Gebruiksaanwijzing /service van het product MWR102 van de fabrikant ZyXEL Communications
Ga naar pagina of 183
Copyright © 2009 ZyXEL C ommunications Cor poration DEFAULT L OGIN DETA IL S IP Address http :// 192.168.100 .1 Passw ord 1234 Firmware Version 1.0 Edition 1, 10/201 1.
2 MWR102 Mobile W ireless Router.
3 About This User' s G uide Intended Audience This m anual is intend ed for peo ple who want to conf igure the MW R102 us ing the W eb - Based Managem ent Interf ace. You shou ld have at l east a bas ic knowledge of TCP/IP n etwork ing concepts an d topolog y.
4 Customer Support Please have the following in format ion ready when you contact Cus tomer Support: • Product m odel and ser ial num ber • W arrant y inform ation • Date that you receiv ed or p.
5 Document Conv entions Warnings and Notes These ar e how warn ings and notes are sho wn in this Us er’s Guide. Warnings tell you about things that coul d ha rm you or y our de vice. Note: Notes tell you other important information ( for example, other things you may need to configure or help ful t ips) or recommendations.
6 Icons Used in Figures Figures in this User’s Guide m ay use the f ollowing ge neric icons . The MW R102 icon is n ot an exact repr esentation of your dev ice.
7 Safety Warnings • Do NOT use this produc t near water, for example, in a wet basem ent or near a swim ming pool. • Do not lea ve the dev ice exposed t o a heat s ource or i n a high - tem perature loc ation such as in the sun or in an unatte nded ve hicle.
8 • Do not lea ve unit expos ed to a h eat sourc e or in a loca tion that m ay becom e hot, such as a park ed vehicle or in d irect sunl ight. Do not leave in a gl ove box, tru nk or other location t hat ma y becom e hot. • Do not pu ncture or inci nerate th e device or b attery.
9 Table of Conte nt s About This User's Guide .................................................................................................. 3 Document Conventions ..............................................................................
10 6.1 Over vi ew ........................................................................................................ 29 6.2 Connecting to Internet from an Access Point ................................................... 30 6.3 Configuring W ir eless Security Using W PS .
11 10 Status ................................................................................................................ 60 10.1 Over vie w .................................................................................................... 60 10.
12 Appendix A: Pop - up W indows, JavaScripts and Jav a Permissions ............................... 85 Appendix B: IP Addresses and Subne tting .................................................................... 93 Appendix C: Setting up Your Computer’s IP Address .
13 Part I: Introduct ion.
14 1 Getting t o Know Your MWR102 1.1 Ove r view The M W R102 is a mobile wireless rout er wi th 1T1R MIMO technology. It complies with IEEE 802.11n standar d s, with W ireless N data rates of up to 150 Mbps, and IEEE 802.11b/g with Wireless B/G dat a rates of 54 Mbps.
15 1.3 Good Habits for Managi n g the MWR 102 Do the f ollowing thi ngs regularl y to mak e the MW R102 more s ecure and to m anage the MW R102 mor e effectivel y . • Change t he passwor d. Use a pass word that’s not eas y to guess and that consis ts of dif ferent types of characters , such as numbers and let ters.
16 1.5 The Rear Pa nel Figure 2 The rear panel of t he W ireless Router. L AN: Through this port, you can connect the rou ter to your PCs and the other Ethernet network devices. W AN: T his W AN port is w here you will connect the cable/DSL M odem, or Ethernet .
17 2 We b - Based Management 2.1 Ove r view This c hapter describ es how to acc ess the MW R102 Web - Base d Managem ent Inter face and provides an overvie w of its s creens. The W eb - Bas ed Managem ent Interfac e is an HT ML - based m anagement int erface tha t allows easy setup and manag ement of the M W R102 via Internet bro wser.
18 Figure 3 Login Screen The f ollowing table d escribes the labels in this scr een. L AB EL DESCRIPTION User Nam e T y pe “ adm in” (default) as t he User n ame.
19 3 MWR102 Modes 3.1 Ove r view This c hapter introd uces the dif ferent m odes availabl e on your MW R102. 3.1.1 Device Modes This r efers to the oper ating m ode of the MW R102, whi ch can act as a: • Router . This is the def ault dev ice mode of the MW R102.
20 4 Router Mode 4.1 Ove r view The M W R102 is set to router mode by de fault. Routers are used to connect the local network to another networ k (for example, the Internet). 4.2 What You Can Do Use the Status scr een to vie w read - only inform ation about your MW R102.
21 The following table describes the sub - menus. Table 2 Navigation Panel: Router M ode LINK FUNCTIO N Setup Wiza rd This screen gui des you thr ough the setup of the M W R102.
22 Status Show s the current status an d basic settings of t he trav el rout er Statistics Show s packet counts for w ired and wireless E thernet connection s. Log Set rem ote log serv er para meters a nd view the sy stem lo g. Upgrade Fir mw are U pgrade the t ravel ro uter firmware.
23 5 Access Point Mode 5.1 Ove r view Use your MW R102 as an a ccess point ( AP) if you already ha ve a router or gatewa y on your network . In this m ode your MW R102 bridges a wired n etwork ( LAN) and wire less LAN (W LAN) in the sam e subnet. 5.2 What You Can Do • Use the Status scr een to vie w read - only inform ation a bout your MW R102.
24 5.2.3 Config uring yo ur WL A N and M aintena nce Settings The conf iguration of wireless and maintenanc e settings in A cce ss Poin t m ode is the sam e as f or Router Mode . • See Chapter 7 for inf ormat ion on the conf iguring y our wireless net work .
25 Encryption This show s the lev el of wirel ess secur ity the M W R102 is c urrently using. BSSID This display s the M AC address of the w ireless dev ice.
26 Figure 5 Navigation Panel The following table describes the sub - menus. Table 4 Navigation Panel: Router M ode LINK FUNCTIO N Setup Wizard T his screen gui des you thr ough the setup of the M W R102.
27 router. Site Survey This page provides a tool to scan th e wireless network for nearby routers and APs. WP S This screen allow s you to cha nge the W i - Fi Protec ted Setup setting s for the M W R102 Network Settings LAN Interf ace This screen allow s you to conf igure th e parameter s for y our Local Area Network.
