background image

MWR211 User’s Guide 

 

223 

Figure 130  

Pop-up Blocker 

 

You can also check if pop-up blocking is disabled in the Pop-up Blocker section 
in the Privacy tab.  

1  

In Internet Explorer, select ToolsInternet OptionsPrivacy

2  

Clear the Block pop-ups check box in the Pop-up Blocker section of 
the screen. This disables any web pop-up blockers you may have 
enabled.  

Figure 131  

Internet Options: Privacy                

 

3  

Click Apply to save this setting. 

Enable pop-up Blockers with Exceptions 

Alternatively, if you only want to allow pop-up windows from your device, see the 
following steps. 

1  

In Internet Explorer, select ToolsInternet Options and then the 
Privacy tab.  

Summary of Contents for MWR211

Page 1: ...MWR211 User s Guide 1 Copyright 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS IP Address http 192 168 10 1 Password 1234 Firmware Version 1 0 Edition 1 5 2010 ...

Page 2: ...MWR211 User s Guide 2 MWR211 Mobile Wireless Router ...

Page 3: ... you get up and running right away It contains information on setting up your network and configuring for Internet access Supporting Disc Refer to the included CD for support documents ZyXEL Web Site Please refer to www us zyxel com for additional support documentation and product certifications User Guide Feedback Help us help you Send all User Guide related comments questions or suggestions for ...

Page 4: ...information Date that you received or purchased your device Brief description of the problem including any steps that you have taken before contacting the ZyXEL Customer Support representative Support Email support zyxel com Toll Free 1 800 978 7222 Website www us zyxel com Postal mail ZyXEL Communications Inc 1130 N Miller Street Anaheim CA 92806 2001 U S A ...

Page 5: ...denoted by square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER key Select or choose means for you to use one of the predefined choices A right angle bracket within a screen name denotes a mouse click For example Maintenance Log Log Setting means you first click Maintenance in...

Page 6: ...ons Used in Figures Figures in this User s Guide may use the following generic icons The MWR211 icon is not an exact representation of your device MWR211 Computer Notebook computer Server Modem Firewall Telephone Switch Router ...

Page 7: ...hem or stumble over them Always disconnect all cables from this device before servicing or disassembling Use ONLY power adaptor or cord provided by the manufacturer for your device Connect the power adaptor or cord to the right supply voltage for example 110V AC in North America or 230V AC in Europe Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyon...

Page 8: ... Never use a knife screwdriver or other sharp object to remove the battery Do not attempt to open the battery Use only the provided recharger to recharge the battery Only replace the battery with the correct replacement battery Failure to do so may result in fire or explosion Contac ZyXEL to obtain the correct replacement battery Your product is marked with this symbol which is known as the WEEE m...

Page 9: ...Good Habits for Managing the MWR211 20 1 5 LEDs 20 Chapter 2 Introducing the Web Configurator 22 2 1 Overview 22 2 2 Accessing the Web Configurator 22 2 2 1 Login Screen 23 2 2 2 Password Screen 23 2 3 Resetting the MWR211 24 2 3 1 Procedure to Use the Reset Button 24 Chapter 3 Monitor 26 3 1 Overview 26 3 2 What You Can Do 26 3 3 BW MGMT Monitor 26 3 4 DHCP Table 27 3 5 Packet Statistics 28 3 6 W...

Page 10: ...g the Web Configurator in Access Point Mode 47 6 3 3 Configuring your WLAN Bandwidth Management and Maintenance Settings 47 6 4 AP Mode Status Screen 48 6 4 1 Navigation Panel 51 6 5 LAN Screen 51 Chapter 7 WISP Mode 54 7 1 Overview 54 7 2 What You Can Do 55 7 3 What You Need to Know 55 7 3 1 Setting your MWR211 to WISP Mode 55 7 3 2 Accessing the Web Configurator in WISP Mode 56 7 4 WISP Mode Sta...

Page 11: ...work 79 Chapter 9 Wireless LAN 80 9 1 Overview 80 9 2 What You Can Do 81 9 3 What You Should Know 81 9 3 1 Wireless Security Overview 81 9 4 General Wireless LAN Screen 84 9 5 Security 85 9 5 1 No Security 85 9 5 2 WEP Encryption 86 9 5 3 WPA PSK WPA2 PSK 88 9 6 MAC Filter 90 9 7 Wireless LAN Advanced Screen 91 9 8 Quality of Service QoS Screen 93 9 9 WPS Screen 94 9 10 WPS Station Screen 96 9 11 ...

Page 12: ...lias 125 11 4 LAN IP Screen 125 11 5 IP Alias Screen 126 Chapter 12 DHCP Server 128 12 1 Overview 128 12 2 What You Can Do 128 12 3 General Screen 128 12 4 Advanced Screen 129 Chapter 13 Network Address Translation NAT 132 13 1 Overview 132 13 2 What You Can Do 133 13 3 General NAT Screen 133 13 4 NAT Application Screen 134 13 5 NAT Advanced Screen 136 13 5 1 Trigger Port Forwarding Example 138 13...

Page 13: ... You Can Do 147 17 3 RIP Screen 147 Part III Security 149 Chapter 18 Firewall 150 18 1 Overview 150 18 2 What You Can Do 150 18 3 What You Need To Know 151 18 4 General Firewall Screen 151 18 5 Services Screen 152 Chapter 19 Content Filter 156 19 1 Overview 156 19 2 What You Can Do 156 19 3 What You Need To Know 156 19 3 1 Content Filtering Profiles 156 19 4 Content Filter Screen 157 Part IV Manag...

Page 14: ... Management and NAT 172 21 3 2 System Timeout 172 21 4 WWW Screen 172 21 5 SNMP Screen 173 Chapter 22 Universal Plug and Play UPnP 175 22 1 Overview 175 22 2 What You Can Do 175 22 3 What You Need to Know 175 22 3 1 NAT Traversal 175 22 3 2 Cautions with UPnP 176 22 4 UPnP Screen 176 22 5 Technical Reference 177 22 5 1 Using UPnP in Windows XP Example 177 22 5 2 Web Configurator Easy Access 180 Pa...

Page 15: ...Reset Restart 196 28 1 Overview 196 28 2 What You Can Do 196 28 3 Reset Restart Screen 196 Chapter 29 Sys OP Mode 197 29 1 Overview 197 29 2 What You Can Do 197 29 3 What You Need to Know 197 29 4 Sys Op Mode Screen 199 Chapter 30 Alert 201 30 1 Overview 201 30 2 What You Can Do 201 30 3 Alert Screen 201 Chapter 31 Troubleshooting 204 31 1 Power Hardware Connections and LEDs 204 31 2 MWR211 Access...

Page 16: ...219 Appendix A Pop up Windows JavaScripts and Java Permissions 220 Appendix B IP Addresses and Subnetting 228 Appendix C Setting up Your Computer s IP Address 241 Appendix D Wireless LANs 260 Appendix E Common Services 273 Appendix F Legal Information 278 Appendix G Open Source Licenses 283 ...

Page 17: ...MWR211 User s Guide 17 Part I Introduction Getting to Know Your MWR211 Introducing the Web Configurator Monitor MWR211 Modes Tutorials ...

Page 18: ...range of services such as a firewall and content filtering are also available for secure Internet computing You can use media bandwidth management to efficiently manage traffic on your network Bandwidth management features allow you to prioritize time sensitive or highly important applications such as Voice over the Internet VoIP 1 2 Applications You can create the following networks using the MWR...

Page 19: ...ireless switch You can use the built in switch of the MWR211 to turn the wireless function on and off without opening the Web Configurator WPS Wi Fi Protected Setup button You can use the WPS button or the WPS section of the Web Configurator to set up a wireless network with your ZyXEL device 1 4 Good Habits for Managing the MWR211 Do the following things regularly to make the MWR211 more secure a...

Page 20: ...nt Panel The following table describes the LEDs and the WPS button Table 1 Front Panel LEDs and WPS Button LED COLOR STATUS DESCRIPTION POWER Green On The MWR211 is receiving power and functioning properly Slow Blinking The MWR211 is booting Fast Blinking The reset button has been pressed longer than 5 seconds and the MWR211 is being reset to factory default configuration Off The MWR211 is not rec...

Page 21: ...t Off The wireless LAN is not ready or has failed LAN 1 Green On The MWR211 has a successful 10 100MB Ethernet connection Blinking The MWR211 is sending receiving data through the LAN Off The LAN is not connected USB Green On The 3G connection has established Blinking Slowly The 3G connection has established and in the STANDBY state Blinking Quickly The 3G connection is establishing or there has b...

Page 22: ...o use the Web Configurator you need to allow Web browser pop up windows from your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScripts enabled by default Java permissions enabled by default Refer to the Troubleshooting chapter Chapter 32 to see how to make sure these functions are allowed in Internet Explorer 2 2 Accessing the Web Configurator 1 Make sure yo...

Page 23: ...owing login screen Figure 3 Login screen The following table describes the labels in this screen Table 2 Login screen LABEL DESCRIPTION Password Type 1234 default as the password 2 2 2 Password Screen You should see a screen asking you to change your password highly recommended as shown next ...

Page 24: ... the time period set in the Administrator Inactivity Timer field expires default five minutes go to Chapter 24 to change this Simply log back into the MWR211 if this happens 2 3 Resetting the MWR211 If you forget your password or IP address or you cannot access the Web Configurator you will need to use the RESET button at the back of the MWR211 to reload the factory default configuration file This...

Page 25: ...ger than one second to restart reboot the MWR211 3 Press the RESET button for longer than five seconds to set the MWR211 back to its factory default configurations The Power LED will start to blink to indicate that the default configuration is being loaded ...

Page 26: ...future release Use the DHCP Table screen to view information related to your DHCP status Use the Packet Statistics screen to view port status packet specific statistics the system up time and so on Use the WLAN Station Status screen to view the wireless stations that are currently associated to the MWR211 3 3 BW MGMT Monitor The Bandwidth Management BW MGMT Monitor allows you to view the amount of...

Page 27: ...d as a server the MWR211 provides the TCP IP configuration for the clients If DHCP service is disabled you must have another DHCP server on that network or else the computer must be manually configured Click the DHCP Table Details hyperlink in the Status screen Read only information here relates to your DHCP status The DHCP table shows current DHCP client information including IP Address Host Name...

Page 28: ...factory and consists of six pairs of hexadecimal characters for example 00 A0 C5 00 00 02 IP Address This field displays the IP address relative to the field listed above Expires in This field displays the time when the IP address and MAC address association ends Refresh Click Refresh to renew the screen 3 5 Packet Statistics Click the Packet Statistics Details hyperlink in the Status screen Read ...

Page 29: ...he maximum transmission rate when the WLAN is enabled and Down when the WLAN is disabled TxPkts This is the number of transmitted packets on this port RxPkts This is the number of received packets on this port Collisions This is the number of collisions on this port Tx B s This displays the transmission speed in bytes per second on this port Rx B s This displays the reception speed in bytes per se...

Page 30: ...gure 11 Summary Wireless Association List The following table describes the labels in this screen Table 9 Summary Wireless Association List LABEL DESCRIPTION This is the index number of an associated wireless station MAC Address This field displays the MAC address of an associated wireless station Association Time This field displays the time a wireless station first associated with the MWR211 s W...

Page 31: ...ard Signal Strength This displays the signal strength of your 3G connection Mobile USB Device Name This field displays the name of your mobile USB device Mobile USB Device Firmware This field displays the firmware version of your mobile USB device Network Operator Name This displays the name of your mobile broadband ISP Network Mode This field displays the current network mode of your 3G connectio...

Page 32: ...nternet Go to Status Screen to view the Status screen in this mode Access Point Use this mode if you want to extend your network by allowing network devices to connect to the MWR211 wirelessly Go to AP view the Status screen in this mode WISP mode Use this mode if there is an existing access point in the network to which you want to connect your local network Go to WISP Mode S to view the Status s...

Page 33: ...ce Mode carefully to avoid having to change it later When changing to another mode the IP address of the MWR211 changes The running applications and services of the network devices connected to the MWR211 can be interrupted In WISP mode you should know the SSID and wireless security details of the access point to which you want to connect ...

