Home

Wireless LAN Configuration

image

Contents

1. cssssscececeesssesccceeeeeeesescccceeeeeeesescscceeeeeeesssecscceeeeeeesessens 64 2 A EnA EANES 64 Bi A skedata ak eaat a a Ee EA aa E V 64 AL A 64 5 Confidentiality erret eet eres Dex oov e iia 65 SM PREDICT A NS 65 Ze imitation of Lal Vio eres rente tee lecwtoneus vets cencecsonsudscatecounvosswvectecdaaseaveseeteedcvess 65 8 Export Restrictions oa tosdonssecsscacetuotaess 65 A A i EPRE AEE A A E E E e E 65 10 TOFMIN ATION occiso asado ara 65 11 A E 66 lil as 68 GNU GENERAL PUBLIC LICENSE e eeeeeeee eese eee eene nennen senes stets sensns sene senes 68 GNU LESSER GENERAL PUBLIC LICENSE e eeeeeeeeee eene eene nente nnne nn sss tnns asse tnann 72 Customer SUPIERA AA EA 79 Chapter 1 Introduction The Wireless Router is an 802 11n b g compliant Wireless Broadband Router with 4 port Fast Ethernet Switch With the advanced wireless N technology it can support data transmission rates of 6 times more up to 150 Mbps and coverage 3 times more than IEEE 802 11b g devices The Wireless Router enables network sharing via a high speed cable or DSL Internet connection With it you can share a high speed Internet connection files printers and multi player games at incredible speeds without the hassle of laying new wires It also offers easy configuration for your home wireless network
2. If you cannot connect If the Wireless Router does not respond please check the following e Check the Ethernet cable to see if it is connected to the LAN port of the router and the Ethernet port of your computer e The Wireless Router is properly installed LAN connection is OK and it is already powered ON You can test the connection by using the Ping command e Please go to Start gt Run gt Enter cmd command in the column to open the MS DOS window Type the name of a program Folder document or Internet resource and Windows will open it For you Open cmd e Enter the command ping 192 168 1 1 c m SRN FIL C Documents and Settings al 78 7 gt ping 192 168 1 1 Pinging 192 168 1 1 with 32 bytes of data from 192 168 1 1 bytes 32 time 1ms from 192 168 1 1 bytes 32 time lt ims from 192 168 1 1 bytes 32 time lt ims from 192 168 1 1 bytes 32 time lt ims Ping statistics for 192 168 1 1 Packets Sent 4 Received 4 Lost z loss Approximate round trip times in milli seconds Minimum Bms Maximum ims Average Gms If no response is received either the connection is not working or your PC s IP address is not compatible with the Wireless Router s IP Address See next item e If your PC is using a fixed IP address its IP address must be within the range 192 168 1 2 to 192 168 1 253 to be compatible with the Wireless Router s default IP Address of 192 168 1 1 Also th
3. Start your X Windows client Select Control Panel Network Select the Interface entry for your Network card Normally this will be called ethO Click the Edit button set the protocol to DHCP and save this data Ut drug ES To apply your changes Use the Deactivate and Activate buttons if available OR restart your system Other Unix Systems To access the Internet via the Wireless Router Ensure the Gateway field for your network card is set to the IP Address of the Wireless Router Ensure your DNS Name Server settings are correct Wireless Station Configuration e This section applies to all wireless stations wishing to use the Wireless Router s access point regardless of the operating system that is used on the client e To use the Wireless Router each wireless station must have compatible settings as following Mode The mode must be set to Infrastructure SSID ESSID The network name must match the value used on the Wireless Router 57 Note The SSID is case sensitive Disable If there is no security is enabled on the Wireless Router the security of each station should be disabled as well And you can connect the Wireless Router without security but it is NOT recommended WEP By default WEP on the Wireless Router is disabled f WEP remains disabled on the Wireless Router all stations must have WEP disabled f WEP i
4. and click Next Select I connect through a local area network LAN and click Next Ensure all of the boxes on the following Local area network Internet Configuration screen are unchecked Check the No option when prompted Do you want to set up an Internet mail account now Click Finish to close the Internet Connection Wizard Setup is now completed For Windows XP SO a SO OUT EO CO NDS pa Select Start menu Control Panel Network and Internet Connections Select Set up or change your Internet Connection Select the Connection tab and click the Setup button Cancel the pop up Location Information screen Click Next on the New Connection Wizard screen Select Connect to the Internet and click Next Select Set up my connection manually and click Next Check Connect using a broadband connection that is always on and click Next Click Finish to close the New Connection Wizard Setup is now completed Accessing AOL To access AOL America On Line through the Wireless Router the AOL for Windows software must be configured to use TCP IP network access rather than a dial up connection The configuration process is as follows 24 29 Soy Spa 9t T Start the AOL for Windows communication software Ensure that it is Version 2 5 3 0 or later This procedure will not work with earlier versions Click the Setup button Select Create Location and change the location name from New Locality to Wireless
5. Current status of the WPS function Current status of the WPS function the WPS function imas PIN code of the router itself Number Push B T HEBR Click Start PBC button to make a WPS connection with client Configuration Client PIN Enter the client PIN code into the blank field then click the Start PIN Number button to make a WPS connection with client 29 Network Configuration Basic configuration LAN Configurations LAN local area network means when you use this router as the Internet access router gateway all devices Excepts DMZ connect to the LAN ports there are four of them or associate to the WLAN are in the local network LAN Interface Setups This page is used to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IP addresss subnet mask DHCP etc IP Address 192 158 1 1 Subnet Mask 255 255 255 0 Default Gateway 0 0 0 0 DHCP Server W DHCP Client Range 192 166 1 33 _ 192168 1 64 Show Client Static DHCP Set Static DHCP Domain Name Clone MAC Address 000000000000 IP Address Shows the IP address of the Wireless Router Default IP address is 192 168 1 1 Subnet Mask The subnet mask of the Wireless Router Default subnet mask is 255 255 255 0 Default Enter the Internet default gateway LAN IP address in this column Gateway And the default gateway should have a connection with the Inte
6. Only logs related to the DoS protection will be recorded Enable Remote Log Only logs related to the Remote control will be recorded Log Server IP address Only logs related to the server will be recorded Apply Changes After completing the settings on this page click the Apply Changes button to save current settings Refresh Click Refresh button to renew the logs Clear Click Clear button to delete the logs Please allow around 30 seconds for the router to reboot and commence configuration change 48 Time Zone Setting Time Zone Setting You can maintain the system time by synchronizing with a public time server over the Internet CurrentTime Time Zone Select yr 2009 rMn 112 31 17 n o 7 Copy Computer Time GMT 08 00 Pacific Time US and Canada Tijuana v O Enable NTP clientupdate Automatically Adjust Daylight Saving NTP server O Current Time Time Zone Select Enable NTP client update Automatically Adjust Daylight Saving NTP server Manual IP setting Apply Change Reset Refresh Enter the current time of this wireless router or click the Copy Computer Time button to insert the time automatically Select the local time zone from the pull down menu Check to enable NTP Network Time Protocol Server client update function Check the box to enable this function You may choose to select NTP server from the pull down menu or enter an IP address of a specific server manua
7. SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES END OF TERMS AND CONDITIONS All other trademarks or trade names mentioned herein if any are the property of their respective owners This Product includes uclibc 0 9 28 under the LGPL License GNU LESSER GENERAL PUBLIC LICENSE Version 2 1 February 1999 Copyright C 1991 1999 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed This is the first released version of the Lesser GPL It also counts as the successor of the GNU Library Public License version 2 hence the version number 2 1 73 Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public Licenses are intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This license the Lesser General Public License applies to some specially designated software packages typically libraries of the Free Software Foundation and other authors who decide to use it You can use it too but we suggest you first think carefully about whether this license or the ordinary General Public License is the better strategy to use in any particular case based on the explanations below When we speak of free software we a
8. a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If the distribution and or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 9 The Free Software Foundation may publish revised and or new versions of the General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Program specifies a version number of this License which applies to it and any later version you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation If the Program does not specify a version number of this License you may choose any version ever published by the Free Software Foundation 72 10 If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different write to the author to ask for p
9. are disclaimed 2 Ownership You have no ownership rights in the Software Rather you have a license to use the Software as long as this License Agreement remains in full force and effect Ownership of the Software Documentation and all intellectual property rights therein shall remain at all times with ZyXEL Any other use of the Software by any other entity is strictly forbidden and is a violation of this License Agreement 3 Copyright The Software and Documentation contain material that is protected by International Copyright Law and trade secret law and by international treaty provisions All rights not granted to you herein are expressly reserved by ZyXEL You may not remove any proprietary notice of ZyXEL or any of its licensors from any copy of the Software or Documentation 4 Restrictions You may not publish display disclose sell rent lease modify store loan distribute or create derivative works of the Software or any part thereof You may not assign sublicense convey or otherwise transfer pledge as security or otherwise encumber the rights and licenses granted hereunder with respect to the Software Certain components of the Software and third party open source programs included with the Software have been or may be made available by ZyXEL listed in the below Table collectively the Open Sourced Components You may modify or replace only these Open Sourced Components provided that you comply with the terms of t
10. compatible with the Wireless Router s default IP Address of 192 168 1 1 Also the Network Mask should be set to 255 255 255 0 to match the Wireless Router In Windows you can check these settings by using Control Panel Network to check the Properties for the TCP IP protocol nternet Access Problem 1 When I enter a URL or IP address get a time out error Solutlon 1 A number of things could be causing this Try the following troubleshooting steps Checkif other PCs work If they do ensure that your PCs IP settings are correct If using a Fixed Static IP Address check the Network Mask Default gateway and DNS as well as the IP Address Ifthe PCs are configured correctly but still not working check the Wireless 59 Router Ensure that it is connected and ON Connect to it and check its settings If you can t connect to it check the LAN and power connections Ifthe Wireless Router is configured correctly check your Internet connection DSL Cable modem etc to see that it is working correctly Problem 2 Some applications do not run properly when using the Wireless Router Solution 2 The Wireless Router processes the data passing through it so it is not transparent Use the Content Filter Settings feature to allow the use of Internet applications which do not function correctly If this does solve the problem you can use the DMZ function This should wo
11. of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Library In addition mere aggregation of another work not based on the Library with the Library or with a work based on the Library on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may opt to apply the terms of the ordinary GNU General Public License instead of this License to a given copy of the Library To do this you must alter all the notices that refer to this License so that they refer to the ordinary GNU General Public License version 2 instead of to this License If a newer version than version 2 of the ordinary GNU General Public License has appeared then you can specify that version instead if you wish Do not make any other change in these notices Once this change is made in a given copy it is irreversible for that copy so the ordinary GNU General Public License applies to all subsequent copies and derivative works made from that copy This option is useful when you wish to copy part of the code of the Library into a program that is not a library 4 You may copy and distribute the Library or a