28 Note: If you change the IP address of the M W R102 in the screen below, y ou will need to log into the M W R102 again using the new IP address. Figure 6 Network Settings > LAN Interface The table below desc ribes t he labels in th e screen.
29 Diversion automatical ly detect conflicts i n the WAN and LAN IP . If there are c onfl ict s , the LAN IP and LAN DHCP Ra nge w ill automatic ally jump t o nex t subnet to av oid conflict s.
30 6.2 Connecting t o Internet from an Access Point This s ection gives you an exam ple of how to s et up an access point ( AP ) a nd wireless client (a notebook ( B ), in this ex ample) f or wireless comm unication. B can access t he Internet t hrough the access point wireles sly.
31 6.3.1 Push But ton Confi gurati on (PBC ) 1 Make s ure that your MW R102 is t urned on an d that it is within range of your com puter. 2 Make s ure that you h ave ins talled the wirel ess client (this exam ple uses t he NW D210N) driver an d utilit y in your notebook .
32 6.4 Enabling and Configu ring Wireless Securit y (No WPS) Follow th e steps be low to conf igure the w ireless set tings on your MW R102. The instr uctions requ ire that your hardwar e is connec ted (see the Q uick Start Guide) an d you are logged into th e W eb - Based Managem ent Interf ace through your LAN con nection.
33 2. W ireless adapters come with s oftware som etim es called a “utilit y” that you install o n your com puter. See your wireless adapter’s User’s Gui de for inform ation on ho w to do that. 3. After you’ve install ed the utilit y, open it.
34 Figure 11 Confirm Save 7. Check the status of your wir eless connec tion in the s creen bel ow. If your wireless connecti on is weak or you have n o connectio n, see th e Troublesho oting sect ion of this Us er’s G uide. Figure 12 Link Status If y o ur connec tion is suc cessful, op en your Int ernet bro wser and enter http://us .
35 Part II: Wireless.
36 7 Wireless 7.1 Ove r view This c hapter discus ses how to conf igure the wireless network s ettings in y our M W R102. See the appendic es for m ore detailed inf ormation about wirel ess net works. 7.2 What You Can Do • Use the Basic Settings screen to en able the W ireless LAN, enter th e SSID and select the channel widt h.
37 7.3.1 Wireless Securit y Ov er vie w The f ollowing sect ions introduc e differ ent types of wir eless sec urity you can s et up in the wireless network . 7.3.1 .1 SSID Norm ally, the AP ac ts like a beac on and reg ularl y broadcasts the SSID in th e area.
38 Table 6 Types of Encry ption for Each Type of Authentication NO AUTHENTICATION Weakest No Security W EP W PA - Personal (TKIP) W PA -Enterprise Strongest WPA 2 - Personal (AES) W PA2 - E nterpris e Usuall y , you should s et up the s trongest e ncryption tha t every wire less client in the wir eless network supports.
39 7.4 Gener al Wireless LA N Screen Use this sc reen to ena ble the W ireless LAN, enter t he SSID and s elect the c hannel. Note: If you are configuring the M W R102 from a computer connected to the.
40 Networ k Band Allow s you to cho ose betw een W irel ess B/G/N functiona lity. Channel Width Allow s you to choose betw een the 2 0MHz and 40M Hz channel. Channel Number T his displays t he channe l the M W R102 is curr ently using. Country Allow s you to set your co untry .
41 Figure 14 W ireless > Advanced Settings The f ollowing table d escribes the labels in this scr een. Table 8 W ireless > Advanced Settings L AB EL DESCRIPTION F ragmentati o n Threshold The thresh old (number of byte s) for the fr agmenta tion bound ary for dir ected messages.
42 Output Pow er Set the out put pow er of the M WR102 in th is fiel d. If ther e is a hig h density of APs in an area, d ecrease the output p ower of the M W R10 2 to reduc e interfere nce w ith other AP s. Select on e of the f ollowing 100% , 70% , 50% , 35% , or 15% .
43 7.6.2 WEP Encryption W EP encryption sc rambles the data transm itted between t he wirel ess stations and the acc ess point s to k eep net work comm unications priva te. It encr ypts unicast and multic ast com munications in a networ k. Both the wireles s stations and the acc ess points must us e the same W EP key.
44 Key Lengt h Select 64 - bit or 128 - bit . This dictate s the l ength of the security key that t he netw ork is going t o use. Key Format Select ASC II (5 Chara cters) or Hex (10 Character s) from the dropdow n menu. Encryptio n Key Enter a P assphrase.
45 The f ollowing table d escribes the labels in this scr een. Table 10 W ireless > Security: W PA - PSK/ W PA2 - PSK/WPA2 - Mi xed L AB EL DESCRIPTION Encryption Select WPA- PSK , WPA2 -PSK or W PA2 - M ixed to enable da ta en cryption.
46 Figure 18 W ireless > Access Control The f ollowing table d escribes the labels in this m enu. Table 11 W ireless > Access Control L AB EL DESCRIPTION W ireles s Access Control Mode Define whet her enter ed MAC add res ses wil l be wh itel isted or bl ackli sted .
47 Apply Changes Click A ppl y to save your chan ges back to the M W R102. Reset Click Reset to re load th e previous configur ation for this scre en. 7.8 WPS Screen Use this sc reen to ena ble/disabl e W PS, view or gener ate a new PIN number and chec k current W PS status .
48 Status This display s Configure d when the M W R10 2 has connect ed to a w ireless network us ing W PS . The curr ent w ireless and w ireless sec urity settings al so appear in the screen.
49 The f ollowing table d escribes the labels in this scr een. Table 13 Wireless > Site Surv ey L AB EL DESCRIPTION W ireles s Site S urve y SSID This display s the N etwork Na me (SSID) o f the w ireless net works close to you. BSSID This display s the M AC address of the w ireless dev ice liste d.
50 8 Network Se ttings 8.1 Ove r view This c hapter discus ses the MW R102’s Network Settings screens. U se these sc reens to co nfigure your LAN and W AN settings. A Local Area Networ k (LAN) is a shared com munic ation system to which m any com puters are attached.
51 8.3 What You Need To Kn ow The inf ormation in t his section c an help you configure t he screens for your W AN and LAN connecti ons. 8.3.1 Config uring Yo ur Interne t Connecti on The act ual physical connection det erm ines whether th e MWR 102 ports are LAN or W AN ports.
52 8.4 LAN In terface The LAN Interface Setup screen allow s you to set up your LAN interface, the private IP of your router’s LAN port, and the subnet mask of your LAN segment. Go to Net work > LAN Interface to access the following screen. Figure 23 Network > LAN Interface The f ollowing table d escribes the labels in this scr een.
53 default. A uto I P A ddress Diversion Click the drop down list, you may select “Enabl ed” to divert the IP Address aut omatical ly or select “Disable d” to ban it. W he n Enabled, the system w ill automatically detect conflicts in the WAN and LAN IP.
54 8.5 WAN I nterf ace This page allows users to conf igure W AN s ettings. You may select t he Internet connection type f rom the drop down list next to “WAN Access Type” and con figure t he parameters for each mode. Go to Network Settings > WA N Interface to open the following scr een.
55 Provider (I SP). MTU S iz e Th e Maxi m um pack et s ize the router will transmit. Any packet over the speci fied size will be chopped into a smaller size before sending. Larger p acket size w ill enhance performance. Enter the MTU number i n the blank to set the limi tation.
56 Part III: Securit y MAC F ilterin g.
57 9 MAC Filterin g 9.1 Ove r view This c hapter shows you how to e nable and c onfigure MAC addres s filtering th at allo ws your MWR102 t o perm it and deny acces s to spec ific device s on your n etwork.
58 9.4 MAC Filtering This page allows users to restrict data fr om p assing onto the internet fr o m certain devices. Go t o Fire wall > MA C Filte ring to open the following screen.
59 Part IV: Managem ent Status Statis tics Log Upgrade F irmware Save/Rel oad Set tin gs Password.
60 10 Status 10.1 O ver view This c hapter discus ses how to acc ess and i nterpret inf ormation about t he MW R102. 10.2 What You Can Do • Use the Status scree n to view t he current s tatus and bas ic settings of the dev ice. 10.3 Status Scr een This information page show s the current status and basic settings o f this device.
61 Table 18 Management > Status L AB EL DESCRIPTION System Inf ormation Uptime This is the tota l time the M W R 102 has been on. Firmware B uild Time This is the date/ti me the curre nt versi on of the firmw are was relea sed. Operation M ode This is the devic e mode t o whi ch the M W R102 is set – Router Mode .
62 Internet IP Address The IP addres s provided by your I nternet S er vice Provider (ISP). Subnet M ask The Subnet M ask provided by your Intern et Servi ce Provi der (ISP ). Default G ateway The Default Ga teway provided by your Inter net Service Provi der (ISP).
63 11 Statistic s 11.1 O ver view This page shows users data transfer information, and monitor s packets sent and received 11.2 S tati s tics Sc reen . Click Management > Statistics to access the S tatistics screen. Figure 28 Management > Statistics The f ollowing table d escrib es the labels in this sc reen.
64 This table s hows the nu mber o f pac kets receiv ed over Et hernet LA N. Ethernet WAN This table s hows the number o f packet s sent ov er the Ether net W AN. This table s hows the number o f packet s received over the E thernet W AN. Refresh T his button u pdates the St atist ics screen to show t he current number of packets sent and received.
65 12 Log 12.1 O ver view This page shows current ac tivity on the router, and allows you t o set what information the router lo gs. 12.2 Log S creen Click Managem ent > Log to access the Lo g screen. Figure 29 Management > Log The f ollowing table d escribes the labels in this scr een.
66 L AB EL DESCRIPTION Enable Log Checking thi s box enab les sys tem log func tionalit y. System All Checking this box shows all lo gged infor mation pas sing thro ugh the dev ice. W ireles s Checking this box shows only the infor mation pas sing thro ugh the w ireless netw ork.
67 13 Upgrade Fir mware 13.1 O ver view Occas ionally, a firm ware upgrad e ma y be issued t o address bugs or add functional ity. This chapter d iscusses ho w to upgrad e to the MW R102’s mos t recent firm ware. Find firm ware at htt p://us.zyxel.c om/Sup port/Downloa d - Librar y .
68 Table 21 Management > Upgrade Firmware L AB EL DESCRIPTION Select Fi le Ty pe in the locatio n of the f ile you w ant to upload in thi s field or cl ick Browse... to find it. Browse... C lick Browse... to find the . bin file yo u want t o upload.
69 14 Save/Reload Settings 14.1 O ver view This c hapter shows you how to b ackup, res tore and re set your MW R102. 14.2 What You Can Do Save Settings to File allows y ou to back up (save) the MW R102’s c urrent config uration to a f ile on your com puter.
70 Figure 32 Management > Save/Reload Set tings The f ollowing table d escribes the labels in this scr een. Table 22 Management > Save/Reload Settings L AB EL DESCRIPTION Save… Click Sav e… to save th e MW R102’s current c onfigurat ion to y our com puter.
71 Reset Pressing the Res et button in this sec tion clears a ll user - entered configurat ion inform ation and retur ns the MW R102 to i ts factor y defaults. You can a lso press th e RESET button o n the rear panel to reset t he factor y defaults of your MW R102.
72 15 Password 15.1 Ove r view This c hapter discus ses managem ent of the MW R102’s Administr ator user name and password. These ar e the User nam e and Pass word used to access the W eb - based Man agem ent interface and mak e changes to your router.
73 Table 23 Management > Password L AB EL DESCRIPTION User Name Type the user name you w ish to us e to log into the M W R102. New P assword Type y our new sy stem password ( up to 30 c haracter s). Note that as you type a pa sswor d, the screen displays an asteri sk (*) for each chara cter y ou type.
74 Part V: Troubl eshooting.
75 16 Troubles hooting 16.1 Ove r view This c hapter offer s some suggest ions to sol ve proble ms you m ight encounter . The poten tial problem s are divide d into the foll owing categ ories. • Po wer , Hardware Co nnections , and LEDs • Internet Ac cess • Resetting M W R102 • W ireless Router/AP T ro ubleshoot ing 16.
