NBG-417N Wireless N-lite Home Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 4, 10/2011 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NBG-417N using the Web Configurator. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http:// www.adobe.com. • Use the PDF’s bookmarks to quickly navigate to the areas that interest you.
About This User's Guide Need More Help? More help is available at www.zyxel.com. • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product. • Knowledge Base If you have a specific question about your product, the answer may be here.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NBG-417N may be referred to as the “NBG-417N”, the “device”, the “product” or the “system” in this User’s Guide.
Document Conventions 6 Server Modem Firewall Telephone Switch Router NBG-417N User’s Guide
Safety Warnings Safety Warnings • • • • • • • • • • • • • • • • • • • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. Do NOT open the device or unit.
Safety Warnings 8 NBG-417N User’s Guide
Contents Overview Contents Overview User’s Guide .......................................................................................................................................19 Getting to Know Your NBG-417N ............................................................................................................21 The WPS Button .....................................................................................................................................
Contents Overview 10 NBG-417N User’s Guide
Table of Contents Table of Contents About This User's Guide ......................................................................................................................3 Document Conventions .......................................................................................................................5 Safety Warnings....................................................................................................................................7 Contents Overview ......................
Table of Contents 4.1 Wizard Setup .....................................................................................................................................35 4.2 Connection Wizard: STEP 1: System Information ............................................................................36 4.2.1 System Name ..........................................................................................................................36 4.2.2 Domain Name ..................................................
Table of Contents Chapter 7 Wireless LAN.......................................................................................................................................69 7.1 Overview ...........................................................................................................................................69 7.2 What You Can Do .............................................................................................................................69 7.3 What You Should Know .....
Table of Contents 9.4 LAN IP Screen ................................................................................................................................105 Chapter 10 DHCP Server .....................................................................................................................................107 10.1 Overview .......................................................................................................................................107 10.2 What You Can Do ........
Table of Contents 14.3.1 Content Filtering Profiles .....................................................................................................129 14.4 Filter Screen ..................................................................................................................................130 14.5 Technical Reference ......................................................................................................................131 14.5.1 Customizing Keyword Blocking URL Checking .....
Table of Contents Chapter 19 System ...............................................................................................................................................153 19.1 Overview .......................................................................................................................................153 19.2 What You Can Do .........................................................................................................................153 19.3 System General Screen ..
Table of Contents Chapter 25 Product Specifications .....................................................................................................................175 Appendix A IP Addresses and Subnetting.......................................................................................179 Appendix B Pop-up Windows, JavaScripts and Java Permissions..................................................189 Appendix C Setting Up Your Computer’s IP Address ...............................................
Table of Contents 18 NBG-417N User’s Guide
P ART I User’s Guide 19
C HAPT ER 1 Getting to Know Your NBG-417N 1.1 Overview This chapter introduces the main features and applications of the NBG-417N. The NBG-417N extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/n compatible devices. A range of services such as a firewall and content filtering are also available for secure Internet computing. 1.
Chapter 1 Getting to Know Your NBG-417N 1.3 Ways to Manage the NBG-417N Use any of the following methods to manage the NBG-417N. • WPS (Wi-Fi Protected Setup). You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL Device. • Web Configurator. This is recommended for everyday management of the NBG-417N using a (supported) web browser. 1.
Chapter 1 Getting to Know Your NBG-417N Table 1 Front Panel LEDs and WPS Button LED COLOR STATUS DESCRIPTION WLAN / WPS Green On The NBG-417N is ready, but is not sending/receiving data through the wireless LAN. Blinking The NBG-417N is sending/receiving data through the wireless LAN. The NBG-417N is negotiating a WPS connection with a wireless client. WAN LAN 1-4 WPS Button NBG-417N User’s Guide Green Green Off The wireless LAN is not ready or has failed.
C HAPT ER 2 The WPS Button 2.1 Overview Your NBG-417N supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Each WPS connection works between two devices. Both devices must support WPS (check each device’s documentation to make sure).
C HAPT ER 3 Introducing the Web Configurator 3.1 Overview This chapter describes how to access the NBG-417N Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG-417N via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions or Safari 2.0 or later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 3 Introducing the Web Configurator 5 You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 3 Change Password Screen Note: The management session automatically times out when the time period set in the Administrator Inactivity Timer field expires (default five minutes). Simply log back into the NBG-417N if this happens. 6 Select the setup mode you want to use.
Chapter 3 Introducing the Web Configurator 3.3 Resetting the NBG-417N If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the NBG-417N to reload the factory-default configuration file. This means that you will lose all configurations that you had previously saved, the password will be reset to “1234” and the IP address will be reset to “192.168.1.1”. 3.3.
Chapter 3 Introducing the Web Configurator (For information on the status screen in AP Mode see Chapter 5 on page 50.) Figure 5 Status Screen (Router Mode) The following table describes the icons shown in the Status screen. Table 2 Status Screen Icon Key ICON DESCRIPTION Click this icon to open the setup wizard. Click this icon to view copyright and a link for related product information. Click this icon at any time to exit the Web Configurator.
Chapter 3 Introducing the Web Configurator Table 3 Web Configurator Status Screen (Router Mode) (continued) LABEL DESCRIPTION WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device. - IP Address This shows the WAN port’s IP address. - IP Subnet Mask This shows the WAN port’s subnet mask. - DHCP This shows the WAN port’s DHCP role - Client or None. LAN Information - MAC Address This shows the LAN Ethernet adapter MAC Address of your device.
Chapter 3 Introducing the Web Configurator Table 3 Web Configurator Status Screen (Router Mode) (continued) LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation and Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE or PPTP encapsulation.
Chapter 3 Introducing the Web Configurator Table 4 Screens Summary LINK TAB FUNCTION General Use this screen to enable the NBG-417N’s DHCP server. Advanced Use this screen to assign IP addresses to specific individual computers based on their MAC addresses and to have DNS servers assigned by the DHCP server. Client List Use this screen to view current DHCP client information and to always assign an IP address to a MAC address (and host name). General Use this screen to enable NAT.
Chapter 3 Introducing the Web Configurator Click the DHCP Table (Details...) hyperlink in the Status screen. Read-only information here relates to your DHCP status. The DHCP table shows current DHCP client information (including IP Address, Host Name and MAC Address) of all network clients using the NBG-417N’s DHCP server. Figure 6 Summary: DHCP Table The following table describes the labels in this screen. Table 5 Summary: DHCP Table LABEL DESCRIPTION # This is the index number of the host computer.
Chapter 3 Introducing the Web Configurator The following table describes the labels in this screen. Table 6 Summary: Packet Statistics LABEL DESCRIPTION Port This is the NBG-417N’s port type. Status For the LAN ports, this displays the port speed and duplex setting or Down when the line is disconnected.
Chapter 3 Introducing the Web Configurator 34 NBG-417N User’s Guide
C HAPT ER 4 Connection Wizard 4.1 Wizard Setup This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP (Internet Service Provider) checklist in the Quick Start Guide to know what to enter in each field. Leave a field blank if you don’t have that information. 1 After you access the NBG-417N Web Configurator, click the Go to Wizard setup hyperlink.
Chapter 4 Connection Wizard 3 Read the on-screen information and click Next. Figure 11 Welcome to the Connection Wizard 4.2 Connection Wizard: STEP 1: System Information System Information contains administrative and system-related information. 4.2.1 System Name System Name is for identification purposes. However, because some ISPs check this name you should enter your computer's "Computer Name". • In Windows 95/98 click Start > Settings > Control Panel > Network.