12. over other network traffic such as FTP or Web O Enable Bandwidth Management Entries in this table improve your online gaming experience by ensuring that your game traffic is prioritized over other network traffic such as FTP or Web Enable Bandwidth Management 46 Save Reload Settings Save Reload Settings This page allows you save current settings to a file or reload the settings from the file which was saved previously Besides you could reset the current configuration to factory default Load Settings from File ETE Reset Settings to Default Save Settings to File Save Settings to File Click the Save button to save the current settings file to the PC Load Settings form Click the Browse button to find and open the previously saved file File the browser will display the correct file path Then click the Upload button to upload the previous file Therefore restore the specific configuration to the router Reset Settings to Click the Reset button to reset the device back to the default Default settings 47 Logs System Log This page can be used to set remote log server and show the system log O Enable Log O system all O wireless O pos O Enable Remote Log Log Server IP Address Apply Changes Enable Log Check to enable logging function System all Activates all logging functions Wireless Only logs related to the wireless LAN will be recorded DoS
13. portion or derivative of it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange If distribution of object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place satisfies the requirement to distribute the source code even though third parties are not compelled to copy the source along with the object code 5 A program that contains no derivative of any portion of the Library but is designed to work with the Library by being compiled or linked with it is called a work that uses the Library Such a work in isolation is not a derivative work of the Library and therefore falls outside the scope of this License However linking a work that uses the Library with the Library creates an executable that is a derivative of the Library because it contains portions of the Library rather than a work that uses the library The executable is therefore covered by this License Section 6 states terms for distribution of such executables When a work that uses the Library uses material from a header file that is part of the Library the object code for the work may be a derivative work of the Library even though the so
14. someone else and passed on the recipients should know that what they have is not the original version so that the original author s reputation will not be affected by problems that might be introduced by others Finally software patents pose a constant threat to the existence of any free program We wish to make sure that a company cannot effectively restrict the users of a free program by obtaining a restrictive license from a patent holder Therefore we insist that any patent license obtained for a version of the library must be consistent with the full freedom of use specified in this license Most GNU software including some libraries is covered by the ordinary GNU General Public License This license the GNU Lesser General Public License applies to certain designated libraries and is quite different from the ordinary General Public License We use this license for certain libraries in order to permit linking those libraries into non free programs When a program is linked with a library whether statically or using a shared library the combination of the two is legally speaking a combined work a derivative of the original library The ordinary General Public License therefore permits such linking only if the entire combination fits its criteria of freedom The Lesser General Public License permits more lax criteria for linking other code with the library 74 We call this license the Lesser General Public License because it does Les
15. the IP address of the Wireless Router default IP address is 192 168 1 1 Subnet Mask The subnet mask of the Wireless Router degault subnet mask is 255 255 255 0 Step 4 WAN Interface Setup WAN Interface Setup This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point Here you may change the access method to static IP DHCP PPPoE PPTP or L2TP by clickthe item value of WAN Access type WAN Connection Type DHCP Clier ME DHCP Client Type WAN Access Type DHCP Client If the DHCP Client connection is selected the PC will obtain the IP address automatically Static IP WAN Access Type Static IP v IP Address 172114 Subnet Mask 255 255 255 0 Default Gateway 172 1 1 254 DNS If the Static IP is selected the user will have to set up the IP address subnet mask and default gateway according to the ISP Internet Service Provider that provided the related information IP Address Enter the WAN IP address provided by your ISP here Subnet Mask Enter the subnet mask here Default Gateway Enter the default gateway IP address provided by your ISP here DNS Enter the DNS server IP address in the column Please obtain WAN static IP from your ISP should you decide to use static IP PPPoE WAN Access Type PPPoE v User Name Password If the PPPOE is
16. this distribution d If distribution of the work is made by offering access to copy from a designated place offer equivalent access to copy the above specified materials from the same place e Verify that the user has already received a copy of these materials or that you have already sent this user a copy For an executable the required form of the work that uses the Library must include any data and utility programs needed for reproducing the executable from it However as a special exception the materials to be distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable It may happen that this requirement contradicts the license restrictions of other proprietary libraries that do not normally accompany the operating system Such a contradiction means you cannot use both them and the Library together in an executable that you distribute 7 You may place library facilities that are a work based on the Library side by side in a single library together with other library facilities not covered by this License and distribute such a combined library provided that the separate distribution of the work based on the Library and of the other library facilities is otherwise permitted and provided that you do these two things a Accompany the combin
17. your wireless network Security Mode Security mode None M Select desired security type from the pull down menu None WEP WPA TKIP WPA2 AES and WPA2 Mixed The default setting is None It is strongly recommended to set up the security mode WEP WPA TKIP WPA2 AES and WPA2 Mixed to prevent any unauthorized accessing Both your PC and the Wireless Router must have the same settings for security WEP Security mode WEP he Key Length 64 bit Key Format Hex 10 characters Y Key Setting ARARARRARL Key Length select key length 64 bit or 128 bit Key Format Select the Hex 10 characters or ASCII 5 characters e Hexadecimal WEP 64 bits 10 Hex characters 079 a f e Hexadecimal WEP 128 bits 26 Hex characters 0 9 a f e ASCII WEP 64 bits 5 ASCII characters case sensitive e ASCII WEP 128 bits 13 ASCII characters case sensitive Key Setting Enter the key in the key setting field WPA TKIP WPA2 AES WPA2 Mixed Security mode WPA TKIP Y Pre Shared Key Format Passphrase v Pre Shared Key Pre Shared Key Format There are two formats for choosing to set the pre shared key Passphrase and Hex 64 characters If Hex is selected users will have to enter a 64 characters string For easier configuration the Passphrase at least 8 characters format is recommended Pre Shared Key Pre Shared Key serves as a password Users may key in
18. 2 Newlib 1 14 0 and Gcc 3 4 6 under below GPL license GNU GENERAL PUBLIC LICENSE Version 2 June 1991 Copyright C 1989 1991 Free Software Foundation Inc 59 Temple Place Suite 330 Boston MA 02111 1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document but changing it is not allowed Preamble The licenses for most software are designed to take away your freedom to share and change it By contrast the GNU General Public License is intended to guarantee your freedom to share and change free software to make sure the software is free for all its users This General Public License applies to most of the Free Software Foundation s software and to any other program whose authors commit to using it Some other Free Software Foundation software is covered by the GNU Library General Public License instead You can apply it to your programs too When we speak of free software we are referring to freedom not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software or use pieces of it in new free programs and that you know you can do these things 69 To protect your rights we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights These restri
19. 2 168 1 1 Enabled 00 e0 4 81 96 b1 Getting IP from DHCP server 0 0 0 0 0 0 0 0 0 0 0 0 00 e0 4c 51 96 b9 LinkDown 22 Wireless Configuration Basic configuration General Setup General Wireless Setup This page is used to configure the parameters for wireless LAN clients which may connect to your Access Point Here you may change wireless encryption settings as well as wireless network parameters O Disable Wireless LAN Interface Band 2 4 GHz B G N v Mode AP v Network Type Network Name SSID ZyXEL X150N Channel Width 20 40MHz Y Control Sideband Upper Channel selection 11 b Broadcast SSID Enabled Vv Vii Data Rate Auto Y Associated Clients Show Active Clients Enable Mac Clone Single Ethernet Client Disable Wireless Check to disable the wireless function LAN Interface Band You can choose one mode of the following you need 2 4GHz B 802 11b supported rate only 2 4GHz G 802 11g supported rate only 2 4GHz N 802 11n supported rate only 2 4GHz B G 802 11b supported rate and 802 11g supported rate 2 4GHz G N 802 11g supported rate and 802 11n supported rate 2 4GHz B G N 802 11b 802 118 and 802 11n supported rate The default is 2 4GHz B G N mode Mode Only AP mode can be selected Network Type SSID Channel Width Control Sideband Channel Number Broadcast SSID WMM Data Rate Associated Clients Enable Mac Clone Single Ethernet Cli
20. 4 You may not copy modify sublicense or distribute the Program except as expressly provided under this License Any attempt otherwise to copy modify sublicense or distribute the Program is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 5 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Program or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Program or any work based on the Program you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Program or works based on it 6 Each time you redistribute the Program or any work based on the Program the recipient automatically receives a license from the original licensor to copy distribute or modify the Program subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties to this License 7 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limite
21. 8 to 63 characters string if you selected passphrase Pre shared key format is to set the passwords or leave it blank in which the 802 1x Authentication will be activated Make sure the same password is used on the client s end Note it is recommended to use WPA2 encryption for maximum level of protection 20 Password Password Setup This page is used to set the account to access the web server of Access Point Empty user name and password will disable the protection User Name New Password Confirmed Password User Name Key in a new login user name in the blank field New Password Maximum input is 36 alphanumeric characters case sensitive Confirmed Password Key in the password again to confirm 21 Status This page shows the current status and some basic settings of the device System Status Host Name System Up Time Firmware Version Build Time Sys OP Mode System Setting UPnP Wireless Configuration 802 11 Mode Network Name SSID Channel selection Security mode BSSID Associated Clients LAN Configuration Attain IP Protocol IP Address Subnet Mask Default Gateway DHCP Server MAC Address WAN Configuration Attain IP Protocol IP Address Subnet Mask Default Gateway MAC Address WAN Link Status X150N 1day 2h 51m 31s v2 3 Fri Oct 2 19 58 00 CST 2009 Router Mode Enabled 2 4 GHz B G N ZyXEL X150N 11 Disabled 00 e0 4c 51 96 b1 0 Fixed IP 192 158 1 1 255 255 255 0 19
22. 802 11n b g Wireless Broadband Router Model X150N User s Manual version 1 0 About This User s Guide Intended Audience This manual is intended for people who want to configure the NBG 419N using the Web Configurator You should have at least a basic knowledge of TCP IP networking concepts and topology Related Documentation Quick Start Guide The Quick Start Guide is designed to help you get up and running right away It contains information on setting up your network and configuring for Internet access Supporting Disc Refer to the included CD for support documents ZyXEL Web Site Please refer to www zyxel com for additional support documentation and product certifications User Guide Feedback Help us help you Send all User Guide related comments questions or suggestions for improvement to the following address or use e mail instead Thank you SUPPORT E MAIL WEB SITE techwriter zyxel com www zyxel com Safety Warnings e Do NOT use this product near water for example in a wet basement or near a swimming pool e Do NOT expose your device to dampness dust or corrosive liquids Do NOT stack things on the device Do NOT install use or service this device during a thunderstorm There is a remote risk of electric shock from lightning e Connect ONLY suitable accessories to the device Do NOT open the device or unit Opening or removing covers can expose you to dangerous high voltage po
23. AC information 32 WAN Configuration WAN wide area network represents the Inter networks that the WAN port of the router can connect to A correct configuration on WAN port determines whether the local computers can access the Inter network Internet when you use this router as a home router or not The available configurations include e Static IP e DHCP client e PPPoE e PPTP e L2TP Follow the instruction obtained from your ISP to choose one of the protocols above WAN Interface Setup This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point Here you may change the access method to static IP DHCP PPPoE PPTP or L2TP by clickthe item value of WAN Access type WAN Connection Type DHCP Clier v Advanced Configurations Advanced WAN configuration This section explains advanced setting on WAN configurations 33 WAN Interface Setup This page is used to configure the parameters for Internet network which connects to the WAN port of your Access Point Here you may change the access method to static IP DHCP PPPoE PPTP or L2TP by click the item value of WAN Access type WAN Access Type DHCP Client w Host Name attain DNS Automatically Set DNS Manually Factory default Clone the computer s MAC address IP Address O Set WAN NAC Address Enable uPNP WAN Access Type WAN Access Type I
