Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Wireless Router
NBG-41XW3G
ZyXEL Communications NBG-41XW3G Manuals
Manuals and User Guides for ZyXEL Communications NBG-41XW3G. We have
2
ZyXEL Communications NBG-41XW3G manuals available for free PDF download: User Manual, Specifications
ZyXEL Communications NBG-41XW3G User Manual (430 pages)
3G Wireless Router
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 13.36 MB
Table of Contents
About this User's Guide
3
Document Conventions
4
Safety Warnings
6
Table of Contents
9
Contents Overview
9
Table of Contents
11
List of Figures
21
List of Tables
29
Introduction
33
PART I Introduction
33
Chapter 1 Getting to Know Your Zyxel Device
35
Applications for the Zyxel Device
35
Overview
35
WAN Application
35
Figure 1 3G WAN Application
36
Figure 2 Secure Internet Access Via Cable or DSL Modem
36
Secure Broadband Internet Access Via Cable or DSL Modem
36
Ways to Manage the Zyxel Device
36
Configuring Your Zyxel Device's Security Features
37
Control Access to Your Device
37
Firewall
37
Wireless Security
37
Maintaining Your Zyxel Device
38
Nat
38
Upnp
38
Front Panel Lights
39
Figure 3 Front Panel
39
Table 1 NBG410W3G Front Panel Lights
39
Table 2 NBG412W3G Front Panel Lights
40
Chapter 2 Introducing the Web Configurator
43
Accessing the Zyxel Device Web Configurator
43
Web Configurator Overview
43
Figure 4 Login Screen
44
Figure 5 Change Password Screen
44
Figure 7 Example Xmodem Upload
46
Figure 8 HOME Screen
46
Figure 9 Web Configurator HOME Screen
47
HOME Screen
47
Main Window
47
Table 3 Title Bar: Web Configurator Icons
47
Table 4 Web Configurator HOME Screen
47
Table 5 Screens Summary
52
Port Statistics
54
Figure 10 HOME > Show Statistics
55
Show Statistics: Line Chart
55
Table 6 HOME > Show Statistics
55
DHCP Table Screen
56
Figure 6 Replace Certificate Screen
44
Procedure to Use the Reset Button
45
Resetting the Zyxel Device
45
Uploading a Configuration File Via Console Port
45
Navigating the Zyxel Device Web Configurator
46
Title Bar
46
Navigation Panel
52
Figure 11 HOME > Show Statistics > Line Chart
56
Table 7 HOME > Show Statistics > Line Chart
56
Figure 12 HOME > DHCP Table
57
Table 8 HOME > DHCP Table
57
Chapter 3 Wizard Setup
59
Figure 13 Wizard Setup Welcome
59
Internet Access
59
ISP Parameters
59
Wizard Setup
59
Figure 14 ISP Parameters: Ethernet Encapsulation
60
Table 9 ISP Parameters: Ethernet Encapsulation
60
Figure 15 ISP Parameters: Pppoe Encapsulation
61
Table 10 ISP Parameters: Pppoe Encapsulation
61
Figure 16 ISP Parameters: PPTP Encapsulation
63
Table 11 ISP Parameters: PPTP Encapsulation
63
Figure 17 Internet Access Setup Complete
64
Tutorials
65
Chapter 4 Tutorials
65
Wizard Setup Overview
59
Internet Access Wizard Setup Complete
64
DMZ Overview
65
Figure 18 DMZ Overview
65
Basic Setup
66
DMZ Setup Example
66
Figure 19 DMZ Tutorial: DMZ Setup
66
Figure 20 DMZ Tutorial: NETWORK > DMZ > Static DHCP
67
Figure 21 DMZ Tutorial: NETWORK > DMZ
67
Advanced Setup
68
Figure 22 DMZ Tutorial: ADVANCED > NAT Overview
68
Figure 23 DMZ Tutorial: ADVANCED > ALG
68
Figure 24 DMZ Tutorial: ADVANCED > NAT > Port Forwarding
69
Firewall Rule Setup
69
Figure 25 DMZ Tutorial: SECURITY > Firewall > Rule Summary
70
Figure 26 DMZ Tutorial: NETWORK > Firewall > Rule Summary: Firewall - Edit
71
Figure 27 DMZ Tutorial: SECURITY > Firewall > Rule Summary Example
72
Figure 28 Tutorial: H.323 Phone Setup
72
Setting up a Voip Phone with H.323
72
Figure 29 H.323 Tutorial: NETWORK > LAN > Static DHCP
73
Figure 30 H.323 Tutorial: ADVANCED > ALG
73
Figure 31 H.323 Tutorial: ADVANCED > NAT > Port Forwarding
74
Figure 32 H.323 Tutorial: SECURITY > Firewall > Rule Summary
74
Figure 33 H.323 Tutorial: SECURITY > Firewall > Rule Summary
76
