ZyXEL Communications 802.11g Wireless Access Point ZyXEL G-560 User Manual

802.11g wireless access point
Hide thumbs Also See for 802.11g Wireless Access Point ZyXEL G-560:
Table of Contents

Advertisement

Quick Links

ZyXEL G-560
802.11g Wireless Access Point
User's Guide
Version 3.0
9/2005

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications 802.11g Wireless Access Point ZyXEL G-560

  • Page 1 ZyXEL G-560 802.11g Wireless Access Point User’s Guide Version 3.0 9/2005...
  • Page 3: Copyright

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 4: Federal Communications Commission (Fcc) Interference Statement

    ZyXEL G-560 User’s Guide Federal Communications Commission (FCC) Interference This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
  • Page 5 ZyXEL G-560 User’s Guide Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Certifications 1 Go to www.zyxel.com. 2 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
  • Page 6: Safety Warnings

    ZyXEL G-560 User’s Guide For your safety, be sure to read and follow all warning notices and instructions. • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device.
  • Page 7: Zyxel Limited Warranty

    ZyXEL G-560 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever...
  • Page 8: Customer Support

    +47 22 80 61 81 +34 902 195 420 www.zyxel.es +34 913 005 345 +46 31 744 7700 www.zyxel.se +46 31 744 7701 REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská...
  • Page 9 TELEPHONE WEB SITE FTP SITE +44 (0) 1344 303044 www.zyxel.co.uk 08707 555779 (UK only) +44 (0) 1344 303034 ftp.zyxel.co.uk ZyXEL G-560 User’s Guide REGULAR MAIL ZyXEL Communications UK Ltd.,11 The Courtyard, Eastern Road, Bracknell, Berkshire, RG12 2XB, United Kingdom (UK)
  • Page 10 ZyXEL G-560 User’s Guide Customer Support...
  • Page 11: Table Of Contents

    Copyright ... 3 Federal Communications Commission (FCC) Interference Statement ... 4 Safety Warnings ... 6 ZyXEL Limited Warranty... 7 Customer Support... 8 Table of Contents ... 11 List of Figures ... 15 List of Tables ... 19 Preface ... 21 Chapter 1 Getting to Know Your G-560...
  • Page 12 ZyXEL G-560 User’s Guide Chapter 3 Introducing the Web Configurator... 37 3.1 Web Configurator Overview ...37 3.2 Accessing the G-560 Web Configurator ...37 3.3 Configuring the G-560 Using the Wizard ...39 3.3.1 Basic Settings ...39 3.3.2 Wireless Settings ...40 3.3.3 Security Settings ...41 3.3.3.1 Disable ...41 3.3.3.2 WEP ...42 3.3.3.3 WPA-PSK ...43...
  • Page 13 6.4.1 Access Point Mode ...58 6.4.2 Access Point + Bridge Mode ...61 6.4.2.1 Bridge Loop ...61 6.4.2.2 Configuring Access Point + Bridge Mode ...63 6.5 Wireless Security Overview ...66 6.5.1 Encryption ...67 6.5.2 Authentication ...67 6.5.3 Restricted Access ...67 6.5.4 Hide G-560 Identity ...67 6.6 WEP Overview ...67 6.6.1 Data Encryption ...67 6.6.2 Authentication ...67...
  • Page 14 ZyXEL G-560 User’s Guide 7.4 Configuration Screen ...87 7.4.1 Backup Configuration ...88 7.4.2 Restore Configuration ...88 7.4.3 Back to Factory Defaults ...89 7.5 F/W Upload Screen ...90 7.6 Language Screen ...91 Chapter 8 Troubleshooting ... 93 8.1 Problems Starting Up the G-560 ...93 8.2 Problems with the Password ...93 8.3 Problems with the WLAN Interface ...94 8.4 Problems with the Ethernet Interface ...94...
  • Page 15: List Of Figures

    ZyXEL G-560 User’s Guide List of Figures Figure 1 WDS Functionality Example ... 23 Figure 2 Internet Access Application ... 26 Figure 3 Corporation Network Application ... 27 Figure 4 AP+Bridge Application ... 28 Figure 5 Front Panel ... 28 Figure 6 Wired Connection ...
  • Page 16 ZyXEL G-560 User’s Guide Figure 39 WPA(2)-PSK Authentication ... 72 Figure 40 WPA with RADIUS Application Example ... 73 Figure 41 Wireless Security: Disable ... 74 Figure 42 Wireless Security: WEP ... 75 Figure 43 Wireless Security: WPA-PSK ... 76 Figure 44 Wireless Security: WPA ...
  • Page 17 ZyXEL G-560 User’s Guide Figure 82 Windows XP: Internet Protocol (TCP/IP) Properties ... 109 Figure 83 Windows XP: Advanced TCP/IP Properties ... 110 Figure 84 Windows XP: Internet Protocol (TCP/IP) Properties ... 111 Figure 85 Macintosh OS 8/9: Apple Menu ... 112 Figure 86 Macintosh OS 8/9: TCP/IP ...
  • Page 18 ZyXEL G-560 User’s Guide List of Figures...
  • Page 19: List Of Tables

