NBG-416N Wireless N-lite Home Router Default Login Details IP Address http://192.168.1.1 Username admin Password 1234 Firmware Version 1.0 www.zyxel.com Edition 1, 1/2011 www.zyxel.
About This User's Guide About This User's Guide Intended Audience This manual is intended for people who want to configure the NBG-416N using the Web Configurator. You should have at least a basic knowledge of TCP/IP networking concepts and topology. Tips for Reading User’s Guides On-Screen When reading a ZyXEL User’s Guide On-Screen, keep the following in mind: • If you don’t already have the latest version of Adobe Reader, you can download it from http://www.adobe.com.
About This User's Guide Documentation Feedback Send your comments, questions or suggestions to: techwriters@zyxel.com.tw Thank you! The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 30099, Taiwan. Need More Help? More help is available at www.zyxel.com. • Download Library Search for the latest product updates and documentation from this link.
About This User's Guide Customer Support Should problems arise that cannot be solved by the methods listed above, you should contact your vendor. If you cannot contact your vendor, then contact a ZyXEL office for the region in which you bought the device. See http://www.zyxel.com/web/contact_us.php for contact information. Please have the following information ready when you contact an office. • Product model and serial number. • Warranty Information. • Date that you received your device.
Document Conventions Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could harm you or your device. Note: Notes tell you other important information (for example, other things you may need to configure or helpful tips) or recommendations. Syntax Conventions • The NBG-416N may be referred to as the “NBG-416N”, the “device”, the “product” or the “system” in this User’s Guide.
Document Conventions Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The NBG-416N icon is not an exact representation of your device.
Safety Warnings Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do NOT expose your device to dampness, dust or corrosive liquids. • Do NOT store things on the device. • Do NOT install, use, or service this device during a thunderstorm. There is a remote risk of electric shock from lightning. • Connect ONLY suitable accessories to the device. • Do NOT open the device or unit.
Contents Overview Contents Overview User’s Guide ........................................................................................................................... 17 Introduction ................................................................................................................................ 19 The WPS Button ........................................................................................................................ 23 The Web Configurator ..............................
Contents Overview 10 NBG-416N User’s Guide
Table of Contents Table of Contents About This User's Guide .......................................................................................................... 3 Document Conventions............................................................................................................ 6 Safety Warnings........................................................................................................................ 8 Contents Overview .......................................................
Table of Contents 4.1 Wizard Setup ....................................................................................................................... 35 4.2 Connection Wizard: STEP 1: System Information ............................................................... 36 4.2.1 System Name ............................................................................................................. 36 4.2.2 Domain Name .......................................................................................
Table of Contents 7.2 What You Can Do ................................................................................................................ 68 7.3 What You Should Know ....................................................................................................... 68 7.3.1 Wireless Security Overview ....................................................................................... 68 7.4 General Wireless LAN Screen .....................................................................
Table of Contents 11.1 Overview ....................................................................................................................... 101 11.2 What You Can Do ............................................................................................................ 102 11.2.1 What You Need To Know ........................................................................................ 102 11.3 General NAT Screen .........................................................................
Table of Contents Chapter 16 Logs ....................................................................................................................................... 131 16.1 Overview .......................................................................................................................... 131 16.2 What You Need to Know .................................................................................................. 131 16.3 View Log Screen .............................................
Table of Contents Appendix D Wireless LANs .................................................................................................. 193 21.0.2 WPA(2)-PSK Application Example ......................................................................... 203 21.0.3 WPA(2) with RADIUS Application Example ........................................................... 203 Appendix E Services ............................................................................................................
P ART I User’s Guide 17
CHAPTER 1 Introduction 1.1 Overview This chapter introduces the main features and applications of the NBG-416N. The NBG-416N extends the range of your existing wired network without additional wiring, providing easy network access to mobile users. You can set up a wireless network with other IEEE 802.11b/g/n compatible devices. A range of services such as a firewall and content filtering are also available for secure Internet computing. 1.
Chapter 1 Introduction 1.3 Ways to Manage the NBG-416N Use any of the following methods to manage the NBG-416N. • WPS (Wi-Fi Protected Setup). You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL Device. • Web Configurator. This is recommended for everyday management of the NBG416N using a (supported) web browser. 1.
Chapter 1 Introduction Table 1 Front Panel LEDs and WPS Button (continued) LED COLOR STATUS DESCRIPTION LAN 1-4 Green On The NBG-416N has a successful 10/100MB LAN connection. Blinking The NBG-416N is sending/receiving data through the LAN. Off The LAN is not connected. On The NBG-416N has a successful 10/100MB WAN connection. Blinking The NBG-416N is sending/receiving data through the WAN. Off The WAN connection is not ready, or has failed.
Chapter 1 Introduction 22 NBG-416N User’s Guide
CHAPTER 2 The WPS Button 2.1 Overview Your NBG-416N supports WiFi Protected Setup (WPS), which is an easy way to set up a secure wireless network. WPS is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Each WPS connection works between two devices. Both devices must support WPS (check each device’s documentation to make sure).
Chapter 2 The WPS Button 24 NBG-416N User’s Guide
CHAPTER 3 The Web Configurator 3.1 Overview This chapter describes how to access the NBG-416N Web Configurator and provides an overview of its screens. The Web Configurator is an HTML-based management interface that allows easy setup and management of the NBG-416N via Internet browser. Use Internet Explorer 6.0 and later versions, Mozilla Firefox 3 and later versions, or Safari 2.0 and later versions. The recommended screen resolution is 1024 by 768 pixels.
Chapter 3 The Web Configurator 4 Type admin (default) as the user name and 1234 (default) as the password and click OK. Figure 3 Login Screen 5 You should see a screen asking you to change your password (highly recommended) as shown next. Type a new password (and retype it to confirm) and click Apply or click Ignore. Figure 4 Change Password Screen Note: The management session automatically times out when the time period set in the Administrator Inactivity Timer field expires (default five minutes).
Chapter 3 The Web Configurator • Select a language to go to the basic Web Configurator in that language. To change to the advanced configurator see Chapter 19 on page 143. Figure 5 Selecting the setup mode 3.3 Resetting the NBG-416N If you forget your password or IP address, or you cannot access the Web Configurator, you will need to use the RESET button at the back of the NBG-416N to reload the factory-default configuration file.
Chapter 3 The Web Configurator 3.5 Status Screen (Router Mode) Click on Status. The screen below shows the status screen in Router Mode. (For information on the status screen in AP Mode see Chapter 5 on page 50.) Figure 6 Status Screen (Router Mode) The following table describes the icons shown in the Status screen. Table 2 Status Screen Icon Key ICON DESCRIPTION Click this icon to open the setup wizard. Click this icon to view copyright and a link for related product information.
Chapter 3 The Web Configurator The following table describes the labels shown in the Status screen. Table 3 Web Configurator Status Screen (Router Mode) LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen. It is for identification purposes. Firmware Version This is the current firmware version of the NBG-416N. WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device.
Chapter 3 The Web Configurator Table 3 Web Configurator Status Screen (Router Mode) (continued) LABEL DESCRIPTION System Setting - Firewall This shows whether the firewall is active or not. - UPnP This shows whether UPnP is active or not. Interface Status Interface This displays the NBG-416N port types. The port types are: WAN, LAN and WLAN. Status For the LAN and WAN ports, this field displays Down (line is down) or Up (line is up or connected).
Chapter 3 The Web Configurator Table 4 Screens Summary (continued) LINK TAB FUNCTION General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the NBG-416N to block access to devices or block the devices from accessing the NBG-416N. Advanced This screen allows you to configure advanced wireless settings. QoS Use this screen to configure Wi-Fi Multimedia Quality of Service (WMM QoS).
Chapter 3 The Web Configurator Table 4 Screens Summary (continued) LINK TAB FUNCTION Firmware Use this screen to upload firmware to your NBG-416N. Configuration Use this screen to backup and restore the configuration or reset the factory defaults to your NBG-416N. Restart This screen allows you to reboot the NBG-416N without turning the power off. Sys OP Mode General This screen allows you to select whether your device acts as a Router or a Access Point.
Chapter 3 The Web Configurator Table 5 Summary: DHCP Table (continued) LABEL DESCRIPTION MAC Address This field shows the MAC address of the computer with the name in the Host Name field. Every Ethernet device has a unique MAC (Media Access Control) address which uniquely identifies a device. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. Refresh Click Refresh to renew the screen. 3.5.
Chapter 3 The Web Configurator Table 6 Summary: Packet Statistics (continued) LABEL DESCRIPTION Tx B/s This displays the transmission speed in bytes per second on this port. Rx B/s This displays the reception speed in bytes per second on this port. System Up Time This is the total time the NBG-416N has been on. Poll Interval(s) Enter the time interval for refreshing statistics in this field. Set Interval Click this button to apply the new poll interval you entered in the Poll Interval(s) field.
CHAPTER 4 Connection Wizard 4.1 Wizard Setup This chapter provides information on the wizard setup screens in the Web Configurator. The Web Configurator’s wizard setup helps you configure your device to access the Internet. Refer to your ISP (Internet Service Provider) checklist in the Quick Start Guide to know what to enter in each field. Leave a field blank if you don’t have that information. 1 After you access the NBG-416N Web Configurator, click Go to Wizard setup.
