• Supporting Disc Refer to the included CD for support documents. • ZyXEL Web Site Please refer to http://www.us.zyxel.com for additional support documentation and product certifications. User’s Guide Feedback Help us help you. Send all User’s Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your P-330W. Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
Safety Warnings Safety Warnings For your safety, be sure to read and follow all warning notices and instructions. • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. •...
Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions......................4 Safety Warnings........................6 Contents Overview ........................9 Table of Contents........................11 List of Figures ......................... 17 List of Tables........................... 21 Part I: Introduction................. 23 Chapter 1 Introducing the P-330W......................
Page 15
Table of Contents Appendix D Wireless LANs ....................171 Appendix E Open Software Announcements ............... 185 Appendix F Legal Information ....................195 Appendix G Customer Support .................... 199 Index............................205 P-330W User’s Guide...
Figure 3 LEDs ............................27 Figure 4 The MAIN MENU Screen of the Web Configurator ..............30 Figure 5 ZyXEL Utility: Security Settings ....................36 Figure 6 ZyXEL Utility: Confirm Save ..................... 37 Figure 7 ZyXEL Utility: Link Info ......................37 Figure 8 Wizard 2: DHCP Client Encapsulation ..................
Page 18
List of Figures Figure 39 WPA with RADIUS Application Example ................74 Figure 40 Wireless Security Setup: WPA With RADIUS ................. 75 Figure 41 Wireless: WDS Settings ......................76 Figure 42 Wireless: Trusted Stations MAC Address Filter ..............77 Figure 43 Wireless: WPS ........................80 Figure 44 How WPS works ........................
Page 19
List of Figures Figure 82 Windows XP: Control Panel: Network Connections: Properties ........... 136 Figure 83 Windows XP: Local Area Connection Properties ..............136 Figure 84 Windows XP: Internet Protocol (TCP/IP) Properties ............137 Figure 85 Windows XP: Advanced TCP/IP Properties ................. 138 Figure 86 Windows XP: Internet Protocol (TCP/IP) Properties ............
Page 20
List of Figures Figure 125 Peer-to-Peer Communication in an Ad-hoc Network ............171 Figure 126 Basic Service Set ....................... 172 Figure 127 Infrastructure WLAN ......................173 Figure 128 RTS/CTS ........................... 174 Figure 129 WPA(2) with RADIUS Application Example ............... 181 Figure 130 WPA(2)-PSK Authentication ....................
The P-330W is the ideal secure gateway for all data passing between the Internet and LAN’s. By integrating NAT, firewall, wireless access point and 4-port switch, ZyXEL’s P-330W is a complete security solution that protects your Intranet and efficiently manages data traffic on your network.
Chapter 1 Introducing the P-330W Figure 2 Wireless LAN Application 1.2 Ways to Manage the P-330W Web Configurator. This is recommended for everyday management of the P-330W using a (supported) web browser. See Chapter 2 on page 1.3 Good Habits for Managing the P-330W Do the following things regularly to make the P-330W more secure and to manage the P- 330W more effectively.
Chapter 1 Introducing the P-330W 1.4 LEDs Figure 3 LEDs Table 2 LEDs COLOR STATUS DESCRIPTION PWR/SYS Green The P-330W is receiving power. Amber Power to the P-330W is in the process of booting. Blinking Unit is resetting to factory defaults. The P-330W is not receiving power.
Page 28
Chapter 1 Introducing the P-330W P-330W User’s Guide...
H A P T E R Introducing the Web Configurator This chapter describes how to access the P-330W web configurator and provides an overview of its screens. 2.1 Web Configurator Overview The embedded web configurator allows you to manage the P-330W from anywhere through a browser such as Microsoft Internet Explorer or Netscape Navigator.
Chapter 2 Introducing the Web Configurator 2.2.1 Resetting the P-330W If you forget your password or cannot access the web configurator, you will need to use the RESET button at the back of the P-330W to reload the factory-default configuration file. This means that you will lose all configurations that you had previously and the password will be reset to “1234”.
Chapter 2 Introducing the Web Configurator 2.2.3 Navigation Panel After you log in, use the sub-menus on the navigation panel to configure P-330W features.The following table describes the sub-menus. Table 3 Screens Summary LINK FUNCTION SETUP WIZARD Use these screens for initial configuration including general setup, Wireless LAN setup, ISP parameters for Internet Access and WAN IP/DNS Server/MAC address assignment.
Page 32
Chapter 2 Introducing the Web Configurator Table 3 Screens Summary LINK FUNCTION Administrator Remote Use this page to allow remote clients to manage the P-330W. Management Config File Use this screen to backup and restore the configuration or reset the factory defaults to your P-330W. Logs Use this screen to change your P-330W’s log settings and to view the logs for the categories that you selected.
This section describes how to connect the wireless client to your WiFi network. 3.1.1 Connecting to a Wireless LAN The following sections show you how to join a wireless network using the ZyXEL utility, as in the following diagram. The wireless client is labelled C and the access point is labelled AP.
