ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2
- Den Namen des Produzenten und das Produktionsjahr des Geräts ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service ZyXEL Communications finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von ZyXEL Communications Wireless-11g Access Point ZyXEL G-1000 v2 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    ZyXEL G-1000 v2 Wireless-1 1g Access Point User ’ s Guide V ersion 3.60 Edition 1 3/2006[...]

  • Seite 2

    [...]

  • Seite 3

    ZyXEL G-1000 v2 User’s Guide Copyright 3 Copyright Copyright © 2006 by ZyXEL Communications Corpo ration. The contents of this publication may not be reprod uced in any part or as a whole, tr anscribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mech anical , magnetic, op[...]

  • Seite 4

    ZyXEL G-1000 v2 User’s Guide 4 Interference Statemen ts and Certifications Interference S t atement s and Certifications Federal Communications Commissi on (FCC) Interference St atement This device complies with Part 15 of FCC rul es. Operation is subject to the following two conditions: • This device may not cause harmful interference. • Thi[...]

  • Seite 5

    ZyXEL G-1000 v2 User’s Guide Interferen ce Statements and Certificatio ns 5 This transmitter must not be co-located or op erating in conj unction with any other an tenna or transmitter . ZyXEL Communications Corporation declared th at G-1000 v2 is lim ited in CH1~1 1 from 2400 to 2483.5 MHz by specified firmware cont rolled in USA. 注意 ! 依?[...]

  • Seite 6

    ZyXEL G-1000 v2 User’s Guide 6 Safety Warnings Safety W arnings For your safety , be sure to read and fo llow all warning notices and instructions. • T o reduce the risk of fire, use only No. 26 A WG (American W ire Gauge) or larger telecommunication line cord. • Do NOT open the device or un it. Opening or removing covers can expose you to da[...]

  • Seite 7

    ZyXEL G-1000 v2 User’s Guide ZyXEL Limited Warranty 7 ZyXEL Limited W arranty ZyXEL warrants to the original en d user (purchaser) that this product is free from any defects in materials or workmansh ip for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have ind ic[...]

  • Seite 8

    ZyXEL G-1000 v2 User’s Guide 8 Customer Suppo rt Customer Support Please have the following information r eady when you contact customer support. • Product model and serial number . • W arranty Information. • Date that you received your de vice. • Brief description of the problem and the steps yo u took to solve i t. METHOD LOCATION SUPPO[...]

  • Seite 9

    ZyXEL G-1000 v2 User’s Guide Customer Support 9 POLAND info@pl.zyxel.com +48-22-5286603 www .pl.zyxel.com ZyXEL Communications ul.Emilli Plater 53 00-1 13 Warszawa Poland +48-22-5206701 RUSSIA http://zyxel.ru/support +7-095-542- 89-29 www .zyxel.ru ZyXEL Russia Ostrovityanova 37a S tr . Moscow , 1 17279 Russia sales@zyxel.ru +7-095-542-89-25 SP A[...]

  • Seite 10

    ZyXEL G-1000 v2 User’s Guide 10 Customer Suppo rt[...]

  • Seite 11

    ZyXEL G-1000 v2 User’s Guide Table of Contents 11 T able of Content s Copyright .................................................. .......................................... ...................... 3 Interference S t atement s and Certificat ions ................................................ ........... 4 Safety W arnings ......................[...]

  • Seite 12

    ZyXEL G-1000 v2 User’s Guide 12 Table of Contents Chapter 3 Wizard Setup .. .......................................... ..................................................... ......... 41 3.1 Wizard Setup Overview ...... ................. ... ................... .................... ................... ..41 3.2 General Setup .............. ........[...]

  • Seite 13

    ZyXEL G-1000 v2 User’s Guide Table of Contents 13 Chapter 8 Logs ..................................... .......................................... ......................................... 81 8.1.1 Alerts and Logs ............. ................... ................... .................... .................. 81 8.4 SMTP Error Messages .... .........[...]

  • Seite 14

    ZyXEL G-1000 v2 User’s Guide 14 Table of Contents 15.3 Log and T race ............... .................... ................... ................... .................... ... 1 16 15.3.1 Syslog Loggin g .... .................... ................... ................... .................... ... 1 17 15.4 Diagnostic ..................... ..............[...]

  • Seite 15

    ZyXEL G-1000 v2 User’s Guide Table of Contents 15 Command Interpreter ............................................................... ............................ 161 Appendix G Log Descriptions ................. .......................................... ....................................... 163 Appendix H Wireless LAN and IEEE 802.11 .... ...[...]

  • Seite 16

    ZyXEL G-1000 v2 User’s Guide 16 Table of Contents[...]

  • Seite 17

    ZyXEL G-1000 v2 User’s Guide List of Figure s 17 List of Figures Figure 1 Internet Access Application ..... .................... ................... ....................... ... 31 Figure 2 Corporation Networ k Application ................... ....................... ................... 31 Figure 3 G-1000 v2 Front Panel ................ ...........[...]

  • Seite 18

    ZyXEL G-1000 v2 User’s Guide 18 List of Figures Figure 39 Configuration Restore Successful ...................... .................... ................ 90 Figure 40 T emporarily Disc onnected .................. .................... ...................... .......... 90 Figure 41 Configuration Rest ore Error .. .................... ................[...]

  • Seite 19

    ZyXEL G-1000 v2 User’s Guide List of Figure s 19 Figure 82 Windows XP: S tart Menu ... .......... .......... ................... ................... .......... 141 Figure 83 Windows XP: Control Panel ......... ............. ................... ................... ....... 141 Figure 84 Windows XP: Control Panel: Netw ork Connec tions: Properties .[...]

  • Seite 20

    ZyXEL G-1000 v2 User’s Guide 20 List of Figures[...]

  • Seite 21

    ZyXEL G-1000 v2 User’s Guide List of Tables 21 List of T ables T able 1 IEEE 802.1 1b ........ ................................ ................ .......................... .......... 28 T able 2 IEEE 802.1 1g ........ ................................ ................ .......................... .......... 28 T able 3 Front Panel Light Description [...]

  • Seite 22

    ZyXEL G-1000 v2 User’s Guide 22 List of Tables T able 39 Main Menu Summary ............ ....................... ....................... ................... 96 T able 40 Menu 1 General Setup . ...................... .................... ...................... .......... 97 T able 41 Menu 3. 2 TCP/IP Setup ...... ....................... ...........[...]

  • Seite 23

    ZyXEL G-1000 v2 User’s Guide List of Tables 23 T able 82 Sys log .......... ................... ....................... ................... ...................... ....... 164 T able 83 Log Categories and Available Setti ngs ......... ................... .................... ... 165 T able 84 IEEE 802.1 1g ......... ................ ..............[...]

  • Seite 24

    ZyXEL G-1000 v2 User’s Guide 24 List of Tables[...]

  • Seite 25

    ZyXEL G-1000 v2 User’s Guide Preface 25 Preface Congratulations on your purchase of the ZyXEL G-1000 v2 I EEE 802.1 1 g wireless access point. Y our G-1000 v2 is easy to install and configure. Note: Register your produc t online to receive e-mail notices of firmware upgr ades and information at www .zyxel.com for global products, or at www .us.zy[...]

  • Seite 26

    ZyXEL G-1000 v2 User’s Guide 26 Preface Synt ax Conventions • “Enter” means for you to type one or more characters. “Select” or “Choose” means for you to use one predefined choice. • Mouse action sequences are denoted using a ri ght angle bracket (>). For example, “In W indows, click S tart > Setti ngs > Contro l Panel [...]

  • Seite 27

    ZyXEL G-1000 v2 User’s Guide Chapter 1 Getting to Know Your Device 27 C HAPTER 1 Getting to Know Y our Device This chapter introduces the main featur es and applications of th e G-1000 v2. 1.1 Introducing the ZyXEL G-1000 v2 The ZyXEL G-2000 Plus v2 is a wireless access point. The G-1000 v2 offers highly secured wireless connectivity to your wire[...]

  • Seite 28

    ZyXEL G-1000 v2 User’s Guide 28 Chapter 1 Getting to Know Your Device ZyAIR LED The blue ZyAIR LED (also known as the breathing light) is on when the G-1000 v2 is on and blinks (or breaths) when data is being transmitted to/from its wireless stations. Y ou may use the web configurator to turn this light of f even when the G-1000 v2 is on and data[...]

