ZyXEL Communications NBG417N User Manual

ZyXEL Communications NBG417N User Manual

Wireless n-lite 3g router
Hide thumbs Also See for NBG417N:
Table of Contents

Advertisement

Quick Links

NBG4115
Wireless N-lite 3G Router
Default Login Details
IP Address
http://192.168.1.1
Password
Firmware Version 1.0
Edition 2, 7/2009
www.zyxel.com
www.zyxel.com
1234
Copyright © 2009
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NBG417N and is the answer not in the manual?

Questions and answers

Summary of Contents for ZyXEL Communications NBG417N

  • Page 1 NBG4115 Wireless N-lite 3G Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 2, 7/2009 www.zyxel.com www.zyxel.com Copyright © 2009 ZyXEL Communications Corporation...
  • Page 2: About This User's Guide

    About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NBG4115 using the Web Configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: •...
  • Page 3 About This User's Guide Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com.
  • Page 4 About This User's Guide Customer Support Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information.
  • Page 5: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 6 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG4115 icon is not an exact representation of your device. NBG4115 Computer Notebook computer Server DSLAM Firewall Telephone Switch Router Modem User’s Guide...
  • Page 7: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 8: Table Of Contents

    Contents Overview Contents Overview Introduction ..........................19 Introduction ..........................21 The WPS Button ........................25 The Web Configurator ....................... 27 Connection Wizard ........................39 AP Mode ............................ 55 Tutorials ............................. 63 Network ........................... 79 Wireless LAN ..........................81 WAN ............................101 LAN ............................115 DHCP Server ..........................119 NAT ............................
  • Page 9 Contents Overview User’s Guide...
  • Page 10: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................6 Safety Warnings........................8 Contents Overview ........................9 Table of Contents........................11 Part I: Introduction................. 19 Chapter 1 Introduction ..........................21 1.1 Overview ..........................21 1.2 Applications ......................... 21 1.3 Ways to Manage the NBG4115 ...................
  • Page 11 Table of Contents 4.1 Overview ..........................39 4.2 Wizard Setup ........................39 4.3 STEP 1: System Information ....................40 4.3.1 System Name ......................40 4.3.2 Domain Name ......................41 4.4 STEP 2: Wireless LAN ......................42 4.4.1 Extend (WPA-PSK or WPA2-PSK) Security ............... 43 4.5 STEP 3: Internet Configuration ....................
  • Page 12 Table of Contents 6.6.3 Bandwidth Management by IP or IP Range ............... 76 Part II: Network..................79 Chapter 7 Wireless LAN........................... 81 7.1 Overview ..........................81 7.1.1 What You Can Do in this Chapter ................82 7.1.2 What You Should Know ..................... 82 7.2 General ..........................
  • Page 13 Table of Contents 10.1 Overview ...........................119 10.1.1 What You Can Do in this Chapter ................119 10.1.2 What You Need To Know ..................119 10.2 General ..........................120 10.3 Advanced ........................121 10.4 Client List ........................122 Chapter 11 NAT............................125 11.1 Overview ........................
  • Page 14 Table of Contents 14.1 Overview .......................... 147 14.1.1 What You Can Do in this Chapter ................147 14.1.2 What You Need To Know ..................147 14.2 Filter ..........................148 14.3 Technical Reference ......................149 14.3.1 Customizing Keyword Blocking URL Checking ............149 Part IV: Management................
  • Page 15 Table of Contents 18.2 General ..........................170 18.3 Technical Reference ......................171 18.3.1 Installing UPnP in Windows XP ................171 Part V: Maintenance and Troubleshooting ........179 Chapter 19 System ........................... 181 19.1 Overview .......................... 181 19.1.1 What You Can Do in this Chapter ................181 19.2 General ..........................
  • Page 16 Table of Contents Chapter 24 Troubleshooting........................201 24.1 Overview .......................... 201 24.2 Power, Hardware Connections, and LEDs ..............201 24.3 NBG4115 Access and Login .................... 202 24.4 Internet Access ........................ 204 24.5 Resetting the NBG4115 to Its Factory Defaults ............... 206 24.6 Wireless Router/AP Troubleshooting ................
  • Page 17 Table of Contents User’s Guide...
  • Page 18: Introduction

    Introduction Introduction (21) The WPS Button (25) The Web Configurator (27) Connection Wizard (39) AP Mode (55) Tutorials (63)
  • Page 20: Introduction

    H A P T E R Introduction 1.1 Overview This chapter introduces the main features and applications of the NBG4115. The NBG4115 extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/n compatible devices.
  • Page 21: Ways To Manage The Nbg4115

    Chapter 1 Introduction 1.3 Ways to Manage the NBG4115 Use any of the following methods to manage the NBG4115. • WPS (Wi-Fi Protected Setup). You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL Device. •...
  • Page 22 Chapter 1 Introduction The following table describes the LEDs and the WPS button. Table 1 Front Panel LEDs and WPS Button COLOR STATUS DESCRIPTION POWER Green The NBG4115 is receiving power and functioning properly. The NBG4115 is not receiving power. WLAN Green The NBG4115 is ready, but is not sending/...
  • Page 23 Chapter 1 Introduction User’s Guide...
  • Page 24: The Wps Button

    H A P T E R The WPS Button 2.1 Overview Your NBG4115 supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
  • Page 25 Chapter 2 The WPS Button User’s Guide...
  • Page 26: The Web Configurator

    H A P T E R The Web Configurator 3.1 Overview This chapter describes how to access the NBG4115 Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG4115 via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions or Safari 2.0 or later versions.
  • Page 27 Chapter 3 The Web Configurator Type "1234" (default) as the password and click Login. In some versions, the default password appears automatically - if this is the case, click Login. You should see a screen asking you to change your password (highly recommended) as shown next.
  • Page 28: Resetting The Nbg4115

    Chapter 3 The Web Configurator • Select a language to go to the basic Web Configurator in that language. To change to the advanced configurator see Chapter 23 on page 199. Figure 4 Selecting the setup mode 3.3 Resetting the NBG4115 If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the NBG4115 to reload the factory-default configuration file.
  • Page 29: The Status Screen In Router Mode

    Chapter 3 The Web Configurator 3.5 The Status Screen in Router Mode Click on Status. The screen below shows the status screen in Router Mode. (For information on the status screen in AP Mode see Chapter 5 on page 56.) Figure 5 Web Configurator Status Screen The following table describes the icons shown in the Status screen.
  • Page 30 Chapter 3 The Web Configurator The following table describes the labels shown in the Status screen. Table 3 Web Configurator Status Screen LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen.
  • Page 31: Navigation Panel

    Chapter 3 The Web Configurator Table 3 Web Configurator Status Screen (continued) LABEL DESCRIPTION - Memory Usage This shows what percentage of the heap memory the NBG4115 is using. System Setting - Firewall This shows whether the firewall is active or not. - Bandwidth This shows whether bandwidth management is enabled or not.
  • Page 32 Chapter 3 The Web Configurator Table 4 Screens Summary LINK FUNCTION Wireless LAN General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the NBG4115 to block access to devices or block the devices from accessing the NBG4115.
  • Page 33: Summary: Dhcp Table

    Chapter 3 The Web Configurator Table 4 Screens Summary LINK FUNCTION Bandwidth General Use this screen to use pre-configured bandwidth Management management profiles for how your NBG4115 manages incoming and outgoing data. Advanced Use this screen to create your own bandwidth management profile for how your NBG4115 manages incoming and outgoing data.
  • Page 34: Summary: Packet Statistics

