ZyXEL Communications X150N Wireless Router User Manual

ZyXEL Communications Corporation Wireless Router

User Manual

          802.11n/b/g Wireless Broadband Router Model: X150N  User’s Manual version 1.0
About This User's Guide  Intended Audience This manual is intended for people who want to configure the NBG-419N using the Web Configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology.    Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access. • Supporting Disc Refer to the included CD for support documents. • ZyXEL Web Site Please refer to www.zyxel.com for additional support documentation and product certifications.  User Guide Feedback Help us help you. Send all User Guide-related comments, questions or suggestions for improvement to the following address, or use e-mail instead.  Thank you!      SUPPORT E-MAIL WEB SITE techwriter@zyxel.com www.zyxel.com
 Safety Warnings  • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT stack things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. Do NOT open the device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risks. ONLY qualified service personnel should service or disassemble this device. Please contact your vendor for further information. • Make sure to connect the cables to the correct ports. • Place connecting cables carefully so that no one will step on them or stumble over them. • Always disconnect all cables from this device before servicing or disassembling. • Use ONLY an appropriate power adaptor or cord for your device. • Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution. • If the power adaptor or cord is damaged, remove it from the power outlet. • Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to order a new one. • Do not use the device outside, and make sure all the connections are indoors. There is a remote risk of electric shock from lightning. • Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your device. • Antenna Warning! This device meets ETSI and FCC certification requirements when using the included antenna(s). Only use the included antenna(s). If you mount your device on the wall, please make sure there will be no damage to electrical wires, gas or water pipes.  • Connect the power adaptor or cord to the right supply voltage (for example 110V in North America or 230VAC in Europe • Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or cord. • Make sure the cable system is grounded so as to provide some protection against power surge.
 Federal Communication Commission  Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:  Reorient or relocate the receiving antenna.  Increase the separation between the equipment and receiver.  Connect the equipment into an outlet on a circuit different from that to which the receiver is needed.  Consult the dealer or an experienced radio/TV technician for help.  Warning:  Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment.   This device complies with Part 15 of the FCC Rules. Operation is subject to the following two conditions:  (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.  The user’s manual or instruction manual for an intentional or unintentional radiator shall caution the user that changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.   FCC Radiation Exposure Statement • The transmitter must not be co-located or operating in conjunction with any other antenna or transmitter.
• IEEE 802.11b or 802.11g operation of this product in the United States of America is firmware limited to channel 1 through 11. • To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons.   Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules.  Operation is subject to the following to two conditions:  This device may not cause interference and  This device must accept any interference, including interference that may cause undesired operation of the device.  This device has been designed to operate with an antenna having a maximum gain of 2 dBi.  Antenna having a higher gain is strictly prohibited per regulation s of Industry Canada.  The required antenna impedance is 50 ohms.  To reduce potential radio interference to other users, the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication.   IMPORTANT NOTE:  IC Radiation Exposure Statement  This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment.  This equipment should be installed and operated with minimum distance 20 cm between the radiating device and your body.
Table of Contents Chapter 1: Introduction ............................................................................................................. 1 Features ............................................................................................................................................... 1 Physical Details ................................................................................................................................... 1 Chapter 2: About Operation Modes ......................................................................................... 4 Router Mode ....................................................................................................................................... 4 Access Point Mode ............................................................................................................................. 5 Chapter 3: Configuration ........................................................................................................... 6 Hardware Mounting ........................................................................................................................... 6 Hardware Connection ........................................................................................................................ 7 Login .................................................................................................................................................... 7 Setup Wizard .................................................................................................................................... 12 Password ........................................................................................................................................... 20 Status ................................................................................................................................................. 21 Wireless Configuration .................................................................................................................... 22 Network Configuration .................................................................................................................... 29 Firewall Security ............................................................................................................................... 37 Advanced Configurations ................................................................................................................ 38 Management ..................................................................................................................................... 43 Advanced configurations ................................................................................................................. 44 Chapter 4: PC Configuration ................................................................................................... 51 Overview ........................................................................................................................................... 51 Windows Clients ............................................................................................................................... 51 Macintosh Clients ............................................................................................................................. 55 Linux Clients ..................................................................................................................................... 56 Other Unix Systems ......................................................................................................................... 56 Wireless Station Configuration ....................................................................................................... 56 Appendix A: Troubleshooting ................................................................................................. 58 Overview ........................................................................................................................................... 58 General Problems ............................................................................................................................. 58 Internet Access................................................................................................................................. 58 Wireless Access ................................................................................................................................ 59 Appendix B: About Wireless LANs ......................................................................................... 61 BSS ..................................................................................................................................................... 61 Channels ............................................................................................................................................ 61 Security .............................................................................................................................................. 62 Wireless LAN Configuration ............................................................................................................ 63 Open Source ..................................................................................................................................... 64
End-User License Agreement for “X150N” ....................................................................................... 64 1. Grant of License for Personal Use ............................................................................................ 64 2. Ownership ............................................................................................................................... 64 3. Copyright ................................................................................................................................. 64 4. Restrictions .............................................................................................................................. 64 5. Confidentiality ......................................................................................................................... 65 6. No Warranty ............................................................................................................................ 65 7. Limitation of Liability ............................................................................................................... 65 8. Export Restrictions .................................................................................................................. 65 9. Audit Rights ............................................................................................................................. 65 10. Termination ......................................................................................................................... 65 11. General ................................................................................................................................ 66 Notice ............................................................................................................................................. 68 GNU GENERAL PUBLIC LICENSE ............................................................................................ 68 GNU LESSER GENERAL PUBLIC LICENSE ............................................................................ 72 Customer Support ............................................................................................................................ 79
1  Chapter 1: Introduction The Wireless Router is an 802.11n/b/g compliant Wireless Broadband Router with 4-port Fast Ethernet Switch. With the advanced wireless N technology, it can support data transmission rates of 6 times more (up to 150 Mbps) and coverage 3 times more than IEEE 802.11b/g devices. The Wireless Router enables network sharing via a high-speed cable or DSL Internet connection. With it, you can share a high-speed Internet connection, files, printers, and multi-player games at incredible speeds, without the hassle of laying new wires. It also offers easy configuration for your home wireless network and creates a home wireless network with high functionality, security, and flexibility. Features 1. Supports the IEEE 802.11n/b/g standard, high speed data rate up to 150Mbps. 2. Supports WPS (Wi-Fi Protected Setup) with reset button. (on the side of the router housing) 3. High security with built-in security: WEP 64/128, WPA, WPA2, and 802.11i 4. Supports Router, AP, WDS (Bridge + Repeater). 5. Advanced Quality of Service (QoS) , WMM 6. Easy configuration for home user setup. Physical Details Front LEDs  LED Behavior LED Printed Color Behavior Indication POWER/ WPS PWR/WPS Green ON Power on OFF Power off Blinking WPS is enabled to make a connection Wireless WLAN Green OFF WLAN off
2  LAN ON  WLAN link / active Blinking WLAN traffic transmitting WAN WAN Green ON WAN link / active OFF WAN function off Blinking WAN traffic transmitting LAN LAN 1 LAN 2 LAN 3 LAN 4 Green OFF LAN function off ON  LAN link / active Blinking LAN traffic transmitting  Rear Panel  Ports and buttons Antenna Install the external antenna here. WPS  To enable the WPS function via web configuration (Go to Wireless Settings> WPS), then press the physical WPS button on the Wireless Router once, then the LED will start to flash. Please make a connection with other WPS supported device within 2 minutes.  LAN  1-4 Use standard LAN cables (RJ45 connectors) to connect your PCs to this port. If required, any port can be connected to another hub. Any LAN port will automatically function as an "Uplink" port when necessary. WAN Connect the ADSL or Cable Modem here with RJ45 cable. If your modem came with a cable, use the supplied cable, otherwise, use a standard LAN cable (RJ45 connectors). POWER Connect the supplied power adapter here.
