ZyXEL Communications N4100 User Manual

ZyXEL Communications N4100 User Manual

Wireless n hotspot gateway
Hide thumbs Also See for N4100:
Table of Contents

Advertisement

N4100
Wireless N HotSpot Gateway
Default Login Details
IP Address
192.168.1.1
User Name
admin
Password
1234
Version 1.0
www.zyxel.com
Edition 1, 11/2010
www.zyxel.com
Copyright © 2010
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications N4100

  • Page 1 N4100 Wireless N HotSpot Gateway Default Login Details IP Address 192.168.1.1 User Name admin Password 1234 Version 1.0 www.zyxel.com Edition 1, 11/2010 www.zyxel.com Copyright © 2010 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get your N4100 up and running right away. It contains information on setting up your network and configuring for Internet access. • Support Disc Refer to the included CD for support documents.
  • Page 4 About This User's Guide • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products. • Forum This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.
  • Page 5: Document Conventions

    Syntax Conventions • This product may be referred to as the “N4100”, the “device” or the “system” in this User’s Guide. • Product labels, screen names, field labels and field choices are all in bold font.
  • Page 6 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The N4100 icon is not an exact representation of your device. N4100 Computer Notebook computer Server Modem Firewall Telephone Switch Router N4100 User’s Guide...
  • Page 7: Safety Warnings

    Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. N4100 User’s Guide...
  • Page 8 Safety Warnings N4100 User’s Guide...
  • Page 9: Table Of Contents

    Account Generator ........................203 Licensing ..........................207 System Status ...........................211 Configuration and Firmware ....................225 System Account ........................239 SSL Certificate ......................... 243 Ping Command ........................245 Restart ............................. 247 Troubleshooting ........................249 Product Specifications ......................255 N4100 User’s Guide...
  • Page 10 Contents Overview N4100 User’s Guide...
  • Page 11: Table Of Contents

    Chapter 1 Introduction ..........................21 1.1 Overview ..........................21 1.2 Managing the N4100 ......................21 1.3 Good Habits for Managing the N4100 ................. 22 1.4 Applications for the N4100 ....................22 1.4.1 Internet Access ......................22 1.4.2 Wireless Connection ....................23 1.5 Restoring Factory Defaults ....................
  • Page 12 3.6.3 Testing the DDNS Setting ..................50 3.7 Accessing the Devices on the LAN from the WAN .............. 51 3.8 Using SSL Security for Connections between the N4100 and your Computer ....52 3.8.1 Activating SSL Security for Management Connections ..........52 3.8.2 Viewing and Installing the SSL Security Certificate ..........
  • Page 13 10.1.1 What You Can Do in this Chapter ................103 10.1.2 What You Need to Know ..................103 10.2 The Accounting Screen ....................104 10.2.1 Charge By Levels Example ..................106 Chapter 11 Credit Card ..........................109 N4100 User’s Guide...
  • Page 14 14.1.1 What You Can Do in this Chapter ................143 14.2 The Pass Through Screen ..................... 143 Chapter 15 Filtering..........................147 15.1 Overview .......................... 147 15.1.1 What You Can Do in this Chapter ................147 15.2 The Filtering Screen ...................... 147 N4100 User’s Guide...
  • Page 15 20.2 The Syslog Screen ......................168 20.3 The Log Settings Screen ....................170 Chapter 21 Session Trace........................175 21.1 Overview .......................... 175 21.1.1 What You Can Do in this Chapter ................175 21.2 The Session Trace Screen .................... 176 N4100 User’s Guide...
  • Page 16 26.1 Overview .......................... 203 26.1.1 What You Can Do in this Chapter ................203 26.2 The Account Generator Screen ..................204 Chapter 27 Licensing ..........................207 27.1 Overview .......................... 207 27.1.1 What You Can Do in this Chapter ................207 N4100 User’s Guide...
  • Page 17 29.3.4 Scheduled Firmware Upgrade ................236 Chapter 30 System Account........................239 30.1 Overview .......................... 239 30.1.1 What You Can Do in this Chapter ................239 30.2 The System Account Screen ................... 240 Chapter 31 SSL Certificate ........................243 31.1 Overview .......................... 243 N4100 User’s Guide...
  • Page 18 Chapter 34 Troubleshooting........................249 34.1 Overview .......................... 249 34.2 Power, Hardware Connections, and LEDs ..............249 34.3 N4100 Access and Login ....................250 34.4 Internet Access ........................ 251 34.5 Wireless LAN Troubleshooting ..................252 Chapter 35 Product Specifications ......................255 Appendix A Setting Up Your Computer’s IP Address ............
  • Page 19: User's Guide

    User’s Guide...
  • Page 21: Introduction

    Internet access. 1.2 Managing the N4100 Use the N4100’s built-in Web Configurator to manage it. You can connect to it using a web browser such as Firefox 2.0 (and higher) or Internet Explorer 6 (and higher). The web configurator gives you access to all the available settings for this product.
  • Page 22: Good Habits For Managing The N4100

    Internet access. Computers can connect to the ZyXEL Device's LAN ports (or wirelessly). In public areas, such as a hotel or coffee shop, the N4100 provides high speed Internet access to subscribers with account billing and authentication, which can be done using a statement printer (B) and local subscriber database.
  • Page 23: Wireless Connection

    By default, the wireless LAN (WLAN) is enabled on the N4100. IEEE 802.11b/g/n compliant clients can wirelessly connect to the N4100 to access network resources. The N4100 functions as an access point (AP) to bridge the wired and the wireless network allowing wireless stations to access the Internet through the N4100.
  • Page 24: Restoring Factory Defaults

    To set the device back to the factory default settings, use a pointed object to press the RESET button once or until the PWR LED begins to blink and then release it. When the PWR LED begins to blink, the defaults have been restored and the device restarts. N4100 User’s Guide...
  • Page 25: Leds (Lights)

    Chapter 1 Introduction 1.6 LEDs (Lights) The following graphic displays the labels of the LEDs. Figure 3 LEDs on the Front Panel None of the LEDs are on if the N4100 is not receiving power. Table 1 LED Descriptions COLOR STATUS DESCRIPTION Green The N4100 is receiving power.
  • Page 26 Table 1 LED Descriptions COLOR STATUS DESCRIPTION LAN 1~4 Green The N4100 has an Ethernet connection with another device (such as a computer) through this port. Blinking The N4100 is sending/receiving data through this port. The N4100 does not have an Ethernet connection through this port.
  • Page 27: The Web Configurator

    Internet Explorer. 2.1.1 Accessing the Web Configurator Note: The N4100 allows only one web configurator session at a time. Make sure your N4100 hardware is properly connected (refer to the Quick Start Guide for details on this). Launch your web browser.
  • Page 28 Chapter 2 The Web Configurator Launch your web browser and type the WAN or LAN IP address of the N4100 as the web address (it is recommended that you connect your computer to the LAN and use the LAN IP address for initial configuration). 192.168.1.1 is the default IP address for the LAN port.
  • Page 29: Web Configurator Main Screen

    • B - main window • C - status bar 2.2.1 Navigation Panel Use the menu items on the navigation panel to open screens to configure N4100 features. The following tables describe each menu item. Table 2 Navigation Panel Summary...
  • Page 30 Use this screen to configure the syslog server information. You can also set it to e-mail the logs to you. Log Settings Use this screen to select which logs your N4100 is to send and the schedule for when the N4100 is to send the logs. SESSION...
  • Page 31 WIRELESS Use this screen to configure the wireless LAN settings, WLAN authentication/security settings. ACCOUNT Use this screen to use the N4100 with one or more account GENERATOR generators (statement printers). LICENSING Registration Use this screen to register your N4100 with myZyXEL.com.
  • Page 32: Main Window

    Check the status bar when you click Apply or OK to verify that the configuration has been updated. 2.2.4 Wizard Setup Screens The Wizard setup screens display when you first access the N4100. Refer to the Quick Start Guide for information on how to configure the Wizard setup screens. N4100 User’s Guide...
  • Page 33: System Quick View Screen

    QUICK VIEW to display the following screen. This screen displays key system status information. Figure 7 Quick View The following table describes the labels in this screen. Table 3 Quick View LABEL DESCRIPTION System Refresh Click Refresh to update this screen. N4100 User’s Guide...
  • Page 34 This field displays the how long the N4100 has been operating since it was last started. WAN MAC Address This field displays the MAC address of the N4100 on the WAN. LAN MAC Address This field displays the MAC address of the N4100 on the LAN.
  • Page 35: Tutorials

    Internet through the N4100. In this wireless network, the N4100 serves as an access point (AP), and the notebook with a wireless network card or USB/PCI adapter is the wireless client. The wireless client can access the Internet through the AP.
  • Page 36: Configuring The N4100 Wireless Network Settings

    Chapter 3 Tutorials Thomas has to configure the wireless network settings on the N4100. Then users can set up a wireless network using manual configuration (Section 3.2.2 on page 37). 3.2.1 Configuring the N4100 Wireless Network Settings This example uses the following parameters to set up a wireless network.
  • Page 37: Connecting To The N4100 Wirelessly

    Click QUICK VIEW to open the System Quick View screen. Verify your wireless and wireless security settings and check if the WLAN connection is up. The user can now use the notebook’s wireless client to search for the N4100 (see Section 3.2.2 on page 37).
  • Page 38: Subscriber Authentication And Account Generation

    You can also create accounts on an accounting server (RADIUS). See the RADIUS documentation for how to create accounts manually. Note: You must set the authentication type to Built-in Authentication in the ADVANCED > AUTHENTICATION screen before you can create a subscriber account using the local subscriber database. N4100 User’s Guide...
  • Page 39: Creating Accounts In The Web Configurator

