ZyXEL Communications NBG-417N - V1.0 Manual
ZyXEL Communications NBG-417N - V1.0 Manual

ZyXEL Communications NBG-417N - V1.0 Manual

Wireless n-lite home router
Table of Contents

Advertisement

Quick Links

NBG-417N
Wireless N-lite Home Router
Default Login Details
IP Address
http://192.168.1.1
Password
Firmware Version 1.0
Edition 2, 4/2009
www.zyxel.com
www.zyxel.com
1234
Copyright © 2009
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NBG-417N - V1.0 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for ZyXEL Communications NBG-417N - V1.0

  • Page 1 NBG-417N Wireless N-lite Home Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 2, 4/2009 www.zyxel.com www.zyxel.com Copyright © 2009 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com.
  • Page 4 • Knowledge Base If you have a specific question about your product, the answer may be here. This is a collection of answers to previously asked questions about ZyXEL products. • Forum This contains discussions on ZyXEL products. Learn from others who use ZyXEL products and share your experiences as well.
  • Page 5 Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office.
  • Page 6: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 7 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG-417N icon is not an exact representation of your device. NBG-417N Computer Notebook computer Server DSLAM Firewall Telephone Switch Router Modem NBG-417N User’s Guide...
  • Page 8: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview Introduction ..........................19 Getting to Know Your NBG-417N ....................21 The WPS Button ........................25 Introducing the Web Configurator ....................27 Connection Wizard ........................39 AP Mode ............................ 53 Tutorials ............................. 61 Network ........................... 73 Wireless LAN ..........................75 WAN ............................
  • Page 10 Contents Overview NBG-417N User’s Guide...
  • Page 11: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................6 Safety Warnings........................8 Contents Overview ........................9 Table of Contents........................11 Part I: Introduction................. 19 Chapter 1 Getting to Know Your NBG-417N ..................21 1.1 Overview ..........................21 1.2 Applications .........................
  • Page 12 Table of Contents 4.1 Wizard Setup ........................39 4.2 Connection Wizard: STEP 1: System Information ............... 40 4.2.1 System Name ......................40 4.2.2 Domain Name ......................41 4.3 Connection Wizard: STEP 2: Wireless LAN ................ 42 4.3.1 Extend (WPA-PSK or WPA2-PSK) Security ............... 43 4.4 Connection Wizard: STEP 3: Internet Configuration ............
  • Page 13 Table of Contents Part II: Network..................73 Chapter 7 Wireless LAN........................... 75 7.1 Overview ..........................75 7.2 What You Can Do In the Wireless LAN Screen ..............76 7.3 What You Should Know About Wireless LAN ..............76 7.3.1 Wireless Security Overview ..................76 7.4 General Wireless LAN Screen ....................
  • Page 14 Table of Contents Chapter 10 DHCP Server.......................... 111 10.1 Overview ...........................111 10.2 What You Can Do in the DHCP Server Screens ..............111 10.3 What You Need To Know About the DHCP Server Screens ..........111 10.4 General Screen ........................112 10.5 Advanced Screen ......................112 10.6 Client List Screen ......................114 Chapter 11...
  • Page 15 Table of Contents 13.3.1 What is a Firewall? ....................134 13.3.2 Stateful Inspection Firewall ..................134 13.3.3 About the NBG-417N Firewall ................134 13.3.4 Guidelines For Enhancing Security With Your Firewall .......... 135 13.4 General Firewall Screen ....................136 13.5 Services Screen ......................
  • Page 16 Table of Contents 17.2 What You Can Do in the Remote Management Screens ..........159 17.3 What You Need To Know About Remote Management ........... 159 17.3.1 Remote Management Limitations ................160 17.3.2 Remote Management and NAT ................160 17.3.3 System Timeout ....................160 17.4 WWW Screen .......................
  • Page 17 Table of Contents 21.5 Restart Screen ......................... 190 Chapter 22 Sys OP Mode ......................... 191 22.1 Overview .......................... 191 22.2 What You Can Do in the Sys OP Mode Screen ............... 191 22.3 What You Need to Know About Sys OP Mode ..............192 22.4 General Screen .......................
  • Page 18 Table of Contents NBG-417N User’s Guide...
  • Page 19: Introduction

    Introduction Getting to Know Your NBG-417N (21) The WPS Button (25) Introducing the Web Configurator (27) Connection Wizard (39) AP Mode (53) Tutorials (61)
  • Page 21: Getting To Know Your Nbg-417N

    H A P T E R Getting to Know Your NBG-417N 1.1 Overview This chapter introduces the main features and applications of the NBG-417N. The NBG-417N extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/n compatible devices.
  • Page 22: Ways To Manage The Nbg-417N

    • WPS (Wi-Fi Protected Setup). You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL Device. • Web Configurator. This is recommended for everyday management of the NBG- 417N using a (supported) web browser.
  • Page 23 Chapter 1 Getting to Know Your NBG-417N The following table describes the LEDs and the WPS button. Table 1 Front Panel LEDs and WPS Button COLOR STATUS DESCRIPTION POWER Green The NBG-417N is receiving power and functioning properly. The NBG-417N is not receiving power. WLAN / WPS Green The NBG-417N is ready, but is not sending/...
  • Page 24 Chapter 1 Getting to Know Your NBG-417N NBG-417N User’s Guide...
  • Page 25: The Wps Button

    H A P T E R The WPS Button 2.1 Overview Your NBG-417N supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
  • Page 26 Chapter 2 The WPS Button NBG-417N User’s Guide...
  • Page 27: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator This chapter describes how to access the NBG-417N Web Configurator and provides an overview of its screens. 3.1 Web Configurator Overview The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG-417N via Internet browser.
  • Page 28 Chapter 3 Introducing the Web Configurator Your computer must be in the same subnet in order to access this website address. Type "1234" (default) as the password and click Login. In some versions, the default password appears automatically - if this is the case, click Login. You should see a screen asking you to change your password (highly recommended) as shown next.
  • Page 29: Resetting The Nbg-417N

    Chapter 3 Introducing the Web Configurator • Select a language to go to the basic Web Configurator in that language. To change to the advanced configurator see Chapter 23 on page 195. Figure 4 Selecting the setup mode 3.3 Resetting the NBG-417N If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the NBG-417N to reload the factory-default configuration file.
  • Page 30: The Status Screen In Router Mode

    Chapter 3 Introducing the Web Configurator 3.5 The Status Screen in Router Mode Click on Status. The screen below shows the status screen in Router Mode. (For information on the status screen in AP Mode see Chapter 5 on page 54.) Figure 5 Web Configurator Status Screen The following table describes the icons shown in the Status screen.
  • Page 31 Chapter 3 Introducing the Web Configurator The following table describes the labels shown in the Status screen. Table 3 Web Configurator Status Screen LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen.
  • Page 32: Navigation Panel

    Chapter 3 Introducing the Web Configurator Table 3 Web Configurator Status Screen (continued) LABEL DESCRIPTION - Firewall This shows whether the firewall is active or not. - UPnP This shows whether UPnP is active or not. Interface Status Interface This displays the NBG-417N port types. The port types are: WAN, LAN and WLAN.
  • Page 33 Chapter 3 Introducing the Web Configurator Table 4 Screens Summary LINK FUNCTION Wireless General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the NBG-417N to block access to devices or block the devices from accessing the NBG-417N.
  • Page 34: Summary: Dhcp Table

    Chapter 3 Introducing the Web Configurator Table 4 Screens Summary LINK FUNCTION Remote Use this screen to configure through which interface(s) MGMT and from which IP address(es) users can use HTTP to manage the NBG-417N. UPnP General Use this screen to enable UPnP on the NBG-417N. Maintenance System General...
  • Page 35: Summary: Packet Statistics