Chapter 4 Connection Wizard 2 Choose a language by clicking on the language’s button. The screen will update. Click the Next button to proceed to the next screen. Figure 11 Select a Language 3 Read the on-screen information and click Next. Figure 12 Welcome to the Connection Wizard 4.2 Connection Wizard: STEP 1: System Information System Information contains administrative and system-related information. 4.2.1 System Name System Name is for identification purposes.
Chapter 4 Connection Wizard 4.2.2 Domain Name The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave this blank, the domain name obtained by DHCP from the ISP is used. While you must enter the host name (System Name) on each individual computer, the domain name can be assigned from the NBG-416N via DHCP. Click Next to configure the NBG-416N for Internet access. Figure 13 Wizard Step 1: System Information The following table describes the labels in this screen.
Chapter 4 Connection Wizard 4.3 Connection Wizard: STEP 2: Wireless LAN Set up your wireless LAN using the following screen. Figure 14 Wizard Step 2: Wireless LAN The following table describes the labels in this screen. Table 9 Wizard Step 2: Wireless LAN LABEL DESCRIPTION Name (SSID) Enter a descriptive name (up to 32 printable 7-bit ASCII characters) for the wireless LAN. If you change this field on the NBG-416N, make sure all wireless stations use the same SSID in order to access the network.
Chapter 4 Connection Wizard Note: The wireless stations and NBG-416N must use the same SSID, channel ID, WPA-PSK (if WPA-PSK is enabled) or WPA2-PSK (if WPA2-PSK is enabled) for wireless communication. 4.3.1 Extend (WPA-PSK or WPA2-PSK) Security Choose Extend (WPA-PSK) or Extend (WPA2-PSK) security in the Wireless LAN setup screen to set up a Pre-Shared Key. Figure 15 Wizard Step 2: Extend (WPA-PSK or WPA2-PSK) Security The following table describes the labels in this screen.
Chapter 4 Connection Wizard This wizard screen varies according to the connection type that you select. Figure 16 Wizard Step 3: ISP Parameters. The following table describes the labels in this screen, Table 11 Wizard Step 3: ISP Parameters CONNECTION TYPE DESCRIPTION Ethernet Select the Ethernet option when the WAN port is used as a regular Ethernet. PPPoE Select the PPP over Ethernet option for a dial-up connection. If your ISP gave you an IP address and/or subnet mask, then select PPTP.
Chapter 4 Connection Wizard personal computer interacts with a broadband modem (for example DSL, cable, wireless, etc.) to achieve access to high-speed data networks. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for instance, RADIUS). One of the benefits of PPPoE is the ability to let end users access one of multiple network services, a function known as dynamic service selection.
Chapter 4 Connection Wizard 4.4.3 PPTP Connection Point-to-Point Tunneling Protocol (PPTP) is a network protocol that enables transfers of data from a remote client to a private server, creating a Virtual Private Network (VPN) using TCP/IP-based networks. PPTP supports on-demand, multi-protocol, and virtual private networking over public networks, such as the Internet. Refer to the appendix for more information on PPTP. Note: The NBG-416N supports one PPTP server connection at any given time.
Chapter 4 Connection Wizard Table 13 Wizard Step 3: PPTP Connection (continued) LABEL DESCRIPTION Connection ID/ Name Enter the connection ID or connection name in this field. It must follow the "c:id" and "n:name" format. For example, C:12 or N:My ISP. This field is optional and depends on the requirements of your ISP. Get automatically from ISP Select this radio button if your ISP did not assign you a fixed IP address.
Chapter 4 Connection Wizard 4.4.5 WAN IP Address Assignment Every computer on the Internet must have a unique IP address. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems. However, the Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of IP addresses specifically for private networks. Table 15 Private IP Address Ranges 10.0.0.0 - 10.255.255.255 172.16.0.
Chapter 4 Connection Wizard Once you have decided on the network number, pick an IP address that is easy to remember, for instance, 192.168.1.1, for your NBG-416N, but make sure that no other device on your network is using that IP address. The subnet mask specifies the network number portion of an IP address. Your NBG-416N will compute the subnet mask automatically based on the IP address that you entered.
Chapter 4 Connection Wizard 4.4.8 WAN IP and DNS Server Address Assignment The following wizard screen allows you to assign a fixed WAN IP address and DNS server addresses. Figure 21 Wizard Step 3: WAN IP and DNS Server Addresses The following table describes the labels in this screen Table 16 Wizard Step 3: WAN IP and DNS Server Addresses LABEL DESCRIPTION WAN IP Address Assignment My WAN IP Address Enter your WAN IP address in this field.
Chapter 4 Connection Wizard 4.4.9 WAN MAC Address Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. Table 17 Example of Network Properties for LAN Servers with Fixed IP Addresses Choose an IP address 192.168.1.2-192.168.1.32; 192.168.1.65-192.168.1.254. Subnet mask 255.255.255.0 Gateway (or default route) 192.168.1.
Chapter 4 Connection Wizard 4.5 Connection Wizard Complete Click Finish to complete the wizard setup. Figure 23 Connection Wizard Complete Well done! You have successfully set up your NBG-416N to operate on your network and access the Internet.
CHAPTER 5 AP Mode 5.1 Overview This chapter discusses how to configure settings while your NBG-416N is set to AP Mode. Many screens that are available in Router Mode are not available in AP Mode. Note: See Chapter 6 on page 57 for an example of setting up a wireless network in AP mode. Use your NBG-416N as an AP if you already have a router or gateway on your network. In this mode your device bridges a wired network (LAN) and wireless LAN (WLAN) in the same subnet. See the figure below for an example.
Chapter 5 AP Mode 2 To set your NBG-416N to AP Mode, go to Maintenance > Sys OP Mode > General and select Access Point. Figure 25 Maintenance > Sys OP Mode > General 3 A pop-up appears providing information on this mode. Click OK in the pop-up message window. (See Section 18.3 on page 140 for more information on the pop-up.) Click Apply. Your NBG-416N is now in AP Mode. Note: You have to log in to the Web Configurator again when you change modes. 5.3 Status Screen (AP Mode) Click on Status.
Chapter 5 AP Mode The following table describes the labels shown in the Status screen. Table 19 Status Screen (AP Mode) LABEL DESCRIPTION Device Information System Name This is the System Name you enter in the Maintenance > System > General screen. It is for identification purposes. Firmware Version This is the current firmware version of the NBG-416N. LAN Information - MAC Address This shows the LAN Ethernet adapter MAC Address of your device. - IP Address This shows the LAN port’s IP address.
Chapter 5 AP Mode Table 19 Status Screen (AP Mode) (continued) LABEL DESCRIPTION Rate For the LAN ports, this displays the port speed and duplex setting or N/A when the line is disconnected. For the WLAN, it displays the maximum transmission rate when the WLAN is enabled and N/A when the WLAN is disabled. Summary Packet Statistics Use this screen to view port status and packet specific statistics.
Chapter 5 AP Mode Table 20 Menu: AP Mode (continued) LINK TAB FUNCTION General Use this screen to configure wireless LAN. MAC Filter Use the MAC filter screen to configure the NBG-416N to block access to devices or block the devices from accessing the NBG-416N. Advanced This screen allows you to configure advanced wireless settings. QoS Use this screen to configure Wi-Fi Multimedia Quality of Service (WMM QoS).
Chapter 5 AP Mode Note: If you change the IP address of the NBG-416N in the screen below, you will need to log into the NBG-416N again using the new IP address. Figure 28 Network > LAN > IP The table below describes the labels in the screen. Table 21 Network > LAN > IP LABEL DESCRIPTION Get from DHCP Server Select this to let the DHCP server in the gateway assign the NBG416N IP address. User Defined LAN IP Select this to give the NBG-416N a static IP address.
Chapter 5 AP Mode 2 The default IP address of the NBG-416N is “192.168.1.2”. In this case, your computer must have an IP address in the range between “192.168.1.3” and “192.168.1.254”. 3 Click Start > Run on your computer in Windows. 4 Type “cmd” in the dialog box. 5 Type “ipconfig” to show your computer’s IP address. If your computer’s IP address is not in the correct range then see Appendix C on page 175 for information on changing your computer’s IP address.
Chapter 5 AP Mode 56 NBG-416N User’s Guide
CHAPTER 6 Tutorials 6.1 Overview This chapter provides tutorials for your NBG-416N as follows: • How to Connect to the Internet from an AP • Configure Wireless Security Using WPS on both your NBG-416N and Wireless Client • Enable and Configure Wireless Security without WPS on your NBG-416N 6.2 How to Connect to the Internet from an AP This section gives you an example of how to set up an access point (AP) and wireless client (a notebook, B in this example) for wireless communication.
Chapter 6 Tutorials There are two WPS methods for creating a secure connection. This tutorial shows you how to do both. • Push Button Configuration (PBC) - create a secure wireless network simply by pressing a button. See Section 6.2.1.1 on page 58.This is the easier method. • PIN Configuration - create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the NBG-416N’s interface. See Section 6.2.1.2 on page 59.
Chapter 6 Tutorials The following figure shows you an example to set up wireless network and security by pressing a button on both NBG-416N and wireless client (the NWD210N in this example). Figure 30 Example WPS Process: PBC Method NBG-416N Wireless Client WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 6.2.1.2 PIN Configuration When you use the PIN configuration method, you need to use both NBG-416N’s configuration interface and the client’s utilities.
