Page 216 / 237 Scroll up to view Page 211 - 215
Appendix D Wireless LANs
NBG-418N v2 User’s Guide
216
For directional antennas, point the antenna in the direction of the desired coverage area.
Page 217 / 237
NBG-418N v2 User’s Guide
217
A
PPENDIX
E
Common Services
The following table lists some commonly-used services and their associated protocols and port
numbers. For a comprehensive list of port numbers, ICMP type/code numbers and services, visit
the IANA (Internet Assigned Number Authority) web site.
Name
: This is a short, descriptive name for the service. You can use this one or create a
different one, if you like.
Protocol
: This is the type of IP protocol used by the service. If this is
TCP/UDP
, then the service
uses the same port number with TCP and UDP. If this is
USER-DEFINED
, the
Port(s
) is the IP
protocol number, not the port number.
Port(s)
: This value depends on the
Protocol
. Please refer to RFC 1700 for further information
about port numbers.
If the
Protocol
is
TCP
,
UDP
, or
TCP/UDP
, this is the IP port number.
If the
Protocol
is
USER
, this is the IP protocol number.
Description
: This is a brief explanation of the applications that use this service or the situations
in which this service is used.
Table 81
Commonly Used Services
NAME
PROTOCOL
PORT(S)
DESCRIPTION
AH
(IPSEC_TUNNEL)
User-Defined
51
The IPSEC AH (Authentication Header) tunneling
protocol uses this service.
AIM/New-ICQ
TCP
5190
AOL’s Internet Messenger service. It is also used as
a listening port by ICQ.
AUTH
TCP
113
Authentication protocol used by some servers.
BGP
TCP
179
Border Gateway Protocol.
BOOTP_CLIENT
UDP
68
DHCP Client.
BOOTP_SERVER
UDP
67
DHCP Server.
CU-SEEME
TCP
UDP
7648
24032
A popular video conferencing solution from White
Pines Software.
DNS
TCP/UDP
53
Domain Name Server, a service that matches web
names (for example
www.zyxel.com
) to IP
numbers.
ESP
(IPSEC_TUNNEL)
User-Defined
50
The IPSEC ESP (Encapsulation Security Protocol)
tunneling protocol uses this service.
FINGER
TCP
79
Finger is a UNIX or Internet related command that
can be used to find out if a user is logged on.
FTP
TCP
TCP
20
21
File Transfer Program, a program to enable fast
transfer of files, including large files that may not
be possible by e-mail.
H.323
TCP
1720
NetMeeting uses this protocol.
HTTP
TCP
80
Hyper Text Transfer Protocol - a client/server
protocol for the world wide web.
Page 218 / 237
Appendix E Common Services
NBG-418N v2 User’s Guide
218
HTTPS
TCP
443
HTTPS is a secured http session often used in e-
commerce.
ICMP
User-Defined
1
Internet Control Message Protocol is often used for
diagnostic or routing purposes.
ICQ
UDP
4000
This is a popular Internet chat program.
IGMP (MULTICAST)
User-Defined
2
Internet Group Management Protocol is used when
sending packets to a specific group of hosts.
IKE
UDP
500
The Internet Key Exchange algorithm is used for
key distribution and management.
IRC
TCP/UDP
6667
This is another popular Internet chat program.
MSN Messenger
TCP
1863
Microsoft Networks’ messenger service uses this
protocol.
NEW-ICQ
TCP
5190
An Internet chat program.
NEWS
TCP
144
A protocol for news groups.
NFS
UDP
2049
Network File System - NFS is a client/server
distributed file service that provides transparent file
sharing for network environments.
NNTP
TCP
119
Network News Transport Protocol is the delivery
mechanism for the USENET newsgroup service.
PING
User-Defined
1
Packet INternet Groper is a protocol that sends out
ICMP echo requests to test whether or not a remote
host is reachable.
POP3
TCP
110
Post Office Protocol version 3 lets a client computer
get e-mail from a POP3 server through a temporary
connection (TCP/IP or other).
PPTP
TCP
1723
Point-to-Point Tunneling Protocol enables secure
transfer of data over public networks. This is the
control channel.
PPTP_TUNNEL
(GRE)
User-Defined
47
PPTP (Point-to-Point Tunneling Protocol) enables
secure transfer of data over public networks. This is
the data channel.
RCMD
TCP
512
Remote Command Service.
REAL_AUDIO
TCP
7070
A streaming audio service that enables real time
sound over the web.
REXEC
TCP
514
Remote Execution Daemon.
RLOGIN
TCP
513
Remote Login.
RTELNET
TCP
107
Remote Telnet.
RTSP
TCP/UDP
554
The Real Time Streaming (media control) Protocol
(RTSP) is a remote control for multimedia on the
Internet.
SFTP
TCP
115
Simple File Transfer Protocol.
SMTP
TCP
25
Simple Mail Transfer Protocol is the message-
exchange standard for the Internet. SMTP enables
you to move messages from one e-mail server to
another.
SNMP
TCP/UDP
161
Simple Network Management Program.
SNMP-TRAPS
TCP/UDP
162
Traps for use with the SNMP (RFC:1215).
Table 81
Commonly Used Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 219 / 237
Appendix E Common Services
NBG-418N v2 User’s Guide
219
SQL-NET
TCP
1521
Structured Query Language is an interface to
access data on many different types of database
systems, including mainframes, midrange systems,
UNIX systems and network servers.
SSH
TCP/UDP
22
Secure Shell Remote Login Program.
STRM WORKS
UDP
1558
Stream Works Protocol.
SYSLOG
UDP
514
Syslog allows you to send system logs to a UNIX
server.
TACACS
UDP
49
Login Host Protocol used for (Terminal Access
Controller Access Control System).
TELNET
TCP
23
Telnet is the login and terminal emulation protocol
common on the Internet and in UNIX environments.
It operates over TCP/IP networks. Its primary
function is to allow users to log into remote host
systems.
TFTP
UDP
69
Trivial File Transfer Protocol is an Internet file
transfer protocol similar to FTP, but uses the UDP
(User Datagram Protocol) rather than TCP
(Transmission Control Protocol).
VDOLIVE
TCP
7000
Another video conferencing solution.
Table 81
Commonly Used Services (continued)
NAME
PROTOCOL
PORT(S)
DESCRIPTION
Page 220 / 237
NBG-418N v2 User’s Guide
220
A
PPENDIX
F
Legal Information
Copyright
Copyright © 2015 by ZyXEL Communications Corporation.
The contents of this publication may not be reproduced in any part or as a whole, transcribed, stored in a retrieval system, translated into
any language, or transmitted in any form or by any means, electronic, mechanical, magnetic, optical, chemical, photocopying, manual, or
otherwise, without the prior written permission of ZyXEL Communications Corporation.
Published by ZyXEL Communications Corporation. All rights reserved.
Disclaimers
ZyXEL does not assume any liability arising out of the application or use of any products, or software described herein. Neither does it
convey any license under its patent rights nor the patent rights of others. ZyXEL further reserves the right to make changes in any
products described herein without notice. This publication is subject to change without notice.
Your use of the NBG-418N v2 is subject to the terms and conditions of any related service providers.
Trademarks
Trademarks mentioned in this publication are used for identification purposes only and may be properties of their respective owners.
Regulatory Notice and Statement
UNITED STATE AMERICA
The following information applies if you use the product within USA area.
FCC EMC Statement
This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions:
1
This device may not cause harmful interference, and
2
this device must accept any interference received, including interference that may cause undesired operation.
Changes or modifications not expressly approved by the party responsible for compliance could void the user's authority to operate the
equipment.
This product has been tested and complies with the specifications for a Class B digital device, pursuant to Part 15 of the FCC Rules.
These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment
generates, uses, and can radiate radio frequency energy and, if not installed and used according to the instructions, may cause
harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular
installation.
If this equipment does cause harmful interference to radio or television reception, which is found by turning the equipment off and on,
the user is encouraged to try to correct the interference by one or more of the following measures:
1
Reorient or relocate the receiving antenna.
2
Increase the separation between the equipment or devices.
3
Connect the equipment to an outlet other than the receiver's.
4
Consult a dealer or an experienced radio/TV technician for assistance.
FCC Radiation Exposure Statement
This equipment complies with FCC RF radiation exposure limits set forth for an uncontrolled environment.
This transmitter must be at least 20 cm from the user and must not be co-located or operating in conjunction with any other antenna
or transmitter.
CANADA
The following information applies if you use the product within Canada area.
Industry Canada ICES statement
CAN ICES-3 (B)/NMB-3(B)

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top