ZyXEL Communications NBG-4615 User Manual

Wireless n gigabit netusb router
Hide thumbs Also See for NBG-4615:
Table of Contents

Advertisement

Quick Links

NBG4615
Wireless N Gigabit NetUSB Router
Default Login Details
IP Address
http://192.168.1.1
Password
Firmware Version 1.0
Edition 1, 12/2010
www.zyxel.com
www.zyxel.com
1234
Copyright © 2011
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NBG-4615

  • Page 1 NBG4615 Wireless N Gigabit NetUSB Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 1, 12/2010 www.zyxel.com www.zyxel.com Copyright © 2011 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com.
  • Page 4 • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products. • Forum This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.
  • Page 5 Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.
  • Page 6: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 7 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG4615 icon is not an exact representation of your device. NBG4615 Computer Notebook computer Server DSLAM Firewall Telephone Switch Router Modem NBG4615 User’s Guide...
  • Page 8: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 19 Introduction ..........................21 The WPS Button ........................25 ZyXEL NetUSB Share Center Utility ..................27 Connection Wizard ........................35 Introducing the Web Configurator ....................47 Monitor ............................53 NBG4615 Modes ........................59 Easy Mode ..........................
  • Page 10 Contents Overview NBG4615 User’s Guide...
  • Page 11: Table Of Contents

    ZyXEL NetUSB Share Center Utility ..................27 3.1 Overview ..........................27 3.1.1 Quick Setup ........................ 28 3.1.2 Installing ZyXEL NetUSB Share Center Utility ............28 3.2 The ZyXEL NetUSB Share Center Utility ................29 3.2.1 The Menus ......................... 29 3.2.2 The Share Center Configuration Window ..............30 3.2.3 The Auto-Connect Printer List Window ..............
  • Page 12 Table of Contents 4.1 Overview ..........................35 4.2 Accessing the Wizard ......................35 4.3 Connect to Internet ......................36 4.3.1 Connection Type: DHCP .................... 37 4.3.2 Connection Type: Static IP ..................38 4.3.3 Connection Type: PPPoE ................... 38 4.3.4 Connection Type: PPTP ..................... 40 4.3.5 Connection Type: L2TP ....................
  • Page 13 Table of Contents 8.2 What You Can Do ........................ 62 8.3 What You Need to Know ...................... 62 8.4 Navigation Panel ......................... 63 8.5 Network Map ........................63 8.6 Control Panel ........................64 8.6.1 Game Engine ......................65 8.6.2 Power Saving ......................66 8.6.3 Content Filter ......................
  • Page 14 Table of Contents Chapter 12 WISP Mode ..........................99 12.1 Overview ..........................99 12.2 What You Can Do ......................99 12.3 What You Need to Know ....................100 12.3.1 Setting your NBG4615 to WISP Mode ..............100 12.3.2 Accessing the Web Configurator in WISP Mode ............ 100 12.4 WISP Mode Status Screen ....................
  • Page 15 Table of Contents 14.8 WPS Station Screen ......................143 14.9 Scheduling Screen ......................144 14.10 WDS Screen ........................146 Chapter 15 IPv6............................149 15.1 Overview .......................... 149 15.1.1 What You Need to Know ..................149 15.2 The IPv6 Screen ......................150 Chapter 16 WAN............................
  • Page 16 Table of Contents Chapter 19 NAT............................177 19.1 Overview ........................177 19.1.1 What You Can Do ....................178 19.1.2 What You Need To Know ..................178 19.2 General ..........................180 19.3 Application ........................181 19.4 Advanced ......................... 183 19.5 Technical Reference ......................184 19.5.1 NATPort Forwarding: Services and Port Numbers ..........
  • Page 17 Table of Contents 24.2 Content Filter ........................202 24.3 Technical Reference ......................203 24.3.1 Customizing Keyword Blocking URL Checking ............203 Chapter 25 Bandwidth Management....................... 205 25.1 Overview ......................... 205 25.2 What You Can Do ......................205 25.3 What You Need To Know ....................206 25.4 General Screen ......................
  • Page 18 29.4 Internet Access ........................ 242 29.5 Resetting the NBG4615 to Its Factory Defaults ............... 244 29.6 Wireless Router/AP Troubleshooting ................244 29.7 ZyXEL Share Center Utility Problems ................246 Appendix A Product Specifications..................249 29.8 Wall-mounting Instructions ....................251 Appendix B Pop-up Windows, JavaScript and Java Permissions ........253 Appendix C IP Addresses and Subnetting ................
  • Page 19: User's Guide

    User’s Guide...
  • Page 21: Introduction

    A range of services such as a firewall and content filtering are also available for secure Internet computing. Note: Be sure to install the ZyXEL NetUSB Share Center Utility (for NetUSB functionality) from the included disc, or download the latest version from the zyxel.com website.
  • Page 22: Ways To Manage The Nbg4615

    • WPS (Wi-Fi Protected Setup). You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL Device. • Web Configurator. This is recommended for everyday management of the NBG4615 using a (supported) web browser.
  • Page 23 Chapter 1 Introduction The following table describes the LEDs and the WPS button. Table 1 Front panel LEDs and WPS button COLOR STATUS DESCRIPTION Power Green The NBG4615 is receiving power and functioning properly. The NBG4615 is not receiving power. LAN 1-4 Green The NBG4615’s LAN connection is ready.
  • Page 24 Chapter 1 Introduction NBG4615 User’s Guide...
  • Page 25: The Wps Button

    H A P T E R The WPS Button 2.1 Overview Your NBG4615 supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
  • Page 26 Chapter 2 The WPS Button NBG4615 User’s Guide...
  • Page 27: Zyxel Netusb Share Center Utility

    Utility 3.1 Overview The ZyXEL NetUSB Share Center Utility allows you to work with the USB devices that are connected directly to the NBG4615 as if they are connected directly to your computer. This allows you to easily share USB-based devices such as...
  • Page 28: Quick Setup

    In this example, a USB printer, fax machine, and scanner are all connected to a USB hub. The hub is in turn connected directly to the NBG4615. Any computer with a ZyXEL NetUSB Share Center Utility installed on it and which is connected to the NBG4615’s LAN ports can access these devices.
  • Page 29: The Zyxel Netusb Share Center Utility

    Chapter 3 ZyXEL NetUSB Share Center Utility To open the ZyXEL NetUSB Share Center Utility, double-click its system tray icon. 3.2 The ZyXEL NetUSB Share Center Utility This section describes the ZyXEL NetUSB Share Center Utility main window. Figure 3 ZyXEL NetUSB Share Center Utility Main Window 3.2.1 The Menus...
  • Page 30: The Share Center Configuration Window

    Select this to run the utility automatically when you log into or start up Windows. Language Select a language for the ZyXEL NetUSB Share Center Utility. You must restart the utility for the change to take effect. Click this to save your changes and close the window.
  • Page 31: The Auto-Connect Printer List Window

    This example shows you how to connect to a USB device over your NBG4615 network. Makes sure that you have first installed the ZyXEL NetUSB Share Center Utility on the computer to which you want to connect the USB devices.
  • Page 32 Chapter 3 ZyXEL NetUSB Share Center Utility Connect a USB device to the NBG4615. In the ZyXEL NetUSB Share Center Utility, select the device and click Connect. NBG4615 User’s Guide...
  • Page 33: Automatically Connecting To A Usb Printer

    This example shows you how to set your computer to automatically connect to a shared USB printer over your NBG4615 network each time you log into your computer. Makes sure that you have first installed the ZyXEL NetUSB Share Center Utility.
  • Page 34 Chapter 3 ZyXEL NetUSB Share Center Utility Open the ZyXEL NetUSB Sharing Center Utility on the computer that you want to use to connect to the printer. Click the Connect button. You may be prompted to install a printer driver or to configure other settings.
  • Page 35: Connection Wizard

    H A P T E R Connection Wizard 4.1 Overview This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP for your Internet account information. Leave a field blank if you don’t have that information.
  • Page 36: Connect To Internet

    Chapter 4 Connection Wizard 4.3 Connect to Internet The NBG4615 offers five Internet connection types. They are Static IP, DHCP, PPPoE, PPTP or L2TP. The wizard attempts to detect which WAN connection type you are using. Figure 8 Detecting your Internet Connection Type If the wizard does not detect a connection type, you must select one from the drop-down list box.
  • Page 37: Connection Type: Dhcp

    Chapter 4 Connection Wizard Table 4 Internet Connection Type (continued) CONNECTION DESCRIPTION TYPE PPPoE Select the PPPoE (Point-to-Point Protocol over Ethernet) option for a dial-up connection. PPTP Select the PPTP (Point-to-Point Tunneling Protocol) option for a dial-up connection, and your ISP gave you an IP address and/or subnet mask.
  • Page 38: Connection Type: Static Ip

    Chapter 4 Connection Wizard 4.3.2 Connection Type: Static IP Choose Static IP as the Internet Connection Type if your ISP assigned an IP address for your Internet connection. Click Next. Internet Connection Type: Static IP Figure 11 The following table describes the labels in this screen. Table 5 Internet Connection Type: Static IP LABEL DESCRIPTION...
  • Page 39 Chapter 4 Connection Wizard personal computer interacts with a broadband modem (for example DSL, cable, wireless, etc.) to achieve access to high-speed data networks. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for instance, RADIUS). One of the benefits of PPPoE is the ability to let end users access one of multiple network services, a function known as dynamic service selection.
  • Page 40: Connection Type: Pptp

    Chapter 4 Connection Wizard Table 6 Internet Connection Type: PPPoE (continued) LABEL DESCRIPTION Back Click this to return to the previous screen. Next Click this to continue. 4.3.4 Connection Type: PPTP Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks.
  • Page 41: Connection Type: L2Tp

    Chapter 4 Connection Wizard Table 7 Internet Connection Type: PPTP (continued) LABEL DESCRIPTION PPTP Gateway IP Type the gateway IP address of the PPTP server. Address PPTP Server IP Type the server IP address of the PPTP server. Address User Name Type the user name given to you by your ISP.
  • Page 42 Chapter 4 Connection Wizard Table 8 Internet Connection Type: L2TP (continued) LABEL DESCRIPTION L2TP Gateway IP Type the gateway IP address of the L2TP server. Address L2TP Server IP Type the server IP address of the L2TP server. Address User Name Type the user name given to you by your ISP.
  • Page 43: Router Password

    Chapter 4 Connection Wizard 4.4 Router Password Change the login password in the following screen. Enter the new password and retype it to confirm. Click Next to proceed with the Wireless Security screen. Figure 16 Router Password 4.5 Wireless Security Configure Wireless Settings.
  • Page 44: Wireless Security: Wpa-Psk/Wpa2-Psk

    Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 9 Wireless Security: No Security LABEL DESCRIPTION Wireless Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the Network wireless LAN. Name If you change this field on the NBG4615, make sure all wireless stations (SSID) use the same SSID in order to access the network.
  • Page 45 Chapter 4 Connection Wizard The following table describes the labels in this screen. Table 10 Wireless Security: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Wireless Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the Network wireless LAN. Name If you change this field on the NBG4615, make sure all wireless stations (SSID) use the same SSID in order to access the network.
  • Page 46 Chapter 4 Connection Wizard You have successfully set up your NBG4615 to operate on your network and access the Internet. You are now ready to connect wirelessly to your NBG4615 and access the Internet. NBG4615 User’s Guide...
  • Page 47: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator 5.1 Overview This chapter describes how to access the NBG4615 Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG4615 via Internet browser.
  • Page 48: Login Screen

    Chapter 5 Introducing the Web Configurator 5.2.1 Login Screen Note: If this is the first time you are accessing the Web Configurator, you may be redirected to the Wizard. Refer to Chapter 4 on page 35 for the Connection Wizard screens. The Web Configurator initially displays the following login screen.
  • Page 49: Password Screen

    Chapter 5 Introducing the Web Configurator 5.2.2 Password Screen You should see a screen asking you to change your password (highly recommended) as shown next. Figure 21 Change Password Screen The following table describes the labels in this screen. Table 12 Change Password Screen LABEL DESCRIPTION New Password...
  • Page 50: Weather Edit

    Chapter 5 Introducing the Web Configurator The Home screen displays as follows. Figure 22 Home Screen The following table describes the labels in this screen. Table 13 Home Screen LABEL DESCRIPTION Click this to open the Easy Mode Web Configurator. Language Select a language to go to the Easy mode Web Configurator in that language and click Login.
  • Page 51: Resetting The Nbg4615

    Chapter 5 Introducing the Web Configurator The following table describes the labels in this screen. Table 14 Change Weather LABEL DESCRIPTION C or Choose which temperature unit you want the NBG4615 to display. Change Select the location for which you want to know the weather. If the city Location you want is not listed, choose one that is closest to it.
  • Page 52: How To Use The Reset Button

    Chapter 5 Introducing the Web Configurator 5.3.1 How to Use the RESET Button Make sure the power LED is on. Press the RESET button for longer than 1 second to restart/reboot the NBG4615. Press the RESET button for longer than 5 seconds to set the NBG4615 back to its factory-default configurations.
  • Page 53: Monitor

    H A P T E R Monitor 6.1 Overview This chapter discusses read-only information related to the device state of the NBG4615. To access the Monitor screens, go to Expert Mode after login, then click Click open all to show the complete menu. You can also click the links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/received as well as the status of clients connected to the NBG4615.
  • Page 54: The Log Screen

    Chapter 6 Monitor 6.3 The Log Screen The Web Configurator allows you to look at all of the NBG4615’s logs in one location. 6.3.1 View Log Use the View Log screen to see the logged messages for the NBG4615. The log wraps around and deletes the old entries after it fills.
  • Page 55: Bw Mgmt Monitor

    Chapter 6 Monitor You can configure which logs to display in the View Log screen. Go to the Log Settings screen and select the logs you wish to display. Click Apply to save your settings. Click Refresh to start the screen afresh. Figure 26 Log Settings 6.4 BW MGMT Monitor The Bandwidth Management (BW MGMT) Monitor allows you to view the amount...
  • Page 56: Dhcp Table

    Chapter 6 Monitor 6.5 DHCP Table DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG4615’s LAN as a DHCP server or disable it. When configured as a server, the NBG4615 provides the TCP/IP configuration for the clients.
  • Page 57: Packet Statistics

    Chapter 6 Monitor 6.6 Packet Statistics Click the Packet Statistics (Details...) hyperlink in the Status screen. Read- only information here includes port status, packet specific statistics and the "system up time". The Poll Interval(s) field is configurable and is used for refreshing the screen.
  • Page 58: Wlan Station Status

    Chapter 6 Monitor 6.7 WLAN Station Status Click the WLAN Station Status (Details...) hyperlink in the Status screen. View the wireless stations that are currently associated to the NBG4615 in the Association List. Association means that a wireless client (for example, your network or computer with a wireless network card) has connected successfully to the AP (or wireless router) using the same SSID, channel and security settings.
  • Page 59: Nbg4615 Modes

    H A P T E R NBG4615 Modes 7.1 Overview This chapter introduces the different modes available on your NBG4615. First, the term “mode” refers to two things in this User’s Guide. • Web Configurator mode. This refers to the Web Configurator interface you want to use for editing NBG4615 features.
  • Page 60 Chapter 7 NBG4615 Modes • Universal Repeater: In this mode, the NBG4615 can be an access point and a wireless client at the same time. Use this mode if there is an existing wireless router or access point in your network and you also want to allow clients to connect to the NBG4615.
  • Page 61: Easy Mode

    H A P T E R Easy Mode 8.1 Overview The Web Configurator is set to Easy Mode by default. You can configure several key features of the NBG4615 in this mode. This mode is useful to users who are not fully familiar with some features that are usually intended for network administrators.
  • Page 62: What You Can Do

    Chapter 8 Easy Mode Click Status to open the following screen. Figure 33 Easy Mode: Status Screen Navigation Panel Go to Network Screen Status Screen Control Panel 8.2 What You Can Do You can do the following in this mode: •...
  • Page 63: Navigation Panel

    Chapter 8 Easy Mode • Access Point Mode: Only Power Saving and Wireless Security are available. • Universal Repeater Mode: Only Power Saving and Wireless Security are available. • WISP Mode: The available features for this mode are Game Console, Content Filter, Bandwidth MGMT, and Firewall.
  • Page 64: Control Panel

    Chapter 8 Easy Mode When you log into the Network Configurator, the Network Map is shown as follows. Figure 35 Network Map The line connecting the NBG4615 to the gateway becomes green when the NBG4615 is able to ping the gateway. It becomes red when the ping initiating from the NBG4615 does not get a response from the gateway.
  • Page 65: Game Engine

    Chapter 8 Easy Mode The following table describes the labels in this screen. Table 20 Control Panel ITEM DESCRIPTION Game Engine Switch ON to maximize bandwidth for gaming traffic in your network. Otherwise, switch OFF. Refer to Section 8.6.1 on page 65 to see this screen.
  • Page 66: Power Saving

    Chapter 8 Easy Mode Note: When this is switched on, the Game Console tab in the Bandwidth Mgmt screen is automatically positioned on top. Turn this off if your network is not using gaming. Click OK to close this screen. 8.6.2 Power Saving Use this screen to set the day of the week and time of the day when your wireless LAN is turned on and off.
  • Page 67: Content Filter

    Chapter 8 Easy Mode Table 21 Power Saving (continued) LABEL DESCRIPTION For the Select a begin time using the first set of hour and minute (min) drop following times down boxes and select an end time using the second set of hour and (24-Hour minute (min) drop down boxes.
  • Page 68: Bandwidth Mgmt

    Chapter 8 Easy Mode Table 22 Content Filter (continued) LABEL DESCRIPTION Apply Click Apply to save your changes. Cancel Click Cancel to close this screen without saving any changes. 8.6.4 Bandwidth MGMT Use this screen to set bandwidth allocation to pre-defined services and applications for bandwidth allocation.
  • Page 69: Wireless Security

    Chapter 8 Easy Mode 8.6.6 Wireless Security Use this screen to configure security for your the Wireless LAN. You can enter the SSID and select the wireless security mode in the following screen. Note: You can enable the Wireless function of your NBG4615 by first turning on the switch in the back panel.
  • Page 70: Wps

    Chapter 8 Easy Mode 8.6.7 WPS Use this screen to add a wireless station to the network using WPS. Click WPS in the Wireless Security to open the following screen. Figure 43 Wireless Security: WPS The following table describes the labels in this screen. Table 24 Wireless Security: WPS LABEL DESCRIPTION...
  • Page 71: Status Screen In Easy Mode

    Chapter 8 Easy Mode 8.7 Status Screen in Easy Mode In the Network Map screen, click Status to view read-only information about the NBG4615. Figure 44 Status Screen in Easy Mode The following table describes the labels in this screen. Table 25 Status Screen in Easy Mode ITEM DESCRIPTION...
  • Page 72 Chapter 8 Easy Mode NBG4615 User’s Guide...
  • Page 73: Router Mode

    H A P T E R Router Mode 9.1 Overview The NBG4615 is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the NBG4615 connects the local network (LAN1 ~ LAN4) to the Internet. Figure 45 NBG4615 Network Modem Note: The Status screen is shown after changing to the Expert mode of the Web...
  • Page 74: Router Mode Status Screen

    Chapter 9 Router Mode 9.2 Router Mode Status Screen Click to open the status screen. Figure 46 Status Screen: Router Mode The following table describes the icons shown in the Status screen. Table 26 Status Screen Icon Key: Router Mode ICON DESCRIPTION Click this icon to view copyright and a link for related product information.
  • Page 75 Chapter 9 Router Mode Table 26 Status Screen Icon Key: Router Mode (continued) ICON DESCRIPTION Click this button to refresh the status screen statistics. Click this icon to see the Status page. The information in this screen depends on the device mode you select. Click this icon to see the Monitor navigation menu.
  • Page 76 Chapter 9 Router Mode Table 27 Status Screen: Router Mode (continued) LABEL DESCRIPTION - Operating Channel This shows the channel number which the NBG4615 is currently using over the wireless LAN. - Security Mode This shows the level of wireless security the NBG4615 is using. - 802.11 Mode This shows the wireless standard.
  • Page 77: Navigation Panel

    Chapter 9 Router Mode Table 27 Status Screen: Router Mode (continued) LABEL DESCRIPTION BW MGMT Monitor Click Details... to go to the Monitor > BW MGMT Monitor screen Use this screen to view the amount of (Section 6.4 on page 55).
  • Page 78 Chapter 9 Router Mode Table 28 Navigation Panel: Router Mode (continued) LINK FUNCTION BW MGMT Use this screen to view the amount of network bandwidth that applications running in the network are using. DHCP Table Use this screen to view current DHCP client information. Packet Use this screen to view port status and packet specific Statistics...
  • Page 79 Chapter 9 Router Mode Table 28 Navigation Panel: Router Mode (continued) LINK FUNCTION General Use this screen to enable NAT. Application Use this screen to configure servers behind the NBG4615. Advanced Use this screen to change your NBG4615’s port triggering settings.
  • Page 80 Chapter 9 Router Mode NBG4615 User’s Guide...
  • Page 81: Access Point Mode

