ZyXEL Communications NBG-419N manuals
Computer Equipment > Network Router
When we buy new device such as ZyXEL Communications NBG-419N we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications NBG-419N begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Network Router ZyXEL Communications NBG-419N is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Network Router on our side using links below.
ZyXEL Communications NBG-419N Manual
278 pages 8.42 Mb
1 IMPORTANTLAN IP http://192.168.1.1 READ CAREFULLY Address Password BEFORE USE KEEP THIS GUIDE FOR FUTURE Version REFERENCE Edition 2, 04/2012Copyright © ZyXEL Communications Corporation 2 READ CAREFULLY BEFORE USEKEEP THIS GUIDE FOR FUTURE REFERENCE Related Documentation 3 Contents Overview5 Table of Contents15 Getting to Know Your Router20 ZyXEL NetUSB Share Center Utility2.1 Overview 21 2.2The ZyXEL NetUSB Share Center Utility22 Chapter 2 ZyXEL NetUSB Share Center UtilityTable 3 ZyXEL NetUSB Share Center Utility Main Window Icons (continued) ICON DESCRIPTION This section describes the utility’s menus Figure 4 ZyXEL NetUSB Share Center Utility Menus The following table describes the menus in this screen Table 4 ZyXEL NetUSB Share Center Utility Main Screen Menus MENU ITEM 23 Tools > Configuration24 The following table describes the labels in this windowTable 5 ZyXEL NetUSB Share Center Utility Configuration Window LABEL Basic Language the change to take effect Click this to save your changes and close the window Cancel Click this cancel to close the window without saving Click this to save your changes without closing the window Tools Auto-Connect Printer List Connect Auto-Connect Printer Figure 6 ZyXEL NetUSB Share Center Utility Auto-ConnectPrinter List Window The following table describes the labels in this screen Table 6 ZyXEL NetUSB Share Center Utility Auto-ConnectPrinter List Window Server IP & Displays a list of print server IPs and printer names connected to this Router Printer Name Windows the other list Select an printer from the list and click this to remove it Close Click this to close the window 25 System > ExitExit 27 Connection Wizard3.1 Overview 3.2 Accessing the Wizard 28 3.3 Connect to Internet29 Internet Connection TypeNext Back 30 Table 8 Internet Connection Type: Static IP (continued)Subnet Mask Enter the IP subnet mask in this field Default Enter the gateway IP address in this field Gateway Primary DNS server Enter the primary DNS server's IP address in the fields provided Secondary DNS Enter the secondary DNS server's IP address in the fields provided Click this to close the wizard screen without saving Back Click this to return to the previous screen Next Click this to continue Figure 12 Internet Connection Type: PPPoE 31 Table 9 Internet Connection Type: PPPoESelect the PPPoE option for a dial-upconnection Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address Type the name of your service provider Type the user name given to you by your ISP Type the password associated with the user name above Refer to the appendix for more information on PPTP The Router supports one PPTP server connection at any given time Figure 13 Internet Connection Type: PPTP 32 The following table describes the fields in this screenTable 10 Internet Connection Type: PPTP connection PPTP Address Type the (static) IP address assigned to you by your ISP PPTP Subnet Type the subnet mask assigned to you by your ISP (if given) Mask PPTP Gateway Type the gateway IP address of the PPTP server PPTP Server IP Type the server IP address of the PPTP server Address Type the password associated with the User Name above Figure 14 Internet Connection Type: L2TP Table 11 Internet Connection Type: L2TP Select L2TP from the drop-downlist box 33 Chapter 3 Connection WizardTable 11 Internet Connection Type: L2TP (continued) L2TP Address L2TP Subnet L2TP Gateway Type the gateway IP address of the L2TP server L2TP Server IP Type the server IP address of the L2TP server The Router connects to the Internet Figure 15 Connecting to the Internet 34 3.4 Router Password3.5 Wireless Security35 Table 12 Wireless Security: No SecurityWireless Network Name (SSID) order to access the network Security mode Select a Security level from the drop-downlist box within range Figure 18 Wireless Security: WPA-PSK/WPA2-PSK Table 13 Wireless Security: WPA-PSK/WPA2-PSK