76 3 Inspect your cables f or dam age. Contact the vendor to r eplace an y damaged ca bles. 4 Disconnect and re - conn ect the p ower adaptor to the M WR102 . 5 If the prob lem continu es, contact t he vendor. 16.3 MWR1 02 Ac cess an d Lo gi n I don’t k now the IP ad dress of my MW R 10 2 .
77 1 Make s ure you are us ing the corr ect IP addres s. • The def ault IP addres s is 192.168. 100.1 . • If y o u change d the IP addr ess ( Chapter 5 ), use t he new IP address.
78 1 Check the hardware c onnections , and mak e sure the LEDs are beha ving as expected. See the Qu ick Start G uide. 2 Make s ure you entered your ISP account inf ormation c orrectl y . These f ields are case - sensitive, so mak e sure [Caps Loc k] is not on.
79 A dvanced Suggesti ons • Check the settings f or bandw idth managem ent. If it is disabled, you might cons ider ac tivating it. If it is en abled, you m ight cons ider chan ging the all ocations. • Check the settings f or QoS. If it is disab led, you might consider ac ti vat ing it.
80 4 Make s ure your com puter (with a wireless adapter ins talled) is within the transm ission range of the MW R102 . 5 Check that both the MW R102 and your wire less statio n are using the sam e wireless and wire less secur ity settings . 6 Make s ure you allow th e MW R102 to be rem otely acces sed through the WLAN interface.
81 17 Product Spec i f ica t i ons The f ollowing tables summar ize the MW R102 ’s hard ware and firm ware featur es. Table 24 Hardware Features Dimensi ons ( W x D x H) 162 mm x 115 mm x 33 mm W ei.
82 F E AT U R E DESCRIPTION Default IP Address 192.168 .10 0.1 (router) 192.168.1 0 0.2. (AP) Default Subn et M ask 255.255.2 55.0 ( 24 bit s) Default Pas sword 1234 DHCP Pool 192.
83 DHCP (Dynamic Host Configurati on Protoc ol) U se this f e atur e to have th e MW R10 2 assign IP addres se s, an IP default g ateway and D NS serv ers to compu ters on y our netw ork. Dynamic DNS S upport W ith Dy namic D NS (Domain N am e Syst em) sup port, you c an use a fixed U RL, www .
84 Appendic es Pop - up W indows, J avaScri pts and Jav a Perm issions IP Address es and Sub netting Setting up Your Com puter’s IP A ddress W ireless LANs Comm on Services Legal Inf ormation.
85 Appendix A Pop - up Windows, JavaScripts and Java Permissions In order to use the W eb - Based Management Interface you need to allow: • W eb browser pop - up windows from your device. • JavaScr ipts (en ab led b y def ault). • Java perm is sions (enabled b y default).
86 Figure 34 Pop - up Blocker You can a lso check if pop - up block ing is disab led in the Po p - up Blocker section i n the Priva cy tab. 1 In Internet Explorer, s elect T ools , Inte rnet Options , Pr iva cy . 2 Clear the Block pop- ups check box in the Po p - up Bl ocker sectio n of the scr een.
87 2 Select Settings… to open t he Pop - up Blocker Settings screen. Figure 36 In terne t Optio ns: P riv acy 3 T y pe the IP addr ess of y ou r device (th e web page t hat you do not want to have blocked) with the pref ix “http:// ”. For exam ple, http://1 92.
88 Figure 37 Pop - up Blocker Settin gs 5 Click Close to r eturn to the Privac y screen. 6 Click Apply to save t his setting . JavaScripts If pages of the W eb - Based Managem ent Inter face do not d isplay proper l y in Intern et Explorer , check that JavaScr ipts are all owed.
89 Figure 38 In terne t Options : Se c u rity 2 Click the Custom Level... button. 3 Scroll do wn to Scripting . 4 Under A ctiv e scripting make s ure that Enable is selec ted (the defau lt). 5 Under Scripting of Java applets make sure that Enable is selected (t he default) .
90 Figure 39 Security Settings - Java Scriptin g Java Permissio ns 1 From Inter net Explorer , click Tools , Inter net Options and then the S ecurity tab. 2 Click the Custom Level... button. 3 Scroll do wn to Microsoft VM . 4 Under Jav a permission s mak e sure that a saf ety level is selected.
91 Fi gure 40 Security Settings – Java J AV A ( S un ) 1 From Inter net Explorer , click Tools , Inter net Options and then the Advanced t ab. 2 Make s ure that Use Java 2 for <app let> under Java (Sun) is selected. 3 Click OK to close t he windo w.
92 Figure 41 Java (Sun).
93 Ap pendix B IP Addresses and Subnet t i ng This appen dix intro duces IP ad dresses and subnet mas ks. IP address es identif y indivi dual devices on a net work. Ever y network ing device (in cluding computer s, servers, r outers, print ers, etc.) ne eds an I P address to c omm unicate ac ross the network .
94 How m uch of the IP addr ess is the network number an d how m uch is the hos t ID varies ac cording to the subn et mask . Subnet M asks A subnet m ask is us ed to deter mine which bits are par t of the n etwork number, an d which b its are part of the host ID (us ing a logic al AND op eration).
95 Table 26 Subnet M ask - Identifying Network Number 1ST OC TE T: (192) 2ND OC TE T: (168) 3RD OC TE T: (1) 4TH OC T ET (2) IP Address (Binary) 11000000 10101000 00000 001 00000 010 Subnet M ask (Bin.
96 24 - bit ma sk 11111 111 11111111 11111111 00000000 255.2 55.255.0 29 - bit ma sk 11111 111 11111111 11111111 11111000 255.2 55.255.2 48 . Ne tw or k Si ze The si ze of the net work num ber determines the m axim um number of possible hos ts you can h ave on your n etwork .
97 For exam ple, 192.1. 1.0 /25 is equ ivalent to s aying 192. 1.1.0 with s ubnet m ask 255. 255.255.128. The f ollowing table s hows som e possible su bnet m asks using both notations . Table 29 Alternative Subnet M ask Notation SUBN ET M AS K AL T E R N AT I V E NOTA TION LA ST O CTE T (BINARY) LA ST O CTE T (DECIM A L) 255.
98 You can “bor row” one of the host ID bits to divide the network 192. 168.1.0 int o two separ ate sub - network s. The subnet mask is no w 25 bits (2 55.255.25 5.128 o r /25). The “bor rowed” host ID bit can ha ve a value of either 0 or 1, allo wing two s ubnets; 192.
99 In a 25 - bit s ubnet the host ID has 7 bits, so eac h sub - net work has a m axim um of 2 7 – 2 or 12 6 possible h osts (a hos t ID of al l zeroes is the s ubnet’s a ddress itse lf, all on es is the s ubnet’s broadcast a ddress). 192.168. 1.
100 Table 30 Subnet 1 IP/SUB NET M ASK NET WORK NUMBER LA ST O CTE T BIT V AL UE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000. 10101000. 0000000 1. 00 000000 Subnet M ask (Binary) 11111111.11111111. 1111111 1. 11 000000 Subnet Addr ess: 192.
101 Table 33 Subnet 3 IP/SUB NET M ASK NET WORK NUMBER LA ST O CTE T BIT V AL UE IP Address 192.168.1. 128 IP Address (Binary) 11000000. 10101000.00 00000 1. 10 000000 Subnet M ask (Binary) 11111111.11111111. 1111111 1. 11 000000 Subnet Addr ess: 192.
102 Example : Eight Subnets Similarl y, use a 27 - bit mask to c reate eight s ubnets ( 000, 001, 0 10, 011, 100, 101, 110 and 111). The f ollowing table s hows IP ad dress last octet va lues for eac h subnet.
103 NO. “BORROWED” HOST BITS SUBN ET M ASK NO. SUBN ETS NO. H OSTS P ER SUBN ET 1 255.255.2 55.128 (/ 25) 2 126 2 255.255.2 55.192 (/ 26) 4 62 3 255.255.2 55.224 (/ 27) 8 30 4 255.255.2 55.240 (/ 28) 16 14 5 255.255.2 55.248 (/ 29) 32 6 6 255.255.
104 7 255.255.2 54.0 (/23) 128 510 8 255.255.2 55.0 (/24) 256 254 9 255.255.2 55.128 (/ 25) 512 126 10 255.2 55.255.192 (/ 26) 1024 62 11 255.2 55.255.224 (/ 27) 2048 30 12 255.2 55.255.240 (/ 28) 4096 14 13 255.2 55.255.248 (/ 29) 8192 6 14 255.2 55.
105 need to ch ange the s ubnet m ask computed b y the MW R102 unless y ou are instruc ted to do otherwis e. Priv ate IP A ddresses Every m achine on the I nternet m ust have a u nique addr ess.
106 After the appropriat e TCP/IP com ponents are installed , configure t he TCP/I P settings in order to "comm unicate" with your net work. If y o u manual ly assign IP inform ation instead.
107 Figure 45 W indow s 95/98/Me: Network: Configuration Installing Com pone nts The Network window Conf igura tion tab displa ys a list of installed c omponents . You need a network adapter, the T CP/IP prot ocol and C lient for Microsof t Netwo rks.
108 If y o u need Cl ient for Mic rosof t Networks : 1 Click Ad d . 2 Select Cli ent and the n click Add . 3 Select M icr osoft from the list of m anufac turer s. 4 Select Client for Microsoft Networks from the list of network clients and t hen click OK .
109 • If y o u kno w y our DNS inf ormation, s elect Enabl e DNS and type the inform ation in the fields below ( you may not ne ed to fill them all in).
110 Figure 47 W indow s 95/98/Me: TCP/IP Properties: DNS Con figuration 4 Click the Gatew ay tab. • If y o u do not k now your g atewa y’ s IP ad dress, rem ove previous ly instal led gatewa y s. • If y o u have a gatewa y IP a ddress, type it in the N ew gatew ay field and c lick Ad d .
111 1 Click start ( Start in W indows 2000/NT ), Settings , Control Pa nel . Figure 48 W indow s XP: Start Menu 2 In the Control Pane l , do uble - click Network Connec ti ons ( Netw ork and Dial - up Connections in W indows 200 0/NT) . Figure 49 W indow s XP: Control Panel 3 Right - click Local A rea Connection and then cl ick Prop erties .
112 Figure 50 W indow s XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP /IP) (under the General tab in W in XP) and th en click Prope rties . Figure 51 W indow s XP: Local Area Connection Properties 5 The Internet Protocol TCP/IP Propertie s window op ens (the G eneral t ab in W indows XP).
113 • If y o u have a st atic IP a ddress c lick Use the followin g IP Address and fill i n the IP address , Subnet ma sk , and Def ault gatew ay fields.
114 Figure 53 W indow s XP: Advanced TCP/IP Properties 7 In the Internet Protoco l TCP /IP Properties window (the Gene ral tab i n W indows XP): • Click Obtain D NS server a ddress aut omaticall y if you do not k now y ou r DNS server IP address( es).
115 Figure 54 W indow s XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Inter net P rotocol (TCP/IP) Pr operties window. 9 Click Close ( OK in W indows 2000/ NT) to c lose the Local Area Co nnection Prope rties win dow. 10 Close the Network Connections window ( Network and Dia l-up Connection s in W indows 2000/NT) .
116 2 Click on Control Pa nel. Figure 55 Wi ndows 7/Vista 3 Click on Network and Internet . Figure 56 Windows 7/Vista 4 Click on Network and Sharing Ce n ter.
117 Figure 57 Windows 7/Vista 5 On the lef t side of the s creen c lick on Change Adapter Setti ngs (W indows 7), or Man age Ne twork Conne c tions (Vista). 6 Right click on Local Area Connection and select Properties . Figure 58 Windows 7/Vista 7 Highlight Inter net Protocol Versi on 4 and click Propert ies .
118 Figure 59 Windows 7/Vista 8 Select Use the Following I P Address and enter your IP addr ess, Su bnet Mas k , and Default G atewa y. Enter your DNS ser ver addres s (if t rying to c onnect t o the int ernet) and click OK . Figure 60 Windows 7/Vista 9 Click OK or Close on the Local Are a Connect ion Properti es window to a pply the settings .
119 Macintosh OS 8/9 1 Click the A pple menu, Control Panel and dou ble - click TCP/IP to open the T CP/I P Control P anel . Figure 61 Macintosh O S 8/9: Apple Menu 2 Select Ethernet built - in from the Connect via list.
120 Figure 62 Macintosh OS 8/9: TCP/IP 3 Fo r dynam ically assigned s ettings, s elect Using DHCP S erver from the Configure: list. 4 For statica lly assigned settings, do the follo wing: • From the Configure box, s elect M anually . • T y pe your IP ad dress in t he IP A ddr ess box.
121 Figure 63 Macintosh O S X: Apple Menu 2 Click Network in the icon b ar. • Select A utomati c from the Locati on list. • Select Built - in E ther net from the Show list. • Click the T CP/IP tab. 3 For dynam icall y assig ned settings , select Using DHC P f rom the Configure list.
122 Figure 64 Macintosh OS X: Ne twork 4 For statica lly assigned settings, do the follo w ing: • From the Configure box, s elect M anually . • T y pe your IP ad dress in t he IP A ddr ess box. • T y pe your subn et mask in the Subnet mask box. • T y pe the IP addr ess of y our Prestig e in the Rout er address box.
123 Linux This s ection shows you how to conf igure your comput er’s TCP/IP s ettings in Red Hat Lin ux 9.0. Procedur e, screens an d file location m ay var y depe nding on your L inux distri bution an d release version. Note: Make sure you are logged in as the root administrator.
124 Figure 66 Red Hat 9.0: KDE: Ethernet Device: General • If y o u have a dynamic I P address c lick A utomatically obtain IP addr ess settings with and select dhcp from the drop down list. • If y o u have a st atic IP a ddress c lick Staticall y set IP A dd resses and fill in the Address , Subnet mask , and Default Gatew ay Address f ields.
125 6 Click the Activate butto n to apply the changes. T he follo wing screen dis plays. Cl ick Yes to sav e the chan ges in all s creens. Figure 68 Red Hat 9.0 : KDE: Network Configuration: Activate 7 After the network card restart proc ess is com plete, m ake sure t he Sta tus is Act i v e in the Network Configurati on scr een.
126 DEVICE=eth0 ONBOOT=yes BOOTPROTO=s tatic IPADDR= 192.168.100 .10 NETMASK= 255.255.255.0 USERCTL=no PEERDNS=yes TYPE= Ethernet 2 If you k now your DNS s erver IP address(es ), enter the DNS server i nform ation in the resolv.co nf file in th e /etc dir ectory.
127 Appe ndix D Appendix D Wireless LANs Wireless L A N T opologie s This secti on di scusses ad - hoc and infras tructure wire less LAN t opologies. Ad - hoc Wireles s LA N Configuration The sim plest W LAN configuratio n is an ind ependent ( Ad - hoc) W LAN that connec ts a set of computers with wireless s tations (A, B, C) .
128 BSS A Basic S ervice Set ( BSS) exis ts when all com munic ations between wireless stations or be tween a wireless station and a wir ed network client go throu gh one ac cess point ( AP). Intra - BSS tr affic is traffic between wireless s tations in t he BSS.
129 An ESSID ( ESS IDent ification) uniquel y identifies eac h ESS. Al l access po ints and their associated wireless stations within the sam e ESS m ust have the sam e ESSID in order to comm unicate.
130 Figure 76 In fras tru c ture WLAN Channel A channe l is the radio frequ ency(ies) us ed by IEEE 802.11a/b/ g wireless d evices. Channe ls availab le depend on your geogra phical ar ea. You m ay have a choic e of chann els (f or your region) so you shou ld use a different chan nel than a n adjacen t AP (acc ess point) to r educe int erference.
131 W hen station A sends data to th e AP, it m ight not know that the sta tion B is a lready usi ng the channel. If these t wo stations send data at t he sam e tim e, collisions m ay occur when both sets of data arriv e at the A P at the s ame tim e, resulting in a loss of messages f or both stations.
132 If the Fragmentation Threshol d value is sm aller than the RT S/CTS value (see pr evious l y) y ou set then th e RTS (Req uest T o Send)/CTS ( Clear to Se nd) handshak e will ne ver occur as data fram es will be fragm ented befor e they reac h RTS/CT S si ze.
133 Table 38 IEEE 802.11g D AT A R AT E (MB PS) MODULATION 1 DBPSK (D ifferential Binary Ph ase Shift K eyed) 2 DQPSK ( Differential Q uadrat ure Pha se Shift Keyin g) 5.5 / 11 CC K (Complemen tary Code K eying) 6/9/12/18/ 24/36/48 /54 OFDM (Orthog onal Fr equency Division M ultiplexing) IEEE 802.
134 Determ ines the net work services availab le to authentic ated user s once the y are connect ed to the net work. • Account ing Keeps trac k of the client’s net work activit y. RADIUS is a simple p ackage exc hange in wh ich your AP acts as a m essage r elay between t he wireless station and t he networ k RADIUS s erver.
135 The t ype of authent ication you us e depends o n the RADI US server or the AP. C onsult your network administrator for mor e inform ation. E AP - MD5 ( Message - Digest A lgorithm 5) MD5 auth entication is the sim plest one - way auth entication method.
136 Dyn amic WEP Key Exchange The AP m aps a uniqu e key that is generat ed with the RADIUS ser ver. This key ex pires when th e wireless connection times out, d isconnects or reauthen tication t imes out. A new W EP k ey is generated each tim e reauthentica tion is per formed.
137 W P A( 2 ) Wi - Fi Protec ted Access (WPA) is a subset of the IEEE 802. 11i stan dard. W PA2 (IEEE 802. 11i) is a wireless securit y standard tha t defines s tronger enc ryption, au thenticat ion and k e y managem ent than W PA. Key dif ferences bet ween WPA(2) and W EP are impr oved data encr yption and use r authent ication.