    H A P T E R Access Point Mode 10.1 Overview Use your NBG4615 as an access point (AP) if you already have a router or gateway on your network. In this mode your NBG4615 bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example.
  • Page 82: What You Need To Know

    Chapter 10 Access Point Mode 10.3 What You Need to Know Chapter 13 on page 111 for a tutorial on setting up a network with the NBG4615 as an access point. 10.3.1 Setting your NBG4615 to AP Mode Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this.
  • Page 83: Accessing The Web Configurator In Access Point Mode

    Chapter 10 Access Point Mode 10.3.2 Accessing the Web Configurator in Access Point Mode Log in to the Web Configurator in Access Point mode, do the following: Connect your computer to the LAN port of the NBG4615. The default IP address of the NBG4615 is “192.168.1.2”. In this case, your computer must have an IP address in the range between “192.168.1.3”...
  • Page 84: Ap Mode Status Screen

    Chapter 10 Access Point Mode 10.4 AP Mode Status Screen Click to open the Status screen. Figure 51 Status Screen: Access Point Mode The following table describes the labels shown in the Status screen. Table 29 Status Screen: Access Point Mode LABEL DESCRIPTION Logout...
  • Page 85 Chapter 10 Access Point Mode Table 29 Status Screen: Access Point Mode (continued) LABEL DESCRIPTION WLAN Information - WLAN OP Mode This is the device mode (Section 7.1.2 on page 59) to which the NBG4615’s wireless LAN is set - Access Point Mode. - MAC Address This shows the wireless adapter MAC Address of your device.
  • Page 86: Lan Screen

    Chapter 10 Access Point Mode Table 29 Status Screen: Access Point Mode (continued) LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation.
  • Page 87 Chapter 10 Access Point Mode Note: If you change the IP address of the NBG4615 in the screen below, you will need to log into the NBG4615 again using the new IP address. Figure 53 Network > LAN > IP The table below describes the labels in the screen.
  • Page 88 Chapter 10 Access Point Mode Table 30 Network > LAN > IP (continued) LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG4615's WAN IP address). The field to the Second DNS Server right displays the (read-only) DNS server IP address that the ISP assigns.
  • Page 89: Universal Repeater Mode

    H A P T E R Universal Repeater Mode 11.1 Overview In universal repeater mode, your NBG4615 can act as an access point and wireless client at the same time. The NBG4615 can connect to an existing network through another access point and also lets wireless clients connect to the network through it.
  • Page 90: What You Need To Know

    Chapter 11 Universal Repeater Mode • Use other Wireless LAN screens to configure the wireless settings and wireless security between the wireless clients and the NBG4615. 11.3 What You Need to Know With the exception of the Wireless LAN > AP Client screen, other configuration screens in Universal Repeater mode are similar to the ones in Access Point Mode.
  • Page 91 Chapter 11 Universal Repeater Mode To set your NBG4615 to Universal Repeater Mode, on the left of the screen, click Maintenance > Sys OP Mode and select Universal Repeater Mode. Figure 55 Changing to Universal Repeater mode Note: You have to log in to the Web Configurator again when you change modes. As soon as you do, your NBG4615 is already in Universal Repeater mode.
  • Page 92: Universal Repeater Mode Status Screen

    Chapter 11 Universal Repeater Mode 11.5 Universal Repeater Mode Status Screen Click to open the status screen. Figure 57 Status: Universal Repeater Mode The following table describes the labels shown in the Status screen. Table 31 Status Screen: Universal Repeater Mode LABEL DESCRIPTION Logout...
  • Page 93 Chapter 11 Universal Repeater Mode Table 31 Status Screen: Universal Repeater Mode (continued) LABEL DESCRIPTION WLAN Information WLAN OP Mode This is the device mode (Section 7.1.2 on page 59) to which the NBG4615’s wireless LAN is set - Universal Repeater Mode. MAC Address This shows the wireless adapter MAC Address of your device.
  • Page 94: Universal Repeater Screen

    Chapter 11 Universal Repeater Mode Table 31 Status Screen: Universal Repeater Mode (continued) LABEL DESCRIPTION System Setting Configuration Mode This shows the web configurator mode you are viewing - Expert. Summary Click Details... to go to the Monitor > Packet Statistics Packet Statistics screen (Section 6.6 on page 57).
  • Page 95: No Security

    Chapter 11 Universal Repeater Mode Note: To have wireless clients access or acquire an IP address from another access point or wireless router (B) through the NBG4615 (A) in universal repeater mode, you must set the channel number in the Wireless LAN > General screen to be the same as the one on the wireless router or AP to which the NBG4615 wants to connect.
  • Page 96: Static Wep

    Chapter 11 Universal Repeater Mode 11.6.2 Static WEP Figure 60 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static The following table describes the labels in this screen. Table 33 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static LABEL DESCRIPTION Universal Repeater Parameters Enable...
  • Page 97: Wpa(2)-Psk

    Chapter 11 Universal Repeater Mode Table 33 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static WEP (continued) LABEL DESCRIPTION WEP Key 1 ~ The WEP keys are used to encrypt data. Both the NBG4615 and the WEP Key 4 access point must use the same WEP key for data transmission.
  • Page 98 Chapter 11 Universal Repeater Mode Table 34 Universal Repeater Mode: Wireless LAN > Universal Repeater: WPA(2)- PSK (continued) LABEL DESCRIPTION Encryption Select the type of wireless encryption employed by the access point to Type which you want to connect. Pre-Shared WPA-PSK or WPA2-PSK uses a simple common password for authentication.
  • Page 99: Wisp Mode

    H A P T E R WISP Mode 12.1 Overview Your NBG4615 can act as a wireless client. In wireless client mode, it can connect to an existing network via an access point. Use this mode if you already have an access point or router in your network.
  • Page 100: What You Need To Know

    Chapter 12 WISP Mode 12.3 What You Need to Know With the exception of the Wireless LAN screen, the Monitor, Configuration and Maintenance screens in WISP mode are similar to the ones in Router mode. Chapter 14 on page 129 through Chapter 28 on page 236 of this User’s Guide.
  • Page 101: Wisp Mode Status Screen

    Chapter 12 WISP Mode Connect your computer to the LAN port of the NBG4615. The default IP address of the NBG4615 is “192.168.1.1”. If you did not change this, you can use the same IP address in WISP Mode. Open a web browser such as Internet Explorer and type “192.168.1.1”...
  • Page 102 Chapter 12 WISP Mode The following table describes the labels shown in the Status screen. Table 35 Status Screen: WISP Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen.
  • Page 103 Chapter 12 WISP Mode Table 35 Status Screen: WISP Mode (continued) LABEL DESCRIPTION - CPU Usage This displays what percentage of the NBG4615’s processing ability is currently used. When this percentage is close to 100%, the NBG4615 is running at full load, and the throughput is not going to improve anymore. If you want some applications to have more throughput, you should turn off other applications (for example, using bandwidth management.
  • Page 104: Wireless Lan General Screen

    Chapter 12 WISP Mode The following screen and table show the features you can configure in Access Point mode. Figure 66 Menu: WISP Mode Refer to Table 28 on page 77 for descriptions of the labels shown in the Navigation panel. 12.5 Wireless LAN General Screen Use this screen to configure the wireless LAN settings of your NBG4615.
  • Page 105 Chapter 12 WISP Mode Table 36 WISP Mode: Wireless LAN > General (continued) LABEL DESCRIPTION Security Select the security mode of the access point to which you want to connect. Mode Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to reload the previous configuration for this screen.
  • Page 106: Static Wep

    Chapter 12 WISP Mode 12.5.1 Static WEP Use this screen if the access point to which you want to connect to uses WEP security mode. Figure 69 WEP (WISP) The following table describes the labels in this screen. Table 38 WEP (WISP) LABEL DESCRIPTION WISP Parameters...
  • Page 107: Wpa(2)-Psk

    Chapter 12 WISP Mode Table 38 WEP (WISP) (continued) LABEL DESCRIPTION Select this option in order to enter hexadecimal characters as a WEP key. The preceding "0x", that identifies a hexadecimal key, is entered automatically. Key 1 to Key The WEP keys are used to encrypt data. Both the NBG4615 and the wireless stations must use the same WEP key for data transmission.
  • Page 108: Site Survey Screen

    Chapter 12 WISP Mode Table 39 WPA-PSK/WPA2-PSK (WISP) (continued) LABEL DESCRIPTION Pre-Shared Key WPA-PSK/WPA2-PSK uses a simple common password for authentication. Type the pre-shared key employed by the access point to which you want to connect. Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to reload the previous configuration for this screen.
  • Page 109 Chapter 12 WISP Mode Table 40 Configuration > Wireless LAN > Site Survey (WISP) (continued) LABEL DESCRIPTION Network This displays the network type (In (Infrastructure) or Ad (Ad Hoc) of this Type wireless device. Rescan Click this button to search for available wireless devices within transmission range and update this table.
  • Page 110 Chapter 12 WISP Mode NBG4615 User’s Guide...
  • Page 111: Tutorials

    H A P T E R Tutorials 13.1 Overview This chapter provides tutorials for setting up your NBG4615. • Set Up a Wireless Network with WPS • Configure Wireless Security without WPS • Using Multiple SSIDs on the NBG4615 • Connecting the NBG4615 (in Universal Repeater Mode) to an AP or Wireless Router 13.2 Set Up a Wireless Network with WPS...
  • Page 112: Push Button Configuration (Pbc)

    Chapter 13 Tutorials 13.2.1 Push Button Configuration (PBC) Make sure that your NBG4615 is turned on. Make sure the WLAN switch (at the back panel of the NBG4615) is set to ON, and that the device is placed within range of your computer. Make sure that you have installed the wireless client (this example uses the NWD210N) driver and utility in your notebook.
  • Page 113: Pin Configuration

    Chapter 13 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both NBG4615 and wireless client (the NWD210N in this example). Figure 72 Example WPS Process: PBC Method Access Point Wireless Client WITHIN 2 MINUTES SECURITY INFO...
  • Page 114: Configure Wireless Security Without Wps

    Chapter 13 Tutorials The following figure shows you the example to set up wireless network and security on NBG4615 and wireless client (ex. NWD210N in this example) by using PIN method. Figure 73 Example WPS Process: PIN Method Wireless Client Access Point WITHIN 2 MINUTES 13.3 Configure Wireless Security without WPS...
  • Page 115 Chapter 13 Tutorials Make sure the WLAN switch (at the back panel of the NBG4615) is set to ON. Open the Configuration > Wireless LAN > General screen in the AP’s Web Configurator. Confirm that the status of wireless LAN is ON. Enter SSID_Example3 as the SSID and select Channel-06 as the channel.
  • Page 116: Configure Your Notebook

