ZyXEL Communications MWR102 Скачать руководство пользователя страница 1

Copyright © 2009 
ZyXEL Communications Corporation 

DEFAULT LOGIN DETAILS 

IP Address 

http://192.168.100.1 

Password 

1234 

 

 

 

Firmware Version 1.0 
Edition 1, 10/2011 

Содержание MWR102

Страница 1: ...Copyright 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS IP Address http 192 168 100 1 Password 1234 Firmware Version 1 0 Edition 1 10 2011...

Страница 2: ...2 MWR102 Mobile Wireless Router...

Страница 3: ...lp you get up and running right away It contains information on setting up your network and configuring for Internet access Supporting Disc Refer to the included CD for support documents ZyXEL Web Sit...

Страница 4: ...Date that you received or purchased your device Brief description of the problem including any steps that you have taken before contacting the ZyXEL Customer Support representative Support Email supp...

Страница 5: ...square brackets and uppercase text for example ENTER means the enter or return key on your keyboard Enter means for you to type one or more characters and then press the ENTER key Select or choose mea...

Страница 6: ...Figures Figures in this User s Guide may use the following generic icons The MWR102 icon is not an exact representation of your device MWR102 Computer Notebook computer Server Modem Firewall Telephon...

Страница 7: ...rmation Make sure to connect the cables to the correct ports Place connecting cables carefully so that no one will step on them or stumble over them Always disconnect all cables from this device befor...

Страница 8: ...a knife screwdriver or other sharp object to remove the battery Do not attempt to open the battery Use only the provided recharger to recharge the battery Only replace the battery with the correct rep...

Страница 9: ...naging the MWR102 15 1 4 The Front Panel 15 1 5 The Rear Panel 16 2 Web Based Management 17 2 1 Overview 17 2 2 Accessing the Web Based Management Interface 17 2 3 Resetting the MWR102 18 3 MWR102 Mod...

Страница 10: ...ld Know 36 7 4 General Wireless LAN Screen 39 7 5 Wireless LAN Advanced Settings 40 7 6 Security 42 7 7 Access Control 45 7 8 WPS Screen 47 7 9 Wireless Site Survey AP Mode Only 48 8 Network Settings...

Страница 11: ...e Firmware Screen 67 14 1 Overview 69 14 2 What You Can Do 69 14 3 Save Reload Settings Screen 69 15 Password 72 15 1 Overview 72 15 2 Password Screen 72 Part V Troubleshooting 74 16 Troubleshooting 7...

Страница 12: ...Java Permissions 85 Appendix B IP Addresses and Subnetting 93 Appendix C Setting up Your Computer s IP Address 105 Appendix D Wireless LANs 127 Appendix E Common Services 141 Appendix F Legal Informa...

Страница 13: ...13 Part I Introduction...

Страница 14: ...les printers or play network games all at high speeds over the same network The MWR102 supports advanced security encryption WPA WPA2 open shared key and pair wise key authentication services giving y...

Страница 15: ...default settings If you backed up an earlier configuration file you would not have to totally re configure the MWR102 You could simply restore your last configuration 1 4 The Front Panel Figure 1 The...

Страница 16: ...ce Click this button to start PBC configuration method for easy WPS setup Hold the reset button for 5 seconds or more to reset the system to factory defaults The system will then reboot and approximat...

Страница 17: ...op up windows from your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScripts enabled by default Java permissions enabled by default Refer to the Troubleshooting...

Страница 18: ...to reload the factory default configuration file This means that you will lose all configurations that you had previously saved the password will be reset to 1234 and the IP address will be reset to...

Страница 19: ...ng mode of the MWR102 which can act as a Router This is the default device mode of the MWR102 Use this mode to connect the local network to another network like the Internet Access Point Use this mode...

Страница 20: ...sed to connect the local network to another network for example the Internet 4 2 What You Can Do Use the Status screen to view read only information about your MWR102 4 2 1 Navigation Panel Use the su...

Страница 21: ...tings Security Use this screen to change Wireless Security settings Access Control This page allows control over what devices are allowed to access the router WPS This screen allows you to change the...

Страница 22: ...hernet connections Log Set remote log server parameters and view the system log Upgrade Firmware Upgrade the travel router firmware Save Reload Settings Save the current settings to a backup file or r...

