ZyXEL Communications G-1000 manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation ZyXEL Communications G-1000. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel ZyXEL Communications G-1000 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation ZyXEL Communications G-1000 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation ZyXEL Communications G-1000 devrait contenir:
- informations sur les caractéristiques techniques du dispositif ZyXEL Communications G-1000
- nom du fabricant et année de fabrication ZyXEL Communications G-1000
- instructions d'utilisation, de réglage et d’entretien de l'équipement ZyXEL Communications G-1000
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage ZyXEL Communications G-1000 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles ZyXEL Communications G-1000 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service ZyXEL Communications en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées ZyXEL Communications G-1000, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif ZyXEL Communications G-1000, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation ZyXEL Communications G-1000. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    G-1000 802.1 1g Wireless Access Point User ’ s Guide V ersion 3.50 1 1/2005[...]

  • Page 2

    G-1000 User’s Guide 2 Copyright Copyright Copyright © 2005 by ZyXEL Communications Corpo ration. The contents of this publication may not be reprod uced in any part or as a whole, transcribed, stored in a retrieval system, tran slated into any language, or transmitted in any form or by any means, el ectronic, mechanical , magnetic, optical, chem[...]

  • Page 3

    G-1000 User’s Guide Federal Com munications Commission ( FCC) Interf erence Statem ent 3 Federal Communications Commission (FCC) Interference S t atement This device complies with Part 15 of FCC rul es. Operation is subject to the following two conditions: • This device may not cause harmful interference. • This device must accept any interfe[...]

  • Page 4

    G-1000 User’s Guide 4 Federal Communications Commission (FCC) Interference Statement Cet appareil numerique de la classe B est conforme a la norme NMB-003 du Canada. Certifications Go to www .zyxel.com 1 Select your product from t he drop-down list box on the Zy XEL home page to go to that product's page. 2 Select the certification you wish [...]

  • Page 5

    G-1000 User’s Guide Safety Warnings 5 Safety W arnings For your safety , be sure to read and fo llow all warning notices and instructions. • Do NOT open the device or un it. Opening or removi ng covers can expose you to dangerous high vo ltage points or othe r risks. ONL Y qualified serv ice personnel can service the device. Please contact you [...]

  • Page 6

    G-1000 User’s Guide 6 ZyXEL Limited Warranty ZyXEL Limited W arranty ZyXEL warrants to the original en d user (purchaser) that this product is free from any defects in materials or workmansh ip for a period of up to tw o years from the date of purchase . During the warranty period, and upon proof of purchase, should the product have ind ications [...]

  • Page 7

    G-1000 User’s Guide Customer Support 7 Customer Support Please have the following information r eady when you contact customer support. • Product model and serial number . • W arranty Information. • Date that you received your de vice. • Brief description of the problem and the steps yo u took to solve i t. METHOD LOCATION SUPPORT E-MAIL [...]

  • Page 8

    G-1000 User’s Guide 8 Customer Suppo rt POLAND info@pl.zyxel.com +48-22-5286603 www .pl.zyxel.com ZyXEL Communications ul.Emilli Plater 53 00-1 13 W arszawa Poland +48-22-5206701 RUSSIA http://zyxel.ru/support +7-095-542- 89-29 www .zyxel.ru ZyXEL Russia Ostrovityanova 37a S tr . Moscow , 1 17279 Russia sales@zyxel.ru +7-095-542-89-25 SP AIN supp[...]

  • Page 9

    G-1000 User’s Guide Customer Support 9[...]

  • Page 10

    G-1000 User’s Guide 10 T able of Content s Copyright .................................................. ................................................................ 2 Federal Communications Commissi on (FCC) Interference St atement ............... 3 Safety W arnings .............................................................................[...]

  • Page 11

    G-1000 User’s Guide 11 1.3.1 Internet Acc ess Application .......................... ................ ............. ............... 30 1.3.2 Corporation Netw ork A pplication ........ ................ ............. ................ ......... 30 Chapter 2 Hardware Inst allation and Initial Setup ....................................................[...]

  • Page 12

    G-1000 User’s Guide 12 Chapter 6 Wireless LAN ..................................................................................... .................... 50 6.1 Introduction ............................ ............. ................ ............. ............. ................ ..... 50 6.2 Wireless Security Overview ...................... .......[...]

  • Page 13

    G-1000 User’s Guide 13 8.6 SNMP . ............. ............. ................ ............. ............. ................ ............. ............. ..76 8.6.1 Supported MIBs ..................... ............. ................ ............. ............. ............ 78 8.6.2 SNMP T raps . ................ ............. ............. ........[...]

  • Page 14

    G-1000 User’s Guide 14 Chapter 14 Dial-in User Setup .................................... ............................................................ 108 Chapter 15 SNMP Configuration ..................................................... ....................................... 1 10 Chapter 16 System Security .....................................[...]

  • Page 15

    G-1000 User’s Guide 15 Troubleshooting ....................................... ..................................................... ....... 136 Appendix B Specifications ................................ ..................................................... .................. 138 Appendix C Brute-Force Password Guessing Protecti on ..............[...]

  • Page 16

    G-1000 User’s Guide 16 List of Figures Figure 1 Internet Access Applic ation ..... ................. ............. ................ ............. ................ ... 30 Figure 2 Corporation Network Application ...... .................... ............ ................. ............ ....... 30 Figure 3 G-1000 Front Panel .... ................ ....[...]

  • Page 17

    G-1000 User’s Guide 17 Figure 37 System S tatus: Show S tatistics .... ............. ............. ................ ............. ............. ... 87 Figure 38 Association List ............... ................ ............. ................ ............. ................ .......... 8 8 Figure 39 Firmware Up load ....... ................ ........[...]

  • Page 18

    G-1000 User’s Guide 18 Figure 80 Menu 24 System Maintenance ....... ................ ................ ............. ............. .......... 131 Figure 81 V alid CI Commands ..... ................ ............. ................ ................ ............. ............. 131 Figure 82 Menu 24.10 System Maintenance: T ime and Date S etting ......[...]

  • Page 19

    G-1000 User’s Guide 19[...]

  • Page 20

    G-1000 User’s Guide 20 List of T ables T able 1 IEEE 802.1 1b ........... ................ ................. ................................................ ............. 27 T able 2 IEEE 802.1 1g ........... ................ ................. ................................................ ............. 28 T able 3 Front Panel LED Description [...]

  • Page 21

    G-1000 User’s Guide 21 T able 37 Restore Configurat ion ... ............. ................ ................ ................ ................ .......... 91 T able 38 SMT Menus Overview ........... ................. ................ ............. ................ ................ 95 T able 39 Main Menu Commands ...................... .............[...]

  • Page 22

    G-1000 User’s Guide 22 T able 80 Subnet 4 .......... ............. ................ ............. ................ ............. ................ ........... .. 175 T able 81 Eight Subnets ..... ............. ................ ............. ................ ............. ................ .......... 1 75 T able 82 Class C Subnet Planning ....... ..[...]

  • Page 23

    G-1000 User’s Guide 23[...]

  • Page 24

    G-1000 User’s Guide 24 Preface Preface Congratulations on your p u rchase of the ZyXEL G-1000 - 802.1 1g W ireless Access Point. An AP acts as a bridge between the wireless and wired networks, ex tending your existing wired network without any additional wiring. Y our G-1000 is easy to install and configure. About This U ser's Guide This Use[...]

  • Page 25

    G-1000 User’s Guide Preface 25 User Guide Feedback Help us help you! E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The T echnical W riting T eam, ZyXEL Communications Corp., 6 In novatio n Road II, Science-Based Industrial Park, Hsinchu, 300, T aiwan. Tha nk yo[...]

  • Page 26

    G-1000 User’s Guide 26 Chapter 1 Getting to Know Your G-1000 C HAPTER 1 Getting to Know Y our G-1000 This chapter introduces the main feat ures an d applications of the G-1000. 1.1 Introducing the G-1000 The G-1000 Access Point extends the range of your existin g wired network without any additional wiring efforts, providing easy network access t[...]

