Object
Zones Overview
Set up zones to configure network security and network policies in the Zyxel Device. A zone is a group of interfaces and/or VPN tunnels. The Zyxel Device uses zones instead of interfaces in many security and policy settings, such as Secure Policies rules, Security Service, and remote management.
Zones cannot overlap. Each Ethernet interface, VLAN interface, bridge interface, PPPoE/PPTP interface and VPN tunnel can be assigned to at most one zone. Virtual interfaces are automatically assigned to the same zone as the interface on which they run.
What You Need to Know
Zones effectively divide traffic into three types--intra-zone traffic, inter-zone traffic, and extra-zone traffic.
Intra-zone Traffic
Intra-zone traffic is traffic between interfaces or VPN tunnels in the same zone.
Inter-zone Traffic
Inter-zone traffic is traffic between interfaces or VPN tunnels in different zones.
Extra-zone Traffic
Extra-zone traffic is traffic to or from any interface or VPN tunnel that is not assigned to a zone.
Some zone-based security and policy settings may apply to extra-zone traffic, especially if you can set the zone attribute in them to Any or All. See the specific feature for more information.
The Zone screen provides a summary of all zones. In addition, this screen allows you to add, edit, and remove zones.
Configuration > Object > Zone 
Label
Description
User Configuration / System Default
The Zyxel Device comes with pre-configured System Default zones that you cannot delete. You can create your own User Configuration zones
Add
Click this to create a new, user-configured zone.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove a user-configured trunk, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.Click Refresh to update information in this screen.
#
This field is a sequential value, and it is not associated with any interface.
Name
This field displays the name of the zone.
Member
This field displays the names of the interfaces that belong to each zone.
Reference
This field displays the number of times an Object Reference is used in a policy.
Zone Edit
The Zone Edit screen allows you to add or edit a zone.
Configuration > Object > Zone > Add/Edit 
Label
Description
Name
For a system default zone, the name is read only.
For a user-configured zone, type the name used to refer to the zone. You may use 1-31 alphanumeric characters, underscores (_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Member List
Available lists the interfaces and VPN tunnels that do not belong to any zone. Select the interfaces and VPN tunnels that you want to add to the zone you are editing, and click the right arrow button to add them.
Member lists the interfaces and VPN tunnels that belong to the zone. Select any interfaces that you want to remove from the zone, and click the left arrow button to remove them.
OK
Click OK to save your customized settings and exit this screen.
Cancel
Click Cancel to exit this screen without saving.
User/Group
This section describes how to set up user accounts, user groups, and user settings for the Zyxel Device. You can also set up rules that control when users have to log in to the Zyxel Device before the Zyxel Device routes traffic for them.
The User screen (see User/Group User Summary) provides a summary of all user accounts.
The Group screen (see User/Group Group Summary) provides a summary of all user groups. In addition, this screen allows you to add, edit, and remove user groups. User groups may consist of access users and other user groups. You cannot put admin users in user groups.
The Setting screen (see User/Group Setting) controls default settings, login settings, lockout settings, and other user settings for the Zyxel Device. You can also use this screen to specify when users must log in to the Zyxel Device before it routes traffic for them.
The MAC Address screen (see User/Group MAC Address Summary) allows you to configure the MAC addresses or OUI (Organizationally Unique Identifier) of wireless clients for MAC authentication using the local user database. The OUI is the first three octets in a MAC address and uniquely identifies the manufacturer of a network device.
What You Need To Know
User Account
A user account defines the privileges of a user logged into the Zyxel Device. User accounts are used in security policies, in addition to controlling access to configuration and services in the Zyxel Device.
User Types
These are the types of user accounts the Zyxel Device uses.
Types of User Accounts 
Type
Abilities
Login Method(s)
Admin Users
 
 
admin
Change Zyxel Device configuration (web, CLI)
WWW, TELNET, SSH, FTP, Console
limited-admin
Look at Zyxel Device configuration (web, CLI)
Perform basic diagnostics (CLI)
WWW, TELNET, SSH, Console
Access Users
 
 
user
Access network services
Browse user-mode commands (CLI)
WWW, TELNET, SSH
guest
Access network services
WWW
ext-user
External user account
WWW
ext-group-user
External group user account
WWW
guest-manager
Create dynamic guest accounts
WWW
dynamic-guest
Access network services
Hotspot Portal
Note: The default admin account is always authenticated locally, regardless of the authentication method setting.
Ext-User Accounts
Set up an ext-user account if the user is authenticated by an external server and you want to set up specific policies for this user in the Zyxel Device. If you do not want to set up policies for this user, you do not have to set up an ext-user account.
All ext-user users should be authenticated by an external server, such as AD, LDAP or RADIUS. If the Zyxel Device tries to use the local database to authenticate an ext-user, the authentication attempt always fails.
Note: If the Zyxel Device tries to authenticate an ext-user using the local database, the attempt always fails.
Once an ext-user user has been authenticated, the Zyxel Device tries to get the user type from the external server. If the external server does not have the information, the Zyxel Device sets the user type for this session to User.
For the rest of the user attributes, such as reauthentication time, the Zyxel Device checks the following places, in order.
1 User account in the remote server.
2 User account (Ext-User) in the Zyxel Device.
3 Default user account for AD users (ad-users), LDAP users (ldap-users) or RADIUS users (radius-users) in the Zyxel Device.
See Setting up User Attributes in an External Server for a list of attributes and how to set up the attributes in an external server.
Ext-Group-User Accounts
Ext-Group-User accounts work are similar to ext-user accounts but allow you to group users by the value of the group membership attribute configured for the AD or LDAP server. See Adding an Active Directory or LDAP Server for more on the group membership attribute.
Dynamic-Guest Accounts
Dynamic guest accounts are guest accounts, but are created dynamically and stored in the Zyxel Device’s local user database. A dynamic guest account has a dynamically-created user name and password. A dynamic guest account user can access the Zyxel Device’s services only within a given period of time and will become invalid after the expiration date/time.
There are three types of dynamic guest accounts depending on how they are created or authenticated: billing-users, ua-users and trial-users.
billing-users are guest account created with the guest manager account or an external printer and paid by cash or created and paid via the on-line payment service. ua-users are users that log in from the user agreement page. trial-users are free guest accounts that are created with the Free Time function.
User Groups
User groups may consist of user accounts or other user groups. Use user groups when you want to create the same rule for several user accounts, instead of creating separate rules for each one.
Note: You cannot put access users and admin users in the same user group.
Note: You cannot put the default admin account into any user group.
The sequence of members in a user group is not important.
User Awareness
By default, users do not have to log into the Zyxel Device to use the network services it provides. The Zyxel Device automatically routes packets for everyone. If you want to restrict network services that certain users can use via the Zyxel Device, you can require them to log in to the Zyxel Device first. The Zyxel Device is then ‘aware’ of the user who is logged in and you can create ‘user-aware policies’ that define what services they can use. See User /Group Technical Reference for a user-aware login example.
Finding Out More
See User /Group Technical Reference for some information on users who use an external authentication server in order to log in.
The Zyxel Device supports TTLS using PAP so you can use the Zyxel Device’s local user database to authenticate users with WPA or WPA2 instead of needing an external RADIUS server.
User/Group User Summary
The User screen provides a summary of all user accounts.
Configuration > Object > User/Group > User 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific user.
User Name
This field displays the user name of each user.
User Type
This field displays the types of user accounts the Zyxel Device uses:
admin - this user can look at and change the configuration of the Zyxel Device
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it
dynamic-guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
user - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI).
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
guest-manager - this user can log in via the web configurator login screen and create dynamic guest accounts using the Account Generator screen that pops up.
Description
This field displays the description for each user.
Reference
This displays the number of times an object reference is used in a profile.
User Add/Edit General
The User Add/Edit General screen allows you to create a new user account or edit an existing one.
Rules for User Names
Enter a user name from 1 to 31 characters.
The user name can only contain the following characters:
Alphanumeric A-z 0-9 (there is no unicode support)
_ [underscores]
- [dashes]
The first character must be alphabetical (A-Z a-z), an underscore (_), or a dash (-). Other limitations on user names are:
User names are case-sensitive. If you enter a user 'bob' but use 'BOB' when connecting via CIFS or FTP, it will use the account settings used for 'BOB' not ‘bob’.
User names have to be different than user group names.
Here are the reserved user names:
adm
admin
any
bin
daemon
debug
devicehaecived
ftp
games
halt
ldap-users
lp
mail
news
nobody
operator
radius-users
root
shutdown
sshd
sync
uucp
zyxel
 
 
Configuration > Object > User/Group > User >  
Label
Description
User Name
Type the user name for this user account. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User names have to be different than user group names, and some words are reserved.
User Type
This field displays the types of user accounts the Zyxel Device uses:
admin - this user can look at and change the configuration of the Zyxel Device
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it
user - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI).
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
Password
This field is not available if you select the ext-user or ext-group-user type.
Enter a password of from 1 to 64 characters for this user account. If you selected Enable Password Complexity in Configuration > Object > User/Group > Setting, it must consist of at least 8 characters and at most 64. At least 1 character must be a number, at least 1 a lower case letter, at least 1 an upper case letter and at least 1 a special character from the keyboard, such as !@#$%^&*()_+.
Retype
This field is not available if you select the ext-user or ext-group-user type.
Group Identifier
This field is available for a ext-group-user type user account.
Specify the value of the AD or LDAP server’s Group Membership Attribute that identifies the group to which this user belongs.
Associated AAA Server Object
This field is available for a ext-group-user type user account. Select the AAA server to use to authenticate this account’s users.
Description
Enter the description of each user, if any. You can use up to 60 printable ASCII characters. Default descriptions are provided.
Email
Type one or more valid email addresses for this user so that email messages can be sent to this user if required. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com.
Mobile Number
Type a valid mobile telephone number for this user so that SMS messages can be sent to this user if required. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-].
Send Code
This button is available when the user type is admin or limited-admin.
Click this and an authorization email or SMS message with a code of six digits will be sent to the email addresses or mobile telephone number you put in.
Enter the verification code to verify your email addresses or mobile telephone number.
Authentication Timeout Settings
If you want the system to use default settings, select Use Default Settings. If you want to set authentication timeout to a value other than the default settings, select Use Manual Settings then fill your preferred values in the fields that follow.
Lease Time
If you select Use Default Settings in the Authentication Timeout Settings field, the default lease time is shown.
If you select Use Manual Settings, you need to enter the number of minutes this user has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication Time
If you select Use Default Settings in the Authentication Timeout Settings field, the default lease time is shown.
If you select Use Manual Settings, you need to type the number of minutes this user can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
User VLAN ID
This field is available for a ext-group-user type user account.
Select this option to enable dynamic VLAN assignment on the Zyxel Device. When a user is authenticated successfully, all data traffic from this user is tagged with the VLAN ID number you specify here.
This allows you to assign a user of the ext-group-user type to a specific VLAN based on the user credentials instead of using an AAA server.
Configuration Validation
Use a user account from the group specified above to test if the configuration is correct. Enter the account’s user name in the User Name field and click Test.
OK
Click OK to save your changes back to the Zyxel Device and close the screen.
Cancel
Click Cancel to exit this screen without saving your changes.
Save
This button is only available when adding a new user. Click Save to save your changes back to the Zyxel Device and then go to the Two-factor Authentication screen.
User Add/Edit Two-factor Authentication
The User Add/Edit Two-factor Authentication screen allows you to create two-factor security for VPN access or admin access for this user to the Zyxel Device.
Two-factor authentication adds an extra layer of security for users logging into the Zyxel Device. When two-factor authentication is enabled, a user has to first enter their username and password, and then click on a temporary link or enter a one-time password when logging in.
You can enable two-factor authentication for users who are logging into the Zyxel Device to create a VPN tunnel (VPN access), and for administrator and limited admin users who are logging into the Web Configurator or CLI (admin access) to configure the Zyxel Device.
Two Factor Authentication Methods 
Access Type
Two-Factor Authentication Methods
Factor 2 Password
VPN
SMS
Code
VPN
Email
Link
Admin
SMS
Code
Admin
Email
Link
Admin
Google Authenticator app
Code
You must first enable two-factor authentication on the Zyxel Device in Object > Auth. Method > Two-factor Authentication > VPN Access and Object > Auth. Method > Two-factor Authentication > Admin Access. See Two-Factor Authentication and Two-Factor Authentication Admin Access for more prerequisites and other information.
 
Label
Description
Enable Two-factor Authentication for VPN Access.
Select this to require two-factor authentication for this user to use a pre-configured VPN tunnel for secure access to a network behind the Zyxel Device. Select the types of VPN allowed in Object > Auth. Method > Two-factor Authentication > VPN Access. You may choose from:
SSL VPN Access
IPSec VPN Access
L2TP/IPSec VPN Access.
Enable Two-factor Authentication for Admin Access.
Select this to require two-factor authentication for an admin user to access the Zyxel Device. Select the types of access allowed in Object > Auth. Method > Two-factor Authentication > Admin Access. You may choose from:
Web
SSH
TELNET
Two-factor Auth. Method
Select Default or User Defined and select from PIN code by SMS/Email or Google Authenticator
Set up Google Authenticator
If you chose Google Authenticator for offline two-factor authentication, on your mobile device, go to an app store to download Google Authenticator. To add your account to Google Authenticator, press the plus (+) icon, select Scan Barcode, then use your mobile device's camera to scan the barcode. Finally enter the verification code you receive on your mobile device in Verify your device.
View your backup codes
You see this after successful Google authentication. In the event that you do not have access to email or your mobile device, click Download to create backup codes as second-factor authentication. Make sure to put them in a safe place.
Verify your device
In the event that you do not have access to email or your mobile device, enter a backup code here as second factor authentication. You can use each code only once. If you generate a new set of backup codes (Regenerate backup codes), the old set become obsolete.
Revoke
Click this to cancel Google authentication as second-factor authentication for Admin Access. You must then use a PIN code by SMS or email as second-factor authentication instead.
OK
Click OK to save your changes back to the Zyxel Device and close the screen.
Cancel
Click Cancel to exit this screen without saving your changes.
User/Group Group Summary
User groups consist of access users and other user groups. You cannot put admin users in user groups. The Group screen provides a summary of all user groups. In addition, this screen allows you to add, edit, and remove user groups.
Configuration > Object > User/Group > Group 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Removing a group does not remove the user accounts in the group.
References
Select an entry and click References to open a screen that shows which settings use the entry
#
This field is a sequential value, and it is not associated with a specific user group.
Group Name
This field displays the name of each user group.
Description
This field displays the description for each user group.
Member
This field lists the members in the user group. Each member is separated by a comma.
Reference
This displays the number of times an object reference is used in a profile.
Group Add/Edit
The Group Add/Edit screen allows you to create a new user group or edit an existing one.
Configuration > Object > User/Group > Group > Add 
Label
Description
Name
Type the name for this user group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User group names have to be different than user names.
Description
Enter the description of the user group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Member List
The Member list displays the names of the users and user groups that have been added to the user group. The order of members is not important. Select users and groups from the Available list that you want to be members of this group and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
User/Group Setting
The Setting screen controls default settings, login settings, lockout settings, and other user settings for the Zyxel Device. You can also use this screen to specify when users must log in to the Zyxel Device before it routes traffic for them.
Configuration > Object > User/Group > Setting 
Label
Description
User Authentication Timeout Settings
Default Authentication Timeout Settings
These authentication timeout settings are used by default when you create a new user account. They also control the settings for any existing user accounts that are set to use the default settings. You can still manually configure any user account’s authentication timeout settings.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
#
This field is a sequential value, and it is not associated with a specific entry.
User Type
These are the kinds of user account the Zyxel Device supports.
admin - this user can look at and change the configuration of the Zyxel Device
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it
user - this user has access to the Zyxel Device’s services but cannot look at the configuration
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
Lease Time
This is the default lease time in minutes for each type of user account. It defines the number of minutes the user has to renew the current session before the user is logged out.
Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically, the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication Time
This is the default reauthentication time in minutes for each type of user account. It defines the number of minutes the user can be logged into the Zyxel Device in one session before having to log in again. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
Miscellaneous Settings
Allow renewing lease time automatically
Select this check box if access users can renew lease time automatically, as well as manually, simply by selecting the Updating lease time automatically check box on their screen.
Enable user idle detection
This is applicable for access users.
Select this check box if you want the Zyxel Device to monitor how long each access user is logged in and idle (in other words, there is no traffic for this access user). The Zyxel Device automatically logs out the access user once the User idle timeout has been reached.
User idle timeout
This is applicable for access users.
This field is effective when Enable user idle detection is checked. Type the number of minutes each access user can be logged in and idle before the Zyxel Device automatically logs out the access user.
Login Security
Password must changed every (days):
Enter how often users must change their password when they log into the Zyxel Device. You can choose from once a day to once a year.
Password reset link (FQDN/IP):
Associate the password expiration to a specific Zyxel Device. Default is this Zyxel Device (myrouter) or select Custom and enter the IP address or Fully Qualified Domain Name (FQDN).
Enable Password Complexity
Select this to enforce the following conditions in a user password. Requiring a strong password is good for security. The conditions are that the password must consist of at least 8 characters and at most 64. At least 1 character must be a number, at least 1 a lower case letter, at least 1 an upper case letter and at least 1 a special character from the keyboard, such as !@#$%^&*()_+.
User Logon Settings
Limit the number of simultaneous logons for administration account
Select this check box if you want to set a limit on the number of simultaneous logins by admin users. If you do not select this, admin users can login as many times as they want at the same time using the same or different IP addresses.
Maximum number per administration account
This field is effective when Limit ... for administration account is checked. Type the maximum number of simultaneous logins by each admin user.
Limit the number of simultaneous logons for access account
Select this check box if you want to set a limit on the number of simultaneous logins by non-admin users. If you do not select this, access users can login as many times as they want as long as they use different IP addresses.
Maximum number per access account
This field is effective when Limit ... for access account is checked. Type the maximum number of simultaneous logins by each access user.
User Lockout Settings
Enable logon retry limit
Select this check box to set a limit on the number of times each user can login unsuccessfully (for example, wrong password) before the IP address is locked out for a specified amount of time.
Maximum retry count
This field is effective when Enable logon retry limit is checked. Type the maximum number of times each user can login unsuccessfully before the IP address is locked out for the specified lockout period. The number must be between 1 and 99.
Lockout period
This field is effective when Enable logon retry limit is checked. Type the number of minutes the user must wait to try to login again, if logon retry limit is enabled and the maximum retry count is reached. This number must be between 1 and 65,535 (about 45.5 days).
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Default User Authentication Timeout Settings Edit
The Default Authentication Timeout Settings Edit screen allows you to set the default authentication timeout settings for the selected type of user account. These default authentication timeout settings also control the settings for any existing user accounts that are set to use the default settings. You can still manually configure any user account’s authentication timeout settings.
Configuration > Object > User/Group > Setting > Edit 
Label
Description
User Type
This read-only field identifies the type of user account for which you are configuring the default settings.
admin - this user can look at and change the configuration of the Zyxel Device
limited-admin - this user can look at the configuration of the Zyxel Device but not to change it.
dynamic-guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
user - this user has access to the Zyxel Device’s services but cannot look at the configuration.
guest - this user has access to the Zyxel Device’s services but cannot look at the configuration.
ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
ext-group-user - this user account is maintained in a remote server, such as RADIUS or LDAP.
guest-manager - this user can log in via the web configurator login screen and create dynamic guest accounts using the Account Generator screen that pops up.
Lease Time
Enter the number of minutes this type of user account has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited.
Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires.
Reauthentication Time
Type the number of minutes this type of user account can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
User Aware Login Example
Access users cannot use the Web Configurator to browse the configuration of the Zyxel Device. Instead, after access users log into the Zyxel Device.
Web Configurator for Non-Admin Users 
Label
Description
User-defined lease time (max ... minutes)
Access users can specify a lease time shorter than or equal to the one that you specified. The default value is the lease time that you specified.
Renew
Access users can click this button to reset the lease time, the amount of time remaining before the Zyxel Device automatically logs them out. The Zyxel Device sets this amount of time according to the:
User-defined lease time field in this screen
Lease time field in the User Add/Edit screen
Lease time field in the Setting screen .
Updating lease time automatically
This box appears if you checked the Allow renewing lease time automatically box in the Setting screen. Access users can select this check box to reset the lease time automatically 30 seconds before it expires. Otherwise, access users have to click the Renew button to reset the lease time.
Remaining time before lease timeout
This field displays the amount of lease time that remains, though the user might be able to reset it.
Remaining time before auth. timeout
This field displays the amount of time that remains before the Zyxel Device automatically logs the access user out, regardless of the lease time.
User/Group MAC Address Summary
Note: This screen shows the MAC addresses of wireless clients, which can be authenticated by their MAC addresses using the local user database. You need to configure an SSID security profile’s MAC authentication settings to have the AP use the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses.
Configuration > Object > User/Group > MAC Address  
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
MAC Address/OUI
This field displays the MAC address or OUI (Organizationally Unique Identifier of computer hardware manufacturers) of wireless clients using MAC authentication with the Zyxel Device local user database.
Description
This field displays a description of the device identified by the MAC address or OUI.
MAC Address Add/Edit
This screen allows you to create a new allowed device or edit an existing one.
Configuration > Object > User/Group > > Add 
Label
Description
MAC Address/OUI
Type the MAC address (six hexadecimal number pairs separated by colons or hyphens) or OUI (three hexadecimal number pairs separated by colons or hyphens) to identify specific wireless clients for MAC authentication using the Zyxel Device local user database. The OUI is the first three octets in a MAC address and uniquely identifies the manufacturer of a network device.
Description
Enter an optional description of the wireless device(s) identified by the MAC or OUI. You can use up to 60 characters, punctuation marks, and spaces.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
User /Group Technical Reference
This section provides some information on users who use an external authentication server in order to log in.
Setting up User Attributes in an External Server
To set up user attributes, such as reauthentication time, in LDAP or RADIUS servers, use the following keywords in the user configuration file.
LDAP/RADIUS: Keywords for User Attributes 
Keyword
Corresponding Attribute in Web Configurator
type
User Type. Possible Values: admin, limited-admin, dynamic-guest, user, guest.
leaseTime
Lease Time. Possible Values: 1-1440 (minutes).
reauthTime
Reauthentication Time. Possible Values: 1-1440 (minutes).
Creating a Large Number of Ext-User Accounts
If you plan to create a large number of Ext-User accounts, you might use CLI commands, instead of the Web Configurator, to create the accounts. Extract the user names from the LDAP or RADIUS server, and create a shell script that creates the user accounts.
AP Profile
This sectionshows you how to configure preset profiles for the Access Points (APs) connected to your Zyxel Device’s wireless network.
Wireless Profiles
At the heart of all wireless AP configurations on the Zyxel Device are profiles. A profile represents a group of saved settings that you can use across any number of connected APs. You can set up the following wireless profile types:
Radio - This profile type defines the properties of an AP’s radio transmitter. You can have a maximum of 32 radio profiles on the Zyxel Device.
SSID - This profile type defines the properties of a single wireless network signal broadcast by an AP. Each radio on a single AP can broadcast up to 8 SSIDs. You can have a maximum of 32 SSID profiles on the Zyxel Device.
Security - This profile type defines the security settings used by a single SSID. It controls the encryption method required for a wireless client to associate itself with the SSID. You can have a maximum of 32 security profiles on the Zyxel Device.
MAC Filtering - This profile provides an additional layer of security for an SSID, allowing you to block access or allow access to that SSID based on wireless client MAC addresses. If a client’s MAC address is on the list, then it is either allowed or denied, depending on how you set up the MAC Filter profile. You can have a maximum of 32 MAC filtering profiles on the Zyxel Device.
SSID
The SSID (Service Set IDentifier) is the name that identifies the Service Set with which a wireless station is associated. Wireless stations associating to the access point (AP) must have the same SSID. In other words, it is the name of the wireless network that clients use to connect to it.
WEP
WEP (Wired Equivalent Privacy) encryption scrambles all data packets transmitted between the AP and the wireless stations associated with it in order to keep network communications private. Both the wireless stations and the access points must use the same WEP key for data encryption and decryption.
WPA and WPA2
Wi-Fi Protected Access (WPA) is a subset of the IEEE 802.11i standard. WPA2 (IEEE 802.11i) is a wireless security standard that defines stronger encryption, authentication and key management than WPA. Key differences between WPA(2) and WEP are improved data encryption and user authentication.
IEEE 802.1x
The IEEE 802.1x standard outlines enhanced security methods for both the authentication of wireless stations and encryption key management. Authentication is done using an external RADIUS server.
WiFi6 / IEEE 802.11ax
WiFi6 is backwards compatible with IEEE 802.11a/b/g/n/ac and is most suitable in areas with a high concentration of users. WiFi6 devices support Target Wakeup Time (TWT) allowing them to automatically power down when they are inactive.
The following table displays the comparison of the different WiFi standards. The maximum link rate is for reference under ideal conditions only.
WiFI Standards Comparison 
WiFi Standard
Maximum Link Rate *
Band
Simultaneous Connections
802.11b
11 Mbps
2.4 GHz
1
802.11a/g
54 Mbps
2.4 GHz and 5 GHz
1
802.11n
600 Mbps
2.4 GHz and 5 GHz
1
802.11ac
6.93 Gbps
5 GHz
4
802.11ax
2.4 Gbps
2.4 GHz
128
9.61 Gbps
5 GHz and 6 GHz
Radio Screen
This screen allows you to create radio profiles for the APs on your network. A radio profile is a list of settings that a supported managed AP (NWA5121-N for example) can use to configure either one of its two radio transmitters.
You can have a maximum of 32 radio profiles on the Zyxel Device.
Configuration > Object > AP Profile > Radio 
Label
Description
Add
Click this to add a new radio profile.
Edit
Click this to edit the selected radio profile.
Remove
Click this to remove the selected radio profile.
Activate
To turn on an entry, select it and click Activate.
Inactivate
To turn off an entry, select it and click Inactivate.
References
Click this to view which other objects are linked to the selected radio profile.
#
This field is a sequential value, and it is not associated with a specific profile.
Status
This icon is lit when the entry is active and dimmed when the entry is inactive.
Profile Name
This field indicates the name assigned to the radio profile.
Frequency Band
This field indicates the frequency band which this radio profile is configured to use.
Schedule
This field displays the schedule object which defines when this radio profile can be used.
Apply
Click Apply to save your changes back to the Zyxel Device.
Reset
Click Reset to return the screen to its last-saved settings.
Add/Edit Radio Profile
This screen allows you to create a new radio profile or edit an existing one.
Configuration > Object > AP Profile > Add/Edit Radio Profile 
Label
Description
Hide / Show Advanced Settings
Click this to hide or show the Advanced Settings in this window.
Create New Object
Use this to configure any new settings objects that you need to use in this screen.
General Settings
 
Activate
Select this option to make this profile active.
Profile Name
Enter up to 31 alphanumeric characters to be used as this profile’s name. Spaces and underscores are allowed.
Schedule
This field displays the schedule object which defines when this radio profile can be used.
802.11 Band
Select how to let wireless clients connect to the AP.
If 802.11 Band is set to 2.4G:
11b/g: allows either IEEE 802.11b or IEEE 802.11g compliant WLAN devices to associate with the AP. The AP adjusts the transmission rate automatically according to the wireless standard supported by the wireless devices.
11n: allows IEEE802.11b, IEEE802.11g and IEEE802.11n compliant WLAN devices to associate with the AP.
If 802.11 Band is set to 5G:
11a: allows only IEEE 802.11a compliant WLAN devices to associate with the AP.
11a/n: allows both IEEE802.11n and IEEE802.11a compliant WLAN devices to associate with the AP. The transmission rate of your AP might be reduced.
11ac: allows only IEEE802.11ac compliant WLAN devices to associate with the AP.
11ax: allows IEEE802.11n, IEEE802.11a, IEEE802.11ac, and IEEE802.11ax compliant WLAN devices to associate with the AP. If the WLAN device isn’t compatible with 802.11ax, the AP will communicate with the WLAN device using 802.11ac, and so on
*If you select 11ac but the WLAN devices in the network do not support IEEE 802.11ac, the Zyxel Device automatically sets the AP to use 11a/n.
Channel Width
Select the wireless channel bandwidth you want the AP to use.
A standard 20 MHz channel offers transfer speeds of up to 144Mbps (2.4GHz) or 217Mbps (5GHZ) whereas a 40MHz channel uses two standard channels and offers speeds of up to 300Mbps (2.4GHz) or 450Mbps (5GHZ). An IEEE 802.11ac-specific 80MHz channel offers speeds of up to 1.3Gbps.
40 MHz (channel bonding or dual channel) bonds two adjacent radio channels to increase throughput. A 80 MHz channel consists of two adjacent 40 MHz channels. The wireless clients must also support 40 MHz or 80 MHz. It is often better to use the 20 MHz setting in a location where the environment hinders the wireless signal.
Because not all devices support 40 MHz and/or 80 MHz channels, select 20/40MHz or 20/40/80MHz to allow the AP to adjust the channel bandwidth automatically.
Select 20MHz if you want to lessen radio interference with other wireless devices in your neighborhood or the wireless clients do not support channel bonding.
*If the environment has poor signal-to-noise (SNR), the Zyxel Device will switch to a lower bandwidth.
Channel Selection
Select the wireless channel which this radio profile should use.
It is recommended that you choose the channel least in use by other APs in the region where this profile will be implemented. This will reduce the amount of interference between wireless clients and the AP to which this profile is assigned.
Select DCS to have the AP automatically select the radio channel upon which it broadcasts by scanning the area around it and determining what channels are currently being used by other devices.
Select Manual and specify the channels the AP uses.
Blacklist DFS channels in presence of radar
This field is available if 802.11 Band is set to 5G and Channel Selection is set to DCS.
Enable this to temporarily blacklist the wireless channels in the Dynamic Frequency Selection (DFS) range whenever a radar signal is detected by the AP.
Enable DCS Client Aware
This field is available when you set Channel Selection to DCS.
Select this to have the AP wait until all connected clients have disconnected before switching channels.
If you disable this then the AP switches channels immediately regardless of any client connections. In this instance, clients that are connected to the AP when it switches channels are dropped.
2.4 GHz Channel Selection Method
This field is available when you set Channel Selection to DCS.
Select auto to have the AP search for available channels automatically in the 2.4 GHz band. The available channels vary depending on what you select in the 2.4 GHz Channel Deployment field.
Select manual and specify the channels the AP uses in the 2.4 GHz band.
Channel ID
This field is available only when you set Channel Selection to DCS and set 2.4 GHz Channel Selection Method to manual.
Select the check boxes of the channels that you want the AP to use.
Time Interval
Select this option to have the AP survey the other APs within its broadcast radius at the end of the specified time interval.
2.4 GHz Channel Deployment
This field is available only when you set Channel Selection to DCS and set 2.4 GHz Channel Selection Method to auto.
Select Three-Channel Deployment to limit channel switching to channels 1,6, and 11, the three channels that are sufficiently attenuated to have almost no impact on one another. In other words, this allows you to minimize channel interference by limiting channel-hopping to these three “safe” channels.
Select Four-Channel Deployment to limit channel switching to four channels. Depending on the country domain, if the only allowable channels are 1-11 then the Zyxel Device uses channels 1, 4, 7, 11 in this configuration; otherwise, the Zyxel Device uses channels 1, 5, 9, 13 in this configuration. Four channel deployment expands your pool of possible channels while keeping the channel interference to a minimum.
*For US and Canada models, country code is fixed to US or Canada respectively and is not user selectable.
DCS Time Interval
This field is available when you set Channel Selection to DCS.
Enter a number of minutes. This regulates how often the AP surveys the other APs within its broadcast radius. If the channel on which it is currently broadcasting suddenly comes into use by another AP, the AP will then dynamically select the next available clean channel or a channel with lower interference.