Page 34: ...o another network for example the Internet In the figure below the MWR211 connects the local network LAN1to the Internet Figure 27 MWR211 Network Note The Status screen is shown the Web Configurator It varies depending on the device mode of your MWR211 5 2 What You Can Do Use the Status screen to view read only information about your MWR211 ...

Page 35: ...MWR211 User s Guide 35 5 3 Status Screen Click to open the status screen Figure 28 Status Screen Router Mode The following table describes the icons shown in the Status screen ...

Page 36: ...icon to see the Status page The information in this screen depends on the device mode you select Click this icon to see the Monitor navigation menu Click this icon to see the Configuration navigation menu Click this icon to see the Maintenance navigation menu The following table describes the labels shown in the Status screen Table 19 Status Screen Router Mode LABEL DESCRIPTION Logout Click this a...

Page 37: ...AN port s DHCP role Client or Server LAN Information MAC Address This shows the LAN Ethernet adapter MAC Address of your device IP Address This shows the LAN port s IP address IP Subnet Mask This shows the LAN port s subnet mask DHCP This shows the LAN port s DHCP role Server or None WLAN Information WLAN OP Mode This is the device mode Device Modes to which the MWR211 s wireless LAN is set Access...

Page 38: ... This field displays your MWR211 s present date and time System Resource CPU Usage This displays what percentage of the MWR211 s processing ability is currently used When this percentage is close to 100 the MWR211 is running at full load and the throughput is not going to improve anymore If you want some applications to have more throughput you should turn off other applications for example using ...

Page 39: ...is disconnected For the WAN port it displays the port speed and duplex setting if you re using Ethernet encapsulation and Idle line ppp idle Dial starting to trigger a call and Drop dropping a call if you re using PPPoE or PPTP encapsulation This field displays N A when the line is disconnected For the WLAN it displays the maximum transmission rate when the WLAN is enabled and N A when the WLAN is...

Page 40: ...20 Navigation Panel Router Mode LINK TAB FUNCTION Status This screen shows the MWR211 s general device system and interface status information Use this screen to access the wizard and summary statistics tables MONITOR Log Use this screen to view the list of activities recorded by your MWR211 BW MGMT Use this screen to view the amount of network bandwidth that applications running in the network ar...

Page 41: ...evices or block the devices from accessing the MWR211 Advanced This screen allows you to configure advanced wireless settings QoS Use this screen to configure Wi Fi Multimedia Quality of Service WMM QoS WMM QoS allows you to prioritize wireless traffic according to the delivery requirements of individual services WPS Use this screen to configure WPS WPS Station Use this screen to add a wireless st...

Page 42: ...ias to create LAN subnets DHCP Server General Use this screen to enable the MWR211 s DHCP server Advanced Use this screen to assign IP addresses to specific individual computers based on their MAC addresses and to have DNS servers assigned by the DHCP server NAT General Use this screen to enable NAT Application Use this screen to configure servers behind the MWR211 Advanced Use this screen to chan...

Page 43: ...nitor Use this screen to view the amount of network bandwidth that applications running in the network are using Remote Management WWW Use this screen to be able to access the MWR211 from the LAN WAN or both SNMP Use this screen to set up the MWR2215 to manage it using and SNMP v1 management program UPnP General Use this screen to enable UPnP on the MWR211 MAINTENANCE General Use this screen to vi...

Page 44: ...configuration or reset the factory defaults to your MWR211 Restart Restart This screen allows you to reboot the MWR211 without turning the power off Sys OP Mode This screen allows you to select whether your device acts as a Router or a Access Point Alert Use this screen to set up alerts ...

Page 45: ...WLAN in the same subnet See the figure below for an example Figure 30 Wireless Internet Access in Access Point Mode Many screens that are available in Router mode are not available in Access Point mode such as bandwidth management and firewall Note See Chapter 10 for an example of setting up a wireless network in Access Point mode 6 2 What You Can Do Use the Status screen to view read only informa...

Page 46: ... the Web Configurator if you haven t already See the Quick Start Guide for instructions on how to do this 2 To use your MWR211 as an access point go to Maintenance Sys OP Mode General and select Access Point mode Figure 31 Changing to Access Point mode Note You have to log in to the Web Configurator again when you change modes As soon as you do your MWR211 is already in Access Point mode 3 When yo...

Page 47: ...nter ipconfig to show your computer s IP address If your computer s IP address is not in the correct range then see Appendix C for information on changing your computer s IP address 4 After you ve set your computer s IP address open a web browser such as Internet Explorer and type 192 168 10 2 as the web address in your web browser Note After clicking Login see the screens described in the section...

Page 48: ...ccess Point Mode The following table describes the labels shown in the Status screen Table 21 Status Screen Access Point Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator Device Information Host Name This is the System Name you enter in the Maintenance General screen It is for identification purposes Firmware Version This is the firmware version and the date created...

Page 49: ... adapter MAC Address of your device Status This shows the current status of the Wireless LAN ON or OFF Name SSID This shows a descriptive name used to identify the MWR211 in the wireless LAN Channel This shows the channel number which you select manually Operating Channel This shows the channel number which the MWR211 is currently using over the wireless LAN Security Mode This shows the level of w...

Page 50: ...nd WAN ports this field displays Down line is down or Up line is up or connected For the WLAN it displays Up when the WLAN is enabled or Down when the WLAN is disabled Rate For the LAN ports this displays the port speed and duplex setting or N A when the line is disconnected For the WAN port it displays the port speed and duplex setting if you re using Ethernet encapsulation and Idle line ppp idle...

Page 51: ...nt mode Figure 34 Menu Access Point Mode Refer to Table 20 Navigation Panel Router Mod for descriptions of the labels shown in the Navigation panel 6 5 LAN Screen Use this section to configure your LAN settings while in Access Point mode Click Network LAN to see the screen below Note If you change the IP address of the MWR211 in the screen below you will need to log into the MWR211 again using the...

Page 52: ...when you select this you cannot enter an IP address for your MWR211 in the field below Use Defined LAN IP Address Click this if you want to specify the IP address of your MWR211 Or if your ISP or network administrator gave you a static IP address to access the network or the Internet IP Address Type the IP address in dotted decimal notation The default setting is 192 168 10 2 If you change the IP ...

Page 53: ...e field to the right If you chose User Defined but leave the IP address set to 0 0 0 0 User Defined changes to None after you click Apply If you set a second choice to User Defined and enter the same IP address the second User Defined changes to None after you click Apply Select None if you do not want to configure DNS servers If you do not configure a DNS server you must know the IP address of a ...

Page 54: ...dress i e 192 168 10 1 you may be able to get on line but certain applications gaming video streaming may not work The WISP mode is not a simple Wireless Bridge because in a wireless bridge there is no routing done on the device In WISP mode the MWR211 still acts as a router firewall and will therefore cause problems if connected to another router firewall The MWR211 must be connecting to some typ...

Page 55: ...R211 acting as an access point Use the Wireless LAN screen to associate your MWR211 acting as a wireless client with an existing access point 7 3 What You Need to Know With the exception of the LAN screen the Monitor Configuration and Maintenance screens in WISP mode are similar to the ones in Router Mode 7 3 1 Setting your MWR211 to WISP Mode 1 Log into the Web Configurator if you haven t already...

Page 56: ...ssful 7 3 2 Accessing the Web Configurator in WISP Mode To login to Web Configurator in WISP mode do the following 1 Connect your computer to the LAN port of the MWR211 2 The default IP address of the MWR211 is 192 168 10 1 If you did not change this you can use the same IP address in WISP mode Open a web browser such as Internet Explorer and type 192 168 10 1 as the web address in your web browse...

Page 57: ...tus Screen Click to open the status screen Figure 39 Status WISP Mode The following table describes the labels shown in the Status screen Table 23 Status Screen WISP Mode LABEL DESCRIPTION Logout Click this at any time to exit the Web Configurator Device Information Host Name This is the System Name you enter in the Maintenance General screen It is for identification purposes ...

Page 58: ...Address This shows the LAN Ethernet adapter MAC Address of your device IP Address This shows the LAN port s IP address IP Subnet Mask This shows the LAN port s subnet mask DHCP This shows the LAN port s DHCP role Server or None WLAN Information WLAN OP Mode This is the device mode Device Modes to which the MWR211 s wireless LAN is set Access Point Mode MAC Address This shows the wireless adapter M...

Page 59: ...ghput is not going to improve anymore If you want some applications to have more throughput you should turn off other applications for example using bandwidth management Memory Usage This shows what percentage of the heap memory the MWR211 is using System Setting Firewall This shows whether the firewall is enabled or not Bandwidth Management This shows whether the bandwidth management is enabled o...

Page 60: ...ed Summary BW MGMT Monitor Click Details to go to the Monitor BW MGMT Monitor screen Use this screen to view the amount of network bandwidth that applications running in the network are using DHCP Table Click Details to go to the Monitor DHCP Table screen Use this screen to view current DHCP client information Packet Statistics Click Details to go to the Monitor Packet Statistics screen Use this s...

Page 61: ...ode Select the security mode of the access point to which you want to connect Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to reload the previous configuration for this screen 7 5 1 No Security Use this screen if the access point to which you want to connect does not use encryption Figure 41 No Security WISP The following table describes the labels in this screen ...

Page 62: ...o which you are connecting Security Security Mode Select No Security in this field Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to reload the previous configuration for this screen 7 5 2 Static WEP Use this screen if the access point to which you want to connect to uses WEP security mode Figure 42 WEP WISP ...

Page 63: ...less network WEP Encryption Select 64 bit WEP or 128 bit WEP This dictates the length of the security key that the network is going to use Authenticatio n Method Select Auto or Shared Key from the drop down list box This field specifies whether the wireless clients have to provide the WEP key to login to the wireless client Keep this setting at Auto unless you want to force a key verification befo...

Page 64: ...9 A F You must configure at least one key only one key can be activated at any one time The default key is key 1 Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to reload the previous configuration for this screen 7 5 3 WPA 2 Personal Enterprise Use this screen if the access point to which you want to connect uses WPA 2 Personal Enterprise security mode Figure 43 WPA PS...

Page 65: ... for authentication Type the pre shared key employed by the access point to which you want to connect Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to reload the previous configuration for this screen 7 5 4 Advance Screen Use this screen to enable the power saving mode of your MWR211 Go to Configuration Wireless LAN to open the following screen Figure 44 Configuration...

Page 66: ...ess network before the AP fragments the packet into smaller data frames Fragment Threshold This value controls how often wireless clients must get permission to send information to the AP The lower the value the more often the wireless clients must get permission If this value is greater than the fragmentation threshold value then wireless clients never have to get permission to send information t...

Page 67: ... Name SSID of the wireless networks close to you BSSID This displays the MAC address of the wireless device listed Signal Strength This displays the strength of the wireless network Channel This displays the wireless channel used by the wireless network Station Encryp This displays the encryption type used by the wireless network Station Auth This displays the authentication method used by the wir...

Page 68: ...MWR211 User s Guide 68 Setting Click this after selecting a network to set the ...

Page 69: ...practices for the most common Internet connection methods MWR211 uses one active WAN connection at any given time If both wired WAN and mobile WAN are connected to the Internet MWR211 will use the wired WAN for Internet communication If the wired WAN connection is dropped for any reason MWR211 will automatically use mobile WAN for Internet communication On the other hand if the mobile WAN is the o...

Page 70: ...net port can act as the WAN port Once this is done user can no longer use the wired connection for the web configurator Unplug the power to your cable modem Depending on your cable modem it may also have a backup battery inside Remove this battery and completely power down the cable modem Let it sit from 2 to 3 minutes and then reconnect the battery and power to the cable modem If the router is se...

Page 71: ...SB port until the USB LED has turned off or 10 seconds have passed The Data Usage Count if enabled will be written to MWR211 internal storage when the 3G USB adapter is removed Do not power off MWR211 before the USB LED has turned off or 10 seconds have passed 8 3 Connecting to Internet from an Access Point This section gives you an example of how to set up an access point AP and wireless client a...

Page 72: ...ince one device can authenticate the other 8 4 1 Push Button Configuration PBC 1 Make sure that your MWR211 is turned on and that it is within range of your computer 2 Make sure that you have installed the wireless client this example uses the NWD210N driver and utility in your notebook 3 In the wireless client utility find the WPS settings Enable WPS and press the WPS button Start or WPS button 4...

