ZyXEL Communications MWR102 User Manual

ZyXEL Communications MWR102 User Manual

Mobile wireless router
Table of Contents

Advertisement

Copyright © 2009
ZyXEL Communications Corporation
DEFAULT LOGIN DETAILS
IP Address
Password
Firmware Version 1.0
Edition 1, 10/2011
http://192.168.100.1
1234

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications MWR102

  • Page 1 Copyright © 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS IP Address http://192.168.100.1 Password Firmware Version 1.0 Edition 1, 10/2011 1234...
  • Page 2 MWR102 Mobile Wireless Router...
  • Page 3: About This User's Guide

    About This User's Guide Intended Audience This manual is intended for people who want to configure the MWR102 using the Web-Based Management Interface. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away.
  • Page 4 • Warranty information • Date that you received or purchased your device • Brief description of the problem including any steps that you have taken before contacting the ZyXEL Customer Support representative Support Email Toll-Free Website Postal mail support@zyxel.com 1-800-978-7222 www.us.zyxel.com...
  • Page 5: Document Conventions

    Syntax Conventions • The MWR102 may be referred to as the “MWR102”, the “device”, the “product” or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
  • Page 6 Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The MWR102 icon is not an exact representation of your device. MWR102 Computer Server Modem Telephone Switch Notebook computer Firewall Router...
  • Page 7: Safety Warnings

    Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do not leave the device exposed to a heat source or in a high-temperature location such as in the sun or in an unattended vehicle.
  • Page 8 • Only replace the battery with the correct replacement battery. Failure to do so may result in fire or explosion. Contac ZyXEL to obtain the correct replacement battery. Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment.
  • Page 9: Table Of Contents

    Getting to Know Your MWR102 ... 14 1.1 Overview ... 14 1.2 Applications ... 14 1.3 Good Habits for Managing the MWR102 ... 15 1.4 The Front Panel ... 15 1.5 The Rear Panel ... 16 Web-Based Management ... 17 2.1 Overview ...
  • Page 10 6.1 Overview ... 29 6.2 Connecting to Internet from an Access Point ... 30 6.3 Configuring Wireless Security Using WPS ... 30 Enabling and Configuring Wireless Security (No WPS) ... 32 Part II: Wireless ... 35 Wireless ... 36 7.1 Overview ... 36 7.2 What You Can Do ...
  • Page 11 Overview ... 75 16.2 Power, Hardware Connections, and LEDs ... 75 16.3 MWR102 Access and Login ... 76 16.4 Internet Access ... 77 16.5 Resetting MWR102 to Factory Defaults ... 79 16.6 Wireless Router/AP Troubleshooting ... 79 Product Specifications ... 81...
  • Page 12 Appendix A: Pop-up Windows, JavaScripts and Java Permissions ... 85 Appendix B: IP Addresses and Subnetting ... 93 Appendix C: Setting up Your Computer’s IP Address ... 105 Appendix D: Wireless LANs ... 127 Appendix E: Common Services ... 141 Appendix F: Legal Information ...
  • Page 13: Part I: Introduction

    Part I: Introduction...
  • Page 14: Getting To Know Your Mwr102

    1.2 Applications You can create the following networks using the MWR102: • Wired. You can connect a network device via the Ethernet port of the MWR102 so that they can communicate with each other and access the Internet. • Wireless. Wireless clients can connect to the MWR102 to access network resources.
  • Page 15: Good Habits For Managing The Mwr102

    If you forget your password, you will have to reset the MWR102 to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the MWR102.
  • Page 16: The Rear Panel

    1.5 The Rear Panel Figure 2 The rear panel of the Wireless Router.  LAN: Through this port, you can connect the router to your PCs and the other Ethernet network devices.  WAN: This WAN port is where you will connect the cable/DSL Modem, or Ethernet.
  • Page 17: Web-Based Management

    The Web-Based Management Interface is an HTML-based management interface that allows easy setup and management of the MWR102 via Internet browser. Use Internet Explorer 7.0 and later or Firefox 3.0 and later versions or Safari 4.0 or later versions. The recommended screen resolution is 1024 by 768 pixels or higher.
  • Page 18: Resetting The Mwr102