Chapter 6 Tutorials The following figure shows you the example to set up wireless network and security on NBG-416N and wireless client (ex. NWD210N in this example) by using PIN method.
Chapter 6 Tutorials 6.3 Enable and Configure Wireless Security without WPS on your NBG-416N This example shows you how to configure wireless security settings with the following parameters on your NBG-416N. SSID SSID_Example3 Channel 6 Security WPA-PSK (Pre-Shared Key: ThisismyWPA-PSKpre-sharedkey) Follow the steps below to configure the wireless settings on your NBG-416N.
Chapter 6 Tutorials 5 Open the Status screen. Verify your wireless and wireless security settings under Device Information and check if the WLAN connection is up under Interface Status. Figure 33 Tutorial: Status Screen 6.3.0.1 Configure Your Notebook Note: We use the ZyXEL M-302 wireless adapter utility screens as an example for the wireless client. The screens may vary for different models. 62 1 The NBG-416N supports IEEE 802.11b, IEEE 802.11g and IEEE 802.11n wireless clients.
Chapter 6 Tutorials 4 Select SSID_Example3 and click Connect. Figure 34 Connecting a Wireless Client to a Wireless Network t 5 Select WPA-PSK and type the security key in the following screen. Click Next. Figure 35 Security Settings 6 The Confirm Save window appears. Check your settings and click Save to continue.
Chapter 6 Tutorials 7 Check the status of your wireless connection in the screen below. If your wireless connection is weak or you have no connection, see the Troubleshooting section of this User’s Guide. Figure 37 Link Status If your connection is successful, open your Internet browser and enter http:// www.zyxel.com or the URL of any other web site in the address bar. If you are able to access the web site, your wireless connection is successfully configured.
P ART II Technical Reference 65
CHAPTER 7 Wireless LAN 7.1 Overview This chapter discusses how to configure the wireless network settings in your NBG-416N. See the appendices for more detailed information about wireless networks. The following figure provides an example of a wireless network. Figure 38 Example of a Wireless Network The wireless network is the part in the blue circle. In this wireless network, devices A and B are called wireless clients.
Chapter 7 Wireless LAN 7.2 What You Can Do • Use the General screen to enable the Wireless LAN, enter the SSID and select the wireless security mode (Section 7.4 on page 71). • Use the MAC Filter screen to allow or deny wireless stations based on their MAC addresses from connecting to the NBG-416N (Section 7.5 on page 76). • Use the Advanced screen to allow intra-BSS networking and set the RTS/CTS Threshold (Section 7.6 on page 77).
Chapter 7 Wireless LAN In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized devices to get the SSID. In addition, unauthorized devices can still see the information that is sent in the wireless network. 7.3.1.2 MAC Address Filter Every wireless client has a unique identification number, called a MAC address.
Chapter 7 Wireless LAN Local user databases also have an additional limitation that is explained in the next section. 7.3.1.4 Encryption Wireless networks can use encryption to protect the information that is sent in the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. The types of encryption you can choose depend on the type of user authentication. (See Section 7.3.1.3 on page 69 for information.
Chapter 7 Wireless LAN 7.3.1.5 WPS WiFi Protected Setup (WPS) is an industry standard specification, defined by the WiFi Alliance. WPS allows you to quickly set up a wireless network with strong security, without having to configure security settings manually. Depending on the devices in your network, you can either press a button (on the device itself, or in its configuration utility) or enter a PIN (Personal Identification Number) in the devices.
Chapter 7 Wireless LAN The following table describes the general wireless LAN labels in this screen. Table 23 Network > Wireless LAN > General LABEL DESCRIPTION Enable Wireless LAN Click the check box to activate wireless LAN. Name(SSID) (Service Set IDentity) The SSID identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID.
Chapter 7 Wireless LAN Note: If you do not enable any wireless security on your NBG-416N, your network is accessible to any wireless networking device that is within range. Figure 40 Network > Wireless LAN > General: No Security The following table describes the labels in this screen. Table 24 Network > Wireless LAN > General: No Security LABEL DESCRIPTION Security Mode Choose No Security from the drop-down list box. Apply Click Apply to save your changes back to the NBG-416N.
Chapter 7 Wireless LAN In order to configure and enable WEP encryption; click Network > Wireless LAN to display the General screen. Select Static WEP from the Security Mode list. Figure 41 Network > Wireless LAN > General: Static WEP The following table describes the wireless LAN security labels in this screen. Table 25 Network > Wireless LAN > General: Static WEP LABEL DESCRIPTION Security Mode Choose Static WEP from the drop-down list box.
Chapter 7 Wireless LAN Table 25 Network > Wireless LAN > General: Static WEP (continued) LABEL DESCRIPTION Apply Click Apply to save your changes back to the NBG-416N. Reset Click Reset to reload the previous configuration for this screen. 7.4.3 WPA-PSK/WPA2-PSK Click Network > Wireless LAN to display the General screen. Select WPA-PSK or WPA2-PSK from the Security Mode list. Figure 42 Network > Wireless LAN > General: WPA-PSK/WPA2-PSK The following table describes the labels in this screen.
Chapter 7 Wireless LAN 7.5 MAC Filter The MAC filter screen allows you to configure the NBG-416N to give exclusive access to up to 16 devices (Allow) or exclude up to 16 devices from accessing the NBG-416N (Deny). Every Ethernet device has a unique MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure this screen.
Chapter 7 Wireless LAN Table 27 Network > Wireless LAN > MAC Filter (continued) LABEL DESCRIPTION Set This is the index number of the MAC address. MAC Address Enter the MAC addresses of the wireless station that are allowed or denied access to the NBG-416N in these address fields. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc. Apply Click Apply to save your changes back to the NBG-416N.
Chapter 7 Wireless LAN Table 28 Network > Wireless LAN > Advanced (continued) LABEL DESCRIPTION Fragmentation Threshold The threshold (number of bytes) for the fragmentation boundary for directed messages. It is the maximum data fragment size that can be sent. Enter an even number between 256 and 2346. This field is not available when Super Mode is selected. Beacon Interval When a wirelessly networked device sends a beacon, it includes with it a beacon interval.
Chapter 7 Wireless LAN 7.7 Quality of Service (QoS) Screen Use the QoS screen to enable Wifi MultiMedia Quality of Service (WMMQoS). This allows the NBG-416N to automatically set priority levels to services, such as email, VoIP, chat, and so on. Click Network > Wireless LAN > QoS. The following screen appears. Figure 45 Network > Wireless LAN > QoS The following table describes the labels in this screen.
Chapter 7 Wireless LAN 7.8 WPS Screen Use this screen to enable/disable WPS, view or generate a new PIN number and check current WPS status. To open this screen, click Network > Wireless LAN > WPS tab. Figure 46 Network > Wireless LAN > WPS The following table describes the labels in this screen. Table 30 Network > Wireless LAN > WPS LABEL DESCRIPTION WPS Setup Enable WPS Select this to enable the WPS feature. PIN Number This displays a PIN number last time system generated.
Chapter 7 Wireless LAN 7.9 WPS Station Screen Use this screen when you want to add a wireless station using WPS. To open this screen, click Network > Wireless LAN > WPS Station tab. Note: Note: After you click Push Button on this screen, you have to press a similar button in the wireless station utility within 2 minutes. To add the second wireless station, you have to press these buttons on both device and the wireless station again after the first 2 minutes.
Chapter 7 Wireless LAN on or off on certain days and at certain times. To open this screen, click Network > Wireless LAN > Scheduling tab. Figure 48 Network > Wireless LAN > Scheduling The following table describes the labels in this screen. Table 32 Network > Wireless LAN > Scheduling LABEL DESCRIPTION Enable Wireless LAN Scheduling Select this to enable Wireless LAN scheduling. Action Select On or Off to specify whether the Wireless LAN is turned on or off.
CHAPTER 8 WAN 8.1 Overview This chapter discusses the NBG-416N’s WAN screens. Use these screens to configure your NBG-416N for Internet access. A WAN (Wide Area Network) connection is an outside connection to another network or the Internet. It connects your private networks (such as a LAN (Local Area Network) and other networks, so that a computer in one location can communicate with computers in other locations.
Chapter 8 WAN 8.2.1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol. To set up a WAN connection to the Internet, you need to use the same encapsulation method used by your ISP (Internet Service Provider).
Chapter 8 WAN Otherwise, click Clone the computer's MAC address - IP Address and enter the IP address of the computer on the LAN whose MAC you are cloning. Once it is successfully configured, the address will be copied to configuration file. It is recommended that you clone the MAC address prior to hooking up the WAN Port. 8.3 Internet Connection Use this screen to change your NBG-416N’s Internet access settings. Click Network > WAN. The screen differs according to the encapsulation you choose. 8.3.
Chapter 8 WAN The following table describes the labels in this screen. Table 33 Network > WAN > Internet Connection: Ethernet Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type You must choose the Ethernet option when the WAN port is used as a regular Ethernet. WAN IP Address Assignment Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address. This is the default selection.
Chapter 8 WAN 8.3.2 PPPoE Encapsulation The NBG-416N supports PPPoE (Point-to-Point Protocol over Ethernet). PPPoE is an IETF standard (RFC 2516) specifying how a personal computer (PC) interacts with a broadband modem (DSL, cable, wireless, etc.) connection. The PPP over Ethernet option is for a dial-up connection using PPPoE. For the service provider, PPPoE offers an access and authentication method that works with existing access control systems (for example Radius).