Chapter 3 Tutorials 1 Open the ZyXEL utility and click the Site Survey tab to open the screen shown next. 2 The wireless client automatically searches for available wireless networks. Click Scan if you want to search again. If no entry displays in the Available Network List, that means there is no wireless network available within range.
Chapter 3 Tutorials Figure 6 ZyXEL Utility: Confirm Save 5 The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your settings. When the wireless link is established, the ZyXEL utility icon in the system tray turns green and the Link Info screen displays details of the active connection.
H A P T E R Wizard Setup This chapter provides information on the Wizard Setup screens in the web configurator. 4.1 Wizard Setup Overview The web configurator’s setup wizard helps you configure your device to access the Internet. The second screen has five variations depending on what encapsulation type you use. Leave a field blank if you don’t have that information.
Chapter 4 Wizard Setup Figure 9 Wizard 2: Static IP Encapsulation The following table describes the labels in this screen. Table 4 Wizard 2: Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access IP Address The fixed IP address should be in the same subnet as your broadband modem or router.
Chapter 4 Wizard Setup By implementing PPPoE directly on the P-330W (rather than individual computers), the computers on the LAN do not need PPPoE software installed, since the P-330W does that part of the task. Furthermore, with NAT, all of the LAN's computers will have Internet access. Refer to the appendix for more information on PPPoE.
Chapter 4 Wizard Setup Figure 11 Wizard 2: PPTP Encapsulation The following table describes the fields in this screen Table 6 Wizard 2: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access IP Address Type the (static) IP address assigned to you by your ISP. Subnet Mask Type the subnet mask assigned to you by your ISP.
Chapter 4 Wizard Setup Figure 12 Wizard 2: L2TP Encapsulation The following table describes the fields in this screen Table 7 Wizard 2: L2TP Encapsulation LABEL DESCRIPTION Attain IP Select this if your ISP automatically assigns you an IP Address. Automatically Set IP Manually Select this if your ISP has assigned you a fixed IP address.
Chapter 4 Wizard Setup Figure 13 Wizard 3: Wireless LAN Basic Setup The following table describes the labels in this screen. Table 8 Wizard 3: Wireless LAN Basic Setup LABEL DESCRIPTION Band Choose the operating mode of your wireless access point. 2.4Ghz (B+G) offers the greatest compatibility.
Chapter 4 Wizard Setup 4.4.1 No Encryption Choose None to allow the WLAN to operate without encryption. Warning: With no encryption enabled anyone will be able to access your network and view any data you send over the wireless LAN. 4.4.2 WEP Encryption Choose WEP to setup WEP Encryption parameters.
Chapter 4 Wizard Setup Table 9 Wizard 4: Wireless LAN Setup: WEP Security LABEL DESCRIPTION Back Click Back to display the previous screen. Next Click Next to proceed to the next screen. 4.4.3 WPA Choose WPA security in the Wireless LAN Setup screen to set up a Pre-Shared Key using TKIP or AES encryption.
Chapter 4 Wizard Setup Figure 16 Wizard 4: Wireless LAN Setup: WPA2 Security The following table describes the labels in this screen. Table 11 Wizard 4: Wireless LAN Setup: WPA2 Security LABEL DESCRIPTION WPA (Pre- You can choose to enter the pre-shared key manually in HEX format or use a Shared Key) passphrase.
Chapter 4 Wizard Setup Table 12 Wizard 4: Wireless LAN Setup: WPA2 Security LABEL DESCRIPTION Cancel Click Cancel to abort the setup wizard. Back Click Back to display the previous screen. Next Click Next to proceed to the next screen. 4.5 Basic Setup Complete Click Finish to complete the wizard setup and save your configuration.
H A P T E R System Screens This chapter provides information on the options configurable from the main System screens. Figure 18 System Screen Menu Options 5.1 Setup Wizard See the Setup Wizard chapter for more information on this selection. 5.2 Operation Mode Click Operation Mode to open the Operation Mode screen.
Chapter 5 System Screens The following table describes the labels in this screen. Table 13 System General Setup LABEL DESCRIPTION Gateway This is the standard operating mode. The P-330W takes on all the usual roles of a home router, including NAT, DHCP Server, and Firewall. Bridge Select this to turn your P-330W into a pure bridge, directly linking all computers on your network to the WAN.
Chapter 5 System Screens • IP address of 192.168.10.1 with subnet mask of 255.255.255.0 (24 bits) • DHCP server enabled with 33 client IP addresses starting from 192.168.10.33. These parameters should work for the majority of installations. If your ISP gives you explicit DNS server address(es), read the embedded web configurator help regarding what fields need to be configured.
Chapter 5 System Screens Table 14 LAN IP Setup LABEL DESCRIPTION DHCP DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients (computers) to obtain TCP/IP configuration at startup from a server. Choose Server box selected unless your ISP instructs you to do otherwise.
Chapter 5 System Screens 5.5 Status Screen Click STATUS to open the Status screen, which you can use to monitor your P-330W. Note that these fields are READ-ONLY and only for diagnostic purposes. Figure 22 Status The following table describes the labels in this screen. Table 16 Status LABEL DESCRIPTION...
