Copyright © 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS IP Address http://192.168.100.1 Password 1234 Firmware Version 1.
MWR102 Mobile Wireless Router 2
About This User's Guide Intended Audience This manual is intended for people who want to configure the MWR102 using the Web-Based Management Interface. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access. • Supporting Disc Refer to the included CD for support documents.
Customer Support Please have the following information ready when you contact Customer Support: • Product model and serial number • Warranty information • Date that you received or purchased your device Brief description of the problem including any steps that you have taken before contacting the ZyXEL Customer Support representative • Support Email support@zyxel.com Toll-Free 1-800-978-7222 Website www.us.zyxel.com Postal mail ZyXEL Communications Inc. 1130 N.
Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The MWR102 may be referred to as the “MWR102”, the “device”, the “product” or the “system” in this User’s Guide.
Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The MWR102 icon is not an exact representation of your device.
Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do not leave the device exposed to a heat source or in a high-temperature location such as in the sun or in an unattended vehicle.
• Do not leave unit exposed to a heat source or in a location that may become hot, such as a parked vehicle or in direct sunlight. Do not leave in a glove box, trunk or other location that may become hot. • Do not puncture or incinerate the device or battery. • When/if you dispose of the battery, be certain to follow ordinances from local waste disposal agencies. • Keep the battery away from small children or pets • Never use a knife, screwdriver or other sharp object to remove the battery.
Table of Contents About This User's Guide..................................................................................................3 Document Conventions ...................................................................................................5 Safety Warnings ..............................................................................................................7 Part I: 1 Introduction .................................................................................................
6.1 Overview........................................................................................................ 29 6.2 Connecting to Internet from an Access Point ................................................... 30 6.3 Configuring Wireless Security Using WPS ....................................................... 30 6.4 Enabling and Configuring Wireless Security (No WPS) .............................. 32 Part II: Wireless ...........................................................................
10 Status ................................................................................................................60 10.1 Overview .................................................................................................... 60 10.2 What You Can Do ...................................................................................... 60 10.3 Status Screen ............................................................................................ 60 11 Statistics .....................
Appendix A: Pop-up Windows, JavaScripts and Java Permissions ............................... 85 Appendix B: IP Addresses and Subnetting .................................................................... 93 Appendix C: Setting up Your Computer’s IP Address .................................................. 105 Appendix D: Wireless LANs ........................................................................................ 127 Appendix E: Common Services ....................................................
Part I: Introduction 13
1 Getting to Know Your MWR102 1.1 Overview The MWR102 is a mobile wireless router with 1T1R MIMO technology. It complies with IEEE 802.11n standards, with Wireless N data rates of up to 150 Mbps, and IEEE 802.11b/g with Wireless B/G data rates of 54 Mbps. It is also backward compatable with all 11/54 Mbps wireless (802.11b/g) products. The router allows multiple users to share one broadband connection, as well as secures your private network.
1.3 Good Habits for Managing the MWR102 Do the following things regularly to make the MWR102 more secure and to manage the MWR102 more effectively. • Change the password. Use a password that’s not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place. • Back up the configuration (and make sure you know how to restore it).
1.5 The Rear Panel Figure 2 The rear panel of the Wireless Router. LAN: Through this port, you can connect the router to your PCs and the other Ethernet network devices. WAN: This WAN port is where you will connect the cable/DSL Modem, or Ethernet. DC IN: Plug the end of the cable firmly into the rear panel of the router, and plug the other end into a USB outlet to power the system. WPS/Reset Button: Located on the underside of the device.
2 Web-Based Management 2.1 Overview This chapter describes how to access the MWR102 Web-Based Management Interface and provides an overview of its screens. The Web-Based Management Interface is an HTML-based management interface that allows easy setup and management of the MWR102 via Internet browser. Use Internet Explorer 7.0 and later or Firefox 3.0 and later versions or Safari 4.0 or later versions. The recommended screen resolution is 1024 by 768 pixels or higher.
Figure 3 Login Screen The following table describes the labels in this screen. LABEL DESCRIPTION User Name Password Type “admin” (default) as the User name. Type “1234” (default) as the password. 2.3 Resetting the MWR102 If you forget your password or IP address, or you cannot access the Web-Based Management Interface, you will need to use the RESET button at the back of the MWR102 to reload the factory-default configuration file.
