Zyxel g570s user manual




















It arrives from ZyXEL with a. Once you have customized the device's settings, they can be saved back to your computer under a filename of your choosing. Page Restore Configuration IP address If the upload was not successful, the following screen will appear. Click Return to go back to the Configuration File screen. Page Back To Factory Defaults 8.

After a successful upload, the system will reboot. Page Figure 57 Firmware Upgrading Screen After two minutes, log in again and check your new firmware version in the System Status screen. If the upload was not successful, the following status message displays at the bottom of the screen. Make sure the power source is turned on. Make sure the wireless adapter on the wireless station is working properly. I cannot ping any computer on the WLAN. Page Internet Access Internet, especially peer-to-peer applications.

If the signal strength is low, try moving the ZyXEL Device closer to the AP if possible, and look around to see if there are any devices that might be interfering with the wireless network for example, microwaves, other wireless networks, and so on. Up to four bridge links. Two or more repeater links are supported. It is suggested that you only use up to three repeater links. It allows data transfer of either 10 Mbps or Mbps in either half-duplex or full-duplex mode depending on your Ethernet network.

This may be necessary if for example, there is interference or difficulty with channel assignment due to a high density of APs within a coverage area. Insert the Windows CD if prompted. Verifying Settings 1 Click Start and then Run. You can also open Network Connections, right-click a network connection, click Status and then click the Support tab. Page Figure 74 Red Hat 9. The Ethernet Device General screen displays as shown. Figure 75 Red Hat 9. Page Figure 76 Red Hat 9. Open the eth0 eth0 configuration file with any plain text editor.

Page Figure 78 Red Hat 9. Page Figure 82 Red Hat 9. Figure 83 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. Page Figure 84 Internet Options: Privacy Alternatively, if you only want to allow pop-up windows from your device, see the following steps. When Intra-BSS is disabled, wireless client A and B can still access the wired network but cannot communicate with each other.

Page Figure 93 Infrastructure Wlan AP or wireless gateway, but out-of-range of each other, so they cannot "hear" each other, that is they do not know if the channel is currently being used. Therefore, they are considered hidden from each other.

A large Fragmentation Threshold is recommended for networks not prone to interference while you should set a smaller threshold for busy networks or networks that are prone to interference.

Page Table 35 Ieee The following figure shows the relative effectiveness of these wireless security methods available on your ZyXEL Device. Page AP and does not need to go with the authentication process again.

Pre-authentication enables fast roaming by allowing the wireless client already connecting to an AP to perform IEEE Page Wireless Client Wpa Supplicants 2 The AP checks each wireless client's password and only allows it to join the network if the password matches. A transmitter within a wireless device sends an RF signal to the antenna, which propagates the signal through the air. The antenna also operates in reverse by capturing RF signals from the air.

Page Antenna Characteristics In general, antennas should be mounted as high as practically possible and free of obstructions. In point-to—point application, position both antennas at the same height and in a direct line of sight to each other to attain the best performance. Page For a single AP application, place omni-directional antennas as close to the center of the coverage area as possible. For directional antennas, point the antenna in the direction of the desired coverage area. Miller St.

All rights reserved. Quicklinks Diese Anleitung herunterladen. Channel: 6. See the User's Guide for how to enable wireless security. In a wireless network, the wireless clients must have the.

AP or wireless router we will refer to both as "AP". Traditionally this meant. PSK security settings to wireless clients that support. OTIST and are within transmission range. You can also. We use the GS and the G screens in this guide.

This Quick Start Guide shows you how to connect the G-. It turns off if you restart the GS. Before installation, make sure you have the following:.

Use only the supplied power adaptor to connect the G-. It closes when the transfer is complete. Use a wireless-ready computer to search for and join the. Folgen Sie den untenstehenden Schritten, um Ihren G-. You can use your wireless client computer to access and.

Launch your web browser. It is for identification purposes. Operation This field shows whether the device is functioning as an access point, a wireless Mode client, a bridge or an access point and repeater. A network interface card such as an Ethernet adapter has a hardwired address that is assigned at the factory. This address follows an industry standard that ensures no other adapter has a similar address. Firmware This is the firmware version and the date the firmware was created.