Figure 34 H.323 Tutorial: SECURITY > Firewall > Rule Summary
77
Configuring the WAN Connection with a Static IP Address
78
Figure 35 Tutorial Example: Using NAT with Static Public IP Addresses
78
Figure 36 Tutorial Example: WAN Connection with a Static Public IP Address
79
Figure 37 Tutorial Example: WAN 1 Screen
79
Figure 38 Tutorial Example: DNS > System
80
Figure 39 Tutorial Example: DNS > System Edit-1
80
Figure 40 Tutorial Example: DNS > System Edit-2
81
Figure 41 Tutorial Example: DNS > System: Done
81
Figure 42 Tutorial Example: Status
82
Public IP Address Mapping
82
Figure 43 Tutorial Example: Mapping Multiple Public IP Addresses to Inside Servers
83
Figure 44 Tutorial Example: NAT > NAT Overview
84
Figure 45 Tutorial Example: NAT > Address Mapping
85
Figure 46 Tutorial Example: NAT Address Mapping Edit: One-To-One (1)
85
Figure 47 Tutorial Example: NAT Address Mapping Edit: One-To-One (2)
86
Figure 48 Tutorial Example: NAT Address Mapping Edit: Many-To-One
86
Figure 49 Tutorial Example: NAT Address Mapping Done
87
Forwarding Traffic from the WAN to a Local Computer
87
Figure 50 Tutorial Example: Forwarding Incoming FTP Traffic to a Local Computer
88
Figure 51 Tutorial Example: NAT Address Mapping Edit: Server
88
Allow WAN-To-LAN Traffic through the Firewall
89
File Server
66
Example Parameters and Scenario
77
Using NAT with Multiple Public IP Addresses
77
Figure 52 Tutorial Example: NAT Port Forwarding
89
Figure 53 Tutorial Example: Forwarding Incoming FTP Traffic to a Local Computer
89
Figure 54 Tutorial Example: Firewall Default Rule
90
Figure 55 Tutorial Example: Firewall Rule: WAN1 to LAN
90
Figure 56 Tutorial Example: Firewall Rule: WAN to LAN Address Edit for Web Server
91
Figure 57 Tutorial Example: Firewall Rule: WAN to LAN Service Edit for Web Server
92
Figure 58 Tutorial Example: Firewall Rule: WAN to LAN Address Edit for Mail Server
93
Figure 59 Tutorial Example: Firewall Rule: WAN to LAN Service Edit for Mail Server
93
Figure 60 Tutorial Example: Firewall Rule: WAN to LAN Address Edit for FTP Server
94
Figure 61 Tutorial Example: Firewall Rule: WAN to LAN Service Edit for FTP Server
95
Figure 62 Tutorial Example: Firewall Rule Summary
95
Testing the Connections
96
Using NAT with Multiple Game Players
96
Figure 63 Tutorial Example: NAT Address Mapping Done: Game Playing
97
Network
99
Part II: Network
99
IP Address and Subnet Mask
101
LAN Screens
101
LAN, WAN and the Zyxel Device
101
Figure 65 NETWORK > LAN
104
Table 12 NETWORK > LAN
105
LAN Static DHCP
106
Figure 66 NETWORK > LAN > Static DHCP
107
Table 14 NETWORK > LAN > IP Alias
109
Figure 69 NETWORK > LAN > Port Roles
110
Figure 70 Port Roles Change Complete
110
Table 15 NETWORK > LAN > Port Roles
110
WAN Screens
111
WAN IP Address Assignment
115
Wan 1
117
WAN Ethernet Encapsulation
117
Table 18 NETWORK > WAN > WAN 1 (Ethernet Encapsulation)
118
Pppoe Encapsulation
120
Table 19 NETWORK > WAN > WAN 1 (Pppoe Encapsulation)
121
PPTP Encapsulation
123
LAN IP Alias
107
Table 13 NETWORK > LAN > Static DHCP
107
Figure 67 Physical Network & Partitioned Logical Networks
108
Figure 68 NETWORK > LAN > IP Alias
108
LAN Port Roles
109
Chapter 5 LAN Screens
101
Figure 64 LAN and WAN
101
Dhcp
102
Private IP Addresses
102
IP Pool Setup
103
Multicast
103
RIP Setup
103
Lan
104
Wins
104
G (Wan)
126
Table 21 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies
127
Figure 75 NETWORK > WAN > 3G (WAN 2)
128
Figure 76 Traffic Redirect WAN Setup
132
Figure 77 Traffic Redirect LAN Setup
132
Configuring Traffic Redirect
133
Figure 78 NETWORK > WAN > Traffic Redirect
133
Table 23 NETWORK > WAN > Traffic Redirect
133
DMZ Screens
135
Table 24 NETWORK > DMZ
136
DMZ Static DHCP
138
Table 25 NETWORK > DMZ > Static DHCP
138
DMZ IP Alias
139
Table 22 NETWORK > WAN > 3G (WAN 2)
