ZyXEL Communications NBG6503 manuals
Computer Equipment > Network Router
When we buy new device such as ZyXEL Communications NBG6503 we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications NBG6503 begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Network Router ZyXEL Communications NBG6503 is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Network Router on our side using links below.
ZyXEL Communications NBG6503 Manual
240 pages 12.37 Mb
1 NBG6503User’s Guide 3 Contents Overview5 Table of Contents15 Getting to Know Your Router21 Connection Wizard2.1 Overview 2.2 Accessing the Wizard 22 2.3 Connect to Internet23 Internet Connection TypeNext Back LABEL 24 Table 4 Internet Connection Type: Static IP (continued)Subnet Mask Enter the IP subnet mask in this field Default Enter the gateway IP address in this field Gateway Primary DNS server Enter the primary DNS server's IP address in the fields provided Secondary DNS Enter the secondary DNS server's IP address in the fields provided Exit Click this to close the wizard screen without saving Back Click this to return to the previous screen Next Click this to continue Figure 8 Internet Connection Type: PPPoE 25 Table 5 Internet Connection Type: PPPoESelect the PPPoE option for a dial-upconnection Dynamic IP Select this radio button if your ISP did not assign you a fixed IP address User Name Type the user name given to you by your ISP Password Type the password associated with the user name above Refer to the appendix for more information on PPTP The Router supports one PPTP server connection at any given time Figure 9 Internet Connection Type: PPTP The following table describes the fields in this screen Table 6 Internet Connection Type: PPTP connection 26 Table 6 Internet Connection Type: PPTP (continued)PPTP Address Type the (static) IP address assigned to you by your ISP PPTP Subnet Type the subnet mask assigned to you by your ISP (if given) Mask PPTP Gateway Type the gateway IP address of the PPTP server PPTP Server IP Type the server IP address of the PPTP server Address Type the password associated with the User Name above The Router connects to the Internet Figure 10 Connecting to the Internet 27 2.4 Router Password2.5 Wireless Security28 Table 7 Wireless Security: No SecurityWireless Radio Select a wireless radio from the drop-downlist box the security setting for the wireless 5G band Wireless Network Name (SSID) order to access the network Security mode Select a Security level from the drop-downlist box within range Figure 13 Wireless Security: WPA-PSK/WPA2-PSK Table 8 Wireless Security: WPA-PSK/WPA2-PSK 29 Table 8 Wireless Security: WPA-PSK/WPA2-PSK(continued)Choose WPA-PSK or WPA2-PSK security to configure a Pre-SharedKey. Choose this option only if your wireless clients support WPA-PSKor WPA2-PSKrespectively password connection by configuring WPA in the wireless LAN screens Retype the password to confirm Figure 14 Congratulations You can also click GO to open the Easy Mode Web Configurator of your Router 31 Introducing the Web Configurator3.1 Overview 3.2Accessing the Web Configurator32 Chapter 3 Introducing the Web ConfiguratorThe Web Configurator initially displays the following login screen Figure 15 Login screen Table 9 Login screen Type "1234" (default) as the password Language Login Section 3.2.3.1 on page example 15:00 is 3:00 PM Figure 16 Change Password Screen 33 Table 10 Change Password ScreenIgnore Administrator Inactivity Timer Chapter 22 on page Logout You can also open this screen by clicking Home mode screens The Home screen displays as follows Figure 17 Home Screen Table 11 Home Screen Login 34 Table 11 Home Screen (continued)LABEL DESCRIPTION Click the icon to change the Weather display Figure 18 Change Weather Change Weather oC or oF Choose which temperature unit you want the Router to display Change Location choose one that is closest to it Finish Click this to apply the settings and refresh the date and time display Figure 19 Change Password Screen Table 13 Change Password Screen Change time zone Click this to apply the settings and refresh the weather display Note: You can also edit the timezone in Section 22.5 on page 35 3.3 Resetting the Router37 Monitor43 Router Modes45 Easy Mode6.1 Overview Network Map 46 Status Screen6.2 What You Can Do 6.3What You Need to Know 47 6.4 Navigation Panel6.5 Network Map 48 6.6 Control Panel49 Table 19 Control Panel (continued)Firewall Otherwise, switch OFF Refer to Section 6.6.5 on page 52 to see this screen Security your Router Refer to Section 6.6.6 on page 52 to see this screen Figure 32 Game Engine Game Console Bandwidth MGMT Turn this off if your network is not using gaming Click OK to close this screen 50 Table 20 Power SavingSelect the wireless radio to set its power saving settings WLAN Status WLAN Status Day and Except for the following times fields and fields Day Select Everyday or the specific days to turn the Wireless LAN on or off conjunction with the Except for the following times field conjunction with the field For the following times (24-Hour Format) is 18:00 Reset Click Reset to begin configuring this screen afresh 51 Figure 34 Content FilterContent Filter Add Click Add after you have typed a keyword Repeat this procedure to add other keywords. Up to 64 keywords are allowed Note: The Router does not recognize wildcard characters as keywords that the content filter is blocking this request from the text box after you click Apply Click Apply to save your changes Cancel Click Cancel to close this screen without saving any changes 52 HighLow Cancel Figure 36 Firewall 53 Figure 37 Wireless SecuritySelect the wireless radio to set its security setting Enter a descriptive name (up to 32 keyboard characters) for the wireless LAN Type a pre-sharedkey from 8 to 63 case-sensitivekeyboard characters Type the password again to confirm Click Cancel to close this screen Click this to configure the WPS screen Wireless Security another wireless device that supports WPS 54 Figure 38 Wireless Security: WPSTable 23 Wireless Security: WPS Click this to go back to the Wireless Security screen Create a secure wireless network simply by pressing a button information synchronization WPS minutes Register Identification Number) in the Router’s interface and pushing this button Click Exit to close this screen 55 6.7 Status Screen in Easy Mode57 Router Mode7.1 Overview 7.2 What You Can Do 58 7.3 Status Screen59 Table 25 Status Screen Icon Key: Router Mode (continued)Click this icon to see the Configuration navigation menu Click this icon to see the Maintenance navigation menu The following table describes the labels shown in the Status screen Table 26 Status Screen: Router Mode Click this at any time to exit the Web Configurator Device Information Host Name System Name identification purposes Firmware Version This is the firmware version and the date created Sys OP Mode Router Mode WAN Information - MAC Address This shows the WAN Ethernet adapter MAC Address of your device - IP Address This shows the WAN port’s IP address - IP Subnet Mask This shows the WAN port’s subnet mask - Default Gateway This shows the WAN port’s gateway IP address - DHCP This shows the LAN port’s DHCP role - Client or Server LAN Information This shows the LAN Ethernet adapter MAC Address of your device This shows the LAN port’s IP address This shows the LAN port’s subnet mask This shows the LAN port’s DHCP role - Server or None WLAN 2.4G Information - WLAN OP Mode - Access Point Mode This shows the wireless adapter MAC Address of your device - SSID This shows a descriptive name used to identify the Router in the wireless LAN - Channel - Security This shows the level of wireless security the Router is using WLAN 5G Information System Status Item This column shows the type of data the Router is recording Data This column shows the actual data recorded by the Router System Up Time 60 Table 26 Status Screen: Router Mode (continued)Current Date/Time This field displays your Router’s present date and time System Resource - CPU Usage should turn off other applications (for example, using bandwidth management.) - Memory Usage This shows what percentage of the heap memory the Router is using System Setting - Firewall This shows whether the firewall is enabled or not - Bandwidth This shows whether the bandwidth management is enabled or not Management - UPnP This shows whether UPnP is enabled or not - Configuration Mode This shows the web configurator mode you are viewing - Expert Interface Status Interface This displays the Router port types. The port types are: WAN, LAN and WLAN connected) For the WLAN, it displays Up when the WLAN is enabled or Down when the WLAN is disabled Rate A when the WLAN is disabled Summary BW MGMT Monitor the network are using DHCP Table this screen to view current DHCP client information Packet Statistics Use this screen to view port status and packet specific statistics WLAN Station Status to the Router 61 Use the sub-menuson the navigation panel to configure Router featuresFigure 42 Navigation Panel: Router Mode The following table describes the sub-menus Table 27 Navigation Panel: Router Mode LINK TAB FUNCTION MONITOR CONFIGURATION 62 Table 27 Navigation Panel: Router Mode (continued)63 MAINTENANCE65 Access Point Mode8.1 Overview 8.2What You Can Do 8.3What You Need to Know 68 8.4 AP Mode Status Screen69 Chapter 8 Access Point ModeTable 28 Status Screen: Access Point Mode (continued) This shows the channel number which you select manually should turn off other applications (for example, using bandwidth management 70 8.5 LAN Screen71 Table 29 Network > LAN > IPGet from DHCP Click this to deploy the Router as an access point in the network Server Internet if the IP address is given by the ISP) Use Defined LAN IP Address change the IP address you will have to log in again with the new IP address IP Subnet Mask you are implementing subnetting, use the subnet mask computed by the Router Gateway IP First DNS Second DNS the ISP assigns after you click Apply server, you must know the IP address of a computer in order to access it Click Apply to save your changes to the Router Click Reset to reload the previous configuration for this screen 73 Tutorials9.1 Overview 9.2Connecting to the Internet from an Access Point 9.3 Configuring Wireless Security Using WPS 77 9.4 Enabling and Configuring Wireless Security (No WPS)78 Interface StatusFigure 53 Tutorial: Checking Wireless Settings Start > Programs 4Select SSID_Example3 and click Connect Figure 54 Connecting a Wireless Client to a Wireless Network t 79 TheConfirm Save Save Figure 57 Link Status http://www.zyxel.com 83 Wireless LAN10.1 Overview 10.2What You Can Do 84 10.3What You Should Know86 10.4 General Wireless LAN 2.4G/5G Screen87 Chapter 10 Wireless LANTable 31 Network > Wireless LAN 2.4G/5G > General (continued) Channel Set the operating frequency/channel depending on your particular region Selection band and the country you are in only available if Auto Channel Selection is disabled Operating This displays the channel the Router is currently using Security Mode Select WEP, WPA, WPA2, WPA-PSK or WPA2-PSK to add security on this wireless appears in this screen. See 10.4.2, and 10.4.3 sections No Security authentication No Security Static WEP WPA-PSK WPA2 PSK are available in this field Figure 60 Network > Wireless LAN 2.4G/5G > General: No Security 88 Table 32 Network > Wireless LAN 2.4G/5G > General: No SecurityTable 31 on page Network Wireless LAN 2.4G Wireless LAN 5G Static WEP Figure 61 Network > Wireless LAN 2.4G/5G > General: Static WEP 89 The following table describes the wireless LAN security labels in this screenTable 33 Network > Wireless LAN 2.4G/5G > General: Static WEP Select Static WEP to enable data encryption PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate all devices wishing to connect to a wireless network WEP Encryption Select 64-bitWEP or 128-bitWEP Select This dictates the length of the security key that the network is going to use Authentication Select Auto or Shared Key from the drop-downlist box Method communication between the wireless client and the Router occurs ASCII Select this option in order to enter ASCII characters as WEP key Hex Select this option in order to enter hexadecimal characters as a WEP key Key 1 to Key the same WEP key for data transmission ("0-9", "A-F") 90 10.5 MAC Filter91 10.6 Wireless LAN Advanced Screen92 . The screen appears as shownFigure 64 Network > Wireless LAN > Advanced Table 36 Network > Wireless LAN 2.4G/5G > Advanced RTS/CTS Threshold (Clear To Send) handshake Fragmentation the maximum data fragment size that can be sent. Enter an even number Enable Intra BSS Traffic cannot communicate with each other Output Power the following 100%, 90%, 75%, 50%, 25%, 10% or Minimum. See the product specifications for more information on your Router’s output power Network Mode (Wireless LAN to associate with the Router 2.4G) Select 11b/g/n mixed mode to allow IEEE802.11b, IEEE802.11g and IEEE802.11n compliant WLAN devices to associate with the Router 93 10.7 Quality of Service (QoS) Screen94 10.8 WPS Screen95 10.9 WPS Station Screen96 10.10 Scheduling Screen97 10.11 WDS Screen98 Table 41 Network > Wireless LAN 2.4G > WDSWDS Setup Basic Settings Select the operating mode for your Router AP + Bridge bridge mode. The Router can establish up to five wireless links with other APs Local MAC This is the MAC address of your Router Phy Mode during data transmission Remote MAC connection with You can connect to up to 4 peer devices EncrypType Otherwise, select No Security EncrypKey Click Apply to save your changes to Router 99 WAN11.1 Overview 11.2What You Can Do 11.3What You Need To Know 102 11.4 Internet Connection103 IP SubnetEnter the IP Subnet Mask in this field Enter a Gateway IP Address (if your ISP gave you one) in this field MTU Size Router can receive and process WAN DNS Assignment None after you click Apply WAN MAC manually entering a MAC address Factory default Select Factory default to use the factory assigned default MAC Address Clone the computer’s computer on the LAN whose MAC you are cloning MAC address Set WAN MAC Select this option and enter the MAC address you want to use PPP over Ethernet 104 This screen displays when you select PPPoE encapsulationFigure 73 Network > WAN > Internet Connection: PPPoE Encapsulation Table 43 Network > WAN > Internet Connection: PPPoE Encapsulation Select PPP over Ethernet if you connect to your Internet via dial-up Retype to Type your password again to make sure that you have entered is correctly Confirm Nailed-Up Select Nailed-UpConnection if you do not want the connection to time out Idle Timeout (sec) disconnects from the PPPoE server 105 Table 43 Network > WAN > Internet Connection: PPPoE Encapsulation (continued)Get automatically My WAN IP First DNS Server Select From ISP if your ISP dynamically assigns DNS server information (and the address that the ISP assigns choice to User-Defined,and enter the same IP address, the second User-Defined changes to None after you click Apply computer’s MAC the computer on the LAN whose MAC you are cloning address - IP 106 This screen displays when you select PPTP encapsulationFigure 74 Network > WAN > Internet Connection: PPTP Encapsulation Table 44 Network > WAN > Internet Connection: PPTP Encapsulation PPP connection and the PPTP parameters for a PPTP connection 107 Table 44 Network > WAN > Internet Connection: PPTP Encapsulation (continued)Nailed-up disconnects from the PPTP server PPTP Configuration Server IP Type the IP address of the PPTP server Select this to get your WAN IP address from your ISP 108 11.5 Advanced WAN Screen109 LAN113 DHCP Server117 Network Address Translation (NAT)14.1 Overview 14.2What You Can Do 118 14.3 General NAT Screen14.4 NAT Application Screen119 Network > NATDefault Server IP address NAT > General Table 51 Network > NAT > Application Add Application Rule Active host with a specified internal IP address to delete the entry and Port fields spaces, such as 123,567 specified in the Port field 120 14.5 NAT Advanced Screen121 Note: Only one LAN computer can use a trigger port (range) at a timeFigure 85 Network > NAT > Advanced Table 52 Network > NAT > Advanced This is the rule index number (read-only) permitted - including spaces Incoming client computer on the LAN that requested the service Start Port Type a port number or the starting port number in a range of port numbers End Port Type a port number or the ending port number in a range of port numbers Trigger 122 The following is an example of trigger port forwardingFigure 86 Trigger Port Forwarding Process: Example Router 1Jane requests a file from the Real Audio server (port 7070) 3The Real Audio server responds using a port number ranging between 4The Router forwards the traffic to Jane’s computer IP address 123 Dynamic DNS15.1 Overview 15.2 What You Can Do 15.3 What You Need To Know 15.4 Dynamic DNS Screen124 Chapter 15 Dynamic DNSTable 53 Network > DDNS Enable Select this check box to use dynamic DNS Dynamic DNS Service Select the name of your Dynamic DNS service provider Provider separated by a comma (",") Enter your user name Enter the password assigned to you 125 Static Route16.1 Overview 16.2 What You Can Do 126 16.3 IP Static Route Screen127 Chapter 16 Static RouteDestination always based on network number same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations This is the number assigned to the route asking you to confirm that you want to delete the route 129 Firewall17.1 Overview 17.2What You Can Do 130 17.3 What You Need To Know17.4 General Firewall Screen 131 17.5 Services Screen132 Table 56 Security > Firewall > Services (continued)Enable Firewall Rule Rule below) Enter a name that identifies or describes the firewall rule Enter the MAC address of the computer for which the firewall rule applies entering The Router applies the firewall rule to traffic initiating from this computer Source IP Protocol want to apply the firewall rule Dest Port Range port 80 defines web traffic Source Port 80 defines web traffic Click Add to save the firewall rule Firewall Rule in turn This is a name that identifies or describes the firewall rule This is the MAC address of the computer for which the firewall rule applies initialized TCP port 80 defines web traffic Action Drop - Traffic matching the conditions of the firewall rule are stopped Click this to remove the firewall rule See Appendix D on page 223 for commonly used services and port numbers 133 Content Filter18.1 Overview 18.2 What You Can Do 18.3 What You Need To Know 134 18.4 Content Filter Screen135 Table 57 Security > Content Filter > Content Filter (continued)Cookies Used by Web servers to track usage and provide service based on ID Web Proxy Enable URL Keyword Blocking keyword in the domain name or IP address will be blocked, e.g., URL http: not allowed. You can also enter a numerical IP address Keyword List This list displays the keywords already added Clear All Click this button to remove all of the listed keywords Click Reset to begin configuring this screen afresh 137 Bandwidth Management19.1 Overview 19.2What You Can Do 138 19.3 What You Need To Know19.4 General Screen 19.5 Advanced Screen140 Table 59 Management > Bandwidth Management > AdvancedManagement Bandwidth Upstream dedicate to uplink traffic This is traffic from LAN/WLAN to WAN Downstream This is traffic from WAN to LAN/WLAN Application List This is the number of an individual bandwidth management rule Priority Select a priority from the drop down list box. Choose High, Mid or Low the variations in delay) important business traffic that can tolerate some delay allowed but that should not affect other applications and users Category This is the category where a service belongs This is the name of the service Select the check box to have the Router apply this bandwidth management rule Setting User-defined you specify Select this check box to have the Router apply this bandwidth management rule Direction Select TO WAN to apply bandwidth management to traffic from LAN/WLAN to WAN Enter a descriptive name for the bandwidth management rule Rule Configuration more information 141 Application ListFigure 97 Bandwidth Management Rule Configuration: Application List Table 60 Bandwidth Management Rule Configuration: Application List managed by bandwidth management Select Maximum Bandwidth or Minimum Bandwidth and specify the maximum or minimum bandwidth allowed for the rule in kilobits per second Destination Port See Appendix D on page 223 for some common services and port numbers defines web traffic This is the protocol (TCP, UDP or user-defined)used for the service Click Cancel to exit this screen without saving 142 User-definedService Figure 98 Bandwidth Management Rule Configuration: User-definedService The following table describes the labels in this screen Table 61 Bandwidth Management Rule Configuration: User-definedService BW Budget Enter the IP address of the destination computer computer Subnet management rule applies Source Address Source Subnet applies applies. For example, ICMP for ping traffic 143 19.6 Monitor Screen145 Remote Management147 Universal Plug-and-Play(UPnP)21.1 Overview 21.2 What You Can Do 21.3 What You Need to Know 148 21.4 UPnP Screen21.5 Technical Refereance 155 Maintenance165 Troubleshooting171 IP Addresses and Subnetting181 Setting Up Your Computer’s IP Address209 Wireless LANs223 Common Services227 Legal Information228 注意230 [Czech]příslušnými ustanoveními směrnice 1999/5/EC [Danish] krav og øvrige relevante krav i direktiv 1999/5/EF [German] 1999/5/EU befindet [Estonian] ja nimetatud direktiivist tulenevatele teistele asjakohastele sätetele English Hereby, ZyXEL declares that this equipment is in compliance with the essential requirements and other relevant provisions of Directive 1999/5/EC [Spanish] [Greek] ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ ZyXEL ΔΗΛΩΝΕΙ ΟΤΙ εξοπλισμός ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ [French] essentielles et aux autres dispositions pertinentes de la directive 1999/5/EC [Italian] alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE [Latvian] citiem ar to saistītajiem noteikumiem [Lithuanian] Direktyvos nuostatas [Dutch] eisen en de andere relevante bepalingen van richtlijn 1999/5/EC 231 [Maltese]provvedimenti oħrajn relevanti li hemm fid-Dirrettiva1999/5/EC [Hungarian] Alulírott, ZyXEL nyilatkozom, hogy a berendezés megfelel a vonatkozó alapvetõ követelményeknek és az 1999/5/EK irányelv egyéb elõírásainak [Polish] Niniejszym ZyXEL oświadcza, że sprzęt jest zgodny z zasadniczymi wymogami oraz pozostałymi stosownymi postanowieniami Dyrektywy 1999/5/EC [Portuguese] disposições da Directiva 1999/5/EC [Slovenian] določili direktive 1999/5/EC [Slovak] ustanovenia Smernice 1999/5/EC [Finnish] vaatimusten ja sitä koskevien direktiivin muiden ehtojen mukainen [Swedish] [Bulgarian] изисквания и другите приложими разпоредбите на Директива 1999/5/ЕC [Icelandic] viðeigandi ákvæði tilskipunar 1999/5/EC [Norwegian] andre relevante bestemmelser I direktiv 1999/5/EF [Romanian] esenţiale şi alte prevederi relevante ale Directivei 1999/5/EC 232 Overview of Regulatory Requirements for Wireless LANsBelgium Denmark In Denmark, the band 5150 - 5350 MHz is also allowed for outdoor usage I Danmark må frekvensbåndet 5150 - 5350 også anvendes udendørs France http://www.arcep.fr Italy 233 http:// www.sviluppoeconomico.gov.itLatvia http://www.esd.lv Notes: List of national codes 234 •Make sure to connect the cables to the correct ports•Use ONLY an appropriate power adaptor or cord for your device •If the power adaptor or cord is damaged, remove it from the power outlet 236 111, 11859 60 238 SSID 53, 59, 69, 84111 89 169 239 WWW143
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.