The contents of this publication may not be reproduced in any part or as a whole, transcribed,
stored in a retrieval system, translated into any language, or transmitted in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or
software described herein. Neither does it convey any license under its patent rights nor the
patent rights of others. ZyXEL further reserves the right to make changes in any products
described herein without notice. This publication is subject to change without notice.
Copyright
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL
Communications, Inc. Other trademarks mentioned in this publication are used for
identification purposes only and may be properties of their respective owners.
2Copyright
G-1000 User’s Guide
Federal Communications
Commission (FCC) Interference
Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two
conditions:
• This device may not cause harmful interference.
• This device must accept any interference received, including interference that may cause
undesired operations.
This equipment has been tested and found to comply with the limits for a Class B digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a commercial environment. This equipment
generates, uses, and can radiate radio frequency energy, and if not installed and used in
accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
• Reorient or relocate the receiving antenna.
• Increase the separation between the equipment and the receiver.
• Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
• Consult the dealer or an experienced radio/TV technician for help.
Caution
1. To comply with FCC RF exposure compliance requirements, a separation distance
of at least 20 cm must be maintained between the antenna of this device and all
persons.
2. This Transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance
could void the user's authority to operate the equipment.
Information for Canadian Users
This Class B digital apparatus complies with Canadian ICES-003.
Federal Communications Commission (FCC) Interference Statement3
G-1000 User’s Guide
Cet appareil numerique de la classe B est conforme a la norme NMB-003 du Canada.
Certifications
Go to www.zyxel.com
1 Select your product from the drop-down list box on the ZyXEL home page to go to that
product's page.
2 Select the certification you wish to view from this page.
For your safety, be sure to read and follow all warning notices and instructions.
• Do NOT open the device or unit. Opening or removing covers can expose you to
dangerous high voltage points or other risks. ONLY qualified service personnel can
service the device. Please contact your vendor for further information.
• Use ONLY the dedicated power supply for your device. Connect the power cord or
power adaptor to the right supply voltage (110V AC in North America or 230V AC in
Europe).
• Do NOT use the device if the power supply is damaged as it might cause electrocution.
• If the power supply is damaged, remove it from the power outlet.
• Do NOT attempt to repair the power supply. Contact your local vendor to order a new
power supply.
• Place connecting cables carefully so that no one will step on them or stumble over them.
Do NOT allow anything to rest on the power cord and do NOT locate the product where
anyone can walk on the power cord.
• Do NOT install nor use your device during a thunderstorm. There may be a remote risk of
electric shock from lightning.
• Do NOT expose your device to dampness, dust or corrosive liquids.
• Do NOT use this product near water, for example, in a wet basement or near a swimming
pool.
• Make sure to connect the cables to the correct ports.
• Do NOT obstruct the device ventilation slots, as insufficient airflow may harm your
device.
• Do NOT store things on the device.
• Connect ONLY suitable accessories to the device.
• Antenna Warning! This device meets ETSI and FCC certification requirements when
using the included antenna(s). Only use the included antenna(s).
Safety Warnings5
G-1000 User’s Guide
ZyXEL warrants to the original end user (purchaser) that this product is free from any defects
in materials or workmanship for a period of up to two years from the date of purchase. During
the warranty period, and upon proof of purchase, should the product have indications of failure
due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the
defective products or components without charge for either parts or labor, and to whatever
extent it shall deem necessary to restore the product or components to proper operating
condition. Any replacement will consist of a new or re-manufactured functionally equivalent
product of equal or higher value, and will be solely at the discretion of ZyXEL. This warranty
shall not apply if the product has been modified, misused, tampered with, damaged by an act
of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the
purchaser. This warranty is in lieu of all other warranties, express or implied, including any
implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in
no event be held liable for indirect or consequential damages of any kind to the purchaser.
ZyXEL Limited Warranty
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return
Material Authorization number (RMA). Products must be returned Postage Prepaid. It is
recommended that the unit be insured when shipped. Any returned products without proof of
purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of
ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products
will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty
gives you specific legal rights, and you may also have other rights that vary from country to
country.
6ZyXEL Limited Warranty
G-1000 User’s Guide
Customer Support
Please have the following information ready when you contact customer support.
• Product model and serial number.
• Warranty Information.
• Date that you received your device.
• Brief description of the problem and the steps you took to solve it.
Table 87 Log Categories and Available Settings ................................................................ 182
Table 88 NORTH AMERICAN PLUG STANDARDS .......................................................... 186
Table 89 NORTH AMERICAN PLUG STANDARDS .......................................................... 186
Table 90 EUROPEAN PLUG STANDARDS ....................................................................... 186
Table 91 UNITED KINGDOM PLUG STANDARDS ........................................................... 186
Table 92 JAPAN PLUG STANDARDS ................................................................................ 186
Table 93 AUSTRALIA AND NEW ZEALAND PLUG STANDARDS ................................... 187
22
G-1000 User’s Guide
23
G-1000 User’s Guide
Congratulations on your purchase of the ZyXEL G-1000 - 802.11g Wireless Access Point.
An AP acts as a bridge between the wireless and wired networks, extending your existing
wired network without any additional wiring.
Your G-1000 is easy to install and configure.
About This User's Guide
This User’s Guide is designed to guide you through the configuration of your G-1000 using
the web configurator or the SMT. The web configurator parts of this guide contain background
information on features configurable by web configurator. The SMT parts of this guide
contain background information solely on features not configurable by web configurator
Preface
Note: Register your product online to receive e-mail notices of
firmware upgrades and information at www.zyxel.com
products, or at www.us.zyxel.com
for North American products.
for global
Note: Use the web configurator, System Management Terminal (SMT) or
command interpreter interface to configure your G-1000. Not all features can
be configured through all interfaces.
Related Documentation
• Supporting Disk
Refer to the included CD for support documents.
• Compact Guide
The Compact Guide is designed to help you get up and running right away. They contain
connection information and instructions on getting started.
• Web Configurator Online Help
Embedded web help for descriptions of individual screens and supplementary
information.
• ZyXEL Glossary and Web Site
Please refer to www.zyxel.com
support documentation.
for an online glossary of networking terms and additional
24Preface
G-1000 User’s Guide
User Guide Feedback
Help us help you! E-mail all User Guide-related comments, questions or suggestions for
improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing
Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park,
Hsinchu, 300, Taiwan. Thank you!
Syntax Conventions
• “Enter” means for you to type one or more characters. “Select” or “Choose” means for
you to use one of the predefined choices.
• The SMT menu titles and labels are in Bold Times New Roman font. Predefined field
choices are in Bold Arial font. Command and arrow keys are enclosed in square
brackets. [ENTER] means the Enter, or carriage return key; [ESC] means the Escape key
and [SPACE BAR] means the Space Bar.
• Mouse action sequences are denoted by right angle brackets (>). For example, “Start >
Settings > Control Panel > System” means click the Start button, move the mouse over
Settings, move the mouse over or click on Control Panel, and then click on System.
• “e.g.,” is a shorthand for “for instance”, and “i.e.,” means “that is” or “in other words”.
• The ZyXEL G-1000 may be referred to simply as the G-1000 in the user’s guide.
Graphics Icons Key
G-1000ComputerNotebook computer
ServerDSLAMFirewall
ModemSwitchRouter
Wireless Signal
Preface25
G-1000 User’s Guide
Getting to Know Your G-1000
This chapter introduces the main features and applications of the G-1000.
1.1 Introducing the G-1000
The G-1000 Access Point extends the range of your existing wired network without any
additional wiring efforts, providing easy network access to mobile users.
The G-1000 incorporates the IEEE802.11g standard for high-speed wireless transmission. In
line with the standard, your G-1000 is backward-compatible with IEEE802.1b-enabled
devices.
CHAPTER1
Additionally, the G-1000 offers highly-secure wireless connectivity to your wired network
with IEEE 802.1x, WEP data encryption and MAC address filtering.
The G-1000 is easy to install and configure. The embedded web-based configurator enables
easy operation and configuration.
1.2 G-1000 Features
The following sections describe the features of the G-1000
This auto-negotiating feature allows the G-1000 to detect the speed of incoming transmissions
and adjust appropriately without manual intervention. It allows data transfer of either 10 Mbps
or 100 Mbps in either half-duplex or full-duplex mode depending on your Ethernet network.
An auto-crossover (auto-MDI/MDI-X) port automatically works with a straight-through or
crossover Ethernet cable.
1.2.1.3 Reset Button
The G-1000 reset button is built into the side panel. Use this button to restore the factory
default password to 1234; IP address to 192.168.1.2, subnet mask to 255.255.255.0.
26Chapter 1 Getting to Know Your G-1000
1.2.1.4 G-1000 LED
The blue G-1000 LED (also known as the Breathing LED) is on when the G-1000 is on and
blinks (or breaths) when data is being transmitted to/from its wireless stations. You may use
the web configurator to turn this LED off even when the G-1000 is on and data is being
transmitted/received.
1.2.2 Firmware Features
1.2.2.1 Internal RADIUS Server
The G-1000 has a built-in RADIUS server that can authenticate wireless clients or other AP’s
in other wireless networks.The G-1000 can also function as an AP and as a RADIUS server at
the same time.
1.2.2.2 Wi-Fi Protected Access
The G-1000 supports WPA and WPA2. Wi-Fi Protected Access (WPA) is a subset of the
IEEE 802.11i security specification draft. WPA supports user authentication, and it provides
better data encryption than WEP. WPA2 is similar to WPA but provides even stronger data
encryption than WPA.
G-1000 User’s Guide
1.2.2.3 802.11b Wireless LAN Standard
The G-1000 complies with the 802.11b wireless standard.
The 802.11b data rate and corresponding modulation techniques are shown in the table below.
The modulation technique defines how bits are encoded onto radio waves.
The G-1000 complies with the 802.11g wireless standard and is also fully compatible with the
802.11b standard. This means an 802.11b radio card can interface directly with an 802.11g
device (and vice versa) at 11 Mbps or lower depending on range. 802.11g has several
intermediate rate steps between the maximum and minimum data rates. The 802.11g data rate
and modulation are as follows:.
Table 2 IEEE 802.11g
DATA RATE
(MBPS)
6/9/12/18/24/36/48/54OFDM (Orthogonal Frequency Division Multiplexing)
MODULATION
Note: The G-1000 may be prone to RF (Radio Frequency)
interference from other 2.4 GHz devices such as microwave
ovens, wireless phones, Bluetooth enabled devices, and other
wireless LANs.
1.2.2.5 STP (Spanning Tree Protocol) / RSTP (Rapid STP)
(R)STP detects and breaks network loops and provides backup links between switches,
bridges or routers. It allows a bridge to interact with other (R)STP -compliant bridges in your
network to ensure that only one path exists between any two stations on the network.
1.2.2.6 Limit the number of Client Connections
You may set a maximum number of wireless stations that may connect to the G-1000. This
may be necessary if for example, there is interference or difficulty with channel assignment
due to a high density of APs within a coverage area.
1.2.2.7 Brute-Force Password Guessing Protection
The G-1000 has a special protection mechanism to discourage brute-force password guessing
attacks on the G-1000's management interfaces. You can specify a wait-time that must expire
before entering a fourth password after three incorrect passwords have been entered. Please
see the appendix for details about this feature.
1.2.2.8 Wireless LAN MAC Address Filtering
Your G-1000 checks the MAC address of the wireless station against a list of allowed or
denied MAC addresses.
1.2.2.9 WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless
network to help keep network communications private.
28Chapter 1 Getting to Know Your G-1000
1.2.2.10 IEEE 802.1x Network Security
The G-1000 supports the IEEE 802.1x standard to enhance user authentication. Use the builtin user profile database to authenticate up to 32 users using MD5 encryption. Use an EAPcompatible RADIUS (RFC2138, 2139 - Remote Authentication Dial In User Service) server
to authenticate a limitless number of users using EAP (Extensible Authentication Protocol).