    Note: These button settings also apply to the buttons on a statement printer. Click a button to generate an account based on the settings you configure for the button in the ADVANCED > ACCOUNTING screen. A window displays showing a printout preview of the account generated. N4100 User’s Guide...
  • Page 40 Chapter 3 Tutorials The following figure shows an example. Close this window when you are finished viewing it. Figure 9 Web-based Account Generator Printout Preview Example Figure 10 Web-based PC-connected Printout Preview Example N4100 User’s Guide...
  • Page 41: Using A Statement Printer To Create Accounts And Print Subscriber Statements

    Follow the steps below to setup and create subscriber accounts and print subscriber statements using an external statement printer. Make sure that the printer is connected to the appropriate power and the N4100, and that there is printing paper in the statement printer. Refer to the printer’s User’s Guide for details.
  • Page 42: Subscriber Login

    Chapter 3 Tutorials 3.4 Subscriber Login To log in as a subscriber, enter a web site address such as www.zyxel.com in a web browser. If user authentication is activated, the login screen displays prompting you to enter the user name and password. A standard subscriber login screen (with the credit card function) is shown in the figure below.
  • Page 43: Reports Overview

    3.5.1 Reports Overview The SP300E allows you to print status reports about the subscriber accounts and general N4100 system information. Simply press a key combination on the SP300E to print a report instantly without accessing the web configurator. The following lists the reports that you can print using the SP300E.
  • Page 44: Monthly Account Summary

    2010/1/17 at 20:00:00, the monthly account report includes the accounts created from 2010/1/ 1 at 00:00:01 to 2010/1/17 at 19:59:59. Key combination: A B C B B N4100 User’s Guide...
  • Page 45: Account Report Notes

    (up to 2000 entries total). 3.5.6 System Status This report shows the current system information such as the host name and WAN IP address. Key combination: A B C C C N4100 User’s Guide...
  • Page 46 N4100. BTRM This field displays the version of the bootrom. WAMA This field displays the MAC address of the N4100 on the WAN. LAMA This field displays the MAC address of the N4100 on the LAN. N4100 User’s Guide...
  • Page 47: Network Statistics

    DESCRIPTION WATP This field displays the mode of the WAN port. WAIP This field displays the IP address of the WAN port on the N4100. WASM This field displays the subnet mask of the WAN port on the N4100. WAGW This field displays the IP address of the default gateway of the WAN port on the N4100.
  • Page 48 This field displays the number of packets received on the LAN. LATE This field displays the number of error packets transmitted on the LAN. LARE This field displays the number of error packets received on the LAN. N4100 User’s Guide...
  • Page 49: Using Ddns To Access The N4100

    Chapter 3 Tutorials 3.6 Using DDNS to access the N4100 If you connect your N4100 to the Internet and it uses a dynamic WAN IP address, it is inconvenient for you to manage the device from the Internet. The N4100’s WAN IP address changes dynamically.
  • Page 50: Configuring Ddns On Your N4100

    Click Apply. 3.6.3 Testing the DDNS Setting Now you should be able to access the N4100 from the Internet. To test this: Open a web browser on the computer (using the IP address a.b.c.d) that is connected to the Internet.
  • Page 51: Accessing The Devices On The Lan From The Wan

    Chapter 3 Tutorials The N4100’s login page should appear. You can then log into the N4100 and manage it. 3.7 Accessing the Devices on the LAN from the Thomas manages a Doom server on a computer behind the N4100. In order for players on the Internet to communicate with the Doom server, Thomas needs to configure the port settings and IP address on the N4100.
  • Page 52: Using Ssl Security For Connections Between The N4100 And Your Computer

    SYSTEM STATUS > LAN DEVICES screen. If you want to manage the Doom server using the N4100’s dynamic domain name and the virtual port, http://www.domainname.com:60001 for example, see Section 3.6 on page 49 for how to configure the N4100’s DDNS settings.
  • Page 53: Viewing And Installing The Ssl Security Certificate

    3.8.2 Viewing and Installing the SSL Security Certificate After you enable and activate the SSL security on the N4100, you can access the web configurator through a secure connection. Follow the steps below to view and install the default SSL security certificate on your computer.
  • Page 54 Figure 20 Installing the SSL Security Certificate: View Certificate Click Install Certificate to install the certificate to your computer. A Certificate Import Wizard window displays. Click Next. Figure 21 Installing the SSL Security Certificate: Certificate Import Wizard N4100 User’s Guide...
  • Page 55 Chapter 3 Tutorials Accept the default or specify the location to store the certificate. Click Next. Figure 22 Certificate Import Wizard: Location Click Finish to import the certificate. Figure 23 Certificate Import Wizard: Finish N4100 User’s Guide...
  • Page 56 A Security Warning window displays as shown. Click Yes to store the certificate to the computer. Figure 24 Security Warning When the certificate is saved successfully, a Certificate Import Wizard window displays. Click OK. Figure 25 Certificate Import Wizard N4100 User’s Guide...
  • Page 57 Notice that the first item in the list changed to inform you that the certificate is from a trusted host. Click Yes to proceed to the login screen in secure mode. Figure 27 Security Alert: Trusted N4100 User’s Guide...
  • Page 58: Activating Ssl Security For Subscriber Logins

    3.8.3 Activating SSL Security for Subscriber Logins Follow the steps below to activate the SSL security for subscriber login connections to the N4100. When a user accesses the subscriber login screen, the user name and password are protected before being sent to the N4100.
  • Page 59 Locate the certificate and private key files on your computer and click Apply to transfer the files to the N4100. Click Advanced > SYSTEM. Select Customer Certificate under SSL Certificate to have the N4100 use the certificate you downloaded for secure connections. Click Apply. N4100 User’s Guide...
  • Page 60 Chapter 3 Tutorials N4100 User’s Guide...
  • Page 61: Technical Reference

    Technical Reference...
  • Page 63: System Setup

    (Section 4.2 on page 64) to configure administrative and system-related general settings for your N4100. You can also use this screen to change your N4100’s time and date based on your local time zone. 4.1.2 What You Need to Know The following terms and concepts may help as you read through this chapter.
  • Page 64: The System Screen

    Chapter 4 System Setup you must enter the host name (System Name), the domain name can be assigned from the N4100 via DHCP. 4.2 The System Screen Click ADVANCED > SYSTEM to open this screen. Figure 29 ADVANCED > SYSTEM...
  • Page 65 Domain Name Enter the domain name (if you know it) here. If you leave this field blank, the N4100 may obtain a domain name from a DHCP server. The domain name entered by you is given priority over the DHCP server assigned domain name.
  • Page 66 Set the system date and time by selecting the appropriate choices from the drop-down list boxes. Get from my Click this button to set the time and date on the N4100 to be the same as Computer the management computer.
  • Page 67: Technical Reference

    Select Enable to have the N4100 respond to incoming Ping requests from the WAN. This is less secure since someone on the Internet can see that the N4100 is there by pinging it.
  • Page 68: Ipnp Zyxel Implementation

    Traditionally, you must set the IP addresses and the subnet masks of a computer and the N4100 to be in the same subnet to allow the computer to access the Internet (through the N4100). In cases where your computer is required to use a...
  • Page 69: How Ipnp Works

    (IP address) to a physical machine address, also known as a Media Access Control or MAC address, on the local area network. IP routing table is defined on IP Ethernet devices (the N4100) to decide which hop to use, to help forward data along to its specified destination.
  • Page 70 Chapter 4 System Setup N4100 User’s Guide...
  • Page 71: Wan/Lan

    Use the WAN/LAN screen (Section 5.2 on page 73) to set the LAN IP address and subnet mask of your N4100, and configure the WAN settings on the N4100 for Internet access. 5.1.2 What You Need to Know The following terms and concepts may help as you read through the chapter.
  • Page 72 (and service name) for user authentication. WAN IP Address The WAN IP address is an IP address for the N4100, which makes it accessible from an outside network. It is used by the N4100 to communicate with other devices in other networks. It can be static (fixed) or dynamically assigned by the ISP each time the N4100 tries to access the Internet.
  • Page 73: The Wan/Lan Screen

    The DHCP server is enabled on the LAN with a 253 client IP address pool starting from 192.168.1.2. You can change the DHCP settings in the Server screen. Use this screen to configure the WAN and LAN settings on the N4100. Click ADVANCED > WAN/LAN to open this screen.
  • Page 74 Table 8 ADVANCED > WAN/LAN LABEL DESCRIPTION IP Address Enter the LAN IP address of the N4100 in dotted decimal notation. The default is 192.168.1.1. Subnet Mask Enter the LAN subnet mask in dotted decimal notation. The default is 255.255.255.0.
  • Page 75 WAN Port Mode DHCP Client Select this option to set the N4100 to act as a DHCP client on the WAN. The N4100 obtains TCP/IP information (IP address, DNS server information, etc.) from a DHCP server. This is the default setting.
  • Page 76: Technical Reference

    Keep Alive Select this option when you want the Internet connection up all the time and specify a redial period in the Redial Period field. When disconnected, the N4100 will attempt to bring up the connection after the redial period. Apply Click Apply to save your changes back to the N4100.
  • Page 77 192.168.1.1, for your N4100, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address. Your N4100 will compute the subnet mask automatically based on the IP address that N4100 User’s Guide...
  • Page 78 Chapter 5 WAN/LAN you entered. You don't need to change the subnet mask computed by the N4100 unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet, for example, only between your two branch offices, you can assign any IP addresses to the hosts without problems.
  • Page 79 Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables secure transfer of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet. N4100 User’s Guide...
  • Page 80 Chapter 5 WAN/LAN N4100 User’s Guide...
  • Page 81: Server

