ZyXEL Communications MWR102 manual

Go to page of 183

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of ZyXEL Communications MWR102, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of ZyXEL Communications MWR102 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of ZyXEL Communications MWR102. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of ZyXEL Communications MWR102 should contain:
- informations concerning technical data of ZyXEL Communications MWR102
- name of the manufacturer and a year of construction of the ZyXEL Communications MWR102 item
- rules of operation, control and maintenance of the ZyXEL Communications MWR102 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of ZyXEL Communications MWR102 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of ZyXEL Communications MWR102, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the ZyXEL Communications service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of ZyXEL Communications MWR102.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the ZyXEL Communications MWR102 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Copyright © 2009 ZyXEL C ommunications Cor poration DEFAULT L OGIN DETA IL S IP Address http :// 192.168.100 .1 Passw ord 1234 Firmware Version 1.0 Edition 1, 10/201 1[...]

  • Page 2

    2 MWR102 Mobile W ireless Router[...]

  • Page 3

    3 About This User' s G uide Intended Audience This m anual is intend ed for peo ple who want to conf igure the MW R102 us ing the W eb - Based Managem ent Interf ace. You shou ld have at l east a bas ic knowledge of TCP/IP n etwork ing concepts an d topolog y. Related D ocument atio n • Quick Start Guide The Quic k Start Guide is design ed t[...]

  • Page 4

    4 Customer Support Please have the following in format ion ready when you contact Cus tomer Support: • Product m odel and ser ial num ber • W arrant y inform ation • Date that you receiv ed or purc hased y our de vice • Brief descr i ption of the prob lem includ ing any ste ps that you h ave taken before c ontacting the ZyXEL Cust omer Sup [...]

  • Page 5

    5 Document Conv entions Warnings and Notes These ar e how warn ings and notes are sho wn in this Us er’s Guide. Warnings tell you about things that coul d ha rm you or y our de vice. Note: Notes tell you other important information ( for example, other things you may need to configure or help ful t ips) or recommendations. Syntax Conventions • [...]

  • Page 6

    6 Icons Used in Figures Figures in this User’s Guide m ay use the f ollowing ge neric icons . The MW R102 icon is n ot an exact repr esentation of your dev ice. M W R102 Computer Notebook computer Server Modem Firewall Telephone Swi tc h Router[...]

  • Page 7

    7 Safety Warnings • Do NOT use this produc t near water, for example, in a wet basem ent or near a swim ming pool. • Do not lea ve the dev ice exposed t o a heat s ource or i n a high - tem perature loc ation such as in the sun or in an unatte nded ve hicle. To pr event dam age, rem ove the device f rom the vehicle or store it out of direc t su[...]

  • Page 8

    8 • Do not lea ve unit expos ed to a h eat sourc e or in a loca tion that m ay becom e hot, such as a park ed vehicle or in d irect sunl ight. Do not leave in a gl ove box, tru nk or other location t hat ma y becom e hot. • Do not pu ncture or inci nerate th e device or b attery. • W hen/if you di spose of the batter y, be certa in to follo w[...]

  • Page 9

    9 Table of Conte nt s About This User's Guide .................................................................................................. 3 Document Conventions ................................................................................................... 5 Safety W arnings ..........................................................[...]

  • Page 10

    10 6.1 Over vi ew ........................................................................................................ 29 6.2 Connecting to Internet from an Access Point ................................................... 30 6.3 Configuring W ir eless Security Using W PS ....................................................... 30 6.4 Enabling an[...]

  • Page 11

    11 10 Status ................................................................................................................ 60 10.1 Over vie w .................................................................................................... 60 10.2 What You Can Do ................................................................................[...]

  • Page 12

    12 Appendix A: Pop - up W indows, JavaScripts and Jav a Permissions ............................... 85 Appendix B: IP Addresses and Subne tting .................................................................... 93 Appendix C: Setting up Your Computer’s IP Address .................................................. 105 Appendix D: W ireless LAN s[...]

  • Page 13

    13 Part I: Introduct ion[...]

  • Page 14

    14 1 Getting t o Know Your MWR102 1.1 Ove r view The M W R102 is a mobile wireless rout er wi th 1T1R MIMO technology. It complies with IEEE 802.11n standar d s, with W ireless N data rates of up to 150 Mbps, and IEEE 802.11b/g with Wireless B/G dat a rates of 54 Mbps. It is also backward compatable with all 11/54 Mbps w ireless (802.11b/g) product[...]

  • Page 15

    15 1.3 Good Habits for Managi n g the MWR 102 Do the f ollowing thi ngs regularl y to mak e the MW R102 more s ecure and to m anage the MW R102 mor e effectivel y . • Change t he passwor d. Use a pass word that’s not eas y to guess and that consis ts of dif ferent types of characters , such as numbers and let ters. • W rite down the pass word[...]

  • Page 16

    16 1.5 The Rear Pa nel Figure 2 The rear panel of t he W ireless Router.  L AN: Through this port, you can connect the rou ter to your PCs and the other Ethernet network devices.  W AN: T his W AN port is w here you will connect the cable/DSL M odem, or Ethernet .  DC IN : Plug the end of the cable firmly into the rear panel of the r outer[...]

  • Page 17

    17 2 We b - Based Management 2.1 Ove r view This c hapter describ es how to acc ess the MW R102 Web - Base d Managem ent Inter face and provides an overvie w of its s creens. The W eb - Bas ed Managem ent Interfac e is an HT ML - based m anagement int erface tha t allows easy setup and manag ement of the M W R102 via Internet bro wser. Use I nterne[...]

  • Page 18

    18 Figure 3 Login Screen The f ollowing table d escribes the labels in this scr een. L AB EL DESCRIPTION User Nam e T y pe “ adm in” (default) as t he User n ame. Password T y pe “ 1234” ( default) as the pass word. 2.3 Reset ti ng the MWR 102 If y o u forget your pass word or IP addr ess, or you cannot ac cess the W eb - Based Mana gem ent[...]

  • Page 19

    19 3 MWR102 Modes 3.1 Ove r view This c hapter introd uces the dif ferent m odes availabl e on your MW R102. 3.1.1 Device Modes This r efers to the oper ating m ode of the MW R102, whi ch can act as a: • Router . This is the def ault dev ice mode of the MW R102. Use this m ode to c onnect the local network to another net work, lik e the Internet.[...]

  • Page 20

    20 4 Router Mode 4.1 Ove r view The M W R102 is set to router mode by de fault. Routers are used to connect the local network to another networ k (for example, the Internet). 4.2 What You Can Do Use the Status scr een to vie w read - only inform ation about your MW R102. 4.2.1 Navigation Panel Use the su b - menus on t he navig ation panel t o conf[...]

  • Page 21

    21 The following table describes the sub - menus. Table 2 Navigation Panel: Router M ode LINK FUNCTIO N Setup Wiza rd This screen gui des you thr ough the setup of the M W R102. Wireless Basic Sett ings U se this screen t o chang e the basi c wirele ss setting s of the M W R102 Advanced S ettings Use this sc reen to co nfigure ad vanced wir eless s[...]

  • Page 22

    22 Status Show s the current status an d basic settings of t he trav el rout er Statistics Show s packet counts for w ired and wireless E thernet connection s. Log Set rem ote log serv er para meters a nd view the sy stem lo g. Upgrade Fir mw are U pgrade the t ravel ro uter firmware. Save/Reloa d Settings Sav e the curren t settings to a backup fi[...]

  • Page 23

    23 5 Access Point Mode 5.1 Ove r view Use your MW R102 as an a ccess point ( AP) if you already ha ve a router or gatewa y on your network . In this m ode your MW R102 bridges a wired n etwork ( LAN) and wire less LAN (W LAN) in the sam e subnet. 5.2 What You Can Do • Use the Status scr een to vie w read - only inform ation a bout your MW R102. ?[...]

  • Page 24

    24 5.2.3 Config uring yo ur WL A N and M aintena nce Settings The conf iguration of wireless and maintenanc e settings in A cce ss Poin t m ode is the sam e as f or Router Mode . • See Chapter 7 for inf ormat ion on the conf iguring y our wireless net work . 5.3 AP Mode S tatus S cr e en Click Mana gement > Status to open the Status screen Tab[...]

  • Page 25

    25 Encryption This show s the lev el of wirel ess secur ity the M W R102 is c urrently using. BSSID This display s the M AC address of the w ireless dev ice. Associated C lients Displays the number of cli ents cur ren tly a sso ciated to the MWR102 Local Netw ork Router IP A ddress D isplays the IP addre ss designat ed to the M W R102 by your route[...]

