NBG-419N Wireless N Home Router Default Login Details IP Address http://192.168.1.1 Password 1234 Firmware Version 1.0 Edition 2, 5/2009 www.zyxel.com www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NBG-419N using the Web Configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Related Documentation • Quick Start Guide The Quick Start Guide is designed to help you get up and running right away. It contains information on setting up your network and configuring for Internet access.
About This User's Guide Customer Support In the event of problems that cannot be solved by using this manual, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/ web/contact_us.php for contact information. Please have the following information ready when you contact an office. • Product model and serial number. • Warranty Information. • Date that you received your device.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NBG-419N may be referred to as the “NBG-419N”, the “device”, the “product” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG-419N icon is not an exact representation of your device.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. • Do NOT open the device or unit.
Safety Warnings 8 NBG-419N User’s Guide
Contents Overview Contents Overview Introduction ............................................................................................................................ 19 Getting to Know Your NBG-419N .............................................................................................. 21 Connection Wizard .................................................................................................................... 25 Introducing the Web Configurator ...................................
Contents Overview Reset/Restart ........................................................................................................................... 211 Sys OP Mode .......................................................................................................................... 213 Troubleshooting ....................................................................................................................... 217 Appendices and Index ...................................................
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 5 Safety Warnings........................................................................................................................ 7 Contents Overview .......................................................
Table of Contents 3.2 Accessing the Web Configurator ......................................................................................... 37 3.2.1 Login Screen .............................................................................................................. 38 3.2.2 Password Screen ....................................................................................................... 39 3.2.3 Home Screen ......................................................................................
Table of Contents 7.3 Status Screen ...................................................................................................................... 64 7.3.1 Navigation Panel ........................................................................................................ 67 Chapter 8 Access Point Mode ................................................................................................................. 71 8.1 Overview ................................................................
Table of Contents 11.1 Overview ............................................................................................................................ 99 11.2 What You Can Do ............................................................................................................ 100 11.3 What You Should Know ................................................................................................... 100 11.3.1 Wireless Security Overview ......................................................
Table of Contents 14.1 Overview .......................................................................................................................... 139 14.2 What You Can Do ............................................................................................................ 139 14.3 General Screen ............................................................................................................... 139 14.4 Advanced Screen .............................................................
Table of Contents 19.4 General Firewall Screen 19.5 Services Screen ............................................................................................... 163 ........................................................................................................... 163 Chapter 20 Content Filter......................................................................................................................... 167 20.1 Overview ................................................................
Table of Contents 23.4 UPnP Screen .................................................................................................................. 188 23.5 Technical Refereance ...................................................................................................... 189 23.5.1 Using UPnP in Windows XP Example ................................................................... 189 23.5.2 Web Configurator Easy Access .............................................................................
Table of Contents 29.2 What You Can Do ............................................................................................................ 211 29.3 Reset/Restart Screen ...................................................................................................... 211 Chapter 30 Sys OP Mode ......................................................................................................................... 213 30.1 Overview ...............................................................
P ART I Introduction Getting to Know Your NBG-419N (21) Connection Wizard (25) Introducing the Web Configurator (37) NBG-419N Modes (49) Monitor (43) Tutorials (89) 19
CHAPTER 1 Getting to Know Your NBG-419N 1.1 Overview This chapter introduces the main features and applications of the NBG-419N. The NBG-419N extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/n compatible devices. A range of services such as a firewall and content filtering are also available for secure Internet computing.
Chapter 1 Getting to Know Your NBG-419N 1.3 Ways to Manage the NBG-419N Use any of the following methods to manage the NBG-419N. • Web Configurator. This is recommended for everyday management of the NBG419N using a (supported) web browser. • Wireless switch. You can use the built-in switch of the NBG-419N to turn the wireless function on and off without opening the Web Configurator. • WPS (Wi-Fi Protected Setup) button.
Chapter 1 Getting to Know Your NBG-419N The following table describes the LEDs and the WPS button. Table 1 Front Panel LEDs and WPS Button LED COLOR STATUS DESCRIPTION POWER Green On The NBG-419N is receiving power and functioning properly. Off The NBG-419N is not receiving power. On The NBG-419N is ready, but is not sending/ receiving data through the wireless LAN. Blinking The NBG-419N is sending/receiving data through the wireless LAN. Off The wireless LAN is not ready or has failed.
Chapter 1 Getting to Know Your NBG-419N 24 NBG-419N User’s Guide
CHAPTER 2 Connection Wizard 2.1 Overview This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP for your Internet account information. Leave a field blank if you don’t have that information. 2.2 Accessing the Wizard Launch your web browser and type "http://192.168.1.1" as the website address. Type "1234" (default) as the password and click Login.
Chapter 2 Connection Wizard 2.3 Connect to Internet The NBG-419N offers five Internet connection types. They are Static IP, DHCP, PPPoE, PPTP or L2TP. The wizard attempts to detect which WAN connection type you are using. Figure 4 Detecting your Internet Connection Type If the wizard does not detect a connection type, you must select one from the drop-down list box. Check with your ISP to make sure you use the correct type. Note: If you get an error message, check your hardware connections.
Chapter 2 Connection Wizard Table 2 Internet Connection Type CONNECTION TYPE DESCRIPTION PPPoE Select the PPPoE (Point-to-Point Protocol over Ethernet) option for a dial-up connection. PPTP Select the PPTP (Point-to-Point Tunneling Protocol) option for a dial-up connection, and your ISP gave you an IP address and/or subnet mask. L2TP Select the L2TP (Layer 2 Tunnel Protocol) if you are connecting to another device over another network (like the Internet or VPN). 2.3.
Chapter 2 Connection Wizard 2.3.2 Connection Type: Static IP Choose Static IP as the Internet Connection Type if your ISP assigned an IP address for your Internet connection. Click Next. Figure 7 Internet Connection Type: Static IP The following table describes the labels in this screen. Table 3 Internet Connection Type: Static IP LABEL DESCRIPTION Internet Connection Type Select the Static IP option. IP Address Enter the IP address provided by your ISP.
Chapter 2 Connection Wizard personal computer interacts with a broadband modem (for example DSL, cable, wireless, etc.) to achieve access to high-speed data networks. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for instance, RADIUS). One of the benefits of PPPoE is the ability to let end users access one of multiple network services, a function known as dynamic service selection.
Chapter 2 Connection Wizard Table 4 Internet Connection Type: PPPoE LABEL DESCRIPTION Back Click this to return to the previous screen. Next Click this to continue. 2.3.4 Connection Type: PPTP Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks.
Chapter 2 Connection Wizard Table 5 Internet Connection Type: PPTP LABEL DESCRIPTION PPTP Gateway IP Address Type the gateway IP address of the PPTP server. PPTP Server IP Address Type the server IP address of the PPTP server. User Name Type the user name given to you by your ISP. Password Type the password associated with the User Name above. Exit Click this to close the wizard screen without saving. Back Click this to return to the previous screen. Next Click this to continue. 2.3.
Chapter 2 Connection Wizard Table 6 Internet Connection Type: L2TP LABEL DESCRIPTION L2TP Gateway IP Address Type the gateway IP address of the L2TP server. L2TP Server IP Address Type the server IP address of the L2TP server. User Name Type the user name given to you by your ISP. Password Type the password associated with the User Name above. Exit Click this to close the wizard screen without saving. Back Click this to return to the previous screen. Next Click this to continue.
Chapter 2 Connection Wizard 2.4 Router Password Change the login password in the following screen. Enter the new password and retype it to confirm. Click Next to proceed with the Wireless Security screen. Figure 12 Router Password 2.5 Wireless Security Configure Wireless Settings. Configure the wireless network settings on your NBG419N in the following screen. The fields that show up depend on the kind of security you select. 2.5.
Chapter 2 Connection Wizard The following table describes the labels in this screen. Table 7 Wireless Security: No Security LABEL DESCRIPTION Wireless Network Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. Security mode Select a Security level from the drop-down list box. If you change this field on the NBG-419N, make sure all wireless stations use the same SSID in order to access the network.
Chapter 2 Connection Wizard The following table describes the labels in this screen. Table 8 Wireless Security: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Wireless Network Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. Security mode Select a Security level from the drop-down list box. If you change this field on the NBG-419N, make sure all wireless stations use the same SSID in order to access the network.
Chapter 2 Connection Wizard You have successfully set up your NBG-419N to operate on your network and access the Internet. You are now ready to connect wirelessly to your NBG-419N and access the Internet.
CHAPTER 3 Introducing the Web Configurator 3.1 Overview This chapter describes how to access the NBG-419N Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG-419N via Internet browser. Use Internet Explorer 6.0 and later or Netscape Navigator 7.0 and later versions or Safari 2.0 or later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 3 Introducing the Web Configurator 3.2.1 Login Screen Note: If this is the first time you are accessing the Web Configurator, you may be redirected to the Wizard. Refer to Chapter 2 on page 25 for the Connection Wizard screens. The Web Configurator initially displays the following login screen. Figure 16 Login screen The following table describes the labels in this screen. Table 9 Login screen LABEL DESCRIPTION Password Type "1234" (default) as the password.
Chapter 3 Introducing the Web Configurator 3.2.2 Password Screen You should see a screen asking you to change your password (highly recommended) as shown next. Figure 17 Change Password Screen The following table describes the labels in this screen. Table 10 Change Password Screen LABEL DESCRIPTION New Password Type a new password. Retype to Confirm Retype the password for confirmation. Apply Click Apply to save your changes back to the NBG-419N.
