ZyXEL Communications MWR211 - V1.0 Manual

Mobile wireless router
Table of Contents

Advertisement

Quick Links

Copyright © 2009
ZyXEL Communications Corporation
DEFAULT LOGIN DETAILS
IP Address
Password
Firmware Version 1.0
Edition 1, 5/2010
MWR211 User's Guide
http://192.168.10.1
1234
1

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications MWR211 - V1.0

  • Page 1 Copyright © 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS http://192.168.10.1 IP Address 1234 Password Firmware Version 1.0 Edition 1, 5/2010 MWR211 User’s Guide...
  • Page 2 MWR211 Mobile Wireless Router MWR211 User’s Guide...
  • Page 3: About This User's Guide

    • Supporting Disc Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.us.zyxel.com for additional support documentation and product certifications. User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
  • Page 4 Product model and serial number • Warranty information • Date that you received or purchased your device Brief description of the problem including any steps that you • have taken before contacting the ZyXEL Customer Support representative Support Email support@zyxel.com Toll-Free 1-800-978-7222 Website www.us.zyxel.com...
  • Page 5: Document Conventions

    Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 6 Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The MWR211 icon is not an exact representation of your device. MWR211 Computer Notebook computer Server Modem Firewall Telephone Switch Router MWR211 User’s Guide...
  • Page 7: Safety Warnings

    • Always disconnect all cables from this device before servicing or disassembling.  • Use ONLY power adaptor or cord provided by the manufacturer for your device.  • Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North  America or 230V AC in Europe).  • Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where  anyone can walk on the power adaptor or cord.  • Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution.  • If the power adaptor or cord is damaged, remove it from the power outlet.  • Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new  one.  • Before inserting a USB device or accessory. Please verify power consumption of the device is within  the USB port power rating range  Complies to standard USB 2.0 power rating of 500 mA per port.   • Do not use the device outside, and make sure all the connections are indoors. There is a remote  risk of electric shock from lightning.  •  Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device.  • Antenna Warning! This device meets ETSI and FCC certification requirements when using the  included antenna(s). Only use the included antenna(s).   • If you wall mount your device, make sure that no electrical lines, gas or water pipes will be  damaged.  • Use ONLY USB device listed by the manufacturer's website (http://us.zyxel.com/mwr).  Battery Warnings  Please follow the safety guidelines described in the safety warning and battery warning. Failing to  do so may shorten the lifespan of the internal lithium ion battery or may present a risk of damage  to the unit, fire, chemical burn, electrolyte leak and/or injury.  MWR211 User’s Guide...
  • Page 8 • Do not leave unit exposed to a heat source or in a location that may become hot, such as a parked  vehicle or in direct sunlight. Do not leave in a glove box, trunk or other location that may become  hot.  • Do not puncture or incinerate the device or battery.  • When/if you dispose of the battery, be certain to follow ordinances from local waste disposal  agencies.  • Keep the battery away from small children or pets  • Never use a knife, screwdriver or other sharp object to remove the battery.  • Do not attempt to open the battery.  • Use only the provided recharger to recharge the battery.  • Only replace the battery with the correct replacement battery. Failure to do so may result in fire or  explosion. Contac ZyXEL to obtain the correct replacement battery.  Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste  Electronics and Electrical Equipment. It means that used electrical and electronic products should not  be mixed with general waste. Used electrical and electronic equipment should be treated separately.  MWR211 User’s Guide...
  • Page 9: Table Of Contents

    Table of Contents About This User's Guide ......................3 Document Conventions ......................5 Safety Warnings ........................7 Part I: Introduction ................. 17 Chapter 1 Getting to Know Your MWR211 .................... 18 1.1 Overview ..........................18 1.2 Applications .......................... 18 1.3 Ways to Manage the MWR211 .................... 19 1.4 Good Habits for Managing the MWR211 ................
  • Page 10 Chapter 4 MWR211 Modes ........................32 4.1 Overview ..........................32 4.1.1 Device Modes ......................32 Chapter 5 Router Mode ........................... 34 5.1 Overview ..........................34 5.2 What You Can Do ......................... 34 5.3 Status Screen ........................35 5.3.1 Navigation Panel ......................40 Chapter 6 Access Point Mode ........................
  • Page 11 Chapter 8 Tutorials ..........................69 8.1 Overview ..........................69 8.2 Connecting to the Internet ..................... 69 8.2.1 DSL Modem ......................... 69 8.2.2 Cable Modem ....................... 70 8.2.4 3G USB Adapter ......................70 8.3 Connecting to the Internet from an Access Point ..............71 8.4 Configuring Wireless Security Using WPS ................
  • Page 12 10.4.1 Ethernet Encapsulation ................... 103 10.4.2 PPPoE Encapsulation ..................... 106 10.4.3 PPTP Encapsulation ....................109 10.4.4 L2TP Encapsulation ....................113 10.5 Mobile WAN ........................117 10.6 Advanced WAN Screen ....................122 10.7 IGMP Snooping Screen ....................123 Chapter 11 ........................... 124 11.1 Overview ...........................
  • Page 13 Chapter 15 OpenDNS ..........................142 15.1 Overview .......................... 142 15.2 What You Can Do ......................142 15.3 OpenDNS Screen ......................142 Chapter 16 Static Route .......................... 144 16.1 Overview ........................144 16.2 What You Can Do ......................144 16.3 IP Static Route Screen ....................144 Chapter 17 ...........................
  • Page 14 20.2 What You Can Do ......................161 20.3 What You Need To Know ....................162 20.4 General Screen ....................... 162 20.5 Advanced Screen ......................163 20.5.1 Rule Configuration: Application Rule Configuration ..........166 20.5.2 Rule Configuration: User Defined Service Rule Configuration ......
  • Page 15 Chapter 25 Time ........................... 188 25.1 Overview ........................... 188 25.2 What You Can Do ......................188 25.3 Time Setting Screen ......................188 Chapter 26 Firmware Upgrade ........................ 191 26.1 Overview ........................... 191 26.2 What You Can Do ......................191 26.3 Firmware Upload Screen ....................191 Chapter 27 Backup/Restore ........................
  • Page 16 Chapter 32 Product Specifications ......................215 Part VI: Appendices and Index ............219 Appendix A Pop-up Windows, JavaScripts and Java Permissions ........220 Appendix B IP Addresses and Subnetting ................228 Appendix C Setting up Your Computer’s IP Address ............241 Appendix D Wireless LANs ....................
  • Page 17: Part I: Introduction

    Part I: Introduction Getting to Know Your MWR211 Introducing the Web Configurator Monitor MWR211 Modes Tutorials MWR211 User’s Guide...
  • Page 18: Overview

    Chapter 1 1. Getting to Know Your MWR211 1.1 Overview This chapter introduces the main features and applications of the MWR211. Like a high performance wireless router, the MWR211 extends the range of your existing wired network without additional wiring, providing easy network access to in-home, in-office users.
  • Page 19: Ways To Manage The Mwr211

    Web Configurator. • WPS (Wi-Fi Protected Setup) button. You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL device.
  • Page 20: Leds

    • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the MWR211 to its factory default settings.
  • Page 21 WLAN Green The MWR211 is ready, but is not sending/receiving data through the wireless LAN. Blinking The MWR211 is sending/receiving data through the wireless LAN. The wireless LAN is not ready or has failed. Green WPS is enabled. Blinking The MWR211 is negotiating a WPS connection with a wireless client.
  • Page 22: Introducing The Web Configurator

    Chapter 2 2. Introducing the Web Configurator 2.1 Overview This chapter describes how to access the MWR211 Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the MWR211 via Internet browser. Use Internet Explorer 7.0 and later or Firefox 3.0 and later versions or Safari 4.0 or later versions.
  • Page 23: Login Screen

    2.2.1 Login Screen The Web Configurator initially displays the following login screen. Figure 3 Login screen The following table describes the labels in this screen. Table 2 Login screen LABEL DESCRIPTION Password Type “1234” (default) as the password. 2.2.2 Password Screen You should see a screen asking you to change your password (highly recommended) as shown next.
  • Page 24: Resetting The Mwr211

    Figure 4 Change Password Screen The following table describes the labels in this screen. Table 3 Change Password Screen LABEL DESCRIPTION New Password Type a new password. Retype to Retype the password for confirmation. Confirm Apply Click Apply to save your changes to the MWR211. Ignore Click Ignore if you do not want to change the password this time.
  • Page 25 2 Press the RESET button for longer than one second to restart/reboot the MWR211. 3 Press the RESET button for longer than five seconds to set the MWR211 back to its factory-default configurations. The Power LED will start to blink to indicate that the default configuration is being loaded.
  • Page 26: Chapter 3 Monitor

    3 Monitor 3.1 Overview This chapter discusses read-only information related to the device state of the MWR211. Note: To access the Monitor screens, you can also click the links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/received as well as the status of clients connected to the MWR211.
  • Page 27: Dhcp Table

    Figure 8 Summary: BW MGMT Monitor 3.4 DHCP Table DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the MWR211’s LAN as a DHCP server or disable it. When configured as a server, the MWR211 provides the TCP/IP configuration for the clients.
  • Page 28: Packet Statistics

    The following table describes the labels in this screen. Table 7 Summary: DHCP Table LABEL DESCRIPTION This is the index number of the host computer. MAC Address This field shows the MAC address of the computer with the name in the Host Name field.
  • Page 29 The following table describes the labels in this screen. Table 8 Summary: Packet Statistics LABEL DESCRIPTION Port This is the MWR211’s port type. Status For the LAN ports, this displays the port speed and duplex setting or Down when the line is disconnected. For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation and Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using...
  • Page 30: Wlan Station Status