    Chapter 3 The Web Configurator DHCP client information (including IP Address, Host Name and MAC Address) of all network clients using the NBG4115’s DHCP server. Figure 6 Summary: DHCP Table The following table describes the labels in this screen. Table 5 Summary: DHCP Table LABEL DESCRIPTION This is the index number of the host computer.
  • Page 35: Summary: Wlan Station Status

    Chapter 3 The Web Configurator The following table describes the labels in this screen. Table 6 Summary: Packet Statistics LABEL DESCRIPTION Port This is the NBG4115’s port type. Status For the LAN ports, this displays the port speed and duplex setting or Down when the line is disconnected.
  • Page 36 Chapter 3 The Web Configurator The following table describes the labels in this screen. Table 7 Summary: Wireless Association List LABEL DESCRIPTION This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station. Association Time This field displays the time a wireless station first associated with the NBG4115’s WLAN network.
  • Page 37 Chapter 3 The Web Configurator User’s Guide...
  • Page 38: Connection Wizard

    H A P T E R Connection Wizard 4.1 Overview This chapter provides information on the wizard setup screens in the Web Configurator. 4.2 Wizard Setup The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP (Internet Service Provider) checklist in the Quick Start Guide to know what to enter in each field.
  • Page 39: Step 1: System Information

    Chapter 4 Connection Wizard Choose a language by clicking on the language’s button. The screen will update. Click the Next button to proceed to the next screen. Figure 10 Select a Language Read the on-screen information and click Next. Figure 11 Welcome to the Connection Wizard 4.3 STEP 1: System Information System Information contains administrative and system-related information.
  • Page 40: Domain Name

    Chapter 4 Connection Wizard 4.3.2 Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System Name) on each individual computer, the domain name can be assigned from the NBG4115 via DHCP.
  • Page 41: Step 2: Wireless Lan

    Chapter 4 Connection Wizard 4.4 STEP 2: Wireless LAN Set up your wireless LAN using the following screen. Figure 13 Wizard Step 2: Wireless LAN The following table describes the labels in this screen. Table 9 Wizard Step 2: Wireless LAN LABEL DESCRIPTION Name...
  • Page 42: Extend (Wpa-Psk Or Wpa2-Psk) Security

    Chapter 4 Connection Wizard Note: The wireless stations and NBG4115 must use the same SSID, channel ID, WPA-PSK (if WPA-PSK is enabled) or WPA2-PSK (if WPA2-PSK is enabled) for wireless communication. 4.4.1 Extend (WPA-PSK or WPA2-PSK) Security Choose Extend (WPA-PSK) or Extend (WPA2-PSK) security in the Wireless LAN setup screen to set up a Pre-Shared Key.
  • Page 43: Ethernet Connection

    Chapter 4 Connection Wizard Note: When you select Mobile 3G, then all WAN connections are made through this. Check with your ISP to make sure you use the correct type. This wizard screen varies according to the connection type that you select. Figure 15 Wizard Step 3: ISP Parameters.
  • Page 44: Pppoe Connection

    Chapter 4 Connection Wizard 4.5.2 PPPoE Connection Point-to-Point Protocol over Ethernet (PPPoE) functions as a dial-up connection. PPPoE is an IETF (Internet Engineering Task Force) standard specifying how a host personal computer interacts with a broadband modem (for example DSL, cable, wireless, etc.) to achieve access to high-speed data networks.
  • Page 45: Pptp Connection

    Chapter 4 Connection Wizard Table 12 Wizard Step 3: PPPoE Connection LABEL DESCRIPTION Next Click Next to continue. Exit Click Exit to close the wizard screen without saving. 4.5.3 PPTP Connection Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks.
  • Page 46 Chapter 4 Connection Wizard Table 13 Wizard Step 3: PPTP Connection LABEL DESCRIPTION User Name Type the user name given to you by your ISP. Password Type the password associated with the User Name above. PPTP Configuration Server IP Type the IP address of the PPTP server. Address Connection ID/ Enter the connection ID or connection name in this field.
  • Page 47: Mobile 3G

    Chapter 4 Connection Wizard 4.5.4 Mobile 3G Mobile 3G is a set of international “third generation” standards for the sending and receiving of voice, video, and wireless data in a mobile environment. For the NBG4115, this type of wireless connection requires a connected 3G-compatible USB device (see the included Quick Start Guide for installation information), and a 3G account with your local ISP.
  • Page 48: Your Ip Address

    Chapter 4 Connection Wizard 4.5.5 Your IP Address The following wizard screen allows you to assign a fixed IP address or give the NBG4115 an automatically assigned IP address depending on your ISP. Figure 20 Wizard Step 3: Your IP Address The following table describes the labels in this screen Table 15 Wizard Step 3: Your IP Address LABEL...
  • Page 49: Ip Address And Subnet Mask

    Chapter 4 Connection Wizard local networks. On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses. Note: Regardless of your particular situation, do not create an arbitrary IP address; always follow the guidelines above.
  • Page 50: Wan Ip And Dns Server Address Assignment

    Chapter 4 Connection Wizard The ISP tells you the DNS server addresses, usually in the form of an information sheet, when you sign up. If your ISP gives you DNS server addresses, enter them in the DNS Server fields in the Wizard and/or WAN > Internet Connection screen.
  • Page 51: Wan Mac Address

    Chapter 4 Connection Wizard Table 17 Wizard Step 3: WAN IP and DNS Server Addresses LABEL DESCRIPTION First DNS Server Enter the DNS server's IP address in the fields provided. Second DNS Server If you do not configure a system DNS server, you must use IP addresses when configuring DDNS and the time server.
  • Page 52: Connection Wizard Complete

    Chapter 4 Connection Wizard The following table describes the fields in this screen. Table 19 Wizard Step 3: WAN MAC Address LABEL DESCRIPTION Factory Default Select Factory Default to use the factory assigned default MAC address. Clone the Select this option and enter the IP address of the computer on the computer’s MAC LAN whose MAC you are cloning.
  • Page 53 Chapter 4 Connection Wizard User’s Guide...
  • Page 54: Ap Mode

    H A P T E R AP Mode 5.1 Overview This chapter discusses how to configure settings while your NBG4115 is set to AP Mode. Many screens that are available in Router Mode are not available in AP Mode. Note: See Chapter 6 on page 63 for an example of setting up a wireless network in AP mode.
  • Page 55: The Status Screen In Ap Mode

    Chapter 5 AP Mode To set your NBG4115 to AP Mode, go to Maintenance > Sys OP Mode > General and select Access Point. Figure 25 Maintenance > Sys OP Mode > General A pop-up appears providing information on this mode. Click OK in the pop-up message window.
  • Page 56 Chapter 5 AP Mode The following table describes the labels shown in the Status screen. Table 20 Web Configurator Status Screen LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen.
  • Page 57: Navigation Panel

    Chapter 5 AP Mode Table 20 Web Configurator Status Screen (continued) LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WLAN, it displays the maximum transmission rate when the WLAN is enabled and N/A when the WLAN is disabled.
  • Page 58: Lan Settings

    Chapter 5 AP Mode Table 21 Screens Summary LINK FUNCTION Wireless General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the NBG4115 to block access to devices or block the devices from accessing the NBG4115.
  • Page 59: Wlan And Maintenance Settings

