ZyXEL ZyAIR G-2000 User Guide

ZyAIR G-2000

802.11g Wireless 4-port Router
User's Guide
Version 3.60
February 2004
ZyAIR G-2000 Wireless 4-port Router User’s Guide

Copyright

Copyright © 2003 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimer
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any products described herein without notice. This publication is subject to change without notice.
Trademarks
ZyNOS (ZyXEL Network Operating System) is a registered trademark of ZyXEL Communications, Inc. Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Federal Communications Commission
(FCC) Interference Statement
This device complies with Part 15 of FCC rules. Operation is subject to the following two conditions:
This device may not cause harmful interference.
This device must accept any interference received, including interference that may cause undesired
operations.
This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.
If this equipment does cause harmful interference to radio/television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures:
1. Reorient or relocate the receiving antenna.
2. Increase the separation between the equipment and the receiver.
3. Connect the equipment into an outlet on a circuit different from that to which the receiver is connected.
4. Consult the dealer or an experienced radio/TV technician for help.
Notice 1
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the equipment.
Certifications
1. Go to www.zyxel.com
2. Select your product from the drop-down list box on the ZyXEL home page to go to that product's page.
3. Select the certification you wish to view from this page
FCC Statement iii
ZyAIR G-2000 Wireless 4-port Router User’s Guide

ZyXEL Limited Warranty

ZyXEL warrants to the original end user (purchaser) that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase. During the warranty period, and upon proof of purchase, should the product have indications of failure due to faulty workmanship and/or materials, ZyXEL will, at its discretion, repair or replace the defective products or components without charge for either parts or labor, and to whatever extent it shall deem necessary to restore the product or components to proper operating condition. Any replacement will consist of a new or re-manufactured functionally equivalent product of equal value, and will be solely at the discretion of ZyXEL. This warranty shall not apply if the product is modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions.
Note
Repair or replacement, as provided under this warranty, is the exclusive remedy of the purchaser. This warranty is in lieu of all other warranties, express or implied, including any implied warranty of merchantability or fitness for a particular use or purpose. ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser.
To obtain the services of this warranty, contact ZyXEL's Service Center for your Return Material Authorization number (RMA). Products must be returned Postage Prepaid. It is recommended that the unit be insured when shipped. Any returned products without proof of purchase or those with an out-dated warranty will be repaired or replaced (at the discretion of ZyXEL) and the customer will be billed for parts and labor. All repaired or replaced products will be shipped by ZyXEL to the corresponding return address, Postage Paid. This warranty gives you specific legal rights, and you may also have other rights that vary from country to country.
Safety Warnings
1. To reduce the risk of fire, use only No. 26 AWG or larger telephone wire.
2. Do not use this product near water, for example, in a wet basement or near a swimming pool.
3. Avoid using this product during an electrical storm. There may be a remote risk of electric shock from lightening.
iv ZyXEL Warranty
ZyAIR G-2000 Wireless 4-port Router User’s Guide
/

Customer Support

Please have the following information ready when you contact customer support.
Product model and serial number.
Warranty Information.
Date that you received your device.
Brief description of the problem and the steps you took to solve it.
REGULAR MAIL
ZyXEL Communications Corp. 6 Innovation Road II Science Park Hsinchu 300 Taiwan
ZyXEL Communications Inc. 1130 N. Miller St. Anaheim CA 92806-2001 U.S.A.
ZyXEL Deutschland GmbH. Adenauerstr. 20/A2 D-52146 Wuerselen Germany
1 rue des Vergers Bat. 1 / C 69760 Limonest France
Alejandro Villegas 33 1º, 28043 Madrid Spain
ZyXEL Communications A/S Columbusvej 5 2860 Soeborg Denmark
ZyXEL Communications A Nils Hansens vei 13 0667 Oslo Norway
S
LOCATION
WORLDWIDE
AMERICA
SUPPORT E-MAIL TELEPHONE1 WEB SITE METHOD
SALES E-MAIL FAX1 FTP SITE
support@zyxel.com.tw +886-3-578-3942 www.zyxel.com
sales@zyxel.com.tw
support@zyxel.com +1-800-255-4101
sales@zyxel.com
support@zyxel.de +49-2405-6909-0 www.zyxel.de GERMANY
sales@zyxel.de
support@zyxel.es +34 902 195 420 SPAIN
sales@zyxel.es
support@zyxel.dk +45 39 55 07 00 www.zyxel.dk DENMARK
sales@zyxel.dk
support@zyxel.no +47 22 80 61 80 www.zyxel.no NORWAY
sales@zyxel.no
+886-3-578-2439 ftp.zyxel.com
+1-714-632-0882
+1-714-632-0858 ftp.us.zyxel.com
+49-2405-6909-99
+33 (0)4 72 52 97 97 FRANCE info@zyxel.fr
+33 (0)4 72 52 19 20
+34 913 005 345
+45 39 55 07 07
+47 22 80 61 81
www.europe.zyxel.com
ftp.europe.zyxel.com
www.us.zyxel.com NORTH
www.zyxel.fr ZyXEL France
www.zyxel.es
ZyXEL Communications
1
“+” is the (prefix) number you enter to make an international telephone call.
Customer Support v
ZyAIR G-2000 Wireless 4-port Router User’s Guide
LOCATION
SUPPORT E-MAIL TELEPHONE1 WEB SITE METHOD
SALES E-MAIL FAX1 FTP SITE
support@zyxel.se +46 31 744 7700 www.zyxel.se SWEDEN
sales@zyxel.se
support@zyxel.fi +358-9-4780-8411 www.zyxel.fi FINLAND
sales@zyxel.fi
+46 31 744 7701
+358-9-4780 8448
REGULAR MAIL
ZyXEL Communications A/S Sjöporten 4, 41764 Göteborg Sweden
ZyXEL Communications Oy Malminkaari 10 00700 Helsinki Finland
vi Customer Support
ZyAIR G-2000 Wireless 4-port Router User’s Guide