    3.6 WLAN Station Status Click the WLAN Station Status (Details...) hyperlink in the Status screen. View the wireless stations that are currently associated to the MWR211 in the Association List. Association means that a wireless client (for example, your network or computer with a wireless network card) has connected successfully to the AP (or wireless router) using the same SSID, channel and security settings.
  • Page 31 Figure 12 Summary: Mobile WAN Connection Information The following table describes the labels in this screen. Table 10 Summary: Mobile WAN Connection Information LABEL DESCRIPTION SIM Status This displays the status of your 3G USB adapters SIM card. Signal Strength This displays the signal strength of your 3G connection Mobile USB This field displays the name of your mobile USB device.
  • Page 32: Chapter 4 Mwr211 Modes

    Ch a p t e r 4. MWR211 Modes 4.1 Overview This chapter introduces the different modes available on your MWR211. 4.1.1 Device Modes This refers to the operating mode of the MWR211, which can act as a: • Router. This is the default device mode of the MWR211. Use this mode to connect the local network to another network, like the Internet.
  • Page 33 For more information on these modes and to change the mode of your MWR211, refer to Chapter Note: Choose your Device Mode carefully to avoid having to change it later. When changing to another mode, the IP address of the MWR211 changes. The running applications and services of the network devices connected to the MWR211 can be interrupted.
  • Page 34: Chapter 5 Router Mode

    5. Router Mode 5.1 Overview The MWR211 is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the MWR211 connects the local network (LAN1to the Internet. Figure 27 MWR211 Network Note: The Status screen is shown the Web Configurator.
  • Page 35: Status Screen

    5.3 Status Screen Click to open the status screen. Figure 28 Status Screen: Router Mode The following table describes the icons shown in the Status screen. MWR211 User’s Guide...
  • Page 36 Table 18 Status Screen Icon Key: Router Mode ICON DESCRIPTION Click this icon to view copyright and a link for related product information. Select a number of seconds or None from the drop-down list box to refresh all screen statistics automatically at the end of every time interval or to not refresh the screen statistics.
  • Page 37 This is the device mode ( Device Modes) to which the MWR211 is set – Sys OP Mode Router Mode. WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device. This shows the kind of WAN connection is active. - Active WAN type There are two types of WAN: Ethernet and Mobile WAN - IP Address...
  • Page 38 This shows the channel number which the MWR211 is currently using - Operating Channel over the wireless LAN. - Security Mode This shows the level of wireless security the MWR211 is using. - 802.11 Mode This shows the wireless standard. This displays Configured when the WPS has been set up.
  • Page 39 When Quota management is enabled and MWAN is the primary WAN, it Quota Usage shows the number of MBs are used. When Quota management is enabled, … and MWAN is the primary WAN, Percentage Usage it shows the percentage of the maximum quota has been reached. Interface Status This displays the MWR211 port types.
  • Page 40: Navigation Panel

    5.3.1 Navigation Panel Use the sub-menus on the navigation panel to configure MWR211 features. Figure 29 Navigation Panel: Router Mode The following table describes the sub-menus. Table 20 Navigation Panel: Router Mode LINK FUNCTION This screen shows the MWR211’s general device, system Status and interface status information.
  • Page 41 DHCP Table Use this screen to view current DHCP client information. Packet Use this screen to view port status and packet specific Statistics statistics. WLAN Station Use this screen to view the wireless stations that are Status currently associated to the MWR211. MWAN MGMT Use this screen to view the MWAN connection Monitor...
  • Page 42 This screen allows you to configure mobile ISP parameters, WAN IP address assignment, Data Usage, Mobile WAN Failover, DNS servers, and the WAN MAC address for your Mobile WAN connection. Advanced Use this screen to configure other advanced properties. IGMP Use this screen to enable IGMP snooping if you have LAN Snooping users that subscribe to multicast services.
  • Page 43 Firewall General Use this screen to activate/deactivate the firewall. Services This screen shows a summary of the firewall rules, and allows you to edit/add a firewall rule. Content Filter Use this screen to block certain web features and sites containing certain keywords in the URL. Management Bandwidth General...
  • Page 44 Backup/ Use this screen to backup and restore the configuration or Restore/ reset the factory defaults to your MWR211. Reset Restart Restart This screen allows you to reboot the MWR211 without turning the power off. Sys OP This screen allows you to select whether your device acts Mode as a Router or a Access Point.
  • Page 45: Access Point Mode

    6. Access Point Mode 6.1 Overview Use your MWR211 as an access point (AP) if you already have a router or gateway on your network. In this mode your MWR211 bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example.
  • Page 46: What You Need To Know

    • Use the LAN screen to set the IP address for your MWR211 acting as an access point. 6.3 What You Need to Know Chapter 10 for a tutorial on setting up a network with the MWR211 as an access point. 6.3.1 Setting your MWR211 to AP Mode Log into the Web Configurator if you haven’t already.
  • Page 47: Accessing The Web Configurator In Access Point Mode

    Figure 32 Pop up for Access Point mode Click OK. The Web Configurator refreshes once the change to Access Point mode is successful. 6.3.2 Accessing the Web Configurator in Access Point Mode Log in to the Web Configurator in Access Point mode, do the following: Connect your computer to the LAN port of the MWR211.
  • Page 48: Ap Mode Status Screen

    • See Maintenance and Troubleshooting for information on configuring your Maintenance settings. 6.4 AP Mode Status Screen Click to open the Status screen. Figure 33 Status Screen: Access Point Mode The following table describes the labels shown in the Status screen. Table 21 Status Screen: Access Point Mode LABEL DESCRIPTION...
  • Page 49 This is the device mode ( Device Modes) to which the MWR211 is set - Sys OP Mode Access Point Mode. LAN Information - MAC Address This shows the LAN Ethernet adapter MAC Address of your device. - IP Address This shows the LAN port’s IP address.
  • Page 50 Data This column shows the actual data recorded by the MWR211. System Up Time This is the total time the MWR211 has been on. Current Date/Time This field displays your MWR211’s present date and time. System Resource This displays what percentage of the MWR211’s processing ability is currently used.
  • Page 51: Navigation Panel

    6.4.1 Navigation Panel Use the menu in the navigation panel to configure MWR211 features in Access Point mode. The following screen and table show the features you can configure in Access Point mode. Figure 34 Menu: Access Point Mode Refer to Table 20 Navigation Panel: Router Mod for descriptions of the labels shown in the Navigation panel.
  • Page 52 Figure 35 Network > LAN > IP The table below describes the labels in the screen. Table 22 Network > LAN > IP LABEL DESCRIPTION Click this to deploy the MWR211 as an access point in the network. When you enable this, the MWR211 gets its IP address from the network’s DHCP server (for example, your ISP).
  • Page 53 Select From ISP if your ISP dynamically assigns DNS server information (and the MWR211's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
  • Page 54: Chapter 7 Wisp Mode

    7. WISP Mode 7.1 Overview Your MWR211 can receive a WAN IP address from an 802.11 WIFI connection. In WISP mode, it can connect to an existing network via an access point. Use this mode if your Internet Service Provider allows you to connect to their network via 802.11 WIFI.
  • Page 55: What You Can Do

    Figure 36 WISP Mode After the MWR211 and the access point connect, the MWR211 acquires its Public WAN IP address from the access point. The clients of the MWR211 can now surf the Internet. 7.2 What You Can Do • Use the Status screen to view read-only information about your MWR211. •...
  • Page 56: Accessing The Web Configurator In Wisp Mode

    Figure 37 Changing to WISP mode Note: You have to log in to the Web Configurator again when you change modes. As soon as you do, your MWR211 is already in WISP mode. When you select WISP Mode, the following pop-up message window appears.
  • Page 57: Wisp Mode Status Screen

    Note: After clicking Login, see the screens described in the sections following this. The WISP mode means using Wi-Fi as WAN, NOT 3G as WAN. 7.4 WISP Mode Status Screen Click to open the status screen. Figure 39 Status: WISP Mode The following table describes the labels shown in the Status screen.
  • Page 58 Firmware Version This is the firmware version and the date created. This is the device mode ( Device Modes) to which the MWR211 is set - Sys OP Mode WISP Mode. WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device. - IP Address This shows the WAN port’s IP address.
  • Page 59 - Security Mode This shows the level of wireless security the MWR211 is using. - 802.11 Mode This shows the wireless standard. System Status Item This column shows the type of data the MWR211 is recording. Data This column shows the actual data recorded by the MWR211. System Up Time This is the total time the MWR211 has been on.
  • Page 60: Wireless Lan General Screen

    For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation and Idle (line (ppp) idle), Dial (starting to Rate trigger a call) and Drop (dropping a call) if you're using PPPoE or PPTP encapsulation.
  • Page 61: No Security

    Table 24 WISP Mode: LAN > General Screen LABEL DESCRIPTION Wireless Setup Network Enter the name of the access point to which you are connecting. Name (SSID) Security Security Select the security mode of the access point to which you want to Mode connect.
  • Page 62: Static Wep

    Table 25 No Security (WISP) LABEL DESCRIPTION Wireless Setup Network Enter the name of the access point to which you are connecting. Name (SSID) Security Security Select No Security in this field. Mode Apply Click Apply to save your changes back to the MWR211. Reset Click Reset to reload the previous configuration for this screen.
  • Page 63 Keep this setting at Auto unless you want to force a key verification before communication between the wireless client and the ZyXEL device occurs. Select Shared Key to force the clients to provide the WEP key prior to communication.
  • Page 64 Key 1 to Key The WEP keys are used to encrypt data. Both the MWR211 and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F").
  • Page 65: Advance Screen

    Network Name Enter the name of the access point to which you are connecting. (SSID) Security Encryption Select the type of wireless encryption employed by the access point to Type which you want to connect. Pre-Shared Key WPA-PSK/WPA2-PSK uses a simple common password for authentication.
  • Page 66: Site Survey