129
Traffic Redirect
132
Chapter 6 WAN Screens
111
Multiple WAN
111
WAN Overview
111
TCP/IP Priority (Metric)
112
WAN General
112
Figure 71 NETWORK > WAN General
113
Table 16 NETWORK > WAN General
114
Table 17 Private IP Address Ranges
115
DNS Server Address Assignment
116
WAN MAC Address
116
Figure 72 NETWORK > WAN > WAN 1 (Ethernet Encapsulation)
117
Figure 73 NETWORK > WAN > WAN 1 (Pppoe Encapsulation)
121
Figure 74 NETWORK > WAN > WAN 1 (PPTP Encapsulation)
124
Table 20 NETWORK > WAN > WAN 1 (PPTP Encapsulation)
124
Wan 2)
126
Chapter 7 DMZ Screens
135
Configuring DMZ
135
Dmz
135
Figure 79 NETWORK > DMZ
136
Figure 80 NETWORK > DMZ > Static DHCP
138
Figure 81 NETWORK > DMZ > IP Alias
140
Table 26 NETWORK > DMZ > IP Alias
140
DMZ Private and Public IP Address Example
141
DMZ Public IP Address Example
141
Figure 82 DMZ Public Address Example
141
DMZ Port Roles
142
Figure 83 DMZ Private and Public Address Example
142
Figure 84 NETWORK > DMZ > Port Roles
143
Table 27 NETWORK > DMZ > Port Roles
143
Wireless
145
Part III: Wireless
145
Wi-Fi
147
Wi-Fi Introduction
147
Figure 86 WIRELESS > Wi-Fi > Wireless Card
151
Table 29 WIRELESS > Wi-Fi > Wireless Card
152
SSID Profile
153
Configuring Wireless Security
154
Figure 87 WIRELESS > Wi-Fi > Configuring SSID
154
Table 30 WIRELESS > Wi-Fi > Configuring SSID
154
Figure 88 WIRELESS > Wi-Fi > Security
155
Table 31 Security Modes
155
Figure 89 WIRELESS > Wi-Fi > Security: None
156
Table 33 WIRELESS > Wi-Fi > Security: None
156
Figure 90 WIRELESS > Wi-Fi > Security: WEP
157
IEEE 802.1X Only
157
Table 34 WIRELESS > Wi-Fi > Security: WEP
157
Figure 91 WIRELESS > Wi-Fi > Security: 802.1X Only
158
IEEE 802.1X + Static WEP
158
Table 35 WIRELESS > Wi-Fi > Security: 802.1X Only
158
Figure 92 WIRELESS > Wi-Fi > Security: 802.1X + Static WEP
159
Table 36 WIRELESS > Wi-Fi > Security: 802.1X + Static WEP
159
Figure 93 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX
160
Table 37 WIRELESS > Wi-Fi > Security: WPA, WPA2 or WPA2-MIX
160
Wpa, Wpa2, Wpa2-MIX
160
Figure 94 WIRELESS > Wi-Fi > Security: WPA(2)-PSK
161
Table 38 WIRELESS > Wi-Fi > Security: WPA(2)-PSK
161
Wpa-Psk, Wpa2-Psk, Wpa2-Psk-MIX
161
MAC Filter
162
Table 32 WIRELESS > Wi-Fi > Security
155
No Security
156
Static WEP
156
Chapter 8 Wi-Fi
147
Figure 85 Example of a Wireless Network
147
MAC Address Filter
148
Ssid
148
Wireless Security Overview
148
Encryption
149
User Authentication
149
Table 28 Types of Encryption for each Type of Authentication
150
Additional Installation Requirements for Using 802.1X
151
Wireless Card
151
Figure 95 WIRELESS > Wi-Fi > MAC Filter
163
Table 39 WIRELESS > Wi-Fi > MAC Filter
163
Security
165
Part IV: Security
165
Chapter 9 Firewall
167
Figure 96 Default Firewall Action
167
Firewall Overview
167
Figure 97 SECURITY > FIREWALL > Default Rule
168
Packet Direction Matrix
168
Figure 98 Default Block Traffic from WAN1 to DMZ Example
169
Security Considerations
170
Figure 99 Blocking All LAN to WAN IRC Traffic Example
171
Firewall Rules Example
171
Table 40 Blocking All LAN to WAN IRC Traffic Example
171
Figure 101 Using IP Alias to Solve the Triangle Route Problem
173
Figure 102 SECURITY > FIREWALL > Default Rule
174
Figure 103 SECURITY > FIREWALL > Rule Summary
176
Table 43 SECURITY > FIREWALL > Rule Summary
176
Firewall Edit Rule
177
Figure 104 SECURITY > FIREWALL > Rule Summary > Edit
178
Table 44 SECURITY > FIREWALL > Rule Summary > Edit
179
Anti-Probing
180
Figure 105 SECURITY > FIREWALL > Anti-Probing
180
Figure 106 Three-Way Handshake
181
Firewall Thresholds
181
Table 45 SECURITY > FIREWALL > Anti-Probing
181
Figure 107 SECURITY > FIREWALL > Threshold
182
Threshold Screen
182
Threshold Values
182
Table 46 SECURITY > FIREWALL > Threshold
183
