SBG Series. Support Notes. Wireless N Fiber WAN Small Business Gateway. (Green Product) Version 1.00 Edition 1, 04/2014

Size: px
Start display at page:

Download "SBG Series. Support Notes. Wireless N Fiber WAN Small Business Gateway. (Green Product) Version 1.00 Edition 1, 04/2014"

Transcription

1 SBG Series Wireless N Fiber WAN Small Business Gateway (Green Product) Version 1.00 Edition 1, 04/2014 Support Notes Copyright 2014 ZyXEL Communications Corporation

2 Table of Contents Chapter Introduction... 3 Feature/Function Introduction... 3 Application Scenario Introduction... 3 Chapter Multi-WAN connectivity with load balancing and fail over... 4 Increased bandwidth and reach... 4 Robust security designs... 4 Secure business access via VPN... 5 Comprehensive management... 5 Chapter Scenario 1 VLAN... 6 Scenario 2 Firewall... 7 Scenario 3 User Access Control... 9 Scenario 4 3G backup Scenario 5 NAT Scenario 6 FullFeature NAT Scenario 7 Virtual Private Network (VPN) Scenario x Scenario 9 Maintenance Log Chapter Product FAQ: Wireless FAQ... 28

3 Chapter 1 Introduction The ZyXEL SBG (Small Business Gateway) Series is the Multi-WAN Gateway which provides high speed internet access for business users. It features not only VDSL2/ADSL2+ functionality, but also one GbE WAN with SFP interface (SBG3500-N Series only). This comprehensive device can flexibly offer Multi-WAN connectivity to adopt various Internet connection interfaces. Feature/Function Introduction VDSL/bonding + GbE/SFP (SBG3500-N) Multi-WAN connectivity with load balancing and failover Up to 20 concurrent VPN sessions 4*GbE LANs H/W Packet engines/ipsec engine External Captive Web Portal Metal case, Rack-Mountable, Front port Robust security designs Secure business access via VPN Comprehensive management Application Scenario Introduction Internet Access Wireless Access Firewall defense against Virtual Private Network (VPN) connection Virtual Local Area Network (VLAN) Maintenance Tool 3

4 Chapter 2 Multi-WAN connectivity with load balancing and fail-over The ZyXEL SBG Series provides multiple WAN interfaces including DSL, Gigabit Ethernet and 3G WAN backup to establish load balancing or backup WAN connectivity. Service providers can flexibly offer WAN services of the highest availability in one single box for small business owners to enjoy. Powered by the load balancing and fail-over mechanisms among multiple WANs, it maximizes WAN stability for mission-critical Internet applications with benefits from the integrated bandwidth. Increased bandwidth and reach The SBG3500-N supports ADSL2+/VDSL2 bonding and dual-personality Ethernet WAN functionalities that enable service providers to increase bandwidth and extend coverage. With the available copper lines, service providers can take advantage of ADSL2+/VDSL2 bonding to not only provide higher speeds for the existing subscribers, but also improve the reach to users faraway from central sites. If fiber lines are preferred, the SBG3500-N Series can use the Small Form Pluggable (SFP) interface to connect Fiber Ethernet that extend distance much longer with Gigabit-level performance, or simply connect to other Ethernet WAN devices. Robust security designs Based on Access Control List (ACL) rules, Stateful Packet Inspection (SPI), Denial of Service (DoS) and Distributed Denial of Service (DDoS) features, the ZyXEL SBG Series provides the first-line defense against hackers, network intruders and other harmful threats. The configurable Demilitarized Zone (DMZ) is another benefit that provides more flexible accessibility while preventing external attacks toward the confidential resources and databases. 4

5 Secure business access via VPN The ZyXEL SBG Series allow small businesses to establish stable Virtual Private Network (VPN) connections with partners as well as branch offices. Road warriors and telecommuters can use IPsec as well as L2TP or PPTP VPN to safely access corporate networks without maintaining VPN software on their PCs. The SBG Series is also designed with VPN HA features to ensure that the VPN connectivity is always on for the business needs. Comprehensive management The ZyXEL SBG Series offer a two-level login privilege mechanism to differentiate user segments; and the ISP can also define the policies for the limited account to easily manage them with the integrated profile database. It also provides TR-069 and Simple Network Management Protocol (SNMP) for service providers to conduct remote device management tasks. 5

6 Chapter 3 Scenario 1 VLAN 1.1 Application scenario Since security is an issue, the IT manager would like to move the server to a distinct broadcast domain called ServerGroup. General user cannot access the Server or capture the server packets even if they plug into same physical LAN. Besides, both LAN users and the server can still access the Internet without any issue. 1.2 Configuration Guide 1. Go to Network Setting> Interface Group/VLAN > Click on Add New Interface Group. 2. Enter the Group Name ServerGroup. 3. Enter the 802.1q number Enable the Port [LAN4] Member checkbox. 5. Click on Apply. 6

7 Scenario 2 Firewall 2.1 Application scenario SBG Series Firewall has the capability to limit only specific users from accessing the LAN Server. The others users access requests will be dropped or rejected. 2.2 Configuration Guide 1. Go to Security> Firewall > Access Control > Click on Add new ACL rule. 2. Add ACL rule for to allow specific users to access LAN RDP Server. 1. Enter the Filter Name ForRDP. 2. Select the Order Select direction from WAN to LAN. 4. Select Source Device Specific IP Address. 5. Enter Source IP address Select Destination Device Select IP Type IPv4. 8. Select Service RDP. 9. Select Policy ACCEPT. 10. Click on Apply. 3. Add ACL rule to drop untrusted users from accessing the LAN RDP Server. 1. Enter the Filter Name DropAny. 7

8 2. Select the Order Select direction from WAN to LAN. 4. Select Source Device Specific IP Address. 5. Keep Source IP address empty (It means Any). 6. Select Destination Device PC-1( ). 7. Select IP Type IPv4. 8. Select Service Specific Service. 9. Keep Protocol empty (means Any). 10. Select Policy Drop. 11. Click on Apply. 4. Go to Security> Firewall > General > Click Firewall Enable > Click on Apply. 8

9 Scenario 3 User Access Control 3.1 Application scenario The SBG Series User Access Control allows the IT manager to arrange Internet access scheduling to limit specific or all LAN PCs Internet access usage time. 3.2 Configuration Guide 1. Go to Security> User Access Control. 2. Add a new profile to control users. 1. Click Add new profile. 2. Check Active. 3. Enter User Access Control Name (ex: Team-Member). 4. Select Network User All. 5. Select working Day Monday, Tuesday, Wednesday, Thursday and Friday. 6. Arrange Time 07:00 till 18: Click on Apply. 8. Select User Access Control Enable. 9. Click on Apply. 9

10 Scenario 4 3G Backup 4.1 Application scenario 3G backup allows the SBG Series to keep the Internet connection when the primary WAN connection has failed. 4.2 Configuration Guide 1. Go to Network Setting> Broadband > 3G WAN. 2. Enter the Username/Password if the ISP requires it. 3. Enter the PIN code if SIM card PIN is enabled. 4. Enter the Dial string. 5. Enter the APN string or number. 6. Select Connection Nailed UP if you would like to make the dongle keep the connection. 10

11 7. Click on Apply. Scenario 5 NAT 5.1 Application scenario NAT provides system administrators with an easy solution to create a private IP network for security and IP management. Powered by NAT technology, the SBG Series supports complete NAT mapping and most popular Internet multimedia applications. This functionality is best demonstrated with the NAT port forwarding feature implemented in the CPE. In a scenario shown in the above diagram, we have an RDP server installed behind the SBG Series with an IP assigned by the local DHCP server ( ). How should we configure the SBG Series, so that the notebook at the WAN site can access the RDP server? The following step-by-step guide illustrates the setup procedure. 5.2 Configuration Guide Port Forwarding 1. Go to Network Setting> NAT > Port Forwarding. 2. Click on Add new rule. 3. Enable the Active checkbox. 4. Enter Service Name (ex: ForRDP). 5. Select current WAN Interface (ex: ADSL). 6. Enter Start Port Enter End Port Enter Translation Port Enter Translation Port Enter Server IP Address

12 11. Select Protocol TCP. 12. Click on Apply Applications 1. Go to Network Setting> NAT > Applications. 2. Click on Add new application. 3. Select current WAN Interface (ex: ADSL). 4. Enter Server IP Address Select Application Category Applications. 6. Select Application Forwarded Remote Desktop Connection. 7. Click on OK. Scenario 6 FullFeature NAT 6.1 Application scenario Another common question from customers is that they want to use multiple public IP addresses on prestige routers and would NAT them their internal IP addresses on one-to-one or many-to-one basis. This process is very simple and explained below. The scenario is Multiple Global IP addresses for clients and servers (One-to-One, Many-to-One, Server Set mapping types are used). 12