    Chapter 5 AP Mode Note: If you change the IP address of the NBG4115 in the screen below, you will need to log into the NBG4115 again using the new IP address. Figure 28 Network > LAN > IP The table below describes the labels in the screen. Table 22 Network >...
  • Page 60: Logging In While In Ap Mode

    Chapter 5 AP Mode 5.6 Logging in while in AP Mode Connect your computer to the LAN port of the NBG4115. The default IP address of the NBG4115 is “192.168.1.2”. In this case, your computer must have an IP address in the range between “192.168.1.3” and “192.168.1.254”.
  • Page 61 Chapter 5 AP Mode User’s Guide...
  • Page 62: Tutorials

    H A P T E R Tutorials 6.1 Overview This chapter provides tutorials for setting up your NBG4115. 6.2 Set Up a 3G Connection This section shows you how to make a 3G connection with your NBG4115. There are two ways to set up your 3G options. Use the Wizard, which was introduced in the Quick Start Guide.
  • Page 63 Chapter 6 Tutorials FIELD DESCRIPTION EXAMPLE User Name This is your account user name. dcmchale 0b1ken@kashiik.org Password This is your account user name’s ***** password. To set up a 3G connection: Connect to the Web Configurator, as described in the Quick Start Guide. When presented with the option to choose either Wizard or Advanced, click Go to Advanced setup.
  • Page 64: Set Up The Nbg4115 For Gaming

    Chapter 6 Tutorials From the Connection Type menu, select Mobile 3G then configure your 3G settings when the screen updates itself.f Click Apply to save your changes, then exit the Web Configurator. Note: Once you set up and enable a 3G device, all incoming and outgoing network connections are made through it and not the WAN port on your NBG4115.
  • Page 65 Chapter 6 Tutorials Bandwidth management allows you to set up custom parameters on the NBG4115 so that whenever you play a game, the QoS is automatically upgraded to the highest priority in order to ensure your game data packets are plucked first from the pool of incoming information and sent on ahead of lower priority packets.
  • Page 66 Chapter 6 Tutorials Enable the Gaming check box and set its Priority to High. The following gaming ports are preconfigured on your NBG4115 and are enabled when you select the ‘gaming’ Service in the Management > Bandwidth MGMT > Advanced screen: Table 23 Preconfigured Gaming Ports APPLICATION TCP PORTS...
  • Page 67: Set Up A Wireless Network With Wps

    Chapter 6 Tutorials To create a custom QoS setting for a specific game, enter the following information in the first available custom Priority Queue line: Service: This is the name by which your custom service is labled. It can be anything with the limitation that it cannot be longer than 10 characters.
  • Page 68 Chapter 6 Tutorials In the wireless client utility, find the WPS settings. Enable WPS and press the WPS button (Start or WPS button) Log into NBG4115’s Web Configurator and press the Push Button button in the Network > Wireless Client > WPS Station screen. Note: Your NBG4115 has a WPS button located on its panel, as well as a WPS button in its configuration utility.
  • Page 69: Pin Configuration

    Chapter 6 Tutorials 6.4.2 PIN Configuration When you use the PIN configuration method, you need to use both NBG4115’s configuration interface and the client’s utilities. Launch your wireless client’s configuration utility. Go to the WPS settings and select the PIN method to get a PIN number. Enter the PIN number to the PIN field in the Network >...
  • Page 70: Configure Wireless Security Without Wps

    Chapter 6 Tutorials 6.5 Configure Wireless Security without WPS This example shows you how to configure wireless security settings with the following parameters on your NBG4115. SSID SSID_Example3 Channel Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your NBG4115. The instructions require that your hardware is connected (see the Quick Start Guide) and you are logged into the Web Configurator through your LAN connection (see...
  • Page 71: Configure Your Notebook

    Chapter 6 Tutorials Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. Figure 32 Tutorial: Status Screen 6.5.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client.
  • Page 72 Chapter 6 Tutorials Select SSID_Example3 and click Connect. Figure 33 Connecting a Wireless Client to a Wireless Network t Select WPA-PSK and type the security key in the following screen. Click Next. Figure 34 Security Settings The Confirm Save window appears. Check your settings and click Save to continue.
  • Page 73: Bandwidth Management

    Chapter 6 Tutorials Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide. Figure 36 Link Status If your connection is successful, open your Internet browser and enter http:// www.zyxel.com or the URL of any other web site in the address bar.
  • Page 74: Custom Bandwidth Management

    Chapter 6 Tutorials In the following screen, you set the priorities for VoIP and e-mail. Figure 37 Tutorial: Priority Queue Click Enable for the VoIP (SIP) service and set priority to High. Do the same for E-mail. For the rest of the applications, click Enable if you need these services and set the priority to Low.
  • Page 75: Bandwidth Management By Ip Or Ip Range

    Chapter 6 Tutorials Click Enable in one of the fields for additional services. Add MSN as the service name. Set the priority for this to High. For the port, choose TCP from the drop-down menu and enter 1863 in the Specific Port field.
  • Page 76 Chapter 6 Tutorials Enter the following values for each service you want to add. For this tutorial, you need to add each of the following service (see table below) and click Apply. Table 24 SERVICES FIELDS REAL AUDIO RTSP VDO LIVE Active Check this to turn on this bandwidth management rule.
  • Page 77 Chapter 6 Tutorials User’s Guide...
  • Page 78: Network

    Network Wireless LAN (81) WAN (101) LAN (115) DHCP Server (119) NAT (125) DDNS (135)
  • Page 80: Wireless Lan

    H A P T E R Wireless LAN 7.1 Overview This chapter discusses how to configure the wireless network settings in your NBG4115. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 41 Example of a Wireless Network The wireless network is the part in the blue circle.
  • Page 81: What You Can Do In This Chapter

    Chapter 7 Wireless LAN 7.1.1 What You Can Do in this Chapter • Use the General screen (Section 7.2 on page 85) to enable the Wireless LAN, enter the SSID and select the wireless security mode. • Use the MAC Filter screen (Section 7.3 on page 90) to allow or deny wireless stations based on their MAC addresses from connecting to the NBG4115.
  • Page 82 Chapter 7 Wireless LAN This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network. MAC Address Filter Every wireless client has a unique identification number, called a MAC address.
  • Page 83 Chapter 7 Wireless LAN Local user databases also have an additional limitation that is explained in the next section. Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message.
  • Page 84: General

    Chapter 7 Wireless LAN Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key. WiFi Protected Setup (WPS) is an industry standard specification, defined by the WiFi Alliance.
  • Page 85 Chapter 7 Wireless LAN The following table describes the general wireless LAN labels in this screen. Table 26 Network > Wireless LAN > General LABEL DESCRIPTION Enable Click the check box to activate wireless LAN. Wireless LAN Name(SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated.
  • Page 86: No Security

    Chapter 7 Wireless LAN 7.2.1 No Security Select No Security to allow wireless stations to communicate with the access points without any data encryption. Note: If you do not enable any wireless security on your NBG4115, your network is accessible to any wireless networking device that is within range. Figure 43 Network >...
  • Page 87 Chapter 7 Wireless LAN In order to configure and enable WEP encryption; click Network > Wireless LAN to display the General screen. Select Static WEP from the Security Mode list. Figure 44 Network > Wireless LAN > General: Static WEP The following table describes the wireless LAN security labels in this screen.
  • Page 88: Wpa-Psk/Wpa2-Psk

    Chapter 7 Wireless LAN Table 28 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Select this option in order to enter hexadecimal characters as a WEP key. The preceding "0x", that identifies a hexadecimal key, is entered automatically. Key 1 to Key The WEP keys are used to encrypt data.
  • Page 89: Mac Filter

    Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 29 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK LABEL DESCRIPTION This check box is available only when you select WPA2-PSK in the Compatible Security Mode field. Select the check box to have both WPA2 and WPA wireless clients be able to communicate with the NBG4115 even when the NBG4115 is using WPA2-PSK.
  • Page 90 Chapter 7 Wireless LAN To change your NBG4115’s MAC filter settings, click Network > Wireless LAN > MAC Filter. The screen appears as shown. Figure 46 Network > Wireless LAN > MAC Filter The following table describes the labels in this menu. Table 30 Network >...
  • Page 91: Advanced

    Chapter 7 Wireless LAN 7.4 Advanced Click Network > Wireless LAN > Advanced. The screen appears as shown. Figure 47 Network > Wireless LAN > Advanced The following table describes the labels in this screen. Table 31 Network > Wireless LAN > Advanced LABEL DESCRIPTION Wireless Advanced Setup...
  • Page 92 Chapter 7 Wireless LAN Table 31 Network > Wireless LAN > Advanced LABEL DESCRIPTION When set to None, the NBG4115 protects wireless communication against Protection interference. When set to Always, the NBG4115 improves performance within mixed wireless modes. Select Auto to let the NBG4115 determine whether to turn this feature on or off in the current environment.
  • Page 93: Qos

    Chapter 7 Wireless LAN 7.5 QoS The QoS screen allows you to automatically give a service (such as e-mail, VoIP or FTP) a priority level. Click Network > Wireless LAN > QoS. The following screen appears. Figure 48 Network > Wireless LAN > QoS The following table describes the labels in this screen.
  • Page 94: Application Priority Configuration

    Chapter 7 Wireless LAN Table 32 Network > Wireless LAN > QoS (continued) LABEL DESCRIPTION Dest Port This field displays the destination port number to which the application sends traffic. Priority This field displays the priority of the application. Highest - Typically used for voice or video that should be high- quality.
  • Page 95 Chapter 7 Wireless LAN Network > Wireless LAN > QoS: Application Priority Configuration (continued) LABEL DESCRIPTION Service The following is a description of the applications you can prioritize with WMM QoS. Select a service from the drop-down list box. • E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals.
  • Page 96: Wps

    Chapter 7 Wireless LAN 7.6 WPS Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status. To open this screen, click Network > Wireless LAN > WPS tab. Figure 50 WPS The following table describes the labels in this screen. Table 33 WPS LABEL DESCRIPTION...
  • Page 97: Wps Station

    Chapter 7 Wireless LAN Table 33 WPS LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG4115. Refresh Click Refresh to get this screen information afresh. 7.7 WPS Station Use this screen when you want to add a wireless station using WPS. To open this screen, click Network >...
  • Page 98: Scheduling

    Chapter 7 Wireless LAN 7.8 Scheduling Use this screen to set the times your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. The wireless LAN can be scheduled to turn on or off on certain days and at certain times. To open this screen, click Network >...
  • Page 99 Chapter 7 Wireless LAN Table 35 Scheduling LABEL DESCRIPTION Except for the Select a begin time using the first set of hour and minute (min) drop following times down boxes and select an end time using the second set of hour and (24-Hour minute (min) drop down boxes.
  • Page 100: Wan

    H A P T E R 8.1 Overview This chapter discusses the NBG4115’s WAN screens. Use these screens to configure your NBG4115 for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks (such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.
  • Page 101: What You Need To Know

    Chapter 8 WAN 8.2.1 What You Need To Know The following terms and concepts may help as you read through this chapter. Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
  • Page 102 Chapter 8 WAN WAN MAC Address The MAC address screen allows users to configure the WAN port's MAC address by either using the factory default or cloning the MAC address from a computer on your LAN. Choose Factory Default to select the factory assigned default MAC Address.
  • Page 103 Chapter 8 WAN up services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls. However it may sometimes be necessary to allow NetBIOS packets to pass through to the WAN in order to find a computer on the WAN. Auto-Bridge In the rear panel of your NBG4115, you can see four LAN ports (1 to 2) and one WAN port.
  • Page 104: Internet Connection

    Chapter 8 WAN 8.3 Internet Connection Use this screen to change your NBG4115’s Internet access settings. Click Network > WAN. The screen differs according to the connection you choose. 8.3.1 Ethernet This screen displays when you select the Ethernet connection type. Figure 55 Network >...
  • Page 105: Pppoe

    Chapter 8 WAN Table 36 Network > WAN > Internet Connection: Ethernet LABEL DESCRIPTION IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address. IP Subnet Enter the IP Subnet Mask in this field. Mask Gateway IP Enter a Gateway IP Address (if your ISP gave you one) in this field.
  • Page 106 Chapter 8 WAN One of the benefits of PPPoE is the ability to let you access one of multiple network services, a function known as dynamic service selection. This enables the service provider to easily create and offer new IP services for individuals. Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires no specific configuration of the broadband modem at the customer site.
  • Page 107: Pptp

    Chapter 8 WAN Table 37 Network > WAN > Internet Connection: PPPoE LABEL DESCRIPTION Password Type the password associated with the user name above. Retype to Type your password again to make sure that you have entered is Confirm correctly. Nailed-Up Select Nailed-Up Connection if you do not want the connection to time Connection...
  • Page 108 Chapter 8 WAN This screen displays when you select the PPTP connection type. Figure 57 Network > WAN > Internet Connection: PPTP The following table describes the labels in this screen. Table 38 Network > WAN > Internet Connection: PPTP LABEL DESCRIPTION ISP Parameters for Internet Access...
  • Page 109 Chapter 8 WAN Table 38 Network > WAN > Internet Connection: PPTP LABEL DESCRIPTION Password Type the password associated with the User Name above. Retype to Confirm Type your password again to make sure that you have entered is correctly. Nailed-up Select Nailed-Up Connection if you do not want the connection to Connection...
  • Page 110: Mobile 3G

    Chapter 8 WAN Table 38 Network > WAN > Internet Connection: PPTP LABEL DESCRIPTION Clone the Select Clone the computer's MAC address - IP Address and computer’s MAC enter the IP address of the computer on the LAN whose MAC you address - IP are cloning.
  • Page 111 Chapter 8 WAN The following table describes the labels in this screen. Table 39 Network > WAN > Internet Connection: Mobile 3G LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type 3G is . To configure a Mobile 3G client, you must configure the User Name and Password fields as well as PIN Code, APN Code, and Dial Number.
  • Page 112: Advanced

    Chapter 8 WAN Table 39 Network > WAN > Internet Connection: Mobile 3G LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG4115. Reset Click Reset to begin configuring this screen afresh. 8.4 Advanced Use this screen to enable Multicast, allow Windows Networking and enable Auto-bridge.
  • Page 113 Chapter 8 WAN Table 40 WAN > Advanced LABEL DESCRIPTION Allow between LAN Select this check box to forward NetBIOS packets from the LAN to and WAN the WAN and from the WAN to the LAN. If your firewall is enabled with the default policy set to block WAN to LAN traffic, you also need to enable the default WAN to LAN firewall rule that forwards NetBIOS traffic.
  • Page 114: Lan

