This chapter shows you how to enable the Zyxel Device firewall. Use the firewall to protect your Zyxel
Device and network from attacks by hackers on the Internet and control access to it. The firewall:
• allows traffic that originates from your LAN computers to go to all other networks.
• blocks traffic that originates on other networks from going to the LAN.
By default, the Zyxel Device blocks DoS attacks whether the firewall is enabled or disabled.
The following figure illustrates the firewall action. User A can initiate an IM (Instant Messaging) session
from the LAN to the WAN (1). Return traffic for this session is also allowed (2). However other traffic
initiated from the WAN is blocked (3 and 4).
Figure 82 Default Firewall Action
C
HAPTER
Firewall
11
11.1.1 What You Need to Know About Firewall
DoS
Denials of Service (DoS) attacks are aimed at devices and networks with a connection to the Internet.
Their goal is not to steal information, but to disable a device or network so users no longer have access
to network resources. The Zyxel Device is pre-configured to automatically detect and thwart all known
DoS attacks.
ICMP
Internet Control Message Protocol (ICMP) is a message control and error-reporting protocol between a
host server and a gateway to the Internet. ICMP uses Internet Protocol (IP) datagrams, but the messages
are processed by the TCP/IP software and directly appar ent to the application user.
LTE7461-M602 User’s Guide
109
Page 2
Chapter 11 Firewall
DoS Thresholds
For DoS attacks, the Zyxel Devi ce uses thresholds to determine when to drop sessions that do not
become fully established. These thresholds apply globally to all sessions. You can use the default
threshold values, or you ca n change them to values more suitable to your security requirements.
11.2 The Firewall Screen
11.2.1 What You Can Do in this Chapter
• Use the General screen to configure the sec urit y lev el of t he firewall on the Zyx el Devic e (Section 11.3
on page 110).
• Use the Protocol screen to add or remove predefined Internet services and configure firewall rules
(Section 11.4 on page 111 ).
• Use the Access Control screen to view and configure incoming/outgoing filtering rules (Section 11.5
on page 113).
• Use the DoS screen to activa te protection against Denial of Service (DoS) attacks (Section 11.6 on
page 115).
11.3 The Firewall General Screen
Use the firewall to protect your Zyxel Device and network from attacks by hackers on the Internet and
control access to it. Use this screen to set the security level of the firewall on the Zyxel Device. Firewall
rules are grouped based on the direction of travel of packets. A higher firewall level means more
restrictions on the Internet activities you can perform. Click Security > Firewall > General to display the
following screen. Use the slider to select the level of firewall protection.
LTE7461-M602 User’s Guide
110
Page 3
Chapter 11 Firewall
Figure 83 Security > Firewall > G en eral
te: LAN to W AN is your access to all Internet services. WAN to LAN is the access of other
No
computers on the Internet to devices behind the Zyxel Device.
When the security level is set to High, access to Telnet, FTP, HTTP, HTTPS, DNS, IMAP,
POP3, SMTP, and IPv6 Ping are still allowed from the LAN.
The following table describes the labels in this screen.
Table 42 Security > Firewall > General
LABELDESCRIPTION
IPv4
Firewall
IPv6
Firewall
Enable firewal l protection when using IPv4 (Internet Protocol version 4).
Enable firewal l protection when using IPv6 (Internet Protocol version 6).
This setting blocks all traffic to and from the Inter net. Only local network traffic and LAN to WA N serviceHigh
(Telnet, FTP, HTTP, HTTPS, DNS, PO P 3, S MTP) is permitted .
This is the recommen ded se tt ing. It allows traffic to th e In ternet but blocks anyon e f rom the InternetMedium
from accessing any services on your loc al network.
This setting allows traffic to the Internet and also allows someone from the Internet to access services onLow
your local network. This would be used with Port Forwarding, Default Server.
Click this to save your changes.Apply
Click this to restore your previously saved settings.Cancel
11.4 Th
A protocol is a port number rule which defines a service. Services include Email, File sharing, Instant
messaging, Online games, Print servers, Voice over IP and so on. Define services in this screen that you
want to apply access control rules to in the Firewall > Access Control screen. For a compreh ensi ve lis t of
e Protocol (Customized Services) Screen
LTE7461-M602 User’s Guide
111
Page 4
Chapter 11 Firewall
port numbers and services, visit the IANA (Internet Assigned Number Authority) website. Click Security > Firewall > Protocol to display the following screen.
ote: Removing a protocol rule will also remove associated ACL rules.
N
Figure 84 Security > Firewall > Protocol
The following table describes the labels in this screen.
Table 43 Security > F irewall > Protocol
LABELDESCRIPTION
dd New
A
Protocol
Entry
Ports/
Protocol
Number
Click this to configure a customized service.
This is the name of your customized service.Name
This is a description of your customized service.Description
This shows the port number or range and the IP protocol (TCP or UDP) th at defines your customiz ed
service.
Click this to edit a customized service.Modify
11.4.1 Add Cus
Add a customized rule or edit an existing rule by specifying the IP port and the port num ber(s). Click Add
New Protocol Entry in the Protocol screen to display the following screen.
The following table describes the labels in this screen.
Table 44 Security > Firewall > Protocol: Add New Protocol Entry
LABELDESCRIPTION
Ty
pe a unique name for yo ur custom port.Service Name
Enter a description for your custom port.Description
Choose the IP port (ProtocolTCP, UDP, ICMP, ICMPv6, Other) that defines your customized port from the
drop down list box .
Type a single port number or the ra nge of po rt numbers (Protocol Number0-255) that define your customized
service.
OKClick this to save your changes.
CancelClick this to exit this screen without saving.
11.5 The Access Control (Rules) Screen
An Access Control List (ACL) rule is a manually-defined rule that can accept, r eject, or drop inc oming or
outgoing packets from your network based on the type of service. For example, you could block users
using Instant Messaging in your network. This screen displays a list of the configured incoming or
outgoing filtering rules. Note the order in which the rules are listed. Click Security > Firewall > Access Control to display the following screen.
ote: The ordering of your rules is very important as rules are applied in turn.
N
Figure 86 Security > Fire w al l > Ac cess Control
The following table describes the labels in this screen.
Table 45 Security > Firewall > Rules
LABELDESCRIPTION
R
ules Storage Space
Usage
This read-only bar shows how much of the Zyxel Device's memory for recording firewall
rules it is currently using. When you are using 80% or less of the storage space, the bar is
green. When the amount of space used is over 80%, the bar is red.
Select an inde x numb er an d clickAdd New ACL RuleAdd to add a new fir ewal l rule after the select ed in dex
number. For example, if you select “6”, your new rule becomes number 7 and the
previous rule 7 (if there is one) becomes rule 8.
This field displays the rule index number. The ordering of your rules is important as rules are#
applied in turn .
This field displays the rule name.Name
This field dis plays the source IP addresses to which th is rule applies.Src IP
This field displays the destination IP addresses to which this rule applies.Dest IP
This field displays the protocol (TCP, UDP, TCP+UDP or any) used to transport the pack etsService
for which you want to apply the rule.
LTE7461-M602 User’s Guide
113
Page 6
Chapter 11 Firewall
Table 45 Security > Firewall > Rules (continued)
LABELDESCRIPTION
A
ctionDisplays wh et her the f ir ewa ll si le nt ly di s car ds pa cket s ( Drop), discards packets and sends
ModifyClick the Edit icon to edit the firewall rule.
a TCP reset packet or an ICMP destination-unreachable message to the sender (Reject),
or allow the passage of (Accept) packets that match this rule.
Click the Delete icon to delete an existing firewall rule.
11.5.1 Acc
Use this screen to configure firewall rules. In the Access Control screen, select an index number and click
Add New ACL Rule or click a rule’s Edit iconto display this screen and refer to the following table for
information on the labels.
Figure 87 Security > Firewall > Access Control > Add New ACL Rule
ess Control Add New ACL Rule Screen
The following table describes the labels in this screen.
Table 46 Security > Firewall > Access Control > Add New ACL Rule
LABELDESCRIPTION
lter NameType a unique name for yo ur fil ter rule.
Fi
OrderAssign the order of your rules as rule s are applied in turn .
LTE7461-M602 User’s Guide
114
Page 7
Chapter 11 Firewall
Table 46 Security > Firewall > Access Control > Add New ACL Rule (continued)
LABELDESCRIPTION
Se
lect Source IP
Address
Select Destination
Device
Custom Destination
Port
Scheduler Rules
packet(s) per
(1-512)
OK
CancelClick this to exit thi s s cre en without saving.
If you want the source to come from a particular (single) IP, select Specific IP Address. If
not, select from a detected device.
If you selectedSource IP AddressSpecific IP Address in the previous item, enter the source device’s IP
address here. Othe r wise this field will be hidden if yo u select the detected devi c e.
If you want your rule to apply to packets with a particular (single) IP, select Specific IP Address. If not, select a detected device.
If you selectedDestinat ion IP AddressSpecific IP Address in the previou s item , en te r the destina t io n de vice’ s IP
address here. Othe r wise this field will be hidden if yo u select the detected devi c e.
Select betweenIP TypeIPv4 or IPv6. Compared to IPv4, IPv6 (Internet Protocol version 6), is
designed to enhan c e IP add r ess siz e an d f ea tu r es. Th e increase in IPv6 address size to
128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses. The Zyxel
Device can use IPv4/IPv6 dual stack to connect to IPv4 and IPv6 networks, and supports
IPv6 rapid deployment (6RD).
Select a service fro m th eSelect ServiceSelect Service box.
Select the protocol (ProtocolALL, TCP/UDP, TCP, UDP, ICMP, ICMPv6) used to transp ort th e packet s
for which you want to apply the rule.
This is a single port number or the starting port number of a range that defines your rule.Custom Source Port
This is a single port number or the ending port num ber o f a range th at defi ne s your rule .
Use the drop-down list box to select whether to discard (PolicyDrop), deny and send an ICMP
destination-unreachable message to the sender (Reject), or allow the passage of
(Accept) packets that match this rule.
SelectDirectionWAN to LAN to apply the rule to traffic from WAN to LAN. Select LAN to WAN to
apply the rule to traf fic from LAN to WAN. Sele ct WAN to Rou ter to apply th e rule to traf fic
from WAN to router. Selec t LAN to Router to apply the rule to traffic from LAN to router.
Click to enable (switch turns blue) the setting of max imum number of packets perEnable Rate Limit
maximum number of minute/second to lim i t th e th r o ughput of traff ic th at matches th is
rule. If not, the next item will be disabled.
Enter the maximum number of packets (1-512) per minute/second.
Select a schedule rule for this ACL rule form the drop-do w n list bo x . Yo u c a n c on f ig u r e aAdd New Rule
new schedule rule by clicking Add New Rule.
Click this to save your chan ges.
11.6 DoS Screen
Activate protection agai nst DoS attacks. DoS (De nia l of Service) attacks can flood your Internet
connection with invalid packets and connection requests, using so much bandwidth and so many
resources that Internet access becomes unavailable.
Click Security > Firewall > DoS to display the following screen.
LTE7461-M602 User’s Guide
115
Page 8
Chapter 11 Firewall
Figure 88 Security > Firewall > DoS
The following table describes the labels in this screen.
Table 47 Security > F irewall > DoS
LABELDESCRIPTION
Do
S Protection
Blocking
Enable this to protect against DoS attacks. The Zyxel Device will drop sessions that surpass
maximum threshold s.
Click this to save your changes.Apply
Click this to restore your previously saved settings.Cancel
11.7 Firewall Technical Reference
This section provides some technical background information about the topics covered in this chapter.
11.7.1 Firew
all Rules Overview
Your customized rules take precedence an d over rid e th e Zyxel Devi ce’s de fault setti ng s. The Zyxel
Device checks the source IP address, destination IP address and IP protocol type of network traffic
against the firewall rules (in the order you list them). When the traffic matches a rule, the Zyxel Device
takes the action specified in the rule.
Firewall rules are grouped based on the direction of travel of packets to which they apply:
•LAN to Router•WAN to LAN
• LAN to WAN• WAN to Router
By default, the Zyxel Device’s stateful packet inspection allows packets traveling in the following
directions:
•LAN to Router
These rules specify which computers on the LAN can manage the Zyxel Device (remote
management).
ote: You can also configure the remote management settings to allow only a specific
N
computer to manage the Zyxel Device.
• LAN to WAN
These rules specify which computers on the LAN can access which computers or services on the
WAN.
LTE7461-M602 User’s Guide
116
Page 9
Chapter 11 Firewall
By default, the Zyxel Device’s stateful packet inspection drops packets traveling in the following
directions:
•WAN to LAN
These rules specify which computers on the WAN can access which computers or services on the
LAN.
ote: You also need to configure NAT port forwarding (or full featured NAT address mapping
N
rules) to allow computers on the WAN to access devices on the LAN.
•WAN to Router
By default the Zyxel Device stops computers on the WAN from managing the Zyxel Device. You could
configure one of these rules to allow a WAN computer to manage the Zyxel Device.
N
ote: You also need to configure the remote management settings to allow a WAN
computer to manage the Zyxel Device.
You may define additional rules and sets or modify existing ones but please exercise extreme caution in
doing so.
For example, you may create rules to:
• Block certain types of traffic, such as IRC (Internet Relay Chat), from the LAN to the Internet.
• Allow certain types of traffic, such as Lotus Notes database synchronization, from specific hosts on the
• Allow everyone except your competitors to access a web server.
• Restrict use of certain protocols, such as Telnet, to authorized users on the LAN.
These custom rules work by comparing the source IP address, destination IP address and IP protocol
type of network traffic to rules set by the administrator. Your customized rules take precedence and
override the Zyxel Device’s default rules.
11.7.2 Gu
1Change the default password via the Web Configurator.
2Think about access control before you con nect to the network in any way.
3Limit who can access your router.
4Don't enable any local service (such as telnet or FTP) that you don't use. Any enabled service could
present a potential security risk. A determined hacker might be able to find creative ways to misuse the
enabled services to access the firewall or the network.
5For local services that are enabled, protect against misuse. Protect by configuring the services to
communicate only with specific peers, and protect by configuring rules to block packets for the ser vices
at specific interfaces.
Internet to specific hosts on the LAN.
idelines For Enhancing Security With Your Firewall
6Protect against IP spoofing by making sure the firewall is active.
7Keep the firewall in a secured (locked) room.
LTE7461-M602 User’s Guide
117
Page 10
Chapter 11 Firewall
11.7.3 Se
N
Consider these security ramifications before creating a rule:
1Does this rule stop LAN users from accessing critical resources on the Intern et ? For examp le, if IRC
(Internet R elay Chat) is b locked, are there users tha t require this service?
2Is it possible to modify the rule to be more specific? For example, if IRC is blocked for all users, will a rule
that blocks just certain users be more effective?
3Does a rule that allows Internet users access to resources on the LAN create a security vulnerability? For
example, if FTP ports (TCP 20, 21 ) are allow ed from the Int ernet to the LAN, Int ernet users ma y be able to
connect to computers with running FTP servers.