3 MWR102 Modes 3.1 Overview This chapter introduces the different modes available on your MWR102. 3.1.1 Device Modes This refers to the operating mode of the MWR102, which can act as a: • Router. This is the default device mode of the MWR102. Use this mode to connect the local network to another network, like the Internet. • Access Point. Use this mode if you want to extend your network by allowing network devices to connect to the MWR102 wirelessly. Go to AP view the Status screen in this mode.
4 Router Mode 4.1 Overview The MWR102 is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). 4.2 What You Can Do Use the Status screen to view read-only information about your MWR102. 4.2.1 Navigation Panel Use the sub-menus on the navigation panel to configure MWR102 features.
The following table describes the sub-menus. Table 2 Navigation Panel: Router Mode LINK Setup Wizard FUNCTION This screen guides you through the setup of the MWR102. Wireless Basic Settings Advanced Settings Use this screen to change the basic wireless settings of the MWR102 Use this screen to configure advanced wireless settings Security Use this screen to change Wireless Security settings. Access Control This page allows control over what devices are allowed to access the router.
Status Shows the current status and basic settings of the travel router Statistics Shows packet counts for wired and wireless Ethernet connections. Log Set remote log server parameters and view the system log. Upgrade Firmware Upgrade the travel router firmware. Save/Reload Settings Password Save the current settings to a backup file, or reload the setting from a previously saved file. Set or change the travel router ADMINISTRATOR user name and password.
5 Access Point Mode 5.1 Overview Use your MWR102 as an access point (AP) if you already have a router or gateway on your network. In this mode your MWR102 bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. 5.2 What You Can Do • Use the Status screen to view read-only information about your MWR102. • Use the LAN screen to set the IP address for your MWR102 acting as an access point. 5.2.
5.2.3 Configuring your WLAN and Maintenance Settings The configuration of wireless and maintenance settings in Access Point mode is the same as for Router Mode. • See Chapter 7 for information on the configuring your wireless network. 5.3 AP Mode Status Screen Click Management > Status to open the Status screen Table 3 Status Screen: Router Mode LABEL DESCRIPTION System Information Uptime This is the total time the MWR102 has been on. Firmware Version This is current firmware version.
Encryption This shows the level of wireless security the MWR102 is currently using. BSSID This displays the MAC address of the wireless device. Associated Clients Displays the number of clients currently associated to the MWR102 Local Network Router IP Address Displays the IP address designated to the MWR102 by your router. Subnet Mask Shows what subnet mask the MWR102 is on. DHCP This shows the LAN port’s DHCP role - Server or None.
Figure 5 Navigation Panel The following table describes the sub-menus. Table 4 Navigation Panel: Router Mode LINK Setup Wizard FUNCTION This screen guides you through the setup of the MWR102. Wireless Basic Settings Advanced Settings Use this screen to change the basic wireless settings of the MWR102 Use this screen to configure advanced wireless settings Security Use this screen to change Wireless Security settings.
router. Site Survey This page provides a tool to scan the wireless network for nearby routers and APs. WPS This screen allows you to change the Wi-Fi Protected Setup settings for the MWR102 Network Settings LAN Interface This screen allows you to configure the parameters for your Local Area Network. Management Status Shows the current status and basic settings of the travel router Statistics Shows packet counts for wired and wireless Ethernet connections.
Note: If you change the IP address of the MWR102 in the screen below, you will need to log into the MWR102 again using the new IP address. Figure 6 Network Settings > LAN Interface The table below describes the labels in the screen. Table 5 Network Settings > LAN Interface LABEL DESCRIPTION Router IP Address Type the IP address in dotted decimal notation. The default setting is 192.168.100.2. If you change the IP address you will have to log in again with the new IP address.
Diversion automatically detect conflicts in the WAN and LAN IP. If there are conflicts, the LAN IP and LAN DHCP Range will automatically jump to next subnet to avoid conflicts. 6 Tutorials 6.1 Overview This chapter provides tutorials for your MWR102 as follows: • Connecting to the Internet from an Access Point • Configuring Wireless Security Using WPS • Enabling and configuring wireless security 6.1.
6.2 Connecting to Internet from an Access Point This section gives you an example of how to set up an access point (AP) and wireless client (a notebook (B), in this example) for wireless communication. B can access the Internet through the access point wirelessly. When the MWR is configured in AP mode, it has to connect to a broadband gateway (wired or wireless router with broadband connection).