Страница 23: ...nterface in Access Point Mode Log in to the Web Based Management Interface in Access Point mode do the following 1 Connect your computer to the LAN port of the MWR102 2 The default IP address of the M...

Страница 24: ...tal time the MWR102 has been on Firmware Version This is current firmware version Firmware Build Time This is the date time the current version of the firmware was released Operation Mode This is the...

Страница 25: ...role Server or None Auto IP Address Diversion Click the drop down list you may select Enabled to divert the IP Address automatically or select Disabled to ban it When Enabled e the system will automa...

Страница 26: ...des you through the setup of the MWR102 Wireless Basic Settings Use this screen to change the basic wireless settings of the MWR102 Advanced Settings Use this screen to configure advanced wireless set...

Страница 27: ...s of the travel router Statistics Shows packet counts for wired and wireless Ethernet connections Log Set remote log server parameters and view the system log Upgrade Firmware Upgrade the travel route...

Страница 28: ...Your MWR102 will automatically calculate the subnet mask based on the IP address that you assign Unless you are implementing subnetting use the subnet mask computed by the MWR102 DHCP DHCP stands for...

Страница 29: ...lp you bridge your DSL modem 2 Find out from your ISP what the PPPoE Username and Password are for your Internet connection 3 Once the DSL modem has been bridged connect it by Ethernet cord to the WAN...

Страница 30: ...iguring Wireless Security Using WPS This section gives you an example of how to set up wireless network using WPS This example uses the MWR102 as the AP and NWD210N as the wireless client which connec...

Страница 31: ...ithin two minutes of pressing the first one The MWR102 sends the proper configuration settings to the wireless client This may take up to two minutes Then the wireless client is able to communicate wi...

Страница 32: ...in the AP s Web Based Management Interface 2 Choose a Pre Shared Key format Passphrase or Hex 3 Enter your desired key then click the Apply Changes button Figure 8 Tutorial Wireless Security 6 5 Conf...

Страница 33: ...screen go to Start Programs and click on your utility in the list of programs that appears The utility displays a list of APs within range as shown in the example screen below 4 Select the MWR102 s S...

Страница 34: ...r you have no connection see the Troubleshooting section of this User s Guide Figure 12 Link Status If your connection is successful open your Internet browser and enter http us zyxel com or the URL o...

Страница 35: ...35 Part II Wireless...

Страница 36: ...a wireless network with strong security without having to configure security settings manually 7 3 What You Should Know Every wireless network must follow these basic guidelines Every wireless client...

Страница 37: ...the MAC address filter to tell the AP which wireless clients are allowed or not allowed to use the wireless network If a wireless client is allowed to use the wireless network it still has to have th...

Страница 38: ...er than none at all but it is still possible for unauthorized devices to figure out the original information pretty quickly Many types of encryption use a key to protect the information in the wireles...

Страница 39: ...s SSID channel or security settings you will lose your wireless connection when you press Apply to confirm You must then change the wireless settings of your computer to match the MWR102 s new settin...

Страница 40: ...urrently using Country Allows you to set your country Broadcast SSID Set whether or not the MWR102 is discoverable Associated Clients The Show Clients button shows all clients associated with the MWR1...

Страница 41: ...a fragment size that can be sent Enter an even number between 256 and 2346 RTS Threshold Data with its frame size larger than this value will perform the RTS Request To Send CTS Clear To Send handshak...

Страница 42: ...your MWR102 s output power Apply Changes Click Apply Changes to save your changes back to the MWR102 Reset Click Reset to reload the previous configuration for this screen 7 6 Security 7 6 1 Disabling...

Страница 43: ...ption list Figure 16 Wireless Security WEP The following table describes the wireless LAN security labels in this screen Table 9 Wireless Security WEP LABEL DESCRIPTION Encryption Select Static WEP to...

Страница 44: ...onverted by the MWR102 into a complicated string that is referred to as the key This key is requested from all devices wishing to connect to a wireless network Apply Changes Click Apply to save your c...

Страница 45: ...ply Changes Click Apply Changes to save your changes back to the MWR102 Reset Click Reset to reload the previous configuration for this screen 7 7 Access Control The Access Control screen allows you t...

Страница 46: ...ddress Enter the MAC addresses of the wireless station that are allowed or denied access to the MWR102 in this field Enter the MAC addresses in a valid MAC address format that is six hexadecimal chara...