4Does this rule conflict with any existing rules?
Once these que stions have be en answered, a dding rules is simply a matter of entering the information
into the corr ect fields in the Web Configurator screens.
curity Considerations
ote: Incorrectly configuring the firewall may block valid access or introduce security risks to
the Zyxel Device and your protected network. Use caution when creating or deleting
firewall rules and test your rules after you configure them.
LTE7461-M602 User’s Guide
118
Page 11
12.1 MAC Filter Overview
You can configure the Zyxel Device to permit access to clients based on their MAC addresses in the
MAC Filter screen. This applies to wired and wireless connections. Every Ethernet device has a unique
MAC (Media Access Control) address. The MAC address is assigned at the factory and consists of six
pairs of hexadecimal characters, for example, 00:A0:C5:00:00:02. You need to know the MAC addresses
of the LAN client to configure this screen.
12.2 The MAC Filter Screen
Enable MAC Address Filter and add the host name and MAC address of a LAN client to the table if you
wish to allow or deny them access to your network. Select Security > MAC Filter. The screen appears as
shown.
C
HAPTER
12
MAC Filter
Figure 89 Security > MAC Filter
You can choose to enable or disable the filters per entry; make sure that the check box under Active is
selected if you want to use a filter, as shown in the example below.
Figure 90 Enabling individual MAC filters
LTE7461-M602 User’s Guide
119
Page 12
Chapter 12 MAC Filter
The following table describes the labels in this screen.
Table 48 Security > MAC Filter
LABELDESCRIPTION
MA
C Address Filter
MA
C Restrict Mode
dd New Rule
A
Se
t
ActiveSelect Active to enable the MAC filter rule. The rule will not be applied if Allow is not
Ho
st Name
C Address
MA
lete
De
Ca
ncelClick Cancel to restore your previously saved settings.
Ap
plyClick Apply to save your changes.
Sel
ect Enable to activate the MAC filter function.
Sel
ect Allow to only permit the listed MAC addresses access to the Zyxel Device. Select
Deny to permit anyone access to the Zyxel Device except the listed MAC addresses.
ick this button to create a new entry.
Cl
T
his is the index number of the MAC addr es s.
selected unde r MAC Restrict Mode.
E
nter the host name of the wireless or LAN cl ients that are allow ed access to the Zyxel
Device.
nter the MAC addresses of the wireless or LAN clients that are allowed ac ce ss to th e Zyx el
E
Device in these address fields. Enter the MAC addresses in a valid MAC address format, that
is, six hexadecimal character pairs, for example, 12:34:56:78:9a:bc.
ick the Delete icon to delete an existing rul e.
Cl
LTE7461-M602 User’s Guide
120
Page 13
13.1 Overview
The Zyxel Device can use certificates (also called digital IDs) to authenticate users. Certificates are
based on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
Certificates provide a way to exchange public keys for use in authentication.
C
HAPTER
13
Certificates
13.1.1 Wh
at You Can Do in this Chapter
• Use the Local Certificates screen to view and import the Zyxel Device’s CA-signed (Certification
Authority) certificates (Section 13.2 on page 121).
• Use the Trusted CA scre en to save the certificates of trusted CAs to the Zyxel Device. You can also
export the certificates to a computer (Section 13.3 on page 125).
13.2 Local Certificates
View the Zyxel Device’s summary list of certificates, generate certification requests, and import the
signed certificates. You can import the following certificates to your Zyxel Device:
• Web Server - This certificate secures HTTP connections.
• SSH- This certificate secures remote connections.
Click Security >Certificates to open the Local Certificates screen.
Figure 91 Security > Certificates > Local Certificates
LTE7461-M602 User’s Guide
121
Page 14
Chapter 13 Certificates
The following table describes the labels in this screen.
Table 49 Security > Certificates > Local Certificates
LABELDESCRIPTION
R
eplace Private Key/Certificate file in PEM for m at
Private Key is
protected by
password
Create Certificate
Request
Select the check box and enter the private key into the text box to store it on the Zyxel Device.
The private key should not exceed 63 ASCII characters (not including spaces).
Click this button to find the certificate file you want to upload.Choose File
Click this button to sa ve the ce r ti fic at e th at you have enrolled from a certificat io n authorityImport Certific at e
from your computer to the Zyxel Device.
Click this button to go to the screen where you can have the Zyxel Devic e ge ner at e a
certification re q ues t .
This field displays th e na me used to identify th is ce r ti fic a te. It is recommend ed th at you giveCurrent File
each certificate a unique name.
This field displays id en tif y in g information abou t th e c er t ificate’s owner, s uch asSubjectCN (Common
Name), OU (Organizational Unit or department), O (Organization or company) and C
(Country). I t is recommended that each certifica t e have a unique subj ect information.
This field displays id en tif y in g inf o rmation about th e ce rt if icate’s issuing cer t if ication authority ,Issuer
such as a common name, organizational unit or department, organization or company and
country.
This field displays th e da te that the certifi cate becomes applic a ble. The text displa ys in re dValid From
and includes a Not Yet Valid! message if th e ce rt if icate has not yet beco me applicable.
This field displays the date that the cert if i c at e expires. The text displa ys in red an d in c lu des anValid To
Expiring! or Expired! message if the certificate is about to expire or has already expired.
Click theModifyView icon to open a screen with an in-d ept h lis t of information abou t the certificate.
13.2.1 Create
Click Security > Certificates > Local Certificates and then Create Certificate Request to open the
following screen. Have the Zyxel Device generate a certification request. To create a certificate signing
request, you need to enter a common name, organization name, state/province name, and the twoletter country code for the certificate.
For a certification request, click Load Signed to import the signed cert ificate.
Click the Remove icon to remove the certificate (or certification request). A window displays
asking you to confirm that you want to delete the certificate. Note that subsequent
certificates move up by one when you take this action.
Certificate Request
LTE7461-M602 User’s Guide
122
Page 15
Chapter 13 Certificates
Figure 92 Create Certificate Request
The following table describes the labels in this screen.
Table 50 Create Certificate Request
LABELDESCRIPTION
C
ertificate
Name
Type up to 63 ASCII characters (not including spaces) to identify this certifica te.
SelectCommon Name Auto to have the Zyxel Device configure this field automatically. Or select Customize to
enter it manually.
Organization
Name
State/Province
Name
Country/Region
Name
Ca
13.2.2 Vie
View in-depth information about the certificate request. The Certificate is used to verify the authenticity
of the certification authority. The Private Key serves as your digital signature for authentication and must
be safely stored. The Signing Request contains the certificate signing request value that you will copy
upon submitting the ce rtificate request to the CA (certificate authority).
Click the View icon in the Local Certificates screen to open the following screen.
Type the IP address (in dotted deci mal notation), dom ain name or email address in the field
provided. The domain name or email address can be up to 63 ASCII char ac ters. The domai n
name or email addre s s is fo r id en tif i c at io n pur po s es on ly an d c an be an y s tri ng .
Type up to 63 characters to identify the company or group to which the certificate owner
belongs. You may use an y ch a r act e r, inc lu d in g s paces, but the Zyxel Device drops trail in g
spaces.
Type up to 32 ch ar ac te rs t o i de nt if y th e s t at e or pr o vi n ce wh ere t h e ce r ti fi c at e o wn er is l oca t ed.
You may use any char act e r, inc lu d in g s paces, but the Zyxel Device drops trail in g spaces.
Select a country to identify the nation where the cer tificate owner is located.
ncel
lick Cancel to exit this screen without saving.
C
ClickOKOK to save your changes.
w Certificate Request
LTE7461-M602 User’s Guide
123
Page 16
Chapter 13 Certificates
Figure 93 Certificate Request: View
The following table describes the fields in this screen.
Table 51 Certificate Request: View
LABELDESCRIPTION
NameThis field displays th e id entifying name of this c ert if icate.
TypeThis field displa ys g eneral information about the cer t if icate. ca means tha t a Cert if ication
SubjectThis field di sp lays i nfo rma ti on t hat id en tif i es t he owne r of the c ert if ica te , su ch as Com mon Nam e
Authority sig ne d th e c er t if icate.
(CN), Organizational Unit (OU), Organization (O) and Country ( C) .
This read-only text bo x displays the certif icate in Privacy Enhanced Mail (PEM) format. PEM usesCertificate
base 64 to convert the binary certif icate into a printable fo rm.
You can copy and paste the certificate into an email to send to friends or colleagues or you can
copy and paste the certificate into a text editor and save the file on a management computer
for later distribution.
This field displays the private key of this certificate.Private Key
LTE7461-M602 User’s Guide
124
Page 17
Table 51 Certificate Request: View (continued)
LABELDESCRIPTION
T
be provided to a certificate authority, and it includes information about the public key,
organizati on na me, domain name , lo c ation, and coun tr y of this certificate.
ClickBackBack to return to the previous screen.
13.3 Trusted CA
Click Security > Certificates > Trusted CA to open the following screen. A summary list of certificates of
the certification authorities that you have set the Zyxel Device to accept as trusted is listed below. The
Zyxel Device accepts any valid certificate signed by a certification authority on this list as being
trustworthy; thus you do not need to import any certificate that is signed by one of these certification
authorities.
ote: A maximum of 4 certificates can be stored.
N
Figure 94 Security > Certificates > Trusted CA
Chapter 13 Certificates
his field displays the CSR (Certificate Signing Request) information of this certificate. The CSR willSigning Request
The following table describes the labels in this screen.
Table 52 Security > Certificates > Trusted CA
LABELDESCRIPTION
C
lick this button to open a screen where you c a n s av e the certificate of a ce r ti fic a tio nImport Certific at e
authority that you trust to the Zyxel Device.
This is the index number of the entry.#
This field displays th e name used to identify this certifica te .Name
This field displays in for m at ion that identifies th e owner of the certific at e, suc h as CommonSubject
Name (CN), OU (Organi za ti onal U ni t or depa rtm ent) , Organ iz ati on (O), St ate ( S T) an d Co unt ry
(C). It is recomm ended that each cer t ificate have a un ique subject information.
This field displays general information about the certificate.Typeca means that a Certifi c at io n
Authority s ig ned the certifi c at e .
M
odify
Cl
ick the View icon to open a screen with an in-depth list of information about the certificate
(or certificatio n r equest).
Click the Remove icon to delete the certificate (or certification request). You cannot delete a
certificate that one or more features is configured to use.
LTE7461-M602 User’s Guide
125
Page 18
Chapter 13 Certificates
13.4 Import Trusted CA Certificate
Click ImportCertificate in the Trusted CA screen to open the Import Certificate screen. The Zyxel Device
trusts any valid certificate signed by any of the imported trusted CA certificates. Certificates should be in
one of the following formats: B inary X.509, PEM (b ase-64) encoded, Binary PKCS#7, or PEM (base-64)
encoded PKCS#7. You can save a trusted certification authority’s certificate to the Zyxel Device.
ote: You must remove any spaces from the certificate’s filename before you can import the
N
certificate.
Figure 95 Trusted CA > Import
The following table describes the labels in this screen.
Table 53 Security > Certificates > Trusted CA > Import
LABELDESCRIPTION
ertificate File
C
Path
Type in the location of the file you wan t to upload in this field or click Choose File to find it.
Click this button to find the certif icate file you want to upload.Choose File
Click this to sav e the certificate on th e Z y xe l Device.OK
Click this to exit this screen without saving.Cancel
13.5 View Trusted CA Certificate
View in-depth information about the certification authority’s certificate. The certificate text box is readonly and can be distributed to others.
Click Security > Certificates > Trusted CA to open the Trusted CA screen. Click the View icon to open th e
View Certificate screen.
LTE7461-M602 User’s Guide
126
Page 19
Figure 96 Trusted CA: View
Chapter 13 Certificates
The following table describes the labels in this screen.
Table 54 Trusted CA: View
LABELDESCRIPTION
ameThis field displays the identifying name of this certificate.
N
This read-only text box displays the certificate or certification request in Privacy Enhanced
Mail (PEM) for m at. PEM uses 64 ASC II characters to co nv ert the binary ce rtificate into a
printable form.
You can copy and paste the certificate into an email to send to friends or colleagues or you
can copy and past e the certificate into a text editor and save the fi le on a management
computer for later distribution (via USB thumb drive for example).
BackClick this to return to the previous screen.
13.6 Certificates Technical Reference
This section provides some technical background information about the topics covered in this chapter.
Certification Authorities
A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner.
There are commercial certification authorities like CyberTrust or VeriSign and government certification
authorities.
LTE7461-M602 User’s Guide
127
Page 20
Chapter 13 Certificates
Public and Private Keys
When using public-key cryptology for authentication, eac h host has two keys. One key is public and can
be made openly available; the other key is private and must be kept secure. Public-key encryption in
general works as follows.
1Tim wants to send a private message to Jenny. Tim generates a public-private key pair. What is
encrypted with one key can only be decrypted using th e other.
2Tim keeps the private key and makes the public key openly available.
3Tim uses his private key to encrypt the message and se nds it to Jenny.
4Jenny receives the message and uses Tim’s public key to decrypt it.
5Additionally, Jenny uses her own private key to encrypt a message and Tim uses Jenny’s public key to
decrypt the message.
The Zyxel Device uses certificates based on public-key cryptology to authenticate users attempting to
establish a connection. The method used to secure the data that you send through an established
connection depends on the type of connection. For example, a VPN tunnel might use the triple DES
encryption a l go r i thm.
The certification authority uses its private key to sign certificates. Anyone can then use the certification
authority’s public key to verify the certificates.
Advantages of Certificates
Certificates offer the following benefits.
• The Zyxel Device only has to store the certificates of the certification authorities that you decide to
• Key distribution is simple and very secure since you can freely distribute public keys and you never
Certificate File Format
The certification authority certificate that you want to import has to be in PEM (Base-64) encoded X.509
file format. This Privacy Enhanced Mail format uses 64 ASCII characters to convert a binary X.509
certificate into a printable form.
13.6.1 Ve
Before you import a trusted CA or trusted remote host certificate into the Zyxel Device, you should verify
that you have the actual certificate. This is especially true of trusted CA certificates since the Zyxel
Device also trusts any valid certificate signed by any of the imported trusted CA certificates.
trust, no matter how many de vices you need to authenticate.
need to transmit private keys.
rifying a Certificate
You can use a certificate’s fingerprint to verify it. A certificate’s fingerprint is a message digest
calculated using the MD5 or SHA1 algorithms. The following procedure describes how to check a
certificate’s fingerprint to verify that you have the actual certificate.
1Browse to where you have the certificate saved on your computer.
LTE7461-M602 User’s Guide
128
Page 21
Chapter 13 Certificates
2Make sure that the certificate has a “.cer” or “.crt” file name extension.
Figure 97 Certificates on Your Computer
3Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down
to the Thumbprint Algorithm and Thumbprint fields.
