Label | Description |
---|---|
User Configuration / System Default | The Zyxel Device comes with pre-configured System Default zones that you cannot delete. You can create your own User Configuration zones |
Add | Click this to create a new, user-configured zone. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove a user-configured trunk, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry.Click Refresh to update information in this screen. |
# | This field is a sequential value, and it is not associated with any interface. |
Name | This field displays the name of the zone. |
Member | This field displays the names of the interfaces that belong to each zone. |
Reference | This field displays the number of times an Object Reference is used in a policy. |
Label | Description |
---|---|
Name | For a system default zone, the name is read only. For a user-configured zone, type the name used to refer to the zone. You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Member List | Available lists the interfaces and VPN tunnels that do not belong to any zone. Select the interfaces and VPN tunnels that you want to add to the zone you are editing, and click the right arrow button to add them. Member lists the interfaces and VPN tunnels that belong to the zone. Select any interfaces that you want to remove from the zone, and click the left arrow button to remove them. |
OK | Click OK to save your customized settings and exit this screen. |
Cancel | Click Cancel to exit this screen without saving. |
Type | Abilities | Login Method(s) |
---|---|---|
Admin Users | ||
admin | Change Zyxel Device configuration (web, CLI) | WWW, TELNET, SSH, FTP, Console |
limited-admin | Look at Zyxel Device configuration (web, CLI) Perform basic diagnostics (CLI) | WWW, TELNET, SSH, Console |
Access Users | ||
user | Access network services Browse user-mode commands (CLI) | WWW, TELNET, SSH |
guest | Access network services | WWW |
ext-user | External user account | WWW |
ext-group-user | External group user account | WWW |
guest-manager | Create dynamic guest accounts | WWW |
dynamic-guest | Access network services | Hotspot Portal |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific user. |
User Name | This field displays the user name of each user. |
User Type | This field displays the types of user accounts the Zyxel Device uses: • admin - this user can look at and change the configuration of the Zyxel Device • limited-admin - this user can look at the configuration of the Zyxel Device but not to change it • dynamic-guest - this user has access to the Zyxel Device’s services but cannot look at the configuration. • user - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI). • guest - this user has access to the Zyxel Device’s services but cannot look at the configuration • ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • guest-manager - this user can log in via the web configurator login screen and create dynamic guest accounts using the Account Generator screen that pops up. |
Description | This field displays the description for each user. |
Reference | This displays the number of times an object reference is used in a profile. |
• adm | • admin | • any | • bin | • daemon |
• debug | • devicehaecived | • ftp | • games | • halt |
• ldap-users | • lp | • mail | • news | • nobody |
• operator | • radius-users | • root | • shutdown | • sshd |
• sync | • uucp | • zyxel |
Label | Description |
---|---|
User Name | Type the user name for this user account. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User names have to be different than user group names, and some words are reserved. |
User Type | This field displays the types of user accounts the Zyxel Device uses: • admin - this user can look at and change the configuration of the Zyxel Device • limited-admin - this user can look at the configuration of the Zyxel Device but not to change it • user - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI). • guest - this user has access to the Zyxel Device’s services but cannot look at the configuration. • ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP. |
Password | This field is not available if you select the ext-user or ext-group-user type. Enter a password of from 1 to 64 characters for this user account. If you selected Enable Password Complexity in Configuration > Object > User/Group > Setting, it must consist of at least 8 characters and at most 64. At least 1 character must be a number, at least 1 a lower case letter, at least 1 an upper case letter and at least 1 a special character from the keyboard, such as !@#$%^&*()_+. |
Retype | This field is not available if you select the ext-user or ext-group-user type. |
Group Identifier | This field is available for a ext-group-user type user account. Specify the value of the AD or LDAP server’s Group Membership Attribute that identifies the group to which this user belongs. |
Associated AAA Server Object | This field is available for a ext-group-user type user account. Select the AAA server to use to authenticate this account’s users. |
Description | Enter the description of each user, if any. You can use up to 60 printable ASCII characters. Default descriptions are provided. |
Email | Type one or more valid email addresses for this user so that email messages can be sent to this user if required. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com. |
Mobile Number | Type a valid mobile telephone number for this user so that SMS messages can be sent to this user if required. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-]. |
Send Code | This button is available when the user type is admin or limited-admin. Click this and an authorization email or SMS message with a code of six digits will be sent to the email addresses or mobile telephone number you put in. Enter the verification code to verify your email addresses or mobile telephone number. |
Authentication Timeout Settings | If you want the system to use default settings, select Use Default Settings. If you want to set authentication timeout to a value other than the default settings, select Use Manual Settings then fill your preferred values in the fields that follow. |
Lease Time | If you select Use Default Settings in the Authentication Timeout Settings field, the default lease time is shown. If you select Use Manual Settings, you need to enter the number of minutes this user has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires. |
Reauthentication Time | If you select Use Default Settings in the Authentication Timeout Settings field, the default lease time is shown. If you select Use Manual Settings, you need to type the number of minutes this user can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out. |
User VLAN ID | This field is available for a ext-group-user type user account. Select this option to enable dynamic VLAN assignment on the Zyxel Device. When a user is authenticated successfully, all data traffic from this user is tagged with the VLAN ID number you specify here. This allows you to assign a user of the ext-group-user type to a specific VLAN based on the user credentials instead of using an AAA server. |
Configuration Validation | Use a user account from the group specified above to test if the configuration is correct. Enter the account’s user name in the User Name field and click Test. |
OK | Click OK to save your changes back to the Zyxel Device and close the screen. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Save | This button is only available when adding a new user. Click Save to save your changes back to the Zyxel Device and then go to the Two-factor Authentication screen. |
Access Type | Two-Factor Authentication Methods | Factor 2 Password |
---|---|---|
VPN | SMS | Code |
VPN | Email | Link |
Admin | SMS | Code |
Admin | Email | Link |
Admin | Google Authenticator app | Code |
Label | Description |
---|---|
Enable Two-factor Authentication for VPN Access. | Select this to require two-factor authentication for this user to use a pre-configured VPN tunnel for secure access to a network behind the Zyxel Device. Select the types of VPN allowed in Object > Auth. Method > Two-factor Authentication > VPN Access. You may choose from: • SSL VPN Access • IPSec VPN Access • L2TP/IPSec VPN Access. |
Enable Two-factor Authentication for Admin Access. | Select this to require two-factor authentication for an admin user to access the Zyxel Device. Select the types of access allowed in Object > Auth. Method > Two-factor Authentication > Admin Access. You may choose from: • Web • SSH • TELNET |
Two-factor Auth. Method | Select Default or User Defined and select from PIN code by SMS/Email or Google Authenticator |
Set up Google Authenticator | If you chose Google Authenticator for offline two-factor authentication, on your mobile device, go to an app store to download Google Authenticator. To add your account to Google Authenticator, press the plus (+) icon, select Scan Barcode, then use your mobile device's camera to scan the barcode. Finally enter the verification code you receive on your mobile device in Verify your device. |
View your backup codes | You see this after successful Google authentication. In the event that you do not have access to email or your mobile device, click Download to create backup codes as second-factor authentication. Make sure to put them in a safe place. |
Verify your device | In the event that you do not have access to email or your mobile device, enter a backup code here as second factor authentication. You can use each code only once. If you generate a new set of backup codes (Regenerate backup codes), the old set become obsolete. |
Revoke | Click this to cancel Google authentication as second-factor authentication for Admin Access. You must then use a PIN code by SMS or email as second-factor authentication instead. |
OK | Click OK to save your changes back to the Zyxel Device and close the screen. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Removing a group does not remove the user accounts in the group. |
References | Select an entry and click References to open a screen that shows which settings use the entry |
# | This field is a sequential value, and it is not associated with a specific user group. |
Group Name | This field displays the name of each user group. |
Description | This field displays the description for each user group. |
Member | This field lists the members in the user group. Each member is separated by a comma. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Name | Type the name for this user group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User group names have to be different than user names. |
Description | Enter the description of the user group, if any. You can use up to 60 characters, punctuation marks, and spaces. |
Member List | The Member list displays the names of the users and user groups that have been added to the user group. The order of members is not important. Select users and groups from the Available list that you want to be members of this group and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
User Authentication Timeout Settings | |
Default Authentication Timeout Settings | These authentication timeout settings are used by default when you create a new user account. They also control the settings for any existing user accounts that are set to use the default settings. You can still manually configure any user account’s authentication timeout settings. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
# | This field is a sequential value, and it is not associated with a specific entry. |
User Type | These are the kinds of user account the Zyxel Device supports. • admin - this user can look at and change the configuration of the Zyxel Device • limited-admin - this user can look at the configuration of the Zyxel Device but not to change it • user - this user has access to the Zyxel Device’s services but cannot look at the configuration • guest - this user has access to the Zyxel Device’s services but cannot look at the configuration • ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP. |
Lease Time | This is the default lease time in minutes for each type of user account. It defines the number of minutes the user has to renew the current session before the user is logged out. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically, the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires. |
Reauthentication Time | This is the default reauthentication time in minutes for each type of user account. It defines the number of minutes the user can be logged into the Zyxel Device in one session before having to log in again. Unlike Lease Time, the user has no opportunity to renew the session without logging out. |
Miscellaneous Settings | |
Allow renewing lease time automatically | Select this check box if access users can renew lease time automatically, as well as manually, simply by selecting the Updating lease time automatically check box on their screen. |
Enable user idle detection | This is applicable for access users. Select this check box if you want the Zyxel Device to monitor how long each access user is logged in and idle (in other words, there is no traffic for this access user). The Zyxel Device automatically logs out the access user once the User idle timeout has been reached. |
User idle timeout | This is applicable for access users. This field is effective when Enable user idle detection is checked. Type the number of minutes each access user can be logged in and idle before the Zyxel Device automatically logs out the access user. |
Login Security | |
Password must changed every (days): | Enter how often users must change their password when they log into the Zyxel Device. You can choose from once a day to once a year. |
Password reset link (FQDN/IP): | Associate the password expiration to a specific Zyxel Device. Default is this Zyxel Device (myrouter) or select Custom and enter the IP address or Fully Qualified Domain Name (FQDN). |