    ZyXEL G-560 User’s Guide List of Tables Table 1 Front Panel LED Description ... 28 Table 2 Factory Defaults ... 35 Table 3 Status ... 46 Table 4 Status: View Statistics ... 47 Table 5 Status: View Association List ... 48 Table 6 Private IP Address Ranges ...
  • Page 20 ZyXEL G-560 User’s Guide Table 39 Subnet 2 ... 137 Table 40 Subnet 3 ... 137 Table 41 Subnet 4 ... 138 Table 42 Eight Subnets ... 138 Table 43 Class C Subnet Planning ... 138 Table 44 Class B Subnet Planning ... 139 List of Tables...
  • Page 21: Preface

    Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you! Syntax Conventions •...
  • Page 22 ZyXEL G-560 User’s Guide • The ZyXEL G-560 802.11g Wireless Access Point may be referred to simply as the G- 560 in the user's guide. Graphics Icons Key G-560 Server Telephone Computer Notebook computer Modem Wireless Signal Switch Router Preface...
  • Page 23: Getting To Know Your G-560

    Getting to Know Your G-560 This chapter introduces the main features and applications of the G-560. 1.1 Introducing the G-560 Wireless Access Point The G-560 is an access point (AP) through which wireless stations can communicate and/or access a wired network. It can also work as a bridge to extend your wireless network. The G- 560 uses IEEE 802.1x, WEP data encryption, WPA (Wi-Fi Protected Access), WPA2 and MAC address filtering to give mobile users highly secured wireless connectivity.
  • Page 24: Reset Button

    ZyXEL G-560 User’s Guide OTIST (One-Touch Intelligent Security Technology) OTIST allows your G-560 to assign its SSID and security settings (WEP or WPA-PSK) to the ZyXEL wireless adapters that support OTIST and are within transmission range. The ZyXEL wireless adapters must also have OTIST enabled. 10/100M Auto-negotiating Ethernet/Fast Ethernet Interface This auto-negotiating feature allows the G-560 to detect the speed of incoming transmissions and adjust appropriately without manual intervention.
  • Page 25: Ssl Passthrough

    SSL Passthrough The G-560 allows SSL connections to go through the G-560. SSL (Secure Sockets Layer) uses a public key to encrypt data that's transmitted over an SSL connection. Both Netscape Navigator and Internet Explorer support SSL, and many Web sites use the protocol to obtain confidential user information, such as credit card numbers.
  • Page 26: Applications For The G-560

    ZyXEL G-560 User’s Guide Limit the Number of Client Connections You may set a maximum number of wireless stations that may connect to the G-560. This may be necessary if for example, there is interference or difficulty with channel assignment due to a high density of APs within a coverage area.
  • Page 27: Access Point + Bridge

    Figure 3 Corporation Network Application 1.3.2 Access Point + Bridge In Access Point + Bridge mode, the G-560 supports both AP (A and B can connect to the wired network through X) and bridge (X can communicate with Y) connection at the same time.
  • Page 28: The Led Display

    ZyXEL G-560 User’s Guide Figure 4 AP+Bridge Application 1.4 The LED Display Figure 5 Front Panel The following table describes the LEDs on the G-560. Table 1 Front Panel LED Description COLOR Green ETHN Green Amber STATUS DESCRIPTION Blinking The G-560 is not ready or rebooting. The G-560 has a successful reboot and is receiving power.
  • Page 29 Table 1 Front Panel LED Description COLOR OTIST Green WLAN Green Chapter 1 Getting to Know Your G-560 STATUS DESCRIPTION Blinking The OTIST automatic wireless configuration is in progress. The OTIST feature is activated on the G-560. The OTIST feature is not activated or activated but the wireless settings are changed again.
  • Page 30 ZyXEL G-560 User’s Guide Chapter 1 Getting to Know Your G-560...
  • Page 31: Management Computer Setup

    Management Computer Setup This chapter describes how to prepare your computer to access the G-560 web configurator. 2.1 Introduction You can connect a computer to the G-560 for management purposes either using an Ethernet connection (recommended for a first time management session) or wirelessly. 2.2 Wired Connection You must prepare your computer/computer network to connect to the G-560 if you are using a wired connection.
  • Page 32: Windows 2000/Nt/Xp

    ZyXEL G-560 User’s Guide 2.2.1.1 Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. 1 Click start (Start in Windows 2000/NT) > Settings > Control Panel. 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT).
  • Page 33: Figure 9 Local Area Connection Properties