Table of Contents

Copyright.........................................................................................................................................................ii
Federal Communications Commission (FCC) Interference Statement.....................................................iii
ZyXEL Limited Warranty.............................................................................................................................iv
Customer Support........................................................................................................................................... v
List of Figures...............................................................................................................................................xvi
List of Tables.................................................................................................................................................xxi
Preface.........................................................................................................................................................xxiv
OVERVIEW.................................................................................................................................................... I
Chapter 1 Getting to Know Your ZyAIR...................................................................................................1-1
1.1 Introducing the ZyAIR...............................................................................................................1-1
1.2 ZyAIR Features..........................................................................................................................1-1
1.3 Application for the ZyAIR .........................................................................................................1-6
1.3.1 Internet Access Application ...............................................................................................1-6
Chapter 2 Introducing the Web Configurator...........................................................................................2-1
2.1 Web Configurator Overview......................................................................................................2-1
2.2 Accessing the ZyAIR Web Configurator ...................................................................................2-1
2.3 Resetting the ZyAIR ..................................................................................................................2-2
2.3.1 Procedure to Use the Reset Button.....................................................................................2-2
2.4 Navigating the ZyAIR Web Configurator..................................................................................2-3
Chapter 3 Wizard Setup ..............................................................................................................................3-1
3.1 Wizard Setup Overview .............................................................................................................3-1
3.1.1 Channel ..............................................................................................................................3-1
3.1.2 ESS ID................................................................................................................................3-1
3.1.3 WEP Encryption.................................................................................................................3-1
3.2 Wizard Setup: General Setup.....................................................................................................3-1
3.3 Wizard Setup: Wireless LAN Setup...........................................................................................3-3
3.4 Wizard Setup: ISP Parameters ...................................................................................................3-5
3.4.1 Ethernet ..............................................................................................................................3-5
3.4.2 PPPoE Encapsulation.........................................................................................................3-7
3.4.3 PPTP Encapsulation ...........................................................................................................3-9
3.5 Wizard Setup: WAN and DNS.................................................................................................3-11
3.5.1 WAN IP Address Assignment..........................................................................................3-11
3.5.2 IP Address and Subnet Mask............................................................................................3-12
3.5.3 DNS Server Address Assignment ....................................................................................3-12
3.5.4 WAN MAC Address........................................................................................................3-13
3.6 Basic Setup Complete ..............................................................................................................3-15
SYSTEM, LAN AND WIRELESS................................................................................................................II
Chapter 4 System Screens ...........................................................................................................................4-1
4.1 System Overview .......................................................................................................................4-1
Table of Contents vii
ZyAIR G-2000 Wireless 4-port Router User’s Guide
4.2 Configuring General Setup ........................................................................................................4-1
4.3 Dynamic DNS............................................................................................................................ 4-2
4.3.1 DYNDNS Wildcard...........................................................................................................4-3
4.4 Configuring Dynamic DNS .......................................................................................................4-3
4.5 Configuring Password................................................................................................................4-4
4.6 Configuring Time Setting ..........................................................................................................4-5
Chapter 5 LAN Screens............................................................................................................................... 5-1
5.1 LAN Overview ..........................................................................................................................5-1
5.2 LANs and WANs....................................................................................................................... 5-1
5.2.1 LANs, WANs and the ZyAIR............................................................................................ 5-1
5.3 DHCP Setup...............................................................................................................................5-2
5.3.1 DNS Servers ......................................................................................................................5-2
5.4 Factory LAN Defaults................................................................................................................5-2
5.5 RIP Setup ................................................................................................................................... 5-2
5.6 Multicast ....................................................................................................................................5-3
5.7 Configuring the LAN IP Screens............................................................................................... 5-3
Chapter 6 Wireless Configuration and Roaming...................................................................................... 6-1
6.1 Wireless LAN Overview............................................................................................................6-1
6.1.1 IBSS...................................................................................................................................6-1
6.1.2 BSS ....................................................................................................................................6-1
6.1.3 ESS ....................................................................................................................................6-2
6.2 Wireless LAN Basics.................................................................................................................6-3
6.2.1 RTS/CTS............................................................................................................................6-3
6.2.2 Fragmentation Threshold................................................................................................... 6-4
6.3 Configuring Wireless................................................................................................................. 6-5
6.4 Configuring Roaming ................................................................................................................6-7
6.4.1 Requirements for Roaming................................................................................................ 6-9
Chapter 7 Wireless Security........................................................................................................................7-1
7.1 Wireless Security Overview.......................................................................................................7-1
7.2 WEP Overview ..........................................................................................................................7-1
7.2.1 Data Encryption .................................................................................................................7-2
7.2.2 Authentication.................................................................................................................... 7-2
7.2.3 Preamble Type ...................................................................................................................7-3
7.3 Configuring WEP Encryption....................................................................................................7-3
7.4 MAC Filter.................................................................................................................................7-6
7.5 802.1x Overview........................................................................................................................7-8
7.6 Dynamic WEP Key Exchange................................................................................................... 7-8
7.7 Introduction to WPA.................................................................................................................. 7-9
7.7.1 User Authentication ...........................................................................................................7-9
7.7.2 Encryption..........................................................................................................................7-9
7.8 WPA-PSK Application Example............................................................................................. 7-10
viii Table of Contents
ZyAIR G-2000 Wireless 4-port Router User’s Guide
7.9 WPA with RADIUS Application Example ..............................................................................7-10
7.10 Security Parameters Summary .................................................................................................7-11
7.11 Wireless Client WPA Supplicants............................................................................................7-12
7.12 Configuring 802.1x and WPA..................................................................................................7-12
7.12.1 Authentication Required: 802.1x .....................................................................................7-13
7.12.2 Authentication Required: WPA........................................................................................7-16
7.12.3 Authentication Required: WPA-PSK...............................................................................7-18
7.13 Introduction to Local User Database........................................................................................7-20
7.14 Configuring Local User Database ............................................................................................7-20
7.15 Introduction to RADIUS..........................................................................................................7-22
7.15.1 EAP Authentication Overview.........................................................................................7-23
7.16 Configuring RADIUS ..............................................................................................................7-24
WAN .............................................................................................................................................................. III
Chapter 8 WAN Screens ..............................................................................................................................8-1
8.1 WAN Overview .........................................................................................................................8-1
8.2 Configuring WAN ISP...............................................................................................................8-1
8.2.1 Ethernet Encapsulation.......................................................................................................8-1
8.2.2 PPPoE Encapsulation.........................................................................................................8-3
8.2.3 PPTP Encapsulation ...........................................................................................................8-5
8.3 TCP/IP Priority (Metric) ............................................................................................................8-6
8.4 Configuring WAN IP .................................................................................................................8-7
8.5 Configuring WAN MAC..........................................................................................................8-10
SUA/NAT AND STATIC ROUTE............................................................................................................... IV
Chapter 9 Single User Account (SUA) / Network Address Translation (NAT).......................................9-1
9.1 NAT Overview...........................................................................................................................9-1
9.1.1 NAT Definitions.................................................................................................................9-1
9.1.2 What NAT Does.................................................................................................................9-2
9.1.3 How NAT Works ...............................................................................................................9-2
9.1.4 NAT Application................................................................................................................9-3
9.1.5 NAT Mapping Types .........................................................................................................9-4
9.1.6 SUA (Single User Account) Versus NAT..........................................................................9-5
9.2 SUA Server ................................................................................................................................9-6
9.2.1 Port Forwarding: Services and Port Numbers....................................................................9-6
9.2.2 Configuring Servers Behind SUA (Example)....................................................................9-7