Enable Password Complexity | Select this to enforce the following conditions in a user password. Requiring a strong password is good for security. The conditions are that the password must consist of at least 8 characters and at most 64. At least 1 character must be a number, at least 1 a lower case letter, at least 1 an upper case letter and at least 1 a special character from the keyboard, such as !@#$%^&*()_+. |
User Logon Settings | |
Limit the number of simultaneous logons for administration account | Select this check box if you want to set a limit on the number of simultaneous logins by admin users. If you do not select this, admin users can login as many times as they want at the same time using the same or different IP addresses. |
Maximum number per administration account | This field is effective when Limit ... for administration account is checked. Type the maximum number of simultaneous logins by each admin user. |
Limit the number of simultaneous logons for access account | Select this check box if you want to set a limit on the number of simultaneous logins by non-admin users. If you do not select this, access users can login as many times as they want as long as they use different IP addresses. |
Maximum number per access account | This field is effective when Limit ... for access account is checked. Type the maximum number of simultaneous logins by each access user. |
User Lockout Settings | |
Enable logon retry limit | Select this check box to set a limit on the number of times each user can login unsuccessfully (for example, wrong password) before the IP address is locked out for a specified amount of time. |
Maximum retry count | This field is effective when Enable logon retry limit is checked. Type the maximum number of times each user can login unsuccessfully before the IP address is locked out for the specified lockout period. The number must be between 1 and 99. |
Lockout period | This field is effective when Enable logon retry limit is checked. Type the number of minutes the user must wait to try to login again, if logon retry limit is enabled and the maximum retry count is reached. This number must be between 1 and 65,535 (about 45.5 days). |
Apply | Click Apply to save the changes. |
Reset | Click Reset to return the screen to its last-saved settings. |
Label | Description |
---|---|
User Type | This read-only field identifies the type of user account for which you are configuring the default settings. • admin - this user can look at and change the configuration of the Zyxel Device • limited-admin - this user can look at the configuration of the Zyxel Device but not to change it. • dynamic-guest - this user has access to the Zyxel Device’s services but cannot look at the configuration. • user - this user has access to the Zyxel Device’s services but cannot look at the configuration. • guest - this user has access to the Zyxel Device’s services but cannot look at the configuration. • ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • guest-manager - this user can log in via the web configurator login screen and create dynamic guest accounts using the Account Generator screen that pops up. |
Lease Time | Enter the number of minutes this type of user account has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires. |
Reauthentication Time | Type the number of minutes this type of user account can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
User-defined lease time (max ... minutes) | Access users can specify a lease time shorter than or equal to the one that you specified. The default value is the lease time that you specified. |
Renew | Access users can click this button to reset the lease time, the amount of time remaining before the Zyxel Device automatically logs them out. The Zyxel Device sets this amount of time according to the: • User-defined lease time field in this screen • Lease time field in the User Add/Edit screen • Lease time field in the Setting screen . |
Updating lease time automatically | This box appears if you checked the Allow renewing lease time automatically box in the Setting screen. Access users can select this check box to reset the lease time automatically 30 seconds before it expires. Otherwise, access users have to click the Renew button to reset the lease time. |
Remaining time before lease timeout | This field displays the amount of lease time that remains, though the user might be able to reset it. |
Remaining time before auth. timeout | This field displays the amount of time that remains before the Zyxel Device automatically logs the access user out, regardless of the lease time. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
MAC Address/OUI | This field displays the MAC address or OUI (Organizationally Unique Identifier of computer hardware manufacturers) of wireless clients using MAC authentication with the Zyxel Device local user database. |
Description | This field displays a description of the device identified by the MAC address or OUI. |
Label | Description |
---|---|
MAC Address/OUI | Type the MAC address (six hexadecimal number pairs separated by colons or hyphens) or OUI (three hexadecimal number pairs separated by colons or hyphens) to identify specific wireless clients for MAC authentication using the Zyxel Device local user database. The OUI is the first three octets in a MAC address and uniquely identifies the manufacturer of a network device. |
Description | Enter an optional description of the wireless device(s) identified by the MAC or OUI. You can use up to 60 characters, punctuation marks, and spaces. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Keyword | Corresponding Attribute in Web Configurator |
---|---|
type | User Type. Possible Values: admin, limited-admin, dynamic-guest, user, guest. |
leaseTime | Lease Time. Possible Values: 1-1440 (minutes). |
reauthTime | Reauthentication Time. Possible Values: 1-1440 (minutes). |
WiFi Standard | Maximum Link Rate * | Band | Simultaneous Connections |
---|---|---|---|
802.11b | 11 Mbps | 2.4 GHz | 1 |
802.11a/g | 54 Mbps | 2.4 GHz and 5 GHz | 1 |
802.11n | 600 Mbps | 2.4 GHz and 5 GHz | 1 |
802.11ac | 6.93 Gbps | 5 GHz | 4 |
802.11ax | 2.4 Gbps | 2.4 GHz | 128 |
9.61 Gbps | 5 GHz and 6 GHz |
Label | Description |
---|---|
Add | Click this to add a new radio profile. |
Edit | Click this to edit the selected radio profile. |
Remove | Click this to remove the selected radio profile. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
References | Click this to view which other objects are linked to the selected radio profile. |
# | This field is a sequential value, and it is not associated with a specific profile. |
Status | This icon is lit when the entry is active and dimmed when the entry is inactive. |
Profile Name | This field indicates the name assigned to the radio profile. |
Frequency Band | This field indicates the frequency band which this radio profile is configured to use. |
Schedule | This field displays the schedule object which defines when this radio profile can be used. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Reset | Click Reset to return the screen to its last-saved settings. |
Label | Description |
---|---|
Hide / Show Advanced Settings | Click this to hide or show the Advanced Settings in this window. |
Create New Object | Use this to configure any new settings objects that you need to use in this screen. |
General Settings | |
Activate | Select this option to make this profile active. |
Profile Name | Enter up to 31 alphanumeric characters to be used as this profile’s name. Spaces and underscores are allowed. |
Schedule | This field displays the schedule object which defines when this radio profile can be used. |
802.11 Band | Select how to let wireless clients connect to the AP. If 802.11 Band is set to 2.4G: • 11b/g: allows either IEEE 802.11b or IEEE 802.11g compliant WLAN devices to associate with the AP. The AP adjusts the transmission rate automatically according to the wireless standard supported by the wireless devices. • 11n: allows IEEE802.11b, IEEE802.11g and IEEE802.11n compliant WLAN devices to associate with the AP. If 802.11 Band is set to 5G: • 11a: allows only IEEE 802.11a compliant WLAN devices to associate with the AP. • 11a/n: allows both IEEE802.11n and IEEE802.11a compliant WLAN devices to associate with the AP. The transmission rate of your AP might be reduced. • 11ac: allows only IEEE802.11ac compliant WLAN devices to associate with the AP. • 11ax: allows IEEE802.11n, IEEE802.11a, IEEE802.11ac, and IEEE802.11ax compliant WLAN devices to associate with the AP. If the WLAN device isn’t compatible with 802.11ax, the AP will communicate with the WLAN device using 802.11ac, and so on If you select 11ac but the WLAN devices in the network do not support IEEE 802.11ac, the Zyxel Device automatically sets the AP to use 11a/n. |
Channel Width | Select the wireless channel bandwidth you want the AP to use. A standard 20 MHz channel offers transfer speeds of up to 144Mbps (2.4GHz) or 217Mbps (5GHZ) whereas a 40MHz channel uses two standard channels and offers speeds of up to 300Mbps (2.4GHz) or 450Mbps (5GHZ). An IEEE 802.11ac-specific 80MHz channel offers speeds of up to 1.3Gbps. 40 MHz (channel bonding or dual channel) bonds two adjacent radio channels to increase throughput. A 80 MHz channel consists of two adjacent 40 MHz channels. The wireless clients must also support 40 MHz or 80 MHz. It is often better to use the 20 MHz setting in a location where the environment hinders the wireless signal. Because not all devices support 40 MHz and/or 80 MHz channels, select 20/40MHz or 20/40/80MHz to allow the AP to adjust the channel bandwidth automatically. Select 20MHz if you want to lessen radio interference with other wireless devices in your neighborhood or the wireless clients do not support channel bonding. If the environment has poor signal-to-noise (SNR), the Zyxel Device will switch to a lower bandwidth. |
Channel Selection | Select the wireless channel which this radio profile should use. It is recommended that you choose the channel least in use by other APs in the region where this profile will be implemented. This will reduce the amount of interference between wireless clients and the AP to which this profile is assigned. Select DCS to have the AP automatically select the radio channel upon which it broadcasts by scanning the area around it and determining what channels are currently being used by other devices. Select Manual and specify the channels the AP uses. |
Blacklist DFS channels in presence of radar | This field is available if 802.11 Band is set to 5G and Channel Selection is set to DCS. Enable this to temporarily blacklist the wireless channels in the Dynamic Frequency Selection (DFS) range whenever a radar signal is detected by the AP. |
Enable DCS Client Aware | This field is available when you set Channel Selection to DCS. Select this to have the AP wait until all connected clients have disconnected before switching channels. If you disable this then the AP switches channels immediately regardless of any client connections. In this instance, clients that are connected to the AP when it switches channels are dropped. |
2.4 GHz Channel Selection Method | This field is available when you set Channel Selection to DCS. Select auto to have the AP search for available channels automatically in the 2.4 GHz band. The available channels vary depending on what you select in the 2.4 GHz Channel Deployment field. Select manual and specify the channels the AP uses in the 2.4 GHz band. |
Channel ID | This field is available only when you set Channel Selection to DCS and set 2.4 GHz Channel Selection Method to manual. Select the check boxes of the channels that you want the AP to use. |
Time Interval | Select this option to have the AP survey the other APs within its broadcast radius at the end of the specified time interval. |
2.4 GHz Channel Deployment | This field is available only when you set Channel Selection to DCS and set 2.4 GHz Channel Selection Method to auto. Select Three-Channel Deployment to limit channel switching to channels 1,6, and 11, the three channels that are sufficiently attenuated to have almost no impact on one another. In other words, this allows you to minimize channel interference by limiting channel-hopping to these three “safe” channels. Select Four-Channel Deployment to limit channel switching to four channels. Depending on the country domain, if the only allowable channels are 1-11 then the Zyxel Device uses channels 1, 4, 7, 11 in this configuration; otherwise, the Zyxel Device uses channels 1, 5, 9, 13 in this configuration. Four channel deployment expands your pool of possible channels while keeping the channel interference to a minimum. For US and Canada models, country code is fixed to US or Canada respectively and is not user selectable. |
DCS Time Interval | This field is available when you set Channel Selection to DCS. Enter a number of minutes. This regulates how often the AP surveys the other APs within its broadcast radius. If the channel on which it is currently broadcasting suddenly comes into use by another AP, the AP will then dynamically select the next available clean channel or a channel with lower interference. |
Channel ID | This field is available only when you set Channel Selection to DCS and set 2.4 GHz Channel Selection Method to manual. Select the check boxes of the channels that you want the AP to use. |
Schedule | Select this option to have the AP survey the other APs within its broadcast radius at a specific time on selected days of the week. |
Start Time | Specify the time of the day (in 24-hour format) to have the AP use DCS to automatically scan and find a less-used channel. |
Week Days | Select each day of the week to have the AP use DCS to automatically scan and find a less-used channel. |