    If you forget your password or IP address, or you cannot access the Web-Based Management Interface, you will need to use the RESET button at the back of the MWR102 to reload the factory-default configuration file. This means that you will lose all configurations that you had previously saved, the password will be reset to “1234”...
  • Page 19: Mwr102 Modes

    Device Modes This refers to the operating mode of the MWR102, which can act as a: • Router. This is the default device mode of the MWR102. Use this mode to connect the local network to another network, like the Internet.
  • Page 20: Router Mode

    4 Router Mode 4.1 Overview The MWR102 is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). 4.2 What You Can Do Use the Status screen to view read-only information about your MWR102.
  • Page 21 This screen guides you through the setup of the MWR102. Setup Wizard Wireless Basic Settings Use this screen to change the basic wireless settings of the MWR102 Use this screen to configure advanced wireless settings Advanced Settings Security Use this screen to change Wireless Security settings.
  • Page 22 Status Shows the current status and basic settings of the travel router Statistics Shows packet counts for wired and wireless Ethernet connections. Set remote log server parameters and view the system log. Upgrade Firmware Upgrade the travel router firmware. Save/Reload Save the current settings to a backup file, or reload the setting from a Settings previously saved file.
  • Page 23: Access Point Mode

    5 Access Point Mode 5.1 Overview Use your MWR102 as an access point (AP) if you already have a router or gateway on your network. In this mode your MWR102 bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet.
  • Page 24: Ap Mode Status Screen

    Firmware Build Time This is the date/time the current version of the firmware was released. Operation Mode This is the device mode to which the MWR102 is set – AP Mode. Wireless Local Network Network Band You may select one type of network band from the dropdown menu.
  • Page 25: Navigation Panel

    This is the MAC address of your MWR102 5.3.1 Navigation Panel Use the menu in the navigation panel to configure MWR102 features in Access Point mode. The following screen and table show the features you can configure in Access Point mode.
  • Page 26 This screen guides you through the setup of the MWR102. Setup Wizard Wireless Basic Settings Use this screen to change the basic wireless settings of the MWR102 Use this screen to configure advanced wireless settings Advanced Settings Security Use this screen to change Wireless Security settings.
  • Page 27: Lan Screen

    This page provides a tool to scan the wireless network for Site Survey nearby routers and APs. This screen allows you to change the Wi-Fi Protected Setup settings for the MWR102 Network Settings This screen allows you to configure the parameters for your Local Area LAN Interface Network.
  • Page 28 Note: If you change the IP address of the MWR102 in the screen below, you will need to log into the MWR102 again using the new IP address. Figure 6 Network Settings > LAN Interface The table below describes the labels in the screen.
  • Page 29: Tutorials

    Find out from your ISP what the “PPPoE Username and Password” are for your Internet connection. Once the DSL modem has been bridged, connect it (by Ethernet cord) to the WAN port of the MWR102. Open your browser and log into the MWR102. Click on Network Settings > WAN Interface, for the WAN Access Type select “PPPoE”...
  • Page 30: Connecting To Internet From An Access Point

    This section gives you an example of how to set up wireless network using WPS. This example uses the MWR102 as the AP and NWD210N as the wireless client which connects to a notebook. Note: The wireless client must be a WPS-aware device (for example, a WPS USB adapter or PCI card).
  • Page 31: Pin Configuration

    6.3.1 Push Button Configuration (PBC) Make sure that your MWR102 is turned on and that it is within range of your computer. Make sure that you have installed the wireless client (this example uses the NWD210N) driver and utility in your notebook.
  • Page 32: Enabling And Configuring Wireless Security (No Wps)

    Figure 8 Tutorial: Wireless > Security Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 1. The MWR102 supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
  • Page 33 The utility displays a list of APs within range, as shown in the example screen below. 4. Select the MWR102’s SSID and click Connect. Figure 9 Connecting a Wireless Client to a Wireless Network 5. Select WPA-PSK and type the security key in the following screen. Click Next.
  • Page 34 Figure 12 Link Status If your connection is successful, open your Internet browser and enter URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured. http://us.zyxel.com or the...
  • Page 35: Part Ii: Wireless