Figure 108 SECURITY > FIREWALL > Service
184
Service
184
Figure 109 Firewall Edit Custom Service
185
Firewall Edit Custom Service
185
Table 47 SECURITY > FIREWALL > Service
185
My Service Firewall Rule Example
186
Packet Direction Examples
169
Table 42 SECURITY > FIREWALL > Default Rule
174
Firewall Rule Summary
175
Figure 100 Limited LAN to WAN IRC Traffic Example
172
Table 41 Limited LAN to WAN IRC Traffic Example
172
Asymmetrical Routes
173
Asymmetrical Routes and IP Alias
173
Firewall Default Rule
173
Figure 110 My Service Firewall Rule Example: Service
186
Table 48 SECURITY > FIREWALL > Service > Add
186
Figure 111 My Service Firewall Rule Example: Edit Custom Service
187
Figure 112 My Service Firewall Rule Example: Rule Summary
187
Figure 113 My Service Firewall Rule Example: Rule Edit: Source and Destination Addresses
188
Figure 114 My Service Firewall Rule Example: Edit Rule: Service Configuration
189
Figure 115 My Service Firewall Rule Example: Rule Summary: Completed
190
Chapter 10
191
Authentication Server
191
Authentication Server Overview
191
Local User Database
191
Figure 116 SECURITY > AUTH SERVER > Local User Database
192
Figure 117 SECURITY > AUTH SERVER > RADIUS
193
Radius
193
Table 49 SECURITY > AUTH SERVER > Local User Database
193
Table 50 SECURITY > AUTH SERVER > RADIUS
193
Certificates
195
Certificates Overview
195
Figure 118 Certificates on Your Computer
196
Configuration Summary
197
Table 51 SECURITY > CERTIFICATES > My Certificates
198
My Certificate Details
200
Chapter 11 Certificates
195
Advantages of Certificates
196
Checking the Fingerprint of a Certificate on Your Computer
196
Self-Signed Certificates
196
Verifying a Certificate
196
Figure 119 Certificate Details
197
Figure 120 Certificate Configuration Overview
197
Figure 121 SECURITY > CERTIFICATES > My Certificates
198
My Certificates
198
Figure 122 SECURITY > CERTIFICATES > My Certificates > Details
200
Table 52 SECURITY > CERTIFICATES > My Certificates > Details
200
Certificate File Export Formats
202
My Certificate Export
202
Figure 124 SECURITY > CERTIFICATES > My Certificates > Import
204
Figure 125 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
204
Figure 126 SECURITY > CERTIFICATES > My Certificates > Create (Basic)
205
Figure 127 SECURITY > CERTIFICATES > My Certificates > Create (Advanced)
206
Table 56 SECURITY > CERTIFICATES > My Certificates > Create
206
Trusted cas
209
Figure 128 SECURITY > CERTIFICATES > Trusted cas
210
Table 57 SECURITY > CERTIFICATES > Trusted cas
210
Trusted CA Details
211
Figure 129 SECURITY > CERTIFICATES > Trusted cas > Details
212
Table 58 SECURITY > CERTIFICATES > Trusted cas > Details
212
Trusted CA Import
214
Figure 130 SECURITY > CERTIFICATES > Trusted cas > Import
215
Table 59 SECURITY > CERTIFICATES > Trusted cas Import
215
Trusted Remote Hosts
215
Figure 131 SECURITY > CERTIFICATES > Trusted Remote Hosts
216
Figure 132 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
217
Figure 133 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
218
Table 62 SECURITY > CERTIFICATES > Trusted Remote Hosts > Details
219
Figure 134 SECURITY > CERTIFICATES > Directory Servers
220
Directory Server Add or Edit
221
Figure 123 SECURITY > CERTIFICATES > My Certificates > Export
202
Table 53 SECURITY > CERTIFICATES > My Certificates > Export
202
Certificate File Formats
203
My Certificate Import
203
Directory Servers
220
Table 54 SECURITY > CERTIFICATES > My Certificates > Import
204
Table 55 SECURITY > CERTIFICATES > My Certificates > Import: PKCS#12
204
My Certificate Create
205
Table 60 SECURITY > CERTIFICATES > Trusted Remote Hosts
216
Table 61 SECURITY > CERTIFICATES > Trusted Remote Hosts > Import
217
Trusted Remote Hosts Import
217
Trusted Remote Host Certificate Details