Enable 5 GHz DFS Aware | This field is available only when you select 11a, 11a/n or 11ac in the 802.11 Band field. Select this if your APs are operating in an area known to have RADAR devices. This allows the device to downgrade its frequency to below 5 GHz in the event a RADAR signal is detected, thus preventing it from interfering with that signal. Enabling this forces the AP to select a non-DFS channel. |
5 GHz Channel Selection Method | This shows auto and allows the AP to search for available channels automatically in the 5 GHz band. |
Advanced Settings | |
Country Code | Select the country code of where the Zyxel Device is located/installed. The available channels vary depending on the country you select. Be sure to select the correct/same country for both radios on an AP and all connected APs, in order to prevent roaming failure and interference to other systems. For US and Canada models, country code is fixed to US or Canada respectively and is not user selectable. |
Guard Interval | This field is available only when the 802.11 Band is set to 5G and 802.11 Mode is set to 11n or 11ac. Set the guard interval for this radio profile to either Short or Long. The guard interval is the gap introduced between data transmission from users in order to reduce interference. Reducing the interval increases data transfer rates but also increases interference. Increasing the interval reduces data transfer rates but also reduces interference. |
Enable A-MPDU Aggregation | Select this to enable A-MPDU aggregation. Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their 802.11n headers and wraps them in a 802.11n MAC header. This method is useful for increasing bandwidth throughput in environments that are prone to high error rates. |
A-MPDU Limit | Enter the maximum frame size to be aggregated. |
A-MPDU Subframe | Enter the maximum number of frames to be aggregated each time. |
Enable A-MSDU Aggregation | Select this to enable A-MSDU aggregation. Mac Service Data Unit (MSDU) aggregation collects Ethernet frames without any of their 802.11n headers and wraps the header-less payload in a single 802.11n MAC header. This method is useful for increasing bandwidth throughput. It is also more efficient than A-MPDU except in environments that are prone to high error rates. |
A-MSDU Limit | Enter the maximum frame size to be aggregated. |
RTS/CTS Threshold | Use RTS/CTS to reduce data collisions on the wireless network if you have wireless clients that are associated with the same AP but out of range of one another. When enabled, a wireless client sends an RTS (Request To Send) and then waits for a CTS (Clear To Send) before it transmits. This stops wireless clients from transmitting packets at the same time (and causing data collisions). A wireless client sends an RTS for all packets larger than the number (of bytes) that you enter here. Set the RTS/CTS equal to or higher than the fragmentation threshold to turn RTS/CTS off. |
Beacon Interval | When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can wait in low-power mode before waking up to handle the beacon. A high value helps save current consumption of the access point. |
DTIM | Delivery Traffic Indication Message (DTIM) is the time period after which broadcast and multicast packets are transmitted to mobile clients in the Active Power Management mode. A high DTIM value can cause clients to lose connectivity with the network. This value can be set from 1 to 255. |
Enable Signal Threshold | Select the check box to use the signal threshold to ensure wireless clients receive good throughput. This allows only wireless clients with a strong signal to connect to the AP. Clear the check box to not require wireless clients to have a minimum signal strength to connect to the AP. |
Station Signal Threshold | Set a minimum client signal strength. A wireless client is allowed to connect to the AP only when its signal strength is stronger than the specified threshold. -20 dBm is the strongest signal you can require and -76 is the weakest. |
Disassociate Station Threshold | Set a minimum kick-off signal strength. When a wireless client’s signal strength is lower than the specified threshold, the Zyxel Device disconnects the wireless client from the AP. -20 dBm is the strongest signal you can require and -90 is the weakest. |
Allow Station Connection after Multiple Retries | Select this option to allow a wireless client to try to associate with the AP again after it is disconnected due to weak signal strength. |
Station Retry Count | Set the maximum number of times a wireless client can attempt to re-connect to the AP |
Allow 802.11n/ac/ax stations only | Select this option to allow only 802.11 n/ac/ax stations to connect, and reject 802.11a/b/g stations. |
Multicast Settings | Use this section to set a transmission mode and maximum rate for multicast traffic. |
Transmission Mode | Set how the AP handles multicast traffic. Select Multicast to Unicast to broadcast wireless multicast traffic to all of the wireless clients as unicast traffic. Unicast traffic dynamically changes the data rate based on the application’s bandwidth requirements. The retransmit mechanism of unicast traffic provides more reliable transmission of the multicast traffic, although it also produces duplicate packets. Select Fixed Multicast Rate to send wireless multicast traffic at a single data rate. You must know the multicast application’s bandwidth requirements and set it in the following field. |
Multicast Rate (Mbps) | If you set the multicast transmission mode to fixed multicast rate, set the data rate for multicast traffic here. For example, to deploy 4 Mbps video, select a fixed multicast rate higher than 4 Mbps. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to add a new SSID profile. |
Edit | Click this to edit the selected SSID profile. |
Remove | Click this to remove the selected SSID profile. |
References | Click this to view which other objects are linked to the selected SSID profile (for example, radio profile). |
# | This field is a sequential value, and it is not associated with a specific profile. |
Profile Name | This field indicates the name assigned to the SSID profile. |
SSID | This field indicates the SSID name as it appears to wireless clients. |
Security Profile | This field indicates which (if any) security profile is associated with the SSID profile. |
QoS | This field indicates the QoS type associated with the SSID profile. |
MAC Filtering Profile | This field indicates which (if any) MAC Filter Profile is associated with the SSID profile. |
VLAN ID | This field indicates the VLAN ID associated with the SSID profile. |
Label | Description |
---|---|
Create new Object | Select an object type from the list to create a new one associated with this SSID profile. |
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
SSID | Enter the SSID name for this profile. This is the name visible on the network to wireless clients. Enter up to 32 characters, spaces and underscores are allowed. |
Security Profile | Select a security profile from this list to associate with this SSID. If none exist, you can use the Create new Object menu to create one. It is highly recommended that you create security profiles for all of your SSIDs to enhance your network security. |
MAC Filtering Profile | Select a MAC filtering profile from the list to associate with this SSID. If none exist, you can use the Create new Object menu to create one. MAC filtering allows you to limit the wireless clients connecting to your network through a particular SSID by wireless client MAC addresses. Any clients that have MAC addresses not in the MAC filtering profile of allowed addresses are denied connections. The disable setting means no MAC filtering is used. |
QoS | Select a Quality of Service (QoS) access category to associate with this SSID. Access categories minimize the delay of data packets across a wireless network. Certain categories, such as video or voice, are given a higher priority due to the time sensitive nature of their data packets. QoS access categories are as follows: disable: Turns off QoS for this SSID. All data packets are treated equally and not tagged with access categories. WMM: Enables automatic tagging of data packets. The Zyxel Device assigns access categories to the SSID by examining data as it passes through it and making a best guess effort. If something looks like video traffic, for instance, it is tagged as such. WMM_VOICE: All wireless traffic to the SSID is tagged as voice data. This is recommended if an SSID is used for activities like placing and receiving VoIP phone calls. WMM_VIDEO: All wireless traffic to the SSID is tagged as video data. This is recommended for activities like video conferencing. WMM_BEST_EFFORT: All wireless traffic to the SSID is tagged as “best effort,” meaning the data travels the best route it can without displacing higher priority traffic. This is good for activities that do not require the best bandwidth throughput, such as surfing the Internet. WMM_BACKGROUND: All wireless traffic to the SSID is tagged as low priority or “background traffic”, meaning all other access categories take precedence over this one. If traffic from an SSID does not have strict throughput requirements, then this access category is recommended. For example, an SSID that only has network printers connected to it. |
Rate Limiting (Per Station Traffic Rate) | Define the maximum incoming and outgoing transmission data rate per wireless station |
Downlink: | Define the maximum incoming transmission data rate (either in Mbps or Kbps) on a per-station basis. |
Uplink: | Define the maximum outgoing transmission data rate (either in Mbps or Kbps) on a per-station basis. |
Band Select: | To improve network performance and avoid interference in the 2.4 GHz frequency band, you can enable this feature to use the 5 GHz band first. You should set 2.4GHz and 5 GHz radio profiles to use the same SSID and security settings. Select standard to have the AP try to connect the wireless clients to the same SSID using the 5 GHZ band. Connections to an SSID using the 2.4GHz band are still allowed. Otherwise, select disable to turn off this feature. |
Stop Threshold | This field is not available when you disable Band Select. Select this option and set the threshold number of the connected wireless clients at which the Zyxel Device disables the band select feature. |
Balance Ratio | This field is not available when you disable Band Select. Select this option and set a ratio of the wireless clients using the 5 GHz band to the wireless clients using the 2.4 GHz band. |
Forwarding Mode | Select a forwarding mode (Tunnel or Local bridge) for traffic from wireless stations in this wireless network (SSID). In earlier firmware, you could only forward traffic from this wireless network with a tunnel using an existing VLAN interface in Network > Interface > VLAN > Add. From firmware version 4.60, you can select an existing VLAN interface or a local Ethernet interface (lan1, lan2) for forwarding traffic from wireless stations in this wireless network using a tunnel. These interfaces cannot be bridge members (Network > Interface > Bridge). |
VLAN ID | If you selected Local Bridge forwarding mode, enter the VLAN ID that will be used to tag all traffic originating from this SSID if the VLAN is different from the native VLAN. All the wireless station’s traffic goes through the associated AP’s gateway. |
VLAN Interface | If you selected the Tunnel forwarding mode, select a VLAN interface. All the wireless station’s traffic is forwarded to the Zyxel Device first. |
Hidden SSID | Select this if you want to “hide” your SSID from wireless clients. This tells any wireless clients in the vicinity of the AP using this SSID profile not to display its SSID name as a potential connection. Not all wireless clients respect this flag and display it anyway. When an SSID is “hidden” and a wireless client cannot see it, the only way you can connect to the SSID is by manually entering the SSID name in your wireless connection setup screen(s) (these vary by client, client connectivity software, and operating system). |
Enable Intra-BSS Traffic Blocking | Select this option to prevent crossover traffic from within the same SSID. |
Enable U-APSD | Select this option to enable Unscheduled Automatic Power Save Delivery (U-APSD), which is also known as WMM-Power Save. This helps increase battery life for battery-powered wireless clients connected to the Zyxel Device using this SSID profile. |
Enable ARP Proxy | The Address Resolution Protocol (ARP) is a protocol for mapping an IP address to a MAC address. An ARP broadcast is sent to all devices on the same Ethernet network to request the MAC address of a target IP address. Select this option to allow the Zyxel Device to answer ARP requests for an IP address on behalf of a client associated with this SSID. This can reduce broadcast traffic and improve network performance. |
802.11 k/v Assisted Roaming | Select this option to enable IEEE 802.11k/v assisted roaming on the Zyxel Device. When the connected clients request 802.11k neighbor lists, the Zyxel Device will response with a list of neighbor APs that can be candidates for roaming. |
Schedule SSID | Select this option and set whether the SSID is enabled or disabled on each day of the week. You also need to select the hour and minute (in 24-hour format) to specify the time period of each day during which the SSID is enabled/enabled. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to add a new security profile. |
Edit | Click this to edit the selected security profile. |
Remove | Click this to remove the selected security profile. |
References | Click this to view which other objects are linked to the selected security profile (for example, SSID profile). |
# | This field is a sequential value, and it is not associated with a specific profile. |
Profile Name | This field indicates the name assigned to the security profile. |
Security Mode | This field indicates this profile’s security mode (if any). |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
Security Mode | Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3. |