9.3 Configuring SUA Server............................................................................................................9-7
9.4 Configuring Address Mapping...................................................................................................9-9
9.4.1 Configuring Address Mapping Rule ................................................................................9-11
Chapter 10 Static Route.............................................................................................................................10-1
10.1 Static Route Overview .............................................................................................................10-1
10.2 Configuring IP Static Route .....................................................................................................10-1
10.2.1 Configuring Route Entry..................................................................................................10-3
Table of Contents ix
ZyAIR G-2000 Wireless 4-port Router User’s Guide
FIREWALL AND REMOTE MANAGEMENT ......................................................................................... V
Chapter 11 Introduction to Firewalls....................................................................................................... 11-1
11.1 Firewall Overview ...................................................................................................................11-1
11.2 Types of Firewalls....................................................................................................................11-1
11.2.1 Packet Filtering Firewalls ................................................................................................11-1
11.2.2 Application-level Firewalls..............................................................................................11-1
11.2.3 Stateful Inspection Firewalls............................................................................................11-2
11.3 Introduction to ZyXEL’s Firewall ...........................................................................................11-2
11.4 Denial of Service .....................................................................................................................11-2
11.4.1 Basics...............................................................................................................................11-3
11.4.2 Types of DoS Attacks...................................................................................................... 11-4
11.5 Stateful Inspection ...................................................................................................................11-7
Chapter 12 Firewall Screens .....................................................................................................................12-1
12.1 Access Methods .......................................................................................................................12-1
12.2 Firewall Policies Overview......................................................................................................12-1
12.3 Rule Logic Overview...............................................................................................................12-2
12.3.1 Rule Checklist..................................................................................................................12-2
12.3.2 Security Ramifications.....................................................................................................12-2
12.3.3 Key Fields For Configuring Rules...................................................................................12-3
12.4 Guidelines For Enhancing Security With Your Firewall......................................................... 12-3
12.5 Connection Direction Examples ..............................................................................................12-4
12.5.1 LAN to WAN Rules.........................................................................................................12-4
12.5.2 WAN to LAN Rules.........................................................................................................12-5
12.6 Enabling Firewall..................................................................................................................... 12-6
12.6.1 Configuring Content Filtering..........................................................................................12-8
12.6.2 Configuring Firewall Services ....................................................................................... 12-11
12.6.3 Predefined Services........................................................................................................12-13
Chapter 13 Remote Management.............................................................................................................13-1
13.1 Remote Management Overview...............................................................................................13-1
13.1.1 Remote Management Limitations.................................................................................... 13-1
13.1.2 Remote Management and NAT .......................................................................................13-2
13.1.3 System Timeout ...............................................................................................................13-2
13.2 Telnet .......................................................................................................................................13-2
13.3 Configuring TELNET..............................................................................................................13-3
13.4 Configuring FTP ...................................................................................................................... 13-4
13.5 Configuring WWW..................................................................................................................13-5
13.6 Configuring SNMP ..................................................................................................................13-6
13.6.1 Supported MIBs............................................................................................................... 13-8
13.6.2 SNMP Traps ....................................................................................................................13-8
13.6.3 REMOTE MANAGEMENT: SNMP ..............................................................................13-9
13.7 Configuring DNS................................................................................................................... 13-10
x Table of Contents
ZyAIR G-2000 Wireless 4-port Router User’s Guide
13.8 Configuring Security..............................................................................................................13-11
UPNP AND LOGS........................................................................................................................................ VI
Chapter 14 UPnP Screen ...........................................................................................................................14-1
14.1 Universal Plug and Play Overview ..........................................................................................14-1
14.1.1 How Do I Know If I'm Using UPnP?...............................................................................14-1
14.1.2 NAT Traversal .................................................................................................................14-1
14.1.3 Cautions with UPnP.........................................................................................................14-2
14.2 UPnP and ZyXEL ....................................................................................................................14-2
14.3 Configuring UPnP....................................................................................................................14-2
14.4 Installing UPnP in Windows Example.....................................................................................14-4
14.4.1 Installing UPnP in Windows Me......................................................................................14-4
14.4.2 Installing UPnP in Windows XP......................................................................................14-5
14.5 Using UPnP in Windows XP Example ....................................................................................14-6
14.5.1 Auto-discover Your UPnP-enabled Network Device.......................................................14-6
14.5.2 Web Configurator Easy Access........................................................................................14-8
Chapter 15 Logs Screens ...........................................................................................................................15-1
15.1 Using the View Log Screen .....................................................................................................15-1
15.2 Configuring Log Settings .........................................................................................................15-3
15.3 Configuring Reports.................................................................................................................15-6
15.3.1 Viewing Protocol/Port......................................................................................................15-8
15.3.2 Viewing LAN IP Address ..............................................................................................15-10
15.3.3 Reports Specifications....................................................................................................15-11
MAINTENANCE........................................................................................................................................VII
Chapter 16 Maintenance ...........................................................................................................................16-1
16.1 Maintenance Overview ............................................................................................................16-1
16.2 System Status Screen ...............................................................................................................16-1
16.2.1 System Statistics...............................................................................................................16-2
16.3 DHCP Table Screen .................................................................................................................16-3
16.4 Wireless Screen........................................................................................................................16-4
16.5 F/W Upload Screen..................................................................................................................16-5
16.6 Configuration Screen ...............................................................................................................16-8
16.6.1 Backup Configuration ......................................................................................................16-8
16.6.2 Restore Configuration ......................................................................................................16-9
16.6.3 Back to Factory Defaults................................................................................................16-11
SMT GETTING STARTED MENUS...................................................................................................... VIII
Chapter 17 Introducing the SMT .............................................................................................................17-1
17.1 Connect to your ZyAIR Using Telnet ......................................................................................17-1
17.1.1 Entering Password............................................................................................................17-1
17.2 Changing the System Password ...............................................................................................17-1
17.3 ZyAIR SMT Menu Overview Example ...................................................................................17-2
17.4 Navigating the SMT Interface..................................................................................................17-4
Table of Contents xi
ZyAIR G-2000 Wireless 4-port Router User’s Guide
17.4.1 System Management Terminal Interface Summary......................................................... 17-5
Chapter 18 General and WAN Setup ....................................................................................................... 18-1
18.1 General Setup...........................................................................................................................18-1
18.1.1 Dynamic DNS..................................................................................................................18-1
18.1.2 Procedure To Configure Menu 1......................................................................................18-1
18.1.3 Procedure to Configure Dynamic DNS............................................................................18-3
18.2 WAN Setup.............................................................................................................................. 18-5
Chapter 19 LAN Setup.............................................................................................................................. 19-1
19.1 LAN Setup ............................................................................................................................... 19-1
19.1.1 General Ethernet Port Filter Setup...................................................................................19-1
19.2 TCP/IP Ethernet and DHCP Setup...........................................................................................19-2
19.3 IP Alias ....................................................................................................................................19-4
19.3.1 IP Alias Setup ..................................................................................................................19-5
19.4 Wireless LAN Setup ................................................................................................................19-6
19.4.1 Configuring MAC Address Filter .................................................................................... 19-9
19.4.2 Configuring Roaming on the ZyAIR .............................................................................19-11
Chapter 20 Internet Access ....................................................................................................................... 20-1
20.1 Internet Access Configuration .................................................................................................20-1
20.2 Internet Access Setup............................................................................................................... 20-2
SMT ADVANCED APPLICATION MENUS .............................................................................................IX
Chapter 21 Remote Node Configuration .................................................................................................21-1
21.1 Remote Node Profile................................................................................................................21-1
21.1.1 Encapsulation Scenarios ..................................................................................................21-1
21.1.2 Outgoing Authentication Protocol ...................................................................................21-4
21.1.3 Remote Node Setup .........................................................................................................21-5
21.2 Remote Node Filter.................................................................................................................. 21-6
