Copyright © 2009 ZyXEL Communications Corporation DEFAULT LOGIN DETAILS IP Address http://192.168.100.1 Password 1234 Firmware Version 1.0 Edition
10 6.1 Overview ... 29 6.2 Connecting t
100 Table 30 Subnet 1 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address (Decimal) 192.168.1. 0 IP Address (Binary) 11000000.101010
101 Table 33 Subnet 3 IP/SUBNET MASK NETWORK NUMBER LAST OCTET BIT VALUE IP Address 192.168.1. 128 IP Address (Binary) 11000000.10101000.0000
102 Example: Eight Subnets Similarly, use a 27-bit mask to create eight subnets (000, 001, 010, 011, 100, 101, 110 and 111). The following table sh
103 NO. “BORROWED” HOST BITS SUBNET MASK NO. SUBNETS NO. HOSTS PER SUBNET 1 255.255.255.128 (/25) 2 126 2 255.255.255.192 (/26) 4 62 3 255.255
104 7 255.255.254.0 (/23) 128 510 8 255.255.255.0 (/24) 256 254 9 255.255.255.128 (/25) 512 126 10 255.255.255.192 (/26) 1024 62 11 255.
105 need to change the subnet mask computed by the MWR102 unless you are instructed to do otherwise. Private IP Addresses Every machine on the Intern
106 After the appropriate TCP/IP components are installed, configure the TCP/IP settings in order to "communicate" with your network. If y
107 Figure 45 Windows 95/98/Me: Network: Configuration Installing Components The Network window Configuration tab displays a list of installed comp
108 If you need Client for Microsoft Networks: 1 Click Add. 2 Select Client and then click Add. 3 Select Microsoft from the list of manufacture
109 • If you know your DNS information, select Enable DNS and type the information in the fields below (you may not need to fill them all in).
11 10 Status ... 60 10.1 Overview ...
110 Figure 47 Windows 95/98/Me: TCP/IP Properties: DNS Configuration 4 Click the Gateway tab. • If you do not know your gateway’s IP address, re
111 1 Click start (Start in Windows 2000/NT), Settings, Control Panel. Figure 48 Windows XP: Start Menu 2 In the Control Panel, d
112 Figure 50 Windows XP: Control Panel: Network Connections: Properties 4 Select Internet Protocol (TCP/IP) (under the General tab in Win XP) an
113 • If you have a static IP address click Use the following IP Address and fill in the IP address, Subnet mask, and Default gateway fields. • Cl
114 Figure 53 Windows XP: Advanced TCP/IP Properties 7 In the Internet Protocol TCP/IP Properties window (the General tab in Windows XP): • Clic
115 Figure 54 Windows XP: Internet Protocol (TCP/IP) Properties 8 Click OK to close the Internet Protocol (TCP/IP) Properties window. 9 Click C
116 2 Click on Control Panel. Figure 55 Windows 7/Vista 3 Click on Network and Internet. Figure 56 Windows 7/Vista 4 Click on Network and Sha
117 Figure 57 Windows 7/Vista 5 On the left side of the screen click on Change Adapter Settings (Windows 7), or Manag
118 Figure 59 Windows 7/Vista 8 Select Use the Following IP Address and enter your IP address, Subnet Mask, and Default Gateway. Enter your DNS ser
119 Macintosh OS 8/9 1 Click the Apple menu, Control Panel and double-click TCP/IP to open the TCP/IP Control Panel. Figure 61 Macintosh OS 8/9