3  Side Panel  Reset  Press the Reset button more than 3 seconds and the Wireless Router will revert to factory default values.
4  Chapter 2: About Operation Modes  This device provides operational applications with Router and AP modes, which are mutually exclusive.  If you want to change the settings in order to perform more advanced configuration or even change the mode of operation, you can select the mode you desire by the manufacturer as described in the following sections. The default setting mode is Router mode.   Router Mode In this mode, the device will connect to the Internet via ADSL/Cable Modem. The NAT (Network Address Translation) is enabled and PCs in LAN ports share the same IP to ISP through the WAN port. The connection type can be set up in WAN page by using PPPOE, DHCP client, PPTP client, L2TP client or static IP.
5    Access Point Mode When acting as an Access Point (AP), this device connects all the stations (PC/notebook with wireless network adapter) to a wireless network. All stations can have Internet access if the Access Point has an Internet connection.
6  Chapter 3: Configuration Hardware Mounting The Wireless Router is designed to be placed on a raised flat surface like a file cabinet or a book shelf. The unit may also be converted for mounting to a wall or ceiling. 1. There are two mounting hooks on the underside. 2. Mark two upper holes on a wall or on a raised flat surface. 3. Drill two screws into the flat surface until only 1/4'' of the screws are showing. 4. Then, hang the Wireless Router onto the screws.
7  Hardware Connection 1. Connect one end of the Ethernet cable to the LAN port of the Wireless Router,  another end to your PC or notebook. 2. Then, connect another Ethernet cable one end to the Internet port of the Wireless Router, the other end to the ADSL or cable modem. 3. Finally, connect the Wireless Router’s power adapter to an outlet.     Login 1. Start your computer and make sure it is connected to your wireless router by an Ethernet cable. 2. Start your Web Browser. In the address box, enter the IP address of the Wireless Router  192.168.1.1 3. Then press the “Enter” key.
8   4. After connecting successfully, the following screen will appear. Simply enter the username "admin" and password “1234” to login.   After logging in successfully, please click the Setup Wizard item that provides a primary configuration for this device. You may enter each screen to change the default settings step by step.
9
10  If you cannot connect... If the Wireless Router does not respond, please check the following: • Check the Ethernet cable to see if it is connected to the LAN port of the router and the Ethernet port of your computer. • The Wireless Router is properly installed, LAN connection is OK, and it is already powered ON. You can test the connection by using the "Ping" command: • Please go to Start>Run…> Enter “cmd” command in the column to open the MS-DOS window.   •  Enter the command:  ping 192.168.1.1  If no response is received, either the connection is not working, or your PC's IP address is not compatible with the Wireless Router's IP Address. (See next item.) • If your PC is using a fixed IP address, its IP address must be within the range 192.168.1.2 to 192.168.1.253 to be compatible with the Wireless Router's default IP Address of 192.168.1.1. Also, the Network Mask must be set to 255.255.255.0. See Chapter 4 - PC Configuration for details on checking your PC's TCP/IP settings. • Ensure that your PC and the Wireless Router are on the same network segment. Ensure you are using the wired LAN interface. The Wireless interface can only be used if its configuration matches your PC's wireless settings.
11  Common Connection Types Cable Modems Type Details ISP Data required Dynamic IP Address Your IP Address is allocated automatically, when you connect to your ISP. Usually, none.  However, some ISP's may require you to use a particular Hostname, Domain name, or MAC (physical) address. Static (Fixed) IP Address Your ISP allocates a permanent IP address to you. IP address allocated to you. Some ISP's may also require you to use a particular Hostname, Domain name, or MAC (physical) address. DSL Modems Type Details ISP Data required Dynamic IP Address Your IP address is allocated automatically, when you connect to your ISP. None. Static (Fixed) IP Address Your ISP allocates a permanent IP address to you. IP address allocated to you. PPPoE You connect to the ISP only when required. The IP address is usually allocated automatically. User name and password. PPTP Mainly used in Europe. You connect to the ISP only when required. The IP address is usually allocated automatically, but may be static (fixed). • PPTP serer IP address. • User name and password. • IP address allocated to you, if static (fixed). L2TP Mainly used in Europe. You connect to the ISP only when required. The IP address is usually allocated automatically, but may be static (fixed). • L2TP server IP address. • User name and password. • IP address allocated to you, if static (fixed).
12  Other Modems (e.g. Broadband Wireless) Type Details ISP Data required Dynamic IP Address Your IP address is allocated automatically, when you connect to you ISP. None. Static (Fixed) IP Address Your ISP allocates a permanent IP address to you. IP address allocated to you. Setup Wizard  The setup wizard will guide you to configure access point for first time. Please follow the setup wizard step by step.   Step 1- Operation mode User can select the operation modes here to LAN and WLAN interface for NAT and bridging function.
13  Step 2- Time Zone Setting  NTP Settings Enable NTP client update Check the box to synchronize the time with the host PC. Automatically Adjust Daylight Saving Check the box to automatically adjust to daylight saving time. Time Zone Select the time zone area where you are located from the pull-down list. NTP Server Enter the Network Time Protocol Server here. Ex: time.nist.gov, ntp0.broad.mit.edu, or time.stdtime.gov.tw.  Step 3- LAN Interface Setup
14   IP Address Shows the IP address of the Wireless Router (default IP address is 192.168.1.1.) Subnet Mask The subnet mask of the Wireless Router (degault subnet mask is 255.255.255.0.)    Step 4- WAN Interface Setup   WAN Access Type DHCP Client  If the DHCP Client connection is selected, the PC will obtain the IP address automatically.  Static IP
15   If the Static IP is selected, the user will have to set up the IP address, subnet mask and default gateway according to the ISP (Internet Service Provider) that provided the related information. IP Address: Enter the WAN IP address provided by your ISP here. Subnet Mask: Enter the subnet mask here. Default Gateway: Enter the default gateway IP address provided by your ISP here. DNS: Enter the DNS server IP address in the column. Please obtain WAN static IP from your ISP should you decide to use static IP. PPPoE  If the PPPoE is selected, the user will have to set up the user name and password according to the ISP that provided the related information. User Name: Enter the username that was given by your ISP provider. Maximum input is 32 alphanumeric characters (case sensitive). Password: Enter the password that was given by your ISP provider. Maximum input is 32 alphanumeric characters (case sensitive).  PPTP
16   If the PPTP is selected, the user will have to set up the server IP address, user name and password according to the ISP that provided the related information. IP Address: Enter the WAN IP address provided by your ISP here. Subnet Mask: Enter the subnet mask here. Server IP Address: Enter the PPTP Server IP Address in this column. User Name: Maximum input is 20 alphanumeric characters (case sensitive). Password: Maximum input is 32 alphanumeric characters (case sensitive).  L2TP  If the L2TP is selected, the user will have to set up the server IP address, user name and password according to the ISP that provided the related information. IP Address: Enter the WAN IP address provided by your ISP here.
