its factory defaults. See Section 29.6 on page 247.
Chapter 29 Troubleshooting 6 If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Advanced Suggestions • Try to access the Zyxel Device using another service, such as Telnet. If you can access the Zyxel Device, check the remote management settings to find out why the Zyxel Device does not respond to HTTP. • If your computer is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port. I forgot the password.
Chapter 29 Troubleshooting I enabled NCC Discovery, but the Zyxel Device is still in standalone mode. Make sure your Zyxel Device is registered to the NCC. The Zyxel Device is already registered with NCC, but it is still in standalone mode; it cannot connect to the NCC. 1 Make sure that NCC Discovery is enabled (see Section 9.6 on page 103). 2 Check your network’s firewall/security settings. Make sure the following TCP ports are allowed: 443, 4335, and 6667.
Chapter 29 Troubleshooting 3 Make sure that the Zyxel Device and the AC are both in the same subnet. 4 If you have to set them up in different subnets, see AC management and IP Subnets on page 96. I accidentally pressed the Nebula button in the NXC’s web configurator. How do I undo it? 1 If the Zyxel Device is not registered with the NCC, register it first. 2 Unregister the Zyxel Device from the NCC. 3 Reset the Zyxel Device to the factory defaults.
Chapter 29 Troubleshooting I cannot upload the firmware uploaded using FTP. The Web Configurator is the recommended method for uploading firmware in standalone mode. For managed Zyxel Devices, using the NCC or AC is recommended. You only need to use FTP if you need to recover the firmware. See the CLI Reference Guide for how to determine if you need to recover the firmware and how to recover it. 29.4 Internet Access Clients cannot access the Internet through the Zyxel Device.
Chapter 29 Troubleshooting 5 If the problem continues, contact the network administrator or vendor. 29.5 WiFi Network I cannot access the Zyxel Device or ping any computer from the WLAN. 1 Make sure the wireless LAN (wireless radio) is enabled on the Zyxel Device. 2 Make sure the radio or at least one of the Zyxel Device’s radios is operating in AP mode. 3 Make sure the wireless adapter (installed on your computer) is working properly.
Chapter 29 Troubleshooting 3 Any certificate that you want to import has to be in one of these file formats: • Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates. • PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.
Chapter 29 Troubleshooting Note: This procedure removes the current configuration. 1 Make sure the Power LED is on and not blinking. 2 Press the RESET button and hold it until the Power LED begins to blink. (This usually takes about ten seconds.) 3 Release the RESET button, and wait for the Zyxel Device to restart. You should be able to access the Zyxel Device in standalone mode using the default settings. 29.7 Getting More Troubleshooting Help Search for support information for your model at www.
APPENDIX A Importing Certificates This appendix shows you how to import public key certificates into your web browser. Public key certificates are used by web browsers to ensure that a secure web site is legitimate. When a certificate authority such as VeriSign, Comodo, or Network Solutions, to name a few, receives a certificate request from a website operator, they confirm that the web domain and contact information in the request match those on public record with a domain name registrar.
Appendix A Importing Certificates Export a Certificate 1 If your device’s Web Configurator is set to use SSL certification, then upon browsing with it for the first time, you are presented with a certification error.
Appendix A Importing Certificates 2 Click Advanced > Proceed to x.x.x.x (unsafe). 3 In the Address Bar, click Not Secure > Certificate (Invalid).
Appendix A Importing Certificates 4 In the Certificate dialog box, click Details > Copy to File. 5 In the Certificate Export Wizard, click Next.
Appendix A Importing Certificates 6 Select the format and settings you want to use and then click Next. 7 Type a filename and specify a folder to save the certificate in. Click Next.
Appendix A Importing Certificates 8 In the Completing the Certificate Export Wizard screen, click Finish. 9 Finally, click OK when presented with the successful certificate export message.
Appendix A Importing Certificates 1 Open your web browser, click the menu icon, and click Settings.
Appendix A Importing Certificates 2 Scroll down and click Advanced to expand the menu. Under Privacy and security, click Manage certificates.
Appendix A Importing Certificates 3 In the Certificates pop-up screen, click Trusted Root Certification Authorities. Click Import to start the Certificate Import Wizard. 4 Click Next when the wizard pops up, and then on the following screen click Browse.
Appendix A Importing Certificates 5 Select the certificate file you want to import and click Open. 6 Click Next.