24. E WILL BE CORRECTED OR THAT THE SOFTWARE IS COMPATIBLE WITH ANY PARTICULAR PLATFORM SOME JURISDICTIONS DO NOT ALLOW THE WAIVER OR EXCLUSION OF IMPLIED WARRANTIES SO THEY MAY NOT APPLY TO YOU IF THIS EXCLUSION IS HELD TO BE UNENFORCEABLE BY A COURT OF COMPETENT JURISDICTION THEN ALL EXPRESS AND IMPLIED WARRANTIES SHALL BE LIMITED IN DURATION TO A PERIOD OF THIRTY 30 DAYS FROM THE DATE OF PURCHASE OF THE SOFTWARE AND NO WARRANTIES SHALL APPLY AFTER THAT PERIOD 7 Limitation of Liability IN NO EVENT WILL ZyXEL BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY INCIDENTAL OR CONSEQUENTIAL DAMAGES INCLUDING WITHOUT LIMITATION INDIRECT SPECIAL PUNITIVE OR EXEMPLARY DAMAGES FOR LOSS OF BUSINESS LOSS OF PROFITS BUSINESS INTERRUPTION OR LOSS OF BUSINESS INFORMATION ARISING OUT OF THE USE OF OR INABILITY TO USE THE PROGRAM OR FOR ANY CLAIM BY ANY OTHER PARTY EVEN IF ZyXEL HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ZyXEL s AGGREGATE LIABILITY WITH RESPECT TO ITS OBLIGATIONS UNDER THIS AGREEMENT OR OTHERWISE WITH RESPECT TO THE SOFTWARE AND DOCUMENTATION OR OTHERWISE SHALL BE EQUAL TO THE PURCHASE PRICE BUT SHALL IN NO EVENT EXCEED THE PRODUCT S PRICE BECAUSE SOME STATES COUNTRIES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES THE ABOVE LIMITATION MAY NOT APPLY TO YOU 8 Export Restrictions THIS LICENSE AGREEMENT IS EXPRESSLY MADE SUBJECT TO ANY APPLICABLE LAWS REGULATIONS ORDERS OR OTH
25. ER RESTRICTIONS ON THE EXPORT OF THE SOFTWARE OR INFORMATION ABOUT SUCH SOFTWARE WHICH MAY BE IMPOSED FROM TIME TO TIME YOU SHALL NOT EXPORT THE SOFTWARE DOCUMENTATION OR INFORMATION ABOUT THE SOFTWARE AND DOCUMENTATION WITHOUT COMPLYING WITH SUCH LAWS REGULATIONS ORDERS OR OTHER RESTRICTIONS YOU AGREE TO INDEMNIFY ZyXEL AGAINST ALL CLAIMS LOSSES DAMAGES LIABILITIES COSTS AND EXPENSES INCLUDING REASONABLE ATTORNEYS FEES TO THE EXTENT SUCH CLAIMS ARISE OUT OF ANY BREACH OF THIS SECTION 8 9 Audit Rights ZyXEL SHALL HAVE THE RIGHT AT ITS OWN EXPENSE UPON REASONABLE PRIOR NOTICE TO PERIODICALLY INSPECT AND AUDIT YOUR RECORDS TO ENSURE YOUR COMPLIANCE WITH THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT 10 Termination This License Agreement is effective until it is terminated You may terminate this License Agreement at any time by destroying or returning to ZyXEL all copies of the Software and Documentation in your possession or under your control ZyXEL may terminate this License Agreement for any reason including but not limited to if ZyXEL finds that you have violated any of the terms of this License Agreement Upon notification of termination you agree to destroy or return to ZyXEL all copies of the Software and Documentation and to certify in writing that all known copies including backup copies have been destroyed All provisions relating to confidentiality proprietary rights and non disclosure shall survive the terminat
26. PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE LIBRARY INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCHDAMAGES END OF TERMS AND CONDITIONS Please refer to this URL to get more GPL information http us zyxel com opensource 79 Customer Support Please have the following information ready when you contact customer support Support Email support zyxel com Toll Free 1 800 978 7222 Website www us zyxel com Postal mail Anaheim CA 92806 2001 Product model and serial number Warranty information Date that you received or purchased your device Brief description of the problem including any steps that you have taken before contacting the ZyXEL Customer Support Representative ZyXEL Communications Inc 1130 N Miller Street U S A
27. Router Click Edit Location Select TCP IP for the Network field Leave the Phone Number blank Click Save then OK Configuration is now complete Before clicking Sign On always ensure that you are using the Wireless Router location Macintosh Clients From your Macintosh you can access the Internet via the Wireless Router The procedure is as follows 1 Open the TCP IP Control Panel 2 Select Ethernet from the Connect via pop up menu Select Using DHCP Server from the Configure pop up menu The DHCP Client ID field can be left blank 4 Close the TCP IP panel saving your settings Note If using manually assigned IP addresses instead of DHCP the required changes are 56 Set the Router Address field to the Wireless Router s IP Address e Ensure your DNS settings are correct inux Clients To access the Internet via the Wireless Router it is only necessary to set the Wireless Router as the Gateway Ensure you are logged in as root before attempting any changes Fixed IP Address By default most Unix installations use a fixed IP Address If you wish to continue using a fixed IP Address make the following changes to your configuration Set your Default Gateway to the IP Address of the Wireless Router Ensure your DNS Domain Name server settings are correct To act as a DHCP Client Recommended The procedure below may vary according to your version of Linux and X windows shell
28. SP here Subnet Mask Enter the subnet mask here Server IP Address Enter the L2TP Server IP Address in this column User Name Maximum input is 20 alphanumeric characters case sensitive Password Maximum input is 32 alphanumeric characters case sensitive Step 5 Wireless Basic Settings 5 Wireless Basic Settings This page is used to configure the parameters for wireless LAN clients which may connect to your Access Point Band 24 GHz B G N v Mode AP Network Type Network Name SSID ZyXEL X150N Channel Width 20 40MHz v ControlSideband Upper v Channel selection 11 mM Enable Mac Clone Single Ethernet Client Band Mode Network Type Network Name SSID Channel Width Control Sideband Select 2 4 GHz B G N 2 4 GHz B 2 4 GHz G 2 4 GHz N 2 4 GHz B G and 2 4 GHz G N Only AP mode is available for this model This type here is fixed and cannot be changed because this is a wireless router An SSID is referred to a network name because essentially it is a name that identifies a wireless network Select 20 40MHz or 20MHz for the transmitting band width Select Upper or Lower from pull down menu Channel selection Select 1711 or Auto Select from the pull down menu Step 6 Wireless Security Setup 6 Wireless Security Setup This page allows you setup the wireless security Turn on WEP or WAPA by using Encryption Keys could prevent any unauthorized access to
29. ables RJ45 connectors to connect your PCs LAN 1 4 to this port If required any port can be connected to another hub Any LAN port will automatically function as an Uplink port when necessary Connect the ADSL or Cable Modem here with RJ45 cable If your modem came with a cable use the supplied cable otherwise use a standard LAN cable RJ45 connectors WPS WAN POWER Connect the supplied power adapter here Side Panel O Reset Reset Press the Reset button more than 3 seconds and the Wireless Router will revert to factory default values Chapter 2 About Operation Modes This device provides operational applications with Router and AP modes which are mutually exclusive If you want to change the settings in order to perform more advanced configuration or even change the mode of operation you can select the mode you desire by the manufacturer as described in the following sections The default setting mode is Router mode Operation Mode You can setup different modes to LAN and WLAN interface for NAT and bridging function In this mode the device is supposed to connect to internet via ADSL Cable Modem The NAT is enabled and PCs in LAN ports share the same IP to ISP through WAN port The connection type can be setup in WAN page by using PPPOE DHCP client PPTP client L2TP client or static IP Router Mode In this mode all ethernet ports and wireless interface are bridged together and NAT function i
30. anced CohfiQUratiohs aee diia da 38 Management dpi DR bea ete ate alite is 43 Advanced config rations d ee rette tete eie te rd oth AA teo ea EE ed Hg ente Ps 44 Chapter 4 PC Configuration eee eee eeseeeeeeen einen ener nena nc cnn arrancamos 51 VET E1 assent cia sets A eo telae eene ed eet aee teda ded steer enda 51 WindoWsCllelts irt eo be e ER m RE e n en e RR 51 Macintosh Clients sa nee AI AA a ERREUR 55 DIA CMA SA E REAA A AE AA da 56 Other Uhix SvVst ms A A desee eb eese ta 56 Wireless Station Configuration esesssseses eee tnt tnnt tette tette teen 56 Appendix A Troubleshooting lees esesseeeee ee ete entrent ne tne tn etre ennene 58 OVA ehe ER e M der Cete ere iaa 58 General Problems ett eran n 58 IhternebZ6Cess o eet ee Sie Saat petu eee ur bau m ERN er ee 58 Wireless ACCasS cn e det A A ead tH ated db i n 59 Appendix B About Wireless LANS cccscssessesssesseeceeeeeesceeceeeeesseeeceeseeteesceeeeeteenseeaees 61 BIS IAE e Pu RR EU t De RE RAT ees 61 Chanh els 2 ni et eq obs aede p te eet dt esate We ue d t pes e DR 61 SOU 62 Wireless LAN ConfIQUIallOn ass Rt Re a a eie de redd e Teen 63 oerte va 64 End User License Agreement for X150N ccccssssssseecccccccssssseecccccccnssseeeecccccuasseeeeeeecouaasseeeeeseees 64 1 Grant of License for Personal Use
31. and creates a home wireless network with high functionality security and flexibility 1 Supports the IEEE 802 11n b g standard high speed data rate up to 150Mbps Supports WPS Wi Fi Protected Setup with reset button on the side of the router housing High security with built in security WEP 64 128 WPA WPA2 and 802 11i Supports Router AP WDS Bridge Repeater Advanced Quality of Service QoS WMM Easy configuration for home user setup Physical Details Front LEDs N OREW PWR WPS WLAN WAN LAN1 LAN2 LAN3 LAN4 LED Behavior LED Printed Color Behavior Indication N P POWER O ower on PWR WPS Green OFF Power off WP S m WPS is enabled to make a Blinking connection Wireless WLAN Green OFF WLAN off LAN ON WLAN link active Blinking WLAN traffic transmitting ON WAN link active WAN WAN Green OFF WAN function off Blinking WAN traffic transmitting LAN 1 OFF LAN function off LAN LANZ ig ON LAN link acti LAN 3 reen i active LAN 4 Blinking LAN traffic transmitting Rear Panel WAN POWER Ports and buttons Antenna Install the external antenna here To enable the WPS function via web configuration Go to Wireless Settings gt WPS then press the physical WPS button on the Wireless Router once then the LED will start to flash Please make a connection with other WPS supported device within 2 minutes Use standard LAN c
32. ation the country selection function has been completely removed from all US models The above function is for non US models only 62 WEP WEP Wired Equivalent Privacy is a standard for encrypting data before it is transmitted This is desirable because it is impossible to prevent snoopers from receiving any data which is transmitted by your Wireless Stations But if the data is encrypted then it is meaningless unless the receiver can decrypt it If WEP is used the Wireless Stations and the Access Point must have the same security settings for each of the following WEP 64 Bits 128 Bits For 64 Bits encryption the Key value must match Key For 128 Bits encryption the Key value must match WEP Authentication Open System or Shared Key WPA WPA2 WPA WPA2 Wi Fi Protected Access is more secure than WEP It uses a Shared Key which allows the encryption keys to be regenerated at a specified interval There are several encryption options TKIP AES TKIP AES and additional setup for RADIUS is required in this method The most important features beyond WPA to become standardized through 802 11i WPAQ2 are pre authentication which enables secure fast roaming without noticeable signal latency If WPA or WPA2 is used the Wireless Stations and the Access Point must have the same security settings 802 1x With 802 1x authentication a wireless PC can join any network and receive any message
33. censor to copy distribute link with or modify the Library subject to these terms and conditions You may not impose any further restrictions on the recipients exercise of the rights granted herein You are not responsible for enforcing compliance by third parties with this License 11 If as a consequence of a court judgment or allegation of patent infringement or for any other reason not limited to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Library at all For example if a patent license would not permit royalty free redistribution of the Library by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Library If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sol
34. cord e Make sure the cable system is grounded so as to provide some protection against power surge Federal Communication Commission Interference Statement This equipment has been tested and found to comply with the limits for a Class B digital device pursuant to Part 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference in a residential installation This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instructions may cause harmful interference to radio communications However there is no guarantee that interference will not occur in a particular installation If this equipment does cause harmful interference to radio or television reception which can be determined by turning the equipment off and on the user is encouraged to try to correct the interference by one or more of the following measures O Reorient or relocate the receiving antenna O Increase the separation between the equipment and receiver O Connect the equipment into an outlet on a circuit different from that to which the receiver is needed O Consult the dealer or an experienced radio TV technician for help Warning Changes or modifications to this unit not expressly approved by the party responsible for compliance could void the user authority to operate the equipment This device complies with Part 15 of the FCC Rules Operation is subj
