Sign In
Upload
Manuals
Brands
ZyXEL Communications Manuals
Wireless Access Point
G-1000 V2
ZyXEL Communications G-1000 V2 Manuals
Manuals and User Guides for ZyXEL Communications G-1000 V2. We have
3
ZyXEL Communications G-1000 V2 manuals available for free PDF download: User Manual, Quick Start Manual, Brochure & Specs
ZyXEL Communications G-1000 V2 User Manual (198 pages)
Wireless-11g Access Point
Brand:
ZyXEL Communications
| Category:
Wireless Access Point
| Size: 6.17 MB
Table of Contents
Copyright
3
Interference Statements and Certifications
4
Safety Warnings
6
Zyxel Limited Warranty
7
Customer Support
8
Table of Contents
11
List of Figures
17
List of Tables
21
Preface
25
Syntax Conventions
26
Chapter 1 Getting to Know Your Device
27
Introducing the Zyxel G-1000 V2
27
Features
27
Physical Features
27
Firmware Features
28
Table 1 IEEE 802.11B
28
Table 2 IEEE 802.11G
28
Limit the Number of Client Connections
29
Ssl Passthrough
29
Wireless Lan Mac Address Filtering
29
Applications for the G-1000 V2
30
Internet Access Application
31
Corporation Network Application
31
Front Panel of the G-1000
31
Figure 1 Internet Access Application
31
Figure 2 Corporation Network Application
31
Figure 3 G-1000 V2 Front Panel
32
Table 3 Front Panel Light Description
32
Chapter 2 Introducing the Web Configurator
33
Web Configurator Overview
33
Accessing the G-1000 V2 Web Configurator
33
Resetting the G-1000 V2
34
Procedure to Use the Reset Button
34
Figure 4 Change Password Screen
34
Navigating the Web Configurator
35
Navigation Panel
35
Figure 5 Web Configurator: Main Screen
35
Table 4 Web Configurator Screens Summary
35
Status Screen
36
Figure 6 Status Screen
37
Table 5 Status Screen
37
Status: Packet Statistics
38
Figure 7 Status: Packet Statistics
38
Status: WLAN Association List
39
Table 6 Status: Packet Statistics
39
Table 7 Association List
39
Chapter 3 Wizard Setup
41
Wizard Setup Overview
41
General Setup
41
Figure 8 Enter System and Domain Names
41
Wizard Setup Wireless LAN
42
Name (SSID), Channel ID and Security
42
Figure 9 Enter Name and Select Security
42
Table 8 Enter System and Domain Names
42
Configuring WEP or WPA(2) PSK Security
43
Table 9 Enter Name and Select Security
43
Figure 10 Wireless LAN Basic Security
44
Table 10 Wireless LAN Basic Security
44
Figure 11 Wireless LAN Extend Security
45
Table 11 Wireless LAN Extend Security
45
IP Address Assignment
46
Figure 12 IP Address Assignment
46
Table 12 IP Address Assignment
46
Apply Settings
47
Table 13 Apply Settings
47
Figure 13 Wizard Completed
48
Chapter 4 Wireless LAN
49
Wireless Network Overview
49
Figure 14 Example of a Wireless Network
49
Wireless Security Overview
50
Ssid
50
MAC Address Filter
50
User Authentication
50
Encryption
51
Table 14 Types of Encryption for each Type of Authentication
51
Additional Wireless Terms
52
Table 15 Additional Wireless Terms
52
Figure 15 Wireless LAN: General
53
Table 16 Wireless LAN: General
53
Figure 16 Wireless: no Security
54
No Security
54
Table 17 Wireless no Security
54
Figure 17 Wireless: Static WEP Encryption
55
WEP Encryption
55
WEP Encryption Screen
55
Table 18 Wireless: Static WEP Encryption
56
Wpa(2)-Psk
56
Figure 18 Wireless: WPA(2)-PSK
57
Table 19 Wireless: WPA(2)-PSK
57
Figure 19 Wireless: WPA(2)
58
WPA(2) Authentication Screen
58
Table 20 Wireless: WPA(2)
59
Figure 20 MAC Address Filter
60
Figure 21 Wireless LAN: Advanced
61
Table 21 MAC Address Filter
61
Wireless Lan Advanced Setup
61