    H A P T E R 9.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 115 Chapter 9 LAN LAN and WAN IP Addresses The actual physical connection determines whether the NBG4115 ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 60 LAN and WAN IP Addresses The LAN parameters of the NBG4115 are preset in the factory with the following values:...
  • Page 116 Chapter 9 LAN 9.3 IP Use this screen to change your basic LAN settings. Click Network > LAN. Figure 61 Network > LAN > IP The following table describes the labels in this screen. Table 41 Network > LAN > IP LABEL DESCRIPTION IP Address...
  • Page 117 Chapter 9 LAN User’s Guide...
  • Page 118: Dhcp Server

    H A P T E R DHCP Server 10.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG4115’s LAN as a DHCP server or disable it. When configured as a server, the NBG4115 provides the TCP/IP configuration for the clients.
  • Page 119: General

    Chapter 10 DHCP Server 10.2 General Use this screen to enable the DHCP server. Click Network > DHCP Server. The following screen displays. Figure 62 Network > DHCP Server > General The following table describes the labels in this screen. Table 42 Network >...
  • Page 120: Advanced

    Chapter 10 DHCP Server 10.3 Advanced This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses. You can also use this screen to configure the DNS server information that the NBG4115 sends to the DHCP clients.
  • Page 121: Client List

    Chapter 10 DHCP Server Table 43 Network > DHCP Server > Advanced LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG4115's WAN IP address). The field to the Second DNS right displays the (read-only) DNS server IP address that the ISP Server assigns.
  • Page 122 Chapter 10 DHCP Server The following screen displays. Figure 64 Network > DHCP Server > Client List The following table describes the labels in this screen. Table 44 Network > DHCP Server > Client List LABEL DESCRIPTION This is the index number of the host computer. IP Address This field displays the IP address relative to the # field listed above.
  • Page 123 Chapter 10 DHCP Server User’s Guide...
  • Page 124: Nat

    H A P T E R 11.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network.
  • Page 125: What You Can Do In This Chapter

    Chapter 11 NAT 11.1.1 What You Can Do in this Chapter • Use the General (Section 11.2 on page 128) screen to enable NAT and set a default server. • Use the Application (Section 11.3 on page 129) screen to change your NBG4115’s port forwarding settings.
  • Page 126 Chapter 11 NAT What NAT Does In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host.
  • Page 127: General

    Chapter 11 NAT 11.2 General Use this screen to enable NAT and set a default server. Click Network > NAT to open the General screen. Figure 67 Network > NAT > General The following table describes the labels in this screen. Table 46 Network >...
  • Page 128: Application

    Chapter 11 NAT 11.3 Application Port forwarding allows you to define the local servers to which the incoming services will be forwarded. To change your NBG4115’s port forwarding settings, click Network > NAT > Application. The screen appears as shown. Note: If you do not assign a Default Server IP address in the NAT >...
  • Page 129 Chapter 11 NAT Table 47 NAT Application (continued) LABEL DESCRIPTION Local Port Enter the start and end port(s) to be forwarded. Range Public Port Range Server IP Type the inside IP address of the server that receives packets from the Address port(s) specified in the Port field.
  • Page 130: Advanced

    Chapter 11 NAT 11.4 Advanced To change your NBG4115’s trigger port settings, click Network > NAT > Advanced. The screen appears as shown. Note: Only one LAN computer can use a trigger port (range) at a time. Figure 69 Network > NAT > Advanced The following table describes the labels in this screen.
  • Page 131: Technical Reference

    Chapter 11 NAT Table 48 Network > NAT > Advanced LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG4115. Reset Click Reset to begin configuring this screen afresh. 11.5 Technical Reference The following section contains additional technical information about the NBG4115 features described in this chapter.
  • Page 132: Trigger Port Forwarding

    Chapter 11 NAT addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 70 Multiple Servers Behind NAT Example 11.5.3 Trigger Port Forwarding Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side.
  • Page 133: Trigger Port Forwarding Example

    Chapter 11 NAT 11.5.4 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 71 Trigger Port Forwarding Process: Example Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the NBG4115 to record Jane’s computer IP address.
  • Page 134: Ddns

    H A P T E R DDNS 12.1 Overview DDNS services let you use a domain name with a dynamic IP address. 12.1.1 What You Can Do in this Chapter Use the DDNS screen (Section 12.2 on page 136) to enable DDNS and configure the DDNS settings on the NBG4115.
  • Page 135: General

    Chapter 12 DDNS 12.2 General To change your NBG4115’s DDNS, click Network > DDNS. The screen appears as shown. Figure 72 Dynamic DNS The following table describes the labels in this screen. Table 49 Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup Enable Dynamic Select this check box to use dynamic DNS.
  • Page 136 Chapter 12 DDNS Table 49 Dynamic DNS LABEL DESCRIPTION Enable off line This option is available when CustomDNS is selected in the DDNS option Type field. Check with your Dynamic DNS service provider to have traffic redirected to a URL (that you can specify) while you are off line.
  • Page 137 Chapter 12 DDNS User’s Guide...
  • Page 138: Security

    Security Firewall (141) Content Filtering (147)
  • Page 140: Firewall

    H A P T E R Firewall 13.1 Overview Use these screens to enable and configure the firewall that protects your NBG4115 and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN.
  • Page 141: What You Need To Know

    Chapter 13 Firewall 13.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. What is a Firewall? Originally, the term “firewall” referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall"...
  • Page 142 Chapter 13 Firewall The NBG4115 has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband (cable or DSL) modem to the Internet. The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world.
  • Page 143: General

    Chapter 13 Firewall 13.2 General Use this screen to enable or disable the NBG4115’s firewall, and set up firewall logs. Click Security > Firewall to open the General screen. Figure 74 Security > Firewall > General l The following table describes the labels in this screen. Table 50 Security >...
  • Page 144 Chapter 13 Firewall Click Security > Firewall > Services. The screen appears as shown next. Figure 75 Security > Firewall > Services l The following table describes the labels in this screen. Table 51 Security > Firewall > Services LABEL DESCRIPTION ICMP Internet Control Message Protocol is a message control and error-...
  • Page 145 Chapter 13 Firewall User’s Guide...
  • Page 146: Content Filtering

    H A P T E R Content Filtering 14.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords.
  • Page 147: Filter

    Chapter 14 Content Filtering The file path is the characters that come after the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the file path is news/pressroom.php. Since the NBG4115 checks the URL’s domain name (or IP address) and file path separately, it will not find items that go across the two.
  • Page 148: Technical Reference

    Chapter 14 Content Filtering The following table describes the labels in this screen. Table 52 Security > Content Filter > Filter LABEL DESCRIPTION Enable URL The NBG4115 can block Web sites with URLs that contain certain Keyword keywords in the domain name or IP address. For example, if the Blocking keyword "bad"...
  • Page 149 Chapter 14 Content Filtering For example, with the URL www.zyxel.com.tw/news/pressroom.php, content filtering only searches for keywords within www.zyxel.com.tw. Full Path URL Checking Full path URL checking has the NBG4115 check the characters that come before the last slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, full path URL checking searches for keywords within www.zyxel.com.tw/news/.
  • Page 150: Management

    Management Static Route (153) Bandwidth Management (157) Remote Management (165) UPnP (169)
  • Page 152: Static Route

    H A P T E R Static Route 15.1 Overview This chapter shows you how to configure static routes for your NBG4115. The NBG4115 usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the NBG4115 send data to devices not reachable through the default gateway, use static routes.
  • Page 153: Ip Static Route

    Chapter 15 Static Route 15.2 IP Static Route Use this screen to view existing static route rules. Click Management > Static Route to open the IP Static Route screen. The following screen displays. Figure 78 Management > Static Route > IP Static Route The following table describes the labels in this screen.
  • Page 154: Static Route Setup Screen