Chapter 4 Connection Wizard Click Next to configure the NBG-417N for Internet access. Figure 12 Wizard Step 1: System Information The following table describes the labels in this screen. Table 8 Wizard Step 1: System Information LABEL DESCRIPTION System Name System Name is a unique name to identify the NBG-417N in an Ethernet network. Enter a descriptive name. This name can be up to 30 alphanumeric characters long. Spaces are not allowed, but dashes "-" and underscores "_" are accepted.
Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 9 Wizard Step 2: Wireless LAN LABEL DESCRIPTION Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. If you change this field on the NBG-417N, make sure all wireless stations use the same SSID in order to access the network. Security Select a Security level from the drop-down list box.
Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 10 Wizard Step 2: Extend (WPA-PSK or WPA2-PSK) Security LABEL DESCRIPTION Pre-Shared Key Type from 8 to 63 case-sensitive ASCII or HEX characters. You can set up the most secure wireless connection by configuring WPA in the wireless LAN screens. You need to configure an authentication server to do this. Back Click Back to display the previous screen. Next Click Next to proceed to the next screen.
Chapter 4 Connection Wizard 4.4.1 Ethernet Connection Choose Ethernet when the WAN port is used as a regular Ethernet. Continue to Section 4.4.4 on page 42. Figure 16 Wizard Step 3: Ethernet Connection 4.4.2 PPPoE Connection Point-to-Point Protocol over Ethernet (PPPoE) functions as a dial-up connection. PPPoE is an IETF (Internet Engineering Task Force) standard specifying how a host personal computer interacts with a broadband modem (for example DSL, cable, wireless, etc.
Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 12 Wizard Step 3: PPPoE Connection LABEL DESCRIPTION ISP Parameter for Internet Access Connection Type Select the PPP over Ethernet option for a dial-up connection. Service Name Type the name of your service provider. User Name Type the user name given to you by your ISP. Password Type the password associated with the user name above. Back Click Back to return to the previous screen.
Chapter 4 Connection Wizard The following table describes the fields in this screen Table 13 Wizard Step 3: PPTP Connection LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type Select PPTP from the drop-down list box. To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection. User Name Type the user name given to you by your ISP. Password Type the password associated with the User Name above.
Chapter 4 Connection Wizard The following table describes the labels in this screen Table 14 Wizard Step 3: Your IP Address LABEL DESCRIPTION Get automatically from your ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection. If you choose this option, skip directly to Section 4.4.9 on page 45. Use fixed IP address provided by your ISP Select this option if you were given IP address and/or DNS server settings by the ISP.
Chapter 4 Connection Wizard 192.168.1.254 (zero and 255 are reserved). In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network. Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your NBG-417N, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address.
Chapter 4 Connection Wizard The following table describes the labels in this screen Table 16 Wizard Step 3: WAN IP and DNS Server Addresses LABEL DESCRIPTION WAN IP Address Assignment My WAN IP Address Enter your WAN IP address in this field. The WAN IP address should be in the same subnet as your DSL/Cable modem or router. My WAN IP Subnet Mask Enter the IP subnet mask in this field. Gateway IP Address Enter the gateway IP address in this field.
Chapter 4 Connection Wizard advisable to clone the MAC address from a computer on your LAN even if your ISP does not presently require MAC address authentication. Figure 21 Wizard Step 3: WAN MAC Address The following table describes the fields in this screen. Table 18 Wizard Step 3: WAN MAC Address 46 LABEL DESCRIPTION Factory Default Select Factory Default to use the factory assigned default MAC address.
Chapter 4 Connection Wizard 4.5 Connection Wizard Complete Click Finish to complete the wizard setup. Figure 22 Connection Wizard Complete Well done! You have successfully set up your NBG-417N to operate on your network and access the Internet.
Chapter 4 Connection Wizard 48 NBG-417N User’s Guide
C HAPT ER 5 AP Mode 5.1 Overview This chapter discusses how to configure settings while your NBG-417N is set to AP Mode. Many screens that are available in Router Mode are not available in AP Mode. Note: See Chapter 6 on page 55 for an example of setting up a wireless network in AP mode. Use your NBG-417N as an AP if you already have a router or gateway on your network. In this mode your device bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example.
Chapter 5 AP Mode 2 To set your NBG-417N to AP Mode, go to Maintenance > Sys OP Mode > General and select Access Point. Figure 24 Maintenance > Sys OP Mode > General 3 A pop-up appears providing information on this mode. Click OK in the pop-up message window. (See Section 22.4 on page 165 for more information on the pop-up.) Click Apply. Your NBG-417N is now in AP Mode. Note: You have to log in to the Web Configurator again when you change modes. 5.3 Status Screen (AP Mode) Click on Status.
Chapter 5 AP Mode The following table describes the labels shown in the Status screen. Table 19 Status Screen (AP Mode) LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen. It is for identification purposes. Firmware Version This is the firmware version and the date created. LAN Information - MAC Address This shows the LAN Ethernet adapter MAC Address of your device. - IP Address This shows the LAN port’s IP address.
Chapter 5 AP Mode Table 19 Status Screen (AP Mode) (continued) LABEL DESCRIPTION Packet Statistics Use this screen to view port status and packet specific statistics. WLAN Station Status Use this screen to view the wireless stations that are currently associated to the NBG-417N. 5.3.1 Navigation Panel Use the menu in the navigation panel to configure NBG-417N features in AP Mode. The following screen and table show the features you can configure in AP Mode.
Chapter 5 AP Mode Table 20 Menu: AP Mode LINK TAB FUNCTION General Use this screen to view and change administrative settings such as system and domain names, password and inactivity timer. Maintenance System Time Setting Use this screen to change your NBG-417N’s time and date. Logs View Log Use this screen to view the logs for the categories that you selected. Tools Firmware Use this screen to upload firmware to your NBG-417N.
Chapter 5 AP Mode LABEL DESCRIPTION IP Subnet Mask The subnet mask specifies the network number portion of an IP address. Your NBG417N will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the NBG-417N. Apply Click Apply to save your changes to the NBG-417N. Reset Click Reset to reload the previous configuration for this screen. 5.4.
C HAPT ER 6 Tutorials 6.1 Overview This chapter provides tutorials for your NBG-417N as follows: • How to Connect to the Internet from an AP • Configure Wireless Security Using WPS on both your NBG-417N and Wireless Client • Enable and Configure Wireless Security without WPS on your NBG-417N • Bandwidth Management for your Network 6.
Chapter 6 Tutorials • PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the NBG-417N’s interface. See Section 6.2.1.2 on page 57. This is the more secure method, since one device can authenticate the other. 6.2.1.1 Push Button Configuration (PBC) 1 Make sure that your NBG-417N is turned on and that it is within range of your computer.
Chapter 6 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both NBG-417N and wireless client (the NWD210N in this example). Figure 29 Example WPS Process: PBC Method NBG-417N Wireless Client WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 6.2.1.2 PIN Configuration When you use the PIN configuration method, you need to use both NBG-417N’s configuration interface and the client’s utilities.
Chapter 6 Tutorials The following figure shows you the example to set up wireless network and security on NBG-417N and wireless client (ex. NWD210N in this example) by using PIN method.
Chapter 6 Tutorials 6.2.2 Enable and Configure Wireless Security without WPS on your NBG417N This example shows you how to configure wireless security settings with the following parameters on your NBG-417N. SSID SSID_Example3 Channel 6 Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your NBG-417N.