Channel ID
This field is available only when you set Channel Selection to DCS and set 2.4 GHz Channel Selection Method to manual.
Select the check boxes of the channels that you want the AP to use.
Schedule
Select this option to have the AP survey the other APs within its broadcast radius at a specific time on selected days of the week.
Start Time
Specify the time of the day (in 24-hour format) to have the AP use DCS to automatically scan and find a less-used channel.
Week Days
Select each day of the week to have the AP use DCS to automatically scan and find a less-used channel.
Enable 5 GHz DFS Aware
This field is available only when you select 11a, 11a/n or 11ac in the 802.11 Band field.
Select this if your APs are operating in an area known to have RADAR devices. This allows the device to downgrade its frequency to below 5 GHz in the event a RADAR signal is detected, thus preventing it from interfering with that signal.
Enabling this forces the AP to select a non-DFS channel.
5 GHz Channel Selection Method
This shows auto and allows the AP to search for available channels automatically in the 5 GHz band.
Advanced Settings
 
Country Code
Select the country code of where the Zyxel Device is located/installed.
The available channels vary depending on the country you select. Be sure to select the correct/same country for both radios on an AP and all connected APs, in order to prevent roaming failure and interference to other systems.
*For US and Canada models, country code is fixed to US or Canada respectively and is not user selectable.
Guard Interval
This field is available only when the 802.11 Band is set to 5G and 802.11 Mode is set to 11n or 11ac.
Set the guard interval for this radio profile to either Short or Long.
The guard interval is the gap introduced between data transmission from users in order to reduce interference. Reducing the interval increases data transfer rates but also increases interference. Increasing the interval reduces data transfer rates but also reduces interference.
Enable A-MPDU Aggregation
Select this to enable A-MPDU aggregation.
Message Protocol Data Unit (MPDU) aggregation collects Ethernet frames along with their 802.11n headers and wraps them in a 802.11n MAC header. This method is useful for increasing bandwidth throughput in environments that are prone to high error rates.
A-MPDU Limit
Enter the maximum frame size to be aggregated.
A-MPDU Subframe
Enter the maximum number of frames to be aggregated each time.
Enable A-MSDU Aggregation
Select this to enable A-MSDU aggregation.
Mac Service Data Unit (MSDU) aggregation collects Ethernet frames without any of their 802.11n headers and wraps the header-less payload in a single 802.11n MAC header. This method is useful for increasing bandwidth throughput. It is also more efficient than A-MPDU except in environments that are prone to high error rates.
A-MSDU Limit
Enter the maximum frame size to be aggregated.
RTS/CTS Threshold
Use RTS/CTS to reduce data collisions on the wireless network if you have wireless clients that are associated with the same AP but out of range of one another. When enabled, a wireless client sends an RTS (Request To Send) and then waits for a CTS (Clear To Send) before it transmits. This stops wireless clients from transmitting packets at the same time (and causing data collisions).
A wireless client sends an RTS for all packets larger than the number (of bytes) that you enter here. Set the RTS/CTS equal to or higher than the fragmentation threshold to turn RTS/CTS off.
Beacon Interval
When a wirelessly networked device sends a beacon, it includes with it a beacon interval. This specifies the time period before the device sends the beacon again. The interval tells receiving devices on the network how long they can wait in low-power mode before waking up to handle the beacon. A high value helps save current consumption of the access point.
DTIM
Delivery Traffic Indication Message (DTIM) is the time period after which broadcast and multicast packets are transmitted to mobile clients in the Active Power Management mode. A high DTIM value can cause clients to lose connectivity with the network. This value can be set from 1 to 255.
Enable Signal Threshold
Select the check box to use the signal threshold to ensure wireless clients receive good throughput. This allows only wireless clients with a strong signal to connect to the AP.
Clear the check box to not require wireless clients to have a minimum signal strength to connect to the AP.
Station Signal Threshold
Set a minimum client signal strength. A wireless client is allowed to connect to the AP only when its signal strength is stronger than the specified threshold.
-20 dBm is the strongest signal you can require and -76 is the weakest.
Disassociate Station Threshold
Set a minimum kick-off signal strength. When a wireless client’s signal strength is lower than the specified threshold, the Zyxel Device disconnects the wireless client from the AP.
-20 dBm is the strongest signal you can require and -90 is the weakest.
Allow Station Connection after Multiple Retries
Select this option to allow a wireless client to try to associate with the AP again after it is disconnected due to weak signal strength.
Station Retry Count
Set the maximum number of times a wireless client can attempt to re-connect to the AP
Allow 802.11n/ac/ax stations only
Select this option to allow only 802.11 n/ac/ax stations to connect, and reject 802.11a/b/g stations.
Multicast Settings
Use this section to set a transmission mode and maximum rate for multicast traffic.
Transmission Mode
Set how the AP handles multicast traffic.
Select Multicast to Unicast to broadcast wireless multicast traffic to all of the wireless clients as unicast traffic. Unicast traffic dynamically changes the data rate based on the application’s bandwidth requirements. The retransmit mechanism of unicast traffic provides more reliable transmission of the multicast traffic, although it also produces duplicate packets.
Select Fixed Multicast Rate to send wireless multicast traffic at a single data rate. You must know the multicast application’s bandwidth requirements and set it in the following field.
Multicast Rate (Mbps)
If you set the multicast transmission mode to fixed multicast rate, set the data rate for multicast traffic here. For example, to deploy 4 Mbps video, select a fixed multicast rate higher than 4 Mbps.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
SSID Screen
The SSID screens allow you to configure three different types of profiles for your networked APs: an SSID list, which can assign specific SSID configurations to your APs; a security list, which can assign specific encryption methods to the APs when allowing wireless clients to connect to them; and a MAC filter list, which can limit connections to an AP based on wireless clients MAC addresses.
SSID List
This screen allows you to create and manage SSID configurations that can be used by the APs. An SSID, or Service Set IDentifier, is basically the name of the wireless network to which a wireless client can connect. The SSID appears as readable text to any device capable of scanning for wireless frequencies (such as the WiFi adapter in a laptop), and is displayed as the wireless network name when a person makes a connection to it.
You can have a maximum of 32 SSID profiles on the Zyxel Device.
Configuration > Object > AP Profile > SSID List 
Label
Description
Add
Click this to add a new SSID profile.
Edit
Click this to edit the selected SSID profile.
Remove
Click this to remove the selected SSID profile.
References
Click this to view which other objects are linked to the selected SSID profile (for example, radio profile).
#
This field is a sequential value, and it is not associated with a specific profile.
Profile Name
This field indicates the name assigned to the SSID profile.
SSID
This field indicates the SSID name as it appears to wireless clients.
Security Profile
This field indicates which (if any) security profile is associated with the SSID profile.
QoS
This field indicates the QoS type associated with the SSID profile.
MAC Filtering Profile
This field indicates which (if any) MAC Filter Profile is associated with the SSID profile.
VLAN ID
This field indicates the VLAN ID associated with the SSID profile.
Add/Edit SSID Profile
This screen allows you to create a new SSID profile or edit an existing one.
Configuration > Object > AP Profile > SSID > Add/Edit SSID Profile 
Label
Description
Create new Object
Select an object type from the list to create a new one associated with this SSID profile.
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
SSID
Enter the SSID name for this profile. This is the name visible on the network to wireless clients. Enter up to 32 characters, spaces and underscores are allowed.
Security Profile
Select a security profile from this list to associate with this SSID. If none exist, you can use the Create new Object menu to create one.
*It is highly recommended that you create security profiles for all of your SSIDs to enhance your network security.
MAC Filtering Profile
Select a MAC filtering profile from the list to associate with this SSID. If none exist, you can use the Create new Object menu to create one.
MAC filtering allows you to limit the wireless clients connecting to your network through a particular SSID by wireless client MAC addresses. Any clients that have MAC addresses not in the MAC filtering profile of allowed addresses are denied connections.
The disable setting means no MAC filtering is used.
QoS
Select a Quality of Service (QoS) access category to associate with this SSID. Access categories minimize the delay of data packets across a wireless network. Certain categories, such as video or voice, are given a higher priority due to the time sensitive nature of their data packets.
QoS access categories are as follows:
disable: Turns off QoS for this SSID. All data packets are treated equally and not tagged with access categories.
WMM: Enables automatic tagging of data packets. The Zyxel Device assigns access categories to the SSID by examining data as it passes through it and making a best guess effort. If something looks like video traffic, for instance, it is tagged as such.
WMM_VOICE: All wireless traffic to the SSID is tagged as voice data. This is recommended if an SSID is used for activities like placing and receiving VoIP phone calls.
WMM_VIDEO: All wireless traffic to the SSID is tagged as video data. This is recommended for activities like video conferencing.
WMM_BEST_EFFORT: All wireless traffic to the SSID is tagged as “best effort,” meaning the data travels the best route it can without displacing higher priority traffic. This is good for activities that do not require the best bandwidth throughput, such as surfing the Internet.
WMM_BACKGROUND: All wireless traffic to the SSID is tagged as low priority or “background traffic”, meaning all other access categories take precedence over this one. If traffic from an SSID does not have strict throughput requirements, then this access category is recommended. For example, an SSID that only has network printers connected to it.
Rate Limiting (Per Station Traffic Rate)
Define the maximum incoming and outgoing transmission data rate per wireless station
Downlink:
Define the maximum incoming transmission data rate (either in Mbps or Kbps) on a per-station basis.
Uplink:
Define the maximum outgoing transmission data rate (either in Mbps or Kbps) on a per-station basis.
Band Select:
To improve network performance and avoid interference in the 2.4 GHz frequency band, you can enable this feature to use the 5 GHz band first. You should set 2.4GHz and 5 GHz radio profiles to use the same SSID and security settings.
Select standard to have the AP try to connect the wireless clients to the same SSID using the 5 GHZ band. Connections to an SSID using the 2.4GHz band are still allowed.
Otherwise, select disable to turn off this feature.
Stop Threshold
This field is not available when you disable Band Select.
Select this option and set the threshold number of the connected wireless clients at which the Zyxel Device disables the band select feature.
Balance Ratio
This field is not available when you disable Band Select.
Select this option and set a ratio of the wireless clients using the 5 GHz band to the wireless clients using the 2.4 GHz band.
Forwarding Mode
Select a forwarding mode (Tunnel or Local bridge) for traffic from wireless stations in this wireless network (SSID). In earlier firmware, you could only forward traffic from this wireless network with a tunnel using an existing VLAN interface in Network > Interface > VLAN > Add.
From firmware version 4.60, you can select an existing VLAN interface or a local Ethernet interface (lan1, lan2) for forwarding traffic from wireless stations in this wireless network using a tunnel. These interfaces cannot be bridge members (Network > Interface > Bridge).
VLAN ID
If you selected Local Bridge forwarding mode, enter the VLAN ID that will be used to tag all traffic originating from this SSID if the VLAN is different from the native VLAN. All the wireless station’s traffic goes through the associated AP’s gateway.
VLAN Interface
If you selected the Tunnel forwarding mode, select a VLAN interface. All the wireless station’s traffic is forwarded to the Zyxel Device first.
Hidden SSID
Select this if you want to “hide” your SSID from wireless clients. This tells any wireless clients in the vicinity of the AP using this SSID profile not to display its SSID name as a potential connection. Not all wireless clients respect this flag and display it anyway.
When an SSID is “hidden” and a wireless client cannot see it, the only way you can connect to the SSID is by manually entering the SSID name in your wireless connection setup screen(s) (these vary by client, client connectivity software, and operating system).
Enable Intra-BSS Traffic Blocking
Select this option to prevent crossover traffic from within the same SSID.
Enable U-APSD
Select this option to enable Unscheduled Automatic Power Save Delivery (U-APSD), which is also known as WMM-Power Save. This helps increase battery life for battery-powered wireless clients connected to the Zyxel Device using this SSID profile.
Enable ARP Proxy
The Address Resolution Protocol (ARP) is a protocol for mapping an IP address to a MAC address. An ARP broadcast is sent to all devices on the same Ethernet network to request the MAC address of a target IP address.
Select this option to allow the Zyxel Device to answer ARP requests for an IP address on behalf of a client associated with this SSID. This can reduce broadcast traffic and improve network performance.
802.11 k/v Assisted Roaming
Select this option to enable IEEE 802.11k/v assisted roaming on the Zyxel Device. When the connected clients request 802.11k neighbor lists, the Zyxel Device will response with a list of neighbor APs that can be candidates for roaming.
Schedule SSID
Select this option and set whether the SSID is enabled or disabled on each day of the week. You also need to select the hour and minute (in 24-hour format) to specify the time period of each day during which the SSID is enabled/enabled.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Security List
This screen allows you to manage wireless security configurations that can be used by your SSIDs. Wireless security is implemented strictly between the AP broadcasting the SSID and the stations that are connected to it.
Note: You can have a maximum of 32 security profiles on the Zyxel Device.
Configuration > Object > AP Profile > SSID > Security List 
Label
Description
Add
Click this to add a new security profile.
Edit
Click this to edit the selected security profile.
Remove
Click this to remove the selected security profile.
References
Click this to view which other objects are linked to the selected security profile (for example, SSID profile).
#
This field is a sequential value, and it is not associated with a specific profile.
Profile Name
This field indicates the name assigned to the security profile.
Security Mode
This field indicates this profile’s security mode (if any).
Add/Edit Security Profile
This screen allows you to create a new security profile or edit an existing one.
Note: This screen’s options change based on the Security Mode selected.
Configuration > Object > AP Profile > SSID > Security Profile > Add/Edit Security Profile> Security Mode: open 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Security Mode
Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3.
Authentication Settings
Enterprise
Select this to enable 802.1x secure authentication with a RADIUS server.
Reauthentication Timer
Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time.
Idle Timeout
Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued.
Radius Settings
Primary / Secondary Radius Server Activate
Select this to have the Zyxel Device use the specified RADIUS server.
Radius Server IP Address
Enter the IP address of the RADIUS server to be used for authentication.
Radius Server Port
Enter the port number of the RADIUS server to be used for authentication.
Radius Server Secret
Enter the shared secret password of the RADIUS server to be used for authentication.
Primary / Secondary Accounting Server Activate
Select the check box to enable user accounting through an external authentication server.
Accounting Server IP Address
Enter the IP address of the external accounting server in dotted decimal notation.
Accounting Server Port
Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
Accounting Share Secret
Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network.
Accounting Interim Update
This field is available only when you enable user accounting through an external authentication server.
Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify.
Interim Update Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server.
MAC Authentication
Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails.
An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses.
Delimiter (Account)
Select the separator the external server uses for the two-character pairs within account MAC addresses.
Case (Account)
Select the case (upper or lower) the external server requires for letters in the account MAC addresses.
Delimiter (Calling Station ID)
RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute.
Select the separator the external server uses for the pairs in calling station MAC addresses.
Case (Calling Station ID)
Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Configuration > Object > AP Profile > SSID > Security Profile > Add/Edit Security Profile> Security Mode: enhanced-open 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Security Mode
Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3.
Authentication Settings
Transition Mode
Enable this for backwards compatibility. This option is only available if the Security Mode is wpa3 or enhanced-open. This creates two virtual APs (VAPs) with a primary (wpa3 or enhanced-open) and fallback (wpa2 or none) security method.
If the Security Mode is wpa3, enabling this will force Management Frame Protection to be set to Optional. If this is disabled or if the Security Mode is enhanced-open, Management Frame Protection will be set to Required.
Idle Timeout
Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued.
Radius Settings
Primary / Secondary Radius Server Activate
Select this to have the Zyxel Device use the specified RADIUS server.
Radius Server IP Address
Enter the IP address of the RADIUS server to be used for authentication.
Radius Server Port
Enter the port number of the RADIUS server to be used for authentication.
Radius Server Secret
Enter the shared secret password of the RADIUS server to be used for authentication.
Primary / Secondary Accounting Server Activate
Select the check box to enable user accounting through an external authentication server.
Accounting Server IP Address
Enter the IP address of the external accounting server in dotted decimal notation.