  • Page 27

    G-1000 User’s Guide Chapter 1 Getting to Know Your G-1000 27 1.2.1.4 G-1000 LED The blue G-1000 LED (also known as the Breathing LED) is on whe n the G-1000 is on and blinks (or breaths) when data is being transmitted to/from its wireless stations. Y ou may use the web configurator to turn this LED of f even when the G-10 00 is on and data is bei[...]

  • Page 28

    G-1000 User’s Guide 28 Chapter 1 Getting to Know Your G-1000 1.2.2.4 802.1 1g Wi reless LAN St andard The G-1000 complies with the 802.1 1g wireless stan dard and is also fully compatible with the 802.1 1b standard. This means an 802.11 b radio card can interface directly with an 802.1 1 g device (and vice versa) at 11 Mbps or lower depending on [...]

  • Page 29

    G-1000 User’s Guide Chapter 1 Getting to Know Your G-1000 29 1.2.2.10 IEEE 802. 1x Network Security The G-1000 supports the IEEE 8 02. 1x standard to enhance user authentication. Use the built- in user profile database to authenticate up to 32 users using MD5 encryption. Use an EAP- compatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In[...]

  • Page 30

    G-1000 User’s Guide 30 Chapter 1 Getting to Know Your G-1000 1.3.1 Internet Access Application The G-1000 is an ideal access solution for wire less Internet connection. A typical Internet access application for your G-1 000 is shown as follows. S tations A, B and C can access the wired network through the G-10 00s. Figure 1 Internet Access Applic[...]

  • Page 31

    G-1000 User’s Guide Chapter 1 Getting to Know Your G-1000 31[...]

  • Page 32

    G-1000 User’s Guide 32 Chapter 2 Hardware Installation an d Initial Setup C HAPTER 2 Hardware Inst allation and Initial Setup This chapter describes the physical features of the G-1000 and how to make cable connections. 2.1 Front Panel of the G-1000 The LEDs on the fro nt panel indicate the operati onal status of your G-1000. Figure 3 G-1000 Fron[...]

  • Page 33

    G-1000 User’s Guide Chapter 2 Hardware Installa tion and Initial Setup 33 2.2 T op Panel and Connections of the G-1000 The following figu re shows the top panel o f your G-1000. Table 3 Front Panel LED Descri ption LED COLOR ST A TUS DESCRIPTION BRI/RPT Green On The wireless card on the G-10 00 is working properly . Off The wireless ca rd on the [...]

  • Page 34

    G-1000 User’s Guide 34 Chapter 2 Hardware Installation an d Initial Setup Figure 4 G-1000 T op Pane l 2.2.1 One 10/100M Ethernet Port Ethernet 10Base-T/100Base-T networks use Shie lded T wisted Pair (STP) cable with RJ-45 connectors that look like a bigger telephone plug with 8 pins. The ETHERNET port is auto- sensing, so you may use the crossove[...]

  • Page 35

    G-1000 User’s Guide Chapter 2 Hardware Installa tion and Initial Setup 35 2.2.4 Antennas The G-1000 is equ ipped with two reverse SMA connectors and tw o detachable omni- directional 2dBi antennas to provide clear radi o signal between the wireless stations and the access points. Refer to the Ante nna Selection and Positioning Recommendations app[...]

  • Page 36

    G-1000 User’s Guide 36 Chapter 3 Introducing the Web Configurator C HAPTER 3 Introducing the W eb Configurator This chapter describes how to access the G-1000 web configurator and provides an overview of its screens. The default IP addres s of the G-1000 is 192.168.1.2. 3.1 Accessing the G-1000 W e b Configurator 1 Make sure your G-1000 hard ware[...]

  • Page 37

    G-1000 User’s Guide Chapter 3 Introducing the Web Configur ator 37 Figure 5 Change Password Screen Y ou should now see the MAIN MENU scre en. 3.2 Resetting the G-1000 If you forget your password or cannot access the web configurator, you will need to reload the factory-default configuration file or use the RESET button on the side panel of the G-[...]

  • Page 38

    G-1000 User’s Guide 38 Chapter 3 Introducing the Web Configurator 5 Release the RESET button and wait for the G-1000 to finish restarting. 3.2.2 Method of Rest oring Factory-Default s Y ou can erase the current configuration and restore factory defaults in three ways: Use the RESET button on the side pane l of the G-1000 to upload the default con[...]

  • Page 39

    G-1000 User’s Guide Chapter 3 Introducing the Web Configur ator 39 Click the links under ADVANCED to configure advanced features such as SYSTEM (General Setup, Password and T ime Zone), WIRELESS (W ire less, MAC Filter , Roaming and 802.1x/WP A), IP , REMOTE MGNT (T elnet, FTP , WWW and SNMP), Internal RADIUS Server ( Settings, T rusted AP and Tr[...]

  • Page 40

    G-1000 User’s Guide 40 Chapter 4 Wizard Setup C HAPTER 4 W izard Setup This chapter provides informa tion on the W izard Setup screens in the web configurator . 4.1 Wizard Setup Overview The web configurat or ’ s setup wiza rd helps you config ure your G-1000 for wireless stations to access your wired LAN. 4.1.1 Channel A channel is the radio f[...]

  • Page 41

    G-1000 User’s Guide Chapter 4 Wizard Setup 41 4.2 Wizard Setup: General Setup General Setup contains administrative and system-related information. The Domain Name entry is what is propagated to th e DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System [...]

  • Page 42

    G-1000 User’s Guide 42 Chapter 4 Wizard Setup Figure 8 Wizard 2: Wireless LAN Setup The following table describes the labels in this screen. Table 6 Wizard 2: Wireless LAN Setup LABEL DESCRIPTION Wireless LAN Setup WLAN Adapt or Selec t Built-in from the drop down list box to configure your G-1000 using the internal WLAN card. Select Removable fr[...]

  • Page 43

    G-1000 User’s Guide Chapter 4 Wizard Setup 43 4.4 Wizard Setup: IP Address The third wizard screen allows you to configure IP address assignme nt. 4.4.1 IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are is olated from the Internet, for instance, only between your two branch of fices, you ca n[...]

  • Page 44

    G-1000 User’s Guide 44 Chapter 4 Wizard Setup If the ISP did not expl icitly give you an IP network n u mber , then most likely you have a sin gle user account and the ISP will assign you a d ynamic IP address when the connection is established. The Internet Assigned Number Au thority (IANA) reserved this block of addresses specifically for priva[...]

  • Page 45

    G-1000 User’s Guide Chapter 4 Wizard Setup 45 4.5 Basic Setup Complete When you cli ck Finish in the Wizard 3 IP Addr ess Assignment screen, a warning window display as shown. Click OK to close the window and log in to the web configurator again using the new IP address if you change the default IP address (192.168.1.2). Y ou have successfully se[...]

  • Page 46

    G-1000 User’s Guide 46 Chapter 5 Syste m Screens C HAPTER 5 System Screens 5.1 System Overview This section provides information on general system setup. 5.2 Configuring General Setup Click the SYSTEM link under ADV ANCED to open the General screen. Figure 1 1 System General Setup The following table describes the labels in this screen. Table 9 S[...]

  • Page 47

    G-1000 User’s Guide Chapter 5 Syst em Screens 47 5.3 Configuring Password T o change your G-1000’ s password (recommended), click the SYSTEM li nk under ADV ANCED and then the Password tab. The screen appears as shown. This screen allows you to change the G-10 00’ s password. If you forget your password (or the G-1000 IP address), you will ne[...]

  • Page 48

    G-1000 User’s Guide 48 Chapter 5 Syste m Screens 5.4 Configuring T ime Setting T o change your G-100 0’ s time and date, click the SYSTEM link under ADV ANCED and then the Time Setting tab. The screen a ppears as shown. Use this screen to configure the G- 1000’ s time based on your local time zo ne. Figure 13 T ime Setting The following table[...]

  • Page 49

    G-1000 User’s Guide Chapter 5 Syst em Screens 49 Current Date (yyyy/ mm/dd) This field displays the date of your G-1000. Each time you rel oad this page, the G-1000 synchronizes the date with the time server . New Date (yyyy/mm/ dd) This field displays the last updated date from the time server . When you select None in the Time Protocol field, e[...]