    Part II: Wireless...
  • Page 36: Wireless

    7.1 Overview This chapter discusses how to configure the wireless network settings in your MWR102. See the appendices for more detailed information about wireless networks. 7.2 What You Can Do • Use the Basic Settings screen to enable the Wireless LAN, enter the SSID and select the channel width.
  • Page 37: Wireless Security Overview

    7.3.1 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network. 7.3.1.1 SSID Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID.
  • Page 38 Table 6 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security WPA-Personal (TKIP) WPA-Enterprise Strongest WPA2-Personal (AES) WPA2-Enterprise Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA-PSK.
  • Page 39: General Wireless Lan Screen

    Use this screen to enable the Wireless LAN, enter the SSID and select the channel. Note: If you are configuring the MWR102 from a computer connected to the wireless LAN and you change the MWR102’s SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm.
  • Page 40: Wireless Lan Advanced Settings

    Set whether or not the MWR102 is discoverable. SSID Associated The Show Clients button shows all clients associated with the MWR102. Clients 7.5 Wireless LAN Advanced Settings Use this screen to allow wireless advanced features, such as setting output power and the RTS Threshold Click Wireless >...
  • Page 41 Figure 14 Wireless > Advanced Settings The following table describes the labels in this screen. Table 8 Wireless > Advanced Settings LABEL DESCRIPTION The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even ragmentatio number between 256 and 2346.
  • Page 42: Security

    Output Power Set the output power of the MWR102 in this field. If there is a high density of APs in an area, decrease the output power of the MWR102 to reduce interference with other APs. Select one of the following 100%, 70%, 50%, 35%, or 15%. See the product specifications for more information on your MWR102’s output power.
  • Page 43: Wep Encryption

    This field specifies whether the wireless clients have to provide the WEP key to login to the wireless client. Keep this setting at Auto unless you want to force a key Authentication verification before communication between the wireless client and the ZyXEL Device Method occurs.
  • Page 44 A passphrase functions like a password. In WEP security mode, it is further Encryption Key converted by the MWR102 into a complicated string that is referred to as the “key”. This key is requested from all devices wishing to connect to a wireless network.
  • Page 45: Access Control

    Reset 7.7 Access Control The Access Control screen allows you to configure the MWR102 to give exclusive access to devices (Allow) or exclude devices from accessing the MWR102 (Deny). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
  • Page 46 Mode Enter the MAC addresses of the wireless station that are allowed or denied access to the MWR102 in this field. Enter the MAC addresses in a valid MAC address format, Address that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc. Click Apply Changes.
  • Page 47: Wps Screen

    Click Apply to save your changes back to the MWR102. Apply Changes Reset Click Reset to reload the previous configuration for this screen. 7.8 WPS Screen Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status.
  • Page 48: Wireless Site Survey (Ap Mode Only)

    Status This displays Unconfigured if WPS is disabled and there are no wireless or wireless security changes on the MWR102 or you click Reset to Unconfigured to remove the configured wireless and wireless security settings. This displays a PIN number last time system generated. Click Generate to Self-PIN Number generate a new PIN number.
  • Page 49 The following table describes the labels in this screen. Table 13 Wireless > Site Survey LABEL DESCRIPTION Wireless Site Survey SSID This displays the Network Name (SSID) of the wireless networks close to you. This displays the MAC address of the wireless device listed. BSSID Channel This displays the wireless channel used by the wireless network.
  • Page 50: Network Settings

    8 Network Settings 8.1 Overview This chapter discusses the MWR102’s Network Settings screens. Use these screens to configure your LAN and WAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 51: What You Need To Know

    Figure 22 LAN and WAN IP Addresses (implies wired WAN connection) The LAN parameters of the MWR102 are preset in the factory with the following values: • IP address of 192.168.100.1 with subnet mask of 255.255.255.0 (24 bits) •...
  • Page 52: Lan Interface

    8.4 LAN Interface The LAN Interface Setup screen allows you to set up your LAN interface, the private IP of your router’s LAN port, and the subnet mask of your LAN segment. Go to Network > LAN Interface to access the following screen. Figure 23 Network >...
  • Page 53: Active Dhcp Client List

    default. Click the drop down list, you may select “Enabled” to divert the IP Address automatically or select “Disabled” to ban it. Auto IP Address When Enabled, the system will automatically detect conflicts Diversion in the WAN and LAN IP. If there are conflicts, the LAN IP and LAN DHCP Range will automatically jump to next subnet to avoid conflicts.
  • Page 54: Wan Interface

    8.5 WAN Interface This page allows users to configure WAN settings. You may select the Internet connection type from the drop down list next to “WAN Access Type” and configure the parameters for each mode. Go to Network Settings > WAN Interface to open the following screen.
  • Page 55 Provider (ISP). The Maximum packet size the router will transmit. Any packet over the specified size will be chopped into a smaller size before sending. Larger packet size will enhance MTU Size performance. Enter the MTU number in the blank to set the limitation. There are two ways to clone a MAC address.
  • Page 56: Part Iii: Security

    Part III: Security MAC Filtering...
  • Page 57: Mac Filtering

    This allows it to act as a gateway for all data passing between the Internet and the LAN. The MWR102 has one Ethernet WAN port and one Ethernet LAN port, which are used to physically separate the network into two areas. The WAN (Wide Area Network) port attaches to the broadband (cable or DSL) modem to the Internet.
  • Page 58: Mac Filtering

    9.4 MAC Filtering This page allows users to restrict data from passing onto the internet from certain devices. Go to Firewall > MAC Filtering to open the following screen. Figure 26 Firewall > MAC Filtering Table 17 Firewall > MAC Filtering Items Information Enable MAC...
  • Page 59: Part Iv: Management

    Part IV: Management Status Statistics Upgrade Firmware Save/Reload Settings Password...
  • Page 60: Status

    10.1 Overview This chapter discusses how to access and interpret information about the MWR102. 10.2 What You Can Do • Use the Status screen to view the current status and basic settings of the device. 10.3 Status Screen This information page shows the current status and basic settings of this device.
  • Page 61 This is the total time the MWR102 has been on. Firmware Build Time This is the date/time the current version of the firmware was released. This is the device mode to which the MWR102 is set – Router Mode. Operation Mode Wireless Local Network We provide six modes for your selection: 2.4GHz (B), 2.4 GHz (G), 2.4 GHz (N),...
  • Page 62 Internet IP Address The IP address provided by your Internet Service Provider (ISP). Subnet Mask The Subnet Mask provided by your Internet Service Provider (ISP). Default Gateway The Default Gateway provided by your Internet Service Provider (ISP). Internet MAC Address MAC Address of the device on the internet.
  • Page 63: Statistics

    11 Statistics 11.1 Overview This page shows users data transfer information, and monitors packets sent and received 11.2 Statistics Screen . Click Management > Statistics to access the Statistics screen. Figure 28 Management > Statistics The following table describes the labels in this screen. Table 19 Management >...
  • Page 64 This table shows the number of packets received over Ethernet LAN. This table shows the number of packets sent over the Ethernet WAN. Ethernet WAN This table shows the number of packets received over the Ethernet WAN. This button updates the Statistics screen to show the current number of packets Refresh sent and received.
  • Page 65: Log

    12 Log 12.1 Overview This page shows current activity on the router, and allows you to set what information the router logs. 12.2 Log Screen Click Management > Log to access the Log screen. Figure 29 Management > Log The following table describes the labels in this screen. Table 20 Management >...
  • Page 66 Checking this box shows all logged information passing through the device. Wireless Checking this box shows only the information passing through the wireless network. This button applies the changes made above. The MWR102 must reboot in order Apply Changes for these changes to take affect.
  • Page 67: Upgrade Firmware

    Overview Occasionally, a firmware upgrade may be issued to address bugs or add functionality. This chapter discusses how to upgrade to the MWR102’s most recent firmware. Find firmware at http://us.zyxel.com/Support/Download-Library.aspx. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 68 Click Upload to begin the upload process. This process may take up to two minutes. Note: Do not turn off the MWR102 while firmware upload is in progress! After you see the Firmware Upload In Process screen, wait two minutes before logging into the MWR102 again.
  • Page 69: Overview

