ZyXEL Communications X150N Wireless Router User Manual

ZyXEL Communications Corporation Wireless Router

User Manual

Download: ZyXEL Communications X150N Wireless Router User Manual
Mirror Download [FCC.gov]ZyXEL Communications X150N Wireless Router User Manual
Document ID1287248
Application IDm5tvy31Pr6hinv2swj5jHg==
Document DescriptionUser Manual
Short Term ConfidentialNo
Permanent ConfidentialNo
SupercedeNo
Document TypeUser Manual
Display FormatAdobe Acrobat PDF - pdf
Filesize140.77kB (1759652 bits)
Date Submitted2010-05-27 00:00:00
Date Available2010-05-27 00:00:00
Creation Date2010-03-17 10:09:00
Producing SoftwareAdobe PDF Library 9.0
Document Lastmod2010-05-03 14:56:44
Document TitleUser Manual
Document CreatorAcrobat PDFMaker 9.0 for Word
Document Author: Alex Wei

802.11n/b/g Wireless
Broadband Router
Model: X150N
User’s Manual
version 1.0
About This User's Guide
Intended Audience
This manual is intended for people who want to configure the NBG-419N using
the Web Configurator. You should have at least a basic knowledge of TCP/IP
networking concepts and topology.
Related Documentation
• Quick Start Guide
The Quick Start Guide is designed to help you get up and running right away. It
contains information on setting up your network and configuring for Internet
access.
• Supporting Disc
Refer to the included CD for support documents.
• ZyXEL Web Site
Please refer to www.zyxel.com for additional support documentation and
product certifications.
User Guide Feedback
Help us help you. Send all User Guide-related comments, questions or
suggestions for improvement to the following address, or use e-mail instead.
Thank you!
SUPPORT E-MAIL
WEB SITE
techwriter@zyxel.com
www.zyxel.com
Safety Warnings
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Do NOT use this product near water, for example, in a wet basement or near a
swimming pool.
Do NOT expose your device to dampness, dust or corrosive liquids.
Do NOT stack things on the device.
Do NOT install, use, or service this device during a thunderstorm. There is a
remote risk of electric shock from lightning.
Connect ONLY suitable accessories to the device. Do NOT open the device or unit.
Opening or removing covers can expose you to dangerous high voltage points or
other risks. ONLY qualified service personnel should service or disassemble this
device. Please contact your vendor for further information.
Make sure to connect the cables to the correct ports.
Place connecting cables carefully so that no one will step on them or stumble over
them.
Always disconnect all cables from this device before servicing or disassembling.
Use ONLY an appropriate power adaptor or cord for your device.
Do NOT use the device if the power adaptor or cord is damaged as it might cause
electrocution.
If the power adaptor or cord is damaged, remove it from the power outlet.
Do NOT attempt to repair the power adaptor or cord. Contact your local vendor to
order a new one.
Do not use the device outside, and make sure all the connections are indoors.
There is a remote risk of electric shock from lightning.
Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
Antenna Warning! This device meets ETSI and FCC certification requirements when
using the included antenna(s). Only use the included antenna(s).
If you mount your device on the wall, please make sure there will be no damage to
electrical wires, gas or water pipes.
Connect the power adaptor or cord to the right supply voltage (for example 110V
in North America or 230VAC in Europe
Do NOT allow anything to rest on the power adaptor or cord and do NOT place the
product where anyone can walk on the power adaptor or cord.
Make sure the cable system is grounded so as to provide some protection against
power surge.
Federal Communication Commission
Interference Statement
This equipment has been tested and found to comply with the limits for a Class B digital
device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference in a residential installation. This
equipment generates uses and can radiate radio frequency energy and, if not installed
and used in accordance with the instructions, may cause harmful interference to radio
communications.
However, there is no guarantee that interference will not occur in a particular
installation. If this equipment does cause harmful interference to radio or television
reception, which can be determined by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following measures:
 Reorient or relocate the receiving antenna.
 Increase the separation between the equipment and receiver.
 Connect the equipment into an outlet on a circuit different from that to which the
receiver is needed.
 Consult the dealer or an experienced radio/TV technician for help.
Warning: Changes or modifications to this unit not expressly approved by the party
responsible for compliance could void the user authority to operate the equipment.
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause undesired operation.
The user’s manual or instruction manual for an intentional or unintentional radiator shall
caution the user that changes or modifications not expressly approved by the party
responsible for compliance could void the user’s authority to operate the equipment.
FCC Radiation Exposure Statement
•
The transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
•
•
IEEE 802.11b or 802.11g operation of this product in the United States of America is
firmware limited to channel 1 through 11.
To comply with FCC RF exposure compliance requirements, a separation distance of
at least 20 cm must be maintained between the antenna of this device and all
persons.
Industry Canada Statement
This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the
following to two conditions:
This device may not cause interference and
This device must accept any interference, including interference that may cause undesired
operation of the device.
This device has been designed to operate with an antenna having a maximum gain of 2 dBi.
Antenna having a higher gain is strictly prohibited per regulation s of Industry Canada. The
required antenna impedance is 50 ohms.
To reduce potential radio interference to other users, the antenna type and its gain should
be so chosen that the EIRP is not more than required for successful communication.
IMPORTANT NOTE:
IC Radiation Exposure Statement
This equipment complies with IC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20
cm between the radiating device and your body.
Table of Contents
Chapter 1: Introduction ............................................................................................................. 1
Features............................................................................................................................................... 1
Physical Details ................................................................................................................................... 1
Chapter 2: About Operation Modes ......................................................................................... 4
Router Mode ....................................................................................................................................... 4
Access Point Mode ............................................................................................................................. 5
Chapter 3: Configuration ........................................................................................................... 6
Hardware Mounting ........................................................................................................................... 6
Hardware Connection ........................................................................................................................ 7
Login .................................................................................................................................................... 7
Setup Wizard .................................................................................................................................... 12
Password ........................................................................................................................................... 20
Status ................................................................................................................................................. 21
Wireless Configuration .................................................................................................................... 22
Network Configuration .................................................................................................................... 29
Firewall Security ............................................................................................................................... 37
Advanced Configurations ................................................................................................................ 38
Management ..................................................................................................................................... 43
Advanced configurations ................................................................................................................. 44
Chapter 4: PC Configuration ................................................................................................... 51
Overview ........................................................................................................................................... 51
Windows Clients ............................................................................................................................... 51
Macintosh Clients ............................................................................................................................. 55
Linux Clients ..................................................................................................................................... 56
Other Unix Systems ......................................................................................................................... 56
Wireless Station Configuration ....................................................................................................... 56
Appendix A: Troubleshooting ................................................................................................. 58
Overview ........................................................................................................................................... 58
General Problems ............................................................................................................................. 58
Internet Access................................................................................................................................. 58
Wireless Access ................................................................................................................................ 59
Appendix B: About Wireless LANs ......................................................................................... 61
BSS ..................................................................................................................................................... 61
Channels ............................................................................................................................................ 61
Security .............................................................................................................................................. 62
Wireless LAN Configuration ............................................................................................................ 63
Open Source ..................................................................................................................................... 64
End-User License Agreement for “X150N” ....................................................................................... 64
1.
Grant of License for Personal Use ............................................................................................ 64
2.
Ownership ............................................................................................................................... 64
3.
Copyright ................................................................................................................................. 64
4.
Restrictions.............................................................................................................................. 64
5.
Confidentiality ......................................................................................................................... 65
6.
No Warranty ............................................................................................................................ 65
7.
Limitation of Liability ............................................................................................................... 65
8.
Export Restrictions .................................................................................................................. 65
9.
Audit Rights ............................................................................................................................. 65
10.
Termination ......................................................................................................................... 65
11.
General................................................................................................................................ 66
Notice ............................................................................................................................................. 68
GNU GENERAL PUBLIC LICENSE ............................................................................................ 68
GNU LESSER GENERAL PUBLIC LICENSE ............................................................................ 72
Customer Support ............................................................................................................................ 79
1
Chapter 1:
Introduction
The Wireless Router is an 802.11n/b/g compliant Wireless Broadband
Router with 4-port Fast Ethernet Switch. With the advanced wireless N
technology, it can support data transmission rates of 6 times more (up to
150 Mbps) and coverage 3 times more than IEEE 802.11b/g devices. The
Wireless Router enables network sharing via a high-speed cable or DSL
Internet connection. With it, you can share a high-speed Internet
connection, files, printers, and multi-player games at incredible speeds,
without the hassle of laying new wires. It also offers easy configuration for
your home wireless network and creates a home wireless network with
high functionality, security, and flexibility.
Features
1.
2.
3.
4.
5.
6.
Supports the IEEE 802.11n/b/g standard, high speed data rate up to
150Mbps.
Supports WPS (Wi-Fi Protected Setup) with reset button. (on the side of the
router housing)
High security with built-in security: WEP 64/128, WPA, WPA2, and 802.11i
Supports Router, AP, WDS (Bridge + Repeater).
Advanced Quality of Service (QoS) , WMM
Easy configuration for home user setup.
Physical Details
Front LEDs
LED Behavior
LED
Printed
Color
POWER/
PWR/WPS
Green
Behavior
ON
Power on
OFF
Power off
Blinking
WPS is enabled to make a
connection
OFF
WLAN off
WPS
Wireless
WLAN
Green
Indication
2
LAN
WAN
LAN
WAN
LAN 1
LAN 2
LAN 3
LAN 4
Green
Green
ON
WLAN link / active
Blinking
WLAN traffic transmitting
ON
WAN link / active
OFF
WAN function off
Blinking
WAN traffic transmitting
OFF
LAN function off
ON
LAN link / active
Blinking
LAN traffic transmitting
Rear Panel
Ports and buttons
Antenna
WPS
LAN 1-4
Install the external antenna here.
To enable the WPS function via web configuration (Go to
Wireless Settings> WPS), then press the physical WPS button
on the Wireless Router once, then the LED will start to flash.
Please make a connection with other WPS supported device
within 2 minutes.
Use standard LAN cables (RJ45 connectors) to connect your PCs
to this port. If required, any port can be connected to another hub.
Any LAN port will automatically function as an "Uplink" port when
necessary.