12 Appendix A: Pop-up Windows, JavaScripts and Java Permissions ... 85 Appendix B: IP Addresses and Subnetting ...
120 Figure 62 Macintosh OS 8/9: TCP/IP 3 For dynamically assigned settings, select Using DHCP Server from the Configure: list. 4 For stat
121 Figure 63 Macintosh OS X: Apple Menu 2 Click Network in the icon bar. • Select Automatic from the Location list. • Select Built-in Ether
122 Figure 64 Macintosh OS X: Network 4 For statically assigned settings, do the following: • From the Configure box, select Manually. • Type yo
123 Linux This section shows you how to configure your computer’s TCP/IP settings in Red Hat Linux 9.0. Procedure, screens and file location may var
124 Figure 66 Red Hat 9.0: KDE: Ethernet Device: General • If you have a dynamic IP address click Automatically obtain IP address settings with an
125 6 Click the Activate button to apply the changes. The following screen displays. Click Yes to save the changes in all screens. Figure 68 Red H
126 DEVICE=eth0 ONBOOT=yes BOOTPROTO=static IPADDR=192.168.100.10 NETMASK=255.255.255.0 USERCTL=no PEERDNS=yes TYPE=Ethernet 2 If you know your DNS
127 Appendix D Appendix D Wireless LANs Wireless LAN Topologies This section discusses ad-hoc and infrastructure wireless LAN topologies. Ad-hoc
128 BSS A Basic Service Set (BSS) exists when all communications between wireless stations or between a wireless station and a wired network client g
129 An ESSID (ESS IDentification) uniquely identifies each ESS. All access points and their associated wireless stations within the same ESS must hav
13 Part I: Introduction
130 Figure 76 Infrastructure WLAN Channel A channel is the radio frequency(ies) used by IEEE 802.11a/b/g wireless devices. Channels available depen
131 When station A sends data to the AP, it might not know that the station B is already using the channel. If these two stations send data at the s
132 If the Fragmentation Threshold value is smaller than the RTS/CTS value (see previously) you set then the RTS (Request To Send)/CTS (Clear to Send
133 Table 38 IEEE 802.11g DATA RATE (MBPS) MODULATION 1 DBPSK (Differential Binary Phase Shift Keyed) 2 DQPSK (Differential Quadrature Phase Shif
134 Determines the network services available to authenticated users once they are connected to the network. • Accounting Keeps track of the client’
135 The type of authentication you use depends on the RADIUS server or the AP. Consult your network administrator for more information. EAP-MD5 (Mess
136 Dynamic WEP Key Exchange The AP maps a unique key that is generated with the RADIUS server. This key expires when the wireless connection times o
137 WPA(2) Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines s
138 password-guessing attacks but it's still an improvement over WEP as it employs an easier-to-use, consistent, single, alphanumeric password.
139 Figure 78 WPA(2)-PSK Authentication WPA(2) with RADIUS Application Example You need the IP address of the RADIUS server, its port number (defau
14 1 Getting to Know Your MWR102 1.1 Overview The MWR102 is a mobile wireless router with 1T1R MIMO technology. It complies with IEEE 802.11n standa
140 Table 40 Wireless Security Relational Matrix AUTHENTICATION METHOD/ KEY MANAGEMENT PROTOCOL ENCRYPTION METHOD ENTER MANUAL KEY IEEE 802.1X Ope
141 Appendix E Appendix E Common Services The following table lists some commonly-used services and their associated protocols and port numbers.
142 servers. BGP TCP 179 Border Gateway Protocol. BOOTP_CLIENT UDP 68 DHCP Client. BOOTP_SERVER UDP 67 DHCP Server. CU-SEEME TCP UDP 7648 2
143 IGMP (MULTICAST) User-Defined 2 Internet Group Management Protocol is used when sending packets to a specific group of hosts. IKE UDP 500 Th
144 RCMD TCP 512 Remote Command Service. REAL_AUDIO TCP 7070 A streaming audio service that enables real time sound over the web. REXEC TCP 5
145 TACACS UDP 49 Login Host Protocol used for (Terminal Access Controller Access Control System). TELNET TCP 23 Telnet is the login and termin
146 Appendix F Appendix F Legal Information Copyright Copyright © 2010 by ZyXEL Communications Corporation. The contents of this publication may
147 This device has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules. These limits a
148 Industry Canada Statement This device complies with RSS-210 of the Industry Canada Rules. Operation is subject to the following two conditions: 1
149 product has been modified, misused, tampered with, damaged by an act of God, or subjected to abnormal working conditions. Note Repair or replacem
15 1.3 Good Habits for Managing the MWR102 Do the following things regularly to make the MWR102 more secure and to manage the MWR102 more effectively
150 Appendix G Open Source Licenses Article I. End-User License Agreement for “MWR102” Article II. WARNING: ZyXEL Communications Corp. IS WILLIN
151 not exceed the scope of the license granted hereunder. Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL, and all implied li
152 License Agreement to those persons employed by you who come into contact with the Software, and to use reasonable best efforts to ensure their co
153 INCLUDING REASONABLE ATTORNEYS' FEES, TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8. 9.Audit Rights ZyXEL SHALL HAVE T
154 Article III. Article IV. NOTE: Some components of this product incorporate free software programs covered under the open source code licenses
155 igmpproxy v1.2 http://sourceforge.net/projects/igmpproxy/ GPLv2 iproute2-2.6.29-1 v2.6.19 http://www.linuxfoundation.org/collaborate/workgroups/n
156 Notice Information herein is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwis
157 rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know thei
158 2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such
159 medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute correspondi
16 1.5 The Rear Panel Figure 2 The rear panel of the Wireless Router. LAN: Through this port, you can connect the router to your PCs and the o
160 then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of thi
161 MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PR
162 To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certai
163 To “modify” a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an e
164 activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which ar
165 work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological me
166 6. Conveying Non-Source Forms. You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also conv
167 by a particular user, “normally used” refers to a typical or common use of that class of product, regardless of the status of the particular user
168 material, added by you to a covered work, for which you have or can give appropriate copyright permission. Notwithstanding any other provision of
169 (including any patent licenses granted under the third paragraph of section 11). However, if you cease all violation of this License, then your l
17 2 Web-Based Management 2.1 Overview This chapter describes how to access the MWR102 Web-Based Management Interface and provides an overview of it
170 counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or
171 A patent license is “discriminatory” if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the
172 published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any
173 How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the
174 library. If this is what you want to do, use the GNU Lesser General Public License instead of this License. But first, please read <http://www
175 For example, if you distribute copies of the library, whether gratis or for a fee, you must give the recipients all the rights that we gave you.