Page 73: ...he WPS settings and select the PIN method to get a PIN number 2 Enter the PIN number to the PIN field in the Network Wireless LAN WPS Station screen on the MWR211 3 Click Start buttons or button next to the PIN field on both the wireless client utility screen and the MWR211 s WPS Station screen within two minutes The MWR211 authenticates the wireless client and sends the proper configuration setti...

Page 74: ...thod 8 5 Enabling and Configuring Wireless Security No WPS This example shows you how to configure wireless security settings with the following parameters on your MWR211 SSID SSID_Example3 Channel 6 Security WPA PSK Pre Shared Key ThisismyWPA PSKpre sharedkey ...

Page 75: ...General screen in the AP s Web Configurator 2 Make sure the Enable Wireless LAN check box is selected 3 Enter SSID_Example3 as the SSID and select a channel 4 Set security mode to WPA PSK and enter ThisismyWPA PSKpre sharedkey in the Pre Shared Key field Click Apply Figure 49 Tutorial Network Wireless LAN General 5 Open the Status screen Verify your wireless and wireless security settings under De...

Page 76: ...ook or computer s wireless adapter supports one of these standards 2 Wireless adapters come with software sometimes called a utility that you install on your computer See your wireless adapter s User s Guide for information on how to do that 3 After you ve installed the utility open it If you cannot see your utility s icon on your screen go to Start Programs and click on your utility in the list o...

Page 77: ...lowing screen Click Next Figure 52 Security Settings 6 The Confirm Save window appears Check your settings and click Save to continue Figure 53 Confirm Save 7 Check the status of your wireless connection in the screen below If your wireless connection is weak or you have no connection see the Troubleshooting section of this User s Guide ...

Page 78: ... Status If your connection is successful open your Internet browser and enter http us zyxel com or the URL of any other web site in the address bar If you are able to access the web site your wireless connection is successfully configured ...

Page 79: ...MWR211 User s Guide 79 Part II Network Wireless LAN WAN LAN DHCP Server Network Address Translation NAT Dynamic DNS OpenDNS Static Route RIP ...

Page 80: ...about wireless networks The following figure provides an example of a wireless network Figure 55 Example of a Wireless Network The wireless network is the part in the blue circle In this wireless network devices A and B are called wireless clients The wireless clients use the access point AP to interact with other devices such as the printer or with the Internet Your MWR211 is the AP ...

Page 81: ...ow Every wireless network must follow these basic guidelines Every wireless client in the same wireless network must use the same SSID The SSID is the name of the wireless network It stands for Service Set IDentity If two wireless networks overlap they should use different channels Like radio stations or television channels each wireless network uses a specific channel or frequency to send and rec...

Page 82: ...ty If a wireless client is not allowed to use the wireless network it does not matter if it has the correct settings This type of security does not protect the information that is sent in the wireless network Furthermore there are ways for unauthorized devices to get the MAC address of an authorized wireless client Then they can use that MAC address to use the wireless network 9 3 1 3 Encryption W...

Page 83: ...ending on the type of wireless network login and select the WPA Compatible option in the MWR211 Many types of encryption use a key to protect the information in the wireless network The longer the key the stronger the encryption Every wireless client in the wireless network must have the same key 9 3 1 4 WPS Wi Fi Protected Setup WPS is an industry standard specification defined by the Wi Fi Allia...

Page 84: ...u press Apply to confirm You must then change the wireless settings of your computer to match the MWR211 s new settings Click Network Wireless LAN to open the General screen Figure 56 Network Wireless LAN General The following table describes the general wireless LAN labels in this screen Table 31 Network Wireless LAN General LABEL DESCRIPTION Wireless Setup Wireless LAN This is turned on by defau...

Page 85: ...rop down list box The options vary depending on the frequency band and the country you are in This option is only available if Auto Channel Selection is disabled Note to US model owner To comply with US FCC regulation the country selection function has been completely removed from all US models The above function is for non US models only Operating Channel This displays the channel the MWR211 is c...

Page 86: ...o Table 31 Network Wireless LAN General for descriptions of the other labels in this screen 9 5 2 WEP Encryption WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communications private It encrypts unicast and multicast communications in a network Both the wireless stations and the access points must use the same WEP key Your MWR211 a...

Page 87: ...ic WEP LABEL DESCRIPTION Security Mode Select Static WEP to enable data encryption Passphrase Enter a Passphrase up to 26 printable characters and click Generate A passphrase functions like a password In WEP security mode it is further converted by the MWR211 into a complicated string that is referred to as the key This key is requested from all devices wishing to connect to a wireless network ...

Page 88: ...ng 0x that identifies a hexadecimal key is entered automatically Key 1 to Key 4 The WEP keys are used to encrypt data Both the MWR211 and the wireless stations must use the same WEP key for data transmission If you chose 64 bit WEP then enter any 5 ASCII characters or 10 hexadecimal characters 0 9 A F If you chose 128 bit WEP then enter 13 ASCII characters or 26 hexadecimal characters 0 9 A F You ...

Page 89: ...s when you choose WPA2 Personal Enterprise as the Security Mode Check this field to allow wireless devices using WPA Personal Enterprise security mode to connect to your MWR211 Pre Shared Key WPA Personal Enterprise WPA2 Personal Enterprise uses a simple common password for authentication Type a pre shared key from 8 to 63 case sensitive keyboard characters Group Key Update Timer The Group Key Upd...

Page 90: ...ude devices from accessing the MWR211 Deny Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters for example 00 A0 C5 00 00 02 You need to know the MAC address of the devices to configure this screen To change your MWR211 s MAC filter settings click Network Wireless LAN MAC Filter The scree...

Page 91: ...to the MWR211 in these address fields Enter the MAC addresses in a valid MAC address format that is six hexadecimal character pairs for example 12 34 56 78 9a bc Click Add MAC Filter Summary Delete Click the delete icon to remove the MAC address from the list MAC Address This is the MAC address of the wireless station that are allowed or denied access to the MWR211 Apply Click Apply to save your c...

Page 92: ...boundary for directed messages It is the maximum data fragment size that can be sent Enter an even number between 256 and 2346 Enable Intra BSS Traffic A Basic Service Set BSS exists when all communications between wireless clients or between a wireless client and a wired network client go through one access point AP Intra BSS traffic is traffic between wireless clients in the BSS When Intra BSS i...

Page 93: ...o use for your wireless network It is recommended that you select 20 40 20 40 MHz Select 20 MHz if you find you have wireless connectivity issues Using the larger channel bandwidth of 20 40 allows for the possibility of more interference Use 20 if you have problems connecting from a normal distance wirelessly Guard Interval Select Auto to increase data throughput However this may make data transfe...

Page 94: ...vel according to the ToS value in the IP header of packets it sends WMM QoS Wifi MultiMedia Quality of Service gives high priority to voice and video which makes them run more smoothly Apply Click Apply to save your changes to the MWR211 Reset Click Reset to reload the previous configuration for this screen 9 9 WPS Screen Use this screen to enable disable WPS view or generate a new PIN number and ...

Page 95: ...screen This displays Unconfigured if WPS is disabled and there are no wireless or wireless security changes on the MWR211 or you click Release_Configuration to remove the configured wireless and wireless security settings Release Configuration This button is only available when the WPS status displays Configured Click this button to remove all configured wireless and wireless security settings for...

Page 96: ... WPS Station The following table describes the labels in this screen Table 39 Network Wireless LAN WPS Station LABEL DESCRIPTION Push Button Use this button when you use the PBC Push Button Configuration method to configure wireless station s wireless settings Click this to start WPS aware wireless station scanning and the wireless security information synchronization Or input station s PIN number...

Page 97: ...ck Network Wireless LAN Scheduling tab Figure 65 Network Wireless LAN Scheduling The following table describes the labels in this screen Table 40 Network Wireless LAN Scheduling LABEL DESCRIPTION Wireless LAN Scheduling Enable Wireless LAN Scheduling Select this to enable Wireless LAN scheduling Scheduling WLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off This fi...

Page 98: ...Wireless LAN will turn off between the two times you enter in these fields Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to reload the previous configuration for this screen 9 12 WDS Screen A Wireless Distribution System is a wireless connection between two or more APs Use this screen to set the operating mode of your MWR211 to AP Bridge or Bridge Only and establish w...

Page 99: ...ith other APs Local MAC Address This is the MAC address of your MWR211 Phy Mode Select the Phy mode you want the MWR211 to use This dictates the maximum size of packets during data transmission Remote MAC Address This is the MAC address of the peer device that your MWR211 wants to make a bridge connection with You can connect to up to 4 peer devices Security EncrypType Select whether to use WEP TK...

Page 100: ...nects your private networks such as a LAN Local Area Network and other networks so that a computer in one location can communicate with computers in other locations Figure 67 LAN and WAN The MWR211 has two different types of WAN connection The standard Ethernet WAN connections and the USB ports for 3G adapter The standard Ethernet WAN connection is the port labeled LAN on the back of the router Th...

Page 101: ...igure the screens for your WAN connection as well as enable disable some advanced features of your MWR211 10 3 1 Configuring Your Internet Connection Encapsulation Method Encapsulation is used to include data from an upper layer protocol into a lower layer protocol To set up a WAN connection to the Internet you need to use the same encapsulation method used by your ISP Internet Service Provider If...

Page 102: ...211 s WAN IP address set the DNS server fields to get the DNS server address from the ISP WAN MAC Address The MAC address screen allows users to configure the WAN port s MAC address by either using the factory default or cloning the MAC address from a computer on your LAN Choose Factory Default to select the factory assigned default MAC Address Otherwise click Clone the computer s MAC address IP A...

Page 103: ...v1 and IGMP version 2 IGMP v2 At start up the MWR211 queries all directly connected networks to gather group membership After that the MWR211 periodically updates this information IP multicasting can be enabled disabled on the MWR211 LAN and or WAN interfaces in the Web Configurator LAN WAN Select None to disable IP multicasting on these interfaces 10 4 Internet Connection Use this screen to chang...

Page 104: ... describes the labels in this screen Table 42 Network WAN Wired WAN Ethernet Encapsulation LABEL DESCRIPTION Ethernet Port Type Sets the Ethernet port to function as either LAN or WAN ISP Parameters for Internet Access Encapsulation You must choose the Ethernet option when the WAN port is used as a ...

Page 105: ... have the IP address of a DNS server Enter the DNS server s IP address in the field to the right If you chose User Defined but leave the IP address set to 0 0 0 0 User Defined changes to None after you click Apply If you set a second choice to User Defined and enter the same IP address the second User Defined changes to None after you click Apply Select None if you do not want to configure DNS ser...

Page 106: ...ation method that works with existing access control systems for example Radius One of the benefits of PPPoE is the ability to let you access one of multiple network services a function known as dynamic service selection This enables the service provider to easily create and offer new IP services for individuals Operationally PPPoE saves significant effort for both you and the ISP or carrier as it...

Page 107: ...MWR211 User s Guide 107 Figure 72 Network WAN Wired WAN PPPoE Encapsulation ...

Page 108: ...r the Maximum Transmission Unit MTU or the largest packet size per frame that your MWR211 can receive and process Nailed Up Connection Select Nailed Up Connection if you do not want the connection to time out Idle Timeout sec This value specifies the time in minutes that elapses before the router automatically disconnects from the PPPoE server WAN IP Address Assignment Get automatically from ISP S...

Page 109: ...s The MAC address section allows users to configure the WAN port s MAC address by using the MWR211 s MAC address copying the MAC address from a computer on your LAN or manually entering a MAC address Factory default Select Factory default to use the factory assigned default MAC Address Clone the computer s MAC address IP Address Select Clone the computer s MAC address IP Address and enter the IP a...

Page 110: ...MWR211 User s Guide 110 This screen displays when you select PPTP encapsulation Figure 73 Network WAN Wired WAN PPTP Encapsulation The following table describes the labels in this screen ...

Page 111: ...ime out Idle Timeout This value specifies the time in minutes that elapses before the MWR211 automatically disconnects from the PPTP server PPTP Configuration Server IP Address Type the IP address of the PPTP server Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address This is the default selection Use Fixed IP Address Select this option If the ISP assigne...

Page 112: ...u click Apply If you set a second choice to User Defined and enter the same IP address the second User Defined changes to None after you click Apply Select None if you do not want to configure DNS servers If you do not configure a DNS server you must know the IP address of a computer in order to access it WAN MAC Address The MAC address section allows users to configure the WAN port s MAC address ...

Page 113: ...TP Encapsulation The Layer 2 Tunneling Protocol L2TP works at layer 2 the data link layer to tunnel network traffic between two peer devices over another network like the Internet This screen displays when you select L2TP encapsulation ...

Page 114: ...MWR211 User s Guide 114 Figure 74 Network WAN Wired WAN L2TP Encapsulation ...

Page 115: ...tly L2TP Configuration Server IP Address Type the IP address of the L2TP server Get automatically from ISP Select this option If your ISP did not assign you a fixed IP address This is the default selection Use Fixed IP Address Select this option If the ISP assigned a fixed IP address IP Address Enter your WAN IP address in this field if you selected Use Fixed IP Address IP Subnet Mask Your MWR211 ...

Page 116: ... and enter the same IP address the second User Defined changes to None after you click Apply Select None if you do not want to configure DNS servers If you do not configure a DNS server you must know the IP address of a computer in order to access it WAN MAC Address The MAC address section allows users to configure the WAN port s MAC address by either using the MWR211 s MAC address copying the MAC...

Page 117: ... connection uses a broadband 3G connection via USB adapter provided by a mobile broadband ISP This allows for mobile connection to the internet within the 3G coverage of your selected mobile provider This screen displays when you select the Mobile WAN tab ...

Page 118: ...MWR211 User s Guide 118 Figure 75 Network WAN Mobile WAN ...

Page 119: ...MWR211 User s Guide 119 ...

Page 120: ... to make sure that you have entered is correctly Access Point Name APN Type the name of the access point provided to you by the mobile broadband provider not all ISP needs this Phone Number Type the phone number provided by your mobile broadband provider The default phone number is 777 for CDMA carriers such as Sprint or Verizon If the phone number is left as blank MWR211 will implicitly use 777 t...

Page 121: ...still have 40Mb left from the total 100Mb This will allow you to be notified when close to your Data Usage Limit and not when it has been fully emptied Tear Down Connection when over Limit Select this option to automatically disconnect your mobile broadband connection when you reach your Data Usage limit Failover Configuration Enable Fallback Select this option to have the MWR211 return to wired W...

Page 122: ...the read only DNS server IP address that the ISP assigns Select User Defined if you have the IP address of a DNS server Enter the DNS server s IP address in the field to the right If you chose User Defined but leave the IP address set to 0 0 0 0 User Defined changes to None after you click Apply If you set a second choice to User Defined and enter the same IP address the second User Defined change...

Page 123: ...his screen are independent of each other To change your MWR211 s advanced WAN settings click Network WAN Advanced The screen appears as shown Figure 76 Network WAN Advanced The following table describes the labels in this screen Table 47 Network WAN Advanced LABEL DESCRIPTION Multicast Setup Multicast Select IGMPv1 v2 to enable multicasting This applies to traffic routed from the WAN to the LAN Se...

Page 124: ...le IGMP snooping if you have LAN users that subscribe to multicast services IGMP Internet Group Multicast Protocol is a network layer protocol used to establish membership in a multicast group it is not used to carry user data Click Network WAN IGMP Snooping The screen appears as shown Figure 77 Network WAN IGMP Snooping The following table describes the labels in this screen Table 48 Network WAN ...

Page 125: ...MWR211 User s Guide 125 Reset Click Reset to begin configuring this screen afresh ...

Page 126: ...ge IP addresses and partition your physical network into logical networks Figure 78 LAN Example implies wired WAN connection The LAN screens can help you manage IP addresses 11 2 What You Can Do Use the IP screen to change the IP address for your MWR211 Use the IP Alias screen to have the MWR211 apply IP alias to create LAN subnets 11 3 What You Need To Know The actual physical connection determin...

Page 127: ...sses starting from 192 168 10 33 to 192 168 10 64 This configuration leaves 31 IP addresses excluding the MWR211 itself in the lower range 192 168 10 2 to 192 168 10 32 for other server computers for instance servers for mail FTP TFTP web etc that you may have 11 3 2 LAN TCP IP The MWR211 has built in DHCP server capability that assigns IP addresses and DNS servers to systems that support DHCP cli...

Page 128: ...ifies the network number portion of an IP address Your MWR211 will automatically calculate the subnet mask based on the IP address that you assign Unless you are implementing subnetting use the subnet mask computed by the MWR211 Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to begin configuring this screen afresh 11 5 IP Alias Screen Use this screen to have the MWR211...

Page 129: ...address of your MWR211 in dotted decimal notation IP Subnet Mask The subnet mask specifies the network number portion of an IP address Your MWR211 will automatically calculate the subnet mask based on the IP address that you assign Unless you are implementing subnetting use the subnet mask computed by the MWR211 Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to begin c...

Page 130: ...es the TCP IP configuration for the clients If DHCP service is disabled you must have another DHCP server on your LAN or else the computer must be manually configured 12 2 What You Can Do Use the General screen to enable the DHCP server Use the Advanced screen to assign IP addresses on the LAN to specific individual computers based on their MAC Addresses 12 3 General Screen Use this screen to enab...

Page 131: ...ies the size or count of the IP address pool for LAN Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to begin configuring this screen afresh 12 4 Advanced Screen This screen allows you to assign IP addresses on the LAN to specific individual computers based on their MAC addresses You can also use this screen to configure the DNS server information that the MWR211 sends ...

Page 132: ... Address Type the LAN IP address of a computer on your LAN DNS Server DNS Servers Assigned by DHCP Server The MWR211 passes a DNS Domain Name System server IP address in the order you specify here to the DHCP clients The MWR211 only passes this information to the LAN DHCP clients when you select the Enable DHCP Server check box When you clear the Enable DHCP Server check box DHCP service is disabl...

Page 133: ...ave the MWR211 act as a DNS proxy The MWR211 s LAN IP address displays in the field to the right read only The MWR211 tells the DHCP clients on the LAN that the MWR211 itself is the DNS server When a computer on the LAN sends a DNS query to the MWR211 the MWR211 forwards the query to the MWR211 s system DNS server configured in the WAN Internet Connection screen and relays the response back to the...

Page 134: ...tion address For outgoing packets NAT maps private local IP addresses to globally unique ones required for communication with hosts on other networks It replaces the original IP source address in each packet and then forwards it to the Internet The MWR211 keeps track of the original addresses and port numbers so incoming reply packets can have their original values restored The following figure il...

Page 135: ...ick Network NAT General to open the following screen Figure 85 Network NAT General The following table describes the labels in this screen Table 53 Network NAT General LABEL DESCRIPTION NAT Setup Enable Network Address Translation Network Address Translation NAT allows the translation of an Internet protocol address used within one network for example a private IP address used in a local network t...

Page 136: ...one service for example both FTP and web service it might be better to specify a range of port numbers In addition to the servers for specified services NAT supports a default server A service request that does not have a server explicitly designated for it is forwarded to the default server If the default is not defined the service request is simply discarded Note Many residential broadband ISP a...

Page 137: ...side server without having to delete the entry Service Name Type a name of up to 31 printable characters to identify this rule in the first field next to Service Name Otherwise select a predefined service in the second field next to Service Name The predefined service name and port number s will display in the Service Name and Port fields Port Type a port number s to define the service to be forwa...

Page 138: ...it icon to display and modify an existing rule setting in the fields under Add Application Rule Click the Remove icon to delete a rule Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to begin configuring this screen afresh 13 5 NAT Advanced Screen Some services use a dedicated range of ports on the client side and a dedicated range of ports on the server side With regul...

Page 139: ...e traffic to the LAN IP address of the computer that sent the request After that computer s connection for that service closes another computer on the LAN can use the service in the same manner This way you do not need to configure a new IP address each time you want a different LAN computer to use the application To change your MWR211 s trigger port settings click Network NAT Advanced The screen ...

Page 140: ...rt number or the ending port number in a range of port numbers Trigger The trigger port is a port or a range of ports that causes or triggers the MWR211 to record the IP address of the LAN computer that sent the traffic to a server on the WAN Start Port Type a port number or the starting port number in a range of port numbers End Port Type a port number or the ending port number in a range of port...

Page 141: ...170 4 The MWR211 forwards the traffic to Jane s computer IP address 5 Only Jane can connect to the Real Audio server until the connection is closed or times out The MWR211 times out in three minutes with UDP User Datagram Protocol or two hours with TCP IP Transfer Control Protocol Internet Protocol 13 5 2 Two Points To Remember About Trigger Ports 1 Trigger events only happen on data that is going...

Page 142: ...ss with one or many dynamic DNS services so that anyone can contact you in NetMeeting CU SeeMe etc You can also access your FTP server or Web site on your own computer using a domain name for instance myhost dhs org where myhost is a name of your choice that will never change instead of using an IP address that changes each time you reconnect Your friends or relatives will always be able to call y...

Page 143: ...ynamic DNS Service Provider Select the name of your Dynamic DNS service provider Host Name Enter a host names in the field provided You can specify up to two host names in the field separated by a comma User Name Enter your user name Password Enter the password assigned to you Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to begin configuring this screen afresh ...

Page 144: ...S services enable consumers and network administrators to secure their networks from online threats reduce costs and enforce Internet use policies OpenDNS is used today by millions of users and organizations around the world http www opendns com 15 2 What you can do OpenDNS integration in the MWR211 allows you do easily link your OpenDNS account with the MWR211 user also need to configure WAN DNS ...

Page 145: ...count Configure Personalized Setting Use the Click here to OpenDNS link to open http www opendns com Enable OpenDNS Select this check box to use OpenDNS after configuring an account on http www opendns com Host Name Type the Host Name provided by OpenDNS User Name Type the User Name you created with OpenDNS Password Type the Password tied to the User Name created with OpenDNS ...

Page 146: ... following figure through remote node Router 1 However the MWR211 is unable to route a packet to network N3 because it doesn t know that there is a route through the same remote node Router 1 via gateway Router 2 The static routes are for you to tell the MWR211 about the networks beyond the remote nodes Figure 91 Example of Static Routing Topology 16 2 What You Can Do Use the IP Static Route scree...

Page 147: ...ame Enter the name that describes or identifies this route Destination IP Address Enter the IP network address of the final destination IP Subnet Netmask This is the subnet to which the route s final destination belongs Gateway IP Address Enter the IP address of the gateway Metric Assign a number to identify the route Add Rule Click this to add the IP static route Application Rules Summary ...

Page 148: ...ress of the final destination Routing is always based on network number Gateway This is the IP address of the gateway The gateway is a router or switch on the same network segment as the device s LAN or WAN port The gateway helps forward packets to their destinations Metric This is the number assigned to the route Delete Click the Delete icon to remove a static route from the MWR211 A window displ...

Page 149: ... Internet and is common in the NetWare environment as a method for exchanging routing information between routers 17 2 What You Can Do Use the RIP screen to enable RIPv1 or RIPv2 which are LAN broadcast protocols 17 3 RIP Screen Use this screen to enable RIPv1 or RIPv2 which are LAN broadcast protocols Click Network RIP The screen appears as shown Figure 93 Network RIP The following table describe...

Page 150: ...e 59 Network RIP LABEL DESCRIPTION RIP Select the RIPv1 or RIPv2 you want the MWR211 to use Otherwise select None Apply Click Apply to save your changes back to the MWR211 Reset Click Reset to begin configuring this screen afresh ...

Page 151: ...MWR211 User s Guide 151 Part III Part III Security Firewall Content Filter ...

Page 152: ...the firewall Allows traffic that originates from your LAN computers to go to all of the networks Blocks traffic that originates on the other networks from going to the LAN The following figure illustrates the default firewall action User A can initiate an IM Instant Messaging session from the LAN to the WAN 1 Return traffic for this session is also allowed 2 However other traffic initiated from th...

Page 153: ...1 is installed between the LAN and a broadband modem connecting to the Internet This allows it to act as a secure gateway for all data passing between the Internet and the LAN The MWR211 has one Ethernet WAN port and four Ethernet LAN ports which are used to physically separate the network into two areas The WAN Wide Area Network port attaches to the broadband cable or DSL modem to the Internet Th...

Page 154: ...rvices Screen If an outside user attempts to probe an unsupported port on your MWR211 an ICMP response packet is automatically returned This allows the outside user to know the MWR211 exists Use this screen to prevent the ICMP response packet from being sent This keeps outsiders from discovering your MWR211 when unsupported ports are probed You can also use this screen to enable service blocking e...

