When you decide to use the WEP encryption to secure your WLAN, please refer to the following setting of the WEP encryption: l 64-bit WEP Encryption:64-bit WEP keys are as same as the encryption method of 40-bit WEP. You can input 10 hexadecimal digits (0~9, a~f or A~F) or 5 ACSII chars. l 128-bit WEP Encryption : 128-bit WEP keys are as same as the encryption method of 104-bit WEP. You can input 26 hexadecimal digits (0~9, a~f or A~F) or 10 ACSII chars.
(Shared Secret) and Port number of the target RADIUS server. WPA Encryption Setting WPA feature provides a high level of assurance for end-users and administrators that their data will remain private and access to their network restricted to authorized users. You can choose the WPA encryption and select the Authentication Mode. WPA Authentication Mode This device supports two WPA modes. For personal user, you can use the Pre-shared Key to enhance your security setting.
Configuring as WLAN Client Adapter This device can be configured as a wireless Ethernet adapter. In this mode, the device can connect to the other wireless stations (Ad-Hoc network type) or Access Point (Infrastructure network type) and you don’t need to install any driver. Quick start to configure Step 1. In “Basic Settings” page, change the Mode to “Client” mode. And key in the SSID of the AP you want to connect then press “Apply Changes” button to apply the change. 1 2 3 Step 2.
The alternative way to configure as following: Step 1. In “Wireless Site Survey” page, select one of the SSIDs you want to connect and then press “Connect” button to establish the link. 2 1 3 Step 2. If the linking is established successfully. It will show the message “Connect successfully”. Then press “OK”. Step 3. Then you can check the linking information in “Status” page.
Note : If the available network requires authentication and data encryption, you need to setup the authentication and encryption before step1 and all the settings must be as same as the Access Point or Station. About the detail authentication and data encryption settings, please refer the security section. Authentication Type In client mode, the device also supports two Authentication Types “ Open system” and “ Shared Key”.
Configuring Universal Repeater This device can be configured as a Repeater. In this mode, the device can extend available wireless range of other AP let user can link the network that they want, Also the device working as AP and Repeater same time. Following two ways describe how to make Universal Repeater effective. 1. Enable Universal Repeater Mode and then select a SSID in the Table that you want. Fina l click Apply Changes button to take effective.
2. Enter specific SSID in the Extended SSID field and then click Apply Changes button to take effective.
Ch 3. Configuring WDS Wireless Distribution System (WDS) uses wireless media to communicate with the other devices, like the Ethernet does. This function allows one or more remote LANs connect with the local LAN. To do this, you must set these devices in the same channel and set MAC address of other devices you want to communicate with in the WDS AP List and then enable the WDS. When you decide to use the WDS to extend your WLAN, please refer the following instructions for configuration.
Star topology: LAN 1 WDS #5 WDS #2 WDS #1 LAN 5 LAN 2 WDS #4 WDS #3 LAN 4 LAN3 Device Entries of WDS AP List WDS1 The MAC Addresses of WDS2, WDS3, WDS4 and WDS5 The MAC Address of WDS1 The MAC Address of WDS1 The MAC Address of WDS1 The MAC Address of WDS1 WDS2 WDS3 WDS4 WDS5 Spanning Tree Protocol Required No No No No No Ring topology: LAN 1 WDS #1 LAN 5 LAN 2 WDS #2 WDS #5 WDS #4 LAN 4 Device Entries of WDS AP List WDS1 WDS2 WDS3 WDS4 WDS5 The The The The The WDS #3 LAN3 MAC
Mesh topology: LAN 1 WDS #1 LAN 5 LAN 2 WDS #2 WDS #5 WDS #4 LAN 4 WDS #3 LAN3 Device Entries of WDS AP List WDS1 WDS2 WDS3 WDS4 WDS5 The MAC Addresses of WDS2, WDS3, WDS4 and WDS5 The MAC Addresses of WDS1, WDS3, WDS4 and WDS5 The MAC Addresses of WDS1, WDS2, WDS4 and WDS5 The MAC Addresses of WDS1, WDS2, WDS3 and WDS5 The MAC Addresses of WDS1, WDS2, WDS3 and WDS4 Spanning Tree Protocol Required Yes Yes Yes Yes Yes WDS Application Wireless Repeater Wireless Repeater can be used to increase
Ethernet Wireless station AP Repeater Description Entries of WDS AP List Access Point Repeater The MAC Address of Repeater The MAC Address of Access Point Spanning Tree Protocol Required Yes Yes Wireless Bridge Wireless Bridge can establish a wireless connection between two or more Wired LANs. When you decide to use the WDS as a Wireless Bridge, please refer the following instructions for configuration. l In AP mode, enable the WDS function.