6.3.1 Push Button Configuration (PBC) 1 Make sure that your MWR102 is turned on and that it is within range of your computer. 2 Make sure that you have installed the wireless client (this example uses the NWD210N) driver and utility in your notebook. 3 In the wireless client utility, find the WPS settings. Enable WPS and press the WPS button (Start or WPS button) 4 Log into MWR102’s Web-Based Management Interface and press the Start PBC button in the Wireless > WPS screen.
6.4 Enabling and Configuring Wireless Security (No WPS) Follow the steps below to configure the wireless settings on your MWR102. The instructions require that your hardware is connected (see the Quick Start Guide) and you are logged into the Web-Based Management Interface through your LAN connection. 1 Open the Wireless > Security screen in the AP’s Web-Based Management Interface. 2 Choose a Pre-Shared Key format. (Passphrase or Hex) 3 Enter your desired key, then click the Apply Changes button.
2. Wireless adapters come with software sometimes called a “utility” that you install on your computer. See your wireless adapter’s User’s Guide for information on how to do that. 3. After you’ve installed the utility, open it. If you cannot see your utility’s icon on your screen, go to Start > Programs and click on your utility in the list of programs that appears. The utility displays a list of APs within range, as shown in the example screen below. 4. Select the MWR102’s SSID and click Connect.
Figure 11 Confirm Save 7. Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide. Figure 12 Link Status If your connection is successful, open your Internet browser and enter http://us.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured.
Part II: Wireless 35
7 Wireless 7.1 Overview This chapter discusses how to configure the wireless network settings in your MWR102. See the appendices for more detailed information about wireless networks. 7.2 What You Can Do • Use the Basic Settings screen to enable the Wireless LAN, enter the SSID and select the channel width. • Use the Advanced Settings screen to set RF output power and set the RTS Threshold. • Use the Security screen to set encryption type and passphrase.
7.3.1 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network. 7.3.1.1 SSID Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess.
Table 6 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security WEP WPA-Personal (TKIP) WPA-Enterprise Strongest WPA2-Personal (AES) WPA2-Enterprise Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA-PSK. Therefore, you should set up WEP in the wireless network.
7.4 General Wireless LAN Screen Use this screen to enable the Wireless LAN, enter the SSID and select the channel. Note: If you are configuring the MWR102 from a computer connected to the wireless LAN and you change the MWR102’s SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the MWR102’s new settings. Click Wireless > Basic Settings to open.
Allows you to choose between Wireless B/G/N functionality. Network Band Allows you to choose between the 20MHz and 40MHz channel. Channel Width Channel Number This displays the channel the MWR102 is currently using. Country Allows you to set your country. Broadcast SSID Set whether or not the MWR102 is discoverable. Associated Clients The Show Clients button shows all clients associated with the MWR102. 7.
Figure 14 Wireless > Advanced Settings The following table describes the labels in this screen. Table 8 Wireless > Advanced Settings LABEL DESCRIPTION Fragmentation Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even number between 256 and 2346. Data with its frame size larger than this value will perform the RTS (Request To RTS Threshold Send)/CTS (Clear To Send) handshake.
Output Power Set the output power of the MWR102 in this field. If there is a high density of APs in an area, decrease the output power of the MWR102 to reduce interference with other APs. Select one of the following 100%, 70%, 50%, 35%, or 15%. See the product specifications for more information on your MWR102’s output power. Apply Changes Click Apply Changes to save your changes back to the MWR102. Reset Click Reset to reload the previous configuration for this screen. 7.6 Security 7.6.
7.6.2 WEP Encryption WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communications private. It encrypts unicast and multicast communications in a network. Both the wireless stations and the access points must use the same WEP key. In order to configure and enable WEP encryption, click Wireless > Security to display the Security screen. Select WEP from the Encryption list.
Select 64-bit or 128-bit. Key Length This dictates the length of the security key that the network is going to use. Key Format Select ASCII (5 Characters) or Hex (10 Characters) from the dropdown menu. Enter a Passphrase. Encryption Key A passphrase functions like a password. In WEP security mode, it is further converted by the MWR102 into a complicated string that is referred to as the “key”. This key is requested from all devices wishing to connect to a wireless network.