Table 22 Wireless LAN: Advanced
62
Chapter 5 IP and DNS Screens
63
Configuring IP
63
Figure 22 Network: Internet Connection
63
Table 23 Network: Internet Connection
63
Configuring DNS
64
Figure 23 Network: Advanced
64
Table 24 Network: Advanced
64
Chapter 6 Remote Management Configuration
67
Remote Management Limitations
67
System Timeout
68
Figure 24 Remote Management: WWW
68
Table 25 Remote Management: WWW
68
Telnet
69
Figure 25 Telnet Configuration on a TCP/IP Network
69
Figure 26 Remote Management: Telnet
70
Table 26 Remote Management: Telnet
70
Configuring Ftp
70
Snmp
71
Figure 27 Remote Management: FTP
71
Table 27 Remote Management: FTP
71
Figure 28 SNMP Management Model
72
Supported Mibs
72
SNMP Traps
73
Table 28 SNMP Traps
73
Figure 29 Remote Management: SNMP
74
Table 29 Remote Management: SNMP
74
Chapter 7 System
75
General Setup
75
General Setup and System Name
75
Figure 30 System General Setup
76
Table 30 System General Setup
76
Figure 31 System Time Setting
77
Table 31 System Time Setting
77
Chapter 8 Logs
81
Alerts and Logs
81
Figure 32 View Log
81
Table 32 View Log
82
Configuring Log Settings
82
Figure 33 Log Settings
83
Table 33 Log Settings
83
SMTP Error Messages
84
Table 34 SMTP Error Messages
84
Chapter 9 Tools
87
Figure 34 Firmware Upgrade
87
Table 35 Firmware Upgrade
87
Figure 35 Firmware Upload in Progress
88
Figure 36 Network Temporarily Disconnected
88
Figure 37 Error Message
88
Backup Configuration
89
Figure 38 Configuration
89
Restore Configuration
89
Table 36 Maintenance Restore Configuration
89
Back to Factory Defaults
90
Figure 39 Configuration Restore Successful
90
Figure 40 Temporarily Disconnected
90
Figure 41 Configuration Restore Error
90
Figure 42 Restart Screen
91
Chapter 10 Introducing the SMT
93
Connect to Your G-1000 V2 Using Telnet
93
Changing the System Password
93
Figure 43 Login Screen
93
Figure 44 Menu 23.1 System Security: Change Password
93
G-1000 V2 SMT Menus Overview
94
Table 37 SMT Menus Overview
94
Navigating the SMT Interface
95
Table 38 Main Menu Commands
95
Figure 45 G-1000 V2 SMT Main Menu
96
Table 39 Main Menu Summary
96
Chapter 11 General Setup
97
Figure 46 Menu 1 General Setup
97
Table 40 Menu 1 General Setup
97
Chapter 12 LAN Setup
99
LAN Setup
99
TCP/IP Ethernet Setup
99
Figure 47 Menu 3 LAN Setup
99
Figure 48 Menu 3.2 TCP/IP Setup
99
Wireless LAN Setup
100
Figure 49 Menu 3.5 Wireless LAN Setup
100
Table 41 Menu 3.2 TCP/IP Setup
100
Table 42 Menu 3.5 Wireless LAN Setup
101
Configuring MAC Address Filter
102
Figure 50 Menu 3.5 Wireless LAN Setup
102
Configuring Roaming
103
Figure 51 Menu 3.5.1 WLAN MAC Address Filter
103
Table 43 Menu 3.5.1 WLAN MAC Address Filter
103
Figure 52 Menu 3.5 Wireless LAN Setup
104
Figure 53 WLAN Roaming Configuration
104
Table 44 Menu 3.5.4 Bridge Link Configuration
104
Chapter 13 SNMP Configuration
105
Figure 54 Menu 22 SNMP Configuration
105
Table 45 Menu 22 SNMP Configuration
105
Chapter 14 System Security
107
System Password
107
Configuring External RADIUS Server
107
Figure 55 Menu 23 System Security
107
Figure 56 Menu 23 System Security
107
Figure 57 Menu 23.2 System Security: RADIUS Server
108
Table 46 Menu 23.2 System Security: RADIUS Server
108
109
109
Figure 58 Menu 23 System Security
109
Figure 59 Menu 23.4 System Security: Ieee802.1X
109
Table 47 Menu 23.4 System Security: Ieee802.1X
110
Chapter 15 System Information and Diagnosis
113
System Status
113
Figure 60 Menu 24 System Maintenance
113