17  Subnet Mask: Enter the subnet mask here. Server IP Address: Enter the L2TP Server IP Address in this column. User Name: Maximum input is 20 alphanumeric characters (case sensitive). Password: Maximum input is 32 alphanumeric characters (case sensitive).  Step 5- Wireless Basic Settings  Band Select 2.4 GHz (B+G+N), 2.4 GHz (B), 2.4 GHz (G), 2.4 GHz (N), 2.4 GHz (B+G), and 2.4 GHz (G+N).   Mode Only AP mode is available for this model. Network Type This type here is fixed and cannot be changed because this is a wireless router. Network Name (SSID) An SSID is referred to a network name because essentially it is a name that identifies a wireless network.   Channel Width Select 20/40MHz or 20MHz for the transmitting band width. Control Sideband Select Upper or Lower from pull-down menu.
18  Channel selection Select 1~11 or Auto Select from the pull-down menu.    Step 6- Wireless Security Setup   Security Mode Select desired security type from the pull-down menu None, WEP, WPA(TKIP), WPA2(AES) and WPA2 Mixed. The default setting is None. It is strongly recommended to set up the security mode (WEP, WPA (TKIP), WPA2 (AES) and WPA2 Mixed) to prevent any unauthorized accessing. Both your PC and the Wireless Router must have the same settings for security. WEP  Key Length: select key length 64-bit or 128-bit. Key Format: Select the Hex(10 characters) or ASCII (5 characters).  Hexadecimal (WEP 64 bits): 10 Hex characters (0~9, a~f).   Hexadecimal (WEP 128 bits): 26 Hex characters (0~9, a~f).  ASCII (WEP 64 bits): 5 ASCII characters (case-sensitive).  ASCII (WEP 128 bits): 13 ASCII characters (case-sensitive). Key Setting: Enter the key in the key setting field.  WPA(TKIP)/WPA2(AES)/WPA2 Mixed
19   Pre-Shared Key Format: There are two formats for choosing to set the pre-shared key, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 characters) format is recommended. Pre-Shared Key : Pre-Shared Key serves as a password. Users may key in 8 to 63 characters string if you selected passphrase. Pre-shared key format is to set the passwords or leave it blank, in which the 802.1x Authentication will be activated.  Make sure the same password is used on the client's end.   Note: it is recommended to use WPA2 encryption for maximum level of protection
20  Password   User Name Key in a new login user name in the blank field. New Password Maximum input is 36 alphanumeric characters (case sensitive.) Confirmed Password Key in the password again to confirm.
21  Status
22  Wireless Configuration Basic configuration    General Setup   Disable Wireless LAN Interface Check to disable the wireless function.  Band You can choose one mode of the following you need.     2.4GHz (B): 802.11b supported rate only.  2.4GHz (G): 802.11g supported rate only.   2.4GHz (N): 802.11n supported rate only.   2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate.  2.4GHz (G+N): 802.11g supported rate and 802.11n supported rate.  2.4GHz (B+G+N): 802.11b, 802.11g and 802.11n supported rate. The default is 2.4GHz (B+G+N) mode. Mode Only AP mode can be selected.
23  Network Type This is fixed and cannot be changed. SSID An SSID is referred to as network name because essentially it is a name that identifies a wireless network.  Channel Width If you select 20MHz/40MHz channel width, the channel number will be from 5~11 and auto; If you select 20MHz channel width, the channel number will be from 1~11 and auto. Default is 20MHz/40MHz. Control Sideband You can select Lower or Upper form the pull-down list. Channel Number The channel number will be based on the channel width you select.  Broadcast SSID Enabled: This wireless AP will broadcast its SSID to stations.  Disabled: This wireless AP will not broadcast its SSID to stations. If stations want to connect to this wireless AP, this AP’s SSID should be known in advance to make a connection. WMM The WiFi Multiple Media function is available under 2.4GHz (B), 2.4GHz (G) and 2.4GHz (B+G) band, and is disabled under 2.4GHz (N), 2.4GHz (G+N) and 2.4GHz (B+G+N) band. Data Rate There are several data rates that you can select from the pull-down menu. Associated Clients Click Show Active Clients button to show all the listed active clients. Enable Mac Clone (Single Ethernet Client) This function will be enabled under Client mode  (it is not supported here).   Security   Security Mode Select desired security type from the pull-down menu Disable,
24  WEP, WPA, WPA2 and WPA-Mixed. The default setting is Disable. It is strongly recommended to set up a security mode (WEP, WPA, WPA2 and WPA-Mixed) to prevent any unauthorized access. WEP  Key Length: Select key length 64-bit or 128-bit. Key Format: Select the default key 1~4.  Hexadecimal (WEP 64 bits): 10 Hex characters (0~9, a~f).   Hexadecimal (WEP 128 bits): 26 Hex characters (0~9, a~f).  ASCII (WEP 64 bits): 5 ASCII characters (case-sensitive).  ASCII (WEP 128 bits): 13 ASCII characters (case-sensitive). Encryption Key: Enter the key in the Key Setting field.   WPA   Authentication Mode: Personal (Pre-Shared Key). WPA Cipher Suite: Only AES is supported. Pre-Shared Key Format:  There are two formats to choose from to set the Pre-shared key, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 characters) format is recommended. Pre-Shared Key: Pre-Shared Key serves as a password.  Users may key in 8 to 63 characters string if you selected passphrase. Pre-shared key format to set the passwords or leave it blank, in which the 802.1x Authentication will be activated.  Make sure the same password is used on the client's end.
25  WPA2  Authentication Mode: Personal (Pre-Shared Key). WPA2 Cipher Suite: Only AES is supported. Pre-Shared Key Format:  There are two formats from which to choose  to set the Pre-shared key, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 characters) format is recommended. Pre-Shared Key: Pre-Shared Key serves as a password.  Users may key in 8 to 63 characters string if you selected passphrase. Pre-shared key format to set the passwords or leave it blank, in which the 802.1x Authentication will be activated.  Make sure the same password is used on the client's end.  WPA-Mixed   Authentication Mode: Personal (Pre-Shared Key). WPA Cipher Suite: Only AES is supported. WPA2 Cipher Suite: Only AES is supported. Pre-Shared Key Format:  There are two formats from which to choose  to set the Pre-shared key, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter a 64 characters string. For easier configuration, the Passphrase (at least 8 characters) format is recommended. Pre-Shared Key: Pre-Shared Key serves as a password.  Users may key in 8 to 63 characters string if you selected passphrase. Pre-shared key format to set the passwords or leave it blank, in which the 802.1x Authentication will be activated.  Make sure the same password is used on the client's end.
26     Advanced configurations Advanced Settings  RF Output Power Select the transmitting power rate 100%, 70%, 50%, 35%, 15%. selecting  lower output power setting will reduce the interference to other Wi-Fi router in the same area; However, it also reduce the coverage of this router.
27  Access Control   Wireless Access Control Mode Select Allow Listed or Deny Listed form the pull-down menu to enable access control function. Default setting is Disable. MAC Address Enter the MAC address of a station that is allowed to access this Access Point. Comment  You may enter up to 20 characters as a remark to the previous MAC address. Current Access Control List This table displays the station MAC information. Delete Selected Click  Delete Selected to delete items which are selected. Delete All Click  Delete All to delete all the items. Reset Click  Reset to rest.
28  WPS   Disable WPS Check the box to disable the WPS function; default setting is Enabled. WPS Status  Current status of the WPS function. Self-PIN Number PIN code of the router itself. Push Button Configuration Click Start PBC button to make a WPS connection with client. Client PIN Number Enter the client PIN code into the blank field then click the Start PIN button to make a WPS connection with client.
29   Network Configuration Basic configuration   LAN Configurations LAN (local area network) means when you use this router as the Internet access router gateway, all devices (Excepts DMZ) connect to the LAN ports (there are four of them) or associate to the WLAN are in the local network.    IP Address Shows the IP address of the Wireless Router (Default IP address is 192.168.1.1.) Subnet Mask • The subnet mask of the Wireless Router (Default subnet mask is 255.255.255.0.) Default Gateway Enter the Internet default gateway LAN IP address in this column. And the default gateway should have a connection with the Internet. DHCP • Disable: Select to disable this Wireless Router to distribute IP addresses to connected clients.
30  Server: Select to enable this Wireless Router to distribute IP Addresses (DHCP Server) to connected clients. And the following field will be activated for you to enter the starting IP address. DHCP Client Range The starting address of this local IP network address pool. The pool is a piece of continuous IP address segment. Keep the default value 192.168.1.33 should work for most cases. • Maximum: 254.  Default value 254 should work for most cases. Note: If “Continuous IP address poll starts” is set at 192.168.1.33 and the “Number of IP address in pool” is 254, the device will distribute IP addresses from 192.168.1.33 to 192.168.1.254 to all the computers in the network that request IP addresses from DHCP server (Router) Show Client Click to show Active DHCP Client Table.  Refresh: Click this button to refresh the table. Close: Click this button to close the window. Static DHCP  Check the box to enable the Static DHCP function, default setting is disabled. When set to enabled, user can click Static DHCP button to set the Static DHCP function.
31   IP Address: Enter the fixed IP address that DHCP Server assigned to a certain connected station. MAC Address: Enter the MAC address of a certain station, and then the DHCP Server will distribute a fixed IP address to the station automatically once they are connected. Comment: You can enter a comment to describe the above IP address or MAC address. Apply Changes: After completing the settings on this page, click Apply Changes button to save the settings. Reset: Click Reset to restore default values. Static DHCP List: Shows the static IP addresses that have been assigned according to the MAC address. Delete Selected: Click Delete Selected to delete items which are selected. Delete All: Click Delete All button to delete all the items. Reset: Click Reset button to rest. Domain Name Enter the Domain Name here. Clone MAC Address This table displays the station MAC information.
32  WAN Configuration WAN (wide area network) represents the Inter-networks that the WAN port of the router can connect to.  A correct configuration on WAN port determines whether the local computers can access the Inter-network (Internet, when you use this router as a home router) or not. The available configurations include: • Static IP • DHCP client • PPPoE • PPTP • L2TP Follow the instruction obtained from your ISP to choose one of the protocols above.    Advanced Configurations  Advanced WAN (configuration) This section explains advanced setting on WAN configurations:
33    WAN Access Type DHCP Client  If the DHCP Client connection is selected, the PC will obtain the IP address automatically.  Static IP
34   If the Static IP is selected, the user will have to set up the IP address, subnet mask and default gateway according to the ISP (Internet Service Provider) that provided the related information. IP Address: Enter the WAN IP address provided by your ISP here. Subnet Mask: Enter the subnet mask here. Default Gateway: Enter the default gateway IP address provided by your ISP here.  PPPoE  If the PPPoE is selected, the user will have to set up the user name and password according to the ISP that provided the related information. User Name: Enter the username that was given by your ISP provider. Maximum input is 32 alphanumeric characters (case sensitive). Password: Enter the password given by your ISP provider. Maximum input is 32 alphanumeric characters (case sensitive).  PPTP
35   If the PPTP is selected, the user will have to set up the server IP address, user name and password according to the ISP that provided the related information. IP Address: Enter the WAN IP address provided by your ISP here. Subnet Mask: Enter the subnet mask here. Server IP Address: Enter the PPTP Server IP Address in this column. User Name: Maximum input is 20 alphanumeric characters (case sensitive). Password: Maximum input is 32 alphanumeric characters (case sensitive).  L2TP  If the L2TP is selected, the user will have to set up the server IP address, user name and password according to the ISP that provided the related information.
36  IP Address: Enter the WAN IP address provided by your ISP here. Subnet Mask: Enter the subnet mask here. Server IP Address: Enter the L2TP Server IP Address in this column. User Name: Maximum input is 20 alphanumeric characters (case sensitive). Password: Maximum input is 32 alphanumeric characters (case sensitive). Host Name Enter the host name in this field. Attain DNS Automatically Set DNS Manually Select Attain DNS Automatically or select Set DNS Manually to set the DNS server IP address at the following DNS 1~3 columns. Default setting is Attain DNS Automatically. DNS 1 DNS 2 Enter the DNS server IP address(es) provided by your ISP, or you can specify your own preferred DNS server IP address(es). DNS 2 server is optional. You can enter another DNS server’s IP address as a backup. DNS 2 server will be used when the DNS 1 server fails. Factory Default  Clone the computer's MAC address-IP Address Set WAN MAC Address Your ISP may require a particular MAC address in order for you to connect to the Internet. This MAC address is the PC’s MAC address that your ISP had originally connected your Internet connection to. Type in this Clone MAC address in this section to replace the WAN MAC address with the MAC address of that PC. Enable uPNP Check to enable the listed functions. Apply Changes After completing the settings on this page, click Apply Changes button to save the settings. Reset Click Reset to restore to default values.
37  Firewall Security Basic configuration  Domain name filter   Enable URL Filtering Check the box to enable URL filtering function. URL Address Enter the URL address in the field.   Apply Changes After completing the settings on this page, click Apply Changes button to save the settings. Reset Click Reset button to restore to default values. Current Filter Table Shows the current URL address filter information. Delete Selected Click Delete Selected button to delete items which are selected. Delete All Click Delete All button to delete all the items. Reset Click Reset button to reset to default settings.
38  Advanced Configurations Port Filtering   Enable Port Filtering Check to enable this port filtering function. Port Range For TCP and UDP Services, enter the beginning of the range of port numbers used by the service. If the service uses a single port number, enter it in both the start and finish fields. Protocol Select the protocol (TCP, UDP or Both) used to the remote system or service. Comment You may key in a description for the port range. Current Filter Table Shows the current port filter information. Delete Selected Click   Delete Selected button to delete items which are selected. Delete All Click  Delete All button to delete all the items. Reset Click  Reset button to rest.