The following table describes the labels in this screen. Table 10 Wireless > Security: WPA-PSK/WPA2-PSK/WPA2-Mixed LABEL DESCRIPTION Encryption Select WPA-PSK, WPA2-PSK or WPA2-Mixed to enable data encryption. Pre-shared Key Format This field allows you to choose between a passphrase and HEX as your SreShared Key Format. Pre-Shared Key WPA-PSK/WPA2-PSK/WPA2-Mixed use a simple common password for authentication. Type a pre-shared key from 8 to 63 case-sensitive keyboard characters.
Figure 18 Wireless > Access Control The following table describes the labels in this menu. Table 11 Wireless > Access Control LABEL DESCRIPTION Wireless Access Control Mode Define whether entered MAC addresses will be whitelisted or blacklisted. MAC Address Enter the MAC addresses of the wireless station that are allowed or denied access to the MWR102 in this field. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc.
Apply Changes Click Apply to save your changes back to the MWR102. Reset Click Reset to reload the previous configuration for this screen. 7.8 WPS Screen Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status. To open this screen, click Wireless > WPS. Figure 19 Wireless > WPS The following table describes the labels in this screen.
This displays Configured when the MWR102 has connected to a wireless network using WPS. The current wireless and wireless security settings also appear in the screen. Status This displays Unconfigured if WPS is disabled and there are no wireless or wireless security changes on the MWR102 or you click Reset to Unconfigured to remove the configured wireless and wireless security settings. Self-PIN Number This displays a PIN number last time system generated. Click Generate to generate a new PIN number.
The following table describes the labels in this screen. Table 13 Wireless > Site Survey LABEL DESCRIPTION Wireless Site Survey SSID This displays the Network Name (SSID) of the wireless networks close to you. This displays the MAC address of the wireless device listed. BSSID Channel This displays the wireless channel used by the wireless network. Type This displays the network type being used by the wireless network. Encrypt This displays the encryption type used by the wireless network.
8 Network Settings 8.1 Overview This chapter discusses the MWR102’s Network Settings screens. Use these screens to configure your LAN and WAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet.
8.3 What You Need To Know The information in this section can help you configure the screens for your WAN and LAN connections. 8.3.1 Configuring Your Internet Connection The actual physical connection determines whether the MWR102 ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next.
8.4 LAN Interface The LAN Interface Setup screen allows you to set up your LAN interface, the private IP of your router’s LAN port, and the subnet mask of your LAN segment. Go to Network > LAN Interface to access the following screen. Figure 23 Network > LAN Interface The following table describes the labels in this screen. Table 14 Network > LAN Interface Items Information Router IP Address The IP of your Router LAN port (default 192.168.100.1). Subnet Mask Subnet Mask of you LAN (default 255.255.
default. Auto IP Address Diversion 8.4.1 Click the drop down list, you may select “Enabled” to divert the IP Address automatically or select “Disabled” to ban it. When Enabled, the system will automatically detect conflicts in the WAN and LAN IP. If there are conflicts, the LAN IP and LAN DHCP Range will automatically jump to next subnet to avoid conflicts. Active DHCP Client List This window pops up after clicking the Show Client button.
8.5 WAN Interface This page allows users to configure WAN settings. You may select the Internet connection type from the drop down list next to “WAN Access Type” and configure the parameters for each mode. Go to Network Settings > WAN Interface to open the following screen. Figure 25 Network > WAN Interface The following table describes the labels in this screen. Table 16 Network > WAN Interface Items Information WAN Access Type Select to access the WAN as Static, DHCP Client or PPPoE.
Provider (ISP). MTU Size The Maximum packet size the router will transmit. Any packet over the specified size will be chopped into a smaller size before sending. Larger packet size will enhance performance. Enter the MTU number in the blank to set the limitation. Clone MAC Address There are two ways to clone a MAC address. One way is to directly input a MAC address into the text box. To store a MAC address, click the 'Manual Add' button and add it to the “History MAC Table.
Part III: Security MAC Filtering 56
9 MAC Filtering 9.1 Overview This chapter shows you how to enable and configure MAC address filtering that allows your MWR102 to permit and deny access to specific devices on your network. Enable MAC Filtering to restrict the passage of certain types of data packets from your local network to the Internet through the travel router. Use of such filters can be helpful in securing or restricting your local network.