13 In this case, we have 2 IP addresses from an ISP via ADSL. We have a very busy internal FTP server and also LAN users. In this case, we want to assign the 2 IP addresses by the following way using 2 NAT rules. - Rule 1 (One-to-One type) to map the FTP Server with LAN-IP1 ( ) to WAN-IP1 ( ). - Rule 2 (Many-to-One type) to map the other clients ( ~ ) to WAN-IP2 ( ). 6.2 Configuration Guide Activate FullFeature NAT of a specific WAN interface 1. Go to Network Setting> Broadband > WAN Interface ADSL > Click on Edit. 2. Select NAT Enable. 3. Select FullFeature NAT Enable. 4. Select NatSet number (ex: 1). 5. Click on Apply. Remove FullFeature WAN interface from Multi-WAN rules 1. Go to Network Setting> Broadband > Multi-WAN >WAN Interface ADSL > Click on Delete. 2. Click on Yes. Configure NAT Address Mapping rule for Server 1. Select Type NAT One-to-One 2. Enter Local Start IP Enter Global Start IP Select Set number Click on OK. Configure NAT Address Mapping rule for General Users 1. Select Type NAT Many-to-One 2. Enter Local Start IP Enter Local End IP Enter Global Start IP

14 5. Select Set number Click on OK. Scenario 7 Virtual Private Network (VPN) 7.1 Application scenario VPN provides business users a highly secure path to transmit data. The following two scenarios describe the general usage of VPNs. - IPSec VPN (Site-to-Site): - L2TP VPN: 7.2 Configuration Guide IPSec VPN SBG1: Configure General information 1. Go to VPN > IPSec VPN > Setup. 2. Click on Add New Entry. 3. Check Enable. 4. Enter Connection Name (ex: VPNtoSBG2). 5. Enable the Nailed-up checkbox. 6. Enable the NAT Traversal (NAT-T) checkbox. 14

15 7. Select Application Scenario Site-to-Site. 8. Select My Address ADSL. 9. Enter Primary Peer Gateway Address Configure Authentication information 1. Select Key Exchange Mode Auto. 2. Select Pre-Shared Key and enter Configure Phase 1 1. Enter SA Life Time Select Negotiation Mode Main. 3. Select Encryption AES Select Authentication SHA1. 5. Select Key Group DH2. 6. Enable the Dead Peer Detection (DPD) checkbox. Configure Phase 2 1. Enter SA Life Time Select Tunnel Mode ESP. 3. Select Encapsulation Tunnel. 4. Select Encryption AES Select Authentication SHA1. 6. Enable Perfect Forward Secrecy (PFS) and select DH2. Configure Policy 1. Select Local IP Type Subnet. 2. Enter Local IP Address Enter Local Subnet Mask Select Remote IP Type Subnet. 5. Enter Remote IP Address Enter Remote Subnet Mask Click on Apply. SBG2: Configure General information 1. Go to VPN > IPSec VPN > Setup. 2. Click on Add New Entry. 3. Check Enable. 15

16 4. Enter Connection Name (ex: VPNtoSBG1). 5. Enable the Nailed-up checkbox. 6. Enable the NAT Traversal (NAT-T) checkbox. 7. Select Application Scenario Site-to-Site. 8. Select My Address ADSL. 9. Enter Primary Peer Gateway Address Configure Authentication information 1. Select Key Exchange Mode Auto. 2. Select Pre-Shared Key and enter Configure Phase 1 1. Enter SA Life Time Select Negotiation Mode Main. 3. Select Encryption AES Select Authentication SHA1. 5. Select Key Group DH2. 6. Enable the Dead Peer Detection (DPD) checkbox. Configure Phase 2 1. Enter SA Life Time Select Tunnel Mode ESP. 3. Select Encapsulation Tunnel. 4. Select Encryption AES Select Authentication SHA1. 6. Enable Perfect Forward Secrecy (PFS) and select DH2. Configure Policy 1. Select Local IP Type Subnet. 2. Enter Local IP Address Enter Local Subnet Mask Select Remote IP Type Subnet. 5. Enter Remote IP Address Enter Remote Subnet Mask Click on Apply L2TP/PPTP VPN Active L2TP VPN default rule 16

17 1. Go to VPN > IPSec VPN > Setup. 2. Click Default_L2TPVPN Edit. 3. Check Enable. 4. Pre-Shared Key is by default. 5. Click on Apply. Configure L2TP/PPTP Policy 1. Go to VPN > L2TP VPN/PPTP VPN > Setup. 2. Check Enable. 3. Enter IP Address Pool Click on Apply. Scenario x 8.1 Application scenario SBG series supports 802.1x. This feature provides IT managers with a solution to control the enterprise wireless environment. The wireless users require RADIUS authentication when they connect to the SBG SSID. 8.2 Configuration Guide Disable WPS 1. Go to Network Setting > Wireless > WPS. 17

18 2. Select WPS Disable. 3. Click on Apply. Configure 802.1x 1. Go to Network Setting > Wireless > General. 2. Select Wireless Enable. 3. Enter Wireless Network Name (SSID) (ex: ZyXEL). 4. Enter Max Clients (ex: 32). 5. Select Security Mode WPA/WPA2. 6. Enter IP Address (RADIUS Server). 7. Enter Port Number Enter Shared Secret Click on Apply. Scenario 9 Maintenance Log 9.1 Application Scenario Log file is an important method for IT Managers to monitor the device status. SBG Series has the capability to save the log to Local database, Remote Syslog Server and also inform user. 18

19 9.2 Configuration Guide Local File 1. Go to Maintenance > Log Setting. 2. Select Syslog Logging Enable. 3. Select Mode Local File. 4. Check Active Log and Alert Items (System, DHCP Client, etc.). 5. Click on Apply Remote/Local File and Remote 1. Go to Maintenance > Log Setting. 2. Select Syslog Logging Enable. 3. Select Mode Remote. 4. Enter Syslog Server Enter UDP Port Check Active Log and Alert Items (System, DHCP Client, etc.). 7. Click on Apply Log Settings Configure Notification 1. Go to Maintenance > Notification. 2. Click on Add New Enter Mail Server mail.zyxel.com.tw. 4. Enter Authentication Username test. 5. Enter Authentication Password Enter Account Address 7. Click on Apply. Configure Log Setting 1. Go to Maintenance > Log Setting. 2. Select Syslog Logging Enable. 3. Enter Mail Server mail.zyxel.com.tw. 4. Enter System Log Mail Subject SBG - System Log. 5. Enter Security Log Mail Subject SBG - Security Log. 6. Enter Send Log to admin@zyxel.com.tw. 7. Enter Send Alarm to admin@zyxel.com.tw. 8. Check Active Log and Alert Items (System, DHCP Client etc). 9. Click on Apply. 19

20 Chapter 4 Product FAQ: Will the device work with my Internet connection? SBG Series is designed to be compatible with major ISPs that utilize ADSL as a broadband service. SBG Series offers Ethernet ports to connect to your computer so the device is placed in the line between the computer and your ISP. Why do I need to use SBG Series? If you need an ADSL/VDSL modem/router to use with an ADSL/VDSL line, SBG Series is an ideal device for such application. The device has 4 Ethernet ports (LAN ports) and ADSL/VDSL WAN port. You should connect your computer to the LAN port and connect the ADSL/VDSL line to the WAN port. If the ISP uses PPPoE or PPPoA, you need a user account and password to access the Internet. What is PPPoE? PPPoE stands for Point-to-Point Protocol over Ethernet; it is an IETF draft standard specifying how a computer interacts with a broadband modem (i.e. xdsl, cable, wireless, etc.) to achieve access to the high-speed data networks via a familiar PPP dialer such as 'Dial-Up Networking' user interface. PPPoE supports a broad range of existing applications and services including authentication, accounting, secure access and configuration management. There are many service providers running of PPPoE today. Before configuring PPPoE in the device, please make sure your ISP supports PPPoE. Does the SBG Series support PPPoE? Yes. All SBG Series supports PPPoE. What is PPPoA? 20