    Chapter 31 on page for more information). HTTPS on the N4100 is used so that you may securely access the N4100 using the web configurator. The SSL protocol specifies that the SSL server (the N4100) must always authenticate itself to the SSL client (the computer which requests the...
  • Page 82 This N4100 has a built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability. You can configure the N4100 as a DHCP server or disable it. When configured as a server, the N4100 provides the TCP/IP configuration for the clients. If you turn DHCP service off, you must have another DHCP server on your LAN, or else the computer must be manually configured.
  • Page 83 DNS server. When a computer sends a DNS query to the N4100, the N4100 acts as a DNS proxy and forwards the query to the real DNS server learned through IPCP and relays the response back to the computer.
  • Page 84: The Server Screen

    Chapter 6 Server 6.2 The Server Screen Click ADVANCED > SERVER to open this screen. Figure 34 ADVANCED > SERVER N4100 User’s Guide...
  • Page 85 DESCRIPTION Web Server HTTP Port Select this radio button if you want to access the N4100 using unsecured HTTP. Specify the port number of the embedded web server on the N4100 for accessing the web configurator. The default port number is 80. Changing the port number helps protect the N4100’s web configurator from hacker...
  • Page 86: The Static Dhcp Table Screen

    If you select DHCP Relay, enter the IP address of a DHCP server (on the Server IP WAN). Address DHCP Server Select this option to set the N4100 to assign network information (IP (Default) address, DNS information etc.) to Ethernet device(s) connected to the LAN port(s). This is the default setting. IP Pool Enter the first of the continuous addresses in the IP address pool.
  • Page 87 Chapter 6 Server Click Network > LAN > Static DHCP Table to open the following screen. Use this screen to change your N4100’s static DHCP settings. Figure 35 ADVANCED > SERVER > Static DHCP Table The following table describes the labels in this screen.
  • Page 88 Chapter 6 Server Table 10 ADVANCED > SERVER > Static DHCP Table LABEL DESCRIPTION MAC Address Enter the MAC address of a computer on your LAN. Apply Click Apply to save your changes back to the N4100. N4100 User’s Guide...
  • Page 89: Authentication

    7.1 Overview You can use the built-in subscriber database to manage the subscribers. The N4100 also provides a built-in billing mechanism to set up accounting information without using accounting software or an accounting server (such as RADIUS). 7.1.1 What You Can Do in this Chapter Use the Authentication screen (Section 4.2 on page...
  • Page 90 1 minute. The valid range is 1 to 1440. n Backup If you create a subscriber account and the N4100 restarts before backing up the account information, the subscriber account will not be saved. You will need to create a new account for the subscriber.
  • Page 91 Chapter 7 Authentication default sample page in order for the user agreement page to send the subscribers' agreement or disagreement to the N4100. Figure 37 ADVANCED > AUTHENTICATION > Code N4100 User’s Guide...
  • Page 92 Chapter 7 Authentication N4100 User’s Guide...
  • Page 93: Radius

    This system is the client and the server is the external RADIUS server. RADIUS is a simple package exchange in which the N4100 acts as a message relay between the subscribers and the RADIUS server to establish a connection. When...
  • Page 94 Chapter 8 RADIUS Note: You must set the authentication type to Built-in Authentication in the ADVANCED > AUTHENTICATION screen before you can save and apply any changes you do in the RADIUS screen. Figure 38 ADVANCED > RADIUS N4100 User’s Guide...
  • Page 95 You must also enable the accounting service below. Idle Time The N4100 automatically disconnects a computer from the network after a period of inactivity. The subscriber may need to enter the username and password again before access to the network is allowed.
  • Page 96 This also sets how many times the N4100 will attempt to use the secondary RADIUS server. For example, you set this field to 3. If the N4100 does not get a response from the primary RADIUS server, it tries again up to three times. If there is no response, the N4100 tries the secondary RADIUS server up to three times.
  • Page 97 IPASS GIS The iPass company provides connectivity services for mobile Internet users. Select this check box to have the N4100 use the iPass Generic Interface Specification (GIS) method to authenticate iPass clients. Your external RADIUS servers must be Wi-Fi based Wireless Internet Service Provider roaming (WISPr) compliant in order to authenticate iPass clients.
  • Page 98 Chapter 8 RADIUS N4100 User’s Guide...
  • Page 99: Billing

    The following terms and concepts may help as you read through the chapter. Accumulation Accounting Method The accumulation accounting method allows multiple re-logins until the allocated time period or until the subscriber account is expired. The N4100 accounts the time that the subscriber is logged in for Internet access. Time-to-finish Accounting Method The time-to-finish accounting method is good for one-time logins.
  • Page 100: The Billing Screen

    Chapter 9 Billing 9.2 The Billing Screen Click ADVANCED > BILLING to open this screen. Note: If you change the billing mode, the system erases all accounts and disconnects all on-line subscribers. Figure 39 ADVANCED > BILLING N4100 User’s Guide...
  • Page 101 Select this option to allow each subscriber multiple re-login until the time allocated is used up. Idle Time The N4100 automatically disconnects a computer from the network after a period of inactivity. The subscriber may need to enter the username and password again before access to the network is allowed.
  • Page 102 “profile’s” maximum Internet access time. Charge Define each profile’s price, up to 999999, per time unit (configured in the Account Usage Time field). Apply Click Apply to save your changes back to the N4100. N4100 User’s Guide...
  • Page 103: Accounting

    The discount price plan gives you the option to charge by levels. This allows you to charge the rate at each successive level from the first level (most expensive per unit) to the highest level (least expensive per unit) that the total purchase reaches. N4100 User’s Guide...
  • Page 104: The Accounting Screen

    (least expensive) level that the total purchase reaches. Section 10.2.1 on page 106 for an example of the charge by levels accounting function. 10.2 The Accounting Screen Click ADVANCED > ACCOUNTING to open this screen. Figure 40 ADVANCED > ACCOUNTING N4100 User’s Guide...
  • Page 105 Accumulati Enter the number and select a time unit from the drop-down list box to on account specify how long to wait before the N4100 deletes an idle account. This is will be for use with accumulation accounting. deleted...
  • Page 106: Charge By Levels Example

    Unit Price Enter each level’s charge per time unit. Apply Click Apply to save your changes back to the N4100. 10.2.1 Charge By Levels Example This is an example of how charge by levels accounting works. The discount price plan allows you to make the unit price lower as the subscriber purchases more (meaning a higher number of button pushes).
  • Page 107 With charge by levels accounting, you charge the subscriber the rate at each successive level from the first level (most expensive per unit) to the highest level (least expensive per unit) that the purchase reaches. In this example, the N4100 would charge as follows:...
  • Page 108 Chapter 10 Accounting N4100 User’s Guide...
  • Page 109: Credit Card

    H A P T E R Credit Card 11.1 Overview The N4100 allows you to use a credit card service to authorize, process, and manage credit card transactions directly through the Internet. You must register with one of the supported credit card service (see...
  • Page 110: The Credit Card Screen

    Chapter 11 Credit Card 11.2 The Credit Card Screen Click ADVANCED > CREDIT CARD to open this screen. Figure 42 ADVANCED > CREDIT CARD N4100 User’s Guide...
  • Page 111 There are two test modes, Success and Fail. In Success test mode, transactions are submitted as if the bank authorized the transaction. In Fail test mode, transactions are submitted as if the bank declined authorization. N4100 User’s Guide...
  • Page 112 Select the check box(es) of the credit card icon(s) that you want the icons to be N4100 to display on the subscriber login page. displayed on the login page Apply Click Apply to save your changes back to the N4100. N4100 User’s Guide...
  • Page 113: Keypad

    You can use an optional PS/2 numeric keypad with a statement printer. Use this screen to define functions for the keys. 12.1.1 What You Can Do in this Chapter Use the Keypad screen (Section 12.2 on page 114) to set up the optional keypad for a statement printer. N4100 User’s Guide...
  • Page 114: The Keypad Screen

    Select the billing profile that you want to assign to the combination hot Post-Paid key. Use the Billing screen to configure and activate billing profiles. Only Billing active billing profiles display here for you to choose from. N4100 User’s Guide...
  • Page 115: Keypad Configuration Examples

    These sections explain how to configure the N4100 for use with a PS/2 keypad. 12.3.1 Keypad with Pre-Paid Billing Example The following is an example of how to configure the N4100 to use a PS/2 keypad for pre-paid billing. Click ADVANCED > BILLING.
  • Page 116 ----------------------------------------- Username:7spct858 Password:jic7rp55 Billing:Time to Finish Service:1 hour Unit:1 Usage Time:01:00:00 Total:USD 2.00 Tax:USD 0.00 Grand Total:USD 2.00 ----------------------------------------- ESSID:ZyXEL ----------------------------------------- 2010/01/22 16:58:04 S/N:000001 Please activate your account before 2010/01/23 04:58:04 ----------------------------------------- Thank you very much ! N4100 User’s Guide...
  • Page 117: Keypad With Post-Paid Billing Example

    Chapter 12 Keypad 12.3.2 Keypad with Post-Paid Billing Example The following is an example of how to configure the N4100 to use a PS/2 keypad for post-paid billing. Click ADVANCED > BILLING. Select Post-Paid and click Apply. Figure 47 Select Post-Paid Billing Click ADVANCED >...
  • Page 118 When a subscriber is done using the Internet service, press the following to print a bill. Serial number [ENTER] Figure 50 Post-Paid Account Bill Printout Example Welcome! ----------------------------------------- S/N:000001 ----------------------------------------- Hotspot Internet Service ----------------------------------------- Username:27i28n32 Password:5a789i35 Usage Time:00:32:01 Total:USD 1.00 ----------------------------------------- 2010/01/22 18:25:51 ----------------------------------------- Thank you very much ! N4100 User’s Guide...
  • Page 119: Customization

    Internet. You can configure walled garden web addresses for web sites that all subscribers are allowed to access without logging in (refer to Chapter 17 on page 153). N4100 User’s Guide...
  • Page 120: The Login