    Chapter 15 Static Route 15.2.1 Static Route Setup Screen To edit a static route, click the edit icon under Modify. The following screen displays. Fill in the required information for each static route. Figure 79 Management > Static Route > IP Static Route: Static Route Setup The following table describes the labels in this screen.
  • Page 155 Chapter 15 Static Route User’s Guide...
  • Page 156: Bandwidth Management

    H A P T E R Bandwidth Management 16.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B).
  • Page 157: General

    Chapter 16 Bandwidth Management Bandwidth Limiting You can limit an application’s uplink or downlink bandwidth. This limit keeps the traffic from using up too much of the out-going interface’s bandwidth. This way you can make sure there is bandwidth for other applications. Use the following guidelines: •...
  • Page 158: Advanced

    Chapter 16 Bandwidth Management The following table describes the labels in this screen. Table 55 Management > Bandwidth MGMT > General LABEL DESCRIPTION Service Management Bandwidth This field allows you to have NBG4115 apply bandwidth management. Management Select Priority Queue or Bandwidth Allocation to enable Type bandwidth management.
  • Page 159 Chapter 16 Bandwidth Management Click Management > Bandwidth MGMT > Advanced to open the bandwidth management Advanced screen. Figure 82 Management > Bandwidth MGMT > Advanced The following table describes the labels in this screen. Table 56 Management > Bandwidth MGMT > Advanced LABEL DESCRIPTION Priority Queue...
  • Page 160 Chapter 16 Bandwidth Management Table 56 Management > Bandwidth MGMT > Advanced (continued) LABEL DESCRIPTION Service This is the name of the service. You can also enter the name (up to 10 keyboard characters) of a service you want to add in the priority queue (for example, Messenger). Priority Select a priority from the drop down list box.
  • Page 161: Pre-Configured Gaming Ports

    Chapter 16 Bandwidth Management 16.3.1 Pre-Configured Gaming Ports The following gaming ports are preconfigured on your NBG4115 and are enabled when you select the ‘gaming’ Service in this screen: Table 57 Preconfigured Gaming Ports APPLICATION TCP PORTS UDP PORTS XBox 360 3074, 3390, 3932, 5555 1900, 3776, 7777, 88, 3074...
  • Page 162: Predefined Bandwidth Management Services

    Chapter 16 Bandwidth Management Table 58 Management > Bandwidth MGMT > Advanced: Allocation Setup LABEL DESCRIPTION Active Select this check box to turn on this bandwidth management rule. Direction Enter whether you want to apply the rule to uplink or downlink traffic. To LAN applies bandwidth management to traffic from WAN to LAN/ WLAN (i.e., downlink).
  • Page 163: Services And Port Numbers

    Chapter 16 Bandwidth Management Table 59 Media Bandwidth Management Setup: Services (continued) SERVICE DESCRIPTION E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals. Here are some default ports for e-mail: POP3 - port 110 SMTP - port 25 VoIP (SIP) Sending voice signals over the Internet is called Voice over IP or VoIP.
  • Page 164: Remote Management

    H A P T E R Remote Management 17.1 Overview This chapter provides information on the Remote Management screens. Remote management allows you to determine which services/protocols can access which NBG4115 interface (if any) from which computers. You may manage your NBG4115 from a remote location via: •...
  • Page 165: Www

    Chapter 17 Remote Management Remote Management and NAT When NAT is enabled: • Use the NBG4115’s WAN IP address when configuring from the WAN. • Use the NBG4115’s LAN IP address when configuring from the LAN. System Timeout There is a default system management idle timeout of five minutes (three hundred seconds).
  • Page 166 Chapter 17 Remote Management LABEL DESCRIPTION Secured Client A secured client is a “trusted” computer that is allowed to communicate IP Address with the NBG4115 using this service. Select All to allow any computer to access the NBG4115 using this service.
  • Page 167 Chapter 17 Remote Management User’s Guide...
  • Page 168: Upnp

    H A P T E R UPnP 18.1 Overview This chapter introduces the UPnP feature in the Web Configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 169: General

    Chapter 18 UPnP • Learning public IP addresses • Assigning lease times to mappings Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues.
  • Page 170: Technical Reference

    Chapter 18 UPnP The following table describes the labels in this screen. Table 61 Management > UPnP > General LABEL DESCRIPTION Enable the Universal Plug Select this check box to activate UPnP. Be aware that anyone and Play (UPnP) Feature could use a UPnP application to open the Web Configurator's login screen without entering the NBG4115's IP address (although you must still enter the password to access the Web...
  • Page 171 Chapter 18 UPnP The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. Figure 87 Windows Optional Networking Components Wizard In the Networking Services window, select the Universal Plug and Play check box.
  • Page 172 Chapter 18 UPnP Auto-discover Your UPnP-enabled Network Device Click Start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. Right-click the icon and select Properties. Figure 89 Network Connections In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
  • Page 173 Chapter 18 UPnP You may edit or delete the port mappings or click Add to manually add port mappings. Figure 91 Internet Connection Properties: Advanced Settings Figure 92 Internet Connection Properties: Advanced Settings: Add When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
  • Page 174 Chapter 18 UPnP Double-click on the icon to display your current Internet connection status. Figure 94 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG4115 without finding out the IP address of the NBG4115 first. This comes helpful if you do not know the IP address of the NBG4115.
  • Page 175 Chapter 18 UPnP Select My Network Places under Other Places. Figure 95 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. Right-click on the icon for your NBG4115 and select Invoke. The Web Configurator login screen displays. Figure 96 Network Connections: My Network Places User’s Guide...
  • Page 176 Chapter 18 UPnP Right-click on the icon for your NBG4115 and select Properties. A properties window displays with basic information about the NBG4115. Figure 97 Network Connections: My Network Places: Properties: Example User’s Guide...
  • Page 177 Chapter 18 UPnP User’s Guide...
  • Page 178: Maintenance And Troubleshooting

    Maintenance and Troubleshooting System (181) Logs (187) Tools (189) Sys OP Mode (195) Language (199) Troubleshooting (201)
  • Page 180: System

    H A P T E R System 19.1 Overview This chapter provides information on the System screens. See the chapter about wizard setup for more information on the next few screens. 19.1.1 What You Can Do in this Chapter • Use the General screen (Section 19.2 on page 181) to enter a name to identify the NBG4115 in the network and set the password.
  • Page 181 Chapter 19 System The following table describes the labels in this screen. Table 62 Maintenance > System > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the NBG4115 in an Ethernet network. It is recommended you enter your computer’s “Computer name”...
  • Page 182: Time Setting

    Chapter 19 System 19.3 Time Setting To change your NBG4115’s time and date, click Maintenance > System > Time Setting. The screen appears as shown. Use this screen to configure the NBG4115’s time based on your local time zone. Figure 99 Maintenance > System > Time Setting he following table describes the labels in this screen.
  • Page 183 Chapter 19 System Table 63 Maintenance > System > Time Setting LABEL DESCRIPTION New Time This field displays the last updated time from the time server or the last time configured manually. (hh:mm:ss) When you set Time and Date Setup to Manual, enter the new time in this field and then click Apply.
  • Page 184 Chapter 19 System Table 63 Maintenance > System > Time Setting LABEL DESCRIPTION End Date Configure the day and time when Daylight Saving Time ends if you selected Daylight Savings. The o'clock field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time ends in the United States on the last Sunday of October.
  • Page 185 Chapter 19 System User’s Guide...
  • Page 186: Logs