Appendix A Importing Certificates 7 Confirm the settings displayed and click Finish. 8 If presented with a security warning, click Yes.
Appendix A Importing Certificates 9 Finally, click OK when you are notified of the successful import. Install a Stand-Alone Certificate File Rather than installing a public key certificate using web browser settings, you can install a stand-alone certificate file if one has been issued to you. 1 Double-click the public key certificate file. 2 Click Install Certificate.
Appendix A Importing Certificates 3 Click Next on the first wizard screen, click Place all certificates in the following store, and click Browse. 4 Select Trusted Root Certificate Authorities > OK, and then click Next.
Appendix A Importing Certificates 5 Confirm the information shown on the final wizard screen and click Finish. 6 If presented with a security warning, click Yes.
Appendix A Importing Certificates 7 Finally, click OK when you are notified of the successful import. Remove a Certificate in Google Chrome This section shows you how to remove a public key certificate in Google Chrome on Windows 7. 1 Open your web browser, click the menu icon, and click Settings.
Appendix A Importing Certificates 2 Scroll down and click Advanced to expand the menu. Under Privacy and security, click Manage certificates. 3 In the Certificates pop-up screen, click Trusted Root Certification Authorities.
Appendix A Importing Certificates 4 Select the certificate you want to remove and click Remove. 5 Click Yes when you see the following warning message. 6 Confirm the details displayed in the warning message and click Yes. Firefox The following example uses Mozilla Firefox on Windows 7. You first have to store the certificate in your computer and then install it as a Trusted Root CA, as shown in the following tutorials.
Appendix A Importing Certificates Export a Certificate 1 If your device’s Web Configurator is set to use SSL certification, then the first time you browse to it you are presented with a certification error. Click Advanced. 2 Click View Certificate.
Appendix A Importing Certificates 3 Click Details > Export. 4 Type a filename and click Save.
Appendix A Importing Certificates 1 Open Firefox and click Tools > Options.
Appendix A Importing Certificates 2 In the Options page, click Privacy & Security, scroll to the bottom of the page, and then click View Certificates. 3 In the Certificate Manager, click Authorities > Import.
Appendix A Importing Certificates 4 Use the Select File dialog box to locate the certificate and then click Open. 5 Select Trust this CA to identify websites and click OK. Removing a Certificate in Firefox This section shows you how to remove a public key certificate in Firefox.
Appendix A Importing Certificates 1 Open Firefox and click Tools > Options. 2 In the Options page, click Privacy & Security, scroll to the bottom of the page, and then click View Certificates.
Appendix A Importing Certificates 3 In the Certificate Manager, click Authorities and select the certificate you want to remove, Click Delete or Distrust. . 4 In the following dialog box, click OK. 5 The next time you go to the web site that issued the public key certificate you just removed, a certification error appears.
APPENDIX B IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. IPv6 Addressing The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000. IPv6 addresses can be abbreviated in two ways: • Leading zeros in a block can be omitted.
Appendix B IPv6 Unspecified Address An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have its own address. It is similar to “0.0.0.0” in IPv4. Loopback Address A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1” in IPv4. Multicast Address In IPv6, multicast addresses provide the same functionality as IPv4 broadcast addresses. Broadcasting is not supported in IPv6.
Appendix B IPv6 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F). Each block’s 16 bits are then represented by four hexadecimal characters. For example, FFFF:FFFF:FFFF:FFFF:FC00:0000:0000:0000. Interface ID In IPv6, an interface ID is a 64-bit identifier.
Appendix B IPv6 Each DHCP client and server has a unique DHCP Unique IDentifier (DUID), which is used for identification when they are exchanging DHCPv6 messages. The DUID is generated from the MAC address, time, vendor assigned ID and/or the vendor's private enterprise number registered with the IANA. It should not change over time even after you reboot the device.
Appendix B IPv6 ICMPv6 Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. ICMPv6 has a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4. ICMPv6 is an integral part of IPv6. IPv6 nodes use ICMPv6 to report errors encountered in packet processing and perform other diagnostic functions, such as "ping".
Appendix B IPv6 MLD allows an IPv6 switch or router to discover the presence of MLD listeners who wish to receive multicast packets and the IP addresses of multicast groups the hosts want to join on its network. MLD snooping and MLD proxy are analogous to IGMP snooping and IGMP proxy in IPv4. MLD filtering controls which multicast groups a port can join. MLD Messages A multicast router or switch periodically sends general queries to MLD hosts to update the multicast forwarding table.