Chapter 6 Tutorials 5 Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. Figure 32 Tutorial: Status Screen 6.2.2.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 60 1 The NBG-417N supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
Chapter 6 Tutorials 4 Select SSID_Example3 and click Connect. Figure 33 Connecting a Wireless Client to a Wireless Network t 5 Select WPA-PSK and type the security key in the following screen. Click Next. Figure 34 Security Settings 6 The Confirm Save window appears. Check your settings and click Save to continue.
Chapter 6 Tutorials 7 Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide. Figure 36 Link Status If your connection is successful, open your Internet browser and enter http://www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured. 6.
Chapter 6 Tutorials In the following screen, you set the priorities for VoIP and e-mail. Figure 37 Tutorial: Priority Queue Click Enable for the VoIP (SIP) service and set priority to High. Do the same for E-mail. For the rest of the applications, click Enable if you need these services and set the priority to Low. Note: You can also leave the Enable field blank for the rest of the applications. In doing so, the NBG-417N does not apply bandwidth management to these services. 6.3.
Chapter 6 Tutorials 3 Set the priority for this to High. 4 For the port, choose TCP from the drop-down menu and enter 1863 in the Specific Port field. Your priority table should now have the VoIP, E-mail and MSN Messenger services priorities set to High. 6.3.3 Configuring Bandwidth Allocation by IP or IP Range For this example, your company’s 20th anniversary is coming up. You want to use the multimedia room’s Internet connection to upload some videos to the website.
Chapter 6 Tutorials Table 22 Services and Values SERVICES FIELDS REAL AUDIO RTSP VDO LIVE FTP Protocol TCP TCP or UDP TCP TCP Port Range 7070 554 7000 20 ~ 21 Policy Min Max Rate Select 30M as the minimum bandwidth allowed. Select 64K Apply Click this to add the rule to the Bandwidth Allocation table. After adding these services, go to Management > Bandwidth MGMT > Advanced and check if you have the correct values.
Chapter 6 Tutorials 66 NBG-417N User’s Guide
P ART II Technical Reference 67
C HAPT ER 7 Wireless LAN 7.1 Overview This chapter discusses how to configure the wireless network settings in your NBG-417N. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 41 Example of a Wireless Network The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.
Chapter 7 Wireless LAN • Use the QoS screen (Section 7.7 on page 79) to ensure Quality of Service (QoS) in your wireless network. • Use the WPS screen (Section 7.8 on page 83) to quickly set up a wireless network with strong security, without having to configure security settings manually. • Use the WPS Station screen (Section 7.9 on page 83) to add a wireless station using WPS. • Use the Scheduling screen (Section 7.10 on page 85) to set the times your wireless LAN is turned on and off.
Chapter 7 Wireless LAN You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security). If a wireless client is not allowed to use the wireless network, it does not matter if it has the correct settings. This type of security does not protect the information that is sent in the wireless network.
Chapter 7 Wireless LAN not have a RADIUS server. Therefore, there is no user authentication. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA. Therefore, you should set up Static WEP in the wireless network. Note: It is recommended that wireless networks use WPA-PSK, WPA, or stronger encryption. IEEE 802.
Chapter 7 Wireless LAN Click Network > Wireless LAN to open the General screen. Figure 42 Network > Wireless LAN > General The following table describes the general wireless LAN labels in this screen. Table 24 Network > Wireless LAN > General LABEL DESCRIPTION Enable Wireless LAN Click the check box to activate wireless LAN. Name(SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated.
Chapter 7 Wireless LAN Table 24 Network > Wireless LAN > General LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG-417N. Reset Click Reset to reload the previous configuration for this screen. See the rest of this chapter for information on the other labels in this screen. 7.4.1 No Security Select No Security to allow wireless stations to communicate with the access points without any data encryption.
Chapter 7 Wireless LAN In order to configure and enable WEP encryption; click Network > Wireless LAN to display the General screen. Select Static WEP from the Security Mode list. Figure 44 Network > Wireless LAN > General: Static WEP The following table describes the wireless LAN security labels in this screen. Table 26 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION WEP Encryption Select 64-bit WEP or 128-bit WEP to enable data encryption.
Chapter 7 Wireless LAN Table 26 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Key 1 to Key 4 The WEP keys are used to encrypt data. Both the NBG-417N and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F").
Chapter 7 Wireless LAN Table 27 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Group Key Update Timer The Group Key Update Timer is the rate at which the AP (if using WPA-PSK/ WPA2-PSK key management) or RADIUS server (if using WPA/WPA2 key management) sends a new group key out to all clients. The re-keying process is the WPA/WPA2 equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis.
Chapter 7 Wireless LAN The following table describes the labels in this menu. Table 28 Network > Wireless LAN > MAC Filter LABEL DESCRIPTION Active Select Yes from the drop down list box to enable MAC address filtering. Filter Action Define the filter action for the list of MAC addresses in the MAC Address table.
Chapter 7 Wireless LAN Table 29 Network > Wireless LAN > Advanced LABEL DESCRIPTION Fragmentation Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even number between 256 and 2346. This field is not available when Super Mode is selected. Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval.
Chapter 7 Wireless LAN Click Network > Wireless LAN > QoS. The following screen appears. Figure 48 Network > Wireless LAN > QoS The following table describes the labels in this screen. Table 30 Network > Wireless LAN > QoS LABEL DESCRIPTION WMM QoS Policy Select Default to have the NBG-417N automatically give a service a priority level according to the ToS value in the IP header of packets it sends.
Chapter 7 Wireless LAN Table 30 Network > Wireless LAN > QoS (continued) LABEL DESCRIPTION Modify Click the Edit icon to open the Application Priority Configuration screen. Modify an existing application entry or create a application entry in the Application Priority Configuration screen. Click the Remove icon to delete an application entry. Apply Click Apply to save your changes to the NBG-417N. 7.7.1 Application Priority Configuration Use this screen to edit a WMM QoS application entry.
Chapter 7 Wireless LAN Table 31 Network > Wireless LAN > QoS: Application Priority Configuration (continued) LABEL DESCRIPTION Service The following is a description of the applications you can prioritize with WMM QoS. Select a service from the drop-down list box. • E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals.
Chapter 7 Wireless LAN 7.8 WPS Screen Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status. To open this screen, click Network > Wireless LAN > WPS tab. Figure 50 Network > Wireless LAN > WPS The following table describes the labels in this screen. Table 32 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select this to enable the WPS feature. PIN Number This displays a PIN number last time system generated.
Chapter 7 Wireless LAN Note: Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes. To add the second wireless station, you have to press these buttons on both device and the wireless station again after the first 2 minutes. Figure 51 Network > Wireless LAN > WPS Station The following table describes the labels in this screen.
Chapter 7 Wireless LAN 7.10 Scheduling Screen Use this screen to set the times your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. The wireless LAN can be scheduled to turn on or off on certain days and at certain times. To open this screen, click Network > Wireless LAN > Scheduling tab. Figure 52 Network > Wireless LAN > Scheduling The following table describes the labels in this screen.
Chapter 7 Wireless LAN wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode. Note: You must enable the same wireless security settings on the NBG-417N and on all wireless clients that you want to associate with it. Click Network > Wireless LAN > WDS tab. The following screen opens with the Basic Setting set to Disabled, and Security Mode set to No Security.