WAN
Connect the ADSL or Cable Modem here with RJ45 cable. If your
modem came with a cable, use the supplied cable, otherwise, use
a standard LAN cable (RJ45 connectors).
POWER
Connect the supplied power adapter here.
3
Side Panel
Reset
Press the Reset button more than 3 seconds and the Wireless
Router will revert to factory default values.
4
Chapter 2: About
Operation Modes
This device provides operational applications with Router and AP modes, which are mutually
exclusive.
If you want to change the settings in order to perform more advanced configuration or even
change the mode of operation, you can select the mode you desire by the manufacturer as
described in the following sections.
The default setting mode is Router mode.
Router Mode
In this mode, the device will connect to the Internet via ADSL/Cable Modem. The NAT
(Network Address Translation) is enabled and PCs in LAN ports share the same IP to ISP
through the WAN port. The connection type can be set up in WAN page by using PPPOE,
DHCP client, PPTP client, L2TP client or static IP.
5
Access Point Mode
When acting as an Access Point (AP), this device connects all the stations (PC/notebook with
wireless network adapter) to a wireless network. All stations can have Internet access if the
Access Point has an Internet connection.
6
Chapter 3:
Configuration
Hardware Mounting
The Wireless Router is designed to be placed on a raised flat surface like a file cabinet or a
book shelf. The unit may also be converted for mounting to a wall or ceiling.
1. There are two mounting hooks on the underside.
2. Mark two upper holes on a wall or on a raised flat surface.
3. Drill two screws into the flat surface until only 1/4'' of the screws are showing.
4. Then, hang the Wireless Router onto the screws.
7
Hardware Connection
1. Connect one end of the Ethernet cable to the LAN port of the Wireless Router, another
end to your PC or notebook.
2. Then, connect another Ethernet cable one end to the Internet port of the Wireless
Router, the other end to the ADSL or cable modem.
3. Finally, connect the Wireless Router’s power adapter to an outlet.
Login
1. Start your computer and make sure it is connected to your wireless router by an
Ethernet cable.
2. Start your Web Browser. In the address box, enter the IP address of the Wireless Router
192.168.1.1
3. Then press the “Enter” key.
8
4. After connecting successfully, the following screen will appear. Simply enter the
username "admin" and password “1234” to login.
After logging in successfully, please click the Setup Wizard item that provides a primary
configuration for this device. You may enter each screen to change the default settings step
by step.
9
10
If you cannot connect...
If the Wireless Router does not respond, please check the following:
•
Check the Ethernet cable to see if it is connected to the LAN port of the router
and the Ethernet port of your computer.
• The Wireless Router is properly installed, LAN connection is OK, and it is already
powered ON. You can test the connection by using the "Ping" command:
• Please go to Start>Run…> Enter “cmd” command in the column to open
the MS-DOS window.
•
Enter the command: ping 192.168.1.1
If no response is received, either the connection is not working, or your PC's IP
address is not compatible with the Wireless Router's IP Address. (See next
item.)
• If your PC is using a fixed IP address, its IP address must be within the range
192.168.1.2 to 192.168.1.253 to be compatible with the Wireless Router's default IP
Address of 192.168.1.1. Also, the Network Mask must be set to 255.255.255.0. See
Chapter 4 - PC Configuration for details on checking your PC's TCP/IP settings.
• Ensure that your PC and the Wireless Router are on the same network segment.
Ensure you are using the wired LAN interface. The Wireless interface can only be
used if its configuration matches your PC's wireless settings.
11
Common Connection Types
Cable Modems
Type
Details
ISP Data required
Usually, none.
Dynamic IP
Address
Your IP Address is allocated
automatically, when you
connect to your ISP.
However, some ISP's may require
you to use a particular Hostname,
Domain name, or MAC (physical)
address.
IP address allocated to you.
Static (Fixed) IP
Address
Your ISP allocates a
permanent IP address to you.
Some ISP's may also require you
to use a particular Hostname,
Domain name, or MAC (physical)
address.
DSL Modems
Type
Dynamic
IP Address
Static (Fixed)
IP Address
PPPoE
Details
Your IP address is allocated
automatically, when you connect
to your ISP.
Your ISP allocates a permanent
IP address to you.
You connect to the ISP only when
required. The IP address is usually
allocated automatically.
ISP Data required
None.
IP address allocated to you.
User name and password.
Mainly used in Europe.
PPTP
You connect to the ISP only
when required. The IP address
is usually allocated
automatically, but may be static
(fixed).
•
•
•
PPTP serer IP address.
•
•
•
L2TP server IP address.
User name and password.
IP address allocated to you,
if static (fixed).
Mainly used in Europe.
L2TP
You connect to the ISP only
when required. The IP address
is usually allocated
automatically, but may be static
(fixed).
User name and password.
IP address allocated to you,
if static (fixed).
12
Other Modems (e.g. Broadband Wireless)
Type
Details
ISP Data required
Dynamic
IP Address
Your IP address is allocated
automatically, when you connect to
you ISP.
None.
Static (Fixed)
IP Address
Your ISP allocates a permanent
IP address to you.
IP address allocated to you.
Setup Wizard
The setup wizard will guide you to configure access point for first time. Please follow the
setup wizard step by step.
Step 1- Operation mode
User can select the operation modes here to LAN and WLAN interface for NAT and bridging
function.
13
Step 2- Time Zone Setting
NTP Settings
Enable NTP client
update
Check the box to synchronize the time with the host PC.
Automatically Adjust
Daylight Saving
Check the box to automatically adjust to daylight saving time.
Time Zone
Select the time zone area where you are located from the pulldown list.
NTP Server
Enter the Network Time Protocol Server here. Ex:
time.nist.gov, ntp0.broad.mit.edu, or time.stdtime.gov.tw.
Step 3- LAN Interface Setup
14
IP Address
Shows the IP address of the Wireless Router (default IP address
is 192.168.1.1.)
Subnet Mask
The subnet mask of the Wireless Router (degault subnet mask is
255.255.255.0.)
Step 4- WAN Interface Setup
WAN Access
Type
DHCP Client
If the DHCP Client connection is selected, the PC will obtain the IP
address automatically.
Static IP
15
If the Static IP is selected, the user will have to set up the IP address,
subnet mask and default gateway according to the ISP (Internet
Service Provider) that provided the related information.
IP Address: Enter the WAN IP address provided by your ISP here.
Subnet Mask: Enter the subnet mask here.
Default Gateway: Enter the default gateway IP address provided by
your ISP here.
DNS: Enter the DNS server IP address in the column.
Please obtain WAN static IP from your ISP should you decide to use
static IP.
PPPoE
If the PPPoE is selected, the user will have to set up the user name
and password according to the ISP that provided the related
information.
User Name: Enter the username that was given by your ISP provider.
Maximum input is 32 alphanumeric characters (case sensitive).
Password: Enter the password that was given by your ISP provider.
Maximum input is 32 alphanumeric characters (case sensitive).
PPTP
16
If the PPTP is selected, the user will have to set up the server IP
address, user name and password according to the ISP that provided
the related information.
IP Address: Enter the WAN IP address provided by your ISP here.
Subnet Mask: Enter the subnet mask here.
Server IP Address: Enter the PPTP Server IP Address in this column.
User Name: Maximum input is 20 alphanumeric characters (case
sensitive).
Password: Maximum input is 32 alphanumeric characters (case
sensitive).
L2TP
If the L2TP is selected, the user will have to set up the server IP
address, user name and password according to the ISP that provided
the related information.
IP Address: Enter the WAN IP address provided by your ISP here.
17
Subnet Mask: Enter the subnet mask here.
Server IP Address: Enter the L2TP Server IP Address in this column.
User Name: Maximum input is 20 alphanumeric characters (case
sensitive).
Password: Maximum input is 32 alphanumeric characters (case
sensitive).
Step 5- Wireless Basic Settings
Band
Select 2.4 GHz (B+G+N), 2.4 GHz (B), 2.4 GHz (G), 2.4 GHz (N), 2.4
GHz (B+G), and 2.4 GHz (G+N).
Mode
Only AP mode is available for this model.
Network Type
This type here is fixed and cannot be changed because this is a
wireless router.
Network Name
(SSID)
An SSID is referred to a network name because essentially it is a
Channel Width
Select 20/40MHz or 20MHz for the transmitting band width.
Control Sideband
Select Upper or Lower from pull-down menu.
name that identifies a wireless network.
18
Channel selection
Select 1~11 or Auto Select from the pull-down menu.
Step 6- Wireless Security Setup
Select desired security type from the pull-down menu None, WEP,
WPA(TKIP), WPA2(AES) and WPA2 Mixed. The default setting is None. It is
strongly recommended to set up the security mode (WEP, WPA (TKIP),
WPA2 (AES) and WPA2 Mixed) to prevent any unauthorized accessing. Both
your PC and the Wireless Router must have the same settings for security.
WEP
Security
Mode
Key Length: select key length 64-bit or 128-bit.
Key Format: Select the Hex(10 characters) or ASCII (5 characters).
Hexadecimal (WEP 64 bits): 10 Hex characters (0~9, a~f).

Hexadecimal (WEP 128 bits): 26 Hex characters (0~9, a~f).

ASCII (WEP 64 bits): 5 ASCII characters (case-sensitive).

ASCII (WEP 128 bits): 13 ASCII characters (case-sensitive).
Key Setting: Enter the key in the key setting field.

WPA(TKIP)/WPA2(AES)/WPA2 Mixed
19
Pre-Shared Key Format: There are two formats for choosing to set the pre-shared
key, Passphrase and Hex (64 characters). If Hex is selected, users will have to enter
a 64 characters string. For easier configuration, the Passphrase (at least 8
characters) format is recommended.
Pre-Shared Key : Pre-Shared Key serves as a password. Users may key in 8
to 63 characters string if you selected passphrase. Pre-shared key format is
to set the passwords or leave it blank, in which the 802.1x Authentication
will be activated. Make sure the same password is used on the client's end.
Note: it is recommended to use WPA2 encryption for maximum level of
protection
20
Password
User Name
Key in a new login user name in the blank field.
New Password
Maximum input is 36 alphanumeric characters (case
sensitive.)
Confirmed Password
Key in the password again to confirm.