218
Figure 135 SECURITY > CERTIFICATES > Directory Server > Add
221
Table 63 SECURITY > CERTIFICATES > Directory Servers
221
Table 64 SECURITY > CERTIFICATES > Directory Server > Add
221
Advanced
223
Part V: Advanced
223
Chapter 12 Network Address Translation (NAT)
225
NAT Definitions
225
NAT Overview
225
Table 65 NAT Definitions
225
How NAT Works
226
What NAT Does
226
Figure 136 How NAT Works
227
NAT Application
227
Figure 137 NAT Application with IP Alias
228
Figure 138 Port Restricted Cone NAT Example
229
NAT Mapping Types
229
NAT Overview Screen
230
SUA (Single User Account) Versus NAT
230
Table 66 NAT Mapping Types
230
Using NAT
230
Figure 139 ADVANCED > NAT > NAT Overview
231
Figure 140 ADVANCED > NAT > Address Mapping
233
Table 68 ADVANCED > NAT > Address Mapping
233
Figure 141 ADVANCED > NAT > Address Mapping > Edit
234
Default Server IP Address
235
Port Forwarding
235
Port Restricted Cone NAT
228
NAT Address Mapping Edit
234
Table 67 ADVANCED > NAT > NAT Overview
231
NAT Address Mapping
232
What NAT Does
232
Table 69 ADVANCED > NAT > Address Mapping > Edit
235
Configuring Servers Behind Port Forwarding (Example)
236
Port Forwarding: Services and Port Numbers
236
Table 70 Services and Port Numbers
236
Figure 142 Multiple Servers Behind NAT Example
237
NAT and Multiple WAN
237
Port Translation
237
Figure 143 Port Translation Example
238
Port Forwarding Screen
238
Figure 145 Trigger Port Forwarding Process: Example
240
Figure 146 ADVANCED > NAT > Port Triggering
241
Table 72 ADVANCED > NAT > Port Triggering
241
Static Route
243
IP Static Route
244
Figure 149 ADVANCED > STATIC ROUTE > IP Static Route > Edit
245
Table 73 ADVANCED > STATIC ROUTE > IP Static Route
245
Table 74 ADVANCED > STATIC ROUTE > IP Static Route > Edit
245
Dns
247
Adding an Address Record
250
Remote Management
259
Remote Management Overview
259
HTTPS Example
263
Internet Explorer Warning Messages
263
Netscape Navigator Warning Messages
263
Login Screen
265
Figure 164 Device-Specific Certificate
266
How SSH Works
267
Ssh
267
Requirements for Using SSH
268
SSH Implementation on the Zyxel Device
268
Table 82 ADVANCED > REMOTE MGMT > DNS
278
Figure 178 ADVANCED > REMOTE MGMT > CNM
279
Table 83 ADVANCED > REMOTE MGMT > CNM
279
Additional Configuration for Vantage CNM
280
Management Setup
236
Figure 144 ADVANCED > NAT > Port Forwarding
239
Table 71 ADVANCED > NAT > Port Forwarding
239
Port Triggering
240
Chapter 13 Static Route
243
Figure 147 Example of Static Routing Topology
243
IP Static Route
243
Figure 148 ADVANCED > STATIC ROUTE > IP Static Route
244
IP Static Route Edit
245
DNS Overview
247
Configure DNS Cache
252
DNS Cache
252
Dynamic DNS
255
DYNDNS Wildcard
255
Configuring Dynamic DNS
256
High Availability
256
Figure 157 HTTPS Implementation
261
Figure 158 ADVANCED > REMOTE MGMT > WWW
262
Table 76 ADVANCED > REMOTE MGMT > WWW
262
Figure 159 Security Alert Dialog Box (Internet Explorer)
263
Avoiding the Browser Warning Messages
264
Figure 160 Security Certificate 1 (Netscape)
264
Figure 161 Security Certificate 2 (Netscape)
264
Figure 162 Example: Lock Denoting a Secure Connection
265
Figure 163 Replace Certificate
266
Figure 165 Common Zyxel Device Certificate
267
Figure 166 SSH Communication over the WAN Example
267
Figure 167 How SSH Works
268
Configuring SSH
269
Figure 168 ADVANCED > REMOTE MGMT > SSH
269
Figure 169 SSH Example 1: Store Host Key
270
Figure 170 SSH Example 2: Test
270
Figure 171 SSH Example 2: Log in
271
Configuring TELNET
272
Figure 172 Secure FTP: Firmware Upload Example
272
Figure 173 ADVANCED > REMOTE MGMT > Telnet
272
Telnet
272
Figure 174 ADVANCED > REMOTE MGMT > FTP
273
Ftp
273
Table 78 ADVANCED > REMOTE MGMT > Telnet
273
Snmp
274
Table 79 ADVANCED > REMOTE MGMT > FTP
274
