Federal Communications Commission (FCC) Interference This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations.
Page 4
G-1000 User’s Guide Cet appareil numerique de la classe B est conforme a la norme NMB-003 du Canada. Certifications Go to www.zyxel.com 1 Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
For your safety, be sure to read and follow all warning notices and instructions. • Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel can service the device.
G-1000 User’s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever...
1-800-255-4101 www.us.zyxel.com +1-714-632-0882 +1-714-632-0858 ftp.us.zyxel.com +47-22-80-61-80 www.zyxel.no +47-22-80-61-81 G-1000 User’s Guide REGULAR MAIL ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan ZyXEL Communications Czech s.r.o. Modranská 621 143 01 Praha 4 - Modrany Ceská Republika ZyXEL Communications A/S...
Page 8
Poland ZyXEL Russia Ostrovityanova 37a Str. Moscow, 117279 Russia ZyXEL Communications Alejandro Villegas 33 1º, 28043 Madrid Spain ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg Sweden ZyXEL Ukraine 13, Pimonenko Str. Kiev, 04050 Ukraine ZyXEL Communications UK Ltd.,11 The Courtyard,...
G-1000 User’s Guide Copyright ... 2 Federal Communications Commission (FCC) Interference Statement ... 3 Safety Warnings ... 5 ZyXEL Limited Warranty... 6 Customer Support... 7 Preface ... 24 Chapter 1 Getting to Know Your G-1000... 26 1.1 Introducing the G-1000 ...26 1.2 G-1000 Features ...26 1.2.1 Physical Features ...26 1.2.1.1 10/100M Auto-negotiating Ethernet/Fast Ethernet Interface ...26...
Page 11
1.3.1 Internet Access Application ...30 1.3.2 Corporation Network Application ...30 Chapter 2 Hardware Installation and Initial Setup ... 32 2.1 Front Panel of the G-1000 ...32 2.2 Top Panel and Connections of the G-1000 ...33 2.2.1 One 10/100M Ethernet Port ...34 2.2.2 Power Port ...34 2.2.3 The RESET Button ...34 2.2.4 Antennas ...35...
Page 14
G-1000 User’s Guide Chapter 14 Dial-in User Setup ... 108 Chapter 15 SNMP Configuration ... 110 Chapter 16 System Security ... 112 16.1 System Password ...112 16.2 Configuring External RADIUS Server ...112 16.3 802.1x ...114 Chapter 17 System Information and Diagnosis ... 118 17.1 System Status ...118 17.2 System Information ...119 17.2.1 System Information ...120...
Page 15
G-1000 User’s Guide Troubleshooting... 136 Appendix B Specifications... 138 Appendix C Brute-Force Password Guessing Protection... 140 Appendix D Setting up Your Computer’s IP Address... 142 Appendix E IP Address Assignment Conflicts ... 154 Appendix F Wireless LANs ... 158 Appendix G IP Subnetting ...
Page 16
G-1000 User’s Guide Figure 1 Internet Access Application ... 30 Figure 2 Corporation Network Application ... 30 Figure 3 G-1000 Front Panel ... 32 Figure 4 G-1000 Top Panel ... 34 Figure 5 Change Password Screen ... 37 Figure 6 The MAIN MENU Screen of the Web Configurator ... 38 Figure 7 Wizard 1: General Setup ...
Page 17
G-1000 User’s Guide Figure 37 System Status: Show Statistics ... 87 Figure 38 Association List ... 88 Figure 39 Firmware Upload ... 89 Figure 40 Firmware Upload In Process ... 89 Figure 41 Network Temporarily Disconnected ... 90 Figure 42 Firmware Upload Error ... 90 Figure 43 Configuration ...
Page 18
G-1000 User’s Guide Figure 80 Menu 24 System Maintenance ... 131 Figure 81 Valid CI Commands ... 131 Figure 82 Menu 24.10 System Maintenance: Time and Date Setting ... 132 Figure 83 Telnet Configuration on a TCP/IP Network ... 133 Figure 84 Menu 24.11 Remote Management Control ...
G-1000 User’s Guide Congratulations on your purchase of the ZyXEL G-1000 - 802.11g Wireless Access Point. An AP acts as a bridge between the wireless and wired networks, extending your existing wired network without any additional wiring. Your G-1000 is easy to install and configure. About This User's Guide This User’s Guide is designed to guide you through the configuration of your G-1000 using the web configurator or the SMT.
Help us help you! E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you! Syntax Conventions •...
G-1000 User’s Guide Getting to Know Your G-1000 This chapter introduces the main features and applications of the G-1000. 1.1 Introducing the G-1000 The G-1000 Access Point extends the range of your existing wired network without any additional wiring efforts, providing easy network access to mobile users. The G-1000 incorporates the IEEE802.11g standard for high-speed wireless transmission.
1.2.1.4 G-1000 LED The blue G-1000 LED (also known as the Breathing LED) is on when the G-1000 is on and blinks (or breaths) when data is being transmitted to/from its wireless stations. You may use the web configurator to turn this LED off even when the G-1000 is on and data is being transmitted/received.
G-1000 User’s Guide 1.2.2.4 802.11g Wireless LAN Standard The G-1000 complies with the 802.11g wireless standard and is also fully compatible with the 802.11b standard. This means an 802.11b radio card can interface directly with an 802.11g device (and vice versa) at 11 Mbps or lower depending on range. 802.11g has several intermediate rate steps between the maximum and minimum data rates.
1.2.2.10 IEEE 802.1x Network Security The G-1000 supports the IEEE 802.1x standard to enhance user authentication. Use the built- in user profile database to authenticate up to 32 users using MD5 encryption. Use an EAP- compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service) server to authenticate a limitless number of users using EAP (Extensible Authentication Protocol).