Subnet Mask This is the Ethernet port subnet mask. Leave this field as 0. Channel This field displays the radio channel the device is currently using. View Statistics Click View Statistics to see performance statistics such as number of packets sent and number of packets received. View Association Click View Association List to show the wireless stations that are currently List associated to the device.

This screen displays read-only information including port status and packet specific statistics. Also provided are "system up time" and "poll interval s ". The Poll Interval s field is configurable. Bytes This row displays the numbers of bytes received and transmitted by the Ethernet port. Wireless Unicast This row displays the numbers of unicast packets received and transmitted by the Packets wireless adapter. Broadcast This row displays the numbers of broadcast packets received and transmitted by Packets the wireless adapter.

Multicast This row displays the numbers of multicast packets received and transmitted by Packets the wireless adapter. Total Packets This row displays the numbers of all types of packets received and transmitted by the wireless adapter. Total Bytes This row displays the numbers of bytes received and transmitted by the wireless adapter. System Up Time This is the total time the device has been on. Poll Interval s Enter the time interval for refreshing statistics. Set Interval Click this button to apply the new poll interval you entered above.

Stop Click this button to stop refreshing statistics. When the device is not in wireless client mode, this screen displays which wireless stations are currently associated to the device in the Association List screen. Signal Strength This field displays the signal strength of each associated wireless station.

Status This field displays Associated for associated wireless stations. Rescan Click Rescan to check for associated wireless stations. When the device is in wireless client mode, this screen displays details of the access point to which the ZyXEL Device is associated.

Signal Strength This field displays the signal strength of the associated access point. Status This field displays Associated for an associated access point. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems. If you belong to a small organization and your Internet access is through an ISP, the ISP can provide you with the Internet addresses for your local networks.

On the other hand, if you are part of a much larger organization, you should consult your network administrator for the appropriate IP addresses. Where you obtain your network number depends on your particular situation.

If the ISP or your network administrator assigns you a block of registered IP addresses, follow their instructions in selecting the IP addresses and the subnet mask. If the ISP did not explicitly give you an IP network number, then most likely you have a single user account and the ISP will assign you a dynamic IP address when the connection is established.

The Internet Assigned Number Authority IANA reserved this block of addresses specifically for private use; please do not use any other number unless you are told otherwise. Let's say you select In other words, the first three numbers specify the network number while the last number identifies an individual computer on that network. Once you have decided on the network number, pick an IP address that is easy to remember, for instance, The subnet mask specifies the network number portion of an IP address.

Your device will compute the subnet mask automatically based on the IP address that you entered. You don't need to change the subnet mask computed by the device unless you are instructed to do otherwise. When you select address this option, fill in the fields below.

Subnet Mask Enter the subnet mask. The gateway is a router or switch on the same Address network segment as the device. The gateway helps forward packets to their destinations. Apply Click Apply to save your changes back to the device. Reset Click Reset to reload the previous configuration for this screen. See the appendices for more detailed information about wireless networks. The wireless network is the part in the blue circle. In this wireless network, devices A and B use the access point AP to interact with the other devices such as the printer or with the Internet.

The SSID is the name of the wireless network. It stands for Service Set IDentity. Like radio stations or television channels, each wireless network uses a specific channel, or frequency, to send and receive information.

Security stops unauthorized devices from using the wireless network. It can also protect the information that is sent in the wireless network. In addition, you should change the default SSID to something that is difficult to guess. This type of security is fairly weak, however, because there are ways for unauthorized wireless devices to get the SSID. In addition, unauthorized wireless devices can still see the information that is sent in the wireless network.

If a device is allowed to use the wireless network, it still has to have the correct information SSID, channel, and security. If a device is not allowed to use the wireless network, it does not matter if it has the correct information. This type of security does not protect the information that is sent in the wireless network. Furthermore, there are ways for unauthorized wireless devices to get the MAC address of an authorized device.

Then, they can use that MAC address to use the wireless network. You can make every user log in to the wireless network before they can use it. However, every device in the wireless network has to support IEEE This is a server used in businesses more than in homes. Some wireless devices, such as scanners, can detect wireless networks but cannot use wireless networks. These kinds of wireless devices might not have MAC addresses. Unauthorized wireless devices can still see the information that is sent in the wireless network, even if they cannot use the wireless network.

Furthermore, there are ways for unauthorized wireless users to get a valid user name and password. Then, they can use that user name and password to use the wireless network. Encryption is like a secret code. If you do not know the secret code, you cannot understand the message. The types of encryption you can choose depend on the type of authentication.

