ZyXEL Communications NBG-5715 User Manual

ZyXEL Communications NBG-5715 User Manual

32” class 31.5” diagonal
Hide thumbs Also See for NBG-5715:
Table of Contents

Advertisement

Quick Links

NBG5715
Simultaneous Dual-Band Wireless N Media Router
Default Login Details
IP Address
http://192.168.1.1
Password
Firmware Version 1.0
Edition 1, 3/2011
www.zyxel.com
www.zyxel.com
1234
Copyright © 2011
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications NBG-5715

  • Page 1 NBG5715 Simultaneous Dual-Band Wireless N Media Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 1, 3/2011 www.zyxel.com www.zyxel.com Copyright © 2011 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    You should have at least a basic knowledge of TCP/IP networking concepts and topology. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http:// www.adobe.com.
  • Page 4 Customer Support Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.
  • Page 5: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 6 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG5715 icon is not an exact representation of your device. NBG5715 Computer Notebook computer Server DSLAM Firewall Telephone Switch Router Modem NBG5715 User’s Guide...
  • Page 7: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 8 Safety Warnings NBG5715 User’s Guide...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 19 Introduction ..........................21 The WPS Button ........................25 ZyXEL NetUSB Share Center Utility ..................26 Introducing the Web Configurator ....................33 Monitor and Summary ........................37 NBG5715 Modes ........................43 Easy Mode ..........................44 Router Mode ..........................55 Tutorials .............................61 Technical Reference ......................
  • Page 10 Contents Overview NBG5715 User’s Guide...
  • Page 11: Table Of Contents

    ZyXEL NetUSB Share Center Utility..................26 3.1 Overview ..........................26 3.1.1 Quick Setup ........................26 3.1.2 Installing ZyXEL NetUSB Share Center Utility ............26 3.2 The ZyXEL NetUSB Share Center Utility ................27 3.2.1 The Menus ........................28 3.2.2 The Share Center Configuration Window ..............29 3.2.3 The Auto-Connect Printer List Window ..............29...
  • Page 12 Table of Contents 4.2 Accessing the Web Configurator ..................33 4.2.1 Login Screen ......................33 4.2.2 Weather Edit .......................34 4.2.3 Time/Date Edit ......................35 4.3 Resetting the NBG5715 .......................35 4.3.1 How to Use the RESET Button ...................35 Chapter 5 Monitor and Summary......................37 5.1 Overview ..........................37 5.2 What You Can Do in this Chapter ..................37 5.3 The Log Screen ........................38...
  • Page 13 Table of Contents 8.2.1 Navigation Panel ......................58 Chapter 9 Tutorials ........................... 61 9.1 Overview ..........................61 9.2 Set Up a Wireless Network with WPS ..................61 9.2.1 Push Button Configuration (PBC) ................61 9.2.2 PIN Configuration .......................63 9.3 Configure Wireless Security without WPS ................64 9.3.1 Configure Your Notebook ...................65 Part II: Technical Reference..............69 Chapter 10...
  • Page 14 Table of Contents 11.9 The Scheduling Screen ......................93 Chapter 12 LAN ............................95 12.1 Overview ..........................95 12.2 What You Can Do in this Chapter ..................95 12.3 What You Need To Know ....................96 12.3.1 IP Pool Setup ......................96 12.3.2 LAN TCP/IP ......................96 12.4 The LAN IP Screen ......................97 12.5 The IP Alias Screen ......................97 Chapter 13...
  • Page 15 Table of Contents Chapter 16 Static Route ........................... 115 16.1 Overview ........................115 16.2 The Static Route Screen ....................115 16.2.1 Add/Edit Static Route ..................... 116 Chapter 17 Firewall ..........................119 17.1 Overview ........................119 17.1.1 What You Can Do in this Chapter ................119 17.1.2 What You Need To Know ..................
  • Page 16 Table of Contents 19.4 General Screen .......................148 19.5 Advance Screen ......................148 19.5.1 Rule Configuration: User Defined Service Rule Configuration ......151 Chapter 20 Remote Management......................152 20.1 Overview ..........................152 20.2 What You Can Do in this Chapter ..................152 20.3 What You Need to Know ....................152 20.3.1 Remote Management and NAT ................152 20.3.2 System Timeout .....................153 20.4 WWW Screen...
  • Page 17 Table of Contents 23.6 Wireless Router Troubleshooting ..................175 23.7 USB Device Problems ......................176 23.8 ZyXEL NetUSB Share Center Utility Problems ..............177 Appendix A Product Specifications ..................179 23.9 Wall-mounting Instructions ....................181 Appendix B Pop-up Windows, JavaScript and Java Permissions ........183 Appendix C IP Addresses and Subnetting................
  • Page 18 Table of Contents NBG5715 User’s Guide...
  • Page 19: User's Guide

    User’s Guide...
  • Page 21: Introduction

    H A P T E R Introduction 1.1 Overview This chapter introduces the main features and applications of the NBG5715. The NBG5715 extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11a/b/ g/n compatible devices.
  • Page 22: Applications

    (such as USB printers). Other USB products are not guaranteed to function properly with the NBG5715. Note: Be sure to install the ZyXEL NetUSB Share Center Utility (for NetUSB functionality) from the included disc, or download the latest version from the zyxel.com website.
  • Page 23: Leds

    Chapter 1 Introduction • Back up the configuration (and make sure you know how to restore it). Restoring an earlier working configuration may be useful if the device becomes unstable or even crashes. If you forget your password, you will have to reset the NBG5715 to its factory default settings. If you backed up an earlier configuration file, you would not have to totally re-configure the NBG5715.
  • Page 24 Chapter 1 Introduction Figure 3 Front Panel Power Internet WLAN 2.4G WLAN 5G Button USB 1-2 LAN 1-4 The following table describes the LEDs and the WPS button. Table 1 Front panel LEDs and WPS button STATUS DESCRIPTION WPS Button Press this button for 1 second to set up a wireless connection via WiFi Protected Setup with another WPS-enabled client.
  • Page 25: The Wps Button

    H A P T E R The WPS Button 2.1 Overview Your NBG5715 supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
  • Page 26: Zyxel Netusb Share Center Utility

    Note: If you are connecting multiple devices to the NBG5715, first connect a USB hub to the NBG5715 then connect your other USB devices to it. Run the ZyXEL NetUSB Share Center Utility to display a list of all connected USB devices, then use it to connect your computer to them.
  • Page 27: The Zyxel Netusb Share Center Utility

    Note: The following operating systems are supported: Windows XP/Vista/7 (32 and 64-bit versions). To open the ZyXEL NetUSB Share Center Utility, double-click its system tray icon. 3.2 The ZyXEL NetUSB Share Center Utility This section describes the ZyXEL NetUSB Share Center Utility main window.
  • Page 28: The Menus

    Chapter 3 ZyXEL NetUSB Share Center Utility Table 2 ZyXEL NetUSB Share Center Utility Main Window Icons (continued) ICON DESCRIPTION Request to Connect Some USB devices may not allow automatic connections over the network. If so, select the device in question and click this button to issue a request to connect to it.
  • Page 29: The Share Center Configuration Window

    Select this to run the utility automatically when you log into or start up Windows. Language Select a language for the ZyXEL NetUSB Share Center Utility. You must restart the utility for the change to take effect. Click this to save your changes and close the window.
  • Page 30: Manually Connecting To Usb Devices

    This example shows you how to connect to a USB device over your NBG5715 network. Makes sure that you have first installed the ZyXEL NetUSB Share Center Utility on the computer to which you want to connect the USB devices.
  • Page 31: Automatically Connecting To A Usb Printer