  • Seite 29

    ZyXEL G-1000 v2 User’s Guide Chapter 1 Getting to Know Your Device 29 Note: The G-1000 v2 may be prone to RF (Radio Frequency) interference from other 2.4 GHz devices such as microwav e ovens, wireless phones, Bluetooth enabled devices, and other wireless LANs. STP (S p annin g T ree Protoc ol) / RSTP (Rapid STP) (R)STP detects and b reaks networ[...]

  • Seite 30

    ZyXEL G-1000 v2 User’s Guide 30 Chapter 1 Getting to Know Your Device SNMP SNMP (Simple Network Management Protoc ol) i s a protocol us ed for exchang ing management information b etween network devices. SNMP is a member of the TCP/IP protocol suite. Y our G-1000 v2 supports SNMP agent functionality , which allows a manager station to manage and [...]

  • Seite 31

    ZyXEL G-1000 v2 User’s Guide Chapter 1 Getting to Know Your Device 31 1.3.1 Internet Access Application The G-1000 is an ideal access solution for wire less Internet connection. A typical Internet access application for your G-1 000 is shown as follows. S tations A, B and C can access the wired network through the G-10 00s. Figure 1 Internet Acce[...]

  • Seite 32

    ZyXEL G-1000 v2 User’s Guide 32 Chapter 1 Getting to Know Your Device Figure 3 G-1000 v2 Front Panel The following table describes the lights. Table 3 Front Panel Light Description LIGHT COLOR ST A TUS DESCRIPTION SYS Green On The wireless card on the G-1000 v2 is working properly . Off The wire less card on the G-1000 v2 is not ready or has a ma[...]

  • Seite 33

    ZyXEL G-1000 v2 User’s Guide Chapter 2 Introducing the Web Configur ator 33 C HAPTER 2 Introducing the W eb Configurator This chapter describes how to access the G-10 00 v2 web configurator and prov ides an overview of its screens. The default IP ad dress of the G-1000 v2 is 192.168. 1.2. 2.1 W eb Configurator Overview The embedded web configurat[...]

  • Seite 34

    ZyXEL G-1000 v2 User’s Guide 34 Chapter 2 Introducing the Web Configurator Figure 4 Change Password Screen 6 On this screen you can access the wizard setup or the advanced setup. Click Go to Advanc ed setup to access the status screen of the web configurator . Note: The management session automatically time s out when the time period set in the A[...]

  • Seite 35

    ZyXEL G-1000 v2 User’s Guide Chapter 2 Introducing the Web Configur ator 35 Note: Y ou can also restore defaults via the we b configurator .(refer to the Maintenance chapter). 2.4 Navigating the W eb Configurator W e use the P-662HW -D1 web screens in this guid e as an example. Scree ns vary slightly for diff erent G-1000 v2 models. 2.4.1 Navigat[...]

  • Seite 36

    ZyXEL G-1000 v2 User’s Guide 36 Chapter 2 Introducing the Web Configurator 2.4.2 St atus Screen The following summarizes how to navigate the web configurator from the St a t u s screen. About Click this icon to see general informatio n about G-1000 v2. S t atus This screen shows the G-1000 v2’s general device, system a nd interface status infor[...]

  • Seite 37

    ZyXEL G-1000 v2 User’s Guide Chapter 2 Introducing the Web Configur ator 37 Figure 6 S t atus Scre en The following table describes the labels shown in the St a t u s scre en. Table 5 Status Screen LABEL DESCRIPTION Refresh Interval Select a number of seconds or None from the drop-down list box to refresh all screen statistics automatically at th[...]

  • Seite 38

    ZyXEL G-1000 v2 User’s Guide 38 Chapter 2 Introducing the Web Configurator 2.4.3 St atus: Packet St atistics T o view packet statistics, click on Packet Statistics (Details...) link in the status screen under the Summary heading. Figure 7 S t atus: Packet S tatistics System Uptime This is the total time the G-1000 v2 has been on. Current Date/T i[...]

  • Seite 39

    ZyXEL G-1000 v2 User’s Guide Chapter 2 Introducing the Web Configur ator 39 The following table describes the labels in this screen. 2.4.4 St atus: WLAN Association List T o view packet statistics, click on Packet Statistics (Details...) link in the status screen under the Summary heading. The following table describes the labels in this screen. [...]

  • Seite 40

    ZyXEL G-1000 v2 User’s Guide 40 Chapter 2 Introducing the Web Configurator QoS This field displays the priority leve l of a wireless device associated with the G- 1000 v2 Refresh Click Refresh to rel oad the screen. Table 7 Association List LABEL DESCRIPTION[...]

  • Seite 41

    ZyXEL G-1000 v2 User’s Guide Chapter 3 Wizard Setup 41 C HAPTER 3 W izard Setup The web configurator ’ s se tup wizard helps you set up a wireless LAN and configure security settings on your G-1000 v2. 3.1 Wizard Setup Overview The wizard will guide you through several steps. Y ou will need to enter some information for identification purposes,[...]

  • Seite 42

    ZyXEL G-1000 v2 User’s Guide 42 Chapter 3 Wizard Setup The following table describes the labels in this screen. 3.3 Wizard Setup Wireless LAN This wizard helps you configure your wireless network and security . 3.3.1 Name (SSID), Channel ID and Security This screen allows you to setu p a unique name for your G-10 00 v2 on the wireless network. Y [...]

  • Seite 43

    ZyXEL G-1000 v2 User’s Guide Chapter 3 Wizard Setup 43 The following table describes the labels in this screen. Note: The wireless st ations and G-1000 v2 must use the same SSID, cha nnel ID and WEP encryption key (if WEP is enabled) or WP A-PSK (if WP A-PSK is enabled) for wireless communication. 3.3.2 Configuring WEP or WP A(2) PSK Security Cho[...]

  • Seite 44

    ZyXEL G-1000 v2 User’s Guide 44 Chapter 3 Wizard Setup Figure 10 Wireless LAN Basic Security The following table describes the labels in this screen. Table 10 Wireless LAN Basic Security LABEL DESCRIPTION Passphrase Y ou can generate or manually en ter a WEP key by either: Entering a Passphrase (up to 32 printable characters) and clicking Generat[...]

  • Seite 45

    ZyXEL G-1000 v2 User’s Guide Chapter 3 Wizard Setup 45 Choose Extend(WP A-PSK with customized key) or Extend(WP A2-PSK with customized key) security in the W ireless LAN Setup screen to set up a Pre-Shar ed Key . Figure 1 1 Wireless LAN Ex tend Security The following table describes the labels in this screen. Refer to the chapter on wireless LAN [...]

  • Seite 46

    ZyXEL G-1000 v2 User’s Guide 46 Chapter 3 Wizard Setup 3.3.3 IP Address Assignment Y our G-10 00 v2 needs an IP address to co mmunicate with your wired netw ork. Figure 12 IP Address Assignment The following table describes the labels in this screen. Note: If you change the IP address a ssigned to the G-1000 v2 or if a DHCP serve r assigns a new [...]

  • Seite 47

    ZyXEL G-1000 v2 User’s Guide Chapter 3 Wizard Setup 47 3.3.4 Apply Settings If you changed the SSID on your device or impl emented any security , the n you will have to make the correspondin g changes on your wire less station to reconnect to the G-1000 v2. The following table describes the labels in this screen. Note: If you changed the SSID on [...]

  • Seite 48

    ZyXEL G-1000 v2 User’s Guide 48 Chapter 3 Wizard Setup Figure 13 Wizard Completed[...]

  • Seite 49

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 49 C HAPTER 4 W ireless LAN This chapter discusses how to configure the wire less network settings in your G-1000 v2. See the append ices for more detailed information about wireless networks. 4.1 Wireless Network Overview The following figure provides an example o f a wireless n etwork. Figure [...]

  • Seite 50

    ZyXEL G-1000 v2 User’s Guide 50 Chapter 4 Wireless LAN Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. 4.2 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network. 4.2.1 SSI[...]

  • Seite 51

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 51 • In the AP: this feature is called a local user database or a local database. • In a RADIUS server: this is a server u sed in businesses mo re than in homes. If your AP does not provide a local user database and if you do not have a RADIUS server , you cannot set up user names and passwo[...]