Choose WPA-PSK or WPA2-PSK security to configure a Pre-SharedKey. Choose this option only if your wireless clients support WPA-PSKor WPA2-PSKrespectively password connection by configuring WPA in the wireless LAN screens Retype the password to confirm 36 ZyGOEasy Mode 37 Introducing the Web Configurator4.1 Overview 4.2Accessing the Web Configurator38 Chapter 4 Introducing the Web ConfiguratorThe Web Configurator initially displays the following login screen Figure 20 Login screen Table 14 Login screen Type "1234" (default) as the password Login Section 4.2.3.1 on page example 15:00 is 3:00 PM Figure 21 Change Password Screen 39 Table 15 Change Password ScreenIgnore Administrator Inactivity Timer Logout You can also open this screen by clicking Home mode screens The Home screen displays as follows Figure 22 Home Screen Table 16 Home Screen Login Table 16 Home Screen (continued) LABEL DESCRIPTION 40 4.2.3.1 Weather EditClick the icon to change the Weather display Figure 23 Change Weather Change Weather oC or oF Choose which temperature unit you want the Router to display Change Location choose one that is closest to it Finish Click this to apply the settings and refresh the date and time display 4.2.3.2 Time/Date EditFigure 24 Change Password Screen Table 18 Change Password Screen Change time zone Click this to apply the settings and refresh the weather display Note: You can also edit the timezone in Section 25.5 on page 41 4.3 Resetting the Router43 Monitor49 Router Modes51 Easy Mode7.1 Overview Network Map 52 Status Screen7.2 What You Can Do 7.3What You Need to Know 53 7.4 Navigation Panel7.5 Network Map 54 7.6 Control PanelTable 23 Control Panel (continued) Firewall Otherwise, switch OFF Refer to Section 7.6.5 on page 58 to see this screen Security your Router Refer to Section 7.6.6 on page 58 to see this screen Figure 36 Game Engine Game Console 55 Bandwidth MGMTTurn this off if your network is not using gaming Click OK to close this screen 56 Table 24 Power SavingWLAN Status WLAN Status Day and Except for the following times fields and fields Day Select Everyday or the specific days to turn the Wireless LAN on or off conjunction with the Except for the following times field conjunction with the field For the following times (24-Hour Format) is 18:00 Reset Click Reset to begin configuring this screen afresh 57 Figure 38 Content FilterContent Filter Add Click Add after you have typed a keyword Repeat this procedure to add other keywords. Up to 64 keywords are allowed Note: The Router does not recognize wildcard characters as keywords that the content filter is blocking this request from the text box after you click Apply Click Apply to save your changes Click Cancel to close this screen without saving any changes 58 HighLow Cancel Figure 40 Firewall 59 Figure 41 Wireless SecurityEnter a descriptive name (up to 32 keyboard characters) for the wireless LAN Type a pre-sharedkey from 8 to 63 case-sensitivekeyboard characters Type the password again to confirm Click Cancel to close this screen Click this to configure the WPS screen Wireless Security another wireless device that supports WPS 60 Figure 42 Wireless Security: WPSTable 27 Wireless Security: WPS Click this to go back to the Wireless Security screen Create a secure wireless network simply by pressing a button information synchronization WPS minutes Register Identification Number) in the Router’s interface and pushing this button Click Exit to close this screen 61 7.7 Status Screen in Easy Mode62 Router Mode8.1 Overview 8.2 What You Can Do 63 8.3 Status Screen64 Table 29 Status Screen Icon Key: Router Mode (continued)Click this button to refresh the status screen statistics Click this icon to see the Monitor navigation menu Click this icon to see the Configuration navigation menu Click this icon to see the Maintenance navigation menu The following table describes the labels shown in the Status screen Table 30 Status Screen: Router Mode Click this at any time to exit the Web Configurator Device Information Host Name System Name identification purposes Firmware Version This is the firmware version and the date created Sys OP Mode Router Mode WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device - IP Address This shows the WAN port’s IP address - IP Subnet Mask This shows the WAN port’s subnet mask - Default Gateway This shows the WAN port’s gateway IP address - DHCP This shows the LAN port’s DHCP role - Client or Server LAN Information This shows the LAN Ethernet adapter MAC Address of your device This shows the LAN port’s IP address This shows the LAN port’s subnet mask This shows the LAN port’s DHCP role - Server or None WLAN Information - WLAN OP Mode - Access Point Mode This shows the wireless adapter MAC Address of your device - Status This shows the current status of the Wireless LAN - ON or OFF - Name (SSID) This shows a descriptive name used to identify the Router in the wireless LAN - Channel This shows the channel number which you select manually - Operating Channel - Security Mode This shows the level of wireless security the Router is using - 802.11 Mode This shows the wireless standard 65 Table 30 Status Screen: Router Mode (continued)- WPS This displays Configured when the WPS has been set up This displays Unconfigured if the WPS has not been set up Click the status to display Network > Wireless LAN > WPS screen System Status Item This column shows the type of data the Router is recording Data This column shows the actual data recorded by the Router System Up Time Current Date/Time This field displays your Router’s present date and time System Resource - CPU Usage should turn off other applications (for example, using bandwidth management.) - Memory Usage This shows what percentage of the heap memory the Router is using System Setting - Firewall This shows whether the firewall is enabled or not - Bandwidth This shows whether the bandwidth management is enabled or not Management - UPnP This shows whether UPnP is enabled or not - Configuration Mode This shows the web configurator mode you are viewing - Expert Interface Status Interface This displays the Router port types. The port types are: WAN, LAN and WLAN connected) For the WLAN, it displays Up when the WLAN is enabled or Down when the WLAN is disabled Rate A when the WLAN is disabled Summary BW MGMT Monitor the network are using DHCP Table this screen to view current DHCP client information Packet Statistics Use this screen to view port status and packet specific statistics WLAN Station Status 66 Use the sub-menuson the navigation panel to configure Router featuresFigure 46 Navigation Panel: Router Mode The following table describes the sub-menus Table 31 Navigation Panel: Router Mode LINK TAB FUNCTION MONITOR CONFIGURATION 67 Table 31 Navigation Panel: Router Mode (continued)68 MAINTENANCE69 Access Point Mode9.1 Overview 9.2What You Can Do 9.3What You Need to Know 72 9.4 AP Mode Status Screen73 Chapter 9 Access Point ModeTable 32 Status Screen: Access Point Mode (continued) should turn off other applications (for example, using bandwidth management This displays the Router port types. The port types are: LAN and WLAN 74 9.5 LAN Screen75 Table 33 Network > LAN > IPGet from DHCP Click this to deploy the Router as an access point in the network Server Internet if the IP address is given by the ISP) Use Defined LAN IP Address change the IP address you will have to log in again with the new IP address IP Subnet Mask you are implementing subnetting, use the subnet mask computed by the Router Gateway IP First DNS Second DNS the ISP assigns after you click Apply server, you must know the IP address of a computer in order to access it Click Apply to save your changes to the Router Click Reset to reload the previous configuration for this screen 76 WISP Mode10.1 Overview 10.2What You Can Do 10.3What You Need to Know 78 10.4 WISP Mode Status Screen80 10.5 Wireless LAN General Screen81 10.5.0.1 No SecurityTable 36 No Security (WISP) No Security 82 The following table describes the labels in this screenTable 37 WEP (WISP) Select Static WEP to enable data encryption PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate from all devices wishing to connect to a wireless network WEP Encryption Select 64-bitWEP or 128-bitWEP This dictates the length of the security key that the network is going to use Authentication Select Auto or Shared Key from the drop-downlist box Method communication between the wireless client and the Router occurs ASCII Select this option in order to enter ASCII characters as WEP key 83 Table 37 WEP (WISP) (continued)Hex Select this option in order to enter hexadecimal characters as a WEP key Key 1 to Key use the same WEP key for data transmission ("0-9", "A-F") default key is key Table 38 WPA-PSK/WPA2-PSK(WISP) Encryption Type connect Pre-SharedKey WPA-PSK/WPA2-PSK uses a simple common password for authentication 84 Configuration > Wireless LANFigure 61 Configuration > Wireless LAN > Advance Screen (WISP) Table 39 Configuration > Wireless LAN > Advance Screen (WISP) Mode when no wireless activity is detected in the Wireless LAN Select Power Saving Mode if you want the Router to go to sleep when no wireless power RTS Threshold AP fragments the packet into smaller data frames Fragment Threshold get permission to send information to the AP 85 Configuration > Site SurveyFigure 62 Configuration > Wireless LAN > Site Survey (WISP) Table 40 Configuration > Wireless LAN > Site Survey (WISP) Station Site Survey can add the selected wireless device to a profile and then enable it SSID This displays the SSID of the wireless device connecting to it BSSID This displays the MAC address of the wireless device Signal Strength antenna output power and the distance between your Router and this device Channel This displays the channel number used by this wireless device station encryp This displays the data encryption method used by this wireless device station auth This displays the authentication method used by this wireless device Network Type Rescan update this table Setting Select a wireless device and click this button to add it to a profile 87 Tutorials101 Wireless LAN117 WAN131 LAN135 DHCP Server139 Network Address Translation (NAT)16.1 Overview 16.2What You Can Do 140 16.3 General NAT Screen16.4 NAT Application Screen141 Network > NATDefault Server IP address NAT > General Table 64 Network > NAT > Application Add Application Rule Active host with a specified internal IP address to delete the entry and Port fields spaces, such as 123,567 specified in the Port field 142 16.5 NAT Advanced Screen143 Note: Only one LAN computer can use a trigger port (range) at a timeFigure 101 Network > NAT > Advanced Table 65 Network > NAT > Advanced This is the rule index number (read-only) permitted - including spaces Incoming client computer on the LAN that requested the service Start Port Type a port number or the starting port number in a range of port numbers End Port Type a port number or the ending port number in a range of port numbers Trigger 144 The following is an example of trigger port forwardingFigure 102 Trigger Port Forwarding Process: Example Router 1Jane requests a file from the Real Audio server (port 7070) 3The Real Audio server responds using a port number ranging between 4The Router forwards the traffic to Jane’s computer IP address 145 Dynamic DNS17.1 Overview 17.2 What You Can Do 17.3 What You Need To Know 17.4 Dynamic DNS Screen146 Chapter 17 Dynamic DNSTable 66 Network > DDNS Enable Select this check box to use dynamic DNS Dynamic DNS Service Select the name of your Dynamic DNS service provider Provider separated by a comma (",") Enter your user name Enter the password assigned to you 147 Static Route151 RIP19.1 Overview 19.2 What You Can Do 19.3 RIP Screen 153 Firewall20.1 Overview 20.2What You Can Do 154 20.3 What You Need To Know20.4 General Firewall Screen 155 20.5 Services Screen156 Table 70 Security > Firewall > Services (continued)Enable Firewall Rule Rule below) Enter a name that identifies or describes the firewall rule Enter the MAC address of the computer for which the firewall rule applies entering The Router applies the firewall rule to traffic initiating from this computer Source IP Protocol want to apply the firewall rule Dest Port Range port 80 defines web traffic Source Port 80 defines web traffic Click Add to save the firewall rule Firewall Rule in turn This is a name that identifies or describes the firewall rule This is the MAC address of the computer for which the firewall rule applies initialized TCP port 80 defines web traffic Action Drop - Traffic matching the conditions of the firewall rule are stopped Click this to remove the firewall rule See Appendix E on page 261 for commonly used services and port numbers 157 Content Filter21.1 Overview 21.2 What You Can Do 21.3 What You Need To Know 158 21.4 Content Filter Screen159 Table 71 Security > Content Filter > Content Filter (continued)Cookies Used by Web servers to track usage and provide service based on ID Web Proxy Enable URL Keyword Blocking keyword in the domain name or IP address will be blocked, e.g., URL http: not allowed. You can also enter a numerical IP address Keyword List This list displays the keywords already added Clear All Click this button to remove all of the listed keywords Click Reset to begin configuring this screen afresh 161 Bandwidth Management22.1 Overview->VOIP ->FTP ->HTTP ->Chat, Email 22.2What You Can Do 162 22.3 What You Need To Know22.4 General Screen 22.5 Advanced Screen163 to open the bandwidth managementFigure 113 Management > Bandwidth Management > Advanced Table 73 Management > Bandwidth Management > Advanced Management Bandwidth Upstream dedicate to uplink traffic This is traffic from LAN/WLAN to WAN Downstream This is traffic from WAN to LAN/WLAN Application List 164 Table 73 Management > Bandwidth Management > Advanced (continued)This is the number of an individual bandwidth management rule Priority Select a priority from the drop down list box. Choose High, Mid or Low the variations in delay) important business traffic that can tolerate some delay allowed but that should not affect other applications and users Category This is the category where a service belongs This is the name of the service Select the check box to have the Router apply this bandwidth management rule User-defined you specify Select this check box to have the Router apply this bandwidth management rule Direction Select LAN to apply bandwidth management to traffic from WAN to LAN Select WAN to apply bandwidth management to traffic from LAN/WLAN to WAN Select WLAN to apply bandwidth management to traffic from WAN to WLAN Enter a descriptive name for the bandwidth management rule Rule Configuration more information Application List Figure 114 Bandwidth Management Rule Configuration: Application List 165 Table 74 Bandwidth Management Rule Configuration: Application Listmanaged by bandwidth management Select Maximum Bandwidth or Minimum Bandwidth and specify the maximum or minimum bandwidth allowed for the rule in kilobits per second Destination Port See Appendix E on page 261 for some common services and port numbers defines web traffic This is the protocol (TCP, UDP or user-defined)used for the service Click Cancel to exit this screen without saving User-defined Service Figure 115 Bandwidth Management Rule Configuration: User-definedService The following table describes the labels in this screen 166 22.6 Monitor Screen167 Figure 116 Management > Bandwidth Management > MonitorManagement Bandwidth Management Table 76 Media Bandwidth Management Setup: Services SERVICE FTP possible by e-mail on the Internet. Other services on the Internet include Internet Relay Chat and Newsgroups. The Web is accessed through use of a browser E-Mail individuals. Here are some default ports for e-mail: VoIP (SIP) tearing down of voice and multimedia sessions over the Internet SIP is transported primarily over UDP but can also be transported over TCP BitTorrent pieces and share the pieces with other peers to get other half of the file Gaming Game Zone 168 Remote Management171 Universal Plug-and-Play(UPnP)24.1 Overview 24.2 What You Can Do 24.3 What You Need to Know 172 24.4 UPnP Screen24.5 Technical Refereance 179 Maintenance189 Troubleshooting197 Pop-upWindows, JavaScript and Java Permissions209 IP Addresses and SubnettingAppendix B IP Addresses and Subnetting Figure 152 Network Number and Host ID 210 Subnet MasksTable 85 IP Address Network Number and Host ID Example 1ST OCTET: 2ND 3RD 4TH OCTET OCTET: (192) (168) (1) (2) Table 86 Subnet Masks BINARY 1ST DECIMAL OCTET 211 Network SizeTable 87 Maximum Host Numbers SUBNET MASK HOST ID SIZE MAXIMUM NUMBER OF HOSTS NotationFor example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask The following table shows some possible subnet masks using both notations Table 88 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET NOTATION (BINARY) (DECIMAL) 212 Subnetting213 Example: Four SubnetsTable 89 Subnet IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE Table 89 Subnet 1 (continued) Table 90 Subnet Table 91 Subnet Table 92 Subnet 214 Example: Eight SubnetsThe following table shows IP address last octet values for each subnet Eight Subnets SUBNET FIRST ADDRESS LAST BROADCAST ADDRESS 215 Subnet PlanningTable 94 24-bitNetwork Number Subnet Planning NO. “BORROWED” NO. SUBNETS NO. HOSTS PER HOST BITS Table 95 16-bitNetwork Number Subnet Planning Table 95 16-bitNetwork Number Subnet Planning (continued) 216 Configuring IP AddressesPrivate IP Addresses•10.0.0.0 — •172.16.0.0 — •192.168.0.0 — 217 IP Address ConflictsConflicting Computer IP Addresses Example Conflicting Router IP Addresses Example 218 Conflicting Computer and Router IP Addresses Example219 Setting Up Your Computer’s IP Address247 Wireless LANs248 ESSFigure 166 Infrastructure WLAN 249 ChannelRTS/CTSFigure 167 RTS/CTS RTS/CTS RTS/CTS Fragmentation Threshold 250 Fragmentation Threshold251 Preamble TypeIEEE 802.11g Wireless LANTable 96 IEEE 802.11g DATA RATE (MBPS) MODULATION Wireless Security OverviewTable 97 Wireless Security Levels SECURITY SECURITY TYPE LEVEL 252 IEEE•User based identification that allows for roaming RADIUS•Authentication Determines the identity of the users •Authorization •Accounting Keeps track of the client’s network activity 253 Types of RADIUS Messages•Access-Request Sent by an access point requesting authentication •Access-Reject Sent by a RADIUS server rejecting access •Access-Accept Sent by a RADIUS server allowing access •Access-Challenge •Accounting-Request Sent by the access point requesting accounting •Accounting-Response Types of EAP Authentication 254 EAP-MD5 (Message-DigestAlgorithm 5)EAP-TLS(Transport Layer Security) EAP-TTLS(Tunneled Transport Layer Service) PEAP (Protected EAP) LEAP Dynamic WEP Key ExchangeNote: EAP-MD5cannot be used with Dynamic WEP Key Exchange Table 98 Comparison of EAP Authentication Types EAP-MD5 EAP-TLS EAP-TTLS PEAP LEAP 255 WPA and WPA2Encryption 256 User AuthenticationWireless Client WPA Supplicants 257 WPA(2) with RADIUS Application ExampleWPA(2)-PSKApplication Example 258 Security Parameters SummaryAUTHENTICATION ENCRYPTIO ENTER METHOD/ KEY IEEE N METHOD MANUAL KEY MANAGEMENT PROTOCOL Antenna Overview 259 Antenna CharacteristicsFrequency Radiation Pattern Antenna Gain Types of Antennas for WLANThere are two types of antennas used for wireless LAN applications Omni-directional Positioning Antennas 261 Common Services265 Legal InformationFCC Radiation Exposure Statement 266 注意Notices Industry Canada Statement 267 IC Radiation Exposure Statement:Viewing Certifications ZyXEL Limited Warranty Note 268 RegistrationOpen Source Licenses Regulatory Information European Union[Czech] příslušnými ustanoveními směrnice 1999/5/EC [Danish] krav og øvrige relevante krav i direktiv 1999/5/EF [German] 1999/5/EU befindet [Estonian] ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele English Hereby, ZyXEL declares that this equipment is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC [Spanish] [Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ ZyXEL ∆ΗΛΩΝΕΙ ΟΤΙ εξοπλισμός ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ [French] essentielles et aux autres dispositions pertinentes de la directive 1999/5/EC [Italian] alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE [Latvian] citiem ar to saistītajiem noteikumiem [Lithuanian] Direktyvos nuostatas [Dutch] eisen en de andere relevante bepalingen van richtlijn 1999/5/EC [Maltese] provvedimenti oħrajn relevanti li hemm fid-Dirrettiva1999/5/EC [Hungarian] Alulírott, ZyXEL nyilatkozom, hogy a berendezés megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EK irányelv egyéb elõírásainak [Polish] Niniejszym ZyXEL oświadcza, że sprzęt jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC [Portuguese] disposições da Directiva 1999/5/EC [Slovenian] določili direktive 1999/5/EC [Slovak] ustanovenia Smernice 1999/5/EC [Finnish] vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen [Swedish] [Bulgarian] изисквания и другите приложими разпоредбите на Директива 1999/5/ЕC [Icelandic] viðeigandi ákvæði tilskipunar 1999/5/EC [Norwegian] andre relevante bestemmelser I direktiv 1999/5/EF [Romanian] esenţiale şi alte prevederi relevante ale Directivei 1999/5/EC 269 National Restrictions270 Overview of Regulatory Requirements for Wireless LANsBelgium Denmark In Denmark, the band 5150 - 5350 MHz is also allowed for outdoor usage I Danmark må frekvensbåndet 5150 - 5350 også anvendes udendørs France http://www.arcep.fr Italy http:// www.sviluppoeconomico.gov.it Latvia http://www.esd.lv Notes: List of national codes 271 Safety Warnings
298 pages 7.06 Mb
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.