Chapter 8 WAN The following table describes the labels in this screen. Table 34 Network > WAN > Internet Connection: PPPoE Encapsulation LABEL DESCRIPTION ISP Parameters for Internet Access Connection Type Select PPP over Ethernet if you connect to your Internet via dial-up. Service Name Type the PPPoE service name provided to you. PPPoE uses a service name to identify and reach the PPPoE server. User Name Type the user name given to you by your ISP.
Chapter 8 WAN PPTP supports on-demand, multi-protocol and virtual private networking over public networks, such as the Internet. This screen displays when you select PPTP encapsulation. Figure 52 Network > WAN > Internet Connection: PPTP Encapsulation The following table describes the labels in this screen.
Chapter 8 WAN Table 35 Network > WAN > Internet Connection: PPTP Encapsulation (continued) LABEL DESCRIPTION Password Type the password associated with the User Name above. Retype to Confirm Type your password again to make sure that you have entered correctly. MTU Size Enter the MTU or the largest packet size per frame that your NBG416N can receive and process. Nailed-up Connection Select Nailed-Up Connection if you do not want the connection to time out.
CHAPTER 9 LAN 9.1 Overview This chapter describes how to configure LAN settings. A Local Area Network (LAN) is a shared communication system to which many computers are attached. A LAN is a computer network limited to the immediate area, usually the same building or floor of a building. The LAN screens can help you configure a LAN DHCP server, manage IP addresses, and partition your physical network into logical networks.
Chapter 9 LAN 9.2 What You Need To Know The actual physical connection determines whether the NBG-416N ports are LAN or WAN ports. There are two separate IP networks, one inside the LAN network and the other outside the WAN network as shown next. Figure 54 LAN and WAN IP Addresses The LAN parameters of the NBG-416N are preset in the factory with the following values: • IP address of 192.168.1.1 with subnet mask of 255.255.255.
Chapter 9 LAN 9.3 LAN IP Screen Use this screen to change your basic LAN settings. Click Network > LAN. Figure 55 Network > LAN > IP The following table describes the labels in this screen. Table 36 Network > LAN > IP LABEL DESCRIPTION IP Address Type the IP address of your NBG-416N in dotted decimal notation 192.168.1.1 (factory default). IP Subnet Mask The subnet mask specifies the network number portion of an IP address.
Chapter 9 LAN 94 NBG-416N User’s Guide
CHAPTER 10 DHCP Server 10.1 Overview DHCP (Dynamic Host Configuration Protocol, RFC 2131 and RFC 2132) allows individual clients to obtain TCP/IP configuration at start-up from a server. You can configure the NBG-416N’s LAN as a DHCP server or disable it. When configured as a server, the NBG-416N provides the TCP/IP configuration for the clients. If DHCP service is disabled, you must have another DHCP server on your LAN, or else the computer must be manually configured. 10.
Chapter 10 DHCP Server 10.4 General Screen Use this screen to enable the DHCP server. Click Network > DHCP Server. The following screen displays. Figure 56 Network > DHCP Server > General The following table describes the labels in this screen. Table 37 Network > DHCP Server > General LABEL DESCRIPTION Enable DHCP Server Enable or Disable DHCP for LAN. IP Pool Starting Address This field specifies the first of the contiguous addresses in the IP address pool for LAN.
Chapter 10 DHCP Server To change your NBG-416N’s static DHCP settings, click Network > DHCP Server > Advanced. The following screen displays. Figure 57 Network > DHCP Server > Advanced The following table describes the labels in this screen. Table 38 Network > DHCP Server > Advanced LABEL DESCRIPTION Static DHCP Table # This is the index number of the static IP table entry (row). MAC Address Type the MAC address (with colons) of a computer on your LAN.
Chapter 10 DHCP Server Table 38 Network > DHCP Server > Advanced (continued) LABEL DESCRIPTION First DNS Server Select User-Defined if you have the IP address of a DNS server. Enter the DNS server's IP address in the field to the right. If you chose User-Defined, but leave the IP address set to 0.0.0.0, User-Defined changes to None after you click Apply. If you set a second choice to User-Defined, and enter the same IP address, the second UserDefined changes to None after you click Apply.
Chapter 10 DHCP Server The following table describes the labels in this screen. Table 39 Network > DHCP Server > Client List LABEL DESCRIPTION # This is the index number of the host computer. IP Address This field displays the IP address relative to the # field listed above. Host Name This field displays the computer host name. MAC Address The MAC (Media Access Control) or Ethernet address on a LAN (Local Area Network) is unique to your computer (six pairs of hexadecimal notation).
Chapter 10 DHCP Server 100 NBG-416N User’s Guide
CHAPTER 11 Network Address Translation (NAT) 11.1 Overview This chapter discusses how to configure NAT on the NBG-416N. NAT (Network Address Translation - NAT, RFC 1631) is the translation of the IP address of a host in a packet. For example, the source address of an outgoing packet, used within one network is changed to a different IP address known within another network. Each packet has two addresses – a source address and a destination address.
Chapter 11 Network Address Translation (NAT) For more information on IP address translation, refer to RFC 1631, The IP Network Address Translator (NAT). Note: You must create a firewall rule in addition to setting up NAT, to allow traffic from the WAN to be forwarded through the NBG-416N. 11.2 What You Can Do • Use the General screen to enable NAT and set a default server (Section 11.3 on page 104). • Use the Application screen to change your NBG-416N’s port forwarding settings (Section 11.4 on page 105).
Chapter 11 Network Address Translation (NAT) Table 40 NAT Definitions (continued) ITEM DESCRIPTION Local This refers to the packet address (source or destination) as the packet travels on the LAN. Global This refers to the packet address (source or destination) as the packet travels on the WAN. Note: NAT never changes the IP address (either local or global) of an outside host.
Chapter 11 Network Address Translation (NAT) so incoming reply packets can have their original values restored. The following figure illustrates this. Figure 60 How NAT Works 11.3 General NAT Screen Use this screen to enable NAT and set a default server. Click Network > NAT to open the General screen. Figure 61 Network > NAT > General The following table describes the labels in this screen.
Chapter 11 Network Address Translation (NAT) Table 41 Network > NAT > General (continued) LABEL Server IP Address DESCRIPTION In addition to the servers for specified services, NAT supports a default server. A default server receives packets from ports that are not specified in the Application screen. If you do not assign a Default Server IP address, the NBG-416N discards all packets received for ports that are not specified in the Application screen or remote management.
Chapter 11 Network Address Translation (NAT) Refer to Appendix E on page 205 for port numbers commonly used for particular services. Figure 62 Network > NAT > Application The following table describes the labels in this screen. Table 42 Network > NAT > Application LABEL DESCRIPTION Add Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address.
Chapter 11 Network Address Translation (NAT) Table 42 Network > NAT > Application (continued) LABEL DESCRIPTION Reset Click Reset to not save and return your new changes in the Service Name and Port fields to the previous one. Application Rules Summary # This is the number of an individual port forwarding server entry. Active This icon is turned on when the rule is enabled. Name This field displays a name to identify this rule. Local Start/End Port This field displays the port number(s).
Chapter 11 Network Address Translation (NAT) to the default server. If the default is not defined, the service request is simply discarded. Note: Many residential broadband ISP accounts do not allow you to run any server processes (such as a Web or FTP server) from your location. Your ISP may periodically check for servers and may suspend your account if it discovers any active services at your location. If you are unsure, refer to your ISP. 11.5.
CHAPTER 12 Firewall 12.1 Overview Use these screens to enable and configure the firewall that protects your NBG416N and your LAN from unwanted or malicious traffic. Enable the firewall to protect your LAN computers from attacks by hackers on the Internet and control access between the LAN and WAN. By default the firewall: • allows traffic that originates from your LAN computers to go to all of the networks. • blocks traffic that originates on the other networks from going to the LAN.
Chapter 12 Firewall • Use the Services screen to enable or disable ICMP and VPN passthrough features (Section 12.5 on page 111). 12.3 What You Need To Know The NBG-416N’s firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between the networks. 12.3.
Chapter 12 Firewall 12.4 General Firewall Screen Use this screen to enable or disable the NBG-416N’s firewall, and set up firewall logs. Click Security > Firewall to open the General screen. Figure 65 Security > Firewall > General The following table describes the labels in this screen. Table 43 Security > Firewall > General LABEL DESCRIPTION Enable Firewall Select this check box to activate the firewall.
Chapter 12 Firewall The following table describes the labels in this screen. Table 44 Security > Firewall > Services LABEL DESCRIPTION ICMP Internet Control Message Protocol is a message control and errorreporting protocol between a host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages are processed by the TCP/IP software and directly apparent to the application user.
CHAPTER 13 Remote Management 13.1 Overview This chapter provides information on the Remote Management screens. Remote management allows you to determine which services/protocols can access which NBG-416N interface (if any) from which computers. You may manage your NBG-416N from a remote location via: • LAN only • LAN and WAN Note: When you configure remote management to allow management from the LAN and WAN in the options above, you still need to configure a firewall rule to allow access.
Chapter 13 Remote Management 13.2.1 Remote Management Limitations Remote management over LAN or WAN will not work when: 1 You have disabled that service in one of the remote management screens. 2 The IP address in the Secured Client IP Address field does not match the client IP address. If it does not match, the NBG-416N will disconnect the session immediately. 3 There is already another remote management session with an equal or higher priority running.