  • Page 50

    G-1000 User’s Guide 50 Chapter 6 Wireless LAN C HAPTER 6 W ireless LAN This chapter discusses how to configure W ireless LAN. 6.1 Introduction A wireless LAN (WLAN) can be as simple as two computers with WLAN adapters communicating in a peer-to-p eer network or as complex as a number of computers with WLAN adapters communicating through access po[...]

  • Page 51

    G-1000 User’s Guide Chapter 6 Wireless LAN 51 • Use the Local User Database if you have less than 32 wireless client s in your network. The G-1000 uses MD 5 encryption when a c lient authenticates with the Local User Database 6.2.3 Restricted Access The MAC Filter screen allows you to configure the AP to give exclusive access to devices ( Allow[...]

  • Page 52

    G-1000 User’s Guide 52 Chapter 6 Wireless LAN The figure below shows the possible wireless security levels on your G-1000. EAP (Extensible Authentication Protocol) is used for authentication a nd utilizes dynamic W EP key exchange. It requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server either on the W AN or your[...]

  • Page 53

    G-1000 User’s Guide Chapter 6 Wireless LAN 53 Figure 14 Wireless The following table describes the general wireless LAN labels in this screen. Table 13 Wirel ess LABEL DESCRIPTION ESSID The ESSID (Extended Service Set IDentity) i dentifies the Service Set with which a wireless station is associated. Wireless stations associati ng to the access po[...]

  • Page 54

    G-1000 User’s Guide 54 Chapter 6 Wireless LAN Fragmentation Threshold The threshold (number of bytes) for the fragmentation bo undary for directed messages. It is the maximum data fragm e nt size that can be sent. Enter a value between 80 0 and 2432 . WEP Encryption WEP (Wired Equiva lent Privacy) provides data encrypti on to prevent unauthorized[...]

  • Page 55

    G-1000 User’s Guide Chapter 6 Wireless LAN 55 6.4 Configuring Roaming A wireless station is a device with an IEEE 802.1 1b or an IEEE 802. 1 1g compliant wireless interface. An access point (AP) acts as a brid ge between the wireless an d wired networks. An AP creates its own wireless coverage area. A wi reless s tation can associate with a parti[...]

  • Page 56

    G-1000 User’s Guide 56 Chapter 6 Wireless LAN Figure 15 Roaming Example The steps below describe the roaming process. 1 As wireless station Y moves from the coverage are a of access point AP 1 to that of acces s point 2 AP 2 , it scans and uses the si gnal of access point AP 2 . 3 Access point AP 2 acknowledges the presence of wireless station Y [...]

  • Page 57

    G-1000 User’s Guide Chapter 6 Wireless LAN 57 T o enable roamin g on your G-1000, cl ick the WIRELESS link un der ADV ANCED and then the Roaming tab. The sc reen appears as shown. Figure 16 Roaming The following table describes the labels in this screen. 6.5 MAC Filter The MAC filter screen allows you to configure the G-1000 to give exclusive acc[...]

  • Page 58

    G-1000 User’s Guide 58 Chapter 6 Wireless LAN Figure 17 MAC Address Filter The following table describes the labels in this screen. Table 15 MAC Address F ilter LABEL DESCRIPTION Active Select Y es from the drop down list box to enable MAC add ress filtering. Filter Action Define the filter action for the list of MAC addresses in the MAC address [...]

  • Page 59

    G-1000 User’s Guide Chapter 6 Wireless LAN 59 6.6 Introduction to WP A W i-Fi Protected Access (WP A and WP A2) applies IEEE 801.2x and Extensible Authentication Protocol (EAP) to authenticate wireless clients using and external RADIUS database. WP A has better user authentication and i m proved data encryption than WEP , and WP A2 provides even [...]

  • Page 60

    G-1000 User’s Guide 60 Chapter 6 Wireless LAN Figure 18 WP A(2) - PSK Authentication 6.6.2 WP A(2) with RA DI US Application Example Y ou need the IP address, port number (default is 1812) and share d secret of a RADIUS server . A WP A(2) applic ation example with an external RADIUS server looks as follows. "A" is the RADIUS server . &q[...]

  • Page 61

    G-1000 User’s Guide Chapter 6 Wireless LAN 61 Figure 19 WP A with RADIU S Application Example2 6.6.3 Wireless Client WP A Supplicant s A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WP A. At the time of writing, the mo st widely availa ble supplicants are the WP A patch for[...]

  • Page 62

    G-1000 User’s Guide 62 Chapter 6 Wireless LAN Figure 20 Wireless LAN: 802.1x/WP A The following table describes the labels in this screen. 6.7.1 Authentication Required: 802.1x Y ou need the following for IEEE 802.1x authentication. • A computer with an IEEE 802.1 1 b/g wire less LAN adapter and equipped with a web browser (with JavaScript enab[...]

  • Page 63

    G-1000 User’s Guide Chapter 6 Wireless LAN 63 Figure 21 Wireless LAN: 802.1x/WP A for 802.1x Protocol The following table describes the labels in this screen. Table 17 Wireless LAN: 802.1x/WPA for 802.1x Protocol LABEL DESCRIPTION Wireless Port Control T o control wireless stations access to the wired network, select a co ntrol method from the dr[...]

  • Page 64

    G-1000 User’s Guide 64 Chapter 6 Wireless LAN Note: Once you enable user auth entication, y ou need to specify an external RADIUS server or create local user account s on the G-1000 for authentication. 6.7.2 Authentication Required: WP A Select Authentication Required in the Wir eless Port Control field and WP A in the Key Management Protocol fie[...]

  • Page 65

    G-1000 User’s Guide Chapter 6 Wireless LAN 65 Figure 22 Wireless LAN: 802.1x /WP A for WP A Protocol The following table describes the labels not previously discussed Please see T able 17 for information on the additiona l fields shown in this screen. 6.7.3 Authentication Required: WP A-PSK Select Authentication Required in t he Wireless Port Con[...]

  • Page 66

    G-1000 User’s Guide 66 Chapter 6 Wireless LAN Figure 23 Wireless LAN: 802.1x/WP A for W P A-PSK Protocol The following table describes the labels not previously discussed 6.7.4 Authentication Required: WP A2 Select Authentication Required in the W ireless Port Contr ol field and WP A2 in the Key Management Protocol field to display the next scree[...]

  • Page 67

    G-1000 User’s Guide Chapter 6 Wireless LAN 67 Figure 24 Wireless LAN: 802.1x/W P A for WP A2 Protocol The following table describes the labels not previously discussed Please see T able 17 for information on the additiona l fields shown in this screen. 6.7.5 Authentication Required: WP A2-PSK Select Authentication Required in the Wir eless Port C[...]

  • Page 68

    G-1000 User’s Guide 68 Chapter 6 Wireless LAN Figure 25 Wireless LAN: 802.1x/W P A for WP A2-PSK Protocol The following table describes the labels not previously discussed 6.8 Configuring RADIUS A RADIUS (Remote Authentication Dial In user Service) server enables user authentication, authorization and accounting. Use RADIUS if you want to authent[...]

  • Page 69

    G-1000 User’s Guide Chapter 6 Wireless LAN 69 T o access this screen, click the WIRELESS link under ADV ANCED and then the RADIUS tab. The screen appears as shown. Figure 26 RADIUS Screen The following table describes the labels in this screen. Table 22 RADIUS Screen LABEL DESCRIPTION Authentication Server Active Select whether or not the externa[...]

  • Page 70

    G-1000 User’s Guide 70 Chapter 7 IP Screen C HAPTER 7 IP Screen This chapter discusses how to configure IP on the G-1000 7.1 TCP/IP Parameters 7.1.1 IP Address and Subnet Mask See the IP Address and Subnet Mask section in the W izard Setup chapter for this information. The Ethernet parameters of the G-1000 are pr eset in the factory with the foll[...]

