ZyXEL Communications NBG5615 Simultaneous Dual-Band Wireless N750 Media Router User Manual Manual 2 1020418
ZyXEL Communications Corporation Simultaneous Dual-Band Wireless N750 Media Router Manual 2 1020418
Contents
- 1. Manual-1
- 2. Manual-2
- 3. Manual-2(1020418)
Manual-2(1020418)
C HAPTER 14 DHCP Server 14.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG5615’s LAN as a DHCP server or disable it. When configured as a server, the NBG5615 provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 14.1.1 What You Can Do • Use the Ge n e r a l screen to enable the DHCP server (Section 14.2 on page 133). • Use the Adva nce d screen to assign IP addresses on the LAN to specific individual computers based on their MAC Addresses (Section 14.3 on page 134). • Use the Clie nt List screen to view the current DHCP client information (Section 14.4 on page 136). 14.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. MAC Addresses Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. Find out the MAC addresses of your network devices if you intend to add them to the D H CP Clie n t List screen. 14.2 DHCP Server General Screen Use this screen to enable the DHCP server. Click N e t w or k > D H CP Se r ve r. The following screen displays. NBG5615 User’s Guide 133 Chapter 14 DHCP Server Figure 78 Network > DHCP Server > General The following table describes the labels in this screen. Table 52 Network > DHCP Server > General LABEL DESCRIPTION DHCP Server Select En a ble to activate DHCP for LAN. DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients (computers) to obtain TCP/IP configuration at startup from a server. Enable the DHCP server unless your ISP instructs you to do otherwise. Select D isa ble to stop the NBG5615 acting as a DHCP server. When configured as a server, the NBG5615 provides TCP/IP configuration for the clients. If not, DHCP service is disabled and you must have another DHCP server on your LAN, or else the computers must be manually configured. When set as a server, fill in the following four fields. IP Pool Starting Address This field specifies the first of the contiguous addresses in the IP address pool for LAN. Pool Size This field specifies the size, or count of the IP address pool for LAN. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 14.3 DHCP Server Advanced Screen This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses. You can also use this screen to configure the DNS server information that the NBG5615 sends to the DHCP clients. To change your NBG5615’s static DHCP settings, click N e t w or k > D H CP Se r ve r > Adva nce d. The following screen displays. 134 NBG5615 User’s Guide Chapter 14 DHCP Server Figure 79 Network > DHCP Server > Advanced The following table describes the labels in this screen. Table 53 Network > DHCP Server > Advanced LABEL DESCRIPTION Static DHCP Table This is the index number of the static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN. IP Address Type the LAN IP address of a computer on your LAN. DNS Server DNS Servers Assigned by DHCP Server NBG5615 User’s Guide The NBG5615 passes a DNS (Domain Name System) server IP address (in the order you specify here) to the DHCP clients. The NBG5615 only passes this information to the LAN DHCP clients when you enable D H CP Se r ve r. When you disable D H CP Se r ve r, DHCP service is disabled and you must have another DHCP sever on your LAN, or else the computers must have their DNS server addresses manually configured. 135 Chapter 14 DHCP Server Table 53 Network > DHCP Server > Advanced (continued) LABEL DESCRIPTION First DNS Server Select Obt a in e d Fr om I SP if your ISP dynamically assigns DNS server information (and the NBG5615's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Third DNS Server Select Use r - D e fin e d if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. If you chose Use r - D e fin e d, but leave the IP address set to 0.0.0.0, Use r - D e fin e d changes to N on e after you click Apply. If you set a second choice to Use r - D e fin e d, and enter the same IP address, the second Use r D e fine d changes to N on e after you click Apply. Select D N S Re la y to have the NBG5615 act as a DNS proxy. The NBG5615's LAN IP address displays in the field to the right (read-only). The NBG5615 tells the DHCP clients on the LAN that the NBG5615 itself is the DNS server. When a computer on the LAN sends a DNS query to the NBG5615, the NBG5615 forwards the query to the NBG5615's system DNS server (configured in the W AN > I n t e r n e t Con n e ct ion screen) and relays the response back to the computer. You can only select D N S Re la y for one of the three servers; if you select D N S Re la y for a second or third DNS server, that choice changes to N on e after you click Apply. Select N on e if you do not want to configure DNS servers. If you do not configure a DNS server, you must know the IP address of a computer in order to access it. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 14.4 DHCP Client List Screen The DHCP table shows current DHCP client information (including IP Address, Host Name and MAC Address) of network clients using the NBG5615’s DHCP servers. Configure this screen to always assign an IP address to a MAC address (and host name). Click N e t w or k > D H CP Se r ve r > Clie nt List . Note: You can also view a read-only client list by clicking M on it or > D H CP Se r v e r. Figure 80 Network > DHCP Server > Client List The following table describes the labels in this screen. Table 54 Network > DHCP Server > Client List 136 LABEL DESCRIPTION This is the index number of the host computer. Status This field displays whether the connection to the host computer is up (a yellow bulb) or down (a gray bulb). NBG5615 User’s Guide Chapter 14 DHCP Server Table 54 Network > DHCP Server > Client List (continued) LABEL DESCRIPTION Host Name This field displays the computer host name. IP Address This field displays the IP address relative to the # field listed above. MAC Address This field shows the MAC address of the computer with the name in the H ost N a m e field. Every Ethernet device has a unique MAC (Media Access Control) address which uniquely identifies a device. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. Reserve Select this if you want to reserve the IP address for this specific MAC address. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to reload the previous configuration for this screen. NBG5615 User’s Guide 137 Chapter 14 DHCP Server 138 NBG5615 User’s Guide C HAPTER 15 NAT 15.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. The figure below is a simple illustration of a NAT network. You want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses to the devices (A to D ) connected to your NBG5615. The ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. All traffic coming from A to D going out to the Internet use the IP address of the NBG5615, which is 192.168.1.1. Figure 81 NAT Example A: 192.168.1.33 LAN FTP, Telnet, SNMP Ports 21 to 25 WAN 192.168.1.1 B: 192.168.1.34 Port 80 IP address assigned by ISP C: 192.168.1.35 This chapter discusses how to configure NAT on the NBG5615. Note: You must create a firewall rule in addition to setting up NAT, to allow traffic from the WAN to be forwarded through the NBG5615. 15.1.1 What You Can Do • Use the Ge n e r a l screen to enable NAT (Section 15.2 on page 141). NBG5615 User’s Guide 139 Chapter 15 NAT • Use the Por t For w a r din g screen to set a default server and change your NBG5615’s port forwarding settings to forward incoming service requests to the server(s) on your local network (Section 15.3 on page 142). • Use the Por t Tr igge r screen to change your NBG5615’s trigger port settings (Section 15.5.3 on page 147). 15.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. Inside/Outside This denotes where a host is located relative to the NBG5615, for example, the computers of your subscribers are the inside hosts, while the web servers on the Internet are the outside hosts. Global/Local This denotes the IP address of a host in a packet as the packet traverses a router, for example, the local address refers to the IP address of a host when the packet is in the local network, while the global address refers to the IP address of the host when the same packet is traveling in the WAN side. Note: Inside/outside refers to the location of a host, while global/local refers to the IP address of a host used in a packet. An inside local address (ILA) is the IP address of an inside host in a packet when the packet is still in the local network, while an inside global address (IGA) is the IP address of the same inside host when the packet is on the WAN side. The following table summarizes this information. Table 55 NAT Definitions ITEM DESCRIPTION Inside This refers to the host on the LAN. Outside This refers to the host on the WAN. Local This refers to the packet address (source or destination) as the packet travels on the LAN. Global This refers to the packet address (source or destination) as the packet travels on the WAN. Note: NAT never changes the IP address (either local or global) of an outside host. What NAT Does In the simplest form, NAT changes the source IP address in a packet received from a subscriber (the inside local address) to another (the inside global address) before forwarding the packet to the WAN side. When the response comes back, NAT translates the destination address (the inside global address) back to the inside local address before forwarding it to the original inside host. Note that the IP address (either local or global) of an outside host is never changed. The global IP addresses for the inside hosts can be either static or dynamically assigned by the ISP. In addition, you can designate servers, for example, a web server and a telnet server, on your local 140 NBG5615 User’s Guide Chapter 15 NAT network and make them accessible to the outside world. If you do not define any servers , NAT offers the additional benefit of firewall protection. With no servers defined, your NBG5615 filters out all incoming inquiries, thus preventing intruders from probing your network. For more information on IP address translation, refer to RFC 1631, The I P Net work Address Translat or ( NAT) . How NAT Works Each packet has two addresses – a source address and a destination address. For outgoing packets, the ILA (Inside Local Address) is the source address on the LAN, and the IGA (Inside Global Address) is the source address on the WAN. For incoming packets, the ILA is the destination address on the LAN, and the IGA is the destination address on the WAN. NAT maps private (local) IP addresses to globally unique ones required for communication with hosts on other networks. It replaces the original IP source address in each packet and then forwards it to the Internet. The NBG5615 keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored. The following figure illustrates this. Figure 82 How NAT Works 15.2 General Use this screen to enable NAT and set a default server. Click N e t w or k > N AT to open the Ge n e r a l screen. Figure 83 Network > NAT > General NBG5615 User’s Guide 141 Chapter 15 NAT The following table describes the labels in this screen. Table 56 Network > NAT > General LABEL DESCRIPTION Network Address Translation (NAT) Network Address Translation (NAT) allows the translation of an Internet protocol address used within one network (for example a private IP address used in a local network) to a different IP address known within another network (for example a public IP address used on the Internet). Select En a ble to activate NAT. Select D isa ble to turn it off. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 15.3 Port Forwarding Screen Use this screen to forward incoming service requests to the server(s) on your local network and set a default server. You may enter a single port number or a range of port numbers to be forwarded, and the local IP address of the desired server. The port number identifies a service; for example, web service is on port 80 and FTP on port 21. In some cases, such as for unknown services or where one server can support more than one service (for example both FTP and web service), it might be better to specify a range of port numbers. In addition to the servers for specified services, NAT supports a default server. A service request that does not have a server explicitly designated for it is forwarded to the default server. If the default is not defined, the service request is simply discarded. Note: Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP. Port forwarding allows you to define the local servers to which the incoming services will be forwarded. To change your NBG5615’s port forwarding settings, click N e t w or k > N AT > Por t For w a r ding. The screen appears as shown. Note: If you do not assign a D e fa ult Se r ve r , the NBG5615 discards all packets received for ports that are not specified in this screen or remote management. Refer to Appendix C on page 249 for port numbers commonly used for particular services. 142 NBG5615 User’s Guide Chapter 15 NAT Figure 84 Network > NAT > Port Forwarding The following table describes the labels in this screen. Table 57 Network > NAT > Port Forwarding LABEL DESCRIPTION Default Server Setup Default Server In addition to the servers for specified services, NAT supports a default server. A default server receives packets from ports that are not specified in the Por t For w a r din g screen. You can decide whether you want to use the default server or specify a server manually. Select this to use the default server. Change to Server Select this and manually enter the server’s IP address. Service Name Select a pre-defined service from the drop-down list box. The pre-defined service port number(s) and protocol will be displayed in the port forwarding summary table. Otherwise, select Use r de fine to manually enter the port number(s) and select the IP protocol. Service Protocol Select the transport layer protocol supported by this virtual server. Choices are TCP, UD P, or TCP_ UD P. If you have chosen a pre-defined service in the Se r vice N a m e field, the protocol will be configured automatically. Server IP Address Enter the inside IP address of the virtual server here and click Add to add it in the port forwarding summary table. This is the number of an individual port forwarding server entry. Status This icon is turned on when the rule is enabled. Name This field displays a name to identify this rule. Protocol This is the transport layer protocol used for the service. Port This field displays the port number(s). Server IP Address This field displays the inside IP address of the server. Modify Click the Edit icon to open the edit screen where you can modify an existing rule. Click the D e le t e icon to remove a rule. NBG5615 User’s Guide 143 Chapter 15 NAT Table 57 Network > NAT > Port Forwarding (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 15.3.1 Port Forwarding Edit Screen This screen lets you edit a port forwarding rule. Click a rule’s Edit icon in the Por t For w a r din g screen to open the following screen. Figure 85 Network > NAT > Port Forwarding Edit The following table describes the labels in this screen. Table 58 Network > NAT > Port Forwarding Edit LABEL DESCRIPTION Port Forwarding Select En a ble to turn on this rule and the requested service can be forwarded to the host with a specified internal IP address. Select D isa ble to disallow forwarding of these ports to an inside server without having to delete the entry. Service Name Type a name (of up to 31 printable characters) to identify this rule in the first field next to Se r vice N a m e . Otherwise, select a predefined service in the second field next to Se r vice N a m e . The predefined service name and port number(s) will display in the Se r vice N a m e and Por t fields. Protocol Select the transport layer protocol supported by this virtual server. Choices are TCP, UD P, or TCP_ UD P. If you have chosen a pre-defined service in the Se r vice N a m e field, the protocol will be configured automatically. Port Type a port number(s) to define the service to be forwarded to the specified server. To specify a range of ports, enter a hyphen (-) between the first port and the last port, such as 10-. 144 Server IP Address Type the IP address of the server on your LAN that receives packets from the port(s) specified in the Por t field. Back Click Ba ck to return to the previous screen. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. NBG5615 User’s Guide Chapter 15 NAT 15.4 Port Trigger Screen To change your NBG5615’s trigger port settings, click N e t w or k > N AT > Por t Tr igge r. The screen appears as shown. Note: Only one LAN computer can use a trigger port (range) at a time. Figure 86 Network > NAT > Port Trigger The following table describes the labels in this screen. Table 59 Network > NAT > Port Trigger LABEL DESCRIPTION This is the rule index number (read-only). Name Type a unique name (up to 15 characters) for identification purposes. All characters are permitted - including spaces. Incoming Incoming is a port (or a range of ports) that a server on the WAN uses when it sends out a particular service. The NBG5615 forwards the traffic with this port (or range of ports) to the client computer on the LAN that requested the service. Port Type a port number or the starting port number in a range of port numbers. End Port Type a port number or the ending port number in a range of port numbers. Trigger The trigger port is a port (or a range of ports) that causes (or triggers) the NBG5615 to record the IP address of the LAN computer that sent the traffic to a server on the WAN. Port Type a port number or the starting port number in a range of port numbers. End Port Type a port number or the ending port number in a range of port numbers. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. NBG5615 User’s Guide 145 Chapter 15 NAT 15.5 Technical Reference The following section contains additional technical information about the NBG5615 features described in this chapter. 15.5.1 NATPort Forwarding: Services and Port Numbers A port forwarding set is a list of inside (behind NAT on the LAN) servers, for example, web or FTP, that you can make accessible to the outside world even though NAT makes your whole inside network appear as a single machine to the outside world. Use the Por t For w a r din g screen to forward incoming service requests to the server(s) on your local network. You may enter a single port number or a range of port numbers to be forwarded, and the local IP address of the desired server. The port number identifies a service; for example, web service is on port 80 and FTP on port 21. In some cases, such as for unknown services or where one server can support more than one service (for example both FTP and web service), it might be better to specify a range of port numbers. In addition to the servers for specified services, NAT supports a default server. A service request that does not have a server explicitly designated for it is forwarded to the default server. If the default is not defined, the service request is simply discarded. Note: Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP. 15.5.2 NAT Port Forwarding Example Let's say you want to assign ports 21-25 to one FTP, Telnet and SMTP server (A in the example), port 80 to another (B in the example) and assign a default server IP address of 192.168.1.35 to a third (C in the example). You assign the LAN IP addresses and the ISP assigns the WAN IP address. The NAT network appears as a single host on the Internet. Figure 87 Multiple Servers Behind NAT Example 146 NBG5615 User’s Guide Chapter 15 NAT 15.5.3 Trigger Port Forwarding Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side. With regular port forwarding you set a forwarding port in NAT to forward a service (coming in from the server on the WAN) to the IP address of a computer on the client side (LAN). The problem is that port forwarding only forwards a service to a single LAN IP address. In order to use the same service on a different LAN computer, you have to manually replace the LAN computer's IP address in the forwarding port with another LAN computer's IP address. Trigger port forwarding solves this problem by allowing computers on the LAN to dynamically take turns using the service. The NBG5615 records the IP address of a LAN computer that sends traffic to the WAN to request a service with a specific port number and protocol (a "trigger" port). When the NBG5615's WAN port receives a response with a specific port number and protocol ("incoming" port), the NBG5615 forwards the traffic to the LAN IP address of the computer that sent the request. After that computer’s connection for that service closes, another computer on the LAN can use the service in the same manner. This way you do not need to configure a new IP address each time you want a different LAN computer to use the application. 15.5.4 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 88 Trigger Port Forwarding Process: Example Ja ne ’s com put e r Re a l Audio Se r ve r Por t 7 0 7 0 Jane requests a file from the Real Audio server (port 7070). Port 7070 is a “trigger” port and causes the NBG5615 to record Jane’s computer IP address. The NBG5615 associates Jane's computer IP address with the "incoming" port range of 6970-7170. The Real Audio server responds using a port number ranging between 6970-7170. The NBG5615 forwards the traffic to Jane’s computer IP address. Only Jane can connect to the Real Audio server until the connection is closed or times out. The NBG5615 times out in three minutes with UDP (User Datagram Protocol), or two hours with TCP/IP (Transfer Control Protocol/Internet Protocol). NBG5615 User’s Guide 147 Chapter 15 NAT 15.5.5 Two Points To Remember About Trigger Ports 148 Trigger events only happen on data that is coming from inside the NBG5615 and going to the outside. If an application needs a continuous data stream, that port (range) will be tied up so that another computer on the LAN can’t trigger it. NBG5615 User’s Guide C HAPTER 16 DDNS 16.1 Overview DDNS services let you use a domain name with a dynamic IP address. 16.1.1 What You Need To Know The following terms and concepts may help as you read through this chapter. What is DDNS? Dynamic Domain Name Service (DDNS) services let you use a fixed domain name with a dynamic IP address. Users can always use the same domain name instead of a different dynamic IP address that changes each time to connect to the NBG5615 or a server in your network. Note: The NBG5615 must have a public global IP address and you should have your registered DDNS account information on hand. 16.2 General To change your NBG5615’s DDNS, click N e t w or k > D D N S. The screen appears as shown. Figure 89 Dynamic DNS NBG5615 User’s Guide 149 Chapter 16 DDNS The following table describes the labels in this screen. Table 60 Dynamic DNS 150 LABEL DESCRIPTION Dynamic DNS Select En a ble to use dynamic DNS. Select D isa ble to turn this feature off. Service Provider Select the name of your Dynamic DNS service provider. Host Name Enter a host names in the field provided. You can specify up to two host names in the field separated by a comma (","). Usename Enter your user name. Password Enter the password assigned to you. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. NBG5615 User’s Guide C HAPTER 17 Static Route 17.1 Overview This chapter shows you how to configure static routes for your NBG5615. The NBG5615 usually uses the default gateway to route outbound traffic from computers on the LAN to the Internet. To have the NBG5615 send data to devices not reachable through the default gateway, use static routes. For example, the next figure shows a computer (A) connected to the NBG5615’s LAN interface. The NBG5615 routes most traffic from A to the Internet through the NBG5615’s default gateway (R1 ). You create one static route to connect to services offered by your ISP behind router R2 . You create another static route to communicate with a separate network behind a router R3 connected to the LAN. Figure 90 Example of Static Routing Topology R1 LAN WAN R3 R2 17.2 IP Static Route Screen Click N e t w or k > St a t ic Rou t e to open the St a t ic Rou t e screen. NBG5615 User’s Guide 151 Chapter 17 Static Route Figure 91 Network > Static Route The following table describes the labels in this screen. Table 61 Network > Static Route LABEL DESCRIPTION Add Static Route Click this to create a new rule. This is the number of an individual static route. Status This field indicates whether the rule is active (yellow bulb) or not (gray bulb). Name This field displays a name to identify this rule. Destination This parameter specifies the IP network address of the final destination. Routing is always based on network number. Gateway This is the IP address of the gateway. The gateway is a router or switch on the same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations. Subent Mask This parameter specifies the IP network subnet mask of the final destination. Modify Click the Edit icon to open a screen where you can modify an existing rule. Click the D e le t e icon to remove a rule from the NBG5615. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 17.2.1 Add/Edit Static Route Click the Add St a t ic Rout e button or a rule’s Edit icon in the St a t ic Rout e screen. Use this screen to configure the required information for a static route. Figure 92 Network > Static Route: Add/Edit 152 NBG5615 User’s Guide Chapter 17 Static Route The following table describes the labels in this screen. Table 62 Network > Static Route: Add/Edit LABEL DESCRIPTION Static Route Select to enable or disable this rule. Route Name Type a name to identify this rule. You can use up to printable English keyboard characters, including spaces. Destination IP Address This parameter specifies the IP network address of the final destination. Routing is always based on network number. If you need to specify a route to a single host, use a subnet mask of 255.255.255.255 in the subnet mask field to force the network number to be identical to the host ID. IP Subnet Mask Enter the IP subnet mask here. Gateway IP Address Enter the IP address of the next-hop gateway. The gateway is a router or switch on the same segment as your NBG5615's interface(s). The gateway helps forward packets to their destinations. Back Click Ba ck to return to the previous screen without saving. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to set every field in this screen to its last-saved value. NBG5615 User’s Guide 153 Chapter 17 Static Route 154 NBG5615 User’s Guide C HAPTER 18 Firewall 18.1 Overview Use these screens to enable and configure the firewall that protects your NBG5615 and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN. The following figure illustrates the default firewall action. User A can initiate an IM (Instant Messaging) session from the LAN to the WAN (1). Return traffic for this session is also allowed (2). However other traffic initiated from the WAN is blocked (3 and 4). Figure 93 Default Firewall Action WAN LAN 18.1.1 What You Can Do • Use the Ge n e r a l screen to enable or disable the NBG5615’s firewall (Section 18.2 on page 157). • Use the Se r vice s screen enable service blocking, enter/delete/modify the services you want to block and the date/time you want to block them (Section 18.3 on page 157). 18.1.2 What You Need To Know The following terms and concepts may help as you read through this chapter. NBG5615 User’s Guide 155 Chapter 18 Firewall What is a Firewall? Originally, the term “firewall” referred to a construction technique designed to prevent the spread of fire from one room to another. The networking term "firewall" is a system or group of systems that enforces an access-control policy between two networks. It may also be defined as a mechanism used to protect a trusted network from a network that is not trusted. Of course, firewalls cannot solve every security problem. A firewall is one of the mechanisms used to establish a network security perimeter in support of a network security policy. It should never be the only mechanism or method employed. For a firewall to guard effectively, you must design and deploy it appropriately. This requires integrating the firewall into a broad information-security policy. In addition, specific policies must be implemented within the firewall itself. Stateful Inspection Firewall Stateful inspection firewalls restrict access by screening data packets against defined access rules. They make access control decisions based on IP address and protocol. They also "inspect" the session data to assure the integrity of the connection and to adapt to dynamic protocols. These firewalls generally provide the best speed and transparency; however, they may lack the granular application level access control or caching that some proxies support. Firewalls, of one type or another, have become an integral part of standard security solutions for enterprises. About the NBG5615 Firewall The NBG5615’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks. It is a stateful inspection firewall and is designed to protect against Denial of Service attacks when activated (click the Ge n e r a l tab under Fir e w a ll and then click the Ena ble Fir e w a ll check box). The NBG5615's purpose is to allow a private Local Area Network (LAN) to be securely connected to the Internet. The NBG5615 can be used to prevent theft, destruction and modification of data, as well as log events, which may be important to the security of your network. The NBG5615 is installed between the LAN and a broadband modem connecting to the Internet. This allows it to act as a secure gateway for all data passing between the Internet and the LAN. The NBG5615 has one Ethernet WAN port and four Ethernet LAN ports, which are used to physically separate the network into two areas.The WAN (Wide Area Network) port attaches to the broadband (cable or DSL) modem to the Internet. The LAN (Local Area Network) port attaches to a network of computers, which needs security from the outside world. These computers will have access to Internet services such as e-mail, FTP and the World Wide Web. However, "inbound access" is not allowed (by default) unless the remote host is authorized to use a specific service. Guidelines For Enhancing Security With Your Firewall 156 Change the default password via Web Configurator. Think about access control before you connect to the network in any way, including attaching a modem to the port. Limit who can access your router. NBG5615 User’s Guide Chapter 18 Firewall Don't enable any local service (such as NTP) that you don't use. Any enabled service could present a potential security risk. A determined hacker might be able to find creative ways to misuse the enabled services to access the firewall or the network. For local services that are enabled, protect against misuse. Protect by configuring the services to communicate only with specific peers, and protect by configuring rules to block packets for the services at specific interfaces. Protect against IP spoofing by making sure the firewall is active. Keep the firewall in a secured (locked) room. 18.2 General Screen Use this screen to enable or disable the NBG5615’s firewall, and set up firewall logs. Click Se cu r it y > Fir e w a ll to open the Ge n e r a l screen. Figure 94 Security > Firewall > General l The following table describes the labels in this screen. Table 63 Security > Firewall > General LABEL DESCRIPTION Enable Firewall Select this check box to activate the firewall. The NBG5615 performs access control and protects against Denial of Service (DoS) attacks when the firewall is activated. Apply Click Apply to save the settings. Cancel Click Ca n ce l to start configuring this screen again. 18.3 Services Screen If an outside user attempts to probe an unsupported port on your NBG5615, an ICMP response packet is automatically returned. This allows the outside user to know the NBG5615 exists. Use this screen to prevent the ICMP response packet from being sent. This keeps outsiders from discovering your NBG5615 when unsupported ports are probed. You can also use this screen to enable service blocking, enter/delete/modify the services you want to block and the date/time you want to block them. Click Se cur it y > Fir e w a ll > Se r vice s. The screen appears as shown next. NBG5615 User’s Guide 157 Chapter 18 Firewall Figure 95 Security > Firewall > Services l The following table describes the labels in this screen. Table 64 Security > Firewall > Services LABEL DESCRIPTION LABEL DESCRIPTION ICMP Internet Control Message Protocol is a message control and error-reporting protocol between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP software and directly apparent to the application user. Respond to Ping on The NBG5615 will not respond to any incoming Ping requests when D isa ble is selected. Select LAN to reply to incoming LAN Ping requests. Select W AN to reply to incoming WAN Ping requests. Otherwise select LAN & W AN to reply to all incoming LAN and WAN Ping requests. Apply Click Apply to save the settings. Enable Firewall Rule Enable Firewall Rule Select this check box to activate the firewall rules that you define (see Add Fir e w a ll Ru le below). Apply Click Apply to save the settings. Add Firewall Rule Service Name Enter a name that identifies or describes the firewall rule. MAC Address Enter the MAC address of the computer for which the firewall rule applies. Dest IP Address Enter the IP address of the computer to which traffic for the application or service is entering. The NBG5615 applies the firewall rule to traffic initiating from this computer. 158 NBG5615 User’s Guide Chapter 18 Firewall Table 64 Security > Firewall > Services (continued) LABEL DESCRIPTION Source IP Address Enter the IP address of the computer that initializes traffic for the application or service. The NBG5615 applies the firewall rule to traffic initiating from this computer. Protocol Select the protocol (TCP, UD P or I CM P) used to transport the packets for which you want to apply the firewall rule. Dest Port Range Enter the port number/range of the destination that define the traffic type, for example TCP port 80 defines web traffic. Source Port Range Enter the port number/range of the source that define the traffic type, for example TCP port 80 defines web traffic. Add Rule Click Add to save the firewall rule. Firewall Rule This is your firewall rule number. The ordering of your rules is important as rules are applied in turn. Service Name This is a name that identifies or describes the firewall rule. MAC address This is the MAC address of the computer for which the firewall rule applies. Dest IP This is the IP address of the computer to which traffic for the application or service is entering. Source IP This is the IP address of the computer from which traffic for the application or service is initialized. Protocol This is the protocol (TCP, UD P or I CM P) used to transport the packets for which you want to apply the firewall rule. Dest Port Range This is the port number/range of the destination that define the traffic type, for example TCP port 80 defines web traffic. Source Port Range This is the port number/range of the source that define the traffic type, for example TCP port 80 defines web traffic. Action D ROP - Traffic matching the conditions of the firewall rule are stopped. Delete Click D e le t e to remove the firewall rule. Cancel Click Ca n ce l to start configuring this screen again. See Appendix C on page 249 for commonly used services and port numbers. NBG5615 User’s Guide 159 Chapter 18 Firewall 160 NBG5615 User’s Guide C HAPTER 19 Content Filtering 19.