Chapter 13 Remote Management 13.3 WWW Screen To change your NBG-416N’s World Wide Web settings, click Management > Remote MGMT to display the WWW screen. Figure 67 Management > Remote MGMT > WWW The following table describes the labels in this screen. Table 45 Management > Remote MGMT > WWW LABEL DESCRIPTION Server Port You may change the server port number for a service if needed, however you must use the same port number in order to use that service for remote management.
Chapter 13 Remote Management 116 NBG-416N User’s Guide
CHAPTER 14 Universal Plug-and-Play (UPnP) 14.1 Overview This chapter introduces the UPnP feature in the Web Configurator. Universal Plug and Play (UPnP) is a distributed, open networking standard that uses TCP/IP for simple peer-to-peer network connectivity between devices. A UPnP device can dynamically join a network, obtain an IP address, convey its capabilities and learn about other devices on the network. In turn, a device can leave a network smoothly and automatically when it is no longer in use.
Chapter 14 Universal Plug-and-Play (UPnP) See the NAT chapter for more information on NAT. Cautions with UPnP The automated nature of NAT traversal applications in establishing their own services and opening firewall ports may present network security issues. Network information and configuration may also be obtained and modified by users in some network environments. When a UPnP device joins a network, it announces its presence with a multicast message.
Chapter 14 Universal Plug-and-Play (UPnP) The following table describes the labels in this screen. Table 46 Management > UPnP > General LABEL DESCRIPTION Enable the Universal Plug and Play (UPnP) Feature Select this check box to activate UPnP. Be aware that anyone could use a UPnP application to open the Web Configurator's login screen without entering the NBG-416N's IP address (although you must still enter the password to access the Web Configurator).
Chapter 14 Universal Plug-and-Play (UPnP) 2 Right-click the icon and select Properties. Figure 69 Network Connections 3 In the Internet Connection Properties window, click Settings to see the port mappings there were automatically created.
Chapter 14 Universal Plug-and-Play (UPnP) 4 You may edit or delete the port mappings or click Add to manually add port mappings. Figure 71 Internet Connection Properties: Advanced Settings Figure 72 Internet Connection Properties: Advanced Settings: Add Note: When the UPnP-enabled device is disconnected from your computer, all port mappings will be deleted automatically. 5 Select Show icon in notification area when connected option and click OK. An icon displays in the system tray.
Chapter 14 Universal Plug-and-Play (UPnP) 6 Double-click on the icon to display your current Internet connection status. Figure 74 Internet Connection Status 14.4.2 Web Configurator Easy Access With UPnP, you can access the web-based configurator on the NBG-416N without finding out the IP address of the NBG-416N first. This comes helpful if you do not know the IP address of the NBG-416N. Follow the steps below to access the Web Configurator. 122 1 Click Start and then Control Panel.
Chapter 14 Universal Plug-and-Play (UPnP) 3 Select My Network Places under Other Places. Figure 75 Network Connections 4 An icon with the description for each UPnP-enabled device displays under Local Network. 5 Right-click on the icon for your NBG-416N and select Invoke. The Web Configurator login screen displays.
Chapter 14 Universal Plug-and-Play (UPnP) 124 NBG-416N User’s Guide
CHAPTER 15 System 15.1 Overview This chapter provides information on the System screens. See the chapter about wizard setup for more information on the next few screens. 15.2 What You Can Do • Use the General screen to enter a name to identify the NBG-416N in the network and set the password (Section 15.3 on page 125). • Use the Time Setting screen to change your NBG-416N’s time and date (Section 15.4 on page 127). 15.
Chapter 15 System The following table describes the labels in this screen. Table 47 Maintenance > System > General LABEL DESCRIPTION System Setup System Name System Name is a unique name to identify the NBG-416N in an Ethernet network. It is recommended you enter your computer’s “Computer name” in this field (see the chapter about wizard setup for how to find your computer’s name). This name can be up to 30 alphanumeric characters long.
Chapter 15 System 15.4 Time Setting Screen To change your NBG-416N’s time and date, click Maintenance > System > Time Setting. The screen appears as shown. Use this screen to configure the NBG416N’s time based on your local time zone. Figure 78 Maintenance > System > Time Setting The following table describes the labels in this screen. Table 48 Maintenance > System > Time Setting LABEL DESCRIPTION Current Time and Date Current Time This field displays the time of your NBG-416N.
Chapter 15 System Table 48 Maintenance > System > Time Setting (continued) LABEL DESCRIPTION New Time This field displays the last updated time from the time server or the last time configured manually. (hh:mm:ss) When you set Time and Date Setup to Manual, enter the new time in this field and then click Apply. New Date (yyyy/mm/dd) This field displays the last updated date from the time server or the last date configured manually.
Chapter 15 System Table 48 Maintenance > System > Time Setting (continued) LABEL DESCRIPTION End Date Configure the day and time when Daylight Saving Time ends if you selected Daylight Savings. The o'clock field uses the 24 hour format. Here are a couple of examples: Daylight Saving Time ends in the United States on the last Sunday of October. Each time zone in the United States stops using Daylight Saving Time at 2 A.M. local time.
Chapter 15 System 130 NBG-416N User’s Guide
CHAPTER 16 Logs 16.1 Overview This chapter contains information about configuring general log settings and viewing the NBG-416N’s logs. The Web Configurator allows you to look at all of the NBG-416N’s logs in one location. 16.2 What You Need to Know An alert is a type of log that warrants more serious attention. They include system errors, attacks (access control) and attempted access to blocked web sites or web sites with restricted web features such as cookies, active X and so on.
Chapter 16 Logs Click Maintenance > Logs to open the View Log screen. Figure 79 Maintenance > Logs > View Log The following table describes the labels in this screen. Table 49 Maintenance > Logs > View Log 132 LABEL DESCRIPTION Refresh Click Refresh to renew the log screen. Clear Logs Click Clear Logs to delete all the logs. Next Click Next to show the next page of log entries. Last Click Last to show the last page of log entries. # This is the index number of the log entry.
CHAPTER 17 Tools 17.1 Overview This chapter shows you how to upload a new firmware, upload or save backup configuration files and restart the NBG-416N. 17.2 What You Can Do • Use the Firmware screen to upload firmware to your NBG-416N (Section 17.3 on page 133). • Use the Configuration screen to view information related to factory defaults, backup configuration, and restoring configuration (Section 17.4 on page 136). • Use the Restart screen to have the NBG-416N reboot (Section 17.5 on page 138). 17.
Chapter 17 Tools Click Maintenance > Tools. Follow the instructions in this screen to upload firmware to your NBG-416N. Figure 80 Maintenance > Tools > Firmware The following table describes the labels in this screen. Table 50 Maintenance > Tools > Firmware LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the .bin file you want to upload. Remember that you must decompress compressed (.
Chapter 17 Tools The NBG-416N automatically restarts in this time causing a temporary network disconnect. In some operating systems, you may see the following icon on your desktop. Figure 82 Network Temporarily Disconnected After two minutes, log in again and check your new firmware version in the Status screen. If the upload was not successful, the following screen will appear. Click Return to go back to the Firmware screen.
Chapter 17 Tools 17.4 Configuration Screen Click Maintenance > Tools > Configuration. Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Figure 84 Maintenance > Tools > Configuration 17.4.1 Backup Configuration Backup configuration allows you to back up (save) the NBG-416N’s current configuration to a file on your computer.
Chapter 17 Tools 17.4.2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your NBG-416N. Table 51 Maintenance Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse... to find it. Browse... Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them.
Chapter 17 Tools If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration screen. Figure 87 Configuration Restore Error 17.4.3 Back to Factory Defaults Pressing the Reset button in this section clears all user-entered configuration information and returns the NBG-416N to its factory defaults. You can also press the RESET button on the rear panel to reset the factory defaults of your NBG-416N. Refer to Section 3.3.
CHAPTER 18 Sys OP Mode 18.1 Overview The Sys OP Mode (System Operation Mode) function lets you configure whether your NBG-416N is a router or AP. You can choose between Router Mode and AP Mode depending on your network topology and the features you require from your device. See Section 1.1 on page 19 for more information on which mode to choose. 18.2 What You Need to Know Router A router connects your local network with another network, such as the Internet.
Chapter 18 Sys OP Mode AP An AP extends one network and so has just one IP address. All Ethernet ports on the AP have the same IP address. To connect to the Internet, another device, such as a router, is required. Figure 90 IP Address in AP Mode 18.3 General Screen Use this screen to select how you connect to the Internet. Figure 91 Maintenance > Sys OP Mode > General If you select Router mode, the following pop-up message window appears.
Chapter 18 Sys OP Mode • You can configure the IP address settings on your WAN port. Contact your ISP or system administrator for more information on appropriate settings. If you select Access Point the following pop-up message window appears. Figure 93 Maintenance > Sys Op Mode > General: AP • In AP Mode all Ethernet ports have the same IP address. • All ports on the rear panel of the device are LAN ports, including the port labeled WAN. There is no WAN port. • The DHCP server on your device is disabled.
Chapter 18 Sys OP Mode 142 NBG-416N User’s Guide
CHAPTER 19 Language 19.1 Language Screen Use this screen to change the language for the Web Configurator display. Click the language you prefer. The Web Configurator language changes after a while without restarting the NBG-416N.