Page 155: ...e control and error reporting protocol between a host server and a gateway to the Internet ICMP uses Internet Protocol IP datagrams but the messages are processed by the TCP IP software and directly apparent to the application user Respond to Ping on The MWR211 will not respond to any incoming Ping requests when Disable is selected Select WAN to reply to incoming WAN Ping requests Apply Click Appl...

Page 156: ...the IP address of the computer that initializes traffic for the application or service The MWR211 applies the firewall rule to traffic initiating from this computer Protocol Select the protocol TCP UDP ICMP or None used to transport the packets for which you want to apply the firewall rule Dest Port Range Enter the port number range of the destination that define the traffic type for example TCP p...

Page 157: ...r None used to transport the packets for which you want to apply the firewall rule Dest Port Range This is the port number range of the destination that define the traffic type for example TCP port 80 defines web traffic Source Port Range This is the port number range of the source that define the traffic type for example TCP port 80 defines web traffic Action Drop Traffic matching the conditions ...

Page 158: ...ed computer 19 3 What You Need To Know Content filtering allows you to block certain web features such as cookies and or block access to specific web sites For example you can configure one policy that blocks John Doe s access to arts and entertainment web pages 19 3 1 Content Filtering Profiles A content filtering profile conveniently stores your custom settings for the following features Restric...

Page 159: ...the URL s domain name or IP address and file path separately it will not find items that go across the two For example with the URL http us zyxel com Corporate Pressroom the MWR211 would find tw in the domain name www us zyxel com It would also find news in the file path Corporate Pressroom but it would not find com Corporate 19 4 Content Filter Screen Use this screen to restrict web features add ...

Page 160: ...d development environment for building downloadable Web components or Internet and intranet business applications of all kinds Cookies Used by Web servers to track usage and provide service based on ID Web Proxy A server that acts as an intermediary between a user and the Internet to provide security administrative control and caching service When a proxy server is located on the WAN it is possibl...

Page 161: ... keyword you will get a message telling you that the content filter is blocking this request Delete Highlight a keyword in the lower box and click Delete to remove it The keyword disappears from the text box after you click Apply Clear All Click this button to remove all of the listed keywords Apply Click Apply to save your changes Reset Click Reset to begin configuring this screen afresh ...

Page 162: ...MWR211 User s Guide 162 Part IV Part IV Management Bandwidth Management Remote Management Universal Plug and Play UPnP ...

Page 163: ...ice A to the WAN device B Bandwidth management is applied before sending the packets out to the WAN Downlink traffic comes back from the WAN device B to the LAN device A Bandwidth management is applied before sending the traffic out to LAN Figure 98 Bandwidth Management Example You can allocate specific amounts of bandwidth capacity bandwidth budgets to individual applications like VoIP Web FTP an...

Page 164: ... than or equal to the Upstream Bandwidth that you configure in the Bandwidth Management Advanced screen The sum of the bandwidth allotments that apply to the LAN interface WAN to LAN WAN to WLAN must be less than or equal to the Downstream Bandwidth that you configure in the Bandwidth Management Advanced screen 20 4 General Screen Use this screen to have the MWR211 apply bandwidth management Click...

Page 165: ...le Apply Click Apply to save your customized settings Reset Click Reset to begin configuring this screen afresh 20 5 Advanced Screen Use this screen to configure bandwidth management rules for the pre defined services or applications You can also use this screen to configure bandwidth management rule for other services or applications that are not on the pre defined list of MWR211 Additionally you...

Page 166: ...ed LABEL DESCRIPTION Management Bandwidth Upstream Bandwidth Select the total amount of bandwidth from 64 Kilobits to 32 Megabits that you want to dedicate to uplink traffic This is traffic from LAN WLAN to WAN Downstream Bandwidth Select the total amount of bandwidth from 64 Kilobits to 32 Megabits that you want to dedicate to uplink traffic This is traffic from WAN to LAN WLAN ...

Page 167: ...is is the category where a service belongs Service This is the name of the service Select the check box to have the MWR211 apply this bandwidth management rule Advanced Setting Click the Edit icon to open the Rule Configuration screen where you can modify the rule User defined Service Use this table to allocate specific amounts of bandwidth to specific applications or services you specify This is ...

Page 168: ...n the Application List table of the Advanced screen The following screen displays Figure 101 Bandwidth Management Rule Configuration Application List The following table describes the labels in this screen Table 65 Bandwidth Management Rule Configuration Application List LABEL DESCRIPTION This is the number of an individual bandwidth management rule Enable Select an interface s check box to enable...

Page 169: ...CP port 80 defines web traffic See Appendix E for some common services and port numbers Protocol This is the protocol TCP UDP or user defined used for the service Apply Click Apply to save your customized settings Cancel Click Cancel to exit this screen without saving 20 5 2 Rule Configuration User Defined Service Rule Configuration If you want to edit a bandwidth management rule for other applica...

Page 170: ...P port 80 defines web traffic Source Address Enter the IP address of the computer that initializes traffic for the application or service The MWR211 applies bandwidth management to traffic initiating from this computer Source Subnet Netmask Enter the subnet netmask of the computer initiating the traffic for which the bandwidth management rule applies Source Port This is the port number of the sour...

Page 171: ...agement in the Management Bandwidth Management Advanced screen Table 67 Media Bandwidth Management Setup Services SERVICE DESCRIPTION FTP File Transfer Program enables fast transfer of files including large files that may not be possible by e mail WWW The World Wide Web WWW is an Internet system to distribute graphical hyper linked information based on Hyper Text Transfer Protocol HTTP a client se...

Page 172: ...s transported primarily over UDP but can also be transported over TCP BitTorrent BitTorrent is a free P2P peer to peer sharing tool allowing you to distribute large software and media files BitTorrent requires you to search for a file with a search engine yourself The client downloads the file in small pieces and shares the pieces with other peers to get the other pieces of the file Gaming Online ...

Page 173: ...client that can manage the MWR211 Use the SNMP Simple Network Management Protocol screen Section 22 5 to enable SNMP v1 management for the MWR211 21 3 What You Need to Know Remote management over LAN or WAN will not work when 1 The IP address in the Secured Client IP Address field WWW does not match the client IP address If it does not match the MWR211 will disconnect the session immediately 2 The...

Page 174: ...od in the System screen 21 4 WWW Screen To change your MWR211 s remote management settings click Management Remote Management WWW Figure 104 Management Remote Management WWW The following table describes the labels in this screen Table 68 Management Remote Management WWW LABEL DESCRIPTION Server Port You may change the server port number for a service if needed however you must use the same port n...

Page 175: ...and exit this screen Reset Click Reset to begin configuring this screen afresh 21 5 SNMP Screen To configure your MWR211 s SNMP settings click Management Remote Management SNMP Figure 105 Management Remote Management SNMP The following table describes the labels in this screen ...

Page 176: ...t the SNMP Version used by your management utility Currently MWR211 only supports v1 Get Set Community Enter the Community name used by your SNMP devices and programs Devices not in the same Community will not be able to communicate with each other Apply Click Apply to save your customized settings and exit this screen Reset Click Reset to begin configuring this screen afresh ...

Page 177: ...What You Can Do Use the UPnP screen to enable UPnP on your MWR211 22 3 What You Need to Know UPnP hardware is identified as an icon in the Network Connections folder Windows XP Each UPnP compatible device installed on your network will appear as a separate icon Selecting the icon of a UPnP device will allow you to access the information and properties of that device 22 3 1 NAT Traversal UPnP NAT t...

Page 178: ...figuration may also be obtained and modified by users in some network environments When a UPnP device joins a network it announces its presence with a multicast message For security reasons the MWR211 allows multicast messages on the LAN only All UPnP enabled devices may communicate freely with each other without additional configuration Disable UPnP if this is not your intention 22 4 UPnP Screen ...

Page 179: ...turn to the previously saved settings 22 5 Technical Reference The sections show examples of using UPnP 22 5 1 Using UPnP in Windows XP Example This section shows you how to use the UPnP feature in Windows XP You must already have UPnP installed in Windows XP and UPnP activated on the MWR211 Make sure the computer is connected to a LAN port of the MWR211 Turn on your computer and the MWR211 22 5 1...

Page 180: ...ions 3 In the Internet Connection Properties window click Settings to see the port mappings there were automatically created Figure 108 Internet Connection Properties 4 You may edit or delete the port mappings or click Add to manually add port mappings ...

Page 181: ...ngs Add Note When the UPnP enabled device is disconnected from your computer all port mappings will be deleted automatically 5 Select Show icon in notification area when connected option and click OK An icon displays in the system tray Figure 111 System Tray Icon 6 Double click on the icon to display your current Internet connection status ...

Page 182: ...eb based configurator on the MWR211 without finding out the IP address of the MWR211 first This comes helpful if you do not know the IP address of the MWR211 Follow the steps below to access the web configurator 1 Click Start and then Control Panel 2 Double click Network Connections 3 Select My Network Places under Other Places ...

Page 183: ...e displays under Local Network 5 Right click on the icon for your MWR211 and select Invoke The web configurator login screen displays Figure 114 Network Connections My Network Places 6 Right click on the icon for your MWR211 and select Properties A properties window displays with basic information about the MWR211 ...

Page 184: ...MWR211 User s Guide 184 Figure 115 Network Connections My Network Places Properties Example ...

Page 185: ...MWR211 User s Guide 185 Part V Maintenance and Troubleshooting Maintenance Password Time Firmware Upgrade Backup Restore Reset Restart Sys OP Mode Alert Troubleshooting ...

Page 186: ... a name to identify the MWR211 in the network and set the password Use the Time Setting screen to change your MWR211 s time and date 23 3 General Screen Use this screen to enter a name to identify the MWR211 in the network and set the password Click Maintenance General The following screen displays Figure 116 Maintenance General The following table describes the labels in this screen ...

Page 187: ...y Timer Type how many minutes a management session can be left idle before the session times out The default is 5 minutes After it times out you have to log in with your password again Very long idle timeouts may have security risks A value of 0 means a management session never times out no matter how long it has been left idle not recommended Apply Click Apply to save your changes back to the MWR...

Page 188: ...h as cookies active X and so on Some categories such as System Errors consist of both logs and alerts You may differentiate them by their color in the View Log screen Alerts display in red and logs display in black Alerts are e mailed as soon as they happen Logs may be e mailed as soon as the log is full see Log Schedule Selecting many alert and or log categories especially Access Control may resu...

Page 189: ...fields as shown Old Password Type the default password or the existing password you use to access the system in this field New Password Type your new system password up to 30 characters Note that as you type a password the screen displays an asterisk for each character you type Retype to Confirm Type the new password again in this field Apply Click Apply to save your changes back to the MWR211 Res...

Page 190: ...and time 25 2 What You Can Do Use the Time Setting screen to change your MWR211 s time and date 25 3 Time Setting Screen Use this screen to configure the MWR211 s time based on your local time zone To change your MWR211 s time and date click Maintenance System Time Setting The screen appears as shown Figure 118 Maintenance Time The following table describes the labels in this screen ...

Page 191: ...ime from the time server or the last time configured manually When you set Time and Date Setup to Manual enter the new time in this field and then click Apply New Date yyyy mm dd This field displays the last updated date from the time server or the last date configured manually When you set Time and Date Setup to Manual enter the new date in this field and then click Apply Get from Time Server Sel...

Page 192: ...same moment 1 A M GMT or UTC So in the European Union you would select Last Sunday March The time you type in the o clock field depends on your time zone In Germany for instance you would type 2 because Germany s time zone is one hour ahead of GMT or UTC GMT 1 End Date Configure the day and time when Daylight Saving Time ends if you selected Daylight Savings The o clock field uses the 24 hour form...

Page 193: ...our MWR211 26 3 Firmware Upload Screen Find firmware at http us zyxel com Support Download Library aspx The upload process uses HTTP Hypertext Transfer Protocol and may take up to two minutes After a successful upload the system will reboot Click Maintenance Firmware Upgrade Follow the instructions in this screen to upload firmware to your MWR211 Figure 119 Maintenance Firmware Upgrade The followi...