Accounting Server Port
Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
Accounting Share Secret
Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network.
Accounting Interim Update
This field is available only when you enable user accounting through an external authentication server.
Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify.
Interim Update Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server.
MAC Authentication
Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails.
An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses.
Delimiter (Account)
Select the separator the external server uses for the two-character pairs within account MAC addresses.
Case (Account)
Select the case (upper or lower) the external server requires for letters in the account MAC addresses.
Delimiter (Calling Station ID)
RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute.
Select the separator the external server uses for the pairs in calling station MAC addresses.
Case (Calling Station ID)
Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Configuration > Object > AP Profile > SSID > Security Profile > Add/Edit Security Profile> Security Mode: wep 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Security Mode
Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3.
Authentication Settings
Enterprise
Select this to enable 802.1x secure authentication with a RADIUS server.
Reauthentication Timer
Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time.
Idle Timeout
Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued.
Authentication Type
Select a WEP authentication method. Choices are Open or Share key.
Key Length
Select the bit-length of the encryption key to be used in WEP connections.
If you select WEP-64:
Enter 10 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (for example, 0x11AA22BB33) for each Key used.
or
Enter 5 ASCII characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (for example, MyKey) for each Key used.
If you select WEP-128:
Enter 26 hexadecimal digits in the range of “A-F”, “a-f” and “0-9” (for example, 0x00112233445566778899AABBCC) for each Key used.
or
Enter 13 ASCII characters (case sensitive) ranging from “a-z”, “A-Z” and “0-9” (for example, MyKey12345678) for each Key used.
Key 1~4
Based on your Key Length selection, enter the appropriate length hexadecimal or ASCII key.
Radius Settings
Primary / Secondary Radius Server Activate
Select this to have the Zyxel Device use the specified RADIUS server.
Radius Server IP Address
Enter the IP address of the RADIUS server to be used for authentication.
Radius Server Port
Enter the port number of the RADIUS server to be used for authentication.
Radius Server Secret
Enter the shared secret password of the RADIUS server to be used for authentication.
Primary / Secondary Accounting Server Activate
Select the check box to enable user accounting through an external authentication server.
Accounting Server IP Address
Enter the IP address of the external accounting server in dotted decimal notation.
Accounting Server Port
Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
Accounting Share Secret
Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network.
Accounting Interim Update
This field is available only when you enable user accounting through an external authentication server.
Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify.
Interim Update Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server.
MAC Authentication
Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails.
An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses.
Delimiter (Account)
Select the separator the external server uses for the two-character pairs within account MAC addresses.
Case (Account)
Select the case (upper or lower) the external server requires for letters in the account MAC addresses.
Delimiter (Calling Station ID)
RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute.
Select the separator the external server uses for the pairs in calling station MAC addresses.
Case (Calling Station ID)
Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Configuration > Object > AP Profile > SSID > Security Profile > Add/Edit Security Profile> Security Mode: wpa2/ wpa2-mix 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Security Mode
Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3.
Authentication Settings
Enterprise
Select this to enable 802.1x secure authentication with a RADIUS server.
Reauthentication Timer
Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time.
Personal
This field is available when you select the wpa2, wpa2-mix or wpa3 security mode.
Select this option to use a Pre-Shared Key (PSK) with WPA2 encryption or Simultaneous Authentication of Equals (SAE) with WPA3 encryption.
Pre-Shared Key
Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters.
Cipher Type
Select an encryption cipher type from the list.
auto - This automatically chooses the best available cipher based on the cipher in use by the wireless client that is attempting to make a connection.
aes - This is the Advanced Encryption Standard encryption method. It is a more recent development over TKIP and considerably more robust. Not all wireless clients may support this.
Idle Timeout
Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued.
Group Key Update Timer
Enter the interval (in seconds) at which the AP updates the group WPA2 encryption key.
Management Frame Protection
This field is available only when you select wpa2 in the Security Mode field and set Cipher Type to aes.
Data frames in 802.11 WLANs can be encrypted and authenticated with WEP, WPA or WPA2. But 802.11 management frames, such as beacon/probe response, association request, association response, de-authentication and disassociation are always unauthenticated and unencrypted. IEEE 802.11w Protected Management Frames allows APs to use the existing security mechanisms (encryption and authentication methods defined in IEEE 802.11i WPA/WPA2) to protect management frames. This helps prevent wireless DoS attacks.
Select the check box to enable management frame protection (MFP) to add security to 802.11 management frames.
Select Optional if you do not require the wireless clients to support MFP. Management frames will be encrypted if the clients support MFP.
Select Required and wireless clients must support MFP in order to join the Zyxel Device’s wireless network.
Fast Roaming Settings
IEEE 802.11r fast roaming, which is also known as Fast BSS Transition (FT), allows wireless clients to quickly move from one AP to another in a WiFi network that uses WPA2 with 802.1x authentication. Information from the original association is passed to the target AP when the client roams. The client doesn’t need to perform the whole 802.1x authentication process. Messages exchanged between the target AP and client are reduced and performed using one of the two methods:
Over-the-DS: The wireless client communicates with the target AP via the current AP. The communication is sent to the target AP through the wired Ethernet connection.
Over-the-Air: The wireless client communicates directly with the target AP.
802.11r
Select this to turn on IEEE 802.11r fast roaming on the AP (Zyxel Device). This is good for wireless clients that transport a lot of real-time interactive traffic, such as voice and video. Wireless clients should also support WPA2 and fast roaming to associate with the AP (Zyxel Device) and roam seamlessly.
Radius Settings
Primary / Secondary Radius Server Activate
Select this to have the Zyxel Device use the specified RADIUS server.
Radius Server IP Address
Enter the IP address of the RADIUS server to be used for authentication.
Radius Server Port
Enter the port number of the RADIUS server to be used for authentication.
Radius Server Secret
Enter the shared secret password of the RADIUS server to be used for authentication.
Primary / Secondary Accounting Server Activate
Select the check box to enable user accounting through an external authentication server.
Accounting Server IP Address
Enter the IP address of the external accounting server in dotted decimal notation.
Accounting Server Port
Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
Accounting Share Secret
Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network.
Accounting Interim Update
This field is available only when you enable user accounting through an external authentication server.
Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify.
Interim Update Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server.
MAC Authentication
Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails.
An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses.
Delimiter (Account)
Select the separator the external server uses for the two-character pairs within account MAC addresses.
Case (Account)
Select the case (upper or lower) the external server requires for letters in the account MAC addresses.
Delimiter (Calling Station ID)
RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute.
Select the separator the external server uses for the pairs in calling station MAC addresses.
Case (Calling Station ID)
Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Configuration > Object > AP Profile > SSID > Security Profile > Add/Edit Security Profile> Security Mode: wpa3 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Security Mode
Select a security mode from the list: open, enhanced open, wep, wpa2, or wpa2-mix, wpa3.
Authentication Settings
Enterprise
Select this to enable 802.1x secure authentication with a RADIUS server.
Reauthentication Timer
Enter the interval (in seconds) between authentication requests. Enter a 0 for unlimited time.
Personal
This field is available when you select the wpa2, wpa2-mix or wpa3 security mode.
Select this option to use a Pre-Shared Key (PSK) with WPA2 encryption or Simultaneous Authentication of Equals (SAE) with WPA3 encryption.
Pre-Shared Key
Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters.
Transition Mode
Enable this for backwards compatibility. This option is only available if the Security Mode is wpa3 or enhanced-open. This creates two virtual APs (VAPs) with a primary (wpa3 or enhanced-open) and fallback (wpa2 or none) security method.
If the Security Mode is wpa3, enabling this will force Management Frame Protection to be set to Optional. If this is disabled or if the Security Mode is enhanced-open, Management Frame Protection will be set to Required.
Idle Timeout
Enter the idle interval (in seconds) that a client can be idle before authentication is discontinued.
Group Key Update Timer
Enter the interval (in seconds) at which the AP updates the group WPA2 encryption key.
Management Frame Protection
This field is available only when you select wpa2 in the Security Mode field and set Cipher Type to aes.
Data frames in 802.11 WLANs can be encrypted and authenticated with WEP, WPA or WPA2. But 802.11 management frames, such as beacon/probe response, association request, association response, de-authentication and disassociation are always unauthenticated and unencrypted. IEEE 802.11w Protected Management Frames allows APs to use the existing security mechanisms (encryption and authentication methods defined in IEEE 802.11i WPA/WPA2) to protect management frames. This helps prevent wireless DoS attacks.
Select the check box to enable management frame protection (MFP) to add security to 802.11 management frames.
Select Optional if you do not require the wireless clients to support MFP. Management frames will be encrypted if the clients support MFP.
Select Required and wireless clients must support MFP in order to join the Zyxel Device’s wireless network.
Radius Settings
Primary / Secondary Radius Server Activate
Select this to have the Zyxel Device use the specified RADIUS server.
Radius Server IP Address
Enter the IP address of the RADIUS server to be used for authentication.
Radius Server Port
Enter the port number of the RADIUS server to be used for authentication.
Radius Server Secret
Enter the shared secret password of the RADIUS server to be used for authentication.
Primary / Secondary Accounting Server Activate
Select the check box to enable user accounting through an external authentication server.
Accounting Server IP Address
Enter the IP address of the external accounting server in dotted decimal notation.
Accounting Server Port
Enter the port number of the external accounting server. The default port number is 1813. You need not change this value unless your network administrator instructs you to do so with additional information.
Accounting Share Secret
Enter a password (up to 128 alphanumeric characters) as the key to be shared between the external accounting server and the Zyxel Device. The key must be the same on the external accounting server and your Zyxel Device. The key is not sent over the network.
Accounting Interim Update
This field is available only when you enable user accounting through an external authentication server.
Select this to have the Zyxel Device send subscriber status updates to the accounting server at the interval you specify.
Interim Update Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the accounting server.
MAC Authentication
Select this to use an external server or the Zyxel Device’s local database to authenticate wireless clients by their MAC addresses. Users cannot get an IP address if the MAC authentication fails.
An external server can use the wireless client’s account (username/password) or Calling Station ID for MAC authentication. Configure the ones the external server uses.
Delimiter (Account)
Select the separator the external server uses for the two-character pairs within account MAC addresses.
Case (Account)
Select the case (upper or lower) the external server requires for letters in the account MAC addresses.
Delimiter (Calling Station ID)
RADIUS servers can require the MAC address in the Calling Station ID RADIUS attribute.
Select the separator the external server uses for the pairs in calling station MAC addresses.
Case (Calling Station ID)
Select the case (upper or lower) the external server requires for letters in the calling station MAC addresses.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
MAC Filter List
This screen allows you to create and manage security configurations that can be used by your SSIDs.
Note: You can have a maximum of 32 MAC filtering profiles on the Zyxel Device.
Configuration > Object > AP Profile > SSID > MAC Filter List 
Label
Description
Add
Click this to add a new MAC filtering profile.
Edit
Click this to edit the selected MAC filtering profile.
Remove
Click this to remove the selected MAC filtering profile.
References
Click this to view which other objects are linked to the selected MAC filtering profile (for example, SSID profile).
#
This field is a sequential value, and it is not associated with a specific profile.
Profile Name
This field indicates the name assigned to the MAC filtering profile.
Filter Action
This field indicates this profile’s filter action (if any).
Add/Edit MAC Filter Profile
This screen allows you to create a new MAC filtering profile or edit an existing one.
SSID > MAC Filter List > Add/Edit MAC Filter Profile 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name. This name is only visible in the Web Configurator and is only for management purposes. Spaces and underscores are allowed.
Filter Action
Select allow to permit the wireless client with the MAC addresses in this profile to connect to the network through the associated SSID; select deny to block the wireless clients with the specified MAC addresses.
Add
Click this to add a MAC address to the profile’s list.
Edit
Click this to edit the selected MAC address in the profile’s list.
Remove
Click this to remove the selected MAC address from the profile’s list.
#
This field is a sequential value, and it is not associated with a specific profile.
MAC
This field specifies a MAC address associated with this profile.
Description
This field displays a description for the MAC address associated with this profile. You can click the description to make it editable. Enter up to 60 characters, spaces and underscores allowed.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
MON Profile
This screen allows you to set up monitor mode configurations that allow your connected APs to scan for other wireless devices in the vicinity. Once detected, you can use the Rogue AP screen to classify them as either rogue or friendly and then manage them accordingly.
Configuring MON Profile
Configuration > Object > MON Profile 
Label
Description
Add
Click this to add a new monitor mode profile.
Edit
Click this to edit the selected monitor mode profile.
Remove
Click this to remove the selected monitor mode profile.
Activate
To turn on an entry, select it and click Activate.
Inactivate
To turn off an entry, select it and click Inactivate.
References
Click this to view which other objects are linked to the selected monitor mode profile (for example, an AP management profile).
#
This field is a sequential value, and it is not associated with a specific user.
Status
This icon is lit when the entry is active and dimmed when the entry is inactive.
Profile Name
This field indicates the name assigned to the monitor profile.
Apply
Click Apply to save your changes back to the Zyxel Device.
Reset
Click Reset to return the screen to its last-saved settings.
Add/Edit MON Profile
This screen allows you to create a new monitor mode profile or edit an existing one.
Configuration > Object > MON Profile > Add/Edit MON Profile 
Label
Description
Activate
Select this to activate this monitor mode profile.
Profile Name
This field indicates the name assigned to the monitor mode profile.
Channel dwell time
Enter the interval (in milliseconds) before the AP switches to another channel for monitoring.
Scan Channel Mode
Select auto to have the AP switch to the next sequential channel once the Channel dwell time expires.
Select manual to set specific channels through which to cycle sequentially when the Channel dwell time expires. Selecting this options makes the Scan Channel List options available.
Country Code
Select the country code of where the Zyxel Device is located/installed.
The available channels vary depending on the country you selected. Be sure to select the correct/same country for both radios on an AP and all connected APs, in order to prevent roaming failure and interference to other systems.
*For US and Canada models, country code is fixed to US or Canada respectively and is not user selectable.
Set Scan Channel List (2.4 GHz)
Move a channel from the Available channels column to the Channels selected column to have the APs using this profile scan that channel when Scan Channel Mode is set to manual.
These channels are limited to the 2 GHz range (802.11 b/g/n).
Set Scan Channel List (5 GHz)
Move a channel from the Available channels column to the Channels selected column to have the APs using this profile scan that channel when Scan Channel Mode is set to manual.
These channels are limited to the 5 GHz range (802.11 a/n).
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
ZyMesh
This section shows you how to configure ZyMesh profiles for the Zyxel Device to apply to the managed APs.
ZyMesh is a Zyxel proprietary protocol that creates wireless mesh links between managed APs to expand the wireless network. Managed APs can provide services or forward traffic between the Zyxel Device and wireless clients. ZyMesh also allows the Zyxel Device to use CAPWAP to automatically update the configuration settings on the managed APs (in repeater mode) through wireless connections. The managed APs (in repeater mode) are provisioned hop by hop.
The managed APs in a ZyMesh must use the same SSID, channel number and pre-shared key. A manged AP can be either a root AP or repeater in a ZyMesh.
Note: All managed APs should be connected to the Zyxel Device directly to get the configuration file before being deployed to build a ZyMesh. Ensure you restart the managed AP after you change its operating mode using the Configuration > Wireless > AP Management screen (see AP Management Screens).
Root AP: a managed AP that can transmit and receive data from the Zyxel Device via a wired Ethernet connection.
Repeater: a managed AP that transmits and/or receives data from the Zyxel Device via a wireless connection through a root AP.
Note: When managed APs are deployed to form a ZyMesh for the first time, the root AP must be connected to an AP controller (the Zyxel Device).
The maximum number of hops (the repeaters between a wireless client and the root AP) you can have in a ZyMesh varies according to how many wireless clients a managed AP can support.
Note: A ZyMesh link with more hops has lower throughput.
Note: When the wireless connection between the root AP and the repeater is up, in order to prevent bridge loops, the repeater would not be able to transmit data through its Ethernet port(s). The repeater then could only receive power from a PoE device if you use PoE to provide power to the managed AP via an 8-ping Ethernet cable.