    Chapter 3 Introducing the Web Configurator The following table describes the labels in this screen. Table 5 Summary: DHCP Table LABEL DESCRIPTION This is the index number of the host computer. IP Address This field displays the IP address relative to the # field listed above. Host Name This field displays the computer host name.
  • Page 36: Summary: Wlan Station Status

    Chapter 3 Introducing the Web Configurator The following table describes the labels in this screen. Table 6 Summary: Packet Statistics LABEL DESCRIPTION Port This is the NBG-417N’s port type. Status For the LAN ports, this displays the port speed and duplex setting or Down when the line is disconnected.
  • Page 37 Chapter 3 Introducing the Web Configurator The following table describes the labels in this screen. Table 7 Summary: Wireless Association List LABEL DESCRIPTION This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station. Association Time This field displays the time a wireless station first associated with the NBG-417N’s WLAN network.
  • Page 38 Chapter 3 Introducing the Web Configurator NBG-417N User’s Guide...
  • Page 39: Connection Wizard

    H A P T E R Connection Wizard This chapter provides information on the wizard setup screens in the Web Configurator. 4.1 Wizard Setup The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP (Internet Service Provider) checklist in the Quick Start Guide to know what to enter in each field.
  • Page 40: Connection Wizard: Step 1: System Information

    Chapter 4 Connection Wizard Choose a language by clicking on the language’s button. The screen will update. Click the Next button to proceed to the next screen. Figure 10 Select a Language Read the on-screen information and click Next. Figure 11 Welcome to the Connection Wizard 4.2 Connection Wizard: STEP 1: System Information System Information contains administrative and system-related information.
  • Page 41: Domain Name

    Chapter 4 Connection Wizard • In Windows XP, click Start, My Computer, View system information and then click the Computer Name tab. Note the entry in the Full computer name field and enter it as the NBG-417N System Name. 4.2.2 Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN.
  • Page 42: Connection Wizard: Step 2: Wireless Lan

    Chapter 4 Connection Wizard 4.3 Connection Wizard: STEP 2: Wireless LAN Set up your wireless LAN using the following screen. Figure 13 Wizard Step 2: Wireless LAN The following table describes the labels in this screen. Table 9 Wizard Step 2: Wireless LAN LABEL DESCRIPTION Name...
  • Page 43: Extend (Wpa-Psk Or Wpa2-Psk) Security

    Chapter 4 Connection Wizard Note: The wireless stations and NBG-417N must use the same SSID, channel ID, WPA-PSK (if WPA-PSK is enabled) or WPA2-PSK (if WPA2-PSK is enabled) for wireless communication. 4.3.1 Extend (WPA-PSK or WPA2-PSK) Security Choose Extend (WPA-PSK) or Extend (WPA2-PSK) security in the Wireless LAN setup screen to set up a Pre-Shared Key.
  • Page 44: Ethernet Connection

    Chapter 4 Connection Wizard This wizard screen varies according to the connection type that you select. Figure 15 Wizard Step 3: ISP Parameters. The following table describes the labels in this screen, Table 11 Wizard Step 3: ISP Parameters CONNECTION DESCRIPTION TYPE Ethernet...
  • Page 45 Chapter 4 Connection Wizard personal computer interacts with a broadband modem (for example DSL, cable, wireless, etc.) to achieve access to high-speed data networks. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for instance, RADIUS). One of the benefits of PPPoE is the ability to let end users access one of multiple network services, a function known as dynamic service selection.
  • Page 46: Pptp Connection

    Chapter 4 Connection Wizard 4.4.3 PPTP Connection Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. PPTP supports on-demand, multi-protocol, and virtual private networking over public networks, such as the Internet.
  • Page 47: Your Ip Address

    Chapter 4 Connection Wizard Table 13 Wizard Step 3: PPTP Connection LABEL DESCRIPTION Connection ID/ Enter the connection ID or connection name in this field. It must follow Name the "c:id" and "n:name" format. For example, C:12 or N:My ISP. This field is optional and depends on the requirements of your ISP.
  • Page 48: Wan Ip Address Assignment

    Chapter 4 Connection Wizard 4.4.5 WAN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks.
  • Page 49: Dns Server Address Assignment

    4.4.7 DNS Server Address Assignment Use DNS (Domain Name System) to map a domain name to its corresponding IP address and vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
  • Page 50: Wan Ip And Dns Server Address Assignment

    Chapter 4 Connection Wizard 4.4.8 WAN IP and DNS Server Address Assignment The following wizard screen allows you to assign a fixed WAN IP address and DNS server addresses. Figure 20 Wizard Step 3: WAN IP and DNS Server Addresses The following table describes the labels in this screen Table 16 Wizard Step 3: WAN IP and DNS Server Addresses LABEL...
  • Page 51: Wan Mac Address

    Chapter 4 Connection Wizard 4.4.9 WAN MAC Address Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. Table 17 Example of Network Properties for LAN Servers with Fixed IP Addresses Choose an IP address 192.168.1.2-192.168.1.32;...
  • Page 52: Connection Wizard Complete

    Chapter 4 Connection Wizard 4.5 Connection Wizard Complete Click Finish to complete the wizard setup. Figure 22 Connection Wizard Complete Well done! You have successfully set up your NBG-417N to operate on your network and access the Internet. NBG-417N User’s Guide...
  • Page 53: Ap Mode

    H A P T E R AP Mode This chapter discusses how to configure settings while your NBG-417N is set to AP Mode. Many screens that are available in Router Mode are not available in AP Mode. Note: See Chapter 6 on page 61 for an example of setting up a wireless network in AP mode.
  • Page 54: The Status Screen In Ap Mode

    Chapter 5 AP Mode To set your NBG-417N to AP Mode, go to Maintenance > Sys OP Mode > General and select Access Point. Figure 24 Maintenance > Sys OP Mode > General A pop-up appears providing information on this mode. Click OK in the pop-up message window.
  • Page 55 Chapter 5 AP Mode The following table describes the labels shown in the Status screen. Table 19 Web Configurator Status Screen LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen.
  • Page 56: Navigation Panel

    Chapter 5 AP Mode Table 19 Web Configurator Status Screen (continued) LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WLAN, it displays the maximum transmission rate when the WLAN is enabled and N/A when the WLAN is disabled.
  • Page 57: Configuring Your Settings

    Chapter 5 AP Mode Table 20 Screens Summary LINK FUNCTION Wireless General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the NBG-417N to block access to devices or block the devices from accessing the NBG-417N.
  • Page 58: Wlan And Maintenance Settings

    Chapter 5 AP Mode Note: If you change the IP address of the NBG-417N in the screen below, you will need to log into the NBG-417N again using the new IP address. Figure 27 Network > LAN > IP The table below describes the labels in the screen. Table 21 Network >...
  • Page 59: Logging In To The Web Configurator In Ap Mode

    Chapter 5 AP Mode 5.5 Logging in to the Web Configurator in AP Mode Connect your computer to the LAN port of the NBG-417N. The default IP address of the NBG-417N is “192.168.1.2”. In this case, your computer must have an IP address in the range between “192.168.1.3” and “192.168.1.254”.
  • Page 60 Chapter 5 AP Mode NBG-417N User’s Guide...
  • Page 61: Tutorials

    H A P T E R Tutorials This chapter provides tutorials on wireless configurations your NBG-417N. 6.1 How to Connect to the Internet from an AP This section gives you an example of how to set up an access point (AP) and wireless client (a notebook (B), in this example) for wireless communication.
  • Page 62: Push Button Configuration (Pbc)