21.2.1 IP Static Route Setup ....................................................................................................... 21-7
Chapter 22 Dial-in User Setup..................................................................................................................22-1
22.1 Dial-in User Setup ...................................................................................................................22-1
Chapter 23 Network Address Translation (NAT)....................................................................................23-1
23.1 Introduction..............................................................................................................................23-1
23.1.1 Applying NAT................................................................................................................. 23-1
23.2 NAT Setup ............................................................................................................................... 23-2
23.2.1 Address Mapping Sets .....................................................................................................23-3
23.2.2 Configuring Individual Rule............................................................................................23-6
23.3 Port Forwarding Setup - NAT Server Sets...............................................................................23-7
23.3.1 Configuring a Server behind NAT................................................................................... 23-8
23.4 General NAT Examples...........................................................................................................23-9
23.4.1 Example 1: Internet Access Only..................................................................................... 23-9
23.4.2 Example 2: Internet Access with an Inside Server......................................................... 23-11
23.4.3 Example 3: Multiple Public IP Addresses With Inside Servers ..................................... 23-11
xii Table of Contents
ZyAIR G-2000 Wireless 4-port Router User’s Guide
23.4.4 Example 4: NAT Unfriendly Application Programs......................................................23-15
23.5 Trigger Port Setup..................................................................................................................23-16
SMT ADVANCED MANAGEMENT MENUS............................................................................................X
Chapter 24 Filter and Firewall Configuration.........................................................................................24-1
24.1 About Filtering.........................................................................................................................24-1
24.2 Configuring a Filter Set............................................................................................................24-3
24.2.1 Filter Rules Summary Menus...........................................................................................24-5
24.3 Configuring a Filter Rule .........................................................................................................24-6
24.3.1 TCP/IP Filter Rule............................................................................................................24-6
24.3.2 Generic Filter Rule.........................................................................................................24-11
24.4 Filter Types and NAT ............................................................................................................24-12
24.5 Example Filter........................................................................................................................24-13
24.6 Applying Filters and Factory Defaults ...................................................................................24-15
24.6.1 Ethernet Traffic..............................................................................................................24-16
24.6.2 Remote Node Filters.......................................................................................................24-16
24.7 Firewall Setup ........................................................................................................................24-17
Chapter 25 SNMP Configuration .............................................................................................................25-1
25.1 SNMP Configuration ...............................................................................................................25-1
Chapter 26 System Security ......................................................................................................................26-1
26.1 System Security........................................................................................................................26-1
26.1.1 System Password..............................................................................................................26-1
26.1.2 Configuring External RADIUS Server.............................................................................26-1
26.1.3 802.1x...............................................................................................................................26-3
Chapter 27 System Information and Diagnosis.......................................................................................27-1
27.1 Overview..................................................................................................................................27-1
27.2 System Status ...........................................................................................................................27-1
27.3 System Information..................................................................................................................27-3
27.3.1 System Information ..........................................................................................................27-3
27.3.2 Console Port Speed ..........................................................................................................27-4
27.4 Log and Trace ..........................................................................................................................27-5
27.4.1 Viewing Error Log...........................................................................................................27-5
27.4.2 UNIX Syslog....................................................................................................................27-6
27.4.3 Call-Triggering Packet.....................................................................................................27-7
27.5 Diagnostic ................................................................................................................................27-7
Chapter 28 Firmware and Configuration File Maintenance..................................................................28-1
28.1 Filename Conventions..............................................................................................................28-1
28.2 Backup Configuration ..............................................................................................................28-2
28.2.1 Backup Configuration ......................................................................................................28-3
28.2.2 Using the FTP Command from the Command Line.........................................................28-3
28.2.3 Example of FTP Commands from the Command Line....................................................28-4
28.2.4 GUI-based FTP Clients ....................................................................................................28-4
Table of Contents xiii
ZyAIR G-2000 Wireless 4-port Router User’s Guide
28.2.5 TFTP and FTP over WAN Management Limitations......................................................28-4
28.2.6 Backup Configuration Using TFTP ................................................................................. 28-5
28.2.7 TFTP Command Example ...............................................................................................28-5
28.2.8 GUI-based TFTP Clients .................................................................................................28-5
28.3 Restore Configuration..............................................................................................................28-6
28.3.1 Restore Using FTP........................................................................................................... 28-6
28.3.2 Restore Using FTP Session Example...............................................................................28-7
28.4 Uploading Firmware and Configuration Files .........................................................................28-8
28.4.1 Firmware File Upload...................................................................................................... 28-8
28.4.2 Configuration File Upload............................................................................................... 28-9
28.4.3 FTP File Upload Command from the DOS Prompt Example........................................ 28-10
28.4.4 FTP Session Example of Firmware File Upload............................................................ 28-10
28.4.5 TFTP File Upload .......................................................................................................... 28-10
28.4.6 TFTP Upload Command Example................................................................................. 28-11
Chapter 29 System Maintenance and SMT Menu 24.8 to 24.10........................................................... 29-1
29.1 Command Interpreter Mode.....................................................................................................29-1
29.2 Call Control Support................................................................................................................ 29-2
29.2.1 Call Control Parameters................................................................................................... 29-2
29.2.2 Blacklist ........................................................................................................................... 29-3
29.2.3 Budget Management........................................................................................................29-4
29.2.4 Call History......................................................................................................................29-5
29.3 Time and Date Setting .............................................................................................................29-5
29.3.1 Resetting the Time...........................................................................................................29-7
Chapter 30 Remote Management.............................................................................................................30-1
30.1 Telnet .......................................................................................................................................30-1
30.2 FTP ..........................................................................................................................................30-1
30.3 Web.......................................................................................................................................... 30-1
30.4 Remote Management ...............................................................................................................30-1
30.4.1 Remote Management Setup............................................................................................. 30-2
30.4.2 Remote Management Limitations.................................................................................... 30-3
30.5 Remote Management and NAT ...............................................................................................30-4
30.6 System Timeout ....................................................................................................................... 30-4
Chapter 31 Call Scheduling ......................................................................................................................31-1
31.1 Introduction..............................................................................................................................31-1
APPENDICES...............................................................................................................................................XI
Appendix A Troubleshooting...................................................................................................................... A-1
Problems Starting Up the ZyAIR......................................................................................................... A-1
Problems with the Password ................................................................................................................A-1
Problems with the Ethernet Interface................................................................................................... A-2
Problems with the WAN Interface....................................................................................................... A-2
Problems with Internet Access............................................................................................................. A-3
xiv Table of Contents
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Problems with Telnet ...........................................................................................................................A-3
Problems with the WLAN Interface.....................................................................................................A-4
Appendix B Brute-Force Password Guessing Protection ........................................................................B-1
Appendix C Setting up Your Computer’s IP Address..............................................................................C-1
Appendix D Wireless LAN and IEEE 802.11............................................................................................D-1
Appendix E Wireless LAN With IEEE 802.1x.......................................................................................... E-1
Appendix F Types of EAP Authentication................................................................................................. F-1
Appendix G Antenna Selection and Positioning Recommendation ....................................................... G-1
Appendix H PPPoE.................................................................................................................................... H-1
Appendix I PPTP .........................................................................................................................................I-1
Appendix J IP Subnetting............................................................................................................................J-1
Appendix K Triangle Route ...................................................................................................................... K-1
Appendix L Command Interpreter ...........................................................................................................L-1
Appendix M NetBIOS Filter Commands.................................................................................................M-1
Appendix N Log Descriptions ....................................................................................................................N-1
Appendix O Power Adaptor Specifications.............................................................................................. O-1
Appendix P Index........................................................................................................................................ P-1
Table of Contents xv
ZyAIR G-2000 Wireless 4-port Router User’s Guide