    Status. 13.3.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. The NBG4615 supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
  • Page 117 Chapter 13 Tutorials Select SSID_Example3 and click Connect. Select WPA-PSK and type the security key in the following screen. Click Next. The Confirm Save window appears. Check your settings and click Save to continue. NBG4615 User’s Guide...
  • Page 118: Using Multiple Ssids On The Nbg4615

    If your connection is successful, open your Internet browser and enter http:// www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured.
  • Page 119: Configuring Security Settings Of Multiple Ssids

    Chapter 13 Tutorials For example, you may set up three wireless networks (A, B and C) in your office. A is for workers, B is for guests and C is specific to a VoIP device in the meeting room. SSID_Worker SSID_VoIP SSID_Guest 13.4.1 Configuring Security Settings of Multiple SSIDs...
  • Page 120 Chapter 13 Tutorials Click Start > Run on your computer in Windows. Type “cmd” in the dialog box. Enter “ipconfig” to show your computer’s IP address. If your computer’s IP address is not in the correct range then see Appendix C on page 163 information on changing your computer’s IP address.
  • Page 121 Chapter 13 Tutorials Click the Security tab to configure security settings for each SSID. Select SSID_Worker from the SSID drop-down list. Configure the screen as follows. Click Apply. 10 Select SSID_Guest from the SSID drop-down list. Configure the screen as follows.
  • Page 122: Connecting The Nbg4615 (In Universal Repeater Mode) To An Ap Or Wireless Router

    Chapter 13 Tutorials 11 Select SSID_VoIP from the SSID drop-down list. Configure the screen as follows. Click Apply. 12 Click the MAC Filter tab to configure MAC filtering for the SSID_VoIP wireless network. Select SSID_VoIP from the SSID drop-down list and select Allow in the Policy field.
  • Page 123 Chapter 13 Tutorials Universal Repeater mode and then associate the NBG4615 with the AP or wireless router. The NBG4615 must be within the transmission range of the AP or wireless router. Connect your computer to the LAN port of the NBG4615 using an Ethernet cable. The default IP address of the NBG4615 is “192.168.1.2”.
  • Page 124 Chapter 13 Tutorials 10 Go to Configuration > Network > Wireless LAN > Universal Repeater to connect the NBG4615 wirelessly to an AP. Select Enable. Enter the SSID of the existing AP or wireless router to which you want to connect (“SSIDofMyAP” in this example).
  • Page 125 Chapter 13 Tutorials 12 Go to the Status screen. If the NBG4615 has successfully connected to an AP or wireless router, it displays the SSID and MAC address of the AP or wireless router in the field next to WLAN Station Status under Device Information. To check whether a wireless client is currently connecting to the NBG4615, click the WLAN Station Status (Details...) hyperlink under Summary in the Status screen or Monitor >...
  • Page 126 Chapter 13 Tutorials NBG4615 User’s Guide...
  • Page 127: Technical Reference

    Technical Reference...
  • Page 129: Wireless Lan

    H A P T E R Wireless LAN 14.1 Overview This chapter discusses how to configure the wireless network settings in your NBG4615. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 74 Example of a Wireless Network The wireless network is the part in the blue circle.
  • Page 130: What You Can Do

    Chapter 14 Wireless LAN 14.1.1 What You Can Do • Use the General screen to enter the SSID, enable intra-BSS traffic and select the channel. (Section 14.2 on page 133). • Use the Security screen to configure wireless security between the NBG4615 and the wireless clients.
  • Page 131 Chapter 14 Wireless LAN SSID Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess.
  • Page 132 Chapter 14 Wireless LAN Unauthorized devices can still see the information that is sent in the wireless network, even if they cannot use the wireless network. Furthermore, there are ways for unauthorized wireless users to get a valid user name and password. Then, they can use that user name and password to use the wireless network.
  • Page 133: General Wireless Lan Screen

    Chapter 14 Wireless LAN WPA2 (depending on the type of wireless network login) and select the WPA Compatible option in the NBG4615. Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key.
  • Page 134 Chapter 14 Wireless LAN Click Network > Wireless LAN to open the General screen. Figure 75 Network > Wireless LAN > General The following table describes the general wireless LAN labels in this screen. Table 42 Network > Wireless LAN > General LABEL DESCRIPTION Wireless LAN...
  • Page 135: Wireless Security Screen

    Chapter 14 Wireless LAN Table 42 Network > Wireless LAN > General (continued) LABEL DESCRIPTION Channel Set the operating frequency/channel depending on your particular region. Selection Select a channel from the drop-down list box. The options vary depending on the frequency band and the country you are in. Refer to the Connection Wizard chapter for more information on channels.
  • Page 136: Wep Encryption

    Chapter 14 Wireless LAN Note: If you do not enable any wireless security on your NBG4615, your network is accessible to any wireless networking device that is within range. Figure 76 Network > Wireless LAN > Security: No Security The following table describes the labels in this screen. Table 43 Network >...
  • Page 137 Chapter 14 Wireless LAN Select Static WEP from the Security Mode list. Figure 77 Network > Wireless LAN > Security: Static WEP The following table describes the wireless LAN security labels in this screen. Table 44 Network > Wireless LAN > Security: Static WEP LABEL DESCRIPTION SSID...
  • Page 138: Wpa-Psk/Wpa2-Psk

    Chapter 14 Wireless LAN Table 44 Network > Wireless LAN > Security: Static WEP (continued) LABEL DESCRIPTION Select this option in order to enter hexadecimal characters as a WEP key. The preceding "0x", that identifies a hexadecimal key, is entered automatically.
  • Page 139: Mac Filter

    Chapter 14 Wireless LAN Table 45 Network > Wireless LAN > Security: WPA-PSK/WPA2-PSK (continued) LABEL DESCRIPTION Pre-Shared Key WPA-PSK/WPA2-PSK uses a simple common password for authentication. Type a pre-shared key from 8 to 63 case-sensitive keyboard characters. Group Key The Group Key Update Timer is the rate at which the AP sends a new Update Timer group key out to all clients.
  • Page 140: Wireless Lan Advanced Screen

    Chapter 14 Wireless LAN Table 46 Network > Wireless LAN > MAC Filter (continued) LABEL DESCRIPTION Policy Define the filter action for the list of MAC addresses in the MAC Address table. Select Disable to deactivate the MAC filtering rule you configure below. Select Allow to permit access to the NBG4615, MAC addresses not listed will be denied access to the NBG4615.
  • Page 141: Quality Of Service (Qos) Screen

    Chapter 14 Wireless LAN The following table describes the labels in this screen. Table 47 Network > Wireless LAN > Advanced LABEL DESCRIPTION RTS/CTS Data with its frame size larger than this value will perform the RTS Threshold (Request To Send)/CTS (Clear To Send) handshake. Enter a value between 256 and 2432.
  • Page 142: Wps Screen

    Chapter 14 Wireless LAN Click Network > Wireless LAN > QoS. The following screen appears. Figure 81 Network > Wireless LAN > QoS The following table describes the labels in this screen. Table 48 Network > Wireless LAN > QoS LABEL DESCRIPTION Enable WMM QoS...
  • Page 143: Wps Station Screen

    Chapter 14 Wireless LAN The following table describes the labels in this screen. Table 49 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select this to enable the WPS feature. PIN Number This displays a PIN number last time system generated. Click Generate to generate a new PIN number.
  • Page 144: Scheduling Screen

    Chapter 14 Wireless LAN Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes. To add the second wireless station, you have to press these buttons on both device and the wireless station again after the first 2 minutes.
  • Page 145 Chapter 14 Wireless LAN on or off on certain days and at certain times. To open this screen, click Network > Wireless LAN > Scheduling tab. Figure 84 Network > Wireless LAN > Scheduling The following table describes the labels in this screen. Table 51 Network >...
  • Page 146: Wds Screen

    Chapter 14 Wireless LAN 14.10 WDS Screen A Wireless Distribution System (WDS) is a wireless connection between two or more APs. Use this screen to set the operating mode of your NBG4615 to AP + Bridge or Bridge and establish wireless links with other APs. You need to know the MAC address of the peer device, which also must be in bridge mode.
  • Page 147 Chapter 14 Wireless LAN Table 52 Network > Wireless LAN > WDS (continued) LABEL DESCRIPTION Phy Mode Select the Phy mode you want the NBG4615 to use. This dictates the maximum size of packets during data transmission. This field is not available when you select Disable in the Basic Setting field.
  • Page 148 Chapter 14 Wireless LAN NBG4615 User’s Guide...
  • Page 149: Ipv6

    H A P T E R IPv6 15.1 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. •...
  • Page 150: The Ipv6 Screen

    Chapter 15 IPv6 15.2 The IPv6 Screen Click Network > IPv6 to open the IPv6 screen. Use this screen to configure the IPv6 settings for your NBG4615. Figure 86 Network > IPv6 The following table describes the fields in this screen. Table 53 Network >...
  • Page 151 Chapter 15 IPv6 Table 53 Network > IPv6 (continued) LABEL DESCRIPTION First DNS Server Enter the primary DNS server's IP address in this field. Second DNS Enter the secondary DNS server's IP address in this field. Server LAN IPv6 Address Setup LAN IPv6 address Enter a valid IPv6 address for the LAN using colon (:) hexadecimal notation.
  • Page 152 Chapter 15 IPv6 NBG4615 User’s Guide...
  • Page 153: Wan

    H A P T E R 16.1 Overview This chapter discusses the NBG4615’s WAN screens. Use these screens to configure your NBG4615 for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.
  • Page 154: What You Need To Know

    DNS Server Address Assignment Use Domain Name System (DNS) to map a domain name to its corresponding IP address and vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
  • Page 155: Multicast

    Chapter 16 WAN WAN MAC Address The MAC address screen allows users to configure the WAN port's MAC address by either using the factory default or cloning the MAC address from a computer on your LAN. Choose Factory Default to select the factory assigned default MAC Address.
  • Page 156: Internet Connection

    Chapter 16 WAN in the Web Configurator (LAN; WAN). Select None to disable IP multicasting on these interfaces. 16.4 Internet Connection Use this screen to change your NBG4615’s Internet access settings. Click WAN from the Configuration menu. The screen differs according to the encapsulation you choose.
  • Page 157 Chapter 16 WAN The following table describes the labels in this screen. Table 54 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation You must choose the Ethernet option when the WAN port is used as a regular Ethernet.
  • Page 158: Pppoe Encapsulation