  • Page 26

    26 Figure 5 Navigation Panel The following table describes the sub - menus. Table 4 Navigation Panel: Router M ode LINK FUNCTIO N Setup Wizard T his screen gui des you thr ough the setup of the M W R102. Wireless Basic Sett ings U se this screen t o chang e the basi c wirele ss setting s of the M W R102 Advanced S ettings Use this sc reen to co nfi[...]

  • Page 27

    27 router. Site Survey This page provides a tool to scan th e wireless network for nearby routers and APs. WP S This screen allow s you to cha nge the W i - Fi Protec ted Setup setting s for the M W R102 Network Settings LAN Interf ace This screen allow s you to conf igure th e parameter s for y our Local Area Network. Managemen t Status Show s the[...]

  • Page 28

    28 Note: If you change the IP address of the M W R102 in the screen below, y ou will need to log into the M W R102 again using the new IP address. Figure 6 Network Settings > LAN Interface The table below desc ribes t he labels in th e screen. Table 5 Network Settings > LAN Interface L AB EL DESCRIPTION Router IP Address Type t he IP address [...]

  • Page 29

    29 Diversion automatical ly detect conflicts i n the WAN and LAN IP . If there are c onfl ict s , the LAN IP and LAN DHCP Ra nge w ill automatic ally jump t o nex t subnet to av oid conflict s. 6 Tutorials 6.1 Ove r view This c hapter provides tutorials f or your MW R102 as f ollows: • Connectin g to the Inter net from an Acces s Point • Config[...]

  • Page 30

    30 6.2 Connecting t o Internet from an Access Point This s ection gives you an exam ple of how to s et up an access point ( AP ) a nd wireless client (a notebook ( B ), in this ex ample) f or wireless comm unication. B can access t he Internet t hrough the access point wireles sly. W hen the MW R is configured i n AP m ode, it has to c onnect to a [...]

  • Page 31

    31 6.3.1 Push But ton Confi gurati on (PBC ) 1 Make s ure that your MW R102 is t urned on an d that it is within range of your com puter. 2 Make s ure that you h ave ins talled the wirel ess client (this exam ple uses t he NW D210N) driver an d utilit y in your notebook . 3 In the wire less client utility, find the W PS settings. Enable W PS and pr[...]

  • Page 32

    32 6.4 Enabling and Configu ring Wireless Securit y (No WPS) Follow th e steps be low to conf igure the w ireless set tings on your MW R102. The instr uctions requ ire that your hardwar e is connec ted (see the Q uick Start Guide) an d you are logged into th e W eb - Based Managem ent Interf ace through your LAN con nection. 1 Open the W ireless &g[...]

  • Page 33

    33 2. W ireless adapters come with s oftware som etim es called a “utilit y” that you install o n your com puter. See your wireless adapter’s User’s Gui de for inform ation on ho w to do that. 3. After you’ve install ed the utilit y, open it. I f you cann ot see your utilit y ’s icon on you r screen, go t o Start > Programs and click[...]

  • Page 34

    34 Figure 11 Confirm Save 7. Check the status of your wir eless connec tion in the s creen bel ow. If your wireless connecti on is weak or you have n o connectio n, see th e Troublesho oting sect ion of this Us er’s G uide. Figure 12 Link Status If y o ur connec tion is suc cessful, op en your Int ernet bro wser and enter http://us .zyxel.com or [...]

  • Page 35

    35 Part II: Wireless[...]

  • Page 36

    36 7 Wireless 7.1 Ove r view This c hapter discus ses how to conf igure the wireless network s ettings in y our M W R102. See the appendic es for m ore detailed inf ormation about wirel ess net works. 7.2 What You Can Do • Use the Basic Settings screen to en able the W ireless LAN, enter th e SSID and select the channel widt h. • Use the A dvan[...]

  • Page 37

    37 7.3.1 Wireless Securit y Ov er vie w The f ollowing sect ions introduc e differ ent types of wir eless sec urity you can s et up in the wireless network . 7.3.1 .1 SSID Norm ally, the AP ac ts like a beac on and reg ularl y broadcasts the SSID in th e area. You can hid e the SSID i nstead, i n which c ase the AP do es not broa dcast the S SID. I[...]

  • Page 38

    38 Table 6 Types of Encry ption for Each Type of Authentication NO AUTHENTICATION Weakest No Security W EP W PA - Personal (TKIP) W PA -Enterprise Strongest WPA 2 - Personal (AES) W PA2 - E nterpris e Usuall y , you should s et up the s trongest e ncryption tha t every wire less client in the wir eless network supports. Suppose the wireless net wor[...]

  • Page 39

    39 7.4 Gener al Wireless LA N Screen Use this sc reen to ena ble the W ireless LAN, enter t he SSID and s elect the c hannel. Note: If you are configuring the M W R102 from a computer connected to the wireless LAN and you change the M W R102’s SSID, channel or security settings, you will lose your w ireless connection when you press A pply to c o[...]

  • Page 40

    40 Networ k Band Allow s you to cho ose betw een W irel ess B/G/N functiona lity. Channel Width Allow s you to choose betw een the 2 0MHz and 40M Hz channel. Channel Number T his displays t he channe l the M W R102 is curr ently using. Country Allow s you to set your co untry . Broadcast SSID Set whether or not t he M W R102 is disc overable. Assoc[...]

  • Page 41

    41 Figure 14 W ireless > Advanced Settings The f ollowing table d escribes the labels in this scr een. Table 8 W ireless > Advanced Settings L AB EL DESCRIPTION F ragmentati o n Threshold The thresh old (number of byte s) for the fr agmenta tion bound ary for dir ected messages. It is the m aximum data fragment size t hat can be sent. Enter a[...]

  • Page 42

    42 Output Pow er Set the out put pow er of the M WR102 in th is fiel d. If ther e is a hig h density of APs in an area, d ecrease the output p ower of the M W R10 2 to reduc e interfere nce w ith other AP s. Select on e of the f ollowing 100% , 70% , 50% , 35% , or 15% . See the product spe cificat ions for mor e infor mation on y our M W R102’s [...]

  • Page 43

    43 7.6.2 WEP Encryption W EP encryption sc rambles the data transm itted between t he wirel ess stations and the acc ess point s to k eep net work comm unications priva te. It encr ypts unicast and multic ast com munications in a networ k. Both the wireles s stations and the acc ess points must us e the same W EP key. In order t o configure a nd en[...]

  • Page 44

    44 Key Lengt h Select 64 - bit or 128 - bit . This dictate s the l ength of the security key that t he netw ork is going t o use. Key Format Select ASC II (5 Chara cters) or Hex (10 Character s) from the dropdow n menu. Encryptio n Key Enter a P assphrase. A passphr ase functi ons like a passw ord. In W EP securi ty mode, it is furth er converted b[...]

  • Page 45

    45 The f ollowing table d escribes the labels in this scr een. Table 10 W ireless > Security: W PA - PSK/ W PA2 - PSK/WPA2 - Mi xed L AB EL DESCRIPTION Encryption Select WPA- PSK , WPA2 -PSK or W PA2 - M ixed to enable da ta en cryption. Pre- shared Key Format T his field allow s you to ch oose bet ween a pas sphrase and HEX as your Sre - Shared[...]

  • Page 46

    46 Figure 18 W ireless > Access Control The f ollowing table d escribes the labels in this m enu. Table 11 W ireless > Access Control L AB EL DESCRIPTION W ireles s Access Control Mode Define whet her enter ed MAC add res ses wil l be wh itel isted or bl ackli sted . MAC Address Enter the M AC addresses of t he wireless s tation t hat are a l[...]

  • Page 47

    47 Apply Changes Click A ppl y to save your chan ges back to the M W R102. Reset Click Reset to re load th e previous configur ation for this scre en. 7.8 WPS Screen Use this sc reen to ena ble/disabl e W PS, view or gener ate a new PIN number and chec k current W PS status . To open this s creen, click Wireless > WPS . Figure 19 W ireless > [...]

  • Page 48

    48 Status This display s Configure d when the M W R10 2 has connect ed to a w ireless network us ing W PS . The curr ent w ireless and w ireless sec urity settings al so appear in the screen. This display s Unconfi gured if WPS is disabl ed and there ar e no wirel es s or wireless security chan ges on t he M W R102 or you click Reset to Unconfigur [...]