List of Figures

Figure 1-1 Internet Access Application Example ........................................................................................1-6
Figure 2-1 Web Browser Address Field .......................................................................................................2-1
Figure 2-2 Change Password Screen ...........................................................................................................2-2
Figure 2-3 Navigating the ZyAIR Web Configurator ..................................................................................2-3
Figure 3-1 Wizard 1: General Setup ............................................................................................................3-2
Figure 3-2 Wizard 2: Wireless LAN Setup ..................................................................................................3-4
Figure 3-3 Wizard 3: Ethernet Encapsulation..............................................................................................3-6
Figure 3-4 Wizard 3: PPPoE Encapsulation ................................................................................................3-8
Figure 3-5 Wizard 3: PPTP Encapsulation.................................................................................................3-10
Figure 3-6 Wizard 4: WAN and DNS ........................................................................................................3-14
Figure 3-7 Setup Complete........................................................................................................................ 3-16
Figure 4-1 System General Setup ................................................................................................................ 4-1
Figure 4-2 DDNS.........................................................................................................................................4-3
Figure 4-3 Password ....................................................................................................................................4-5
Figure 4-4 Time Setting...............................................................................................................................4-6
Figure 5-1 LAN & WAN IPs .......................................................................................................................5-1
Figure 5-2 IP................................................................................................................................................5-4
Figure 6-1 IBSS (Ad-hoc) Wireless LAN.................................................................................................... 6-1
Figure 6-2 Basic Service set ........................................................................................................................6-2
Figure 6-3 Extended Service Set..................................................................................................................6-3
Figure 6-4 RTS/CTS .................................................................................................................................... 6-4
Figure 6-5 Wireless......................................................................................................................................6-6
Figure 6-6 Roaming Example......................................................................................................................6-8
Figure 6-7 Roaming.....................................................................................................................................6-9
Figure 7-1 ZyAIR Wireless Security Levels................................................................................................ 7-1
Figure 7-2 WEP Authentication Steps .........................................................................................................7-2
Figure 7-3 Wireless......................................................................................................................................7-4
Figure 7-4 MAC Address Filter...................................................................................................................7-7
Figure 7-5 WPA - PSK Authentication ......................................................................................................7-10
Figure 7-6 WPA with RADIUS Application Example............................................................................... 7-11
Figure 7-7 Wireless LAN: 802.1x/WPA ....................................................................................................7-13
Figure 7-8 Wireless LAN: 802.1x/WPA for 802.1x Protocol ....................................................................7-14
Figure 7-9 Wireless LAN: 802.1x/WPA for WPA Protocol.......................................................................7-17
Figure 7-10 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol ............................................................7-19
Figure 7-11 Local User Database...............................................................................................................7-21
Figure 7-12 EAP Authentication................................................................................................................ 7-23
Figure 7-13 RADIUS................................................................................................................................. 7-24
Figure 8-1 Ethernet Encapsulation .................................................................................................................8-1
Figure 8-2 Service Type................................................................................................................................8-2
xvi List of Figures
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Figure 8-3 PPPoE Encapsulation....................................................................................................................8-4
Figure 8-4 PPTP Encapsulation......................................................................................................................8-5
Figure 8-5 IP Setup........................................................................................................................................8-7
Figure 8-6 MAC Setup ................................................................................................................................8-10
Figure 9-1 How NAT Works ........................................................................................................................9-3
Figure 9-2 NAT Application with IP Alias ...................................................................................................9-4
Figure 9-3 Multiple Servers Behind NAT Example.....................................................................................9-7
Figure 9-4 SUA/NAT Setup .........................................................................................................................9-8
Figure 9-5 Address Mapping......................................................................................................................9-10
Figure 9-6 Address Mapping Rule .............................................................................................................9-11
Figure 10-1 Example of Static Routing Topology......................................................................................10-1
Figure 10-2 IP Static Route Summary........................................................................................................10-2
Figure 10-3 Edit IP Static Route ................................................................................................................10-3
Figure 11-1 Firewall Application...............................................................................................................11-3
Figure 11-2 Three-Way Handshake............................................................................................................11-4
Figure 11-3 SYN Flood..............................................................................................................................11-5
Figure 11-4 Smurf Attack...........................................................................................................................11-6
Figure 11-5 Stateful Inspection ..................................................................................................................11-8
Figure 12-1 LAN to WAN Traffic..............................................................................................................12-5
Figure 12-2 WAN to LAN Traffic..............................................................................................................12-6
Figure 12-3 Firewall Settings.....................................................................................................................12-7
Figure 12-4 Firewall Filter.........................................................................................................................12-9
Figure 12-5 Firewall Services .................................................................................................................. 12-11
Figure 13-1 Telnet Configuration on a TCP/IP Network ...........................................................................13-2
Figure 13-2 Telnet......................................................................................................................................13-3
Figure 13-3 FTP.........................................................................................................................................13-4
Figure 13-4 WWW.....................................................................................................................................13-5
Figure 13-5 SNMP Management Model....................................................................................................13-7
Figure 13-6 SNMP.....................................................................................................................................13-9
Figure 13-7 DNS...................................................................................................................................... 13-11
Figure 13-8 Security.................................................................................................................................13-12
Figure 14-1 Configuring UPnP ..................................................................................................................14-3
Figure 15-1 View Log ................................................................................................................................15-2
Figure 15-2 Log Settings............................................................................................................................15-4
Figure 15-3 Reports ...................................................................................................................................15-7
Figure 15-4 Protocol/Port Report...............................................................................................................15-9
Figure 15-5 LAN IP Address Report........................................................................................................15-10
Figure 16-1 System Status .........................................................................................................................16-1
Figure 16-2 System Status: Show Statistics ...............................................................................................16-2
Figure 16-3 DHCP Table............................................................................................................................16-4
Figure 16-4 Association List......................................................................................................................16-5
List of Figures xvii
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Figure 16-5 Firmware Upgrade .................................................................................................................16-6
Figure 16-6 Firmware Upload In Process.................................................................................................. 16-7
Figure 16-7 Network Temporarily Disconnected....................................................................................... 16-7
Figure 16-8 Firmware Upload Error..........................................................................................................16-8
Figure 16-9 Backup Configuration ............................................................................................................ 16-9
Figure 16-10 Restore Configuration .......................................................................................................... 16-9
Figure 16-11 Configuration Upload Successful.......................................................................................16-10
Figure 16-12 Network Temporarily Disconnected...................................................................................16-10
Figure 16-13 Configuration Upload Error ...............................................................................................16-11
Figure 16-14 Back to Factory Default .....................................................................................................16-11
Figure 16-15 Reset Warning Message .....................................................................................................16-12
Figure 17-1 Login Screen ..........................................................................................................................17-1