Authentication Settings | |
Enterprise | Select this to enable 802.1x secure authentication with a RADIUS server. |
Reauthentication Timer | Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time. |
Idle Timeout | Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued. |
Radius Settings | |
Primary / Secondary Radius Server Activate | Select this to have the Zyxel Device use the specified RADIUS server. |
Radius Server IP Address | Enter the IP address of the RADIUS server to be used for authentication. |
Radius Server Port | Enter the port number of the RADIUS server to be used for authentication. |
Radius Server Secret | Enter the shared secret password of the RADIUS server to be used for authentication. |
Primary / Secondary Accounting Server Activate | Select the check box to enable user accounting through an external authentication server. |
Accounting Server IP Address | Enter the IP address of the external accounting server in dotted decimal notation. |
Accounting Server Port | Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. |
Accounting Share Secret | Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network. |
Accounting Interim Update | This field is available only when you enable user accounting through an external authentication server. Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify. |
Interim Update Interval | Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server. |
MAC Authentication | Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails. An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses. |
Delimiter (Account) | Select the separator the external server uses for the two-character pairs within account MAC addresses. |
Case (Account) | Select the case (upper or lower) the external server requires for letters in the account MAC addresses. |
Delimiter (Calling Station ID) | RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute. Select the separator the external server uses for the pairs in calling station MAC addresses. |
Case (Calling Station ID) | Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
Security Mode | Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3. |
Authentication Settings | |
Transition Mode | Enable this for backwards compatibility. This option is only available if the Security Mode is wpa3 or enhanced-open. This creates two virtual APs (VAPs) with a primary (wpa3 or enhanced-open) and fallback (wpa2 or none) security method. If the Security Mode is wpa3, enabling this will force Management Frame Protection to be set to Optional. If this is disabled or if the Security Mode is enhanced-open, Management Frame Protection will be set to Required. |
Idle Timeout | Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued. |
Radius Settings | |
Primary / Secondary Radius Server Activate | Select this to have the Zyxel Device use the specified RADIUS server. |
Radius Server IP Address | Enter the IP address of the RADIUS server to be used for authentication. |
Radius Server Port | Enter the port number of the RADIUS server to be used for authentication. |
Radius Server Secret | Enter the shared secret password of the RADIUS server to be used for authentication. |
Primary / Secondary Accounting Server Activate | Select the check box to enable user accounting through an external authentication server. |
Accounting Server IP Address | Enter the IP address of the external accounting server in dotted decimal notation. |
Accounting Server Port | Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. |
Accounting Share Secret | Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network. |
Accounting Interim Update | This field is available only when you enable user accounting through an external authentication server. Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify. |
Interim Update Interval | Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server. |
MAC Authentication | Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails. An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses. |
Delimiter (Account) | Select the separator the external server uses for the two-character pairs within account MAC addresses. |
Case (Account) | Select the case (upper or lower) the external server requires for letters in the account MAC addresses. |
Delimiter (Calling Station ID) | RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute. Select the separator the external server uses for the pairs in calling station MAC addresses. |
Case (Calling Station ID) | Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
Security Mode | Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3. |
Authentication Settings | |
Enterprise | Select this to enable 802.1x secure authentication with a RADIUS server. |
Reauthentication Timer | Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time. |
Idle Timeout | Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued. |
Authentication Type | Select a WEP authentication method. Choices are Open or Share key. |
Key Length | Select the bit-length of the encryption key to be used in WEP connections. If you select WEP-64: • Enter 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (for example, 0x11AA22BB33) for each Key used. or • Enter 5 ASCII characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (for example, MyKey) for each Key used. If you select WEP-128: • Enter 26 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (for example, 0x00112233445566778899AABBCC) for each Key used. or • Enter 13 ASCII characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (for example, MyKey12345678) for each Key used. |
Key 1~4 | Based on your Key Length selection, enter the appropriate length hexadecimal or ASCII key. |
Radius Settings | |
Primary / Secondary Radius Server Activate | Select this to have the Zyxel Device use the specified RADIUS server. |
Radius Server IP Address | Enter the IP address of the RADIUS server to be used for authentication. |
Radius Server Port | Enter the port number of the RADIUS server to be used for authentication. |
Radius Server Secret | Enter the shared secret password of the RADIUS server to be used for authentication. |
Primary / Secondary Accounting Server Activate | Select the check box to enable user accounting through an external authentication server. |
Accounting Server IP Address | Enter the IP address of the external accounting server in dotted decimal notation. |
Accounting Server Port | Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. |
Accounting Share Secret | Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network. |
Accounting Interim Update | This field is available only when you enable user accounting through an external authentication server. Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify. |
Interim Update Interval | Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server. |
MAC Authentication | Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails. An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses. |
Delimiter (Account) | Select the separator the external server uses for the two-character pairs within account MAC addresses. |
Case (Account) | Select the case (upper or lower) the external server requires for letters in the account MAC addresses. |
Delimiter (Calling Station ID) | RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute. Select the separator the external server uses for the pairs in calling station MAC addresses. |
Case (Calling Station ID) | Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
Security Mode | Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3. |
Authentication Settings | |
Enterprise | Select this to enable 802.1x secure authentication with a RADIUS server. |
Reauthentication Timer | Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time. |
Personal | This field is available when you select the wpa2, wpa2-mix or wpa3 security mode. Select this option to use a Pre-Shared Key (PSK) with WPA2 encryption or Simultaneous Authentication of Equals (SAE) with WPA3 encryption. |
Pre-Shared Key | Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters. |
Cipher Type | Select an encryption cipher type from the list. • auto - This automatically chooses the best available cipher based on the cipher in use by the wireless client that is attempting to make a connection. • aes - This is the Advanced Encryption Standard encryption method. It is a more recent development over TKIP and considerably more robust. Not all wireless clients may support this. |
Idle Timeout | Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued. |
Group Key Update Timer | Enter the interval (in seconds) at which the AP updates the group WPA2 encryption key. |
Management Frame Protection | This field is available only when you select wpa2 in the Security Mode field and set Cipher Type to aes. Data frames in 802.11 WLANs can be encrypted and authenticated with WEP, WPA or WPA2. But 802.11 management frames, such as beacon/probe response, association request, association response, de-authentication and disassociation are always unauthenticated and unencrypted. IEEE 802.11w Protected Management Frames allows APs to use the existing security mechanisms (encryption and authentication methods defined in IEEE 802.11i WPA/WPA2) to protect management frames. This helps prevent wireless DoS attacks. Select the check box to enable management frame protection (MFP) to add security to 802.11 management frames. Select Optional if you do not require the wireless clients to support MFP. Management frames will be encrypted if the clients support MFP. Select Required and wireless clients must support MFP in order to join the Zyxel Device’s wireless network. |
Fast Roaming Settings | IEEE 802.11r fast roaming, which is also known as Fast BSS Transition (FT), allows wireless clients to quickly move from one AP to another in a WiFi network that uses WPA2 with 802.1x authentication. Information from the original association is passed to the target AP when the client roams. The client doesn’t need to perform the whole 802.1x authentication process. Messages exchanged between the target AP and client are reduced and performed using one of the two methods: • Over-the-DS: The wireless client communicates with the target AP via the current AP. The communication is sent to the target AP through the wired Ethernet connection. • Over-the-Air: The wireless client communicates directly with the target AP. |
802.11r | Select this to turn on IEEE 802.11r fast roaming on the AP (Zyxel Device). This is good for wireless clients that transport a lot of real-time interactive traffic, such as voice and video. Wireless clients should also support WPA2 and fast roaming to associate with the AP (Zyxel Device) and roam seamlessly. |
Radius Settings | |
Primary / Secondary Radius Server Activate | Select this to have the Zyxel Device use the specified RADIUS server. |
Radius Server IP Address | Enter the IP address of the RADIUS server to be used for authentication. |
Radius Server Port | Enter the port number of the RADIUS server to be used for authentication. |
Radius Server Secret | Enter the shared secret password of the RADIUS server to be used for authentication. |
Primary / Secondary Accounting Server Activate | Select the check box to enable user accounting through an external authentication server. |
Accounting Server IP Address | Enter the IP address of the external accounting server in dotted decimal notation. |
Accounting Server Port | Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. |
Accounting Share Secret | Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network. |
Accounting Interim Update | This field is available only when you enable user accounting through an external authentication server. Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify. |
Interim Update Interval | Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server. |
MAC Authentication | Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails. An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses. |
Delimiter (Account) | Select the separator the external server uses for the two-character pairs within account MAC addresses. |
Case (Account) | Select the case (upper or lower) the external server requires for letters in the account MAC addresses. |
Delimiter (Calling Station ID) | RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute. Select the separator the external server uses for the pairs in calling station MAC addresses. |
Case (Calling Station ID) | Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
Security Mode | Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3. |
Authentication Settings | |
Enterprise | Select this to enable 802.1x secure authentication with a RADIUS server. |
Reauthentication Timer | Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time. |
Personal | This field is available when you select the wpa2, wpa2-mix or wpa3 security mode. Select this option to use a Pre-Shared Key (PSK) with WPA2 encryption or Simultaneous Authentication of Equals (SAE) with WPA3 encryption. |
Pre-Shared Key | Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters. |
Transition Mode | Enable this for backwards compatibility. This option is only available if the Security Mode is wpa3 or enhanced-open. This creates two virtual APs (VAPs) with a primary (wpa3 or enhanced-open) and fallback (wpa2 or none) security method. If the Security Mode is wpa3, enabling this will force Management Frame Protection to be set to Optional. If this is disabled or if the Security Mode is enhanced-open, Management Frame Protection will be set to Required. |
Idle Timeout | Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued. |
Group Key Update Timer | Enter the interval (in seconds) at which the AP updates the group WPA2 encryption key. |