Appendix B IPv6 1 Install Dibbler and select the DHCPv6 client option on your computer. 2 After the installation is complete, select Start > All Programs > Dibbler-DHCPv6 > Client Install as service. 3 Select Start > Control Panel > Administrative Tools > Services. 4 Double click Dibbler - a DHCPv6 client. 5 Click Start and then OK. 6 Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default.
Appendix B IPv6 1 Select Control Panel > Network and Sharing Center > Local Area Connection. 2 Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it. 3 Click OK to save the change. 4 Click Close to exit the Local Area Connection Status screen. 5 Select Start > All Programs > Accessories > Command Prompt. 6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Con
APPENDIX C Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a Zyxel office for the region in which you bought the device. See https://www.zyxel.com/homepage.shtml and also https://www.zyxel.com/about_zyxel/zyxel_worldwide.shtml for the latest information. Please have the following information ready when you contact an office. Required Information • Product model and serial number.
Appendix C Customer Support Korea • Zyxel Korea Corp. • http://www.zyxel.kr Malaysia • Zyxel Malaysia Sdn Bhd. • http://www.zyxel.com.my Pakistan • Zyxel Pakistan (Pvt.) Ltd. • http://www.zyxel.com.pk Philippines • Zyxel Philippines • http://www.zyxel.com.ph Singapore • Zyxel Singapore Pte Ltd. • http://www.zyxel.com.sg Taiwan • Zyxel Communications Corporation • https://www.zyxel.com/tw/zh/ Thailand • Zyxel Thailand Co., Ltd • https://www.zyxel.
Appendix C Customer Support • https://www.zyxel.com/be/fr/ Bulgaria • Zyxel България • https://www.zyxel.com/bg/bg/ Czech Republic • Zyxel Communications Czech s.r.o • https://www.zyxel.com/cz/cs/ Denmark • Zyxel Communications A/S • https://www.zyxel.com/dk/da/ Estonia • Zyxel Estonia • https://www.zyxel.com/ee/et/ Finland • Zyxel Communications • https://www.zyxel.com/fi/fi/ France • Zyxel France • https://www.zyxel.fr Germany • Zyxel Deutschland GmbH • https://www.zyxel.
Appendix C Customer Support Lithuania • Zyxel Lithuania • https://www.zyxel.com/lt/lt/ Netherlands • Zyxel Benelux • https://www.zyxel.com/nl/nl/ Norway • Zyxel Communications • https://www.zyxel.com/no/no/ Poland • Zyxel Communications Poland • https://www.zyxel.com/pl/pl/ Romania • Zyxel Romania • https://www.zyxel.com/ro/ro Russia • Zyxel Russia • https://www.zyxel.com/ru/ru/ Slovakia • Zyxel Communications Czech s.r.o. organizacna zlozka • https://www.zyxel.
Appendix C Customer Support Turkey • Zyxel Turkey A.S. • https://www.zyxel.com/tr/tr/ UK • Zyxel Communications UK Ltd. • https://www.zyxel.com/uk/en/ Ukraine • Zyxel Ukraine • http://www.ua.zyxel.com South America Argentina • Zyxel Communications Corporation • https://www.zyxel.com/co/es/ Brazil • Zyxel Communications Brasil Ltda. • https://www.zyxel.com/br/pt/ Colombia • Zyxel Communications Corporation • https://www.zyxel.com/co/es/ Ecuador • Zyxel Communications Corporation • https://www.zyxel.
Appendix C Customer Support Middle East • Zyxel Communications Corporation • https://www.zyxel.com/me/en/ North America USA • Zyxel Communications, Inc. - North America Headquarters • https://www.zyxel.com/us/en/ Oceania Australia • Zyxel Communications Corporation • https://www.zyxel.com/au/en/ Africa South Africa • Nology (Pty) Ltd. • https://www.zyxel.
APPENDIX D Legal Information Copyright Copyright © 2019 by Zyxel Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of Zyxel Communications Corporation. Published by Zyxel Communications Corporation.
Appendix D Legal Information CANADA The following information applies if you use the product within Canada area. Innovation, Science and Economic Development Canada ICES Statement CAN ICES-3 (B)/NMB-3(B) Innovation, Science and Economic Development Canada RSS-GEN & RSS-247 Statement • • This device contains licence-exempt transmitter(s)/receiver(s) that comply with Innovation, Science and Economic Development Canada's licence-exempt RSS(s).