Figure 98 Certificate Details
Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may vary based on your situation. Possible
examples would be over the telephone or thr oug h an HTT PS conne ct ion.
LTE7461-M602 User’s Guide
129
Page 22
14.1 Log Overview
These screens allow you to determine the categories of events and/or alerts that the Zyxel Device logs
and then display these logs or have the Zyxel Device send them to an administrator (through email) or
to a syslog server.
C
HAPTER
14
Log
14.1.1 Wh
• Use the System Log screen to see the system logs (Section 14.2 on page 131).
• Use the Security Log screen to see the security-related logs for the categories that you select (Section
14.1.2 Wh
The following terms and concepts may help as you read th is chapter.
Alerts and Logs
An alert is a type of log that warrants more serious attention. They include system errors, attacks (access
control) and attempted access to blocked web sites. Some categories such as System Errors consist of
both logs and alerts. You may differentiate them by their color in the View Log screen. Alerts display in
red and logs display in black.
Syslog Overview
The syslog protocol allows devices to send event notification messages across an IP network to syslog
servers that collect the event messages. A syslog-enabled device can generate a syslog message and
send it to a syslog server.
at You Can Do in this Chapter
14.3 on page 131).
at You Need To Know
Syslog is defined in RFC 3164. The RFC defines the packet format, content and system log related
information of syslog messages. Each syslog message has a facility and severity level. The syslog facility
identifies a file in the syslog server. Refer to the documentation of your syslog program for details. The
following table describes the syslog severity levels.
Table 55 Syslog Severity Levels
CODESEVERITY
0E
1Alert: Action mu st be tak e n im mediately.
2Critical: Th e sys tem condition is cr itical.
3Error: There is an error condition on th e system.
4Warning: There is a warning co ndition on the sys t em .
mergency: The system is unusable.
LTE7461-M602 User’s Guide
130
Page 23
Chapter 14 Log
Table 55 Syslog Severity Levels
CODESEVERITY
5N
6Informational: The syslog contains an informational message.
7Debug: The message is intended for de bu g-level purp oses.
otice: There is a normal but significant condition on the system.
14.2 The System Log Screen
Export or email the system logs. You can filter the entries by clicking the Level and/or Category dropdown list boxes. Click System Monitor > Log to open the System Log screen.
Figure 99 System Monitor > Log > System Log
The following table describes the fields in this screen.
Table 56 System Monitor > Log > System Log
LABELDESCRIPTION
LevelSelect a severity level from the drop-down list box. This filters sear ch results according to the
tegory
Ca
ear Log
Cl
Re
fresh
Exp
ort Log
Email Log NowClick this to send the log file(s) to the email address you specify in the Maintenance > Logs
#Thi
Ti
me
CategoryThis fiel d displays the type of the log.
ssages
Me
severity level you have selected. When you select a severity, the Zyxel Device searches through
all logs of that severity or higher.
elect the type of logs to display.
S
lick this to delete all the logs.
C
C
lick this to renew the log screen.
C
lick this to export the selected log(s).
Setting screen.
s field is a seq uential value and is not associated with a specif ic entry.
Thi
s field displays the time the log was recorded.
The log facility allows you to send logs to dif ferent files in the syslog server. Refer to theFacility
documentation of y our syslog progra m for more details.
This field displays the severity level of the logLevelthat the devic e is to se n d to this syslog serv er.
his field states the reason for the log.
T
14.3 Th
View the security-related logs for t he categ ories that you select . You can filt er the entr ies by click ing the
Level and/or Category drop-down list boxes. Click System Monitor > Log> Security Log to open the
following screen.
e Security Log Screen
LTE7461-M602 User’s Guide
131
Page 24
Chapter 14 Log
Figure 100 System Monitor > Log > Security Log
The following table describes the fields in this screen.
Table 57 System Monitor > Log > Security Log
LABELDESCRIPTION
Le
vel
Ca
tegory
Clear LogClick this to delete all the logs.
fresh
Re
ort Log
Exp
Em
ail Log Now
#Thi
me
Ti
Ca
tegory
Me
ssages
S
elect a severit y level from the drop-down list box. This filters sear ch results according to the
severity level you have selected. When you select a severity, the Zyxel Device searches through
all logs of that severity or higher.
S
elect the type of logs to display.
lick this to renew the log screen.
C
lick this to export the selected log(s).
C
C
lick this to send the log file(s) to the email address you specify in the Maintenance > Logs
Setting screen.
s field is a seq uential value and is not associated with a specif ic entry.
s field displays the time the log was recorded.
Thi
The log facility allows you to send logs to dif ferent files in the syslog server. Refer to theFacility
documentation of y our syslog progra m for more details.
This field displays the severity level of the logLevelthat the devic e is to se n d to this syslog serv er.
Thi
s field displays the type of the log.
T
his field states the reason for the log.
LTE7461-M602 User’s Guide
132
Page 25
15.1 Traffic Status Overview
View the network traffic status and statistics of the WAN/LAN interfaces.
C
HAPTER
15
Traffic Status
15.1.1 Wh
at You Can Do in this Chapter
• Use the WAN screen to view the WAN traffic statistics (Section 15.2 on page 133).
• Use the LAN screen to view the LAN traffic statistics (Section 15.3 on page 134).
15.2 The WAN Status Screen
Click System Monitor > Traffic Status to open the WAN screen. The figures in this screen show the number
of bytes received and sent through the Zyxel Device. Detailed information about each interface are
listed in the tables below.
Figure 101 System Monitor > Traffic Status > WAN
The following table describes the fields in this screen.
Table 58 System Monitor > Traffic Status > WAN
LABELDESCRIPTION
fresh IntervalSelect how often you want the Zyxel De vice to update this screen.
Re
Co
nnected
Interface
ckets Sent
Pa
Thi
s shows the name of the WAN inter f ace that is currently connected.
LTE7461-M602 User’s Guide
133
Page 26
Chapter 15 Traffic Status
Table 58 System Monitor > Traffic Status > WAN (continued)
LABELDESCRIPTION
Da
ta
Er
ror
DropThis indicates the number of outgoing packets dropped on this interface.
ackets Received
P
ta
Da
Er
ror
sabled
Di
Interface
Pa
ckets Sent
DataThis indicates the number of transmitted pac kets on this interfa ce.
ror
Er
op
Dr
P
ackets Received
Da
ta
ErrorThis indicates the number of frames with errors receive d on this interface.
T
his indicates the n umber of transmitt e d pa c kets on this interfa ce.
Thi
s indicates the number of frames with errors transmitted on this interface.
his indicates the n umber of received pac k et s on th is in terface.
T
T
his indicates the number of frames with errors received on this interface.
This indicate s the n umber of received pac k et s dropped on this interf a c e.Drop
s shows the name of the WAN interface that is currently disabled.
Thi
s indicates the number of frames with errors transmitted on this interface.
Thi
s indicates the number of outgoing packets dropped on this interface.
Thi
T
his indicates the n umber of received pac k et s on th is in terface.
his indicates the n umber of received pac k et s dropped on this interface.Drop
T
15.3 The LAN Status Screen
Click System Monitor > Traffic Status> LAN to open the following screen. The figures in this screen show
the number of bytes received and sent from each LAN port and wireless network.
Figure 102 System Monitor > Traffic Status > LAN
LTE7461-M602 User’s Guide
134
Page 27
Chapter 15 Traffic Status
The following table describes the fields in this screen.
Table 59 System Monitor > Traffic Status > LAN
LABELDESCRIPTION
Re
fresh Interval
In
terface
Bytes SentThis indicat es the number of bytes transmitted on this interface.
tes ReceivedThis indicates the number of bytes received on this interface.
By
terface
In
Se
nt (Packets)
Da
ta
ErrorThis indicat es the number of frame s with errors transmitted on this inter face.
op
Dr
Re
ceived (Packets)
Da
ta
ErrorThis indicates the number of frames with errors received on this interface.
opThis indicates the number of re ceived packets dr opped on this inte rface.
Dr
S
elect how often you want the Zyxel Devi c e to update this screen.
Th
is shows the LAN or WLAN interface.
is shows the LAN or WLAN interfaces.
Th
T
his indicates the numbe r of transmitted packets on this interface.
his indicates the number of outgoing packets dropped on this interfac e.
T
T
his indicates the number of rec eived packets on th is interface .
LTE7461-M602 User’s Guide
135
Page 28
16.1 ARP Table Overview
Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address (IP address) to
a physical machine address, also known as a Media Access Control or MAC address, on the local area
network.
An IP (version 4) address is 32 bits long. In an Ethernet LAN, MAC addresses are 48 bits long. The ARP
table maintains an association between each MAC address and its corresponding IP address.
C
HAPTER
16
ARP Table
16.1.1 How
When an incoming packet destined for a host device on a local area network arrives at the device, the
device's ARP program looks in the ARP table and, if it finds the address, sends it to the device.
If no entry is found for the IP address, ARP broadcasts the request to all the devices on th e LAN. The
device fills in its own MAC and IP address in the sender address fields, and puts the known IP address of
the target in the target IP address field. In addition, the device puts all ones in the target MAC field
(FF.FF.FF.FF.FF.FF is the Ethernet broadcast address). The replying device (which is either the IP address of
the device being sought or the router that knows the way) replaces the broadcast address with the
target's MAC address, swaps the sender and target pairs, and unicasts the answer dire ctly back to the
requesting machine. ARP updates the ARP table for future reference and then sends the packet to the
MAC address that replied.
ARP Works
LTE7461-M602 User’s Guide
136
Page 29
16.2 ARP Table Screen
Use the ARP table to view the IPv4-to-MAC address mapping(s) for the LAN. The neighbor table shows
the IPv6-to-MAC address mappin g(s) of each neig hbor. To op en t his screen, click System Monitor > ARP
Table.
Figure 103 System Monitor > ARP Table
Chapter 16 ARP Table
The following table describes the labels in this screen.
Table 60 System Monitor > ARP Table
LABELDESCRIPTION
#This is the ARP table entry number.
IPv4/IPv6
Address
DeviceThis is the type of interface us ed by th e device. You can clic k th e device type to go to it s
This is the learned IPv4 or IPv 6 IP ad dr e ss of a de v ic e connected to a port.
This is the MAC address of the device with the listed IP address.MAC Address
configuratio n s creen.
LTE7461-M602 User’s Guide
137
Page 30
17.1 Routing Table Overview
Routing is based on the destination address only and the Zyxel Device takes the shortest path to forward
a packet.
17.2 The Routing Table Screen
The table below shows IPv4 and IPv6 routing information. The destination can be a network or host. The
IPv4 subnet mask is ‘255.255.255.255’ for a host destination and ‘0.0.0.0’ for the default route. The
gateway address is written as ‘*’(IPv4)/‘::’(IPv6) if none is set. Flags can be U - up, ! - reject, G - gateway,
C - cache, H - host, R - rein stat e, D - dynamic (redirect), or M - m odif i ed ( red ire ct). Met ric is t he dist a nce
to the target (usually counted in hops). Interface is how the packets for this route will be sent.
C
HAPTER
17
Routing Table
LTE7461-M602 User’s Guide
138
Page 31
Chapter 17 Routing Table
Click System Monitor > Routing Table to open the following screen.
Figure 104 System Monitor > Routing Table
The following table describes the labels in this screen.
Table 61 System Monitor > Routing Table
LABELDESCRIPTION
Pv4/IPv6 Routing Table
I
This indicates the destination IPv4 address or IPv6 address and prefix of this route.Destination
This indicates the IPv4 address or IPv6 ad dr ess of the gateway th at he lp s fo rward this route’sGa teway
traffic.
This indicates th e destination subn et ma s k of the IPv4 route.Subnet Mask
LTE7461-M602 User’s Guide
139
Page 32
Chapter 17 Routing Table
Table 61 System Monitor > Routing Table (continued)
LABELDESCRIPTION
Fl
agThis indicates the route stat us .
U-Up: The route is up.
!-Reject: The route is blocked and will force a route lookup to fail.
G-Gateway: The route uses a gateway to for ward traffi c.
H-Host: The target of the route is a host.
R-Reinstate: The route is reinstated for dynamic routing.
D-Dynamic (r ed i rect): The route is dynamically installed by a ro uting daemon or redirect.
M-Modified (redirect): The route is modified from a routing daemon or r edirect.
MetricThe metric represents the "cost of transmission." A router determines the best route for
transmission by choosing a path with the lowest "cost." The smaller the number, the lower the
"cost."
This indicates the name of the inte rface through which the route is f or warded.Interface
LTE7461-M602 User’s Guide
140
Page 33
C
Cellular WAN Status
18.1 Cellular WAN Status Overview
View the LTE connection details a nd WiFi signal strength value that you can use as reference for
positioning the Zyxel Device, as well as SIM card and module information.
18.2 The Cellular WAN Status Screen
To open this screen, click System Monitor > Cellular WAN Status. Cellular information is available on this
screen only when you insert a valid SIM card in the Zyxel Device.
HAPTER
18
LTE7461-M602 User’s Guide
141
Page 34
Chapter 18 Cellular WAN Status
Figure 105 System Monitor > Cellular WAN Status
The following table describes the labels in this screen.
Table 62 System Monitor > Cellular WAN Status
LABELDESCRIPTION
S
elect the time in te r val the Zyxel DeviceRefresh Inte r v alwill check and refresh the fields shown on this screen.
Select None to stop detection.
Module Information
This shows the International Mobile Equipment Identity of the Zyxel Device.IMEI
Module SW
Version
SIM Status
This shows the software version of the Zyxel Device.
LTE7461-M602 User’s Guide
142
Page 35
Chapter 18 Cellular WAN Status
Table 62 System Monitor > Cellular WAN Status (continued)
LABELDESCRIPTION
T
his displays the SIM card status:SIM Card Stat us
None - the Zyxel Device does not detect that there is a SIM card inserted.
Available - the SIM card could either have or doesn’t have PIN code security.
Locked - the SIM card has PIN co de security, but you did not enter the PIN code yet.
Blocked - you enter ed an incorrect PIN code too many times, so the SIM card has been locke d;
call the ISP for a PUK (Pin Unlock Key) to unlock the SIM card.
Error - the Zyxel Device detected that the SIM card has erro rs.
This displays the Intern ational Mobile Subscriber Identity (IM SI ) of the ins t alled SIM card. An IMSI isIMSI
a unique ID used to iden ti fy a mo bi le s ub scriber in a mobile netw or k .
I
ICCID
PIN Protection
PIN Remaining
Attempts
IP Passthrough Status
Access
Technology
ntegrated Ci rc ui t C ar d I dentifier (ICCID). This is the serial number of the SIM card.
A
PIN (Personal Identification Numbe r) code is a key to a SIM card. Without the PIN code, you
cannot use the SIM card.
Shows Enable if the service provid er r equires you to enter a PIN to us e the SIM card.
Shows Disable if the service provider lets yo u use the SIM without inputting a PI N.
Th
is is how many more times you can try to enter the PIN code befor e the ISP blocks your SIM
card.
