Home

ZyXEL ZyAIR G-570S User's Manual

image

Contents

1. Chapter 1 Getting to Know Your G 570S 27 ZyXEL G 5708 User s Guide Table 1 Front Panel LED Description LED COLOR STATUS DESCRIPTION ETHN Green Blinking The G 5708 is sending receiving data On The G 570S has a successful 10Mbps Ethernet connection Amber Blinking The G 5708 is sending receiving data On The G 570S has a successful 100Mbps Ethernet connection Off The G 5708 does not have an Ethernet connection OTIST Green Blinking The OTIST automatic wireless configuration is in progress On The OTIST feature is activated on the G 5708 Off The OTIST feature is not activated or activated but the wireless settings have been changed WLAN Green Blinking The G 5708 is sending or receiving data through the wireless LAN On The G 570S is ready but is not sending receiving data 28 Chapter 1 Getting to Know Your G 570S ZyXEL G 5708 User s Guide CHAPTER 2 Management Computer Setup This chapter describes how to prepare your computer to access the G 570S web configurator 2 1 Introduction You can connect a computer to the G 570S for management purposes either using an Ethernet connection recommended for a first time management session or wirelessly 2 2 Wired Connection You must prepare your computer computer network to connect to the G 5708 if you are using a wired connection Your computer s IP address and subnet mask must be on the same subnet as the G 570S
2. RTS CTS Enter a value between 0 and 2432 The default is 2432 Threshold Fragmentation Enter a value between 256 and 2432 The default is 2432 It is the maximum data fragment size that can be sent Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 4 Wireless Security Overview Wireless security is vital to your network to protect wireless communication between wireless stations access points and the wired network Chapter 6 Wireless Screens 73 ZyXEL G 5708 User s Guide The figure below shows the possible wireless security levels on your G 570S EAP Extensible Authentication Protocol is used for authentication and utilizes dynamic WEP key exchange It requires interaction with a RADIUS Remote Authentication Dial In User Service server either on the WAN or your LAN to provide authentication service for wireless stations Table 15 Wireless Security Levels SECURITY LEVEL SECURITY TYPE Least Secure Unique SSID Default Unique SSID with Hide SSID Enabled MAC Address Filtering WEP Encryption IEEE802 1x EAP with RADIUS Server Authentication Wi Fi Protected Access WPA WPA2 Most Secure If you do not enable any wireless security on your G 570S your network is accessible to any wireless networking device that is within range 6 4 1 Encryption Use WPA 2 security if you have WP 2 A aware
3. a Peak Output Power is 11b 17 32 dBm 11g 21 48 dBm Turbo mode 22 25 dBm Approvals Table 35 Approvals North America ANSI UL 1950 3rd CSA C22 2 No 950 3rd SAFETY European Union CE mark EN60950 1992 A1 A2 A3 A4 A11 IEC 60950 3rd North America FCC Part 15 Class B EMI European Union CE mark EN55022 Class B EN61000 3 2 EN61000 3 3 EMS European Union CE mark ELECTROSTATIC EN61000 4 2 DISCHARGE RADIO FREQUENCY EN61000 4 3 ELECTROMAGNETIC FIELD EFT BURST EN61000 4 4 SURGE EN61000 4 5 CONDUCTED EN61000 4 6 SUSCEPTIBILITY POWER MAGNETIC EN61000 4 8 Appendix A Product Specifications 117 ZyXEL G 570S User s Guide Table 35 Approvals continued VOLTAGE DIPS INTERRUPTION EN61000 4 11 EM FIELD FROM DIGITAL ENV50204 TELEPHONES LAN COMPATIBILITY SmartBit FCC Part15C Sec15 247 FOR WIRELESS PC CARD ETS300 328 ETS300 826 CE mark Power Adaptor Specifications Table 36 Power Adaptor Specifications AUSTRALIAN PLUG STANDARDS AC Power Adapter Model AD 121AE Input Power 240 Volts AC 50Hz Output Power 12 Volts DC 5 1 Amp Power Consumption 12 Watts Safety Standards C Tick EUROPEAN PLUG STANDARDS AC Power Adapter Model AD 121AB Input Power 230 Volts AC 50Hz Output Power 12 Volts DC 596 1 Amp Power Consumption 12 Watts Safety Standards CE mark EN6095
4. 6 ZyXEL Limited Warranty ZyXEL G 5708 User s Guide Customer Support Please have the following information ready when you contact customer support Product model and serial number Warranty Information Date that you received your device Brief description of the problem and the steps you took to solve it METHOD SUPPORT E MAIL TELEPHONE WEB SITE REGULAR MAIL LOCATION SALES E MAIL FAX FTP SITE support zyxel com tw 886 3 578 3942 www zyxel com ZyXEL Communications Corp CORPORATE www europe zyxel com 6 Innovation Road II HEADQUARTERS Science Park WORLDWIDE sales zyxel com tw 886 3 578 2439 ftp zyxel com Hsinchu 300 ftp europe zyxel com Taiwan CZECH REPUBLIC info cz zyxel com 420 241 091 350 info cz zyxel com 420 241 091 359 www zyxel cz ZyXEL Communications Czech s r o Modranska 621 143 01 Praha 4 Modrany Ceska Republika support zyxel dk 45 39 55 07 00 www zyxel dk ZyXEL Communications A S Columbusvej DENMARK sales zyxel dk 45 39 55 07 07 2860 Soeborg Denmark support zyxel fi 358 9 4780 8411 www zyxel fi ZyXEL Communications Oy FINLAND Malminkaari 10 sales zyxel fi 358 9 4780 8448 00700 Helsinki Finland info zyxel fr 33 4 72 52 97 97 www zyxel fr ZyXEL France 1 rue des Vergers FRANCE 33 4 72 52 19 20 Bat 1 C 69760 Limonest France support zyxel de 49 2405 6909 0 www zyxel de ZyXEL
5. Management within an area decrease the output power of the device to reduce interference with other APs The options are Full 50 25 12 and Min Data Rate Use this field to select a maximum data rate for the wireless connection s Please Management note that this is a total rate to be shared by all of the device s wireless connections Preamble Type Preamble is used to signal that data is coming to the receiver Short preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b compliant wireless adapters support long preamble but not all support short preamble Select Long preamble if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks Select Short preamble if you are sure the wireless adapters support it and to provide more efficient communications Select Auto to have the device automatically use short preamble when all wireless clients support it otherwise the device uses long preamble Note The device and the wireless stations MUST use the same preamble mode in order to communicate Chapter 6 Wireless Screens 63 ZyXEL G 5708 User s Guide Table 11 Wireless Settings Access Point continued LABEL DESCRIPTION Super G Mode Super G mode provides higher speed transmissions than regular IEEE 802 119 The other device must also support super G mode in order fo
6. Medium Safe browsing and still functional F Prompts before downloading potentially unsafe content Unsigned ActiveX controls will not be downloaded Appropriate for most Internet sites C Custom Level D Default Level OK Cancel Apply 2 Click the Custom Level button 3 Scroll down to Scripting 4 Under Active scripting make sure that Enable is selected the default 5 Under Scripting of Java applets make sure that Enable is selected the default 6 Click OK to close the window Chapter 8 Troubleshooting 109 ZyXEL G 5708 User s Guide Figure 76 Security Settings Java Scripting Security Settings 2 xl Settings Scripting B Active scripting E Allow paste operations via script Q Disable 9 Enable Q Prompt El Scripting of Java applets Q Disable a 9 Enable Prompt Leax Auer EAR z 4 b te custom settings Reset to Medium Reset cm 8 4 1 3 Java Permissions 1 From Internet Explorer click Tools Internet Options and then the Security tab 2 Click the Custom Level button 3 Scroll down to Microsoft VM 4 Under Java permissions make sure that a safety level is selected 5 Click OK to close the window 110 Chapter 8 Troubleshooting ZyXEL G 5708 User s Guide Figure 77 Security Settings Java Security Settings 2 xl Settings Q Disable 9 Enable ER Font download Q Disable 9 Enable B O Prompt 3 M
7. Domain Suffix Search Order Cancel 4 Click the Gateway tab Ifyou do not know your gateway s IP address remove previously installed gateways Ifyou have a gateway IP address type it in the New gateway field and click Add 5 Click OK to save and close the TCP IP Properties window 6 Click OK to close the Network window Insert the Windows CD if prompted 7 Turn on your G 570S and restart your computer when prompted Verifying Settings 1 Click Start and then Run 2 In the Run window type winipcfg and then click OK to open the IP Configuration window 3 Select your network adapter You should see your computer s IP address subnet mask and default gateway Windows 2000 NT XP The following example figures use the default Windows XP GUI theme 1 Click start Start in Windows 2000 NT Settings Control Panel 124 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide Figure 83 Windows XP Start Menu Internet Explorer e My Documents fe Outlook Express y Paint Files and Settings Transfer W B Command Prompt e My Music E Acrobat Reader 4 0 Ws My Computer Tour Windows xP QB Windows Movie Maker E control Panel 2 My Recent Documents gt e My Pictures ce Printers and Faxes Help and Support Search All Programs gt a Run Log Off 0 Turn Off Computer untitled Paint 2 In the Control Panel double click Network
8. Beacon Interval Set the number of milliseconds that should pass between the sending out of beacons Intra BSS Traffic Intra BSS traffic is traffic between wireless stations in the same BSS Enable Intra BSS traffic to allow wireless stations connected to the device to communicate with each other Disable Intra BSS traffic to only allow wireless stations to communicate with the wired network not with each other DTIM Interval Set the interval for wireless clients in sleep mode to wake up and check for multicast or broadcast traffic The AP includes a Delivery Traffic Indication Message DTIM in the beacon to notify wireless clients in sleep mode that there is a multicast or broadcast packet awaiting delivery The interval is a multiple of the beacon interval For example if the beacon interval is 100 milliseconds and the DTIM interval is 2 the AP includes a DTIM with every second beacon or every 200 milliseconds Radio Enable Turn on the wireless adapter to allow wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Turn off the wireless adapter to stop wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Chapter 6 Wireless Screens 69 ZyXEL G 570S User s Guide Table 13 Wireless Settings Bridge continued LABEL DESCRIPTION Output Power Set the output power of
9. Select or Choose means for you to use one predefined choices Mouse action sequences are denoted using a right arrow bracket key gt For example In Windows click Start gt Settings gt Control Panel means first click the Start button then point your mouse pointer to Settings and then click Control Panel e g is a shorthand for for instance and 1 e means that is or in other words The ZyXEL G 5708 802 11g Wireless Access Point may be referred to simply as the G 5770S in the User s Guide Preface 19 ZyXEL G 5708 User s Guide Graphics Icons Key G 570S Computer Notebook computer apes aos oe be Server Modem Wireless Signal 3 y Il Telephone Switch Router NES e Preface ZyXEL G 5708 User s Guide CHAPTER 1 Getting to Know Your G 570S This chapter introduces the main features and applications of the G 570S 1 1 Introducing the G 570S Wireless Access Point The ZyXEL G 570S is a 4 in 1 Access Point with Super G and Turbo G wireless technology Access Point AP repeater bridge and wireless client functions allow you to use the G 570S in various network deployments Super G and Turbo G technology boost the wireless data throughput The G 570S Access Point AP allows wireless stations to communicate and or access a wired network It can work as a bridge and repeater to extend your wireless network You can also use it as a wire
10. Select None to allow wireless stations to communicate with the access points without using dynamic WEP key exchange Select 64 bits WEP 128 bits WEP or 152 bits WEP to enable data encryption Up to 32 stations can access the device when you configure dynamic WEP key exchange Authentication Enter the IP address of the external authentication server in dotted decimal Server IP Address notation Port Number Enter the port number of the external authentication server The default port number is 1812 You need not change this value unless your network administrator instructs you to do so with additional information Shared Secret Enter a password up to 63 printable characters as the key to be shared between the external authentication server and the device The key must be the same on the external authentication server and your device The key is not sent over the network Reauthentication Specify how often wireless stations have to resend user names and passwords in Time order to stay connected Enter a time interval between 100 and 3600 seconds If wireless station authentication is done using a RADIUS server the reauthentication timer on the RADIUS server has priority Global Key This is how often the AP sends a new group key out to all clients The re keying Update process is the WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis Specify
11. network restart inthe etc rc d init d directory The following figure shows an example Appendix B Setting up Your Computer s IP Address 135 ZyXEL G 570S User s Guide Figure 101 Red Hat 9 0 Restart Ethernet Card root localhost init d network restart Shutting down interface eth0 OK Shutting down loopback interface OK Setting network parameters OK Bringing up loopback interface OK Bringing up interface eth0 OK Verifying Settings Enter ifconfig in a terminal screen to check your TCP IP properties Figure 102 Red Hat 9 0 Checking TCP IP Properties root localhost ifconfig etho Link encap Ethernet HWaddr 00 50 BA 72 5B 44 inet addr 172 23 19 129 Bceast 172 23 19 255 Mask 255 255 255 0 UP BROADCAST RUNNING MULTICAST MTU 1500 Metric 1 RX packets 717 errors 0 dropped 0 overruns 0 frame 0 TX packets 13 errors 0 dropped 0 overruns 0 carrier 0 collisions 0 txqueuelen 100 RX bytes 730412 713 2 Kb TX bytes 1570 1 5 Kb Interrupt 10 Base address 0x1000 root localhost 136 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide APPENDIX C Wireless LANs Wireless LAN Topologies This section discusses ad hoc and infrastructure wireless LAN topologies Ad hoc Wireless LAN Configuration The simplest WLAN configuration is an independent Ad hoc WLAN that connects a set of computers with wireless stations A B C Any time two or more wireless
12. Routers route based on the network number The router that delivers the data packet to the correct destination host uses the host ID IP Classes An IP address is made up of four octets eight bits written in dotted decimal notation for example 192 168 1 1 IP addresses are categorized into different classes The class of an address depends on the value of its first octet Class A addresses have a 0 in the left most bit In a class A address the first octet is the network number and the remaining three octets make up the host ID e Class B addresses have a 1 in the left most bit and a 0 in the next left most bit In a class B address the first two octets make up the network number and the two remaining octets make up the host ID e Class C addresses begin starting from the left with 1 1 0 In a class C address the first three octets make up the network number and the last octet is the host ID Class D addresses begin with 1 1 1 0 Class D addresses are used for multicasting There is also a class E address It 1s reserved for future use Table 39 Classes of IP Addresses IP ADDRESS OCTET 1 OCTET 2 OCTET 3 OCTET 4 Class A 0 Network number Host ID Host ID Host ID Class B 10 Network number Network number Host ID Host ID Class C 110 Network number Network number Network number Host ID Note Host IDs of all zeros or all ones are not allowed
13. Clear to Send handshake You should only configure RTS CTS if the possibility of hidden nodes exists on your network and the cost of resending large frames is more than the extra network overhead involved in the RTS Request To Send CTS Clear to Send handshake If the RTS CTS value is greater than the Fragmentation Threshold value see next then the RTS Request To Sendy CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size Note Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy 60 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide 6 2 4 Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size between 256 and 2432 bytes that can be sent in the wireless network before the G 570S will fragment the packet into smaller data frames A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference If the Fragmentation Threshold value is smaller than the RTS CTS value see previously you set then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size 6 3 Configuring Wireless Click SETTINGS WIRELESS to display the Wireless
14. Cry2 Ckey3 Oxeya 1 Reset The following table describes the labels in this screen Table 18 Wireless Security WEP LABEL DESCRIPTION Encryption Method Select WEP if you want to configure WEP encryption parameters Authentication Select Auto Open or Shared from the drop down list box Type WEP Encryption Select 64 bit WEP 128 bit WEP or 152 bit WEP to enable data encryption Passphrase If you selected 64 bit or 128 bit WEP you can enter a passphrase password phrase of up to 32 case sensitive printable characters and click Generate to have the device create four different WEP keys Generate After you enter the passphrase click Generate to have the device generates four different WEP keys automatically Key 1 to If you want to manually set the WEP keys enter the WEP key in the field provided Key 4 Select a WEP key to use for data encryption The WEP keys are used to encrypt data Both the device and the wireless stations must use the same WEP key for data transmission If you chose 64 bit WEP then enter any 5 ASCII characters or 10 hexadecimal characters 0 9 A F If you chose 128 bit WEP then enter 13 ASCII characters or 26 hexadecimal characters 0 9 A F If you chose 152 bit WEP then enter 16 ASCII characters or 32 hexadecimal characters 0 9 A F Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring thi
15. It is the maximum data fragment size that can be sent Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 3 3 Bridge Mode The device can act as a wireless network bridge and establish wireless links with other APs You need to know the MAC address of the peer device which also must be in bridge mode When two devices connect in Bridge mode they form a WDS Wireless Distribution System allowing the computers in one LAN to connect to the computers in another LAN See the following example Note WPA WPA2 and IEEE 802 1x wireless security are not available when you use Wireless Client Bridge or AP Repeater mode You can only use WEP keys to encrypt traffic between APs Figure 38 Bridging Example 66 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Be careful to avoid bridge loops when you enable bridging in the G 570S Bridge loops cause broadcast traffic to circle the network endlessly resulting in possible throughput degradation and disruption of communications The following examples show two network topologies that can lead to this problem If two or more G 570Ss in bridge mode are connected to the same hub as shown next Figure 39 Bridge Loop Two Bridges Connected to Hub AP Bridge AP Bridge iu 9 If your G 570S in bridge mode is connected to a wired LAN while communicating with another wireless bridge
16. Properties eseseeeess 127 Figure 88 Windows XP Advanced TCP IP Properties seesssseseesses 128 Figure 89 Windows XP Internet Protocol TCP IP Properties eeeeee 129 Figure 90 Macintosh OS 8 9 Apple Menu 1 cc erret ed e Renee t ood c ed d ed et o rica 130 Figure 91 Macintosh OS 8 9 TOP uiu isa pede pup bd Pra ad aui enn aad rb asd an PAAR RO kaaa 130 Figure 92 Macintosh OS X Apple MENU 2 toic iebiibeusS cbca TuS pro renis Ear rd e Ue oinnia rir 131 Figure 93 Macintosh OS X NSW uctor bot daa RE RH S LS SER 3 Eod 132 Figure 94 Red Hat 9 0 KDE Network Configuration Devices eese 133 Figure 95 Red Hat 9 0 KDE Ethemet Device General oussdsseceeiepo eiit dae rti abri Estilo 133 Figure 96 Red Hat 9 0 KDE Network Configuration DNS sse 134 Figure 97 Red Hat 9 0 KDE Network Configuration Activate 0 0 0 eee 134 Figure 98 Red Hat 9 0 Dynamic IP Address Setting in ifconfig ethO oo eee 135 Figure 99 Red Hat 9 0 Static IP Address Setting in ifconfig ethO neneeese 135 Figure 100 Red Hat 8 0 DNS Settings In resolveofil aussccasasreii b trib dec ecc cen nike 135 Figure 101 Red Hat 8 0 Restart Ethernet Card wisi eee rete nd en tod d ta d 136 Figure 102 Red Hat 9 0 Checking TOPAP Propels ccniumsianicnicsmancansaansmion 136 Figure 103 Peer to Peer Communication in an Ad hoc Network esssse 137 F
17. Request To Send CTS Clear to Send handshake You should only configure RTS CTS if the possibility of hidden nodes exists on your network and the cost of resending large frames is more than the extra network overhead involved in the RTS Request To Send CTS Clear to Send handshake Ifthe RTS CTS value is greater than the Fragmentation Threshold value see next then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size Note Enabling the RTS Threshold causes redundant network overhead that could negatively affect the throughput performance instead of providing a remedy Fragmentation Threshold A Fragmentation Threshold is the maximum data fragment size between 256 and 2432 bytes that can be sent in the wireless network before the AP will fragment the packet into smaller data frames 140 Appendix C Wireless LANs ZyXEL G 5708 User s Guide A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference If the Fragmentation Threshold value is smaller than the RTS CTS value see previously you set then the RTS Request To Send CTS Clear to Send handshake will never occur as data frames will be fragmented before they reach RTS CTS size IEEE 802 11g Wireless LAN IEEE 802 11g is fully compatible with the IEEE 80
18. This can be done by setting up your computer s IP address The following figure shows you an example of accessing your G 570S via a wired connection with an Ethernet cable Figure 9 Wired Connection Default IP Address e 192 168 1 2 E ll l od EN 192 168 1 3 N 2 2 1 Setting Up Your Computer s IP Address Note Skip this section if your computer s IP address is already between 192 168 1 3 and 192 168 1 254 with subnet mask 255 255 255 0 Your computer must have a network card and TCP IP installed TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems Refer to the appendix about setting up your computer s IP address for other operating systems Chapter 2 Management Computer Setup 29 ZyXEL G 5708 User s Guide 2 2 1 1 Windows 2000 NT XP The following example figures use the default Windows XP GUI theme 1 Click start Start in Windows 2000 NT gt Settings gt Control Panel 2 In the Control Panel double click Network Connections Network and Dial up Connections in Windows 2000 NT Figure 10 Control Panel e Panel File Edit View Favorites Tools Help Q E PO search gt Folders Ez EL Address Control Panel n Control Panel A GB Switch to Category view See Also Game Controllers Windows Update 3 Right click Local Area Connection and then Properties Fig
19. make sure that your computers have IP addresses that place them in the same subnet as the G 570S s LAN port Windows 95 98 Me Click Start Settings Control Panel and double click the Network icon to open the Network window Appendix B Setting up Your Computer s IP Address 121 ZyXEL G 5708 User s Guide Figure 80 WIndows 95 98 Me Network Configuration Network LPR for TCP IP Printing 3Com EtherLink 10 100 PCI TX NIC 3C905B TX Dial Up Adapter USB Fast Ethernet Adapter Y TCP P gt 3Com EtherLink 10 100 PCI TX NIE Installing Components The Network window Configuration tab displays a list of installed components You need a network adapter the TCP IP protocol and Client for Microsoft Networks If you need the adapter 1 In the Network window click Add 2 Select Adapter and then click Add 3 Select the manufacturer and model of your network adapter and then click OK If you need TCP IP 1 In the Network window click Add 2 Select Protocol and then click Add 3 Select Microsoft from the list of manufacturers 4 Select TCP IP from the list of network protocols and then click OK If you need Client for Microsoft Networks 1 Click Add 2 Select Client and then click Add 122 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide 3 Select Microsoft from the list of manufacturers 4 Select Client for Microsoft Networks from the list of network clients and then clic
20. 12 168 95 1 1 Provided by DHCP Server Subnet Mask 255 255 254 0 Router 192 168 10 11 Search Domains Optional DHCP Client ID Optional Example apple com earthlink net Ethernet Address 00 05 02 43 93 ff a Click the lock to prevent further changes Apply Now 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your G 570S in the Router address box 5 Click Apply Now and close the window 6 Turn on your G 570S and restart your computer if prompted Verifying Settings Check your TCP IP properties in the Network window Linux This section shows you how to configure your computer s TCP IP settings in Red Hat Linux 9 0 Procedure screens and file location may vary depending on your Linux distribution and release version 132 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide Note Make sure you are logged in as the root administrator Using the K Desktop Environment KDE Follow the steps below to configure your computer IP address using the KDE 1 Click the Red Hat button located on the bottom left corner select System Setting and click Network Figure 94 Red Hat 9 0 KDE Network Configuration Devices Network Configuration BIE File Profile Help f 6 9g 4 x New Edit Copy D