ZyMesh Profile
This screen allows you to manage and create ZyMesh profiles that can be used by the APs.
Configuration > Object > ZyMesh Profile 
Label
Description
Hide / Show Advanced Settings
Click this to display a greater or lesser number of configuration fields.
ZyMesh Provision Group
By default, this shows the MAC address used by the Zyxel Device’s first Ethernet port.
Say you have two AP controllers (Zyxel Devices) in your network and the primary AP controller is not reachable. You may want to deploy the second/backup AP controller in your network to replace the primary AP controller. In this case, it is recommended that you enter the primary AP controller’s ZyMesh Provision Group MAC address in the second AP controller’s ZyMesh Provision Group field.
If you didn’t change the second AP controller’s MAC address, managed APs in an existing ZyMesh can still access the networks through the second AP controller and communicate with each other. But new managed APs will not be able to communicate with the managed APs in the existing ZyMesh, which is set up with the primary AP controller’s MAC address.
To allow all managed APs to communicate in the same ZyMesh, you can just set the second AP controller to use the primary AP controller’s MAC address. Otherwise, reset all managed APs to the factory defaults and set up a new ZyMesh with the second AP controller’s MAC address.
Next
Click this button and follow the on-screen instructions to update the AP controller’s MAC address.
Add
Click this to add a new profile.
Edit
Click this to edit the selected profile.
Remove
Click this to remove the selected profile.
#
This field is a sequential value, and it is not associated with a specific profile.
Profile Name
This field indicates the name assigned to the profile.
ZyMesh SSID
This field shows the SSID specified in this ZyMesh profile.
Add/Edit ZyMesh Profile
This screen allows you to create a new ZyMesh profile or edit an existing one.
The following table describes the labels in this screen.
Configuration > Object > ZyMesh Profile > Add/Edit ZyMesh Profile 
Label
Description
Profile Name
Enter up to 31 alphanumeric characters for the profile name.
ZyMesh SSID
Enter the SSID with which you want the managed AP to connect to a root AP or repeater to build a ZyMesh link.
*The ZyMesh SSID is hidden in the outgoing beacon frame so a wireless device cannot obtain the SSID through scanning using a site survey tool.
Pre-Shared Key
Enter a pre-shared key of between 8 and 63 case-sensitive ASCII characters (including spaces and symbols) or 64 hexadecimal characters.
The key is used to encrypt the wireless traffic between the APs.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Address/Geo IP Overview
Address objects can represent a single IP address or a range of IP addresses. Address groups are composed of address objects and other address groups.
What You Need To Know
Address objects and address groups are used in dynamic routes, security policies, content filtering, and VPN connection policies. For example, addresses are used to specify where content restrictions apply in content filtering. Please see the respective sections for more information about how address objects and address groups are used in each one.
Address groups are composed of address objects and address groups. The sequence of members in the address group is not important.
Address Summary
The address screens are used to create, maintain, and remove addresses.There are the types of address objects:
HOST - the object uses an IP Address to define a host address
RANGE - the object uses a range address defined by a Starting IP Address and an Ending IP Address
SUBNET - the object uses a network address defined by a Network IP address and Netmask subnet mask
INTERFACE IP - the object uses the IP address of one of the Zyxel Device’s interfaces
INTERFACE SUBNET - the object uses the subnet mask of one of the Zyxel Device’s interfaces
INTERFACE GATEWAY - the object uses the gateway IP address of one of the Zyxel Device’s interfaces
GEOGRAPHY - the object uses the IP addresses of a country to represent a country
FQDN - the object uses a FQDN (Fully Qualified Domain Name). An FQDN consists of a host and domain name. For example, www.zyxel.com is a fully qualified domain name, where “www” is the host, “zyxel” is the second-level domain, and “com” is the top level domain. mail.myZyxel.com.tw is also an FQDN, where “mail” is the host, “myZyxel” is the third-level domain, “com” is the second-level domain, and “tw” is the top level domain.
FQDN Example
http://
www.
zyxel.
com
 
host name
second-level domain name
top-level domain name
 
FQDN
Uniform Resource Locator (URL)
In an address FQDN object, you can also use one wildcard. For example, *.zyxel.com.
The Address screen provides a summary of all addresses in the Zyxel Device. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Address/Geo IP > Address 
Label
Description
IPv4 Address Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry
#
This field is a sequential value, and it is not associated with a specific address.
Name
This field displays the configured name of each address object.
Type
This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces.
IPv4 Address
This field displays the IPv4 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Reference
This displays the number of times an object reference is used in a profile.
IPv6 Address Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific address.
Name
This field displays the configured name of each address object.
Type
This field displays the type of each address object. “INTERFACE” means the object uses the settings of one of the Zyxel Device’s interfaces.
IPv6 Address
This field displays the IPv6 addresses represented by each address object. If the object’s settings are based on one of the Zyxel Device’s interfaces, the name of the interface displays first followed by the object’s current address settings.
Reference
This displays the number of times an object reference is used in a profile.
IPv4 Address Add/Edit
The Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4) screen allows you to create a new address or edit an existing one.
The following table describes the labels in this screen.
Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv4)
Label
Description
Name
Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Address Type
Select the type of address you want to create.
*The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
IP Address
This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
Starting IP Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
Ending IP Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
Network
This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the IP address of the network that this address object represents.
Netmask
This field is only available if the Address Type is SUBNET, in which case this field cannot be blank. Enter the subnet mask of the network that this address object represents. Use dotted decimal format.
Interface
If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents.
Region
If you selected GEOGRAPHY as the Address Type, use this field to select a country or continent.
A GEOGRAPHY object uses the data from the country-to-IP/continent-to-IP address database. Go to the Configuration > Object > Address/Geo IP > Geo IP screen to configure the custom country-to-IP/continent-to-IP address mappings for a GEOGRAPHY object.
Country
If you selected Geography as the Address Type, use this field to select a country.
FQDN
If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
IPv6 Address Add/Edit
The Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6) screen allows you to create a new address or edit an existing one.
The following table describes the labels in this screen.
Configuration > Object > Address/GeoIP > Address > Add/Edit (IPv6)
Label
Description
Name
Type the name used to refer to the address. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Object Type
Select the type of address you want to create.
*The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
IPv6 Address
This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
IPv6 Starting Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
IPv6 Ending Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
IPv6 Address Prefix
This field is only available if the Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address.
Interface
If you selected INTERFACE IP, INTERFACE SUBNET, or INTERFACE GATEWAY as the Address Type, use this field to select the interface of the network that this address object represents.
IPv6 Address Type
Select whether the IPv6 address is a link-local IP address (LINK LOCAL), static IP address (STATIC), an IPv6 StateLess Address Auto Configuration IP address (SLAAC), or is obtained from a DHCPv6 server (DHCPv6).
Region
If you selected Geography as the Address Type, use this field to select a country or continent.
FQDN
If you selected FQDN as the Address Type, use this field to enter a fully qualified domain name.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Address Group Summary
The Address Group screen provides a summary of all address groups. Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Address/Geo IP > Address Group 
Label
Description
IPv4 Address Group Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific address group.
Name
This field displays the name of each address group.
Description
This field displays the description of each address group, if any.
Reference
This displays the number of times an object reference is used in a profile.
IPv6 Address Group Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific address group.
Name
This field displays the name of each address group.
Description
This field displays the description of each address group, if any.
Reference
This displays the number of times an object reference is used in a profile.
Address Group Add/Edit
The Address Group Add/Edit screen allows you to create a new address group or edit an existing one.
IPv4/IPv6 Address Group Configuration > Add 
Label
Description
Name
Enter a name for the address group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description
This field displays the description of each address group, if any. You can use up to 60 characters, punctuation marks, and spaces.
Address Type
Select the type of address you want to create.
*The Zyxel Device automatically updates address objects that are based on an interface’s IP address, subnet, or gateway if the interface’s IP address settings change. For example, if you change 1’s IP address, the Zyxel Device automatically updates the corresponding interface-based, LAN subnet address object.
Member List
The Member list displays the names of the address and address group objects that have been added to the address group. The order of members is not important.
Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
*Only objects of the same address type can be added to a address group.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Geo IP Summary
Use this screen to update the database of country-to-IP and continent-to-IP address mappings and manually configure custom country-to-IP and continent-to-IP address mappings in geographic address objects. You can then use geographic address objects in security policies to forward or deny traffic to whole countries or regions.
Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Address/Geo IP > Geo IP 
Label
Description
Country Database Update
Latest Version
This is the latest country-to-IP address database version on myZyxel. You need to have a registered Content Filter Service license.
Current Version
This is the country-to-IP address database version currently on the Zyxel Device.
Update Now
Click this to check for the latest country-to-IP address database version on myZyxel. The latest version is downloaded to the Zyxel Device and replaces the current version if it is newer. There are logs to show the update status. You need to have a registered Content Filter Service license.
Auto Update
If you want the Zyxel Device to check weekly for the latest country-to-IP address database version on myZyxel, select the checkbox, choose a day and time each week and then click Apply. The default day and time displayed is the Zyxel Device current day and time.
Custom IPv4/IPv6 to Geography Rules
IPv4/IPv6 to Geography
Enter an IP address, then click this button to query which country this IP address belongs to.
Add
Click this to create a new entry.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
#
This field is a sequential value, and it is not associated with a specific entry.
Geolocation
This field displays the name of the country or region that is associated with this IP address.
Type
This field displays whether this address object is HOST, RANGE or SUBNET.
IPv4/IPv6 Address
This field displays the IPv4/IPv6 addresses represented by the type of address object.
Region vs. Continent
Region
Enter a country name, then click the Region to Continent button to query which continent this country belongs to.
Continent
Select a continent, then click the Region List button to query which countries belong to the continent.
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Add Custom IPv4/IPv6 Address to Geography
This screen allows you to create a new geography-to-IP address mapping.
Geo IP > Add 
Label
Description
Region
Select the country or continent that maps to this IP address.
Address Type
Select the type of address you want to create. Choices are: HOST, RANGE, SUBNET.
IP Address
This field is only available if the Address Type is HOST. This field cannot be blank. Enter the IP address that this address object represents.
IP Starting Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the beginning of the range of IP addresses that this address object represents.
IP Ending Address
This field is only available if the Address Type is RANGE. This field cannot be blank. Enter the end of the range of IP address that this address object represents.
Network / Netmask
These fields are only available if the IPv4 Address Type is SUBNET. They cannot be blank. Enter the network IP and subnet mask that defines the IPv4 subnet.
IPv6 Address Prefix
This field is only available if the IPv6 Address Type is SUBNET. This field cannot be blank. Enter the IPv6 address prefix that the Zyxel Device uses for the LAN IPv6 address.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Service
Use service objects to define TCP applications, UDP applications, and ICMP messages. You can also create service groups to refer to multiple service objects in other features.
What You Need to Know
IP Protocols
IP protocols are based on the eight-bit protocol field in the IP header. This field represents the next-level protocol that is sent in this packet. This section discusses three of the most common IP protocols.
Computers use Transmission Control Protocol (TCP, IP protocol 6) and User Datagram Protocol (UDP, IP protocol 17) to exchange data with each other. TCP guarantees reliable delivery but is slower and more complex. Some uses are FTP, HTTP, SMTP, and TELNET. UDP is simpler and faster but is less reliable. Some uses are DHCP, DNS, RIP, and SNMP.
TCP creates connections between computers to exchange data. Once the connection is established, the computers exchange data. If data arrives out of sequence or is missing, TCP puts it in sequence or waits for the data to be re-transmitted. Then, the connection is terminated.
In contrast, computers use UDP to send short messages to each other. There is no guarantee that the messages arrive in sequence or that the messages arrive at all.
Both TCP and UDP use ports to identify the source and destination. Each port is a 16-bit number. Some port numbers have been standardized and are used by low-level system processes; many others have no particular meaning.
Unlike TCP and UDP, Internet Control Message Protocol (ICMP, IP protocol 1) is mainly used to send error messages or to investigate problems. For example, ICMP is used to send the response if a computer cannot be reached. Another use is ping. ICMP does not guarantee delivery, but networks often treat ICMP messages differently, sometimes looking at the message itself to decide where to send it.
Service Objects and Service Groups
Use service objects to define IP protocols.
TCP applications
UDP applications
ICMP messages
user-defined services (for other types of IP protocols)
These objects are used in policy routes, security policies.
Use service groups when you want to create the same rule for several services, instead of creating separate rules for each service. Service groups may consist of services and other service groups. The sequence of members in the service group is not important.
Service Summary
The Service summary screen provides a summary of all services and their definitions. In addition, this screen allows you to add, edit, and remove services.
Click a column’s heading cell to sort the table entries by that column’s criteria. Click the heading cell again to reverse the sort order.
Configuration > Object > Service > Service 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific service.
Name
This field displays the name of each service.
Content
This field displays a description of each service.
Reference
This displays the number of times an object reference is used in a profile.
Service Add/Edit
The Service Add/Edit screen allows you to create a new service or edit an existing one.
Configuration > Object > Service > Service > Edit 
Label
Description
Name
Type the name used to refer to the service. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
IP Protocol
Select the protocol the service uses. Choices are: TCP, UDP, ICMP, ICMPv6, and User Defined.
Starting Port
Ending Port
This field appears if the IP Protocol is TCP or UDP. Specify the port number(s) used by this service. If you fill in one of these fields, the service uses that port. If you fill in both fields, the service uses the range of ports.
ICMP Type
This field appears if the IP Protocol is ICMP or ICMPv6.
Select the ICMP message used by this service. This field displays the message text, not the message number.
IP Protocol Number
This field appears if the IP Protocol is User Defined.
Enter the number of the next-level protocol (IP protocol). Allowed values are 1 - 255.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Service Group Summary
The Service Group summary screen provides a summary of all service groups. In addition, this screen allows you to add, edit, and remove service groups.
Note: If you want to access the Zyxel Device using HTTP, HTTPS, SSH, and/or, TELNET, you must add them in the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group, which is used in the WAN_to_Device security policy.
Configuration > Object > Service > Service Group 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific service group.
Family
This field displays the Server Group supported type, which is according to your configurations in the Service Group Add/Edit screen.
There are 3 types of families:
IPv4 only
IPv6 only
IPv4 and IPv6
Name
This field displays the name of each service group.
By default, the Zyxel Device uses services starting with “Default_Allow_” in the security policies to allow certain services to connect to the Zyxel Device.
Description
This field displays the description of each service group, if any.
Reference
This displays the number of times an object reference is used in a profile.
Service Group Add/Edit
The Service Group Add/Edit screen allows you to create a new service group or edit an existing one.
Configuration > Object > Service > Service Group > Edit 
Label
Description
Name
Enter the name of the service group. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description
Enter a description of the service group, if any. You can use up to 60 printable ASCII characters.
Configuration
The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important.
Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Schedule Overview
Use schedules to set up one-time and recurring schedules for policy routes, security policies, and content filtering. The Zyxel Device supports one-time and recurring schedules. One-time schedules are effective only once, while recurring schedules usually repeat. Both types of schedules are based on the current date and time in the Zyxel Device.
Note: Schedules are based on the Zyxel Device’s current date and time.
What You Need to Know
One-time Schedules
One-time schedules begin on a specific start date and time and end on a specific stop date and time. One-time schedules are useful for long holidays and vacation periods.
Recurring Schedules
Recurring schedules begin at a specific start time and end at a specific stop time on selected days of the week (Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, and Saturday). Recurring schedules always begin and end in the same day. Recurring schedules are useful for defining the workday and off-work hours.
Schedule
The Schedule screen provides a summary of all schedules in the Zyxel Device.
Configuration > Object > Schedule 
Label
Description
One Time
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific schedule.
Name
This field displays the name of the schedule, which is used to refer to the schedule.
Start Day / Time
This field displays the date and time at which the schedule begins.
Stop Day / Time
This field displays the date and time at which the schedule ends.
Reference
This displays the number of times an object reference is used in a profile.
Recurring
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific schedule.
Name
This field displays the name of the schedule, which is used to refer to the schedule.