Страница 47: ...creen Use this screen to enable disable WPS view or generate a new PIN number and check current WPS status To open this screen click Wireless WPS Figure 19 Wireless WPS The following table describes t...

Страница 48: ...when the WPS status displays Configured Click this button to remove all configured wireless and wireless security settings for WPS connections on the MWR102 Push Button Configuration Press this button...

Страница 49: ...wireless networks close to you BSSID This displays the MAC address of the wireless device listed Channel This displays the wireless channel used by the wireless network Type This displays the network...

Страница 50: ...lding A WAN Wide Area Network connection is an outside connection to another network or the Internet It connects your private networks such as a LAN Local Area Network and other networks so that a com...

Страница 51: ...nt IP addresses starting from 192 168 100 33 These parameters should work for the majority of installations If your ISP gives you explicit DNS server address es read the embedded Web Based Management...

Страница 52: ...f your Router LAN port default 192 168 100 1 Subnet Mask Subnet Mask of you LAN default 255 255 255 0 All devices on the network must have the same subnet mask to communicate on the network DHCP DHCP...

Страница 53: ...d conflicts 8 4 1 Active DHCP Client List This window pops up after clicking the Show Client button Figure 24 Network LAN Interface Show Client The following table describes the labels in this screen...

Страница 54: ...following screen Figure 25 Network WAN Interface The following table describes the labels in this screen Table 16 Network WAN Interface Items Information WAN Access Type Select to access the WAN as S...

Страница 55: ...dress One way is to directly input a MAC address into the text box To store a MAC address click the Manual Add button and add it to the History MAC Table The second way is to click the MAC Clone butto...

Страница 56: ...56 Part III Security MAC Filtering...

Страница 57: ...ed to the local network 9 3 What You Need To Know The MWR102 s MAC Filtering feature physically separates the LAN and the WAN of selected devices and acts as a secure gateway to keep selected devices...

Страница 58: ...t to forbid Internet access to Comment Input any text to describe the name of the device reason for filtering etc Current Filter Table Lists MAC Filter Settings you have added before To delete setting...

Страница 59: ...59 Part IV Management Status Statistics Log Upgrade Firmware Save Reload Settings Password...

Страница 60: ...t the MWR102 10 2 What You Can Do Use the Status screen to view the current status and basic settings of the device 10 3 Status Screen This information page shows the current status and basic settings...

Страница 61: ...ropdown menu SSID Name Shows the current name of your wireless network Channel Number This shows the channel number the MWR102 is currently using over Wireless LAN Encryption This shows the level of w...

Страница 62: ...r Internet Service Provider ISP Subnet Mask The Subnet Mask provided by your Internet Service Provider ISP Default Gateway The Default Gateway provided by your Internet Service Provider ISP Internet M...

Страница 63: ...e Statistics screen Figure 28 Management Statistics The following table describes the labels in this screen Table 19 Management Statistics LABEL DESCRIPTION Wireless LAN This table shows the number of...

Страница 64: ...This table shows the number of packets sent over the Ethernet WAN This table shows the number of packets received over the Ethernet WAN Refresh This button updates the Statistics screen to show the cu...

Страница 65: ...t activity on the router and allows you to set what information the router logs 12 2 Log Screen Click Management Log to access the Log screen Figure 29 Management Log The following table describes the...

Страница 66: ...vice Wireless Checking this box shows only the information passing through the wireless network Apply Changes This button applies the changes made above The MWR102 must reboot in order for these chang...

Страница 67: ...ttp us zyxel com Support Download Library aspx The upload process uses HTTP Hypertext Transfer Protocol and may take up to two minutes After a successful upload the system will reboot 13 2 Upgrade Fir...

Страница 68: ...two minutes Note Do not turn off the MWR102 while firmware upload is in progress After you see the Firmware Upload In Process screen wait two minutes before logging into the MWR102 again The MWR102 au...

Страница 69: ...configuration file before making configuration changes The backup configuration file will be useful in case you need to return to your previous settings Load Settings from File allows you to upload a...

Страница 70: ...t Browse Click Browse to find the file you want to upload Remember that you must decompress compressed ZIP files before you can upload them Upload Click Upload to begin the upload process Note Do not...