Figure 175 SNMP Management Model
275
Supported Mibs
275
Figure 176 ADVANCED > REMOTE MGMT > SNMP
276
Remote Management: Snmp
276
SNMP Traps
276
Table 80 SNMP Traps
276
Dns
277
Figure 177 ADVANCED > REMOTE MGMT > DNS
277
Table 81 ADVANCED > REMOTE MGMT > SNMP
277
Configuring CNM
278
Introducing Vantage CNM
278
Secure FTP Using SSH Example
271
DNS Server Address Assignment
247
DNS Servers
247
Address Record
248
DNS Wildcard
248
Name Server Record
248
Private DNS Server
248
System Screen
248
Figure 152 ADVANCED > DNS > Insert (Name Server Record)
251
Table 75 ADVANCED > DNS > Add (Address Record)
251
Figure 153 ADVANCED > DNS > Cache
253
Figure 154 ADVANCED > DNS > DHCP
254
Figure 155 ADVANCED > DNS > DDNS
256
Chapter 14 DNS
247
Figure 150 ADVANCED > DNS > System DNS
249
Figure 151 ADVANCED > DNS > Add (Address Record)
250
Inserting a Name Server Record
251
Configuring DNS DHCP
254
Chapter 15 Remote Management
259
Figure 156 Secure and Insecure Remote Management from the WAN
259
Remote Management Limitations
260
System Timeout
260
WWW (HTTP and HTTPS)
260
Www
261
Table 77 ADVANCED > REMOTE MGMT > SSH
269
Example 1: Microsoft Windows
270
Example 2: Linux
270
Secure Telnet Using SSH Examples
270
Chapter 16 Upnp
281
Cautions with Upnp
281
How Do I Know if I'M Using Upnp
281
NAT Traversal
281
Universal Plug and Play Overview
281
Configuring Upnp
282
Figure 179 ADVANCED > Upnp
282
Figure 180 ADVANCED > Upnp > Ports
283
Table 85 ADVANCED > Upnp > Ports
283
ALG Screen
293
Installing Upnp in Windows Example
284
Installing Upnp in Windows Me
285
Installing Upnp in Windows XP
286
Using Upnp in Windows XP Example
286
Auto-Discover Your Upnp-Enabled Network Device
287
Web Configurator Easy Access
288
Custom Application
291
Chapter 17 Custom Application
291
Table 84 ADVANCED > Upnp
282
Upnp and Zyxel
282
Displaying Upnp Port Mapping
283
Custom Application Configuration
291
Figure 181 ADVANCED > Custom APP
292
Table 86 ADVANCED > Custom APP
292
ALG and NAT
293
ALG and the Firewall
293
ALG Introduction
293
Chapter 18 ALG Screen
293
294
294
ALG and Multiple WAN
294
ALG Details
294
Ftp
294
Rtp
294
Figure 182 H.323 ALG Example
295
Figure 183 H.323 with Multiple WAN IP Addresses
295
Sip
295
Stun
295
ALG Screen
296
Figure 184 SIP ALG Example
296
SIP ALG Details
296
SIP Audio Session Timeout
296
SIP Signaling Session Timeout
296
Figure 185 ADVANCED > ALG
297
Table 87 ADVANCED > ALG
297
Logs and Maintenance
299
Part VI: Logs and Maintenance
299
Configuring View Log
301
Logs Screens
301
Table 88 LOGS > View Log
302
Table 89 Log Description Example
302
About the Certificate Not Trusted Log
303
Figure 187 Myzyxel.com: Download Center
303
Configuring Log Settings
304
Figure 188 Myzyxel.com: Certificate Download
304
Figure 189 LOGS > Log Settings
305
Table 90 LOGS > Log Settings
306
Configuring Reports
307
Figure 190 LOGS > Reports
308
Table 91 LOGS > Reports
308
Figure 191 LOGS > Reports: Web Site Hits Example
309
Table 92 LOGS > Reports: Web Site Hits Report
309
Viewing Host IP Address
309
Viewing Web Site Hits
309
Figure 192 LOGS > Reports: Host IP Address Example
310
Table 93 LOGS > Reports: Host IP Address
310
Viewing Protocol/Port
310
Figure 193 LOGS > Reports: Protocol/Port Example
311
Table 94 LOGS > Reports: Protocol/ Port
311
Log Descriptions
312
System Reports Specifications
312
Table 95 Report Specifications
312
Table 96 System Maintenance Logs
312
Table 97 System Error Logs
313
Table 98 Access Control Logs
314
Table 99 TCP Reset Logs
314
Table 100 Packet Filter Logs
315
Table 101 ICMP Logs
315
Table 102 Remote Management Logs
315
Table 103 CDR Logs
316
Table 104 PPP Logs
316
Table 105 Upnp Logs
316
Table 106 Attack Logs
317
Table 107 3G Logs
318
Table 108 PKI Logs
319
Table 109 ACL Setting Notes
321
Table 111 Syslog Logs
