ZyXEL Communications P-2812HNU-51c User Manual

802.11n wireless vdsl2 voip combo wan iad
Hide thumbs Also See for P-2812HNU-51c:
Table of Contents

Advertisement

P-2812HNU(L)-Fx Series
802.11n Wireless VDSL2 VoIP Combo WAN IAD
Default Login Details
IP Address
http://192.168.1.1
User Name
Admin account: admin
User account: user
Password
Admin account: 1234
User account: 1234
Firmware Version 3.10
Edition 1, 3/2011
www.zyxel.com
www.zyxel.com
Copyright © 2011
ZyXEL Communications Corporation

Advertisement

Table of Contents
loading

Summary of Contents for ZyXEL Communications P-2812HNU-51c

  • Page 1 802.11n Wireless VDSL2 VoIP Combo WAN IAD Default Login Details IP Address http://192.168.1.1 User Name Admin account: admin User account: user Password Admin account: 1234 User account: 1234 Firmware Version 3.10 Edition 1, 3/2011 www.zyxel.com www.zyxel.com Copyright © 2011 ZyXEL Communications Corporation...
  • Page 3: About This User's Guide

    Internet access. Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 4 About This User's Guide Need More Help? More help is available at www.zyxel.com. • Download Library Search for the latest product updates and documentation from this link. Read the Tech Doc Overview to find out how to efficiently use the User Guide, Quick Start Guide and Command Line Interface Reference Guide in order to better understand how to use your product.
  • Page 5: Document Conventions

    Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations.
  • Page 6 Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The Device icon is not an exact representation of your device. Device Computer Notebook computer Server Firewall Telephone Router Switch P-2812HNU(L)-Fx Series User’s Guide...
  • Page 7: Safety Warnings

    Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. •...
  • Page 8 Safety Warnings P-2812HNU(L)-Fx Series User’s Guide...
  • Page 9: Table Of Contents

    Contents Overview Contents Overview User’s Guide ........................... 19 Introduction ..........................21 Introducing the Web Configurator ....................27 Tutorials .............................33 Technical Reference ......................79 Connection Status and System Info ...................81 Broadband ..........................87 Wireless ...........................123 Home Networking ........................149 Routing .............................173 Quality of Service (QoS) ......................177 Network Address Translation (NAT) ..................189 Dynamic DNS ...........................197 Firewall .............................199...
  • Page 10 Contents Overview P-2812HNU(L)-Fx Series User’s Guide...
  • Page 11: Table Of Contents

    Table of Contents Table of Contents About This User's Guide ......................3 Document Conventions ......................5 Safety Warnings........................7 Contents Overview ........................9 Table of Contents ........................11 Part I: User’s Guide ................19 Chapter 1 Introduction..........................21 1.1 Overview ..........................21 1.2 Applications for the Device ....................21 1.2.1 Internet Access ......................21 1.2.2 VoIP Features ......................22...
  • Page 12 Table of Contents 3.3.1 Example Parameters ....................36 3.3.2 Configuring the AP .....................36 3.3.3 Configuring the Wireless Client ..................38 3.4 Setting Up NAT Port Forwarding ..................43 3.5 How to Make a VoIP Call .....................44 3.5.1 VoIP Calls With a Registered SIP Account ..............45 3.6 Using the File Sharing Feature ....................47 3.6.1 Set Up File Sharing ....................48 3.6.2 Access Your Shared Files From a Computer .............49...
  • Page 13 Table of Contents Chapter 6 Wireless ..........................123 6.1 Overview ..........................123 6.1.1 What You Can Do in this Chapter ................123 6.1.2 Wireless Network Overview ..................123 6.1.3 Before You Begin ......................125 6.2 The Wireless General Screen ...................125 6.2.1 No Security .......................127 6.2.2 Basic (Static WEP/Shared WEP Encryption) ............127 6.2.3 More Secure (WPA(2)-PSK) ..................129 6.2.4 WPA(2) Authentication ....................130...
  • Page 14 Table of Contents Chapter 8 Routing ..........................173 8.1 Overview ...........................173 8.2 Configuring Static Route ....................174 8.2.1 Add/Edit Static Route ....................175 Chapter 9 Quality of Service (QoS)....................... 177 9.1 Overview ..........................177 9.1.1 What You Can Do in this Chapter ................177 9.1.2 What You Need to Know ...................177 9.2 The QoS General Screen ....................178 9.3 The Queue Setup Screen ....................180...
  • Page 15 Table of Contents Chapter 12 Firewall ..........................199 12.1 Overview ..........................199 12.1.1 What You Can Do in this Chapter ................199 12.1.2 What You Need to Know ..................199 12.2 The General Screen ......................200 12.3 The Services Screen ......................201 12.4 Firewall Technical Reference ...................202 12.4.1 Guidelines For Enhancing Security With Your Firewall ..........202 12.4.2 Security Considerations ..................202 Chapter 13...
  • Page 16 Table of Contents 16.4 Multiple SIP Accounts ......................228 16.5 The Common Screen .......................228 16.6 Phone Screen .........................229 16.6.1 Edit Phone Device ....................230 16.7 The Phone Region Screen ....................231 16.8 The Call Rule Screen .......................231 16.9 The FXO Screen (“L” Models Only) .................233 16.10 Technical Reference .......................233 16.10.1 VoIP ........................234 16.10.2 SIP ........................234...
  • Page 17 Table of Contents Chapter 21 System ........................... 257 21.1 Overview ..........................257 21.1.1 What You Need to Know ..................257 21.2 The System Screen ......................257 Chapter 22 Time Setting .......................... 259 22.1 Overview ..........................259 22.2 The Time Setting Screen ....................259 Chapter 23 Log Setting ...........................
  • Page 18 Table of Contents Chapter 28 Product Specifications ......................281 Appendix A IP Addresses and Subnetting................289 Appendix B Setting Up Your Computer’s IP Address ............299 Appendix C Pop-up Windows, JavaScript and Java Permissions ........329 Appendix D Wireless LANs....................339 Appendix E Common Services ....................
  • Page 19: User's Guide

    User’s Guide...
  • Page 21: Introduction

    H A P T E R Introduction 1.1 Overview The Device is a VDSL, ADSL and Ethernet WAN router, which also includes Voice over IP (VoIP) communication capabilities to allow you to use a traditional analog telephone to make Internet calls.
  • Page 22: Voip Features

    Chapter 1 Introduction the Broadband screen (see Chapter 5 on page 91 for more information) and connect the WAN port to the broadband modem or router. This way, you can access the Internet via an Ethernet connection and still use the QoS, Firewall and VoIP functions on the Device. Computers can connect to the Device’s LAN ports (or wirelessly).
  • Page 23: The Wlan Button

    Chapter 1 Introduction You can set up a wireless network with WPS (WiFi Protected Setup) or manually add a client to your wireless network. Figure 3 Wireless Connection Application WLAN 1.3 The WLAN Button You can use the WLAN ON/OFF button on top of the device to turn the wireless LAN on or off. You can also use it to activate WPS in order to quickly set up a wireless network with strong security.
  • Page 24: Ways To Manage The Device

    Chapter 1 Introduction 1.4 Ways to Manage the Device Use any of the following methods to manage the Device. • Web Configurator. This is recommended for everyday management of the Device using a (supported) web browser. • FTP for firmware upgrades and configuration backup/restore. 1.5 Good Habits for Managing the Device Do the following things regularly to make the Device more secure and to manage the Device more effectively.
  • Page 25 Chapter 1 Introduction Table 1 LED Descriptions (continued) COLOR STATUS DESCRIPTION PHONE1-2 Green A SIP account is registered for the phone port. Blinking A telephone connected to the phone port has its receiver off of the hook or there is an incoming call. Orange A SIP account is registered for the phone port and there is a voice message in the corresponding SIP account.
  • Page 26: The Reset Button

    Chapter 1 Introduction Table 1 LED Descriptions (continued) COLOR STATUS DESCRIPTION WLAN/WPS Green The wireless network is activated and is operating in IEEE 802.11 “b”, “g” or “n” mode. Blinking The Device is communicating with other wireless clients. Orange The WPS is configured. Blinking The Device is setting up a WPS connection.
  • Page 27: Introducing The Web Configurator

    H A P T E R Introducing the Web Configurator 2.1 Overview The web configurator is an HTML-based management interface that allows easy device setup and management via Internet browser. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3 and later versions, or Safari 2.0 and later versions.
  • Page 28 Chapter 2 Introducing the Web Configurator Note: For security reasons, the Device automatically logs you out if you do not use the web configurator for five minutes (default). If this happens, log in again. The following screen displays if you have not yet changed your password. It is strongly recommended you change the default password.
  • Page 29: The Web Configurator Layout

    Chapter 2 Introducing the Web Configurator 2.2 The Web Configurator Layout Click Connection Status > System Info to show the following screen. Figure 8 Web Configurator Layout As illustrated above, the main screen is divided into these parts: • A - title bar •...
  • Page 30: Navigation Panel

    Chapter 2 Introducing the Web Configurator If you click LAN Device on the System Info screen (a in Figure 8 on page 29), the Connection Status screen appears. See Chapter 4 on page 81 for more information about the Connection Status screen.
  • Page 31 Chapter 2 Introducing the Web Configurator Table 2 Navigation Panel Summary (continued) LINK FUNCTION Home LAN Setup Use this screen to configure LAN TCP/IP settings, and other Networking advanced properties. Static DHCP Use this screen to assign specific IP addresses to individual MAC addresses.
  • Page 32 Chapter 2 Introducing the Web Configurator Table 2 Navigation Panel Summary (continued) LINK FUNCTION Phone Phone Device Use this screen to set which phone ports use which SIP accounts. Region Use this screen to select your location. Call Rule Speed Dial Use this screen to configure speed dial for SIP phone numbers that you call often.
  • Page 33: Tutorials

    H A P T E R Tutorials 3.1 Overview This chapter contains the following tutorials: • Setting Up Your DSL Connection • How to Set up a Wireless Network • Setting Up NAT Port Forwarding • How to Make a VoIP Call •...
  • Page 34 Chapter 3 Tutorials Select ADSL as your WAN mode type and click Switch WAN Interface. Confirm your selection and wait for the Device to reboot. Log into the Device again and go to the Network Setting > Broadband screen. Click Add new WAN Interface.
  • Page 35 Chapter 3 Tutorials Enter or select these values and click Apply. This completes your DSL WAN connection setting. You should see a summary of your new DSL connection setup in the Broadband screen as follows. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 36: How To Set Up A Wireless Network

    Chapter 3 Tutorials Try to connect to a website, such as “www. zyxel.com” to see if you have correctly set up your Internet connection. Be sure to contact your service provider for any information you need to configure the WAN screens. 3.3 How to Set up a Wireless Network This section gives you examples of how to set up an access point and wireless client for wireless communication using the following parameters.
  • Page 37 Chapter 3 Tutorials Open the Network Setting > Wireless > General screen in the AP’s web configurator. Tutorial: Network > Wireless LAN > General Make sure Enable Wireless LAN is selected. Enter “SSID_Example3” as the SSID and select Auto in the Channel Selection field to have the device search for an available channel.
  • Page 38: Configuring The Wireless Client

    Chapter 3 Tutorials This finishes the configuration of the AP. 3.3.3 Configuring the Wireless Client This section describes how to connect the wireless client to a network. 3.3.3.1 Connecting to a Wireless LAN The following sections show you how to join a wireless network using the ZyXEL utility, as in the following diagram.
  • Page 39 Chapter 3 Tutorials The wireless client automatically searches for available wireless networks. Click Scan if you want to search again. If no entry displays in the Available Network List, that means there is no wireless network available within range. Make sure the AP or peer computer is turned on or move the wireless client closer to the AP or peer computer.
  • Page 40 Chapter 3 Tutorials The ZyXEL utility returns to the Link Info screen while it connects to the wireless network using your settings. When the wireless link is established, the ZyXEL utility icon in the system tray turns green and the Link Info screen displays details of the active connection. Check the network information in the Link Info screen to verify that you have successfully connected to the selected network.
  • Page 41 Chapter 3 Tutorials The Add New Profile screen appears. The wireless client automatically searches for available wireless networks, and displays them in the Scan Info box. Click Scan if you want to search again. You can also configure your profile for a wireless network that is not in the list. Tutorial: Add New Profile Give the profile a descriptive name (of up to 32 printable ASCII characters).
  • Page 42 Chapter 3 Tutorials In the next screen, leave both boxes selected. Tutorial: Wireless Protocol Settings. Verify the profile settings in the read-only screen. Click Save to save and go to the next screen. Tutorial: Confirm Save Click Activate Now to use the new profile immediately. Otherwise, click the Activate Later button.
  • Page 43: Setting Up Nat Port Forwarding

    Chapter 3 Tutorials 11 If you cannot access the Internet go back to the Profile screen, select the profile you are using and click Edit. Check the details you entered previously. Also, refer to the Troubleshooting section of this User's Guide or contact your network administrator if necessary. 3.4 Setting Up NAT Port Forwarding In this tutorial, you manage the Doom server on a computer behind the Device.
  • Page 44: How To Make A Voip Call

    Chapter 3 Tutorials Enter the following values: Service Name Select User Defined. WAN Interface Select the WAN interface through which the Doom service is forwarded. This is the default interface for this example, which is MyDSLConnection. Start/End Ports Translation Start/End Ports Server IP Address Enter the IP address of the Doom server.
  • Page 45: Voip Calls With A Registered Sip Account

    Chapter 3 Tutorials The following parameters are used in this example: SIP Service Provider Name ServiceProvider1 SIP Server Address sip.example.com REGISTER Server Address registersip.example.com SIP Service Domain sip.example.com SIP Account Number 12345678 Username ChangeMe Password ThisIsMySIP 3.5.1 VoIP Calls With a Registered SIP Account To use a registered SIP account, you should configure the SIP service provider and applied for a SIP account.
  • Page 46 Chapter 3 Tutorials Go to the SIP Account screen, click the Edit icon of SIP 1. Select the Active SIP Account check box, then enter the SIP Account Number, Username, and Password. Leave other settings as default. Click Apply to save your settings. 3.5.1.2 SIP Account Registration Follow the steps below to register and activate your SIP account.
  • Page 47: Using The File Sharing Feature