21 PPPoA is short for Point-to-Point Protocol over Asynchronous Transfer Mode (ATM). PPPoA relies on two widely accepted standards: PPP and ATM. It is an end-to-end asymmetric digital subscriber line (ADSL) architecture. IP packets travel from the PC over Ethernet to the DSL modem, called the ADSL transceiver unit-remote (ATU-R). The ATU-R adds the PPP protocol to the IP packets and transports them to the carrier's Digital Subscriber Line Access Multiple (DSLAM) via ATM. It is a technology becoming more popular with DSL providers. Does the SBG Series support PPPoA? Yes. All SBG Series supports PPPoA. How do I know if I am using PPPoE/PPPoA? PPPoE/PPPoA requires a user account to log in to the provider's server. If you need to configure a user name and password on your computer to connect to the ISP you are probably using PPPoE/PPPoA. If you are simply connected to the Internet when you turn on your computer, you probably are not using PPPoE/PPPoA. You can also check with your ISP s hotline or check the information sheet provided by the ISP. Please choose PPPoE/PPPoA as the encapsulation type in the device if the ISP uses PPPoE/PPPoA. Why does my provider use PPPoE/PPPoA? PPPoE/PPPoA emulates a familiar Dial-Up connection. It allows your ISP to provide services using their existing network configuration over the broadband connections. Besides, PPPoE/PPPoA supports a broad range of existing applications and services including authentication, accounting, secure access and configuration management. Which Internet applications can I use with the device? Most common applications include MIRC, PPTP, ICQ, Cu-SeeMe, NetMeeting, IP/TV, RealPlayer, VDOLive, Quake, Quake II, Quake III, StarCraft, & Quick Time. How can I configure the device? a. By accessing the Telnet remote management-driven user interface for 21

22 easy remote management. b. Web browser Using the embedded web server for easy configuration. What can we do with the device? Browse the World Wide Web (WWW), send and receive individual , and download software. These are just a few of many benefits you can enjoy when you put the whole office on-line with the device. Does the device support dynamic IP addressing? The device supports either a static or dynamic IP address from the ISP. What is the difference between the internal IP address and the real IP address from my ISP? Internal IP addresses are sometimes referred to as virtual IP addresses. They are a group of up to 255 IP addresses that are used and recognized internally on the local area network. They are not intended to be recognized on the Internet. The real IP addresses from the ISP, instead, can be recognized or pinged by another real IP address. The device works like an intelligent router that routes between the virtual IP address and the real IP address. What DHCP capability does the device support? The device supports DHCP client (Ethernet encapsulation) on the WAN port and DHCP server on the LAN port. The device's DHCP client allows it to get the Internet IP address from ISP automatically if your ISP uses DHCP as a method to assign IP address. The device's internal DHCP server allows it to automatically assign IPs and DNS addresses to the clients on the local LAN. How do I use the reset button, and what parameters will be reset by the reset button? You can use a blunt pointed object (e.g. paperclip) and insert it into the little reset button hole beside the power connector. Press down the reset button and hold down for approx. 5 seconds, and the unit will be reset. When the reset button is pressed, all the device parameters will be reset back to the factory default settings, including password and IP address 22

23 (the default IP address is , default password is 1234). What network interfaces does the new device Series support? The new device Series supports auto MDI/MDIX 10/100M Ethernet LAN port to connect to the computer or Switch on LAN. How does the device support TFTP? In addition to the direct console port connection, the device support uploading and downloading of the firmware and configuration file using TFTP (Trivial File Transfer Protocol) over LAN. Can the device support TFTP over WAN? Although TFTP should work over WAN as well, it is not recommended because of the potential data corruption problems. What is Virtual LAN (VLAN)? A virtual LAN, commonly known as a VLAN, is a group of hosts with a common set of requirements that communicate as if they were attached to the same wire, regardless of their physical location. A VLAN has the same attributes as a physical LAN, but it allows for end stations to be grouped together even if they are not located on the same LAN segment. Network reconfiguration can be done through software instead of physically relocating devices. What is VLAN construction? VLANs are created to provide the segmentation services traditionally provided by routers in LAN configurations. VLANs address issues such as scalability, security, and network management. Routers in VLAN topologies provide broadcast filtering, security, address summarization, and traffic flow management. By definition, switches may not bridge IP traffic between VLANs as it would violate the integrity of the VLAN broadcast domain. Virtual LANs are essentially Layer 2 constructs, whereas IP subnets are Layer 3 constructs. In a LAN employing VLANs, a one-to-one relationship often exists between VLANs and IP subnets, although it is possible to have 23

24 multiple subnets on one VLAN or have one subnet spread across multiple VLANs. Virtual LANs and IP subnets provide independent Layer 2 and Layer 3 constructs that map to one another and this correspondence is useful during the network design process. When do I need to use NAT? a. Make local server accessible from the outside Internet. When NAT is enabled the local computers are not accessible from outside. You can use Multi-NAT to make an internal server accessible from outside. b. Support Non-NAT Friendly Applications Some servers providing Internet applications such as some IRC servers do not allow users to login using the same IP address. Thus, users on the same network cannot login to the same server simultaneously. What is NAT? NAT (Network Address Translation-NAT RFC 1631) is the translation of an Internet Protocol address used within one network to a different IP address known within another network. One network is designated as the inside network and the other is the outside. Typically, a company maps its local inside network addresses to one or more global outside IP addresses and "unmaps" the global IP addresses on the incoming packets back into local IP addresses. The IP addresses for NAT can be either fixed or dynamically assigned by the ISP. In addition, you can designate servers, e.g., a Web server and a Telnet server, on your local network and make them accessible to the outside world. If you do not define any servers, the NAT offers the additional benefit of firewall protection. In such case, all incoming connections to your network will be filtered out by the CPE, thus preventing intruders from probing your network. For more information on IP address translation, please refer to RFC 1631, The IP Network Address Translator (NAT). How does NAT work? According to the following figure, we define the local IP addresses as the 24

25 Internal Local Addresses (ILA) and the global IP addresses as the Inside Global Addresses (IGA). The term 'inside' refers to the set of networks that are subject to translation. The NAT operates by mapping the ILA to the IGA required for communication with hosts on other networks. It replaces the original IP source address (and TCP or UDP source port numbers) and then forwards each packet to the Internet ISP, thus making the packets appear as if they came from the NAT system itself (e.g., the CPE router). The CPE keeps track of the original addresses and port numbers, so the incoming reply packets can have their original values restored. What is IP Multicast? Traditionally, the IP packets are transmitted in two ways: unicast or broadcast. Multicast is a third way to deliver the IP packets to a group of hosts. Host groups are identified by class D IP addresses, i.e., those with "1110" as their higher-order bits. In dotted decimal notation, host group addresses range from to Among them, is assigned to the permanent IP hosts group, and is assigned to the multicast routers group. The IGMP (Internet Group Management Protocol) is the protocol used to support multicast groups. The latest version is version 2 (See RFC2236). The IP hosts use IGMP to report their multicast group membership to any immediate-neighbor multicast routers, so the multicast routers can decide if a multicast packet needs to be forwarded. At the start-up, the Prestige queries all directly connected networks to gather group membership. After that, the CPE updates the information by periodic queries. The device implementation of IGMP is also compatible with version 1. The multicast setting can be turned on or off on the Ethernet and remote nodes. What is BOOTP/DHCP? BOOTP stands for Bootstrap Protocol. DHCP stands for Dynamic Host Configuration Protocol. Both are mechanisms to dynamically assign an IP address to a TCP/IP client by the server. In this case, the device is a BOOTP/DHCP server. Windows 95 and Windows NT clients use DHCP to request an internal IP address, while WFW and WinSock clients use BOOTP. TCP/IP clients may specify their own IP or utilize 25

26 BOOTP/DHCP to request an IP address. What is DDNS? The Dynamic DNS service allows you to alias a dynamic IP address to a static hostname, allowing your computer to be more easily accessed from various locations on the Internet. To use the service, you must first apply for an account from one of several free Web servers such as Without DDNS, our users will always need to use the WAN IP address of the SBG Series to reach our internal server. It is inconvenient for the users if this IP is dynamic. With DDNS supported by the device, you can apply for a DNS name (e.g., for your server (e.g., web server) from a DDNS server. The outside users can always access the web server using the regardless of the WAN IP address of the SBG Series. When the ISP assigns the device (SBG Series) a new IP address, the device updates this IP address to the DDNS server so that of the server to update its IP-to-DNS entry. Once the IP-to-DNS table in the DDNS server is updated, the DNS name for your web server (i.e., remains usable. When do I need to use DDNS service? When you want your internal server to be accessed by using DNS name rather than using the dynamic IP address we can use the DDNS service. The DDNS server allows to alias a dynamic IP address to a static hostname. Whenever the ISP assigns you a new IP address, the device sends this IP address to the DDNS server to update its records. Introduction of QoS Quality of Service (QoS) refers to both a network s ability to deliver data with minimum delay, and to the networking methods used to control the use of bandwidth. QoS allows the ZyXEL device to group and prioritize application traffic and fine-tune network performance. Without QoS, all traffic data is equally likely to be dropped when the 26