G-1000 User’s Guide 1.3.1 Internet Access Application The G-1000 is an ideal access solution for wireless Internet connection. A typical Internet access application for your G-1000 is shown as follows. Stations A, B and C can access the wired network through the G-1000s. Figure 1 Internet Access Application 1.3.2 Corporation Network Application In situations where users are always on the move in the coverage area but still need access to...
Page 31
G-1000 User’s Guide Chapter 1 Getting to Know Your G-1000...
G-1000 User’s Guide Hardware Installation and Initial This chapter describes the physical features of the G-1000 and how to make cable connections. 2.1 Front Panel of the G-1000 The LEDs on the front panel indicate the operational status of your G-1000. Figure 3 G-1000 Front Panel H A P T E R Setup...
Table 3 Front Panel LED Description COLOR BRI/RPT Green G-1000(WLAN Blue ACK) ETHN Green Orange Green 2.2 Top Panel and Connections of the G-1000 The following figure shows the top panel of your G-1000. Chapter 2 Hardware Installation and Initial Setup STATUS DESCRIPTION The wireless card on the G-1000 is working properly.
G-1000 User’s Guide Figure 4 G-1000 Top Panel 2.2.1 One 10/100M Ethernet Port Ethernet 10Base-T/100Base-T networks use Shielded Twisted Pair (STP) cable with RJ-45 connectors that look like a bigger telephone plug with 8 pins. The ETHERNET port is auto- sensing, so you may use the crossover cable provided or a straight-through Ethernet cable to connect your G-1000 to a computer/external hub.
2.2.4 Antennas The G-1000 is equipped with two reverse SMA connectors and two detachable omni- directional 2dBi antennas to provide clear radio signal between the wireless stations and the access points. Refer to the Antenna Selection and Positioning Recommendations appendix for more information.
G-1000 User’s Guide This chapter describes how to access the G-1000 web configurator and provides an overview of its screens. The default IP address of the G-1000 is 192.168.1.2. 3.1 Accessing the G-1000 Web Configurator 1 Make sure your G-1000 hardware is properly connected and prepare your computer/ computer network to connect to the G-1000 (refer to the Quick Start Guide).
Figure 5 Change Password Screen You should now see the MAIN MENU screen. 3.2 Resetting the G-1000 If you forget your password or cannot access the web configurator, you will need to reload the factory-default configuration file or use the RESET button on the side panel of the G-1000. Uploading this configuration file replaces the current configuration file with the factory- default configuration file.
G-1000 User’s Guide the RESET button and wait for the G-1000 to finish restarting. Release 3.2.2 Method of Restoring Factory-Defaults You can erase the current configuration and restore factory defaults in three ways: Use the RESET button on the side panel of the G-1000 to upload the default configuration file (hold this button in for about 10 seconds or until the SYS LED, LINK LED or BDG/RPT LED turns red).
Page 39
G-1000 User’s Guide Click the links under ADVANCED to configure advanced features such as SYSTEM (General Setup, Password and Time Zone), WIRELESS (Wireless, MAC Filter, Roaming and 802.1x/WPA), IP, REMOTE MGNT (Telnet, FTP, WWW and SNMP), Internal RADIUS Server ( ), and LOGS (View reports and Log Settings, Trusted AP and Trusted User databases Settings).
G-1000 User’s Guide This chapter provides information on the Wizard Setup screens in the web configurator. 4.1 Wizard Setup Overview The web configurator’s setup wizard helps you configure your G-1000 for wireless stations to access your wired LAN. 4.1.1 Channel A channel is the radio frequency(ies) used by IEEE 802.11b and IEEE 802.11g wireless devices.
4.2 Wizard Setup: General Setup General Setup contains administrative and system-related information. The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System Name) on each individual computer, the domain name can be assigned from the G-1000 via DHCP.
G-1000 User’s Guide Figure 8 Wizard 2: Wireless LAN Setup The following table describes the labels in this screen. Table 6 Wizard 2: Wireless LAN Setup LABEL Wireless LAN Setup WLAN Adaptor ESSID Choose Channel ID Scan WEP Encryption ASCII Key 1 to Key 4 DESCRIPTION Select Built-in from the drop down list box to configure your G-1000 using the...
Table 6 Wizard 2: Wireless LAN Setup LABEL Back Next 4.4 Wizard Setup: IP Address The third wizard screen allows you to configure IP address assignment. 4.4.1 IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems.
G-1000 User’s Guide If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established. The Internet Assigned Number Authority (IANA) reserved this block of addresses specifically for private use;...
Table 8 Wizard 3: IP Address Assignment LABEL Back Finish 4.5 Basic Setup Complete When you click Finish in the Wizard 3 IP Address Assignment screen, a warning window display as shown. Click OK to close the window and log in to the web configurator again using the new IP address if you change the default IP address (192.168.1.2).
G-1000 User’s Guide 5.1 System Overview This section provides information on general system setup. 5.2 Configuring General Setup Click the SYSTEM link under ADVANCED to open the General screen. Figure 11 System General Setup The following table describes the labels in this screen. Table 9 System General Setup LABEL General Setup...
Table 9 System General Setup LABEL First DNS Server Second DNS Server Third DNS Server Apply Reset 5.3 Configuring Password To change your G-1000’s password (recommended), click the SYSTEM link under ADVANCED and then the Password tab. The screen appears as shown. This screen allows you to change the G-1000’s password.
G-1000 User’s Guide 5.4 Configuring Time Setting To change your G-1000’s time and date, click the SYSTEM link under ADVANCED and then the Time Setting tab. The screen appears as shown. Use this screen to configure the G- 1000’s time based on your local time zone. Figure 13 Time Setting The following table describes the labels in this screen.
Page 49
Table 11 Time Setting LABEL Current Date (yyyy/ mm/dd) New Date (yyyy/mm/ Time Zone Daylight Savings Start Date (mm-dd) End Date (mm-dd) Apply Reset Chapter 5 System Screens DESCRIPTION This field displays the date of your G-1000. Each time you reload this page, the G-1000 synchronizes the date with the time server.