    Chapter 3 Tutorials 3.5.1.3 Analog Phone Configuration Click VoIP > Phone to open the Phone Device screen. Click the Edit icon next to Analog Phone 1 to configure the first phone port. Select SIP 1 from the SIP Account in the SIP Account to Make Outgoing Call section to have the phone (connected to the first phone port) use the registered SIP 1 account to make outgoing calls.
  • Page 48: Set Up File Sharing

    Chapter 3 Tutorials • Access the shared files of your USB device from a computer 3.6.1 Set Up File Sharing To set up file sharing you need to connect your USB device, enable file sharing and set up your share(s). 3.6.1.1 Activate File Sharing Connect your USB device to one of the USB ports at the back panel of the Device.
  • Page 49: Access Your Shared Files From A Computer

    Chapter 3 Tutorials You can add a description for the share or leave it blank. The Add Share Directory screen should look like the following.Click Apply to finish. Tutorial: USB Services > File Sharing > Share Configuration This sets up the file sharing server. You can see the USB storage device listed in the table below. Tutorial: USB Services >...
  • Page 50: Configuring The Device

    Chapter 3 Tutorials This section shows you how the media server feature works using the following media clients: • Microsoft (MS) Windows Media Player Media Server works with Windows Vista and Windows 7. Make sure your computer is able to play media files (music, videos and pictures).
  • Page 51 Chapter 3 Tutorials Windows Vista Open Windows Media Player and click Library > Media Sharing as follows. Tutorial: Media Sharing using Windows Vista Check Find media that others are sharing in the following screen and click OK. Tutorial: Media Sharing using Windows Vista (2) P-2812HNU(L)-Fx Series User’s Guide...
  • Page 52 Chapter 3 Tutorials In the Library screen, check the left panel. The Windows Media Player should detect the Device. Tutorial: Media Sharing using Windows Vista (3) The Device displays as a playlist. Clicking on the category icons in the right panel shows you the media files in the USB storage device attached to your Device.
  • Page 53: Using A Digital Media Adapter

    Chapter 3 Tutorials Select a category in the left panel and wait for Windows Media Player to connect to the Device. Tutorial: Media Sharing using Windows 7 (2) In the right panel, you should see a list of files available in the USB storage device. Tutorial: Media Sharing using Windows 7 (2) 3.7.3 Using a Digital Media Adapter This section shows you how you can use the Device with a ZyXEL DMA-2500 to play media files...
  • Page 54 Chapter 3 Tutorials Connect the DMA-2500 to an available LAN port in your Device. Tutorial: Media Server Setup (Using DMA) USB Storage Device DMA-2500 ZyXEL Device Turn on the TV and wait for the DMA-2500 Home screen to appear. Using the remote control, go to MyMedia to open the following screen.
  • Page 55: Using The Print Server Feature

    Chapter 3 Tutorials 3.8 Using the Print Server Feature In this section you can: • Configure a TCP/IP Printer Port • Add a New Printer Using Windows • Add a New Printer Using Macintosh OS X Configure a TCP/IP Printer Port This example shows how you can configure a TCP/IP printer port.
  • Page 56 Chapter 3 Tutorials Right click on your printer and select Properties. Tutorial: Open Printer Properties Select the Ports tab and click Add Port... Tutorial: Printer Properties Window A Printer Ports window appears. Select Standard TCP/IP Port and click New Port... Tutorial: Add a Port Window P-2812HNU(L)-Fx Series User’s Guide...
  • Page 57 Chapter 3 Tutorials Add Standard TCP/IP Printer Port Wizard window opens up. Click Next to start configuring the printer port. Tutorial: Add a Port Wizard Enter the IP address of the Device to which the printer is connected in the Printer Name or IP Address: field.
  • Page 58 Chapter 3 Tutorials Select Custom under Device Type and click Settings. Tutorial: Custom Port Settings Confirm the IP address of the Device in the IP Address field. 10 Select Raw under Protocol. 11 The Port Number is automatically configured as 9100. Click OK. Tutorial: Custom Port Settings P-2812HNU(L)-Fx Series User’s Guide...
  • Page 59 Chapter 3 Tutorials 12 Continue through the wizard, apply your settings and close the wizard window. Tutorial: Finish Adding the TCP/IP Port 13 Repeat steps 1 to 12 to add this printer to other computers on your network. Add a New Printer Using Windows This example shows how to connect a printer to your Device using the Windows XP Professional operating system.
  • Page 60 Chapter 3 Tutorials Click Start > Control Panel > Printers and Faxes to open the Printers and Faxes screen. Click Add a Printer. Tutorial: Printers Folder The Add Printer Wizard screen displays. Click Next. Tutorial: Add Printer Wizard: Welcome P-2812HNU(L)-Fx Series User’s Guide...
  • Page 61 Chapter 3 Tutorials Select Local printer attached to this computer and click Next. Tutorial: Add Printer Wizard: Local or Network Printer Select Create a new port and Standard TCP/IP Port. Click Next. Tutorial: Add Printer Wizard: Select the Printer Port P-2812HNU(L)-Fx Series User’s Guide...
  • Page 62 Chapter 3 Tutorials Add Standard TCP/IP Printer Port Wizard window opens up. Click Next to start configuring the printer port. Tutorial: Add a Port Wizard Enter the IP address of the Device to which the printer is connected in the Printer Name or IP Address: field.
  • Page 63 Chapter 3 Tutorials Select Custom under Device Type and click Settings. Tutorial: Custom Port Settings Confirm the IP address of the Device in the Printer Name or IP Address field. Select Raw under Protocol. 10 The Port Number is automatically configured as 9100. Click OK to go back to the previous screen and click Next.
  • Page 64 Chapter 3 Tutorials 11 Click Finish to close the wizard window. Tutorial: Finish Adding the TCP/IP Port 12 Select the make of the printer that you want to connect to the print server in the Manufacturer list of printers. 13 Select the printer model from the list of Printers. 14 If your printer is not displayed in the list of Printers, you can insert the printer driver installation CD/disk or download the driver file to your computer, click Have Disk…...
  • Page 65 Chapter 3 Tutorials 16 If the following screen displays, select Keep existing driver radio button and click Next if you already have a printer driver installed on your computer and you do not want to change it. Otherwise, select Replace existing driver to replace it with the new driver you selected in the previous screen and click Next.
  • Page 66 Chapter 3 Tutorials 18 The Device is a print server itself and you do not need to have your computer act as a print server by sharing the printer with other users in the same network; just select Do not share this printer and click Next to proceed to the following screen. Tutorial: Add Printer Wizard: Printer Sharing 19 Select Yes and then click the Next button if you want to print a test page.
  • Page 67 Chapter 3 Tutorials 20 The following screen shows your current printer settings. Select Finish to complete adding a new printer. Tutorial: Add Printer Wizard Complete Add a New Printer Using Macintosh OS X Complete the following steps to set up a print server driver on your Macintosh computer. Click the Print Center icon located in the Macintosh Dock (a place holding a series of icons/ shortcuts at the bottom of the desktop).
  • Page 68 Chapter 3 Tutorials Double-click the Utilities folder. Tutorial: Applications Folder Double-click the Print Center icon. Tutorial: Utilities Folder Click the Add icon at the top of the screen. Tutorial: Printer List Folder Set up your printer in the Printer List configuration screen. Select IP Printing from the drop- down list box.
  • Page 69 Chapter 3 Tutorials 11 Select your Printer Model from the drop-down list box. If the printer's model is not listed, select Generic. Tutorial: Printer Configuration 12 Click Add to select a printer model, save and close the Printer List configuration screen. Tutorial: Printer Model 13 The Name LP1 on 192.168.1.1 displays in the Printer List field.
  • Page 70: Configuring The Mac Address Filter

    Chapter 3 Tutorials 3.9 Configuring the MAC Address Filter Thomas noticed that his daughter Josephine spends too much time surfing the web and downloading media files. He decided to prevent Josephine from accessing the Internet so that she can concentrate on preparing for her final exams. Josephine’s computer connects wirelessly to the Internet through the Device.
  • Page 71: Configuring Static Route For Routing To Another Network

    Chapter 3 Tutorials 3.10 Configuring Static Route for Routing to Another Network In order to extend your Intranet and control traffic flowing directions, you may connect a router to the Device’s LAN. The router may be used to separate two department networks. This tutorial shows how to configure a static routing rule for two network routings.
  • Page 72 Chapter 3 Tutorials You need to specify a static routing rule on the Device to specify R as the router in charge of forwarding traffic to N2. In this case, the Device routes traffic from A to R and then R routes the traffic to B.This tutorial uses the following example IP settings: Table 3 IP Settings in this Tutorial DEVICE / COMPUTER...
  • Page 73: Configuring Qos Queue And Class Setup

    Chapter 3 Tutorials • Type 192.168.1.253 (R’s N1 address) in the Gateway IP Address field. Click Apply. The Routing screen should display the route you just added. Now B should be able to receive traffic from A. You may need to additionally configure B’s firewall settings to allow specific traffic to pass through.
  • Page 74 Chapter 3 Tutorials Note: QoS is applied to traffic flowing out of the Device. Traffic that does not match this class is assigned a priority queue based on the internal QoS mapping table on the Device. QoS Example ZyXEL Device 10,000 kbps Your computer IP=192.168.1.23...
  • Page 75 Chapter 3 Tutorials Go to Network Setting > QoS > Class Setup. Click Add new Classifier to create a new class. Check Active and follow the settings as shown in the screen below. Then click Apply. Tutorial: Advanced > QoS > Class Setup Class Name Give a class name to this traffic, such as Email in this example.
  • Page 76: Access The Device Using Ddns

    Chapter 3 Tutorials Verify that the queue setup works by checking Network Setting > QoS > Monitor. This shows the bandwidth allotted to e-mail traffic compared to other network traffic. Tutorial: Advanced > QoS > Monitor 3.12 Access the Device Using DDNS If you connect your Device to the Internet and it uses a dynamic WAN IP address, it is inconvenient for you to manage the device from the Internet.
  • Page 77: Registering A Ddns Account On Www.dyndns.org

    Chapter 3 Tutorials 3.12.1 Registering a DDNS Account on www.dyndns.org Open a browser and type http://www.dyndns.org. Apply for a user account. This tutorial uses UserName1 and 12345 as the username and password. Log into www.dyndns.org using your account. Add a new DDNS host name. This tutorial uses the following settings as an example. •...
  • Page 78 Chapter 3 Tutorials P-2812HNU(L)-Fx Series User’s Guide...
  • Page 79: Technical Reference

    Technical Reference The appendices provide general information. Some details may not apply to your NWA.
  • Page 81: Connection Status And System Info

    H A P T E R Connection Status and System Info 4.1 Overview After you log into the web configurator, the Connection Status screen appears. This shows the network connection status of the Device and clients connected to it. Use the System Info screen to look at the current status of the device, system resources, interfaces (LAN, WAN and WLAN), and SIP accounts.
  • Page 82 Chapter 4 Connection Status and System Info If you prefer to view the status in a list, click List View in the Viewing mode selection box. You can configure how often you want the Device to update this screen in Refresh Interval. Figure 10 Connection Status: Icon View Figure 11 Connection Status: List View In Icon View, if you want to view information about a client, click the client’s name and Info.
  • Page 83: The System Info Screen

    Chapter 4 Connection Status and System Info 4.3 The System Info Screen Click Connection Status > System Info to open this screen. Figure 12 System Info Screen Each field is described in the following table. Table 4 System Info Screen LABEL DESCRIPTION Language...
  • Page 84 Chapter 4 Connection Status and System Info Table 4 System Info Screen (continued) LABEL DESCRIPTION Firmware Version This field displays the current version of the firmware inside the device. It also shows the date the firmware version was created. Go to the Maintenance >...
  • Page 85 Chapter 4 Connection Status and System Info Table 4 System Info Screen (continued) LABEL DESCRIPTION Status This field indicates whether or not the Device is using the interface. For the DSL interface, this field displays Down (line is down), Up (line is up or connected) if you're using Ethernet encapsulation and Down (line is down), Up (line is up or connected), Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE...
  • Page 86 Chapter 4 Connection Status and System Info Table 4 System Info Screen (continued) LABEL DESCRIPTION Action This field displays the current registration status of the SIP account. You have to register SIP accounts with a SIP server to use VoIP. If the SIP account is already registered with the SIP server, •...
  • Page 87: Broadband

    H A P T E R Broadband 5.1 Overview This chapter discusses the Device’s Broadband screens. Use these screens to configure your Device for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet.
  • Page 88: What You Can Do In This Chapter

    Chapter 5 Broadband 5.1.1 What You Can Do in this Chapter • Use the Broadband screen to view, remove or add a WAN interface. You can also configure the WAN settings on the ZyXEL Device for Internet access (Section 5.2 on page 91).
  • Page 89 Chapter 5 Broadband Asynchronous Transfer Mode (ATM) is a WAN networking technology that provides high-speed data transfer. ATM uses fixed-size packets of information called cells. With ATM, a high QoS (Quality of Service) can be guaranteed. ATM uses a connection-oriented model and establishes a virtual circuit (VC) between Finding Out More Packet Transfer Mode (PTM) is packet-oriented and supported by the VDSL2 standard.
  • Page 90 Chapter 5 Broadband means that the first 32 bits (2001:db8) is the subnet prefix. IPv6 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character (1 ~ 10, A ~ F).
  • Page 91: Before You Begin

    Chapter 5 Broadband A public IPv4 address is 202.156.30.41. The converted hexadecimal IP string is ca.9c.1E.29. The IPv6 address prefix becomes 2002:ca9c:1e29::/48. Figure 15 IPv6 6to4 Mode IPv6 IPv6 IPv4 IPv6 Prefix Delegation Prefix delegation enables an IPv6 router to use the IPv6 prefix (network address) received from the ISP (or a connected uplink router) for its LAN.
  • Page 92 Chapter 5 Broadband Click Network Setting > Broadband. The following screen opens. Figure 16 Network Setting > Broadband The following table describes the fields in this screen. Table 6 Network Setting > Broadband LABEL DESCRIPTION Switch WAN Mode Type If you prefer not to use a DSL line and you have another broadband modem or router (such as ADSL) available, you can select EtherWAN from the drop- down list box and click Switch WAN Interface.
  • Page 93: Add/Edit Internet Connection