    Chapter 6 Tutorials • PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the NBG-417N’s interface. See Section 6.2.2 on page 63. This is the more secure method, since one device can authenticate the other. 6.2.1 Push Button Configuration (PBC) Make sure that your NBG-417N is turned on and that it is within range of your computer.
  • Page 63: Pin Configuration

    Chapter 6 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both NBG-417N and wireless client (the NWD210N in this example). Figure 29 Example WPS Process: PBC Method NBG-417N Wireless Client WITHIN 2 MINUTES SECURITY INFO...
  • Page 64 Chapter 6 Tutorials The following figure shows you the example to set up wireless network and security on NBG-417N and wireless client (ex. NWD210N in this example) by using PIN method. Figure 30 Example WPS Process: PIN Method Wireless Client NBG-417N WITHIN 2 MINUTES Authentication by PIN...
  • Page 65: Enable And Configure Wireless Security Without Wps On Your Nbg-417N

    Chapter 6 Tutorials 6.3 Enable and Configure Wireless Security without WPS on your NBG-417N This example shows you how to configure wireless security settings with the following parameters on your NBG-417N. SSID SSID_Example3 Channel Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your NBG-417N. The instructions require that your hardware is connected (see the Quick Start Guide) and you are logged into the Web Configurator through your LAN connection (see...
  • Page 66: Configure Your Notebook

    Figure 32 Tutorial: Status Screen 6.3.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. The NBG-417N supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
  • Page 67 Chapter 6 Tutorials Select SSID_Example3 and click Connect. Figure 33 Connecting a Wireless Client to a Wireless Network t Select WPA-PSK and type the security key in the following screen. Click Next. Figure 34 Security Settings The Confirm Save window appears. Check your settings and click Save to continue.
  • Page 68: Bandwidth Management For Your Network

    6.4 Bandwidth Management for your Network This section shows you how to configure the bandwidth management feature on the NBG-417N to limit the bandwidth for specific kinds of outgoing traffic. ZyXEL's bandwidth management feature allows you to specify bandwidth management rules based on an application or subnet.
  • Page 69: Configuring Bandwidth Management By Custom Application

    Chapter 6 Tutorials In the following screen, you set the priorities for VoIP and e-mail. Figure 37 Tutorial: Priority Queue Click Enable for the VoIP (SIP) service and set priority to High. Do the same for E-mail. For the rest of the applications, click Enable if you need these services and set the priority to Low.
  • Page 70: Configuring Bandwidth Allocation By Ip Or Ip Range

    Chapter 6 Tutorials To add the MSN Messenger service in the Priority Queue: Click Enable in one of the fields for additional services. Add MSN as the service name. Set the priority for this to High. For the port, choose TCP from the drop-down menu and enter 1863 in the Specific Port field.
  • Page 71 Chapter 6 Tutorials Enter the following values for each service you want to add. For this tutorial, you need to add each of the following service (see table below) and click Apply. Table 22 SERVICES FIELDS REAL AUDIO RTSP VDO LIVE Active Check this to turn on this bandwidth management rule.
  • Page 72 Chapter 6 Tutorials NBG-417N User’s Guide...
  • Page 73: Network

    Network Wireless LAN (75) WAN (95) LAN (107) DHCP Server (111) Network Address Translation (NAT) (117) Dynamic DNS (127)
  • Page 75: Wireless Lan

    H A P T E R Wireless LAN 7.1 Overview This chapter discusses how to configure the wireless network settings in your NBG-417N. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 41 Example of a Wireless Network The wireless network is the part in the blue circle.
  • Page 76: What You Can Do In The Wireless Lan Screen

    Chapter 7 Wireless LAN 7.2 What You Can Do In the Wireless LAN Screen • Use the General screen (Section 7.4 on page 79) to enable the Wireless LAN, enter the SSID and select the wireless security mode. • Use the MAC Filter screen (Section 7.5 on page 84) to allow or deny wireless stations based on their MAC addresses from connecting to the NBG-417N.
  • Page 77: Mac Address Filter

    Chapter 7 Wireless LAN In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network.
  • Page 78 Chapter 7 Wireless LAN Local user databases also have an additional limitation that is explained in the next section. 7.3.1.4 Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message.
  • Page 79: General Wireless Lan Screen

    Chapter 7 Wireless LAN Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every wireless client in the wireless network must have the same key. 7.3.1.5 WPS WiFi Protected Setup (WPS) is an industry standard specification, defined by the WiFi Alliance.
  • Page 80: No Security

    Chapter 7 Wireless LAN The following table describes the general wireless LAN labels in this screen. Table 24 Network > Wireless LAN > General LABEL DESCRIPTION Enable Click the check box to activate wireless LAN. Wireless LAN Name(SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated.
  • Page 81: Wep Encryption

    Chapter 7 Wireless LAN Note: If you do not enable any wireless security on your NBG-417N, your network is accessible to any wireless networking device that is within range. Figure 43 Network > Wireless LAN > General: No Security The following table describes the labels in this screen. Table 25 Wireless No Security LABEL DESCRIPTION...
  • Page 82 Keep this setting at Auto or Open System unless you want to force a key verification before communication between the wireless client and the ZyXEL Device occurs. Select Shared Key to force the clients to provide the WEP key prior to communication.
  • Page 83: Wpa-Psk/Wpa2-Psk

    Chapter 7 Wireless LAN Table 26 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Select this option in order to enter hexadecimal characters as a WEP key. The preceding "0x", that identifies a hexadecimal key, is entered automatically. Key 1 to Key The WEP keys are used to encrypt data.
  • Page 84: Mac Filter

    Chapter 7 Wireless LAN The following table describes the labels in this screen. Table 27 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK LABEL DESCRIPTION This check box is available only when you select WPA2-PSK in the Compatible Security Mode field. Select the check box to have both WPA2 and WPA wireless clients be able to communicate with the NBG-417N even when the NBG-417N is using WPA2-PSK.
  • Page 85 Chapter 7 Wireless LAN To change your NBG-417N’s MAC filter settings, click Network > Wireless LAN > MAC Filter. The screen appears as shown. Figure 46 Network > Wireless LAN > MAC Filter The following table describes the labels in this menu. Table 28 Network >...
  • Page 86: Wireless Lan Advanced Screen

    Chapter 7 Wireless LAN 7.6 Wireless LAN Advanced Screen Click Network > Wireless LAN > Advanced. The screen appears as shown. Figure 47 Network > Wireless LAN > Advanced The following table describes the labels in this screen. Table 29 Network > Wireless LAN > Advanced LABEL DESCRIPTION Wireless Advanced Setup...
  • Page 87: Quality Of Service (Qos) Screen

    Chapter 7 Wireless LAN Table 29 Network > Wireless LAN > Advanced LABEL DESCRIPTION When set to None, the NBG-417N protects wireless communication Protection against interference. When set to Always, the NBG-417N improves performance within mixed wireless modes. Select Auto to let the NBG-417N determine whether to turn this feature on or off in the current environment.
  • Page 88 Chapter 7 Wireless LAN Click Network > Wireless LAN > QoS. The following screen appears. Figure 48 Network > Wireless LAN > QoS The following table describes the labels in this screen. Table 30 Network > Wireless LAN > QoS LABEL DESCRIPTION WMM QoS Policy...
  • Page 89: Application Priority Configuration