Figure 61 Menu 24.1 System Maintenance: Status
114
Table 48 Menu 24.1 System Maintenance: Status
114
System Information
115
Figure 62 Menu 24.2 System Information and Console Port Speed
115
Figure 63 Menu 24.2.1 System Information: Information
115
Table 49 Menu 24.2.1 System Maintenance: Information
115
Console Port Speed
116
Log and Trace
116
Figure 64 Menu 24.2.2 System Maintenance: Change Console Port Speed
116
Syslog Logging
117
Diagnostic
117
Figure 65 Menu 24.3 Log and Trace
117
Figure 66 Menu 24.3.2 System Maintenance - Syslog Logging
117
Table 50 Menu 24.3.2 System Maintenance - Syslog Logging
117
Figure 67 Menu 24.4 System Maintenance: Diagnostic
118
Table 51 Menu 24.4 System Maintenance Menu: Diagnostic
118
Chapter 16 Firmware and Configuration File Maintenance
119
Filename Conventions
119
Backup Configuration
120
Backup Configuration Using FTP
120
Table 52 Filename Conventions
120
Using the FTP Command from the DOS Prompt
121
Figure 68 Menu 24.5 Backup Configuration
121
Figure 69 FTP Session Example
121
Backup Configuration Using TFTP
122
Table 53 General Commands for Third Party FTP Clients
122
Example: TFTP Command
123
Backup Via Console Port
123
Figure 70 System Maintenance: Backup Configuration
123
Figure 71 System Maintenance: Starting Xmodem Download Screen
123
Table 54 General Commands for Third Party TFTP Clients
123
Figure 72 Backup Configuration Example
124
Figure 73 Successful Backup Confirmation Screen
124
Chapter 17 System Maintenance and Information
125
Command Interpreter Mode
125
Figure 74 Menu 24 System Maintenance
125
Figure 75 Valid CI Commands
125
Time and Date Setting
126
Figure 76 Menu 24.10 System Maintenance: Time and Date Setting
126
Table 55 System Maintenance: Time and Date Setting
126
Remote Management Setup
127
Telnet
127
Ftp
127
Web
127
Figure 77 Telnet Configuration on a TCP/IP Network
127
Remote Management Setup
128
Figure 78 Menu 24.11 Remote Management Control
128
Table 56 Remote Management Port Control
128
Remote Management Limitations
129
Remote Management and NAT
129
Table 57 Menu 24.11 Remote Management Control
129
System Timeout
130
Chapter 18 Troubleshooting
131
Table 58 Troubleshooting the Start-Up of Your G-1000 V2
131
Table 59 Troubleshooting the Ethernet Interface
131
Problems with the Password
132
Problems with the Wlan Interface
132
Table 60 Troubleshooting the Password
132
Table 61 Troubleshooting the WLAN Interface
132
Appendix A
133
Product Specifications
133
Table 62 Hardware
133
Table 63 Firmware
133
Specification Tables
133
Appendix B
135
Brute-Force Password Guessing Protection
135
Table 64 Brute-Force Password Guessing Protection Commands
135
A P P E N D I X
135
Appendix C
137
Setting up Your Computer's IP Address
137
Figure 79 Windows 95/98/Me: Network: Configuration
138
Installing Components
138
Figure 80 Windows 95/98/Me: TCP/IP Properties: IP Address
139
Figure 81 Windows 95/98/Me: TCP/IP Properties: DNS Configuration
140
Verifying Settings
140
Figure 82 Windows XP: Start Menu
141
Figure 83 Windows XP: Control Panel
141
Figure 84 Windows XP: Control Panel: Network Connections: Properties
142
Figure 85 Windows XP: Local Area Connection Properties
142
Figure 86 Windows XP: Advanced TCP/IP Settings
143
Figure 87 Windows XP: Internet Protocol (TCP/IP) Properties
144
Figure 88 Macintosh os 8/9: Apple Menu
145
Figure 89 Macintosh os 8/9: TCP/IP
145
Figure 90 Macintosh os X: Apple Menu
146
Macintosh os X
146
Figure 91 Macintosh os X: Network
147
Appendix D