Start Time
This field displays the time at which the schedule begins.
Stop Time
This field displays the time at which the schedule ends.
Reference
This displays the number of times an object reference is used in a profile.
One-Time Schedule Add/Edit
The One-Time Schedule Add/Edit screen allows you to define a one-time schedule or edit an existing one.
Configuration > Object > Schedule > Edit (One Time) 
Label
Description
Configuration
Name
Type the name used to refer to the one-time schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Day Time
StartDate
Specify the year, month, and day when the schedule begins.
Year - 1900 - 2999
Month - 1 - 12
Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.)
StartTime
Specify the hour and minute when the schedule begins.
Hour - 0 - 23
Minute - 0 - 59
StopDate
Specify the year, month, and day when the schedule ends.
Year - 1900 - 2999
Month - 1 - 12
Day - 1 - 31 (it is not possible to specify illegal dates, such as February 31.)
StopTime
Specify the hour and minute when the schedule ends.
Hour - 0 - 23
Minute - 0 - 59
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Recurring Schedule Add/Edit
The Recurring Schedule Add/Edit screen allows you to define a recurring schedule or edit an existing one.
Configuration > Object > Schedule > Edit (Recurring) 
Label
Description
Configuration
Name
Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Date Time
StartTime
Specify the hour and minute when the schedule begins each day.
Hour - 0 - 23
Minute - 0 - 59
StopTime
Specify the hour and minute when the schedule ends each day.
Hour - 0 - 23
Minute - 0 - 59
Weekly
Week Days
Select each day of the week the recurring schedule is effective.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
Schedule Group
The Schedule Group screen provides a summary of all groups of schedules in the Zyxel Device.
Configuration > Object > Schedule > Schedule Group
label
description
Configuration
 
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific schedule.
Name
This field displays the name of the schedule group, which is used to refer to the schedule.
Description
This field displays the description of the schedule group.
Members
This field lists the members in the schedule group. Each member is separated by a comma.
Reference
This displays the number of times an object reference is used in a profile.
Schedule Group Add/Edit
The Schedule Group Add/Edit screen allows you to define a schedule group or edit an existing one.
Configuration > Schedule > Schedule Group > Add
label
description
Group Members
 
Name
Type the name used to refer to the recurring schedule. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Description
Enter a description of the service group, if any. You can use up to 60 printable ASCII characters.
Member List
The Member list displays the names of the service and service group objects that have been added to the service group. The order of members is not important.
Select items from the Available list that you want to be members and move them to the Member list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Move any members you do not want included to the Available list.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
AAA Server Overview
You can use a AAA (Authentication, Authorization, Accounting) server to provide access control to your network. The AAA server can be a Active Directory, LDAP, or RADIUS server. Use the AAA Server screens to create and manage objects that contain settings for using AAA servers. You use AAA server objects in configuring ext-group-user user objects and authentication method objects .
Directory Service (AD/LDAP)
LDAP/AD allows a client (the Zyxel Device) to connect to a server to retrieve information from a directory.
The following describes the user authentication procedure via an LDAP/AD server.
1 A user logs in with a user name and password pair.
2 The Zyxel Device tries to bind (or log in) to the LDAP/AD server.
3 When the binding process is successful, the Zyxel Device checks the user information in the directory against the user name and password pair.
4 If it matches, the user is allowed access. Otherwise, access is blocked.
RADIUS Server
RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external server instead of (or in addition to) an internal device user database that is limited to the memory capacity of the device. In essence, RADIUS authentication allows you to validate a large number of users from a central location.
ASAS
ASAS (Authenex Strong Authentication System) is a RADIUS server that works with the One-Time Password (OTP) feature. Purchase a Zyxel Device OTP package in order to use this feature. The package contains server software and physical OTP tokens (PIN generators). Do the following to use OTP. See the documentation included on the ASAS’ CD for details.
1 Install the ASAS server software on a computer.
2 Create user accounts on the Zyxel Device and in the ASAS server.
3 Import each token’s database file (located on the included CD) into the server.
4 Assign users to OTP tokens (on the ASAS server).
5 Configure the ASAS as a RADIUS server in the Zyxel Device’s Configuration > Object > AAA Server screens.
6 Give the OTP tokens to (local or remote) users.
AAA Servers Supported by the Zyxel Device
The following lists the types of authentication server the Zyxel Device supports.
Local user database
The Zyxel Device uses the built-in local user database to authenticate administrative users logging into the Zyxel Device’s Web Configurator or network access users logging into the network through the Zyxel Device. You can also use the local user database to authenticate VPN users.
Directory Service (LDAP/AD)
LDAP (Lightweight Directory Access Protocol)/AD (Active Directory) is a directory service that is both a directory and a protocol for controlling access to a network. The directory consists of a database specialized for fast information retrieval and filtering activities. You create and store user profile and login information on the external server.
RADIUS
RADIUS (Remote Authentication Dial-In User Service) authentication is a popular protocol used to authenticate users by means of an external or built-in RADIUS server. RADIUS authentication allows you to validate a large number of users from a central location.
Directory Structure
The directory entries are arranged in a hierarchical order much like a tree structure. Normally, the directory structure reflects the geographical or organizational boundaries.
Distinguished Name (DN)
A DN uniquely identifies an entry in a directory. A DN consists of attribute-value pairs separated by commas. The leftmost attribute is the Relative Distinguished Name (RDN). This provides a unique name for entries that have the same “parent DN” (“cn=domain1.com, ou=Sales, o=MyCompany” in the following examples).
cn=domain1.com, ou = Sales, o=MyCompany, c=US
cn=domain1.com, ou = Sales, o=MyCompany, c=JP
Base DN
A base DN specifies a directory. A base DN usually contains information such as the name of an organization, a domain name and/or country. For example, o=MyCompany, c=UK where o means organization and c means country.
Bind DN
A bind DN is used to authenticate with an LDAP/AD server. For example a bind DN of cn=zywallAdmin allows the Zyxel Device to log into the LDAP/AD server using the user name of zywallAdmin. The bind DN is used in conjunction with a bind password. When a bind DN is not specified, the Zyxel Device will try to log in as an anonymous user. If the bind password is incorrect, the login will fail.
Use the Active Directory or LDAP screen to manage the list of AD or LDAP servers the Zyxel Device can use in authenticating users.
Configuration > Object > AAA Server > Active Directory (or LDAP)  
label
description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific AD or LDAP server.
Name
This field displays the name of the Active Directory.
Server Address
This is the address of the AD or LDAP server.
Base DN
This specifies a directory. For example, o=Zyxel, c=US.
Adding an Active Directory or LDAP Server
Use this screen to create a new AD or LDAP entry or edit an existing one.
Configuration > Object > AAA Server > Active Directory (or LDAP) > Add 
label
description
Name
Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes.
Description
Enter the description of each server, if any. You can use up to 60 printable ASCII characters.
Server Address
Enter the address of the AD or LDAP server.
Backup Server Address
If the AD or LDAP server has a backup server, enter its address here.
Port
Specify the port number on the AD or LDAP server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535.
This port number should be the same on all AD or LDAP server(s) in this group.
Base DN
Specify the directory (up to 127 alphanumerical characters). For example, o=Zyxel, c=US.
This is only for LDAP.
Use SSL
Select Use SSL to establish a secure connection to the AD or LDAP server(s).
Search time limit
Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the AD or LDAP server. In this case, user authentication fails.
Search timeout occurs when either the user information is not in the AD or LDAP server(s) or the AD or LDAP server(s) is down.
Case-sensitive User Names
Select this if the server checks the case of the usernames.
Bind DN
Specify the bind DN for logging into the AD or LDAP server. Enter up to 127 alphanumerical characters.
For example, cn=zywallAdmin specifies zywallAdmin as the user name.
Password
If required, enter the password (up to 15 alphanumerical characters) for the Zyxel Device to bind (or log in) to the AD or LDAP server.
Retype to Confirm
Retype your new password for confirmation.
Login Name Attribute
Enter the type of identifier the users are to use to log in. For example “name” or “email address”.
Alternative Login Name Attribute
If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”.
Group Membership Attribute
An AD or LDAP server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device is to check to determine to which group a user belongs. The value for this attribute is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values.
For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”.
Domain Authentication for MSChap
Select the Enable checkbox to enable domain authentication for MSChap.
This is only for Active Directory.
User Name
Enter the user name for the user who has rights to add a machine to the domain.
This is only for Active Directory.
User Password
Enter the password for the associated user name.
This is only for Active Directory.
Retype to Confirm
Retype your new password for confirmation.
This is only for Active Directory.
Realm
Enter the realm FQDN.
This is only for Active Directory.
NetBIOS Name
Type the NetBIOS name. This field is optional. NetBIOS packets are TCP or UDP packets that enable a computer to connect to and communicate with a LAN which allows local computers to find computers on the remote network and vice versa.
Configuration Validation
Use a user account from the server specified above to test if the configuration is correct. Enter the account’s user name in the Username field and click Test.
OK
Click OK to save the changes.
Cancel
Click Cancel to discard the changes.
RADIUS Server Summary
Use the RADIUS screen to manage the list of RADIUS servers the Zyxel Device can use in authenticating users.
Configuration > Object > AAA Server > RADIUS 
label
description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field displays the index number.
Name
This is the name of the RADIUS server entry.
Server Address
This is the address of the AD or LDAP server.
Adding a RADIUS Server
Use this screen to create a new AD or LDAP entry or edit an existing one.
Configuration > Object > AAA Server > RADIUS > Add 
label
description
Name
Enter a descriptive name (up to 63 alphanumerical characters) for identification purposes.
Description
Enter the description of each server, if any. You can use up to 60 printable ASCII characters.
Server Address
Enter the address of the RADIUS server.
Authentication Port
Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535.
Backup Server Address
If the RADIUS server has a backup server, enter its address here.
Backup Authentication Port
Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535.
Key
Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device.
The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device.
Change of Authorization
The external RADIUS server can change its authentication policy and send CoA (Change of Authorization) or RADIUS Disconnect messages in order to terminate the subscriber’s service.
Select this option to allow the Zyxel Device to disconnect wireless clients based on the information (such as client’s user name and MAC address) specified in CoA or RADIUS Disconnect messages sent by the RADIUS server.
Server Address
Enter the IP address or Fully-Qualified Domain Name (FQDN) of the RADIUS accounting server.
Accounting Port
Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535.
Backup Server Address
If the RADIUS server has a backup accounting server, enter its address here.
Backup Accounting Port
Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535.
Key
Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device.
The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device.
Maximum Retry Count
At times the Zyxel Device may not be able to use the primary RADIUS accounting server. Specify the number of times the Zyxel Device should reattempt to use the primary RADIUS server before attempting to use the secondary RADIUS server. This also sets how many times the Zyxel Device will attempt to use the secondary RADIUS server.
For example, you set this field to 3. If the Zyxel Device does not get a response from the primary RADIUS server, it tries again up to three times. If there is no response, the Zyxel Device tries the secondary RADIUS server up to three times.
If there is also no response from the secondary RADIUS server, the Zyxel Device stops attempting to authenticate the subscriber. The subscriber will see a message that says the RADIUS server was not found.
Enable Accounting Interim Update
This field is configurable only after you configure a RADIUS accounting server address. Select this to have the Zyxel Device send subscriber status updates to the RADIUS server at the interval you specify.
Interim Interval
Specify the time interval for how often the Zyxel Device is to send a subscriber status update to the RADIUS server.
Timeout
Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the RADIUS server. In this case, user authentication fails.
Search timeout occurs when either the user information is not in the RADIUS server or the RADIUS server is down.
NAS IP Address
Type the IP address of the NAS (Network Access Server).
NAS Identifier
If the RADIUS server requires the Zyxel Device to provide the Network Access Server identifier attribute with a specific value, enter it here.
Case-sensitive User Names
Select this if you want configure your username as case-sensitive.
Group Membership Attribute
A RADIUS server defines attributes for its accounts. Select the name and number of the attribute that the Zyxel Device is to check to determine to which group a user belongs. If it does not display, select user-defined and specify the attribute’s number.
This attribute’s value is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values.
For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”.
OK
Click OK to save the changes.
Cancel
Click Cancel to discard the changes.
Auth. Method
Authentication method objects set how the Zyxel Device authenticates wireless, HTTP/HTTPS clients, and peer IPSec routers (extended authentication) clients. Configure authentication method objects to have the Zyxel Device use the local user database, and/or the authentication servers and authentication server groups specified by AAA server objects. By default, user accounts created and stored on the Zyxel Device are authenticated locally.
Configure AAA server objects before you configure authentication method objects.
Authentication Method Objects
You can create up to 16 authentication method objects.
Configuration > Object > Auth. Method 
label
description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field displays the index number.
Method Name
This field displays a descriptive name for identification purposes.
Method List
This field displays the authentication method(s) for this entry.
Creating an Authentication Method Object
Follow the steps below to create an authentication method object.
1 Click Configuration > Object > Auth. Method.
2 Click Add.
3 Specify a descriptive name for identification purposes in the Name field. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”.
4 Click Add to insert an authentication method in the table.
5 Select a server object from the Method List drop-down list box.
6 You can add up to four server objects to the table. The ordering of the Method List column is important. The Zyxel Device authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen.
If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server.
Note: You can NOT select two server objects of the same type.
7 Click OK to save the settings or click Cancel to discard all changes and return to the previous screen.
The following table describes the labels in this screen.
Configuration > Object > Auth. Method > Add 
label
description
Name
Specify a descriptive name for identification purposes.
You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. For example, “My_Device”.
Add
Click this to create a new entry. Select an entry and click Add to create a new entry after the selected entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
Move
To change a method’s position in the numbered list, select the method and click Move to display a field to type a number for where you want to put it and press [ENTER] to move the rule to the number that you typed.
The ordering of your methods is important as Zyxel Device authenticates the users using the authentication methods in the order they appear in this screen.
#
This field displays the index number.
Method List
Select a server object from the drop-down list box. You can create a server object in the AAA Server screen.
The Zyxel Device authenticates the users using the databases (in the local user database or the external authentication server) in the order they appear in this screen.
If two accounts with the same username exist on two authentication servers you specify, the Zyxel Device does not continue the search on the second authentication server when you enter the username and password that doesn’t match the one on the first authentication server.
OK
Click OK to save the changes.
Cancel
Click Cancel to discard the changes.
Two-Factor Authentication
Use two-factor authentication to have double-layer security to access a secured network behind the Zyxel Device via a VPN tunnel, Web Configurator, SSH, or Telnet.
The first layer is the VPN client/Zyxel Device’s login user name / password and the second layer is an authorized SMS (via mobile phone number) or email address.
Overview
This section introduces how two-factor authentication works.
VPN Access Via a VPN tunnel
1 A user runs a VPN client and logs in with the user name and password for this VPN tunnel.
2 The VPN client connects to the Zyxel Device and authenticates using the specified username and password.
3 The Zyxel Device requests the user’s user-name, password and mobile phone number or email address from the Active Directory, RADIUS server or local Zyxel Device database in order to authenticate this user (factor 1). If they are not found, then the Zyxel Device terminates the connection.
4 If all correct credentials are found, then the Zyxel Device performs one of the following actions:
Emails an authorization link to the admin user
Requests that the Email-to-SMS cloud system send an SMS with the authorization link
5 The client must open the authorization link or enter the authorization code within a specified deadline (Valid Time).
6 If the authorization is correct and received on time, then the client can access the secured network through the VPN tunnel. If the authorization deadline has expired, then the client has to log into the Zyxel Device again. If authorization credentials are incorrect or if the SMS/email was not received, then the client should contact the network administrator.
Admin Access Via the Web Configurator, SSH, or Telnet
1 An admin user connects to the Zyxel Device through the Web Configurator, SSH, or Telnet.
2 The Zyxel Device requests the admin user’s user-name, password and mobile phone number or email address from the Active Directory, RADIUS server or local Zyxel Device database in order to authenticate this admin user.
