Refer to this table to see what other security parameters you should configure for each
authentication method/ key management protocol type. You enter manual keys by first
selecting 64-bit WEP, 128-bit WEP or 152-bit WEP from the WEP Encryption field and
then typing the keys (in ASCII or hexadecimal format) in the key text boxes. MAC address
filters are not dependent on how you configure these security features.
Table 16 Wireless Security Relational Matrix
AUTHENTICATION
METHOD/ KEY
MANAGEMENT
PROTOCOL
Open NoneNoDisable
OpenWEPNo Enable with Dynamic WEP Key
A wireless client supplicant is the software that runs on an operating system instructing the
wireless client how to use WPA. At the time of writing, the most widely available supplicants
are the WPA patch for Windows XP, Funk Software's Odyssey client, and Meetinghouse Data
Communications' AEGIS client.
The Windows XP patch is a free download that adds WPA capability to Windows XP's builtin "Zero Configuration" wireless client. However, you must run Windows XP to use it.
6.15 Configuring Wireless Security
In order to configure and enable wireless security; click SETTINGS > WIRELESS >
Security to display the Security screen. This screen varies according to the encryption method
you select.
Chapter 6 Wireless Screens81
ZyXEL G-570S User’s Guide
6.15.1 Wireless Security: Disable
If you do not enable any wireless security on your device, your network is accessible to any
wireless networking device that is within range.
Figure 47 Wireless Security: Disable
The following table describes the labels in this screen.
Table 17 Wireless Security: Disable
LABELDESCRIPTION
Encryption Method Select Disable to have no wireless LAN security configured.
ApplyClick Apply to save your changes back to the device.
ResetClick Reset to begin configuring this screen afresh.
6.15.2 Wireless Security: WEP
WEP provides a mechanism for encrypting data using encryption keys. Both the AP and the
wireless stations must use the same WEP key to encrypt and decrypt data. You can configure
up to four 64-bit, 128-bit or 152-bit WEP keys, but only one key can be used at any one time.
82Chapter 6 Wireless Screens
Figure 48 Wireless Security: WEP
ZyXEL G-570S User’s Guide
The following table describes the labels in this screen.
Table 18 Wireless Security: WEP
LABELDESCRIPTION
Encryption Method Select WEP if you want to configure WEP encryption parameters.
Authentication
Type
WEP EncryptionSelect 64 bit WEP, 128 bit WEP or 152 bit WEP to enable data encryption.
PassphraseIf you selected 64-bit or 128-bit WEP, you can enter a “passphrase” (password
GenerateAfter you enter the passphrase, click Generate to have the device generates four
Key 1 to
Key 4
ApplyClick Apply to save your changes back to the device.
ResetClick Reset to begin configuring this screen afresh.
Select Auto, Open or Shared from the drop-down list box.
phrase) of up to 32 case-sensitive printable characters and click Generate to have
the device create four different WEP keys.
different WEP keys automatically.
If you want to manually set the WEP keys, enter the WEP key in the field provided.
Select a WEP key to use for data encryption.
The WEP keys are used to encrypt data. Both the device and the wireless stations
must use the same WEP key for data transmission.
If you chose 64 bit WEP, then enter any 5 ASCII characters or 10 hexadecimal
characters ("0-9", "A-F").
If you chose 128 bit WEP, then enter 13 ASCII characters or 26 hexadecimal
characters ("0-9", "A-F").
If you chose 152 bit WEP, then enter 16 ASCII characters or 32 hexadecimal
characters ("0-9", "A-F").
Chapter 6 Wireless Screens83
ZyXEL G-570S User’s Guide
6.15.3 Wireless Security: WPA(2)-PSK
Select WPA-PSK, WPA2-PSK or WPA-PSK & WPA2-PSK in the Encryption Method
drop down list-box to display the screen displays as next.
Figure 49 Wireless Security: WPA(2)-PSK
The following table describes the labels in this screen.
Table 19 Wireless Security: WPA-PSK
LABELDESCRIPTION
Encryption Method Select WPA-PSK, WPA2-PSK or WPA-PSK & WPA2-PSK if you want to
Pre-Shared KeyThe encryption mechanisms used for WPA and WPA-PSK are the same. The only
ApplyClick Apply to save your changes back to the device.
ResetClick Reset to begin configuring this screen afresh.
configure a pre-shared key. Choose this option only if your wireless clients support
it.
difference between the two is that WPA-PSK uses a simple common password,
instead of user-specific credentials.