27 network is congested. This can cause a reduction in network performance and make the network unfit for time critical applications such as video-on-demand. What is a Virtual Private Network (VPN)? VPN stands for Virtual Private Network. In the past, when we needed to transmit data in a secure way, we would need to have a site-to-site leased line between the sites. This incurred very high costs for installing the lines. A VPN gives users a secure way to access corporate network resources over the Internet or other public or private networks without the expense of leasing site-to-site lines. A secure VPN is a combination of tunneling, encryption, authentication, access control and auditing technologies/services used to transport traffic over the Internet or any insecure network that uses the TCP/IP protocol suite for communication. L2TP/IPSec VPN Overview The Layer 2 Tunneling Protocol (L2TP) is a tunneling protocol used to support virtual private networks (VPNs). However, it does not provide any encryption or confidentiality by itself; it relies on an encryption protocol that it passes within the tunnel to provide privacy. For this reason, L2TP is often implemented along with IPSec. This is referred to as L2TP/IPSec. IPSec VPN tunnel is established first and then an L2TP tunnel is built inside it. When the process is complete, L2TP packets between the endpoints are encapsulated by IPSec. Since the L2TP packets themselves are wrapped and hidden within the IPSec packets, no information about the internal private network can be garnered from the encrypted packets. Also, it is not necessary to open UDP port 1701 (used for L2TP) on firewalls between the endpoints, since the inner packets are not acted upon until after IPSec data has been decrypted and stripped, which only takes place at the endpoints. PPTP VPN Overview The Point-to-Point Tunneling Protocol (PPTP) is a method for implementing 27

28 VPN. It allows a user to create a secure VPN connection remotely to the local networks. The intended use of this protocol is to provide similar levels of security and remote access as typical VPN products. Wireless FAQ What is a Wireless LAN? Wireless LANs provide all the functionality of wired LANs, without the need for physical connections (wires). Data is modulated onto a radio frequency carrier and transmitted through the ether. Typical bit-rates are 11 Mbps and 54 Mbps, although in practice data throughput is half of this. Wireless LANs can be formed simply by equipping PC's with wireless NICs. If connectivity to a wired LAN is required, an Access Point (AP) is used as a bridging device. AP's are typically located close to the center of the wireless client population. What are the advantages of Wireless LANs? a. Mobility: Wireless LAN systems can provide LAN users with access to real-time information anywhere in their organization. This mobility supports productivity and service opportunities not possible with wired networks. b. Installation Speed and Simplicity: Installing a wireless LAN system can be fast and easy and can eliminate the need to pull cable through walls and ceilings. c. Installation Flexibility: Wireless technology allows the network to go where wires cannot go. d. Reduced Cost-of-Ownership: While the initial investment required for wireless LAN hardware can be higher than the cost of wired LAN hardware, overall installation expenses and life-cycle costs can be significantly lower. Long-term cost benefits are greatest in dynamic environments requiring frequent moves and changes. 28

29 e. Scalability: Wireless LAN systems can be configured in a variety of topologies to meet the needs of specific applications and installations. Configurations are easily changed and range from peer-to-peer networks suitable for a small number of users to full infrastructure networks of thousands of users that enable roaming over a broad area. What are the disadvantages of Wireless LANs? The speed of Wireless LANs is still relatively slower than that of wired LAN. The most popular wired LAN standard operates at 100 Mbps, which is more than 4 times of that of Wireless LAN (effectively around 25 Mbps). A faster wired LAN standard (1000 Mbps), which is 40 times faster, is becoming popular as well. The setup cost of Wireless LAN is relatively higher because the equipment costs which includes access points and Wireless LAN cards is higher than hubs and CAT 5 cables. Where can you find wireless networks? Airports, hotels, and even coffee shops like Starbucks are deploying networks so that customers can wirelessly access the Internet with their laptops. As these types of networks spread, this will create additional security risk for remote users if not properly protected. What is an Access Point (AP)? The AP (Access Point also known as a Base Station) is a wireless server with an antenna and a wired Ethernet connection that broadcasts information using radio signals. An AP typically acts as a bridge for the clients. It can pass information to wireless LAN cards that have been installed in computers or laptops allowing those computers to connect to the campus network and the Internet without wires. What is IEEE ? The IEEE is a wireless LAN industry standard, and the objective of IEEE is to make sure that different manufacturers' wireless LAN devices can communicate with each other provide 1 or 2 Mbps transmission data rates in the 2.4 GHz ISM band using either FHSS or 29

30 DSSS modulation. What is b? b is the first revision of standard allowing data rates up to 11 Mbps in the 2.4GHz ISM band. It is also known as High-Rate and Wi-Fi b only uses DSSS modulation, and the maximum speed of 11 Mbps has fallbacks to 5.5, 2 and 1 Mbps. How fast is b? The IEEE b standard has a nominal speed of 11 megabits per second (Mbps). However, depending on signal quality and how many other people are using the wireless Ethernet through a particular Access Point, usable speed will be much lower (on the order of 4 or 5 Mbps, which is still substantially faster than most dialup, cable and DSL modems). What is a? a is the second revision of that operates in the unlicensed 5 GHz band and allows transmission rates of up to 54 Mbps a uses OFDM (orthogonal frequency division multiplexing) modulation as opposed to FHSS or DSSS. Higher data rates are possible by combining channels. Due to higher frequency, range is less than lower frequency systems (i.e., b and g) and can increase the cost of the overall solution because a greater number of access points may be required a is not directly compatible with b or g networks. In other words, a user equipped with an b or g radio card will not be able to interface directly with an a access point. Multi-mode NICs can solve this problem. What is g? g is an extension of b g increases b's data rates to 54 Mbps and still utilizes the 2.4 GHz ISM band. Modulation is based upon OFDM (orthogonal frequency division multiplexing) technology. An b radio card will interface directly with an g access point (and vice versa) at 11 Mbps or lower depending on range. The range at 54 Mbps is less than for b operating at 11 Mbps. 30

31 What is n? n supports frequencies in both 2.4 GHz and 5 GHz radio bands and its data rate ranges from 54 Mbit/s up to 600 Mbit/s in theory, using the n Channel Doubling technology which can double the channel bandwidth from 20 MHz to 40 MHz and effectively doubles data rates and throughput. It adds the MIMO feature, which utilizes multiple transmission and reception antennas to allow higher raw data rate, and resolves more information than possible using a single antenna configuration n also uses the Alamouti coding coding scheme to increase transmission range. Is it possible to use products from a variety of vendors? Yes, as long as the products comply with the same IEEE standard. The Wi-Fi logo is used to define compatible products. What is Wi-Fi? The Wi-Fi logo signifies that a product is interoperable with wireless networking equipment from other vendors. A Wi-Fi logo product has been tested and certified by the Wireless Ethernet Compatibility Alliance (WECA). If a Wireless LAN Card is Wi-Fi certified, that means that it will work (interoperate) with any brand of Access Point that is also Wi-Fi certified. What types of devices use the 2.4 GHz band? Various spread spectrum radio communication applications use the 2.4 GHz band. This includes WLAN systems (not necessarily of the type IEEE b), cordless phones, wireless medical telemetry equipment and Bluetooth short-range wireless applications, which includes connecting printers to computers and connecting modems or hands-free kits to mobile phones. Does the interfere with Bluetooth devices? Any time devices are operated in the same frequency band, there is a potential for interference. Both the b and Bluetooth devices occupy the same 2.4-to GHz unlicensed frequency range-the same band. But a Bluetooth device 31

32 would not interfere with other devices much more than another device would interfere. While more collisions are possible with the introduction of a Bluetooth device, they are also possible with the introduction of another device, or a new 2.4 GHz cordless phone for that matter. But, Bluetooth devices are usually low-power, so the effects that a Bluetooth device may have on an network, if any, aren't far-reaching. Can radio signals pass through walls? Transmitting through a wall is possible depending upon the material used in its construction. In general, metals and substances with high water content do not allow radio waves to pass through. Metals reflect radio waves and concrete attenuates radio waves. The amount of attenuation suffered in passing through concrete will be a function of its thickness and the amount of metal reinforcement used. What are potential factors that may cause interference for WLAN products? Factors of interference: 1. Obstacles: walls, ceilings, furniture, etc. 2. Building Materials: metal doors, aluminum studs. 3. Electrical devices: microwaves, monitors, electric motors. Solution: 1. Minimize the number of walls and ceilings between clients and APs. 2. Position Antennas for best reception. 3. Keep WLAN products away from electrical devices, e.g.: microwaves, monitors, electric motors, etc. 4. Add additional APs if necessary. What is the difference between a WLAN and a WWAN? WLANs are generally privately owned, wireless systems that are deployed in a corporation, warehouse, hospital, or educational campus setting. Data rates are high and there are no per-packet charges for data transmission. WWANs are generally publicly shared data networks designed to provide coverage in metropolitan areas and along traffic corridors. WWANs are 32

33 owned by a service provider or carrier. Data rates are low and charges are based on usage. Specialized applications are characteristically designed around short, burst messaging. What is Ad-Hoc mode? A wireless network consists of a number of stations without access points or any connection to a wired network. What is Infrastructure mode? Infrastructure mode implies connectivity to a wired communications infrastructure. If such connectivity is required the Access Points must be used to connect to the wired LAN backbone. Wireless clients have their configurations set for "infrastructure mode" in order to utilize access points for relaying data. How many Access Points are required in a given area? This depends on the surrounding terrain, the diameter of the client population, and the number of clients. If an area is large with dispersed pockets of populations then extension points can be used for extend coverage. What is Direct Sequence Spread Spectrum (DSSS) technology? DSSS spreads its signal continuously over a wide frequency band. DSSS maps the information bearing bit-pattern at the sending station into a higher data rate bit sequence using a "chipping" code. The chipping code (also known as processing gain) introduces redundancy which allows data recovery if certain bit errors occur during transmission. The FCC rules the minimum processing gain should be 10, typical systems use processing gains of 20. IEEE b specifies the use of DSSS. What is Frequency Hopping Spread Spectrum (FHSS) technology? FHSS uses a narrowband carrier which hops through a predefined sequence of several frequencies at a specific rate. This avoids problems with fixed channel narrowband noise and simple jamming. Both transmitter and receiver must have their hopping sequences synchronized to create the effect of a single "logical channel". To an 33

34 unsynchronized receiver an FHSS transmission appears to be short-duration impulse noise may use FHSS or DSSS. Do I need the same kind of antenna on both sides of a link? No. Provided that the antenna is optimally designed for 2.4 GHz or 5 GHz operations. WLAN NICs often include an internal antenna which may provide sufficient reception. What is the 2.4 GHz frequency range? This frequency range has been set aside by the FCC, and is generally labeled the ISM band. A few years ago Apple and several other large corporations requested that the FCC allow the development of wireless networks within this frequency range. What we have today is a protocol and system that allows for unlicensed use of radios within a prescribed power level. The ISM band is populated by Industrial, Scientific and Medical devices that are all low power devices, but can interfere with each other. What is Server Set Identifier (SSID)? SSID is a configurable identification that allows clients to communicate to the appropriate base station. With proper configuration, only clients that are configured with the same SSID can communicate with base stations having the same SSID. SSID from a security point of view acts as a simple single shared password between base stations and clients. What is an ESSID? ESSID stands for Extended Service Set Identifier and identifies the wireless LAN. The ESSID of the mobile device must match the ESSID of the AP to communicate with the AP. The ESSID is an up to 32-character string and is case-sensitive. How do I secure the data across an Access Point's radio link? Enable Wired Equivalency Protocol (WEP) or Wi-Fi Protected Access (WPA) to encrypt the payload of packets sent across a radio link. What is WEP? 34

35 Wired Equivalent Privacy (WEP) is a security mechanism defined within the standard and designed to make the security of the wireless medium equal to that of a cable (wire). WEP data encryption was designed to prevent access to the network by "intruders" and to prevent the capture of wireless LAN traffic through eavesdropping. WEP allows the administrator to define a set of respective "Keys" for each wireless network user based on a "Key String" passed through the WEP encryption algorithm. Access is denied by anyone who does not have an assigned key. WEP comes in 40/64-bit and 128-bit encryption key lengths. Note that WEP was shown to have fundamental flaws in its key generation processing. What is the difference between 40-bit and 64-bit WEP? 40-bit WEP & 64-bit WEP are the same encryption level and can interoperate. The lower level of WEP encryption uses a 40-bit (10 Hex character) as "secret key" (set by user), and a 24-bit "Initialization Vector" (not under user control) (40+24=64). Some vendors refer to this level of WEP as 40-bit, others as 64-bit. What is a WEP key? A WEP key is a user defined string of characters used to encrypt and decrypt data. Can the SSID be encrypted? WEP, the encryption standard for , only encrypts the data packets, not the management packets; however, the SSID is in the beacon and probe management messages. The SSID is not encrypted if WEP is turned on. The SSID is transmitted over the air in clear text. This makes obtaining the SSID easy by sniffing wireless traffic. By turning off the broadcast of SSID, can someone still sniff the SSID? Many APs by default have broadcasting the SSID turned on. Sniffers typically will find the SSID in the broadcast beacon packets. Turning off the broadcast of SSID in the beacon message (a common practice) does not prevent getting the SSID, since the SSID is sent in the clear in the probe 35

36 message when a client associates to an AP. A sniffer just has to wait for a valid user to associate with the network to see the SSID. What are Insertion attacks? The insertion attacks are based on placing unauthorized devices on the wireless network without going through a security process and review. What is a wireless sniffer? An attacker can sniff and capture legitimate traffic. Many of the sniffer tools for Ethernet are based on capturing the first part of the connection session, where the data would typically include the username and password. An intruder can masquerade as that user by using this captured information. An intruder who monitors the wireless network can apply this same attack principle on the wireless. What is the difference between Open System and Shared Key of authentication type? Open System: The default authentication service that simply announces the desire to associate with another station or access point. A station can authenticate with any other station or access point using open system authentication if the receiving station designates open system authentication. Shared Key: The optional authentication that involves a more rigorous exchange of frames, ensuring that the requesting station is authentic. For a station to use shared key authentication, it must implement WEP. What is 802.1x? IEEE 802.1x port-based network access control is an IEEE (Institute of Electrical and Electronics Engineers) standard, which specifies a standard mechanism for authenticating, at the link layer (Layer 2), users' access to IEEE 802 networks such as Ethernet (IEEE 802.3) and Wireless LAN (IEEE ). For IEEE WLAN, IEEE 802.1x authentication can be based on username/password or digital certificate. 36

37 What is the difference between No authentication required, No access allowed and Authentication required? No authentication required disables 802.1X and causes the port to transition to the authorized state without any authentication exchange required. The port transmits and receives normal traffic without 802.1x-based authentication of the client. No access allowed causes the port to remain in the unauthorized state, ignoring all attempts by the client to authenticate. The switch cannot provide authentication services to the client through the interface. Authentication required enables 802.1x and causes the port to begin in the unauthorized state, allowing only EAPOL frames to be sent and received through the port. The authentication process begins when the link state of the port transitions from down to up, or when an EAPOL-start frame is received. The switch requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the switch by using the client's MAC address. What is AAA? AAA is the acronym for Authentication, Authorization, and Accounting and refers to the idea of managing subscribers by controlling their access to the network, verifying that they are who they say they are (via login name and password or MAC address) and accounting for their network usage. What is RADIUS? RADIUS stands for Remote Authentication Dial-In User Service. RADIUS is a standard that has been implemented into several software packages and networking devices. It allows user information to be sent to a central database running on a RADIUS server, where it is verified. RADIUS also provides a mechanism for accounting. What is WPA? WPA (Wi-Fi Protected Access) is a subset of the IEEE i security specification draft. The key difference between WPA and WEP are user 37

38 authentication and improved data encryption. What is WPA-PSK? WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) can be used if users do not have a RADIUS server but still want to benefit from WPA security, because WPA-PSK only requires a single password to be entered on wireless AP/gateway and wireless client. As long as the passwords match, a client will be granted access to the WLAN. What is WPA2? WPA2 (Wi-Fi Protected Access 2) offers a higher security level than WPA, because it introduces an AES-based algorithm and CCMP in it and offers stronger encryption then WPA uses (TKIP). WPA2 encryption keys that are used for each client on the network are unique and specific to that client. Eventually, each packet which is sent over the air is encrypted with a unique key. The higher security is enhanced with the use of a new and unique encryption key because there is no key reuse. 38

ENHWI-N3. 802.11n Wireless Router

ENHWI-N3. 802.11n Wireless Router ENHWI-N3 802.11n Wireless Router Product Description Encore s ENHWI-N3 802.11n Wireless Router s 1T1R Wireless single chip can deliver up to 3x faster speed than of 802.11g devices. ENHWI-N3 supports home

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

DSL-2600U. User Manual V 1.0

DSL-2600U. User Manual V 1.0 DSL-2600U User Manual V 1.0 CONTENTS 1. OVERVIEW...3 1.1 ABOUT ADSL...3 1.2 ABOUT ADSL2/2+...3 1.3 FEATURES...3 2 SPECIFICATION...4 2.1 INDICATOR AND INTERFACE...4 2.2 HARDWARE CONNECTION...4 2.3 LED STATUS

More information

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ

Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Wireless Ethernet LAN (WLAN) General 802.11a/802.11b/802.11g FAQ Q: What is a Wireless LAN (WLAN)? Q: What are the benefits of using a WLAN instead of a wired network connection? Q: Are Intel WLAN products

More information

Cisco RV 120W Wireless-N VPN Firewall

Cisco RV 120W Wireless-N VPN Firewall Cisco RV 120W Wireless-N VPN Firewall Take Basic Connectivity to a New Level The Cisco RV 120W Wireless-N VPN Firewall combines highly secure connectivity to the Internet as well as from other locations

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004 ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.

More information

Nokia Siemens Networks. CPEi-lte 7212. User Manual

Nokia Siemens Networks. CPEi-lte 7212. User Manual Nokia Siemens Networks CPEi-lte 7212 User Manual Contents Chapter 1: CPEi-lte 7212 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the CPEi-lte 7212... 1-2 Back of the CPEi-lte

More information

ECB1220R. Wireless SOHO Router/Client Bridge

ECB1220R. Wireless SOHO Router/Client Bridge Wireless SOHO Router/Client Bridge 2.4GH 802.11 b/g 54Mbps PRODUCT DESCRIPTION ECB-1220R is a 2.4GHz 802.11b/g broadband Wi-Fi Router with advanced AP/Client Bridge/Repeater functions. So you could implement

More information

SBG3300 Series. Support Notes. IPSec VPN and Multiple-WAN Small Business Gateway. (Green Product) January 2013 Edition 1.0

SBG3300 Series. Support Notes. IPSec VPN and Multiple-WAN Small Business Gateway. (Green Product) January 2013 Edition 1.0 SBG3300 Series IPSec VPN and Multiple-WAN Small Business Gateway (Green Product) Support Notes January 2013 Edition 1.0 Content Why use the SBG3300?... 5 Key Application Scenario... 8 Access Application

More information

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses

How To Use A Cisco Wvvvdns4400N Wireless-N Gigabit Security Router For Small Businesses Cisco WRVS4400N Wireless-N Gigabit Security Router Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Cisco RV215W Wireless-N VPN Router

Cisco RV215W Wireless-N VPN Router Data Sheet Cisco RV215W Wireless-N VPN Router Simple, Secure Connectivity for the Small Office and Home Office Figure 1. Cisco RV215W Wireless-N VPN Router The Cisco RV215W Wireless-N VPN Router provides

More information

Unified Services Routers

Unified Services Routers High-Performance VPN Protocols IPSec PPTP L2TP SSL VPN Tunnels Up to 25 (DSR-250N) Up to 35 (DSR-500/500N) Up to 70 (DSR-1000/1000N) SSL VPN tunnels Up to 5 (DSR-250N) Up to 10 (DSR-500/500N) Up to 20

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router Gigabit Multi-Homing VPN Security Router Physical Port 1~2 x 10/100/1000 Base-T RJ-45, configurable with LAN 1 (Mirror Port) 3~4 x 10/100/1000 Base-T RJ-45, configurable with WAN 4 (WAN 4 / LAN2 / DMZ)

More information

UIP1868P User Interface Guide

UIP1868P User Interface Guide UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting

More information

SBG3500-N Series. User s Guide. Quick Start Guide SBG3500-N000 / SBG3500-NB00. Wireless N Fiber WAN Small Business Gateway. Default Login Details

SBG3500-N Series. User s Guide. Quick Start Guide SBG3500-N000 / SBG3500-NB00. Wireless N Fiber WAN Small Business Gateway. Default Login Details SBG3500-N Series SBG3500-N000 / SBG3500-NB00 Wireless N Fiber WAN Small Business Gateway Version 1.00 Edition 4, 9/2014 Quick Start Guide User s Guide Default Login Details LAN IP Address http://192.168.1.1

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

P-870HN-51b. Support Notes. 802.11n VDSL2 4-port Gateway. Firmware Version 1.00(BKK.0)b2 September 2009 Edition 1.0

P-870HN-51b. Support Notes. 802.11n VDSL2 4-port Gateway. Firmware Version 1.00(BKK.0)b2 September 2009 Edition 1.0 P-870HN-51b 802.11n VDSL2 4-port Gateway Support Notes Firmware Version 1.00(BKK.0)b2 September 2009 Edition 1.0 INDEX Application Notes... 5 General Application Notes... 6 Why use P-870HN-51b?... 6 Application

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Wireless-N. User Guide. Broadband Router WRT300N WIRELESS. Model No.

Wireless-N. User Guide. Broadband Router WRT300N WIRELESS. Model No. 2.4 GHz WIRELESS Wireless-N Broadband Router User Guide Model No. WRT300N Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

N300 Wireless ADSL2+ Modem Router DGN2200M Mobile Edition

N300 Wireless ADSL2+ Modem Router DGN2200M Mobile Edition N300 Wireless ADSL2+ Modem Router DGN2200M Mobile Edition User Manual 350 East Plumeria Drive San Jose, CA 95134 USA November 2011 202-10604-02 v1.0 2011 NETGEAR, Inc. All rights reserved No part of this

More information

Unified Services Routers

Unified Services Routers High VPN Performance Protocols IPSec PPTP LTP SSL Up to 5 (DSR-500/500N) or 70 (DSR-1000/1000N) VPN tunnels Up to 10 (DSR-500/500N) or 0 (DSR-1000/1000N) SSL VPN tunnels DES, DES, AES Encryption Main/

More information

ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide

ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide ZyAIR G-2000 Plus 802.11g Wireless 4-port Router Quick Start Guide Version 3.60 3/2005 Table of Contents 1 Introducing the ZyAIR... 3 2 Hardware Connections... 4 2.1 Side Panel and Connections... 4 2.2

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G Access Point with SRX User Guide Model No. WAP54GX Copyright and Trademarks Specifications are subject to change without notice. Linksys

More information

Table of Contents. Wireless Installation Considerations... 10

Table of Contents. Wireless Installation Considerations... 10 Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 6 Hardware Overview...7 Connections... 7 LEDs... 8 Wireless Installation

More information

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers

Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Cisco WRVS4400N Wireless-N Gigabit Security Router: Cisco Small Business Routers Highlights Secure, high-speed wireless network access for small business Gigabit Ethernet connections enable rapid transfer

More information

Wireless Broadband Router. Manual

Wireless Broadband Router. Manual Wireless Broadband Router Manual 1 Introduction... 4 Features... 4 Minimum Requirements... 4 Package Content... 4 Note... 4 Get to know the Broadband Router... 5 Back Panel... 5 Front Panel... 6 Setup

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

VMG1312-B10A Support Notes

VMG1312-B10A Support Notes VMG1312-B10A Support Notes January 2012 Edition 1.0 Index General Application Notes...6 Why use VMG1312-B10A?...6 Application Scenario...8 Prologue...10 Access Application Notes...12 Web GUI...12 Telnet...13

More information

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing

your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Configuring Installing your Gateway Windows network installationguide 802.11b wireless series Router model WBR-100 Installing Configuring Contents 1 Introduction...................................................... 1 Features...........................................................

More information

ESR-9753 802.11b/g/n SOHO Router

ESR-9753 802.11b/g/n SOHO Router ESR-9753 is a 1T1R Wireless Single chip 11N Broadband Router that delivers up to 3x faster speeds than 802.11g devices. ESR-9753 supports home network with superior throughput and performance and unparalleled

More information

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...

More information

Chapter 4 Managing Your Network

Chapter 4 Managing Your Network Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration

More information

Cisco RV110W Wireless-N VPN Firewall

Cisco RV110W Wireless-N VPN Firewall Data Sheet Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1. Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides

More information

VSG1432. User Setup Guide. 802.11n Wireless VDSL2 4-port Gateway. Default Login Details. www.zyxel.com. Firmware Version 1.10 Edition 1, 10/2011

VSG1432. User Setup Guide. 802.11n Wireless VDSL2 4-port Gateway. Default Login Details. www.zyxel.com. Firmware Version 1.10 Edition 1, 10/2011 VSG1432 User Setup Guide 802.11n Wireless VDSL2 4-port Gateway Default Login Details IP Address http://192.168.1.254 Username admin Password telus Firmware Version 1.10 Edition 1, 10/2011 www.zyxel.com

More information

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router

ALLNET ALL-VPN10. VPN/Firewall WLAN-N WAN Router ALLNET ALL-VPN10 VPN/Firewall WLAN-N WAN Router 1~2x100Mbps WAN + 3~4x100Mbps Switch LAN + 2xUSB port+2xwireless Antenna Dual WAN Ports for load balancing Up to 10 IPSec VPN tunnels, VPN Throughput 100Mbps

More information

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual

Wireless LAN Access Point. IEEE 802.11g 54Mbps. User s Manual Wireless LAN Access Point IEEE 802.11g 54Mbps User s Manual Table of Contents Chapter 1 Introduction... 1 1.1 Package Contents...2 1.2 Features...2 1.3 Specifications...2 1.4 Physical Description...3 Chapter

More information

N150 WiFi Router (N150R)

N150 WiFi Router (N150R) Easy, Reliable & Secure N150 WiFi Router (N150R) User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-11000-01 v1.0 Trademarks Brand and product names are trademarks or registered

More information

ESR-9750. (Go Green Series) Wireless-N Broadband Router / AP / Repeater. 2.4 GHz 802.11b/g/n 300 Mbps

ESR-9750. (Go Green Series) Wireless-N Broadband Router / AP / Repeater. 2.4 GHz 802.11b/g/n 300 Mbps PRODUCT DESCRIPTION ESR-9750 is a Wireless 11N Broadband Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. ESR-9750 supports home network with superior throughput

More information

ESR-9752 802.11b/g/n SOHO Router

ESR-9752 802.11b/g/n SOHO Router ESR-9752 is a 2T2R Wireless Single chip 11N Broadband Router that delivers up to 6x faster speeds and 3x extended coverage than 802.11g devices. ESR-9752 supports home network with superior throughput

More information

Overview. Introduction

Overview. Introduction Table of Contents Manual... 1 Overview... 3 Introduction... 3 Package Contents... 4 System Requirements... 4 Hardware Overview... 5 Rear Panel... 5 Front Pannel... 6 Features... 7 Configuration... 8 Log

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Cisco RV220W Network Security Firewall

Cisco RV220W Network Security Firewall Cisco RV220W Network Security Firewall High-Performance, Highly Secure Connectivity for the Small Office The Cisco RV220W Network Security Firewall lets small offices enjoy secure, reliable, wired and

More information

Wireless-N. User Guide. Broadband Router WRT300N (EU/LA) WIRELESS. Model No.

Wireless-N. User Guide. Broadband Router WRT300N (EU/LA) WIRELESS. Model No. 2,4 GHz WIRELESS Wireless-N Broadband Router User Guide Model No. WRT300N (EU/LA) Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark

More information

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy

More information

802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router

802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router 802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router ESR-9753 PRODUCT DESCRIPTION ESR-9753 is a 1T1R Wireless Single chip 11N Broadband Router that delivers up to 3x faster speeds than 802.11g devices.

More information

Prestige 660HW Series. Prestige 660H Series. Compact Guide Version 3.40 September 2004

Prestige 660HW Series. Prestige 660H Series. Compact Guide Version 3.40 September 2004 Prestige 660HW Series ADSL 2+ 4-Port Gateway with 802.11g Wireless Prestige 660H Series ADSL 2+ 4-Port Gateway Compact Guide Version 3.40 September 2004 Table of Contents 1 Introducing the Prestige...4

More information

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker

How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

Linksys WAP300N. User Guide

Linksys WAP300N. User Guide User Guide Contents Contents Overview Package contents 1 Back view 1 Bottom view 2 How to expand your home network 3 What is a network? 3 How to expand your home network 3 Where to find more help 3 Operating

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

P-2812HNU(L)-Fx. Support Notes. 802.11n Wireless VDSL2 VoIP Combo WAN IAD. (Green Product) March 2011 Edition 1.0

P-2812HNU(L)-Fx. Support Notes. 802.11n Wireless VDSL2 VoIP Combo WAN IAD. (Green Product) March 2011 Edition 1.0 P-2812HNU(L)-Fx 802.11n Wireless VDSL2 VoIP Combo WAN IAD (Green Product) Support Notes March 2011 Edition 1.0 1 Content General Application Notes... 5 Why use the P-2812HNU(L)-Fx?... 5 Key Application

More information

CONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router

CONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router CONCEPTRONIC C54BRS4A 802.11g Wireless Broadband Router About This Manual This manual provides descriptions of the Conceptronic C54BRS4A 802.11g Wireless Broadband Router, its hardware and software features,

More information

User Guide. E-Series Routers

User Guide. E-Series Routers User Guide E-Series Routers Table of Contents Table of Contents Product overview E900/E1200/E1500/E2500/E3200 1 Back view 1 Bottom view 1 E4200 2 Top view 2 Back view 2 Setting Up Your E-Series Router

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

User Manual DIR-632. Multifunction Wireless Router Supporting WiMAX, 3G GSM/CDMA with Built-in 8-port Switch

User Manual DIR-632. Multifunction Wireless Router Supporting WiMAX, 3G GSM/CDMA with Built-in 8-port Switch DIR-632 Multifunction Wireless Router Supporting WiMAX, 3G GSM/CDMA with Built-in 8-port Switch October 2011 Contents Chapter 1. Introduction...5 Contents and Audience...5 Conventions...5 Document Structure...5

More information

User Manual. Page 2 of 38

User Manual. Page 2 of 38 DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8

More information

VPN. VPN For BIPAC 741/743GE

VPN. VPN For BIPAC 741/743GE VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,

More information

Chapter 2 Wireless Settings and Security

Chapter 2 Wireless Settings and Security Chapter 2 Wireless Settings and Security This chapter describes how to set up the wireless features of your WGT624 v4 wireless router. In planning your wireless network, select a location for the wireless

More information

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21

2 Setting Up the Hardware for a Wired Ethernet Network... 13. 3 Setting Up the Software for an Ethernet Network... 21 Contents 1 Networking Basics............................................... 1 Selecting a network connection........................................ 2 Wired Ethernet network...........................................

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Table of Contents. Table of Contents

Table of Contents. Table of Contents Table of Contents Product Overview...4 Package Contents...4 System Requirements... 4 Introduction...5 Features... 7 Hardware Overview...8 Connections... 8 LEDs... 9 WPS LED/Button... 10 Installation...11

More information

Contents. Section A Networking Basics... 1. 1 Learning the Basics... 3. Section B Wired Ethernet Networking... 17

Contents. Section A Networking Basics... 1. 1 Learning the Basics... 3. Section B Wired Ethernet Networking... 17 Contents Section A Networking Basics...................................... 1 1 Learning the Basics............................................. 3 Selecting a network connection........................................

More information

ADSL MODEM. User Manual V1.0

ADSL MODEM. User Manual V1.0 ADSL MODEM User Manual V1.0 CONTENTS 1.OVERVIEW... 3 1.1 ABOUT ADSL... 3 1.2 ABOUT ADSL2/2+... 3 1.3 FEATURES... 3 2 SPECIFICATION... 4 2.1 INTERFACE INTRODUCTION... 4 2.1.1 INDICATOR AND INTERFACE...

More information

5GHz 300Mbps 802.11a/n Wireless Outdoor Access Point

5GHz 300Mbps 802.11a/n Wireless Outdoor Access Point 5GHz 300Mbps 802.11a/n Wireless Outdoor Access Point Key Features Wireless LAN & LAN Compliant with IEEE 802.11n wireless technology capable of up to 300Mbps data rate Backward compatible with 802.11a

More information

AC 750. Wireless Dual Band ADSL2+ Modem Router. Highlights

AC 750. Wireless Dual Band ADSL2+ Modem Router. Highlights AC 750 Wireless Dual Band ADSL2+ Modem Router Highlights 750Mbps Wireless Speed 300Mbps on 2.4GHz + 433Mbps on 5GHz Broad Coverage 2 external antennas provide maximum omni-directional wireless coverage

More information

Wireless N ADSL2/2+ Router

Wireless N ADSL2/2+ Router WN-151ARM Wireless 11b/g/n 150Mbps ADSL2/2+ Router he is an all-in-one device T that combines the functions of high-speed DSL modem, router, wireless-n access point and Fast Ethernet switch. It supports

More information

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No.

A Division of Cisco Systems, Inc. GHz 2.4 802.11g. Wireless-G. USB Network Adapter with RangeBooster. User Guide WIRELESS WUSB54GR. Model No. A Division of Cisco Systems, Inc. GHz 2.4 802.11g WIRELESS Wireless-G USB Network Adapter with RangeBooster User Guide Model No. WUSB54GR Copyright and Trademarks Specifications are subject to change without

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

Wireless Cable Gateway CG3100Dv3

Wireless Cable Gateway CG3100Dv3 Wireless Cable Gateway CG3100Dv3 User Manual 350 East Plumeria Drive San Jose, CA 95134 USA October 2011 202-10942-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1

IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320. Management Guide. www.edge-core.com. Software Release v2.0.0.1 IEEE 802.11a/ac/n/b/g Enterprise Access Points ECW5320 ECWO5320 Management Guide Software Release v2.0.0.1 www.edge-core.com Management Guide ECW5320 Indoor Enterprise Access Point IEEE 802.11a/ac/n/b/g

More information

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL

108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL 108Mbps Super-G TM Wireless LAN Router with XR USER MANUAL Contents 1. Overview...1 1.1 Product Feature...1 1.2 System Requirements...1 1.3 Applications...1 2. Getting Start...2 2.1 Know the 108Mbps Wireless

More information

AC 1200. Wireless Dual Band ADSL2+ Modem Router. Highlights

AC 1200. Wireless Dual Band ADSL2+ Modem Router. Highlights AC 1200 Wireless Dual Band ADSL2+ Modem Router Highlights 1200Mbps Wireless Speed 300Mbps on 2.4GHz + 867Mbps on 5GHz Broad Coverage Two external antennas provide maximum omni-directional wireless coverage

More information

Chapter 3 Connecting the Router to the Internet

Chapter 3 Connecting the Router to the Internet Chapter 3 Connecting the Router to the Internet This chapter describes how to set up the router on your Local Area Network (LAN) and connect to the Internet. It describes how to configure your DG834GT

More information

WN-151ARM. Wireless 11b/g/n 150Mbps ADSL2/2+ Router. User s Manual

WN-151ARM. Wireless 11b/g/n 150Mbps ADSL2/2+ Router. User s Manual WN-151ARM Wireless 11b/g/n 150Mbps ADSL2/2+ Router User s Manual Copyright & Disclaimer No part of this publication may be reproduced in any form or by any means, whether electronic, mechanical, photocopying,

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

Quick Installation Guide DSL-2750U/NRU. 3G/ADSL/Ethernet Router with Wi-Fi and Built-in Switch

Quick Installation Guide DSL-2750U/NRU. 3G/ADSL/Ethernet Router with Wi-Fi and Built-in Switch DSL-2750U/NRU 3G/ADSL/Ethernet Router with Wi-Fi and Built-in Switch BEFORE YOU BEGIN Delivery Package Router DSL-2750U/NRU Power adapter RJ-11 telephone cable Straight-through Ethernet cable (CAT 5E)

More information

LW310V2 Sweex Wireless 300N Router

LW310V2 Sweex Wireless 300N Router LW310V2 Sweex Wireless 300N Router Please notice! On the included CD-ROM you will find the Setup Wizard. This easy install procedure will show you how to setup the router step-by-step. Do not expose the

More information

VMG1312-B Series Support Notes VMG1312-B Series Support Notes Jun2012 Edition 1.0 All contents copyright (c) 2012 ZyXEL Communications Corporation.

VMG1312-B Series Support Notes VMG1312-B Series Support Notes Jun2012 Edition 1.0 All contents copyright (c) 2012 ZyXEL Communications Corporation. VMG1312-B Series Support Notes Jun2012 Edition 1.0 Index General Application Notes... 6 Why use VMG1312-B Series?...6 Application Scenario...8 Prologue... 10 Access Application Notes...12 Web GUI... 12

More information

Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2

Wireless-G. User Guide. GHz 2.4 802.11g. A Division of Cisco Systems, Inc. WIRELESS. Model No.WRT54GP2 Your Internet Telephone Company offering you more - connecting you for less A Division of Cisco Systems, Inc. GHz 2.4 802.11g Wireless-G WIRELESS User Guide Model No.WRT54GP2 Copyright and Trademarks Specifications

More information

NBG6816. User s Guide. Quick Start Guide. Simultaneous Dual-Band Wireless AC2350 Ultra HD Media Router. Default Login Details

NBG6816. User s Guide. Quick Start Guide. Simultaneous Dual-Band Wireless AC2350 Ultra HD Media Router. Default Login Details NBG6816 Simultaneous Dual-Band Wireless AC2350 Ultra HD Media Router Version 1.00 Edition 1, 03/2015 Quick Start Guide User s Guide Default Login Details LAN IP http://192.168.1.1 Address (Router Mode)

More information

Unified Services Routers

Unified Services Routers Product Highlights Cost effective multifunction network solution ideal for small businesses High speed router with integrated VPN tunnel support for secure network access from a remote location Policybased

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

User s Guide WI-FI ROUTER HIGHPOWERTM RTA1750 AC1750

User s Guide WI-FI ROUTER HIGHPOWERTM RTA1750 AC1750 User s Guide RTA1750 HIGHPOWERTM AC1750 WI-FI ROUTER CONTENTS INTRODUCTION... 3 GETTING STARTED... 4 Package Contents... 4 LED Indicators... 5 Back Panel Description... 6 BASIC SETUP GUIDE... 7 5.0GHz

More information

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350

USER GUIDE AC2400. DUAL BAND GIGABIT Wi Fi ROUTER. Model# E8350 USER GUIDE AC2400 DUAL BAND GIGABIT Wi Fi ROUTER Model# E8350 Table of Contents Product overview E8350..................................... 1 Setting Up Your E-Series Router Where to find more help.........................

More information

Contents AirTies Documentation

Contents AirTies Documentation Contents AirTies Documentation 1 Manual Overview 1 Safety and Maintenance 1 Installation for Apple Users 1 AirTies Access Points 1 AirTies Network Assistant 3 Minimum System Requirements 3 Installation

More information

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015

WAP3205 v2. User s Guide. Quick Start Guide. Wireless N300 Access Point. Default Login Details. Version 1.00 Edition 2, 10/2015 WAP3205 v2 Wireless N300 Access Point Version 1.00 Edition 2, 10/2015 Quick Start Guide User s Guide Default Login Details Web Address http://zyxelsetup Password www.zyxel.com 1234 Copyright 2014 ZyXEL

More information

Downloaded from www.manualslib.com manuals search engine

Downloaded from www.manualslib.com manuals search engine Copyright and Trademarks Specifications are subject to change without notice. Linksys is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries.

More information

Security Awareness. Wireless Network Security

Security Awareness. Wireless Network Security Security Awareness Wireless Network Security Attacks on Wireless Networks Three-step process Discovering the wireless network Connecting to the network Launching assaults Security Awareness, 3 rd Edition

More information

DV230 Web Based Configuration Troubleshooting Guide

DV230 Web Based Configuration Troubleshooting Guide DV230 Web Based Configuration Troubleshooting Guide 1. Login settings After getting a DHCP IP address from your P1 W1MAX Modem DV-230), open any Internet browser and type in the URL address: http://10.1.1.254

More information

NBG6815. User s Guide. AC2200 MU-MIMO Dual-Band Wireless Gigabit Router. Quick Start Guide. Default Login Details. Version 1.00 Edition 1, 02/2016

NBG6815. User s Guide. AC2200 MU-MIMO Dual-Band Wireless Gigabit Router. Quick Start Guide. Default Login Details. Version 1.00 Edition 1, 02/2016 NBG6815 AC2200 MU-MIMO Dual-Band Wireless Gigabit Router Version 1.00 Edition 1, 02/2016 Quick Start Guide User s Guide Default Login Details LAN IP http://192.168.1.1 Address (Router Mode) www.zyxel.comhttp://192.168.1.2

More information

ADSL 2/2+ Gateway with 802.11g Wireless Compact Guide

ADSL 2/2+ Gateway with 802.11g Wireless Compact Guide Series ADSL 2/2+ Gateway with 802.11g Wireless Compact Guide Version 3.40 March 2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware...4 2.1 Rear Panel Connections...4 2.2 The Front Panel LEDs...5

More information

Wireless-G. GHz 2.4 802.11g. Broadband Router with 2 Phone Ports. Installation and Troubleshooting Guide WRT54GP2. VoIP

Wireless-G. GHz 2.4 802.11g. Broadband Router with 2 Phone Ports. Installation and Troubleshooting Guide WRT54GP2. VoIP A Division of Cisco Systems, Inc. GHz 2.4 802.11g VoIP Wireless-G Broadband Router with 2 Phone Ports Installation and Troubleshooting Guide Model No. WRT54GP2 Copyright and Trademarks Specifications are

More information

P-870H/HW Series. Support Notes. September 2010 Edition 1.0. P-870H/HW Series Support Notes

P-870H/HW Series. Support Notes. September 2010 Edition 1.0. P-870H/HW Series Support Notes P-870H/HW Series Support Notes September 2010 Edition 1.0 1 Index General Application Notes... 6 Why using P-870H/HW Series?... 6 Application Scenario... 7 Prologue... 9 Access Application Notes... 11

More information

P-870HW-I Series Support Notes. P-870HW-I Series. 802.11g Wireless VDSL/VDSL2 4-port Gateway. Support Notes. Version1.1 Oct. 2006

P-870HW-I Series Support Notes. P-870HW-I Series. 802.11g Wireless VDSL/VDSL2 4-port Gateway. Support Notes. Version1.1 Oct. 2006 P-870HW-I Series 802.11g Wireless VDSL/VDSL2 4-port Gateway Support Notes Version1.1 Oct. 2006 All contents copyright 2006 ZyXEL Communications Corporation. 1 FAQ...5 ZyNOS FAQ...5 1. What is ZyNOS?...5

More information

Enterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series

Enterprise Wireless LAN. Key Features. Benefits. Hotspot/Service Gateway Series Key Features Comprehensive Wireless Internet Access Solution Zero Configuration IP Plug and Play Unique Ticket Printer for Easy Service and Accounting Web-based User Authentication, Account Monitoring,

More information

N150 Wireless ADSL2+ Modem Router N150RM

N150 Wireless ADSL2+ Modem Router N150RM Easy, Reliable & Secure N150 Wireless ADSL2+ Modem Router N150RM User Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2012 202-11139-01 v1.0 N150 WiFi Router (N150R) Trademarks Brand and

More information