Chapter 3 Introducing the Web Configurator The Home screen displays as follows. Figure 18 Home Screen The following table describes the labels in this screen. Table 11 Home Screen LABEL DESCRIPTION Go Click this to open the Easy mode Web Configurator. Language Select a language to go to the Easy mode Web Configurator in that language and click Login. (This is just an example). This shows the current weather, either in celsius or fahrenheit, of the city you specify in Section 3.2.3.1 on page 40.
Chapter 3 Introducing the Web Configurator The following table describes the labels in this screen. Table 12 Change Weather LABEL DESCRIPTION o Choose which temperature unit you want the NBG-419N to display. o C or F Change Location Select the location for which you want to know the weather. If Finish Click this to apply the settings and refresh the date and time display. the city you want is not listed, choose one that is closest to it. 3.2.3.
Chapter 3 Introducing the Web Configurator 3.3.1 Procedure to Use the Reset Button 42 1 Make sure the power LED is on. 2 Press the RESET button for longer than 1 second to restart/reboot the NBG-419N. 3 Press the RESET button for longer than five seconds to set the NBG-419N back to its factory-default configurations.
CHAPTER 4 Monitor 4.1 Overview This chapter discusses read-only information related to the device state of the NBG-419N. Note: To access the Monitor screens, you can also click the links in the Summary table of the Status screen to view the bandwidth consumed, packets sent/ received as well as the status of clients connected to the NBG-419N. 4.2 What You Can Do • Use the BW MGMT Monitor screen (Section 4.
Chapter 4 Monitor The monitor shows what kinds of applications are running in the network, the maximum kbps that each application can use, as well as the percentage of bandwidth it is using. Figure 21 Summary: BW MGMT Monitor 4.4 DHCP Table DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG-419N’s LAN as a DHCP server or disable it.
Chapter 4 Monitor The following table describes the labels in this screen. Table 14 Summary: DHCP Table LABEL DESCRIPTION # This is the index number of the host computer. MAC Address This field shows the MAC address of the computer with the name in the Host Name field. Every Ethernet device has a unique MAC (Media Access Control) address which uniquely identifies a device. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02.
Chapter 4 Monitor The following table describes the labels in this screen. Table 15 Summary: Packet Statistics LABEL DESCRIPTION Port This is the NBG-419N’s port type. Status For the LAN ports, this displays the port speed and duplex setting or Down when the line is disconnected.
Chapter 4 Monitor The following table describes the labels in this screen. Table 16 Summary: Wireless Association List LABEL DESCRIPTION # This is the index number of an associated wireless station. MAC Address This field displays the MAC address of an associated wireless station. Association Time This field displays the time a wireless station first associated with the NBG-419N’s WLAN network. Refresh Click Refresh to reload the list.
Chapter 4 Monitor 48 NBG-419N User’s Guide
CHAPTER 5 NBG-419N Modes 5.1 Overview This chapter introduces the different modes available on your NBG-419N. First, the term “mode” refers to two things in this User’s Guide. • Web Configurator mode. This refers to the Web Configurator interface you want to use for editing NBG-419N features. • Device mode. This is the operating mode of your NBG-419N, or simply how the NBG-419N is being used in the network. 5.1.
Chapter 5 NBG-419N Modes The following figure is a simple illustration of the device configuration modes of the NBG-419N. Figure 25 Device Mode Example For more information on these modes and to change the mode of your NBG-419N, refer to Chapter 30 on page 213. The menu for changing device modes is available in Expert mode only. Note: Choose your Device Mode carefully to avoid having to change it later. When changing to another mode, the IP address of the NBG-419N changes.
CHAPTER 6 Easy Mode 6.1 Overview The Web Configurator is set to Easy Mode by default. You can configure several key features of the NBG-419N in this mode. This mode is useful to users who are not fully familiar with some features that are usually intended for network administrators. When you log in to the Web Configurator, the following screen opens.
Chapter 6 Easy Mode Click Status to open the following screen screen. Figure 27 Easy Mode: Status Screen Navigation Panel Go to Network Map Screen Status Screen Control Panel 6.2 What You Can Do You can do the following in this mode: • Use this Navigation Panel (Section 6.4 on page 53) to opt out of the Easy mode. • Use the Network Map screen (Section 6.5 on page 53) to check if your NBG419N can ping the gateway and whether it is connected to the Internet. • Use the Control Panel (Section 6.
Chapter 6 Easy Mode • Access Point Mode: Only Power Saving and Wireless Security are available. • WISP Mode: The available features for this mode are Game Console, Content Filter, Bandwidth MGMT, and Firewall. 6.4 Navigation Panel Use this navigation panel to opt out of the Easy mode. Figure 28 Control Panel The following table describes the labels in this screen. Table 17 Control Panel ITEM DESCRIPTION Home Click this to go to the Login page.
Chapter 6 Easy Mode When you log into the Network Configurator, the Network Map is shown as follows. Figure 29 Network Map The line connecting the NBG-419N to the gateway becomes green when the NBG419N is able to ping the gateway. It becomes red when the ping initiating from the NBG-419N does not get a response from the gateway. The same rule applies to the line connecting the gateway to the Internet.
Chapter 6 Easy Mode The following table describes the labels in this screen. Table 18 Control Panel ITEM DESCRIPTION Game Engine Switch ON to maximize bandwidth for gaming traffic in your network. Otherwise, switch OFF. Refer to Section 6.6.1 on page 55 to see this screen. Power Saving Click this to schedule the wireless feature of the NBG-419N. Disabling the wireless function helps lower the energy consumption of the NBG-419N. Switch ON to apply wireless scheduling. Otherwise, switch OFF.
Chapter 6 Easy Mode Note: When this is switched on, the Game Console tab in the Bandwidth Mgmt screen is automatically positioned on top. Turn this off if your network is not using gaming. Click OK to close this screen. 6.6.2 Power Saving Use this screen to set the day of the week and time of the day when your wireless LAN is turned on and off. Wireless LAN scheduling is disabled by default. Disabling the wireless capability lowers the energy consumption of the of the NBG419N.
Chapter 6 Easy Mode Table 19 Power Saving LABEL DESCRIPTION For the following times (24-Hour Format) Select a begin time using the first set of hour and minute (min) drop down boxes and select an end time using the second set of hour and minute (min) drop down boxes. If you have chosen On earlier for the WLAN Status the Wireless LAN will turn on between the two times you enter in these fields.
Chapter 6 Easy Mode Table 20 Content Filter LABEL DESCRIPTION Apply Click Apply to save your changes. Cancel Click Cancel to close this screen without saving any changes. 6.6.4 Bandwidth MGMT Use this screen to set bandwidth allocation to pre-defined services and applications for bandwidth allocation. The NBG-419N uses bandwidth management for incoming and outgoing traffic. Rank the services and applications by dragging them accordingly from High to Low and click Apply.
Chapter 6 Easy Mode 6.6.6 Wireless Security Use this screen to configure security for your the Wireless LAN. You can enter the SSID and select the wireless security mode in the following screen. Note: You can enable the Wireless function of your NBG-419N by first turning on the switch in the back panel. Figure 36 Wireless Security The following table describes the general wireless LAN labels in this screen.
Chapter 6 Easy Mode 6.6.7 WPS Use this screen to add a wireless station to the network using WPS. Click WPS in the Wireless Security to open the following screen. Figure 37 Wireless Security: WPS The following table describes the labels in this screen. Table 22 Wireless Security: WPS LABEL DESCRIPTION Wireless Security Click this to go back to the Wireless Security screen. WPS Create a secure wireless network simply by pressing a button.
Chapter 6 Easy Mode 6.7 Status Screen in Easy Mode In the Network Map screen, click Status to view read-only information about the NBG-419N. Figure 38 Status Screen in Easy Mode The following table describes the labels in this screen. Table 23 Status Screen in Easy Mode ITEM DESCRIPTION Name This is the name of the NBG-419N in the network. You can change this in the Maintenance > General screen in Section 24.3 on page 197. Time This is the current system date and time.
Chapter 6 Easy Mode 62 NBG-419N User’s Guide
CHAPTER 7 Router Mode 7.1 Overview The NBG-419N is set to router mode by default. Routers are used to connect the local network to another network (for example, the Internet). In the figure below, the NBG-419N connects the local network (LAN1 ~ LAN4) to the Internet. Figure 39 NBG-419N Network Modem Note: The Status screen is shown after changing to the Expert mode of the Web Configurator. It varies depending on the device mode of your NBG-419N. 7.2 What You Can Do Use the Status screen (Section 7.
Chapter 7 Router Mode 7.3 Status Screen Click to open the status screen. Figure 40 Status Screen: Router Mode The following table describes the icons shown in the Status screen. Table 24 Status Screen Icon Key: Router Mode ICON DESCRIPTION Click this icon to view copyright and a link for related product information. Click this icon to go to Easy Mode. See Chapter 6 on page 51. Click this to go to the Home page. See Chapter 4 on page 43.
Chapter 7 Router Mode Table 24 Status Screen Icon Key: Router Mode (continued) ICON DESCRIPTION Click this icon to see the Status page. The information in this screen depends on the device mode you select. Click this icon to see the Monitor navigation menu. Click this icon to see the Configuration navigation menu. Click this icon to see the Maintenance navigation menu. The following table describes the labels shown in the Status screen.
Chapter 7 Router Mode Table 25 Status Screen: Router Mode LABEL DESCRIPTION - 802.11 Mode This shows the wireless standard. - WPS This displays Configured when the WPS has been set up. This displays Unconfigured if the WPS has not been set up. Click the status to display Network > Wireless LAN > WPS screen. System Status Item This column shows the type of data the NBG-419N is recording. Data This column shows the actual data recorded by the NBG-419N.