    Chapter 5 Broadband Table 6 Network Setting > Broadband (continued) LABEL DESCRIPTION Default Gateway This shows whether the Device uses the interface of this connection as the system default gateway. Modify Click the Edit icon to configure the connection. Click the Delete icon to delete this connection from the Device. A window displays asking you to confirm that you want to delete the connection.
  • Page 94 Chapter 5 Broadband The following table describes the fields in this screen. /EtherWAN Table 7 Broadband Add/Edit: Routing- PPPoE (VDSL) LABEL DESCRIPTION General Name Enter a service name of the connection. Type Select VDSL or EtherWAN as the interface that you want to configure. VDSL: The Device uses the VDSL technology for data transmission over the DSL port.
  • Page 95 Chapter 5 Broadband Table 7 Broadband Add/Edit: Routing- PPPoE (VDSL) (continued) LABEL DESCRIPTION Use Static IP A static IP address is a fixed IP that your ISP gives you. A dynamic IP address Address is not fixed; the ISP assigns you a different one each time you connect to the Internet.
  • Page 96 Chapter 5 Broadband Table 7 Broadband Add/Edit: Routing- PPPoE (VDSL) (continued) LABEL DESCRIPTION 6RD Enable Select this option to enable IPv6 Rapid Deployment. By enabling this function, the Device uses an ISP’s IPv6 address prefix instead of the 2002::/48 prefix. The operational domain of 6RD is limited to and controlled by the ISP’s network.
  • Page 97 Chapter 5 Broadband 5.2.1.2 Routing- IPoE (VDSL) Click the Add new WAN Interface in the Network Setting > Broadband screen or the Edit icon next to the connection you want to configure. Select VDSL or EtherWAN as the interface type, Routing as the encapsulation mode and IP over Ethernet as the WAN service type.
  • Page 98 Chapter 5 Broadband Table 8 Broadband Add/Edit: Routing- IPoE (VDSL/EtherWAN) (continued) LABEL DESCRIPTION WAN Service Type This field is available only when you select Routing in the Mode field. Select the method of encapsulation used by your ISP. • PPP over Ethernet (PPPoE) - PPPoE (Point to Point Protocol over Ethernet) provides access control and billing functionality in a manner similar to dial-up services using PPP.
  • Page 99 Chapter 5 Broadband Table 8 Broadband Add/Edit: Routing- IPoE (VDSL/EtherWAN) (continued) LABEL DESCRIPTION Use the following Select this to have the Device use the DNS server addresses you configure Static DNS IP manually. Address Primary DNS Enter the first DNS server address assigned by the ISP. Server Secondary DNS Enter the second DNS server address assigned by the ISP.
  • Page 100 Chapter 5 Broadband 5.2.1.3 Routing- PPPoE (ADSL) Click the Add new WAN Interface in the Network Setting > Broadband screen or the Edit icon next to the connection you want to configure. Select ADSL as the interface type, Routing as the encapsulation mode, and PPPoE as the WAN service type.
  • Page 101 Chapter 5 Broadband Table 9 Broadband Add/Edit: Routing- PPPoE (ADSL) (continued) LABEL DESCRIPTION WAN Service Type This field is available only when you select Routing in the Mode field. Select PPPoE as the method of encapsulation used by your ISP. •...
  • Page 102 Chapter 5 Broadband Table 9 Broadband Add/Edit: Routing- PPPoE (ADSL) (continued) LABEL DESCRIPTION Maximum Burst Maximum Burst Size (MBS) refers to the maximum number of cells that can be Size sent at the peak rate. Type the MBS, which is less than 65535. This field is available only when you select Non Realtime VBR or Realtime VBR.
  • Page 103 Chapter 5 Broadband Table 9 Broadband Add/Edit: Routing- PPPoE (ADSL) (continued) LABEL DESCRIPTION Obtain IPv6 Select this option if you want to have the Device use the IPv6 prefix from the Address connected router’s Router Advertisement (RA) to generate an IPv6 address. Automatically Enable Prefix Select this to enable Prefix Delegation.
  • Page 104 Chapter 5 Broadband 5.2.1.4 Routing- PPPoA Click the Add new WAN Interface in the Network Setting > Broadband screen or the Edit icon next to the connection you want to configure. Select ADSL as the interface type, Routing as the encapsulation mode and PPPoA as the WAN service type.
  • Page 105 Chapter 5 Broadband Table 10 Broadband Add/Edit: Routing- PPPoA (ADSL) (continued) LABEL DESCRIPTION WAN Service Type This field is available only when you select Routing in the Mode field. Select PPPoA as the method of encapsulation used by your ISP. •...
  • Page 106 Chapter 5 Broadband Table 10 Broadband Add/Edit: Routing- PPPoA (ADSL) (continued) LABEL DESCRIPTION PPP User Name Enter the user name exactly as your ISP assigned. If assigned a name in the form user@domain where domain identifies a service name, then enter both components exactly as given.
  • Page 107 Chapter 5 Broadband Table 10 Broadband Add/Edit: Routing- PPPoA (ADSL) (continued) LABEL DESCRIPTION Static IPv6 Address Select this option if you have a fixed IPv6 address assigned by your ISP. IPv6 Address Enter the static IPv6 address provided by your ISP using colon (:) hexadecimal notation.
  • Page 108 Chapter 5 Broadband 5.2.1.5 Routing- IPoE (ADSL) Click the Add new WAN Interface in the Network Setting > Broadband screen or the Edit icon next to the connection you want to configure. Select ADSL as the interface type, Routing as the encapsulation mode and IP over Ethernet as the WAN service type.
  • Page 109 Chapter 5 Broadband Table 11 Broadband Add/Edit: Routing- IPoE (ADSL) (continued) LABEL DESCRIPTION IPv6/IPv4 Select Enable to allow the Device to run IPv4 and IPv6 at the same time. If DualStack this function is disabled, the Device only runs IPv4. ATM PVC VPI (Virtual Path Identifier) and VCI (Virtual Channel Identifier) define a virtual Configuration...
  • Page 110 Chapter 5 Broadband Table 11 Broadband Add/Edit: Routing- IPoE (ADSL) (continued) LABEL DESCRIPTION Obtain an IP A static IP address is a fixed IP that your ISP gives you. A dynamic IP address Address is not fixed; the ISP assigns you a different one each time you connect to the Automatically Internet.
  • Page 111 Chapter 5 Broadband Table 11 Broadband Add/Edit: Routing- IPoE (ADSL) (continued) LABEL DESCRIPTION 6to4 Tunneling Select 6to4 if the Device is connected to a network that has both IPv6 and IPv4 and the IPv4 addresses are public IP addresses. In this mode, the Device can convert an IPv4 address directly to an IPv6 address.
  • Page 112 Chapter 5 Broadband If you select VDSL or EtherWAN as the interface type, the following screen appears. Figure 27 Broadband Add/Edit: Bridge (VDSL/EtherWAN) The following table describes the fields in this screen. Table 12 Broadband Add/Edit: Bridge (VDSL/EtherWAN) LABEL DESCRIPTION General Name Enter a service name of the connection.
  • Page 113 Chapter 5 Broadband Table 12 Broadband Add/Edit: Bridge (VDSL/EtherWAN) (continued) LABEL DESCRIPTION Bridge Group Select the LAN/WLAN port(s) from which traffic will be forwarded to the WAN interface directly. Select a port from the Available LAN/WLAN Port(s) list and click Add >> to add it to the Bridged LAN/WLAN Port(s) list.
  • Page 114 Chapter 5 Broadband Table 13 Broadband Add/Edit: Bridge (ADSL) (continued) LABEL DESCRIPTION Mode Select Bridge when your ISP provides you more than one IP address and you want the connected computers to get individual IP address from ISP’s DHCP server directly. If you select Bridge, you cannot use routing functions, such as QoS, Firewall, DHCP server and NAT on traffic from the selected LAN port(s).
  • Page 115: The 3G Backup Screen

    Chapter 5 Broadband Table 13 Broadband Add/Edit: Bridge (ADSL) (continued) LABEL DESCRIPTION Maximum Burst Maximum Burst Size (MBS) refers to the maximum number of cells that can be Size sent at the peak rate. Type the MBS, which is less than 65535. This field is available only when you select Non Realtime VBR or Realtime VBR.
  • Page 116 Chapter 5 Broadband The following table describes the labels in this screen. Table 14 Broadband > 3G Backup LABEL DESCRIPTION 3G Backup Select Enable 3G Backup to have the Device use the 3G connection as your WAN or a backup when the wired WAN connection fails. Card Description This field displays the manufacturer and model name of your 3G card if you inserted one in the Device.
  • Page 117: Technical Reference

    Chapter 5 Broadband 5.4 Technical Reference The following section contains additional technical information about the Device features described in this chapter. Encapsulation Be sure to use the encapsulation method required by your ISP. The Device can work in bridge mode or routing mode.
  • Page 118 Chapter 5 Broadband separate ATM virtual circuit (VC-based multiplexing). Please refer to RFC 1483 for more detailed information. Multiplexing There are two conventions to identify what protocols the virtual circuit (VC) is carrying. Be sure to use the multiplexing method required by your ISP. VC-based Multiplexing In this case, by prior mutual agreement, each protocol is assigned to a specific virtual circuit;...
  • Page 119 Chapter 5 Broadband The following figure illustrates the relationship between PCR, SCR and MBS. Figure 30 Example of Traffic Shaping ATM Traffic Classes These are the basic ATM traffic classes defined by the ATM Forum Traffic Management 4.0 Specification. Constant Bit Rate (CBR) Constant Bit Rate (CBR) provides fixed bandwidth that is always available even if no data is being sent.
  • Page 120 Chapter 5 Broadband IP Address Assignment A static IP is a fixed IP that your ISP gives you. A dynamic IP is not fixed; the ISP assigns you a different one each time. The Single User Account feature can be enabled or disabled if you have either a dynamic or static IP.
  • Page 121 Chapter 5 Broadband Multicast IP packets are transmitted in either one of two ways - Unicast (1 sender - 1 recipient) or Broadcast (1 sender - everybody on the network). Multicast delivers IP packets to a group of hosts on the network - not everybody and not just 1.
  • Page 122 Chapter 5 Broadband compose the network address. The prefix length is written as “/x” where x is a number. For example, 2001:db8:1a2b:15::1a2f:0/32 means that the first 32 bits (2001:db8) is the subnet prefix. 3G Comparison Table See the following table for a comparison between 2G, 2.5G, 2.75G and 3G wireless technologies. Table 15 2G, 2.5G, 2.75G, 3G and 3.5G Wireless Technologies MOBILE PHONE AND DATA STANDARDS DATA...
  • Page 123: Wireless

    H A P T E R Wireless 6.1 Overview This chapter describes the Device’s Network Setting > Wireless screens. Use these screens to set up your Device’s wireless connection. 6.1.1 What You Can Do in this Chapter • Use the General screen to enable the Wireless LAN, enter the SSID and select the wireless security mode (Section 6.2 on page 125).
  • Page 124 Chapter 6 Wireless The following figure provides an example of a wireless network. Figure 31 Example of a Wireless Network The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point (AP) to interact with the other devices (such as the printer) or with the Internet.
  • Page 125: Before You Begin

    Chapter 6 Wireless 6.1.3 Before You Begin Before you start using these screens, ask yourself the following questions. See Section 6.7 on page if some of the terms used here do not make sense to you. • What wireless standards do the other wireless devices support (IEEE 802.11g, for example)? What is the most appropriate standard to use? •...
  • Page 126 Chapter 6 Wireless The following table describes the labels in this screen. Table 16 Network > Wireless LAN > General LABEL DESCRIPTION Wireless Network Setup Wireless Select the Enable Wireless LAN check box to activate the wireless LAN. Wireless Network Settings Wireless The SSID (Service Set IDentity) identifies the service set with which a wireless Network Name...
  • Page 127: No Security

    Chapter 6 Wireless 6.2.1 No Security Select No Security to allow wireless stations to communicate with the access points without any data encryption or authentication. Note: If you do not enable any wireless security on your Device, your network is accessible to any wireless networking device that is within range.
  • Page 128 Chapter 6 Wireless In order to configure and enable WEP encryption, click Network Settings > Wireless to display the General screen. Select Basic as the security level. Then select Static WEP or Shared WEP from the Security Mode list. Figure 34 Wireless > General: Basic (Static WEP/Shared WEP) The following table describes the labels in this screen.
  • Page 129: More Secure (Wpa(2)-Psk)

    Chapter 6 Wireless 6.2.3 More Secure (WPA(2)-PSK) The WPA-PSK security mode provides both improved data encryption and user authentication over WEP. Using a Pre-Shared Key (PSK), both the Device and the connecting client share a common password in order to validate the connection. This type of encryption, while robust, is not as strong as WPA, WPA2 or even WPA2-PSK.
  • Page 130: Wpa(2) Authentication

    Chapter 6 Wireless Table 19 Wireless > General: WPA(2)-PSK (continued) LABEL DESCRIPTION WPA-PSK This field appears when you choose WPA-PSK2 as the Security Mode. Compatible Check this field to allow wireless devices using WPA-PSK security mode to connect to your Device. The Device supports WPA-PSK and WPA2-PSK simultaneously.
  • Page 131: The More Ap Screen

    Chapter 6 Wireless The following table describes the labels in this screen. Table 20 Wireless > General: More Secure: WPA(2) LABEL DESCRIPTION Security Level Select More Secure to enable WPA(2)-PSK data encryption. Security Mode Choose WPA or WPA2 from the drop-down list box. Authentication Server IP Address Enter the IP address of the external authentication server in dotted decimal...
  • Page 132: Edit More Ap

    Chapter 6 Wireless The following table describes the labels in this screen. Table 21 Network Settings > Wireless > More AP LABEL DESCRIPTION This is the index number of the entry. Active This field indicates whether this SSID is active. A yellow bulb signifies that this SSID is active.
  • Page 133: The Wps Screen