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords. 19.1.1 What You Need To Know The following terms and concepts may help as you read through this chapter. Content Filtering Profiles Content filtering allows you to block certain web features, such as cookies, and/or block access to specific web sites. For example, you can configure one policy that blocks John Doe’s access to arts and entertainment web pages. A content filtering profile conveniently stores your custom settings for the following features. Keyword Blocking URL Checking The NBG5615 checks the URL’s domain name (or IP address) and file path separately when performing keyword blocking. The URL’s domain name or IP address is the characters that come before the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the domain name is www.zyxel.com.tw. The file path is the characters that come after the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, the file path is news/pressroom.php. Since the NBG5615 checks the URL’s domain name (or IP address) and file path separately, it will not find items that go across the two. For example, with the URL www.zyxel.com.tw/news/ pressroom.php, the NBG5615 would find “tw” in the domain name (www.zyxel.com.tw). It would also find “news” in the file path (news/pressroom.php) but it would not find “tw/news”. 19.2 Content Filter Use this screen to restrict web features, add keywords for blocking and designate a trusted computer. Click Se cur it y > Con t e n t Filt e r to open the Cont e nt Filt e r screen. NBG5615 User’s Guide 161 Chapter 19 Content Filtering Figure 96 Security > Content Filter The following table describes the labels in this screen. Table 65 Security > Content Filter LABEL DESCRIPTION Trusted IP Setup To enable this feature, type an IP address of any one of the computers in your network that you want to have as a trusted computer. This allows the trusted computer to have full access to all features that are configured to be blocked by content filtering. Leave this field blank to have no trusted computers. Restrict Web Features Select the box(es) to restrict a feature. When you download a page containing a restricted feature, that part of the web page will appear blank or grayed out. ActiveX A tool for building dynamic and active Web pages and distributed object applications. When you visit an ActiveX Web site, ActiveX controls are downloaded to your browser, where they remain in case you visit the site again. Java A programming language and development environment for building downloadable Web components or Internet and intranet business applications of all kinds. Cookies Used by Web servers to track usage and provide service based on ID. Web Proxy A server that acts as an intermediary between a user and the Internet to provide security, administrative control, and caching service. When a proxy server is located on the WAN it is possible for LAN users to circumvent content filtering by pointing to this proxy server. Enable URL Keyword Blocking The NBG5615 can block Web sites with URLs that contain certain keywords in the domain name or IP address. For example, if the keyword "bad" was enabled, all sites containing this keyword in the domain name or IP address will be blocked, e.g., URL http:// www.website.com/bad.html would be blocked. Select this check box to enable this feature. Keyword Type a keyword in this field. You may use any character (up to 64 characters). Wildcards are not allowed. You can also enter a numerical IP address. Add Click Add after you have typed a keyword. Repeat this procedure to add other keywords. Up to 64 keywords are allowed. When you try to access a web page containing a keyword, you will get a message telling you that the content filter is blocking this request. 162 NBG5615 User’s Guide Chapter 19 Content Filtering Table 65 Security > Content Filter (continued) LABEL DESCRIPTION Keyword List This list displays the keywords already added. Delete Highlight a keyword in the lower box and click D e le t e to remove it. The keyword disappears from the text box after you click Apply. Clear All Click this button to remove all of the listed keywords. Apply Click Apply to save your changes. Cancel Click Ca n ce l to begin configuring this screen afresh 19.3 Technical Reference The following section contains additional technical information about the NBG5615 features described in this chapter. 19.3.1 Customizing Keyword Blocking URL Checking You can use commands to set how much of a website’s URL the content filter is to check for keyword blocking. See the appendices for information on how to access and use the command interpreter. Domain Name or IP Address URL Checking By default, the NBG5615 checks the URL’s domain name or IP address when performing keyword blocking. This means that the NBG5615 checks the characters that come before the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, content filtering only searches for keywords within www.zyxel.com.tw. Full Path URL Checking Full path URL checking has the NBG5615 check the characters that come before the last slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.php, full path URL checking searches for keywords within www.zyxel.com.tw/news/. Use the ip urlfilter customize actionFlags 6 [disable | enable] command to extend (or not extend) the keyword blocking search to include the URL's full path. File Name URL Checking Filename URL checking has the NBG5615 check all of the characters in the URL. For example, filename URL checking searches for keywords within the URL www.zyxel.com.tw/ news/pressroom.php. NBG5615 User’s Guide 163 Chapter 19 Content Filtering Use the ip urlfilter customize actionFlags 8 [disable | enable] command to extend (or not extend) the keyword blocking search to include the URL's complete filename. 164 NBG5615 User’s Guide C HAPTER 20 Bandwidth Management 20.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN. Downlink traffic comes back from the WAN device (B) to the LAN device (A). Bandwidth management is applied before sending the traffic out to LAN. Figure 97 Bandwidth Management Example -> VOIP -> FTP -> HTTP -> Chat, Email You can allocate specific amounts of bandwidth capacity (bandwidth budgets) to individual applications (like VoIP, Web, FTP, and E-mail for example). 20.2 What You Can Do • Use the Ge n e r a l screen to enable bandwidth management and assign bandwidth values (Section 20.4 on page 166). • Use the Adva nce d screen to configure bandwidth managements rule for the pre-defined services and applications (Section 20.5 on page 166). NBG5615 User’s Guide 165 Chapter 20 Bandwidth Management 20.3 What You Need To Know The sum of the bandwidth allotments that apply to the WAN interface (LAN to WAN, WLAN to WAN) must be less than or equal to the Upst r e a m Ba ndw idt h that you configure in the Ba n dw idt h M a na ge m e nt Adva nce d screen (Section 20.5 on page 166). The sum of the bandwidth allotments that apply to the LAN interface (WAN to LAN, WAN to WLAN) must be less than or equal to the D ow nst r e a m Ba n dw idt h that you configure in the Ba ndw idt h M a na ge m e nt Adva nce d screen Section 20.5 on page 166. 20.4 General Screen Use this screen to have the NBG5615 apply bandwidth management. Click M a na ge m e nt > Ba ndw idt h M GM T to open the bandwidth management Ge ne r a l screen. Figure 98 Management > Bandwidth Management > General The following table describes the labels in this screen. Table 66 Management > Bandwidth Management > General LABEL DESCRIPTION Enable Bandwidth Management This field allows you to have NBG5615 apply bandwidth management. Enable bandwidth management to give traffic that matches a bandwidth rule priority over traffic that does not match a bandwidth rule. Enabling bandwidth management also allows you to control the maximum or minimum amounts of bandwidth that can be used by traffic that matches a bandwidth rule. Apply Click Apply to save your customized settings. Cancel Click Ca n ce l to begin configuring this screen afresh. 20.5 Advanced Screen Use this screen to configure bandwidth management rules for the pre-defined services or applications. You can also use this screen to configure bandwidth management rule for other services or applications that are not on the pre-defined list of NBG5615. Additionally, you can define the source and destination IP addresses and port for a service or application. 166 NBG5615 User’s Guide Chapter 20 Bandwidth Management Note: The two tables shown in this screen can be configured and applied at the same time. Click M a na ge m e nt > Ba n dw idt h M GM T > Adva nce d to open the bandwidth management Adva nce d screen. Figure 99 Management > Bandwidth Management > Advanced NBG5615 User’s Guide 167 Chapter 20 Bandwidth Management The following table describes the labels in this screen. Table 67 Management > Bandwidth Management > Advanced LABEL DESCRIPTION Management Bandwidth Upstream Bandwidth Select the total amount of bandwidth from a drop-down list box that you want to dedicate to uplink traffic. Otherwise, select Use r D e fin e d and manually specify the amount of bandwidth in kilobits per second. Downstream Bandwidth Select the total amount of bandwidth from a drop-down list box that you want to dedicate to uplink traffic. Otherwise, select Use r D e fin e d and manually specify the amount of bandwidth in kilobits per second. Application List Use this table to allocate specific amounts of bandwidth based on a pre-defined service. This is the number of an individual bandwidth management rule. Priority Select a priority from the drop down list box. Choose H igh , M id or Low . This is traffic from LAN/WLAN to WAN. This is traffic from WAN to LAN/WLAN. • • • H igh - Select this for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay). M id - Select this for "excellent effort" or better than best effort and would include important business traffic that can tolerate some delay. Low - Select this for non-critical "background" traffic such as bulk transfers that are allowed but that should not affect other applications and users. Category This is the category where a service belongs. Service This is the name of the service. Select the check box to have the NBG5615 apply this bandwidth management rule. Click the Edit icon to open the Ru le Con figu r a t ion screen where you can modify the rule. User-defined Service Use this table to allocate specific amounts of bandwidth to specific applications or services you specify. This is the number of an individual bandwidth management rule. Enable Select this check box to have the NBG5615 apply this bandwidth management rule. Direction Select To LAN & W LAN to apply bandwidth management to traffic from WAN to LAN and WLAN. Select To W AN to apply bandwidth management to traffic from LAN/WLAN to WAN. Service Name Enter a descriptive name for the bandwidth management rule. Category This is the category where a service belongs. Modify Click the Edit icon to open the Ru le Con figu r a t ion screen. Modify an existing rule or create a new rule in the Ru le Con figur a t ion screen. See Section 20.5.2 on page 169 for more information. Click the Re m ove icon to delete a rule. Apply Click Apply to save your customized settings. Cancel Click Ca n ce l to begin configuring this screen afresh. 20.5.1 Rule Configuration: Application Rule Configuration If you want to edit a bandwidth management rule for a pre-defined service or application, click the Edit icon in the Applica t ion List table of the Adva nce d screen. The following screen displays. 168 NBG5615 User’s Guide Chapter 20 Bandwidth Management Figure 100 Bandwidth Management Rule Configuration: Application List The following table describes the labels in this screen. Table 68 Bandwidth Management Rule Configuration: Application List LABEL DESCRIPTION This is the number of an individual bandwidth management rule. Enable Select an interface’s check box to enable bandwidth management on that interface. Direction These read-only labels represent the physical interfaces. Bandwidth management applies to all traffic flowing out of the router through the interface, regardless of the traffic’s source. Traffic redirect or IP alias may cause LAN-to-LAN traffic to pass through the NBG5615 and be managed by bandwidth management. Bandwidth Select M a x im u m Ba n dw idt h or M in im u m Ba n dw idt h and specify the maximum or minimum bandwidth allowed for the rule in kilobits per second. Destination Port This is the port number of the destination that define the traffic type, for example TCP port 80 defines web traffic. See Appendix C on page 249 for some common services and port numbers. Source Port This is the port number of the source that define the traffic type, for example TCP port 80 defines web traffic. See Appendix C on page 249 for some common services and port numbers. Protocol This is the protocol (TCP, UD P or use r - de fin e d ) used for the service. Apply Click Apply to save your customized settings. Cancel Click Ca n ce l to exit this screen without saving. 20.5.2 Rule Configuration: User Defined Service Rule Configuration If you want to edit a bandwidth management rule for other applications or services, click the Edit icon in the Use r - de fine d Se r vice table of the Adva nce d screen. The following screen displays. NBG5615 User’s Guide 169 Chapter 20 Bandwidth Management Figure 101 Bandwidth Management Rule Configuration: User-defined Service The following table describes the labels in this screen. Table 69 Bandwidth Management Rule Configuration: User-defined Service LABEL DESCRIPTION BW Budget Select M a x im u m Ba n dw idt h or M inim u m Ba n dw idt h and specify the maximum or minimum bandwidth allowed for the rule in kilobits per second. Destination Address Start Enter the starting IP address of the destination computer. Destination Address End Enter the ending IP address of the destination computer. The NBG5615 applies bandwidth management to the service or application that is entering this computer. The NBG5615 applies bandwidth management to the service or application that is entering this computer. Destination Port This is the port number of the destination that define the traffic type, for example TCP port 80 defines web traffic. Source Address Start Enter the starting IP address of the computer that initializes traffic for the application or service. The NBG5615 applies bandwidth management to traffic initiating from this computer. Source Address End Enter the ending IP address of the computer that initializes traffic for the application or service. The NBG5615 applies bandwidth management to traffic initiating from this computer. Source Port This is the port number of the source that define the traffic type, for example TCP port 80 defines web traffic. Protocol Select the protocol (TCP, UD P, BOTH ) for which the bandwidth management rule applies. If you select BOTH , enter the protocol for which the bandwidth management rule applies. For example, ICMP for ping traffic. Apply Click Apply to save your customized settings. Cancel Click Ca n ce l to exit this screen without saving. See Appendix C on page 249 for commonly used services and port numbers. 170 NBG5615 User’s Guide Chapter 20 Bandwidth Management 20.5.3 Predefined Bandwidth Management Services The following is a description of some services that you can select and to which you can apply media bandwidth management in the M a n a ge m e n t > Ba ndw idt h M GM T > Adva nce d screen. Table 70 Media Bandwidth Management Setup: Services SERVICE DESCRIPTION FTP File Transfer Program enables fast transfer of files, including large files that may not be possible by e-mail. WWW The World Wide Web (WWW) is an Internet system to distribute graphical, hyper-linked information, based on Hyper Text Transfer Protocol (HTTP) - a client/server protocol for the World Wide Web. The Web is not synonymous with the Internet; rather, it is just one service on the Internet. Other services on the Internet include Internet Relay Chat and Newsgroups. The Web is accessed through use of a browser. E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals. Here are some default ports for e-mail: VoIP (SIP) Sending voice signals over the Internet is called Voice over IP or VoIP. Session Initiated Protocol (SIP) is an internationally recognized standard for implementing VoIP. SIP is an application-layer control (signaling) protocol that handles the setting up, altering and tearing down of voice and multimedia sessions over the Internet. BitTorrent BitTorrent is a free P2P (peer-to-peer) sharing tool allowing you to distribute large software and media files. BitTorrent requires you to search for a file with a searching engine yourself. It distributes files by corporation and trading, that is, the client downloads the file in small pieces and share the pieces with other peers to get other half of the file. Gaming Online gaming services lets you play multiplayer games on the Internet via broadband technology. As of this writing, your NBG5615 supports Xbox, Playstation, Battlenet and MSN Game Zone. SIP is transported primarily over UDP but can also be transported over TCP. NBG5615 User’s Guide 171 Chapter 20 Bandwidth Management 172 NBG5615 User’s Guide C HAPTER 21 Remote Management 21.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your NBG5615 from a remote location through the following interfaces: • LAN and WAN • LAN only • WAN only Note: The NBG5615 is managed using the Web Configurator. 