Appendix D Legal Information Antenna Information ANTENNA MODEL NO. TYPE CONNECTOR 2.4 G GAIN NWA1123-ACv2 1 PIFA UFL 3.08 2 PIFA UFL 3.07 3 PIFA UFL 5G GAIN REMARK 4.06 (5150~5250 MHz) 3.79 (5725~5850 MHz) 4 PIFA UFL 3.99 (5150~5250 MHz) 3.78 (5725~5850 MHz) NWA1123-AC HD NWA1302-AC 1 PIFA I-PEX 3 (2400-2483.5 MHz) 2 PIFA I-PEX 3 (2400-2483.
Appendix D Legal Information ANTENNA MODEL NO. TYPE CONNECTOR 2.4 G GAIN WAC5302D-S 1 Loop I-PEX 5.82 (2400-2483.5 MHz) 2 Loop I-PEX 5.02 (2400-2483.5 MHz) 3 PIFA I-PEX 1 Direction U.FL 2 Direction U.FL 1 Direction I-PEX 0.8 (2400-2483.5 MHz) 4.22 (5150-5250 MHz) Direction U.FL 0 (2400-2483.5 MHz) 3.51 (5150-5250 MHz) 4.22 (5250-5350 MHz) 4.61 (5470-5725 MHz) 4.
Appendix D Legal Information Informations Antenne MODÈLE D'ANTENNE NB. TYPE CONNECTEUR 2.4 G GAIN NWA1123-ACv2 1 PIFA UFL 3.08 2 PIFA UFL 3.07 3 PIFA UFL 5G GAIN REMARQUE 4.06 (5150~5250 MHz) 3.79 (5725~5850 MHz) 4 PIFA UFL 3.99 (5150~5250 MHz) 3.78 (5725~5850 MHz) NWA1123-AC HD NWA1302-AC 1 PIFA I-PEX 3 (2400-2483.5 MHz) 2 PIFA I-PEX 3 (2400-2483.
Appendix D Legal Information MODÈLE D'ANTENNE NB. TYPE CONNECTEUR 2.4 G GAIN WAC5302D-S 1 Loop I-PEX 5.82 (2400-2483.5 MHz) 2 Loop I-PEX 5.02 (2400-2483.5 MHz) 3 PIFA I-PEX 1 Direction U.FL 2 Direction U.FL 1 Direction I-PEX 0.8 (2400-2483.5 MHz) 4.22 (5150-5250 MHz) Direction U.FL 0 (2400-2483.5 MHz) 3.51 (5150-5250 MHz) 4.22 (5250-5350 MHz) 4.61 (5470-5725 MHz) 4.
Appendix D Legal Information EUROPEAN UNION The following information applies if you use the product within the European Union. Declaration of Conformity with Regard to EU Directive 2014/53/EU (Radio Equipment Directive, RED) • • • • • Compliance information for 2.4GHz and/or 5GHz wireless products relevant to the EU and other Countries following the EU Directive 2014/53/ EU (RED).
Appendix D Legal Information Български (Bulgarian) С настоящото Zyxel декларира, че това оборудване е в съответствие със съществените изисквания и другите приложими разпоредбите на Директива 2014/53/ЕC. National Restrictions • • • The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any outdoor wireless link having a range exceeding 300 meters. Please check http://www.bipt.be for more details.
Appendix D Legal Information Română (Romanian) Prin prezenta, Zyxel declară că acest echipament este în conformitate cu cerinţele esenţiale şi alte prevederi relevante ale Directivei 2014/53/EU. Slovenčina (Slovak) Zyxel týmto vyhlasuje, že zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 2014/53/EU. Slovenščina (Slovene) Zyxel izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 2014/53/EU.
Appendix D Legal Information Instructions d'installation professionnelle (WAC6553D-E) Veuillez noter que l'appareil etant dedie a une fonction unique, il doit etre utilise avec notre logiciel proprietaire de divertissement interactif . Ce produit sera propose par un reseau de distribution controle et installe par des professionels; il ne sera pas propose au grand public par le reseau de la grande distribution.