G-1000 User’s Guide This chapter discusses how to configure Wireless LAN. 6.1 Introduction A wireless LAN (WLAN) can be as simple as two computers with WLAN adapters communicating in a peer-to-peer network or as complex as a number of computers with WLAN adapters communicating through access points which bridge network traffic to the wired LAN.
• Use the Local User Database if you have less than 32 wireless clients in your network. The G-1000 uses MD5 encryption when a client authenticates with the Local User Database 6.2.3 Restricted Access The MAC Filter screen allows you to configure the AP to give exclusive access to devices (Allow Association) or exclude them from accessing the AP (Deny Association).
G-1000 User’s Guide The figure below shows the possible wireless security levels on your G-1000. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. It requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server either on the WAN or your LAN to provide authentication service for wireless stations Table 12 G-1000 Wireless Security Levels Security Level...
Figure 14 Wireless The following table describes the general wireless LAN labels in this screen. Table 13 Wireless LABEL DESCRIPTION ESSID The ESSID (Extended Service Set IDentity) identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same ESSID.
Page 54
G-1000 User’s Guide Table 13 Wireless LABEL DESCRIPTION Fragmentation The threshold (number of bytes) for the fragmentation boundary for directed Threshold messages. It is the maximum data fragment size that can be sent. Enter a value between 800 and 2432. WEP Encryption WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized wireless stations from accessing data transmitted over the wireless network.
6.4 Configuring Roaming A wireless station is a device with an IEEE 802.11b or an IEEE 802.11g compliant wireless interface. An access point (AP) acts as a bridge between the wireless and wired networks. An AP creates its own wireless coverage area. A wireless station can associate with a particular access point only if it is within the access point’s coverage area.
G-1000 User’s Guide Figure 15 Roaming Example The steps below describe the roaming process. 1 As wireless station Y moves from the coverage area of access point AP 1 to that of access point 2 AP 2, it scans and uses the signal of access point AP 2. 3 Access point AP 2 acknowledges the presence of wireless station Y and relays this information to access point AP 1 through the wired LAN.
To enable roaming on your G-1000, click the WIRELESS link under ADVANCED and then the Roaming tab. The screen appears as shown. Figure 16 Roaming The following table describes the labels in this screen. Table 14 Roaming LABEL Active Port # Apply Reset 6.5 MAC Filter...
G-1000 User’s Guide Figure 17 MAC Address Filter The following table describes the labels in this screen. Table 15 MAC Address Filter LABEL Active Filter Action MAC Address Apply Reset DESCRIPTION Select Yes from the drop down list box to enable MAC address filtering. Define the filter action for the list of MAC addresses in the MAC address filter table.
6.6 Introduction to WPA Wi-Fi Protected Access (WPA and WPA2) applies IEEE 801.2x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using and external RADIUS database. WPA has better user authentication and improved data encryption than WEP, and WPA2 provides even better data encryption and user authentication than WPA. See the appendix for more information on WPA(2) user authentication and WPA encryption.
G-1000 User’s Guide Figure 18 WPA(2) - PSK Authentication 6.6.2 WPA(2) with RADIUS Application Example You need the IP address, port number (default is 1812) and shared secret of a RADIUS server. A WPA(2) application example with an external RADIUS server looks as follows. "A" is the RADIUS server.
Figure 19 WPA with RADIUS Application Example2 6.6.3 Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicants are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data Communications' AEGIS client.
G-1000 User’s Guide Figure 20 Wireless LAN: 802.1x/WPA The following table describes the labels in this screen. Table 16 Wireless LAN: 802.1x/WPA LABEL DESCRIPTION Wireless Port To control wireless stations access to the wired network, select a control method Control from the drop-down list box.
Figure 21 Wireless LAN: 802.1x/WPA for 802.1x Protocol The following table describes the labels in this screen. Table 17 Wireless LAN: 802.1x/WPA for 802.1x Protocol LABEL DESCRIPTION Wireless Port To control wireless stations access to the wired network, select a control method Control from the drop-down list box.
G-1000 User’s Guide Table 17 Wireless LAN: 802.1x/WPA for 802.1x Protocol LABEL DESCRIPTION Dynamic WEP This field is activated only when you select Authentication Required in the Key Exchange Wireless Port Control field. Also set the Key Management Protocol field to 802.1x.
Figure 22 Wireless LAN: 802.1x/WPA for WPA Protocol The following table describes the labels not previously discussed Table 18 Wireless LAN: 802.1x/WPA for WPA Protocol LABEL DESCRIPTIONS Key Management Choose WPA in this field. Protocol WPA Group Key The WPA Group Key Update Timer is the rate at which the AP (if using WPA- Update Timer PSK key management) or RADIUS server (if using WPA key management) sends a new group key out to all clients.
G-1000 User’s Guide Figure 23 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol The following table describes the labels not previously discussed Table 19 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol LABEL DESCRIPTION Key Management Choose WPA-PSK in this field. Protocol Pre-Shared Key The encryption mechanisms used for WPA and WPA-PSK are the same.
Figure 24 Wireless LAN: 802.1x/WPA for WPA2 Protocol The following table describes the labels not previously discussed Table 20 Wireless LAN: 802.1x/WPA2 for WPA Protocol LABEL DESCRIPTIONS Key Management Choose WPA2 in this field. Protocol WPA Compatible Check this box if you want your G-1000 to support WPA2 and WPA at the same time.
G-1000 User’s Guide Figure 25 Wireless LAN: 802.1x/WPA for WPA2-PSK Protocol The following table describes the labels not previously discussed Table 21 Wireless LAN: 802.1x/WPA for WPA2-PSK Protocol LABEL DESCRIPTION Key Management Choose WPA2-PSK in this field. Protocol WPA Compatible Check this box if you want your G-1000 to support WPA2-PSK and WPA-PSK at the same time.