Chapter 7 Router Mode Table 25 Status Screen: Router Mode LABEL DESCRIPTION DHCP Table Click Details... to go to the Monitor > DHCP Table screen (Section 4.4 on page 44). Use this screen to view current DHCP client information. Packet Statistics Click Details... to go to the Monitor > Packet Statistics screen (Section 4.5 on page 45). Use this screen to view port status and packet specific statistics. WLAN Station Status Click Details... to go to the Monitor > WLAN Station Status screen (Section 4.
Chapter 7 Router Mode Table 26 Navigation Panel: Router Mode LINK TAB FUNCTION Packet Statistics Use this screen to view port status and packet specific statistics. WLAN Station Status Use this screen to view the wireless stations that are currently associated to the NBG-419N. CONFIGURATION Network Wireless LAN General Use this screen to configure wireless LAN.
Chapter 7 Router Mode Table 26 Navigation Panel: Router Mode LINK TAB RIP FUNCTION Use this screen to enable RIPv1 or RIPv2, which are LAN broadcast protocols. Security Firewall General Use this screen to activate/deactivate the firewall. Services This screen shows a summary of the firewall rules, and allows you to edit/add a firewall rule. Content Filter Use this screen to block certain web features and sites containing certain keywords in the URL.
Chapter 7 Router Mode 70 NBG-419N User’s Guide
CHAPTER 8 Access Point Mode 8.1 Overview Use your NBG-419N as an access point (AP) if you already have a router or gateway on your network. In this mode your NBG-419N bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example. Figure 42 Wireless Internet Access in Access Point Mode Many screens that are available in Router mode are not available in Access Point mode, such as bandwidth management and firewall.
Chapter 8 Access Point Mode 8.3 What You Need to Know See Chapter 10 on page 89 for a tutorial on setting up a network with the NBG419N as an access point. 8.3.1 Setting your NBG-419N to AP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this. 2 To use your NBG-419N as an access point, go to Maintenance > Sys OP Mode > General and select Access Point mode.
Chapter 8 Access Point Mode 8.3.2 Accessing the Web Configurator in Access Point Mode Log in to the Web Configurator in Access Point mode, do the following: 1 Connect your computer to the LAN port of the NBG-419N. 2 The default IP address of the NBG-419N is “192.168.1.2”. In this case, your computer must have an IP address in the range between “192.168.1.3” and “192.168.1.254”. 3 Click Start > Run on your computer in Windows. Type “cmd” in the dialog box.
Chapter 8 Access Point Mode 8.4 AP Mode Status Screen Click to open the Status screen. Figure 45 Status Screen: Access Point Mode The following table describes the labels shown in the Status screen. Table 27 Status Screen: Access Point Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes.
Chapter 8 Access Point Mode Table 27 Status Screen: Access Point Mode LABEL DESCRIPTION WLAN Information - WLAN OP Mode This is the device mode (Section 5.1.2 on page 49) to which the NBG419N’s wireless LAN is set - Access Point Mode. - MAC Address This shows the wireless adapter MAC Address of your device. - Status This shows the current status of the Wireless LAN - ON or OFF. - Name (SSID) This shows a descriptive name used to identify the NBG-419N in the wireless LAN.
Chapter 8 Access Point Mode Table 27 Status Screen: Access Point Mode LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation and Idle (line (ppp) idle), Dial (starting to trigger a call) and Drop (dropping a call) if you're using PPPoE or PPTP encapsulation. This field displays N/A when the line is disconnected.
Chapter 8 Access Point Mode Note: If you change the IP address of the NBG-419N in the screen below, you will need to log into the NBG-419N again using the new IP address. Figure 47 Network > LAN > IP The table below describes the labels in the screen. Table 28 Network > LAN > IP LABEL DESCRIPTION Get from DHCP Server Click this to deploy the NBG-419N as an access point in the network. When you enable this, the NBG-419N gets its IP address from the network’s DHCP server (for example, your ISP).
Chapter 8 Access Point Mode LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG-419N's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. If you chose UserDefined, but leave the IP address set to 0.0.0.
CHAPTER 9 WISP Mode 9.1 Overview Your NBG-419N can act as a wireless client. In wireless client mode, it can connect to an existing network via an access point. Use this mode if you already have an access point or router in your network. In the example below, one NBG-419N (A) is configured as a wireless client and another is used as an access point (B). The wireless client has two clients that need to connect to the Internet. The NBG-419N wirelessly connects to the available access point (B).
Chapter 9 WISP Mode 9.3 What You Need to Know With the exception of the LAN screen, the Monitor, Configuration and Maintainance screens in WISP mode are similar to the ones in Router Mode. See Chapter 11 on page 99 through Chapter 30 on page 213 of this User’s Guide. 9.3.1 Setting your NBG-419N to WISP Mode 1 Log into the Web Configurator if you haven’t already. See the Quick start Guide for instructions on how to do this.
Chapter 9 WISP Mode 1 Connect your computer to the LAN port of the NBG-419N. 2 The default IP address of the NBG-419N is “192.168.1.1”. If you did not change this, you can use the same IP address in WISP mode. Open a web browser such as Internet Explorer and type “192.168.1.1” as the web address in your web browser. If you changed the IP address of your NBG-419N while in Router Mode, use this IP address in WISP mode. The WISP mode IP address is always the same as the Router mode IP adderss.
Chapter 9 WISP Mode The following table describes the labels shown in the Status screen. Table 29 Status Screen: WISP Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator. Device Information Host Name This is the System Name you enter in the Maintenance > General screen. It is for identification purposes. Firmware Version This is the firmware version and the date created. Sys OP Mode This is the device mode (Section 5.1.
Chapter 9 WISP Mode Table 29 Status Screen: WISP Mode LABEL DESCRIPTION - CPU Usage This displays what percentage of the NBG-419N’s processing ability is currently used. When this percentage is close to 100%, the NBG-419N is running at full load, and the throughput is not going to improve anymore. If you want some applications to have more throughput, you should turn off other applications (for example, using bandwidth management.
Chapter 9 WISP Mode 9.5 Wireless LAN General Screen Use this screen to configure the wireless LAN settings of your NBG-419N. Go to Configuration > Wireless LAN > General to open the following screen. Figure 52 WISP Mode: LAN > General Screen The following table describes the labels in this screen. Table 30 WISP Mode: LAN > General Screen LABEL DESCRIPTION Wireless Setup Network Name (SSID) Enter the name of the access point to which you are connecting.
Chapter 9 WISP Mode The following table describes the labels in this screen. Table 31 No Security (WISP) LABEL DESCRIPTION Wireless Setup Network Name (SSID) Enter the name of the access point to which you are connecting. Security Security Mode Select No Security in this field. Apply Click Apply to save your changes back to the NBG-419N. Reset Click Reset to reload the previous configuration for this screen. 9.5.
Chapter 9 WISP Mode Table 32 WEP (WISP) LABEL DESCRIPTION Security Mode Select Static WEP to enable data encryption. PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate. A passphrase functions like a password. In WEP security mode, it is further converted by the NBG-419N into a complicated string that is referred to as the “key”. This key is requested from all devices wishing to connect to a wireless network. WEP Encryption Select 64-bit WEP or 128-bit WEP.
Chapter 9 WISP Mode 9.5.2 WPA(2)-PSK Use this screen if the access point to which you want to connect uses WPA(2)-PSK security mode. Figure 55 WPA-PSK/WPA2-PSK (WISP) The following table describes the labels in this screen. . Table 33 WPA-PSK/WPA2-PSK (WISP) LABEL DESCRIPTION Wireless Setup Network Name (SSID) Enter the name of the access point to which you are connecting. Security Encryption Type Select the type of wireless encryption employed by the access point to which you want to connect.
Chapter 9 WISP Mode 9.5.3 Advance Screen Use this screen to enable the power saving mode of your NBG-419N. Go to Configuration > Wireless LAN to open the following screen. Figure 56 Configuration > Wireless LAN > Advance Screen (WISP) The following table describes the labels in this screen.
CHAPTER 10 Tutorials 10.1 Overview This chapter provides tutorials for your NBG-419N as follows: • Connecting to the Internet from an Access Point • Configuring Wireless Security Using WPS • Enabling and Configuring Wireless Security (No WPS) 10.2 Connecting to the Internet from an Access Point This section gives you an example of how to set up an access point (AP) and wireless client (a notebook (B), in this example) for wireless communication.
Chapter 10 Tutorials Note: The wireless client must be a WPS-aware device (for example, a WPS USB adapter or PCI card). There are two WPS methods for creating a secure connection. This tutorial shows you how to do both. • Push Button Configuration (PBC) - create a secure wireless network simply by pressing a button. See Section 10.3.1 on page 90.This is the easier method.
Chapter 10 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both NBG-419N and wireless client (the NWD210N in this example). Figure 58 Example WPS Process: PBC Method NBG-419N Wireless Client WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 10.3.2 PIN Configuration When you use the PIN configuration method, you need to use both NBG-419N’s configuration interface and the client’s utilities.
Chapter 10 Tutorials The following figure shows you the example to set up wireless network and security on NBG-419N and wireless client (ex. NWD210N in this example) by using PIN method.
Chapter 10 Tutorials 10.4 Enabling and Configuring Wireless Security (No WPS) This example shows you how to configure wireless security settings with the following parameters on your NBG-419N. SSID SSID_Example3 Channel 6 Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your NBG-419N.