39  IP Filtering  Enable IP Filtering Check to enable IP filtering function. Local IP Address Enter the local server’s IP address. Protocol Select the protocol (TCP, UDP or Both) used to the remote system or service. Comment You may key in a description for the port range. Apply Changes After completing the settings on this page, click the Apply Changes button to save the settings. Reset Click Reset button to restore to default values. Current Filter Table Shows the current IP filter information. Delete Selected Click Delete Selected button to delete items which are selected. Delete All Click Delete All button to delete all the items. Reset Click Reset button to reset to default settings.
40  MAC Filtering  Enable MAC Filtering Check to enable MAC filtering function. MAC Address Enter the client MAC address in the field.   Comment You may key in a descriptive MAC address. Apply Changes After completing the settings on this page, click the Apply Changes button to save the settings. Reset Click Reset button to restore to default values. Current Filter Table Shows the current MAC filter information. Delete Selected Click Delete Selected button to delete items which are selected. Delete All Click Delete All button to delete all the items. Reset Click Reset button to reset to default settings.
41  Port Forwarding   Enable Port Forwarding Check to enable Port Forwarding function. IP Address Enter the IP  address of the device on the local network in the field.   Protocol Select the protocol (TCP, UDP or Both) used to the remote system or service. Port Range For TCP and UDP Services, enter the beginning of the range of port numbers used by the service. If the service uses a single port number, enter it in both the start and finish fields. Comment Make a note in this section to describe the configuration Apply Changes After completing the settings on this page, click Apply Changes button to save the settings. Reset Click Reset button to restore to default values. Current Port Forwarding Shows the current Port Forwarding information.
42  Table Delete Selected Click  Delete Selected button to delete items which are selected. Delete All Click Delete All button to delete all the items. Reset Click Reset button to rest.   DMZ A Demilitarized Zone (DMZ) is used to provide Internet services without sacrificing unauthorized access to its local private network. Typically, the DMZ host includes devices Web servers, FTP servers, SMTP (e-mail) servers and DNS servers.  You need to enable the DMZ and put the server IP address into the field.
43  Management Statistics This page displays the packet count of transmission and reception connections on wireless LAN, Ethernet LAN ports, and Ethernet WAN port.
44  Advanced configurations Dynamic DNS   Enable DDNS Check to enable the DDNS function. Service Provider Select the desired DDNS Service Provider DynDNS, TZO or Oray from the pull-down list.  Domain Name Domain name of the service provider. User Name/Email Enter your email that you registered on the service provider website. (You can refer to below Note information to apply an account from the service provider website.) Password/Key Enter your password that you registered  on the service provider website.  Maximum input is 30  alphanumeric characters (case sensitive). Apply Change After completing the settings on this page, click Apply Changes button to save the settings. Reset Click Reset button to restore to default values.   Remote Management
45   Enable Web Server Access via WAN Check to enable remote control function. Port Number Enter the port number in this field.   Server Access Select LAN/WAN, LAN or WAN from the pull-down menu.   Bandwidth Management  Enable Bandwidth Management Entries in this table improve your online gaming experience by ensuring that your game traffic is prioritized over other network traffic, such as FTP or Web.
46  Save/Reload Settings  Save Settings to File Click the Save button to save the current settings file to the PC.  Load Settings form File  Click the Browse button to find and open the previously saved file (the browser will display the correct file path.) Then, click the Upload button to upload the previous file.  Therefore restore the specific configuration to the router. Reset Settings to Default Click the Reset button to reset the device back to the default settings.
47  Logs   Enable Log Check to enable logging function. System all  Activates all logging functions. Wireless  Only logs related to the wireless LAN will be recorded. DoS  Only logs related to the DoS protection will be recorded. Enable Remote Log Only logs related to the Remote control will be recorded. Log Server IP address Only logs related to the server will be recorded. Apply Changes After completing the settings on this page, click the Apply Changes button to save current settings. Refresh Click Refresh button to renew the logs. Clear Click Clear button to delete the logs.  Please allow around 30 seconds for the router to reboot and commence configuration change.
48    Time Zone Setting   Current Time Enter the current time of this wireless router or click the Copy Computer Time button to insert the time automatically. Time Zone Select Select the local time zone from the pull-down menu. Enable NTP client update Check to enable NTP (Network Time Protocol Server) client update function.  Automatically Adjust Daylight Saving Check the box to enable this function. NTP server Manual IP setting You may choose to select NTP server from the pull-down menu or enter an IP address of a specific server manually. Apply Change After completing the settings on this page, click Apply Change button to save current settings. Reset Click Reset button to restore to default values. Refresh Click Refresh button to renew current time.
49  Upgrade Firmware  Select File  Click the Browse button to find and open the firmware file (the browser will display to correct file path.) Upload Click the Upload button to perform. Reset Click Reset button to restore to default values.  Caution:  1. Please use Ethernet connection between the PC and the device when you upgrade the firmware. 2. Please do not power down the device during the process. It will damage the device.  System Timeout setup Sometimes when you need more time to configure the router, you can use this feature to adjust the timeout limit.  So you don’t have to log back into the router every 5 or 10 minutes.
50  System Restart Use the Restart button to reboot the device without unplug and plug the power adapter.
51   Chapter 4: PC Configuration Overview For each PC, the following may need to be configured: • TCP/IP network settings • Internet access configuration • Wireless configuration Windows Clients • This section describes how to configure Windows clients for Internet access via the Wireless Router. • The first step is to check the PC's TCP/IP settings.  • The Wireless Router uses the TCP/IP network protocol for all functions, so it is essential that the TCP/IP protocol be installed and configured on each PC. TCP/IP Settings - Overview If using default Wireless Router settings, and default Windows TCP/IP settings, no changes need to be made. • By default, the Wireless Router will act as a DHCP Server, automatically providing a suitable IP address (and related information) to each PC when the PC boots. • For all non-server versions of Windows, the default TCP/IP setting is to act as a DHCP client.  If using a Fixed (specified) IP address, the following changes are required: • The Gateway must be set to the IP address of the Wireless Router. • The DNS should be set to the address provided by your ISP.  Checking TCP/IP Settings - Windows 2000 1. Select Control Panel - Network and Dial-up Connection. 2. Right - click the Local Area Connection icon and select Properties. You should see a screen like the following:
52   3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following.  5. Ensure your TCP/IP settings are correct, as described below.  Using DHCP • To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, the Wireless Router will act as a DHCP Server. • Restart your PC to ensure it obtains an IP Address from the Wireless Router. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, check with your network administrator before making the following changes.
53  • Enter the Wireless Router 's IP address in the Default gateway field and click OK. (Your LAN administrator can advise you of the IP Address they assigned to the Wireless Router.) • If the DNS Server fields are empty, select Use the following DNS server addresses, and enters the DNS address or addresses provided by your ISP, then click OK.  Checking TCP/IP Settings - Windows XP 1. Select Control Panel - Network Connection. 2. Right click the Local Area Connection and choose Properties. You should see a screen like the following:  3. Select the TCP/IP protocol for your network card. 4. Click on the Properties button. You should then see a screen like the following.