    Chapter 6 Wireless Table 22 Wireless > More AP: Edit (continued) LABEL DESCRIPTION Wireless Network The SSID (Service Set IDentity) identifies the service set with which a Name (SSID) wireless device is associated. Wireless devices associating to the access point (AP) must have the same SSID. Enter a descriptive name (up to 32 English keyboard characters) for the wireless LAN.
  • Page 134 Chapter 6 Wireless Click Network Setting > Wireless > WPS. The following screen displays. Select Enable and click Apply to activate the WPS function. Then you can configure the WPS settings in this screen. Figure 39 Network Setting > Wireless > WPS The following table describes the labels in this screen.
  • Page 135: The Wmm Screen

    Chapter 6 Wireless Table 23 Network Setting > Wireless > WPS (continued) LABEL DESCRIPTION Register Enter the PIN of the device that you are setting up a WPS connection with and click Register to authenticate and add the wireless device to your wireless network.
  • Page 136 Chapter 6 Wireless Click Network Setting > Wireless > WMM. The following screen displays. Figure 40 Network Setting > Wireless > WMM The following table describes the labels in this screen. Table 24 Network Setting > Wireless > WMM LABEL DESCRIPTION Enable WMM of This enables the Device to automatically give a service a priority level according...
  • Page 137: Scheduling Screen

    Chapter 6 Wireless 6.6 Scheduling Screen Click Network Setting > Wireless > Scheduling to open the Wireless LAN Scheduling screen. Use this screen to configure when the Device enables or disables the wireless LAN. Figure 41 Network Setting > Wireless > Scheduling The following table describes the labels in this screen.
  • Page 138: Additional Wireless Terms

    Chapter 6 Wireless 6.7.1 Additional Wireless Terms The following table describes some wireless network terms and acronyms used in the Device’s web configurator. Table 26 Additional Wireless Terms TERM DESCRIPTION RTS/CTS Threshold In a wireless network which covers a large area, wireless devices are sometimes not aware of each other’s presence.
  • Page 139 Chapter 6 Wireless A good way to come up with effective security keys, passwords and so on is to use obscure information that you personally will easily remember, and to enter it in a way that appears random and does not include real words. For example, if your mother owns a 1970 Dodge Challenger and her favorite movie is Vanishing Point (which you know was made in 1971) you could use “70dodchal71vanpoi”...
  • Page 140: Signal Problems

    Chapter 6 Wireless 6.7.2.4 Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. The types of encryption you can choose depend on the type of authentication.
  • Page 141: Bss

    Chapter 6 Wireless 6.7.4 BSS A Basic Service Set (BSS) exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS traffic blocking is disabled, wireless station A and B can access the wired network and communicate with each other.
  • Page 142: Wifi Protected Setup (Wps)

    Chapter 6 Wireless 6.7.6 WiFi Protected Setup (WPS) Your Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
  • Page 143 Chapter 6 Wireless on the first device, it presents its PIN to the second device. If the PIN matches, one device sends the network and security information to the other, allowing it to join the network. Take the following steps to set up a WPS connection between an access point or wireless router (referred to here as the AP) and a client device using the PIN method.
  • Page 144 Chapter 6 Wireless The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 43 Example WPS Process: PIN Method ENROLLEE REGISTRAR This device’s WPS PIN: 123456 Enter WPS PIN from other device: START START...
  • Page 145 Chapter 6 Wireless The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point. Figure 44 How WPS works ACTIVATE ACTIVATE WITHIN 2 MINUTES WPS HANDSHAKE ENROLLEE REGISTRAR SECURE TUNNEL SECURITY INFO COMMUNICATION The roles of registrar and enrollee last only as long as the WPS setup process is active (two minutes).
  • Page 146 Chapter 6 Wireless is the registrar, and Client 1 is the enrollee. The registrar randomly generates the security information to set up the network, since it is unconfigured and has no existing information. Figure 45 WPS: Example Network Step 1 ENROLLEE REGISTRAR SECURITY INFO...
  • Page 147 Chapter 6 Wireless In step 3, you add another access point (AP2) to your network. AP2 is out of range of AP1, so you cannot use AP1 for the WPS handshake with the new access point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead.
  • Page 148 Chapter 6 Wireless • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network. This is because the registrar has no way of identifying the “correct”...
  • Page 149: Home Networking

    H A P T E R Home Networking 7.1 Overview A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is usually located in one immediate area such as a building or floor of a building. The LAN screens can help you configure a LAN DHCP server and manage IP addresses.
  • Page 150 Chapter 7 Home Networking Subnet Mask The subnet mask specifies the network number portion of an IP address. Your Device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the Device unless you are instructed to do otherwise. DHCP DHCP (Dynamic Host Configuration Protocol) allows clients to obtain TCP/IP configuration at start- up from a server.
  • Page 151 Chapter 7 Home Networking 7.1.2.3 About File Sharing Workgroup name This is the name given to a set of computers that are connected on a network and share resources such as a printer or files. Windows automatically assigns the workgroup name when you set up a network.
  • Page 152: The Lan Setup Screen

    Chapter 7 Home Networking Supported OSs Your operating system must support TCP/IP ports for printing and be compatible with the RAW (port 9100) protocol. The following OSs support Device’s printer sharing feature. • Microsoft Windows 95, Windows 98 SE (Second Edition), Windows Me, Windows NT 4.0, Windows 2000, Windows XP or Macintosh OS X.
  • Page 153: The Static Dhcp Screen

    Chapter 7 Home Networking Table 28 Network Setting > Home Networking > LAN Setup (continued) LABEL DESCRIPTION DHCP Select Enable to have your Device assign IP addresses, an IP default gateway and DNS servers to LAN computers and other devices that are DHCP clients. If you select Disable, you need to manually configure the IP addresses of the computers and other devices on your LAN.
  • Page 154 Chapter 7 Home Networking Use this screen to change your Device’s static DHCP settings. Click Network Setting > Home Networking > Static DHCP to open the following screen. Figure 49 Network Setting > Home Networking > Static DHCP The following table describes the labels in this screen. Table 29 Network Setting >...
  • Page 155: The Upnp Screen

    Chapter 7 Home Networking Table 30 Static DHCP: Add LABEL DESCRIPTION Apply Click Apply to save your changes. Back Click Back to exit this screen without saving. 7.4 The UPnP Screen Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices.
  • Page 156: Before You Begin

    Chapter 7 Home Networking The following figure is an overview of the Device’s file server feature. Computers A and B can access files on a USB device (C) which is connected to the Device. Figure 52 File Sharing Overview The Device will not be able to join the workgroup if your local area network has restrictions set up that do not allow devices to join a workgroup.
  • Page 157: Add/Edit File Sharing

    Chapter 7 Home Networking Each field is described in the following table. Table 32 Network Setting > Home Networking > File Sharing LABEL DESCRIPTION Server Configuration File Sharing Select Enable to activate file sharing through the Device. Services (SMB) Add new share Click this to set up a new share on the Device.
  • Page 158: The Media Server Screen

    Chapter 7 Home Networking 7.6 The Media Server Screen The media server feature lets anyone on your network play video, music, and photos from the USB storage device connected to your Device (without having to copy them to another computer). The Device can function as a DLNA-compliant media server.
  • Page 159: The Printer Server Screen

    Chapter 7 Home Networking 7.7 The Printer Server Screen The Device allows you to share a USB printer on your LAN. You can do this by connecting a USB printer to one of the USB ports on the Device and then configuring a TCP/IP port on the computers connected to your network.
  • Page 160: Technical Reference

    Chapter 7 Home Networking The following table describes the labels in this menu. Table 35 Network Setting > Home Networking > Print Server LABEL DESCRIPTION Device share a USB printer Printer Select Enable to have the Server Apply Click Apply to save your changes. Cancel Click Cancel to restore your previously saved settings.
  • Page 161 Chapter 7 Home Networking LAN TCP/IP The Device has built-in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP client capability. IP Address and Subnet Mask Similar to the way houses on a street share a common street name, so too do computers on a LAN share one common network number.
  • Page 162 Chapter 7 Home Networking Device Print Server Compatible USB Printers The following is a list of USB printer models compatible with the Device print server. Table 36 Compatible USB Printers BRAND MODEL Brother MFC7420 CANON BJ F9000 CANON i320 CANON PIXMA MP450 CANON PIXMA MP730...
  • Page 163 Chapter 7 Home Networking Table 36 Compatible USB Printers (continued) BRAND MODEL Deskjet 1220C Deskjet F4185 Laserjet 1022 Laserjet 1200 Laserjet 2200D Laserjet 2420 Color Laserjet 1500L Laserjet 3015 Officejet 4255 Officejet 5510 Officejet 5610 Officejet 7210 Officejet Pro L7380 Photosmart 2610 Photosmart 3110 Photosmart 7150...
  • Page 164: Installing Upnp In Windows Example

    Chapter 7 Home Networking 7.9 Installing UPnP in Windows Example This section shows how to install UPnP in Windows Me and Windows XP. Installing UPnP in Windows Me Follow the steps below to install the UPnP in Windows Me. Click Start and Control Panel. Double-click Add/Remove Programs. Click the Windows Setup tab and select Communication in the Components selection box.
  • Page 165 Chapter 7 Home Networking In the Communications window, select the Universal Plug and Play check box in the Components selection box. Figure 60 Add/Remove Programs: Windows Setup: Communication: Components Click OK to go back to the Add/Remove Programs Properties window and click Next. Restart the computer when prompted.
  • Page 166 Chapter 7 Home Networking The Windows Optional Networking Components Wizard window displays. Select Networking Service in the Components selection box and click Details. Figure 62 Windows Optional Networking Components Wizard In the Networking Services window, select the Universal Plug and Play check box. Figure 63 Networking Services P-2812HNU(L)-Fx Series User’s Guide...
  • Page 167: Using Upnp In Windows Xp Example

    Chapter 7 Home Networking Click OK to go back to the Windows Optional Networking Component Wizard window and click Next. 7.10 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the Device.
  • Page 168 Chapter 7 Home Networking In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 65 Internet Connection Properties P-2812HNU(L)-Fx Series User’s Guide...
  • Page 169 Chapter 7 Home Networking You may edit or delete the port mappings or click Add to manually add port mappings. Figure 66 Internet Connection Properties: Advanced Settings Figure 67 Internet Connection Properties: Advanced Settings: Add When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically.
  • Page 170 Chapter 7 Home Networking Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 68 System Tray Icon Double-click on the icon to display your current Internet connection status. Figure 69 Internet Connection Status Web Configurator Easy Access With UPnP, you can access the web-based configurator on the Device without finding out the IP address of the Device first.
  • Page 171 Chapter 7 Home Networking Select My Network Places under Other Places. Figure 70 Network Connections An icon with the description for each UPnP-enabled device displays under Local Network. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 172 Chapter 7 Home Networking Right-click on the icon for your Device and select Invoke. The web configurator login screen displays. Figure 71 Network Connections: My Network Places Right-click on the icon for your Device and select Properties. A properties window displays with basic information about the Device.
  • Page 173: Routing

    H A P T E R Routing 8.1 Overview The Device usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the Device send data to devices not reachable through the default gateway, use static routes.
  • Page 174: Configuring Static Route

    Chapter 8 Routing 8.2 Configuring Static Route Use this screen to view and configure IP static routes on the Device. Click Network Setting > Static Route to open the following screen. Figure 74 Network Setting > Static Route The following table describes the labels in this screen. Table 37 Network Setting >...
  • Page 175: Add/Edit Static Route

    Chapter 8 Routing 8.2.1 Add/Edit Static Route Click add new Static Route in the Routing screen or click the Edit icon next to a rule. The following screen appears. Use this screen to configure the required information for a static route. Figure 75 Routing: Add/Edit The following table describes the labels in this screen.
  • Page 176 Chapter 8 Routing P-2812HNU(L)-Fx Series User’s Guide...
  • Page 177: Quality Of Service (Qos)

    H A P T E R Quality of Service (QoS) 9.1 Overview This chapter discusses the Device’s QoS screens. Use these screens to set up your Device to use QoS for traffic management. Quality of Service (QoS) refers to both a network’s ability to deliver data with minimum delay, and the networking methods used to control the use of bandwidth.
  • Page 178: The Qos General Screen

    Chapter 9 Quality of Service (QoS) QoS versus Cos QoS is used to prioritize source-to-destination traffic flows. All packets in the same flow are given the same priority. CoS (class of service) is a way of managing traffic in a network by grouping similar types of traffic together and treating each type as a class.
  • Page 179 Chapter 9 Quality of Service (QoS) The following table describes the labels in this screen. Table 39 Network Setting > QoS > General LABEL DESCRIPTION Active QoS Select the check box to turn on QoS to improve your network performance. You can give priority to traffic that the Device forwards out through the WAN interface.
  • Page 180: The Queue Setup Screen

    Chapter 9 Quality of Service (QoS) 9.3 The Queue Setup Screen Use this screen to configure QoS queue assignment. Click Network Setting > QoS > Queue Setup to open the screen as shown next. Figure 77 Network Setting > QoS > Queue Setup The following table describes the labels in this screen.
  • Page 181: Add/Edit A Qos Queue

    Chapter 9 Quality of Service (QoS) 9.3.1 Add/Edit a QoS Queue Use this screen to configure a queue. Click Add new queue in the Queue Setup screen or the Edit icon next to an existing queue. Figure 78 Queue Setup: Add/Edit The following table describes the labels in this screen.
  • Page 182 Chapter 9 Quality of Service (QoS) Click Network Setting > QoS > Class Setup to open the following screen. Figure 79 Network Setting > QoS > Class Setup The following table describes the labels in this screen. Table 42 Network Setting > QoS > Class Setup LABEL DESCRIPTION Add new Classifier...
  • Page 183: Add/Edit Qos Class