323
Table 112 RFC-2408 ISAKMP Payload Types
324
Maintenance
325
Figure 195 MAINTENANCE > Password
327
Table 114 MAINTENANCE > Password
327
Figure 196 MAINTENANCE > Time and Date
328
Table 115 MAINTENANCE > Time and Date
328
Figure 197 Synchronization in Process
330
Pre-Defined NTP Time Server Pools
330
Resetting the Time
330
Time Server Synchronization
330
F/W Upload Screen
331
Figure 198 Synchronization Is Successful
331
Figure 199 Synchronization Fail
331
Figure 200 MAINTENANCE > Firmware Upload
332
Figure 201 Firmware Upload in Process
332
Table 116 MAINTENANCE > Firmware Upload
332
Backup and Restore
333
Figure 202 Network Temporarily Disconnected
333
Figure 203 Firmware Upload Error
333
Backup Configuration
334
Figure 204 MAINTENANCE > Backup and Restore
334
Restore Configuration
334
Table 117 Restore Configuration
334
Back to Factory Defaults
335
Figure 205 Configuration Upload Successful
335
Figure 206 Network Temporarily Disconnected
335
Figure 207 Configuration Upload Error
335
Restart Screen
336
Table 110 ICMP Notes
321
Syslog Logs
323
Chapter 19 Logs Screens
301
Figure 186 LOGS > View Log
301
Log Description Example
302
Figure 208 Reset Warning Message
336
Figure 209 MAINTENANCE > Restart
336
Troubleshooting and Specifications
337
Part VII: Troubleshooting and Specifications
337
Chapter 20 Maintenance
325
General Setup
325
General Setup and System Name
325
Maintenance Overview
325
Configuring Password
326
Figure 194 MAINTENANCE > General Setup
326
Table 113 MAINTENANCE > General Setup
326
Time and Date
327
Chapter 21 Troubleshooting
339
Power, Hardware Connections, and Leds
339
Troubleshooting
339
Zyxel Device Access and Login
340
Internet Access
342
Connection
343
Table 118 Typical 3G Transmission Speeds
344
Chapter 22 Product Specifications
345
General Zyxel Device Specifications
345
Table 119 Hardware Specifications
345
Table 120 Firmware Specifications
346
Table 121 Feature Specifications
347
Wall-Mounting Instructions
347
Figure 210 Wall-Mounting Example
348
Figure 211 Masonry Plug and M4 Tap Screw
348
Power Adaptor Specifications
349
Appendices and Index
351
Part VIII: Appendices and Index
351
Appendix A Pop-Up Windows, Javascripts and Java Permissions
353
Figure 212 Pop-Up Blocker
353
Internet Explorer Pop-Up Blockers
353
Figure 213 Internet Options: Privacy
354
Figure 214 Internet Options: Privacy
355
Figure 215 Pop-Up Blocker Settings
355
Figure 216 Internet Options: Security
356
Figure 217 Security Settings - Java Scripting
357
Figure 218 Security Settings - Java
357
Java Permissions
357
Figure 219 Java (Sun)
358
Figure 220 Mozilla Firefox: Tools > Options
359
Figure 221 Mozilla Firefox Content Security
359
Appendix B Setting up Your Computer's IP Address
361
Figure 222 Windows 95/98/Me: Network: Configuration
362
Installing Components
362
Figure 223 Windows 95/98/Me: TCP/IP Properties: IP Address
363
Figure 224 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
364
Verifying Settings
364
Figure 225 Windows XP: Start Menu
365
Figure 226 Windows XP: Control Panel
365
Figure 227 Windows XP: Control Panel: Network Connections: Properties
366
Figure 228 Windows XP: Local Area Connection Properties
366
Figure 229 Windows XP: Internet Protocol (TCP/IP) Properties
367
Figure 230 Windows XP: Advanced TCP/IP Properties
368
Figure 231 Windows XP: Internet Protocol (TCP/IP) Properties
369
Figure 232 Macintosh os 8/9: Apple Menu
370
Figure 233 Macintosh os 8/9: TCP/IP
370
Figure 234 Macintosh os X: Apple Menu
371
Macintosh os X
371
Figure 235 Macintosh os X: Network
372
Figure 236 Red hat 9.0: KDE: Network Configuration: Devices
373
Figure 237 Red hat 9.0: KDE: Ethernet Device: General
373
Figure 238 Red hat 9.0: KDE: Network Configuration: DNS
374
Figure 239 Red hat 9.0: KDE: Network Configuration: Activate
374
Using Configuration Files
374
Figure 240 Red hat 9.0: Dynamic IP Address Setting in Ifconfig-Eth0
375
Figure 241 Red hat 9.0: Static IP Address Setting in Ifconfig-Eth0
375
Figure 242 Red hat 9.0: DNS Settings in Resolv.conf
375
Figure 243 Red hat 9.0: Restart Ethernet Card
375
Figure 244 Red hat 9.0: Checking TCP/IP Properties
376
Appendix C IP Addresses and Subnetting
377
Introduction to Ip Addresses
377
Figure 245 Network Number and Host ID
378
Subnet Masks
378
Table 122 IP Address Network Number and Host ID Example
378
Table 123 Subnet Masks
379
Table 124 Maximum Host Numbers
379
Table 125 Alternative Subnet Mask Notation
379
Figure 246 Subnetting Example: before Subnetting
380
Figure 247 Subnetting Example: after Subnetting
381
Table 126 Subnet 1
381
Table 127 Subnet 2
382
Table 128 Subnet 3
382
Table 129 Subnet 4
382
Table 130 Eight Subnets
382
Table 131 24-Bit Network Number Subnet Planning
383
Table 132 16-Bit Network Number Subnet Planning
383
Configuring Ip Addresses
384
Appendix D Common Services
385
Table 133 Commonly Used Services
385
Appendix E Wireless Lans
389
Figure 248 Peer-To-Peer Communication in an Ad-Hoc Network
389
Wireless Lan Topologies
389
Figure 249 Basic Service Set
390
Figure 250 Infrastructure WLAN
391
Table 134 IEEE 802.11G
393
Table 135 Wireless Security Levels
394
Types of Eap Authentication
395
Types of Radius Messages
395
Dynamic Wep Key Exchange
397
Figure 251 RTS/CTS
392
Fragmentation Threshold
392
Preamble Type
393
Table 136 Comparison of EAP Authentication Types
397
Wpa and Wpa2
397
Figure 252 WPA(2) with RADIUS Application Example
399
Wireless Client Wpa Supplicants
399
Figure 253 WPA(2)-PSK Authentication
400
Security Parameters Summary
400
Table 137 Wireless Security Relational Matrix
400
Antenna Characteristics
401
Antenna Gain
401
Radiation Pattern
401
Types of Antennas for Wlan
401
Positioning Antennas
402
Appendix F Importing Certificates
403
Figure 254 Security Certificate
403
Import Zyxel Device Certificates into Netscape Navigator
403
Figure 255 Login Screen
404
Figure 256 Certificate General Information before Import
404
Figure 257 Certificate Import Wizard 1
405
Figure 258 Certificate Import Wizard 2
405
Figure 259 Certificate Import Wizard 3
406
Figure 260 Root Certificate Store
406
Enrolling and Importing Ssl Client Certificates
407
Figure 262 Zyxel Device Trusted CA Screen
408
Figure 263 CA Certificate Example
409
Figure 264 Personal Certificate Import Wizard 1
409
Figure 265 Personal Certificate Import Wizard 2
410
Figure 266 Personal Certificate Import Wizard 3
410
Figure 267 Personal Certificate Import Wizard 4
411
Figure 268 Personal Certificate Import Wizard 5
411
Figure 269 Personal Certificate Import Wizard 6
411
Figure 270 Access the Zyxel Device Via HTTPS
412
Figure 271 SSL Client Authentication
412
Figure 272 Zyxel Device Secure Login Screen
412
Appendix G Legal Information
415
Figure 261 Certificate General Information after Import
407
Zyxel Limited Warranty
417
Appendix H Customer Support
419
Index
425
Advertisement
ZyXEL Communications NBG-41XW3G Specifications (2 pages)
3G Wireless Router NBG410W3G Series
Brand:
ZyXEL Communications
| Category:
Wireless Router
| Size: 0.31 MB
Table of Contents
G Wireless Router
1
Specifications
2
Product Description
2
Application Diagram
2
Advertisement
Related Products
ZyXEL Communications NBG-415N
ZyXEL Communications NBG-415
ZyXEL Communications NBG4115
ZyXEL Communications NBG-416N
ZyXEL Communications NBG-415N - V1.00
ZyXEL Communications NBG-417N - V1.0
ZyXEL Communications NBG4115 - V1.0
ZyXEL Communications NBG-418N v2
ZyXEL Communications NBG410W3G Series
ZyXEL Communications NBG-418N
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL