ZyXEL Communications P870HW51AV2 802.11bg Wireless VDSL2 4-Port Gateway User Manual SMG 700 User s Guide V1 00 Nov 2004

ZyXEL Communications Corporation 802.11bg Wireless VDSL2 4-Port Gateway SMG 700 User s Guide V1 00 Nov 2004

Contents

Installation guide 2

Download: ZyXEL Communications P870HW51AV2 802.11bg Wireless VDSL2 4-Port Gateway User Manual SMG 700 User        s Guide V1 00  Nov 2004
Mirror Download [FCC.gov]ZyXEL Communications P870HW51AV2 802.11bg Wireless VDSL2 4-Port Gateway User Manual SMG 700 User        s Guide V1 00  Nov 2004
Document ID1050501
Application IDaS2yMfWWf8oULrYFNhQCcA==
Document DescriptionInstallation guide 2
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize205.14kB (2564196 bits)
Date Submitted2008-12-29 00:00:00
Date Available2008-12-30 00:00:00
Creation Date2008-12-18 14:06:49
Producing SoftwareAcrobat Distiller 6.0.1 (Windows)
Document Lastmod2008-12-18 14:06:59
Document TitleSMG-700 User’s Guide V1.00 (Nov 2004)
Document CreatorFrameMaker 7.1
Document Author: Cindy Yang

Chapter 17 Tools
Figure 89 Firmware Upload In Progress
The ZyXEL Device automatically restarts in this time causing a temporary network
disconnect. In some operating systems, you may see the following icon on your desktop.
Figure 90 Network Temporarily Disconnected
After two minutes, log in again and check your new firmware version in the Status screen.
If the upload was not successful, the following screen will appear. Click Tools to go back to
the Firmware screen.
Figure 91 Error Message
17.3 The Configuration Screen
Click Maintenance > Tools > Configuration. Information related to factory defaults, backup
configuration, and restoring configuration appears in this screen, as shown next.
P-870HW-51a v2 User’s Guide
151
Chapter 17 Tools
Figure 92 Maintenance > Tools > Configuration
Backup Configuration
Backup Configuration allows you to back up (save) the ZyXEL Device’s current configuration
to a file on your computer. Once your ZyXEL Device is configured and functioning properly,
it is highly recommended that you back up your configuration file before making
configuration changes. The backup configuration file will be useful in case you need to return
to your previous settings.
Click Backup to save the ZyXEL Device’s current configuration to your computer.
Restore Configuration
Restore Configuration allows you to upload a new or previously saved configuration file from
your computer to your ZyXEL Device.
Table 51 Restore Configuration
LABEL
DESCRIPTION
File Path
Type in the location of the file you want to upload in this field or click Browse ... to find it.
Browse...
Click Browse... to find the file you want to upload. Remember that you must
decompress compressed (.ZIP) files before you can upload them.
Upload
Click Upload to begin the upload process.
Do not turn off the ZyXEL Device while configuration file upload is in progress.
After you see a “restore configuration successful” screen, you must then wait one minute
before logging into the ZyXEL Device again.
152
P-870HW-51a v2 User’s Guide
Chapter 17 Tools
Figure 93 Configuration Upload Successful
The ZyXEL Device automatically restarts in this time causing a temporary network
disconnect. In some operating systems, you may see the following icon on your desktop.
Figure 94 Network Temporarily Disconnected
If you uploaded the default configuration file you may need to change the IP address of your
computer to be in the same subnet as that of the default device IP address (192.168.1.1). See
Appendix A on page 173 for details on how to set up your computer’s IP address.
If the upload was not successful, the following screen will appear. Click Tools >
Configuration to go back to the Configuration screen.
Figure 95 Configuration Upload Error
Reset to Factory Defaults
Click the Reset button to clear all user-entered configuration information and return the
ZyXEL Device to its factory defaults. The following warning screen appears.
Figure 96 Reset Warning Message
You can also press the RESET button on the rear panel to reset the factory defaults of your
ZyXEL Device. Refer to Section 1.6 on page 28 for more information on the RESET button.
P-870HW-51a v2 User’s Guide
153
Chapter 17 Tools
17.4 The Restart Screen
System restart allows you to reboot the ZyXEL Device without turning the power off.
Click Maintenance > Tools > Restart. Click Restart to have the ZyXEL Device reboot. This
does not affect the ZyXEL Device's configuration.
Figure 97 Maintenance > Tools >Restart
154
P-870HW-51a v2 User’s Guide
CHAPTER
18
Diagnostic
18.1 Overview
The route between a CO VDSL switch and one of its CPE may go through switches owned by
independent organizations. A connectivity fault point generally takes time to discover and
impacts subscriber’s network access. In order to eliminate the management and maintenance
efforts, IEEE 802.1ag is a Connectivity Fault Management (CFM) specification which allows
network administrators to identify and manage connection faults. Through discovery and
verification of the path, CFM can detect, analyze and isolate connectivity faults in bridged
LANs.
18.1.1 What You Can Do in this Chapter
The 802.1ag screen lets perform CFM actions (Section 18.3 on page 156).
18.2 What You Need to Know
The following terms and concepts may help as you read through this chapter.
How CFM Works
A Maintenance Association (MA) defines a VLAN and associated Maintenance End Point
(MEP) ports on the device under a Maintenance Domain (MD) level. An MEP port has the
ability to send Connectivity Check Messages (CCMs) and get other MEP ports information
from neighbor devices’ CCMs within an MA.
CFM provides two tests to discover connectivity faults.
• Loopback test - checks if the MEP port receives its Loop Back Response (LBR) from its
target after it sends the Loop Back Message (LBM). If no response is received, there might
be a connectivity fault between them.
• Link trace test - provides additional connectivity fault analysis to get more information on
where the fault is. If an MEP port does not respond to the source MEP, this may indicate a
fault. Administrators can take further action to check and resume services from the fault
according to the line connectivity status report.
P-870HW-51a v2 User’s Guide
155
Chapter 18 Diagnostic
18.3 The 802.1ag Screen
Click Diagnostic to open the following screen. Use this screen to perform CFM actions.
Figure 98 802.1ag
The following table describes the fields in this screen.
Table 52 802.1ag
LABEL
DESCRIPTION
802.1ag
Connectivity Fault
Management
156
Maintenance
Domain (MD)
Name
Type a name of up to 39 printable English keyboard characters for this MD.
The combined length of the MD Name and MA name must be less or equal to
44bytes.
Maintenance
Domain (MD) Level
Select a level (0-7) under which you want to create an MA.
Maintenance
Association (MA)
Name
Type a name of up to 39 printable English keyboard characters for this MA.
The combined length of the MD Name and MA name must be less or equal to
44bytes.
P-870HW-51a v2 User’s Guide
Chapter 18 Diagnostic
Table 52 802.1ag (continued)
LABEL
DESCRIPTION
Maintenance
Association (MA)
Format
Select the format which the ZyXEL Device uses to send this MA information in
the domain (MD). Options are VID, String and Integer.
If you select VID or Integer, the ZyXEL Device adds the VLAN ID you specified
for an MA in the CCM.
If you select String, the ZyXEL Device adds the MA name you specified above in
the CCM.
Note: The MEPs in the same MA shoule use the same MA format.
Destination MAC
Address
Enter the target device’s MAC address to which the ZyXEL Device performs a
CFM loopback test.
Count
Set how many times the ZyXEL Device send loopback messages (LBMs).
802.1Q VLAN ID
Type a VLAN ID (0-4095) for this MA.
Maintenance End
Point ID
Enter an ID number (1-8191) for this MEP port. Each MEP port needs a unique
ID number within an MD. The MEP ID is to identify an MEP port used when you
perform a CFM action
Status
Continuity Check
Message (CCM)
This shows how many Connectivity Check Messages (CCMs) are sent and if
there is any invalid CCM or cross-connect CCM.
Loopback Message
(LBM)
This shows how many Loop Back Messages (LBMs) are sent and if there is any
inorder or outorder Loop Back Response (LBR) received from a remote MEP.
Linktrace Message
(LTM)
This shows the Time-to-Live (TTL) value and destination MAC address in the
Link Trace Response (LTR).
Enable CCM
Click this button to have the selected MEP send Connectivity Check Messages
(CCMs) to other MEPs.
Disable CCM
Click this button to disallow the selected MEP to send Connectivity Check
Messages (CCMs) to other MEPs.
Update CC status
Click this button to reload the test result.
Send Loopback
Click this button to have the selected MEP send the LBM (Loop Back Message)
to a specified remote end point.
Send Linktrace
Click this button to have the selected MEP send the LTMs (Link Trace
Messages) to a specified remote end point.
P-870HW-51a v2 User’s Guide
157
Chapter 18 Diagnostic
158
P-870HW-51a v2 User’s Guide
CHAPTER
19
Troubleshooting
This chapter offers some suggestions to solve problems you might encounter. The potential
problems are divided into the following categories.
• Power, Hardware Connections, and LEDs
• ZyXEL Device Access and Login
• Internet Access
19.1 Power, Hardware Connections, and LEDs
The ZyXEL Device does not turn on. None of the LEDs turn on.
1 Make sure the ZyXEL Device is turned on.
2 Make sure you are using the power adaptor or cord included with the ZyXEL Device.
3 Make sure the power adaptor or cord is connected to the ZyXEL Device and plugged in
to an appropriate power source. Make sure the power source is turned on.
4 Turn the ZyXEL Device off and on.
5 If the problem continues, contact the vendor.
One of the LEDs does not behave as expected.
Make sure you understand the normal behavior of the LED. See Section 1.5 on page 26.
Check the hardware connections. See the Quick Start Guide.
Inspect your cables for damage. Contact the vendor to replace any damaged cables.
Turn the ZyXEL Device off and on.
If the problem continues, contact the vendor.
P-870HW-51a v2 User’s Guide
159
Chapter 19 Troubleshooting
19.2 ZyXEL Device Access and Login
I forgot the IP address for the ZyXEL Device.
1 The default IP address is 192.168.1.1.
2 If you changed the IP address and have forgotten it, you might get the IP address of the
ZyXEL Device by looking up the IP address of the default gateway for your computer.
To do this in most Windows computers, click Start > Run, enter cmd, and then enter
ipconfig. The IP address of the Default Gateway might be the IP address of the ZyXEL
Device (it depends on the network), so enter this IP address in your Internet browser.
3 If this does not work, you have to reset the device to its factory defaults. See Section 1.6
on page 28.
I forgot the password.
1 The default password is 1234.
2 If this does not work, you have to reset the device to its factory defaults. See Section 1.6
on page 28.
I cannot see or access the Login screen in the web configurator.
1 Make sure you are using the correct IP address.
• The default IP address is 192.168.1.1.
• If you changed the IP address (Section on page 72), use the new IP address.
• If you changed the IP address and have forgotten it, see the troubleshooting
suggestions for I forgot the IP address for the ZyXEL Device.
2 Check the hardware connections, and make sure the LEDs are behaving as expected. See
the Quick Start Guide.
3 Make sure your Internet browser does not block pop-up windows and has JavaScripts
and Java enabled. See Appendix B on page 197.
4 Reset the device to its factory defaults, and try to access the ZyXEL Device with the
default IP address. See Section 1.6 on page 28.
5 If the problem continues, contact the network administrator or vendor, or try one of the
advanced suggestions.
Advanced Suggestions
• If your computer is connected wirelessly, use a computer that is connected to a
ETHERNET port.
160
P-870HW-51a v2 User’s Guide
Chapter 19 Troubleshooting
I can see the Login screen, but I cannot log in to the ZyXEL Device.
1 Make sure you have entered the user name and password correctly. The default password
is 1234. These fields are case-sensitive, so make sure [Caps Lock] is not on.
2 Turn the ZyXEL Device off and on.
3 If this does not work, you have to reset the device to its factory defaults. See Section
19.1 on page 159.
19.3 Internet Access
I cannot access the Internet.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See
the Quick Start Guide and Section 1.5 on page 26.
2 Make sure you entered your ISP account information correctly in the WAN screens.
These fields are case-sensitive, so make sure [Caps Lock] is not on.
3 If you are trying to access the Internet wirelessly, make sure the wireless settings in the
wireless client are the same as the settings in the AP.
4 Disconnect all the cables from your device, and follow the directions in the Quick Start
Guide again.
5 If the problem continues, contact your ISP.
I cannot access the Internet anymore. I had access to the Internet (with the
ZyXEL Device), but my Internet connection is not available anymore.
1 Check the hardware connections, and make sure the LEDs are behaving as expected. See
the Quick Start Guide and Section 1.5 on page 26.
2 Turn the ZyXEL Device off and on.
3 If the problem continues, contact your ISP.
The Internet connection is slow or intermittent.