    Figure 9 Local Area Connection Properties 5 Select Use the following IP Address and fill in an IP address (between 192.168.1.3 and 192.168.1.254). • Type 255.255.255.0 as the Subnet mask. • Click Advanced Figure 10 Internet Protocol Properties 6 Remove any previously installed gateways in the IP Settings tab and click OK to go back to the Internet Protocol TCP/IP Properties screen.
  • Page 34: Wireless Connection

    ZyXEL G-560 User’s Guide Figure 11 Advanced TCP/IP Settings 7 Click OK to close the Internet Protocol (TCP/IP) Properties window. 8 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 9 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
  • Page 35: Resetting The G-560

    Note: The wireless stations and G-560 must use the same SSID, channel and wireless security settings for wireless communication. If you do not enable any wireless security on your G-560, your network traffic is visible to any wireless networking device that is within range. 2.4 Resetting the G-560 If you forget the G-560's IP address or your password, to access the G-560, you will need to reload the factory-default using the RESET button.
  • Page 36 ZyXEL G-560 User’s Guide Chapter 2 Management Computer Setup...
  • Page 37: Introducing The Web Configurator

    This chapter describes how to configure the G-560 using the Wizard. 3.1 Web Configurator Overview The web configurator is an HTML-based management interface that allows easy G-560 setup and management via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions.
  • Page 38: Figure 13 Welcome Screen

    ZyXEL G-560 User’s Guide Figure 13 Welcome Screen 6 You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore to allow access without password change. Note: If you do not change the password, the following screen appears every time you login.
  • Page 39: Configuring The G-560 Using The Wizard

    Figure 15 Status Screen Click LOGOUT at any time to exit the web configurator. Note: See the rest of this User's Guide for configuration details and background information on all G-560 features using the web configurator. 3.3 Configuring the G-560 Using the Wizard The wizard consists of a series of screens to help you configure your G-560 for wireless stations to access your wired LAN.
  • Page 40: Wireless Settings

    ZyXEL G-560 User’s Guide Enter a Subnet Mask appropriate to your network and the Gateway IP Address of the neighboring device, if you know it. If you do not, leave the Gateway IP Address field as 0.0.0.0. Figure 16 Wizard 1: Basic Settings Note: If you change the ZyXEL G-560's IP address, you must use the new IP address if you want to access the web configurator again.
  • Page 41: Security Settings

    Figure 17 Wizard 2: Wireless Settings 3.3.3 Security Settings Fill in the fields in the third wizard configuration screen. The screen varies depending on what you select in the Encryption Method field. Select Disable to have no wireless security configured, select WEP, or select WPA-PSK if your wireless clients support WPA-PSK. Go to SETTINGS >...
  • Page 42: Wep

    ZyXEL G-560 User’s Guide Figure 18 Setup Wizard 3: Disable 3.3.3.2 WEP 1 WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless network. Select 64-bit, 128-bit or 256-bit from the WEP Encryption drop- down list box and then follow the on-screen instructions to set up the WEP keys. 2 Choose an encryption level from the drop-down list.
  • Page 43: Wpa-Psk

    Figure 19 Wizard 3: WEP 3.3.3.3 WPA-PSK 1 Type a pre-shared key to have a more secure wireless connection. Choose this option only if your wireless clients support it. 2 Type from 8 to 63 ASCII characters (including spaces and symbols). This field is case- sensitive.
  • Page 44: Figure 21 Wizard 4: Confirm Your Settings

    ZyXEL G-560 User’s Guide Figure 21 Wizard 4: Confirm Your Settings For more detailed background information, see the rest of this User's Guide. Chapter 3 Introducing the Web Configurator...
  • Page 45: Chapter 4 Status Screens

    This chapter describes the Status screens. 4.1 System Status Click STATUS to display a snapshot of your G-560 settings. You can also view network statistics and a list of wireless stations currently associated with the G-560. Note that these labels are READ-ONLY and are meant to be used for diagnostic purposes. Figure 22 Status Chapter 4 Status Screens ZyXEL G-560 User’s Guide...
  • Page 46: Statistics

    ZyXEL G-560 User’s Guide The following table describes the labels in this screen. Table 3 Status LABEL DESCRIPTION Device Information Device Name This is the same as Device Name you entered in the first wizard screen if you entered one there. It is for identification purposes. Operation Mode This field shows whether the G-560 is functioning as an access point or an access point and bridge simultaneously.
  • Page 47: Association List

    Figure 23 Status: View Statistics The following table describes the labels in this screen. Table 4 Status: View Statistics LABEL DESCRIPTION Port This is the Ethernet or wireless port. TxPkts This is the number of transmitted packets on this port. RxPkts This is the number of received packets on this port.
  • Page 48: Table 5 Status: View Association List