    Chapter 9 Quality of Service (QoS) 9.4.1 Add/Edit QoS Class Click Add new Classifier in the Class Setup screen or the Edit icon next to an existing classifier to configure it. Figure 80 Class Setup: Add/Edit The following table describes the labels in this screen. Table 43 Class Setup: Add/Edit LABEL DESCRIPTION...
  • Page 184 Chapter 9 Quality of Service (QoS) Table 43 Class Setup: Add/Edit (continued) LABEL DESCRIPTION Forward to Select a WAN interface through which traffic of this class will be forwarded out. Interface If you select Unchange, the Device forward traffic of this class according to the default routing table.
  • Page 185 Chapter 9 Quality of Service (QoS) Table 43 Class Setup: Add/Edit (continued) LABEL DESCRIPTION MAC Mask Type the mask for the specified MAC address to determine which bits a packet’s MAC address should match. Enter “f” for each bit of the specified source MAC address that the traffic’s MAC address should match.
  • Page 186: The Qos Monitor Screen

    Chapter 9 Quality of Service (QoS) Table 43 Class Setup: Add/Edit (continued) LABEL DESCRIPTION Apply Click Apply to save your changes. Back Click Back to return to the previous screen without saving. 9.5 The QoS Monitor Screen To view the Device’s QoS packet statistics, click Network Setting > QoS > Monitor. The screen appears as shown.
  • Page 187: Qos Technical Reference

    Chapter 9 Quality of Service (QoS) 9.6 QoS Technical Reference This section provides some technical background information about the topics covered in this chapter. 9.6.1 IEEE 802.1Q Tag The IEEE 802.1Q standard defines an explicit VLAN tag in the MAC header to identify the VLAN membership of a frame across bridges.
  • Page 188 Chapter 9 Quality of Service (QoS) negotiate paths or remember state information for every flow. In addition, applications do not have to request a particular service or give advanced notice of where the traffic is going. DSCP and Per-Hop Behavior DiffServ defines a new DS (Differentiated Services) field to replace the Type of Service (TOS) field in the IP header.
  • Page 189: Network Address Translation (Nat)

    H A P T E R Network Address Translation (NAT) 10.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet, for example, the source address of an outgoing packet, used within one network to a different IP address known within another network.
  • Page 190: The Port Forwarding Screen

    Chapter 10 Network Address Translation (NAT) Finding Out More Section 10.4 on page 193 for advanced technical information on NAT. 10.2 The Port Forwarding Screen Use the Port Forwarding screen to forward incoming service requests to the server(s) on your local network.
  • Page 191 Chapter 10 Network Address Translation (NAT) Appendix E on page 359 for port numbers commonly used for particular services. Figure 83 Network Setting > NAT > Port Forwarding The following table describes the fields in this screen. Table 46 Network Setting > NAT > Port Forwarding LABEL DESCRIPTION Add new rule...
  • Page 192: The Port Forwarding Edit Screen

    Chapter 10 Network Address Translation (NAT) 10.2.2 The Port Forwarding Edit Screen This screen lets you create or edit a port forwarding rule. Click Add new rule in the Port Forwarding screen or the Edit icon next to an existing rule to open the following screen. Figure 84 Port Forwarding: Add/Edit The following table describes the labels in this screen.
  • Page 193: The Sessions Screen

    Chapter 10 Network Address Translation (NAT) Table 47 Port Forwarding: Add/Edit (continued) LABEL DESCRIPTION Apply Click Apply to save your changes. Back Click Back to return to the previous screen without saving. 10.3 The Sessions Screen Use the Sessions screen to limit the number of concurrent NAT sessions each client can use. Click Network Setting >...
  • Page 194: What Nat Does

    Chapter 10 Network Address Translation (NAT) Note that inside/outside refers to the location of a host, while global/local refers to the IP address of a host used in a packet. Thus, an inside local address (ILA) is the IP address of an inside host in a packet when the packet is still in the local network, while an inside global address (IGA) is the IP address of the same inside host when the packet is on the WAN side.
  • Page 195 Chapter 10 Network Address Translation (NAT) Device keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored. The following figure illustrates this. Figure 86 How NAT Works NAT Table Inside Local Inside Global IP Address IP Address...
  • Page 196 Chapter 10 Network Address Translation (NAT) P-2812HNU(L)-Fx Series User’s Guide...
  • Page 197: Dynamic Dns

    H A P T E R Dynamic DNS 11.1 Overview This chapter discusses how to configure your Device to use Dynamic DNS. Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in applications such as NetMeeting and CU-SeeMe). You can also access your FTP server or Web site on your own computer using a domain name (for instance myhost.dhs.org, where myhost is a name of your choice) that will never change instead of using an IP address that changes each time you reconnect.
  • Page 198 Chapter 11 Dynamic DNS The following table describes the fields in this screen. Table 50 Network Setting > DNS LABEL DESCRIPTION Dynamic DNS Configuration Active Dynamic Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. Dynamic DNS Select the type of service that you are registered for from your Dynamic DNS Type...
  • Page 199: Firewall

    H A P T E R Firewall 12.1 Overview Use the Device firewall screens to enable and configure the firewall that protects your Device and network from attacks by hackers on the Internet and control access to it. By default the firewall: •...
  • Page 200: The General Screen

    Chapter 12 Firewall The Device can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The Device is installed between the LAN/WLAN and a broadband modem connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN.
  • Page 201: The Services Screen

    Chapter 12 Firewall 12.3 The Services Screen Use this screen to enable service blocking and to maintain the list of services you want to block. To access this screen, click Security > Firewall > Services. Note: These rules specify which computers on the LAN can access which computers or services on the WAN.
  • Page 202: Firewall Technical Reference

    Chapter 12 Firewall Table 52 Security > Firewall > Services (continued) LABEL DESCRIPTION Apply Click Apply to save your changes. Cancel Click Cancel to restore your previously saved settings. 12.4 Firewall Technical Reference This section provides some technical background information about the topics covered in this chapter.
  • Page 203 Chapter 12 Firewall Once these questions have been answered, adding rules is simply a matter of entering the information into the correct fields in the web configurator screens. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 204 Chapter 12 Firewall P-2812HNU(L)-Fx Series User’s Guide...
  • Page 205: Mac Filter

    H A P T E R MAC Filter 13.1 Overview This chapter discusses MAC address filtering. You can configure the Device to permit access to clients based on their MAC addresses in the MAC Filter screen. This applies to wired and wireless connections. 13.1.1 What You Need to Know Every Ethernet device has a unique MAC (Media Access Control) address.
  • Page 206 Chapter 13 MAC Filter The following table describes the labels in this menu. Table 53 Security > MAC Filter LABEL DESCRIPTION MAC Address Select Enable to activate MAC address filtering. Filter This is the index number of the MAC address. Allow Select Allow to permit access to the Device.
  • Page 207: Parental Control

    H A P T E R Parental Control 14.1 Overview Parental control allows you to block web sites with the specific URL. You can also define time periods and days during which the Device performs parental control on a specific user. 14.2 The Parental Control Screen Use this screen to enable parental control, view the parental control rules and schedules.
  • Page 208: Add/Edit A Parental Control Rule

    Chapter 14 Parental Control Table 54 Parental Control > Parental Control (continued) LABEL DESCRIPTION Website Block This shows whether the website block is configured. If not, None will be shown. Modify Click the Edit icon to go to the screen where you can edit the rule. Click the Delete icon to delete an existing rule.
  • Page 209 Chapter 14 Parental Control Table 55 Add/Edit Parental Control Rule (continued) LABEL DESCRIPTION Parental Control Enter a descriptive name for the rule. Profile Name Home Network Select the LAN user that you want to apply this rule to from the drop-down list User box.
  • Page 210 Chapter 14 Parental Control P-2812HNU(L)-Fx Series User’s Guide...
  • Page 211: Certificates

    H A P T E R Certificates 15.1 Overview The Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication. 15.1.1 What You Can Do in this Chapter •...
  • Page 212: Verifying A Certificate

    Chapter 15 Certificates The Device uses certificates based on public-key cryptology to authenticate users attempting to establish a connection. The method used to secure the data that you send through an established connection depends on the type of connection. For example, a VPN tunnel might use the triple DES encryption algorithm.
  • Page 213: Local Certificates

    Chapter 15 Certificates You can use a certificate’s fingerprint to verify it. A certificate’s fingerprint is a message digest calculated using the MD5 or SHA1 algorithms. The following procedure describes how to check a certificate’s fingerprint to verify that you have the actual certificate. Browse to where you have the certificate saved on your computer.
  • Page 214 Chapter 15 Certificates • SIP TLS - This certificate secures VoIP connections. • SSH/SCP/SFTP - This certificate secures remote connections. Click Security > Certificates to open the Local Certificates screen. Figure 96 Security > Certificates > Local Certificates The following table describes the labels in this screen. Table 56 Security >...
  • Page 215: Trusted Ca

    Chapter 15 Certificates 15.3 Trusted CA Use this screen to view a summary list of certificates of the certification authorities that you have set the Device to accept as trusted. The Device accepts any valid certificate signed by a certification authority on this list as being trustworthy;...
  • Page 216: View Certificate

    Chapter 15 Certificates Note: You must remove any spaces from the certificate’s filename before you can import the certificate. Figure 98 Trusted CA > Import The following table describes the labels in this screen. Table 58 Security > Certificates > Trusted CA > Import LABEL DESCRIPTION Certificate File...
  • Page 217 Chapter 15 Certificates Click Security > Certificates > Trusted CA to open the Trusted CA screen. Click the View icon to open the View Certificate screen. Figure 99 Trusted CA: View The following table describes the labels in this screen. Table 59 Trusted CA: View LABEL DESCRIPTION...
  • Page 218 Chapter 15 Certificates P-2812HNU(L)-Fx Series User’s Guide...
  • Page 219: Voip

    H A P T E R VoIP 16.1 Overview Use this chapter to: • Connect an analog phone to the Device. • Make phone calls over the Internet, as well as the regular phone network. • Configure settings such as speed dial. •...
  • Page 220 Chapter 16 VoIP VoIP VoIP stands for Voice over IP. IP is the Internet Protocol, which is the message-carrying standard the Internet runs on. So, Voice over IP is the sending of voice signals (speech) over the Internet (or another network that uses the Internet Protocol). SIP stands for Session Initiation Protocol.
  • Page 221: Before You Begin

    Chapter 16 VoIP Section on page 232 for advanced technical information on SIP. 16.1.3 Before You Begin • Before you can use these screens, you need to have a VoIP account already set up. If you don’t have one yet, you can sign up with a VoIP service provider over the Internet. •...
  • Page 222 Chapter 16 VoIP Figure 100 VoIP > SIP > SIP Service Provider P-2812HNU(L)-Fx Series User’s Guide...
  • Page 223 Chapter 16 VoIP The following table describes the labels in this screen. Table 60 VoIP > SIP > SIP Service Provider LABEL DESCRIPTION SIP Service Provider Selection Service Provider Select the SIP service provider profile you want to use for the SIP account you Selection configure in this screen.
  • Page 224: The Sip Account Screen

    Chapter 16 VoIP Table 60 VoIP > SIP > SIP Service Provider (continued) LABEL DESCRIPTION T38 Fax Relay Select this if the Device should send fax messages as UDP or TCP/IP packets through IP networks. This provides better quality, but it may have inter- operability problems.
  • Page 225 Chapter 16 VoIP Section 16.3 on page 224 for how to map a SIP account to a phone port. To access the following screen, click VoIP > SIP > SIP Account. Figure 101 VoIP > SIP > SIP Account The following table describes the labels in this screen. Table 61 VoIP >...
  • Page 226: Add/Edit Sip Account

    Chapter 16 VoIP 16.3.1 Add/Edit SIP Account You can configure a new SIP account or edit one. To access this screen, click Add new SIP Account in the SIP Account screen or Edit icon next to an existing account. Figure 102 SIP Account Add/Edit Each field is described in the following table.
  • Page 227 Chapter 16 VoIP Table 62 SIP Account Edit (continued) LABEL DESCRIPTION SIP Account Select the Active SIP Account check box if you want to use this account. Clear it if you do not want to use this account. SIP Account Enter your SIP number.
  • Page 228: Multiple Sip Accounts

    Chapter 16 VoIP Table 62 SIP Account Edit (continued) LABEL DESCRIPTION Active Call Select this to enable call waiting on the Device. This allows you to place a call on Waiting hold while you answer another incoming call on the same telephone (directory) number.
  • Page 229: Phone Screen

    Chapter 16 VoIP Each field is described in the following table. Table 63 VoIP > SIP > Common LABEL DESCRIPTION Bound Interface Name Bound Interface If you select AnyWAN, the Device automatically activates the VoIP service when Name any WAN connection is up. If you select MultiWAN, you also need to select the pre-configured WAN connections.
  • Page 230: Edit Phone Device

    Chapter 16 VoIP The following table describes the labels in this screen. Table 64 VoIP > Phone > Phone Device LABEL DESCRIPTION This is the index number of the entry. Phone ID This is the phone device number. Outgoing SIP This is the outgoing SIP number of the phone device.
  • Page 231: The Phone Region Screen

    Chapter 16 VoIP Table 65 Phone Device: Edit (continued) LABEL DESCRIPTION FXO Interface to Receive Incoming Call Enable Select this if you want to receive phone calls from the PSTN line (that do not use the Internet) on this phone port. Apply Click Apply to save your changes.
  • Page 232 Chapter 16 VoIP To access this screen, click VoIP > Call Rule. Figure 107 VoIP > Call Rule Each field is described in the following table. Table 67 VoIP > Call Rule LABEL DESCRIPTION Speed Dial Use this section to create or edit speed-dial entries. Select the speed-dial number you want to use for this phone number.
  • Page 233: The Fxo Screen ("L" Models Only)

    Chapter 16 VoIP 16.9 The FXO Screen (“L” Models Only) With PSTN line you can make and receive regular PSTN phone calls. Use a prefix number to make a regular call. When the device does not have power, you can make regular calls without dialing a prefix number.
  • Page 234: Voip