Type a pre-shared key from 8 to 63 ASCII characters (including spaces and
symbols). This field is case-sensitive.
6.15.4 Wireless Security: WPA(2)
WPA (Wi-Fi Protected Access) is a subset of the IEEE 802.11i standard. WPA2 (IEEE
802.11i) is a wireless security standard that defines stronger encryption, authentication and
key management than WPA. Key differences between WPA(2) and WEP are user
authentication and improved data encryption.
84Chapter 6 Wireless Screens
Figure 50 Wireless Security: WPA(2)
ZyXEL G-570S User’s Guide
The following table describes the labels in this screen.
Table 20 Wireless Security: WPA(2)
LABELDESCRIPTION
Encryption Method Select WPA, WPA2 or WPA & WPA2 to configure user authentication and
improved data encryption.
Note: WPA, WPA2 and IEEE 802.1x wireless security are not
available when you use Wireless Client, Bridge or
AP+Repeater mode.
You can only use WEP keys to encrypt traffic between APs.
Authentication
Server IP Address
Port NumberEnter the port number of the external authentication server. The default port
Shared SecretEnter a password (up to 63 printable characters) as the key to be shared between
Reauthentication
Time
Enter the IP address of the external authentication server in dotted decimal
notation.
number is 1812.
You need not change this value unless your network administrator instructs you to
do so with additional information.
the external authentication server and the device.
The key must be the same on the external authentication server and your device.
The key is not sent over the network.
Specify how often wireless stations have to resend user names and passwords in
order to stay connected. Enter a time interval between 100 and 3600 seconds.
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
Chapter 6 Wireless Screens85
ZyXEL G-570S User’s Guide
Table 20 Wireless Security: WPA(2) (continued)
LABELDESCRIPTION
Global-Key
Update
ApplyClick Apply to save your changes back to the device.
ResetClick Reset to begin configuring this screen afresh.
This is how often the AP sends a new group key out to all clients. The re-keying
process is the WPA equivalent of automatically changing the WEP key for an AP
and all stations in a WLAN on a periodic basis.
Specify an interval either in seconds or thousands of packets that the device
sends.
6.15.5 Wireless Security: IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of
wireless stations and encryption key management.
Note: Once you enable user authentication, you need to specify an external RADIUS
server on the device for authentication.
Figure 51 Wireless Security: 802.1x
86Chapter 6 Wireless Screens
The following table describes the labels in this screen.
Table 21 Wireless Security: 802.1x
LABELDESCRIPTION
ZyXEL G-570S User’s Guide
Encryption Method Select 802.1X to configure authentication of wireless stations and encryption key
management.
Note: WPA, WPA2 and IEEE 802.1x wireless security are not
available when you use Bridge or AP+Repeater mode. You
can only use WEP keys to encrypt traffic between APs.
Data EncryptionSelect None to allow wireless stations to communicate with the access points
Authentication
Server IP Address
Port NumberEnter the port number of the external authentication server. The default port
Shared SecretEnter a password (up to 63 printable characters) as the key to be shared between
Reauthentication
Time
Global-Key
Update
ApplyClick Apply to save your changes back to the device.
ResetClick Reset to begin configuring this screen afresh.
without using dynamic WEP key exchange.
Select 64 bits WEP, 128 bits WEP or 152 bits WEP to enable data encryption.
Up to 32 stations can access the device when you configure dynamic WEP key
exchange.
Enter the IP address of the external authentication server in dotted decimal
notation.
number is 1812.
You need not change this value unless your network administrator instructs you to
do so with additional information.
the external authentication server and the device.
The key must be the same on the external authentication server and your device.
The key is not sent over the network.
Specify how often wireless stations have to resend user names and passwords in
order to stay connected. Enter a time interval between 100 and 3600 seconds.
If wireless station authentication is done using a RADIUS server, the
reauthentication timer on the RADIUS server has priority.
This is how often the AP sends a new group key out to all clients. The re-keying
process is the WPA equivalent of automatically changing the WEP key for an AP
and all stations in a WLAN on a periodic basis.
Specify an interval either in seconds or thousands of packets that the device
sends.
6.16 MAC Filter
The MAC filter screen allows you to give exclusive access to up to 32 devices (Allow
Association) or exclude up to 32 devices from accessing the device (Deny Association). Every
Ethernet device has a unique MAC (Media Access Control) address. The MAC address is
assigned at the factory and consists of six pairs of hexadecimal characters, for example,
00:A0:C5:00:00:02. You need to know the MAC addresses of the devices to configure this
screen.