    Chapter 7 Wireless LAN Table 30 Network > Wireless LAN > QoS (continued) LABEL DESCRIPTION Priority This field displays the priority of the application. Highest - Typically used for voice or video that should be high- quality. High - Typically used for voice or video that can be medium-quality. Mid - Typically used for applications that do not fit into another priority.
  • Page 90 Chapter 7 Wireless LAN Network > Wireless LAN > QoS: Application Priority Configuration (continued) LABEL DESCRIPTION Service The following is a description of the applications you can prioritize with WMM QoS. Select a service from the drop-down list box. • E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals.
  • Page 91: Wps Screen

    Chapter 7 Wireless LAN 7.8 WPS Screen Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status. To open this screen, click Network > Wireless LAN > WPS tab. Figure 50 WPS The following table describes the labels in this screen.
  • Page 92: Wps Station Screen

    Chapter 7 Wireless LAN 7.9 WPS Station Screen Use this screen when you want to add a wireless station using WPS. To open this screen, click Network > Wireless LAN > WPS Station tab. Note: Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes.
  • Page 93 Chapter 7 Wireless LAN on or off on certain days and at certain times. To open this screen, click Network > Wireless LAN > Scheduling tab. Figure 52 Scheduling The following table describes the labels in this screen. Table 33 Scheduling LABEL DESCRIPTION Enable Wireless...
  • Page 94 Chapter 7 Wireless LAN NBG-417N User’s Guide...
  • Page 95: Wan

    H A P T E R 8.1 Overview This chapter discusses the NBG-417N’s WAN screens. Use these screens to configure your NBG-417N for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks (such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.
  • Page 96: What You Need To Know About Wan

    DNS Server Address Assignment Use Domain Name System (DNS) to map a domain name to its corresponding IP address and vice versa, for instance, the IP address of www.zyxel.com is 204.217.0.2. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it.
  • Page 97: Multicast

    Chapter 8 WAN WAN MAC Address The MAC address screen allows users to configure the WAN port's MAC address by either using the factory default or cloning the MAC address from a computer on your LAN. Choose Factory Default to select the factory assigned default MAC Address.
  • Page 98: Netbios Over Tcp/Ip

    Chapter 8 WAN 8.3.3 NetBIOS over TCP/IP NetBIOS (Network Basic Input/Output System) are TCP or UDP broadcast packets that enable a computer to connect to and communicate with a LAN. For some dial- up services such as PPPoE or PPTP, NetBIOS packets cause unwanted calls. However it may sometimes be necessary to allow NetBIOS packets to pass through to the WAN in order to find a computer on the WAN.
  • Page 99: Internet Connection

    Chapter 8 WAN 8.4 Internet Connection Use this screen to change your NBG-417N’s Internet access settings. Click Network > WAN. The screen differs according to the encapsulation you choose. 8.4.1 Ethernet Encapsulation This screen displays when you select Ethernet encapsulation. Figure 56 Network >...
  • Page 100: Pppoe Encapsulation

    Chapter 8 WAN Table 34 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address. IP Subnet Enter the IP Subnet Mask in this field. Mask Gateway IP Enter a Gateway IP Address (if your ISP gave you one) in this field.
  • Page 101 Chapter 8 WAN One of the benefits of PPPoE is the ability to let you access one of multiple network services, a function known as dynamic service selection. This enables the service provider to easily create and offer new IP services for individuals. Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires no specific configuration of the broadband modem at the customer site.
  • Page 102: Pptp Encapsulation

    Chapter 8 WAN Table 35 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION Password Type the password associated with the user name above. Retype to Type your password again to make sure that you have entered is Confirm correctly.
  • Page 103 Chapter 8 WAN This screen displays when you select PPTP encapsulation. Figure 58 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen. Table 36 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access...
  • Page 104 Chapter 8 WAN Table 36 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION Password Type the password associated with the User Name above. Retype to Confirm Type your password again to make sure that you have entered is correctly.
  • Page 105: Advanced Wan Screen

    Chapter 8 WAN Table 36 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION Clone the Select Clone the computer's MAC address - IP Address and computer’s MAC enter the IP address of the computer on the LAN whose MAC you address - IP are cloning.
  • Page 106 Chapter 8 WAN The following table describes the labels in this screen. Table 37 WAN > Advanced LABEL DESCRIPTION Multicast Setup Multicast Check this to enable multicasting. This applies to traffic routed from the WAN to the LAN. Leaving this blank may cause incoming traffic to be dropped or sent to all connected network devices.
  • Page 107: Lan

    H A P T E R 9.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building.
  • Page 108: What You Need To Know About Lan

    Chapter 9 LAN 9.3 What You Need To Know About LAN The actual physical connection determines whether the NBG-417N ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 60 LAN and WAN IP Addresses The LAN parameters of the NBG-417N are preset in the factory with the following values:...
  • Page 109: Lan Ip Screen

    Chapter 9 LAN 9.4 LAN IP Screen Use this screen to change your basic LAN settings. Click Network > LAN. Figure 61 Network > LAN > IP The following table describes the labels in this screen. Table 38 Network > LAN > IP LABEL DESCRIPTION IP Address...
  • Page 110 Chapter 9 LAN NBG-417N User’s Guide...
  • Page 111: Dhcp Server

    H A P T E R DHCP Server 10.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG-417N’s LAN as a DHCP server or disable it. When configured as a server, the NBG-417N provides the TCP/IP configuration for the clients.
  • Page 112: General Screen

    Chapter 10 DHCP Server 10.4 General Screen Use this screen to enable the DHCP server. Click Network > DHCP Server. The following screen displays. Figure 62 Network > DHCP Server > General The following table describes the labels in this screen. Table 39 Network >...
  • Page 113 Chapter 10 DHCP Server To change your NBG-417N’s static DHCP settings, click Network > DHCP Server > Advanced. The following screen displays. Figure 63 Network > DHCP Server > Advanced The following table describes the labels in this screen. Table 40 Network > DHCP Server > Advanced LABEL DESCRIPTION Static DHCP Table...
  • Page 114: Client List Screen

    Chapter 10 DHCP Server Table 40 Network > DHCP Server > Advanced LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG-417N's WAN IP address). The field to the Second DNS right displays the (read-only) DNS server IP address that the ISP Server assigns.
  • Page 115 Chapter 10 DHCP Server The following screen displays. Figure 64 Network > DHCP Server > Client List The following table describes the labels in this screen. Table 41 Network > DHCP Server > Client List LABEL DESCRIPTION This is the index number of the host computer. IP Address This field displays the IP address relative to the # field listed above.
  • Page 116 Chapter 10 DHCP Server NBG-417N User’s Guide...
  • Page 117: Network Address Translation (Nat)

    H A P T E R Network Address Translation (NAT) 11.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network.
  • Page 118: What You Can Do In The Nat Screens

    Chapter 11 Network Address Translation (NAT) Note: You must create a firewall rule in addition to setting up NAT, to allow traffic from the WAN to be forwarded through the NBG-417N. 11.2 What You Can Do in the NAT Screens •...
  • Page 119: What Nat Does

    Chapter 11 Network Address Translation (NAT) IP address of the same inside host when the packet is on the WAN side. The following table summarizes this information. Table 42 NAT Definitions ITEM DESCRIPTION Inside This refers to the host on the LAN. Outside This refers to the host on the WAN.
  • Page 120: General Nat Screen

    Chapter 11 Network Address Translation (NAT) so incoming reply packets can have their original values restored. The following figure illustrates this. Figure 66 How NAT Works NBG-417N 11.4 General NAT Screen Use this screen to enable NAT and set a default server. Click Network > NAT to open the General screen.
  • Page 121: Nat Application Screen