Chapter 10 Tutorials 5 Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. Figure 61 Tutorial: Checking Wireless Settings 10.4.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 94 1 The NBG-419N supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
Chapter 10 Tutorials 4 Select SSID_Example3 and click Connect. Figure 62 Connecting a Wireless Client to a Wireless Network t 5 Select WPA-PSK and type the security key in the following screen. Click Next. Figure 63 Security Settings 6 The Confirm Save window appears. Check your settings and click Save to continue.
Chapter 10 Tutorials 7 Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide. Figure 65 Link Status If your connection is successful, open your Internet browser and enter http:// www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured.
P ART II Network Wireless LAN (99) WAN (119) LAN (135) DHCP Server (139) Network Address Translation (NAT) (143) Dynamic DNS (151) Static Route (153) RIP (157) 97
CHAPTER 11 Wireless LAN 11.1 Overview This chapter discusses how to configure the wireless network settings in your NBG-419N. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 66 Example of a Wireless Network NBG-419N A B The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.
Chapter 11 Wireless LAN 11.2 What You Can Do • Use the General screen (Section 11.4 on page 103) to enable the Wireless LAN, enter the SSID and select the wireless security mode. • Use the MAC Filter screen (Section 11.5 on page 109) to allow or deny wireless stations based on their MAC addresses from connecting to the NBG-419N. • Use the Advanced screen (Section 11.6 on page 110) to allow wireless advanced features, such as intra-BSS networking and set the RTS/CTS Threshold.
Chapter 11 Wireless LAN 11.3.1.1 SSID Normally, the AP acts like a beacon and regularly broadcasts the SSID in the area. You can hide the SSID instead, in which case the AP does not broadcast the SSID. In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network. 11.3.
Chapter 11 Wireless LAN The types of encryption you can choose depend on the type of user authentication. Table 35 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security WEP WPA-PSK Strongest WPA2-PSK Usually, you should set up the strongest encryption that every wireless client in the wireless network supports. Suppose the wireless network has two wireless clients. Device A only supports WEP, and device B supports WEP and WPA-PSK.
Chapter 11 Wireless LAN 11.4 General Wireless LAN Screen Use this screen to enable the Wireless LAN, enter the SSID and select the wireless security mode. Note: If you are configuring the NBG-419N from a computer connected to the wireless LAN and you change the NBG-419N’s SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm. You must then change the wireless settings of your computer to match the NBG-419N’s new settings.
Chapter 11 Wireless LAN Table 36 Network > Wireless LAN > General LABEL DESCRIPTION Operating Channel This displays the channel the NBG-419N is currently using. Security Security Mode Select WEP, WPA-PSK or WPA2-PSK to add security on this wireless network. The wireless clients which want to associate to this network must have same wireless security settings as the NBG-419N. After you select to use a security, additional options appears in this screen. See 11.4.2 and 11.4.3 sections.
Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 37 Network > Wireless LAN > General: No Security LABEL DESCRIPTION Security Mode Choose No Security from the drop-down list box. Apply Click Apply to save your changes back to the NBG-419N. Reset Click Reset to reload the previous configuration for this screen. Refer to Table 36 on page 103 for descriptions of the other labels in this screen. 11.4.
Chapter 11 Wireless LAN In order to configure and enable WEP encryption, click Network > Wireless LAN to display the General screen. Select Static WEP from the Security Mode list. Figure 69 Network > Wireless LAN > General: Static WEP The following table describes the wireless LAN security labels in this screen. Table 38 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Security Mode Select Static WEP to enable data encryption.
Chapter 11 Wireless LAN Table 38 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Authenticatio n Method Select Auto or Shared Key from the drop-down list box. This field specifies whether the wireless clients have to provide the WEP key to login to the wireless client. Keep this setting at Auto unless you want to force a key verification before communication between the wireless client and the ZyXEL Device occurs.
Chapter 11 Wireless LAN 11.4.3 WPA-PSK/WPA2-PSK Click Network > Wireless LAN to display the General screen. Select WPA-PSK or WPA2-PSK from the Security Mode list. Figure 70 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK The following table describes the labels in this screen. Table 39 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK LABEL DESCRIPTION Security Mode Select WPA-PSK or WPA2-PSK to enable data encryption.
Chapter 11 Wireless LAN 11.5 MAC Filter The MAC filter screen allows you to configure the NBG-419N to give exclusive access to devices (Allow) or exclude devices from accessing the NBG-419N (Deny). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure this screen.
Chapter 11 Wireless LAN 11.6 Wireless LAN Advanced Screen Use this screen to allow wireless advanced features, such as intra-BSS networking and set the RTS/CTS Threshold Click Network > Wireless LAN > Advanced. The screen appears as shown. Figure 72 Network > Wireless LAN > Advanced The following table describes the labels in this screen.
Chapter 11 Wireless LAN Table 41 Network > Wireless LAN > Advanced LABEL DESCRIPTION Operating Mode Choose this according to the wireless mode(s) used in your network. Mixed Mode - Select this if the wireless clients in your network use different wireless modes (for example, IEEE 802.11b/g and IEEE 802.1n modes) Green Mode - Select this if the wireless clients in your network uses only one type of wireless mode (for example, IEEEE 802.
Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 42 Network > Wireless LAN > QoS LABEL DESCRIPTION Enable WMM QoS Check this to have the NBG-419N automatically give a service a priority level according to the ToS value in the IP header of packets it sends. WMM QoS (Wifi MultiMedia Quality of Service) gives high priority to voice and video, which makes them run more smoothly. Apply Click Apply to save your changes to the NBG-419N.
Chapter 11 Wireless LAN Table 43 Network > Wireless LAN > WPS LABEL DESCRIPTION Status This displays Configured when the NBG-419N has connected to a wireless network using WPS or when Enable WPS is selected and wireless or wireless security settings have been changed. The current wireless and wireless security settings also appear in the screen.
Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 44 Network > Wireless LAN > WPS Station LABEL DESCRIPTION Push Button Use this button when you use the PBC (Push Button Configuration) method to configure wireless stations’s wireless settings. See Section 10.3.1 on page 90. Click this to start WPS-aware wireless station scanning and the wireless security information synchronization.
Chapter 11 Wireless LAN The following table describes the labels in this screen. Table 45 Network > Wireless LAN > Scheduling LABEL DESCRIPTION Wireless LAN Scheduling Enable Wireless LAN Scheduling Select this to enable Wireless LAN scheduling. Scheduling WLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off. This field works in conjunction with the Day and Except for the following times fields.
Chapter 11 Wireless LAN Click Network > Wireless LAN > WDS tab. The following screen opens with the Basic Setting set to Disabled, and Security Mode set to No Security. Figure 77 Network > Wireless LAN > WDS The following table describes the labels in this screen. Table 46 Network > Wireless LAN > WDS LABEL DESCRIPTION WDS Setup Basic Settings Select the operating mode for your NBG-419N. • • AP + Bridge - The NBG-419N functions as a bridge and access point simultaneously.
Chapter 11 Wireless LAN Table 46 Network > Wireless LAN > WDS LABEL DESCRIPTION Apply Click Apply to save your changes to NBG-419N. Refresh Click Refresh to reload the previous configuration for this screen.
Chapter 11 Wireless LAN 118 NBG-419N User’s Guide
CHAPTER 12 WAN 12.1 Overview This chapter discusses the NBG-419N’s WAN screens. Use these screens to configure your NBG-419N for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations. Figure 78 LAN and WAN 12.
Chapter 12 WAN 12.3 What You Need To Know The information in this section can help you configure the screens for your WAN connection, as well as enable/disable some advanced features of your NBG-419N. 12.3.1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Chapter 12 WAN WAN MAC Address The MAC address screen allows users to configure the WAN port's MAC address by either using the factory default or cloning the MAC address from a computer on your LAN. Choose Factory Default to select the factory assigned default MAC Address. Otherwise, click Clone the computer's MAC address - IP Address and enter the IP address of the computer on the LAN whose MAC you are cloning. Once it is successfully configured, the address will be copied to configuration file.
Chapter 12 WAN interfaces in the Web Configurator (LAN; WAN). Select None to disable IP multicasting on these interfaces. 12.4 Internet Connection Use this screen to change your NBG-419N’s Internet access settings. Click WAN from the Configuration menu. The screen differs according to the encapsulation you choose. 12.4.1 Ethernet Encapsulation This screen displays when you select Ethernet encapsulation.
Chapter 12 WAN The following table describes the labels in this screen. Table 47 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation You must choose the Ethernet option when the WAN port is used as a regular Ethernet. WAN IP Address Assignment Get automatically from ISP (Default) Select this option If your ISP did not assign you a fixed IP address. This is the default selection.
Chapter 12 WAN 12.4.2 PPPoE Encapsulation The NBG-419N supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPP over Ethernet option is for a dial-up connection using PPPoE. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for example Radius).
Chapter 12 WAN This screen displays when you select PPPoE encapsulation. Figure 81 Network > WAN > Internet Connection: PPPoE Encapsulation The following table describes the labels in this screen. Table 48 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Encapsulation Select PPP over Ethernet if you connect to your Internet via dial-up. User Name Type the user name given to you by your ISP.
Chapter 12 WAN Table 48 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION Idle Timeout (sec) This value specifies the time in minutes that elapses before the router automatically disconnects from the PPPoE server. WAN IP Address Assignment Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection. Use Fixed IP Address Select this option If the ISP assigned a fixed IP address.
Chapter 12 WAN PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet. This screen displays when you select PPTP encapsulation.
Chapter 12 WAN The following table describes the labels in this screen. Table 49 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type To configure a PPTP client, you must configure the User Name and Password fields for a PPP connection and the PPTP parameters for a PPTP connection. User Name Type the user name given to you by your ISP. Password Type the password associated with the User Name above.