Page 56
Chapter 5 System Screens P-330W User’s Guide...
H A P T E R Wireless This chapter discusses how to configure the Wireless screens on the P-330W. 6.1 Wireless LAN Overview This section introduces the wireless LAN(WLAN) and some basic scenarios. 6.1.1 IBSS An Independent Basic Service Set (IBSS), also called an Ad-hoc network, is the simplest WLAN configuration.
Chapter 6 Wireless Figure 24 Basic Service set 6.1.3 ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). An ESSID (ESS IDentification) uniquely identifies each ESS.
Chapter 6 Wireless Figure 25 Extended Service Set 6.1.4 RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations (STA) are within range of the access point (AP) or wireless gateway, but out-of-range of each other, so they cannot “hear”...
Chapter 6 Wireless 6.2 Configuring Wireless If you are configuring the P-330W from a computer connected to the wireless LAN and you change the P-330W’s SSID or WEP settings, you will lose your wireless connection when you press Save. You must then change the wireless settings of your computer to match the P-330W’s new settings Click the WIRELESS link to open the Wireless Options screen.
Chapter 6 Wireless The following table describes the basic wireless LAN labels in this screen. Table 17 Wireless: Basic Settings LABEL DESCRIPTION Disable Access Select this check box to disable the wireless LAN capabilities of your P-330W. Point Band Choose the operating mode of your wireless access point. 2.4Ghz (B+G) offers the greatest compatibility.
Chapter 6 Wireless Figure 29 WEP Authentication Steps Open system authentication involves an unencrypted two-message procedure. A wireless station sends an open system authentication request to the AP, which will then automatically accept and connect the wireless station to the network. In effect, open system is not authentication at all as any station can gain access to the network.
Chapter 6 Wireless Select Long if you have a ‘noisy’ network or are unsure of what preamble mode your wireless clients support as all IEEE 802.11b compliant wireless adapters must support long preamble. However, not all wireless adapters support short preamble. Use long preamble if you are unsure what preamble mode the wireless adapters support, to ensure interpretability between the P-330W and the wireless stations and to provide more reliable communication in ‘noisy’...
Chapter 6 Wireless 6.5 Site Survey Click Site Survey to scan the wireless network. If any Access Point or IBSS is found, you could choose to connect it when P330’s wireless mode is set to Client mode. Figure 31 Wireless: Site Survey 6.6 Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless stations, access points and the wired network.
Chapter 6 Wireless Select NONE for Encryption to allow wireless stations to communicate with the access points without any data encryption. Figure 33 Wireless Security Setup: No Security The following table describes the labels in this screen. Table 19 Wireless Security Setup: No Security LABEL DESCRIPTION Encryption...
Chapter 6 Wireless 6.7 Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. You enter manual keys by first selecting 64-bit WEP or 128-bit WEP from the WEP Encryption field and then typing the keys (in ASCII or hexadecimal format) in the key text boxes.
Chapter 6 Wireless WEP is extremely insecure. Its encryption can be broken by an attacker, using widely-available software. It is strongly recommended that you use a more effective security mechanism. Use the strongest security mechanism that all the wireless devices in your network support. For example, use WPA-PSK or WPA2-PSK if all your wireless devices support it, or use WPA or WPA2 if your wireless devices support it and you have a RADIUS server.
Chapter 6 Wireless Table 21 Wireless Security Setup: Static WEP Encryption LABEL DESCRIPTION Port The port number on the RADIUS server. IP Address Enter the IP address of the RADIUS server. Password Enter the password (shared secret) for the RADIUS server. Save Click Save to save your changes back to the P-330W.
Chapter 6 Wireless Table 22 Wireless Security Setup: WEP Encryption LABEL DESCRIPTION Close Click Close to close this window. Reset Click Reset to reload the previous configuration for this screen. 6.7.4 Introduction to WPA Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i security specification draft. Key differences between WPA and WEP are user authentication and improved data encryption.
Chapter 6 Wireless 6.7.4.3 WPA-PSK Application Example A WPA-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols).
Chapter 6 Wireless Figure 37 Wireless Security Setup: WPA-PSK The following table describes the labels in this screen. Table 23 Wireless Security Setup: WPA-PSK LABEL DESCRIPTION Encryption Choose WPA from the drop-down list box for TKIP encryption. Choose WPA2 (AES) from the drop-down list box to use WPA2’s AES encryption. Choose WPA2 Mixed from the drop-down list box to allow both TKIP or AES encryption.
Chapter 6 Wireless 6.7.7 Introduction to RADIUS RADIUS is based on a client-sever model that supports authentication and accounting, where access point is the client and the server is the RADIUS server. The RADIUS server handles the following tasks among others: •...
Chapter 6 Wireless Your P-330W supports EAP-MD5 (Message-Digest Algorithm 5) with RADIUS. The following figure shows an overview of authentication when you specify a RADIUS server on your access point. Figure 38 EAP Authentication The details below provide a general description of how IEEE 802.1x EAP authentication works.
Chapter 6 Wireless Figure 39 WPA with RADIUS Application Example 6.7.8 Configuring WPA Authentication In order to configure and enable WPA encryption; click the SECURITY link under WIRELESS to display the Wireless Security screen. Select the mode (WPA, WPA2, WPA2 Mixed) from the Encryption list.
Chapter 6 Wireless Figure 40 Wireless Security Setup: WPA With RADIUS The following table describes the labels in this screen. Table 24 Wireless Security Setup: WPA LABEL DESCRIPTION Encryption Choose WPA from the drop-down list box for TKIP encryption. Choose WPA2 (AES) from the drop-down list box to use WPA2’s AES encryption.
Chapter 6 Wireless Table 24 Wireless Security Setup: WPA LABEL DESCRIPTION Port Enter the port number of the external authentication server. The default port number is 1812. You need not change this value unless your network administrator instructs you to do so with additional information. IP Address Enter the IP address of the external authentication server in dotted decimal notation.
Chapter 6 Wireless Table 25 Wireless: WDS Settings LABEL DESCRIPTION Comment Enter in a descriptive name so you know which device the MAC address is associated with. Set Security Click Set Security to set up the wireless security for WDS. When enabled, please make sure each WDS device has adopted the same encryption algorithm and key.
Chapter 6 Wireless Table 26 Wireless: Trusted Stations MAC Address Filter LABEL DESCRIPTION Enter in a descriptive name so you know which device the MAC address is associated Comment with. Save Click Save to save your changes back to the P-330W. Reset Click Reset to reload the previous configuration for this screen.
Chapter 6 Wireless 6.11.1 WPS Setup Using a PIN Each WPS-enabled device has its own PIN (Personal Identification Number). The PIN is located either on the outside of the device or in the configuration utility. The P-330W’s WPS default PIN can be found in the web configurator. Use the PIN method instead of the push-button configuration (PBC) method if you want to ensure that the connection is established between the devices you specify, not just the first two devices to activate WPS in range of each other.
Chapter 6 Wireless Figure 43 Wireless: WPS The following table describes the labels in this menu. Table 27 Wireless: WPS LABEL DESCRIPTION Disable WPS Click this check box to disable WPS. This displays the current WPS configuration status. If no wireless settings (such as WPS Status security settings) are configured Unconfigured is selected.
Chapter 6 Wireless 6.11.2 How WPS Works When two WPS-enabled devices connect, each device must assume a specific role. One device acts as the registrar (the device that supplies network and security settings) and the other device acts as the enrollee (the device that receives network and security settings. The registrar creates a secure EAP (Extensible Authentication Protocol) tunnel and sends the network name (SSID) and the WPA-PSK or WPA2-PSK pre-shared key to the enrollee.
Chapter 6 Wireless By default, a WPS devices is “unconfigured”. This means that it is not part of an existing network and can act as either enrollee or registrar (if it supports both functions). If the registrar is unconfigured, the security settings it transmits to the enrollee are randomly-generated. Once a WPS-enabled device has connected to another device using WPS, it becomes “configured”.
Chapter 6 Wireless In step 3, you add another access point (AP2) to your network. AP2 is out of range of AP1, so you cannot use AP1 for the WPS handshake with the new access point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead.
Page 84
Chapter 6 Wireless When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network. This is because the registrar has no way of identifying the “correct”...
H A P T E R Advanced Options This chapter covers the options available under the ADVANCED section of the menu. Figure 48 The Advanced Menu Options 7.1 Access Control This screen allows you to block access to specified Internet services based on port number used.
Chapter 7 Advanced Options Figure 49 Advanced: Access Control The following table describes the labels in this screen. Table 28 Advanced: Access Control LABEL DESCRIPTION Enable Access Control Check this box to enable Access Controls. Select Services to The P-330W comes preconfigured with settings for many common services. Block You can choose one to activate from the pull down menu.
Chapter 7 Advanced Options First of all, you need to have registered a dynamic DNS account with either www.dyndns.org or www.tzo.com. This is for people with a dynamic IP from their ISP or DHCP server that would still like to have a domain name. The Dynamic DNS service provider will give you a password or key.
Chapter 7 Advanced Options 7.4 DMZ If the DMZ Host Function is enabled, it means that you set up DMZ host at a particular computer to be exposed to the Internet so that some applications/software, especially Internet / online game can have two-way connections. A device acting as DMZ is not protected by the P- 330W’s firewall.
Chapter 7 Advanced Options The most often used port numbers are shown in the following table. Please refer to RFC 1700 for further information about port numbers. Table 31 Services and Port Numbers SERVICES PORT NUMBER ECHO FTP (File Transfer Protocol) SMTP (Simple Mail Transfer Protocol) DNS (Domain Name System) Finger...
Chapter 7 Advanced Options Figure 53 Advanced: Virtual Servers The following table describes the labels in this screen. Table 32 Advanced: Virtual Servers LABEL DESCRIPTION Enable Virtual Put a check in the box to enable Virtual Servers Servers Servers By selection an option in the pull down menu, the P-330W will automatically populate the settings for the corresponding service.
Chapter 7 Advanced Options 7.6 Special Applications Some Internet applications (such as video conferencing and Internet games) require multiple connections between the clients and the server. These applications do not work through NAT- enabled networks. Your P-330W is a NAT-enabled device. In order to allow these applications to work in your network, you have to configure the P-330W to forward these applications to ports on a computer hosting that service.
Chapter 7 Advanced Options 7.7.1 Static IP Encapsulation The screen shown next is for Static IP encapsulation. Figure 55 Advanced: WAN Static IP Encapsulation The following table describes the labels in this screen. Table 34 Advanced: WAN Static IP Encapsulation LABEL DESCRIPTION WAN Access Type...
Chapter 7 Advanced Options Table 34 Advanced: WAN Static IP Encapsulation LABEL DESCRIPTION L2TP Passthrough Put a check in this box to enable computers on your LAN to make L2TP VPN connections to servers on the Internet. Save Click Save to save your changes back to the P-330W. Reset Click Reset to begin configuring this screen afresh.
Chapter 7 Advanced Options Table 35 Advanced: WAN DHCP IP Encapsulation LABEL DESCRIPTION Enable UPnP UPnP (Universal Plug and Play) allows automatic discovery and configuration of the Wireless Router. UPnP is by supported by Windows ME, XP, or later. Put a check in this box to allow the router configuration to be changed by UPnP devices.
Chapter 7 Advanced Options Figure 57 Advanced: WAN PPPoE Encapsulation The following table describes the labels in this screen. Table 36 PPPoE Encapsulation LABEL DESCRIPTION WAN Access You must choose the PPPoE option when the WAN port is used with PPPoE. Type User Name Type the User Name given to you by your ISP.
Chapter 7 Advanced Options Table 36 PPPoE Encapsulation LABEL DESCRIPTION Clone MAC Your ISP may require a particular MAC address in order for you to connect to the Address Internet. This MAC address is the PC’s MAC address that your ISP had originally connected your Internet connection to.
Chapter 7 Advanced Options Figure 58 Advanced: WAN PPTP Encapsulation The following table describes the labels in this screen. Table 37 Advanced: WAN PPTP Encapsulation LABEL DESCRIPTION WAN Access Type You must choose the PPTP option when the WAN port is used with PPTP. IP Address Type the (static) IP address assigned to you by your ISP.
Chapter 7 Advanced Options Table 37 Advanced: WAN PPTP Encapsulation LABEL DESCRIPTION MPPE Encryption MPPE (Microsoft Point-to-Point Encryption) encryption level is only available Level when MSCHAP-v1 or MSCHAP-v2 is selected. Select the level of encryption for the session keys from 40 bits, 56 bits or 128 bits or select None to disable MPPE.
Chapter 7 Advanced Options Figure 59 Advanced: WAN L2TP Encapsulation The following table describes the labels in this screen. Table 38 Advanced: WAN L2PT Encapsulation LABEL DESCRIPTION WAN Access Type You must choose the L2TP option when the WAN port is used with L2TP. Attain IP Automatically Select this if your ISP dynamically assigns you an IP Address Set IP Manually...
Chapter 7 Advanced Options Table 38 Advanced: WAN L2PT Encapsulation LABEL DESCRIPTION Idle Time The amount of time before the L2TP session times out and drops connection. MTU Size Enter in the maximum MTU (packet size) here. Attain DNS Select this if your ISP assigns you a DNS server at the same time it assigns Automatically you an IP Address.
Chapter 7 Advanced Options The following table describes the labels in this screen. Table 39 Advanced: Ping LABEL DESCRIPTION IP Address / Enter in a host name or IP address that you would like to ping. Host Name Performs the Ping command. Reset Click Reset to begin configuring this screen afresh.
Chapter 7 Advanced Options Figure 61 Advanced: DoS The following table describes the labels in this screen. Table 40 Advanced: DoS LABEL DESCRIPTION Enable DoS Put a check in this box to enable DoS protection. Protection Select All Puts a check next to all DoS protection services. Clear All Resets all check boxes to blank.
Chapter 7 Advanced Options To access the Diagnostic service, click ADVANCED then the DIAGNOSTIC link. The screen appears as shown. Figure 62 Advanced: Diagnostic The following table describes the labels in this screen. Table 41 Advanced: Diagnostic LABEL DESCRIPTION Domain Name/ Enter the domain name you want to lookup.
H A P T E R Administrator Options 8.1 Remote Management Remote management allows you to remotely configure your P-330W over your Internet connection. Since this is a potential security risk, this feature is turned off by default. To access the Remote Management configuration screen, click ADMINISTRATOR then the REMOTE MANAGEMENT link.
Chapter 8 Administrator Options Figure 64 Administrator: Configuration File 8.2.1 Backup Config Backup configuration allows you to back up (save) the P-330W’s current configuration to a file on your computer. Once your P-330W is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes.
Chapter 8 Administrator Options 8.2.3 Back to Factory Defaults Pressing the Restore Defaults button in this section clears all user-entered configuration information and returns the P-330W to its factory defaults. You can also press the RESET button on the rear panel to reset the factory defaults of your P- 330W.
Chapter 8 Administrator Options Table 44 Administrator: Remote Management LABEL DESCRIPTION Wireless Only Only logs related to the wireless LAN will be recorded. DoS Only Only logs related to the DoS protection will be recorded. WAN Only Only logs related to the WAN will be recorded. DHCP Server Only logs related to the DHCP Server will be recorded.
Chapter 8 Administrator Options The following table describes the labels in this screen. Table 45 Administrator: IP Filtering LABEL DESCRIPTION Enable IP Enables IP Filtering. Filtering Local IP Address Enter the IP address of the local device whose access you want to restrict. Protocol You can select to forward TCP, UDP, or both type of traffic.
Chapter 8 Administrator Options Table 46 Administrator: MAC Filtering LABEL DESCRIPTION Description Enter in a descriptive description for this rule. Save Click Save to save your changes back to the P-330W. Reset Click Reset to begin configuring this screen afresh. 8.6 URL Filtering This screen is used to restrict devices on your local network from being able to access the Internet.
Chapter 8 Administrator Options 8.7 Statistics The statistics screen provides you with information on each interface on your P-330W. This includes the WAN, LAN, and wireless network connections. This page will show you how many packets of data have been sent and received. Figure 70 Administrator: Statistics The following table describes the labels in this screen.
Click Refresh to display the current time. 8.9 Upgrade Firmware Find firmware at www.us.zyxel.com in a file that (usually) uses the system model name with a "*.bin" extension, e.g., "P-330W.bin". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
Chapter 8 Administrator Options Figure 72 Administrator: Upgrade Firmware The following table describes the labels in this screen. Table 50 Administrator: Upgrade Firmware LABEL DESCRIPTION Select File Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse...
Chapter 8 Administrator Options Figure 74 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen. If the upload was not successful, a warning screen will appear. Click Return to go back to the F/W Upload screen.
H A P T E R Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • P-330W Access and Login • Reset the P-330W to Its Factory Defaults •...
Chapter 9 Troubleshooting 1 Make sure you understand the normal behavior of the LED. See Section 1.4 on page 2 Check the hardware connections. See the Quick Start Guide. 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the P-330W.
Chapter 9 Troubleshooting 4 Make sure your computer is in the same subnet as the P-330W. (If you know that there are routers between your computer and the P-330W, skip this step.) 5 If there is a DHCP server on your network, make sure your computer is using a dynamic IP address.
Chapter 9 Troubleshooting I cannot access the Internet anymore. I had access to the Internet (with the P- 330W), but my Internet connection is not available anymore. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.4 on page 2 Disconnect and re-connect the power adaptor to the P-330W.
Chapter 9 Troubleshooting 9.4 Reset the P-330W to Its Factory Defaults If you reset the P-330W, you lose all of the changes you have made. The P-330W re-loads its default settings, and the password resets to 1234. You have to make all of your changes again. You will lose all of your changes when you push the RESET button.
H A P T E R Product Specifications This chapter gives details about your P-330W’s hardware and firmware features. 10.1 General P-330W Specifications The following tables summarize the P-330W’s hardware and firmware features. Table 51 Hardware Specifications SPECIFICATION DESCRIPTION Product Name P-330W, P-330W v2 Dimensions (W x D x H) 159 x 107 x 25 mm...
LANs. Firmware Upgrade Download new firmware (when available) from the ZyXEL web site and use the web configurator, an FTP or a TFTP tool to put it on the P-330W. Note: Only upload firmware for your specific model! Configuration Backup &...
Chapter 10 Product Specifications The following list, which is not exhaustive, illustrates the standards supported in the P-330W. Table 53 Standards Supported STANDARD DESCRIPTION RFC 867 Daytime Protocol RFC 868 Time Protocol. RFC 1112 IGMP v1 RFC 1305 Network Time Protocol (NTP version 3) RFC 1631 IP Network Address Translator (NAT) RFC 1661...
Chapter 10 Product Specifications 3 Do not insert the screws all the way into the wall. Leave a small gap of about 0.5 cm between the heads of the screws and the wall. 4 Make sure the screws are snugly fastened to the wall. They need to hold the weight of the P-330W with the connection cables.
Chapter 10 Product Specifications 10.3 Power Adaptor Specifications Table 54 Power Adaptor Specifications AC Power Adaptor Model MT12-4120100-A1 Input Power 120V~60Hz 0.3A Output Power 12V/1A Power Consumption 10 W Safety Standards UL (UL 1950) P-330W User’s Guide...
Appendices and Index The appendices provide general information. Some details may not apply to your ZyXEL Device. Setting up Your Computer’s IP Address (131) Pop-up Windows, JavaScripts and Java Permissions (153) IP Addresses and Subnetting (161) Wireless LANs (171) Open Software Announcements (185)
After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If you manually assign IP information instead of using dynamic assignment, make sure that your computers have IP addresses that place them in the same subnet as the ZyXEL Device’s LAN port. Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window.
Appendix A Setting up Your Computer’s IP Address Figure 77 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add.
Appendix A Setting up Your Computer’s IP Address Configuring 1 In the Network window Configuration tab, select your network adapter's TCP/IP entry and click Properties 2 Click the IP Address tab. • If your IP address is dynamic, select Obtain an IP address automatically. •...
5 Click OK to save and close the TCP/IP Properties window. 6 Click OK to close the Network window. Insert the Windows CD if prompted. 7 Turn on your ZyXEL Device and restart your computer when prompted. Verifying Settings 1 Click Start and then Run.
Appendix A Setting up Your Computer’s IP Address Figure 80 Windows XP: Start Menu 2 In the Control Panel, double-click Network Connections (Network and Dial-up Connections in Windows 2000/NT). Figure 81 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties. P-330W User’s Guide...
Appendix A Setting up Your Computer’s IP Address Figure 82 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 83 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP).
Appendix A Setting up Your Computer’s IP Address Figure 84 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: •...
Appendix A Setting up Your Computer’s IP Address Figure 85 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT). 11 Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt. 2 In the Command Prompt window, type "ipconfig" and then press [ENTER]. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab.
Appendix A Setting up Your Computer’s IP Address Figure 87 Windows Vista: Start Menu 2 In the Control Panel, double-click Network and Internet. Figure 88 Windows Vista: Control Panel 3 Click Network and Sharing Center. Figure 89 Windows Vista: Network And Internet 4 Click Manage network connections.
Appendix A Setting up Your Computer’s IP Address 5 Right-click Local Area Connection and then click Properties. During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. Figure 91 Windows Vista: Network and Sharing Center 6 Select Internet Protocol Version 4 (TCP/IPv4) and click Properties.
Appendix A Setting up Your Computer’s IP Address 7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens (the General tab). • If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP address and fill in the IP address, Subnet mask, and Default gateway fields.
Appendix A Setting up Your Computer’s IP Address Figure 94 Windows Vista: Advanced TCP/IP Properties 9 In the Internet Protocol Version 4 (TCP/IPv4) Properties window, (the General tab): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es).
11 Click Close to close the Local Area Connection Properties window. 12 Close the Network Connections window. 13 Turn on your ZyXEL Device and restart your computer (if prompted). Verifying Settings 1 Click Start, All Programs, Accessories and then Command Prompt.
Appendix A Setting up Your Computer’s IP Address Figure 96 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 97 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: •...
• Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your ZyXEL Device in the Router address box. 5 Close the TCP/IP Control Panel.
• Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your ZyXEL Device in the Router address box. 5 Click Apply Now and close the window.
Appendix A Setting up Your Computer’s IP Address Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow the steps below to configure your computer IP address using the KDE. 1 Click the Red Hat button (located on the bottom left corner), select System Setting and click Network.
Appendix A Setting up Your Computer’s IP Address • If you have a dynamic IP address, click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address, click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.
Appendix A Setting up Your Computer’s IP Address Figure 104 Red Hat 9.0: Dynamic IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=dhcp USERCTL=no PEERDNS=yes TYPE=Ethernet • If you have a static IP address, enter in the field. Type static BOOTPROTO= = followed by the IP address (in dotted decimal notation) and type IPADDR NETMASK...
Appendix A Setting up Your Computer’s IP Address Verifying Settings Enter in a terminal screen to check your TCP/IP properties. ifconfig Figure 108 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1...
Page 152
Appendix A Setting up Your Computer’s IP Address P-330W User’s Guide...
P P E N D I X Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Internet Explorer 6 screens are used here.
Appendix B Pop-up Windows, JavaScripts and Java Permissions 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 110 Internet Options: Privacy 3 Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Figure 111 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.1. 4 Click Add to move the IP address to the list of Allowed sites. Figure 112 Pop-up Blocker Settings P-330W User’s Guide...
Appendix B Pop-up Windows, JavaScripts and Java Permissions 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Figure 114 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScripts and Java Permissions JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for <applet> under Java (Sun) is selected. 3 Click OK to close the window. Figure 116 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here.
Appendix B Pop-up Windows, JavaScripts and Java Permissions Figure 117 Mozilla Firefox: Tools > Options Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 118 Mozilla Firefox Content Security P-330W User’s Guide...
Page 160
Appendix B Pop-up Windows, JavaScripts and Java Permissions P-330W User’s Guide...
P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network.
Appendix C IP Addresses and Subnetting Figure 119 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is used to determine which bits are part of the network number, and which bits are part of the host ID (using a logical AND operation).
Appendix C IP Addresses and Subnetting Subnet masks are expressed in dotted decimal notation just like IP addresses. The following examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet masks. Table 56 Subnet Masks BINARY DECIMAL 4TH OCTET OCTET...
Appendix C IP Addresses and Subnetting Table 58 Alternative Subnet Mask Notation (continued) ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.192 1100 0000 255.255.255.224 1110 0000 255.255.255.240 1111 0000 255.255.255.248 1111 1000 255.255.255.252 1111 1100 Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons.
Appendix C IP Addresses and Subnetting Figure 121 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address).
Appendix C IP Addresses and Subnetting Table 63 Eight Subnets (continued) SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 64 24-bit Network Number Subnet Planning NO.
You must also enable Network Address Translation (NAT) on the ZyXEL Device. Once you have decided on the network number, pick an IP address for your ZyXEL Device that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your network is using that IP address.
Appendix C IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network.
Appendix C IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device cannot use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet.
P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs Figure 126 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs Figure 127 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a channel different from an adjacent AP (access point) to reduce interference.
Appendix D Wireless LANs Figure 128 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
Use the dynamic setting to automatically use short preamble when all wireless devices on the network support it, otherwise the ZyXEL Device uses long preamble. The wireless devices MUST use the same preamble mode in order to communicate.
Appendix D Wireless LANs Wireless security methods available on the ZyXEL Device are data encryption, wireless client authentication, restricting access by device MAC address and hiding the ZyXEL Device identity. The following figure shows the relative effectiveness of these wireless security methods available on your ZyXEL Device.
Appendix D Wireless LANs Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’s network activity. RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server.
Page 178
Appendix D Wireless LANs For EAP-TLS authentication type, you must first have a wired connection to the network and obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs) can be used to authenticate users and a CA issues certificates and guarantees the identity of each certificate owner.
Appendix D Wireless LANs Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times out, disconnects or reauthentication times out. A new WEP key is generated each time reauthentication is performed. If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen.
Appendix D Wireless LANs Encryption WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message Integrity Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when required for compatibility reasons, but offers stronger encryption than TKIP with Advanced Encryption Standard (AES) in the Counter mode with Cipher block chaining Message authentication code Protocol (CCMP).
Appendix D Wireless LANs Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA. At the time of writing, the most widely available supplicant is the WPA patch for Windows XP, Funk Software's Odyssey client.
Appendix D Wireless LANs 3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key itself is not sent over the network, but is derived from the PSK and the SSID. 4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys.
Appendix D Wireless LANs Antenna Overview An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air. Positioning the antennas properly increases the range and coverage area of a wireless LAN.
Page 184
Appendix D Wireless LANs Positioning Antennas In general, antennas should be mounted as high as practically possible and free of obstructions. In point-to–point application, position both antennas at the same height and in a direct line of sight to each other to attain the best performance. For omni-directional antennas mounted on a table, desk, and so on, point the antenna up.
No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes Zlib under Zlib License Zlib License /* zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.2, October...
Page 186
Appendix E Open Software Announcements Permission is granted to anyone to use this software for any purpose, including commercial applications, and to alter it and redistribute it freely, subject to the following restrictions: 1. The origin of this software must not be misrepresented; you must not claim that you wrote the original software.
Page 187
Appendix E Open Software Announcements ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Page 188
Appendix E Open Software Announcements When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs;...
Page 189
Appendix E Open Software Announcements 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a)You mst cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
Page 190
Appendix E Open Software Announcements However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.
Page 191
NOTE: Some components of the “P-330W”software incorporate source code covered under the Zlib License; Roaring Penguin Software Inc. License; BSD License; RSA Data Security Inc. License and GPL License. To obtain the source code covered under those Licenses, please contact ZyXEL Communications Corporation at: support@zyxel.com.tw. [Document Title]...
Page 192
License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement.
Page 193
DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7. Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR...
Page 194
This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.
Published by ZyXEL Communications Corporation. All rights reserved. Disclaimers ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others.
Page 196
This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications 1 Go to http://www.zyxel.com. P-330W User’s Guide...
Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Page 198
Appendix F Legal Information P-330W User’s Guide...
Index Index Default DHCP 52, 53, 87 dimensions Advanced Encryption Standard disclaimer See AES. Domain Name alternative subnet mask notation Dynamic DNS 86, 87 antenna dynamic WEP key exchange directional gain omni-directional AP (access point) applications Authentication EAP Authentication 72, 177 ECHO Encryption encryption...
Page 206
Index HTTP Password humidity Point-to-Point Tunneling Protocol 89, 96 POP3 Port Forwarding Port Numbers power adaptor specifications power specification IANA PPTP IAPP Preamble Mode IBSS 57, 171 preamble mode IEEE 802.11g product registration Independent Basic Service Set See IBSS initialization vector (IV) Internet Assigned Numbers Authority See IANA IP Address...
Page 207
Index subnet pre-authentication user authentication Subnet Mask vs WPA-PSK subnet mask wireless client supplicant subnetting with RADIUS application example syntax conventions WPA with RADIUS Application WPA2 70, 179 user authentication vs WPA2-PSK wireless client supplicant with RADIUS application example WPA2-Pre-Shared Key temperature WPA2-PSK 179, 180...