  • Seite 52

    ZyXEL G-1000 v2 User’s Guide 52 Chapter 4 Wireless LAN Note: It is recommended that wireless networks u se WP A-PSK , WP A , or stronger encryption. IEEE 802.1x and W EP encryption are better than none at all, bu t it is still possible for unauthorized wireless devices to figure out the original information pretty quickly . It is not possible to [...]

  • Seite 53

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 53 4.4 Wireless LAN Screen Note: If you are configuring the G-1000 v2 from a computer connected to the wireless LAN and you change the G-1000 v2’ s SSID or WEP settings, you will lose your wireless connection when you press Apply to confirm. Y ou must then change the wireless settings of your [...]

  • Seite 54

    ZyXEL G-1000 v2 User’s Guide 54 Chapter 4 Wireless LAN See the rest of this chapter for informa tion on the other labels in this screen. 4.4.1 No Security Select No Security to allow wireless stations to commun icate with the access points without any data encryption. Note: If you do not enable any wireless security on your G-1000 v2, your networ[...]

  • Seite 55

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 55 4.4.2 WEP Encryption WEP encryption scrambles the da ta transmitted between the wireless stations and the access points to keep network communications pr ivate. It encrypts unicast and multicast communications in a network. Both the wirel ess stations and the access points must use the same W[...]

  • Seite 56

    ZyXEL G-1000 v2 User’s Guide 56 Chapter 4 Wireless LAN The following table describes the wireless LAN security labels in this screen. 4.4.4 WP A(2)-PSK In order to configure and enable WP A(2)-PSK authentication; click Network > Wireless LAN to display the Ge neral screen. Select WP A-PSK or WP A2-PSK from the Security Mode list. Table 18 Wire[...]

  • Seite 57

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 57 Figure 18 Wireless: WP A(2)-PSK The following table describes the wireless LAN security labels in this screen. Table 19 Wireless: WPA(2)-PSK LABEL DESCRIPTION Security Mode Choose WP A-PSK or WP A2-PSK from the drop-down list box. WP A Compatible This check box is available only when you sele[...]

  • Seite 58

    ZyXEL G-1000 v2 User’s Guide 58 Chapter 4 Wireless LAN 4.4.5 WP A(2) Authentication Screen In order to configure and enable WP A(2) Authentication; click the Wireless LAN link under Network to display the Wir eless screen. Sele ct WP A or WP A2 from the Security Mode list. Figure 19 Wirele ss: WP A(2) Group Key Update T imer (In Seconds) The Grou[...]

  • Seite 59

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 59 The following table describes the wireless LAN security labels in this screen. Table 20 Wireless: WPA(2) LABEL DESCRIPTION WP A Compatible This check box is available only when you select WP A2-PSK or WP A2 in th e Security Mode field. Select the check box to have both WP A2 and WP A wireless[...]

  • Seite 60

    ZyXEL G-1000 v2 User’s Guide 60 Chapter 4 Wireless LAN 4.5 MAC Filter The MAC filter screen allows you to configure the G-1000 v2 to give exclusive access to up to 32 devices ( Allow ) or exc lude up to 32 devices from acce ssing the G-1000 v2 ( Deny ). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assi[...]

  • Seite 61

    ZyXEL G-1000 v2 User’s Guide Chapter 4 Wireless LAN 61 The following table describes the labels in this menu. 4.6 Wireless LAN Advanced Setup T o configure advanced wireless settings, click Network > Wireless LAN > Advanced . The screen appears as shown. Figure 21 Wireless LAN: Advanced Table 21 MAC Address F ilter LABEL DESCRIPTION Active [...]

  • Seite 62

    ZyXEL G-1000 v2 User’s Guide 62 Chapter 4 Wireless LAN The following table describes the labels in this screen. Table 22 Wireless LAN: Advanced LABEL DESCRIPTION Roaming Configuration Enable Roaming Select this checkbox to enable roaming on th e G-1000 v2 if you have two or more G- 1000 v2s on th e same subnet. Note: All APs on the same subnet an[...]

  • Seite 63

    ZyXEL G-1000 v2 User’s Guide Chapter 5 IP and DNS Screens 63 C HAPTER 5 IP and DNS Screens This chapter describes how to configure your G-1000 v2 to interact with the wired network. 5.1 Configuring IP T o configure Internet connection, click Network > IP > Internet Connec tion . The screen appears as shown. Figure 22 Network: Internet Conne[...]

  • Seite 64

    ZyXEL G-1000 v2 User’s Guide 64 Chapter 5 IP and DNS Screens 5.2 Configuring DNS T o configure DNS settings, click Network > IP > Advanced . The screen appears as show n. Figure 23 Network: Advanced The following table describes the labels in this screen. IP Address Enter the IP address of your G-10 00 v2 in dotted decimal notation. IP Subn[...]

  • Seite 65

    ZyXEL G-1000 v2 User’s Guide Chapter 5 IP and DNS Screens 65 Apply Click Apply to save your changes back to the G-1000 v2. Reset Click Reset to reload the previo us configuration for this screen. Table 24 Network: Advanced LABEL DESCRIPTION[...]

  • Seite 66

    ZyXEL G-1000 v2 User’s Guide 66 Chapter 5 IP and DNS Screens[...]

  • Seite 67

    ZyXEL G-1000 v2 User’s Guide Chapter 6 Remote Management Configuration 67 C HAPTER 6 Remote Management Configuration This chapter provides information on config uring remote management. 6.1 Remote Management Overview Remote management allows you to determ ine which services/protocols can access which G- 1000 v2 interface (if any) from which compu[...]

  • Seite 68

    ZyXEL G-1000 v2 User’s Guide 68 Chapter 6 Remote Management Configuration • The IP address in the Secured Client IP field does not match th e client IP address. If it does not match, the G-1000 v2 will disconnect the session immediately . • There is already another rem ote management session with an equal or higher priority running. Y ou may [...]

  • Seite 69

    ZyXEL G-1000 v2 User’s Guide Chapter 6 Remote Management Configuration 69 6.3 T elnet Y ou can configure your G-1000 v2 for remote T elnet access as shown next. The administrator uses T elnet from a computer on a re mote network to access the G-1000 v2. Figure 25 T elnet Configuration on a TCP/IP Network 6.4 Configuring T elnet Click Advanced >[...]

  • Seite 70

    ZyXEL G-1000 v2 User’s Guide 70 Chapter 6 Remote Management Configuration Figure 26 Remote Management: T elnet The following table describes the labels in this screen. 6.5 Configuring FTP Y ou can up load and download the G-1000 v2’ s firmware and configuration files using FTP , please see the chapter on firmware and configuration file maintena[...]

  • Seite 71

    ZyXEL G-1000 v2 User’s Guide Chapter 6 Remote Management Configuration 71 Figure 27 Remote Management: FTP The following table describes the labels in this screen. 6.6 SNMP Simple Network Management Protocol (SNM P) i s a protocol u sed for exch anging management information b etween network devices. SNMP is a member of the TCP/IP protocol suite.[...]

  • Seite 72

    ZyXEL G-1000 v2 User’s Guide 72 Chapter 6 Remote Management Configuration Figure 28 SNMP Management Model An SNMP managed network consis ts of two main types of comp onent: agen ts and a man ager . An agent is a ma nagement software module that resides in a manage d device (the G-100 0 v2). An agent translates the local management info rmation fr[...]

  • Seite 73

    ZyXEL G-1000 v2 User’s Guide Chapter 6 Remote Management Configuration 73 6.6.2 SNMP T raps The G-1000 v 2 will send t raps to the SNMP manager w hen any on e of the follow ing events occurs: 6.6.3 Configuring SNMP T o change your G-1000 v2’ s SNMP settings, click Advanced > Remote MGMT > SN MP . The screen appears as shown. Table 28 SNMP[...]

  • Seite 74

    ZyXEL G-1000 v2 User’s Guide 74 Chapter 6 Remote Management Configuration Figure 29 Remote Management: SNMP The following table describes the labels in this screen. Table 29 Remote Management: SNMP LABEL DESCRIPTION SNMP Configuration Get Community Enter the Get Community , which is the p assword for the incoming Ge t and GetNext requests from th[...]

  • Seite 75

    ZyXEL G-1000 v2 User’s Guide Chapter 7 System 75 C HAPTER 7 System Use this screen to configure the G-10 00 v2’ s time and date se ttings. 7.1 General Setup 7.1.1 General Setup and System Name General Setup contains administrative and system-related information. System Name is for identification purposes. However , because some ISPs check this [...]

  • Seite 76

    ZyXEL G-1000 v2 User’s Guide 76 Chapter 7 System Figure 30 System General Setup The following table describes the labels in this screen. T able 30 System General Setup LABEL DESCRIPTION System Setup System Name Enter a name to help you identify your I SP on the network. This is not a required field and you can safely leave this field blank. Domai[...]

  • Seite 77

    ZyXEL G-1000 v2 User’s Guide Chapter 7 System 77 7.2 Time Setting T o change your G-1000 v2’ s time and date, click Maintenance > System > Time Setting . The screen appears as shown. Us e this screen to configure the G-1000 v2’ s time based on your local time zone. Figure 31 System T ime Setting The following table describes th e fields[...]

  • Seite 78

    ZyXEL G-1000 v2 User’s Guide 78 Chapter 7 System New T ime (hh:mm:ss) This field displays the last updated ti me from the time server or t he last time configured manually . When you set Time and Date Setup to Manual , enter the new time in this field and then click Apply . New Date (yyyy/mm/dd) This field displays the last updated date from the [...]

  • Seite 79

    ZyXEL G-1000 v2 User’s Guide Chapter 7 System 79 End Date Configure the day a nd time when Daylight Saving T ime ends if you se lected Enable Daylight Saving . The o'clock field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time ends in the United S tates on the last Sunday of October . Each time zone in the United [...]

  • Seite 80

    ZyXEL G-1000 v2 User’s Guide 80 Chapter 7 System[...]

  • Seite 81

    ZyXEL G-1000 v2 User’s Guide Chapter 8 Logs 81 C HAPTER 8 Logs This chapter contains informa tion about configuring general log settings and viewing the G- 1000 v2’ s logs. Refer to the appendix for example log messa ge explanations. 8.1 Logs Overview The web confi gurator allows you to choose which categories of events and/or alerts to have th[...]

  • Seite 82

    ZyXEL G-1000 v2 User’s Guide 82 Chapter 8 Logs The following table describes th e fields in this screen. 8.3 Configuring Log Settings Use the Log Settings screen to configure to where the G-1000 v2 is to send lo gs; the schedule for when the G-1000 v2 is to send the logs an d which lo gs and/or imme diate alerts the G-1 000 v2 is to record. See ?[...]

  • Seite 83

    ZyXEL G-1000 v2 User’s Guide Chapter 8 Logs 83 Figure 33 Log Settings The following table describes the fields in this screen. Table 33 Log Settings LABEL DESCRIPTION E-mail Log Settings Mail Server Enter the server name or the IP add ress of the mail server for the e-mail addresses specified below . If this field is left blank , logs and alert m[...]

  • Seite 84

    ZyXEL G-1000 v2 User’s Guide 84 Chapter 8 Logs 8.4 SMTP Error Messages The following table lists common SMTP errors. Password Enter the password associated with the user name above. Log Schedule This drop-down menu is used to configur e the frequency of log messages being sent as E-mail: •D a i l y • Weekly •H o u r l y • Whe n Log is Ful[...]

  • Seite 85

    ZyXEL G-1000 v2 User’s Guide Chapter 8 Logs 85 -6 means RCPT T O fail -7 means DA T A fail -8 means mail data send fail Table 34 SMTP Error Me ssages[...]

  • Seite 86

    ZyXEL G-1000 v2 User’s Guide 86 Chapter 8 Logs[...]

  • Seite 87

    ZyXEL G-1000 v2 User’s Guide Chapter 9 Tools 87 C HAPTER 9 To o l s This chapter describes how to upload n ew firmwa re, manage config uration and restart your G- 1000 v2. 9.1 Firmware Upgrade Find firmware at www .zyxel.com in a file that (usually) uses the system model name with a.bin extension, for example, "G-1000 v2.bin". The uploa[...]

  • Seite 88

    ZyXEL G-1000 v2 User’s Guide 88 Chapter 9 Tools After you see the Firmware Upload in Pr ogr ess screen, wait two minutes before logging into the G-1000 v2 again. Figure 35 Firmware Upload In Progress The G-1000 v2 automatically restar ts in this time causing a te mporary network disconnect. In some operating systems, you may see the following ico[...]

  • Seite 89

    ZyXEL G-1000 v2 User’s Guide Chapter 9 Tools 89 9.2 Configuration Screen Click Maintenance > T ools > Configuration . Information related to factory defaults, ba ckup configuration, and rest oring configuration appears as sho wn next. Figure 38 Configuration 9.2.1 Backup Configuration Backup configuration allows you to back up (save) the G-[...]

  • Seite 90

    ZyXEL G-1000 v2 User’s Guide 90 Chapter 9 Tools After you see a “Restore Configuration successful” screen, you must then wa it one minute before logging into th e G-1000 v2 again. Figure 39 Configuration Resto re Successful The G-1000 v2 automatically restar ts in this time causing a te mporary network disconnect. In some operating systems, y[...]

  • Seite 91

    ZyXEL G-1000 v2 User’s Guide Chapter 9 Tools 91 Y ou can also press the RESET button on the rear panel to reset the factory defaults of yo ur G- 1000 v2. Refe r to the chap ter ab out introducing the web configur ator for more information on the RESET button. 9.3 Rest art System restart allows you t o reboot the G-1000 v2 witho ut turning the pow[...]

  • Seite 92

    ZyXEL G-1000 v2 User’s Guide 92 Chapter 9 Tools[...]

  • Seite 93

    ZyXEL G-1000 v2 User’s Guide Chapter 10 Intro ducing the SMT 93 C HAPTER 10 Introducing the SMT This chapter describes h ow to access the SMT and provides an overview of its menus . 10.1 Connect to your G-1000 v2 Using T elnet The following procedure details how to telnet into your G-1000 v2. 1 In W indows, click St a r t (usually in the bottom l[...]

  • Seite 94

    ZyXEL G-1000 v2 User’s Guide 94 Chapter 10 Introdu cing the SMT 4 T ype your new system password in the New Password field (up to 30 characters), and press [ENTER] . 5 Re-type your new system password in the Retype to confirm field for confirmation and press [ENTER] . Note that as you type a password, the screen di splays an asterisk “*” for [...]

  • Seite 95

    ZyXEL G-1000 v2 User’s Guide Chapter 10 Intro ducing the SMT 95 10.4 Navigating the SMT Interface The SMT (System Manage ment T erminal) is the interface that you use to configure y our G- 1000 v2. Several operations that you should be familiar with before you attempt to modify the configuration are listed in the table below . After you enter the[...]

  • Seite 96

    ZyXEL G-1000 v2 User’s Guide 96 Chapter 10 Introdu cing the SMT Figure 45 G-1000 v2 SMT Main Menu This menu is summarized below . Copyright (c) 1994 - 2 006 ZyXEL Communications Corp. G-1000v2 Main Menu Getting Started Advanced Management 1. General Setup 22. SNMP Configuration 3. LAN Setup 23. System Security 24. System Maintenance 99. Exit Ente[...]

  • Seite 97

    ZyXEL G-1000 v2 User’s Guide Chapter 11 General Setup 97 C HAPTER 11 General Setup The chapter shows you th e information on general setup. Menu 1 – General Setup contains administrative and system-related information (shown next). The System Name field is for identification purposes. It is recommended you type your computer's "Comput[...]

  • Seite 98

    ZyXEL G-1000 v2 User’s Guide 98 Chapter 11 General Setup IP Address Enter the IP addresses of the DNS server s. T his field is available when you select User-Defined in the field above. When you have completed this menu, press [ ENTER ] at the prompt “Press ENTER to Confirm…” to save your configuration, or press [ ESC ] at any time to cance[...]

  • Seite 99

    ZyXEL G-1000 v2 User’s Guide Chapter 12 LAN Setup 99 C HAPTER 12 LAN Setup This chapter shows you h ow to configure the LAN on yo ur G-1000 v2. 12.1 LAN Setup This section describes how to configure the Ethernet using Menu 3 – LAN Setup . Fr om the main menu, enter 3 to display menu 3. Figure 47 Menu 3 LAN Setup Detailed explanation about the L[...]

  • Seite 100

    ZyXEL G-1000 v2 User’s Guide 100 Chapter 12 LAN Setup Follow the instructions in the following table on how to configure the fields in this menu. 12.3 Wireless LAN Setup Use menu 3.5 to set up your G-1000 v2 as the wi reless access point. T o edit menu 3.5, enter 3 from the main menu to display Menu 3 – LAN Setup . When menu 3 appears, press 5 [...]

  • Seite 101

    ZyXEL G-1000 v2 User’s Guide Chapter 12 LAN Setup 101 The following table describes the fields in this menu. Table 42 Menu 3.5 Wireless LAN Setup FIELD DESCRIPTION ESSID The ESSID (Extended Service Set IDentity) identif ies the AP to which the wire less stations associate. Wireless stations associating to the AP must have the same ESSID. Enter a [...]

  • Seite 102

    ZyXEL G-1000 v2 User’s Guide 102 Chapter 12 LAN Setup 12.3.1 Configurin g MAC Address Filter Y our G-1000 v2 checks the MAC address of th e wireless station devic e against a list of allowed or denied MAC addresses. However , intruders could fake allowed MAC addresses so MAC-based authentication is less secure than EAP authentication. Follow the [...]

  • Seite 103

    ZyXEL G-1000 v2 User’s Guide Chapter 12 LAN Setup 103 Figure 51 M enu 3.5.1 W LAN MAC Addr ess Filter The following table describes the fields in this menu. 12.3.2 Configuring Roaming Enable the roaming feature if you have two or more G-1000 v2 s on the same subnet. Follow the steps below to allow ro amin g on your G-1000 v2 . 1 From the main men[...]

  • Seite 104

    ZyXEL G-1000 v2 User’s Guide 104 Chapter 12 LAN Setup Figure 52 Menu 3.5 Wireless LAN Set up 3 Move the cursor to the Edit Roaming Configuration field. Press [SP ACE BAR] to select Ye s and then press [ENTER] . Menu 3.5.2 – Roaming Configuration displays as shown next. Figure 53 WLAN Roaming Configuration The following table describes the field[...]

  • Seite 105

    ZyXEL G-1000 v2 User’s Guide Chapter 13 SNMP Configuration 105 C HAPTER 13 SNMP Configuration This chapter shows you how to use SMT to configure SNMP on the G-1000 v2. T o configure SNMP , select option 22 from th e main menu to open Menu 22 – SNMP Configuration as shown next. The “community” for Get, Set and T rap fields is SNMP terminolog[...]

  • Seite 106

    ZyXEL G-1000 v2 User’s Guide 106 Chapter 13 SNMP Configuration[...]

  • Seite 107

    ZyXEL G-1000 v2 User’s Guide Chapter 14 System Security 107 C HAPTER 14 System Security This chapter describes how to configure the system password, an external RADIUS server and 802.1x in SMT . 14.1 System Password Figure 55 Menu 23 System Security Y ou should change the default password. If you forg et your password you have to restore the defa[...]

  • Seite 108

    ZyXEL G-1000 v2 User’s Guide 108 Chapter 14 Syst em Security Figure 57 Menu 23.2 System Security: RADIUS S erver The following table describes the fields in this menu. Menu 23.2 - Syste m Security - RADIUS Server Authentication S erver: Active= Yes Server Address = 192.168.1.1 Port #= 1812 Shared Secret= ******** Accounting Serve r: Active= Yes S[...]

  • Seite 109

    ZyXEL G-1000 v2 User’s Guide Chapter 14 System Security 109 14.3 802.1x The IEEE 802.1x standards outline enhanced security methods for both the authentication of wireless stations and en cryption key managemen t. Follow the steps below to enable EAP authentication on your G-1000 v2. 1 From the main menu, enter 23 to display Menu23 – System Sec[...]

  • Seite 110

    ZyXEL G-1000 v2 User’s Guide 110 Chapter 14 Syst em Security The following table describes the fields in this menu. Table 47 Menu 23.4 System Security: IEEE802.1 x FIELD DESCRIPTION Wireless Port Control Press [SP ACE BAR] and select a securi ty mode for the wireless LAN access. Select No Authentication R equired to allow any wireless stations ac[...]

  • Seite 111

    ZyXEL G-1000 v2 User’s Guide Chapter 14 System Security 111 Once you enable user authenticatio n, you need to specify an exte rnal RADIUS server or create local user accounts on the G-1000 v2 for authentication Authentication Databases The authentication database contains wireless station login information. Th e local user database is the built-i[...]

  • Seite 112

    ZyXEL G-1000 v2 User’s Guide 112 Chapter 14 Syst em Security[...]

  • Seite 113

    ZyXEL G-1000 v2 User’s Guide Chapter 15 System Inform ation and Diagnosis 113 C HAPTER 15 System Information and Diagnosis This chapter covers the information and diag nostic tools in SMT menus 24.1 to 24.4. These tools include updates on system status , port status, log and trace capabiliti es and upgrades for the system software. This chapte r [...]

  • Seite 114

    ZyXEL G-1000 v2 User’s Guide 114 Chapter 15 System Information and Diagnosis The following table describes the fields present in Menu 24.1 – System Maintenance – St a t u s which are read-only and meant for diagnostic purposes. Figure 61 Menu 24.1 System Mainten ance: St atus The following table describes the fields present in this menu. Menu[...]

  • Seite 115

    ZyXEL G-1000 v2 User’s Guide Chapter 15 System Inform ation and Diagnosis 115 15.2 System Information T o get to the System Information: 1 Enter 24 to display Menu 24 – System Maintenance . 2 Enter 2 to display Menu 24.2 – System Information and Con sole Port Speed . 3 From this menu you have two choices as shown in the next figu re: Figure 6[...]

  • Seite 116

    ZyXEL G-1000 v2 User’s Guide 116 Chapter 15 System Information and Diagnosis 15.2.2 Console Port Speed Note: The console port is intern al and reserved for technician use only . Y ou can set up different port speeds for the console port through Menu 24.2.2 – System Maintenance – Console Port Speed . Y our G-1000 v2 suppo rts 9600 (default ), [...]

  • Seite 117

    ZyXEL G-1000 v2 User’s Guide Chapter 15 System Inform ation and Diagnosis 117 Figure 65 Menu 24.3 Log and T race Note: The console port is intern al and reserved for technician use only . 15.3.1 Syslog Logging Enter 2 in menu 24.2 to display the screen shown n ext. Figure 66 Menu 24.3.2 System Mainte nance - Syslog Logging The following table des[...]

  • Seite 118

    ZyXEL G-1000 v2 User’s Guide 118 Chapter 15 System Information and Diagnosis Figure 67 Menu 24.4 System Mainten ance: Diagnostic Follow the procedure next to get to display this menu: 1 From the main menu, type 24 to open Menu 24 – System Main tenance . 2 From this menu , type 4. Diagnostic to open Menu 24.4 – System Maintenance – Diagnosti[...]

  • Seite 119

    ZyXEL G-1000 v2 User’s Guide Chapter 16 Firmware and Confi guration File Maintenance 119 C HAPTER 16 Firmware and Configuration File Maintenance This chapter tells y ou how to backup and re stor e your configuration file as well as upload new firmware and configuratio n files using the SMT screens. 16.1 Filename Conventions The configuration file[...]

  • Seite 120

    ZyXEL G-1000 v2 User’s Guide 120 Chapter 16 Firmware and Con figuration File Main tenance The following table is a summary . Ple ase note that the internal filename refe rs to the filename on the G-1000 v2 an d the external filename refers to the filen ame not o n the G-1000 v2, that is, on your computer , local network or FTP site and so the nam[...]

  • Seite 121

    ZyXEL G-1000 v2 User’s Guide Chapter 16 Firmware and Confi guration File Maintenance 121 Figure 68 Menu 24.5 Backup Configurat ion 16.2.2 Using the FTP command from the DOS Prompt 1 Launch the FTP client on your computer . 2 Enter “open” and the IP add ress of your G-1000 v2. 3 Press [ENTER] when prompted for a username. 4 Enter “root” an[...]

  • Seite 122

    ZyXEL G-1000 v2 User’s Guide 122 Chapter 16 Firmware and Con figuration File Main tenance The following table describes some of the co mmands that you may see in third party FTP clients. 16.2.3 Backup Configuration Using TFTP The G-1000 v2 supports the up /downloading of the firmware and the configuration file using TFTP (T rivial File Transfer P[...]

  • Seite 123

    ZyXEL G-1000 v2 User’s Guide Chapter 16 Firmware and Confi guration File Maintenance 123 16.2.4 Example: TFTP Command The following is an example TFTP command: TFTP [-i] host get rom-0 config.rom where “i” specifies binary image transfer mode (u se this mode when tran sferring binary files), “host” is the G-1000 v2 IP address, “get” t[...]

  • Seite 124

    ZyXEL G-1000 v2 User’s Guide 124 Chapter 16 Firmware and Con figuration File Main tenance 3 Run the HyperT erminal program by clicking Tr a n s f e r , then Receive File as shown in the following screen. Figure 72 Backup Configur ation Example 4 After a successful backup you will see the following screen. Pr ess any key to return to the SMT menu.[...]

  • Seite 125

    ZyXEL G-1000 v2 User’s Guide Chapter 17 System Mainten ance and Information 125 C HAPTER 17 System Maintenance and Information This chapter leads you through SM T menus 24.8 and 24.10. 17.1 Command Interpreter Mode The Command Interpreter (CI) is a part of the ma in system firmware. The CI provides much of the same functionality as the SMT , whil[...]

  • Seite 126

    ZyXEL G-1000 v2 User’s Guide 126 Chapter 17 System Mainten ance and Information 17.2 T ime and Date Setting The G-1000 v2 keeps track of the time and date . There is also a software mechanism to set the time manually or get the current time and date fro m an external server when you turn on your G-1000 v2. Menu 24.10 allows you to update the time[...]

  • Seite 127

    ZyXEL G-1000 v2 User’s Guide Chapter 17 System Mainten ance and Information 127 The G-1000 v2 resets th e time in three instances: 1 On leaving menu 24.10 after making changes. 2 When the G-1000 v2 starts up, if th ere is a timeserver configured in menu 24.10. 3 24-hour intervals after starting. 17.3 Remote Management Setup 17.3.1 T elnet Y ou ca[...]

  • Seite 128

    ZyXEL G-1000 v2 User’s Guide 128 Chapter 17 System Mainten ance and Information 17.3.4 Remote Management Setup Remote management setup is for managing T elnet, FTP and W eb services. Y ou can customize the service port, access interface and the secured client IP address to enhance security and flexibility . Y ou may manage your G-1000 v2 from a r[...]

  • Seite 129

    ZyXEL G-1000 v2 User’s Guide Chapter 17 System Mainten ance and Information 129 The following table describes the fields in this menu. 17.3.5 Remote Management Limit ations Remote management over LAN or W AN will not work when: 1 A filter in menu 3.1 (LAN) or in menu 1 1.5 (W AN) is applied to block a T elnet, FTP or W eb service. 2 Y ou have dis[...]

  • Seite 130

    ZyXEL G-1000 v2 User’s Guide 130 Chapter 17 System Mainten ance and Information 17.5 System T imeout There is a system timeout of five minutes (300 seconds) for T eln et/web/FTP co nnections. Y our G-1000 v2 will automatically log you out if you do nothing in this timeout period, except when it is continuously upda ting the status in menu 24.1 or[...]

  • Seite 131

    ZyXEL G-1000 v2 User’s Guide Chapter 18 Troubleshooting 131 C HAPTER 18 T roubleshooting This chapter covers potential pr oblems and possible remedies. After each problem descri ption, some instructions are provided to help you to diagno se and solve the problem. Problems St arting Up the G-1000 v2 Problems with the Ethernet Interface Table 58 Tr[...]

  • Seite 132

    ZyXEL G-1000 v2 User’s Guide 132 Chapter 18 Troublesh ooting Problems with the Password Problems with the WLAN Interface Table 60 Troubleshootin g the Password PROBLEM CORRECTIVE ACTION I cannot access the G-1000 v2. The Password and Username fields are case-sensitive. Make sure that you enter the correct password and username using the proper ca[...]

  • Seite 133

    ZyXEL G-1000 v2 User’s Guide 133 A PPENDIX A Product S pecifications See also the Introduction ch apter for a general overv iew of the key features. S pecification T ables Table 62 Hardwa re Default IP Address 192.168.1 .2 Default Subnet Mask 255.255 .255.0 (24 bits) Default Password 1 234 Dimensions (152 W) x (92 D) x (45 H) mm Wei ght 3 00g Pow[...]

  • Seite 134

    ZyXEL G-1000 v2 User’s Guide 134 Management Embedded Web Configurator CLI (Command Line Interpreter) Remote Management via T elnet or Web SMT (System Management T erminal) SNMP Management Embedded FTP/TFTP se rver for firmware downloading, configuration backu p and restoration with large rom file support Syslog Built-in Diagnostic T ools for FLAS[...]

  • Seite 135

    ZyXEL G-1000 v2 User’s Guide 135 A PPENDIX B Brute-Force Password Guessing Protection The following describes the c ommands for enablin g, disabling and configuring the brute-force password guessing protect ion m echanism for the password. See Appendix F for information on the command structure. Example sys pwderrtm 5 This command sets the passwo[...]

  • Seite 136

    ZyXEL G-1000 v2 User’s Guide 136[...]

  • Seite 137

    ZyXEL G-1000 v2 User’s Guide 137 A PPENDIX C Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed. W indows 95/98/Me/NT/2000/XP , Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/ IP on y[...]

  • Seite 138

    ZyXEL G-1000 v2 User’s Guide 138 Figure 79 WIndows 95/98/Me: Network: Co nfiguration Inst alling Component s The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microso ft Networks. If you need the adapter: 1 In the Network window , click Add . 2 Select Ada[...]

  • Seite 139

    ZyXEL G-1000 v2 User’s Guide 139 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK . 5 Restart your computer so the changes you made take ef fect. Configuring 1 In the Network window Configuration tab, select your network adapter's T CP/IP entry and cl[...]

  • Seite 140

    ZyXEL G-1000 v2 User’s Guide 140 Figure 81 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’ s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add . 5 Click OK to save and close the TCP/IP Pr oper[...]

  • Seite 141

    ZyXEL G-1000 v2 User’s Guide 141 Figure 82 Windows XP : S tart Menu 2 For W indows XP , click Network Connections . For W indows 2000/NT , click Network and Dial-up Connections . Figure 83 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .[...]

  • Seite 142

    ZyXEL G-1000 v2 User’s Guide 142 Figure 84 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and click Properties . Figure 85 Windows XP: Loca l Area Connection Prop erties 5 The Internet Pr otocol TCP/IP Properties window opens (the General tab in W indows XP). • [...]

  • Seite 143

    ZyXEL G-1000 v2 User’s Guide 143 • If you have a static IP address click Use the following IP Address and fill in the IP addr ess , Subnet mask , and Default gateway fields. Click Advanced . Figure 86 Windows XP : Advanced TCP/IP S ettings 6 If you do not know your gateway's IP address , remove any previously installed gateways in the IP S[...]

  • Seite 144

    ZyXEL G-1000 v2 User’s Guide 144 • Click Obtain DNS server address automatically if you do not know your DNS server IP addre ss(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses , and type them in the Preferr ed DNS server and Alternate DNS server fields. If you have previously configured DNS serv[...]

  • Seite 145

    ZyXEL G-1000 v2 User’s Guide 145 Figure 88 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 89 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configur e: list.[...]

  • Seite 146

    ZyXEL G-1000 v2 User’s Guide 146 4 For statically assigned settings, do the following: •F r o m t h e Configure box, select Manually . • T ype your IP address in the IP Address box. • T ype your subnet mask in the Subnet mask box. • T ype the IP address of your G-1000 v2 in the Router address box. 5 Close the TCP/IP Contr ol Panel . 6 Cli[...]

  • Seite 147

    ZyXEL G-1000 v2 User’s Guide 147 Figure 91 Macintosh OS X: Network 4 For statically assigned settings, do the following: •F r o m t h e Configure box, select Manually . • T ype your IP address in the IP Address box. • T ype your subnet mask in the Subnet mask box. • T ype the IP address of your G-1000 v2 in the Router address box. 5 Click[...]

  • Seite 148

    ZyXEL G-1000 v2 User’s Guide 148[...]

  • Seite 149

    ZyXEL G-1000 v2 User’s Guide 149 A PPENDIX D IP Address Assignment Conflict s This appendix describes situations where IP address conflicts may occur . Subscribers with duplicate IP addresses will not be able to access the Internet. Case A: The G-1000 v2 is using the same LAN and W AN IP addresses The following figure shows an example where th e [...]

  • Seite 150

    ZyXEL G-1000 v2 User’s Guide 150 T o solve this proble m, make sure the G-1000 v2 LAN IP address is not in the DHCP IP address pool. Case C: The Subscriber IP address is the same as the IP address of a network device The following figure depicts an example where the subscriber IP address is the same as the IP address of a network device not attac[...]

  • Seite 151

    ZyXEL G-1000 v2 User’s Guide 151 Figure 95 IP Address Conflicts: Case D This problem can be solved by adding a VLAN- enabled switch or set the computers to obtain IP addresses dynamically .[...]

  • Seite 152

    ZyXEL G-1000 v2 User’s Guide 152[...]

  • Seite 153

    ZyXEL G-1000 v2 User’s Guide 153 A PPENDIX E IP Subnetting IP Addressing Routers “route” based on the network number . The router that delivers the data pa cket to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (ei ght bits), wri tten in dotted decimal notation, for example, 192.168.1.1. IP a[...]

  • Seite 154

    ZyXEL G-1000 v2 User’s Guide 154 Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a valu e of 0 to 127. Similarly the first octet of a class “B” must begi n with “10”, therefore the first octet of a class “B” address has a valid range of 128 to 191. The fi [...]

  • Seite 155

    ZyXEL G-1000 v2 User’s Guide 155 Since the mask is always a continuous number of ones begin ning from the left, followed by a continuous number of zeros for the remainder of the 32 bit mask, you can si mply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the number [...]

  • Seite 156

    ZyXEL G-1000 v2 User’s Guide 156 last octet bit values indicate host ID b its “borrowed” to form network ID bit s. The number of “borrowed” host ID bit s determines the numb er of subnets you can have. The remaining number of host ID bi t s (af ter “borrowing”) determines the number of hosts you can have on each subnet. The remaining [...]

  • Seite 157

    ZyXEL G-1000 v2 User’s Guide 157 Example: Four Subnet s The above exampl e illustrated using a 25-bit subne t mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00 , 01, 10 and 1 1. The subnet [...]

  • Seite 158

    ZyXEL G-1000 v2 User’s Guide 158 Example Eight Subnet s Similarly use a 27-bit mask to create 8 subnets (001 , 010, 01 1, 100, 101, 1 10). The following table shows class C IP ad dress last octet values for each subnet. The following table is a summary for class “C” subnet planning. Table 75 Subnet 4 NETWORK NUMBER LAST OCTET BIT V A LUE IP A[...]

  • Seite 159

    ZyXEL G-1000 v2 User’s Guide 159 Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet ma sk also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets ava ilable for subnetting and a class “A” address has three ho[...]

  • Seite 160

    ZyXEL G-1000 v2 User’s Guide 160[...]

  • Seite 161

    ZyXEL G-1000 v2 User’s Guide 161 A PPENDIX F Command Interpreter The following describes how to use the comman d interpreter . Enter 24 in the main menu to bring up the system maintena nce menu. Enter 8 to go to Menu 24.8 - Command Interpr eter Mode . See the included disk or zyxel.com for more detailed information on these commands. Note: Use of[...]

  • Seite 162

    ZyXEL G-1000 v2 User’s Guide 162[...]

  • Seite 163

    ZyXEL G-1000 v2 User’s Guide 163 A PPENDIX G Log Descriptions This appendix provides descrip tions of example log messages . Table 79 System Error Logs LOG MESSAGE DESCRIPTION %s exceeds the max. number of session per host! This attempt to create a NA T session exceeds the maximum number of NA T session table entries allowed to be created per hos[...]

  • Seite 164

    ZyXEL G-1000 v2 User’s Guide 164 Log Commands Go to the command inte rpreter interface (the Command In terpreter Appendix explains how to access and use the comman ds). 3 Port unreachable 4 A packet that needed fragmentation was dropped because it was set to Don't Fragment (DF) 5 Source route failed 4 Source Quench 0 A gateway may discard in[...]

  • Seite 165

    ZyXEL G-1000 v2 User’s Guide 165 Configuring What Y ou W ant the G-1000 v2 to Log Use the sys logs load command to load the log se tting buffer th at allows you to configure which logs the G-1000 v2 is to record. Use sys logs category followed by a log category and a parameter to decide what to record Use the sys logs save command to store the se[...]

  • Seite 166

    ZyXEL G-1000 v2 User’s Guide 166 Log Command Example This example sh ows how to set the G-1000 v2 to record the error logs and alerts and then view the results. ras> sys logs load ras> sys logs category error 3 ras> sys logs save ras> sys logs display access # .time source destin ation notes message 0|11/11/2002 15:10:12 |172.22.3.80 [...]

  • Seite 167

    ZyXEL G-1000 v2 User’s Guide 167 A PPENDIX H W ireless LAN and IEEE 802.1 1 A wireless LAN (WLAN) provides a fle xible data communications system that you can use to access various services (navigating the Internet, em ail, printer services, etc.) without the use of a cabled connection. In effect a wireless LAN environment provides you the freedo[...]

  • Seite 168

    ZyXEL G-1000 v2 User’s Guide 168 Figure 96 IBSS (Ad-hoc) Wireless LAN BSS A Basic Service Set (BSS) exists when all co mmunications between wirele ss stations or between a wireless station and a wired netw ork client go through one access point (AP). Intra-BSS traffic is traf fic between wireless sta tions in the BSS. When Intra-BSS is enabled, w[...]

  • Seite 169

    ZyXEL G-1000 v2 User’s Guide 169 Figure 97 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlappi ng BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distributio n System (DS). An ESSID (ESS IDentification) uniquely ide[...]

  • Seite 170

    ZyXEL G-1000 v2 User’s Guide 170 Figure 98 Extended Service Set Wireless LAN Basics RTS/CTS A hidden node occurs when two stations are with in range of the same access point, but are not within range of each other . The following figure illustrates a hidden node. Both stations (ST A) are within range of the access point (AP) or wi reless gateway [...]

  • Seite 171

    ZyXEL G-1000 v2 User’s Guide 171 When station A sends data to the G-1000 v 2, it mi ght not know that station B is already using the channel. If these two stations send data at the same time, collisions may occur when both sets of data arrive at the AP at the same time, resulting in a loss of mess ages for both stations. RT S / C T S is designed [...]

  • Seite 172

    ZyXEL G-1000 v2 User’s Guide 172 IEEE 802.1 1 The 1997 completion of the I EEE 802.1 1 standard for wirel ess LANs (WLANs) was a first important step in the evolutionary developmen t of wireless networking technologies. The standard was developed to ma ximize interoperability between differing brands of wireless LANs as well as to introduce a var[...]

  • Seite 173

    ZyXEL G-1000 v2 User’s Guide 173 A PPENDIX I Wireless LAN Security As wireless networks become po pular for both portable comp uting and corporate networks , security is now a priority . IEEE 802.1 1g Wireless LAN IEEE 802.1 1g is fully compatible with th e IEEE 802.1 1b standard. This means an IEEE 802.1 1b adapter can interface directly with an[...]

  • Seite 174

    ZyXEL G-1000 v2 User’s Guide 174 RADIUS RADIUS is based on a client-server model that supports authentication, authorization and accounting. The access point is the client and the server is th e RADIUS server . The RADIUS server handles the following tasks: • Authentication Determines the identity of the users. • Authorization Determines the [...]

  • Seite 175

    ZyXEL G-1000 v2 User’s Guide 175 In order to ensure network security , the access point and the RADIUS server use a shared secret key, which is a password, they both know . The key is not sent over the netwo rk. In addition to the shared key , pass word information exchanged is also encrypted to protect the network from unauthorized access. T ype[...]

  • Seite 176

    ZyXEL G-1000 v2 User’s Guide 176 PEAP (Protected EAP) Like EAP-TTLS, server-side certific ate authentication is used to establish a secure connection, then use simple username and p assword methods thro ugh the secured co nnection to authenticate the clients, thus hiding client identity . However , PEAP only supports EAP methods, such as EAP-MD5,[...]

  • Seite 177

    ZyXEL G-1000 v2 User’s Guide 177 Figure 100 WEP Authentication S teps Open system authentication in volves an unencrypted two-message procedure. A wireless station sends an open system authentication request to the AP , which will then automatically accept and connect the wire less station to the network. In effect, open system is not authenticat[...]

  • Seite 178

    ZyXEL G-1000 v2 User’s Guide 178 WP A(2) W i-Fi Protected Access (WP A) is a subset of the IEEE 802.1 1i standard. WP A2 (IEEE 802.1 1i) is a wireless security standard that defines stronger encryp tion, authentication and key manage ment than WP A. Key differences between WP A(2) and WEP are improved data encryption and user authentication. If b[...]

  • Seite 179

    ZyXEL G-1000 v2 User’s Guide 179 By generating unique data encryption keys for ev ery data packet and by creating an integrity checking mechanism (MIC), with TKIP and AES it is more difficult to decrypt data on a W i-Fi network than WEP and dif ficult for an intruder to break into the network. The encryption mechanisms used for WP A(2) and WP A(2[...]

  • Seite 180

    ZyXEL G-1000 v2 User’s Guide 180 2 The RADIUS server then checks the user's iden tification against its database and grants or denies network access accordingly . 3 The RADIUS server distributes a Pairwise Mast er Key (PMK) key to th e AP that then sets up a key hierarch y and management system, u sing the pair -wise key to dynamically gener[...]

  • Seite 181

    ZyXEL G-1000 v2 User’s Guide 181 Security Parameters Summary • Refer to this table to see what other secur ity parameters you should configure for each Authentication Method/ key management prot ocol type. MAC address filters are not dependent on how you config ure these security features. RADIUS Server Authentication Sequence The following fig[...]

  • Seite 182

    ZyXEL G-1000 v2 User’s Guide 182 Figure 102 Sequences for EAP MD5–Ch allenge Authentication Mutual Authentication with Internal RADIUS server . Microsofts Challenge-Handshake Authentica tion Protocol (MS-CHAP V2) is used to periodically verify the identity of the peer (station or other AP) using a thre e-way handshake. The following figure depi[...]

  • Seite 183

    ZyXEL G-1000 v2 User’s Guide 183 Figure 103 Sequences for PEAP , MS– CHAP V2 Authentication[...]

  • Seite 184

    ZyXEL G-1000 v2 User’s Guide 184[...]

  • Seite 185

    ZyXEL G-1000 v2 User’s Guide 185 A PPENDIX J T ypes of EAP Authentication This appendix discusses popu lar EAP authentication types. The type of authentication you use depends on the RADIUS ser ver or the AP . Consult your network administrator for more information. EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is the simplest one-way a[...]

  • Seite 186

    ZyXEL G-1000 v2 User’s Guide 186 PEAP (Protected EAP) Like EAP-TTLS, server-side certific ate authentication is used to establish a secure connection, then use simple username and p assword methods thro ugh the secured co nnection to authenticate the clients, thus hiding client identity . However , PEAP only supports EAP methods, such as EAP-MD5,[...]

  • Seite 187

    ZyXEL G-1000 v2 User’s Guide 187 A PPENDIX K Antenna Selection and Positioning Recommendation An antenna couples RF signals onto air . A tran smitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air . The a ntenna also operates in reverse by capturing RF signals fro m the air . Choosing the r[...]

  • Seite 188

    ZyXEL G-1000 v2 User’s Guide 188 T ypes of Antennas For WLAN There are two types of antennas used for wireless LAN applications. • Omni-directional antennas send the RF signal out in all directions on a horizontal p lane. The covera ge area is torus -shaped (lik e a donut) which makes these antennas ideal for a room environment. W ith a wide co[...]

  • Seite 189

    ZyXEL G-1000 v2 User’s Guide 189 Index Numerics 11 0 V A C 6 230V AC 6 A Abnormal Working Conditions 7 AC 6 access point 49 access point. See also AP . Accessories 6 Acts of God 7 Advanced Encryption S tandard 178 Airflow 6 Alternative Subnet Mask Notation 155 American Wire Gauge 6 Antenna Directional 188 Omni-directional 188 Antenna gain 187 AP [...]

  • Seite 190

    ZyXEL G-1000 v2 User’s Guide 190 C CA 175 , 185 Cables, Connecting 6 Certificate Authority 175 , 185 Certifications 5 channel 49 Channel ID 53 , 101 Charge 7 Circuit 4 Class B 4 Collision 11 4 Command Interpreter 125 Communications 4 Community 105 Compliance, FCC 4 Components 7 Condition 7 Connecting Cables 6 Consequential Damages 7 Contact Infor[...]

  • Seite 191

    ZyXEL G-1000 v2 User’s Guide 191 Dust 6 Dynamic WEP Key Exchange 176 E EAP 29 EAP Authentication 175 , 185 Electric Shock 6 Electrical Pipes 6 Electrocution 6 embedded help 35 Encryption 178 encryption 51 Equal V alue 7 ESS 169 Europe 6 Exposure 6 Extended Service Se t 169 Extended Service Se t IDentification 53 F Failure 7 FCC 4 Rules, Part 15 4[...]

  • Seite 192

    ZyXEL G-1000 v2 User’s Guide 192 G Gas Pipes 6 General Setup 41 , 75 , 97 General wireless LAN screen 53 Germany , Cont act Infor mation 8 God, act of 7 H Harmful Interference 4 Hidden Menus 95 hide SSID 50 High V oltage Points 6 Host 76 Host IDs 153 HTTP (Hypertext Transfer Protocol) 87 HyperT erminal program 123 I IBSS 167 IEEE 802.1 1g 173 max[...]

  • Seite 193

    ZyXEL G-1000 v2 User’s Guide 193 License 3 Lightning 6 Link type 11 4 Liquids, Corrosive 6 local (user) database 51 Log Descriptions 16 3 Logs 81 M MAC address 50 MAC address filter 50 weaknesse s 50 MAC Address Filter Action 61 , 103 MAC Address Filtering 60 , 102 MAC Filter 60 MAC Filtering 29 Main Menu 95 Management Information Base (MIB) 72 M[...]

  • Seite 194

    ZyXEL G-1000 v2 User’s Guide 194 P Packets 11 4 Pairwise Master Key (PMK) 178 Parts 7 Password 93 , 105 Patent 3 Permission 3 Photocopying 3 Ping 11 8 Pipes 6 Pool 6 Postage Prepaid. 7 Power Adaptor 6 Power Cord 6 Power Outlet 6 Power Supply 6 Power Supply , repair 6 preamble 52 Product Model 8 Product Page 5 Product Serial Number 8 Products 7 Pr[...]

  • Seite 195

    ZyXEL G-1000 v2 User’s Guide 195 Rate Receiving 11 4 T ransmission 11 4 Receiving Antenna 4 Registered 3 Registered Trademark 3 Regular Mail 8 Related Documentation 25 Relocate 4 Re-manufact ured 7 Remote Authentication Dia l In User Service 29 Remote Management Limitations 67 , 129 Remote Management Setup 128 Remote Node 11 4 Removing 6 Reorient[...]

  • Seite 196

    ZyXEL G-1000 v2 User’s Guide 196 Shock, Electric 6 SMT Menu Overview 94 SMTP Error Messages 84 SNMP 30 , 71 Community 105 Manager 72 MIBs 72 T rusted Host 105 S p ain, C onta ct Informati on 9 SSID 49 , 50 hide 50 SSID security 50 weaknesse s 50 SSL Passthrough 29 STP (S panning Tree Protocol) 29 Subnet Mask 100 , 11 6 Subnet Masks 154 Subnetting[...]

  • Seite 197

    ZyXEL G-1000 v2 User’s Guide 197 Thunderstorm 6 T ime and Date Se tting 126 Ti m e Zo n e 127 T rademark 3 T rademark Owners 3 T rademarks 3 T ranslation 3 T roubleshooting Accessing ZyAIR 132 Ethernet Port 131 St a r t - U p 131 TV T echnician 4 U Undesired Operations 4 User Authentication 179 user authentication 50 local (user) database 51 RADI[...]

  • Seite 198

    ZyXEL G-1000 v2 User’s Guide 198 WEP Encryption 29 , 57 , 101 WEP encryption 55 Wet B as em ent 6 Wi-Fi Protected Access 28 , 178 wireless client 49 Wireless Client WP A Supplicants 179 Wireless LAN 100 , 167 Wireless LAN Setup 100 wireless network 49 basic guidelines 49 wireless networks channel 49 encryption 51 MAC address filter 50 security 49[...]