176 Although the Lesser General Public License is Less protective of the users' freedom, it does ensure that the user of a program that is linke
177 modified work must itself be a software library. b) You must cause the files modified to carry prominent notices stating that you changed the fil
178 Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. However
179 exception, the materials to be distributed need not include anything that is normally distributed (in either source or binary form) with the majo
18 Figure 3 Login Screen The following table describes the labels in this screen. LABEL DESCRIPTION User Name Type “admin” (default) as the User na
180 apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to co
181 THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE
182 Zlib License zlib.h -- interface of the 'zlib' general purpose compression library version 1.2.2, October 3rd, 2004 Copyright (C) 1995
183 product, an acknowledgment in the product documentation would be appreciated but is not required. 2. Altered source versions must be plainly mar
19 3 MWR102 Modes 3.1 Overview This chapter introduces the different modes available on your MWR102. 3.1.1 Device Modes This refers to the opera
2 MWR102 Mobile Wireless Router
20 4 Router Mode 4.1 Overview The MWR102 is set to router mode by default. Routers are used to connect the local network to another network (for ex
21 The following table describes the sub-menus. Table 2 Navigation Panel: Router Mode LINK FUNCTION Setup Wizard This screen guides you through th
22 Status Shows the current status and basic settings of the travel router Statistics Shows packet counts for wired and wireless Ethernet connectio
23 5 Access Point Mode 5.1 Overview Use your MWR102 as an access point (AP) if you already have a router or gateway on your network. In this mode yo
24 5.2.3 Configuring your WLAN and Maintenance Settings The configuration of wireless and maintenance settings in Access Point mode is the same as f
25 Encryption This shows the level of wireless security the MWR102 is currently using. BSSID This displays the MAC address of the wireless device. A
26 Figure 5 Navigation Panel The following table describes the sub-menus. Table 4 Navigation Panel: Router Mode LINK FUNCTION Setup Wizard This s
27 router. Site Survey This page provides a tool to scan the wireless network for nearby routers and APs. WPS This screen allows you to change the W
28 Note: If you change the IP address of the MWR102 in the screen below, you will need to log into the MWR102 again using the new IP address. Figure
29 Diversion automatically detect conflicts in the WAN and LAN IP. If there are conflicts, the LAN IP and LAN DHCP Range will automatically jump to n
3 About This User's Guide Intended Audience This manual is intended for people who want to configure the MWR102 using the Web-Based Management I
30 6.2 Connecting to Internet from an Access Point This section gives you an example of how to set up an access point (AP) and wireless client (a not
31 6.3.1 Push Button Configuration (PBC) 1 Make sure that your MWR102 is turned on and that it is within range of your computer. 2 Make sure
32 6.4 Enabling and Configuring Wireless Security (No WPS) Follow the steps below to configure the wireless settings on your MWR102. The instructions
33 2. Wireless adapters come with software sometimes called a “utility” that you install on your computer. See your wireless adapter’s User’s Guide
34 Figure 11 Confirm Save 7. Check the status of your wireless connection in the screen below. If your wireless connection is weak or y
35 Part II: Wireless
36 7 Wireless 7.1 Overview This chapter discusses how to configure the wireless network settings in your MWR102. See the appendices for more detail
37 7.3.1 Wireless Security Overview The following sections introduce different types of wireless security you can set up in the wireless network. 7
38 Table 6 Types of Encryption for Each Type of Authentication NO AUTHENTICATION Weakest No Security WEP WPA-Personal (TKIP) WPA-Enterprise Stro
39 7.4 General Wireless LAN Screen Use this screen to enable the Wireless LAN, enter the SSID and select the channel. Note: If you are configuring t
4 Customer Support Please have the following information ready when you contact Customer Support: • Product model and serial number • Warranty info
40 Network Band Allows you to choose between Wireless B/G/N functionality. Channel Width Allows you to choose between the 20MHz and 40MHz channel. C
41 Figure 14 Wireless > Advanced Settings The following table describes the labels in this screen. Table 8 Wireless > Advanced Settings LAB