    ZyXEL G-560 User’s Guide The following table describes the labels in this screen. Table 5 Status: View Association List LABEL DESCRIPTION This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station. Association Time This field displays the time a wireless station first associated with the G-560.
  • Page 49: Chapter 5 System Screens

    This chapter provides information on the System screens. 5.1 Factory Ethernet Defaults The Ethernet parameters of the G-560 are preset in the factory with the following values: • IP address of 192.168.1.2 • Subnet mask of 255.255.255.0 (24 bits) • Encryption: Disable These parameters should work for the majority of installations.
  • Page 50: Ip Address And Subnet Mask

    ZyXEL G-560 User’s Guide Note: Regardless of your particular situation, do not create an arbitrary IP address; always follow the guidelines above. For more information on address assignment, please refer to RFC 1597, Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP Address Space. 5.2.2 IP Address and Subnet Mask Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number.
  • Page 51: Figure 25 System Settings

    Figure 25 System Settings The following table describes the labels in this screen. Table 7 System Settings LABEL DESCRIPTION Device Name This name can be up to 30 printable characters long. Spaces are allowed. IP Address Assignment Obtain IP Address Select this option to have your G-560 use a dynamically assigned IP address from Automatically a router each time.
  • Page 52: Time Settings

    ZyXEL G-560 User’s Guide 5.4 Time Settings To change your G-560's time and date, click SETTINGS > SYSTEM > Time Settings. The screen appears as shown. Use this screen to manually enter a time and date. Log times and dates are based on the time and date you configure here. Figure 26 Time Settings The following table describes the labels in this screen.
  • Page 53: Chapter 6 Wireless Screens

    This chapter discusses how to configure wireless settings and wireless security on your G-560. 6.1 Wireless LAN Overview This section introduces the wireless LAN (WLAN) and some basic scenarios. 6.1.1 IBSS An Independent Basic Service Set (IBSS), also called an Ad-hoc network, is the simplest WLAN configuration.
  • Page 54: Ess

    ZyXEL G-560 User’s Guide Figure 28 Basic Service set 6.1.3 ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS).
  • Page 55: Wireless Lan Basics

    Figure 29 Extended Service Set 6.2 Wireless LAN Basics This section describes the wireless LAN network terms. 6.2.1 Channel A channel is the radio frequency(ies) used by IEEE 802.11b wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
  • Page 56: Rts/Cts

    ZyXEL G-560 User’s Guide 6.2.3 RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot “hear”...
  • Page 57: Fragmentation Threshold

    6.2.4 Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the G-560 will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 58: Tos (Type Of Service) And Wmm Qos

    ZyXEL G-560 User’s Guide Table 9 WMM QoS Priorities PRIORITY LEVELS: 6.3.3 ToS (Type of Service) and WMM QoS ToS defines the DS(Differentiated Service) field in the IP packet header. The ToS value of outgoing packets is between 0 and 255. 0 is the lowest priority. WMM QoS checks the ToS in the header of transmitted data packets.
  • Page 59: Figure 31 Wireless Settings: Access Point

    Figure 31 Wireless Settings: Access Point The following table describes the labels in this screen. Table 10 Wireless Settings: Access Point Operation Mode Select the operation mode from the drop-down list. The options are Access Point and Access Point + Bridge. SSID Wireless stations associating to the access point (AP) must have the same SSID.
  • Page 60 ZyXEL G-560 User’s Guide Table 10 Wireless Settings: Access Point (continued) Wireless Mode Select Pure B Mode to allow only IEEE 802.11b compliant WLAN devices to associate with the G-560. Select Pure G Mode to allow only IEEE 802.11g compliant WLAN devices to associate with the G-560.
  • Page 61: Access Point + Bridge Mode

    6.4.2 Access Point + Bridge Mode The G-560 can act as a wireless network bridge and establish up to four wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode.
  • Page 62: Figure 33 Bridge Loop: Two Bridges Connected To Hub

    ZyXEL G-560 User’s Guide Figure 33 Bridge Loop: Two Bridges Connected to Hub If your G-560 (in bridge mode) is connected to a wired LAN while communicating with another wireless bridge that is also connected to the same wired LAN as shown next. Figure 34 Bridge Loop: Bridges Connected to the Same Wired LAN If three or more G-560s (in bridge mode) are on different wired LANs but wirelessly connected to each other as shown next.
  • Page 63: Configuring Access Point + Bridge Mode

    Figure 35 Bridge Loop: Bridges on Different Wired LANs To prevent bridge loops, do not set the G-560 to bridge mode while connected to both wired and wireless segments of the same LAN. Also make sure that you do not have three or more G-560s (in bridge mode and on different wired LANs) wirelessly connect to each other.
  • Page 64: Figure 36 Wireless Settings: Access Point + Bridge