EAP is an authentication protocol that supports multiple types of authentication.
1.2.2.11 SNMP
SNMP (Simple Network Management Protocol) is a protocol used for exchanging
management information between network devices. SNMP is a member of the TCP/IP
protocol suite. Your G-1000 supports SNMP agent functionality, which allows a manger
station to manage and monitor the G-1000 through the network. The G-1000 supports SNMP
version one (SNMPv1) and version two c (SNMPv2c).
1.2.2.12 Full Network Management
The embedded web configurator is an all-platform web-based utility that allows you to easily
access the G-1000’s management settings. Most functions of the G-1000 are also software
configurable via the SMT (System Management Terminal) interface. The SMT is a menudriven interface that you can access from a terminal emulator over a telnet connection.
G-1000 User’s Guide
1.2.2.13 Logging and Tracing
• Built-in message logging and packet tracing.
• Unix syslog facility support.
1.2.2.14 Embedded FTP and TFTP Servers
The G-1000’s embedded FTP and TFTP servers enable fast firmware upgrades as well as
configuration file backups and restoration.
1.2.2.15 Wireless Association List
With the wireless association list, you can see the list of the wireless stations that are currently
using the G-1000 to access your wired network.
1.3 Applications for the G-1000
Here are some G-1000 application examples.
.
Note: A different channel should be configured for each WLAN
interface to reduce the effects of radio interference.
Chapter 1 Getting to Know Your G-100029
G-1000 User’s Guide
1.3.1 Internet Access Application
The G-1000 is an ideal access solution for wireless Internet connection. A typical Internet
access application for your G-1000 is shown as follows. Stations A, B and C can access the
wired network through the G-1000s.
Figure 1 Internet Access Application
1.3.2 Corporation Network Application
In situations where users are always on the move in the coverage area but still need access to
corporate network access, the G-1000 is an ideal solution for wireless stations to connect to the
corporate network without expensive network cabling.
The following figure depicts a typical application of the G-1000 in an enterprise environment.
Stations A and B with wireless adapters are allowed to access the network resource through
the G-1000 after account validation by the network authentication server.
Figure 2 Corporation Network Application
30Chapter 1 Getting to Know Your G-1000
G-1000 User’s Guide
Chapter 1 Getting to Know Your G-100031
G-1000 User’s Guide
CHAPTER2
Hardware Installation and Initial
Setup
This chapter describes the physical features of the G-1000 and how to make cable connections.
2.1 Front Panel of the G-1000
The LEDs on the front panel indicate the operational status of your G-1000.
Figure 3 G-1000 Front Panel
32Chapter 2 Hardware Installation and Initial Setup
G-1000 User’s Guide
Table 3 Front Panel LED Description
LEDCOLORSTATUSDESCRIPTION
BRI/RPTGreenOnThe wireless card on the G-1000 is working properly.
OffThe wireless card on the G-1000 is not ready or has a
malfunction.
RedOnThe G-1000 is not ready or rebooting.
G-1000(WLAN
ACK)
ETHNGreenOnThe G-1000 has a successful 10Mb Ethernet connection.
PWRGreenOnThe G-1000 is receiving power.
BlueBreathingThe G-1000 is sending or receiving data.
On (dim)The G-1000 is ready, but is not sending or receiving data.
BlinkingThe G-1000 is sending/receiving data.
OffThe G-1000 does not have 10Mb Ethernet connection.
OrangeOnThe G-1000 has a successful 100Mb Ethernet connection.
BlinkingThe G-1000 is sending or receiving data.
OffThe G-1000 does not have 100Mb Ethernet connection.
OffThe G-1000 is not receiving power.
2.2 Top Panel and Connections of the G-1000
The following figure shows the top panel of your G-1000.
Chapter 2 Hardware Installation and Initial Setup33
G-1000 User’s Guide
Figure 4 G-1000 Top Panel
2.2.1 One 10/100M Ethernet Port
Ethernet 10Base-T/100Base-T networks use Shielded Twisted Pair (STP) cable with RJ-45
connectors that look like a bigger telephone plug with 8 pins. The ETHERNET port is autosensing, so you may use the crossover cable provided or a straight-through Ethernet cable to
connect your G-1000 to a computer/external hub.
Note: When the G-1000 is turned on and properly connected to a computer or a hub,
the ETHN LED on the front panel turns on.
2.2.2 Power Port
Connect the power adapter to the port labeled POWER 12VDC on the top panel of your G1000 which then automatically turns on.
Note: The G-1000 will reboot if the supplied power is too low. This is a normal
operation.
Note: To avoid damage to the G-1000, make sure you use the supplied power
adapter. Refer to the Power Adapter Specification appendix for more information.
2.2.3 The RESET Button
Hold this button in for about ten seconds (or until the Link LED turns red) to reboot and
restore your G-1000 to factory default values.
Note: All custom settings will be lost once you reset to the default settings.
34Chapter 2 Hardware Installation and Initial Setup
2.2.4 Antennas
The G-1000 is equipped with two reverse SMA connectors and two detachable omnidirectional 2dBi antennas to provide clear radio signal between the wireless stations and the
access points. Refer to the Antenna Selection and Positioning Recommendations appendix for
more information.
The following table shows the G-1000’s coverage (in meters) using the included antennas. The
distance may differ depending on the network environment.
Table 4 G-1000 Wireless LAN Coverage
≤ 11 MBPS≤ 5.5 MBPS OR LOWER
Indoor50 m80 m
Outdoor200 m300 m
Refer to the Quick Installation Guide for instructions on how to attach the antennas to the G-
1000.
G-1000 User’s Guide
2.3 Hardware Mounting Options
The G-1000 may be placed on a flat surface or wall mounted.
In general, the best place for the access point is at the center of your intended wireless
coverage area. For better performance, mount the G-1000 in a high position free of
obstructions.
Refer to the Quick Start Guide for hardware mounting procedure.
2.4 Additional Installation Requirements
• A computer(s) with an installed network card or an IEEE 802.11b-compliant PCMCIA
wireless LAN card.
• To enable remote RADIUS authentication for wireless clients, you need
•A wireless client computer running IEEE 802.1x-compliant client
software. Currently, this is bundled with Windows XP.
•A network RADIUS server for remote user authentication and
accounting.
2.5 Configuring Your G-1000
Configure your G-1000 using the Web configurator or SMT (System Management Terminal).
You can access the SMT using Telnet.
Chapter 2 Hardware Installation and Initial Setup35
G-1000 User’s Guide
CHAPTER3
Introducing the Web
Configurator
This chapter describes how to access the G-1000 web configurator and provides an overview
of its screens. The default IP address of the G-1000 is 192.168.1.2.
3.1 Accessing the G-1000 Web Configurator
1 Make sure your G-1000 hardware is properly connected and prepare your computer/
computer network to connect to the G-1000 (refer to the Quick Start Guide).
2
Launch your web browser.
3
Type "192.168.1.2" as the URL.
4
Type "1234" (default) as the password and click Login. In some versions, the default
password appears automatically - if this is the case, click Login.
5
You should see a screen asking you to change your password (highly recommended) as
shown next. Type a new password (and retype it to confirm) and click Apply or click
Ignore.
Note: If you do not change the password, the following screen
appears every time you login.
36Chapter 3 Introducing the Web Configurator
Figure 5 Change Password Screen
You should now see the MAIN MENU screen.
G-1000 User’s Guide
Note: The management session automatically times out when
the time period set in the Administrator Inactivity Timer field
expires (default five minutes). Simply log back into the G-1000 if
this happens to you.
3.2 Resetting the G-1000
If you forget your password or cannot access the web configurator, you will need to reload the
factory-default configuration file or use the RESET button on the side panel of the G-1000.
Uploading this configuration file replaces the current configuration file with the factorydefault configuration file. This means that you will lose all configurations that you had
previously. The password will be reset to 1234.
3.2.1 Procedure To Use The Reset Button
Make sure the SYS LED is on (not blinking) before you begin this procedure.
1
Press the RESET button for ten seconds or until the SYS LED, LINK LED or BDG/
RPT LED turns red, and then release it. If the SYS LED begins to blink, the defaults have
been restored and the G-1000 restarts. Otherwise, go to step 2.
2 Turn the G-1000 off.
3
While pressing the RESET button, turn the G-1000 on.
4
Continue to hold the RESET button. The SYS LED will begin to blink andflicker very
quickly after about 20 seconds. This indicates that the defaults have been restored and the
G-1000 is now restarting.
Chapter 3 Introducing the Web Configurator37
G-1000 User’s Guide
5 Release the RESETbutton and wait for the G-1000 to finish restarting.
3.2.2 Method of Restoring Factory-Defaults
You can erase the current configuration and restore factory defaults in three ways:
Use the RESET button on the side panel of the G-1000 to upload the default configuration file
(hold this button in for about 10 seconds or until the SYS LED, LINK LED or BDG/RPT
LED turns red). Use this method for cases when the password or IP address of the G-1000 is
not known.
Use the web configurator to restore defaults (refer to Chapter 10).
Transfer the configuration file to your G-1000 using FTP. See later in the part on SMT
configuration for more information.
3.3 Navigating the G-1000 Web Configurator
The following summarizes how to navigate the web configurator from the MAIN MENU
screen.
Note: Follow the instructions you see in the MAIN MENU screen or click the
icon (located in the top right corner of most screens) to view online help.
Note: The icon does not appear in the MAIN MENU screen.
Figure 6 The MAIN MENU Screen of the Web Configurator
Click WIZARD SETUP for initial configuration including general setup, Wireless LAN
setup and IP address assignment.
38Chapter 3 Introducing the Web Configurator
G-1000 User’s Guide
Click the links under ADVANCED to configure advanced features such as SYSTEM
(General Setup, Password and Time Zone), WIRELESS (Wireless, MAC Filter, Roaming and
802.1x/WPA), IP, REMOTE MGNT (Telnet, FTP, WWW and SNMP), Internal RADIUS
Server
(Settings, Trusted AP and Trusted User databases), and LOGS (View reports and Log
Settings).
Click MAINTENANCE to view information about your G-1000 or upgrade configuration/
firmware files. Maintenance includes Status (Statistics), Association List, Channel Usage,
F/W (firmware) Upload, Configuration (Backup, Restore and Default) and Restart
Click LOGOUT at any time to exit the web configurator
Chapter 3 Introducing the Web Configurator39
G-1000 User’s Guide
This chapter provides information on the Wizard Setup screens in the web configurator.
4.1 Wizard Setup Overview
The web configurator’s setup wizard helps you configure your G-1000 for wireless stations to
access your wired LAN.
4.1.1 Channel
A channel is the radio frequency(ies) used by IEEE 802.11b and IEEE 802.11g wireless
devices. Channels available depend on your geographical area. You may have a choice of
channels (for your region) so you should use a different channel than an adjacent AP (access
point) to reduce interference. Interference occurs when radio signals from different access
points overlap causing interference and degrading performance.
CHAPTER4
Wizard Setup
Adjacent channels partially overlap however. To avoid interference due to overlap, your AP
should be on a channel at least five channels away from a channel that an adjacent AP is using.
For example, if your region has 11 channels and an adjacent AP is using channel 1, then you
need to select a channel between 6 or 11.
The G-1000’s “Scan” function is especially designed to automatically scan for a channel with
the least interference.
4.1.2 ESS ID
An Extended Service Set (ESS) is a group of access points connected to a wired LAN on the
same subnet. An ESS ID uniquely identifies each set. All access points and their associated
wireless stations in the same set must have the same ESSID.
4.1.3 WEP Encryption
WEP (Wired Equivalent Privacy) encrypts data frames before transmitting over the wireless
network. WEP encryption scrambles the data transmitted between the wireless stations and the
access points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key for data encryption and decryption.
40Chapter 4 Wizard Setup
4.2 Wizard Setup: General Setup
General Setup contains administrative and system-related information.