To access this screen, click the WIRELESS link under ADVANCED and then the RADIUS tab. The screen appears as shown. Figure 26 RADIUS Screen The following table describes the labels in this screen. Table 22 RADIUS Screen LABEL Authentication Server Active Server IP Address Port Number...
G-1000 User’s Guide This chapter discusses how to configure IP on the G-1000 7.1 TCP/IP Parameters 7.1.1 IP Address and Subnet Mask See the IP Address and Subnet Mask The Ethernet parameters of the G-1000 are preset in the factory with the following values: •...
7.2 Configuring IP Click ADVANCED and then IP to display the screen shown next. Figure 27 IP Setup The following table describes the labels in this screen. Table 24 IP Setup LABEL IP Address Assignment Get automatically from DHCP Use fixed IP address IP Address IP Subnet Mask Gateway IP Address...
G-1000 User’s Guide Remote Management Screens This chapter provides information on the Remote Management screens. 8.1 Remote Management Overview Remote management allows you to determine which services/protocols can access which G- 1000 interface (if any) from which computers. You may manage your G-1000 from a remote location via: •...
8.1.2 Remote Management and NAT When NAT is enabled: • Use the G-1000’s WLAN IP address when configuring from the WLAN. • Use the G-1000’s LAN IP address when configuring from the LAN. 8.1.3 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The G-1000 automatically logs you out if the management session remains idle for longer than this timeout period.
G-1000 User’s Guide Table 25 Remote Management: WWW LABEL DESCRIPTION Apply Click Apply to save your customized settings and exit this screen. Reset Click Reset to begin configuring this screen afresh. 8.3 Configuring Telnet You can configure your G-1000 for remote Telnet access as shown next. The administrator uses Telnet from a computer on a remote network to access the G-1000.
Figure 30 Remote Management: Telnet The following table describes the labels in this screen. Table 26 Remote Management: Telnet LABEL Server Port You may change the server port number for a service, if needed; however, you must use the same port number in order to use this service for remote management. Server Access Select the interface(s) through which a computer may access the G-1000 using this service.
G-1000 User’s Guide Figure 31 Remote Management: FTP The following table describes the labels in this screen. Table 27 Remote Management: FTP LABEL DESCRIPTION Server Port You may change the server port number for a service, if needed; however, you must use the same port number in order to use that service for remote management.
Figure 32 SNMP Management Model An SNMP managed network consists of two main types of component: agents and a manager. An agent is a management software module that resides in a managed device (the G-1000). An agent translates the local management information from the managed device into a form compatible with SNMP.
G-1000 User’s Guide 8.6.1 Supported MIBs The G-1000 supports MIB II that is defined in RFC-1213 and RFC-1215 as well as the proprietary ZyXEL private MIB. The focus of the MIBs is to let administrators collect statistical data and monitor status and performance. 8.6.2 SNMP Traps The G-1000 can send the following traps to the SNMP manager.
8.6.3 SNMP Interface Index Some traps include an SNMP interface index. The following table maps the SNMP interface indexes to the G-1000’s physical ports. Table 29 SNMP Interface Index to Physical Port Mapping INTERFACE TYPE enet0 enet1 8.6.4 Configuring SNMP To change your G-1000’s SNMP settings, click REMOTE MGMT, then the SNMP tab.
Page 80
G-1000 User’s Guide Table 30 Remote Management: SNMP LABEL Set Community Trap Community Destination SNMP Service Port Service Access Secured Client IP Address Apply Reset DESCRIPTION Enter the Set community, which is the password for incoming Set requests from the management station. The default is public and allows all requests. Type the trap community, which is the password sent with each trap to the SNMP manager.
G-1000 User’s Guide This chapter contains information about configuring general log settings and viewing the G- 1000’s logs. Refer to the appendix for example log message explanations. 9.1 Configuring View Log The web configurator allows you to look at all of the G-1000’s logs in one location. Click the LOGS links under ADVANCED to open the View Log screen.
Figure 34 View Log The following table describes the labels in this screen. Table 31 View Log LABEL Display Email Log Now Refresh Clear Log Time Message Source Destination Notes 9.2 Configuring Log Settings To change your G-1000’s log settings, click the LOGS links under ADVANCED and then the Log Settings tab.
G-1000 User’s Guide An alert is a type of log that warrants more serious attention. Some categories such as System Errors consist of both logs and alerts. You may differentiate them by their color in the View Log screen. Alerts are displayed in red and logs are displayed in black. Figure 35 Log Settings The following table describes the labels in this screen.
Page 85
Table 32 Log Settings LABEL User NAME Password Syslog Logging Active Syslog Server IP Address Log Facility Send Log Log Schedule Day for Sending Log Time for Sending Log Clear log after sending mail Send Immediate Alert Apply Reset Chapter 9 Log Screens DESCRIPTION This field is effective if SMTP Authentication is checked.
G-1000 User’s Guide This chapter displays system information such as firmware, port IP addresses and port traffic statistics. 10.1 Maintenance Overview The maintenance screens can help you view system information, upload new firmware, manage configuration and restart your G-1000. 10.2 System Status Screen Click MAINTENANCE to open the System Status screen, where you can use to monitor your G-1000.
10.2.1 System Statistics Read-only information here includes port status, packet specific statistics and bridge link status. Also provided are "system up time" and "poll interval(s)". The Poll Interval field is configurable. Figure 37 System Status: Show Statistics The following table describes the labels in this screen. Table 34 System Status: Show Statistics LABEL Port...
G-1000 User’s Guide Figure 38 Association List The following table describes the labels in this screen. Table 35 Association List LABEL MAC Address Association Time Refresh 10.4 F/W Upload Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a "*.bin"...
Figure 39 Firmware Upload The following table describes the labels in this screen. Table 36 Firmware Upload LABEL File Path Browse... Upload After you see the Firmware Upload in Process screen, wait two minutes before logging into the G-1000 again. Figure 40 Firmware Upload In Process The G-1000 automatically restarts in this time causing a temporary network disconnect.