    ZyXEL G-560 User’s Guide Figure 36 Wireless Settings: Access Point + Bridge The following table describes the labels in this screen. Table 11 Wireless Settings: Access Point + Bridge Operation Mode Select the operation mode from the drop-down list. The options are Access Point and Access Point + Bridge.
  • Page 65 Table 11 Wireless Settings: Access Point + Bridge (continued) Channel Set the operating frequency/channel depending on your particular region. Select a channel from the drop-down list box. Refer to the chapter on wizard setup for more information about channels. Wireless Mode Select Pure B Mode to allow only IEEE 802.11b compliant WLAN devices to associate with the G-560.
  • Page 66: Wireless Security Overview

    ZyXEL G-560 User’s Guide Table 11 Wireless Settings: Access Point + Bridge (continued) Preamble Type Preamble is used to signal that data is coming to the receiver. Short preamble increases performance as less time sending preamble means more time for sending data. All IEEE 802.11b compliant wireless adapters support long preamble, but not all support short preamble.
  • Page 67: Encryption

    6.5.1 Encryption • Use WPA(2) security if you have WP(2)A-aware wireless clients and a RADIUS server. WPA(2) has user authentication and improved data encryption over WEP. • Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server. • If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A higher bit key offers better security at a throughput trade-off.
  • Page 68: Overview

    ZyXEL G-560 User’s Guide Figure 37 WEP Authentication Steps Open system authentication involves an unencrypted two-message procedure. A wireless station sends an open system authentication request to the AP, which will then automatically accept and connect the wireless station to the network. In effect, open system is not authentication at all as any station can gain access to the network.
  • Page 69: Introduction To Radius

    6.8 Introduction to RADIUS RADIUS is based on a client-sever model that supports authentication and accounting, where access point is the client and the server is the RADIUS server. The RADIUS server handles the following tasks among others: • Authentication Determines the identity of the users.
  • Page 70: Eap Authentication Overview

    ZyXEL G-560 User’s Guide 6.9 EAP Authentication Overview EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, the access point helps a wireless station and a RADIUS server perform authentication.
  • Page 71: Introduction To Wpa And Wpa2

    To use Dynamic WEP, enable and configure the RADIUS server and enable Dynamic WEP Key Exchange in the WIRELESS Security 802.1x screen. Ensure that the wireless station’s EAP type is configured to one of the following: • EAP-TLS • EAP-TTLS •...
  • Page 72: User Authentication

    ZyXEL G-560 User’s Guide 6.11.2 User Authentication WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. 6.12 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols).
  • Page 73: Security Parameters Summary

    generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. Figure 40 WPA with RADIUS Application Example 6.14 Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method/ key management protocol type.
  • Page 74: Wireless Client Wpa Supplicants

    ZyXEL G-560 User’s Guide Table 13 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL WPA2 WPA2-PSK 6.15 Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicants are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data Communications' AEGIS client.
  • Page 75: Wep

    The following table describes the labels in this screen. Table 14 Wireless Security: Disable LABEL DESCRIPTION Encryption Method Select Disable to have no wireless LAN security configured. Apply Click Apply to save your changes back to the G-560. Reset Click Reset to begin configuring this screen afresh. 6.16.2 WEP WEP provides a mechanism for encrypting data using encryption keys.
  • Page 76: Wpa-Psk/Wpa2-Psk/Mixed

    ZyXEL G-560 User’s Guide Table 15 Wireless Security: WEP LABEL DESCRIPTION Passphrase Enter a “passphrase” (password phrase) of up to 32 case-sensitive printable characters and click Generate to have the G-560 create four different WEP keys. Generate After you enter the passphrase, click Generate to have the G-560 generates four different WEP keys automatically.
  • Page 77: Wpa/Wpa2/Mixed

    The following table describes the labels in this screen. Table 16 Wireless Security: WPA-PSK LABEL DESCRIPTION Encryption Method Select WPA-PSK if you want to configure a pre-shared key but your wireless clients don’t support WPA2. Select WPA2-PSK if you want to configure a pre-shared key and your wireless clients support WPA2.
  • Page 78: Ieee 802.1X

    ZyXEL G-560 User’s Guide The following table describes the labels in this screen. Table 17 Wireless Security: WPA LABEL DESCRIPTION Encryption Method Select WPA to configure user authentication and improved data encryption if your wireless clients don’t support WPA2. Select WPA2 to configure user authentication and improved data encryption when your wireless clients support WPA2.
  • Page 79: Figure 45 Wireless Security: 802.1X

    Figure 45 Wireless Security: 802.1x The following table describes the labels in this screen. Table 18 Wireless Security: 802.1x LABEL DESCRIPTION Encryption Method Select 802.1x to configure authentication of wireless stations and encryption key management. Dynamic WEP Select Disable to allow wireless stations to communicate with the access points Key Exchange without using dynamic WEP key exchange.
  • Page 80: Mac Filter