The Domain Name entry is what is propagated to the DHCP clients on the LAN. If you leave
this blank, the domain name obtained by DHCP from the ISP is used. While you must enter
the host name (System Name) on each individual computer, the domain name can be assigned
from the G-1000 via DHCP.
Figure 7 Wizard 1: General Setup
G-1000 User’s Guide
The following table describes the labels in this screen.
Table 5 Wizard 1: General Setup
LABELDESCRIPTION
System NameIt is recommended you type your computer's "Computer name".
In Windows 95/98 click Start, Settings, Control Panel, Network. Click the
Identification tab, note the entry for the Computer Name field and enter it as the
System Name.
In Windows 2000, click Start, Settings, Control Panel and then double-click
System. Click the Network Identification tab and then the Properties button.
Note the entry for the Computer name field and enter it as the System Name.
In Windows XP, click Start, My Computer, View system information and then
click the Computer Name tab. Note the entry in the Full computer name field
and enter it as the G-1000 System Name.
This name can be up to 30 alphanumeric characters long. Spaces are not
allowed, but dashes "-" and underscores "_" are accepted.
Domain NameThis is not a required field. Leave this field blank or enter the domain name here
NextClick Next to proceed to the next screen.
if you know it.
4.3 Wizard Setup: Wireless LAN
Use the second wizard screen to set up the wireless LAN.
Chapter 4 Wizard Setup41
G-1000 User’s Guide
Figure 8 Wizard 2: Wireless LAN Setup
The following table describes the labels in this screen.
Table 6 Wizard 2: Wireless LAN Setup
LABELDESCRIPTION
Wireless LAN Setup
WLAN AdaptorSelect Built-in from the drop down list box to configure your G-1000 using the
internal WLAN card. Select Removable from the drop down list box to
configure your G-1000 using a WLAN card adaptor using the extension card
slot.
Note: This field is only available when you have an external
wireless card inserted in the G-1000.
ESSIDEnter a descriptive name (up to 32 printable 7-bit ASCII characters) for the
wireless LAN.
If you change this field on the G-1000, make sure all wireless stations use the
same Name (ESSID) in order to access the network.
Choose Channel IDTo manually set the G-1000 to use a channel, select a channel from the drop-
ScanClick this button to have the G-1000 automatically scan for and select a
WEP EncryptionSelect Disable allows all wireless computers to communicate with the access
ASCIISelect this option in order to enter ASCII characters as the WEP keys.
HexSelect this option to enter hexadecimal characters as the WEP keys.
Key 1 to Key 4The WEP keys are used to encrypt data. Both the G-1000 and the wireless
down list box. Open the Channel Usage screen to make sure the channel is
not already used by another AP or independent peer-to-peer wireless network.
To have the G-1000 automatically select a channel, click Scan instead.
channel with the least interference.
points without any data encryption.
Select 64-bit WEP or 128-bit WEP to allow data encryption.
The preceding 0x is entered automatically.
stations must use the same WEP key for data transmission.
If you chose 64-bit WEP, then enter any 5 ASCII characters or 10 hexadecimal
characters ("0-9", "A-F").
If you chose 128-bit WEP, then enter 13 ASCII characters or 26 hexadecimal
characters ("0-9", "A-F").
You must configure all four keys, but only one key can be activated at any one
time. The default key is key 1.
42Chapter 4 Wizard Setup
Table 6 Wizard 2: Wireless LAN Setup
LABELDESCRIPTION
BackClick Back to return to the previous screen.
NextClick Next to continue.
4.4 Wizard Setup: IP Address
The third wizard screen allows you to configure IP address assignment.
4.4.1 IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated
from the Internet, for instance, only between your two branch offices, you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses specifically for private
networks.
G-1000 User’s Guide
Table 7 Private IP Address Ranges
10.0.0.0 - 10.255.255.255
172.16.0.0 - 172.31.255.255
192.168.0.0 - 192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the
ISP can provide you with the Internet addresses for your local networks. On the other hand, if
you are part of a much larger organization, you should consult your network administrator for
the appropriate IP addresses.
Note: Regardless of your particular situation, do not create an
arbitrary IP address; always follow the guidelines above. For
more information on address assignment, please refer to RFC
1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
4.4.2 IP Address and Subnet Mask
Similar to the way houses on a street share a common street name, so too do computers on a
LAN share one common network number.
Where you obtain your network number depends on your particular situation. If the ISP or
your network administrator assigns you a block of registered IP addresses, follow their
instructions in selecting the IP addresses and the subnet mask.
Chapter 4 Wizard Setup43
G-1000 User’s Guide
If the ISP did not explicitly give you an IP network number, then most likely you have a single
user account and the ISP will assign you a dynamic IP address when the connection is
established. The Internet Assigned Number Authority (IANA) reserved this block of addresses
specifically for private use; please do not use any other number unless you are told otherwise.
Let's say you select 192.168.1.0 as the network number; which covers 254 individual
addresses, from 192.168.1.1 to 192.168.1.254 (zero and 255 are reserved). In other words, the
first three numbers specify the network number while the last number identifies an individual
computer on that network.
Once you have decided on the network number, pick an IP address that is easy to remember,
for instance, 192.168.1.2, for your G-1000, but make sure that no other device on your
network is using that IP address.
The subnet mask specifies the network number portion of an IP address. Your G-1000 will
compute the subnet mask automatically based on the IP address that you entered. You don't
need to change the subnet mask computed by the G-1000 unless you are instructed to do
otherwise.
Figure 9 Wizard 3: IP Address Assignment
The following table describes the labels in this screen.
Table 8 Wizard 3: IP Address Assignment
LABELDESCRIPTION
IP Address Assignment
Get automatically from
DHCP
Select this option if your G-1000 is using a dynamically assigned IP address
from a DHCP server each time.
Note: You must know the IP address assigned to the G-1000
(by the DHCP server) to access the G-1000 again.
Use fixed IP addressSelect this option if your G-1000 is using a static IP address. When you select
IP AddressEnter the IP address of your G-1000 in dotted decimal notation.
this option, fill in the fields below.
Note: If you changed the G-1000's IP address, you must use
the new IP address if you want to access the web configurator
again.
IP Subnet MaskType the subnet mask.
Gateway IP AddressType the IP address of the gateway. The gateway is an immediate neighbor
of your G-1000 that will forward the packet to the destination. The gateway
must be a router on the same segment as your G-1000's LAN or WLAN port.
44Chapter 4 Wizard Setup
Table 8 Wizard 3: IP Address Assignment
LABELDESCRIPTION
BackClick Back to return to the previous screen.
FinishClick Finish to proceed to complete the Wizard setup.
4.5 Basic Setup Complete
When you click Finish in the Wizard 3 IP Address Assignment screen, a warning window
display as shown. Click OK to close the window and log in to the web configurator again
using the new IP address if you change the default IP address (192.168.1.2).
You have successfully set up the G-1000. A screen displays prompting you to close the web
browser.
G-1000 User’s Guide
Click Ye s. Otherwise, click No and the congratulations screen shows next.
Figure 10 Wizard 4: Setup Complete
Well done! You have successfully set up your G-1000 to operate on your network and access
the Internet.
Chapter 4 Wizard Setup45
G-1000 User’s Guide
5.1 System Overview
This section provides information on general system setup.
5.2 Configuring General Setup
Click the SYSTEM link under ADVANCED to open the General screen.
Figure 11 System General Setup
CHAPTER5
System Screens
The following table describes the labels in this screen.
Table 9 System General Setup
LABELDESCRIPTION
General Setup
System NameType a descriptive name to identify the G-1000 in the Ethernet network.
This name can be up to 30 alphanumeric characters long. Spaces are not
allowed, but dashes "-" and underscores "_" are accepted.
Domain NameThis is not a required field. Leave this field blank or enter the domain name
here if you know it.
Administrator
Inactivity Timer
System DNS Servers
46Chapter 5 System Screens
Type how many minutes a management session (either via the web
configurator or SMT) can be left idle before the session times out.
The default is 5 minutes. After it times out you have to log in with your
password again. Very long idle timeouts may have security risks.
A value of "0" means a management session never times out, no matter how
long it has been left idle (not recommended).
Table 9 System General Setup
LABELDESCRIPTION
G-1000 User’s Guide
First DNS Server
Second DNS Server
Third DNS Server
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to reload the previous configuration for this screen.
Select From DHCP if your DHCP server dynamically assigns DNS server
information (and the G-1000's Ethernet IP address). The field to the right
displays the (read-only) DNS server IP address that the DHCP assigns.
Select User-Defined if you have the IP address of a DNS server. Enter the
DNS server's IP address in the field to the right. If you chose User-Defined, but
leave the IP address set to 0.0.0.0, User-Defined changes to None after you
click Apply. If you set a second choice to User-Defined, and enter the same IP
address, the second User-Defined changes to None after you click Apply.
Select None if you do not want to configure DNS servers. If you do not
configure a DNS server, you must know the IP address of a machine in order to
access it.
The default setting is None.
5.3 Configuring Password
To change your G-1000’s password (recommended), click the SYSTEM link under
ADVANCED andthen the Password tab. The screen appears as shown. This screen allows
you to change the G-1000’s password.
If you forget your password (or the G-1000 IP address), you will need to reset the G-1000. See
the Resetting the G-1000 section for details
Figure 12 Password.
The following table describes the labels in this screen.
Table 10 Password
LABELDESCRIPTIONS
Old PasswordType in your existing system password (1234 is the default password).
New PasswordType your new system password (up to 31 characters). Note that as you type a
Retype to ConfirmRetype your new system password for confirmation.
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to reload the previous configuration for this screen.
password, the screen displays an asterisk (*) for each character you type.
Chapter 5 System Screens47
G-1000 User’s Guide
5.4 Configuring Time Setting
To change your G-1000’s time and date, click the SYSTEM link under ADVANCED and
then the Time Setting tab. The screen appears as shown. Use this screen to configure the G1000’s time based on your local time zone.
Figure 13 Time Setting
The following table describes the labels in this screen.
Table 11 Time Setting
LABELDESCRIPTION
Time ProtocolSelect the time service protocol that your time server sends when you turn on
the G-1000. Not all time servers support all protocols, so you may have to
check with your ISP/network administrator or use trial and error to find a
protocol that works.
The main difference between them is the format.
Daytime (RFC 867) format is day/month/year/time zone of the server.
Time (RFC 868) format displays a 4-byte integer giving the total number of
seconds since 1970/1/1 at 0:0:0.
The default, NTP (RFC 1305), is similar to Time (RFC 868).
Select None to enter the time and date manually.
Time Server AddressEnter the IP address or the URL of your time server. Check with your ISP/
network administrator if you are unsure of this information.
Current Time
(hh:mm:ss)
New Time (hh:mm:ss) This field displays the last updated time from the time server.
This field displays the time of your G-1000.
Each time you reload this page, the G-1000 synchronizes the time with the
time server.
When you select None in the Time Protocol field, enter the new time in this
field and then click Apply.
48Chapter 5 System Screens
Table 11 Time Setting
LABELDESCRIPTION
G-1000 User’s Guide
Current Date (yyyy/
mm/dd)
New Date (yyyy/mm/
dd)
Time ZoneChoose the time zone of your location. This will set the time difference
Daylight SavingsSelect this option if you use daylight savings time. Daylight saving is a period
Start Date (mm-dd)Enter the month and day that your daylight-savings time starts on if you
End Date (mm-dd)Enter the month and day that your daylight-savings time ends on if you
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to reload the previous configuration for this screen.
This field displays the date of your G-1000.
Each time you reload this page, the G-1000 synchronizes the date with the
time server.
This field displays the last updated date from the time server.
When you select None in the Time Protocol field, enter the new date in this
field and then click Apply.
between your time zone and Greenwich Mean Time (GMT).
from late spring to early fall when many countries set their clocks ahead of
normal local time by one hour to give more daytime light in the evening.
selected Daylight Savings.
selected Daylight Savings.