    ZyXEL NetUSB Share Center Utility. Connect a USB printer to the NBG5715. Open the ZyXEL NetUSB Sharing Center Utility on the computer that you want to use to connect to the printer. Click the Connect button. You may be prompted to install a printer driver or to configure other settings.
  • Page 32 Chapter 3 ZyXEL NetUSB Share Center Utility NBG5715 User’s Guide...
  • Page 33: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator 4.1 Overview This chapter describes how to access the NBG5715 Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG5715 via Internet browser.
  • Page 34: Weather Edit

    Chapter 4 Introducing the Web Configurator The Web Configurator initially displays the following login screen. Figure 9 Login screen The following table describes the labels in this screen. Table 6 Login screen LABEL DESCRIPTION Language Select the language you want to use to configure the Web Configurator. Click Login.
  • Page 35: Time/Date Edit

    Chapter 4 Introducing the Web Configurator The following table describes the labels in this screen. Table 7 Change Weather LABEL DESCRIPTION C or Choose which temperature unit you want the NBG5715 to display. Change Location Select the location for which you want to know the weather. If the city you want is not listed, choose one that is closest to it.
  • Page 36 Chapter 4 Introducing the Web Configurator NBG5715 User’s Guide...
  • Page 37: Monitor And Summary

    H A P T E R Monitor and Summary 5.1 Overview This chapter discusses read-only information related to the device state of the NBG5715. To access the Monitor screens, go to Expert Mode after login, then click You can also click the Details links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/received as well as the status of clients connected to the NBG5715.
  • Page 38: The Log Screen

    Chapter 5 Monitor and Summary 5.3 The Log Screen The Web Configurator allows you to look at all of the NBG5715’s logs in one location. 5.3.1 View Log Use the View Log screen to see the logged messages for the NBG5715. The log wraps around and deletes the old entries after it fills.
  • Page 39 Chapter 5 Monitor and Summary information (including MAC Address, IP Address, and Expiration time) of all network clients using the NBG5715’s DHCP server. Figure 14 Summary: DHCP Table The following table describes the labels in this screen. Table 9 Summary: DHCP Table LABEL DESCRIPTION This is the index number of the host computer.
  • Page 40: Packet Statistics

    Chapter 5 Monitor and Summary 5.5 Packet Statistics Click Monitor > Packet Statistics or the Packet Statistics (Details...) hyperlink in the Status screen. Read-only information here includes port status, packet specific statistics and the "system up time". The Poll Interval(s) field is configurable and is used for refreshing the screen. Figure 15 Summary: Packet Statistics The following table describes the labels in this screen.
  • Page 41: Vpn Monitor

    Chapter 5 Monitor and Summary 5.6 VPN Monitor Click Monitor > VPN Monitor or the VPN Monitor (Details...) hyperlink in the Status screen. This screen displays read-only information about the active VPN connections. Click the Refresh button to update the screen. A Security Association (SA) is the group of security settings related to a specific VPN tunnel.
  • Page 42 Chapter 5 Monitor and Summary The following table describes the labels in this screen. Table 12 Summary: Wireless Association List LABEL DESCRIPTION This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station. Association Time This field displays the time a wireless station first associated with the NBG5715’s WLAN network.
  • Page 43: Nbg5715 Modes

    H A P T E R NBG5715 Modes 6.1 Overview This chapter introduces the different modes available on your NBG5715. First, the term “mode” refers to two things in this User’s Guide. • Web Configurator mode. This refers to the Web Configurator interface you want to use for editing NBG5715 features.
  • Page 44: Easy Mode

    H A P T E R Easy Mode 7.1 Overview The Web Configurator is set to Easy Mode by default. You can configure several key features of the NBG5715 in this mode. This mode is useful to users who are not fully familiar with some features that are usually intended for network administrators.
  • Page 45: What You Can Do In This Chapter

    Chapter 7 Easy Mode Click Status to open the following screen. Figure 19 Easy Mode: Status Screen Navigation Panel Go to Network Screen Status Screen Control Panel 7.2 What You Can Do in this Chapter You can do the following in this mode: •...
  • Page 46: Network Map

    Chapter 7 Easy Mode The following table describes the labels in this screen. Table 13 Control Panel ITEM DESCRIPTION Home Click this to go to the Login page. Expert Mode Click this to change to Expert mode and customize features of the NBG5715.
  • Page 47: Control Panel

    Chapter 7 Easy Mode 7.5 Control Panel The features configurable in Easy Mode are shown in the Control Panel. Figure 22 Control Panel Switch ON to enable the feature. Otherwise, switch OFF. If the feature is turned on, the green light flashes.
  • Page 48: Game Engine

    Chapter 7 Easy Mode 7.5.1 Game Engine the NBG5715 maximizes the bandwidth for gaming traffic that When this feature is enabled, it forwards out through an interface. Figure 23 Game Engine Note: When this is switched on, the Game Console tab in the screen is Bandwidth Mgmt automatically positioned on top.
  • Page 49: Content Filter

    Chapter 7 Easy Mode The following table describes the labels in this screen. Table 15 Power Saving LABEL DESCRIPTION Wireless Radio Choose whether you want to apply the power saving schedule to 2.4G hz or 5G hz wireless radio. WLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off (depending on what you selected in the WLAN Status field).
  • Page 50: Bandwidth Mgmt

    Chapter 7 Easy Mode The following table describes the labels in this screen. Table 16 Content Filter LABEL DESCRIPTION Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed. Note: The NBG5715 does not recognize wildcard characters as keywords.
  • Page 51: Firewall

    Chapter 7 Easy Mode 7.5.5 Firewall Enable this feature to protect the network from Denial of Service (DoS) attacks. The NBG5715 blocks repetitive pings from the WAN that can otherwise cause systems to slow down or hang. Figure 27 Firewall Click OK to close this screen.
  • Page 52: Wps

    Chapter 7 Easy Mode Table 17 Wireless Security (continued) LABEL DESCRIPTION Security mode Select WPA-PSK or WPA2-PSK to add security on this wireless network. The wireless clients which want to associate to this network must have same wireless security settings as this device. After you select to use a security, additional options appears in this screen.
  • Page 53: Status Screen In Easy Mode

    Chapter 7 Easy Mode The following table describes the labels in this screen. Table 18 Wireless Security: WPS LABEL DESCRIPTION Wireless Security Click this to go back to the Wireless Security screen. Create a secure wireless network simply by pressing a button. The NBG5715 scans for a WPS-enabled device within the range and performs wireless security information synchronization.
  • Page 54 Chapter 7 Easy Mode Table 19 Status Screen in Easy Mode (continued) ITEM DESCRIPTION Firmware Version This shows the firmware version of the NBG5715. The firmware version format shows the trunk version, model code and release number. Wireless_2.4G/5G This shows the SSID of the wireless network. You can configure this in the Network Name (SSID) Wireless Security screen (Section 7.5.6 on page...
  • Page 55: Router Mode

    H A P T E R Router Mode 8.1 Overview The NBG5715 operates as a router. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the NBG5715 connects the local network (LAN1 ~ LAN4) to the Internet.
  • Page 56: Router Mode Status Screen

    Chapter 8 Router Mode 8.2 Router Mode Status Screen Click to open the status screen. Figure 32 Status: Router Mode The following table describes the icons shown in the Status screen. Table 20 Status: Router Mode ICON DESCRIPTION Click this icon to logout of the web configurator. Click this icon to view copyright and a link for related product information.
  • Page 57 Chapter 8 Router Mode Table 20 Status: Router Mode (continued) ICON DESCRIPTION Click this icon to see the Configuration navigation menu. Click this icon to see the Maintenance navigation menu. The following table describes the labels shown in the Status screen. Table 21 Status Screen: Router Mode LABEL DESCRIPTION...
  • Page 58: Navigation Panel