    Chapter 16 VoIP 16.10.1 VoIP VoIP is the sending of voice signals over Internet Protocol. This allows you to make phone calls and send faxes over the Internet at a fraction of the cost of using the traditional circuit-switched telephone network. You can also use servers to run telephone service applications like PBX services and voice mail.
  • Page 235 Chapter 16 VoIP Registration is initiated by the User Agent Client (UAC) running in the VoIP gateway (the Device). The gateway must be configured with information letting it know where to send the REGISTER message, as well as the relevant user and authorization data. A SIP registration has a limited lifespan.
  • Page 236 Chapter 16 VoIP The SIP proxy server forwards the call invitation to C. Figure 110 SIP Proxy Server SIP Redirect Server A SIP redirect server accepts SIP requests, translates the destination address to an IP address and sends the translated IP address back to the device that sent the request. Then the client device that originally sent the request can send requests to the IP address that it received back from the redirect server.
  • Page 237 Chapter 16 VoIP Client device A then sends the call invitation to client device C. Figure 111 SIP Redirect Server SIP Register Server A SIP register server maintains a database of SIP identity-to-IP address (or domain name) mapping. The register server checks your user name and password when you register. When you make a VoIP call using SIP, the RTP (Real time Transport Protocol) is used to handle voice data transfer.
  • Page 238: Quality Of Service (Qos)

    Chapter 16 VoIP A sends a SIP INVITE request to B. This message is an invitation for B to participate in a SIP telephone call. B sends a response indicating that the telephone is ringing. B sends an OK response after the call is answered. A then sends an ACK message to acknowledge that B has answered the call.
  • Page 239: Phone Services Overview

    Chapter 16 VoIP Type of Service (ToS) Network traffic can be classified by setting the ToS (Type of Service) values at the data source (for example, at the Device) so a server can decide the best method of delivery, that is the least cost, fastest route and so on.
  • Page 240 Chapter 16 VoIP • Call Hold • Call Waiting • Making a Second Call • Call Transfer • Three-Way Conference • Internal Calls • Do not Disturb Note: To take full advantage of the supplementary phone services available through the Device's phone ports, you may need to subscribe to the services from your VoIP service provider.
  • Page 241 Chapter 16 VoIP European Call Hold Call hold allows you to put a call (A) on hold by pressing the flash key. If you have another call, press the flash key and then “2” to switch back and forth between caller A and B by putting either one on hold.
  • Page 242 Chapter 16 VoIP When the second call is answered, press the flash key and press “3” to create a three-way conversation. Hang up the phone to drop the connection. If you want to separate the activated three-way conference into two individual connections (one is on-line, the other is on hold), press the flash key and press “2”.
  • Page 243: Logs

    H A P T E R Logs 17.1 Overview The web configurator allows you to choose which categories of events and/or alerts to have the Device log and then display the logs or have the Device send them to an administrator (as e-mail) or to a syslog server.
  • Page 244: The System Log Screen

    Chapter 17 Logs Table 71 Syslog Severity Levels CODE SEVERITY Error: There is an error condition on the system. Warning: There is a warning condition on the system. Notice: There is a normal but significant condition on the system. Informational: The syslog contains an informational message. Debug: The message is intended for debug-level purposes.
  • Page 245: The Phone Log Screen

    Chapter 17 Logs 17.3 The Phone Log Screen Click System Monitor > Log to open the Phone Log screen. Use this screen to view phone logs and alert messages. You can select the type of log and level of severity to display. Figure 114 System Monitor >...
  • Page 246 Chapter 17 Logs The following table describes the fields in this screen. Table 74 System Monitor > Log > VoIP Call History LABEL DESCRIPTION Select a category of call records to view from the drop-down list box. select All Call History to view all call records. Refresh Click this to renew the log screen.
  • Page 247: Traffic Status

    H A P T E R Traffic Status 18.1 Overview Use the Traffic Status screens to look at network traffic status and statistics of the WAN, LAN interfaces and NAT. 18.1.1 What You Can Do in this Chapter • Use the WAN screen to view the WAN traffic statistics (Section 18.2 on page 247) .
  • Page 248: The Lan Status Screen

    Chapter 18 Traffic Status The following table describes the fields in this screen. Table 75 System Monitor > Traffic Status > WAN LABEL DESCRIPTION Status This shows the number of bytes received and sent through the WAN interface of the Device. Refresh Interval Select how often you want the Device to update this screen from the drop-down list box.
  • Page 249: The Nat Status Screen

    Chapter 18 Traffic Status Table 76 System Monitor > Traffic Status > LAN (continued) LABEL DESCRIPTION Bytes Sent This indicates the number of bytes transmitted on this interface. Bytes Received This indicates the number of bytes received on this interface. Interface This shows the LAN or WLAN interface.
  • Page 250: The 3G Backup Status Screen

    Chapter 18 Traffic Status 18.5 The 3G Backup Status Screen Click System Monitor > Traffic Status > 3G Backup to open the following screen. You can view the 3G connection traffic statistics in this screen. Figure 119 System Monitor > Traffic Status > 3G Backup The following table describes the fields in this screen.
  • Page 251: The Voip Status Screen

    Chapter 18 Traffic Status 18.6 The VoIP Status Screen Click System Monitor > VoIP Status to open the following screen. You can view the VoIP traffic statistics in this screen. Figure 120 System Monitor > VoIP Status The following table describes the fields in this screen. Table 79 System Monitor >...
  • Page 252 Chapter 18 Traffic Status Table 79 System Monitor > VoIP Status (continued) LABEL DESCRIPTION Duration This field displays how long the current call has lasted. Status This field displays the current state of the phone call. Idle - There are no current VoIP calls, incoming calls or outgoing calls being made.
  • Page 253: User Account

    H A P T E R User Account 19.1 Overview You can configure system password for different user accounts in the User Account screen. 19.2 The User Account Screen Use the User Account screen to configure system password. Click Maintenance > User Account to open the following screen. Figure 121 Maintenance >...
  • Page 254 Chapter 19 User Account P-2812HNU(L)-Fx Series User’s Guide...
  • Page 255: Remote Mgmt

    H A P T E R Remote MGMT 20.1 Overview Remote MGMT allows you to manage your Device from a remote location through the following interfaces: • LAN and WLAN • WAN only Note: The Device is managed using the web configurator. 20.1.1 What You Need to Know The following terms and concepts may help as you read this chapter TR-064...
  • Page 256: The Remote Mgmt Screen

    Chapter 20 Remote MGMT 20.2 The Remote MGMT Screen Use this screen to decide what services you may use to access which Device interface. Click Maintenance > Remote MGMT to open the following screen. Figure 122 Maintenance > Remote MGMT The following table describes the fields in this screen.
  • Page 257: System

    H A P T E R System 21.1 Overview You can configure system settings, including the host name, domain name and the inactivity time- out interval in the System screen. 21.1.1 What You Need to Know The following terms and concepts may help as you read this chapter. Domain Name This is a network address that identifies the owner of a network connection.
  • Page 258 Chapter 21 System The following table describes the labels in this screen. Table 82 Maintenance > System LABEL DESCRIPTION Host Name Choose a descriptive name for identification purposes. It is recommended you enter your computer’s “Computer name” in this field. This name can be up to 30 alphanumeric characters long.
  • Page 259: Time Setting

    H A P T E R Time Setting 22.1 Overview You can configure the system’s time and date in the Time Setting screen. 22.2 The Time Setting Screen To change your Device’s time and date, click Maintenance > Time. The screen appears as shown. Use this screen to configure the Device’s time based on your local time zone.
  • Page 260 Chapter 22 Time Setting Table 83 Maintenance > System > Time Setting (continued) LABEL DESCRIPTION Daylight Savings Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening.Select this option if you use Daylight Saving Time.
  • Page 261: Log Setting

    H A P T E R Log Setting 23.1 Overview You can configure where the Device sends logs and which logs and/or immediate alerts the Device records in the Log Setting screen. 23.2 The Log Setting Screen To change your Device’s log settings, click Maintenance > Log Setting. The screen appears as shown.
  • Page 262 Chapter 23 Log Setting The following table describes the fields in this screen. Table 84 Maintenance > Log Setting LABEL DESCRIPTION Syslog Setting Syslog Logging The Device sends a log to an external syslog server. Select the Enable check box to enable syslog logging.
  • Page 263: Firmware Upgrade

    H A P T E R Firmware Upgrade 24.1 Overview This chapter explains how to upload new firmware to your Device. You can download new firmware releases from your nearest ZyXEL FTP site (or www.zyxel.com) to use to upgrade your device’s performance.
  • Page 264 Chapter 24 Firmware Upgrade After you see the firmware updating screen, wait a few minutes before logging into the Device again. Figure 127 Firmware Uploading The Device automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 128 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the Status screen.
  • Page 265: Backup/Restore

    H A P T E R Backup/Restore 25.1 Overview The Backup/Restore screen allows you to backup and restore device configurations. You can also reset your device settings back to the factory default. 25.2 The Backup/Restore Screen Click Maintenance > Backup/Restore. Information related to factory defaults, backup configuration, and restoring configuration appears in this screen, as shown next.
  • Page 266 Chapter 25 Backup/Restore Restore Configuration Restore Configuration allows you to upload a new or previously saved configuration file from your computer to your Device. Table 86 Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find it.
  • Page 267: The Reboot Screen

    Chapter 25 Backup/Restore Reset to Factory Defaults Click the Reset button to clear all user-entered configuration information and return the Device to its factory defaults. The following warning screen appears. Figure 132 Reset Warning Message Figure 133 Reset In Process Message You can also press the RESET button on the back panel to reset the factory defaults of your Device.
  • Page 268 Chapter 25 Backup/Restore P-2812HNU(L)-Fx Series User’s Guide...
  • Page 269: Diagnostic

    H A P T E R Diagnostic 26.1 Overview You can use different diagnostic methods to test a connection and see the detailed information. These read-only screens display information to help you identify problems with the Device. 26.2 The Ping/TraceRoute Screen Ping and traceroute help check availability of remote hosts and also help troubleshoot network or Internet connections.
  • Page 270: The Dsl Line Screen

    Chapter 26 Diagnostic 26.3 The DSL Line Screen Click Maintenance > Diagnostic > DSL Line to open the screen shown next. Figure 135 Maintenance > Diagnostic > DSL Line The following table describes the fields in this screen. Table 88 Maintenance > Diagnostic > DSL Line ITEM DESCRIPTION ATM Status...
  • Page 271 Chapter 26 Diagnostic Table 88 Maintenance > Diagnostic > DSL Line (continued) ITEM DESCRIPTION DSL Line Click this button to view statistics about the DSL connections. Status 1. noise margin downstream is the signal to noise ratio for the downstream part of the connection (coming into the Device from the ISP).
  • Page 272 Chapter 26 Diagnostic P-2812HNU(L)-Fx Series User’s Guide...
  • Page 273: Troubleshooting

    H A P T E R Troubleshooting 27.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • Device Access and Login •...
  • Page 274: Device Access And Login

    Chapter 27 Troubleshooting Inspect your cables for damage. Contact the vendor to replace any damaged cables. Turn the Device off and on. If the problem continues, contact the vendor. 27.3 Device Access and Login I forgot the IP address for the Device. The default IP address is 192.168.1.1.
  • Page 275 Chapter 27 Troubleshooting Reset the device to its factory defaults, and try to access the Device with the default IP address. Section 1.7 on page If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions.
  • Page 276: Internet Access

    Chapter 27 Troubleshooting 27.4 Internet Access I cannot access the Internet. Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.6 on page Make sure you entered your ISP account information correctly. These fields are case-sensitive, so make sure [Caps Lock] is not on.
  • Page 277 Chapter 27 Troubleshooting If you set up a WAN connection using bridging service (all LAN ports and WLAN BSSs are bridged to one WAN connection), make sure you turn off the DHCP feature in the Home Networking screen to have the clients get WAN IP addresses directly from your ISP’s DHCP server. I cannot connect to the Internet using a second DSL connection.
  • Page 278: Wireless Internet Access

    Chapter 27 Troubleshooting 27.5 Wireless Internet Access What factors may cause intermittent or unstabled wireless connection? How can I solve this problem? The following factors may cause interference: • Obstacles: walls, ceilings, furniture, and so on. • Building Materials: metal doors, aluminum studs. •...
  • Page 279: Phone Calls And Voip

    Chapter 27 Troubleshooting 27.6 Phone Calls and VoIP The telephone port won’t work or the telephone lacks a dial tone. Check the telephone connections and telephone wire. I can access the Internet, but cannot make VoIP calls. The PHONE light should come on. Make sure that your telephone is connected to the PHONE port. You can also check the VoIP status in the System Info screen.
  • Page 280 Chapter 27 Troubleshooting Re-connect the Ethernet cable. The Local Area Connection icon for UPnP disappears in the screen. Restart your computer. I cannot open special applications such as white board, file transfer and video when I use the MSN messenger. Wait more than three minutes.
  • Page 281: Product Specifications

    H A P T E R Product Specifications The following tables summarize the Device’s hardware and firmware features. Hardware Specifications Table 89 Hardware Specifications Dimensions 224(W) x 168.5(D) x 77.5(H) mm Power Specification 12V at 2.0A DC Built-in Switch Four auto-negotiating, MDI/MDI-X Gigabit Ethernet ports DSL Port P-2812HNU(L)-F1: One RJ11(6p2c) over POTS (Annex A), Yellow P-2812HNU(L)-F3: One RJ45(8p6c) over ISDN (Annex B)
  • Page 282 Chapter 28 Product Specifications Firmware Specifications Table 90 Firmware Specifications Default IP Address http://192.168.1.1 Default Subnet Mask 255.255.255.0 (24 bits) Default User Name admin Default Password 1234 DHCP Server IP Pool Starting Address: http://192.168.1.33 Size: 32 Static DHCP Addresses 128 Max Static Routes Device Management Use the web configurator to easily configure the rich range of features on...
  • Page 283 Chapter 28 Product Specifications Table 90 Firmware Specifications (continued) QoS (Quality of Service) You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and/or to particular computers. Remote Management This allows you to decide whether a service (HTTP or FTP traffic for example) from a computer on a network (LAN or WAN for example) can access the Device.
  • Page 284 Chapter 28 Product Specifications Table 90 Firmware Specifications (continued) Other Protocol Support • Transparent bridging for unsupported network layer protocols • IP Multicasting IGMP v1, v2, v3 • IGMP Proxy/Snooping Management • Embedded Web Configurator • CLI (Command Line Interpreter) •...
  • Page 285 Chapter 28 Product Specifications Table 91 Voice Features (continued) Call forwarding With this feature, you can set the Device to forward calls to a specified number, either unconditionally (always), when your number is busy, or when you do not answer. You can also forward incoming calls from one specified number to another.
  • Page 286 Chapter 28 Product Specifications The following list, which is not exhaustive, illustrates the standards supported in the Device. Table 93 Standards Supported STANDARD DESCRIPTION RFC 867 Daytime Protocol RFC 868 Time Protocol RFC 1112 IGMP v1 RFC 1305 Network Time Protocol (NTP version 3) RFC 1483 Multiprotocol Encapsulation over ATM Adaptation Layer 5 RFC 1631...
  • Page 287 Chapter 28 Product Specifications Wall-mounting Instructions Do the following to hang your Device on a wall. Note: See Table 89 on page 281 for the size of screws to use and how far apart to place them. Align the holes on the back of the supplied wall-mounting bracket with the screws. on the wall. Locate a high position on a wall that is free of obstructions.
  • Page 288 Chapter 28 Product Specifications Mount the Device on the wall-mounting bracket, which is already installed on the wall. Make sure that the Device is firmly attached to the bracket so it does not fall off. Figure 137 Wall-mounting -2 The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm).
  • Page 289: Appendix A Ip Addresses And Subnetting