42 Output Power Set the output power of the MWR102 in this field. If there is a high density of APs in an area, decrease the output power of the MWR
43 7.6.2 WEP Encryption WEP encryption scrambles the data transmitted between the wireless stations and the access points to keep network communicat
44 Key Length Select 64-bit or 128-bit. This dictates the length of the security key that the network is going to use. Key Format Select ASCII (5 Cha
45 The following table describes the labels in this screen. Table 10 Wireless > Security: WPA-PSK/WPA2-PSK/WPA2-Mixed LABEL DESCRIPTION Encrypti
46 Figure 18 Wireless > Access Control The following table describes the labels in this menu. Table 11 Wireless > Access Control LABEL DES
47 Apply Changes Click Apply to save your changes back to the MWR102. Reset Click Reset to reload the previous configuration for this screen. 7.8 WPS
48 Status This displays Configured when the MWR102 has connected to a wireless network using WPS. The current wireless and wireless security settings
49 The following table describes the labels in this screen. Table 13 Wireless > Site Survey LABEL DESCRIPTION Wireless Site Survey SSI
5 Document Conventions Warnings and Notes These are how warnings and notes are shown in this User’s Guide. Warnings tell you about things that could
50 8 Network Settings 8.1 Overview This chapter discusses the MWR102’s Network Settings screens. Use these screens to configure your LAN and WAN set
51 8.3 What You Need To Know The information in this section can help you configure the screens for your WAN and LAN connections. 8.3.1 Configuring
52 8.4 LAN Interface The LAN Interface Setup screen allows you to set up your LAN interface, the private IP of your router’s LAN port, and the subnet
53 default. Auto IP Address Diversion Click the drop down list, you may select “Enabled” to divert the IP Address automatically or select “Disabled”
54 8.5 WAN Interface This page allows users to configure WAN settings. You may select the Internet connection type from the drop down list next to “W
55 Provider (ISP). MTU Size The Maximum packet size the router will transmit. Any packet over the specified size will be chopped into a smaller size
56 Part III: Security MAC Filtering
57 9 MAC Filtering 9.1 Overview This chapter shows you how to enable and configure MAC address filtering that allows your MWR102 to permit and d
58 9.4 MAC Filtering This page allows users to restrict data from passing onto the internet from certain devices. Go to Firewall > MAC Filtering t
59 Part IV: Management Status Statistics Log Upgrade Firmware Save/Reload Settings Password
6 Icons Used in Figures Figures in this User’s Guide may use the following generic icons. The MWR102 icon is not an exact representation of your devi
60 10 Status 10.1 Overview This chapter discusses how to access and interpret information about the MWR102. 10.2 What You Can Do • Use the Sta
61 Table 18 Management > Status LABEL DESCRIPTION System Information Uptime This is the total time the MWR102 has been on. Firmware Build Time
62 Internet IP Address The IP address provided by your Internet Service Provider (ISP). Subnet Mask The Subnet Mask provided by your Internet Service
63 11 Statistics 11.1 Overview This page shows users data transfer information, and monitors packets sent and received 11.2 Statistics Screen .
64 This table shows the number of packets received over Ethernet LAN. Ethernet WAN This table shows the number of packets sent over the Ethernet WAN
65 12 Log 12.1 Overview This page shows current activity on the router, and allows you to set what information the router logs. 12.2 Log Screen
66 LABEL DESCRIPTION Enable Log Checking this box enables system log functionality. System All Checking this box shows all logged information pass
67 13 Upgrade Firmware 13.1 Overview Occasionally, a firmware upgrade may be issued to address bugs or add functionality. This chapter discusses h
68 Table 21 Management > Upgrade Firmware LABEL DESCRIPTION Select File Type in the location of the file you want to upload in this field or c
69 14 Save/Reload Settings 14.1 Overview This chapter shows you how to backup, restore and reset your MWR102. 14.2 What You Can Do Save Setting
7 Safety Warnings • Do NOT use this product near water, for example, in a wet basement or near a swimming pool. • Do not leave the device exposed t
70 Figure 32 Management > Save/Reload Settings The following table describes the labels in this screen. Table 22 Management > Save/Reload Set
71 Reset Pressing the Reset button in this section clears all user-entered configuration information and returns the MWR102 to its factory defaults.