21
Status
22
Wireless Configuration
Basic configuration
General Setup
Disable Wireless
LAN Interface
Band
Check to disable the wireless function.
You can choose one mode of the following you need.
 2.4GHz (B): 802.11b supported rate only.
 2.4GHz (G): 802.11g supported rate only.
 2.4GHz (N): 802.11n supported rate only.
 2.4GHz (B+G): 802.11b supported rate and 802.11g supported rate.
 2.4GHz (G+N): 802.11g supported rate and 802.11n supported rate.
 2.4GHz (B+G+N): 802.11b, 802.11g and 802.11n supported rate.
The default is 2.4GHz (B+G+N) mode.
Mode
Only AP mode can be selected.
23
Network Type
This is fixed and cannot be changed.
SSID
An SSID is referred to as network name because essentially it is a name
that identifies a wireless network.
Channel Width
If you select 20MHz/40MHz channel width, the channel number
will be from 5~11 and auto; If you select 20MHz channel width,
the channel number will be from 1~11 and auto. Default is
20MHz/40MHz.
Control Sideband
You can select Lower or Upper form the pull-down list.
Channel Number
The channel number will be based on the channel width you
select.
Broadcast SSID
Enabled: This wireless AP will broadcast its SSID to stations.
Disabled: This wireless AP will not broadcast its SSID to stations. If
stations want to connect to this wireless AP, this AP’s SSID should
be known in advance to make a connection.
WMM
The WiFi Multiple Media function is available under 2.4GHz (B),
2.4GHz (G) and 2.4GHz (B+G) band, and is disabled under 2.4GHz
(N), 2.4GHz (G+N) and 2.4GHz (B+G+N) band.
Data Rate
There are several data rates that you can select from the pulldown menu.
Associated Clients
Click Show Active Clients button to show all the listed active
clients.
Enable Mac Clone
(Single Ethernet
Client)
This function will be enabled under Client mode (it is not
supported here).
Security
Security Mode
Select desired security type from the pull-down menu Disable,
24
WEP, WPA, WPA2 and WPA-Mixed. The default setting is
Disable. It is strongly recommended to set up a security mode
(WEP, WPA, WPA2 and WPA-Mixed) to prevent any
unauthorized access.
WEP
Key Length: Select key length 64-bit or 128-bit.
Key Format: Select the default key 1~4.
Hexadecimal (WEP 64 bits): 10 Hex characters (0~9, a~f).

Hexadecimal (WEP 128 bits): 26 Hex characters (0~9, a~f).

ASCII (WEP 64 bits): 5 ASCII characters (case-sensitive).

ASCII (WEP 128 bits): 13 ASCII characters (case-sensitive).
Encryption Key: Enter the key in the Key Setting field.

WPA
Authentication Mode: Personal (Pre-Shared Key).
WPA Cipher Suite: Only AES is supported.
Pre-Shared Key Format: There are two formats to choose from to set
the Pre-shared key, Passphrase and Hex (64 characters). If Hex is
selected, users will have to enter a 64 characters string. For easier
configuration, the Passphrase (at least 8 characters) format is
recommended.
Pre-Shared Key: Pre-Shared Key serves as a password. Users
may key in 8 to 63 characters string if you selected passphrase.
Pre-shared key format to set the passwords or leave it blank, in
which the 802.1x Authentication will be activated. Make sure
the same password is used on the client's end.
25
WPA2
Authentication Mode: Personal (Pre-Shared Key).
WPA2 Cipher Suite: Only AES is supported.
Pre-Shared Key Format: There are two formats from which to choose
to set the Pre-shared key, Passphrase and Hex (64 characters). If Hex is
selected, users will have to enter a 64 characters string. For easier
configuration, the Passphrase (at least 8 characters) format is
recommended.
Pre-Shared Key: Pre-Shared Key serves as a password. Users
may key in 8 to 63 characters string if you selected passphrase.
Pre-shared key format to set the passwords or leave it blank, in
which the 802.1x Authentication will be activated. Make sure
the same password is used on the client's end.
WPA-Mixed
Authentication Mode: Personal (Pre-Shared Key).
WPA Cipher Suite: Only AES is supported.
WPA2 Cipher Suite: Only AES is supported.
Pre-Shared Key Format: There are two formats from which to choose
to set the Pre-shared key, Passphrase and Hex (64 characters). If Hex is
selected, users will have to enter a 64 characters string. For easier
configuration, the Passphrase (at least 8 characters) format is
recommended.
Pre-Shared Key: Pre-Shared Key serves as a password. Users
may key in 8 to 63 characters string if you selected passphrase.
Pre-shared key format to set the passwords or leave it blank, in
which the 802.1x Authentication will be activated. Make sure
the same password is used on the client's end.
26
Advanced configurations
Advanced Settings
RF Output
Power
Select the transmitting power rate 100%, 70%, 50%, 35%, 15%.
selecting lower output power setting will reduce the interference to
other Wi-Fi router in the same area; However, it also reduce the
coverage of this router.
27
Access Control
Wireless Access
Control Mode
MAC Address
Comment
Select Allow Listed or Deny Listed form the pull-down menu to
enable access control function. Default setting is Disable.
Enter the MAC address of a station that is allowed to
access this Access Point.
You may enter up to 20 characters as a remark to the previous
MAC address.
Current Access
Control List
This table displays the station MAC information.
Delete Selected
Click Delete Selected to delete items which are selected.
Delete All
Click Delete All to delete all the items.
Reset
Click Reset to rest.
28
WPS
Disable WPS
Check the box to disable the WPS function; default setting is
Enabled.
WPS Status
Current status of the WPS function.
Self-PIN
Number
PIN code of the router itself.
Push Button
Configuration
Click Start PBC button to make a WPS connection with client.
Client PIN
Number
Enter the client PIN code into the blank field then click the Start PIN
button to make a WPS connection with client.
29
Network Configuration
Basic configuration
LAN Configurations
LAN (local area network) means when you use this router as the Internet access router
gateway, all devices (Excepts DMZ) connect to the LAN ports (there are four of them) or
associate to the WLAN are in the local network.
IP Address
Subnet Mask
Default
Gateway
DHCP
Shows the IP address of the Wireless Router (Default IP address is
192.168.1.1.)
• The subnet mask of the Wireless Router (Default subnet
mask is 255.255.255.0.)
Enter the Internet default gateway LAN IP address in this column.
And the default gateway should have a connection with the Internet.
• Disable: Select to disable this Wireless Router to distribute
IP addresses to connected clients.
30
Server: Select to enable this Wireless Router to distribute IP
Addresses (DHCP Server) to connected clients. And the following field
will be activated for you to enter the starting IP address.
DHCP Client
Range
The starting address of this local IP network address pool. The pool is a
piece of continuous IP address segment. Keep the default value
192.168.1.33 should work for most cases.
•
Maximum: 254. Default value 254 should work for most
cases.
Note: If “Continuous IP address poll starts” is set at 192.168.1.33 and
the “Number of IP address in pool” is 254, the device will distribute IP
addresses from 192.168.1.33 to 192.168.1.254 to all the computers
in the network that request IP addresses from DHCP server (Router)
Show Client
Click to show Active DHCP Client Table.
Refresh: Click this button to refresh the table.
Close: Click this button to close the window.
Static DHCP
Check the box to enable the Static DHCP function, default setting is
disabled. When set to enabled, user can click Static DHCP button to
set the Static DHCP function.
31
IP Address: Enter the fixed IP address that DHCP Server assigned to a
certain connected station.
MAC Address: Enter the MAC address of a certain station, and then
the DHCP Server will distribute a fixed IP address to the station
automatically once they are connected.
Comment: You can enter a comment to describe the above IP
address or MAC address.
Apply Changes: After completing the settings on this page, click
Apply Changes button to save the settings.
Reset: Click Reset to restore default values.
Static DHCP List: Shows the static IP addresses that have been
assigned according to the MAC address.
Delete Selected: Click Delete Selected to delete items which are
selected.
Delete All: Click Delete All button to delete all the items.
Reset: Click Reset button to rest.
Domain Name
Enter the Domain Name here.
Clone MAC
Address
This table displays the station MAC information.
32
WAN Configuration
WAN (wide area network) represents the Inter-networks that the WAN port of the router
can connect to. A correct configuration on WAN port determines whether the local
computers can access the Inter-network (Internet, when you use this router as a home
router) or not.
The available configurations include:
•
•
•
•
•
Static IP
DHCP client
PPPoE
PPTP
L2TP
Follow the instruction obtained from your ISP to choose one of the protocols above.
Advanced Configurations
Advanced WAN (configuration)
This section explains advanced setting on WAN configurations:
33
DHCP Client
WAN Access Type
If the DHCP Client connection is selected, the PC will obtain
the IP address automatically.
Static IP
34
If the Static IP is selected, the user will have to set up the IP
address, subnet mask and default gateway according to the
ISP (Internet Service Provider) that provided the related
information.
IP Address: Enter the WAN IP address provided by your ISP
here.
Subnet Mask: Enter the subnet mask here.
Default Gateway: Enter the default gateway IP address
provided by your ISP here.
PPPoE
If the PPPoE is selected, the user will have to set up the user
name and password according to the ISP that provided the
related information.
User Name: Enter the username that was given by your ISP
provider. Maximum input is 32 alphanumeric characters (case
sensitive).
Password: Enter the password given by your ISP provider.
Maximum input is 32 alphanumeric characters (case sensitive).
PPTP
35
If the PPTP is selected, the user will have to set up the server
IP address, user name and password according to the ISP that
provided the related information.
IP Address: Enter the WAN IP address provided by your ISP
here.
Subnet Mask: Enter the subnet mask here.
Server IP Address: Enter the PPTP Server IP Address in this
column.
User Name: Maximum input is 20 alphanumeric characters
(case sensitive).
Password: Maximum input is 32 alphanumeric characters
(case sensitive).
L2TP
If the L2TP is selected, the user will have to set up the server IP
address, user name and password according to the ISP that
provided the related information.
36
IP Address: Enter the WAN IP address provided by your ISP
here.
Subnet Mask: Enter the subnet mask here.
Server IP Address: Enter the L2TP Server IP Address in this
column.