1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5
on page 26. If the ZyXEL Device is sending or receiving a lot of information, try closing
some programs that use the Internet, especially peer-to-peer applications.
P-870HW-51a v2 User’s Guide
161
Chapter 19 Troubleshooting
2 Check the signal strength. If the signal strength is low, try moving your computer closer
to the ZyXEL Device if possible, and look around to see if there are any devices that
might be interfering with the wireless network (for example, microwaves, other wireless
networks, and so on).
3 Turn the ZyXEL Device off and on.
4 If the problem continues, contact the network administrator or vendor, or try one of the
advanced suggestions.
Advanced Suggestions
• Check the settings for QoS. If it is disabled, you might consider activating it. If it is
enabled, you might consider raising or lowering the priority for some applications.
162
P-870HW-51a v2 User’s Guide
Chapter 19 Troubleshooting
P-870HW-51a v2 User’s Guide
163
Chapter 19 Troubleshooting
164
P-870HW-51a v2 User’s Guide
CHAPTER
20
Product Specifications
The following tables summarize the ZyXEL Device’s hardware and firmware features.
20.1 Hardware Specifications
Table 53 Hardware Specifications
Dimensions
(220 W) x (150 D) x (40 H) mm
Weight
485 g
Power Specification
18VDC 1A
Built-in Switch
Four auto-negotiating, auto MDI/MDI-X 10/100 Mbps RJ-45 Ethernet ports
RESET Button
Restores factory defaults
Antenna
One attached external dipole antenna, 3dBi
WPS Button
1 second: turn on or off WLAN
5 seconds: enable WPS (Wi-Fi Protected Setup)
Operation Temperature
0º C ~ 40º C
Storage Temperature
-20º ~ 60º C
Operation Humidity
20% ~ 85% RH
Storage Humidity
20% ~ 90% RH
20.2 Firmware Specifications
Table 54 Firmware Specifications
Default IP Address
192.168.1.1
Default Subnet Mask
255.255.255.0 (24 bits)
Default Password
1234
DHCP Server IP Pool
192.168.1.33 to 192.168.1.254
Static DHCP Addresses
10
Static Routes
16
Device Management
Use the web configurator to easily configure the rich range of features on
the ZyXEL Device.
P-870HW-51a v2 User’s Guide
165
Chapter 20 Product Specifications
Table 54 Firmware Specifications (continued)
Wireless Functionality
(wireless devices only)
Allow the IEEE 802.11b and/or IEEE 802.11g wireless clients to connect to
the ZyXEL Device wirelessly. Enable wireless security (WEP, WPA(2),
WPA(2)-PSK) and/or MAC filtering to protect your wireless network.
Firmware Upgrade
Download new firmware (when available) from the ZyXEL web site and use
the web configurator to put it on the ZyXEL Device.
Note: Only upload firmware for your specific model!
Configuration Backup &
Restoration
Make a copy of the ZyXEL Device’s configuration. You can put it back on the
ZyXEL Device later if you decide to revert back to an earlier configuration.
Port Forwarding
If you have a server (mail or web server for example) on your network, you
can use this feature to let people access it from the Internet.
DHCP (Dynamic Host
Configuration Protocol)
Use this feature to have the ZyXEL Device assign IP addresses, an IP
default gateway and DNS servers to computers on your network. Your
device can also act as a surrogate DHCP server (DHCP Relay) where it
relays IP address assignment from the actual real DHCP server to the
clients.
Dynamic DNS Support
With Dynamic DNS (Domain Name System) support, you can use a fixed
URL, www.zyxel.com for example, with a dynamic IP address. You must
register for this service with a Dynamic DNS service provider.
IP Multicast
IP multicast is used to send traffic to a specific group of computers. The
ZyXEL Device supports versions 1 and 2 of IGMP (Internet Group
Management Protocol) used to join multicast groups (see RFC 2236).
Time and Date
Get the current time and date from an external server when you turn on your
ZyXEL Device. You can also set the time manually. These dates and times
are then used in logs.
Logs
Use logs for troubleshooting. You can send logs from the ZyXEL Device to
an external syslog server.
Universal Plug and Play
(UPnP)
A UPnP-enabled device can dynamically join a network, obtain an IP
address and convey its capabilities to other devices on the network.
QoS (Quality of Service) You can efficiently manage traffic on your network by reserving bandwidth
and giving priority to certain types of traffic and/or to particular computers.
166
Remote Management
This allows you to decide whether a service (HTTP or FTP traffic for
example) from a computer on a network (LAN or WAN for example) can
access the ZyXEL Device.
PPPoE Support
(RFC2516)
PPPoE (Point-to-Point Protocol over Ethernet) emulates a dial-up
connection. It allows your ISP to use their existing network configuration
with newer broadband technologies such as ADSL. The PPPoE driver on
your device is transparent to the computers on the LAN, which see only
Ethernet and are not aware of PPPoE thus saving you from having to
manage PPPoE clients on individual computers.
Other PPPoE Features
PPPoE idle time out
PPPoE dial on demand
Multiple PVC
(Permanent Virtual
Circuits) Support
Your device supports up to 8 Permanent Virtual Circuits (PVCs).
IP Alias
IP alias allows you to partition a physical network into logical networks over
the same Ethernet interface. Your device supports three logical LAN
interfaces via its single physical Ethernet interface with the your device itself
as the gateway for each LAN network.
Packet Filters
Your device’s packet filtering function allows added network security and
management.
P-870HW-51a v2 User’s Guide
Chapter 20 Product Specifications
Table 54 Firmware Specifications (continued)
ADSL Standards
Support ITU G.992.1 G.dmt (Annex B, U-R2)
EOC specified in ITU-T G.992.1
ADSL2 G.dmt.bis (G.992.3)
ADSL2 G.lite.bis (G.992.4)
ADSL 2/2+ AnnexM
ADSL2+ (G.992.5)
Reach-Extended ADSL (RE ADSL)
SRA (Seamless Rate Adaptation)
Auto-negotiating rate adaptation
ADSL physical connection ATM AAL5 (ATM Adaptation Layer type 5)
Multi-protocol over AAL5 (RFC 2684/1483)
PPP over ATM AAL5 (RFC 2364)
PPP over Ethernet (RFC 2516)
Multiple PPPoE
VC-based and LLC-based multiplexing
Up to 8 PVCs (Permanent Virtual Circuits)
I.610 F4/F5 OAM
Zero configuration
Other Protocol Support
PPP (Point-to-Point Protocol) link layer protocol
Transparent bridging for unsupported network layer protocols
RIP I/RIP II
ICMP
ATM QoS
SNMP v1 and v2c with MIB II support (RFC 1213)
IP Multicasting IGMP v1 and v2
IGMP Proxy
Management
Embedded Web Configurator
Remote Firmware Upgrade
Syslog
TR-069
20.3 Wireless Features
Table 55 Wireless Features
External Antenna
The ZyXEL Device is equipped with an attached antenna to provide a
clear radio signal between the wireless stations and the access
points.
Wireless LAN MAC Address
Filtering
Your device can check the MAC addresses of wireless stations
against a list of allowed or denied MAC addresses.
WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before
transmitting over the wireless network to help keep network
communications private.
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i
security standard. Key differences between WPA and WEP are user
authentication and improved data encryption.
P-870HW-51a v2 User’s Guide
167
Chapter 20 Product Specifications
Table 55 Wireless Features
WPA2
WPA 2 is a wireless security standard that defines stronger
encryption, authentication and key management than WPA.
Other Wireless Features
IEEE 802.11g Compliance
Frequency Range: 2.4 GHz ISM Band
Advanced Orthogonal Frequency Division Multiplexing (OFDM)
Data Rates: 54Mbps, 11Mbps, 5.5Mbps, 2Mbps, and 1 Mbps Auto
Fallback
WPA2
WMM
IEEE 802.11i
IEEE 802.11e
Wired Equivalent Privacy (WEP) Data Encryption 64/128/256 bit.
WLAN bridge to LAN
Up to 32 MAC Address filters
IEEE 802.1x
Store up to 32 built-in user profiles using EAP-MD5 (Local User
Database)
External RADIUS server using EAP-MD5, TLS, TTLS
The following list, which is not exhaustive, illustrates the standards supported in the ZyXEL
Device.
Table 56 Standards Supported
168
STANDARD
DESCRIPTION
RFC 867
Daytime Protocol
RFC 868
Time Protocol.
RFC 1058
RIP-1 (Routing Information Protocol)
RFC 1112
IGMP v1
RFC 1157
SNMPv1: Simple Network Management Protocol version 1
RFC 1305
Network Time Protocol (NTP version 3)
RFC 1441
SNMPv2 Simple Network Management Protocol version 2
RFC 1483
Multiprotocol Encapsulation over ATM Adaptation Layer 5
RFC 1631
IP Network Address Translator (NAT)
RFC 1661
The Point-to-Point Protocol (PPP)
RFC 1723
RIP-2 (Routing Information Protocol)
RFC 1901
SNMPv2c Simple Network Management Protocol version 2c
RFC 2236
Internet Group Management Protocol, Version 2.
RFC 2364
PPP over AAL5 (PPP over ATM over ADSL)
RFC 2408
Internet Security Association and Key Management Protocol (ISAKMP)
RFC 2516
A Method for Transmitting PPP Over Ethernet (PPPoE)
RFC 2684
Multiprotocol Encapsulation over ATM Adaptation Layer 5.
RFC 2766
Network Address Translation - Protocol
IEEE 802.11
Also known by the brand Wi-Fi, denotes a set of Wireless LAN/WLAN
standards developed by working group 11 of the IEEE LAN/MAN
Standards Committee (IEEE 802).
IEEE 802.11b
Uses the 2.4 gigahertz (GHz) band
P-870HW-51a v2 User’s Guide
Chapter 20 Product Specifications
Table 56 Standards Supported (continued)
STANDARD
DESCRIPTION
IEEE 802.11g
Uses the 2.4 gigahertz (GHz) band
IEEE 802.11g+
Turbo and Super G modes
IEEE 802.11d
Standard for Local and Metropolitan Area Networks: Media Access Control
(MAC) Bridges
IEEE 802.11x
Port Based Network Access Control.
IEEE 802.11e QoS
IEEE 802.11 e Wireless LAN for Quality of Service
ANSI T1.413, Issue 2
Asymmetric Digital Subscriber Line (ADSL) standard.
G dmt(G.992.1)
G.992.1 Asymmetrical Digital Subscriber Line (ADSL) Transceivers
ITU G.992.1 (G.DMT)
ITU standard for ADSL using discrete multitone modulation.
ITU G.992.2 (G. Lite)
ITU standard for ADSL using discrete multitone modulation.
ITU G.992.3 (G.dmt.bis)
ITU standard (also referred to as ADSL2) that extends the capability of
basic ADSL in data rates.
ITU G.992.4 (G.lite.bis)
ITU standard (also referred to as ADSL2) that extends the capability of
basic ADSL in data rates.
ITU G.992.5 (ADSL2+)
ITU standard (also referred to as ADSL2+) that extends the capability of
basic ADSL by doubling the number of downstream bits.
Microsoft PPTP
MS PPTP (Microsoft's implementation of Point to Point Tunneling Protocol)
MBM v2
Media Bandwidth Management v2
RFC 2383
ST2+ over ATM Protocol Specification - UNI 3.1 Version
TR-069
TR-069 DSL Forum Standard for CPE Wan Management.
1.363.5
Compliant AAL5 SAR (Segmentation And Re-assembly)
P-870HW-51a v2 User’s Guide
169
Chapter 20 Product Specifications
170
P-870HW-51a v2 User’s Guide
P ART VI
Appendices and
Index
The appendices provide general information. Some details may not apply to
your ZyXEL Device.
Setting Up Your Computer’s IP Address (173)
Pop-up Windows, JavaScripts and Java Permissions (197)
IP Addresses and Subnetting (205)
Wireless LANs (215)
Common Services (229)
Legal Information (233)
Customer Support (237)
Index (243)
171
172
APPENDIX
Setting Up Your Computer’s IP
Address
Your specific ZyXEL device may not support all of the operating systems
described in this appendix. See the product specifications for more information
about which operating systems are supported.
This appendix shows you how to configure the IP settings on your computer in order for it to
be able to communicate with the other devices on your network. Windows Vista/XP/2000,
Mac OS 9/OS X, and all versions of UNIX/LINUX include the software components you need
to use TCP/IP on your computer.
If you manually assign IP information instead of using a dynamic IP, make sure that your
network’s computers have IP addresses that place them in the same subnet.