  • Page 49

    49 The f ollowing table d escribes the labels in this scr een. Table 13 Wireless > Site Surv ey L AB EL DESCRIPTION W ireles s Site S urve y SSID This display s the N etwork Na me (SSID) o f the w ireless net works close to you. BSSID This display s the M AC address of the w ireless dev ice liste d. Channel This display s the w ireless cha nnel [...]

  • Page 50

    50 8 Network Se ttings 8.1 Ove r view This c hapter discus ses the MW R102’s Network Settings screens. U se these sc reens to co nfigure your LAN and W AN settings. A Local Area Networ k (LAN) is a shared com munic ation system to which m any com puters are attached. A LAN is a c omputer ne twork limited to the immediate ar ea, usual ly the s ame[...]

  • Page 51

    51 8.3 What You Need To Kn ow The inf ormation in t his section c an help you configure t he screens for your W AN and LAN connecti ons. 8.3.1 Config uring Yo ur Interne t Connecti on The act ual physical connection det erm ines whether th e MWR 102 ports are LAN or W AN ports. There ar e two separat e IP net works, one inside the L AN network and [...]

  • Page 52

    52 8.4 LAN In terface The LAN Interface Setup screen allow s you to set up your LAN interface, the private IP of your router’s LAN port, and the subnet mask of your LAN segment. Go to Net work > LAN Interface to access the following screen. Figure 23 Network > LAN Interface The f ollowing table d escribes the labels in this scr een. Table 1[...]

  • Page 53

    53 default. A uto I P A ddress Diversion Click the drop down list, you may select “Enabl ed” to divert the IP Address aut omatical ly or select “Disable d” to ban it. W he n Enabled, the system w ill automatically detect conflicts in the WAN and LAN IP. If there ar e conflict s , the LAN IP and LAN DHCP Range will automatically jump to next[...]

  • Page 54

    54 8.5 WAN I nterf ace This page allows users to conf igure W AN s ettings. You may select t he Internet connection type f rom the drop down list next to “WAN Access Type” and con figure t he parameters for each mode. Go to Network Settings > WA N Interface to open the following scr een. Figure 25 Network > W AN Interface The f ollowing t[...]

  • Page 55

    55 Provider (I SP). MTU S iz e Th e Maxi m um pack et s ize the router will transmit. Any packet over the speci fied size will be chopped into a smaller size before sending. Larger p acket size w ill enhance performance. Enter the MTU number i n the blank to set the limi tation. Clone MAC A ddress There are two w ays to clone a MAC address. One way[...]

  • Page 56

    56 Part III: Securit y MAC F ilterin g[...]

  • Page 57

    57 9 MAC Filterin g 9.1 Ove r view This c hapter shows you how to e nable and c onfigure MAC addres s filtering th at allo ws your MWR102 t o perm it and deny acces s to spec ific device s on your n etwork. Enable M AC Filtering to restr ict the passage of certain types of data pack ets fr om y our local network to the Internet through t he travel [...]

  • Page 58

    58 9.4 MAC Filtering This page allows users to restrict data fr om p assing onto the internet fr o m certain devices. Go t o Fire wall > MA C Filte ring to open the following screen. Figure 26 Firewall > MAC Filter ing Table 17 F irewall > MAC Filter ing It ems Inf ormation E nable MAC Filtering Mark to enable MAC Fil tering, and clear to [...]

  • Page 59

    59 Part IV: Managem ent Status Statis tics Log Upgrade F irmware Save/Rel oad Set tin gs Password[...]

  • Page 60

    60 10 Status 10.1 O ver view This c hapter discus ses how to acc ess and i nterpret inf ormation about t he MW R102. 10.2 What You Can Do • Use the Status scree n to view t he current s tatus and bas ic settings of the dev ice. 10.3 Status Scr een This information page show s the current status and basic settings o f this device. Click Managem en[...]

  • Page 61

    61 Table 18 Management > Status L AB EL DESCRIPTION System Inf ormation Uptime This is the tota l time the M W R 102 has been on. Firmware B uild Time This is the date/ti me the curre nt versi on of the firmw are was relea sed. Operation M ode This is the devic e mode t o whi ch the M W R102 is set – Router Mode . Wireless Lo cal Netw ork Netw[...]

  • Page 62

    62 Internet IP Address The IP addres s provided by your I nternet S er vice Provider (ISP). Subnet M ask The Subnet M ask provided by your Intern et Servi ce Provi der (ISP ). Default G ateway The Default Ga teway provided by your Inter net Service Provi der (ISP). Internet M AC Address MAC Addr ess of the d evice on the intern et.[...]

  • Page 63

    63 11 Statistic s 11.1 O ver view This page shows users data transfer information, and monitor s packets sent and received 11.2 S tati s tics Sc reen . Click Management > Statistics to access the S tatistics screen. Figure 28 Management > Statistics The f ollowing table d escrib es the labels in this sc reen. Table 19 Management > Statisti[...]

  • Page 64

    64 This table s hows the nu mber o f pac kets receiv ed over Et hernet LA N. Ethernet WAN This table s hows the number o f packet s sent ov er the Ether net W AN. This table s hows the number o f packet s received over the E thernet W AN. Refresh T his button u pdates the St atist ics screen to show t he current number of packets sent and received.[...]

  • Page 65

    65 12 Log 12.1 O ver view This page shows current ac tivity on the router, and allows you t o set what information the router lo gs. 12.2 Log S creen Click Managem ent > Log to access the Lo g screen. Figure 29 Management > Log The f ollowing table d escribes the labels in this scr een. Table 20 Management > Log[...]

  • Page 66

    66 L AB EL DESCRIPTION Enable Log Checking thi s box enab les sys tem log func tionalit y. System All Checking this box shows all lo gged infor mation pas sing thro ugh the dev ice. W ireles s Checking this box shows only the infor mation pas sing thro ugh the w ireless netw ork. Apply Chan ges This butt on appl ies the ch anges made a bove. The M [...]

  • Page 67

    67 13 Upgrade Fir mware 13.1 O ver view Occas ionally, a firm ware upgrad e ma y be issued t o address bugs or add functional ity. This chapter d iscusses ho w to upgrad e to the MW R102’s mos t recent firm ware. Find firm ware at htt p://us.zyxel.c om/Sup port/Downloa d - Librar y .aspx . T he upload proces s uses HTT P (Hypertext Tr ansfer Prot[...]

  • Page 68

    68 Table 21 Management > Upgrade Firmware L AB EL DESCRIPTION Select Fi le Ty pe in the locatio n of the f ile you w ant to upload in thi s field or cl ick Browse... to find it. Browse... C lick Browse... to find the . bin file yo u want t o upload. Re member t hat you mu st decompress compres sed (.zip ) files b efore you ca n upload t hem . Up[...]

  • Page 69

    69 14 Save/Reload Settings 14.1 O ver view This c hapter shows you how to b ackup, res tore and re set your MW R102. 14.2 What You Can Do Save Settings to File allows y ou to back up (save) the MW R102’s c urrent config uration to a f ile on your com puter. Onc e your MW R102 is c onfigured a nd functio ning proper ly, it is highly recom mended t[...]

  • Page 70

    70 Figure 32 Management > Save/Reload Set tings The f ollowing table d escribes the labels in this scr een. Table 22 Management > Save/Reload Settings L AB EL DESCRIPTION Save… Click Sav e… to save th e MW R102’s current c onfigurat ion to y our com puter. Load Setti ngs from File Type in the l ocation of t he file you w ant to upload i[...]

  • Page 71

    71 Reset Pressing the Res et button in this sec tion clears a ll user - entered configurat ion inform ation and retur ns the MW R102 to i ts factor y defaults. You can a lso press th e RESET button o n the rear panel to reset t he factor y defaults of your MW R102. Ref er to the W eb - Based M anagement Interface Chapter f or more inf ormation on t[...]

  • Page 72

    72 15 Password 15.1 Ove r view This c hapter discus ses managem ent of the MW R102’s Administr ator user name and password. These ar e the User nam e and Pass word used to access the W eb - based Man agem ent interface and mak e changes to your router. 15.2 P ass word Screen Click Managem ent > Pas swo rd . Figure 33 Management > Password T[...]

  • Page 73

    73 Table 23 Management > Password L AB EL DESCRIPTION User Name Type the user name you w ish to us e to log into the M W R102. New P assword Type y our new sy stem password ( up to 30 c haracter s). Note that as you type a pa sswor d, the screen displays an asteri sk (*) for each chara cter y ou type. Confirmed Password Type t he new passwor d a[...]

  • Page 74

    74 Part V: Troubl eshooting[...]

  • Page 75

    75 16 Troubles hooting 16.1 Ove r view This c hapter offer s some suggest ions to sol ve proble ms you m ight encounter . The poten tial problem s are divide d into the foll owing categ ories. • Po wer , Hardware Co nnections , and LEDs • Internet Ac cess • Resetting M W R102 • W ireless Router/AP T ro ubleshoot ing 16.2 Po w er, Hardware C[...]

  • Page 76

    76 3 Inspect your cables f or dam age. Contact the vendor to r eplace an y damaged ca bles. 4 Disconnect and re - conn ect the p ower adaptor to the M WR102 . 5 If the prob lem continu es, contact t he vendor. 16.3 MWR1 02 Ac cess an d Lo gi n I don’t k now the IP ad dress of my MW R 10 2 . 1 The def ault IP address is 192.168. 100.1 . 2 If you c[...]

  • Page 77

    77 1 Make s ure you are us ing the corr ect IP addres s. • The def ault IP addres s is 192.168. 100.1 . • If y o u change d the IP addr ess ( Chapter 5 ), use t he new IP address. • If y o u change d the IP addr ess and h ave forgott en it, see t he troubl eshooting suggesti ons for “I don ’t kno w the IP addres s of m y M W R102 ” 2 Ch[...]

  • Page 78

    78 1 Check the hardware c onnections , and mak e sure the LEDs are beha ving as expected. See the Qu ick Start G uide. 2 Make s ure you entered your ISP account inf ormation c orrectl y . These f ields are case - sensitive, so mak e sure [Caps Loc k] is not on. 3 If you are trying to ac cess the In ternet wire lessl y , m ake sure the wireless sett[...]

  • Page 79

    79 A dvanced Suggesti ons • Check the settings f or bandw idth managem ent. If it is disabled, you might cons ider ac tivating it. If it is en abled, you m ight cons ider chan ging the all ocations. • Check the settings f or QoS. If it is disab led, you might consider ac ti vat ing it. If it is enabled, you might c onsider raisin g or lower ing[...]

  • Page 80

    80 4 Make s ure your com puter (with a wireless adapter ins talled) is within the transm ission range of the MW R102 . 5 Check that both the MW R102 and your wire less statio n are using the sam e wireless and wire less secur ity settings . 6 Make s ure you allow th e MW R102 to be rem otely acces sed through the WLAN interface. Check your remote m[...]

  • Page 81

    81 17 Product Spec i f ica t i ons The f ollowing tables summar ize the MW R102 ’s hard ware and firm ware featur es. Table 24 Hardware Features Dimensi ons ( W x D x H) 162 mm x 115 mm x 33 mm W eight 252 g Power S pecification Input: 100 ~240 V AC, 50 ~60 Hz Output: 5V DC 2A Ethernet por ts Auto- negoti ating: 1 0 Mbps, 10 0 Mbps in e ither hal[...]

  • Page 82

    82 F E AT U R E DESCRIPTION Default IP Address 192.168 .10 0.1 (router) 192.168.1 0 0.2. (AP) Default Subn et M ask 255.255.2 55.0 ( 24 bit s) Default Pas sword 1234 DHCP Pool 192.168.100 .3 3 to 192.168. 100.64 Wireless Int erface W ireles s LAN Default Wireless SSID ZyXEL Defaul t Wireless DHCP Pool Size W ireles s LAN : Same as LAN ( 32 from 192[...]

  • Page 83

    83 DHCP (Dynamic Host Configurati on Protoc ol) U se this f e atur e to have th e MW R10 2 assign IP addres se s, an IP default g ateway and D NS serv ers to compu ters on y our netw ork. Dynamic DNS S upport W ith Dy namic D NS (Domain N am e Syst em) sup port, you c an use a fixed U RL, www .zyxel.com for example, w ith a dynamic IP ad dr ess. Yo[...]

  • Page 84

    84 Appendic es Pop - up W indows, J avaScri pts and Jav a Perm issions IP Address es and Sub netting Setting up Your Com puter’s IP A ddress W ireless LANs Comm on Services Legal Inf ormation[...]

  • Page 85

    85 Appendix A Pop - up Windows, JavaScripts and Java Permissions In order to use the W eb - Based Management Interface you need to allow: • W eb browser pop - up windows from your device. • JavaScr ipts (en ab led b y def ault). • Java perm is sions (enabled b y default). Note: Internet Explorer 6 screens are used here. Sc reens for other Int[...]

  • Page 86

    86 Figure 34 Pop - up Blocker You can a lso check if pop - up block ing is disab led in the Po p - up Blocker section i n the Priva cy tab. 1 In Internet Explorer, s elect T ools , Inte rnet Options , Pr iva cy . 2 Clear the Block pop- ups check box in the Po p - up Bl ocker sectio n of the scr een. This dis ables an y web pop - up block ers you ma[...]

  • Page 87

    87 2 Select Settings… to open t he Pop - up Blocker Settings screen. Figure 36 In terne t Optio ns: P riv acy 3 T y pe the IP addr ess of y ou r device (th e web page t hat you do not want to have blocked) with the pref ix “http:// ”. For exam ple, http://1 92.168.16 7.1. 4 Clic k Add to m ove the IP a ddress to th e list of Allowed sites .[...]

  • Page 88

    88 Figure 37 Pop - up Blocker Settin gs 5 Click Close to r eturn to the Privac y screen. 6 Click Apply to save t his setting . JavaScripts If pages of the W eb - Based Managem ent Inter face do not d isplay proper l y in Intern et Explorer , check that JavaScr ipts are all owed. 1 In Internet Explorer, c lick Tools , Internet Options and then the S[...]

  • Page 89

    89 Figure 38 In terne t Options : Se c u rity 2 Click the Custom Level... button. 3 Scroll do wn to Scripting . 4 Under A ctiv e scripting make s ure that Enable is selec ted (the defau lt). 5 Under Scripting of Java applets make sure that Enable is selected (t he default) . 6 Click OK to close t he windo w.[...]

  • Page 90

    90 Figure 39 Security Settings - Java Scriptin g Java Permissio ns 1 From Inter net Explorer , click Tools , Inter net Options and then the S ecurity tab. 2 Click the Custom Level... button. 3 Scroll do wn to Microsoft VM . 4 Under Jav a permission s mak e sure that a saf ety level is selected. 5 Click OK to close t he windo w.[...]

  • Page 91

    91 Fi gure 40 Security Settings – Java J AV A ( S un ) 1 From Inter net Explorer , click Tools , Inter net Options and then the Advanced t ab. 2 Make s ure that Use Java 2 for <app let> under Java (Sun) is selected. 3 Click OK to close t he windo w.[...]

  • Page 92

    92 Figure 41 Java (Sun)[...]

  • Page 93

    93 Ap pendix B IP Addresses and Subnet t i ng This appen dix intro duces IP ad dresses and subnet mas ks. IP address es identif y indivi dual devices on a net work. Ever y network ing device (in cluding computer s, servers, r outers, print ers, etc.) ne eds an I P address to c omm unicate ac ross the network . These net working devic es are also k [...]

  • Page 94

    94 How m uch of the IP addr ess is the network number an d how m uch is the hos t ID varies ac cording to the subn et mask . Subnet M asks A subnet m ask is us ed to deter mine which bits are par t of the n etwork number, an d which b its are part of the host ID (us ing a logic al AND op eration). T he term “ subnet” is short f or “sub - net [...]

  • Page 95

    95 Table 26 Subnet M ask - Identifying Network Number 1ST OC TE T: (192) 2ND OC TE T: (168) 3RD OC TE T: (1) 4TH OC T ET (2) IP Address (Binary) 11000000 10101000 00000 001 00000 010 Subnet M ask (Binary) 11111111 11111111 11111 111 00000 000 Networ k Numbe r 11000000 10101 000 00000 001 Host ID 00000010 By convent ion, sub net mask s always cons i[...]

  • Page 96

    96 24 - bit ma sk 11111 111 11111111 11111111 00000000 255.2 55.255.0 29 - bit ma sk 11111 111 11111111 11111111 11111000 255.2 55.255.2 48 . Ne tw or k Si ze The si ze of the net work num ber determines the m axim um number of possible hos ts you can h ave on your n etwork . The larger the number of network number bits, the s maller th e num ber o[...]

  • Page 97

    97 For exam ple, 192.1. 1.0 /25 is equ ivalent to s aying 192. 1.1.0 with s ubnet m ask 255. 255.255.128. The f ollowing table s hows som e possible su bnet m asks using both notations . Table 29 Alternative Subnet M ask Notation SUBN ET M AS K AL T E R N AT I V E NOTA TION LA ST O CTE T (BINARY) LA ST O CTE T (DECIM A L) 255.255.2 55.0 /24 0000 00[...]

  • Page 98

    98 You can “bor row” one of the host ID bits to divide the network 192. 168.1.0 int o two separ ate sub - network s. The subnet mask is no w 25 bits (2 55.255.25 5.128 o r /25). The “bor rowed” host ID bit can ha ve a value of either 0 or 1, allo wing two s ubnets; 192. 168.1.0 /25 and 192. 168.1.128 / 25. The f ollowing figure s hows the c[...]

  • Page 99

    99 In a 25 - bit s ubnet the host ID has 7 bits, so eac h sub - net work has a m axim um of 2 7 – 2 or 12 6 possible h osts (a hos t ID of al l zeroes is the s ubnet’s a ddress itse lf, all on es is the s ubnet’s broadcast a ddress). 192.168. 1.0 with m ask 255.255. 255.128 is s ubnet A itself , and 192.16 8.1.127 with mask 255.255. 255.128 i[...]

  • Page 100

    100 Table 30 Subnet 1 IP/SUB NET M ASK NET WORK NUMBER LA ST O CTE T BIT V AL UE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000. 10101000. 0000000 1. 00 000000 Subnet M ask (Binary) 11111111.11111111. 1111111 1. 11 000000 Subnet Addr ess: 192.168.1. 0 Low est Host ID: 19 2.168.1. 1 Broadcast A ddress: 192.168.1. 63 Highe st Host ID:[...]

  • Page 101

    101 Table 33 Subnet 3 IP/SUB NET M ASK NET WORK NUMBER LA ST O CTE T BIT V AL UE IP Address 192.168.1. 128 IP Address (Binary) 11000000. 10101000.00 00000 1. 10 000000 Subnet M ask (Binary) 11111111.11111111. 1111111 1. 11 000000 Subnet Addr ess: 192.168.1. 128 Low est Host ID: 19 2.168.1. 129 Broadcast A ddress: 192.168.1. 191 Highe st Host ID: 1 [...]

  • Page 102

    102 Example : Eight Subnets Similarl y, use a 27 - bit mask to c reate eight s ubnets ( 000, 001, 0 10, 011, 100, 101, 110 and 111). The f ollowing table s hows IP ad dress last octet va lues for eac h subnet. Table 35 Eight Subnets SUBN ET SUBN ET A DDRESS F IRST ADDRESS LA ST A DDRESS B RO AD C AS T A DDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 9[...]

  • Page 103

    103 NO. “BORROWED” HOST BITS SUBN ET M ASK NO. SUBN ETS NO. H OSTS P ER SUBN ET 1 255.255.2 55.128 (/ 25) 2 126 2 255.255.2 55.192 (/ 26) 4 62 3 255.255.2 55.224 (/ 27) 8 30 4 255.255.2 55.240 (/ 28) 16 14 5 255.255.2 55.248 (/ 29) 32 6 6 255.255.2 55.252 (/ 30) 64 2 7 255.255.2 55.254 (/ 31) 128 1 The f ollowing table is a sum mary for subnet [...]

  • Page 104

    104 7 255.255.2 54.0 (/23) 128 510 8 255.255.2 55.0 (/24) 256 254 9 255.255.2 55.128 (/ 25) 512 126 10 255.2 55.255.192 (/ 26) 1024 62 11 255.2 55.255.224 (/ 27) 2048 30 12 255.2 55.255.240 (/ 28) 4096 14 13 255.2 55.255.248 (/ 29) 8192 6 14 255.2 55.255.252 (/ 30) 16384 2 15 255.2 55.255.254 (/ 31) 32768 1 Configuring IP Addres ses W here you obta[...]

  • Page 105

    105 need to ch ange the s ubnet m ask computed b y the MW R102 unless y ou are instruc ted to do otherwis e. Priv ate IP A ddresses Every m achine on the I nternet m ust have a u nique addr ess. If your network s are isolated f rom the Internet ( running on ly between t wo branch of fices, f or exam ple) you can ass ign an y IP a ddresses to the ho[...]

  • Page 106

    106 After the appropriat e TCP/IP com ponents are installed , configure t he TCP/I P settings in order to "comm unicate" with your net work. If y o u manual ly assign IP inform ation instead of using d y nam ic assignm ent, make s ure that your computer s have IP a ddresses that place them in the sa me subnet as the Prest ige’s LAN p or[...]

  • Page 107

    107 Figure 45 W indow s 95/98/Me: Network: Configuration Installing Com pone nts The Network window Conf igura tion tab displa ys a list of installed c omponents . You need a network adapter, the T CP/IP prot ocol and C lient for Microsof t Netwo rks. If y o u need the adapter: 1 In the Network wind ow, click Add . 2 Select A dapter and then c lick[...]

  • Page 108

    108 If y o u need Cl ient for Mic rosof t Networks : 1 Click Ad d . 2 Select Cli ent and the n click Add . 3 Select M icr osoft from the list of m anufac turer s. 4 Select Client for Microsoft Networks from the list of network clients and t hen click OK . 5 Restart your comput er so the cha nges y ou m ade take ef fect. Configuring 1 In the Netw or[...]

  • Page 109

    109 • If y o u kno w y our DNS inf ormation, s elect Enabl e DNS and type the inform ation in the fields below ( you may not ne ed to fill them all in).[...]

  • Page 110

    110 Figure 47 W indow s 95/98/Me: TCP/IP Properties: DNS Con figuration 4 Click the Gatew ay tab. • If y o u do not k now your g atewa y’ s IP ad dress, rem ove previous ly instal led gatewa y s. • If y o u have a gatewa y IP a ddress, type it in the N ew gatew ay field and c lick Ad d . 5 Click OK to save and c lose the T CP/IP Pro pertie s [...]

  • Page 111

    111 1 Click start ( Start in W indows 2000/NT ), Settings , Control Pa nel . Figure 48 W indow s XP: Start Menu 2 In the Control Pane l , do uble - click Network Connec ti ons ( Netw ork and Dial - up Connections in W indows 200 0/NT) . Figure 49 W indow s XP: Control Panel 3 Right - click Local A rea Connection and then cl ick Prop erties .[...]

  • Page 112

    112 Figure 50 W indow s XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP /IP) (under the General tab in W in XP) and th en click Prope rties . Figure 51 W indow s XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Propertie s window op ens (the G eneral t ab in W indows XP). • If y o u have a dyn[...]

  • Page 113

    113 • If y o u have a st atic IP a ddress c lick Use the followin g IP Address and fill i n the IP address , Subnet ma sk , and Def ault gatew ay fields. • Click Advanced . Figure 52 Windows XP: Internet Protocol (TCP /IP) Properties 6 If y ou do not kn ow y our gat eway 's IP a ddress, rem ove an y previousl y installed gatewa y s in t he[...]

  • Page 114

    114 Figure 53 W indow s XP: Advanced TCP/IP Properties 7 In the Internet Protoco l TCP /IP Properties window (the Gene ral tab i n W indows XP): • Click Obtain D NS server a ddress aut omaticall y if you do not k now y ou r DNS server IP address( es). • If y o u kno w y our DNS ser ver IP addr ess(es), click Use the following DNS s erver addres[...]

  • Page 115

    115 Figure 54 W indow s XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Inter net P rotocol (TCP/IP) Pr operties window. 9 Click Close ( OK in W indows 2000/ NT) to c lose the Local Area Co nnection Prope rties win dow. 10 Close the Network Connections window ( Network and Dia l-up Connection s in W indows 2000/NT) . 11 T urn on y[...]

  • Page 116

    116 2 Click on Control Pa nel. Figure 55 Wi ndows 7/Vista 3 Click on Network and Internet . Figure 56 Windows 7/Vista 4 Click on Network and Sharing Ce n ter[...]

  • Page 117

    117 Figure 57 Windows 7/Vista 5 On the lef t side of the s creen c lick on Change Adapter Setti ngs (W indows 7), or Man age Ne twork Conne c tions (Vista). 6 Right click on Local Area Connection and select Properties . Figure 58 Windows 7/Vista 7 Highlight Inter net Protocol Versi on 4 and click Propert ies .[...]

  • Page 118

    118 Figure 59 Windows 7/Vista 8 Select Use the Following I P Address and enter your IP addr ess, Su bnet Mas k , and Default G atewa y. Enter your DNS ser ver addres s (if t rying to c onnect t o the int ernet) and click OK . Figure 60 Windows 7/Vista 9 Click OK or Close on the Local Are a Connect ion Properti es window to a pply the settings .[...]

  • Page 119

    119 Macintosh OS 8/9 1 Click the A pple menu, Control Panel and dou ble - click TCP/IP to open the T CP/I P Control P anel . Figure 61 Macintosh O S 8/9: Apple Menu 2 Select Ethernet built - in from the Connect via list.[...]

  • Page 120

    120 Figure 62 Macintosh OS 8/9: TCP/IP 3 Fo r dynam ically assigned s ettings, s elect Using DHCP S erver from the Configure: list. 4 For statica lly assigned settings, do the follo wing: • From the Configure box, s elect M anually . • T y pe your IP ad dress in t he IP A ddr ess box. • T y pe your subn et mask in the Subnet mask box. • T y[...]

  • Page 121

    121 Figure 63 Macintosh O S X: Apple Menu 2 Click Network in the icon b ar. • Select A utomati c from the Locati on list. • Select Built - in E ther net from the Show list. • Click the T CP/IP tab. 3 For dynam icall y assig ned settings , select Using DHC P f rom the Configure list.[...]

  • Page 122

    122 Figure 64 Macintosh OS X: Ne twork 4 For statica lly assigned settings, do the follo w ing: • From the Configure box, s elect M anually . • T y pe your IP ad dress in t he IP A ddr ess box. • T y pe your subn et mask in the Subnet mask box. • T y pe the IP addr ess of y our Prestig e in the Rout er address box. 5 Click Apply Now and clo[...]

  • Page 123

    123 Linux This s ection shows you how to conf igure your comput er’s TCP/IP s ettings in Red Hat Lin ux 9.0. Procedur e, screens an d file location m ay var y depe nding on your L inux distri bution an d release version. Note: Make sure you are logged in as the root administrator. Using the K Desktop Environment (KDE) Follow th e steps be low to [...]

  • Page 124

    124 Figure 66 Red Hat 9.0: KDE: Ethernet Device: General • If y o u have a dynamic I P address c lick A utomatically obtain IP addr ess settings with and select dhcp from the drop down list. • If y o u have a st atic IP a ddress c lick Staticall y set IP A dd resses and fill in the Address , Subnet mask , and Default Gatew ay Address f ields. 3[...]

  • Page 125

    125 6 Click the Activate butto n to apply the changes. T he follo wing screen dis plays. Cl ick Yes to sav e the chan ges in all s creens. Figure 68 Red Hat 9.0 : KDE: Network Configuration: Activate 7 After the network card restart proc ess is com plete, m ake sure t he Sta tus is Act i v e in the Network Configurati on scr een. Using Configuratio[...]

  • Page 126

    126 DEVICE=eth0 ONBOOT=yes BOOTPROTO=s tatic IPADDR= 192.168.100 .10 NETMASK= 255.255.255.0 USERCTL=no PEERDNS=yes TYPE= Ethernet 2 If you k now your DNS s erver IP address(es ), enter the DNS server i nform ation in the resolv.co nf file in th e /etc dir ectory. The f ollowing fig ure shows a n example where two DNS ser ver IP addres ses are s pec[...]

  • Page 127

    127 Appe ndix D Appendix D Wireless LANs Wireless L A N T opologie s This secti on di scusses ad - hoc and infras tructure wire less LAN t opologies. Ad - hoc Wireles s LA N Configuration The sim plest W LAN configuratio n is an ind ependent ( Ad - hoc) W LAN that connec ts a set of computers with wireless s tations (A, B, C) . A n y time t wo or m[...]

  • Page 128

    128 BSS A Basic S ervice Set ( BSS) exis ts when all com munic ations between wireless stations or be tween a wireless station and a wir ed network client go throu gh one ac cess point ( AP). Intra - BSS tr affic is traffic between wireless s tations in t he BSS. W hen Intra - BSS is enabled, wireless station A an d B can ac cess the wired networ k[...]

  • Page 129

    129 An ESSID ( ESS IDent ification) uniquel y identifies eac h ESS. Al l access po ints and their associated wireless stations within the sam e ESS m ust have the sam e ESSID in order to comm unicate.[...]

  • Page 130

    130 Figure 76 In fras tru c ture WLAN Channel A channe l is the radio frequ ency(ies) us ed by IEEE 802.11a/b/ g wireless d evices. Channe ls availab le depend on your geogra phical ar ea. You m ay have a choic e of chann els (f or your region) so you shou ld use a different chan nel than a n adjacen t AP (acc ess point) to r educe int erference. I[...]

  • Page 131

    131 W hen station A sends data to th e AP, it m ight not know that the sta tion B is a lready usi ng the channel. If these t wo stations send data at t he sam e tim e, collisions m ay occur when both sets of data arriv e at the A P at the s ame tim e, resulting in a loss of messages f or both stations. RTS/CTS is des igned to pr event collis ions d[...]

  • Page 132

    132 If the Fragmentation Threshol d value is sm aller than the RT S/CTS value (see pr evious l y) y ou set then th e RTS (Req uest T o Send)/CTS ( Clear to Se nd) handshak e will ne ver occur as data fram es will be fragm ented befor e they reac h RTS/CT S si ze. Preamble Type A pream ble is used to s ynchr onize the trans miss ion timing in y our [...]

  • Page 133

    133 Table 38 IEEE 802.11g D AT A R AT E (MB PS) MODULATION 1 DBPSK (D ifferential Binary Ph ase Shift K eyed) 2 DQPSK ( Differential Q uadrat ure Pha se Shift Keyin g) 5.5 / 11 CC K (Complemen tary Code K eying) 6/9/12/18/ 24/36/48 /54 OFDM (Orthog onal Fr equency Division M ultiplexing) IEEE 802.1x In June 20 01, the IE EE 802.1x s tandard was des[...]

  • Page 134

    134 Determ ines the net work services availab le to authentic ated user s once the y are connect ed to the net work. • Account ing Keeps trac k of the client’s net work activit y. RADIUS is a simple p ackage exc hange in wh ich your AP acts as a m essage r elay between t he wireless station and t he networ k RADIUS s erver. Types of RAD IUS Mes[...]

  • Page 135

    135 The t ype of authent ication you us e depends o n the RADI US server or the AP. C onsult your network administrator for mor e inform ation. E AP - MD5 ( Message - Digest A lgorithm 5) MD5 auth entication is the sim plest one - way auth entication method. T he authentic ation serv er sends a cha llenge t o the wireless station. T he wireles s st[...]

  • Page 136

    136 Dyn amic WEP Key Exchange The AP m aps a uniqu e key that is generat ed with the RADIUS ser ver. This key ex pires when th e wireless connection times out, d isconnects or reauthen tication t imes out. A new W EP k ey is generated each tim e reauthentica tion is per formed. If this f eature is ena bled, it i s not neces sary to conf igure a def[...]

  • Page 137

    137 W P A( 2 ) Wi - Fi Protec ted Access (WPA) is a subset of the IEEE 802. 11i stan dard. W PA2 (IEEE 802. 11i) is a wireless securit y standard tha t defines s tronger enc ryption, au thenticat ion and k e y managem ent than W PA. Key dif ferences bet ween WPA(2) and W EP are impr oved data encr yption and use r authent ication. En cryption Both [...]

  • Page 138

    138 password - gues s i ng attac k s but it's s till an im provement over W EP as it em ploys an easi er - to - use, consistent, single, al phanum eric pass word. U ser A uthenticatio n W PA or W PA2 applies I EEE 802.1x a nd Extens ible Authe ntication Pr otocol ( EAP) to authen ticat e wireless clients usin g an ext ernal RADIU S databas e. [...]

  • Page 139

    139 Figu re 78 W PA( 2) - PSK Authentication WP A ( 2) w ith RADIUS A pp lication Example You need th e IP addres s of the R ADIUS ser ver, its por t number ( default is 18 12), and the RADIUS s hared secr et. A W PA(2) applicat ion exam ple with an exter nal RADI US server l ooks as fo llows. "A" is the R ADIUS server. "DS " is[...]

  • Page 140

    140 Table 40 W ireless Security Relational Matrix AUTHENTIC A T ION METHOD/ KEY M A N A GEM ENT PROTOCOL ENCRYPTI ON M ET HO D ENTER M AN U A L K E Y IEEE 802. 1X Open N one No Disable Enable w ithout Dyna mic W EP Key Open WEP No Enable w ith Dynami c WEP Key Yes Enable w ithout Dyna mic W EP Key Yes Disable Shared WEP No Enable w ith Dynami c WEP[...]

  • Page 141

    141 Appe ndix E Appendix E Common Servi ces The f ollowing table lists som e comm only - used services and their as sociated prot ocols and p ort number s. For a com prehensive list of port num bers, IC MP type/cod e number s and services , visit the IAN A (Internet As signed Num ber Aut hority) web s ite. • Name : T his is a short, descripti ve [...]

  • Page 142

    142 servers. BGP TCP 179 Border Gateway Pr otocol. BOOTP_CLIENT UDP 68 DHCP Client. BOOTP_SERVER UDP 67 DHCP Serv er. CU -SEEME TCP UDP 7648 24032 A popular v ideoconfer encing s olution fr om White Pine s Softw are. DNS TCP/UDP 53 Domain Nam e Server, a servic e that matches w eb names (f or example http://us.zyx e l.com ) to IP n umbers. ESP (IPS[...]

  • Page 143

    143 IG MP (MUL TICA ST) User - Defined 2 Internet G roup M anagement P rotocol i s used w hen sending pa ckets to a specifi c group of hosts. IKE UDP 500 The I nternet Key Exchange a lgorith m is used for key distri bution an d m anage me nt. IRC TCP/UDP 6667 This is anot her popular Intern et chat program. MSN M ess enger TCP 1863 M icrosoft Netwo[...]

  • Page 144

    144 RC MD TCP 512 Remote Comman d Service. REAL_AUDIO TCP 7070 A streami ng audio serv ice t hat enables real time so und over the web. REXEC TCP 514 R emote Ex ecution Daem on. RLOGIN TCP 513 Remote Login. RTELNET TCP 107 Remote T elnet. RTSP TCP/UDP 554 The Real T ime Strea ming (media control) Protocol (R TSP) is a remote c ontrol for multimedia[...]

  • Page 145

    145 TACACS UDP 49 Login Host Protocol used for ( Terminal Access C ontroller A ccess Con trol Sy stem) . TELN ET TCP 23 Telnet is the login and t ermina l emulati on protocol commo n on the I nter net and in UNIX environments. It operate s over TCP/I P networks. Its primary function is to allow user s to log int o remote host system s. TFTP UDP 69 [...]

  • Page 146

    146 Appe ndix F Appendix F Legal In formation Cop y righ t Cop y r ight © 201 0 by Z y XE L Comm unications Corpor ation. The cont ents of this publica tion ma y not be r eproduce d in an y part or as a w hole, tr anscribed, stored in a r etrieva l system, tr anslated int o any langu age, or tr ansmitted i n any form or by any means , electronic, [...]

  • Page 147

    147 This devic e has bee n tested and f ound to com ply with the limits for a Class B di git al dev ice pursuant to Part 15 of the FCC Rules. T hese lim its are designed to provide r easonable pr otection against h armful interf erence in a residen tial insta llation. This device gener ates, us es, and can radiate rad io frequenc y ener gy, and if [...]

  • Page 148

    148 Indust ry Canada Stat ement This devic e com plies with RSS - 2 10 of the In dustry Ca nada Rules. O peration is subject to t he following two cond itions: 1 this devic e ma y not cause interf erence and 2 this d evice m ust accept any i nterference, including interfer ence that ma y cause undesired operation of the dev ice This devic e has bee[...]

  • Page 149

    149 product h as been m odified, m isused, tam pered with, d amaged b y an act of God, or subjected t o abnorm al working con dition s. Note Repair or r eplacem ent, as prov ided under t his warrant y, is the ex clusive rem edy of the pur chaser. This warrant y is in l ieu of all ot her warra nties, expres s or implied, includin g any implied warra[...]

  • Page 150

    150 App endix G Open Source Licenses Article I. End -User Lic ense A g reement for “ MWR102 ” Article II. WARNING: Z y XEL Communic ations Cor p. IS W ILLING TO LICENSE THE SO FTW ARE TO YOU ONLY UPON T HE CONDITION T HAT YOU ACCEPT ALL OF THE TERMS CONT AINED IN T HIS LIC ENSE AGREE MENT. P LEASE READ T HE TERM S CAREF ULLY BEF ORE CO MPLET IN[...]

  • Page 151

    151 not excee d the scope of the l icense grante d hereunde r. Any rights not expres sly grante d by ZyXEL to you are res erved b y ZyXEL, and all im plied licenses are discla imed. 2.Ownersh ip You have no ownersh ip rig ht s in the Sof tware. Rat her, you h ave a lice nse to use the Software as long as t his License A greement r emains in full fo[...]

  • Page 152

    152 License Agr eem ent to those persons emplo yed by y ou who c ome into c ontact with t he Software, and to use reasonab le best eff orts to ensure their com pliance with s uch terms and condi tions, inc luding, witho ut limitati on, not k nowingl y permitting suc h persons to use any port ion of the Sof tware f or the purpose of deriving the sou[...]

  • Page 153

    153 INCLUDING REASONA BLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE O UT OF ANY BRE ACH OF T HIS SEC TION 8. 9.Audit Ri ghts ZyXEL SHALL H AVE T HE RIGHT , AT IT S OW N EXPENSE, UPON R EASON ABLE PRIOR NOTICE, TO PER IO DICALL Y INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMP LIANCE W ITH THE TERMS AND CONDITIONS OF T HIS LICEN SE AG[...]

  • Page 154

    154 Article III. Article IV. NOT E: Some c omponents of this product inc orporate f ree softwar e program s covered un der the op en source co de licens es which a llows you t o freel y copy, modif y and redistrib ute the sof tware. For at least three (3) years f rom the date of distributi on of the a pplicabl e product or s oftware, w e will give [...]

  • Page 155

    155 igmppr oxy v1.2 http://sour ceforge.ne t/projec ts/igmppr oxy/ GPLv2 iproute2 - 2. 6.29 -1 v2.6.19 http://www .linuxf oundation.or g/collaborate/ w ork groups/network ing/iproute2 GPLv2 iptables - 1.4.4 v1.4.4 http://www. netfilter.org/ about.htm l#license http://www .netfilter .org/projec ts/iptables /dow nloads.htm l#iptables - 1.4.4 GPLv2 l2[...]

  • Page 156

    156 Notice Information herein is subject to chang e without notice. C ompanies, names, and da ta used in examples herein ar e fictitious unless o therwise noted. N o part may be reproduced or transmitted in any form or by any means, electronic or m ec hanical, for any purpose, except the ex press written p ermissio n of Zy XEL Com munication s Corp[...]

  • Page 157

    157 rights that you hav e. You must mak e sure that they , too, rece ive or can get the so urce co de. And yo u must sh ow the m these term s so the y know the ir rights. We protec t your rights with two s teps: (1) co pyright the so ftware, and (2) offer you thi s li cense whi ch giv es you leg al permi ssion to copy, dist ribu te and/ or modi fy [...]

  • Page 158

    158 2. You m ay modi fy your copy or c opies of th e Progra m or any po rtion of it, thus for ming a work based on the P rogram, and copy and distribute s uch modifications o r wor k under the te rms of Section 1 ab ove, provided that yo u als o m ee t a ll of th e se co nd it ions : a) Y ou must cause the modified files to carry prominent notices [...]

  • Page 159

    159 medi um cust om aril y used f or soft ware i nterch ange; or, c) A ccomp any i t wi th the i nformat ion you rec eived as to the of fer to dist ribut e corresp ondi ng sou rce co de. (T his alte rnat ive is allow ed on ly f or non com me rc ial d istr ibutio n and o nly if you recei ved the pro gram i n o bject code or executable fo rm with suc[...]

  • Page 160

    160 then the o nly way you could satisfy both it a nd this License would be to refrai n enti rely from distri buti on of the Pr ogram . If any p ortion of thi s secti on is held inva lid or un enforce able under any particular circums tance , the balance of the s ection is intended to apply and the sec tion as a whole is intended to apply in oth er[...]

  • Page 161

    161 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALI TY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING , REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR AN[...]

  • Page 162

    162 To prot ect y our ri ghts, we need to p revent others f rom d enyin g you th ese rig hts or a sking you to s urren der th e rig hts. The refore , you h ave ce rtai n respons ibilities if you distr ibute copies of the softwa re , or if you modify it: responsi bili ties t o respe ct the f reed om of ot hers . For exa mple, i f you dist ribu te co[...]

  • Page 163

    163 To “mod ify” a work m eans to copy from or ada pt al l or part of the w ork i n a fashion re quiring copyright per mission, other than the mak ing of an exact copy. Th e resu ltin g work i s call ed a “m odified versi on” of the earl ier w ork or a work “b ased on” th e ear lier wo rk. A “cov ered w ork” m eans either t he un mo[...]

  • Page 164

    164 acti viti es. Howev er, i t does n ot in clud e the wor k's Sys tem Li brari es, or gene ral - pu rpose t ools o r genera ll y avail able fre e prog rams wh ich a re used unmodified in perf orming those ac tivities but which are no t part of the work. For exa mple, Corr espon ding Source i ncl udes i nterface d efini tion files associ ated[...]

  • Page 165

    165 work a s a mea ns of enforci ng, agains t the wo rk's us ers, you r or t hird p arti es' leg a l rig hts to f o rbid c ircu m ve ntion of techn olo gic al m e a sure s. 4. Conveyin g Verbatim Cop ies. You may conve y verbati m copi es of th e Progra m's sou rce cod e as you re c ei ve it, in any medium, pro vided that yo u conspi[...]

  • Page 166

    166 6. Conveyin g Non - Sou rce Form s. You ma y con vey a co vered work i n obje ct code form under the term s of sec tions 4 and 5, provided t ha t you also co nvey the m a chine - readab le Corr espondi ng Sou rce u nder th e term s of th is Li cense, i n one o f thes e way s: a) C onvey the objec t code in, or embodied in, a physical pro duct ([...]

  • Page 167

    167 by a pa rticu lar u ser, “n ormal ly used ” refe rs to a typi cal or c ommon use of that class of produc t , rega rdless of the statu s of th e part icul ar user o r of th e way in which th e particul ar user actu all y uses, or ex pects o r is expe cted to u se, the product. A product is a consumer product re gardless of whethe r the produ[...]

  • Page 168

    168 ma teri al, ad ded by y ou to a cove red work , for whi ch you h ave or ca n gi ve appropriate c opyright permiss ion. Notwithstand ing any o ther provision of this L ic ense, for m a ter ial you add to a covere d work , you may (if authorized by the copyright holders of that ma teri al) su pplem ent the t erms o f thi s Licen se wi th t erms: [...]

  • Page 169

    169 (includ ing any pate nt lice nses gra nt ed under the third paragr aph of section 11). Howev er, i f you c ease al l viol ation of thi s Licen se, then your l icen se from a particular c opyright holder is reinstated (a) provis ionally, un less and unt il the copyright holder e xplicitly and fina lly terminates your license, and (b) pe rm ane n[...]

  • Page 170

    170 counterc laim in a laws uit) a l leg ing that any patent cla im is infringed by maki ng, u sing, sel lin g, offeri ng for sa le, o r imp ortin g the Pr ogram or an y porti on of i t. 11. Patents. A “contribu tor ” is a copyr ight holder w ho author izes use und e r this Lice nse of the Pr ogram or a wo rk on whi ch the Pr ogram is bas ed. T[...]

  • Page 171

    171 A pa tent lic en se is “dis c rimin at o ry” if it do e s not inc lude w ith in the sc ope o f it s coverag e, proh ibi ts the exe rcise of, or i s c on di tioned on the non - e xerci se of one or mor e of th e rig hts th at are sp ecif ically g ranted und er thi s License . You ma y not convey a cov ered wor k if you are a party to an a rr[...]

  • Page 172

    172 publi shed b y the F ree Soft ware F ounda tion . If th e Prog ram doe s not s peci fy a vers ion number of the GNU Gene ral Public L icense , you m ay cho ose any versi on eve r publ ished by the F ree Sof tware Foun dation . If the Progr am specifies that a prox y can decide which futur e vers ions of the GNU G eneral Publi c Li cense can be [...]

  • Page 173

    173 How to App ly These T erms to Your Ne w Programs If you deve lop a new program, and you want it to be of the greatest possible use to the public, the be st way to achieve this is to make it free software which ev eryo ne ca n re distribute and chang e unde r thes e term s. To do so, attac h the following notices to the program. It is safes t to[...]

  • Page 174

    174 library. I f this is what you want to do, use the GN U Less er Gen eral Publi c Licen se ins tead of t his L icen se. But first, p leas e read < http://www.gnu.o rg/philosophy/why- no t - lgpl.html >. This Pr oduct includes libnl - 1.1 , li busb - 0. 1.12 under the GN U Lesser Pub lic Licens e GNU LESSER G ENERA L PUBLIC LICENSE Version 2[...]

  • Page 175

    175 For exam ple, if you distribut e copies of the librar y, whether gratis or for a fee, y ou m ust give the recipients all the r ights that we gave you. You m ust m ake sure that th ey, too, receive or can get the sour ce code. If you link other c ode with the librar y, you m ust provide com plete objec t f ile s to the rec ip ie nts, so that the[...]

  • Page 176

    176 Although the Lesser Gener al Public License is Less protective of the user s' freedom , it does ens ure that the us er of a pr ogram that is linked w ith the Libr ary has the f reedom and the w herewithal to run that program using a m odified versio n of the Li brary. The prec ise terms and condit ions for copying, distributi on and m odif[...]

  • Page 177

    177 modif ied work mus t itself be a soft ware library. b) You m ust cause the f iles modified to carr y prom inent notices stating that you cha nged the f iles and th e date of an y cha nge. c) You mus t cause the whole of the work to be licensed at no c harge to all thir d parties under the terms of this Licens e. d) If a f acilit y in the m odif[...]

  • Page 178

    178 Librar y" . Such a work, in isolat ion, is not a derivativ e work of the Librar y, and therefore falls outsi de the scop e of this License. However, li nki ng a " work that uses t he Librar y" with the L ibrar y creat es an exe cutable that is a derivati ve of the Librar y (because it conta ins portio ns of th e Librar y ), r ath[...]

  • Page 179

    179 exceptio n, the mat erials to be distribut ed need not include an y thing t hat is norm ally distribute d (in either so urce or binar y form) with th e major com ponents (com piler, kernel, and so on) of the operat ing s ystem on which th e exec utab le runs , unles s that c om ponent itself acc ompanies th e executabl e. It m ay happen that th[...]

  • Page 180

    180 apply in oth er circ ums tances. It is not the purpos e of this section to i nduce you to inf ringe any patents or other proper ty right c laims or to contest validity of an y such claims ; this section h as the sole pur pose of pr otecting the int egrity of the f ree softw are distribut ion system which is im plem ented by public license pr ac[...]

  • Page 181

    181 THE LI BRARY (I NCLUD ING BUT NOT LIMIT ED TO LOSS OF DAT A OR DATA BEING REND ERED INACC URAT E OR LOSSE S SUSTAI NED BY YOU OR THIRD PART IES OR A FAIL URE OF T HE LIBR ARY TO OPERAT E W ITH ANY OTHER SO FTW AR E), EVEN IF SUCH HO LDER OR OTHER PART Y HAS BEEN ADVIS ED OF THE POSSIBI LITY O F SUCH DAMAGE S. END OF TERMS AND CO NDITIONS. This [...]

  • Page 182

    182 Zlib License zli b.h -- interf a ce of th e 'zli b' gen eral pu rpose compre ssion libra ry ver sion 1.2.2, October 3rd, 20 04 Copyright (C) 1995- 200 4 Jean - loup Gailly and Mark Adler Thi s software i s provi ded 'as - is', without any express or implied warranty. In no eve nt will the autho rs be h e ld li able for an y [...]

  • Page 183

    183 product, an a c knowledgment in the pro duct documentation would be appreciated but is no t re quired. 2. Alt ered sourc e versi ons must be p lai nly ma rked as s uch, and mu s t not be mi srepr esented as b eing the ori gin al softwar e. 3. Thi s noti ce may not be r emoved or al tered f rom an y sourc e distribution. Jean - l oup Gailly Mark[...]