    ZyXEL G-560 User’s Guide 6.17 MAC Filter The MAC filter screen allows you to configure the G-560 to give exclusive access to up to 32 devices (Allow Association) or exclude up to 32 devices from accessing the G-560 (Deny Association). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
  • Page 81: Introduction To Otist

    The following table describes the labels in this screen. Table 19 MAC Filter LABEL DESCRIPTION Active Select the check box to enable MAC address filtering and define the filter action for the list of MAC addresses in the MAC address filter table. Select Allow the following MAC address to associate to permit access to the G- 560, MAC addresses not listed will be denied access to the G-560.
  • Page 82: Wireless Client

    ZyXEL G-560 User’s Guide Hold in the Reset button for one or two seconds. Note: If you hold in the Reset button too long, the device will reset to the factory defaults! 6.18.1.1.2 Web Configurator Click WIRELESS > SETTINGS > OTIST to configure and enable OTIST. The screen appears as shown.
  • Page 83: Starting Otist

    Figure 48 Example Wireless Client OTIST Screen 6.18.2 Starting OTIST Note: You must click Start in the AP OTIST web configurator screen and in the wireless client(s) Adapter screen all within three minutes (at the time of writing). You can start OTIST in the wireless clients and AP in any order but they must all be within range and have OTIST enabled.
  • Page 84: Notes On Otist

    ZyXEL G-560 User’s Guide Figure 52 No AP with OTIST Found • If there is more than one OTIST-enabled AP within range, you see a screen asking you to select one AP to get settings from. 6.18.3 Notes on OTIST 1 If you enabled OTIST in the wireless client, you see this screen each time you start the utility.
  • Page 85: Chapter 7 Management Screens

    This chapter describes the Maintenance screens. 7.1 Maintenance Overview Use these maintenance screens to change the password, view logs, back up or restore the G- 560 configuration and change the web configurator language. 7.2 Configuring Password To change your G-560's password (recommended), click SETTINGS > MANAGEMENT. The screen appears as shown.
  • Page 86: Logs

    ZyXEL G-560 User’s Guide Table 21 Management: Password (continued) LABEL DESCRIPTION Retype to Confirm Retype your new system password for confirmation. Apply Click Apply to save your changes back to the G-560. Cancel Click Cancel to reload the previous configuration for this screen. 7.3 Logs The web configurator allows you to look at all of the G-560's logs in one location.
  • Page 87: Configuration Screen

    Table 22 Management: Logs (continued) LABEL DESCRIPTION Destination This field lists the destination IP address and the port number of the outgoing packet that caused the log. Note This field displays additional information about the log entry. 7.4 Configuration Screen The configuration file (often called the romfile or rom-0) contains the factory default settings such as password and TCP/IP Setup, etc.
  • Page 88: Backup Configuration

    ZyXEL G-560 User’s Guide 7.4.1 Backup Configuration Backup configuration allows you to back up (save) the G-560's current configuration to a file on your computer. Once your G-560 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
  • Page 89: Back To Factory Defaults

    Figure 58 Network Temporarily Disconnected If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default G-560 IP address (192.168.1.2). If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration File screen.
  • Page 90: F/W Upload Screen

    ZyXEL G-560 User’s Guide 7.5 F/W Upload Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a .bin extension, for example, "zyxel.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. Click SETTINGS >...
  • Page 91: Language Screen

    Figure 62 Firmware Upload In Process The G-560 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 63 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen.
  • Page 92: Figure 65 Management: Language

    ZyXEL G-560 User’s Guide Figure 65 Management: Language Chapter 7 Management Screens...
  • Page 93: Chapter 8 Troubleshooting

    This chapter covers potential problems and possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. 8.1 Problems Starting Up the G-560 Table 25 Troubleshooting the Start-Up of Your G-560 PROBLEM CORRECTIVE ACTION None of the LEDs...
  • Page 94: Problems With The Wlan Interface

    ZyXEL G-560 User’s Guide 8.3 Problems with the WLAN Interface Table 27 Troubleshooting the WLAN Interface PROBLEM Cannot access the G-560 from the WLAN. I cannot ping any computer on the WLAN. 8.4 Problems with the Ethernet Interface Table 28 Troubleshooting the Ethernet Interface PROBLEM I cannot access the G-560 from the LAN.
  • Page 95: Pop-Up Windows, Javascripts And Java Permissions

    Table 28 Troubleshooting the Ethernet Interface (continued) PROBLEM Cannot access the web configurator. 8.4.1 Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). •...
  • Page 96: Figure 66 Pop-Up Blocker

    ZyXEL G-560 User’s Guide Figure 66 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled.
  • Page 97: Figure 68 Internet Options

    ZyXEL G-560 User’s Guide Figure 68 Internet Options 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1. 4 Click Add to move the IP address to the list of Allowed sites. Chapter 8 Troubleshooting...
  • Page 98: Javascripts

    ZyXEL G-560 User’s Guide Figure 69 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. 8.4.1.2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 99: Figure 70 Internet Options

    ZyXEL G-560 User’s Guide Figure 70 Internet Options 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window.
  • Page 100: Java Permissions

    ZyXEL G-560 User’s Guide Figure 71 Security Settings - Java Scripting 8.4.1.3 Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window.
  • Page 101: Figure 72 Security Settings - Java

    Figure 72 Security Settings - Java 8.4.1.3.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Chapter 8 Troubleshooting ZyXEL G-560 User’s Guide...
  • Page 102: Testing The Connection To The G-560

    ZyXEL G-560 User’s Guide Figure 73 Java (Sun) 8.5 Testing the Connection to the G-560 1 Click Start, (All) Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type “ping” followed by a space and the IP address of the G-560 (192.168.1.2 is the default).
  • Page 103: Setting Up Your Computer's Ip Address

    Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
  • Page 104: Figure 75 Windows 95/98/Me: Network: Configuration

    ZyXEL G-560 User’s Guide Figure 75 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
  • Page 105: Figure 76 Windows 95/98/Me: Tcp/Ip Properties: Ip Address

    3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
  • Page 106: Figure 77 Windows 95/98/Me: Tcp/Ip Properties: Dns Configuration

    ZyXEL G-560 User’s Guide Figure 77 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • • 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your G-560 and restart your computer when prompted.
  • Page 107: Figure 78 Windows Xp: Start Menu

    Figure 78 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 79 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Appendix A Setting up Your Computer’s IP Address ZyXEL G-560 User’s Guide...
  • Page 108: Figure 80 Windows Xp: Control Panel: Network Connections: Properties

    ZyXEL G-560 User’s Guide Figure 80 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 81 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 109: Figure 82 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    • • Figure 82 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 110: Figure 83 Windows Xp: Advanced Tcp/Ip Properties

    ZyXEL G-560 User’s Guide Figure 83 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
  • Page 111: Figure 84 Windows Xp: Internet Protocol (Tcp/Ip) Properties

    Figure 84 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
  • Page 112: Figure 85 Macintosh Os 8/9: Apple Menu

    ZyXEL G-560 User’s Guide Figure 85 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 86 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. Appendix A Setting up Your Computer’s IP Address...
  • Page 113: Figure 87 Macintosh Os X: Apple Menu

    4 For statically assigned settings, do the following: • • • • 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration. 7 Turn on your G-560 and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the TCP/IP Control Panel window.
  • Page 114: Figure 88 Macintosh Os X: Network

    ZyXEL G-560 User’s Guide Figure 88 Macintosh OS X: Network 4 For statically assigned settings, do the following: • • • • 5 Click Apply Now and close the window. 6 Turn on your G-560 and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
  • Page 115: Figure 89 Red Hat 9.0: Kde: Network Configuration: Devices

    Note: Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. 1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network.
  • Page 116: Figure 91 Red Hat 9.0: Kde: Network Configuration: Dns

    ZyXEL G-560 User’s Guide • • 3 Click OK to save the changes and close the Ethernet Device General screen. 4 If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen. Enter the DNS server information in the fields provided. Figure 91 Red Hat 9.0: KDE: Network Configuration: DNS 5 Click the Devices tab.
  • Page 117: Figure 93 Red Hat 9.0: Dynamic Ip Address Setting In Ifconfig-Eth0

    1 Assuming that you have only one network card on the computer, locate the configuration file (where eth0 configuration file with any plain text editor. • Figure 93 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp USERCTL=no PEERDNS=yes TYPE=Ethernet...
  • Page 118: Figure 96 Red Hat 9.0: Restart Ethernet Card

    ZyXEL G-560 User’s Guide Figure 96 Red Hat 9.0: Restart Ethernet Card [root@localhost init.d]# network restart Shutting down interface eth0: Shutting down loopback interface: Setting network parameters: Bringing up loopback interface: Bringing up interface eth0: Verifying Settings Enter in a terminal screen to check your TCP/IP properties. ifconfig Figure 97 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig...
  • Page 119: Appendix B Wireless Lans

    Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 120: Figure 99 Basic Service Set

    ZyXEL G-560 User’s Guide Figure 99 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
  • Page 121: Figure 100 Infrastructure Wlan

    Figure 100 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
  • Page 122: Figure 101 Rts/Cts

    ZyXEL G-560 User’s Guide Figure 101 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 123: Table 29 Ieee802.11G

    A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
  • Page 124 ZyXEL G-560 User’s Guide • Authentication Determines the identity of the users. • Authorization Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless station and the network RADIUS server.
  • Page 125: Figure 102 Eap Authentication

