Page 131 / 367 Scroll up to view Page 126 - 130
Chapter 7 Wireless
VMG4380-B10A / VMG4325-B10A User’s Guide
131
In step 3, you add another access point (
AP2
) to your network.
AP2
is out of range of
AP1
, so you
cannot use
AP1
for the WPS handshake with the new access point. However, you know that
Client
2
supports the registrar function, so you use it to perform the WPS handshake instead.
Figure 51
WPS: Example Network Step 3
7.10.9.5
Limitations of WPS
WPS has some limitations of which you should be aware.
WPS works in Infrastructure networks only (where an AP and a wireless client communicate). It
does not work in Ad-Hoc networks (where there is no AP).
When you use WPS, it works between two devices only. You cannot enroll multiple devices
simultaneously, you must enroll one after the other.
For instance, if you have two enrollees and one registrar you must set up the first enrollee (by
pressing the WPS button on the registrar and the first enrollee, for example), then check that it
successfully enrolled, then set up the second device in the same way.
WPS works only with other WPS-enabled devices. However, you can still add non-WPS devices to
a network you already set up using WPS.
WPS works by automatically issuing a randomly-generated WPA-PSK or WPA2-PSK pre-shared
key from the registrar device to the enrollee devices. Whether the network uses WPA-PSK or
WPA2-PSK depends on the device. You can check the configuration interface of the registrar
device to discover the key the network is using (if the device supports this feature). Then, you
can enter the key into the non-WPS device and join the network as normal (the non-WPS device
must also support WPA-PSK or WPA2-PSK).
CLIENT 1
AP1
REGISTRAR
CLIENT 2
EXISTING CONNECTION
SECURITY INFO
ENROLLEE
AP2
EXISTING CONNECTION
Page 132 / 367
Chapter 7 Wireless
VMG4380-B10A / VMG4325-B10A User’s Guide
132
When you use the PBC method, there is a short period (from the moment you press the button
on one device to the moment you press the button on the other device) when any WPS-enabled
device could join the network. This is because the registrar has no way of identifying the
“correct” enrollee, and cannot differentiate between your enrollee and a rogue device. This is a
possible way for a hacker to gain access to a network.
You can easily check to see if this has happened. WPS works between only two devices
simultaneously, so if another device has enrolled your device will be unable to enroll, and will not
have access to the network. If this happens, open the access point’s configuration interface and
look at the list of associated clients (usually displayed by MAC address). It does not matter if the
access point is the WPS registrar, the enrollee, or was not involved in the WPS handshake; a
rogue device must still associate with the access point to gain access to the network. Check the
MAC addresses of your wireless clients (usually printed on a label on the bottom of the device). If
there is an unknown MAC address you can remove it or reset the AP.
Page 133 / 367
VMG4380-B10A / VMG4325-B10A User’s Guide
133
C
HAPTER
8
Home Networking
8.1
Overview
A Local Area Network (LAN) is a shared communication system to which many networking devices
are connected. It is usually located in one immediate area such as a building or floor of a building.
Use the LAN screens to help you configure a LAN DHCP server and manage IP addresses.
8.1.1
What You Can Do in this Chapter
Use the
LAN Setup
screen to set the LAN IP address, subnet mask, and DHCP settings of your
Device (
Section 8.2 on page 135
).
Use the
Static DHCP
screen to assign IP addresses on the LAN to specific individual computers
based on their MAC Addresses (
Section 8.3 on page 138
).
Use the
UPnP
screen to enable UPnP and UPnP NAT traversal on the Device (
Section 8.4 on page
140
).
Use the
Additional Subnet
screen to configure IP alias and public static IP (
Section 8.5 on page
141
).
Use the
STB Vendor ID
screen to have the Device automatically create static DHCP entries for
Set Top Box (STB) devices when they request IP addresses (
Section 8.8 on page 150
)
Use the
5th Ethernet Port
screen to configure the Ethernet WAN port as a LAN port (
Section 8.9
on page 150
).
Use the
LAN VLAN
screen to control the VLAN ID and IEEE 802.1p priority tags of traffic sent out
through individual LAN ports (
Section 8.10 on page 151
).
DSL
LAN
Page 134 / 367
Chapter 8 Home Networking
VMG4380-B10A / VMG4325-B10A User’s Guide
134
8.1.2
What You Need To Know
8.1.2.1
About LAN
IP Address
IP addresses identify individual devices on a network. Every networking device (including
computers, servers, routers, printers, etc.) needs an IP address to communicate across the
network. These networking devices are also known as hosts.
Subnet Mask
Subnet masks determine the maximum number of possible hosts on a network. You can also use
subnet masks to divide one network into multiple sub-networks.
DHCP
A DHCP (Dynamic Host Configuration Protocol) server can assign your Device an IP address, subnet
mask, DNS and other routing information when it's turned on.
DNS
DNS (Domain Name System) is for mapping a domain name to its corresponding IP address and
vice versa. The DNS server is extremely important because without it, you must know the IP
address of a networking device before you can access it.
RADVD (Router Advertisement Daemon)
When an IPv6 host sends a Router Solicitation (RS) request to discover the available routers,
RADVD with Router Advertisement (RA) messages in response to the request. It specifies the
minimum and maximum intervals of RA broadcasts. RA messages containing the address prefix.
IPv6 hosts can be generated with the IPv6 prefix an IPv6 address.
8.1.2.2
About UPnP
Identifying UPnP Devices
UPnP hardware is identified as an icon in the Network Connections folder (Windows XP). Each UPnP
compatible device installed on your network will appear as a separate icon. Selecting the icon of a
UPnP device will allow you to access the information and properties of that device.
NAT Traversal
UPnP NAT traversal automates the process of allowing an application to operate through NAT. UPnP
network devices can automatically configure network addressing, announce their presence in the
network to other UPnP devices and enable exchange of simple product and service descriptions.
NAT traversal allows the following:
Dynamic port mapping
Learning public IP addresses
Page 135 / 367
Chapter 8 Home Networking
VMG4380-B10A / VMG4325-B10A User’s Guide
135
Assigning lease times to mappings
Windows Messenger is an example of an application that supports NAT traversal and UPnP.
See the
Chapter 11 on page 179
for more information on NAT.
Cautions with UPnP
The automated nature of NAT traversal applications in establishing their own services and opening
firewall ports may present network security issues. Network information and configuration may also
be obtained and modified by users in some network environments.
When a UPnP device joins a network, it announces its presence with a multicast message. For
security reasons, the Device allows multicast messages on the LAN only.
All UPnP-enabled devices may communicate freely with each other without additional configuration.
Disable UPnP if this is not your intention.
UPnP and ZyXEL
ZyXEL has achieved UPnP certification from the Universal Plug and Play Forum UPnP™
Implementers Corp. (UIC). ZyXEL's UPnP implementation supports Internet Gateway Device (IGD)
1.0.
See
Section 8.5 on page 141
for examples of installing and using UPnP.
Finding Out More
See
Section 8.11 on page 152
for technical background information on LANs.
8.1.3
Before You Begin
Find out the MAC addresses of your network devices if you intend to add them to the DHCP Client
List screen.
8.2
The LAN Setup Screen
Use this screen to set the Local Area Network IP address and subnet mask of your Device. Click
Network Setting > Home Networking
to open the
LAN Setup
screen.
Follow these steps to configure your LAN settings.
1
Enter an IP address into the
IP Address
field. The IP address must be in dotted decimal notation.
This will become the IP address of your Device.
2
Enter the IP subnet mask into the
IP Subnet Mask
field. Unless instructed otherwise it is best to
leave this alone, the configurator will automatically compute a subnet mask based upon the IP
address you entered.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top