    Chapter 16 WAN Table 54 Network > WAN > Internet Connection: Ethernet Encapsulation (continued) LABEL DESCRIPTION Factory default Select Factory default to use the factory assigned default MAC Address. Clone the Select Clone the computer's MAC address - IP Address and enter computer’s MAC the IP address of the computer on the LAN whose MAC you are cloning.
  • Page 159 Chapter 16 WAN This screen displays when you select PPPoE encapsulation. Figure 90 Network > WAN > Internet Connection: PPPoE Encapsulation The following table describes the labels in this screen. Table 55 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access...
  • Page 160: Pptp Encapsulation

    Chapter 16 WAN Table 55 Network > WAN > Internet Connection: PPPoE Encapsulation (continued) LABEL DESCRIPTION Select this option If your ISP did not assign you a fixed IP address. This automatically is the default selection. from ISP Use Fixed IP Select this option If the ISP assigned a fixed IP address.
  • Page 161 Chapter 16 WAN This screen displays when you select PPTP encapsulation. Figure 91 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen. Table 56 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access...
  • Page 162 Chapter 16 WAN Table 56 Network > WAN > Internet Connection: PPTP Encapsulation (continued) LABEL DESCRIPTION Nailed-up Select Nailed-Up Connection if you do not want the connection to Connection time out. Idle Timeout This value specifies the time in minutes that elapses before the NBG4615 automatically disconnects from the PPTP server.
  • Page 163: L2Tp Encapsulation

    Chapter 16 WAN Table 56 Network > WAN > Internet Connection: PPTP Encapsulation (continued) LABEL DESCRIPTION Clone the Select Clone the computer's MAC address - IP Address and computer’s MAC enter the IP address of the computer on the LAN whose MAC you address - IP are cloning.
  • Page 164 Chapter 16 WAN This screen displays when you select L2TP encapsulation. Figure 92 Network > WAN > Internet Connection: L2TP Encapsulation The following table describes the labels in this screen. Table 57 Network > WAN > Internet Connection: L2TP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access...
  • Page 165 Chapter 16 WAN Table 57 Network > WAN > Internet Connection: L2TP Encapsulation (continued) LABEL DESCRIPTION Get automatically Select this option If your ISP did not assign you a fixed IP address. from ISP This is the default selection. Use Fixed IP Select this option If the ISP assigned a fixed IP address.
  • Page 166: Advanced Wan Screen

    Chapter 16 WAN 16.5 Advanced WAN Screen Use this screen to enable Multicast and enable Auto-bridge. Note: The categories shown in this screen are independent of each other. To change your NBG4615’s advanced WAN settings, click Network > WAN > Advanced.
  • Page 167: Igmp Snooping Screen

    Chapter 16 WAN Table 58 Network > WAN > Advanced (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to begin configuring this screen afresh. 16.6 IGMP Snooping Screen Use this screen to enable IGMP snooping if you have LAN users that subscribe to multicast services.
  • Page 168 Chapter 16 WAN NBG4615 User’s Guide...
  • Page 169: Lan

    H A P T E R 17.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 170: What You Need To Know

    Chapter 17 LAN 17.3 What You Need To Know The actual physical connection determines whether the NBG4615 ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 96 LAN and WAN IP Addresses The LAN parameters of the NBG4615 are preset in the factory with the following values:...
  • Page 171: Ip Alias

    Chapter 17 LAN 17.3.3 IP Alias 17.4 LAN IP Screen Use this screen to change the IP address for your NBG4615. Click Network > LAN > IP. Figure 97 Network > LAN > IP The following table describes the labels in this screen. Table 60 Network >...
  • Page 172: Ip Alias Screen

    Chapter 17 LAN 17.5 IP Alias Screen Use this screen to have the NBG4615 apply IP alias to create LAN subnets. Click IP Alias. Figure 98 Network > LAN > IP Alias The following table describes the labels in this screen. Table 61 Network >...
  • Page 173: Dhcp Server

    H A P T E R DHCP Server 18.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG4615’s LAN as a DHCP server or disable it. When configured as a server, the NBG4615 provides the TCP/IP configuration for the clients.
  • Page 174: General

    Chapter 18 DHCP Server 18.2 General Use this screen to enable the DHCP server. Click Network > DHCP Server. The following screen displays. Figure 99 Network > DHCP Server > General The following table describes the labels in this screen. Table 62 Network >...
  • Page 175: Advanced

    Chapter 18 DHCP Server 18.3 Advanced This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses. You can also use this screen to configure the DNS server information that the NBG4615 sends to the DHCP clients.
  • Page 176 Chapter 18 DHCP Server Table 63 Network > DHCP Server > Advanced (continued) LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG4615's WAN IP address). The field to the Second DNS right displays the (read-only) DNS server IP address that the ISP Server assigns.
  • Page 177: Nat

    H A P T E R 19.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network.
  • Page 178: What You Can Do

    Chapter 19 NAT Note: You must create a firewall rule in addition to setting up NAT, to allow traffic from the WAN to be forwarded through the NBG4615. 19.1.1 What You Can Do • Use the General screen to enable NAT and set a default server (Section 19.2 on page 180).
  • Page 179 Chapter 19 NAT Table 64 NAT Definitions (continued) ITEM DESCRIPTION Local This refers to the packet address (source or destination) as the packet travels on the LAN. Global This refers to the packet address (source or destination) as the packet travels on the WAN.
  • Page 180: General

    Chapter 19 NAT incoming reply packets can have their original values restored. The following figure illustrates this. Figure 102 How NAT Works 19.2 General Use this screen to enable NAT and set a default server. Click Network > NAT to open the General screen.
  • Page 181: Application

    Chapter 19 NAT Table 65 Network > NAT > General (continued) LABEL DESCRIPTION Default Server Setup Server IP In addition to the servers for specified services, NAT supports a default Address server. A default server receives packets from ports that are not specified in the Application screen.
  • Page 182 Chapter 19 NAT The following table describes the labels in this screen. Table 66 Network > NAT > Application LABEL DESCRIPTION Add Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address. Clear the checkbox to disallow forwarding of these ports to an inside server without having to delete the entry.
  • Page 183: Advanced

    Chapter 19 NAT 19.4 Advanced To change your NBG4615’s trigger port settings, click Network > NAT > Advanced. The screen appears as shown. Note: Only one LAN computer can use a trigger port (range) at a time. Figure 105 Network > NAT > Advanced The following table describes the labels in this screen.
  • Page 184: Technical Reference

    Chapter 19 NAT Table 67 Network > NAT > Advanced (continued) LABEL DESCRIPTION End Port Type a port number or the ending port number in a range of port numbers. Apply Click Apply to save your changes back to the NBG4615. Cancel Click Cancel to begin configuring this screen afresh.
  • Page 185: Trigger Port Forwarding

    Chapter 19 NAT addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 106 Multiple Servers Behind NAT Example 19.5.3 Trigger Port Forwarding Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side.
  • Page 186: Trigger Port Forwarding Example

    Chapter 19 NAT 19.5.4 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 107 Trigger Port Forwarding Process: Example Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the NBG4615 to record Jane’s computer IP address.
  • Page 187: Ddns

    H A P T E R DDNS 20.1 Overview DDNS services let you use a domain name with a dynamic IP address. 20.1.1 What You Need To Know The following terms and concepts may help as you read through this chapter. What is DDNS? DDNS, or Dynamic DNS, allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in...
  • Page 188: General

    Chapter 20 DDNS 20.2 General To change your NBG4615’s DDNS, click Network > DDNS. The screen appears as shown. Figure 108 Dynamic DNS The following table describes the labels in this screen. Table 68 Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup Enable Dynamic Select this check box to use dynamic DNS.
  • Page 189: Static Route

    H A P T E R Static Route 21.1 Overview This chapter shows you how to configure static routes for your NBG4615. Each remote node specifies only the network to which the gateway is directly connected, and the NBG4615 has no knowledge of the networks beyond. For instance, the NBG4615 knows about network N2 in the following figure through remote node Router 1.
  • Page 190: Ip Static Route Screen

    Chapter 21 Static Route 21.2 IP Static Route Screen Click Network > Static Route to open the IP Static Route screen. Figure 110 Network > Static Route The following table describes the labels in this screen. Table 69 Network > Static Route LABEL DESCRIPTION Static Routing Settings...
  • Page 191 Chapter 21 Static Route Table 69 Network > Static Route (continued) LABEL DESCRIPTION Delete Click the Delete icon to remove a static route from the NBG4615. A window displays asking you to confirm that you want to delete the route. Cancel Click Cancel to begin configuring this screen afresh.
  • Page 192 Chapter 21 Static Route NBG4615 User’s Guide...
  • Page 193: Rip

    H A P T E R 22.1 Overview Routing Information Protocol (RIP) is an interior or intra-domain routing protocol that uses distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers.
  • Page 194 Chapter 22 RIP NBG4615 User’s Guide...
  • Page 195: Firewall

    H A P T E R Firewall 23.1 Overview Use these screens to enable and configure the firewall that protects your NBG4615 and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN.
  • Page 196: What You Need To Know

    Chapter 23 Firewall • Use the Services screen enable service blocking, enter/delete/modify the services you want to block and the date/time you want to block them (Section 23.3 on page 198). 23.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. What is a Firewall? Originally, the term “firewall”...
  • Page 197 Chapter 23 Firewall The NBG4615 is installed between the LAN and a broadband modem connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. The NBG4615 has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband (cable or DSL) modem to the Internet.
  • Page 198: General

    Chapter 23 Firewall 23.2 General Use this screen to enable or disable the NBG4615’s firewall, and set up firewall logs. Click Security > Firewall to open the General screen. Figure 113 Security > Firewall > General l The following table describes the labels in this screen. Table 71 Security >...
  • Page 199 Chapter 23 Firewall Click Security > Firewall > Services. The screen appears as shown next. Figure 114 Security > Firewall > Services l The following table describes the labels in this screen. Table 72 Security > Firewall > Services LABEL DESCRIPTION LABEL DESCRIPTION...
  • Page 200 Chapter 23 Firewall Table 72 Security > Firewall > Services (continued) LABEL DESCRIPTION Dest IP Address Enter the IP address of the computer to which traffic for the application or service is entering. The NBG4615 applies the firewall rule to traffic initiating from this computer.
  • Page 201: Content Filtering