21. 255 128 125 1000 0000 255 255 255 192 126 1100 0000 255 255 255 224 127 1110 0000 255 255 255 240 128 1111 0000 255 255 255 248 129 1111 1000 255 255 255 252 30 1111 1100 The first mask shown is the class C natural mask Normally if no mask is specified it is understood that the natural mask 1s being used Example Two Subnets As an example you have a class C address 192 168 1 0 with subnet mask of 255 255 255 0 Table 43 Two Subnets Example NETWORK NUMBER HOST ID IP Address 192 168 1 0 IP Address Binary 11000000 10101000 00000001 00000000 Subnet Mask 255 255 255 0 Subnet Mask Binary 11111111 11111111 11111111 00000000 The first three octets of the address make up the network number class C You want to have two separate networks Divide the network 192 168 1 0 into two separate subnets by converting one of the host ID bits of the IP address to a network number bit The borrowed host ID bit can be either 0 or 1 thus giving two subnets 192 168 1 0 with mask 255 255 255 128 and 192 168 1 128 with mask 255 255 255 128 Appendix D IP Subnetting 153 ZyXEL G 5708 User s Guide Note In the following charts shaded bolded last octet bit values indicate host ID bits borrowed to form network ID bits The number of borrowed host ID bits determines the number of subnets you can have The remaining number of host ID bits after borrowing determ
22. 5708 User s Guide The following table describes the labels in this screen Table 22 MAC Filter LABEL DESCRIPTION Active Select the check box to enable MAC address filtering and define the filter action for the list of MAC addresses in the MAC address filter table Select Allow the following MAC address to associate to permit access to the device MAC addresses not listed will be denied access to the device Select Deny the following MAC address to associate to block access to the device MAC addresses not listed will be allowed to access the device This is the index number of the MAC address MAC Address Enter the MAC addresses in XX XX XX XX XX XX format of the wireless station that are allowed or denied access to the device in these address fields Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 17 OTIST In a wireless network the wireless clients must have the same SSID and security settings as the access point AP or wireless router we will refer to both as AP here in order to associate with it Traditionally this meant that you had to configure the settings on the AP and then manually configure the exact same settings on each wireless client OTIST One Touch Intelligent Security Technology allows you to transfer your AP s SSID and WEP or WPA PSK security settings to wireless clients that support OTIST and ar
23. 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 00 60 B3 45 67 89 Refresh Clear Log WLAN service started WLAN service stopped WLAN service started WLAN service stopped WLAN service started WLAN service stopped WLAN service started WLAN service stopped WLAN service started The following table describes the labels in this screen Table 25 Management Logs LABEL DESCRIPTION Display Select a category of logs to view Refresh Click Refresh to renew the log screen Clear Log Click Clear Log to clear all the logs This is the log s index number Time This field displays the time the log was recorded It is the number of seconds since the last time the system turned on Message This field states the reason for the log 96 Chapter 7 Management Screens ZyXEL G 5708 User s Guide Table 25 Management Logs continued LABEL DESCRIPTION Source This field lists the source IP address and the port number of the incoming packet that caused the log Destination This field lists the destination IP address and the port number of the outgoing packet that caused the log Note This field displays additional information about the log entry 7 4 Configuration File The configuration file often called the romfile or rom 0 contains the factory default settings such a
24. BSS Traffic Intra BSS traffic is traffic between wireless stations in the same BSS Enable Intra BSS traffic to allow wireless stations connected to the device to communicate with each other Disable Intra BSS traffic to only allow wireless stations to communicate with the wired network not with each other DTIM Interval Set the interval for wireless clients in sleep mode to wake up and check for multicast or broadcast traffic The AP includes a Delivery Traffic Indication Message DTIM in the beacon to notify wireless clients in sleep mode that there is a multicast or broadcast packet awaiting delivery The interval is a multiple of the beacon interval For example if the beacon interval is 100 milliseconds and the DTIM interval is 2 the AP includes a DTIM with every second beacon or every 200 milliseconds Number of Use this field to set a maximum number of wireless stations that may connect to Wireless Stations the device Allowed to Enter the number from 1 to 32 of wireless stations allowed Associate Radio Enable Turn on the wireless adapter to allow wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Turn off the wireless adapter to stop wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Output Power Set the output power of the device in this field If there is a high density of APs
25. Deutschland GmbH GERMANY Adenauerstr 20 A2 D 52146 sales zyxel de 49 2405 6909 99 Wuerselen Germany support zyxel hu 36 1 3361649 www zyxel hu ZyXEL Hungary HUNGARY 48 Zoldlomb Str info zyxel hu 36 1 3259100 H 1025 Budapest Hungary http zyxel kz support 7 3272 590 698 www zyxel kz ZyXEL Kazakhstan 43 Dostyk ave Office 414 KAZAKHSTAN sales zyxel kz 7 3272 590 689 Dostyk Business Centre 050010 Almaty Republic of Kazakhstan support zyxel com 1 800 255 4101 www us zyxel com ZyXEL Communications Inc 1 714 632 0882 1130 N Miller St NORTH AMERICA Anaheim sales zyxel com 1 714 632 0858 ftp us zyxel com T MEE support zyxel no 47 22 80 61 80 www zyxel no ZyXEL Communications A S NORWAY Nils Hansens vei 13 sales zyxel no 47 22 80 61 81 0667 Oslo Norway Customer Support ZyXEL G 5708 User s Guide METHOD LOCATION SUPPORT E MAIL TELEPHONE WEB SITE SALES E MAIL FAX FTP SITE REGULAR MAIL info pl zyxel com 48 22 5286603 www pl zyxel com ZyXEL Communications ul Emilli Plater 53 POLAND 48 22 5206701 00 113 Warszawa Poland http zyxel ru support 7 095 542 89 29 www zyxel ru ZyXEL Russia RUSSIA Ostrovityanova 37a Str sales zyxel ru 7 095 542 89 25 Moscow 117279 Russia support zyxel es 34 902 195 420 www zyxel es ZyXEL Communications SPAIN Alejandro Villegas 33 sales zyxel es 34 913 005 345 1 28043 Madrid Spain support zyxe
26. G 5708 User s Guide Figure 45 WPA 2 PSK Authentication PSK y f dues Internet J 6 12 WPA 2 with RADIUS Application Example You need the IP address of the RADIUS server its port number default is 1812 and the RADIUS shared secret A WPA 2 application example with an external RADIUS server looks as follows A is the RADIUS server DS is the distribution system 1 The AP passes the wireless client s authentication request to the RADIUS server 2 The RADIUS server then checks the user s identification against its database and grants or denies network access accordingly 3 The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the pair wise key to dynamically generate unique data encryption keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless clients Figure 46 WPA with RADIUS Application Example Internet 80 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide 6 13 Security Parameters Summary Refer to this table to see what other security parameters you should configure for each authentication method key management protocol type You enter manual keys by first selecting 64 bit WEP 128 bit WEP or 152 bit WEP from the WEP Encryption field and then typing the keys in ASCII or hexadecimal format in the key text boxes MAC address filters are not dependent o
27. Mamenance QUOPIIW iussi cud e dvcke add EX ccu Pd EXEL E K LEE Tur EMEY addc dE Paw d duas 95 TAT Backup COOFIDUE SUBEN 25d eoe oso et e e E RR errr io rer ter rrr reer 98 182 Restore Lond tl ll cade cc Dod viv pria eat EE Ren po I ERE bx He o HEEL RAE 98 131 2 Back to Factory Deofelllis assuri 99 Chapter 8 TROD SSH T vss eb p bo CHEER oed irR EE Eres FRE FERA PERV CERA PERAGERE A 103 8 1 Problems Starting Up tha G 5705 uadona Dass noe n pna Doha tn horae Lada 103 ez Problems with the PASS WORE cc ssiscsciinsasicrecchvanucindcatanieceisaraactctelatmerstaaduerraniedy 103 8 3 Problems with the WLAN Interface essen 104 8 4 Problems with the Ethernet Interface ccccccseceeeccececeeeeeseeesaeseseaeeeeeseeees 104 8 4 1 Pop up Windows JavaScripts and Java Permissions 105 8 4 1 1 Internet Explorer Pop up Blockers ssssssssss 105 8 3 1 2 dave OCS ad caine anaes 108 8 4 1 3 Java PONMISSIONS iaceo ti a pad e ee d RR pad Ya ERR pae EE papa das 110 8 5 Testing the Connection to the 3 570 esie anna staat aa ata a 48 112 Appendix A ideeller s eiue 0 11 E 115 Appendix B Setting up Your Computer s IP Address esses 121 Appendix C bh C45 Dr 137 Appendix D Table of Contents 11 ZyXEL G 5708 User s Guide 12 Table of Contents ZyXEL G 5708 User s Guide List of Figures Figure 1 WDS Functionality Example 45 a
28. Repeater ui cesse ertet eret etnia toc dunes rp rbd epe pEcce ta Table 15 Wireless Security Levels uaissecen corr rrt np ttd ko cta SR ad KR Pk RR ERR End 74 Table 16 Wireless Security Relational Matrix eene ennt nnn nana n nna 81 Table 17 Wireless Security Disable uiasscsdlodeedvn ci seeds sation doe a vied duda 82 Table 18 Wireless Securty WEP nieder Espada nda puna bah En d e E PAR ER d En a 83 Table 18 Wireless Security WPA PSK 1iissessessasecseerzacucie eee ap setae bp nasa aisi 84 Table 20 Wireless Secanys WAIL auucisetzdbxassec bcne ertt dava t ia dala ear 85 Table 21 Wireless acribus DUE DAC correndo EpNppPH S IUE EHIS USA PP EUU uu EIN ED M REUNIR ERIDUUN 87 Tabe 22 MAC FRET E 89 uc pacemque T TT 90 Table 24 Management Password sccccccsansaasccassanescsactaiacaecasadvouaeaiantacacaaaaauedscceaasonesveatincoeses 95 Table 25 Management Logs sssini M 96 Table 26 Management Configuration File Restore Configuration sssssusses 98 Table 27 Management FAM Upload 12 eiiis tiic htt i trt d rov idet d debebat id ret 100 Table 28 Troubleshooting the Start Up of Your G 5708 sees 103 Table 29 TroublBshooung the Password iosastetumukkee rina a pep RE rFR HEX REEF IR RRESHEIV ERRARE RR 103 Table 30 Troubleshooting the WLAN Interface sisesescesiiseese cea tnnt 104 Table 31 Troubleshooting the Ethernet Interface eeeeeeeseeeee
29. TTLS LEAP EAP PEAP and Win XP PEAP included 64 128 152 bits WEP WPA WPA2 support based on 802 11i standard Dynamic WEP key exchange MAC address filtering through WLAN supports up to 32 MAC address entries AES Support Diagnostics Capabilities Built in Diagnostic Tools for FLASH memory RAM Ethernet port and wireless port Syslog Error log Trace Log Packet Log Hardware Features Restore Factory Defaults reset Button Status LEDs e PWR ETHN OTIST e WLAN Table 34 Wireless RF Specifications Data Rate Super G 11g 108M 54M 48M 36M 24M 18M 12M 9 6 Mbps auto fallback 11b 11Mbps 5 5Mbps 2Mbps 1Mbps auto fallback Communication Method Half Duplex Transmission Emission Type Direct Sequence Spread Spectrum DSSS 116 Appendix A Product Specifications ZyXEL G 5708 User s Guide Table 34 Wireless RF Specifications Security Wired Equivalent Privacy WEP data encryption Dynamic WEP key exchange WiFi Protected Access WPA IEEE 802 1x RF frequency range 2 412 2 462GHz North America 2 412MHz 2 484 GHz Japan 2 412 2 472 GHz Europe ETSI Data modulation type OFDM BPSK QPSK CCK PBCC DQPSK DBPSK Output Power 11b 18 2dBm 11 5 5 2 1 Mbps 11g 16 2dBm 54Mbps Sensitivity 54M 65dBm 11M 80dBm Coverage Indoor up to 100meters Outdoor up to 400meters Antenna 1 external detachable 2dBi dipole antenna with R SMA connector
30. Yes Certificate Client No Yes Optional Optional No Certificate Server No Yes Yes Yes No Dynamic Key Exchange No Yes Yes Yes Yes Credential Integrity None Strong Strong Strong Moderate Deployment Difficulty Easy Hard Moderate Moderate Moderate Client Identity Protection No No Yes Yes No WPA 2 User Authentication WPA or WPA2 applies IEEE 802 1x and Extensible Authentication Protocol EAP to authenticate wireless stations using an external RADIUS database Encryption Both WPA and WPA2 improve data encryption by using Temporal Key Integrity Protocol TKIP Message Integrity Check MIC and IEEE 802 1x In addition to TKIP WPA2 also uses Advanced Encryption Standard AES in the Counter mode with Cipher block chaining Message authentication code Protocol CCMP to offer stronger encryption 146 Appendix C Wireless LANs ZyXEL G 5708 User s Guide TKIP uses 128 bit keys that are dynamically generated and distributed by the authentication server It includes a per packet key mixing function a Message Integrity Check MIC named Michael an extended initialization vector IV with sequencing rules and a re keying mechanism TKIP regularly changes and rotates the encryption keys so that the same encryption key is never used twice The RADIUS server distributes a Pairwise Master Key PMK key to the AP that then sets up a key hierarchy and management system using the PMK to dynamically generate unique data encrypt
31. a successful upload the system will reboot Chapter 7 Management Screens 99 ZyXEL G 5708 User s Guide Click SETTINGS gt MANAGEMENT gt F W Upload to display the screen as shown Follow the instructions in this screen to upload firmware to your device Figure 67 Management F W Upload F W Upload Firmware Upload To upgrade the internal system firmware browse to the location of the FW file rmt upgrade file and click the Upload Download firmware files from ZyXEL s website If the file is compre file File Path Browse _Upoad ssed for example a ZIP file you must first extract the Fw file rmt The following table describes the labels in this screen Table 27 Management F W Upload LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it Browse Click Browse to find the rmt file you want to upload Remember that you must decompress compressed zip files before you can upload them Upload Click Upload to begin the upload process This process may take up to two minutes Note Do not turn off the device while firmware upload is in progress The following screen appears Wait two minutes before logging into the device again Figure 68 Firmware Upgrading Screen The device is now upgrading and then it will reboot As there will be no indication of when the process
32. adapters are within range of each other they can set up an independent network which is commonly referred to as an Ad hoc network or Independent Basic Service Set IBSS The following diagram shows an example of notebook computers using wireless adapters to form an Ad hoc wireless LAN Figure 103 Peer to Peer Communication in an Ad hoc Network __ kaa A a i NL NG B C BSS A Basic Service Set BSS exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point AP Intra BSS traffic is traffic between wireless stations in the BSS When Intra BSS is enabled wireless station A and B can access the wired network and communicate with each other When Intra BSS is disabled wireless station A and B can still access the wired network but cannot communicate with each other Appendix C Wireless LANs 137 ZyXEL G 5708 User s Guide Figure 104 Basic Service Set kS P B mm m m ESS An Extended Service Set ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution System DS This type of wireless LAN topology is called an Infrastructure WLAN The Access Points not only provide communication with the wired network but also mediate wireless network traffic in the immediate
33. broadcast traffic The AP includes a Delivery Traffic Indication Message DTIM in the beacon to notify wireless clients in sleep mode that there is a multicast or broadcast packet awaiting delivery The interval is a multiple of the beacon interval For example if the beacon interval is 100 milliseconds and the DTIM interval is 2 the AP includes a DTIM with every second beacon or every 200 milliseconds Radio Enable Turn on the wireless adapter to allow wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Turn off the wireless adapter to stop wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices 72 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Table 14 Wireless Settings AP Repeater continued LABEL DESCRIPTION Output Power Set the output power of the device in this field If there is a high density of APs Management within an area decrease the device s output power to reduce interference with other APs The options are Full 50 25 12 and Min Data Rate Use this field to select a maximum data rate for the wireless connection s Please Management note that this is a total rate to be shared by all of the device s wireless connections Preamble Type Preamble is used to signal that data is coming to the receiver Short preamble increases performance as less time
34. here is used for management of the device accessing the web configurator 4 Enter a Subnet Mask appropriate to your network and the Gateway IP Address of the neighboring device if you know it If you do not leave the Gateway IP Address field as 0 0 0 0 Chapter 3 Introducing the Web Configurator 37 ZyXEL G 5708 User s Guide Figure 20 Wizard Basic Settings SETUP WIZARD ZyXEL Do not select this unless you have a router d that can assign the G 570S anlPaddress fa Basic Settings Device Name ZyXEL6788 Obtain IP Address Automatically Use Fixed IP Address IP Address Subnet Mask Gateway IP Address 3 3 2 Wizard Wireless Settings Use this wizard screen to set up the wireless LAN See the chapter on the wireless screens for background information 1 The SSID is a unique name to identify the device in a wireless network Enter up to 32 printable characters Spaces are allowed If you change this field on the device make sure all wireless stations use the same SSID in order to access the network 2 A wireless device uses a channel to communicate in a wireless network Select a channel that is not already in use by a neighboring wireless device Note The wireless stations and this device must use the same SSID channel and wireless security settings for wireless communication 38 Chapter 3 Introducing the Web Configurator ZyXEL G 5708 User s Guide Figure 21 Wizard
35. is complete please wait for 70 seconds before attempting to The device Is Upgrading Now Please Wait access AP again The device automatically restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop 100 Chapter 7 Management Screens ZyXEL G 5708 User s Guide Figure 69 Network Temporarily Disconnected D Local Area Connection Network cable unplugged After two minutes log in again and check your new firmware version in the System Status screen If the upload was not successful the following status message displays at the bottom of the screen Figure 70 Firmware Upload Error Status Chapter 7 Management Screens 101 ZyXEL G 570S User s Guide 102 Chapter 7 Management Screens ZyXEL G 5708 User s Guide CHAPTER 8 Troubleshooting This chapter covers potential problems and possible remedies After each problem description some instructions are provided to help you to diagnose and to solve the problem 8 1 Problems Starting Up the G 570S Table 28 Troubleshooting the Start Up of Your G 570S PROBLEM CORRECTIVE ACTION None of the LEDs Make sure you are using the supplied power adaptor and that it is plugged in to an turn on when I appropriate power source Check that the power source is turned on plug in the power if the problem persists you may have a hardware problem In
36. neighborhood An ESSID ESS IDentification uniquely identifies each ESS All access points and their associated wireless stations within the same ESS must have the same ESSID in order to communicate 138 Appendix C Wireless LANs ZyXEL G 5708 User s Guide Figure 105 Infrastructure WLAN AP 1 y AP2 g X i h k a 5 i g a D BSS2 w N BSS 1 SSS a Pd es Wireless Station B T StationC et in Mn terere mU iT NT ES uxo cn Channel A channel is the radio frequency ies used by IEEE 802 11a b g wireless devices Channels available depend on your geographical area You may have a choice of channels for your region so you should use a different channel than an adjacent AP access point to reduce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To avoid interference due to overlap your AP should be on a channel at least five channels away from a channel that an adjacent AP is using For example if your region has 11 channels and an adjacent AP is using channel 1 then you need to select a channel between 6 or 11 RTS CTS A hidden node occurs when two stations are within range of the same access point but are not within range of each other The following figure illustrates a hidden node Both stations STA are within range of the access point AP or wireless gatew
37. only accept open system authentication requests The same is true for shared key authentication However when it is set to auto authentication the G 570S will accept either type of authentication request and the G 570S will fall back to use open authentication if the shared key does not match 6 6 802 1x Overview The IEEE 802 1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management Authentication can be done using the local user database internal to the G 570S authenticate up to 32 users or an external RADIUS server for an unlimited number of users 6 7 Introduction to RADIUS RADIUS is based on a client sever model that supports authentication and accounting where access point is the client and the server is the RADIUS server The RADIUS server handles the following tasks among others Authentication Determines the identity of the users Accounting Keeps track of the client s network activity RADIUS user is a simple package exchange in which your G 570S acts as a message relay between the wireless station and the network RADIUS server 6 7 1 Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication 76 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Access Request Sent by an access point requesting authentication Access Reject Sent by a RADIUS
38. second subnet is 192 168 1 129 to 192 168 1 254 Appendix D IP Subnetting ZyXEL G 5708 User s Guide Example Four Subnets The above example illustrated using a 25 bit subnet mask to divide a class C address space into two subnets Similarly to divide a class C address into four subnets you need to borrow two host ID bits to give four possible combinations of 00 01 10 and 11 The subnet mask is 26 bits 11111111 11111111 11111111 11000000 or 255 255 255 192 Each subnet contains 6 host ID bits giving 26 2 or 62 hosts for each subnet all 0 s is the subnet itself all 1 s is the broadcast address on the subnet Table 46 Subnet 1 NETWORK NUMBER VADE EIE IP Address 192 168 1 0 IP Address Binary 11000000 10101000 00000001 00000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 0 Lowest Host ID 192 168 1 1 Broadcast Address Highest Host ID 192 168 1 62 192 168 1 63 Table 47 Subnet 2 NETWORK NUMBER AA BIE IP Address 192 168 1 64 IP Address Binary 11000000 10101000 00000001 01000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 64 Lowest Host ID 192 168 1 65 Broadcast Address 192 168 1 127 Highest Host ID 192 168 1 126 Table 48 Subnet 3 LAST OCTET BIT NETWORK NUMBER VALUE IP Address 192 168 1 128 IP Address Binary 11000
39. sending preamble means more time for sending data All IEEE 802 11b compliant wireless adapters support long preamble but not all support short preamble Select Long preamble if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks Select Short preamble if you are sure the wireless adapters support it and to provide more efficient communications Select Auto to have the device automatically use short preamble when all wireless clients support it otherwise the device uses long preamble Note The device and the wireless stations MUST use the same preamble mode in order to communicate Super G Mode Super G mode provides higher speed transmissions than regular IEEE 802 119 The other device must also support super G mode in order to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 119 Turbo G Mode Turbo G mode provides higher speed transmissions than regular IEEE 802 11g or super G mode The other device must also support turbo G mode in order to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 11g Turbo G uses two channels bonded together in order to achieve its higher transmission rates This may cause interference with other APs in the area The Channel field is automatically fixed at 6 when you use turbo G mode
40. server rejecting access Access Accept Sent by a RADIUS server allowing access Access Challenge Sent by a RADIUS server requesting more information in order to allow access The access point sends a proper response from the user and then sends another Access Request message The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting Accounting Request Sent by the access point requesting accounting Accounting Response Sent by the RADIUS server to indicate that it has started or stopped accounting In order to ensure network security the access point and the RADIUS server use a shared secret key which is a password they both know The key is not sent over the network In addition to the shared key password information exchanged is also encrypted to protect the wired network from unauthorized access 6 8 EAP Authentication Overview EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE802 1x transport mechanism in order to support multiple types of user authentication By using EAP to interact with an EAP compatible RADIUS server the access point helps a wireless station and a RADIUS server perform authentication The type of authentication you use depends on the RADIUS server or the AP The G 5708 supports EAP TLS EAP TTLS EAP MD5 and PEAP with RADIUS Refer to the appendix about the types of EAP authentication fo