    P P E N D I X IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (such as computers, servers, routers, and printers) needs an IP address to communicate across the network. These networking devices are also known as hosts.
  • Page 290 Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 139 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
  • Page 291 Appendix A IP Addresses and Subnetting Subnet masks can be referred to by the size of the network number part (the bits with a “1” value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes.
  • Page 292 Appendix A IP Addresses and Subnetting The following table shows some possible subnet masks using both notations. Table 97 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET LAST OCTET SUBNET MASK NOTATION (BINARY) (DECIMAL) 255.255.255.0 0000 0000 255.255.255.128 1000 0000 255.255.255.192 1100 0000 255.255.255.224 1110 0000...
  • Page 293 Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub- networks, A and B. Figure 141 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 2 –...
  • Page 294 Appendix A IP Addresses and Subnetting Table 98 Subnet 1 (continued) LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE Subnet Address: Lowest Host ID: 192.168.1.1 192.168.1.0 Broadcast Address: Highest Host ID: 192.168.1.62 192.168.1.63 Table 99 Subnet 2 LAST OCTET BIT IP/SUBNET MASK NETWORK NUMBER VALUE...
  • Page 295 Appendix A IP Addresses and Subnetting The following table shows IP address last octet values for each subnet. Table 102 Eight Subnets SUBNET LAST BROADCAST SUBNET FIRST ADDRESS ADDRESS ADDRESS ADDRESS Subnet Planning The following table is a summary for subnet planning on a network with a 24-bit network number. Table 103 24-bit Network Number Subnet Planning NO.
  • Page 296 Appendix A IP Addresses and Subnetting Table 104 16-bit Network Number Subnet Planning (continued) NO. “BORROWED” NO. HOSTS PER SUBNET MASK NO. SUBNETS HOST BITS SUBNET 255.255.255.248 (/29) 8192 255.255.255.252 (/30) 16384 255.255.255.254 (/31) 32768 Configuring IP Addresses Where you obtain your network number depends on your particular situation. If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask.
  • Page 297 Appendix A IP Addresses and Subnetting IP Address Conflicts Each device on a network must have a unique IP address. Devices with duplicate IP addresses on the same network will not be able to access the Internet or other resources. The devices may also be unreachable through the network.
  • Page 298 Appendix A IP Addresses and Subnetting Conflicting Computer and Router IP Addresses Example More than one device can not use the same IP address. In the following example, the computer and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access the Internet.
  • Page 299: Appendix B Setting Up Your Computer's Ip Address

    P P E N D I X Setting Up Your Computer’s IP Address Note: Your specific Device may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network.
  • Page 300 Appendix B Setting Up Your Computer’s IP Address Click Start > Control Panel. Figure 145 Windows XP: Start Menu In the Control Panel, click the Network Connections icon. Figure 146 Windows XP: Control Panel P-2812HNU(L)-Fx Series User’s Guide...
  • Page 301 Appendix B Setting Up Your Computer’s IP Address Right-click Local Area Connection and then select Properties. Figure 147 Windows XP: Control Panel > Network Connections > Properties On the General tab, select Internet Protocol (TCP/IP) and then click Properties. Figure 148 Windows XP: Local Area Connection Properties P-2812HNU(L)-Fx Series User’s Guide...
  • Page 302 Appendix B Setting Up Your Computer’s IP Address The Internet Protocol TCP/IP Properties window opens. Figure 149 Windows XP: Internet Protocol (TCP/IP) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically. Select Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields if you have a static IP address that was assigned to you by your network administrator or ISP.
  • Page 303 Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click Start > Control Panel. Figure 150 Windows Vista: Start Menu In the Control Panel, click the Network and Internet icon. Figure 151 Windows Vista: Control Panel Click the Network and Sharing Center icon.
  • Page 304 Appendix B Setting Up Your Computer’s IP Address Click Manage network connections. Figure 153 Windows Vista: Network and Sharing Center Right-click Local Area Connection and then select Properties. Figure 154 Windows Vista: Network and Sharing Center Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue.
  • Page 305 Appendix B Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 155 Windows Vista: Local Area Connection Properties P-2812HNU(L)-Fx Series User’s Guide...
  • Page 306 Appendix B Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 156 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
  • Page 307 Appendix B Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. Click Start > Control Panel. Figure 157 Windows 7: Start Menu In the Control Panel, click View network status and tasks under the Network and Internet category.
  • Page 308 Appendix B Setting Up Your Computer’s IP Address Double click Local Area Connection and then select Properties. Figure 160 Windows 7: Local Area Connection Status Note: During this procedure, click Continue whenever Windows displays a screen saying that it needs your permission to continue. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 309 Appendix B Setting Up Your Computer’s IP Address Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties. Figure 161 Windows 7: Local Area Connection Properties P-2812HNU(L)-Fx Series User’s Guide...
  • Page 310 Appendix B Setting Up Your Computer’s IP Address The Internet Protocol Version 4 (TCP/IPv4) Properties window opens. Figure 162 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties Select Obtain an IP address automatically if your network administrator or ISP assigns your IP address dynamically.
  • Page 311 Appendix B Setting Up Your Computer’s IP Address The IP settings are displayed as follows. Figure 163 Windows 7: Internet Protocol Version 4 (TCP/IPv4) Properties Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple >...
  • Page 312 Appendix B Setting Up Your Computer’s IP Address In the System Preferences window, click the Network icon. Figure 165 Mac OS X 10.4: System Preferences When the Network preferences pane opens, select Built-in Ethernet from the network connection type list, and then click Configure. Figure 166 Mac OS X 10.4: Network Preferences P-2812HNU(L)-Fx Series User’s Guide...
  • Page 313 Appendix B Setting Up Your Computer’s IP Address For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in the TCP/IP tab. Figure 167 Mac OS X 10.4: Network Preferences > TCP/IP Tab. For statically assigned settings, do the following: •...
  • Page 314 Appendix B Setting Up Your Computer’s IP Address • In the Router field, type the IP address of your device. Figure 168 Mac OS X 10.4: Network Preferences > Ethernet Click Apply Now and close the window. Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network Interface from the Info tab.
  • Page 315 Appendix B Setting Up Your Computer’s IP Address Click Apple > System Preferences. Figure 170 Mac OS X 10.5: Apple Menu In System Preferences, click the Network icon. Figure 171 Mac OS X 10.5: Systems Preferences P-2812HNU(L)-Fx Series User’s Guide...
  • Page 316 Appendix B Setting Up Your Computer’s IP Address When the Network preferences pane opens, select Ethernet from the list of available connection types. Figure 172 Mac OS X 10.5: Network Preferences > Ethernet From the Configure list, select Using DHCP for dynamically assigned settings. For statically assigned settings, do the following: •...
  • Page 317 Appendix B Setting Up Your Computer’s IP Address • In the Router field, enter the IP address of your Device. Figure 173 Mac OS X 10.5: Network Preferences > Ethernet Click Apply and close the window. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 318 Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and then selecting the appropriate Network interface from the Info tab. Figure 174 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution.
  • Page 319 Appendix B Setting Up Your Computer’s IP Address When the Network Settings window opens, click Unlock to open the Authenticate window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. Figure 176 Ubuntu 8: Network Settings >...
  • Page 320 Appendix B Setting Up Your Computer’s IP Address In the Network Settings window, select the connection that you want to configure, then click Properties. Figure 178 Ubuntu 8: Network Settings > Connections The Properties dialog box opens. Figure 179 Ubuntu 8: Network Settings > Properties •...
  • Page 321 Appendix B Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the DNS tab in the Network Settings window and then enter the DNS server information in the fields provided. Figure 180 Ubuntu 8: Network Settings > DNS Click the Close button to apply the changes.
  • Page 322 Appendix B Setting Up Your Computer’s IP Address Verifying Settings Check your TCP/IP properties by clicking System > Administration > Network Tools, and then selecting the appropriate Network device from the Devices tab. The Interface Statistics column shows data if your connection is working properly. Figure 181 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop...
  • Page 323 Appendix B Setting Up Your Computer’s IP Address Click K Menu > Computer > Administrator Settings (YaST). Figure 182 openSUSE 10.3: K Menu > Computer Menu When the Run as Root - KDE su dialog opens, enter the admin password and click OK. Figure 183 openSUSE 10.3: K Menu >...
  • Page 324 Appendix B Setting Up Your Computer’s IP Address When the YaST Control Center window opens, select Network Devices and then click the Network Card icon. Figure 184 openSUSE 10.3: YaST Control Center When the Network Settings window opens, click the Overview tab, select the appropriate connection Name from the list, and then click the Configure button.
  • Page 325 Appendix B Setting Up Your Computer’s IP Address When the Network Card Setup window opens, click the Address tab Figure 186 openSUSE 10.3: Network Card Setup Select Dynamic Address (DHCP) if you have a dynamic IP address. Select Statically assigned IP Address if you have a static IP address. Fill in the IP address, Subnet mask, and Hostname fields.
  • Page 326 Appendix B Setting Up Your Computer’s IP Address If you know your DNS server IP address(es), click the Hostname/DNS tab in Network Settings and then enter the DNS server information in the fields provided. Figure 187 openSUSE 10.3: Network Settings Click Finish to save your settings and close the window.
  • Page 327 Appendix B Setting Up Your Computer’s IP Address When the Connection Status - KNetwork Manager window opens, click the Statistics tab to see if your connection is working properly. Figure 189 openSUSE: Connection Status - KNetwork Manager P-2812HNU(L)-Fx Series User’s Guide...
  • Page 328 Appendix B Setting Up Your Computer’s IP Address P-2812HNU(L)-Fx Series User’s Guide...
  • Page 329: Appendix C Pop-Up Windows, Javascript And Java Permissions

    P P E N D I X Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here.
  • Page 330 Appendix C Pop-up Windows, JavaScript and Java Permissions Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 191 Internet Options: Privacy Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
  • Page 331 Appendix C Pop-up Windows, JavaScript and Java Permissions Select Settings…to open the Pop-up Blocker Settings screen. Figure 192 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”.
  • Page 332 Appendix C Pop-up Windows, JavaScript and Java Permissions Click Add to move the IP address to the list of Allowed sites. Figure 193 Pop-up Blocker Settings Click Close to return to the Privacy screen. Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
  • Page 333 Appendix C Pop-up Windows, JavaScript and Java Permissions In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 194 Internet Options: Security Click the Custom Level... button. Scroll down to Scripting. Under Active scripting make sure that Enable is selected (the default). Under Scripting of Java applets make sure that Enable is selected (the default).
  • Page 334 Appendix C Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 195 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, Internet Options and then the Security tab. Click the Custom Level... button. Scroll down to Microsoft VM.
  • Page 335 Appendix C Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 196 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, Internet Options and then the Advanced tab. Make sure that Use Java 2 for <applet> under Java (Sun) is selected. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 336 Appendix C Pop-up Windows, JavaScript and Java Permissions Click OK to close the window. Figure 197 Java (Sun) Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary. You can enable Java, JavaScript and pop-ups in one screen. Click Tools, then click Options in the screen that appears.
  • Page 337 Appendix C Pop-up Windows, JavaScript and Java Permissions Click Content.to show the screen below. Select the check boxes as shown in the following screen. Figure 199 Mozilla Firefox Content Security P-2812HNU(L)-Fx Series User’s Guide...
  • Page 338 Appendix C Pop-up Windows, JavaScript and Java Permissions P-2812HNU(L)-Fx Series User’s Guide...
  • Page 339: Appendix D Wireless Lans