Figure 17-2 Menu 23.1 System Security : Change Password.................................................................... 17-2
Figure 17-3 ZyAIR SMT Menu Overview Example ................................................................................. 17-3
Figure 17-4 ZyAIR SMT Main Menu........................................................................................................17-5
Figure 18-1 Menu 1 General Setup............................................................................................................18-2
Figure 18-2 Menu 1.1 Configure Dynamic DNS.......................................................................................18-3
Figure 18-3 Menu 2 WAN Setup ...............................................................................................................18-5
Figure 19-1 Menu 3 LAN Setup................................................................................................................ 19-1
Figure 19-2 Menu 3.1 LAN Port Filter Setup............................................................................................19-1
Figure 19-3 Menu 3.2 TCP/IP and DHCP Ethernet Setup......................................................................... 19-2
Figure 19-4 Physical Network ...................................................................................................................19-4
Figure 19-5 Partitioned Logical Networks.................................................................................................19-4
Figure 19-6 Menu 3.2 TCP/IP and DHCP Ethernet Setup......................................................................... 19-5
Figure 19-7 Menu 3.2.1 IP Alias Setup......................................................................................................19-5
Figure 19-8 Menu 3.5 Wireless LAN Setup ..............................................................................................19-7
Figure 19-9 Menu 3.5 Wireless LAN Setup ..............................................................................................19-9
Figure 19-10 Menu 3.5.1 WLAN MAC Address Filter ...........................................................................19-10
Figure 19-11 Menu 3.5 Wireless LAN Setup........................................................................................... 19-11
Figure 19-12 Menu 3.5.2 Roaming Configuration ..................................................................................19-11
Figure 20-1 Menu 4 Internet Access Setup................................................................................................20-2
Figure 21-1 Menu 11.1 Remote Node Profile............................................................................................21-2
Figure 21-2 Menu 11.3 Remote Node Network Layer Options................................................................. 21-5
Figure 21-3 Menu 11.5 Remote Node Filter (Ethernet Encapsulation ) ....................................................21-7
Figure 21-4 Menu 11.5 Remote Node Filter (PPTP or PPPoE Encapsulation).......................................... 21-7
Figure 21-5 Menu 12.1 IP Static Route Setup ...........................................................................................21-8
Figure 21-6 Menu 12.1 Edit IP Static Route..............................................................................................21-8
Figure 22-1 Menu 14 Dial-in User Setup...................................................................................................22-1
Figure 22-2 Menu 14.1 Edit Dial-in User..................................................................................................22-1
Figure 23-1 Menu 4 Internet Access Setup................................................................................................23-1
Figure 23-2 Menu 11.3 Remote Node Network Layer Options................................................................. 23-2
xviii List of Figures
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Figure 23-3 Menu 15 NAT Setup...............................................................................................................23-3
Figure 23-4 Menu 15.1 Address Mapping Sets..........................................................................................23-3
Figure 23-5 Menu 15.1.255 SUA Address Mapping Rules........................................................................23-4
Figure 23-6 Menu 15.1.1 Address Mapping Rules ....................................................................................23-5
Figure 23-7 Menu 15.1.1.1 Address Mapping Rule ...................................................................................23-6
Figure 23-8 Menu 15.2 Port Forwarding Setup .........................................................................................23-9
Figure 23-9 NAT Example 1 ....................................................................................................................23-10
Figure 23-10 Menu 4 Internet Access Setup ............................................................................................23-10
Figure 23-11 NAT Example 2 .................................................................................................................. 23-11
Figure 23-12 Menu 15.2.1 NAT Server Setup..........................................................................................23-11
Figure 23-13 NAT Example 3 ..................................................................................................................23-12
Figure 23-14 Menu 11.3 Remote Node Network Layer Options.............................................................23-13
Figure 23-15 Menu 15.1.1.1 Address Mapping Rule ...............................................................................23-13
Figure 23-16 Menu 15.1.1 Address Mapping Rules ................................................................................23-14
Figure 23-17 NAT Example 4 ..................................................................................................................23-15
Figure 23-18 Menu 15.1.1.1 Address Mapping Rule ...............................................................................23-15
Figure 23-19 Menu 15.1.1 Address Mapping Rules ................................................................................23-16
Figure 23-20 Trigger Port Forwarding Process: Example........................................................................23-16
Figure 23-21 Menu 15.3 Trigger Port Setup ............................................................................................23-17
Figure 24-1 Outgoing Packet Filtering Process .........................................................................................24-1
Figure 24-2 Filter Rule Process..................................................................................................................24-2
Figure 24-3 Menu 21.1 Filter Set Configuration........................................................................................24-3
Figure 24-4 NetBIOS_WAN Filter Rules Summary ..................................................................................24-4
Figure 24-5 NetBIOS_LAN Filter Rules Summary...................................................................................24-4
Figure 24-6 TEL_FTP_WEB_WAN Filter Rules Summary ......................................................................24-4
Figure 24-7 Menu 21.1.1 TCP/IP Filter Rule.............................................................................................24-7
Figure 24-8 Executing an IP Filter...........................................................................................................24-10
Figure 24-9 Menu 21.1.4.1 Generic Filter Rule.......................................................................................24-11
Figure 24-10 Protocol and Device Filter Sets ..........................................................................................24-13
Figure 24-11 Sample Telnet Filter............................................................................................................24-13
Figure 24-12 Sample Filter - Menu 21.1.3.1............................................................................................24-14
Figure 24-13 Sample Filter Rules Summary - Menu 21.1.3 ....................................................................24-15
Figure 24-14 Filtering Ethernet Traffic....................................................................................................24-16
Figure 24-15 Filtering Remote Node Traffic ...........................................................................................24-16
Figure 25-1 Menu 22 SNMP Configuration...............................................................................................25-1
Figure 26-1 Menu 23 System Security.......................................................................................................26-1
Figure 26-2 Menu 23 System Security.......................................................................................................26-1
Figure 26-3 Menu 23.2 System Security : RADIUS Server ......................................................................26-2
Figure 26-4 Menu 23 System Security.......................................................................................................26-3
Figure 26-5 Menu 23.4 System Security : IEEE802.1x.............................................................................26-4
Figure 27-1 Menu 24 System Maintenance ...............................................................................................27-1
List of Figures xix
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Figure 27-2 Menu 24.1 System Maintenance : Status ...............................................................................27-2
Figure 27-3 Menu 24.2 System Information and Console Port Speed....................................................... 27-3
Figure 27-4 Menu 24.2.1 System Maintenance : Information ...................................................................27-4
Figure 27-5 Menu 24.2.2 System Maintenance : Change Console Port Speed..........................................27-5
Figure 27-6 Menu 24.3 System Maintenance : Log and Trace.................................................................. 27-5
Figure 27-7 Sample Error and Information Messages...............................................................................27-6
Figure 27-8 Menu 24.3.2 System Maintenance : UNIX Syslog ................................................................27-6
Figure 27-9 Menu 24.4 System Maintenance : Diagnostic........................................................................ 27-7
Figure 28-1 Telnet in Menu 24.5 ...............................................................................................................28-3
Figure 28-2 FTP Session Example.............................................................................................................28-4
Figure 28-3 Telnet into Menu 24.6 ............................................................................................................28-7
Figure 28-4 Restore Using FTP Session Example ..................................................................................... 28-8
Figure 28-5 Telnet Into Menu 24.7.1 Upload System Firmware ...............................................................28-9
Figure 28-6 Telnet Into Menu 24.7.2 System Maintenance ....................................................................... 28-9
Figure 28-7 FTP Session Example of Firmware File Upload..................................................................28-10
Figure 29-1 Menu 24 System Maintenance............................................................................................... 29-1
Figure 29-2 Valid CI Commands ...............................................................................................................29-1
Figure 29-3 Menu24.9 System Maintenance : Call Control ......................................................................29-2
Figure 29-4 Menu 24.9.1 Call Control Parameters.................................................................................... 29-2
Figure 29-5 Menu 24.9.2 Blacklist ............................................................................................................29-3
Figure 29-6 Menu 24.9.3 Budget Management......................................................................................... 29-4
Figure 29-7 Menu 24.9.2 Call History....................................................................................................... 29-5
Figure 29-8 Menu 24.10 System Maintenance : Time and Date Setting ...................................................29-6
Figure 30-1 Telnet Configuration on a TCP/IP Network ...........................................................................30-1
Figure 30-2 Menu 24.11 Remote Management Control ............................................................................30-2
Figure 31-1 Menu 26 Schedule Setup........................................................................................................ 31-1
Figure 31-2 Menu 26.1 Schedule Set Setup...............................................................................................31-2
Figure 31-3 Applying Schedule Set(s) to a Remote Node (PPTP) ............................................................31-4
xx List of Figures
ZyAIR G-2000 Wireless 4-port Router User’s Guide