3 If all correct credentials are found, then the Zyxel Device performs one of the following actions:
Requests the Google Authenticator code
Emails an authorization link or code to the admin user
Requests that the Email-to-SMS cloud system send an SMS with an authorization link or code
4 The admin user must open the authorization link or enter the authorization code within a specified deadline (Valid Time).
5 If the authorization is correct and received on time, then the admin user can log into Zyxel Device. If the authorization deadline has expired, then the admin user has to log in again. If authorization credentials are incorrect code was received, then the admin user should contact the network administrator.
Pre-configuration
Before configuration, you must:
Set up the user’s user-name, password and email address or mobile number in the Active Directory, RADIUS server or local Zyxel Device database
Enable Two-factor Authentication in Object > User/Group > User > Edit > Two-factor Authentication for a specific user
Enable Two-factor Authentication in Object > Auth. Method > Two-factor Authentication for the Zyxel Device
Enable HTTP and/or HTTPS in System > WWW > Service Control
Enable SSH and/or Telnet in System > SSH and/or System > TELNET
Add HTTP, HTTPS, SSH, and/or, TELNET in the Object > Service > Service Group > Default_Allow_WAN_To_ZyWALL service group. This service group defines the default services allowed in the WAN_to_Device security policy.
For VPN access, configure the VPN tunnel for this user on the Zyxel Device
Email Authentication
Configure Mail Server in System > Notification > Mail Server.
SMS Authentication
Configure Mail Server in System > Notification > Mail Server.
Configure SMS in System > Notification > SMS.
Have an account with an Email-to-SMS cloud provider to be able to send SMS authorization requests
Google Authentication
Install Google Authenticator
Two-Factor authentication will fail under the following conditions:
You omit any of the pre-configuration items. Make sure to perform all pre-configuration items.
The user cannot receive the authorization SMS or email. Make sure the mobile telephone number or email address of the user in the Active Directory, RADIUS Server or local Zyxel Device database is configured correctly.
Email-to-SMS cloud system authentication fails. Make sure that SMS is enabled and credentials are correct in System > Notification > SMS.
Mail server authentication fails. Make sure the System > Notification > Mail Server settings are correct.
Authorization times out. Extend the Valid Time in Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access.
You are unable to access Google Authenticator (you lost your phone or uninstalled the app). Log in using one of the backup codes.
You get a Google Authenticator verification error. You must enter the code within the time displayed in Google Authenticator. The time on your cellphone and the time on the Zyxel Device must be the same.
Two-Factor Authentication VPN Access
Use this screen to select the users and VPN services that requires two-factor authentication.
The following table describes the labels in this screen.
Configuration > Object > Auth. Method > Two-factor Authentication > VPN Access
label
description
General Settings
 
Enable
Select the check box to require double-layer security to access a secured network behind the Zyxel Device via a VPN tunnel.
Valid Time
Enter the maximum time (in minutes) that the user must click or tap the authorization link in the SMS or email in order to get authorization for the VPN connection.
Two-factor Authentication for Services:
Select which kinds of VPN tunnels require Two-Factor Authentication. You should have configured the VPN tunnel first.
SSL VPN Access
IPSec VPN Access
L2TP/IPSec VPN Access
User/Group
This list displays the names of the users and user groups that can be selected for two-factor authentication. The order of members is not important. Select users and groups from the Selectable User/Group Objects list that require two-factor authentication for VPN access to a secured network behind the Zyxel Device and move them to the Selected User/Group Objects list. You can double-click a single entry to move it or use the [Shift] or [Ctrl] key to select multiple entries and use the arrow button to move them.
Similarly, move user/groups that do not you do not require two-factor authentication back to the Selectable User/Group Objects list.
Delivery Settings
Use this section to configure how to send an SMS or email for authorization.
Deliver Authorize Link Method:
Select one or both methods:
SMS: Object > User/Group > User must contain a valid mobile telephone number. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-].
Email: Object > User/Group > User must contain a valid email address. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com
Authorize Link URL Address:
Configure the link that the user will receive in the SMS or email. The user must be able to access the link.
http/https: you must enable HTTP or HTTPS in System > WWW > Service Control
From Interface/User-Defined: select the Zyxel Device WAN interface (wan1/2) or select User-Defined and then enter an IP address.
Message
You can either create a default message in the text box or upload a message file (Use Multilingual file) from your computer. The message file must be named '2FA-msg.txt' and be in UTF-8 format. To create the file, click Download the default 2FA-msg.txt example and edit the file for your needs. (If you make a mistake, use Restore Customized File to Default to restore your customized file to the default.) Use Select a File Path to locate the final file on your computer and then click Upload to transfer it to the Zyxel Device.
The message in either the text box or the file must contain the <url> variable within angle brackets, while the <user>, <host>, and <time> variables are optional.
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Two-Factor Authentication Admin Access
Use this screen to select the service (Web, SSH, and TELNET) that requires two-factor authentication for the admin user.
The following table describes the labels in this screen.
Configuration > Object > Auth. Method > Two-factor Authentication > Admin Access 
label
description
General Settings
 
Enable
Select the check box to require double-layer security to access a secured network behind the Zyxel Device via the Web Configurator, SSH, or Telnet.
Valid Time
Enter the maximum time (in minutes) that the user must click or tap the authorization link in the SMS or email in order to get authorization for logins via the Web Configurator, SSH, or Telnet.
Two-factor Authentication for Services:
Select which services require Two-Factor Authentication for the admin user.
Web
SSH
TELNET
Delivery Settings
Use this section to configure how to send an SMS or email for authorization.
Verification Code Delivery Method
Select one or both (All) methods:
SMS: Object > User/Group > User must contain a valid mobile telephone number. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-].
Email: Object > User/Group > User must contain a valid email address. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com
Apply
Click Apply to save the changes.
Reset
Click Reset to return the screen to its last-saved settings.
Certificate Overview
The Zyxel Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner’s identity and public key. Certificates provide a way to exchange public keys for use in authentication.
When using public-key cryptology for authentication, each host has two keys. One key is public and can be made openly available. The other key is private and must be kept secure.
These keys work like a handwritten signature (in fact, certificates are often referred to as “digital signatures”). Only you can write your signature exactly as it should look. When people know what your signature looks like, they can verify whether something was signed by you, or by someone else. In the same way, your private key “writes” your digital signature and your public key allows people to verify whether data was signed by you, or by someone else. This process works as follows.
1 Tim wants to send a message to Jenny. He needs her to be sure that it comes from him, and that the message content has not been altered by anyone else along the way. Tim generates a public key pair (one public key and one private key).
2 Tim keeps the private key and makes the public key openly available. This means that anyone who receives a message seeming to come from Tim can read it and verify whether it is really from him or not.
3 Tim uses his private key to sign the message and sends it to Jenny.
4 Jenny receives the message and uses Tim’s public key to verify it. Jenny knows that the message is from Tim, and that although other people may have been able to read the message, no-one can have altered it (because they cannot re-sign the message with Tim’s private key).
5 Additionally, Jenny uses her own private key to sign a message and Tim uses Jenny’s public key to verify the message.
The Zyxel Device uses certificates based on public-key cryptology to authenticate users attempting to establish a connection, not to encrypt the data that you send after establishing a connection. The method used to secure the data that you send through an established connection depends on the type of connection. For example, a VPN tunnel might use the triple DES encryption algorithm.
The certification authority uses its private key to sign certificates. Anyone can then use the certification authority’s public key to verify the certificates.
A certification path is the hierarchy of certification authority certificates that validate a certificate. The Zyxel Device does not trust a certificate if any certificate on its path has expired or been revoked.
Certification authorities maintain directory servers with databases of valid and revoked certificates. A directory of certificates that have been revoked before the scheduled expiration is called a CRL (Certificate Revocation List). The Zyxel Device can check a peer’s certificate against a directory server’s list of revoked certificates. The framework of servers, software, procedures and policies that handles keys is called PKI (public-key infrastructure).
Advantages of Certificates
Certificates offer the following benefits.
The Zyxel Device only has to store the certificates of the certification authorities that you decide to trust, no matter how many devices you need to authenticate.
Key distribution is simple and very secure since you can freely distribute public keys and you never need to transmit private keys.
Self-signed Certificates
You can have the Zyxel Device act as a certification authority and sign its own certificates.
Factory Default Certificate
The Zyxel Device generates its own unique self-signed certificate when you first turn it on. This certificate is referred to in the GUI as the factory default certificate.
Certificate File Formats
Any certificate that you want to import has to be in one of these file formats:
Binary X.509: This is an ITU-T recommendation that defines the formats for X.509 certificates.
PEM (Base-64) encoded X.509: This Privacy Enhanced Mail format uses lowercase letters, uppercase letters and numerals to convert a binary X.509 certificate into a printable form.
Binary PKCS#7: This is a standard that defines the general syntax for data (including digital signatures) that may be encrypted. A PKCS #7 file is used to transfer a public key certificate. The private key is not included. The Zyxel Device currently allows the importation of a PKS#7 file that contains a single certificate.
PEM (Base-64) encoded PKCS#7: This Privacy Enhanced Mail (PEM) format uses lowercase letters, uppercase letters and numerals to convert a binary PKCS#7 certificate into a printable form.
Binary PKCS#12: This is a format for transferring public key and private key certificates. The private key in a PKCS #12 file is within a password-encrypted envelope. The file’s password is not connected to your certificate’s public or private passwords. Exporting a PKCS #12 file creates this and you must provide it to decrypt the contents when you import the file into the Zyxel Device.
Note: Be careful not to convert a binary file to text during the transfer process. It is easy for this to occur since many programs use text files by default.
Verifying a Certificate
Before you import a trusted certificate into the Zyxel Device, you should verify that you have the correct certificate. You can do this using the certificate’s fingerprint. A certificate’s fingerprint is a message digest calculated using the MD5 or SHA1 algorithm. The following procedure describes how to check a certificate’s fingerprint to verify that you have the actual certificate.
1 Browse to where you have the certificate saved on your computer.
2 Make sure that the certificate has a “.cer” or “.crt” file name extension.
3 Double-click the certificate’s icon to open the Certificate window. Click the Details tab and scroll down to the Thumbprint Algorithm and Thumbprint fields.
4 Use a secure method to verify that the certificate owner has the same information in the Thumbprint Algorithm and Thumbprint fields. The secure method may very based on your situation. Possible examples would be over the telephone or through an HTTPS connection.
The My Certificates Screen
This is the Zyxel Device’s summary list of certificates and certification requests.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates 
Label
Description
PKI Storage Space in Use
This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Add
Click this to go to the screen where you can have the Zyxel Device generate a certificate or a certification request.
Edit
Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate.
Remove
The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action.
References
You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry.
Download
Click this and the following screen will appear.
Type the selected certificate’s password and save the selected certificate to your computer.
Email
Click this to email the selected certificate to the configured email address(es) for SSL connection establishment. This enables you to establish an SSL connection on your laptops, tablets, or smartphones.
 
Mail Subject: Type the subject line for outgoing email from the Zyxel Device.
Mail To: Type the email address (or addresses) to which the outgoing email is delivered.
Send Certificate with Private Key: Select the check box to send the selected certificate with a private key.
Password: Enter a private key of up to 31 keyboard characters for the certificate. The special characters listed in the brackets [;\|`~!@#$%^&*()_+\\{}':,./<>=-"] are allowed.
E-mail Content: Create the email content in English, and use up to 250 keyboard characters. The special characters listed in the brackets [;\|`~!@#$%^&*()_+\\{}':,./<>=-"] are allowed.
Compress as a ZIP File: Select the check box to compress the selected certificate.
Make sure the endpoint devices can decompress ZIP files before sending the compressed certificate.
It's recommended to compress the certificate with a private key. Some email servers block PKCS #12 files.
Send Email: Click this to send the selected certificate.
Cancel: Click this to return to the previous screen without saving your changes.
#
This field displays the certificate index number. The certificates are listed in alphabetical order.
Name
This field displays the name used to identify this certificate. It is recommended that you give each certificate a unique name.
Type
This field displays what kind of certificate this is.
REQ represents a certification request and is not yet a valid certificate. Send a certification request to a certification authority, which then issues a certificate. Use the My Certificate Import screen to import the certificate and replace the request.
SELF represents a self-signed certificate.
CERT represents a certificate issued by a certification authority.
Subject
This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
Import
Click Import to open a screen where you can save a certificate to the Zyxel Device.
Refresh
Click Refresh to display the current validity status of the certificates.
My Certificates Add
Use this screen to have the Zyxel Device create a self-signed certificate, enroll a certificate with a certification authority or generate a certification request.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates > Add 
Label
Description
Name
Type a name to identify this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Subject Information
Use these fields to record information that identifies the owner of the certificate. You do not have to fill in every field, although you must specify a Host IP Address, Host IPv6 Address, Host Domain Name, or E-Mail. The certification authority may add fields (such as a serial number) to the subject information when it issues a certificate. It is recommended that each certificate have unique subject information.
Select a radio button to identify the certificate’s owner by IP address, domain name or email address. Type the IP address (in dotted decimal notation), domain name or email address in the field provided. The domain name or email address is for identification purposes only and can be any string.
A domain name can be up to 255 characters. You can use alphanumeric characters, the hyphen and periods.
An email address can be up to 63 characters. You can use alphanumeric characters, the hyphen, the @ symbol, periods and the underscore.
Organizational Unit
Identify the organizational unit or department to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Organization
Identify the company or group to which the certificate owner belongs. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Town (City)
Identify the town or city where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
State, (Province)
Identify the state or province where the certificate owner is located. You can use up to 31 characters. You can use alphanumeric characters, the hyphen and the underscore.
Country
Enter a two-letter country code to Identify the nation where the certificate owner is located.
Key Type
Select RSA to use the Rivest, Shamir and Adleman public-key algorithm.
Select DSA to use the Digital Signature Algorithm public-key algorithm.
Key Length
Select a number from the drop-down list box to determine how many bits the key should use (1024 to 2048). The longer the key, the more secure it is. A longer key also uses more PKI storage space.
LifeTimes
Select how long the certificate is valid. It can be valid from 2 to 10 years.
Extended Key Usage
 
Server Authentication
Select this to have Zyxel Device generate and store a request for server authentication certificate.
Client Authentication
Select this to have Zyxel Device generate and store a request for client authentication certificate.
IKE Intermediate
Select this to have Zyxel Device generate and store a request for IKE Intermediate authentication certificate.
Create a self-signed certificate
Select this to have the Zyxel Device generate the certificate and act as the Certification Authority (CA) itself. This way you do not need to apply to a certification authority for certificates.
Create a certification request and save it locally for later manual enrollment
Select this to have the Zyxel Device generate and store a request for a certificate. Use the My Certificate Details screen to view the certification request and copy it to send to the certification authority.
Copy the certification request from the My Certificate Details screen and then send it to the certification authority.
OK
Click OK to begin certificate or certification request generation.
Cancel
Click Cancel to quit and return to the My Certificates screen.
If you configured the My Certificate Create screen to have the Zyxel Device enroll a certificate and the certificate enrollment is not successful, you see a screen with a Return button that takes you back to the My Certificate Create screen. Click Return and check your information in the My Certificate Create screen. Make sure that the certification authority information is correct and that your Internet connection is working properly if you want the Zyxel Device to enroll a certificate online.
My Certificates Edit
You can use this screen to view in-depth certificate information and change the certificate’s name.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates > Edit 
Label
Description
Name
This field displays the identifying name of this certificate. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Certification Path
This field displays for a certificate, not a certification request.
Click the Refresh button to have this read-only text box display the hierarchy of certification authorities that validate the certificate (and the certificate itself).
If the issuing certification authority is one that you have imported as a trusted certification authority, it may be the only certification authority in the list (along with the certificate itself). If the certificate is a self-signed certificate, the certificate itself is the only one in the list. The Zyxel Device does not trust the certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked.
Refresh
Click Refresh to display the certification path.
Certificate Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). “X.509” means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification authority or generated by the Zyxel Device.
Subject
This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O), State (ST), and Country (C).
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country.
With self-signed certificates, this is the same as the Subject Name field.
“none” displays for a certification request.
