Zyxel b-5000 manual




















Click the yellow Arrow icon to open the following screen. Use this screen to enable parental control and add more profiles. Add a profile to create restricted access schedules. Scheduled Profile This screen shows all the created profile s. Blocked Devices The screen shows the profile devices that are not allowed to access the Internet.

Use this screen to add a device s in a profile and block Internet access on the profile device s. Internet Blocking Click this switch to enable or disable Internet access. When the switch goes to the right the function is enabled. Profile Device List This field shows the devices selected on the right for this profile. Blocking Schedule This field shows the time during which Internet access is blocked on the profile device s. Select a device s on your network for this profile. Schedule Add New Schedule Click this to add a new block for scheduling.

Select All Day and the scheduler rule will be activated for 24 hours. Repeat On Select the days when Internet access is blocked on the profile device s. Back Click Back to return to the previous screen.

Use these screens to configure your Zyxel Device for Internet access. It connects your private networks, such as a LAN Local Area Network and other networks, so that a computer in one location can communicate with computers in other locations.

It is used by the Zyxel Device to communicate with other devices in other networks. ATM uses fixed-size packets of information called cells. ATM uses a connection-oriented model and establishes a virtual circuit VC.

It is designed to provide a low-overhead, transparent way of transporting packets over DSL links, as an alternative to ATM. The increase in IPv6 address size to bits from the bit IPv4 address allows up to 3. This is an example IPv6 address dba2ba2f So dba2ba2f can be written as dba2ba2f A double colon can only appear once in an IPv6 address. So dba2f can be written as dba2f, dba2f, dba2f or dba2f An IPv6 prefix length specifies how many most significant bits start from the left in the address compose the network address.

IPv6 Subnet Masking Both an IPv6 address and IPv6 subnet mask compose of bit binary digits, which are divided into eight bit blocks and written in hexadecimal notation. The local network can also use IPv4 services. The local network can also use IPv6 services. Get this information from your ISP. This is the index number of the entry.

Name This is the service name of the connection. Mode This shows whether the connection is in routing or bridge mode. Encapsulation This is the method of encapsulation used by this connection. IPv6 This shows whether IPv6 is activated or not for this connection. IPv6 is not available when the connection uses the bridging service. MLD is not available when the connection uses the bridging service.

Click the Delete icon to remove the WAN connection. Use this screen to configure a WAN connection. Name Specify a descriptive name for this connection. Encapsulation Select the method of encapsulation used by your ISP from the drop-down list box. This option is available only when you select Routing in the Mode field. The choices depend on the connection type you selected.

If assigned a name in the form user domain where domain identifies a service name, then enter both components exactly as given. PPP Password Enter the password associated with the user name above. Select password unmask to show your entered password in plain text. Auto Connect - select this to not let the connection time out.

On Demand - select this to automatically bring up the connection when the Zyxel Device receives packets destined for the Internet.

Idle Timeout This value specifies the time in minutes that elapses before the router automatically disconnects from the PPPoE server. Enter the VPI assigned to you. Enter the VCI assigned to you. To transport multiple protocols, the Zyxel Device needs separate VCs. There is a binding between a VC and the type of the network protocol carried on the VC. This reduces payload overhead since there is no need to carry protocol information in each Protocol Data Unit PDU payload.

Select Realtime VBR real-time Variable Bit Rate for applications with bursty connections that require closely controlled delay and delay variation. Type the PCR here. Type the MBS, which is less than Select the IEEE The greater the number, the higher the priority level. Select this if you have a dynamic IP address. Otherwise, it is not.

This allows the Zyxel Device to get subscribing information and maintain a joined member list for each multicast group. It can reduce multicast traffic significantly. This field is available only when you activate NAT. Select Option to have the Zyxel Device push static routes to clients. When you select this, the following fields appear. Prefix Length Enter the address prefix length to specify how many most significant bits in an IPv6 address compose the network address.

The gateway is a router or switch on the same segment as your Zyxel Device's interface s. The gateway helps forward packets to their destinations. You can enable IPv6 routing features in the following section. This allows the Zyxel Device to get subscription information and maintain a joined member list for each multicast group.

See Dual Stack Lite on page for more information. See IPv6 Rapid Deployment on page for more information. Select Manually Configured if you have the IPv4 address of the relay server. Cancel Click Cancel to exit this screen without saving.

Apply Click Apply to save your changes. Select Bridge as the encapsulation mode. The screen varies depending on the interface type you select. Name Enter a service name of the connection. Encapsulation Select the method of multiplexing used by your ISP from the drop-down list box.

This is the maximum rate at which the sender can send cells. Consult your cellular service provider to configure the settings in this screen. You can configure the frequency of the ping check and number of consecutive failures before triggering cellular backup. Check Cycle Enter the frequency of the ping check in this field. Consecutive Fail Enter how many consecutive failures are required before cellular backup is triggered. Ping the Host Select this to have the Zyxel Device ping the particular host name or IP address you typed in this field.

Cellular Connection Settings Card description This field displays the manufacturer and model name of your cellular card if you inserted one in the Zyxel Device. Without the PIN code, you cannot use the cellular card. If you enter the PIN code incorrectly, the cellular card may be blocked by your ISP and you cannot use the account to access the Internet. Your ISP should provide the phone number. Spaces are allowed. Connection Select Nailed UP if you do not want the connection to time out.

Select on Demand if you do not want the connection up all the time and specify an idle timeout in the Max Idle Timeout field. Subnet Mask Enter the subnet mask of the IP address. Enable Email Notification Select this to enable the email notification function. The Zyxel Device will email you a notification when the cellular connection is up. The Zyxel Device uses the corresponding mail server to send notifications. Cellular backup Email Title Type a title that you want to be in the subject line of the email notifications that the Zyxel Device sends.

Send Notification to Email Notifications are sent to the email address specified in this field. If this field is left blank, notifications cannot be sent via email. Click this to show the advanced cellular backup settings.

Budget Setup Enable Budget Control Click this switch to set a monthly limit for the user account of the installed cellular card. The Zyxel Device takes the actions you specified when a limit is exceeded during the month. Time Budget Select this and specify the amount of time in hours that the cellular connection can be used within one month. If you change the value after you configure and enable budget control, the Zyxel Device resets the statistics.

Reset all budget counters on Select the date on which the Zyxel Device resets the budget every month. Select last if you want the Zyxel Device to reset the budget on the last day of the month. Select specific and enter the number of the date you want the Zyxel Device to reset the budget.

Reset time and data budget counters Click this button to reset the time and data budgets immediately. This does not affect the normal monthly budget restart; so if you configured the time and data budget counters to reset on the second day of the month and you use this button on the first, the time and data budget counters will still reset on the second.

Actions before over budget Specify the actions the Zyxel Device takes before the time or data limit exceeds. Current Cellular connection Select Keep to maintain an existing cellular connection or Drop to disconnect it. Actions Enable Email Notification Click this switch to enable or disable the email notification function.

The Zyxel Device will email you a notification whenever over budget occurs. Cellular Backup Email Title Type a title that you want to be in the subject line of the email notifications that the Zyxel Device sends. Interval Enter the interval of how many minutes you want the Zyxel Device to email you. Enable Log Select this to activate the logging function at the interval you set in this field.

Cancel Click Cancel to return to the previous configuration. Apply Click Apply to save your changes back to the Zyxel Device. The Zyxel Device supports the PhyR retransmission scheme. PhyR is a retransmission scheme designed to provide protection against noise on the DSL line. It improves voice, video and data transmission resilience by utilizing a retransmission buffer. ITU-T G. PhyR US should be enabled if data being transmitted upstream is sensitive to noise. PhyR DS should be enabled if data being transmitted downstream is sensitive to noise.

Bit-swapping is a way of keeping the line more stable by constantly monitoring and redistributing bits between channels. Dmt : ITU G. The main difference between this specification and commonly deployed Annex A is the maximum distance that can be used.

The power of the lower frequencies used for transmitting data is boosted up to increase the reach of this signal up to 7 kilometers 23, ft. This specification extends the capability of commonly deployed Annex A by more than doubling the number of upstream bits. VDSL2 is defined in G. Profiles that use a wider frequency band can deliver higher maximum speeds. The Zyxel Device must comply with at least one profile specified in G. Click the switch to set up the configuration.

Click Apply to save your changes back to the Zyxel Device. Encapsulation Be sure to use the encapsulation method required by your ISP. The Zyxel Device can work in bridge mode or routing mode. When the Zyxel Device is in routing mode, it supports the following methods.

They are routed between the Ethernet interface and the WAN interface and then formatted so that they can be understood in a bridged environment.

For instance, it encapsulates routed Ethernet frames into bridged Ethernet cells. One of the benefits of PPPoE is the ability to let you access one of multiple network services, a function known as dynamic service selection. This enables the service provider to easily create and offer new IP services for individuals. Operationally, PPPoE saves significant effort for both you and the ISP or carrier, as it requires no specific configuration of the broadband modem at the customer site.

The first method allows multiplexing of multiple protocols over a single ATM virtual circuit LLC-based multiplexing and the second method assumes that each protocol is carried over a separate ATM virtual circuit VC-based multiplexing. Please refer to RFC for more detailed information. Multiplexing There are two conventions to identify what protocols the virtual circuit VC is carrying. Be sure to use the multiplexing method required by your ISP.

VC-based Multiplexing In this case, by prior mutual agreement, each protocol is assigned to a specific virtual circuit; for example, VC1 carries IP, etc. VC-based multiplexing may be dominant in environments where dynamic creation of large numbers of ATM VCs is fast and economical. LLC-based Multiplexing In this case one VC carries multiple protocols with protocol identifying information being contained in each packet header.

Despite the extra bandwidth and processing overhead, this method may be advantageous if it is not practical to have a separate VC for each carried protocol, for example, if charging heavily depends on the number of simultaneous VCs.

Traffic Shaping Traffic Shaping is an agreement between the carrier and the subscriber to regulate the average rate and fluctuations of data transmission over an ATM network. This agreement helps eliminate congestion, which is important for transmission of real time data such as audio and video connections.

This parameter may be lower but not higher than the maximum line speed. This rate is not guaranteed because it is dependent on the line speed. It specifies the maximum average rate at which cells can be sent over the virtual connection.

CBR traffic is generally time-sensitive doesn't tolerate delay. CBR is used for connections that continuously require a specific amount of bandwidth. A PCR is specified and if traffic exceeds this rate, cells may be dropped. Examples of connections that need CBR would be high-resolution video and voice. It also provides a fixed amount of bandwidth a PCR is specified but is only available when data is being sent. Video conferencing requires real-time data transfers and the bandwidth requirement varies in proportion to the video image's changing dynamics.

It is commonly used for "bursty" traffic typical on LANs. However, UBR doesn't guarantee any bandwidth and only delivers traffic when the network has spare bandwidth. An example application is background file transfer. The Single User Account feature can be enabled or disabled if you have either a dynamic or static IP. However, the encapsulation method assigned influences your choices for IP address and default gateway.

Devices on a logical network belong to one group. A device can belong to more than one group. With VLAN, a device cannot directly talk to or hear from devices that are not in the same group s ; the traffic must first go through a router.

When properly configured, VLAN prevents one subscriber from accessing the network resources of another on the same LAN, thus a user will not see the printers and hard disks of another user in the same building. VLAN also increases network performance by limiting broadcasts to a smaller and more manageable logical broadcast domain.

In traditional switched environments, all broadcast packets go to each and every individual port. With VLAN, all broadcasts are confined to a specific broadcast domain. Introduction to IEEE If a frame received at an Ethernet port has a CFI set to 1, then that frame should not be forwarded as it is to an untagged port.

Multicast delivers IP packets to a group of hosts on the network not everybody and not just 1. Internet Group Multicast Protocol IGMP is a network-layer protocol used to establish membership in a Multicast group - it is not used to carry user data. If you would like to read more detailed information about interoperability between IGMP version 2 and version 1, please see sections 4 and 5 of RFC The class D IP address is used to identify host groups and can be in the range The address All hosts must join the At start up, the Zyxel Device queries all directly connected networks to gather group membership.

After that, the Zyxel Device periodically updates this information. The DNS server is extremely important because without it, you must know the IP address of a computer before you can access it. IPv6 Addressing The bit IPv6 address is written as eight bit hexadecimal blocks separated by colons :. In the same way that walkie-talkie radios send and receive information over the airwaves, wireless networking devices exchange information with one another.

A wireless networking device is just like a radio that lets your computer exchange information with radios attached to other computers. Like walkie-talkies, most wireless networking devices operate at radio frequency bands that are open to the public and do not require a license to use. However, wireless networking is different from that of most traditional radio communications in that there are a number of wireless networking standards available with different methods of data encryption.

These are basic elements for starting a wireless service. Wireless Network Setup Band This shows the wireless band which this radio profile is using. Wireless Click this switch to enable or disable the wireless LAN in this field. When the switch turns blue , the function is enabled. Channel Use Auto to have the Zyxel Device automatically determine a channel to use. A standard 20 MHz channel offers transfer speeds of up to Mbps whereas a 40 MHz channel uses two standard channels and offers speeds of up to Mbps.

The wireless clients must also support 40 MHz. It is often better to use the 20 MHz setting in a location where the environment hinders the wireless signal. An 80 MHz channel groups adjacent 40 MHz channels into pairs to increase bandwidth even higher. Select 20MHz if you want to lessen radio interference with other wireless devices in your neighborhood or the wireless clients do not support channel bonding. Control Sideband This is available for some regions when you select a specific channel and set the Bandwidth field to 40MHz.

Set whether the control channel set in the Channel field should be in the Lower or Upper range of channel bands. Max Clients Specify the maximum number of clients that can connect to this network at the same time. Multicast Forwarding Select this check box to allow the Zyxel Device to convert wireless multicast traffic into wireless unicast traffic. Upstream Bandwidth Max. Downstream Bandwidth Max. The wireless clients which want to associate to this network must have same wireless security settings as the Zyxel Device.

When you select to use a security, additional options appears in this screen. Or you can select No Security to allow any client to associate this network without any data encryption or authentication. See the following sections for more details about this field. Cancel Click Cancel to restore your previously saved settings.

Note: If you do not enable any wireless security on your Zyxel Device, your network is accessible to any wireless networking device that is within range. It offers slightly better security, although the use of PSK makes it less robust than it could be.

Select More Secure as the security level. Generate password automatically Select this option to have the Zyxel Device automatically generate a password. The password field will not be configurable when you select this option. Password Select Generate password automatically or enter a Password. The password has two uses. Manually enter the same password on the Zyxel Device and the client. Click this Encryption to show more fields in this section. Click again to hide them.

You can also configure additional wireless networks, each with different security settings, in this screen. The following screen displays. The following table introduces the supported wireless networks. This field displays the name of the wireless profile on the network.

When a wireless client scans for an AP to associate with, this is the name that is broadcast and seen in the wireless client utility. If Home Guest displays, clients can connect to each other directly. If External Guest displays, clients are blocked from connecting to each other directly. When the switch turns blue , the function is enabled; otherwise, it is not. Access Scenario If you select Home Guest, clients can connect to each other directly.

If you select External Guest, clients are blocked from connecting to each other directly. The wireless clients which want to associate to this network must have the same wireless security settings as the Zyxel Device. After you select to use a security, additional options appears in this screen.

See Section 7. If you did not select Generate password automatically, you can manually type a pre-shared key from 8 to 64 case-sensitive keyboard characters. OK Click OK to save your changes. It is assigned at the factory and consists of six pairs of hexadecimal characters; for example, A0:C Note: You can have up to 25 MAC authentication rules.

The screen appears as shown. Select Disable to turn off MAC filtering. Select Deny to block access to the Zyxel Device. MAC addresses not listed will be allowed to access the Zyxel Device. Select Allow to permit access to the Zyxel Device. MAC addresses not listed will be denied access to the Zyxel Device. Modify Click the Edit icon and type the MAC address of the peer device in a valid MAC address format six hexadecimal character pairs, for example a:bc.

Click the Delete icon to delete the entry. You can also click the Edit icon next to a MAC authentication rule to edit the rule. Enter the MAC addresses of the wireless devices that are allowed or denied access to the Zyxel Device in these address fields. Enter the MAC addresses in a valid MAC address format, that is, six hexadecimal character pairs, for example, a:bc.

With comprehensive end-to-end solutions, Zyxel successfully helped wilhelm. EasyMesh and WiFi 6 standards-compliant system ensures super-fast, corner-to-corner connectivity. Secure subscribers' home networks with future-proof, full-aspect protection in an all-in-one device. Comprehensive portfolios to satisfy a range of fiber deployment configurations. Deliver both speed and value with a flexible, scalable, and interoperable premium portfolio.

Then you will need to configure the same account and host name on the EMG later. You can then log into the EMG and manage it. Thomas noticed that his daughter Josephine spends too much time surfing the web and downloading media files. He decided to prevent Josephine from accessing the Internet so that she can concentrate on preparing for her final exams. Select the Enable check box to activate MAC filter function.

Thomas can also grant access to the computers of other members of his family and friends. However, Josephine and others not listed in this screen will no longer be able to access the Internet through the EMG. After you log into the Web Configurator, the Network Map screen appears. This shows the network connection status of the EMG and clients connected to it. Use this screen to view the network connection status of the device and its clients.

A warning message appears if there is a connection problem. Click the IP address if you want to change it. If you prefer to view the status in a list, click List View in the Viewing mode selection box. You can configure how often you want the EMG to update this screen in Refresh interval. Use this screen to view the status of the EMG. Click Status to open this screen. The possible values. It assigns IP addresses to other computers in the. This displays the type of security mode the wireless interface is using in the wireless LAN.

This displays the type of This field displays how long the EMG has been running since it last started up. The EMG starts. This field displays the current date and time in the EMG. You can change this in. If you want some applications to have more throughput, you. Usually, this.

See Section This field also displays the number of active NAT sessions and the maximum number of. Use these screens to configure your EMG for Internet access. It connects your private networks, such as a LAN Local Area Network and other networks, so that a computer in one location can communicate with computers in other locations. Welcome to ManualMachine. We have sent a verification link to to complete your registration.

Log In Sign Up. Forgot password? Enter your email address and check your inbox. Please check your email for further instructions. Enter a new password. Table of Contents 3. Table of Contents 6. Table of Contents 9. Table of Contents Table of Contents Chapter 24 System Overview What You Can Do in this Chapter What You Need to Know EMG Access and Login Internet Access Wireless Internet Access Customer Support Appendix B IPv6 Appendix D Services Appendix E Legal Information Index Chapter 1 Introducing the EMG 1.

Figure 3 Triple Play Example 1. Blinking The EMG is upgrading its firmware. Off The EMG is not receiving power. Off There is no Internet connection or the gateway is in bridged mode. Green On The 2. WiFi 2. See Section 6. Off The 2. Green On The 5 GHz wireless network is activated. Off The 5 GHz wireless network is not activated.

Amber On The 2. Off Both 2. WPS 1. Table 2 Wall Mounting Information Distance between holes 90 mm M4 Screws Two Screw anchors optional Two 5 Select a position free of obstructions on a wall strong enough to hold the weight of the device.

Chapter 1 Introducing the EMG 7 If using screw anchors, drill two holes for the screw anchors into the wall. Chapter 2 The Web Configurator 2.

The icons provide the following functions. You can also add new WAN connections. Others Use this screen to configure advanced wireless settings.

Wake on LAN Use this screen to remotely turn on a device on the local network. You can also configure the QoS rules and actions. Queue Setup Use this screen to configure QoS queues. Classification Use this screen to define a classifier. Setup Shaper Setup Use this screen to limit outgoing traffic rate on the selected interface. Policer Setup Use this screen to configure QoS policers. Applications Use this screen to configure servers behind the EMG.

DMZ Use this screen to configure a default server which receives packets from ports that are not specified in the Port Forwarding screen. Grouping Grouping Security Firewall General Use this screen to configure the security level of your firewall.

Did you know? If your internet connection is spotty or slow, the best place to start is rebooting your modem. Still not running right?

Check to see if you need to update the modem's firmware. Modem setup. Quick setup. Set up your modem and activate your internet Connect to your modem using WiFi. Manual network WAN setup. If instructed to do so by a technician, you may need to change the WAN settings on your modem manually.

Wireless WiFi setup. Your modem's wireless settings control the WiFi network in your home. Click on the options below for details and step-by-step instructions.

Basic settings Wireless security 2. Helpful WiFi topics. Modem status. Reboot Restore defaults Upgrade firmware Ping test.



0コメント

  • 1000 / 1000