Chapter 12 WAN Table 49 Network > WAN > Internet Connection: PPTP Encapsulation LABEL DESCRIPTION First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the NBG-419N's WAN IP address). The field to the right displays the (read-only) DNS server IP address that the ISP assigns. Second DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right.
Chapter 12 WAN This screen displays when you select L2TP encapsulation. Figure 83 Network > WAN > Internet Connection: L2TP Encapsulation The following table describes the labels in this screen. Table 50 Network > WAN > Internet Connection: L2TP Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type To configure a L2TP client, you must configure the User Name and Password fields for a layer-2 connection and the L2TP parameters for an L2TP connection.
Chapter 12 WAN Table 50 Network > WAN > Internet Connection: L2TP Encapsulation LABEL DESCRIPTION Use Fixed IP Address Select this option If the ISP assigned a fixed IP address. IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address. IP Subnet Mask Your NBG-419N will automatically calculate the subnet mask based on the IP address that you assign. Unless you are implementing subnetting, use the subnet mask computed by the NBG-419N.
Chapter 12 WAN 12.5 Advanced WAN Screen Use this screen to enable Multicast and enable Auto-bridge. Note: The categories shown in this screen are independent of each other. To change your NBG-419N’s advanced WAN settings, click Network > WAN > Advanced. The screen appears as shown. Figure 84 Network > WAN > Advanced The following table describes the labels in this screen. Table 51 Network > WAN > Advanced LABEL DESCRIPTION Multicast Setup Multicast Select IGMPv1/v2 to enable multicasting.
Chapter 12 WAN IGMP (Internet Group Multicast Protocol) is a network-layer protocol used to establish membership in a multicast group - it is not used to carry user data. Click Network > WAN > IGMP Snooping. The screen appears as shown. Figure 85 Network > WAN > IGMP Snooping The following table describes the labels in this screen. Table 52 Network > WAN > IGMP Snooping LABEL DESCRIPTION Auto-bridge Enable IGMP Snooping Select this option to have the NBG-419N use IGMP snooping.
Chapter 12 WAN 134 NBG-419N User’s Guide
CHAPTER 13 LAN 13.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks. Figure 86 LAN Example The LAN screens can help you manage IP addresses. 13.
Chapter 13 LAN 13.3 What You Need To Know The actual physical connection determines whether the NBG-419N ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 87 LAN and WAN IP Addresses The LAN parameters of the NBG-419N are preset in the factory with the following values: • IP address of 192.168.1.1 with subnet mask of 255.255.255.
Chapter 13 LAN 13.3.3 IP Alias IP alias allows you to partition a physical network into different logical networks over the same Ethernet interface. The NBG-419N supports three logical LAN interfaces via its single physical Ethernet interface with the NBG-419N itself as the gateway for each LAN network. 13.4 LAN IP Screen Use this screen to change the IP address for your NBG-419N. Click Network > LAN > IP. Figure 88 Network > LAN > IP The following table describes the labels in this screen.
Chapter 13 LAN 13.5 IP Alias Screen Use this screen to have the NBG-419N apply IP alias to create LAN subnets. Click LAN > IP Alias. Figure 89 Network > LAN > IP Alias The following table describes the labels in this screen. Table 54 Network > LAN > IP Alias 138 LABEL DESCRIPTION IP Alias Check this to enable IP alias. IP Address Type the IP alias address of your NBG-419N in dotted decimal notation. IP Subnet Mask The subnet mask specifies the network number portion of an IP address.
CHAPTER 14 DHCP Server 14.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG-419N’s LAN as a DHCP server or disable it. When configured as a server, the NBG-419N provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 14.
Chapter 14 DHCP Server The following table describes the labels in this screen. Table 55 Network > DHCP Server > General LABEL DESCRIPTION Enable DHCP Server Enable or Disable DHCP for LAN. IP Pool Starting Address This field specifies the first of the contiguous addresses in the IP address pool for LAN. Pool Size This field specifies the size, or count of the IP address pool for LAN. Apply Click Apply to save your changes back to the NBG-419N.
Chapter 14 DHCP Server The following table describes the labels in this screen. Table 56 Network > DHCP Server > Advanced LABEL DESCRIPTION LAN Static DHCP Table # This is the index number of the static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN. IP Address Type the LAN IP address of a computer on your LAN.
Chapter 14 DHCP Server 142 NBG-419N User’s Guide
CHAPTER 15 Network Address Translation (NAT) 15.1 Overview NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. Each packet has two addresses – a source address and a destination address.
Chapter 15 Network Address Translation (NAT) 15.2 What You Can Do • Use the General screen (Section 15.3 on page 144) to enable NAT and set a default server. • Use the Application screen (Section 15.4 on page 145) o forward incoming service requests to the server(s) on your local network. • Use the Advanced screen (Section 15.5 on page 147) to change your NBG419N’s trigger port settings. 15.3 General NAT Screen Use this screen to enable NAT and set a default server.
Chapter 15 Network Address Translation (NAT) Table 57 Network > NAT > General LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG-419N. Reset Click Reset to begin configuring this screen afresh. 15.4 NAT Application Screen Use the Application screen to forward incoming service requests to the server(s) on your local network. You may enter a single port number or a range of port numbers to be forwarded, and the local IP address of the desired server.
Chapter 15 Network Address Translation (NAT) Refer to Appendix E on page 281 for port numbers commonly used for particular services. Figure 94 Network > NAT > Application The following table describes the labels in this screen. Table 58 Network > NAT > Application LABEL DESCRIPTION Add Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address.
Chapter 15 Network Address Translation (NAT) Table 58 Network > NAT > Application (continued) LABEL DESCRIPTION Server IP Address This field displays the inside IP address of the server. Modify Click the Edit icon to display and modify an existing rule setting in the fields under Add Application Rule. Click the Remove icon to delete a rule. Apply Click Apply to save your changes back to the NBG-419N. Reset Click Reset to begin configuring this screen afresh. 15.
Chapter 15 Network Address Translation (NAT) Note: Only one LAN computer can use a trigger port (range) at a time. Figure 95 Network > NAT > Advanced The following table describes the labels in this screen. Table 59 Network > NAT > Advanced LABEL DESCRIPTION # This is the rule index number (read-only). Name Type a unique name (up to 15 characters) for identification purposes. All characters are permitted - including spaces.
Chapter 15 Network Address Translation (NAT) 15.5.1 Trigger Port Forwarding Example The following is an example of trigger port forwarding. Figure 96 Trigger Port Forwarding Process: Example 1 Jane requests a file from the Real Audio server (port 7070). 2 Port 7070 is a “trigger” port and causes the NBG-419N to record Jane’s computer IP address. The NBG-419N associates Jane's computer IP address with the "incoming" port range of 6970-7170.
Chapter 15 Network Address Translation (NAT) 150 NBG-419N User’s Guide
CHAPTER 16 Dynamic DNS 16.1 Overview Dynamic DNS (DDNS) services let you use a domain name with a dynamic IP address. 16.2 What You Can Do Use the Dynamic DNS screen (Section 16.4 on page 152) to enable DDNS and configure the DDNS settings on the NBG-419N. 16.3 What You Need To Know Dynamic DNS allows you to update your current dynamic IP address with one or many dynamic DNS services so that anyone can contact you (in NetMeeting, CUSeeMe, etc.).
Chapter 16 Dynamic DNS 16.4 Dynamic DNS Screen To change your NBG-419N’s DDNS, click Network > DDNS. The screen appears as shown. Figure 97 Network > DDNS The following table describes the labels in this screen. Table 60 Network > DDNS 152 LABEL DESCRIPTION Enable Dynamic DNS Select this check box to use dynamic DNS. Service Provider Select the name of your Dynamic DNS service provider. Host Name Enter a host names in the field provided.
CHAPTER 17 Static Route 17.1 Overview This chapter shows you how to configure static routes for your NBG-419N. Each remote node specifies only the network to which the gateway is directly connected, and the NBG-419N has no knowledge of the networks beyond. For instance, the NBG-419N knows about network N2 in the following figure through remote node Router 1.
Chapter 17 Static Route 17.3 IP Static Route Screen Click Network > Static Route to open the IP Static Route screen. Figure 99 Network > Static Route The following table describes the labels in this screen. Table 61 Network > Static Route LABEL DESCRIPTION Static Routing Settings Route Name Enter a the name that describes or identifies this route. Destination IP Address Enter the IP network address of the final destination.
Chapter 17 Static Route Table 61 Network > Static Route LABEL DESCRIPTION Gateway This is the IP address of the gateway. The gateway is a router or switch on the same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations. Metric This is the number assigned to the route. Delete Click the Delete icon to remove a static route from the NBG-419N. A window displays asking you to confirm that you want to delete the route.
Chapter 17 Static Route 156 NBG-419N User’s Guide
CHAPTER 18 RIP 18.1 Overview Routing Information Protocol (RIP) is an interior or intra-domain routing protocol that uses distance-vector routing algorithms. RIP is used on the Internet and is common in the NetWare environment as a method for exchanging routing information between routers. 18.2 What You Can Do Use the RIP screen (Section 18.3 on page 157) to enable RIPv1 or RIPv2, which are LAN broadcast protocols. 18.
Chapter 18 RIP The following table describes the labels in this screen. Table 62 Network > RIP LABEL DESCRIPTION RIP Select the RIPv1 or RIPv2 you want the NBG-419N to use. Otherwise select None. 158 Apply Click Apply to save your changes back to the NBG-419N. Reset Click Reset to begin configuring this screen afresh.