Chapter 19 Language 144 NBG-416N User’s Guide
CHAPTER 20 Troubleshooting This chapter offers some suggestions to solve problems you might encounter. The potential problems are divided into the following categories. • Power, Hardware Connections, and LEDs • NBG-416N Access and Login • Internet Access • Resetting the NBG-416N to Its Factory Defaults • Wireless Router/AP Troubleshooting 20.1 Power, Hardware Connections, and LEDs The NBG-416N does not turn on. None of the LEDs turn on.
Chapter 20 Troubleshooting 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the NBG-416N. 5 If the problem continues, contact the vendor. 20.2 NBG-416N Access and Login I don’t know the IP address of my NBG-416N. 1 The default IP address is 192.168.1.1.
Chapter 20 Troubleshooting 2 If this does not work, you have to reset the device to its factory defaults. See Section 20.4 on page 149. I cannot see or access the Login screen in the Web Configurator. 1 Make sure you are using the correct IP address. • The default IP address is 192.168.1.1. • If you changed the IP address (Section 7.3 on page 102), use the new IP address.
Chapter 20 Troubleshooting 1 Make sure you have entered the password correctly. The default username is admin and default password is 1234. This field is case-sensitive, so make sure [Caps Lock] is not on. 2 This can happen when you fail to log out properly from your last session. Try logging in again after 5 minutes. 3 Disconnect and re-connect the power adaptor or cord to the NBG-416N. 4 If this does not work, you have to reset the device to its factory defaults. See Section 20.4 on page 149. 20.
Chapter 20 Troubleshooting 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide and Section 1.5 on page 20. 2 Reboot the NBG-416N. 3 If the problem continues, contact your ISP. The Internet connection is slow or intermittent. 1 There might be a lot of traffic on the network. Look at the LEDs, and check Section 1.5 on page 20.
Chapter 20 Troubleshooting 2 Press the RESET button for longer than 1 second to restart/reboot the NBG-416N. 3 Press the RESET button for longer than five seconds to set the NBG-416N back to its factory-default configurations. If the NBG-416N restarts automatically, wait for the NBG-416N to finish restarting, and log in to the Web Configurator. The username is admin and password is 1234. If the NBG-416N does not restart automatically, disconnect and reconnect the NBG-416N’s power.
Chapter 20 Troubleshooting When you change from router mode to AP mode, your computer must have an IP address in the range between “192.168.1.3” and “192.168.1.254”. Refer to Appendix C on page 175 for instructions on how to change your computer’s IP address.
Chapter 20 Troubleshooting 152 NBG-416N User’s Guide
CHAPTER 21 Product Specifications The following tables summarize the NBG-416N’s hardware and firmware features. Table 53 Hardware Features Dimensions (W x D x H) 162 mm x 115 mm x 33 mm Weight 216 g Power Specification Input: 100 -- 240VAC, 50/60 Hz Output: 5VDC /1A Ethernet ports Auto-negotiating: 10 Mbps, 100 Mbps in either half-duplex or fullduplex mode. Auto-crossover: Use either crossover or straight-through Ethernet cables.
Chapter 21 Product Specifications Table 54 Firmware Features FEATURE DESCRIPTION Default LAN IP Address 192.168.1.1 (router) 192.168.1.2. (AP) Default LAN Subnet Mask 255.255.255.0 (24 bits) Default Username admin Default Password 1234 DHCP Pool 192.168.1.33 to 192.168.1.64 Wireless Interface Wireless LAN Default Wireless SSID ZyXEL Device Management Use the Web Configurator to easily configure the rich range of features on the NBG-416N. Wireless Functionality Allows IEEE802.
Chapter 21 Product Specifications Table 54 Firmware Features (continued) FEATURE DESCRIPTION Time and Date Get the current time and date from an external server when you turn on your NBG-416N. You can also set the time manually. These dates and times are then used in logs. Port Forwarding If you have a server (mail or web server for example) on your network, then use this feature to let people access it from the Internet.
Chapter 21 Product Specifications 156 NBG-416N User’s Guide
APPENDIX A IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a network. Every networking device (including computers, servers, routers, printers, etc.) needs an IP address to communicate across the network. These networking devices are also known as hosts. Subnet masks determine the maximum number of possible hosts on a network. You can also use subnet masks to divide one network into multiple sub-networks.
Appendix A IP Addresses and Subnetting The following figure shows an example IP address in which the first three octets (192.168.1) are the network number, and the fourth octet (16) is the host ID. Figure 95 Network Number and Host ID How much of the IP address is the network number and how much is the host ID varies according to the subnet mask.
Appendix A IP Addresses and Subnetting Table 55 Subnet Mask - Identifying Network Number Network Number 1ST OCTET: 2ND OCTET: 3RD OCTET: 4TH OCTET (192) (168) (1) (2) 11000000 10101000 00000001 Host ID 00000010 By convention, subnet masks always consist of a continuous sequence of ones beginning from the leftmost bit of the mask, followed by a continuous sequence of zeros, for a total number of 32 bits.
Appendix A IP Addresses and Subnetting As these two IP addresses cannot be used for individual hosts, calculate the maximum number of possible hosts in a network as follows: Table 57 Maximum Host Numbers SUBNET MASK HOST ID SIZE 8 bits 24 bits 255.0.0.0 16 bits 255.255.0.0 24 bits 255.255.255.0 29 bits 255.255.255.
Appendix A IP Addresses and Subnetting Subnetting You can use subnetting to divide one network into multiple sub-networks. In the following example a network administrator creates two sub-networks to isolate a group of servers from the rest of the company network for security reasons. In this example, the company network address is 192.168.1.0. The first three octets of the address (192.168.
Appendix A IP Addresses and Subnetting The following figure shows the company network after subnetting. There are now two sub-networks, A and B. Figure 97 Subnetting Example: After Subnetting In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subnet’s address itself, all ones is the subnet’s broadcast address). 192.168.1.0 with mask 255.255.255.128 is subnet A itself, and 192.168.1.127 with mask 255.255.255.
Appendix A IP Addresses and Subnetting Each subnet contains 6 host ID bits, giving 26 - 2 or 62 hosts for each subnet (a host ID of all zeroes is the subnet itself, all ones is the subnet’s broadcast address). Table 59 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.10101000.00000001. 00000000 Subnet Mask (Binary) 11111111.11111111.11111111. 11000000 Subnet Address: 192.168.1.0 Lowest Host ID: 192.168.1.
Appendix A IP Addresses and Subnetting Table 62 Subnet 4 (continued) LAST OCTET BIT VALUE IP/SUBNET MASK NETWORK NUMBER Subnet Address: 192.168.1.192 Lowest Host ID: 192.168.1.193 Broadcast Address: 192.168.1.255 Highest Host ID: 192.168.1.254 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table shows IP address last octet values for each subnet.
Appendix A IP Addresses and Subnetting The following table is a summary for subnet planning on a network with a 16-bit network number. Table 65 16-bit Network Number Subnet Planning NO. “BORROWED” HOST BITS SUBNET MASK NO. HOSTS PER NO. SUBNETS SUBNET 1 255.255.128.0 (/17) 2 32766 2 255.255.192.0 (/18) 4 16382 3 255.255.224.0 (/19) 8 8190 4 255.255.240.0 (/20) 16 4094 5 255.255.248.0 (/21) 32 2046 6 255.255.252.0 (/22) 64 1022 7 255.255.254.0 (/23) 128 510 8 255.255.255.
Appendix A IP Addresses and Subnetting that you entered. You don't need to change the subnet mask computed by the NBG-416N unless you are instructed to do otherwise. Private IP Addresses Every machine on the Internet must have a unique address. If your networks are isolated from the Internet (running only between two branch offices, for example) you can assign any IP addresses to the hosts without problems.
APPENDIX B Pop-up Windows, JavaScript and Java Permissions In order to use the Web Configurator you need to allow: • Web browser pop-up windows from your device. • JavaScript (enabled by default). • Java permissions (enabled by default). Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer versions may vary. Internet Explorer Pop-up Blockers You may have to disable pop-up blocking to log into your device.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, select Tools, Internet Options, Privacy. 2 Clear the Block pop-ups check box in the Pop-up Blocker section of the screen. This disables any web pop-up blockers you may have enabled. Figure 99 Internet Options: Privacy 3 Click Apply to save this setting. Enable pop-up Blockers with Exceptions Alternatively, if you only want to allow pop-up windows from your device, see the following steps.
Appendix B Pop-up Windows, JavaScript and Java Permissions 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 100 Internet Options: Privacy 3 Type the IP address of your device (the web page that you do not want to have blocked) with the prefix “http://”. For example, http://192.168.167.1.
Appendix B Pop-up Windows, JavaScript and Java Permissions 4 Click Add to move the IP address to the list of Allowed sites. Figure 101 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScript If pages of the Web Configurator do not display properly in Internet Explorer, check that JavaScript are allowed.
Appendix B Pop-up Windows, JavaScript and Java Permissions 1 In Internet Explorer, click Tools, Internet Options and then the Security tab. Figure 102 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure that Enable is selected (the default). 5 Under Scripting of Java applets make sure that Enable is selected (the default).
Appendix B Pop-up Windows, JavaScript and Java Permissions 6 Click OK to close the window. Figure 103 Security Settings - Java Scripting Java Permissions 172 1 From Internet Explorer, click Tools, Internet Options and then the Security tab. 2 Click the Custom Level... button. 3 Scroll down to Microsoft VM. 4 Under Java permissions make sure that a safety level is selected.