Ch 4. Advanced Configurations Configuring LAN to WAN Firewall Filtering function is used to block or permit packets from LAN to WAN. The device supports three kinds of filter Port Filtering, IP Filtering and MAC Filtering. All the entries in current filter table are used to restrict or allow certain types of packets from your local network to through the device. Use of such filters can be helpful in securing or restricting your local network.
If you select DROP for the IP forwarding default policy, once the source port of outgoing packets match the port definition or within the port ranges in the table, the firewall will allow those packets form LAN to WAN. IP Filtering When you enable the IP Filtering function, you can specify local IP Addresses in current filter table.
If you select DROP for the IP forwarding default policy, once the source IP address of outgoing packets match the IP address definition in the table, the firewall will allow those packets form LAN to WAN. MAC Filtering When you enable the MAC Filtering function, you Addresses in current filter table. If you select forwarding default policy, once the source MAC packets match the MAC Address definition in the block those packets form LAN to WAN.
NAT (Network Address Translation) NAT is the translation between public IP address and private IP address. While NAT is enabling, you can use port forwarding or DMZ to redirect your common network services. If you want to disable NAT, you can go to Management-Route page to disable it and the functions of DMZ, Port Forwarding will be disabled.
SIP (Session Initiation Protocol) PPTP (Point -to-Point Tunneling Protocol) 5060 1723 Multiple Servers behind NAT Example: In this case, there are two PCs in the local network accessible for outside users. AP Client #1 Web Server IP Address:192.168.2.1 Port:80 Internet AP Device with Router Mode enabled WLAN IP Address:192.168.2.254 User AP Client #2 FTP Server IP Address:192.168.2.
Enable DMZ: DMZ Host IP Address: Enable the “Enable DMZ”, and then click “Apply Changes” button to save the changes. Input the IP Address of the computer that you want to expose to Internet. Internet AP Client Device with Router Mode enabled DNS Host Configuring WAN Interface The device supports four kinds of IP configuration for WAN interface, including Static IP, DHCP Client, PPPoE and PPTP. You can select one of the WAN Access Types depend on your ISP required.
IP Address: Subnet Mask: Default Gateway: DNS 1~3: Clone MAC Address: Enable uPnP: The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier besides your local network. The number used to identify the IP subnet network, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway. The IP address of Default Gateway provided by your ISP or MIS.
DNS1~3: The IP addresses of DNS provided by your ISP. DNS (Domain Name Server) is used to map domain names to IP addresses. DNS maintain central lists of domain name/IP addresses and map the domain names in your Internet requests to other servers on the Internet until the specified web site is found. Clone MAC Address: Clone device MAC address to the specify MAC address required by your ISP Enable uPnP: Enable uPnP, this function allows the device to be found and configured automatically by the system.
User Name: The account provided by your ISP Password: The password for your account. Connect Type: “ Continuous “ : connect to ISP permanently “Manual” : Manual connect/disconnect to ISP “On-Demand”: Automatically connect to ISP when user needs to access the Internet. Idle Time: The number of inactivity minutes to disconnect from ISP. This setting is only available when “Connect on Demand” connection type is selected.
IP Address: Subnet Mask: Server IP Address: (Default Gateway) User Name: Password: MTU Size: DNS1~3: Clone MAC Address: Enable uPnP: The Internet Protocol (IP) address of WAN interface provided by your ISP or MIS. The address will be your network identifier besides your local network. The number used to identify the IP subnet network, indicating whether the IP address can be recognized on the LAN or if it must be reached through a gateway.