G-1000 User’s Guide Figure 41 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen. If the upload was not successful, the following screen will appear. Click Return to go back to the F/W Upload screen.
Figure 43 Configuration 10.5.1 Backup Configuration Backup configuration allows you to back up (save) the G-1000’s current configuration to a file on your computer. Once your G-1000 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
G-1000 User’s Guide After you see a “restore configuration successful” screen, you must then wait one minute before logging into the G-1000 again. Figure 44 Configuration Upload Successful The G-1000 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.
Figure 46 Configuration Upload Error 10.5.3 Back to Factory Defaults Pressing the Reset button in this section clears all user-entered configuration information and returns the G-1000 to its factory defaults as shown on the screen. The following warning screen will appear. Figure 47 Reset Warning Message You can also press the RESET button on the side panel to reset the factory defaults of your G- 1000.
G-1000 User’s Guide This chapter describes how to access the SMT and provides an overview of its menus 11.1 Connect to your G-1000 Using Telnet The following procedure details how to telnet into your G-1000. 1 In Windows, click Start (usually in the bottom left corner), Run and then type “telnet 192.168.1.2”...
Figure 50 Menu 23.1 System Security: Change Password Menu 23.1 – System Security – Change Password 4 Type your new system password in the New Password field (up to 30 characters), and press [ENTER]. 5 Re-type your new system password in the Retype to confirm field for confirmation and press [ENTER].
G-1000 User’s Guide Table 38 SMT Menus Overview (continued) MENUS SUB MENUS 24 System Maintenance 24.1 Status 24.2 System Information and Console Port Speed 24.3 Log and Trace 24.4 Diagnostic 24.5 Backup Configuration 24.6 Restore Configuration 24.7 Upload Firmware 24.8 Command Interpreter Mode 24.10 Time and Date Setting 24.11 Remote Management Control 11.4 Navigating the SMT Interface...
Type 99, then press [ENTER]. After you enter the password, the SMT displays the main menu, as shown next. Figure 51 G-1000 SMT Main Menu Copyright (c) 1994 - 2005 ZyXEL Communications Corp. Getting Started 1. General Setup 3. LAN Setup Advanced Applications 14.
G-1000 User’s Guide The chapter shows you the information on general setup. Menu 1 – General Setup contains administrative and system-related information (shown next). The System Name field is for identification purposes. It is recommended you type your computer's "Computer name". The Domain Name entry is what is propagated to the DHCP clients on the LAN.
Page 99
Table 41 Menu 1 General Setup FIELD IP Address When you have completed this menu, press [ save your configuration, or press [ Chapter 12 General Setup DESCRIPTION Enter the IP addresses of the DNS servers. This field is available when you select User-Defined in the field above.
G-1000 User’s Guide This chapter shows you how to configure the LAN on your G-1000. 13.1 LAN Setup This section describes how to configure the Ethernet using Menu 3 – LAN Setup. From the main menu, enter 3 to display menu 3. Figure 53 Menu 3 LAN Setup 2.
Figure 54 Menu 3.2 TCP/IP Setup Follow the instructions in the following table on how to configure the fields in this menu. Table 42 Menu 3.2 TCP/IP Setup FIELD DESCRIPTION IP Address Press [SPACE BAR] and then [ENTER] to select Dynamic to have the G-1000 Assignment obtain an IP address from a DHCP server.
Table 43 Menu 3.5 Wireless LAN Setup FIELD DESCRIPTION Key 1 to Key 4 The WEP keys are used to encrypt data. Both the G-1000 and the wireless stations must use the same WEP key for data transmission. If you chose 64-bit WEP in the WEP Encryption field, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F").
G-1000 User’s Guide 1 From the main menu, enter 3 to open Menu 3 – LAN Setup. 2 Enter 5 to display Menu 3.5 – Wireless LAN Setup. Figure 56 Menu 3.5 Wireless LAN Setup Name (SSID)= ZyXEL Hide Name (SSID)= No Channel ID= CH06 2437MHz RTS Threshold= 2432 Frag.
The following table describes the fields in this menu. Table 44 Menu 3.5.1 WLAN MAC Address Filter FIELD DESCRIPTION Active To enable MAC address filtering, press [SPACE BAR] to select Yes and press [ENTER]. Filter Action Define the filter action for the list of MAC addresses in the MAC address filter table. To deny access to the G-1000, press [SPACE BAR] to select Deny Association and press [ENTER].
G-1000 User’s Guide Figure 59 WLAN Roaming Configuration The following table describes the fields in this menu. Table 45 Menu 3.5.4 Bridge Link Configuration FIELD Active Port # When you have completed this menu, press [ENTER] at the prompt “Press ENTER to confirm or ESC to cancel”...
Page 107
G-1000 User’s Guide Chapter 13 LAN Setup...
G-1000 User’s Guide This chapter shows you how to create user accounts on the G-1000. By storing user profiles locally, your G-1000 is able to authenticate wireless users without interacting with a network RADIUS server. Follow the steps below to set up user profiles on your G-1000. From the main menu, enter 14 to display Menu 14 - Dial-in User Setup.
Figure 61 Menu 14.1- Edit Dial-in User Menu 14.1 - Edit Dial-in User User Name= test Active= Yes Password= ******** Press ENTER to Confirm or ESC to Cancel: Leave name field blank to delete profile The following table describes the fields in this screen. Table 46 Menu 14.1- Edit Dial-in User FIELD User Name...
G-1000 User’s Guide This chapter shows you how to use SMT to configure SNMP on the G-1000. To configure SNMP, select option 22 from the main menu to open Menu 22 – SNMP Configuration as shown next. The “community” for Get, Set and Trap fields is SNMP terminology for password.
G-1000 User’s Guide This chapter describes how to configure the system password, an external RADIUS server and 802.1x in SMT. 16.1 System Password Figure 63 Menu 23 System Security Enter Menu Selection Number: You should change the default password. If you forget your password you have to restore the default configuration file.