    Chapter 13 Customization Information Windows You can set the N4100 to display an information window after a subscriber has successfully logged in. This information window shows the amount of time a subscriber has used or the time the subscriber still has to access the Internet.
  • Page 121 Chapter 13 Customization Figure 51 ADVANCED > CUSTOMIZATION > Login Page N4100 User’s Guide...
  • Page 122: Standard

    Table 18 ADVANCED > CUSTOMIZATION > Login Page: Standard LABEL DESCRIPTION Standard Select this option to set the N4100 to display the standard subscriber login screen. Logo Select this check box to display your logo on the subscriber login screen.
  • Page 123: Redirect

    Figure 53 Subscriber Login Page Example: Standard 13.2.2 Redirect You can set the N4100 to redirect the subscribers to another login screen. This allows you to use your own customized login screen that you have created with a website-design tool. This gives you the ability to use a company login page and/or add multimedia features such as flash.
  • Page 124 Chapter 13 Customization Figure 55 ADVANCED > CUSTOMIZATION > Login Page: Redirect > Code N4100 User’s Guide...
  • Page 125: Advanced

    Table 20 ADVANCED > CUSTOMIZATION > Login Page: Advanced LABEL DESCRIPTION Advanced Select this option to set the N4100 to display the advanced subscriber login screen. Welcome Enter a welcome message (up to 80 characters long) in the text box Slogan provided.
  • Page 126: Frame

    Table 21 ADVANCED > CUSTOMIZATION > Login Page: Frame LABEL DESCRIPTION Frame Select this option to configure and set the N4100 to display the subscriber login screen in two frames. Top Frame Enter a web site address in the URL Link field, for example, http:// www.zyxel.com.
  • Page 127: The Logo Screen

    To upload your logo file, click ADVANCED > CUSTOMIZATION > Logo to open this screen. Figure 60 ADVANCED > CUSTOMIZATION > Logo N4100 User’s Guide...
  • Page 128: The Information Windows Screen

    File Path Enter the file path name of the logo file or click Browse to search for it. Apply Click Apply to upload your logo file to the N4100. Delete Click Delete to remove the logo you uploaded. 13.4 The Information Windows Screen To upload your logo file, click ADVANCED >...
  • Page 129: The Account Printout Screen

    This field displays when the N4100 is set to use pre-paid billing. Post-Paid Billing -Enter the label for the field displaying the amount of time used. This field displays when the N4100 is set to use post-paid billing. Warning/...
  • Page 130 Chapter 13 Customization To customize the account printout, click ADVANCED > CUSTOMIZATION > Account Printout to display the screen as shown. Figure 62 ADVANCED > CUSTOMIZATION > Account Printout N4100 User’s Guide...
  • Page 131 Select this check box and enter a label name for the field displaying the Encryption Wi-Fi Protected Access (WPA Encryption) key. This field displays on the account statement when the N4100 is using WPA data encryption with a pre-shared key. WPA2...
  • Page 132 Enter an explanation for the subscriber about the account’s expiration. Select date and time formats from the drop-down list boxes. Accumulation This message displays in the account printout when you set the N4100 to use accumulation billing. Enter an explanation for the subscriber about the deadline for using the purchased time.
  • Page 133 Chapter 13 Customization Figure 64 Preview of Account Generator Printer Example N4100 User’s Guide...
  • Page 134: The Credit Card Screen

    Figure 65 Preview of Post-Paid Printout Example 13.6 The Credit Card Screen When you configure the N4100 to use credit card billing, you can use this page to customize the subscriber billing interface. Click ADVANCED > CUSTOMIZATION > Credit Card to display the screen as shown.
  • Page 135: Credit Card Standard Login Page

    Click this link to display a preview of the standard login page. Standard Login Page The following figure shows an example of the standard login page with the credit card option. Figure 67 Credit Card Standard Login Page Example N4100 User’s Guide...
  • Page 136: Credit Card Service Selection Page

    Chapter 13 Customization 13.6.2 Credit Card Service Selection Page Use this section to customize the credit card billing interface that displays on the subscriber’s screen. Figure 68 ADVANCED > CUSTOMIZATION > Credit Card: Service Selection Page N4100 User’s Guide...
  • Page 137 ZIP/ Postal Select this check box if you want the screen to display a zip or postal Code code field. Enter the label name for the field that requests the subscriber’s zip or postal code. N4100 User’s Guide...
  • Page 138 Click this link to display a preview of the credit card service selection Service page that will display on the subscriber’s screen. Selection Page The following figure shows an example preview of the credit card service selection page. Figure 69 Credit Card Service Selection Page Preview N4100 User’s Guide...
  • Page 139: Credit Card Successful Page

    Select date and time formats from the Format drop-down list boxes. Email Button Enter a label name for the button the subscriber can click to send a copy of the account information to the subscriber’s e-mail account. N4100 User’s Guide...
  • Page 140: Credit Card Fail Page

    13.6.4 Credit Card Fail Page Use this section to customize the page that displays on the subscriber’s screen if an attempt to use a credit card fails. Figure 72 ADVANCED > CUSTOMIZATION > Credit Card: Fail Page N4100 User’s Guide...
  • Page 141 Click this link to display a preview of the credit card transaction failed Page page that will display on the subscriber’s screen. The following figure shows an example preview of the credit card transaction failed page. Figure 73 Credit Card Failed Page Preview N4100 User’s Guide...
  • Page 142 Chapter 13 Customization N4100 User’s Guide...
  • Page 143: Pass Through

    Pass Through 14.1 Overview You can set up two types of pass through on the N4100: by device or by web site address. You can set the N4100 to allow specific computers on the LAN (based on the IP or MAC address) to access the Internet without prompting for a user name and password.
  • Page 144 Enable pass through to allow all users to access specific web sites (or IP addresses) and/or allow packets from specific computers to go through the N4100 without prompting for a user name and password. Please enter new pass through for destination (up to 50 entries) The destinations should be on the WAN.
  • Page 145 Start / End IP Select this option to allow packets from computers with a specific range Address of IP addresses to pass through the N4100 without entering a user name and password. Enter the beginning and ending IP addresses IP addresses in dotted decimal notation, for example, 192.168.1.10.
  • Page 146 Chapter 14 Pass Through N4100 User’s Guide...
  • Page 147: Filtering

    15.1.1 What You Can Do in this Chapter Use the Filtering screen (Section 15.2 on page 147) to configure the N4100's filter function. 15.2 The Filtering Screen To configure filtering on the N4100, click ADVANCED > FILTERING to open this screen. N4100 User’s Guide...
  • Page 148 Enter an IP address to which you want to block subscriber access. Subnet Enter the subnet mask of the IP address to which you want to block Mask subscriber access. Add to List Click this button to add a new entry to the list of restricted destinations. N4100 User’s Guide...
  • Page 149 This field displays the destination address(s). Delete Select this(ese) check box(es) and click Apply to remove the destination entry. Delete All Click this button to remove all of the destination entries. Apply Click Apply to save your changes back to the N4100. N4100 User’s Guide...
  • Page 150 Chapter 15 Filtering N4100 User’s Guide...
  • Page 151: Share

    (Section 16.2 on page 151) to configure the N4100 for the sharing of network devices. 16.2 The Share Screen To configure sharing on the N4100, click ADVANCED > SHARE to open this screen. Figure 76 ADVANCED > SHARE N4100 User’s Guide...
  • Page 152 This field displays the MAC address of the LAN device. Click the column heading to sort the entries by MAC address. Interface This field displays to which of the N4100’s interfaces the LAN device is connected. Click the column heading to sort the entries by interface. Delete Select a check box(es) and click Apply to delete the share device entry(ies).
  • Page 153: Portal Page, Advertisement Links And Walled Garden

    The super user account also gets redirected to the portal page. Users are also redirected to this web site if you set up the N4100 to not require authentication or to require the acceptance of a user agreement before allowing Internet access.
  • Page 154: The Portal

    Table 32 ADVANCED > PORTAL PAGE LABEL DESCRIPTION URL Link Enter the web site address of a portal page. You can use up to 350 ASCII characters. Apply Click Apply to save your changes back to the N4100. N4100 User’s Guide...
  • Page 155: The Advertisement Screen

    Chapter 17 Portal Page, Advertisement Links and Walled Garden 17.3 The Advertisement Screen You can set the N4100 to display an advertisement web page as the first web page whenever the subscriber connects to the Internet. Click ADVANCED > ADVERTISEMENT to open this screen.
  • Page 156: The Walled Garden Screen

    Chapter 17 Portal Page, Advertisement Links and Walled Garden 17.4 The Walled Garden Screen A subscriber must log in before the N4100 allows the subscriber access to the Internet. However, with a walled garden, you can define one or more web site addresses that all subscribers can access without logging in.
  • Page 157 Chapter 17 Portal Page, Advertisement Links and Walled Garden Figure 80 Walled Garden Login Example N4100 User’s Guide...
  • Page 158 Chapter 17 Portal Page, Advertisement Links and Walled Garden N4100 User’s Guide...
  • Page 159: Ddns

    (in NetMeeting, CU-SeeMe or other services). This is for cases where the ISP gives the N4100 a dynamic IP address but you still want to use a domain name. You can also access your FTP server or Web site on your own computer using a domain name (for example, myhost.dhs.org, where myhost is a name of your choice),...
  • Page 160: The Ddns Screen

    Chapter 18 DDNS 18.2 The DDNS Screen Click ADVANCED > DDNS to open this screen. Figure 81 ADVANCED > DDNS N4100 User’s Guide...
  • Page 161 Enter a number in the field to set the force update interval (in days). update every This sets how often the N4100 updates the DDNS server with the ~day(s) when N4100’s WAN IP address when the N4100’s WAN IP address stays the WAN IP same.
  • Page 162 Chapter 18 DDNS N4100 User’s Guide...
  • Page 163: Lan Devices

