ZyXEL Communications wireless n gigabit netusb router manuals
Computer Equipment > Network Router
When we buy new device such as ZyXEL Communications wireless n gigabit netusb router we often through away most of the documentation but the warranty.
Very often issues with ZyXEL Communications wireless n gigabit netusb router begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Network Router ZyXEL Communications wireless n gigabit netusb router is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Network Router on our side using links below.
ZyXEL Communications wireless n gigabit netusb router Manual
360 pages 8.14 Mb
1 IP Addresshttp://192.168.1.1 Password Copyright © ZyXEL Communications Corporation 3 About This User's GuideWhen reading a ZyXEL User’s Guide On-Screen,keep the following in mind: Embedded hyperlinks are actually •Quick Start Guide •Support Disc Refer to the included CD for support documents 4 boldMaintenance > Log > Log Setting Log Log Setting 6 Safety Warnings7 Contents Overview9 About This User's GuideDocument Conventions Contents Overview Table of Contents Chapter Connection Wizard 10 Introducing the Web ConfiguratorNBG4615 Modes Easy Mode 11 8.6.1 Game Engine8.6.2 Power Saving 8.6.3 Content Filter 8.6.4 Bandwidth MGMT 8.6.5 Firewall 8.6.6 Wireless Security 8.6.7 WPS 8.7 Status Screen in Easy Mode 9.2 Router Mode Status Screen 9.2.1 Navigation Panel 10.3 What You Need to Know 10.3.1 Setting your NBG4615 to AP Mode 10.3.2 Accessing the Web Configurator in Access Point Mode 10.3.3 Configuring your WLAN, Bandwidth Management and Maintenance Settings 11.3 What You Need to Know 11.4 Setting your NBG4615 to Universal Repeater Mode 11.5 Universal Repeater Mode Status Screen 11.6 Universal Repeater Screen 11.6.1 No Security 11.6.2 Static WEP 11.6.3 WPA(2)-PSK 12 Connecting the NBG4615 (in Universal Repeater Mode) to an AP or Wireless Router14 20.5.1 NATPort Forwarding: Services and Port Numbers15 26.5.1 Rule Configuration: Application Rule Configuration26.5.2 Rule Configuration: User Defined Service Rule Configuration 16 28.4.1 Using UPnP in Windows XP Example28.4.2 Web Configurator Easy Access 17 H Open Software Announcements21 WiredWireless NetUSB 22 FigureLAN WAN USB WLAN/WPS Power Table LED COLOR STATUS DESCRIPTION 23 Table 1 Front panel LEDs and WPS button (continued)24 For more information on using WPS, see Section 14.2 on page25 2Connect a USB device to the USB port on the NBG4615To install the ZyXEL NetUSB Share Center Utility: 1Insert the disc that came with your NBG4615 into your computer’s disc drive Run the Setup 27 The following table describes the icons in this windowTable 2 ZyXEL NetUSB Share Center Utility Main Window Icons ICONDESCRIPTION Configure Server Chapter 5 on page Auto-ConnectPrinter Auto-Connect Printer Chapter 14 on page Connect Disconnect Request to Connect Network Scanner This section describes the utility’s menus Figure 3 ZyXEL NetUSB Share Center Utility Menus 28 The following table describes the menus in this screenTable 3 ZyXEL NetUSB Share Center Utility Main Screen Menus MENU ITEM Note: If the computer is connecting to the shared USB printer for the first time you need to click Connect and setup the printer before you can use the Auto-ConnectPrinter function. See function. See Chapter 14 on page 121 for more details Note: You first must install the appropriate drivers for the printer that you intend to use 29 You can open it by clicking the Tools > Configuration menu commandFigure 4 ZyXEL NetUSB Share Center Utility Configuration Window The following table describes the labels in this window Table 4 ZyXEL NetUSB Share Center Utility Configuration Window LABEL Tools Auto-Connect Printer List Connect Auto-Connect Printer 30 System > Exit31 Exit33 LanguageConnect to Internet Figure 6 Welcome 34 L2TPFigure 8 Internet Connection Type CONNECTION TYPE 35 Internet Connection TypeFigure 9 Internet Connection Type: DHCP Next Back Figure 10 Internet Connection Type: Static IP Table 7 Internet Connection Type: Static IP 36 Table 7 Internet Connection Type: Static IP (continued)Figure 11 Internet Connection Type: PPPoE 37 Table 8 Internet Connection Type: PPPoEPPPoE Refer to the appendix for more information on PPTP The NBG4615 supports one PPTP server connection at any given time Figure 12 Internet Connection Type: PPTP 38 The following table describes the fields in this screenTable 9 Internet Connection Type: PPTP Figure 13 Internet Connection Type: L2TP Table 10 Internet Connection Type: L2TP L2TP 39 Table 10 Internet Connection Type: L2TP (continued)The NBG4615 connects to the Internet Figure 14 Connecting to the Internet 41 Table 11 Wireless Security: No SecurityWireless Network LAN Name (SSID) same SSID in order to access the network Security mode Select a Security level from the drop-downlist box Choose No Security to have no wireless LAN security configured. If you do not wireless networking device that is within range Figure 17 Wireless Security: WPA-PSK/WPA2-PSK Table 12 Wireless Security: WPA-PSK/WPA2-PSK password wireless connection by configuring WPA in the wireless LAN screens 42 Easy Mode43 Chapter 4 on page44 Chapter 5 Introducing the Web ConfiguratorThe Web Configurator initially displays the following login screen Figure 19 Login screen Table 13 Login screen Type "1234" (default) as the password Login specify in Section 5.2.3.1 on page 24-hourformat, for example 15:00 is 3:00 PM Figure 20 Change Password Screen 45 Administrator Inactivity TimerLogout Home 46 Table 15 Home Screen (continued)LABEL DESCRIPTION Section 5.2.3.2 on page Section 29.5 on page Click the icon to change the Weather display Figure 22 Change Weather Table 16 Change Weather oC or oF Choose which temperature unit you want the NBG4615 to display Change Location is not listed, choose one that is closest to it Finish Click this to apply the settings and refresh the date and time display Figure 23 Change Password Screen Table 17 Change Password Screen to display Click this to apply the settings and refresh the weather display Note: You can also edit the timezone in Section 29.5 on page 47 RESET49 Expert Modeopen all Summary Use the Section 6.3 on page BW MGMT Monitor Section 6.4 on page DHCP Table Section 6.5 on page use the Packet Statistics Section 6.6 on page Section 6.7 on page 50 View LogDisplay Log Settings Clear Figure 24 View Log 51 The bandwidth is measured in kilobytes per second (kbps)Figure 26 Summary: BW MGMT Monitor DHCP Table (Details...) MAC 52 Address, IP AddressExpiration time Figure 27 Summary: DHCP Table Table 18 Summary: DHCP Table #This is the index number of the host computer MAC Address field Every Ethernet device has a unique MAC (Media Access Control) address which of six pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02 This field displays the IP address relative to the # field listed above Expires in Refresh Click Refresh to renew the screen 53 Packet Statistics (Details...)Poll Interval(s) Figure 28 Summary: Packet Statistics Table 19 Summary: Packet Statistics Poll Interval(s) field Stop 54 WLAN Station Status (Details...)Association List 55 Web Configurator modeDevice mode Easy Access Point WISP WISP + UR 56 Chapter 7 NBG4615 ModesThe menu for changing device modes is available in Expert mode only Note: Choose your Device Mode carefully to avoid having to change it later 58 Chapter 8 Easy ModeClick Status to open the following screen Figure 31 Easy Mode: Status Screen You can do the following in this mode: Use this Navigation Panel Section 8.4 on page Network Map Section 8.5 on page Control Panel Status Screen Section 8.7 on page Control Panel Section 8.6 on page •Router Mode: All Control Panel features are available •Access Point Mode: Only Power Saving and Wireless Security are available : Only and are available Universal Repeater Mode Game Console Bandwidth MGMT •WISP + UR Mode: All Control Panel features are available 59 Section 8.6 on page60 The features configurable in Easy Mode are shown in the Control PanelFigure 34 Control Panel OFF Table 22 Control Panel OFF OFF 61 Game ConsoleBandwidth Mgmt 62 Table 23 Power SavingWLAN Status Select On or Off to specify whether the Wireless LAN is turned on or off conjunction with the Day and For the following times fields Day Select Everyday or the specific days to turn the Wireless LAN on or off conjunction with the For the following times field For the following Select a begin time using the first set of hour and minute (min) drop down times (24-Hour Format) drop down boxes. If you have chosen On earlier for the WLAN Status the have chosen Off earlier for the WLAN Status the Wireless LAN will turn off between the two times you enter in these fields 6:00 PM is 18:00 Reset Click Reset to begin configuring this screen afresh 64 HighLow Cancel Figure 38 Bandwidth MGNT Figure 39 Firewall Firewall 65 Figure 40 Wireless SecurityNetwork Name (SSID) the wireless LAN Select WPA-PSK or WPA2-PSK to add security on this wireless network. The appears in this screen Select No Security to allow any client to connect to this network without authentication This field appears when you choose wither WPA-PSK or WPA2-PSK as the security mode Type a pre-sharedkey from 8 to 63 case-sensitivekeyboard characters Type the password again to confirm Click Cancel to close this screen WPS Click this to configure the WPS screen to another wireless device that supports WPS 66 Figure 41 Wireless Security: WPSTable 26 Wireless Security: WPS Click this to go back to the Wireless Security screen Create a secure wireless network simply by pressing a button wireless security information synchronization WPS button in the wireless station utility within 2 minutes. To add the second wireless station, you have to press these buttons on both device and the wireless station again after the first 2 minutes Register Create a secure wireless network simply by entering a wireless client's PIN (Personal Identification Number) in the NBG4615’s interface and pushing this button Register to associate to each other and perform the wireless security information synchronization Click Exit to close this screen 67 Table 27 Status Screen in Easy ModeMaintenance > General 68 LAN1LAN4 Modem Status 69 Chapter 9 Router ModeClick to open the status screen Figure 44 Status Screen: Router Mode The following table describes the icons shown in the Status screen Table 28 Status Screen Icon Key: Router Mode ICON Click this at any time to exit the Web Configurator Click this to go to the Home page. See Chapter 6 on page Click this icon to view copyright and a link for related product information Click this icon to go to Easy Mode. See Chapter 8 on page statistics Click this button to refresh the status screen statistics 70 Table 28 Status Screen Icon Key: Router Mode (continued)Monitor Maintenance Router Mode Client Configured Unconfigured Network > Wireless LAN > WPS 71 Table 29 Status Screen: Router Mode (continued)System Status Item This column shows the type of data the NBG4615 is recording Data This column shows the actual data recorded by the NBG4615 Current Date/Time This field displays your NBG4615’s present date and time System Resource - CPU Usage This displays what percentage of the NBG4615’s processing ability is currently to have more throughput, you should turn off other applications (for example using bandwidth management.) - Memory Usage This shows what percentage of the heap memory the NBG4615 is using System Setting - Firewall This shows whether the firewall is enabled or not - Bandwidth This shows whether the bandwidth management is enabled or not Management - UPnP This shows whether UPnP is enabled or not - Configuration Mode This shows the web configurator mode you are viewing - Expert IPv6 Status This shows the type of IPv6 connection that is currently in use This shows the NBG4615’s LAN IPv6 link local address Summary BW MGMT Monitor page 51). Use this screen to view the amount of network bandwidth that applications running in the network are using DHCP Table 51). Use this screen to view current DHCP client information Packet Statistics page 53). Use this screen to view port status and packet specific statistics WLAN Station Status on page 54). Use this screen to view the wireless stations that are currently associated to the NBG4615 Interface Status Interface or connected) is disabled Rate line is disconnected For the WAN port, it displays the port speed and duplex setting if you’re using Ethernet encapsulation. This field displays N/A when the line is disconnected For the WLAN, it displays the maximum transmission rate when the WLAN is enabled and N/A when the WLAN is disabled 72 Use the sub-menuson the navigation panel to configure NBG4615 featuresFigure 45 Navigation Panel: Router Mode The following table describes the sub-menus Table 30 Navigation Panel: Router Mode LINK TAB FUNCTION MONITOR CONFIGURATION 73 Table 30 Navigation Panel: Router Mode (continued)74 MAINTENANCE76 Maintenance > Sys OP Mode > GeneralAccess Point mode 77 Start > RunSection on page 78 to open the Status screenStatus Screen: Access Point Mode Access Point Mode None 79 Chapter 10 Access Point ModeTable 31 Status Screen: Access Point Mode (continued) using bandwidth management This displays the NBG4615 port types. The port types are: LAN and WLAN 80 NavigationNetwork > LAN 81 The table below describes the labels in the screenTable 32 Network > LAN > IP User Defined 83 Wireless LAN > AP ClientIgnore Maintenance > Sys OP Mode 85 The following table describes the labels shown in the