  • Page 71

    G-1000 User’s Guide Chapter 7 IP Screen 71 7.2 Configuring IP Click ADV ANCED and then IP to display the screen shown next. Figure 27 IP Setup The following table describes the labels in this screen. Table 24 IP Setup LABEL DESCRIPTION IP Address Assi gnment Get automatically from DHCP Select this option if your G-1000 is using a dynamically assi[...]

  • Page 72

    G-1000 User’s Guide 72 Chapter 8 Remote Mana gement Screens C HAPTER 8 Remote Management Screens This chapter provides information on the Remote Management screens. 8.1 Remote Management Overview Remote management allows you to determ ine which services/protocols can access which G- 1000 interface (if any) from which computers. Y ou may manage yo[...]

  • Page 73

    G-1000 User’s Guide Chapter 8 Remote Management Screens 73 8.1.2 Remote Mana gement and NA T When NA T is enabled: • Use the G-1000’ s WLAN IP addres s when configuring fro m the WLAN. • Use the G-1000’ s LAN IP address when configuring from the LAN. 8.1.3 System T imeout There is a default system management idle tim eout of five minutes [...]

  • Page 74

    G-1000 User’s Guide 74 Chapter 8 Remote Mana gement Screens 8.3 Configuring T elnet Y ou can configure your G-1000 for remote T e lnet access as shown next. The administrator uses T elnet from a computer on a re mote network to access the G- 1000. Figure 29 T elnet Configuration on a TCP/IP Network 8.4 Configuring TELNET Click REMOTE MGMT and the[...]

  • Page 75

    G-1000 User’s Guide Chapter 8 Remote Management Screens 75 Figure 30 Remote Management: T e lnet The following table describes the labels in this screen. 8.5 Configuring FTP Y ou can upload and download the G-1000 ’ s firmware and configuration files using FTP , please see the chapter on firmware and configuration file maintena nce for details.[...]

  • Page 76

    G-1000 User’s Guide 76 Chapter 8 Remote Mana gement Screens Figure 31 Remote Management: FTP The following table describes the labels in this screen. 8.6 SNMP Simple Network Management Protocol (SNM P) i s a protocol u sed for exchanging management information b etween network devices. SNMP is a member of the TCP/IP protocol suite. Y our G-1000 s[...]

  • Page 77

    G-1000 User’s Guide Chapter 8 Remote Management Screens 77 Figure 32 SNMP Management Model An SNMP managed network consis ts of two main types of comp onent: agen ts and a manager . An agent is a management softwa re module that resides in a managed device (the G-1000). An agent translates the local ma nagemen t information from the mana ged devi[...]

  • Page 78

    G-1000 User’s Guide 78 Chapter 8 Remote Mana gement Screens 8.6.1 Supported MIBs The G-1000 supports MIB II that is defined in RFC-1213 and RFC-1215 as well as the proprietary ZyXEL private MIB. The focus of the MIBs is to let administrators collect statistical data and monito r status and performance. 8.6.2 SNMP T rap s The G-1000 can send the f[...]

  • Page 79

    G-1000 User’s Guide Chapter 8 Remote Management Screens 79 8.6.3 SNMP Interface Index Some traps include an SNMP in terface index. The following ta ble maps the SNMP interface indexes to the G-1000’ s physical ports. 8.6.4 Configuring SNMP T o change your G-1000’ s SNMP settings, click REMOTE MGMT , then the SNMP tab. The screen appears as sh[...]

  • Page 80

    G-1000 User’s Guide 80 Chapter 8 Remote Mana gement Screens Set Community Enter the Set community , which is the password for incoming Set requests from the management station. The default is public and allo ws all requests. Tr a p Community T ype the trap community , which is the password sent with each trap to the SNMP manager . The de fault is[...]

  • Page 81

    G-1000 User’s Guide Chapter 8 Remote Management Screens 81[...]

  • Page 82

    G-1000 User’s Guide 82 Chapter 9 Log Screens C HAPTER 9 Log Screens This chapter contains informa tion about configuring general log settings and viewing the G- 1000’ s logs. Refer to the appendix for exam ple log mess age explanations. 9.1 Configuring V iew Log The web confi gurator allows you to look at all of the G-1000’ s logs in one loca[...]

  • Page 83

    G-1000 User’s Guide Chapter 9 Log Scree ns 83 Figure 34 View Log The following table describes the labels in this screen. 9.2 Configuring Log Settings T o change your G-1000’ s log settings, click the LOGS links under ADV ANCED and then the Log Settings tab. The screen appears as shown. Use the Log Settings screen to configure to where the G-10[...]

  • Page 84

    G-1000 User’s Guide 84 Chapter 9 Log Screens An alert is a type of log that warrants more serious attention. Some categories such as System Errors consist of both logs and alerts. Y ou may differentiate them by thei r color in the Vie w Log screen. Alerts are displayed in re d and logs a re displayed in black. Figure 35 Log Settings The following[...]

  • Page 85

    G-1000 User’s Guide Chapter 9 Log Scree ns 85 User NAME This fiel d is effectiv e if SMTP Authentication is checked. Enter the user name of the account on the SMT P server . Password This field is effective if SMTP Authentication is checked . Enter th e password of the account on the SMT P server . Syslog Logging Syslog logging sends a log to an [...]

  • Page 86

    G-1000 User’s Guide 86 Chapter 10 Maintenance C HAPTER 10 Maintenance This chapter displays system in formation such as firmware, port IP addresses and port traffic statistics. 10.1 Maintenance Overview The maintenanc e screens can help you view system inform a tion, upload new firmware, manage configuratio n and restart your G-1 000. 10.2 System[...]

  • Page 87

    G-1000 User’s Guide Chapter 10 Maintenance 87 10.2.1 System St atistics Read-only information here incl udes port status, packet specific statistics and bridge link status. Also provided are "system up time" and "poll int erval(s)". The Poll Interval field is configurable. Figure 37 System St atus: Show S tatistics The followi[...]

  • Page 88

    G-1000 User’s Guide 88 Chapter 10 Maintenance Figure 38 Association List The following table describes the labels in this screen. 10.4 F/W Upload Screen Find firmware at www .zyxel.com in a file that (usually) uses the system model name with a "*.bin" extension, e.g., "G-1 000.bin". The upload process us es HTTP (Hypertext T r[...]

  • Page 89

    G-1000 User’s Guide Chapter 10 Maintenance 89 Figure 39 Firmware Upload The following table describes the labels in this screen. After you see the Firmware Upload in Pr ocess screen, wait two minutes before logging into the G-1000 again. Figure 40 Firmware Upload In Proces s The G-1000 automatically restar ts in this time causing a temporary netw[...]

  • Page 90

    G-1000 User’s Guide 90 Chapter 10 Maintenance Figure 41 Network T emporarily Disconnected After two minutes, log in again an d check your new firmware version in the System S tatus screen. If the upload was not successful, the following screen will appear . Click Return to go back to the F/W Upload screen. Figure 42 Firmware Upload Error 10.5 Con[...]

  • Page 91

    G-1000 User’s Guide Chapter 10 Maintenance 91 Figure 43 Configuration 10.5.1 Backup Configuration Backup configuration allo ws you to back up (save) the G-1000 ’ s current configuration to a file on your computer . Once yo ur G-1000 is configured and func tioning properly , it is highly recommended tha t you back up your config uration file bef[...]

  • Page 92

    G-1000 User’s Guide 92 Chapter 10 Maintenance After you see a “restore configuration successf ul” scree n, you must then wait one minute before logging into the G-1000 again. Figure 44 Configuration Upload Successful The G-1000 automatically restar ts in this time causing a temporary network disconnect. In some operating systems, you may see [...]

  • Page 93

    G-1000 User’s Guide Chapter 10 Maintenance 93 Figure 46 Configuration Upload Error 10.5.3 Back to Factory Default s Pressing the Reset button in this section clears al l user-e ntered configuration information and returns the G-1000 to its factory defaults as shown on the screen. The following warning screen will appear . Figure 47 Reset W arning[...]