Chapter 7 Wireless LAN Table 35 Network > Wireless LAN > WDS LABEL DESCRIPTION Apply Click Apply to save your changes to NBG-417N. Refresh Click Refresh to reload the previous configuration for this screen. 7.11.1 Security Mode: Static WEP Use this screen to configure the Static WEP security for your NBG-417N when it is in AP + Bridge or Bridge Only mode.
Chapter 7 Wireless LAN The following table describes the labels in this screen. Refer to Table 35 on page 86 for descriptions of other fields in this screen. Table 36 Network > Wireless LAN > WDS (Static WEP) LABEL DESCRIPTION WEP Encryption Select 64-bit WEP or 128-bit WEP to enable data encryption. Authentication Method There are two types of WEP authentication namely, Open System and Shared Key. Open system is implemented for ease-of-use and when security is not an issue.
Chapter 7 Wireless LAN The following table describes the labels in this screen. Refer to Table 35 on page 86 for descriptions of other fields in this screen. Table 37 Network > Wireless LAN > WDS (WPA-PSK/WPA2-PSK) LABEL DESCRIPTION Pre-Shared Key Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including spaces and symbols).
Chapter 7 Wireless LAN 90 NBG-417N User’s Guide
C HAPT ER 8 WAN 8.1 Overview This chapter discusses the NBG-417N’s WAN screens. Use these screens to configure your NBG417N for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks (such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.
Chapter 8 WAN 8.3.1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Chapter 8 WAN 8.3.2 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1. Figure 57 Multicast Example In the multicast example above, systems A and D comprise one multicast group. In multicasting, the server only needs to send one data stream and this is delivered to systems A and D.
Chapter 8 WAN 8.3.4 Auto-Bridge In the rear panel of your NBG-417N, you can see four LAN ports (1 to 4) and one WAN port. The WAN port is for your Internet access connection, and the LAN ports are for your network devices. The WAN port has a different IP address from the LAN ports. When you enable auto-bridging in your NBG-417N, all five ports (4 LAN ports and the WAN port) share the same IP address as shown in the figure below. Figure 58 Autobridging Example IP Address: 192.168.1.
Chapter 8 WAN This screen displays when you select Ethernet encapsulation. Figure 59 Network > WAN > Internet Connection: Ethernet Encapsulation The following table describes the labels in this screen. Table 38 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION Connection Type You must choose the Ethernet option when the WAN port is used as a regular Ethernet.
Chapter 8 WAN Table 38 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG-417N's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
Chapter 8 WAN This screen displays when you select PPPoE encapsulation. Figure 60 Network > WAN > Internet Connection: PPPoE Encapsulation The following table describes the labels in this screen. Table 39 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type Select PPP over Ethernet if you connect to your Internet via dial-up. Service Name Type the PPPoE service name provided to you.
Chapter 8 WAN Table 39 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG-417N's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
Chapter 8 WAN This screen displays when you select PPTP encapsulation. Figure 61 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen.
Chapter 8 WAN Table 40 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION Nailed-up Connection Select Nailed-Up Connection if you do not want the connection to time out. Idle Timeout This value specifies the time in minutes that elapses before the NBG-417N automatically disconnects from the PPTP server. PPTP Configuration Server IP Address/ Domain Type the IP address of the PPTP server. Connection ID/Name Type your identification name for the PPTP server.
Chapter 8 WAN Note: The three categories shown in this screen are independent of each other. To change your NBG-417N’s advanced WAN settings, click Network > WAN > Advanced. The screen appears as shown. Figure 62 Network > WAN > Advanced The following table describes the labels in this screen. Table 41 Network > WAN > Advanced LABEL DESCRIPTION Multicast Setup Multicast Check this to enable multicasting. This applies to traffic routed from the WAN to the LAN.
Chapter 8 WAN 102 NBG-417N User’s Guide
C HAPT ER 9 LAN 9.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks.
Chapter 9 LAN 9.3 What You Need To Know The actual physical connection determines whether the NBG-417N ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 64 LAN and WAN IP Addresses The LAN parameters of the NBG-417N are preset in the factory with the following values: • IP address of 192.168.1.1 with subnet mask of 255.255.255.0 (24 bits) • DHCP server enabled with 32 client IP addresses starting from 192.
Chapter 9 LAN 9.4 LAN IP Screen Use this screen to change your basic LAN settings. Click Network > LAN. Figure 65 Network > LAN > IP The following table describes the labels in this screen. Table 42 Network > LAN > IP LABEL DESCRIPTION IP Address Type the IP address of your NBG-417N in dotted decimal notation 192.168.1.1 (factory default). IP Subnet Mask The subnet mask specifies the network number portion of an IP address.
Chapter 9 LAN 106 NBG-417N User’s Guide
C HAPTER 10 DHCP Server 10.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG-417N’s LAN as a DHCP server or disable it. When configured as a server, the NBG-417N provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 10.
Chapter 10 DHCP Server 10.4 General Screen Use this screen to enable the DHCP server. Click Network > DHCP Server. The following screen displays. Figure 66 Network > DHCP Server > General The following table describes the labels in this screen. Table 43 Network > DHCP Server > General LABEL DESCRIPTION Enable DHCP Server Enable or Disable DHCP for LAN.
Chapter 10 DHCP Server To change your NBG-417N’s static DHCP settings, click Network > DHCP Server > Advanced. The following screen displays. Figure 67 Network > DHCP Server > Advanced The following table describes the labels in this screen. Table 44 Network > DHCP Server > Advanced LABEL DESCRIPTION Static DHCP Table # This is the index number of the static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN.
Chapter 10 DHCP Server Table 44 Network > DHCP Server > Advanced LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG-417N's WAN IP address). The field to the right displays the (readonly) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. If you chose User-Defined, but leave the IP address set to 0.0.
Chapter 10 DHCP Server The following table describes the labels in this screen. Table 45 Network > DHCP Server > Client List LABEL DESCRIPTION # This is the index number of the host computer. IP Address This field displays the IP address relative to the # field listed above. Host Name This field displays the computer host name. MAC Address The MAC (Media Access Control) or Ethernet address on a LAN (Local Area Network) is unique to your computer (six pairs of hexadecimal notation).
Chapter 10 DHCP Server 112 NBG-417N User’s Guide
C HAPTER 11 Network Address Translation (NAT) 11.1 Overview This chapter discusses how to configure NAT on the NBG-417N. NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. Each packet has two addresses – a source address and a destination address.
Chapter 11 Network Address Translation (NAT) • Use the Application screen (Section 11.4 on page 114) to change your NBG-417N’s port forwarding settings. • Use the Advanced screen (Section 11.5 on page 117) to change your NBG-417N’s trigger port settings. 11.3 General NAT Screen Use this screen to enable NAT and set a default server. Click Network > NAT to open the General screen. Figure 70 Network > NAT > General The following table describes the labels in this screen.
Chapter 11 Network Address Translation (NAT) local IP address of the desired server. The port number identifies a service; for example, web service is on port 80 and FTP on port 21. In some cases, such as for unknown services or where one server can support more than one service (for example both FTP and web service), it might be better to specify a range of port numbers. In addition to the servers for specified services, NAT supports a default server.
Chapter 11 Network Address Translation (NAT) The following table describes the labels in this screen. Table 47 Network > NAT > Application LABEL DESCRIPTION Add Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address. Clear the checkbox to disallow forwarding of these ports to an inside server without having to delete the entry.