9.4 MAC Filtering This page allows users to restrict data from passing onto the internet from certain devices. Go to Firewall > MAC Filtering to open the following screen. Figure 26 Firewall > MAC Filtering Table 17 Firewall > MAC Filtering Items Information Enable MAC Filtering Mark to enable MAC Filtering, and clear to disable. MAC Address Comment Current Filter Table Enable MAC Filtering MAC Address Comment Fill in the MAC address of wireless stations you want to forbid Internet access to.
Part IV: Management Status Statistics Log Upgrade Firmware Save/Reload Settings Password 59
10 Status 10.1 Overview This chapter discusses how to access and interpret information about the MWR102. 10.2 What You Can Do • Use the Status screen to view the current status and basic settings of the device. 10.3 Status Screen This information page shows the current status and basic settings of this device. Click Management > Status to open the Status screen.
Table 18 Management > Status LABEL DESCRIPTION System Information Uptime This is the total time the MWR102 has been on. Firmware Build Time This is the date/time the current version of the firmware was released. Operation Mode This is the device mode to which the MWR102 is set – Router Mode. Wireless Local Network Network Band We provide six modes for your selection: 2.4GHz (B), 2.4 GHz (G), 2.4 GHz (N), 2.4GHz (B+G), 2.4 GHz (G+N), 2.4 GHz (B+G+N).
Internet IP Address The IP address provided by your Internet Service Provider (ISP). Subnet Mask The Subnet Mask provided by your Internet Service Provider (ISP). Default Gateway The Default Gateway provided by your Internet Service Provider (ISP). Internet MAC Address MAC Address of the device on the internet.
11 Statistics 11.1 Overview This page shows users data transfer information, and monitors packets sent and received 11.2 Statistics Screen . Click Management > Statistics to access the Statistics screen. Figure 28 Management > Statistics The following table describes the labels in this screen. Table 19 Management > Statistics LABEL DESCRIPTION This table shows the number of packets sent over the Wireless LAN. Wireless LAN This table shows the number of packets received over the Wireless LAN.
This table shows the number of packets received over Ethernet LAN. This table shows the number of packets sent over the Ethernet WAN. Ethernet WAN This table shows the number of packets received over the Ethernet WAN. Refresh This button updates the Statistics screen to show the current number of packets sent and received. Clear This button clears the system log.
12 Log 12.1 Overview This page shows current activity on the router, and allows you to set what information the router logs. 12.2 Log Screen Click Management > Log to access the Log screen. Figure 29 Management > Log The following table describes the labels in this screen.
LABEL DESCRIPTION Enable Log Checking this box enables system log functionality. System All Checking this box shows all logged information passing through the device. Wireless Checking this box shows only the information passing through the wireless network. Apply Changes This button applies the changes made above. The MWR102 must reboot in order for these changes to take affect. Refresh This button updates the System Log to show the most recent information to pass through the device.
13 Upgrade Firmware 13.1 Overview Occasionally, a firmware upgrade may be issued to address bugs or add functionality. This chapter discusses how to upgrade to the MWR102’s most recent firmware. Find firmware at http://us.zyxel.com/Support/Download-Library.aspx. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. 13.2 Upgrade Firmware Screen Click Management > Upgrade Firmware.
Table 21 Management > Upgrade Firmware LABEL DESCRIPTION Select File Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Upload to begin the upload process. This process may take up to two minutes.
14 Save/Reload Settings 14.1 Overview This chapter shows you how to backup, restore and reset your MWR102. 14.2 What You Can Do Save Settings to File allows you to back up (save) the MWR102’s current configuration to a file on your computer. Once your MWR102 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
Figure 32 Management > Save/Reload Settings The following table describes the labels in this screen. Table 22 Management > Save/Reload Settings LABEL DESCRIPTION Save… Click Save… to save the MWR102’s current configuration to your computer. Load Settings from File Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.
Pressing the Reset button in this section clears all user-entered configuration information and returns the MWR102 to its factory defaults. Reset You can also press the RESET button on the rear panel to reset the factory defaults of your MWR102. Refer to the Web-Based Management Interface Chapter for more information on the RESET button.
15 Password 15.1 Overview This chapter discusses management of the MWR102’s Administrator user name and password. These are the User name and Password used to access the Web-based Management interface and make changes to your router. 15.2 Password Screen Click Management > Password. Figure 33 Management > Password The following table describes the labels in this screen.