Страница 71: ...el to reset the factory defaults of your MWR102 Refer to the Web Based Management Interface Chapter for more information on the RESET button Note If you uploaded the default configuration file you may...

Страница 72: ...istrator user name and password These are the User name and Password used to access the Web based Management interface and make changes to your router 15 2 Password Screen Click Management Password Fi...

Страница 73: ...sword Type your new system password up to 30 characters Note that as you type a password the screen displays an asterisk for each character you type Confirmed Password Type the new password again in t...

Страница 74: ...74 Part V Troubleshooting...

Страница 75: ...on None of the LEDs turn on 1 Make sure you are using the power adaptor or cord included with the MWR102 2 Make sure the power adaptor or cord is connected to the MWR102 and plugged in to an appropria...

Страница 76: ...le in the Status screen Your MWR102 s IP address is available in the Local Network table If the DHCP setting under Local Network is None your device has a fixed IP address If the DHCP setting under Lo...

Страница 77: ...r is using a dynamic IP address If there is no DHCP server on your network make sure your computer s IP address is in the same subnet as the MWR102 See Appendix B 5 Reset the device to its factory def...

Страница 78: ...ss the Internet anymore I had access to the Internet with the MWR102 but my Internet connection is not available anymore 1 Check the hardware connections and make sure the LEDs are behaving as expecte...

Страница 79: ...LED is on 2 Press the RESET button for longer than 1 second to restart reboot the MWR102 3 Press the RESET button for longer than five seconds to set the MWR102 back to its factory default configurat...

Страница 80: ...N interface Check your remote management settings See the chapter on Wireless LAN in the User s Guide for more information I can t access the Web Based Configuration Interface after switching to AP mo...

Страница 81: ...over or straight through Ethernet cables LEDs PWR LAN WAN WLAN WPS Reset Button The reset button is built into the bottom panel Use this button to restore the MWR102 to its factory default settings Pr...

Страница 82: ...and or IEEE 802 11g wireless clients to connect to the MWR102 wirelessly Enable wireless security WPA 2 PSK and or MAC filtering to protect your wireless network Note The MWR102 may be prone to RF Ra...

Страница 83: ...rk Dynamic DNS Support With Dynamic DNS Domain Name System support you can use a fixed URL www zyxel com for example with a dynamic IP address You must register for this service with a Dynamic DNS ser...

Страница 84: ...84 Appendices Pop up Windows JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer s IP Address Wireless LANs Common Services Legal Information...

Страница 85: ...plorer 6 screens are used here Screens for other Internet Explorer versions may vary Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable po...

Страница 86: ...pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled Figure 35 Internet Options Privacy 3 Click Apply to save this setting Enable p...

Страница 87: ...tings screen Figure 36 Internet Options Privacy 3 Type the IP address of your device the web page that you do not want to have blocked with the prefix http For example http 192 168 167 1 4 Click Add t...

Страница 88: ...Privacy screen 6 Click Apply to save this setting JavaScripts If pages of the Web Based Management Interface do not display properly in Internet Explorer check that JavaScripts are allowed 1 In Inter...

Страница 89: ...Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enable is selected the default 5 Under Scripting of Java applets make sure that Enable is selected the...

Страница 90: ...Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 Under Java permissions make sure that a safe...

Страница 91: ...0 Security Settings Java JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 Make sure that Use Java 2 for applet under Java Sun is selected 3 Click OK to close...

Страница 92: ...92 Figure 41 Java Sun...

Страница 93: ...osts on a network share a common network number Similarly as each house has its own house number each host on the network has its own unique identifying number the host ID Routers use the network numb...

Страница 94: ...using a logical AND operation The term subnet is short for sub network A subnet mask has 32 bits If a bit in the subnet mask is a 1 then the corresponding bit in the IP address is part of the network...

Страница 95: ...of zeros for a total number of 32 bits Subnet masks can be referred to by the size of the network number part the bits with a 1 value For example an 8 bit mask means that the first 8 bits of the mask...

Страница 96: ...55 with a 24 bit subnet mask for example As these two IP addresses cannot be used for individual hosts calculate the maximum number of possible hosts in a network as follows Table 28 Maximum Host Numb...

Страница 97: ...255 255 255 248 29 1111 1000 248 255 255 255 252 30 1111 1100 252 Subnetting You can use subnetting to divide one network into multiple sub networks In the following example a network administrator c...

Страница 98: ...ubnet mask is now 25 bits 255 255 255 128 or 25 The borrowed host ID bit can have a value of either 0 or 1 allowing two subnets 192 168 1 0 25 and 192 168 1 128 25 The following figure shows the compa...

Страница 99: ...8 1 1 and the highest is 192 168 1 126 Similarly the host ID range for subnet B is 192 168 1 129 to 192 168 1 254 Example Four Subnets The previous example illustrated using a 25 bit subnet mask to di...

Страница 100: ...ress 192 168 1 0 Lowest Host ID 192 168 1 1 Broadcast Address 192 168 1 63 Highest Host ID 192 168 1 62 Table 32 Subnet 2 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 64 IP...

Страница 101: ...168 1 128 Lowest Host ID 192 168 1 129 Broadcast Address 192 168 1 191 Highest Host ID 192 168 1 190 Table 34 Subnet 4 IP SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 192 IP A...

Страница 102: ...bnet Table 35 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS BROADCAST ADDRESS 1 0 1 30 31 2 32 33 62 63 3 64 65 94 95 4 96 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222...

Страница 103: ...255 252 30 64 2 7 255 255 255 254 31 128 1 The following table is a summary for subnet planning on a network with a 16 bit network number Table 37 16 bit Network Number Subnet Planning NO BORROWED HOS...

Страница 104: ...user account and the ISP will assign you a dynamic IP address when the connection is established If this is the case it is recommended that you select a network number from 192 168 0 0 to 192 168 255...

Страница 105: ...Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Regardless of...

Страница 106: ...ith your network If you manually assign IP information instead of using dynamic assignment make sure that your computers have IP addresses that place them in the same subnet as the Prestige s LAN port...

Страница 107: ...nt for Microsoft Networks If you need the adapter 1 In the Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If...

Страница 108: ...onfiguring 1 In the Network window Configuration tab select your network adapter s TCP IP entry and click Properties 2 Click the IP Address tab If your IP address is dynamic select Obtain an IP addres...

Страница 109: ...109 If you know your DNS information select Enable DNS and type the information in the fields below you may not need to fill them all in...

Страница 110: ...TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Turn on your router and restart your computer when prompted Verifying Settings 1 Click Start and th...

Страница 111: ...Control Panel Figure 48 Windows XP Start Menu 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 49 Windows XP Control Panel 3 Right cli...

Страница 112: ...Protocol TCP IP under the General tab in Win XP and then click Properties Figure 51 Windows XP Local Area Connection Properties 5 The Internet Protocol TCP IP Properties window opens the General tab...

Страница 113: ...Settings tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add Repeat the above two steps for each IP address you want to...

Страница 114: ...ain DNS server address automatically if you do not know your DNS server IP address es If you know your DNS server IP address es click Use the following DNS server addresses and type them in the Prefer...

Страница 115: ...Connections window Network and Dial up Connections in Windows 2000 NT 11 Turn on your router and restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and then Co...

Страница 116: ...116 2 Click on Control Panel Figure 55 Windows 7 Vista 3 Click on Network and Internet Figure 56 Windows 7 Vista 4 Click on Network and Sharing Center...

Страница 117: ...ide of the screen click on Change Adapter Settings Windows 7 or Manage Network Connections Vista 6 Right click on Local Area Connection and select Properties Figure 58 Windows 7 Vista 7 Highlight Inte...

Страница 118: ...Address and enter your IP address Subnet Mask and Default Gateway Enter your DNS server address if trying to connect to the internet and click OK Figure 60 Windows 7 Vista 9 Click OK or Close on the L...

Страница 119: ...Macintosh OS 8 9 1 Click the Apple menu Control Panel and double click TCP IP to open the TCP IP Control Panel Figure 61 Macintosh OS 8 9 Apple Menu 2 Select Ethernet built in from the Connect via li...

Страница 120: ...ox Type your subnet mask in the Subnet mask box Type the IP address of your Prestige in the Router address box 5 Close the TCP IP Control Panel 6 Click Save if prompted to save changes to your configu...

Страница 121: ...X Apple Menu 2 Click Network in the icon bar Select Automatic from the Location list Select Built in Ethernet from the Show list Click the TCP IP tab 3 For dynamically assigned settings select Using D...

Страница 122: ...lly Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your Prestige in the Router address box 5 Click Apply Now and close the window 6 Turn...

Страница 123: ...logged in as the root administrator Using the K Desktop Environment KDE Follow the steps below to configure your computer IP address using the KDE 1 Click the Red Hat button located on the bottom left...

Страница 124: ...click Statically set IP Addresses and fill in the Address Subnet mask and Default Gateway Address fields 3 Click OK to save the changes and close the Ethernet Device General screen 4 If you know your...

Страница 125: ...ration file where eth0 is the name of the Ethernet card Open the configuration file with any plain text editor If you have a dynamic IP address enter dhcp in the BOOTPROTO field The following figure s...

Страница 126: ...Figure 72 Red Hat 9 0 Restart Ethernet Card root localhost init d network restart Shutting down interface eth0 OK Shutting down loopback interface OK Setting network parameters OK Bringing up loopbac...

Страница 127: ...that connects a set of computers with wireless stations A B C Any time two or more wireless adapters are within range of each other they can set up an independent network which is commonly referred to...

Страница 128: ...led wireless station A and B can still access the wired network but cannot communicate with each other Figure 75 Basic Service Set ESS An Extended Service Set ESS consists of a series of overlapping B...

Страница 129: ...129 An ESSID ESS IDentification uniquely identifies each ESS All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate...

Страница 130: ...nce due to overlap your AP should be on a channel at least five channels away from a channel that an adjacent AP is using For example if your region has 11 channels and an adjacent AP is using channel...

Страница 131: ...nd frames smaller than the specified RTS CTS directly to the AP without the RTS Request To Send CTS Clear to Send handshake You should only configure RTS CTS if the possibility of hidden nodes exists...

Страница 132: ...ort long preamble However not all wireless adapters support short preamble Use long preamble if you are unsure what preamble mode the wireless adapters support to ensure interpretability between the A...

Страница 133: ...ces Some advantages of IEEE 802 1x are User based identification that allows for roaming Support for RADIUS Remote Authentication Dial In User Service RFC 2138 2139 for centralized user profile and ac...

Страница 134: ...er requesting more information in order to allow access The access point sends a proper response from the user and then sends another Access Request message The following types of RADIUS messages are...

Страница 135: ...e identity of the server the client sends a different certificate to the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable...

Страница 136: ...r added security certificate based authentications EAP TLS EAP TTLS and PEAP use dynamic keys for data encryption They are often deployed in corporate environments but for public deployment a simple u...

Страница 137: ...r Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wireles...

Страница 138: ...passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS serve...

Страница 139: ...dentification against its database and grants or denies network access accordingly 3 The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and managem...

Страница 140: ...pen None No Disable Enable without Dynamic WEP Key Open WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable Shared WEP No Enable with Dynamic WEP Key Yes Enable without D...

Страница 141: ...SER DEFINED the Port s is the IP protocol number not the port number Port s This value depends on the Protocol Please refer to RFC 1700 for further information about port numbers If the Protocol is TC...

Страница 142: ...service FINGER TCP 79 Finger is a UNIX or Internet related command that can be used to find out if a user is logged on FTP TCP TCP 20 21 File Transfer Program a program to enable fast transfer of fil...

Страница 143: ...t provides transparent file sharing for network environments NNTP TCP 119 Network News Transport Protocol is the delivery mechanism for the USENET newsgroup service PING User Defined 1 Packet INternet...

Страница 144: ...e Mail Transfer Protocol is the message exchange standard for the Internet SMTP enables you to move messages from one e mail server to another SNMP TCP UDP 161 Simple Network Management Program SNMP T...

Страница 145: ...e Internet and in UNIX environments It operates over TCP IP networks Its primary function is to allow users to log into remote host systems TFTP UDP 69 Trivial File Transfer Protocol is an Internet fi...

Страница 146: ...reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights no...

Страница 147: ...n the equipment and the receiver 3 Connect the equipment into an outlet on a circuit different from that to which the receiver is connected 4 Consult the dealer or an experienced radio TV technician f...

Страница 148: ...should be installed and operated with minimum distance 20cm between the radiator your body Viewing Certifications 1 Go to http us zyxel com 2 Select your product on the ZyXEL home page to go to that...