List of Tables

Table 3-1 Wizard 1: General Setup ..............................................................................................................3-3
Table 3-2 Wizard 2: Wireless LAN Setup....................................................................................................3-4
Table 3-3 Wizard 3: Ethernet Encapsulation................................................................................................3-6
Table 3-4 Wizard 3: PPPoE Encapsulation ..................................................................................................3-8
Table 3-5 Wizard 3: PPTP Encapsulation ..................................................................................................3-10
Table 3-6 Private IP Address Ranges .........................................................................................................3-11
Table 3-7 Example of Network Properties for LAN Servers with Fixed IP Addresses..............................3-13
Table 3-8 Wizard 4: WAN and DNS ..........................................................................................................3-14
Table 4-1 System General Setup..................................................................................................................4-2
Table 4-2 DDNS...........................................................................................................................................4-4
Table 4-3 Password ......................................................................................................................................4-5
Table 4-4 Time Setting.................................................................................................................................4-6
Table 5-1 IP..................................................................................................................................................5-4
Table 6-1 Wireless........................................................................................................................................6-7
Table 6-2 Roaming.....................................................................................................................................6-10
Table 7-1 Wireless : WEP Fields..................................................................................................................7-5
Table 7-2 MAC Address Filter.....................................................................................................................7-8
Table 7-3 Wireless Security Relational Matrix ..........................................................................................7-12
Table 7-4 Wireless LAN: 802.1x/WPA ......................................................................................................7-13
Table 7-5 Wireless LAN: 802.1x/WPA for 802.1x Protocol ......................................................................7-14
Table 7-6 Wireless LAN: 802.1x/WPA for WPA Protocol.........................................................................7-17
Table 7-7 Wireless LAN: 802.1x/WPA for WPA-PSK Protocol ................................................................7-19
Table 7-8 Local User Database ..................................................................................................................7-22
Table 7-9 RADIUS.....................................................................................................................................7-25
Table 8-1 Ethernet Encapsulation...................................................................................................................8-2
Table 8-2 Service Type..................................................................................................................................8-3
Table 8-3 PPPoE Encapsulation .....................................................................................................................8-4
Table 8-4 PPTP Encapsulation .......................................................................................................................8-6
Table 8-5 IP Setup .........................................................................................................................................8-7
Table 9-1 NAT Definitions...........................................................................................................................9-1
Table 9-2 NAT Mapping Types....................................................................................................................9-5
Table 9-3 Services and Port Numbers..........................................................................................................9-6
Table 9-4 SUA/NAT Setup...........................................................................................................................9-8
Table 9-5 Address Mapping .......................................................................................................................9-10
Table 9-6 Address Mapping Rule............................................................................................................... 9-11
Table 10-1 IP Static Route Summary .........................................................................................................10-2
Table 10-2 Edit IP Static Route..................................................................................................................10-3
Table 11-1 Common IP Ports .....................................................................................................................11-3
Table 11-2 ICMP Commands That Trigger Alerts......................................................................................11-6
Lists of Tables xxi
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Table 11-3 Legal NetBIOS Commands .....................................................................................................11-6
Table 11-4 Legal SMTP Commands.......................................................................................................... 11-7
Table 12-1 Firewall Settings ...................................................................................................................... 12-7
Table 12-2 Firewall Filter ........................................................................................................................12-10
Table 12-3 Creating/Editing A Firewall Rule ..........................................................................................12-12
Table 12-4 Predefined Services ...............................................................................................................12-13
Table 13-1 Telnet .......................................................................................................................................13-3
Table 13-2 FTP ..........................................................................................................................................13-4
Table 13-3 WWW...................................................................................................................................... 13-5
Table 13-4 SNMP Traps.............................................................................................................................13-8
Table 13-5 Ports and Interface Types......................................................................................................... 13-8
Table 13-6 SNMP ......................................................................................................................................13-9
Table 13-7 DNS .......................................................................................................................................13-11
Table 13-8 Security..................................................................................................................................13-12
Table 14-1 Configuring UPnP ...................................................................................................................14-3
Table 15-1 View Log .................................................................................................................................15-2
Table 15-2 Log Settings.............................................................................................................................15-5
Table 15-3 Reports..................................................................................................................................... 15-8
Table 15-4 Protocol/Port Report ................................................................................................................ 15-9
Table 15-5 LAN IP Address Report ......................................................................................................... 15-11
Table 15-6 Report Specifications............................................................................................................. 15-11
Table 16-1 System Status...........................................................................................................................16-2
Table 16-2 System Status: Show Statistics ................................................................................................16-3
Table 16-3 DHCP Table............................................................................................................................. 16-4
Table 16-4 Association List .......................................................................................................................16-5
Table 16-5 Firmware Upgrade...................................................................................................................16-6
Table 16-6 Restore Configuration............................................................................................................16-10
Table 17-1 Main Menu Commands ...........................................................................................................17-4
Table 17-2 Main Menu Summary.............................................................................................................. 17-5
Table 18-1 Menu 1 General Setup .............................................................................................................18-2
Table 18-2 Menu 1.1 Configure Dynamic DNS ........................................................................................18-3
Table 18-3 Menu 2 WAN Setup.................................................................................................................18-5
Table 19-1 Menu 3.2 DHCP Ethernet Setup..............................................................................................19-3
Table 19-2 Menu3.2 TCP/IP Ethernet Setup.............................................................................................. 19-3
Table 19-3 Menu 3.2.1 IP Alias Setup .......................................................................................................19-6
Table 19-4 Menu 3.5 Wireless LAN Setup ................................................................................................ 19-7
Table 19-5 Menu 3.5.1 WLAN MAC Address Filter...............................................................................19-10
Table 19-6 Menu 3.5.2 Roaming Configuration...................................................................................... 19-11
Table 20-1 Internet Account Information...................................................................................................20-1
Table 20-2 Menu 4 Internet Access Setup .................................................................................................20-2
Table 21-1 Menu 11.1 Remote Node Profile .............................................................................................21-2
xxii Lists of Tables
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Table 21-2 Menu 11.3 Remote Node Network Layer Options...................................................................21-5
Table 21-3 Menu 12.1 Edit IP Static Route................................................................................................21-8
Table 22-1 Menu 14.1- Edit Dial-in User...................................................................................................22-2
Table 23-1 Applying NAT in Menus 4 & 11.3 ...........................................................................................23-2
Table 23-2 Menu 15.1.255 SUA Address Mapping Rules .........................................................................23-4
Table 23-3 Menu 15.1.1 Address Mapping Rules ......................................................................................23-5
Table 23-4 Menu 15.1.1.1 Address Mapping Rule.....................................................................................23-6
Table 23-5 Services & Port Numbers.........................................................................................................23-8
Table 23-6 Menu 15.3 Trigger Port Setup................................................................................................23-17
Table 24-1 Abbreviations Used in the Filter Rules Summary Menu..........................................................24-5
Table 24-2 Rule Abbreviations Used .........................................................................................................24-5
Table 24-3 Menu 21.1.1 TCP/IP Filter Rule ..............................................................................................24-7
Table 24-4 Menu 21.1.4.1 Generic Filter Rule.........................................................................................24-11
Table 24-5 Filter Sets Table .....................................................................................................................24-15
Table 25-1 Menu 22 SNMP Configuration................................................................................................25-1
Table 26-1 Menu 23.2 System Security : RADIUS Server........................................................................26-2
Table 26-2 Menu 23.4 System Security : IEEE802.1x...............................................................................26-4
Table 27-1 Menu 24.1 System Maintenance : Status .................................................................................27-2
Table 27-2 Menu 24.2.1 System Maintenance – Information....................................................................27-4
Table 27-3 Menu 24.3.2 System Maintenance : UNIX Syslog ..................................................................27-6
Table 27-4 Menu 24.4 System Maintenance : Diagnostic..........................................................................27-8
Table 28-1 Filename Conventions..............................................................................................................28-2
Table 28-2 General Commands for GUI-based FTP Clients......................................................................28-4
Table 28-3 General Commands for GUI-based TFTP Clients ...................................................................28-6
Table 29-1 Menu 24.9.1 Call Control Parameters......................................................................................29-3
Table 29-2 Menu 24.9.1 Budget Management...........................................................................................29-4
Table 29-3 Menu 24.9.2 Call History.........................................................................................................29-5
Table 29-4 Menu 24.10 System Maintenance : Time and Date Setting .....................................................29-6
Table 30-1 Menu 24.11 Remote Management Control ..............................................................................30-3
Table 31-1 Menu 26.1 Schedule Set Setup.................................................................................................31-2
Lists of Tables xxiii
ZyAIR G-2000 Wireless 4-port Router User’s Guide