Page 194: ...ake up to two minutes Note Do not turn off the MWR211 while firmware upload is in progress After you see the Firmware Upload In Process screen wait two minutes before logging into the MWR211 again The MWR211 automatically restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop Figure 120 Network Temporarily Disconnected ...

Page 195: ...iguration file will be useful in case you need to return to your previous settings Restore configuration allows you to upload a new or previously saved configuration file from your computer to your MWR211 Reset configuration allows you to restore the configuration to factory default 27 2 What You Can Do Use the Backup Restore Reset screen to view information related to factory defaults backup conf...

Page 196: ... it Browse Click Browse to find the file you want to upload Remember that you must decompress compressed ZIP files before you can upload them Upload Click Upload to begin the upload process Note Do not turn off the MWR211 while configuration file upload is in progress After you see a configuration upload successful screen you must then wait one minute before logging into the MWR211 again The MWR21...

Page 197: ...rear panel to reset the factory defaults of your MWR211 Refer to the chapter about introducing the Web Configurator for more information on the RESET button Note If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default MWR211 IP address 192 168 10 1 See Appendix C for details on how to set up your computer...

Page 198: ...rt screen to boot the MWR211 without turning the power off 28 3 Restart Screen System restart allows you to reboot the MWR211 without turning the power off Click Maintenance Restart to open the following screen Figure 122 Maintenance Reset Restart Click Restart to have the MWR211 reboot This does not affect the MWR211 s configuration ...

Page 199: ...topology and the features you require from your device See Section 5 1 2 for more information on which mode to choose 29 2 What You Can Do Use the Sys OP Mode screen Sys Op Mode Screen to select how you want to use your MWR211 29 3 What You Need to Know The following describes the device modes available in your MWR211 Router A router connects your local network with another network such as the Int...

Page 200: ... to be bridged together and be in the same subnet To connect to the Internet another device such as a router is required Figure 124 IP Address in Access Point Mode WISP A WISP client connects to an existing access point wirelessly It acts just like a wireless client in notebooks computers Figure 125 IP Address in Access Point Mode ...

Page 201: ... mode offers services such as a firewall or bandwidth management You can configure the IP address settings on your WAN port Contact your ISP or system administrator for more information on appropriate settings Access Point Select Access Point Mode if your device bridges traffic between clients on the same network In Access Point mode all Ethernet ports have the same IP address All ports on the rea...

Page 202: ...PS and scheduling in the WISP mode The IP address of the device on the local network is the same as the IP address given to the MWR211 while in router mode default is 192 168 10 1 Apply Click Apply to save your settings Reset Click Reset to return your settings to the default Router Note If you select the incorrect System Operation Mode you may not be able to connect to the Internet ...

Page 203: ...lert to the users if the Email Alert is enabled and or post a log to the system All the subsequent alerts will indicate the percentage of the current quota usage in the email and or log as well See Section 5 1 2 for more information on which mode to choose 30 2 What You Can Do Use the Alert screen to select how you want your MWR211 to contact you with alerts 30 3 Alert Screen Use this screen to se...

Page 204: ... functions of the MWR211 Enable Log Select Enable Log to send system log information in the alert Enable Email Select Enable Email to allow alert information to be sent by email Email Address Type the Email Address you want the alerts sent to Username Type the Username required by your SMTP Server Password Type the password associated with the Username above SMTP Server Type the address of your SM...

Page 205: ...nable Secondary Email Recipient Select Enable Secondary Email Recipient to set up a second email address to send alerts to Apply Click Apply to save your settings Reset Click Reset to return your settings to the default Router ...

Page 206: ...nections and LEDs The MWR211 does not turn on None of the LEDs turn on 1 Make sure you are using the power adaptor or cord included with the MWR211 2 Make sure the power adaptor or cord is connected to the MWR211 and plugged in to an appropriate power source Make sure the power source is turned on 3 Disconnect and re connect the power adaptor or cord to the MWR211 4 If the problem continues contac...

Page 207: ...in see the Quick Start Guide for instructions and go to the Device Information table in the Status screen Your MWR211 s IP address is available in the Device Information table If the DHCP setting under LAN information is None your device has a fixed IP address If the DHCP setting under LAN information is Client then your device receives an IP address from a DHCP server on the network 3 If your MWR...

Page 208: ...a DHCP server on your network make sure your computer is using a dynamic IP address See Section 14 3 If there is no DHCP server on your network make sure your computer s IP address is in the same subnet as the MWR211 See Appendix B 5 Reset the device to its factory defaults and try to access the MWR211 with the default IP address See Section 28 3 6 If the problem continues contact the network admi...

Page 209: ...Check your System Operation Mode setting Select Router if your device routes traffic between a local network and another network such as the Internet Select Access Point if your device bridges traffic between clients on the same network 6 If the problem continues contact your ISP I cannot access the Internet though mobile WAN 1 Make sure your 3G adapter is activated account is valid with your Inte...

Page 210: ... one of the advanced suggestions Advanced Suggestions Check the settings for bandwidth management If it is disabled you might consider activating it If it is enabled you might consider changing the allocations Check the settings for QoS If it is disabled you might consider activating it If it is enabled you might consider raising or lowering the priority for some applications 31 4 Resetting MWR211...

Page 211: ... range of the MWR211 5 Check that both the MWR211 and your wireless station are using the same wireless and wireless security settings 6 Make sure traffic between the WLAN and the LAN is not blocked by the firewall on the MWR211 7 Make sure you allow the MWR211 to be remotely accessed through the WLAN interface Check your remote management settings See the chapter on Wireless LAN in the User s Gui...

Page 212: ...ur account has access rights to the folder you are trying to open I can access the Web Configurator after I switched to AP mode When you change from router mode to AP mode your computer must have an IP address in the range between 192 168 10 3 and 192 168 10 254 Refer to Appendix C for instructions on how to change your computer s IP address The following tables summarize the MWR211 s hardware and...

Page 213: ...button is built into the rear panel Use this button to restore the MWR211 to its factory default settings Press for 1 second to restart the device Press for 5 seconds to restore to factory default settings WPS button Press the WPS on two WPS enabled devices within 120 seconds for a security enabled wireless connection Wireless Switch Turn on or turn off the wireless function of the MWR211 using th...

Page 214: ...lows IEEE 802 11b and or IEEE 802 11g wireless clients to connect to the MWR211 wirelessly Enable wireless security WPA 2 PSK and or MAC filtering to protect your wireless network Note The MWR211 may be prone to RF Radio Frequency interference from other 2 4 GHz devices such as microwave ovens wireless phones Bluetooth enabled devices and other wireless LANs Firmware Upgrade Download new firmware ...

Page 215: ...llows your MWR211 to check web sites against an external database Bandwidth Management You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and or to particular computers Remote Management This allows you to decide whether a service HTTP or FTP traffic for example from a computer on a network LAN or WAN for example can access the...

Page 216: ...RFC 2236 Logging Use logs for troubleshooting You can view logs in the Web Configurator PPPoE PPPoE mimics a dial up Internet access connection PPTP Encapsulation Point to Point Tunneling Protocol PPTP enables secure transfer of data through a Virtual Private Network VPN The MWR211 supports one PPTP connection at a time Universal Plug and Play UPnP The MWR211 can communicate with other UPnP enable...

Page 217: ...ttery LAN WAN WLAN WPS USB Reset Button The reset button is built into the rear panel Use this button to restore the MWR211 to its factory default settings Press for 1 second to restart the device Press for 5 seconds to restore to factory default settings WPS button Press the WPS on two WPS enabled devices within 120 seconds for a security enabled wireless connection Wireless Switch Turn on or tur...

Page 218: ...lows IEEE 802 11b and or IEEE 802 11g wireless clients to connect to the MWR211 wirelessly Enable wireless security WPA 2 PSK and or MAC filtering to protect your wireless network Note The MWR211 may be prone to RF Radio Frequency interference from other 2 4 GHz devices such as microwave ovens wireless phones Bluetooth enabled devices and other wireless LANs Firmware Upgrade Download new firmware ...

Page 219: ...llows your MWR211 to check web sites against an external database Bandwidth Management You can efficiently manage traffic on your network by reserving bandwidth and giving priority to certain types of traffic and or to particular computers Remote Management This allows you to decide whether a service HTTP or FTP traffic for example from a computer on a network LAN or WAN for example can access the...

Page 220: ...RFC 2236 Logging Use logs for troubleshooting You can view logs in the Web Configurator PPPoE PPPoE mimics a dial up Internet access connection PPTP Encapsulation Point to Point Tunneling Protocol PPTP enables secure transfer of data through a Virtual Private Network VPN The MWR211 supports one PPTP connection at a time Universal Plug and Play UPnP The MWR211 can communicate with other UPnP enable...

Page 221: ... User s Guide 221 Part VI Appendices and Index Pop up Windows JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer s IP Address Wireless LANs Common Services Legal Information ...

Page 222: ...nternet Explorer 6 screens are used here Screens for other Internet Explorer versions may vary Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking and create an exception for your device s IP address Disable pop up Blockers 1 In Internet Explorer ...

Page 223: ...ar the Block pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled Figure 131 Internet Options Privacy 3 Click Apply to save this setting Enable pop up Blockers with Exceptions Alternatively if you only want to allow pop up windows from your device see the following steps 1 In Internet Explorer select Tools Internet Options and the...

Page 224: ...Blocker Settings screen Figure 132 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 4 Click Add to move the IP address to the list of Allowed sites ...

Page 225: ...se to return to the Privacy screen 6 Click Apply to save this setting JavaScripts If pages of the Web Configurator do not display properly in Internet Explorer check that JavaScripts are allowed 1 In Internet Explorer click Tools Internet Options and then the Security tab ...

Page 226: ...s Security 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enable is selected the default 5 Under Scripting of Java applets make sure that Enable is selected the default 6 Click OK to close the window ...

Page 227: ...ipting Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 Under Java permissions make sure that a safety level is selected 5 Click OK to close the window ...

Page 228: ...28 Figure 136 Security Settings Java JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected 3 Click OK to close the window ...

Page 229: ...MWR211 User s Guide 229 Figure 137 Java Sun ...

Page 230: ...are a common street name the hosts on a network share a common network number Similarly as each house has its own house number each host on the network has its own unique identifying number the host ID Routers use the network number to send packets to the correct network while the host ID determines to which host on the network the packets are delivered Structure An IP address is made up of four p...

Page 231: ... bits are part of the host ID using a logical AND operation The term subnet is short for sub network A subnet mask has 32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is part of the host ID The following example shows a subnet mask identifying the netw...

Page 232: ...tal number of 32 bits Subnet masks can be referred to by the size of the network number part the bits with a 1 value For example an 8 bit mask means that the first 8 bits of the mask are ones and the remaining 24 bits are zeroes Subnet masks are expressed in dotted decimal notation just like IP addresses The following examples show the binary and decimal notation for 8 bit 16 bit 24 bit and 29 bit...

Page 233: ...t address for that network 192 168 1 255 with a 24 bit subnet mask for example As these two IP addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows Table 82 Maximum Host Numbers SUBNET MASK HOST ID SIZE MAXIMUM NUMBER OF HOSTS 8 bits 255 0 0 0 24 bits 224 2 16777214 16 bits 255 255 0 0 16 bits 216 2 65534 24 bits 255 255 255 0 8 bits ...

Page 234: ... 28 25 1000 0000 128 255 255 255 1 92 26 1100 0000 192 255 255 255 2 24 27 1110 0000 224 255 255 255 2 40 28 1111 0000 240 255 255 255 2 48 29 1111 1000 248 255 255 255 2 52 30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub networks In the following example a network administrator creates two sub networks to isolate a group of servers from the rest of the c...

Page 235: ...divide the network 192 168 1 0 into two separate sub networks The subnet mask is now 25 bits 255 255 255 128 or 25 The borrowed host ID bit can have a value of either 0 or 1 allowing two subnets 192 168 1 0 25 and 192 168 1 128 25 The following figure shows the company network after subnetting There are now two sub networks A and B Figure 140 Subnetting Example After Subnetting ...

Page 236: ...A is 192 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask to divide a 24 bit address into two subnets Similarly to divide a 24 bit address into four subnets you need to borrow two host ID bits to give four possible combinations 00 01 10 and 11 The subn...