138 password - gues s i ng attac k s but it's s till an im provement over W EP as it em ploys an easi er - to - use, consistent, single, al phanum eric pass word. U ser A uthenticatio n W PA or W PA2 applies I EEE 802.1x a nd Extens ible Authe ntication Pr otocol ( EAP) to authen ticat e wireless clients usin g an ext ernal RADIU S databas e.
139 Figu re 78 W PA( 2) - PSK Authentication WP A ( 2) w ith RADIUS A pp lication Example You need th e IP addres s of the R ADIUS ser ver, its por t number ( default is 18 12), and the RADIUS s hared secr et. A W PA(2) applicat ion exam ple with an exter nal RADI US server l ooks as fo llows.
140 Table 40 W ireless Security Relational Matrix AUTHENTIC A T ION METHOD/ KEY M A N A GEM ENT PROTOCOL ENCRYPTI ON M ET HO D ENTER M AN U A L K E Y IEEE 802.
141 Appe ndix E Appendix E Common Servi ces The f ollowing table lists som e comm only - used services and their as sociated prot ocols and p ort number s. For a com prehensive list of port num bers, IC MP type/cod e number s and services , visit the IAN A (Internet As signed Num ber Aut hority) web s ite.
142 servers. BGP TCP 179 Border Gateway Pr otocol. BOOTP_CLIENT UDP 68 DHCP Client. BOOTP_SERVER UDP 67 DHCP Serv er. CU -SEEME TCP UDP 7648 24032 A popular v ideoconfer encing s olution fr om White Pine s Softw are. DNS TCP/UDP 53 Domain Nam e Server, a servic e that matches w eb names (f or example http://us.
143 IG MP (MUL TICA ST) User - Defined 2 Internet G roup M anagement P rotocol i s used w hen sending pa ckets to a specifi c group of hosts. IKE UDP 500 The I nternet Key Exchange a lgorith m is used for key distri bution an d m anage me nt. IRC TCP/UDP 6667 This is anot her popular Intern et chat program.
144 RC MD TCP 512 Remote Comman d Service. REAL_AUDIO TCP 7070 A streami ng audio serv ice t hat enables real time so und over the web. REXEC TCP 514 R emote Ex ecution Daem on.
145 TACACS UDP 49 Login Host Protocol used for ( Terminal Access C ontroller A ccess Con trol Sy stem) . TELN ET TCP 23 Telnet is the login and t ermina l emulati on protocol commo n on the I nter net and in UNIX environments. It operate s over TCP/I P networks.
146 Appe ndix F Appendix F Legal In formation Cop y righ t Cop y r ight © 201 0 by Z y XE L Comm unications Corpor ation. The cont ents of this publica tion ma y not be r eproduce d in an y part or a.
147 This devic e has bee n tested and f ound to com ply with the limits for a Class B di git al dev ice pursuant to Part 15 of the FCC Rules. T hese lim its are designed to provide r easonable pr otection against h armful interf erence in a residen tial insta llation.
148 Indust ry Canada Stat ement This devic e com plies with RSS - 2 10 of the In dustry Ca nada Rules. O peration is subject to t he following two cond itions: 1 this devic e ma y not cause interf ere.
149 product h as been m odified, m isused, tam pered with, d amaged b y an act of God, or subjected t o abnorm al working con dition s. Note Repair or r eplacem ent, as prov ided under t his warrant y, is the ex clusive rem edy of the pur chaser.
150 App endix G Open Source Licenses Article I. End -User Lic ense A g reement for “ MWR102 ” Article II. WARNING: Z y XEL Communic ations Cor p. IS W ILLING TO LICENSE THE SO FTW ARE TO YOU ONLY UPON T HE CONDITION T HAT YOU ACCEPT ALL OF THE TERMS CONT AINED IN T HIS LIC ENSE AGREE MENT.
151 not excee d the scope of the l icense grante d hereunde r. Any rights not expres sly grante d by ZyXEL to you are res erved b y ZyXEL, and all im plied licenses are discla imed.
152 License Agr eem ent to those persons emplo yed by y ou who c ome into c ontact with t he Software, and to use reasonab le best eff orts to ensure their com pliance with s uch terms and condi tions.
153 INCLUDING REASONA BLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE O UT OF ANY BRE ACH OF T HIS SEC TION 8. 9.Audit Ri ghts ZyXEL SHALL H AVE T HE RIGHT , AT IT S OW N EXPENSE, UPON R EAS.
154 Article III. Article IV. NOT E: Some c omponents of this product inc orporate f ree softwar e program s covered un der the op en source co de licens es which a llows you t o freel y copy, modif y and redistrib ute the sof tware.
155 igmppr oxy v1.2 http://sour ceforge.ne t/projec ts/igmppr oxy/ GPLv2 iproute2 - 2. 6.29 -1 v2.6.19 http://www .linuxf oundation.or g/collaborate/ w ork groups/network ing/iproute2 GPLv2 iptables - 1.4.4 v1.4.4 http://www. netfilter.org/ about.htm l#license http://www .
156 Notice Information herein is subject to chang e without notice. C ompanies, names, and da ta used in examples herein ar e fictitious unless o therwise noted.
157 rights that you hav e. You must mak e sure that they , too, rece ive or can get the so urce co de. And yo u must sh ow the m these term s so the y know the ir rights.
158 2. You m ay modi fy your copy or c opies of th e Progra m or any po rtion of it, thus for ming a work based on the P rogram, and copy and distribute s uch modifications o r wor k under the te rms .
159 medi um cust om aril y used f or soft ware i nterch ange; or, c) A ccomp any i t wi th the i nformat ion you rec eived as to the of fer to dist ribut e corresp ondi ng sou rce co de.
160 then the o nly way you could satisfy both it a nd this License would be to refrai n enti rely from distri buti on of the Pr ogram . If any p ortion of thi s secti on is held inva lid or un enforce.
161 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALI TY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING , REPAIR OR CORRECTION.
162 To prot ect y our ri ghts, we need to p revent others f rom d enyin g you th ese rig hts or a sking you to s urren der th e rig hts. The refore , you h ave ce rtai n respons ibilities if you distr ibute copies of the softwa re , or if you modify it: responsi bili ties t o respe ct the f reed om of ot hers .
163 To “mod ify” a work m eans to copy from or ada pt al l or part of the w ork i n a fashion re quiring copyright per mission, other than the mak ing of an exact copy. Th e resu ltin g work i s call ed a “m odified versi on” of the earl ier w ork or a work “b ased on” th e ear lier wo rk.
164 acti viti es. Howev er, i t does n ot in clud e the wor k's Sys tem Li brari es, or gene ral - pu rpose t ools o r genera ll y avail able fre e prog rams wh ich a re used unmodified in perf orming those ac tivities but which are no t part of the work.
165 work a s a mea ns of enforci ng, agains t the wo rk's us ers, you r or t hird p arti es' leg a l rig hts to f o rbid c ircu m ve ntion of techn olo gic al m e a sure s.
166 6. Conveyin g Non - Sou rce Form s. You ma y con vey a co vered work i n obje ct code form under the term s of sec tions 4 and 5, provided t ha t you also co nvey the m a chine - readab le Corr es.
167 by a pa rticu lar u ser, “n ormal ly used ” refe rs to a typi cal or c ommon use of that class of produc t , rega rdless of the statu s of th e part icul ar user o r of th e way in which th e particul ar user actu all y uses, or ex pects o r is expe cted to u se, the product.
168 ma teri al, ad ded by y ou to a cove red work , for whi ch you h ave or ca n gi ve appropriate c opyright permiss ion. Notwithstand ing any o ther provision of this L ic ense, for m a ter ial you .
169 (includ ing any pate nt lice nses gra nt ed under the third paragr aph of section 11). Howev er, i f you c ease al l viol ation of thi s Licen se, then your l icen se from a particular c opyright .
170 counterc laim in a laws uit) a l leg ing that any patent cla im is infringed by maki ng, u sing, sel lin g, offeri ng for sa le, o r imp ortin g the Pr ogram or an y porti on of i t. 11. Patents. A “contribu tor ” is a copyr ight holder w ho author izes use und e r this Lice nse of the Pr ogram or a wo rk on whi ch the Pr ogram is bas ed.
171 A pa tent lic en se is “dis c rimin at o ry” if it do e s not inc lude w ith in the sc ope o f it s coverag e, proh ibi ts the exe rcise of, or i s c on di tioned on the non - e xerci se of one or mor e of th e rig hts th at are sp ecif ically g ranted und er thi s License .
172 publi shed b y the F ree Soft ware F ounda tion . If th e Prog ram doe s not s peci fy a vers ion number of the GNU Gene ral Public L icense , you m ay cho ose any versi on eve r publ ished by the F ree Sof tware Foun dation .
173 How to App ly These T erms to Your Ne w Programs If you deve lop a new program, and you want it to be of the greatest possible use to the public, the be st way to achieve this is to make it free software which ev eryo ne ca n re distribute and chang e unde r thes e term s.
174 library. I f this is what you want to do, use the GN U Less er Gen eral Publi c Licen se ins tead of t his L icen se. But first, p leas e read < http://www.gnu.o rg/philosophy/why- no t - lgpl.html >. This Pr oduct includes libnl - 1.1 , li busb - 0.
175 For exam ple, if you distribut e copies of the librar y, whether gratis or for a fee, y ou m ust give the recipients all the r ights that we gave you.
176 Although the Lesser Gener al Public License is Less protective of the user s' freedom , it does ens ure that the us er of a pr ogram that is linked w ith the Libr ary has the f reedom and the w herewithal to run that program using a m odified versio n of the Li brary.
177 modif ied work mus t itself be a soft ware library. b) You m ust cause the f iles modified to carr y prom inent notices stating that you cha nged the f iles and th e date of an y cha nge. c) You mus t cause the whole of the work to be licensed at no c harge to all thir d parties under the terms of this Licens e.
178 Librar y" . Such a work, in isolat ion, is not a derivativ e work of the Librar y, and therefore falls outsi de the scop e of this License. However, li nki ng a " work that uses t he Lib.
179 exceptio n, the mat erials to be distribut ed need not include an y thing t hat is norm ally distribute d (in either so urce or binar y form) with th e major com ponents (com piler, kernel, and so on) of the operat ing s ystem on which th e exec utab le runs , unles s that c om ponent itself acc ompanies th e executabl e.
180 apply in oth er circ ums tances. It is not the purpos e of this section to i nduce you to inf ringe any patents or other proper ty right c laims or to contest validity of an y such claims ; this s.
181 THE LI BRARY (I NCLUD ING BUT NOT LIMIT ED TO LOSS OF DAT A OR DATA BEING REND ERED INACC URAT E OR LOSSE S SUSTAI NED BY YOU OR THIRD PART IES OR A FAIL URE OF T HE LIBR ARY TO OPERAT E W ITH ANY OTHER SO FTW AR E), EVEN IF SUCH HO LDER OR OTHER PART Y HAS BEEN ADVIS ED OF THE POSSIBI LITY O F SUCH DAMAGE S.
182 Zlib License zli b.h -- interf a ce of th e 'zli b' gen eral pu rpose compre ssion libra ry ver sion 1.2.2, October 3rd, 20 04 Copyright (C) 1995- 200 4 Jean - loup Gailly and Mark Adler Thi s software i s provi ded 'as - is', without any express or implied warranty.
183 product, an a c knowledgment in the pro duct documentation would be appreciated but is no t re quired. 2. Alt ered sourc e versi ons must be p lai nly ma rked as s uch, and mu s t not be mi srepr esented as b eing the ori gin al softwar e. 3. Thi s noti ce may not be r emoved or al tered f rom an y sourc e distribution.
Een belangrijk punt na aankoop van elk apparaat ZyXEL Communications MWR102 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen ZyXEL Communications MWR102 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens ZyXEL Communications MWR102 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding ZyXEL Communications MWR102 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over ZyXEL Communications MWR102 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van ZyXEL Communications MWR102 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de ZyXEL Communications MWR102 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met ZyXEL Communications MWR102 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.