Preface

Congratulations on your purchase from the ZyAIR G-2000 802.11g Wireless 4-port Router.
A wireless router is an access point and router rolled into one. It is a cost-effect solution to share Internet access with multiple computers and expand your wired network.
This User’s Guide is designed to guide you through the configuration of your ZyAIR using the web configurator or the SMT.
Use the web configurator, System Management Terminal (SMT) or command
interpreter interface to configure your ZyAIR. Not all features can be configured
through all interfaces.
The web configurator parts of this guide contain background information on features configurable by the web configurator and the SMT. The SMT parts of this guide contain background information solely on features not configurable by the web configurator.
Register your product online to receive e-mail notices of firmware upgrades and
information at www.zyxel.com for global products, or at www.us.zyxel.com for
North American products.
Related Documentation
Supporting Disk
Refer to the included CD for support documents.
Quick Installation Guide
Our Quick Installation Guide is designed to help you get up and running right away. It contains
information on the configuration of key features and hardware connections and installation.
ZyXEL Web Site
The ZyXEL download library at www.zyxel.com Please also refer to www.zyxel.com for an online glossary of networking terms.
contains additional support documentation.
Syntax Conventions
“Enter” means for you to type one or more characters (and press the carriage return). “Select” or “Choose” means for you to use one predefined choices.
Enter, or carriage return, key; [ESC] means the escape key and [SPACE BAR] means the space bar. [UP] and [DOWN] are the up and down arrow keys.
xxiv Preface
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Mouse action sequences are denoted using a comma. For example, “click the Apple icon, Control Panels and then Modem” means first click the Apple icon, then point your mouse pointer to Control Panels and then click Modem.
For brevity’s sake, we will use “e.g.,” as a shorthand for “for instance”, and “i.e.,” for “that is” or “in other words” throughout this manual.
The ZyAIR G-2000 802.11g Wireless 4-port Router may be referred to simply as the ZyAIR in the user’s guide.
User Guide Feedback
Help us help you. E-mail all User Guide-related comments, questions or suggestions for improvement to techwriters@zyxel.com.tw or send regular mail to The Technical Writing Team, ZyXEL Communications Corp., 6 Innovation Road II, Science-Based Industrial Park, Hsinchu, 300, Taiwan. Thank you.
Graphics Icons Key
ZyAIR
Server
Firewall
Wireless Signal
Computer
Modem
Router
Notebook Computer
DSLAM (Digital Subscriber
Line Access Multiplexer)
Switch
Preface xxv
Overview
Part I:
OVERVIEW
This part introduces the main features and applications of the ZyAIR and shows how to access
the web configurator and use the Wizard to configure for Internet Access.
I
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Chapter 1

Getting to Know Your ZyAIR

This chapter introduces the main features and applications of the ZyAIR.

1.1 Introducing the ZyAIR

The ZyAIR G-2000, an IEEE802.11b/g compliant broadband wireless sharing gateway, provides wireless connectivity. As an Internet gateway, your ZyAIR can share an Internet connection (through a cable or xDSL modem) with multiple computers using SUA/NAT and DHCP. The ZyAIR offers highly secured wireless connectivity to your wired network with IEEE 802.1x, WEP data encryption, WPA (Wi-Fi Protected Access) and MAC address filtering.
The ZyAIR is easy to install and configure. The embedded web-based configurator and SNMP network management enables remote configuration and management of your ZyAIR.
1.2 ZyAIR Features
The following sections describe the features of the ZyAIR.
4-Port Switch
A combination of switch and router makes your ZyAIR a cost-effective and viable network solution. You can connect up to four computers to the LAN ports on you ZyAIR without the cost of a hub.
10/100M Auto-negotiating Ethernet/Fast Ethernet Interface
This auto-negotiating feature allows the ZyAIR to detect the speed of incoming transmissions and adjust appropriately without manual intervention. It allows data transfer of either 10 Mbps or 100 Mbps in either half-duplex or full-duplex mode depending on your Ethernet network.
10/100M Auto-crossover Ethernet/Fast Ethernet Interface
The LAN interface automatically adjusts to either a crossover or straight-through Ethernet cable.
10/100 Mbps Ethernet WAN
The 10/100 Mbps Ethernet WAN port attaches to the Internet via broadband modem or router.
Getting to Know Your ZyAIR 1-1
ZyAIR G-2000 Wireless 4-port Router User’s Guide
Reset Button
The ZyAIR reset button is built into the side panel. Use this button to restore the factory default password to 1234; IP address to 192.168.1.1, subnet mask to 255.255.255.0 and DHCP sever enabled with a pool of 32 IP addresses starting at 192.168.1.33.
Brute-Force Password Guessing Protection
The ZyAIR has a special protection mechanism to discourage brute-force password guessing attacks on the ZyAIR's management interfaces. You can specify a wait-time that must expire before entering a fourth password after three incorrect passwords have been entered. Please see the appendix for details about this feature.
ZyAIR LED
The blue ZyAIR LED (also known as the Breathing LED) is on when the ZyAIR is on and blinks (or breaths) when data is being transmitted to/from its wireless stations. You may use the web configurator to turn this LED off even when the ZyAIR is on and data is being transmitted/received.
802.11b Wireless LAN Standard
ZyAIR products containing the letter “B” in the model name, such as ZyAIR B-2000, ZyAIR B-2000 v.2, comply with the 802.11b wireless standard.
The 802.11b data rate and corresponding modulation techniques are as follows. The modulation technique defines how bits are encoded onto radio waves.
802.11b
Data Rate (Mbps) Modulation
1 DBPSK (Differential Binary Phase Shift Keyed)
2
5.5 / 11 CCK (Complementary Code Keying)
DQPSK (Differential Quadrature Phase Shift Keying
)
The ZyAIR may be prone to RF (Radio Frequency) interference from other 2.4 GHz
devices such as microwave ovens, wireless phones, Bluetooth enabled devices,
and other wireless LANs.
802.11g Wireless LAN Standard
ZyAIR products containing the letter “G” in the model name, such as ZyAIR G-1000 and ZyAIR G-2000, comply with the 802.11g wireless standard.
802.11g will be fully compatible with the 802.11b standard. This means an 802.11b radio card can interface directly with an 802.11g access point (and vice versa) at 11 Mbps or lower depending on range. 802.11g
1-2 Getting to Know Your ZyAIR
Loading...
+ 377 hidden pages