    EAP Authentication EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the IEEE802.1x transport mechanism in order to support multiple types of user authentication. By using EAP to interact with an EAP-compatible RADIUS server, the access point helps a wireless station and a RADIUS server perform authentication.
  • Page 126: Wep Encryption

    ZyXEL G-560 User’s Guide However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication.
  • Page 127: Figure 103 Wep Authentication Steps

    WEP Authentication Steps Three different methods can be used to authenticate wireless stations to the network: Open System, Shared Key, and Auto. The following figure illustrates the steps involved. Figure 103 WEP Authentication Steps Open system authentication involves an unencrypted two-message procedure. A wireless station sends an open system authentication request to the AP, which will then automatically accept and connect the wireless station to the network.
  • Page 128: Table 30 Comparison Of Eap Authentication Types

    ZyXEL G-560 User’s Guide Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen.
  • Page 129 TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication server. It includes a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice.
  • Page 130: Figure 104 Roaming Example

    ZyXEL G-560 User’s Guide If the roaming feature is not enabled on the access points, information is not communicated between the access points when a wireless station moves between coverage areas. The wireless station may not be able to communicate with other wireless stations on the network and vice versa.
  • Page 131 ZyXEL G-560 User’s Guide 5 The access points must be connected to the Ethernet and be able to get IP addresses from a DHCP server if using dynamic IP address assignment. Appendix B Wireless LANs...
  • Page 132 ZyXEL G-560 User’s Guide Appendix B Wireless LANs...
  • Page 133: Appendix Cip Subnetting

    IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
  • Page 134: Table 32 Allowed Ip Address Range By Class

    ZyWALL 5/35/70 Series User’s Guide Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a value of 0 to 127. Similarly the first octet of a class “B” must begin with “10”, therefore the first octet of a class “B”...
  • Page 135: Table 34 Alternative Subnet Mask Notation

    Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/”...
  • Page 136: Table 36 Subnet 1

    ZyWALL 5/35/70 Series User’s Guide Note: In the following charts, shaded/bolded last octet bit values indicate host ID bits “borrowed” to form network ID bits. The number of “borrowed” host ID bits determines the number of subnets you can have. The remaining number of host ID bits (after “borrowing”) determines the number of hosts you can have on each subnet.
  • Page 137: Table 38 Subnet 1

    Example: Four Subnets The above example illustrated using a 25-bit subnet mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00, 01, 10 and 11. The subnet mask is 26 bits (11111111.11111111.11111111.11000000) or 255.255.255.192.
  • Page 138: Table 41 Subnet 4

    ZyWALL 5/35/70 Series User’s Guide Table 41 Subnet 4 IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.192 Broadcast Address: 192.168.1.255 Example Eight Subnets Similarly use a 27-bit mask to create 8 subnets (001, 010, 011, 100, 101, 110). The following table shows class C IP address last octet values for each subnet.
  • Page 139: Table 44 Class B Subnet Planning

    Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets available for subnetting and a class “A” address has three host ID octets (see The following table is a summary for class “B”...
  • Page 140 ZyWALL 5/35/70 Series User’s Guide Appendix C IP Subnetting...
  • Page 141: Index

    Numerics 110V AC 230V AC Abnormal Working Conditions Accessories Acts of God Address Assignment Ad-hoc Advanced Encryption Standard Airflow Alternative Subnet Mask Notation AP (access point) Association List Authentication 67, 127 Authority Basement Basic Service Set 53, 119 Cables, Connecting Certificate Authority Certifications Changes or Modifications...
  • Page 142 ZyXEL G-560 User’s Guide Europe Exposure Extended Service Set 54, 120 Extensible Authentication Protocol Failure Compliance Rules, Part 15 FCC Rules Federal Communications Commission Finland, Contact Information Fitness Fragmentation Threshold 57, 122 Fragmentation threshold France, Contact Information Functionally Equivalent Gas Pipes Germany, Contact Information God, act of Harmful Interference...
  • Page 143 Parts Patent Permission Photocopying Pipes Pool Postage Prepaid. Power Cord Priorities Private IP Address Product Model Product Page Product Serial Number Products Proof of Purchase Proper Operating Condition Purchase, Proof of Purchaser Qualified Service Personnel Radio Communications Radio Frequency Energy Radio Interference Radio Reception Radio Technician...
  • Page 144 Wi-Fi Multimedia QoS Wired Equivalent Privacy Wireless Client WPA Supplicants WLAN Interference Workmanship Worldwide Contact Information WPA with RADIUS Application WPA2 WPA-PSK WPA-PSK Application Written Permission ZyNOS ZyXEL Communications Corporation ZyXEL Home Page ZyXEL Limited Warranty Note ZyXEL Network Operating System Index...

Table of Contents