41. the device in this field If there is a high density of APs Management within an area decrease the output power of the device to reduce interference with other APs The options are Full 50 25 12 and Min Data Rate Use this field to select a maximum data rate for the wireless connection s Please Management note that this is a total rate to be shared by all of the device s wireless connections Preamble Type Preamble is used to signal that data is coming to the receiver Short preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b compliant wireless adapters support long preamble but not all support short preamble Select Long preamble if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks Select Short preamble if you are sure the wireless adapters support it and to provide more efficient communications Select Auto to have the device automatically use short preamble when all wireless clients support it otherwise the device uses long preamble Note The device and the wireless stations MUST use the same preamble mode in order to communicate Super G Mode Super G mode provides higher speed transmissions than regular IEEE 802 119 The other device must also support super G mode in order for the device to use it for the wireless connection This is available when you select a Wireles
42. up Your Computer s IP Address 129 ZyXEL G 5708 User s Guide Figure 90 Macintosh OS 8 9 Apple Menu File Edit View Window Special Help About This Computer D Apple System Profiler Calculator Chooser ADSL Control and Status Control Panels Appearance f Favorites Apple Menu Options d Key Caps AppleTalk GR Network Browser ColorSync Recent Applications Control Strip il Recent Documents eria nn tif Remote Access Status Energy Saver Scrapbook Extensions Manager Sherlock 2 File Exchange Jj Speakable Items File Sharing Stickies General Controls Internet Keyboard Keychain Access Launcher Location Manager Memory Modem Monitors Mouse Multiple Users Numbers QuickTime Settings Remote Access Software Update Sound Speech 4 pae USB Printer Sharing 2 Select Ethernet built in from the Connect via list Figure 91 Macintosh OS 8 9 TCP IP D zu qp p gp m El Emet va Setup Configure Using DHCP Server gt DHCP Client ID IP Address lt will be supplied by server gt Subnet mask lt will be supplied by server gt Router address lt will be supplied by server gt Search comans Name server addr lt will be supplied by server gt 3 For dynamically assigned settings select Using DHCP Server from the Configure list 130 Appendi
43. you have a single user account and the ISP will assign you a dynamic IP address when the connection is established The Internet Assigned Number Authority IANA reserved this block of addresses specifically for private use please do not use any other number unless you are told otherwise Let s say you select 192 168 1 0 as the network number which covers 254 individual addresses from 192 168 1 1 to 192 168 1 254 zero and 255 are reserved In other words the first three numbers specify the network number while the last number identifies an individual computer on that network Once you have decided on the network number pick an IP address that is easy to remember for instance 192 168 1 2 for your device but make sure that no other device on your network is using that IP address The subnet mask specifies the network number portion of an IP address Your device will compute the subnet mask automatically based on the IP address that you entered You don t need to change the subnet mask computed by the device unless you are instructed to do otherwise 5 2 System Settings Click SETTINGS gt SYSTEM to open the System Settings screen Figure 31 System Settings Device Settings Device Name IP Address Subnet Mask IP Address Assignment C Obtain IP Address Automatically Use Fixed IP Address Gateway IP Address zyxXEL6789 max 15 alphanumeric printable characters and no spaces Apply Reset The fo
44. 0 2001 NORTH AMERICAN PLUG STANDARDS AC Power Adapter Model AD 121A Input Power 120 Volts AC 60Hz Output Power 12 Volts DC 5 1 Amp Power Consumption 12 Watts Safety Standards UL UK PLUG STANDARDS AC Power Adapter Model AD 121AD Input Power 240 Volts AC 50Hz Output Power 12 Volts DC 5 1 Amp 118 Appendix A Product Specifications ZyXEL G 5708 User s Guide Table 36 Power Adaptor Specifications continued Power Consumption 12 Watts Safety Standards CE mark EN60950 2001 Appendix A Product Specifications 119 ZyXEL G 570S User s Guide 120 Appendix A Product Specifications ZyXEL G 5708 User s Guide APPENDIX B Setting up Your Computer s IP Address All computers must have a 10M or 100M Ethernet adapter card and TCP IP installed Windows 95 98 Me NT 2000 XP Macintosh OS 7 and later operating systems and all versions of UNIX LINUX include the software components you need to install and use TCP IP on your computer Windows 3 1 requires the purchase of a third party TCP IP application package TCP IP should already be installed on computers using Windows NT 2000 XP Macintosh OS 7 and later operating systems After the appropriate TCP IP components are installed configure the TCP IP settings in order to communicate with your network If you manually assign IP information instead of using dynamic assignment
45. 000 10101000 00000001 10000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address Lowest Host ID 192 168 1 129 192 168 1 128 Broadcast Address Highest Host ID 192 168 1 190 192 168 1 191 Appendix D IP Subnetting 155 ZyXEL G 570S User s Guide Example Eight Subnets Table 49 Subnet 4 NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 192 IP Address Binary 11000000 10101000 00000001 11000000 Subnet Mask Binary 11111111 11111111 11111111 11000000 Subnet Address 192 168 1 192 Lowest Host ID 192 168 1 193 Broadcast Address 192 168 1 255 Highest Host ID 192 168 1 254 Similarly use a 27 bit mask to create 8 subnets 001 010 011 100 101 110 The following table shows class C IP address last octet values for each subnet Table 50 Eight Subnets SUBNET SUBNET ADDRESS FIRST ADDRESS LAST ADDRESS posae 1 0 1 30 31 33 62 63 3 64 65 94 RE F m 97 126 127 5 128 129 158 159 6 160 161 190 191 7 192 193 222 223 8 224 225 254 255 The following table is a summary for class C subnet planning Table 51 Class C Subnet Planning Sony aoe HOST SUBNET MASK NO SUBNETS NUUS RER 1 255 255 255 128 25 126 2 255 255 255 192 26 62 3 255 255 255 224 27 30 4 255 255 255 240 28 16 14 5 255 255 255 248 29 32 6 255 255 255 252 30 64 7 255 25
46. 1 2 is the default 3 Press ENTER The following screen displays Figure 79 Pinging the G 650 C gt ping 192 168 1 2 Pinging 192 168 1 2 with 32 bytes of data Reply from 192 168 Reply from 192 168 Reply from 192 168 Reply from 192 168 bytes 32 time 10ms TTL 254 bytes 32 time 10ms TTL 254 bytes 32 time 10ms TTL 254 bytes 32 time 10ms TTL 254 b5bmpbm NM MN OS Ping statistics for 192 168 1 2 Packets Sent 4 Received 4 Lost 0 0 loss Approximate round trip times in milli seconds Minimum Oms Maximum 10ms Average 2m Your computer can now communicate with the G 570S via the ETHERNET port 112 Chapter 8 Troubleshooting ZyXEL G 5708 User s Guide Chapter 8 Troubleshooting 113 ZyXEL G 570S User s Guide 114 Chapter 8 Troubleshooting ZyXEL G 5708 User s Guide APPENDIX A Product Specifications See also the introduction chapter for a general overview of the key features Specification Tables Table 32 Device Specifications Default IP Address 192 168 1 2 Default Subnet Mask 255 255 255 0 24 bits Default Password 1234 Dimensions 112 mm Wide x 106 mm Deep x 28 5 mm High Weight 203g Ethernet Port One auto negotiating auto MDI MDI X 10 100 Mbps RJ 45 Ethernet port Antenna 1 detachable dipole antenna Power Requirements 12VDC 1 Amp maximum Operation Temperature 0 C 50 C S
47. 2 11b standard This means an IEEE 802 11b adapter can interface directly with an IEEE 802 11g access point and vice versa at 11 Mbps or lower depending on range IEEE 802 11g has several intermediate rate steps between the maximum and minimum data rates The IEEE 802 11g data rate and modulation are as follows Table 37 IEEE 802 11g DATA RATE MBPS MODULATION 1 DBPSK Differential Binary Phase Shift Keyed 2 DQPSK Differential Quadrature Phase Shift Keying 5 5111 CCK Complementary Code Keying 6 9 12 18 24 36 48 54 OFDM Orthogonal Frequency Division Multiplexing IEEE 802 1x In June 2001 the IEEE 802 1x standard was designed to extend the features of IEEE 802 11 to support extended authentication as well as providing additional accounting and control features It is supported by Windows XP and a number of network devices Some advantages of IEEE 802 1x are User based identification that allows for roaming Support for RADIUS Remote Authentication Dial In User Service RFC 2138 2139 for centralized user profile and accounting management on a network RADIUS server Support for EAP Extensible Authentication Protocol RFC 2486 that allows additional authentication methods to be deployed with no changes to the access point or the wireless stations RADIUS RADIUS is based on a client server model that supports authentication authorization and accounting The access point is the client
48. 5 255 254 31 128 1 156 Appendix D IP Subnetting ZyXEL G 5708 User s Guide Subnetting With Class A and Class B Networks For class A and class B addresses the subnet mask also determines which bits are part of the network number and which are part of the host ID A class B address has two host ID octets available for subnetting and a class A address has three host ID octets see Table 39 on page 151 available for subnetting The following table is a summary for class B subnet planning Table 52 Class B Subnet Planning I RECO HOST SUBNET MASK NO SUBNETS en RER 1 255 255 128 0 17 2 32766 2 255 255 192 0 18 4 16382 3 255 255 224 0 19 8 8190 4 255 255 240 0 20 16 4094 5 255 255 248 0 21 32 2046 6 255 255 252 0 22 64 1022 7 255 255 254 0 23 128 510 8 255 255 255 0 24 256 254 9 255 255 255 128 25 512 126 10 255 255 255 192 26 1024 62 11 255 255 255 224 27 2048 30 12 255 255 255 240 28 4096 14 13 255 255 255 248 29 8192 14 255 255 255 252 30 16384 15 255 255 255 254 31 32768 1 Appendix D IP Subnetting 157 ZyXEL G 570S User s Guide 158 Appendix D IP Subnetting ZyXEL G 5708 User s Guide Numerics 110V AC 5 230V AC 5 A Abnormal Working Conditions 6 AC5 Accessories 5 Acts of God 6 Address Assignment 53 Ad hoc 57 Adv
49. 5 ldantily mn 75 6O WEP COVER NOW ioc ccxtccuearsveweaterisinacdadsiastindantarnigud a Siaa oaa eai 75 a Gt EM UO a ETT ane iahcciamhE 75 55 27 POTN VOI caisean N Hia po a EAR M St 75 Eo p02 E5607 c 76 6 7 MAUR to RADIUS ete 76 0 7 1 Types of RADIUS Messages 1 sscccccucivera etes asa ri Ute ie rinimi E Cable d 76 10 Table of Contents ZyXEL G 5708 User s Guide 6 5 EAP Authentication OVOIVIB 1 inccuecei praed i o a CSS RR PEERS nra NIRE EISE PRI 3dRA 77 6 9 Dynami WEP Key Exchange s cir ceede tht cdbba Rb ER L de a Rb RAT IXE E FCRI ESE NERKA UU ERO Re did 78 6 10 latroduct n to WPA and WPAZ 1 ussssescroskus iii xtd edis eE Dur atate bct Fenb Dee Sana qd 78 xp Duro EPI mE 79 6 10 7 User Auth atl DoIY serrana even Obl e tetutene bon ERRARE Feb ata da 79 6 11 WPA PSK Application EXIIiple iuris petite snper teu rt acti diae Papae P ee aTe 79 6 12 WPA 2 with RADIUS Application Example eese 80 6 13 Security Parameters SUMMAN M EI S 81 6 14 Wireless Client WPA Supplicants iere riae pr F et ede Eod 4x ii ia karea 81 6 15 Configuring Wireless Security 12irieicd ertet pau tad etra aai epa Kod 81 cum meng COINS gr 89 WEN c 89 6 1712 Wireless GB iuuscotereuse bee ERE epu EEM EEE 90 bd sunm DTIST suchxsdigensir dria d ed ool b c PA REEL MREPSEEQGT 91 Sm pact Nors on OTE F osai m ccm pen bbl ee esate 92 Chapter 7 Management SCS o d 95 T1
50. A Key differences between WPA 2 and WEP are user authentication and improved data encryption 84 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Figure 50 Wireless Security WPA 2 Port Number Rekey Options Security Settings Encryption Method APA X Authentication Server Authentication Server IP Address o d o la 1 o Shared Secret Reauthentication Time 600 Seconds mas 100 3600 Global Key Update G every 500 Seconds mas 100 3600 C every 1000 X1000 Packets max 100 3600 i812 0 31 alphanumeric printable characters and no spaces Reset The following table describes the labels in this screen Table 20 Wireless Security WPA 2 LABEL DESCRIPTION Encryption Method Select WPA WPA2 or WPA amp WPA2 to configure user authentication and improved data encryption Note WPA WPA2 and IEEE 802 1x wireless security are not available when you use Wireless Client Bridge or AP Repeater mode You can only use WEP keys to encrypt traffic between APs Authentication Enter the IP address of the external authentication server in dotted decimal Server IP Address notation Port Number Enter the port number of the external authentication server The default port number is 1812 You need not change this value unless your network administrator instructs you to do so with additional information Shared Secret Enter
51. An AP creates its own wireless coverage area A wireless station can associate with a particular access point only if it is within the access point s coverage area Ina network environment with multiple access points wireless stations are able to switch from one access point to another as they move between the coverage areas This is roaming As the wireless station moves from place to place it is responsible for choosing the most appropriate access point depending on the signal strength network utilization or other factors The roaming feature on the access points allows the access points to relay information about the wireless stations to each other When a wireless station moves from a coverage area to another it scans and uses the channel of a new access point which then informs the access points on the LAN about the change The new information is then propagated to the other access points on the LAN An example is shown in Figure 109 Appendix C Wireless LANs 147 ZyXEL G 5708 User s Guide If the roaming feature is not enabled on the access points information is not communicated between the access points when a wireless station moves between coverage areas The wireless station may not be able to communicate with other wireless stations on the network and vice versa Figure 109 Roaming Example t a H ae A s r LI mra n t Pod Zl NE i A M B is B a a LS a mmm
52. Connections Network and Dial up Connections in Windows 2000 NT Figure 84 Windows XP Control Panel amp Control Panel File Edit View Favorites Tools Help Q o d Jj Search Folders Gi Address gt Control Panel v Control Panel A Add Hardware Qe Switch to Category view See Also Fonts Game Windows Update Controllers 3 Right click Local Area Connection and then click Properties Appendix B Setting up Your Computer s IP Address 125 ZyXEL G 5708 User s Guide Figure 85 Windows XP Control Panel Network Connections Properties E Network Connections File Edit View Favorites Tools Advanced Help Q sax 2 yo Search Key Folders E Address Network Connections LAN or High Speed Internet Network Tasks ocal Area Connection abled E Create a new connection Set up a home or small Disable office network Disable this network asin device Repair PN Repair this connection dard PCI Fast Ethernet Adapte Bridge Connections mij Rename this connection view status of this connection Change settings of this connection Create Shortcut Rename 4 Select Internet Protocol TCP IP under the General tab in Win XP and then click Properties Figure 86 Windows XP Local Area Connection Properties Fe Local Area Connection Properties General Authentication Advanced Connect using E9 Accton EN1207D TX PCI Fast Ethemet Ad
53. E 39 ROLE aah ost usati d mud edat utc a Da 40 23 9 WPA SEIS icai pde ddiiocu dubbi teciad aki eae T dab 41 3 4 Navigating the Advanced Screens essseeeeseeeeeeee see ie nean ed dnnas 43 3AT Navigation Panel ER UTI TTL 44 Chapter 4 EELS SOONG qe TN T 47 Chapter 5 TI DE a E ener ee 53 5T CPP PSISIMBUBPR aiite text a pe Deo dd oe pe e Seka ba o 53 5 14 IF Address SSIDHETIBEM 2iciaiipte su dues eu eb obo Dust ten Fn um te boe ppt a Len bU MM R 53 5 1 2 IP Address and Subnet Mask 1 2 5 ceetr tree aont rera tana c erva sra tarea 53 Chapter 6 Wireless SOROS xus ch cna ihn Ru Ana na kuE cna RANRRRKREuEANERE KRAREuKSKREKKERNERE NR ANERSRKARUEEANUR E NRRT RUE MRNA 57 8 1 Wireless LAN IVO sarriena bep b Fev abi pud bd etra oli paa Lock 57 MI TC E 57 MN M 57 T BESS errr peer er rrere N End MM EM rM MUERE 58 6 2 Wireless LAN BASICS iuucspextisskisecii daten Feste ese pipe ds oveqean EU ad Abc E LAUNE VR d LUE 59 DL TERNI saii ia a a a tende depu cdi en ies cd 59 cau coin ep 59 Gaa RTE TO sperii E EE A 60 5 2 4 Fragmentation Threshold ai sicscs at ceearae cate tcecaattiniccssadvniateccauiia a ERE board aai 61 0 3 Coniguning VWOIOSS IT T Iq c T 61 5 4 Wireless Security DVerVIBW 25 cedar rk era desi eet rune HA pere ER retia 73 c NUT eir PEN T UU TE UM 74 OAZ iiie E 74 6A 3 Rosiictad ACCESS m n 74 6AA Hide C 570
54. P Subnet Mask 255 255 255 0 MAC Address 00 60 b3 45 67 89 Gateway IP Address 0 0 0 0 Firmware Version V1 00 23 0 CO Wireless Settings B SSID ZyXEL G 570S View Statistics Channel 6 View Association List Qj Encryption Method Disable MAC Filter Disable The following table describes the global web configurator icons in the upper left corner of most screens Table 3 Global Icon Key ICON DESCRIPTION amp Click the Wizard icon to open the setup wizard Click the About icon to view copyright information Click the Logout icon at any time to exit the web configurator Make sure you save any changes before you log out 3 4 1 Navigation Panel After you enter the password use the links on the navigation panel to go to the various advanced screens 44 Chapter 3 Introducing the Web Configurator ZyXEL G 5708 User s Guide The following table describes the sub menus Table 4 Screens Summary LINK TAB FUNCTION Status This screen shows the Prestige s general device system and interface status information Use this screen to access the wizard and summary statistics tables System Use this screen to configure the device name and IP address assignment settings Wireless Wireless Settings Use this screen to configure wireless LAN Security Use this screen to configure wire
55. Secure Sockets Layer uses a public key to encrypt data that s transmitted over an SSL connection Both Netscape Navigator and Internet Explorer support SSL and many Web sites use the protocol to obtain confidential user information such as credit card numbers By convention URLs that require an SSL connection start with https instead of http Wireless LAN MAC Address Filtering Your G 570S checks the MAC address of the wireless station against a list of allowed or denied MAC addresses WEP Encryption WEP Wired Equivalent Privacy encrypts data frames before transmitting over the wireless network to help keep network communications private IEEE 802 1x Network Security The G 570S supports the IEEE 802 1x standard to enhance user authentication Use the built in user profile database to authenticate up to 32 users using MDS encryption Use an EAP compatible RADIUS RFC2138 2139 Remote Authentication Dial In User Service server to authenticate a limitless number of users using EAP Extensible Authentication Protocol EAP is an authentication protocol that supports multiple types of authentication Full Network Management The embedded web configurator is an all platform web based utility that allows you to easily access the G 570S s management settings Logging and Tracing Built in message logging and packet tracing Wireless Association List With the wireless association list you can see the list of the wireless stations tha
56. Settings screen The screen varies depending upon the operation mode you select 6 3 1 Access Point Mode Select Access Point in the Operation Mode field to display the screen as shown next This mode has the device act as an access point AP through which wireless stations can communicate and or access a wired network Chapter 6 Wireless Screens 61 ZyXEL G 5708 User s Guide Figure 36 Wireless Settings Access Point Wireless Settings Basic Settings Operation Mode SSID Channel Wireless Mode Advanced Settings Beacon Interval Intra BSS Traffic DTIM Interval Number of Wireless Radio Enable Output Power Management Data Rate Management Preamble Type Super G Mode Turbo G Mode RTS CTS Threshold Fragmentation AP ZyXEL G 570S mas 32 printable characters Hide SSID s x Auto 119 115 x 100 20 1000 C Enable Disable 1 174255 Stations Allowed to Associate Bp 1 32 C Yes No min Best v Dynamic C Enable Disable C Enable Disable 2346 0 2346 2346 256 2346 Reset The following table describes the labels in this screen Table 11 Wireless Settings Access Point LABEL DESCRIPTION Operation Mode Select the operating mode from the drop down list The options are Access Point Wireless Client Bridge and AP Repeater SSID Wireless stations associating to the access point AP must have the same SSID Enter a descript
57. TIST enabled AP for up to one minute If you manually have the wireless client search for an OTIST enabled AP there is no timeout click Cancel in the OTIST progress screen to stop the search 3 When the wireless client finds an OTIST enabled AP you must still click Start in the AP OTIST web configurator screen or hold in the OTIST button for one or two seconds for the AP to transfer settings 4 If you change the SSID or the keys on the AP after using OTIST you need to run OTIST again or enter them manually in the wireless client s 5 If you configure OTIST to generate a WPA PSK key this key changes each time you run OTIST Therefore if a new wireless client joins your wireless network you need to run OTIST on the AP and ALL wireless clients again Chapter 6 Wireless Screens 93 ZyXEL G 570S User s Guide 94 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide CHAPTER 7 Management Screens This chapter describes the Maintenance screens T 1 Maintenance Overview Use these maintenance screens to change the password view logs back up or restore the G 570S configuration and change the web configurator language T 2 Password To change your device s password recommended click SETTINGS gt MANAGEMENT The screen appears as shown This screen allows you to change the device s password If you forget your password or the device IP address you will need to reset the device See the section on resetting t
58. Therefore A class C network 8 host bits can have 28 2 or 254 hosts A class B address 16 host bits can have 21 2 or 65534 hosts A class A address 24 host bits can have 274 _2 hosts approximately 16 million hosts Appendix D IP Subnetting 151 ZyXEL G 5708 User s Guide Since the first octet of a class A IP address must contain a 0 the first octet of a class A address can have a value of 0 to 127 Similarly the first octet of a class B must begin with 10 therefore the first octet of a class B address has a valid range of 128 to 191 The first octet of a class C address begins with 110 and therefore has a range of 192 to 223 Table 40 Allowed IP Address Range By Class CLASS ALLOWED RANGE OF FIRST OCTET ALLOWED RANGE OF FIRST OCTET BINARY DECIMAL Class A 00000000 to 01111111 0 to 127 Class B 10000000 to 10111111 128 to 191 Class C 11000000 to 11011111 192 to 223 Class D 11100000 to 11101111 224 to 239 Subnet Masks A subnet mask is used to determine which bits are part of the network number and which bits are part of the host ID using a logical AND operation A subnet mask has 32 is a 1 then the corresponding bit in the IP address is part of the network number If a bit in the subnet mask is 0 then the corresponding bit in the IP address is part of the host ID Subnet masks are expressed in dotted decimal not
59. Wireless Settings SETUP WIZARD STEP 1 STEP2 STEP3 STEP4 fa Wireless Settings Enter an uniqt point all wirel its SSID ZyXEL G 570S Channel e gt Note Unless you re concerned with the interference from other access points you do not need to change the following default channel 3 3 3 Wizard Security Settings Use this screen to configure security for your wireless LAN The screen varies depending on what you select in the Encryption Method field Select Disable to have no wireless security configured select WEP or select WPA PSK if your wireless clients support WPA PSK Select WPA2 PSK if your wireless clients support WPA2 PSK Go to SETTINGS gt WIRELESS gt Security if you want WPA2 WPA or 802 1x See Chapter 6 on page 57 for background information 3 3 3 1 Disable Select Disable to have no wireless LAN security configured If you do not enable any wireless security on your device your network is accessible to any wireless networking device that is within range Note With no wireless security a neighbor can access and see traffic in your network Chapter 3 Introducing the Web Configurator 39 ZyXEL G 5708 User s Guide Figure 22 Setup Wizard 3 Disable SETUP WIZARD fa Security Settings Select your desired encryption method to secure your wireless network Encryption Method 3 3 3 2 WEP 1 WEP Wired Equivalent Privacy encrypts data frames before transmitting over the wirele
60. ZyXEL G 570S 802 11g Wireless Access Point User s Guide Version 1 00 11 2005 ZyXEL ZyXEL G 5708 User s Guide Copyright Copyright O 2005 by ZyXEL Communications Corporation The contents of this publication may not be reproduced in any part or as a whole transcribed stored in a retrieval system translated into any language or transmitted in any form or by any means electronic mechanical magnetic optical chemical photocopying manual or otherwise without the prior written permission of ZyXEL Communications Corporation Published by ZyXEL Communications Corporation All rights reserved Disclaimer ZyXEL does not assume any liability arising out of the application or use of any products or software described herein Neither does it convey any license under its patent rights nor the patent rights of others ZyXEL further reserves the right to make changes in any products described herein without notice This publication is subject to change without notice Trademarks ZyNOS ZyXEL Network Operating System is a registered trademark of ZyXEL Communications Inc Other trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners 2 Copyright ZyXEL G 5708 User s Guide Interference Statements and Certifications Federal Communications Commission FCC Interference Statement This device complies with Part 15 of FCC rules Operation i