35. ct desired security type from the pull down menu Disable 24 WEP WPA WPA2 and WPA Mixed The default setting is Disable It is strongly recommended to set up a security mode WEP WPA WPA2 and WPA Mixed to prevent any unauthorized access WEP Security mode EP v 802 1x Authentication O Key Length B4 bi v Key Format Hex 10 characters Y Encryption Key ARAARARARA Key Length Select key length 64 bit or 128 bit Key Format Select the default key 174 e Hexadecimal WEP 64 bits 10 Hex characters 079 a f e Hexadecimal WEP 128 bits 26 Hex characters 0 9 a f e ASCII WEP 64 bits 5 ASCII characters case sensitive e ASCII WEP 128 bits 13 ASCII characters case sensitive Encryption Key Enter the key in the Key Setting field WPA Security mode WPA Authentication Mode 9 Personal Pre Shared Key VPA Cipher Suite TKIP O AES Pre Shared Key Format Passphrase v Pre Shared Key Authentication Mode Personal Pre Shared Key WPA Cipher Suite Only AES is supported Pre Shared Key Format There are two formats to choose from to set the Pre shared key Passphrase and Hex 64 characters If Hex is selected users will have to enter a 64 characters string For easier configuration the Passphrase at least 8 characters format is recommended Pre Shared Key Pre Shared Key serves as a password Users may key in 8 to 63 characters string if yo
36. ctions translate to certain responsibilities for you if you distribute copies of the software or if you modify it For example if you distribute copies of such a program whether gratis or for a fee you must give the recipients all the rights that you have You must make sure that they too receive or can get the source code And you must show them these terms so they know their rights We protect your rights with two steps 1 copyright the software and 2 offer you this license which gives you legal permission to copy distribute and or modify the software Also for each author s protection and ours we want to make certain that everyone understands that there is no warranty for this free software If the software is modified by someone else and passed on we want its recipients to know that what they have is not the original so that any problems introduced by others will not reflect on the original authors reputations Finally any free program is threatened constantly by software patents We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses in effect making the program proprietary To prevent this we have made it clear that any patent must be licensed for everyone s free use or not licensed at all The precise terms and conditions for copying distribution and modification follow TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License applies to any progra
37. d to patent issues conditions are imposed on you whether by court order agreement or otherwise that contradict the conditions of this License they do not excuse you from the conditions of this License If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations then as a consequence you may not distribute the Program at all For example if a patent license would not permit royalty free redistribution of the Program by all those who receive copies directly or indirectly through you then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program If any portion of this section is held invalid or unenforceable under any particular circumstance the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims this section has the sole purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and
38. dent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program the distribution of the whole must be on the terms of this License whose permissions for other licensees extend to the entire whole and thus to each and every part regardless of who wrote it Thus it is not the intent of this section to claim rights or contest your rights to work written entirely by you rather the intent is to exercise the right to control the distribution of derivative or collective works based on the Program In addition mere aggregation of another work not based on the Program with the Program or with a work based on the Program on a volume of a storage or distribution medium does not bring the other work under the scope of this License 3 You may copy and distribute the Program or a work based on it under Section 2 in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following a Accompany it with the complete corresponding machine readable source code which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or b Accompany it with a written offer valid for at least three years to give any third party for a charge no more than your cost of physicall
39. e Network Mask must be set to 255 255 255 0 See Chapter 4 PC Configuration for details on checking your PC s TCP IP settings e Ensure that your PC and the Wireless Router are on the same network segment Ensure you are using the wired LAN interface The Wireless interface can only be used if its configuration matches your PC s wireless settings Common Connection Types Cable Modems Type Details ISP Data required Usually none Your IP Address is allocated Dynamic IP t ticall h However some ISP s may require Address automata TI you you to use a particular Hostname connect to your ISP Domain name or MAC physical address Static Fixed IP Address Your ISP allocates a permanent IP address to you IP address allocated to you Some ISP s may also require you to use a particular Hostname Domain name or MAC physical address DSL Modems Type Details ISP Data required Dynamic Your IP address is allocated automatically when you connect None IP Address to your ISP Static Fixed Your ISP allocates a permanent IP address allocated to you IP Address IP address to you You connect to the ISP only when PPPoE required The IP address is usually User name and password allocated automatically Mainly used in Europe You connect to the ISP only PPTP serer IP address PPTP when required The IP address User name and password E usually allocated IP address a
40. e other end to the ADSL or cable modem 3 Finally connect the Wireless Router s power adapter to an outlet LAN WAN POWER DSL Model Figure 8 Login 1 Start your computer and make sure it is connected to your wireless router by an Ethernet cable 2 Start your Web Browser In the address box enter the IP address of the Wireless Router 192 168 1 1 3 Then press the Enter key File Edit View Favorites Tools Help x a e P Search Address http 192 168 1 1 4 After connecting successfully the following screen will appear Simply enter the username admin and password 1234 to login Connect to 192 168 1 1 User name admin Password e Remember my password After logging in successfully please click the Setup Wizard item that provides a primary configuration for this device You may enter each screen to change the default settings step by step Log out Status This page shows the current status and some basic settings of the device System Status Host Name System Up Time Firmware Version Build Time Sys OP Mode System Setting UPnP Wireless Configuration 802 11 Mode Network Name SSID Channel selection Security mode BSSID Associated Clients LAN Configuration X150N Oday Oh 0m 48s v2 3 Fri Oct 2 19 58 00 CST 2009 Router Mode Enabled 2 4 GHz B G N ZyXEL X150N 11 Disabled 00 e0 4 81 96 b1 Ie
41. e problem changing to another channel may show a 60 marked improvement Radio Interference Other devices may be causing interference You can experiment by switching other devices off and see if this helps Any noisy devices should be shielded or relocated RF Shielding Your environment may tend to block transmission between the wireless stations This will mean high access speed is only possible when close to the Wireless Router 61 Appendix B About Wireless LANs BSS A group of Wireless Stations and a single Access Point all using the same ID SSID form a Basic Service Set BSS Using the same SSID is essential Devices with different SSIDs are unable to communicate with each other Channels The Wireless Channel sets the radio frequency used for communication O Access Points use a fixed Channel You can select the Channel used This allows you to choose a Channel which provides the least interference and best performance In the USA and Canada 11 channels are available If using multiple Access Points it is better if adjacent Access Points use different Channels to reduce interference e In Infrastructure mode Wireless Stations normally scan all Channels looking for an Access Point If more than one Access Point can be used the one with the strongest signal is used This can only happen within an ESS Note to US model owner To comply with US FCC regul
42. e purpose of protecting the integrity of the free software distribution system which is implemented by public license practices Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system it is up to the author donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 12 If the distribution and or use of the Library is restricted in certain countries either by patents or by copyrighted interfaces the original copyright holder who places the Library under this License may add an explicit geographical distribution limitation excluding those countries so that distribution is permitted only in or among countries not thus excluded In such case this License incorporates the limitation as if written in the body of this License 13 The Free Software Foundation may publish revised and or new versions of the Lesser General Public License from time to time Such new versions will be similar in spirit to the present version but may differ in detail to address new problems or concerns Each version is given a distinguishing version number If the Library specifies a version number of this License which applies to it and any later version you have the option of following the te
43. ect to the following two conditions 1 this device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation The user s manual or instruction manual for an intentional or unintentional radiator shall caution the user that changes or modifications not expressly approved by the party responsible for compliance could void the user s authority to operate the equipment fa FCC Radiation Exposure Statement e The transmitter must not be co located or operating in conjunction with any other antenna or transmitter e IEEE 802 11b or 802 11g operation of this product in the United States of America is firmware limited to channel 1 through 11 e Tocomply with FCC RF exposure compliance requirements a separation distance of at least 20 cm must be maintained between the antenna of this device and all persons Industry Canada Statement This device complies with RSS 210 of the Industry Canada Rules Operation is subject to the following to two conditions This device may not cause interference and This device must accept any interference including interference that may cause undesired operation of the device This device has been designed to operate with an antenna having a maximum gain of 2 dBi Antenna having a higher gain is strictly prohibited per regulation s of Industry Canada The required antenna impedance is 50 ohms To reduce potent
44. ed library with a copy of the same work based on the Library uncombined with any other library facilities This must be distributed under the terms of the Sections above b Give prominent notice with the combined library of the fact that part of it is a work based on the Library and explaining where to find the accompanying uncombined form of the same work 8 You may not copy modify sublicense link with or distribute the Library except as expressly provided under this License Any attempt otherwise to copy modify sublicense link with or distribute the Library is void and will automatically terminate your rights under this License However parties who have received copies or rights from you under this License will not have their licenses terminated so long as such parties remain in full compliance 77 9 You are not required to accept this License since you have not signed it However nothing else grants you permission to modify or distribute the Library or its derivative works These actions are prohibited by law if you do not accept this License Therefore by modifying or distributing the Library or any work based on the Library you indicate your acceptance of this License to do so and all its terms and conditions for copying distributing or modifying the Library or works based on it 10 Each time you redistribute the Library or any work based on the Library the recipient automatically receives a license from the original li
45. ent Security 23 This is fixed and cannot be changed An SSID is referred to as network name because essentially it is a name that identifies a wireless network If you select 20MHz 40MHz channel width the channel number will be from 5711 and auto If you select 20MHz channel width the channel number will be from 1711 and auto Default is 20MHz 40MHz You can select Lower or Upper form the pull down list The channel number will be based on the channel width you select Enabled This wireless AP will broadcast its SSID to stations Disabled This wireless AP will not broadcast its SSID to stations If stations want to connect to this wireless AP this AP s SSID should be known in advance to make a connection The WiFi Multiple Media function is available under 2 4GHz B 2 4GHz G and 2 4GHz B G band and is disabled under 2 4GHz N 2 4GHz G N and 2 4GHz B G N band There are several data rates that you can select from the pull down menu Click Show Active Clients button to show all the listed active clients This function will be enabled under Client mode it is not supported here Wireless Security Setup This page allows you setup the wireless security Turn on WEP or APA by using Encryption Keys could prevent any unauthorized access to your wireless network Select Network Name SSID Root AP ZyXEL X150N v Security mode Disable w 802 1x Authentication Security Mode Sele
46. er s IP address in the Default gateway field and click OK Your LAN administrator can advise you of the IP Address they assigned to the Wireless Router If the DNS Server fields are empty select Use the following DNS server addresses and enters the DNS address or addresses provided by your ISP then click OK Checking TCP I P Settings Windows XP Select Control Panel Network Connection 2 Right click the Local Area Connection and choose Properties You should see a screen like the following 4 Local Area Connection Properties qe n General vi ivi Authentication amp dvanced Connect using E D Link DFE 530TX PCI Fast Ethernet Adapter rev B This connection uses the following items icrosoft Networks gLSharing for Microsoft Networks acket Sch Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks C Show icon in notification area when connected 3 Select the TCP IP protocol for your network card 4 Click on the Properties button You should then see a screen like the following 54 Internet Protocol TCP IP Properties General Alternate Configuration You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain DNS server address au