    Table 28 Configuration > Wireless LAN > Advance Screen (WISP) LABEL DESCRIPTION Select CAM (Constantly Awake Mode) if you do not want your MWR211 to go to “sleep” when no wireless activity is detected in the Wireless LAN. Power Select Power Saving Mode if you want the MWR211 to go to sleep when Saving Mode no wireless connection is needed for a period of time.
  • Page 67 Figure 45 Configuration > Wireless LAN > Site Survey (WISP) The following table describes the labels in this screen. Table 29 Configuration > Wireless LAN > Site Survey (WISP) LABEL DESCRIPTION Station Site Survey Use this option to select the wireless network you want to connect to. This displays the Network Name (SSID) of the wireless networks close SSID to you.
  • Page 68 Setting Click this after selecting a network to set the MWR211 User’s Guide...
  • Page 69: Chapter 8 Tutorials

    Ch a p t e r 8 Tutorials 8.1 Overview This chapter provides tutorials for your MWR211 as follows: • Wired and Wireless 3G connection to the Internet • Connecting to the Internet from an Access Point • Configuring Wireless Security Using WPS •...
  • Page 70: Cable Modem

    • Find out from your ISP what the “PPPoE Username and Password” are for your Internet connection. • Once the DSL modem has been bridged, connect it (by Ethernet cord) to the WAN port of the MWR211 (MWR211 has only one Ethernet port, and it is configured to be a LAN port by default.
  • Page 71: Connecting To The Internet From An Access Point

    • After filling in all the account information, click the “Connect” button to save the information to the router’s memory and make the wireless 3G connection. • The USB LED starts to blink fast, indicating MWR211 is connecting. When the mobile WAN is connected, the USB LED changes solid on. However, if the Ethernet port is configured to WAN, and is connected to a wired WAN, the mobile WAN will be used as the backup WAN so the USB LED shows slow blinking.
  • Page 72: Configuring Wireless Security Using Wps

    8.4 Configuring Wireless Security Using This section gives you an example of how to set up wireless network using WPS. This example uses the MWR211 as the AP and NWD210N as the wireless client which connects to a notebook. Note: The wireless client must be a WPS-aware device (for example, a WPS USB adapter or PCI card).
  • Page 73: Pin Configuration

    The following figure shows you an example to set up wireless network and security by pressing a button on both MWR211 and wireless client (the NWD210N in this example). Figure 47 Example WPS Process: PBC Method (Figure 47 is using MWR222 instead of MWR211) 8.4.2 PIN Configuration When you use the PIN configuration method, you need to use both MWR211’s configuration interface and the client’s utilities.
  • Page 74: Enabling And Configuring Wireless Security (No Wps)

    Figure 48 Example WPS Process: PIN Method 8.5 Enabling and Configuring Wireless Security (No WPS) This example shows you how to configure wireless security settings with the following parameters on your MWR211. SSID SSID_Example3 Channel WPA-PSK Security (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) MWR211 User’s Guide...
  • Page 75 Follow the steps below to configure the wireless settings on your MWR211. The instructions require that your hardware is connected (see the Quick Start Guide) and you are logged into the Web Configurator through your LAN connection. Open the Wireless LAN > General screen in the AP’s Web Configurator. Make sure the Enable Wireless LAN check box is selected.
  • Page 76: Configure Your Notebook

    Figure 50 Tutorial: Checking Wireless Settings 8.5.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. The MWR211 supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
  • Page 77 Figure 51 Connecting a Wireless Client to a Wireless Network Select WPA-PSK and type the security key in the following screen. Click Next. Figure 52 Security Settings The Confirm Save window appears. Check your settings and click Save to continue. Figure 53 Confirm Save Check the status of your wireless connection in the screen below.
  • Page 78 Figure 54 Link Status If your connection is successful, open your Internet browser and enter http://us.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured.
  • Page 79: Part Ii: Network

    Part II Network Wireless LAN DHCP Server Network Address Translation (NAT) Dynamic DNS OpenDNS Static Route MWR211 User’s Guide...
  • Page 80: Chapter 9 Wireless Lan

    9 Wireless LAN 9.1 Overview This chapter discusses how to configure the wireless network settings in your MWR211. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 55 Example of a Wireless Network The wireless network is the part in the blue circle.
  • Page 81: What You Can Do

    9.2 What You Can Do • Use the General screen to enable the Wireless LAN, enter the SSID and select the wireless security mode. • Use the MAC Filter screen to allow or deny wireless stations based on their MAC addresses from connecting to the MWR211.
  • Page 82 This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network. 9.3.1.2 MAC Address Filter Every wireless client has a unique identification number, called a MAC address. MAC address is usually written using twelve hexadecimal characters ;...
  • Page 83 WPA-Personal (TKIP) WPA-Enterprise Strongest WPA2-Personal (AES) WPA2-Enterprise Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA-PSK. Therefore, you should set up WEP in the wireless network.
  • Page 84: General Wireless Lan Screen

    9.4 General Wireless LAN Screen Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode. Note: If you are configuring the MWR211 from a computer connected to the wireless LAN and you change the MWR211’s SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm.
  • Page 85: Security

    Network (Service Set IDentity) The SSID identifies the Service Set with which a Name(SSID) wireless station is associated. Wireless stations associating to the MWR211 must have the same SSID. Enter a descriptive name (up to 32 Name keyboard characters) for the wireless LAN. (SSID1, SSID2, SSID3)
  • Page 86: Wep Encryption

    Figure 57 Network > Wireless LAN > Security: No Security WPA2-PSK has been reworded to WPA-Personal and WPA2-Personal) The following table describes the labels in this screen. Table 32 Network > Wireless LAN > Security: No Security LABEL DESCRIPTION Security Choose No Security from the drop-down list box.
  • Page 87 Figure 58 Network > Wireless LAN > Security: Static The following table describes the wireless LAN security labels in this screen. Table 33 Network > Wireless LAN > Security: Static WEP LABEL DESCRIPTION Security Select Static WEP to enable data encryption. Mode Enter a Passphrase (up to 26 printable characters) and click Generate.
  • Page 88 Keep this setting at Auto unless you Authenticatio want to force a key verification before communication between the n Method wireless client and the ZyXEL Device occurs. Select Shared Key to force the clients to provide the WEP key prior to communication. ASCII Select this option in order to enter ASCII characters as WEP key.
  • Page 89 Figure 59 Network > Wireless LAN > Security: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 34 Network > Wireless LAN > Security: WPA-Personal/Enterprise/WPA2- Persional/Enterprise LABEL DESCRIPTION Select WPA-Personal/Enterprise or WPA2-Personal/Enterprise Security Mode to enable data encryption. This field appears when you choose WPA2-Personal/Enterprise as the Security Mode.
  • Page 90: Mac Filter

    Reset Click Reset to reload the previous configuration for this screen. Refer to Table 31 Network > Wireless LAN > Gener for descriptions of the other labels in this screen. 9.6 MAC Filter The MAC filter screen allows you to configure the MWR211 to give exclusive access to devices (Allow) or exclude devices from accessing the MWR211 (Deny).
  • Page 91: Wireless Lan Advanced Screen

    Table 35 Network > Wireless LAN > MAC Filter LABEL DESCRIPTION Access Policy Define the filter action for the list of MAC addresses in the MAC Address table. Select Allow to permit access to the MWR211, MAC addresses not listed Policy will be denied access to the MWR211.
  • Page 92 Figure 61 Network > Wireless LAN > Advanced The following table describes the labels in this screen. Table 36 Network > Wireless LAN > Advanced LABEL DESCRIPTION Data with its frame size larger than this value will perform the RTS (Request To Send)/CTS (Clear To Send) handshake.
  • Page 93: Quality Of Service (Qos) Screen

    Output Set the output power of the MWR211 in this field. If there is a high Power density of APs in an area, decrease the output power of the MWR211 to reduce interference with other APs. Select one of the following 100%, 90%, 75%, 50%, 25%, 10% or Minimum.
  • Page 94: Wps Screen

    Click Network > Wireless LAN > QoS. The following screen appears. Figure 62 Network > Wireless LAN > QoS The following table describes the labels in this screen. Table 37 Network > Wireless LAN > QoS LABEL DESCRIPTION Check this to have the MWR211 automatically give a service a priority level according to the ToS value in the IP header of packets Enable WMM QoS it sends.
  • Page 95 The following table describes the labels in this screen. Table 38 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select this to enable the WPS feature. This displays a PIN number last time system generated. Click PIN Number Generate to generate a new PIN number.
  • Page 96: Wps Station Screen

    9.10 WPS Station Screen Use this screen when you want to add a wireless station using WPS. To open this screen, click Network > Wireless LAN > WPS Station tab. Note: Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes.
  • Page 97: Scheduling Screen

    9.11 Scheduling Screen Use this screen to set the times your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. The wireless LAN can be scheduled to turn on or off on certain days and at certain times. To open this screen, click Network >...
  • Page 98: Wds Screen

    Select Everyday or the specific days to turn the Wireless LAN on or off. If you select Everyday you cannot select any specific days. This field works in conjunction with the Except for the following times field. Select a begin time using the first set of hour and minute (min) drop down boxes and select an end time using the second set of hour and For the minute (min) drop down boxes.
  • Page 99 The following table describes the labels in this screen. Table 41 Network > Wireless LAN > WDS LABEL DESCRIPTION WDS Setup Select the operating mode for your MWR211. • AP + Bridge - The MWR211 functions as a bridge and access point simultaneously.
  • Page 100: Chapter 10 Wan

    Chapter 12 10 WAN 10.1 Overview This chapter discusses the MWR211’s WAN screens. Use these screens to configure your MWR211 for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.
  • Page 101: What You Can Do