Signature Algorithm
This field displays the type of algorithm that was used to sign the certificate. The Zyxel Device uses rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Some certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. “none” displays for a certification request.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired. “none” displays for a certification request.
Key Algorithm
This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example).
Subject Alternative Name
This field displays the certificate owner‘s IP address (IP), domain name (DNS) or email address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text.
Extended Key Usage
This field displays how the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate.
Basic Constraint
This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path. This field does not display for a certification request.
MD5 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm.
SHA1 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm.
Certificate in PEM (Base-64) Encoded Format
This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form.
You can copy and paste a certification request into a certification authority’s web page, an email that you send to the certification authority or a text editor and save the file on a management computer for later manual enrollment.
You can copy and paste a certificate into an email to send to friends or colleagues or you can copy and paste a certificate into a text editor and save the file on a management computer for later distribution (via external storage device for example).
Export Certificate Only
Use this button to save a copy of the certificate without its private key. Click this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
Password
If you want to export the certificate with its private key, create a password and type it here. Make sure you keep this password in a safe place. You will need to use it if you import the certificate to another device.
Export Certificate with Private Key
Use this button to save a copy of the certificate with its private key. Type the certificate’s password and click this button. Click Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
OK
Click OK to save your changes back to the Zyxel Device. You can only change the name.
Cancel
Click Cancel to quit and return to the My Certificates screen.
My Certificates Import
Follow the instructions in this screen to save an existing certificate to the Zyxel Device.
Note: You can import a certificate that matches a corresponding certification request that was generated by the Zyxel Device. You can also import a certificate in PKCS#12 format, including the certificate’s public and private keys.
The certificate you import replaces the corresponding request in the My Certificates screen.
You must remove any spaces from the certificate’s filename before you can import it.
The following table describes the labels in this screen.
Configuration > Object > Certificate > My Certificates > Import 
Label
Description
File Path
Type in the location of the file you want to upload in this field or click Browse to find it.
You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device.
Browse
Click Browse to find the certificate file you want to upload.
Password
This field only applies when you import a binary PKCS#12 format file. Type the file’s password that was created when the PKCS #12 file was exported.
OK
Click OK to save the certificate on the Zyxel Device.
Cancel
Click Cancel to quit and return to the My Certificates screen.
Trusted Certificates
This screen displays a summary list of certificates that you have set the Zyxel Device to accept as trusted. The Zyxel Device also accepts any valid certificate signed by a certificate on this list as being trustworthy; thus you do not need to import any certificate that is signed by one of these certificates.
The following table describes the labels in this screen.
Configuration > Object > Certificate > Trusted Certificates 
Label
Description
PKI Storage Space in Use
This bar displays the percentage of the Zyxel Device’s PKI storage space that is currently in use. When the storage space is almost full, you should consider deleting expired or unnecessary certificates before adding more certificates.
Edit
Double-click an entry or select it and click Edit to open a screen with an in-depth list of information about the certificate.
Remove
The Zyxel Device keeps all of your certificates unless you specifically delete them. Uploading a new firmware or default configuration file does not delete your certificates. To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Subsequent certificates move up by one when you take this action.
References
You cannot delete certificates that any of the Zyxel Device’s features are configured to use. Select an entry and click References to open a screen that shows which settings use the entry.
#
This field displays the certificate index number. The certificates are listed in alphabetical order.
Name
This field displays the name used to identify this certificate.
Subject
This field displays identifying information about the certificate’s owner, such as CN (Common Name), OU (Organizational Unit or department), O (Organization or company) and C (Country). It is recommended that each certificate have unique subject information.
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as a common name, organizational unit or department, organization or company and country. With self-signed certificates, this is the same information as in the Subject field.
Valid From
This field displays the date that the certificate becomes applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expired! message if the certificate has expired.
Import
Click Import to open a screen where you can save the certificate of a certification authority that you trust, from your computer to the Zyxel Device.
Refresh
Click this button to display the current validity status of the certificates.
Trusted Certificates Edit
Use this screen to view in-depth information about the certificate, change the certificate’s name and set whether or not you want the Zyxel Device to check a certification authority’s list of revoked certificates before trusting a certificate issued by the certification authority.
The following table describes the labels in this screen.
Configuration > Object > Certificate > Trusted Certificates > Edit 
Label
Description
Name
This field displays the identifying name of this certificate. You can change the name. You can use up to 31 alphanumeric and ;‘~!@#$%^&()_+[]{}’,.=- characters.
Certification Path
Click the Refresh button to have this read-only text box display the end entity’s certificate and a list of certification authority certificates that shows the hierarchy of certification authorities that validate the end entity’s certificate. If the issuing certification authority is one that you have imported as a trusted certificate, it may be the only certification authority in the list (along with the end entity’s own certificate). The Zyxel Device does not trust the end entity’s certificate and displays “Not trusted” in this field if any certificate on the path has expired or been revoked.
Refresh
Click Refresh to display the certification path.
Enable X.509v3 CRL Distribution Points and OCSP checking
Select this check box to turn on/off certificate revocation. When it is turned on, the Zyxel Device validates a certificate by getting Certificate Revocation List (CRL) through HTTP or LDAP (can be configured after selecting the LDAP Server check box) and online responder (can be configured after selecting the OCSP Server check box).
OCSP Server
Select this check box if the directory server uses OCSP (Online Certificate Status Protocol).
URL
Type the protocol, IP address and path name of the OCSP server.
ID
The Zyxel Device may need to authenticate itself in order to assess the OCSP server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority).
Password
Type the password (up to 31 ASCII characters) from the entity maintaining the OCSP server (usually a certification authority).
LDAP Server
Select this check box if the directory server uses LDAP (Lightweight Directory Access Protocol). LDAP is a protocol over TCP that specifies how clients access directories of certificates and lists of revoked certificates.
Address
Type the IP address (in dotted decimal notation) of the directory server.
Port
Use this field to specify the LDAP server port number. You must use the same server port number that the directory server uses. 389 is the default server port number for LDAP.
ID
The Zyxel Device may need to authenticate itself in order to assess the CRL directory server. Type the login name (up to 31 ASCII characters) from the entity maintaining the server (usually a certification authority).
Password
Type the password (up to 31 ASCII characters) from the entity maintaining the CRL directory server (usually a certification authority).
Certificate Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. CA-signed means that a Certification Authority signed the certificate. Self-signed means that the certificate’s owner signed the certificate (not a certification authority). X.509 means that this certificate was created and signed according to the ITU-T X.509 recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the certification authority.
Subject
This field displays information that identifies the owner of the certificate, such as Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C).
Issuer
This field displays identifying information about the certificate’s issuing certification authority, such as Common Name, Organizational Unit, Organization and Country.
With self-signed certificates, this is the same information as in the Subject Name field.
Signature Algorithm
This field displays the type of algorithm that was used to sign the certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key encryption algorithm and the SHA1 hash algorithm). Other certification authorities may use rsa-pkcs1-md5 (RSA public-private key encryption algorithm and the MD5 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. The text displays in red and includes a Not Yet Valid! message if the certificate has not yet become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and includes an Expiring! or Expired! message if the certificate is about to expire or has already expired.
Key Algorithm
This field displays the type of algorithm that was used to generate the certificate’s key pair (the Zyxel Device uses RSA encryption) and the length of the key set in bits (1024 bits for example).
Subject Alternative Name
This field displays the certificate’s owner‘s IP address (IP), domain name (DNS) or email address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For example, “DigitalSignature” means that the key can be used to sign certificates and “KeyEncipherment” means that the key can be used to encrypt text.
Extended Key Usage
This field displays the method that the Zyxel Device generates and stores a request for server authentication, client authentication, or IKE Intermediate authentication certificate.
Basic Constraint
This field displays general information about the certificate. For example, Subject Type=CA means that this is a certification authority’s certificate and “Path Length Constraint=1” means that there can only be one certification authority in the certificate’s path.
MD5 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the MD5 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
SHA1 Fingerprint
This is the certificate’s message digest that the Zyxel Device calculated using the SHA1 algorithm. You can use this value to verify with the certification authority (over the phone for example) that this is actually their certificate.
Certificate
This read-only text box displays the certificate or certification request in Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase letters and numerals to convert a binary certificate into a printable form.
You can copy and paste the certificate into an email to send to friends or colleagues or you can copy and paste the certificate into a text editor and save the file on a management computer for later distribution (via external storage device for example).
Export Certificate
Click this button and then Save in the File Download screen. The Save As screen opens, browse to the location that you want to use and click Save.
OK
Click OK to save your changes back to the Zyxel Device. You can only change the name.
Cancel
Click Cancel to quit and return to the Trusted Certificates screen.
Trusted Certificates Import
Follow the instructions in this screen to save a trusted certificate to the Zyxel Device.
Note: You must remove any spaces from the certificate’s filename before you can import the certificate.
The following table describes the labels in this screen.
Configuration > Object > Certificate > Trusted Certificates > Import 
Label
Description
File Path
Type in the location of the file you want to upload in this field or click Browse to find it.
You cannot import a certificate with the same name as a certificate that is already in the Zyxel Device.
Browse
Click Browse to find the certificate file you want to upload.
OK
Click OK to save the certificate on the Zyxel Device.
Cancel
Click Cancel to quit and return to the previous screen.
ISP Account Overview
Use ISP accounts to manage Internet Service Provider (ISP) account information for PPPoE/PPTP/L2TP interfaces. An ISP account is a profile of settings for Internet access using PPPoE, PPTP or L2TP.
ISP Account Summary
This screen provides a summary of ISP accounts in the Zyxel Device.
The following table describes the labels in this screen.
Configuration > Object > ISP Account 
Label
Description
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to be able to modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific entry.
Profile Name
This field displays the profile name of the ISP account. This name is used to identify the ISP account.
Protocol
This field displays the protocol used by the ISP account.
Authentication Type
This field displays the authentication type used by the ISP account.
User Name
This field displays the user name of the ISP account.
ISP Account Add/Edit
The ISP Account Add/Edit screen lets you add information about new accounts and edit information about existing accounts.
The following table describes the labels in this screen.
Configuration > Object > ISP Account > Edit 
Label
Description
Profile Name
This field is read-only if you are editing an existing account. Type in the profile name of the ISP account. The profile name is used to refer to the ISP account. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Protocol
This field is read-only if you are editing an existing account. Select the protocol used by the ISP account. Your ISP will provide you with a related username, password and IP (server) information. Options are:
pppoe - This ISP account uses the PPPoE protocol.
pptp - This ISP account uses the PPTP protocol.
l2tp - This ISP account uses the L2TP protocol.
Authentication Type
Use the drop-down list box to select an authentication protocol for outgoing calls. Options are:
CHAP/PAP - Your Zyxel Device accepts either CHAP or PAP when requested by this remote node.
Chap - Your Zyxel Device accepts CHAP only.
PAP - Your Zyxel Device accepts PAP only.
MSCHAP - Your Zyxel Device accepts MSCHAP only.
MSCHAP-V2 - Your Zyxel Device accepts MSCHAP-V2 only.
Encryption Method
This field is available if this ISP account uses the PPTP protocol. Use the drop-down list box to select the type of Microsoft Point-to-Point Encryption (MPPE). Options are:
nomppe - This ISP account does not use MPPE.
mppe-40 - This ISP account uses 40-bit MPPE.
mppe-128 - This ISP account uses 128-bit MMPE.
User Name
Type the user name given to you by your ISP.
Password
Type the password associated with the user name above. The password can only consist of alphanumeric characters (A-Z, a-z, 0-9). This field can be blank.
Retype to Confirm
Type your password again to make sure that you have entered is correctly.
IP Address/FQDN
Enter the IP address or Fully-Qualified Domain Name (FQDN) of the PPTP or L2TP server.
Connection ID
This field is available if this ISP account uses the PPTP protocol. Type your identification name for the PPTP server. This field can be blank.
Service Name
If this ISP account uses the PPPoE protocol, type the PPPoE service name to access. PPPoE uses the specified service name to identify and reach the PPPoE server. This field can be blank.
If this ISP account uses the PPTP protocol, this field is not displayed.
Compression
Select On button to turn on stac compression, and select Off to turn off stac compression. Stac compression is a data compression technique capable of compressing data by a factor of about four.
Idle Timeout
This value specifies the number of seconds that must elapse without outbound traffic before the Zyxel Device automatically disconnects from the PPPoE/PPTP server. This value must be an integer between 0 and 360. If this value is zero, this timeout is disabled.
OK
Click OK to save your changes back to the Zyxel Device. If there are no errors, the program returns to the ISP Account screen. If there are errors, a message box explains the error, and the program stays in the ISP Account Edit screen.
Cancel
Click Cancel to return to the ISP Account screen without creating the profile (if it is new) or saving any changes to the profile (if it already exists).
DHCPv6 Overview
This section describes how to configure DHCPv6 request type and lease type objects.
The Request screen (see User/Group User Summary) allows you to configure DHCPv6 request type objects.
The Lease screen (see User/Group Group Summary) allows you to configure DHCPv6 lease type objects.
DHCPv6 Request
The Request screen allows you to add, edit, and remove DHCPv6 request type objects.
The following table describes the labels in this screen.
Configuration > Object > DHCPv6 > Request 
Label
Description
Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific object.
Name
This field displays the name of each request object.
Type
This field displays the request type of each request object.
Interface
This field displays the interface used for each request object.
Value
This field displays the value for each request object.
DHCPv6 Request Add/Edit
The Request Add/Edit screen allows you to create a new request object or edit an existing one.
The following table describes the labels in this screen.
Configuration > DHCPv6 > Request > Add 
Label
Description
Name
Type the name for this request object. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Request Type
Select the request type for this request object. You can choose from Prefix Delegation, DNS Server, NTP Server, or SIP Server.
Interface
Select the interface for this request object.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.
DHCPv6 Lease
The Lease screen allows you to add, edit, and remove DHCPv6 lease type objects.
The following table describes the labels in this screen.
Configuration > Object > DHCPv6 > Lease 
Label
Description
Configuration
Add
Click this to create a new entry.
Edit
Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings.
Remove
To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so.
References
Select an entry and click References to open a screen that shows which settings use the entry.
#
This field is a sequential value, and it is not associated with a specific object.
Name
This field displays the name of each lease object.
Type
This field displays the request type of each lease object.
Interface
This field displays the interface used for each lease object.
Value
This field displays the value for each lease object.
DHCPv6 Lease Add/Edit
The Lease Add/Edit screen allows you to create a new lease object or edit an existing one.
The following table describes the labels in this screen.
Configuration > DHCPv6 > Lease > Add/Edit 
Label
Description
Name
Type the name for this lease object. You may use 1-31 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive.
Lease Type
Select the lease type for this lease object. You can choose from Prefix Delegation, DNS Server, Address, Address Pool, NTP Server, or SIP Server.
Interface
Select the interface for this lease object.
DUID
If you select Prefix Delegation or Address in the Lease Type field, enter the DUID of the interface.
Address
If you select Address in the Lease Type field, enter the IP address of the DHCPv6 server.
Prefix
If you select Prefix Delegation or Address in the Lease Type field, enter the IPv6 prefix of the interface.
DNS Server
If you select DNS Server in the Lease Type field, select a request object or User Defined in the DNS Server field and enter the IP address of the DNS server in the User Defined Address field below.
Starting IP Address
If you select Address Pool in the Lease Type field, enter the first of the contiguous addresses in the IP address pool.
End IP Address
If you select Address Pool in the Lease Type field, enter the last of the contiguous addresses in the IP address pool.
NTP Server
If you select NTP Server in the Lease Type field, select a request object or User Defined in the NTP Server field and enter the IP address of the NTP server in the User Defined Address field below.
SIP Server
If you select SIP Server in the Lease Type field, select a request object or User Defined in the SIP field and enter the IP address of the SIP server in the User Defined Address field below.
User Defined Address
If you select DNS Server, NTP Server, or SIP Server as your lease type, you must enter the IP address of the server your selected.
OK
Click OK to save your changes back to the Zyxel Device.
Cancel
Click Cancel to exit this screen without saving your changes.