    Chapter 8 Router Mode Table 21 Status Screen: Router Mode (continued) LABEL DESCRIPTION - Memory Usage This shows what percentage of the heap memory the NBG5715 is using. Interface Status Interface This displays the NBG5715 port types. The port types are: WAN, LAN and WLAN. Status For the LAN and WAN ports, this field displays Down (line is down) or Up (line is up or connected).
  • Page 59 Chapter 8 Router Mode The following table describes the sub-menus. Table 22 Navigation Panel: Router Mode LINK FUNCTION Status This screen shows the NBG5715’s general device, system and interface status information. Use this screen to access the wizard, and summary statistics tables. MONITOR Use this screen to view the list of activities recorded by your NBG5715.
  • Page 60 Chapter 8 Router Mode Table 22 Navigation Panel: Router Mode (continued) LINK FUNCTION DHCP Server General Use this screen to enable the NBG5715’s DHCP server. Advanced Use this screen to assign IP addresses to specific individual computers based on their MAC addresses and to have DNS servers assigned by the DHCP server.
  • Page 61: Tutorials

    H A P T E R Tutorials 9.1 Overview This chapter provides tutorials for setting up your NBG5715. • Set Up a Wireless Network with WPS • Configure Wireless Security without WPS 9.2 Set Up a Wireless Network with WPS This section gives you an example of how to set up wireless network using WPS.
  • Page 62 Chapter 9 Tutorials Log into NBG5715’s Web Configurator and press the Push Button in the Configuration > Network > Wireless LAN 2.4G > WPS Station screen. Note: Your NBG5715 has a WPS button located on its front panel, as well as a WPS button in its configuration utility.
  • Page 63: Pin Configuration

    Chapter 9 Tutorials 9.2.2 PIN Configuration When you use the PIN configuration method, you need to use both NBG5715’s configuration interface and the client’s utilities. Launch your wireless client’s configuration utility. Go to the WPS settings and select the PIN method to get a PIN number.
  • Page 64: Configure Wireless Security Without Wps

    Chapter 9 Tutorials 9.3 Configure Wireless Security without WPS This example shows you how to configure wireless security settings with the following parameters on your NBG5715. Wireless LAN Mode 2.4G SSID SSID_Example3 Channel Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your NBG5715. The instructions require that your hardware is connected (see the Quick Start Guide) and you are logged into the Web Configurator through your LAN connection (see Section 4.2 on page...
  • Page 65: Configure Your Notebook

    Device Information and check if the WLAN 2.4G connection is up under Interface Status. 9.3.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models.
  • Page 66 Chapter 9 Tutorials Select SSID_Example3 and click Connect. Select WPA-PSK and type the security key in the following screen. Click Next. The Confirm Save window appears. Check your settings and click Save to continue. NBG5715 User’s Guide...
  • Page 67 Troubleshooting section of this User’s Guide. If your connection is successful, open your Internet browser and enter http://www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured.
  • Page 68 Chapter 9 Tutorials NBG5715 User’s Guide...
  • Page 69: Technical Reference

    Technical Reference...
  • Page 71: Wan

    H A P T E R 10.1 Overview This chapter discusses the NBG5715’s WAN screens. Use these screens to configure your NBG5715 for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet.
  • Page 72: Configuring Your Internet Connection

    Use Domain Name System (DNS) to map a domain name to its corresponding IP address and vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access The NBG5715 can get the DNS server addresses in the following ways.
  • Page 73: Multicast

    Chapter 10 WAN 10.3.2 Multicast Traditionally, IP packets are transmitted in one of either two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1.
  • Page 74 Chapter 10 WAN This screen displays when you select ENET ENCAP (Ethernet encapsulation). Figure 38 Network > WAN > Broadband: ENET ENCAP The following table describes the labels in this screen. Table 23 Network > WAN > Broadband: ENET ENCAP LABEL DESCRIPTION ISP Parameters for Internet Access...
  • Page 75: Pppoe Encapsulation

    Chapter 10 WAN Table 23 Network > WAN > Broadband: ENET ENCAP (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG5715. Cancel Click Cancel to begin configuring this screen afresh. 10.4.2 PPPoE Encapsulation The NBG5715 supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection.
  • Page 76 Chapter 10 WAN The following table describes the labels in this screen. Table 24 Network > WAN > Broadband: PPPoE LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Select PPPoE if you connect to your Internet via dial-up. PPP Information PPP Username Type the user name given to you by your ISP.
  • Page 77: The Advanced Screen

    Chapter 10 WAN 10.5 The Advanced Screen To change your NBG5715’s advanced WAN settings, click Network > WAN > Advanced. The screen appears as shown. You can use this screen to enable multicast. Figure 40 Network > WAN > Advanced Table 25 Network >...
  • Page 78 Chapter 10 WAN NBG5715 User’s Guide...
  • Page 79: Wireless Lan

    H A P T E R Wireless LAN 11.1 Overview This chapter discusses how to configure the wireless network settings in your NBG5715. The NBG5715 is able to function both 2.4G and 5G network at the same time. You can have different wireless settings for 2.4G and 5G.
  • Page 80: What You Should Know

    Chapter 11 Wireless LAN • Use the Advanced screen to allow intra-BSS networking and set the RTS/CTS Threshold (Section 11.5 on page 90). • Use the QoS screen to ensure Quality of Service (QoS) in your wireless network (Section 11.6 on page 90).
  • Page 81 Chapter 11 Wireless LAN You can use the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network. If a wireless client is allowed to use the wireless network, it still has to have the correct settings (SSID, channel, and security).
  • Page 82: The General Wireless Lan Screen

    Chapter 11 Wireless LAN Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. For example, suppose the AP does not have a local user database, and you do not have a RADIUS server. Therefore, there is no user authentication. Suppose the wireless network has two wireless clients.
  • Page 83 Chapter 11 Wireless LAN Click Network > Wireless LAN 2.4G/5G to open the General screen. Figure 42 Network > Wireless LAN 2.4G/5G > General The following table describes the general wireless LAN labels in this screen. Table 27 Network > Wireless LAN 2.4G/5G > General LABEL DESCRIPTION Wireless LAN...
  • Page 84: Wireless Security Modes

    Chapter 11 Wireless LAN Table 27 Network > Wireless LAN 2.4G/5G > General (continued) LABEL DESCRIPTION Wireless Mode If you are in the Wireless LAN 2.4G > General screen, you can select from the following: • 802.11b: allows either IEEE 802.11b or IEEE 802.11g compliant WLAN devices to associate with the NBG5715.
  • Page 85: Wep Encryption

    Chapter 11 Wireless LAN Note: If you do not enable any wireless security on your NBG5715, your network is accessible to any wireless networking device that is within range. Figure 43 Network > Wireless LAN 2.4G/5G > Security: No Security The following table describes the labels in this screen.
  • Page 86: Wpa-Psk/Wpa2-Psk

    Chapter 11 Wireless LAN The following table describes the wireless LAN security labels in this screen. Table 29 Network > Wireless LAN 2.4G/5G > Security: Static WEP LABEL DESCRIPTION Security Mode Select Static WEP to enable data encryption. PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate. A passphrase functions like a password.
  • Page 87: Wpa/Wpa2

    Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 30 Network > Wireless LAN > Security: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Security Mode Select WPA-PSK or WPA2-PSK to enable data encryption. WPA Compatible This field appears when you choose WPA2-PSK as the Security Mode. Check this field to allow wireless devices using WPA-PSK security mode to connect to your NBG5715.
  • Page 88: The Mac Filter Screen

    Chapter 11 Wireless LAN Table 31 Network > Wireless LAN > General: WPA/WPA2 (continued) LABEL DESCRIPTION Group Key Update The Group Key Update Timer is the rate at which the AP (if using WPA- Timer PSK/WPA2-PSK key management) or RADIUS server (if using WPA/WPA2 key management) sends a new group key out to all clients.
  • Page 89 Chapter 11 Wireless LAN To change your NBG5715’s MAC filter settings, click Network > Wireless LAN 2.4G/5G > MAC Filter. The screen appears as shown. Figure 47 Network > Wireless LAN 2.4G/5G > MAC Filter The following table describes the labels in this menu. Table 32 Network >...
  • Page 90: The Wireless Lan Advanced Screen

    Chapter 11 Wireless LAN 11.5 The Wireless LAN Advanced Screen Use this screen to allow wireless advanced features, such as the output power, RTS/CTS Threshold and high-throughput physical mode settings. Click Network > Wireless LAN 2.4G/5G > Advanced. The screen appears as shown. Figure 48 Network >...
  • Page 91: The Wps Screen

    Chapter 11 Wireless LAN Click Network > Wireless LAN 2.4G/5G > QoS. The following screen appears. Figure 49 Network > Wireless LAN 2.4G/5G > QoS The following table describes the labels in this screen. Table 34 Network > Wireless LAN 2.4G/5G > QoS LABEL DESCRIPTION Enable WMM QoS...
  • Page 92: The Wps Station Screen

    Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 35 Network > Wireless LAN 2.4G/5G > WPS LABEL DESCRIPTION WPS Setup Select Enable to activate the WPS feature. Select Disable to turn it off. PIN Number This displays a PIN number last time system generated.
  • Page 93: The Scheduling Screen

    Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 36 Network > Wireless LAN 2.4G/5G > WPS Station LABEL DESCRIPTION Push Button Use this button when you use the PBC (Push Button Configuration) method to configure wireless stations’s wireless settings.
  • Page 94 Chapter 11 Wireless LAN Table 37 Network > Wireless LAN 2.4G/5G > Scheduling (continued) LABEL DESCRIPTION Select Everyday or the specific days to turn the Wireless LAN on or off. If you select Everyday you can not select any specific days. This field works in conjunction with the For the following times field.
  • Page 95: Lan

    H A P T E R 12.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 96: What You Need To Know

    Chapter 12 LAN 12.3 What You Need To Know The actual physical connection determines whether the NBG5715 ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next.
  • Page 97: The Lan Ip Screen

    Chapter 12 LAN 12.4 The LAN IP Screen Use this screen to change the IP address for your NBG5715. Click Network > LAN > IP. Figure 55 Network > LAN > IP The following table describes the labels in this screen. Table 38 Network >...
  • Page 98 Chapter 12 LAN The following table describes the labels in this screen. Table 39 Network > LAN > IP Alias LABEL DESCRIPTION IP Alias 1, 2 Select the check box to configure another LAN network for the NBG5715. IP Address Type the IP alias address of your NBG5715 in dotted decimal notation.
  • Page 99: Dhcp Server

    H A P T E R DHCP Server 13.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG5715’s LAN as a DHCP server or disable it.
  • Page 100: The Dhcp Server Advanced Screen

    Chapter 13 DHCP Server The following table describes the labels in this screen. Table 40 Network > DHCP Server > General LABEL DESCRIPTION DHCP Server Select Enable to activate DHCP for LAN. DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients (computers) to obtain TCP/IP configuration at startup from a server.
  • Page 101: The Client List Screen

    Chapter 13 DHCP Server The following table describes the labels in this screen. Table 41 Network > DHCP Server > Advanced LABEL DESCRIPTION Static DHCP Table This is the index number of the static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN.
  • Page 102 Chapter 13 DHCP Server Note: You can also view a read-only client list by clicking the DHCP Table (Details...) hyperlink in the Status screen. Figure 59 Network > DHCP Server > Client List The following table describes the labels in this screen. Table 42 Network >...
  • Page 103: Nat

    H A P T E R 14.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network.
  • Page 104: What You Need To Know

    Chapter 14 NAT • Use the NAT Advance screen to change your NBG5715’s trigger port settings (Section 14.4 on page 109). 14.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. Inside/Outside This denotes where a host is located relative to the NBG5715, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts.
  • Page 105: The Nat General Screen

    Chapter 14 NAT all incoming inquiries, thus preventing intruders from probing your network. For more information on IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT). How NAT Works Each packet has two addresses – a source address and a destination address. For outgoing packets, the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address) is the source address on the WAN.
  • Page 106: The Port Forwarding Screen

    Chapter 14 NAT The following table describes the labels in this screen. Table 44 Network > NAT > General LABEL DESCRIPTION Network Address Network Address Translation (NAT) allows the translation of an Internet protocol Translation (NAT) address used within one network (for example a private IP address used in a local network) to a different IP address known within another network (for example a public IP address used on the Internet).
  • Page 107 Chapter 14 NAT Refer to Appendix F on page 247 for port numbers commonly used for particular services. Figure 63 Network > NAT > Port Forwarding The following table describes the labels in this screen. Table 45 Network > NAT > Port Forwarding LABEL DESCRIPTION Default Server Setup...
  • Page 108: Port Forwarding Edit Screen

    Chapter 14 NAT Table 45 Network > NAT > Port Forwarding (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG5715. Cancel Click Cancel to begin configuring this screen afresh. 14.3.1 Port Forwarding Edit Screen This screen lets you create or edit a port forwarding rule. Click the Add Port Forward button or a rule’s Edit icon in the Port Forwarding screen to open the following screen.
  • Page 109: The Nat Advance Screen

    Chapter 14 NAT 14.4 The NAT Advance Screen To change your NBG5715’s trigger port settings, click Network > NAT > NAT Advance. The screen appears as shown. Note: Only one LAN computer can use a trigger port (range) at a time. Figure 65 Network >...
  • Page 110: Technical Reference

    Chapter 14 NAT 14.5 Technical Reference The following section contains additional technical information about the NBG5715 features described in this chapter. 14.5.1 NATPort Forwarding: Services and Port Numbers A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make accessible to the outside world even though NAT makes your whole inside network appear as a single machine to the outside world.
  • Page 111: Trigger Port Forwarding Example

    Chapter 14 NAT The problem is that port forwarding only forwards a service to a single LAN IP address. In order to use the same service on a different LAN computer, you have to manually replace the LAN computer's IP address in the forwarding port with another LAN computer's IP address. Trigger port forwarding solves this problem by allowing computers on the LAN to dynamically take turns using the service.
  • Page 112 Chapter 14 NAT NBG5715 User’s Guide...
  • Page 113: Dynamic Dns

    H A P T E R Dynamic DNS 15.1 Overview Dynamic DNS services let you use a domain name with a dynamic IP address. 15.1.1 What You Need To Know The following terms and concepts may help as you read through this chapter. What is DDNS? DDNS, or Dynamic DNS, allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CU-SeeMe, etc.).
  • Page 114: The Dynamic Dns Screen

    Chapter 15 Dynamic DNS 15.2 The Dynamic DNS Screen To change your NBG5715’s DDNS, click Network > DDNS. The screen appears as shown. Figure 68 Dynamic DNS The following table describes the labels in this screen. Table 48 Dynamic DNS LABEL DESCRIPTION Dynamic DNS...
  • Page 115: Static Route

    H A P T E R Static Route 16.1 Overview This chapter shows you how to configure static routes for your NBG5715. Each remote node specifies only the network to which the gateway is directly connected, and the NBG5715 has no knowledge of the networks beyond. For instance, the NBG5715 knows about network N2 in the following figure through remote node Router 1.
  • Page 116: Add/Edit Static Route

    Chapter 16 Static Route The following table describes the labels in this screen. Table 49 Network > Static Route LABEL DESCRIPTION Add Static Click this to create a new rule. Route This is the number of an individual static route. Status This field indicates whether the rule is active (yellow bulb) or not (gray bulb).
  • Page 117 Chapter 16 Static Route Table 50 Static Route: Add/Edit LABEL DESCRIPTION Back Click Back to return to the previous screen without saving. Apply Click Apply to save your changes back to the NBG5715. Cancel Click Cancel to set every field in this screen to its last-saved value. NBG5715 User’s Guide...
  • Page 118 Chapter 16 Static Route NBG5715 User’s Guide...
  • Page 119: Firewall

    H A P T E R Firewall 17.1 Overview Use these screens to enable and configure the firewall that protects your NBG5715 and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN.
  • Page 120 Chapter 17 Firewall What is a Firewall? Originally, the term “firewall” referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks.
  • Page 121: The Firewall General Screen

    Chapter 17 Firewall Don't enable any local service (such as NTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network. For local services that are enabled, protect against misuse.
  • Page 122 Chapter 17 Firewall Click Security > Firewall > Services. The screen appears as shown next. Figure 74 Security > Firewall > Services l The following table describes the labels in this screen. Table 52 Security > Firewall > Services LABEL DESCRIPTION LABEL DESCRIPTION...
  • Page 123 Chapter 17 Firewall Table 52 Security > Firewall > Services (continued) LABEL DESCRIPTION Source IP Address Enter the IP address of the computer that initializes traffic for the application or service. The NBG5715 applies the firewall rule to traffic initiating from this computer. Protocol Select the protocol (ALL,TCP, UDP or BOTH) used to transport the packets for which you want to apply the firewall rule.
  • Page 124: Ipsec Vpn

    H A P T E R IPSec VPN 18.1 Overview A virtual private network (VPN) provides secure communications between sites without the expense of leased site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing. It is used to transport traffic over the Internet or any insecure network that uses TCP/IP for communication.
  • Page 125: What You Need To Know

    Chapter 18 IPSec VPN 18.3 What You Need To Know A VPN tunnel is usually established in two phases. Each phase establishes a security association (SA), a contract indicating what security parameters the NBG5715 and the remote IPSec router will use.
  • Page 126: Ipsec Sa (Ike Phase 2) Overview

    Chapter 18 IPSec VPN You can usually provide a static IP address or a domain name for the remote IPSec router as well. Sometimes, you might not know the IP address of the remote IPSec router (for example, telecommuters). In this case, you can still set up the IKE SA, but only the remote IPSec router can initiate an IKE SA.
  • Page 127 Chapter 18 IPSec VPN Click Security > IPSec VPN to display the Summary screen. This is a read-only menu of your VPN rules (tunnels). Edit a VPN rule by clicking the Edit icon. Figure 78 Security > IPSec VPN > General The following table describes the fields in this screen.
  • Page 128: Edit Vpn Rule

    Chapter 18 IPSec VPN 18.5 Edit VPN Rule Click on a policy’s Edit icon in the IPSec VPN > General screen to edit the VPN policy. Note: The NBG5715 uses the system default gateway interface¡¦s WAN IP address as its WAN IP address to set up a VPN tunnel.
  • Page 129: Ikekey Setup

    Chapter 18 IPSec VPN 18.5.1 IKEKey Setup IKEprovides more protection so it is generally recommended. You only configure VPN manual key when you select IKE in the IPSec Keying Mode field on the IPSec VPN > General > Edit screen. Figure 79 Security >...
  • Page 130 Chapter 18 IPSec VPN The following table describes the labels in this screen. Table 54 Security > IPSec VPN > General > Edit: IKE LABEL DESCRIPTION Property Propert Select Enable to activate this VPN policy. Keep Alive Select this check box to have the NBG5715 automatically reinitiate the SA after the SA lifetime times out, even if there is no traffic.
  • Page 131 Chapter 18 IPSec VPN Table 54 Security > IPSec VPN > General > Edit: IKE (continued) LABEL DESCRIPTION Remote Policy Remote IP addresses must be static and correspond to the remote IPSec The remote fields do not apply when router's configured local IP addresses. the Secure Gateway IP Address field is configured to 0.0.0.0.
  • Page 132 Chapter 18 IPSec VPN Table 54 Security > IPSec VPN > General > Edit: IKE (continued) LABEL DESCRIPTION Local Content When you select IP in the Local ID Type field, type the IP address of your computer in the Local Content field. The NBG5715 automatically uses the IP address in the My IP Address field (refer to the My IP Address field description) if you configure the Local Content field to 0.0.0.0 or leave it blank.
  • Page 133 Chapter 18 IPSec VPN Table 54 Security > IPSec VPN > General > Edit: IKE (continued) LABEL DESCRIPTION Peer Content The configuration of the peer content depends on the peer ID type. For IP, type the IP address of the computer with which you will make the VPN connection.
  • Page 134: Manual Key Setup

    Chapter 18 IPSec VPN Table 54 Security > IPSec VPN > General > Edit: IKE (continued) LABEL DESCRIPTION Key Group You must choose a key group for phase 1 IKE setup. DH1 refers to Diffie- Hellman Group 1 a 768 bit random number. DH2 refers to Diffie-Hellman Group 2 a 1024 bit (1Kb) random number.
  • Page 135 Chapter 18 IPSec VPN Current ZyXEL implementation assumes identical outgoing and incoming SPIs. 18.5.2.2 IPSec SA Using Manual Keys You might set up an IPSec SA using manual keys when you want to establish a VPN tunnel quickly, for example, for troubleshooting. You should only do this as a temporary solution, however, because it is not as secure as a regular IPSec SA.
  • Page 136: Configuring Manual Key

    Chapter 18 IPSec VPN 18.5.3 Configuring Manual Key You only configure VPN manual key when you select Manual in the IPSec Keying Mode field on the IPSec VPN > General > Edit screen. Figure 80 Security > IPSec VPN > General > Edit: Manual The following table describes the labels in this screen.
  • Page 137 Chapter 18 IPSec VPN Security > IPSec VPN > General > Edit: Manual Table 55 (continued) LABEL DESCRIPTION Local Policy Local IP addresses must be static and correspond to the remote IPSec router's configured remote IP addresses. Two active SAs can have the same configured local or remote IP address, but not both.
  • Page 138 Chapter 18 IPSec VPN Security > IPSec VPN > General > Edit: Manual Table 55 (continued) LABEL DESCRIPTION My IP Address Enter the NBG5715's static WAN IP address (if it has one) or leave the field set to 0.0.0.0. The NBG5715 uses its current WAN IP address (static or dynamic) in setting up the VPN tunnel if you leave this field as 0.0.0.0.
  • Page 139: The Sa Monitor Screen

    Chapter 18 IPSec VPN Security > IPSec VPN > General > Edit: Manual Table 55 (continued) LABEL DESCRIPTION IPSec Protocol Select the security protocols used for an SA. Both AH and ESP increase processing requirements and communications latency (delay). If you select ESP here, you must select options from the Encryption Algorithm and Authentication Algorithm fields (described below).
  • Page 140: Ipsec Architecture

    Chapter 18 IPSec VPN 18.7.1 IPSec Architecture The overall IPSec architecture is shown as follows. Figure 82 IPSec Architecture IPSec Algorithms The ESP (Encapsulating Security Payload) Protocol (RFC 2406) and AH (Authentication Header) protocol (RFC 2402) describe the packet formats and the default standards for packet structure (including implementation algorithms).
  • Page 141: Encapsulation

    Chapter 18 IPSec VPN 18.7.2 Encapsulation The two modes of operation for IPSec VPNs are Transport mode and Tunnel mode. At the time of writing, the NBG5715 supports Tunnel mode only. Figure 83 Transport and Tunnel Mode IPSec Encapsulation Transport Mode Transport mode is used to protect upper layer protocols and only affects the data in the IP packet.
  • Page 142: Ike Phases

    Chapter 18 IPSec VPN 18.7.3 IKE Phases There are two phases to every IKE (Internet Key Exchange) negotiation – phase 1 (Authentication) and phase 2 (Key Exchange). A phase 1 exchange establishes an IKE SA and the second one uses that SA to negotiate SAs for IPSec.
  • Page 143: Ipsec And Nat

    Chapter 18 IPSec VPN • Main Mode ensures the highest level of security when the communicating parties are negotiating authentication (phase 1). It uses 6 messages in three round trips: SA negotiation, Diffie-Hellman exchange and an exchange of nonces (a nonce is a random number). This mode features identity protection (your identity is not revealed in the negotiation).
  • Page 144: Id Type And Content

    Chapter 18 IPSec VPN NAT is not normally compatible with ESP in transport mode either, but the NBG5715’s NAT Traversal feature provides a way to handle this. NAT traversal allows you to set up an IKE SA when there are NAT routers between the two IPSec routers. Figure 85 NAT Router Between IPSec Routers Normally you cannot set up an IKE SA with a NAT router between the two IPSec routers because the NAT router changes the header of the IPSec packet.
  • Page 145: Id Type And Content Examples

    Chapter 18 IPSec VPN addresses. The NBG5715 can distinguish up to 48 incoming SAs because you can select between three encryption algorithms (DES, 3DES and AES), two authentication algorithms (MD5 and SHA1) and eight key groups when you configure a VPN rule (see Section 18.4 on page 126).
  • Page 146: Diffie-Hellman (Dh) Key Groups

    Chapter 18 IPSec VPN 18.7.9 Diffie-Hellman (DH) Key Groups Diffie-Hellman (DH) is a public-key cryptography protocol that allows two parties to establish a shared secret over an unsecured communications channel. Diffie-Hellman is used within IKE SA setup to establish session keys. 768-bit, 1024-bit 1536-bit, 2048-bit, and 3072-bit Diffie-Hellman groups are supported.
  • Page 147: Bandwidth Management

    19.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN.
  • Page 148: General Screen

    Chapter 19 Bandwidth Management The sum of the bandwidth allotments that apply to the LAN interface (WAN to LAN, WAN to WLAN) must be less than or equal to the Downstream Bandwidth that you configure in the Bandwidth Management Advanced screen Section 19.5 on page 148.
  • Page 149 Chapter 19 Bandwidth Management Click Management > Bandwidth MGMT > Advance to open the bandwidth management Advanced screen. Figure 88 Management > Bandwidth MGMT > Advance The following table describes the labels in this screen. Table 63 Management > Bandwidth MGMT > Advance LABEL DESCRIPTION Management Bandwidth...
  • Page 150 Chapter 19 Bandwidth Management Table 63 Management > Bandwidth MGMT > Advance (continued) LABEL DESCRIPTION Priority Select a priority from the drop down list box. The lower the number, the higher the priority. • Select higher priority for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay).
  • Page 151: Rule Configuration: User Defined Service Rule Configuration

    Chapter 19 Bandwidth Management 19.5.1 Rule Configuration: User Defined Service Rule Configuration If you want to edit a bandwidth management rule for other applications or services, click the Edit icon in the User-defined Service table of the Advanced screen. The following screen displays. Figure 89 Bandwidth MGMT Rule Configuration: User-defined Service The following table describes the labels in this screen.
  • Page 152: Remote Management

    H A P T E R Remote Management 20.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your NBG5715 from a remote location through the following interfaces: • LAN and WAN • LAN only •...
  • Page 153: System Timeout

    Chapter 20 Remote Management • Use the NBG5715’s WAN IP address when configuring from the WAN. • Use the NBG5715’s LAN IP address when configuring from the LAN. 20.3.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NBG5715 automatically logs you out if the management session remains idle for longer than this timeout period.
  • Page 154: Telnet Screen

    Chapter 20 Remote Management 20.5 Telnet Screen To change your NBG5715’s remote management settings, click Management > Remote MGMT > Telnet to open the Telnet screen. Figure 91 Management > Remote MGMT > Telnet The following table describes the labels in this screen. Table 66 Management >...
  • Page 155: Universal Plug-And-Play (Upnp)

    H A P T E R Universal Plug-and-Play (UPnP) 21.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 156: Upnp Screen

    Chapter 21 Universal Plug-and-Play (UPnP) All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention. 21.3 UPnP Screen Use this screen to enable UPnP on your NBG5715. Click Management > UPnP to display the screen shown next. Figure 92 Management >...
  • Page 157 Chapter 21 Universal Plug-and-Play (UPnP) Right-click the icon and select Properties. Figure 93 Network Connections In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 94 Internet Connection Properties NBG5715 User’s Guide...
  • Page 158 Chapter 21 Universal Plug-and-Play (UPnP) You may edit or delete the port mappings or click Add to manually add port mappings. Figure 95 Internet Connection Properties: Advanced Settings Figure 96 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
  • Page 159: Web Configurator Easy Access

    Chapter 21 Universal Plug-and-Play (UPnP) Double-click on the icon to display your current Internet connection status. Figure 98 Internet Connection Status 21.4.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG5715 without finding out the IP address of the NBG5715 first.
  • Page 160 Chapter 21 Universal Plug-and-Play (UPnP) Select My Network Places under Other Places. Figure 99 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. Right-click on the icon for your NBG5715 and select Invoke. The web configurator login screen displays.
  • Page 161 Chapter 21 Universal Plug-and-Play (UPnP) Right-click on the icon for your NBG5715 and select Properties. A properties window displays with basic information about the NBG5715. Figure 101 Network Connections: My Network Places: Properties: Example NBG5715 User’s Guide...
  • Page 162 Chapter 21 Universal Plug-and-Play (UPnP) NBG5715 User’s Guide...
  • Page 163: Maintenance

    H A P T E R Maintenance 22.1 Overview This chapter provides information on the Maintenance screens. 22.2 What You Can Do in this Chapter • Use the General screen to set the timeout period of the management session (Section 22.3 on page 163).
  • Page 164: Password Screen

    Chapter 22 Maintenance The following table describes the labels in this screen. Table 68 Maintenance > General LABEL DESCRIPTION System Name System Name is a unique name to identify the NBG5715 in an Ethernet network. Domain Name Enter the domain name you want to give to the NBG5715. Administrator Type how many minutes a management session can be left idle before the Inactivity Timer...
  • Page 165: Time Setting Screen

    Chapter 22 Maintenance 22.5 Time Setting Screen Use this screen to configure the NBG5715’s time based on your local time zone. To change your NBG5715’s time and date, click Maintenance > Time. The screen appears as shown. Figure 104 Maintenance > Time The following table describes the labels in this screen.
  • Page 166: Firmware Upgrade Screen

    Click Cancel to begin configuring this screen afresh. 22.6 Firmware Upgrade Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a “*.bin” extension, e.g., “NBG5715.bin”. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes.
  • Page 167: Backup/Restore Screen

    Chapter 22 Maintenance Click Maintenance > Firmware Upgrade. Follow the instructions in this screen to upload firmware to your NBG5715. Figure 105 Maintenance > Firmware Upgrade The following table describes the labels in this screen. Table 71 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path...
  • Page 168 Chapter 22 Maintenance Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG5715. Click Maintenance > Backup/Restore. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 107 Maintenance >...
  • Page 169: The Language Screen

    Chapter 22 Maintenance 22.8 The Language Screen Use this screen to change the language for the Web Configurator. Select the language you prefer and click Apply. The Web Configurator language changes after a while without restarting the NBG5715. Figure 108 NBG5715 User’s Guide...
  • Page 170 Chapter 22 Maintenance NBG5715 User’s Guide...
  • Page 171: Troubleshooting

    • USB Device Problems • ZyXEL NetUSB Share Center Utility Problems 23.2 Power, Hardware Connections, and LEDs The NBG5715 does not turn on. None of the LEDs turn on. Make sure you are using the power adaptor or cord included with the NBG5715.
  • Page 172: Nbg5715 Access And Login

    Chapter 23 Troubleshooting Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adaptor to the NBG5715. If the problem continues, contact the vendor. 23.3 NBG5715 Access and Login I don’t know the IP address of my NBG5715.
  • Page 173 Chapter 23 Troubleshooting Make sure you are using the correct IP address. • The default IP address is 192.168.1.1. • If you changed the IP address (Section 12.4 on page 97), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for don’t know the IP address of my NBG5715.
  • Page 174: Internet Access

    Chapter 23 Troubleshooting 23.4 Internet Access I cannot access the Internet. Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. Make sure you entered your ISP account information correctly in the wizard. These fields are case- sensitive, so make sure [Caps Lock] is not on.
  • Page 175: Resetting The Nbg5715 To Its Factory Defaults

    Chapter 23 Troubleshooting • Check the settings for QoS. If it is disabled, you might consider activating it. 23.5 Resetting the NBG5715 to Its Factory Defaults If you reset the NBG5715, you lose all of the changes you have made. The NBG5715 re-loads its default settings, and the password resets to 1234.
  • Page 176: Usb Device Problems

    Chapter 23 Troubleshooting Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the NBG5715. Make sure you allow the NBG5715 to be remotely accessed through the WLAN interface. Check your remote management settings. •...
  • Page 177: Zyxel Netusb Share Center Utility Problems

    Chapter 23 Troubleshooting Be sure to install the ZyXEL NetUSB Share Center Utility (for NetUSB functionality) first from the included disc, or download the latest version from the zyxel.com website. Disconnect the problematic USB device, then reconnect it to the NBG5715.
  • Page 178 Chapter 23 Troubleshooting NBG5715 User’s Guide...
  • Page 179: Appendix A Product Specifications

    P P E N D I X Product Specifications The following tables summarize the NBG5715’s hardware and firmware features. Table 73 Hardware Features Dimensions 213.7 mm (W) x 164 mm (D) x 73.6 mm (H) Weight 251g SDRAM 128 MB Flash Memory 128 MB Power Specification...
  • Page 180 Bluetooth enabled devices, and other wireless LANs. Firmware Upgrade Download new firmware (when available) from the ZyXEL web site and use the Web Configurator to put it on the NBG5715. Note: Only upload firmware for your specific model! Configuration Backup &...
  • Page 181: Wall-Mounting Instructions

    DNS servers to computers on your network. Dynamic DNS Support With Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic IP address. You must register for this service with a Dynamic DNS service provider. IP Multicast IP Multicast is used to send traffic to a specific group of computers.
  • Page 182 Appendix A Product Specifications Align the holes on the back of the NBG5715 with the screws on the wall. Hang the NBG5715 on the screws. Figure 109 Wall-mounting Example The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm).
  • Page 183: Appendix B Pop-Up Windows, Javascript And Java Permissions

    P P E N D I X Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8.
  • Page 184 Appendix B Pop-up Windows, JavaScript and Java Permissions Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 112 Internet Options: Privacy Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
  • Page 185 Appendix B Pop-up Windows, JavaScript and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 113 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”.
  • Page 186 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 114 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
  • Page 187 Appendix B Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 115 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 188 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 116 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 189 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 117 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NBG5715 User’s Guide...
  • Page 190 Appendix B Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 118 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen.
  • Page 191 Appendix B Pop-up Windows, JavaScript and Java Permissions Click Content to show the screen below. Select the check boxes as shown in the following screen. Figure 120 Mozilla Firefox Content Security Opera Opera 10 screens are used here. Screens for other versions may vary slightly. NBG5715 User’s Guide...
  • Page 192 Appendix B Pop-up Windows, JavaScript and Java Permissions Allowing Pop-Ups From Opera, click Tools, then Preferences. In the General tab, go to Choose how you prefer to handle pop-ups and select Open all pop-ups. Figure 121 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Preferences.
  • Page 193 Appendix B Pop-up Windows, JavaScript and Java Permissions To customize JavaScript behavior in the Opera browser, click JavaScript Options. Figure 123 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply. NBG5715 User’s Guide...
  • Page 194 Appendix B Pop-up Windows, JavaScript and Java Permissions NBG5715 User’s Guide...
  • Page 195: Appendix C Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 196 Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 124 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 197 Appendix C IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 76 Subnet Masks BINARY DECIMAL 4TH OCTET OCTET...
  • Page 198 Appendix C IP Addresses and Subnetting Table 78 Alternative Subnet Mask Notation (continued) ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.224 1110 0000 255.255.255.240 1111 0000 255.255.255.248 1111 1000 255.255.255.252 1111 1100 Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons.
  • Page 199 Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub- networks, A and B. Figure 126 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 –...
  • Page 200 Appendix C IP Addresses and Subnetting Table 79 Subnet 1 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.1 192.168.1.0 Broadcast Address: Highest Host ID: 192.168.1.62 192.168.1.63 Table 80 Subnet 2 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE...
  • Page 201 Appendix C IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 83 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 84 24-bit Network Number Subnet Planning NO.
  • Page 202 Appendix C IP Addresses and Subnetting Table 85 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.255.248 (/29) 8192 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
  • Page 203 Appendix C IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network.
  • Page 204 Appendix C IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet.
  • Page 205: Appendix D Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific NBG5715 may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 206 Appendix D Setting Up Your Computer’s IP Address Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click Start > Control Panel. In the Control Panel, click the Network Connections icon. NBG5715 User’s Guide...
  • Page 207 Appendix D Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. On the General tab, select Internet Protocol (TCP/IP) and then click Properties. NBG5715 User’s Guide...
  • Page 208 Appendix D Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 209 Appendix D Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. In the Control Panel, click the Network and Internet icon. Click the Network and Sharing Center icon. NBG5715 User’s Guide...
  • Page 210 Appendix D Setting Up Your Computer’s IP Address Click Manage network connections. Right-click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NBG5715 User’s Guide...
  • Page 211 Appendix D Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NBG5715 User’s Guide...
  • Page 212 Appendix D Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 213 Appendix D Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. In the Control Panel, click View network status and tasks under the Network and Internet category. Click Change adapter settings. NBG5715 User’s Guide...
  • Page 214 Appendix D Setting Up Your Computer’s IP Address Double click Local Area Connection and then select Properties. Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. NBG5715 User’s Guide...
  • Page 215 Appendix D Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. NBG5715 User’s Guide...
  • Page 216 Appendix D Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 217 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Click Start > All Programs > Accessories > Command Prompt. In the Command Prompt window, type "ipconfig" and then press [ENTER]. The IP settings are displayed as follows. Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3.
  • Page 218 Appendix D Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. NBG5715 User’s Guide...
  • Page 219 Appendix D Setting Up Your Computer’s IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. For statically assigned settings, do the following: • From the Configure IPv4 list, select Manually. • In the IP Address field, type your IP address. •...
  • Page 220 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab. Figure 130 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6.
  • Page 221 Appendix D Setting Up Your Computer’s IP Address In System Preferences, click the Network icon. When the Network preferences pane opens, select Ethernet from the list of available connection types. From the Configure list, select Using DHCP for dynamically assigned settings. NBG5715 User’s Guide...
  • Page 222 Appendix D Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure list, select Manually. • In the IP Address field, enter your IP address. • In the Subnet Mask field, enter your subnet mask. •...
  • Page 223 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 131 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 224 Appendix D Setting Up Your Computer’s IP Address When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. In the Authenticate window, enter your admin account name and password then click the Authenticate button.
  • Page 225 Appendix D Setting Up Your Computer’s IP Address In the Network Settings window, select the connection that you want to configure, then click Properties. The Properties dialog box opens. • In the Configuration list, select Automatic Configuration (DHCP) if you have a dynamic IP address.
  • Page 226 Appendix D Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Click the Close button to apply the changes. NBG5715 User’s Guide...
  • Page 227 Appendix D Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 132 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop...
  • Page 228 Appendix D Setting Up Your Computer’s IP Address Click K Menu > Computer > Administrator Settings (YaST). When the Run as Root - KDE su dialog opens, enter the admin password and click OK. NBG5715 User’s Guide...
  • Page 229 Appendix D Setting Up Your Computer’s IP Address When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button. NBG5715 User’s Guide...
  • Page 230 Appendix D Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 133 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 231 Appendix D Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Click Finish to save your settings and close the window. Verifying Settings Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties.
  • Page 232 Appendix D Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 135 openSUSE: Connection Status - KNetwork Manager NBG5715 User’s Guide...
  • Page 233: Appendix E Wireless Lans