    Figure 68 Ethernet and USB Ports The 3G WAN connection uses wireless 3G adapters connected to a USB port on the MWR211. The USB port is located on the back of the MWR211. 10.2 What You Can Do • Use the Internet Connection screen to enter your ISP information and set how the computer acquires its IP, DNS and WAN MAC Address •...
  • Page 102: Multicast

    DNS Server Address Assignment Use Domain Name System (DNS) to map a domain name to its corresponding IP address and vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
  • Page 103: Internet Connection

    Figure 70 Multicast Example In the multicast example above, systems A and D comprise one multicast group. In multicasting, the server only needs to send one data stream and this is delivered to systems A and D. IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group - it is not used to carry user data.
  • Page 104 Figure 71 Network > WAN > Wired WAN: Ethernet Encapsulation The following table describes the labels in this screen. Table 42 Network > WAN > Wired WAN: Ethernet Encapsulation LABEL DESCRIPTION Ethernet Port Sets the Ethernet port to function as either LAN or WAN. Type ISP Parameters for Internet Access Encapsulation...
  • Page 105 regular Ethernet. WAN IP Address Assignment Select this option If your ISP did not assign you a fixed IP address. automatically This is the default selection. from ISP (Default) Use Fixed IP Select this option If the ISP assigned a fixed IP address. Address Enter your WAN IP address in this field if you selected Use Fixed IP IP Address...
  • Page 106: Pppoe Encapsulation

    Set WAN MAC Select this option and enter the MAC address you want to use. Address Apply Click Apply to save your changes back to the MWR211. Reset Click Reset to begin configuring this screen afresh. 10.4.2 PPPoE Encapsulation The MWR211 supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection.
  • Page 107 Figure 72 Network > WAN > Wired WAN: PPPoE Encapsulation MWR211 User’s Guide...
  • Page 108 The following table describes the labels in this screen. Table 43 Network > WAN > Wired WAN: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Select PPP over Ethernet if you connect to your Internet via dial-up. User Name Type the user name given to you by your ISP.
  • Page 109: Pptp Encapsulation

    Select From ISP if your ISP dynamically assigns DNS server information (and the MWR211's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Select User-Defined if you have the IP address of a DNS server. Enter First DNS the DNS server's IP address in the field to the right.
  • Page 110 This screen displays when you select PPTP encapsulation. Figure 73 Network > WAN > Wired WAN: PPTP Encapsulation The following table describes the labels in this screen. MWR211 User’s Guide...
  • Page 111 Table 44 Network > WAN > Wired WAN: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access To configure a PPTP client, you must configure the User Name Connection Type and Password fields for a PPP connection and the PPTP parameters for a PPTP connection.
  • Page 112 WAN IP Address Assignment Get automatically Select this to get your WAN IP address from your ISP. from ISP Use Fixed IP Select this option If the ISP assigned a fixed IP address. Address My WAN IP Enter your WAN IP address in this field if you selected Use Fixed Address IP Address.
  • Page 113: L2Tp Encapsulation

    10.4.4 L2TP Encapsulation The Layer 2 Tunneling Protocol (L2TP) works at layer 2 (the data link layer) to tunnel network traffic between two peer devices over another network (like the Internet). This screen displays when you select L2TP encapsulation. MWR211 User’s Guide...
  • Page 114 Figure 74 Network > WAN > Wired WAN: L2TP Encapsulation MWR211 User’s Guide...
  • Page 115 The following table describes the labels in this screen. Table 45 Network > WAN > Wired WAN: L2TP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access To configure a L2TP client, you must configure the User Name Connection Type and Password fields for a layer-2 connection and the L2TP parameters for an L2TP connection.
  • Page 116 Use Fixed IP Select this option If the ISP assigned a fixed IP address. Address My WAN IP Enter your WAN IP address in this field if you selected Use Fixed Address IP Address. WAN DNS Assignment Select From ISP if your ISP dynamically assigns DNS server information (and the MWR211's WAN IP address).
  • Page 117: Mobile Wan

    10.5 Mobile WAN The Mobile WAN connection uses a broadband 3G connection via USB adapter provided by a mobile broadband ISP. This allows for mobile connection to the internet within the 3G coverage of your selected mobile provider. This screen displays when you select the Mobile WAN tab. MWR211 User’s Guide...
  • Page 118 Figure 75 Network > WAN > Mobile WAN MWR211 User’s Guide...
  • Page 119 MWR211 User’s Guide...
  • Page 120 The following table describes the labels in this screen. Table 46 Network > WAN > Mobile WAN LABEL DESCRIPTION ISP Parameters for Internet Access Once your connection settings have been applied, click the Connect button to connect your Mobile WAN. When the Status says Connection Status Disconnected the Mobile WAN is not connected.
  • Page 121 Type the Pin Code given to you by your mobile broadband Pin Code provider. Select this option to enable the Data Usage Counter settings. Enable Data Usage The data usage counter is for user convenience. It is not Counter synchronized with the Carrier’s actual data usage. Enter the desired data usage limit in megabytes.
  • Page 122 determine if a WAN connection is alive. Using a connectivity check consumes a minimal amount of network bandwidth but allows the MWR211 to detect network unavailability caused by an upstream interruption. Without connectivity check the MWR can only monitor the direct physical link. If connectivity check is enabled, the remote host to monitor.
  • Page 123: Advanced Wan Screen

    Click Connect to save your changes back to the MWR211. If a 3G Connect adapter is inserted in the USB port, MWR211 will start connection. Reset Click Reset to begin configuring this screen afresh. 10.6 Advanced WAN Screen Use this screen to enable Multicast and enable Auto-bridge. Note: The categories shown in this screen are independent of each other.
  • Page 124: Igmp Snooping Screen

    Select this option to have the MWR211 switch to bridge mode Enable Auto-bridge automatically when the MWR211 gets a WAN IP address in the mode range of 192.168.x.y (where x and y are from zero to nine) no matter what the LAN IP address is. Apply Click Apply to save your changes back to the MWR211.
  • Page 125 Reset Click Reset to begin configuring this screen afresh. MWR211 User’s Guide...
  • Page 126: Chapter 11 Lan

    11 LAN 11.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks.
  • Page 127: Ip Pool Setup

    Figure 79 LAN and WAN IP Addresses (implies wired WAN connection) The LAN parameters of the MWR211 are preset in the factory with the following values: • IP address of 192.168.10.1 with subnet mask of 255.255.255.0 (24 bits) • DHCP server enabled with 32 client IP addresses starting from 192.168.10.33. These parameters should work for the majority of installations.
  • Page 128: Ip Alias Screen

    Figure 80 Network > LAN > IP The following table describes the labels in this screen. Table 49 Network > LAN > IP LABEL DESCRIPTION Type the IP address of your MWR211 in dotted decimal notation. IP Address The subnet mask specifies the network number portion of an IP address.
  • Page 129 Figure 81 Network > LAN > IP Alias The following table describes the labels in this screen. Table 50 Network > LAN > IP Alias LABEL DESCRIPTION IP Alias Check this to enable IP alias. Type the IP alias address of your MWR211 in dotted decimal notation. IP Address The subnet mask specifies the network number portion of an IP address.
  • Page 130: Chapter 12 Dhcp Server

    12 DHCP Server 12.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the MWR211’s LAN as a DHCP server or disable it. When configured as a server, the MWR211 provides the TCP/IP configuration for the clients.
  • Page 131: Advanced Screen

    The following table describes the labels in this screen. Table 51 Network > DHCP Server > General LABEL DESCRIPTION Enable DHCP Enable or Disable DHCP for LAN. Server IP Pool Starting This field specifies the first of the contiguous addresses in the IP Address address pool for LAN.
  • Page 132 Figure 83 Network > DHCP Server > Advanced The following table describes the labels in this screen. Table 52 Network > DHCP Server > Advanced LABEL DESCRIPTION LAN Static DHCP Table This is the index number of the static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN.
  • Page 133 Select From ISP if your ISP dynamically assigns DNS server information (and the MWR211's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
  • Page 134: Network Address Translation (Nat)

    Ch a p t e r 13. Network Address Translation (NAT) 13.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network.
  • Page 135: What You Can Do

    13.2 What You Can Do • Use the General screen to enable NAT and set a default server. • Use the Application screen to forward incoming service requests to the server(s) on your local network. • Use the Advanced screen to change your MWR211’s trigger port settings. 13.3 General NAT Screen Use this screen to enable NAT and set a default server.
  • Page 136: Nat Application Screen

    In addition to the servers for specified services, NAT supports a default server. A default server receives packets from ports that are not specified in the Application screen. Server IP Address If you do not assign a Default Server IP address, the MWR211 discards all packets received for ports that are not specified in the Application screen or remote management.
  • Page 137 Figure 86 Network > NAT > Application The following table describes the labels in this screen. Table 54 Network > NAT > Application LABEL DESCRIPTION Add Application Rule Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address.
  • Page 138: Nat Advanced Screen

    by a comma without spaces, such as 123,567. Server IP Type the IP address of the server on your LAN that receives packets Address from the port(s) specified in the Port field. Application Rules Summary This is the number of an individual port forwarding server entry. Active This icon is turned on when the rule is enabled.
  • Page 139 replace the LAN computer's IP address in the forwarding port with another LAN computer's IP address. Trigger port forwarding solves this problem by allowing computers on the LAN to dynamically take turns using the service. The MWR211 records the IP address of a LAN computer that sends traffic to the WAN to request a service with a specific port number and protocol (a "trigger"...
  • Page 140: Trigger Port Forwarding Example

    All characters are permitted - including spaces. Incoming is a port (or a range of ports) that a server on the WAN uses when it sends out a particular service. The MWR211 forwards the Incoming traffic with this port (or range of ports) to the client computer on the LAN that requested the service.
  • Page 141: Two Points To Remember About Trigger Ports