    To make LAN devices behind the N4100 visible to the outside world, you configure a mapping between a virtual port on the N4100 and a server port on a LAN device. A virtual port is a port on the N4100 that appears as a physical port to the attached devices.
  • Page 164: The Lan Devices Screen

    LAN device has allowed remote management. 19.2 The LAN Devices Screen Click ADVANCED > LAN DEVICES to open this screen. Note: You can configure port mapping for up to 50 LAN devices on the N4100. Figure 82 ADVANCED > LAN DEVICES N4100 User’s Guide...
  • Page 165: Lan Device Management Example

    Click Apply to save your changes back to the N4100. 19.2.1 LAN Device Management Example In this example, there is a manageable switch and a mail server behind the N4100 and you want to be able to remotely access the web-based management interfaces on the manageable switch and RADIUS server over the Internet.
  • Page 166 Chapter 19 LAN Devices You map virtual port 60001 on the N4100 to the web server port on the RADIUS server and 60002 to the web server port on the manageable switch. Figure 84 ADVANCED > LAN DEVICES: Example To access the web-based management interface, enter the WAN IP address of your N4100 and the virtual port number of the LAN device separated by a colon.
  • Page 167: Syslog

    N4100 is to send logs. • Use the Log Settings screen (Section 20.3 on page 170) to configure which logs the N4100 is to send and the schedule for when the N4100 is to send the logs. N4100 User’s Guide...
  • Page 168: The Syslog Screen

    Select Disable to de-activate the syslog function. Syslog Server Select this check box to specify a syslog server on the LAN. on LAN Server IP Enter the IP address (in dotted decimal notation) of the syslog server on Address the LAN. N4100 User’s Guide...
  • Page 169 Email Address 1/Email Address 2. Email To Email Enter your first and second e-mail addresses to which the N4100 is to Address send the syslog e-mails. If you leave these fields blank, logs will not be sent via e-mail.
  • Page 170: The Log Settings Screen

    Chapter 20 Syslog 20.3 The Log Settings Screen Click ADVANCED > SYSLOG > Log Settings to open this screen. Figure 86 ADVANCED > SYSLOG > Log Settings N4100 User’s Guide...
  • Page 171 Description This field displays a short description about the syslog. Interval Time This field displays how often the N4100 sends the syslog. If available, enter the number of minutes the N4100 waits between sending the syslog. Apply Click Apply to save your changes back to the N4100.
  • Page 172 Username will be “********”, and S/N will be “******”. Usage time: 00:59:59 (example) User Agreement (Id, Mac Address) (User Agreement, Type, User When "user IP, User MAC) agreement" is enabled. Where: Type: Agree | Do not agree N4100 User’s Guide...
  • Page 173 <Number of devices, Start Number, End number> specified (between Device name <status> [additional information] 1 and 10080 minutes). LAN Devices Id <MAC Address> LAN Device Alarm <Device When the N4100 Alarm name, FAIL> cannot connect to an attached LAN device. Table 40 Subscriber Trace Relationship...
  • Page 174 Chapter 20 Syslog Table 40 Subscriber Trace Relationship TYPE EVENT TIME LEFT Super Idle-Timeout ****** Super Deleted ****** N4100 User’s Guide...
  • Page 175: Session Trace

    Session Trace 21.1 Overview You can set the N4100 to send session information of subscribers accessing the Internet. The N4100 records the session information and stores it temporary. Once the session trace information reaches 50 records or the specified time period is reached, the N4100 sends the session information to the specified TFTP server, e-mail address and/or syslog server.
  • Page 176: The Session Trace Screen

    Chapter 21 Session Trace 21.2 The Session Trace Screen Click ADVANCED > SESSION TRACE to open this screen. Figure 87 ADVANCED > SESSION TRACE N4100 User’s Guide...
  • Page 177 Send to TFTP Server Enable Select the check box to have the N4100 send the session trace log file to the TFTP server that you specify. Primary Enter the IP address of the first TFTP server in dotted decimal notation.
  • Page 178: Session Trace Filename Convention

    Send to Syslog Server Enable Select the check box to have the N4100 send the session trace log file to the syslog server that you specify in the Syslog screen. Apply Click Apply to save your changes back to the N4100.
  • Page 179 Table 42 Session Trace File Fields LABEL DESCRIPTION SourcePort This is the source port number of the subscriber. DestIP This is the destination IP address the subscriber accesses. DestPort This is the destination port number for this session. N4100 User’s Guide...
  • Page 180 Chapter 21 Session Trace N4100 User’s Guide...
  • Page 181: Secure Remote

    H A P T E R Secure Remote 22.1 Overview This chapter shows you how to configure settings to use the N4100’s VPN PPTP client for a secure connection to a remote site or back end system. 22.1.1 What You Can Do in this Chapter Use the Secure Remote screen (Section 22.2 on page...
  • Page 182 (Always connect) PPTP Server IP Enter the IP address of the PPTP server to which the N4100 will make the address secure connection. Username Enter the user name exactly as it was provided by the ISP or network administrator.
  • Page 183: Snmp

    An agent is a management software module that resides in a managed device (the N4100). An agent translates the local management information from the managed switch into a form compatible with SNMP. The manager is the console through which network administrators perform network management functions. It executes applications that control and monitor managed devices.
  • Page 184: Snmp Traps

    Chapter 23 SNMP 23.1.1 SNMP Traps The N4100 will send traps to the SNMP manager when any one of the following events occurs: Table 45 SNMP Traps TRAP NAME DESCRIPTION sysReboot A trap is sent after booting (power on). 23.1.2 What You Can Do in this Chapter Use the SNMP screen (Section 23.2 on page...
  • Page 185 Select Enable to allow a manager station to manage and monitor the N4100 through the network via SNMP. Otherwise, select Disable. Port SNMP Port Enter the N4100’s port number to which the manager station sends requests. Trap Port Enter the port number on which the manager station listens for SNMP traps and information from the N4100.
  • Page 186 Chapter 23 SNMP N4100 User’s Guide...
  • Page 187: Bandwidth

    Bandwidth 24.1 Overview You can set the N4100 to limit the amount of bandwidth each user can use. This prevents one user from consuming a disproportionately large amount of bandwidth and helps ensure that every user gets their fair share. If there is a lot...
  • Page 188: The Bandwidth Screen

    Kbps that any user can have. Maximum Select the maximum amount of downstream (inbound) bandwidth or Downstream enter a specific amount of bandwidth in Kbps that any user can have. Apply Click this button to save your changes back to the N4100. N4100 User’s Guide...
  • Page 189: Wireless Lan

    25.1.1 What You Can Do in this Chapter Use the Wireless screen (Section 25.4 on page 192) to configure wireless LAN settings on the N4100. 25.2 What You Need to Know Wireless Basics “Wireless” is essentially radio communication. In the same way that walkie-talkie radios send and receive information over the airwaves, wireless networking devices exchange information with one another.
  • Page 190 (often a username and password, or a “key” phrase) can access the network. Second, they encrypt. This means that the information sent over the air is encoded. Only people with the code key can N4100 User’s Guide...
  • Page 191: Before You Begin

    Section 25.2 on page 189 if some of the terms used here do not make sense to you. • What wireless standards do the other wireless devices support (IEEE 802.11g, for example)? What is the most appropriate standard to use? N4100 User’s Guide...
  • Page 192: The Wireless Screen

    If you do not want to configure advanced options, leave them alone. 25.4 The Wireless Screen Note: If you are configuring the N4100 from a computer connected to the wireless LAN and you change the N4100’s SSID or security settings, you will lose your wireless connection when you press Apply to confirm.
  • Page 193 Chapter 25 Wireless LAN Click ADVANCED > WIRELESS to open this screen. Figure 92 ADVANCED > WIRELESS N4100 User’s Guide...
  • Page 194 Select 802.11g only to allow IEEE 802.11g compliant WLAN devices to associate with the N4100. IEEE 802.11b compliant WLAN devices can associate with the N4100 only when they use the short preamble type. Select 802.11n only to only allow IEEE 802.11n compliant WLAN devices to associate with the N4100.
  • Page 195 LABEL DESCRIPTION Channel Width Select whether the N4100 uses a wireless channel width of Auto 20/ 40 MHz or 20 MHz. A standard 20MHz channel offers transfer speeds of up to 150Mbps whereas a 40MHz channel uses two standard channels and offers speeds of up to 300 Mbps.
  • Page 196 Shared Secret Enter a password (up to 31 alphanumeric characters) as the key to be shared between the external authentication server and the N4100. The key is not sent over the network. This key must be the same on the external authentication server and the N4100.
  • Page 197 Select Both to have the N4100 allow association with wireless clients that use Open System mode. Data transfer is encrypted as long as the wireless client has the correct WEP key for encryption. The N4100 authenticates wireless clients using Shared Key mode that have the correct WEP key.
  • Page 198: Technical Reference

    The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point (AP) to interact with the other devices (such as the printer) or with the Internet. Your N4100 is the AP. Every wireless network must follow these basic guidelines.
  • Page 199: Additional Wireless Terms

    Normally, the N4100 acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the N4100 does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess.
  • Page 200: User Authentication

    Usually, you should set up the strongest encryption that every device in the wireless network supports. For example, suppose you have a wireless network with the N4100 and you do not have a RADIUS server. Therefore, there is no N4100 User’s Guide...
  • Page 201 Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every device in the wireless network must have the same key. N4100 User’s Guide...
  • Page 202 Chapter 25 Wireless LAN N4100 User’s Guide...
  • Page 203: Account Generator

    “exclusive printer”). 26.1.1 What You Can Do in this Chapter Use the Account Generator screen (Section 26.2 on page 204) to configure the settings for using the N4100 with one or more account generators (statement printers). N4100 User’s Guide...
  • Page 204: The Account Generator Screen