72 15 Password 15.1 Overview This chapter discusses management of the MWR102’s Administrator user name and password. These are the User name and
73 Table 23 Management > Password LABEL DESCRIPTION User Name Type the user name you wish to use to log into the MWR102. New Password Typ
74 Part V: Troubleshooting
75 16 Troubleshooting 16.1 Overview This chapter offers some suggestions to solve problems you might encounter. The potential problems are divi
76 3 Inspect your cables for damage. Contact the vendor to replace any damaged cables. 4 Disconnect and re-connect the power adaptor to the MWR10
77 1 Make sure you are using the correct IP address. • The default IP address is 192.168.100.1. • If you changed the IP address (Chapter 5), use
78 1 Check the hardware connections, and make sure the LEDs are behaving as expected. See the Quick Start Guide. 2 Make sure you entered your ISP
79 Advanced Suggestions • Check the settings for bandwidth management. If it is disabled, you might consider activating it. If it is enabled, you mi
8 • Do not leave unit exposed to a heat source or in a location that may become hot, such as a parked vehicle or in direct sunlight. Do not leave in
80 4 Make sure your computer (with a wireless adapter installed) is within the transmission range of the MWR102. 5 Check that both the MWR102 and
81 17 Product Specifications The following tables summarize the MWR102’s hardware and firmware features. Table 24 Hardware Features Dimensions (W
82 FEATURE DESCRIPTION Default IP Address 192.168.100.1 (router) 192.168.100.2. (AP) Default Subnet Mask 255.255.255.0 (24 bits) Default Password
83 DHCP (Dynamic Host Configuration Protocol) Use this feature to have the MWR102 assign IP addresses, an IP default gateway and DNS servers to compu
84 Appendices Pop-up Windows, JavaScripts and Java Permissions IP Addresses and Subnetting Setting up Your Computer’s IP Address Wireless LANs Comm
85 Appendix A Pop-up Windows, JavaScripts and Java Permissions In order to use the Web-Based Management Interface you need to allow: • Web browser
86 Figure 34 Pop-up Blocker You can also check if pop-up blocking is disabled in the Pop-up Blocker section in the Privacy tab. 1 In Internet Ex
87 2 Select Settings…to open the Pop-up Blocker Settings screen. Figure 36 Internet Options: Privacy 3 Type the IP address of yo
88 Figure 37 Pop-up Blocker Settings 5 Click Close to return to the Privacy screen. 6 Click Apply to save this setting. JavaScripts If pages
89 Figure 38 Internet Options: Security 2 Click the Custom Level... button. 3 Scroll down to Scripting. 4 Under Active scripting make sure
9 Table of Contents About This User's Guide ...
90 Figure 39 Security Settings - Java Scripting Java Permissions 1 From Internet Explorer, click Tools, Internet Options and then the Security t
91 Figure 40 Security Settings – Java JAVA (Sun) 1 From Internet Explorer, click Tools, Internet Options and then the Advanced tab. 2 Make sur
92 Figure 41 Java (Sun)
93 Appendix B IP Addresses and Subnetting This appendix introduces IP addresses and subnet masks. IP addresses identify individual devices on a net
94 How much of the IP address is the network number and how much is the host ID varies according to the subnet mask. Subnet Masks A subnet mask is
95 Table 26 Subnet Mask - Identifying Network Number 1ST OCTET: (192) 2ND OCTET: (168) 3RD OCTET: (1) 4TH OCTET (2) IP Address (Binary) 11000000
96 24-bit mask 11111111 11111111 11111111 00000000 255.255.255.0 29-bit mask 11111111 11111111 11111111 11111000 255.255.255.248 . Network
97 For example, 192.1.1.0 /25 is equivalent to saying 192.1.1.0 with subnet mask 255.255.255.128. The following table shows some possible subnet mas
98 You can “borrow” one of the host ID bits to divide the network 192.168.1.0 into two separate sub-networks. The subnet mask is now 25 bits (255.25
99 In a 25-bit subnet the host ID has 7 bits, so each sub-network has a maximum of 27 – 2 or 126 possible hosts (a host ID of all zeroes is the subne
Kommentare zu diesen Handbüchern