    Figure 88 Trigger Port Forwarding Process: Example Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the MWR211 to record Jane’s computer IP address. The MWR211 associates Jane's computer IP address with the "incoming"...
  • Page 142: Chapter 14 Dynamic Dns

    Ch a p t er 14 Dynamic DNS 14.1 Overview Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address. 14.2 What You Can Do Use the Dynamic DNS screen to enable DDNS and configure the DDNS settings on the MWR211.
  • Page 143 Figure 89 Network > DDNS The following table describes the labels in this screen. Table 56 Network > DDNS LABEL DESCRIPTION Select this check box to use dynamic DNS. Enable Dynamic Service Provider Select the name of your Dynamic DNS service provider. Enter a host names in the field provided.
  • Page 144: Chapter 15 Opendns

    15. OpenDNS 15.1 Overview This chapter shows you how to configure OpenDNS for your MWR211. OpenDNS is the leading provider of free security and infrastructure services that make the Internet safer through integrated Web content filtering, anti-phishing and DNS. OpenDNS services enable consumers and network administrators to secure their networks from online threats, reduce costs and enforce Internet-use policies.
  • Page 145 Figure 90 Network > OpenDNS The following table describes the labels on this screen. Table 57 Network > OpenDNS LABEL DESCRIPTION OpenDNS Setup Create New Use the “Click here to OpenDNS” link to open http://www.opendns.com. Account / Configure Personalized Setting Enable Select this check box to use OpenDNS after configuring an account OpenDNS...
  • Page 146: Chapter 16 Static Route

    16 Static Route 16.1 Overview This chapter shows you how to configure static routes for your MWR211. Each remote node specifies only the network to which the gateway is directly connected, and the MWR211 has no knowledge of the networks beyond. For instance, the MWR211 knows about network N2 in the following figure through remote node Router 1.
  • Page 147 Figure 92 Network > Static Route The following table describes the labels in this screen. Table 58 Network > Static Route LABEL DESCRIPTION Static Routing Settings Route Name Enter the name that describes or identifies this route. Destination IP Enter the IP network address of the final destination. Address IP Subnet This is the subnet to which the route’s final destination belongs.
  • Page 148 This is the number of an individual static route. Active The rules are always on and this is indicated by the icon. Name This is the name that describes or identifies this route. This parameter specifies the IP network address of the final destination. Destination Routing is always based on network number.
  • Page 149: What You Can Do

    Ch a p t e r 17. Routing Information Protocol 17.1 Overview Routing Information Protocol (RIP) is an interior or intra-domain routing protocol that uses distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers.
  • Page 150 Table 59 Network > RIP LABEL DESCRIPTION Select the RIPv1 or RIPv2 you want the MWR211 to use. Otherwise select None. Apply Click Apply to save your changes back to the MWR211. Reset Click Reset to begin configuring this screen afresh. MWR211 User’s Guide...
  • Page 151: Part Iii: Security

    Part III Part III Security Firewall Content Filter MWR211 User’s Guide...
  • Page 152: Chapter 18 Firewall

    Ch a p t e r 18. Firewall 18.1 Overview This chapter shows you how to enable and configure the firewall that protects your MWR211 and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN.
  • Page 153: What You Need To Know

    • Use the Services screen screen enable service blocking, enter/delete/modify the services you want to block and the date/time you want to block them. 18.3 What You Need To Know The MWR211’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks.
  • Page 154: Services Screen

    Table 60 Security > Firewall > General LABEL DESCRIPTION Select this check box to activate the firewall. The MWR211 performs access control and protects against Denial of Service (DoS) attacks Enable DoS when the firewall is activated. Apply Click Apply to save the settings. Reset Click Reset to start configuring this screen again.
  • Page 155 Figure 96 Security > Firewall > Services The following table describes the labels in this screen. Table 61 Security > Firewall > Services LABEL DESCRIPTION Internet Control Message Protocol is a message control and error- reporting protocol between a host server and a gateway to the ICMP Internet.
  • Page 156 Enable Firewall Rule Enable Firewall Select this check box to activate the firewall rules that you define (see Rule Add Firewall Rule below) Apply Click Apply to save the settings. Add Firewall Rule Service Name Enter a name that identifies or describes the firewall rule. Enter the MAC address of the computer for which the firewall rule MAC Address applies.
  • Page 157 This is the MAC address of the computer for which the firewall rule MAC Address applies. This is the IP address of the computer to which traffic for the Dest IP Address application or service is entering. Source IP This is the IP address of the computer from which traffic for the Address application or service is initialized.
  • Page 158: Chapter 19 Content Filter

    19. Content Filter 19.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords.
  • Page 159: Content Filter Screen

    For example, with the URL http://us.zyxel.com/Corporate/Pressroom/, the MWR211 would find “tw” in the domain name (www.us.zyxel.com). It would also find “news” in the file path (Corporate/Pressroom) but it would not find “com/Corporate”.
  • Page 160 Table 62 Security > Content Filter > Content Filter LABEL DESCRIPTION To enable this feature, type an IP address of any one of the computers in your network that you want to have as a trusted computer. This allows the trusted computer to have full access to all Trusted IP Setup features that are configured to be blocked by content filtering.
  • Page 161 Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed. When you try to access a web page containing a keyword, you will get a message telling you that the content filter is blocking this request. Highlight a keyword in the lower box and click Delete to remove it.
  • Page 162: Part Iv: Management

    Part IV Part IV Management Bandwidth Management Remote Management Universal Plug-and-Play (UPnP) MWR211 User’s Guide...
  • Page 163: Chapter 20 Bandwidth Management

    This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B).
  • Page 164: What You Need To Know

    • Use the Advanced screen to configure bandwidth managements rule for the pre- defined services and applications. • Use the Monitor screen to view the amount of network bandwidth that applications running in the network are using. 20.3 What You Need To Know The sum of the bandwidth allotments that apply to the WAN interface (LAN to WAN, WLAN to WAN) must be less than or equal to the Upstream Bandwidth that you configure in the Bandwidth Management Advanced screen.
  • Page 165: Advanced Screen

    Table 63 Management > Bandwidth Management > General LABEL DESCRIPTION This field allows you to have MWR211 apply bandwidth management. Enable bandwidth management to give traffic that matches a Enable bandwidth rule priority over traffic that does not match a bandwidth Bandwidth rule.
  • Page 166 Figure 100 Management > Bandwidth Management > Advanced The following table describes the labels in this screen. Table 64 Management > Bandwidth Management > Advanced LABEL DESCRIPTION Management Bandwidth Select the total amount of bandwidth (from 64 Kilobits to 32 Megabits) Upstream that you want to dedicate to uplink traffic.
  • Page 167 Use this table to allocate specific amounts of bandwidth based on a Application List pre-defined service. This is the number of an individual bandwidth management rule. Select a priority from the drop down list box. Choose High, Mid or Low. •...
  • Page 168 Click the Edit icon to open the Rule Configuration screen. Modify an existing rule or create a new rule in the Rule Configuration screen. See Rule Modify Configuration: User Defined Service Rule Co for more information. Click the Remove icon to delete a rule. Apply Click Apply to save your customized settings.
  • Page 169 Select Maximum Bandwidth or Minimum Bandwidth and specify Bandwidth the maximum or minimum bandwidth allowed for the rule in kilobits per second. This is the port number of the destination that define the traffic type, for example TCP port 80 defines web traffic. Destination Port Appendix E for some common services and port numbers.
  • Page 170 Table 66 Bandwidth Management Rule Configuration: User-defined Service LABEL DESCRIPTION Select Maximum Bandwidth or Minimum Bandwidth and specify the maximum or minimum bandwidth allowed for the rule in kilobits BW Budget per second. Enter the IP address of the destination computer. Destination The MWR211 applies bandwidth management to the service or Address...
  • Page 171: Monitor Screen

    20.6 Monitor Screen Use this screen to view the amount of network bandwidth that applications running in the network are using. The bandwidth is measured in kilobits per second (kbps). The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using.
  • Page 172 mail: Sending voice signals over the Internet is called Voice over IP or VoIP. Session Initiated Protocol (SIP) is an internationally recognized standard for implementing VoIP. SIP is an application-layer control (signaling) protocol that handles the setting up, altering and tearing VoIP (SIP) down of voice and multimedia sessions over the Internet.
  • Page 173: Chapter 21 Remote Management

    21. Remote Management 21.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your MWR211 from a remote location through the following interfaces: • LAN and WAN • LAN only • WAN only •...
  • Page 174: Remote Management And Nat

    21.3.1 Remote Management and NAT When NAT is enabled: • Use the MWR211’s WAN IP address when configuring from the WAN. • Use the MWR211’s LAN IP address when configuring from the LAN. 21.3.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds).
  • Page 175: Snmp Screen

    Apply Click Apply to save your customized settings and exit this screen. Reset Click Reset to begin configuring this screen afresh. 21.5 SNMP Screen To configure your MWR211’s SNMP settings, click Management > Remote Management > SNMP. Figure 105 Management > Remote Management > SNMP The following table describes the labels in this screen.
  • Page 176 Table 69 Management > Remote Management > SNMP LABEL DESCRIPTION Select the Enable SNMP check box to enable the SNMP functions. Enable SNMP Select the SNMP Version used by your management utility. Currently SNMP Version MWR211 only supports v1. Enter the Community name used by your SNMP devices and programs. Get / Set Devices not in the same Community will not be able to communicate Community...
  • Page 177: Universal Plug-And-Play (Upnp)

    Chapter 22. Universal Plug-and- Play (UPnP) 22.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 178: Cautions With Upnp

    • Learning public IP addresses • Assigning lease times to mappings Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. 22.3.2 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues.
  • Page 179: Technical Reference