The MAC filter works when the device functions as an AP. It allows or denies wireless client
access. The MAC filter does not apply to bridge or repeater functions.
Chapter 6 Wireless Screens87
ZyXEL G-570S User’s Guide
The following applies if you set the device to client mode and want to connect to an AP that
uses a MAC filter. After the device turns on in client mode, it clones the MAC address of the
first packets that it receives from devices connected to the Ethernet port. It uses this MAC
address on the packets that it sends to an AP. All of the packets that the device sends to an AP
will appear to be from the first device that connected to the Ethernet port. If you turn the
device off and back on, it again clones the MAC address of the first packets that it receives
from devices connected to the Ethernet port. You may be able to check the association list on
the AP to determine which MAC address the device is currently using.
To change your device's MAC filter settings, click WIRELESS > SETTINGS > MAC Filter. The screen appears as shown.
Note: Be careful not to list your computer's MAC address and select Deny the
following MAC address to associate when managing the device via a
wireless connection. This would lock you out.
Figure 52 MAC Filter
88Chapter 6 Wireless Screens
The following table describes the labels in this screen.
Table 22 MAC Filter
LABELDESCRIPTION
ZyXEL G-570S User’s Guide
ActiveSelect the check box to enable MAC address filtering and define the filter action for
#This is the index number of the MAC address.
MAC AddressEnter the MAC addresses (in XX:XX:XX:XX:XX:XX format) of the wireless station
ApplyClick Apply to save your changes back to the device.
ResetClick Reset to begin configuring this screen afresh.
6.17 OTIST
In a wireless network, the wireless clients must have the same SSID and security settings as
the access point (AP) or wireless router (we will refer to both as “AP” here) in order to
associate with it. Traditionally this meant that you had to configure the settings on the AP and
then manually configure the exact same settings on each wireless client.
OTIST (One-Touch Intelligent Security Technology) allows you to transfer your AP’s SSID
and WEP or WPA-PSK security settings to wireless clients that support OTIST and are within
transmission range. You can also choose to have OTIST generate a WPA-PSK key for you if
you didn’t configure one manually.
the list of MAC addresses in the MAC address filter table.
Select Allow the following MAC address to associate to permit access to the
device, MAC addresses not listed will be denied access to the device.
Select Deny the following MAC address to associate to block access to the
device, MAC addresses not listed will be allowed to access the device.
that are allowed or denied access to the device in these address fields.
Note: OTIST replaces the pre-configured wireless settings on the wireless clients.
6.17.1 Enabling OTIST
You must enable OTIST on both the AP and wireless client before you start transferring
settings.
Note: The AP and wireless client(s) MUST use the same Setup key.
6.17.1.1 AP
You can enable OTIST using the OTIST button or the web configurator.
6.17.1.1.1 OTIST Button
If you use the OTIST button, the default (01234567) or previous saved (through the web
configurator) Setup key is used to encrypt the settings that you want to transfer.
Chapter 6 Wireless Screens89
ZyXEL G-570S User’s Guide
Hold in the OTIST button for one or two seconds.
6.17.1.1.2 Web Configurator
Click WIRELESS > SETTINGS > OTIST to configure and enable OTIST. The screen
appears as shown.
Note: At the time of writing the device does not support OTIST in the wireless client
mode.
Figure 53 OTIST
The following table describes the labels in this screen.
Table 23 OTIST
LABELDESCRIPTION
One-Touch Intelligent Security Technology
Setup KeyEnter the setup key of up to eight printable characters. The default OTIST setup
Yes!To have OTIST automatically generate a WPA-PSK key, select this check box. If
StartClick Start to encrypt the wireless security data using the setup key and have the
6.17.1.2 Wireless Client
Start the ZyXEL utility and click the Adapter tab. Select the OTIST check box, enter the
same Setup Key as your AP’s and click Save.
key is "01234567".
Note: If you change the OTIST setup key here, you must also make
the same change on the wireless client(s).
you manually configured a WEP key or a WPA-PSK key and you also select this
check box, then the key you manually configured is used.
device set the wireless client to use the same wireless settings as the device. You
must also activate and start OTIST on the wireless client at the same time.
The process takes three minutes to complete.