See Section 7. Usually, you should set up the strongest encryption that every device in the wireless network supports. Therefore, there is no authentication. Suppose the wireless network has two devices. Therefore, you should set up Static WEP in the wireless network. The other types of encryption are better than none at all, but it is still possible for unauthorized wireless devices to figure out the original information pretty quickly.

Many types of encryption use a key to protect the information in the wireless network. The longer the key, the stronger the encryption. Every device in the wireless network must have the same key.

As a result, you do not have to set up the SSID and encryption on every device in the wireless network. QoS gives high priority to voice and video, which makes them run more smoothly.

Similarly, it gives low priority to many large file downloads so that they do not reduce the quality of other applications. You might disable this kind of communication to enhance security within your wireless network. This may cause them to send information to the AP at the same time and result in information colliding and not getting through. By setting this value lower than the default value, the wireless devices must sometimes get permission to send information to the ZyXEL Device.

The lower the value, the more often the devices must get permission. If this value is greater than the fragmentation threshold value see below , then wireless devices never have to get permission to send information to the ZyXEL Device.

Preamble A preamble affects the timing in your wireless network. There are two preamble modes: long and short. Authentication The process of verifying whether a wireless device is allowed to use the wireless network.

Roaming If you have two or more ZyXEL Devices or other wireless access points on your wireless network, you can enable this option so that wireless devices can change locations without having to log in again. This is useful for devices, such as notebooks, that move around a lot. It controls WLAN transmission priority on packets to be transmitted over the wireless network. WMM QoS prioritizes wireless traffic according to delivery requirements. If the introduction of another traffic stream creates a data transmission demand that exceeds the current network capacity, then the new traffic stream reduces the throughput of the other traffic streams.

This prevents reductions in data transmission for applications that are sensitive to latency delay and jitter variations in delay. Use best effort priority for traffic that is less sensitive to latency, but is affected by long delays, such as Internet surfing. Use background priority for applications that do not have strict latency and throughput requirements. The screen varies depending upon the operation mode you select.

Enter a descriptive name up to 32 printable characters for the wireless LAN. Note: If you are configuring the device from a computer connected to the wireless LAN and you change the device's SSID, channel or security settings, you will lose your wireless connection when you press Apply to confirm.

You must then change the wireless settings of your computer to match the device's new settings. Select a channel from the drop-down list box. Refer to the chapter on wizard setup for more information about channels. Wireless Select Select The transmission rate of your device might be reduced. Advanced Settings Beacon Set the number of milliseconds that should pass between the sending out of Interval beacons.

Traffic Enable Intra-BSS traffic to allow wireless stations connected to the device to communicate with each other. Disable Intra-BSS traffic to only allow wireless stations to communicate with the wired network, not with each other.

DTIM Interval Set the interval for wireless clients in sleep mode to wake up and check for multicast or broadcast traffic. The interval is a multiple of the beacon interval. If a packet has no WMM information in its header, it is assigned the default priority. Number of Use this field to set a maximum number of wireless stations that may connect to Wireless the device.

Stations Enter the number from 1 to 32 of wireless stations allowed. Turn off the wireless adapter to stop wireless communications between the device and other IEEE If there is a high density of APs Management within an area, decrease the output power of the device to reduce interference with other APs. Data Rate Use this field to select a maximum data rate for the wireless connection s. Preamble Preamble is used to signal that data is coming to the receiver.

Type Short preamble increases performance as less time sending preamble means more time for sending data. All IEEE Select Long preamble if you are unsure what preamble mode the wireless adapters support, and to provide more reliable communications in busy wireless networks.

Select Dynamic to have the device automatically use short preamble when all wireless clients support it, otherwise the device uses long preamble.

The other device must also support super-G mode in order for the device to use it for the wireless connection. The other device must also support turbo-G mode in order for the device to use it for the wireless connection. Turbo-G uses two channels bonded together in order to achieve its higher transmission rates. This may cause interference with other APs in the area. The Channel field is automatically fixed at 6 when you use turbo-G mode.

The default is Threshold Fragmentation Enter a value between and It is the maximum data fragment size that can be sent. Reset Click Reset to begin configuring this screen afresh. This mode has the device act as wireless client to connect to a wireless network. Note: If you are configuring the device from a computer connected to the wireless LAN and you change the device's SSID, channel or security settings, you will lose your wireless connection when you click Apply to save your settings.