Appendix D Legal Information El símbolo de abajo indica que según las regulaciones locales, su producto y/o su batería deberán depositarse como basura separada de la doméstica. Cuando este producto alcance el final de su vida útil, llévelo a un punto limpio. Cuando llegue el momento de desechar el producto, la recogida por separado éste y/o su batería ayudará a salvar los recursos naturales y a proteger la salud humana y medioambiental.
Appendix D Legal Information 安全警告 為了您的安全,請先閱讀以下警告及指示 : • • • • • • • • • • • • • • • • • • • 請勿將此產品接近水、火焰或放置在高溫的環境。 避免設備接觸任何液體 - 切勿讓設備接觸水、雨水、高濕度、污水腐蝕性的液體或其他水份。 灰塵及污物 - 切勿接觸灰塵、污物、沙土、食物或其他不合適的材料。 雷雨天氣時,不要安裝,使用或維修此設備。有遭受電擊的風險。 切勿重摔或撞擊設備,並勿使用不正確的電源變壓器。 若接上不正確的電源變壓器會有爆炸的風險。 請勿隨意更換產品內的電池。 如果更換不正確之電池型式,會有爆炸的風險,請依製造商說明書處理使用過之電池。 請將廢電池丟棄在適當的電器或電子設備回收處。 請勿將設備解體。 請勿阻礙設備的散熱孔,空氣對流不足將會造成設備損害。 請插在正確的電壓供給插座 ( 如 : 北美 / 台灣電壓 110V AC,歐洲是 230V AC)。 假若電源變壓器或電源變壓器的纜線損壞,請從插座拔除,若您還繼續插電使用,會有觸電死亡的風險。 請勿試圖修理電源變壓器或電源變壓器的纜線,若有毀損,請直接
Appendix D Legal Information Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com. Open Source Licenses This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided with the firmware package. You can download the latest firmware at www.zyxel.com. If you cannot find it there, contact your vendor or Zyxel Technical Support at support@zyxel.com.tw.
Index Index advertising settings 122 BLE 120 Bluetooth Low Energy 20, 22, 23, 120 Bluetooth Smart 120 iBeacon 120 iBeacon ID 120 major 120 minor 120 UUID 120 UUID format 122 Symbols Numbers 802.11k 20, 22, 23 802.11r 20, 22, 23 boot module 213 802.11v 20, 22, 23 BSS 17 A C AC.
Index serial number 163, 168 storage space 158, 166 thumbprint algorithms 157 thumbprints 157 used for authentication 156 verifying fingerprints 157 D date 173 daylight savings 174 DCS 106 DHCP 172 and domain name 172 certification requests 160, 161 certifications viewing 298 diagnostics 217, 235 disclaimer 287 channel 18 domain name 172 CLI 32, 57 button 57 messages 57 popup window 57 Reference Guide 2 dual radios 18 dual-radio application 18 dynamic channel selection 106 cold start 65 commands 32
Index prefix length 273 stateless autoconfiguration 275 unspecified address 274 G Guide CLI Reference 2 J H Java permissions 53 HTTP over SSL, see HTTPS redirect to HTTPS 178 vs HTTPS 177 JavaScripts 53 HTTPS 177 and certificates 177 authenticating clients 177 avoiding warning messages 180 example 178 vs HTTP 177 with Internet Explorer 179 with Netscape Navigator 179 K HyperText Transfer Protocol over Secure Socket Layer, see HTTPS lastgood.conf 208, 210 I LED suppression 219 IEEE 802.
Index M power off 66 MAC address range 68 product registration 299 Management Information Base (MIB) 190, 191 public-private key pairs 155 power on 65 Public-Key Infrastructure (PKI) 156 Management Mode CAPWAP and DHCP 95 management mode 24 R Management, NCC 24 Management, Standalone 24 radio 18 managing the device good habits 32 using FTP. See FTP.
Index present at restart 208 service control and users 176 limitations 176 timeouts 176 startup-config-bad.
Index user objects 123 wireless profile 130 layer-2 isolation 130 MAC filtering 130 radio 130 security 130 SSID 130 users 123 access, see also access users admin (type) 123 admin, see also admin users and service control 176 currently logged in 69 default lease time 127, 129 default reauthentication time 127, 129 lease time 126 limited-admin (type) 123 lockout 128 reauthentication time 126 types of 123 user (type) 123 user names 124 wireless security 17, 246 wireless station 106 Wizard Setup 73 WLAN int