This displays the status of the cellular Internet connection.Cellular Status
This displays if da ta roaming is enabled on the Zyxel De vic e.Data Roaming
4G roaming is to use your Zyxel Device in an area which is not covered by your service provider.
Enable roaming to ens ure tha t your Zyxe l Devic e is kept conne cted to th e Int ernet when you are
traveling outside the geographical coverage ar ea of the network to which you ar e registered.
This displays the name of the service provider.Operator
This displays the PLM N number.PLMN
This displ ays the ty pe of t he m obi le netw ork ( suc h a s LT E, U MTS, G SM) t o w hi ch th e Z yxe l Devi c e is
connecting.
This displays the current LTE band of your Zyxel Device (WCDMA2100).Band
This displays the strength of the WiFi signal between an associated wireless station and an AP.RSSI
The normal range is -30dBm to -79dBm. If the value drops below -80dBm, try moving the
associated wireless station closer to the Zyxel Device to get better signal strength.
This shows the cell ID , wh ic h is a un iq ue number used to identify the Base Tra ns ceiver Station toCell ID
which the Zyxel Device is connecting.
The value depen ds on the Current Ac cess Technolog y :
• For GPRS, it is the Cell Identity as specified in 3GPP-TS.25.331.
• For UMTS, it is the Cell Identity as defined in SIB3 3GPP-TS.25.331, 3GPP-TS.24.008.
• For LTE, it is the 28-bit binary number Cell Identity as specifi ed in SIB1 in 3GPP-TS.36.331.
The value is ‘0’ (zero) or ‘N/A’ if there is no network connection.
LTE7461-M602 User’s Guide
143
Page 36
Chapter 18 Cellular WAN Status
Table 62 System Monitor > Cellular WAN Status (continued)
LABELDESCRIPTION
R
FCNThis displays the Radio Frequen cy Ch anne l Number of DL carrier frequency used by the mo bi le
RSRPThis displays the Reference Sign al Recei ve Pow er (R SRP ), whi ch is the avera g e received power
RSRQThis displays the Re fer ence Si gnal Recei ve Qual ity (RSRQ), whic h is th e rat io of R SRP to the E-UTRA
network to which the Zyxel Device is connecting.
The value depen ds on the Current Ac cess Technolog y :
• For GPRS, it is the ARFCN (Absolute Radio-Frequency Channel Number) as specified in 3GPP-
TS.45.005.
• For UMTS, it is the UARFCN (UTRA Absolute Radio-Frequency Channel Number) as specified in
3GPP-TS.25.101.
• For LTE, it is the EARFCN (E-UTRA Absolute Ra dio-Frequency Channel Number) as specifie d in
3GPP-TS.36.101.
The value is ‘0’ (zero) or ‘N/A’ if there is no network connection.
of all Resource Element (RE) that carry cell-specific Reference Signals (RS) within the specified
bandwidth.
The received RSRP level of the connected E-UTRA cell, in dBm, is as specified in 3GPP-TS.36.214.
The reporting range is specified in 3GPP-TS.36.133.
An undetectable signal is indicated by the lower limit, example -140 dBm.
This parameter is for LTE only. The normal range is -30 to -140. The value is -140 if the Current
Access Techno logy is not LTE. The va lu e is ‘N /A ’ if ther e is no network connection.
carrier RSSI and indicates the quality of the received reference signal.
The received RSRQ level of the connected E-UTRA cell, in 0.1 dB, is as specified in 3GPP-TS.36.214.
An undetectable signal is indicated by the lower limit, example -240.
This parameter is for LTE only. The normal range is -30 to -240. The value is -240 if the Current
Access Techno logy is not LTE. The va lu e is ‘N /A ’ if ther e is no network connection.
RSCPThis displays the Received Signal Code Power, which measures the power of channel used by
the Zyxel Device.
The received signal level, in dBm, is of the CPICH channel (Ref. 3GPP TS 25.133). An
undetectable signal is indicated by the lower limit, example -120 dBm.
This parameter is for UMTS only. The normal range is -30 to -120. The value is -120 if the Current
Access Technology is not UMTS. The value is ‘N/A’ if there is no network connection.
EcNoThis displays the ratio (in dB) of the received en erg y per chip an d th e in terferen ce level.
The measured EcNo is in 0.1 dB and is received in the downlink pilot channel. An undetectable
signal is indicated by the lower limit, example -240 dB.
This parameter is for UMTS only. The normal range is -30 to -240. The value is -240 if the Current
Access Technology is not UMTS or there is no network connection.
TACThis displays the Tracking Area Code (TAC), which is used to identify the country of a mobile
LACThis displays the 2-octet Location Area Code (LAC), which is used to identify a location are a
subscriber.
The physical cell ID of the connected E-UTRAN cell, is as specified in 3GPP-TS.36.101.
This parameter is for LTE only. The value is ‘0’ (zero) or ‘N/A’ if the Current Access Technology is
not LTE or there is no network connection.
within a PLMN.
The LAC of the connected cell is as defined in SIB 1 [3GPP-TS.25.331]. The concatenation of
PLMN ID (MCC+MNC) and LAC uniquely identifies the LAI (Location Area ID) [3GPP-TS.23.003].
This parameter is for UMTS or GPRS. Th e v alue is ‘0’ (zero) if the Current Acce s s Technology is not
UMTS or GPRS. The value is ‘N/A’ if there is no network connection.
LTE7461-M602 User’s Guide
144
Page 37
Chapter 18 Cellular WAN Status
Table 62 System Monitor > Cellular WAN Status (continued)
LABELDESCRIPTION
RA
C
This displays the RAC (Routing Area Code), which is used in mobile network “packet domain
service” (PS) to identify a routing area within a location area.
In a mobile network, it uses LAC (Locati on Area Code) to identif y the geographical location for
the old 3G voice only s er vice , an d use RAC to id en tif y the loca ti on of dat a s erv ice li ke HSD PA or
LTE.
The RAC of the connected UTRAN cell is as defined in SIB 1 [3GPP-TS.25.331]. The concatenation
of PLMN ID (MCC+MNC), LAC, and RAC uniquely identifies the RAI (Routing Area ID) [3GPPTS.23.003].
This parameter is for UMTS or GPRS. Th e v alue is ‘0’ (zero) if the Current Acce s s Technology is not
UMTS or GPRS. The value is ‘N/A’ if there is no network connection.
The Base Station Iden t ity Cod e (B S IC ) , wh ic h is a co de us e d in GSM to uniquely ident ify a bas eBSIC
station.
This parameter is for GPRS only. The value is ‘0’ ( zero) if the Current Access Technology is not
GPRS. The value is ‘N/A’ if there is no network connection.
LTE7461-M602 User’s Guide
145
Page 38
19.1 System Overview
Give a name to your Zyxel Device (host) and an associated domain name for identification purposes.
19.2 The System Screen
Click Maintenance > System to open the following screen. Assign a unique name so it can be easily
recognized on your network. You can use up to 30 characters , including spaces.
Figure 106 Maintenance > System
C
HAPTER
System
19
The following table describes the labels in this screen.
Table 63 Maintenance > System
LABELDESCRIPTION
st Name
Ho
Do
main NameType a Domain name for your host Zyxel Device.
CancelClick Cancel to abandon this screen without saving.
ply
Ap
ype a host name for your Zyxel Device.
T
characters, not including spaces, underscores, and dashes.
ick Apply to save your changes.
Cl
LTE7461-M602 User’s Guide
nter a descriptive name of up to 16 alphanu meric
E
146
Page 39
Chapter 20 User Account
20.1 User Account Overview
View the settings of the “admin” and other user accounts that you use to log into the Zyxel Device.
20.2 The User Account Screen
Click Maintenance > User Account to ope n the following screen. Create or manage user accounts and
their privileges on the Zyxel Device.
Figure 107 Maintenance > User Account
C
HAPTER
20
User Account
The following table describes the labels in this screen.
Table 64 Maintenance > User Account
LABELDESCRIPTION
A
dd New
Account
#T
Ac
tive
Us
er Name
Re
try Times
le Timeout
Id
Cli
ck this button to add a new use r account (up to 4 Administrator accounts and 4 User
accounts).
his is the index number .
Th
is indicates whether the user account is active or not.
The check box is selected when the user account is enabled. It is cleared when it is disabled.
Th
is displays the name of the acc ount used to log into the Zyxel Devic e Web Configurator.
Th
is displays th e nu mb er of ti mes c ons ecu ti ve wr ong pass wor d s ca n be e n ter ed f o r th is a ccoun t.
0 means there is no lim it .
is displays the length of ina c tive time before the Zyxel Device will automatically log the user
Th
out of the Web Configur ator.
LTE7461-M602 User’s Guide
147
Page 40
Chapter 20 User Account
Table 64 Maintenance > User Account (continued)
LABELDESCRIPTION
Lock
Period
up
Gro
M
odify
ncelCl ick Cancel to restore your previously saved settings.
Ca
Ap
plyClick Apply to save your changes.
T
his field displays the length of time a user must wait before attempting to log in again after a
number of consecutive wrong pas swords have been entered as defined in Retry Times .
his field displays whether this user has Administrator or User privileges.
T
Cl
ick the Edit icon to configure the entry.
Click the Delete icon to remove the entry.
20.2.1 The Us
Add or change the name of the user account, set the security password and the retry times, and
whether this user will have Administrator or User privileges.
existing account in the Maintenance > User Account to open the following screen.
Figure 108 Maintenance > User Account > Add/Edit
er Account Add/Edit Screen
Click Add New Account or the Edit icon of an
The following table describes the labels in this screen.
Table 65 Maintenance > User Account > Add/Edit
LABELDESCRIPTION
Ac
tive
Us
er Name
assword
P
erify PasswordType the new passwor d again for confi rmation.
V
Cli
ck to enable (switch turns blue) or disable (switch turns gray) to activate or deactivate the
user account.
Ent
er a new name f or the acco unt ( up to 15 cha racte rs) . Sp ecial cha ract ers are al low ed exce pt
the following: do uble quot e (") bac k quot e (`) apo stro phe or si ngle quo te (') less th an (<) greate r
than (>) caret or circumflex accent (^) dollar sign ($) vertical bar (|) ampersand (&) semicolon
(;)
ype your new system password (up to 256 characters). Note that as you type a password, the
T
screen displays a (*) for each character you type. After you change the password, use the new
password to access the Zyxel Device.
LTE7461-M602 User’s Guide
148
Page 41
Chapter 20 User Account
Table 65 Maintenance > User Account > Add/Edit (continued) (continued)
LABELDESCRIPTION
Re
try Times
le Timeout
Id
Lock PeriodEnter the length of time a user must wait before attempting to log in again af ter a number of
Gro
up
ncelCl ick Cancel to restore your previously saved settings.
Ca
OKCli
Ent
er the number of times consecutive wrong passwords can be entered for this account. 0
means there is no limit.
er the length of in active ti me bef ore the Zy xel Devic e will aut omatica lly log the use r out of the
Ent
Web Configurator.
consecutive wro n g pa ss words have been entered as defined in Retry Times.
Sp
ecify whether this user will have Administrator or User privileges.
The Adminis trator privileges are the following:
• Quick Start setup.
• The following screens are visible for setup:
Broadband, Wireless, Home Networking, Routing, NAT, DNS, Firewall, MAC Filter, Certificates,
Log, Traffic Status, ARP Table, Routing Table, Cellular WAN Status, System, User Account,
Remote Managemen t, TR-069 Client, Time, Email Notification, Log Setting, Firmware Upgr ade,
Backup/Restore, Reboot, Diagnostic.
The User privileges are the following:
• The following screens are visible for setup:
Log, Traffic Status, ARP Table, Routing Table, Cellular WAN Status, User Account, Remote
Management, Time, Email Notification, Log Setting, Firmware Upgrade, Backup/Restore,
Reboot, Diagnostic.
ck OK to save your changes.
LTE7461-M602 User’s Guide
149
Page 42
Remote Management
21.1 Overview
Remote management controls through which interface(s), which web services (such as HTTP, HTTPS, FTP,
Telnet, SSH and Ping) can access the Zyxel Device.
N
ote: The Zyxel Device is managed using the Web Configurator.
21.2 The MGMT Services Screen
Configure which interface(s) you can use to access the Zyxel Device for a given service. You can also
specify the service port numbers computers must use to connect to the Zyxel Device. Click
Maintenance > Remote Management to open the fol lowing scre en.
C
HAPTER
21
Figure 109 Maintenance > Remote Management
LTE7461-M602 User’s Guide
150
Page 43
Chapter 21 Remote Man agement
The following table describes the fields in this screen.
Table 66 Maintenance > Remote Management
LABELDESCRIPTION
WA
N Interface
used for services
rviceThis is the service you may use to access the Zyxel Device.
Se
AN/WLAN
L
WANSelect the Enable check box for the corresponding services t hat you w ant to al low acce ss to the
Tr
ust Domain
rt
Po
ply
Ap
ncelClick Cancel to restore your previously saved settings.
Ca
Select Any_WAN to have the Zyxel Device automatically activa te the remote management
service when any WAN connection is up.
Select Multi_WAN and then select one or more WAN connections to have the Zyxel Device
activate the remote management service when the selected WAN connections are up.
Enable the LTE WAN connection configured inCellular WAN
WAN to access the service on the
ect the Enable check box for the correspond ing serv ices that you wan t to all ow acce ss to the
Sel
Zyxel Device from the LAN/WLAN.
Zyxel Device from all WAN connect io n s.
Sel
ect the Enable check box for the correspond ing serv ices that you wan t to all ow acce ss to the
Zyxel Device from the trusted host IP address.
u may change the server port number for a service if needed , howe ver you mu st use the
Yo
same port number in order to use that service for remote management.
ick Apply to save your changes back to the Zyxel Device.
Cl
Zyxel Device
Network Setting > Broadband > Cellular
.
21.3 The MGMT Services for IP Passthrough Screen
Configure which interface(s) you can use to access the Zyxel Device in IP Passthrough mode (bridge
mode) for a given service. You can also specify the service port numbers computers must use to
connect to the Zyxel Device. IP Passthrough allows Internet traffic to go to a LAN computer behind the
Zyxel Device without going through NAT. Make sure to enable IP Passthrough in Network Setting >
Broadband > Cellular IPPassthrough. See Section 5.6 on page 40 for details.
Click Maintenance > Remote Management> MGMT Services for IP Passthrough to open the following
screen.
LTE7461-M602 User’s Guide
151
Page 44
Chapter 21 Remote Management
Figure 110 Maintenance > Remote Management > MGMT Services for IP Passthrough
The following table describes the fields in this screen.
Table 67 Maintenance > Remote Management > MGMT Services for IP Passthrough
LABELDESCRIPTION
rviceThis is the service you may use to access the Zyxel Device.
Se
WA
N
rt
Po
ApplyClick Apply to save your changes back to the Zyxel Device.
ncelClick Cancel to restore your previously saved settings.