47. ermission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 11 BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE PROGRAM TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND OR OTHER PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 12 INNO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER PARTY WHO MAY MODIFY AND OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE BE LIABLE TO YOU FOR DAMAGES INCLUDING ANY GENERAL SPECIAL INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS EVEN IF
48. ertain types of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local network O Enable IP Filtering Loal IP amp ddress Protocol Both Y Comment Current Filter Table Local IP Address Protocol Comment Select Enable IP Filtering Check to enable IP filtering function Local IP Address Enter the local server s IP address Protocol Select the protocol TCP UDP or Both used to the remote system or service Comment You may key in a description for the port range Apply Changes After completing the settings on this page click the Apply Changes button to save the settings Reset Click Reset button to restore to default values Current Filter Table Shows the current IP filter information Delete Selected Click Delete Selected button to delete items which are selected Delete All Click Delete All button to delete all the items Reset Click Reset button to reset to default settings 40 MAC Filtering MAC Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local network O Enable MAC Filtering MAC Address Comment Current Filter Table MAC Address Comment Select Enable MAC Filtering Check to enable MAC filtering function MAC Address Enter the clien
49. f the DHCP Client connection is selected the PC will obtain the IP address automatically Static IP 34 WAN Access Type Static Py IP Address 1721 14 Subnet Mask 255 255 255 0 Default Gateway 172 1 1 254 DNS If the Static IP is selected the user will have to set up the IP address subnet mask and default gateway according to the ISP Internet Service Provider that provided the related information IP Address Enter the WAN IP address provided by your ISP here Subnet Mask Enter the subnet mask here Default Gateway Enter the default gateway IP address provided by your ISP here PPPoE WAN Access Type PPPoE v User Name Password If the PPPoE is selected the user will have to set up the user name and password according to the ISP that provided the related information User Name Enter the username that was given by your ISP provider Maximum input is 32 alphanumeric characters case sensitive Password Enter the password given by your ISP provider Maximum input is 32 alphanumeric characters case sensitive PPTP 35 WAN Access Type PPTP IP Address 1721 12 Subnet Mask 255 255 255 0 Server IP Address 1721141 User Name Password If the PPTP is selected the user will have to set
50. ffer warranty protection in exchange for a fee 2 You may modify your copy or copies of the Program or any portion of it thus forming a work based on the Program and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change 70 b You must cause any work that you distribute or publish that in whole or in part contains or is derived from the Program or any part thereof to be licensed as a whole at no charge to all third parties under the terms of this License c If the modified program normally reads commands interactively when run you must cause it when started running for such interactive use in the most ordinary way to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty or else saying that you provide a warranty and that users may redistribute the program under these conditions and telling the user how to view a copy of this License Exception if the Program itself is interactive but does not normally print such an announcement your work based on the Program is not required to print an announcement These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Program and can be reasonably considered indepen
51. his License and any applicable licensing terms governing use of the Open Sourced Components which have been provided on the License Notice as below for the Software ZyXEL is not obligated to provide any maintenance technical or other support for the resultant modified Software You may not copy reverse engineer decompile reverse compile translate adapt or disassemble the Software or any part thereof nor shall you attempt to create the source code from the object code for the Software Except as and only to the extent expressly permitted in this License by applicable licensing terms governing use of the Open Sourced Components or by applicable law you may not market co brand private label or otherwise permit third parties to link to the Software or any part thereof You may not use the Software or any part thereof in the operation of a service bureau or for the benefit of any other person or entity You may not cause assist or permit any third party to do any of the foregoing Portions of the Software utilize or include third party software and other copyright material Acknowledgements licensing terms and disclaimers for such material are contained in the License Notice as below for the Software and your use of such material is governed by their respective terms ZyXEL has provided as part of the Software package access to certain third party software as a convenience To the extent that the Software contains third party 65 software Z
52. ial radio interference to other users the antenna type and its gain should be so chosen that the EIRP is not more than required for successful communication IMPORTANT NOTE IC Radiation Exposure Statement This equipment complies with IC radiation exposure limits set forth for an uncontrolled environment This equipment should be installed and operated with minimum distance 20 cm between the radiating device and your body Table of Contents Chapter 1 Introduction retener eroe ee ee tt dee Phe e Re OR Vers EA ECHTE S Kaso Fee ERE Eb eG 1 FERRU cP 1 Physical DAS et er ape e eate ine e e O e ene ee 1 Chapter 2 About Operation Modles eee eee eeseeeeneen eene entente nnne 4 Ro ter Mod uso cot e d pa Reate doeet etes 4 ACCESS Point Modein ion A c cai RT aigu Co ERU Gali Lobo Spes 5 Chapter 3 Configuration 5 riis aret entire etsb enenatis eene L eb eee ebe vae Ree arena dign 6 Hardware MOURUIAG iz sue oe torte etie epo OR re dete re debe eb erento cta 6 Hardware Connection te n e te e E eL E te ET C Rete i 7 Kos M E EE 7 SetupWOIZatd co at tue eie antis s eite dedu ees 12 PASSWOLO I dto 20 SIatusi s etm e e aute 21 Wireless COBTIQUIatlonr eae e e ae d a e oid eee des 22 Network Configuration rie e debet erede e E n etel eR eee dnd 29 Firewall Security tede titi te etie aede a vi e e ted deed i et e 37 Adv
53. idge utils 0 9 5 http www linuxfoundation org en Net Bridge dnsmasq 2 33 2 33 http www thekelleys org uk dnsmasq doc html igmpproxy 0 1 http sourceforge net projects igmpproxy iproute2 http devresources linux 2 6 19 2 6 19 foundation org dev iproute2 download iproute2 2 6 19 061214 tar gz iptables 1 3 8 1 3 8 http www netfilter org downloads html ntpclient 2003 194 http doolittle icarus com ntpclient ppp 2 4 2 2 4 2 ftp ftp samba org pub ppp ppp 2 4 2 tar gz pptp client 1 3 1 http pptpclient sourceforge net updatedd 2 5 2 5 http mirror its uidaho edu pub savannah updatedd wireless too Is 25 http Awww hpl hp com personal Jean_Tourrilhes Linux Tools html zebra 0 92a_ripd 0 92 http www zebra org gcc 3 4 6 http gcc gnu org uclibc 0 9 28 http www uclibc org newlib 1 14 0 http sourceware org newlib 67 68 Notice Information herein is subject to change without notice Companies names and data used in examples herein are fictitious unless otherwise noted No part may be reproduced or transmitted in any form or by any means electronic or mechanical for any purpose except the express written permission of ZyXEL Communications Corporation This Product includes Bridge utils 0 9 5 Busybox 1 8 2 Dnsmasq 2 33 Igmpproxy 0 1 Iproute2 2 6 19 Iptables 1 3 8 Linux kernel 2 6 19 Ntpclient 2003_194 Ppp 2 4 2 Pptp client 1 3 1 Updatedd 2 5 Wireless_tools 25 Zebra 0 92a_ripd 0 9
54. ification follow Pay close attention to the difference between a work based on the library and a work that uses the library The former contains code derived from the library whereas the latter must be combined with the library in order to run GNU LESSER GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING DISTRIBUTION AND MODIFICATION 0 This License Agreement applies to any software library or other program which contains a notice placed by the copyright holder or other authorized party saying it may be distributed under the terms of this Lesser General Public License also called this License Each licensee is addressed as you A library means a collection of software functions and or data prepared so as to be conveniently linked with application programs which use some of those functions and data to form executables The Library below refers to any such software library or work which has been distributed under these terms A work based on the Library means either the Library or any derivative work under copyright law that is to say a work containing the Library or a portion of it either verbatim or with modifications and or translated straightforwardly into another language Hereinafter translation is included without limitation in the term modification Source code for a work means the preferred form of the work for making modifications to it For a library complete source code means all the source code for a
55. include the copyright notice for the Library among them as well as a reference directing the user to the copy of this License Also you must do one of these things a Accompany the work with the complete corresponding machine readable source code for the Library including whatever changes were used in the work which must be distributed under Sections 1 and 2 above and if the work is an executable linked with the Library with the complete machine readable work that uses the Library as object code and or source code so that the user can modify the Library and then relink to produce a modified executable containing the modified Library It is understood that the user who changes the contents of definitions files in the Library will not necessarily be able to recompile the application to use the modified definitions b Use a suitable shared library mechanism for linking with the Library A suitable mechanism is one that 1 uses at run time a copy of the library already present on the user s computer system rather than copying library functions into the executable and 2 will operate properly with a modified version of the library if the user installs one as long as the modified version is interface compatible with the version that the work was made with c Accompany the work with a written offer valid for at least three years to give the same user the materials specified in Subsection 6a above for a charge no more than the cost of performing
56. ints or other risks ONLY qualified service personnel should service or disassemble this device Please contact your vendor for further information Make sure to connect the cables to the correct ports e Place connecting cables carefully so that no one will step on them or stumble over them e Always disconnect all cables from this device before servicing or disassembling Use ONLY an appropriate power adaptor or cord for your device Do NOT use the device if the power adaptor or cord is damaged as it might cause electrocution e If the power adaptor or cord is damaged remove it from the power outlet e Do NOT attempt to repair the power adaptor or cord Contact your local vendor to order a new one e Do not use the device outside and make sure all the connections are indoors There is a remote risk of electric shock from lightning e Do NOT obstruct the device ventilation slots as insufficient airflow may harm your device e Antenna Warning This device meets ETSI and FCC certification requirements when using the included antenna s Only use the included antenna s If you mount your device on the wall please make sure there will be no damage to electrical wires gas or water pipes e Connect the power adaptor or cord to the right supply voltage for example 110V in North America or 230VAC in Europe e Do NOT allow anything to rest on the power adaptor or cord and do NOT place the product where anyone can walk on the power adaptor or
57. ion of this Software License Agreement 66 11 General This License Agreement shall be construed interpreted and governed by the laws of Republic of China without regard to conflicts of laws provisions thereof The exclusive forum for any disputes arising out of or relating to this License Agreement shall be an appropriate court or Commercial Arbitration Association sitting in ROC Taiwan This License Agreement shall constitute the entire Agreement between the parties hereto This License Agreement the rights granted hereunder the Software and Documentation shall not be assigned by you without the prior written consent of ZyXEL Any waiver or modification of this License Agreement shall only be effective if it is in writing and signed by both parties hereto If any part of this License Agreement is found invalid or unenforceable by a court of competent jurisdiction the remainder of this License Agreement shall be interpreted so as to reasonably effect the intention of the parties NOTE Some components of this product incorporate source code covered under the open source code licenses To obtain the source code covered under those Licenses please check ZyXEL Technical Support support zyxel com tw to get it Open Sourced Components Open Source Used in Version From Source X150N 3rd party software Linux Kernel 2 6 19 www kernel org busybox 1 8 2 http www busybox net br