61. a mmm m mmm emu pm t The steps below describe the roaming process 1 As wireless station Y moves from the coverage area of access point P1 to that of access point 2 P2 it scans and uses the signal of access point P2 3 Access point P2 acknowledges the presence of wireless station Y and relays this information to access point P1 through the wired LAN 4 Access point P1 updates the new position of wireless station 5 Wireless station Y sends a request to access point P2 for re authentication Requirements for Roaming The following requirements must be met in order for wireless stations to roam between the coverage areas 1 All the access points must be on the same subnet and configured with the same ESSID 2 If IEEE 802 1x user authentication is enabled and to be done locally on the access point the new access point must have the user profile for the wireless station 3 The adjacent access points should use different radio channels when their coverage areas overlap 4 All access points must use the same port number to relay roaming information 148 Appendix C Wireless LANs ZyXEL G 5708 User s Guide 5 The access points must be connected to the Ethernet and be able to get IP addresses from a DHCP server if using dynamic IP address assignment Appendix C Wireless LANs 149 ZyXEL G 570S User s Guide 150 Appendix C Wireless LANs ZyXEL G 5708 User s Guide APPENDIX D IP Subnetting IP Addressing
62. a password up to 63 printable characters as the key to be shared between the external authentication server and the device The key must be the same on the external authentication server and your device The key is not sent over the network Reauthentication Time Specify how often wireless stations have to resend user names and passwords in order to stay connected Enter a time interval between 100 and 3600 seconds If wireless station authentication is done using a RADIUS server the reauthentication timer on the RADIUS server has priority Chapter 6 Wireless Screens 85 ZyXEL G 5708 User s Guide Table 20 Wireless Security WPA 2 continued LABEL DESCRIPTION Global Key This is how often the AP sends a new group key out to all clients The re keying Update process is the WPA equivalent of automatically changing the WEP key for an AP and all stations in a WLAN on a periodic basis Specify an interval either in seconds or thousands of packets that the device sends Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 15 5 Wireless Security IEEE 802 1x The IEEE 802 1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management Note Once you enable user authentication you need to specify an external RADIUS server on the device for authentication Fi
63. an interval either in seconds or thousands of packets that the device sends Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 16 MACFilter The MAC filter screen allows you to give exclusive access to up to 32 devices Allow Association or exclude up to 32 devices from accessing the device Deny Association Every Ethernet device has a unique MAC Media Access Control address The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters for example 00 A0 C5 00 00 02 You need to know the MAC addresses of the devices to configure this Screen The MAC filter works when the device functions as an AP It allows or denies wireless client access The MAC filter does not apply to bridge or repeater functions Chapter 6 Wireless Screens 87 ZyXEL G 5708 User s Guide The following applies if you set the device to client mode and want to connect to an AP that uses a MAC filter After the device turns on in client mode it clones the MAC address of the first packets that it receives from devices connected to the Ethernet port It uses this MAC address on the packets that it sends to an AP All of the packets that the device sends to an AP will appear to be from the first device that connected to the Ethernet port If you turn the device off and back on it again clones the MAC address of the first packets that it receives from devi
64. anced Encryption Standard 146 Airflow 5 Alternative Subnet Mask Notation 153 AP access point 139 Association List 50 Authentication 75 145 Authority 3 Auto MDI MDI X 115 Auto negotiating 115 B Basement 5 Basic Service Set 57 BSS 57 137 C CA 144 Cables Connecting 5 Certificate Authority 144 Certifications 4 Changes or Modifications 3 Channel 139 Interference 139 channel 51 59 Index Channel ID 62 69 72 Charge 6 Circuit 3 Class B 3 Communications 3 Compliance FCC 3 Components 6 Condition 6 Connecting Cables 5 Consequential Damages 6 Contact Information 7 Contacting Customer Support 7 Copyright 2 Correcting Interference 3 Corrosive Liquids 5 Covers 5 CTS Clear to Send 140 Customer Support 7 Czech Republic Contact Information 7 D Dampness 5 Danger 5 Data Encryption 75 Dealer 3 Deep 115 Default IP Address 115 Default Password 115 Default Subnet Mask 115 Defective 6 Denmark Contact Information 7 DHCP Client 115 Diagnostic Tools 116 Dimensions 115 Disclaimer 2 Discretion 6 Distribution System 58 Dust 5 Dynamic WEP Key Exchange 78 146 Index 159 ZyXEL G 5708 User s Guide E EAP 74 77 79 EAP Authentication 143 Electric Shock 5 Electrical Pipes 5 Encryption 79 146 Equal Value 6 ESS 58 138 ESS IDentification 58 Ethernet Ports 115 Europe 5 European Plug Standards 118 Exposure 5 Extended Service Set 58 138 Extensible Auth
65. and the server is the RADIUS server The RADIUS server handles the following tasks Appendix C Wireless LANs 141 ZyXEL G 5708 User s Guide Authentication Determines the identity of the users Authorization Determines the network services available to authenticated users once they are connected to the network Accounting Keeps track of the client s network activity RADIUS is a simple package exchange in which your AP acts as a message relay between the wireless station and the network RADIUS server Types of RADIUS Messages The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user authentication Access Request Sent by an access point requesting authentication Access Reject Sent by a RADIUS server rejecting access Access Accept Sent by a RADIUS server allowing access Access Challenge Sent by a RADIUS server requesting more information in order to allow access The access point sends a proper response from the user and then sends another Access Request message The following types of RADIUS messages are exchanged between the access point and the RADIUS server for user accounting Accounting Request Sent by the access point requesting accounting Accounting Response Sent by the RADIUS server to indicate that it has started or stopped accounting In order to ensure network security the access point and the RADIUS server use a shared secret key
66. ansssvorsins isiccareue connector canes EEA ANNAA ANENE AEA 24 1 3 1 Access Point tor Intemel ACCESS ssersensrcruismiienar aie niana 24 1 3 2 Corporate Network Access Application 0 ccccceeeeseeeeeeeeeeeeeeeeeeeneeees 24 1 3 3 Wireless Client Application ssssssssseeeeeenrnennn 25 1 3 4 Bridge Repeater 122 siacisccce iie ert dimi ced dni cx d tour ceci d d E ced ds 26 1 3 5 Access Point and Reposter esser mardi e Pat IRSE E ee OL R Ho IE UR ed due 27 ga LEDD SII qc e 27 Chapter 2 Management Computer Setup eee eeeeeeeeeeeeueeeeeee ener 29 2 IUNIO aicesnisalezeipet reni ua eias ddeSup AMD AA 29 Se SE SEO PANNI T T TT 29 2 2 1 Setting Up Your Computer s IP Address 2 2 incerti rta iiiter ndis 29 2 3 1 T Windows 2000NTIXP soora ERI rex ER pr ER o Er ERR Exe ER 30 2 5 PANIES TONNE CIO Mt mt 32 24 Rostering he G DIUS Liussnsescrianercect edm versect nnen rar nea EENE MEUS ELI 33 2 0 Resctmng CFOS MUS 33 2 5 1 Methods of Restoring Factory Defaults essen 33 Table of Contents 9 ZyXEL G 5708 User s Guide Chapter 3 Introducing the Web Configurator esee eeeeeeeeseeeeeeeeeneee 35 3 1 Web Configurator COVOFBW 2 usce dc bedacht n opa hdi ba odi Laid 35 3 2 Accessing the G 5705 Web Configurator cesse emen 35 3 3 Configuring the 5705 Using the Wizard eese cens 37 SCR a Doo a rem
67. apter This connection uses the following items v E Client for Microsoft Networks lt q ate D T o ao E p F m wo HN ow t ra g o o 23 o v o 2 Internet Protocol TCP IP Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected 5 The Internet Protocol TCP IP Properties window opens the General tab in Windows XP e Ifyou have a dynamic IP address click Obtain an IP address automatically 126 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide Ifyou have a static IP address click Use the following IP Address and fill in the IP address Subnet mask and Default gateway fields e Click Advanced Figure 87 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically cy Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses 6 Ifyou do not know your gateway s IP address remove any p
68. ask e Click Advanced Figure 13 Internet Protocol Properties Internet Protocol TCP IP Properties Dm General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically Use the following IP address IP address 192 168 1 3 Subnet mask 255 255 255 0 Default gateway addi naticall Use the following DNS server addresses Preferred DNS server Alternate DNS server Crea Cancel 6 Remove any previously installed gateways in the IP Settings tab and click OK to go back to the Internet Protocol TCP IP Properties screen 1 Seethe appendices for information on configuring DNS server addresses Chapter 2 Management Computer Setup 31 ZyXEL G 5708 User s Guide Figure 14 Advanced TCP IP Settings Advanced TCP IP Settings p IP Settings DNS WINS Options IP addresses IP address Subnet mask 192 168 1 3 255 255 255 0 Add Edit Remove No gateways configured Default gateways Gateway Automatic metric Cancel 7 Click OK to close the Internet Protocol TCP IP Properties window 8 Click Close OK in Windows 2000 NT to close the Local Area Connection Properties window 9 Close the Network Connections window Network and Dial up Connections in Wind
69. ate the wireless station Types of Authentication This section discusses some popular authentication types EAP MD5 EAP TLS EAP TTLS PEAP and LEAP The type of authentication you use depends on the RADIUS server or the AP Consult your network administrator for more information EAP MD5 Message Digest Algorithm 5 MDS authentication is the simplest one way authentication method The authentication server sends a challenge to the wireless station The wireless station proves that it knows the password by encrypting the password with the challenge and sends back the information Password is not sent in plain text Appendix C Wireless LANs 143 ZyXEL G 5708 User s Guide However MD5 authentication has some weaknesses Since the authentication server needs to get the plaintext passwords the passwords must be stored Thus someone other than the authentication server may access the password file In addition it is possible to impersonate an authentication server as MDS authentication method does not perform mutual authentication Finally MD5 authentication method does not support data encryption with dynamic session key You must configure WEP encryption keys for data encryption EAP TLS Transport Layer Security With EAP TLS digital certifications are needed by both the server and the wireless stations for mutual authentication The server presents a certificate to the client After validating the identity of the serve
70. ation just as IP addresses are The natural masks for class A B and C IP addresses are as follows Table 41 Natural Masks CLASS NATURAL MASK A 255 0 0 0 B 255 255 0 0 C 255 255 255 0 Subnetting With subnetting the class arrangement of an IP address is ignored For example a class C address no longer has to have 24 bits of network number and 8 bits of host ID With subnetting some of the host ID bits are converted into network number bits By convention subnet masks always consist of a continuous sequence of ones beginning from the left most bit of the mask followed by a continuous sequence of zeros for a total number of 32 bits 152 Appendix D IP Subnetting ZyXEL G 5708 User s Guide Since the mask 1s always a continuous number of ones beginning from the left followed by a continuous number of zeros for the remainder of the 32 bit mask you can simply specify the number of ones instead of writing the value of each octet This is usually specified by writing a followed by the number of bits in the mask after the address For example 192 1 1 0 25 is equivalent to saying 192 1 1 0 with mask 255 255 255 128 The following table shows all possible subnet masks for a class C address using both notations Table 42 Alternative Subnet Mask Notation SUBNET MASK IP ADDRESS SUBNET MASK 1 BITS LAST OCTET BIT VALUE 255 255 255 0 124 0000 0000 255 255
71. ay but out of range of each other so they cannot hear each other that is they do not know if the channel is currently being used Therefore they are considered hidden from each other Appendix C Wireless LANs 139 ZyXEL G 5708 User s Guide Figure 106 RTS CTS Station AP s HRI T d d NE LL d H k din i Data EH E gf Ru Ri O O kei m Station A gt Station B mm a n can hear the AP When station A sends data to the AP it might not know that the station B is already using the channel If these two stations send data at the same time collisions may occur when both sets of data arrive at the AP at the same time resulting in a loss of messages for both stations RTS CTS is designed to prevent collisions due to hidden nodes An RTS CTS defines the biggest size data frame you can send before an RTS Request To Send CTS Clear to Send handshake is invoked When a data frame exceeds the RTS CTS value you set between 0 to 2432 bytes the station that wants to transmit this frame must first send an RTS Request To Send message to the AP for permission to send it The AP then responds with a CTS Clear to Send message to all other stations within its range to notify them to defer their transmission It also reserves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without the RTS
72. be within range and have OTIST enabled 1 Inthe AP a web configurator screen pops up showing you the security settings to transfer After reviewing the settings click OK Figure 55 Security Key Microsoft Internet Explorer Chapter 6 Wireless Screens 91 ZyXEL G 5708 User s Guide 2 This screen appears while OTIST settings are being transferred It closes when the transfer is complete Figure 56 OTIST in Progress AP e OTIST in Progress t Please wait a moment about 176 seconds Figure 57 OTIST in Progress Client OTIST in progress please waitfor 3 minutes In the wireless client you see this screen if it can t find an OTIST enabled AP with the sameSetupkey ClickOKtogobacktotheZy XELutilitymainscreen Figure 58 No AP with OTIST Found Please make sure you have ZyXEL g APs or wireless routers with OTIST function enabled OK Ifthere is more than one OTIST enabled AP within range you see a screen asking you to select one AP to get settings from 6 17 3 Notes on OTIST 1 If you enabled OTIST in the wireless client you see this screen each time you start the utility Click Yes for it to search for an OTIST enabled AP 92 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Figure 59 Start OTIST Don t show me this window again 2 If an OTIST enabled wireless client loses its wireless connection for more than ten seconds it will search for an O
73. ce esi ueeiiee tetti esee pb biet eot phu deae aaa be d Excuse ded edad 157 18 List of Tables ZyXEL G 5708 User s Guide Preface Congratulations on your purchase from the ZyXEL G 5708 802 11g Wireless Access Point Note Register your product online to receive e mail notices of firmware upgrades and information at www zyxel com for global products or at www us zyxel com for North American products An access point AP acts as a bridge between the wireless and wired networks extending your existing wired network without any additional wiring This User s Guide is designed to guide you through the configuration of your ZyXEL G 5708 using the web configurator Related Documentation Supporting Disk Refer to the included CD for support documents Quick Start Guide The Quick Start Guide is designed to help you get up and running right away It contains hardware connection and installation information ZyXEL Glossary and Web Site Please refer to www zyxel com for an online glossary of networking terms and additional support documentation User Guide Feedback Help us help you E mail all User Guide related comments questions or suggestions for improvement to techwriters zyxel com tw or send regular mail to The Technical Writing Team ZyXEL Communications Corp 6 Innovation Road II Science Based Industrial Park Hsinchu 300 Taiwan Thank you Syntax Conventions Enter means for you to type one or more characters
74. ces connected to the Ethernet port You may be able to check the association list on the AP to determine which MAC address the device is currently using To change your device s MAC filter settings click WIRELESS gt SETTINGS gt MAC Filter The screen appears as shown Note Be careful not to list your computer s MAC address and select Deny the following MAC address to associate when managing the device via a wireless connection This would lock you out Figure 52 MAC Filter Wireless Settings MAC Address Filter Active allow the following MAC Address to associate C Deny the following MAC address to associate a m 1 00 00 00 00 00 00 00 00 00 00 00 00 2 DO 00 00 00 00 00 18 0 00 00 00 00 00 3 00 00 00 00 00 00 19 DO 00 00 00 00 00 4 00 00 00 00 00 00 20 00 00 00 00 00 00 5 00 00 00 00 00 00 21 D0 00 00 00 00 00 6 no 00 00 00 00 00 22 0 00 00 00 00 00 7 00 00 00 00 00 00 23 00 00 00 00 00 00 8 00 00 00 00 00 00 24 00 00 00 00 00 00 9 00 00 00 00 00 00 25 00 00 00 00 00 00 10 00 00 00 00 00 00 26 00 00 00 00 00 00 11 i00 00 00 00 00 00 27 Do 00 00 00 00 00 12 00 00 00 00 00 00 28 00 00 00 00 00 00 13 00 00 00 00 00 00 29 00 00 00 00 00 00 14 00 00 00 00 00 00 30 00 00 00 00 00 00 15 00 00 00 00 00 00 31 00 00 00 00 00 00 16 0 00 00 00 00 00 32 00 00 00 00 00 00 Apply Reset 88 Chapter 6 Wireless Screens ZyXEL G
75. ces to associate with the device Select Auto 11g 11b to allow either IEEE 802 11b or IEEE 802 11g compliant WLAN devices to associate with the device The transmission rate of your device might be reduced Advanced Settings Radio Enable Turn on the wireless adapter to allow wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Turn off the wireless adapter to stop wireless communications between the device and other IEEE 802 11b and IEEE 802 11g compliant wireless devices Output Power Set the output power of the device in this field If there is a high density of APs Management within an area decrease the output power of the device to reduce interference with other APs The options are Full 50 25 12 and Min Data Rate Use this field to select a maximum data rate for the wireless connection s Please Management note that this is a total rate to be shared by all of the device s wireless connections Preamble Type Preamble is used to signal that data is coming to the receiver Short preamble increases performance as less time sending preamble means more time for sending data All IEEE 802 11b compliant wireless adapters support long preamble but not all support short preamble Select Long preamble if you are unsure what preamble mode the wireless adapters support and to provide more reliable communications in busy wireless networks Select Short prea
76. configurator you need to allow Web browser pop up windows from your device JavaScripts enabled by default Java permissions enabled by default Note Internet Explorer 6 screens are used here Screens for other Internet Explorer versions may vary 8 4 1 1 Internet Explorer Pop up Blockers You may have to disable pop up blocking to log into your device Either disable pop up blocking enabled by default in Windows XP SP Service Pack 2 or allow pop up blocking and create an exception for your device s IP address Chapter 8 Troubleshooting 105 ZyXEL G 5708 User s Guide 8 4 1 1 1 Disable pop up Blockers 1 In Internet Explorer select Tools Pop up Blocker and then select Turn Off Pop up Blocker Figure 71 Pop up Blocker Mail and News gt Pop up Blocker Manage Add ons Synchronize Windows Update Windows Messenger Internet Options You can also check if pop up blocking is disabled in the Pop up Blocker section in the Privacy tab 1 In Internet Explorer select Tools Internet Options Privacy 2 Clear the Block pop ups check box in the Pop up Blocker section of the screen This disables any web pop up blockers you may have enabled Figure 72 Internet Options Internet Options SH General Security Privacy Content Connections Programs Advanced Settings e Move the slider to select a privacy setting for the Internet ERE zone Medium Blocks third pa
77. creens ZyXEL G 5708 User s Guide Figure 64 Network Temporarily Disconnected G Local Area Connection Network cable unplugged If you uploaded the default configuration file you may need to change the IP address of your computer to be in the same subnet as that of the default device IP address 192 168 1 2 If the upload was not successful the following screen will appear Click Return to go back to the Configuration File screen Figure 65 Configuration Upload Error Restore Configuration error The configuration file was not accepted by the device Please return to the previous page and select a valid configuration file Click Help for more information Return 7 4 3 Back to Factory Defaults Clicking the RESET button in this section clears all user entered configuration information and returns the device to its factory defaults The following warning screen will appear Figure 66 Reset Warning Message x 2 WARNING Restore will restart the AP i Cancel You can also press the RESET button on the rear panel to reset the factory defaults of your device Refer to the section on resetting the device for more information on the RESET button 7 5 F W Upload Screen Find firmware at www zyxel com in a file that usually uses the system model name with a rmt extension for example zyxel rmt The upload process uses HTTP Hypertext Transfer Protocol and may take up to two minutes After
78. d When your device authentication method is set to open system it will only accept open system authentication requests The same is true for shared key authentication However when it is set to auto authentication the device will accept either type of authentication request and the device will fall back to use open authentication if the shared key does not match Appendix C Wireless LANs 145 ZyXEL G 5708 User s Guide Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server This key expires when the wireless connection times out disconnects or reauthentication times out A new WEP key is generated each time reauthentication 1s performed If this feature is enabled it is not necessary to configure a default encryption key in the Wireless screen You may still configure and store keys here but they will not be used while Dynamic WEP is enabled Note EAP MD5 cannot be used with Dynamic WEP Key Exchange For added security certificate based authentications EAP TLS EAP TTLS and PEAP use dynamic keys for data encryption They are often deployed in corporate environments but for public deployment a simple user name and password pair 1s more practical The following table is a comparison of the features of authentication types Table 38 Comparison of EAP Authentication Types EAP MD5 EAP TLS EAP TTLS PEAP LEAP Mutual Authentication No Yes Yes Yes
79. e Select the operating mode from the drop down list The options are Access Point Wireless Client Bridge and AP Repeater Note If you are configuring the device from a computer connected to the wireless LAN and you change the device to use bridge mode you will lose your wireless connection when you click Apply to save your settings You must then connect to the device through the wired network SSID The device does not use the SSID with bridge mode You do not need to configure it Hide SSID The device does not use the SSID with bridge mode You do not need to configure this field Channel Set the operating frequency channel depending on your particular region Select a channel from the drop down list box Refer to the chapter on wizard setup for more information about channels Wireless Mode Select 802 11b only to allow only IEEE 802 11b compliant WLAN devices to associate with the device Select 802 11g only to allow only IEEE 802 119 compliant WLAN devices to associate with the device Select Auto 11g 11b to allow either IEEE 802 11b or IEEE 802 11g compliant WLAN devices to associate with the device The transmission rate of your device might be reduced Local MAC This is the MAC address of the device Address Remote MAC Type the MAC address of the peer device in a valid MAC address format that is Address 1 4 six hexadecimal character pairs for example 12 34 56 78 9a bc Advanced Settings
80. e D GS EE pM ud 90 Figure 54 Example Wireless Client OTIST SQOFBBY ueris riae rh nna een Yn eR reae pn een 91 Figura 95 CURES IE iuouaastesbete d emp PRU PUR a LSU RU ES RE HR xa d ada 91 Figure o5 OTIST m Progress DIET ciui olei nae Embed aubexE Eb Ad bua eniras REA ETE MER a a RU ERA qud E andes 92 Figure 57 OTIST in Progress Cent iuis ciasi seu ert sanini aaa 92 Figure 38 No AP wiih OTIST FOUNO deter eH i E A RA GR OTRAS RAN 92 30 io P cpesILoIdee c c aerrer mere rronrin terrrien ETA 93 Figure o0 Management Password ccc cosscccsciisentsccscs semeccacts irisi isien e nena E 95 Figure o7 Nanagemant LS esce d edcbet dida dss anced onda uera eU an bI bab UE bi OUR dw bi nomads 96 Figure 62 Management Configuration FIG rie rrr tet Epor nere rUr dta oer YN REP rp ESRB EHE adn 97 Figure 63 Configuration Upload Successful 1 ius cac ord autor ads pd dd east nara URL XS R Ep AUR 98 Figure 64 Network Temporarily Disconnected sssssee enm 99 Figure 65 Configuration Upload EFFOF ccce ester rise to cor peine reta eta s eet tide a 99 Figure 66 Reset Warning MeSSEB iiie rrr rrt erbe tna dan tbe d dS aa 99 Figures Management FAN UpDioad iisssasetvenqntakeebv Up epe Next RU VITE REPE PER PADRE ERR ID EE PU 100 Figure 68 Firmware Upgrading SOFGOFI a2 esas cies eti eia south decanters ntu c E bbb resa ital an 100 Figure 69 Network Temporarily Disconnected sse 101 Figure 70 Fiimyare Upload EMOT exdivecisbbbviqtisedits