    P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 234 Appendix E Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 137 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 235 Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 138 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
  • Page 236 Appendix E Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. RTS/CTS Figure 139 When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 237 Appendix E Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver.
  • Page 238 Appendix E Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your NBG5715. Table 87 Wireless Security Levels SECURITY SECURITY TYPE LEVEL Least Unique SSID (Default) Secure Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication...
  • Page 239 Appendix E Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: •...
  • Page 240 Appendix E Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text.
  • Page 241 Appendix E Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
  • Page 242 Appendix E Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
  • Page 243 Appendix E Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows.
  • Page 244: Security Parameters Summary

    Appendix E Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 141 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
  • Page 245 Appendix E Wireless LANs Positioning the antennas properly increases the range and coverage area of a wireless LAN. Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.11a) is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area.
  • Page 246 Appendix E Wireless LANs For directional antennas, point the antenna in the direction of the desired coverage area. NBG5715 User’s Guide...
  • Page 247: Appendix F Common Services

    7648 A popular videoconferencing solution from White Pines Software. 24032 TCP/UDP Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. User-Defined The IPSEC ESP (Encapsulation Security (IPSEC_TUNNEL) Protocol) tunneling protocol uses this service. FINGER...
  • Page 248 Appendix F Common Services Table 90 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS HTTPS is a secured http session often used in e-commerce. ICMP User-Defined Internet Control Message Protocol is often...
  • Page 249 Appendix F Common Services Table 90 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP Simple Network Management Program.
  • Page 250 Appendix F Common Services NBG5715 User’s Guide...
  • Page 251: Appendix G Open Software Announcements

    Software and Documentation solely for archival, back-up or disaster recovery purposes. You shall not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed.
  • Page 252 All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.
  • Page 253 Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.
  • Page 254 (3) years from the date of distribution of the applicable product or software, we will give to anyone who contacts us at the ZyXEL Technical Support (support@zyxel.com.tw), for a charge of no more than our cost of physically performing source code distribution, a complete machine-readable copy of the complete corresponding source code for the version of the Programs that we distributed to you if we are in possession of such.
  • Page 255 Appendix G Open Software Announcements applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
  • Page 256 Appendix G Open Software Announcements 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
  • Page 257 Appendix G Open Software Announcements operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
  • Page 258 Appendix G Open Software Announcements "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
  • Page 259 Appendix G Open Software Announcements The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS ORIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  • Page 260 Appendix G Open Software Announcements Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor"...
  • Page 261 Appendix G Open Software Announcements "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below).
  • Page 262 Appendix G Open Software Announcements and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor"...
  • Page 263 Appendix G Open Software Announcements or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:...
  • Page 264 Appendix G Open Software Announcements documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License.
  • Page 265 Appendix G Open Software Announcements origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A...
  • Page 266 Appendix G Open Software Announcements License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.
  • Page 267 Appendix G Open Software Announcements Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
  • Page 268 Appendix G Open Software Announcements For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.You must make sure that they, too, receive or can get the source code.
  • Page 269 Appendix G Open Software Announcements GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License").
  • Page 270 Appendix G Open Software Announcements licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;...
  • Page 271 Appendix G Open Software Announcements these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library.
  • Page 272 Appendix G Open Software Announcements 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License.
  • Page 273 Appendix G Open Software Announcements LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES.
  • Page 274 Appendix G Open Software Announcements Jean-loup Gailly jloup@gzip.org Mark Adler madler@alumni.caltech.edu This Product includes lldt under the following license NBG5715 User’s Guide...
  • Page 275 Appendix G Open Software Announcements NBG5715 User’s Guide...
  • Page 276 Appendix G Open Software Announcements NBG5715 User’s Guide...
  • Page 277 Appendix G Open Software Announcements NBG5715 User’s Guide...
  • Page 278 Appendix G Open Software Announcements NBG5715 User’s Guide...
  • Page 279 Appendix G Open Software Announcements NBG5715 User’s Guide...
  • Page 280 Appendix G Open Software Announcements NBG5715 User’s Guide...
  • Page 281: Appendix H Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
  • Page 282 ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
  • Page 283 Software and Documentation solely for archival, back-up or disaster recovery purposes. You shall not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed.
  • Page 284 DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE,...
  • Page 285 Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.
  • Page 286 Appendix H Legal Information NBG5715 User’s Guide...
  • Page 287: Index

    Index Index CTS (Clear to Send) Address Assignment Advanced Encryption Standard See AES. Daylight saving DDNS algorithms see also Dynamic DNS service providers alternative subnet mask notation antenna directional DHCP 38, 99 gain DHCP server omni-directional see also Dynamic Host Configuration Protocol AP (access point) DHCP server 96, 99...
  • Page 288 IGMP version IKE phases IKE SA ESSID aggressive mode IP address, remote IPSec router Extended Service Set, See ESS IP address, ZyXEL Device main mode negotiation mode IKE SA. See also VPN. Independent Basic Service Set Firewall See IBSS Firewall overview...
  • Page 289 Index local (user) database and encryption Local Area Network outside header Pairwise Master Key (PMK) 242, 243 MAC address 72, 80 Point-to-Point Protocol over Ethernet cloning Pool Size MAC address filter Port forwarding 106, 110 MAC address filtering default server 106, 110 MAC filter example...
  • Page 290 Index Reset button Temporal Key Integrity Protocol (TKIP) Reset the device Time setting Restore configuration transport mode RF (Radio Frequency) trigger port Roaming Trigger port forwarding example Router Mode process status screen tunnel mode RTS (Request To Send) threshold 235, 236 RTS/CTS Threshold 80, 90 Universal Plug and Play...
  • Page 291 Index Overview application example web configurator WEP Encryption 86, 87 WEP encryption WEP key Wi-Fi Protected Access Wildcard Wireless association list wireless channel wireless client WPA supplicants wireless LAN wireless LAN scheduling Wireless network basic guidelines channel encryption example MAC address filter overview security SSID...
  • Page 292 Index NBG5715 User’s Guide...

Table of Contents