21.2 What You Can Do in this Chapter • Use the W W W screen to define the interface/s from which the NBG5615 can be managed remotely using the web and specify a secure client that can manage the NBG5615 (Section 21.4 on page 174). • Use the Te ln e t screen to define the interface/s from which the NBG5615 can be managed remotely using Telnet service and specify a secure client that can manage the NBG5615 (Section 21.5 on page 175). • Use the W a k e On LAN screen to enable Wake on LAN and remotely turn on a device on the local network (Section 21.6 on page 175). 21.3 What You Need to Know Remote management over LAN or WAN will not work when: The IP address in the Se cu r e d Clie n t I P Addr e ss field (Section 21.4 on page 174) does not match the client IP address. If it does not match, the NBG5615 will disconnect the session immediately. There is already another remote management session. You may only have one remote management session running at one time. There is a firewall rule that blocks it. NBG5615 User’s Guide 173 Chapter 21 Remote Management 21.3.1 Remote Management and NAT When NAT is enabled: • Use the NBG5615’s WAN IP address when configuring from the WAN. • Use the NBG5615’s LAN IP address when configuring from the LAN. 21.3.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NBG5615 automatically logs you out if the management session remains idle for longer than this timeout period. The management session does not time out when a statistics screen is polling. You can change the timeout period in the M a int e n a n ce > Ge n e r a l screen 21.4 WWW Screen To change your NBG5615’s remote management settings, click M a na ge m e nt > Re m ot e M GM T > W W W. Figure 102 Management > Remote Management > WWW The following table describes the labels in this screen. Table 71 Management > Remote Management > WWW 174 LABEL DESCRIPTION Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Access Status Select the interface(s) through which a computer may access the NBG5615 using this service. Secured Client IP Address Select All to allow all computes to access the NBG5615. Apply Click Apply to save your customized settings. Cancel Click Ca n ce l to begin configuring this screen afresh. Otherwise, check Se le ct e d and specify the IP address of the computer that can access the NBG5615. NBG5615 User’s Guide Chapter 21 Remote Management 21.5 Telnet Screen To change your NBG5615’s remote management settings, click M a na ge m e nt > Re m ot e M GM T > Te lne t to open the Te lne t screen. Figure 103 Management > Remote MGMT > Telnet The following table describes the labels in this screen. Table 72 Management > Remote MGMT > Telnet LABEL DESCRIPTION Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management. Access Status Select the interface(s) through which a computer may access the NBG5615 using this service. Secured Client IP Address Select All to allow all computes to access the NBG5615. Apply Click Apply to save your customized settings. Cancel Click Ca n ce l to begin configuring this screen afresh. Otherwise, check Se le ct e d and specify the IP address of the computer that can access the NBG5615. 21.6 Wake On LAN Screen Wake On LAN (WoL) allows you to remotely turn on a device on the network, such as a computer, storage device or media server. To use this feature the remote hardware (for example the network adapter on a computer) must support Wake On LAN using the “Magic Packet” method. You need to know the MAC address of the remote device. It may be on a label on the device. NBG5615 User’s Guide 175 Chapter 21 Remote Management Use this screen to remotely turn on a device on the network. Click the M a n a ge m e n t > Re m ot e M GM T > W a k e On LAN to open the following screen. Figure 104 Management > Remote MGMT > Wake On LAN The following table describes the labels in this screen. Table 73 Management > Remote MGMT > Wake On LAN LABEL DESCRIPTION Wake On LAN over WAN Settings Enable WOL over WAN Select this option to have the NBG5615 forward a WoL “Magic Packet” to all devices on the LAN if the packet comes from the WAN or remote network and uses the port number specified in the Por t field. A LAN device whose hardware supports Wake on LAN then will be powered on if it is turned off previously. Port Type a port number from which a WoL packet is forwarded to the LAN. Wake On LAN Wake MAC Address Enter the MAC Address of the device on the network that will be turned on. A MAC address consists of six hexadecimal character pairs. Start Click this to have the NBG5615 generate a WoL packet and forward it to turn the specified device on. A screen pops up displaying MAC address error if you input the MAC address incorrectly. 176 Apply Click Apply to save the setting to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. NBG5615 User’s Guide C HAPTER 22 Universal Plug-and-Play (UPnP) 22.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use. 22.2 What You Need to Know UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP compatible device installed on your network will appear as a separate icon. Selecting the icon of a UPnP device will allow you to access the information and properties of that device. 22.2.1 NAT Traversal UPnP NAT traversal automates the process of allowing an application to operate through NAT. UPnP network devices can automatically configure network addressing, announce their presence in the network to other UPnP devices and enable exchange of simple product and service descriptions. NAT traversal allows the following: • Dynamic port mapping • Learning public IP addresses • Assigning lease times to mappings Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. 22.2.2 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. When a UPnP device joins a network, it announces its presence with a multicast message. For security reasons, the NBG5615 allows multicast messages on the LAN only. NBG5615 User’s Guide 177 Chapter 22 Universal Plug-and-Play (UPnP) All UPnP-enabled devices may communicate freely with each other without additional configuration. Disable UPnP if this is not your intention. 22.3 UPnP Screen Use this screen to enable UPnP on your NBG5615. Click M a n a ge m e nt > UPnP to display the screen shown next. Figure 105 Management > UPnP The following table describes the fields in this screen. Table 74 Management > UPnP LABEL DESCRIPTION UPnP Select En a ble to activate UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the NBG5615's IP address (although you must still enter the password to access the web configurator). Apply Click Apply to save the setting to the NBG5615. Cancel Click Ca n ce l to return to the previously saved settings. 22.4 Technical Reference The sections show examples of using UPnP. 22.4.1 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP. You must already have UPnP installed in Windows XP and UPnP activated on the NBG5615. Make sure the computer is connected to a LAN port of the NBG5615. Turn on your computer and the NBG5615. 22.4.1.1 Auto-discover Your UPnP-enabled Network Device 178 Click st a r t and Cont r ol Pa ne l. Double-click N e t w or k Con n e ct ions. An icon displays under Internet Gateway. Right-click the icon and select Pr ope r t ie s. NBG5615 User’s Guide Chapter 22 Universal Plug-and-Play (UPnP) Figure 106 Network Connections In the I nt e r ne t Conne ct ion Pr ope r t ie s window, click Se t t ings to see the port mappings there were automatically created. Figure 107 Internet Connection Properties You may edit or delete the port mappings or click Add to manually add port mappings. Figure 108 Internet Connection Properties: Advanced Settings NBG5615 User’s Guide 179 Chapter 22 Universal Plug-and-Play (UPnP) Figure 109 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. Select Sh ow icon in not ifica t ion a r e a w he n conn e ct e d option and click OK. An icon displays in the system tray. Figure 110 System Tray Icon Double-click on the icon to display your current Internet connection status. Figure 111 Internet Connection Status 22.4.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG5615 without finding out the IP address of the NBG5615 first. This comes helpful if you do not know the IP address of the NBG5615. Follow the steps below to access the web configurator. 180 Click St a r t and then Cont r ol Pa ne l. Double-click N e t w or k Conne ct ions. NBG5615 User’s Guide Chapter 22 Universal Plug-and-Play (UPnP) Select M y N e t w or k Pla ce s under Ot h e r Pla ce s. Figure 112 Network Connections An icon with the description for each UPnP-enabled device displays under Loca l N e t w or k . Right-click on the icon for your NBG5615 and select I nvok e . The web configurator login screen displays. Figure 113 Network Connections: My Network Places Right-click on the icon for your NBG5615 and select Pr ope r t ie s. A properties window displays with basic information about the NBG5615. NBG5615 User’s Guide 181 Chapter 22 Universal Plug-and-Play (UPnP) Figure 114 Network Connections: My Network Places: Properties: Example 182 NBG5615 User’s Guide C HAPTER 23 USB Media Sharing 23.1 Overview This chapter describes how to configure the media sharing settings on the NBG5615. Note: The read and write performance may be affected by amount of file-sharing traffic on your network, type of connected USB device and your USB version (1.1 or 2.0). Media Server You can set up your NBG5615 to act as a media server to provide media (like video) to DLNAcompliant players, such as Windows Media Player, ZyXEL DMAs (Digital Media Adapters), Xboxes or PS3s. The media server and clients must have IP addresses in the same subnet. The NBG5615 media server enables you to: • Publish all folders for everyone to play media files in the USB storage device connected to the NBG5615. • Use hardware-based media clients like the DMA-2500 to play the files. Note: Anyone on your network can play the media files in the published folders. No user name and password nor other form of security is required. The following figure is an overview of the NBG5615’s media server feature. DLNA devices A and B can access and play files on a USB device (C) which is connected to the NBG5615 (D ). Figure 115 Media Server Overview NBG5615 User’s Guide 183 Chapter 23 USB Media Sharing File-Sharing Server You can also share files on a USB memory stick or hard drive connected to your NBG5615 with users on your network. The following figure is an overview of the NBG5615’s file-sharing server feature. Computers A and B can access files on a USB device (C) which is connected to the NBG5615 (D ). Figure 116 File Sharing Overview 23.2 What You Can Do • Use the D LN A screen to use the NBG5615 as a media server and allow DLNA-compliant devices to play media files stored in the attached USB device (Section 23.5 on page 186). • Use the SAM BA screen to enable file-sharing via the NBG5615 using Windows Explorer or the workgroup name. This screen also allow you to configure the workgroup name and create user accounts (Section 23.6 on page 186). • Use the FTP screen to allow file sharing via the NBG5615 using FTP and create user accounts (Section 23.7 on page 188). 23.3 What You Need To Know DLNA The Digital Living Network Alliance (DLNA) is a group of personal computer and electronics companies that works to make products compatible in a home network. DLNA clients play files stored on DLNA servers. The NBG5615 can function as a DLNA-compliant media server and stream files to DLNA-compliant media clients without any configuration. 184 NBG5615 User’s Guide Chapter 23 USB Media Sharing Workgroup name This is the name given to a set of computers that are connected on a network and share resources such as a printer or files. Windows automatically assigns the workgroup name when you set up a network. File Systems A file system is a way of storing and organizing files on your hard drive and storage device. Often different operating systems such as Windows or Linux have different file systems. The file-sharing feature on your NBG5615 supports New Technology File System (NTFS), File Allocation Table (FAT) and FAT32 file systems. Windows/CIFS Common Internet File System (CIFS) is a standard protocol supported by most operating systems in order to share files across the network. CIFS runs over TCP/IP but uses the SMB (Server Message Block) protocol found in Microsoft Windows for file and printer access; therefore, CIFS will allow all applications, not just Web browsers, to open and share files across the Internet. The NBG5615 uses Common Internet File System (CIFS) protocol for its file sharing functions. CIFS compatible computers can access the USB file storage devices connected to the NBG5615. CIFS protocol is supported on Microsoft Windows, Linux Samba and other operating systems (refer to your systems specifications for CIFS compatibility). Samba SMB is a client-server protocol used by Microsoft Windows systems for sharing files, printers, and so on. Samba is a free SMB server that runs on most Unix and Unix-like systems. It provides an implementation of an SMB client and server for use with non-Microsoft operating systems. File Transfer Protocol This is a method of transferring data from one computer to another over a network such as the Internet. 23.4 Before You Begin Make sure the NBG5615 is connected to your network and turned on. Connect the USB device to one of the NBG5615’s USB ports. The NBG5615 detects the USB device and makes its contents available for browsing. If you are connecting a USB hard drive that comes with an external power supply, make sure it is connected to an appropriate power source that is on. NBG5615 User’s Guide 185 Chapter 23 USB Media Sharing Note: If your USB device cannot be detected by the NBG5615, see the troubleshooting for suggestions. 23.5 DLNA Screen Use this screen to have the NBG5615 act as a DLNA-compliant media server that lets DLNAcompliant media clients on your network play video, music, and photos from the NBG5615 (without having to copy them to another computer). Click M a na ge m e nt > USB M e dia Sha r ing > D LN A. Figure 117 Management > USB Media Sharing > DLNA The following table describes the labels in this screen. Table 75 Management > USB Media Sharing > DLNA LABEL DESCRIPTION Enable DLNA Select this to have the NBG5615 function as a DLNA-compliant media server. USB1/2 Select the media type that you want to share on the USB device connected to the NBG5615’s USB port. Rescan Click this button to have the NBG5615 scan the media files on the connected USB device and do indexing of the file list again so that DLNA clients can find the new files if any. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 23.6 SAMBA Screen Use this screen to set up file-sharing via the NBG5615 using Windows Explorer or the workgroup name. You can also configure the workgroup name and create file-sharing user accounts. Click M a na ge m e nt > USB M e dia Sha r ing > SAM BA. 186 NBG5615 User’s Guide Chapter 23 USB Media Sharing Figure 118 Management > USB Media Sharing > SAMBA The following table describes the labels in this screen. Table 76 Management > USB Media Sharing > SAMBA LABEL DESCRIPTION Enable SAMBA Select this to enable file sharing through the NBG5615 using Windows Explorer or by browsing to your work group. Name Specify the name to identify the NBG5615 in a work group. Work Group You can add the NBG5615 to an existing or a new workgroup on your network. Enter the name of the workgroup which your NBG5615 automatically joins. You can set the NBG5615’s workgroup name to be exactly the same as the workgroup name to which your computer belongs to. Note: The NBG5615 will not be able to join the workgroup if your local area network has restrictions set up that do not allow devices to join a workgroup. In this case, contact your network administrator. Decription Enter the description of the NBG5615 in a work group. USB1/2 Specify the user’s access rights to the USB storage device which is connected to the NBG5615’s USB port. Re a d & W r it e - The user has read and write rights, meaning that the user can create and edit the files on the connected USB device. Re a d - The user has read rights only and can not create or edit the files on the connected USB device. User Accounts Before you can share files you need a user account. Configure the following fields to set up a file-sharing account. This is the index number of the user account. NBG5615 User’s Guide 187 Chapter 23 USB Media Sharing Table 76 Management > USB Media Sharing > SAMBA (continued) LABEL DESCRIPTION Enable This field displays whether a user account is activated or not. Select the check box to enable the account. Clear the check box to disable the account. User Name Enter a user name that will be allowed to access the shared files. You can enter up to 20 characters. Only letters and numbers allowed. Password Enter the password used to access the shared files. You can enter up to 20 characters. Only letters and numbers are allowed. The password is case sensitive. USB1/2 Select the USB port(s) of the NBG5615. The configured user can access the files on the USB device(s) connected to the selected USB port(s) only. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 23.7 FTP Screen Use this screen to set up file sharing via the NBG5615 using FTP and create user accounts. Click M a na ge m e nt > USB M e dia Sha r ing > FTP. Figure 119 Management > USB Media Sharing > FTP The following table describes the labels in this screen. Table 77 Management > USB Media Sharing > FTP 188 LABEL DESCRIPTION Enable FTP Select this to enable the FTP server on the NBG5615 for file sharing using FTP. Port You may change the server port number for FTP if needed, however you must use the same port number in order to use that service for file sharing. User Accounts Before you can share files you need a user account. Configure the following fields to set up a file-sharing account. This is the index number of the user account. NBG5615 User’s Guide Chapter 23 USB Media Sharing Table 77 Management > USB Media Sharing > FTP (continued) LABEL DESCRIPTION Enable This field displays whether a user account is activated or not. Select the check box to enable the account. Clear the check box to disable the account. User Name Enter a user name that will be allowed to access the shared files. You can enter up to 20 characters. Only letters and numbers allowed. Password Enter the password used to access the shared files. You can enter up to 20 characters. Only letters and numbers are allowed. The password is case sensitive. USB1/2 Specify the user’s access rights to the USB storage device which is connected to the NBG5615’s USB port. Re a d & W r it e - The user has read and write rights, meaning that the user can create and edit the files on the connected USB device. Re a d - The user has read rights only and can not create or edit the files on the connected USB device. N on e - The user cannot access the files on the USB device(s) connected to the USB port. Upstream Bandwidth Enter the maximum bandwidth (in Kbps) allowed for incoming FTP traffic. Downstream Bandwidth Enter the maximum bandwidth (in Kbps) allowed for outgoing FTP traffic. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 23.8 Example of Accessing Your Shared Files From a Computer You can use Windows Explorer or FTP to access the USB storage devices connected to the NBG5615. This example shows you how to use Microsoft’s Windows XP to browse your shared files. Refer to your operating system’s documentation for how to browse your file structure. 23.8.1 Use Windows Explorer to Share Files You should have enabled file sharing and create a user account (Bob/1234 for example) with read and write access to USB 1 in the USB M e dia Sha r ing > SAM BA screen. Open Windows Explorer to access the connected USB device using either Windows Explorer browser or by browsing to your workgroup. NBG5615 User’s Guide 189 Chapter 23 USB Media Sharing In Windows Explorer’s Address bar type a double backslash “\\” followed by the IP address of the NBG5615 (the default IP address of the NBG5615 in router mode is 192.168.1.1) and press [ENTER]. A screen asking for password authentication appears. Type the user name and password (Bob and 1234 in this example) and click OK. Note: Once you log into the shared folder via your NBG5615, you do not have to relogin unless you restart your computer. 190 NBG5615 User’s Guide Chapter 23 USB Media Sharing You can also use the workgroup name to access files by browsing to the workgroup folder using the folder tree on the left side of the screen. It is located under M y N e t w or k Pla ce s. In this example the workgroup name is the default “Workgroup”. 23.8.2 Use FTP to Share Files You can use FTP to access the USB storage devices connected to the NBG5615. In this example, we use the web browser to share files via FTP from the LAN. The way or screen you log into the FTP server (on the NBG5615) varies depending on your FTP client. See your FTP client documentation for more information. You should have enabled file sharing and create a user account (Bob/1234 for example) with read and write access to USB 1 in the USB M e dia Sha r ing > FTP screen. In your web browser’s address or URL bar type “ftp://” followed by the IP address of the NBG5615 (the default LAN IP address of the NBG5615 in router mode is 192.168.1.1) and click Go or press [ENTER]. NBG5615 User’s Guide 191 Chapter 23 USB Media Sharing 192 A screen asking for password authentication appears. Enter the user name and password (you configured in the USB M e dia Sha r ing > FTP screen) and click Log On. The screen changes and shows you the folder for the USB storage device connected to your NBG5615. Double-click the folder to display the contents in it. NBG5615 User’s Guide C HAPTER 24 Maintenance 24.1 Overview This chapter provides information on the M a int e na nce screens. 24.2 What You Can Do • Use the Ge n e r a l screen to set the timeout period of the management session (Section 24.3 on page 193). • Use the Pa ssw or d screen to change your NBG5615’s system password (Section 24.4 on page 194). • Use the Tim e screen to change your NBG5615’s time and date (Section 24.5 on page 195). • Use the Fir m w a r e Upgr a de screen to upload firmware to your NBG5615 (Section 24.6 on page 196). • Use the Ba ck u p/ Re st or e screen to view information related to factory defaults, backup configuration, and restoring configuration (Section 24.8 on page 199). • Use the Re st a r t screen to reboot the NBG5615 without turning the power off (Section 24.8 on page 199). • Use the La n gu a ge screen to change the language for the Web Configurator (Section 24.9 on page 199) . • Use the Sys OP M ode screen to select how you want to use your NBG5615 (Section 24.11 on page 201). 24.3 General Screen Use this screen to set the management session timeout period. Click M a int e n a n ce > Ge n e r a l. The following screen displays. Figure 120 Maintenance > General NBG5615 User’s Guide 193 Chapter 24 Maintenance The following table describes the labels in this screen. Table 78 Maintenance > General LABEL DESCRIPTION System Name System Name is a unique name to identify the NBG5615 in an Ethernet network. Domain Name Enter the domain name you want to give to the NBG5615. Administrator Inactivity Timer Type how many minutes a management session can be left idle before the session times out. The default is 5 minutes. After it times out you have to log in with your password again. Very long idle timeouts may have security risks. A value of "0" means a management session never times out, no matter how long it has been left idle (not recommended). Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 24.4 Password Screen It is strongly recommended that you change your NBG5615's password. If you forget your NBG5615's password (or IP address), you will need to reset the device. See Section 24.8 on page 199 for details. Click M a int e na nce > Pa ssw or d. The screen appears as shown. Figure 121 Maintenance > Password The following table describes the labels in this screen. Table 79 Maintenance > Password 194 LABEL DESCRIPTION Password Setup Change your NBG5615’s password (recommended) using the fields as shown. Old Password Type the default password or the existing password you use to access the system in this field. New Password Type your new system password (up to 30 characters). Note that as you type a password, the screen displays an asterisk (*) for each character you type. Retype to Confirm Type the new password again in this field. Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. NBG5615 User’s Guide Chapter 24 Maintenance 24.5 Time Setting Screen Use this screen to configure the NBG5615’s time based on your local time zone. To change your NBG5615’s time and date, click M a int e na nce > Tim e . The screen appears as shown. Figure 122 Maintenance > Time The following table describes the labels in this screen. Table 80 Maintenance > Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NBG5615. Each time you reload this page, the NBG5615 synchronizes the time with the time server. Current Date This field displays the date of your NBG5615. Each time you reload this page, the NBG5615 synchronizes the date with the time server. Current Time and Date Manual Select this radio button to enter the time and date manually. If you configure a new time and date, Time Zone and Daylight Saving at the same time, the new time and date you entered has priority and the Time Zone and Daylight Saving settings do not affect it. New Time This field displays the last updated time from the time server or the last time configured manually. (hh:mm:ss) When you select M a n u a l, enter the new time in this field and then click Apply. NBG5615 User’s Guide 195 Chapter 24 Maintenance Table 80 Maintenance > Time (continued) LABEL DESCRIPTION New Date This field displays the last updated date from the time server or the last date configured manually. (yyyy/mm/dd) When you select M a n u a l, enter the new date in this field and then click Apply. Get from Time Server Select this radio button to have the NBG5615 get the time and date from the time server you specified below. User Defined Time Server Address Select Use r D e fin e d Tim e Se r ve r Addr e ss and enter the IP address or URL (up to 20 extended ASCII characters in length) of your time server. Check with your ISP/network administrator if you are unsure of this information. Time Zone Setup Time Zone Choose the time zone of your location. This will set the time difference between your time zone and Greenwich Mean Time (GMT). Daylight Savings Daylight saving is a period from late spring to early fall when many countries set their clocks ahead of normal local time by one hour to give more daytime light in the evening. Select this option if you use Daylight Saving Time. Start Date Configure the day and time when Daylight Saving Time starts if you selected D a yligh t Sa vin gs. The a t field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the second Sunday of March. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Se con d, Su n da y, M a r ch and select 2 in the a t field. Daylight Saving Time starts in the European Union on the last Sunday of March. All of the time zones in the European Union start using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select La st , Su n da y, M a r ch . The time you select in the a t field depends on your time zone. In Germany for instance, you would select 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1). End Date Configure the day and time when Daylight Saving Time ends if you selected D a yligh t Sa vin gs. The a t field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time ends in the United States on the first Sunday of November. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United States you would select Fir st , Sun da y, N ove m be r and select 2 in the a t field. Daylight Saving Time ends in the European Union on the last Sunday of October. All of the time zones in the European Union stop using Daylight Saving Time at the same moment (1 A.M. GMT or UTC). So in the European Union you would select La st , Su n da y, Oct obe r. The time you select in the a t field depends on your time zone. In Germany for instance, you would select 2 because Germany's time zone is one hour ahead of GMT or UTC (GMT+1). Apply Click Apply to save your changes back to the NBG5615. Cancel Click Ca n ce l to begin configuring this screen afresh. 24.6 Firmware Upgrade Screen Find firmware at www.zyxel.com in a file that uses the version number and project code with a “*.bin” extension, e.g., “V1.00(AAGI.0).bin”. The upload process uses HTTP (Hypertext Transfer Protocol) and may take up to two minutes. After a successful upload, the system will reboot. 196 NBG5615 User’s Guide Chapter 24 Maintenance Click M a int e na nce > Fir m w a r e Upgr a de . Follow the instructions in this screen to upload firmware to your NBG5615. Figure 123 Maintenance > Firmware Upgrade The following table describes the labels in this screen. Table 81 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Br ow se ... to find it. Browse... Click Br ow se ... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Uploa d to begin the upload process. This process may take up to two minutes. Check for Latest Firmware Now Click this to check for the latest updated firmware. Note: Do not turn off the NBG5615 while firmware upload is in progress! After you see the Fir m w a r e Uploa d I n Pr oce ss screen, wait two minutes before logging into the NBG5615 again. The NBG5615 automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 124 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the St a t us screen. If the upload was not successful, an error message appears. Click Re t ur n to go back to the Fir m w a r e Upgr a de screen. NBG5615 User’s Guide 197 Chapter 24 Maintenance 24.7 Configuration Backup/Restore Screen Backup configuration allows you to back up (save) the NBG5615’s current configuration to a file on your computer. Once your NBG5615 is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings. Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG5615. Click M a in t e n a n ce > Ba ck u p/ Re st or e . Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 125 Maintenance > Backup/Restore The following table describes the labels in this screen. Table 82 Maintenance > Backup/Restore 198 LABEL DESCRIPTION Backup Click Ba ck up to save the NBG5615’s current configuration to your computer. File Path Type in the location of the file you want to upload in this field or click Br ow se ... to find it. Browse... Click Br ow se ... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them. NBG5615 User’s Guide Chapter 24 Maintenance Table 82 Maintenance > Backup/Restore (continued) LABEL DESCRIPTION Upload Click Uploa d to begin the upload process. Note: Do not turn off the NBG5615 while configuration file upload is in progress. After you see a “configuration upload successful” screen, you must then wait one minute before logging into the NBG5615 again. The NBG5615 automatically restarts in this time causing a temporary network disconnect. If you see an error screen, click Back to return to the Backup/Restore screen. Reset Pressing the Re se t button in this section clears all user-entered configuration information and returns the NBG5615 to its factory defaults. You can also press the RESET button on the rear panel to reset the factory defaults of your NBG5615. Refer to the chapter about introducing the Web Configurator for more information on the RESET button. Note: If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default NBG5615 IP address (192.168.1.1). See Appendix B on page 221 for details on how to set up your computer’s IP address. 24.8 Restart Screen System restart allows you to reboot the NBG5615 without turning the power off. Click M a int e na nce > Re st a r t to open the following screen. Figure 126 Maintenance > Restart Click Re st a r t to have the NBG5615 reboot. This does not affect the NBG5615's configuration. 24.9 Language Screen Use this screen to change the language for the Web Configurator. Select the language you prefer and click Apply. The Web Configurator language changes after a while without restarting the NBG5615. NBG5615 User’s Guide 199 Chapter 24 Maintenance Figure 127 Maintenance > Language 24.10 System Operation Mode Overview The Sys OP M ode (System Operation Mode) function lets you configure your NBG5615 as a router or access point. You can choose between Rout e r M ode , and Acce ss Poin t M ode depending on your network topology and the features you require from your device. The following describes the device modes available in your NBG5615. Router A router connects your local network with another network, such as the Internet. The router has two IP addresses, the LAN IP address and the WAN IP address. Figure 128 LAN and WAN IP Addresses in Router Mode Access Point An access point enabled all ethernet ports to be bridged together and be in the same subnet. To connect to the Internet, another device, such as a router, is required. 200 NBG5615 User’s Guide Chapter 24 Maintenance Figure 129 Access Point Mode 24.11 Sys OP Mode Screen Use this screen to select how you want to use your NBG5615. Figure 130 Maintenance > Sys OP Mode The following table describes the labels in the Ge n e r a l screen. Table 83 Maintenance > Sys OP Mode LABEL DESCRIPTION Configuration Mode Router Mode Select Rou t e r M ode if your device routes traffic between a local network and another network such as the Internet. This mode offers services such as a firewall or bandwidth management. You can configure the IP address settings on your WAN port. Contact your ISP or system administrator for more information on appropriate settings. NBG5615 User’s Guide 201 Chapter 24 Maintenance Table 83 Maintenance > Sys OP Mode (continued) LABEL DESCRIPTION Access Point Mode Select Acce ss Poin t M ode if your device bridges traffic between clients on the same network. • • • • • In Acce ss Poin t M ode , all Ethernet ports have the same IP address. All ports on the rear panel of the device are LAN ports, including the port labeled WAN. There is no WAN port. The DHCP server on your device is disabled. Router functions (such as NAT, bandwidth management, remote management, firewall and so on) are not available when the NBG5615 is in Acce ss Poin t M ode . The IP address of the device on the local network is set to 192.168.1.2. Apply Click Apply to save your settings. Cancel Click Ca n ce l to return your settings to the default (Rou t e r ). Note: If you select the incorrect system operation Mode you may not be able to connect to the Internet. 202 NBG5615 User’s Guide C HAPTER 25 Troubleshooting 25.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG5615 Access and Login • Internet Access • Resetting the NBG5615 to Its Factory Defaults • Wireless Connections • USB Device Problems • ZyXEL Share Center Utility Problems 25.2 Power, Hardware Connections, and LEDs The NBG5615 does not turn on. None of the LEDs turn on. Make sure you are using the power adaptor or cord included with the NBG5615. Make sure the power adaptor or cord is connected to the NBG5615 and plugged in to an appropriate power source. Make sure the power source is turned on. Disconnect and re-connect the power adaptor or cord to the NBG5615. If the problem continues, contact the vendor. One of the LEDs does not behave as expected. Make sure you understand the normal behavior of the LED. See Section 1.7 on page 18. Check the hardware connections. See the Quick Start Guide. Inspect your cables for damage. Contact the vendor to replace any damaged cables. NBG5615 User’s Guide 203 Chapter 25 Troubleshooting Disconnect and re-connect the power adaptor to the NBG5615. If the problem continues, contact the vendor. 25.3 NBG5615 Access and Login I don’t know the IP address of my NBG5615. The default IP address of the NBG5615 in Rout e r M ode is 1 9 2 .1 6 8 .1 .1 . The default IP address of the NBG5615 in Acce ss Point M ode is 1 9 2 .1 6 8 .1 .2 . If you changed the IP address and have forgotten it, you might get the IP address of the NBG5615 in Rou t e r M ode by looking up the IP address of the default gateway for your computer. To do this in most Windows computers, click St a r t > Run, enter cm d, and then enter ipconfig. The IP address of the D e fa ult Ga t e w a y might be the IP address of the NBG5615 (it depends on the network), so enter this IP address in your Internet browser. If your NBG5615 in Acce ss Poin t M ode is a DHCP client, you can find your IP address from the DHCP server. This information is only available from the DHCP server which allocates IP addresses on your network. Find this information directly from the DHCP server or contact your system administrator for more information. Reset your NBG5615 to change all settings back to their default. This means your current settings are lost. See Section 25.5 on page 207 in the Tr ou ble shoot ing for information on resetting your NBG5615. I forgot the password. The default password is 1 2 3 4 . If this does not work, you have to reset the device to its factory defaults. See Section 25.5 on page 207. I cannot see or access the Login screen in the Web Configurator. Make sure you are using the correct IP address. • The default IP address of the NBG5615 in Rou t e r M ode is 1 9 2 .1 6 8 .1 .1 . The default IP address of the NBG5615 in Acce ss Point M ode is 1 9 2 .1 6 8 .1 .2 . • If you changed the IP address (Section 13.4 on page 130), use the new IP address. • If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I don’t know the IP address of my NBG5615. 204 NBG5615 User’s Guide Chapter 25 Troubleshooting Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. Make sure your Internet browser does not block pop-up windows and has JavaScript and Java enabled. See Appendix A on page 211. Make sure your computer is in the same subnet as the NBG5615. (If you know that there are routers between your computer and the NBG5615, skip this step.) • If there is a DHCP server on your network, make sure your computer is using a dynamic IP address. See Section 13.4 on page 130. • If there is no DHCP server on your network, make sure your computer’s IP address is in the same subnet as the NBG5615. See Section 13.4 on page 130. Reset the device to its factory defaults, and try to access the NBG5615 with the default IP address. See Section 1.5 on page 16. If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Adva n ce d Sugge st ions • Try to access the NBG5615 using another service, such as Telnet. If you can access the NBG5615, check the remote management settings and firewall rules to find out why the NBG5615 does not respond to HTTP. • If your computer is connected to the W AN port or is connected wirelessly, use a computer that is connected to a LAN /ETH ERN ET port. I can see the Login screen, but I cannot log in to the NBG5615. Make sure you have entered the password correctly. The default password is 1 2 3 4 . This field is case-sensitive, so make sure [Caps Lock] is not on. This can happen when you fail to log out properly from your last session. Try logging in again after 5 minutes. Disconnect and re-connect the power adaptor or cord to the NBG5615. If this does not work, you have to reset the device to its factory defaults. See Section 25.5 on page 207. 25.4 Internet Access I cannot access the Internet. NBG5615 User’s Guide 205 Chapter 25 Troubleshooting Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. Go to M a int e n a n ce > Sys OP M ode . Check your System Operation Mode setting. • If the NBG5615 is in Rou t e r M ode , make sure the WAN port is connected to a broadband modem or router with Internet access. Your computer and the NBG5615 should be in the same subnet. • If the NBG5615 is in Acce ss Poin t M ode , make sure the WAN port is connected to a broadband modem or router with Internet access and your computer is set to obtain an dynamic IP address. If the NBG5615 is in Rout e r M ode , make sure you entered your ISP account information correctly in the wizard or the WAN screen. These fields are case-sensitive, so make sure [Caps Lock] is not on. If you are trying to access the Internet wirelessly, make sure the wireless settings in the wireless client are the same as the settings in the AP. Disconnect all the cables from your device, and follow the directions in the Quick Start Guide again. If the problem continues, contact your ISP. I cannot access the Internet anymore. I had access to the Internet (with the NBG5615), but my Internet connection is not available anymore. Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.7 on page 18. Reboot the NBG5615. If the problem continues, contact your ISP. The Internet connection is slow or intermittent. There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.7 on page 18. If the NBG5615 is sending or receiving a lot of information, try closing some programs that use the Internet, especially peer-to-peer applications. Check the signal strength. If the signal strength is low, try moving the NBG5615 closer to the AP if possible, and look around to see if there are any devices that might be interfering with the wireless network (for example, microwaves, other wireless networks, and so on). Reboot the NBG5615. If the problem continues, contact the network administrator or vendor, or try one of the advanced suggestions. Adva n ce d Sugge st ion 206 NBG5615 User’s Guide Chapter 25 Troubleshooting • Check the settings for QoS. If it is disabled, you might consider activating it. 25.5 Resetting the NBG5615 to Its Factory Defaults If you reset the NBG5615, you lose all of the changes you have made. The NBG5615 re-loads its default settings, and the password resets to 1 2 3 4 . You have to make all of your changes again. You will lose all of your changes when you push the RESET button. To reset the NBG5615: Make sure the power LED is on. Press the RESET button for one to four seconds to restart/reboot the NBG5615. Press the RESET button for longer than five seconds to set the NBG5615 back to its factory-default configurations. If the NBG5615 restarts automatically, wait for the NBG5615 to finish restarting, and log in to the Web Configurator. The password is “1234”. If the NBG5615 does not restart automatically, disconnect and reconnect the NBG5615’s power. Then, follow the directions above again. 25.6 Wireless Connections I cannot access the NBG5615 or ping any computer from the WLAN. Make sure the wireless LAN is enabled on the NBG5615. Make sure the wireless adapter on your computer is working properly. Make sure the wireless adapter installed on your computer is IEEE 802.11 compatible and supports the same wireless standard as the NBG5615. Make sure your computer (with a wireless adapter installed) is within the transmission range of the NBG5615. Check that both the NBG5615 and the wireless adapter on your computer are using the same wireless and wireless security settings. Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the NBG5615. NBG5615 User’s Guide 207 Chapter 25 Troubleshooting Make sure you allow the NBG5615 to be remotely accessed through the WLAN interface. Check your remote management settings. • See the chapter on Wireless LAN in the User’s Guide for more information. I set up URL keyword blocking, but I can still access a website that should be blocked. Make sure that you select the En a ble URL Ke yw or d Block in g check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Ke yw or d List . If a keyword that is listed in the Ke yw or d List is not blocked when it is found in a URL, customize the keyword blocking using commands. See the Customizing Keyword Blocking URL Checking section in the Content Filtering chapter. I cannot access the Web Configurator after I switched to AP mode. When you change from router mode to AP mode, your computer must have an IP address in the range between “192.168.1.3” and “192.168.1.254”. Refer to Appendix B on page 221 for instructions on how to change your computer’s IP address. What factors may cause intermittent or unstabled wireless connection? How can I solve this problem? The following factors may cause interference: • Obstacles: walls, ceilings, furniture, and so on. • Building Materials: metal doors, aluminum studs. • Electrical devices: microwaves, monitors, electric motors, cordless phones, and other wireless devices. To optimize the speed and quality of your wireless connection, you can: • Move your wireless device closer to the AP if the signal strength is low. • Reduce wireless interference that may be caused by other wireless networks or surrounding wireless electronics such as cordless phones. • Place the AP where there are minimum obstacles (such as walls and ceilings) between the AP and the wireless client. • Reduce the number of wireless clients connecting to the same AP simultaneously, or add additional APs if necessary. • Try closing some programs that use the Internet, especially peer-to-peer applications. If the wireless client is sending or receiving a lot of information, it may have too many programs open that use the Internet. 208 NBG5615 User’s Guide Chapter 25 Troubleshooting • Position the antennas for best reception. If the AP is placed on a table or floor, point the antennas upwards. If the AP is placed at a high position, point the antennas downwards. Try pointing the antennas in different directions and check which provides the strongest signal to the wireless clients. 25.7 USB Device Problems I cannot access or see a USB device that is connected to the NBG5615. Be sure to install the ZyXEL NetUSB Share Center Utility (for NetUSB functionality) first from the included disc, or download the latest version from the zyxel.com website. Disconnect the problematic USB device, then reconnect it to the NBG5615. Ensure that the USB device has power. Check your cable connections. Restart the NBG5615 by disconnecting the power and then reconnecting it. If the USB device requires a special driver, install the driver from the installation disc that came with the device. After driver installation, reconnect the USB device to the NBG5615 and try to connect to it again with your computer. If the problem persists, contact your vendor. What kind of USB devices do the NBG5615 support? It is strongly recommended to use version 2.0 or lower USB storage devices (such as memory sticks, USB hard drives) and/or USB devices (such as USB printers). Other USB products are not guaranteed to function properly with the NBG5615. 25.8 ZyXEL Share Center Utility Problems I cannot access or see a USB device that is connected to the NBG5615. Disconnect the problematic USB device, then reconnect it to the NBG5615. Ensure that the USB device in question has power. NBG5615 User’s Guide 209 Chapter 25 Troubleshooting Check your cable connections. Restart the NBG5615 by disconnecting the power and then reconnecting it. If the USB device requires a special driver, install the driver from the installation disc that came with the device. After driver installation, reconnect the USB device to the NBG5615 and try to connect to it again with your computer. If the problem persists, contact your vendor. I cannot install the ZyXEL Share Center Utility. 210 Make sure that the set up program is one required for your operating system. Install the latest patches and updates for your operating system. Check the zyxel.com download site for a newer version of the utility. NBG5615 User’s Guide A PPENDIX Pop-up Windows, JavaScript and Java Permissions In order to use the web configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: The screens used below belong to Internet Explorer version 6, 7 and 8. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device. Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or allow pop-up blocking and create an exception for your device’s IP address. Disable Pop-up Blockers In Internet Explorer, select Tools, Pop- u p Block e r and then select Tur n Off Pop- up Block e r. Figure 131 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop- u p Block e r section in the Pr iva cy tab. In Internet Explorer, select Tools, I nt e r ne t Opt ions, Pr iva cy. Clear the Block pop- ups check box in the Pop- u p Block e r section of the screen. This disables any web pop-up blockers you may have enabled. NBG5615 User’s Guide 211 Appendix A Pop-up Windows, JavaScript and Java Permissions Figure 132 Internet Options: Privacy Click Apply to save this setting. Enable Pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps. 212 In Internet Explorer, select Tools, I nt e r ne t Opt ions and then the Pr iva cy tab. Select Se t t ings…to open the Pop- up Block e r Se t t ings screen. NBG5615 User’s Guide Appendix A Pop-up Windows, JavaScript and Java Permissions Figure 133 Internet Options: Privacy Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1. Click Add to move the IP address to the list of Allow e d sit e s. Figure 134 Pop-up Blocker Settings NBG5615 User’s Guide 213 Appendix A Pop-up Windows, JavaScript and Java Permissions Click Close to return to the Pr iva cy screen. Click Apply to save this setting. JavaScript If pages of the web configurator do not display properly in Internet Explorer, check that JavaScript are allowed. In Internet Explorer, click Tools, I n t e r ne t Opt ion s and then the Se cur it y tab. Figure 135 Internet Options: Security 214 Click the Cu st om Le ve l... button. Scroll down to Scr ipt ing. Under Act ive scr ipt ing make sure that Ena ble is selected (the default). Under Scr ipt ing of Ja va a pple t s make sure that Ena ble is selected (the default). Click OK to close the window. NBG5615 User’s Guide Appendix A Pop-up Windows, JavaScript and Java Permissions Figure 136 Security Settings - Java Scripting Java Permissions From Internet Explorer, click Tools, I nt e r ne t Opt ions and then the Se cu r it y tab. Click the Cu st om Le ve l... button. Scroll down to M icr osoft VM . Under Ja va pe r m issions make sure that a safety level is selected. Click OK to close the window. NBG5615 User’s Guide 215 Appendix A Pop-up Windows, JavaScript and Java Permissions Figure 137 Security Settings - Java JAVA (Sun) From Internet Explorer, click Tools, I nt e r ne t Opt ions and then the Adva n ce d tab. Make sure that Use Ja va 2 for < a pple t > under Ja va ( Sun) is selected. Click OK to close the window. Figure 138 Java (Sun) 216 NBG5615 User’s Guide Appendix A Pop-up Windows, JavaScript and Java Permissions Mozilla Firefox Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary slightly. The steps below apply to Mozilla Firefox 3.0 as well. You can enable Java, Javascript and pop-ups in one screen. Click Tools, then click Opt ions in the screen that appears. Figure 139 Mozilla Firefox: TOOLS > Options Click Cont e n t to show the screen below. Select the check boxes as shown in the following screen. Figure 140 Mozilla Firefox Content Security NBG5615 User’s Guide 217 Appendix A Pop-up Windows, JavaScript and Java Permissions Opera Opera 10 screens are used here. Screens for other versions may vary slightly. Allowing Pop-Ups From Opera, click Tools, then Pr e fe r e nce s. In the Ge n e r a l tab, go to Ch oose h ow you pr e fe r t o h a n dle pop- ups and select Ope n a ll pop- ups. Figure 141 Opera: Allowing Pop-Ups Enabling Java From Opera, click Tools, then Pr e fe r e nce s. In the Adva nce d tab, select Cont e nt from the leftside menu. Select the check boxes as shown in the following screen. 218 NBG5615 User’s Guide Appendix A Pop-up Windows, JavaScript and Java Permissions Figure 142 Opera: Enabling Java To customize JavaScript behavior in the Opera browser, click Ja va Scr ipt Opt ions. Figure 143 Opera: JavaScript Options Select the items you want Opera’s JavaScript to apply. NBG5615 User’s Guide 219 Appendix A Pop-up Windows, JavaScript and Java Permissions 220 NBG5615 User’s Guide A PPENDIX Setting Up Your Computer’s IP Address Note: Your specific NBG5615 may not support all of the operating systems described in this appendix. See the product specifications for more information about which operating systems are supported. This appendix shows you how to configure the IP settings on your computer in order for it to be able to communicate with the other devices on your network. Windows Vista/XP/2000, Mac OS 9/ OS X, and all versions of UNIX/LINUX include the software components you need to use TCP/IP on your computer. If you manually assign IP information instead of using a dynamic IP, make sure that your network’s computers have IP addresses that place them in the same subnet. In this appendix, you can set up an IP address for: • Windows XP/NT/2000 on page 221 • Windows Vista on page 225 • Windows 7 on page 229 • Mac OS X: 10.3 and 10.4 on page 233 • Mac OS X: 10.5 and 10.6 on page 236 • Linux: Ubuntu 8 (GNOME) on page 239 • Linux: openSUSE 10.3 (KDE) on page 243 Windows XP/NT/2000 The following example uses the default Windows XP display theme but can also apply to Windows 2000 and Windows NT. Click St a r t > Con t r ol Pa n e l. NBG5615 User’s Guide 221 Appendix B Setting Up Your Computer’s IP Address 222 In the Cont r ol Pa n e l, click the N e t w or k Con ne ct ion s icon. Right-click Loca l Ar e a Conne ct ion and then select Pr ope r t ie s. On the Ge n e r a l tab, select I n t e r n e t Pr ot ocol ( TCP/ I P) and then click Pr ope r t ie s. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address The I nt e r ne t Pr ot ocol TCP/ I P Pr ope r t ie s window opens. NBG5615 User’s Guide 223 Appendix B Setting Up Your Computer’s IP Address Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your network administrator or ISP assigns your IP address dynamically. Select Use t h e follow in g I P Addr e ss and fill in the I P a ddr e ss, Subn e t m a sk , and D e fa ult ga t e w a y fields if you have a static IP address that was assigned to you by your network administrator or ISP. You may also have to enter a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S se r ve r , if that information was provided. Click OK to close the I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window. Click OK to close the Loca l Ar e a Con n e ct ion Pr ope r t ie s window. Verifying Settings Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt . In the Com m a nd Pr om pt window, type "ipconfig" and then press [ENTER]. You can also go to St a r t > Con t r ol Pa n e l > N e t w or k Con n e ct ions, right-click a network connection, click St a t u s and then click the Suppor t tab to view your IP address and connection information. 224 NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address Windows Vista This section shows screens from Windows Vista Professional. Click St a r t > Cont r ol Pa n e l. In the Cont r ol Pa n e l, click the N e t w or k a nd I n t e r n e t icon. Click the N e t w or k a n d Sh a r ing Ce n t e r icon. Click M a n a ge n e t w or k con n e ct ions. NBG5615 User’s Guide 225 Appendix B Setting Up Your Computer’s IP Address Right-click Loca l Ar e a Conne ct ion and then select Pr ope r t ie s. Note: During this procedure, click Con t inu e whenever Windows displays a screen saying that it needs your permission to continue. 226 Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and then select Pr ope r t ie s. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens. NBG5615 User’s Guide 227 Appendix B Setting Up Your Computer’s IP Address Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your network administrator or ISP assigns your IP address dynamically. Select Use t h e follow in g I P Addr e ss and fill in the I P a ddr e ss, Subn e t m a sk , and D e fa ult ga t e w a y fields if you have a static IP address that was assigned to you by your network administrator or ISP. You may also have to enter a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S se r ve r , if that information was provided.Click Adva nce d. Click OK to close the I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window. 10 Click OK to close the Loca l Ar e a Con n e ct ion Pr ope r t ie s window. Verifying Settings Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt . In the Com m a nd Pr om pt window, type "ipconfig" and then press [ENTER]. You can also go to St a r t > Con t r ol Pa n e l > N e t w or k Con n e ct ions, right-click a network connection, click St a t u s and then click the Suppor t tab to view your IP address and connection information. 228 NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address Windows 7 This section shows screens from Windows 7 Enterprise. Click St a r t > Cont r ol Pa n e l. In the Cont r ol Pa n e l, click Vie w ne t w or k st a t us a nd t a sk s under the N e t w or k a n d I n t e r n e t category. Click Ch a n ge a da pt e r se t t in gs. Double click Loca l Ar e a Conne ct ion and then select Pr ope r t ie s. NBG5615 User’s Guide 229 Appendix B Setting Up Your Computer’s IP Address Note: During this procedure, click Con t inu e whenever Windows displays a screen saying that it needs your permission to continue. 230 Select I n t e r n e t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) and then select Pr ope r t ie s. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address The I nt e r ne t Pr ot ocol Ve r sion 4 ( TCP/ I Pv4 ) Pr ope r t ie s window opens. NBG5615 User’s Guide 231 Appendix B Setting Up Your Computer’s IP Address Select Obt a in a n I P a ddr e ss a ut om a t ica lly if your network administrator or ISP assigns your IP address dynamically. Select Use t h e follow in g I P Addr e ss and fill in the I P a ddr e ss, Subn e t m a sk , and D e fa ult ga t e w a y fields if you have a static IP address that was assigned to you by your network administrator or ISP. You may also have to enter a Pr e fe r r e d D N S se r ve r and an Alt e r na t e D N S se r ve r , if that information was provided. Click Adva nce d if you want to configure advanced settings for IP, DNS and WINS. Click OK to close the I n t e r ne t Pr ot ocol ( TCP/ I P) Pr ope r t ie s window. Click OK to close the Loca l Ar e a Con n e ct ion Pr ope r t ie s window. Verifying Settings 232 Click St a r t > All Pr ogr a m s > Acce ssor ie s > Com m a nd Pr om pt . In the Com m a nd Pr om pt window, type "ipconfig" and then press [ENTER]. The IP settings are displayed as follows. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address Mac OS X: 10.3 and 10.4 The screens in this section are from Mac OS X 10.4 but can also apply to 10.3. Click Apple > Syst e m Pr e fe r e nce s. In the Syst e m Pr e fe r e nce s window, click the N e t w or k icon. NBG5615 User’s Guide 233 Appendix B Setting Up Your Computer’s IP Address 234 When the N e t w or k preferences pane opens, select Built - in Et he r ne t from the network connection type list, and then click Configu r e . For dynamically assigned settings, select Usin g D H CP from the Configu r e I Pv4 list in the TCP/ I P tab. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configu r e I Pv4 list, select M a nua lly. • In the I P Addr e ss field, type your IP address. • In the Subn e t M a sk field, type your subnet mask. • In the Rou t e r field, type the IP address of your device. Click Apply N ow and close the window. Verifying Settings Check your TCP/IP properties by clicking Applica t ions > Ut ilit ie s > N e t w or k Ut ilit ie s, and then selecting the appropriate N e t w or k I nt e r fa ce from the I n fo tab. NBG5615 User’s Guide 235 Appendix B Setting Up Your Computer’s IP Address Figure 144 Mac OS X 10.4: Network Utility Mac OS X: 10.5 and 10.6 The screens in this section are from Mac OS X 10.5 but can also apply to 10.6. 236 Click Apple > Syst e m Pr e fe r e nce s. In Syst e m Pr e fe r e n ce s, click the N e t w or k icon. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address When the N e t w or k preferences pane opens, select Et he r ne t from the list of available connection types. From the Configu r e list, select Usin g D H CP for dynamically assigned settings. NBG5615 User’s Guide 237 Appendix B Setting Up Your Computer’s IP Address For statically assigned settings, do the following: • From the Configu r e list, select M a nua lly. • In the I P Addr e ss field, enter your IP address. • In the Subn e t M a sk field, enter your subnet mask. • In the Rou t e r field, enter the IP address of your NBG5615. Click Apply and close the window. Verifying Settings Check your TCP/IP properties by clicking Applica t ions > Ut ilit ie s > N e t w or k Ut ilit ie s, and then selecting the appropriate N e t w or k int e r fa ce from the I nfo tab. 238 NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address Figure 145 Mac OS X 10.5: Network Utility Linux: Ubuntu 8 (GNOME) This section shows you how to configure your computer’s TCP/IP settings in the GNU Object Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default Ubuntu 8 installation. Note: Make sure you are logged in as the root administrator. Follow the steps below to configure your computer IP address in GNOME: Click Syst e m > Adm in ist r a t ion > N e t w or k . When the N e t w or k Se t t in gs window opens, click Un lock to open the Aut he nt ica t e window. (By default, the Unlock button is greyed out until clicked.) You cannot make changes to your configuration unless you first enter your admin password. NBG5615 User’s Guide 239 Appendix B Setting Up Your Computer’s IP Address 240 In the Aut he nt ica t e window, enter your admin account name and password then click the Aut he nt ica t e button. In the N e t w or k Se t t ings window, select the connection that you want to configure, then click Pr ope r t ie s. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address The Pr ope r t ie s dialog box opens. • In the Configu r a t ion list, select Au t om a t ic Con figu r a t ion ( D H CP) if you have a dynamic IP address. • In the Configur a t ion list, select St a t ic I P a ddr e ss if you have a static IP address. Fill in the I P a ddr e ss, Subne t m a sk , and Ga t e w a y a ddr e ss fields. Click OK to save the changes and close the Pr ope r t ie s dialog box and return to the N e t w or k Se t t in gs screen. If you know your DNS server IP address(es), click the D N S tab in the N e t w or k Se t t in gs window and then enter the DNS server information in the fields provided. NBG5615 User’s Guide 241 Appendix B Setting Up Your Computer’s IP Address Click the Close button to apply the changes. Verifying Settings Check your TCP/IP properties by clicking Syst e m > Adm in ist r a t ion > N e t w or k Tools, and then selecting the appropriate N e t w or k de vice from the D e vice s tab. The I nt e r fa ce St a t ist ics column shows data if your connection is working properly. 242 NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address Figure 146 Ubuntu 8: Network Tools Linux: openSUSE 10.3 (KDE) This section shows you how to configure your computer’s TCP/IP settings in the K Desktop Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and file locations may vary depending on your specific distribution, release version, and individual configuration. The following screens use the default openSUSE 10.3 installation. Note: Make sure you are logged in as the root administrator. Follow the steps below to configure your computer IP address in the KDE: Click K M e n u > Com pu t e r > Adm in ist r a t or Se t t in gs ( Ya ST) . NBG5615 User’s Guide 243 Appendix B Setting Up Your Computer’s IP Address 244 When the Run a s Root - KD E su dialog opens, enter the admin password and click OK. When the Ya ST Cont r ol Ce nt e r window opens, select N e t w or k D e vice s and then click the N e t w or k Ca r d icon. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address When the N e t w or k Se t t in gs window opens, click the Ove r vie w tab, select the appropriate connection N a m e from the list, and then click the Configu r e button. When the N e t w or k Ca r d Se t u p window opens, click the Addr e ss tab NBG5615 User’s Guide 245 Appendix B Setting Up Your Computer’s IP Address Figure 147 openSUSE 10.3: Network Card Setup Select D yna m ic Addr e ss ( D H CP) if you have a dynamic IP address. Select St a t ica lly a ssign e d I P Addr e ss if you have a static IP address. Fill in the I P a ddr e ss, Subne t m a sk , and H ost na m e fields. 246 Click N e x t to save the changes and close the N e t w or k Ca r d Se t up window. If you know your DNS server IP address(es), click the H ost na m e / D N S tab in N e t w or k Se t t in gs and then enter the DNS server information in the fields provided. NBG5615 User’s Guide Appendix B Setting Up Your Computer’s IP Address Click Finish to save your settings and close the window. Verifying Settings Click the KN e t w or k M a na ge r icon on the Ta sk ba r to check your TCP/IP properties. From the Opt ion s sub-menu, select Sh ow Con n e ct ion I n for m a t ion . Figure 148 openSUSE 10.3: KNetwork Manager When the Conn e ct ion St a t u s - KN e t w or k M a n a ge r window opens, click the St a t ist ics t a b to see if your connection is working properly. NBG5615 User’s Guide 247 Appendix B Setting Up Your Computer’s IP Address Figure 149 openSUSE: Connection Status - KNetwork Manager 248 NBG5615 User’s Guide A PPENDIX Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • N a m e : This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Pr ot ocol: This is the type of IP protocol used by the service. If this is TCP/ UD P, then the service uses the same port number with TCP and UDP. If this is USER- D EFI N ED, the Por t ( s) is the IP protocol number, not the port number. • Por t ( s) : This value depends on the Pr ot ocol. Please refer to RFC 1700 for further information about port numbers. • If the Pr ot ocol is TCP, UD P, or TCP/ UD P, this is the IP port number. • If the Pr ot ocol is USER, this is the IP protocol number. • D e scr ipt ion : This is a brief explanation of the applications that use this service or the situations in which this service is used. Table 84 Commonly Used Services NAME PROTOCOL PORT(S) DESCRIPTION AH (IPSEC_TUNNEL) User-Defined 51 The IPSEC AH (Authentication Header) tunneling protocol uses this service. AIM/New-ICQ TCP 5190 AOL’s Internet Messenger service. It is also used as a listening port by ICQ. AUTH TCP 113 Authentication protocol used by some servers. BGP TCP 179 Border Gateway Protocol. BOOTP_CLIENT UDP 68 DHCP Client. BOOTP_SERVER UDP 67 DHCP Server. CU-SEEME TCP 7648 A popular videoconferencing solution from White Pines Software. UDP 24032 DNS TCP/UDP 53 Domain Name Server, a service that matches web names (for example www.zyxel.com) to IP numbers. ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. TCP 1720 NetMeeting uses this protocol. H.323 NBG5615 User’s Guide 249 Appendix C Common Services Table 84 Commonly Used Services (continued) 250 NAME PROTOCOL PORT(S) DESCRIPTION HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce. ICMP User-Defined Internet Control Message Protocol is often used for diagnostic or routing purposes. ICQ UDP 4000 This is a popular Internet chat program. IGMP (MULTICAST) User-Defined Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 The Internet Key Exchange algorithm is used for key distribution and management. IRC TCP/UDP 6667 This is another popular Internet chat program. MSN Messenger TCP 1863 Microsoft Networks’ messenger service uses this protocol. NEW-ICQ TCP 5190 An Internet chat program. NEWS TCP 144 A protocol for news groups. NFS UDP 2049 Network File System - NFS is a client/ server distributed file service that provides transparent file sharing for network environments. NNTP TCP 119 Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service. PING User-Defined Packet INternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable. POP3 TCP 110 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service. REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web. REXEC TCP 514 Remote Execution Daemon. RLOGIN TCP 513 Remote Login. RTELNET TCP 107 Remote Telnet. RTSP TCP/UDP 554 The Real Time Streaming (media control) Protocol (RTSP) is a remote control for multimedia on the Internet. SFTP TCP 115 Simple File Transfer Protocol. NBG5615 User’s Guide Appendix C Common Services Table 84 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION SMTP TCP 25 Simple Mail Transfer Protocol is the message-exchange standard for the Internet. SMTP enables you to move messages from one e-mail server to another. SNMP TCP/UDP 161 Simple Network Management Program. SNMP-TRAPS TCP/UDP 162 Traps for use with the SNMP (RFC:1215). SQL-NET TCP 1521 Structured Query Language is an interface to access data on many different types of database systems, including mainframes, midrange systems, UNIX systems and network servers. SSH TCP/UDP 22 Secure Shell Remote Login Program. STRM WORKS UDP 1558 Stream Works Protocol. SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server. TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and terminal emulation protocol common on the Internet and in UNIX environments. It operates over TCP/ IP networks. Its primary function is to allow users to log into remote host systems. TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution. NBG5615 User’s Guide 251 Appendix C Common Services 252 NBG5615 User’s Guide A PPENDIX Legal Information Copyright Copyright © 2012 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice. Trademarks NetUSB is a trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners. Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. FCC Radiation Exposure Statement • • • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE 802.11b, 802.11g or 802.11n (20MHz) operation of this product in the U.S.A. is firmware-limited to channels 1 through 11. IEEE 802.11n (40MHz) operation of this product in the U.S.A. is firmware-limited to channels 3 through 9. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) this device may not cause interference and 2) this device must accept any interference, including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication. IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. NBG5615 User’s Guide 253 Appendix D Legal Information 率 不 輻 更 率 理 率 率 率 更 不 立 療 輻 率 Notices Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Viewing Certifications Go to http://www.zyxel.com to view this product’s documentation and certifications. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in material or workmanship for a specific period (the Warranty Period) from the date of purchase. The Warranty Period varies by region. Check with your vendor and/or the authorized ZyXEL local distributor for details about the Warranty Period of this product. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind to the purchaser. To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the device at http://www.zyxel.com/web/support_warranty_info.php. Registration Register your product online to receive e-mail notices of firmware upgrades and information at www.zyxel.com for global products, or at www.us.zyxel.com for North American products. Open Source Licenses This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided with the firmware package. You can download the latest firmware at www.zyxel.com. To obtain the source code covered under those Licenses, please contact support@zyxel.com.tw to get it. Regulatory Information European Union The following information applies if you use the product within the European Union. Declaration of Conformity with Regard to EU Directive 1999/5/EC (R&TTE Directive) Compliance Information for 2.4GHz and 5GHz Wireless Products Relevant to the EU and Other Countries Following the EU Directive 1999/5/EC (R&TTE Directive) 254 [Czech] ZyXEL tímto prohlašuje, že tento zařízení je ve shodě se základními požadavky a dalšími příslušnými ustanoveními směrnice 1999/5/EC. [Danish] Undertegnede ZyXEL erklærer herved, at følgende udstyr udstyr overholder de væsentlige krav og øvrige relevante krav i direktiv 1999/5/EF. [German] Hiermit erklärt ZyXEL, dass sich das Gerät Ausstattung in Übereinstimmung mit den grundlegenden Anforderungen und den übrigen einschlägigen Bestimmungen der Richtlinie 1999/5/EU befindet. [Estonian] Käesolevaga kinnitab ZyXEL seadme seadmed vastavust direktiivi 1999/5/EÜ põhinõuetele ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele. English Hereby, ZyXEL declares that this equipment is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC. [Spanish] Por medio de la presente ZyXEL declara que el equipo cumple con los requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva 1999/5/CE. NBG5615 User’s Guide Appendix D Legal Information Η [Greek] Α Χ Α ZyXEL Η Ω Α Α Η ε π ισ ός ΗΓ Α 1999/5/ C. ΦΩ Α Ω Α Α Η Α [French] Par la présente ZyXEL déclare que l'appareil équipements est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/EC. [Italian] Con la presente ZyXEL dichiara che questo attrezzatura è conforme ai requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE. [Latvian] Ar šo ZyXEL deklarē, ka iekārtas atbilst Direktīvas 1999/5/EK būtiskajām prasībām un citiem ar to saistītajiem noteikumiem. [Lithuanian] Šiuo ZyXEL deklaruoja, kad šis įranga atitinka esminius reikalavimus ir kitas 1999/5/EB Direktyvos nuostatas. [Dutch] Hierbij verklaart ZyXEL dat het toestel uitrusting in overeenstemming is met de essentiële eisen en de andere relevante bepalingen van richtlijn 1999/5/EC. [Maltese] Hawnhekk, ZyXEL, jiddikjara li dan tagħmir jikkonforma mal-ħtiġijiet essenzjali u ma provvedimenti oħrajn relevanti li hemm fid-Dirrettiva 1999/5/EC. [Hungarian] Alulírott, ZyXEL nyilatkozom, hogy a berendezés megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EK irányelv egyéb elõírásainak. [Polish] Niniejszym ZyXEL oświadcza, że sprzęt jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC. [Portuguese] ZyXEL declara que este equipamento está conforme com os requisitos essenciais e outras disposições da Directiva 1999/5/EC. [Slovenian] ZyXEL izjavlja, da je ta oprema v skladu z bistvenimi zahtevami in ostalimi relevantnimi določili direktive 1999/5/EC. [Slovak] ZyXEL týmto vyhlasuje, že zariadenia spĺňa základné požiadavky a všetky príslušné ustanovenia Smernice 1999/5/EC. [Finnish] ZyXEL vakuuttaa täten että laitteet tyyppinen laite on direktiivin 1999/5/EY oleellisten vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen. [Swedish] Härmed intygar ZyXEL att denna utrustning står I överensstämmelse med de väsentliga egenskapskrav och övriga relevanta bestämmelser som framgår av direktiv 1999/5/EC. [Bulgarian] С я ZyXEL ,ч 1999/5/ C. я [Icelandic] Hér með lýsir, ZyXEL því yfir að þessi búnaður er í samræmi við grunnkröfur og önnur viðeigandi ákvæði tilskipunar 1999/5/EC. [Norwegian] Erklærer herved ZyXEL at dette utstyret er I samsvar med de grunnleggende kravene og andre relevante bestemmelser I direktiv 1999/5/EF. [Romanian] Prin prezenta, ZyXEL declară că acest echipament este în conformitate cu cerinţele esenţiale şi alte prevederi relevante ale Directivei 1999/5/EC. National Restrictions This product may be used in all EU countries (and other countries following the EU directive 1999/5/EC) without any limitation except for the countries mentioned below: Ce produit peut être utilisé dans tous les pays de l’UE (et dans tous les pays ayant transposés la directive 1999/5/CE) sans aucune limitation, excepté pour les pays mentionnés ci-dessous: Questo prodotto è utilizzabile in tutte i paesi EU (ed in tutti gli altri paesi che seguono le direttive EU 1999/5/EC) senza nessuna limitazione, eccetto per i paesii menzionati di seguito: Das Produkt kann in allen EU Staaten ohne Einschränkungen eingesetzt werden (sowie in anderen Staaten die der EU Direktive 1995/5/CE folgen) mit Außnahme der folgenden aufgeführten Staaten: In the majority of the EU and other European countries, the 2, 4- and 5-GHz bands have been made available for the use of wireless local area networks (LANs). Later in this document you will find an overview of countries inwhich additional restrictions or requirements or both are applicable. The requirements for any country may evolve. ZyXEL recommends that you check with the local authorities for the latest status of their national regulations for both the 2,4- and 5-GHz wireless LANs. The following countries have restrictions and/or requirements in addition to those given in the table labeled “Overview of Regulat ory Requirem ent s for Wireless LANs”:. Overview of Regulatory Requirements for Wireless LANs Frequency Band (MHz) Max Power Level (EIRP)1 (mW) 2400-2483.5 100 5150-5350 200 5470-5725 1000 NBG5615 User’s Guide Indoor ONLY Indoor and Outdoor 255 Appendix D Legal Information Belgium The Belgian Institute for Postal Services and Telecommunications (BIPT) must be notified of any outdoor wireless link having a range exceeding 300 meters. Please check http://www.bipt.be for more details. Draadloze verbindingen voor buitengebruik en met een reikwijdte van meer dan 300 meter dienen aangemeld te worden bij het Belgisch Instituut voor postdiensten en telecommunicatie (BIPT). Zie http://www.bipt.be voor meer gegevens. Les liaisons sans fil pour une utilisation en extérieur d’une distance supérieure à 300 mètres doivent être notifiées à l’Institut Belge des services Postaux et des Télécommunications (IBPT). Visitez http://www.ibpt.be pour de plus amples détails. Denmark In Denmark, the band 5150 - 5350 MHz is also allowed for outdoor usage. I Danmark må frekvensbåndet 5150 - 5350 også anvendes udendørs. Italy This product meets the National Radio Interface and the requirements specified in the National Frequency Allocation Table for Italy. Unless this wireless LAN product is operating within the boundaries of the owner's property, its use requires a “general authorization.” Please check http://www.sviluppoeconomico.gov.it/ for more details. Questo prodotto è conforme alla specifiche di Interfaccia Radio Nazionali e rispetta il Piano Nazionale di ripartizione delle frequenze in Italia. Se non viene installato all 'interno del proprio fondo, l'utilizzo di prodotti Wireless LAN richiede una “Autorizzazione Generale”. Consultare http://www.sviluppoeconomico.gov.it/ per maggiori dettagli. Latvia The outdoor usage of the 2.4 GHz band requires an authorization from the Electronic Communications Office. Please check http:// www.esd.lv for more details. 2.4 GHz frekvenèu joslas izmantoðanai ârpus telpâm nepiecieðama atïauja no Elektronisko sakaru direkcijas. Vairâk informâcijas: http://www.esd.lv. Notes: 1. Although Norway, Switzerland and Liechtenstein are not EU member states, the EU Directive 1999/5/EC has also been implemented in those countries. 2. The regulatory limits for maximum output power are specified in EIRP. The EIRP level (in dBm) of a device can be calculated by adding the gain of the antenna used(specified in dBi) to the output power available at the connector (specified in dBm). List of national codes COUNTRY ISO 3166 2 LETTER CODE COUNTRY ISO 3166 2 LETTER CODE MT Austria AT Malta Belgium BE Netherlands NL Cyprus CY Poland PL Czech Republic CR Portugal PT Denmark DK Slovakia SK Estonia EE Slovenia SI Finland FI Spain ES France FR Sweden SE Germany DE United Kingdom GB Greece GR Iceland IS Hungary HU Liechtenstein LI Ireland IE Norway NO Italy IT Switzerland CH Latvia LV Bulgaria BG Lithuania LT Romania RO Luxembourg LU Turkey TR Safety Warnings • • • • • • • • • • • • • • 256 Do NOT use this product near water, for example, in a wet basement or near a swimming pool. Do NOT expose your device to dampness, dust or corrosive liquids. Do NOT store things on the device. Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. Connect ONLY suitable accessories to the device. Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information. Make sure to connect the cables to the correct ports. Place connecting cables carefully so that no one will step on them or stumble over them. Always disconnect all cables from this device before servicing or disassembling. Use ONLY an appropriate power adaptor or cord for your device. Connect the power adaptor or cord to the right supply voltage (for example, 110V AC in North America or 230V AC in Europe). Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord. Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution. If the power adaptor or cord is damaged, remove it from the power outlet. NBG5615 User’s Guide Appendix D Legal Information • • • • • Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one. Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning. Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s). If you wall mount your device, make sure that no electrical lines, gas or water pipes will be damaged. Your product is marked with this symbol, which is known as the WEEE mark. WEEE stands for Waste Electronics and Electrical Equipment. It means that used electrical and electronic products should not be mixed with general waste. Used electrical and electronic equipment should be treated separately. NBG5615 User’s Guide 257 Appendix D Legal Information 258 NBG5615 User’s Guide Index Index ActiveX 162 Daylight saving 196 Address Assignment 96 DDNS 149 see also Dynamic DNS service providers 149 AP 15 AP Mode menu 69 status screen 67 AP+Bridge 15 DHCP 90, 133 DHCP server see also Dynamic Host Configuration Protocol DHCP server 130, 133 Digital Living Network Alliance 184 Bandwidth management overview 165 priority 167 services 171 BitTorrent 171 Bridge/Repeater 15 certifications 253 notices 254 viewing 254 disclaimer 253 DLNA 183, 184 indexing 186 overview 183 rescan 186 DLNA-compliant client 184 DNS 135 DNS Server 96 DNS server 135 documentation related 2 Domain Name System 135 Domain Name System. See DNS. duplex setting 60, 69 Dynamic DNS 149 Channel 59, 68 Dynamic Host Configuration Protocol 133 channel 106 DynDNS 149 CIFS 185 DynDNS see also DDNS 149 Common Internet File System, see CIFS Configuration restore 198 content filtering 161 by keyword (in URL) 161 Cookies 162 copyright 253 CPU usage 60, 68 NBG5615 User’s Guide encryption 107 and local (user) database 108 key 108 WPA compatible 108 ESSID 207 259 Index FCC interference statement 253 IGMP 97 see also Internet Group Multicast Protocol version file sharing 184 access right 187, 189 bandwidth 189 example 189 FTP 188 overview 184 Samba 186 user account 187, 188 Windows Explorer 186 work group 186 File Transfer Program 171 Firewall 156 Firewall overview guidelines 156 ICMP packets 157 network security Stateful inspection 156 ZyXEL device firewall 156 IGMP version 97 Internet Group Multicast Protocol 97 IP Address 131, 132, 142 IP alias 130 IP Pool 134 Java 162 firewall stateful inspection 155 LAN 129 IP pool setup 130 Firmware upload 196 file extension using HTTP LAN overview 129 firmware version 59, 68 Language 199 FTP. see also File Transfer Program 171 Link type 60, 69 LAN setup 129 LAN TCP/IP 130 local (user) database 107 and encryption 108 Local Area Network 129 General wireless LAN screen 110 Guest WLAN 108 Guest WLAN Bandwidth 109 Guide Quick Start 2 MAC 121 MAC address 96, 107 cloning 96 MAC address filter 107 MAC address filtering 121 MAC filter 121 HTTP 171 Hyper Text Transfer Protocol 171 managing the device good habits 16 using the web configurator. See web configurator. using the WPS. See WPS. MBSSID 15 260 NBG5615 User’s Guide Index Media access control 121 media client 183 media file 183, 186 type 186 media server 183 overview 183 meida file play 183 Memory usage 60, 68 mode 15 Multicast 97 IGMP 97 NAT 139, 142 global 140 how it works 141 inside 140 local 140 outside 140 overview 139 port forwarding 146 see also Network Address Translation server 140 server sets 146 NAT Traversal 177 Navigation Panel 60, 69 navigation panel 60, 69 Network Address Translation 139, 142 Port forwarding 142, 146 default server 142, 146 example 146 local server 142 port numbers services port speed 60, 69 PPPoE 99 dial-up connection PPTP 101 product registration 254 Quality of Service (QoS) 123 Quick Start Guide 2 RADIUS server 107 registration product 254 related documentation 2 Remote management and NAT 174 limitations 173 system timeout 174 Reset button 16 Reset the device 16 Restore configuration 198 Roaming 123 operating mode 15 Router Mode status screen 57 other documentation 2 RTS/CTS Threshold 106, 123 P2P 171 Samba 185 peer-to-peer 171 Scheduling 126 Point-to-Point Protocol over Ethernet 99 Server Message Block, see SMB Point-to-Point Tunneling Protocol 101 Service and port numbers 159, 170 Pool Size 134 NBG5615 User’s Guide 261 Index Service Set 53, 110, 120 Service Set IDentification 53, 110, 120 Service Set IDentity. See SSID. VoIP 171 Session Initiated Protocol 171 VPN 101 SIP 171 SMB 185 SSID 53, 59, 68, 106, 110, 120 stateful inspection firewall 155 Static DHCP 134 Wake On LAN 175 Static Route 151 WAN (Wide Area Network) 95 Status 57 WAN MAC address 96 Subnet Mask 131, 132 warranty 254 note 254 Summary DHCP table 90 Packet statistics 91 Wireless station status 92 Web Configurator how to access 39 Overview 39 System General Setup 193 web configurator 16 System restart 199 Web Proxy 162 WEP Encryption 114, 116 WEP encryption 113 WEP key 113 windows media player 183 TCP/IP configuration 133 Wireless association list 92 Time setting 195 wireless channel 207 trademarks 253 wireless LAN 207 trigger port 147 wireless LAN scheduling 126 Trigger port forwarding 147 example 147 process 147 Wireless network basic guidelines 106 channel 106 encryption 107 example 105 MAC address filter 107 overview 105 security 106 SSID 106 Universal Plug and Play 177 Application 177 Security issues 177 UPnP 177 Wireless security 106 overview 106 type 106 URL Keyword Blocking 162 wireless security 207 USB media sharing 183 Wireless tutorial 73 user authentication 107 local (user) database 107 RADIUS server 107 Wizard setup 27 User Name 150 262 WLAN button 17 WoL 175 work group 185 name 185 NBG5615 User’s Guide Index Windows 185 World Wide Web 171 WPA compatible 108 WPS 16 WWW 171 Xbox Live 171 NBG5615 User’s Guide 263 Index 264 NBG5615 User’s Guide A PPENDIX Legal Information Copyright Copyright © 2012 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation. All rights reserved. Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice. Trademarks NetUSB is a trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners. Certifications Federal Communications Commission (FCC) Interference Statement The device complies with Part 15 of FCC rules. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interference received, including interference that may cause undesired operations. This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This device generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: Reorient or relocate the receiving antenna. Increase the separation between the equipment and the receiver. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. Consult the dealer or an experienced radio/TV technician for help. FCC Caution: Any changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate this equipment. FCC Radiation Exposure Statement • • • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. IEEE 802.11b, 802.11g or 802.11n (20MHz) operation of this product in the U.S.A. is firmware-limited to channels 1 through 11. IEEE 802.11n (40MHz) operation of this product in the U.S.A. is firmware-limited to channels 3 through 9. To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons. Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1) this device may not cause interference and 2) this device must accept any interference, including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 2dBi. Antenna having a higher gain is strictly prohibited per regulations of Industry Canada. The required antenna impedance is 50 ohms. To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication. IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment. End users must follow the specific operating instructions for satisfying RF exposure compliance. FCC Statement The device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful interference to cochannel mobile satellite systems. NBG5615 User’s Guide 253
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.6 Linearized : No XMP Toolkit : 3.1-702 Create Date : 2013:04:03 10:59:43+08:00 Creator Tool : pdfsam-console (Ver. 2.4.1e) Modify Date : 2013:04:18 15:01:14+08:00 Metadata Date : 2013:04:18 15:01:14+08:00 Producer : iText 2.1.7 by 1T3XT Format : application/pdf Document ID : uuid:addcd37d-0d4f-48b1-8b75-b021c38c0bbb Instance ID : uuid:94d31a2e-92ad-483b-a7c9-f12494521b3b Has XFA : No Page Count : 133 Creator : pdfsam-console (Ver. 2.4.1e)EXIF Metadata provided by EXIF.tools