81. e that is within range Figure 47 Wireless Security Disable Security Settings Encryption Method Disable Apply Reset The following table describes the labels in this screen Table 17 Wireless Security Disable LABEL DESCRIPTION Encryption Method Select Disable to have no wireless LAN security configured Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 15 2 Wireless Security WEP WEP provides a mechanism for encrypting data using encryption keys Both the AP and the wireless stations must use the same WEP key to encrypt and decrypt data You can configure up to four 64 bit 128 bit or 152 bit WEP keys but only one key can be used at any one time 82 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Figure 48 Wireless Security WEP key Passphrase Q Note 64 bit WEP Enter 5 ASCII characters or 10 hexadecimal characters 0 9 A F 128 bit WEP Enter 13 ASCII characters or 26 hexadecimal characters 0 9 A 152 bit WEP Enter 16 ASCII characters or 32 hexadecimal characters 0 9 A Security Settings Encryption Method WEP X Authentication Type Open 7 Data Encryption ea bit WEP Enter a passphrase to autornatically generate a WEP key or leave it blank if you want to manually enter the WEP Generate max 16 alphanumeric printable characters xeyil
82. e within transmission range You can also choose to have OTIST generate a WPA PSK key for you if you didn t configure one manually Note OTIST replaces the pre configured wireless settings on the wireless clients 6 17 1 Enabling OTIST You must enable OTIST on both the AP and wireless client before you start transferring settings Note The AP and wireless client s MUST use the same Setup key 6 17 1 1 AP You can enable OTIST using the OTIST button or the web configurator 6 17 1 1 1 OTIST Button If you use the OTIST button the default 01234567 or previous saved through the web configurator Setup key is used to encrypt the settings that you want to transfer Chapter 6 Wireless Screens 89 ZyXEL G 5708 User s Guide Hold in the OTIST button for one or two seconds 6 17 1 1 2 Web Configurator Click WIRELESS gt SETTINGS gt OTIST to configure and enable OTIST The screen appears as shown Note At the time of writing the device does not support OTIST in the wireless client mode Figure 53 OTIST OTIST OTIST Settings Setup Key 01234567 8 alphanumeric printable characters MV Yes Please enhance the Wireless Security Level to WPA PSK automatically if no WLAN security has been set This will generate a random PSK key for your convenience Start The following table describes the labels in this screen Table 23 OTIST LABEL DESCRIPTION One Touch Intelligent Security Tech
83. each other The following figure illustrates a hidden node Both stations STA are within range of the access point AP or wireless gateway but out of range of each other so they cannot hear each other that is they do not know if the channel is currently being used Therefore they are considered hidden from each other Figure 35 RTS CTS RTS Range i CTS Range Station AP eR se i nnd When station A sends data to the G 5708 it might not know that the station B is already using the channel If these two stations send data at the same time collisions may occur when both sets of data arrive at the AP at the same time resulting in a loss of messages for both stations RTS CTS is designed to prevent collisions due to hidden nodes An RTS CTS defines the biggest size data frame you can send before an RTS Request To Send CTS Clear to Send handshake is invoked When a data frame exceeds the RTS CTS value you set between 0 to 2432 bytes the station that wants to transmit this frame must first send an RTS Request To Send message to the AP for permission to send it The AP then responds with a CTS Clear to Send message to all other stations within its range to notify them to defer their transmission It also reserves and confirms with the requesting station the time frame for the requested transmission Stations can send frames smaller than the specified RTS CTS directly to the AP without the RTS Request To Send CTS
84. ecommended that you back up your configuration file before making configuration changes The backup configuration file will be useful in case you need to return to your previous settings Click Backup to save the device s current configuration to your computer 7 4 2 Restore Configuration Restore configuration allows you to upload a new or previously saved configuration file from your computer to your device Table 26 Management Configuration File Restore Configuration LABEL DESCRIPTION File Path Type in the location of the file you want to upload in this field or click Browse to find it Browse Click Browse to find the file you want to upload Remember that you must decompress compressed zip files before you can upload them Upload Click Upload to begin the upload process Note Do not turn off the device while configuration file upload is in progress The following screen displays You must wait one minute before logging into the device again Figure 63 Configuration Upload Successful AP Is Restarting Now Please Wait The AP will now rebooting As there will be no indication of when the process is complete please wait for 57 seconds before attempting to access the AP again The device automatically restarts in this time causing a temporary network disconnect In some operating systems you may see the following icon on your desktop 98 Chapter 7 Management S
85. eeeeeee eene 104 Table 32 Deuce SDScIICHN iis iaicimestegrinoedairid ie pbi iei iei a LM 119 Table 33 Feature Specificallolis 415 nola sic nN ELAT S 115 Table 34 Wireless RF Specifications eessssssssssssssseseseee enne 116 Table SS eo e M 117 Table 36 Power Adaptor Specifications 1asseciises ti e HrerP HERE ROO ERE ERR LER iaeiiai 118 go Xd EEE G02 TIO rene eieer erp ne errr renee NA 141 Table 38 Comparison of EAP Authentication Types ccccccecccccseececeeeeessececeesseeceeeenennenee 146 List of Tables 17 ZyXEL G 5708 User s Guide Table 39 Classes of IP Addresses Louie pide o v 1x Ge Petr E net HR Eve a SEE apes 151 Table 40 Allowed IP Address Range By Class seen 152 Tabledi Natural MASKS srmn i toni dade a 152 Table 42 Alternative Subnet Mask Notation ssssssssssseeemem 153 Table 45 Two subnets Example 5 oss p epe i eR pR P Pre py Ran A Po nica ERE rtt pide et EP pei 153 IET wr MM 154 BE NN E MRNA TR NR A TERME 154 Table 46 Sube M 155 Tabea F Subhel sesh sii caesar dbi i D e e e p Uo e oi be e ed e ban 155 REI ceri NE OO 155 Tabled SUDDETTI e 156 Tale SU ur o 156 Table 51 Class C Subnet PIGDBIMD 2x iuteteso Roe pP o ERR PHHITPGEEeopER TEMERE N OPI ULM EEEFH EIN FRMEEE REDE 156 Table 52 Class B Subnet Planning uiacseccecie
86. elect WPA PSK or WPA2 PSK if your wireless clients support it Type a pre shared key from 8 to 63 ASCII characters including spaces and symbols This field is case sensitive Chapter 3 Introducing the Web Configurator 41 ZyXEL G 5708 User s Guide Figure 24 Wizard 3 WPA 2 PSK SETUP WIZARD ryption method aring the Pre Shar ients or other ac points can securely WPA PSK v 3 3 4 Wizard Confirm Your Settings This read only screen shows the status of the current settings Use the summary table to check whether what you have configured is correct Click Finish to complete the wizard configuration and save your settings 42 Chapter 3 Introducing the Web Configurator ZyXEL G 5708 User s Guide Figure 25 Wizard Confirm Your Settings SETUP WIZARD fa confirm your Settings IP Address Subnet Mask Gateway IP Address SSID Channel Security For more detailed background information see the rest of this User s Guide 3 4 Navigating the Advanced Screens The STATUS screen is the first advanced screen that displays This section explains how to navigate the advanced configuration screens See the chapter on the Status screen for details about the individual screen Chapter 3 Introducing the Web Configurator 43 ZyXEL G 5708 User s Guide Figure 26 Status Screen gt Status Refresh Interval None z Refresh Now Device Name ZyXEL6789 IP Address 192 168 1 2 Operation Mode A
87. elete Activate Deactivate Devices Hardware DNS Hosts et You may configure network devices associated with a LES physical hardware here Multiple logical devices can be associated with a single piece of hardware Profile Status Device Nickname Type X Inactive f ethO ethO Ethernet a Edit Device 2 Double click on the profile of the network card you wish to configure The Ethernet Device General screen displays as shown Figure 95 Red Hat 9 0 KDE Ethernet Device General Ethernet Device mx General Route Hardware Device Nickname eth0 4 Activate device when computer starts Allow all users to enable and disable the device amp Automatically obtain IP address settings with DHCP Settings dhcp Hostname optional y Automatically obtain DNS information from provider Statically set IP addresses Manual IP Address Settings Address Subnet Mask Default Gateway Address Appendix B Setting up Your Computer s IP Address 133 ZyXEL G 5708 User s Guide e Ifyou have a dynamic IP address click Automatically obtain IP address settings with and select dhep from the drop down list Ifyou have a static IP address click Statically set IP Addresses and fill in the Address Subnet mask and Default Gateway Address fields 3 Click OK to save the changes and close the Et
88. entication Protocol 79 F Failure 6 FCC 3 Compliance 3 Rules Part 15 3 FCC Rules 3 Federal Communications Commission 3 Finland Contact Information 7 Fitness 6 Fragmentation Threshold 61 140 Fragmentation threshold 140 France Contact Information 7 Functionally Equivalent 6 G Gas Pipes 5 Germany Contact Information 7 God act of 6 H Harmful Interference 3 Hidden node 139 High 115 High Voltage Points 5 Host IDs 151 IBSS 57 137 IEEE 802 11g 141 Independent Basic Service Set 57 137 Indirect Damages 6 initialization vector IV 147 Insurance 6 Interference 3 Interference Correction Measures 3 Interference Statement 3 IP Address 53 IP Address Default 115 IP Addressing 151 IP Classes 151 L Labor 6 Legal Rights 6 Liability 2 License 2 Lightning 5 Liquids Corrosive 5 MAC filter 74 Management 116 Materials 6 Merchantability 6 Message Integrity Check MIC 146 Modifications 3 N Navigation Panel 44 New 6 North America 5 North America Contact Information 7 160 Index ZyXEL G 5708 User s Guide North American Plug Standards 118 Norway Contact Information 7 O Open System 76 Opening 5 Operating Condition 6 Operation Humidity 115 Operation Temperature 115 Out dated Warranty 6 Outlet 3 P Pairwise Master Key PMK 147 Parts 6 Password 115 Patent 2 Permission 2 Photocopying 2 Pipes 5 Pool 5 Postage Prepaid 6 Power Adaptor Spec
89. er Refresh Interval None 7 Refresh Now IP Settings ZyXEL6789 IP Address 192 168 1 2 AP Subnet Mask 255 255 255 0 00 60 b3 45 67 89 Gateway IP Address 0 0 0 0 V1 00 23 0 CO Summary ZyXEL G 570S View Statistics 6 L View Association List g Disable Disable illl The following table describes the labels in this screen Table 5 Status LABEL DESCRIPTION Refresh Interval Use the drop down list box to select how often you want the device to renew the information on this screen Refresh Now Click this button to have the device renew the information on this screen Device Information Device Name This is the same as the device name you entered in the first wizard screen if you entered one there It is for identification purposes Operation Mode This field shows whether the device is functioning as an access point a wireless client a bridge or an access point and repeater Chapter 4 Status Screens 47 ZyXEL G 570S User s Guide Table 5 Status LABEL DESCRIPTION MAC Address This field displays the MAC address of the device The MAC Media Access Control or Ethernet address on a LAN Local Area Network is unique to your computer A network interface card such as an Ethernet adapter has a hardwired address that is assigned at the factory This address follows an industry standard that ensures no other adapter has a similar add
90. et Interval Click this button to apply the new poll interval you entered above Stop Click this button to stop refreshing statistics Chapter 4 Status Screens 49 ZyXEL G 5708 User s Guide 4 1 2 Association List Click STATUS and then the View Association List button to display the Association List screen When the device is not in wireless client mode this screen displays which wireless stations are currently associated to the device in the Association List screen Figure 29 Status View Association List Association List SS A A E Rescan l i The following table describes the labels in this screen Table 7 Status View Association List LABEL DESCRIPTION No This is the index number of an associated wireless station MAC Address This field displays the MAC address of an associated wireless station IP Address This field displays the IP address of an associated wireless station Signal Strength This field displays the signal strength of each associated wireless station Status This field displays Associated for associated wireless stations Rescan Click Rescan to check for associated wireless stations When the device is in client mode this screen displays a list of wireless devices and networks in the area Figure 30 Status View Association List W
91. ethods of Restoring Factory Defaults You can erase the current configuration and restore factory defaults in two ways 1 Use the RESET button on the G 570S to upload the default configuration file hold this button in for at least five seconds 2 Use the web configurator to restore defaults Click SYSTEM gt Management gt Configuration File From here you can restore the G 570S to factory defaults Chapter 2 Management Computer Setup 33 ZyXEL G 570S User s Guide 34 Chapter 2 Management Computer Setup ZyXEL G 5708 User s Guide CHAPTER 3 Introducing the Web Configurator This chapter describes how to configure the G 570S using the Wizard 3 1 Web Configurator Overview The web configurator is an HTML based management interface that allows easy G 570S setup and management via Internet browser Use Internet Explorer 6 0 and later or Netscape Navigator 7 0 and later versions The recommended screen resolution is 1024 by 768 pixels In order to use the web configurator you need to allow Web browser pop up windows from your device Web pop up blocking is enabled by default in Windows XP SP Service Pack 2 JavaScripts enabled by default Java permissions enabled by default See the Troubleshooting chapter if you want to make sure these functions are allowed in Internet Explorer or Netscape Navigator 3 2 Accessing the G 570S Web Configurator Follow the steps below to access the web configurator
92. etup and click Apply to go directly to the advanced screens see Section 3 4 on page 43 36 Chapter 3 Introducing the Web Configurator ZyXEL G 5708 User s Guide Figure 19 Select Wizard or Advanced Setup Screen Please select wizard or advanced mode The Wizard setup walks you through the most common configuration settings We suggest you use this mode if it is the first tirme you are setting up your access point or if you need to make basic configuration changes 3 3 Configuring the G 570S Using the Wizard The wizard consists of a series of screens to help you configure your G 570S for wireless stations to access your wired LAN Use the following buttons to navigate the Wizard Back Click Back to return to the previous screen Next Click Next to continue to the next screen No configuration changes will be saved to the G 570S until you click Finish 3 3 1 Wizard Basic Settings Click SETUP WIZARD to display the first wizard screen shown next Refer to the System Screens chapter for more background information 1 Enter a descriptive name to identify the device in the Ethernet network 2 Select Obtain IP Address Automatically if you want to put the device behind a router that assigns an IP address If you select this by mistake use the RESET button to restore the factory default IP address 3 Select Use fixed IP Address to give the device a static IP address The IP address you configure
93. fix http For example http 192 168 1 1 4 Click Add to move the IP address to the list of Allowed sites Chapter 8 Troubleshooting 107 ZyXEL G 5708 User s Guide Figure 74 Pop up Blocker Settings Pop up Blocker Settings Exceptions Pop ups are currently blocked You can allow pop ups from specific Web sites by adding the site to the list below Address of W eb site to allow http 4 192 168 1 1 Add Allowed sites Notifications and Filter Level Play a sound when a pop up is blocked Show Information Bar when a pop up is blocked Filter Level Medium Block most automatic pop ups Pop up Blocker FAG 5 Click Close to return to the Privacy screen 6 Click Apply to save this setting 8 4 1 2 JavaScripts If pages of the web configurator do not display properly in Internet Explorer check that JavaScripts are allowed 1 In Internet Explorer click Tools Internet Options and then the Security tab 108 Chapter 8 Troubleshooting ZyXEL G 5708 User s Guide Figure 75 Internet Options Internet options zx General Security Privacy Content Connections Programs Advanced Select a Web content zone to specify its security settings e oe Internet Local intranet Trusted sites Restricted sites Internet S This zone contains all Web sites you SES haven t placed in other zones r Security level for this zone Move the slider to set the security level for this zone
94. formation Connect the power cord to the right supply voltage 110V AC in North America or 230V AC in Europe Place connecting cables carefully so that no one will step on them or stumble over them Do NOT allow anything to rest on the power cord and do NOT locate the product where anyone can walk on the power cord Ifyou wall mount your device make sure that no electrical gas or water pipes will be damaged Do NOT install nor use your device during a thunderstorm There may be a remote risk of electric shock from lightning Do NOT expose your device to dampness dust or corrosive liquids Do NOT use this product near water for example in a wet basement or near a swimming pool Make sure to connect the cables to the correct ports Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device Do NOT store things on the device Connect ONLY suitable accessories to the device Safety Warnings 5 ZyXEL G 5708 User s Guide ZyXEL Limited Warranty ZyXEL warrants to the original end user purchaser that this product is free from any defects in materials or workmanship for a period of up to two years from the date of purchase During the warranty period and upon proof of purchase should the product have indications of failure due to faulty workmanship and or materials ZyXEL will at its discretion repair or replace the defective products or components without charge for eit
95. gure 51 Wireless Security 802 1x Security Settings Encryption Method 8024X z Data Encryption 64 bits WEP x Enter a passphrase to automatically generate a WEP key or leave it blank if you want to manually enter the WEP key Passphrase i Generate max 16 alphanumeric printable characters OI Key1 o Key2 o Keys C Key4 i Note 64 bit WEP Enter 5 ASCII characters or 10 hexadecimal characters 0 9 128 bit WEP Enter 13 ASCII characters or 26 hexadecimal characters 0 152 bit WEP Enter 16 ASCII characters or 32 hexadecimal characters 0 g 9 Authentication Server Authentication Server IP Address 0 o fo k fo Port Number 1812 Shared Secret 0 31 alphanumeric printable characters and no spaces Rekey Options Reauthentication Time 500 Seconds max 100 3600 Global Key Update G every 5600 Seconds mas 100 3600 every 1000 X1000 Packets max 100 3600 Reset 86 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide The following table describes the labels in this screen Table 21 Wireless Security 802 1x LABEL DESCRIPTION Encryption Method Select 802 1X to configure authentication of wireless stations and encryption key management Note WPA WPA2 and IEEE 802 1x wireless security are not available when you use Bridge or AP Repeater mode You can only use WEP keys to encrypt traffic between APs Data Encryption
96. he same time B C and D can communicate with A Figure 5 Bridge Application mM A G 570S in bridge mode without an Ethernet connection can function as a repeater It transmits traffic from one AP to another AP without using a wired connection C in the following graphic repeats wireless traffic between A and B Figure 6 Bridge Repeater Application 26 Chapter 1 Getting to Know Your G 570S ZyXEL G 5708 User s Guide 1 3 5 Access Point and Repeater Set the G 570S to AP Repeater mode to have it simultaneously provide access for wireless clients and use the repeater function This allows you to extend the coverage of your wireless network without installing Ethernet cable to connect the G 570S In the following figure B is in AP Repeater mode B functions as an AP for wireless clients C and D B also repeats traffic between the wireless clients and AP A which is connected to the wired network You could also set AP A to AP Repeater mode so that wireless clients could connect to A as well Figure 7 AP Repeater Application 1 4 The LED Display Figure8 Front Panel ZyXEL Wireless Access Point aD GID Cur Ca The following table describes the LEDs on the G 5708 Table 1 Front Panel LED Description LED COLOR STATUS DESCRIPTION PWR Green Blinking The G 570S is not ready or rebooting On The G 570S has a successful reboot and is receiving power Off The G 5708 is not receiving power
97. he device for details Figure 60 Management Password Password Password Setup Current Password New Password mas 18 characters Retype to Confirm Apply Reset The following table describes the labels in this screen Table 24 Management Password LABEL DESCRIPTION Current Password Type in your existing system password 1234 is the default password New Password Type your new system password up to 30 printable characters Spaces are not allowed Note that as you type a password the screen displays an asterisk for each character you type Retype to Confirm Retype your new system password for confirmation Chapter 7 Management Screens 95 ZyXEL G 5708 User s Guide Table 24 Management Password continued LABEL DESCRIPTION Apply Click Apply to save your changes back to the device Cancel Click Cancel to reload the previous configuration for this screen 7 3 Logs Click SETTINGS gt MANAGEMENT gt Logs to open the Logs screen You can view logs and alert messages in this screen Once the log table is full old logs are deleted as new logs are created Click a column heading to sort the entries A triangle indicates the direction of the sort order Figure 61 Management Logs ooo nm Log List 1 2 3 4 5 6 7 8 9 3 m co p lt 785 785 3463 3463 5750 5750 5903 5903 00 60 B3 45
98. he wireless LAN WLAN and some basic scenarios 6 1 1 IBSS An Independent Basic Service Set IBSS also called an Ad hoc network is the simplest WLAN configuration An IBSS is defined as two or more computers with wireless adapters within range of each other that from an independent wireless network without the need of an access point AP Figure 32 IBSS Ad hoc Wireless LAN 1 ge in f m il 4 M MC x Y X Y Ad hocWireless LAN IBSS l fr L xX ta SS 6 1 2 BSS A Basic Service Set BSS exists when all communications between wireless stations or between a wireless station and a wired network client go through one access point AP Intra BSS traffic is traffic between wireless stations in the BSS When Intra BSS is enabled wireless station A and B can access the wired network and communicate with each other When Intra BSS is disabled wireless station A and B can still access the wired network but cannot communicate with each other Chapter 6 Wireless Screens 57 ZyXEL G 5708 User s Guide Figure 33 Basic Service set 6 1 3 ESS An Extended Service Set ESS consists of a series of overlapping BSSs each containing an access point with each access point connected together by a wired network This wired connection between APs is called a Distribution System DS An ESSID ESS IDentification uniquely identifies each ESS All access points and their associated wireless sta
99. her parts or labor and to whatever extent it shall deem necessary to restore the product or components to proper operating condition Any replacement will consist of a new or re manufactured functionally equivalent product of equal value and will be solely at the discretion of ZyXEL This warranty shall not apply if the product is modified misused tampered with damaged by an act of God or subjected to abnormal working conditions Note Repair or replacement as provided under this warranty is the exclusive remedy of the purchaser This warranty is in lieu of all other warranties express or implied including any implied warranty of merchantability or fitness for a particular use or purpose ZyXEL shall in no event be held liable for indirect or consequential damages of any kind of character to the purchaser To obtain the services of this warranty contact ZyXEL s Service Center for your Return Material Authorization number RMA Products must be returned Postage Prepaid It is recommended that the unit be insured when shipped Any returned products without proof of purchase or those with an out dated warranty will be repaired or replaced at the discretion of ZyXEL and the customer will be billed for parts and labor All repaired or replaced products will be shipped by ZyXEL to the corresponding return address Postage Paid This warranty gives you specific legal rights and you may also have other rights that vary from country to country