3. Clone MAC address for PPPoE WAN access type 4.
5. Physical LAN interface MAC address clone Configuring DHCP Server 1. 2. To use the DHCP server inside the device, please make sure there is no other DHCP server existed in the same network as the device. Enable the DHCP Server option and assign the client range of IP addresses as following page. 3. When the DHCP server is enabled and also the device router mode is enabled then the default gateway for all the DHCP client hosts will set to the IP address of device.
Note: Only device on Client mode or WISP mode this functionality can take effective. 2. Parameter Definition Label Upstream Data Rate Upstream Latency Upstream Burst Packet Downstream Data Rate Downstream Latency Downstream Burst Packet Description Speed of transmit data that from Ethernet interface to Wireless interface. Similar a waiting time the data queuingtime. Similar a buffer the data will into the buffer while the data is transmit or receive.
QoS (Quality of Service) Filter Priority and IP-ToS have not finished yet and also fine tuning. QoS allows you to specify some rules, to ensure the quality of service in your network. Such as use Bandwidth Priority concept to allocate bandwidth. This function can be helpful in shaping and queuing traffic from LAN (WLAN) to WAN or LAN to WLAN, but not WLAN to WLAN.
The following table describes the priorities that you can apply to bandwidth. Priority Level Description High Typically used for voice or video applications that is especially sensitive to the variations in delay. Typically used for important traffic that can tolerate some delay. Medium Low Typically used for non-critical traffic such as a large number of transfers but that should not affect other application. Click the QoS link under Management to open the QoS Setting page.
Bandwidth Borrowed Select this check box to allow a rule to borrow unused bandwidth. Bandwidth borrowing is decided by priority of the rules. Higher priority will get the remaining bandwidth first. Max Throughput Bandwidth Ratio (H/M/L) Enter the value of max throughput in kbps that you want to allocate for one rule. The value should between 1200 kbps and 24000 kbps. You can specify the ratio of priority in these fields. The range from 1 to 99.
The following table describes the labels in this part. Label Description IP Address Enter source/destination IP Address in dotted decimal notation. Once the source/destination IP Address is entered, the subnet mask address must be filled in this field. Netmask MAC Address Enter source/destination MAC Address. Port / range You can enter specific port number or port range of the source/destination Select a protocol from the drop down list box. Choose TCP/UDP, TCP or UDP.
Reset Click this button to begin re- input the parameters. Current QoS setting table In this part, you can see how many rules have been specified. And you can see the detail about the rules and manage the rules. This table can input 50 rules at most. An example for usage User C LAN WAN VoIP FTP Internet Web Zplus-G192 User B User A For example, there are three users in your network. Ÿ User A wants to browse the websites to retrieve information.
Static Route Setup User can set the routing information let the Router knows what routing is correct also it can not learn automatically through other means. Network 1 Network 2 Network 3 R1 HUB Network 4 R2 For example, if user wants to link the Network 3 and Network 4 separately from Network 1 that Routing Table configuration as blow: 1.
2. Enter IP Address of Network 4、Subnet Mask and IP Address of Router (R2) in Default Gateway field final click Apply Change button. 3. In Static Route Table there have two routings for Network 3 and Network 4 Dynamic Route Setup The Dynamic Route utilizes RIP1/2 to transmit and receive the route information with other Routers. 1. Enable Dynamic Route and then select RIP 1、RIP2 or Both to transmit/receive packets final click Apply Change button. 2.
3. In Dynamic Routing Table there have two routings for Network 3 and Network 4 VPN Pass-through This functionality let the device can Pass-through the VPN packets including PPTP/ L2TP/IPsec VPN Connection. VPN Connection WAN LAN Laptop 1 VPN Client (VPN Passthrough) VPN Server 1. Check the VPN Pass-through in WAN Interface of TCP/IP Page that you want and then click Apply Changes button.
This program won’t execute automatically when user login the device. User must manually execute it by typing the case-sensitive command “cli”. Please note that any modified settings won’t save permanently until user “Apply Changes to Flash” or reboot it. The new settings modified by CLI will take effect after rebooting the device.