Site Survey Click this button to see details of access points APs within range. This address is used to identify the device across a network. Select the check box and enter the MAC address you want to clone. Use this screen to view details of wireless access points within range.

Channel This field displays the channel number used by each access point. Wireless Mode This field displays the wireless networking standard the access point is using. Signal Strength This field displays the signal strength of each access point. You need to know the MAC address of the peer device, which also must be in bridge mode. See the following example.

Bridge loops cause broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and disruption of communications. The following examples show two network topologies that can lead to this problem: If two or more ZyXEL Devices in bridge mode are connected to the same hub as shown next. Select Bridge as the Operation Mode to have the device act as a wireless bridge only.

Note: If you are configuring the device from a computer connected to the wireless LAN and you change the device to use bridge mode, you will lose your wireless connection when you click Apply to save your settings.

You must then connect to the device through the wired network. Output Power Set the output power of the device in this field. The other device must also support turbo-G mode in order to use it for the wireless connection. The other device must also support super-G mode in order to use it for the wireless connection. This screen varies according to the encryption method you select. Method Apply Click Apply to save your changes back to the device.

You can configure up to four bit, bit or bit WEP keys, but only one key can be used at any one time. Generate After you enter the passphrase, click Generate to have the device generates four different WEP keys automatically. Key 4 Select a WEP key to use for data encryption. The WEP keys are used to encrypt data. Both the device and the wireless stations must use the same WEP key for data transmission. Choose this option only if your wireless clients support it. The only difference between the two is that WPA-PSK uses a simple common password, instead of user-specific credentials.

Port Number Enter the port number of the external authentication server. The default port number is You need not change this value unless your network administrator instructs you to do so with additional information. Shared Secret Enter a password up to 63 printable characters as the key to be shared between the external authentication server and the device.

The key must be the same on the external authentication server and your device. The key is not sent over the network. Reauthentication Specify how often wireless stations have to resend user names and passwords in Time order to stay connected. Enter a time interval between and seconds. Global-Key This is how often the AP sends a new group key out to all clients.

Specify an interval either in seconds or thousands of packets that the device sends. Table 23 Wireless Security: Data Encryption Select None to allow wireless stations to communicate with the access points without using dynamic WEP key exchange. Up to 32 stations can access the device when you configure dynamic WEP key exchange.

The MAC address is assigned at the factory and consists of six pairs of hexadecimal characters, for example, A0:C You need to know the MAC addresses of the devices to configure this screen.

It allows or denies wireless client access. The MAC filter does not apply to bridge or repeater functions. The following applies if you set the device to client mode and want to connect to an AP that uses a MAC filter. After the device turns on in client mode, it clones the MAC address of the first packets that it receives from devices connected to the Ethernet port.

All of the packets that the device sends to an AP will appear to be from the first device that connected to the Ethernet port. If you turn the device off and back on, it again clones the MAC address of the first packets that it receives from devices connected to the Ethernet port. You may be able to check the association list on the AP to determine which MAC address the device is currently using. The screen appears as shown. This would lock you out. Select Allow the following MAC address to associate to permit access to the device.

MAC addresses not listed will be denied access to the device. Select Deny the following MAC address to associate to block access to the device.

MAC addresses not listed will be allowed to access the device. This is the index number of the MAC address. Traditionally this meant that you had to configure the settings on the AP and then manually configure the exact same settings on each wireless client.

Start Click Start to encrypt the wireless security data using the setup key and have the device set the wireless client to use the same wireless settings as the device. The process takes three minutes to complete. Select Wireless Client in the Operation Mode field.

The screen displays as shown. After reviewing the settings, click OK. It closes when the transfer is complete. This screen allows you to change the device's password. If you forget your password or the device IP address , you will need to reset the device. See the section on resetting the device for details. New Password Type your new system password up to 30 printable characters. Spaces are not allowed. Retype to Confirm Retype your new system password for confirmation. Cancel Click Cancel to reload the previous configuration for this screen.

You can view logs and alert messages in this screen. Once the log table is full, old logs are deleted as new logs are created. Click a column heading to sort the entries.



0コメント

  • 1000 / 1000