Status screenTable 33 Status Screen: Universal Repeater Mode Universal Repeater Mode WLAN OP Mode wireless LAN is set - Universal Repeater Mode This shows the current status of the Wireless LAN - ON Channel This shows the channel number which you select manually or the NBG4615 automatically scans and selects Operating Channel Security Mode 802.11 Mode the SSID and MAC address of the AP or wireless router in this field CPU Usage Memory Usage 86 Table 33 Status Screen: Universal Repeater Mode (continued)Configuration Mode For the LAN ports, this displays the port speed or N/A when the line is disconnected Figure 56 Menu: Universal Repeater Mode Configuration > Wireless LAN > Universal Repeater Universal Repeater 87 Wireless LAN > GeneralUniversal Repeater Parameters Enable Select this option to have the NBG4615 connect to the specified access point SSID Enter the name of the access point to which you are connecting Enter the MAC address of the access point to which you are connecting (Optional) encryption 88 Table 35 Universal Repeater Mode: Wireless LAN > Universal Repeater: Static WEPSelect Static WEP if the access point to which you want to connect uses WEP data encryption Encryption Type Select Open or Shared Key from the drop-downlist box key verification before communication between the wireless client and the NBG4615 occurs Select Shared Key to force the clients to provide the WEP key prior to communication WEP Key Title WEPKey Default Select a default WEP key to use for data encryption WEP Key 1 WEP Key must use the same WEP key for data transmission "a-f"and "0-9"(for example, 11AA22BB33) for a 64-bitor 128-bitWEP key respectively time 89 Table 36 Universal Repeater Mode: Wireless LAN > Universal Repeater: WPA(2)-PSKuses WPA-PSKor WPA2-PSK want to connect Pre-SharedKey Click Reset to reload the previous configuration for this screen 90 Monitor91 WISP Mode93 Table 37 Status Screen: WISP Mode (continued)WISP Mode wireless LAN is set - WISP Mode - Connect Status point - Associated or Disassociated point 94 displays N/A when the line is disconnected95 Configuration > Wireless LAN > GeneralFigure 65 WISP Mode: Wireless LAN > General Table 38 WISP Mode: Wireless LAN > General WISP Parameters Selection a channel. The device will automatically select the channel with the least interference Select the security mode of the access point to which you want to connect Table 39 No Security (WISP) Select No Security in this field 96 Table 39 No Security (WISP) (continued)Table 40 WEP (WISP) Select Static WEP to enable data encryption PassPhrase Enter a Passphrase (up to 26 printable characters) and click Generate A passphrase functions like a password. In WEP security mode, it is further Select 64-bitWEP or 128-bitWEP Encryption This dictates the length of the security key that the network is going to use ASCII Select this option in order to enter ASCII characters as WEP key Hex Select this option in order to enter hexadecimal characters as a WEP key 97 Table 40 WEP (WISP) (continued)Key 1 to Key The WEP keys are used to encrypt data. Both the NBG4615 and the wireless stations must use the same WEP key for data transmission characters ("0-9", "A-F") If you chose 128-bitWEP, then enter 13 ASCII characters or 26 hexadecimal The default key is key Table 41 WPA-PSK/WPA2-PSK(WISP) The range of radio frequencies used by IEEE 802.11b/g/n wireless devices is Select WPA-PSK or WPA2-PSK to enable data encryption WPA-PSK/WPA2-PSK uses a simple common password for authentication Type the pre-sharedkey employed by the access point to which you want to connect 98 Configuration > Site SurveyFigure 69 Configuration > Wireless LAN > Site Survey (WISP) Table 42 Configuration > Wireless LAN > Site Survey (WISP) Station Site Survey you can add the selected wireless device to a profile and then enable it This displays the SSID of the wireless device is connecting to it BSSID This displays the MAC address of the wireless device Signal Strength on the antenna output power and the distance between your NBG4615 and this device This displays the channel number used by this wireless device station encryp This displays the data encryption method used by this wireless device station auth This displays the authentication method used by this wireless device Network Type Rescan and update this table Setting Select a wireless device and click this button to add it to a profile 101 WISP + UR Mode Mode102 Table 43 Status Screen: WISP + UR ModeWISP + UR Mode 103 Table 43 Status Screen: WISP + UR Mode (continued)105 This chapter provides tutorials for setting up your NBG4615•Set Up a Wireless Network with WPS •Configure Wireless Security without WPS •Using Multiple SSIDs on the NBG4615 Connecting the NBG4615 (in Universal Repeater Mode) to an AP or Wireless Router •Connecting to USB Storage with the ZyXEL NetUSB Share Center Utility •Automatically Connecting to a USB Printer Push Button Configuration (PBC) Section 14.2.1 on page PIN Configuration Section 14.2.2 on page Make sure that your NBG4615 is turned on. Make sure the Start 106 Chapter 14 TutorialsLog into NBG4615’s Web Configurator and press the Push Button Configuration > Network > Wireless Client > WPS Station Figure 75 Example WPS Process: PBC Method WITHIN 2 MINUTES SECURITY INFO COMMUNICATION 107 WPS StationWireless Client 108 Follow the steps below to configure the wireless settings on your NBG46151Make sure the WLAN switch (at the back panel of the NBG4615) is set to ON Open the 3Confirm that the status of wireless LAN is ON Enter SSID_Example3 Channel-06 Go to the screen. Set security mode to and enter in the field. Click 109 Interface StatusStart > Programs 110 ConnectConfirm Save Save 111 http://www.zyxel.comNetwork > Wireless LAN > General 112 SSID_WorkerSSID_VoIP SSID_Guest SSID SECURITY TYPE KEY MAC FILTERING 113 Configuration > Network > Wireless LAN > GeneralEnable Intra-BSS Traffic SSID_Worker SSID_Guest SSID_Worker 114 SSID_GuestSSID_VoIP 115 MAC FilterAllow Policy Add a station Mac Address 117 Wireless LAN > General118 SummaryMonitor > WLAN Station Status 119 ZyXEL NetUSB Sharing Center Utility120 DisconnectRequest to Connect Accept Exit Chapter 3 on page 121 Install the ZyXEL NetUSB Share Center Utility to your computer. See2Connect a USB printer to one of the USB ports of the NBG4615 Connect menu and select from the menu 126 Chapter 15 Wireless LANSection 15.5 on page QoS Section 15.6 on page Section 15.7 on page Section 15.8 on page Scheduling Section 15.9 on page WDS Section 15.10 on page Every wireless network must follow these basic guidelines •If two wireless networks overlap, they should use different channels 127 •In the AP: this feature is called a local user database or a local database•In a RADIUS server: this is a server used in businesses more than in homes page Table 44 Types of Encryption for Each Type of Authentication NO AUTHENTICATION RADIUS SERVER Weakest Strongest 128 WPA129 ApplyFigure 78 Guest Wireless LAN Network 130 600 kbps300 kbps 100 kbps Click Network > Wireless LAN to open the General screen 131 The following table describes the general wireless LAN labels in this screenTable 45 Network > Wireless LAN > General Name(SSID) on a typical English language keyboard) for the wireless LAN the NBG4615. This allows you to use one access point to provide several BSSs simultaneously. You can then assign varying security types to different SSIDs Hide cannot obtain the SSID through scanning using a site survey tool Enable Intra BSS Traffic (AP) other. When Intra-BSSis disabled, wireless clients can still access the wired network but cannot communicate with each other Enable Guest Select the check box to activate guest wireless LAN Note: Only Router mode supports guest WLAN. AP mode, Universal Repeater mode, and WISP mode don’t support guest WLAN address IP Subnet Type the subnet mask for the guest wireless LAN Mask Select this to turn on bandwidth management for the Guest WLAN network for Guest Maximum Set the operating frequency/channel depending on your particular region frequency band and the country you are in Refer to the Connection Wizard chapter for more information on channels. This option is only available if Auto Channel Selection is disabled Auto Channel channel using the Channel Section field Operating This displays the channel the NBG4615 is currently using Communication between SSIDs. Do not select the check box if you do not want to enable this function wireless clients with different SSIDs 132 Figure 81 Network > Wireless LAN > Security: No SecurityTable 46 Network > Wireless LAN > Security: No Security 133 Select Static WEP from the Security Mode listfrom the list Figure 82 Network > Wireless LAN > Security: Static WEP converted by the NBG4615 into a complicated string that is referred to as the “key”. This key is requested from all devices wishing to connect to a wireless network WEP Encryption Select 64-bits or 128-bits Authentication Select Auto or Shared Key from the drop-downlist box Method 134 Table 47 Network > Wireless LAN > Security: Static WEP (continued)Select WPA-PSK or WPA2-PSK from the Security Mode list Figure 83 Network > Wireless LAN > Security: WPA-PSK/WPA2-PSK Table 48 Network > Wireless LAN > Security: WPA-PSK/WPA2-PSK Security Mode 135 Figure 84 Network > Wireless LAN > MAC FilterThe following table describes the labels in this menu Table 49 Network > Wireless LAN > MAC Filter Access Policy Select the SSID for which you want to configure MAC filtering Policy MAC Address Select Disable to deactivate the MAC filtering rule you configure below Select Allow to permit access to the NBG4615, MAC addresses not listed will be denied access to the NBG4615 Select Reject to block access to the NBG4615, MAC addresses not listed will be allowed to access the NBG4615 Add a station Mac Address the NBG4615 in these address fields. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example 12:34:56:78:9a:bc. Click Add MAC Filter Summary Click the delete icon to remove the MAC address from the list the NBG4615 136 Click Network > Wireless LAN > Advanced. The screen appears as shownFigure 85 Network > Wireless LAN > Advanced Table 50 Network > Wireless LAN > Advanced RTS/CTS Threshold Send)/CTS (Clear To Send) handshake Enter a value between 256 and Fragmentation The threshold (number of bytes) for the fragmentation boundary for directed number between 256 and Output Power power Operating Mode Choose this according to the wireless mode(s) used in your network modes (for example, IEEE 802.11b/g and IEEE 802.1n modes) wireless mode (for example, IEEEE 802.11 n only) Select the channel bandwidth you want to use for your wireless network It is recommended that you select 20/40 (20/40 MHz) in your neighborhood 138 Figure 87 Network > Wireless LAN > WPSTable 52 Network > Wireless LAN > WPS WPS Setup Enable WPS Select this to enable the WPS feature PIN Number This displays a PIN number last time system generated. Click Generate to generate a new PIN number This displays Configured when the NBG4615 has connected to a wireless settings also appear in the screen This displays Unconfigured if WPS is disabled and there are no wireless or to remove the configured wireless and wireless security settings Release This button is only available when the WPS status displays Configured for WPS connections on the NBG4615 This is the name of the wireless network (the NBG4615’s first SSID) This is the type of wireless security employed by the network 139 Push ButtonFigure 88 Network > Wireless LAN > WPS Station Table 53 Network > Wireless LAN > WPS Station Push Button configure wireless stations’s wireless settings Or input station’s Use this button when you use the PIN Configuration method to configure PIN number wireless station’s wireless settings synchronization 140 NetworkWireless LAN Scheduling Figure 89 Network > Wireless LAN > Scheduling Table 54 Network > Wireless LAN > Scheduling Wireless LAN Scheduling Enable Wireless Select this to enable Wireless LAN scheduling LAN Scheduling select Everyday you can not select any specific days. This field works in 141 AP + BridgeBridge Basic Setting Disabled Figure 90 Network > Wireless LAN > WDS Table 55 Network > Wireless LAN > WDS WDS Setup Basic Settings Select the operating mode for your NBG4615 wireless links with other APs • AP + Bridge - The NBG4615 functions as a bridge and access point simultaneously • Bridge - The NBG4615 acts as a wireless network bridge and establishes Local MAC This is the MAC address of your NBG4615 Phy Mode size of packets during data transmission 142 Table 55 Network > Wireless LAN > WDS (continued)Remote MAC bridge connection with You can connect to up to 4 peer devices EncrypType this field Otherwise, select No Security EncrypKey transmission Click Apply to save your changes to NBG4615 144 Network > IPv6IPv6 145 EthernetFigure 91 Network > IPv6: Ethernet The following table describes the fields in this screen Table 56 Network > IPv6: Ethernet 146 Table 56 Network > IPv6: Ethernet (continued)DHCPv6 Figure 92 Network > IPv6: DHCPv6 147 Table 57 Network > IPv6: DHCPv6From ISP Link-local only LAN IPv6 149 Figure 94 LAN and WANInternet Connection Section 17.4 on page Section 17.5 on page Use IGMP Snooping Section 17.6 on page 150 Chapter 17 WANThe NBG4615 can get the DNS server addresses in the following ways Factory Default Otherwise, click 151 Figure 95 Multicast ExampleIGMP-v1 IGMP-v2 152 This screen displays when you select Ethernet encapsulationFigure 96 Network > WAN > Internet Connection: Ethernet Encapsulation Table 58 Network > WAN > Internet Connection: Ethernet Encapsulation ISP Parameters for Internet Access Encapsulation Ethernet WAN IP Address Assignment Get automatically default selection Bigpond Then configure the fields below with the information provided Type the IP address of the BigPond server _@$./ characters, and it can be up to 31 characters long characters except [, ] and ?. This field can be blank Retype to Type your password again for confirmation Confirm 153 PPP over Ethernet154 This screen displays when you select PPPoE encapsulationFigure 97 Network > WAN > Internet Connection: PPPoE Encapsulation Table 59 Network > WAN > Internet Connection: PPPoE Encapsulation PPP over Ethernet Nailed-Up 155 Table 59 Network > WAN > Internet Connection: PPPoE Encapsulation (continued)Get automatically from ISP My WAN IP server IP address that the ISP assigns Apply. If you set a second choice to User-Defined,and enter the same IP address, the second User-Defined changes to None after you click Apply WAN MAC on your LAN or manually entering a MAC address 156 This screen displays when you select PPTP encapsulationFigure 98 Network > WAN > Internet Connection: PPTP Encapsulation Table 60 Network > WAN > Internet Connection: PPTP Encapsulation LABELDESCRIPTION 157 Table 60 Network > WAN > Internet Connection: PPTP Encapsulation (continued)Address 158 This screen displays when you select L2TP encapsulationFigure 99 Network > WAN > Internet Connection: L2TP Encapsulation Table 61 Network > WAN > Internet Connection: L2TP Encapsulation 159 Table 61 Network > WAN > Internet Connection: L2TP Encapsulation (continued)Use this screen to enable Multicast and enable Auto-bridge Note: The categories shown in this screen are independent of each other 160 Figure 100 Network > WAN > AdvancedTable 62 Network > WAN > Advanced IGMPv1/v2 161 Network > WAN > IGMP Snooping163 Figure 102 LAN Example165 Network > LAN > IP166 Table 65 Network > LAN > IP Alias (continued)167 DHCP Client List168 Chapter 19 DHCP ServerDHCP Server Figure 106 Network > DHCP Server > General Table 66 Network > DHCP Server > General 170 Table 67 Network > DHCP Server > Advanced (continued)Apply computer on the LAN sends a DNS query to the NBG4615, the NBG4615 select DNS Relay for a second or third DNS server, that choice changes to None after you click Apply to access it 171 FTP, Telnet, SNMPPorts 21 to Port 172 Chapter 20 NATSection 20.5.3 on page NAT Definitions 173 Figure 109 How NAT WorksNetwork > NAT Figure 110 Network > NAT > General 174 Table 69 Network > NAT > GeneralNAT Setup Enable Network Translation local network) to a different IP address known within another network (for example a public IP address used on the Internet) Select the check box to enable NAT Default Server Setup Server IP default server receives packets from ports that are not specified in the Application screen screen remote management Default Server IP address NAT > General Figure 111 Network > NAT > Application 175 Table 70 Network > NAT > ApplicationAdd Application Rule Active Select the check box to enable this rule and the requested service can be forwarded to the host with a specified internal IP address Clear the checkbox to disallow forwarding of these ports to an inside server without having to delete the entry Service Name will display in the Service Name and Port fields Enter the start and end port(s) to be forwarded specified in the Port field Application Rules Summary This is the number of an individual port forwarding server entry This icon is turned on when the rule is enabled This field displays a name to identify this rule This field displays the port number(s) This field displays the inside IP address of the server Modify Edit under Add Application Rule under Click the Remove icon to delete a rule 176 Network > NAT > AdvancedNote: Only one LAN computer can use a trigger port (range) at a time Figure 112 Network > NAT > Advanced Table 71 Network > NAT > Advanced This is the rule index number (read-only) Type a unique name (up to 15 characters) for identification purposes. All characters are permitted - including spaces Incoming Type a port number or the starting port number in a range of port numbers End Port Type a port number or the ending port number in a range of port numbers Trigger The trigger port is a port (or a range of ports) that causes (or triggers) the server on the WAN 177 Figure 113 Multiple Servers Behind NAT Example178 The following is an example of trigger port forwardingFigure 114 Trigger Port Forwarding Process: Example 1Jane requests a file from the Real Audio server (port 7070) 3The Real Audio server responds using a port number ranging between 4The NBG4615 forwards the traffic to Jane’s computer IP address 180 Chapter 21 DDNSNetwork > DDNS Table 72 Dynamic DNS 182 Chapter 22 Static RouteClick Network > Static Route to open the IP Static Route screen Figure 117 Network > Static Route Table 73 Network > Static Route Static Routing Settings Route Name Enter a the name that describes or identifies this route Destination IP Enter the IP network address of the final destination This is the subnet to which the route’s final destination belongs Netmask Enter the IP address of the gateway Metric Assign a number to identify the route Select the interface through which the traffic is routed Add Rule Click this to add the IP static route No This is the number of an individual static route The rules are always on and this is indicated by the icon This is the name that describes or identifies this route Destination always based on network number Gateway same network segment as the device's LAN or WAN port. The gateway helps forward packets to their destinations This is the number assigned to the route Click the Delete icon to remove a static route from the NBG4615. A window displays asking you to confirm that you want to delete the route 183 Network > RIP184 Chapter 23 RIP185 Services186 Chapter 24 FirewallGeneral Firewall Enable Firewall 1Change the default password via Web Configurator 3Limit who can access your router 187 6Protect against IP spoofing by making sure the firewall is active7Keep the firewall in a secured (locked) room Figure 120 Security > Firewall > General l Table 75 Security > Firewall > General Enable Firewall Select this check box to activate the firewall. The NBG4615 performs access activated Click Apply to save the settings Click Cancel to start configuring this screen again 188 Table 76 Security > Firewall > ServicesICMP Internet Control Message Protocol is a message control and error-reporting protocol between a host server and a gateway to the Internet. ICMP uses software and directly apparent to the application user Respond to Ping selected. Select WAN to reply to incoming WAN Ping requests Select this check box to activate the firewall rules that you define (see Add Rule Firewall Rule below) below) Add Firewall Rule Enter a name that identifies or describes the firewall rule Dest IP Address Enter the IP address of the computer to which traffic for the application or service is entering The NBG4615 applies the firewall rule to traffic initiating from this computer service 189 Chapter 24 FirewallTable 76 Security > Firewall > Services (continued) Protocol which you want to apply the firewall rule Dest Port Range example TCP port 80 defines web traffic Source Port Enter the port number/range of the source that define the traffic type, for Range Click Add to save the firewall rule Firewall Rule are applied in turn This is a name that identifies or describes the firewall rule Dest IP This is the IP address of the computer to which traffic for the application or Source IP service is initialized This is the port number/range of the source that define the traffic type, for Action Drop - Traffic matching the conditions of the firewall rule are stopped Click Delete to remove the firewall rule See Appendix F on page 301 for commonly used services and port numbers 190 www.zyxel.com.tw/news/pressroom.phpwww.zyxel.com.tw news/pressroom.php 191 Chapter 25 Content FilteringFigure 122 Security > Content Filter Table 77 Security > Content Filter Trusted IP Setup content filtering Leave this field blank to have no trusted computers Restrict Web Features ActiveX A tool for building dynamic and active Web pages and distributed object applications. When you visit an ActiveX Web site, ActiveX controls are Java A programming language and development environment for building of all kinds Cookies Used by Web servers to track usage and provide service based on ID Web Proxy A server that acts as an intermediary between a user and the Internet to provide security, administrative control, and caching service. When a proxy filtering by pointing to this proxy server Enable URL Keyword Blocking the domain name or IP address. For example, if the keyword "bad" was be blocked, e.g., URL http://www.website.com/bad.html would be blocked Select this check box to enable this feature 195 ->VOIP->FTP ->HTTP ->Chat, Email 196 Upstream BandwidthBandwidth Management Advanced Downstream Bandwidth Management > Bandwidth MGMT 198 Table 79 Management > Bandwidth Management > Advanced (continued)Application List This is the number of an individual bandwidth management rule Priority Select a priority from the drop down list box. Choose High, Mid or Low (jitter is the variations in delay) • Mid - Select this for "excellent effort" or better than best effort and would include important business traffic that can tolerate some delay that are allowed but that should not affect other applications and users Category This is the category where a service belongs Service This is the name of the service rule Advanced Setting Click the Edit icon to open the Rule Configuration screen where you can modify the rule User-defined or services you specify Direction LAN and WLAN WAN Enter a descriptive name for the bandwidth management rule on page 200 for more information 199 Application ListFigure 126 Bandwidth Management Rule Configuration: Application List Table 80 Bandwidth Management Rule Configuration: Application List Select an interface’s check box to enable bandwidth management on that interface These read-onlylabels represent the physical interfaces. Bandwidth regardless of the traffic’s source Traffic redirect or IP alias may cause LAN-to-LANtraffic to pass through the NBG4615 and be managed by bandwidth management Select Maximum Bandwidth or Minimum Bandwidth and specify the and specify the Destination Port This is the port number of the destination that define the traffic type, for See Appendix F on page 301 for some common services and port numbers TCP port 80 defines web traffic This is the protocol (TCP, UDP or user-defined)used for the service Click Cancel to exit this screen without saving 200 User-definedService Figure 127 Bandwidth Management Rule Configuration: User-definedService Table 81 Bandwidth Management Rule Configuration: User-definedService 201 The bandwidth is measured in kilobits per second (kbps)Figure 128 Management > Bandwidth Management > Monitor Management Bandwidth Management Table 82 Media Bandwidth Management Setup: Services SERVICE FTP not be possible by e-mail The World Wide Web (WWW) is an Internet system to distribute graphical hyper-linkedinformation, based on Hyper Text Transfer Protocol (HTTP) - a Internet include Internet Relay Chat and Newsgroups. The Web is accessed through use of a browser E-Mail Electronic mail consists of messages sent through a computer network to specific groups or individuals. Here are some default ports for e-mail: 202 Table 82 Media Bandwidth Management Setup: Services (continued)VoIP (SIP) Initiated Protocol (SIP) is an internationally recognized standard for handles the setting up, altering and tearing down of voice and multimedia sessions over the Internet BitTorrent BitTorrent is a free P2P (peer-to-peer)sharing tool allowing you to distribute the client downloads the file in small pieces and share the pieces with other peers to get other half of the file Gaming Online gaming services lets you play multiplayer games on the Internet via broadband technology. As of this writing, your NBG4615 supports Xbox Playstation, Battlenet and MSN Game Zone 203 This chapter provides information on the Remote Management screens•LAN and WAN •LAN only •WAN only Note: The NBG4615 is managed using the Web Configurator Remote management over LAN or WAN will not work when: Secured Client IP Address 3There is a firewall rule that blocks it When NAT is enabled: •Use the NBG4615’s WAN IP address when configuring from the WAN •Use the NBG4615’s LAN IP address when configuring from the LAN System 204 Chapter 27 Remote ManagementManagement > Remote Management > WWW Figure 129 Management > Remote Management > WWW Table 83 Management > Remote Management > WWW All 205 This chapter introduces the UPnP feature in the web configurator•Dynamic port mapping •Learning public IP addresses •Assigning lease times to mappings See the NAT chapter for more information on NAT 206 Management > UPnPstart Network Connections 207 PropertiesInternet Connection Properties Settings 209 1Click Start and then Control Panel2Double-click Network Connections 210 3Select My Network Places under Other PlacesLocal Network Invoke 213 Firmware UpgradeBackup/Restore Reset/Restart 214 Chapter 29 MaintenanceTable 85 Maintenance > General System Setup System Name System Name is a unique name to identify the NBG4615 in an Ethernet Domain Name Enter the domain name you want