Chapter 5 System Screens49
G-1000 User’s Guide
This chapter discusses how to configure Wireless LAN.
6.1 Introduction
A wireless LAN (WLAN) can be as simple as two computers with WLAN adapters
communicating in a peer-to-peer network or as complex as a number of computers with
WLAN adapters communicating through access points which bridge network traffic to the
wired LAN.
Note: See the WLAN appendix for more detailed information on WLANs.
CHAPTER6
Wireless LAN
6.2 Wireless Security Overview
Wireless security is vital to your network to protect wireless communication between wireless
stations, access points and the wired network.
Wireless security methods available on the G-1000 are data encryption, wireless client
authentication, restricting access by device MAC address and hiding the G-1000 identity.
6.2.1 Encryption
• Use WPA(2) security if you have WPA(2)-aware wireless clients and a RADIUS server.
WPA(2) has user authentication and improved data encryption over WEP.
• Use WPA(2)-PSK if you have WPA(2)-aware wireless clients but no RADIUS server.
• If you don’t have WPA(2)-aware wireless clients, then use WEP key encrypting. A
higher bit key offers better security at a throughput trade-off. You can enter 64-bit or 128bit WEP keys.
6.2.2 Authentication
WPA has user authentication and you can also configure IEEE 802.1x to use the built-in
database (Local User Database) or a RADIUS server to authenticate wireless clients before
joining your network.
• Use RADIUS authentication if you have a RADIUS server. See the appendices for
information on protocols used when a client authenticates with a RADIUS server via the
G-1000.
50Chapter 6 Wireless LAN
• Use the Local User Database if you have less than 32 wireless clients in your network.
The G-1000 uses MD5 encryption when a client authenticates with the Local User
Database
6.2.3 Restricted Access
The MAC Filter screen allows you to configure the AP to give exclusive access to devices
(Allow Association) or exclude them from accessing the AP (Deny Association).
6.2.4 Hide G-1000 Identity
If you hide the ESSID, then the G-1000 cannot be seen when a wireless client scans for local
APs. The trade-off for the extra security of “hiding” the G-1000 may be inconvenience for
some valid WLAN clients.
6.2.5 Configuring Wireless LAN on the G-1000
1 Configure the
ESSID and WEP in
the Wireless screen. If you configure WEP, you can’t configure WPA(2) or WPA(2)-PSK.
G-1000 User’s Guide
2 Use the MAC Filter screen to restrict access to your wireless network by MAC address.
3 Use the Roaming screen to configure the G-1000 so that in a network environment with
multiple access points, wireless stations are able to switch from one access point to
another as they move between the coverage areas.
4 Configure WPA(2) or WPA(2)-PSK in the 802.1x/WPA screen. Configure 802.1x
wireless client authentication in the 802.1x/WPA screen.
5 Configure the built-in authentication database in the Local User Database screen.
6 Configure the authentication and accounting servers for RADIUS in the RADIUS screen.
The following figure shows the relative effectiveness of these wireless security methods
available on your G-1000.
Chapter 6 Wireless LAN51
G-1000 User’s Guide
The figure below shows the possible wireless security levels on your G-1000. EAP (Extensible
Authentication Protocol) is used for authentication and utilizes dynamic WEP key exchange. It
requires interaction with a RADIUS (Remote Authentication Dial-In User Service) server
either on the WAN or your LAN to provide authentication service for wireless stations
Table 12 G-1000 Wireless Security Levels
Security LevelSecurity Type
Least Secure
Most Secure
If you do not enable any wireless security on your G-1000, your network is accessible to any
wireless networking device that is within range.
Unique SSID (Default)
Unique SSID with Hide SSID Enabled
MAC Address Filtering
WEP Encryption
IEEE802.1x EAP with RADIUS Server Authentication
Wi-Fi Protected Access (WPA)
WPA2
6.3 Configuring the Wireless Screen
6.3.1 WEP Encryption
WEP encryption scrambles the data transmitted between the wireless stations and the access
points to keep network communications private. It encrypts unicast and multicast
communications in a network. Both the wireless stations and the access points must use the
same WEP key.
Your G-1000 allows you to configure up to four 64-bit or 128-bit WEP keys, but only one key
can be enabled at any one time.
In order to configure and enable WEP encryption; click WIRELESS and the Wireless tab to
the display the Wireless screen.
52Chapter 6 Wireless LAN
Figure 14 Wireless
G-1000 User’s Guide
The following table describes the general wireless LAN labels in this screen.
Table 13 Wireless
LABELDESCRIPTION
ESSIDThe ESSID (Extended Service Set IDentity) identifies the Service Set with which a
wireless station is associated. Wireless stations associating to the access point (AP)
must have the same ESSID. Enter a descriptive name (up to 32 printable 7-bit ASCII
characters) for the wireless LAN.
Note: If you are configuring the G-1000 from a computer connected
to the wireless LAN and you change the G-1000’s ESSID or WEP
settings, you will lose your wireless connection when you press
Apply to confirm. You must then change the wireless settings of your
computer to match the G-1000’s new settings.
Hide ESSIDSelect this check box to hide the ESSID in the outgoing beacon frame so a station
cannot obtain the ESSID through scanning using a site survey tool.
Choose Channel IDSet the operating frequency/channel depending on your particular region.
To manually set the G-1000 to use a channel, select a channel from the drop-down
list box. Click MAINTENANCE and then the Channel Usage tab to open the
Channel Usage screen to make sure the channel is not already used by another AP
or independent peer-to-peer wireless network.
Refer to the Wizard Setup chapter for more information on channels.
RTS/CTS
Threshold
(Request To Send) The threshold (number of bytes) for enabling RTS/CTS
handshake. Data with its frame size larger than this value will perform the RTS/CTS
handshake. Setting this attribute to be larger than the maximum MSDU (MAC
service data unit) size turns off the RTS/CTS handshake. Setting this attribute to
zero turns on the RTS/CTS handshake. Enter a value between 0 and 2432.
Chapter 6 Wireless LAN53
G-1000 User’s Guide
Table 13 Wireless
LABELDESCRIPTION
Fragmentation
Threshold
WEP Encryption WEP (Wired Equivalent Privacy) provides data encryption to prevent unauthorized
Authentication
Method
Key 1 to Key 4If you chose 64-bit WEP in the WEP Encryption field, then enter any 5 characters
Enable IntraBSS Traffic
Enable
Breathing LED
PreambleSelect a preamble type from the drop-down list menu. Choices are Long, Short and
802.11 ModeSelect 802.11b Only to allow only IEEE 802.11b compliant WLAN devices to
Max. Frame
Burst
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
The threshold (number of bytes) for the fragmentation boundary for directed
messages. It is the maximum data fragment size that can be sent. Enter a value
between 800 and 2432.
wireless stations from accessing data transmitted over the wireless network.
Select Disable to allow wireless stations to communicate with the access points
without any data encryption.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Select Auto, Open System or Shared Key from the drop-down list box.
(ASCII string) or 13 hexadecimal characters ("0-9", "A-F"). The hexadecimal
characters should be preceded by 0x for each key.
If you chose 128-bit WEP in the WEP Encryption field, then enter 13 characters
(ASCII string) or 26 hexadecimal characters ("0-9", "A-F") preceded by 0x for each
key.
There are four data encryption keys to secure your data from eavesdropping by
unauthorized wireless users. The values for the keys must be set up exactly the
same on the access points as they are on the wireless stations.
The preceding “0x” is entered automatically. You must configure all four keys, but
only one key can be activated at any one time. The default key is key 1.
Intra-BSS traffic is traffic between wireless stations in the same BSS. Select this
check box to enable Intra-BSS traffic.
Select this check box to enable the Breathing LED, also known as the G-1000 LED.
The blue G-1000 LED is on when the G-1000 is on and blinks (or breaths) when
data is being transmitted to/from its wireless stations.
Clear the check box to turn this LED off even when the G-1000 is on and data is
being transmitted/received.
Dynamic.
See the section on preamble for more information.
associate with the G-1000.
Select 802.11g Only to allow only IEEE 802.11g compliant WLAN devices to
associate with the G-1000.
Select Mixed to allow either IEEE802.11b or IEEE802.11g compliant WLAN devices
to associate with the G-1000. The transmission rate of your G-1000 might be
reduced.
Enable Maximum Frame Burst to help eliminate collisions in mixed-mode networks
(networks with both IEEE 802.11g and IEEE 802.11b traffic) and enhance the
performance of both pure IEEE 802.11g and mixed IEEE 802.11b/g networks.
Maximum Frame Burst sets the maximum time, in microseconds, that the G-1000
transmits IEEE 802.11g wireless traffic only.
Type the maximum frame burst between 0 and 1800 (650, 1000 or 1800
recommended). Enter 0 to disable this feature.
54Chapter 6 Wireless LAN
6.4 Configuring Roaming
A wireless station is a device with an IEEE 802.11b or an IEEE 802.11g compliant wireless
interface. An access point (AP) acts as a bridge between the wireless and wired networks. An
AP creates its own wireless coverage area. A wireless station can associate with a particular
access point only if it is within the access point’s coverage area.
In a network environment with multiple access points, wireless stations are able to switch from
one access point to another as they move between the coverage areas. This is roaming. As the
wireless station moves from place to place, it is responsible for choosing the most appropriate
access point depending on the signal strength, network utilization or other factors.
The roaming feature on the access points allows the access points to relay information about
the wireless stations to each other. When a wireless station moves from a coverage area to
another, it scans and uses the channel of a new access point, which then informs the access
points on the LAN about the change. The new information is then propagated to the other
access points on the LAN. An example is shown in Figure 15.
With roaming, a wireless LAN mobile user enjoys a continuous connection to the wired
network through an access point while moving around the wireless LAN.
G-1000 User’s Guide
Enable roaming to exchange the latest bridge information of all wireless stations between APs
when a wireless station moves between coverage areas. Wireless stations can still associate
with other APs even if you disable roaming. Enabling roaming ensures correct traffic
forwarding (bridge tables are updated) and maximum AP efficiency. The AP deletes records
of wireless stations that associate with other APs (Non-ZyXEL APs may not be able to
perform this). 802.1x authentication information is not exchanged (at the time of writing).
Chapter 6 Wireless LAN55
G-1000 User’s Guide
Figure 15 Roaming Example
The steps below describe the roaming process.
1 As wireless station Y moves from the coverage area of access point AP 1 to that of access
point
2 AP 2, it scans and uses the signal of access point AP 2.
3 Access point AP 2 acknowledges the presence of wireless station Y and relays this
information to access point AP 1 through the wired LAN.
4 Access point AP 1 updates the new position of wireless station.
5 Wireless station Y sends a request to access point AP 2 for reauthentication.
6.4.1 Requirements for Roaming
The following requirements must be met in order for wireless stations to roam between the
coverage areas.
1 All the access points must be on the same subnet and configured with the same ESSID.
2 If IEEE 802.1x user authentication is enabled and to be done locally on the access point,
the new access point must have the user profile for the wireless station.
3 The adjacent access points should use different radio channels when their coverage areas
overlap.
4 All access points must use the same port number to relay roaming information.
5 The access points must be connected to the Ethernet and be able to get IP addresses from
a DHCP server if using dynamic IP address assignment.
56Chapter 6 Wireless LAN
G-1000 User’s Guide
To enable roaming on your G-1000, click the WIRELESS link under ADVANCED and then
the Roaming tab. The screen appears as shown.
Figure 16 Roaming
The following table describes the labels in this screen.
Table 14 Roaming
LABELDESCRIPTION
ActiveSelect Yes from the drop-down list box to enable roaming on the G-1000 if you
Port #Enter the port number to communicate roaming information between access
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
6.5 MAC Filter
The MAC filter screen allows you to configure the G-1000 to give exclusive access to up to 32
devices (Allow Association) or exclude up to 32 devices from accessing the G-1000 (Deny
Association). Every Ethernet device has a unique MAC (Media Access Control) address. The
MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for
example, 00:A0:C5:00:00:02. You need to know the MAC address of the devices to configure
this screen.