    Socket port This is the port number that your account generator (statement printer) uses. If you change this, make sure you also change it in the printer, see the printer’s user’s guide for how to do this. N4100 User’s Guide...
  • Page 205 LABEL DESCRIPTION Encryption Turn on the encryption to encode the data that the N4100 sends to the statement printer(s). When you use the encryption, the data is unreadable to anyone that does not know the secret key. This protects against people stealing account information or creating illegitimate accounts.
  • Page 206 Chapter 26 Account Generator N4100 User’s Guide...
  • Page 207: Licensing

    This chapter shows you how to register your N4100 at myZyXEL.com and extend a service with your iCard’s PIN number. At the time of writing, the N4100 can use the concurrent user upgrade service to extend the maximum number of the LAN/ WLAN users that can connect to the N4100 at one time.
  • Page 208 Chapter 27 Licensing Note: If the N4100 is registered already, this screen is read-only. Use the Service screen to upgrade a service and update your service subscription status. Figure 95 ADVANCED > LICENSING > Registration The following table describes the fields in this screen.
  • Page 209: The Service Screen

    Status This field displays Licensed when the N4100 is registered and a service is activated. Registration Type This field displays Standard when the N4100 is registered and a service is activated. Count This field displays the current maximum number of wired and wireless users that may connect to the N4100 at the same time.
  • Page 210 Chapter 27 Licensing N4100 User’s Guide...
  • Page 211: System Status

    • Use the DHCP Client screen (Section 28.6 on page 221) to view current DHCP client information of all network clients using the DHCP server on the N4100. • Use the Session List screen (Section 28.7 on page 222) to display a list of incoming and outgoing packet information.
  • Page 212: The System Screen

    Chapter 28 System Status 28.2 The System Screen Click SYSTEM STATUS > SYSTEM to open this screen. Figure 97 SYSTEM STATUS > SYSTEM N4100 User’s Guide...
  • Page 213 The following table describes the labels in this screen. Table 54 SYSTEM STATUS > SYSTEM LABEL DESCRIPTION Service Internet This field displays the status of the N4100’s connection to the Internet. Connection Wireless This field displays the status of the N4100’s wireless LAN. Service System...
  • Page 214 This field displays the MAC address of the N4100 on the WLAN. Address System Time This field displays the N4100’s current time. System Up This field displays the how long the N4100 has been operating since it Time was last started. LAN IP IP Address This field displays the IP address of the LAN port on the N4100.
  • Page 215 LABEL DESCRIPTION Network Traffic WAN Traffic This field displays traffic statistics for the N4100’s WAN connection. LAN Traffic This field displays traffic statistics for the N4100’s LAN connection. Wireless This field displays traffic statistics for the N4100’s wireless LAN Traffic connection.
  • Page 216: The Account List Screen

    Login Time This field displays when the subscriber logged in to use the account (in yyyy/mm/dd hh/mm/ss format). Click the heading to sort the entries in ascending or descending order based on this column. N4100 User’s Guide...
  • Page 217 Select a page number from the drop-down list box to display the selected page. First Click First to go to the first page. Previous Click Previous to return to the previous page. Next Click Next to go to the next page. Click End to go to the last page. N4100 User’s Guide...
  • Page 218: The Account Log Screen

    Click SYSTEM STATUS > ACCOUNT LOG to open this screen. The log wraps around and deletes the old entries after it fills. Click a column heading to sort the entries if applicable. Figure 99 SYSTEM STATUS > ACCOUNT LOG N4100 User’s Guide...
  • Page 219 LABEL DESCRIPTION Export Click Export to save the log to a computer. Clear Log Click Clear Log to remove all of the log entries from the N4100’s memory and this screen. Refresh Click Refresh to update this screen. Page Select a page number from the drop-down list box to display the selected page.
  • Page 220: The Current User Screen

    Dynamic means the account is created automatically using a statement printer or web configurator. No-Auth means subscriber authentication is disabled on the N4100. The Username and Real Name fields are not available. Super User means the account is a super subscriber system account.
  • Page 221: The Dhcp Client Screen

    Area Network) is unique to your computer (six pairs of hexadecimal characters). A network interface card such as an Ethernet adapter has a hardwired address that is assigned at the factory. This address follows an industry standard that ensures no other adapter has a similar address. N4100 User’s Guide...
  • Page 222: The Session List Screen

    This field displays the port number through which the client computer transmits the traffic. Port Fake This field displays the NAT port to and from which the N4100 maps the session’s traffic. Remote IP This field displays the IP address of a remote device the client computer accesses.
  • Page 223: The Lan Devices Screen

    Idle This field displays how many seconds are left before the session times out if there is no more traffic. The N4100 automatically times out idle TCP sessions after 5 minutes (300 seconds). The N4100 automatically times out idle UDP sessions after 1 minute (60 seconds).
  • Page 224: Accessing A Lan Device

    LAN device management interface. To directly access the LAN device, enter the WAN IP address of your N4100 and the virtual port number of the LAN device separated by a colon. For example, enter “http:// 192.168.1.1:60001”...
  • Page 225: Configuration And Firmware

    29.1.1 Some Warnings The following are some friendly reminders about your device: Do NOT turn off the N4100 while a firmware upload is in progress! Only use firmware for your device’s specific model. 29.1.2 What You Can Do in this Chapter •...
  • Page 226: The Configuration Screen

    Chapter 29 Configuration and Firmware “cfg” filename extension. Once you have customized the N4100's settings, they can be saved back to your computer under a filename of your choosing. The system firmware has a “bin” filename extension. Find this firmware at www.zyxel.com.
  • Page 227 Click SYSTEM TOOLS > CONFIGURATION. A screen displays as shown next. Click Backup. Figure 104 SYSTEM TOOLS > CONFIGURATION: Backup Using HTTP A File Download window displays as shown next. Click Save. Figure 105 Configuration Backup: File Download N4100 User’s Guide...
  • Page 228: Backup Configuration Using Tftp

    Specify the file name and/or location and click Save to start the backup process. 29.2.2 Backup Configuration Using TFTP Use the following procedure to use TFTP to back up the device’s current configuration to a file on a TFTP server. N4100 User’s Guide...
  • Page 229: Restore Configuration Using Http

    29.2.3 Restore Configuration Using HTTP This section shows you how to upload a new or previously saved configuration file from your computer to your N4100. Note: This function erases the current configuration before restoring a previous back up configuration; please do not attempt to restore unless you have a backup configuration file stored on disk.
  • Page 230: Restore Configuration Using Tftp

    Specify the location and filename of a configuration file in the Local PC File Path field or click Browse. Click Apply to start the configuration restore process. The N4100 automatically restarts after the restoration process is complete. 29.2.4 Restore Configuration Using TFTP This section shows you how to upload a new or previously saved configuration file from a TFTP server to your N4100.
  • Page 231 Enter the IP address of the TFTP server in dotted decimal notation in the Remote TFTP Server IP Address field. Specify the file name of the configuration file in the File Name field. Click Apply to start the configuration restore process. The N4100 automatically restarts after the restoration process is complete. N4100 User’s Guide...
  • Page 232: Restore Factory Defaults

    Chapter 29 Configuration and Firmware 29.2.5 Restore Factory Defaults To reset the N4100 back to the factory defaults, click SYSTEM TOOLS > CONFIGURATION to display the screen as shown next. Figure 111 SYSTEM TOOLS > CONFIGURATION: Restore Factory-Defaults The following table describes the labels in this screen.
  • Page 233: Manual Firmware Upgrade Using The Web Configurator

    Chapter 29 Configuration and Firmware With scheduled firmware upgraded, you need to set up a TFTP server where the N4100 can automatically download the latest firmware at the specified time. 29.3.1 Manual Firmware Upgrade Using the Web Configurator Follow the steps below to upload the firmware using the web configurator.
  • Page 234: Manual Firmware Upgrade Via Tftp Server

    After the N4100 finishes restarting, access the web configurator again. Check the firmware version number in the System Quick View screen. Note: When the N4100 restarts, all connections terminate. Subscribers need to log in again. 29.3.2 Manual Firmware Upgrade via TFTP Server Use the following procedure to use TFTP to upload the firmware from a TFTP server to the N4100.
  • Page 235: Manual Boot Code Upgrade Using The Web Configurator

    Do not interrupt the file upload process as this may PERMANENTLY damage the device. Figure 115 System Restart After the N4100 finishes restarting, access the web configurator again. Check the firmware version number in the System Quick View screen. 29.3.3 Manual Boot Code Upgrade Using the Web Configurator Follow the steps below to upload the boot code using the web configurator.
  • Page 236: Scheduled Firmware Upgrade

    After the N4100 finishes restarting, access the web configurator again. Check the Boot ROM version number in the System Quick View screen. Note: When the N4100 restarts, all connections terminate. Subscribers need to log in again. 29.3.4 Scheduled Firmware Upgrade Click SYSTEM TOOLS >...
  • Page 237 Do not interrupt the file upload process as this may PERMANENTLY damage the device. Figure 118 SYSTEM TOOLS > FIRMWARE > Scheduled Firmware Upgrade Note: When the N4100 restarts, all connections terminate. Subscribers need to log in again. The following table describes the labels in this screen.
  • Page 238 Chapter 29 Configuration and Firmware The following figure shows an example of a check file’s content. Figure 119 Synchronization Check File Example N4100 User’s Guide...
  • Page 239: System Account

    H A P T E R System Account 30.1 Overview There are four system accounts that you can use to log in to the N4100: administrator, account operator, supervisor and super subscriber. The administrator account allows you full access to all system configurations. The default administrator user name is “admin”...
  • Page 240: The System Account Screen

    Enter a new administrative account password. Confirm Enter the new administrator password again for confirmation. Web-based Accounting Operator Username Enter the user name for the account manager account. The default is account. Password Enter a new account manager password. N4100 User’s Guide...
  • Page 241 Enter the user name for the super subscriber account. The default is super. Password Enter a new super subscriber account password. Confirm Enter the new super subscriber account password again for confirmation. Apply Click Apply to save your changes back to the N4100. N4100 User’s Guide...
  • Page 242 Chapter 30 System Account N4100 User’s Guide...
  • Page 243: Ssl Certificate

    N4100 and the web browser on a connected computer. With SSL security activated, data (such as user name and password) transferred between the N4100 and the computer is protected when you access the N4100 using a web browser that supports SSL.
  • Page 244 Apply Click Apply to transfer the certificate and private key files from the computer to the N4100. Note: See Chapter 4 on page 63 for how to set the N4100 to use the certificate that you download. N4100 User’s Guide...
  • Page 245: Ping Command

    H A P T E R Ping Command 32.1 Overview This chapter shows how to use the ping function to check the N4100’s network connection. 32.1.1 What You Can Do in this Chapter Use the Ping Command screen (Section 32.2 on page 245) to test the Internet connection.
  • Page 246 Click this button to have the device ping the IP address. Clear Click this button to clear the ping results in the multi-line text box. Ping Result This multi-line text box displays the results of the ping. N4100 User’s Guide...
  • Page 247: Restart

    247) to reboot the N4100. 33.2 The Restart Screen Click SYSTEM TOOLS > RESTART to open the screen shown next. Click Apply to have the N4100 reboot. This does not affect the N4100's configuration. Figure 123 SYSTEM TOOLS > RESTART N4100 User’s Guide...
  • Page 248 Chapter 33 Restart N4100 User’s Guide...
  • Page 249: Troubleshooting

    Make sure you are using the power adaptor or cord included with the N4100. Make sure the power adaptor or cord is connected to the N4100 and plugged in to an appropriate power source. Make sure the power source is turned on.
  • Page 250: N4100 Access And Login

    To do this in most Windows computers, click Start > Run, enter cmd, and then enter ipconfig. The IP address of the Default Gateway might be the IP address of the N4100 (it depends on the network), so enter this IP address in your Internet browser.
  • Page 251: Internet Access

    [Caps Lock] is not on. You cannot log in to the web configurator while someone is using Telnet to access the N4100. Log out of the N4100 in the other session, or ask the person who is logged in to log out.
  • Page 252: Wireless Lan Troubleshooting

    If you are accessing the Internet wirelessly, check the signal strength. If the signal strength is low, try moving your computer closer to the N4100 if possible, and look around to see if there are any devices that might be interfering with the wireless network (for example, microwaves, other wireless networks, and so on).
  • Page 253 Make sure your computer (with a wireless adapter installed) is within the transmission range of the N4100. Check that both the N4100 and your wireless station are using the same wireless and wireless security settings. Check if MAC Filter is configured to deny wireless access to certain MAC addresses to the N4100.
  • Page 254 Chapter 34 Troubleshooting N4100 User’s Guide...
  • Page 255: Product Specifications

    H A P T E R Product Specifications The following tables summarize the N4100’s hardware and firmware features. Firmware Specifications Table 66 Firmware Specifications IP Plug and Play Zero Configuration IP Plug and Play Internet Access (iPnP technology) Networking Functions NAT...
  • Page 256: Hardware Specifications

    4 LAN Ports and One WAN Port 10/100BaseTX with auto MDI/MDI-X Wireless Operation Open Space: 100~300m Range Indoors: 35~100m Wireless Data Rate Up to 300 Mbps for IEEE 802.11n with auto fallback to IEEE 802.11g or IEEE 802.11b Encryption WEP 64/128, WPA, WPA2 N4100 User’s Guide...
  • Page 257 The following list, which is not exhaustive, illustrates the standards supported in the N4100. Table 69 Standards Supported STANDARD DESCRIPTION RFC 1058 RIP-1 (Routing Information Protocol) RFC 1112 IGMP v1 RFC 1305 Network Time Protocol (NTP version 3) N4100 User’s Guide...
  • Page 258 100Ω 2-pair UTP/STP Category 3, 4 or 5 100 Base-TX 100Ω 2-pair UTP/STP Category 5 WAN Port The following figure and table describe the Ethernet cable pin assignments for the WAN port. Figure 124 WAN Port Cable Pin Assignments N4100 User’s Guide...
  • Page 259 Unused Unused Input Transmit Data - Unused Unused Make sure that the Ethernet cable connection between the N4100 and the switch or router conforms to the following pin assignments. Table 72 WAN Port Cable Pin Assignments N4100 ETHERNET DEVICE (SWITCH/HUB/ROUTER ETC.)
  • Page 260 (COMPUTER/ UPLINK PORT) CONSOLE Port The N4100 does not currently use this port. Antenna Connector Type The N4100 is equipped with reverse polarity SMA jacks. Antenna Specifications 2.4 GHz wireless antennas with reverse polarity SMA plugs are included. N4100 User’s Guide...
  • Page 261: Appendix A Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific N4100 may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported.
  • Page 262 Appendix A Setting Up Your Computer’s IP Address Click Start > Control Panel. Figure 126 Windows XP: Start Menu In the Control Panel, click the Network Connections icon. Figure 127 Windows XP: Control Panel N4100 User’s Guide...
  • Page 263 Right-click Local Area Connection and then select Properties. Figure 128 Windows XP: Control Panel > Network Connections > Properties On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 129 Windows XP: Local Area Connection Properties N4100 User’s Guide...
  • Page 264 DNS server and an Alternate DNS server, if that information was provided. Click OK to close the Internet Protocol (TCP/IP) Properties window. Click OK to close the Local Area Connection Properties window. Verifying Settings Click Start > All Programs > Accessories > Command Prompt. N4100 User’s Guide...
  • Page 265: Windows Vista

    Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. Figure 131 Windows Vista: Start Menu In the Control Panel, click the Network and Internet icon. Figure 132 Windows Vista: Control Panel N4100 User’s Guide...
  • Page 266 Figure 134 Windows Vista: Network and Sharing Center Right-click Local Area Connection and then select Properties. Figure 135 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. N4100 User’s Guide...
  • Page 267 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 136 Windows Vista: Local Area Connection Properties N4100 User’s Guide...
  • Page 268 DNS server and an Alternate DNS server, if that information was provided.Click Advanced. Click OK to close the Internet Protocol (TCP/IP) Properties window. 10 Click OK to close the Local Area Connection Properties window. Verifying Settings Click Start > All Programs > Accessories > Command Prompt. N4100 User’s Guide...
  • Page 269 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. Figure 138 Windows 7: Start Menu In the Control Panel, click View network status and tasks under the Network and Internet category. Figure 139 Windows 7: Control Panel N4100 User’s Guide...
  • Page 270 Figure 140 Windows 7: Network And Sharing Center Double click Local Area Connection and then select Properties. Figure 141 Windows 7: Local Area Connection Status Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. N4100 User’s Guide...
  • Page 271 Appendix A Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 142 Windows 7: Local Area Connection Properties N4100 User’s Guide...
  • Page 272 Click OK to close the Internet Protocol (TCP/IP) Properties window. Click OK to close the Local Area Connection Properties window. Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. N4100 User’s Guide...
  • Page 273 Figure 144 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > System Preferences. Figure 145 Mac OS X 10.4: Apple Menu N4100 User’s Guide...
  • Page 274 In the System Preferences window, click the Network icon. Figure 146 Mac OS X 10.4: System Preferences When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 147 Mac OS X 10.4: Network Preferences N4100 User’s Guide...
  • Page 275 Figure 148 Mac OS X 10.4: Network Preferences > TCP/IP Tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. • In the Subnet Mask field, type your subnet mask. N4100 User’s Guide...
  • Page 276 Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 150 Mac OS X 10.4: Network Utility N4100 User’s Guide...
  • Page 277 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. Click Apple > System Preferences. Figure 151 Mac OS X 10.5: Apple Menu In System Preferences, click the Network icon. Figure 152 Mac OS X 10.5: Systems Preferences N4100 User’s Guide...
  • Page 278 From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. N4100 User’s Guide...
  • Page 279 Appendix A Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your N4100. Figure 154 Mac OS X 10.5: Network Preferences > Ethernet Click Apply and close the window. N4100 User’s Guide...
  • Page 280 The following screens use the default Ubuntu 8 installation. Note: Make sure you are logged in as the root administrator. Follow the steps below to configure your computer IP address in GNOME: N4100 User’s Guide...
  • Page 281 When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. Figure 157 Ubuntu 8: Network Settings > Connections N4100 User’s Guide...
  • Page 282 In the Authenticate window, enter your admin account name and password then click the Authenticate button. Figure 158 Ubuntu 8: Administrator Account Authentication In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 159 Ubuntu 8: Network Settings > Connections N4100 User’s Guide...
  • Page 283 • In the Configuration list, select Static IP address if you have a static IP address. Fill in the IP address, Subnet mask, and Gateway address fields. Click OK to save the changes and close the Properties dialog box and return to the Network Settings screen. N4100 User’s Guide...
  • Page 284 Figure 161 Ubuntu 8: Network Settings > DNS Click the Close button to apply the changes. Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices N4100 User’s Guide...
  • Page 285 The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator. Follow the steps below to configure your computer IP address in the KDE: N4100 User’s Guide...
  • Page 286 Click K Menu > Computer > Administrator Settings (YaST). Figure 163 openSUSE 10.3: K Menu > Computer Menu When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 164 openSUSE 10.3: K Menu > Computer Menu N4100 User’s Guide...
  • Page 287 Figure 165 openSUSE 10.3: YaST Control Center When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. Figure 166 openSUSE 10.3: Network Settings N4100 User’s Guide...
  • Page 288 Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields. Click Next to save the changes and close the Network Card Setup window. N4100 User’s Guide...
  • Page 289 Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From the Options sub-menu, select Show Connection Information. Figure 169 openSUSE 10.3: KNetwork Manager N4100 User’s Guide...
  • Page 290 Appendix A Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 170 openSUSE: Connection Status - KNetwork Manager N4100 User’s Guide...
  • Page 291: Appendix B Pop-Up Windows, Javascripts And Java Permissions

