User Guide
Page 41
...5 Introducing the Web Configurator The following table describes the labels in this screen. Ignore Click Ignore if you have previously logged into the NBG4615 if this to change the password this screen by clicking Home ( or ) in the Easy Mode or Expert mode screens. Note: The management... session automatically times out when the time period set in this screen. go to change this). Table 15 Change Password Screen LABEL DESCRIPTION New Password...
...5 Introducing the Web Configurator The following table describes the labels in this screen. Ignore Click Ignore if you have previously logged into the NBG4615 if this to change the password this screen by clicking Home ( or ) in the Easy Mode or Expert mode screens. Note: The management... session automatically times out when the time period set in this screen. go to change this). Table 15 Change Password Screen LABEL DESCRIPTION New Password...
User Guide
Page 49
Table 20 Summary: Packet Statistics LABEL Port Status DESCRIPTION This is the total time the NBG4615 has been for each session. Association means that are currently associated to stop refreshing statistics. 6.7 WLAN Station Status Click the WLAN Station Status (Details...) hyperlink ... transmission rate when the WLAN is enabled and Down when the WLAN is the number of transmitted packets on this port. This is the NBG4615's port type. Enter the time interval in seconds for example, your network or computer with a wireless network card) has connected successfully to...
Table 20 Summary: Packet Statistics LABEL Port Status DESCRIPTION This is the total time the NBG4615 has been for each session. Association means that are currently associated to stop refreshing statistics. 6.7 WLAN Station Status Click the WLAN Station Status (Details...) hyperlink ... transmission rate when the WLAN is enabled and Down when the WLAN is the number of transmitted packets on this port. This is the NBG4615's port type. Enter the time interval in seconds for example, your network or computer with a wireless network card) has connected successfully to...
User Guide
Page 55
... go to the Login page. Note: Don't worry if the Network Map does not display in the Expert Mode. Figure 34 Network Map NBG4615 User's Guide 55 When you want to use in your system. Table 22 Control Panel ITEM DESCRIPTION Home Click this to change to Expert ... not be supported by Windows XP (need to install patch), Windows Vista and Windows 7 users only. 8.4 Navigation Panel Use this to end the Web Configurator session. 8.5 Network Map Note: The NetworkMAP is shown as follows. For Windows XP (Service Pack 2) users, you can still configure the Control Panel (Section...
... go to the Login page. Note: Don't worry if the Network Map does not display in the Expert Mode. Figure 34 Network Map NBG4615 User's Guide 55 When you want to use in your system. Table 22 Control Panel ITEM DESCRIPTION Home Click this to change to Expert ... not be supported by Windows XP (need to install patch), Windows Vista and Windows 7 users only. 8.4 Navigation Panel Use this to end the Web Configurator session. 8.5 Network Map Note: The NetworkMAP is shown as follows. For Windows XP (Service Pack 2) users, you can still configure the Control Panel (Section...
User Guide
Page 187
... and concepts may help as you want to block and the date/time you read through this session is blocked (3 and 4). NBG4615 User's Guide 187 User A can initiate an IM (Instant Messaging) session from the LAN to the WAN (1). Return traffic for this chapter. However other networks from going... 120 Default Firewall Action LAN 1 A 2 WAN 3 4 24.1.1 What You Can Do • Use the General screen to enable or disable the NBG4615's firewall (Section 24.2 on page 189). • Use the Servicesscreen enable service blocking, enter/delete/modify the services you want to block them ...
... and concepts may help as you want to block and the date/time you read through this session is blocked (3 and 4). NBG4615 User's Guide 187 User A can initiate an IM (Instant Messaging) session from the LAN to the WAN (1). Return traffic for this chapter. However other networks from going... 120 Default Firewall Action LAN 1 A 2 WAN 3 4 24.1.1 What You Can Do • Use the General screen to enable or disable the NBG4615's firewall (Section 24.2 on page 189). • Use the Servicesscreen enable service blocking, enter/delete/modify the services you want to block them ...
User Guide
Page 188
... which may lack the granular application level access control or caching that enforces an access-control policy between the networks. About the NBG4615 Firewall The NBG4615's firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between two networks...check box). They make access control decisions based on IP address and protocol. They also "inspect" the session data to the Internet. The NBG4615 can access your network. The NBG4615 has one room to another , have access to Internet services such as a secure gateway for all ...
... which may lack the granular application level access control or caching that enforces an access-control policy between the networks. About the NBG4615 Firewall The NBG4615's firewall feature physically separates the LAN and the WAN and acts as a secure gateway for all data passing between two networks...check box). They make access control decisions based on IP address and protocol. They also "inspect" the session data to the Internet. The NBG4615 can access your network. The NBG4615 has one room to another , have access to Internet services such as a secure gateway for all ...
User Guide
Page 203
...is measured in the Management > Bandwidth Management > Advanced screen. The Web is not synonymous with the Internet; Session Initiated Protocol (SIP) is called Voice over the Internet. Table 83 Media Bandwidth Management Setup: Services SERVICE FTP...of files, including large files that handles the setting up, altering and tearing down of voice and multimedia sessions over IP or VoIP. The Web is accessed through a computer network to distribute graphical, hyper-linked information... that each application can use of a browser. NBG4615 User's Guide 203 Here are using .
...is measured in the Management > Bandwidth Management > Advanced screen. The Web is not synonymous with the Internet; Session Initiated Protocol (SIP) is called Voice over the Internet. Table 83 Media Bandwidth Management Setup: Services SERVICE FTP...of files, including large files that handles the setting up, altering and tearing down of voice and multimedia sessions over IP or VoIP. The Web is accessed through a computer network to distribute graphical, hyper-linked information... that each application can use of a browser. NBG4615 User's Guide 203 Here are using .
User Guide
Page 205
... does not match the client IP address. The management session does not time out when a statistics screen is already another remote management session. If it . 27.2.1 Remote Management and NAT When NAT is enabled: • Use the NBG4615's WAN IP address when configuring from the WAN. ...8226; Use the NBG4615's LAN IP address when configuring from a remote location through the...
... does not match the client IP address. The management session does not time out when a statistics screen is already another remote management session. If it . 27.2.1 Remote Management and NAT When NAT is enabled: • Use the NBG4615's WAN IP address when configuring from the WAN. ...8226; Use the NBG4615's LAN IP address when configuring from a remote location through the...
User Guide
Page 213
...Maintenance > General. Figure 141 Maintenance > General NBG4615 User's Guide 213 CHAPTER 29 Maintenance 29.1 Overview This chapter provides information on the Maintenance screens. 29.2 What You Can Do • Use the General screen to set the timeout period of the management session (Section 29.3 on page 213). • ...Use the Password screen to change your NBG4615's system password (Section 29.4 on page 214). • Use the Time screen to change your...
...Maintenance > General. Figure 141 Maintenance > General NBG4615 User's Guide 213 CHAPTER 29 Maintenance 29.1 Overview This chapter provides information on the Maintenance screens. 29.2 What You Can Do • Use the General screen to set the timeout period of the management session (Section 29.3 on page 213). • ...Use the Password screen to change your NBG4615's system password (Section 29.4 on page 214). • Use the Time screen to change your...
User Guide
Page 214
... The following table describes the labels in this screen. Note that you use to access the system in this screen afresh. 214 NBG4615 User's Guide A value of "0" means a management session never times out, no matter how long it times out you type a password, the screen displays an asterisk (*) for details. The default...
... The following table describes the labels in this screen. Note that you use to access the system in this screen afresh. 214 NBG4615 User's Guide A value of "0" means a management session never times out, no matter how long it times out you type a password, the screen displays an asterisk (*) for details. The default...
User Guide
Page 225
... port. The default password is in the same subnet as the NBG4615. See the Quick Start Guide. 3 Make sure your last session. I can access the NBG4615, check the remote management settings and firewall rules to find out why the NBG4615 does not respond to HTTP. • If your computer is ... you changed the IP address and have entered the password correctly. Try logging in the other session, or ask the person who is using another service, such as expected. Log out of my NBG4615. 2 Check the hardware connections, and make sure the LEDs are routers between your computer and...
... port. The default password is in the same subnet as the NBG4615. See the Quick Start Guide. 3 Make sure your last session. I can access the NBG4615, check the remote management settings and firewall rules to find out why the NBG4615 does not respond to HTTP. • If your computer is ... you changed the IP address and have entered the password correctly. Try logging in the other session, or ask the person who is using another service, such as expected. Log out of my NBG4615. 2 Check the hardware connections, and make sure the LEDs are routers between your computer and...
User Guide
Page 288
... simplest one-way authentication method. Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is performed. 288 NBG4615 User's Guide The authentication server sends a challenge to the client. The wireless client 'proves' that is created. Password ...authentication. PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is implemented only by encrypting the password with dynamic session key. EAP-GTC is used to handle certificates, which imposes a management overhead. LEAP LEAP (Lightweight Extensible Authentication Protocol)...
... simplest one-way authentication method. Appendix D Wireless LANs EAP-MD5 (Message-Digest Algorithm 5) MD5 authentication is performed. 288 NBG4615 User's Guide The authentication server sends a challenge to the client. The wireless client 'proves' that is created. Password ...authentication. PEAP (Protected EAP) Like EAP-TTLS, server-side certificate authentication is implemented only by encrypting the password with dynamic session key. EAP-GTC is used to handle certificates, which imposes a management overhead. LEAP LEAP (Lightweight Extensible Authentication Protocol)...
User Guide
Page 296
...Internet Group Management Protocol is reachable. Remote Command Service. The Real Time Streaming (media control) Protocol (RTSP) is a secured http session often used when sending packets to -Point Tunneling Protocol enables secure transfer of hosts. HTTPS is a remote control for news groups. ...Transfer Protocol - The Internet Key Exchange algorithm is often used for the world wide web. Simple File Transfer Protocol. 296 NBG4615 User's Guide a client/ server protocol for key distribution and management. Internet Control Message Protocol is used for diagnostic or routing...
...Internet Group Management Protocol is reachable. Remote Command Service. The Real Time Streaming (media control) Protocol (RTSP) is a secured http session often used when sending packets to -Point Tunneling Protocol enables secure transfer of hosts. HTTPS is a remote control for news groups. ...Transfer Protocol - The Internet Key Exchange algorithm is often used for the world wide web. Simple File Transfer Protocol. 296 NBG4615 User's Guide a client/ server protocol for key distribution and management. Internet Control Message Protocol is used for diagnostic or routing...
User Guide
Page 316
... RTS/CTS Threshold 126, 136 S Scheduling 139 Service and port numbers 191, 202 Service Set 61, 131 Service Set IDentification 61, 131 Service Set IDentity. Session Initiated Protocol 203 SIP 203 SSID 61, 67, 76, 84, 92, 102, 126, 131 stateful inspection firewall 187 Static DHCP 168 Static Route 183 Status... screen 83 UPnP 207 URL Keyword Blocking 194 user authentication 127 local (user) database 127 RADIUS server 127 User Name 182 V VoIP 203 VPN 155 NBG4615 User's Guide See SSID.
... RTS/CTS Threshold 126, 136 S Scheduling 139 Service and port numbers 191, 202 Service Set 61, 131 Service Set IDentification 61, 131 Service Set IDentity. Session Initiated Protocol 203 SIP 203 SSID 61, 67, 76, 84, 92, 102, 126, 131 stateful inspection firewall 187 Static DHCP 168 Static Route 183 Status... screen 83 UPnP 207 URL Keyword Blocking 194 user authentication 127 local (user) database 127 RADIUS server 127 User Name 182 V VoIP 203 VPN 155 NBG4615 User's Guide See SSID.