  • Page 94

    G-1000 User’s Guide 94 Chapter 11 Intro ducing the SMT C HAPTER 11 Introducing the SMT This chapter describes h ow to access the SMT and provides an over view of its menus . 1 1.1 Connect to your G-1000 Using T elnet The following procedure details ho w to tel n et into your G-1000. 1 In W indows , click St a r t (usually in the bottom left corne[...]

  • Page 95

    G-1000 User’s Guide Chapter 11 Intro ducing the SMT 95 Figure 50 Menu 23.1 System Security: Change Pass word 4 T ype your new system password in the New Password field (up to 30 characters), and press [ENTER] . 5 Re-type your new system password in the Retype to confirm field for confirmation and press [ENTER] . Note that as you type a password, [...]

  • Page 96

    G-1000 User’s Guide 96 Chapter 11 Intro ducing the SMT 1 1.4 Navigating the SMT Interface The SMT (System Manage ment T erminal) is the interface that you use to co nfigure your G- 1000. Several operations th at you should be fa miliar with before you attempt to modify the configuration are listed in the table below . 24 System Maintenance 24.1 S[...]

  • Page 97

    G-1000 User’s Guide Chapter 11 Intro ducing the SMT 97 After you enter the password, the SMT di splays the main menu, as shown next. Figure 51 G-1000 SMT Main Menu This menu is summarized below . N/A fields <N/A> Some of the fields in the SMT will show a <N/A>. This symbol refers to an option that is Not Applicable. Save your configur[...]

  • Page 98

    G-1000 User’s Guide 98 Chapter 12 General Setup C HAPTER 12 General Setup The chapter shows you th e information on gene ral setup. Menu 1 – General Setup contains administrative and system-related information (shown next). The System Name field is for identification purposes. It is recommended you type your computer's "Computer name&[...]

  • Page 99

    G-1000 User’s Guide Chapter 12 General Setup 99 IP Address Enter the IP addresses of the DNS server s. This field is available when you select User-Defined in the field above. When you have completed this menu, press [ ENTER ] at the prompt “Press ENTER to Confirm…” to save your configuration, or press [ ESC ] at any time to cancel. Table 4[...]

  • Page 100

    G-1000 User’s Guide 100 Chapter 13 LAN Setup C HAPTER 13 LAN Setup This chapter shows you h ow to configure the LAN on yo ur G-1000. 13.1 LAN Setup This section describes how to configure the Ethernet using Menu 3 – LAN Setup . Fr om the main menu, enter 3 to display menu 3. Figure 53 Menu 3 LAN Setup Detailed explanation about the LAN Setup me[...]

  • Page 101

    G-1000 User’s Guide Chapter 13 LAN Setup 101 Figure 54 Menu 3.2 TCP/IP Setup Follow the instructions in the following table on how to configure the fields in this menu. 13.3 Wireless LAN Setup Use menu 3.5 to set up your G-1000 as the wireless access point. T o edit menu 3.5, enter 3 from the main menu to display Menu 3 – LAN Setup . When menu [...]

  • Page 102

    G-1000 User’s Guide 102 Chapter 13 LAN Setup Figure 55 Menu 3.5 Wireless LAN Setup Note: In the SMT , the ESSID is referred to as SSID. Both of them refer to the same ID for the G-1000. The following table describes the fields in this menu. Me nu 3.5 - Wireless LAN Setup Name (SSID)= ZyXEL Hide Name (SSID)= No Edit MAC Address Filter= No Channel [...]

  • Page 103

    G-1000 User’s Guide Chapter 13 LAN Setup 103 13.3.1 Configurin g MAC Address Filter Y our G-1000 checks the MAC address of the wire less station device against a list of allowed or denied MAC addresses. However, intruders could fake allowed MAC addresses so MAC- based authentication is less secu re than EAP authentication. Follow the steps below [...]

  • Page 104

    G-1000 User’s Guide 104 Chapter 13 LAN Setup 1 From the main menu, enter 3 to open Menu 3 – LAN Setup . 2 Enter 5 to display Menu 3.5 – Wir eles s LAN Setup . Figure 56 Menu 3.5 Wireless LAN Set u p 3 In the Edit MAC Addr ess Filter field, press [SP ACE BAR] to select Y es and press [ENTER]. Menu 3.5.1 – WLAN MAC Address Filter displays as [...]

  • Page 105

    G-1000 User’s Guide Chapter 13 LAN Setup 105 The following table describes the fields in this menu. 13.3.2 Configuring Roaming Enable the roaming feature if you have two or more G-1000s on the same subnet. Follow the steps below to allow ro aming on your G-1000. 1 From the main menu, enter 3 to display Menu 3 – LAN Setup . 2 Enter 5 to display [...]

  • Page 106

    G-1000 User’s Guide 106 Chapter 13 LAN Setup Figure 59 WLAN Roaming Configuration The following table describes the fields in this menu. Menu 3.5.2 - R oaming Configuration Active= Yes Port #= 3517 Table 45 Menu 3.5.4 Bridge Link Configur ation FIELD DESCRIPTION Active Press [SP ACE BAR] and th en [ENTER] to select Y es to enable roaming on the G[...]

  • Page 107

    G-1000 User’s Guide Chapter 13 LAN Setup 107[...]

  • Page 108

    G-1000 User’s Guide 108 Chapter 1 4 Dial-in Use r Setup C HAPTER 14 Dial-in User Setup This chapter shows you how to cr eate user accounts on the G-1000. By storing user profiles locally , your G-1000 is able to authenti cate wireless users without interacting with a network RADIUS server . Follow the steps below to set up us er profiles on your [...]

  • Page 109

    G-1000 User’s Guide Chapter 14 Dial-in User Setup 109 Figure 61 Menu 14.1- Edit Dial-in User The following table describes th e fields in this screen. Menu 14.1 - Edit Dial-in User User Name= test Active= Yes Password= ******** Press ENTER to Confirm or ESC to Can cel: Leave name field blank to delete pro file Table 46 Menu 14.1- Edit Dial-in Use[...]

  • Page 110

    G-1000 User’s Guide 110 Chapter 15 SNMP Configuration C HAPTER 15 SNMP Configuration This chapter shows you how to use SM T to configure SNMP on the G-1000. T o configure SNMP , select option 22 from the main menu to open Menu 22 – SNMP Configuration as shown next. The “community” for Get, Set and T rap fields is SNMP terminology for passwo[...]

  • Page 111

    G-1000 User’s Guide Chapter 15 SNMP Configuration 111[...]

  • Page 112

    G-1000 User’s Guide 112 Chapter 16 Syst em Security C HAPTER 16 System Security This chapter describes how to configure the system password, an external RADIUS server and 802.1x in SMT . 16.1 System Password Figure 63 Menu 23 System Security Y ou should change the default password. If y ou forg et your password you have to restore the default con[...]

  • Page 113

    G-1000 User’s Guide Chapter 16 System Security 113 Figure 65 Menu 23.2 System Security: RADIUS S erver The following table describes the fields in this menu. Menu 23.2 - Syste m Security - RADIUS Server Authentication S erver: Active= Yes Server Address = 192.168.1.1 Port #= 1812 Shared Secret= ******** Accounting Serve r: Active= Yes Server Addr[...]

  • Page 114

    G-1000 User’s Guide 114 Chapter 16 Syst em Security 16.3 802.1x The IEEE 802.1x standards outline enhanced security methods for both the authentication of wireless stations and en cryption key managemen t. Follow the steps below to enable EA P authentication on your G-1000. 1 From the main menu, enter 23 to display Menu23 – System Security . Fi[...]

  • Page 115

    G-1000 User’s Guide Chapter 16 System Security 115 Figure 67 Menu 23.4 System Security: IEEE802.1x The following table describes the fields in this menu. Menu 23.4 - Syst em Security - IEEE802.1x Wireless Port Control= Authent ication Required ReAuthentication Timer (in sec ond)= 41 Idle Timeout (in second)= 3641 Key Management Protocol= 802.1 x [...]

  • Page 116

    G-1000 User’s Guide 116 Chapter 16 Syst em Security Once you enable user authenticatio n, you need to specify an exte rnal RADIUS server or create local user accounts on th e G-1000 for authentication Dynamic WEP Key Exchange This field is activated only when you sele ct Authentication Required in the Wireless Port Control field. Also set the Aut[...]

  • Page 117

    G-1000 User’s Guide Chapter 16 System Security 117[...]

  • Page 118

    G-1000 User’s Guide 118 Chapter 17 System Information and Diagnosis C HAPTER 17 System Information and Diagnosis This chapter covers the information and diag nostic tools in SMT menus 24.1 to 24.4. These tools include updates on system status , port status, log and trace capabiliti es and upgrades for the system software. This chapte r describes [...]

  • Page 119

    G-1000 User’s Guide Chapter 17 System Inform ation and Diagnosis 119 Figure 69 Menu 24.1 System Mainten ance: St atus The following table describes the fields present in this menu. 17.2 System Information T o get to the System Information: 1 Enter 24 to display Menu 24 – System Maintenance . Menu 24.1 - Sys tem Maintenance - Status 04:35:01 Sat[...]

  • Page 120

    G-1000 User’s Guide 120 Chapter 17 System Information and Diagnosis 2 Enter 2 to display Menu 24.2 – System Information and Con sole Port Speed . 3 From this menu you have two choices as shown in th e next figure: Figure 70 Menu 24.2 System Information and Cons ole Port Speed Note: The console port is intern al and reserved for technician use o[...]

  • Page 121

    G-1000 User’s Guide Chapter 17 System Inform ation and Diagnosis 121 17.2.2 Console Port Speed Note: The console port is intern al and reserved for technician use only . Y ou can set up different port speeds for the console port through Menu 24.2.2 – System Maintenance – Console Port Speed . Y our G-1000 supports 9600 (default), 1 9200, 38400[...]

  • Page 122

    G-1000 User’s Guide 122 Chapter 17 System Information and Diagnosis Figure 73 Menu 24.4 System Mainten ance: Diagnostic Follow the procedure next to get to display this menu: 1 From the main menu, type 24 to open Menu 24 – System Maintenance . 2 From this menu , type 4. Diagnostic to open Menu 24.4 – System Maintenance – Diagnostic . The fo[...]

  • Page 123

    G-1000 User’s Guide Chapter 17 System Inform ation and Diagnosis 123[...]

  • Page 124

    G-1000 User’s Guide 124 Chapter 18 Firm ware and Configur ation File Maintenance C HAPTER 18 Firmware and Configuration File Maintenance This chapter tells y ou how to backup and restor e your configuration file as well as upload new firmware and configuratio n files using the SMT screens. 18.1 Filename Conventions The configuration file (often c[...]

  • Page 125

    G-1000 User’s Guide Chapter 18 Firmware and Confi guration File Maintenance 125 The following table is a summary . Please note that the internal filename refe rs to the filename on the G-1000 and the external file name refers to the filename not on th e G-1000, that is, on your computer , local network or FTP site and so the name (but not the ext[...]

  • Page 126

    G-1000 User’s Guide 126 Chapter 18 Firm ware and Configur ation File Maintenance Figure 74 Menu 24.5 Backup Configurat ion 18.2.2 Using the FTP command from the DOS Prompt 1 Launch the FTP client on your computer . 2 Enter “open” and the IP add ress of your G-1000. 3 Press [ENTER] when prompted for a username. 4 Enter “root” and your SMT [...]

  • Page 127

    G-1000 User’s Guide Chapter 18 Firmware and Confi guration File Maintenance 127 Figure 75 FTP Session Example The following table describes some of the co mmands that you may see in third party FTP clients. 18.2.3 Backup Configuration Using TFTP The G-1000 supports the up/down loading of th e firmware and the configuration file using TFTP (T rivi[...]

  • Page 128

    G-1000 User’s Guide 128 Chapter 18 Firm ware and Configur ation File Maintenance 3 Enter command “sys stdio 0” to disable th e SMT timeout, so the TF TP transfer will not be interrupted. Enter comman d “sys stdio 5” to restore the five-minute SMT timeout (default) when the file transfer is complete. 4 Launch the TFTP client on your comput[...]

  • Page 129

    G-1000 User’s Guide Chapter 18 Firmware and Confi guration File Maintenance 129 1 Display menu 24.5 and enter “y” at the following screen. Figure 76 System Maintenance: Backup Conf iguration 2 The following screen indicates that the Xmodem download has started. Figure 77 System Maintenance: S tarting Xmodem Down load Screen 3 Run the HyperT e[...]

  • Page 130

    G-1000 User’s Guide 130 Chapter 19 System Maintenance and Infor mation C HAPTER 19 System Maintenance and Information This chapter leads you through SM T menus 24.8 and 24.10. 19.1 Command Interpreter Mode The Command Interpreter (CI) is a part of the ma in system firmware. The CI provides much of the same functionality as the SMT , while a dding[...]

  • Page 131

    G-1000 User’s Guide Chapter 19 System Mainten ance and Information 131 Figure 80 Menu 24 System Mainten ance Figure 81 V alid CI Commands 19.2 T ime and Date Setting The G-1000 keeps track of the time and date. Th ere is also a software me chanism to s et the time manually or get the current time and date fro m an external server when you turn on[...]

  • Page 132

    G-1000 User’s Guide 132 Chapter 19 System Maintenance and Infor mation Figure 82 Menu 24.10 System M a intenance: Time and Date Setting The following table describes the fields in this menu. The G-1000 resets the tim e in three instances: 1 On leaving menu 24.10 after making changes. Menu 24.10 - System Mai ntenance - Time and Date Setting Time P[...]

  • Page 133

    G-1000 User’s Guide Chapter 19 System Mainten ance and Information 133 2 When the G-1000 starts up, if there is a timeserver configured in menu 24.10. 3 24-hour intervals after starting. 19.3 Remote Management Setup 19.3.1 T elnet Y ou can configure your G-1000 for remote T elnet ac cess as shown next. Figure 83 T elnet Configuration on a TCP/IP [...]

  • Page 134

    G-1000 User’s Guide 134 Chapter 19 System Maintenance and Infor mation Enter 1 1, from menu 24, to display Menu 24.1 1 - Remote Management Contr ol (shown next) Figure 84 Menu 24.1 1 Remote Management Contr ol The following table describes the fields in this menu. 19.3.5 Remote Management Limit ations Remote management over LAN or W AN will not w[...]

  • Page 135

    G-1000 User’s Guide Chapter 19 System Mainten ance and Information 135 1 A filter in menu 3.1 (LAN) or in menu 1 1.5 (W AN) is applied to block a T elnet, FTP or W eb service. 2 Y ou have disabled that service in menu 24.1 1. 3 The IP address in the Secured Client IP field (menu 24.1 1) do es not match the clien t IP address. If it does not match[...]

  • Page 136

    G-1000 User’s Guide 136 Troubleshooting Appendix A T roubleshooting This appendix covers poten tial problems and possible re medies. After each problem description, some instructions ar e provided to help you to diag nose and to solve the problem. Problems St arting Up the G-1000 Problems with the Ethernet Interface Table 59 Troubleshootin g the [...]

  • Page 137

    G-1000 User’s Guide Troubleshooting 137 Problems with the Password Problems with T elnet Problems with the WLAN Interface Table 61 Troubleshootin g the Password PROBLEM CORRECTIVE ACTION I cannot access the G-1000. The Password and Username fields are case-sensitive. Make sure that you enter the correct password and username using the proper casi[...]

  • Page 138

    G-1000 User’s Guide 138 Specifications Appendix B S pecifications Hardware Firmware Table 64 Hardwa re Power S pecification DC 12V 1200mA Operation T emperature 5º C ~ 50º C S torage T emperature -20º C ~ 55º C Operation Humidity 10% to 90% (Non-condensing) S torage Humidity 5% to 95% (Non -condensing) Table 65 Firmware S tandards IEEE 802.3 [...]

  • Page 139

    G-1000 User’s Guide Specifications 139 Diagnostics Capabilities The access point can perfo rm self-diagnostic tests. These tests check the integrit y of the following circuits: FLASH memory . DRAM. Dual Ethernet port. Wireless port. Syslog. Errorlog. T race log . Packet Log. Management Embedded Web Configurator management. Command-line interface.[...]

  • Page 140

    G-1000 User’s Guide 140 Brute-Forc e Password G uessing Pr otection Appendix C Brute-Force Password Guessing Protection The following describes the c ommands for enablin g, disabling and configuring the brute-force password guessing protection m echanism for the password. See Appendix H ” for information on the command structure. Example sys pw[...]

  • Page 141

    G-1000 User’s Guide Brute-For ce Password Gu essing Protec tion 141[...]

  • Page 142

    G-1000 User’s Guide 142 Setting up Yo ur Comput er’s IP Addr ess Appendix D Setting up Y our Computer ’ s IP Address All computers must have a 10M or 100M Et hernet adapter card and TCP/IP installed. W indows 95/98/Me/NT/2000/XP , Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you nee[...]

  • Page 143

    G-1000 User’s Guide Setting up Your Compute r’s IP Address 143 Figure 85 WIndows 95/98/Me: Network: Co nfiguration Inst alling Component s The Network window Configuration tab displays a list of installed components. Y ou need a network adapter , the TCP/IP protocol and Client for Microso ft Networks. If you need the adapter: 1 In the Network w[...]

  • Page 144

    G-1000 User’s Guide 144 Setting up Yo ur Comput er’s IP Addr ess 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK . 5 Restart your computer so the changes you made take ef fect. Configuring 1 In the Network window Configuration tab, select your network a[...]

  • Page 145

    G-1000 User’s Guide Setting up Your Compute r’s IP Address 145 Figure 87 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’ s IP address, remove previously installed gateways. • If you have a gateway IP address, type it in the New gateway field and click Add . 5 Click OK to s[...]

  • Page 146

    G-1000 User’s Guide 146 Setting up Yo ur Comput er’s IP Addr ess Figure 88 Windows XP : S tart Menu 2 For W indows XP , click Network Connections . For W indows 2000/NT , click Network and Dial-up Connections . Figure 89 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Pr operties .[...]

  • Page 147

    G-1000 User’s Guide Setting up Your Compute r’s IP Address 147 Figure 90 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the Genera l tab in W in XP) and click Properties . Figure 91 Windows XP: Loca l Area Connection Prop erties 5 The Internet Pr otocol TCP/IP Properties window opens (the G[...]

  • Page 148

    G-1000 User’s Guide 148 Setting up Yo ur Comput er’s IP Addr ess • If you have a static IP address click Use the following IP Address and fill in the IP addr ess , Subnet mask , and Default gateway fields. Click Advanced . Figure 92 Windows XP : Advanced TCP/ IP Settings 6 If you do not know your gateway's IP address , remove any previou[...]

  • Page 149

    G-1000 User’s Guide Setting up Your Compute r’s IP Address 149 • Click Obtain DNS server address automatically if you do not know your DNS server IP addre ss(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses , and type them in the Preferr ed DNS server and Alternate DNS server fields. If you hav[...]

  • Page 150

    G-1000 User’s Guide 150 Setting up Yo ur Comput er’s IP Addr ess Figure 94 Macintosh OS 8/9: Apple Menu 2 Select Ethernet built-in from the Connect via list. Figure 95 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configur e: list.[...]

  • Page 151

    G-1000 User’s Guide Setting up Your Compute r’s IP Address 151 4 For statically assigned settings, do the following: •F r o m t h e Configure box, select Manually . • T ype your IP address in the IP Address box. • T ype your subnet mask in the Subnet mask box. • T ype the IP address of your G-1000 in the Router address box. 5 Close the [...]

  • Page 152

    G-1000 User’s Guide 152 Setting up Yo ur Comput er’s IP Addr ess Figure 97 Macintosh OS X: Network 4 For statically assigned settings, do the following: •F r o m t h e Configure box, select Manually . • T ype your IP address in the IP Address box. • T ype your subnet mask in the Subnet mask box. • T ype the IP address of your G-1000 in [...]

  • Page 153

    G-1000 User’s Guide Setting up Your Compute r’s IP Address 153[...]

  • Page 154

    G-1000 User’s Guide 154 IP Address Assignment Conflicts Appendix E IP Address Assignment Conflict s This appendix describes situations where IP address conflicts may occur . Subscribers with duplicate IP addresses will not be able to access the Internet. Case A: The G-1000 is using the same LAN and W AN IP addresses The following figure shows an [...]

  • Page 155

    G-1000 User’s Guide IP Address As signment Conflicts 155 Figure 99 IP Address Conflicts: Case B T o solve this prob lem, make sure the G-1000 LAN IP address is not in the DHCP IP address pool. Case C: The Subscriber IP address is the same as the IP address of a network device The following figure depicts an example where the subscriber IP address[...]

  • Page 156

    G-1000 User’s Guide 156 IP Address Assignment Conflicts In this case, the subscribers are not able to access the Internet. Figure 101 IP Address Conflicts: Case D This problem can be solved by adding a VLAN- enabled switch or set the computers to obtain IP addresses dynamically .[...]

  • Page 157

    G-1000 User’s Guide IP Address As signment Conflicts 157[...]

  • Page 158

    G-1000 User’s Guide 158 Wireless LANs Appendix F Wireless LANs Wireless LAN T opologies This section discusses ad-hoc and in frastructure w ireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an inde pe ndent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or m[...]

  • Page 159

    G-1000 User’s Guide Wireless LANs 159 Figure 103 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlappi ng BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is[...]

  • Page 160

    G-1000 User’s Guide 160 Wireless LANs Figure 104 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.1 1a/b/g wireless devices. Channels available depend on your ge ographical area. Y ou may have a choice o f channels (for your region) so you should use a dif ferent channel th an an adjacent AP (access point) to red[...]

  • Page 161

    G-1000 User’s Guide Wireless LANs 161 Figure 105 RTS /C T S When station A sends data to the AP , it might no t know that the station B is already using the channel. If these two stations se nd data at the same time, collis ions may occur when both sets of data arrive at the AP at the same time, r esulting in a loss of me ssages for both stations[...]

  • Page 162

    G-1000 User’s Guide 162 Wireless LANs A large Fragmentation Thr eshold is recommended for networks not prone to interference while you should set a smaller thresh old for busy networks or ne tworks that are prone to interference. If the Fragmentation Threshold value is smaller than the RT S / C T S value (see previously) you set then the R TS (Re[...]

  • Page 163

    G-1000 User’s Guide Wireless LANs 163 IEEE 802.1x In June 2001, the IEEE 802.1x st andard was designed to extend th e features of IEEE 802.1 1 to support extended authentication as well as providing additional accounting and control features. It is supported by W indows XP and a number of network devices. So me advantages of IEEE 802.1x are: • [...]

  • Page 164

    G-1000 User’s Guide 164 Wireless LANs • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access. The access point sends a proper response from the user and then sends another Access- Request message. The following types of RADIUS messages are exchanged between the acces s point and the RADIUS server for use[...]

  • Page 165

    G-1000 User’s Guide Wireless LANs 165 EAP-TLS (T ransport Layer Security) W ith EAP-TLS, digital certifications are needed by both the server and the wireless stations for mutual authentication. The server presents a certificate to the client. After validating the identity of the server , the client sends a differ ent certificate to the se rver .[...]

  • Page 166

    G-1000 User’s Guide 166 Wireless LANs For added security , certificate-based authen tications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption. They are ofte n deployed in corporate environments, but for public deployment, a simp le user name and p assword pair is more practical. The following table is a comparison of the feature[...]

  • Page 167

    G-1000 User’s Guide Wireless LANs 167 The Message Integrity Check (MIC ) is designed to prevent an attacker from capturing data packets, altering them and resending them. The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC. If they do not match, it is assumed that the dat[...]

  • Page 168

    G-1000 User’s Guide 168 Wireless LANs Shared WEP No Enable with Dynamic WEP Key Y es Enable without Dynamic W EP Key Y es Disable WP A TKIP No Enable WP A-PSK TKIP Y es Enable WP A2 AES No Enable WP A2-PSK AES Y es Enable Table 69 Wireless Security Relational Matrix (continued) AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTE[...]

  • Page 169

    G-1000 User’s Guide Wireless LANs 169[...]

  • Page 170

    G-1000 User’s Guide 170 IP Subnetting Appendix G IP Subnetting IP Addressing Routers “route” based on the network number . The router that delivers the data packet to the correct destination host uses the host ID. IP Classes An IP address is made up of four octets (ei ght bits), wri tten in dotted decimal notation, for example, 192.168.1.1. I[...]

  • Page 171

    G-1000 User’s Guide IP Subnetting 171 Since the first octet of a class “A” IP address must contain a “0”, the first octet of a class “A” address can have a valu e of 0 to 127. Similarly the first octet of a class “B” must begi n with “10”, therefore the first octet of a class “B” address has a valid range of 128 to 191. Th[...]

  • Page 172

    G-1000 User’s Guide 172 IP Subnetting Since the mask is always a continuous number of ones begin ning from the left, fo llowed by a continuous number of zeros for the remainder of the 32 bit mask, you can si mply specify the number of ones instead of writing the value of each octet. This is usually specified by writing a “/” followed by the n[...]

  • Page 173

    G-1000 User’s Guide IP Subnetting 173 Divide the network 192.168.1. 0 into two separate subnets by converting one of th e host ID bits of the IP address to a network number bit. The “ borrowed” host ID bit can be either “0” or “1” thus giving two subnets; 19 2.168.1.0 with mask 255 .255.255.128 and 192.168.1.128 with mask 255.255.255.[...]

  • Page 174

    G-1000 User’s Guide 174 IP Subnetting Example: Four Subnet s The above exampl e illustrated using a 25-bit subne t mask to divide a class “C” address space into two subnets. Similarly to divide a class “C” address into four subnets, you need to “borrow” two host ID bits to give four possible combinations of 00 , 01, 10 and 1 1. The su[...]

  • Page 175

    G-1000 User’s Guide IP Subnetting 175 Example Eight Subnet s Similarly use a 27-bit mask to create 8 subnets (001 , 010, 01 1, 100, 101, 1 10). The following table shows class C IP ad dress last octet values for each subnet. The following table is a summary for class “C” subnet planning. Table 80 Subnet 4 NETWORK NUMBER LAST OCTET BIT V A LUE[...]

  • Page 176

    G-1000 User’s Guide 176 IP Subnetting Subnetting With Class A and Class B Networks. For class “A” and class “B” addresses the subnet ma sk also determines which bits are part of the network number and which are part of the host ID. A class “B” address has two host ID octets ava ilable for subnetting and a class “A” address has thr[...]

  • Page 177

    G-1000 User’s Guide IP Subnetting 177[...]

  • Page 178

    G-1000 User’s Guide 178 Command Interpreter Appendix H Command Interpreter The following describes how to use the comman d interpreter . Enter 24 in the main menu to bring up the system maintena nce menu. Enter 8 to go to Menu 24.8 - Command Interpr e ter Mode . See the included disk or zyxel.com for more detailed information on these commands. C[...]

  • Page 179

    G-1000 User’s Guide Command Interpreter 179[...]

  • Page 180

    G-1000 User’s Guide 180 Log Descript ions Appendix I Log Descriptions This appendix provides descrip tions of example log messages. Table 84 System Maintenance Logs LOG MESSAGE DESCRIPTION Time calibration is successful The router has adjusted its time based on information from the time server . Time calibration failed The router failed to get in[...]

  • Page 181

    G-1000 User’s Guide Log Description s 181 Log Commands Go to the command inte rpreter interface (the Command In terpreter Appendix explai ns how to access and use the comman ds). Configuring What Y ou W a nt the G-1000 to Log Use the sys logs load command to load the log se tting buffer th at allows you to configur e which logs the G-1000 is to r[...]

  • Page 182

    G-1000 User’s Guide 182 Log Descript ions Use sys logs category followed by a log category and a parameter to decide what to record Use the sys logs save command to store the settings in the G- 1000 (you must do th is in order to record logs). Displaying Logs Use the sys logs display command to show a ll of the logs in the G-1000’s log. Use the[...]

  • Page 183

    G-1000 User’s Guide Log Description s 183[...]

  • Page 184

    G-1000 User’s Guide 184 Antenna Selection and Positioning Recommendation Appendix J Antenna Selection and Positioning Recommendation An antenna couples RF signals onto air . A tran smitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air . The antenna also operates in reverse by capturing RF [...]

  • Page 185

    G-1000 User’s Guide Antenna Selec tion and Pos itioning Re commendation 185 • Omni-directional antennas send the RF signal out in all directions on a horizontal p lane. The covera ge area is torus -shaped (lik e a donut) which makes these antennas ideal for a room environment. W ith a wide coverage area, it is possible to make circular overlapp[...]

  • Page 186

    G-1000 User’s Guide 186 Power Adaptor Specifications Appendix K Power Adaptor S pecifications Table 88 NORTH AMERICAN PLUG STANDARDS AC Power Adaptor Model AD48-1201200DUY Input Power AC120V olts/60Hz/0.25A Output Power DC12V olts/1.2A Power Consumption 10 W Safety S tandards UL, CUL (UL 19 50, CSA C22.2 No.234-M90) Table 89 NORTH AMERICAN PLUG S[...]

  • Page 187

    G-1000 User’s Guide Power Adaptor Specifications 187 Table 93 AUSTRALIA AND NEW ZEALAND PLUG STANDARDS AC Power Adaptor Model AD-1201200DS or AD-121200DS Input Power AC240V olts/50Hz/0.2A Output Power DC12V olts/1.2A Power Consumption 10 W Safety S tandards NA T A (AS 3260)[...]

  • Page 188

    ZyAIR G-3000 User’s Guide 188 Index Numerics 11 0 V A C 5 230V AC 5 A Abnormal Working Conditions 6 AC 5 Accessories 5 Acts of God 6 Address Assignment 43 , 70 Airflow 5 Alternative Subnet Mask Notation 172 Antenna Directional 185 Omni-directional 185 Antenna gain 184 AP (access point) 160 Applications 29 Authentication databases 64 Authority 3 A[...]

  • Page 189

    ZyAIR G-3000 User’s Guide 189 Default 93 Defective 6 Denmark, Contact Information 7 DHCP 121 Diagnostic 122 Diagnostic T ools 11 8 Disclaimer 2 Discretion 6 Distribution System (DS) 60 Dust 5 Dynamic WEP Key Exchange 165 E EAP 29 , 50 EAP Authentication 164 Electric Shock 5 Electrocution 5 Encryption 166 Equal V alue 6 ESS 159 ESS ID 40 Europe 5 [...]

  • Page 190

    ZyAIR G-3000 User’s Guide 190 Link type 11 9 Liquids, Corrosive 5 Log Descriptions 18 0 Logs 82 M MAC address 57 MAC Address Filter Acti on 58 , 105 MAC Address Filtering 103 MAC Filter 57 MAC filter 51 MAC Filtering 28 MAC service da ta uni t 53 Main Menu 97 Management Information Ba se (MIB) 77 Materials 6 Max. Frame Burst 54 Merchantability 6 [...]

  • Page 191

    ZyAIR G-3000 User’s Guide 191 Register ed 2 Registered Trademark 2 Regular Mail 7 Related Documentation 24 Relocate 3 Re-manufact ured 6 Remote Authentication Dial In User Service 29 Remote Management and NA T 73 Remote Management Limitations 72 , 134 Remote Management Setup 133 Remote Node 11 9 Removing 5 Reorient 3 Repair 5 , 6 Replace 6 Replac[...]

  • Page 192

    ZyAIR G-3000 User’s Guide 192 TV T echnician 3 U Undesired Operations 3 Use Authentication 167 User Profiles 108 V V alid C I Commands 131 Va l u e 6 V endor 5 V entilation Slots 5 Viewing Certifications 4 V oltage Supply 5 V oltage, High 5 W Wa r n i n g s 5 W arranty 6 W arranty Information 7 W arranty Period 6 Wa t e r 5 Web 73 Web Configurato[...]