Operation Mode 1: Router 2: Bridge 0: Cancel Wireless Setting A. Basic Settings B. Advanced Settings C. Security Settings D. Access Control Settings E. WDS Settings 0. Exit A. Operation Mode B. Wireless Setting TCP/IP-LAN Setting A. IP Address B. Subnet Mask C. Default Gateway D. DHCP E. DHCP Client Range F . 802.1d Spanning Tree G. Clone MAC Address H. MTU Size 0. Exit C. TCP/IP-LAN Setting D. TCP/ IP-WAN Setting E. Route Setting F. Firewall Setting G. Management H. Apply Changes to Flash I .
The System Management Password Protection Both Web-Browser and SSH configuration interfaces have password protection. To disable the Web-Browser password protection just leave the “User Name” field to blank then click “Apply Changes” button. To change the password of user “root” for SSH session, please use the CLI menu item G. System SettingàA.
SNMP Agent This device is compatible with SNMP v1/v2c and provides standard MIB II. Currently only the “public” community string is available and the modified settings by SNMP SET request will be lost after rebooting the device. 1. Enable SNMP and then enter IP Address of SNMP Manager in Trap Receiver IP Address field and Community String in System Community String field. Final click Apply Changes button. 2.
3. SNMP Traps Traps coldStart(0) linkDown(2) Description The trap from device after reboot the device The trap is sent when any of the links are down. See the following table. linkup(3) The trap is sent when any of the links are UP. See the following table. authenticationFailure(4) The trap is sent when the device receiving gets or sets requirement with wrong community. 4. Private MIBs OID Description 1.3.6.1.4.1.99.1 1.3.6.1.4.1.99.2 Mode, Operation Mode in device. SSID, SSID of the device 1.3.6.
1.3.6.1.4.1.99.3 - Channel 1.3.6.1.4.1.99.4 - Band 1.3.6.1.4.1.99.5 - RSSI 1.3.6.1.4.1.99.6 - Active_Clients 1.3.6.1.4.1.99.7 - Active_Clients_List 1.3.6.1.4.1.99.
Miscellaneous Settings The default http port is 80. For internet security, you can change the device’ s http port, to protect this web server from hacker’ s attack. 1. Entering the port number you want to change in HTTP PORT field, then click Apply Changes button. 3 1 4 2 2. After apply change, you should re-login the web server. Type http://192.168.2.254:65500/ in URL field.
Firmware Upgrade Firmware Types The firmware for this device is divided into 2 parts, one is web pages firmware the other is application firmware, and the naming usually are zw2000webpage.bin and zw2000linux.bin. To upgrade firmware, we suggest user first upgrade the application firmware then web pages firmware. Upgrading Firmware The Web-Browser upgrading interface is the simplest and safest way for user, it will check the firmware checksum and signature, and the wrong firmware won’t be accepted.
To save & restore configuration data of device, just assign the target filename with full path at your local host, then you can backup configuration data to local host or restore configuration data to the device. Auto Discovery Tool User can use this tool to find out how many devices in your local area network. The name of tool is WirelessConf.exe it in the packing CD. This tool has password protected. The default password is “qwert”, after login, you can change the password. Tool’s Version 1.
• ‚ ƒ „ … † ‡ ˆ 1. Change Password You can change password for this tool. Fill the new password in the New Password field, and the n click on Change Password button. 2. Discover After press this button, you could see there are how many devices in your network.
4. Detail If you want to see more detailed information, you could press the Detail button, and then you would see the Detail Information window.
5. WDS If the device you selected is on WDS mode or AP+WDS mode, you could press WDS button, and then you would see the WDS List window. 6. Active Clients After press Active Clients button, you would see WLAN AP Active Clients window.
7. Connect to Web Server If you want connect to device’s web server, you could press this button, or double-click on the device. 8. Close You could press this button to leave this tool. This equipment has been tested and found to comply with the limits for a class B digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide to provide reasonable protection against harmful interference in a residential installation.