to give to the NBG4615 Administrator Type how many minutes a management session can be left idle before the Inactivity Timer it has been left idle (not recommended) It is strongly recommended that you change your NBG4615's password Click Maintenance > Password. The screen appears as shown Figure 141 Maintenance > Password Table 86 Maintenance > Password Password Setup Old Password Type the default password or the existing password you use to access the system in this field Type the new password again in this field 216 Table 87 Maintenance > Time (continued)First Sunday April Last October 217 www.zyxel.comMaintenance > Firmware Upgrade Figure 143 Maintenance > Firmware Upgrade Table 88 Maintenance > Firmware Upgrade File Path find it Browse decompress compressed (.zip) files before you can upload them Upload Click Upload to begin the upload process. This process may take up to two minutes Check for Click this to check for the latest updated firmware Latest Firmware Now Note: Do not turn off the NBG4615 while firmware upload is in progress Firmware Upload In Process Figure 144 Network Temporarily Disconnected 218 ReturnMaintenance > Backup/Restore Figure 145 Maintenance > Backup/Restore Maintenance > Backup/Restore Backup Click Backup to save the NBG4615’s current configuration to your computer Click Browse... to find the file you want to upload. Remember that you must decompress compressed (.ZIP) files before you can upload them 219 Table 89 Maintenance > Backup/Restore (continued)Click Upload to begin the upload process in this time causing a temporary network disconnect If you see an error screen, click Back to return to the Backup/Restore screen Pressing the Reset button in this section clears all user-entered configuration information and returns the NBG4615 to its factory defaults more information on the RESET button Appendix D on page System restart allows you to reboot the NBG4615 without turning the power off Click Maintenance > Reset/Restart to open the following screen Figure 146 Maintenance > Reset/Restart Restart Router, Access Point Mode The following describes the device modes available in your NBG4615 221 Wireless Client222 Table 90 Maintenance > Sys OP Mode (continued)Mode Router 223 The NBG4615 does not turn on. None of the LEDs turn onOne of the LEDs does not behave as expected 224 I don’t know the IP address of my NBG4615cmd ipconfig Default Gateway LAN information Client Troubleshooting I forgot the password I cannot see or access the Login screen in the Web Configurator 225 If you changed the IP addressI don’t know the IP address of my NBG4615 Make sure your Internet browser does not block Appendix B on page Section 5.3.1 on page Advanced Suggestions If your computer is connected to the ETHERNET I can see the Login screen, but I cannot log in to the NBG4615 Make sure you have entered the password correctly. The default password is 4Disconnect and re-connectthe power adaptor or cord to the NBG4615 226 I cannot access the InternetDisable The Internet connection is slow or intermittent 227 3Reboot the NBG4615Advanced Suggestion You will lose all of your changes when you push the RESET button To reset the NBG4615: 1Make sure the wireless LAN is enabled on the NBG4615 2Make sure the wireless adapter on the wireless station is working properly 228 Enable URL Keyword BlockingKeyword List I can access the Internet, but I cannot open my network folders I cannot access the Web Configurator after I switched to AP mode 229 I cannot access or see a USB device that is connected to the NBG4615What kind of USB devices do the NBG4615 support 230 I cannot install the ZyXEL Share Center Utility233 The following tables summarize the NBG4615’s hardware and firmware featuresTable 91 Hardware Features 234 Appendix A Product SpecificationsTable 92 Firmware Features FEATURE Note: The NBG4615 may be prone to RF (Radio Frequency) interference from other 2.4 GHz devices such as microwave ovens, wireless phones, Bluetooth enabled devices, and other wireless LANs Note: Only upload firmware for your specific model 237 ToolsPop-up Blocker Turn Off Privacy Internet Options 238 Blockpop-ups 239 2Select Settings…to open the Pop-upBlocker Settings screen240 Allowed sitesClose 241 Custom LevelScripting Active scripting Scripting of Java applets 242 Microsoft VMJava permissions 243 2Make sure that Use Java 2 for <applet> under Java (Sun) is selected244 Figure 161 Java (Sun)Tools Options 245 Content246 PreferencesChoose how you prefer to handle Open all 247 JavaScript Options250 Appendix C IP Addresses and SubnettingFigure 167 Network Number and Host ID Table 93 IP Address Network Number and Host ID Example 1ST OCTET: 2ND 3RD 4TH OCTET OCTET: (192) (168) (1) (2) 251 Table 94 Subnet MasksBINARY 1ST DECIMAL OCTET Table 95 Maximum Host Numbers SUBNET MASK HOST ID SIZE MAXIMUM NUMBER OF HOSTS For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask The following table shows some possible subnet masks using both notations Table 96 Alternative Subnet Mask Notation ALTERNATIVE LAST OCTET NOTATION (BINARY) (DECIMAL) 253 Table 97 SubnetIP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE 254 Table 97 Subnet 1 (continued)Table 98 Subnet Table 99 Subnet Table 100 Subnet 255 The following table shows IP address last octet values for each subnetEight Subnets SUBNET FIRST ADDRESS LAST BROADCAST ADDRESS Table 102 24-bitNetwork Number Subnet Planning NO. “BORROWED” NO. SUBNETS NO. HOSTS PER HOST BITS Table 103 16-bitNetwork Number Subnet Planning 256 Table 103 16-bitNetwork Number Subnet Planning (continued)•10.0.0.0 — •172.16.0.0 — •192.168.0.0 — 260 1Click Start > Control Panel2In the Control Panel, click the Network Connections icon 262 5The Internet Protocol TCP/IP Properties window opensObtain an IP address automatically 7Click OK to close the Internet Protocol (TCP/IP) Properties window 8Click OK to close the Local Area Connection Properties window 1Click Start > All Programs > Accessories > Command Prompt Command Prompt Start > Control Panel > Network Connections Support 264 Continue265 6Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties266 7The Internet Protocol Version 4 (TCP/IPv4) Properties window opens9Click OK to close the Internet Protocol (TCP/IP) Properties window 10Click OK to close the Local Area Connection Properties window 269 5Select Internet Protocol Version 4 (TCP/IPv4) and then select Properties270 6The Internet Protocol Version 4 (TCP/IPv4) Properties window opens8Click OK to close the Internet Protocol (TCP/IP) Properties window 9Click OK to close the Local Area Connection Properties window 271 1Click Apple > System Preferences272 System PreferencesBuilt-in Configure 273 Using DHCPConfigure IPv4 TCP/IP Manually Subnet Mask Apply Now 274 Applications > Utilities > Network UtilitiesNetwork Interface Info 275 2In System Preferences, click the Network iconConfigure 277 Network interfaceNote: Make sure you are logged in as the root administrator 1Click System > Administration > Network 278 Network SettingsUnlock Authenticate 279 Static IP addressIP address Subnet mask Gateway address 280 DNS281 System > Administration > Network ToolsNetwork device Devices Interface Statistics 282 1Click K Menu > Computer > Administrator Settings (YaST)Run as Root - KDE su 283 YaST Control CenterNetwork Devices Network Card Overview 284 Network Card SetupDynamic Address (DHCP) Statically assigned IP Address Hostname 285 Hostname/DNSFinish KNetwork Manager Task bar Show Connection Information 287 This section discusses ad-hocand infrastructure wireless LAN topologiesFigure 179 Peer-to-PeerCommunication in an Ad-hocNetwork 289 Figure 181 Infrastructure WLAN290 Figure 182 RTS/CTSRTS/CTS RTS/CTS Fragmentation Threshold Fragmentation Threshold 291 Table 104 IEEE 802.11gDATA RATE (MBPS) MODULATION 292 Table 105 Wireless Security LevelsSECURITY LEVEL •User based identification that allows for roaming •Authentication Determines the identity of the users •Authorization •Accounting Keeps track of the client’s network activity 293 •Access-RequestSent by an access point requesting authentication •Access-Reject Sent by a RADIUS server rejecting access •Access-Accept Sent by a RADIUS server allowing access •Access-Challenge •Accounting-Request Sent by the access point requesting accounting •Accounting-Response 295 Note: EAP-MD5cannot be used with Dynamic WEP Key ExchangeTable 106 Comparison of EAP Authentication Types EAP-MD5 EAP-TLS EAP-TTLS PEAP LEAP 298 AUTHENTICATIONENCRYPTIO ENTER METHOD/ KEY IEEE N METHOD MANUAL KEY MANAGEMENT PROTOCOL 299 There are two types of antennas used for wireless LAN applicationsOmni-directional 301 USER-DEFINEDPort(s Port(s) •If the Protocol is TCP, UDP, or TCP/UDP, this is the IP port number •If the Protocol is USER, this is the IP protocol number Description Table 108 Commonly Used Services NAME PROTOCOL PORT(S) 302 Appendix F Common ServicesTable 108 Commonly Used Services (continued) 306 MULTICAST ADDRESS307 Table 111 Reserved Multicast Address (continued)EUI-64 308 RenewRebind to S1 to S2 309 Neighbor advertisement: A response from a node to announce itsMLD filtering controls which multicast groups a port can join 310 All ProgramsDibbler-DHCPv6 Client Install as service 3Select Start > Control Panel > Administrative Tools > Services 311 4Double click Dibbler - a DHCPv6 client1Select Control Panel > Network and Sharing Center > Local Area Connection 2Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it 312 4Click Close to exit the Local Area Connection Status screen5Select Start > All Programs > Accessories > Command Prompt 313 End-UserLicense Agreement for "NBG46151.Grant of License for Personal Use 2.Ownership 3.Copyright 314 Appendix H Open Software Announcements4.Restrictions 5.Confidentiality 6.No Warranty THE SOFTWARE IS PROVIDED "AS IS." TO THE MAXIMUM EXTENT PERMITTED BY LAW, ZyXEL 315 7.Limitation of Liability8.Export Restrictions 9.Audit Rights 10.Termination 11.General 316 NoticeGNU GENERAL PUBLIC LICENSE Version 2, June Copyright (C) 1989, 1991 Free Software Foundation, Inc 59 Temple Place - Suite 330, Boston, MA 02111-1307,USA Preamble 317 TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION320 NO WARRANTYEND OF TERMS AND CONDITIONS This Product includes curl software under below license COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1996 - 2007, Daniel Stenberg, <daniel@haxx.se All rights reserved Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY 322 1.2"GoAhead" means Go Ahead Software, Inc1.4"License" or "Agreement" means this document 2. Source Code License 2.1 Limited Source Code Grant 323 2.2 Binary Code2.3 License Back to GoAhead 2.4 Restrictions on Use 3. Term 4.Trademarks and Brand 4.1 License and Use 324 4.2 Promotion by You of GoAhead WebServer Markproduct 4.3 Placement of Copyright Notice by You year is not supplied with Documentation, GoAhead will supply it upon request 4.4 No Modifications to Server Identification Field as defined in Section 1.6 and 5. Warranty Disclaimers THE ORIGINAL CODE, THE DOCUMENTATION AND THE MEDIA UPON WHICH THE ORIGINAL CODE IS RECORDED (IF ANY) ARE PROVIDED "AS IS" AND WITHOUT WARRANTIES OF ANY KIND OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE The entire risk as to the quality and performance of the Original Code 329 Exhibit AGoAhead Trademarks, Logos, and Product Designation Information 01/28/00 This Product includes LLTD software under below license This Product includes ntpclient software under below license ntpclient is Copyright 1997, 1999, 2000, 2003, 2006, 2007 Larry Doolittle and may be freely copied and modified according to the terms of the GNU General Public License, version 2. If you want to distribute ntpclient under other terms, contact me. I might agree to some other arrangement if you talk to me _before_ you start violating GPL terms This Product includes igmpproxy software under below license igmpproxy - IGMP proxy based multicast router Copyright (C) 2005 Johnny Egeland <johnny@rlo.org This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by 335 * [including the GNU Public Licence.]This Product includes ppp software under below license Copyrights: The BSD license Copyright (c) <YEAR>, <OWNER This Product includes radvd software under below license The author(s) grant permission for redistribution and use in source and 340 Version 2.1, FebruaryCopyright (C) 1991, 1999 Free Software Foundation, Inc 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed [This is the first released version of the Lesser GPL. It also counts as the successor of the GNU Library Public License, version 2, hence the version number 2.1.] 347 Copyright © 2011 by ZyXEL Communications CorporationPublished by ZyXEL Communications Corporation. All rights reserved •This device may not cause harmful interference 349 This Class B digital apparatus complies with Canadian ICES-003Cet appareil numérique de la classe B est conforme à la norme NMB-003du Canada 1Go to http://www.zyxel.com 2Select your product on the ZyXEL home page to go to that product's page 3Select the certification you wish to view from this page 350 WARNING:1Grant of License for Personal Use 2Ownership 3Copyright 4Restrictions 351 5Confidentiality6No Warranty 7Limitation of Liability 352 8Export Restrictions9Audit Rights 10Termination 11General 355 70, 79, 85126 71, 79, 85, 93 menu 80, 86, 94 160 164 71, 79, 94 357 Link type 71, 79, 86, 94358 SSID 65, 70, 79, 85, 93, 102, 126359 WWW201
Also you can find more ZyXEL Communications manuals or manuals for other Computer Equipment.