In this appendix, you can set up an IP address for:
•
•
•
•
•
•
Windows XP/NT/2000 on page 174
Windows Vista on page 177
Mac OS X: 10.3 and 10.4 on page 181
Mac OS X: 10.5 on page 184
Linux: Ubuntu 8 (GNOME) on page 187
Linux: openSUSE 10.3 (KDE) on page 191
P-870HW-51a v2 User’s Guide
173
Appendix A Setting Up Your Computer’s IP Address
Windows XP/NT/2000
The following example uses the default Windows XP display theme but can also apply to
Windows 2000 and Windows NT.
1 Click Start > Control Panel.
Figure 99 Windows XP: Start Menu
2 In the Control Panel, click the Network Connections icon.
Figure 100 Windows XP: Control Panel
174
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
3 Right-click Local Area Connection and then select Properties.
Figure 101 Windows XP: Control Panel > Network Connections > Properties
4 On the General tab, select Internet Protocol (TCP/IP) and then click Properties.
Figure 102 Windows XP: Local Area Connection Properties
P-870HW-51a v2 User’s Guide
175
Appendix A Setting Up Your Computer’s IP Address
5 The Internet Protocol TCP/IP Properties window opens.
Figure 103 Windows XP: Internet Protocol (TCP/IP) Properties
6 Select Obtain an IP address automatically if your network administrator or ISP
assigns your IP address dynamically.
Select Use the following IP Address and fill in the IP address, Subnet mask, and
Default gateway fields if you have a static IP address that was assigned to you by your
network administrator or ISP. You may also have to enter a Preferred DNS server and
an Alternate DNS server, if that information was provided.
7 Click OK to close the Internet Protocol (TCP/IP) Properties window.
8 Click OK to close the Local Area Connection Properties window.
Verifying Settings
1 Click Start > All Programs > Accessories > Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER].
You can also go to Start > Control Panel > Network Connections, right-click a
network connection, click Status and then click the Support tab to view your IP address
and connection information.
176
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Windows Vista
This section shows screens from Windows Vista Professional.
1 Click Start > Control Panel.
Figure 104 Windows Vista: Start Menu
2 In the Control Panel, click the Network and Internet icon.
Figure 105 Windows Vista: Control Panel
3 Click the Network and Sharing Center icon.
Figure 106 Windows Vista: Network And Internet
P-870HW-51a v2 User’s Guide
177
Appendix A Setting Up Your Computer’s IP Address
4 Click Manage network connections.
Figure 107 Windows Vista: Network and Sharing Center
5 Right-click Local Area Connection and then select Properties.
Figure 108 Windows Vista: Network and Sharing Center
178
During this procedure, click Continue whenever Windows displays a screen
saying that it needs your permission to continue.
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
6 Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties.
Figure 109 Windows Vista: Local Area Connection Properties
P-870HW-51a v2 User’s Guide
179
Appendix A Setting Up Your Computer’s IP Address
7 The Internet Protocol Version 4 (TCP/IPv4) Properties window opens.
Figure 110 Windows Vista: Internet Protocol Version 4 (TCP/IPv4) Properties
8 Select Obtain an IP address automatically if your network administrator or ISP
assigns your IP address dynamically.
Select Use the following IP Address and fill in the IP address, Subnet mask, and
Default gateway fields if you have a static IP address that was assigned to you by your
network administrator or ISP. You may also have to enter a Preferred DNS server and
an Alternate DNS server, if that information was provided.Click Advanced.
9 Click OK to close the Internet Protocol (TCP/IP) Properties window.
10 Click OK to close the Local Area Connection Properties window.
Verifying Settings
1 Click Start > All Programs > Accessories > Command Prompt.
2 In the Command Prompt window, type "ipconfig" and then press [ENTER].
You can also go to Start > Control Panel > Network Connections, right-click a
network connection, click Status and then click the Support tab to view your IP address
and connection information.
180
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Mac OS X: 10.3 and 10.4
The screens in this section are from Mac OS X 10.4 but can also apply to 10.3.
1 Click Apple > System Preferences.
Figure 111 Mac OS X 10.4: Apple Menu
2 In the System Preferences window, click the Network icon.
Figure 112 Mac OS X 10.4: System Preferences
P-870HW-51a v2 User’s Guide
181
Appendix A Setting Up Your Computer’s IP Address
3 When the Network preferences pane opens, select Built-in Ethernet from the network
connection type list, and then click Configure.
Figure 113 Mac OS X 10.4: Network Preferences
4 For dynamically assigned settings, select Using DHCP from the Configure IPv4 list in
the TCP/IP tab.
Figure 114 Mac OS X 10.4: Network Preferences > TCP/IP Tab.
182
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
5 For statically assigned settings, do the following:
• From the Configure IPv4 list, select Manually.
• In the IP Address field, type your IP address.
• In the Subnet Mask field, type your subnet mask.
• In the Router field, type the IP address of your device.
Figure 115 Mac OS X 10.4: Network Preferences > Ethernet
6 Click Apply Now and close the window.
Verifying Settings
Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and
then selecting the appropriate Network Interface from the Info tab.
Figure 116 Mac OS X 10.4: Network Utility
P-870HW-51a v2 User’s Guide
183
Appendix A Setting Up Your Computer’s IP Address
Mac OS X: 10.5
The screens in this section are from Mac OS X 10.5.
1 Click Apple > System Preferences.
Figure 117 Mac OS X 10.5: Apple Menu
2 In System Preferences, click the Network icon.
Figure 118 Mac OS X 10.5: Systems Preferences
184
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
3 When the Network preferences pane opens, select Ethernet from the list of available
connection types.
Figure 119 Mac OS X 10.5: Network Preferences > Ethernet
4 From the Configure list, select Using DHCP for dynamically assigned settings.
5 For statically assigned settings, do the following:
• From the Configure list, select Manually.
• In the IP Address field, enter your IP address.
• In the Subnet Mask field, enter your subnet mask.
• In the Router field, enter the IP address of your ZyXEL Device.
P-870HW-51a v2 User’s Guide
185
Appendix A Setting Up Your Computer’s IP Address
Figure 120 Mac OS X 10.5: Network Preferences > Ethernet
6 Click Apply and close the window.
Verifying Settings
Check your TCP/IP properties by clicking Applications > Utilities > Network Utilities, and
then selecting the appropriate Network interface from the Info tab.
Figure 121 Mac OS X 10.5: Network Utility
186
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Linux: Ubuntu 8 (GNOME)
This section shows you how to configure your computer’s TCP/IP settings in the GNU Object
Model Environment (GNOME) using the Ubuntu 8 Linux distribution. The procedure, screens
and file locations may vary depending on your specific distribution, release version, and
individual configuration. The following screens use the default Ubuntu 8 installation.
Make sure you are logged in as the root administrator.
Follow the steps below to configure your computer IP address in GNOME:
1 Click System > Administration > Network.
Figure 122 Ubuntu 8: System > Administration Menu
2 When the Network Settings window opens, click Unlock to open the Authenticate
window. (By default, the Unlock button is greyed out until clicked.) You cannot make
changes to your configuration unless you first enter your admin password.
Figure 123 Ubuntu 8: Network Settings > Connections
P-870HW-51a v2 User’s Guide
187
Appendix A Setting Up Your Computer’s IP Address
3 In the Authenticate window, enter your admin account name and password then click
the Authenticate button.
Figure 124 Ubuntu 8: Administrator Account Authentication
4 In the Network Settings window, select the connection that you want to configure, then
click Properties.
Figure 125 Ubuntu 8: Network Settings > Connections
188
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
5 The Properties dialog box opens.
Figure 126 Ubuntu 8: Network Settings > Properties
• In the Configuration list, select Automatic Configuration (DHCP) if you have a
dynamic IP address.
• In the Configuration list, select Static IP address if you have a static IP address. Fill
in the IP address, Subnet mask, and Gateway address fields.
6 Click OK to save the changes and close the Properties dialog box and return to the
Network Settings screen.
7 If you know your DNS server IP address(es), click the DNS tab in the Network Settings
window and then enter the DNS server information in the fields provided.
Figure 127 Ubuntu 8: Network Settings > DNS
8 Click the Close button to apply the changes.
P-870HW-51a v2 User’s Guide
189
Appendix A Setting Up Your Computer’s IP Address
Verifying Settings
Check your TCP/IP properties by clicking System > Administration > Network Tools, and
then selecting the appropriate Network device from the Devices tab. The Interface Statistics
column shows data if your connection is working properly.
Figure 128 Ubuntu 8: Network Tools
190
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Linux: openSUSE 10.3 (KDE)
This section shows you how to configure your computer’s TCP/IP settings in the K Desktop
Environment (KDE) using the openSUSE 10.3 Linux distribution. The procedure, screens and
file locations may vary depending on your specific distribution, release version, and individual
configuration. The following screens use the default openSUSE 10.3 installation.
Make sure you are logged in as the root administrator.
Follow the steps below to configure your computer IP address in the KDE:
1 Click K Menu > Computer > Administrator Settings (YaST).
Figure 129 openSUSE 10.3: K Menu > Computer Menu
2 When the Run as Root - KDE su dialog opens, enter the admin password and click OK.
Figure 130 openSUSE 10.3: K Menu > Computer Menu
P-870HW-51a v2 User’s Guide
191
Appendix A Setting Up Your Computer’s IP Address
3 When the YaST Control Center window opens, select Network Devices and then click
the Network Card icon.
Figure 131 openSUSE 10.3: YaST Control Center
4 When the Network Settings window opens, click the Overview tab, select the
appropriate connection Name from the list, and then click the Configure button.
Figure 132 openSUSE 10.3: Network Settings
192
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
5 When the Network Card Setup window opens, click the Address tab
Figure 133 openSUSE 10.3: Network Card Setup
6 Select Dynamic Address (DHCP) if you have a dynamic IP address.
Select Statically assigned IP Address if you have a static IP address. Fill in the IP
address, Subnet mask, and Hostname fields.
7 Click Next to save the changes and close the Network Card Setup window.
P-870HW-51a v2 User’s Guide
193
Appendix A Setting Up Your Computer’s IP Address
8 If you know your DNS server IP address(es), click the Hostname/DNS tab in Network
Settings and then enter the DNS server information in the fields provided.
Figure 134 openSUSE 10.3: Network Settings
9 Click Finish to save your settings and close the window.
194
P-870HW-51a v2 User’s Guide
Appendix A Setting Up Your Computer’s IP Address
Verifying Settings
Click the KNetwork Manager icon on the Task bar to check your TCP/IP properties. From
the Options sub-menu, select Show Connection Information.
Figure 135 openSUSE 10.3: KNetwork Manager
When the Connection Status - KNetwork Manager window opens, click the Statistics tab
to see if your connection is working properly.
Figure 136 openSUSE: Connection Status - KNetwork Manager
P-870HW-51a v2 User’s Guide
195
Appendix A Setting Up Your Computer’s IP Address
196
P-870HW-51a v2 User’s Guide
APPENDIX
Pop-up Windows, JavaScripts
and Java Permissions
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device.
• JavaScripts (enabled by default).
• Java permissions (enabled by default).
Internet Explorer 6 screens are used here. Screens for other Internet Explorer
versions may vary.
Internet Explorer Pop-up Blockers
You may have to disable pop-up blocking to log into your device.
Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or
allow pop-up blocking and create an exception for your device’s IP address.
Disable Pop-up Blockers
1 In Internet Explorer, select Tools, Pop-up Blocker and then select Turn Off Pop-up
Blocker.
Figure 137 Pop-up Blocker
You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the
Privacy tab.
1 In Internet Explorer, select Tools, Internet Options, Privacy.
P-870HW-51a v2 User’s Guide
197
Appendix B Pop-up Windows, JavaScripts and Java Permissions
2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This
disables any web pop-up blockers you may have enabled.
Figure 138 Internet Options: Privacy
3 Click Apply to save this setting.
Enable Pop-up Blockers with Exceptions
Alternatively, if you only want to allow pop-up windows from your device, see the following
steps.
1 In Internet Explorer, select Tools, Internet Options and then the Privacy tab.
2 Select Settings…to open the Pop-up Blocker Settings screen.
198
P-870HW-51a v2 User’s Guide
Appendix B Pop-up Windows, JavaScripts and Java Permissions
Figure 139 Internet Options: Privacy
3 Type the IP address of your device (the web page that you do not want to have blocked)
with the prefix “http://”. For example, http://192.168.167.1.
4 Click Add to move the IP address to the list of Allowed sites.
Figure 140 Pop-up Blocker Settings
P-870HW-51a v2 User’s Guide
199
Appendix B Pop-up Windows, JavaScripts and Java Permissions
5 Click Close to return to the Privacy screen.
6 Click Apply to save this setting.
JavaScripts
If pages of the web configurator do not display properly in Internet Explorer, check that
JavaScripts are allowed.
1 In Internet Explorer, click Tools, Internet Options and then the Security tab.
Figure 141 Internet Options: Security
200
Click the Custom Level... button.