54   5. Ensure your TCP/IP settings are correct.  Using DHCP • To use DHCP, select the radio button Obtain an IP Address automatically. This is the default Windows setting. Using this is recommended. By default, the Wireless Router will act as a DHCP Server. • Restart your PC to ensure it obtains an IP address from the Wireless Router. Using a fixed IP Address ("Use the following IP Address") If your PC is already configured, check with your network administrator before making the following changes. • In the Default gateway field, enter the Wireless Router’s IP address and click OK. Your LAN administrator can advise you of the IP Address they assigned to the Wireless Router. • If the DNS Server fields are empty, select Use the following DNS server addresses, and enters the DNS address or addresses provided by your ISP, then click OK. Internet Access To configure your PCs to use the Wireless Router for Internet access: • Ensure that the ADSL modem, DSL modem, Cable modem, or other permanent connection is functional.  • Use the following procedure to configure your Browser to access the Internet via the LAN, rather than by a Dial-up connection.  For Windows 2000 1. Select Start menu - Settings - Control Panel - Internet Options.  2. Select the Connection tab, and click the Setup button.
55  3. Select "I want to set up my Internet connection manually, or I want to connect through a local area network (LAN)" and click Next. 4. Select "I connect through a local area network (LAN)" and click Next. 5. Ensure all of the boxes on the following Local area network Internet Configuration screen are unchecked. 6. Check the "No" option when prompted "Do you want to set up an Internet mail account now?" 7. Click Finish to close the Internet Connection Wizard. Setup is now completed. For Windows XP 1. Select Start menu >Control Panel > Network and Internet Connections. 2. Select Set up or change your Internet Connection. 3. Select the Connection tab, and click the Setup button. 4. Cancel the pop-up "Location Information" screen. 5. Click Next on the "New Connection Wizard" screen. 6. Select "Connect to the Internet" and click Next. 7. Select "Set up my connection manually" and click Next. 8. Check "Connect using a broadband connection that is always on" and click Next. 9. Click Finish to close the New Connection Wizard. Setup is now completed. Accessing AOL To access AOL (America On Line) through the Wireless Router, the AOL for Windows software must be configured to use TCP/IP network access, rather than a dial-up connection. The configuration process is as follows: 1. Start the AOL for Windows communication software. Ensure that it is Version 2.5, 3.0 or later. This procedure will not work with earlier versions. 2. Click the Setup button. 3. Select Create Location, and change the location name from "New Locality" to " Wireless Router ". 4. Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number blank.)  5. Click Save, then OK.  6. Configuration is now complete.  7. Before clicking "Sign On", always ensure that you are using the “Wireless Router " location. Macintosh Clients From your Macintosh, you can access the Internet via the Wireless Router. The procedure is as follows. 1. Open the TCP/IP Control Panel.  2. Select Ethernet from the Connect via pop-up menu. 3. Select Using DHCP Server from the Configure pop-up menu. The DHCP Client ID field can be left blank. 4. Close the TCP/IP panel, saving your settings. Note: If using manually assigned IP addresses instead of DHCP, the required changes are:
56  • Set the Router Address field to the Wireless Router 's IP Address. • Ensure your DNS settings are correct. Linux Clients To access the Internet via the Wireless Router, it is only necessary to set the Wireless Router as the "Gateway". Ensure you are logged in as "root" before attempting any changes. Fixed IP Address By default, most Unix installations use a fixed IP Address. If you wish to continue using a fixed IP Address, make the following changes to your configuration. • Set your "Default Gateway" to the IP Address of the Wireless Router. • Ensure your DNS (Domain Name server) settings are correct. To act as a DHCP Client (Recommended) The procedure below may vary according to your version of Linux and X -windows shell. 1. Start your X Windows client. 2. Select Control Panel – Network. 3. Select the "Interface" entry for your Network card. Normally, this will be called "eth0". 4. Click the Edit button, set the "protocol" to "DHCP", and save this data.  5. To apply your changes:  Use the "Deactivate" and "Activate" buttons, if available. OR, restart your system. Other Unix Systems To access the Internet via the Wireless Router: • Ensure the "Gateway" field for your network card is set to the IP Address of the Wireless Router. • Ensure your DNS (Name Server) settings are correct. Wireless Station Configuration • This section applies to all wireless stations wishing to use the Wireless Router 's access point, regardless of the operating system that is used on the client. • To use the Wireless Router, each wireless station must have compatible settings, as following: Mode  The mode must be set to Infrastructure. SSID (ESSID) The network name must match the value used on the Wireless Router.
57  Note! The SSID is case- sensitive. Disable If there is no security is enabled on the Wireless Router, the security of each station should be disabled as well. And, you can connect the Wireless Router without security, but it is NOT recommended. WEP By default, WEP on the Wireless Router is disabled. • If WEP remains disabled on the Wireless Router, all stations must have WEP disabled. • If WEP is enabled on the Wireless Router, each station must use the same settings as the Wireless Router. WPA WPA2 WPA-Mixed 802.1x RADIUS Server: RADIUS is an authentication, authorization and accounting client-server protocol. The client is a Network Access Server that desires to authenticate its links. The server is a server that has access to a user database with authentication information. Each station must set up the RADIUS Server’s IP address, port and passwords that provided by your ISP. Note:  By default, the Wireless Router will allow 802.11b, 802.11g and 802.11n connections.
58  Appendix A: Troubleshooting Overview This chapter covers some common problems that may be encountered while using the Wireless Router and some possible solutions to them. If you follow the suggested steps and the Wireless Router still does not function properly, contact your dealer for further advice. General Problems Problem 1: Can't connect to the Wireless Router to configure it. Solution 1: Check the following: • Check the Wireless Router is properly installed, LAN connections are OK, and it is powered ON. • Ensure that your PC and the Wireless Router are on the same network segment.  • If your PC is set to "Obtain an IP Address automatically" (DHCP client), please restart it. • If your PC uses a Fixed (Static) IP address, ensure that it is using an IP Address within the range 192.168.1.1 to 192.168.1.253 and thus compatible with the Wireless Router's default IP Address of 192.168.1.1.  Also, the Network Mask should be set to 255.255.255.0 to match the Wireless Router. In Windows, you can check these settings by using Control Panel-Network to check the Properties for the TCP/IP protocol.  Internet Access Problem 1: When I enter a URL or IP address I get a time out error. Solution 1: A number of things could be causing this. Try the following troubleshooting steps. • Check if other PCs work. If they do, ensure that your PCs IP settings are correct. If using a Fixed (Static) IP Address, check the Network Mask, Default gateway and DNS as well as the IP Address. • If the PCs are configured correctly, but still not working, check the Wireless
59  Router. Ensure that it is connected and ON. Connect to it and check its settings. (If you can't connect to it, check the LAN and power connections.) • If the Wireless Router is configured correctly, check your Internet connection (DSL/Cable modem etc) to see that it is working correctly. Problem 2: Some applications do not run properly when using the Wireless Router. Solution 2: The Wireless Router processes the data passing through it, so it is not transparent. Use the Content Filter Settings feature to allow the use of Internet applications, which do not function correctly. If this does solve the problem you can use the DMZ function. This should work with almost every application, but: • It is a security risk, since the firewall is disabled. • Only one (1) PC can use this feature. Wireless Access Problem 1: My PC can't locate the Wireless Router. Solution 1: Check the following: • Your PC is set to Infrastructure Mode. (Access Points are always in Infrastructure Mode)  • The SSID on your PC and the Wireless Router are the same. Remember that the SSID is case-sensitive. So, for example "Workgroup" does NOT match "workgroup." • Both your PC and the Wireless Router must have the same setting for security. The default setting for the Wireless Router security is disabled, so your wireless station should also have security disabled. • If security is enabled on the Wireless Router, your PC must have security enabled, and the key must be matched. • To see if radio interference is causing a problem, see if connection is possible when close to the Wireless Router.  Remember that the connection range can be as little as 100 feet in poor environments. Problem 2: Wireless connection speed is very slow. Solution 2: The wireless system will connect at the highest possible speed, depending on the distance and the environment. To obtain the highest possible connection speed, you can experiment with the following: • Wireless Router location Try adjusting the location and orientation of the Wireless Router. • Wireless Channel If interference is the problem, changing to another channel may show a
60  marked improvement. • Radio Interference Other devices may be causing interference. You can experiment by switching other devices off, and see if this helps. Any "noisy" devices should be shielded or relocated. • RF Shielding Your environment may tend to block transmission between the wireless stations. This will mean high access speed is only possible when close to the Wireless Router.
61   Appendix B: About Wireless LANs BSS BSS A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a Basic Service Set (BSS). Using the same SSID is essential. Devices with different SSIDs are unable to communicate with each other.  Channels The Wireless Channel sets the radio frequency used for communication.  • Access Points use a fixed Channel. You can select the Channel used. This allows you to choose a Channel which provides the least interference and best performance. In the USA and Canada, 11 channels are available. If using multiple Access Points, it is better if adjacent Access Points use different Channels to reduce interference. • In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an Access Point. If more than one Access Point can be used, the one with the strongest signal is used. (This can only happen within an ESS.) Note to US model owner:  To comply with US FCC regulation, the country selection function has been completely removed from all US models. The above function is for non-US models only.
62  Security WEP WEP  (Wired Equivalent Privacy) is a standard for encrypting data before it is transmitted. This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless unless the receiver can decrypt it. If WEP is used, the Wireless Stations and the Access Point must have the same security settings for each of the following: WEP 64 Bits, 128 Bits. Key For 64 Bits encryption, the Key value must match.  For 128 Bits encryption, the Key value must match. WEP Authentication Open System or Shared Key. WPA/WPA2 WPA/WPA2 (Wi-Fi Protected Access) is more secure than WEP.  It uses a “Shared Key” which allows the encryption keys to be regenerated at a specified interval. There are several encryption options: TKIP, AES, TKIP-AES and additional setup for RADIUS is required in this method. The most important features beyond WPA to become standardized through 802.11i/WPA2 are: pre-authentication, which enables secure fast roaming without noticeable signal latency.  If WPA or WPA2 is used, the Wireless Stations and the Access Point must have the same security settings. 802.1x With 802.1x  authentication, a wireless PC can join any network and receive any messages that are not encrypted, however, additional setup for RADIUS to issue the WEP key dynamically will be required.
63  RADIUS is an authentication, authorization, and accounting client-server protocol. The client is a Network Access Server that desires to authenticate its links. The server is a server that has access to a user database with authentication information.  Wireless LAN Configuration To allow Wireless Stations to use the Access Point, the Wireless Stations and the Access Point must use the same settings, as follows: Mode  The mode must be set to Infrastructure. SSID (ESSID) The network name must match the value used on the Wireless Router. Note! The SSID is case- sensitive. Disable If there is no security is enabled on the Wireless Router, the security of each station should be disabled as well. And, you can connect the Wireless Router without security, but it is NOT recommended. WEP  By default, WEP on the Wireless Router is disabled. • If WEP remains disabled on the Wireless Router, all stations must have WEP disabled. • If WEP is enabled on the Wireless Router, each station must use the same settings as the Wireless Router. WPA WPA2 WPA-Mixed 802.1x RADIUS Server: RADIUS is an authentication, authorization and accounting client-server protocol. The client is a Network Access Server that desires to authenticate its links. The server is a server that has access to a user database with authentication information. Each station must set up the RADIUS Server’s IP address, port and passwords that provided by your ISP.
64   Open Source End-User License Agreement for “X150N”   WARNING:  ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT.  PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.  IF YOU DO NOT AGREE TO THESE TERMS, THEN ZyXEL, IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL, AND YOUR MONEY WILL BE REFUNDED. 1. Grant of License for Personal Use ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non-sublicense, non-transferable license to use the program with  which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice. You have the right to make one backup copy of the Software and Documentation solely for archival, back-up or disaster recovery purposes.  You shall not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed. 2. Ownership You have no ownership rights in the Software.  Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect.  Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL.  Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement. 3. Copyright The Software and Documentation contain material that is protected by International Copyright Law and trade secret law, and by international treaty provisions.  All rights not granted to you herein are expressly reserved by ZyXEL.  You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation. 4. Restrictions You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software. Certain components of the Software, and third party open source programs included with the Software, have been or may be made available by ZyXEL listed in the below Table (collectively the “Open-Sourced Components”) You may modify or replace only these Open-Sourced Components; provided that you comply with the terms of this License and any applicable licensing terms governing use of the Open-Sourced Components, which have been provided on the License Notice as below for the Software. ZyXEL is not obligated to provide any maintenance, technical or other support for the resultant modified Software. You may not copy, reverse engineer, decompile, reverse compile, translate, adapt, or disassemble the Software, or any part thereof, nor shall you attempt to create the source code from the object code for the Software. Except as and only to the extent expressly permitted in this License, by applicable licensing terms governing use of the Open-Sourced Components, or by applicable law, you may not market, co-brand, private label or otherwise permit third parties to link to the Software, or any part thereof.  You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity.  You may not cause, assist or permit any third party to do any of the foregoing. Portions of the Software utilize or include third party software and other copyright material. Acknowledgements, licensing terms and disclaimers for such material are contained in the License Notice as below for the Software, and your use of such material is governed by their respective terms. ZyXEL has provided, as part of the Software package, access to certain third party software as a convenience. To the extent that the Software contains third party
65  software, ZyXEL has no express or implied obligation to provide any technical or other support for such software. Please contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products.  5. Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information.  You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software. 6. No Warranty THE SOFTWARE IS PROVIDED "AS IS."  TO THE MAXIMUM EXTENT PERMITTED BY LAW, ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.  ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE, OR THAT THE SOFTWARE WILL OPERATE ERROR FREE, OR IN AN UNINTERUPTED FASHION, OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED, OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM.  SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU.  IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION, THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD. 7. Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ZyXEL's AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN NO EVENT EXCEED THE PRODUCT’S  PRICE.  BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU. 8. Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE  LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME.  YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS.  YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8. 9. Audit Rights ZyXEL SHALL HAVE THE RIGHT, AT ITS OWN EXPENSE, UPON REASONABLE PRIOR NOTICE, TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. 10. Termination This License Agreement is effective until it is terminated.  You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control.  ZyXEL may terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the terms of this License Agreement.  Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed.  All provisions relating to confidentiality, proprietary rights, and non-disclosure shall survive the termination of this Software License Agreement.
66  11.  General This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof.  The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan.  This License Agreement shall constitute the entire Agreement between the parties hereto.  This License Agreement, the rights granted hereunder, the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL.  Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto.  If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties.  NOTE: Some components of this product incorporate source code covered under the open source code licenses. To obtain the source code covered under those Licenses, please check ZyXEL Technical Support (support@zyxel.com.tw) to get it.
67  Open-Sourced Components  Open Source Used in X150N (3rd party software) Version From (Source) Linux Kernel 2.6.19 www.kernel.org busybox 1.8.2 http://www.busybox.net/ bridge-utils 0.9.5 http://www.linuxfoundation.org/en/Net:Bridge dnsmasq-2.33 2.33 http://www.thekelleys.org.uk/dnsmasq/doc.html igmpproxy 0.1 http://sourceforge.net/projects/igmpproxy iproute2-2.6.19 2.6.19 http://devresources.linux-foundation.org/dev/iproute2/download/iproute2-2.6.19-061214.tar.gz iptables-1.3.8 1.3.8 http://www.netfilter.org/downloads.html ntpclient 2003_194 http://doolittle.icarus.com/ntpclient/ ppp-2.4.2 2.4.2 ftp://ftp.samba.org/pub/ppp/ppp-2.4.2.tar.gz pptp-client 1.3.1 http://pptpclient.sourceforge.net/ updatedd-2.5 2.5 http://mirror.its.uidaho.edu/pub/savannah/updatedd/ wireless_tools 25 http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/Tools.html zebra-0.92a_ripd 0.92 http://www.zebra.org/ gcc 3.4.6 http://gcc.gnu.org/ uclibc 0.9.28 http://www.uclibc.org/ newlib 1.14.0 http://sourceware.org/newlib/
68       Notice  Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL Communications Corporation.   This Product includes Bridge-utils 0.9.5, Busybox 1.8.2, Dnsmasq 2.33, Igmpproxy 0.1, Iproute2-2.6.19, Iptables 1.3.8, Linux kernel 2.6.19, Ntpclient 2003_194, Ppp 2.4.2, Pptp-client 1.3.1, Updatedd 2.5, Wireless_tools 25, Zebra-0.92a_ripd 0.92, Newlib 1.14.0, and Gcc 3.4.6 under below GPL license  GNU GENERAL PUBLIC LICENSE  Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.  Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.
69  To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.  1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee. 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:  a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
70  b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.  c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.  3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:  a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,  b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code.(This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.
71  4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance. 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.  6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License. 7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.  8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.
72  10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally. NO WARRANTY 11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.  END OF TERMS AND CONDITIONS   All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.   This Product includes uclibc 0.9.28 under the LGPL License.  GNU LESSER GENERAL PUBLIC LICENSE   Version 2.1, February 1999 Copyright (C) 1991, 1999 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA  Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.
73   Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case, based on the explanations below. When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish); that you receive source code or can get it if you want it; that you can change the software and use pieces of it in new free programs; and that you are informed that you can do these things. To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it. For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.You must make sure that they, too, receive or can get the source code. If you link other code with the library, you must provide complete object files to the recipients, so that they can relink them with the library after making changes to the library and recompiling it. And you must show them these terms so they know their rights. We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license, which gives you legal permission to copy, distribute and/or modify the library. To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the library is modified by someone else and passed on, the recipients should know that what they have is not the original version, so that the original author's reputation will not be affected by problems that might be introduced by others. Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license. Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license, the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License permits more lax criteria for linking other code with the library.
74  We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the ordinary General Public License. It also provides other free software developers Less of an advantage over competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for many libraries. However, the Lesser license provides advantages in certain special circumstances. For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case, there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License. In other cases, permission to use a particular library in non-free programs enables a greater number of people to use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system. Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library. The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the difference between a "work based on the library" and a "work that uses the library". The former contains code derived from the library, whereas the latter must be combined with the library in order to run.   GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION  0. This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License (also called "this License"). Each licensee is addressed as "you".  A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms. A "work based on the Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another language. (Hereinafter, translation is included without limitation in the term "modification".) "Source code" for a work means the preferred form of the work for making modifications to it. For a library, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the library. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running a program using the Library is not restricted, and output from such a program is covered only if its contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it). Whether that is true depends on what the Library does and what the program that uses the Library does. 1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
75  2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the files and the date of any change. c) You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d requires that any application-supplied function or table used by this function must be optional: if the application does not supply it, the square root function must still compute square roots.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Library. In addition, mere aggregation of another work not based on the Library with the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.  3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a library. 4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a derivative work of the Library even though the source code is not. Whether this is true is especially significant if the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not
76  precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall under Section 6, whether or not they are linked directly with the Library itself. 6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the Library to produce a work containing portions of the Library, and distribute that work under terms of your choice, provided that the terms permit modification of the work for the customer's own use and reverse engineering for debugging such modifications. You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work during execution displays copyright notices, you must include the copyright notice for the Library among them, as well as a reference directing the user to the copy of this License. Also, you must do one of these things: a) Accompany the work with the complete corresponding machine-readable source code for the Library including whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as object code and/or source code, so that the user can modify the Library and then relink to produce a modified executable containing the modified Library. (It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run time a copy of the library already present on the user's computer system, rather than copying library functions into the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long as the modified version is interface-compatible with the version that the work was made with. c) Accompany the work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection 6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made by offering access to copy from a designated place, offer equivalent access to copy the above specified materials from the same place. e) Verify that the user has already received a copy of these materials or that you have already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include any data and utility programs needed for reproducing the executable from it. However, as a special exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system. Such a contradiction means you cannot use both them and the Library together in an executable that you distribute. 7. You may place library facilities that are a work based on the Library side-by-side in a single library together with other library facilities not covered by this License, and distribute such a combined library, provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library, and explaining where to find the accompanying uncombined form of the same work.  8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
77  9. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Library or works based on it. 10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties with this License. 11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.  12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License. 13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Library does not specify a license version number, you may choose any version ever published by the Free Software Foundation. 14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.  NO WARRANTY 15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
78  HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.  16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES. END OF TERMS AND CONDITIONS.    Please refer to this URL to get more GPL information: http://us.zyxel.com/opensource
79   Customer Support Please have the following information ready when you contact customer support: • Product model and serial number • Warranty information • Date that you received or purchased your device • Brief description of the problem including any steps that you have taken before contacting the ZyXEL Customer Support Representative  Support Email  support@zyxel.com Toll-Free  1-800-978-7222 Website  www.us.zyxel.com Postal mail  ZyXEL Communications Inc.  1130 N. Miller Street,  Anaheim, CA 92806-2001  U.S.A.

Navigation menu