P ART III Security Firewall (161) Content Filter (167) 159
CHAPTER 19 Firewall 19.1 Overview This chapter shows you how to enable and configure the firewall that protects your NBG-419N and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN.
Chapter 19 Firewall 19.2 What You Can Do • Use the General (Section 19.4 on page 163) screen to enable or disable the NBG-419N’s firewall. • Use the Services screen (Section 19.5 on page 163) screen enable service blocking, enter/delete/modify the services you want to block and the date/time you want to block them. 19.3 What You Need To Know The NBG-419N’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks.
Chapter 19 Firewall 19.4 General Firewall Screen Use this screen to enable or disable the NBG-419N’s firewall, and set up firewall logs. Click Security > Firewall to open the General screen. Figure 102 Security > Firewall > General The following table describes the labels in this screen. Table 63 Security > Firewall > General LABEL DESCRIPTION Enable Firewall Select this check box to activate the firewall.
Chapter 19 Firewall Click Security > Firewall > Services. The screen appears as shown next. Figure 103 Security > Firewall > Services The following table describes the labels in this screen. Table 64 Security > Firewall > Services LABEL DESCRIPTION ICMP Internet Control Message Protocol is a message control and errorreporting protocol between a host server and a gateway to the Internet.
Chapter 19 Firewall Table 64 Security > Firewall > Services LABEL DESCRIPTION Dest IP Address Enter the IP address of the computer to which traffic for the application or service is entering. The NBG-419N applies the firewall rule to traffic initiating from this computer. Source IP Address Enter the IP address of the computer that initializes traffic for the application or service. The NBG-419N applies the firewall rule to traffic initiating from this computer.
Chapter 19 Firewall 166 NBG-419N User’s Guide
CHAPTER 20 Content Filter 20.1 Overview This chapter provides a brief overview of content filtering using the embedded web GUI. Internet content filtering allows you to create and enforce Internet access policies tailored to your needs. Content filtering is the ability to block certain web features or specific URL keywords. 20.2 What You Can Do Use the Content Filter (Section 20.4 on page 168) screen to restrict web features, add keywords for blocking and designate a trusted computer. 20.
Chapter 20 Content Filter Keyword Blocking URL Checking The NBG-419N checks the URL’s domain name (or IP address) and file path separately when performing keyword blocking. The URL’s domain name or IP address is the characters that come before the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/ pressroom.php, the domain name is www.zyxel.com.tw. The file path is the characters that come after the first slash in the URL. For example, with the URL www.zyxel.com.tw/news/pressroom.
Chapter 20 Content Filter The following table describes the labels in this screen. Table 65 Security > Content Filter > Content Filter LABEL DESCRIPTION Trusted IP Setup To enable this feature, type an IP address of any one of the computers in your network that you want to have as a trusted computer. This allows the trusted computer to have full access to all features that are configured to be blocked by content filtering. Leave this field blank to have no trusted computers.
Chapter 20 Content Filter 170 NBG-419N User’s Guide
P ART IV Management Bandwidth Management (173) Remote Management (183) Universal Plug-and-Play (UPnP) (187) 171
CHAPTER 21 Bandwidth Management 21.1 Overview This chapter contains information about configuring bandwidth management and editing rules. ZyXEL’s Bandwidth Management allows you to specify bandwidth management rules based on an application. In the figure below, uplink traffic goes from the LAN device (A) to the WAN device (B). Bandwidth management is applied before sending the packets out to the WAN. Downlink traffic comes back from the WAN device (B) to the LAN device (A).
Chapter 21 Bandwidth Management • Use the Advanced screen (Section 21.5 on page 175) to configure bandwidth managements rule for the pre-defined services and applications. • Use the Monitor screen (Section 21.6 on page 180) to view the amount of network bandwidth that applications running in the network are using. 21.
Chapter 21 Bandwidth Management The following table describes the labels in this screen. Table 66 Management > Bandwidth Management > General LABEL DESCRIPTION Enable Bandwidth Management This field allows you to have NBG-419N apply bandwidth management. Enable bandwidth management to give traffic that matches a bandwidth rule priority over traffic that does not match a bandwidth rule.
Chapter 21 Bandwidth Management Click Management > Bandwidth Management > Advanced to open the bandwidth management Advanced screen. Figure 107 Management > Bandwidth Management > Advanced The following table describes the labels in this screen. Table 67 Management > Bandwidth Management > Advanced LABEL DESCRIPTION Management Bandwidth Upstream Bandwidth Select the total amount of bandwidth (from 64 Kilobits to 32 Megabits) that you want to dedicate to uplink traffic.
Chapter 21 Bandwidth Management Table 67 Management > Bandwidth Management > Advanced (continued) LABEL DESCRIPTION # This is the number of an individual bandwidth management rule. Priority Select a priority from the drop down list box. Choose High, Mid or Low. • • • High - Select this for voice traffic or video that is especially sensitive to jitter (jitter is the variations in delay).
Chapter 21 Bandwidth Management 21.5.1 Rule Configuration: Application Rule Configuration If you want to edit a bandwidth management rule for a pre-defined service or application, click the Edit icon in the Application List table of the Advanced screen. The following screen displays. Figure 108 Bandwidth Management Rule Configuration: Application List The following table describes the labels in this screen.
Chapter 21 Bandwidth Management 21.5.2 Rule Configuration: User Defined Service Rule Configuration If you want to edit a bandwidth management rule for other applications or services, click the Edit icon in the User-defined Service table of the Advanced screen. The following screen displays.
Chapter 21 Bandwidth Management LABEL DESCRIPTION Protocol Select the protocol (TCP, UDP, User defined) for which the bandwidth management rule applies. If you select User-defined, enter the protocol for which the bandwidth management rule applies. For example, ICMP for ping traffic. Apply Click Apply to save your customized settings. Cancel Click Cancel to exit this screen without saving. See Appendix E on page 281 for commonly used services and port numbers. 21.
Chapter 21 Bandwidth Management 21.6.1 Predefined Bandwidth Management Services The following is a description of some services that you can select and to which you can apply media bandwidth management in the Management > Bandwidth Management > Advanced screen. Table 70 Media Bandwidth Management Setup: Services SERVICE DESCRIPTION FTP File Transfer Program enables fast transfer of files, including large files that may not be possible by e-mail.
Chapter 21 Bandwidth Management 182 NBG-419N User’s Guide
CHAPTER 22 Remote Management 22.1 Overview This chapter provides information on the Remote Management screens. Remote Management allows you to manage your NBG-419N from a remote location through the following interfaces: • LAN and WAN • LAN only • WAN only Note: The NBG-419N is managed using the Web Configurator. 22.2 What You Can Do Use the WWW screen (Section 22.
Chapter 22 Remote Management 22.3.1 Remote Management and NAT When NAT is enabled: • Use the NBG-419N’s WAN IP address when configuring from the WAN. • Use the NBG-419N’s LAN IP address when configuring from the LAN. 22.3.2 System Timeout There is a default system management idle timeout of five minutes (three hundred seconds). The NBG-419N automatically logs you out if the management session remains idle for longer than this timeout period.
Chapter 22 Remote Management LABEL DESCRIPTION Apply Click Apply to save your customized settings and exit this screen. Reset Click Reset to begin configuring this screen afresh.
Chapter 22 Remote Management 186 NBG-419N User’s Guide
CHAPTER 23 Universal Plug-and-Play (UPnP) 23.1 Overview This chapter introduces the UPnP feature in the web configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.
Chapter 23 Universal Plug-and-Play (UPnP) • Learning public IP addresses • Assigning lease times to mappings Windows Messenger is an example of an application that supports NAT traversal and UPnP. See the NAT chapter for more information on NAT. 23.3.2 Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues.
Chapter 23 Universal Plug-and-Play (UPnP) The following table describes the fields in this screen. Table 72 Management > UPnP LABEL DESCRIPTION Enable the Universal Plug and Play (UPnP) Feature Select this check box to activate UPnP. Be aware that anyone could use a UPnP application to open the web configurator's login screen without entering the NBG-419N's IP address (although you must still enter the password to access the web configurator). Apply Click Apply to save the setting to the NBG-419N.
Chapter 23 Universal Plug-and-Play (UPnP) 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created. Figure 114 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings.
Chapter 23 Universal Plug-and-Play (UPnP) Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray. Figure 117 System Tray Icon 6 Double-click on the icon to display your current Internet connection status. Figure 118 Internet Connection Status 23.5.
Chapter 23 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 119 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your NBG-419N and select Invoke. The web configurator login screen displays.
Chapter 23 Universal Plug-and-Play (UPnP) 6 Right-click on the icon for your NBG-419N and select Properties. A properties window displays with basic information about the NBG-419N.
Chapter 23 Universal Plug-and-Play (UPnP) 194 NBG-419N User’s Guide
P ART V Maintenance and Troubleshooting Maintenance (197) Password (199) Time (201) Firmware Upgrade (205) Backup/Restore (207) Reset/Restart (211) Sys OP Mode (213) Troubleshooting (217) 195
CHAPTER 24 Maintenance 24.1 Overview This chapter provides information on the Maintenance > General screen. 24.2 What You Can Do • Use the General screen (Section 24.3 on page 197) to enter a name to identify the NBG-419N in the network and set the password. • Use the Time Setting screen (Section 26.3 on page 201) to change your NBG419N’s time and date. 24.3 General Screen Use this screen to enter a name to identify the NBG-419N in the network and set the password. Click Maintenance > General.
Chapter 24 Maintenance The following table describes the labels in this screen. Table 73 Maintenance > General LABEL DESCRIPTION System Setup 198 System Name System Name is a unique name to identify the NBG-419N in an Ethernet network. Domain Name Enter the domain name you want to give to the NBG-419N. Administrator Inactivity Timer Type how many minutes a management session can be left idle before the session times out. The default is 5 minutes.
CHAPTER 25 Password 25.1 Overview This chapter contains information about configuring general log settings and viewing the NBG-419N’s logs. Refer to the appendices for example log message explanations. The Web Configurator allows you to look at all of the NBG-419N’s logs in one location. 25.2 What You Can Do Use the View Log screen (Section 25.
Chapter 25 Password 25.4 Password Screen Use the View Log screen to see the logged messages for the NBG-419N. Options include logs about system maintenance, system errors, access control, allowed or blocked web sites, blocked web features (such as ActiveX controls, Java and cookies), attacks (such as DoS) and IPSec. Log entries in red indicate system error logs. The log wraps around and deletes the old entries after it fills. Click a column heading to sort the entries.
CHAPTER 26 Time 26.1 Overview This chapter provides information on the Time Setting screens. See Section 3.2.3 on page 39 for more information on how to set up the NBG-419N’s date and time. 26.2 What You Can Do Use the Time Setting screen (Section 26.3 on page 201) to change your NBG419N’s time and date. 26.3 Time Setting Screen Use this screen to configure the NBG-419N’s time based on your local time zone. To change your NBG-419N’s time and date, click Maintenance > System > Time Setting.
Chapter 26 Time he following table describes the labels in this screen. Table 75 Maintenance > Time LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NBG-419N. Each time you reload this page, the NBG-419N synchronizes the time with the time server. Current Date This field displays the date of your NBG-419N. Each time you reload this page, the NBG-419N synchronizes the date with the time server.
Chapter 26 Time Table 75 Maintenance > Time LABEL DESCRIPTION Start Date Configure the day and time when Daylight Saving Time starts if you selected Daylight Savings. The o'clock field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time starts in most parts of the United States on the first Sunday of April. Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time.
Chapter 26 Time 204 NBG-419N User’s Guide
CHAPTER 27 Firmware Upgrade 27.1 Overview This chapter shows you how to upload a new firmware, upload or save backup configuration files and restart the NBG-419N. 27.2 What You Can Do Use the Firmware screen (Section 27.3 on page 205) to upload firmware to your NBG-419N. 27.3 Firmware Upload Screen Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a “*.bin” extension, e.g., “NBG-419N.bin”.
Chapter 27 Firmware Upgrade The following table describes the labels in this screen. Table 76 Maintenance > Firmware Upgrade LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.zip) files before you can upload them. Upload Click Upload to begin the upload process. This process may take up to two minutes.
CHAPTER 28 Backup/Restore 28.1 Overview This chapter shows you how to backup, restore and reset your NBG-419N. Backup configuration allows you to back up (save) the NBG-419N’s current configuration to a file on your computer. Once your NBG-419N is configured and functioning properly, it is highly recommended that you back up your configuration file before making configuration changes. The backup configuration file will be useful in case you need to return to your previous settings.
Chapter 28 Backup/Restore 28.3 Configuration Screen Click Maintenance > Backup/Restore. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 127 Maintenance > Backup/Restore The following table describes the labels in this screen. Table 77 Maintenance > Backup/Restore 208 LABEL DESCRIPTION Backup Click Backup to save the NBG-419N’s current configuration to your computer.
Chapter 28 Backup/Restore Table 77 Maintenance > Backup/Restore LABEL DESCRIPTION Upload Click Upload to begin the upload process. Note: Do not turn off the NBG-419N while configuration file upload is in progress. After you see a “configuration upload successful” screen, you must then wait one minute before logging into the NBG-419N again. The NBG-419N automatically restarts in this time causing a temporary network disconnect.
Chapter 28 Backup/Restore 210 NBG-419N User’s Guide
CHAPTER 29 Reset/Restart 29.1 Overview This chapter shows you how to restart your NBG-419N. 29.2 What You Can Do Use the Reset/Restart screen (Section 29.3 on page 211) to reboot the NBG419N without turning the power off. 29.3 Reset/Restart Screen System restart allows you to reboot the NBG-419N without turning the power off. Click Maintenance > Reset/Restart to open the following screen. Figure 128 Maintenance > Reset/Restart Click Restart to have the NBG-419N reboot.
Chapter 29 Reset/Restart 212 NBG-419N User’s Guide
CHAPTER 30 Sys OP Mode 30.1 Overview The Sys OP Mode (System Operation Mode) function lets you configure your NBG-419N as a router, access point or Wireless ISP (WISP) client. You can choose between Router Mode, Access Point Mode and WISP Mode depending on your network topology and the features you require from your device. See Section 5.1.2 on page 49 for more information on which mode to choose. 30.2 What You Can Do Use the Sys OP Mode screen (Section 30.
Chapter 30 Sys OP Mode Router A router connects your local network with another network, such as the Internet. The router has two IP addresses, the LAN IP address and the WAN IP address. Figure 129 LAN and WAN IP Addresses in Router Mode Access Point An access point enabled all ethernet ports to be bridged together and be in the same subnet. To connect to the Internet, another device, such as a router, is required.
Chapter 30 Sys OP Mode WISP A WISP client connects to an existing access point wirelessly. It acts just like a wireless client in notebooks/computers. Figure 131 IP Address in Access Point Mode Wireless Client Access Point 30.4 Sys Op Mode Screen Use this screen to select how you want to use your NBG-419N. Figure 132 Maintenance > Sys OP Mode The following table describes the labels in the General screen.
Chapter 30 Sys OP Mode LABEL DESCRIPTION Access Point Select Access Point Mode if your device bridges traffic between clients on the same network. • • • • WISP Mode In Access Point mode all Ethernet ports have the same IP address. All ports on the rear panel of the device are LAN ports, including the port labeled WAN. There is no WAN port. The DHCP server on your device is disabled. The IP address of the device on the local network is set to 192.168.1.2.
CHAPTER 31 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG-419N Access and Login • Internet Access • Resetting the NBG-419N to Its Factory Defaults • Wireless Router/AP Troubleshooting 31.1 Power, Hardware Connections, and LEDs The NBG-419N does not turn on. None of the LEDs turn on.
Chapter 31 Troubleshooting 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the NBG-419N. 5 If the problem continues, contact the vendor. 31.2 NBG-419N Access and Login I don’t know the IP address of my NBG-419N. 1 The default IP address is 192.168.1.1.
Chapter 31 Troubleshooting 2 If this does not work, you have to reset the device to its factory defaults. See Section 31.4 on page 221. I cannot see or access the Login screen in the Web Configurator. 1 Make sure you are using the correct IP address. • The default IP address is 192.168.1.1. • If you changed the IP address (Section 13.4 on page 137), use the new IP address.
Chapter 31 Troubleshooting 2 This can happen when you fail to log out properly from your last session. Try logging in again after 5 minutes. 3 Disconnect and re-connect the power adaptor or cord to the NBG-419N. 4 If this does not work, you have to reset the device to its factory defaults. See Section 31.4 on page 221. 31.3 Internet Access I cannot access the Internet. 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide.
Chapter 31 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.5 on page 22. 2 Reboot the NBG-419N. 3 If the problem continues, contact your ISP. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5 on page 22.
Chapter 31 Troubleshooting You will lose all of your changes when you push the RESET button. To reset the NBG-419N, 1 Make sure the power LED is on. 2 Press the RESET button for longer than 1 second to restart/reboot the NBG-419N. 3 Press the RESET button for longer than five seconds to set the NBG-419N back to its factory-default configurations. If the NBG-419N restarts automatically, wait for the NBG-419N to finish restarting, and log in to the Web Configurator. The password is “1234”.
Chapter 31 Troubleshooting • See the chapter on Wireless LAN in the User’s Guide for more information. to select Router Mode. I set up URL keyword blocking, but I can still access a website that should be blocked. Make sure that you select the Enable URL Keyword Blocking check box in the Content Filtering screen. Make sure that the keywords that you type are listed in the Keyword List.
Chapter 31 Troubleshooting 224 NBG-419N User’s Guide
CHAPTER 32 Product Specifications The following tables summarize the NBG-419N’s hardware and firmware features. Table 79 Hardware Features Dimensions (W x D x H) 162 mm x 115 mm x 33 mm Weight 252 g Power Specification Input: 100~240 V AC, 50~60 Hz Output: 12 V DC 1A Ethernet ports Auto-negotiating: 10 Mbps, 100 Mbps in either half-duplex or fullduplex mode. Auto-crossover: Use either crossover or straight-through Ethernet cables.
Chapter 32 Product Specifications Table 80 Firmware Features FEATURE DESCRIPTION Default IP Address 192.168.1.1 (router) 192.168.1.2. (AP) Default Subnet Mask 255.255.255.0 (24 bits) Default Password 1234 DHCP Pool 192.168.1.33 to 192.168.1.64 Wireless Interface Wireless LAN Default Wireless SSID ZyXEL Default Wireless DHCP Pool Size Wireless LAN: Same as LAN (32 from 192.168.1.33 to 192.168.1.
Chapter 32 Product Specifications Table 80 Firmware Features FEATURE DESCRIPTION Content Filter The NBG-419N blocks or allows access to web sites that you specify and blocks access to web sites with URLs that contain keywords that you specify. You can define time periods and days during which content filtering is enabled. You can also include or exclude particular computers on your network from content filtering.
Chapter 32 Product Specifications 32.1 Wall-mounting Instructions Complete the following steps to hang your NBG-419N on a wall. 1 Select a position free of obstructions on a sturdy wall. 2 Drill two holes for the screws. Be careful to avoid damaging pipes or cables located inside the wall when drilling holes for the screws. 3 Do not insert the screws all the way into the wall. Leave a small gap of about 0.5 cm between the heads of the screws and the wall.
Chapter 32 Product Specifications The following are dimensions of an M4 tap screw and masonry plug used for wall mounting. All measurements are in millimeters (mm).
Chapter 32 Product Specifications 230 NBG-419N User’s Guide
P ART VI Appendices and Index Pop-up Windows, JavaScripts and Java Permissions (233) IP Addresses and Subnetting (241) Setting up Your Computer’s IP Address (251) Wireless LANs (269) Common Services (281) Legal Information (285) Index (293) 231
APPENDIX A Pop-up Windows, JavaScripts and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScripts (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix A Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 136 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix A Pop-up Windows, JavaScripts and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 137 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix A Pop-up Windows, JavaScripts and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 138 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScripts are allowed.
Appendix A Pop-up Windows, JavaScripts and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 139 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix A Pop-up Windows, JavaScripts and Java Permissions 6 Click OK to close the window. Figure 140 Security Settings - Java Scripting Java Permissions 238 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix A Pop-up Windows, JavaScripts and Java Permissions 5 Click OK to close the window. Figure 141 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix A Pop-up Windows, JavaScripts and Java Permissions 3 Click OK to close the window.
APPENDIX B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix B IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 143 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix B IP Addresses and Subnetting Table 81 Subnet Mask - Identifying Network Number Network Number 1ST OCTET: 2ND OCTET: 3RD OCTET: 4TH OCTET (192) (168) (1) (2) 11000000 10101000 00000001 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
Appendix B IP Addresses and Subnetting As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows: Table 83 Maximum Host Numbers SUBNET MASK HOST ID SIZE 8 bits 24 bits 255.0.0.0 16 bits 255.255.0.0 24 bits 255.255.255.0 29 bits 255.255.255.
Appendix B IP Addresses and Subnetting Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons. In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.
Appendix B IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 145 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix B IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 85 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.
Appendix B IP Addresses and Subnetting Table 88 Subnet 4 (continued) LAST OCTET BIT VALUE IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix B IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 91 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 2046 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.
Appendix B IP Addresses and Subnetting that you entered. You don't need to change the subnet mask computed by the NBG-419N unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
APPENDIX C Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer. Windows 3.1 requires the purchase of a thirdparty TCP/IP application package.
Appendix C Setting up Your Computer’s IP Address Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. Figure 146 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add. 2 Select Adapter and then click Add.
Appendix C Setting up Your Computer’s IP Address 3 Select Microsoft from the list of manufacturers. 4 Select TCP/IP from the list of network protocols and then click OK. If you need Client for Microsoft Networks: 1 Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK. 5 Restart your computer so the changes you made take effect.
Appendix C Setting up Your Computer’s IP Address 3 Click the DNS Configuration tab. • If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). Figure 148 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways.
Appendix C Setting up Your Computer’s IP Address 3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. 1 Click start (Start in Windows 2000/NT), Settings, Control Panel.
Appendix C Setting up Your Computer’s IP Address 2 In the Control Panel, double-click Network Connections (Network and Dialup Connections in Windows 2000/NT). Figure 150 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties.
Appendix C Setting up Your Computer’s IP Address 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 152 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). • If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields.
Appendix C Setting up Your Computer’s IP Address • Click Advanced. Figure 153 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: • In the IP Settings tab, in IP addresses, click Add. • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
Appendix C Setting up Your Computer’s IP Address • Click OK when finished. Figure 154 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
Appendix C Setting up Your Computer’s IP Address If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. Figure 155 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
Appendix C Setting up Your Computer’s IP Address Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/ IP Control Panel.
Appendix C Setting up Your Computer’s IP Address 2 Select Ethernet built-in from the Connect via list. Figure 157 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box.
Appendix C Setting up Your Computer’s IP Address Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window. Figure 158 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list.
Appendix C Setting up Your Computer’s IP Address 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box. 5 Click Apply Now and close the window. 6 Turn on your Prestige and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
Appendix C Setting up Your Computer’s IP Address 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. Figure 161 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.
Appendix C Setting up Your Computer’s IP Address 5 Click the Devices tab. 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 163 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.
Appendix C Setting up Your Computer’s IP Address • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0. Figure 165 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.1.10 NETMASK=255.255.255.
Appendix C Setting up Your Computer’s IP Address 32.1.1 Verifying Settings Enter ifconfig in a terminal screen to check your TCP/IP properties. Figure 168 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.
APPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. Figure 170 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate. Figure 171 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area.
Appendix D Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 172 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix D Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix D Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 92 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/ 48/54 OFDM (Orthogonal Frequency Division Multiplexing) IEEE 802.1x In June 2001, the IEEE 802.
Appendix D Wireless LANs Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access.
Appendix D Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 authentication method does not support data encryption with dynamic session key.
Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled. Note: EAP-MD5 cannot be used with dynamic WEP key exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
Appendix D Wireless LANs TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. This all happens in the background automatically.
Appendix D Wireless LANs 32.1.2 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols). 2 The AP checks each wireless client's password and (only) allows it to join the network if the password matches. 3 The AP derives and distributes keys to the wireless clients.
Appendix D Wireless LANs Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 94 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTIO ENTER IEEE 802.
APPENDIX E Common Services The following table lists some commonly-used services and their associated protocols and port numbers. For a comprehensive list of port numbers, ICMP type/ code numbers and services, visit the IANA (Internet Assigned Number Authority) web site. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service.
Appendix E Common Services Table 95 Commonly Used Services (continued) 282 NAME PROTOCOL PORT(S) DESCRIPTION ESP (IPSEC_TUNNEL) User-Defined 50 The IPSEC ESP (Encapsulation Security Protocol) tunneling protocol uses this service. FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on. FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.
Appendix E Common Services Table 95 Commonly Used Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel. PPTP_TUNNEL (GRE) User-Defined 47 PPTP (Point-to-Point Tunneling Protocol) enables secure transfer of data over public networks. This is the data channel. RCMD TCP 512 Remote Command Service.
Appendix E Common Services Table 95 Commonly Used Services (continued) 284 NAME PROTOCOL PORT(S) DESCRIPTION TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP, but uses the UDP (User Datagram Protocol) rather than TCP (Transmission Control Protocol). VDOLIVE TCP 7000 Another videoconferencing solution.
APPENDIX F Legal Information Copyright Copyright © 2009 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix F Legal Information harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this device does cause harmful interference to radio/television reception, which can be determined by turning the device off and on, the user is encouraged to try to correct the interference by one or more of the following measures: 1 Reorient or relocate the receiving antenna.
Appendix F Legal Information This device has been designed for the WLAN 2.4 GHz network throughout the EC region and Switzerland, with restrictions in France. This Class B digital apparatus complies with Canadian ICES-003. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules.
Appendix F Legal Information ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Appendix F Legal Information 1 Grant of License for Personal Use ZyXEL Communications Corp. ("ZyXEL") grants you a non-exclusive, nonsublicense, non-transferable license to use the program with which this license is distributed (the "Software"), including any documentation files accompanying the Software ("Documentation"), for internal business use only, for up to the number of users specified in sales order and invoice.
Appendix F Legal Information private label or otherwise permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity. You may not cause, assist or permit any third party to do any of the foregoing. Portions of the Software utilize or include third party software and other copyright material.
Appendix F Legal Information IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Appendix F Legal Information 11 General This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan. This License Agreement shall constitute the entire Agreement between the parties hereto.
Index Index A ActiveX 169 Address Assignment 120 Alert 199 alternative subnet mask notation 244 AP 21 content filtering 167 by keyword (in URL) 168 by web feature 167 Cookies 169 copyright 285 CPU usage 66, 75, 83 CTS (Clear to Send) 272 AP (Access Point) 271 AP Mode menu 76 status screen 74, 81 D AP+Bridge 21 Daylight saving 202 Auto-bridge 132, 133 DDNS 151 see also Dynamic DNS service providers 152 B DHCP 44, 139 DHCP server see also Dynamic Host Configuration Protocol Bandwidth management ove
Index E EAP Authentication 275 Encryption 277 encryption 101 key 102 WPA compatible 102 IGMP 121 see also Internet Group Multicast Protocol version IGMP version 121 Independent Basic Service Set 269 Internet Assigned Numbers Authority See IANA ESS 270 Internet Group Multicast Protocol 121 ESSID 222 IP Address 137, 138, 144, 145 Extended Service Set 270 IP alias 137 IP Pool 140 F J FCC interference statement 285 File Transfer Program 181 Java 169 Firewall ICMP packets 163 Firmware upload 205 fil
Index using the WPS. See WPS.
Index subnet 241 Subnet Mask 137, 138 W subnet mask 242 WAN (Wide Area Network) 119 subnetting 245 WAN advanced 132 Summary DHCP table 44 Packet statistics 45 Wireless station status 46 WAN MAC address 121 warranty 288 note 288 Sys Op Mode 213 Web Configurator how to access 37 Overview 37 System General Setup 197 web configurator 22 System Name 198 Web Proxy 169 System restart 211 WEP Encryption 86, 106, 108 syntax conventions 5 WEP encryption 105 WEP key 105 T Wireless association list 4
Index X Xbox Live 181 NBG-419N User’s Guide 297
Index 298 NBG-419N User’s Guide