Management Frame Protection | This field is available only when you select wpa2 in the Security Mode field and set Cipher Type to aes. Data frames in 802.11 WLANs can be encrypted and authenticated with WEP, WPA or WPA2. But 802.11 management frames, such as beacon/probe response, association request, association response, de-authentication and disassociation are always unauthenticated and unencrypted. IEEE 802.11w Protected Management Frames allows APs to use the existing security mechanisms (encryption and authentication methods defined in IEEE 802.11i WPA/WPA2) to protect management frames. This helps prevent wireless DoS attacks. Select the check box to enable management frame protection (MFP) to add security to 802.11 management frames. Select Optional if you do not require the wireless clients to support MFP. Management frames will be encrypted if the clients support MFP. Select Required and wireless clients must support MFP in order to join the Zyxel Device’s wireless network. |
Radius Settings | |
Primary / Secondary Radius Server Activate | Select this to have the Zyxel Device use the specified RADIUS server. |
Radius Server IP Address | Enter the IP address of the RADIUS server to be used for authentication. |
Radius Server Port | Enter the port number of the RADIUS server to be used for authentication. |
Radius Server Secret | Enter the shared secret password of the RADIUS server to be used for authentication. |
Primary / Secondary Accounting Server Activate | Select the check box to enable user accounting through an external authentication server. |
Accounting Server IP Address | Enter the IP address of the external accounting server in dotted decimal notation. |
Accounting Server Port | Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information. |
Accounting Share Secret | Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network. |
Accounting Interim Update | This field is available only when you enable user accounting through an external authentication server. Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify. |
Interim Update Interval | Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server. |
MAC Authentication | Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails. An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses. |
Delimiter (Account) | Select the separator the external server uses for the two-character pairs within account MAC addresses. |
Case (Account) | Select the case (upper or lower) the external server requires for letters in the account MAC addresses. |
Delimiter (Calling Station ID) | RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute. Select the separator the external server uses for the pairs in calling station MAC addresses. |
Case (Calling Station ID) | Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to add a new MAC filtering profile. |
Edit | Click this to edit the selected MAC filtering profile. |
Remove | Click this to remove the selected MAC filtering profile. |
References | Click this to view which other objects are linked to the selected MAC filtering profile (for example, SSID profile). |
# | This field is a sequential value, and it is not associated with a specific profile. |
Profile Name | This field indicates the name assigned to the MAC filtering profile. |
Filter Action | This field indicates this profile’s filter action (if any). |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed. |
Filter Action | Select allow to permit the wireless client with the MAC addresses in this profile to connect to the network through the associated SSID; select deny to block the wireless clients with the specified MAC addresses. |
Add | Click this to add a MAC address to the profile’s list. |
Edit | Click this to edit the selected MAC address in the profile’s list. |
Remove | Click this to remove the selected MAC address from the profile’s list. |
# | This field is a sequential value, and it is not associated with a specific profile. |
MAC | This field specifies a MAC address associated with this profile. |
Description | This field displays a description for the MAC address associated with this profile. You can click the description to make it editable. Enter up to 60 characters, spaces and underscores allowed. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to add a new monitor mode profile. |
Edit | Click this to edit the selected monitor mode profile. |
Remove | Click this to remove the selected monitor mode profile. |
Activate | To turn on an entry, select it and click Activate. |
Inactivate | To turn off an entry, select it and click Inactivate. |
References | Click this to view which other objects are linked to the selected monitor mode profile (for example, an AP management profile). |
# | This field is a sequential value, and it is not associated with a specific user. |
Status | This icon is lit when the entry is active and dimmed when the entry is inactive. |
Profile Name | This field indicates the name assigned to the monitor profile. |
Apply | Click Apply to save your changes back to the Zyxel Device. |
Reset | Click Reset to return the screen to its last-saved settings. |
Label | Description |
---|---|
Activate | Select this to activate this monitor mode profile. |
Profile Name | This field indicates the name assigned to the monitor mode profile. |
Channel dwell time | Enter the interval (in milliseconds) before the AP switches to another channel for monitoring. |
Scan Channel Mode | Select auto to have the AP switch to the next sequential channel once the Channel dwell time expires. Select manual to set specific channels through which to cycle sequentially when the Channel dwell time expires. Selecting this options makes the Scan Channel List options available. |
Country Code | Select the country code of where the Zyxel Device is located/installed. The available channels vary depending on the country you selected. Be sure to select the correct/same country for both radios on an AP and all connected APs, in order to prevent roaming failure and interference to other systems. For US and Canada models, country code is fixed to US or Canada respectively and is not user selectable. |
Set Scan Channel List (2.4 GHz) | Move a channel from the Available channels column to the Channels selected column to have the APs using this profile scan that channel when Scan Channel Mode is set to manual. These channels are limited to the 2 GHz range (802.11 b/g/n). |
Set Scan Channel List (5 GHz) | Move a channel from the Available channels column to the Channels selected column to have the APs using this profile scan that channel when Scan Channel Mode is set to manual. These channels are limited to the 5 GHz range (802.11 a/n). |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Hide / Show Advanced Settings | Click this to display a greater or lesser number of configuration fields. |
ZyMesh Provision Group | By default, this shows the MAC address used by the Zyxel Device’s first Ethernet port. Say you have two AP controllers (Zyxel Devices) in your network and the primary AP controller is not reachable. You may want to deploy the second/backup AP controller in your network to replace the primary AP controller. In this case, it is recommended that you enter the primary AP controller’s ZyMesh Provision Group MAC address in the second AP controller’s ZyMesh Provision Group field. If you didn’t change the second AP controller’s MAC address, managed APs in an existing ZyMesh can still access the networks through the second AP controller and communicate with each other. But new managed APs will not be able to communicate with the managed APs in the existing ZyMesh, which is set up with the primary AP controller’s MAC address. To allow all managed APs to communicate in the same ZyMesh, you can just set the second AP controller to use the primary AP controller’s MAC address. Otherwise, reset all managed APs to the factory defaults and set up a new ZyMesh with the second AP controller’s MAC address. |
Next | Click this button and follow the on-screen instructions to update the AP controller’s MAC address. |
Add | Click this to add a new profile. |
Edit | Click this to edit the selected profile. |
Remove | Click this to remove the selected profile. |
# | This field is a sequential value, and it is not associated with a specific profile. |
Profile Name | This field indicates the name assigned to the profile. |
ZyMesh SSID | This field shows the SSID specified in this ZyMesh profile. |
Label | Description |
---|---|
Profile Name | Enter up to 31 alphanumeric characters for the profile name. |
ZyMesh SSID | Enter the SSID with which you want the managed AP to connect to a root AP or repeater to build a ZyMesh link. The ZyMesh SSID is hidden in the outgoing beacon frame so a wireless device cannot obtain the SSID through scanning using a site survey tool. |
Pre-Shared Key | Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters. The key is used to encrypt the wireless traffic between the APs. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
http:// | www. | zyxel. | com |
---|---|---|---|
host name | second-level domain name | top-level domain name | |
FQDN | |||
Uniform Resource Locator (URL) |
Label | Description |
---|---|
IPv4 Address Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry |
# | This field is a sequential value, and it is not associated with a specific address. |
Name | This field displays the configured name of each address object. |
Type | This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces. |
IPv4 Address | This field displays the IPv4 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings. |
Reference | This displays the number of times an object reference is used in a profile. |
IPv6 Address Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific address. |
Name | This field displays the configured name of each address object. |
Type | This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces. |
IPv6 Address | This field displays the IPv6 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Name | Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Address Type | Select the type of address you want to create. The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object. |
IP Address | This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents. |
Starting IP Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents. |
Ending IP Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents. |
Network | This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the IP address of the network that this address object represents. |
Netmask | This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the subnet mask of the network that this address object represents. Use dotted decimal format. |
Interface | If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents. |
Region | If you selected GEOGRAPHY as the Address Type, use this field to select a country or continent. A GEOGRAPHY object uses the data from the country-to-IP/continent-to-IP address database. Go to the Configuration > Object > Address/Geo IP > Geo IP screen to configure the custom country-to-IP/continent-to-IP address mappings for a GEOGRAPHY object. |
Country | If you selected Geography as the Address Type, use this field to select a country. |
FQDN | If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Name | Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Object Type | Select the type of address you want to create. The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object. |
IPv6 Address | This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents. |
IPv6 Starting Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents. |
IPv6 Ending Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents. |
IPv6 Address Prefix | This field is only available if the Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address. |
Interface | If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents. |
IPv6 Address Type | Select whether the IPv6 address is a link-local IP address (LINK LOCAL), static IP address (STATIC), an IPv6 StateLess Address Auto Configuration IP address (SLAAC), or is obtained from a DHCPv6 server (DHCPv6). |
Region | If you selected Geography as the Address Type, use this field to select a country or continent. |
FQDN | If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
IPv4 Address Group Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific address group. |
Name | This field displays the name of each address group. |
Description | This field displays the description of each address group, if any. |
Reference | This displays the number of times an object reference is used in a profile. |
IPv6 Address Group Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific address group. |
Name | This field displays the name of each address group. |
Description | This field displays the description of each address group, if any. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Name | Enter a name for the address group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Description | This field displays the description of each address group, if any. You can use up to 60 characters, punctuation marks, and spaces. |
Address Type | Select the type of address you want to create. The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object. |
Member List | The Member list displays the names of the address and address group objects that have been added to the address group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. Only objects of the same address type can be added to a address group. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Country Database Update | |
Latest Version | This is the latest country-to-IP address database version on myZyxel. You need to have a registered Content Filter Service license. |
Current Version | This is the country-to-IP address database version currently on the Zyxel Device. |
Update Now | Click this to check for the latest country-to-IP address database version on myZyxel. The latest version is downloaded to the Zyxel Device and replaces the current version if it is newer. There are logs to show the update status. You need to have a registered Content Filter Service license. |