100. hernet Device General screen 4 If you know your DNS server IP address es click the DNS tab in the Network Configuration screen Enter the DNS server information in the fields provided Figure 96 Red Hat 9 0 KDE Network Configuration DNS File Profile Help B f Be New Edit Copy Delete Devices Hardware DNS Hosts rg Hostname Primary DNS Secondary DNS Tertiary DNS DNS Search Path You may configure the system s hostname domain name servers and search domain Name servers are used to look up other hosts on the network Active Profile Common modified 5 Click the Devices tab 6 Click the Activate button to apply the changes The following screen displays Click Yes to save the changes in all screens Figure 97 Red Hat 9 0 KDE Network Configuration Activate Anestin saved Do you want to continue redhat config network You have made some changes in your configuration To activate the network device ethO the changes have to be 7 After the network card restart process is complete make sure the Status is Active in the Network Configuration screen Using Configuration Files Follow the steps below to edit the network configuration files and set your computer IP address 134 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide 1 Assuming that you have only
101. ic WEP is enabled To use Dynamic WEP enable and configure the RADIUS server and enable Dynamic WEP Key Exchange in the WIRELESS Security 802 1x screen Ensure that the wireless station s EAP type is configured to one of the following EAP TLS EAP TTLS PEAP Note EAP MD5 cannot be used with Dynamic WEP Key Exchange 6 10 Introduction to WPA and WPA2 Wi Fi Protected Access WPA is a subset of the IEEE 802 111 standard WPA2 IEEE 802 111 is a wireless security standard that defines stronger encryption authentication and key management than WPA 78 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Key differences between WPA 2 and WEP are improved data encryption and user authentication If both an AP and the wireless clients support WPA2 and you have an external RADIUS server use WPA2 for stronger data encryption If you don t have an external RADIUS server you should use WPA2 PSK WPA2 Pre Shared Key that only requires a single identical password entered into each access point wireless gateway and wireless client As long as the passwords match a wireless client will be granted access to a WLAN If the AP or the wireless clients do not support WPA2 just use WPA or WPA PSK depending on whether you have an external RADIUS server or not Select WEP only when the AP and or wireless clients do not support WPA or WPA2 WEP is less secure than WPA or WPA2 6 10 1 Encryption Both WPA and WPA2 improve da
102. icrosoft VM E Java permissions Q Custom J Disable Jav 9 High safety Q Low safety Reset custom settings Reset to Medium Reset 8 4 1 3 1 JAVA Sun 1 From Internet Explorer click Tools Internet Options and then the Advanced tab 2 make sure that Use Java 2 for lt applet gt under Java Sun is selected 3 Click OK to close the window Chapter 8 Troubleshooting 111 ZyXEL G 5708 User s Guide Figure 78 Java Sun aix General Security Privacy Content Connections Programs Advanced Settings O Use inline AutoComplete O Use Passive FTP for firewall and DSL modem compatibility Use smooth scrolling E HTTP 1 1 settings v Use HTTP 1 1 aH Use HTTP 1 1 through proxy connections 3 Microso O Java X enabled requires restart O Java logging enabled JIT compiler for virtual machine enabled requires restart Multimedia O Always show Internet Explorer 5 0 or later Radio toolbar O Don t display online media content in the media bar Enable Automatic Image Resizing of b Restore Defaults gt Java ee UseJave2v1 41 07 fr copobb eats estan gt 2 v1 4 1 07 for UseJave2v1 41 07 for copobb eats resi gt requires restart Cancel Apply 8 5 Testing the Connection to the G 570S 1 Click Start All Programs Accessories and then Command Prompt 2 In the Command Prompt window type ping followed by a space and the IP address of the G 570S 192 168
103. ient uiisiusieee einer riter pera nent or Eix hh oe ER ELA gRR ERR AA 64 Figure 38 Bridging m 66 List of Figures 13 ZyXEL G 5708 User s Guide Figure 39 Badge Loop Two Badges Connected to Hub uir tmn ena 67 Figure 40 Bridge Loop Bridge Connected to Wired LAN see 67 Figure 41 Wireless Settings Bridge iuuicccsiizeeteessaze eric dart terrier pube addebat lodos pain deep i 68 Figure 42 Wireless Settings AP Repeater sese iseeeee eese ette enenatis T1 Figure 43 WEF Authentication Steps e D io aaeianminaueis 75 az Mz LP Dic 78 Figure 45 WPA Z PSK Authentication 5 esa at hannah k qu nda kara a A Usa Ear UR ka PARU bua a 80 Figure 46 WPA with RADIUS Application Example sss 80 Figure 47 Wireless Security Disable 5 ord et or m nord a br d d xod da idR 82 Figure 49 Wireless Security WEP 1 adesie thbrkapua Lut rba d sta Lega d RbU LM Asi DUE Ripa d 2i a ipaa 83 Figure 49 Wireless Security VIPALZ PENK 1iiisscccc cueste asen sa eerte eu bh risen oorr ares saei nerenin 84 Figure 50 Wireless Security VUPBI 1 ncesrcicsstbppe IEEE pr 4E EREC IAS ERE PHASE RE RI Ep R EV pex 85 Figure 51 Wirel ss Security SUZ TX aessapsepud quib Fa gie she v ERE PN PISdMRE CN NAR ERN HIR REVUE ERN NS 86 Foure S2 MAC i D 88 Fae SO OTOT iepatauatibsda uu eAaEed rubet aaa bbb ta A c fe nud d Ue e euo dE C EDU e H
104. ifications 118 Power Cord 5 Private IP Address 53 Product Model 7 Product Page 4 Product Serial Number 7 Products 6 Proof of Purchase 6 Proper Operating Condition 6 Protocol Support 115 Purchase Proof of 6 Purchaser 6 Q Qualified Service Personnel 5 R Radio Communications 3 Radio Frequency Energy 3 Radio Interference 3 Radio Reception 3 Radio Technician 3 RADIUS 141 Shared Secret Key 142 RADIUS Message Types 142 RADIUS Messages 142 Read Me First 19 Receiving Antenna 3 Registered 2 Registered Trademark 2 Regular Mail 7 Related Documentation 19 Relocate 3 Re manufactured 6 Removing 5 Reorient 3 Repair 6 Replace 6 Replacement 6 Reproduction 2 Restore 6 Return Material Authorization RMA Number 6 Returned Products 6 Returns 6 Rights 2 Rights Legal 6 Risk 5 Risks 5 RJ 45 115 RMA 6 Roaming 147 Example 148 Requirements 148 RTS Request To Send 140 RTS Threshold 60 139 140 RTS CTS 60 S Safety Warnings 5 Security Parameters 81 Separation Between Equipment and Receiver 3 Serial Number 7 Index 161 ZyXEL G 5708 User s Guide Service 5 6 Service Personnel 5 Service Set Identity 59 Shared Key 76 Shipping 6 Shock Electric 5 signal strength 50 51 Spain Contact Information 8 SSID 51 59 Statistics 48 Storage Humidity 115 Storage Temperature 115 Subnet Mask 53 Subnet Mask Default 115 Subnet Masks 152 Subnetting 152 Supply Voltage 5 Support E
105. igure 104 Basic Sorice QOL raniad sasien REDI in ncaauth SUPRA FERE ESE EA OD EUM EAM PME SEREA 138 Figure 109 Infrastucure WLAN MEM masta RNA 139 Fidure 105 RT e Te quiate tesa ndi AA 140 Figure 107 EAP SQUID BUDE ansiedad Meca ada 143 Figure 108 WEP Authentication SIODS iiusececsissasccer ense sucer ioeis stet rena caet amas naen 145 Figure 109 Roaming ANN fee 148 List of Figures 15 ZyXEL G 5708 User s Guide 16 List of Figures ZyXEL G 5708 User s Guide List of Tables Table 1 Front Panel CED Desert 555 7 cr nre E ao re b ooa etd c aree da 27 RE SA esci a T X IET 33 Table 3 Global ISON Wee 44 Tapo A Sorens SUMMA ausacctendenppt IIR Edo ERR UR RERUL RR E GR AER RHELEEXVNERU EE P Lev atti saan 45 Tono S Ug Rt TP rn t eurrete wre corey Tarerr 47 IEEE UIDMJSRCiI C d 49 Table 7 Status View Association List cenae retta nnn nita nna atn rn a d unn 50 Table 8 Status View Association List Wireless Client Mode eene 51 Table 9 Private IP Address Rangos ausseciexxdUppeix xod te DE RpOHL E PL AE XMERPUL LESS RR AX SARI RA 53 BE UE Eu pon dee innui enande r annae E EEEE ENAA SENEE E ERAN 54 Table 11 Wireless Settings Access POINT iode dt soi IIo vp eid dor CU rad i ke Fa anr eis 62 Table 12 Wireless Settings Wireless Client nennen nnne 65 Ir WEIL E UgorMilss em RT 69 Table 14 Wireless Settings AP
106. ines the number of hosts you can have on each subnet Table 44 Subnet 1 NETWORK NUMBER DUE BI IP Address 192 168 1 0 IP Address Binary 11000000 10101000 00000001 00000000 Subnet Mask 255 255 255 128 Subnet Mask Binary 11111111 11111111 11111111 10000000 Subnet Address 192 168 1 0 Lowest Host ID 192 168 1 1 Broadcast Address 192 168 1 127 Highest Host ID 192 168 1 126 Table 45 Subnet 2 NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192 168 1 128 IP Address Binary 11000000 10101000 00000001 10000000 Subnet Mask 255 255 255 128 Subnet Mask Binary 11111111 11111111 11111111 10000000 Subnet Address 192 168 1 128 Lowest Host ID 192 168 1 129 Broadcast Address 192 168 1 255 Highest Host ID 192 168 1 254 The remaining 7 bits determine the number of hosts each subnet can have Host IDs of all Zeros represent the subnet itself and host IDs of all ones are the broadcast address for that subnet so the actual number of hosts available on each subnet in the example above is 27 2 or 126 hosts for each subnet 192 168 1 0 with mask 255 255 255 128 is the subnet itself and 192 168 1 127 with mask 255 255 255 128 is the directed broadcast address for the first subnet Therefore the lowest IP address that can be assigned to an actual host for the first subnet is 192 168 1 1 and the highest is 192 168 1 126 Similarly the host ID range for the
107. ion keys to encrypt every data packet that is wirelessly communicated between the AP and the wireless stations This all happens in the background automatically WPA2 AES Advanced Encryption Standard is a block cipher that uses a 256 bit mathematical algorithm called Rijndael The Message Integrity Check MIC is designed to prevent an attacker from capturing data packets altering them and resending them The MIC provides a strong mathematical function in which the receiver and the transmitter each compute and then compare the MIC If they do not match it is assumed that the data has been tampered with and the packet is dropped By generating unique data encryption keys for every data packet and by creating an integrity checking mechanism MIC TKIP makes it much more difficult to decrypt data on a Wi Fi network than WEP making it difficult for an intruder to break into the network The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials The common password approach makes WPA PSK susceptible to brute force password guessing attacks but it s still an improvement over WEP as it employs an easier to use consistent single alphanumeric password Roaming A wireless station is a device with an IEEE 802 11 mode compliant wireless adapter An access point AP acts as a bridge between the wireless and wired networks
108. ireless Client Mode Association List es ee Strengt Rescan 50 Chapter 4 Status Screens ZyXEL G 5708 User s Guide The following table describes the labels in this screen Table 8 Status View Association List Wireless Client Mode LABEL DESCRIPTION SSID This field displays the SSID Service Set IDentifier of each wireless device that the device detected BSSID This field displays the BSSID Basic Service Set IDentifier of each wireless network that the device detected Channel This field displays the channel number used by each wireless device Wireless Mode This field shows whether the network is using IEEE 802 11b or IEEE 802 11g Signal Strength This field displays the signal strength of each wireless device that the device detected Rescan Click Rescan to check for associated wireless stations Chapter 4 Status Screens 51 ZyXEL G 570S User s Guide 52 Chapter 4 Status Screens ZyXEL G 5708 User s Guide CHAPTER 5 System Screen This chapter provides information on the System screen 5 1 TCP IP Parameters 5 1 1 IP Address Assignment Every computer on the Internet must have a unique IP address If your networks are isolated from the Internet for instance only between your two branch offices you can assign any IP addresses to the hosts without problems However the Internet Assigned Numbers Authority IANA has rese
109. is auto negotiating feature allows the G 570S to detect the speed of incoming transmissions and adjust appropriately without manual intervention It allows data transfer of either 10 Mbps or 100 Mbps in either half duplex or full duplex mode depending on your Ethernet network 10 100M Auto crossover Ethernet Fast Ethernet Interface The LAN interface automatically adjusts to either a crossover or straight through Ethernet cable Reset Button The G 570S reset button is built into the rear panel Use this button to restart the device or restore the factory default password 802 11g Wireless LAN Standard The ZyXEL wireless products containing the letter G in the model name such as G 5708 and G 162 comply with the IEEE 802 11g wireless standard IEEE 802 11g is fully compatible with the IEEE 802 11b standard This means an IEEE 802 11b radio card can interface directly with an IEEE 802 11g access point and vice versa at 11 Mbps or lower depending on range Wi Fi Protected Access Wi Fi Protected Access WPA is a subset of the IEEE 802 111 standard Key differences between WPA and WEP are user authentication and improved data encryption 22 Chapter 1 Getting to Know Your G 570S ZyXEL G 5708 User s Guide WPA2 WPA 2 IEEE 802 111 is a wireless security standard that defines stronger encryption authentication and key management than WPA SSL Passthrough The G 570S allows SSL connections to go through the G 570S SSL
110. ive name up to 32 printable characters for the wireless LAN Spaces are allowed Note If you are configuring the device from a computer connected to the wireless LAN and you change the device s SSID channel or security settings you will lose your wireless connection when you press Apply to confirm You must then change the wireless settings of your computer to match the device s new settings Hide SSID Select this check box to hide the SSID in the outgoing beacon frame so a station cannot obtain the SSID through scanning using a site survey tool Channel Set the operating frequency channel depending on your particular region Select a channel from the drop down list box Refer to the chapter on wizard setup for more information about channels Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Table 11 Wireless Settings Access Point continued LABEL DESCRIPTION Wireless Mode Select 802 11b only to allow only IEEE 802 11b compliant WLAN devices to associate with the device Select 802 11g only to allow only IEEE 802 119 compliant WLAN devices to associate with the device Select Auto 11g 11b to allow either IEEE 802 11b or IEEE 802 11g compliant WLAN devices to associate with the device The transmission rate of your device might be reduced Advanced Settings Beacon Interval Set the number of milliseconds that should pass between the sending out of beacons Intra
111. k OK 5 Restart your computer so the changes you made take effect Configuring 1 In the Network window Configuration tab select your network adapter s TCP IP entry and click Properties 2 Click the IP Address tab Ifyour IP address is dynamic select Obtain an IP address automatically Ifyou have a static IP address select Specify an IP address and type your information into the IP Address and Subnet Mask fields Figure 81 Windows 95 98 Me TCP IP Properties IP Address Bindings Advanced NeBIOS DNS Configuration Gateway WINS Configuration IP Address An IP address can be automatically assigned to this computer If your network does not automatically assign IP addresses ask your network administrator for an address and then type it in the space below C Specify an IP address luu dee mu Egg SumeMee TL v Detect connection to network media Cancel 3 Click the DNS Configuration tab If you do not know your DNS information select Disable DNS Ifyou know your DNS information select Enable DNS and type the information in the fields below you may not need to fill them all in Appendix B Setting up Your Computer s IP Address 123 ZyXEL G 5708 User s Guide Figure 82 Windows 95 98 Me TCP IP Properties DNS Configuration TCP IP Properties f 2jxj Bindings Advanced Netpios DNS Configuration Gateway WINS Configuration IP Address
112. key to encrypt and decrypt data Your G 570S allows you to configure up to four 64 bit 128 bit or 152 bit WEP keys but only one key can be enabled at any one time 6 5 2 Authentication Three different methods can be used to authenticate wireless stations to the network Open System Shared and Auto The following figure illustrates the steps involved Figure 43 WEP Authentication Steps A EES Wireless Station Authentication Access Point Authentication Acceptance Challenge Text Authentication Acceptance Chapter 6 Wireless Screens 75 ZyXEL G 5708 User s Guide Open system authentication involves an unencrypted two message procedure A wireless station sends an open system authentication request to the AP which will then automatically accept and connect the wireless station to the network In effect open system is not authentication at all as any station can gain access to the network Shared key authentication involves a four message procedure A wireless station sends a shared key authentication request to the AP which will then reply with a challenge text message The wireless station must then use the AP s default WEP key to encrypt the challenge text and return it to the AP which attempts to decrypt the message using the AP s default WEP key If the decrypted message matches the challenge text the wireless station 1s authenticated When your G 570S s authentication method is set to open system it will
113. l se 46 31 744 7700 www zyxel se ZyXEL Communications A S SWEDEN Sj porten 4 41764 G teborg sales zyxel se 46 31 744 7701 Sweden support ua zyxel com 380 44 247 69 78 www ua zyxel com ZyXEL Ukraine UKRAINE 13 Pimonenko Str sales ua zyxel com 380 44 494 49 32 Kiev 04050 Ukraine UNITED KINGDOM support zyxel co uk 44 1344 303044 08707 555779 UK only www zyxel co uk sales zyxel co uk 44 1344 303034 ftp zyxel co uk ZyXEL Communications UK Ltd 11 The Courtyard Eastern Road Bracknell Berkshire RG12 2XB United Kingdom UK a is the prefix number you enter to make an international telephone call Customer Support ZyXEL G 5708 User s Guide Table of Contents sls fe 2 Interference Statements and Certifications eeeeeeeseeesssess 3 ibd rs ETE I II emnt 5 Fi PiFWIS CR rc 4 TDI aoaaa 6 Customer SAPPE uuu cicer ipud vein ECRIRE GeRR daa Kor id nra la eG EG dein dX dul Paw pad da PARKER DNE 7 Table oT COREGUTS ausscietixaune c ki tree ead e Cap EN URRETU a aa 9 LIST Cot PRG stet tn Mt 13 NIZSONE CINES 17 ir mem 19 Chapter 1 RECEN I litori T 21 1 1 Introducing the G 570S Wireless Access Point sssseeeeee 21 12 Gar0S FeaUrES m 21 To AODIGRHONS TOR the a 0S wissscavt
114. less LAN security settings MAC Filter Use the MAC filter screen to configure the Prestige to block access to devices or block the devices from accessing the Prestige OTIST This screen allows you to assign wireless clients the Prestige s wireless security settings Management Password Use this screen to configure the administrator password Logs Use this screen to view logs and alert messages Configuration Use this screen to backup and restore the configuration or reset the factory defaults to your Prestige F W Upload Use this screen to upload firmware to your Prestige Note See the rest of this User s Guide for configuration details and background information on all G 570S features using the web configurator Chapter 3 Introducing the Web Configurator 45 ZyXEL G 570S User s Guide 46 Chapter 3 Introducing the Web Configurator ZyXEL G 5708 User s Guide CHAPTER 4 Status Screens This chapter describes the Status screens 4 1 System Status Click Status to open the following screen The Status screen display a snapshot of your device s settings You can also view network statistics and a list of wireless stations currently associated with your device Note that these labels are READ ONLY and are meant to be used for diagnostic purposes Figure 27 Status Device Information Device Name Operation Mode MAC Address Firmware Version Wireless Settings SSID Channel Encryption Method MAC Filt
115. less client to access a wired network through another AP The G 570S uses IEEE 802 1x WEP data encryption WPA Wi Fi Protected Access WPA2 and MAC address filtering to give mobile users highly secured wireless connectivity Both IEEE 802 11b and IEEE 802 11g compliant wireless devices can associate with the G 570S In addition to being highly flexible the G 570S is easy to install and configure 1 2 G 570S Features The following sections describe the features of the G 570S Bridge Repeater The G 570S can act as a bridge establishing wireless links with other APs or as a repeater establishing wireless links to APs WDS Functionality A Distribution System DS is a wired connection between two or more APs while a Wireless Distribution System WDS is a wireless connection Your G 570S supports WDS connections to other G 570S APs This provides a cost effective solution for wireless network expansion 1 The G 570S only supports WDS connections to G 570S APs not other devices Chapter 1 Getting to Know Your G 570S 21 ZyXEL G 5708 User s Guide Figure 1 WDS Functionality Example OTIST One Touch Intelligent Security Technology OTIST allows your G 570S to assign its SSID and security settings WEP or WPA PSK to the ZyXEL wireless adapters that support OTIST and are within transmission range The ZyXEL wireless adapters must also have OTIST enabled 10 100M Auto negotiating Ethernet Fast Ethernet Interface Th
116. llowing table describes the labels in this screen Table 10 System Settings LABEL DESCRIPTION Device Name This name can be up to 30 printable characters long Spaces are allowed IP Address Assignment Obtain IP Address Automatically Select this option to have your device use a dynamically assigned IP address from a router each time 54 Chapter 5 System Screen ZyXEL G 5708 User s Guide Table 10 System Settings LABEL DESCRIPTION Use fixed IP Select this option to have your device use a static IP address When you select this address option fill in the fields below IP Address Enter the IP address of your device in dotted decimal notation Subnet Mask Enter the subnet mask Gateway IP Type the IP address of the gateway The gateway is a router or switch on the same Address network segment as the device The gateway helps forward packets to their destinations Leave this field as 0 0 0 0 if you do not know it Apply Click Apply to save your changes back to the device Reset Click Reset to reload the previous configuration for this screen Chapter 5 System Screen 55 ZyXEL G 570S User s Guide 56 Chapter 5 System Screen ZyXEL G 5708 User s Guide CHAPTER 6 Wireless Screens This chapter discusses how to configure wireless settings and wireless security on your G 5708 6 1 Wireless LAN Overview This section introduces t
117. mail 7 Supporting Disk 19 Sweden Contact Information 8 Swimming Pool 5 Syntax Conventions 19 System Status 47 T Tampering 6 Telephone 7 Television Interference 3 Television Reception 3 Temporal Key Integrity Protocol TKIP 146 Thunderstorm 5 Trademark 2 Trademark Owners 2 Trademarks 2 Translation 2 TV Technician 3 U Undesired Operations 3 User Authentication 79 146 V Value 6 Vendor 5 Ventilation Slots 5 Viewing Certifications 4 Voltage Supply 5 Voltage High 5 W Wall Mount 5 Warnings 5 Warranty 6 Warranty Information 7 Warranty Period 6 Water 5 Water Pipes 5 WDS 66 Web Site 7 Weight 115 WEP 75 WEP encryption 144 Wet Basement 5 Wide 115 Wired Equivalent Privacy 75 Wireless Client WPA Supplicants 81 WLAN Interference 139 Workmanship 6 Worldwide Contact Information 7 WPA 78 WPA with RADIUS Application 80 WPA2 78 WPA PSK 79 WPA PSK Application 79 Written Permission 2 Z ZyNOS 2 ZyXEL Communications Corporation 2 ZyXEL Home Page 4 ZyXEL Limited Warranty Note 6 ZyXEL Network Operating System 2 162 Index
118. mble if you are sure the wireless adapters support it and to provide more efficient communications Select Auto to have the device automatically use short preamble when all wireless clients support it otherwise the device uses long preamble Note The device and the wireless stations MUST use the same preamble mode in order to communicate Super G Mode Super G mode provides higher speed transmissions than regular IEEE 802 11g The other device must also support super G mode in order for the device to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 11g Chapter 6 Wireless Screens 65 ZyXEL G 5708 User s Guide Table 12 Wireless Settings Wireless Client continued LABEL DESCRIPTION Turbo G Mode Turbo G mode provides higher speed transmissions than regular IEEE 802 11g or super G mode The other device must also support turbo G mode in order for the device to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 11g Turbo G uses two channels bonded together in order to achieve its higher transmission rates This may cause interference with other APs in the area The Channel field is automatically fixed at 6 when you use turbo G mode RTS CTS Enter a value between 0 and 2432 The default is 2432 Threshold Fragmentation Enter a value between 256 and 2432 The default is 2432
119. mote MAC Address 3 Remote MAC Address 4 Advanced Settings fioo 20 1000 Beacon Interval Intra BSS Traffic C Enable Disable DTIM Interval 1 14255 Number of Wireless Stations Allowed to Associate 32 1 32 Radio Enable C Yes No Output Power Management wn Data Rate Management Best Preamble Type Dynamic 7 Super G Mode Turbo G Mode RTS CTS Threshold Fragmentation C Enable Disable C Enable Disable 2348 0 2346 2346 256 2346 Amy Reset Chapter 6 Wireless Screens 71 ZyXEL G 570S User s Guide The following table describes the labels in this screen Table 14 Wireless Settings AP Repeater LABEL DESCRIPTION Operation Mode Select the operating mode from the drop down list The options are Access Point Wireless Client Bridge and AP Repeater SSID Wireless stations associating to the access point AP must have the same SSID Enter a descriptive name up to 32 printable characters for the wireless LAN Spaces are allowed Note If you are configuring the device from a computer connected to the wireless LAN and you change the device s SSID channel or security settings you will lose your wireless connection when you click Apply to save your settings You must then change the wireless settings of your computer to match the device s new settings Hide SSID Select this check box to hide the SSID in the outgoing beacon frame so a station can