    Chapter 11 Network Address Translation (NAT) Table 43 Network > NAT > General LABEL DESCRIPTION Default Server Setup Server IP In addition to the servers for specified services, NAT supports a default Address server. A default server receives packets from ports that are not specified in the Application screen.
  • Page 122 Chapter 11 Network Address Translation (NAT) The following table describes the labels in this screen. Table 44 NAT Application LABEL DESCRIPTION Add Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address. Clear the checkbox to disallow forwarding of these ports to an inside server without having to delete the entry.
  • Page 123: Nat Advanced Screen

    Chapter 11 Network Address Translation (NAT) 11.6 NAT Advanced Screen To change your NBG-417N’s trigger port settings, click Network > NAT > Advanced. The screen appears as shown. Note: Only one LAN computer can use a trigger port (range) at a time. Figure 69 Network >...
  • Page 124: Technical Reference

    Chapter 11 Network Address Translation (NAT) Table 45 Network > NAT > Advanced LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG-417N. Reset Click Reset to begin configuring this screen afresh. 11.7 Technical Reference The following section contains additional technical information about the NBG- 417N features described in this chapter.
  • Page 125: Trigger Port Forwarding

    Chapter 11 Network Address Translation (NAT) address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 70 Multiple Servers Behind NAT Example NBG-417N 11.9 Trigger Port Forwarding...
  • Page 126: Trigger Port Forwarding Example

    Chapter 11 Network Address Translation (NAT) 11.9.1 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 71 Trigger Port Forwarding Process: Example NBG-417N Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the NBG-417N to record Jane’s computer IP address.
  • Page 127: Dynamic Dns

    H A P T E R Dynamic DNS 12.1 Overview Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address. 12.2 What You Can Do in the DDNS Screen Use the Dynamic DNS screen (Section 12.4 on page 128) to enable DDNS and configure the DDNS settings on the NBG-417N.
  • Page 128: Dynamic Dns Screen

    Chapter 12 Dynamic DNS 12.4 Dynamic DNS Screen To change your NBG-417N’s DDNS, click Network > DDNS. The screen appears as shown. Figure 72 Dynamic DNS The following table describes the labels in this screen. Table 46 Dynamic DNS LABEL DESCRIPTION Dynamic DNS Setup Enable Dynamic...
  • Page 129 Chapter 12 Dynamic DNS Table 46 Dynamic DNS LABEL DESCRIPTION Enable off line This option is available when CustomDNS is selected in the DDNS option Type field. Check with your Dynamic DNS service provider to have traffic redirected to a URL (that you can specify) while you are off line.
  • Page 130 Chapter 12 Dynamic DNS NBG-417N User’s Guide...
  • Page 131: Security

    Security Firewall (133) Content Filtering (139)
  • Page 133: Firewall

    H A P T E R Firewall 13.1 Overview Use these screens to enable and configure the firewall that protects your NBG- 417N and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN.
  • Page 134: What You Need To Know About Firewall

    Chapter 13 Firewall • Use the Services screen (Section 13.5 on page 136) screen enable service blocking, enter/delete/modify the services you want to block and the date/time you want to block them. 13.3 What You Need To Know About Firewall The NBG-417N’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks.
  • Page 135: Guidelines For Enhancing Security With Your Firewall

    Chapter 13 Firewall The NBG-417N is installed between the LAN and a broadband modem connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. The NBG-417N has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband (cable or DSL) modem to the Internet.
  • Page 136: General Firewall Screen

    Chapter 13 Firewall 13.4 General Firewall Screen Use this screen to enable or disable the NBG-417N’s firewall, and set up firewall logs. Click Security > Firewall to open the General screen. Figure 74 Security > Firewall > General l The following table describes the labels in this screen. Table 47 Security >...
  • Page 137 Chapter 13 Firewall Click Security > Firewall > Services. The screen appears as shown next. Figure 75 Security > Firewall > Services l The following table describes the labels in this screen. Table 48 Security > Firewall > Services LABEL DESCRIPTION ICMP Internet Control Message Protocol is a message control and error-...
  • Page 138 Chapter 13 Firewall NBG-417N User’s Guide...
  • Page 139: Content Filtering

    H A P T E R Content Filtering 14.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords.
  • Page 140 For example, with the URL www.zyxel.com.tw/news/pressroom.php, the NBG-417N would find “tw” in the domain name (www.zyxel.com.tw). It would also find “news” in the file path (news/pressroom.php) but it would not find “tw/news”.
  • Page 141: Filter Screen

    Chapter 14 Content Filtering 14.4 Filter Screen Use this screen to restrict web features, add keywords for blocking and designate a trusted computer. Click Security > Content Filter to open the Filter screen. Figure 76 Security > Content Filter > Filter The following table describes the labels in this screen.
  • Page 142: Technical Reference

    Full path URL checking has the NBG-417N check the characters that come before the last slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, full path URL checking searches for keywords within www.zyxel.com.tw/news/. Use the ip urlfilter customize actionFlags 6 [disable | enable] command to extend (or not extend) the keyword blocking search to include the URL's full path.
  • Page 143 Chapter 14 Content Filtering For example, filename URL checking searches for keywords within the URL www.zyxel.com.tw/news/pressroom.php. Use the ip urlfilter customize actionFlags 8 [disable | enable] command to extend (or not extend) the keyword blocking search to include the URL's complete filename.
  • Page 144 Chapter 14 Content Filtering NBG-417N User’s Guide...
  • Page 145: Management

    Management Static Route (147) Remote Management (159) Universal Plug-and-Play (UPnP) (163)
  • Page 147: Static Route

    H A P T E R Static Route 15.1 Overview This chapter shows you how to configure static routes for your NBG-417N. The NBG-417N usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the NBG-417N send data to devices not reachable through the default gateway, use static routes.
  • Page 148: What You Can Do In The Ip Static Route Screens

    Chapter 15 Static Route 15.2 What You Can Do in the IP Static Route Screens • Use the IP Static Route screen (Section 15.3 on page 148) to view existing static route rules. • Use the Static Route Setup screen (Section 15.3.1 on page 149) to add or edit a static route rule.
  • Page 149: Static Route Setup Screen

    Chapter 15 Static Route Table 50 Management > Static Route > IP Static Route LABEL DESCRIPTION Gateway This is the IP address of the gateway. The gateway is an immediate neighbor of your NBG-417N that will forward the packet to the destination.
  • Page 150 Chapter 15 Static Route Table 51 Management > Static Route > IP Static Route: Static Route Setup LABEL DESCRIPTION Metric Metric represents the “cost” of transmission for routing purposes. IP routing uses hop count as the measurement of cost, with a minimum of 1 for directly connected networks.
  • Page 151: Bandwidth Management

    This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B).
  • Page 152: What You Need To Know About Bandwidth Management

    Chapter 16 Bandwidth Management 16.3 What You Need To Know About Bandwidth Management You can limit an application’s uplink or downlink bandwidth. This limit keeps the traffic from using up too much of the out-going interface’s bandwidth. This way you can make sure there is bandwidth for other applications. Use the following guidelines: •...
  • Page 153: Bandwidth Management Advanced Configuration

    Chapter 16 Bandwidth Management The following table describes the labels in this screen. Table 52 Management > Bandwidth MGMT > General LABEL DESCRIPTION Service Management Bandwidth This field allows you to have NBG-417N apply bandwidth Management management. Type Select Priority Queue or Bandwidth Allocation to enable bandwidth management.
  • Page 154 Chapter 16 Bandwidth Management Click Management > Bandwidth MGMT > Advanced to open the bandwidth management Advanced screen. Figure 82 Management > Bandwidth MGMT > Advanced The following table describes the labels in this screen. Table 53 Management > Bandwidth MGMT > Advanced LABEL DESCRIPTION Priority Queue...
  • Page 155: Priority Levels