Страница 149: ..._info php Registration Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com for global products or at www us zyxel com for North American produc...

Страница 150: ...NTS ARE LISTED IN THE NOTICE OR APPENDIX BELOW ZYXEL MAY HAVE DISTRIBUTED TO YOU HARDWARE AND OR SOFTWARE OR MADE AVAILABLE FOR ELECTRONIC DOWNLOADS THESE FREE SOFTWARE PROGRAMS OF THRID PARTIES AND Y...

Страница 151: ...of nor shall you attempt to create the source code from the object code for the Software Except as and only to the extent expressly permitted in this License you may not market co brand and private la...

Страница 152: ...RCHASE OF THE SOFTWARE AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD 7 Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES...

Страница 153: ...stroyed All provisions relating to confidentiality proprietary rights and non disclosure shall survive the termination of this Software License Agreement 11 General This License Agreement shall be con...

Страница 154: ...pose except the express written permission of ZyXEL Communications Corporation Open Sourced Components Name Version Source License GNU Linux kernel v2 6 30 9 http www kernel org GPLv2 bootcode v1 1e 1...

Страница 155: ...v2 0 http doolittle icarus com ntpclient GPLv2 ppp 2 4 4 2 4 4 ftp ftp samba org pub ppp GPLv2 pptp 1 7 2 1 7 2 http sourceforge net projects pptpclient GPLv2 radvd 0 9 1 v0 9 1 http www litech org ra...

Страница 156: ...Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and chan...

Страница 157: ...ced by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means eithe...

Страница 158: ...separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole whi...

Страница 159: ...cense However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to...

Страница 160: ...luded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public Licen...

Страница 161: ...Version 3 29 June 2007 Copyright 2007 Free Software Foundation Inc http fsf org Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Pre...

Страница 162: ...urer can do so This is fundamentally incompatible with the aim of protecting users freedom to change the software The systematic pattern of such abuse occurs in the area of products for individuals to...

Страница 163: ...der this License and how to view a copy of this License If the interface presents a list of user commands or options such as a menu a prominent item in the list meets this criterion 1 Source Code The...

Страница 164: ...ght law You may make run and propagate covered works that you do not convey without conditions so long as your license otherwise remains in force You may convey covered works to others for the sole pu...

Страница 165: ...under this License and any conditions added under section 7 This requirement modifies the requirement in section 4 to keep intact all notices c You must license the entire work as a whole under this...

Страница 166: ...h an offer in accord with subsection 6b d Convey the object code by offering access from a designated place gratis or for a charge and offer equivalent access to the Corresponding Source in the same w...

Страница 167: ...er Product for example the work has been installed in ROM The requirement to provide Installation Information does not include a requirement to continue to provide support service warranty or updates...

Страница 168: ...mptions of liability to the recipient for any liability that these contractual assumptions directly impose on those licensors and authors All other non permissive additional terms are considered furth...

Страница 169: ...ansmission to receive a copy likewise does not require acceptance However nothing other than this License grants you permission to propagate or modify any covered work These actions infringe copyright...

Страница 170: ...express permission to practice a patent or covenant not to sue for patent infringement To grant such a patent license to a party means to make such an agreement or commitment not to enforce a patent...

Страница 171: ...a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not convey it at all For example if you agree to te...

Страница 172: ...IRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 Limitation of Liability...

Страница 173: ...NU General Public License for more details You should have received a copy of the GNU General Public License along with this program If not see http www gnu org licenses Also add information on how to...

Страница 174: ...e software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other...

Страница 175: ...quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a li...

Страница 176: ...ed straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifi...

Страница 177: ...exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a...

Страница 178: ...it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must include the copyright notice fo...

Страница 179: ...as such parties remain in full compliance 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or i...

Страница 180: ...rsion number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free So...

Страница 181: ...nditions and the following disclaimer in the documentation and or other materials provided with the distribution Neither the name of the University nor of the Laboratory may be used to endorse or prom...

Страница 182: ...y marked as such and must not be misrepresented as being the original software 3 This notice may not be removed or altered from any source distribution Jean loup Gailly jloup gzip org Mark Adler madle...

Страница 183: ...belled as not being for redistribution check the version message and or README you are not permitted to redistribute that version of the software in any way or form 1 All terms of all other applicable...

Отзывы: