Type | Abilities | Login Method(s) |
---|---|---|
Local Administrator | ||
admin | Change the Zyxel Device settings (web, CLI) | WWW, SSH, FTP, Console |
viewer | Look at the Zyxel Device settings (web configurator, CLI) Perform basic diagnostics (CLI) | WWW, SSH, Console |
User | ||
user | Access network services | WWW |
External User (ext-user) | A user that is authenticated using an AD, LDAP or RADIUS authentication server. | WWW |
External Group User (ext-user) | A user group whose members are authenticated using an AD, LDAP or RADIUS authentication server. | WWW |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
Local Administrator | Use this table to view and configure the Zyxel Device admin accounts. |
Name | This field displays the user name of each user. |
User Type | This field displays the admin accounts the Zyxel Device uses. Admin accounts are users that can look at and change the configuration of the Zyxel Device. Viewer accounts are users that can just look at the configuration of the Zyxel Device. |
Description | This field displays the description for each user. |
Created Date | This field displays the date the account is created. This field displays - if the account is created before the Zyxel Device upgrades firmware to version 5.10 or later. |
Password Changed Date | This field displays the last time the user changed the account password. |
Reference | This displays the number of times an object reference is used in a profile. |
User | Use this table to configure the Zyxel Device: • User accounts. • Ext-user accounts. |
Name | This field displays the user name of each user. |
User Type | This field displays the types of user accounts the Zyxel Device uses: • User - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI). • External (Group) User - this user account is maintained in a remote server, such as RADIUS or LDAP. |
Description | This field displays the description for each user. |
Created Date | This field displays the date the account is created. |
Password Changed Date | This field displays the last time the user changes the account password. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
User Name | Type the user name for this user account. You may use 1-30 alphanumeric characters, periods (.), at (@), underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User names have to be different than user group names, and some words are reserved. |
User Type | Select the type of user account the Zyxel Device uses for the Local Administrator account from the drop-down list box. • Admin- this user can configure the Zyxel Device settings using the web configurator or CLI. • Viewer- this user can only view the Zyxel Device settings using the web configurator and perform basic diagnostics for troubleshooting using the command line interface (CLI). Select the type of user account the Zyxel Device uses for the User account from the drop-down list box: • User - this user has access to the Zyxel Device’s services and can also browse user-mode commands (CLI). • External User - this user account is maintained on a remote server, such as RADIUS or LDAP. |
Password | This field is not available if you select the External User type. Enter a password consisting of 4 to 63 characters for this user account, including [0-9] [a-z] [A-Z] [’(){}<>^‘+/:!*#@&=$\.~%,|;-”]. If the Password Policy is enabled in the User & Authentication > User/Group > Setting screen, the password criteria might be different. See Password Policy Setting Screen for more information. |
Retype | This field is not available if you select the External User type. |
Description | Enter the description of each user, if any. You can use 1 to 30 single-byte characters, including 0-9a-zA-Z!”#$%’()*+,-/:;=?@_ &.<>[\]{|}^‘are not allowed. Default descriptions are provided. |
Email | Type one or more valid email addresses for this user so that email messages can be sent to this user if required. A valid email address must contain the @ character. For example, this is a valid email address: abc@example.com. |
Mobile Number | Type a valid mobile telephone number for this user so that SMS messages can be sent to this user if required. A valid mobile telephone number can be up to 20 characters in length, including the numbers 1~9 and the following characters in the square brackets [+*#()-]. |
Authentication Timeout Settings | If you want the system to use default settings, select Use Default Settings. If you want to set authentication timeout to a value other than the default settings, select Use Manual Settings then fill your preferred values in the fields that follow. |
Lease Time | If you select Use Default Settings in the Authentication Timeout Settings field, the default lease time is shown. If you select Use Manual Settings, you need to enter the number of minutes this user has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically , the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires. |
Reauthentication Time | If you select Use Default Settings in the Authentication Timeout Settings field, the default reauthentication time is shown. If you select Use Manual Settings, you need to type the number of minutes this user can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. Unlike Lease Time, the user has no opportunity to renew the session without logging out. |
Enable Two-Factor Authentication for Admin Access | This field is available when you are editing a local administrator account. Enable this to require double-layer security to access a secured network behind the Zyxel Device via the Web Configurator. |
Apply | Click Apply to save your customized settings and exit this screen. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. Removing a group does not remove the user accounts in the group. |
Group Name | This field displays the name of each user group. |
Description | This field displays the description for each user group. |
Members | This field lists the members in the user group. Each member is separated by a comma. |
Reference | This displays the number of times an object reference is used in a profile. |
Label | Description |
---|---|
Name | Type the name for this user group. You may use 2-30 alphanumeric characters, underscores(_), or dashes (-), but the first character cannot be a number. This value is case-sensitive. User group names have to be different than user names. |
Description | Enter the description of the user group, if any. You can use up to 60 characters, punctuation marks, and spaces. |
Add Object | Click this button to create a new user account. |
Search | Type an item in the search box, then click this to display all user accounts in the table below according to the item you typed. |
Select All | Select this to select all user accounts and user groups in the table. |
Member List | This list displays the names of the users and user groups that have been added to the user group. The order of members is not important. Select items from the list on the left that you want to be members and move them to the list on the right. Move any members you do not want included to the list on the left. |
Apply | Click Apply to save your customized settings and exit this screen. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
User Default Settings | |
Default Authentication Timeout Settings | These authentication timeout settings are used by default when you create a new user account. They also control the settings for any existing user accounts that are set to use the default settings. You can still manually configure any user account’s authentication timeout settings. |
Edit | Select an entry and click this icon to modify it. ![]() |
Save Changes | Click this icon to save the changes in this row. ![]() |
Cancel Changes | Click this icon to cancel the changes in this row. ![]() |
User Type | These are the kinds of user account the Zyxel Device supports. • admin - this user can look at and change the configuration of the Zyxel Device • user - this user has access to the Zyxel Device’s services but cannot look at the configuration • ext-user - this user account is maintained in a remote server, such as RADIUS or LDAP. • viewer - this user can look at the configuration of the Zyxel Device |
Lease Time | This is the default lease time in minutes for each type of user account. It defines the number of minutes the user has to renew the current session before the user is logged out. Admin users renew the session every time the main screen refreshes in the Web Configurator. Access users can renew the session by clicking the Renew button on their screen. If you allow access users to renew time automatically, the users can select this check box on their screen as well. In this case, the session is automatically renewed before the lease time expires. To edit the lease time, enter the number of minutes this type of user account has to renew the current session before the user is logged out. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. |
Reauthentication Time | This is the default reauthentication time in minutes for each type of user account. It defines the number of minutes the user can be logged into the Zyxel Device in one session before having to log in again. Unlike Lease Time, the user has no opportunity to renew the session without logging out. To edit the reauthentication time, enter the number of minutes this type of user account can be logged into the Zyxel Device in one session before the user has to log in again. You can specify 1 to 1440 minutes. You can enter 0 to make the number of minutes unlimited. |
Miscellaneous Settings | |
Auto renew lease time | Enable to let access users renew lease time automatically. |
Admin User Type Login Security | |
Force change password | Enable to force local admin type users to change their password after the specified period of time when they log into the Zyxel Device. If the Password Policy is enabled, you will then be required to change your password to comply with the new rules. |
Period | Enter how often users must change their password when they log into the Zyxel Device. You can choose from once a day to once a year. |
Password Policy | |
Enabled | Enable this to set minimum length and character rules for the web configurator login password. The new password rules will take effect the next time you change your password. |
Name | This field displays the user name of the account. |
Setting | Click this to set minimum length and character rules for the web configurator login password. See Password Policy Setting Screen for more information. |
User Logon Settings | |
Limit simultaneous admin logons enable | Enable to set a limit on the number of simultaneous logins by admin users. If you do not select this, admin users can login as many times as they want at the same time using the same or different IP addresses. |
Maximum number per admin account | Type the maximum number of simultaneous logins by each admin user. |
Limit the simultaneous access logons enable | Select this check box if you want to set a limit on the number of simultaneous logins by non-admin users. If you do not select this, access users can login as many times as they want as long as they use different IP addresses. |
Maximum number per access account | Type the maximum number of simultaneous logins by each access user. |
Reach maximum number per account | Set the action the Zyxel Device will take when the limit you set for the numbers of simultaneous logins by admin users or non-admin users has exceeded. Select Block to have the Zyxel Device block any accounts that try to log in. Select Remove previous user and login to have the Zyxel Device remove the most recently login account |
User Lockout Settings | |
Enable logon retry limit enable | Enable to set a limit on the number of times each user can login unsuccessfully (for example, wrong password) before the IP address is locked out for a specified amount of time. |
Maximum retry count | This field is effective when Enable logon retry limit is checked. Type the maximum number of times each user can login unsuccessfully before the IP address is locked out for the specified lockout period. The number must be between 1 and 99. |
Lockout period | This field is effective when Enable logon retry limit is checked. Type the number of minutes the user must wait to try to login again, if logon retry limit is enabled and the maximum retry count is reached. This number must be between 1 and 65,535 (about 45.5 days). |
Apply | Click Apply to save the changes. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
Label | Description |
---|---|
Enable | Enable this to set the following rules on the web configurator login password. |
Minimum password length | Enable this and enter a number from 4-20 to specify the minimum number of characters for the web configurator login password. |
At least one upper case | Enable this to require the web configurator login password to include at least one uppercase letter (A-Z). |
At least one digit | Enable this to require the web configurator login password to include at least one number (0-9). |
At least one special character | Enable this to require the web configurator login password to include at least one special character, including ['`"~!@#$%^&*()\_-+={}|,<>/:;.]. |
OK | Click OK to save your customized settings and exit this screen. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
label | description |
---|---|
Add | Click this to create a new entry. |
Edit | Double-click an entry or select it and click Edit to open a screen where you can modify the entry’s settings. |
Remove | To remove an entry, select it and click Remove. The Zyxel Device confirms you want to remove it before doing so. |
References | Select an entry and click References to open a screen that shows which settings use the entry. |
Join Domain | Select an entry and click Join Domain to open a screen where you can add the AD server to the same domain as the Zyxel Device for central authentication management. See Join an AD Domain for more information. ![]() ![]() |
Remove From Domain | Select an entry and click Remove From Domain to remove the entry from the same domain as the Zyxel Device. The AD server is not isolated if it is not in the same domain as the Zyxel Device. You may do this for non-central authentication management such as when managing the Zyxel Device through NCC. |
Name | This field displays the name of the AD, LDAP or RADIUS server. |
Server Address | This is the address of the AD, LDAP or RADIUS server. |
Domain Name | This is the domain name of the AD, LDAP or RADIUS server. |
Reference | This is the number of times the entry is used in other settings. |
label | description |
---|---|
Configuration | |
Name | Enter a descriptive name for identification purposes. Use up to 31 single-byte characters, including 0-9a-zA-Z_-. |
Description | Enter the description of each server, if any. The value cannot exceed 61 characters. Valid characters are [0-9][a-z][A-Z]['()+,/:=?;!*#@$_%-"]. |
Server Settings | |
Server Address | Enter the IPv4 address of the AD server. |
Backup Server Address | If the AD server has a backup server, enter its address here. |
Port | Specify the port number on the AD or LDAP server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. This port number should be the same on all AD server(s) in this group. |
Use SSL | Select Use SSL to establish a secure connection to the AD server(s) from the Zyxel Device. |
Search time limit | Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the AD server. In this case, user authentication fails. Search timeout occurs when either the user information is not in the AD server(s) or the AD server(s) is down. |
Case-sensitive User Names | Select this if the AD server checks the case of usernames. |
Server Authentication | |
Domain Name | Enter the domain name to which AD server belongs. The Zyxel Device uses this to access the AD server. |
User Name | Enter the user name that the Zyxel Device uses to access the AD server. |
Password | Enter the password that the Zyxel Device uses to access the AD server. |
Retype to Confirm | Retype your new password for confirmation. |
Advanced Settings | |
User Attributes | |
Search Base | An Active Directory server has a hierarchical structure for user account entries. The search base is where the search starts for user account entries. This can help to make the authentication procedure faster. To limit the search to begin in a container beneath the root of the domain, you must specify the fully-qualified name of the container in comma-delimited form. Start with the name of the base container and progress to the root of the domain. The search string is not case-sensitive; you can use either uppercase or lowercase letters. The entry cannot exceed 128 characters. Valid characters are [0-9][a-z][A-Z][_(){}<>^`+/:!*#@&=$. ~%,;]. |
Login Name Attribute | Enter the type of identifier the users are to use to log in. For example “name” or “email address” |
Alternative Login Name Attribute | If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”. |
Group Membership Attribute | An AD server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device is to check to determine to which group a user belongs. The value for this attribute is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values. For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”. |
Configuration Validation | |
User Name | Enter an existing user account in this server to validate the above settings. Click the Test button |
Apply | Click Apply to save the changes. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
label | description |
---|---|
Associated AD Server Object | This field shows the name of the AD server object. |
AD Domain Name | This field shows the AD server domain name you want the Zyxel Device to join. |
NetBIOS Domain Name | Type the NetBIOS name. This field is required by the AD server to join its AD domain. NetBIOS packets are TCP or UDP packets that enable a computer to connect to and communicate with a LAN which allows local computers to find computers on the remote network and vice versa. The name must begin with a letter and cannot exceed 15 characters. Valid characters are [0-9][a-z][A-Z][_-.]. |
User Name | Enter the user name for the Zyxel Device to access the AD server. The value must be 1 to 20 characters long. Valid characters are [0-9][a-z][A-Z][_(){}<>[]^`+/:!*#@&=$\?.~%,|;-'" ]. |
Password | Enter the password associated with the user name. The value must be 4 to 63 characters long. Valid characters are [0-9][a-z][A-Z][_(){}<>^`+/:!*#@&=$\?.~%,|;-'"]. |
Retype to Confirm | Retype the password you entered in the Password field to confirm. |
Apply | Click Apply to save the changes. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
label | description |
---|---|
Configuration | |
Name | Enter a descriptive name for identification purposes. Use up to 31 single-byte characters, including 0-9a-zA-Z_-. |
Description | Enter the description of each server, if any. Use up to 61 single-byte characters, including 0-9a-zA-Z'()+,/:=?;!*#@$_%-". |
Server Settings | |
Server Address | Enter the IPv4 address of the LDAP server. |
Backup Server Address | If the LDAP server has a backup server, enter its address here. |
Port | Specify the port number on the LDAP server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. This port number should be the same on all LDAP server(s) in this group. |
Base DN | A base DN is the point from where a server will search for users. The entry cannot exceed 128 characters. Valid characters are [0-9][a-z][A-Z][_(){}<>^`+/:!*#@&=$. ~%,;]. |
Use SSL | Select Use SSL to establish a secure connection to the LDAP server(s). |
Search time limit | Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the LDAP server. In this case, user authentication fails. Search timeout occurs when either the user information is not in the LDAP server(s) or the LDAP server(s) is down. |
Case-sensitive User Names | Select this if you want configure your username as case-sensitive. |
Server Authentication | |
Bind DN | A bind DN is an object that you bind to inside LDAP to give you permission to make changes. The entry cannot exceed 128 characters. Valid characters are [0-9][a-z][A-Z][_(){}<>^`+/:!*#@&=$. ~%,;]. |
Password | Enter the password that the Zyxel Device uses to access the LDAP server. |
Retype to Confirm | Retype your new password for confirmation. |
Advanced Settings | |
User Attributes | |
Login Name Attribute | Enter the type of identifier the users are to use to log in. For example “name” or “email address”. |
Alternative Login Name Attribute | If there is a second type of identifier that the users can use to log in, enter it here. For example “name” or “email address”. |
Group Membership Attribute | A LDAP server defines attributes for its accounts. Enter the name of the attribute that the Zyxel Device is to check to determine to which group a user belongs. The value for this attribute is called a group identifier; it determines to which group a user belongs. You can add ext-group-user user objects to identify groups based on these group identifier values. For example you could have an attribute named “memberOf” with values like “sales”, “RD”, and “management”. Then you could also create a ext-group-user user object for each group. One with “sales” as the group identifier, another for “RD” and a third for “management”. |
Apply | Click Apply to save the changes. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
label | description |
---|---|
Name | Enter a descriptive name for identification purposes. Use up to 30 single-byte characters, including 0-9a-zA-Z_-. |
Description | Enter the description of each server, if any. Use up to 61 single-byte characters, including 0-9a-zA-Z'()+,/:=?;!*#@$_%-". |
Server Address | Enter the IPv4 address or FQDN of the RADIUS server. |
Authentication Port | Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. |
Backup Server Address | If the RADIUS server has a backup server, enter its address here. |
Backup Authentication Port | Specify the port number on the RADIUS server to which the Zyxel Device sends authentication requests. Enter a number between 1 and 65535. |
Key | Enter a password (up to 63 single-byte characters, including 0-9a-zA-Z_(){}<>^`+/:!*#@&=$\?.~%,|;-) as the key to be shared between the external authentication server and the Zyxel Device. Your password will be encrypted when you configure this field. The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device. |
Change of Authorization | The external RADIUS server can change its authentication policy and send CoA (Change of Authorization) or RADIUS Disconnect messages in order to terminate the subscriber’s service. Select this option to allow the Zyxel Device to disconnect wireless clients based on the information (such as client’s user name and MAC address) specified in CoA or RADIUS Disconnect messages sent by the RADIUS server. |
Server Address | Enter the IPv4 address or Fully-Qualified Domain Name (FQDN) of the RADIUS accounting server. |
Accounting Port | Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535. |
Backup Server Address | If the RADIUS server has a backup accounting server, enter its address here. |
Backup Accounting Port | Specify the port number on the RADIUS server to which the Zyxel Device sends accounting information. Enter a number between 1 and 65535. |
Key | Enter a password (up to 15 alphanumeric characters) as the key to be shared between the external authentication server and the Zyxel Device. The key is not sent over the network. This key must be the same on the external authentication server and the Zyxel Device. |
Timeout | Specify the timeout period (between 1 and 300 seconds) before the Zyxel Device disconnects from the RADIUS server. In this case, user authentication fails. Search timeout occurs when either the user information is not in the RADIUS server or the RADIUS server is down. |
NAS IP Address | Type the IP address of the NAS (Network Access Server). |
NAS Identifier | If the RADIUS server requires the Zyxel Device to provide the Network Access Server identifier attribute with a specific value, enter it here. |
Case-sensitive User Names | Select this if the RADIUS server requires case-sensitive usernames. Make sure usernames are configured correctly on the Zyxel Device. |
Group Membership Attribute | A RADIUS server defines attributes for its accounts. Select the name and number of the attribute that the Zyxel Device is to check to determine to which group a user belongs. If it does not display, select user-defined and specify the attribute’s number. This attribute’s value is called a group identifier; it determines to which group a user belongs. |
Apply | Click Apply to save the changes. |
Cancel | Click Cancel to return the screen to its last-saved settings. |
label | description |
---|---|
Enable | Enable this to require double-layer security to access the Zyxel Device via the Web Configurator or SSH. |
Valid Time | Enter the maximum time (in minutes) within which the user must enter the key received in Google Authenticator. |
Two-factor Authentication for Services | Select which services require Two-Factor Authentication for the admin user. You must select at least one. • Web • SSH |
VPN Access | |
Enable | Enable this to require double-layer security to access a secured network behind the Zyxel Device via a VPN tunnel. |
Valid time | Enter the maximum time (in minutes) within which the user must enter the key received in Google Authenticatorl in order to get authorization for access to a secured network behind the Zyxel Device via a VPN tunnel. |
Two-factor Authentication for Services | Select which types of VPN tunnels require Two-Factor Authentication for the admin user. You must select at least one. You should have configured the VPN tunnel first. • SSL VPN Access • IPSec VPN Access |
Delivery Settings | Use this section to configure how to send the VPN link. |
Authorize Link URL Address | Configure the link that the user will receive. The user must be able to access the link. • http/https: you must enable HTTP or HTTPS in System > Settings • From Interface/User-Defined: select the Zyxel Device WAN interface (ge3/4) or select User-Defined and then enter an IP address or domain name. |
Authorized Port | Configure a port between 1 and 65535 that is not in use by other services. Use this port for two-factor authentication of VPN clients to access the network behind the Zyxel Device. VPN clients do not need to change the port number on their devices, because the link to access the network behind the Zyxel Devices will contain the new port number. You must configure a security policy to allow access to this port from the WAN. |
Apply | Click Apply to save the changes. |
Cancel | Click Cancel to return the screen to its last-saved settings. |