Figure 65 Menu 23.2 System Security: RADIUS Server The following table describes the fields in this menu. Table 48 Menu 23.2 System Security: RADIUS Server FIELD Authentication Server Active Server Address Port Shared Secret Accounting Server Active Server Address Port Shared Secret When you have completed this menu, press [ENTER] at the prompt “Press ENTER to confirm or ESC to cancel”...
G-1000 User’s Guide 16.3 802.1x The IEEE 802.1x standards outline enhanced security methods for both the authentication of wireless stations and encryption key management. Follow the steps below to enable EAP authentication on your G-1000. 1 From the main menu, enter 23 to display Menu23 – System Security. Figure 66 Menu 23 System Security 1.
Figure 67 Menu 23.4 System Security: IEEE802.1x Wireless Port Control= Authentication Required ReAuthentication Timer (in second)= 41 Idle Timeout (in second)= 3641 Key Management Protocol= 802.1x Dynamic WEP Key Exchange= 64-bit WEP PSK = N/A WPA Mixed Mode= N/A WPA Broadcast/Multicast Key Update Timer= N/A Authentication Databases= RADIUS Only Press Space Bar to Toggle.
Page 116
G-1000 User’s Guide Table 49 Menu 23.4 System Security: IEEE802.1x FIELD Dynamic WEP Key Exchange WPA Mixed Mode WPA Broadcast/ Multicast Key Update Timer Authentication Databases When you have completed this menu, press [ENTER] at the prompt “Press ENTER to confirm or ESC to cancel”...
Page 117
G-1000 User’s Guide Chapter 16 System Security...
G-1000 User’s Guide System Information and This chapter covers the information and diagnostic tools in SMT menus 24.1 to 24.4. These tools include updates on system status, port status, log and trace capabilities and upgrades for the system software. This chapter describes how to use these tools in detail. Type 24 in the main menu and press [ENTER] to open Menu 24 –...
This is the time the G-1000 is up and running from the last reboot. ZyNOS F/W Version Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. ZyNOS is a registered trademark of ZyXEL Communications Corporation. Name This displays the device name.
Menu 1 – General Setup. Refers to the routing protocol used. Refers to the ZyNOS (ZyXEL Network Operating System) system firmware version. ZyNOS is a registered trademark of ZyXEL Communications Corporation. Refers to the country code of the firmware. Refers to the Ethernet MAC (Media Access Control) of your G-1000.
Table 51 Menu 24.2.1 System Maintenance: Information FIELD IP Mask DHCP When you have completed this menu, press [ENTER] at the prompt “Press ENTER to confirm or ESC to cancel” to save your configuration or press [ESC] to cancel and go back to the previous screen. 17.2.2 Console Port Speed Note: The console port is internal and reserved for technician use only.
G-1000 User’s Guide Figure 73 Menu 24.4 System Maintenance: Diagnostic Follow the procedure next to get to display this menu: 1 From the main menu, type 24 to open Menu 24 – System Maintenance. 2 From this menu, type 4. Diagnostic to open Menu 24.4 – System Maintenance – Diagnostic.
Page 123
G-1000 User’s Guide Chapter 17 System Information and Diagnosis...
G-1000 User’s Guide Firmware and Configuration File This chapter tells you how to backup and restore your configuration file as well as upload new firmware and configuration files using the SMT screens. 18.1 Filename Conventions The configuration file (often called the romfile or rom-0) contains the factory default settings in the menus such as password and TCP/IP Setup, etc.
The following table is a summary. Please note that the internal filename refers to the filename on the G-1000 and the external filename refers to the filename not on the G-1000, that is, on your computer, local network or FTP site and so the name (but not the extension) will vary. After uploading new firmware see the ZyNOS F/W Version field in Menu 24.2.1 –...
G-1000 User’s Guide Figure 74 Menu 24.5 Backup Configuration Menu 24.5 – Backup Configuration To transfer the configuration file to your workstation, follow the procedure below: 1. Launch the FTP client on your workstation. 2. Type "open" and the IP address of your router. Then type "root" and SMT password as requested.
Figure 75 FTP Session Example 331 Enter PASS command Password: 230 Logged in ftp> bin 200 Type I OK ftp> get rom-0 zyxel.rom 200 Port command okay 150 Opening data connection for STOR ras 226 File received OK ftp: 327680 bytes sent in 1.10Seconds 297.89Kbytes/sec.
G-1000 User’s Guide 3 Enter command “sys stdio 0” to disable the SMT timeout, so the TFTP transfer will not be interrupted. Enter command “sys stdio 5” to restore the five-minute SMT timeout (default) when the file transfer is complete. 4 Launch the TFTP client on your computer and connect to the G-1000.
1 Display menu 24.5 and enter “y” at the following screen. Figure 76 System Maintenance: Backup Configuration Ready to backup Configuration via Xmodem. Do you want to continue (y/n): 2 The following screen indicates that the Xmodem download has started. Figure 77 System Maintenance: Starting Xmodem Download Screen You can enter ctrl-x to terminate operation any time.
G-1000 User’s Guide System Maintenance and This chapter leads you through SMT menus 24.8 and 24.10. 19.1 Command Interpreter Mode The Command Interpreter (CI) is a part of the main system firmware. The CI provides much of the same functionality as the SMT, while adding some low-level setup and diagnostic functions.
Figure 80 Menu 24 System Maintenance Figure 81 Valid CI Commands Copyright (c) 1994 - 2005 ZyXEL Communications Corp. G-1000> ? Valid commands are: exit config wlan bridge hdap 8021x G-1000> 19.2 Time and Date Setting The G-1000 keeps track of the time and date. There is also a software mechanism to set the time manually or get the current time and date from an external server when you turn on your G-1000.
G-1000 User’s Guide Figure 82 Menu 24.10 System Maintenance: Time and Date Setting Menu 24.10 - System Maintenance - Time and Date Setting Time Protocol= NTP (RFC-1305) Time Server Address= 128.105.39.21 Current Time: New Time (hh:mm:ss): Current Date: New Date (yyyy-mm-dd): Time Zone= GMT Daylight Saving= No Start Date (mm-dd):...