The WLAN Adapter drop down list box is only available when you have an external wireless
card inserted in the G-1000. No matter whether you select Built-in or Removable, the
configuration screens are the same for each interface.
have two or more G-1000s on the same subnet.
Note: All APs on the same subnet and the wireless stations must
have the same ESSID to allow roaming.
points. The port number must be the same on all access points. The default is
3517. Make sure this port is not used by other services.
To change your G-1000’s MAC filter settings, click the WIRELESS link under
ADVANCED and then the MAC Filter tab. The screen appears as shown.
Chapter 6 Wireless LAN57
G-1000 User’s Guide
Figure 17 MAC Address Filter
The following table describes the labels in this screen.
Table 15 MAC Address Filter
LABELDESCRIPTION
ActiveSelect Yes from the drop down list box to enable MAC address filtering.
Filter Action Define the filter action for the list of MAC addresses in the MAC address filter
MAC AddressEnter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
table.
Select Deny Association to block access to the router, MAC addresses not
listed will be allowed to access the router.
Select Allow Association to permit access to the router, MAC addresses not
listed will be denied access to the router.
station that are allowed or denied access to the G-1000 in these address fields.
58Chapter 6 Wireless LAN
6.6 Introduction to WPA
Wi-Fi Protected Access (WPA and WPA2) applies IEEE 801.2x and Extensible
Authentication Protocol (EAP) to authenticate wireless clients using and external RADIUS
database. WPA has better user authentication and improved data encryption than WEP, and
WPA2 provides even better data encryption and user authentication than WPA. See the
appendix for more information on WPA(2) user authentication and WPA encryption.
If the wireless clients support WPA2 and you have an external RADIUS server, use WPA2 for
stronger data encryption. If you don’t have an external RADIUS server, you should use
WPA2-PSK (WPA2-Pre-Shared Key). WPA2-PSK only requires a single (identical) password
entered into each WLAN member. As long as the passwords match, a client will be granted
access to a WLAN.
If the wireless clients do not support WPA2, use WPA or WPA-PSK, depending on whether or
not you have an additional RADIUS server. Use WEP only if the wireless clients do not
support WPA(2).
Note: You can’t use the Local User Database for authentication when you select
WPA(2).
G-1000 User’s Guide
6.6.1 WPA(2)-PSK Application Example
A WPA-PSK (or WPA2-PSK) application looks as follows.
1 First enter identical passwords into the AP and all wireless clients. The Pre-Shared Key
(PSK) must be between 8 and 63 printable characters (including spaces; alphabetic
characters are case-sensitive).
2 The AP checks each client’s password and (only) allows it to join the network if the
password matches.
3 The AP derives and distributes keys to the wireless clients.
4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data
exchanged between them.
Chapter 6 Wireless LAN59
G-1000 User’s Guide
Figure 18 WPA(2) - PSK Authentication
6.6.2 WPA(2) with RADIUS Application Example
You need the IP address, port number (default is 1812) and shared secret of a RADIUS server.
A WPA(2) application example with an external RADIUS server looks as follows. "A" is the
RADIUS server. "DS" is the distribution system (wired link to the LAN).
1 The AP passes the wireless client’s authentication request to the RADIUS server.
2 The RADIUS server then checks the user's identification against its database and grants
or denies network access accordingly.
3 The RADIUS server distributes a Pairwise Master Key (PMK) key to the AP that then
sets up a key hierarchy and management system, using the pair-wise key to dynamically
generate unique data encryption keys to encrypt every data packet that is wirelessly
transmitted between the AP and the wireless clients
60Chapter 6 Wireless LAN
Figure 19 WPA with RADIUS Application Example2
G-1000 User’s Guide
6.6.3 Wireless Client WPA Supplicants
A wireless client supplicant is the software that runs on an operating system instructing the
wireless client how to use WPA. At the time of writing, the most widely available supplicants
are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data
Communications' AEGIS client.
The Windows XP patch is a free download that adds WPA capability to Windows XP's builtin "Zero Configuration" wireless client. However, you must run Windows XP to use it.
6.7 Configuring IEEE 802.1x and WPA
To change your G-1000’s authentication settings, click the WIRELESS link under
ADVANCED and then the 802.1x/WPA tab. The screen varies by the key management
protocol you select.
You see the next screen when you select No Access Allowed or No Authentication Required
in the Wireless Port Control field.
Chapter 6 Wireless LAN61
G-1000 User’s Guide
Figure 20 Wireless LAN: 802.1x/WPA
The following table describes the labels in this screen.
Table 16 Wireless LAN: 802.1x/WPA
LABELDESCRIPTION
Wireless Port
Control
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
To control wireless stations access to the wired network, select a control method
from the drop-down list box. Choose from No Access Allowed, No
Authentication Required and Authentication Required.
No Access Allowed blocks all wireless stations access to the wired network.
No Authentication Required allows all wireless stations access to the wired
network without entering usernames and passwords. This is the default setting.
Authentication Required means that all wireless stations have to enter
usernames and passwords before access to the wired network is allowed.
Select Authentication Required to configure Key Management Protocol and
other related fields.
6.7.1 Authentication Required: 802.1x
You need the following for IEEE 802.1x authentication.
• A computer with an IEEE 802.11 b/g wireless LAN adapter and equipped with a web
browser (with JavaScript enabled) and/or Telnet.
• A wireless station computer must be running IEEE 802.1x-compliant software. Not all
Windows operating systems support IEEE 802.1x (see the Microsoft web site for details).
For other operating systems, see their documentation. If your operating system does not
support IEEE 802.1x, then you may need to install IEEE 802.1x client software.
• An optional network RADIUS server for remote user authentication and accounting.
Select Authentication Required in the Wireless Port Control field and 802.1x in the Key Management Protocol field to display the next screen.
62Chapter 6 Wireless LAN
Figure 21 Wireless LAN: 802.1x/WPA for 802.1x Protocol
The following table describes the labels in this screen.
Table 17 Wireless LAN: 802.1x/WPA for 802.1x Protocol
LABELDESCRIPTION
G-1000 User’s Guide
Wireless Port
Control
ReAuthentication
Timer (In
Seconds)
Idle Timeout
(In Seconds)
Key Management
Protocol
To control wireless stations access to the wired network, select a control method
from the drop-down list box. Choose from No Authentication Required,
Authentication Required and No Access Allowed.
No Authentication Required allows all wireless stations access to the wired
network without entering usernames and passwords. This is the default setting.
Authentication Required means that all wireless stations have to enter
usernames and passwords before access to the wired network is allowed.
No Access Allowed blocks all wireless stations access to the wired network.
The following fields are only available when you select Authentication Required.
Specify how often wireless stations have to reenter usernames and passwords in
order to stay connected. This field is activated only when you select
Authentication Required in the Wireless Port Control field.
Enter a time interval between 10 and 9999 seconds. The default time interval is
1800 seconds (30 minutes).
Note: If wireless station authentication is done using a RADIUS
server, the reauthentication timer on the RADIUS server has
priority.
The G-1000 automatically disconnects a wireless station from the wired network
after a period of inactivity. The wireless station needs to enter the username and
password again before access to the wired network is allowed.
This field is activated only when you select Authentication Required in the
Wireless Port Control field. The default time interval is 3600 seconds (or 1 hour).
Choose 802.1x from the drop-down list.
Chapter 6 Wireless LAN63
G-1000 User’s Guide
Table 17 Wireless LAN: 802.1x/WPA for 802.1x Protocol
LABELDESCRIPTION
Dynamic WEP
Key Exchange
Authentication
Databases
This field is activated only when you select Authentication Required in the
Wireless Port Control field. Also set the Key Management Protocol field to
802.1x.
Select Disable to allow wireless stations to communicate with the access points
without using dynamic WEP key exchange.
Select 64-bit WEP or 128-bit WEP to enable data encryption.
Up to 32 stations can access the G-1000 when you configure dynamic WEP key
exchange.
This field is not available when you set Key Management Protocol to WPA or
WPA-PSK.
The authentication database contains wireless station login information. The local
user database is the built-in database on the G-1000G-1000. The RADIUS is an
external server. Use this drop-down list box to select which database the G-1000
should use (first) to authenticate a wireless station.
Before you specify the priority, make sure you have set up the corresponding
database correctly first.
Select Local User Database Only to have the G-1000 just check the built-in user
database on the G-1000 for a wireless station's username and password.
Select RADIUS Only to have the G-1000 just check the user database on the
specified RADIUS server for a wireless station's username and password.
Select Local first, then RADIUS to have the G-1000 first check the user database
on the G-1000 for a wireless station's username and password. If the user name is
not found, the G-1000 then checks the user database on the specified RADIUS
server.
Select RADIUS first, then Local to have the G-1000 first check the user database
on the specified RADIUS server for a wireless station's username and password. If
the G-1000 cannot reach the RADIUS server, the G-1000 then checks the local
user database on the G-1000. When the user name is not found or password does
not match in the RADIUS server, the G-1000 will not check the local user database
and the authentication fails.
Note: Once you enable user authentication, you need to specify an external RADIUS
server or create local user accounts on the G-1000 for authentication.
6.7.2 Authentication Required: WPA
Select Authentication Requiredin the Wireless Port Control field and WPA in the Key
Management Protocol field to display the next screen.
64Chapter 6 Wireless LAN
Figure 22 Wireless LAN: 802.1x/WPA for WPA Protocol
The following table describes the labels not previously discussed
Table 18 Wireless LAN: 802.1x/WPA for WPA Protocol
LABELDESCRIPTIONS
G-1000 User’s Guide
Key Management
Protocol
WPA Group Key
Update Timer
Authentication
Databases
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
Choose WPA in this field.
The WPA Group Key Update Timer is the rate at which the AP (if using WPA-PSK key management) or RADIUS server (if using WPA key management) sends
a new group key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the WEP key for an AP and all stations in a WLAN on a
periodic basis. Setting of the WPA Group Key Update Timer is also supported in
WPA-PSK mode. The G-1000 default is 1800 seconds (30 minutes).
This field is disabled.
Please see Table 17 for information on the additional fields shown in this screen.
6.7.3 Authentication Required: WPA-PSK
Select Authentication Requiredin the Wireless Port Control field and WPA-PSK in the
Key Management Protocol field to display the next screen.
Chapter 6 Wireless LAN65
G-1000 User’s Guide
Figure 23 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol
The following table describes the labels not previously discussed
Table 19 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol
LABELDESCRIPTION
Key Management
Protocol
Pre-Shared KeyThe encryption mechanisms used for WPA and WPA-PSK are the same. The only
WPA Group Key
Update Timer
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
Choose WPA-PSK in this field.
difference between the two is that WPA-PSK uses a simple common password,
instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
The WPA Group Key Update Timer is the rate at which the AP (if using WPA-PSK key management) or RADIUS server (if using WPA key management) sends
a new group key out to all clients. The re-keying process is the WPA equivalent of
automatically changing the WEP key for an AP and all stations in a WLAN on a
periodic basis. Setting of the WPA Group Key Update Timer is also supported in
WPA-PSK mode. The G-1000 default is 1800 seconds (30 minutes).
6.7.4 Authentication Required: WPA2
Select Authentication Requiredin the Wireless Port Control field and WPA2 in the Key
Management Protocol field to display the next screen.
66Chapter 6 Wireless LAN
Figure 24 Wireless LAN: 802.1x/WPA for WPA2 Protocol
The following table describes the labels not previously discussed
G-1000 User’s Guide
Table 20 Wireless LAN: 802.1x/WPA2 for WPA Protocol
LABELDESCRIPTIONS
Key Management
Protocol
WPA CompatibleCheck this box if you want your G-1000 to support WPA2 and WPA at the same
WPA Group Key
Update Timer
Authentication
Databases
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
Choose WPA2 in this field.
time. This might reduce the performance of the device, however.