Chapter 11 Network Address Translation (NAT) 11.5 NAT Advanced Screen Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is that port forwarding only forwards a service to a single LAN IP address.
Chapter 11 Network Address Translation (NAT) Table 48 Network > NAT > Advanced LABEL End Port Trigger DESCRIPTION Type a port number or the ending port number in a range of port numbers. The trigger port is a port (or a range of ports) that causes (or triggers) the NBG417N to record the IP address of the LAN computer that sent the traffic to a server on the WAN. Start Port Type a port number or the starting port number in a range of port numbers.
Chapter 11 Network Address Translation (NAT) 2 If an application needs a continuous data stream, that port (range) will be tied up so that another computer on the LAN can’t trigger it.
Chapter 11 Network Address Translation (NAT) 120 NBG-417N User’s Guide
C HAPTER 12 Dynamic DNS 12.1 Overview Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address. 12.2 What You Can Do Use the Dynamic DNS screen (Section 12.4 on page 122) to enable DDNS and configure the DDNS settings on the NBG-417N. 12.3 What You Need To Know Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.).
Chapter 12 Dynamic DNS 12.4 Dynamic DNS Screen To change your NBG-417N’s DDNS, click Network > DDNS. The screen appears as shown. Figure 74 Network > Dynamic DNS The following table describes the labels in this screen. Table 49 Network > Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup Enable Dynamic DNS Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider.
Chapter 12 Dynamic DNS Table 49 Network > Dynamic DNS LABEL DESCRIPTION Use WAN IP Address Select this option to update the IP address of the host name(s) to the WAN IP address. Dynamic DNS server auto detect IP Address Select this option to update the IP address of the host name(s) automatically by the DDNS server. It is recommended that you select this option. Use specified IP Address Type the IP address of the host name(s). Use this if you have a static IP address.
Chapter 12 Dynamic DNS 124 NBG-417N User’s Guide
C HAPTER 13 Firewall 13.1 Overview Use these screens to enable and configure the firewall that protects your NBG-417N and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN.
Chapter 13 Firewall • Use the Services screen (Section 13.5 on page 127) screen enable service blocking, enter/ delete/modify the services you want to block and the date/time you want to block them. 13.3 What You Need To Know The NBG-417N’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks. 13.3.
Chapter 13 Firewall The following table describes the labels in this screen. Table 50 Security > Firewall > General LABEL DESCRIPTION Enable Firewall Select this check box to activate the firewall. The NBG-417N performs access control and protects against Denial of Service (DoS) attacks when the firewall is activated. Apply Click Apply to save the settings. Reset Click Reset to start configuring this screen again. 13.
Chapter 13 Firewall Table 51 Security > Firewall > Services LABEL DESCRIPTION Do not respond to requests for unauthorized services Select this option to prevent hackers from finding the NBG-417N by probing for unused ports. If you select this option, the NBG-417N will not respond to port request(s) for unused ports, thus leaving the unused ports and the NBG-417N unseen.
C HAPTER 14 Content Filtering 14.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords. 14.2 What You Can Do Use the Filter (Section 14.4 on page 130) screen to restrict web features, add keywords for blocking and designate a trusted computer. 14.
Chapter 14 Content Filtering Since the NBG-417N checks the URL’s domain name (or IP address) and file path separately, it will not find items that go across the two. For example, with the URL www.zyxel.com.tw/news/ pressroom.php, the NBG-417N would find “tw” in the domain name (www.zyxel.com.tw). It would also find “news” in the file path (news/pressroom.php) but it would not find “tw/news”. 14.
Chapter 14 Content Filtering Table 52 Security > Content Filter > Filter LABEL DESCRIPTION Apply Click Apply to save your changes. Reset Click Reset to begin configuring this screen afresh 14.5 Technical Reference The following section contains additional technical information about the NBG-417N features described in this chapter. 14.5.1 Customizing Keyword Blocking URL Checking You can use commands to set how much of a website’s URL the content filter is to check for keyword blocking.
Chapter 14 Content Filtering 132 NBG-417N User’s Guide
C HAPTER 15 Static Route 15.1 Overview This chapter shows you how to configure static routes for your NBG-417N. This chapter shows you how to configure static routes for your NBG-417N. Each remote node specifies only the network to which the gateway is directly connected, and the NBG-417N has no knowledge of the networks beyond. For instance, the NBG-417N knows about network N2 in the following figure through remote node Router 1.
Chapter 15 Static Route 15.3 IP Static Route Screen Use this screen to view existing static route rules. Click Management > Static Route to open the IP Static Route screen. The following screen displays. Figure 80 Management > Static Route > IP Static Route The following table describes the labels in this screen. Table 53 Management > Static Route > IP Static Route LABEL DESCRIPTION # This is the index number of an individual static route. The first entry is for the default route and not editable.
Chapter 15 Static Route 15.3.1 Static Route Setup Screen To edit a static route, click the edit icon under Modify. The following screen displays. Fill in the required information for each static route. Figure 81 Management > Static Route > IP Static Route: Static Route Setup The following table describes the labels in this screen. Table 54 Management > Static Route > IP Static Route: Static Route Setup LABEL DESCRIPTION Route Name Enter the name of the IP static route.
C HAPTER 16 Bandwidth Management 16.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN. Downlink traffic comes back from the WAN device (B) to the LAN device (A).
Chapter 16 Bandwidth Management 16.3 What You Need To Know You can limit an application’s uplink or downlink bandwidth. This limit keeps the traffic from using up too much of the out-going interface’s bandwidth. This way you can make sure there is bandwidth for other applications.
Chapter 16 Bandwidth Management The following table describes the labels in this screen. Table 55 Management > Bandwidth MGMT > General LABEL DESCRIPTION Service Management Bandwidth Management Type This field allows you to have NBG-417N apply bandwidth management. Select Priority Queue or Bandwidth Allocation to enable bandwidth management. • • Select Priority Queue to allocate bandwidth based on the pre-defined priority assigned to an application. Refer to Section 16.5 on page 138.
Chapter 16 Bandwidth Management Click Management > Bandwidth MGMT > Advanced to open the bandwidth management Advanced screen. Figure 84 Management > Bandwidth MGMT > Advanced The following table describes the labels in this screen. Table 56 Management > Bandwidth MGMT > Advanced LABEL DESCRIPTION Priority Queue Local IP Address Enter the IP address of the computer to which bandwidth management does not apply.
Chapter 16 Bandwidth Management Table 56 Management > Bandwidth MGMT > Advanced (continued) LABEL DESCRIPTION Specific Port This displays the port/s assigned to the service. You can also specify the port/s to services to which you want to allocate bandwidth. Choose either Both, TCP or UDP in the drop-down menu and enter the port or range of ports in the provided boxes.
Chapter 16 Bandwidth Management 16.5.2 User Defined Service Rule Configuration If you want to edit a bandwidth management rule for specific protocols on an IP or IP range, click the Edit icon in the Bandwidth Allocation table of the Advanced screen. The following screen displays. Figure 85 Management > Bandwidth MGMT > Advanced: Allocation Setup The following table describes the labels in this screen.
Chapter 16 Bandwidth Management 16.5.3 Predefined Bandwidth Management Services The following is a description of the services that you can select and to which you can apply media bandwidth management in the Management > Bandwidth MGMT > Advanced screen. Table 58 Media Bandwidth Management Setup: Services SERVICE DESCRIPTION FTP File Transfer Program enables fast transfer of files, including large files that may not be possible by e-mail. FTP uses port number 21.