Auto Update | If you want the Zyxel Device to check weekly for the latest country-to-IP address database version on myZyxel, select the checkbox, choose a day and time each week and then click Apply. The default day and time displayed is the Zyxel Device current day and time. |
Custom IPv4/IPv6 to Geography Rules | |
IPv4/IPv6 to Geography | Enter an IP address, then click this button to query which country this IP address belongs to. |
Add | Click this to create a new entry. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
# | This field is a sequential value, and it is not associated with a specific entry. |
Geolocation | This field displays the name of the country or region that is associated with this IP address. |
Type | This field displays whether this address object is HOST, RANGE or SUBNET. |
IPv4/IPv6 Address | This field displays the IPv4/IPv6 addresses represented by the type of address object. |
Region vs. Continent | |
Region | Enter a country name, then click the Region to Continent button to query which continent this country belongs to. |
Continent | Select a continent, then click the Region List button to query which countries belong to the continent. |
Apply | Click Apply to save the changes. |
Reset | Click Reset to return the screen to its last-saved settings. |
Label | Description |
---|---|
Region | Select the country or continent that maps to this IP address. |
Address Type | Select the type of address you want to create. Choices are: HOST, RANGE, SUBNET. |
IP Address | This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents. |
IP Starting Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents. |
IP Ending Address | This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents. |
Network / Netmask | These fields are only available if the IPv4 Address Type is SUBNET. They cannot be blank. Enter the network IP and subnet mask that defines the IPv4 subnet. |
IPv6 Address Prefix | This field is only available if the IPv6 Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific service. |
Name | This field displays the name of each service. |
Content | This field displays a description of each service. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Name | Type the name used to refer to the service. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
IP Protocol | Select the protocol the service uses. Choices are: TCP, UDP, ICMP, ICMPv6, and User Defined. |
Starting Port Ending Port | This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports. |
ICMP Type | This field appears if the IP Protocol is ICMP or ICMPv6. Select the ICMP message used by this service. This field displays the message text, not the message number. |
IP Protocol Number | This field appears if the IP Protocol is User Defined. Enter the number of the next-level protocol (IP protocol). Allowed values are 1 - 255. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific service group. |
Family | This field displays the Server Group supported type, which is according to your configurations in the Service Group Add/Edit screen. There are 3 types of families: • IPv4 only • IPv6 only • IPv4 and IPv6 |
Name | This field displays the name of each service group. By default, the Zyxel Device uses services starting with “Default_Allow_” in the security policies to allow certain services to connect to the Zyxel Device. |
Description | This field displays the description of each service group, if any. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Name | Enter the name of the service group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Description | Enter a description of the service group, if any. You can use up to 60 printable ASCII characters. |
Configuration | The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
One Time | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific schedule. |
Name | This field displays the name of the schedule, which is used to refer to the schedule. |
Start Day / Time | This field displays the date and time at which the schedule begins. |
Stop Day / Time | This field displays the date and time at which the schedule ends. |
Reference | This displays the number of times an object reference is used in a profile. |
Recurring | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific schedule. |
Name | This field displays the name of the schedule, which is used to refer to the schedule. |
Start Time | This field displays the time at which the schedule begins. |
Stop Time | This field displays the time at which the schedule ends. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Configuration | |
Name | Type the name used to refer to the one-time schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Day Time | |
StartDate | Specify the year, month, and day when the schedule begins. • Year - 1900 - 2999 • Month - 1 - 12 • Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.) |
StartTime | Specify the hour and minute when the schedule begins. • Hour - 0 - 23 • Minute - 0 - 59 |
StopDate | Specify the year, month, and day when the schedule ends. • Year - 1900 - 2999 • Month - 1 - 12 • Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.) |
StopTime | Specify the hour and minute when the schedule ends. • Hour - 0 - 23 • Minute - 0 - 59 |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Configuration | |
Name | Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Date Time | |
StartTime | Specify the hour and minute when the schedule begins each day. • Hour - 0 - 23 • Minute - 0 - 59 |
StopTime | Specify the hour and minute when the schedule ends each day. • Hour - 0 - 23 • Minute - 0 - 59 |
Weekly | |
Week Days | Select each day of the week the recurring schedule is effective. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
label | description |
---|---|
Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific schedule. |
Name | This field displays the name of the schedule group, which is used to refer to the schedule. |
Description | This field displays the description of the schedule group. |
Members | This field lists the members in the schedule group. Each member is separated by a comma. |
Reference | This displays the number of times an object reference is used in a profile. |
label | description |
---|---|
Group Members | |
Name | Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Description | Enter a description of the service group, if any. You can use up to 60 printable ASCII characters. |
Member List | The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important. Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Move any members you do not want included to the Available list. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
label | description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific AD or LDAP server. |
Name | This field displays the name of the Active Directory. |
Server Address | This is the address of the AD or LDAP server. |
Base DN | This specifies a directory. For example, o=Zyxel, c=US. |
label | description |
---|---|
Name | Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes. |
Description | Enter the description of each server, if any. You can use up to 60 printable ASCII characters. |
Server Address | Enter the address of the AD or LDAP server. |
Backup Server Address | If the AD or LDAP server has a backup server, enter its address here. |
Port | Specify the port number on the AD or LDAP server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. This port number should be the same on all AD or LDAP server(s) in this group. |
Base DN | Specify the directory (up to 127 alphanumerical characters). For example, o=Zyxel, c=US. This is only for LDAP. |
Use SSL | Select Use SSL to establish a secure connection to the AD or LDAP server(s). |
Search time limit | Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the AD or LDAP server. In this case, user authentication fails. Search timeout occurs when either the user information is not in the AD or LDAP server(s) or the AD or LDAP server(s) is down. |
Case-sensitive User Names | Select this if the server checks the case of the usernames. |
Bind DN | Specify the bind DN for logging into the AD or LDAP server. Enter up to 127 alphanumerical characters. For example, cn=zywallAdmin specifies zywallAdmin as the user name. |
Password | If required, enter the password (up to 15 alphanumerical characters) for the Zyxel Device to bind (or log in) to the AD or LDAP server. |
Retype to Confirm | Retype your new password for confirmation. |
Login Name Attribute | Enter the type of identifier the users are to use to log in. For example “name” or “email address”. |
Alternative Login Name Attribute | If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”. |
Group Membership Attribute | An AD or LDAP server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device is to check to determine to which group a user belongs. The value for this attribute is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values. For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”. |
Domain Authentication for MSChap | Select the Enable checkbox to enable domain authentication for MSChap. This is only for Active Directory. |
User Name | Enter the user name for the user who has rights to add a machine to the domain. This is only for Active Directory. |
User Password | Enter the password for the associated user name. This is only for Active Directory. |
Retype to Confirm | Retype your new password for confirmation. This is only for Active Directory. |
Realm | Enter the realm FQDN. This is only for Active Directory. |
NetBIOS Name | Type the NetBIOS name. This field is optional. NetBIOS packets are TCP or UDP packets that enable a computer to connect to and communicate with a LAN which allows local computers to find computers on the remote network and vice versa. |
Configuration Validation | Use a user account from the server specified above to test if the configuration is correct. Enter the account’s user name in the Username field and click Test. |
OK | Click OK to save the changes. |
Cancel | Click Cancel to discard the changes. |
label | description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field displays the index number. |
Name | This is the name of the RADIUS server entry. |
Server Address | This is the address of the AD or LDAP server. |
label | description |
---|---|
Name | Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes. |
Description | Enter the description of each server, if any. You can use up to 60 printable ASCII characters. |
Server Address | Enter the address of the RADIUS server. |
Authentication Port | Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. |
Backup Server Address | If the RADIUS server has a backup server, enter its address here. |
Backup Authentication Port | Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. |
Key | Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device. The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device. |
Change of Authorization | The external RADIUS server can change its authentication policy and send CoA (Change of Authorization) or RADIUS Disconnect messages in order to terminate the subscriber’s service. Select this option to allow the Zyxel Device to disconnect wireless clients based on the information (such as client’s user name and MAC address) specified in CoA or RADIUS Disconnect messages sent by the RADIUS server. |
Server Address | Enter the IP address or Fully-Qualified Domain Name (FQDN) of the RADIUS accounting server. |
Accounting Port | Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535. |
Backup Server Address | If the RADIUS server has a backup accounting server, enter its address here. |
Backup Accounting Port | Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535. |
Key | Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device. The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device. |
Maximum Retry Count | At times the Zyxel Device may not be able to use the primary RADIUS accounting server. Specify the number of times the Zyxel Device should reattempt to use the primary RADIUS server before attempting to use the secondary RADIUS server. This also sets how many times the Zyxel Device will attempt to use the secondary RADIUS server. For example, you set this field to 3. If the Zyxel Device does not get a response from the primary RADIUS server, it tries again up to three times. If there is no response, the Zyxel Device tries the secondary RADIUS server up to three times. If there is also no response from the secondary RADIUS server, the Zyxel Device stops attempting to authenticate the subscriber. The subscriber will see a message that says the RADIUS server was not found. |
Enable Accounting Interim Update | This field is configurable only after you configure a RADIUS accounting server address. Select this to have the Zyxel Device send subscriber status updates to the RADIUS server at the interval you specify. |
Interim Interval | Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the RADIUS server. |
Timeout | Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the RADIUS server. In this case, user authentication fails. Search timeout occurs when either the user information is not in the RADIUS server or the RADIUS server is down. |
NAS IP Address | Type the IP address of the NAS (Network Access Server). |
NAS Identifier | If the RADIUS server requires the Zyxel Device to provide the Network Access Server identifier attribute with a specific value, enter it here. |
Case-sensitive User Names | Select this if you want configure your username as case-sensitive. |
Group Membership Attribute | A RADIUS server defines attributes for its accounts. Select the name and number of the attribute that the Zyxel Device is to check to determine to which group a user belongs. If it does not display, select user-defined and specify the attribute’s number. This attribute’s value is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values. For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”. |
OK | Click OK to save the changes. |
Cancel | Click Cancel to discard the changes. |
label | description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field displays the index number. |
Method Name | This field displays a descriptive name for identification purposes. |
Method List | This field displays the authentication method(s) for this entry. |
label | description |
---|---|
Name | Specify a descriptive name for identification purposes. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”. |
Add | Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
Move | To change a method’s position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed. The ordering of your methods is important as Zyxel Device authenticates the users using the authentication methods in the order they appear in this screen. |
# | This field displays the index number. |
Method List | Select a server object from the drop-down list box. You can create a server object in the AAA Server screen. The Zyxel Device authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen. If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server. |
OK | Click OK to save the changes. |
Cancel | Click Cancel to discard the changes. |
label | description |
---|---|
General Settings | |
Enable | Select the check box to require double-layer security to access a secured network behind the Zyxel Device via a VPN tunnel. |
Valid Time | Enter the maximum time (in minutes) that the user must click or tap the authorization link in the SMS or email in order to get authorization for the VPN connection. |
Two-factor Authentication for Services: | Select which kinds of VPN tunnels require Two-Factor Authentication. You should have configured the VPN tunnel first. • SSL VPN Access • IPSec VPN Access • L2TP/IPSec VPN Access |
User/Group | This list displays the names of the users and user groups that can be selected for two-factor authentication. The order of members is not important. Select users and groups from the Selectable User/Group Objects list that require two-factor authentication for VPN access to a secured network behind the Zyxel Device and move them to the Selected User/Group Objects list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them. Similarly, move user/groups that do not you do not require two-factor authentication back to the Selectable User/Group Objects list. |
Delivery Settings | Use this section to configure how to send an SMS or email for authorization. |
Deliver Authorize Link Method: | Select one or both methods: • SMS: Object > User/Group > User must contain a valid mobile telephone number. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-]. • Email: Object > User/Group > User must contain a valid email address. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com |
Authorize Link URL Address: | Configure the link that the user will receive in the SMS or email. The user must be able to access the link. • http/https: you must enable HTTP or HTTPS in System > WWW > Service Control • From Interface/User-Defined: select the Zyxel Device WAN interface (wan1/2) or select User-Defined and then enter an IP address. |
Message | You can either create a default message in the text box or upload a message file (Use Multilingual file) from your computer. The message file must be named '2FA-msg.txt' and be in UTF-8 format. To create the file, click Download the default 2FA-msg.txt example and edit the file for your needs. (If you make a mistake, use Restore Customized File to Default to restore your customized file to the default.) Use Select a File Path to locate the final file on your computer and then click Upload to transfer it to the Zyxel Device. The message in either the text box or the file must contain the <url> variable within angle brackets, while the <user>, <host>, and <time> variables are optional. |
Apply | Click Apply to save the changes. |
Reset | Click Reset to return the screen to its last-saved settings. |
label | description |
---|---|
General Settings | |
Enable | Select the check box to require double-layer security to access a secured network behind the Zyxel Device via the Web Configurator, SSH, or Telnet. |
Valid Time | Enter the maximum time (in minutes) that the user must click or tap the authorization link in the SMS or email in order to get authorization for logins via the Web Configurator, SSH, or Telnet. |
Two-factor Authentication for Services: | Select which services require Two-Factor Authentication for the admin user. • Web • SSH • TELNET |
Delivery Settings | Use this section to configure how to send an SMS or email for authorization. |
Verification Code Delivery Method | Select one or both (All) methods: • SMS: Object > User/Group > User must contain a valid mobile telephone number. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-]. • Email: Object > User/Group > User must contain a valid email address. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com |
Apply | Click Apply to save the changes. |
Reset | Click Reset to return the screen to its last-saved settings. |
Label | Description |
---|---|
PKI Storage Space in Use | This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates. |
Add | Click this to go to the screen where you can have the Zyxel Device generate a certificate or a certification request. |
Edit | Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate. |
Remove | The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action. |
References | You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry. |
Download | Click this and the following screen will appear. Type the selected certificate’s password and save the selected certificate to your computer. |
Email | Click this to email the selected certificate to the configured email address(es) for SSL connection establishment. This enables you to establish an SSL connection on your laptops, tablets, or smartphones. • Mail Subject: Type the subject line for outgoing email from the Zyxel Device. • Mail To: Type the email address (or addresses) to which the outgoing email is delivered. • Send Certificate with Private Key: Select the check box to send the selected certificate with a private key. • Password: Enter a private key of up to 31 keyboard characters for the certificate. The special characters listed in the brackets [;\|`~!@#$%^&*()_+\\{}':,./<>=-"] are allowed. • E-mail Content: Create the email content in English, and use up to 250 keyboard characters. The special characters listed in the brackets [;\|`~!@#$%^&*()_+\\{}':,./<>=-"] are allowed. • Compress as a ZIP File: Select the check box to compress the selected certificate. Make sure the endpoint devices can decompress ZIP files before sending the compressed certificate. It's recommended to compress the certificate with a private key. Some email servers block PKCS #12 files. • Send Email: Click this to send the selected certificate. • Cancel: Click this to return to the previous screen without saving your changes. |
# | This field displays the certificate index number. The certificates are listed in alphabetical order. |
Name | This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name. |
Type | This field displays what kind of certificate this is. REQ represents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate. Use the My Certificate Import screen to import the certificate and replace the request. SELF represents a self-signed certificate. CERT represents a certificate issued by a certification authority. |
Subject | This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information. |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. |
Valid From | This field displays the date that the certificate becomes applicable. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. |
Import | Click Import to open a screen where you can save a certificate to the Zyxel Device. |
Refresh | Click Refresh to display the current validity status of the certificates. |
Label | Description |
---|---|
Name | Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. |
Subject Information | Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although you must specify a Host IP Address, Host IPv6 Address, Host Domain Name, or E-Mail. The certification authority may add fields (such as a serial number) to the subject information when it issues a certificate. It is recommended that each certificate have unique subject information. Select a radio button to identify the certificate’s owner by IP address, domain name or email address. Type the IP address (in dotted decimal notation), domain name or email address in the field provided. The domain name or email address is for identification purposes only and can be any string. A domain name can be up to 255 characters. You can use alphanumeric characters, the hyphen and periods. An email address can be up to 63 characters. You can use alphanumeric characters, the hyphen, the @ symbol, periods and the underscore. |
Organizational Unit | Identify the organizational unit or department to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
Organization | Identify the company or group to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
Town (City) | Identify the town or city where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
State, (Province) | Identify the state or province where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore. |
Country | Enter a two-letter country code to Identify the nation where the certificate owner is located. |
Key Type | Select RSA to use the Rivest, Shamir and Adleman public-key algorithm. Select DSA to use the Digital Signature Algorithm public-key algorithm. |
Key Length | Select a number from the drop-down list box to determine how many bits the key should use (1024 to 2048). The longer the key, the more secure it is. A longer key also uses more PKI storage space. |
LifeTimes | Select how long the certificate is valid. It can be valid from 2 to 10 years. |
Extended Key Usage | |
Server Authentication | Select this to have Zyxel Device generate and store a request for server authentication certificate. |
Client Authentication | Select this to have Zyxel Device generate and store a request for client authentication certificate. |
IKE Intermediate | Select this to have Zyxel Device generate and store a request for IKE Intermediate authentication certificate. |
Create a self-signed certificate | Select this to have the Zyxel Device generate the certificate and act as the Certification Authority (CA) itself. This way you do not need to apply to a certification authority for certificates. |
Create a certification request and save it locally for later manual enrollment | Select this to have the Zyxel Device generate and store a request for a certificate. Use the My Certificate Details screen to view the certification request and copy it to send to the certification authority. Copy the certification request from the My Certificate Details screen and then send it to the certification authority. |
OK | Click OK to begin certificate or certification request generation. |
Cancel | Click Cancel to quit and return to the My Certificates screen. |
Label | Description |
---|---|
Name | This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. |
Certification Path | This field displays for a certificate, not a certification request. Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself). If the issuing certification authority is one that you have imported as a trusted certification authority, it may be the only certification authority in the list (along with the certificate itself). If the certificate is a self-signed certificate, the certificate itself is the only one in the list. The Zyxel Device does not trust the certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked. |
Refresh | Click Refresh to display the certification path. |
Certificate Information | These read-only fields display detailed information about the certificate. |
Type | This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). “X.509” means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates. |
Version | This field displays the X.509 version number. |
Serial Number | This field displays the certificate’s identification number given by the certification authority or generated by the Zyxel Device. |
Subject | This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O), State (ST), and Country (C). |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country. With self-signed certificates, this is the same as the Subject Name field. “none” displays for a certification request. |
Signature Algorithm | This field displays the type of algorithm that was used to sign the certificate. The Zyxel Device uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Some certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm). |
Valid From | This field displays the date that the certificate becomes applicable. “none” displays for a certification request. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. “none” displays for a certification request. |
Key Algorithm | This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example). |
Subject Alternative Name | This field displays the certificate owner‘s IP address (IP), domain name (DNS) or email address (EMAIL). |
Key Usage | This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. |
Extended Key Usage | This field displays how the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate. |
Basic Constraint | This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path. This field does not display for a certification request. |
MD5 Fingerprint | This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm. |
SHA1 Fingerprint | This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm. |
Certificate in PEM (Base-64) Encoded Format | This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form. You can copy and paste a certification request into a certification authority’s web page, an email that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment. You can copy and paste a certificate into an email to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution (via external storage device for example). |
Export Certificate Only | Use this button to save a copy of the certificate without its private key. Click this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save. |
Password | If you want to export the certificate with its private key, create a password and type it here. Make sure you keep this password in a safe place. You will need to use it if you import the certificate to another device. |
Export Certificate with Private Key | Use this button to save a copy of the certificate with its private key. Type the certificate’s password and click this button. Click Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save. |
OK | Click OK to save your changes back to the Zyxel Device. You can only change the name. |
Cancel | Click Cancel to quit and return to the My Certificates screen. |
Label | Description |
---|---|
File Path | Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device. |
Browse | Click Browse to find the certificate file you want to upload. |
Password | This field only applies when you import a binary PKCS#12 format file. Type the file’s password that was created when the PKCS #12 file was exported. |
OK | Click OK to save the certificate on the Zyxel Device. |
Cancel | Click Cancel to quit and return to the My Certificates screen. |
Label | Description |
---|---|
PKI Storage Space in Use | This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates. |
Edit | Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate. |
Remove | The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action. |
References | You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field displays the certificate index number. The certificates are listed in alphabetical order. |
Name | This field displays the name used to identify this certificate. |
Subject | This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information. |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field. |
Valid From | This field displays the date that the certificate becomes applicable. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. |
Import | Click Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the Zyxel Device. |
Refresh | Click this button to display the current validity status of the certificates. |
Label | Description |
---|---|
Name | This field displays the identifying name of this certificate. You can change the name. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters. |
Certification Path | Click the Refresh button to have this read-only text box display the end entity’s certificate and a list of certification authority certificates that shows the hierarchy of certification authorities that validate the end entity’s certificate. If the issuing certification authority is one that you have imported as a trusted certificate, it may be the only certification authority in the list (along with the end entity’s own certificate). The Zyxel Device does not trust the end entity’s certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked. |
Refresh | Click Refresh to display the certification path. |
Enable X.509v3 CRL Distribution Points and OCSP checking | Select this check box to turn on/off certificate revocation. When it is turned on, the Zyxel Device validates a certificate by getting Certificate Revocation List (CRL) through HTTP or LDAP (can be configured after selecting the LDAP Server check box) and online responder (can be configured after selecting the OCSP Server check box). |
OCSP Server | Select this check box if the directory server uses OCSP (Online Certificate Status Protocol). |
URL | Type the protocol, IP address and path name of the OCSP server. |
ID | The Zyxel Device may need to authenticate itself in order to assess the OCSP server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority). |
Password | Type the password (up to 31 ASCII characters) from the entity maintaining the OCSP server (usually a certification authority). |
LDAP Server | Select this check box if the directory server uses LDAP (Lightweight Directory Access Protocol). LDAP is a protocol over TCP that specifies how clients access directories of certificates and lists of revoked certificates. |
Address | Type the IP address (in dotted decimal notation) of the directory server. |
Port | Use this field to specify the LDAP server port number. You must use the same server port number that the directory server uses. 389 is the default server port number for LDAP. |
ID | The Zyxel Device may need to authenticate itself in order to assess the CRL directory server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority). |
Password | Type the password (up to 31 ASCII characters) from the entity maintaining the CRL directory server (usually a certification authority). |
Certificate Information | These read-only fields display detailed information about the certificate. |
Type | This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates. |
Version | This field displays the X.509 version number. |
Serial Number | This field displays the certificate’s identification number given by the certification authority. |
Subject | This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C). |
Issuer | This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country. With self-signed certificates, this is the same information as in the Subject Name field. |
Signature Algorithm | This field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm). |
Valid From | This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable. |
Valid To | This field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired. |
Key Algorithm | This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example). |
Subject Alternative Name | This field displays the certificate’s owner‘s IP address (IP), domain name (DNS) or email address (EMAIL). |
Key Usage | This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text. |
Extended Key Usage | This field displays the method that the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate. |
Basic Constraint | This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path. |
MD5 Fingerprint | This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate. |
SHA1 Fingerprint | This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate. |
Certificate | This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form. You can copy and paste the certificate into an email to send to friends or colleagues or you can copy and paste the certificate into a text editor and save the file on a management computer for later distribution (via external storage device for example). |
Export Certificate | Click this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save. |
OK | Click OK to save your changes back to the Zyxel Device. You can only change the name. |
Cancel | Click Cancel to quit and return to the Trusted Certificates screen. |
Label | Description |
---|---|
File Path | Type in the location of the file you want to upload in this field or click Browse to find it. You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device. |
Browse | Click Browse to find the certificate file you want to upload. |
OK | Click OK to save the certificate on the Zyxel Device. |
Cancel | Click Cancel to quit and return to the previous screen. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to be able to modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific entry. |
Profile Name | This field displays the profile name of the ISP account. This name is used to identify the ISP account. |
Protocol | This field displays the protocol used by the ISP account. |
Authentication Type | This field displays the authentication type used by the ISP account. |
User Name | This field displays the user name of the ISP account. |
Label | Description |
---|---|
Profile Name | This field is read-only if you are editing an existing account. Type in the profile name of the ISP account. The profile name is used to refer to the ISP account. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Protocol | This field is read-only if you are editing an existing account. Select the protocol used by the ISP account. Your ISP will provide you with a related username, password and IP (server) information. Options are: pppoe - This ISP account uses the PPPoE protocol. pptp - This ISP account uses the PPTP protocol. l2tp - This ISP account uses the L2TP protocol. |
Authentication Type | Use the drop-down list box to select an authentication protocol for outgoing calls. Options are: CHAP/PAP - Your Zyxel Device accepts either CHAP or PAP when requested by this remote node. Chap - Your Zyxel Device accepts CHAP only. PAP - Your Zyxel Device accepts PAP only. MSCHAP - Your Zyxel Device accepts MSCHAP only. MSCHAP-V2 - Your Zyxel Device accepts MSCHAP-V2 only. |
Encryption Method | This field is available if this ISP account uses the PPTP protocol. Use the drop-down list box to select the type of Microsoft Point-to-Point Encryption (MPPE). Options are: nomppe - This ISP account does not use MPPE. mppe-40 - This ISP account uses 40-bit MPPE. mppe-128 - This ISP account uses 128-bit MMPE. |
User Name | Type the user name given to you by your ISP. |
Password | Type the password associated with the user name above. The password can only consist of alphanumeric characters (A-Z, a-z, 0-9). This field can be blank. |
Retype to Confirm | Type your password again to make sure that you have entered is correctly. |
IP Address/FQDN | Enter the IP address or Fully-Qualified Domain Name (FQDN) of the PPTP or L2TP server. |
Connection ID | This field is available if this ISP account uses the PPTP protocol. Type your identification name for the PPTP server. This field can be blank. |
Service Name | If this ISP account uses the PPPoE protocol, type the PPPoE service name to access. PPPoE uses the specified service name to identify and reach the PPPoE server. This field can be blank. If this ISP account uses the PPTP protocol, this field is not displayed. |
Compression | Select On button to turn on stac compression, and select Off to turn off stac compression. Stac compression is a data compression technique capable of compressing data by a factor of about four. |
Idle Timeout | This value specifies the number of seconds that must elapse without outbound traffic before the Zyxel Device automatically disconnects from the PPPoE/PPTP server. This value must be an integer between 0 and 360. If this value is zero, this timeout is disabled. |
OK | Click OK to save your changes back to the Zyxel Device. If there are no errors, the program returns to the ISP Account screen. If there are errors, a message box explains the error, and the program stays in the ISP Account Edit screen. |
Cancel | Click Cancel to return to the ISP Account screen without creating the profile (if it is new) or saving any changes to the profile (if it already exists). |
Label | Description |
---|---|
Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific object. |
Name | This field displays the name of each request object. |
Type | This field displays the request type of each request object. |
Interface | This field displays the interface used for each request object. |
Value | This field displays the value for each request object. |
Label | Description |
---|---|
Name | Type the name for this request object. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Request Type | Select the request type for this request object. You can choose from Prefix Delegation, DNS Server, NTP Server, or SIP Server. |
Interface | Select the interface for this request object. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |
Label | Description |
---|---|
Configuration | |
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
# | This field is a sequential value, and it is not associated with a specific object. |
Name | This field displays the name of each lease object. |
Type | This field displays the request type of each lease object. |
Interface | This field displays the interface used for each lease object. |
Value | This field displays the value for each lease object. |
Label | Description |
---|---|
Name | Type the name for this lease object. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. |
Lease Type | Select the lease type for this lease object. You can choose from Prefix Delegation, DNS Server, Address, Address Pool, NTP Server, or SIP Server. |
Interface | Select the interface for this lease object. |
DUID | If you select Prefix Delegation or Address in the Lease Type field, enter the DUID of the interface. |
Address | If you select Address in the Lease Type field, enter the IP address of the DHCPv6 server. |
Prefix | If you select Prefix Delegation or Address in the Lease Type field, enter the IPv6 prefix of the interface. |
DNS Server | If you select DNS Server in the Lease Type field, select a request object or User Defined in the DNS Server field and enter the IP address of the DNS server in the User Defined Address field below. |
Starting IP Address | If you select Address Pool in the Lease Type field, enter the first of the contiguous addresses in the IP address pool. |
End IP Address | If you select Address Pool in the Lease Type field, enter the last of the contiguous addresses in the IP address pool. |
NTP Server | If you select NTP Server in the Lease Type field, select a request object or User Defined in the NTP Server field and enter the IP address of the NTP server in the User Defined Address field below. |
SIP Server | If you select SIP Server in the Lease Type field, select a request object or User Defined in the SIP field and enter the IP address of the SIP server in the User Defined Address field below. |
User Defined Address | If you select DNS Server, NTP Server, or SIP Server as your lease type, you must enter the IP address of the server your selected. |
OK | Click OK to save your changes back to the Zyxel Device. |
Cancel | Click Cancel to exit this screen without saving your changes. |