User Guide
Page 62
...Apply for the DDNS type. 2c Type zyxelrouter.dyndns.org in the Host Name field. 2d Enter the user name (UserName1) and password (12345). 62 P-660HW-Tx v3 Series User's Guide Chapter 4 Tutorials • Adding a Firewall Rule for Remote Management • Testing the DDNS Setting Note: If ...the same account and host name on the ZyXEL Device later. 4.6.2 Configuring DDNS on Your ZyXEL Device 1 Log into the ZyXEL Device's advanced mode. 2 Configure the following settings as the username and password. 3 Log into www.dyndns.org using your ZyXEL Device is currently using. This tutorial uses ...
...Apply for the DDNS type. 2c Type zyxelrouter.dyndns.org in the Host Name field. 2d Enter the user name (UserName1) and password (12345). 62 P-660HW-Tx v3 Series User's Guide Chapter 4 Tutorials • Adding a Firewall Rule for Remote Management • Testing the DDNS Setting Note: If ...the same account and host name on the ZyXEL Device later. 4.6.2 Configuring DDNS on Your ZyXEL Device 1 Log into the ZyXEL Device's advanced mode. 2 Configure the following settings as the username and password. 3 Log into www.dyndns.org using your ZyXEL Device is currently using. This tutorial uses ...
User Guide
Page 85
... Auto Detection: Failed P-660HW-Tx v3 Series User's Guide 85 Then click Next and see Section 5.3 on how to Section 5.2.1 on page 86 on page 92 for Internet access. Chapter 5 Internet and Wireless Setup Wizard 3b The following screen appears if the ZyXEL device detects a connection ...but not the connection type. Click Next and refer to manually configure the ZyXEL Device for wireless connection wizard setup. Enter your Internet account information (username, password and/or service name) exactly as provided by your ISP. Figure 15 Auto-Detection: PPPoE 3c The...
... Auto Detection: Failed P-660HW-Tx v3 Series User's Guide 85 Then click Next and see Section 5.3 on how to Section 5.2.1 on page 86 on page 92 for Internet access. Chapter 5 Internet and Wireless Setup Wizard 3b The following screen appears if the ZyXEL device detects a connection ...but not the connection type. Click Next and refer to manually configure the ZyXEL Device for wireless connection wizard setup. Enter your Internet account information (username, password and/or service name) exactly as provided by your ISP. Figure 15 Auto-Detection: PPPoE 3c The...
User Guide
Page 91
.... Apply Click this screen. Figure 23 Connection Test Failed-2. Table 14 Internet Connection with the user name above. Click Back to Username and Password setup to go back to the screen where you entered for PPPoE or PPPoA connection are not correct, the screen displays as shown...Click this to return to the previous screen without saving. • If the user name and/or password you can modify them. P-660HW-Tx v3 Series User's Guide 91 Password Enter the password associated with PPPoA LABEL DESCRIPTION User Name Enter the login name that your ISP gives you. Chapter 5 ...
.... Apply Click this screen. Figure 23 Connection Test Failed-2. Table 14 Internet Connection with the user name above. Click Back to Username and Password setup to go back to the screen where you entered for PPPoE or PPPoA connection are not correct, the screen displays as shown...Click this to return to the previous screen without saving. • If the user name and/or password you can modify them. P-660HW-Tx v3 Series User's Guide 91 Password Enter the password associated with PPPoA LABEL DESCRIPTION User Name Enter the login name that your ISP gives you. Chapter 5 ...
User Guide
Page 100
... background information on the network). There are transmitted in a Multicast group - It can be static (fixed) or dynamically assigned by the ZyXEL Device to carry user data. IGMP IGMP (Internet Group Multicast Protocol) is not used to a group of hosts on the network - ...either two ways - Chapter 6 WAN Setup they should also provide a username and password (and service name) for user authentication. Multicast delivers IP packets to establish membership in one . If your ISP. 100 P-660HW-Tx v3 Series User's Guide WAN IP Address The WAN IP address is still ...
... background information on the network). There are transmitted in a Multicast group - It can be static (fixed) or dynamically assigned by the ZyXEL Device to carry user data. IGMP IGMP (Internet Group Multicast Protocol) is not used to a group of hosts on the network - ...either two ways - Chapter 6 WAN Setup they should also provide a username and password (and service name) for user authentication. Multicast delivers IP packets to establish membership in one . If your ISP. 100 P-660HW-Tx v3 Series User's Guide WAN IP Address The WAN IP address is still ...
User Guide
Page 143
... Mode field. WPA Compatible This check box is 1800 seconds (30 minutes). Type a pre-shared key from 8 to display the AP screen. P-660HW-Tx v3 Series User's Guide 143 Note: If wireless station authentication is done using WPA2-PSK or WPA2. The encryption mechanisms used for WPA(2) and WPA(2)-PSK... WPA wireless clients be able to configure and enable WPA(2)-PSK authentication. Pre-Shared Key Select the check box to have to resend usernames and passwords in this screen to communicate with the ZyXEL Device even when the ZyXEL Device is that WPA(2)-PSK uses a simple common...
... Mode field. WPA Compatible This check box is 1800 seconds (30 minutes). Type a pre-shared key from 8 to display the AP screen. P-660HW-Tx v3 Series User's Guide 143 Note: If wireless station authentication is done using WPA2-PSK or WPA2. The encryption mechanisms used for WPA(2) and WPA(2)-PSK... WPA wireless clients be able to configure and enable WPA(2)-PSK authentication. Pre-Shared Key Select the check box to have to resend usernames and passwords in this screen to communicate with the ZyXEL Device even when the ZyXEL Device is that WPA(2)-PSK uses a simple common...
User Guide
Page 144
... is 3600 seconds (or 1 hour). The wireless station needs to enter the username and password again before access to display the AP screen. Figure 50 Network > Wireless LAN > AP: WPA(2) 144 P-660HW-Tx v3 Series User's Guide Select WPA, WPA2 or WPAMixed from the wired network after ...a period of automatically changing the WEP key for an AP and all clients. Chapter 8 Wireless LAN Table 32 Network > Wireless LAN > AP: WPA(2)-PSK LABEL DESCRIPTION Idle Timeout The ZyXEL Device ...
... is 3600 seconds (or 1 hour). The wireless station needs to enter the username and password again before access to display the AP screen. Figure 50 Network > Wireless LAN > AP: WPA(2) 144 P-660HW-Tx v3 Series User's Guide Select WPA, WPA2 or WPAMixed from the wired network after ...a period of automatically changing the WEP key for an AP and all clients. Chapter 8 Wireless LAN Table 32 Network > Wireless LAN > AP: WPA(2)-PSK LABEL DESCRIPTION Idle Timeout The ZyXEL Device ...
User Guide
Page 145
...to resend usernames and passwords in order to communicate with additional information. The key must be shared between 10 and 9999 seconds. Chapter 8 Wireless LAN The following table describes the wireless LAN security labels in this value unless your ZyXEL Device. Idle Timeout The ZyXEL Device ... key is 1800 seconds (30 minutes). P-660HW-Tx v3 Series User's Guide 145 ReAuthentication Timer Specify how often wireless stations have both WPA-PSK and WPA wireless clients be able to stay connected. Shared Secret Enter a password (up to 31 alphanumeric characters) as the...
...to resend usernames and passwords in order to communicate with additional information. The key must be shared between 10 and 9999 seconds. Chapter 8 Wireless LAN The following table describes the wireless LAN security labels in this value unless your ZyXEL Device. Idle Timeout The ZyXEL Device ... key is 1800 seconds (30 minutes). P-660HW-Tx v3 Series User's Guide 145 ReAuthentication Timer Specify how often wireless stations have both WPA-PSK and WPA wireless clients be able to stay connected. Shared Secret Enter a password (up to 31 alphanumeric characters) as the...
User Guide
Page 158
...Threshold If this value is not very busy. 8.8.3 Wireless Security Overview By their nature, radio communications are given the code key. 158 P-660HW-Tx v3 Series User's Guide For these reasons, a variety of each other's presence. The lower the value, the more often the devices must ... over the airwaves, but also join the network. A preamble affects the timing in the ZyXEL Device's Web Configurator. By setting this means that only people presenting the right credentials (often a username and password, or a "key" phrase) can not only read the data passing over the air ...
...Threshold If this value is not very busy. 8.8.3 Wireless Security Overview By their nature, radio communications are given the code key. 158 P-660HW-Tx v3 Series User's Guide For these reasons, a variety of each other's presence. The lower the value, the more often the devices must ... over the airwaves, but also join the network. A preamble affects the timing in the ZyXEL Device's Web Configurator. By setting this means that only people presenting the right credentials (often a username and password, or a "key" phrase) can not only read the data passing over the air ...
User Guide
Page 318
... page 316 to exit the ftp prompt. 318 P-660HW-Tx v3 Series User's Guide Similarly, "put " to transfer files from the computer to upload firmware and configuration files. The following sections give examples of your device. 3 Press [ENTER] when prompted for a username. 4 Enter your password as this feature, your computer must have an FTP...
... page 316 to exit the ftp prompt. 318 P-660HW-Tx v3 Series User's Guide Similarly, "put " to transfer files from the computer to upload firmware and configuration files. The following sections give examples of your device. 3 Press [ENTER] when prompted for a username. 4 Enter your password as this feature, your computer must have an FTP...
User Guide
Page 320
name of the firmware on the computer) to the file destination on the device). name of your ZyXEL Device. 3 Press [ENTER] when prompted for a username. 4 Enter your computer and renames it "config.rom". TFTP Upload Command Example The following is "1234"). 5 Enter "bin" to set transfer ..."quit" to exit the ftp prompt. 320 P-660HW-Tx v3 Series User's Guide Chapter 22 Tools UNIX, use this mode when transferring binary files), "host" is the device's IP address, "put" transfers the file source on the ZyXEL Device to your password as requested (the default is an example TFTP command...
name of the firmware on the computer) to the file destination on the device). name of your ZyXEL Device. 3 Press [ENTER] when prompted for a username. 4 Enter your computer and renames it "config.rom". TFTP Upload Command Example The following is "1234"). 5 Enter "bin" to set transfer ..."quit" to exit the ftp prompt. 320 P-660HW-Tx v3 Series User's Guide Chapter 22 Tools UNIX, use this mode when transferring binary files), "host" is the device's IP address, "put" transfers the file source on the ZyXEL Device to your password as requested (the default is an example TFTP command...
User Guide
Page 403
... (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secure connection, thus client identity is possible to authenticate the clients, thus hiding client identity. For client... of the EAP-TLS authentication that authenticates the sender's identity. P-660HW-Tx v3 Series User's Guide 403 In addition, it is protected. Thus someone other than the authentication server may access the password file. Appendix D Wireless LANs However, MD5 authentication has some weaknesses...
... (Protected EAP) Like EAP-TTLS, server-side certificate authentication is used to establish a secure connection, then use simple username and password methods through the secure connection, thus client identity is possible to authenticate the clients, thus hiding client identity. For client... of the EAP-TLS authentication that authenticates the sender's identity. P-660HW-Tx v3 Series User's Guide 403 In addition, it is protected. Thus someone other than the authentication server may access the password file. Appendix D Wireless LANs However, MD5 authentication has some weaknesses...