    Chapter 16 Bandwidth Management Table 53 Management > Bandwidth MGMT > Advanced (continued) LABEL DESCRIPTION Specific Port This displays the port/s assigned to the service. You can also specify the port/s to services to which you want to allocate bandwidth. Choose either Both, TCP or UDP in the drop-down menu and enter the port or range of ports in the provided boxes.
  • Page 156: Rule Configuration: User Defined Service Rule Configuration

    Chapter 16 Bandwidth Management • High - Typically used for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay). • Low - This is typically used for all other traffic that are not time-sensitive. 16.5.2 Rule Configuration: User Defined Service Rule Configuration If you want to edit a bandwidth management rule for specific protocols on an IP or...
  • Page 157: Predefined Bandwidth Management Services

    Chapter 16 Bandwidth Management LABEL DESCRIPTION Apply Click Apply to save your customized settings. Reset Click Reset to begin configuring this screen afresh. 16.5.3 Predefined Bandwidth Management Services The following is a description of the services that you can select and to which you can apply media bandwidth management in the Management >...
  • Page 158: Services And Port Numbers

    Chapter 16 Bandwidth Management 16.5.4 Services and Port Numbers Appendix F on page 259 for commonly used services and port numbers. NBG-417N User’s Guide...
  • Page 159: Remote Management

    H A P T E R Remote Management 17.1 Overview This chapter provides information on the Remote Management screens. Remote management allows you to determine which services/protocols can access which NBG-417N interface (if any) from which computers. You may manage your NBG-417N from a remote location via: •...
  • Page 160: Remote Management Limitations

    Chapter 17 Remote Management 17.3.1 Remote Management Limitations Remote management over LAN or WAN will not work when: You have disabled that service in one of the remote management screens. The IP address in the Secured Client IP Address field does not match the client IP address.
  • Page 161: Www Screen

    Chapter 17 Remote Management 17.4 WWW Screen To change your NBG-417N’s World Wide Web settings, click Management > Remote MGMT to display the WWW screen. Figure 84 Management > Remote MGMT > WWW The following table describes the labels in this screen Table 56 Management >...
  • Page 162 Chapter 17 Remote Management NBG-417N User’s Guide...
  • Page 163: Universal Plug-And-Play (Upnp)

    H A P T E R Universal Plug-and-Play (UPnP) 18.1 Overview This chapter introduces the UPnP feature in the Web Configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network.
  • Page 164 All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention. UPnP and ZyXEL ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum UPnP™ Implementers Corp. (UIC). ZyXEL's UPnP implementation supports Internet Gateway Device (IGD) 1.0.
  • Page 165: Upnp Screen

    Chapter 18 Universal Plug-and-Play (UPnP) 18.4 UPnP Screen Use this screen to enable UPnP. Click the Management > UPnP to open the following screen. Figure 85 Management > UPnP > General The following table describes the labels in this screen. Table 57 Management >...
  • Page 166: Installing Upnp In Windows Example

    Chapter 18 Universal Plug-and-Play (UPnP) 18.5.1 Installing UPnP in Windows Example This section shows how to install UPnP in Windows Me and Windows XP. 18.5.1.1 Installing UPnP in Windows Me Follow the steps below to install the UPnP in Windows Me. Click Start and Control Panel.
  • Page 167 Chapter 18 Universal Plug-and-Play (UPnP) In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 87 Add/Remove Programs: Windows Setup: Communication: Components Click OK to go back to the Add/Remove Programs Properties window and click Next.
  • Page 168: Using Upnp In Windows Xp Example

    Chapter 18 Universal Plug-and-Play (UPnP) The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. Figure 89 Windows Optional Networking Components Wizard In the Networking Services window, select the Universal Plug and Play check box.
  • Page 169 Chapter 18 Universal Plug-and-Play (UPnP) Auto-discover Your UPnP-enabled Network Device Click Start and Control Panel. Double-click Network Connections. An icon displays under Internet Gateway. Right-click the icon and select Properties. Figure 91 Network Connections In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
  • Page 170 Chapter 18 Universal Plug-and-Play (UPnP) You may edit or delete the port mappings or click Add to manually add port mappings. Figure 93 Internet Connection Properties: Advanced Settings Figure 94 Internet Connection Properties: Advanced Settings: Add When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
  • Page 171 Chapter 18 Universal Plug-and-Play (UPnP) Double-click on the icon to display your current Internet connection status. Figure 96 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG-417N without finding out the IP address of the NBG-417N first. This comes helpful if you do not know the IP address of the NBG-417N.
  • Page 172 Chapter 18 Universal Plug-and-Play (UPnP) Select My Network Places under Other Places. Figure 97 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. Right-click on the icon for your NBG-417N and select Invoke. The Web Configurator login screen displays.
  • Page 173 Chapter 18 Universal Plug-and-Play (UPnP) Right-click on the icon for your NBG-417N and select Properties. A properties window displays with basic information about the NBG-417N. Figure 99 Network Connections: My Network Places: Properties: Example NBG-417N User’s Guide...
  • Page 174 Chapter 18 Universal Plug-and-Play (UPnP) NBG-417N User’s Guide...
  • Page 175: Maintenance And Troubleshooting

    Maintenance and Troubleshooting System (177) Logs (183) Tools (185) Sys OP Mode (191) Language (195) Troubleshooting (197)
  • Page 177: System

    H A P T E R System 19.1 Overview This chapter provides information on the System screens. See the chapter about wizard setup for more information on the next few screens. 19.2 What You Can Do in the System Screens •...
  • Page 178 Chapter 19 System The following table describes the labels in this screen. Table 58 Maintenance > System > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the NBG-417N in an Ethernet network. It is recommended you enter your computer’s “Computer name”...
  • Page 179: Time Setting Screen

    Chapter 19 System 19.4 Time Setting Screen To change your NBG-417N’s time and date, click Maintenance > System > Time Setting. The screen appears as shown. Use this screen to configure the NBG- 417N’s time based on your local time zone. Figure 101 Maintenance >...
  • Page 180 Chapter 19 System Table 59 Maintenance > System > Time Setting LABEL DESCRIPTION New Time This field displays the last updated time from the time server or the last time configured manually. (hh:mm:ss) When you set Time and Date Setup to Manual, enter the new time in this field and then click Apply.
  • Page 181 Chapter 19 System Table 59 Maintenance > System > Time Setting LABEL DESCRIPTION End Date Configure the day and time when Daylight Saving Time ends if you selected Daylight Savings. The o'clock field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time ends in the United States on the last Sunday of October.
  • Page 182 Chapter 19 System NBG-417N User’s Guide...
  • Page 183: Logs

    H A P T E R Logs 20.1 Overview This chapter contains information about configuring general log settings and viewing the NBG-417N’s logs. Refer to the appendices for example log message explanations. The Web Configurator allows you to look at all of the NBG-417N’s logs in one location.
  • Page 184: View Log Screen

    Chapter 20 Logs 20.4 View Log Screen Use the View Log screen to see the logged messages for the NBG-417N. Options include logs about system maintenance, system errors, access control, allowed or blocked web sites, blocked web features (such as ActiveX controls, Java and cookies), attacks (such as DoS) and IPSec.
  • Page 185: Tools

    21.3 Firmware Upload Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a “*.bin” extension, e.g., “NBG-417N.bin”. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
  • Page 186 Chapter 21 Tools Click Maintenance > Tools. Follow the instructions in this screen to upload firmware to your NBG-417N. Figure 103 Maintenance > Tools > Firmware The following table describes the labels in this screen. Table 61 Maintenance > Tools > Firmware LABEL DESCRIPTION File Path...
  • Page 187 Chapter 21 Tools The NBG-417N automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 105 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the Status screen.
  • Page 188: Configuration Screen