90Chapter 6 Wireless Screens
Figure 54 Example Wireless Client OTIST Screen
6.17.2 Starting OTIST
ZyXEL G-570S User’s Guide
Note: You must click Start in the AP OTIST web configurator screen and in the
wireless client(s) Adapter screen all within three minutes (at the time of
writing). You can start OTIST in the wireless clients and AP in any order but
they must all be within range and have OTIST enabled.
1 In the AP, a web configurator screen pops up showing you the security settings to
transfer. After reviewing the settings, click OK.
Figure 55 Security Key
Chapter 6 Wireless Screens91
ZyXEL G-570S User’s Guide
2 This screen appears while OTIST settings are being transferred. It closes when the
transfer is complete.
Figure 56 OTIST in Progress (AP)
Figure 57 OTIST in Progress (Client)
• In the wireless client, you see this screen if it can't find an OTIST-enabled AP (with the
sameSetup key). Click OK to go back to the ZyXEL utility main screen.
Figure 58 No AP with OTIST Found
• If there is more than one OTIST-enabled AP within range, you see a screen asking you to
select one AP to get settings from.
6.17.3 Notes on OTIST
1 If you enabled OTIST in the wireless client, you see this screen each time you start the
utility. Click Yes for it to search for an OTIST-enabled AP.
92Chapter 6 Wireless Screens
ZyXEL G-570S User’s Guide
Figure 59 Start OTIST?
2 If an OTIST-enabled wireless client loses its wireless connection for more than ten
seconds, it will search for an OTIST-enabled AP for up to one minute. (If you manually
have the wireless client search for an OTIST-enabled AP, there is no timeout; click
Cancel in the OTIST progress screen to stop the search.)
3 When the wireless client finds an OTIST-enabled AP, you must still click Start in the AP
OTIST web configurator screen or hold in the OTIST button (for one or two seconds)
for the AP to transfer settings.
4 If you change the SSID or the keys on the AP after using OTIST, you need to run OTIST
again or enter them manually in the wireless client(s).
5 If you configure OTIST to generate a WPA-PSK key, this key changes each time you run
OTIST. Therefore, if a new wireless client joins your wireless network, you need to run
OTIST on the AP and ALL wireless clients again.
Chapter 6 Wireless Screens93
ZyXEL G-570S User’s Guide
94Chapter 6 Wireless Screens
Management Screens
This chapter describes the Maintenance screens.
7.1 Maintenance Overview
Use these maintenance screens to change the password, view logs, back up or restore the G570S configuration and change the web configurator language.
7.2 Password
To change your device's password (recommended), click SETTINGS > MANAGEMENT.
The screen appears as shown. This screen allows you to change the device's password.
ZyXEL G-570S User’s Guide
CHAPTER7
If you forget your password (or the device IP address), you will need to reset the device. See
the section on resetting the device for details.
Figure 60 Management: Password
The following table describes the labels in this screen.
Table 24 Management: Password
LABELDESCRIPTION
Current Password Type in your existing system password (1234 is the default password).
New PasswordType your new system password (up to 30 printable characters). Spaces are not
Retype to Confirm Retype your new system password for confirmation.
allowed.
Note that as you type a password, the screen displays an asterisk (*) for each
character you type.
Chapter 7 Management Screens95
ZyXEL G-570S User’s Guide
Table 24 Management: Password (continued)
LABELDESCRIPTION
ApplyClick Apply to save your changes back to the device.
CancelClick Cancel to reload the previous configuration for this screen.
7.3 Logs
Click SETTINGS > MANAGEMENT > Logs to open the Logs screen.
You can view logs and alert messages in this screen. Once the log table is full, old logs are
deleted as new logs are created.
Click a column heading to sort the entries. A triangle indicates the direction of the sort order.
Figure 61 Management: Logs
The following table describes the labels in this screen.
Table 25 Management: Logs
LABELDESCRIPTION
Display Select a category of logs to view.
RefreshClick Refresh to renew the log screen.
Clear Log Click Clear Log to clear all the logs.
#This is the log’s index number.
Time This field displays the time the log was recorded. It is the number of seconds since
MessageThis field states the reason for the log.
96Chapter 7 Management Screens
the last time the system turned on.
Table 25 Management: Logs (continued)
LABELDESCRIPTION
ZyXEL G-570S User’s Guide
SourceThis field lists the source IP address and the port number of the incoming packet
Destination This field lists the destination IP address and the port number of the outgoing
NoteThis field displays additional information about the log entry.
that caused the log.
packet that caused the log.
7.4 Configuration File
The configuration file (often called the romfile or rom-0) contains the factory default settings
such as password and TCP/IP Setup, etc. It arrives from ZyXEL with a .rom filename
extension. Once you have customized the device's settings, they can be saved back to your
computer under a filename of your choosing.
Click SETTINGS > MANAGEMENT > Configuration File. Information related to factory
defaults, backup configuration, and restoring configuration appears as shown next.
Figure 62 Management: Configuration File
Chapter 7 Management Screens97
ZyXEL G-570S User’s Guide
7.4.1 Backup Configuration
Backup configuration allows you to back up (save) the device's current configuration to a file
on your computer. Once your device is configured and functioning properly, it is highly
recommended that you back up your configuration file before making configuration changes.
The backup configuration file will be useful in case you need to return to your previous
settings.
Click Backup to save the device's current configuration to your computer.
7.4.2 Restore Configuration
Restore configuration allows you to upload a new or previously saved configuration file from
your computer to your device.
File PathType in the location of the file you want to upload in this field or click Browse ... to
Browse... Click Browse... to find the file you want to upload. Remember that you must
Upload Click Upload to begin the upload process.
find it.
decompress compressed (.zip) files before you can upload them.
Note: Do not turn off the device while configuration file upload is in progress.
The following screen displays. You must wait one minute before logging into the device
again.
Figure 63 Configuration Upload Successful
The device automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
98Chapter 7 Management Screens
ZyXEL G-570S User’s Guide
Figure 64 Network Temporarily Disconnected
If you uploaded the default configuration file you may need to change the IP address of your
computer to be in the same subnet as that of the default device IP address (192.168.1.2).
If the upload was not successful, the following screen will appear. Click Return to go back to
the Configuration File screen.
Figure 65 Configuration Upload Error
7.4.3 Back to Factory Defaults
Clicking the RESET button in this section clears all user-entered configuration information
and returns the device to its factory defaults. The following warning screen will appear.
Figure 66 Reset Warning Message
You can also press the RESET button on the rear panel to reset the factory defaults of your
device. Refer to the section on resetting the device for more information on the RESET
button.
7.5 F/W Upload Screen
Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a
.rmt extension, for example, "zyxel.rmt". The upload process uses HTTP (Hypertext Transfer
Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
Chapter 7 Management Screens99
ZyXEL G-570S User’s Guide
Click SETTINGS > MANAGEMENT > F/W Upload to display the screen as shown.
Follow the instructions in this screen to upload firmware to your device.
Figure 67 Management: F/W Upload
The following table describes the labels in this screen.
Table 27 Management: F/W Upload
LABELDESCRIPTION
File Path Type in the location of the file you want to upload in this field or click Browse ... to
Browse... Click Browse... to find the .rmt file you want to upload. Remember that you must
Upload Click Upload to begin the upload process. This process may take up to two
find it.
decompress compressed (.zip) files before you can upload them.
minutes.
Note: Do not turn off the device while firmware upload is in progress!
The following screen appears. Wait two minutes before logging into the device again.
Figure 68 Firmware Upgrading Screen
The device automatically restarts in this time causing a temporary network disconnect. In
some operating systems, you may see the following icon on your desktop.
100Chapter 7 Management Screens
ZyXEL G-570S User’s Guide
Figure 69 Network Temporarily Disconnected
After two minutes, log in again and check your new firmware version in the System Status
screen.
If the upload was not successful, the following status message displays at the bottom of the
screen.
Figure 70 Firmware Upload Error
Chapter 7 Management Screens101
ZyXEL G-570S User’s Guide
102Chapter 7 Management Screens
CHAPTER8
Troubleshooting
This chapter covers potential problems and possible remedies. After each problem description,
some instructions are provided to help you to diagnose and to solve the problem.
8.1 Problems Starting Up the G-570S
Table 28 Troubleshooting the Start-Up of Your G-570S
PROBLEMCORRECTIVE ACTION
ZyXEL G-570S User’s Guide
None of the LEDs
turn on when I
plug in the power
adaptor.
The G-570S
reboots
automatically
sometimes.
Make sure you are using the supplied power adaptor and that it is plugged in to an
appropriate power source. Check that the power source is turned on.
If the problem persists, you may have a hardware problem. In this case, you should
contact your local vendor.
The supplied power to the G-570S is too low. Check that the G-570S is receiving
enough power.
Make sure the power source is working properly.
8.2 Problems with the Password
Table 29 Troubleshooting the Password
PROBLEMCORRECTIVE ACTION
I cannot access the
G-570S.
The Password field is case-sensitive. Make sure that you enter the correct
password using the proper casing.
Use the RESET button on the rear panel of the G-570S to restore the factory
default configuration file (hold this button in for about 10 seconds or release the
button when the PWR LED starts blinking). This will restore all of the factory
defaults including the password.
Chapter 8 Troubleshooting103
ZyXEL G-570S User’s Guide
8.3 Problems with the WLAN Interface
Table 30 Troubleshooting the WLAN Interface
PROBLEMCORRECTIVE ACTION
Cannot access the
G-570S from the
WLAN.
I cannot ping any
computer on the
WLAN.
Make sure the wireless adapter on the wireless station is working properly.
Check that both the G-570S and your wireless station are using the same
ESSID, channel and security settings.
Make sure the wireless adapter on the wireless station(s) is working properly.
Check that both the G-570S and wireless station(s) are using the same ESSID,
channel and security settings.
8.4 Problems with the Ethernet Interface
Table 31 Troubleshooting the Ethernet Interface
PROBLEMCORRECTIVE ACTION
I cannot access the
G-570S from the
LAN.
I cannot ping any
computer on the
LAN.
If the ETHN LED on the front panel is off, check the Ethernet cable connection
between your G-570S and the Ethernet device connected to the ETHERNET
port.
Check for faulty Ethernet cables.
Make sure your computer’s Ethernet adapter is installed and working properly.
Check the IP address of the Ethernet device. Verify that the IP address and the
subnet mask of the G-570S, the Ethernet device and your computer are on the
same subnet.
If the ETHN LED on the front panel is off, check the Ethernet cable connections
between your G-570S and the Ethernet device.
Check the Ethernet cable connections between the Ethernet device and the
LAN computers.
Check for faulty Ethernet cables.
Make sure the LAN computer’s Ethernet adapter is installed and working
properly.
Verify that the IP address and the subnet mask of the G-570S, the Ethernet
device and the LAN computers are on the same subnet.
104Chapter 8 Troubleshooting
Table 31 Troubleshooting the Ethernet Interface (continued)
PROBLEMCORRECTIVE ACTION
ZyXEL G-570S User’s Guide
Cannot access the
web configurator.
Your computer’s and the G-570S’s IP addresses must be on the same subnet
for LAN access.
If you changed the G-570S’s IP address, then enter the new one as the URL.
If you don’t know the G-570S’s IP address, type the device name of your G-
570S as the URL. ZyXELXXXX is the default where “XXXX” is the last four digits
of the MAC address. The MAC address is on the bottom of the device).
If you just changed the G-570S’s IP address, your computer’s cache of machine
names may contain an entry that maps the name of the G-570S to its previous
IP address.
In Windows, use nbtstat -R at the command prompt to delete all entries in your
computer’s cache of machine names.
Open a new browser window.
See the following section to check that pop-up windows, JavaScripts and Java
permissions are allowed.
You may also need to clear your Internet browser’s cache.
In Internet Explorer, click Tools and then Internet Options to open the Internet Options screen.
In the General tab, click Delete Files. In the pop-up window, select the Deleteall offline content check box and click OK. Click OK in the Internet Options
screen to close it.
If you disconnect your computer from one device and connect it to another
device that has the same IP address, your computer’s ARP (Address Resolution
Protocol) table may contain an entry that maps the management IP address to
the previous device’s MAC address).
In Windows, use arp -d at the command prompt to delete all entries in your
computer’s ARP table.
Open a new browser window.
8.4.1 Pop-up Windows, JavaScripts and Java Permissions
In order to use the web configurator you need to allow:
• Web browser pop-up windows from your device.
• JavaScripts (enabled by default).
• Java permissions (enabled by default).
Note: Internet Explorer 6 screens are used here. Screens for other Internet Explorer
versions may vary.
8.4.1.1 Internet Explorer Pop-up Blockers
You may have to disable pop-up blocking to log into your device.
Either disable pop-up blocking (enabled by default in Windows XP SP (Service Pack) 2) or
allow pop-up blocking and create an exception for your device’s IP address.
Chapter 8 Troubleshooting105
Loading...
+ 57 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.