User Name: Maximum input is 20 alphanumeric characters
(case sensitive).
Password: Maximum input is 32 alphanumeric characters
(case sensitive).
Host Name
Enter the host name in this field.
Attain DNS
Automatically
Select Attain DNS Automatically or select Set DNS Manually
to set the DNS server IP address at the following DNS 1~3
columns. Default setting is Attain DNS Automatically.
Set DNS Manually
DNS 1
DNS 2
Enter the DNS server IP address(es) provided by your ISP, or
you can specify your own preferred DNS server IP address(es).
DNS 2 server is optional. You can enter another DNS server’s IP
address as a backup. DNS 2 server will be used when the DNS 1
server fails.
Factory Default
Clone the
computer's MAC
address-IP Address
Set WAN MAC
Address
Enable uPNP
Your ISP may require a particular MAC address in order for you
to connect to the Internet. This MAC address is the PC’s MAC
address that your ISP had originally connected your Internet
connection to. Type in this Clone MAC address in this section
to replace the WAN MAC address with the MAC address of
that PC.
Check to enable the listed functions.
Apply Changes
After completing the settings on this page, click Apply Changes
button to save the settings.
Reset
Click Reset to restore to default values.
37
Firewall Security
Basic configuration
Domain name filter
Enable URL Filtering
URL Address
Apply Changes
Reset
Current Filter Table
Delete Selected
Delete All
Reset
Check the box to enable URL filtering function.
Enter the URL address in the field.
After completing the settings on this page, click Apply Changes
button to save the settings.
Click Reset button to restore to default values.
Shows the current URL address filter information.
Click Delete Selected button to delete items which are selected.
Click Delete All button to delete all the items.
Click Reset button to reset to default settings.
38
Advanced Configurations
Port Filtering
Enable Port Filtering
Port Range
Protocol
Comment
Current Filter Table
Check to enable this port filtering function.
For TCP and UDP Services, enter the beginning of the range of
port numbers used by the service. If the service uses a single
port number, enter it in both the start and finish fields.
Select the protocol (TCP, UDP or Both) used to the remote
system or service.
You may key in a description for the port range.
Shows the current port filter information.
Delete Selected
Click Delete Selected button to delete items which are
selected.
Delete All
Click Delete All button to delete all the items.
Reset
Click Reset button to rest.
39
IP Filtering
Enable IP Filtering
Check to enable IP filtering function.
Local IP Address
Enter the local server’s IP address.
Protocol
Select the protocol (TCP, UDP or Both) used to the remote
system or service.
Comment
You may key in a description for the port range.
Apply Changes
After completing the settings on this page, click the Apply
Changes button to save the settings.
Reset
Click Reset button to restore to default values.
Current Filter Table
Shows the current IP filter information.
Delete Selected
Click Delete Selected button to delete items which are selected.
Delete All
Click Delete All button to delete all the items.
Reset
Click Reset button to reset to default settings.
40
MAC Filtering
Enable MAC Filtering
MAC Address
Comment
Apply Changes
Reset
Current Filter Table
Delete Selected
Delete All
Reset
Check to enable MAC filtering function.
Enter the client MAC address in the field.
You may key in a descriptive MAC address.
After completing the settings on this page, click the Apply
Changes button to save the settings.
Click Reset button to restore to default values.
Shows the current MAC filter information.
Click Delete Selected button to delete items which are selected.
Click Delete All button to delete all the items.
Click Reset button to reset to default settings.
41
Port Forwarding
Enable Port Forwarding
Check to enable Port Forwarding function.
IP Address
Enter the IP address of the device on the local network in
the field.
Protocol
Select the protocol (TCP, UDP or Both) used to the remote
system or service.
Port Range
For TCP and UDP Services, enter the beginning of the range
of port numbers used by the service. If the service uses a
single port number, enter it in both the start and finish
fields.
Comment
Make a note in this section to describe the configuration
Apply Changes
After completing the settings on this page, click Apply
Changes button to save the settings.
Reset
Click Reset button to restore to default values.
Current Port Forwarding
Shows the current Port Forwarding information.
42
Table
Delete Selected
Click Delete Selected button to delete items which are
selected.
Delete All
Click Delete All button to delete all the items.
Reset
Click Reset button to rest.
DMZ
A Demilitarized Zone (DMZ) is used to provide Internet services without sacrificing
unauthorized access to its local private network. Typically, the DMZ host includes devices
Web servers, FTP servers, SMTP (e-mail) servers and DNS servers. You need to enable the
DMZ and put the server IP address into the field.
43
Management
Statistics
This page displays the packet count of transmission and reception connections on wireless
LAN, Ethernet LAN ports, and Ethernet WAN port.
44
Advanced configurations
Dynamic DNS
Enable DDNS
Check to enable the DDNS function.
Service Provider
Select the desired DDNS Service Provider DynDNS, TZO or
Oray from the pull-down list.
Domain Name
Domain name of the service provider.
User Name/Email
Enter your email that you registered on the service provider
website. (You can refer to below Note information to apply an
account from the service provider website.)
Password/Key
Enter your password that you registered on the service
provider website. Maximum input is 30 alphanumeric
characters (case sensitive).
Apply Change
After completing the settings on this page, click Apply
Changes button to save the settings.
Reset
Click Reset button to restore to default values.
Remote Management
45
Enable Web Server
Access via WAN
Check to enable remote control function.
Port Number
Enter the port number in this field.
Server Access
Select LAN/WAN, LAN or WAN from the pull-down menu.
Bandwidth Management
Enable Bandwidth
Management
Entries in this table improve your online gaming experience
by ensuring that your game traffic is prioritized over other
network traffic, such as FTP or Web.
46
Save/Reload Settings
Save Settings to File
Click the Save button to save the current settings file to the
PC.
Load Settings form
File
Click the Browse button to find and open the previously saved file
(the browser will display the correct file path.) Then, click the
Upload button to upload the previous file. Therefore restore the
specific configuration to the router.
Reset Settings to
Default
Click the Reset button to reset the device back to the default
settings.
47
Logs
Enable Log
Check to enable logging function.
System all
Activates all logging functions.
Wireless
Only logs related to the wireless LAN will be recorded.
DoS
Only logs related to the DoS protection will be recorded.
Enable Remote Log
Only logs related to the Remote control will be recorded.
Log Server IP address
Only logs related to the server will be recorded.
Apply Changes
After completing the settings on this page, click the Apply
Changes button to save current settings.
Refresh
Click Refresh button to renew the logs.
Clear
Click Clear button to delete the logs.
Please allow around 30 seconds for the router to reboot and commence configuration
change.
48
Time Zone Setting
Current Time
Enter the current time of this wireless router or click the Copy
Computer Time button to insert the time automatically.
Time Zone Select
Select the local time zone from the pull-down menu.
Enable NTP client
update
Check to enable NTP (Network Time Protocol Server) client
update function.
Automatically Adjust
Daylight Saving
Check the box to enable this function.
NTP server
Manual IP setting
You may choose to select NTP server from the pull-down menu
or enter an IP address of a specific server manually.
Apply Change
After completing the settings on this page, click Apply Change
button to save current settings.
Reset
Click Reset button to restore to default values.
Refresh
Click Refresh button to renew current time.
49
Upgrade Firmware
Select File
Click the Browse button to find and open the firmware
file (the browser will display to correct file path.)
Upload
Click the Upload button to perform.
Reset
Click Reset button to restore to default values.
Caution:
1. Please use Ethernet connection between the PC and the device when you upgrade the
firmware.
2. Please do not power down the device during the process. It will damage the device.
System Timeout setup
Sometimes when you need more time to configure the router, you can use this feature to
adjust the timeout limit. So you don’t have to log back into the router every 5 or 10
minutes.
50
System Restart
Use the Restart button to reboot the device without unplug and plug the power adapter.
51
Chapter 4: PC Configuration
Overview
For each PC, the following may need to be configured:
•
•
•
TCP/IP network settings
Internet access configuration
Wireless configuration
Windows Clients
•
This section describes how to configure Windows clients for Internet access via the Wireless
Router.
•
•
The first step is to check the PC's TCP/IP settings.
The Wireless Router uses the TCP/IP network protocol for all functions, so it is essential that the
TCP/IP protocol be installed and configured on each PC.
TCP/IP Settings - Overview
If using default Wireless Router settings, and default Windows TCP/IP settings, no changes need to be
made.
•
By default, the Wireless Router will act as a DHCP Server, automatically providing a suitable IP
address (and related information) to each PC when the PC boots.
•
For all non-server versions of Windows, the default TCP/IP setting is to act as a DHCP client.
If using a Fixed (specified) IP address, the following changes are required:
•
•
The Gateway must be set to the IP address of the Wireless Router.
The DNS should be set to the address provided by your ISP.
Checking TCP/IP Settings - Windows 2000
1.
Select Control Panel - Network and Dial-up Connection.
2.
Right - click the Local Area Connection icon and select Properties. You should see a screen like
the following:
52
3.
Select the TCP/IP protocol for your network card.
4.
Click on the Properties button. You should then see a screen like the following.
5.
Ensure your TCP/IP settings are correct, as described below.
Using DHCP
•
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting. Using this is recommended. By default, the Wireless Router will act as a DHCP
Server.
•
Restart your PC to ensure it obtains an IP Address from the Wireless Router.
Using a fixed IP Address ("Use the following IP Address")
If your PC is already configured, check with your network administrator before making the
following changes.
53
•
Enter the Wireless Router 's IP address in the Default gateway field and click OK. (Your LAN
administrator can advise you of the IP Address they assigned to the Wireless Router.)
•
If the DNS Server fields are empty, select Use the following DNS server addresses, and enters the
DNS address or addresses provided by your ISP, then click OK.
Checking TCP/IP Settings - Windows XP
1.
Select Control Panel - Network Connection.
2.
Right click the Local Area Connection and choose Properties. You should see a screen like the
following:
3.
Select the TCP/IP protocol for your network card.
4.
Click on the Properties button. You should then see a screen like the following.
54
5.
Ensure your TCP/IP settings are correct.
Using DHCP
•
To use DHCP, select the radio button Obtain an IP Address automatically. This is the default
Windows setting. Using this is recommended. By default, the Wireless Router will act as a DHCP
Server.
•
Restart your PC to ensure it obtains an IP address from the Wireless Router.
Using a fixed IP Address ("Use the following IP Address")
If your PC is already configured, check with your network administrator before making the
following changes.
•
In the Default gateway field, enter the Wireless Router’s IP address and click OK. Your LAN
administrator can advise you of the IP Address they assigned to the Wireless Router.
•
If the DNS Server fields are empty, select Use the following DNS server addresses, and enters the
DNS address or addresses provided by your ISP, then click OK.
Internet Access
To configure your PCs to use the Wireless Router for Internet access:
•
Ensure that the ADSL modem, DSL modem, Cable modem, or other permanent connection is
functional.
•
Use the following procedure to configure your Browser to access the Internet via the LAN, rather
than by a Dial-up connection.
For Windows 2000
1.
Select Start menu - Settings - Control Panel - Internet Options.
2.
Select the Connection tab, and click the Setup button.
55
3.
Select "I want to set up my Internet connection manually, or I want to connect through a local
area network (LAN)" and click Next.
4.
Select "I connect through a local area network (LAN)" and click Next.
5.
Ensure all of the boxes on the following Local area network Internet Configuration screen are
unchecked.
6.
Check the "No" option when prompted "Do you want to set up an Internet mail account now?"
7.
Click Finish to close the Internet Connection Wizard. Setup is now completed.
For Windows XP
1.
Select Start menu >Control Panel > Network and Internet Connections.
2.
Select Set up or change your Internet Connection.
3.
Select the Connection tab, and click the Setup button.
4.
Cancel the pop-up "Location Information" screen.
5.
Click Next on the "New Connection Wizard" screen.
6.
Select "Connect to the Internet" and click Next.
7.
Select "Set up my connection manually" and click Next.
8.
Check "Connect using a broadband connection that is always on" and click Next.
9.
Click Finish to close the New Connection Wizard. Setup is now completed.
Accessing AOL
To access AOL (America On Line) through the Wireless Router, the AOL for Windows
software must be configured to use TCP/IP network access, rather than a dial-up connection.
The configuration process is as follows:
1.
Start the AOL for Windows communication software. Ensure that it is Version 2.5, 3.0 or later.
This procedure will not work with earlier versions.
2.
Click the Setup button.
3.
Select Create Location, and change the location name from "New Locality" to " Wireless Router ".
4.
Click Edit Location. Select TCP/IP for the Network field. (Leave the Phone Number blank.)
5.
Click Save, then OK.
6.
Configuration is now complete.
7.
Before clicking "Sign On", always ensure that you are using the “Wireless Router " location.
Macintosh Clients
From your Macintosh, you can access the Internet via the Wireless Router. The procedure is
as follows.
1.
Open the TCP/IP Control Panel.
2.
Select Ethernet from the Connect via pop-up menu.
3.
Select Using DHCP Server from the Configure pop-up menu. The DHCP Client ID field can be left
blank.
4.
Close the TCP/IP panel, saving your settings.
Note:
If using manually assigned IP addresses instead of DHCP, the required changes are:
56
•
•
Set the Router Address field to the Wireless Router 's IP Address.
Ensure your DNS settings are correct.
Linux Clients
To access the Internet via the Wireless Router, it is only necessary to set the Wireless Router
as the "Gateway".
Ensure you are logged in as "root" before attempting any changes.
Fixed IP Address
By default, most Unix installations use a fixed IP Address. If you wish to continue using a
fixed IP Address, make the following changes to your configuration.
•
•
Set your "Default Gateway" to the IP Address of the Wireless Router.
Ensure your DNS (Domain Name server) settings are correct.
To act as a DHCP Client (Recommended)
The procedure below may vary according to your version of Linux and X -windows shell.
1.
Start your X Windows client.
2.
Select Control Panel – Network.
3.
Select the "Interface" entry for your Network card. Normally, this will be called "eth0".
4.
Click the Edit button, set the "protocol" to "DHCP", and save this data.
5.
To apply your changes:
Use the "Deactivate" and "Activate" buttons, if available.
OR, restart your system.
Other Unix Systems
To access the Internet via the Wireless Router:
•
•
Ensure the "Gateway" field for your network card is set to the IP Address of the Wireless Router.
Ensure your DNS (Name Server) settings are correct.
Wireless Station Configuration
•
This section applies to all wireless stations wishing to use the Wireless Router 's access point,
regardless of the operating system that is used on the client.
•
To use the Wireless Router, each wireless station must have compatible settings, as following:
Mode
SSID (ESSID)
The mode must be set to Infrastructure.
The network name must match the value used on the Wireless
Router.
57
Note! The SSID is case- sensitive.
Disable
If there is no security is enabled on the Wireless Router, the
security of each station should be disabled as well. And, you can
connect the Wireless Router without security, but it is NOT
recommended.
By default, WEP on the Wireless Router is disabled.
WEP
WPA
WPA2
WPA-Mixed
802.1x
•
If WEP remains disabled on the Wireless Router, all stations must
have WEP disabled.
•
If WEP is enabled on the Wireless Router, each station must use
the same settings as the Wireless Router.
RADIUS Server: RADIUS is an authentication, authorization and
accounting client-server protocol. The client is a Network Access Server
that desires to authenticate its links. The server is a server that has
access to a user database with authentication information. Each station
must set up the RADIUS Server’s IP address, port and passwords that
provided by your ISP.
Note: By default, the Wireless Router will allow 802.11b, 802.11g and 802.11n
connections.
58
Appendix A:
Troubleshooting
Overview
This chapter covers some common problems that may be encountered while using the
Wireless Router and some possible solutions to them. If you follow the suggested steps and
the Wireless Router still does not function properly, contact your dealer for further advice.
General Problems
Problem 1:
Solution 1:
Can't connect to the Wireless Router to configure it.
Check the following:
•
Check the Wireless Router is properly installed, LAN connections are OK, and it
is powered ON.
•
Ensure that your PC and the Wireless Router are on the same network
segment.
•
If your PC is set to "Obtain an IP Address automatically" (DHCP client), please
restart it.
•
If your PC uses a Fixed (Static) IP address, ensure that it is using an IP Address
within the range 192.168.1.1 to 192.168.1.253 and thus compatible with the
Wireless Router's default IP Address of 192.168.1.1.
Also, the Network Mask should be set to 255.255.255.0 to match the Wireless
Router.
In Windows, you can check these settings by using Control Panel-Network to
check the Properties for the TCP/IP protocol.
Internet Access
Problem 1:
Solution 1:
When I enter a URL or IP address I get a time out error.
A number of things could be causing this. Try the following troubleshooting
steps.
•
Check if other PCs work. If they do, ensure that your PCs IP settings are
correct. If using a Fixed (Static) IP Address, check the Network Mask, Default
gateway and DNS as well as the IP Address.
•
If the PCs are configured correctly, but still not working, check the Wireless
59
Router. Ensure that it is connected and ON. Connect to it and check its
settings. (If you can't connect to it, check the LAN and power connections.)
•
Problem 2:
Solution 2:
If the Wireless Router is configured correctly, check your Internet connection
(DSL/Cable modem etc) to see that it is working correctly.
Some applications do not run properly when using the Wireless Router.
The Wireless Router processes the data passing through it, so it is not
transparent.
Use the Content Filter Settings feature to allow the use of Internet
applications, which do not function correctly.
If this does solve the problem you can use the DMZ function. This should
work with almost every application, but:
•
It is a security risk, since the firewall is disabled.
•
Only one (1) PC can use this feature.
Wireless Access
Problem 1:
Solution 1:
Problem 2:
Solution 2:
My PC can't locate the Wireless Router.
Check the following:
•
Your PC is set to Infrastructure Mode. (Access Points are always in
Infrastructure Mode)
•
The SSID on your PC and the Wireless Router are the same.
Remember that the SSID is case-sensitive. So, for example "Workgroup" does
NOT match "workgroup."
•
Both your PC and the Wireless Router must have the same setting for security.
The default setting for the Wireless Router security is disabled, so your
wireless station should also have security disabled.
•
If security is enabled on the Wireless Router, your PC must have security
enabled, and the key must be matched.
•
To see if radio interference is causing a problem, see if connection is possible
when close to the Wireless Router.
Remember that the connection range can be as little as 100 feet in poor
environments.
Wireless connection speed is very slow.
The wireless system will connect at the highest possible speed, depending
on the distance and the environment. To obtain the highest possible
connection speed, you can experiment with the following:
•
Wireless Router location
Try adjusting the location and orientation of the Wireless Router.
•
Wireless Channel
If interference is the problem, changing to another channel may show a
60
marked improvement.
•
Radio Interference
Other devices may be causing interference. You can experiment by switching
other devices off, and see if this helps. Any "noisy" devices should be shielded
or relocated.
•
RF Shielding
Your environment may tend to block transmission between the wireless
stations. This will mean high access speed is only possible when close to the
Wireless Router.
61
Appendix B: About
Wireless LANs
BSS
BSS
A group of Wireless Stations and a single Access Point, all using the same ID (SSID), form a
Basic Service Set (BSS).
Using the same SSID is essential. Devices with different SSIDs are unable to communicate
with each other.
Channels
The Wireless Channel sets the radio frequency used for communication.
•
Access Points use a fixed Channel. You can select the Channel used. This allows you to choose a
Channel which provides the least interference and best performance. In the USA and Canada, 11
channels are available. If using multiple Access Points, it is better if adjacent Access Points use
different Channels to reduce interference.
•
In "Infrastructure" mode, Wireless Stations normally scan all Channels, looking for an Access
Point. If more than one Access Point can be used, the one with the strongest signal is used. (This
can only happen within an ESS.)
Note to US model owner:
To comply with US FCC regulation, the country selection function has been
completely removed from all US models. The above function is for non-US
models only.
62
Security
WEP
WEP (Wired Equivalent Privacy) is a standard for encrypting data before it is transmitted.
This is desirable because it is impossible to prevent snoopers from receiving any data which
is transmitted by your Wireless Stations. But if the data is encrypted, then it is meaningless
unless the receiver can decrypt it.
If WEP is used, the Wireless Stations and the Access Point must have the same security
settings for each of the following:
WEP
64 Bits, 128 Bits.
Key
For 64 Bits encryption, the Key value must
match.
For 128 Bits encryption, the Key value must
match.
WEP Authentication
Open System or Shared Key.
WPA/WPA2
WPA/WPA2 (Wi-Fi Protected Access) is more secure than WEP. It uses a “Shared Key” which allows
the encryption keys to be regenerated at a specified interval. There are several encryption options:
TKIP, AES, TKIP-AES and additional setup for RADIUS is required in this method. The most important
features beyond WPA to become standardized through 802.11i/WPA2 are: pre-authentication, which
enables secure fast roaming without noticeable signal latency.
If WPA or WPA2 is used, the Wireless Stations and the Access Point must have the same
security settings.
802.1x
With 802.1x authentication, a wireless PC can join any network and receive any messages
that are not encrypted, however, additional setup for RADIUS to issue the WEP key
dynamically will be required.
63
RADIUS is an authentication, authorization, and accounting client-server protocol. The client
is a Network Access Server that desires to authenticate its links. The server is a server that
has access to a user database with authentication information.
Wireless LAN Configuration
To allow Wireless Stations to use the Access Point, the Wireless Stations and the Access
Point must use the same settings, as follows:
Mode
SSID (ESSID)
Disable
The mode must be set to Infrastructure.
The network name must match the value used on the Wireless
Router.
Note! The SSID is case- sensitive.
If there is no security is enabled on the Wireless Router, the
security of each station should be disabled as well. And, you can
connect the Wireless Router without security, but it is NOT
recommended.
By default, WEP on the Wireless Router is disabled.
WEP
WPA
WPA2
WPA-Mixed
802.1x
•
If WEP remains disabled on the Wireless Router, all stations must
have WEP disabled.
•
If WEP is enabled on the Wireless Router, each station must use
the same settings as the Wireless Router.
RADIUS Server: RADIUS is an authentication, authorization and
accounting client-server protocol. The client is a Network Access Server
that desires to authenticate its links. The server is a server that has
access to a user database with authentication information. Each station
must set up the RADIUS Server’s IP address, port and passwords that
provided by your ISP.
64
Open Source
End-User License Agreement for “X150N”
WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT
YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE
COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM. IF YOU DO
NOT AGREE TO THESE TERMS, THEN ZyXEL, IS UNWILLING TO LICENSE THE SOFTWARE TO YOU, IN WHICH EVENT YOU SHOULD
RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL, AND YOUR
MONEY WILL BE REFUNDED.
1.
Grant of License for Personal Use
ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, non-sublicense, non-transferable license to use the program
with which this license is distributed (the "Software"), including any documentation files accompanying the Software
("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice. You have
the right to make one backup copy of the Software and Documentation solely for archival, back-up or disaster recovery
purposes. You shall not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you
are reserved by ZyXEL, and all implied licenses are disclaimed.
2.
Ownership
You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement
remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall
remain at all times with ZyXEL. Any other use of the Software by any other entity is strictly forbidden and is a violation of this
License Agreement.
3.
Copyright
The Software and Documentation contain material that is protected by International Copyright Law and trade secret law, and
by international treaty provisions. All rights not granted to you herein are expressly reserved by ZyXEL. You may not remove
any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation.
4.
Restrictions
You may not publish, display, disclose, sell, rent, lease, modify, store, loan, distribute, or create derivative works of the
Software, or any part thereof. You may not assign, sublicense, convey or otherwise transfer, pledge as security or otherwise
encumber the rights and licenses granted hereunder with respect to the Software. Certain components of the Software, and
third party open source programs included with the Software, have been or may be made available by ZyXEL listed in the below
Table (collectively the “Open-Sourced Components”) You may modify or replace only these Open-Sourced Components;
provided that you comply with the terms of this License and any applicable licensing terms governing use of the Open-Sourced
Components, which have been provided on the License Notice as below for the Software. ZyXEL is not obligated to provide any
maintenance, technical or other support for the resultant modified Software. You may not copy, reverse engineer, decompile,
reverse compile, translate, adapt, or disassemble the Software, or any part thereof, nor shall you attempt to create the source
code from the object code for the Software. Except as and only to the extent expressly permitted in this License, by applicable
licensing terms governing use of the Open-Sourced Components, or by applicable law, you may not market, co-brand, private
label or otherwise permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part
thereof, in the operation of a service bureau or for the benefit of any other person or entity. You may not cause, assist or
permit any third party to do any of the foregoing. Portions of the Software utilize or include third party software and other
copyright material. Acknowledgements, licensing terms and disclaimers for such material are contained in the License Notice as
below for the Software, and your use of such material is governed by their respective terms. ZyXEL has provided, as part of the
Software package, access to certain third party software as a convenience. To the extent that the Software contains third party
65
software, ZyXEL has no express or implied obligation to provide any technical or other support for such software. Please
contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its
software and products.
5.
Confidentiality
You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the
confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own
most confidential information. You agree to reasonably communicate the terms and conditions of this License Agreement to
those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their
compliance with such terms and conditions, including, without limitation, not knowingly permitting such persons to use any
portion of the Software for the purpose of deriving the source code of the Software.
6.
No Warranty
THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY LAW, ZyXEL DISCLAIMS ALL WARRANTIES OF
ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, IMPLIED WARRANTIES OF MERCHANTABILITY
AND FITNESS FOR A PARTICULAR PURPOSE. ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE
WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE, OR THAT THE SOFTWARE WILL OPERATE ERROR FREE, OR IN AN
UNINTERUPTED FASHION, OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWARE WILL BE CORRECTED, OR THAT THE
SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM. SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR
EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU. IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE
BY A COURT OF COMPETENT JURISDICTION, THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO
A PERIOD OF THIRTY (30) DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE, AND NO WARRANTIES SHALL APPLY AFTER
THAT PERIOD.
7.
Limitation of Liability
IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES
(INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF
PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE
THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. ZyXEL's AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH
RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE, BUT SHALL IN
NO EVENT EXCEED THE PRODUCT’S PRICE. BECAUSE SOME STATES/COUNTRIES DO NOT ALLOW THE EXCLUSION OR
LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, THE ABOVE LIMITATION MAY NOT APPLY TO YOU.
8.
Export Restrictions
THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER
RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED
FROM TIME TO TIME. YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE
AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS. YOU
AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS, LOSSES, DAMAGES, LIABILITIES, COSTS AND EXPENSES, INCLUDING
REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8.
9.
Audit Rights
ZyXEL SHALL HAVE THE RIGHT, AT ITS OWN EXPENSE, UPON REASONABLE PRIOR NOTICE, TO PERIODICALLY INSPECT AND
AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT.
10.
Termination
This License Agreement is effective until it is terminated. You may terminate this License Agreement at any time by destroying
or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control. ZyXEL may
terminate this License Agreement for any reason, including, but not limited to, if ZyXEL finds that you have violated any of the
terms of this License Agreement. Upon notification of termination, you agree to destroy or return to ZyXEL all copies of the
Software and Documentation and to certify in writing that all known copies, including backup copies, have been destroyed. All
provisions relating to confidentiality, proprietary rights, and non-disclosure shall survive the termination of this Software
License Agreement.
66
11.
General
This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to
conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement
shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan. This License Agreement shall
constitute the entire Agreement between the parties hereto. This License Agreement, the rights granted hereunder, the
Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL. Any waiver or
modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto. If any part of
this License Agreement is found invalid or unenforceable by a court of competent jurisdiction, the remainder of this License
Agreement shall be interpreted so as to reasonably effect the intention of the parties.
NOTE: Some components of this product incorporate source code covered under the open source code licenses. To obtain the
source code covered under those Licenses, please check ZyXEL Technical Support (support@zyxel.com.tw) to get it.
67
Open-Sourced Components
Open
Source
Used in
X150N
Version
From (Source)
(3rd party
software)
Linux
Kernel
2.6.19
www.kernel.org
busybox
1.8.2
http://www.busybox.net/
bridge-utils
0.9.5
http://www.linuxfoundation.org/en/Net:Bridge
dnsmasq2.33
2.33
http://www.thekelleys.org.uk/dnsmasq/doc.html
igmpproxy
0.1
http://sourceforge.net/projects/igmpproxy
iproute22.6.19
2.6.19
http://devresources.linuxfoundation.org/dev/iproute2/download/iproute2-2.6.19-061214.tar.gz
iptables1.3.8
1.3.8
http://www.netfilter.org/downloads.html
ntpclient
2003_194
http://doolittle.icarus.com/ntpclient/
ppp-2.4.2
2.4.2
ftp://ftp.samba.org/pub/ppp/ppp-2.4.2.tar.gz
pptp-client
1.3.1
http://pptpclient.sourceforge.net/
updatedd2.5
2.5
http://mirror.its.uidaho.edu/pub/savannah/updatedd/
wireless_too
25
ls
http://www.hpl.hp.com/personal/Jean_Tourrilhes/Linux/Tools.html
zebra0.92a_ripd
0.92
http://www.zebra.org/
gcc
3.4.6
http://gcc.gnu.org/
uclibc
0.9.28
http://www.uclibc.org/
newlib
1.14.0
http://sourceware.org/newlib/
68
Notice
Information herein is subject to change without notice. Companies, names, and data used in examples
herein are fictitious unless otherwise noted. No part may be reproduced or transmitted in any form or by
any means, electronic or mechanical, for any purpose, except the express written permission of ZyXEL
Communications Corporation.
This Product includes Bridge-utils 0.9.5, Busybox 1.8.2, Dnsmasq 2.33, Igmpproxy 0.1, Iproute2-2.6.19, Iptables
1.3.8, Linux kernel 2.6.19, Ntpclient 2003_194, Ppp 2.4.2, Pptp-client 1.3.1, Updatedd 2.5, Wireless_tools 25,
Zebra-0.92a_ripd 0.92, Newlib 1.14.0, and Gcc 3.4.6 under below GPL license
GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is
not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By
contrast, the GNU General Public License is intended to guarantee your freedom to share and change
free software--to make sure the software is free for all its users. This General Public License applies to
most of the Free Software Foundation's software and to any other program whose authors commit to
using it. (Some other Free Software Foundation software is covered by the GNU Library General Public
License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this
service if you wish), that you receive source code or can get it if you want it, that you can change the
software or use pieces of it in new free programs; and that you know you can do these things.
69
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask
you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute
copies of the software, or if you modify it. For example, if you distribute copies of such a program,
whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure
that they, too, receive or can get the source code. And you must show them these terms so they know
their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives
you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and
ours, we want to make certain that everyone understands that there is no warranty for this free software.
If the software is modified by someone else and passed on, we want its recipients to know that what they
have is not the original, so that any problems introduced by others will not reflect on the original authors'
reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that
redistributors of a free program will individually obtain patent licenses, in effect making the program
proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free
use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright
holder saying it may be distributed under the terms of this General Public License. The "Program", below,
refers to any such program or work, and a "work based on the Program" means either the Program or any
derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either
verbatim or with modifications and/or translated into another language. (Hereinafter, translation is
included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other
than copying, distribution and modification are not covered by this License; they are outside its scope.
The act of running the Program is not restricted, and the output from the Program is covered only if its
contents constitute a work based on the Program (independent of having been made by running the
Program). Whether that is true depends on what the Program does.
1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate
copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the
absence of any warranty; and give any other recipients of the Program a copy of this License along with
the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option
offer warranty protection in exchange for a fee.
2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on
the Program, and copy and distribute such modifications or work under the terms of Section 1 above,
provided that you also meet all of these conditions:
a) You must cause the modified files to carry prominent notices stating that you changed the files and the
date of any change.
70
b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived
from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the
terms of this License.
c) If the modified program normally reads commands interactively when run, you must cause it, when
started running for such interactive use in the most ordinary way, to print or display an announcement
including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you
provide a warranty) and that users may redistribute the program under these conditions, and telling the
user how to view a copy of this License. (Exception: if the Program itself is interactive but does not
normally print such an announcement, your work based on the Program is not required to print an
announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not
derived from the Program, and can be reasonably considered independent and separate works in
themselves, then this License, and its terms, do not apply to those sections when you distribute them as
separate works. But when you distribute the same sections as part of a whole which is a work based on
the Program, the distribution of the whole must be on the terms of this License, whose permissions for
other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you;
rather, the intent is to exercise the right to control the distribution of derivative or collective works based
on the Program. In addition, mere aggregation of another work not based on the Program with the
Program (or with a work based on the Program) on a volume of a storage or distribution medium does not
bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you also do one of the
following:
a) Accompany it with the complete corresponding machine-readable source code, which must be
distributed under the terms of Sections 1 and 2 above on a medium customarily used for software
interchange; or,
b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no
more than your cost of physically performing source distribution, a complete machine-readable copy of
the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium
customarily used for software interchange; or, c) Accompany it with the information you received as to the
offer to distribute corresponding source code.(This alternative is allowed only for noncommercial
distribution and only if you received the program in object code or executable form with such an offer, in
accord with Subsection b above.) The source code for a work means the preferred form of the work for
making modifications to it. For an executable work, complete source code means all the source code for
all modules it contains, plus any associated interface definition files, plus the
scripts used to control compilation and installation of the executable. However, as a special exception, the
source code distributed need not include anything that is normally distributed (in either source or binary
form) with the major components (compiler, kernel, and so on) of the operating system on which the
executable runs, unless that component itself accompanies the executable. If distribution of executable or
object code is made by offering access to copy from a designated place, then offering equivalent access
to copy the source code from the same place counts as distribution of the source code, even though third
parties are not compelled to copy the source along with the object code.
71
4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under
this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or
rights, from you under this License will not have their licenses terminated so long as such parties remain
in full compliance.
5. You are not required to accept this License, since you have not signed it. However, nothing else grants
you permission to modify or distribute the Program or its derivative works. These actions are prohibited by
law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work
based on the Program), you indicate your acceptance of this License to do so, and all its terms and
conditions for copying, distributing or modifying the Program or works based on it.
6. Each time you redistribute the Program (or any work based on the Program), the recipient
automatically receives a license from the original licensor to copy, distribute or modify the Program
subject to these terms and conditions. You may not impose any further restrictions on the recipients'
exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to
this License.
7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason
(not limited to patent issues), conditions are imposed on you (whether by court order, agreement or
otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of
this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License
and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For
example, if a patent license would not permit royalty-free redistribution of the Program by all those who
receive copies directly or indirectly through you, then the only way you could satisfy both it and this
License would be to refrain entirely from distribution of the Program. If any portion of this section is held
invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply
and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section
to induce you to infringe any patents or other property right claims or to contest validity of any such
claims; this section has the sole purpose of protecting the integrity of the free software distribution
system, which is implemented by public license practices. Many people have made generous
contributions to the wide range of software distributed through that system in reliance on consistent
application of that system; it is up to the author/donor to decide if he or she is willing to distribute software
through any other system and a licensee cannot impose that choice. This section is intended to make
thoroughly clear what is believed to be a consequence of the rest of this License.
8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by
copyrighted interfaces, the original copyright holder who places the Program under this License may add
an explicit geographical distribution limitation excluding those countries, so that distribution is permitted
only in or among countries not thus excluded. In such case, this License incorporates the limitation as if
written in the body of this License.
9. The Free Software Foundation may publish revised and/or new versions of the General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail
to address new problems or concerns. Each version is given a distinguishing version number. If the
Program specifies a version number of this License which applies to it and "any later version", you have
the option of following the terms and conditions either of that version or of any later version published by
the Free Software Foundation. If the Program does not specify a version number of this License, you may
choose any version ever published by the Free Software Foundation.
72
10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions
are different, write to the author to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free software
and of promoting the sharing and reuse of software generally.
NO WARRANTY
11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR
THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE
PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND
PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE,
YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL
ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR
INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA
BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
END OF TERMS AND CONDITIONS
All other trademarks or trade names mentioned herein, if any, are the property of their respective owners.
This Product includes uclibc 0.9.28 under the LGPL License.
GNU LESSER GENERAL PUBLIC LICENSE
Version 2.1, February 1999
Copyright (C) 1991, 1999 Free Software Foundation, Inc.
59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not
allowed. [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library
Public License, version 2, hence the version number 2.1.
73
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the
GNU General Public Licenses are intended to guarantee your freedom to share and change free software--to make
sure the software is free for all its users.
This license, the Lesser General Public License, applies to some specially designated software packages--typically
libraries--of the Free Software Foundation and other authors who decide to use it. You can use it too, but we
suggest you first think carefully about whether this license or the ordinary General Public License is the better
strategy to use in any particular case, based on the explanations below.
When we speak of free software, we are referring to freedom of use, not price. Our General Public Licenses are
designed to make sure that you have the freedom to distribute copies of free software (and charge for this service
if you wish); that you receive source code or can get it if you want it; that you can change the software and use
pieces of it in new free programs; and that you are informed that you can do these things.
To protect your rights, we need to make restrictions that forbid distributors to deny you these rights or to ask you
to surrender these rights. These restrictions translate to certain responsibilities for you if you distribute copies of
the library or if you modify it.
For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the
rights that we gave you.You must make sure that they, too, receive or can get the source code. If you link other
code with the library, you must provide complete object files to the recipients, so that they can relink them with
the library after making changes to the library and recompiling it. And you must show them these terms so they
know their rights.
We protect your rights with a two-step method: (1) we copyright the library, and (2) we offer you this license,
which gives you legal permission to copy, distribute and/or modify the library.
To protect each distributor, we want to make it very clear that there is no warranty for the free library. Also, if the
library is modified by someone else and passed on, the recipients should know that what they have is not the
original version, so that the original author's reputation will not be affected by problems that might be introduced
by others.
Finally, software patents pose a constant threat to the existence of any free program. We wish to make sure that a
company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent
holder. Therefore, we insist that any patent license obtained for a version of the library must be consistent with
the full freedom of use specified in this license.
Most GNU software, including some libraries, is covered by the ordinary GNU General Public License. This license,
the GNU Lesser General Public License, applies to certain designated libraries, and is quite different from the
ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries
into non-free programs.
When a program is linked with a library, whether statically or using a shared library, the combination of the two is
legally speaking a combined work, a derivative of the original library. The ordinary General Public License therefore
permits such linking only if the entire combination fits its criteria of freedom. The Lesser General Public License
permits more lax criteria for linking other code with the library.
74
We call this license the "Lesser" General Public License because it does Less to protect the user's freedom than the
ordinary General Public License. It also provides other free software developers Less of an advantage over
competing non-free programs. These disadvantages are the reason we use the ordinary General Public License for
many libraries. However, the Lesser license provides advantages in certain special circumstances.
For example, on rare occasions, there may be a special need to encourage the widest possible use of a certain
library, so that it becomes a de-facto standard. To achieve this, non-free programs must be allowed to use the
library. A more frequent case is that a free library does the same job as widely used non-free libraries. In this case,
there is little to gain by limiting the free library to free software only, so we use the Lesser General Public License.
In other cases, permission to use a particular library in non-free programs enables a greater number of people to
use a large body of free software. For example, permission to use the GNU C Library in non-free programs enables
many more people to use the whole GNU operating system, as well as its variant, the GNU/Linux operating system.
Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of
a program that is linked with the Library has the freedom and the wherewithal to run that program using a
modified version of the Library.
The precise terms and conditions for copying, distribution and modification follow. Pay close attention to the
difference between a "work based on the library" and a "work that uses the library". The former contains code
derived from the library, whereas the latter must be combined with the library in order to run.
GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND
MODIFICATION
0. This License Agreement applies to any software library or other program which contains a notice placed by the
copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General
Public License (also called "this License").
Each licensee is addressed as "you".
A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with
application programs (which use some of those functions and data) to form executables. The "Library", below,
refers to any such software library or work which has been distributed under these terms. A "work based on the
Library" means either the Library or any derivative work under copyright law: that is to say, a work containing the
Library or a portion of it, either verbatim or with modifications and/or translated straightforwardly into another
language. (Hereinafter, translation is included without limitation in the term "modification".)
"Source code" for a work means the preferred form of the work for making modifications to it. For a library,
complete source code means all the source code for all modules it contains, plus any associated interface
definition files, plus the scripts used to control compilation and installation of the library. Activities other than
copying, distribution and modification are not covered by this License; they are outside its scope. The act of
running a program using the Library is not restricted, and output from such a program is covered only if its
contents constitute a work based on the Library (independent of the use of the Library in a tool for writing it).
Whether that is true depends on what the Library does and what the program that uses the Library does.
1. You may copy and distribute verbatim copies of the Library's complete source code as you receive it, in any
medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice
and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any
warranty; and distribute a copy of this License along with the Library. You may charge a fee for the physical act of
transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
75
2. You may modify your copy or copies of the Library or any portion of it, thus forming a work based on the Library,
and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also
meet all of these conditions: a) The modified work must itself be a software library. b) You must cause the files
modified to carry prominent notices stating that you changed the files and the date of any change. c) You must
cause the whole of the work to be licensed at no charge to all third parties under the terms of this License. d) If a
facility in the modified Library refers to a function or a table of data to be supplied by an application program that
uses the facility, other than as an argument passed when the facility is invoked, then you must make a good faith
effort to ensure that, in the event an application does not supply such function or table, the facility still operates,
and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute
square roots has a purpose that is entirely well-defined independent of the application. Therefore, Subsection 2d
requires that any application-supplied function or table used by this function must be optional: if the application
does not supply it, the square root function must still compute square roots.) These requirements apply to the
modified work as a whole. If identifiable sections of that work are not derived from the Library, and can be
reasonably considered independent and separate works in themselves, then this License, and its terms, do not
apply to those sections when you distribute them as separate works. But when you distribute the same sections as
part of a whole which is a work based on the Library, the distribution of the whole must be on the terms of this
License, whose permissions for other licensees extend to the entire whole, and thus to each and every part
regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work
written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or
collective works based on the Library. In addition, mere aggregation of another work not based on the Library with
the Library (or with a work based on the Library) on a volume of a storage or distribution medium does not bring
the other work under the scope of this License.
3. You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given
copy of the Library. To do this, you must alter all the notices that refer to this License, so that they refer to the
ordinary GNU General Public License, version 2, instead of to this License. (If a newer version than version 2 of the
ordinary GNU General Public License has appeared, then you can specify that version instead if you wish.) Do not
make any other change in these notices. Once this change is made in a given copy, it is irreversible for that copy, so
the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that
copy. This option is useful when you wish to copy part of the code of the Library into a program that is not a
library.
4. You may copy and distribute the Library (or a portion or derivative of it, under Section 2) in object code or
executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete
corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2
above on a medium customarily used for software interchange. If distribution of object code is made by offering
access to copy from a designated place, then offering equivalent access to copy the source code from the same
place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy
the source along with the object code.
5. A program that contains no derivative of any portion of the Library, but is designed to work with the Library by
being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a
derivative work of the Library, and therefore falls outside the scope of this License.
However, linking a "work that uses the Library" with the Library creates an executable that is a derivative of the
Library (because it contains portions of the Library), rather than a "work that uses the library". The executable is
therefore covered by this License. Section 6 states terms for distribution of such executables. When a "work that
uses the Library" uses material from a header file that is part of the Library, the object code for the work may be a
derivative work of the Library even though the source code is not. Whether this is true is especially significant if
the work can be linked without the Library, or if the work is itself a library. The threshold for this to be true is not
76
precisely defined by law. If such an object file uses only numerical parameters, data structure layouts and
accessors, and small macros and small inline functions (ten lines or less in length), then the use of the object file is
unrestricted, regardless of whether it is legally a derivative work. (Executables containing this object code plus
portions of the Library will still fall under Section 6.) Otherwise, if the work is a derivative of the Library, you may
distribute the object code for the work under the terms of Section 6. Any executables containing that work also fall
under Section 6, whether or not they are linked directly with the Library itself.
6. As an exception to the Sections above, you may also combine or link a "work that uses the Library" with the
Library to produce a work containing portions of the Library, and distribute that work under terms of your choice,
provided that the terms permit modification of the work for the customer's own use and reverse engineering for
debugging such modifications. You must give prominent notice with each copy of the work that the Library is used
in it and that the Library and its use are covered by this License. You must supply a copy of this License. If the work
during execution displays copyright notices, you must include the copyright notice for the Library among them, as
well as a reference directing the user to the copy of this License. Also, you must do one of these things: a)
Accompany the work with the complete corresponding machine-readable source code for the Library including
whatever changes were used in the work (which must be distributed under Sections 1 and 2 above); and, if the
work is an executable linked with the Library, with the complete machine-readable "work that uses the Library", as
object code and/or source code, so that the user can modify the Library and then relink to produce a modified
executable containing the modified Library. (It is understood that the user who changes the contents of definitions
files in the Library will not necessarily be able to recompile the application to use the modified definitions.) b) Use
a suitable shared library mechanism for linking with the Library. A suitable mechanism is one that (1) uses at run
time a copy of the library already present on the user's computer system, rather than copying library functions into
the executable, and (2) will operate properly with a modified version of the library, if the user installs one, as long
as the modified version is interface-compatible with the version that the work was made with. c) Accompany the
work with a written offer, valid for at least three years, to give the same user the materials specified in Subsection
6a, above, for a charge no more than the cost of performing this distribution. d) If distribution of the work is made
by offering access to copy from a designated place, offer equivalent access to copy the above specified materials
from the same place. e) Verify that the user has already received a copy of these materials or that you have
already sent this user a copy. For an executable, the required form of the "work that uses the Library" must include
any data and utility programs needed for reproducing the executable from it. However, as a special exception, the
materials to be distributed need not include anything that is normally distributed (in either source or binary form)
with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not
normally accompany the operating system. Such a contradiction means you cannot use both them and the Library
together in an executable that you distribute.
7. You may place library facilities that are a work based on the Library side-by-side in a single library together with
other library facilities not covered by this License, and distribute such a combined library, provided that the
separate distribution of the work based on the Library and of the other library facilities is otherwise permitted, and
provided that you do these two things: a) Accompany the combined library with a copy of the same work based on
the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections
above. b) Give prominent notice with the combined library of the fact that part of it is a work based on the Library,
and explaining where to find the accompanying uncombined form of the same work.
8. You may not copy, modify, sublicense, link with, or distribute the Library except as expressly provided under this
License. Any attempt otherwise to copy, modify, sublicense, link with, or distribute the Library is void, and will
automatically terminate your rights under this License. However, parties who have received copies, or rights, from
you under this License will not have their licenses terminated so long as such parties remain in full compliance.
77
9. You are not required to accept this License, since you have not signed it. However, nothing else grants you
permission to modify or distribute the Library or its derivative works. These actions are prohibited by law if you do
not accept this License. Therefore, by modifying or distributing the Library (or any work based on the Library), you
indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or
modifying the Library or works based on it.
10. Each time you redistribute the Library (or any work based on the Library), the recipient automatically receives a
license from the original licensor to copy, distribute, link with or modify the Library subject to these terms and
conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein.
You are not responsible for enforcing compliance by third parties with this License.
11. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not
limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that
contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot
distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations,
then as a consequence you may not distribute the Library at all. For example, if a patent license would not permit
royalty-free redistribution of the Library by all those who receive copies directly or indirectly through you, then the
only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library. If
any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the
section is intended to apply, and the section as a whole is intended to apply in other circumstances. It is not the
purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of
any such claims; this section has the sole purpose of protecting the integrity of the free software distribution
system which is implemented by public license practices. Many people have made generous contributions to the
wide range of software distributed through that system in reliance on consistent application of that system; it is up
to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee
cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence
of the rest of this License.
12. If the distribution and/or use of the Library is restricted in certain countries either by patents or by copyrighted
interfaces, the original copyright holder who places the Library under this License may add an explicit geographical
distribution limitation excluding those countries, so that distribution is permitted only in or among countries not
thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.
13. The Free Software Foundation may publish revised and/or new versions of the Lesser General Public License
from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to
address new problems or concerns. Each version is given a distinguishing version number. If the Library specifies a
version number of this License which applies to it and "any later version", you have the option of following the
terms and conditions either of that version or of any later version published by the Free Software Foundation. If
the Library does not specify a license version number, you may choose any version ever published by the Free
Software Foundation.
14. If you wish to incorporate parts of the Library into other free programs whose distribution conditions are
incompatible with these, write to the author to ask for permission. For software which is copyrighted by the Free
Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our
decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of
promoting the sharing and reuse of software generally.
NO WARRANTY
15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE LIBRARY, TO THE
EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
78
HOLDERS AND/OR OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY
IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING,
REPAIR OR CORRECTION.
16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT
HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE,
BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF
THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCHDAMAGES.
END OF TERMS AND CONDITIONS.
Please refer to this URL to get more GPL information:
http://us.zyxel.com/opensource
79
Customer Support
Please have the following information ready when you contact customer
support:
•
Product model and serial number
•
Warranty information
•
Date that you received or purchased your device
•
Brief description of the problem including any steps that you
have taken before contacting the ZyXEL Customer Support
Representative
Support Email
support@zyxel.com
Toll-Free
1-800-978-7222
Website
www.us.zyxel.com
Postal mail
ZyXEL Communications Inc.
1130 N. Miller Street,
Anaheim, CA 92806-2001
U.S.A.

Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : Yes
Tagged PDF                      : Yes
XMP Toolkit                     : 3.1-702
Modify Date                     : 2010:05:03 14:56:44+08:00
Create Date                     : 2010:03:17 10:09-07:00
Metadata Date                   : 2010:05:03 14:56:44+08:00
Creator Tool                    : Acrobat PDFMaker 9.0 for Word
Document ID                     : uuid:b32bc227-5702-4c87-84f8-d83af183a671
Instance ID                     : uuid:04b6bf96-b1c4-457a-827d-0461cd93b519
Subject                         : 3
Format                          : application/pdf
Creator                         : Alex Wei
Producer                        : Adobe PDF Library 9.0
Source Modified                 : D:20100317170820
Company                         : 
Page Count                      : 86
Page Layout                     : OneColumn
Author                          : Alex Wei
EXIF Metadata provided by EXIF.tools
FCC ID Filing: I88X150N

Navigation menu