    H A P T E R Logs 20.1 Overview This chapter contains information about configuring general log settings and viewing the NBG4115’s logs. Refer to the appendices for example log message explanations. The Web Configurator allows you to look at all of the NBG4115’s logs in one location.
  • Page 187 Chapter 20 Logs Click Maintenance > Logs to open the View Log screen. Figure 100 Maintenance > Logs > View Log The following table describes the labels in this screen. Table 64 Maintenance > Logs > View Log LABEL DESCRIPTION Refresh Click Refresh to renew the log screen.
  • Page 188: Tools

    H A P T E R Tools 21.1 Overview This chapter shows you how to upload a new firmware, upload or save backup configuration files and restart the NBG4115. 21.1.1 What You Can Do in this Chapter • Use the Firmware screen (Section 21.2 on page 190) to upload firmware to your NBG4115.
  • Page 189: Firmware

    Chapter 21 Tools 21.2 Firmware Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a “*.bin” extension, e.g., “NBG4115.bin”. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 190 Chapter 21 Tools After you see the Firmware Upload In Process screen, wait two minutes before logging into the NBG4115 again. Figure 102 Upload Warning The NBG4115 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop.
  • Page 191: Configuration

    Chapter 21 Tools 21.3 Configuration Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 105 Maintenance > Tools > Configuration 21.3.1 Backup Configuration Backup configuration allows you to back up (save) the NBG4115’s current configuration to a file on your computer.
  • Page 192: Restore Configuration

    Chapter 21 Tools 21.3.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG4115. Table 66 Maintenance Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse...
  • Page 193: Back To Factory Defaults

    Chapter 21 Tools If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen. Figure 108 Configuration Restore Error 21.3.3 Back to Factory Defaults Pressing the Reset button in this section clears all user-entered configuration information and returns the NBG4115 to its factory defaults.
  • Page 194: Sys Op Mode

    H A P T E R Sys OP Mode 22.1 Overview The Sys OP Mode (System Operation Mode) function lets you configure whether your NBG4115 is a router or AP. You can choose between Router Mode and AP Mode depending on your network topology and the features you require from your device.
  • Page 195: General

    Chapter 22 Sys OP Mode An AP extends one network and so has just one IP address. All Ethernet ports on the AP have the same IP address. To connect to the Internet, another device, such as a router, is required. Figure 111 IP Address in AP Mode 1 IP Internet...
  • Page 196 Chapter 22 Sys OP Mode • In this mode there are both LAN and WAN ports. The LAN Ethernet and WAN Ethernet ports have different IP addresses. • The DHCP server on your device is enabled and allocates IP addresses to other devices on your local network.
  • Page 197 Chapter 22 Sys OP Mode User’s Guide...
  • Page 198: Language

    H A P T E R Language 23.1 Overview This chapter shows you how to change the Web Configurator’s display language. 23.2 Language Use this screen to change the language for the Web Configurator display. Click the language you prefer. The Web Configurator language changes after a while without restarting the NBG4115.
  • Page 199 Chapter 23 Language User’s Guide...
  • Page 200: Troubleshooting

    H A P T E R Troubleshooting 24.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG4115 Access and Login •...
  • Page 201: Nbg4115 Access And Login

    Chapter 24 Troubleshooting Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adaptor to the NBG4115. If the problem continues, contact the vendor. 24.3 NBG4115 Access and Login I don’t know the IP address of my NBG4115.
  • Page 202 Chapter 24 Troubleshooting I forgot the password. The default password is 1234. If this does not work, you have to reset the device to its factory defaults. See Section 24.5 on page 206. I cannot see or access the Login screen in the Web Configurator. Make sure you are using the correct IP address.
  • Page 203: Internet Access

    Chapter 24 Troubleshooting • If your computer is connected to the WAN port or is connected wirelessly, use a computer that is connected to a LAN/ETHERNET port. I can see the Login screen, but I cannot log in to the NBG4115. Make sure you have entered the password correctly.
  • Page 204 Chapter 24 Troubleshooting • Select Router if your device routes traffic between a local network and another network such as the Internet. • Select Access Point if your device bridges traffic between clients on the same network. If the problem continues, contact your ISP. I cannot access the Internet anymore.
  • Page 205: Resetting The Nbg4115 To Its Factory Defaults

    Chapter 24 Troubleshooting 24.5 Resetting the NBG4115 to Its Factory Defaults If you reset the NBG4115, you lose all of the changes you have made. The NBG4115 re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the RESET button.
  • Page 206 Chapter 24 Troubleshooting Check that both the NBG4115 and your wireless station are using the same wireless and wireless security settings. Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the NBG4115. Make sure you allow the NBG4115 to be remotely accessed through the WLAN interface.
  • Page 207 Chapter 24 Troubleshooting User’s Guide...
  • Page 208: Appendices And Index

    Appendices and Index Product Specifications (211) Pop-up Windows, JavaScripts and Java Permissions (215) IP Addresses and Subnetting (223) Setting up Your Computer’s IP Address (233) Wireless LANs (251) Services (263) Legal Information (267) Index (275)
  • Page 210: Appendix A Product Specifications

    P P E N D I X Product Specifications The following tables summarize the NBG4115’s hardware and firmware features. Table 68 Hardware Features Dimensions 140 mm (W) x 110 mm (D) x 30 mm (H) Weight 190 g (without a 3G card installed) SDRAM 32 MB Flash Memory...
  • Page 211 Appendix A Product Specifications Table 69 Firmware Features FEATURE DESCRIPTION Default LAN IP Address 192.168.1.1 (router) 192.168.1.2. (AP) Default LAN Subnet 255.255.255.0 (24 bits) Mask Default Password 1234 DHCP Pool 192.168.1.33 to 192.168.1.64 Wireless Interface Wireless LAN Default Wireless SSID ZyXEL Device Management Use the Web Configurator to easily configure the rich range of...
  • Page 212 Appendix A Product Specifications Table 69 Firmware Features FEATURE DESCRIPTION Bandwidth Management You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and/or to particular computers. Remote Management This allows you to decide whether a service (HTTP or FTP traffic for example) from a computer on a network (LAN or WAN for example) can access the NBG4115.
  • Page 213 Appendix A Product Specifications User’s Guide...
  • Page 214: Appendix B Pop-Up Windows, Javascripts And Java Permissions

    P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 215 Appendix B Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 117 Internet Options: Privacy Click Apply to save this setting.
  • Page 216 Appendix B Pop-up Windows, JavaScripts and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 118 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. User’s Guide...
  • Page 217 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 119 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 218 Appendix B Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 120 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 219 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 121 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 220 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 122 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. User’s Guide...
  • Page 221 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 123 Java (Sun) User’s Guide...
  • Page 222: Appendix C Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 223 Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 124 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 224 Appendix C IP Addresses and Subnetting Table 70 Subnet Mask - Identifying Network Number OCTET: OCTET: OCTET: OCTET (192) (168) Network Number 11000000 10101000 00000001 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
  • Page 225 Appendix C IP Addresses and Subnetting As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows: Table 72 Maximum Host Numbers MAXIMUM NUMBER OF SUBNET MASK HOST ID SIZE HOSTS 8 bits 255.0.0.0...
  • Page 226 Appendix C IP Addresses and Subnetting Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons. In this example, the company network address is 192.168.1.0.
  • Page 227 Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 126 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
  • Page 228 Appendix C IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 2 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 74 Subnet 1 LAST OCTET BIT IP/SUBNET MASK...
  • Page 229 Appendix C IP Addresses and Subnetting Table 77 Subnet 4 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.193 192.168.1.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).
  • Page 230 Appendix C IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 80 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.128.0 (/17) 32766...
  • Page 231 Appendix C IP Addresses and Subnetting that you entered. You don't need to change the subnet mask computed by the NBG4115 unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
  • Page 232: Appendix D Setting Up Your Computer's Ip Address