Scroll down to Scripting.
Under Active scripting make sure that Enable is selected (the default).
Under Scripting of Java applets make sure that Enable is selected (the default).
Click OK to close the window.
P-870HW-51a v2 User’s Guide
Appendix B Pop-up Windows, JavaScripts and Java Permissions
Figure 142 Security Settings - Java Scripting
Java Permissions
From Internet Explorer, click Tools, Internet Options and then the Security tab.
Click the Custom Level... button.
Scroll down to Microsoft VM.
Under Java permissions make sure that a safety level is selected.
Click OK to close the window.
Figure 143 Security Settings - Java
P-870HW-51a v2 User’s Guide
201
Appendix B Pop-up Windows, JavaScripts and Java Permissions
JAVA (Sun)
1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab.
2 Make sure that Use Java 2 for  under Java (Sun) is selected.
3 Click OK to close the window.
Figure 144 Java (Sun)
Mozilla Firefox
Mozilla Firefox 2.0 screens are used here. Screens for other versions may vary.
You can enable Java, Javascripts and pop-ups in one screen. Click Tools, then click Options in
the screen that appears.
202
P-870HW-51a v2 User’s Guide
Appendix B Pop-up Windows, JavaScripts and Java Permissions
Figure 145 Mozilla Firefox: Tools > Options
Click Content.to show the screen below. Select the check boxes as shown in the following
screen.
Figure 146 Mozilla Firefox Content Security
P-870HW-51a v2 User’s Guide
203
Appendix B Pop-up Windows, JavaScripts and Java Permissions
204
P-870HW-51a v2 User’s Guide
APPENDIX
IP Addresses and Subnetting
This appendix introduces IP addresses and subnet masks.
IP addresses identify individual devices on a network. Every networking device (including
computers, servers, routers, printers, etc.) needs an IP address to communicate across the
network. These networking devices are also known as hosts.
Subnet masks determine the maximum number of possible hosts on a network. You can also
use subnet masks to divide one network into multiple sub-networks.
Introduction to IP Addresses
One part of the IP address is the network number, and the other part is the host ID. In the same
way that houses on a street share a common street name, the hosts on a network share a
common network number. Similarly, as each house has its own house number, each host on the
network has its own unique identifying number - the host ID. Routers use the network number
to send packets to the correct network, while the host ID determines to which host on the
network the packets are delivered.
Structure
An IP address is made up of four parts, written in dotted decimal notation (for example,
192.168.1.1). Each of these four parts is known as an octet. An octet is an eight-digit binary
number (for example 11000000, which is 192 in decimal notation).
Therefore, each octet has a possible range of 00000000 to 11111111 in binary, or 0 to 255 in
decimal.
The following figure shows an example IP address in which the first three octets (192.168.1)
are the network number, and the fourth octet (16) is the host ID.
P-870HW-51a v2 User’s Guide
205
Appendix C IP Addresses and Subnetting
Figure 147 Network Number and Host ID
How much of the IP address is the network number and how much is the host ID varies
according to the subnet mask.
Subnet Masks
A subnet mask is used to determine which bits are part of the network number, and which bits
are part of the host ID (using a logical AND operation). The term “subnet” is short for “subnetwork”.
A subnet mask has 32 bits. If a bit in the subnet mask is a “1” then the corresponding bit in the
IP address is part of the network number. If a bit in the subnet mask is “0” then the
corresponding bit in the IP address is part of the host ID.
The following example shows a subnet mask identifying the network number (in bold text)
and host ID of an IP address (192.168.1.2 in decimal).
Table 57 IP Address Network Number and Host ID Example
1ST OCTET: 2ND
OCTET:
(192)
(168)
3RD
OCTET:
(1)
4TH OCTET
(2)
IP Address (Binary)
11000000
10101000
00000001
00000010
Subnet Mask (Binary)
11111111
11111111
11111111
00000000
Network Number
11000000
10101000
00000001
Host ID
00000010
By convention, subnet masks always consist of a continuous sequence of ones beginning from
the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of
32 bits.
Subnet masks can be referred to by the size of the network number part (the bits with a “1”
value). For example, an “8-bit mask” means that the first 8 bits of the mask are ones and the
remaining 24 bits are zeroes.
206
P-870HW-51a v2 User’s Guide
Appendix C IP Addresses and Subnetting
Subnet masks are expressed in dotted decimal notation just like IP addresses. The following
examples show the binary and decimal notation for 8-bit, 16-bit, 24-bit and 29-bit subnet
masks.
Table 58 Subnet Masks
BINARY
DECIMAL
1ST
OCTET
2ND
OCTET
3RD
OCTET
4TH OCTET
8-bit mask
11111111
00000000
00000000
00000000
255.0.0.0
16-bit mask
11111111
11111111
00000000
00000000
255.255.0.0
24-bit mask
11111111
11111111
11111111
00000000
255.255.255.0
29-bit mask
11111111
11111111
11111111
11111000
255.255.255.248
Network Size
The size of the network number determines the maximum number of possible hosts you can
have on your network. The larger the number of network number bits, the smaller the number
of remaining host ID bits.
An IP address with host IDs of all zeros is the IP address of the network (192.168.1.0 with a
24-bit subnet mask, for example). An IP address with host IDs of all ones is the broadcast
address for that network (192.168.1.255 with a 24-bit subnet mask, for example).
As these two IP addresses cannot be used for individual hosts, calculate the maximum number
of possible hosts in a network as follows:
Table 59 Maximum Host Numbers
SUBNET MASK
HOST ID SIZE
MAXIMUM NUMBER OF HOSTS
8 bits
255.0.0.0
24 bits
224
16 bits
255.255.0.0
16 bits
216 – 2
65534
24 bits
255.255.255.0
8 bits
28 – 2
254
3 bits
23
29 bits
255.255.255.248
–2
16777214
–2
Notation
Since the mask is always a continuous number of ones beginning from the left, followed by a
continuous number of zeros for the remainder of the 32 bit mask, you can simply specify the
number of ones instead of writing the value of each octet. This is usually specified by writing
a “/” followed by the number of bits in the mask after the address.
For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask
255.255.255.128.
The following table shows some possible subnet masks using both notations.
Table 60 Alternative Subnet Mask Notation
SUBNET MASK
ALTERNATIVE
NOTATION
LAST OCTET
(BINARY)
LAST OCTET
(DECIMAL)
255.255.255.0
/24
0000 0000
255.255.255.128
/25
1000 0000
128
P-870HW-51a v2 User’s Guide
207
Appendix C IP Addresses and Subnetting
Table 60 Alternative Subnet Mask Notation (continued)
SUBNET MASK
ALTERNATIVE
NOTATION
LAST OCTET
(BINARY)
LAST OCTET
(DECIMAL)
255.255.255.192
/26
1100 0000
192
255.255.255.224
/27
1110 0000
224
255.255.255.240
/28
1111 0000
240
255.255.255.248
/29
1111 1000
248
255.255.255.252
/30
1111 1100
252
Subnetting
You can use subnetting to divide one network into multiple sub-networks. In the following
example a network administrator creates two sub-networks to isolate a group of servers from
the rest of the company network for security reasons.
In this example, the company network address is 192.168.1.0. The first three octets of the
address (192.168.1) are the network number, and the remaining octet is the host ID, allowing a
maximum of 28 – 2 or 254 possible hosts.
The following figure shows the company network before subnetting.
Figure 148 Subnetting Example: Before Subnetting
You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate
sub-networks. The subnet mask is now 25 bits (255.255.255.128 or /25).
The “borrowed” host ID bit can have a value of either 0 or 1, allowing two subnets;
192.168.1.0 /25 and 192.168.1.128 /25.
The following figure shows the company network after subnetting. There are now two subnetworks, A and B.
208
P-870HW-51a v2 User’s Guide
Appendix C IP Addresses and Subnetting
Figure 149 Subnetting Example: After Subnetting
In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126
possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s
broadcast address).
192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask
255.255.255.128 is its broadcast address. Therefore, the lowest IP address that can be assigned
to an actual host for subnet A is 192.168.1.1 and the highest is 192.168.1.126.
Similarly, the host ID range for subnet B is 192.168.1.129 to 192.168.1.254.
Example: Four Subnets
The previous example illustrated using a 25-bit subnet mask to divide a 24-bit address into two
subnets. Similarly, to divide a 24-bit address into four subnets, you need to “borrow” two host
ID bits to give four possible combinations (00, 01, 10 and 11). The subnet mask is 26 bits
(11111111.11111111.11111111.11000000) or 255.255.255.192.
Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all
zeroes is the subnet itself, all ones is the subnet’s broadcast address).
Table 61 Subnet 1
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address (Decimal)
192.168.1.
IP Address (Binary)
11000000.10101000.00000001.
00000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.1.0
Lowest Host ID: 192.168.1.1
Broadcast Address:
192.168.1.63
Highest Host ID: 192.168.1.62
P-870HW-51a v2 User’s Guide
209
Appendix C IP Addresses and Subnetting
Table 62 Subnet 2
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address
192.168.1.
64
IP Address (Binary)
11000000.10101000.00000001.
01000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.1.64
Lowest Host ID: 192.168.1.65
Broadcast Address:
192.168.1.127
Highest Host ID: 192.168.1.126
Table 63 Subnet 3
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address
192.168.1.
128
IP Address (Binary)
11000000.10101000.00000001.
10000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.1.128
Lowest Host ID: 192.168.1.129
Broadcast Address:
192.168.1.191
Highest Host ID: 192.168.1.190
Table 64 Subnet 4
IP/SUBNET MASK
NETWORK NUMBER
LAST OCTET BIT
VALUE
IP Address
192.168.1.
192
IP Address (Binary)
11000000.10101000.00000001.
11000000
Subnet Mask (Binary)
11111111.11111111.11111111.
11000000
Subnet Address:
192.168.1.192
Lowest Host ID: 192.168.1.193
Broadcast Address:
192.168.1.255
Highest Host ID: 192.168.1.254
Example: Eight Subnets
Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and
111).
The following table shows IP address last octet values for each subnet.
Table 65 Eight Subnets
210
SUBNET
SUBNET
ADDRESS
FIRST ADDRESS
LAST
ADDRESS
BROADCAST
ADDRESS
30
31
32
33
62
63
64
65
94
95
96
97
126
127
P-870HW-51a v2 User’s Guide
Appendix C IP Addresses and Subnetting
Table 65 Eight Subnets (continued)
SUBNET
SUBNET
ADDRESS
FIRST ADDRESS
LAST
ADDRESS
BROADCAST
ADDRESS
128
129
158
159
160
161
190
191
192
193
222
223
224
225
254
255
Subnet Planning
The following table is a summary for subnet planning on a network with a 24-bit network
number.
Table 66 24-bit Network Number Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
255.255.255.128 (/25)
126
255.255.255.192 (/26)
62
255.255.255.224 (/27)
30
255.255.255.240 (/28)
16
14
255.255.255.248 (/29)
32
255.255.255.252 (/30)
64
255.255.255.254 (/31)
128
The following table is a summary for subnet planning on a network with a 16-bit network
number.
Table 67 16-bit Network Number Subnet Planning
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
255.255.128.0 (/17)
32766
255.255.192.0 (/18)
16382
255.255.224.0 (/19)
8190
255.255.240.0 (/20)
16
4094
255.255.248.0 (/21)
32
2046
255.255.252.0 (/22)
64
1022
255.255.254.0 (/23)
128
510
255.255.255.0 (/24)
256
254
255.255.255.128 (/25)
512
126
10
255.255.255.192 (/26)
1024
62
11
255.255.255.224 (/27)
2048
30
12
255.255.255.240 (/28)
4096
14
13
255.255.255.248 (/29)
8192
P-870HW-51a v2 User’s Guide
211
Appendix C IP Addresses and Subnetting
Table 67 16-bit Network Number Subnet Planning (continued)
NO. “BORROWED”
HOST BITS
SUBNET MASK
NO. SUBNETS
NO. HOSTS PER
SUBNET
14
255.255.255.252 (/30)
16384
15
255.255.255.254 (/31)
32768
Configuring IP Addresses
Where you obtain your network number depends on your particular situation. If the ISP or
your network administrator assigns you a block of registered IP addresses, follow their
instructions in selecting the IP addresses and the subnet mask.
If the ISP did not explicitly give you an IP network number, then most likely you have a single
user account and the ISP will assign you a dynamic IP address when the connection is
established. If this is the case, it is recommended that you select a network number from
192.168.0.0 to 192.168.255.0. The Internet Assigned Number Authority (IANA) reserved this
block of addresses specifically for private use; please do not use any other number unless you
are told otherwise. You must also enable Network Address Translation (NAT) on the ZyXEL
Device.
Once you have decided on the network number, pick an IP address for your ZyXEL Device
that is easy to remember (for instance, 192.168.1.1) but make sure that no other device on your
network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your ZyXEL Device
will compute the subnet mask automatically based on the IP address that you entered. You
don't need to change the subnet mask computed by the ZyXEL Device unless you are
instructed to do otherwise.
Private IP Addresses
Every machine on the Internet must have a unique address. If your networks are isolated from
the Internet (running only between two branch offices, for example) you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private
networks:
• 10.0.0.0 — 10.255.255.255
• 172.16.0.0 — 172.31.255.255
• 192.168.0.0 — 192.168.255.255
You can obtain your IP address from the IANA, from an ISP, or it can be assigned from a
private network. If you belong to a small organization and your Internet access is through an
ISP, the ISP can provide you with the Internet addresses for your local networks. On the other
hand, if you are part of a much larger organization, you should consult your network
administrator for the appropriate IP addresses.
Regardless of your particular situation, do not create an arbitrary IP address; always follow the
guidelines above. For more information on address assignment, please refer to RFC 1597,
Address Allocation for Private Internets and RFC 1466, Guidelines for Management of IP
Address Space.
212
P-870HW-51a v2 User’s Guide
Appendix C IP Addresses and Subnetting
IP Address Conflicts
Each device on a network must have a unique IP address. Devices with duplicate IP addresses
on the same network will not be able to access the Internet or other resources. The devices may
also be unreachable through the network.
Conflicting Computer IP Addresses Example
More than one device can not use the same IP address. In the following example computer A
has a static (or fixed) IP address that is the same as the IP address that a DHCP server assigns
to computer B which is a DHCP client. Neither can access the Internet. This problem can be
solved by assigning a different static IP address to computer A or setting computer A to obtain
an IP address automatically.
Figure 150 Conflicting Computer IP Addresses Example
Conflicting Router IP Addresses Example
Since a router connects different networks, it must have interfaces using different network
numbers. For example, if a router is set between a LAN and the Internet (WAN), the router’s
LAN and WAN addresses must be on different subnets. In the following example, the LAN
and WAN are on the same subnet. The LAN computers cannot access the Internet because the
router cannot route between networks.
Figure 151 Conflicting Computer IP Addresses Example
P-870HW-51a v2 User’s Guide
213
Appendix C IP Addresses and Subnetting
Conflicting Computer and Router IP Addresses Example
More than one device can not use the same IP address. In the following example, the computer
and the router’s LAN port both use 192.168.1.1 as the IP address. The computer cannot access
the Internet. This problem can be solved by assigning a different IP address to the computer or
the router’s LAN port.
Figure 152 Conflicting Computer and Router IP Addresses Example
214
P-870HW-51a v2 User’s Guide
APPENDIX
Wireless LANs
Wireless LAN Topologies
This section discusses ad-hoc and infrastructure wireless LAN topologies.
Ad-hoc Wireless LAN Configuration
The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of
computers with wireless adapters (A, B, C). Any time two or more wireless adapters are within
range of each other, they can set up an independent network, which is commonly referred to as
an ad-hoc network or Independent Basic Service Set (IBSS). The following diagram shows an
example of notebook computers using wireless adapters to form an ad-hoc wireless LAN.
Figure 153 Peer-to-Peer Communication in an Ad-hoc Network
BSS
A Basic Service Set (BSS) exists when all communications between wireless clients or
between a wireless client and a wired network client go through one access point (AP).
Intra-BSS traffic is traffic between wireless clients in the BSS. When Intra-BSS is enabled,
wireless client A and B can access the wired network and communicate with each other. When
Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot
communicate with each other.
P-870HW-51a v2 User’s Guide
215
Appendix D Wireless LANs
Figure 154 Basic Service Set
ESS
An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an
access point, with each access point connected together by a wired network. This wired
connection between APs is called a Distribution System (DS).
This type of wireless LAN topology is called an Infrastructure WLAN. The Access Points not
only provide communication with the wired network but also mediate wireless network traffic
in the immediate neighborhood.
An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their
associated wireless clients within the same ESS must have the same ESSID in order to
communicate.
216
P-870HW-51a v2 User’s Guide
Appendix D Wireless LANs
Figure 155 Infrastructure WLAN
Channel
A channel is the radio frequency(ies) used by wireless devices to transmit and receive data.
Channels available depend on your geographical area. You may have a choice of channels (for
your region) so you should use a channel different from an adjacent AP (access point) to
reduce interference. Interference occurs when radio signals from different access points
overlap causing interference and degrading performance.
Adjacent channels partially overlap however. To avoid interference due to overlap, your AP
should be on a channel at least five channels away from a channel that an adjacent AP is using.
For example, if your region has 11 channels and an adjacent AP is using channel 1, then you
need to select a channel between 6 or 11.
RTS/CTS
A hidden node occurs when two stations are within range of the same access point, but are not
within range of each other. The following figure illustrates a hidden node. Both stations (STA)
are within range of the access point (AP) or wireless gateway, but out-of-range of each other,
so they cannot "hear" each other, that is they do not know if the channel is currently being
used. Therefore, they are considered hidden from each other.
P-870HW-51a v2 User’s Guide
217
Appendix D Wireless LANs
Figure 156
RTS/CTS
When station A sends data to the AP, it might not know that the station B is already using the
channel. If these two stations send data at the same time, collisions may occur when both sets
of data arrive at the AP at the same time, resulting in a loss of messages for both stations.
RTS/CTS is designed to prevent collisions due to hidden nodes. An RTS/CTS defines the
biggest size data frame you can send before an RTS (Request To Send)/CTS (Clear to Send)
handshake is invoked.
When a data frame exceeds the RTS/CTS value you set (between 0 to 2432 bytes), the station
that wants to transmit this frame must first send an RTS (Request To Send) message to the AP
for permission to send it. The AP then responds with a CTS (Clear to Send) message to all
other stations within its range to notify them to defer their transmission. It also reserves and
confirms with the requesting station the time frame for the requested transmission.
Stations can send frames smaller than the specified RTS/CTS directly to the AP without the
RTS (Request To Send)/CTS (Clear to Send) handshake.
You should only configure RTS/CTS if the possibility of hidden nodes exists on your network
and the "cost" of resending large frames is more than the extra network overhead involved in
the RTS (Request To Send)/CTS (Clear to Send) handshake.
If the RTS/CTS value is greater than the Fragmentation Threshold value (see next), then the
RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as data frames will
be fragmented before they reach RTS/CTS size.
Enabling the RTS Threshold causes redundant network overhead that could
negatively affect the throughput performance instead of providing a remedy.
Fragmentation Threshold
A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432
bytes) that can be sent in the wireless network before the AP will fragment the packet into
smaller data frames.
A large Fragmentation Threshold is recommended for networks not prone to interference
while you should set a smaller threshold for busy networks or networks that are prone to
interference.
218
P-870HW-51a v2 User’s Guide
Appendix D Wireless LANs
If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously)
you set then the RTS (Request To Send)/CTS (Clear to Send) handshake will never occur as
data frames will be fragmented before they reach RTS/CTS size.
Preamble Type
Preamble is used to signal that data is coming to the receiver. Short and long refer to the length
of the synchronization field in a packet.
Short preamble increases performance as less time sending preamble means more time for
sending data. All IEEE 802.11 compliant wireless adapters support long preamble, but not all
support short preamble.
Use long preamble if you are unsure what preamble mode other wireless devices on the
network support, and to provide more reliable communications in busy wireless networks.
Use short preamble if you are sure all wireless devices on the network support it, and to
provide more efficient communications.
Use the dynamic setting to automatically use short preamble when all wireless devices on the
network support it, otherwise the ZyXEL Device uses long preamble.
The wireless devices MUST use the same preamble mode in order to
communicate.
IEEE 802.11g Wireless LAN
IEEE 802.11g is fully compatible with the IEEE 802.11b standard. This means an IEEE
802.11b adapter can interface directly with an IEEE 802.11g access point (and vice versa) at
11 Mbps or lower depending on range. IEEE 802.11g has several intermediate rate steps
between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation
are as follows:
Table 68 IEEE 802.11g
DATA RATE (MBPS)
MODULATION
DBPSK (Differential Binary Phase Shift Keyed)
DQPSK (Differential Quadrature Phase Shift Keying)
5.5 / 11
CCK (Complementary Code Keying)
6/9/12/18/24/36/48/54
OFDM (Orthogonal Frequency Division Multiplexing)
Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
clients, access points and the wired network.
P-870HW-51a v2 User’s Guide
219
Appendix D Wireless LANs
Wireless security methods available on the ZyXEL Device are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the ZyXEL Device
identity.
The following figure shows the relative effectiveness of these wireless security methods
available on your ZyXEL Device.
Table 69 Wireless Security Levels
SECURITY
LEVEL
SECURITY TYPE
Least
Secure
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
Most Secure
WPA2
You must enable the same wireless security settings on the ZyXEL Device and
on all wireless clients that you want to associate with it.
IEEE 802.1x
In June 2001, the IEEE 802.1x standard was designed to extend the features of IEEE 802.11 to
support extended authentication as well as providing additional accounting and control
features. It is supported by Windows XP and a number of network devices. Some advantages
of IEEE 802.1x are:
• User based identification that allows for roaming.
• Support for RADIUS (Remote Authentication Dial In User Service, RFC 2138, 2139) for
centralized user profile and accounting management on a network RADIUS server.
• Support for EAP (Extensible Authentication Protocol, RFC 2486) that allows additional
authentication methods to be deployed with no changes to the access point or the wireless
clients.
RADIUS
RADIUS is based on a client-server model that supports authentication, authorization and
accounting. The access point is the client and the server is the RADIUS server. The RADIUS
server handles the following tasks:
• Authentication
Determines the identity of the users.
• Authorization
220
P-870HW-51a v2 User’s Guide
Appendix D Wireless LANs
Determines the network services available to authenticated users once they are connected
to the network.
• Accounting
Keeps track of the client’s network activity.
RADIUS is a simple package exchange in which your AP acts as a message relay between the
wireless client and the network RADIUS server.
Types of RADIUS Messages
The following types of RADIUS messages are exchanged between the access point and the
RADIUS server for user authentication:
• Access-Request
Sent by an access point requesting authentication.
• Access-Reject
Sent by a RADIUS server rejecting access.
• Access-Accept
Sent by a RADIUS server allowing access.
• Access-Challenge
Sent by a RADIUS server requesting more information in order to allow access. The
access point sends a proper response from the user and then sends another Access-Request
message.
The following types of RADIUS messages are exchanged between the access point and the
RADIUS server for user accounting:
• Accounting-Request
Sent by the access point requesting accounting.
• Accounting-Response
Sent by the RADIUS server to indicate that it has started or stopped accounting.
In order to ensure network security, the access point and the RADIUS server use a shared
secret key, which is a password, they both know. The key is not sent over the network. In
addition to the shared key, password information exchanged is also encrypted to protect the
network from unauthorized access.
Types of EAP Authentication
This section discusses some popular authentication types: EAP-MD5, EAP-TLS, EAP-TTLS,
PEAP and LEAP. Your wireless LAN device may not support all authentication types.
EAP (Extensible Authentication Protocol) is an authentication protocol that runs on top of the
IEEE 802.1x transport mechanism in order to support multiple types of user authentication. By
using EAP to interact with an EAP-compatible RADIUS server, an access point helps a
wireless station and a RADIUS server perform authentication.
The type of authentication you use depends on the RADIUS server and an intermediary AP(s)
that supports IEEE 802.1x. .
P-870HW-51a v2 User’s Guide
221
Appendix D Wireless LANs
For EAP-TLS authentication type, you must first have a wired connection to the network and
obtain the certificate(s) from a certificate authority (CA). A certificate (also called digital IDs)
can be used to authenticate users and a CA issues certificates and guarantees the identity of
each certificate owner.
EAP-MD5 (Message-Digest Algorithm 5)
MD5 authentication is the simplest one-way authentication method. The authentication server
sends a challenge to the wireless client. The wireless client ‘proves’ that it knows the password
by encrypting the password with the challenge and sends back the information. Password is
not sent in plain text.
However, MD5 authentication has some weaknesses. Since the authentication server needs to
get the plaintext passwords, the passwords must be stored. Thus someone other than the
authentication server may access the password file. In addition, it is possible to impersonate an
authentication server as MD5 authentication method does not perform mutual authentication.
Finally, MD5 authentication method does not support data encryption with dynamic session
key. You must configure WEP encryption keys for data encryption.
EAP-TLS (Transport Layer Security)
With EAP-TLS, digital certifications are needed by both the server and the wireless clients for
mutual authentication. The server presents a certificate to the client. After validating the
identity of the server, the client sends a different certificate to the server. The exchange of
certificates is done in the open before a secured tunnel is created. This makes user identity
vulnerable to passive attacks. A digital certificate is an electronic ID card that authenticates the
sender’s identity. However, to implement EAP-TLS, you need a Certificate Authority (CA) to
handle certificates, which imposes a management overhead.