    Select this check box to activate UPnP. Be aware that anyone Enable the Universal could use a UPnP application to open the web configurator's Plug and Play (UPnP) login screen without entering the MWR211's IP address Feature (although you must still enter the password to access the web configurator).
  • Page 180 Figure 107 Network Connections In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 108 Internet Connection Properties You may edit or delete the port mappings or click Add to manually add port mappings.
  • Page 181 Figure 109 Internet Connection Properties: Advanced Settings Figure 110 Internet Connection Properties: Advanced Settings: Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. Select Show icon in notification area when connected option and click OK.
  • Page 182: Web Configurator Easy Access

    Figure 112 Internet Connection Status 22.5.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the MWR211 without finding out the IP address of the MWR211 first. This comes helpful if you do not know the IP address of the MWR211. Follow the steps below to access the web configurator.
  • Page 183 Figure 113 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. Right-click on the icon for your MWR211 and select Invoke. The web configurator login screen displays. Figure 114 Network Connections: My Network Places Right-click on the icon for your MWR211 and select Properties.
  • Page 184 Figure 115 Network Connections: My Network Places: Properties: Example MWR211 User’s Guide...
  • Page 185: Part V: Maintenance And Troubleshooting

    Part V Maintenance and Troubleshooting Maintenance Password Time Firmware Upgrade Backup/Restore/Reset Restart Sys OP Mode Alert Troubleshooting MWR211 User’s Guide...
  • Page 186: Chapter 23 Maintenance

    Cha p te r 23. Maintenance 23.1 Overview This chapter provides information on the Maintenance > General screen. 23.2 What You Can Do • Use the General screen to enter a name to identify the MWR211 in the network and set the password. •...
  • Page 187 Table 71 Maintenance > General LABEL DESCRIPTION System Setup System Name is a unique name to identify the MWR211 in an System Name Ethernet network. Domain Name Enter the domain name you want to give to the MWR211. Type how many minutes a management session can be left idle before the session times out.
  • Page 188: Chapter 24 Password

    24. Password 24.1 Overview This chapter contains information about configuring general log settings and viewing the MWR211’s logs. Refer to the appendices for example log message explanations. The Web Configurator allows you to look at all of the MWR211’s logs in one location.
  • Page 189 Click Maintenance > Password. Figure 117 Maintenance > Password The following table describes the labels in this screen. ble 72 Maintenance > Password LABEL DESCRIPTION Change your MWR211’s password (recommended) using the fields as Password Setup shown. Type the default password or the existing password you use to Old Password access the system in this field.
  • Page 190: Time

    25. T i me 25.1 Overview This chapter provides information on the Time Setting screens. See Section 3.2.3 for more information on how to set up the MWR211’s date and time. 25.2 What You Can Do Use the Time Setting screen to change your MWR211’s time and date. 25.3 Time Setting Screen Use this screen to configure the MWR211’s time based on your local time zone.
  • Page 191 Table 73 Maintenance > Time LABEL DESCRIPTION Current Time and Date This field displays the time of your MWR211. Current Time Each time you reload this page, the MWR211 synchronizes the time with the time server. This field displays the date of your MWR211. Current Date Each time you reload this page, the MWR211 synchronizes the date with the time server.
  • Page 192 Time Zone Setup Choose the time zone of your location. This will set the time Time Zone difference between your time zone and Greenwich Mean Time (GMT). Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to Daylight Savings give more daytime light in the evening.
  • Page 193: Chapter 26 Firmware Upgrade

    Use the Firmware screen to upload firmware to your MWR211. 26.3 Firmware Upload Screen Find firmware at http://us.zyxel.com/Support/Download-Library.aspx. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 194 Table 74 Maintenance > Firmware Upgrade LABEL DESCRIPTION Type in the location of the file you want to upload in this field or click File Path Browse... to find it. Click Browse... to find the .bin file you want to upload. Remember that Browse...
  • Page 195: Backup/Restore

    27. Backup/Restore/ Reset 27.1 Overview This chapter shows you how to backup, restore and reset your MWR211. Backup configuration allows you to back up (save) the MWR211’s current configuration to a file on your computer. Once your MWR211 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
  • Page 196 Figure 121 Maintenance > Backup/Restore The following table describes the labels in this screen. Table 75 Maintenance > Backup/Restore LABEL DESCRIPTION Click Backup to save the MWR211’s current configuration to your Backup computer. Type in the location of the file you want to upload in this field or click File Path Browse...
  • Page 197 Pressing the Reset button in this section clears all user-entered configuration information and returns the MWR211 to its factory defaults. Reset You can also press the RESET button on the rear panel to reset the factory defaults of your MWR211. Refer to the chapter about introducing the Web Configurator for more information on the RESET button.
  • Page 198: Chapter 28 Reset/Restart

    28. Restart 28.1 Overview This chapter shows you how to restart your MWR211. 28.2 What You Can Do Use the Restart screen to boot the MWR211 without turning the power off. 28.3 Restart Screen System restart allows you to reboot the MWR211 without turning the power off. Click Maintenance >...
  • Page 199: Sys Op Mode

    29. Sys OP Mode 29.1 Overview The Sys OP Mode (System Operation Mode) function lets you configure your MWR211 as a router, access point or Wireless ISP (WISP) client. You can choose between Router Mode, Access Point Mode and WISP Mode depending on your network topology and the features you require from your device.
  • Page 200 Figure 123 LAN and WAN IP Addresses in Router Mode Access Point An access point enabled all Ethernet ports to be bridged together and be in the same subnet. To connect to the Internet, another device, such as a router, is required.
  • Page 201: Sys Op Mode Screen

    29.4 Sys Op Mode Screen Use this screen to select how you want to use your MWR211. Figure 126 Maintenance > Sys OP Mode The following table describes the labels in the General screen. Table 76 Maintenance > Sys OP Mode LABEL DESCRIPTION System Operation Mode...
  • Page 202 Select WISP Mode if your device needs a wireless client to connect to an existing access point. • You cannot configure Wireless LAN settings (including WPS) and WISP Mode scheduling in the WISP mode. • The IP address of the device on the local network is the same as the IP address given to the MWR211 while in router mode (default is 192.168.10.1).
  • Page 203: Chapter 30 Alert

    30. Alert 30.1 Overview The Alert (SMTP) function enable MWR211 sends mobile data usage alert to the users. When the router has downloaded data reaching 90% of the usage allowance, the quota manager will send a warning alert to the users (if the Email- Alert is enabled) and /or post a log to the system.
  • Page 204 Figure 127 Maintenance > Alert The following table describes the labels in the Alert screen. Table 77 Maintenance > Alert LABEL DESCRIPTION Select Enable Alert to use the alert functions of the MWR211. Enable Alert Select Enable Log to send system log information in the alert. Enable Log Select Enable Email to allow alert information to be sent by email.
  • Page 205 Enable Select Enable Secondary Email Recipient to set up a second email Secondary address to send alerts to. Email Recipient Apply Click Apply to save your settings. Reset Click Reset to return your settings to the default (Router) MWR211 User’s Guide...
  • Page 206: Chapter 31 Troubleshooting

    C h a p t e r 31 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Internet Access • Resetting MWR211 •...
  • Page 207: Mwr211 Access And Login

    Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adaptor to the MWR211. If the problem continues, contact the vendor. 31.2 MWR211 Access and Login I don’t know the IP address of my MWR211.
  • Page 208 I cannot see or access the Login screen in the Web Configurator. Make sure you are using the correct IP address. • The default IP address is 192.168.10.1. • If you changed the IP address (Section 13.4), use the new IP address.
  • Page 209: Internet Access

    31.3 Internet Access I cannot access the Internet. Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. Make sure you entered your ISP account information correctly. These fields are case-sensitive, so make sure [Caps Lock] is not on. If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP.
  • Page 210 If the problem continues, contact your ISP. The Internet connection is slow or intermittent. There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5. If the MWR211 is sending or receiving a lot of information, try closing some programs that use the Internet, especially peer-to-peer applications.
  • Page 211: Wireless Router/Ap Troubleshooting

    If the MWR211 restarts automatically, wait for the MWR211 to finish restarting, and log in to the Web Configurator. The password is “1234”. If the MWR211 does not restart automatically, disconnect and reconnect the MWR211’s power. Then, follow the directions above again. 31.5 Wireless Router/AP Troubleshooting...
  • Page 212 In the Network > LAN > Advanced screen, make sure Allow between LAN and WAN is checked. This is not checked by default to keep the LAN secure. If you still cannot access a network folder, make sure your account has access rights to the folder you are trying to open.
  • Page 213 Table 78 Hardware Features Dimensions (W x D x 162 mm x 115 mm x 33 mm Weight 252 g Input: 100~240 V AC, 50~60 Hz Power Specification Output: 5V DC 2A Auto-negotiating: 10 Mbps, 100 Mbps in either half-duplex or full-duplex mode.
  • Page 214 Frequency) interference from other 2.4 GHz devices such as microwave ovens, wireless phones, Bluetooth enabled devices, and other wireless LANs. Download new firmware (when available) from the ZyXEL web site and use the Web Configurator to put it on the MWR211. Firmware Upgrade Note: Only upload firmware for your specific model! Make a copy of the MWR211’s configuration and put it back on...
  • Page 215 IP default gateway and DNS servers to computers on your Configuration Protocol) network. With Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic Dynamic DNS Support IP address. You must register for this service with a Dynamic DNS service provider.
  • Page 216 IP Multicast is used to send traffic to a specific group of computers. The MWR211 supports versions 1 and 2 of IGMP IP Multicast (Internet Group Management Protocol) used to join multicast groups (see RFC 2236). Use logs for troubleshooting. You can view logs in the Web Logging Configurator.
  • Page 217: Product Specifications