    P P E N D I X Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer.
  • Page 233 Appendix D Setting up Your Computer’s IP Address Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. Figure 127 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks.
  • Page 234 Appendix D Setting up Your Computer’s IP Address Select Microsoft from the list of manufacturers. Select TCP/IP from the list of network protocols and then click OK. If you need Client for Microsoft Networks: Click Add. Select Client and then click Add. Select Microsoft from the list of manufacturers.
  • Page 235 Appendix D Setting up Your Computer’s IP Address Click the DNS Configuration tab. • If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). Figure 129 Windows 95/98/Me: TCP/IP Properties: DNS Configuration Click the Gateway tab.
  • Page 236 Appendix D Setting up Your Computer’s IP Address Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 130 Windows XP: Start Menu User’s Guide...
  • Page 237 Appendix D Setting up Your Computer’s IP Address In the Control Panel, double-click Network Connections (Network and Dial- up Connections in Windows 2000/NT). Figure 131 Windows XP: Control Panel Right-click Local Area Connection and then click Properties. Figure 132 Windows XP: Control Panel: Network Connections: Properties User’s Guide...
  • Page 238 Appendix D Setting up Your Computer’s IP Address Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 133 Windows XP: Local Area Connection Properties The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 239 Appendix D Setting up Your Computer’s IP Address • Click Advanced. Figure 134 Windows XP: Internet Protocol (TCP/IP) Properties If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 240 Appendix D Setting up Your Computer’s IP Address • Click OK when finished. Figure 135 Windows XP: Advanced TCP/IP Properties In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
  • Page 241 Appendix D Setting up Your Computer’s IP Address If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. Figure 136 Windows XP: Internet Protocol (TCP/IP) Properties Click OK to close the Internet Protocol (TCP/IP) Properties window. Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window.
  • Page 242 Appendix D Setting up Your Computer’s IP Address Macintosh OS 8/9 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/ IP Control Panel. Figure 137 Macintosh OS 8/9: Apple Menu User’s Guide...
  • Page 243 Appendix D Setting up Your Computer’s IP Address Select Ethernet built-in from the Connect via list. Figure 138 Macintosh OS 8/9: TCP/IP For dynamically assigned settings, select Using DHCP Server from the Configure: list. For statically assigned settings, do the following: •...
  • Page 244 Appendix D Setting up Your Computer’s IP Address Macintosh OS X Click the Apple menu, and click System Preferences to open the System Preferences window. Figure 139 Macintosh OS X: Apple Menu Click Network in the icon bar. • Select Automatic from the Location list. •...
  • Page 245 Appendix D Setting up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 246 Appendix D Setting up Your Computer’s IP Address Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. Figure 142 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list.
  • Page 247 Appendix D Setting up Your Computer’s IP Address Click the Devices tab. Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 144 Red Hat 9.0: KDE: Network Configuration: Activate After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.
  • Page 248 Appendix D Setting up Your Computer’s IP Address • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0.
  • Page 249: Verifying Settings

    Appendix D Setting up Your Computer’s IP Address 24.6.1 Verifying Settings Enter ifconfig in a terminal screen to check your TCP/IP properties. Figure 149 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500...
  • Page 250: Appendix E Wireless Lans

    P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 251 Appendix E Wireless LANs with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. Figure 151 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 252 Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate. Figure 152 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area.
  • Page 253 Appendix E Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 153 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 254 Appendix E Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 255 Appendix E Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 81 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/...
  • Page 256 Appendix E Wireless LANs Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. •...
  • Page 257 Appendix E Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication.
  • Page 258 Appendix E Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled. Note: EAP-MD5 cannot be used with dynamic WEP key exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
  • Page 259 Appendix E Wireless LANs TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.
  • Page 260: Wpa(2)-Psk Application Example

    Appendix E Wireless LANs 24.6.2 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols).
  • Page 261 Appendix E Wireless LANs Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 83 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY...
  • Page 262: Appendix F Services

    P P E N D I X Services The following table lists some commonly-used services and their associated protocols and port numbers. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. •...
  • Page 263 Appendix F Services Table 84 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 1720 NetMeeting uses this protocol. HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide...
  • Page 264 Appendix F Services Table 84 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION POP3 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). POP3S This is a more secure version of POP3 that runs over SSL.
  • Page 265 Appendix F Services Table 84 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SSDP 1900 The Simple Service Discovery Protocol supports Universal Plug-and-Play (UPnP). TCP/UDP Secure Shell Remote Login Program. STRM WORKS 1558 Stream Works Protocol. SYSLOG Syslog allows you to send system logs to a UNIX server.
  • Page 266: Appendix G Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein.
  • Page 267 Appendix G Legal Information harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna.
  • Page 268 Appendix G Legal Information To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication. IMPORTANT NOTE: IC Radiation Exposure Statement: This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.
  • Page 269 North American products. End-User License Agreement WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE ENCLOSED SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
  • Page 270 Appendix G Legal Information Grant of License for Personal Use ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non- sublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number...
  • Page 271 Appendix G Legal Information permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity. You may not cause, assist or permit any third party to do any of the foregoing.
  • Page 272 Appendix G Legal Information IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
  • Page 273 Appendix G Legal Information 11 General This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan.
  • Page 274: Index

    Index Index content filtering by keyword (in URL) copyright Address Assignment CPU usage 31, 57 alternative subnet mask notation CTS (Clear to Send) AP (Access Point) AP Mode menu overview status screen Daylight saving AP+Bridge DDNS Auto-bridge see also Dynamic DNS service providers DHCP 34, 119...
  • Page 275 Index EAP Authentication Hidden Node e-mail HTTP Encryption Hyper Text Transfer Protocol encryption and local (user) database WPA compatible IANA ESSID IBSS Extended Service Set IEEE 802.11g Extended wireless security IGMP see also Internet Group Multicast Protocol version IGMP version Independent Basic Service Set Factory LAN defaults 116, 119...
  • Page 276 Index and encryption Local Area Network Operating Channel 31, 57 operating mode MAC address 83, 103 cloning 52, 103 MAC address filter peer-to-peer MAC address filtering Point-to-Point Protocol over Ethernet 45, 106 MAC filter Point-to-Point Tunneling Protocol 46, 108 managing the device Pool Size good habits Port forwarding...
  • Page 277 Index registration syntax conventions product Sys Op Mode related documentation System General Setup Remote management System Name and NAT System name limitations vs computer name system timeout System restart Reset button 29, 194 Reset the device Restore configuration RF (Radio Frequency) Roaming TCP/IP configuration RTS (Request To Send)
  • Page 278 Index WAN (Wide Area Network) WPA, WPA2 WAN advanced WAN IP address 96, 163 WAN IP address assignment WAN MAC address warranty note Web Configurator Xbox Live how to access Overview Web configurator navigating web configurator WEP Encryption WEP encryption WEP key Wildcard Wireless association list...
  • Page 279 Index User’s Guide...

This manual is also suitable for:

Nbg4115

Table of Contents