    14.2 What You Can Do Save Settings to File allows you to back up (save) the MWR102’s current configuration to a file on your computer. Once your MWR102 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
  • Page 70 Browse... decompress compressed (.ZIP) files before you can upload them. Click Upload to begin the upload process. Note: Do not turn off the MWR102 while configuration file upload is in progress. Upload After you see a “configuration upload successful” screen, you must then wait one minute before logging into the MWR102 again.
  • Page 71 Chapter for more information on the RESET button. Note: If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default MWR102 IP address (192.168.100.1). See computer’s IP address.
  • Page 72: Password

    15 Password 15.1 Overview This chapter discusses management of the MWR102’s Administrator user name and password. These are the User name and Password used to access the Web-based Management interface and make changes to your router. 15.2 Password Screen Click Management > Password.
  • Page 73 LABEL DESCRIPTION User Name Type the user name you wish to use to log into the MWR102. Type your new system password (up to 30 characters). Note that as you type a New Password password, the screen displays an asterisk (*) for each character you type.
  • Page 74: Part V: Troubleshooting

    Part V: Troubleshooting...
  • Page 75: Troubleshooting

    Make sure you are using the power adaptor or cord included with the MWR102. Make sure the power adaptor or cord is connected to the MWR102 and plugged in to an appropriate power source. Make sure the power source is turned on.
  • Page 76: Mwr102 Access And Login

    • If the DHCP setting under Local Network is Client, then your device receives an IP address from a DHCP server on the network. If your MWR102 is a DHCP client, you can find your IP address from the DHCP server. This information is only available from the DHCP server which allocates IP addresses on your network.
  • Page 77: Internet Access

    Make sure your Internet browser does not block pop-up windows and has JavaScripts and Java enabled. See Make sure your computer is in the same subnet as the MWR102. (If you know that there are routers between your computer and the MWR102, skip this step.) •...
  • Page 78 The Internet connection is slow or intermittent. There might be a lot of traffic on the network. Look at the LEDs, and check 1.4. If the MWR102 is sending or receiving a lot of information, try closing some programs that use the Internet, especially peer-to-peer applications.
  • Page 79: Resetting Mwr102 To Factory Defaults

    Resetting MWR102 to Factory Defaults If you reset the MWR102, you lose all of the changes you have made. The MWR102 re-loads its default settings, and the password resets to 1234. You have to make all of your changes again.
  • Page 80 Make sure your computer (with a wireless adapter installed) is within the transmission range of the MWR102. Check that both the MWR102 and your wireless station are using the same wireless and wireless security settings. Make sure you allow the MWR102 to be remotely accessed through the WLAN interface.
  • Page 81: Product Specifications

    The reset button is built into the bottom panel. Use this button to restore Reset Button the MWR102 to its factory default settings. Press for 1 second to restart the device. Press for 5 seconds to restore to factory default settings.
  • Page 82 Web-Based Configuration Interface to put it on the MWR102. Firmware Upgrade Note: Only install firmware for your specific model! Make a copy of the MWR102’s configuration and put it back on the Save/Reload Settings MWR102 later if you decide you want to revert back to an earlier configuration.
  • Page 83 DHCP (Dynamic Host Use this feature to have the MWR102 assign IP addresses, an IP Configuration Protocol) default gateway and DNS servers to computers on your network. With Dynamic DNS (Domain Name System) support, you can use a Dynamic DNS Support fixed URL, www.zyxel.com for example, with a dynamic IP address.
  • Page 84 Appendices Pop-up Windows, JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer’s IP Address Wireless LANs Common Services Legal Information...
  • Page 85: Appendix A: Pop-Up Windows, Javascripts And Java Permissions

    Appendix A Pop-up Windows, JavaScripts and Java Permissions In order to use the Web-Based Management Interface you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary.
  • Page 86 Figure 34 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled.
  • Page 87 Select Settings…to open the Pop-up Blocker Settings screen. Figure 36 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. Click Add to move the IP address to the list of Allowed sites.
  • Page 88 Figure 37 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the Web-Based Management Interface do not display properly in Internet Explorer, check that JavaScripts are allowed. In Internet Explorer, click Tools, Internet Options and then the Security tab.
  • Page 89 Figure 38 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). Click OK to close the window.
  • Page 90: Java Permissions

