User's Guide
Table Of Contents
- LTE Series
- User’s Guide
- Introduction
- The Web Configurator
- Quick Start
- Tutorials
- 4.1 Overview
- 4.2 Set Up a Wireless Network Using WPS
- 4.3 Connect to the Zyxel Device’s WiFi Network
- 4.4 Configure a Firewall Rule
- 4.5 Configure MAC Filter
- 4.6 Upgrade Firmware on the Zyxel Device
- 4.7 Back up a Configuration File
- 4.8 Restore Configuration
- 4.9 Configure DHCP
- 4.10 Configure Static Route for Routing to Another Network
- 4.11 Access the Zyxel Device Using DDNS
- Technical Reference
- Connection Status
- Broadband
- Home Networking
- Routing
- Network Address Translation (NAT)
- Dynamic DNS Setup
- Firewall
- MAC Filter
- Certificates
- Log
- Traffic Status
- ARP Table
- Routing Table
- Cellular WAN Status
- System
- User Account
- Remote Management
- Time Settings
- E-mail Notification
- Log Setting
- Firmware Upgrade
- Backup/Restore
- Diagnostic
- Troubleshooting
- Appendices
LTE Series User’s Guide
35
CHAPTER 4
Tutorials
4.1 Overview
This chapter provides tutorials for setting up your Zyxel Device.
• Set Up a Wireless Network Using WPS
• Connect to the Zyxel Device’s WiFi Network
• Configure a Firewall Rule
• Configure MAC Filter
• Upgrade Firmware on the Zyxel Device
• Back up a Configuration File
• Restore Configuration
• Configure DHCP
• Configure Static Route for Routing to Another Network
• Access the Zyxel Device Using DDNS
4.2 Set Up a Wireless Network Using WPS
This section gives you an example of how to set up wireless network using WPS. This example uses the
Zyxel Device as the AP and a WPS-enabled Android smartphone as the wireless client.
There are two WPS methods for creating a secure connection via the web configurator or utility. This
tutorial shows you how to do both.
• Push Button Configuration (PBC) - create a secure wireless network simply by pressing a button. See
Section 4.2.1 on page 36. This is the easier method.
• PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal
Identification Number) in the Zyxel Device’s interface. See Section 4.2.2 on page 37. This is the more
secure method, since one device can authenticate the other.