    URL. For example, with the URL www.zyxel.com.tw/news/ pressroom.php, the domain name is www.zyxel.com.tw. The file path is the characters that come after the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the file path is news/pressroom.php. NBG4615 User’s Guide...
  • Page 202: Content Filter

    For example, with the URL www.zyxel.com.tw/news/pressroom.php, the NBG4615 would find “tw” in the domain name (www.zyxel.com.tw). It would also find “news” in the file path (news/pressroom.php) but it would not find “tw/news”.
  • Page 203: Technical Reference

    By default, the NBG4615 checks the URL’s domain name or IP address when performing keyword blocking. This means that the NBG4615 checks the characters that come before the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, content filtering only searches for keywords within www.zyxel.com.tw. NBG4615 User’s Guide...
  • Page 204 Full path URL checking has the NBG4615 check the characters that come before the last slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, full path URL checking searches for keywords within www.zyxel.com.tw/news/. Use the ip urlfilter customize actionFlags 6 [disable | enable] command to extend (or not extend) the keyword blocking search to include the URL's full path.
  • Page 205: Bandwidth Management

    This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B).
  • Page 206: What You Need To Know

    Chapter 25 Bandwidth Management • Use the Monitor screen to view the amount of network bandwidth that applications running in the network are using (Section 25.6 on page 211). 25.3 What You Need To Know The sum of the bandwidth allotments that apply to the WAN interface (LAN to WAN, WLAN to WAN) must be less than or equal to the Upstream Bandwidth that you configure in the Bandwidth Management Advanced screen (Section...
  • Page 207: Advanced Screen

    Chapter 25 Bandwidth Management Table 74 Management > Bandwidth Management > General (continued) LABEL DESCRIPTION Apply Click Apply to save your customized settings. Cancel Click Cancel to begin configuring this screen afresh. 25.5 Advanced Screen Use this screen to configure bandwidth management rules for the pre-defined services or applications.
  • Page 208 Chapter 25 Bandwidth Management Click Management > Bandwidth Management > Advanced to open the bandwidth management Advanced screen. Figure 118 Management > Bandwidth Management > Advanced The following table describes the labels in this screen. Table 75 Management > Bandwidth Management > Advanced LABEL DESCRIPTION Management Bandwidth...
  • Page 209: Rule Configuration: Application Rule Configuration

    Chapter 25 Bandwidth Management Table 75 Management > Bandwidth Management > Advanced (continued) LABEL DESCRIPTION Priority Select a priority from the drop down list box. Choose High, Mid or Low. • High - Select this for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay).
  • Page 210: Rule Configuration: User Defined Service Rule Configuration

    Chapter 25 Bandwidth Management The following table describes the labels in this screen. Table 76 Bandwidth Management Rule Configuration: Application List LABEL DESCRIPTION This is the port number of the destination that define the traffic type, for example TCP port 80 defines web traffic. Appendix F on page 321 for some common services and port numbers.
  • Page 211: Monitor Screen

    Chapter 25 Bandwidth Management Table 77 Bandwidth Management Rule Configuration: User-defined Service LABEL DESCRIPTION Destination Address Enter the ending IP address of the destination computer. The NBG4615 applies bandwidth management to the service or application that is entering this computer. Destination Port This is the port number of the destination that define the traffic type, for example TCP port 80 defines web traffic.
  • Page 212: Predefined Bandwidth Management Services

    Chapter 25 Bandwidth Management The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 121 Management > Bandwidth Management > Monitor 25.6.1 Predefined Bandwidth Management Services The following is a description of some services that you can select and to which you can apply media bandwidth management in the Management >...
  • Page 213 Chapter 25 Bandwidth Management Table 78 Media Bandwidth Management Setup: Services (continued) SERVICE DESCRIPTION BitTorrent BitTorrent is a free P2P (peer-to-peer) sharing tool allowing you to distribute large software and media files. BitTorrent requires you to search for a file with a searching engine yourself. It distributes files by corporation and trading, that is, the client downloads the file in small pieces and share the pieces with other peers to get other half of the file.
  • Page 214 Chapter 25 Bandwidth Management NBG4615 User’s Guide...
  • Page 215: Remote Management

    H A P T E R Remote Management 26.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your NBG4615 from a remote location through the following interfaces: • LAN and WAN • LAN only •...
  • Page 216: System Timeout

    Chapter 26 Remote Management 26.2.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NBG4615 automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling.
  • Page 217: Universal Plug-And-Play (Upnp)

    H A P T E R Universal Plug-and-Play (UPnP) 27.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 218: Cautions With Upnp

    Chapter 27 Universal Plug-and-Play (UPnP) 27.2.2 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments.
  • Page 219: Technical Reference

    Chapter 27 Universal Plug-and-Play (UPnP) 27.4 Technical Reference The sections show examples of using UPnP. 27.4.1 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the NBG4615. Make sure the computer is connected to a LAN port of the NBG4615.
  • Page 220 Chapter 27 Universal Plug-and-Play (UPnP) In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 125 Internet Connection Properties You may edit or delete the port mappings or click Add to manually add port mappings.
  • Page 221: Web Configurator Easy Access

    Chapter 27 Universal Plug-and-Play (UPnP) Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 128 System Tray Icon Double-click on the icon to display your current Internet connection status.
  • Page 222 Chapter 27 Universal Plug-and-Play (UPnP) Select My Network Places under Other Places. Figure 130 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. Right-click on the icon for your NBG4615 and select Invoke. The web configurator login screen displays.
  • Page 223 Chapter 27 Universal Plug-and-Play (UPnP) Right-click on the icon for your NBG4615 and select Properties. A properties window displays with basic information about the NBG4615. Figure 132 Network Connections: My Network Places: Properties: Example NBG4615 User’s Guide...
  • Page 224 Chapter 27 Universal Plug-and-Play (UPnP) NBG4615 User’s Guide...
  • Page 225: Maintenance

    H A P T E R Maintenance 28.1 Overview This chapter provides information on the Maintenance screens. 28.2 What You Can Do • Use the General screen to set the timeout period of the management session (Section 28.3 on page 226).
  • Page 226: General Screen

    Chapter 28 Maintenance 28.3 General Screen Use this screen to set the management session timeout period. Click Maintenance > General. The following screen displays. Figure 133 Maintenance > General The following table describes the labels in this screen. Table 81 Maintenance > General LABEL DESCRIPTION System Setup...
  • Page 227 Chapter 28 Maintenance Click Maintenance > Password. The screen appears as shown. Figure 134 Maintenance > Password The following table describes the labels in this screen. Table 82 Maintenance > Password LABEL DESCRIPTION Password Setup Change your NBG4615’s password (recommended) using the fields as shown.
  • Page 228: Time Setting Screen

    Chapter 28 Maintenance 28.5 Time Setting Screen Use this screen to configure the NBG4615’s time based on your local time zone. To change your NBG4615’s time and date, click Maintenance > Time. The screen appears as shown. Figure 135 Maintenance > Time The following table describes the labels in this screen.
  • Page 229 Chapter 28 Maintenance Table 83 Maintenance > Time (continued) LABEL DESCRIPTION New Time This field displays the last updated time from the time server or the last time configured manually. (hh:mm:ss) When you select Manual, enter the new time in this field and then click Apply.
  • Page 230: Firmware Upgrade Screen

    Click Cancel to begin configuring this screen afresh. 28.6 Firmware Upgrade Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a “*.bin” extension, e.g., “NBG4615.bin”. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 231: Configuration Backup/Restore Screen

    Chapter 28 Maintenance The following table describes the labels in this screen. Table 84 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse...
  • Page 232 Chapter 28 Maintenance Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG4615. Click Maintenance > Backup/Restore. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 138 Maintenance >...
  • Page 233: Reset/Restart Screen

    Chapter 28 Maintenance Table 85 Maintenance > Backup/Restore (continued) LABEL DESCRIPTION Upload Click Upload to begin the upload process. Note: Do not turn off the NBG4615 while configuration file upload is in progress. After you see a “configuration upload successful” screen, you must then wait one minute before logging into the NBG4615 again.
  • Page 234: System Operation Mode Overview

    Chapter 28 Maintenance 28.9 System Operation Mode Overview The Sys OP Mode (System Operation Mode) function lets you configure your NBG4615 as an access point, wireless client or both at the same time. You can choose between Router, Access Point Mode, Universal Repeater Mode, and WISP Mode depending on your network topology and the features you require from your device.
  • Page 235 Chapter 28 Maintenance Universal Repeater NBG4615 in Universal Repeater mode work as an access point and wireless client simultaneously. Figure 142 Universal Repeater Mode WISP A WISP client connects to an existing access point wirelessly. It acts just like a wireless client in notebooks/computers.
  • Page 236: Sys Op Mode Screen

    Chapter 28 Maintenance 28.10 Sys OP Mode Screen Use this screen to select how you want to use your NBG4615. Figure 144 Maintenance > Sys OP Mode The following table describes the labels in the General screen. Table 86 Maintenance > Sys OP Mode LABEL DESCRIPTION System Operation Mode...
  • Page 237 Chapter 28 Maintenance Table 86 Maintenance > Sys OP Mode (continued) LABEL DESCRIPTION Universal Repeater Select Universal Repeater Mode if you want to have wireless Mode clients associate with the NBG4615 and also want to connect the NBG4615 to an existing access point. •...
  • Page 238 Chapter 28 Maintenance NBG4615 User’s Guide...
  • Page 239: Troubleshooting

    • Wireless Router/AP Troubleshooting • ZyXEL Share Center Utility Problems 29.2 Power, Hardware Connections, and LEDs The NBG4615 does not turn on. None of the LEDs turn on. Make sure you are using the power adaptor or cord included with the NBG4615.
  • Page 240: Nbg4615 Access And Login

    Chapter 29 Troubleshooting Make sure you understand the normal behavior of the LED. See Section 1.5 on page Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adaptor to the NBG4615.
  • Page 241 Chapter 29 Troubleshooting I forgot the password. The default password is 1234. If this does not work, you have to reset the device to its factory defaults. See Section 29.5 on page 244. I cannot see or access the Login screen in the Web Configurator. Make sure you are using the correct IP address.
  • Page 242: Internet Access

    Chapter 29 Troubleshooting • If your computer is connected to the WAN port or is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port. I can see the Login screen, but I cannot log in to the NBG4615. Make sure you have entered the password correctly.
  • Page 243 Chapter 29 Troubleshooting • Select Router if your device routes traffic between a local network and another network such as the Internet. • Select Access Point if your device bridges traffic between clients on the same network. If the problem continues, contact your ISP. I cannot access the Internet anymore.
  • Page 244: Resetting The Nbg4615 To Its Factory Defaults

    Chapter 29 Troubleshooting 29.5 Resetting the NBG4615 to Its Factory Defaults If you reset the NBG4615, you lose all of the changes you have made. The NBG4615 re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the RESET button.
  • Page 245 Chapter 29 Troubleshooting Check that both the NBG4615 and your wireless station are using the same wireless and wireless security settings. Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the NBG4615. Make sure you allow the NBG4615 to be remotely accessed through the WLAN interface.
  • Page 246: Zyxel Share Center Utility Problems

    Try pointing the antennas in different directions and check which provides the strongest signal to the wireless clients. 29.7 ZyXEL Share Center Utility Problems I cannot access or see a USB device that is connected to the NBG4615.
  • Page 247 I cannot install the ZyXEL Share Center Utility. Make sure that the set up program is one required for your operating system. Install the latest patches and updates for your operating system. Check the zyxel.com download site for a newer version of the utility. NBG4615 User’s Guide...
  • Page 248 Chapter 29 Troubleshooting NBG4615 User’s Guide...
  • Page 249: Appendix A Product Specifications

    P P E N D I X Product Specifications The following tables summarize the NBG4615’s hardware and firmware features. Table 87 Hardware Features Dimensions 162 mm (W) x 106 mm (D) x 28 mm (H) Weight 285g SDRAM 32 MB Flash Memory 8 MB Power Specification...
  • Page 250 Bluetooth enabled devices, and other wireless LANs. Firmware Upgrade Download new firmware (when available) from the ZyXEL web site and use the Web Configurator to put it on the NBG4615. Note: Only upload firmware for your specific model! Configuration Backup &...
  • Page 251: Wall-Mounting Instructions

    IP default gateway and DNS servers to computers on your network. Dynamic DNS Support With Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic IP address. You must register for this service with a Dynamic DNS service provider. IP Multicast IP Multicast is used to send traffic to a specific group of computers.
  • Page 252 Appendix A Product Specifications Be careful to avoid damaging pipes or cables located inside the wall when drilling holes for the screws. Do not insert the screws all the way into the wall. Leave a small gap of about 0.5 cm between the heads of the screws and the wall.
  • Page 253: Appendix B Pop-Up Windows, Javascript And Java Permissions

    P P E N D I X Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8.
  • Page 254 Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 148 Internet Options: Privacy Click Apply to save this setting.
  • Page 255 Appendix B Pop-up Windows, JavaScript and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 149 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NBG4615 User’s Guide...
  • Page 256 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 150 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
  • Page 257 Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 151 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 258: Java Permissions

    Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 152 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 259 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 153 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NBG4615 User’s Guide...
  • Page 260 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 154 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen.
  • Page 261 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 156 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly. NBG4615 User’s Guide...
  • Page 262 Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 157 Opera: Allowing Pop-Ups NBG4615 User’s Guide...
  • Page 263 Appendix B Pop-up Windows, JavaScript and Java Permissions Enabling Java From Opera, click Tools, then Preferences. In the Advanced tab, select Content from the left-side menu. Select the check boxes as shown in the following screen. Figure 158 Opera: Enabling Java To customize JavaScript behavior in the Opera browser, click JavaScript Options.
  • Page 264 Appendix B Pop-up Windows, JavaScript and Java Permissions NBG4615 User’s Guide...
  • Page 265: Appendix C Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 266: Subnet Masks

    Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 160 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 267 Appendix C IP Addresses and Subnetting By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits. Subnet masks can be referred to by the size of the network number part (the bits with a “1”...
  • Page 268 Appendix C IP Addresses and Subnetting Notation Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet.
  • Page 269 Appendix C IP Addresses and Subnetting The following figure shows the company network before subnetting. Figure 161 Subnetting Example: Before Subnetting You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
  • Page 270 Appendix C IP Addresses and Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address).
  • Page 271 Appendix C IP Addresses and Subnetting Table 95 Subnet 3 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 10000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: Lowest Host ID: 192.168.1.129 192.168.1.128 Broadcast Address: Highest Host ID: 192.168.1.190 192.168.1.191 Table 96 Subnet 4...
  • Page 272 Appendix C IP Addresses and Subnetting Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 98 24-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.255.128 (/25)
  • Page 273 Appendix C IP Addresses and Subnetting addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established.
  • Page 274 Appendix C IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network. Conflicting Computer IP Addresses Example More than one device can not use the same IP address.
  • Page 275 Appendix C IP Addresses and Subnetting following example, the LAN and WAN are on the same subnet. The LAN computers cannot access the Internet because the router cannot route between networks. Figure 164 Conflicting Router IP Addresses Example Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address.
  • Page 276 Appendix C IP Addresses and Subnetting NBG4615 User’s Guide...
  • Page 277: Appendix D Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific NBG4615 may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 278 Appendix D Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. In the Control Panel, click the Network Connections icon. NBG4615 User’s Guide...
  • Page 279 Appendix D Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NBG4615 User’s Guide...
  • Page 280 Appendix D Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 281: Windows Vista

    Appendix D Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NBG4615 User’s Guide...
  • Page 282 Appendix D Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NBG4615 User’s Guide...
  • Page 283 Appendix D Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NBG4615 User’s Guide...
  • Page 284 Appendix D Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 285 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also go to Start > Control Panel > Network Connections, right-click a network connection, click Status and then click the Support tab to view your IP address and connection information.
  • Page 286 Appendix D Setting Up Your Computer’s IP Address Click Change adapter settings. Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NBG4615 User’s Guide...
  • Page 287 Appendix D Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NBG4615 User’s Guide...
  • Page 288 Appendix D Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 289 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3.
  • Page 290 Appendix D Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. NBG4615 User’s Guide...
  • Page 291 Appendix D Setting Up Your Computer’s IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. •...
  • Page 292 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 166 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6.
  • Page 293 Appendix D Setting Up Your Computer’s IP Address In System Preferences, click the Network icon. When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. NBG4615 User’s Guide...
  • Page 294 Appendix D Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. •...
  • Page 295 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 167 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 296 Appendix D Setting Up Your Computer’s IP Address Follow the steps below to configure your computer IP address in GNOME: Click System > Administration > Network. When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password.
  • Page 297 Appendix D Setting Up Your Computer’s IP Address In the Authenticate window, enter your admin account name and password then click the Authenticate button. In the Network Settings window, select the connection that you want to configure, then click Properties. NBG4615 User’s Guide...
  • Page 298 Appendix D Setting Up Your Computer’s IP Address The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address. • In the Configuration list, select Static IP address if you have a static IP address.
  • Page 299 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly.
  • Page 300 Appendix D Setting Up Your Computer’s IP Address Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration.
  • Page 301 Appendix D Setting Up Your Computer’s IP Address When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. NBG4615 User’s Guide...
  • Page 302 Appendix D Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 169 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 303 Appendix D Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties.
  • Page 304 Appendix D Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 171 openSUSE: Connection Status - KNetwork Manager NBG4615 User’s Guide...
  • Page 305: Appendix E Wireless Lans

    P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 306 Appendix E Wireless LANs with each other. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 173 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 307 Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 174 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data.
  • Page 308 Appendix E Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 175 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 309: Fragmentation Threshold

    Appendix E Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 310: Wireless Security Overview

    Appendix E Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 100 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/...
  • Page 311 Appendix E Wireless LANs IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices.
  • Page 312 Appendix E Wireless LANs • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: •...
  • Page 313 Appendix E Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication.
  • Page 314: Dynamic Wep Key Exchange

    Appendix E Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
  • Page 315 Appendix E Wireless LANs If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending on whether you have an external RADIUS server or not. Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2.
  • Page 316 Appendix E Wireless LANs keys. This prevent all wireless devices sharing the same encryption keys. (a weakness of WEP) User Authentication WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using an external RADIUS database. WPA2 reduces the number of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time required to connect to a network.
  • Page 317 Appendix E Wireless LANs The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy and management system, using the PMK to dynamically generate unique data encryption keys. The keys are used to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.
  • Page 318: Security Parameters Summary

    Appendix E Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 177 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
  • Page 319: Antenna Characteristics

    Appendix E Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN.
  • Page 320 Appendix E Wireless LANs • Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points.
  • Page 321: Appendix F Common Services

    Border Gateway Protocol. BOOTP_CLIENT DHCP Client. BOOTP_SERVER DHCP Server. CU-SEEME 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. NBG4615 User’s Guide...
  • Page 322 Appendix F Common Services Table 104 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
  • Page 323 Appendix F Common Services Table 104 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL User-Defined PPTP (Point-to-Point Tunneling (GRE) Protocol) enables secure transfer of data over public networks.
  • Page 324 Appendix F Common Services Table 104 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution.
  • Page 325: Appendix G Ipv6

    P P E N D I X IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 10 IP addresses.
  • Page 326 Appendix G IPv6 Link-local Address A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a “private IP address” in IPv4. You can have the same link-local address on multiple interfaces on a device. A link-local unicast address has a predefined prefix of fe80::/10.
  • Page 327 Appendix G IPv6 The following table describes the multicast addresses which are reserved and can not be assigned to a multicast group. Table 107 Reserved Multicast Address MULTICAST ADDRESS FF00:0:0:0:0:0:0:0 FF01:0:0:0:0:0:0:0 FF02:0:0:0:0:0:0:0 FF03:0:0:0:0:0:0:0 FF04:0:0:0:0:0:0:0 FF05:0:0:0:0:0:0:0 FF06:0:0:0:0:0:0:0 FF07:0:0:0:0:0:0:0 FF08:0:0:0:0:0:0:0 FF09:0:0:0:0:0:0:0 FF0A:0:0:0:0:0:0:0 FF0B:0:0:0:0:0:0:0 FF0C:0:0:0:0:0:0:0 FF0D:0:0:0:0:0:0:0...
  • Page 328 Appendix G IPv6 MAC address and complements the seventh bit of the first byte of the MAC address. See the following example. 00 : 13 : 49 : 12 : 34 : 56 EUI-64 : 13 : 49 : FF : FE : 12 : 34...
  • Page 329 Appendix G IPv6 Each IA must be associated with exactly one interface. The DHCP client uses the IA assigned to an interface to obtain configuration from a DHCP server for that interface. Each IA consists of a unique IAID and associated IP information. The IA type is the type of address in the IA.
  • Page 330 Appendix G IPv6 NBG4615 passes the IPv6 prefix information to its LAN hosts. The hosts then can use the prefix to generate their IPv6 addresses. ICMPv6 Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443.
  • Page 331 Appendix G IPv6 When the NBG4615 needs to send a packet, it first consults the destination cache to determine the next hop. If there is no matching entry in the destination cache, the NBG4615 uses the prefix list to determine whether the destination address is on-link and can be reached directly without passing through a router.
  • Page 332 Appendix G IPv6 also displays how to use the ipconfig command to see auto-generated IP addresses. C:\>ipv6 install Installing... Succeeded. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix IP Address... . : 10.1.1.46 Subnet Mask .
  • Page 333 Appendix G IPv6 Double click Dibbler - a DHCPv6 client. Click Start and then OK. Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer.
  • Page 334 Appendix G IPv6 Select Control Panel > Network and Sharing Center > Local Area Connection. Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it. Click OK to save the change. Click Close to exit the Local Area Connection Status screen. Select Start >...
  • Page 335 Appendix G IPv6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix IPv6 Address... : 2001:b021:2d::1000 Link-local IPv6 Address .
  • Page 336 Appendix G IPv6 NBG4615 User’s Guide...
  • Page 337: Appendix H Open Software Announcements

    CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL, AND YOUR MONEY WILL BE REFUNDED.
  • Page 338 Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 339 SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF...
  • Page 340 Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.
  • Page 341 For at least three (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (support@zyxel.com.tw), for a charge of no more than our cost of physically performing source code distribution, a...
  • Page 342 Appendix H Open Software Announcements Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users.
  • Page 343 Appendix H Open Software Announcements 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program"...
  • Page 344 Appendix H Open Software Announcements when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
  • Page 345 Appendix H Open Software Announcements from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works.
  • Page 346 Appendix H Open Software Announcements 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
  • Page 347 Appendix H Open Software Announcements This Product includes curl software under below license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2007, Daniel Stenberg, <daniel@haxx.se>. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
  • Page 348 Appendix H Open Software Announcements NOTICE Curl contains pieces of source code that is Copyright (c) 1998, 1999 Kungliga Tekniska H÷g skolan. This notice is included here to comply with the distribution terms. This Product includes goahead software under below license License Agreement THIS LICENSE ALLOWS ONLY THE LIMITED USE OF GO AHEAD SOFTWARE, INC.
  • Page 349 Appendix H Open Software Announcements 1.4 "License" or "Agreement" means this document. 1.5 "Modifications" means any addition to or deletion from the substance or structure of either the Original Code or any previous Modifications. 1.6 "Original Code" means the Source Code to GoAhead? proprietary computer software entitled GoAhead WebServer.
  • Page 350 Appendix H Open Software Announcements 2.2 Binary Code. GoAhead hereby grants You a world-wide, royalty-free, non-exclusive license to copy and distribute the binary code versions of the Original Code together with Your Modifications. 2.3 License Back to GoAhead. You hereby grant in both source code and binary code to GoAhead a world-wide, royalty-free, non-exclusive license to copy, modify, display, use and sublicense any Modifications You make that are distributed or planned for distribution.
  • Page 351 Appendix H Open Software Announcements 4. Trademarks and Brand. 4.1 License and Use. GoAhead hereby grants to You a limited world-wide, royalty-free, non-exclusive license to use the GoAhead trade names, trademarks, logos, service marks and product designations posted in Exhibit A (collectively, the "GoAhead Marks") in connection with the activities by You under this Agreement.
  • Page 352 Appendix H Open Software Announcements 4.4 No Modifications to Server Identification Field. You agree not to remove or modify the Server identification Field contained in the Response Header as defined in Section 1.6 and 1.7. 5. Warranty Disclaimers. THE ORIGINAL CODE, THE DOCUMENTATION AND THE MEDIA UPON WHICH THE ORIGINAL CODE IS RECORDED (IF ANY) ARE PROVIDED "AS IS"...
  • Page 353 Appendix H Open Software Announcements THAT THE ORIGINAL CODE DOES NOT INCLUDE ANY VIRUS, SOFTWARE ROUTINE OR OTHER SOFTWARE DESIGNED TO PERMIT UNAUTHORIZED ACCESS, TO DISABLE, ERASE OR OTHERWISE HARM SOFTWARE, HARDWARE OR DATA, OR TO PERFORM OTHER SUCH ACTIONS. Any warranties that by law survive the foregoing disclaimers shall terminate ninety (90) days from the date You received the Original Code.
  • Page 354 Appendix H Open Software Announcements In no event will GoAhead? total liability to You for all damages, losses, and causes of action (whether in contract, tort, including negligence, or otherwise) exceed the amount You paid for this product. SOME STATES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, AND SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATIONS OR...
  • Page 355 Appendix H Open Software Announcements of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines or weapons systems, in which the failure of the Original Code could lead directly to death, personal injury, or severe physical or environmental damage. GoAhead and its suppliers specifically disclaim any express or implied warranty of fitness for any high risk uses listed above.
  • Page 356 Appendix H Open Software Announcements provided in the contract between the vendor and the governmental entity; and (iv) in all respects is proprietary data belonging solely to GoAhead (or its licensor(s)). 10. Governing Law and Interpretation. This Agreement shall be interpreted under and governed by the laws of the State of Washington, without regard to its rules governing the conflict of laws.
  • Page 357 Appendix H Open Software Announcements FORTH IN THIS AGREEMENT. IF YOU DO NOT WISH TO ACCEPT THIS LICENSE OR YOU DO NOT QUALIFY FOR A LICENSE BASED ON THE TERMS SET FORTH ABOVE, YOU MUST NOT CLICK THE "Register" BUTTON. Exhibit A GoAhead Trademarks, Logos, and Product Designation Information 01/28/00...
  • Page 358 Appendix H Open Software Announcements This Product includes igmpproxy software under below license igmpproxy - IGMP proxy based multicast router Copyright (C) 2005 Johnny Egeland <johnny@rlo.org> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation;...
  • Page 359 Appendix H Open Software Announcements - Licensed under the GNU General Public License, version 2 mrouted 3.9-beta3 - COPYRIGHT 1989 by The Board of Trustees of Leland Stanford Junior University. -Original license can be found in the Stanford.txt file. This Product includes openssl software under below license LICENSE ISSUES ============== The OpenSSL toolkit stays under a dual license, i.e.
  • Page 360 Appendix H Open Software Announcements notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 361 Appendix H Open Software Announcements * THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY * EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR * ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;...
  • Page 362 Appendix H Open Software Announcements * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to. The following conditions * apply to all code found in this distribution, be it the RC4, RSA, * lhash, DES, etc., code;...
  • Page 363 Appendix H Open Software Announcements "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-). * 4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement: "This product includes software written by Tim Hudson (tjh@cryptsoft.com)"...
  • Page 364 Appendix H Open Software Announcements * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] This Product includes ppp software under below license Copyrights: ***********...
  • Page 365 Appendix H Open Software Announcements IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS...
  • Page 366 Appendix H Open Software Announcements authors as specified in the copyright notice(s) substituted where indicated: This product includes software developed by the authors which are mentioned at the start of the source files and other contributors. 5. Neither the name(s) of the author(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 367 Appendix H Open Software Announcements This Product includes rp-l2pt software under below license Copying All software included in this package is Copyright 2002 Roaring Penguin Software Inc. You may distribute it under the terms of the GNU General Public License (the "GPL"), Version 2, or (at your option) any later version.
  • Page 368 Appendix H Open Software Announcements appreciated but is not required. 2. Altered source versions must be plainly marked as such, and must not be misrepresented as being the original software. 3. This notice may not be removed or altered from any source distribution. Jean-loup Gailly Mark Adler jloup@gzip.org...
  • Page 369 Appendix H Open Software Announcements modification, are permitted provided that the following conditions are met: * Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. * Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 370 Appendix H Open Software Announcements This Product includes uClibc software under LGPL 2.1 license GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
  • Page 371 Appendix H Open Software Announcements For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you. You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it.
  • Page 372 Appendix H Open Software Announcements libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software.
  • Page 373 Appendix H Open Software Announcements tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty;...
  • Page 374 Appendix H Open Software Announcements Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.
  • Page 375 Appendix H Open Software Announcements even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a...
  • Page 376 Appendix H Open Software Announcements "c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. "d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place.
  • Page 377 Appendix H Open Software Announcements its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it.
  • Page 378 Appendix H Open Software Announcements 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
  • Page 379: Appendix I Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice.
  • Page 380 Appendix I Legal Information • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation.
  • Page 381 Appendix I Legal Information This device has been designed to operate with an antenna having a maximum gain of 2dBi and 5dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication.
  • Page 382: Zyxel Limited Warranty

    Appendix I Legal Information Viewing Certifications Go to http://www.zyxel.com. Select your product on the ZyXEL home page to go to that product's page. Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
  • Page 383 Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 384 Sourced Components; provided that you comply with the terms of this License and any applicable licensing terms governing use of the Open-Sourced Components. ZyXEL is not obligated to provide any maintenance, technical or other support for the resultant modified Software. You may not copy, reverse engineer, decompile,...
  • Page 385 AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF...
  • Page 386 Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.
  • Page 387: Index

    Index Index viewing Channel 75, 85, 93 channel Address Assignment 130, 307 interference Advanced Encryption Standard Configuration See AES. restore content filtering alternative subnet mask notation by keyword (in URL) antenna copyright directional CPU usage gain 76, 85, 93, 103 omni-directional CTS (Clear to Send) AP (access point)
  • Page 388 Firewall overview 171, 172, 181 guidelines IP Pool ICMP packets IPv6 network security addressing 149, 325 Stateful inspection EUI-64 ZyXEL device firewall global address firewall interface ID stateful inspection link-local address Neighbor Discovery Protocol Firmware upload ping file extension prefix...
  • Page 389 Index local (user) database and encryption Local Area Network Operating Channel 76, 85, 93 operating mode MAC address 131, 155 cloning Pairwise Master Key (PMK) 315, 317 MAC address filter peer-to-peer MAC address filtering Point-to-Point Protocol over Ethernet MAC filter Point-to-Point Tunneling Protocol managing the device Pool Size...
  • Page 390 Index related documentation Remote management and NAT TCP/IP configuration limitations Temperature system timeout Temporal Key Integrity Protocol (TKIP) Reset button Time setting Reset the device trigger port Restore configuration Trigger port forwarding RF (Radio Frequency) example process Roaming Router Mode status screen RTS (Request To Send) threshold...
  • Page 391 Index Overview WPA2-Pre-Shared Key web configurator WPA2-PSK 314, 315 application example WEP Encryption 95, 96, 97, 106, 107, 137, 138 WPA-PSK WEP encryption application example WEP key Wi-Fi Protected Access Wildcard Wireless association list wireless channel wireless client WPA supplicants wireless LAN Xbox Live wireless LAN scheduling...
  • Page 392 Index NBG4615 User’s Guide...

Table of Contents