Appendix B Pop-up Windows, JavaScript and Java Permissions 5 Click OK to close the window. Figure 104 Security Settings - Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sure that Use Java 2 for
Appendix B Pop-up Windows, JavaScript and Java Permissions 3 Click OK to close the window.
APPENDIX C Setting up Your Computer’s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP/IP installed. Windows 95/98/Me/NT/2000/XP, Macintosh OS 7 and later operating systems and all versions of UNIX/LINUX include the software components you need to install and use TCP/IP on your computer. Windows 3.1 requires the purchase of a thirdparty TCP/IP application package.
Appendix C Setting up Your Computer’s IP Address Windows 95/98/Me Click Start, Settings, Control Panel and double-click the Network icon to open the Network window. Figure 106 WIndows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed components. You need a network adapter, the TCP/IP protocol and Client for Microsoft Networks. If you need the adapter: 1 In the Network window, click Add. 2 Select Adapter and then click Add.
Appendix C Setting up Your Computer’s IP Address 3 Select Microsoft from the list of manufacturers. 4 Select TCP/IP from the list of network protocols and then click OK. If you need Client for Microsoft Networks: 1 Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacturers. 4 Select Client for Microsoft Networks from the list of network clients and then click OK. 5 Restart your computer so the changes you made take effect.
Appendix C Setting up Your Computer’s IP Address 3 Click the DNS Configuration tab. • If you do not know your DNS information, select Disable DNS. • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in). Figure 108 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, remove previously installed gateways.
Appendix C Setting up Your Computer’s IP Address 3 Select your network adapter. You should see your computer's IP address, subnet mask and default gateway. Windows 2000/NT/XP The following example figures use the default Windows XP GUI theme. 1 Click start (Start in Windows 2000/NT), Settings, Control Panel.
Appendix C Setting up Your Computer’s IP Address 2 In the Control Panel, double-click Network Connections (Network and Dialup Connections in Windows 2000/NT). Figure 110 Windows XP: Control Panel 3 Right-click Local Area Connection and then click Properties.
Appendix C Setting up Your Computer’s IP Address 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) and then click Properties. Figure 112 Windows XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Properties window opens (the General tab in Windows XP). • If you have a dynamic IP address click Obtain an IP address automatically. • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields.
Appendix C Setting up Your Computer’s IP Address • Click Advanced. Figure 113 Windows XP: Internet Protocol (TCP/IP) Properties 6 If you do not know your gateway's IP address, remove any previously installed gateways in the IP Settings tab and click OK. Do one or more of the following if you want to configure additional IP addresses: • In the IP Settings tab, in IP addresses, click Add. • In TCP/IP Address, type an IP address in IP address and a subnet mask in Subnet mask, and then click Add.
Appendix C Setting up Your Computer’s IP Address • Click OK when finished. Figure 114 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Click Obtain DNS server address automatically if you do not know your DNS server IP address(es). • If you know your DNS server IP address(es), click Use the following DNS server addresses, and type them in the Preferred DNS server and Alternate DNS server fields.
Appendix C Setting up Your Computer’s IP Address If you have previously configured DNS servers, click Advanced and then the DNS tab to order them. Figure 115 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click Close (OK in Windows 2000/NT) to close the Local Area Connection Properties window. 10 Close the Network Connections window (Network and Dial-up Connections in Windows 2000/NT).
Appendix C Setting up Your Computer’s IP Address Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/ IP Control Panel.
Appendix C Setting up Your Computer’s IP Address 2 Select Ethernet built-in from the Connect via list. Figure 117 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box.
Appendix C Setting up Your Computer’s IP Address Macintosh OS X 1 Click the Apple menu, and click System Preferences to open the System Preferences window. Figure 118 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ethernet from the Show list. • Click the TCP/IP tab. 3 For dynamically assigned settings, select Using DHCP from the Configure list.
Appendix C Setting up Your Computer’s IP Address 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type your IP address in the IP Address box. • Type your subnet mask in the Subnet mask box. • Type the IP address of your Prestige in the Router address box. 5 Click Apply Now and close the window. 6 Turn on your Prestige and restart your computer (if prompted). Verifying Settings Check your TCP/IP properties in the Network window.
Appendix C Setting up Your Computer’s IP Address 2 Double-click on the profile of the network card you wish to configure. The Ethernet Device General screen displays as shown. Figure 121 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list. • If you have a static IP address click Statically set IP Addresses and fill in the Address, Subnet mask, and Default Gateway Address fields.
Appendix C Setting up Your Computer’s IP Address 5 Click the Devices tab. 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 123 Red Hat 9.0: KDE: Network Configuration: Activate 7 After the network card restart process is complete, make sure the Status is Active in the Network Configuration screen.
Appendix C Setting up Your Computer’s IP Address • If you have a static IP address, enter static in the BOOTPROTO= field. Type IPADDR= followed by the IP address (in dotted decimal notation) and type NETMASK= followed by the subnet mask. The following example shows an example where the static IP address is 192.168.1.10 and the subnet mask is 255.255.255.0. Figure 125 Red Hat 9.0: Static IP Address Setting in ifconfig-eth0 DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.1.10 NETMASK=255.255.255.
Appendix C Setting up Your Computer’s IP Address 21.0.1 Verifying Settings Enter ifconfig in a terminal screen to check your TCP/IP properties. Figure 128 Red Hat 9.0: Checking TCP/IP Properties [root@localhost]# ifconfig eth0 Link encap:Ethernet HWaddr 00:50:BA:72:5B:44 inet addr:172.23.19.129 Bcast:172.23.19.255 Mask:255.255.255.
APPENDIX D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc Wireless LAN Configuration The simplest WLAN configuration is an independent (Ad-hoc) WLAN that connects a set of computers with wireless stations (A, B, C). Any time two or more wireless adapters are within range of each other, they can set up an independent network, which is commonly referred to as an Ad-hoc network or Independent Basic Service Set (IBSS).
Appendix D Wireless LANs with each other. When Intra-BSS is disabled, wireless station A and B can still access the wired network but cannot communicate with each other. Figure 130 Basic Service Set ESS An Extended Service Set (ESS) consists of a series of overlapping BSSs, each containing an access point, with each access point connected together by a wired network. This wired connection between APs is called a Distribution System (DS). This type of wireless LAN topology is called an Infrastructure WLAN.
Appendix D Wireless LANs An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate. Figure 131 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depend on your geographical area.
Appendix D Wireless LANs wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other. Figure 132 RTS/CTS When station A sends data to the AP, it might not know that the station B is already using the channel.
Appendix D Wireless LANs Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size (between 256 and 2432 bytes) that can be sent in the wireless network before the AP will fragment the packet into smaller data frames. A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.
Appendix D Wireless LANs several intermediate rate steps between the maximum and minimum data rates. The IEEE 802.11g data rate and modulation are as follows: Table 66 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shift Keying) 5.5 / 11 CCK (Complementary Code Keying) 6/9/12/18/24/36/ 48/54 OFDM (Orthogonal Frequency Division Multiplexing) IEEE 802.1x In June 2001, the IEEE 802.
Appendix D Wireless LANs Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication: • Access-Request Sent by an access point requesting authentication. • Access-Reject Sent by a RADIUS server rejecting access. • Access-Accept Sent by a RADIUS server allowing access. • Access-Challenge Sent by a RADIUS server requesting more information in order to allow access.
Appendix D Wireless LANs However, MD5 authentication has some weaknesses. Since the authentication server needs to get the plaintext passwords, the passwords must be stored. Thus someone other than the authentication server may access the password file. In addition, it is possible to impersonate an authentication server as MD5 authentication method does not perform mutual authentication. Finally, MD5 authentication method does not support data encryption with dynamic session key.
Appendix D Wireless LANs If this feature is enabled, it is not necessary to configure a default encryption key in the Wireless screen. You may still configure and store keys here, but they will not be used while Dynamic WEP is enabled. Note: EAP-MD5 cannot be used with dynamic WEP key exchange For added security, certificate-based authentications (EAP-TLS, EAP-TTLS and PEAP) use dynamic keys for data encryption.
Appendix D Wireless LANs TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice. The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then sets up a key hierarchy and management system, using the pair-wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients. This all happens in the background automatically.
Appendix D Wireless LANs 21.0.2 WPA(2)-PSK Application Example A WPA(2)-PSK application looks as follows. 1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key (PSK) must consist of between 8 and 63 ASCII characters (including spaces and symbols). 2 The AP checks each wireless client's password and (only) allows it to join the network if the password matches. 3 The AP derives and distributes keys to the wireless clients.
Appendix D Wireless LANs Security Parameters Summary Refer to this table to see what other security parameters you should configure for each Authentication Method/ key management protocol type. MAC address filters are not dependent on how you configure these security features. Table 68 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTIO ENTER IEEE 802.
APPENDIX E Services The following table lists some commonly-used services and their associated protocols and port numbers. • Name: This is a short, descriptive name for the service. You can use this one or create a different one, if you like. • Protocol: This is the type of IP protocol used by the service. If this is TCP/ UDP, then the service uses the same port number with TCP and UDP. If this is User-Defined, the Port(s) is the IP protocol number, not the port number.
Appendix E Services Table 69 Examples of Services (continued) 206 NAME PROTOCOL PORT(S) DESCRIPTION FTP TCP 20 TCP 21 File Transfer Program, a program to enable fast transfer of files, including large files that may not be possible by e-mail. H.323 TCP 1720 NetMeeting uses this protocol. HTTP TCP 80 Hyper Text Transfer Protocol - a client/ server protocol for the world wide web. HTTPS TCP 443 HTTPS is a secured http session often used in e-commerce.
Appendix E Services Table 69 Examples of Services (continued) NAME PROTOCOL PORT(S) DESCRIPTION POP3 TCP 110 Post Office Protocol version 3 lets a client computer get e-mail from a POP3 server through a temporary connection (TCP/IP or other). POP3S TCP 995 This is a more secure version of POP3 that runs over SSL. PPTP TCP 1723 Point-to-Point Tunneling Protocol enables secure transfer of data over public networks. This is the control channel.
Appendix E Services Table 69 Examples of Services (continued) 208 NAME PROTOCOL PORT(S) DESCRIPTION SSDP UDP 1900 The Simple Service Discovery Protocol supports Universal Plug-and-Play (UPnP). SSH TCP/UDP 22 Secure Shell Remote Login Program. STRM WORKS UDP 1558 Stream Works Protocol. SYSLOG UDP 514 Syslog allows you to send system logs to a UNIX server. TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System).
APPENDIX F Open Software Announcements End-User License Agreement for “NBG416N” WARNING: ZyXEL Communications Corp. IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT. PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM.
Appendix F Open Software Announcements hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied licenses are disclaimed. 2.Ownership You have no ownership rights in the Software. Rather, you have a license to use the Software as long as this License Agreement remains in full force and effect. Ownership of the Software, Documentation and all intellectual property rights therein shall remain at all times with ZyXEL.
Appendix F Open Software Announcements 5.Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information.
Appendix F Open Software Announcements 8.Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME. YOU SHALL NOT EXPORT THE SOFTWARE, DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS, REGULATIONS, ORDERS, OR OTHER RESTRICTIONS.
Appendix F Open Software Announcements jurisdiction, the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties. NOTE: Some components of this product incorporate free software programs covered under the open source code licenses which allows you to freely copy, modify and redistribute the software.
Appendix F Open Software Announcements Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it.
Appendix F Open Software Announcements 0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License.
Appendix F Open Software Announcements when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.
Appendix F Open Software Announcements 5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License.
Appendix F Open Software Announcements spirit to the present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation.
Appendix F Open Software Announcements This Product includes ppp software under below license Copyrights: *********** All of the code can be freely used and redistributed. The individual source files each have their own copyright and permission notice. Pppd, pppstats and pppdump are under BSD-style notices. Some of the pppd plugins are GPL'd. Chat is public domain. This Product includes mini_upnp software under below license Copyright (c) 2005-2008, Thomas BERNARD All rights reserved.
Appendix F Open Software Announcements IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF AD
Appendix F Open Software Announcements This software is derived work from the following software. The original source code has been modified from it's original state by the author of igmpproxy. smcroute 0.92 - Copyright (C) 2001 Carsten Schill - Licensed under the GNU General Public License, version 2 mrouted 3.9-beta3 - COPYRIGHT 1989 by The Board of Trustees of Leland Stanford Junior University. - Original license can be found in the Stanford.txt file.
Appendix F Open Software Announcements guarantee your freedom to share and change free software--to make sure the software is free for all its users. This license, the Lesser General Public License, applies to some specially designated software packages--typically libraries--of the Free Software Foundation and other authors who decide to use it.
Appendix F Open Software Announcements applies to certain designated libraries, and is quite different from the ordinary General Public License. We use this license for certain libraries in order to permit linking those libraries into non-free programs. When a program is linked with a library, whether statically or using a shared library, the combination of the two is legally speaking a combined work, a derivative of the original library.
Appendix F Open Software Announcements A "library" means a collection of software functions and/or data prepared so as to be conveniently linked with application programs (which use some of those functions and data) to form executables. The "Library", below, refers to any such software library or work which has been distributed under these terms.
Appendix F Open Software Announcements argument passed when the facility is invoked, then you must make a good faith effort to ensure that, in the event an application does not supply such function or table, the facility still operates, and performs whatever part of its purpose remains meaningful. (For example, a function in a library to compute square roots has a purpose that is entirely well-defined independent of the application.
Appendix F Open Software Announcements readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange. If distribution of object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code, even though third parties are not compelled to copy the source along with the object code. 5.
Appendix F Open Software Announcements as a reference directing the user to the copy of this License.
Appendix F Open Software Announcements the work based on the Library and of the other library facilities is otherwise permitted, and provided that you do these two things: a) Accompany the combined library with a copy of the same work based on the Library, uncombined with any other library facilities. This must be distributed under the terms of the Sections above.
Appendix F Open Software Announcements It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices.
Appendix F Open Software Announcements PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU. SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 16.
APPENDIX G Legal Information Copyright Copyright © 2011 by ZyXEL Communications Corporation. The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation. Published by ZyXEL Communications Corporation.
Appendix G Legal Information Ce produit est conçu pour les bandes de fréquences 2,4 GHz conformément à la législation Européenne. En France métropolitaine, suivant les décisions n°03-908 et 03-909 de l'ARCEP, la puissance d'émission ne devra pas dépasser 10 mW (10 dB) dans le cadre d'une installation WiFi en extérieur pour les fréquences comprises entre 2454 MHz et 2483,5 MHz. Viewing Certifications 1 Go to http://www.zyxel.com. 2 Select your product on the ZyXEL home page to go to that product's page.
Appendix G Legal Information FCC Radiation Exposure Statement • This transmitter must not be co-located or operating in conjunction with any other antenna or transmitter. • IEEE 802.11b or 802.11g operation of this product in the U.S.A. is firmwarelimited to channels 1 through 11. • To comply with FCC RF exposure compliance requirements, a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons.
Appendix G Legal Information 3 Select the certification you wish to view from this page. ZyXEL Limited Warranty ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase.
Appendix G Legal Information SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED, AND YOUR MONEY WILL BE REFUNDED. 1 Grant of License for Personal Use ZyXEL Communications Corp.
Appendix G Legal Information the Software. Except as and only to the extent expressly permitted in this License, by applicable licensing terms governing use of the Open-Sourced Components, or by applicable law, you may not market, co-brand, private label or otherwise permit third parties to link to the Software, or any part thereof. You may not use the Software, or any part thereof, in the operation of a service bureau or for the benefit of any other person or entity.
Appendix G Legal Information 7 Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, INDIRECT, SPECIAL, PUNITIVE, OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS, LOSS OF PROFITS, BUSINESS INTERRUPTION, OR LOSS OF BUSINESS INFORMATION) ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM, OR FOR ANY CLAIM BY ANY OTHER PARTY, EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Appendix G Legal Information relating to confidentiality, proprietary rights, and non-disclosure shall survive the termination of this Software License Agreement. 11 General This License Agreement shall be construed, interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof. The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC, Taiwan.
Index Index A D Address Assignment 84 Daylight saving 128 Alert 131 AP 19 DHCP 32, 95 DHCP server see also Dynamic Host Configuration Protocol AP (Access Point) 195 DHCP client information 98 alternative subnet mask notation 160 AP Mode menu 52 overview 49 status screen 50 AP+Bridge 19 DHCP client list 98 DHCP server 92, 95 DHCP table 32, 98 DHCP client information DHCP status Dimensions 153 disclaimer 231 B Backup configuration 136 Bridge/Repeater 19 BSS 193 DNS 45, 97 DNS server see also Doma
Index F L Factory LAN defaults 92, 95 LAN 91 IP pool setup 92 FCC interference statement 232 Firewall ICMP packets 111 ZyXEL device firewall 110 LAN overview 91 firewall stateful inspection 109 Language 143 Firmware upload 133 file extension using HTTP local (user) database 69 and encryption 70 firmware version 29, 51 Fragmentation Threshold 197 G General wireless LAN screen 71 LAN setup 91 LAN TCP/IP 92 Link type 30, 51 Local Area Network 91 Log 131 M MAC 76 MAC address 69, 84 cloning 47, 85
Index server 103 server sets 107 NAT traversal 117 R Navigation Panel 30, 52 RADIUS 198 Shared Secret Key 199 navigation panel 30, 52 RADIUS Message Types 199 Network Address Translation 101, 104 RADIUS Messages 199 RADIUS server 69 O registration product 234 related documentation 3 P Remote management 113 and NAT 114 and the firewall 113 limitations 114 system timeout 114 Point-to-Point Protocol over Ethernet 40, 87 Reset the device 27 Point-to-Point Tunneling Protocol 42, 88 Restore configu
Index Summary DHCP table 32 Packet statistics 33 Wireless station status 34 syntax conventions 6 Sys Op Mode 139 System General Setup 125 System Name 126 WAN MAC address 84 warranty 234 note 234 Web Configurator 20 how to access 25 Overview 25 Web configurator navigating 27 System name 36 vs computer name WEP Encryption 74 System restart 138 WEP key 73 WEP encryption 73 Wireless association list 34 wireless channel 150 T wireless LAN 150 TCP/IP configuration 95 Wireless LAN wizard 38 Temperature
Index NBG-416N User’s Guide 243
Index 244 NBG-416N User’s Guide