    32 Product Specifications The following tables summarize the MWR211’s hardware and firmware features. Table 78 Hardware Features Dimensions (W x D x 162 mm x 115 mm x 33 mm Weight 252 g Input: 100~240 V AC, 50~60 Hz Power Specification Output: 5V DC 2A Auto-negotiating: 10 Mbps, 100 Mbps in either half-duplex or full-duplex mode.
  • Page 218 Frequency) interference from other 2.4 GHz devices such as microwave ovens, wireless phones, Bluetooth enabled devices, and other wireless LANs. Download new firmware (when available) from the ZyXEL web site and use the Web Configurator to put it on the MWR211. Firmware Upgrade Note: Only upload firmware for your specific model! Make a copy of the MWR211’s configuration and put it back on...
  • Page 219 IP default gateway and DNS servers to computers on your Configuration Protocol) network. With Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic Dynamic DNS Support IP address. You must register for this service with a Dynamic DNS service provider.
  • Page 220 IP Multicast is used to send traffic to a specific group of computers. The MWR211 supports versions 1 and 2 of IGMP IP Multicast (Internet Group Management Protocol) used to join multicast groups (see RFC 2236). Use logs for troubleshooting. You can view logs in the Web Logging Configurator.
  • Page 221: Part Vi: Appendices And Index

    Part VI Appendices and Index Pop-up Windows, JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer’s IP Address Wireless LANs Common Services Legal Information MWR211 User’s Guide...
  • Page 222: Appendix A Pop-Up Windows, Javascripts And Java Permissions

    Ap p e ndi x Appendix A Pop-up Windows, JavaScripts and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 223 Figure 130 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen.
  • Page 224 Select Settings…to open the Pop-up Blocker Settings screen. Figure 132 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. Click Add to move the IP address to the list of Allowed sites. MWR211 User’s Guide...
  • Page 225 Figure 133 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. In Internet Explorer, click Tools, Internet Options and then the Security tab.
  • Page 226 Figure 134 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). Click OK to close the window. MWR211 User’s Guide...
  • Page 227 Figure 135 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. Click OK to close the window.
  • Page 228 Figure 136 Security Settings – Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. Click OK to close the window. MWR211 User’s Guide...
  • Page 229 Figure 137 Java (Sun) MWR211 User’s Guide...
  • Page 230: Appendix B Ip Addresses And Subnetting

    Appendix B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts.
  • Page 231 Figure 138 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
  • Page 232 Table 80 Subnet Mask - Identifying Network Number OCTET: OCTET: OCTET: OCTET (192) (168) IP Address (Binary) 11000000 10101000 00000001 00000010 Subnet Mask (Binary) 11111111 11111111 11111111 00000000 Network Number 11000000 10101000 00000001 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
  • Page 233 mask 29-bit 11111111 11111111 11111111 11111000 255.255.255.24 mask Network Size The size of the network number determines the maximum number of possible hosts you can have on your network. The larger the number of network number bits, the smaller the number of remaining host ID bits. An IP address with host IDs of all zeros is the IP address of the network (192.168.1.0 with a 24-bit subnet mask, for example).
  • Page 234 octet. This is usually specified by writing a “/” followed by the number of bits in the mask after the address. For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet masks using both notations. Table 83 Alternative Subnet Mask Notation SUBNET ALTERNATIV...
  • Page 235 The following figure shows the company network before subnetting. Figure 139 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
  • Page 236 In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.128 is its broadcast address.
  • Page 237 Table 84 Subnet 1 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE IP Address (Decimal) 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: Lowest Host ID: 192.168.1.1 192.168.1.0 Broadcast Address: Highest Host ID: 192.168.1.62 192.168.1.63 Table 85 Subnet 2 LAST OCTET BIT IP/SUBNET MASK...
  • Page 238 Table 86 Subnet 3 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 10000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: Lowest Host ID: 192.168.1.129 192.168.1.128 Broadcast Address: Highest Host ID: 192.168.1.190 192.168.1.191 Table 87 Subnet 4 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER...
  • Page 239 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 88 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS...
  • Page 240 255.255.255.192 (/26) 255.255.255.224 (/27) 255.255.255.240 (/28) 255.255.255.248 (/29) 255.255.255.252 (/30) 255.255.255.254 (/31) The following table is a summary for subnet planning on a network with a 16-bit network number. Table 90 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS SUBNET MASK HOST BITS SUBNETS...
  • Page 241 255.255.255.192 (/26) 1024 255.255.255.224 (/27) 2048 255.255.255.240 (/28) 4096 255.255.255.248 (/29) 8192 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
  • Page 242 Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks: • 10.0.0.0 — 10.255.255.255 • 172.16.0.0 — 172.31.255.255 • 192.168.0.0 — 192.168.255.255 You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a private network.
  • Page 243: Appendix C Setting Up Your Computer's Ip Address

    Ap p e n di x Appendix C Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer.
  • Page 244 Figure 141 Windows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: In the Network window, click Add. Select Adapter and then click Add.
  • Page 245 Click Add. Select Client and then click Add. Select Microsoft from the list of manufacturers. Select Client for Microsoft Networks from the list of network clients and then click OK. Restart your computer so the changes you made take effect. Configuring In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties...
  • Page 246 Figure 143 Windows 95/98/Me: TCP/IP Properties: DNS Configuration Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add.
  • Page 247 Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 144 Windows XP: Start Menu In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 145 Windows XP: Control Panel Right-click Local Area Connection and then click Properties. MWR211 User’s Guide...
  • Page 248 Figure 146 Windows XP: Control Panel: Network Connections: Properties Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 147 Windows XP: Local Area Connection Properties The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 249 • Click Advanced. Figure 148 Windows XP: Internet Protocol (TCP/IP) Properties If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 250 Figure 149 Windows XP: Advanced TCP/IP Properties In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
  • Page 251 Figure 150 Windows XP: Internet Protocol (TCP/IP) Properties Click OK to close the Internet Protocol (TCP/IP) Properties window. Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
  • Page 252 Figure 151 Windows 7/Vista Click on Network and Internet. Figure 152 Windows 7/Vista Click on Network and Sharing Center MWR211 User’s Guide...
  • Page 253 Figure 153 Windows 7/Vista On the left side of the screen click on Change Adapter Settings (Windows 7), or Manage Network Connections (Vista). Right click on Local Area Connection and select Properties. Figure 154 Windows 7/Vista Highlight Internet Protocol Version 4 and click Properties. MWR211 User’s Guide...
  • Page 254 Figure 155 Windows 7/Vista Select Use the Following IP Address and enter your IP address, Subnet Mask, and Default Gateway. Enter your DNS server address (if trying to connect to the internet) and click OK. Figure 156 Windows 7/Vista Click OK or Close on the Local Area Connection Properties window to apply the settings.
  • Page 255 Macintosh OS 8/9 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Figure 157 Macintosh OS 8/9: Apple Menu Select Ethernet built-in from the Connect via list. Figure 158 Macintosh OS 8/9: TCP/IP MWR211 User’s Guide...
  • Page 256 For dynamically assigned settings, select Using DHCP Server from the Configure: list. For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 257 Figure 160 Macintosh OS X: Network For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 258 Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. Click the Red Hat button (located on the bottom left corner), select System Setting and click Network. Figure 161 Red Hat 9.0: KDE: Network Configuration: Devices Double-click on the profile of the network card you wish to configure.
  • Page 259 Click OK to save the changes and close the Ethernet Device General screen. If you know your DNS server IP address(es), click the DNS tab in the Network Configuration screen. Enter the DNS server information in the fields provided. Figure 163 Red Hat 9.0: KDE: Network Configuration: DNS Click the Devices tab.
  • Page 260 • If you have a dynamic IP address, enter dhcp in the BOOTPROTO= field. The following figure shows an example. Figure 165 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp USERCTL=no PEERDNS=yes TYPE=Ethernet • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask.
  • Page 261 Figure 169 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:717 errors:0 dropped:0 overruns:0 frame:0 TX packets:13 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:730412 (713.2 Kb) TX bytes:1570 (1.5 Kb) Interrupt:10 Base address:0x1000 [root@localhost]#...
  • Page 262: Appendix D Wireless Lans

    Appe nd ix Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 263 Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS is enabled, wireless station A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. Figure 171 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired...
  • Page 264 Figure 172 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
  • Page 265 When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
  • Page 266 A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
  • Page 267 Table 91 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/4 OFDM (Orthogonal Frequency Division Multiplexing) 8/54 IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features.
  • Page 268 • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless station and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: •...
  • Page 269 EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless station. The wireless station ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text. However, MD5 authentication has some weaknesses.
  • Page 270 Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen.
  • Page 271 WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication.
  • Page 272 instead of user-specific credentials. The common-password approach makes WPA-PSK susceptible to brute-force password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password. User Authentication WPA or WPA2 applies IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database.
  • Page 273 Figure 174 WPA(2)-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system.
  • Page 274 Table 93 Wireless Security Relational Matrix AUTHENTICATION ENCRYPTI METHOD/ KEY ENTER IEEE 802.1X MANAGEMENT MANUAL KEY METHOD PROTOCOL Open None Disable Enable without Dynamic WEP Open Enable with Dynamic WEP Enable without Dynamic WEP Disable Shared Enable with Dynamic WEP Enable without Dynamic WEP Disable WPA-Enterprise...
  • Page 275: Appendix E Common Services

    A p p e n d i x Appendix E Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site.
  • Page 276 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example http://us.zyxel.com) to IP numbers. User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER...
  • Page 277 IGMP User-Defined Internet Group Management Protocol (MULTICAST) is used when sending packets to a specific group of hosts. The Internet Key Exchange algorithm is used for key distribution and management. TCP/UDP 6667 This is another popular Internet chat program. MSN Messenger 1863 Microsoft Networks’...
  • Page 278 RCMD Remote Command Service. REAL_AUDIO 7070 A streaming audio service that enables real time sound over the web. REXEC Remote Execution Daemon. RLOGIN Remote Login. RTELNET Remote Telnet. RTSP TCP/UDP The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet.
  • Page 279 Login Host Protocol used for TACACS (Terminal Access Controller Access Control System). Telnet is the login and terminal TELNET emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems.
  • Page 280: Appendix F Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice.
  • Page 281 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 282 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
  • Page 283 This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser.
  • Page 284: Appendix G Open Source Licenses

    THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU...
  • Page 285 ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed. 2.Ownership You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect.
  • Page 286 THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES...
  • Page 287 ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of...
  • Page 288 For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (freesoftware@zyxel.com), for a charge of no more than our cost of...
  • Page 289 Ntpclient http://doolittle.icarus.com/ntp 2000 345 2000 345 client/ GPL 2.0 http://www.hpl.hp.com/perso Wireless_t Wireless nal/Jean_Tourrilhes/Linux/Tool ools 29 _tools 29 s.html GPL 2.0 Bridge- http://www.linuxfoundation.or utils 1.1 g/en/Net:Bridge GPL 2.0 Pptp-client http://pptpclient.sourceforge.n 1.7.1 1.7.1 GPL 2.0 http://ppp.samba.org/ppp/do Ppp 2.4.2 2.4.2 wnload.html GPL 2.0 Rp-12tp http://sourceforge.net/project s/rp-l2tp/...
  • Page 290 libm 0.9.28 http://www.uclibc.org/ LGPL 2.1 libnsl 0.9.28 http://www.uclibc.org/ LGPL 2.1 libnvram 0.9.28 http://www.uclibc.org/ LGPL 2.1 libpthread 0.9.28 http://www.uclibc.org/ LGPL 2.1 libresolv 0.9.28 http://www.uclibc.org/ LGPL 2.1 libusb- 0.1.12 http://www.libusb.org/ 0.1.12 LGPL 2.1 libusb- 1.0.0 http://www.libusb.org/ 1.0.0 LGPL 2.1 libutil 0.9.28 http://www.uclibc.org/ LGPL 2.1 lsusb 1.0.0...
  • Page 291 No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes Linux Kernel 2.6.21.x, Busybox 1.12.1, Dnsmasq 2.40, Goahead 2.1.8, Igmpproxy 0.1 beta2, Inadyn 1.96, Iproute2 2.6.24, Rp-pppoe 3.8, Iptables 1.4.0rc1, Updatedd 2.5, Linux-igd 1, Lldt 1.2,...
  • Page 292 copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code.
  • Page 293 modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of...
  • Page 294 above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable.
  • Page 295 any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system;...
  • Page 296 THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 297 When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it;...
  • Page 298 However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library.
  • Page 299 running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does.
  • Page 300 License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.
  • Page 301 for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above);...
  • Page 302 However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it.
  • Page 303 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.
  • Page 304 This Product includes Libupnp 1.3.1, openssl-0.9.8e, snmpd under the BSD License. Copyright (c) [dates as appropriate to package] Regents University of California. rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.
  • Page 305 Copyright (C) 1995-2004 Jean-loup Gailly and Mark Adler This software is provided 'as-is', without any express or implied warranty. In no event will the authors be held liable for any damages arising from the use of this software. Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: The origin of this software must not be misrepresented;...
  • Page 306 jloup@gzip.org madler@alumni.caltech.edu The data format used by the zlib library is described by RFCs (Request for Comments) 1950 to 1952 in the files ftp://ds.internic.net/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format) and rfc1952.txt (gzip format). This Product includes curl-7.19.7 under the Curl MIT/X License. Curl License COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2010, Daniel Stenberg, <daniel@haxx.se>.
  • Page 307 OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.
  • Page 308 The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Library General Public License, applies to some specially designated Free Software Foundation software, and to any other libraries whose authors decide to use it.
  • Page 309 individually obtain patent licenses, thus in effect transforming the program into proprietary software. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License, which was designed for utility programs.
  • Page 310 TERMS CONDITIONS COPYING, DISTRIBUTION MODIFICATION 0. This License Agreement applies to any software library which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Library General Public License (also called "this License").
  • Page 311 You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:...
  • Page 312 In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
  • Page 313 is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not.
  • Page 314 files in the Library will not necessarily be able to recompile the application to use the modified definitions.) * b) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
  • Page 315 However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 9. You are not required to accept this License, since you have not signed it.
  • Page 316 This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License. 12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus...
  • Page 317 WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF...
  • Page 318 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the Library General Public License for more details. You should have received a copy of the GNU Library General Public License along with this library; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA.
  • Page 319 math library for Apple's MacOS X/Darwin math library, which was itself swiped from FreeBSD. The original copyright information is as follows: Copyright (C) 1993 by Sun Microsystems, Inc. All rights reserved. Developed at SunPro, a Sun Microsystems, Inc. business. Permission to use, copy, modify, and distribute this software is freely granted, provided that this notice is preserved.
  • Page 320 * Copyright (C) 2006 Tomas Matejicek, slax.org * LICENSE must follow the one in squashfs. This Product includes radvd-1.0 under the radvd License. radvd License The author(s) grant permission for redistribution and use in source and binary forms, with or without modification, of the software and documentation provided that the following conditions are met: 0.
  • Page 321 must display the following acknowledgement with the name(s) of the authors as specified in the copyright notice(s) substituted where indicated: This product includes software developed by the authors which are mentioned at the start of the source files and other contributors. 5.
  • Page 322 This Product includes wsc_upnp under the Ralink and Intel License. wsc_upnp License /////////////////////////////////////////////////////////////////////////// // Copyright (c) 2000-2003 Ralink Corporation // All rights reserved. // Redistribution and use in source and binary forms, with or without // modification, are permitted provided that the following conditions are met: // * Redistributions of source code must retain the above copyright notice, // this list of conditions and the following disclaimer.
  • Page 323 // EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, // PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR // PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY // OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING // NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS...
  • Page 324 // THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS // "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT // LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR // A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL INTEL // CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, // EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT...
  • Page 325 based at SourceForge, and Networks Associates Technology, Inc hold the copyright on behalf of the wider Net-SNMP community, covering all derivative work done since then. An additional copyright section has been added as Part 3 below also under a BSD license for the work contributed by Cambridge Broadband Ltd.
  • Page 326 pertaining to distribution of the software without specific written permission. CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE...
  • Page 327 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDERS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 328 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDER ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 329 notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. * Neither the name of the Sun Microsystems, Inc. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 330 documentation and/or other materials provided with the distribution. * Neither the name of Sparta, Inc nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE...
  • Page 331 * Neither the name of Cisco, Inc, Beijing University of Posts and Telecommunications, nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE...
  • Page 332 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 333 “LZMA SDK Copyright (C) 1999-2006 Igor Pavlov LICENSE ------- LZMA SDK is available under any of the following licenses: 1) GNU Lesser General Public License (GNU LGPL) 2) Common Public License (CPL) 3) Simplified license for unmodified code (read SPECIAL EXCEPTION) 4) Proprietary license It means that you can select one of these four options and follow rules of that license.
  • Page 334 while you keep LZMA SDK code unmodified. SPECIAL EXCEPTION #2: Igor Pavlov, as the author of this code, expressly permits you to use this code under the same terms and conditions contained in the License Agreement you have for any previous version of LZMA SDK developed by Igor Pavlov.
  • Page 335 You should have received a copy of the GNU Lesser General Public License along with this library; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 You should have received a copy of the Common Public License along with this library.“...
  • Page 336 This Product includes mkimage under the following License. mkimage License NOTE! This copyright does *not* cover the so-called "standalone" applications that use U-Boot services by means of the jump table provided by U-Boot exactly for this purpose - this is merely considered normal use of U-Boot, and does *not* fall under the heading of "derived work".
  • Page 337 This Product includes ntp-4.1.2 under the following License. ntp-4.1.2 License The following copyright notice applies to all files collectively called the Network Time Protocol Version 4 Distribution. Unless specifically declared otherwise in an individual file, this notice applies as if the text was explicitly included in the file.
  • Page 338 The following individuals contributed in part to the Network Time Protocol Distribution Version 4 and are acknowledged as authors of this work. 1. Mark Andrews <mark_andrews@isc.org> Leitch atomic clock controller 2. Bernd Altmeier <altmeier@atlsoft.de> hopf Elektronik serial line and PCI-bus devices 3.
  • Page 339 18. Dave Hart <davehart@davehart.com> General maintenance, Windows port interpolation rewrite. 19. Claas Hilbrecht <neoclock4x@linum.com> NeoClock4X clock driver 20. Glenn Hollinger <glenn@herald.usask.ca> GOES clock driver 21. Mike Iglesias <iglesias@uci.edu> DEC Alpha port 22. Jim Jagielski <jim@jagubox.gsfc.nasa.gov> A/UX port 23. Jeff Johnson <jbj@chatham.usdesign.com> massive prototyping overhaul 24.
  • Page 340 38. Kamal A Mostafa <kamal@whence.com> SCO OpenServer port 39. Derek Mulcahy <derek@toybox.demon.co.uk> and Damon Hart-Davis <d@hd.org> ARCRON MSF clock driver 40. Rob Neal <neal@ntp.org> Bancomm refclock and config/parse code maintenance 41. Rainer Pruy <Rainer.Pruy@informatik.uni-erlangen.de> monitoring/trap scripts, statistics file handling 42. Dirce Richards <dirce@zk3.dec.com> Digital UNIX V4.0 port 43.

This manual is also suitable for:

Mwr211

Table of Contents