Ca
Sel
ect the Enable check box for the correspond ing serv ices that you wan t to all ow acce ss to the
Zyxel Device from all WAN connect io n s.
u may change the server port number for a service if needed , howe ver you mu st use the
Yo
same port number in order to use that service for remote management.
21.4 The Trust Domain Screen
View a list of public IP addresses which you want to allow access to the Zyxel Device through the
services configured in this screen. Click Maintenance > Remote Management > Trust Domain to open
the following screen.
N
ote: If this list is empty, all public IP addresses can access the Zyxel Device from the WAN
The following table describes the fields in this screen.
Table 68 Maintenance > Remote Management > Trust Domain
LABELDESCRIPTION
A
dd Trust
Domain
eleteClick the Delete icon to remove the trus ted host IP addr es s .
D
Click this to add a tr u s te d ho s t I P ad dress.
This field show s a trusted host IP address.IP Address
21.5 The Add Trust Domain Screen
Configure a public IP address which you want to allow access to the Zyxel Device. Click the Add Trust
Domain button in the Maintenance > Remote Management > Trust Domain screen to open t he follow ing
The following table describes the fields in this screen.
Table 69 Maintenance > Remote Management > Trust Domain > Add Trust Domain
LABELDESCRIPTION
P Address
I
OKClick OK to save your changes back to the Zyxel Device.
ncelClick Cancel to restore your previously saved settings.
Ca
Enter a public IPv4/IPv 6 IP ad dr e ss w h ich is allowed to acces s th e se r vic e on th e Z yxel Device
from the WAN.
LTE7461-M602 User’s Guide
153
Page 46
22.1 Overview
This chapter explains how to configure the Zyxel Device’s TR-069 auto-confi guration settings.
22.2 The TR-069 Client Screen
TR-069 defi nes how Custo mer Premise Equipment (CP E), for example your Zyxel Device, can be
managed over the WAN by an Auto Configuration Server (ACS). TR-069 is based on sending Remote
Procedure Calls (RPCs) between an ACS and a client device. RPCs are sent in Extensible Markup
Language (XML) format over HTTP or HTTPS.
An administrat or ca n us e an ACS to remotely se t up t he Zy x el Device, modify settings, perform fi rm wa re
upgrades as well as monitor and diagnose the Zyxel Device . You have to enable the device to be
managed by the ACS and specify the ACS IP address or domain name and username and password.
C
HAPTER
22
TR-069 Client
Allow your Zyxel Device to be managed remotely by an Auto Configuration Server (ACS) using TR-069.
Click Maintenance > TR-069 Client to open the following screen .
LTE7461-M602 User’s Guide
155
Page 47
Chapter 22 TR-069 Client
Figure 113 Maintenance > TR-069 Client
The following table describes the fields in this screen.
Table 70 Maintenance > TR-069 Client
LABELDESCRIPTION
CPE WAN Management Protocol (CWMP) enables the Zyxel Device to be remotely configuredCWMP Active
via a WAN link. Comm unication betwee n th e Z y xe l Device and the manage m ent server is
conducted via SOAP/HTTP(S) in the form of remote procedure calls (RPC).
Click to enable (switch turns blue) to allow the Zyxel Device to be managed by a management
server. Otherwise, clic k to disab le (switch tu rns gray) to disallo w the Zyxel Devi ce to be managed
by a management server.
Click to enable (switch turns blue)Inform the Zyxel Device to send periodic inform via TR-069 on the
WAN. Otherwise, click to di sable (switch turns gray).
In
form Interval
Protocol
IP
S URL
AC
E
nter the time interval (in seconds) at which the Zyxel Device sends information to the auto-
configuration server.
ect the type of IP protocol to allow TR-069 to operate on.
Sel
ter the URL or IP address of the auto-configuration server.
En
En
ter the TR-069 user name for authentication with the auto-configuration server.ACS User Name
LTE7461-M602 User’s Guide
156
Page 48
Chapter 22 TR-069 Client
Table 70 Maintenance > TR-069 Client (continued)
LABELDESCRIPTION
E
nter the TR-0 69 password for au thenticatio n w ith the auto-co n figuration serv er.ACS Passwo rd
WAN Interface
used by TR-069
client
splay SOAP
Di
messages on
serial console
nnection
Co
Request
Authentication
nnection
Co
Request User
Name
Co
nnection
Request
Password
Connection
Request URL
Validate ACS
Certificate
Local certificate
used by TR-069
client
ApplyClick Apply to save your changes.
CancelClick Cancel to restore the screen’s last saved settings.
Select a WAN interface through which the TR-069 traffic passes.
If you select Any_WAN, the Zyxel Device automatically passes the TR-069 traffic when any WAN
connection is up.
If you select Multi_WAN, you also need to select two or more pre-configured WAN interfaces. The
Zyxel Device automatically passes the TR-069 traffic when one of the selected WAN connections
is up.
The Zyxel Device automatically passes the TR-069 traffic when cellular WAN connection is upCellular WAN
Click to enable (switch turns blue) the dumping of all SOAP messages during the ACS server
communication with the CPE
Select this opti on to enable authentication when there is a connection re quest from the ACS.
nter the connection request user name.
E
When the ACS makes a connection request to the Zyxel Device, this user name is used to
authenticate the ACS.
E
nter the connection request password.
When the ACS makes a connection request to the Zyxel Device, this password is used to
authenticate the ACS.
This shows the connection request URL.
The ACS can use this URL to make a connection request to the Zyxel Device.
Click to enable (switch turns blue) the validation of a local certificate used by TR-069 client.
You can choose a local certificate used by TR-069 client. The local certificate should be
imported in the Security > Certificates > Local Certificates screen.
.
.
LTE7461-M602 User’s Guide
157
Page 49
23.1 Time Settings Overview
This chapter shows you how to configure system related settings, such as system time, password, name,
the domain name and the inacti vity timeout interval.
23.2 The Time Screen
Configure the Zyxel Device’s time based on your local time zone. You can add a time server address,
select your time zone, and configure Daylight Savings if your location uses it.
To change your Zyxel Device’s time and date, click Maintenance > Time. The screen appears as shown.
C
HAPTER
23
Time Settings
LTE7461-M602 User’s Guide
158
Page 50
Figure 114 Maintenance > Time
Chapter 23 Time Settings
The following table describes the fields in this screen.
Table 71 Maintenance > Time
LABELDESCRIPTION
rrent Date/Time
Cu
rrent Time
Cu
rrent Date
Cu
me and Date Setup
Ti
ime Protocol
T
is displays the time of your Zyxel Device.
Th
Each time you reload this screen, the Zyxel Device synchronizes the time with the time server.
is displays the da te of your Zyxel Device.
Th
Each time you reload this screen, the Zyxel Device synchronizes the date with the time server.
is displays the time protocol used by your Zyxel Device.
Th
LTE7461-M602 User’s Guide
159
Page 51
Chapter 23 Time Setti n gs
Table 71 Maintenance > Time (continued)
LABELDESCRIPTION
Fi
rst ~ Fifth Time
Server Address
me Zone
Ti
Ti
me zone
ylight Savings
Da
ActiveClick this switch to enable or disable Daylight Saving Time. When the switch turns blue ,
St
art Rule
S
elect an NTP time server from the drop-down list box.
Otherwise, select Other and enter the IP address or URL (up to 29 extended ASCII char acters
in length) of your time server.
Select None if you don’t want to config ure the time server.
Check with your ISP/network administrator if you are unsure of this inf ormation.
C
hoose the time zone of your location. This will set the time difference between your time
zone and Greenwich Mean Time (GMT).
aylight Saving Time is a period from late spring to early fall when many countries set their
D
clocks ahead of no r ma l lo c al time by on e ho ur to give more daytim e lig h t in th e ev en ing .
the function is enabled. Otherwise, it’s not.
C
onfigure the day and time when Daylight Saving Time starts if you enabled Daylight Saving.
You can select a spe c if ic date in a particula r m on t h or a s pecific day of a spec ific we e k in a
particular month. The Time field uses the 24 hour format. Here are a couple of e xamples:
Daylight Saving Time starts in most parts of the United States on the second Sunday of March.
Each time zone in the United States starts using Daylight Saving Time at 2 A.M. local time. So in
the United Stat es, s et the day to Second, Sunday, t he month to March and t he time to 2 in the Hour field.
Daylight Savin g Time starts in the Eur op ean Union on the last Su n day of March. All of th e ti me
zones in the European Union start using Daylight Saving Time at the same moment (1 A.M.
GMT or UTC). So in the European Union you would set the day to Last, Sunday and the month
to March. The time you select in the o'clock field depends on your tim e zone. In Germany for
instance, you would select 2 in the Hour field because Germany's time zone is one hour
ahead of GMT or UTC (GMT+1).
End RuleConfigure the day and time when Daylight Saving Time ends if you enabled Daylight Saving.
You can select a spe c if ic date in a particula r m on t h or a s pecific day of a spec ific we e k in a
particular month. The Time field uses the 24 hour format. Here are a couple of examples:
Daylight Saving Time ends in the United States on the first Sunday of November. Each time
zone in the United States stops using Daylight Saving Time at 2 A.M. local time. So in the United
States you wo ul d s et t he da y to First, Sunday, the mont h t o November and the time to 2 in the Hour field.
Daylight Saving Time ends in the European Union on the last Sunday of October. All of the
time zones in the European Unio n s to p us i ng Da ylight Saving Time at the same mo ment (1
A.M. GMT or UTC). So in th e European Union you w ould set the day to Last, Sunday, and the
month to October. The time you select in the o'clock field depends on your time zone. In
Germany for instance, you would select 2 in the Hour field because Germany's time zone is
one hour ahead of GMT or UTC (GMT+1).
ClickCancelCancel to exit this screen without saving.
ClickApplyApply to save your changes.
LTE7461-M602 User’s Guide
160
Page 52
Email Notification
24.1 Email Notification Overview
A mail server is an application or a computer that can receive, forward and deliver email messages.
To have the Zyxel Device send reports, logs or notifications via email, you must specify an email server
and the email addresses of the sender and receiver.
24.2 The Email Notification Screen
View, remove and add email account information on the Zyxel Device. This account can be set to send
email notifications for logs.
C
HAPTER
24
Click Maintenance > Email Notification to open the Email Notification screen.
Note: The default port number of the mail server is 25.
Figure 115 Maintenance > Email Notification
The following table describes the labels in this screen.
Table 72 Maintenance > Email Notification
LABELDESCRIPTION
dd New email
A
Ma
il Server
Address
er name
Us
rt
Po
Se
curity
ck this button to create a new entry (up to 32 can be created).
Cli
T
his displays the server name or the IP address of the mail server.
is displays the user name of the sender’s mail ac count.
Th
is field displays the port number of the mail server.
Th
Th
is field displays the protocol used for encryption.
LTE7461-M602 User’s Guide
161
Page 53
Chapter 24 Email Notification
Table 72 Maintenance > Email Noti fi cation (continued)
LABELDESCRIPTION
Em
ail Address
move
Re
Th
is field displa ys the emai l addr es s tha t you want to be in th e fr om/ sen de r li ne of the e mail tha t
the Zyxel Device sends.
ck this button to delete the selected entry(ies).
Cli
24.2.1 Em
Click the Add button in the Email Notification screen. Use this screen to configure the required
information for sending email via a mail server.
Figure 116 Email Notification > Add
ail Notification Edit
The following table describes the labels in this screen.
Table 73 Email Notification > Add
LABELDESCRIPTION
Ma
il Server
Address
PortEnter the same port number here as is on the mail server for mail traffic.
uthentication
A
User name
A
uthentication
Password
A
ccount email
Address
En
ter the server name or the IP address of the mail server for the email address specified in the
Account email Address field.
If this field is left blank, reports, logs or notifi cations will not be sent via email.
ter the user name (up to 32 characters). This is usually the user name of a mail account you
En
specified in t he Account email Address field.
E
nter the password associated with the user name above.
E
nter the email addr e ss t ha t yo u wa nt to be i n th e f rom /s en der line o f th e e mai l not ifi ca ti on t hat
the Zyxel Device sends.
If you activate SSL/TLS authentication, the email address must be able to be authenticated by
the mail server as well.
LTE7461-M602 User’s Guide
162
Page 54
Chapter 24 Email Notification
Table 73 Email Notification > Add (continued)
LABELDESCRIPTION
Co
nnection
Security
CancelClick this button to begin configuring this screen afresh.
OKCl
Sel
ect SSL to use S ec ure Sockets La yer (SSL) or Tran sport Layer S e curity (TLS) if you want
encrypted communications bet w ee n the mail server and the Zy x el Device.
Select STARTTLS to upgrade a plain text connection to a secure connection using SSL/TLS.
ick this button to save your changes and return to the previous scre en.
LTE7461-M602 User’s Guide
163
Page 55
25.1 Log Setting Overview
You can configure where the Zyxel Device sends logs and which logs and/or immediate alerts the Zyxel
Device records.
25.2 The Log Setting Screen
If there is a LAN client on your network or a remote server that is running a syslog utility, you can save log
files from LAN computers to it by enabling Syslog Logging, selecting Remote or Local File and Remote in
the Mode field, and entering the IP address of the syslog server in the Syslog Server field. Remote allows
you to store logs on a syslog server, while Local File allows you to store them on the Zyxel Device. Local File and Remote means your logs are stored both on the Zyxel Device and on a syslog server. To change
your Zyxel Device’s log settings, click Maintenance > LogSetting. The screen appears as shown.
C
HAPTER
25
Log Setting
LTE7461-M602 User’s Guide
164
Page 56
Chapter 25 Log Setting
Figure 117 Maintenance > Log Setting
The following table describes the fields in this screen.
Table 74 Maintenance > Log Setting
LABELDESCRIPTION
Syslog Settings
yslog Logging
S
ode
M
lick the switch (it will turn blue ) to enable sys log logging.
C
ect Remote to have the Zyxel Device se nd it to an external syslog serve r.
Sel
Select Local File to have the Zyxel Device save the log file on the Zyxel Device itself.
Select Local File and Remote to have the Zyxel Device save the log file on the Zyxel Device itself
and send it to an external syslog server.
Note: A warning appears upon selecting Remote or Local File and Remote.
Just click OK to continue.
slog Server
Sy
ter the server name or IP address of the syslog server that will log the selected categories of
En
logs.
LTE7461-M602 User’s Guide
165
Page 57
Chapter 25 Log Setti ng
Table 74 Maintenance > Log Setting (continued)
LABELDESCRIPTION
UD
P Port
Em
ail Log Settings
Email Log Setting Click the switch (it will tur n bl ue) to allow the sending via email the system and security logs to
E
nter the port number used by the syslog server.
the email address specified in Send Log to.
Note: Make sure that the Mail Server Address field is not left blank in the
Maintenance > Email Notifications screen.
il Account
Ma
Sy
stem Log Mail
Subject
S
ecurity Log Mail
Subject
Send Log toThis field allows you to enter the log’s designated email recipient. The log’s format is plain text
Se
nd Alarm to
arm Interval
Al
Ac
tive Log
Sy
stem Log
Security LogSelect the categories of Security Logs that you want to record.
plyClick Apply to save your changes.
Ap
ncelClick Cancel to restore your previousl y s av ed settings.
Ca
elect a server specified in Maintenance > Email Notifications to send the logs to.
S
Th
is field allows you to enter a descriptive name for the system log email (for example Zyxel
System Log). Up to 127 characters are allowed for the System Log Mail Subject includi ng spec ial
characters inside the square brackets [!#%()*+,-./:=?@[]\{}~].
T
his field allows you to enter a descriptive name for the security log email (for example Zyxe l
Security Log). Up to 127 characters are allowed for the Security Log Mail Subject including
special characters inside the square brackets [!#%()*+,-./:=?@[]\{}~].
file sent as an emai l attachment.
Th
is field allows you to enter the alarm’s designated email recipient. The alarm’s format is plain
text file sent as an email attachment.
elect the frequency of showing of the alarm.
S
Sel
ect the categories of System Log s that you want to record.
LTE7461-M602 User’s Guide
166
Page 58
C
Firmware Upgrade
26.1 Overview
This chapter explains how to upload new firmware to your Zyxel Device. You can download new
firmware releases from your nearest Zyxel FTP site (or www.zyxel.com) to use to upgrade your Zyxel
Device’s performance.
Only use firmware for your Zyxel Device’s specific model. Refer to the
label on the bottom of your Zyxel Device.
26.2 The Firmware Upgrade Screen
Upload new firmware to your Zyxel Device by down loading the latest firmware file from the Zyxel
website. Then, upload it to your Zyxel Device. The upload process uses HTTP (Hypertext Transfer Protocol)
and may take up to three minutes. After a successful upload, the Zyxel Device will reboot.
HAPTER
26
Click Maintenance > Firmware Upgrade to open the followingscreen.
Do NOT turn off the Zyxel Device while firmware upload is in progress!
Figure 118 Maintenance > Firmware Upgrade
LTE7461-M602 User’s Guide
167
Page 59
Chapter 26 Firmware Upgrade
The following table describes the labels in this screen.
Table 75 Maintenance > Firmware Upgrade
LABELDESCRIPTION
Up
grade
Firmware
store Default
Re
Settings After
Firmware
Upgrade
U
se these fields to upload firmware to the Zyxel Device.
lick to enable th is op ti on tha t r est ore s the f act ory- def aul t to the Zyx el De vi ce aft er upgra di ng
C
the firmware.
Note: Make sure to backup the Zyxel Device’s configuration settings first in case the
restore to factory-default process is not successful. Refer to Section 27.2 on
page 169.
Cu
rrent Firmware
Version
Fi
le Path
C
hoose File
load
Up
Th
is is the present firmware version.
T
ype in the location of the file you want to upload in this field or click Choose File to find it.
C
lick this to find the .bin file you want to upload. Remember that you must decompress
compressed (.zip) files before you can upload them.
lick this to begin the upload process. This process may take up to three minutes.
C
After you see the firm ware updating screen, wait a few minutes before logging into the Zyxel Device
again.
The Zyxel Device automatically restarts in this time causing a temporary network disconnect. In some
operating systems, you may see the following icon on your desktop.
Figure 119 Network Temporarily Disconnected
After two minutes, log in again and check your new firmware version in the Status screen.
If the upload was not successful, an error screen will appear. Click OK to go back to the Firmware Upgrade screen.
LTE7461-M602 User’s Guide
168
Page 60
Backup/Restore
27.1 Backup/Restore Overview
Back up and restore your Zyxel Device configurations. You can also reset your Zyxel Device settings back
to the factory default.
27.2 The Backup/Restore Screen
Click Maintenance> Backup/Restore. Information related to factory defaults, backup configuration,
and restoring configuration appear s in this screen, as shown next.
Figure 120 Maintenance > Backup/Restore
C
HAPTER
27
Backup Configuration
Backup Configuration allows you to back up (save) the Zyxel Device’s current configuration to a file on
your computer. On ce the Zyxel Device is c onfigur ed and functioning properly, it is highly recommended
LTE7461-M602 User’s Guide
169
Page 61
Chapter 27 Backup/Restore
that you back up your configuration file before making configuration changes. The backup
configuration file will be useful in case you need to return to your previous settings.
Click Backup to save the Zyxel Device’s current configuration to your computer.
Restore Configuration
Restore Configuration allows you to upload a new or previously saved configuration file from your
computer to your Zyxel Device.
Table 76 Restore Configuration
LABELDESCRIPTION
le Path
Fi
C
hoose File
load
Up
set
Re
pe in the location of th e f ile you want to upload in this field or click Choose File to find it.
Ty
Cl
ick this to find the file you want to upload. Remember that yo u mu st decompress
compressed (.ZIP) files before you can upload them.
lick this to begin the upload process.
C
ick this to reset your Zyxel Device sett ings back to the factory default.
Cl
Do not turn off the Zyxel Device while configuration file upload is in
progress.
After the Zyxel Device configuration has been restored successfully, the login screen appears. Login
again to restart the Zyxel Device.
The Zyxel Device automatically restarts in this time causing a temporary ne tw o r k di s connect. In some
operating systems, you may see the following icon on your desktop.
Figure 121 Network Temporarily Disconnected
If you restore th e d efaul t con fig urat ion, you m ay ne ed to c han ge th e IP ad dres s of your com put er to be
in the same subnet as that of the default Zyxel Device IP address (192.168.1.1).
If the upload was not successful, an error screen will appear. Click OK to go back to the Configuration
screen.
27.3 The Reboot Screen
Reboot the Zyxel Device remotely without tur ning the power off. You may n ee d to do this if the Zyxel
Device hangs, for example. This does not affect the Zyxel Device's configuration.
Click Maintenance > Reboot. Click Reboot to have the Zyxel Device reboot.
LTE7461-M602 User’s Guide
170
Page 62
Chapter 27 Backup/Restore
Figure 122 Maintenance > Reboot
LTE7461-M602 User’s Guide
171
Page 63
C
HAPTER
Diagnostic
28.1 Diagnostic Overview
You can use different diagnostic methods to test a connection and see the detailed information. The
Diagnostic screens display information to help you identify problems with the Zyxel Device.
28.2 The Ping/TraceRoute/Nslookup Test Screen
Perform ping, traceroute, or nslookup for troubleshooting. Ping and traceroute are used to test whether
a particular host is reachable. After entering an IP address and clicking one of the buttons to start a test,
the results will be shown in the Ping/Traceroute Test area. Use nslookup to find the IP address for a host
name and vice versa. Click Maintenance > Diagnostic to open the Ping/TraceRoute/Nslookup screen
shown next.
The following table describes the fields in this screen.
Table 77 Maintenance > Diagnostic
LABELDESCRIPTION
Pi
ng/
TraceRoute
Test
TC
P/IP
AddressEnter either an IP address or a host name to start a test.
ng
Pi
Pi
ng 6
Tr
ace Route
race Route 6
T
NslookupClick this button to perform a DNS lookup on the IP address or host name.
T
he result of tests is shown here in the info area.
lick this button to perform a ping tes t on the IPv4 address or host name in order to test a
C
connection . Th e pin g st at is t ics will show in the info area .
C
lick this button to perform a ping tes t on the IPv6 address or host name in order to test a
connection . Th e pin g st at is t ics will show in the info area .
C
lick this button to perform the IPv4 trace route function. This determines the path a packet takes
to the specified host.
lick this button to perform the IPv6 trace route function. This determines the path a packet takes
C
to the specified host.
LTE7461-M602 User’s Guide
173
Page 65
29.1 Overview
This chapter offers some suggestions to solve problems you might encounter. The potential problems are
divided into the following categories.
• Power and Hardware Connections
• Zyxel Device Access and Login
• Internet Access
• UPnP
• SIM Card
• Wireless Signal
C
HAPTER
29
Troubleshooting
29.2 Power and Hardware Connections
The Zyxel Device does not turn on.
1Make sure the Zyxel Device is turned on.
2Make sure you a re using the power adapter an d cable (Power over Ethernet, PoE) included with the
Zyxel Device.
3Make sure the PoE is connected to the Zyxel Device and plugged in to an appropriate power source.
Make sure the power source is turned on.
4Turn the Zyxel Device off and on.
5If the problem continues, contact the vendor.
29.3 Zy
xel Device Access and Login
I forg
ot the IP address for the Zyxel Device.
LTE7461-M602 User’s Guide
174
Page 66
Chapter 29 Troubleshooting
1The default IP address is 192.168.1.1.
2If you changed the IP address and have forgotten it, you might get the IP address of the Zyxel Device by
looking up the IP address of the default gateway for your computer. To do this in most Windows
computers, click Start > Run, enter cmd, and then enter ipconfig. The IP addr ess of t he D efault Gatewa y
might be the IP address of the Zyxel Device (it depends on the network), so enter this IP address in your
Internet browser.
3If this does not work, you have to reset the Zyxel Device to its factory defaults. Refer to Section 27.2 on
page 169.
I forgot the password.
1The default admin password is 1234.
2If you can’t remember the pas sword, you have to reset the Zyx el Device to its factor y defaults. Refer to
Section 27.2 on page 169.
nnot see or access the Login screen in the Web Configurator.
I ca
1Make sure you are using the correct IP address.
• The default IP address is 192.168.1.1.
• If you changed the IP address (Section 7.2 on page 66), use the new IP address.
• If you changed the IP address and have forgotten it, see the troubleshooting suggestions for I
forgot the IP address for the Zyxel Device.
2Check the hardware connections, see the Quick St art Guide.
3Make sure your Internet browser does not block pop-up windows and has JavaScript and Java
enabled.
4Reset the Zyxel Device to its factory default, and try to access the Zyxel De vice with the default I P
address. Refer to Section 27.2 on page 169.
5If the problem continues, contact the network administrator or vendor, or try the advanced suggestion.
Advanced Suggestion
• Try to access the Zyxel Device using another service, such as Telnet. If you can access the Zyxel
Device, check the remote management settings and firewall rules to find out why the Z y xel Device
does not respond to HTTP.
I can see the Login screen, but I cannot log in to the Zyxel Device.
LTE7461-M602 User’s Guide
175
Page 67
Chapter 29 Trou bleshooting
1Make sure you have entered the user name and password correctly. The default user name is admin.
These fields are case-sensitive, so make sure [Caps Lock] is not on.
2You cannot log in to the Web Configurator while someone is using Telnet to access the Zyxel Device.
Log out of the Zyxel Device in the other session, or ask the person who is logged in to log out.
3Turn the Zyxel Device off and on.
4If this does not work, you have to reset the Zyxel Device to its factory default. See Section 29.2 on page
174.
I ca
nnot use FTP, Telnet, SSH or Ping to access the Zyxel Device.
See the Remote Management Section on page 150 for details on allowing web services (such as HTTP,
HTTPS, FTP, Telnet, SSH and Ping) to access the Zyxel Device.
Check the server Port number field for the web service in the Maintenance > Remote Management
screen. You must use the same port number in order to use that web service for remote m a nagement.
29.4 Internet Access
nnot access the Internet.
I ca
1Check the hardware connections and make sure the LEDs are behaving as expected. See the Quick
Start Guide and Section 1.6 on page 15.
2Check the SIM card. Maybe it has wrong settings (refer to Section 5.3 on page 36), the account has
expired, it became loose (remove and reinsert it - refer to the Quick Start Guide) or it's missing (stolen).
See Section 29.6 on page 178 for possible SIM card problems.
3Make sure you entered your ISP account information correctly. These fields are case-sensitive, so make
sure [Caps Lock] is not on.
4If the problem continues, contact your ISP.
I canno
In
t access the Internet anymore. I had access to the Internet (with the Zyxel Device), but my
ternet connection is not available anymore.
1Check the hardware connections (refer to the Quick Start Guide).
2Turn the Zyxel Device off and on.
3If the problem continues, contact your ISP.
LTE7461-M602 User’s Guide
176
Page 68
Chapter 29 Troubleshooting
The Internet connection is slow or intermittent.
1There might be a lot of traffic on the network. If the Zyxel Device is sending or receiving a lot of
information, try closing some programs that use the Internet, especially peer-to-peer applications.
2Turn the Zyxel Device off and on.
3If the problem continues, contact the network administrator or vendor, or try the advanced suggestion
(refer to I cannot see or access the Login screen in the Web Configurator in this chapter).
te: Since your
No
affect LTE signals.
Zyxel Device is an outdoor-type, inclement weather like rain and hot weather may
29.5 UPnP
When using UPnP and the Zyxel Device reboots, my computer cannot detect UPnP and refresh
M
y Network Places > Local Network.
1Make sure that UPnP is enabled in your computer. For Windows 7, see Section 7.6 on page 74. For
Windows 10, see Section 7.7 on page 77.
2Make sure that UPnP is enabled in the Network Settings > Home Networking > UPnP scre en. See Section
7.4 on page 72 for details.
3Disconnect the Ethernet cable from the Zyxel Device’s Ether net port or fr om your computer.
4Re-connect the Ethernet cab le.
The Local Area Connection icon for UPnP disappears in the screen.
Restart your computer.
nnot open special applications such as white board, file transfer and video when I use the
I ca
N Messenger.
MS
1Wait more than three minutes.
2Restart the applications.
LTE7461-M602 User’s Guide
177
Page 69
29.6 SIM Card
T
he SIM card cannot be detected.
1Disconnect the Zyxel Dev ice from the power supply.
2Remove the SIM card from its slot.
3Clean the SIM card slot of any loose debris using compressed air.
4Clean the gold connectors on the SIM card with a clean lint-free cloth.
5Insert the SIM card into it s slot and connect the Zyxel Dev ice to the power supply to restart it.
Chapter 29 Trou bleshooting
I get an Invalid S
1Make sure you have an active plan with your ISP.
2Make sure that the Zyxel Device is in the coverage area of a cellular network.
IM card alert.
29.7 Cellular Signal
ow should I positi on the
H
1Find the location of your nearest cellular base station(s), then install the Zyxel Device towards the
direction of those sites. The nearest site or site with a direct line-of-sight is usually preferred.
Note: It is best to test towards more than one cellular site, as the nearest site / line-of-sight is
not always the best due to the terrain, interference, density of usage, etc. All of these
factors influence the stability, availability and throughput of the link to the Zyxel Device
Zyxel Deviceto
a strong cellular signal?
get
.
2Position the Zyxel Device towards a direction where coverage is expected (example the nearest town).
3Conduct test measurements using the Web Configurator’s System Monitor > Cellular WAN Status screen
to obtain a report of the cellular network signal strength and quality at various test positions.
No
te: It is best to reboot the Zyxel Device before each test measurement is taken to ensure
that it is not camping on the previous cellular site. This is because the Zyxel Device can
‘lock’ onto the previous cellular site even when the new cellular site is at a much better
signal level and quality.
LTE7461-M602 User’s Guide
178
Page 70
Chapter 29 Troubleshooting
Although installing the Zyxel Device as high as possible is the usual rule of thumb, it is sometimes possible
that the Zyxel Device is in a weak coverage spot at that specific height. Adju st the heig ht to achie ve the
best service possible.
ote: Cellular network signals and quality can fluctuate. A measurement taken now and a
N
few moments later can differ substantially even if nothing apparent has changed – this
can be due to many aspects, such as fading, reflections, interference, capacity du e to
high network traffic, etc.
It is possible that the network topology and usage changes over time, even from one minute to the next
as network utilization increases. If poor performance is experienced at a later stage, re-test different
installation locations again. It is possible that the current serving cellular site has become over utilized or
is out-of-service. As the network design and topology changes, so will the experience change, either for
the better or for the worse.
LTE7461-M602 User’s Guide
179
Page 71
PART III
Appendices
Appendices contain general information. Some information may not apply to your Zyxel Device.
178
Page 72
A
PPENDIX
A
Customer Support
In the event of problems that cannot be solved by using this manual, you should contact your vendor. If
you cannot contact your vendor, then contact a Zyxel office for the region in which you bought the
Zyxel Device.
See http://www.zyxel.com/homepage.shtml and also
http://www.zyxel.com/about_zyxel/zyxel_worldwide.shtml for the latest information.
Please have the following information ready when you contact an office.
Required Information
• Product model and serial num b er.
• Warranty Information.
• Date that you received your Zyxel Device.
• Brief description of the problem and the steps you took to solve it.
• Zyxel Communications, Inc. - North America Headquarters
• http://www.zyxel.com/us/en/
Oceania
Australia
• Zyxel Communications Corporation
• http://www.zyxel.com/au/en/
Africa
South Africa
• Nology (Pty) Ltd.
• http://www.zyxel.co.za
Appendix A Customer Support
LTE7461-M602 User’s Guide
184
Page 78
Overview
IPv6 (Internet Protocol version 6), is designed to enhance IP address size and features. The increase in
IPv6 address size to 128 bits (from the 32-bit IPv4 address) allows up to 3.4 x 1038 IP addresses.
IPv6 Addressing
The 128-bit IPv6 address is written as eight 16-bit hexadecimal blocks separated by colons (:). This is an
example IPv6 address 2001:0db8:1a2b:0015:0000:0000:1a2f:0000.
IPv6 addresses can be abbreviated in two ways:
• Leading zeros in a block can be omitted. So 2001:0db8:1a2b:0015:0000:0000:1a2f:0000 can be
written as 2001:db8:1a2b:15:0:0:1a2f:0.
• Any number of consecutive blocks of zeros can be replaced by a double colon. A double colon can
only appear once in an IPv6 address. So 2001:0db8:0000:0000:1a2f:0000:0000:0015 can be
written as 2001:0db8::1a2f:0000:0000:0015, 2001:0db8:0000:0000:1a2f::0015, 2001:db8::1a2f:0:0:15 or 2001:db8:0:0:1a2f::15.
A
PPENDIX
IPv6
B
Prefix and Prefix Length
Similar to an IPv4 subnet mask, IPv6 uses an address prefix to represent the network address. An IPv6
prefix length specifies how many most significant bits (start from the left) in the address compose the
network address. The prefix length is written as “/x” where x is a number. For example,
2001:db8:1a2b:15::1a2f:0/32
means that the first 32 bits (2001:db8) is the subnet prefix.
Link-local Address
A link-local address uniquely identifies a device on the local network (the LAN). It is similar to a “private IP
address” in IPv4. You can have the same link-local address on multiple interfaces on a device. A linklocal unicast address has a predefined prefix of fe80::/10. The link-local unicast address format is as
follows.
Table 78 Link-local Unicast Address Format
10 bits64 bits54 bits
Global Address
A global address uniquely identifies a device on the Internet. It is similar to a “public IP address” in IPv4. A
global unicast address starts with a 2 or 3.
01111 1110 10Interface ID
LTE7461-M602 User’s Guide
185
Page 79
Unspecified Address
An unspecified address (0:0:0:0:0:0:0:0 or ::) is used as the source address when a device does not have
its own address. It is similar to “0.0.0.0” in IPv4.
Loopback Address
A loopback address (0:0:0:0:0:0:0:1 or ::1) allows a host to send packets to itself. It is similar to “127.0.0.1”
in IPv4.
Multicast Address
In IPv6, multicast addresses provide the same functionality as IPv4 broadcast addresses. Broadcasting is
not supported in IPv6. A multicast address allows a host to send packets to all hosts in a multicast group.
Multicast scope allows you to determine the size of the multicast group. A multicast address has a
predefined prefix of ff00::/8. The following table describes some of the predefined multicast addresses.
Table 79 Predefined Multicast Address
MULTICAST ADDRESSDESCRIPTION
FF01:0:0:0:0:0:0:1A
FF01:0:0:0:0:0:0:2All routers on a local node.
FF02:0:0:0:0:0:0:1All hosts on a local connected link.
FF02:0:0:0:0:0:0:2All routers on a local connected link.
FF05:0:0:0:0:0:0:2All routers on a local site.
FF05:0:0:0:0:0:1:3All DHCP severs on a local site.
Appendix B IPv6
ll hosts on a local node.
The following table describes the multicast addresses which are res erved and cannot be assigned to a
multicast group.
Both an IPv6 address and IPv6 subnet mask compose of 128-bit binary digits, which are divided into
eight 16-bit blocks and written in hexadecimal notation. Hexadecimal uses four bits for each character
(1 ~ 10, A ~ F). Each block’s 16 bits are then represented by four hexadecimal characters. For example,
FFFF:FFFF:FFFF:FFFF:FC00:0000:0000:0000.
Interface ID
In IPv6, an interface ID is a 64-bit identifier. It identifies a physical interface (for example, an Ethernet
port) or a virtual interface (for example, the management IP address for a VLAN). One interface should
have a unique interface ID.
EUI-64
Appendix B IPv6
0:0
The EUI-64 (Extended Unique Identifier) defined by the IEEE (Institute of Electrical and Electronics
Engineers) is an interface ID format designed to adapt with IPv6. It is derived from the 48-bit (6-byte)
Ethernet MAC address as shown next. EUI-64 inserts the hex digits fffe between the third and fourth bytes
of the MAC address and complements the seventh bit of the first byte of the MAC address. See the
following example.
MAC: 49: 1300
EUI-6402:13 :49
Identity Association
An Identity Association (IA) is a collection of addresses assigned to a DHCP client, through which the
server and client can manage a set of related IP addresses. Each IA must be associated with exactly
one interface. The DHCP clie nt uses th e IA assigned to an int erface to obtain configuration from a DHCP
server for that interface. Each IA consists of a unique IAID and associated IP information.
The IA type is the type of address in the IA. Each IA holds one type of address. IA_NA means an identity
association for non-temporary addresses and IA_TA is an identity association for temporar y addresses.
An IA_NA option contains the T1 and T2 fields, but an IA_TA option does not. The DHCPv6 server uses T1
and T2 to control the ti me at which the client contacts with the server to extend the lifetimes on any
addresses in the IA_NA before the lifetimes expire. After T1, the client sends the server (S1) (from which
the addresses in the IA_NA were obtained) a Renew message. If the time T2 is reached and the server
56: 34:12
:
: FF: FE:
56: 34:12
LTE7461-M602 User’s Guide
187
Page 81
does not respond, the client sends a Rebind message to any available server (S2). For an IA_TA, the
T1
T2
Rene
w
Re
bind
Rebind
to S
1
Renew
to S1
Renew
to S1
Renew
to S1
Renew
to S1
Renew
to S1
to S2
to S2
client may send a Renew o r Rebind message at the client's discretion.
DHCP Relay Agent
A DHCP relay agent is on the same network as the DHCP clients and helps forward messages between
the DHCP server and clients. When a client cannot use its link-local address and a well-known multicast
address to locate a DHCP server on its network, it then needs a DHCP relay agent to send a message to
a DHCP server that is not attached to the same network.
The DHCP relay agent can add the remot e identifi cation (rem ote-ID) opti on and the inte rface-ID option
to the Relay-Forward DHCPv6 messages. The rem ot e-ID op tion car ries a user-d efin ed string, such as the
system name. The interface-ID option provides slot number, port information and the VLAN ID to the
DHCPv6 server. The remote-ID option (if any) is stripped from the Rela y-Reply messages before the rela y
agent sends the packets to the clients. The DHCP server copies the interface-ID option from the RelayForward message into the Relay-Reply message and sends it to the relay agent. The interface-ID should
not change even aft er the relay agent restarts.
Appendix B IPv6
Prefix Delegation
Prefix delegation enables a n IPv6 rout er to use the IPv6 pr efix (netw ork addr ess) received from the ISP (or
a connected uplink router) for its LAN. The Zyxel Device uses the received IPv6 prefix (for example,
2001:db2::/48) to generate its LAN IP address. Through sending Router Advertisements (RAs) regularly by
multicast, the Zyxel Device passes the IPv6 prefix information to its LAN hosts. The hosts then can use the
prefix to generate their IPv6 addresses.
ICMPv6
Internet Control Message Protocol for IPv6 (ICMPv6 or ICMP for IPv6) is de fined in RFC 4443. ICMPv6 has
a preceding Next Header value of 58, which is different from the value used to identify ICMP for IPv4.
ICMPv6 is an integral part of IPv6. IPv6 nodes use ICMPv6 to repor t errors encountered in packet
processing and perform other diagnostic functions, such as "ping".
Neighbor Discovery Protocol (NDP)
The Neighbor Discovery Protocol (NDP) is a protocol used to discover other IPv6 devices and track
neighbor’s reachability in a network. An IPv6 device uses the following ICMPv6 messages types:
• Neighbor solicitation: A request from a host to determine a neighbor’s link-layer address (MAC
address) and detect if the neighbor is still reachable. A neighbor being “reachable” means it
responds to a neighbor solicitation message (from the host) with a neighbor advertisement message.
• Neighbor advertisement: A response from a node to announce its link-layer address.
LTE7461-M602 User’s Guide
188
Page 82
• Router solicitation: A request from a host to locate a router that can act as the defau l t router and
• Router advertisement: A response to a router solicitation or a periodical multicast advertisement from
IPv6 Cache
An IPv6 host is required to have a neighbor cache, destination cache, prefix list and default router list.
The Zyxel Device maintains and updates its IPv6 caches constantly using the information from response
messages. In IPv6, the Zyxel Device configures a link-local address automatically, and then sends a
neighbor solicitation message to check if the address is unique. If there is an address to be resolved or
verified, the Zyxel Device also sends out a neighbor solicitation message. When the Zyxel Device
receives a neighbor advertisement in response, it stores the neighbor’s link-layer address in the neighbor
cache. When the Zyxel Device uses a router solicitation message to query for a router and receives a
router advertisement message, it adds the router’s information to the neighbor cache, prefix list and
destination cache. The Zyxel Device creates an en try in th e def ault r outer list cache if the rou ter ca n be
used as a default router.
When the Zyxel Device needs to send a packet, it first consults the destination cache to determine the
next hop. If there is no matching entry in the destination cache, the Zyxel Device uses the prefix list to
determine whether the destination address is on-link and can be reached directly without passing
through a router. If the address is unlink, the address is considered as the next hop. Otherwise, the Zyxel
Device determines the next-hop from the default router lis t or routing table. Once th e next hop IP
address is known, the Zyxel Device looks into the neighbor cache to get the link-layer address and sends
the packet when the neighbor is reachable. If the Zyxel Device cannot find an entry in the neighbor
cache or the state for the neighbor is not reachable, it starts the address resolution process. This helps
reduce the number of IPv6 solicitation and advertisement messages.
Appendix B IPv6
forward packets.
a router to advertise its presence and oth er p a ram e te rs .
Multicast Listener Discovery
The Multicast Listener Discovery (MLD) protocol (defined in RFC 2710) is derived from IPv4's Internet
Group Management Protocol version 2 (IGMPv2). MLD uses ICMPv6 message types, rather than IGMP
message types. MLDv1 is equivalent to IGMPv2 and MLDv2 is equivalent to IGMPv3.
MLD allows an IPv6 switch or router to discover the presence of MLD listeners who wish to receive
multicast packets and the IP addresses of multicast groups the hosts want to join on its network.
MLD snooping and MLD proxy are analogous to IGMP snooping and IGMP proxy in IPv4.
MLD filtering controls which multicast groups a port can join.
MLD Messages
A multicast router or switch periodically sends general queries to MLD hosts to update the multicast
forwarding table. When an MLD host wants to join a multicast group, it sends an MLD Report message
for that address.
An MLD Done message is equivalent to an IGMP Leave message. When an MLD host wants to leave a
multicast group, it can send a Done message to the router or switch. The router or switch then sends a
group-specific query to the port on which the Done message is received to determine if other devices
connected to this port should remain in the group.
LTE7461-M602 User’s Guide
189
Page 83
Example - Enabling IPv6 on Windows 7
Windows 7 supports IPv6 by default. DHCPv6 is also enabled when you enable IPv6 on a Windows 7
computer.
To enable IPv6 in Windows 7:
1Select Control Panel > Network and Sharing Center > Local Area Connection.
2Select the Internet Protocol Version 6 (TCP/IPv6) checkbox to enable it.
3Click OK to save the change.
Appendix B IPv6
4Click Close to exit the Local Area Connection Status screen.
5Select Start > All Programs > Accessories > Command Prompt.
6Use the ipconfig command to check your dynamic IPv6 address. This example shows a global address
(2001:b021:2d::1000) obt a ined from a DHCP se rver.
This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules. These
limits are designed to provide reasonable protection against harmful interference in a residential installation.
This equipment generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions,
may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a
particular installation.
Co
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any
language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of Zyxel Communications Corporation.
Published by Zyxel Communications Corporation. All rights reserved.
Disclaime
r
Zyxe
l does not assume any liability arising out of th e appli cation or use of any product s, or software describe d herein. Ne ither d oes it c on vey any
license under its patent rights nor the patent rights of others. Zyxel further reserves the right to make changes in any products described herein
without notice. This publication is subject to change without notice.
Regulatory Notice and Statement
UNITED STATES of AMERICA
The following information applies if you use the product within USA area.
FCC EMC statement
• This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
(1) This device may not cause harmful interference, and
(2) This device must accept any interference received, including interference that may cause undesired operation.
• Changes or modifications not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause harmful
interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation.
•
If this device does cause harmful interference to radio or television reception, which is found by turning the equipment off and on, the user is
encouraged to try to correct the interference by one or more of the following measures:
• Reorient or relocate the receiving antenna
•
Increase the separation between the equipment or devicesConnect the equipment to an outlet other than the receiver’s
•
•
Consult a dealer or an experienced radio/TV technician for assistance
The following information applies if you use the product with RF function within USA area
FCC Radiation exposure statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment. This transmitter must be at least 30 cm from the user and must not be co-located or operating in conjunction with any other antenna or transmitter.
LTE7461-M602 User’s Guide
162
Page 86
CANADA
Chain NO.
Antenna Type
Frequency range
WiFi Gain (dBi)
LTE Gain (dBi)
Connector
WLAN-ANT0
PIFA
2.4 ~ 2.4835 GHz
6
N.A.
iPEX
WLAN-ANT1
PIFA
2.4 ~ 2.4835 GHz
5
N.A.
iPEX
WWAN
Dipole
2500 ~ 2570 MHz
N.A.
9
iPEX
698 ~ 716 MHz
N.A.
3.5
iPEX
777 ~ 787 MHz
N.A.
3
iPEX
1850 ~ 1915 MHz
N.A.
8
iPEX
814 ~ 849 MHz
N.A.
3.6
iPEX
2305 ~ 2315 MHz
N.A.
9
iPEX
1710 ~ 1780 MHz
N.A.
7
iPEX
The following information applies if you use the product within Canada area
Innovation, Science and Economic Development Canada ICES statement
CAN ICES-3 (B)/NMB-3(B)
Innovation, Science and Economic Development Canada RSS-GEN & RSS-247
statement
This device contains licence-exempt transmitter(s)/receiver(s) that comply with Innovation, Science and
Economic Development Canada’s licence-exempt RSS(s). Operation is subject to the following two
conditions: (1) This device may not cause interference; and (2) This device must accept any interference,
including interference that may cause undesired operation of the device.
This radio transmitter (2468C-LTE7461M602) has been approved by Innovation, Science and Economic
Development Canada to operate with the antenna types listed below, with the maximum permissible gain
indicated. Antenna types not included in this list that have a gain greater than the maximum gain indicated
for any type listed are strictly prohibited for use with this device.
Antenna information
If the product with 5G wireless function operating in 5150-5250 MHz and 5725-5850 MHz, the following attention must
be paid,
The device for operation in the band 5150-5250 MHz is only for indoor use to reduce the potential for harmful
interference to co-channel mobile satellite systems.
For devices with detachable antenna(s), the maximum antenna gain permitted for devices in the band
5725-5850 MHz shall be such that the equipment still complies with the e.i.r.p. limits as appropriate; and
Where applicable, antenna type(s), antenna models(s), and the worst-case tilt angle(s) necessary to remain
compliant with the e.i.r.p. elevation mask requirement set forth in Section 6.2.2.3 of RSS 247 shall be clearly
indicated.
If the produce with 5G wireless function operating in5250-5350 MHz and 5470-5725 MHz, the following attention must
be paid.
For devices with detachable antenna(s), the maximum antenna gain permitted for devices in the bands
Page 87
5250-5350 MHz and 5470-5725 MHz shall be such that the equipment still complies with the e.i.r.p. limit
Chaîne NB.
Antenne
Type
Gamme de
fré quences
WiFi Gain
(dBi)
LTE Gain
(dBi)
Connecteur
WLAN-ANT0
PIFA
2.4 ~ 2.4835 GHz
6
N.A.
iPEX
WLAN-ANT1
PIFA
2.4 ~ 2.4835 GHz
5
N.A.
iPEX
WWAN
Dipole
2500 ~ 2570 MHz
N.A.
9
iPEX
698 ~ 716 MHz
N.A.
3.5
iPEX
777 ~ 787 MHz
N.A.
3
iPEX
1850 ~ 1915 MHz
N.A.
8
iPEX
814 ~ 849 MHz
N.A.
3.6
iPEX
2305 ~ 2315 MHz
N.A.
9
iPEX
1710 ~ 1780 MHz
N.A.
7
iPEX
L’émetteur/récepteur exempt de licence contenu dans le présent appareil est conforme aux CNR
d’Innovation, Sciences et Développement économique Canada applicables aux appareils radio exempts
de licence. L’exploitation est autorisé e aux deux conditions suivantes : (1) l’appareil ne doit pas produire de
brouillage; (2) L’appareil doit accepter tout brouillage radioélectrique subi, mê me si le brouillage est
susceptible d’en compromettre le fonctionnement.
Le pré sent é metteur radio (2468C-LTE7461M602) a été approuvé par Innovation, Sciences et Dé veloppement
é conomique Canada pour fonctionner avec les types d'antenne é numé ré s ci-dessous et ayant un gain
admissible maximal. Les types d'antenne non inclus dans cette liste, et dont le gain est supé rieur au gain
maximal indiqué pour tout type figurant sur la liste, sont strictement interdits pour l'exploitation de l'é metteur.
informationsantenne
Lorsque la fonction sans fil 5G fonctionnant en5150-5250 MHz and 5725-5850 MHz est activé e pour ce produit , il est
né cessaire de porter une attention particuliè re aux choses suivantes
Les dispositifs fonctionnant dans la bande de 5 150 à 5 250 MHz sont ré servé s uniquement pour une utilisation
à l’intérieur afin de réduire les risques de brouillage préjudiciable aux systèmes de satellites mobiles utilisant
les mê mes canaux;
Pour les dispositifs munis d’antennes amovibles, le gain maximal d’antenne permis (pour les dispositifs utilisant
la bande de 5 725 à 5 850 MHz) doit être conforme à la limite de la p.i.r.e. spé cifiée, selon le cas;
Lorsqu’il y a lieu, les types d’antennes (s’il y en a plusieurs), les numéros de modèle de l’antenne et les pires
angles d’inclinaison nécessaires pour rester conforme à l’exigence de la p.i.r.e. applicable au masque
d’élévation, énoncée à la section 6.2.2.3 du CNR-247, doivent ê tre clairement indiqué s.
Lorsque la fonction sans fil 5G fonctionnant en 5250-5350 MHz et 5470-5725 MHz est activé e pour ce produit , il est
né cessaire de porter une attention particuliè re aux choses suivantes
Pour les dispositifs munis d’antennes amovibles, le gain maximal d'antenne permis pour les dispositifs utilisant
les bandes de 5 250 à 5 350 MHz et de 5 470 à 5 725 MHz doit ê tre conforme à la limite de la p.i.r.e.
Page 88
Industry Canada radiation exposure statement
This equipment complies with ISED radiation exposure limits set forth for an uncontrolled environment. This equipment
should be installed and operated with a minimum distance of 30 cm between the radiator and your body.
Déclaration d’exposition aux radiations:
Cet équipement est conforme aux limites d’exposition aux rayonnements ISED é tablies pour un environnement non
contrô lé .Cet équipement doit ê tre installé et utilisé avec un minimum de30 cm de distance entre la source de
rayonnement et votre corps.
Page 89
fety Warnings
Sa
Do not use this product near water, for example, in a wet basement or near a swimming pool.
•
• Do not expose your Zyxel Device to dampness, dust or corrosive liquids.
• Do not store things on the device.
• Do not obstruct the Zyxel Device ventilation slots as insufficient airflow may harm your Zyxel Device. For example, do not pla
Device in an enclosed space such as a box or on a very soft surface such as a bed or sofa.
• Do not install, use, or service this Zyxel Device during a thunderstorm. There is a remote risk of electric shock from lightning.
• Connect ONLY suitable accessories to the Zyxel Device.
• Do not open the Zyxel Device or unit. Opening or removing covers can expose you to dangerous high voltage points or other risk
• Only qualified service personnel should service or disassemble this Zyxel Device. Please contact your vendor for further infor
• Make sure to connect the cables to the correct ports.
• Place connecting cables carefully so that no one will step on them or stumble over them.
• Always disconnect all cables from this Zyxel Device before servicing or disassembling.
• Do not remove th e pl u g and con n e ct i t to a po we r outlet by its e lf ; a lw ay s a tt ac h the p lu g to the power ad ap t e r fi r s t be f or e c o
a power outlet.
• Do not allow anything to rest on the power adapter or cord and do NOT place the product where anyone can walk on the power ada
or cord.
• Please use the provided or designated connection cables/power ca
AC in North America or 230V AC in Europe). If the p ower adapter or cord is damaged, it mi ght cause elec trocution. Remove it fr o
Device and the power source, repairing the power adapter or cord is prohibited. Contact your local vendor to order a new one.
• The following warning statements apply, where the disconnect device is not incorporated in the Zyxel Device or where the plug
power supply cord is intended to serve as the disconnect device,
- For permanently connected Zyxel Device, a readily accessible disconnect device shall be incorporated external to the Zyxel De
- For pluggable devices, the socket-outlet shall be instal
Environment Statement
European Union - Disposal and Recycling Information
The symbol below means that according to local regulations your product and/or its battery shall be disposed of separately from
waste. If this product is end of life, take it t o a recycli ng statio n desig nated by lo cal autho rities. At t he t ime of dispo sal,
your product and/or its battery will help save natural resources and ensure that the environment is sustainable development.
Appendix B Legal Information
bles/adapters. Connect it to th
led near the Zyxel Device and shall be easily accessible.
ce the Zyxel
mation.
e right supply voltage (for exa
the separate collection of
domestic
s.
nnecting it to
pter
mple, 110V
m the Zyxel
on the
vice;
Die folgende Symbol bedeutet, dass Ihr Produkt und/oder seine Batterie gemäß den örtlichen Bestimmungen getrennt vom Hausmüll entsorgt
werden muss. Wenden Sie sich an eine Recyclingstation, wenn dieses Produkt das Ende seiner Lebensdauer erreicht hat. Zum Zeitpu
Entsorgung wird die getrennte Sammlung von Produkt und/oder seiner Batterie dazu beitragen, natürliche Ressourcen zu sparen und
und die menschliche Gesundheit zu schützen.
El símbolo de abajo indica que según las regulaciones locales, su
doméstica. Cuando este producto alcance el final de su vida útil, llévelo a un punto limpio. Cuando llegue el momento de desech
producto, la recogida por separado éste y/o su batería ayudará a salvar los recursos naturales y a proteger la salud humana y
medioambiental.
Le symbole ci-dessous signifie que selon les réglementations locales votre produit et/ou sa batterie doivent être éliminés sépa
ménagères. Lorsque ce produit atteint sa fin de vie, amenez-le à un centre de recyclage. Au moment de la mise au rebut, la coll
de votre produit et/ou de sa batterie aidera à économiser les
Il simbolo sotto significa che secondo i regolamenti locali il vostro prodotto e/o batteria deve essere smaltito separatamente
Quando questo prodotto raggiunge la fine della v ita di servizio portarlo a una stazione di riciclaggio. Al mo mento dello smal ti
separata del vostro prodotto e/o della sua batteria aiuta a risp
Symbolen innebär att enligt lokal lagstiftning ska produkten och/eller dess batteri kastas separat från hushållsavfallet. När d
slutet av sin livslängd ska du ta den till en återvinningsstation. Vid tiden för kasseringen bidrar du till en bättre miljö och mänsklig hälsa genom att
göra dig av med den på ett återvinningsställe.
producto y/o su batería deberán depositarse como basura separ
ressources naturelles et protéger
armiare risorse naturali e a proteggere l'ambiente e la salute
ious symbols are used in this product to ensure correct usage, to prevent danger to the user and others, and to prevent property damage.
Var
The meaning of these symbols are described below. It is important that you read these descriptions thoroughly and fully understand the
contents.
Explanation of the Symbols
SYMBOLEXPLANATION
View
ing Certifications
Go to http://www.zyxel.com to view this product’s documentation and certifications.
Appendix B Legal Information
lternating current (AC):
A
AC is an electric current in which the flow of electric charge periodically reverses direction.
Direct current (DC):
DC if the unidirectional flow or movement of electric charge carriers.
Earth; ground:
A wiring terminal intended for connection of a Protective Earthing Conductor.
Class II equipment:
The method of protection against electric shock in the case of class II equipment is either double insulation or
reinforced insulation.
yxel Limited Warranty
Z
rants to the original end user (purchaser) that this product is free from any defects in material or workmanship for a specific period (the
Zyxel war
Warranty Period) from the date of purchase. The Warranty Period varies by region. Check with your vendor and/or the authorized Zyxel local
distributor for details about the Warranty Period of this product. During the warranty period, and upon proof of purchase, should the product
have indications of failure due to faulty workmanship and/or materials, Zyxel will, at its discretion, repair or replace the defective products or
components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to
proper operating condition. Any replacement w ill c onsist of a new or re-manufactured functionally e quivalent pr oduct of e qual or higher value,
and will be solely at the discretion o f Zyxel. This warr anty shall no t apply i f t he produ ct has bee n modif ied, misu sed, tamper ed with, damaged by
an act of God, or subjected to abnormal working conditions.
Note
ir or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties,
Repa
express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. Zyxel shall in no event be held
liable for indirect or consequential damages of any kind to the purchaser.
To obtain the services of this warranty, contact your vendor. You may also refer to the warranty policy for the region in which you bought the
Zyxel Device at http://www.zyxel.com/web/support_warranty_info.php.
tration
Regis
ister your product online to receive email notices of firmware upgrades and information at www.zyxel.com for global products, or at
Reg
www.us.zyxel.com for North American products.
pen Source Licenses
O
This product contains in part some free software distributed under GPL license terms and/or GPL like licenses. Open source licenses are provided
with the firmware package. You can download the latest firmware at www.zyxel.com. To obtain the source code covered under those Licenses,
please contact support@zyxel.com.tw to get it.
LTE7461-M602 User’s Guide
166
Page 92
Index
Index
A
access
troubleshooting 174
Access Control (Rules) screen 113
ACS 155
activation
configuration 169
backup configuration 169
Backup/Restore screen 169
Band Configuration Screen 37
Basic Service Set, see BSS
blinking LEDs 14
Broadband 33
BSS 57
example 57
C
CA 127
Cellular WAN 151
TR-069 traffic 157
Cellular WAN Screen 34
Cellular WAN screen 34
certificate
details 129
factory default 122
file format 128
file path 126
import 122, 125
public and private keys 128
verification 128
certificate request
create 122
view 123
certificates 121
advantages 128
authentication 121
CA 127
creating 122
public key 121
replacing 122
storage space 122
thumbprint algorit hms 129
thumbprints 129
trusted CAs 126
verifying fingerprint s 128
Certification Authority, see CA
certifications 196
viewing 198
channel, wireless LAN 54
client list 70
configuration
backup 169
firewalls 110
restoring 170
static route 106
contact information 179
copyright 192
LTE7461-M602 User’s Guide
200
Page 93
Index
Create Certificate Request screen 122
creating certi ficates 122
CTS threshold 51, 54
customer support 179
customized service
add 112
customized services 11 2, 113
D
data fragment threshold 51, 54
Data Roaming
enable 35
Denials of Service, see DoS
DHCP 65
DHCP Server Lease Tim e 68
DHCP Server State 68
diagnostic 172
diagnostic screens 172
digital IDs 121
disclaimer 192
DMZ screen 103
DNS 66
DNS Value s 68
domain name system, see DNS
DoS 109