    Chapter 21 Tools 21.4 Configuration Screen Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 107 Maintenance > Tools > Configuration 21.4.1 Backup Configuration Backup configuration allows you to back up (save) the NBG-417N’s current configuration to a file on your computer.
  • Page 189: Restore Configuration

    Chapter 21 Tools 21.4.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG-417N. Table 62 Maintenance Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse...
  • Page 190: Back To Factory Defaults

    Chapter 21 Tools If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen. Figure 110 Configuration Restore Error 21.4.3 Back to Factory Defaults Pressing the Reset button in this section clears all user-entered configuration information and returns the NBG-417N to its factory defaults.
  • Page 191: Sys Op Mode

    H A P T E R Sys OP Mode 22.1 Overview The Sys OP Mode (System Operation Mode) function lets you configure whether your NBG-417N is a router or AP. You can choose between Router Mode and AP Mode depending on your network topology and the features you require from your device.
  • Page 192: What You Need To Know About Sys Op Mode

    Chapter 22 Sys OP Mode 22.3 What You Need to Know About Sys OP Mode Router A router connects your local network with another network, such as the Internet. The router has two IP addresses, the LAN IP address and the WAN IP address. Figure 112 LAN and WAN IP Addresses in Router Mode Internet WAN IP...
  • Page 193: General Screen

    Chapter 22 Sys OP Mode 22.4 General Screen Use this screen to select how you connect to the Internet. Figure 114 Maintenance > Sys OP Mode > General If you select Router Mode, the following pop-up message window appears. Figure 115 Maintenance > Sys Op Mode > General: Router •...
  • Page 194 Chapter 22 Sys OP Mode • The DHCP server on your device is disabled. In AP mode there must be a device with a DHCP server on your network such as a router or gateway which can allocate IP addresses. The IP address of the device on the local network is set to 192.168.1.2.
  • Page 195: Language

    H A P T E R Language 23.1 Language Screen Use this screen to change the language for the Web Configurator display. Click the language you prefer. The Web Configurator language changes after a while without restarting the NBG-417N. Figure 117 Language NBG-417N User’s Guide...
  • Page 196 Chapter 23 Language NBG-417N User’s Guide...
  • Page 197: Troubleshooting

    H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG-417N Access and Login • Internet Access •...
  • Page 198: Nbg-417N Access And Login

    Chapter 24 Troubleshooting Inspect your cables for damage. Contact the vendor to replace any damaged cables. Disconnect and re-connect the power adaptor to the NBG-417N. If the problem continues, contact the vendor. 24.2 NBG-417N Access and Login I don’t know the IP address of my NBG-417N. The default IP address is 192.168.1.1.
  • Page 199 Chapter 24 Troubleshooting If this does not work, you have to reset the device to its factory defaults. See Section 24.4 on page 201. I cannot see or access the Login screen in the Web Configurator. Make sure you are using the correct IP address. •...
  • Page 200: Internet Access

    Chapter 24 Troubleshooting This can happen when you fail to log out properly from your last session. Try logging in again after 5 minutes. Disconnect and re-connect the power adaptor or cord to the NBG-417N. If this does not work, you have to reset the device to its factory defaults. See Section 24.4 on page 201.
  • Page 201: Resetting The Nbg-417N To Its Factory Defaults

    Chapter 24 Troubleshooting Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.5 on page Reboot the NBG-417N. If the problem continues, contact your ISP. The Internet connection is slow or intermittent. There might be a lot of traffic on the network.
  • Page 202: Wireless Router/Ap Troubleshooting

    Chapter 24 Troubleshooting Press the RESET button for longer than 1 second to restart/reboot the NBG-417N. Press the RESET button for longer than five seconds to set the NBG-417N back to its factory-default configurations. If the NBG-417N restarts automatically, wait for the NBG-417N to finish restarting, and log in to the Web Configurator.
  • Page 203 Chapter 24 Troubleshooting Make sure that you select the Enable URL Keyword Blocking check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Keyword List. If a keyword that is listed in the Keyword List is not blocked when it is found in a URL, customize the keyword blocking using commands.
  • Page 204 Chapter 24 Troubleshooting NBG-417N User’s Guide...
  • Page 205: Appendices And Index

    Appendices and Index Product Specifications (207) Pop-up Windows, JavaScripts and Java Permissions (211) IP Addresses and Subnetting (219) Setting up Your Computer’s IP Address (229) Wireless LANs (247) Services (259) Legal Information (263) Index (271)
  • Page 207: Appendix A Product Specifications

    P P E N D I X Product Specifications The following tables summarize the NBG-417N’s hardware and firmware features. Table 64 Hardware Features Dimensions (W x D x 140 mm x 110 mm x 30 mm Weight 190 g Power Specification Input: 120~240 AC, 50~60 Hz Output: 12 V DC 1A Ethernet ports...
  • Page 208 Bluetooth enabled devices, and other wireless LANs. Firmware Upgrade Download new firmware (when available) from the ZyXEL web site and use the Web Configurator to put it on the NBG-417N. Note: Only upload firmware for your specific model! Configuration Backup &...
  • Page 209 IP default gateway and DNS servers to computers on your network. Dynamic DNS Support With Dynamic DNS (Domain Name System) support, you can use a fixed URL, www.zyxel.com for example, with a dynamic IP address. You must register for this service with a Dynamic DNS service provider. IP Multicast IP Multicast is used to send traffic to a specific group of computers.
  • Page 210 Appendix A Product Specifications NBG-417N User’s Guide...
  • Page 211: Appendix B Pop-Up Windows, Javascripts And Java Permissions

    P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 212 Appendix B Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, select Tools, Internet Options, Privacy. Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 119 Internet Options: Privacy Click Apply to save this setting.
  • Page 213 Appendix B Pop-up Windows, JavaScripts and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 120 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. NBG-417N User’s Guide...
  • Page 214 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 121 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScripts If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
  • Page 215 Appendix B Pop-up Windows, JavaScripts and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 122 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 216: Java Permissions

    Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 123 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 217 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 124 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. NBG-417N User’s Guide...
  • Page 218 Appendix B Pop-up Windows, JavaScripts and Java Permissions Click OK to close the window. Figure 125 Java (Sun) NBG-417N User’s Guide...
  • Page 219: Appendix C Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
  • Page 220: Subnet Masks

    Appendix C IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 126 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 221 Appendix C IP Addresses and Subnetting Table 66 Subnet Mask - Identifying Network Number OCTET: OCTET: OCTET: OCTET (192) (168) Network Number 11000000 10101000 00000001 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
  • Page 222 Appendix C IP Addresses and Subnetting As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows: Table 68 Maximum Host Numbers MAXIMUM NUMBER OF SUBNET MASK HOST ID SIZE HOSTS 8 bits 255.0.0.0...
  • Page 223 Appendix C IP Addresses and Subnetting Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons. In this example, the company network address is 192.168.1.0.
  • Page 224 Appendix C IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 128 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of –...
  • Page 225 Appendix C IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 2 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 70 Subnet 1 LAST OCTET BIT IP/SUBNET MASK...
  • Page 226 Appendix C IP Addresses and Subnetting Table 73 Subnet 4 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.193 192.168.1.192 Broadcast Address: Highest Host ID: 192.168.1.254 192.168.1.255 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111).
  • Page 227: Configuring Ip Addresses

    Appendix C IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 76 16-bit Network Number Subnet Planning NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.128.0 (/17) 32766...
  • Page 228 Appendix C IP Addresses and Subnetting that you entered. You don't need to change the subnet mask computed by the NBG-417N unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
  • Page 229: Appendix D Setting Up Your Computer's Ip Address

    P P E N D I X Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer.
  • Page 230 Appendix D Setting up Your Computer’s IP Address Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. Figure 129 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks.
  • Page 231 Appendix D Setting up Your Computer’s IP Address Select Microsoft from the list of manufacturers. Select TCP/IP from the list of network protocols and then click OK. If you need Client for Microsoft Networks: Click Add. Select Client and then click Add. Select Microsoft from the list of manufacturers.
  • Page 232 Appendix D Setting up Your Computer’s IP Address Click the DNS Configuration tab. • If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). Figure 131 Windows 95/98/Me: TCP/IP Properties: DNS Configuration Click the Gateway tab.
  • Page 233 Appendix D Setting up Your Computer’s IP Address Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 132 Windows XP: Start Menu NBG-417N User’s Guide...
  • Page 234 Appendix D Setting up Your Computer’s IP Address In the Control Panel, double-click Network Connections (Network and Dial- up Connections in Windows 2000/NT). Figure 133 Windows XP: Control Panel Right-click Local Area Connection and then click Properties. Figure 134 Windows XP: Control Panel: Network Connections: Properties NBG-417N User’s Guide...
  • Page 235 Appendix D Setting up Your Computer’s IP Address Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 135 Windows XP: Local Area Connection Properties The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
  • Page 236 Appendix D Setting up Your Computer’s IP Address • Click Advanced. Figure 136 Windows XP: Internet Protocol (TCP/IP) Properties If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
  • Page 237 Appendix D Setting up Your Computer’s IP Address • Click OK when finished. Figure 137 Windows XP: Advanced TCP/IP Properties In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
  • Page 238 Appendix D Setting up Your Computer’s IP Address If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. Figure 138 Windows XP: Internet Protocol (TCP/IP) Properties Click OK to close the Internet Protocol (TCP/IP) Properties window. Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window.
  • Page 239 Appendix D Setting up Your Computer’s IP Address Macintosh OS 8/9 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/ IP Control Panel. Figure 139 Macintosh OS 8/9: Apple Menu NBG-417N User’s Guide...
  • Page 240 Appendix D Setting up Your Computer’s IP Address Select Ethernet built-in from the Connect via list. Figure 140 Macintosh OS 8/9: TCP/IP For dynamically assigned settings, select Using DHCP Server from the Configure: list. For statically assigned settings, do the following: •...
  • Page 241: Macintosh Os X

    Appendix D Setting up Your Computer’s IP Address Macintosh OS X Click the Apple menu, and click System Preferences to open the System Preferences window. Figure 141 Macintosh OS X: Apple Menu Click Network in the icon bar. • Select Automatic from the Location list. •...
  • Page 242 Appendix D Setting up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. •...
  • Page 243 Appendix D Setting up Your Computer’s IP Address Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. Figure 144 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list.
  • Page 244 Appendix D Setting up Your Computer’s IP Address Click the Devices tab. Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 146 Red Hat 9.0: KDE: Network Configuration: Activate After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.
  • Page 245 Appendix D Setting up Your Computer’s IP Address • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0.
  • Page 246: Verifying Settings

    Appendix D Setting up Your Computer’s IP Address 24.5.1 Verifying Settings Enter ifconfig in a terminal screen to check your TCP/IP properties. Figure 151 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500...
  • Page 247: Appendix E Wireless Lans

    P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 248 Appendix E Wireless LANs with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. Figure 153 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 249 Appendix E Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate. Figure 154 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area.
  • Page 250 Appendix E Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 155 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 251: Fragmentation Threshold

    Appendix E Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
  • Page 252 Appendix E Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 77 IEEE 802.11g DATA RATE MODULATION (MBPS) DBPSK (Differential Binary Phase Shift Keyed) DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/...
  • Page 253: Types Of Authentication

    Appendix E Wireless LANs Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. •...
  • Page 254 Appendix E Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication.
  • Page 255 Appendix E Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled. Note: EAP-MD5 cannot be used with dynamic WEP key exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
  • Page 256 Appendix E Wireless LANs TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients.
  • Page 257: Wpa(2)-Psk Application Example

    Appendix E Wireless LANs 24.5.2 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols).
  • Page 258: Security Parameters Summary

    Appendix E Wireless LANs Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 79 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY...
  • Page 259: Appendix F Services

    A popular videoconferencing solution from White Pines Software. TCP/UDP 24032 TCP/UDP Domain Name Server, a service that matches web names (e.g. www.zyxel.com) to IP numbers. User-Defined The IPSEC ESP (Encapsulation (IPSEC_TUNNEL) Security Protocol) tunneling protocol uses this service. FINGER Finger is a UNIX or Internet related command that can be used to find out if a user is logged on.
  • Page 260 Appendix F Services Table 80 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 1720 NetMeeting uses this protocol. HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide...
  • Page 261 Appendix F Services Table 80 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION POP3 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). POP3S This is a more secure version of POP3 that runs over SSL.
  • Page 262 Appendix F Services Table 80 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SSDP 1900 The Simple Service Discovery Protocol supports Universal Plug-and-Play (UPnP). TCP/UDP Secure Shell Remote Login Program. STRM WORKS 1558 Stream Works Protocol. SYSLOG Syslog allows you to send system logs to a UNIX server.
  • Page 263: Appendix G Legal Information

    Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice.
  • Page 264 Appendix G Legal Information harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna.
  • Page 265 Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications Go to http://www.zyxel.com. Select your product on the ZyXEL home page to go to that product's page. Select the certification you wish to view from this page. NBG-417N User’s Guide...
  • Page 266: Zyxel Limited Warranty

    Appendix G Legal Information ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should...
  • Page 267 Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
  • Page 268 Software (ftp://opensource.zyxel.com), and your use of such material is governed by their respective terms. ZyXEL has provided, as part of the Software package, access to certain third party software as a convenience.
  • Page 269 Appendix G Legal Information IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS...
  • Page 270 Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto.
  • Page 271: Index

    Index Index restore content filtering by keyword (in URL) Address Assignment by web feature Alert copyright alternative subnet mask notation CPU usage 31, 55 CTS (Clear to Send) AP (Access Point) AP Mode menu overview status screen AP+Bridge Daylight saving Auto-bridge DDNS see also Dynamic DNS...
  • Page 272 Firewall overview WAN connection guidelines Internet connection wizard ICMP packets Internet Group Multicast Protocol network security IP Address 109, 121 Stateful inspection ZyXEL device firewall IP address dynamic firewall stateful inspection IP Pool Firmware upload file extension using HTTP firmware version...
  • Page 273 Index local (user) database see also Network Basic Input/Output System and encryption Network Address Translation 117, 120 Local Area Network Operating Channel 31, 55 operating mode MAC address 77, 97 cloning 51, 97 MAC address filter MAC address filtering MAC filter managing the device peer-to-peer good habits...
  • Page 274 Index Shared Secret Key subnet mask 49, 220 RADIUS Message Types subnetting RADIUS Messages Summary DHCP table RADIUS server Packet statistics registration Wireless station status product syntax conventions related documentation Sys Op Mode Remote management System General Setup and NAT and the firewall System Name limitations...
  • Page 275 Index complete Internet connection system information wireless LAN WLAN Interference Security Parameters IP address assignment World Wide Web WAN (Wide Area Network) WPA compatible WAN advanced WPA, WPA2 WAN IP address WAN IP address assignment 90, 157 WAN MAC address warranty note Web Configurator...
  • Page 276 Index NBG-417N User’s Guide...

This manual is also suitable for:

Nbg-417n

Table of Contents