C HAPTER 17 Remote Management 17.1 Overview This chapter provides information on the Remote Management screens. Remote management allows you to determine which services/protocols can access which NBG417N interface (if any) from which computers. You may manage your NBG-417N from a remote location via: • LAN only • LAN and WAN Note: When you configure remote management to allow management from the LAN and WAN in the options above, you still need to configure a firewall rule to allow access.
Chapter 17 Remote Management 17.3.1 Remote Management Limitations Remote management over LAN or WAN will not work when: 1 You have disabled that service in one of the remote management screens. 2 The IP address in the Secured Client IP Address field does not match the client IP address. If it does not match, the NBG-417N will disconnect the session immediately. 3 There is already another remote management session with an equal or higher priority running.
Chapter 17 Remote Management Table 59 Management > Remote MGMT > WWW LABEL DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Server Access Select the interface(s) through which a computer may access the NBG-417N using this service. Secured Client IP Address A secured client is a “trusted” computer that is allowed to communicate with the NBG-417N using this service.
C HAPTER 18 Universal Plug-and-Play (UPnP) 18.1 Overview This chapter introduces the UPnP feature in the Web Configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.
Chapter 18 Universal Plug-and-Play (UPnP) Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. When a UPnP device joins a network, it announces its presence with a multicast message. For security reasons, the NBG-417N allows multicast messages on the LAN only.
Chapter 18 Universal Plug-and-Play (UPnP) 18.5 Technical Reference The sections show examples of using UPnP. 18.5.1 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the NBG-417N. Make sure the computer is connected to a LAN port of the NBG-417N. Turn on your computer and the NBG-417N. 18.5.1.1 Auto-discover Your UPnP-enabled Network Device 1 Click start and Control Panel.
Chapter 18 Universal Plug-and-Play (UPnP) 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 89 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings.
Chapter 18 Universal Plug-and-Play (UPnP) 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 92 System Tray Icon 6 Double-click on the icon to display your current Internet connection status. Figure 93 Internet Connection Status 18.5.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG-417N without finding out the IP address of the NBG-417N first.
Chapter 18 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 94 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your NBG-417N and select Invoke. The Web Configurator login screen displays.
Chapter 18 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your NBG-417N and select Properties. A properties window displays with basic information about the NBG-417N.
C HAPTER 19 System 19.1 Overview This chapter provides information on the System screens. See the chapter about wizard setup for more information on the next few screens. 19.2 What You Can Do • Use the General screen (Section 19.3 on page 153) to enter a name to identify the NBG-417N in the network and set the password. • Use the Time Setting screen (Section 19.4 on page 155) to change your NBG-417N’s time and date. 19.
Chapter 19 System The following table describes the labels in this screen. Table 61 Maintenance > System > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the NBG-417N in an Ethernet network. It is recommended you enter your computer’s “Computer name” in this field (see the chapter about wizard setup for how to find your computer’s name). This name can be up to 30 alphanumeric characters long.
Chapter 19 System 19.4 Time Setting Screen To change your NBG-417N’s time and date, click Maintenance > System > Time Setting. The screen appears as shown. Use this screen to configure the NBG-417N’s time based on your local time zone. Figure 98 Maintenance > System > Time Setting he following table describes the labels in this screen. Table 62 Maintenance > System > Time Setting LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NBG-417N.
Chapter 19 System Table 62 Maintenance > System > Time Setting LABEL DESCRIPTION New Date This field displays the last updated date from the time server or the last date configured manually. (yyyy/mm/dd) When you set Time and Date Setup to Manual, enter the new date in this field and then click Apply. Get from Time Server Select this radio button to have the NBG-417N get the time and date from the time server you specified below.
C HAPTER 20 Logs 20.1 Overview This chapter contains information about configuring general log settings and viewing the NBG417N’s logs. The Web Configurator allows you to look at all of the NBG-417N’s logs in one location. 20.2 What You Can Do Use the View Log screen (Section 20.4 on page 157) to see the logs for the categories such as system maintenance, system errors, access control, allowed or blocked web sites, blocked web features, and so on. 20.
Chapter 20 Logs Click Maintenance > Logs to open the View Log screen. Figure 99 Maintenance > Logs > View Log The following table describes the labels in this screen. Table 63 Maintenance > Logs > View Log 158 LABEL DESCRIPTION Refresh Click Refresh to renew the log screen. Clear Log Click Clear Log to delete all the logs. # This is the index number of the log entry. Time This field displays the time the log was recorded.
C HAPTER 21 Tools 21.1 Overview This chapter shows you how to upload a new firmware, upload or save backup configuration files and restart the NBG-417N. 21.2 What You Can Do • Use the Firmware screen (Section 21.3 on page 159) to upload firmware to your NBG-417N. • Use the Configuration screen (Section 21.4 on page 161) to view information related to factory defaults, backup configuration, and restoring configuration. • Use the Restart screen (Section 21.5 on page 163) to have the NBG-417N reboot. 21.
Chapter 21 Tools The following table describes the labels in this screen. Table 64 Maintenance > Tools > Firmware LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Upload to begin the upload process. This process may take up to two minutes.
Chapter 21 Tools 21.4 Configuration Screen Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 104 Maintenance > Tools > Configuration 21.4.1 Backup Configuration Backup configuration allows you to back up (save) the NBG-417N’s current configuration to a file on your computer.
Chapter 21 Tools After you see a “configuration upload successful” screen, you must then wait one minute before logging into the NBG-417N again. Figure 105 Configuration Restore Successful The NBG-417N automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.
Chapter 21 Tools 21.5 Restart Screen System restart allows you to reboot the NBG-417N without turning the power off. Click Maintenance > Tools > Restart. Click Restart to have the NBG-417N reboot. This does not affect the NBG-417N's configuration.
C HAPTER 22 Sys OP Mode 22.1 Overview The Sys OP Mode (System Operation Mode) function lets you configure whether your NBG-417N is a router or AP. You can choose between Router Mode and AP Mode depending on your network topology and the features you require from your device. See Section 1.1 on page 21 for more information on which mode to choose. 22.2 What You Can Do Use the General screen (Section 22.4 on page 165) to select how you connect to the Internet. 22.
Chapter 22 Sys OP Mode AP An AP extends one network and so has just one IP address. All Ethernet ports on the AP have the same IP address. To connect to the Internet, another device, such as a router, is required. Figure 110 IP Address in AP Mode 22.4 General Screen Use this screen to select how you connect to the Internet. Figure 111 Maintenance > Sys OP Mode > General If you select Router Mode, the following pop-up message window appears.
Chapter 22 Sys OP Mode If you select Access Point the following pop-up message window appears. Figure 113 Maintenance > Sys Op Mode > General: AP • In AP Mode all Ethernet ports have the same IP address. • All ports on the rear panel of the device are LAN ports, including the port labeled WAN. There is no WAN port. • The DHCP server on your device is disabled. In AP mode there must be a device with a DHCP server on your network such as a router or gateway which can allocate IP addresses.
C HAPTER 23 Language 23.1 Language Screen Use this screen to change the language for the Web Configurator display. Click the language you prefer. The Web Configurator language changes after a while without restarting the NBG-417N.
Chapter 23 Language 168 NBG-417N User’s Guide
C HAPTER 24 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG-417N Access and Login • Internet Access • Resetting the NBG-417N to Its Factory Defaults • Wireless Router/AP Troubleshooting 24.1 Power, Hardware Connections, and LEDs The NBG-417N does not turn on. None of the LEDs turn on.
Chapter 24 Troubleshooting 24.2 NBG-417N Access and Login I don’t know the IP address of my NBG-417N. 1 The default IP address is 192.168.1.1. 2 If you changed the IP address and have forgotten it, you might get the IP address of the NBG-417N by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig.
Chapter 24 Troubleshooting 2 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 3 Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java enabled. See Appendix B on page 189. 4 Make sure your computer is in the same subnet as the NBG-417N. (If you know that there are routers between your computer and the NBG-417N, skip this step.
Chapter 24 Troubleshooting 2 Make sure you entered your ISP account information correctly in the wizard. These fields are casesensitive, so make sure [Caps Lock] is not on. 3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP. • Go to Network > Wireless LAN > General > WDS and check if the NBG-417N is set to bridge mode. Select Disable and try to connect to the Internet again.
Chapter 24 Troubleshooting 24.4 Resetting the NBG-417N to Its Factory Defaults If you reset the NBG-417N, you lose all of the changes you have made. The NBG-417N re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the RESET button. To reset the NBG-417N, 1 Make sure the power LED is on. 2 Press the RESET button for longer than 1 second to restart/reboot the NBG-417N.
Chapter 24 Troubleshooting to select Router Mode. I set up URL keyword blocking, but I can still access a website that should be blocked. Make sure that you select the Enable URL Keyword Blocking check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Keyword List. If a keyword that is listed in the Keyword List is not blocked when it is found in a URL, customize the keyword blocking using commands.
C HAPTER 25 Product Specifications The following tables summarize the NBG-417N’s hardware and firmware features. Table 67 Hardware Features Dimensions (W x D x H) 140 mm x 110 mm x 30 mm Weight 190 g Power Specification Input: 120~240 AC, 50~60 Hz Output: 12 V DC 1A Ethernet ports Auto-negotiating: 10 Mbps, 100 Mbps in either half-duplex or full-duplex mode. Auto-crossover: Use either crossover or straight-through Ethernet cables.
Chapter 25 Product Specifications Table 68 Firmware Features FEATURE DESCRIPTION Default Wireless SSID ZyXEL Device Management Use the Web Configurator to easily configure the rich range of features on the NBG-417N. Wireless Functionality Allows IEEE 802.11b and/or IEEE 802.11g wireless clients to connect to the NBG-417N wirelessly. Enable wireless security ( WPA(2)-PSK) and/or MAC filtering to protect your wireless network.
Chapter 25 Product Specifications Table 68 Firmware Features FEATURE DESCRIPTION IP Multicast IP Multicast is used to send traffic to a specific group of computers. The NBG-417N supports versions 1 and 2 of IGMP (Internet Group Management Protocol) used to join multicast groups (see RFC 2236). Logging Use logs for troubleshooting. You can view logs in the Web Configurator. PPPoE PPPoE mimics a dial-up Internet access connection.
Chapter 25 Product Specifications 178 NBG-417N User’s Guide
A PPENDIX A IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 115 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix A IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 70 Subnet Masks BINARY DECIMAL 1ST OCTET 2ND OCTET 3RD OCTET 4TH OCTET 8-bit mask 11111111 00000000 00000000 00000000 255.0.0.0 16-bit mask 11111111 11111111 00000000 00000000 255.255.0.0 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.
Appendix A IP Addresses and Subnetting Table 72 Alternative Subnet Mask Notation (continued) SUBNET MASK ALTERNATIVE NOTATION LAST OCTET (BINARY) LAST OCTET (DECIMAL) 255.255.255.224 /27 1110 0000 224 255.255.255.240 /28 1111 0000 240 255.255.255.248 /29 1111 1000 248 255.255.255.252 /30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two subnetworks, A and B. Figure 117 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix A IP Addresses and Subnetting Table 73 Subnet 1 (continued) IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.1 Broadcast Address: 192.168.1.63 Highest Host ID: 192.168.1.62 LAST OCTET BIT VALUE Table 74 Subnet 2 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 64 IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.
Appendix A IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 77 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
Appendix A IP Addresses and Subnetting Table 79 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 13 255.255.255.248 (/29) 8192 6 14 255.255.255.252 (/30) 16384 2 15 255.255.255.254 (/31) 32768 1 Configuring IP Addresses Where you obtain your network number depends on your particular situation.
Appendix A IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
Appendix A IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port.
A PPENDIX B Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 122 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 190 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 123 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 124 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 125 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 126 Security Settings - Java Scripting Java Permissions 194 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 127 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window. Figure 128 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 130 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 131 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the leftside menu. Select the check boxes as shown in the following screen.
Appendix B Pop-up Windows, JavaScripts and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 133 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 200 NBG-417N User’s Guide
A PPENDIX C Setting Up Your Computer’s IP Address Note: Your specific NBG-417N may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
Appendix C Setting Up Your Computer’s IP Address 202 1 Click Start > Control Panel. 2 In the Control Panel, click the Network Connections icon. 3 Right-click Local Area Connection and then select Properties.
Appendix C Setting Up Your Computer’s IP Address 4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Appendix C Setting Up Your Computer’s IP Address 5 The Internet Protocol TCP/IP Properties window opens. 6 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix C Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. 1 Click Start > Control Panel. 2 In the Control Panel, click the Network and Internet icon. 3 Click the Network and Sharing Center icon.
Appendix C Setting Up Your Computer’s IP Address 4 Click Manage network connections. 5 Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix C Setting Up Your Computer’s IP Address 6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix C Setting Up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 8 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix C Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. 1 Click Start > Control Panel. 2 In the Control Panel, click View network status and tasks under the Network and Internet category. 3 Click Change adapter settings.
Appendix C Setting Up Your Computer’s IP Address 4 Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
Appendix C Setting Up Your Computer’s IP Address 5 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Appendix C Setting Up Your Computer’s IP Address 6 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. 7 Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
Appendix C Setting Up Your Computer’s IP Address 3 The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. 1 Click Apple > System Preferences.
Appendix C Setting Up Your Computer’s IP Address 214 2 In the System Preferences window, click the Network icon. 3 When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure.
Appendix C Setting Up Your Computer’s IP Address 4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. 5 For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. • In the Router field, type the IP address of your device. 6 Click Apply Now and close the window.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 134 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 1 216 Click Apple > System Preferences.
Appendix C Setting Up Your Computer’s IP Address 2 In System Preferences, click the Network icon. 3 When the Network preferences pane opens, select Ethernet from the list of available connection types. 4 From the Configure list, select Using DHCP for dynamically assigned settings.
Appendix C Setting Up Your Computer’s IP Address • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. • In the Router field, enter the IP address of your NBG-417N. 6 218 Click Apply and close the window.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 135 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
Appendix C Setting Up Your Computer’s IP Address 220 2 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. 3 In the Authenticate window, enter your admin account name and password then click the Authenticate button.
Appendix C Setting Up Your Computer’s IP Address 4 In the Network Settings window, select the connection that you want to configure, then click Properties. 5 The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields.
Appendix C Setting Up Your Computer’s IP Address 222 7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. 8 Click the Close button to apply the changes.
Appendix C Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 136 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.
Appendix C Setting Up Your Computer’s IP Address 224 1 Click K Menu > Computer > Administrator Settings (YaST). 2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Appendix C Setting Up Your Computer’s IP Address 3 When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. 4 When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
Appendix C Setting Up Your Computer’s IP Address 5 When the Network Card Setup window opens, click the Address tab Figure 137 openSUSE 10.3: Network Card Setup 6 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. 7 226 Click Next to save the changes and close the Network Card Setup window.
Appendix C Setting Up Your Computer’s IP Address 8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. 9 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 138 openSUSE 10.
Appendix C Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly.
A PPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 141 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 142 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
Appendix D Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 143 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Appendix D Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver. Short and long refer to the length of the synchronization field in a packet.
Appendix D Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your NBG-417N. Table 81 Wireless Security Levels SECURITY LEVEL Least Secure SECURITY TYPE Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.
Appendix D Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access.
Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses.
Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
Appendix D Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
Appendix D Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system. 1 The AP passes the wireless client's authentication request to the RADIUS server.
Appendix D Wireless LANs 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 145 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
Appendix D Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz or 5GHz is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area. Antenna Gain Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Appendix D Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area.
A PPENDIX E Services The following table lists some commonly-used services and their associated protocols and port numbers. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service. If this is TCP/UDP, then the service uses the same port number with TCP and UDP. If this is User-Defined, the Port(s) is the IP protocol number, not the port number.
Appendix E Services Table 84 Examples of Services (continued) 244 NAME PROTOCOL PORT(S) DESCRIPTION HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined 1 Internet Control Message Protocol is often used for diagnostic purposes. ICQ UDP 4000 This is a popular Internet chat program. IGMP (MULTICAST) User-Defined 2 Internet Group Multicast Protocol is used when sending packets to a specific group of hosts.
Appendix E Services Table 84 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web. REXEC TCP 514 Remote Execution Daemon. RLOGIN TCP 513 Remote Login. ROADRUNNER TCP/UDP 1026 This is an ISP that provides services mainly for cable modems. RTELNET TCP 107 Remote Telnet.
Appendix E Services 246 NBG-417N User’s Guide
A PPENDIX F Open Software Announcements End-User License Agreement for "NBG-417N" WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix F Open Software Announcements The Software and Documentation contain material that is protected by international copyright law, trade secret law, international treaty provisions, and the applicable national laws of each respective country. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4.
Appendix F Open Software Announcements THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.
Appendix F Open Software Announcements Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.
Appendix F Open Software Announcements authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
Appendix F Open Software Announcements 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
Appendix F Open Software Announcements operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code. 4.
Appendix F Open Software Announcements "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation. 10.
Appendix F Open Software Announcements Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1. Preamble The licenses for most software are designed to take away your freedom to share and change it.
Appendix F Open Software Announcements criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library. We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries.
Appendix F Open Software Announcements 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library.
Appendix F Open Software Announcements in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables.
Appendix F Open Software Announcements 7.
Appendix F Open Software Announcements 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
Appendix F Open Software Announcements Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
Appendix F Open Software Announcements Mark Adler madler@alumni.caltech.edu ZLIB is third party library and has its own license. files under src/acdk/vfile/zlib are published under following Copyright and license: zlib.h -- interface of the 'zlib' general purpose compression library version 1.1.3, July 9th, 1998 Copyright (C) 1995-1998 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty.
Appendix F Open Software Announcements Preamble The GNU General Public License is a free, copyleft license for software and other kinds of works. The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
Appendix F Open Software Announcements 0. Definitions. "This License" refers to version 3 of the GNU General Public License. "Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks. "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals or organizations.
Appendix F Open Software Announcements Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work. The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
Appendix F Open Software Announcements You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions: a) The work must carry prominent notices stating that you modified it, and giving a relevant date. b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7.
Appendix F Open Software Announcements Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements. e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.
Appendix F Open Software Announcements When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.
Appendix F Open Software Announcements Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
Appendix F Open Software Announcements In the following three paragraphs, a "patent license" is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To "grant" such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.
Appendix F Open Software Announcements The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
Appendix F Open Software Announcements 272 NBG-417N User’s Guide
A PPENDIX G Legal Information Copyright Copyright © 2011 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix G Legal Information 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. 4 Consult the dealer or an experienced radio/TV technician for help. FCC Radiation Exposure Statement • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. • IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to channels 1 through 11.
Appendix G Legal Information 立 率 療 不 輻 不 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Appendix G Legal Information Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com. Regulatory Information European Union The following information applies if you use the product within the European Union. Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Compliance Information for 2.
Appendix G Legal Information [Slovenian] ZyXEL izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/EC. [Slovak] ZyXEL týmto vyhlasuje, že zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/EC. [Finnish] ZyXEL vakuuttaa täten että laitteet tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen.
Appendix G Legal Information 2400-2483.5 100 5150-5350 200 5470-5725 1000 V V V Belgium The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any outdoor wireless link having a range exceeding 300 meters. Please check http://www.bipt.be for more details. Draadloze verbindingen voor buitengebruik en met een reikwijdte van meer dan 300 meter dienen aangemeld te worden bij het Belgisch Instituut voor postdiensten en telecommunicatie (BIPT). Zie http://www.bipt.
Appendix G Legal Information fondo, l'utilizzo di prodotti Wireless LAN richiede una “Autorizzazione Generale”. Consultare http:// www.sviluppoeconomico.gov.it/ per maggiori dettagli. Latvia The outdoor usage of the 2.4 GHz band requires an authorization from the Electronic Communications Office. Please check http://www.esd.lv for more details. 2.4 GHz frekvenèu joslas izmantoðanai ârpus telpâm nepiecieðama atïauja no Elektronisko sakaru direkcijas. Vairâk informâcijas: http://www.esd.lv. Notes: 1.
Appendix G Legal Information 280 NBG-417N User’s Guide
Index I ndex A Address Assignment 92 Advanced Encryption Standard See AES.
Index Domain name 36 vs host name. see also system name G Domain Name System 109 gateway 134 Domain Name System. See DNS.
Index LAN overview 103 Network Address Translation 113, 114 LAN setup 103 LAN TCP/IP 104 Language 167 Link type 29, 51 local (user) database 71 and encryption 72 O Operating Channel 29, 51 operating mode 21 Local Area Network 103 Log 157 P M P2P 142 Pairwise Master Key (PMK) 238, 239 MAC 77 peer-to-peer 142 MAC address 70, 92 cloning 45, 92 Point-to-Point Protocol over Ethernet 40, 96 MAC address filter 70 MAC address filtering 77 MAC filter 77 managing the device good habits 22 using the Web Co
Index RADIUS server 71 Wireless station status 33 registration product 276 syntax conventions 5 related documentation 3 System General Setup 153 Remote management 143 and NAT 144 and the firewall 143 limitations 144 remote management session 143 system timeout 144 System Name 154 Sys Op Mode 164 System name 36 vs computer name System restart 163 Reset button 27, 162 Reset the device 27 T Restore configuration 161 RF (Radio Frequency) 176 TCP/IP configuration 107 Roaming 78 Temperature 175 R
Index IP address assignment 43 security parameters 240 WAN (Wide Area Network) 91 World Wide Web 142 WAN advanced 100 WPA 237 key caching 238 pre-authentication 238 user authentication 238 vs WPA-PSK 238 wireless client supplicant 238 with RADIUS application example 239 WAN IP address 43 WAN IP address assignment 44 WAN MAC address 92 warranty 275 note 275 Web Configurator 22 how to access 25 Overview 25 WPA compatible 72 WEP Encryption 75 WPA2 237 user authentication 238 vs WPA2-PSK 238 wireless
Index 286 NBG-417N User’s Guide