Page 237: ... Subnet Address 192 168 1 0 Lowest Host ID 192 168 1 1 Broadcast Address 192 168 1 63 Highest Host ID 192 168 1 62 Table 85 Subnet 2 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 64 IP Address Binary 11000000 10101000 00000001 01000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 64 Lowest Host ID 192 168 1 65 Broadcast Address 192 168 1...

Page 238: ...Address 192 168 1 128 Lowest Host ID 192 168 1 129 Broadcast Address 192 168 1 191 Highest Host ID 192 168 1 190 Table 87 Subnet 4 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 192 IP Address Binary 11000000 10101000 00000001 11000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 192 Lowest Host ID 192 168 1 193 Broadcast Address 192 168 ...

Page 239: ...SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 Subnet Planning The following table is a summary for subnet planning on a network with a 24 bit network number Table 89 24 bit Network Number Subnet Planning NO BORROWED HOST BITS SUBNET MASK NO SUBNETS NO HOSTS ...

Page 240: ...for subnet planning on a network with a 16 bit network number Table 90 16 bit Network Number Subnet Planning NO BORROWED HOST BITS SUBNET MASK NO SUBNETS NO HOSTS PER SUBNET 1 255 255 128 0 17 2 32766 2 255 255 192 0 18 4 16382 3 255 255 224 0 19 8 8190 4 255 255 240 0 20 16 4094 5 255 255 248 0 21 32 2046 6 255 255 252 0 22 64 1022 7 255 255 254 0 23 128 510 8 255 255 255 0 24 256 254 9 255 255 2...

Page 241: ...he Internet Assigned Number Authority IANA reserved this block of addresses specifically for private use please do not use any other number unless you are told otherwise You must also enable Network Address Translation NAT on the MWR211 Once you have decided on the network number pick an IP address for your MWR211 that is easy to remember for instance 192 168 10 1 but make sure that no other devic...

Page 242: ...ll organization and your Internet access is through an ISP the ISP can provide you with the Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Regardless of your particular situation do not create an arbitrary IP address always follow the guidelines above For more ...

Page 243: ...e of a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components are installed configure the TCP IP settings in order to communicate with your network If you manually assign IP information instead of using dynamic assignment make sure that your computers have IP ...

Page 244: ...crosoft Networks If you need the adapter 1 In the Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you need TCP IP 1 In the Network window click Add 2 Select Protocol and then click Add 3 Select Microsoft from the list of manufacturers 4 Select TCP IP from the list of network protocols and then click OK If...

Page 245: ...ter s TCP IP entry and click Properties 2 Click the IP Address tab If your IP address is dynamic select Obtain an IP address automatically If you have a static IP address select Specify an IP address and type your information into the IP Address and Subnet Mask fields Figure 142 Windows 95 98 Me TCP IP Properties IP Address 3 Click the DNS Configuration tab If you do not know your DNS information ...

Page 246: ...nd close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Turn on your router and restart your computer when prompted Verifying Settings 1 Click Start and then Run 2 In the Run window type winipcfg and then click OK to open the IP Configuration window 3 Select your network adapter You should see your computer s IP address subnet mask and defau...

Page 247: ...T Settings Control Panel Figure 144 Windows XP Start Menu 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 145 Windows XP Control Panel 3 Right click Local Area Connection and then click Properties ...

Page 248: ...n click Properties Figure 147 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP If you have a dynamic IP address click Obtain an IP address automatically If you have a static IP address click Use the following IP Address and fill in the IP address Subnet mask and Default gateway fields ...

Page 249: ...s type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to add Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways In TCP IP Gateway Address type the IP address of the default gateway in Gateway To manually configure a default metric the number of transmission hops cl...

Page 250: ...XP Click Obtain DNS server address automatically if you do not know your DNS server IP address es If you know your DNS server IP address es click Use the following DNS server addresses and type them in the Preferred DNS server and Alternate DNS server fields If you have previously configured DNS servers click Advanced and then the DNS tab to order them ...

Page 251: ...onnections window Network and Dial up Connections in Windows 2000 NT 11 Turn on your router and restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and then Command Prompt 2 In the Command Prompt window type ipconfig and then press ENTER You can also open Network Connections right click a network connection click Status and then click the Support tab Windows...

Page 252: ...MWR211 User s Guide 252 Figure 151 Windows 7 Vista 3 Click on Network and Internet Figure 152 Windows 7 Vista 4 Click on Network and Sharing Center ...

Page 253: ... the left side of the screen click on Change Adapter Settings Windows 7 or Manage Network Connections Vista 6 Right click on Local Area Connection and select Properties Figure 154 Windows 7 Vista 7 Highlight Internet Protocol Version 4 and click Properties ...

Page 254: ...llowing IP Address and enter your IP address Subnet Mask and Default Gateway Enter your DNS server address if trying to connect to the internet and click OK Figure 156 Windows 7 Vista 9 Click OK or Close on the Local Area Connection Properties window to apply the settings ...

Page 255: ...osh OS 8 9 1 Click the Apple menu Control Panel and double click TCP IP to open the TCP IP Control Panel Figure 157 Macintosh OS 8 9 Apple Menu 2 Select Ethernet built in from the Connect via list Figure 158 Macintosh OS 8 9 TCP IP ...

Page 256: ...ntrol Panel 6 Click Save if prompted to save changes to your configuration 7 Turn on your router and restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Macintosh OS X 1 Click the Apple menu and click System Preferences to open the System Preferences window Figure 159 Macintosh OS X Apple Menu 2 Click Network in the icon bar Select A...

Page 257: ...r Prestige in the Router address box 5 Click Apply Now and close the window 6 Turn on your router and restart your computer if prompted Verifying Settings Check your TCP IP properties in the Network window Linux This section shows you how to configure your computer s TCP IP settings in Red Hat Linux 9 0 Procedure screens and file location may vary depending on your Linux distribution and release v...

Page 258: ...etwork Configuration Devices 2 Double click on the profile of the network card you wish to configure The Ethernet Device General screen displays as shown Figure 162 Red Hat 9 0 KDE Ethernet Device General If you have a dynamic IP address click Automatically obtain IP address settings with and select dhcp from the drop down list If you have a static IP address click Statically set IP Addresses and ...

Page 259: ... The following screen displays Click Yes to save the changes in all screens Figure 164 Red Hat 9 0 KDE Network Configuration Activate 7 After the network card restart process is complete make sure the Status is Active in the Network Configuration screen Using Configuration Files Follow the steps below to edit the network configuration files and set your computer IP address 1 Assuming that you have...

Page 260: ... 168 10 10 NETMASK 255 255 255 0 USERCTL no PEERDNS yes TYPE Ethernet 2 If you know your DNS server IP address es enter the DNS server information in the resolv conf file in the etc directory The following figure shows an example where two DNS server IP addresses are specified Figure 167 Red Hat 9 0 DNS Settings in resolv conf nameserver 172 23 5 1 nameserver 172 23 5 2 3 After you edit and save t...

Page 261: ...B 44 inet addr 172 23 19 129 Bcast 172 23 19 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 717 errors 0 dropped 0 overruns 0 frame 0 TX packets 13 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 100 RX bytes 730412 713 2 Kb TX bytes 1570 1 5 Kb Interrupt 10 Base address 0x1000 root localhost ...

Page 262: ...r more wireless adapters are within range of each other they can set up an independent network which is commonly referred to as an Ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an Ad hoc wireless LAN Figure 170 Peer to Peer Communication in an Ad hoc Network BSS A Basic Service Set BSS exists when a...

Page 263: ...sists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution System DS This type of wireless LAN topology is called an Infrastructure WLAN The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate n...

Page 264: ...d interference due to overlap your AP should be on a channel at least five channels away from a channel that an adjacent AP is using For example if your region has 11 channels and an adjacent AP is using channel 1 then you need to select a channel between 6 or 11 RTS CTS A hidden node occurs when two stations are within range of the same access point but are not within range of each other The foll...

Page 265: ...es and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without the RTS Request To Send CTS Clear to Send handshake You should only configure RTS CTS if the possibility of hidden nodes exists on your network and the cost of resending large frames is more than the extra network overhead ...

Page 266: ...at preamble mode your wireless stations support as all IEEE 802 11b compliant wireless adapters must support long preamble However not all wireless adapters support short preamble Use long preamble if you are unsure what preamble mode the wireless adapters support to ensure interpretability between the AP and the wireless stations and to provide more reliable communication in noisy networks Select...

Page 267: ...ser based identification that allows for roaming Support for RADIUS Remote Authentication Dial In User Service RFC 2138 2139 for centralized user profile and accounting management on a network RADIUS server Support for EAP Extensible Authentication Protocol RFC 2486 that allows additional authentication methods to be deployed with no changes to the access point or the wireless stations RADIUS RADI...

Page 268: ...user and then sends another Access Request message The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting Accounting Request Sent by the access point requesting accounting Accounting Response Sent by the RADIUS server to indicate that it has started or stopped accounting In order to ensure network security the access point and the RA...

Page 269: ...certificate to the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable to passive attacks A digital certificate is an electronic ID card that authenticates the sender s identity However to implement EAP TLS you need a Certificate Authority CA to handle certificates which imposes a management overhead EAP TTLS Tunneled Trans...

Page 270: ...exchange For added security certificate based authentications EAP TLS EAP TTLS and PEAP use dynamic keys for data encryption They are often deployed in corporate environments but for public deployment a simple user name and password pair is more practical The following table is a comparison of the features of authentication types Table 92 Comparison of EAP Authentication Types EAP MD5 EAP TLS EAP ...

Page 271: ... never used twice The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients This all happens in the background automatically WPA2 AES Advanced Encryption S...

Page 272: ...access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS server or not Select WEP only when the AP and or wireless clients do not support WPA or WPA2 WEP is less secure than WPA or WPA2 WPA 2 PSK Ap...

Page 273: ...the user s identification against its database and grants or denies network access accordingly 3 The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients ...

Page 274: ...EE 802 1X Open None No Disable Enable without Dynamic WEP Key Open WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable Shared WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable WPA Enterprise TKIP No Enable WPA Personal TKIP Yes Enable WPA2 Enterprise AES No Enable WPA2 Personal AES Yes Enable ...

Page 275: ...f this is USER DEFINED the Port s is the IP protocol number not the port number Port s This value depends on the Protocol Please refer to RFC 1700 for further information about port numbers If the Protocol is TCP UDP or TCP UDP this is the IP port number If the Protocol is USER this is the IP protocol number Description This is a brief explanation of the applications that use this service or the s...

Page 276: ...l uses this service FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on FTP TCP TCP 20 21 File Transfer Program a program to enable fast transfer of files including large files that may not be possible by e mail H 323 TCP 1720 NetMeeting uses this protocol HTTP TCP 80 Hyper Text Transfer Protocol a client server protocol for the world wide...

Page 277: ...service that provides transparent file sharing for network environments NNTP TCP 119 Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service PING User Defined 1 Packet INternet Groper is a protocol that sends out ICMP echo requests to test whether or not a remote host is reachable POP3 TCP 110 Post Office Protocol version 3 lets a client computer get e mail from ...

Page 278: ...CP 25 Simple Mail Transfer Protocol is the message exchange standard for the Internet SMTP enables you to move messages from one e mail server to another SNMP TCP UDP 161 Simple Network Management Program SNMP TRAPS TCP UDP 162 Traps for use with the SNMP RFC 1215 SQL NET TCP 1521 Structured Query Language is an interface to access data on many different types of database systems including mainfra...

Page 279: ...ommon on the Internet and in UNIX environments It operates over TCP IP networks Its primary function is to allow users to log into remote host systems TFTP UDP 69 Trivial File Transfer Protocol is an Internet file transfer protocol similar to FTP but uses the UDP User Datagram Protocol rather than TCP Transmission Control Protocol VDOLIVE TCP 7000 Another videoconferencing solution ...

Page 280: ...All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subject to change without notice Certifica...

Page 281: ...ion between the equipment and the receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio TV technician for help FCC Radiation Exposure Statement This transmitter must not be co located or operating in conjunction with any other antenna or transmitter IEEE 802 11b or 802 11g operation of this p...

Page 282: ...rolled environment This equipment should be installed and operated with minimum distance 20cm between the radiator your body Viewing Certifications 1 Go to http us zyxel com 2 Select your product on the ZyXEL home page to go to that product s page 3 Select the certification you wish to view from this page ZyXEL Limited Warranty ZyXEL warrants to the original end user purchaser that this product is...