The WPA Group Key Update Timer is the rate at which the AP (if using WPA2-PSK key management) or RADIUS server (if using WPA2 key management)
sends a new group key out to all clients. The re-keying process is the WPA2
equivalent of automatically changing the WEP key for an AP and all stations in a
WLAN on a periodic basis. Setting of the WPA Group Key Update Timer is also
supported in WPA2-PSK mode. The G-1000 default is 1800 seconds (30 minutes).
This field is disabled.
Please see Table 17 for information on the additional fields shown in this screen.
6.7.5 Authentication Required: WPA2-PSK
Select Authentication Required in the Wireless Port Control field and WPA2-PSK in
the Key Management Protocol field to display the next screen.
Chapter 6 Wireless LAN67
G-1000 User’s Guide
Figure 25 Wireless LAN: 802.1x/WPA for WPA2-PSK Protocol
The following table describes the labels not previously discussed
Table 21 Wireless LAN: 802.1x/WPA for WPA2-PSK Protocol
LABELDESCRIPTION
Key Management
Protocol
WPA CompatibleCheck this box if you want your G-1000 to support WPA2-PSK and WPA-PSK at
Pre-Shared KeyThe encryption mechanisms used for WPA2 and WPA2-PSK are the same. The
WPA Group Key
Update Timer
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
Choose WPA2-PSK in this field.
the same time. This might reduce the performance of the device, however.
only difference between the two is that WPA2-PSK uses a simple common
password, instead of user-specific credentials.
Type a pre-shared key from 8 to 63 case-sensitive ASCII characters (including
spaces and symbols).
The WPA Group Key Update Timer is the rate at which the AP (if using WPA2-PSK key management) or RADIUS server (if using WPA2 key management)
sends a new group key out to all clients. The re-keying process is the WPA2
equivalent of automatically changing the WEP key for an AP and all stations in a
WLAN on a periodic basis. Setting of the WPA Group Key Update Timer is also
supported in WPA2-PSK mode. The G-1000 default is 1800 seconds (30 minutes).
6.8 Configuring RADIUS
A RADIUS (Remote Authentication Dial In user Service) server enables user authentication,
authorization and accounting. Use RADIUS if you want to authenticate users using an external
server.
The RADIUS screen allows you to specify the authentication and accounting servers and to
enable and disable them.
68Chapter 6 Wireless LAN
G-1000 User’s Guide
To access this screen, click the WIRELESS link under ADVANCED and then the RADIUS
tab. The screen appears as shown.
Figure 26 RADIUS Screen
The following table describes the labels in this screen.
Table 22 RADIUS Screen
LABELDESCRIPTION
Authentication Server
ActiveSelect whether or not the external RADIUS authentication server is active.
Server IP AddressEnter the IP address of the external RADIUS authentication server.
Port NumberEnter the port number used by the external RADIUS authentication server.
Shared SecretSpecify a password (up to 32 alphanumeric characters) as the key to be shared
between the external RADIUS server and the G-1000. This key is not sent over
the network. This key must be the same on the external RADIUS server and the
G-1000.
Accounting Server
ActiveSelect whether or not the external RADIUS accounting server is active.
Server IP AddressEnter the IP address of the external RADIUS accounting server.
Port NumberEnter the port number used by the external RADIUS accounting server.
Shared SecretSpecify a password (up to 32 alphanumeric characters) as the key to be shared
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to set the RADIUS server settings again.
between the external RADIUS server and the G-1000. This key is not sent over
the network. This key must be the same on the external RADIUS server and the
G-1000.
Chapter 6 Wireless LAN69
G-1000 User’s Guide
This chapter discusses how to configure IP on the G-1000
7.1 TCP/IP Parameters
7.1.1 IP Address and Subnet Mask
See the IP Address and Subnet Mask section in the Wizard Setup chapter for this information.
The Ethernet parameters of the G-1000 are preset in the factory with the following values:
• IP address of 192.168.1.2
• Subnet mask of 255.255.255.0 (24 bits)
CHAPTER7
IP Screen
These parameters should work for the majority of installations.
7.1.2 WAN IP Address Assignment
Every computer on the Internet must have a unique IP address. If your networks are isolated
from the Internet, for instance, only between your two branch offices, you can assign any IP
addresses to the hosts without problems. However, the Internet Assigned Numbers Authority
(IANA) has reserved the following three blocks of IP addresses for private networks.
Table 23 Private IP Address Ranges
10.0.0.0-10.255.255.255
172.16.0.0-172.31.255.255
192.168.0.0-192.168.255.255
You can obtain your IP address from the IANA, from an ISP or have it assigned by a private
network. If you belong to a small organization and your Internet access is through an ISP, the
ISP can provide you with the Internet addresses for your local networks. On the other hand, if
you are part of a much larger organization, you should consult your network administrator for
the appropriate IP addresses.
Note: Regardless of your particular situation, do not create an
arbitrary IP address; always follow the guidelines above. For
more information on address assignment, please refer to RFC
1597, Address Allocation for Private Internets and RFC 1466,
Guidelines for Management of IP Address Space.
70Chapter 7 IP Screen
7.2 Configuring IP
Click ADVANCED and then IP to display the screen shown next.
Figure 27 IP Setup
The following table describes the labels in this screen.
Table 24 IP Setup
G-1000 User’s Guide
LABELDESCRIPTION
IP Address Assignment
Get automatically from
DHCP
Select this option if your G-1000 is using a dynamically assigned IP address
from a DHCP server each time.
Note: You must know the IP address assigned to the G-1000
(by the DHCP server) to access the G-1000 again.
Use fixed IP addressSelect this option if your G-1000 is using a static IP address. When you select
this option, fill in the fields below.
IP AddressEnter the IP address of your G-1000 in dotted decimal notation.
Note: If you change the G-1000's IP address, you must use the
new IP address if you want to access the web configurator
again.
IP Subnet MaskType the subnet mask.
Gateway IP Address Type the IP address of the gateway. The gateway is an immediate neighbor
ApplyClick Apply to save your changes back to the G-1000.
ResetClick Reset to begin configuring this screen afresh.
of your G-1000 that will forward the packet to the destination. On the LAN, the
gateway must be a router on the same segment as your G-1000; over the
WAN, the gateway must be the IP address of one of the remote node.
Chapter 7 IP Screen71
G-1000 User’s Guide
Remote Management Screens
This chapter provides information on the Remote Management screens.
8.1 Remote Management Overview
Remote management allows you to determine which services/protocols can access which G1000 interface (if any) from which computers.
You may manage your G-1000 from a remote location via:
•WLAN only•ALL (LAN and WLAN)
•LAN only•Neither (Disable).
CHAPTER8
To disable remote management of a service, select Disable in the corresponding Server
Access field.
You may only have one remote management session running at a time. The G-1000
automatically disconnects a remote management session of lower priority when another
remote management session of higher priority starts. The priorities for the different types of
remote management sessions are as follows.
1 Teln et
2 HTTP
8.1.1 Remote Management Limitations
Remote management over LAN or WAN will not work when:
1 A filter in SMT menu 3.1 (LAN) or in menu 11.5 (WAN) is applied to block a Telnet,
FTP or Web service.
2 You have disabled that service in one of the remote management screens.
3 The IP address in the Secured Client IP field does not match the client IP address. If it
does not match, the G-1000 will disconnect the session immediately.
4 There is already another remote management session with an equal or higher priority
running. You may only have one remote management session running at one time.
72Chapter 8 Remote Management Screens
8.1.2 Remote Management and NAT
When NAT is enabled:
• Use the G-1000’s WLAN IP address when configuring from the WLAN.
• Use the G-1000’s LAN IP address when configuring from the LAN.
8.1.3 System Timeout
There is a default system management idle timeout of five minutes (three hundred seconds).
The G-1000 automatically logs you out if the management session remains idle for longer than
this timeout period. The management session does not time out when a statistics screen is
polling. You can change the timeout period in the System screen
8.2 Configuring WWW
To change your G-1000’s World Wide Web settings, click REMOTE MGMT to display the
WWW screen.
G-1000 User’s Guide
Figure 28 Remote Management: WWW
The following table describes the labels in this screen.
Table 25 Remote Management: WWW
LABELDESCRIPTION
WWW
Server PortYou may change the server port number for a service, if needed; however, you
must use the same port number in order to use this service for remote
management.
Server AccessSelect the interface(s) through which a computer may access the G-1000 using this
service.
Secured Client IP
Address
A secured client is a “trusted” computer that is allowed to communicate with the G1000 using this service.
Select All to allow any computer to access the G-1000 using this service.
Choose Selected to just allow the computer with the IP address that you specify to
access the G-1000 using this service.
Chapter 8 Remote Management Screens73
G-1000 User’s Guide
Table 25 Remote Management: WWW
LABELDESCRIPTION
ApplyClick Apply to save your customized settings and exit this screen.
ResetClick Reset to begin configuring this screen afresh.
8.3 Configuring Telnet
You can configure your G-1000 for remote Telnet access as shown next. The administrator
uses Telnet from a computer on a remote network to access the G-1000.
Figure 29 Telnet Configuration on a TCP/IP Network
8.4 Configuring TELNET
Click REMOTE MGMT and the TELNET tab to display the screen as shown.
74Chapter 8 Remote Management Screens
Figure 30 Remote Management: Telnet
The following table describes the labels in this screen.
Table 26 Remote Management: Telnet
G-1000 User’s Guide
LABEL
Server PortYou may change the server port number for a service, if needed; however, you must
use the same port number in order to use this service for remote management.
Server AccessSelect the interface(s) through which a computer may access the G-1000 using this
Secured Client IP
Address
ApplyClick Apply to save your customized settings and exit this screen.
ResetClick Reset to begin configuring this screen afresh.
service.
A secured client is a “trusted” computer that is allowed to communicate with the G1000 using this service.
Select All to allow any computer to access the G-1000 using this service.
Choose Selected to just allow the computer with the IP address that you specify to
access the G-1000 using this service.
8.5 Configuring FTP
You can upload and download the G-1000’s firmware and configuration files using FTP,
please see the chapter on firmware and configuration file maintenance for details. To use this
feature, your computer must have an FTP client.
To change your G-1000’s FTP settings, click REMOTE MGMT, then the FTP tab. The
screen appears as shown.
DESCRIPTION
Chapter 8 Remote Management Screens75
G-1000 User’s Guide
Figure 31 Remote Management: FTP
The following table describes the labels in this screen.
Table 27 Remote Management: FTP
LABELDESCRIPTION
Server PortYou may change the server port number for a service, if needed; however, you
Server AccessSelect the interface(s) through which a computer may access the G-1000 using this
Secured Client IP
Address
ApplyClick Apply to save your customized settings and exit this screen.
ResetClick Reset to begin configuring this screen afresh.
must use the same port number in order to use that service for remote
management.
service.
A secured client is a “trusted” computer that is allowed to communicate with the G1000 using this service.
Select All to allow any computer to access the G-1000 using this service.
Choose Selected to just allow the computer with the IP address that you specify to
access the G-1000 using this service.
8.6 SNMP
Simple Network Management Protocol (SNMP) is a protocol used for exchanging
management information between network devices. SNMP is a member of the TCP/IP
protocol suite. Your G-1000 supports SNMP agent functionality, which allows a manager
station to manage and monitor the G-1000 through the network. The G-1000 supports SNMP
version one (SNMPv1) and version two (SNMPv2c). The next figure illustrates an SNMP
management operation. SNMP is only available if TCP/IP is configured.
Note: SNMP is only available if TCP/IP is configured.
76Chapter 8 Remote Management Screens
Figure 32 SNMP Management Model
G-1000 User’s Guide
An SNMP managed network consists of two main types of component: agents and a manager.
An agent is a management software module that resides in a managed device (the G-1000). An
agent translates the local management information from the managed device into a form
compatible with SNMP. The manager is the console through which network administrators
perform network management functions. It executes applications that control and monitor
managed devices.
The managed devices contain object variables/managed objects that define each piece of
information to be collected about a device. Examples of variables include such as number of
packets received, node port status etc. A Management Information Base (MIB) is a collection
of managed objects. SNMP allows a manager and agents to communicate for the purpose of
accessing these objects.
SNMP itself is a simple request/response protocol based on the manager/agent model. The
manager issues a request and the agent returns responses using the following protocol
operations:
• Get - Allows the manager to retrieve an object variable from the agent.
• GetNext - Allows the manager to retrieve the next object variable from a table or list
within an agent. In SNMPv1, when a manager wants to retrieve all elements of a table
from an agent, it initiates a Get operation, followed by a series of GetNext operations.
• Set - Allows the manager to set values for object variables within an agent.
• Trap - Used by the agent to inform the manager of some events.
Chapter 8 Remote Management Screens77
G-1000 User’s Guide
8.6.1 Supported MIBs
The G-1000 supports MIB II that is defined in RFC-1213 and RFC-1215 as well as the
proprietary ZyXEL private MIB. The focus of the MIBs is to let administrators collect
statistical data and monitor status and performance.
8.6.2 SNMP Traps
The G-1000 can send the following traps to the SNMP manager.
Table 28 SNMP Traps
TRAP NAME
Generic Traps
coldStart 1.3.6.1.6.3.1.1.5.1This trap is sent after booting (power on). This
warmStart 1.3.6.1.6.3.1.1.5.2 This trap is sent after booting (software
linkDown1.3.6.1.6.3.1.1.5.3This trap is sent when the Ethernet link is
linkUp1.3.6.1.6.3.1.1.5.4 This trap is sent when the Ethernet link is up.
authenticationFailure
(defined in RFC-1215)
Traps defined in the
ZyXEL Private MIB.
whyReboot 1.3.6.1.4.1.890.1.5.13.0.1 This trap is sent with the reason for restarting
OBJECT IDENTIFIER #
(OID)
1.3.6.1.6.3.1.1.5.5The device sends this trap when it receives
DESCRIPTION
trap is defined in RFC-1215.
reboot). This trap is defined in RFC-1215.
down.
any SNMP get or set requirements with the
wrong community (password).
Note: snmpEnableAuthenTraps, OID
1.3.6.1.2.1.11.30 (defined in RFC 1214 and
RFC 1907) must be enabled on in order for the
device to send authenticationFailure traps.
Use a MIB browser to enable or disable
snmpEnableAuthenTraps.
before the system reboots (warm start).
"System reboot by user!" is added for an
intentional reboot (for example, download new
files, CI command "sys reboot").
If the system reboots because of fatal errors, a
code for the error is listed.
78Chapter 8 Remote Management Screens
8.6.3 SNMP Interface Index
Some traps include an SNMP interface index. The following table maps the SNMP interface
indexes to the G-1000’s physical ports.
Table 29 SNMP Interface Index to Physical Port Mapping
INTERFACE TYPEPHYSICAL PORT
enet0WLAN
enet1 Ethernet port
8.6.4 Configuring SNMP
To change your G-1000’s SNMP settings, click REMOTE MGMT, then the SNMP tab. The
screen appears as shown.
Figure 33 Remote Management: SNMP
G-1000 User’s Guide
The following table describes the labels in this screen.
Table 30 Remote Management: SNMP
LABELDESCRIPTION
SNMP Configuration
Get CommunityEnter the Get Community, which is the password for the incoming Get and
GetNext requests from the management station. The default is public and allows
all requests.
Chapter 8 Remote Management Screens79
G-1000 User’s Guide
Table 30 Remote Management: SNMP
LABELDESCRIPTION
Set CommunityEnter the Set community, which is the password for incoming Set requests
Trap
CommunityType the trap community, which is the password sent with each trap to the
DestinationType the IP address of the station to send your SNMP traps to.
SNMP
Service PortYou may change the server port number for a service, if needed; however, you
Service AccessSelect the interface(s) through which a computer may access the G-1000 using
Secured Client IP
Address
ApplyClick Apply to save your customized settings and exit this screen.
ResetClick Reset to begin configuring this screen afresh.
from the management station. The default is public and allows all requests.
SNMP manager. The default is public and allows all requests.
must use the same port number in order to use that service for remote
management.
this service.
A secured client is a “trusted” computer that is allowed to communicate with the
G-1000 using this service.
Select All to allow any computer to access the G-1000 using this service.
Choose Selected to just allow the computer with the IP address that you specify
to access the G-1000 using this service.
80Chapter 8 Remote Management Screens
G-1000 User’s Guide
Chapter 8 Remote Management Screens81
G-1000 User’s Guide
This chapter contains information about configuring general log settings and viewing the G1000’s logs. Refer to the appendix for example log message explanations.
9.1 Configuring View Log
The web configurator allows you to look at all of the G-1000’s logs in one location.
Click the LOGS links under ADVANCED to open the View Log screen. Use the View Log
screen to see the logs for the categories that you selected in the Log Settings screen (see
Figure 35). Options include logs about system maintenance, system errors and access control.
CHAPTER9
Log Screens
You can view logs and alert messages in this page. Once the log entries are all used, the log
will wrap around and the old logs will be deleted.
Click a column heading to sort the entries. A triangle indicates the direction of the sort order.
82Chapter 9 Log Screens
Figure 34 View Log
The following table describes the labels in this screen.
Table 31 View Log
G-1000 User’s Guide
LABELDESCRIPTION
Display Select a log category from the drop down list box to display logs within the
selected category. To view all logs, select All Logs.
The number of categories shown in the drop down list box depends on the
selection in the Log Settings page.
Email Log Now Click Email Log Now to send the log screen to the e-mail address specified in
the Log Settings page.
RefreshClick Refresh to renew the log screen.
Clear Log Click Clear Log to clear all the logs.
Time This field displays the time the log was recorded.
MessageThis field states the reason for the log.
SourceThis field lists the source IP address and the port number of the incoming
packet.
DestinationThis field lists the destination IP address and the port number of the incoming
NotesThis field displays additional information about the log entry.
packet.
9.2 Configuring Log Settings
To change your G-1000’s log settings, click the LOGS links under ADVANCED and then the
Log Settings tab. The screen appears as shown.
Use the Log Settings screen to configure to where the G-1000 is to send the logs; the schedule
for when the G-1000 is to send the logs and which logs and/or immediate alerts the G-1000 is
to send.
Chapter 9 Log Screens83
G-1000 User’s Guide
An alert is a type of log that warrants more serious attention. Some categories such as System
Errors consist of both logs and alerts. You may differentiate them by their color in the View
Log screen. Alerts are displayed in red and logs are displayed in black.
Figure 35 Log Settings
The following table describes the labels in this screen.
Table 32 Log Settings
LABELDESCRIPTION
Address Info
Mail Server Enter the server name or the IP address of the mail server for the e-mail
addresses specified below. If this field is left blank, logs and alert messages
will not be sent via e-mail.
Mail SubjectType a title that you want to be in the subject line of the log e-mail message
that the G-1000 sends.
Send log to Logs are sent to the e-mail address specified in this field. If this field is left
Send alerts to Enter the e-mail address where the alert messages will be sent. If this field is
SMTP AuthenticationCheck this box if e-mail requires a user name and password to be delivered
84Chapter 9 Log Screens
blank, logs will not be sent via e-mail.
left blank, alert messages will not be sent via e-mail.
through the specified mail server.
G-1000 User’s Guide
Table 32 Log Settings
LABELDESCRIPTION
User NAMEThis field is effective if SMTP Authentication is checked. Enter the user name
of the account on the SMTP server.
PasswordThis field is effective if SMTP Authentication is checked. Enter the password
of the account on the SMTP server.
Syslog LoggingSyslog logging sends a log to an external syslog server used to store logs.
ActiveClick Active to enable syslog logging.
Syslog Server IP
Address
Log Facility Select a location from the drop down list box. The log facility allows you to log
Send Log
Log ScheduleThis drop-down menu is used to configure the frequency of log messages
Day for Sending LogThis field is only available when you select Weekly in the Log Schedule field.
Time for Sending LogEnter the time of the day in 24-hour format (for example 23:00 equals 11:00
Clear log after sending
mail
LogSelect the categories of logs that you want to record.
Send Immediate Alert Select the categories of alerts for which you want the G-1000 to immediately
ApplyClick Apply to save your customized settings and exit this screen.
ResetClick Reset to reconfigure all the fields in this screen.
Enter the server name or IP address of the syslog server that will log the
selected categories of logs.
the messages to different files in the syslog server. Refer to the documentation
of your syslog program for more details.
being sent as E-mail:
•Daily
•Weekly
•Hourly
•When Log is Full
•None.
If the Weekly or the Daily option is selected, specify a time of day when the E-
mail should be sent. If the Weekly option is selected, then also specify which
day of the week the E-mail should be sent. If the When Log is Full option is
selected, an alert is sent when the log fills up. If you select None, no log
messages are sent.
Use the drop down list box to select which day of the week to send the logs.
pm) to send the logs.
Select the check box to clear all logs after logs and alert messages are sent
via e-mail.
send e-mail alerts.
Chapter 9 Log Screens85
G-1000 User’s Guide
This chapter displays system information such as firmware, port IP addresses and port traffic
statistics.
10.1 Maintenance Overview
The maintenance screens can help you view system information, upload new firmware,
manage configuration and restart your G-1000.
10.2 System Status Screen
CHAPTER10
Maintenance
Click MAINTENANCE to open the System Status screen, where you can use to monitor
your G-1000. Note that these labels are READ-ONLY and are meant to be used for diagnostic
purposes.
Figure 36 System Status
The following table describes the labels in this screen.
Table 33 System Status
LABELDESCRIPTION
System NameThis is the System Name you enter in the first Internet Access Wizard screen.
It is for identification purposes
ZyNOS Firmware
Version
IP AddressThis is the Ethernet port IP address.
IP Subnet MaskThis is the Ethernet port subnet mask.
DHCPThis is the Ethernet port DHCP role - Client or None.
Show StatisticsClick Show Statistics to see router performance statistics such as number of
This is the ZyNOS Firmware version and the date created. ZyNOS is ZyXEL's
proprietary Network Operating System design.
packets sent and number of packets received for each port.
86Chapter 10 Maintenance
10.2.1 System Statistics
Read-only information here includes port status, packet specific statistics and bridge link
status. Also provided are "system up time" and "poll interval(s)". The Poll Interval field is
configurable.
Figure 37 System Status: Show Statistics
The following table describes the labels in this screen.
Table 34 System Status: Show Statistics
G-1000 User’s Guide
LABELDESCRIPTION
PortThis is the Ethernet or wireless port. The wireless port may be the WLAN –
StatusThis shows the port speed and duplex setting if you are using Ethernet
TxPktsThis is the number of transmitted packets on this port.
RxPktsThis is the number of received packets on this port.
CollisionsThis is the number of collisions on this port.
Tx B/sThis shows the transmission speed in bytes per second on this port.
Rx B/sThis shows the reception speed in bytes per second on this port.
Up TimeThis is total amount of time the line has been up.
System Up TimeThis is the total time the G-1000 has been on.
Poll Interval(s)Enter the time interval for refreshing statistics.
Set IntervalClick this button to apply the new poll interval you entered above.
StopClick this button to stop refreshing statistics.
Built-in card or the WLAN – Removable wireless card.
encapsulation for the Ethernet port.
This shows the transmission speed only for wireless port.
10.3 Association List
View the wireless stations that are currently associated to the G-1000 in the Association List
screen.
Click MAINTENANCE and then the Association List tab to display the screen as shown
next.
Chapter 10 Maintenance87
G-1000 User’s Guide
Figure 38 Association List
The following table describes the labels in this screen.
Table 35 Association List
LABELDESCRIPTION
# This is the index number of an associated wireless station.
MAC Address This field displays the MAC address of an associated wireless station.
Association TimeThis field displays the time a wireless station first associated with the G-1000.
RefreshClick Refresh to reload the screen.
10.4 F/W Upload Screen
Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a
"*.bin" extension, e.g., "G-1000.bin". The upload process uses HTTP (Hypertext Transfer
Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
See the Firmware and Configuration File Maintenance chapter for upgrading firmware using
FTP/TFTP commands.
Click MAINTENANCE and then F/W Upload. Follow the instructions in this screen to
upload firmware to your G-1000.
88Chapter 10 Maintenance
G-1000 User’s Guide
Figure 39 Firmware Upload
The following table describes the labels in this screen.
Table 36 Firmware Upload
LABELDESCRIPTION
File Path Type in the location of the file you want to upload in this field or click Browse ...
to find it.
Browse... Click Browse... to find the .bin file you want to upload. Remember that you must
decompress compressed (.zip) files before you can upload them.
Upload Click Upload to begin the upload process. This process may take up to two
minutes.
Note: Do not turn off the G-1000 while firmware upload is in
progress!
After you see the Firmware Upload in Process screen, wait two minutes before logging into
the G-1000 again.
Figure 40 Firmware Upload In Process
The G-1000 automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
Chapter 10 Maintenance89
G-1000 User’s Guide
Figure 41 Network Temporarily Disconnected
After two minutes, log in again and check your new firmware version in the System Status
screen.
If the upload was not successful, the following screen will appear. Click Return to go back to
the F/W Upload screen.
Figure 42 Firmware Upload Error
10.5 Configuration Screen
See the Firmware and Configuration File Maintenance chapter for transferring configuration
files using FTP/TFTP commands.
Click MAINTENANCE, and then the Configuration tab. Information related to factory
defaults, backup configuration, and restoring configuration appears as shown next.
90Chapter 10 Maintenance
Figure 43 Configuration
G-1000 User’s Guide
10.5.1 Backup Configuration
Backup configuration allows you to back up (save) the G-1000’s current configuration to a file
on your computer. Once your G-1000 is configured and functioning properly, it is highly
recommended that you back up your configuration file before making configuration changes.
The backup configuration file will be useful in case you need to return to your previous
settings.
Click Backup to save the G-1000’s current configuration to your computer.
10.5.2 Restore Configuration
Restore configuration allows you to upload a new or previously saved configuration file from
your computer to your G-1000.
Table 37 Restore Configuration
LABELDESCRIPTION
File Path Type in the location of the file you want to upload in this field or click Browse ...
to find it.
Browse... Click Browse... to find the file you want to upload. Remember that you must
Upload Click Upload to begin the upload process.
decompress compressed (.ZIP) files before you can upload them.
Chapter 10 Maintenance91
G-1000 User’s Guide
After you see a “restore configuration successful” screen, you must then wait one minute
before logging into the G-1000 again.
Figure 44 Configuration Upload Successful
The G-1000 automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
Note: Do not turn off the G-1000 while configuration file upload
is in progress.
Figure 45 Network Temporarily Disconnected
If you uploaded the default configuration file you may need to change the IP address of your
computer to be in the same subnet as that of the default G-1000 IP address (192.168.1.2). See
your Quick Installation Guide for details on how to set up your computer’s IP address.
If the upload was not successful, the following screen will appear. Click Return to go back to
the Configuration screen.
92Chapter 10 Maintenance
Figure 46 Configuration Upload Error
10.5.3 Back to Factory Defaults
Pressing the Reset button in this section clears all user-entered configuration information and
returns the G-1000 to its factory defaults as shown on the screen. The following warning
screen will appear.
Figure 47 Reset Warning Message
G-1000 User’s Guide
You can also press the RESET button on the side panel to reset the factory defaults of your G-
1000. Refer to the section on resetting the G-1000 for more information on the RESET button.
10.6 Restart Screen
System restart allows you to reboot the G-1000 without turning the power off. Click
MAINTENANCE, and then click Restart to have the G-1000 reboot. This does not affect the
G-1000's configuration.
Figure 48 Restart Screen
Chapter 10 Maintenance93
G-1000 User’s Guide
CHAPTER11
Introducing the SMT
This chapter describes how to access the SMT and provides an overview of its menus.
11.1 Connect to your G-1000 Using Telnet
The following procedure details how to telnet into your G-1000.
1 In Windows, click Start (usually in the bottom left corner), Run and then type “telnet
192.168.1.2” (the default IP address) and click OK.
2 For your first login, enter the default password “1234”. As you type the password, the
screen displays an asterisk “*” for each character you type.
Figure 49 Login Screen
Password : xxxx
3 After entering the password you will see the main menu.
Please note that if there is no activity for longer than five minutes (default timeout period)
after you log in, your G-1000 will automatically log you out. You will then have to telnet into
the G-1000 again. You can use the web configurator or the CI commands to change the
inactivity time out period.
11.2 Changing the System Password
Change the G-1000 default password by following the steps shown next.
1 From the main menu, enter 23 to display Menu 23 – System Security.
2 Enter 1 to display Menu 23.1 – System Security – Change Password as shown next.
3 Type your existing system password in the Old Password field, and press [ENTER].
94Chapter 11 Introducing the SMT
Figure 50 Menu 23.1 System Security: Change Password
Menu 23.1 – System Security – Change Password
Old Password= ****
New Password= ?
Retype to confirm= ?
Enter here to CONFIRM or ESC to CANCEL:
4 Type your new system password in the New Password field (up to 30 characters), and
press [ENTER].
5 Re-type your new system password in the Retype to confirm field for confirmation and
press [ENTER].
Note that as you type a password, the screen displays an asterisk “*” for each character you
type.
11.3 G-1000 SMT Menus Overview
G-1000 User’s Guide
The following table gives you an overview of your G-1000’s various SMT menus.
Table 38 SMT Menus Overview
MENUSSUB MENUS
1 General Setup1.1 Configure Dynamic DNS
3 LAN Setup3.2 TCP/IP Setup
3.5 Wireless LAN Setup3.5.1 WLAN MAC Address
14 Dial-in User Setup14.1 Edit Dial-in User
22 SNMP Configuration
23 System Security23.1 Change Password
23.2 RADIUS Server
23.4 IEEE 802.1X
Filter
3.5.2 Roaming Configuration
Chapter 11 Introducing the SMT95
G-1000 User’s Guide
Table 38 SMT Menus Overview (continued)
MENUSSUB MENUS
24 System Maintenance 24.1 Status
24.2 System Information and Console
Port Speed
24.3 Log and Trace24.3.1 View Error Log
24.4 Diagnostic
24.5 Backup Configuration
24.6 Restore Configuration
24.7 Upload Firmware24.7.1 Upload System
24.8 Command Interpreter Mode
24.10 Time and Date Setting
24.11 Remote Management Control
24.2.1 Information
24.2.2 Change Console Port
Speed
Firmware
24.7.2 Upload System
Configuration File
11.4 Navigating the SMT Interface
The SMT (System Management Terminal) is the interface that you use to configure your G-
1000. Several operations that you should be familiar with before you attempt to modify the
configuration are listed in the table below.
Table 39 Main Menu Commands
OPERATIONKEYSTROKEDESCRIPTION
Move down to
another menu
Move up to a
previous menu
Move to a “hidden”
menu
Move the cursor[ENTER] or [UP]/
Entering information Type in or press
Required fields<?> or ChangeMeAll fields with the symbol <?> must be filled in order to be
[ENTER]To move forward to a submenu, type in the number of the
desired submenu and press [ENTER].
[ESC]Press [ESC] to move back to the previous menu.
Press [SPACE BAR]
to change No to Yes
then press [ENTER].
[DOWN] arrow keys.
[SPACE BAR], then
press [ENTER].
Fields beginning with “Edit” lead to hidden menus and
have a default setting of No. Press [SPACE BAR] once to
change No to Yes, then press [ENTER] to go to the
“hidden” menu.
Within a menu, press [ENTER] to move to the next field.
You can also use the [UP]/[DOWN] arrow keys to move to
the previous and the next field, respectively.
You need to fill in two types of fields. The first requires you
to type in the appropriate information. The second allows
you to cycle through the available choices by pressing
[SPACE BAR].
able to save the new configuration.
All fields with ChangeMe must not be left blank in order to
be able to save the new configuration.
96Chapter 11 Introducing the SMT
G-1000 User’s Guide
Table 39 Main Menu Commands
OPERATIONKEYSTROKEDESCRIPTION
N/A fields<N/A>Some of the fields in the SMT will show a <N/A>. This
symbol refers to an option that is Not Applicable.
Save your
configuration
Exit the SMTType 99, then press
[ENTER]Save your configuration by pressing [ENTER] at the
message “Press ENTER to confirm or ESC to cancel”.
Saving the data on the screen will take you, in most cases
to the previous menu.
Type 99 at the main menu prompt and press [ENTER] to
[ENTER].
exit the SMT interface.
After you enter the password, the SMT displays the main menu, as shown next.
1General SetupUse this menu to set up your general information.
3LAN SetupUse this menu to set up your LAN and WLAN connection.
14Dial-in User SetupUse this menu to set up local user profiles on the G-1000.
22SNMP Configuration Use this menu to set up SNMP related parameters.
23System SecurityUse this menu to change your password and enable network user
authentication.
24System MaintenanceThis menu provides system status, diagnostics, software upload, etc.
99ExitUse this to exit from SMT and return to a blank screen.
Chapter 11 Introducing the SMT97
G-1000 User’s Guide
The chapter shows you the information on general setup.
Menu 1 – General Setup contains administrative and system-related information (shown
next). The System Name field is for identification purposes. It is recommended you type your
computer's "Computer name".
The DomainName entry is what is propagated to the DHCP clients on the LAN. While you
must enter the host name (System Name) on each individual computer, the domain name can
be assigned from the G-1000 via DHCP.
Enter 1 in the Main Menu to open Menu 1 – General Setup as shown next.
Figure 52 Menu 1 General Setup
CHAPTER12
General Setup
Menu 1 - General Setup
System Name= G-1000
Domain Name=
First System DNS Server= None
IP Address= N/A
Second System DNS Server= None
IP Address= N/A
Third System DNS Server= None
IP Address= N/A
Fill in the required fields. Refer to the following table for more information about these fields.
Table 41 Menu 1 General Setup
FIELDDESCRIPTION
System NameChoose a descriptive name for identification purposes. This name can be up to
30 alphanumeric characters long. Spaces are not allowed, but dashes “-” and
underscores "_" are accepted.
Domain NameThis is not a required field. Leave this field blank or enter the domain name
here if you know it.
First/Second/Third
System DNS Server
Press [SPACE BAR] to select From DHCP, User Defined or None and press
[ENTER].
These fields are not available on all models.
98Chapter 12 General Setup
G-1000 User’s Guide
Table 41 Menu 1 General Setup
FIELDDESCRIPTION
IP AddressEnter the IP addresses of the DNS servers. This field is available when you
select User-Defined in the field above.
When you have completed this menu, press [ENTER] at the prompt “Press ENTER to Confirm…” to
save your configuration, or press [
ESC] at any time to cancel.
Chapter 12 General Setup99
G-1000 User’s Guide
This chapter shows you how to configure the LAN on your G-1000.
13.1 LAN Setup
This section describes how to configure the Ethernet using Menu 3 –LAN Setup. From the
main menu, enter 3 to display menu 3.
Figure 53 Menu 3 LAN Setup
CHAPTER13
LAN Setup
Menu 3 - LAN Setup
2. TCP/IP Setup
5. Wireless LAN Setup
Enter Menu Selection Number:
Detailed explanation about the LAN Setup menu is given in the next chapter.
13.2 TCP/IP Ethernet Setup
Use menu 3.2 to configure your G-1000 for TCP/IP.
To edit menu 3.2, enter 3 from the main menu to display Menu 3-LAN Setup. When menu 3
appears, press 2 and press [ENTER] to display Menu 3.2-TCP/IP Setup, as shown next
:
100Chapter 13 LAN Setup
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.