Table 23 Management > Password LABEL DESCRIPTION User Name Type the user name you wish to use to log into the MWR102. New Password Type your new system password (up to 30 characters). Note that as you type a password, the screen displays an asterisk (*) for each character you type. Confirmed Password Type the new password again in this field. Apply Click Apply to save your changes back to the MWR102. Reset Click Reset to begin configuring this screen afresh.
Part V: Troubleshooting 74
16 Troubleshooting 16.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Internet Access • Resetting MWR102 • Wireless Router/AP Troubleshooting 16.2 Power, Hardware Connections, and LEDs The MWR102 does not turn on. None of the LEDs turn on. 1 Make sure you are using the power adaptor or cord included with the MWR102.
3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the MWR102. 5 If the problem continues, contact the vendor. 16.3 MWR102 Access and Login I don’t know the IP address of my MWR102. 1 The default IP address is 192.168.100.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the MWR102 by looking up the IP address of the default gateway for your computer.
1 Make sure you are using the correct IP address. • The default IP address is 192.168.100.1. • If you changed the IP address (Chapter 5), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for “I don’t know the IP address of my MWR102” 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 2 Make sure you entered your ISP account information correctly. These fields are casesensitive, so make sure [Caps Lock] is not on. 3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP. 4 Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again.
Advanced Suggestions • Check the settings for bandwidth management. If it is disabled, you might consider activating it. If it is enabled, you might consider changing the allocations. • Check the settings for QoS. If it is disabled, you might consider activating it. If it is enabled, you might consider raising or lowering the priority for some applications. 16.5 Resetting MWR102 to Factory Defaults If you reset the MWR102, you lose all of the changes you have made.
4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the MWR102. 5 Check that both the MWR102 and your wireless station are using the same wireless and wireless security settings. 6 Make sure you allow the MWR102 to be remotely accessed through the WLAN interface. Check your remote management settings. • See the chapter on Wireless LAN in the User’s Guide for more information.
17 Product Specifications The following tables summarize the MWR102’s hardware and firmware features. Table 24 Hardware Features Dimensions (W x D x H) 162 mm x 115 mm x 33 mm Weight 252 g Input: 100~240 V AC, 50~60 Hz Power Specification Output: 5V DC 2A Ethernet ports Auto-negotiating: 10 Mbps, 100 Mbps in either half-duplex or full-duplex mode. Auto-crossover: Use either crossover or straight-through Ethernet cables.
FEATURE DESCRIPTION 192.168.100.1 (router) Default IP Address 192.168.100.2. (AP) Default Subnet Mask 255.255.255.0 (24 bits) Default Password 1234 DHCP Pool 192.168.100.33 to 192.168.100.64 Wireless Interface Wireless LAN Default Wireless SSID ZyXEL Default Wireless DHCP Pool Size Wireless LAN: Same as LAN (32 from 192.168.100.33 to 192.168.100.64) Device Management Use the Web-Based Configuration Interface to easily configure the rich range of features on the MWR102. Allows IEEE 802.
DHCP (Dynamic Host Configuration Protocol) Use this feature to have the MWR102 assign IP addresses, an IP default gateway and DNS servers to computers on your network. Dynamic DNS Support With Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic IP address. You must register for this service with a Dynamic DNS service provider. Logging Use logs for troubleshooting. You can view logs in the Web-Based Configuration Utility.
Appendices Pop-up Windows, JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer’s IP Address Wireless LANs Common Services Legal Information 84
Appendix A Pop-up Windows, JavaScripts and Java Permissions In order to use the Web-Based Management Interface you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Figure 34 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 35 Internet Options: Privacy 3 Click Apply to save this setting.
2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 36 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. 4 Click Add to move the IP address to the list of Allowed sites.
Figure 37 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the Web-Based Management Interface do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab.
Figure 38 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window.
Figure 39 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
Figure 40 Security Settings – Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Figure 41 Java (Sun) 92
Appendix B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation). The term “subnet” is short for “sub-network”. A subnet mask has 32 bits. If a bit in the subnet mask is a “1” then the corresponding bit in the IP address is part of the network number.
Table 26 Subnet Mask - Identifying Network Number 1ST OCTET: 2ND OCTET: 3RD OCTET: 4TH OCTET (192) (168) (1) (2) IP Address (Binary) 11000000 10101000 00000001 00000010 Subnet Mask (Binary) 11111111 11111111 11111111 00000000 Network Number 11000000 10101000 00000001 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
24-bit mask 11111111 11111111 11111111 00000000 255.255.255.0 29-bit mask 11111111 11111111 11111111 11111000 255.255.255.248 . Network Size The size of the network number determines the maximum number of possible hosts you can have on your network. The larger the number of network number bits, the smaller the number of remaining host ID bits. An IP address with host IDs of all zeros is the IP address of the network (192.168.1.0 with a 24bit subnet mask, for example).
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet masks using both notations. Table 29 Alternative Subnet Mask Notation SUBNET MASK ALTERNATIV E NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.0 /24 0000 0000 0 255.255.255.128 /25 1000 0000 128 255.255.255.192 /26 1100 0000 192 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.
You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate subnetworks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two subnetworks, A and B.
7 In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned to an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126.
Table 30 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 Table 32 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001.
Table 33 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 128 IP Address (Binary) 11000000.10101000.00000001. 10000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.128 Lowest Host ID: 192.168.1.129 Broadcast Address: 192.168.1.191 Highest Host ID: 192.168.1.190 Table 34 Subnet 4 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 192 IP Address (Binary) 11000000.10101000.00000001.
Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.128 (/25) 2 126 2 255.255.255.192 (/26) 4 62 3 255.255.255.224 (/27) 8 30 4 255.255.255.240 (/28) 16 14 5 255.255.255.248 (/29) 32 6 6 255.255.255.252 (/30) 64 2 7 255.255.255.254 (/31) 128 1 The following table is a summary for subnet planning on a network with a 16-bit network number. Table 37 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO.
7 255.255.254.0 (/23) 128 510 8 255.255.255.0 (/24) 256 254 9 255.255.255.128 (/25) 512 126 10 255.255.255.192 (/26) 1024 62 11 255.255.255.224 (/27) 2048 30 12 255.255.255.240 (/28) 4096 14 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
need to change the subnet mask computed by the MWR102 unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: • 10.0.0.0 — 10.255.
After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the Prestige’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
Figure 45 Windows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add. 2 Select Adapter and then click Add. 3 Select the manufacturer and model of your network adapter and then click OK. If you need TCP/IP: 1 In the Network window, click Add.
If you need Client for Microsoft Networks: 1 Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK. 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
• If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in).
Figure 47 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add. 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your router and restart your computer when prompted.
1 Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 48 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 49 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties.
Figure 50 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 51 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). • If you have a dynamic IP address click Obtain an IP address automatically.
• If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. Figure 52 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: • In the IP Settings tab, in IP addresses, click Add.
Figure 53 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields. If you have previously configured DNS servers, click Advanced and then the DNS tab to order them.
Figure 54 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Turn on your router and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
2 Click on Control Panel. Figure 55 Windows 7/Vista 3 Click on Network and Internet.
Figure 57 Windows 7/Vista 5 On the left side of the screen click on Change Adapter Settings (Windows 7), or Manage Network Connections (Vista). 6 Right click on Local Area Connection and select Properties. Figure 58 Windows 7/Vista 7 Highlight Internet Protocol Version 4 and click Properties.
Figure 59 Windows 7/Vista 8 Select Use the Following IP Address and enter your IP address, Subnet Mask, and Default Gateway. Enter your DNS server address (if trying to connect to the internet) and click OK. Figure 60 Windows 7/Vista 9 Click OK or Close on the Local Area Connection Properties window to apply the settings.
Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Figure 61 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list.
Figure 62 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box. 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration.
Figure 63 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list.
Figure 64 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box. 5 Click Apply Now and close the window. 6 Turn on your router and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
Linux This section shows you how to configure your computer’s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may vary depending on your Linux distribution and release version. Note: Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. 1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network. Figure 65 Red Hat 9.
Figure 66 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields. 3 Click OK to save the changes and close the Ethernet Device General screen. 4 If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen.
6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 68 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen. Using Configuration Files Follow the steps below to edit the network configuration files and set your computer IP address.
DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.100.10 NETMASK=255.255.255.0 USERCTL=no PEERDNS=yes TYPE=Ethernet 2 If you know your DNS server IP address(es), enter the DNS server information in the resolv.conf file in the /etc directory. The following figure shows an example where two DNS server IP addresses are specified. Figure 71 Red Hat 9.0: DNS Settings in resolv.conf nameserver 172.23.5.1 nameserver 172.23.5.
Ap pe ndi x Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
BSS A Basic Service Set (BSS) exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS is enabled, wireless station A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other.
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate.
Figure 76 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference. Interference occurs when radio signals from different access points overlap causing interference and degrading performance. Adjacent channels partially overlap however.
When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is invoked.
If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type A preamble is used to synchronize the transmission timing in your wireless network. There are two preamble modes: Long and Short.
Table 38 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/48/54 OFDM (Orthogonal Frequency Division Multiplexing) IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless station and the network RADIUS server.
The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless station. The wireless station ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text.
Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled.
WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication. Encryption Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x.
password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password. User Authentication WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption.
Figure 78 WPA(2)-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server.
Table 40 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTI ON METHOD ENTER IEEE 802.
Ap pe ndi x E Appendix E Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
servers. BGP TCP 179 Border Gateway Protocol. BOOTP_CLIENT UDP 68 DHCP Client. BOOTP_SERVER UDP 67 DHCP Server. CU-SEEME TCP 7648 UDP 24032 A popular videoconferencing solution from White Pines Software. DNS TCP/UDP 53 Domain Name Server, a service that matches web names (for example http://us.zyxel.com) to IP numbers. ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service.
IGMP (MULTICAST) User-Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management. IRC TCP/UDP 6667 This is another popular Internet chat program. MSN Messenger TCP 1863 Microsoft Networks’ messenger service uses this protocol. NEW-ICQ TCP 5190 An Internet chat program. NEWS TCP 144 A protocol for news groups.
RCMD TCP 512 Remote Command Service. REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web. REXEC TCP 514 Remote Execution Daemon. RLOGIN TCP 513 Remote Login. RTELNET TCP 107 Remote Telnet. RTSP TCP/UDP 554 The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet. SFTP TCP 115 Simple File Transfer Protocol.
TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
Ap pe ndi x F Appendix F Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1 this device may not cause interference and 2 this device must accept any interference, including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada.
product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.
Appendix G Open Source Licenses Article I. End-User License Agreement for “MWR102” Article II. WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed. 2.Ownership You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL.
License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software. 6.No Warranty THE SOFTWARE IS PROVIDED "AS IS.
INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8. 9.Audit Rights ZyXEL SHALL HAVE THE RIGHT, AT ITS OWN EXPENSE, UPON REASONABLE PRIOR NOTICE, TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. 10.Termination This License Agreement is effective until it is terminated.
Article III. Article IV. NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software. For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (freesoftware@zyxel.
igmpproxy v1.2 http://sourceforge.net/projects/igmpproxy/ GPLv2 iproute2-2.6.29-1 v2.6.19 GPLv2 iptables-1.4.4 v1.4.4 l2tpd libnl-1.1 v0.69 v1.1 http://www.linuxfoundation.org/collaborate/w orkgroups/networking/iproute2 http://www.netfilter.org/about.html#license http://www.netfilter.org/projects/iptables/dow nloads.html#iptables-1.4.4 http://sourceforge.net/projects/l2tpd/ http://www.infradead.org/~tgr/libnl/ libusb-0.1.12 v0.1.12 http://www.libusb.org/ lzma465 mbpk_eject mt-daapd-0.2.4.
Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes GNU/Linux kernel, bootcode, toolchain, auth, boa, bridge-utils, busybox-1.13, discover, dlna_dms, dnrd-2.12.1, dnsmasq-2.33, dosfstools-2.
rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it.
then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code.
To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on” the earlier work. A “covered work” means either the unmodified Program or a work based on the Program.
activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work.
work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies.
6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.
material, added by you to a covered work, for which you have or can give appropriate copyright permission.
(including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's “contributor version”.
A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License.
published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.
How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program.
library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read . This Product includes libnl-1.1, libusb-0.1.12 under the GNU Lesser Public License GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library".
modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system.
apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. END OF TERMS AND CONDITIONS. This Product includes hostapd-0.6.10, hostapd-0.6.9 under the BSD License. BSD Copyright (c) [dates as appropriate to package] The Regents of the University of California. All rights reserved.
Zlib License zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.2, October 3rd, 2004 Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.
product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly Mark Adler jloup@gzip.org madler@alumni.caltech.edu The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files ftp://ds.internic.