58. is disabled When set to enabled user can click Static DHCP button to set the Static DHCP function Domain Name Clone MAC Address 31 Static DHCP Setup This page allows you reserve IP addresses and assign the same IP address to the network device with the specified MAC address any time it requests an IP address This is almost the same as when a device has a static IP address except that the device must still request an IP address from the DHCP server O Enable Static DHCP IP Address MAC Address Comment Apply Changes Static DHCP List IP Address MAC Address Comment Select IP Address Enter the fixed IP address that DHCP Server assigned to a certain connected station MAC Address Enter the MAC address of a certain station and then the DHCP Server will distribute a fixed IP address to the station automatically once they are connected Comment You can enter a comment to describe the above IP address or MAC address Apply Changes After completing the settings on this page click Apply Changes button to save the settings Reset Click Reset to restore default values Static DHCP List Shows the static IP addresses that have been assigned according to the MAC address Delete Selected Click Delete Selected to delete items which are selected Delete All Click Delete All button to delete all the items Reset Click Reset button to rest Enter the Domain Name here This table displays the station M
59. ll modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the library Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running a program using the Library is not restricted and output from such a program is covered only if its contents constitute a work based on the Library independent of the use of the Library in a tool for writing it Whether that is true depends on what the Library does and what the program that uses the Library does 1 You may copy and distribute verbatim copies of the Library s complete source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and distribute a copy of this License along with the Library You may charge a fee for the physical act of transferring a copy and you may at your option offer warranty protection in exchange for a fee 75 2 You may modify your copy or copies of the Library or any portion of it thus forming a work based on the Library and copy and distribute such modifications or work under the terms of Section 1 above provided that you also meet all of these conditions a The modified work must itself be a software library b You mus
60. llocated to you automatically but may be static if static fixed fixed Mainly used in Europe You connect to the ISP only L2TP server IP address L2TP when required The IP address User name and password is usually allocated automatically but may be static fixed IP address allocated to you if static fixed Other Modems e g Broadband Wireless Type Details ISP Data required Your IP address is allocated Vb automatically when you connect to None cdd you ISP Static Fixed Your ISP allocates a permanent P Address IP address to you IP address allocated to you Setup Wizard The setup wizard will guide you to configure access point for first time Please follow the setup wizard step by step Log out Setup Wizard The setup wizard wvill quide you to configure access point for first time Please follow the setup wizard step by step Setup Operation Mode Choose your Time Zone Setup LAN Interface Setup WAN Interface Wireless LAN Setting Wireless Security Setting DARAN Step 1 Operation mode User can select the operation modes here to LAN and WLAN interface for NAT and bridging function 1 Operation Mode You can setup different modes to LAN and ALAN interface for NAT and bridging function Gateway O AP Mode In this mode the device is supposed to connect to internet via ADSL Cable Modem The NAT is enabled and PCs in four LAN ports share
61. lly After completing the settings on this page click Apply Change button to save current settings Click Reset button to restore to default values Click Refresh button to renew current time 49 Upgrade Firmware Upgrade Firmware This page allows you upgrade the Access Point firmware to new version Please note do not power off the device during the upload because it may crash the system Select File Select File Click the Browse button to find and open the firmware file the browser will display to correct file path Upload Click the Upload button to perform Reset Click Reset button to restore to default values Caution 1 Please use Ethernet connection between the PC and the device when you upgrade the firmware 2 Please do not power down the device during the process It will damage the device System Timeout setup Sometimes when you need more time to configure the router you can use this feature to adjust the timeout limit So you don t have to log back into the router every 5 or 10 minutes System Timeout Setup This page is used to setthe web and telnet timeout ofthe idle time when configuring this router Timeout value 160 min 0 means no timeout System Restart Use the Restart button to reboot the device without unplug and plug the power adapter System Restart This page is used to restart Do you want to restart 50 Chapter 4 PC Configuration For each PC the f
62. m or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The Program below refers to any such program or work and a work based on the Program means either the Program or any derivative work under copyright law that is to say a work containing the Program or a portion of it either verbatim or with modifications and or translated into another language Hereinafter translation is included without limitation in the term modification Each licensee is addressed as you Activities other than copying distribution and modification are not covered by this License they are outside its scope The act of running the Program is not restricted and the output from the Program is covered only if its contents constitute a work based on the Program independent of having been made by running the Program Whether that is true depends on what the Program does 1 You may copy and distribute verbatim copies of the Program s source code as you receive it in any medium provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty keep intact all the notices that refer to this License and to the absence of any warranty and give any other recipients of the Program a copy of this License along with the Program You may charge a fee for the physical act of transferring a copy and you may at your option o
63. n to restore to default values Current Filter Table Shows the current URL address filter information Delete Selected Click Delete Selected button to delete items which are selected Delete All Click Delete All button to delete all the items Resat Click Reset button to reset to default settings 38 Advanced Configurations Port Filtering Port Filtering Entries in this table are used to restrict certain types of data packets from your local network to Internet through the Gateway Use of such filters can be helpful in securing or restricting your local network O Enable Port Fittering Port Range 3 Protocol Comment Apply Changes Current Blocked Table Port Range Protocol Comment Select Enable Port Filtering Check to enable this port filtering function For TCP and UDP Services enter the beginning of the range of Pore Range port numbers used by the service If the service uses a single port number enter it in both the start and finish fields Protocol Select the protocol TCP UDP or Both used to the remote system or service Comment You may key in a description for the port range Carte nt Eier Table Shows the current port filter information Click Delete Selected button to delete items which are selected Delete All Click Delete All button to delete all the items Reset Click Reset button to rest Delete Selected 39 IP Filtering IP Filtering Entries in this table are used to restrict c
64. nchanging internet domain name an URL to go with that possibly everchanging IP address O Enable DONS Service Provider Domain Name User Name Email PasswordKey Enable DDNS Check to enable the DDNS function Service Provider Select the desired DDNS Service Provider DynDNS TZO or Oray from the pull down list Domain Name Domain name of the service provider User Name Email Enter your email that you registered on the service provider website You can refer to below Note information to apply an account from the service provider website Password Key Enter your password that you registered on the service provider website Maximum input is 30 alphanumeric characters case sensitive Apply Change After completing the settings on this page click Apply Changes button to save the settings Reset Click Reset button to restore to default values Remote Management 45 Remote Management If enabled this device can be administrated via the internet using your Web Browser with desired port number O Enable Web Server Access via WAN Port Number 30e Server Access Enable Wee Server Check to enable remote control function Access via WAN Port Number Enter the port number in this field Server Access Select LAN WAN LAN or WAN from the pull down menu Bandwidth Management Bandwidth Management Entries in this table improve your online gaming experience by ensuring that your game traffic is prioritized
65. ol Mode Disable f y MAC Address Comment Current Access Control List MAC Address Comment Select Wireless Access Select Allow Listed or Deny Listed form the pull down menu to Control Mode enable access control function Default setting is Disable MAC em Enter the MAC address of a station that is allowed to access this Access Point You may enter up to 20 characters as a remark to the previous MAC address Current Access This table displays the station MAC information Control List Delete Selected Selected Click Delete Selected to delete items which are selected Selected Delete Selected to delete items which are selected delete items which are selected Delete selected All Click Delete All to delete all the items Reset Click Reset to rest 28 WPS Wi Fi Protected Setup This page allows you to change the setting for APS Wi Fi Protected Setup Using this feature could let your wireless client automically syncronize its setting and connect to the Access Point in a minute without any hassle O Disable wes WPS Status Configured UnConfigured Reset to UnConfigured Self PIN Number 96222850 Push Button Configuration Start PBC Apply Changes Client PIN Number Start PIN Disable WPS Check the box to disable the WPS Disable WPS Check the box to disable the WPS function default settingis default setting is Enabled WPSStatus Status Current
66. ollowing may need to be configured TCP IP network settings O Internet access configuration e Wireless configuration Windows Clients e This section describes how to configure Windows clients for Internet access via the Wireless Router e The first step is to check the PC s TCP IP settings e The Wireless Router uses the TCP IP network protocol for all functions so it is essential that the TCP IP protocol be installed and configured on each PC TCP IP Settings Overview If using default Wireless Router settings and default Windows TCP IP settings no changes need to be made By default the Wireless Router will act as a DHCP Server automatically providing a suitable IP address and related information to each PC when the PC boots e For all non server versions of Windows the default TCP IP setting is to act as a DHCP client If using a Fixed specified IP address the following changes are required The Gateway must be set to the IP address of the Wireless Router The DNS should be set to the address provided by your ISP Checking TCP IP Settings Windows 2000 1 Select Control Panel Network and Dial up Connection 2 Right click the Local Area Connection icon and select Properties You should see a screen like the following 52 Local Area Connection Properties 2 x General Connect using Big SMC EZ Card 10 100 SMC1211TX Components checked are used by this c
67. onnection E Client for Microsoft Networks File and Printer Sharing TOf Install Uninstall Description Transmission Control Protocol Internet Protocol The default wide area network protocol that provides communication across diverse interconnected networks Show icon in taskbar when connected OK Cancel 3 Select the TCP IP protocol for your network card 4 Click on the Properties button You should then see a screen like the following Internet Protocol TCP IP Properties i21 x General You can get IP settings assigned automatically if your network supports this capability Otherwise you need to ask your network administrator for the appropriate IP settings Obtain an IP address automatically IP address Subnet mask Default gateway Preferred DNS server Altemate DNS server 5 Ensure your TCP IP settings are correct as described below Using DHCP e To use DHCP select the radio button Obtain an IP Address automatically This is the default Windows setting Using this is recommended By default the Wireless Router will act as a DHCP Server O Restart your PC to ensure it obtains an IP Address from the Wireless Router Using a fixed IP Address Use the following IP Address If your PC is already configured check with your network administrator before making the following changes 53 Enter the Wireless Rout
68. re referring to freedom of use not price Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software and charge for this service if you wish that you receive source code or can get it if you want it that you can change the software and use pieces of it in new free programs and that you are informed that you can do these things To protect your rights we need to make restrictions that forbid distributors to deny you these rights or to ask you to surrender these rights These restrictions translate to certain responsibilities for you if you distribute copies of the library or if you modify it For example if you distribute copies of the library whether gratis or for a fee you must give the recipients all the rights that we gave you You must make sure that they too receive or can get the source code If you link other code with the library you must provide complete object files to the recipients so that they can relink them with the library after making changes to the library and recompiling it And you must show them these terms so they know their rights We protect your rights with a two step method 1 we copyright the library and 2 we offer you this license which gives you legal permission to copy distribute and or modify the library To protect each distributor we want to make it very clear that there is no warranty for the free library Also if the library is modified by
69. rk with almost every application but O It is a security risk since the firewall is disabled e Only one 1 PC can use this feature Wireless Access Problem 1 My PC can t locate the Wireless Router Solution T Check the following Your PCis set to nfrastructure Mode Access Points are always in Infrastructure Mode TheSSID on your PC and the Wireless Router are the same Remember that the SSID is case sensitive So for example Workgroup does NOT match workgroup Both your PC and the Wireless Router must have the same setting for security The default setting for the Wireless Router security is disabled so your wireless station should also have security disabled fsecurity is enabled on the Wireless Router your PC must have security enabled and the key must be matched To see if radio interference is causing a problem see if connection is possible when close to the Wireless Router Remember that the connection range can be as little as 100 feet in poor environments Problem 2 Wireless connection speed is very slow solution 2 The wireless system will connect at the highest possible speed depending on the distance and the environment To obtain the highest possible connection speed you can experiment with the following e Wireless Router location Try adjusting the location and orientation of the Wireless Router e Wireless Channel If interference is th
70. rmation 42 Delete Selected Click Delete Selected button to delete items which are selected Delete All Click Delete All button to delete all the items Reset Click Reset button to rest DMZ A Demilitarized Zone DMZ is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host includes devices Web servers FTP servers SMTP e mail servers and DNS servers You need to enable the DMZ and put the server IP address into the field DMZ A Demilitarized Zone is used to provide Internet services without sacrificing unauthorized access to its local private network Typically the DMZ host contains devices accessible to Internettraffic such as Web HTTP servers FTP servers SMTP e mail servers and DNS servers O Enable Dz DMZ HostIP Address 43 Management Statistics This page displays the packet count of transmission and reception connections on wireless LAN Ethernet LAN ports and Ethernet WAN port Statistics This page shows the packet counters for transmission and reception regarding to wireless and Ethernet networks Wireless LAN Sent Packets Received Packets Ethernet LAN Sent Packets Received Packets Ethernet WAN Sent Packets Received Packets 141058 3855710 28851 11856 21069 12983418 44 Advanced configurations Dynamic DNS Dynamic DNS Setting Dynamic DNS is a service that provides you with a valid u
71. rms and conditions either of that version or of any later version published by the Free Software Foundation If the Library does not specify a license version number you may choose any version ever published by the Free Software Foundation 14 If you wish to incorporate parts of the Library into other free programs whose distribution conditions are incompatible with these write to the author to ask for permission For software which is copyrighted by the Free Software Foundation write to the Free Software Foundation we sometimes make exceptions for this Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally NO WARRANTY 15 BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE THERE IS NO WARRANTY FOR THE LIBRARY TO THE EXTENT PERMITTED BY APPLICABLE LAW EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT 78 HOLDERS AND OR OTHER PARTIES PROVIDE THE LIBRARY AS IS WITHOUT WARRANTY OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE LIBRARY IS WITH YOU SHOULD THE LIBRARY PROVE DEFECTIVE YOU ASSUME THE COST OF ALL NECESSARY SERVICING REPAIR OR CORRECTION 16 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER OR ANY OTHER
72. rnet DHCP O Disable Select to disable this Wireless Router to distribute IP addresses to connected clients DHCP Client Range Show Client Static DHCP 30 Server Select to enable this Wireless Router to distribute IP Addresses DHCP Server to connected clients And the following field will be activated for you to enter the starting IP address The starting address of this local IP network address pool The pool is a piece of continuous IP address segment Keep the default value 192 168 1 33 should work for most cases e Maximum 254 Default value 254 should work for most cases Note If Continuous IP address poll starts is set at 192 168 1 33 and the Number of IP address in pool is 254 the device will distribute IP addresses from 192 168 1 33 to 192 168 1 254 to all the computers in the network that request IP addresses from DHCP server Router Click to show Active DHCP Client Table Active DHCP Client Table Microsoft Internet Explorer provided b DER ej http 192 168 1 1 Active DHCP Client Table This table shows the assigned IP address MAC address and time expired for each DHCP leased client Active DHCP Client List IP Address MAC Address Time Expired s 192 168 1 33 00 15 c5 20 e0 bf 863154 gt Internet 10095 Refresh Click this button to refresh the table Close Click this button to close the window Check the box to enable the Static DHCP function default setting
73. s that are not encrypted however additional setup for RADIUS to issue the WEP key dynamically will be required 63 RADIUS is an authentication authorization and accounting client server protocol The client is a Network Access Server that desires to authenticate its links The server is a server that has access to a user database with authentication information Wireless LAN Configuration To allow Wireless Stations to use the Access Point the Wireless Stations and the Access Point must use the same settings as follows Mode The mode must be set to nfrastructure SSID ESSID The network name must match the value used on the Wireless Router Note The SSID is case sensitive Disable If there is no security is enabled on the Wireless Router the security of each station should be disabled as well And you can connect the Wireless Router without security but it is NOT recommended WEP By default WEP on the Wireless Router is disabled if WEP remains disabled on the Wireless Router all stations must have WEP disabled f WEP is enabled on the Wireless Router each station must use the same settings as the Wireless Router WPA WPA2 WPA Mixed 802 1x RADIUS Server RADIUS is an authentication authorization and accounting client server protocol The client is a Network Access Server that desires to authenticate its links The server is a server that has access to a
74. s disabled All the WAN related function and firewall are not supported Router Mode In this mode the device will connect to the Internet via ADSL Cable Modem The NAT Network Address Translation is enabled and PCs in LAN ports share the same IP to ISP through the WAN port The connection type can be set up in WAN page by using PPPOE DHCP client PPTP client L2TP client or static IP AP Mode UL d jj Router Mode Figure 5 Access Point Mode When acting as an Access Point AP this device connects all the stations PC notebook with wireless network adapter to a wireless network All stations can have Internet access if the Access Point has an Internet connection lt Im oj Figure 6 Chapter 3 Configuration Hardware Mountinc The Wireless Router is designed to be placed on a raised flat surface like a file cabinet or a book shelf The unit may also be converted for mounting to a wall or ceiling 1 There are two mounting hooks on the underside 2 Mark two upper holes on a wall or on a raised flat surface 3 Drill two screws into the flat surface until only 1 4 of the screws are showing 4 Then hang the Wireless Router onto the screws FIILE i Figure 7 Hardware Connection 1 Connect one end of the Ethernet cable to the LAN port of the Wireless Router another end to your PC or notebook 2 Then connect another Ethernet cable one end to the Internet port of the Wireless Router th
75. s enabled on the Wireless Router each station must use the same settings as the Wireless Router WPA WPA2 WPA Mixed 802 1x RADIUS Server RADIUS is an authentication authorization and accounting client server protocol The client is a Network Access Server that desires to authenticate its links The server is a server that has access to a user database with authentication information Each station must set up the RADIUS Server s IP address port and passwords that provided by your ISP Note By default the Wireless Router will allow 802 11b 802 11g and 802 11n connections 58 Appendix A Troubleshooting This chapter covers some common problems that may be encountered while using the Wireless Router and some possible solutions to them If you follow the suggested steps and the Wireless Router still does not function properly contact your dealer for further advice General Problems Problem 1 Can t connect to the Wireless Router to configure it solution 1 Check the following Check the Wireless Router is properly installed LAN connections are OK and it is powered ON Ensure that your PC and the Wireless Router are on the same network segment f your PC is set to Obtain an IP Address automatically DHCP client please restart it Ifyour PC uses a Fixed Static IP address ensure that it is using an IP Address within the range 192 168 1 1 to 192 168 1 253 and thus
76. s to protect the user s freedom than the ordinary General Public License It also provides other free software developers Less of an advantage over competing non free programs These disadvantages are the reason we use the ordinary General Public License for many libraries However the Lesser license provides advantages in certain special circumstances For example on rare occasions there may be a special need to encourage the widest possible use of a certain library so that it becomes a de facto standard To achieve this non free programs must be allowed to use the library A more frequent case is that a free library does the same job as widely used non free libraries In this case there is little to gain by limiting the free library to free software only so we use the Lesser General Public License In other cases permission to use a particular library in non free programs enables a greater number of people to use a large body of free software For example permission to use the GNU C Library in non free programs enables many more people to use the whole GNU operating system as well as its variant the GNU Linux operating system Although the Lesser General Public License is Less protective of the users freedom it does ensure that the user of a program that is linked with the Library has the freedom and the wherewithal to run that program using a modified version of the Library The precise terms and conditions for copying distribution and mod
77. selected the user will have to set up the user name and password according to the ISP that provided the related information User Name Enter the username that was given by your ISP provider Maximum input is 32 alphanumeric characters case sensitive Password Enter the password that was given by your ISP provider Maximum input is 32 alphanumeric characters case sensitive PPTP WAN Access Type IPPP w IP Address 172112 Subnet Mask 255 255 255 0 Server IP Address 172111 User Name Password If the PPTP is selected the user will have to set up the server IP address user name and password according to the ISP that provided the related information IP Address Enter the WAN IP address provided by your ISP here Subnet Mask Enter the subnet mask here Server IP Address Enter the PPTP Server IP Address in this column User Name Maximum input is 20 alphanumeric characters case sensitive Password Maximum input is 32 alphanumeric characters case sensitive L2TP WAN Access Type L2TP v IP Address 1721 1 2 Subnet Mask 255 255 255 0 Server IP Address 172141 1 User Name Password If the L2TP is selected the user will have to set up the server IP address user name and password according to the ISP that provided the related information IP Address Enter the WAN IP address provided by your I
78. t MAC address in the field E You may key in a descriptive MAC address Apply Changes After completing the settings on this page click the Apply Changes button to save the settings 41 Port Forwarding Port Forwarding Entries in this table alow you to automatically redirect common network services to a specific machine behind the NAT firewall These settings are only necessary if you wish to host some sort of server like a web server or mail server on the private local network behind your Gateway s NAT firewall O Enable Port Forwarding IP Address Protocol Port Range E Comment Current Port Forwarding Table Local IP amp ddress Portocol Port Range Comment Select Enable Port Forwarding Check to enable Port Forwarding function IP Address Enter the IP address of the device on the local network in the field Protocol Select the protocol TCP UDP or Both used to the remote system or service Port Range For TCP and UDP Services enter the beginning of the range of port numbers used by the service If the service uses a single port number enter it in both the start and finish fields Comment Make a note in this section to describe the configuration Apply Changes After completing the settings on this page click Apply Changes button to save the settings Reset Click Reset button to restore to default values Current Port Forwarding Shows the current Port Forwarding info
79. t cause the files modified to carry prominent notices stating that you changed the files and the date of any change c You must cause the whole of the work to be licensed at no charge to all third parties under the terms of this License d If a facility in the modified Library refers to a function or a table of data to be supplied by an application program that uses the facility other than as an argument passed when the facility is invoked then you must make a good faith effort to ensure that in the event an application does not supply such function or table the facility still operates and performs whatever part of its purpose remains meaningful For example a function in a library to compute square roots has a purpose that is entirely well defined independent of the application Therefore Subsection 2d requires that any application supplied function or table used by this function must be optional if the application does not supply it the square root function must still compute square roots These requirements apply to the modified work as a whole If identifiable sections of that work are not derived from the Library and can be reasonably considered independent and separate works in themselves then this License and its terms do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Library the distribution of the whole must be on the terms
80. the same IP to ISP through WAN port The connection type can be setup in WAN page by using PPPOE DHCP client PPTP client static IP or L2TP In this mode all ethernet ports and wireless interface are bridged together and NAT function is disabled All the WAN related function and firewall are not supported Step 2 Time Zone Setting Time Zone Setting You can maintain the system time by synchronizing with a publictime server over the Internet yr 2009 hemn m v 55 CurrentTime E E Pii Copy Computer Time Time Zone Select GMT 08 00 Pacific Time US and Canada Tijuana vl O Enable NTP clientupdate Automatically Adjust Daylight Saving NTP server O NTP Settings Enable NTP client update Check the box to synchronize the time with the host PC Automatically Adjust Daylight Saving Check the box to automatically adjust to daylight saving time Time Zone Select the time zone area where you are located from the pull down list NTP Server Enter the Network Time Protocol Server here Ex time nist gov ntpO broad mit edu or time stdtime gov tw Step 3 LAN I nterface Setup 3 LAN Interface Setup This page is used to configure the parameters for local area network which connects to the LAN port of your Access Point Here you may change the setting for IP addresss subnet mask DHCP etc IP Address 182168 4 4 Subnet Mask 255 255 255 D IP Address Shows
81. tically or select Set DNS Manually to set the DNS server IP address at the following DNS 173 columns Default setting is Attain DNS Automatically Enter the DNS server IP address es provided by your ISP or you can specify your own preferred DNS server IP address es DNS 2 server is optional You can enter another DNS server s IP address as a backup DNS 2 server will be used when the DNS 1 server fails Your ISP may require a particular MAC address in order for you to connect to the Internet This MAC address is the PC s MAC address that your ISP had originally connected your Internet connection to Type in this Clone MAC address in this section to replace the WAN MAC address with the MAC address of that PC Check to enable the listed functions After completing the settings on this page click Apply Changes button to save the settings Click Reset to restore to default values 37 Firewall Securi Basic configuration Domain name filter URL Filtering URL filter is used to deny LAN users from accessing the internet Block those URLs which contain keywords listed below O Enable URL Filtering URL Address Apply Changes Current Filter Table URL Address Select Enable URL Filtering Check the box to enable URL filtering function URL AQUrES Enter the URL address in the field Apply Changes After completing the settings on this page click Apply Changes button to save the settings Reset Click Reset butto
82. tomaticall vel addresses 5 Ensure your TCP IP settings are correct Using DHCP e To use DHCP select the radio button Obtain an IP Address automatically This is the default Windows setting Using this is recommended By default the Wireless Router will act as a DHCP Server O Restart your PC to ensure it obtains an IP address from the Wireless Router Using a fixed IP Address Use the following IP Address If your PC is already configured check with your network administrator before making the following changes In the Default gateway field enter the Wireless Router s IP address and click OK Your LAN administrator can advise you of the IP Address they assigned to the Wireless Router If the DNS Server fields are empty select Use the following DNS server addresses and enters the DNS address or addresses provided by your ISP then click OK Internet Access To configure your PCs to use the Wireless Router for Internet access Ensure that the ADSL modem DSL modem Cable modem or other permanent connection is functional Use the following procedure to configure your Browser to access the Internet via the LAN rather than by a Dial up connection For Windows 2000 1 2 Select Start menu Settings Control Panel Internet Options Select the Connection tab and click the Setup button 55 Select I want to set up my Internet connection manually or want to connect through a local area network LAN
83. u selected passphrase Pre shared key format to set the passwords or leave it blank in which the 802 1x Authentication will be activated Make sure the same password is used on the client s end 25 WPA2 Security mode WPA2 v Authentication Mode 9 Personal Pre Shared Key WPA2 Cipher Suite TKIP AES Pre Shared Key Format Passphrase v Pre Shared Key Authentication Mode Personal Pre Shared Key WPA2 Cipher Suite Only AES is supported Pre Shared Key Format There are two formats from which to choose to set the Pre shared key Passphrase and Hex 64 characters If Hex is selected users will have to enter a 64 characters string For easier configuration the Passphrase at least 8 characters format is recommended Pre Shared Key Pre Shared Key serves as a password Users may key in 8 to 63 characters string if you selected passphrase Pre shared key format to set the passwords or leave it blank in which the 802 1x Authentication will be activated Make sure the same password is used on the client s end PA Mixed Security mode WPA Mixed W Authentication Mode Personal Pre Shared Key WPA Cipher Suite TKIP O AES WP42 Cipher Suite TKIP AES Pre Shared Key Format Passphrase w Pre Shared Key Authentication Mode Personal Pre Shared Key WPA Cipher Suite Only AES is supported WPA2 Cipher Suite Only AES is supported Pre Shared Key Format There are two formats from
84. up the server IP address user name and password according to the ISP that provided the related information IP Address Enter the WAN IP address provided by your ISP here Subnet Mask Enter the subnet mask here Server IP Address Enter the PPTP Server IP Address in this column User Name Maximum input is 20 alphanumeric characters case sensitive Password Maximum input is 32 alphanumeric characters case sensitive WAN Access Type L2TP v IP Address 1721412 Subnet Mask 255 255 255 0 Server IP Address 172114 User Name Password If the L2TP is selected the user will have to set up the server IP address user name and password according to the ISP that provided the related information Host Name Attain DNS Automatically Set DNS Manually DNS 1 DNS 2 Factory Default Clone the computer s MAC address IP Address Set WAN MAC Address Enable uPNP Apply Changes Reset 36 IP Address Enter the WAN IP address provided by your ISP here Subnet Mask Enter the subnet mask here Server IP Address Enter the L2TP Server IP Address in this column User Name Maximum input is 20 alphanumeric characters case sensitive Password Maximum input is 32 alphanumeric characters case sensitive Enter the host name in this field Select Attain DNS Automa
85. urce code is not Whether this is true is especially significant if the work can be linked without the Library or if the work is itself a library The threshold for this to be true is not 76 precisely defined by law If such an object file uses only numerical parameters data structure layouts and accessors and small macros and small inline functions ten lines or less in length then the use of the object file is unrestricted regardless of whether it is legally a derivative work Executables containing this object code plus portions of the Library will still fall under Section 6 Otherwise if the work is a derivative of the Library you may distribute the object code for the work under the terms of Section 6 Any executables containing that work also fall under Section 6 whether or not they are linked directly with the Library itself 6 As an exception to the Sections above you may also combine or link a work that uses the Library with the Library to produce a work containing portions of the Library and distribute that work under terms of your choice provided that the terms permit modification of the work for the customer s own use and reverse engineering for debugging such modifications You must give prominent notice with each copy of the work that the Library is used in it and that the Library and its use are covered by this License You must supply a copy of this License If the work during execution displays copyright notices you must
86. user database with authentication information Each station must set up the RADIUS Server s IP address port and passwords that provided by your ISP 64 Open Source End User License Agreement for X150N WARNING ZyXEL Communications Corp IS WILLING TO LICENSE THE SOFTWARE TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS LICENSE AGREEMENT PLEASE READ THE TERMS CAREFULLY BEFORE COMPLETING THE INSTALLATION PROCESS AS INSTALLING THE SOFTWARE WILL INDICATE YOUR ASSENT TO THEM IF YOU DO NOT AGREE TO THESE TERMS THEN ZyXEL IS UNWILLING TO LICENSE THE SOFTWARE TO YOU IN WHICH EVENT YOU SHOULD RETURN THE UNINSTALLED SOFTWARE AND PACKAGING TO THE PLACE FROM WHICH IT WAS ACQUIRED OR ZyXEL AND YOUR MONEY WILL BE REFUNDED 1 Grant of License for Personal Use ZyXEL Communications Corp ZyXEL grants you a non exclusive non sublicense non transferable license to use the program with which this license is distributed the Software including any documentation files accompanying the Software Documentation for internal business use only for up to the number of users specified in sales order and invoice You have the right to make one backup copy of the Software and Documentation solely for archival back up or disaster recovery purposes You shall not exceed the scope of the license granted hereunder Any rights not expressly granted by ZyXEL to you are reserved by ZyXEL and all implied licenses
87. which to choose to set the Pre shared key Passphrase and Hex 64 characters If Hex is selected users will have to enter a 64 characters string For easier configuration the Passphrase at least 8 characters format is recommended Pre Shared Key Pre Shared Key serves as a password Users may key in 8 to 63 characters string if you selected passphrase Pre shared key format to set the passwords or leave it blank in which the 802 1x Authentication will be activated Make sure the same password is used on the client s end 26 Advanced configurations Advanced Settings Wireless Advanced Settings These settings are only for more technically advanced users who have a sufficient knowledge about wireless LAN These settings should not be changed unless you know what effect the changes will have on your Access Point RF Output Power O 100 Or Oso O35 O15 RF Output Select the transmitting power rate 100 70 50 35 15 Power selecting lower output power setting will reduce the interference to other Wi Fi router in the same area However it also reduce the coverage of this router 27 Access Control Wireless Access Control If you choose Allowed Listed only those clients whose wireless MAC addresses are in the access control list will be able to connect to your Access Point When Deny Listed is selected these wireless clients on the list will not be able to connect the Access Point Wireless Access Contr
88. y performing source distribution a complete machine readable copy of the corresponding source code to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange or c Accompany it with the information you received as to the offer to distribute corresponding source code This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer in accord with Subsection b above The source code for a work means the preferred form of the work for making modifications to it For an executable work complete source code means all the source code for all modules it contains plus any associated interface definition files plus the scripts used to control compilation and installation of the executable However as a special exception the source code distributed need not include anything that is normally distributed in either source or binary form with the major components compiler kernel and so on of the operating system on which the executable runs unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place then offering equivalent access to copy the source code from the same place counts as distribution of the source code even though third parties are not compelled to copy the source along with the object code 71
89. yXEL has no express or implied obligation to provide any technical or other support for such software Please contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products 5 Confidentiality You acknowledge that the Software contains proprietary trade secrets of ZyXEL and you hereby agree to maintain the confidentiality of the Software using at least as great a degree of care as you use to maintain the confidentiality of your own most confidential information You agree to reasonably communicate the terms and conditions of this License Agreement to those persons employed by you who come into contact with the Software and to use reasonable best efforts to ensure their compliance with such terms and conditions including without limitation not knowingly permitting such persons to use any portion of the Software for the purpose of deriving the source code of the Software 6 No Warranty THE SOFTWARE IS PROVIDED AS IS TO THE MAXIMUM EXTENT PERMITTED BY LAW ZyXEL DISCLAIMS ALL WARRANTIES OF ANY KIND EITHER EXPRESSED OR IMPLIED INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ZyXEL DOES NOT WARRANT THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET ANY REQUIREMENTS OR NEEDS YOU MAY HAVE OR THAT THE SOFTWARE WILL OPERATE ERROR FREE OR IN AN UNINTERUPTED FASHION OR THAT ANY DEFECTS OR ERRORS IN THE SOFTWAR

Download Pdf Manuals

image

Related Search

Related Contents

    Tripp Lite Smart Pro Line Interactive Rack/Tower UPS  KOHLER K-3467-47 Installation Guide  Bâti de charge série 370 Informations produit  VITHEA - INESC-ID  Instruction Manual  Clarion CAA-185-200 User's Manual  Samsung P2 2GB Black Benutzerhandbuch  Mode d`emploi  

Copyright © All rights reserved.
Failed to retrieve file