2 When the G-1000 starts up, if there is a timeserver configured in menu 24.10. 3 24-hour intervals after starting. 19.3 Remote Management Setup 19.3.1 Telnet You can configure your G-1000 for remote Telnet access as shown next. Figure 83 Telnet Configuration on a TCP/IP Network 19.3.2 FTP You can upload and download G-1000 firmware and configuration files using FTP.
G-1000 User’s Guide Enter 11, from menu 24, to display Menu 24.11 - Remote Management Control (shown next) Figure 84 Menu 24.11 Remote Management Control TELNET Server: FTP Server: Web Server: SNMP Service: DNS Service: The following table describes the fields in this menu. Table 58 Menu 24.11 Remote Management Control FIELD TELNET Server:...
1 A filter in menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet, FTP or Web service. 2 You have disabled that service in menu 24.11. 3 The IP address in the Secured Client IP field (menu 24.11) does not match the client IP address.
G-1000 User’s Guide This appendix covers potential problems and possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. Problems Starting Up the G-1000 Table 59 Troubleshooting the Start-Up of Your G-1000 PROBLEM CORRECTIVE ACTION None of the LEDs...
Problems with the Password Table 61 Troubleshooting the Password PROBLEM CORRECTIVE ACTION I cannot access the The Password and Username fields are case-sensitive. Make sure that you enter the G-1000. correct password and username using the proper casing. Use the RESET button on the top panel of the G-1000 to restore the factory default configuration file (hold this button in for about 10 seconds or until the link LED turns red).
G-1000 User’s Guide Hardware Table 64 Hardware Power Specification DC 12V 1200mA Operation Temperature 5º C ~ 50º C Storage Temperature -20º C ~ 55º C Operation Humidity 10% to 90% (Non-condensing) Storage Humidity 5% to 95% (Non-condensing) Firmware Table 65 Firmware Standards IEEE 802.3 and 802.3u 10Base-T and 100Base-TX.
Page 139
Table 65 Firmware (continued) Diagnostics Capabilities Management Specifications The access point can perform self-diagnostic tests. These tests check the integrity of the following circuits: FLASH memory. DRAM. Dual Ethernet port. Wireless port. Syslog. Errorlog. Trace log. Packet Log. Embedded Web Configurator management. Command-line interface.
G-1000 User’s Guide Brute-Force Password Guessing The following describes the commands for enabling, disabling and configuring the brute-force password guessing protection mechanism for the password. See on the command structure. Table 66 Brute-Force Password Guessing Protection Commands COMMAND DESCRIPTION sys pwderrtm This command displays the brute-force guessing password protection settings.
G-1000 User’s Guide Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on your computer.
Figure 85 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add. 2 Select Adapter and then click Add.
G-1000 User’s Guide 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click 5 Restart your computer so the changes you made take effect. Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab.
Figure 87 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • • 5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your G-1000 and restart your computer when prompted.
G-1000 User’s Guide Figure 88 Windows XP: Start Menu 2 For Windows XP, click Network Connections. For Windows 2000/NT, click Network and Dial-up Connections. Figure 89 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. Setting up Your Computer’s IP Address...
Figure 90 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and click Properties. Figure 91 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
G-1000 User’s Guide • Figure 92 Windows XP: Advanced TCP/IP Settings 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
• • Figure 93 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click OK to close the Local Area Connection Properties window. 10Turn on your G-1000 and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
G-1000 User’s Guide Figure 94 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 95 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. Setting up Your Computer’s IP Address...
4 For statically assigned settings, do the following: • • • • 5 Close the TCP/IP Control Panel. 6 Click Save if prompted, to save changes to your configuration. 7 Turn on your G-1000 and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the TCP/IP Control Panel window.
G-1000 User’s Guide Figure 97 Macintosh OS X: Network 4 For statically assigned settings, do the following: • • • • 5 Click Apply Now and close the window. 6 Turn on your G-1000 and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
Page 153
G-1000 User’s Guide Setting up Your Computer’s IP Address...
G-1000 User’s Guide IP Address Assignment Conflicts This appendix describes situations where IP address conflicts may occur. Subscribers with duplicate IP addresses will not be able to access the Internet. Case A: The G-1000 is using the same LAN and WAN IP addresses The following figure shows an example where the G-1000 is using a WAN IP address that is the same as the IP address of a computer on the LAN.
Figure 99 IP Address Conflicts: Case B To solve this problem, make sure the G-1000 LAN IP address is not in the DHCP IP address pool. Case C: The Subscriber IP address is the same as the IP address of a network device The following figure depicts an example where the subscriber IP address is the same as the IP address of a network device not attached to the G-1000.
G-1000 User’s Guide In this case, the subscribers are not able to access the Internet. Figure 101 IP Address Conflicts: Case D This problem can be solved by adding a VLAN-enabled switch or set the computers to obtain IP addresses dynamically. IP Address Assignment Conflicts...
Page 157
G-1000 User’s Guide IP Address Assignment Conflicts...
G-1000 User’s Guide Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
G-1000 User’s Guide Figure 103 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
G-1000 User’s Guide Figure 104 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel than an adjacent AP (access point) to reduce interference.
G-1000 User’s Guide Figure 105 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
G-1000 User’s Guide A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size.
IEEE 802.1x In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to support extended authentication as well as providing additional accounting and control features. It is supported by Windows XP and a number of network devices. Some advantages of IEEE 802.1x are: •...
G-1000 User’s Guide • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access- Request message. The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting: •...
G-1000 User’s Guide EAP-TLS (Transport Layer Security) With EAP-TLS, digital certifications are needed by both the server and the wireless stations for mutual authentication. The server presents a certificate to the client. After validating the identity of the server, the client sends a different certificate to the server. The exchange of certificates is done in the open before a secured tunnel is created.