    P P E N D I X Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an ad-hoc network or Independent Basic Service Set (IBSS).
  • Page 340 Appendix D Wireless LANs disabled, wireless client A and B can still access the wired network but cannot communicate with each other. Figure 201 Basic Service Set An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network.
  • Page 341 Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless clients within the same ESS must have the same ESSID in order to communicate. Figure 202 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by wireless devices to transmit and receive data. Channels available depend on your geographical area.
  • Page 342 Appendix D Wireless LANs cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. RTS/CTS Figure 203 When station A sends data to the AP, it might not know that the station B is already using the channel.
  • Page 343 Appendix D Wireless LANs If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Preamble Type Preamble is used to signal that data is coming to the receiver.
  • Page 344 Appendix D Wireless LANs The following figure shows the relative effectiveness of these wireless security methods available on your Device. Table 106 Wireless Security Levels SECURITY SECURITY TYPE LEVEL Least Unique SSID (Default) Secure Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication...
  • Page 345 Appendix D Wireless LANs RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless client and the network RADIUS server. Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: •...
  • Page 346 Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way authentication method. The authentication server sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password by encrypting the password with the challenge and sends back the information. Password is not sent in plain text.
  • Page 347 Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the wireless security configuration screen. You may still configure and store keys, but they will not be used while dynamic WEP is enabled. Note: EAP-MD5 cannot be used with Dynamic WEP Key Exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
  • Page 348 Appendix D Wireless LANs called Rijndael. They both include a per-packet key mixing function, a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with sequencing rules, and a re-keying mechanism. WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption key is never used twice.
  • Page 349 Appendix D Wireless LANs WPA(2) with RADIUS Application Example To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is 1812), and the RADIUS shared secret. A WPA(2) application example with an external RADIUS server looks as follows.
  • Page 350 Appendix D Wireless LANs The AP and wireless clients use the TKIP or AES encryption process, the PMK and information exchanged in a handshake to create temporal encryption keys. They use these keys to encrypt data exchanged between them. Figure 205 WPA(2)-PSK Authentication Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method or key management protocol type.
  • Page 351 Appendix D Wireless LANs Antenna Characteristics Frequency An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE 802.11a) is needed to communicate efficiently in a wireless LAN Radiation Pattern A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s coverage area.
  • Page 352 Appendix D Wireless LANs WiFi Protected Setup Your Device supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually.
  • Page 353 Appendix D Wireless LANs Decide which device you want to be the registrar (usually the AP) and which you want to be the enrollee (usually the client). Look for the enrollee’s WPS PIN; it may be displayed on the device. If you don’t see it, log into the enrollee’s configuration interface and locate the PIN.
  • Page 354 Appendix D Wireless LANs The following figure shows a WPS-enabled wireless client (installed in a notebook computer) connecting to the WPS-enabled AP via the PIN method. Figure 206 Example WPS Process: PIN Method ENROLLEE REGISTRAR This device’s WPS PIN: 123456 Enter WPS PIN from other device: START...
  • Page 355 Appendix D Wireless LANs The following figure shows a WPS-enabled client (installed in a notebook computer) connecting to a WPS-enabled access point. Figure 207 How WPS works ACTIVATE ACTIVATE WITHIN 2 MINUTES WPS HANDSHAKE ENROLLEE REGISTRAR SECURE TUNNEL SECURITY INFO COMMUNICATION The roles of registrar and enrollee last only as long as the WPS setup process is active (two minutes).
  • Page 356 Appendix D Wireless LANs is the registrar, and Client 1 is the enrollee. The registrar randomly generates the security information to set up the network, since it is unconfigured and has no existing information. Figure 208 WPS: Example Network Step 1 ENROLLEE REGISTRAR SECURITY INFO...
  • Page 357 Appendix D Wireless LANs In step 3, you add another access point (AP2) to your network. AP2 is out of range of AP1, so you cannot use AP1 for the WPS handshake with the new access point. However, you know that Client 2 supports the registrar function, so you use it to perform the WPS handshake instead.
  • Page 358 Appendix D Wireless LANs • When you use the PBC method, there is a short period (from the moment you press the button on one device to the moment you press the button on the other device) when any WPS-enabled device could join the network.
  • Page 359: Appendix E Common Services

    P P E N D I X Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. •...
  • Page 360 Appendix E Common Services Table 109 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION HTTP Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS HTTPS is a secured http session often used in e-commerce. ICMP User-Defined Internet Control Message Protocol is often...
  • Page 361 Appendix E Common Services Table 109 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP Simple Network Management Program.
  • Page 362 Appendix E Common Services P-2812HNU(L)-Fx Series User’s Guide...
  • Page 363: Appendix F Ipv6

    P P E N D I X IPv6 Overview IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 10 IP addresses.
  • Page 364 Appendix F IPv6 Link-local Address A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a “private IP address” in IPv4. You can have the same link-local address on multiple interfaces on a device. A link-local unicast address has a predefined prefix of fe80::/10.
  • Page 365 Appendix F IPv6 The following table describes the multicast addresses which are reserved and can not be assigned to a multicast group. Table 112 Reserved Multicast Address MULTICAST ADDRESS FF00:0:0:0:0:0:0:0 FF01:0:0:0:0:0:0:0 FF02:0:0:0:0:0:0:0 FF03:0:0:0:0:0:0:0 FF04:0:0:0:0:0:0:0 FF05:0:0:0:0:0:0:0 FF06:0:0:0:0:0:0:0 FF07:0:0:0:0:0:0:0 FF08:0:0:0:0:0:0:0 FF09:0:0:0:0:0:0:0 FF0A:0:0:0:0:0:0:0 FF0B:0:0:0:0:0:0:0 FF0C:0:0:0:0:0:0:0 FF0D:0:0:0:0:0:0:0...
  • Page 366 Appendix F IPv6 MAC address and complements the seventh bit of the first byte of the MAC address. See the following example. 00 : 13 : 49 : 12 : 34 : 56 EUI-64 : 13 : 49 : FF : FE : 12 : 34...
  • Page 367 Appendix F IPv6 IA assigned to an interface to obtain configuration from a DHCP server for that interface. Each IA consists of a unique IAID and associated IP information. The IA type is the type of address in the IA. Each IA holds one type of address. IA_NA means an identity association for non-temporary addresses and IA_TA is an identity association for temporary addresses.
  • Page 368 Appendix F IPv6 ICMPv6 Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is defined in RFC 4443. ICMPv6 has a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4. ICMPv6 is an integral part of IPv6. IPv6 nodes use ICMPv6 to report errors encountered in packet processing and perform other diagnostic functions, such as "ping".
  • Page 369 Appendix F IPv6 and can be reached directly without passing through a router. If the address is unlink, the address is considered as the next hop. Otherwise, the Device determines the next-hop from the default router list or routing table. Once the next hop IP address is known, the Device looks into the neighbor cache to get the link-layer address and sends the packet when the neighbor is reachable.
  • Page 370 Appendix F IPv6 also displays how to use the ipconfig command to see auto-generated IP addresses. C:\>ipv6 install Installing... Succeeded. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix IP Address... . : 10.1.1.46 Subnet Mask .
  • Page 371 Appendix F IPv6 Double click Dibbler - a DHCPv6 client. Click Start and then OK. Now your computer can obtain an IPv6 address from a DHCPv6 server. Example - Enabling IPv6 on Windows 7 Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7 computer.
  • Page 372 Appendix F IPv6 Select Control Panel > Network and Sharing Center > Local Area Connection. Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it. Click OK to save the change. Click Close to exit the Local Area Connection Status screen. Select Start >...
  • Page 373 Appendix F IPv6 Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address (2001:b021:2d::1000) obtained from a DHCP server. C:\>ipconfig Windows IP Configuration Ethernet adapter Local Area Connection: Connection-specific DNS Suffix IPv6 Address... : 2001:b021:2d::1000 Link-local IPv6 Address .
  • Page 374 Appendix F IPv6 P-2612HNU-Fx User’s Guide...
  • Page 375: Appendix G Open Software Announcements

    Open Software Announcements End-User License Agreement for “P-2812HNUL-Fx” WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
  • Page 376 Appendix G Open Software Announcements The Software and Documentation contain material that is protected by international copyright law, trade secret law, international treaty provisions, and the applicable national laws of each respective country. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.
  • Page 377 Appendix G Open Software Announcements THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7.Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE...
  • Page 378 No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation. This Product includes Bridge-utils, br2684ctl, Busybox, Dnsmasq, Ebtables, gettext, Igmpproxy,...
  • Page 379 Appendix G Open Software Announcements applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price.
  • Page 380 Appendix G Open Software Announcements 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
  • Page 381 Appendix G Open Software Announcements operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
  • Page 382 Appendix G Open Software Announcements "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
  • Page 383 Appendix G Open Software Announcements The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS ORIMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  • Page 384 Appendix G Open Software Announcements This Product includes wide-dhcpv6 under the following license $KAME: COPYRIGHT,v 1.2 2004/07/29 19:02:18 jinmei Exp $ Copyright (C) 1998-2004 WIDE Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1.
  • Page 385 Appendix G Open Software Announcements OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This Product includes Mini_httpd under the license by ACME Labs Freeware ACME Labs Freeware License All the free software available on the ACME Labs web site has a copyright notice like this one: Copyright ©...
  • Page 386 Appendix G Open Software Announcements This Product includes glib, libbase64, libiconv, libusb, and mhash under the LGPL License. GNU LESSER GENERAL PUBLIC LICENSE Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
  • Page 387 Appendix G Open Software Announcements that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder.
  • Page 388 Appendix G Open Software Announcements A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms.
  • Page 389 Appendix G Open Software Announcements appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy.
  • Page 390 Appendix G Open Software Announcements compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution.
  • Page 391 Appendix G Open Software Announcements to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
  • Page 392 Appendix G Open Software Announcements This Product includes Flex under the following License. Flex carries the copyright used for BSD software, slightly modified because it originated at the Lawrence Berkeley (not Livermore!) Laboratory, which operates under a contract with the Department of Energy: Copyright (c) 2001, 2002, 2003, 2004, 2005, 2006, 2007 The Flex Project.
  • Page 393 Appendix G Open Software Announcements Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  • Page 394 Appendix G Open Software Announcements OpenSSL License --------------- ============================================================= ======= * Copyright (c) 1998-2008 The OpenSSL Project. All rights reserved. * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1.
  • Page 395 Appendix G Open Software Announcements * 5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project. * 6. Redistributions of any form whatsoever must retain the following acknowledgment: "This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)"...
  • Page 396 Appendix G Open Software Announcements Original SSLeay License ----------------------- /* Copyright (C) 1995-1998 Eric Young (eay@cryptsoft.com) * All rights reserved. * This package is an SSL implementation written * by Eric Young (eay@cryptsoft.com). * The implementation was written so as to conform with Netscapes SSL. * This library is free for commercial and non-commercial use as long as * the following conditions are aheared to.
  • Page 397 Appendix G Open Software Announcements * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  • Page 398 Appendix G Open Software Announcements * The licence and distribution terms for any publically available version or * derivative of this code cannot be changed. i.e. this code cannot simply be * copied and put under another distribution licence * [including the GNU Public Licence.] This Product includes radvd under the following License The author(s) grant permission for redistribution and use in source and binary forms, with or without modification, of the software and documentation...
  • Page 399 Appendix G Open Software Announcements This product includes software developed by the authors which are mentioned at the start of the source files and other contributors. 5. Neither the name(s) of the author(s) nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.
  • Page 400 Appendix G Open Software Announcements The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
  • Page 401 Appendix G Open Software Announcements "The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals or organizations. To "modify" a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy.
  • Page 402 Appendix G Open Software Announcements The Corresponding Source for a work in source code form is that same work. 2. Basic Permissions. All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met.
  • Page 403 Appendix G Open Software Announcements "b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to "keep intact all notices". "c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy.
  • Page 404 Appendix G Open Software Announcements A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work. A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling.
  • Page 405 Appendix G Open Software Announcements Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms: "a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License;...
  • Page 406 Appendix G Open Software Announcements permanently reinstated, you do not qualify to receive new licenses for the same material under section 10. 9. Acceptance Not Required for Having Copies. You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance.
  • Page 407 Appendix G Open Software Announcements through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients.
  • Page 408 Appendix G Open Software Announcements the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.
  • Page 409 Appendix G Open Software Announcements Copyright (C) <year> <name of author> This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
  • Page 410 Appendix G Open Software Announcements This Product includes popt under the following License Copyright (c) 1998 Red Hat Software Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is...
  • Page 411: Appendix H Legal Information

    ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved.
  • Page 412 Appendix H Legal Information • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules.
  • Page 413 Appendix H Legal Information Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This device is designed for the WLAN 2.4 GHz and/or 5 GHz networks throughout the EC region and Switzerland, with restrictions in France.
  • Page 414 Appendix H Legal Information Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com. P-2812HNU(L)-Fx Series User’s Guide...
  • Page 415: Index

    Index Index AAL5 backup configuration ACK message bandwidth management activation media server Basic Service Set, see BSS SSID blinking LEDs wireless LAN Broadband scheduling broadcast adding a printer example 141, 373 administrator password example ADSL2 BYE request Advanced Encryption Standard, see AES alternative subnet mask notation antenna 219, 381...
  • Page 416 Index certifications DLNA notices viewing 152, 183 DNS server address assignment channel Do not Disturb, see DnD interference domain name system, see DNS channel scan Domain Name System. See DNS. channel, wireless LAN DS (Differentiated Services) Class of Service DS field 198, 252 Class of Service, see CoS DSCP...
  • Page 417 Index filters IGMP proxy MAC address IGMP v1 firewalls IGMP v2 configuration importing trusted CAs security Independent Basic Service Set, see IBSS firmware initialization vector (IV) flash key install UPnP flashing Windows Me fragmentation threshold 138, 377 Windows XP frequency range Integrated Access Device, see IAD intended audience Internet access...
  • Page 418 Index listening port Local Area Network, see LAN 165, 203, 329 definitions login how it works passwords what it does logout Network Address Translation, see NAT automatic network map logs 257, 261, 277 non-proxy calls 89, 217 MAC address filter OK response MAC address filtering operation humidity...
  • Page 419 Index PPP over Ethernet, see PPPoE related documentation PPPoE 95, 113, 311 Benefits Request To Send, see RTS preamble reset preamble mode RESET button print server restart Printer Server restoring configuration printer sharing RFC 1483 113, 312 and LAN RFC 1631 configuration RFC 1889 249, 316...
  • Page 420 Index Application Layer Gateway call progression Tag Control Information See TCI client Tag Protocol Identifier See TPID identities INVITE request TCP/IP port number proxy server Telnet redirect server temperature register server Temporal Key Integrity Protocol, see TKIP servers service domain three-way conference thresholds user agent...
  • Page 421 Index version tutorial wireless client WPA supplicants Virtual Circuit (VC) wireless LAN authentication 138, 140 Virtual Local Area Network See VLAN Virtual Local Area Network, see VLAN example VLAN 116, 252 channel group encryption example ID tags fragmentation threshold Introduction limitations number of possible VIDs MAC address filter...
  • Page 422 Index user authentication vs WPA2-PSK wireless client supplicant with RADIUS application example WPA2-Pre-Shared Key, see WPA2-PSK WPA2-PSK 382, 383 application example WPA-PSK 141, 383 application example 143, 145 example limitations example push button P-2812HNU(L)-Fx Series User’s Guide...

Table of Contents