EAP-TTLS (Tunneled Transport Layer Service)
EAP-TTLS is an extension of the EAP-TLS authentication that uses certificates for only the
server-side authentications to establish a secure connection. Client authentication is then done
by sending username and password through the secure connection, thus client identity is
protected. For client authentication, EAP-TTLS supports EAP methods and legacy
authentication methods such as PAP, CHAP, MS-CHAP and MS-CHAP v2.
PEAP (Protected EAP)
Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection,
then use simple username and password methods through the secured connection to
authenticate the clients, thus hiding client identity. However, PEAP only supports EAP
methods, such as EAP-MD5, EAP-MSCHAPv2 and EAP-GTC (EAP-Generic Token Card),
for client authentication. EAP-GTC is implemented only by Cisco.
LEAP
LEAP (Lightweight Extensible Authentication Protocol) is a Cisco implementation of IEEE
802.1x.
222
P-870HW-51a v2 User’s Guide
Appendix D Wireless LANs
Dynamic WEP Key Exchange
The AP maps a unique key that is generated with the RADIUS server. This key expires when
the wireless connection times out, disconnects or reauthentication times out. A new WEP key
is generated each time reauthentication is performed.
If this feature is enabled, it is not necessary to configure a default encryption key in the
wireless security configuration screen. You may still configure and store keys, but they will
not be used while dynamic WEP is enabled.
EAP-MD5 cannot be used with Dynamic WEP Key Exchange
For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use
dynamic keys for data encryption. They are often deployed in corporate environments, but for
public deployment, a simple user name and password pair is more practical. The following
table is a comparison of the features of authentication types.
Table 70 Comparison of EAP Authentication Types
EAP-MD5
EAP-TLS
EAP-TTLS
PEAP
LEAP
Mutual Authentication
No
Yes
Yes
Yes
Yes
Certificate – Client
No
Yes
Optional
Optional
No
Certificate – Server
No
Yes
Yes
Yes
No
Dynamic Key Exchange
No
Yes
Yes
Yes
Yes
Credential Integrity
None
Strong
Strong
Strong
Moderate
Deployment Difficulty
Easy
Hard
Moderate
Moderate
Moderate
Client Identity Protection
No
No
Yes
Yes
No
WPA and WPA2
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE
802.11i) is a wireless security standard that defines stronger encryption, authentication and
key management than WPA.
Key differences between WPA or WPA2 and WEP are improved data encryption and user
authentication.
If both an AP and the wireless clients support WPA2 and you have an external RADIUS
server, use WPA2 for stronger data encryption. If you don't have an external RADIUS server,
you should use WPA2-PSK (WPA2-Pre-Shared Key) that only requires a single (identical)
password entered into each access point, wireless gateway and wireless client. As long as the
passwords match, a wireless client will be granted access to a WLAN.
If the AP or the wireless clients do not support WPA2, just use WPA or WPA-PSK depending
on whether you have an external RADIUS server or not.
Select WEP only when the AP and/or wireless clients do not support WPA or WPA2. WEP is
less secure than WPA or WPA2.
P-870HW-51a v2 User’s Guide
223
Appendix D Wireless LANs
Encryption
WPA improves data encryption by using Temporal Key Integrity Protocol (TKIP), Message
Integrity Check (MIC) and IEEE 802.1x. WPA2 also uses TKIP when required for
compatibility reasons, but offers stronger encryption than TKIP with Advanced Encryption
Standard (AES) in the Counter mode with Cipher block chaining Message authentication code
Protocol (CCMP).
TKIP uses 128-bit keys that are dynamically generated and distributed by the authentication
server. AES (Advanced Encryption Standard) is a block cipher that uses a 256-bit
mathematical algorithm called Rijndael. They both include a per-packet key mixing function,
a Message Integrity Check (MIC) named Michael, an extended initialization vector (IV) with
sequencing rules, and a re-keying mechanism.
WPA and WPA2 regularly change and rotate the encryption keys so that the same encryption
key is never used twice.
The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up
a key hierarchy and management system, using the PMK to dynamically generate unique data
encryption keys to encrypt every data packet that is wirelessly communicated between the AP
and the wireless clients. This all happens in the background automatically.
The Message Integrity Check (MIC) is designed to prevent an attacker from capturing data
packets, altering them and resending them. The MIC provides a strong mathematical function
in which the receiver and the transmitter each compute and then compare the MIC. If they do
not match, it is assumed that the data has been tampered with and the packet is dropped.
By generating unique data encryption keys for every data packet and by creating an integrity
checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a Wi-Fi
network than WEP and difficult for an intruder to break into the network.
The encryption mechanisms used for WPA(2) and WPA(2)-PSK are the same. The only
difference between the two is that WPA(2)-PSK uses a simple common password, instead of
user-specific credentials. The common-password approach makes WPA(2)-PSK susceptible to
brute-force password-guessing attacks but it’s still an improvement over WEP as it employs a
consistent, single, alphanumeric password to derive a PMK which is used to generate unique
temporal encryption keys. This prevent all wireless devices sharing the same encryption keys.
(a weakness of WEP)
User Authentication
WPA and WPA2 apply IEEE 802.1x and Extensible Authentication Protocol (EAP) to
authenticate wireless clients using an external RADIUS database. WPA2 reduces the number
of key exchange messages from six to four (CCMP 4-way handshake) and shortens the time
required to connect to a network. Other WPA2 authentication features that are different from
WPA include key caching and pre-authentication. These two features are optional and may not
be supported in all wireless devices.
Key caching allows a wireless client to store the PMK it derived through a successful
authentication with an AP. The wireless client uses the PMK when it tries to connect to the
same AP and does not need to go with the authentication process again.
Pre-authentication enables fast roaming by allowing the wireless client (already connecting to
an AP) to perform IEEE 802.1x authentication with another AP before connecting to it.
224
P-870HW-51a v2 User’s Guide
Appendix D Wireless LANs
Wireless Client WPA Supplicants
A wireless client supplicant is the software that runs on an operating system instructing the
wireless client how to use WPA. At the time of writing, the most widely available supplicant is
the WPA patch for Windows XP, Funk Software's Odyssey client.
The Windows XP patch is a free download that adds WPA capability to Windows XP's built-in
"Zero Configuration" wireless client. However, you must run Windows XP to use it.
WPA(2) with RADIUS Application Example
To set up WPA(2), you need the IP address of the RADIUS server, its port number (default is
1812), and the RADIUS shared secret. A WPA(2) application example with an external
RADIUS server looks as follows. "A" is the RADIUS server. "DS" is the distribution system.
1 The AP passes the wireless client's authentication request to the RADIUS server.
2 The RADIUS server then checks the user's identification against its database and grants
or denies network access accordingly.
3 A 256-bit Pairwise Master Key (PMK) is derived from the authentication process by the
RADIUS server and the client.
4 The RADIUS server distributes the PMK to the AP. The AP then sets up a key hierarchy
and management system, using the PMK to dynamically generate unique data encryption
keys. The keys are used to encrypt every data packet that is wirelessly communicated
between the AP and the wireless clients.
Figure 157 WPA(2) with RADIUS Application Example
WPA(2)-PSK Application Example
A WPA(2)-PSK application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must consist of between 8 and 63 ASCII characters or 64 hexadecimal characters
(including spaces and symbols).
2 The AP checks each wireless client's password and allows it to join the network only if
the password matches.
P-870HW-51a v2 User’s Guide
225
Appendix D Wireless LANs
3 The AP and wireless clients generate a common PMK (Pairwise Master Key). The key
itself is not sent over the network, but is derived from the PSK and the SSID.
4 The AP and wireless clients use the TKIP or AES encryption process, the PMK and
information exchanged in a handshake to create temporal encryption keys. They use
these keys to encrypt data exchanged between them.
Figure 158 WPA(2)-PSK Authentication
Security Parameters Summary
Refer to this table to see what other security parameters you should configure for each
authentication method or key management protocol type. MAC address filters are not
dependent on how you configure these security features.
Table 71 Wireless Security Relational Matrix
AUTHENTICATION
ENCRYPTIO
METHOD/ KEY
MANAGEMENT PROTOCOL N METHOD
ENTER
MANUAL KEY
IEEE 802.1X
Open
No
Disable
None
Enable without Dynamic WEP Key
Open
Shared
226
WEP
WEP
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
No
Enable with Dynamic WEP Key
Yes
Enable without Dynamic WEP Key
Yes
Disable
WPA
TKIP/AES
No
Enable
WPA-PSK
TKIP/AES
Yes
Disable
WPA2
TKIP/AES
No
Enable
WPA2-PSK
TKIP/AES
Yes
Disable
P-870HW-51a v2 User’s Guide
Appendix D Wireless LANs
Antenna Overview
An antenna couples RF signals onto air. A transmitter within a wireless device sends an RF
signal to the antenna, which propagates the signal through the air. The antenna also operates in
reverse by capturing RF signals from the air.
Positioning the antennas properly increases the range and coverage area of a wireless LAN.
Antenna Characteristics
Frequency
An antenna in the frequency of 2.4GHz (IEEE 802.11b and IEEE 802.11g) or 5GHz (IEEE
802.11a) is needed to communicate efficiently in a wireless LAN
Radiation Pattern
A radiation pattern is a diagram that allows you to visualize the shape of the antenna’s
coverage area.
Antenna Gain
Antenna gain, measured in dB (decibel), is the increase in coverage within the RF beam width.
Higher antenna gain improves the range of the signal for better communications.
For an indoor site, each 1 dB increase in antenna gain results in a range increase of
approximately 2.5%. For an unobstructed outdoor site, each 1dB increase in gain results in a
range increase of approximately 5%. Actual results may vary depending on the network
environment.
Antenna gain is sometimes specified in dBi, which is how much the antenna increases the
signal power compared to using an isotropic antenna. An isotropic antenna is a theoretical
perfect antenna that sends out radio signals equally well in all directions. dBi represents the
true gain that the antenna provides.
Types of Antennas for WLAN
There are two types of antennas used for wireless LAN applications.
• Omni-directional antennas send the RF signal out in all directions on a horizontal plane.
The coverage area is torus-shaped (like a donut) which makes these antennas ideal for a
room environment. With a wide coverage area, it is possible to make circular overlapping
coverage areas with multiple access points.
• Directional antennas concentrate the RF signal in a beam, like a flashlight does with the
light from its bulb. The angle of the beam determines the width of the coverage pattern.
Angles typically range from 20 degrees (very directional) to 120 degrees (less directional).
Directional antennas are ideal for hallways and outdoor point-to-point applications.
P-870HW-51a v2 User’s Guide
227
Appendix D Wireless LANs
Positioning Antennas
In general, antennas should be mounted as high as practically possible and free of
obstructions. In point-to–point application, position both antennas at the same height and in a
direct line of sight to each other to attain the best performance.
For omni-directional antennas mounted on a table, desk, and so on, point the antenna up. For
omni-directional antennas mounted on a wall or ceiling, point the antenna down. For a single
AP application, place omni-directional antennas as close to the center of the coverage area as
possible.
For directional antennas, point the antenna in the direction of the desired coverage area.
228
P-870HW-51a v2 User’s Guide
APPENDIX
Common Services
The following table lists some commonly-used services and their associated protocols and port
numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services,
visit the IANA (Internet Assigned Number Authority) web site.
• Name: This is a short, descriptive name for the service. You can use this one or create a
different one, if you like.
• Protocol: This is the type of IP protocol used by the service. If this is TCP/UDP, then the
service uses the same port number with TCP and UDP. If this is USER-DEFINED, the
Port(s) is the IP protocol number, not the port number.
• Port(s): This value depends on the Protocol. Please refer to RFC 1700 for further
information about port numbers.
• If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number.
• If the Protocol is USER, this is the IP protocol number.
• Description: This is a brief explanation of the applications that use this service or the
situations in which this service is used.
Table 72 Commonly Used Services
NAME
PROTOCOL
PORT(S)
DESCRIPTION
AH
(IPSEC_TUNNEL)
User-Defined
51
The IPSEC AH (Authentication Header)
tunneling protocol uses this service.
AIM/New-ICQ
TCP
5190
AOL’s Internet Messenger service. It is also
used as a listening port by ICQ.
AUTH
TCP
113
Authentication protocol used by some
servers.
BGP
TCP
179
Border Gateway Protocol.
BOOTP_CLIENT
UDP
68
DHCP Client.
BOOTP_SERVER
UDP
67
DHCP Server.
CU-SEEME
TCP
UDP
7648
24032
A popular videoconferencing solution from
White Pines Software.
DNS
TCP/UDP
53
Domain Name Server, a service that
matches web names (for example
www.zyxel.com) to IP numbers.
ESP
(IPSEC_TUNNEL)
User-Defined
50
The IPSEC ESP (Encapsulation Security
Protocol) tunneling protocol uses this
service.
FINGER
TCP
79
Finger is a UNIX or Internet related
command that can be used to find out if a
user is logged on.
P-870HW-51a v2 User’s Guide
229
Appendix E Common Services
Table 72 Commonly Used Services (continued)
230
NAME
PROTOCOL
PORT(S)
DESCRIPTION
FTP
TCP
TCP
20
21
File Transfer Program, a program to enable
fast transfer of files, including large files
that may not be possible by e-mail.
H.323
TCP
1720
NetMeeting uses this protocol.
HTTP
TCP
80
Hyper Text Transfer Protocol - a client/
server protocol for the world wide web.
HTTPS
TCP
443
HTTPS is a secured http session often
used in e-commerce.
ICMP
User-Defined
Internet Control Message Protocol is often
used for diagnostic or routing purposes.
ICQ
UDP
4000
This is a popular Internet chat program.
IGMP (MULTICAST) User-Defined
Internet Group Management Protocol is
used when sending packets to a specific
group of hosts.
IKE
UDP
500
The Internet Key Exchange algorithm is
used for key distribution and management.
IRC
TCP/UDP
6667
This is another popular Internet chat
program.
MSN Messenger
TCP
1863
Microsoft Networks’ messenger service
uses this protocol.
NEW-ICQ
TCP
5190
An Internet chat program.
NEWS
TCP
144
A protocol for news groups.
NFS
UDP
2049
Network File System - NFS is a client/
server distributed file service that provides
transparent file sharing for network
environments.
NNTP
TCP
119
Network News Transport Protocol is the
delivery mechanism for the USENET
newsgroup service.
PING
User-Defined
Packet INternet Groper is a protocol that
sends out ICMP echo requests to test
whether or not a remote host is reachable.
POP3
TCP
110
Post Office Protocol version 3 lets a client
computer get e-mail from a POP3 server
through a temporary connection (TCP/IP or
other).
PPTP
TCP
1723
Point-to-Point Tunneling Protocol enables
secure transfer of data over public
networks. This is the control channel.
PPTP_TUNNEL
(GRE)
User-Defined
47
PPTP (Point-to-Point Tunneling Protocol)
enables secure transfer of data over public
networks. This is the data channel.
RCMD
TCP
512
Remote Command Service.
REAL_AUDIO
TCP
7070
A streaming audio service that enables real
time sound over the web.
REXEC
TCP
514
Remote Execution Daemon.
RLOGIN
TCP
513
Remote Login.
RTELNET
TCP
107
Remote Telnet.
P-870HW-51a v2 User’s Guide
Appendix E Common Services
Table 72 Commonly Used Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
RTSP
TCP/UDP
554
The Real Time Streaming (media control)
Protocol (RTSP) is a remote control for
multimedia on the Internet.
SFTP
TCP
115
Simple File Transfer Protocol.
SMTP
TCP
25
Simple Mail Transfer Protocol is the
message-exchange standard for the
Internet. SMTP enables you to move
messages from one e-mail server to
another.
SNMP
TCP/UDP
161
Simple Network Management Program.
SNMP-TRAPS
TCP/UDP
162
Traps for use with the SNMP (RFC:1215).
SQL-NET
TCP
1521
Structured Query Language is an interface
to access data on many different types of
database systems, including mainframes,
midrange systems, UNIX systems and
network servers.
SSH
TCP/UDP
22
Secure Shell Remote Login Program.
STRM WORKS
UDP
1558
Stream Works Protocol.
SYSLOG
UDP
514
Syslog allows you to send system logs to a
UNIX server.
TACACS
UDP
49
Login Host Protocol used for (Terminal
Access Controller Access Control System).
TELNET
TCP
23
Telnet is the login and terminal emulation
protocol common on the Internet and in
UNIX environments. It operates over TCP/
IP networks. Its primary function is to allow
users to log into remote host systems.
TFTP
UDP
69
Trivial File Transfer Protocol is an Internet
file transfer protocol similar to FTP, but
uses the UDP (User Datagram Protocol)
rather than TCP (Transmission Control
Protocol).
VDOLIVE
TCP
7000
Another videoconferencing solution.
P-870HW-51a v2 User’s Guide
231
Appendix E Common Services
232
P-870HW-51a v2 User’s Guide
APPENDIX
Legal Information
Copyright
Copyright © 2008 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
Certifications
Federal Communications Commission (FCC) Interference Statement
The device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This device has been tested and found to comply with the limits for a Class B digital device
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This device generates,
uses, and can radiate radio frequency energy, and if not installed and used in accordance with
the instructions, may cause harmful interference to radio communications. However, there is
no guarantee that interference will not occur in a particular installation.
P-870HW-51a v2 User’s Guide
233
Appendix F Legal Information
If this device does cause harmful interference to radio/television reception, which can be
determined by turning the device off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
1 Reorient or relocate the receiving antenna.
2 Increase the separation between the equipment and the receiver.
3 Connect the equipment into an outlet on a circuit different from that to which the
receiver is connected.
4 Consult the dealer or an experienced radio/TV technician for help.
FCC Radiation Exposure Statement
• This transmitter must not be co-located or operating in conjunction with any other antenna
or transmitter.
• IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmware-limited to
channels 1 through 11.
• To comply with FCC RF exposure compliance requirements, a separation distance of at
least 20 cm must be maintained between the antenna of this device and all persons.
注意 !
依據
低功率電波輻射性電機管理辦法
第十二條 經型式認證合格之低功率射頻電機,非經許可,公司、商號或使用
者均不得擅自變更頻率、加大功率或變更原設計之特性及功能。
第十四條 低功率射頻電機之使用不得影響飛航安全及干擾合法通信;經發現
有干擾現象時,應立即停用,並改善至無干擾時方得繼續使用。
前項合法通信,指依電信規定作業之無線電信。低功率射頻電機須忍
受合法通信或工業、科學及醫療用電波輻射性電機設備之干擾。
本機限在不干擾合法電臺與不受被干擾保障條件下於室內使用。
減少電磁波影響,請妥適使用。
Notices
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
This device has been designed for the WLAN 2.4 GHz network throughout the EC region and
Switzerland, with restrictions in France.
This Class B digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada.
Viewing Certifications
1 Go to http://www.zyxel.com.
2 Select your product on the ZyXEL home page to go to that product's page.
234
P-870HW-51a v2 User’s Guide
Appendix F Legal Information
3 Select the certification you wish to view from this page.
ZyXEL Limited Warranty
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty
shall not apply if the product has been modified, misused, tampered with, damaged by an act
of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact your vendor. You may also refer to the
warranty policy for the region in which you bought the device at http://www.zyxel.com/web/
support_warranty_info.php.
Registration
Register your product online to receive e-mail notices of firmware upgrades and information
at www.zyxel.com.
P-870HW-51a v2 User’s Guide
235
Appendix F Legal Information
236
P-870HW-51a v2 User’s Guide
APPENDIX
Customer Support
In the event of problems that cannot be solved by using this manual, you should contact your
vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in
which you bought the device. Regional offices are listed below (see also http://
www.zyxel.com/web/contact_us.php). Please have the following information ready when you
contact an office.
Required Information
•
•
•
•
Product model and serial number.
Warranty Information.
Date that you received your device.
Brief description of the problem and the steps you took to solve it.
“+” is the (prefix) number you dial to make an international telephone call.
Corporate Headquarters (Worldwide)
•
•
•
•
•
•
Support E-mail: support@zyxel.com.tw
Sales E-mail: sales@zyxel.com.tw
Telephone: +886-3-578-3942
Fax: +886-3-578-2439
Web: www.zyxel.com
Regular Mail: ZyXEL Communications Corp., 6 Innovation Road II, Science Park,
Hsinchu 300, Taiwan
China - ZyXEL Communications (Beijing) Corp.
•
•
•
•
•
•
Support E-mail: cso.zycn@zyxel.cn
Sales E-mail: sales@zyxel.cn
Telephone: +86-010-82800646
Fax: +86-010-82800587
Address: 902, Unit B, Horizon Building, No.6, Zhichun Str, Haidian District, Beijing
Web: http://www.zyxel.cn
China - ZyXEL Communications (Shanghai) Corp.
•
•
•
•
Support E-mail: cso.zycn@zyxel.cn
Sales E-mail: sales@zyxel.cn
Telephone: +86-021-61199055
Fax: +86-021-52069033
P-870HW-51a v2 User’s Guide
237
Appendix G Customer Support
• Address: 1005F, ShengGao International Tower, No.137 XianXia Rd., Shanghai
• Web: http://www.zyxel.cn
Costa Rica
•
•
•
•
•
•
Support E-mail: soporte@zyxel.co.cr
Sales E-mail: sales@zyxel.co.cr
Telephone: +506-2017878
Fax: +506-2015098
Web: www.zyxel.co.cr
Regular Mail: ZyXEL Costa Rica, Plaza Roble Escazú, Etapa El Patio, Tercer Piso, San
José, Costa Rica
Czech Republic
•
•
•
•
•
E-mail: info@cz.zyxel.com
Telephone: +420-241-091-350
Fax: +420-241-091-359
Web: www.zyxel.cz
Regular Mail: ZyXEL Communications, Czech s.r.o., Modranská 621, 143 01 Praha 4 Modrany, Ceská Republika
Denmark
•
•
•
•
•
•
Support E-mail: support@zyxel.dk
Sales E-mail: sales@zyxel.dk
Telephone: +45-39-55-07-00
Fax: +45-39-55-07-07
Web: www.zyxel.dk
Regular Mail: ZyXEL Communications A/S, Columbusvej, 2860 Soeborg, Denmark
Finland
•
•
•
•
•
•
Support E-mail: support@zyxel.fi
Sales E-mail: sales@zyxel.fi
Telephone: +358-9-4780-8411
Fax: +358-9-4780-8448
Web: www.zyxel.fi
Regular Mail: ZyXEL Communications Oy, Malminkaari 10, 00700 Helsinki, Finland
France
•
•
•
•
•
238
E-mail: info@zyxel.fr
Telephone: +33-4-72-52-97-97
Fax: +33-4-72-52-19-20
Web: www.zyxel.fr
Regular Mail: ZyXEL France, 1 rue des Vergers, Bat. 1 / C, 69760 Limonest, France
P-870HW-51a v2 User’s Guide
Appendix G Customer Support
Germany
•
•
•
•
•
•
Support E-mail: support@zyxel.de
Sales E-mail: sales@zyxel.de
Telephone: +49-2405-6909-69
Fax: +49-2405-6909-99
Web: www.zyxel.de
Regular Mail: ZyXEL Deutschland GmbH., Adenauerstr. 20/A2 D-52146, Wuerselen,
Germany
Hungary
•
•
•
•
•
•
Support E-mail: support@zyxel.hu
Sales E-mail: info@zyxel.hu
Telephone: +36-1-3361649
Fax: +36-1-3259100
Web: www.zyxel.hu
Regular Mail: ZyXEL Hungary, 48, Zoldlomb Str., H-1025, Budapest, Hungary
India
•
•
•
•
•
•
Support E-mail: support@zyxel.in
Sales E-mail: sales@zyxel.in
Telephone: +91-11-30888144 to +91-11-30888153
Fax: +91-11-30888149, +91-11-26810715
Web: http://www.zyxel.in
Regular Mail: India - ZyXEL Technology India Pvt Ltd., II-Floor, F2/9 Okhla Phase -1,
New Delhi 110020, India
Japan
•
•
•
•
•
•
Support E-mail: support@zyxel.co.jp
Sales E-mail: zyp@zyxel.co.jp
Telephone: +81-3-6847-3700
Fax: +81-3-6847-3705
Web: www.zyxel.co.jp
Regular Mail: ZyXEL Japan, 3F, Office T&U, 1-10-10 Higashi-Gotanda, Shinagawa-ku,
Tokyo 141-0022, Japan
Kazakhstan
•
•
•
•
•
•
Support: http://zyxel.kz/support
Sales E-mail: sales@zyxel.kz
Telephone: +7-3272-590-698
Fax: +7-3272-590-689
Web: www.zyxel.kz
Regular Mail: ZyXEL Kazakhstan, 43 Dostyk Ave., Office 414, Dostyk Business Centre,
050010 Almaty, Republic of Kazakhstan
P-870HW-51a v2 User’s Guide
239
Appendix G Customer Support
Malaysia
•
•
•
•
•
•
Support E-mail: support@zyxel.com.my
Sales E-mail: sales@zyxel.com.my
Telephone: +603-8076-9933
Fax: +603-8076-9833
Web: http://www.zyxel.com.my
Regular Mail: ZyXEL Malaysia Sdn Bhd., 1-02 & 1-03, Jalan Kenari 17F, Bandar
Puchong Jaya, 47100 Puchong, Selangor Darul Ehsan, Malaysia
North America
•
•
•
•
•
•
•
Support E-mail: support@zyxel.com
Support Telephone: +1-800-978-7222
Sales E-mail: sales@zyxel.com
Sales Telephone: +1-714-632-0882
Fax: +1-714-632-0858
Web: www.zyxel.com
Regular Mail: ZyXEL Communications Inc., 1130 N. Miller St., Anaheim, CA 928062001, U.S.A.
Norway
•
•
•
•
•
•
Support E-mail: support@zyxel.no
Sales E-mail: sales@zyxel.no
Telephone: +47-22-80-61-80
Fax: +47-22-80-61-81
Web: www.zyxel.no
Regular Mail: ZyXEL Communications A/S, Nils Hansens vei 13, 0667 Oslo, Norway
Poland
•
•
•
•
•
E-mail: info@pl.zyxel.com
Telephone: +48-22-333 8250
Fax: +48-22-333 8251
Web: www.pl.zyxel.com
Regular Mail: ZyXEL Communications, ul. Okrzei 1A, 03-715 Warszawa, Poland
Russia
•
•
•
•
•
•
240
Support: http://zyxel.ru/support
Sales E-mail: sales@zyxel.ru
Telephone: +7-095-542-89-29
Fax: +7-095-542-89-25
Web: www.zyxel.ru
Regular Mail: ZyXEL Russia, Ostrovityanova 37a Str., Moscow 117279, Russia
P-870HW-51a v2 User’s Guide
Appendix G Customer Support
Singapore
•
•
•
•
•
•
Support E-mail: support@zyxel.com.sg
Sales E-mail: sales@zyxel.com.sg
Telephone: +65-6899-6678
Fax: +65-6899-8887
Web: http://www.zyxel.com.sg
Regular Mail: ZyXEL Singapore Pte Ltd., No. 2 International Business Park, The Strategy
#03-28, Singapore 609930
Spain
•
•
•
•
•
•
Support E-mail: support@zyxel.es
Sales E-mail: sales@zyxel.es
Telephone: +34-902-195-420
Fax: +34-913-005-345
Web: www.zyxel.es
Regular Mail: ZyXEL Communications, Arte, 21 5ª planta, 28033 Madrid, Spain
Sweden
•
•
•
•
•
•
Support E-mail: support@zyxel.se
Sales E-mail: sales@zyxel.se
Telephone: +46-31-744-7700
Fax: +46-31-744-7701
Web: www.zyxel.se
Regular Mail: ZyXEL Communications A/S, Sjöporten 4, 41764 Göteborg, Sweden
Taiwan
•
•
•
•
•
•
Support E-mail: support@zyxel.com.tw
Sales E-mail: sales@zyxel.com.tw
Telephone: +886-2-27399889
Fax: +886-2-27353220
Web: http://www.zyxel.com.tw
Address: Room B, 21F., No.333, Sec. 2, Dunhua S. Rd., Da-an District, Taipei
Thailand
•
•
•
•
•
•
Support E-mail: support@zyxel.co.th
Sales E-mail: sales@zyxel.co.th
Telephone: +662-831-5315
Fax: +662-831-5395
Web: http://www.zyxel.co.th
Regular Mail: ZyXEL Thailand Co., Ltd., 1/1 Moo 2, Ratchaphruk Road, Bangrak-Noi,
Muang, Nonthaburi 11000, Thailand.
P-870HW-51a v2 User’s Guide
241
Appendix G Customer Support
Turkey
•
•
•
•
•
Support E-mail: cso@zyxel.com.tr
Telephone: +90 212 222 55 22
Fax: +90-212-220-2526
Web: http:www.zyxel.com.tr
Address: Kaptanpasa Mahallesi Piyalepasa Bulvari Ortadogu Plaza N:14/13 K:6
Okmeydani/Sisli Istanbul/Turkey
Ukraine
•
•
•
•
•
•
Support E-mail: support@ua.zyxel.com
Sales E-mail: sales@ua.zyxel.com
Telephone: +380-44-247-69-78
Fax: +380-44-494-49-32
Web: www.ua.zyxel.com
Regular Mail: ZyXEL Ukraine, 13, Pimonenko Str., Kiev 04050, Ukraine
United Kingdom
•
•
•
•
•
•
242
Support E-mail: support@zyxel.co.uk
Sales E-mail: sales@zyxel.co.uk
Telephone: +44-1344-303044, 0845 122 0301 (UK only)
Fax: +44-1344-303034
Web: www.zyxel.co.uk
Regular Mail: ZyXEL Communications UK Ltd., 11 The Courtyard, Eastern Road,
Bracknell, Berkshire RG12 2XB, United Kingdom (UK)
P-870HW-51a v2 User’s Guide
Index
Index
AAL5 167
ADSL2 167
Advanced Encryption Standard
See AES.
AES 224
alternative subnet mask notation 207
antenna 165
directional 227
gain 227
omni-directional 227
AP (access point) 217
applications
Internet access 26
ATM AAL5 167
ATM Adaptation Layer 5 (AAL5) 167
auto-negotiating rate adaptation 167
loopback test 155
MA 155
MD 155
MEP 155
MIP 155
channel 217
interference 217
channel ID 79
configuration 68, 72
Configure QoS 117
Connectivity Check Messages, see CCMs
contact information 237
copyright 233
CoS 125
CTS (Clear to Send) 218
customer support 237
backup 152
bandwidth management 117
Basic Service Set, See BSS 215
blinking LEDs 27
broadcast 65
BSS 215
CA 222
Canonical Format Indicator See CFI
CCMs 155
Certificate Authority
See CA.
certifications 233
notices 234
viewing 234
CFI 65
CFM 155
CCMs 155
link trace test 155
P-870HW-51a v2 User’s Guide
default 153
default LAN IP address 39
DHCP 50, 68, 72, 127
DHCP relay 166
DHCP server 166
DiffServ (Differentiated Services) 125
DiffServ marking rule 125
disclaimer 233
DNS 68
DNS server address assignment 66
Domain Name 103
domain name system
see DNS
Domain Name System. See DNS.
DoS
Basics 107
DS field 125
DS See Differentiated Services
DSCP 125
DSL interface 54
dynamic DNS 127
Dynamic Host Configuration Protocol. See DHCP.
dynamic WEP key exchange 223
DYNDNS wildcard 127
243
Index
EAP Authentication 221
EAP-MD5 168
ECHO 103
encapsulated routing link protocol (ENET ENCAP) 63
Encapsulation 62
PPP over Ethernet 63
encapsulation
ENET ENCAP 63
encryption 224
WEP 81
ESS 216
Extended Service Set IDentification 79
Extended Service Set, See ESS 216
external antenna 167
external RADIUS 168
F4/F5 OAM 167
FCC interference statement 233
Finger 103
Firewall
Creating/Editing Rules 109
Introduction 107
Policies 107
firmware
upload 150
upload error 151
fragmentation threshold 218
frequency range 168
FTP 100, 103
G.992.1 167
G.992.3 167
G.992.4 167
G.992.5 167
HTTP 103, 107
HTTP (Hypertext Transfer Protocol) 150
humidity 165
IANA 73, 212
IBSS 215
IEEE 802.11g 219
IEEE 802.11g wireless LAN 167
IEEE 802.11i 167
IEEE 802.1Q 65
IGMP 65, 68, 74
version 65
IGMP proxy 167
IGMP v1 167
IGMP v2 167
Independent Basic Service Set
See IBSS 215
initialization vector (IV) 224
install UPnP 132
Windows Me 132
Windows XP 134
Internet access 26
Internet Assigned Numbers Authority
See IANA 212
IP address 72
IP Address Assignment 63
IP alias 166
IP multicasting 167
IP pool 69
IP pool setup 72
LAN TCP/IP 72
LBR 155
link trace 155
Link Trace Message, see LTM
Link Trace Response, see LTR
logs 147
Loop Back Response, see LBR
loopback 155
LTM 155
LTR 155
hidden node 217
host 144
244
P-870HW-51a v2 User’s Guide
Index
MA 155
MAC address filter action 87
MAC filter 86
Maintenance Association, see MA
Maintenance Domain, see MD
Maintenance End Point, see MEP
managing the device
good habits 25
MD 155
MEP 155
Message Integrity Check (MIC) 224
MTU (Multi-Tenant Unit) 65
multicast 65, 68, 73, 74
multiple PVC support 166
NAT 73, 103, 212
Symmetric 64
NAT (Network Address Translation) 99
NAT traversal 131
Network Management 103
NNTP 103
OAM 167
operation humidity 165
operation temperature 165
Packet Transfer Mode 54
Pairwise Master Key (PMK) 224, 226
Permanent Virtual Circuits 167
PHB (Per-Hop Behavior) 125
Point-to-Point Tunneling Protocol 103
POP3 103, 107
ports 27
power adaptor 168
power specifications 165
PPP (Point-to-Point Protocol) Link Layer Protocol 167
P-870HW-51a v2 User’s Guide
PPP over ATM AAL5 167
PPP over Ethernet 167
PPPoE 63
Benefits 63
PPPoE (Point-to-Point Protocol over Ethernet) 166
PPTP 103
preamble mode 219
product registration 235
PSK 224
PTM 54
PVCs 167
QoS 118, 125
QoS class configuration 120
Quality of Service (QoS) 117
Quick Start Guide 39
RADIUS 168, 220
message types 221
messages 221
shared secret key 221
Reach-Extended ADSL 167
registration
product 235
related documentation 3
remote management
TR-069 129
resetting your device 28
restore 152
RFC 1483 167
RFC 1631 99
RFC 2131. See DHCP.
RFC 2132. See DHCP
RFC 2364 167
RFC 2516 166, 167
RFC 2684 167
RIP 68
Routing Information Protocol
see RIP
router features 26
RTS (Request To Send) 218
threshold 217, 218
245
Index
safety warnings 6
seamless rate adaptation 167
Service Set 79
Services 103
SMTP 103
SNMP 103, 167
SRA 167
static route 113
static VLAN
status indicators 27
storage humidity 165
storage temperature 165
subnet 205
subnet mask 72, 206
subnetting 208
Symmetric NAT 64
Symmetric NAT, Outgoing 64
syntax conventions 4
VID
Virtual Local Area Network See VLAN
VLAN 64
Introduction 64
number of possible VIDs
priority frame
static
VLAN ID 65
VLAN Identifier See VID
VLAN tag 65
Tag Control Information See TCI
Tag Protocol Identifier See TPID
TCI
TCP/IP 107
temperature 165
Temporal Key Integrity Protocol (TKIP) 224
TLS 168
TPID 65
TR-069 129
trademarks 233
transparent bridging 167
TTLS 168
unicast 65
Universal Plug and Play 131
application 131
UPnP 131
forum 132
security issues 131
246
WAN (Wide Area Network) 53
warranty 235
note 235
Web Configurator 39
WEP (Wired Equivalent Privacy) 167
WEP encryption 82
Wi-Fi Protected Access 223
Wi-Fi Protected Access (WPA) 167
wireless client WPA supplicants 225
wireless LAN MAC address filtering 167
wireless security 219
Wireless tutorial 31
WLAN
interference 217
security parameters 226
WLAN button 28
WPA 223
key caching 224
pre-authentication 224
user authentication 224
vs WPA-PSK 224
wireless client supplicant 225
with RADIUS application example 225
WPA2 223
user authentication 224
vs WPA2-PSK 224
wireless client supplicant 225
with RADIUS application example 225
WPA2-Pre-Shared Key 223
WPA2-PSK 223, 224
application example 225
WPA-PSK 223, 224
application example 225
P-870HW-51a v2 User’s Guide
Index
ZyXEL_s Firewall
Introduction 107
P-870HW-51a v2 User’s Guide
247
Index
248
P-870HW-51a v2 User’s Guide

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : No
Modify Date                     : 2008:12:18 14:06:59+08:00
Create Date                     : 2008:12:18 14:06:49+08:00
Title                           : SMG-700 User’s Guide V1.00 (Nov 2004)
Author                          : Cindy Yang
Creator                         : FrameMaker 7.1
Producer                        : Acrobat Distiller 6.0.1 (Windows)
Page Count                      : 98
Mod Date                        : 2008:12:18 14:06:59+08:00
Creation Date                   : 2008:12:18 14:06:49+08:00
Metadata Date                   : 2008:12:18 14:06:59+08:00
EXIF Metadata provided by EXIF.tools
FCC ID Filing: I88P870HW51AV2

Navigation menu