120. n how you configure these security features Table 16 Wireless Security Relational Matrix AUTHENTICATION Be EN Eni ON Ug RESMANUM ee PROTOCOL Open None No Disable Open WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable Shared WEP No Enable with Dynamic WEP Key Yes Enable without Dynamic WEP Key Yes Disable WPA TKIP No Enable WPA PSK TKIP Yes Enable WPA2 AES No Enable WPA2 PSK AES Yes Enable 6 14 Wireless Client WPA Supplicants A wireless client supplicant is the software that runs on an operating system instructing the wireless client how to use WPA At the time of writing the most widely available supplicants are the WPA patch for Windows XP Funk Software s Odyssey client and Meetinghouse Data Communications AEGIS client The Windows XP patch is a free download that adds WPA capability to Windows XP s built in Zero Configuration wireless client However you must run Windows XP to use it 6 15 Configuring Wireless Security In order to configure and enable wireless security click SETTINGS gt WIRELESS gt Security to display the Security screen This screen varies according to the encryption method you select Chapter 6 Wireless Screens 81 ZyXEL G 5708 User s Guide 6 15 1 Wireless Security Disable If you do not enable any wireless security on your device your network is accessible to any wireless networking devic
121. nology Setup Key Enter the setup key of up to eight printable characters The default OTIST setup key is 01234567 Note If you change the OTIST setup key here you must also make the same change on the wireless client s Yes To have OTIST automatically generate a WPA PSK key select this check box If you manually configured a WEP key or a WPA PSK key and you also select this check box then the key you manually configured is used Start Click Start to encrypt the wireless security data using the setup key and have the device set the wireless client to use the same wireless settings as the device You must also activate and start OTIST on the wireless client at the same time The process takes three minutes to complete 6 17 1 2 Wireless Client Start the ZyXEL utility and click the Adapter tab Select the OTIST check box enter the same Setup Key as your AP s and click Save 90 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Figure 54 Example Wireless Client OTIST Screen Transfer Rate Fully Auto gt Power Saving Mode Disabled v OTIST One Touch Intelligent Security Technology Setup Key 01234567 Start 6 17 2 Starting OTIST Note You must click Start in the AP OTIST web configurator screen and in the wireless client s Adapter screen all within three minutes at the time of writing You can start OTIST in the wireless clients and AP in any order but they must all
122. not obtain the SSID through scanning using a site survey tool Channel Set the operating frequency channel depending on your particular region Select a channel from the drop down list box Refer to the chapter on wizard setup for more information about channels Wireless Mode Select 802 11b only to allow only IEEE 802 11b compliant WLAN devices to associate with the device Select 802 11g only to allow only IEEE 802 119 compliant WLAN devices to associate with the device Select Auto 11g 11b to allow either IEEE 802 11b or IEEE 802 11g compliant WLAN devices to associate with the device The transmission rate of your device might be reduced Local MAC This is the MAC address of the device Address Remote MAC Type the MAC address of the peer device in a valid MAC address format that is Address 1 4 six hexadecimal character pairs for example 12 34 56 78 9a bc Advanced Settings Beacon Interval Set the number of milliseconds that should pass between the sending out of beacons Intra BSS Traffic Intra BSS traffic is traffic between wireless stations in the same BSS Enable Intra BSS traffic to allow wireless stations connected to the device to communicate with each other Disable Intra BSS traffic to only allow wireless stations to communicate with the wired network not with each other DTIM Interval Set the interval for wireless clients in sleep mode to wake up and check for multicast or
123. nsmitted between the wireless stations and the access points to keep network communications private It encrypts unicast and multicast communications in a network Both the wireless stations and the access points must use the same WEP key 144 Appendix C Wireless LANs ZyXEL G 5708 User s Guide WEP Authentication Steps Three different methods can be used to authenticate wireless stations to the network Open System Shared Key and Auto The following figure illustrates the steps involved Figure 108 WEP Authentication Steps m O Wireless Station Authentication Prestige Authentication Acceptance Challenge Text Authentication Acceptance Open system authentication involves an unencrypted two message procedure A wireless station sends an open system authentication request to the AP which will then automatically accept and connect the wireless station to the network In effect open system is not authentication at all as any station can gain access to the network Shared key authentication involves a four message procedure A wireless station sends a shared key authentication request to the AP which will then reply with a challenge text message The wireless station must then use the AP s default WEP key to encrypt the challenge text and return it to the AP which attempts to decrypt the message using the AP s default WEP key If the decrypted message matches the challenge text the wireless station 1s authenticate
124. nsmitter Notice 1 Changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment This product has been designed for the WLAN 2 4 GHz network throughout the EC region and Switzerland with restrictions in France This Class B digital apparatus complies with Canadian ICES 003 Interference Statements and Certifications 3 ZyXEL G 5708 User s Guide Cet appareil num rique de la classe B est conforme la norme NMB 003 du Canada Tdi EREKE E BE EAHA B iE PUA AC RM PERT AT ARREN KTERE STAP IAT RAR RET CER OEE ae Ee HE Si RAS ERM ERTIES RETE R AiR SS ERFA PASEET Sate ipie eal EREEREER SIR HENS ea Aiea LS ASRS See Bimal TR Certifications 1 Go to www zyxel com 2 Select your product from the drop down list box on the ZyXEL home page to go to that product s page 3 Select the certification you wish to view from this page Trade Name Model Number Tested To Comply tandards C winrccs FOR HOME OR OFFICE USE 4 Interference Statements and Certifications ZyXEL G 5708 User s Guide Safety Warnings For your safety be sure to read and follow all warning notices and instructions Do NOT open the device or unit Opening or removing covers can expose you to dangerous high voltage points or other risks ONLY qualified service personnel can service the device Please contact your vendor for further in
125. one network card on the computer locate the ifconfig eth0 configuration file where eth0 is the name of the Ethernet card Open the configuration file with any plain text editor e Ifyou have a dynamic IP address enter dhcp in the BOOTPROTO field The following figure shows an example Figure 98 Red Hat 9 0 Dynamic IP Address Setting in ifconfig ethO EVICE ethO0 BOOT yes OOT PROTO dhcp SERCTL no ERDNS yes TYPE Ethernet ucuUuUOog e Ifyou have a static IP address enter static in the BOOTPROTO field Type IPADDR followed by the IP address in dotted decimal notation and type NETMASK followed by the subnet mask The following example shows an example where the static IP address is 192 168 1 10 and the subnet mask is 255 255 255 0 Figure 99 Red Hat 9 0 Static IP Address Setting in ifconfig ethO DEVICE eth0 ONBOOT yes BOOTPROTO static IPADDR 192 168 1 10 NETMASK 255 255 255 0 USERCTL no PEERDNS yes TYPE Ethernet 2 If you know your DNS server IP address es enter the DNS server information in the resolv conf file in the etc directory The following figure shows an example where two DNS server IP addresses are specified Figure 100 Red Hat 9 0 DNS Settings in resolv conf nameserver 172 23 5 1 nameserver 172 23 5 2 3 After you edit and save the configuration files you must restart the network card Enter
126. or wireless stations to connect to the corporate network without expensive network cabling Stations A B and C can access the wired network through the G 5705s 24 Chapter 1 Getting to Know Your G 570S ZyXEL G 5708 User s Guide The following figure depicts a typical application of the G 570S in an enterprise environment The three computers with wireless adapters are allowed to access the network resource through the G 570S after account validation by the network authentication server Figure 3 Corporate Network Application Internet D Y A X ES Ni i G z X i i 1 1 1 H Pd i f H um E Eo ee es lt gt J Fa B F r Li 7 a a Li p i 4 1 3 3 Wireless Client Application The G 570S can function as a wireless client to connect to a network via an Access Point AP The AP provides access to the wired network and the Internet hs F4 x H x i j i o m a fF ki 05 s L i EIS c p d Si S a Chapter 1 Getting to Know Your G 570S 25 ZyXEL G 5708 User s Guide 1 3 4 Bridge Repeater The G 5708 can act as a wireless network bridge and establish wireless links with other APs The G 570Ss in the following example are using bridge mode with a star configuration A B C and D are connected to independent wired networks and have bridge connections at t
127. ows 2000 NT 2 3 Wireless Connection Ensure that the wireless stations have a compatible wireless card adapter with the same wireless settings as the G 570S The following figure shows how you can access your G 5708 wirelessly Figure 15 Wireless Connection SSID ZyXEL G K TUS 570S Channel 6 32 Chapter 2 Management Computer Setup ZyXEL G 5708 User s Guide Note The wireless stations and G 570S must use the same SSID channel and wireless security settings for wireless communication If you do not enable any wireless security on your G 570S your network traffic is visible to any wireless networking device that is within range 2 4 Restarting the G 570S Press and immediately release the RESET button to restart the G 570S Note Holding the RESET button in for five seconds or longer resets the device to the factory default settings 2 5 Resetting the G 570S If you forget the G 570S s IP address or your password to access the G 570S you will need to reload the factory default using the RESET button Resetting the G 570S replaces the current configuration file with the factory default configuration file This means that you will lose all configurations that you had previously The following parameters will be reset to the default values Table 2 Factory Defaults PARAMETER DEFAULT VALUE IP Address 192 168 1 2 Password 1234 Wireless Security Disabled SSID ZyXEL G 570S 2 5 1 M
128. per G Mode Turbo G Mode RTS CTS Threshold Fragmentation Wireless Settings Advanced Settings Output Power Management Data Rate Management Aireless Client Y ZyXEL G 570S auto 119 115 max 32 printable characters Hide SSID C Yes No Min Best iN Dynamic C Enable Disable C Enable Disable 2346 042346 il 2346 256 2346 Reset E 64 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide The following table describes the labels in this screen Table 12 Wireless Settings Wireless Client LABEL DESCRIPTION Operation Mode Select the operating mode from the drop down list The options are Access Point Wireless Client Bridge and AP Repeater SSID Wireless stations associating to the access point AP must have the same SSID Enter a descriptive name up to 32 printable characters for the wireless LAN Spaces are allowed Note If you are configuring the device from a computer connected to the wireless LAN and you change the device s SSID channel or security settings you will lose your wireless connection when you click Apply to save your settings You must then change the wireless settings of your computer to match the device s new settings Wireless Mode Select 802 11b only to allow only IEEE 802 11b compliant WLAN devices to associate with the device Select 802 11g only to allow only IEEE 802 11g compliant WLAN devi
129. r and Alternate DNS server fields If you have previously configured DNS servers click Advanced and then the DNS tab to order them 128 Appendix B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide Figure 89 Windows XP Internet Protocol TCP IP Properties Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings btain an IP address automatically Use the following IP address Obtain DNS server address automatically Use the following DNS server addresses 8 Click OK to close the Internet Protocol TCP IP Properties window 9 Click Close OK in Windows 2000 NT to close the Local Area Connection Properties window 10 Close the Network Connections window Network and Dial up Connections in Windows 2000 NT 11Turn on your G 5708 and restart your computer if prompted Verifying Settings 1 Click Start All Programs Accessories and then Command Prompt 2 In the Command Prompt window type ipconfig and then press ENTER You can also open Network Connections right click a network connection click Status and then click the Support tab Macintosh OS 8 9 1 Click the Apple menu Control Panel and double click TCP IP to open the TCP IP Control Panel Appendix B Setting
130. r the client sends a different certificate to the server The exchange of certificates is done in the open before a secured tunnel is created This makes user identity vulnerable to passive attacks A digital certificate is an electronic ID card that authenticates the sender s identity However to implement EAP TLS you need a Certificate Authority CA to handle certificates which imposes a management overhead EAP TTLS Tunneled Transport Layer Service EAP TTLS is an extension of the EAP TLS authentication that uses certificates for only the server side authentications to establish a secure connection Client authentication is then done by sending username and password through the secure connection thus client identity is protected For client authentication EAP TTLS supports EAP methods and legacy authentication methods such as PAP CHAP MS CHAP and MS CHAP v2 PEAP Protected EAP Like EAP TTLS server side certificate authentication is used to establish a secure connection then use simple username and password methods through the secured connection to authenticate the clients thus hiding client identity However PEAP only supports EAP methods such as EAP MD5 EAP MSCHAPv2 and EAP GTC EAP Generic Token Card for client authentication EAP GTC is implemented only by Cisco LEAP LEAP Lightweight Extensible Authentication Protocol is a Cisco implementation of IEEE 802 1x WEP Encryption WEP encryption scrambles the data tra
131. r descriptions on the common types Your G 570S supports EAP MD5 Message Digest Algorithm 5 and PEAP Protected EAP with the built in RADIUS server The following figure shows an overview of authentication when you specify a RADIUS server on your access point Chapter 6 Wireless Screens 77 ZyXEL G 5708 User s Guide Figure 44 EAP Authentication un AP RADIUS Server Wireless Station ill The details below provide a general description of how IEEE 802 1x EAP authentication works For an example list of EAP MD5 authentication steps see the IEEE 802 1x appendix 1 The wireless station sends a start message to the G 5708 2 The G 5708 sends a request identity message to the wireless station for identity information 3 The wireless station replies with identity information including user name and password 4 The RADIUS server checks the user information against its user profile database and determines whether or not to authenticate the wireless station 6 9 Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server This key expires when the wireless connection times out disconnects or reauthentication times out A new WEP key is generated each time reauthentication is performed If this feature is enabled it is not necessary to configure a default WEP encryption key in the Wireless screen You may still configure and store keys here but they will not be used while Dynam
132. r the device to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 119 Turbo G Mode Turbo G mode provides higher speed transmissions than regular IEEE 802 11g or super G mode The other device must also support turbo G mode in order for the device to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 11g Turbo G uses two channels bonded together in order to achieve its higher transmission rates This may cause interference with other APs in the area The Channel field is automatically fixed at 6 when you use turbo G mode RTS CTS Enter a value between 0 and 2432 The default is 2432 Threshold Fragmentation Enter a value between 256 and 2432 The default is 2432 It is the maximum data fragment size that can be sent Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 3 2 Wireless Client Mode Select Wireless Client in the Operation Mode field to display the screen as shown next This mode has the device act as wireless client to connect to a wireless network Note WPA WPA2 and IEEE 802 1x wireless security are not available when you use Wireless Client Bridge or AP Repeater mode Figure 37 Wireless Settings Wireless Client Basic Settings Operation Mode SSID Wireless Mode Radio Enable Preamble Type Su
133. ress Firmware Version This is the firmware version and the date the firmware was created IP Settings IP Address This is the Ethernet port IP address Subnet Mask This is the Ethernet port subnet mask Gateway IP Address This is the IP address of a gateway Leave this field as 0 0 0 0 if you do not know it Wireless Settings SSID This is the descriptive name used to identify the device in a wireless network Channel This field displays the radio channel the device is currently using Encryption Method This field shows whether data encryption is activated WEP WPA PSK WPA WPA2 PSK WPA2 or 802 1X or inactive Disable MAC Filter This field shows whether MAC filter is enabled or not With MAC filtering you can allow or deny access to the device based on the MAC addresses of the wireless stations View Statistics Click View Statistics to see performance statistics such as number of packets sent and number of packets received View Association List Click View Association List to show the wireless stations that are currently associated to the device 4 1 1 Statistics Click View Statistics in the STATUS screen This screen displays read only information including port status and packet specific statistics Also provided are system up time and poll interval s The Poll Interval s field is configurable 48 Chapter 4 Status Screens Z
134. reviously installed gateways in the IP Settings tab and click OK Do one or more of the following if you want to configure additional IP addresses Inthe IP Settings tab in IP addresses click Add In TCP IP Address type an IP address in IP address and a subnet mask in Subnet mask and then click Add e Repeat the above two steps for each IP address you want to add Configure additional default gateways in the IP Settings tab by clicking Add in Default gateways In TCP IP Gateway Address type the IP address of the default gateway in Gateway To manually configure a default metric the number of transmission hops clear the Automatic metric check box and type a metric in Metric Click Add Repeat the previous three steps for each default gateway you want to add e Click OK when finished Appendix B Setting up Your Computer s IP Address 127 ZyXEL G 5708 User s Guide Figure 88 Windows XP Advanced TCP IP Properties Advanced TCP IP Settings IP Settings DNS WINS Options IP addresses IP address Subnet mask DHCP Enabled Default gateways Gateway Metric Automatic metric 7 In the Internet Protocol TCP IP Properties window the General tab in Windows XP e Click Obtain DNS server address automatically if you do not know your DNS server IP address es Ifyou know your DNS server IP address es click Use the following DNS server addresses and type them in the Preferred DNS serve
135. risrereirierrrrnsserernreeees ay Figure ZU Wizard Basie StH isdieeecciei vestis ke a es c NR a NERO EB PR PEARL FARA 38 Figure zT Wizard Wireless Olpe 1onadencin ronterapebenibtere ki ME Tr FERAIS E EIN IHpMMEEE QUA HS 39 Figure 22 Setup Wizard 3 Disable 5i piin kie reb rir tid eir ERE bU DARE 40 ow Ward S WEP crash aca ccna sandal AiE Maoh dun EEEE a A dba 41 Figure 24 Wizard S WPA FPSK ressanitidntiii ann bv utri Eo ae b ABE 42 Figure 25 Wizard Confirm Your SOIFIEB iiisiscenes roris eorr 138 SERRE IRE ra i 43 Figure z5 Stats OOPOQE irria unesie n NU a pce le bade danas LUE edn UR MATRE EASAN 44 Figure 27 SAUS me 47 Figure Zo SAUS View DIIISUES anoa 49 Figure 29 Status View Association LIBE usse keit te PPAR Re Ped quee ud cu PUN ane PO ER REPE 50 Figure 30 Status View Association List Wireless Client Mode ssssse 50 Fague oT System ULV seeren ea bs dungen d e bur a eara E Aqu DINE EREA eG a A GIRL KARAER A 54 Figura 32 IBSS Ad hoc Wireless LAN ueiiuviseus strict Fev quc Bh rari b PE EPENE QUEE PEDI Sa hri eIMUA 57 Figure 33 Basie Service SEL cara sess seated na pov han ip Pena Ku assa I npe a Ru A 58 Figure 34 Extended Service Set ass esci bert tee e Eoo a uk ep pad IA ER KI RR A AGER E pE 7 RI REA dd 59 Foue 3S RTSO TS e M 60 Figure 36 Wireless Settings Access POU 1 riis ttr rrt et yr PEE rne ee oed 62 Figure 37 Wireless Settings Wireless Cl
136. rty cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Pop up Blocker Prevent most pop up windows from appearing C Block pop ups 3 Click Apply to save this setting 106 Chapter 8 Troubleshooting ZyXEL G 5708 User s Guide 8 4 1 1 2 Enable pop up Blockers with Exceptions Alternatively if you only want to allow pop up windows from your device see the following steps 1 In Internet Explorer select Tools Internet Options and then the Privacy tab 2 Select Settings to open the Pop up Blocker Settings screen Figure 73 Internet Options Internet Options General Security Privacy Content Connections Programs Advanced Settings Move the slider to select a privacy setting for the Internet RR zone Medium Blocks third party cookies that do not have a compact privacy policy Blocks third party cookies that use personally identifiable information without your implicit consent Restricts first party cookies that use personally identifiable information without implicit consent Pop up Blocker Prevent most pop up windows from appearing Block pop ups Settings T 3 Type the IP address of your device the web page that you do not want to have blocked with the pre
137. rved the following three blocks of IP addresses specifically for private networks Table 9 Private IP Address Ranges 10 0 0 0 10 255 255 255 172 16 0 0 172 31 255 255 192 168 0 0 192 168 255 255 You can obtain your IP address from the IANA from an ISP or have it assigned by a private network If you belong to a small organization and your Internet access is through an ISP the ISP can provide you with the Internet addresses for your local networks On the other hand if you are part of a much larger organization you should consult your network administrator for the appropriate IP addresses Note Regardless of your particular situation do not create an arbitrary IP address always follow the guidelines above For more information on address assignment please refer to RFC 1597 Address Allocation for Private Internets and RFC 1466 Guidelines for Management of IP Address Space 5 1 2 IP Address and Subnet Mask Similar to the way houses on a street share a common street name so too do computers on a LAN share one common network number Where you obtain your network number depends on your particular situation If the ISP or your network administrator assigns you a block of registered IP addresses follow their instructions in selecting the IP addresses and the subnet mask Chapter 5 System Screen 53 ZyXEL G 5708 User s Guide Ifthe ISP did not explicitly give you an IP network number then most likely
138. s Mode that includes IEEE 802 119 Turbo G Mode Turbo G mode provides higher speed transmissions than regular IEEE 802 11g or super G mode The other device must also support turbo G mode in order to use it for the wireless connection This is available when you select a Wireless Mode that includes IEEE 802 119 Turbo G uses two channels bonded together in order to achieve its higher transmission rates This may cause interference with other APs in the area The Channel field is automatically fixed at 6 when you use turbo G mode RTS CTS Enter a value between 0 and 2432 The default is 2432 Threshold Fragmentation Enter a value between 256 and 2432 The default is 2432 It is the maximum data fragment size that can be sent Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 3 4 AP Repeater Mode Select AP Repeater as the Operation Mode to have the device act as an access point and a wireless bridge Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Figure 42 Wireless Settings AP Repeater Security MAC Filter OTIST Wireless Settings Basic Settings Operation Mode AP Repeater SSID ZyXEL G S70S mas 32 printable characters Hide SSID Channel s 7 wireless Mode auto 119 11b 7 WDS Settings Local MAC Address oo po b3 45 67 fes Remote MAC Address 1 Remote MAC Address 2 Re
139. s password and TCP IP Setup etc It arrives from ZyXEL with a rom filename extension Once you have customized the device s settings they can be saved back to your computer under a filename of your choosing Click SETTINGS gt MANAGEMENT gt Configuration File Information related to factory defaults backup configuration and restoring configuration appears as shown next Figure 62 Management Configuration File Configuration File Backup Configuration This page allows you to backup your current configuration to your computer Click the Backup button to start the backup process Backup Restore Configuration To restore your configuration from a previously saved configuration file browse to the location of the configuration file and click the Upload button File Path Browse Upload Back to Factory Defaults The Reset button will clear all user entered configuration and will reset the device settings back to its factory default value After reset to factory default settings please remember the following value to be able to login the device again Password 1234 LAN IP Address 192 168 1 2 Reset Chapter 7 Management Screens 97 ZyXEL G 5708 User s Guide 7 4 1 Backup Configuration Backup configuration allows you to back up save the device s current configuration to a file on your computer Once your device is configured and functioning properly it is highly r