149
IP Address Assignment Conflicts
149
Figure 92 IP Address Conflicts: Casea
149
Figure 93 IP Address Conflicts: Case B
149
Figure 94 IP Address Conflicts: Case C
150
Figure 95 IP Address Conflicts: Case D
151
Table 65 Classes of IP Addresses
153
Appendix Eip Subnetting
154
Table 66 Allowed IP Address Range by Class
154
Table 67 "Natural" Masks
154
Subnet Masks
154
Table 68 Alternative Subnet Mask Notation
155
Table 69 Two Subnets Example
155
Table 70 Subnet 1
156
Table 71 Subnet 2
156
Table 72 Subnet 1
157
Table 73 Subnet 2
157
Table 74 Subnet 3
157
Table 75 Subnet 4
158
Table 76 Eight Subnets
158
Table 77 Class C Subnet Planning
158
Example Eight Subnets
158
Table 78 Class B Subnet Planning
159
Subnetting with Class a and Class B Networks
159
Command Interpreter
161
Appendix G Log Descriptions
163
Table 79 System Error Logs
163
Table 80 System Maintenance Logs
163
Table 81 ICMP Notes
163
Table 82 Sys Log
164
Log Commands
164
Displaying Logs
165
Table 83 Log Categories and Available Settings
165
Log Command Example
166
Appendix H
167
Wireless LAN and IEEE 802.11
167
Benefits of a Wireless Lan
167
Figure 96 IBSS (Ad-Hoc) Wireless LAN
168
Figure 97 Basic Service Set
169
Figure 98 Extended Service Set
170
Figure 99 RTS/CTS
170
Wireless Lan Basics
170
Fragmentation Threshold
171
Appendix I
173
Wireless LAN Security
173
Table 84 IEEE 802.11G
173
Dynamic Wep Key Exchange
176
Table 85 Comparison of EAP Authentication Types
176
Wep Authentication
176
Figure 100 WEP Authentication Steps
177
Wireless Client Wpa Supplicants
179
Wpa with Radius Application Example
179
Types of Radius Messages
174
Types of Authentication
175
Figure 101 WPA with RADIUS Application Example
180
Radius Server Authentication Sequence
181
Security Parameters Summary
181
Table 86 Wireless Security Relational Matrix
181
Figure 102 Sequences for EAP MD5-Challenge Authentication
182
Figure 103 Sequences for PEAP, MS-CHAP V2 Authentication
183
Appendix J
185
Types of EAP Authentication
185
Table 87 Comparison of EAP Authentication Types
186
Appendix K
187
Antenna Selection and Positioning Recommendation
187
Antenna Characteristics
187
Radiation Pattern
187
Antenna Gain
187
Types of Antennas for Wlan
188
Positioning Antennas
188
Connector Type
188
Advertisement
ZyXEL Communications G-1000 V2 Quick Start Manual (12 pages)
Wireless-11g Access Point
Brand:
ZyXEL Communications
| Category:
Wireless Access Point
| Size: 1.82 MB
Table of Contents
Quick Start Guide
1
Hardware Installation
2
Hardware Connections
2
Accessing the Web Configurator
3
Web Configurator: Login
4
Wizard Setup
5
Hardware Mounting
9
Troubleshooting
11
ZyXEL Communications G-1000 V2 Brochure & Specs (2 pages)
802.11g Wireless Access Point
Brand:
ZyXEL Communications
| Category:
Wireless Access Point
| Size: 0.15 MB
Table of Contents
Specifications
2
Physical Specifications
2
Environmental Specifications
2
System Requirements
2
Application Diagram
2
Advertisement
Advertisement
Related Products
ZyXEL Communications ZYAIR G-1000
ZyXEL Communications ZyAIR G-3000
ZyXEL Communications ZyAIR G-5100
ZyXEL Communications G-570S
ZyXEL Communications ZyAIR G-3000H
ZyXEL Communications ZyXEL ZyAIR G-500
ZyXEL Communications G-3000 Series
ZyXEL Communications G570S V2
ZyXEL Communications ZyAir G-100
ZyXEL Communications G-102
ZyXEL Communications Categories
Gateway
Network Router
Switch
Wireless Router
Adapter
More ZyXEL Communications Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL