Zyxel g 300h manual
Setting up new service? Please note that a phone jack is required to set up CenturyLink internet service in your home. If you don't have a jack, chat with us to have one installed. Secure WiFi provides automatic cybersecurity for your network and all devices connected to it, plus:. Top Tools. Internet Speed Test. Where's My Technician? Service Appointment Manager.
Modem Compatibility. Manage My Services. Find Available Services. Was this page helpful? CenturyLink Services Support. Home Phone. All Rights Reserved. Third party marks are the property of their respective owners.
Residential Small Business Chat. Accessories Check for Deals at My Home. Support Support Center Contact Us. Support Sign In. Residential x. Cancel Continue. Using your Zyxel CZ modem. Features of the Zyxel CZ. WiFi supported: 2. If your networks are isolated from the Internet, for instance, only between your two branch offices, you can assign any IP addresses to the hosts without problems. Click OK to close the window and log in to the web configurator again using the new IP address if you change the default IP address Figure 15 System General Setup The following table describes the labels in this screen.
The default is 5 minutes. After it times out you have to log in with your password again. New Password Type your new system password up to 31 characters.
WMM QoS prioritizes wireless traffic according to the delivery requirements of the individual and applications. This bridge has the lowest cost to the root among the bridges connected to the LAN.
For each profile you can configure a name and one of the wireless security modes. Bridge loops cause broadcast traffic to circle the network endlessly, resulting in possible throughput degradation and disruption of communications. The following examples show two network topologies that can lead to this problem: If two or more ZyAIRs in bridge mode are connected to the same hub as shown next.
See later in this chapter and the appendices for more information on IEEE Select this to use WEP encryption. Profile Name This field displays a name given to a security profile in the Security configuration screen. Page Security: Page Figure 34 Security: Table 23 Security: User Name Enter the username up to 31 characters for this user profile. When a wireless client scans for an AP to associate, this is the identity that is broadcast and viewed in the wireless client utility.
SSID Type a name to identify this wireless profile on the network. Layer-2 isolation does not check the traffic between wireless clients that are associated with the same AP. When a wireless station moves from a coverage area to another, it scans and uses the channel of a new access point, which then informs the access points on the LAN about the change. The configured Name field is checked against these attributes. Disable Tx Tagging on the port you are using to connect to your computer.
Select Add to add a condition for this policy to act on. Select the Strongest encryption option. Select the value from the Attribute value drop-down list box. Certificates are based on public-private key pairs. With self-signed certificates, this is the same information as in the Subject field. Use this screen to have the ZyAIR create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request, see the following figure.
You may use any character, including spaces, but the ZyAIR drops trailing spaces. Apply Click Apply to begin certificate or certification request generation. Cancel Click Cancel to quit and return to the My Certificates screen. If you want to change the name, type up to 31 characters to identify this certificate.
You may use any character not including spaces. If the issuing certification authority is one that you have imported as a trusted certification authority, it may be the only certification authority in the list along with the certificate itself. A window display asking you to confirm that you want to delete the certificate. Note that subsequent certificates move up by one when you take this action. Click the details icon to open the Trusted CA Details screen.
If you want to change the name, type up to 31 characters to identify this key certificate. If the issuing This field also displays the domain names or IP addresses of the servers. An agent is a management software module that resides in a managed device the ZyAIR.
An agent translates the local management information from the managed device into a form compatible with SNMP. The purpose of the MIBs is to let administrators collect statistical data and monitor status and performance. Refer to the appendix for example log message explanations. Also provided are "system up time" and "poll interval s ". The Poll Interval field is configurable.
RxPkts This is the number of received packets on the wireless bridge. Refresh Click Refresh to reload the screen. For our In some operating systems, you may see the following icon on your desktop.
Information related to factory defaults, backup configuration, and restoring configuration appears as shown next. Table 58 Restore Configuration The following warning screen will appear. After you enter the password, the SMT displays the main menu, as shown next. Exit Use this to exit from SMT and return to a blank screen. Chapter 15 Introducing the SMT The System Name field is for identification purposes.
Sign Up and get 5 for free. Upload your files to the site. You get 1 for each file you add. Get 1 for every time someone downloads your manual. Buy as many as you need. View and download manuals available only for.
Register and get 5 for free. Upload manuals that we do not have and get 1 for each file. Get 1 for every download of your manual.
0コメント