140. s screen afresh Chapter 6 Wireless Screens 83 ZyXEL G 5708 User s Guide 6 15 3 Wireless Security WPA 2 PSK Select WPA PSK drop down list box WPA2 PSK or WPA PSK amp WPA2 PSK in the Encryption Method to display the screen displays as next Figure 49 Wireless Security WPA 2 PSK Encryption Meth Pre Shared Key Security Settings od WPA PSK RRRRAARE 8463 ASCII characters Apply Reset The following table describes the labels in this screen Table 19 Wireless Security WPA PSK LABEL DESCRIPTION Encryption Method Select WPA PSK WPA2 PSK or WPA PSK amp WPA2 PSK if you want to configure a pre shared key Choose this option only if your wireless clients support it Pre Shared Key The encryption mechanisms used for WPA and WPA PSK are the same The only difference between the two is that WPA PSK uses a simple common password instead of user specific credentials Type a pre shared key from 8 to 63 ASCII characters including spaces and symbols This field is case sensitive Apply Click Apply to save your changes back to the device Reset Click Reset to begin configuring this screen afresh 6 15 4 Wireless Security WPA 2 WPA Wi Fi Protected Access is a subset of the IEEE 802 111 standard WPA2 IEEE 802 111 is a wireless security standard that defines stronger encryption authentication and key management than WP
141. s subject to the following two conditions This device may not cause harmful interference This device must accept any interference received including interference that may cause undesired operations This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications If this equipment does cause harmful interference to radio television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures Reorient or relocate the receiving antenna ncrease the separation between the equipment and the receiver Connect the equipment into an outlet on a circuit different from that to which the receiver is connected Consult the dealer or an experienced radio TV technician for help Caution 1 To comply with FCC RF exposure compliance requirements a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons 2 This transmitter must not be co located or operating in conjunction with any other antenna or tra
142. s the URL If you don t know the G 570S s IP address type the device name of your G 5708 as the URL ZyXELXXXX is the default where XXXX is the last four digits of the MAC address The MAC address is on the bottom of the device If you just changed the G 570S s IP address your computer s cache of machine names may contain an entry that maps the name of the G 570S to its previous IP address In Windows use nbtstat R at the command prompt to delete all entries in your computer s cache of machine names Open a new browser window See the following section to check that pop up windows JavaScripts and Java permissions are allowed You may also need to clear your Internet browser s cache In Internet Explorer click Tools and then Internet Options to open the Internet Options screen In the General tab click Delete Files In the pop up window select the Delete all offline content check box and click OK Click OK in the Internet Options screen to close it If you disconnect your computer from one device and connect it to another device that has the same IP address your computer s ARP Address Resolution Protocol table may contain an entry that maps the management IP address to the previous device s MAC address In Windows use arp d at the command prompt to delete all entries in your computer s ARP table Open a new browser window 8 4 1 Pop up Windows JavaScripts and Java Permissions In order to use the web
143. select a language change your login password and choose a configuration method from the status screen 1 Make sure your G 570S hardware is properly connected refer to the Quick Start Guide 2 Prepare your computer computer network to connect to the G 570S refer to Section 2 2 1 on page 29 for instructions on how to do this 3 Launch your web browser 4 Type the device name of your G 570S as the URL ZyXELXXXX is the default where XXXX is the last four digits of the MAC address The MAC address is on the bottom of the device You could also use the IP address of the G 570S 192 168 1 2 is the default Press Enter Chapter 3 Introducing the Web Configurator 35 ZyXEL G 5708 User s Guide Figure 16 Web Configurator Address File Edit view Favorites Tools Help File Edit View Favorites Tools Help Back gt amp A A Qsearch or Address e http zyxel6789 Address http 192 168 1 2 5 Type 1234 default as the password and click Login Figure 17 Login Screen Default password is 1234 6 Select your language and click Apply Figure 18 Language Screen ZyXEL Language Selection Please select a language and click to configure 7 The following screen displays Select Go Wizard Setup and click Apply to use the wizard setup screens for initial configuration see Section 3 3 on page 37 Select Go Advanced S
144. sin S pa Ee E Yet bon Rd 22 Figure 2 Internet Access Application iuseecese eerte e bna unn be R caspeeicivadkseaateh x eerte anni 24 Figure 3 Corporate Network ApDDICABON ciscciccdnis acest ceriieese brat et pro retia arra ev v eer cp IUE ps k HEC rr 25 Figure 4 Wireless Client Application ccssgesssaceesssaatansssnza v PREFERRED anaia anei 25 Foue ICIS FDIC fee Ie 26 Figure o Bridge Repeater Application aiiesdsssicseissceciccversivoncedsscsnsar cdsaseeiacuadaascgians tenaiacriesaare 26 Figure 7 AP Repeater Application cccccceceeceeeeeeeeeeneeeanaeceeeeeeeeeeeeeeeseaaeaaeeeeeeeeeeeess 27 gro FPO ANG Mee 27 Figure 9e OAS CUOND 42rasskik up aS ERHDO RUHK AOL ESSE HUHAXESNE RIAL T3 NB ASK SORA 29 Faus TH CODE Fanal alicia rado deena wd vs A eb Erba ban IE E EA UIT ness Mauser enhad DAVE ELEM DAC SURE AN 30 Figure 11 Nelwork CODPIDOIIO sosisini sain deb pb tiM aig Et E dI EP EMI a 30 Figure 12 Local Area Connection Properties 1 issuer dent tpe nde rrr d eas opa dd REA d d 31 Figure 19 internet Protocol PEODBIS iuste dark reor saa hee ree DE PY ce eH Pa qaaa be PE qan REP AR E Ru uita 31 Figure 14 Advanced TCP IP SOIMge auucccsisesecsteteasetocc ct emssa ee cot iinn Faq ne pee aair 32 Figure 15 Wireless Connechion RT 32 Figure 16 Web Configurator Address m m 36 Figure ty Login OO T aA 36 Figure 18 Language Screan ata nda Mana acral Eat aaa ta aaa aN aa S i 36 Figure 19 Select Wizard or Advanced Setup Screen sscsssssieeerreererr
145. ss network Select 64 bit 128 bit or 152 bit from the WEP Encryption drop down list box and then follow the on screen instructions to set up the WEP keys 2 Choose an encryption level from the drop down list The higher the WEP encryption the higher the security but the slower the throughput 3 You can generate or manually enter a WEP key f you selected 64 bit or 128 bit WEP you can enter a Passphrase up to 32 printable characters and click Generate The device automatically generates WEP keys One key displays in the Key 1 field Go to SETTINGS gt WIRELESS gt Security if you want to see the other WEP keys or Enter a manual key in the Key 1 field 40 Chapter 3 Introducing the Web Configurator ZyXEL G 5708 User s Guide Figure 23 Wizard 3 WEP SETUP WIZARD fli Security Settings Use Passphrase to IZ CUEFESLEIEPEUBMASuBRme automatically generate below keys or manually enter Encryption Method jw l a key in the Key 1 field WEP Encryption 64 bit WEP Enter a passphr to aute y generate a WEP key or leave it blank if you want to manually enter the WEP key Passphrase i 3eneral Mm max 16 characters Note Manual WEP Key 64 bit WEP Enter 5 ASCII characters or 10 hexadecimal characters 0 FIM EIS 128 it WEP Enter 13 ASCII characters or 26 hexadecimal characters 9 9 A F 152 bit WEP Enter 16 ASCII characters or 32 hexadecimal characters 0 9 A F 3 3 3 3 WPA 2 PSK Only s
146. t are currently using the G 5708 to access your wired network When the G 570S is in client mode the wireless association list displays a list of wireless devices and networks in the area Chapter 1 Getting to Know Your G 570S 23 ZyXEL G 5708 User s Guide Output Power Management Output Power Management is the ability to set the level of output power There may be interference or difficulty with channel assignment when there is a high density of APs within a coverage area In this case you can lower the output power of each access point thus enabling you to place access points closer together Limit the Number of Client Connections You may set a maximum number of wireless stations that may connect to the G 570S This may be necessary if for example there is interference or difficulty with channel assignment due to a high density of APs within a coverage area 1 3 Applications for the G 570S Here are some application examples of how you can use your G 570S 1 3 1 Access Point for Internet Access The G 570S is an ideal access solution for wireless Internet connection A typical Internet access application for your G 5708 is shown as follows Figure 2 Internet Access Application Sax Y News a 3 fen m NS e m gt Internet Y 1 3 2 Corporate Network Access Application In situations where users need to access corporate network resources and the Internet the G 570S is an ideal solution f
147. ta encryption by using Temporal Key Integrity Protocol TKIP Message Integrity Check MIC and IEEE 802 1x In addition to TKIP WPA2 also uses Advanced Encryption Standard AES in the Counter mode with Cipher block chaining Message authentication code Protocol CCMP to offer stronger encryption The encryption mechanisms used for WPA 2 and WPA 2 PSK are the same The only difference between the two 1s that WPA PSK uses a simple common password instead of user specific credentials The common password approach makes WPA 2 PSK susceptible to brute force password guessing attacks but it s still an improvement over WEP as it employs an easier to use consistent single alphanumeric password 6 10 2 User Authentication WPA or WPA2 applies IEEE 802 1x and Extensible Authentication Protocol EAP to authenticate wireless clients using an external RADIUS database 6 11 WPA 2 PSK Application Example A WPA 2 PSK application looks as follows 1 First enter identical passwords into the AP and all wireless clients The Pre Shared Key PSK must consist of between 8 and 63 ASCII characters including spaces and symbols 2 The AP checks each client s password and only allows it to join the network if it matches its password 3 The AP derives and distributes keys to the wireless clients 4 The AP and wireless clients use the TKIP or AES encryption process to encrypt data exchanged between them Chapter 6 Wireless Screens 79 ZyXEL
148. that is also connected to the same wired LAN as shown next Figure 40 Bridge Loop Bridge Connected to Wired LAN a To prevent bridge loops ensure that your G 570S is not set to bridge mode while connected to both wired and wireless segments of the same LAN Chapter 6 Wireless Screens 67 ZyXEL G 5708 User s Guide Select Bridge as the Operation Mode to have the device act as a wireless bridge only Figure 41 Wireless Settings Bridge Wireless Settings Security Basic Settings Operation Mode Channel s 7 wireless Mode WDS Settings Local MAC Address Remote MAC Address 1 Remote MAC Address 2 Remote MAC Address 3 Remote MAC Address 4 Advanced Settings Beacon Interval Intra BSS Traffic DTIM Interval Radio Enable Output Power Management Data Rate Management Preamble Type Super G Mode Turbo G Mode RTS CTS Threshold Fragmentation MAC Filter Bridge SSID ZyXEL G 570S max 32 printable characters Hide SSID Auto 11g 11b 7 OTIST 0 ALIS JULIO JL ILAE JURA UE 100 20 1000 C Enable Disable fi 1 255 C Yes No Best bul Dynamic C Enable Disable C Enable Disable 2346 042346 2346 25642346 Reset The following table describes the labels in this screen 68 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Table 13 Wireless Settings Bridge LABEL DESCRIPTION Operation Mod
149. the Ethernet Interface Table 31 Troubleshooting the Ethernet Interface PROBLEM CORRECTIVE ACTION cannot access the G 5708 from the LAN If the ETHN LED on the front panel is off check the Ethernet cable connection between your G 570S and the Ethernet device connected to the ETHERNET port Check for faulty Ethernet cables Make sure your computer s Ethernet adapter is installed and working properly Check the IP address of the Ethernet device Verify that the IP address and the subnet mask of the G 570S the Ethernet device and your computer are on the same subnet cannot ping any computer on the LAN If the ETHN LED on the front panel is off check the Ethernet cable connections between your G 5708 and the Ethernet device Check the Ethernet cable connections between the Ethernet device and the LAN computers Check for faulty Ethernet cables Make sure the LAN computer s Ethernet adapter is installed and working properly Verify that the IP address and the subnet mask of the G 570S the Ethernet device and the LAN computers are on the same subnet Chapter 8 Troubleshooting ZyXEL G 5708 User s Guide Table 31 Troubleshooting the Ethernet Interface continued PROBLEM CORRECTIVE ACTION Cannot access the Your computer s and the G 570S s IP addresses must be on the same subnet web configurator for LAN access If you changed the G 570S s IP address then enter the new one a
150. this case you should adaptor contact your local vendor The G 570S The supplied power to the G 570S is too low Check that the G 570S is receiving reboots enough power automatically Make sure the power source is working properly sometimes 8 2 Problems with the Password Table 29 Troubleshooting the Password PROBLEM CORRECTIVE ACTION cannot access the The Password field is case sensitive Make sure that you enter the correct G 5708 password using the proper casing Use the RESET button on the rear panel of the G 570S to restore the factory default configuration file hold this button in for about 10 seconds or release the button when the PWR LED starts blinking This will restore all of the factory defaults including the password Chapter 8 Troubleshooting 103 ZyXEL G 5708 User s Guide 8 3 Problems with the WLAN Interface Table 30 Troubleshooting the WLAN Interface PROBLEM CORRECTIVE ACTION Cannot access the G 5708 from the WLAN Make sure the wireless adapter on the wireless station is working properly Check that both the G 570S and your wireless station are using the same ESSID channel and security settings cannot ping any computer on the WLAN Make sure the wireless adapter on the wireless station s is working properly Check that both the G 570S and wireless station s are using the same ESSID channel and security settings 8 4 Problems with
151. tions within the same ESS must have the same ESSID in order to communicate 58 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide Figure 34 Extended Service Set Ethernet CE EUR UE M M i xp a d ere e n BLUR we eU uw ox tia ame 6 2 Wireless LAN Basics This section describes the wireless LAN network terms 6 2 1 Channel A channel is the radio frequency ies used by IEEE 802 11b wireless devices Channels available depend on your geographical area You may have a choice of channels for your region so you should use a different channel than an adjacent AP access point to reduce interference Interference occurs when radio signals from different access points overlap causing interference and degrading performance Adjacent channels partially overlap however To avoid interference due to overlap your AP should be on a channel at least five channels away from a channel that an adjacent AP is using For example if your region has 11 channels and an adjacent AP is using channel 1 then you need to select a channel between 6 or 11 6 2 2 SSID The SSID Service Set Identity is a unique name shared among all wireless devices in a wireless network Wireless devices must have the same SSID to communicate with each other Chapter 6 Wireless Screens 59 ZyXEL G 5708 User s Guide 6 2 3 RTS CTS A hidden node occurs when two stations are within range of the same access point but are not within range of
152. torage Temperature 30 60 C Operation Humidity 20 95 RH Storage Humidity 20 95 RH Table 33 Feature Specifications Protocol Support Transparent bridging for unsupported network layer protocols DHCP Client DHCP relay Standard Compliance IEEE 802 3 and 802 3u 10Base T and 100Base TX physical layer specification IEEE 802 119 specification compliance for wireless LAN IEEE 802 11b specification compliance for wireless LAN IEEE 802 1x security standard support Wi Fi certificate Roaming IEEE 802 11g compliant IEEE 802 11b compliant IEEE 802 11f partially compliant without re authentication Appendix A Product Specifications 115 ZyXEL G 5708 User s Guide Table 33 Feature Specifications continued Operating Modes Access Point Client Bridge Access Point and Repeater Wireless Links Up to four bridge links Two or more repeater links are supported It is suggested that you only use up to three repeater links Management Embedded Web Configurator Command line interface Telnet support Password protected telnet access to internal configuration manager FTP Web for firmware downloading and configuration backup and restore Limitation of client connections is configurable default unlimited Intra BSS Block enable disable Output Power Management 4 levels Security WPA and IEEE 802 1x security EAP TLS EAP
153. ure 11 Network Connection Network Connections File Edit View Favorites Tools Advanced Help Q sxx T Q 5 JO search E Folders Ez Address e Network Connections LAN or High Speed Internet Network Tasks ocal Area Connection 5 Create anew nabled connection Se aai M ar PCI Fast Ethesnet Adapte 9 Set up a home or small Disable office network Status Disable this network device Repair Q Repair this connection PBMESCONEdIAED m Rename this connection view status of this connection Z Change settings of this connection Create Shortcut Rename Properties 4 Select Internet Protocol TCP IP and then click Properties 30 Chapter 2 Management Computer Setup ZyXEL G 5708 User s Guide Figure 12 Local Area Connection Properties 4 Local Area Connection Properties General Authentication Advanced Connect using B Accton EN1207D TX PCI Fast Ethernet Adapter This connection uses the following items ivi El Client for Microsoft Networks ivi 8 File and Printer Sharing for Microsoft Networks m Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected 5 Select Use the following IP Address and fill in an IP address between 192 168 1 3 and 192 168 1 254 Type 255 255 255 0 as the Subnet m
154. usa te ide bee dasa Ana ER PO eeRH pet MERE 101 Figure 7 Popup BIOCKOE rue eb Iri E EE oa rt E Ende qi o d d e EE E Top MOL KI on 106 Faus T2 limeme D Proc MN DTP 106 Figure 73 ipternet OpPIONS Fc V M 107 Figure 74 Popup Blocker Settings Lodi Eo RED HL p ed S EUR ARR URL a RR 108 Figure 9 bene OPNS aeter MAD QU Ee Tek he v PERRA ena ke Prop phe ene pa un pU eds 109 Figure 76 Security Settings Java Soniplirig sessirnir 110 Figure 77 Security Settings Jd Vi eiu eese aa rsisce aca aatnte souls da CRia ARa EE PARIGI RS DEI GIU EGRE BU EE ARAS 111 mop Pi T cR c D 112 Figure 79 PINO Ine GAOU haaa a nbn uou EN Ca d ess TIZ Figure 80 WIndows 95 98 Me Network Configuration seeeee 122 Figure 81 Windows 95 98 Me TCP IP Properties IP Address seeeeeeeess 123 14 List of Figures ZyXEL G 5708 User s Guide Figure 82 Windows 95 98 Me TCP IP Properties DNS Configuration 124 Figure 83 Windows XP Start Menu uias ies da ciet sana deena ut End iie Gato A Fed bo bx pina pub pA bate tt pA Rud EARS 125 Figure 84 Windows XP Control Pane a5 caccia trim cu etr per epu re eto renidens snai ebore 125 Figure 85 Windows XP Control Panel Network Connections Properties 126 Figure 86 Windows XP Local Area Connection Properties sseesseessss 126 Figure 87 Windows XP Internet Protocol TCP IP
155. which is a password they both know The key is not sent over the network In addition to the shared key password information exchanged is also encrypted to protect the network from unauthorized access 142 Appendix C Wireless LANs ZyXEL G 5708 User s Guide EAP Authentication EAP Extensible Authentication Protocol is an authentication protocol that runs on top of the IEEE802 1x transport mechanism in order to support multiple types of user authentication By using EAP to interact with an EAP compatible RADIUS server the access point helps a wireless station and a RADIUS server perform authentication The type of authentication you use depends on the RADIUS server or the AP The following figure shows an overview of authentication when you specify a RADIUS server on your access point Figure 107 EAP Authentication ua RADIUS Server gt t KH Wireless Station The details below provide a general description of how IEEE 802 1x EAP authentication works For an example list of EAP MD5 authentication steps see the IEEE 802 1x appendix 1 The wireless station sends a start message to the device 2 The device sends a request identity message to the wireless station for identity information 3 The wireless station replies with identity information including username and password 4 The RADIUS server checks the user information against its user profile database and determines whether or not to authentic
156. wireless clients and a RADIUS server WPA 2 has user authentication and improved data encryption over WEP Use WPA 2 PSK if you have WPA 2 aware wireless clients but no RADIUS server If you don t have WPA 2 aware wireless clients then use WEP key encrypting A higher bit key offers better security at a throughput trade off You can use the passphrase feature to automatically generate WEP keys or manually enter WEP keys 6 4 2 Authentication Use a RADIUS server with WPA or IEEE 802 1x key management protocol See the appendix for information on protocols used when a client authenticates with a RADIUS server via the G 570S 6 4 3 Restricted Access The MAC Filter screen allows you to configure the AP to give exclusive access to devices Allow Association or exclude them from accessing the AP Deny Association 74 Chapter 6 Wireless Screens ZyXEL G 5708 User s Guide 6 4 4 Hide G 570S Identity If you hide the ESSID then the G 570S cannot be seen when a wireless client scans for local APs The trade off for the extra security of hiding the G 570S may be inconvenience for some valid WLAN clients 6 5 WEP Overview WEP Wired Equivalent Privacy as specified in the IEEE 802 11 standard provides methods for both data encryption and wireless station authentication 6 5 1 Data Encryption WEP provides a mechanism for encrypting data using encryption keys Both the AP and the wireless stations must use the same WEP
157. x B Setting up Your Computer s IP Address ZyXEL G 5708 User s Guide 4 For statically assigned settings do the following From the Configure box select Manually Type your IP address in the IP Address box Type your subnet mask in the Subnet mask box Type the IP address of your G 570S in the Router address box 5 Close the TCP IP Control Panel 6 Click Save if prompted to save changes to your configuration 7 Turn on your G 570S and restart your computer if prompted Verifying Settings Check your TCP IP properties in the TCP IP Control Panel window Macintosh OS X 1 Click the Apple menu and click System Preferences to open the System Preferences window Figure 92 Macintosh OS X Apple Menu r1 Grab File Edit Capt About This Mac Get Mac OS X Software ae System Preferences Location 2 Click Network in the icon bar Select Automatic from the Location list e Select Built in Ethernet from the Show list e Click the TCP IP tab 3 For dynamically assigned settings select Using DHCP from the Configure list Appendix B Setting up Your Computer s IP Address 131 ZyXEL G 5708 User s Guide Figure 93 Macintosh OS X Network eo Network sj p9 4 e Show All Displays Network Startup Disk Location Automatic m Show Built in Ethernet ike PPPoE AppleTalk Proxies Configure Using DHCP 3 Domain Name Servers Optional IP Address 192 168 11
158. yXEL G 5708 User s Guide Figure 28 Status View Statistics View Status Ethernet Wireless a Racef e ranged Packets 1980 2081 Bytes 225615 917508 EUIS EIUS ALERTER Unicast Packets 2 Broadcast Packets 6 Multicast Packets Total Packets 8 Total Bytes 1109 System Up Time 0 57 40 Poll Interval mE sec Set Interval The following table describes the labels in this screen Table 6 Status View Statistics LABEL DESCRIPTION Ethernet Packets This row displays the numbers of packets received and transmitted by the Ethernet port Bytes This row displays the numbers of bytes received and transmitted by the Ethernet port Wireless Unicast This row displays the numbers of unicast packets received and transmitted by the Packets wireless adapter Broadcast This row displays the numbers of broadcast packets received and transmitted by Packets the wireless adapter Multicast This row displays the numbers of multicast packets received and transmitted by the Packets wireless adapter Total Packets This row displays the numbers of all types of packets received and transmitted by the wireless adapter Total Bytes This row displays the numbers of bytes received and transmitted by the wireless adapter System Up Time This is the total time the device has been on Poll Interval s Enter the time interval for refreshing statistics S

Download Pdf Manuals

image

Related Search

Related Contents

  Tecumseh AEA3430YXA Drawing Data  Volume 20 no 5 – octobre 2013 - Syndicat de l`enseignement de l  Owner`s Manual  Fisher & Paykel OR24SDMBGX User's Manual  

Copyright © All rights reserved.
Failed to retrieve file