    Disable Pop-up Blockers In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 171 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. N4100 User’s Guide...
  • Page 292 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. In Internet Explorer, select Tools, Internet Options and then the Privacy tab. N4100 User’s Guide...
  • Page 293 Select Settings…to open the Pop-up Blocker Settings screen. Figure 173 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. N4100 User’s Guide...
  • Page 294 Figure 174 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. N4100 User’s Guide...
  • Page 295 Figure 175 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default). N4100 User’s Guide...
  • Page 296: Java Permissions

    Figure 176 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM. Under Java permissions make sure that a safety level is selected. N4100 User’s Guide...
  • Page 297 Click OK to close the window. Figure 177 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. N4100 User’s Guide...
  • Page 298 Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in the screen that appears. Figure 179 Mozilla Firefox: Tools > Options N4100 User’s Guide...
  • Page 299 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 180 Mozilla Firefox Content Security N4100 User’s Guide...
  • Page 300 Appendix B Pop-up Windows, JavaScripts and Java Permissions N4100 User’s Guide...
  • Page 301: Appendix C Ip Addresses And Subnetting

    192.168.1.1). Each of these four parts is known as an octet. An octet is an eight-digit binary number (for example 11000000, which is 192 in decimal notation). Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in decimal. N4100 User’s Guide...
  • Page 302: Subnet Masks

    Table 75 IP Address Network Number and Host ID Example OCTET: OCTET: OCTET: OCTET (192) (168) IP Address (Binary) 11000000 10101000 00000001 00000010 Subnet Mask (Binary) 11111111 11111111 11111111 00000000 Network Number 11000000 10101000 00000001 Host ID 00000010 N4100 User’s Guide...
  • Page 303 MAXIMUM NUMBER OF SUBNET MASK HOST ID SIZE HOSTS 8 bits 255.0.0.0 24 bits – 2 16777214 16 bits 255.255.0.0 16 bits – 2 65534 24 bits 255.255.255.0 8 bits – 2 29 bits 255.255.255.248 3 bits – 2 N4100 User’s Guide...
  • Page 304 In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.1) are the network number, and the remaining octet is the host ID, allowing a maximum of 2 – 2 or 254 possible hosts. N4100 User’s Guide...
  • Page 305 The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets; 192.168.1.0 /25 and 192.168.1.128 /25. The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 183 Subnetting Example: After Subnetting N4100 User’s Guide...
  • Page 306 Table 80 Subnet 2 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE IP Address 192.168.1. IP Address (Binary) 11000000.10101000.00000001. 01000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: Lowest Host ID: 192.168.1.65 192.168.1.64 Broadcast Address: Highest Host ID: 192.168.1.126 192.168.1.127 N4100 User’s Guide...
  • Page 307 Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet. Table 83 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS N4100 User’s Guide...
  • Page 308 255.255.255.248 (/29) 8192 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP N4100 User’s Guide...
  • Page 309 You must also enable Network Address Translation (NAT) on the N4100. Once you have decided on the network number, pick an IP address for your N4100 that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
  • Page 310 Since a router connects different networks, it must have interfaces using different network numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s LAN and WAN addresses must be on different subnets. In the N4100 User’s Guide...
  • Page 311 LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet. This problem can be solved by assigning a different IP address to the computer or the router’s LAN port. Figure 186 Conflicting Computer and Router IP Addresses Example N4100 User’s Guide...
  • Page 312 Appendix C IP Addresses and Subnetting N4100 User’s Guide...
  • Page 313: Appendix D Wireless Lans

    P P E N D I X Wireless LANs Note: Your specific N4100 may not support all of the wireless security types described in this appendix. See the product specifications for more information about which wireless security types are supported.
  • Page 314 This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate neighborhood. N4100 User’s Guide...
  • Page 315 AP is using channel 1, then you need to select a channel between 6 or 11. RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a N4100 User’s Guide...
  • Page 316 RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Note: Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. N4100 User’s Guide...
  • Page 317: Fragmentation Threshold

    Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the N4100 uses long preamble. Note: The wireless devices MUST use the same preamble mode in order to communicate.
  • Page 318 Wi-Fi Protected Access (WPA) Most Secure WPA2 Note: You must enable the same wireless security settings on the N4100 and on all wireless clients that you want to associate with it. IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional...
  • Page 319 Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access-Request message. N4100 User’s Guide...
  • Page 320 Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 N4100 User’s Guide...
  • Page 321: Dynamic Wep Key Exchange

    If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. N4100 User’s Guide...
  • Page 322: Wpa And Wpa2

    Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is less secure than WPA or WPA2. Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when N4100 User’s Guide...
  • Page 323 (CCMP 4-way handshake) and shortens the time required to connect to a network. Other WPA2 authentication features that are different from WPA include key caching and pre- N4100 User’s Guide...
  • Page 324 The RADIUS server then checks the user's identification against its database and grants or denies network access accordingly. A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the RADIUS server and the client. N4100 User’s Guide...
  • Page 325 The AP checks each wireless client's password and allows it to join the network only if the password matches. The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the network, but is derived from the PSK and the SSID. N4100 User’s Guide...
  • Page 326: Security Parameters Summary

    Enable without Dynamic WEP Open Enable with Dynamic WEP Key Enable without Dynamic WEP Disable Shared Enable with Dynamic WEP Key Enable without Dynamic WEP Disable TKIP/AES Enable WPA-PSK TKIP/AES Disable WPA2 TKIP/AES Enable WPA2-PSK TKIP/AES Disable N4100 User’s Guide...
  • Page 327: Antenna Characteristics

    Types of Antennas for WLAN There are two types of antennas used for wireless LAN applications. N4100 User’s Guide...
  • Page 328 For omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. N4100 User’s Guide...
  • Page 329: Appendix E Common Services

    Border Gateway Protocol. BOOTP_CLIENT DHCP Client. BOOTP_SERVER DHCP Server. CU-SEEME 7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. N4100 User’s Guide...
  • Page 330 ICMP echo requests to test whether or not a remote host is reachable. POP3 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). N4100 User’s Guide...
  • Page 331 Access Controller Access Control System). TELNET Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/IP networks. Its primary function is to allow users to log into remote host systems. N4100 User’s Guide...
  • Page 332 Table 90 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION TFTP Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE 7000 Another videoconferencing solution. N4100 User’s Guide...
  • Page 333: Appendix F Open Software Announcements

    Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 334 International Copyright Law and trade secret law, and by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.
  • Page 335 AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF...
  • Page 336 Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.
  • Page 337 Appendix F Open Software Announcements Open-Source Packages for "N4100" 3RD PARTY WEB ADDRESS OF THE SOFTWARE / LICENSE VERSION SOFTWARE TERM 0.94.14 http://www.boa.org Bridge-Utils http://www.linuxfoundation.org/collaborate/ workgroups/networking/bridge Busybox 1.4.2 http://www.busybox.net/ Cgic 2.05 http://www.boutell.com/cgic/ Curl 7.16.2 http://curl.haxx.se/ Dnrd 2.20.3 http://dnrd.sourceforge.net/ Dropbear 0.49 http://matt.ucc.asn.au/dropbear/dropbear.html...
  • Page 338 Appendix F Open Software Announcements N4100 User’s Guide...
  • Page 339: Appendix G Legal Information

    ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice. Your use of the N4100 is subject to the terms and conditions of any related service providers. Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules.
  • Page 340 This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. N4100 User’s Guide...
  • Page 341 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications Go to http://www.zyxel.com. Select your product on the ZyXEL home page to go to that product's page. Select the certification you wish to view from this page. N4100 User’s Guide...
  • Page 342: Zyxel Limited Warranty

    Appendix G Legal Information ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in material or workmanship for a specific period (the Warranty Period) from the date of purchase. The Warranty Period varies by region. Check with your vendor and/or the authorized ZyXEL local distributor for details about the Warranty Period of this product.
  • Page 343: Index

    214, 315 interference article text color charge authorization code charge by levels Authorize.net 103, 106 merchant ID code 123, 205 merchant transaction key comments payment gateway conditions 106, 115 configuration 72, 82 configuration file backup 226, 228 N4100 User’s Guide...
  • Page 344 34, 72, 82, 214 fragmentation threshold 197, 317 DNS server 75, 86 domain name 34, 65, 213 domain name system see DNS Dynamic DNS dynamic WEP key exchange gateway IP address DYNDNS wildcard Generic Interface Specification N4100 User’s Guide...
  • Page 345 SNMP MIB (Management Information Base) multicast pass through keep alive 75, 76 My IP Address My Subnet Mask myZyXEL.com IP address 34, 74, 214 MAC address 34, 214 subnet mask 34, 74 66, 77, 309 LAN device N4100 User’s Guide...
  • Page 346 315, 316 RTS threshold PPTP 72, 75, 79 encapsulation 72, 79 PPTP password PPTP server IP address PPTP user name preamble mode safety warnings preamble type scheduled firmware upgrade pre-paid secret key pre-paid billing secure administrator IP addresses N4100 User’s Guide...
  • Page 347 IP address 34, 75, 214 system information MAC address 34, 74, 214 system login accounts port mode account manager status administrator subnet mask 34, 75, 214 type system manager activity information N4100 User’s Guide...
  • Page 348 WPA-PSK wireless client supplicant with RADIUS application example WPA encryption WPA2 214, 322 user authentication vs WPA2-PSK wireless client supplicant with RADIUS application example WPA2-Pre-Shared Key WPA2-PSK 322, 323 application example N4100 User’s Guide...

Table of Contents