    Figure 39 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. Click OK to close the window.
  • Page 91 Figure 40 Security Settings – Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. Click OK to close the window.
  • Page 92 Figure 41 Java (Sun)
  • Page 93: Appendix B: Ip Addresses And Subnetting

    Appendix B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network.
  • Page 94: Subnet Masks

    How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
  • Page 95 Table 26 Subnet Mask - Identifying Network Number OCTET: (192) IP Address (Binary) 11000000 11111111 Subnet Mask (Binary) Network Number 11000000 Host ID By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
  • Page 96 24-bit mask 11111111 11111111 29-bit mask 11111111 11111111 Network Size The size of the network number determines the maximum number of possible hosts you can have on your network. The larger the number of network number bits, the smaller the number of remaining host ID bits.
  • Page 97 For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet masks using both notations. Table 29 Alternative Subnet Mask Notation SUBNET ALTERNATIV MASK E NOTATION 255.255.255.0 255.255.255.128 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.252 Subnetting...
  • Page 98 You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub- networks. The subnet mask is now 25 bits (255.255.255.128 or /25). The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25.
  • Page 99 In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address).
  • Page 100 Table 30 Subnet 1 IP/SUBNET MASK NETWORK NUMBER IP Address (Decimal) 192.168.1. IP Address (Binary) 11000000.10101000.00000001. Subnet Mask (Binary) 11111111.11111111.11111111. Subnet Address: Lowest Host ID: 192.168.1.1 192.168.1.0 Broadcast Address: Highest Host ID: 192.168.1.62 192.168.1.63 Table 32 Subnet 2 IP/SUBNET MASK NETWORK NUMBER IP Address 192.168.1.
  • Page 101 Table 33 Subnet 3 IP/SUBNET MASK NETWORK NUMBER IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. Subnet Mask (Binary) 11111111.11111111.11111111. Subnet Address: Lowest Host ID: 192.168.1.129 192.168.1.128 Broadcast Address: Highest Host ID: 192.168.1.190 192.168.1.191 Table 34 Subnet 4 IP/SUBNET MASK NETWORK NUMBER IP Address 192.168.1.
  • Page 102 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 35 Eight Subnets SUBNET SUBNET ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number.
  • Page 103 NO. “BORROWED” SUBNET MASK HOST BITS 255.255.255.128 (/25) 255.255.255.192 (/26) 255.255.255.224 (/27) 255.255.255.240 (/28) 255.255.255.248 (/29) 255.255.255.252 (/30) 255.255.255.254 (/31) The following table is a summary for subnet planning on a network with a 16-bit network number. Table 37 16-bit Network Number Subnet Planning NO.
  • Page 104 You must also enable Network Address Translation (NAT) on the MWR102. Once you have decided on the network number, pick an IP address for your MWR102 that is easy to remember (for instance, 192.168.100.1) but make sure that no other device on your network is using that IP address.
  • Page 105: Appendix C: Setting Up Your Computer's Ip Address

    MWR102 unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
  • Page 106 After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the Prestige’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
  • Page 107 Figure 45 Windows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: In the Network window, click Add. Select Adapter and then click Add.
  • Page 108 If you need Client for Microsoft Networks: Click Add. Select Client and then click Add. Select Microsoft from the list of manufacturers. Select Client for Microsoft Networks from the list of network clients and then click Restart your computer so the changes you made take effect. Configuring In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties...
  • Page 109 • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in).
  • Page 110 Figure 47 Windows 95/98/Me: TCP/IP Properties: DNS Configuration Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add. Click OK to save and close the TCP/IP Properties window.
  • Page 111 Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 48 Windows XP: Start Menu In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 49 Windows XP: Control Panel Right-click Local Area Connection and then click Properties.
  • Page 112 Figure 50 Windows XP: Control Panel: Network Connections: Properties Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 51 Windows XP: Local Area Connection Properties The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 113 • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Click Advanced. Figure 52 Windows XP: Internet Protocol (TCP/IP) Properties If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK.
  • Page 114 Figure 53 Windows XP: Advanced TCP/IP Properties In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
  • Page 115 Figure 54 Windows XP: Internet Protocol (TCP/IP) Properties Click OK to close the Internet Protocol (TCP/IP) Properties window. Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
  • Page 116 Click on Control Panel. Figure 55 Windows 7/Vista Click on Network and Internet. Figure 56 Windows 7/Vista Click on Network and Sharing Center...
  • Page 117 Figure 57 Windows 7/Vista On the left side of the screen click on Change Adapter Settings (Windows 7), or Manage Network Connections (Vista). Right click on Local Area Connection and select Properties. Figure 58 Windows 7/Vista Highlight Internet Protocol Version 4 and click Properties.
  • Page 118 Figure 59 Windows 7/Vista Select Use the Following IP Address and enter your IP address, Subnet Mask, and Default Gateway. Enter your DNS server address (if trying to connect to the internet) and click OK. Figure 60 Windows 7/Vista Click OK or Close on the Local Area Connection Properties window to apply the settings.
  • Page 119 Macintosh OS 8/9 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Figure 61 Macintosh OS 8/9: Apple Menu Select Ethernet built-in from the Connect via list.
  • Page 120: Verifying Settings

    Figure 62 Macintosh OS 8/9: TCP/IP For dynamically assigned settings, select Using DHCP Server from the Configure: list. For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. •...
  • Page 121 Figure 63 Macintosh OS X: Apple Menu Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. For dynamically assigned settings, select Using DHCP from the Configure list.
  • Page 122 Figure 64 Macintosh OS X: Network For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 123 Linux This section shows you how to configure your computer’s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may vary depending on your Linux distribution and release version. Note: Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE.
  • Page 124 Figure 66 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.
  • Page 125 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 68 Red Hat 9.0: KDE: Network Configuration: Activate After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.
  • Page 126 DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.100.10 NETMASK=255.255.255.0 USERCTL=no PEERDNS=yes TYPE=Ethernet If you know your DNS server IP address(es), enter the DNS server information in the resolv.conf file in the /etc directory. The following figure shows an example where two DNS server IP addresses are specified. Figure 71 Red Hat 9.0: DNS Settings in resolv.conf nameserver 172.23.5.1 nameserver 172.23.5.2...
  • Page 127: Appendix D: Wireless Lans

    A p pe ndi x Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 128 A Basic Service Set (BSS) exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS is enabled, wireless station A and B can access the wired network and communicate with each other.
  • Page 129 An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate.
  • Page 130 Figure 76 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference. Interference occurs when radio signals from different access points overlap causing interference and degrading performance.
  • Page 131: Fragmentation Threshold

    When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS is designed to prevent collisions due to hidden nodes.
  • Page 132: Preamble Type

    If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type A preamble is used to synchronize the transmission timing in your wireless network.
  • Page 133 Table 38 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/48/54 OFDM (Orthogonal Frequency Division Multiplexing) IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
  • Page 134: Types Of Radius Messages

    Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless station and the network RADIUS server.
  • Page 135 The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless station. The wireless station ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information.
  • Page 136: Dynamic Wep Key Exchange

    Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen.
  • Page 137 WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication.
  • Page 138: User Authentication

    password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password. User Authentication WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. If both an AP and the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for stronger data encryption.
  • Page 139: Wpa With Radius Application Example

    Figure 78 WPA(2)-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows.
  • Page 140 Table 40 Wireless Security Relational Matrix AUTHENTICATION ENCRYPTI METHOD/ KEY MANAGEMENT METHOD PROTOCOL Open None Open Shared WPA-Enterprise TKIP WPA-Personal TKIP WPA2-Enterprise WPA2-Personal ENTER IEEE 802.1X MANUAL KEY Disable Enable without Dynamic WEP Enable with Dynamic WEP Key Enable without Dynamic WEP Disable Enable with Dynamic WEP Key Enable without Dynamic WEP...
  • Page 141: Appendix E: Common Services

    A p pe ndi x Appendix E Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. •...
  • Page 142 A popular videoconferencing solution from White Pines Software. 24032 Domain Name Server, a service that matches web names (for example http://us.zyxel.com) to IP numbers. The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
  • Page 143 IGMP User-Defined (MULTICAST) TCP/UDP MSN Messenger NEW-ICQ NEWS NNTP PING User-Defined POP3 PPTP PPTP_TUNNEL User-Defined (GRE) Internet Group Management Protocol is used when sending packets to a specific group of hosts. The Internet Key Exchange algorithm is used for key distribution and management. 6667 This is another popular Internet chat program.
  • Page 144 RCMD REAL_AUDIO REXEC RLOGIN RTELNET RTSP TCP/UDP SFTP SMTP SNMP TCP/UDP SNMP-TRAPS TCP/UDP SQL-NET TCP/UDP STRM WORKS SYSLOG Remote Command Service. 7070 A streaming audio service that enables real time sound over the web. Remote Execution Daemon. Remote Login. Remote Telnet. The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet.
  • Page 145 TACACS TELNET TFTP VDOLIVE Login Host Protocol used for (Terminal Access Controller Access Control System). Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
  • Page 146: Appendix F: Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 147: Fcc Radiation Exposure Statement

    This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
  • Page 148: Industry Canada Statement

    Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the...
  • Page 149 This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.
  • Page 150: Appendix G: Open Source Licenses

    CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL, AND YOUR MONEY WILL BE REFUNDED.
  • Page 151 Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 152 DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF...
  • Page 153 This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
  • Page 154 For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (freesoftware@zyxel.com), for a charge of no more than our cost of physically performing source code distribution, a complete machine-readable copy of the complete corresponding source code for the version of the Programs that we distributed to you if we are in possession of such.
  • Page 155 igmpproxy v1.2 iproute2-2.6.29-1 v2.6.19 iptables-1.4.4 v1.4.4 l2tpd v0.69 libnl-1.1 v1.1 libusb-0.1.12 v0.1.12 lzma465 v4.65 mbpk_eject v0.14 mt-daapd-0.2.4.2 v0.2.4.2 nbserver v1.5.30 ntfs-3g- v2010.10.2 2010.10.2 ntpclient v2.0 ppp-2.4.4 2.4.4 pptp-1.7.2 1.7.2 radvd-0.9.1 v0.9.1 samba-3.0.24 v3.0.24 samba-3.0.37 v3.0.37 squashfs4.0 v4.0 udhcp-0.9.9-pre v0.9.9 updatedd-2.5 v2.5 usb-modeswitch- v1.1.3...
  • Page 156 No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes GNU/Linux kernel, bootcode, toolchain, auth, boa, bridge-utils, busybox-1.13, discover, dlna_dms, dnrd-2.12.1, dnsmasq-2.33, dosfstools-2.11,...
  • Page 157 rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.
  • Page 158 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
  • Page 159 medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it.
  • Page 160 then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.
  • Page 161 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL,...
  • Page 162 To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others. For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received.
  • Page 163 To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a “modified version” of the earlier work or a work “based on”...
  • Page 164 activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow...
  • Page 165 work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures. 4. Conveying Verbatim Copies. You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice;...
  • Page 166 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways: a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software...
  • Page 167 by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product.
  • Page 168 material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License;...
  • Page 169 (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
  • Page 170 counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it. 11. Patents. A “contributor” is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based.
  • Page 171 A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of...
  • Page 172: Limitation Of Liability

    published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation. If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.
  • Page 173 How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
  • Page 174 library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www.gnu.org/philosophy/why-not-lgpl.html>. This Product includes libnl-1.1, libusb-0.1.12 under the GNU Lesser Public License GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc.
  • Page 175 For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it.
  • Page 176 Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow.
  • Page 177 modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License.
  • Page 178 Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library".
  • Page 179 exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
  • Page 180 apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
  • Page 181 THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES.
  • Page 182 Zlib License zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.2, October 3rd, 2004 Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software.
  • Page 183 product, an acknowledgment in the product documentation would be appreciated but is not required. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. This notice may not be removed or altered from any source distribution.

Table of Contents