G-1000 User’s Guide For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are often deployed in corporate environments, but for public deployment, a simple user name and password pair is more practical. The following table is a comparison of the features of authentication types.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the data has been tampered with and the packet is dropped.
G-1000 User’s Guide IP Addressing Routers “route” based on the network number. The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (eight bits), written in dotted decimal notation, for example, 192.168.1.1.
Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a value of 0 to 127. Similarly the first octet of a class “B” must begin with “10”, therefore the first octet of a class “B”...
G-1000 User’s Guide Since the mask is always a continuous number of ones beginning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/”...
Divide the network 192.168.1.0 into two separate subnets by converting one of the host ID bits of the IP address to a network number bit. The “borrowed” host ID bit can be either “0” or “1” thus giving two subnets; 192.168.1.0 with mask 255.255.255.128 and 192.168.1.128 with mask 255.255.255.128.
G-1000 User’s Guide Example: Four Subnets The above example illustrated using a 25-bit subnet mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00, 01, 10 and 11. The subnet mask is 26 bits (11111111.11111111.11111111.11000000) or 255.255.255.192.
Table 80 Subnet 4 IP Address IP Address (Binary) Subnet Mask (Binary) Subnet Address: 192.168.1.192 Broadcast Address: 192.168.1.255 Example Eight Subnets Similarly use a 27-bit mask to create 8 subnets (001, 010, 011, 100, 101, 110). The following table shows class C IP address last octet values for each subnet. Table 81 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS...
G-1000 User’s Guide Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets available for subnetting and a class “A” address has three host ID octets (see Table The following table is a summary for class “B”...
G-1000 User’s Guide The following describes how to use the command interpreter. Enter 24 in the main menu to bring up the system maintenance menu. Enter 8 to go to Menu 24.8 - Command Interpreter Mode. See the included disk or zyxel.com for more detailed information on these commands. Note: Use of undocumented commands or misconfiguration can damage the unit and possibly render it unusable.
G-1000 User’s Guide This appendix provides descriptions of example log messages. Table 84 System Maintenance Logs LOG MESSAGE Time calibration is successful Time calibration failed DHCP client gets %s DHCP client IP expired DHCP server assigns %s SMT Login Successfully SMT Login Fail WEB Login Successfully WEB Login Fail...
Table 85 ICMP Notes (continued) TYPE CODE DESCRIPTION Redirect datagrams for the Host Redirect datagrams for the Type of Service and Network Redirect datagrams for the Type of Service and Host Echo Echo message Time Exceeded Time to live exceeded in transit Fragment reassembly time exceeded Parameter Problem Pointer indicates the error...
G-1000 User’s Guide Use sys logs category followed by a log category and a parameter to decide what to record Table 87 Log Categories and Available Settings LOG CATEGORIES error mten to not record logs for that category, category, and to record both logs and alerts for that category.
G-1000 User’s Guide Antenna Selection and Positioning An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Choosing the right antennas and positioning them properly increases the range and coverage area of a wireless LAN.
• Omni-directional antennas send the RF signal out in all directions on a horizontal plane. The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a room environment. With a wide coverage area, it is possible to make circular overlapping coverage areas with multiple access points.
G-1000 User’s Guide Power Adaptor Specifications Table 88 NORTH AMERICAN PLUG STANDARDS AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Table 89 NORTH AMERICAN PLUG STANDARDS AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Table 90 EUROPEAN PLUG STANDARDS AC Power Adaptor Model...
Table 93 AUSTRALIA AND NEW ZEALAND PLUG STANDARDS AC Power Adaptor Model Input Power Output Power Power Consumption Safety Standards Power Adaptor Specifications G-1000 User’s Guide AD-1201200DS or AD-121200DS AC240Volts/50Hz/0.2A DC12Volts/1.2A 10 W NATA (AS 3260)
Page 188
ZyAIR G-3000 User’s Guide Numerics 110V AC 230V AC Abnormal Working Conditions Accessories Acts of God Address Assignment 43, 70 Airflow Alternative Subnet Mask Notation Antenna Directional Omni-directional Antenna gain AP (access point) Applications Authentication databases Authority Auto-crossover Ethernet/Fast Ethernet Interface Auto-negotiating Ethernet/Fast Ethernet Interface auto-negotiation Backup...
Page 189
Default Defective Denmark, Contact Information DHCP Diagnostic Diagnostic Tools Disclaimer Discretion Distribution System (DS) Dust Dynamic WEP Key Exchange 29, 50 EAP Authentication Electric Shock Electrocution Encryption Equal Value ESS ID Europe Exposure Extended Service Set Extended Service Set IDentification Failure Compliance Rules, Part 15...
Page 190
ZyAIR G-3000 User’s Guide Link type Liquids, Corrosive Log Descriptions Logs MAC address MAC Address Filter Action 58, 105 MAC Address Filtering MAC Filter MAC filter MAC Filtering MAC service data unit Main Menu Management Information Base (MIB) Materials Max. Frame Burst Merchantability Modifications Mouse Action Sequences...
Page 191
Registered Registered Trademark Regular Mail Related Documentation Relocate Re-manufactured Remote Authentication Dial In User Service Remote Management and NAT Remote Management Limitations 72, 134 Remote Management Setup Remote Node Removing Reorient Repair 5, 6 Replace Replacement Reproduction Required fields Reset Button Restore 6, 91 Return Material Authorization (RMA) Number...
Page 192
RADIUS Application Example WPA -Pre-Shared Key WPA with RADIUS Application WPA, WPA2 WPA-PSK WPA-PSK Application Written Permission ZyAIR LED ZyNOS 2, 125 ZyNOS F/W Version ZyXEL Communications Corporation ZyXEL Home Page ZyXEL Limited Warranty Note ZyXEL Network Operating System...
Need help?
Do you have a question about the ZyXEL ZyAIR G-1000 and is the answer not in the manual?
Questions and answers