Page 283: ...e at http www zyxel com web support_warranty_info php Registration Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com for global products or at www us zyxel com for North American products GPL OSS Software Notice In our continuing effort to disclose important and useful information with regards to our products we would like to inform you th...

Page 284: ... OR APPENDIX BELOW ZYXEL MAY HAVE DISTRIBUTED TO YOU HARDWARE AND OR SOFTWARE OR MADE AVAILABLE FOR ELECTRONIC DOWNLOADS THESE FREE SOFTWARE PROGRAMS OF THRID PARTIES AND YOU ARE LICENSED TO FREELY COPY MODIFY AND REDISTIBUTE THAT SOFTWARE UNDER THE APPLICABLE LICENSE TERMS OF SUCH THIRD PARTY NONE OF THE STATEMENTS OR DOCUMENTATION FROM ZYXEL INCLUDING ANY RESTRICTIONS OR CONDITIONS STATED IN THI...

Page 285: ...the resultant modified Software You may not copy reverse engineer decompile reverse compile translate adapt or disassemble the Software or any part thereof nor shall you attempt to create the source code from the object code for the Software Except as and only to the extent expressly permitted in this License you may not market co brand and private label or otherwise permit third parties to link t...

Page 286: ...RM SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY 30 DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD 7 Limitation of Li...

Page 287: ...n to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies including backup copies have been destroyed All provisions relating to confidentiality proprietary rights and non disclosure shall survive the termination of this Software License Agreement 11 General This License Agreement shall be construed interpreted and governed by the laws of Republic of C...

Page 288: ...se except the express written permission of ZyXEL Communications Corporation Open Sourced Components 3RD PARTY SOFTWARE VERSION FROM SOURCE LICENSE Linux Kernel 2 6 21 x 2 6 21 http www kernel org GPL 2 0 Busybox 1 12 1 1 12 1 http www busybox net GPL 2 0 Dnsmasq 2 40 2 4 0 http www thekelleys org uk dnsmasq doc html GPL 2 0 Goahead 2 1 8 2 1 8 http www goahead com pro ducts webserver download as ...

Page 289: ... GPL 2 0 Uclibc 0 9 28 0 9 28 http www uclibc org LGPL 2 1 Uclibc 0 2 2 0 2 2 http cxx uclibc org index ht ml LGPL 2 1 Libupnp 1 3 1 1 3 1 http pupnp sourceforge net BSD Zlib 1 1 4 1 1 4 http www zlib org or http sourceforge net project showfiles php group_id 5624 package_id 14274 release_i d 79109 Zlib rt2860apd rt2860 http www ralinktech com or http rt2x00 serialmonkey co m wiki index php Main_P...

Page 290: ... http squashfs sourceforge n et LGPL 2 1 lzma sdk 4 43 4 43 http sourceforge net project s sevenzip files LZMA 20SDK LGPL 2 1 squashfs 3 2 r2 3 2 r2 http squashfs sourceforge n et GPL 2 0 mtd_write mtd_writ e http downloads openwrt org sources GPL 2 0 ntp 4 1 2 4 1 2 http www eecis udel edu n tp ntp_spool ntp4 ntp 4 1 NTP ntpclient 2003_19 4 http doolittle icarus com ntp client GPL 2 0 openssl 0 9...

Page 291: ...permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public Licens...

Page 292: ...contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated in...

Page 293: ...ram the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or coll...

Page 294: ... do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the ...

Page 295: ...later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 10 If you wish to incorporate parts of the Program into other free programs whose distribution condi...

Page 296: ...mple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 Preamble The licenses for most software are designed to take away your freedom ...

Page 297: ...e else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a res...

Page 298: ...derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this L...

Page 299: ... ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this fu...

Page 300: ...se it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the source code is not Whether t...

Page 301: ...ready received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form wit...

Page 302: ...then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unen...

Page 303: ...ivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED IN...

Page 304: ... promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENT...

Page 305: ...alumni caltech edu ZLIB is third party library and has its own license files under src acdk vfile zlib are published under following Copyright and license zlib h interface of the zlib general purpose compression library version 1 1 3 July 9th 1998 Copyright C 1995 1998 Jean loup Gailly and Mark Adler This software is provided as is without any express or implied warranty In no event will the autho...

Page 306: ...niel Stenberg daniel haxx se All rights reserved Permission to use copy modify and distribute this software for any purpose with or without fee is hereby granted provided that the above copyright notice and this permission notice appear in all copies THE SOFTWARE IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND EXPRESS OR IMPLIED INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY FITNESS...

Page 307: ...ct includes libcrypt libintl libnsl libpthread libresolv libutil under the GNU Library General Public License which has been succeeded by the GNU Lesser General Public License GNU LIBRARY GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1991 Free Software Foundation Inc 51 Franklin St Fifth Floor Boston MA 02110 1301 USA Everyone is permitted to copy and distribute verbatim copies of this li...

Page 308: ...late to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code If you link a program with the library you must provide complete object files to the recip...

Page 309: ...ral Public License treats it as such Because of this blurred distinction using the ordinary General Public License for libraries did not effectively promote software sharing because most developers did not use the libraries We concluded that weaker conditions might promote sharing better However unrestricted linking of non free programs would deprive the users of those programs of all benefit from...

Page 310: ...n in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not c...

Page 311: ...l operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still...

Page 312: ...is not a library 4 You may copy and distribute the Library or a portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If...

Page 313: ... itself 6 As an exception to the Sections above you may also compile or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice w...

Page 314: ...y happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library fa...

Page 315: ...n you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit ...

Page 316: ...f following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to ...

Page 317: ... new library and you want it to be of the greatest possible use to the public we recommend making it free software that everyone can redistribute and change You can do so by permitting redistribution under these terms or alternatively under the terms of the ordinary General Public License To apply these terms attach the following notices to the library It is safest to attach them to the start of e...

Page 318: ...act you by electronic and paper mail You should also get your employer if you work as a programmer or your school if any to sign a copyright disclaimer for the library if necessary Here is a sample alter the names Yoyodyne Inc hereby disclaims all copyright interest in the library Frob a library for tweaking knobs written by James Random Hacker signature of Ty Coon 1 April 1990 Ty Coon President o...

Page 319: ...iness Permission to use copy modify and distribute this software is freely granted provided that this notice is preserved It has been ported to work with uClibc and generally behave by Erik Andersen andersen codepoet org 22 May 2001 This Product includes mksquash_lzma 3 2 under the following License mksquash_lzma License Copyright C 2006 Junjiro Okajima Copyright C 2006 Tomas Matejicek slax org LI...

Page 320: ... as not being for redistribution check the version message and or README you are not permitted to redistribute that version of the software in any way or form 1 All terms of all other applicable copyrights and licenses must be followed 2 Redistributions of source code must retain the authors copyright notice s this list of conditions and the following disclaimer 3 Redistributions in binary form mu...

Page 321: ...IS PROVIDED BY ITS AUTHORS AND CONTRIBUTORS AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED IN NO EVENT SHALL THE AUTHORS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE ...

Page 322: ...produce the above copyright notice this list of conditions and the following disclaimer in the documentation and or other materials provided with the distribution Neither name of Intel Corporation nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CO...

Page 323: ...ights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclai...

Page 324: ...GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This Product includes snmpd under the following snmpd License snmpd License Various copyrights apply to...

Page 325: ... many people over the years it has been in development and a full list of contributors can be found in the README file under the THANKS section Part 1 CMU UCD copyright notice BSD like Copyright 1989 1991 1992 by Carnegie Mellon University Derivative Work 1996 1998 2000 Copyright 1996 1998 2000 The Regents of the University of California All Rights Reserved Permission to use copy modify and distri...

Page 326: ...FTWARE Part 2 Networks Associates Technology Inc copyright notice BSD Copyright c 2001 2003 Networks Associates Technology Inc All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions of source code must retain the above copyright notice this list of conditions and the following d...

Page 327: ...ISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 3 Cambridge Broadband Ltd copyright notice BSD Portions of this code are copyright c 2001 2003 Cambridge Broadband Ltd All rights reserved Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met Redistributions o...

Page 328: ... IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 4 Sun Microsystems Inc copyright notice BSD Copyright 2003 Sun Microsystems Inc 4150 Network Circle Santa Clara California 95054 U S A All rights reserved Use is subject to license terms below This distribution may include materials developed by third parties Sun Sun Microsystems the Sun logo and Sol...

Page 329: ...AL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Pa...

Page 330: ...ES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE Part 6 Cisco BUPTNIC copyright notice BSD Copyright c 2004 Cisco Inc and Information Network Center of Beijing Univers...

Page 331: ...EMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE This Product in...

Page 332: ...E DISCLAIMED IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES LOSS OF USE DATA OR PROFITS OR BUSINESS INTERRUPTION HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT INCLUDING NEGLIGENCE OR OTHERWISE ARI...

Page 333: ...U LGPL and CPL licenses are pretty similar and both these licenses are classified as Free software licenses at http www gnu org OSI approved at http www opensource org 3 SPECIAL EXCEPTION Igor Pavlov as the author of this code expressly permits you to statically or dynamically link your code or bind by name to the files from LZMA SDK without subjecting your linked code to the terms of the CPL or G...

Page 334: ...for previous versions SPECIAL EXCEPTION 3 Igor Pavlov as the author of this code expressly permits you to use code of the following files BranchTypes h LzmaTypes h LzmaTest c LzmaStateTest c LzmaAlone cpp LzmaAlone cs LzmaAlone java as public domain code 4 Proprietary license LZMA SDK also can be available under a proprietary license which can include 1 Right to modify code without subjecting modi...

Page 335: ...ary squshfs3 2 r2 GPLv2 Copyright 2002 2007 Phillip Lougher phillip lougher org uk http squashfs sourceforge net This Product includes libnvram under the following License libnvram License Copyright 2002 Wolfgang Denk DENX Software Engineering wd denx de This file is derived from crc32 c from the zlib 1 1 3 distribution by Jean loup Gailly and Mark Adler crc32 c compute the CRC 32 of a data stream...

Page 336: ...Also note that the GPL below is copyrighted by the Free Software Foundation but the instance of code that it refers to the U Boot source code is copyrighted by me and others who actually wrote it Wolfgang Denk C Copyright 2000 2003 Wolfgang Denk DENX Software Engineering wd denx de This file is derived from crc32 c from the zlib 1 1 3 distribution by Jean loup Gailly and Mark Adler crc32 c compute...

Page 337: ... to use copy modify and distribute this software and its documentation for any purpose with or without fee is hereby granted provided that the above copyright notice appears in all copies and that both the copyright notice and this permission notice appear in supporting documentation and that the name University of Delaware not be used in advertising or publicity pertaining to distribution of the ...

Page 338: ...y bigfoot com Major rework of WINNT port Clean up recvbuf and iosignal code into separate modules 8 Marc Brett Marc Brett westgeo com Magnavox GPS clock driver 9 Piete Brooks Piete Brooks cl cam ac uk MSF clock driver Trimble PARSE support 10 Reg Clemens reg dwf com Oncore driver Current maintainer 11 Steve Clift clift ml csiro au OMEGA clock driver 12 Casey Crellin casey csc co za vxWorks Tornado...

Page 339: ...mic interface handling 27 William L Jones jones hermes chpc utexas edu RS 6000 AIX modifications HPUX modifications 28 Dave Katz dkatz cisco com RS 6000 AIX port 29 Craig Leres leres ee lbl gov 4 4BSD port ppsclock Magnavox GPS clock driver 30 George Lindholm lindholm ucs ubc ca SunOS 5 1 port 31 Louis A Mamakos louie ni umd edu MD5 based authentication 32 Lars H Mathiesen thorinn diku dk adaptati...

Page 340: ...sportas jack innovativeinternet com Saved a Lot of space on the stuff in the html pic subdirectory 46 Ray Schnitzler schnitz unipress com Unixware1 port 47 Michael Shields shields tembel org USNO clock driver 48 Jeff Steinman jss pebbles jpl nasa gov Datum PTS clock driver 49 Harlan Stenn harlan pfcs com GNU automake autoconfigure makeover various other bits see the ChangeLog 50 Kenneth Stone ken ...

Reviews: