ZyXEL Communications G470 802.11g Wireless Ethernet Adapter User Manual ZyXEL G 220F User s Guide V1 00 Oct 2004
ZyXEL Communications Corporation 802.11g Wireless Ethernet Adapter ZyXEL G 220F User s Guide V1 00 Oct 2004
Contents
- 1. Manual Pt1
- 2. Manual Pt2
Manual Pt2
G-470 User’s Guide CHAPTER 6 Wireless Screens This chapter discusses how to configure wireless settings and wireless security on your ZyXEL Device. 6.1 Wireless LAN Overview This section introduces the wireless LAN (WLAN) and some basic scenarios. 6.1.1 BSS (Infrastructure) A Basic Service Set (BSS), also called an Infrastructure network, exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point (AP). Intra-BSS traffic is traffic between wireless stations in the BSS. When Intra-BSS is enabled, wireless station A and B can access the wired network and communicate with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. Figure 26 Basic Service set Chapter 6 Wireless Screens 55 G-470 User’s Guide 6.1.2 ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate. Figure 27 Extended Service Set 6.2 Wireless LAN Basics This section describes the wireless LAN network terms. 6.2.1 Channel A channel is the radio frequency or frequencies used by IEEE 802.11b wireless devices. Channels available depend on your geographical area. You may have a choice of channels (for your region) so you should use a different channel from an adjacent AP (access point) to reduce interference. Interference occurs when radio signals from different access points overlap, causing signal disruption and degrading performance. Adjacent channels partially overlap, however. To avoid interference due to overlap, your AP should be on a channel at least five channels away from a channel that an adjacent AP is using. For example, if your region has 11 channels and an adjacent AP is using channel 1, then you need to select a channel between 6 or 11. 56 Chapter 6 Wireless Screens G-470 User’s Guide 6.2.2 SSID The SSID (Service Set Identity) is a unique name shared among all wireless devices in a wireless network. Wireless devices must have the same SSID to communicate with each other. 6.2.3 RTS/CTS A hidden node occurs when two stations are within range of the same access point, but are not within range of each other. The following figure illustrates a hidden node. Both stations are within range of the access point (AP) or wireless gateway, but out of range of each other, so they cannot “hear” each other; that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 28 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of messages for both stations. RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send) handshake is invoked. When a data frame exceeds the RTS/CTS value you set (between 0 to 2432 bytes), the station that wants to transmit this frame must first send an RTS (Request To Send) message to the AP for permission to send it. The AP then responds with a CTS (Clear to Send) message to all other stations within its range to notify them to defer their transmission. It also reserves and confirms with the requesting station the time frame for the requested transmission. Stations can send frames smaller than the specified RTS/CTS directly to the AP without the RTS (Request To Send)/CTS (Clear to Send) handshake. You should only configure RTS/CTS if the possibility of hidden nodes exists on your network and the “cost” of resending large frames is more than the extra network overhead involved in the RTS (Request To Send)/CTS (Clear to Send) handshake. Chapter 6 Wireless Screens 57 G-470 User’s Guide If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. Note: Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy. 6.2.4 Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the ZyXEL Device will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference. If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will be fragmented before they reach RTS/CTS size. 6.3 Configuring Wireless Click Wireless to display the Wireless Settings screen. Figure 29 Wireless: Wireless Settings 58 Chapter 6 Wireless Screens G-470 User’s Guide The following table describes the labels in this screen. Table 7 Wireless: Wireless Settings LABEL DESCRIPTION SSID Your ZyXEL Device must have the same SSID as the AP you want to connect to. Enter a descriptive name (up to 32 printable characters) for the wireless LAN. Spaces are allowed. Note: If you are configuring the device from a computer connected to the wireless LAN and you change the device's SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the device's new settings. AP Survey Click this button to open the AP Survey window and select an access point. Wireless Mode Select Mixed Mode to set the ZyXEL Device to operate in a wireless network with both 802.11b and 802.11g wireless devices. Select Pure B Mode to set the ZyXEL Device to operate in a wireless network with only 802.11b wireless devices. If you select this, the ZyXEL Device may not communicate with IEEE802.11g wireless devices Select Pure G Mode to set the ZyXEL Device to operate in a wireless network with only 802.11g wireless devices. If you select this, the ZyXEL Device may not communicate with IEEE802.11b wireless devices Clone MAC Address Every Ethernet-capable device is issued with a unique Media Access Control (MAC) address at the factory. This address is used to identify the device across a network. Your ZyXEL Device is capable of “cloning”, or emulating, the MAC addresses of one or more other devices. Select Auto-Single to have the ZyXEL Device automatically use the MAC address of a single Ethernet device connected to the ETHERNET port. Select Auto-Multi to have the ZyXEL Device automatically use the MAC addresses of multiple Ethernet devices connected to the ETHERNET port via a hub. Alternatively, enter a MAC address into the Clone MAC address field and select Manual to have the ZyXEL Device use that address. Advanced Settings Radio Enable Select Yes to allow wireless communications between the device and other IEEE 802.11b and IEEE 802.11g compliant wireless devices. Select No to stop wireless communications between the device and other IEEE 802.11b and IEEE 802.11g compliant wireless devices. Output Power Management Set the output power of the device in this field. If there is a high density of APs within an area, decrease the output power of the device to reduce interference with other wireless LAN devices. Data Rate Management Use this field to select a maximum data rate for the wireless connection. Chapter 6 Wireless Screens 59 G-470 User’s Guide Table 7 Wireless: Wireless Settings (continued) LABEL DESCRIPTION Preamble Type Preamble is used to signal that data is coming to the receiver. Select the preamble type that the AP uses. Short and Long refer to the length of the synchronization field in a packet. Short Preamble increases performance as less time sending preamble means more time for sending data. All IEEE 802.11b/g compliant wireless adapters support Long Preamble, but not all support short preamble. Select Auto to have the ZyXEL Device automatically use short preamble when all access point or wireless stations support it; otherwise the ZyXEL Device uses long preamble. Note: The ZyXEL Device and the access point MUST use the same preamble mode in order to communicate. RTS/CTS Threshold Enter a value between 0 and 2345. The default is 2345. Fragmentation Threshold Enter a value between 256 and 2340. The default is 2340. It is the maximum data fragment size that can be sent. Apply Click Apply to save your changes back to the device. Reset Click Reset to begin configuring this screen afresh. 6.3.1 The AP Survey Window Click on Wireless > Wireless Settings > AP Survey to display the AP Survey screen. The ZyXEL Device searches for available access points (APs). Figure 30 Wireless: the AP Survey Screen The following table describes the labels in this screen. Table 8 Wireless: the AP Survey Screen LABEL DESCRIPTION Access Point List No. 60 This field displays the number of the access point. The access points are ranked by signal strength. Chapter 6 Wireless Screens G-470 User’s Guide Table 8 Wireless: the AP Survey Screen LABEL DESCRIPTION SSID This field displays the SSID (Service Set IDentifier) of each access point. Click on an SSID to select that wireless device. Channel This field displays the channel number used by each access point. Signal Strength This field displays the signal strength of each access point. Security Mode This field displays details of the access point’s security and data encryption settings. Rescan Click Rescan to have the ZyXEL Device search again for available access points. 6.4 Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless stations, access points and the wired network. The figure below shows the possible wireless security levels on your ZyXEL Device. EAP (Extensible Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. It requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server either on the WAN or your LAN to provide authentication service for wireless stations. Table 9 Wireless Security Levels SECURITY LEVEL SECURITY TYPE Least Secure Unique SSID (Default) Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802.1x EAP with RADIUS Server Authentication Wi-Fi Protected Access (WPA) Most Secure WPA2 If you do not enable any wireless security on your ZyXEL Device, your network is accessible to any wireless networking device that is within range. 6.5 Configuring Wireless Security In order to configure and enable wireless security; click Wireless > Security to display the Security screen. This screen varies according to the encryption method you select. Chapter 6 Wireless Screens 61 G-470 User’s Guide 6.5.1 Wireless Security: Disable If you do not enable any wireless security on your device, your network is accessible to any wireless networking device that is within range. Figure 31 Wireless Security: Disable The following table describes the labels in this screen. Table 10 Wireless Security: Disable LABEL DESCRIPTION Encryption Method Select Disable to have no wireless LAN security configured. Apply Click Apply to save your changes back to the device. Reset Click Reset to begin configuring this screen afresh. 6.5.2 Wireless Security: WEP WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the wireless stations must use the same WEP key to encrypt and decrypt data. You can configure up to four 64-bit or 128-bit WEP keys, but only one key can be used at any one time. 62 Chapter 6 Wireless Screens G-470 User’s Guide Figure 32 Wireless Security: WEP The following table describes the labels in this screen. Table 11 Wireless Security: WEP LABEL DESCRIPTION Encryption Method Select WEP if you want to configure WEP encryption parameters. Authentication Type Select Open or Shared from the drop-down list box. Data Encryption Select 64 bit WEP or 128 bit WEP to enable data encryption. Passphrase With 64-bit or 128-bit WEP, you can enter a “passphrase” (password phrase) of up to 32 case-sensitive printable characters and click Generate to have the device create four different WEP keys. Generate After you enter the passphrase, click Generate to have the device generate four different WEP keys automatically. Key 1 to Key 4 If you want to manually set the WEP keys, enter the WEP key in the field provided. Select a WEP key to use for data encryption. The WEP keys are used to encrypt data. Both the device and the wireless stations must use the same WEP key for data transmission. If you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). Apply Click Apply to save your changes back to the device. Reset Click Reset to begin configuring this screen afresh. Chapter 6 Wireless Screens 63 G-470 User’s Guide 6.5.3 Wireless Security: WPA(2)-PSK Select WPA-PSK, WPA2-PSK or WPA-PSK & WPA2-PSK in the Encryption Method drop down list-box to display the next screen. Figure 33 Wireless Security: WPA(2)-PSK The following table describes the labels in this screen. Table 12 Wireless Security: WPA-PSK LABEL DESCRIPTION Encryption Method Select WPA-PSK, WPA2-PSK or WPA-PSK & WPA2-PSK if you want to configure a pre-shared key. Choose this option only if your AP supports it. Data Encryption Select TKIP, AES or TKIP + AES to enable data encryption. For more information, see the Wireless Security appendix. Pre-Shared Key The encryption mechanisms used for WPA and WPA-PSK are the same. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials. Type a pre-shared key from 8 to 63 ASCII characters (including spaces and symbols). This field is case-sensitive. Apply Click Apply to save your changes to the device. Reset Click Reset to begin configuring this screen afresh. 6.5.4 Wireless Security: WPA(2) WPA (Wi-Fi Protected Access) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are user authentication and improved data encryption. 64 Chapter 6 Wireless Screens G-470 User’s Guide Figure 34 Wireless Security: WPA(2) The following table describes the labels in this screen. Table 13 Wireless Security: WPA(2) LABEL DESCRIPTION Encryption Method Select WPA, WPA2 or WPA & WPA2 to configure user authentication and improved data encryption. EAP Type Select EAP-TLS, EAP-TTLS, EAP-LEAP or EAP-PEAP from the dropdown box. See the Wireless Security appendix for more information. Data Encryption Select TKIP, AES or TKIP + AES to enable data encryption. For more information, see the Wireless Security appendix. Trusted Root CA File (EAP-TLS, EAP-TTLS and EAP-PEAP only) This is the name of the certificate issued by the certificate authority (CA). Select File Click here to choose a certificate. Select a certificate from the list box and click Select to activate it. Click Delete if you want to remove a certificate from the list. Alternatively, click Browse to locate a certificate. Click Upload to add it to the list. The certificate file must have a .pem or .cer ending. Note: You must first have a wired connection to a network and obtain the certificate(s) from a certificate authority (CA). Login Name Enter a user name. This is the user name that you or an administrator set up on a RADIUS server. Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) Enter the password associated with the login name above. User Certificate File This is your encrypted private key file. Chapter 6 Wireless Screens 65 G-470 User’s Guide Table 13 Wireless Security: WPA(2) (continued) LABEL DESCRIPTION Select File Click here to choose a private key. Select a private key from the list box and click Select to activate it. Click Delete if you want to remove a private key from the list. Alternatively, click Browse to locate a private key. Click Upload to add it to the list. The private key file must have a .pfx ending. Private Key Password (EAP-TLS only) Enter the password associated with the private key above. Validate Server Certificate (EAP-TLS, EAP-TTLS and EAP-PEAP only) Select the check box to verify the certificate of the authentication server. Apply Click Apply to save your changes to the device. Reset Click Reset to begin configuring this screen afresh. 6.5.5 Wireless Security: IEEE 802.1x The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Note: Once you enable user authentication, you need to specify an external RADIUS server on the device for authentication. 66 Chapter 6 Wireless Screens G-470 User’s Guide Figure 35 Wireless Security: 802.1x The following table describes the labels in this screen. Table 14 Wireless Security: 802.1x LABEL DESCRIPTION Encryption Method Select 802.1X to configure encryption key management. EAP Type Select EAP-TLS, EAP-TTLS, EAP-LEAP or EAP-PEAP from the dropdown box. See the Wireless Security appendix for more information. Data Encryption (EAP-MD5 only) Select 64 bit WEP or 128 bit WEP to enable data encryption. Trusted Root CA File (EAP-TLS, EAP-TTLS and EAP-PEAP only) This is the name of the certificate issued by the certificate authority (CA). Select File (EAP-TLS, EAP-TTLS and EAP-PEAP only) Click here to choose a certificate. Select a certificate from the list box and click Select to activate it. Click Delete if you want to remove a certificate from the list. Alternatively, click Browse to locate a certificate. Click Upload to add it to the list. The certificate file must have a .pem or .cer ending. Note: You must first have a wired connection to a network and obtain the certificate(s) from a certificate authority (CA). Chapter 6 Wireless Screens 67 G-470 User’s Guide Table 14 Wireless Security: 802.1x 68 LABEL DESCRIPTION Login Name Enter a user name. This is the user name that you or an administrator set up on a RADIUS server. Password (EAP-TTLS, EAL-LEAP and EAP-PEAP only) Enter the password associated with the login name above. User Certificate File (EAP-TLS only) This is your encrypted private key file. Select File (EAP-TLS only) Click here to choose a private key. Select a private key from the list box and click Select to activate it. Click Delete if you want to remove a private key from the list. Alternatively, click Browse to locate a private key. Click Upload to add it to the list. The private key file must have a .pfx ending. Private Key Password (EAP-TLS only) Enter the password associated with the private key above. Validate Server Certificate (EAP-TLS, EAP-TTLS and EAP-PEAP only) Select the check box to verify the certificate of the authentication server. Passphrase (EAP-MD5 only) With 64-bit or 128-bit WEP, you can enter a “passphrase” (password phrase) of up to 32 case-sensitive printable characters and click Generate to have the device create four different WEP keys. Generate (EAP-MD5 only) After you enter the passphrase, click Generate to have the device generate four different WEP keys automatically. Key 1 to Key 4 (EAP-MD5 only) If you want to manually set the WEP keys, enter the WEP key in the field provided. Select a WEP key to use for data encryption. The WEP keys are used to encrypt data. Both the device and the wireless stations must use the same WEP key for data transmission. If you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal characters ("0-9", "A-F"). If you chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal characters ("0-9", "A-F"). Apply Click Apply to save your changes to the device. Reset Click Reset to begin configuring this screen afresh. Chapter 6 Wireless Screens G-470 User’s Guide CHAPTER 7 Management Screens This chapter describes the Management screens. 7.1 Management Overview Use these management screens to change the password, back up or restore the configuration files and upgrade your ZyXEL Device’s firmware. 7.2 Password To change your device's password (recommended), click Management. The screen appears as shown. This screen allows you to change the device's password. If you forget your password (or the device IP address), you will need to reset the device. See Section 4.3 on page 41 for details. Figure 36 Management: Password The following table describes the labels in this screen. Table 15 Management: Password LABEL DESCRIPTION Password Setup (admin) Use this section to change the password details for the admin username. Current Password Type in your existing system password (1234 is the default password). Chapter 7 Management Screens 69 G-470 User’s Guide Table 15 Management: Password (continued) LABEL DESCRIPTION New Password Type your new system password (up to 19 printable characters). Spaces are not allowed. As you type a password, the screen displays an asterisk (*) for each character you type. Retype to Confirm Retype your new system password for confirmation. Apply Save your changes back to the device. Reset Reload the previous configuration for this screen. 7.3 Configuration File The configuration file (often called the romfile or rom-0) contains the factory default settings such as password and TCP/IP Setup, etc. It arrives from ZyXEL with a .rom filename extension. Once you have customized the device's settings, they can be saved back to your computer under a filename of your choosing. Click Management > Configuration File. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 37 Management: Configuration File 70 Chapter 7 Management Screens G-470 User’s Guide 7.3.1 Backup Configuration Backup configuration allows you to back up (save) the device's current configuration to a file on your computer. Once your device is configured and functioning properly, it is strongly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings. Click Backup to save the device's current configuration to your computer. 7.3.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your device. Table 16 Management: Configuration File: Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Upload to begin the upload process. Warning: Do not turn off the device while configuration file upload is in progress. The following screen displays in the Status bar at the bottom of the configurator screen. Figure 38 Management: Configuration Upload Successful If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default device IP address (192.168.1.12 to 1.192.168.1.254). 7.3.3 Back to Factory Defaults Clicking the RESET button in this section clears all user-entered configuration information and returns the device to its factory defaults. The following warning screen will appear. Figure 39 Management: Reset Warning Message Chapter 7 Management Screens 71 G-470 User’s Guide You can also press the RESET button on the rear panel to reset the factory defaults of your device. Refer to Section 4.6.1 on page 49 for more information on the RESET button. 7.4 F/W Upload Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a .rmt extension, for example, "zyxel.rmt". The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. Click Management > F/W Upload to display the screen as shown. Follow the instructions in this screen to upload firmware to your device. Figure 40 Management: F/W Upload The following table describes the labels in this screen. Table 17 Management: F/W Upload LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse ... to find it. Browse... Click Browse... to find the .rmt file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Upload to begin the upload process. This process may take up to two minutes. Warning: Do not turn off the device while firmware upload is in progress! The following screen appears. Click OK to countinue. Wait until the countdown reaches zero before logging into the device again. 72 Chapter 7 Management Screens G-470 User’s Guide Figure 41 Management: Firmware Upgrading Screen The device automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 42 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the System Status screen. If the upload was not successful, the following status message displays at the bottom of the screen. Figure 43 Management: Firmware Upload Error Chapter 7 Management Screens 73 G-470 User’s Guide 74 Chapter 7 Management Screens G-470 User’s Guide CHAPTER 8 Troubleshooting This chapter covers potential problems and possible remedies. After each problem description, some instructions are provided to help you to diagnose and to solve the problem. 8.1 Problems Starting Up the ZyXEL Device Table 18 Troubleshooting the Start-Up of Your ZyXEL Device PROBLEM CORRECTIVE ACTION None of the LEDs turn on when I plug in the power adaptor. Make sure you are using the supplied power adaptor and that it is plugged in to an appropriate power source. Check that the power source is turned on. If the problem persists, you may have a hardware problem. In this case, you should contact your local vendor. The device reboots automatically sometimes. The supplied power to the ZyXEL Device is too low. Check that the ZyXEL Device is receiving enough power. Make sure the power source is working properly. 8.2 Problems with the Password Table 19 Troubleshooting the Password PROBLEM CORRECTIVE ACTION I cannot access the ZyXEL Device. The Password field is case-sensitive. Make sure that you enter the correct password using the proper casing. Use the RESET button on the rear panel of the ZyXEL Device to restore the factory default configuration file (hold this button in for about 10 seconds or release the button when the PWR LED starts blinking). This will restore all of the factory defaults including the password. Chapter 8 Troubleshooting 75 G-470 User’s Guide 8.3 Problem with the Wireless Link Quality Table 20 Troubleshooting Link Quality PROBLEM CORRECTIVE ACTION The link quality and/or signal strength is poor all the time. Search and connect to another AP with a better link quality using the Site Survey screen. Move your computer closer to the AP or the peer computer(s) within the transmission range. There may be too much radio interference (for example microwave or another AP using the same channel) around your wireless network. Lower the output power of each AP. Make sure there are not too many wireless stations connected to a wireless network. 8.4 Problems Communicating With Other Computers Table 21 Troubleshooting the Ethernet Interface 76 PROBLEM CORRECTIVE ACTION The computer with the ZyXEL Device installed cannot communicate with the other computer(s). In Infrastructure Mode • Make sure that the AP and the associated computers are turned on and working properly. • Make sure the ZyXEL Device and the associated AP use the same SSID. • Change the AP and the associated wireless clients to use another radio channel if interference is high. • Make sure that the computer and the AP share the same security option and key. Verify the settings in the Profile Security Settings screen. • If you are using WPA(2) or WPA(2)-PSK security, try changing your encryption type from TKIP to AES or vice versa. Chapter 8 Troubleshooting G-470 User’s Guide 8.5 Problems with the Ethernet Interface Table 22 Troubleshooting the Ethernet Interface PROBLEM CORRECTIVE ACTION I cannot access the ZyXEL Device from the LAN. If the ETHN LED on the front panel is off, check the Ethernet cable connection between your ZyXEL Device and the Ethernet device connected to the ETHERNET port. Check for faulty Ethernet cables. Make sure your computer’s Ethernet adapter is installed and working properly. Check the IP address of the Ethernet device. Verify that the IP address and the subnet mask of the ZyXEL Device, the Ethernet device and your computer are on the same subnet. I cannot ping any computer on the LAN. If the ETHN LED on the front panel is off, check the Ethernet cable connections between your ZyXEL Device and the Ethernet device. Check the Ethernet cable connections between the Ethernet device and the LAN computers. Check for faulty Ethernet cables. Make sure the LAN computer’s Ethernet adapter is installed and working properly. Verify that the IP address and the subnet mask of the ZyXEL Device, the Ethernet device and the LAN computers are on the same subnet. I cannot access the web configurator. Your computer’s and the ZyXEL Device’s IP addresses must be on the same subnet for LAN access. If you changed the ZyXEL Device’s IP address, then enter the new one as the URL. If you don’t know the ZyXEL Device’s IP address, type the device name of your ZyXEL Device as the URL. ZyXELXXXX is the default where “XXXX” is the last four digits of the MAC address. The MAC address is on the bottom of the device). If you just changed the ZyXEL Device’s IP address, your computer’s cache of machine names may contain an entry that maps the name of the ZyXEL Device to its previous IP address. In Windows, use nbtstat -R at the command prompt to delete all entries in your computer’s cache of machine names. Open a new browser window. See the following section to check that pop-up windows, JavaScripts and Java permissions are allowed. You may also need to clear your Internet browser’s cache. In Internet Explorer, click Tools and then Internet Options to open the Internet Options screen. In the General tab, click Delete Files. In the pop-up window, select the Delete all offline content check box and click OK. Click OK in the Internet Options screen to close it. If you disconnect your computer from one device and connect it to another device that has the same IP address, your computer’s ARP (Address Resolution Protocol) table may contain an entry that maps the management IP address to the previous device’s MAC address). In Windows, use arp -d at the command prompt to delete all entries in your computer’s ARP table. Open a new browser window. Chapter 8 Troubleshooting 77 G-470 User’s Guide 8.5.1 Pop-up Windows, JavaScripts and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. 8.5.1.1 Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device. Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device’s IP address. 8.5.1.1.1 Disable pop-up Blockers 1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up Blocker. Figure 44 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. 78 Chapter 8 Troubleshooting G-470 User’s Guide Figure 45 Internet Options 3 Click Apply to save this setting. 8.5.1.1.2 Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab. 2 Select Settings…to open the Pop-up Blocker Settings screen. Chapter 8 Troubleshooting 79 G-470 User’s Guide Figure 46 Internet Options: Settings 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.1.11. 4 Click Add to move the IP address to the list of Allowed sites. 80 Chapter 8 Troubleshooting G-470 User’s Guide Figure 47 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. 8.5.1.2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer, check that JavaScripts are allowed. 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Chapter 8 Troubleshooting 81 G-470 User’s Guide Figure 48 Internet Options: Custom Level 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default). 6 Click OK to close the window. 82 Chapter 8 Troubleshooting G-470 User’s Guide Figure 49 Security Settings - Java Scripting 8.5.1.3 Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected. 5 Click OK to close the window. Chapter 8 Troubleshooting 83 G-470 User’s Guide Figure 50 Security Settings - Java 8.5.1.3.1 JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 make sure that Use Java 2 for
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.4 Linearized : No Encryption : Standard V2.3 (128-bit) User Access : Print, Annotate, Fill forms, Extract, Print high-res Modify Date : 2006:08:07 08:48:30+08:00 Create Date : 2006:08:07 08:44:44+08:00 Title : ZyXEL G-220F User’s Guide V1.00 (Oct 2004) Author : Cindy Yang Creator : FrameMaker 7.1 Producer : Acrobat Distiller 5.0.5 (Windows) Page Count : 56 Mod Date : 2006:08:07 08:48:30+08:00 Creation Date : 2006:08:07 08:44:44+08:00 Metadata Date : 2006:08:07 08:48:30+08:00 Page Layout : OneColumnEXIF Metadata provided by EXIF.tools